viba-cli 0.35.0 → 0.36.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/.next/BUILD_ID +1 -1
  2. package/.next/build-manifest.json +2 -2
  3. package/.next/fallback-build-manifest.json +2 -2
  4. package/.next/prerender-manifest.json +3 -3
  5. package/.next/server/app/_global-error.html +2 -2
  6. package/.next/server/app/_global-error.rsc +1 -1
  7. package/.next/server/app/_global-error.segments/__PAGE__.segment.rsc +1 -1
  8. package/.next/server/app/_global-error.segments/_full.segment.rsc +1 -1
  9. package/.next/server/app/_global-error.segments/_head.segment.rsc +1 -1
  10. package/.next/server/app/_global-error.segments/_index.segment.rsc +1 -1
  11. package/.next/server/app/_global-error.segments/_tree.segment.rsc +1 -1
  12. package/.next/server/app/_not-found.html +2 -2
  13. package/.next/server/app/_not-found.rsc +1 -1
  14. package/.next/server/app/_not-found.segments/_full.segment.rsc +1 -1
  15. package/.next/server/app/_not-found.segments/_head.segment.rsc +1 -1
  16. package/.next/server/app/_not-found.segments/_index.segment.rsc +1 -1
  17. package/.next/server/app/_not-found.segments/_not-found/__PAGE__.segment.rsc +1 -1
  18. package/.next/server/app/_not-found.segments/_not-found.segment.rsc +1 -1
  19. package/.next/server/app/_not-found.segments/_tree.segment.rsc +1 -1
  20. package/.next/server/app/credentials/page/server-reference-manifest.json +7 -7
  21. package/.next/server/app/credentials/page.js.nft.json +1 -1
  22. package/.next/server/app/credentials/page_client-reference-manifest.js +1 -1
  23. package/.next/server/app/credentials.html +2 -2
  24. package/.next/server/app/credentials.rsc +3 -3
  25. package/.next/server/app/credentials.segments/_full.segment.rsc +3 -3
  26. package/.next/server/app/credentials.segments/_head.segment.rsc +1 -1
  27. package/.next/server/app/credentials.segments/_index.segment.rsc +1 -1
  28. package/.next/server/app/credentials.segments/_tree.segment.rsc +1 -1
  29. package/.next/server/app/credentials.segments/credentials/__PAGE__.segment.rsc +2 -2
  30. package/.next/server/app/credentials.segments/credentials.segment.rsc +1 -1
  31. package/.next/server/app/index.html +2 -2
  32. package/.next/server/app/index.rsc +2 -2
  33. package/.next/server/app/index.segments/__PAGE__.segment.rsc +2 -2
  34. package/.next/server/app/index.segments/_full.segment.rsc +2 -2
  35. package/.next/server/app/index.segments/_head.segment.rsc +1 -1
  36. package/.next/server/app/index.segments/_index.segment.rsc +1 -1
  37. package/.next/server/app/index.segments/_tree.segment.rsc +1 -1
  38. package/.next/server/app/new/page/server-reference-manifest.json +29 -29
  39. package/.next/server/app/new/page.js.nft.json +1 -1
  40. package/.next/server/app/new/page_client-reference-manifest.js +1 -1
  41. package/.next/server/app/page/server-reference-manifest.json +29 -29
  42. package/.next/server/app/page.js.nft.json +1 -1
  43. package/.next/server/app/page_client-reference-manifest.js +1 -1
  44. package/.next/server/app/session/[sessionId]/page/server-reference-manifest.json +19 -19
  45. package/.next/server/app/session/[sessionId]/page.js.nft.json +1 -1
  46. package/.next/server/app/session/[sessionId]/page_client-reference-manifest.js +1 -1
  47. package/.next/server/chunks/ssr/[root-of-the-server]__03608b11._.js +1 -1
  48. package/.next/server/chunks/ssr/[root-of-the-server]__03608b11._.js.map +1 -1
  49. package/.next/server/chunks/ssr/[root-of-the-server]__0522f852._.js +1 -1
  50. package/.next/server/chunks/ssr/{[root-of-the-server]__d7106274._.js → [root-of-the-server]__34682cce._.js} +2 -2
  51. package/.next/server/chunks/ssr/{[root-of-the-server]__d7106274._.js.map → [root-of-the-server]__34682cce._.js.map} +1 -1
  52. package/.next/server/chunks/ssr/[root-of-the-server]__352d2b3c._.js +1 -1
  53. package/.next/server/chunks/ssr/[root-of-the-server]__4c388861._.js +1 -1
  54. package/.next/server/chunks/ssr/[root-of-the-server]__4c388861._.js.map +1 -1
  55. package/.next/server/chunks/ssr/{[root-of-the-server]__45338798._.js → [root-of-the-server]__5248b09d._.js} +2 -2
  56. package/.next/server/chunks/ssr/{[root-of-the-server]__45338798._.js.map → [root-of-the-server]__5248b09d._.js.map} +1 -1
  57. package/.next/server/chunks/ssr/[root-of-the-server]__59834c63._.js +1 -1
  58. package/.next/server/chunks/ssr/[root-of-the-server]__59834c63._.js.map +1 -1
  59. package/.next/server/chunks/ssr/[root-of-the-server]__90f3f366._.js +1 -1
  60. package/.next/server/chunks/ssr/[root-of-the-server]__90f3f366._.js.map +1 -1
  61. package/.next/server/chunks/ssr/[root-of-the-server]__9201693f._.js +1 -1
  62. package/.next/server/chunks/ssr/{[root-of-the-server]__f92d6383._.js → [root-of-the-server]__ddfe4bc9._.js} +2 -2
  63. package/.next/server/chunks/ssr/{[root-of-the-server]__f92d6383._.js.map → [root-of-the-server]__ddfe4bc9._.js.map} +1 -1
  64. package/.next/server/chunks/ssr/_0e1eddd4._.js +3 -0
  65. package/.next/server/chunks/ssr/{_9e495cd1._.js.map → _0e1eddd4._.js.map} +1 -1
  66. package/.next/server/chunks/ssr/_24abf4af._.js +3 -0
  67. package/.next/server/chunks/ssr/{_7dd8c91e._.js.map → _24abf4af._.js.map} +1 -1
  68. package/.next/server/chunks/ssr/src_app_credentials_page_tsx_63d8d34a._.js +1 -1
  69. package/.next/server/chunks/ssr/src_app_credentials_page_tsx_63d8d34a._.js.map +1 -1
  70. package/.next/server/chunks/ssr/src_app_session_[sessionId]_SessionPageClient_tsx_dab490d7._.js +1 -1
  71. package/.next/server/chunks/ssr/src_app_session_[sessionId]_SessionPageClient_tsx_dab490d7._.js.map +1 -1
  72. package/.next/server/chunks/ssr/src_components_GitRepoSelector_tsx_05c81afa._.js +1 -1
  73. package/.next/server/chunks/ssr/src_components_GitRepoSelector_tsx_05c81afa._.js.map +1 -1
  74. package/.next/server/pages/404.html +2 -2
  75. package/.next/server/pages/500.html +2 -2
  76. package/.next/server/server-reference-manifest.js +1 -1
  77. package/.next/server/server-reference-manifest.json +48 -48
  78. package/.next/static/chunks/{5ad3d5d6c07c99cf.js → 55530e7372f637a5.js} +3 -3
  79. package/.next/static/chunks/{d9512842f72f81d6.js → 69f9cafe63e37b94.js} +2 -2
  80. package/.next/static/chunks/{f526d44cc764beed.js → 77fd18eb8db19b06.js} +1 -1
  81. package/.next/static/chunks/{21e669e5ae3894e2.js → 7d1a2e687efd0dae.js} +1 -1
  82. package/.next/static/chunks/{2bfa56d03bfd813d.js → 87a0daee0af7dbbb.js} +2 -2
  83. package/.next/static/chunks/{a681ffd5bce0ddd1.js → cbeda3911cb6ed6b.js} +1 -1
  84. package/package.json +1 -1
  85. package/.next/server/chunks/ssr/_7dd8c91e._.js +0 -3
  86. package/.next/server/chunks/ssr/_9e495cd1._.js +0 -3
  87. /package/.next/static/{xdnDnbUFZLle37zkWVRbd → ZQBlMiVA1p6iyepPKzRE3}/_buildManifest.js +0 -0
  88. /package/.next/static/{xdnDnbUFZLle37zkWVRbd → ZQBlMiVA1p6iyepPKzRE3}/_clientMiddlewareManifest.json +0 -0
  89. /package/.next/static/{xdnDnbUFZLle37zkWVRbd → ZQBlMiVA1p6iyepPKzRE3}/_ssgManifest.js +0 -0
@@ -1,4 +1,4 @@
1
1
  module.exports=[33405,(a,b,c)=>{b.exports=a.x("child_process",()=>require("child_process"))},70722,(a,b,c)=>{b.exports=a.x("tty",()=>require("tty"))},24868,(a,b,c)=>{b.exports=a.x("fs/promises",()=>require("fs/promises"))},46786,(a,b,c)=>{b.exports=a.x("os",()=>require("os"))},37936,(a,b,c)=>{"use strict";Object.defineProperty(c,"__esModule",{value:!0}),Object.defineProperty(c,"registerServerReference",{enumerable:!0,get:function(){return d.registerServerReference}});let d=a.r(11857)},13095,(a,b,c)=>{"use strict";function d(a){for(let b=0;b<a.length;b++){let c=a[b];if("function"!=typeof c)throw Object.defineProperty(Error(`A "use server" file can only export async functions, found ${typeof c}.
2
- Read more: https://nextjs.org/docs/messages/invalid-use-server-value`),"__NEXT_ERROR_CODE",{value:"E352",enumerable:!1,configurable:!0})}}Object.defineProperty(c,"__esModule",{value:!0}),Object.defineProperty(c,"ensureServerEntryExports",{enumerable:!0,get:function(){return d}})},66085,a=>{"use strict";var b=a.i(24868),c=a.i(46786),d=a.i(14747);let e="viba-agent-api-credentials",f=["codex"],g=null,h=null,i=!1;function j(a){return f.includes(a)}function k(){return h?`Secure credential storage is unavailable: ${h}`:"Secure credential storage is unavailable in this runtime."}async function l(){return g||(g=a.A(45581).then(a=>a.default??a).catch(a=>(h=a instanceof Error?a.message:String(a),i||(i=!0,console.warn(`[agent-api-credentials] ${k()}`)),null))),g}async function m(){let a=await l();if(!a)throw Error(k());return a}function n(a){return`agent-api-${a}`}function o(a){return a.keytarAccount||n(a.agent)}function p(a){return{agent:a.agent,apiProxy:a.apiProxy,createdAt:a.createdAt,updatedAt:a.updatedAt}}function q(a){return!!a&&"object"==typeof a&&"string"==typeof a.agent&&!!j(a.agent)&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&(void 0===a.apiProxy||"string"==typeof a.apiProxy)&&(void 0===a.keytarAccount||"string"==typeof a.keytarAccount)}async function r(){let a=d.default.join(c.default.homedir(),".viba");return await b.default.mkdir(a,{recursive:!0}),d.default.join(a,"agent-api-configs.json")}async function s(a){let c=await r();await b.default.writeFile(c,JSON.stringify(a,null,2),"utf-8")}async function t(){let a=await r();try{let c=await b.default.readFile(a,"utf-8"),d=JSON.parse(c);if(Array.isArray(d))return d.filter(q);if(!d||"object"!=typeof d)return[];let e=Object.entries(d).filter(([a])=>j(a)).map(([a,b])=>b&&"object"==typeof b?void 0===b.agent?{...b,agent:a}:b:null).filter(q);return e.length>0&&await s(e),e}catch(a){if(a?.code==="ENOENT")return[];return console.error("Failed to parse agent API credential metadata:",a),[]}}async function u(){return(await t()).map(p).sort((a,b)=>b.updatedAt.localeCompare(a.updatedAt))}async function v(a,b,c){let d,f;if(!j(a))return{success:!1,error:`Unsupported agent: ${a}`};let g=b.trim();if(!g)return{success:!1,error:"API key is required."};try{d=function(a){let b=a.trim();if(b){try{new URL(b)}catch{throw Error("API proxy must be a valid URL.")}return b}}(c)}catch(a){return{success:!1,error:a.message}}try{f=await m()}catch(a){return{success:!1,error:a.message}}let h=await t(),i=new Date().toISOString(),k=h.findIndex(b=>b.agent===a),l=k>=0?o(h[k]):n(a);if(await f.setPassword(e,l,g),k>=0){let a=h[k];h[k]={...a,apiProxy:d,updatedAt:i,keytarAccount:l}}else h.push({agent:a,apiProxy:d,createdAt:i,updatedAt:i,keytarAccount:l});await s(h);let q=h.find(b=>b.agent===a);return q?{success:!0,credential:p(q)}:{success:!1,error:"Failed to persist agent API credential."}}async function w(a){if(!j(a))return{success:!1,error:`Unsupported agent: ${a}`};let b=await t(),c=b.findIndex(b=>b.agent===a);if(-1===c)return{success:!1,error:"Agent API credential not found."};let[d]=b.splice(c,1);await s(b);let f=await l();return f&&await f.deletePassword(e,o(d)),{success:!0}}async function x(a){if(!j(a))return null;let b=(await t()).find(b=>b.agent===a);if(!b)return null;let c=await l();if(!c)return null;let d=await c.getPassword(e,o(b));return d?{agent:b.agent,apiKey:d,apiProxy:b.apiProxy}:null}a.s(["createOrUpdateAgentApiCredential",()=>v,"deleteAgentApiCredential",()=>w,"getAgentApiCredentialSecret",()=>x,"getAllAgentApiCredentials",()=>u])},70798,a=>{"use strict";var b=a.i(24868),c=a.i(46786),d=a.i(14747);let e="viba-git-credentials",f=null,g=null,h=!1;function i(){return g?`Secure credential storage is unavailable: ${g}`:"Secure credential storage is unavailable in this runtime."}async function j(){return f||(f=a.A(45581).then(a=>a.default??a).catch(a=>(g=a instanceof Error?a.message:String(a),h||(h=!0,console.warn(`[credentials] ${i()}`)),null))),f}async function k(){let a=await j();if(!a)throw Error(i());return a}function l(){return`${Date.now()}-${Math.random().toString(36).slice(2,9)}`}function m(a){return a.trim().replace(/\/$/,"")}function n(a){return`credential-${a}`}function o(a){return`credential-${a}`}function p(a){return a.keytarAccount||n(a.id)}function q(a){return"gitlab"===a.type?{id:a.id,type:"gitlab",username:a.username,serverUrl:a.serverUrl||"https://gitlab.com",createdAt:a.createdAt,updatedAt:a.updatedAt}:{id:a.id,type:"github",username:a.username,createdAt:a.createdAt,updatedAt:a.updatedAt}}async function r(){let a=d.default.join(c.default.homedir(),".viba");return await b.default.mkdir(a,{recursive:!0}),d.default.join(a,"credentials.json")}function s(a,b){return!!a&&"object"==typeof a&&a.type===b&&"string"==typeof a.username&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&("gitlab"!==b||"string"==typeof a.serverUrl)}function t(a){return!!a&&"object"==typeof a&&"string"==typeof a.id&&!!a.id.trim()&&("github"===a.type||"gitlab"===a.type)&&"string"==typeof a.username&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&(void 0===a.keytarAccount||"string"==typeof a.keytarAccount)&&("gitlab"!==a.type||"string"==typeof a.serverUrl)}async function u(a){let c=await r();await b.default.writeFile(c,JSON.stringify(a,null,2),"utf-8")}async function v(){let a=await r();try{let c=await b.default.readFile(a,"utf-8"),d=JSON.parse(c);if(Array.isArray(d))return d.filter(t);if(!d||"object"!=typeof d)return[];let e=[];if(s(d.github,"github")){let a=d.github;e.push({id:l(),type:"github",username:a.username,createdAt:a.createdAt,updatedAt:a.updatedAt,keytarAccount:o("github")})}if(s(d.gitlab,"gitlab")){let a=d.gitlab;e.push({id:l(),type:"gitlab",username:a.username,serverUrl:a.serverUrl,createdAt:a.createdAt,updatedAt:a.updatedAt,keytarAccount:o("gitlab")})}return e.length>0&&await u(e),e}catch(a){if(a?.code==="ENOENT")return[];return console.error("Failed to parse credentials metadata:",a),[]}}async function w(){return(await v()).map(q).sort((a,b)=>b.updatedAt.localeCompare(a.updatedAt))}async function x(a){let b=(await v()).find(b=>b.id===a);return b?q(b):null}async function y(a){let b=(await v()).find(b=>b.id===a);if(!b)return null;let c=await j();return c?c.getPassword(e,p(b)):null}async function z(a){try{let b=await fetch("https://api.github.com/user",{headers:{Authorization:`Bearer ${a}`,Accept:"application/vnd.github+json","X-GitHub-Api-Version":"2022-11-28"}});if(!b.ok){if(401===b.status)return{valid:!1,error:"Invalid or expired GitHub token."};return{valid:!1,error:`GitHub API returned ${b.status}.`}}let c=await b.json(),d="string"==typeof c?.login?c.login:null;if(!d)return{valid:!1,error:"GitHub API response did not include a username."};return{valid:!0,username:d}}catch(a){return{valid:!1,error:`Failed to verify GitHub token: ${a.message}`}}}async function A(a,b){try{let c=m(a),d=await fetch(`${c}/api/v4/user`,{headers:{"PRIVATE-TOKEN":b}});if(!d.ok){if(401===d.status)return{valid:!1,error:"Invalid or expired GitLab token."};return{valid:!1,error:`GitLab API returned ${d.status}.`}}let e=await d.json(),f="string"==typeof e?.username?e.username:null;if(!f)return{valid:!1,error:"GitLab API response did not include a username."};return{valid:!0,username:f}}catch(a){return{valid:!1,error:`Failed to verify GitLab token: ${a.message}`}}}async function B(a){let b,c=a.trim();if(!c)return{success:!1,error:"GitHub token is required."};try{b=await k()}catch(a){return{success:!1,error:a.message}}let d=await z(c);if(!d.valid||!d.username)return{success:!1,error:d.error||"Failed to verify GitHub token."};let f=await v();if(f.find(a=>"github"===a.type&&a.username===d.username))return{success:!1,error:`A GitHub credential for ${d.username} already exists.`};let g=l(),h=new Date().toISOString(),i=n(g);await b.setPassword(e,i,c);let j={id:g,type:"github",username:d.username,createdAt:h,updatedAt:h,keytarAccount:i};return f.push(j),await u(f),{success:!0,credential:{id:j.id,type:"github",username:j.username,createdAt:j.createdAt,updatedAt:j.updatedAt}}}async function C(a,b){let c,d=m(a),f=b.trim();if(!d)return{success:!1,error:"GitLab server URL is required."};try{new URL(d)}catch{return{success:!1,error:"GitLab server URL must be a valid URL."}}if(!f)return{success:!1,error:"GitLab token is required."};try{c=await k()}catch(a){return{success:!1,error:a.message}}let g=await A(d,f);if(!g.valid||!g.username)return{success:!1,error:g.error||"Failed to verify GitLab token."};let h=await v();if(h.find(a=>"gitlab"===a.type&&a.username===g.username&&a.serverUrl===d))return{success:!1,error:`A GitLab credential for ${g.username} on ${d} already exists.`};let i=l(),j=new Date().toISOString(),o=n(i);await c.setPassword(e,o,f);let p={id:i,type:"gitlab",username:g.username,serverUrl:d,createdAt:j,updatedAt:j,keytarAccount:o};return h.push(p),await u(h),{success:!0,credential:{id:p.id,type:"gitlab",username:p.username,serverUrl:p.serverUrl||d,createdAt:p.createdAt,updatedAt:p.updatedAt}}}async function D(a){let b=await v(),c=b.findIndex(b=>b.id===a);if(-1===c)return{success:!1,error:"Credential not found."};let d=b[c];b.splice(c,1),await u(b);let f=await j();return f&&await f.deletePassword(e,p(d)),{success:!0}}a.s(["createGitHubCredential",()=>B,"createGitLabCredential",()=>C,"deleteCredential",()=>D,"getAllCredentials",()=>w,"getCredentialById",()=>x,"getCredentialToken",()=>y])},39298,a=>{"use strict";var b=a.i(51817),c=a.i(15271),d=a.i(38642);a.s([],99637),a.i(99637),a.s(["0066b7b106c642ef4b72dce222493eb03eda405f51",()=>c.getHomeDirectory,"0090ca1b58238fe3d84576aa7598f62fec82e1c39f",()=>d.getConfig,"400af4edfd9d2b345c5e6149e415a1071283a46ca4",()=>b.getSessionMetadata,"4011f665d683ed9dea7df1dcf74552a1aca0148549",()=>b.markSessionInitialized,"4027839eab56730ea8a83c377963205f2c56693ebd",()=>b.getSessionDivergence,"402dc43f0f57cd2d5cca381b7ec49b2f2f08d22cad",()=>d.updateConfig,"406f15941bd4e4ec6f5d01de09143d127560eac086",()=>b.listSessionBaseBranches,"40a4f3aeed2db4b95aaec16dce14539ad437c661d0",()=>b.consumeSessionLaunchContext,"40be1901b8147d92cfa7bcd1598d64346d58171f73",()=>b.mergeSessionToBase,"40c6d25f0a1d12624264cfab1df7b65529d6a1954e",()=>c.listPathEntries,"40d295c5b016ec9e37ff307fcef67484b5eed5616b",()=>b.deleteSessionInBackground,"40fec0767bcfcf8e311efe9ff9591ce0d5725cc86c",()=>b.rebaseSessionOntoBase,"601227d3a707ca786a0861277c39ba99336f401b90",()=>b.updateSessionBaseBranch,"6077b32acdb08a39803adab020f1b2888cdccba654",()=>b.writeSessionPromptFile,"7f08cd1339dcf1b570a244c63328c728813a7607d2",()=>c.getSessionTerminalSources,"7f66f1946d40a6892f35eeb4bf4695ed1e2e2d204d",()=>c.setTmuxSessionStatusVisibility,"7f713f073b27ef9774eb20e78f51c6c8301bdfe40d",()=>c.setTmuxSessionMouseMode,"7f9dc57d041c4edb322ba7d1d13eb79fa659814239",()=>c.startTtydProcess,"7fc04de30f1cf912afb0c21ae821e159cb23a52b95",()=>c.saveAttachments],39298)},45581,a=>{a.v(b=>Promise.all(["server/chunks/ssr/[externals]_keytar_23140f5c._.js"].map(b=>a.l(b))).then(()=>b(83034)))},44264,a=>{a.v(a=>Promise.resolve().then(()=>a(33405)))},37706,a=>{a.v(b=>Promise.all(["server/chunks/ssr/[root-of-the-server]__edf0aa7a._.js"].map(b=>a.l(b))).then(()=>b(78775)))}];
