zeitlich 0.2.41 → 0.2.42
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{activities-qUflxmfS.d.cts → activities-Coafq5zr.d.cts} +2 -2
- package/dist/{activities-D_g13S3y.d.ts → activities-CrN-ghLo.d.ts} +2 -2
- package/dist/adapters/sandbox/daytona/index.cjs +4 -23
- package/dist/adapters/sandbox/daytona/index.cjs.map +1 -1
- package/dist/adapters/sandbox/daytona/index.d.cts +18 -86
- package/dist/adapters/sandbox/daytona/index.d.ts +18 -86
- package/dist/adapters/sandbox/daytona/index.js +4 -23
- package/dist/adapters/sandbox/daytona/index.js.map +1 -1
- package/dist/adapters/sandbox/daytona/workflow.cjs +1 -7
- package/dist/adapters/sandbox/daytona/workflow.cjs.map +1 -1
- package/dist/adapters/sandbox/daytona/workflow.d.cts +9 -2
- package/dist/adapters/sandbox/daytona/workflow.d.ts +9 -2
- package/dist/adapters/sandbox/daytona/workflow.js +1 -7
- package/dist/adapters/sandbox/daytona/workflow.js.map +1 -1
- package/dist/adapters/sandbox/e2b/index.cjs +9 -0
- package/dist/adapters/sandbox/e2b/index.cjs.map +1 -1
- package/dist/adapters/sandbox/e2b/index.d.cts +13 -5
- package/dist/adapters/sandbox/e2b/index.d.ts +13 -5
- package/dist/adapters/sandbox/e2b/index.js +9 -1
- package/dist/adapters/sandbox/e2b/index.js.map +1 -1
- package/dist/adapters/sandbox/e2b/workflow.cjs.map +1 -1
- package/dist/adapters/sandbox/e2b/workflow.d.cts +4 -2
- package/dist/adapters/sandbox/e2b/workflow.d.ts +4 -2
- package/dist/adapters/sandbox/e2b/workflow.js.map +1 -1
- package/dist/adapters/sandbox/inmemory/index.cjs +11 -0
- package/dist/adapters/sandbox/inmemory/index.cjs.map +1 -1
- package/dist/adapters/sandbox/inmemory/index.d.cts +11 -3
- package/dist/adapters/sandbox/inmemory/index.d.ts +11 -3
- package/dist/adapters/sandbox/inmemory/index.js +11 -1
- package/dist/adapters/sandbox/inmemory/index.js.map +1 -1
- package/dist/adapters/sandbox/inmemory/workflow.cjs.map +1 -1
- package/dist/adapters/sandbox/inmemory/workflow.d.cts +4 -2
- package/dist/adapters/sandbox/inmemory/workflow.d.ts +4 -2
- package/dist/adapters/sandbox/inmemory/workflow.js.map +1 -1
- package/dist/adapters/thread/anthropic/index.cjs.map +1 -1
- package/dist/adapters/thread/anthropic/index.d.cts +5 -5
- package/dist/adapters/thread/anthropic/index.d.ts +5 -5
- package/dist/adapters/thread/anthropic/index.js.map +1 -1
- package/dist/adapters/thread/anthropic/workflow.d.cts +5 -5
- package/dist/adapters/thread/anthropic/workflow.d.ts +5 -5
- package/dist/adapters/thread/google-genai/index.cjs.map +1 -1
- package/dist/adapters/thread/google-genai/index.d.cts +5 -5
- package/dist/adapters/thread/google-genai/index.d.ts +5 -5
- package/dist/adapters/thread/google-genai/index.js.map +1 -1
- package/dist/adapters/thread/google-genai/workflow.d.cts +5 -5
- package/dist/adapters/thread/google-genai/workflow.d.ts +5 -5
- package/dist/adapters/thread/langchain/index.cjs.map +1 -1
- package/dist/adapters/thread/langchain/index.d.cts +5 -5
- package/dist/adapters/thread/langchain/index.d.ts +5 -5
- package/dist/adapters/thread/langchain/index.js.map +1 -1
- package/dist/adapters/thread/langchain/workflow.d.cts +5 -5
- package/dist/adapters/thread/langchain/workflow.d.ts +5 -5
- package/dist/index.cjs +224 -70
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +66 -16
- package/dist/index.d.ts +66 -16
- package/dist/index.js +224 -70
- package/dist/index.js.map +1 -1
- package/dist/{proxy-D7mvDEO6.d.cts → proxy-Bf7uI-Hw.d.cts} +1 -1
- package/dist/{proxy-BbcgoXg1.d.ts → proxy-COqA95FW.d.ts} +1 -1
- package/dist/{thread-manager-CTXPCu9W.d.ts → thread-manager-BhkOyQ1I.d.ts} +2 -2
- package/dist/{thread-manager-Dqstsw4i.d.ts → thread-manager-Bi1XlbpJ.d.ts} +2 -2
- package/dist/{thread-manager-cLhDhRRc.d.cts → thread-manager-BsLO3Fgc.d.cts} +2 -2
- package/dist/{thread-manager-DrWfVjlj.d.cts → thread-manager-wRVVBFgj.d.cts} +2 -2
- package/dist/{types-CjF1_Idx.d.ts → types-BkX4HLzi.d.ts} +1 -1
- package/dist/{types-CdvcmXb6.d.cts → types-C66-BVBr.d.cts} +1 -1
- package/dist/types-CJ7tCdl6.d.cts +266 -0
- package/dist/types-CJ7tCdl6.d.ts +266 -0
- package/dist/{types-DjaQKUJx.d.cts → types-CdALEF3z.d.cts} +300 -20
- package/dist/{types-BqTmyH31.d.ts → types-ChAy_jSP.d.ts} +300 -20
- package/dist/types-CjY93AWZ.d.cts +84 -0
- package/dist/types-gVa5XCWD.d.ts +84 -0
- package/dist/{workflow-N1MNDoul.d.ts → workflow-BwT5EybR.d.ts} +7 -6
- package/dist/{workflow-CuqxgS6X.d.cts → workflow-DMmiaw6w.d.cts} +7 -6
- package/dist/workflow.cjs +99 -46
- package/dist/workflow.cjs.map +1 -1
- package/dist/workflow.d.cts +4 -4
- package/dist/workflow.d.ts +4 -4
- package/dist/workflow.js +99 -46
- package/dist/workflow.js.map +1 -1
- package/package.json +7 -32
- package/src/adapters/sandbox/daytona/index.ts +25 -48
- package/src/adapters/sandbox/daytona/proxy.ts +7 -8
- package/src/adapters/sandbox/e2b/index.ts +21 -6
- package/src/adapters/sandbox/e2b/proxy.ts +3 -2
- package/src/adapters/sandbox/inmemory/index.ts +21 -1
- package/src/adapters/sandbox/inmemory/proxy.ts +7 -3
- package/src/lib/activity.ts +5 -0
- package/src/lib/sandbox/capability-types.test.ts +859 -0
- package/src/lib/sandbox/index.ts +1 -0
- package/src/lib/sandbox/manager.ts +187 -31
- package/src/lib/sandbox/types.ts +189 -46
- package/src/lib/session/index.ts +1 -0
- package/src/lib/session/session.ts +97 -35
- package/src/lib/session/types.ts +181 -5
- package/src/lib/subagent/handler.ts +66 -43
- package/src/lib/subagent/types.ts +484 -16
- package/src/workflow.ts +3 -0
- package/tsup.config.ts +0 -4
- package/dist/adapters/sandbox/bedrock/index.cjs +0 -457
- package/dist/adapters/sandbox/bedrock/index.cjs.map +0 -1
- package/dist/adapters/sandbox/bedrock/index.d.cts +0 -25
- package/dist/adapters/sandbox/bedrock/index.d.ts +0 -25
- package/dist/adapters/sandbox/bedrock/index.js +0 -454
- package/dist/adapters/sandbox/bedrock/index.js.map +0 -1
- package/dist/adapters/sandbox/bedrock/workflow.cjs +0 -36
- package/dist/adapters/sandbox/bedrock/workflow.cjs.map +0 -1
- package/dist/adapters/sandbox/bedrock/workflow.d.cts +0 -29
- package/dist/adapters/sandbox/bedrock/workflow.d.ts +0 -29
- package/dist/adapters/sandbox/bedrock/workflow.js +0 -34
- package/dist/adapters/sandbox/bedrock/workflow.js.map +0 -1
- package/dist/types-DAsQ21Rt.d.ts +0 -74
- package/dist/types-lm8tMNJQ.d.cts +0 -74
- package/dist/types-yx0LzPGn.d.cts +0 -173
- package/dist/types-yx0LzPGn.d.ts +0 -173
- package/src/adapters/sandbox/bedrock/filesystem.ts +0 -340
- package/src/adapters/sandbox/bedrock/index.ts +0 -274
- package/src/adapters/sandbox/bedrock/proxy.ts +0 -59
- package/src/adapters/sandbox/bedrock/types.ts +0 -24
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../../src/lib/sandbox/types.ts","../../../../src/adapters/sandbox/e2b/filesystem.ts","../../../../src/adapters/sandbox/e2b/index.ts"],"names":["E2bSandboxNotFoundError","E2bNotFoundError","E2bSdkSandbox"],"mappings":";;;;;AA6OO,IAAM,wBAAA,GAAN,cAAuC,kBAAA,CAAmB;AAAA,EAC/D,YAAY,SAAA,EAAmB;AAC7B,IAAA,KAAA;AAAA,MACE,6BAA6B,SAAS,CAAA,CAAA;AAAA,MACtC,0BAAA;AAAA,MACA;AAAA,KACF;AAAA,EACF;AACF,CAAA;AAEO,IAAM,oBAAA,GAAN,cAAmC,kBAAA,CAAmB;AAAA,EAC3D,YAAY,SAAA,EAAmB;AAC7B,IAAA,KAAA,CAAM,CAAA,mBAAA,EAAsB,SAAS,CAAA,CAAA,EAAI,sBAAA,EAAwB,IAAI,CAAA;AAAA,EACvE;AACF,CAAA;ACnPA,SAAS,cAAc,EAAA,EAA6B;AAClD,EAAA,OAAO,GAAG,MAAA,CAAO,KAAA;AAAA,IACf,EAAA,CAAG,UAAA;AAAA,IACH,EAAA,CAAG,aAAa,EAAA,CAAG;AAAA,GACrB;AACF;AASO,IAAM,uBAAN,MAAwD;AAAA,EAG7D,WAAA,CACU,OAAA,EACR,aAAA,GAAgB,YAAA,EAChB;AAFQ,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAGR,IAAA,IAAA,CAAK,aAAA,GAAgB,KAAA,CAAM,OAAA,CAAQ,GAAA,EAAK,aAAa,CAAA;AAAA,EACvD;AAAA,EAJU,OAAA;AAAA,EAHD,aAAA;AAAA,EASD,cAAc,IAAA,EAAsB;AAC1C,IAAA,OAAO,KAAA,CAAM,OAAA,CAAQ,IAAA,CAAK,aAAA,EAAe,IAAI,CAAA;AAAA,EAC/C;AAAA,EAEA,MAAM,SAAS,IAAA,EAA+B;AAC5C,IAAA,OAAO,KAAK,OAAA,CAAQ,KAAA,CAAM,KAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,EACzD;AAAA,EAEA,MAAM,eAAe,IAAA,EAAmC;AACtD,IAAA,OAAO,KAAK,OAAA,CAAQ,KAAA,CAAM,KAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA,EAAG;AAAA,MACvD,MAAA,EAAQ;AAAA,KACT,CAAA;AAAA,EACH;AAAA,EAEA,MAAM,SAAA,CAAU,IAAA,EAAc,OAAA,EAA6C;AACzE,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,IAAI,OAAO,YAAY,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,KAAA,CAAM,MAAM,OAAO,CAAA;AAAA,IAC9C,CAAA,MAAO;AACL,MAAA,MAAM,KAAK,OAAA,CAAQ,KAAA,CAAM,MAAM,IAAA,EAAM,aAAA,CAAc,OAAO,CAAC,CAAA;AAAA,IAC7D;AAAA,EACF;AAAA,EAEA,MAAM,UAAA,CAAW,IAAA,EAAc,OAAA,EAA6C;AAC1E,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,IAAI,QAAA,GAAW,EAAA;AACf,IAAA,IAAI;AACF,MAAA,QAAA,GAAW,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,KAAK,IAAI,CAAA;AAAA,IAC/C,CAAA,CAAA,MAAQ;AAAA,IAER;AACA,IAAA,MAAM,QAAA,GACJ,OAAO,OAAA,KAAY,QAAA,GAAW,UAAU,IAAI,WAAA,EAAY,CAAE,MAAA,CAAO,OAAO,CAAA;AAC1E,IAAA,MAAM,KAAK,OAAA,CAAQ,KAAA,CAAM,KAAA,CAAM,IAAA,EAAM,WAAW,QAAQ,CAAA;AAAA,EAC1D;AAAA,EAEA,MAAM,OAAO,IAAA,EAAgC;AAC3C,IAAA,OAAO,KAAK,OAAA,CAAQ,KAAA,CAAM,OAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,EAC3D;AAAA,EAEA,MAAM,KAAK,IAAA,EAAiC;AAC1C,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,MAAM,OAAO,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,QAAQ,IAAI,CAAA;AAClD,IAAA,MAAM,SAAA,GAAY,CAAC,CAAC,IAAA,CAAK,aAAA;AACzB,IAAA,OAAO;AAAA,MACL,MAAA,EAAQ,SAAA,GAAY,KAAA,GAAQ,IAAA,CAAK,SAAS,QAAA,CAAS,IAAA;AAAA,MACnD,WAAA,EAAa,SAAA,GAAY,KAAA,GAAQ,IAAA,CAAK,SAAS,QAAA,CAAS,GAAA;AAAA,MACxD,cAAA,EAAgB,SAAA;AAAA,MAChB,MAAM,IAAA,CAAK,IAAA;AAAA,MACX,KAAA,EAAO,IAAA,CAAK,YAAA,oBAAgB,IAAI,KAAK,CAAC;AAAA,KACxC;AAAA,EACF;AAAA,EAEA,MAAM,KAAA,CAAM,IAAA,EAAc,QAAA,EAAmD;AAC3E,IAAA,MAAM,KAAK,OAAA,CAAQ,KAAA,CAAM,QAAQ,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,EAC3D;AAAA,EAEA,MAAM,QAAQ,IAAA,EAAiC;AAC7C,IAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,OAAA,CAAQ,MAAM,IAAA,CAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AACtE,IAAA,OAAO,OAAA,CAAQ,IAAI,CAAC,CAAA,KAAM,MAAM,QAAA,CAAS,CAAA,CAAE,IAAI,CAAC,CAAA;AAAA,EAClD;AAAA,EAEA,MAAM,qBAAqB,IAAA,EAAsC;AAC/D,IAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,OAAA,CAAQ,MAAM,IAAA,CAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AACtE,IAAA,OAAO,OAAA,CAAQ,GAAA,CAAI,CAAC,CAAA,KAAM;AACxB,MAAA,MAAM,SAAA,GAAY,CAAC,CAAC,CAAA,CAAE,aAAA;AACtB,MAAA,OAAO;AAAA,QACL,IAAA,EAAM,KAAA,CAAM,QAAA,CAAS,CAAA,CAAE,IAAI,CAAA;AAAA,QAC3B,MAAA,EAAQ,SAAA,GAAY,KAAA,GAAQ,CAAA,CAAE,SAAS,QAAA,CAAS,IAAA;AAAA,QAChD,WAAA,EAAa,SAAA,GAAY,KAAA,GAAQ,CAAA,CAAE,SAAS,QAAA,CAAS,GAAA;AAAA,QACrD,cAAA,EAAgB;AAAA,OAClB;AAAA,IACF,CAAC,CAAA;AAAA,EACH;AAAA,EAEA,MAAM,EAAA,CACJ,IAAA,EACA,OAAA,EACe;AACf,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,IAAI;AACF,MAAA,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,MAAA,CAAO,IAAI,CAAA;AAAA,IACtC,SAAS,GAAA,EAAK;AACZ,MAAA,IAAI,CAAC,OAAA,EAAS,KAAA,EAAO,MAAM,GAAA;AAAA,IAC7B;AAAA,EACF;AAAA,EAEA,MAAM,EAAA,CACJ,GAAA,EACA,IAAA,EACA,QAAA,EACe;AACf,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,aAAA,CAAc,GAAG,CAAA;AACtC,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACxC,IAAA,MAAM,IAAA,CAAK,QAAQ,QAAA,CAAS,GAAA,CAAI,UAAU,OAAO,CAAA,GAAA,EAAM,QAAQ,