2
+ Read more: https://nextjs.org/docs/messages/invalid-use-server-value`),"__NEXT_ERROR_CODE",{value:"E352",enumerable:!1,configurable:!0})}}Object.defineProperty(c,"__esModule",{value:!0}),Object.defineProperty(c,"ensureServerEntryExports",{enumerable:!0,get:function(){return d}})},66085,a=>{"use strict";var b=a.i(24868),c=a.i(46786),d=a.i(14747);let e="viba-agent-api-credentials",f=["codex"],g=null,h=null,i=!1;function j(a){return f.includes(a)}function k(){return h?`Secure credential storage is unavailable: ${h}`:"Secure credential storage is unavailable in this runtime."}async function l(){return g||(g=a.A(45581).then(a=>a.default??a).catch(a=>(h=a instanceof Error?a.message:String(a),i||(i=!0,console.warn(`[agent-api-credentials] ${k()}`)),null))),g}async function m(){let a=await l();if(!a)throw Error(k());return a}function n(a){return`agent-api-${a}`}function o(a){return a.keytarAccount||n(a.agent)}function p(a){return{agent:a.agent,apiProxy:a.apiProxy,createdAt:a.createdAt,updatedAt:a.updatedAt}}function q(a){return!!a&&"object"==typeof a&&"string"==typeof a.agent&&!!j(a.agent)&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&(void 0===a.apiProxy||"string"==typeof a.apiProxy)&&(void 0===a.keytarAccount||"string"==typeof a.keytarAccount)}async function r(){let a=d.default.join(c.default.homedir(),".viba");return await b.default.mkdir(a,{recursive:!0}),d.default.join(a,"agent-api-configs.json")}async function s(a){let c=await r();await b.default.writeFile(c,JSON.stringify(a,null,2),"utf-8")}async function t(){let a=await r();try{let c=await b.default.readFile(a,"utf-8"),d=JSON.parse(c);if(Array.isArray(d))return d.filter(q);if(!d||"object"!=typeof d)return[];let e=Object.entries(d).filter(([a])=>j(a)).map(([a,b])=>b&&"object"==typeof b?void 0===b.agent?{...b,agent:a}:b:null).filter(q);return e.length>0&&await s(e),e}catch(a){if(a?.code==="ENOENT")return[];return console.error("Failed to parse agent API credential metadata:",a),[]}}async function u(){return(await t()).map(p).sort((a,b)=>b.updatedAt.localeCompare(a.updatedAt))}async function v(a,b,c){let d,f;if(!j(a))return{success:!1,error:`Unsupported agent: ${a}`};let g=b.trim();if(!g)return{success:!1,error:"API key is required."};try{d=function(a){let b=a.trim();if(b){try{new URL(b)}catch{throw Error("API proxy must be a valid URL.")}return b}}(c)}catch(a){return{success:!1,error:a.message}}try{f=await m()}catch(a){return{success:!1,error:a.message}}let h=await t(),i=new Date().toISOString(),k=h.findIndex(b=>b.agent===a),l=k>=0?o(h[k]):n(a);if(await f.setPassword(e,l,g),k>=0){let a=h[k];h[k]={...a,apiProxy:d,updatedAt:i,keytarAccount:l}}else h.push({agent:a,apiProxy:d,createdAt:i,updatedAt:i,keytarAccount:l});await s(h);let q=h.find(b=>b.agent===a);return q?{success:!0,credential:p(q)}:{success:!1,error:"Failed to persist agent API credential."}}async function w(a){if(!j(a))return{success:!1,error:`Unsupported agent: ${a}`};let b=await t(),c=b.findIndex(b=>b.agent===a);if(-1===c)return{success:!1,error:"Agent API credential not found."};let[d]=b.splice(c,1);await s(b);let f=await l();return f&&await f.deletePassword(e,o(d)),{success:!0}}async function x(a){if(!j(a))return null;let b=(await t()).find(b=>b.agent===a);if(!b)return null;let c=await l();if(!c)return null;let d=await c.getPassword(e,o(b));return d?{agent:b.agent,apiKey:d,apiProxy:b.apiProxy}:null}a.s(["createOrUpdateAgentApiCredential",()=>v,"deleteAgentApiCredential",()=>w,"getAgentApiCredentialSecret",()=>x,"getAllAgentApiCredentials",()=>u])},70798,a=>{"use strict";var b=a.i(24868),c=a.i(46786),d=a.i(14747);let e="viba-git-credentials",f=null,g=null,h=!1;function i(){return g?`Secure credential storage is unavailable: ${g}`:"Secure credential storage is unavailable in this runtime."}async function j(){return f||(f=a.A(45581).then(a=>a.default??a).catch(a=>(g=a instanceof Error?a.message:String(a),h||(h=!0,console.warn(`[credentials] ${i()}`)),null))),f}async function k(){let a=await j();if(!a)throw Error(i());return a}function l(){return`${Date.now()}-${Math.random().toString(36).slice(2,9)}`}function m(a){return a.trim().replace(/\/$/,"")}function n(a){return`credential-${a}`}function o(a){return`credential-${a}`}function p(a){return a.keytarAccount||n(a.id)}function q(a){return"gitlab"===a.type?{id:a.id,type:"gitlab",username:a.username,serverUrl:a.serverUrl||"https://gitlab.com",createdAt:a.createdAt,updatedAt:a.updatedAt}:{id:a.id,type:"github",username:a.username,createdAt:a.createdAt,updatedAt:a.updatedAt}}async function r(){let a=d.default.join(c.default.homedir(),".viba");return await b.default.mkdir(a,{recursive:!0}),d.default.join(a,"credentials.json")}function s(a,b){return!!a&&"object"==typeof a&&a.type===b&&"string"==typeof a.username&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&("gitlab"!==b||"string"==typeof a.serverUrl)}function t(a){return!!a&&"object"==typeof a&&"string"==typeof a.id&&!!a.id.trim()&&("github"===a.type||"gitlab"===a.type)&&"string"==typeof a.username&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&(void 0===a.keytarAccount||"string"==typeof a.keytarAccount)&&("gitlab"!==a.type||"string"==typeof a.serverUrl)}async function u(a){let c=await r();await b.default.writeFile(c,JSON.stringify(a,null,2),"utf-8")}async function v(){let a=await r();try{let c=await b.default.readFile(a,"utf-8"),d=JSON.parse(c);if(Array.isArray(d))return d.filter(t);if(!d||"object"!=typeof d)return[];let e=[];if(s(d.github,"github")){let a=d.github;e.push({id:l(),type:"github",username:a.username,createdAt:a.createdAt,updatedAt:a.updatedAt,keytarAccount:o("github")})}if(s(d.gitlab,"gitlab")){let a=d.gitlab;e.push({id:l(),type:"gitlab",username:a.username,serverUrl:a.serverUrl,createdAt:a.createdAt,updatedAt:a.updatedAt,keytarAccount:o("gitlab")})}return e.length>0&&await u(e),e}catch(a){if(a?.code==="ENOENT")return[];return console.error("Failed to parse credentials metadata:",a),[]}}async function w(){return(await v()).map(q).sort((a,b)=>b.updatedAt.localeCompare(a.updatedAt))}async function x(a){let b=(await v()).find(b=>b.id===a);return b?q(b):null}async function y(a){let b=(await v()).find(b=>b.id===a);if(!b)return null;let c=await j();return c?c.getPassword(e,p(b)):null}async function z(a){try{let b=await fetch("https://api.github.com/user",{headers:{Authorization:`Bearer ${a}`,Accept:"application/vnd.github+json","X-GitHub-Api-Version":"2022-11-28"}});if(!b.ok){if(401===b.status)return{valid:!1,error:"Invalid or expired GitHub token."};return{valid:!1,error:`GitHub API returned ${b.status}.`}}let c=await b.json(),d="string"==typeof c?.login?c.login:null;if(!d)return{valid:!1,error:"GitHub API response did not include a username."};return{valid:!0,username:d}}catch(a){return{valid:!1,error:`Failed to verify GitHub token: ${a.message}`}}}async function A(a,b){try{let c=m(a),d=await fetch(`${c}/api/v4/user`,{headers:{"PRIVATE-TOKEN":b}});if(!d.ok){if(401===d.status)return{valid:!1,error:"Invalid or expired GitLab token."};return{valid:!1,error:`GitLab API returned ${d.status}.`}}let e=await d.json(),f="string"==typeof e?.username?e.username:null;if(!f)return{valid:!1,error:"GitLab API response did not include a username."};return{valid:!0,username:f}}catch(a){return{valid:!1,error:`Failed to verify GitLab token: ${a.message}`}}}async function B(a){let b,c=a.trim();if(!c)return{success:!1,error:"GitHub token is required."};try{b=await k()}catch(a){return{success:!1,error:a.message}}let d=await z(c);if(!d.valid||!d.username)return{success:!1,error:d.error||"Failed to verify GitHub token."};let f=await v();if(f.find(a=>"github"===a.type&&a.username===d.username))return{success:!1,error:`A GitHub credential for ${d.username} already exists.`};let g=l(),h=new Date().toISOString(),i=n(g);await b.setPassword(e,i,c);let j={id:g,type:"github",username:d.username,createdAt:h,updatedAt:h,keytarAccount:i};return f.push(j),await u(f),{success:!0,credential:{id:j.id,type:"github",username:j.username,createdAt:j.createdAt,updatedAt:j.updatedAt}}}async function C(a,b){let c,d=m(a),f=b.trim();if(!d)return{success:!1,error:"GitLab server URL is required."};try{new URL(d)}catch{return{success:!1,error:"GitLab server URL must be a valid URL."}}if(!f)return{success:!1,error:"GitLab token is required."};try{c=await k()}catch(a){return{success:!1,error:a.message}}let g=await A(d,f);if(!g.valid||!g.username)return{success:!1,error:g.error||"Failed to verify GitLab token."};let h=await v();if(h.find(a=>"gitlab"===a.type&&a.username===g.username&&a.serverUrl===d))return{success:!1,error:`A GitLab credential for ${g.username} on ${d} already exists.`};let i=l(),j=new Date().toISOString(),o=n(i);await c.setPassword(e,o,f);let p={id:i,type:"gitlab",username:g.username,serverUrl:d,createdAt:j,updatedAt:j,keytarAccount:o};return h.push(p),await u(h),{success:!0,credential:{id:p.id,type:"gitlab",username:p.username,serverUrl:p.serverUrl||d,createdAt:p.createdAt,updatedAt:p.updatedAt}}}async function D(a){let b=await v(),c=b.findIndex(b=>b.id===a);if(-1===c)return{success:!1,error:"Credential not found."};let d=b[c];b.splice(c,1),await u(b);let f=await j();return f&&await f.deletePassword(e,p(d)),{success:!0}}a.s(["createGitHubCredential",()=>B,"createGitLabCredential",()=>C,"deleteCredential",()=>D,"getAllCredentials",()=>w,"getCredentialById",()=>x,"getCredentialToken",()=>y])},39298,a=>{"use strict";var b=a.i(51817),c=a.i(15271),d=a.i(38642);a.s([],99637),a.i(99637),a.s(["0090143951524e8794de0cc16631ba5964247564ab",()=>d.getConfig,"00a74f384d2cda752e3b9ee67bd62fa7761af1ea26",()=>c.getHomeDirectory,"400175db6a8aa392c741ef001dd4c6842e81750581",()=>b.getSessionMetadata,"4042b849fecc5d306da18684aac3da1cac968aa3b3",()=>b.markSessionInitialized,"40500d0ffd95f3d580adc54c8f8f06ec7b87f9ec59",()=>b.deleteSessionInBackground,"4064c68dd0888c7ec080545be735e303ce561c1113",()=>b.listSessionBaseBranches,"407e2b8911d189ec058bf14d6c689ff1798cbd3253",()=>b.consumeSessionLaunchContext,"4091a66915376168100940311be5edf3ac23a04d1e",()=>b.getSessionDivergence,"409308512ce8225139218969f6a5b2387b5924b603",()=>c.listPathEntries,"40dce504caad80d27980c6b95ae88b6b77016455b7",()=>b.rebaseSessionOntoBase,"40efd79fc6df636d23f1699a9e2538a854fbbf1ad1",()=>b.mergeSessionToBase,"40fb598c6dcac5f8751f764c103c9babd05dccca94",()=>d.updateConfig,"6014aa8216963aec4853b0c1b3571ce34eabf4c257",()=>b.updateSessionBaseBranch,"606e3f43cac25abaf2d316dde6f382583302bab531",()=>b.writeSessionPromptFile,"7f15e4c824fe51cd9ffe5cc16ccd30c54e8ffb3fb7",()=>c.setTmuxSessionMouseMode,"7f6243b34e46ab390207d9a1c2cb42b1dbd5567506",()=>c.saveAttachments,"7f8444b3b99875207f964f39accc0122511e2a0004",()=>c.startTtydProcess,"7fda405a368ab4638a90c4c6973e223877d932f330",()=>c.setTmuxSessionStatusVisibility,"7fdb838a5116c39e133eaf16467bd91c2cfe712569",()=>c.getSessionTerminalSources],39298)},45581,a=>{a.v(b=>Promise.all(["server/chunks/ssr/[externals]_keytar_23140f5c._.js"].map(b=>a.l(b))).then(()=>b(83034)))},44264,a=>{a.v(a=>Promise.resolve().then(()=>a(33405)))},37706,a=>{a.v(b=>Promise.all(["server/chunks/ssr/[root-of-the-server]__edf0aa7a._.js"].map(b=>a.l(b))).then(()=>b(78775)))}];
3
3
 
4
4
  //# sourceMappingURL=%5Broot-of-the-server%5D__4c388861._.js.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../../node_modules/next/src/build/webpack/loaders/next-flight-loader/server-reference.ts","../../../../node_modules/next/src/build/webpack/loaders/next-flight-loader/action-validate.ts","../../../../src/lib/agent-api-credentials.ts","../../../../src/lib/credentials.ts","../../../../.next-internal/server/app/session/%5BsessionId%5D/page/actions.js%20%28server%20actions%20loader%29"],"sourcesContent":["/* eslint-disable import/no-extraneous-dependencies */\nexport { registerServerReference } from 'react-server-dom-webpack/server'\n","// This function ensures that all the exported values are valid server actions,\n// during the runtime. By definition all actions are required to be async\n// functions, but here we can only check that they are functions.\nexport function ensureServerEntryExports(actions: any[]) {\n for (let i = 0; i < actions.length; i++) {\n const action = actions[i]\n if (typeof action !== 'function') {\n throw new Error(\n `A \"use server\" file can only export async functions, found ${typeof action}.\\nRead more: https://nextjs.org/docs/messages/invalid-use-server-value`\n )\n }\n }\n}\n","import fs from 'fs/promises';\nimport os from 'os';\nimport path from 'path';\n\nconst SERVICE_NAME = 'viba-agent-api-credentials';\nconst CONFIGS_FILE_NAME = 'agent-api-configs.json';\nconst SUPPORTED_AGENT_APIS = ['codex'] as const;\n\nexport type AgentApiCredentialAgent = typeof SUPPORTED_AGENT_APIS[number];\n\nexport interface AgentApiCredential {\n agent: AgentApiCredentialAgent;\n apiProxy?: string;\n createdAt: string;\n updatedAt: string;\n}\n\nexport interface AgentApiCredentialSecret {\n agent: AgentApiCredentialAgent;\n apiKey: string;\n apiProxy?: string;\n}\n\ntype AgentApiCredentialMetadata = {\n agent: AgentApiCredentialAgent;\n apiProxy?: string;\n createdAt: string;\n updatedAt: string;\n keytarAccount?: string;\n};\n\ntype KeytarModule = {\n getPassword(service: string, account: string): Promise<string | null>;\n setPassword(service: string, account: string, password: string): Promise<void>;\n deletePassword(service: string, account: string): Promise<boolean>;\n};\n\nlet keytarPromise: Promise<KeytarModule | null> | null = null;\nlet keytarUnavailableReason: string | null = null;\nlet didLogKeytarWarning = false;\n\nfunction isSupportedAgentApi(value: string): value is AgentApiCredentialAgent {\n return SUPPORTED_AGENT_APIS.includes(value as AgentApiCredentialAgent);\n}\n\nfunction keytarUnavailableMessage(): string {\n if (keytarUnavailableReason) {\n return `Secure credential storage is unavailable: ${keytarUnavailableReason}`;\n }\n return 'Secure credential storage is unavailable in this runtime.';\n}\n\nasync function loadKeytar(): Promise<KeytarModule | null> {\n if (!keytarPromise) {\n keytarPromise = import('keytar')\n .then((module) => (module.default ?? module) as KeytarModule)\n .catch((error: unknown) => {\n keytarUnavailableReason = error instanceof Error ? error.message : String(error);\n if (!didLogKeytarWarning) {\n didLogKeytarWarning = true;\n console.warn(`[agent-api-credentials] ${keytarUnavailableMessage()}`);\n }\n return null;\n });\n }\n\n return keytarPromise;\n}\n\nasync function requireKeytar(): Promise<KeytarModule> {\n const keytar = await loadKeytar();\n if (!keytar) {\n throw new Error(keytarUnavailableMessage());\n }\n return keytar;\n}\n\nfunction getDefaultKeytarAccount(agent: AgentApiCredentialAgent): string {\n return `agent-api-${agent}`;\n}\n\nfunction getKeytarAccountForMetadata(metadata: AgentApiCredentialMetadata): string {\n return metadata.keytarAccount || getDefaultKeytarAccount(metadata.agent);\n}\n\nfunction normalizeApiProxy(apiProxy: string): string | undefined {\n const trimmed = apiProxy.trim();\n if (!trimmed) return undefined;\n\n try {\n // Validate and persist as-entered once it is a valid URL.\n new URL(trimmed);\n } catch {\n throw new Error('API proxy must be a valid URL.');\n }\n\n return trimmed;\n}\n\nfunction toAgentApiCredential(metadata: AgentApiCredentialMetadata): AgentApiCredential {\n return {\n agent: metadata.agent,\n apiProxy: metadata.apiProxy,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n };\n}\n\nfunction isAgentApiCredentialMetadata(value: unknown): value is AgentApiCredentialMetadata {\n if (!value || typeof value !== 'object') return false;\n\n const candidate = value as Record<string, unknown>;\n if (typeof candidate.agent !== 'string' || !isSupportedAgentApi(candidate.agent)) return false;\n if (typeof candidate.createdAt !== 'string') return false;\n if (typeof candidate.updatedAt !== 'string') return false;\n if (candidate.apiProxy !== undefined && typeof candidate.apiProxy !== 'string') return false;\n if (candidate.keytarAccount !== undefined && typeof candidate.keytarAccount !== 'string') return false;\n\n return true;\n}\n\nasync function getConfigsFilePath(): Promise<string> {\n const vibaDir = path.join(os.homedir(), '.viba');\n await fs.mkdir(vibaDir, { recursive: true });\n return path.join(vibaDir, CONFIGS_FILE_NAME);\n}\n\nasync function writeAgentApiCredentialMetadata(metadata: AgentApiCredentialMetadata[]): Promise<void> {\n const configsFilePath = await getConfigsFilePath();\n await fs.writeFile(configsFilePath, JSON.stringify(metadata, null, 2), 'utf-8');\n}\n\nasync function readAgentApiCredentialMetadata(): Promise<AgentApiCredentialMetadata[]> {\n const configsFilePath = await getConfigsFilePath();\n\n try {\n const content = await fs.readFile(configsFilePath, 'utf-8');\n const parsed = JSON.parse(content) as unknown;\n\n if (Array.isArray(parsed)) {\n return parsed.filter(isAgentApiCredentialMetadata);\n }\n\n if (!parsed || typeof parsed !== 'object') {\n return [];\n }\n\n // Legacy map shape: { codex: { ... }, ... }\n const entries = Object.entries(parsed as Record<string, unknown>);\n const migrated = entries\n .filter(([agent]) => isSupportedAgentApi(agent))\n .map(([agent, value]) => {\n if (!value || typeof value !== 'object') return null;\n const candidate = value as Record<string, unknown>;\n if (candidate.agent === undefined) {\n return {\n ...candidate,\n agent,\n } as unknown;\n }\n return candidate;\n })\n .filter(isAgentApiCredentialMetadata);\n\n if (migrated.length > 0) {\n await writeAgentApiCredentialMetadata(migrated);\n }\n\n return migrated;\n } catch (error) {\n if ((error as NodeJS.ErrnoException)?.code === 'ENOENT') {\n return [];\n }\n\n console.error('Failed to parse agent API credential metadata:', error);\n return [];\n }\n}\n\nexport async function getAllAgentApiCredentials(): Promise<AgentApiCredential[]> {\n const metadata = await readAgentApiCredentialMetadata();\n return metadata\n .map(toAgentApiCredential)\n .sort((a, b) => b.updatedAt.localeCompare(a.updatedAt));\n}\n\nexport async function createOrUpdateAgentApiCredential(\n agent: AgentApiCredentialAgent,\n apiKey: string,\n apiProxy: string,\n): Promise<{ success: boolean; credential?: AgentApiCredential; error?: string }> {\n if (!isSupportedAgentApi(agent)) {\n return { success: false, error: `Unsupported agent: ${agent}` };\n }\n\n const trimmedApiKey = apiKey.trim();\n if (!trimmedApiKey) {\n return { success: false, error: 'API key is required.' };\n }\n\n let normalizedApiProxy: string | undefined;\n try {\n normalizedApiProxy = normalizeApiProxy(apiProxy);\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n let keytar: KeytarModule;\n try {\n keytar = await requireKeytar();\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n const metadata = await readAgentApiCredentialMetadata();\n const now = new Date().toISOString();\n const index = metadata.findIndex((credential) => credential.agent === agent);\n const keytarAccount = index >= 0\n ? getKeytarAccountForMetadata(metadata[index])\n : getDefaultKeytarAccount(agent);\n\n await keytar.setPassword(SERVICE_NAME, keytarAccount, trimmedApiKey);\n\n if (index >= 0) {\n const existing = metadata[index];\n metadata[index] = {\n ...existing,\n apiProxy: normalizedApiProxy,\n updatedAt: now,\n keytarAccount,\n };\n } else {\n metadata.push({\n agent,\n apiProxy: normalizedApiProxy,\n createdAt: now,\n updatedAt: now,\n keytarAccount,\n });\n }\n\n await writeAgentApiCredentialMetadata(metadata);\n\n const saved = metadata.find((credential) => credential.agent === agent);\n if (!saved) {\n return { success: false, error: 'Failed to persist agent API credential.' };\n }\n\n return { success: true, credential: toAgentApiCredential(saved) };\n}\n\nexport async function deleteAgentApiCredential(\n agent: AgentApiCredentialAgent,\n): Promise<{ success: boolean; error?: string }> {\n if (!isSupportedAgentApi(agent)) {\n return { success: false, error: `Unsupported agent: ${agent}` };\n }\n\n const metadata = await readAgentApiCredentialMetadata();\n const index = metadata.findIndex((credential) => credential.agent === agent);\n if (index === -1) {\n return { success: false, error: 'Agent API credential not found.' };\n }\n\n const [removed] = metadata.splice(index, 1);\n await writeAgentApiCredentialMetadata(metadata);\n\n const keytar = await loadKeytar();\n if (keytar) {\n await keytar.deletePassword(SERVICE_NAME, getKeytarAccountForMetadata(removed));\n }\n\n return { success: true };\n}\n\nexport async function getAgentApiCredentialSecret(\n agent: AgentApiCredentialAgent,\n): Promise<AgentApiCredentialSecret | null> {\n if (!isSupportedAgentApi(agent)) {\n return null;\n }\n\n const metadata = await readAgentApiCredentialMetadata();\n const found = metadata.find((credential) => credential.agent === agent);\n if (!found) {\n return null;\n }\n\n const keytar = await loadKeytar();\n if (!keytar) {\n return null;\n }\n\n const apiKey = await keytar.getPassword(SERVICE_NAME, getKeytarAccountForMetadata(found));\n if (!apiKey) {\n return null;\n }\n\n return {\n agent: found.agent,\n apiKey,\n apiProxy: found.apiProxy,\n };\n}\n","import fs from 'fs/promises';\nimport os from 'os';\nimport path from 'path';\n\nconst SERVICE_NAME = 'viba-git-credentials';\nconst CREDENTIALS_FILE_NAME = 'credentials.json';\n\nexport type CredentialType = 'github' | 'gitlab';\n\nexport interface BaseCredential {\n id: string;\n type: CredentialType;\n username: string;\n createdAt: string;\n updatedAt: string;\n}\n\nexport interface GitHubCredential extends BaseCredential {\n type: 'github';\n}\n\nexport interface GitLabCredential extends BaseCredential {\n type: 'gitlab';\n serverUrl: string;\n}\n\nexport type Credential = GitHubCredential | GitLabCredential;\n\ntype CredentialMetadata = {\n id: string;\n type: CredentialType;\n username: string;\n serverUrl?: string;\n createdAt: string;\n updatedAt: string;\n keytarAccount?: string;\n};\n\ntype LegacyCredentialMetadata = {\n type: CredentialType;\n username: string;\n serverUrl?: string;\n createdAt: string;\n updatedAt: string;\n};\n\ntype KeytarModule = {\n getPassword(service: string, account: string): Promise<string | null>;\n setPassword(service: string, account: string, password: string): Promise<void>;\n deletePassword(service: string, account: string): Promise<boolean>;\n};\n\nlet keytarPromise: Promise<KeytarModule | null> | null = null;\nlet keytarUnavailableReason: string | null = null;\nlet didLogKeytarWarning = false;\n\nfunction keytarUnavailableMessage(): string {\n if (keytarUnavailableReason) {\n return `Secure credential storage is unavailable: ${keytarUnavailableReason}`;\n }\n return 'Secure credential storage is unavailable in this runtime.';\n}\n\nasync function loadKeytar(): Promise<KeytarModule | null> {\n if (!keytarPromise) {\n keytarPromise = import('keytar')\n .then((module) => (module.default ?? module) as KeytarModule)\n .catch((error: unknown) => {\n keytarUnavailableReason = error instanceof Error ? error.message : String(error);\n if (!didLogKeytarWarning) {\n didLogKeytarWarning = true;\n console.warn(`[credentials] ${keytarUnavailableMessage()}`);\n }\n return null;\n });\n }\n\n return keytarPromise;\n}\n\nasync function requireKeytar(): Promise<KeytarModule> {\n const keytar = await loadKeytar();\n if (!keytar) {\n throw new Error(keytarUnavailableMessage());\n }\n return keytar;\n}\n\nfunction generateId(): string {\n return `${Date.now()}-${Math.random().toString(36).slice(2, 9)}`;\n}\n\nfunction normalizeGitLabServerUrl(serverUrl: string): string {\n return serverUrl.trim().replace(/\\/$/, '');\n}\n\nfunction getDefaultKeytarAccount(id: string): string {\n return `credential-${id}`;\n}\n\nfunction getLegacyKeytarAccount(type: CredentialType): string {\n return `credential-${type}`;\n}\n\nfunction getKeytarAccountForMetadata(metadata: CredentialMetadata): string {\n return metadata.keytarAccount || getDefaultKeytarAccount(metadata.id);\n}\n\nfunction toCredential(metadata: CredentialMetadata): Credential {\n if (metadata.type === 'gitlab') {\n return {\n id: metadata.id,\n type: 'gitlab',\n username: metadata.username,\n serverUrl: metadata.serverUrl || 'https://gitlab.com',\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n };\n }\n\n return {\n id: metadata.id,\n type: 'github',\n username: metadata.username,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n };\n}\n\nasync function getCredentialsFilePath(): Promise<string> {\n const vibaDir = path.join(os.homedir(), '.viba');\n await fs.mkdir(vibaDir, { recursive: true });\n return path.join(vibaDir, CREDENTIALS_FILE_NAME);\n}\n\nfunction isLegacyCredentialMetadata(value: unknown, expectedType: CredentialType): value is LegacyCredentialMetadata {\n if (!value || typeof value !== 'object') return false;\n\n const candidate = value as Record<string, unknown>;\n if (candidate.type !== expectedType) return false;\n if (typeof candidate.username !== 'string') return false;\n if (typeof candidate.createdAt !== 'string') return false;\n if (typeof candidate.updatedAt !== 'string') return false;\n\n if (expectedType === 'gitlab') {\n return typeof candidate.serverUrl === 'string';\n }\n\n return true;\n}\n\nfunction isCredentialMetadata(value: unknown): value is CredentialMetadata {\n if (!value || typeof value !== 'object') return false;\n\n const candidate = value as Record<string, unknown>;\n if (typeof candidate.id !== 'string' || !candidate.id.trim()) return false;\n if (candidate.type !== 'github' && candidate.type !== 'gitlab') return false;\n if (typeof candidate.username !== 'string') return false;\n if (typeof candidate.createdAt !== 'string') return false;\n if (typeof candidate.updatedAt !== 'string') return false;\n if (candidate.keytarAccount !== undefined && typeof candidate.keytarAccount !== 'string') return false;\n\n if (candidate.type === 'gitlab') {\n return typeof candidate.serverUrl === 'string';\n }\n\n return true;\n}\n\nasync function writeCredentialsMetadata(metadata: CredentialMetadata[]): Promise<void> {\n const credentialsFilePath = await getCredentialsFilePath();\n await fs.writeFile(credentialsFilePath, JSON.stringify(metadata, null, 2), 'utf-8');\n}\n\nasync function readCredentialsMetadata(): Promise<CredentialMetadata[]> {\n const credentialsFilePath = await getCredentialsFilePath();\n\n try {\n const content = await fs.readFile(credentialsFilePath, 'utf-8');\n const parsed = JSON.parse(content) as unknown;\n\n if (Array.isArray(parsed)) {\n return parsed.filter(isCredentialMetadata);\n }\n\n if (!parsed || typeof parsed !== 'object') {\n return [];\n }\n\n const legacyMapped = parsed as Record<string, unknown>;\n const migrated: CredentialMetadata[] = [];\n\n if (isLegacyCredentialMetadata(legacyMapped.github, 'github')) {\n const metadata = legacyMapped.github;\n migrated.push({\n id: generateId(),\n type: 'github',\n username: metadata.username,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n keytarAccount: getLegacyKeytarAccount('github'),\n });\n }\n\n if (isLegacyCredentialMetadata(legacyMapped.gitlab, 'gitlab')) {\n const metadata = legacyMapped.gitlab;\n migrated.push({\n id: generateId(),\n type: 'gitlab',\n username: metadata.username,\n serverUrl: metadata.serverUrl,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n keytarAccount: getLegacyKeytarAccount('gitlab'),\n });\n }\n\n if (migrated.length > 0) {\n await writeCredentialsMetadata(migrated);\n }\n\n return migrated;\n } catch (error) {\n if ((error as NodeJS.ErrnoException)?.code === 'ENOENT') {\n return [];\n }\n\n console.error('Failed to parse credentials metadata:', error);\n return [];\n }\n}\n\nexport async function getAllCredentials(): Promise<Credential[]> {\n const metadata = await readCredentialsMetadata();\n\n return metadata\n .map(toCredential)\n .sort((a, b) => b.updatedAt.localeCompare(a.updatedAt));\n}\n\nexport async function getCredentialById(id: string): Promise<Credential | null> {\n const metadata = await readCredentialsMetadata();\n const found = metadata.find((credential) => credential.id === id);\n return found ? toCredential(found) : null;\n}\n\nexport async function getCredentialToken(id: string): Promise<string | null> {\n const metadata = await readCredentialsMetadata();\n const found = metadata.find((credential) => credential.id === id);\n if (!found) {\n return null;\n }\n\n const keytar = await loadKeytar();\n if (!keytar) {\n return null;\n }\n\n return keytar.getPassword(SERVICE_NAME, getKeytarAccountForMetadata(found));\n}\n\nasync function verifyGitHubToken(token: string): Promise<{ valid: boolean; username?: string; error?: string }> {\n try {\n const response = await fetch('https://api.github.com/user', {\n headers: {\n Authorization: `Bearer ${token}`,\n Accept: 'application/vnd.github+json',\n 'X-GitHub-Api-Version': '2022-11-28',\n },\n });\n\n if (!response.ok) {\n if (response.status === 401) {\n return { valid: false, error: 'Invalid or expired GitHub token.' };\n }\n return { valid: false, error: `GitHub API returned ${response.status}.` };\n }\n\n const data = await response.json();\n const username = typeof data?.login === 'string' ? data.login : null;\n if (!username) {\n return { valid: false, error: 'GitHub API response did not include a username.' };\n }\n\n return { valid: true, username };\n } catch (error) {\n return { valid: false, error: `Failed to verify GitHub token: ${(error as Error).message}` };\n }\n}\n\nasync function verifyGitLabToken(serverUrl: string, token: string): Promise<{ valid: boolean; username?: string; error?: string }> {\n try {\n const normalizedUrl = normalizeGitLabServerUrl(serverUrl);\n const response = await fetch(`${normalizedUrl}/api/v4/user`, {\n headers: {\n 'PRIVATE-TOKEN': token,\n },\n });\n\n if (!response.ok) {\n if (response.status === 401) {\n return { valid: false, error: 'Invalid or expired GitLab token.' };\n }\n return { valid: false, error: `GitLab API returned ${response.status}.` };\n }\n\n const data = await response.json();\n const username = typeof data?.username === 'string' ? data.username : null;\n if (!username) {\n return { valid: false, error: 'GitLab API response did not include a username.' };\n }\n\n return { valid: true, username };\n } catch (error) {\n return { valid: false, error: `Failed to verify GitLab token: ${(error as Error).message}` };\n }\n}\n\nexport async function createGitHubCredential(token: string): Promise<{ success: boolean; credential?: GitHubCredential; error?: string }> {\n const trimmedToken = token.trim();\n if (!trimmedToken) {\n return { success: false, error: 'GitHub token is required.' };\n }\n\n let keytar: KeytarModule;\n try {\n keytar = await requireKeytar();\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n const verification = await verifyGitHubToken(trimmedToken);\n if (!verification.valid || !verification.username) {\n return { success: false, error: verification.error || 'Failed to verify GitHub token.' };\n }\n\n const metadata = await readCredentialsMetadata();\n const duplicate = metadata.find((credential) => (\n credential.type === 'github'\n && credential.username === verification.username\n ));\n\n if (duplicate) {\n return { success: false, error: `A GitHub credential for ${verification.username} already exists.` };\n }\n\n const id = generateId();\n const now = new Date().toISOString();\n const keytarAccount = getDefaultKeytarAccount(id);\n\n await keytar.setPassword(SERVICE_NAME, keytarAccount, trimmedToken);\n\n const created: CredentialMetadata = {\n id,\n type: 'github',\n username: verification.username,\n createdAt: now,\n updatedAt: now,\n keytarAccount,\n };\n\n metadata.push(created);\n await writeCredentialsMetadata(metadata);\n\n return {\n success: true,\n credential: {\n id: created.id,\n type: 'github',\n username: created.username,\n createdAt: created.createdAt,\n updatedAt: created.updatedAt,\n },\n };\n}\n\nexport async function createGitLabCredential(\n serverUrl: string,\n token: string,\n): Promise<{ success: boolean; credential?: GitLabCredential; error?: string }> {\n const normalizedServerUrl = normalizeGitLabServerUrl(serverUrl);\n const trimmedToken = token.trim();\n\n if (!normalizedServerUrl) {\n return { success: false, error: 'GitLab server URL is required.' };\n }\n\n try {\n new URL(normalizedServerUrl);\n } catch {\n return { success: false, error: 'GitLab server URL must be a valid URL.' };\n }\n\n if (!trimmedToken) {\n return { success: false, error: 'GitLab token is required.' };\n }\n\n let keytar: KeytarModule;\n try {\n keytar = await requireKeytar();\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n const verification = await verifyGitLabToken(normalizedServerUrl, trimmedToken);\n if (!verification.valid || !verification.username) {\n return { success: false, error: verification.error || 'Failed to verify GitLab token.' };\n }\n\n const metadata = await readCredentialsMetadata();\n const duplicate = metadata.find((credential) => (\n credential.type === 'gitlab'\n && credential.username === verification.username\n && credential.serverUrl === normalizedServerUrl\n ));\n\n if (duplicate) {\n return {\n success: false,\n error: `A GitLab credential for ${verification.username} on ${normalizedServerUrl} already exists.