CAAA,CAAA,CAAG,CAAA;AAAA,EACpE;AAAA,EAEA,MAAM,EAAA,CAAG,GAAA,EAAa,IAAA,EAA6B;AACjD,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,aAAA,CAAc,GAAG,CAAA;AACtC,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACxC,IAAA,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,MAAA,CAAO,SAAS,QAAQ,CAAA;AAAA,EACnD;AAAA,EAEA,MAAM,SAAS,IAAA,EAA+B;AAC5C,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,MAAM,OAAO,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,QAAQ,IAAI,CAAA;AAClD,IAAA,IAAI,CAAC,KAAK,aAAA,EAAe;AACvB,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,oCAAA,EAAuC,IAAI,CAAA,CAAA,CAAG,CAAA;AAAA,IAChE;AACA,IAAA,OAAO,IAAA,CAAK,aAAA;AAAA,EACd;AAAA,EAEA,WAAA,CAAY,MAAc,IAAA,EAAsB;AAC9C,IAAA,OAAO,MAAM,OAAA,CAAQ,IAAA,CAAK,aAAA,CAAc,IAAI,GAAG,IAAI,CAAA;AAAA,EACrD;AACF;;;AClHA,SAAS,qBAAqB,GAAA,EAAuB;AACnD,EAAA,OACE,GAAA,YAAeA,0BAA2B,GAAA,YAAeC,aAAA;AAE7D;AAMA,IAAM,iBAAN,MAAwC;AAAA,EAStC,WAAA,CACW,EAAA,EACD,UAAA,EACR,aAAA,GAAgB,YAAA,EAChB;AAHS,IAAA,IAAA,CAAA,EAAA,GAAA,EAAA;AACD,IAAA,IAAA,CAAA,UAAA,GAAA,UAAA;AAGR,IAAA,IAAA,CAAK,EAAA,GAAK,IAAI,oBAAA,CAAqB,UAAA,EAAY,aAAa,CAAA;AAAA,EAC9D;AAAA,EALW,EAAA;AAAA,EACD,UAAA;AAAA,EAVD,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EAES,EAAA;AAAA,EAUT,MAAM,IAAA,CAAK,OAAA,EAAiB,OAAA,EAA4C;AACtE,IAAA,MAAM,SAAS,MAAM,IAAA,CAAK,UAAA,CAAW,QAAA,CAAS,IAAI,OAAA,EAAS;AAAA,MACzD,KAAK,OAAA,EAAS,GAAA;AAAA,MACd,MAAM,OAAA,EAAS,GAAA;AAAA,MACf,WAAW,OAAA,EAAS;AAAA,KACrB,CAAA;AACD,IAAA,OAAO;AAAA,MACL,UAAU,MAAA,CAAO,QAAA;AAAA,MACjB,QAAQ,MAAA,CAAO,MAAA;AAAA,MACf,QAAQ,MAAA,CAAO;AAAA,KACjB;AAAA,EACF;AAAA,EAEA,MAAM,OAAA,GAAyB;AAC7B,IAAA,MAAM,IAAA,CAAK,WAAW,IAAA,EAAK;AAAA,EAC7B;AACF,CAAA;AAMO,IAAM,qBAAN,MAGL;AAAA,EACS,EAAA,GAAK,KAAA;AAAA,EACL,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EAEiB,eAAA;AAAA,EACA,oBAAA;AAAA,EACA,gBAAA;AAAA,EACA,kBAAA;AAAA,EACA,0BAAA;AAAA,EACA,cAAA;AAAA,EACA,eAAA;AAAA,EACA,gBAAA;AAAA,EAEjB,YAAY,MAAA,EAA2B;AACrC,IAAA,IAAA,CAAK,kBAAkB,MAAA,EAAQ,QAAA;AAC/B,IAAA,IAAA,CAAK,oBAAA,GAAuB,QAAQ,aAAA,IAAiB,YAAA;AACrD,IAAA,IAAA,CAAK,mBAAmB,MAAA,EAAQ,SAAA;AAChC,IAAA,IAAA,CAAK,qBAAqB,MAAA,EAAQ,WAAA;AAClC,IAAA,IAAA,CAAK,6BAA6B,MAAA,EAAQ,mBAAA;AAC1C,IAAA,IAAA,CAAK,iBAAiB,MAAA,EAAQ,OAAA;AAC9B,IAAA,IAAA,CAAK,kBAAkB,MAAA,EAAQ,QAAA;AAC/B,IAAA,IAAA,CAAK,mBAAmB,MAAA,EAAQ,SAAA;AAAA,EAClC;AAAA,EAEA,MAAM,OACJ,OAAA,EAC8B;AAC9B,IAAA,MAAM,QAAA,GAAW,OAAA,EAAS,QAAA,IAAY,IAAA,CAAK,eAAA;AAC3C,IAAA,MAAM,gBAAgB,IAAA,CAAK,oBAAA;AAC3B,IAAA,MAAM,UAAA,GAAa,IAAA,CAAK,kBAAA,CAAmB,OAAO,CAAA;AAElD,IAAA,MAAM,UAAA,GAAa,QAAA,GACf,MAAMC,OAAA,CAAc,MAAA,CAAO,QAAA,EAAU,UAAU,CAAA,GAC/C,MAAMA,OAAA,CAAc,MAAA,CAAO,UAAU,CAAA;AAEzC,IAAA,MAAM,UAAU,IAAI,cAAA;AAAA,MAClB,UAAA,CAAW,SAAA;AAAA,MACX,UAAA;AAAA,MACA;AAAA,KACF;AAEA,IAAA,IAAI,SAAS,YAAA,EAAc;AACzB,MAAA,MAAM,OAAA,CAAQ,GAAA;AAAA,QACZ,MAAA,CAAO,OAAA,CAAQ,OAAA,CAAQ,YAAY,CAAA,CAAE,GAAA;AAAA,UAAI,CAAC,CAAC,IAAA,EAAM,OAAO,MACtD,OAAA,CAAQ,EAAA,CAAG,SAAA,CAAU,IAAA,EAAM,OAAO;AAAA;AACpC,OACF;AAAA,IACF;AAEA,IAAA,OAAO,EAAE,OAAA,EAAQ;AAAA,EACnB;AAAA,EAEA,MAAM,IAAI,SAAA,EAAwC;AAChD,IAAA,MAAM,cAAc,IAAA,CAAK,kBAAA;AACzB,IAAA,IAAI;AACF,MAAA,MAAM,UAAA,GACJ,WAAA,KAAgB,KAAA,CAAA,GACZ,MAAMA,QAAc,OAAA,CAAQ,SAAA,EAAW,EAAE,SAAA,EAAW,aAAa,CAAA,GACjE,MAAMA,OAAA,CAAc,QAAQ,SAAS,CAAA;AAC3C,MAAA,OAAO,IAAI,cAAA;AAAA,QACT,SAAA;AAAA,QACA,UAAA;AAAA,QACA,IAAA,CAAK;AAAA,OACP;AAAA,IACF,SAAS,GAAA,EAAK;AACZ,MAAA,IAAI,oBAAA,CAAqB,GAAG,CAAA,EAAG;AAC7B,QAAA,MAAM,IAAI,qBAAqB,SAAS,CAAA;AAAA,MAC1C;AACA,MAAA,MAAM,GAAA;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,QAAQ,SAAA,EAAkC;AAC9C,IAAA,IAAI;AACF,MAAA,MAAM,UAAA,GAAa,MAAMA,OAAA,CAAc,OAAA,CAAQ,SAAS,CAAA;AACxD,MAAA,MAAM,WAAW,IAAA,EAAK;AAAA,IACxB,CAAA,CAAA,MAAQ;AAAA,IAER;AAAA,EACF;AAAA,EAEA,MAAM,KAAA,CAAM,SAAA,EAAmB,WAAA,EAAqC;AAClE,IAAA,MAAM,UAAA,GAAa,MAAMA,OAAA,CAAc,OAAA,CAAQ,SAAS,CAAA;AACxD,IAAA,MAAM,WAAW,KAAA,EAAM;AAAA,EACzB;AAAA,EAEA,MAAM,OAAO,SAAA,EAAkC;AAC7C,IAAA,MAAMA,OAAA,CAAc,QAAQ,SAAS,CAAA;AAAA,EACvC;AAAA,EAEA,MAAM,QAAA,CACJ,SAAA,EACA,QAAA,EAC0B;AAC1B,IAAA,MAAM,EAAE,UAAA,EAAW,GAAI,MAAMA,OAAA,CAAc,eAAe,SAAS,CAAA;AACnE,IAAA,OAAO;AAAA,MACL,SAAA;AAAA,MACA,YAAY,IAAA,CAAK,EAAA;AAAA,MACjB,IAAA,EAAM,EAAE,UAAA,EAAW;AAAA,MACnB,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA;AAAY,KACpC;AAAA,EACF;AAAA,EAEA,MAAM,OAAA,CACJ,QAAA,EACA,OAAA,EACkB;AAClB,IAAA,MAAM,OAAO,QAAA,CAAS,IAAA;AACtB,IAAA,IAAI,CAAC,MAAM,UAAA,EAAY;AACrB,MAAA,MAAM,IAAI,wBAAA;AAAA,QACR;AAAA,OACF;AAAA,IACF;AACA,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,kBAAA,CAAmB,OAAO,CAAA;AAC/C,IAAA,MAAM,aAAa,MAAMA,OAAA,CAAc,MAAA,CAAO,IAAA,CAAK,YAAY,OAAO,CAAA;AACtE,IAAA,OAAO,IAAI,cAAA;AAAA,MACT,UAAA,CAAW,SAAA;AAAA,MACX,UAAA;AAAA,MACA,IAAA,CAAK;AAAA,KACP;AAAA,EACF;AAAA,EAEA,MAAM,eAAe,QAAA,EAA0C;AAC7D,IAAA,MAAM,OAAO,QAAA,CAAS,IAAA;AACtB,IAAA,IAAI,CAAC,MAAM,UAAA,EAAY;AACvB,IAAA,IAAI;AACF,MAAA,MAAMA,OAAA,CAAc,cAAA,CAAe,IAAA,CAAK,UAAU,CAAA;AAAA,IACpD,CAAA,CAAA,MAAQ;AAAA,IAER;AAAA,EACF;AAAA,EAEA,MAAM,IAAA,CACJ,SAAA,EACA,OAAA,EACkB;AAClB,IAAA,MAAM,EAAE,UAAA,EAAW,GAAI,MAAMA,OAAA,CAAc,eAAe,SAAS,CAAA;AACnE,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,kBAAA,CAAmB,OAAO,CAAA;AAC/C,IAAA,MAAM,UAAA,GAAa,MAAMA,OAAA,CAAc,MAAA,CAAO,YAAY,OAAO,CAAA;AACjE,IAAA,OAAO,IAAI,cAAA;AAAA,MACT,UAAA,CAAW,SAAA;AAAA,MACX,UAAA;AAAA,MACA,IAAA,CAAK;AAAA,KACP;AAAA,EACF;AAAA,EAEQ,mBAAmB,OAAA,EAAmC;AAC5D,IAAA,MAAM,OAAA,GAAU,OAAA,EAAS,OAAA,IAAW,IAAA,CAAK,cAAA;AACzC,IAAA,MAAM,SAAA,GAAY,OAAA,EAAS,SAAA,IAAa,IAAA,CAAK,gBAAA;AAC7C,IAAA,OAAO;AAAA,MACL,MAAM,OAAA,EAAS,GAAA;AAAA,MACf,SAAA,EAAW,OAAA,EAAS,SAAA,IAAa,IAAA,CAAK,gBAAA;AAAA,MACtC,QAAA,EAAU,OAAA,EAAS,QAAA,IAAY,IAAA,CAAK,eAAA;AAAA,MACpC,mBAAA,EACE,OAAA,EAAS,mBAAA,IAAuB,IAAA,CAAK,0BAAA;AAAA,MACvC,SAAS,OAAA,GACL;AAAA,QACE,UAAU,OAAA,CAAQ,QAAA;AAAA,QAClB,SAAS,OAAA,CAAQ,OAAA;AAAA,QACjB,oBAAoB,OAAA,CAAQ;AAAA,OAC9B,GACA,MAAA;AAAA,MACJ,WAAW,SAAA,GACP;AAAA,QACE,WAAW,SAAA,CAAU,SAAA;AAAA,QACrB,YAAY,SAAA,CAAU;AAAA,OACxB,GACA;AAAA,KACN;AAAA,EACF;AACF","file":"index.js","sourcesContent":["// ============================================================================\n// Sandbox Filesystem\n// ============================================================================\n\nexport interface DirentEntry {\n name: string;\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n}\n\nexport interface FileStat {\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n size: number;\n mtime: Date;\n}\n\n// ============================================================================\n// Network & lifecycle\n// ============================================================================\n\nexport interface SandboxNetworkConfig {\n allowOut?: string[];\n denyOut?: string[];\n allowPublicTraffic?: boolean;\n}\n\nexport interface SandboxLifecycleConfig {\n onTimeout: \"kill\" | \"pause\";\n autoResume?: boolean;\n}\n\n/**\n * Provider-agnostic filesystem interface.\n *\n * Implementations that don't support a method should throw\n * {@link SandboxNotSupportedError}.\n */\nexport interface SandboxFileSystem {\n /** Base directory used when resolving relative paths. */\n readonly workspaceBase: string;\n readFile(path: string): Promise<string>;\n readFileBuffer(path: string): Promise<Uint8Array>;\n writeFile(path: string, content: string | Uint8Array): Promise<void>;\n appendFile(path: string, content: string | Uint8Array): Promise<void>;\n exists(path: string): Promise<boolean>;\n stat(path: string): Promise<FileStat>;\n mkdir(path: string, options?: { recursive?: boolean }): Promise<void>;\n readdir(path: string): Promise<string[]>;\n readdirWithFileTypes(path: string): Promise<DirentEntry[]>;\n rm(\n path: string,\n options?: { recursive?: boolean; force?: boolean }\n ): Promise<void>;\n cp(\n src: string,\n dest: string,\n options?: { recursive?: boolean }\n ): Promise<void>;\n mv(src: string, dest: string): Promise<void>;\n readlink(path: string): Promise<string>;\n resolvePath(base: string, path: string): string;\n}\n\n// ============================================================================\n// Execution\n// ============================================================================\n\nexport interface ExecOptions {\n timeout?: number;\n cwd?: string;\n env?: Record<string, string>;\n}\n\nexport interface ExecResult {\n exitCode: number;\n stdout: string;\n stderr: string;\n}\n\n// ============================================================================\n// Capabilities\n// ============================================================================\n\nexport interface SandboxCapabilities {\n /** Sandbox supports filesystem operations */\n filesystem: boolean;\n /** Sandbox supports shell/command execution */\n execution: boolean;\n /** Sandbox state can be persisted and restored */\n persistence: boolean;\n}\n\n// ============================================================================\n// Sandbox\n// ============================================================================\n\nexport interface Sandbox {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n readonly fs: SandboxFileSystem;\n\n exec(command: string, options?: ExecOptions): Promise<ExecResult>;\n destroy(): Promise<void>;\n}\n\n// ============================================================================\n// Snapshots\n// ============================================================================\n\nexport interface SandboxSnapshot {\n sandboxId: string;\n providerId: string;\n /** Provider-specific serialised state */\n data: unknown;\n createdAt: string;\n}\n\n// ============================================================================\n// Provider\n// ============================================================================\n\nexport interface SandboxCreateOptions {\n /** Preferred sandbox ID (provider may ignore) */\n id?: string;\n /** Seed the filesystem with these files */\n initialFiles?: Record<string, string | Uint8Array>;\n /** Environment variables available inside the sandbox */\n env?: Record<string, string>;\n /** Key-value metadata surfaced via provider list/query APIs */\n metadata?: Record<string, string>;\n /** Sandbox idle timeout in milliseconds */\n timeoutMs?: number;\n /** Enable or disable outbound internet access */\n allowInternetAccess?: boolean;\n /** Outbound network allow/deny rules */\n network?: SandboxNetworkConfig;\n /** Sandbox timeout behaviour */\n lifecycle?: SandboxLifecycleConfig;\n}\n\nexport interface SandboxCreateResult {\n sandbox: Sandbox;\n}\n\nexport interface SandboxProvider<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TSandbox extends Sandbox = Sandbox,\n> {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n\n create(options?: TOptions): Promise<SandboxCreateResult>;\n get(sandboxId: string): Promise<TSandbox>;\n destroy(sandboxId: string): Promise<void>;\n pause(sandboxId: string, ttlSeconds?: number): Promise<void>;\n /** Resume a paused sandbox. No-op if already running. */\n resume(sandboxId: string): Promise<void>;\n /**\n * Capture a snapshot of a running sandbox. `options` is a per-call override\n * merged on top of the provider's static defaults.\n */\n snapshot(sandboxId: string, options?: TOptions): Promise<SandboxSnapshot>;\n /**\n * Restore a sandbox from a snapshot. `options` is a per-call override\n * merged on top of the provider's static defaults.\n */\n restore(snapshot: SandboxSnapshot, options?: TOptions): Promise<Sandbox>;\n /** Delete a previously captured snapshot. No-op if already deleted. */\n deleteSnapshot(snapshot: SandboxSnapshot): Promise<void>;\n /**\n * Fork a running sandbox into a new one. `options` is a per-call override\n * merged on top of the provider's static defaults.\n */\n fork(sandboxId: string, options?: TOptions): Promise<Sandbox>;\n}\n\n// ============================================================================\n// SandboxOps — workflow-side activity interface (like ThreadOps)\n// ============================================================================\n\nexport interface SandboxOps<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n> {\n createSandbox(\n options?: TOptions,\n ctx?: TCtx\n ): Promise<{ sandboxId: string } | null>;\n destroySandbox(sandboxId: string): Promise<void>;\n pauseSandbox(sandboxId: string): Promise<void>;\n /** Resume a paused sandbox. No-op if already running. */\n resumeSandbox(sandboxId: string): Promise<void>;\n /** Capture a snapshot. `options` is a per-call override merged on top of provider defaults. */\n snapshotSandbox(\n sandboxId: string,\n options?: TOptions\n ): Promise<SandboxSnapshot>;\n /** Create a fresh sandbox from a snapshot. `options` is a per-call override merged on top of provider defaults. */\n restoreSandbox(\n snapshot: SandboxSnapshot,\n options?: TOptions\n ): Promise<string>;\n /** Delete a previously captured snapshot. No-op if already deleted. */\n deleteSandboxSnapshot(snapshot: SandboxSnapshot): Promise<void>;\n /** Fork a running sandbox. `options` is a per-call override merged on top of provider defaults. */\n forkSandbox(sandboxId: string, options?: TOptions): Promise<string>;\n}\n\n/**\n * Maps generic {@link SandboxOps} method names to adapter-prefixed names.\n *\n * @example\n * ```typescript\n * type InMemOps = PrefixedSandboxOps<\"inMemory\">;\n * // → { inMemoryCreateSandbox, inMemoryDestroySandbox, inMemorySnapshotSandbox }\n * ```\n */\nexport type PrefixedSandboxOps<\n TPrefix extends string,\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n> = {\n [K in keyof SandboxOps<\n TOptions,\n TCtx\n > as `${TPrefix}${Capitalize<K & string>}`]: SandboxOps<TOptions, TCtx>[K];\n};\n\n// ============================================================================\n// Errors\n// ============================================================================\n\nimport { ApplicationFailure } from \"@temporalio/common\";\n\nexport class SandboxNotSupportedError extends ApplicationFailure {\n constructor(operation: string) {\n super(\n `Sandbox does not support: ${operation}`,\n \"SandboxNotSupportedError\",\n true\n );\n }\n}\n\nexport class SandboxNotFoundError extends ApplicationFailure {\n constructor(sandboxId: string) {\n super(`Sandbox not found: ${sandboxId}`, \"SandboxNotFoundError\", true);\n }\n}\n","import { FileType, type Sandbox as E2bSdkSandbox } from \"@e2b/code-interpreter\";\nimport type {\n SandboxFileSystem,\n DirentEntry,\n FileStat,\n} from \"../../../lib/sandbox/types\";\nimport { posix } from \"node:path\";\n\nfunction toArrayBuffer(u8: Uint8Array): ArrayBuffer {\n return u8.buffer.slice(\n u8.byteOffset,\n u8.byteOffset + u8.byteLength\n ) as ArrayBuffer;\n}\n\n/**\n * {@link SandboxFileSystem} backed by an E2B SDK sandbox.\n *\n * Maps zeitlich's filesystem interface to E2B's `sandbox.files` and\n * `sandbox.commands` APIs. Operations that have no direct E2B equivalent\n * (e.g. `appendFile`, `cp`) are composed from primitives.\n */\nexport class E2bSandboxFileSystem implements SandboxFileSystem {\n readonly workspaceBase: string;\n\n constructor(\n private sandbox: E2bSdkSandbox,\n workspaceBase = \"/home/user\"\n ) {\n this.workspaceBase = posix.resolve(\"/\", workspaceBase);\n }\n\n private normalisePath(path: string): string {\n return posix.resolve(this.workspaceBase, path);\n }\n\n async readFile(path: string): Promise<string> {\n return this.sandbox.files.read(this.normalisePath(path));\n }\n\n async readFileBuffer(path: string): Promise<Uint8Array> {\n return this.sandbox.files.read(this.normalisePath(path), {\n format: \"bytes\",\n });\n }\n\n async writeFile(path: string, content: string | Uint8Array): Promise<void> {\n const norm = this.normalisePath(path);\n if (typeof content === \"string\") {\n await this.sandbox.files.write(norm, content);\n } else {\n await this.sandbox.files.write(norm, toArrayBuffer(content));\n }\n }\n\n async appendFile(path: string, content: string | Uint8Array): Promise<void> {\n const norm = this.normalisePath(path);\n let existing = \"\";\n try {\n existing = await this.sandbox.files.read(norm);\n } catch {\n // file doesn't exist yet — write from scratch\n }\n const addition =\n typeof content === \"string\" ? content : new TextDecoder().decode(content);\n await this.sandbox.files.write(norm, existing + addition);\n }\n\n async exists(path: string): Promise<boolean> {\n return this.sandbox.files.exists(this.normalisePath(path));\n }\n\n async stat(path: string): Promise<FileStat> {\n const norm = this.normalisePath(path);\n const info = await this.sandbox.files.getInfo(norm);\n const isSymlink = !!info.symlinkTarget;\n return {\n isFile: isSymlink ? false : info.type === FileType.FILE,\n isDirectory: isSymlink ? false : info.type === FileType.DIR,\n isSymbolicLink: isSymlink,\n size: info.size,\n mtime: info.modifiedTime ?? new Date(0),\n };\n }\n\n async mkdir(path: string, _options?: { recursive?: boolean }): Promise<void> {\n await this.sandbox.files.makeDir(this.normalisePath(path));\n }\n\n async readdir(path: string): Promise<string[]> {\n const entries = await this.sandbox.files.list(this.normalisePath(path));\n return entries.map((e) => posix.basename(e.path));\n }\n\n async readdirWithFileTypes(path: string): Promise<DirentEntry[]> {\n const entries = await this.sandbox.files.list(this.normalisePath(path));\n return entries.map((e) => {\n const isSymlink = !!e.symlinkTarget;\n return {\n name: posix.basename(e.path),\n isFile: isSymlink ? false : e.type === FileType.FILE,\n isDirectory: isSymlink ? false : e.type === FileType.DIR,\n isSymbolicLink: isSymlink,\n };\n });\n }\n\n async rm(\n path: string,\n options?: { recursive?: boolean; force?: boolean }\n ): Promise<void> {\n const norm = this.normalisePath(path);\n try {\n await this.sandbox.files.remove(norm);\n } catch (err) {\n if (!options?.force) throw err;\n }\n }\n\n async cp(\n src: string,\n dest: string,\n _options?: { recursive?: boolean }\n ): Promise<void> {\n const normSrc = this.normalisePath(src);\n const normDest = this.normalisePath(dest);\n await this.sandbox.commands.run(`cp -r \"${normSrc}\" \"${normDest}\"`);\n }\n\n async mv(src: string, dest: string): Promise<void> {\n const normSrc = this.normalisePath(src);\n const normDest = this.normalisePath(dest);\n await this.sandbox.files.rename(normSrc, normDest);\n }\n\n async readlink(path: string): Promise<string> {\n const norm = this.normalisePath(path);\n const info = await this.sandbox.files.getInfo(norm);\n if (!info.symlinkTarget) {\n throw new Error(`EINVAL: invalid argument, readlink '${path}'`);\n }\n return info.symlinkTarget;\n }\n\n resolvePath(base: string, path: string): string {\n return posix.resolve(this.normalisePath(base), path);\n }\n}\n","import {\n NotFoundError as E2bNotFoundError,\n Sandbox as E2bSdkSandbox,\n SandboxNotFoundError as E2bSandboxNotFoundError,\n} from \"@e2b/code-interpreter\";\nimport type {\n Sandbox,\n SandboxCapabilities,\n SandboxCreateResult,\n SandboxProvider,\n SandboxSnapshot,\n ExecOptions,\n ExecResult,\n} from \"../../../lib/sandbox/types\";\nimport {\n SandboxNotFoundError,\n SandboxNotSupportedError,\n} from \"../../../lib/sandbox/types\";\nimport { E2bSandboxFileSystem } from \"./filesystem\";\nimport type {\n E2bSandbox,\n E2bSandboxConfig,\n E2bSandboxCreateOptions,\n} from \"./types\";\n\n/**\n * True iff `err` is the E2B SDK's \"this sandbox doesn't exist (anymore)\"\n * signal. We narrow to `SandboxNotFoundError` (the canonical class) and to\n * its deprecated parent `NotFoundError` as a defensive fallback — older\n * SDK paths still throw the parent for sandbox-not-found cases. Any other\n * error (auth failure, network blip, 5xx, validation) is propagated\n * unchanged so callers can react to it specifically.\n */\nfunction isE2bSandboxNotFound(err: unknown): boolean {\n return (\n err instanceof E2bSandboxNotFoundError || err instanceof E2bNotFoundError\n );\n}\n\n// ============================================================================\n// E2bSandbox\n// ============================================================================\n\nclass E2bSandboxImpl implements Sandbox {\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n\n readonly fs: E2bSandboxFileSystem;\n\n constructor(\n readonly id: string,\n private sdkSandbox: E2bSdkSandbox,\n workspaceBase = \"/home/user\"\n ) {\n this.fs = new E2bSandboxFileSystem(sdkSandbox, workspaceBase);\n }\n\n async exec(command: string, options?: ExecOptions): Promise<ExecResult> {\n const result = await this.sdkSandbox.commands.run(command, {\n cwd: options?.cwd,\n envs: options?.env,\n timeoutMs: options?.timeout,\n });\n return {\n exitCode: result.exitCode,\n stdout: result.stdout,\n stderr: result.stderr,\n };\n }\n\n async destroy(): Promise<void> {\n await this.sdkSandbox.kill();\n }\n}\n\n// ============================================================================\n// E2bSandboxProvider\n// ============================================================================\n\nexport class E2bSandboxProvider implements SandboxProvider<\n E2bSandboxCreateOptions,\n E2bSandbox\n> {\n readonly id = \"e2b\";\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n\n private readonly defaultTemplate?: string;\n private readonly defaultWorkspaceBase: string;\n private readonly defaultTimeoutMs?: number;\n private readonly defaultKeepAliveMs?: number;\n private readonly defaultAllowInternetAccess?: boolean;\n private readonly defaultNetwork?: E2bSandboxConfig[\"network\"];\n private readonly defaultMetadata?: E2bSandboxConfig[\"metadata\"];\n private readonly defaultLifecycle?: E2bSandboxConfig[\"lifecycle\"];\n\n constructor(config?: E2bSandboxConfig) {\n this.defaultTemplate = config?.template;\n this.defaultWorkspaceBase = config?.workspaceBase ?? \"/home/user\";\n this.defaultTimeoutMs = config?.timeoutMs;\n this.defaultKeepAliveMs = config?.keepAliveMs;\n this.defaultAllowInternetAccess = config?.allowInternetAccess;\n this.defaultNetwork = config?.network;\n this.defaultMetadata = config?.metadata;\n this.defaultLifecycle = config?.lifecycle;\n }\n\n async create(\n options?: E2bSandboxCreateOptions\n ): Promise<SandboxCreateResult> {\n const template = options?.template ?? this.defaultTemplate;\n const workspaceBase = this.defaultWorkspaceBase;\n const createOpts = this.buildSdkCreateOpts(options);\n\n const sdkSandbox = template\n ? await E2bSdkSandbox.create(template, createOpts)\n : await E2bSdkSandbox.create(createOpts);\n\n const sandbox = new E2bSandboxImpl(\n sdkSandbox.sandboxId,\n sdkSandbox,\n workspaceBase\n );\n\n if (options?.initialFiles) {\n await Promise.all(\n Object.entries(options.initialFiles).map(([path, content]) =>\n sandbox.fs.writeFile(path, content)\n )\n );\n }\n\n return { sandbox };\n }\n\n async get(sandboxId: string): Promise<E2bSandbox> {\n const keepAliveMs = this.defaultKeepAliveMs;\n try {\n const sdkSandbox =\n keepAliveMs !