`,\n };\n }\n\n const id = generateId();\n const now = new Date().toISOString();\n const keytarAccount = getDefaultKeytarAccount(id);\n\n await keytar.setPassword(SERVICE_NAME, keytarAccount, trimmedToken);\n\n const created: CredentialMetadata = {\n id,\n type: 'gitlab',\n username: verification.username,\n serverUrl: normalizedServerUrl,\n createdAt: now,\n updatedAt: now,\n keytarAccount,\n };\n\n metadata.push(created);\n await writeCredentialsMetadata(metadata);\n\n return {\n success: true,\n credential: {\n id: created.id,\n type: 'gitlab',\n username: created.username,\n serverUrl: created.serverUrl || normalizedServerUrl,\n createdAt: created.createdAt,\n updatedAt: created.updatedAt,\n },\n };\n}\n\nexport async function deleteCredential(id: string): Promise<{ success: boolean; error?: string }> {\n const metadata = await readCredentialsMetadata();\n const index = metadata.findIndex((credential) => credential.id === id);\n\n if (index === -1) {\n return { success: false, error: 'Credential not found.' };\n }\n\n const credential = metadata[index];\n metadata.splice(index, 1);\n await writeCredentialsMetadata(metadata);\n\n const keytar = await loadKeytar();\n if (keytar) {\n await keytar.deletePassword(SERVICE_NAME, getKeytarAccountForMetadata(credential));\n }\n\n return { success: true };\n}\n","export {deleteSessionInBackground as '40d295c5b016ec9e37ff307fcef67484b5eed5616b'} from 'ACTIONS_MODULE0'\nexport {getSessionDivergence as '4027839eab56730ea8a83c377963205f2c56693ebd'} from 'ACTIONS_MODULE0'\nexport {listSessionBaseBranches as '406f15941bd4e4ec6f5d01de09143d127560eac086'} from 'ACTIONS_MODULE0'\nexport {mergeSessionToBase as '40be1901b8147d92cfa7bcd1598d64346d58171f73'} from 'ACTIONS_MODULE0'\nexport {rebaseSessionOntoBase as '40fec0767bcfcf8e311efe9ff9591ce0d5725cc86c'} from 'ACTIONS_MODULE0'\nexport {updateSessionBaseBranch as '601227d3a707ca786a0861277c39ba99336f401b90'} from 'ACTIONS_MODULE0'\nexport {writeSessionPromptFile as '6077b32acdb08a39803adab020f1b2888cdccba654'} from 'ACTIONS_MODULE0'\nexport {setTmuxSessionMouseMode as '7f713f073b27ef9774eb20e78f51c6c8301bdfe40d'} from 'ACTIONS_MODULE1'\nexport {setTmuxSessionStatusVisibility as '7f66f1946d40a6892f35eeb4bf4695ed1e2e2d204d'} from 'ACTIONS_MODULE1'\nexport {getConfig as '0090ca1b58238fe3d84576aa7598f62fec82e1c39f'} from 'ACTIONS_MODULE2'\nexport {updateConfig as '402dc43f0f57cd2d5cca381b7ec49b2f2f08d22cad'} from 'ACTIONS_MODULE2'\nexport {getHomeDirectory as '0066b7b106c642ef4b72dce222493eb03eda405f51'} from 'ACTIONS_MODULE1'\nexport {listPathEntries as '40c6d25f0a1d12624264cfab1df7b65529d6a1954e'} from 'ACTIONS_MODULE1'\nexport {saveAttachments as '7fc04de30f1cf912afb0c21ae821e159cb23a52b95'} from 'ACTIONS_MODULE1'\nexport {consumeSessionLaunchContext as '40a4f3aeed2db4b95aaec16dce14539ad437c661d0'} from 'ACTIONS_MODULE0'\nexport {getSessionMetadata as '400af4edfd9d2b345c5e6149e415a1071283a46ca4'} from 'ACTIONS_MODULE0'\nexport {markSessionInitialized as '4011f665d683ed9dea7df1dcf74552a1aca0148549'} from 'ACTIONS_MODULE0'\nexport {getSessionTerminalSources as '7f08cd1339dcf1b570a244c63328c728813a7607d2'} from 'ACTIONS_MODULE1'\nexport {startTtydProcess as '7f9dc57d041c4edb322ba7d1d13eb79fa659814239'} from 'ACTIONS_MODULE1'\n"],"names":["registerServerReference","ensureServerEntryExports","actions","i","length","action","Error"],"mappings":"mTAAoD,OAAA,cAAA,CAAA,EAAA,aAAA,oCAC3CA,0BAAAA,qCAAAA,EAAAA,uBAAuB,YAAQ,CAAA,CAAA,IAAA,iCCEjC,SAASC,EAAyBC,CAAc,EACrD,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAQE,MAAM,CAAED,IAAK,CACvC,IAAME,EAASH,CAAO,CAACC,EAAE,CACzB,GAAI,AAAkB,YAAY,OAAvBE,EACT,MAAM,OAAA,cAEL,CAFK,AAAIC,MACR,CAAC,2DAA2D,EAAE,OAAOD,EAAO;AAAA,oEAAuE,CAAC,EADhJ,oBAAA,OAAA,mBAAA,gBAAA,CAEN,EAEJ,CACF,0EATgBJ,2BAAAA,qCAAAA,6BCHhB,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,6BAEf,EAAuB,CAAC,QAAQ,CA+BlC,EAAqD,KACrD,EAAyC,KACzC,GAAsB,EAE1B,SAAS,EAAoB,CAAa,EACxC,OAAO,EAAqB,QAAQ,CAAC,EACvC,CAEA,SAAS,WACP,AAAI,EACK,CAAC,sBADmB,oBACuB,EAAE,EAAA,CAAyB,CAExE,2DACT,CAEA,eAAe,IAcb,OAbI,AAAC,IACH,EAAgB,EAAA,CAAA,CAAA,KADE,EAEf,IAAI,CAAC,AAAC,GAAY,EAAO,OAAO,EAAI,GACpC,KAAK,CAAC,AAAC,IACN,EAA0B,aAAiB,MAAQ,EAAM,OAAO,CAAG,OAAO,GACrE,IACH,EAAsB,GACtB,QAAQ,IAFgB,AAEZ,CAAC,CAAC,wBAAwB,EAAE,IAAA,CAA4B,GAE/D,MACT,EAGG,CACT,CAEA,eAAe,IACb,IAAM,EAAS,MAAM,IACrB,GAAI,CAAC,EACH,MADW,AACL,AAAI,MAAM,KAElB,OAAO,CACT,CAEA,SAAS,EAAwB,CAA8B,EAC7D,MAAO,CAAC,UAAU,EAAE,EAAA,CAAO,AAC7B,CAEA,SAAS,EAA4B,CAAoC,EACvE,OAAO,EAAS,aAAa,EAAI,EAAwB,EAAS,KAAK,CACzE,CAgBA,SAAS,EAAqB,CAAoC,EAChE,MAAO,CACL,MAAO,EAAS,KAAK,CACrB,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,AAC/B,CACF,CAEA,SAAS,EAA6B,CAAc,QAClD,CAAI,CAAC,GAA0B,UAAjB,AAA2B,OAApB,AAA2B,GAGjB,UAA3B,OAAO,EAAU,KAAK,GAAiB,CAAC,EAAoB,EAAU,KAAK,GAAG,AAC/C,OADsD,GACrF,AAAyC,OAAlC,AAAyC,AAFlC,EAEG,SAAS,EAC1B,AAA+B,UAAU,OAAlC,AAAyC,EAA/B,SAAS,GAC1B,AAAuB,WAAb,QAAQ,EAAgD,UAA9B,OAAO,EAAU,QAAQ,AAAK,GAAU,MAChD,CADuD,GACnF,EAAU,aAAa,EAAqD,UAAnC,OAAO,EAAU,aAAa,AAAK,CAGlF,CAEA,CAL4F,OAAO,OAKpF,IACb,IAAM,EAAU,EAAA,OAAI,CAAC,IAAI,CAAC,EAAA,OAAE,CAAC,OAAO,GAAI,SAExC,OADA,MAAM,EAAA,OAAE,CAAC,KAAK,CAAC,EAAS,CAAE,WAAW,CAAK,GACnC,EAAA,OAAI,CAAC,IAAI,CAAC,EAvHO,OAuHE,kBAC5B,CAEA,eAAe,EAAgC,CAAsC,EACnF,IAAM,EAAkB,MAAM,GAC9B,OAAM,EAAA,OAAE,CAAC,SAAS,CAAC,EAAiB,KAAK,SAAS,CAAC,EAAU,KAAM,GAAI,QACzE,CAEA,eAAe,IACb,IAAM,EAAkB,MAAM,IAE9B,GAAI,CACF,IAAM,EAAU,MAAM,EAAA,OAAE,CAAC,QAAQ,CAAC,EAAiB,SAC7C,EAAS,KAAK,KAAK,CAAC,GAE1B,GAAI,MAAM,OAAO,CAAC,GAChB,MADyB,CAClB,EAAO,MAAM,CAAC,GAGvB,GAAI,CAAC,GAA4B,UAAlB,AAA4B,OAArB,EACpB,MAAO,EAAE,CAKX,IAAM,EAAW,AADD,OAAO,OAAO,CAAC,GAE5B,MAAM,CAAC,CAAC,CAAC,EAAM,GAAK,EAAoB,IACxC,GAAG,CAAC,CAAC,CAAC,EAAO,EAAM,GAClB,AAAI,AAAC,GAA0B,UAAjB,AAA2B,OAApB,OAEG,IAApB,EAAU,KAAK,AAAgB,CAC1B,CAFS,IAGd,GAAG,IACH,CACF,EALgB,EAD8B,AAIhC,MAMjB,MAAM,CAAC,GAMV,OAJI,EAAS,MAAM,CAAG,GACpB,AADuB,MACjB,EAAgC,GAGjC,CACT,CAAE,MAAO,EAAO,CACd,GAAK,GAAiC,OAAS,SAC7C,CADuD,KAChD,EAAE,CAIX,OADA,QAAQ,KAAK,CAAC,iDAAkD,GACzD,EAAE,AACX,CACF,CAEO,eAAe,IAEpB,MAAO,CADU,MAAM,GAAA,EAEpB,GAAG,CAAC,GACJ,IAAI,CAAC,CAAC,EAAG,IAAM,EAAE,SAAS,CAAC,aAAa,CAAC,EAAE,SAAS,EACzD,CAEO,eAAe,EACpB,CAA8B,CAC9B,CAAc,CACd,CAAgB,MAWZ,EAOA,EAhBJ,GAAI,CAAC,EAAoB,GACvB,KAD+B,CACxB,CAAE,SAAS,EAAO,MAAO,CAAC,mBAAmB,EAAE,EAAA,CAAO,AAAC,EAGhE,IAAM,EAAgB,EAAO,IAAI,GACjC,GAAI,CAAC,EACH,MAAO,CAAE,MADS,GACA,EAAO,MAAO,sBAAuB,EAIzD,GAAI,CACF,EArHJ,AAqHyB,SArHhB,AAAkB,CAAgB,EACzC,IAAM,EAAU,EAAS,IAAI,GAC7B,GAAK,CAAD,EAEJ,GAAI,CAEF,EAJY,EAIR,IAAI,CAJW,CAKrB,CAAE,KAAM,CACN,MAAU,AAAJ,MAAU,iCAClB,CAEA,OAAO,EACT,EAyG2C,EACzC,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAQ,AAAD,CAC1D,CAGA,GAAI,CACF,EAAS,MAAM,GACjB,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAO,AAAC,CAC3D,CAEA,IAAM,EAAW,MAAM,IACjB,EAAM,IAAI,OAAO,WAAW,GAC5B,EAAQ,EAAS,SAAS,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,GAChE,EAAgB,GAAS,EAC3B,EAA4B,CAAQ,CAAC,EAAM,EAC3C,EAAwB,GAI5B,GAFA,MAAM,EAAO,WAAW,CAAC,EAAc,EAAe,GAElD,GAAS,EAAG,CACd,IAAM,EAAW,CAAQ,CAAC,EAAM,CAChC,CAAQ,CAAC,EAAM,CAAG,CAChB,GAAG,CAAQ,CACX,SAAU,EACV,UAAW,EACX,eACF,CACF,MACE,CADK,CACI,IAAI,CAAC,OACZ,EACA,SAAU,EACV,UAAW,EACX,UAAW,gBACX,CACF,EAGF,OAAM,EAAgC,GAEtC,IAAM,EAAQ,EAAS,IAAI,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,UACjE,AAAK,EAIE,CAAE,CAJL,GAAQ,KAIM,EAAM,WAAY,EAAqB,EAAO,EAHvD,CAAE,SAAS,EAAO,MAAO,yCAA0C,CAI9E,CAEO,eAAe,EACpB,CAA8B,EAE9B,GAAI,CAAC,EAAoB,GACvB,KAD+B,CACxB,CAAE,QAAS,GAAO,MAAO,CAAC,mBAAmB,EAAE,EAAA,CAAO,AAAC,EAGhE,IAAM,EAAW,MAAM,IACjB,EAAQ,EAAS,SAAS,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,GACtE,GAAc,CAAC,GAAG,CAAd,EACF,MAAO,CAAE,SAAS,EAAO,MAAO,iCAAkC,EAGpE,GAAM,CAAC,EAAQ,CAAG,EAAS,MAAM,CAAC,EAAO,EACzC,OAAM,EAAgC,GAEtC,IAAM,EAAS,MAAM,IAKrB,OAJI,GACF,KADU,CACJ,EAAO,cAAc,CAAC,EAAc,EAA4B,IAGjE,CAAE,SAAS,CAAK,CACzB,CAEO,eAAe,EACpB,CAA8B,EAE9B,GAAI,CAAC,EAAoB,GACvB,KAD+B,EACxB,KAIT,IAAM,EAAQ,CADG,MAAM,GAAA,EACA,IAAI,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,GACjE,GAAI,CAAC,EACH,KADU,EACH,KAGT,IAAM,EAAS,MAAM,IACrB,GAAI,CAAC,EACH,MADW,CACJ,KAGT,IAAM,EAAS,MAAM,EAAO,WAAW,CAAC,EAAc,EAA4B,WAClF,AAAK,EAIE,CACL,CALE,IAAS,CAKJ,EAAM,KAAK,QAClB,EACA,SAAU,EAAM,QAAQ,AAC1B,EAPS,IAQX,gLC/SA,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,uBAgDjB,EAAqD,KACrD,EAAyC,KACzC,EAAsB,GAE1B,SAAS,WACH,AAAJ,EACS,CAAC,sBADmB,oBACuB,EAAE,EAAA,CAAyB,CAExE,2DACT,CAEA,eAAe,IAcb,OAbI,AAAC,GACH,GAAgB,EAAA,CAAA,CAAA,KADE,EAEf,IAAI,CAAC,AAAC,GAAY,EAAO,OAAO,EAAI,GACpC,KAAK,CAAC,AAAC,IACN,EAA0B,aAAiB,MAAQ,EAAM,OAAO,CAAG,OAAO,GACrE,IACH,GAAsB,EACtB,QAAQ,IAAI,AAFY,CAEX,CAAC,cAAc,EAAE,IAAA,CAA4B,GAErD,MACT,EAGG,CACT,CAEA,eAAe,IACb,IAAM,EAAS,MAAM,IACrB,GAAI,CAAC,EACH,MADW,AACL,AAAI,MAAM,KAElB,OAAO,CACT,CAEA,SAAS,IACP,MAAO,CAAA,EAAG,KAAK,GAAG,GAAG,CAAC,EAAE,KAAK,MAAM,GAAG,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAG,GAAA,CAAI,AAClE,CAEA,SAAS,EAAyB,CAAiB,EACjD,OAAO,EAAU,IAAI,GAAG,OAAO,CAAC,MAAO,GACzC,CAEA,SAAS,EAAwB,CAAU,EACzC,MAAO,CAAC,WAAW,EAAE,EAAA,CAAI,AAC3B,CAEA,SAAS,EAAuB,CAAoB,EAClD,MAAO,CAAC,WAAW,EAAE,EAAA,CAAM,AAC7B,CAEA,SAAS,EAA4B,CAA4B,EAC/D,OAAO,EAAS,aAAa,EAAI,EAAwB,EAAS,EAAE,CACtE,CAEA,SAAS,EAAa,CAA4B,QAChD,AAAsB,UAAU,CAA5B,EAAS,IAAI,CACR,CACL,GAAI,EAAS,EAAE,CACf,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,EAAI,qBACjC,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,AAC/B,EAGK,CACL,GAAI,EAAS,EAAE,CACf,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,AAC/B,CACF,CAEA,eAAe,IACb,IAAM,EAAU,EAAA,OAAI,CAAC,IAAI,CAAC,EAAA,OAAE,CAAC,OAAO,GAAI,SAExC,OADA,MAAM,EAAA,OAAE,CAAC,KAAK,CAAC,EAAS,CAAE,WAAW,CAAK,GACnC,EAAA,OAAI,CAAC,IAAI,CAAC,EA/HW,OA+HF,YAC5B,CAEA,SAAS,EAA2B,CAAc,CAAE,CAA4B,QAC9E,CAAI,CAAC,GAA0B,UAAjB,AAA2B,OAApB,AAA2B,GAG5C,EAAU,IAAI,GAAK,GACW,UAA9B,AAAwC,CADP,MAC1B,AAAwC,CADP,CACvB,QAAQ,EACM,AAA/B,UAAyC,OAAlC,AAAyC,EAA/B,SAAS,EACK,UAA/B,AAAyC,OAAlC,AAAyC,EAA/B,SAAS,GAET,UAAU,CAA3B,GACoC,UAA/B,OAAO,AAPE,EAOQ,SAAS,CAIrC,CAEA,SAAS,EAAqB,CAAc,QAC1C,CAAI,CAAC,GAA0B,UAAU,AAA3B,OAAO,AAA2B,GAGpB,UAAxB,OAAO,EAAU,EAAE,GAAiB,CAAC,EAAU,EAAE,CAAC,IAAI,IAAI,CACvC,MAD8C,KACjE,EAAU,IAAI,EAAoC,WAAnB,EAAU,IAAI,AAAK,GAAU,AAC9B,OADqC,GACnE,AAAwC,OAAjC,AAAwC,EAA9B,QAAQ,EACM,UAA/B,AAAyC,OAAlC,AAAyC,EAA/B,SAAS,EAC1B,AAA+B,UAAU,OAAlC,AAAyC,EAA/B,SAAS,QACE,IAA5B,EAAU,aAAa,EAAqD,UAAnC,OAAO,EAAU,aAAa,AAAK,GAAU,CAEnE,MAF0E,IAEhE,CAA7B,EAAU,IAAI,EACT,AAA+B,iBAAxB,AATE,EASQ,SAAS,CAIrC,CAEA,eAAe,EAAyB,CAA8B,EACpE,IAAM,EAAsB,MAAM,GAClC,OAAM,EAAA,OAAE,CAAC,SAAS,CAAC,EAAqB,KAAK,SAAS,CAAC,EAAU,KAAM,GAAI,QAC7E,CAEA,eAAe,IACb,IAAM,EAAsB,MAAM,IAElC,GAAI,CACF,IAAM,EAAU,MAAM,EAAA,OAAE,CAAC,QAAQ,CAAC,EAAqB,SACjD,EAAS,KAAK,KAAK,CAAC,GAE1B,GAAI,MAAM,OAAO,CAAC,GAChB,MADyB,CAClB,EAAO,MAAM,CAAC,GAGvB,GAAI,CAAC,GAA4B,UAAlB,AAA4B,OAArB,EACpB,MAAO,EAAE,CAIX,IAAM,EAAiC,EAAE,CAEzC,GAAI,EAA2B,EAAa,MAAM,CAAE,UAAW,CAC7D,IAAM,EAAW,EAAa,MAAM,CACpC,EAAS,IAAI,CAAC,CACZ,GAAI,IACJ,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,CAC7B,cAAe,EAAuB,SACxC,EACF,CAEA,GAAI,EAA2B,EAAa,MAAM,CAAE,UAAW,CAC7D,IAAM,EAAW,AAhBE,EAgBW,MAAM,CACpC,EAAS,IAAI,CAAC,CACZ,GAAI,IACJ,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,CAC7B,cAAe,EAAuB,SACxC,EACF,CAMA,OAJI,EAAS,MAAM,CAAG,GAAG,AACvB,MAAM,EAAyB,GAG1B,CACT,CAAE,MAAO,EAAO,CACd,GAAK,GAAiC,OAAS,SAC7C,CADuD,KAChD,EAAE,CAIX,OADA,QAAQ,KAAK,CAAC,wCAAyC,GAChD,EAAE,AACX,CACF,CAEO,eAAe,IAGpB,MAAO,CAFU,MAAM,GAAA,EAGpB,GAAG,CAAC,GACJ,IAAI,CAAC,CAAC,EAAG,IAAM,EAAE,SAAS,CAAC,aAAa,CAAC,EAAE,SAAS,EACzD,CAEO,eAAe,EAAkB,CAAU,EAEhD,IAAM,EAAQ,CADG,MAAM,GAAA,EACA,IAAI,CAAE,AAAD,GAAgB,EAAW,EAAE,GAAK,GAC9D,OAAO,EAAQ,EAAa,GAAS,IACvC,CAEO,eAAe,EAAmB,CAAU,EAEjD,IAAM,EAAQ,CADG,MAAM,GAAA,EACA,IAAI,CAAC,AAAC,GAAe,EAAW,EAAE,GAAK,GAC9D,GAAI,CAAC,EACH,KADU,EACH,KAGT,IAAM,EAAS,MAAM,WACrB,AAAK,EAIE,EAJH,AAIU,IAJD,OAIY,CAAC,EAAc,EAA4B,IAH3D,IAIX,CAEA,eAAe,EAAkB,CAAa,EAC5C,GAAI,CACF,IAAM,EAAW,MAAM,MAAM,8BAA+B,CAC1D,QAAS,CACP,cAAe,CAAC,OAAO,EAAE,EAAA,CAAO,CAChC,OAAQ,8BACR,uBAAwB,YAC1B,CACF,GAEA,GAAI,CAAC,EAAS,EAAE,CAAE,CAChB,GAAwB,KAAK,CAAzB,EAAS,MAAM,CACjB,MAAO,CAAE,OAAO,EAAO,MAAO,kCAAmC,EAEnE,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,oBAAoB,EAAE,EAAS,MAAM,CAAC,CAAC,CAAC,AAAC,CAC1E,CAEA,IAAM,EAAO,MAAM,EAAS,IAAI,GAC1B,EAAkC,UAAvB,OAAO,GAAM,MAAqB,EAAK,KAAK,CAAG,KAChE,GAAI,CAAC,EACH,MAAO,CAAE,CADI,MACG,EAAO,MAAO,iDAAkD,EAGlF,MAAO,CAAE,OAAO,WAAM,CAAS,CACjC,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,+BAA+B,EAAG,EAAgB,OAAO,CAAA,CAAE,AAAC,CAC7F,CACF,CAEA,eAAe,EAAkB,CAAiB,CAAE,CAAa,EAC/D,GAAI,CACF,IAAM,EAAgB,EAAyB,GACzC,EAAW,MAAM,MAAM,CAAA,EAAG,EAAc,YAAY,CAAC,CAAE,CAC3D,QAAS,CACP,gBAAiB,CACnB,CACF,GAEA,GAAI,CAAC,EAAS,EAAE,CAAE,CAChB,GAAwB,KAAK,CAAzB,EAAS,MAAM,CACjB,MAAO,CAAE,OAAO,EAAO,MAAO,kCAAmC,EAEnE,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,oBAAoB,EAAE,EAAS,MAAM,CAAC,CAAC,CAAC,AAAC,CAC1E,CAEA,IAAM,EAAO,MAAM,EAAS,IAAI,GAC1B,EAAqC,UAA1B,OAAO,GAAM,SAAwB,EAAK,QAAQ,CAAG,KACtE,GAAI,CAAC,EACH,MAAO,CAAE,CADI,MACG,EAAO,MAAO,iDAAkD,EAGlF,MAAO,CAAE,OAAO,WAAM,CAAS,CACjC,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,+BAA+B,EAAG,EAAgB,OAAO,CAAA,CAAE,AAAC,CAC7F,CACF,CAEO,eAAe,EAAuB,CAAa,EACxD,IAKI,EALE,EAAe,EAAM,IAAI,GAC/B,GAAI,CAAC,EACH,MAAO,CAAE,KADQ,GACC,GAAO,MAAO,2BAA4B,EAI9D,GAAI,CACF,EAAS,MAAM,GACjB,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAO,AAAC,CAC3D,CAEA,IAAM,EAAe,MAAM,EAAkB,GAC7C,GAAI,CAAC,EAAa,KAAK,EAAI,CAAC,EAAa,QAAQ,CAC/C,CADiD,KAC1C,CAAE,SAAS,EAAO,MAAO,EAAa,KAAK,EAAI,gCAAiC,EAGzF,IAAM,EAAW,MAAM,IAMvB,GALkB,CAKd,CALuB,IAAI,CAAC,AAAC,GACX,EAIP,SAJb,EAAW,IAAI,EACZ,EAAW,QAAQ,GAAK,EAAa,QAAQ,EAIhD,MAAO,CAAE,QAAS,GAAO,MAAO,CAAC,wBAAwB,EAAE,EAAa,QAAQ,CAAC,gBAAgB,CAAC,AAAC,EAGrG,IAAM,EAAK,IACL,EAAM,IAAI,OAAO,WAAW,GAC5B,EAAgB,EAAwB,EAE9C,OAAM,EAAO,WAAW,CAAC,EAAc,EAAe,GAEtD,IAAM,EAA8B,IAClC,EACA,KAAM,SACN,SAAU,EAAa,QAAQ,CAC/B,UAAW,EACX,UAAW,gBACX,CACF,EAKA,OAHA,EAAS,IAAI,CAAC,GACd,MAAM,EAAyB,GAExB,CACL,SAAS,EACT,WAAY,CACV,GAAI,EAAQ,EAAE,CACd,KAAM,SACN,SAAU,EAAQ,QAAQ,CAC1B,UAAW,EAAQ,SAAS,CAC5B,UAAW,EAAQ,SAAS,AAC9B,CACF,CACF,CAEO,eAAe,EACpB,CAAiB,CACjB,CAAa,EAEb,IAiBI,EAjBE,EAAsB,EAAyB,GAC/C,EAAe,EAAM,IAAI,GAE/B,GAAI,CAAC,EACH,MAAO,CAAE,SAAS,EAAO,CADD,KACQ,gCAAiC,EAGnE,GAAI,CACF,IAAI,IAAI,EACV,CAAE,KAAM,CACN,MAAO,CAAE,SAAS,EAAO,MAAO,wCAAyC,CAC3E,CAEA,GAAI,CAAC,EACH,MAAO,CAAE,KADQ,IACC,EAAO,MAAO,2BAA4B,EAI9D,GAAI,CACF,EAAS,MAAM,GACjB,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAO,AAAC,CAC3D,CAEA,IAAM,EAAe,MAAM,EAAkB,EAAqB,GAClE,GAAI,CAAC,EAAa,KAAK,EAAI,CAAC,EAAa,QAAQ,CAC/C,CADiD,KAC1C,CAAE,SAAS,EAAO,MAAO,EAAa,KAAK,EAAI,gCAAiC,EAGzF,IAAM,EAAW,MAAM,IAOvB,GANkB,CAMd,CANuB,IAAI,CAAC,AAAC,GACX,EAKP,SALb,EAAW,IAAI,EACZ,EAAW,QAAQ,GAAK,EAAa,QAAQ,EAC7C,EAAW,SAAS,GAAK,GAI5B,MAAO,CACL,QAAS,GACT,MAAO,CAAC,wBAAwB,EAAE,EAAa,QAAQ,CAAC,IAAI,EAAE,EAAoB,gBAAgB,CAAC,AACrG,EAGF,IAAM,EAAK,IACL,EAAM,IAAI,OAAO,WAAW,GAC5B,EAAgB,EAAwB,EAE9C,OAAM,EAAO,WAAW,CAAC,EAAc,EAAe,GAEtD,IAAM,EAA8B,IAClC,EACA,KAAM,SACN,SAAU,EAAa,QAAQ,CAC/B,UAAW,EACX,UAAW,EACX,UAAW,gBACX,CACF,EAKA,OAHA,EAAS,IAAI,CAAC,GACd,MAAM,EAAyB,GAExB,CACL,SAAS,EACT,WAAY,CACV,GAAI,EAAQ,EAAE,CACd,KAAM,SACN,SAAU,EAAQ,QAAQ,CAC1B,UAAW,EAAQ,SAAS,EAAI,EAChC,UAAW,EAAQ,SAAS,CAC5B,UAAW,EAAQ,SAAS,AAC9B,CACF,CACF,CAEO,eAAe,EAAiB,CAAU,EAC/C,IAAM,EAAW,MAAM,IACjB,EAAQ,EAAS,SAAS,CAAC,AAAC,GAAe,EAAW,EAAE,GAAK,GAEnE,GAAc,CAAC,GAAG,CAAd,EACF,MAAO,CAAE,SAAS,EAAO,MAAO,uBAAwB,EAG1D,IAAM,EAAa,CAAQ,CAAC,EAAM,CAClC,EAAS,MAAM,CAAC,EAAO,GACvB,MAAM,EAAyB,GAE/B,IAAM,EAAS,MAAM,IAKrB,OAJI,GACF,KADU,CACJ,EAAO,cAAc,CAAC,EAAc,EAA4B,IAGjE,CAAE,SAAS,CAAK,CACzB,sMCzdA,IAAA,EAAA,EAAA,CAAA,CAAA,OAOA,EAAA,EAAA,CAAA,CAAA,OAEA,EAAA,EAAA,CAAA,CAAA","ignoreList":[0,1]}
1