== undefined\n ? await E2bSdkSandbox.connect(sandboxId, { timeoutMs: keepAliveMs })\n : await E2bSdkSandbox.connect(sandboxId);\n return new E2bSandboxImpl(\n sandboxId,\n sdkSandbox,\n this.defaultWorkspaceBase\n );\n } catch (err) {\n if (isE2bSandboxNotFound(err)) {\n throw new SandboxNotFoundError(sandboxId);\n }\n throw err;\n }\n }\n\n async destroy(sandboxId: string): Promise<void> {\n try {\n const sdkSandbox = await E2bSdkSandbox.connect(sandboxId);\n await sdkSandbox.kill();\n } catch {\n // Already gone or not found — destroy is idempotent.\n }\n }\n\n async pause(sandboxId: string, _ttlSeconds?: number): Promise<void> {\n const sdkSandbox = await E2bSdkSandbox.connect(sandboxId);\n await sdkSandbox.pause();\n }\n\n async resume(sandboxId: string): Promise<void> {\n await E2bSdkSandbox.connect(sandboxId);\n }\n\n async snapshot(\n sandboxId: string,\n _options?: E2bSandboxCreateOptions\n ): Promise<SandboxSnapshot> {\n const { snapshotId } = await E2bSdkSandbox.createSnapshot(sandboxId);\n return {\n sandboxId,\n providerId: this.id,\n data: { snapshotId },\n createdAt: new Date().toISOString(),\n };\n }\n\n async restore(\n snapshot: SandboxSnapshot,\n options?: E2bSandboxCreateOptions\n ): Promise<Sandbox> {\n const data = snapshot.data as { snapshotId?: string } | null;\n if (!data?.snapshotId) {\n throw new SandboxNotSupportedError(\n \"restore: snapshot is missing snapshotId\"\n );\n }\n const sdkOpts = this.buildSdkCreateOpts(options);\n const sdkSandbox = await E2bSdkSandbox.create(data.snapshotId, sdkOpts);\n return new E2bSandboxImpl(\n sdkSandbox.sandboxId,\n sdkSandbox,\n this.defaultWorkspaceBase\n );\n }\n\n async deleteSnapshot(snapshot: SandboxSnapshot): Promise<void> {\n const data = snapshot.data as { snapshotId?: string } | null;\n if (!data?.snapshotId) return;\n try {\n await E2bSdkSandbox.deleteSnapshot(data.snapshotId);\n } catch {\n // Already deleted or no longer accessible — treat as no-op.\n }\n }\n\n async fork(\n sandboxId: string,\n options?: E2bSandboxCreateOptions\n ): Promise<Sandbox> {\n const { snapshotId } = await E2bSdkSandbox.createSnapshot(sandboxId);\n const sdkOpts = this.buildSdkCreateOpts(options);\n const sdkSandbox = await E2bSdkSandbox.create(snapshotId, sdkOpts);\n return new E2bSandboxImpl(\n sdkSandbox.sandboxId,\n sdkSandbox,\n this.defaultWorkspaceBase\n );\n }\n\n private buildSdkCreateOpts(options?: E2bSandboxCreateOptions) {\n const network = options?.network ?? this.defaultNetwork;\n const lifecycle = options?.lifecycle ?? this.defaultLifecycle;\n return {\n envs: options?.env,\n timeoutMs: options?.timeoutMs ?? this.defaultTimeoutMs,\n metadata: options?.metadata ?? this.defaultMetadata,\n allowInternetAccess:\n options?.allowInternetAccess ?? this.defaultAllowInternetAccess,\n network: network\n ? {\n allowOut: network.allowOut,\n denyOut: network.denyOut,\n allowPublicTraffic: network.allowPublicTraffic,\n }\n : undefined,\n lifecycle: lifecycle\n ? {\n onTimeout: lifecycle.onTimeout,\n autoResume: lifecycle.autoResume,\n }\n : undefined,\n };\n }\n}\n\n// Re-exports\nexport { E2bSandboxFileSystem } from \"./filesystem\";\nexport type {\n E2bSandbox,\n E2bSandboxConfig,\n E2bSandboxCreateOptions,\n} from \"./types\";\n"]}
|
|
1
|
+
{"version":3,"sources":["../../../../src/lib/sandbox/types.ts","../../../../src/adapters/sandbox/e2b/filesystem.ts","../../../../src/adapters/sandbox/e2b/index.ts"],"names":["E2bSandboxNotFoundError","E2bNotFoundError","E2bSdkSandbox"],"mappings":";;;;;AA4XO,IAAM,wBAAA,GAAN,cAAuC,kBAAA,CAAmB;AAAA,EAC/D,YAAY,SAAA,EAAmB;AAC7B,IAAA,KAAA;AAAA,MACE,6BAA6B,SAAS,CAAA,CAAA;AAAA,MACtC,0BAAA;AAAA,MACA;AAAA,KACF;AAAA,EACF;AACF,CAAA;AAEO,IAAM,oBAAA,GAAN,cAAmC,kBAAA,CAAmB;AAAA,EAC3D,YAAY,SAAA,EAAmB;AAC7B,IAAA,KAAA,CAAM,CAAA,mBAAA,EAAsB,SAAS,CAAA,CAAA,EAAI,sBAAA,EAAwB,IAAI,CAAA;AAAA,EACvE;AACF,CAAA;AClYA,SAAS,cAAc,EAAA,EAA6B;AAClD,EAAA,OAAO,GAAG,MAAA,CAAO,KAAA;AAAA,IACf,EAAA,CAAG,UAAA;AAAA,IACH,EAAA,CAAG,aAAa,EAAA,CAAG;AAAA,GACrB;AACF;AASO,IAAM,uBAAN,MAAwD;AAAA,EAG7D,WAAA,CACU,OAAA,EACR,aAAA,GAAgB,YAAA,EAChB;AAFQ,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAGR,IAAA,IAAA,CAAK,aAAA,GAAgB,KAAA,CAAM,OAAA,CAAQ,GAAA,EAAK,aAAa,CAAA;AAAA,EACvD;AAAA,EAJU,OAAA;AAAA,EAHD,aAAA;AAAA,EASD,cAAc,IAAA,EAAsB;AAC1C,IAAA,OAAO,KAAA,CAAM,OAAA,CAAQ,IAAA,CAAK,aAAA,EAAe,IAAI,CAAA;AAAA,EAC/C;AAAA,EAEA,MAAM,SAAS,IAAA,EAA+B;AAC5C,IAAA,OAAO,KAAK,OAAA,CAAQ,KAAA,CAAM,KAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,EACzD;AAAA,EAEA,MAAM,eAAe,IAAA,EAAmC;AACtD,IAAA,OAAO,KAAK,OAAA,CAAQ,KAAA,CAAM,KAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA,EAAG;AAAA,MACvD,MAAA,EAAQ;AAAA,KACT,CAAA;AAAA,EACH;AAAA,EAEA,MAAM,SAAA,CAAU,IAAA,EAAc,OAAA,EAA6C;AACzE,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,IAAI,OAAO,YAAY,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,KAAA,CAAM,MAAM,OAAO,CAAA;AAAA,IAC9C,CAAA,MAAO;AACL,MAAA,MAAM,KAAK,OAAA,CAAQ,KAAA,CAAM,MAAM,IAAA,EAAM,aAAA,CAAc,OAAO,CAAC,CAAA;AAAA,IAC7D;AAAA,EACF;AAAA,EAEA,MAAM,UAAA,CAAW,IAAA,EAAc,OAAA,EAA6C;AAC1E,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,IAAI,QAAA,GAAW,EAAA;AACf,IAAA,IAAI;AACF,MAAA,QAAA,GAAW,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,KAAK,IAAI,CAAA;AAAA,IAC/C,CAAA,CAAA,MAAQ;AAAA,IAER;AACA,IAAA,MAAM,QAAA,GACJ,OAAO,OAAA,KAAY,QAAA,GAAW,UAAU,IAAI,WAAA,EAAY,CAAE,MAAA,CAAO,OAAO,CAAA;AAC1E,IAAA,MAAM,KAAK,OAAA,CAAQ,KAAA,CAAM,KAAA,CAAM,IAAA,EAAM,WAAW,QAAQ,CAAA;AAAA,EAC1D;AAAA,EAEA,MAAM,OAAO,IAAA,EAAgC;AAC3C,IAAA,OAAO,KAAK,OAAA,CAAQ,KAAA,CAAM,OAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,EAC3D;AAAA,EAEA,MAAM,KAAK,IAAA,EAAiC;AAC1C,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,MAAM,OAAO,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,QAAQ,IAAI,CAAA;AAClD,IAAA,MAAM,SAAA,GAAY,CAAC,CAAC,IAAA,CAAK,aAAA;AACzB,IAAA,OAAO;AAAA,MACL,MAAA,EAAQ,SAAA,GAAY,KAAA,GAAQ,IAAA,CAAK,SAAS,QAAA,CAAS,IAAA;AAAA,MACnD,WAAA,EAAa,SAAA,GAAY,KAAA,GAAQ,IAAA,CAAK,SAAS,QAAA,CAAS,GAAA;AAAA,MACxD,cAAA,EAAgB,SAAA;AAAA,MAChB,MAAM,IAAA,CAAK,IAAA;AAAA,MACX,KAAA,EAAO,IAAA,CAAK,YAAA,oBAAgB,IAAI,KAAK,CAAC;AAAA,KACxC;AAAA,EACF;AAAA,EAEA,MAAM,KAAA,CAAM,IAAA,EAAc,QAAA,EAAmD;AAC3E,IAAA,MAAM,KAAK,OAAA,CAAQ,KAAA,CAAM,QAAQ,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,EAC3D;AAAA,EAEA,MAAM,QAAQ,IAAA,EAAiC;AAC7C,IAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,OAAA,CAAQ,MAAM,IAAA,CAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AACtE,IAAA,OAAO,OAAA,CAAQ,IAAI,CAAC,CAAA,KAAM,MAAM,QAAA,CAAS,CAAA,CAAE,IAAI,CAAC,CAAA;AAAA,EAClD;AAAA,EAEA,MAAM,qBAAqB,IAAA,EAAsC;AAC/D,IAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,OAAA,CAAQ,MAAM,IAAA,CAAK,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AACtE,IAAA,OAAO,OAAA,CAAQ,GAAA,CAAI,CAAC,CAAA,KAAM;AACxB,MAAA,MAAM,SAAA,GAAY,CAAC,CAAC,CAAA,CAAE,aAAA;AACtB,MAAA,OAAO;AAAA,QACL,IAAA,EAAM,KAAA,CAAM,QAAA,CAAS,CAAA,CAAE,IAAI,CAAA;AAAA,QAC3B,MAAA,EAAQ,SAAA,GAAY,KAAA,GAAQ,CAAA,CAAE,SAAS,QAAA,CAAS,IAAA;AAAA,QAChD,WAAA,EAAa,SAAA,GAAY,KAAA,GAAQ,CAAA,CAAE,SAAS,QAAA,CAAS,GAAA;AAAA,QACrD,cAAA,EAAgB;AAAA,OAClB;AAAA,IACF,CAAC,CAAA;AAAA,EACH;AAAA,EAEA,MAAM,EAAA,CACJ,IAAA,EACA,OAAA,EACe;AACf,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,IAAI;AACF,MAAA,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,MAAA,CAAO,IAAI,CAAA;AAAA,IACtC,SAAS,GAAA,EAAK;AACZ,MAAA,IAAI,CAAC,OAAA,EAAS,KAAA,EAAO,MAAM,GAAA;AAAA,IAC7B;AAAA,EACF;AAAA,EAEA,MAAM,EAAA,CACJ,GAAA,EACA,IAAA,EACA,QAAA,EACe;AACf,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,aAAA,CAAc,GAAG,CAAA;AACtC,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACxC,IAAA,MAAM,IAAA,CAAK,QAAQ,QAAA,CAAS,GAAA,CAAI,UAAU,OAAO,CAAA,GAAA,EAAM,QAAQ,CAAA,CAAA,CAAG,CAAA;AAAA,EACpE;AAAA,EAEA,MAAM,EAAA,CAAG,GAAA,EAAa,IAAA,EAA6B;AACjD,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,aAAA,CAAc,GAAG,CAAA;AACtC,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACxC,IAAA,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,MAAA,CAAO,SAAS,QAAQ,CAAA;AAAA,EACnD;AAAA,EAEA,MAAM,SAAS,IAAA,EAA+B;AAC5C,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,aAAA,CAAc,IAAI,CAAA;AACpC,IAAA,MAAM,OAAO,MAAM,IAAA,CAAK,OAAA,CAAQ,KAAA,CAAM,QAAQ,IAAI,CAAA;AAClD,IAAA,IAAI,CAAC,KAAK,aAAA,EAAe;AACvB,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,oCAAA,EAAuC,IAAI,CAAA,CAAA,CAAG,CAAA;AAAA,IAChE;AACA,IAAA,OAAO,IAAA,CAAK,aAAA;AAAA,EACd;AAAA,EAEA,WAAA,CAAY,MAAc,IAAA,EAAsB;AAC9C,IAAA,OAAO,MAAM,OAAA,CAAQ,IAAA,CAAK,aAAA,CAAc,IAAI,GAAG,IAAI,CAAA;AAAA,EACrD;AACF;;;ACjHA,SAAS,qBAAqB,GAAA,EAAuB;AACnD,EAAA,OACE,GAAA,YAAeA,0BAA2B,GAAA,YAAeC,aAAA;AAE7D;AAMA,IAAM,iBAAN,MAAwC;AAAA,EAStC,WAAA,CACW,EAAA,EACD,UAAA,EACR,aAAA,GAAgB,YAAA,EAChB;AAHS,IAAA,IAAA,CAAA,EAAA,GAAA,EAAA;AACD,IAAA,IAAA,CAAA,UAAA,GAAA,UAAA;AAGR,IAAA,IAAA,CAAK,EAAA,GAAK,IAAI,oBAAA,CAAqB,UAAA,EAAY,aAAa,CAAA;AAAA,EAC9D;AAAA,EALW,EAAA;AAAA,EACD,UAAA;AAAA,EAVD,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EAES,EAAA;AAAA,EAUT,MAAM,IAAA,CAAK,OAAA,EAAiB,OAAA,EAA4C;AACtE,IAAA,MAAM,SAAS,MAAM,IAAA,CAAK,UAAA,CAAW,QAAA,CAAS,IAAI,OAAA,EAAS;AAAA,MACzD,KAAK,OAAA,EAAS,GAAA;AAAA,MACd,MAAM,OAAA,EAAS,GAAA;AAAA,MACf,WAAW,OAAA,EAAS;AAAA,KACrB,CAAA;AACD,IAAA,OAAO;AAAA,MACL,UAAU,MAAA,CAAO,QAAA;AAAA,MACjB,QAAQ,MAAA,CAAO,MAAA;AAAA,MACf,QAAQ,MAAA,CAAO;AAAA,KACjB;AAAA,EACF;AAAA,EAEA,MAAM,OAAA,GAAyB;AAC7B,IAAA,MAAM,IAAA,CAAK,WAAW,IAAA,EAAK;AAAA,EAC7B;AACF,CAAA;AAWO,IAAM,QAAA,GAAW;AAAA,EACtB,OAAA;AAAA,EACA,QAAA;AAAA,EACA,UAAA;AAAA,EACA,SAAA;AAAA,EACA;AACF;AAGO,IAAM,qBAAN,MAEP;AAAA,EACW,EAAA,GAAK,KAAA;AAAA,EACL,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EACS,qBAAA,GAA8C,IAAI,GAAA,CAAI,QAAQ,CAAA;AAAA,EAEtD,eAAA;AAAA,EACA,oBAAA;AAAA,EACA,gBAAA;AAAA,EACA,kBAAA;AAAA,EACA,0BAAA;AAAA,EACA,cAAA;AAAA,EACA,eAAA;AAAA,EACA,gBAAA;AAAA,EAEjB,YAAY,MAAA,EAA2B;AACrC,IAAA,IAAA,CAAK,kBAAkB,MAAA,EAAQ,QAAA;AAC/B,IAAA,IAAA,CAAK,oBAAA,GAAuB,QAAQ,aAAA,IAAiB,YAAA;AACrD,IAAA,IAAA,CAAK,mBAAmB,MAAA,EAAQ,SAAA;AAChC,IAAA,IAAA,CAAK,qBAAqB,MAAA,EAAQ,WAAA;AAClC,IAAA,IAAA,CAAK,6BAA6B,MAAA,EAAQ,mBAAA;AAC1C,IAAA,IAAA,CAAK,iBAAiB,MAAA,EAAQ,OAAA;AAC9B,IAAA,IAAA,CAAK,kBAAkB,MAAA,EAAQ,QAAA;AAC/B,IAAA,IAAA,CAAK,mBAAmB,MAAA,EAAQ,SAAA;AAAA,EAClC;AAAA,EAEA,MAAM,OACJ,OAAA,EAC8B;AAC9B,IAAA,MAAM,QAAA,GAAW,OAAA,EAAS,QAAA,IAAY,IAAA,CAAK,eAAA;AAC3C,IAAA,MAAM,gBAAgB,IAAA,CAAK,oBAAA;AAC3B,IAAA,MAAM,UAAA,GAAa,IAAA,CAAK,kBAAA,CAAmB,OAAO,CAAA;AAElD,IAAA,MAAM,UAAA,GAAa,QAAA,GACf,MAAMC,OAAA,CAAc,MAAA,CAAO,QAAA,EAAU,UAAU,CAAA,GAC/C,MAAMA,OAAA,CAAc,MAAA,CAAO,UAAU,CAAA;AAEzC,IAAA,MAAM,UAAU,IAAI,cAAA;AAAA,MAClB,UAAA,CAAW,SAAA;AAAA,MACX,UAAA;AAAA,MACA;AAAA,KACF;AAEA,IAAA,IAAI,SAAS,YAAA,EAAc;AACzB,MAAA,MAAM,OAAA,CAAQ,GAAA;AAAA,QACZ,MAAA,CAAO,OAAA,CAAQ,OAAA,CAAQ,YAAY,CAAA,CAAE,GAAA;AAAA,UAAI,CAAC,CAAC,IAAA,EAAM,OAAO,MACtD,OAAA,CAAQ,EAAA,CAAG,SAAA,CAAU,IAAA,EAAM,OAAO;AAAA;AACpC,OACF;AAAA,IACF;AAEA,IAAA,OAAO,EAAE,OAAA,EAAQ;AAAA,EACnB;AAAA,EAEA,MAAM,IAAI,SAAA,EAAwC;AAChD,IAAA,MAAM,cAAc,IAAA,CAAK,kBAAA;AACzB,IAAA,IAAI;AACF,MAAA,MAAM,UAAA,GACJ,WAAA,KAAgB,KAAA,CAAA,GACZ,MAAMA,QAAc,OAAA,CAAQ,SAAA,EAAW,EAAE,SAAA,EAAW,aAAa,CAAA,GACjE,MAAMA,OAAA,CAAc,QAAQ,SAAS,CAAA;AAC3C,MAAA,OAAO,IAAI,cAAA;AAAA,QACT,SAAA;AAAA,QACA,UAAA;AAAA,QACA,IAAA,CAAK;AAAA,OACP;AAAA,IACF,SAAS,GAAA,EAAK;AACZ,MAAA,IAAI,oBAAA,CAAqB,GAAG,CAAA,EAAG;AAC7B,QAAA,MAAM,IAAI,qBAAqB,SAAS,CAAA;AAAA,MAC1C;AACA,MAAA,MAAM,GAAA;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,QAAQ,SAAA,EAAkC;AAC9C,IAAA,IAAI;AACF,MAAA,MAAM,UAAA,GAAa,MAAMA,OAAA,CAAc,OAAA,CAAQ,SAAS,CAAA;AACxD,MAAA,MAAM,WAAW,IAAA,EAAK;AAAA,IACxB,CAAA,CAAA,MAAQ;AAAA,IAER;AAAA,EACF;AAAA,EAEA,MAAM,KAAA,CAAM,SAAA,EAAmB,WAAA,EAAqC;AAClE,IAAA,MAAM,UAAA,GAAa,MAAMA,OAAA,CAAc,OAAA,CAAQ,SAAS,CAAA;AACxD,IAAA,MAAM,WAAW,KAAA,EAAM;AAAA,EACzB;AAAA,EAEA,MAAM,OAAO,SAAA,EAAkC;AAC7C,IAAA,MAAMA,OAAA,CAAc,QAAQ,SAAS,CAAA;AAAA,EACvC;AAAA,EAEA,MAAM,QAAA,CACJ,SAAA,EACA,QAAA,EAC0B;AAC1B,IAAA,MAAM,EAAE,UAAA,EAAW,GAAI,MAAMA,OAAA,CAAc,eAAe,SAAS,CAAA;AACnE,IAAA,OAAO;AAAA,MACL,SAAA;AAAA,MACA,YAAY,IAAA,CAAK,EAAA;AAAA,MACjB,IAAA,EAAM,EAAE,UAAA,EAAW;AAAA,MACnB,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA;AAAY,KACpC;AAAA,EACF;AAAA,EAEA,MAAM,OAAA,CACJ,QAAA,EACA,OAAA,EACqB;AACrB,IAAA,MAAM,OAAO,QAAA,CAAS,IAAA;AACtB,IAAA,IAAI,CAAC,MAAM,UAAA,EAAY;AACrB,MAAA,MAAM,IAAI,wBAAA;AAAA,QACR;AAAA,OACF;AAAA,IACF;AACA,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,kBAAA,CAAmB,OAAO,CAAA;AAC/C,IAAA,MAAM,aAAa,MAAMA,OAAA,CAAc,MAAA,CAAO,IAAA,CAAK,YAAY,OAAO,CAAA;AACtE,IAAA,OAAO,IAAI,cAAA;AAAA,MACT,UAAA,CAAW,SAAA;AAAA,MACX,UAAA;AAAA,MACA,IAAA,CAAK;AAAA,KACP;AAAA,EACF;AAAA,EAEA,MAAM,eAAe,QAAA,EAA0C;AAC7D,IAAA,MAAM,OAAO,QAAA,CAAS,IAAA;AACtB,IAAA,IAAI,CAAC,MAAM,UAAA,EAAY;AACvB,IAAA,IAAI;AACF,MAAA,MAAMA,OAAA,CAAc,cAAA,CAAe,IAAA,CAAK,UAAU,CAAA;AAAA,IACpD,CAAA,CAAA,MAAQ;AAAA,IAER;AAAA,EACF;AAAA,EAEA,MAAM,IAAA,CACJ,SAAA,EACA,OAAA,EACqB;AACrB,IAAA,MAAM,EAAE,UAAA,EAAW,GAAI,MAAMA,OAAA,CAAc,eAAe,SAAS,CAAA;AACnE,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,kBAAA,CAAmB,OAAO,CAAA;AAC/C,IAAA,MAAM,UAAA,GAAa,MAAMA,OAAA,CAAc,MAAA,CAAO,YAAY,OAAO,CAAA;AACjE,IAAA,OAAO,IAAI,cAAA;AAAA,MACT,UAAA,CAAW,SAAA;AAAA,MACX,UAAA;AAAA,MACA,IAAA,CAAK;AAAA,KACP;AAAA,EACF;AAAA,EAEQ,mBAAmB,OAAA,EAAmC;AAC5D,IAAA,MAAM,OAAA,GAAU,OAAA,EAAS,OAAA,IAAW,IAAA,CAAK,cAAA;AACzC,IAAA,MAAM,SAAA,GAAY,OAAA,EAAS,SAAA,IAAa,IAAA,CAAK,gBAAA;AAC7C,IAAA,OAAO;AAAA,MACL,MAAM,OAAA,EAAS,GAAA;AAAA,MACf,SAAA,EAAW,OAAA,EAAS,SAAA,IAAa,IAAA,CAAK,gBAAA;AAAA,MACtC,QAAA,EAAU,OAAA,EAAS,QAAA,IAAY,IAAA,CAAK,eAAA;AAAA,MACpC,mBAAA,EACE,OAAA,EAAS,mBAAA,IAAuB,IAAA,CAAK,0BAAA;AAAA,MACvC,SAAS,OAAA,GACL;AAAA,QACE,UAAU,OAAA,CAAQ,QAAA;AAAA,QAClB,SAAS,OAAA,CAAQ,OAAA;AAAA,QACjB,oBAAoB,OAAA,CAAQ;AAAA,OAC9B,GACA,MAAA;AAAA,MACJ,WAAW,SAAA,GACP;AAAA,QACE,WAAW,SAAA,CAAU,SAAA;AAAA,QACrB,YAAY,SAAA,CAAU;AAAA,OACxB,GACA;AAAA,KACN;AAAA,EACF;AACF","file":"index.js","sourcesContent":["// ============================================================================\n// Sandbox Filesystem\n// ============================================================================\n\nexport interface DirentEntry {\n name: string;\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n}\n\nexport interface FileStat {\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n size: number;\n mtime: Date;\n}\n\n// ============================================================================\n// Network & lifecycle\n// ============================================================================\n\nexport interface SandboxNetworkConfig {\n allowOut?: string[];\n denyOut?: string[];\n allowPublicTraffic?: boolean;\n}\n\nexport interface SandboxLifecycleConfig {\n onTimeout: \"kill\" | \"pause\";\n autoResume?: boolean;\n}\n\n/**\n * Provider-agnostic filesystem interface.\n *\n * Implementations that don't support a method should throw\n * {@link SandboxNotSupportedError}.\n */\nexport interface SandboxFileSystem {\n /** Base directory used when resolving relative paths. */\n readonly workspaceBase: string;\n readFile(path: string): Promise<string>;\n readFileBuffer(path: string): Promise<Uint8Array>;\n writeFile(path: string, content: string | Uint8Array): Promise<void>;\n appendFile(path: string, content: string | Uint8Array): Promise<void>;\n exists(path: string): Promise<boolean>;\n stat(path: string): Promise<FileStat>;\n mkdir(path: string, options?: { recursive?: boolean }): Promise<void>;\n readdir(path: string): Promise<string[]>;\n readdirWithFileTypes(path: string): Promise<DirentEntry[]>;\n rm(\n path: string,\n options?: { recursive?: boolean; force?: boolean }\n ): Promise<void>;\n cp(\n src: string,\n dest: string,\n options?: { recursive?: boolean }\n ): Promise<void>;\n mv(src: string, dest: string): Promise<void>;\n readlink(path: string): Promise<string>;\n resolvePath(base: string, path: string): string;\n}\n\n// ============================================================================\n// Execution\n// ============================================================================\n\nexport interface ExecOptions {\n timeout?: number;\n cwd?: string;\n env?: Record<string, string>;\n}\n\nexport interface ExecResult {\n exitCode: number;\n stdout: string;\n stderr: string;\n}\n\n// ============================================================================\n// Capabilities\n// ============================================================================\n\n/**\n * Runtime capability flags carried by a {@link Sandbox} instance.\n *\n * These are an orthogonal mechanism to the type-level\n * {@link SandboxCapability} union: this flag bag is for runtime\n * introspection (\"does the sandbox support a filesystem?\") whereas\n * {@link SandboxCapability} narrows the type-level provider/ops contract.\n */\nexport interface SandboxCapabilities {\n /** Sandbox supports filesystem operations */\n filesystem: boolean;\n /** Sandbox supports shell/command execution */\n execution: boolean;\n /** Sandbox state can be persisted and restored */\n persistence: boolean;\n}\n\n/**\n * Type-level capability vocabulary for {@link SandboxProvider} and\n * {@link SandboxOps}. Adapters declare the subset they actually support; the\n * conditional types on each contract gate the corresponding methods so\n * unsupported calls become a compile-time error rather than a runtime\n * {@link SandboxNotSupportedError}.\n *\n * `pause` and `resume` are split because some adapters might support one\n * direction without the other. The `snapshot` cap covers both `snapshot()`\n * and `deleteSnapshot()` since they always travel together in practice.\n */\nexport type SandboxCapability =\n | \"pause\"\n | \"resume\"\n | \"snapshot\"\n | \"restore\"\n | \"fork\";\n\n// ============================================================================\n// Sandbox\n// ============================================================================\n\nexport interface Sandbox {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n readonly fs: SandboxFileSystem;\n\n exec(command: string, options?: ExecOptions): Promise<ExecResult>;\n destroy(): Promise<void>;\n}\n\n// ============================================================================\n// Snapshots\n// ============================================================================\n\nexport interface SandboxSnapshot {\n sandboxId: string;\n providerId: string;\n /** Provider-specific serialised state */\n data: unknown;\n createdAt: string;\n}\n\n// ============================================================================\n// Provider\n// ============================================================================\n\nexport interface SandboxCreateOptions {\n /** Preferred sandbox ID (provider may ignore) */\n id?: string;\n /** Seed the filesystem with these files */\n initialFiles?: Record<string, string | Uint8Array>;\n /** Environment variables available inside the sandbox */\n env?: Record<string, string>;\n /** Key-value metadata surfaced via provider list/query APIs */\n metadata?: Record<string, string>;\n /** Sandbox idle timeout in milliseconds */\n timeoutMs?: number;\n /** Enable or disable outbound internet access */\n allowInternetAccess?: boolean;\n /** Outbound network allow/deny rules */\n network?: SandboxNetworkConfig;\n /** Sandbox timeout behaviour */\n lifecycle?: SandboxLifecycleConfig;\n}\n\nexport interface SandboxCreateResult {\n sandbox: Sandbox;\n}\n\n/**\n * Internal helper: drop keys whose value is `never` from an object type.\n *\n * Used by the capability-gated contracts below so that an absent capability\n * removes the corresponding key entirely, instead of leaving a required\n * field with type `never` (which would make implementations impossible).\n */\ntype OmitNever<T> = {\n [K in keyof T as [T[K]] extends [never] ? never : K]: T[K];\n};\n\n/**\n * Capability-gated provider lifecycle methods.\n *\n * Each field becomes `never` when its capability is absent from `TCaps`;\n * the wrapping `OmitNever` removes those keys entirely, so the method\n * isn't part of the type surface for adapters that don't support it.\n */\ntype SandboxProviderCapMethods<\n TOptions extends SandboxCreateOptions,\n TSandbox extends Sandbox,\n TCaps extends SandboxCapability,\n> = OmitNever<{\n pause: \"pause\" extends TCaps\n ? (sandboxId: string, ttlSeconds?: number) => Promise<void>\n : never;\n resume: \"resume\" extends TCaps ? (sandboxId: string) => Promise<void> : never;\n snapshot: \"snapshot\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<SandboxSnapshot>\n : never;\n deleteSnapshot: \"snapshot\" extends TCaps\n ? (snapshot: SandboxSnapshot) => Promise<void>\n : never;\n restore: \"restore\" extends TCaps\n ? (snapshot: SandboxSnapshot, options?: TOptions) => Promise<TSandbox>\n : never;\n fork: \"fork\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<TSandbox>\n : never;\n}>;\n\n/**\n * Always-present provider lifecycle methods. These do not depend on the\n * capability set and are required by every adapter.\n */\ninterface SandboxProviderBase<\n TOptions extends SandboxCreateOptions,\n TSandbox extends Sandbox,\n TCaps extends SandboxCapability,\n> {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n /**\n * Runtime-introspectable list of supported capabilities.\n *\n * Constrained to `ReadonlySet<TCaps & SandboxCapability>` so the runtime\n * set cannot include capabilities not declared at the type level — a\n * provider typed as `SandboxProvider<…, never>` cannot ship a runtime\n * set that contains `\"pause\"`, etc.