+ {"version":3,"sources":["../../../../node_modules/next/src/build/webpack/loaders/next-flight-loader/server-reference.ts","../../../../node_modules/next/src/build/webpack/loaders/next-flight-loader/action-validate.ts","../../../../src/lib/agent-api-credentials.ts","../../../../src/lib/credentials.ts","../../../../.next-internal/server/app/session/%5BsessionId%5D/page/actions.js%20%28server%20actions%20loader%29"],"sourcesContent":["/* eslint-disable import/no-extraneous-dependencies */\nexport { registerServerReference } from 'react-server-dom-webpack/server'\n","// This function ensures that all the exported values are valid server actions,\n// during the runtime. By definition all actions are required to be async\n// functions, but here we can only check that they are functions.\nexport function ensureServerEntryExports(actions: any[]) {\n for (let i = 0; i < actions.length; i++) {\n const action = actions[i]\n if (typeof action !== 'function') {\n throw new Error(\n `A \"use server\" file can only export async functions, found ${typeof action}.\\nRead more: https://nextjs.org/docs/messages/invalid-use-server-value`\n )\n }\n }\n}\n","import fs from 'fs/promises';\nimport os from 'os';\nimport path from 'path';\n\nconst SERVICE_NAME = 'viba-agent-api-credentials';\nconst CONFIGS_FILE_NAME = 'agent-api-configs.json';\nconst SUPPORTED_AGENT_APIS = ['codex'] as const;\n\nexport type AgentApiCredentialAgent = typeof SUPPORTED_AGENT_APIS[number];\n\nexport interface AgentApiCredential {\n agent: AgentApiCredentialAgent;\n apiProxy?: string;\n createdAt: string;\n updatedAt: string;\n}\n\nexport interface AgentApiCredentialSecret {\n agent: AgentApiCredentialAgent;\n apiKey: string;\n apiProxy?: string;\n}\n\ntype AgentApiCredentialMetadata = {\n agent: AgentApiCredentialAgent;\n apiProxy?: string;\n createdAt: string;\n updatedAt: string;\n keytarAccount?: string;\n};\n\ntype KeytarModule = {\n getPassword(service: string, account: string): Promise<string | null>;\n setPassword(service: string, account: string, password: string): Promise<void>;\n deletePassword(service: string, account: string): Promise<boolean>;\n};\n\nlet keytarPromise: Promise<KeytarModule | null> | null = null;\nlet keytarUnavailableReason: string | null = null;\nlet didLogKeytarWarning = false;\n\nfunction isSupportedAgentApi(value: string): value is AgentApiCredentialAgent {\n return SUPPORTED_AGENT_APIS.includes(value as AgentApiCredentialAgent);\n}\n\nfunction keytarUnavailableMessage(): string {\n if (keytarUnavailableReason) {\n return `Secure credential storage is unavailable: ${keytarUnavailableReason}`;\n }\n return 'Secure credential storage is unavailable in this runtime.';\n}\n\nasync function loadKeytar(): Promise<KeytarModule | null> {\n if (!keytarPromise) {\n keytarPromise = import('keytar')\n .then((module) => (module.default ?? module) as KeytarModule)\n .catch((error: unknown) => {\n keytarUnavailableReason = error instanceof Error ? error.message : String(error);\n if (!didLogKeytarWarning) {\n didLogKeytarWarning = true;\n console.warn(`[agent-api-credentials] ${keytarUnavailableMessage()}`);\n }\n return null;\n });\n }\n\n return keytarPromise;\n}\n\nasync function requireKeytar(): Promise<KeytarModule> {\n const keytar = await loadKeytar();\n if (!keytar) {\n throw new Error(keytarUnavailableMessage());\n }\n return keytar;\n}\n\nfunction getDefaultKeytarAccount(agent: AgentApiCredentialAgent): string {\n return `agent-api-${agent}`;\n}\n\nfunction getKeytarAccountForMetadata(metadata: AgentApiCredentialMetadata): string {\n return metadata.keytarAccount || getDefaultKeytarAccount(metadata.agent);\n}\n\nfunction normalizeApiProxy(apiProxy: string): string | undefined {\n const trimmed = apiProxy.trim();\n if (!trimmed) return undefined;\n\n try {\n // Validate and persist as-entered once it is a valid URL.\n new URL(trimmed);\n } catch {\n throw new Error('API proxy must be a valid URL.');\n }\n\n return trimmed;\n}\n\nfunction toAgentApiCredential(metadata: AgentApiCredentialMetadata): AgentApiCredential {\n return {\n agent: metadata.agent,\n apiProxy: metadata.apiProxy,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n };\n}\n\nfunction isAgentApiCredentialMetadata(value: unknown): value is AgentApiCredentialMetadata {\n if (!value || typeof value !== 'object') return false;\n\n const candidate = value as Record<string, unknown>;\n if (typeof candidate.agent !== 'string' || !isSupportedAgentApi(candidate.agent)) return false;\n if (typeof candidate.createdAt !== 'string') return false;\n if (typeof candidate.updatedAt !== 'string') return false;\n if (candidate.apiProxy !== undefined && typeof candidate.apiProxy !== 'string') return false;\n if (candidate.keytarAccount !== undefined && typeof candidate.keytarAccount !== 'string') return false;\n\n return true;\n}\n\nasync function getConfigsFilePath(): Promise<string> {\n const vibaDir = path.join(os.homedir(), '.viba');\n await fs.mkdir(vibaDir, { recursive: true });\n return path.join(vibaDir, CONFIGS_FILE_NAME);\n}\n\nasync function writeAgentApiCredentialMetadata(metadata: AgentApiCredentialMetadata[]): Promise<void> {\n const configsFilePath = await getConfigsFilePath();\n await fs.writeFile(configsFilePath, JSON.stringify(metadata, null, 2), 'utf-8');\n}\n\nasync function readAgentApiCredentialMetadata(): Promise<AgentApiCredentialMetadata[]> {\n const configsFilePath = await getConfigsFilePath();\n\n try {\n const content = await fs.readFile(configsFilePath, 'utf-8');\n const parsed = JSON.parse(content) as unknown;\n\n if (Array.isArray(parsed)) {\n return parsed.filter(isAgentApiCredentialMetadata);\n }\n\n if (!parsed || typeof parsed !== 'object') {\n return [];\n }\n\n // Legacy map shape: { codex: { ... }, ... }\n const entries = Object.entries(parsed as Record<string, unknown>);\n const migrated = entries\n .filter(([agent]) => isSupportedAgentApi(agent))\n .map(([agent, value]) => {\n if (!value || typeof value !== 'object') return null;\n const candidate = value as Record<string, unknown>;\n if (candidate.agent === undefined) {\n return {\n ...candidate,\n agent,\n } as unknown;\n }\n return candidate;\n })\n .filter(isAgentApiCredentialMetadata);\n\n if (migrated.length > 0) {\n await writeAgentApiCredentialMetadata(migrated);\n }\n\n return migrated;\n } catch (error) {\n if ((error as NodeJS.ErrnoException)?.code === 'ENOENT') {\n return [];\n }\n\n console.error('Failed to parse agent API credential metadata:', error);\n return [];\n }\n}\n\nexport async function getAllAgentApiCredentials(): Promise<AgentApiCredential[]> {\n const metadata = await readAgentApiCredentialMetadata();\n return metadata\n .map(toAgentApiCredential)\n .sort((a, b) => b.updatedAt.localeCompare(a.updatedAt));\n}\n\nexport async function createOrUpdateAgentApiCredential(\n agent: AgentApiCredentialAgent,\n apiKey: string,\n apiProxy: string,\n): Promise<{ success: boolean; credential?: AgentApiCredential; error?: string }> {\n if (!isSupportedAgentApi(agent)) {\n return { success: false, error: `Unsupported agent: ${agent}` };\n }\n\n const trimmedApiKey = apiKey.trim();\n if (!trimmedApiKey) {\n return { success: false, error: 'API key is required.' };\n }\n\n let normalizedApiProxy: string | undefined;\n try {\n normalizedApiProxy = normalizeApiProxy(apiProxy);\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n let keytar: KeytarModule;\n try {\n keytar = await requireKeytar();\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n const metadata = await readAgentApiCredentialMetadata();\n const now = new Date().toISOString();\n const index = metadata.findIndex((credential) => credential.agent === agent);\n const keytarAccount = index >= 0\n ? getKeytarAccountForMetadata(metadata[index])\n : getDefaultKeytarAccount(agent);\n\n await keytar.setPassword(SERVICE_NAME, keytarAccount, trimmedApiKey);\n\n if (index >= 0) {\n const existing = metadata[index];\n metadata[index] = {\n ...existing,\n apiProxy: normalizedApiProxy,\n updatedAt: now,\n keytarAccount,\n };\n } else {\n metadata.push({\n agent,\n apiProxy: normalizedApiProxy,\n createdAt: now,\n updatedAt: now,\n keytarAccount,\n });\n }\n\n await writeAgentApiCredentialMetadata(metadata);\n\n const saved = metadata.find((credential) => credential.agent === agent);\n if (!saved) {\n return { success: false, error: 'Failed to persist agent API credential.' };\n }\n\n return { success: true, credential: toAgentApiCredential(saved) };\n}\n\nexport async function deleteAgentApiCredential(\n agent: AgentApiCredentialAgent,\n): Promise<{ success: boolean; error?: string }> {\n if (!isSupportedAgentApi(agent)) {\n return { success: false, error: `Unsupported agent: ${agent}` };\n }\n\n const metadata = await readAgentApiCredentialMetadata();\n const index = metadata.findIndex((credential) => credential.agent === agent);\n if (index === -1) {\n return { success: false, error: 'Agent API credential not found.' };\n }\n\n const [removed] = metadata.splice(index, 1);\n await writeAgentApiCredentialMetadata(metadata);\n\n const keytar = await loadKeytar();\n if (keytar) {\n await keytar.deletePassword(SERVICE_NAME, getKeytarAccountForMetadata(removed));\n }\n\n return { success: true };\n}\n\nexport async function getAgentApiCredentialSecret(\n agent: AgentApiCredentialAgent,\n): Promise<AgentApiCredentialSecret | null> {\n if (!isSupportedAgentApi(agent)) {\n return null;\n }\n\n const metadata = await readAgentApiCredentialMetadata();\n const found = metadata.find((credential) => credential.agent === agent);\n if (!found) {\n return null;\n }\n\n const keytar = await loadKeytar();\n if (!keytar) {\n return null;\n }\n\n const apiKey = await keytar.getPassword(SERVICE_NAME, getKeytarAccountForMetadata(found));\n if (!apiKey) {\n return null;\n }\n\n return {\n agent: found.agent,\n apiKey,\n apiProxy: found.apiProxy,\n };\n}\n","import fs from 'fs/promises';\nimport os from 'os';\nimport path from 'path';\n\nconst SERVICE_NAME = 'viba-git-credentials';\nconst CREDENTIALS_FILE_NAME = 'credentials.json';\n\nexport type CredentialType = 'github' | 'gitlab';\n\nexport interface BaseCredential {\n id: string;\n type: CredentialType;\n username: string;\n createdAt: string;\n updatedAt: string;\n}\n\nexport interface GitHubCredential extends BaseCredential {\n type: 'github';\n}\n\nexport interface GitLabCredential extends BaseCredential {\n type: 'gitlab';\n serverUrl: string;\n}\n\nexport type Credential = GitHubCredential | GitLabCredential;\n\ntype CredentialMetadata = {\n id: string;\n type: CredentialType;\n username: string;\n serverUrl?: string;\n createdAt: string;\n updatedAt: string;\n keytarAccount?: string;\n};\n\ntype LegacyCredentialMetadata = {\n type: CredentialType;\n username: string;\n serverUrl?: string;\n createdAt: string;\n updatedAt: string;\n};\n\ntype KeytarModule = {\n getPassword(service: string, account: string): Promise<string | null>;\n setPassword(service: string, account: string, password: string): Promise<void>;\n deletePassword(service: string, account: string): Promise<boolean>;\n};\n\nlet keytarPromise: Promise<KeytarModule | null> | null = null;\nlet keytarUnavailableReason: string | null = null;\nlet didLogKeytarWarning = false;\n\nfunction keytarUnavailableMessage(): string {\n if (keytarUnavailableReason) {\n return `Secure credential storage is unavailable: ${keytarUnavailableReason}`;\n }\n return 'Secure credential storage is unavailable in this runtime.';\n}\n\nasync function loadKeytar(): Promise<KeytarModule | null> {\n if (!keytarPromise) {\n keytarPromise = import('keytar')\n .then((module) => (module.default ?? module) as KeytarModule)\n .catch((error: unknown) => {\n keytarUnavailableReason = error instanceof Error ? error.message : String(error);\n if (!didLogKeytarWarning) {\n didLogKeytarWarning = true;\n console.warn(`[credentials] ${keytarUnavailableMessage()}`);\n }\n return null;\n });\n }\n\n return keytarPromise;\n}\n\nasync function requireKeytar(): Promise<KeytarModule> {\n const keytar = await loadKeytar();\n if (!keytar) {\n throw new Error(keytarUnavailableMessage());\n }\n return keytar;\n}\n\nfunction generateId(): string {\n return `${Date.now()}-${Math.random().toString(36).slice(2, 9)}`;\n}\n\nfunction normalizeGitLabServerUrl(serverUrl: string): string {\n return serverUrl.trim().replace(/\\/$/, '');\n}\n\nfunction getDefaultKeytarAccount(id: string): string {\n return `credential-${id}`;\n}\n\nfunction getLegacyKeytarAccount(type: CredentialType): string {\n return `credential-${type}`;\n}\n\nfunction getKeytarAccountForMetadata(metadata: CredentialMetadata): string {\n return metadata.keytarAccount || getDefaultKeytarAccount(metadata.id);\n}\n\nfunction toCredential(metadata: CredentialMetadata): Credential {\n if (metadata.type === 'gitlab') {\n return {\n id: metadata.id,\n type: 'gitlab',\n username: metadata.username,\n serverUrl: metadata.serverUrl || 'https://gitlab.com',\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n };\n }\n\n return {\n id: metadata.id,\n type: 'github',\n username: metadata.username,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n };\n}\n\nasync function getCredentialsFilePath(): Promise<string> {\n const vibaDir = path.join(os.homedir(), '.viba');\n await fs.mkdir(vibaDir, { recursive: true });\n return path.join(vibaDir, CREDENTIALS_FILE_NAME);\n}\n\nfunction isLegacyCredentialMetadata(value: unknown, expectedType: CredentialType): value is LegacyCredentialMetadata {\n if (!value || typeof value !== 'object') return false;\n\n const candidate = value as Record<string, unknown>;\n if (candidate.type !== expectedType) return false;\n if (typeof candidate.username !== 'string') return false;\n if (typeof candidate.createdAt !== 'string') return false;\n if (typeof candidate.updatedAt !== 'string') return false;\n\n if (expectedType === 'gitlab') {\n return typeof candidate.serverUrl === 'string';\n }\n\n return true;\n}\n\nfunction isCredentialMetadata(value: unknown): value is CredentialMetadata {\n if (!value || typeof value !== 'object') return false;\n\n const candidate = value as Record<string, unknown>;\n if (typeof candidate.id !== 'string' || !candidate.id.trim()) return false;\n if (candidate.type !== 'github' && candidate.type !== 'gitlab') return false;\n if (typeof candidate.username !== 'string') return false;\n if (typeof candidate.createdAt !== 'string') return false;\n if (typeof candidate.updatedAt !== 'string') return false;\n if (candidate.keytarAccount !== undefined && typeof candidate.keytarAccount !== 'string') return false;\n\n if (candidate.type === 'gitlab') {\n return typeof candidate.serverUrl === 'string';\n }\n\n return true;\n}\n\nasync function writeCredentialsMetadata(metadata: CredentialMetadata[]): Promise<void> {\n const credentialsFilePath = await getCredentialsFilePath();\n await fs.writeFile(credentialsFilePath, JSON.stringify(metadata, null, 2), 'utf-8');\n}\n\nasync function readCredentialsMetadata(): Promise<CredentialMetadata[]> {\n const credentialsFilePath = await getCredentialsFilePath();\n\n try {\n const content = await fs.readFile(credentialsFilePath, 'utf-8');\n const parsed = JSON.parse(content) as unknown;\n\n if (Array.isArray(parsed)) {\n return parsed.filter(isCredentialMetadata);\n }\n\n if (!parsed || typeof parsed !== 'object') {\n return [];\n }\n\n const legacyMapped = parsed as Record<string, unknown>;\n const migrated: CredentialMetadata[] = [];\n\n if (isLegacyCredentialMetadata(legacyMapped.github, 'github')) {\n const metadata = legacyMapped.github;\n migrated.push({\n id: generateId(),\n type: 'github',\n username: metadata.username,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n keytarAccount: getLegacyKeytarAccount('github'),\n });\n }\n\n if (isLegacyCredentialMetadata(legacyMapped.gitlab, 'gitlab')) {\n const metadata = legacyMapped.gitlab;\n migrated.push({\n id: generateId(),\n type: 'gitlab',\n username: metadata.username,\n serverUrl: metadata.serverUrl,\n createdAt: metadata.createdAt,\n updatedAt: metadata.updatedAt,\n keytarAccount: getLegacyKeytarAccount('gitlab'),\n });\n }\n\n if (migrated.length > 0) {\n await writeCredentialsMetadata(migrated);\n }\n\n return migrated;\n } catch (error) {\n if ((error as NodeJS.ErrnoException)?.code === 'ENOENT') {\n return [];\n }\n\n console.error('Failed to parse credentials metadata:', error);\n return [];\n }\n}\n\nexport async function getAllCredentials(): Promise<Credential[]> {\n const metadata = await readCredentialsMetadata();\n\n return metadata\n .map(toCredential)\n .sort((a, b) => b.updatedAt.localeCompare(a.updatedAt));\n}\n\nexport async function getCredentialById(id: string): Promise<Credential | null> {\n const metadata = await readCredentialsMetadata();\n const found = metadata.find((credential) => credential.id === id);\n return found ? toCredential(found) : null;\n}\n\nexport async function getCredentialToken(id: string): Promise<string | null> {\n const metadata = await readCredentialsMetadata();\n const found = metadata.find((credential) => credential.id === id);\n if (!found) {\n return null;\n }\n\n const keytar = await loadKeytar();\n if (!keytar) {\n return null;\n }\n\n return keytar.getPassword(SERVICE_NAME, getKeytarAccountForMetadata(found));\n}\n\nasync function verifyGitHubToken(token: string): Promise<{ valid: boolean; username?: string; error?: string }> {\n try {\n const response = await fetch('https://api.github.com/user', {\n headers: {\n Authorization: `Bearer ${token}`,\n Accept: 'application/vnd.github+json',\n 'X-GitHub-Api-Version': '2022-11-28',\n },\n });\n\n if (!response.ok) {\n if (response.status === 401) {\n return { valid: false, error: 'Invalid or expired GitHub token.' };\n }\n return { valid: false, error: `GitHub API returned ${response.status}.` };\n }\n\n const data = await response.json();\n const username = typeof data?.login === 'string' ? data.login : null;\n if (!username) {\n return { valid: false, error: 'GitHub API response did not include a username.' };\n }\n\n return { valid: true, username };\n } catch (error) {\n return { valid: false, error: `Failed to verify GitHub token: ${(error as Error).message}` };\n }\n}\n\nasync function verifyGitLabToken(serverUrl: string, token: string): Promise<{ valid: boolean; username?: string; error?: string }> {\n try {\n const normalizedUrl = normalizeGitLabServerUrl(serverUrl);\n const response = await fetch(`${normalizedUrl}/api/v4/user`, {\n headers: {\n 'PRIVATE-TOKEN': token,\n },\n });\n\n if (!response.ok) {\n if (response.status === 401) {\n return { valid: false, error: 'Invalid or expired GitLab token.' };\n }\n return { valid: false, error: `GitLab API returned ${response.status}.` };\n }\n\n const data = await response.json();\n const username = typeof data?.username === 'string' ? data.username : null;\n if (!username) {\n return { valid: false, error: 'GitLab API response did not include a username.' };\n }\n\n return { valid: true, username };\n } catch (error) {\n return { valid: false, error: `Failed to verify GitLab token: ${(error as Error).message}` };\n }\n}\n\nexport async function createGitHubCredential(token: string): Promise<{ success: boolean; credential?: GitHubCredential; error?: string }> {\n const trimmedToken = token.trim();\n if (!trimmedToken) {\n return { success: false, error: 'GitHub token is required.' };\n }\n\n let keytar: KeytarModule;\n try {\n keytar = await requireKeytar();\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n const verification = await verifyGitHubToken(trimmedToken);\n if (!verification.valid || !verification.username) {\n return { success: false, error: verification.error || 'Failed to verify GitHub token.' };\n }\n\n const metadata = await readCredentialsMetadata();\n const duplicate = metadata.find((credential) => (\n credential.type === 'github'\n && credential.username === verification.username\n ));\n\n if (duplicate) {\n return { success: false, error: `A GitHub credential for ${verification.username} already exists.