\n *\n * The other direction (type declares a cap, runtime set omits it)\n * cannot be enforced by TypeScript alone; adapters should derive both\n * `TCaps` and the runtime set from the same `as const` array (see\n * `SandboxManager`'s constructor-time consistency check) so the two\n * surfaces cannot drift.\n */\n readonly supportedCapabilities: ReadonlySet<TCaps & SandboxCapability>;\n\n create(options?: TOptions): Promise<SandboxCreateResult>;\n get(sandboxId: string): Promise<TSandbox>;\n destroy(sandboxId: string): Promise<void>;\n}\n\n/**\n * Provider-side sandbox lifecycle contract.\n *\n * Generic over an optional capability set (`TCaps`). Each capability gates\n * a specific method: when the cap is absent the corresponding key is\n * **removed** from the type entirely, so calling it produces a TypeScript\n * error at the call site instead of a runtime\n * {@link SandboxNotSupportedError}.\n *\n * The default `TCaps = SandboxCapability` resolves to the full union, so\n * existing usages that only pass `TOptions` / `TSandbox` continue to see\n * the full method surface (backwards compatible).\n *\n * Adapters that don't support a method should narrow `TCaps` accordingly:\n *\n * - In-memory / E2B: `SandboxCapability` (default — all caps present).\n * - Bedrock Code Interpreter / Daytona: `never` (only base ops).\n * - Bedrock AgentCore Runtime: `\"pause\" | \"resume\"`.\n */\nexport type SandboxProvider<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TSandbox extends Sandbox = Sandbox,\n TCaps extends SandboxCapability = SandboxCapability,\n> = SandboxProviderBase<TOptions, TSandbox, TCaps> &\n SandboxProviderCapMethods<TOptions, TSandbox, TCaps>;\n\n// ============================================================================\n// SandboxOps — workflow-side activity interface (like ThreadOps)\n// ============================================================================\n\n/**\n * Capability-gated workflow-side methods. Mirrors the provider's gating:\n * keys whose capability is absent from `TCaps` are removed from the type.\n */\ntype SandboxOpsCapMethods<\n TOptions extends SandboxCreateOptions,\n TCaps extends SandboxCapability,\n> = OmitNever<{\n pauseSandbox: \"pause\" extends TCaps\n ? (sandboxId: string) => Promise<void>\n : never;\n resumeSandbox: \"resume\" extends TCaps\n ? (sandboxId: string) => Promise<void>\n : never;\n snapshotSandbox: \"snapshot\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<SandboxSnapshot>\n : never;\n deleteSandboxSnapshot: \"snapshot\" extends TCaps\n ? (snapshot: SandboxSnapshot) => Promise<void>\n : never;\n restoreSandbox: \"restore\" extends TCaps\n ? (snapshot: SandboxSnapshot, options?: TOptions) => Promise<string>\n : never;\n forkSandbox: \"fork\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<string>\n : never;\n}>;\n\n/**\n * Always-present workflow-side lifecycle methods.\n */\ninterface SandboxOpsBase<\n TOptions extends SandboxCreateOptions,\n TCtx,\n> {\n createSandbox(\n options?: TOptions,\n ctx?: TCtx\n ): Promise<{ sandboxId: string } | null>;\n destroySandbox(sandboxId: string): Promise<void>;\n}\n\n/**\n * Workflow-side counterpart to {@link SandboxProvider}. Exposed as a set of\n * Temporal activities and consumed by `createSession`'s `sandboxOps` field\n * and by `defineSubagent`'s `sandbox.proxy`.\n *\n * Generic over a capability set (`TCaps`) — same semantics as the provider:\n * keys whose capability is absent are removed from the type, so calling\n * them is a TypeScript error rather than a runtime throw. The default\n * `TCaps = SandboxCapability` keeps the full method surface for existing\n * consumers.\n */\nexport type SandboxOps<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n TCaps extends SandboxCapability = SandboxCapability,\n> = SandboxOpsBase<TOptions, TCtx> & SandboxOpsCapMethods<TOptions, TCaps>;\n\n/**\n * Maps generic {@link SandboxOps} method names to adapter-prefixed names.\n *\n * Inherits the capability gating from {@link SandboxOps}: when `TCaps` omits\n * a capability the prefixed key carries the `never` type so call sites are\n * type-protected.\n *\n * @example\n * ```typescript\n * type InMemOps = PrefixedSandboxOps<\"inMemory\">;\n * // → { inMemoryCreateSandbox, inMemoryDestroySandbox, inMemorySnapshotSandbox, … }\n * ```\n */\nexport type PrefixedSandboxOps<\n TPrefix extends string,\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n TCaps extends SandboxCapability = SandboxCapability,\n> = {\n [K in keyof SandboxOps<\n TOptions,\n TCtx,\n TCaps\n > as `${TPrefix}${Capitalize<K & string>}`]: SandboxOps<\n TOptions,\n TCtx,\n TCaps\n >[K];\n};\n\n// ============================================================================\n// Errors\n// ============================================================================\n\nimport { ApplicationFailure } from \"@temporalio/common\";\n\n/**\n * Thrown by adapters that still surface an unsupported method at runtime.\n *\n * After the capability-generic refactor most adapters drop their\n * unsupported methods entirely so the type system rejects them at call\n * sites. This symbol is still exported so consumers running against older\n * adapter versions can keep their backwards-compatible error-handling\n * paths until they finish migrating.\n */\nexport class SandboxNotSupportedError extends ApplicationFailure {\n constructor(operation: string) {\n super(\n `Sandbox does not support: ${operation}`,\n \"SandboxNotSupportedError\",\n true\n );\n }\n}\n\nexport class SandboxNotFoundError extends ApplicationFailure {\n constructor(sandboxId: string) {\n super(`Sandbox not found: ${sandboxId}`, \"SandboxNotFoundError\", true);\n }\n}\n","import { FileType, type Sandbox as E2bSdkSandbox } from \"@e2b/code-interpreter\";\nimport type {\n SandboxFileSystem,\n DirentEntry,\n FileStat,\n} from \"../../../lib/sandbox/types\";\nimport { posix } from \"node:path\";\n\nfunction toArrayBuffer(u8: Uint8Array): ArrayBuffer {\n return u8.buffer.slice(\n u8.byteOffset,\n u8.byteOffset + u8.byteLength\n ) as ArrayBuffer;\n}\n\n/**\n * {@link SandboxFileSystem} backed by an E2B SDK sandbox.\n *\n * Maps zeitlich's filesystem interface to E2B's `sandbox.files` and\n * `sandbox.commands` APIs. Operations that have no direct E2B equivalent\n * (e.g. `appendFile`, `cp`) are composed from primitives.\n */\nexport class E2bSandboxFileSystem implements SandboxFileSystem {\n readonly workspaceBase: string;\n\n constructor(\n private sandbox: E2bSdkSandbox,\n workspaceBase = \"/home/user\"\n ) {\n this.workspaceBase = posix.resolve(\"/\", workspaceBase);\n }\n\n private normalisePath(path: string): string {\n return posix.resolve(this.workspaceBase, path);\n }\n\n async readFile(path: string): Promise<string> {\n return this.sandbox.files.read(this.normalisePath(path));\n }\n\n async readFileBuffer(path: string): Promise<Uint8Array> {\n return this.sandbox.files.read(this.normalisePath(path), {\n format: \"bytes\",\n });\n }\n\n async writeFile(path: string, content: string | Uint8Array): Promise<void> {\n const norm = this.normalisePath(path);\n if (typeof content === \"string\") {\n await this.sandbox.files.write(norm, content);\n } else {\n await this.sandbox.files.write(norm, toArrayBuffer(content));\n }\n }\n\n async appendFile(path: string, content: string | Uint8Array): Promise<void> {\n const norm = this.normalisePath(path);\n let existing = \"\";\n try {\n existing = await this.sandbox.files.read(norm);\n } catch {\n // file doesn't exist yet — write from scratch\n }\n const addition =\n typeof content === \"string\" ? content : new TextDecoder().decode(content);\n await this.sandbox.files.write(norm, existing + addition);\n }\n\n async exists(path: string): Promise<boolean> {\n return this.sandbox.files.exists(this.normalisePath(path));\n }\n\n async stat(path: string): Promise<FileStat> {\n const norm = this.normalisePath(path);\n const info = await this.sandbox.files.getInfo(norm);\n const isSymlink = !!info.symlinkTarget;\n return {\n isFile: isSymlink ? false : info.type === FileType.FILE,\n isDirectory: isSymlink ? false : info.type === FileType.DIR,\n isSymbolicLink: isSymlink,\n size: info.size,\n mtime: info.modifiedTime ?? new Date(0),\n };\n }\n\n async mkdir(path: string, _options?: { recursive?: boolean }): Promise<void> {\n await this.sandbox.files.makeDir(this.normalisePath(path));\n }\n\n async readdir(path: string): Promise<string[]> {\n const entries = await this.sandbox.files.list(this.normalisePath(path));\n return entries.map((e) => posix.basename(e.path));\n }\n\n async readdirWithFileTypes(path: string): Promise<DirentEntry[]> {\n const entries = await this.sandbox.files.list(this.normalisePath(path));\n return entries.map((e) => {\n const isSymlink = !!e.symlinkTarget;\n return {\n name: posix.basename(e.path),\n isFile: isSymlink ? false : e.type === FileType.FILE,\n isDirectory: isSymlink ? false : e.type === FileType.DIR,\n isSymbolicLink: isSymlink,\n };\n });\n }\n\n async rm(\n path: string,\n options?: { recursive?: boolean; force?: boolean }\n ): Promise<void> {\n const norm = this.normalisePath(path);\n try {\n await this.sandbox.files.remove(norm);\n } catch (err) {\n if (!options?.force) throw err;\n }\n }\n\n async cp(\n src: string,\n dest: string,\n _options?: { recursive?: boolean }\n ): Promise<void> {\n const normSrc = this.normalisePath(src);\n const normDest = this.normalisePath(dest);\n await this.sandbox.commands.run(`cp -r \"${normSrc}\" \"${normDest}\"`);\n }\n\n async mv(src: string, dest: string): Promise<void> {\n const normSrc = this.normalisePath(src);\n const normDest = this.normalisePath(dest);\n await this.sandbox.files.rename(normSrc, normDest);\n }\n\n async readlink(path: string): Promise<string> {\n const norm = this.normalisePath(path);\n const info = await this.sandbox.files.getInfo(norm);\n if (!info.symlinkTarget) {\n throw new Error(`EINVAL: invalid argument, readlink '${path}'`);\n }\n return info.symlinkTarget;\n }\n\n resolvePath(base: string, path: string): string {\n return posix.resolve(this.normalisePath(base), path);\n }\n}\n","import {\n NotFoundError as E2bNotFoundError,\n Sandbox as E2bSdkSandbox,\n SandboxNotFoundError as E2bSandboxNotFoundError,\n} from \"@e2b/code-interpreter\";\nimport type {\n Sandbox,\n SandboxCapabilities,\n SandboxCapability,\n SandboxCreateResult,\n SandboxProvider,\n SandboxSnapshot,\n ExecOptions,\n ExecResult,\n} from \"../../../lib/sandbox/types\";\nimport {\n SandboxNotFoundError,\n SandboxNotSupportedError,\n} from \"../../../lib/sandbox/types\";\nimport { E2bSandboxFileSystem } from \"./filesystem\";\nimport type {\n E2bSandbox,\n E2bSandboxConfig,\n E2bSandboxCreateOptions,\n} from \"./types\";\n\n/**\n * True iff `err` is the E2B SDK's \"this sandbox doesn't exist (anymore)\"\n * signal. We narrow to `SandboxNotFoundError` (the canonical class) and to\n * its deprecated parent `NotFoundError` as a defensive fallback — older\n * SDK paths still throw the parent for sandbox-not-found cases. Any other\n * error (auth failure, network blip, 5xx, validation) is propagated\n * unchanged so callers can react to it specifically.