` };\n }\n\n const id = generateId();\n const now = new Date().toISOString();\n const keytarAccount = getDefaultKeytarAccount(id);\n\n await keytar.setPassword(SERVICE_NAME, keytarAccount, trimmedToken);\n\n const created: CredentialMetadata = {\n id,\n type: 'github',\n username: verification.username,\n createdAt: now,\n updatedAt: now,\n keytarAccount,\n };\n\n metadata.push(created);\n await writeCredentialsMetadata(metadata);\n\n return {\n success: true,\n credential: {\n id: created.id,\n type: 'github',\n username: created.username,\n createdAt: created.createdAt,\n updatedAt: created.updatedAt,\n },\n };\n}\n\nexport async function createGitLabCredential(\n serverUrl: string,\n token: string,\n): Promise<{ success: boolean; credential?: GitLabCredential; error?: string }> {\n const normalizedServerUrl = normalizeGitLabServerUrl(serverUrl);\n const trimmedToken = token.trim();\n\n if (!normalizedServerUrl) {\n return { success: false, error: 'GitLab server URL is required.' };\n }\n\n try {\n new URL(normalizedServerUrl);\n } catch {\n return { success: false, error: 'GitLab server URL must be a valid URL.' };\n }\n\n if (!trimmedToken) {\n return { success: false, error: 'GitLab token is required.' };\n }\n\n let keytar: KeytarModule;\n try {\n keytar = await requireKeytar();\n } catch (error) {\n return { success: false, error: (error as Error).message };\n }\n\n const verification = await verifyGitLabToken(normalizedServerUrl, trimmedToken);\n if (!verification.valid || !verification.username) {\n return { success: false, error: verification.error || 'Failed to verify GitLab token.' };\n }\n\n const metadata = await readCredentialsMetadata();\n const duplicate = metadata.find((credential) => (\n credential.type === 'gitlab'\n && credential.username === verification.username\n && credential.serverUrl === normalizedServerUrl\n ));\n\n if (duplicate) {\n return {\n success: false,\n error: `A GitLab credential for ${verification.username} on ${normalizedServerUrl} already exists.`,\n };\n }\n\n const id = generateId();\n const now = new Date().toISOString();\n const keytarAccount = getDefaultKeytarAccount(id);\n\n await keytar.setPassword(SERVICE_NAME, keytarAccount, trimmedToken);\n\n const created: CredentialMetadata = {\n id,\n type: 'gitlab',\n username: verification.username,\n serverUrl: normalizedServerUrl,\n createdAt: now,\n updatedAt: now,\n keytarAccount,\n };\n\n metadata.push(created);\n await writeCredentialsMetadata(metadata);\n\n return {\n success: true,\n credential: {\n id: created.id,\n type: 'gitlab',\n username: created.username,\n serverUrl: created.serverUrl || normalizedServerUrl,\n createdAt: created.createdAt,\n updatedAt: created.updatedAt,\n },\n };\n}\n\nexport async function deleteCredential(id: string): Promise<{ success: boolean; error?: string }> {\n const metadata = await readCredentialsMetadata();\n const index = metadata.findIndex((credential) => credential.id === id);\n\n if (index === -1) {\n return { success: false, error: 'Credential not found.' };\n }\n\n const credential = metadata[index];\n metadata.splice(index, 1);\n await writeCredentialsMetadata(metadata);\n\n const keytar = await loadKeytar();\n if (keytar) {\n await keytar.deletePassword(SERVICE_NAME, getKeytarAccountForMetadata(credential));\n }\n\n return { success: true };\n}\n","export {deleteSessionInBackground as '40500d0ffd95f3d580adc54c8f8f06ec7b87f9ec59'} from 'ACTIONS_MODULE0'\nexport {getSessionDivergence as '4091a66915376168100940311be5edf3ac23a04d1e'} from 'ACTIONS_MODULE0'\nexport {listSessionBaseBranches as '4064c68dd0888c7ec080545be735e303ce561c1113'} from 'ACTIONS_MODULE0'\nexport {mergeSessionToBase as '40efd79fc6df636d23f1699a9e2538a854fbbf1ad1'} from 'ACTIONS_MODULE0'\nexport {rebaseSessionOntoBase as '40dce504caad80d27980c6b95ae88b6b77016455b7'} from 'ACTIONS_MODULE0'\nexport {updateSessionBaseBranch as '6014aa8216963aec4853b0c1b3571ce34eabf4c257'} from 'ACTIONS_MODULE0'\nexport {writeSessionPromptFile as '606e3f43cac25abaf2d316dde6f382583302bab531'} from 'ACTIONS_MODULE0'\nexport {setTmuxSessionMouseMode as '7f15e4c824fe51cd9ffe5cc16ccd30c54e8ffb3fb7'} from 'ACTIONS_MODULE1'\nexport {setTmuxSessionStatusVisibility as '7fda405a368ab4638a90c4c6973e223877d932f330'} from 'ACTIONS_MODULE1'\nexport {getConfig as '0090143951524e8794de0cc16631ba5964247564ab'} from 'ACTIONS_MODULE2'\nexport {updateConfig as '40fb598c6dcac5f8751f764c103c9babd05dccca94'} from 'ACTIONS_MODULE2'\nexport {getHomeDirectory as '00a74f384d2cda752e3b9ee67bd62fa7761af1ea26'} from 'ACTIONS_MODULE1'\nexport {listPathEntries as '409308512ce8225139218969f6a5b2387b5924b603'} from 'ACTIONS_MODULE1'\nexport {saveAttachments as '7f6243b34e46ab390207d9a1c2cb42b1dbd5567506'} from 'ACTIONS_MODULE1'\nexport {consumeSessionLaunchContext as '407e2b8911d189ec058bf14d6c689ff1798cbd3253'} from 'ACTIONS_MODULE0'\nexport {getSessionMetadata as '400175db6a8aa392c741ef001dd4c6842e81750581'} from 'ACTIONS_MODULE0'\nexport {markSessionInitialized as '4042b849fecc5d306da18684aac3da1cac968aa3b3'} from 'ACTIONS_MODULE0'\nexport {getSessionTerminalSources as '7fdb838a5116c39e133eaf16467bd91c2cfe712569'} from 'ACTIONS_MODULE1'\nexport {startTtydProcess as '7f8444b3b99875207f964f39accc0122511e2a0004'} from 'ACTIONS_MODULE1'\n"],"names":["registerServerReference","ensureServerEntryExports","actions","i","length","action","Error"],"mappings":"mTAAoD,OAAA,cAAA,CAAA,EAAA,aAAA,oCAC3CA,0BAAAA,qCAAAA,EAAAA,uBAAuB,YAAQ,CAAA,CAAA,IAAA,iCCEjC,SAASC,EAAyBC,CAAc,EACrD,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAQE,MAAM,CAAED,IAAK,CACvC,IAAME,EAASH,CAAO,CAACC,EAAE,CACzB,GAAI,AAAkB,YAAY,OAAvBE,EACT,MAAM,OAAA,cAEL,CAFK,AAAIC,MACR,CAAC,2DAA2D,EAAE,OAAOD,EAAO;AAAA,oEAAuE,CAAC,EADhJ,oBAAA,OAAA,mBAAA,gBAAA,CAEN,EAEJ,CACF,0EATgBJ,2BAAAA,qCAAAA,6BCHhB,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,6BAEf,EAAuB,CAAC,QAAQ,CA+BlC,EAAqD,KACrD,EAAyC,KACzC,GAAsB,EAE1B,SAAS,EAAoB,CAAa,EACxC,OAAO,EAAqB,QAAQ,CAAC,EACvC,CAEA,SAAS,WACP,AAAI,EACK,CAAC,sBADmB,oBACuB,EAAE,EAAA,CAAyB,CAExE,2DACT,CAEA,eAAe,IAcb,OAbI,AAAC,IACH,EAAgB,EAAA,CAAA,CAAA,KADE,EAEf,IAAI,CAAC,AAAC,GAAY,EAAO,OAAO,EAAI,GACpC,KAAK,CAAC,AAAC,IACN,EAA0B,aAAiB,MAAQ,EAAM,OAAO,CAAG,OAAO,GACrE,IACH,EAAsB,GACtB,QAAQ,IAFgB,AAEZ,CAAC,CAAC,wBAAwB,EAAE,IAAA,CAA4B,GAE/D,MACT,EAGG,CACT,CAEA,eAAe,IACb,IAAM,EAAS,MAAM,IACrB,GAAI,CAAC,EACH,MADW,AACL,AAAI,MAAM,KAElB,OAAO,CACT,CAEA,SAAS,EAAwB,CAA8B,EAC7D,MAAO,CAAC,UAAU,EAAE,EAAA,CAAO,AAC7B,CAEA,SAAS,EAA4B,CAAoC,EACvE,OAAO,EAAS,aAAa,EAAI,EAAwB,EAAS,KAAK,CACzE,CAgBA,SAAS,EAAqB,CAAoC,EAChE,MAAO,CACL,MAAO,EAAS,KAAK,CACrB,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,AAC/B,CACF,CAEA,SAAS,EAA6B,CAAc,QAClD,CAAI,CAAC,GAA0B,UAAjB,AAA2B,OAApB,AAA2B,GAGjB,UAA3B,OAAO,EAAU,KAAK,GAAiB,CAAC,EAAoB,EAAU,KAAK,GAAG,AAC/C,OADsD,GACrF,AAAyC,OAAlC,AAAyC,AAFlC,EAEG,SAAS,EAC1B,AAA+B,UAAU,OAAlC,AAAyC,EAA/B,SAAS,GAC1B,AAAuB,WAAb,QAAQ,EAAgD,UAA9B,OAAO,EAAU,QAAQ,AAAK,GAAU,MAChD,CADuD,GACnF,EAAU,aAAa,EAAqD,UAAnC,OAAO,EAAU,aAAa,AAAK,CAGlF,CAEA,CAL4F,OAAO,OAKpF,IACb,IAAM,EAAU,EAAA,OAAI,CAAC,IAAI,CAAC,EAAA,OAAE,CAAC,OAAO,GAAI,SAExC,OADA,MAAM,EAAA,OAAE,CAAC,KAAK,CAAC,EAAS,CAAE,WAAW,CAAK,GACnC,EAAA,OAAI,CAAC,IAAI,CAAC,EAvHO,OAuHE,kBAC5B,CAEA,eAAe,EAAgC,CAAsC,EACnF,IAAM,EAAkB,MAAM,GAC9B,OAAM,EAAA,OAAE,CAAC,SAAS,CAAC,EAAiB,KAAK,SAAS,CAAC,EAAU,KAAM,GAAI,QACzE,CAEA,eAAe,IACb,IAAM,EAAkB,MAAM,IAE9B,GAAI,CACF,IAAM,EAAU,MAAM,EAAA,OAAE,CAAC,QAAQ,CAAC,EAAiB,SAC7C,EAAS,KAAK,KAAK,CAAC,GAE1B,GAAI,MAAM,OAAO,CAAC,GAChB,MADyB,CAClB,EAAO,MAAM,CAAC,GAGvB,GAAI,CAAC,GAA4B,UAAlB,AAA4B,OAArB,EACpB,MAAO,EAAE,CAKX,IAAM,EAAW,AADD,OAAO,OAAO,CAAC,GAE5B,MAAM,CAAC,CAAC,CAAC,EAAM,GAAK,EAAoB,IACxC,GAAG,CAAC,CAAC,CAAC,EAAO,EAAM,GAClB,AAAI,AAAC,GAA0B,UAAjB,AAA2B,OAApB,OAEG,IAApB,EAAU,KAAK,AAAgB,CAC1B,CAFS,IAGd,GAAG,IACH,CACF,EALgB,EAD8B,AAIhC,MAMjB,MAAM,CAAC,GAMV,OAJI,EAAS,MAAM,CAAG,GACpB,AADuB,MACjB,EAAgC,GAGjC,CACT,CAAE,MAAO,EAAO,CACd,GAAK,GAAiC,OAAS,SAC7C,CADuD,KAChD,EAAE,CAIX,OADA,QAAQ,KAAK,CAAC,iDAAkD,GACzD,EAAE,AACX,CACF,CAEO,eAAe,IAEpB,MAAO,CADU,MAAM,GAAA,EAEpB,GAAG,CAAC,GACJ,IAAI,CAAC,CAAC,EAAG,IAAM,EAAE,SAAS,CAAC,aAAa,CAAC,EAAE,SAAS,EACzD,CAEO,eAAe,EACpB,CAA8B,CAC9B,CAAc,CACd,CAAgB,MAWZ,EAOA,EAhBJ,GAAI,CAAC,EAAoB,GACvB,KAD+B,CACxB,CAAE,SAAS,EAAO,MAAO,CAAC,mBAAmB,EAAE,EAAA,CAAO,AAAC,EAGhE,IAAM,EAAgB,EAAO,IAAI,GACjC,GAAI,CAAC,EACH,MAAO,CAAE,MADS,GACA,EAAO,MAAO,sBAAuB,EAIzD,GAAI,CACF,EArHJ,AAqHyB,SArHhB,AAAkB,CAAgB,EACzC,IAAM,EAAU,EAAS,IAAI,GAC7B,GAAK,CAAD,EAEJ,GAAI,CAEF,EAJY,EAIR,IAAI,CAJW,CAKrB,CAAE,KAAM,CACN,MAAU,AAAJ,MAAU,iCAClB,CAEA,OAAO,EACT,EAyG2C,EACzC,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAQ,AAAD,CAC1D,CAGA,GAAI,CACF,EAAS,MAAM,GACjB,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAO,AAAC,CAC3D,CAEA,IAAM,EAAW,MAAM,IACjB,EAAM,IAAI,OAAO,WAAW,GAC5B,EAAQ,EAAS,SAAS,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,GAChE,EAAgB,GAAS,EAC3B,EAA4B,CAAQ,CAAC,EAAM,EAC3C,EAAwB,GAI5B,GAFA,MAAM,EAAO,WAAW,CAAC,EAAc,EAAe,GAElD,GAAS,EAAG,CACd,IAAM,EAAW,CAAQ,CAAC,EAAM,CAChC,CAAQ,CAAC,EAAM,CAAG,CAChB,GAAG,CAAQ,CACX,SAAU,EACV,UAAW,EACX,eACF,CACF,MACE,CADK,CACI,IAAI,CAAC,OACZ,EACA,SAAU,EACV,UAAW,EACX,UAAW,gBACX,CACF,EAGF,OAAM,EAAgC,GAEtC,IAAM,EAAQ,EAAS,IAAI,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,UACjE,AAAK,EAIE,CAAE,CAJL,GAAQ,KAIM,EAAM,WAAY,EAAqB,EAAO,EAHvD,CAAE,SAAS,EAAO,MAAO,yCAA0C,CAI9E,CAEO,eAAe,EACpB,CAA8B,EAE9B,GAAI,CAAC,EAAoB,GACvB,KAD+B,CACxB,CAAE,QAAS,GAAO,MAAO,CAAC,mBAAmB,EAAE,EAAA,CAAO,AAAC,EAGhE,IAAM,EAAW,MAAM,IACjB,EAAQ,EAAS,SAAS,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,GACtE,GAAc,CAAC,GAAG,CAAd,EACF,MAAO,CAAE,SAAS,EAAO,MAAO,iCAAkC,EAGpE,GAAM,CAAC,EAAQ,CAAG,EAAS,MAAM,CAAC,EAAO,EACzC,OAAM,EAAgC,GAEtC,IAAM,EAAS,MAAM,IAKrB,OAJI,GACF,KADU,CACJ,EAAO,cAAc,CAAC,EAAc,EAA4B,IAGjE,CAAE,SAAS,CAAK,CACzB,CAEO,eAAe,EACpB,CAA8B,EAE9B,GAAI,CAAC,EAAoB,GACvB,KAD+B,EACxB,KAIT,IAAM,EAAQ,CADG,MAAM,GAAA,EACA,IAAI,CAAC,AAAC,GAAe,EAAW,KAAK,GAAK,GACjE,GAAI,CAAC,EACH,KADU,EACH,KAGT,IAAM,EAAS,MAAM,IACrB,GAAI,CAAC,EACH,MADW,CACJ,KAGT,IAAM,EAAS,MAAM,EAAO,WAAW,CAAC,EAAc,EAA4B,WAClF,AAAK,EAIE,CACL,CALE,IAAS,CAKJ,EAAM,KAAK,QAClB,EACA,SAAU,EAAM,QAAQ,AAC1B,EAPS,IAQX,gLC/SA,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,uBAgDjB,EAAqD,KACrD,EAAyC,KACzC,EAAsB,GAE1B,SAAS,WACH,AAAJ,EACS,CAAC,sBADmB,oBACuB,EAAE,EAAA,CAAyB,CAExE,2DACT,CAEA,eAAe,IAcb,OAbI,AAAC,GACH,GAAgB,EAAA,CAAA,CAAA,KADE,EAEf,IAAI,CAAC,AAAC,GAAY,EAAO,OAAO,EAAI,GACpC,KAAK,CAAC,AAAC,IACN,EAA0B,aAAiB,MAAQ,EAAM,OAAO,CAAG,OAAO,GACrE,IACH,GAAsB,EACtB,QAAQ,IAAI,AAFY,CAEX,CAAC,cAAc,EAAE,IAAA,CAA4B,GAErD,MACT,EAGG,CACT,CAEA,eAAe,IACb,IAAM,EAAS,MAAM,IACrB,GAAI,CAAC,EACH,MADW,AACL,AAAI,MAAM,KAElB,OAAO,CACT,CAEA,SAAS,IACP,MAAO,CAAA,EAAG,KAAK,GAAG,GAAG,CAAC,EAAE,KAAK,MAAM,GAAG,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAG,GAAA,CAAI,AAClE,CAEA,SAAS,EAAyB,CAAiB,EACjD,OAAO,EAAU,IAAI,GAAG,OAAO,CAAC,MAAO,GACzC,CAEA,SAAS,EAAwB,CAAU,EACzC,MAAO,CAAC,WAAW,EAAE,EAAA,CAAI,AAC3B,CAEA,SAAS,EAAuB,CAAoB,EAClD,MAAO,CAAC,WAAW,EAAE,EAAA,CAAM,AAC7B,CAEA,SAAS,EAA4B,CAA4B,EAC/D,OAAO,EAAS,aAAa,EAAI,EAAwB,EAAS,EAAE,CACtE,CAEA,SAAS,EAAa,CAA4B,QAChD,AAAsB,UAAU,CAA5B,EAAS,IAAI,CACR,CACL,GAAI,EAAS,EAAE,CACf,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,EAAI,qBACjC,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,AAC/B,EAGK,CACL,GAAI,EAAS,EAAE,CACf,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,AAC/B,CACF,CAEA,eAAe,IACb,IAAM,EAAU,EAAA,OAAI,CAAC,IAAI,CAAC,EAAA,OAAE,CAAC,OAAO,GAAI,SAExC,OADA,MAAM,EAAA,OAAE,CAAC,KAAK,CAAC,EAAS,CAAE,WAAW,CAAK,GACnC,EAAA,OAAI,CAAC,IAAI,CAAC,EA/HW,OA+HF,YAC5B,CAEA,SAAS,EAA2B,CAAc,CAAE,CAA4B,QAC9E,CAAI,CAAC,GAA0B,UAAjB,AAA2B,OAApB,AAA2B,GAG5C,EAAU,IAAI,GAAK,GACW,UAA9B,AAAwC,CADP,MAC1B,AAAwC,CADP,CACvB,QAAQ,EACM,AAA/B,UAAyC,OAAlC,AAAyC,EAA/B,SAAS,EACK,UAA/B,AAAyC,OAAlC,AAAyC,EAA/B,SAAS,GAET,UAAU,CAA3B,GACoC,UAA/B,OAAO,AAPE,EAOQ,SAAS,CAIrC,CAEA,SAAS,EAAqB,CAAc,QAC1C,CAAI,CAAC,GAA0B,UAAU,AAA3B,OAAO,AAA2B,GAGpB,UAAxB,OAAO,EAAU,EAAE,GAAiB,CAAC,EAAU,EAAE,CAAC,IAAI,IAAI,CACvC,MAD8C,KACjE,EAAU,IAAI,EAAoC,WAAnB,EAAU,IAAI,AAAK,GAAU,AAC9B,OADqC,GACnE,AAAwC,OAAjC,AAAwC,EAA9B,QAAQ,EACM,UAA/B,AAAyC,OAAlC,AAAyC,EAA/B,SAAS,EAC1B,AAA+B,UAAU,OAAlC,AAAyC,EAA/B,SAAS,QACE,IAA5B,EAAU,aAAa,EAAqD,UAAnC,OAAO,EAAU,aAAa,AAAK,GAAU,CAEnE,MAF0E,IAEhE,CAA7B,EAAU,IAAI,EACT,AAA+B,iBAAxB,AATE,EASQ,SAAS,CAIrC,CAEA,eAAe,EAAyB,CAA8B,EACpE,IAAM,EAAsB,MAAM,GAClC,OAAM,EAAA,OAAE,CAAC,SAAS,CAAC,EAAqB,KAAK,SAAS,CAAC,EAAU,KAAM,GAAI,QAC7E,CAEA,eAAe,IACb,IAAM,EAAsB,MAAM,IAElC,GAAI,CACF,IAAM,EAAU,MAAM,EAAA,OAAE,CAAC,QAAQ,CAAC,EAAqB,SACjD,EAAS,KAAK,KAAK,CAAC,GAE1B,GAAI,MAAM,OAAO,CAAC,GAChB,MADyB,CAClB,EAAO,MAAM,CAAC,GAGvB,GAAI,CAAC,GAA4B,UAAlB,AAA4B,OAArB,EACpB,MAAO,EAAE,CAIX,IAAM,EAAiC,EAAE,CAEzC,GAAI,EAA2B,EAAa,MAAM,CAAE,UAAW,CAC7D,IAAM,EAAW,EAAa,MAAM,CACpC,EAAS,IAAI,CAAC,CACZ,GAAI,IACJ,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,CAC7B,cAAe,EAAuB,SACxC,EACF,CAEA,GAAI,EAA2B,EAAa,MAAM,CAAE,UAAW,CAC7D,IAAM,EAAW,AAhBE,EAgBW,MAAM,CACpC,EAAS,IAAI,CAAC,CACZ,GAAI,IACJ,KAAM,SACN,SAAU,EAAS,QAAQ,CAC3B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,CAC7B,UAAW,EAAS,SAAS,CAC7B,cAAe,EAAuB,SACxC,EACF,CAMA,OAJI,EAAS,MAAM,CAAG,GAAG,AACvB,MAAM,EAAyB,GAG1B,CACT,CAAE,MAAO,EAAO,CACd,GAAK,GAAiC,OAAS,SAC7C,CADuD,KAChD,EAAE,CAIX,OADA,QAAQ,KAAK,CAAC,wCAAyC,GAChD,EAAE,AACX,CACF,CAEO,eAAe,IAGpB,MAAO,CAFU,MAAM,GAAA,EAGpB,GAAG,CAAC,GACJ,IAAI,CAAC,CAAC,EAAG,IAAM,EAAE,SAAS,CAAC,aAAa,CAAC,EAAE,SAAS,EACzD,CAEO,eAAe,EAAkB,CAAU,EAEhD,IAAM,EAAQ,CADG,MAAM,GAAA,EACA,IAAI,CAAE,AAAD,GAAgB,EAAW,EAAE,GAAK,GAC9D,OAAO,EAAQ,EAAa,GAAS,IACvC,CAEO,eAAe,EAAmB,CAAU,EAEjD,IAAM,EAAQ,CADG,MAAM,GAAA,EACA,IAAI,CAAC,AAAC,GAAe,EAAW,EAAE,GAAK,GAC9D,GAAI,CAAC,EACH,KADU,EACH,KAGT,IAAM,EAAS,MAAM,WACrB,AAAK,EAIE,EAJH,AAIU,IAJD,OAIY,CAAC,EAAc,EAA4B,IAH3D,IAIX,CAEA,eAAe,EAAkB,CAAa,EAC5C,GAAI,CACF,IAAM,EAAW,MAAM,MAAM,8BAA+B,CAC1D,QAAS,CACP,cAAe,CAAC,OAAO,EAAE,EAAA,CAAO,CAChC,OAAQ,8BACR,uBAAwB,YAC1B,CACF,GAEA,GAAI,CAAC,EAAS,EAAE,CAAE,CAChB,GAAwB,KAAK,CAAzB,EAAS,MAAM,CACjB,MAAO,CAAE,OAAO,EAAO,MAAO,kCAAmC,EAEnE,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,oBAAoB,EAAE,EAAS,MAAM,CAAC,CAAC,CAAC,AAAC,CAC1E,CAEA,IAAM,EAAO,MAAM,EAAS,IAAI,GAC1B,EAAkC,UAAvB,OAAO,GAAM,MAAqB,EAAK,KAAK,CAAG,KAChE,GAAI,CAAC,EACH,MAAO,CAAE,CADI,MACG,EAAO,MAAO,iDAAkD,EAGlF,MAAO,CAAE,OAAO,WAAM,CAAS,CACjC,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,+BAA+B,EAAG,EAAgB,OAAO,CAAA,CAAE,AAAC,CAC7F,CACF,CAEA,eAAe,EAAkB,CAAiB,CAAE,CAAa,EAC/D,GAAI,CACF,IAAM,EAAgB,EAAyB,GACzC,EAAW,MAAM,MAAM,CAAA,EAAG,EAAc,YAAY,CAAC,CAAE,CAC3D,QAAS,CACP,gBAAiB,CACnB,CACF,GAEA,GAAI,CAAC,EAAS,EAAE,CAAE,CAChB,GAAwB,KAAK,CAAzB,EAAS,MAAM,CACjB,MAAO,CAAE,OAAO,EAAO,MAAO,kCAAmC,EAEnE,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,oBAAoB,EAAE,EAAS,MAAM,CAAC,CAAC,CAAC,AAAC,CAC1E,CAEA,IAAM,EAAO,MAAM,EAAS,IAAI,GAC1B,EAAqC,UAA1B,OAAO,GAAM,SAAwB,EAAK,QAAQ,CAAG,KACtE,GAAI,CAAC,EACH,MAAO,CAAE,CADI,MACG,EAAO,MAAO,iDAAkD,EAGlF,MAAO,CAAE,OAAO,WAAM,CAAS,CACjC,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,OAAO,EAAO,MAAO,CAAC,+BAA+B,EAAG,EAAgB,OAAO,CAAA,CAAE,AAAC,CAC7F,CACF,CAEO,eAAe,EAAuB,CAAa,EACxD,IAKI,EALE,EAAe,EAAM,IAAI,GAC/B,GAAI,CAAC,EACH,MAAO,CAAE,KADQ,GACC,GAAO,MAAO,2BAA4B,EAI9D,GAAI,CACF,EAAS,MAAM,GACjB,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAO,AAAC,CAC3D,CAEA,IAAM,EAAe,MAAM,EAAkB,GAC7C,GAAI,CAAC,EAAa,KAAK,EAAI,CAAC,EAAa,QAAQ,CAC/C,CADiD,KAC1C,CAAE,SAAS,EAAO,MAAO,EAAa,KAAK,EAAI,gCAAiC,EAGzF,IAAM,EAAW,MAAM,IAMvB,GALkB,CAKd,CALuB,IAAI,CAAC,AAAC,GACX,EAIP,SAJb,EAAW,IAAI,EACZ,EAAW,QAAQ,GAAK,EAAa,QAAQ,EAIhD,MAAO,CAAE,QAAS,GAAO,MAAO,CAAC,wBAAwB,EAAE,EAAa,QAAQ,CAAC,gBAAgB,CAAC,AAAC,EAGrG,IAAM,EAAK,IACL,EAAM,IAAI,OAAO,WAAW,GAC5B,EAAgB,EAAwB,EAE9C,OAAM,EAAO,WAAW,CAAC,EAAc,EAAe,GAEtD,IAAM,EAA8B,IAClC,EACA,KAAM,SACN,SAAU,EAAa,QAAQ,CAC/B,UAAW,EACX,UAAW,gBACX,CACF,EAKA,OAHA,EAAS,IAAI,CAAC,GACd,MAAM,EAAyB,GAExB,CACL,SAAS,EACT,WAAY,CACV,GAAI,EAAQ,EAAE,CACd,KAAM,SACN,SAAU,EAAQ,QAAQ,CAC1B,UAAW,EAAQ,SAAS,CAC5B,UAAW,EAAQ,SAAS,AAC9B,CACF,CACF,CAEO,eAAe,EACpB,CAAiB,CACjB,CAAa,EAEb,IAiBI,EAjBE,EAAsB,EAAyB,GAC/C,EAAe,EAAM,IAAI,GAE/B,GAAI,CAAC,EACH,MAAO,CAAE,SAAS,EAAO,CADD,KACQ,gCAAiC,EAGnE,GAAI,CACF,IAAI,IAAI,EACV,CAAE,KAAM,CACN,MAAO,CAAE,SAAS,EAAO,MAAO,wCAAyC,CAC3E,CAEA,GAAI,CAAC,EACH,MAAO,CAAE,KADQ,IACC,EAAO,MAAO,2BAA4B,EAI9D,GAAI,CACF,EAAS,MAAM,GACjB,CAAE,MAAO,EAAO,CACd,MAAO,CAAE,SAAS,EAAO,MAAQ,EAAgB,OAAO,AAAC,CAC3D,CAEA,IAAM,EAAe,MAAM,EAAkB,EAAqB,GAClE,GAAI,CAAC,EAAa,KAAK,EAAI,CAAC,EAAa,QAAQ,CAC/C,CADiD,KAC1C,CAAE,SAAS,EAAO,MAAO,EAAa,KAAK,EAAI,gCAAiC,EAGzF,IAAM,EAAW,MAAM,IAOvB,GANkB,CAMd,CANuB,IAAI,CAAC,AAAC,GACX,EAKP,SALb,EAAW,IAAI,EACZ,EAAW,QAAQ,GAAK,EAAa,QAAQ,EAC7C,EAAW,SAAS,GAAK,GAI5B,MAAO,CACL,QAAS,GACT,MAAO,CAAC,wBAAwB,EAAE,EAAa,QAAQ,CAAC,IAAI,EAAE,EAAoB,gBAAgB,CAAC,AACrG,EAGF,IAAM,EAAK,IACL,EAAM,IAAI,OAAO,WAAW,GAC5B,EAAgB,EAAwB,EAE9C,OAAM,EAAO,WAAW,CAAC,EAAc,EAAe,GAEtD,IAAM,EAA8B,IAClC,EACA,KAAM,SACN,SAAU,EAAa,QAAQ,CAC/B,UAAW,EACX,UAAW,EACX,UAAW,gBACX,CACF,EAKA,OAHA,EAAS,IAAI,CAAC,GACd,MAAM,EAAyB,GAExB,CACL,SAAS,EACT,WAAY,CACV,GAAI,EAAQ,EAAE,CACd,KAAM,SACN,SAAU,EAAQ,QAAQ,CAC1B,UAAW,EAAQ,SAAS,EAAI,EAChC,UAAW,EAAQ,SAAS,CAC5B,UAAW,EAAQ,SAAS,AAC9B,CACF,CACF,CAEO,eAAe,EAAiB,CAAU,EAC/C,IAAM,EAAW,MAAM,IACjB,EAAQ,EAAS,SAAS,CAAC,AAAC,GAAe,EAAW,EAAE,GAAK,GAEnE,GAAc,CAAC,GAAG,CAAd,EACF,MAAO,CAAE,SAAS,EAAO,MAAO,uBAAwB,EAG1D,IAAM,EAAa,CAAQ,CAAC,EAAM,CAClC,EAAS,MAAM,CAAC,EAAO,GACvB,MAAM,EAAyB,GAE/B,IAAM,EAAS,MAAM,IAKrB,OAJI,GACF,KADU,CACJ,EAAO,cAAc,CAAC,EAAc,EAA4B,IAGjE,CAAE,SAAS,CAAK,CACzB,sMCzdA,IAAA,EAAA,EAAA,CAAA,CAAA,OAOA,EAAA,EAAA,CAAA,CAAA,OAEA,EAAA,EAAA,CAAA,CAAA","ignoreList":[0,1]}