\n */\nfunction isE2bSandboxNotFound(err: unknown): boolean {\n return (\n err instanceof E2bSandboxNotFoundError || err instanceof E2bNotFoundError\n );\n}\n\n// ============================================================================\n// E2bSandbox\n// ============================================================================\n\nclass E2bSandboxImpl implements Sandbox {\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n\n readonly fs: E2bSandboxFileSystem;\n\n constructor(\n readonly id: string,\n private sdkSandbox: E2bSdkSandbox,\n workspaceBase = \"/home/user\"\n ) {\n this.fs = new E2bSandboxFileSystem(sdkSandbox, workspaceBase);\n }\n\n async exec(command: string, options?: ExecOptions): Promise<ExecResult> {\n const result = await this.sdkSandbox.commands.run(command, {\n cwd: options?.cwd,\n envs: options?.env,\n timeoutMs: options?.timeout,\n });\n return {\n exitCode: result.exitCode,\n stdout: result.stdout,\n stderr: result.stderr,\n };\n }\n\n async destroy(): Promise<void> {\n await this.sdkSandbox.kill();\n }\n}\n\n// ============================================================================\n// E2bSandboxProvider\n// ============================================================================\n\n/**\n * Single source of truth for the E2B adapter's capability set. Both the\n * runtime `supportedCapabilities` set and the type-level `TCaps` flow\n * out of this array, so the two surfaces cannot drift.\n */\nexport const E2B_CAPS = [\n \"pause\",\n \"resume\",\n \"snapshot\",\n \"restore\",\n \"fork\",\n] as const satisfies readonly SandboxCapability[];\nexport type E2bCaps = (typeof E2B_CAPS)[number];\n\nexport class E2bSandboxProvider\n implements SandboxProvider<E2bSandboxCreateOptions, E2bSandbox, E2bCaps>\n{\n readonly id = \"e2b\";\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n readonly supportedCapabilities: ReadonlySet<E2bCaps> = new Set(E2B_CAPS);\n\n private readonly defaultTemplate?: string;\n private readonly defaultWorkspaceBase: string;\n private readonly defaultTimeoutMs?: number;\n private readonly defaultKeepAliveMs?: number;\n private readonly defaultAllowInternetAccess?: boolean;\n private readonly defaultNetwork?: E2bSandboxConfig[\"network\"];\n private readonly defaultMetadata?: E2bSandboxConfig[\"metadata\"];\n private readonly defaultLifecycle?: E2bSandboxConfig[\"lifecycle\"];\n\n constructor(config?: E2bSandboxConfig) {\n this.defaultTemplate = config?.template;\n this.defaultWorkspaceBase = config?.workspaceBase ?? \"/home/user\";\n this.defaultTimeoutMs = config?.timeoutMs;\n this.defaultKeepAliveMs = config?.keepAliveMs;\n this.defaultAllowInternetAccess = config?.allowInternetAccess;\n this.defaultNetwork = config?.network;\n this.defaultMetadata = config?.metadata;\n this.defaultLifecycle = config?.lifecycle;\n }\n\n async create(\n options?: E2bSandboxCreateOptions\n ): Promise<SandboxCreateResult> {\n const template = options?.template ?? this.defaultTemplate;\n const workspaceBase = this.defaultWorkspaceBase;\n const createOpts = this.buildSdkCreateOpts(options);\n\n const sdkSandbox = template\n ? await E2bSdkSandbox.create(template, createOpts)\n : await E2bSdkSandbox.create(createOpts);\n\n const sandbox = new E2bSandboxImpl(\n sdkSandbox.sandboxId,\n sdkSandbox,\n workspaceBase\n );\n\n if (options?.initialFiles) {\n await Promise.all(\n Object.entries(options.initialFiles).map(([path, content]) =>\n sandbox.fs.writeFile(path, content)\n )\n );\n }\n\n return { sandbox };\n }\n\n async get(sandboxId: string): Promise<E2bSandbox> {\n const keepAliveMs = this.defaultKeepAliveMs;\n try {\n const sdkSandbox =\n keepAliveMs !== undefined\n ? await E2bSdkSandbox.connect(sandboxId, { timeoutMs: keepAliveMs })\n : await E2bSdkSandbox.connect(sandboxId);\n return new E2bSandboxImpl(\n sandboxId,\n sdkSandbox,\n this.defaultWorkspaceBase\n );\n } catch (err) {\n if (isE2bSandboxNotFound(err)) {\n throw new SandboxNotFoundError(sandboxId);\n }\n throw err;\n }\n }\n\n async destroy(sandboxId: string): Promise<void> {\n try {\n const sdkSandbox = await E2bSdkSandbox.connect(sandboxId);\n await sdkSandbox.kill();\n } catch {\n // Already gone or not found — destroy is idempotent.\n }\n }\n\n async pause(sandboxId: string, _ttlSeconds?: number): Promise<void> {\n const sdkSandbox = await E2bSdkSandbox.connect(sandboxId);\n await sdkSandbox.pause();\n }\n\n async resume(sandboxId: string): Promise<void> {\n await E2bSdkSandbox.connect(sandboxId);\n }\n\n async snapshot(\n sandboxId: string,\n _options?: E2bSandboxCreateOptions\n ): Promise<SandboxSnapshot> {\n const { snapshotId } = await E2bSdkSandbox.createSnapshot(sandboxId);\n return {\n sandboxId,\n providerId: this.id,\n data: { snapshotId },\n createdAt: new Date().toISOString(),\n };\n }\n\n async restore(\n snapshot: SandboxSnapshot,\n options?: E2bSandboxCreateOptions\n ): Promise<E2bSandbox> {\n const data = snapshot.data as { snapshotId?: string } | null;\n if (!data?.snapshotId) {\n throw new SandboxNotSupportedError(\n \"restore: snapshot is missing snapshotId\"\n );\n }\n const sdkOpts = this.buildSdkCreateOpts(options);\n const sdkSandbox = await E2bSdkSandbox.create(data.snapshotId, sdkOpts);\n return new E2bSandboxImpl(\n sdkSandbox.sandboxId,\n sdkSandbox,\n this.defaultWorkspaceBase\n );\n }\n\n async deleteSnapshot(snapshot: SandboxSnapshot): Promise<void> {\n const data = snapshot.data as { snapshotId?: string } | null;\n if (!data?.snapshotId) return;\n try {\n await E2bSdkSandbox.deleteSnapshot(data.snapshotId);\n } catch {\n // Already deleted or no longer accessible — treat as no-op.\n }\n }\n\n async fork(\n sandboxId: string,\n options?: E2bSandboxCreateOptions\n ): Promise<E2bSandbox> {\n const { snapshotId } = await E2bSdkSandbox.createSnapshot(sandboxId);\n const sdkOpts = this.buildSdkCreateOpts(options);\n const sdkSandbox = await E2bSdkSandbox.create(snapshotId, sdkOpts);\n return new E2bSandboxImpl(\n sdkSandbox.sandboxId,\n sdkSandbox,\n this.defaultWorkspaceBase\n );\n }\n\n private buildSdkCreateOpts(options?: E2bSandboxCreateOptions) {\n const network = options?.network ?? this.defaultNetwork;\n const lifecycle = options?.lifecycle ?? this.defaultLifecycle;\n return {\n envs: options?.env,\n timeoutMs: options?.timeoutMs ?? this.defaultTimeoutMs,\n metadata: options?.metadata ?? this.defaultMetadata,\n allowInternetAccess:\n options?.allowInternetAccess ?? this.defaultAllowInternetAccess,\n network: network\n ? {\n allowOut: network.allowOut,\n denyOut: network.denyOut,\n allowPublicTraffic: network.allowPublicTraffic,\n }\n : undefined,\n lifecycle: lifecycle\n ? {\n onTimeout: lifecycle.onTimeout,\n autoResume: lifecycle.autoResume,\n }\n : undefined,\n };\n }\n}\n\n// Re-exports\nexport { E2bSandboxFileSystem } from \"./filesystem\";\nexport type {\n E2bSandbox,\n E2bSandboxConfig,\n E2bSandboxCreateOptions,\n} from \"./types\";\n"]}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../../src/adapters/sandbox/e2b/proxy.ts"],"names":["workflowInfo","proxyActivities"],"mappings":";;;;;
|
|
1
|
+
{"version":3,"sources":["../../../../src/adapters/sandbox/e2b/proxy.ts"],"names":["workflowInfo","proxyActivities"],"mappings":";;;;;AAwBA,IAAM,cAAA,GAAiB,KAAA;AAEhB,SAAS,kBAAA,CACd,OACA,OAAA,EACuD;AACvD,EAAA,MAAM,aAAA,GAAgB,KAAA,IAASA,qBAAA,EAAa,CAAE,YAAA;AAG9C,EAAA,MAAM,IAAA,GAAOC,wBAAA;AAAA,IACX,OAAA,IAAW;AAAA,MACT,mBAAA,EAAqB,MAAA;AAAA,MACrB,KAAA,EAAO;AAAA,QACL,eAAA,EAAiB,CAAA;AAAA,QACjB,eAAA,EAAiB,IAAA;AAAA,QACjB,eAAA,EAAiB,KAAA;AAAA,QACjB,kBAAA,EAAoB;AAAA;AACtB;AACF,GACF;AAEA,EAAA,MAAM,MAAA,GAAS,CAAA,EAAG,cAAc,CAAA,EAAG,cAAc,MAAA,CAAO,CAAC,CAAA,CAAE,WAAA,EAAa,CAAA,EAAG,aAAA,CAAc,KAAA,CAAM,CAAC,CAAC,CAAA,CAAA;AACjG,EAAA,MAAM,IAAI,CAAC,GAAA,KACT,CAAA,EAAG,MAAM,GAAG,GAAA,CAAI,MAAA,CAAO,CAAC,CAAA,CAAE,aAAa,CAAA,EAAG,GAAA,CAAI,KAAA,CAAM,CAAC,CAAC,CAAA,CAAA;AAExD,EAAA,OAAO;AAAA,IACL,aAAA,EAAe,IAAA,CAAK,CAAA,CAAE,eAAe,CAAC,CAAA;AAAA,IACtC,cAAA,EAAgB,IAAA,CAAK,CAAA,CAAE,gBAAgB,CAAC,CAAA;AAAA,IACxC,YAAA,EAAc,IAAA,CAAK,CAAA,CAAE,cAAc,CAAC,CAAA;AAAA,IACpC,aAAA,EAAe,IAAA,CAAK,CAAA,CAAE,eAAe,CAAC,CAAA;AAAA,IACtC,eAAA,EAAiB,IAAA,CAAK,CAAA,CAAE,iBAAiB,CAAC,CAAA;AAAA,IAC1C,cAAA,EAAgB,IAAA,CAAK,CAAA,CAAE,gBAAgB,CAAC,CAAA;AAAA,IACxC,qBAAA,EAAuB,IAAA,CAAK,CAAA,CAAE,uBAAuB,CAAC,CAAA;AAAA,IACtD,WAAA,EAAa,IAAA,CAAK,CAAA,CAAE,aAAa,CAAC;AAAA,GACpC;AACF","file":"workflow.cjs","sourcesContent":["/**\n * Workflow-safe proxy for E2B sandbox operations.\n *\n * Uses longer timeouts than in-memory providers since E2B\n * sandboxes are remote and creation involves provisioning.\n *\n * Import this from `zeitlich/adapters/sandbox/e2b/workflow`\n * in your Temporal workflow files.\n *\n * By default the scope is derived from `workflowInfo().workflowType`,\n * so activities are automatically namespaced per workflow.\n *\n * @example\n * ```typescript\n * import { proxyE2bSandboxOps } from 'zeitlich/adapters/sandbox/e2b/workflow';\n *\n * const sandbox = proxyE2bSandboxOps();\n * ```\n */\nimport { proxyActivities, workflowInfo } from \"@temporalio/workflow\";\nimport type { SandboxOps } from \"../../../lib/sandbox/types\";\nimport type { E2bCaps } from \"./index\";\nimport type { E2bSandboxCreateOptions } from \"./types\";\n\nconst ADAPTER_PREFIX = \"e2b\";\n\nexport function proxyE2bSandboxOps(\n scope?: string,\n options?: Parameters<typeof proxyActivities>[0]\n): SandboxOps<E2bSandboxCreateOptions, unknown, E2bCaps> {\n const resolvedScope = scope ?? workflowInfo().workflowType;\n\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n const acts = proxyActivities<Record<string, (...args: any[]) => any>>(\n options ?? {\n startToCloseTimeout: \"120s\",\n retry: {\n maximumAttempts: 3,\n initialInterval: \"5s\",\n maximumInterval: \"60s\",\n backoffCoefficient: 3,\n },\n }\n );\n\n const prefix = `${ADAPTER_PREFIX}${resolvedScope.charAt(0).toUpperCase()}${resolvedScope.slice(1)}`;\n const p = (key: string): string =>\n `${prefix}${key.charAt(0).toUpperCase()}${key.slice(1)}`;\n\n return {\n createSandbox: acts[p(\"createSandbox\")],\n destroySandbox: acts[p(\"destroySandbox\")],\n pauseSandbox: acts[p(\"pauseSandbox\")],\n resumeSandbox: acts[p(\"resumeSandbox\")],\n snapshotSandbox: acts[p(\"snapshotSandbox\")],\n restoreSandbox: acts[p(\"restoreSandbox\")],\n deleteSandboxSnapshot: acts[p(\"deleteSandboxSnapshot\")],\n forkSandbox: acts[p(\"forkSandbox\")],\n } as SandboxOps<E2bSandboxCreateOptions, unknown, E2bCaps>;\n}\n"]}
|
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
import { proxyActivities } from '@temporalio/workflow';
|
|
2
|
-
import {
|
|
2
|
+
import { S as SandboxOps } from '../../../types-CJ7tCdl6.cjs';
|
|
3
|
+
import { E2bSandboxCreateOptions, E2bCaps } from './index.cjs';
|
|
3
4
|
import '@temporalio/common';
|
|
5
|
+
import '@e2b/code-interpreter';
|
|
4
6
|
|
|
5
7
|
/**
|
|
6
8
|
* Workflow-safe proxy for E2B sandbox operations.