@@ -1,3 +1,3 @@
1
- module.exports=[72131,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].React},38783,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].ReactServerDOMTurbopackClient},9270,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored.contexts.AppRouterContext},36313,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored.contexts.HooksClientContext},18341,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored.contexts.ServerInsertedHtml},35112,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].ReactDOM},18622,(a,b,c)=>{b.exports=a.x("next/dist/compiled/next-server/app-page-turbo.runtime.prod.js",()=>require("next/dist/compiled/next-server/app-page-turbo.runtime.prod.js"))},56704,(a,b,c)=>{b.exports=a.x("next/dist/server/app-render/work-async-storage.external.js",()=>require("next/dist/server/app-render/work-async-storage.external.js"))},32319,(a,b,c)=>{b.exports=a.x("next/dist/server/app-render/work-unit-async-storage.external.js",()=>require("next/dist/server/app-render/work-unit-async-storage.external.js"))},20635,(a,b,c)=>{b.exports=a.x("next/dist/server/app-render/action-async-storage.external.js",()=>require("next/dist/server/app-render/action-async-storage.external.js"))},42602,(a,b,c)=>{"use strict";b.exports=a.r(18622)},87924,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].ReactJsxRuntime},37047,a=>{"use strict";let b=(0,a.i(70106).default)("key-round",[["path",{d:"M2.586 17.414A2 2 0 0 0 2 18.828V21a1 1 0 0 0 1 1h3a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h1a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h.172a2 2 0 0 0 1.414-.586l.814-.814a6.5 6.5 0 1 0-4-4z",key:"1s6t7t"}],["circle",{cx:"16.5",cy:"7.5",r:".5",fill:"currentColor",key:"w0ekpg"}]]);a.s(["KeyRound",()=>b],37047)},16963,92721,a=>{"use strict";var b=a.i(5050);let c=(0,b.createServerReference)("00b4036ea2f98f15738c5b703ee699c2bc74ed090b",b.callServer,void 0,b.findSourceMapURL,"listAgentApiCredentials");a.s(["listAgentApiCredentials",()=>c],16963);let d=(0,b.createServerReference)("0051a3b92b920bfcdb376cb6b6ed78967546f78dc8",b.callServer,void 0,b.findSourceMapURL,"listCredentials");a.s(["listCredentials",()=>d],92721)}];
1
+ module.exports=[72131,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].React},38783,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].ReactServerDOMTurbopackClient},9270,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored.contexts.AppRouterContext},36313,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored.contexts.HooksClientContext},18341,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored.contexts.ServerInsertedHtml},35112,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].ReactDOM},18622,(a,b,c)=>{b.exports=a.x("next/dist/compiled/next-server/app-page-turbo.runtime.prod.js",()=>require("next/dist/compiled/next-server/app-page-turbo.runtime.prod.js"))},56704,(a,b,c)=>{b.exports=a.x("next/dist/server/app-render/work-async-storage.external.js",()=>require("next/dist/server/app-render/work-async-storage.external.js"))},32319,(a,b,c)=>{b.exports=a.x("next/dist/server/app-render/work-unit-async-storage.external.js",()=>require("next/dist/server/app-render/work-unit-async-storage.external.js"))},20635,(a,b,c)=>{b.exports=a.x("next/dist/server/app-render/action-async-storage.external.js",()=>require("next/dist/server/app-render/action-async-storage.external.js"))},42602,(a,b,c)=>{"use strict";b.exports=a.r(18622)},87924,(a,b,c)=>{"use strict";b.exports=a.r(42602).vendored["react-ssr"].ReactJsxRuntime},37047,a=>{"use strict";let b=(0,a.i(70106).default)("key-round",[["path",{d:"M2.586 17.414A2 2 0 0 0 2 18.828V21a1 1 0 0 0 1 1h3a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h1a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h.172a2 2 0 0 0 1.414-.586l.814-.814a6.5 6.5 0 1 0-4-4z",key:"1s6t7t"}],["circle",{cx:"16.5",cy:"7.5",r:".5",fill:"currentColor",key:"w0ekpg"}]]);a.s(["KeyRound",()=>b],37047)},62358,86175,a=>{"use strict";var b=a.i(5050);let c=(0,b.createServerReference)("00f788a987802139e46a67eba5adb590c5fcd38ef1",b.callServer,void 0,b.findSourceMapURL,"listAgentApiCredentials");a.s(["listAgentApiCredentials",()=>c],62358);let d=(0,b.createServerReference)("0059895046be5f7d970c84173683f7146b15a9e827",b.callServer,void 0,b.findSourceMapURL,"listCredentials");a.s(["listCredentials",()=>d],86175)}];
2
2
 
3
- //# sourceMappingURL=%5Broot-of-the-server%5D__45338798._.js.map
3
+ //# sourceMappingURL=%5Broot-of-the-server%5D__5248b09d._.js.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react-server-dom-turbopack-client.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/contexts/app-router-context.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/contexts/hooks-client-context.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/contexts/server-inserted-html.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react-dom.ts","../../../../node_modules/next/src/server/route-modules/app-page/module.compiled.js","../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react-jsx-runtime.ts","../../../../node_modules/lucide-react/src/icons/key-round.ts","../../../../src/app/actions/data%3Af2b6d8%20%3Ctext/javascript%3E","../../../../src/app/actions/data%3Ad2124f%20%3Ctext/javascript%3E"],"sourcesContent":["module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.React\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.ReactServerDOMTurbopackClient\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['contexts'].AppRouterContext\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['contexts'].HooksClientContext\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['contexts'].ServerInsertedHtml\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.ReactDOM\n","if (process.env.NEXT_RUNTIME === 'edge') {\n module.exports = require('next/dist/server/route-modules/app-page/module.js')\n} else {\n if (process.env.__NEXT_EXPERIMENTAL_REACT) {\n if (process.env.NODE_ENV === 'development') {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo-experimental.runtime.dev.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page-experimental.runtime.dev.js')\n }\n } else {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo-experimental.runtime.prod.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page-experimental.runtime.prod.js')\n }\n }\n } else {\n if (process.env.NODE_ENV === 'development') {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo.runtime.dev.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page.runtime.dev.js')\n }\n } else {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo.runtime.prod.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page.runtime.prod.js')\n }\n }\n }\n}\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.ReactJsxRuntime\n","import createLucideIcon from '../createLucideIcon';\nimport { IconNode } from '../types';\n\nexport const __iconNode: IconNode = [\n [\n 'path',\n {\n d: 'M2.586 17.414A2 2 0 0 0 2 18.828V21a1 1 0 0 0 1 1h3a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h1a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h.172a2 2 0 0 0 1.414-.586l.814-.814a6.5 6.5 0 1 0-4-4z',\n key: '1s6t7t',\n },\n ],\n ['circle', { cx: '16.5', cy: '7.5', r: '.5', fill: 'currentColor', key: 'w0ekpg' }],\n];\n\n/**\n * @component @name KeyRound\n * @description Lucide SVG icon component, renders SVG Element with children.\n *\n * @preview ![img](data:image/svg+xml;base64,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) - https://lucide.dev/icons/key-round\n * @see https://lucide.dev/guide/packages/lucide-react - Documentation\n *\n * @param {Object} props - Lucide icons props and any valid SVG attribute\n * @returns {JSX.Element} JSX Element\n *\n */\nconst KeyRound = createLucideIcon('key-round', __iconNode);\n\nexport default KeyRound;\n","/* __next_internal_action_entry_do_not_use__ [{\"00b4036ea2f98f15738c5b703ee699c2bc74ed090b\":\"listAgentApiCredentials\"},\"src/app/actions/credentials.ts\",\"\"] */\"use turbopack no side effects\";import{createServerReference,callServer,findSourceMapURL}from\"private-next-rsc-action-client-wrapper\";const $$RSC_SERVER_ACTION_3=/*#__PURE__*/createServerReference(\"00b4036ea2f98f15738c5b703ee699c2bc74ed090b\",callServer,void 0,findSourceMapURL,\"listAgentApiCredentials\");export{$$RSC_SERVER_ACTION_3 as listAgentApiCredentials};","/* __next_internal_action_entry_do_not_use__ [{\"0051a3b92b920bfcdb376cb6b6ed78967546f78dc8\":\"listCredentials\"},\"src/app/actions/credentials.ts\",\"\"] */\"use turbopack no side effects\";import{createServerReference,callServer,findSourceMapURL}from\"private-next-rsc-action-client-wrapper\";const $$RSC_SERVER_ACTION_0=/*#__PURE__*/createServerReference(\"0051a3b92b920bfcdb376cb6b6ed78967546f78dc8\",callServer,void 0,findSourceMapURL,\"listCredentials\");export{$$RSC_SERVER_ACTION_0 as listCredentials};"],"names":["module","exports","require","vendored","React","ReactServerDOMTurbopackClient","AppRouterContext","HooksClientContext","ServerInsertedHtml","ReactDOM","process","env","NEXT_RUNTIME","__NEXT_EXPERIMENTAL_REACT","NODE_ENV","TURBOPACK","ReactJsxRuntime"],"mappings":"6CAAAA,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEC,KAAK,+BCF9BJ,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEE,6BAA6B,8BCFtDL,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,QAAW,CAACG,gBAAgB,+BCFvCN,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,QAAW,CAACI,kBAAkB,+BCFzCP,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,QAAW,CAACK,kBAAkB,+BCFzCR,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEM,QAAQ,8sBCwBzBT,GAAOC,OAAO,CAAGC,EAAQ,CAAA,CAAA,IAAA,gCC1BjCF,GAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEa,eAAe,yBCuBxC,CAAA,CAAA,CAAA,CAAA,AAAM,CAAN,CAAM,CAAA,EAAW,CAAA,CAAA,CAAX,AAAW,CAAX,AAAW,CAAX,AAAW,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,GAAA,EAAiB,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAtBE,CAsBW,AArB7C,CACE,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CAAA,AApB3C,CACA,AAmB2C,CAlBzC,AAkByC,CAlBzC,AAkBmD,CAlBhD,AAkBgD,CAlBhD,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CACH,GAAA,CAAA,AAAK,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,EAET,CACA,CAAC,QAAA,CAAA,AAAU,CAAA,AAAE,EAAA,CAAA,AAAI,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,AAAQ,CAAA,CAAA,CAAI,AAAJ,CAAI,CAAA,CAAA,CAAA,CAAA,CAAO,CAAA,CAAA,AAAG,CAAA,CAAA,CAAA,CAAA,CAAM,AAAN,CAAM,CAAA,CAAA,CAAA,CAAA,AAAM,cAAA,CAAA,AAAgB,CAAA,CAAA,CAAA,CAAA,AAAK,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAU,CAAA,CACpF,8DCZ8L,IAAA,EAAA,EAAA,CAAA,CAAA,MAAsG,IAAM,EAAmC,CAAA,EAAA,EAAA,iBAAb,IAAa,AAAqB,EAAC,KAAxB,wCAAqE,EAAA,UAAU,CAAC,KAAK,EAAE,EAAA,gBAAgB,CAAC,wECAvJ,IAAM,EAAmC,CAAA,EAAA,EAAA,iBAAb,IAAa,AAAqB,EAAC,KAAxB,wCAAqE,EAAA,UAAU,CAAC,KAAK,EAAE,EAAA,gBAAgB,CAAC","ignoreList":[0,1,2,3,4,5,6,7,8]}
1
+ {"version":3,"sources":["../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react-server-dom-turbopack-client.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/contexts/app-router-context.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/contexts/hooks-client-context.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/contexts/server-inserted-html.ts","../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react-dom.ts","../../../../node_modules/next/src/server/route-modules/app-page/module.compiled.js","../../../../node_modules/next/src/server/route-modules/app-page/vendored/ssr/react-jsx-runtime.ts","../../../../node_modules/lucide-react/src/icons/key-round.ts","../../../../src/app/actions/data%3A05cba4%20%3Ctext/javascript%3E","../../../../src/app/actions/data%3A47ea90%20%3Ctext/javascript%3E"],"sourcesContent":["module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.React\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.ReactServerDOMTurbopackClient\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['contexts'].AppRouterContext\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['contexts'].HooksClientContext\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['contexts'].ServerInsertedHtml\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.ReactDOM\n","if (process.env.NEXT_RUNTIME === 'edge') {\n module.exports = require('next/dist/server/route-modules/app-page/module.js')\n} else {\n if (process.env.__NEXT_EXPERIMENTAL_REACT) {\n if (process.env.NODE_ENV === 'development') {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo-experimental.runtime.dev.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page-experimental.runtime.dev.js')\n }\n } else {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo-experimental.runtime.prod.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page-experimental.runtime.prod.js')\n }\n }\n } else {\n if (process.env.NODE_ENV === 'development') {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo.runtime.dev.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page.runtime.dev.js')\n }\n } else {\n if (process.env.TURBOPACK) {\n module.exports = require('next/dist/compiled/next-server/app-page-turbo.runtime.prod.js')\n } else {\n module.exports = require('next/dist/compiled/next-server/app-page.runtime.prod.js')\n }\n }\n }\n}\n","module.exports = (\n require('../../module.compiled') as typeof import('../../module.compiled')\n).vendored['react-ssr']!.ReactJsxRuntime\n","import createLucideIcon from '../createLucideIcon';\nimport { IconNode } from '../types';\n\nexport const __iconNode: IconNode = [\n [\n 'path',\n {\n d: 'M2.586 17.414A2 2 0 0 0 2 18.828V21a1 1 0 0 0 1 1h3a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h1a1 1 0 0 0 1-1v-1a1 1 0 0 1 1-1h.172a2 2 0 0 0 1.414-.586l.814-.814a6.5 6.5 0 1 0-4-4z',\n key: '1s6t7t',\n },\n ],\n ['circle', { cx: '16.5', cy: '7.5', r: '.5', fill: 'currentColor', key: 'w0ekpg' }],\n];\n\n/**\n * @component @name KeyRound\n * @description Lucide SVG icon component, renders SVG Element with children.\n *\n * @preview ![img](data:image/svg+xml;base64,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) - https://lucide.dev/icons/key-round\n * @see https://lucide.dev/guide/packages/lucide-react - Documentation\n *\n * @param {Object} props - Lucide icons props and any valid SVG attribute\n * @returns {JSX.Element} JSX Element\n *\n */\nconst KeyRound = createLucideIcon('key-round', __iconNode);\n\nexport default KeyRound;\n","/* __next_internal_action_entry_do_not_use__ [{\"00f788a987802139e46a67eba5adb590c5fcd38ef1\":\"listAgentApiCredentials\"},\"src/app/actions/credentials.ts\",\"\"] */\"use turbopack no side effects\";import{createServerReference,callServer,findSourceMapURL}from\"private-next-rsc-action-client-wrapper\";const $$RSC_SERVER_ACTION_3=/*#__PURE__*/createServerReference(\"00f788a987802139e46a67eba5adb590c5fcd38ef1\",callServer,void 0,findSourceMapURL,\"listAgentApiCredentials\");export{$$RSC_SERVER_ACTION_3 as listAgentApiCredentials};","/* __next_internal_action_entry_do_not_use__ [{\"0059895046be5f7d970c84173683f7146b15a9e827\":\"listCredentials\"},\"src/app/actions/credentials.ts\",\"\"] */\"use turbopack no side effects\";import{createServerReference,callServer,findSourceMapURL}from\"private-next-rsc-action-client-wrapper\";const $$RSC_SERVER_ACTION_0=/*#__PURE__*/createServerReference(\"0059895046be5f7d970c84173683f7146b15a9e827\",callServer,void 0,findSourceMapURL,\"listCredentials\");export{$$RSC_SERVER_ACTION_0 as listCredentials};"],"names":["module","exports","require","vendored","React","ReactServerDOMTurbopackClient","AppRouterContext","HooksClientContext","ServerInsertedHtml","ReactDOM","process","env","NEXT_RUNTIME","__NEXT_EXPERIMENTAL_REACT","NODE_ENV","TURBOPACK","ReactJsxRuntime"],"mappings":"6CAAAA,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEC,KAAK,+BCF9BJ,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEE,6BAA6B,8BCFtDL,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,QAAW,CAACG,gBAAgB,+BCFvCN,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,QAAW,CAACI,kBAAkB,+BCFzCP,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,QAAW,CAACK,kBAAkB,+BCFzCR,EAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEM,QAAQ,8sBCwBzBT,GAAOC,OAAO,CAAGC,EAAQ,CAAA,CAAA,IAAA,gCC1BjCF,GAAOC,OAAO,CACZC,EAAQ,CAAA,CAAA,IAAA,GACRC,QAAQ,CAAC,YAAY,CAAEa,eAAe,yBCuBxC,CAAA,CAAA,CAAA,CAAA,AAAM,CAAN,CAAM,CAAA,EAAW,CAAA,CAAA,CAAX,AAAW,CAAX,AAAW,CAAX,AAAW,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,GAAA,EAAiB,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAtBE,CAsBW,AArB7C,CACE,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CApB3C,AAoB2C,CAAA,AApB3C,CACA,AAmB2C,CAlBzC,AAkByC,CAlBzC,AAkBmD,CAlBhD,AAkBgD,CAlBhD,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CACH,GAAA,CAAA,AAAK,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,EAET,CACA,CAAC,QAAA,CAAA,AAAU,CAAA,AAAE,EAAA,CAAA,AAAI,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,AAAQ,CAAA,CAAA,CAAI,AAAJ,CAAI,CAAA,CAAA,CAAA,CAAA,CAAO,CAAA,CAAA,AAAG,CAAA,CAAA,CAAA,CAAA,CAAM,AAAN,CAAM,CAAA,CAAA,CAAA,CAAA,AAAM,cAAA,CAAA,AAAgB,CAAA,CAAA,CAAA,CAAA,AAAK,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAA,CAAU,CAAA,CACpF,8DCZ8L,IAAA,EAAA,EAAA,CAAA,CAAA,MAAsG,IAAM,EAAmC,CAAA,EAAA,EAAA,iBAAb,IAAa,AAAqB,EAAC,KAAxB,wCAAqE,EAAA,UAAU,CAAC,KAAK,EAAE,EAAA,gBAAgB,CAAC,wECAvJ,IAAM,EAAmC,CAAA,EAAA,EAAA,iBAAb,IAAa,AAAqB,EAAC,KAAxB,wCAAqE,EAAA,UAAU,CAAC,KAAK,EAAE,EAAA,gBAAgB,CAAC","ignoreList":[0,1,2,3,4,5,6,7,8]}
@@ -1,4 +1,4 @@
1
1
  module.exports=[24868,(a,b,c)=>{b.exports=a.x("fs/promises",()=>require("fs/promises"))},46786,(a,b,c)=>{b.exports=a.x("os",()=>require("os"))},37936,(a,b,c)=>{"use strict";Object.defineProperty(c,"__esModule",{value:!0}),Object.defineProperty(c,"registerServerReference",{enumerable:!0,get:function(){return d.registerServerReference}});let d=a.r(11857)},70798,a=>{"use strict";var b=a.i(24868),c=a.i(46786),d=a.i(14747);let e="viba-git-credentials",f=null,g=null,h=!1;function i(){return g?`Secure credential storage is unavailable: ${g}`:"Secure credential storage is unavailable in this runtime."}async function j(){return f||(f=a.A(45581).then(a=>a.default??a).catch(a=>(g=a instanceof Error?a.message:String(a),h||(h=!0,console.warn(`[credentials] ${i()}`)),null))),f}async function k(){let a=await j();if(!a)throw Error(i());return a}function l(){return`${Date.now()}-${Math.random().toString(36).slice(2,9)}`}function m(a){return a.trim().replace(/\/$/,"")}function n(a){return`credential-${a}`}function o(a){return`credential-${a}`}function p(a){return a.keytarAccount||n(a.id)}function q(a){return"gitlab"===a.type?{id:a.id,type:"gitlab",username:a.username,serverUrl:a.serverUrl||"https://gitlab.com",createdAt:a.createdAt,updatedAt:a.updatedAt}:{id:a.id,type:"github",username:a.username,createdAt:a.createdAt,updatedAt:a.updatedAt}}async function r(){let a=d.default.join(c.default.homedir(),".viba");return await b.default.mkdir(a,{recursive:!0}),d.default.join(a,"credentials.json")}function s(a,b){return!!a&&"object"==typeof a&&a.type===b&&"string"==typeof a.username&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&("gitlab"!==b||"string"==typeof a.serverUrl)}function t(a){return!!a&&"object"==typeof a&&"string"==typeof a.id&&!!a.id.trim()&&("github"===a.type||"gitlab"===a.type)&&"string"==typeof a.username&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&(void 0===a.keytarAccount||"string"==typeof a.keytarAccount)&&("gitlab"!==a.type||"string"==typeof a.serverUrl)}async function u(a){let c=await r();await b.default.writeFile(c,JSON.stringify(a,null,2),"utf-8")}async function v(){let a=await r();try{let c=await b.default.readFile(a,"utf-8"),d=JSON.parse(c);if(Array.isArray(d))return d.filter(t);if(!d||"object"!=typeof d)return[];let e=[];if(s(d.github,"github")){let a=d.github;e.push({id:l(),type:"github",username:a.username,createdAt:a.createdAt,updatedAt:a.updatedAt,keytarAccount:o("github")})}if(s(d.gitlab,"gitlab")){let a=d.gitlab;e.push({id:l(),type:"gitlab",username:a.username,serverUrl:a.serverUrl,createdAt:a.createdAt,updatedAt:a.updatedAt,keytarAccount:o("gitlab")})}return e.length>0&&await u(e),e}catch(a){if(a?.code==="ENOENT")return[];return console.error("Failed to parse credentials metadata:",a),[]}}async function w(){return(await v()).map(q).sort((a,b)=>b.updatedAt.localeCompare(a.updatedAt))}async function x(a){let b=(await v()).find(b=>b.id===a);return b?q(b):null}async function y(a){let b=(await v()).find(b=>b.id===a);if(!b)return null;let c=await j();return c?c.getPassword(e,p(b)):null}async function z(a){try{let b=await fetch("https://api.github.com/user",{headers:{Authorization:`Bearer ${a}`,Accept:"application/vnd.github+json","X-GitHub-Api-Version":"2022-11-28"}});if(!b.ok){if(401===b.status)return{valid:!1,error:"Invalid or expired GitHub token."};return{valid:!1,error:`GitHub API returned ${b.status}.`}}let c=await b.json(),d="string"==typeof c?.login?c.login:null;if(!d)return{valid:!1,error:"GitHub API response did not include a username."};return{valid:!0,username:d}}catch(a){return{valid:!1,error:`Failed to verify GitHub token: ${a.message}`}}}async function A(a,b){try{let c=m(a),d=await fetch(`${c}/api/v4/user`,{headers:{"PRIVATE-TOKEN":b}});if(!d.ok){if(401===d.status)return{valid:!1,error:"Invalid or expired GitLab token."};return{valid:!1,error:`GitLab API returned ${d.status}.`}}let e=await d.json(),f="string"==typeof e?.username?e.username:null;if(!f)return{valid:!1,error:"GitLab API response did not include a username."};return{valid:!0,username:f}}catch(a){return{valid:!1,error:`Failed to verify GitLab token: ${a.message}`}}}async function B(a){let b,c=a.trim();if(!c)return{success:!1,error:"GitHub token is required."};try{b=await k()}catch(a){return{success:!1,error:a.message}}let d=await z(c);if(!d.valid||!d.username)return{success:!1,error:d.error||"Failed to verify GitHub token."};let f=await v();if(f.find(a=>"github"===a.type&&a.username===d.username))return{success:!1,error:`A GitHub credential for ${d.username} already exists.`};let g=l(),h=new Date().toISOString(),i=n(g);await b.setPassword(e,i,c);let j={id:g,type:"github",username:d.username,createdAt:h,updatedAt:h,keytarAccount:i};return f.push(j),await u(f),{success:!0,credential:{id:j.id,type:"github",username:j.username,createdAt:j.createdAt,updatedAt:j.updatedAt}}}async function C(a,b){let c,d=m(a),f=b.trim();if(!d)return{success:!1,error:"GitLab server URL is required."};try{new URL(d)}catch{return{success:!1,error:"GitLab server URL must be a valid URL."}}if(!f)return{success:!1,error:"GitLab token is required."};try{c=await k()}catch(a){return{success:!1,error:a.message}}let g=await A(d,f);if(!g.valid||!g.username)return{success:!1,error:g.error||"Failed to verify GitLab token."};let h=await v();if(h.find(a=>"gitlab"===a.type&&a.username===g.username&&a.serverUrl===d))return{success:!1,error:`A GitLab credential for ${g.username} on ${d} already exists.`};let i=l(),j=new Date().toISOString(),o=n(i);await c.setPassword(e,o,f);let p={id:i,type:"gitlab",username:g.username,serverUrl:d,createdAt:j,updatedAt:j,keytarAccount:o};return h.push(p),await u(h),{success:!0,credential:{id:p.id,type:"gitlab",username:p.username,serverUrl:p.serverUrl||d,createdAt:p.createdAt,updatedAt:p.updatedAt}}}async function D(a){let b=await v(),c=b.findIndex(b=>b.id===a);if(-1===c)return{success:!1,error:"Credential not found."};let d=b[c];b.splice(c,1),await u(b);let f=await j();return f&&await f.deletePassword(e,p(d)),{success:!0}}a.s(["createGitHubCredential",()=>B,"createGitLabCredential",()=>C,"deleteCredential",()=>D,"getAllCredentials",()=>w,"getCredentialById",()=>x,"getCredentialToken",()=>y])},66085,a=>{"use strict";var b=a.i(24868),c=a.i(46786),d=a.i(14747);let e="viba-agent-api-credentials",f=["codex"],g=null,h=null,i=!1;function j(a){return f.includes(a)}function k(){return h?`Secure credential storage is unavailable: ${h}`:"Secure credential storage is unavailable in this runtime."}async function l(){return g||(g=a.A(45581).then(a=>a.default??a).catch(a=>(h=a instanceof Error?a.message:String(a),i||(i=!0,console.warn(`[agent-api-credentials] ${k()}`)),null))),g}async function m(){let a=await l();if(!a)throw Error(k());return a}function n(a){return`agent-api-${a}`}function o(a){return a.keytarAccount||n(a.agent)}function p(a){return{agent:a.agent,apiProxy:a.apiProxy,createdAt:a.createdAt,updatedAt:a.updatedAt}}function q(a){return!!a&&"object"==typeof a&&"string"==typeof a.agent&&!!j(a.agent)&&"string"==typeof a.createdAt&&"string"==typeof a.updatedAt&&(void 0===a.apiProxy||"string"==typeof a.apiProxy)&&(void 0===a.keytarAccount||"string"==typeof a.keytarAccount)}async function r(){let a=d.default.join(c.default.homedir(),".viba");return await b.default.mkdir(a,{recursive:!0}),d.default.join(a,"agent-api-configs.json")}async function s(a){let c=await r();await b.default.writeFile(c,JSON.stringify(a,null,2),"utf-8")}async function t(){let a=await r();try{let c=await b.default.readFile(a,"utf-8"),d=JSON.parse(c);if(Array.isArray(d))return d.filter(q);if(!d||"object"!=typeof d)return[];let e=Object.entries(d).filter(([a])=>j(a)).map(([a,b])=>b&&"object"==typeof b?void 0===b.agent?{...b,agent:a}:b:null).filter(q);return e.length>0&&await s(e),e}catch(a){if(a?.code==="ENOENT")return[];return console.error("Failed to parse agent API credential metadata:",a),[]}}async function u(){return(await t()).map(p).sort((a,b)=>b.updatedAt.localeCompare(a.updatedAt))}async function v(a,b,c){let d,f;if(!j(a))return{success:!1,error:`Unsupported agent: ${a}`};let g=b.trim();if(!g)return{success:!1,error:"API key is required."};try{d=function(a){let b=a.trim();if(b){try{new URL(b)}catch{throw Error("API proxy must be a valid URL.")}return b}}(c)}catch(a){return{success:!1,error:a.message}}try{f=await m()}catch(a){return{success:!1,error:a.message}}let h=await t(),i=new Date().toISOString(),k=h.findIndex(b=>b.agent===a),l=k>=0?o(h[k]):n(a);if(await f.setPassword(e,l,g),k>=0){let a=h[k];h[k]={...a,apiProxy:d,updatedAt:i,keytarAccount:l}}else h.push({agent:a,apiProxy:d,createdAt:i,updatedAt:i,keytarAccount:l});await s(h);let q=h.find(b=>b.agent===a);return q?{success:!0,credential:p(q)}:{success:!1,error:"Failed to persist agent API credential."}}async function w(a){if(!j(a))return{success:!1,error:`Unsupported agent: ${a}`};let b=await t(),c=b.findIndex(b=>b.agent===a);if(-1===c)return{success:!1,error:"Agent API credential not found."};let[d]=b.splice(c,1);await s(b);let f=await l();return f&&await f.deletePassword(e,o(d)),{success:!0}}async function x(a){if(!j(a))return null;let b=(await t()).find(b=>b.agent===a);if(!b)return null;let c=await l();if(!c)return null;let d=await c.getPassword(e,o(b));return d?{agent:b.agent,apiKey:d,apiProxy:b.apiProxy}:null}a.s(["createOrUpdateAgentApiCredential",()=>v,"deleteAgentApiCredential",()=>w,"getAgentApiCredentialSecret",()=>x,"getAllAgentApiCredentials",()=>u])},13095,(a,b,c)=>{"use strict";function d(a){for(let b=0;b<a.length;b++){let c=a[b];if("function"!=typeof c)throw Object.defineProperty(Error(`A "use server" file can only export async functions, found ${typeof c}.
2
- Read more: https://nextjs.org/docs/messages/invalid-use-server-value`),"__NEXT_ERROR_CODE",{value:"E352",enumerable:!1,configurable:!0})}}Object.defineProperty(c,"__esModule",{value:!0}),Object.defineProperty(c,"ensureServerEntryExports",{enumerable:!0,get:function(){return d}})},37359,a=>{"use strict";var b=a.i(37936),c=a.i(70798),d=a.i(66085);async function e(){try{let a=await (0,c.getAllCredentials)();return{success:!0,credentials:a}}catch(a){return console.error("Failed to list credentials:",a),{success:!1,error:"Failed to load credentials."}}}async function f(a){let b=await (0,c.createGitHubCredential)(a);return b.success&&b.credential?{success:!0,credential:b.credential}:{success:!1,error:b.error||"Failed to save GitHub credential."}}async function g(a,b){let d=await (0,c.createGitLabCredential)(a,b);return d.success&&d.credential?{success:!0,credential:d.credential}:{success:!1,error:d.error||"Failed to save GitLab credential."}}async function h(){try{let a=await (0,d.getAllAgentApiCredentials)();return{success:!0,credentials:a}}catch(a){return console.error("Failed to list agent API credentials:",a),{success:!1,error:"Failed to load agent API credentials."}}}async function i(a,b,c){let e=await (0,d.createOrUpdateAgentApiCredential)(a,b,c);return e.success&&e.credential?{success:!0,credential:e.credential}:{success:!1,error:e.error||"Failed to save agent API credential."}}async function j(a){try{let b=await (0,c.deleteCredential)(a);if(!b.success)return{success:!1,error:b.error||"Failed to remove credential."};return{success:!0}}catch(a){return console.error("Failed to remove credential:",a),{success:!1,error:"Failed to remove credential."}}}async function k(a){try{let b=await (0,d.deleteAgentApiCredential)(a);if(!b.success)return{success:!1,error:b.error||"Failed to remove agent API credential."};return{success:!0}}catch(a){return console.error("Failed to remove agent API credential:",a),{success:!1,error:"Failed to remove agent API credential."}}}(0,a.i(13095).ensureServerEntryExports)([e,f,g,h,i,j,k]),(0,b.registerServerReference)(e,"0051a3b92b920bfcdb376cb6b6ed78967546f78dc8",null),(0,b.registerServerReference)(f,"409348d36c78507d631779e660b4b42cdd9bad596c",null),(0,b.registerServerReference)(g,"60f7783080ede8def24e544e45972f78e85a68f145",null),(0,b.registerServerReference)(h,"00b4036ea2f98f15738c5b703ee699c2bc74ed090b",null),(0,b.registerServerReference)(i,"702257d7c64268d734cf7034bc86f712341ddd9b6a",null),(0,b.registerServerReference)(j,"408b2012a0ab921b59a00c1a6f7b4038ef09139290",null),(0,b.registerServerReference)(k,"4039d6b642806340055367f225542cd7e40aaae218",null),a.s(["listAgentApiCredentials",()=>h,"listCredentials",()=>e,"removeAgentApiCredential",()=>k,"removeCredential",()=>j,"saveAgentApiCredential",()=>i,"saveGitHubCredential",()=>f,"saveGitLabCredential",()=>g])},57891,a=>{"use strict";var b=a.i(37359);a.s([],24481),a.i(24481),a.s(["0051a3b92b920bfcdb376cb6b6ed78967546f78dc8",()=>b.listCredentials,"00b4036ea2f98f15738c5b703ee699c2bc74ed090b",()=>b.listAgentApiCredentials,"4039d6b642806340055367f225542cd7e40aaae218",()=>b.removeAgentApiCredential,"408b2012a0ab921b59a00c1a6f7b4038ef09139290",()=>b.removeCredential,"409348d36c78507d631779e660b4b42cdd9bad596c",()=>b.saveGitHubCredential,"60f7783080ede8def24e544e45972f78e85a68f145",()=>b.saveGitLabCredential,"702257d7c64268d734cf7034bc86f712341ddd9b6a",()=>b.saveAgentApiCredential],57891)},45581,a=>{a.v(b=>Promise.all(["server/chunks/ssr/[externals]_keytar_23140f5c._.js"].map(b=>a.l(b))).then(()=>b(83034)))}];
2
+ Read more: https://nextjs.org/docs/messages/invalid-use-server-value`),"__NEXT_ERROR_CODE",{value:"E352",enumerable:!1,configurable:!0})}}Object.defineProperty(c,"__esModule",{value:!0}),Object.defineProperty(c,"ensureServerEntryExports",{enumerable:!0,get:function(){return d}})},37359,a=>{"use strict";var b=a.i(37936),c=a.i(70798),d=a.i(66085);async function e(){try{let a=await (0,c.getAllCredentials)();return{success:!0,credentials:a}}catch(a){return console.error("Failed to list credentials:",a),{success:!1,error:"Failed to load credentials."}}}async function f(a){let b=await (0,c.createGitHubCredential)(a);return b.success&&b.credential?{success:!0,credential:b.credential}:{success:!1,error:b.error||"Failed to save GitHub credential."}}async function g(a,b){let d=await (0,c.createGitLabCredential)(a,b);return d.success&&d.credential?{success:!0,credential:d.credential}:{success:!1,error:d.error||"Failed to save GitLab credential."}}async function h(){try{let a=await (0,d.getAllAgentApiCredentials)();return{success:!0,credentials:a}}catch(a){return console.error("Failed to list agent API credentials:",a),{success:!1,error:"Failed to load agent API credentials."}}}async function i(a,b,c){let e=await (0,d.createOrUpdateAgentApiCredential)(a,b,c);return e.success&&e.credential?{success:!0,credential:e.credential}:{success:!1,error:e.error||"Failed to save agent API credential."}}async function j(a){try{let b=await (0,c.deleteCredential)(a);if(!b.success)return{success:!1,error:b.error||"Failed to remove credential."};return{success:!0}}catch(a){return console.error("Failed to remove credential:",a),{success:!1,error:"Failed to remove credential."}}}async function k(a){try{let b=await (0,d.deleteAgentApiCredential)(a);if(!b.success)return{success:!1,error:b.error||"Failed to remove agent API credential."};return{success:!0}}catch(a){return console.error("Failed to remove agent API credential:",a),{success:!1,error:"Failed to remove agent API credential."}}}(0,a.i(13095).ensureServerEntryExports)([e,f,g,h,i,j,k]),(0,b.registerServerReference)(e,"0059895046be5f7d970c84173683f7146b15a9e827",null),(0,b.registerServerReference)(f,"408d0413a7e2b53e29b3de1bb5edb388d7af7b6c3c",null),(0,b.registerServerReference)(g,"60639821e5c6ec13c50b35cb0a4a2c8b8e0b1a10f5",null),(0,b.registerServerReference)(h,"00f788a987802139e46a67eba5adb590c5fcd38ef1",null),(0,b.registerServerReference)(i,"70dfba5cb918f24cd0db4026a6167587584b87871c",null),(0,b.registerServerReference)(j,"4041b80033a71531b74b20ff6b4fc7130ca65f48e7",null),(0,b.registerServerReference)(k,"40a0a853fa0d398367fdf97332b450ac737400fb43",null),a.s(["listAgentApiCredentials",()=>h,"listCredentials",()=>e,"removeAgentApiCredential",()=>k,"removeCredential",()=>j,"saveAgentApiCredential",()=>i,"saveGitHubCredential",()=>f,"saveGitLabCredential",()=>g])},57891,a=>{"use strict";var b=a.i(37359);a.s([],24481),a.i(24481),a.s(["0059895046be5f7d970c84173683f7146b15a9e827",()=>b.listCredentials,"00f788a987802139e46a67eba5adb590c5fcd38ef1",()=>b.listAgentApiCredentials,"4041b80033a71531b74b20ff6b4fc7130ca65f48e7",()=>b.removeCredential,"408d0413a7e2b53e29b3de1bb5edb388d7af7b6c3c",()=>b.saveGitHubCredential,"40a0a853fa0d398367fdf97332b450ac737400fb43",()=>b.removeAgentApiCredential,"60639821e5c6ec13c50b35cb0a4a2c8b8e0b1a10f5",()=>b.saveGitLabCredential,"70dfba5cb918f24cd0db4026a6167587584b87871c",()=>b.saveAgentApiCredential],57891)},45581,a=>{a.v(b=>Promise.all(["server/chunks/ssr/[externals]_keytar_23140f5c._.js"].map(b=>a.l(b))).then(()=>b(83034)))}];
3
3
 
4
4
  //# sourceMappingURL=%5Broot-of-the-server%5D__59834c63._.js.map