|
|
@@ -22,6 +24,6 @@ import '@temporalio/common';
|
|
|
22
24
|
* ```
|
|
23
25
|
*/
|
|
24
26
|
|
|
25
|
-
declare function proxyE2bSandboxOps(scope?: string, options?: Parameters<typeof proxyActivities>[0]): SandboxOps
|
|
27
|
+
declare function proxyE2bSandboxOps(scope?: string, options?: Parameters<typeof proxyActivities>[0]): SandboxOps<E2bSandboxCreateOptions, unknown, E2bCaps>;
|
|
26
28
|
|
|
27
29
|
export { proxyE2bSandboxOps };
|
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
import { proxyActivities } from '@temporalio/workflow';
|
|
2
|
-
import {
|
|
2
|
+
import { S as SandboxOps } from '../../../types-CJ7tCdl6.js';
|
|
3
|
+
import { E2bSandboxCreateOptions, E2bCaps } from './index.js';
|
|
3
4
|
import '@temporalio/common';
|
|
5
|
+
import '@e2b/code-interpreter';
|
|
4
6
|
|
|
5
7
|
/**
|
|
6
8
|
* Workflow-safe proxy for E2B sandbox operations.
|
|
@@ -22,6 +24,6 @@ import '@temporalio/common';
|
|
|
22
24
|
* ```
|
|
23
25
|
*/
|
|
24
26
|
|
|
25
|
-
declare function proxyE2bSandboxOps(scope?: string, options?: Parameters<typeof proxyActivities>[0]): SandboxOps
|
|
27
|
+
declare function proxyE2bSandboxOps(scope?: string, options?: Parameters<typeof proxyActivities>[0]): SandboxOps<E2bSandboxCreateOptions, unknown, E2bCaps>;
|
|
26
28
|
|
|
27
29
|
export { proxyE2bSandboxOps };
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../../src/adapters/sandbox/e2b/proxy.ts"],"names":[],"mappings":";;;
|
|
1
|
+
{"version":3,"sources":["../../../../src/adapters/sandbox/e2b/proxy.ts"],"names":[],"mappings":";;;AAwBA,IAAM,cAAA,GAAiB,KAAA;AAEhB,SAAS,kBAAA,CACd,OACA,OAAA,EACuD;AACvD,EAAA,MAAM,aAAA,GAAgB,KAAA,IAAS,YAAA,EAAa,CAAE,YAAA;AAG9C,EAAA,MAAM,IAAA,GAAO,eAAA;AAAA,IACX,OAAA,IAAW;AAAA,MACT,mBAAA,EAAqB,MAAA;AAAA,MACrB,KAAA,EAAO;AAAA,QACL,eAAA,EAAiB,CAAA;AAAA,QACjB,eAAA,EAAiB,IAAA;AAAA,QACjB,eAAA,EAAiB,KAAA;AAAA,QACjB,kBAAA,EAAoB;AAAA;AACtB;AACF,GACF;AAEA,EAAA,MAAM,MAAA,GAAS,CAAA,EAAG,cAAc,CAAA,EAAG,cAAc,MAAA,CAAO,CAAC,CAAA,CAAE,WAAA,EAAa,CAAA,EAAG,aAAA,CAAc,KAAA,CAAM,CAAC,CAAC,CAAA,CAAA;AACjG,EAAA,MAAM,IAAI,CAAC,GAAA,KACT,CAAA,EAAG,MAAM,GAAG,GAAA,CAAI,MAAA,CAAO,CAAC,CAAA,CAAE,aAAa,CAAA,EAAG,GAAA,CAAI,KAAA,CAAM,CAAC,CAAC,CAAA,CAAA;AAExD,EAAA,OAAO;AAAA,IACL,aAAA,EAAe,IAAA,CAAK,CAAA,CAAE,eAAe,CAAC,CAAA;AAAA,IACtC,cAAA,EAAgB,IAAA,CAAK,CAAA,CAAE,gBAAgB,CAAC,CAAA;AAAA,IACxC,YAAA,EAAc,IAAA,CAAK,CAAA,CAAE,cAAc,CAAC,CAAA;AAAA,IACpC,aAAA,EAAe,IAAA,CAAK,CAAA,CAAE,eAAe,CAAC,CAAA;AAAA,IACtC,eAAA,EAAiB,IAAA,CAAK,CAAA,CAAE,iBAAiB,CAAC,CAAA;AAAA,IAC1C,cAAA,EAAgB,IAAA,CAAK,CAAA,CAAE,gBAAgB,CAAC,CAAA;AAAA,IACxC,qBAAA,EAAuB,IAAA,CAAK,CAAA,CAAE,uBAAuB,CAAC,CAAA;AAAA,IACtD,WAAA,EAAa,IAAA,CAAK,CAAA,CAAE,aAAa,CAAC;AAAA,GACpC;AACF","file":"workflow.js","sourcesContent":["/**\n * Workflow-safe proxy for E2B sandbox operations.\n *\n * Uses longer timeouts than in-memory providers since E2B\n * sandboxes are remote and creation involves provisioning.\n *\n * Import this from `zeitlich/adapters/sandbox/e2b/workflow`\n * in your Temporal workflow files.\n *\n * By default the scope is derived from `workflowInfo().workflowType`,\n * so activities are automatically namespaced per workflow.\n *\n * @example\n * ```typescript\n * import { proxyE2bSandboxOps } from 'zeitlich/adapters/sandbox/e2b/workflow';\n *\n * const sandbox = proxyE2bSandboxOps();\n * ```\n */\nimport { proxyActivities, workflowInfo } from \"@temporalio/workflow\";\nimport type { SandboxOps } from \"../../../lib/sandbox/types\";\nimport type { E2bCaps } from \"./index\";\nimport type { E2bSandboxCreateOptions } from \"./types\";\n\nconst ADAPTER_PREFIX = \"e2b\";\n\nexport function proxyE2bSandboxOps(\n scope?: string,\n options?: Parameters<typeof proxyActivities>[0]\n): SandboxOps<E2bSandboxCreateOptions, unknown, E2bCaps> {\n const resolvedScope = scope ?? workflowInfo().workflowType;\n\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n const acts = proxyActivities<Record<string, (...args: any[]) => any>>(\n options ?? {\n startToCloseTimeout: \"120s\",\n retry: {\n maximumAttempts: 3,\n initialInterval: \"5s\",\n maximumInterval: \"60s\",\n backoffCoefficient: 3,\n },\n }\n );\n\n const prefix = `${ADAPTER_PREFIX}${resolvedScope.charAt(0).toUpperCase()}${resolvedScope.slice(1)}`;\n const p = (key: string): string =>\n `${prefix}${key.charAt(0).toUpperCase()}${key.slice(1)}`;\n\n return {\n createSandbox: acts[p(\"createSandbox\")],\n destroySandbox: acts[p(\"destroySandbox\")],\n pauseSandbox: acts[p(\"pauseSandbox\")],\n resumeSandbox: acts[p(\"resumeSandbox\")],\n snapshotSandbox: acts[p(\"snapshotSandbox\")],\n restoreSandbox: acts[p(\"restoreSandbox\")],\n deleteSandboxSnapshot: acts[p(\"deleteSandboxSnapshot\")],\n forkSandbox: acts[p(\"forkSandbox\")],\n } as SandboxOps<E2bSandboxCreateOptions, unknown, E2bCaps>;\n}\n"]}
|
|
@@ -101,6 +101,13 @@ var InMemorySandboxImpl = class {
|
|
|
101
101
|
return this.justBashFs;
|
|
102
102
|
}
|
|
103
103
|
};
|
|
104
|
+
var IN_MEMORY_CAPS = [
|
|
105
|
+
"pause",
|
|
106
|
+
"resume",
|
|
107
|
+
"snapshot",
|
|
108
|
+
"restore",
|
|
109
|
+
"fork"
|
|
110
|
+
];
|
|
104
111
|
var InMemorySandboxProvider = class {
|
|
105
112
|
constructor(defaultOptions) {
|
|
106
113
|
this.defaultOptions = defaultOptions;
|
|
@@ -112,6 +119,9 @@ var InMemorySandboxProvider = class {
|
|
|
112
119
|
execution: true,
|
|
113
120
|
persistence: true
|
|
114
121
|
};
|
|
122
|
+
supportedCapabilities = new Set(
|
|
123
|
+
IN_MEMORY_CAPS
|
|
124
|
+
);
|
|
115
125
|
sandboxes = /* @__PURE__ */ new Map();
|
|
116
126
|
async get(id) {
|
|
117
127
|
const sandbox = this.sandboxes.get(id);
|
|
@@ -198,6 +208,7 @@ var InMemorySandboxProvider = class {
|
|
|
198
208
|
}
|
|
199
209
|
};
|
|
200
210
|
|
|
211
|
+
exports.IN_MEMORY_CAPS = IN_MEMORY_CAPS;
|
|
201
212
|
exports.InMemorySandboxProvider = InMemorySandboxProvider;
|
|
202
213
|
//# sourceMappingURL=index.cjs.map
|
|
203
214
|
//# sourceMappingURL=index.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../../src/lib/sandbox/types.ts","../../../../src/lib/thread/id.ts","../../../../src/adapters/sandbox/inmemory/index.ts"],"names":["ApplicationFailure","uuid4","Bash","InMemoryFs"],"mappings":";;;;;;;AAuPO,IAAM,oBAAA,GAAN,cAAmCA,yBAAA,CAAmB;AAAA,EAC3D,YAAY,SAAA,EAAmB;AAC7B,IAAA,KAAA,CAAM,CAAA,mBAAA,EAAsB,SAAS,CAAA,CAAA,EAAI,sBAAA,EAAwB,IAAI,CAAA;AAAA,EACvE;AACF,CAAA;ACzPA,IAAM,MAAA,GAAS,gEAAA;AAaR,SAAS,UAAA,CAAW,SAAS,EAAA,EAAY;AAC9C,EAAA,MAAM,GAAA,GAAMC,cAAA,EAAM,CAAE,OAAA,CAAQ,MAAM,EAAE,CAAA;AACpC,EAAA,IAAI,MAAA,GAAS,EAAA;AACb,EAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,MAAA,EAAQ,CAAA,EAAA,EAAK;AAC/B,IAAA,MAAM,IAAA,GAAO,QAAA,CAAS,GAAA,CAAI,KAAA,CAAM,CAAA,GAAI,GAAG,CAAA,GAAI,CAAA,GAAI,CAAC,CAAA,EAAG,EAAE,CAAA;AACrD,IAAA,MAAA,IAAU,MAAA,CAAO,IAAA,GAAO,MAAA,CAAO,MAAM,CAAA;AAAA,EACvC;AACA,EAAA,OAAO,MAAA;AACT;;;ACIA,SAAS,YAAY,EAAA,EAAoC;AACvD,EAAA,MAAM,aAAA,GAAgB,GAAA;AACtB,EAAA,MAAM,gBAAgB,CAAC,IAAA,KACrB,EAAA,CAAG,WAAA,CAAY,eAAe,IAAI,CAAA;AAEpC,EAAA,OAAO;AAAA,IACL,aAAA;AAAA,IACA,UAAU,CAAC,IAAA,KAAS,GAAG,QAAA,CAAS,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IACnD,gBAAgB,CAAC,IAAA,KAAS,GAAG,cAAA,CAAe,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IAC/D,SAAA,EAAW,CAAC,IAAA,EAAM,OAAA,KAAY,GAAG,SAAA,CAAU,aAAA,CAAc,IAAI,CAAA,EAAG,OAAO,CAAA;AAAA,IACvE,UAAA,EAAY,CAAC,IAAA,EAAM,OAAA,KAAY,GAAG,UAAA,CAAW,aAAA,CAAc,IAAI,CAAA,EAAG,OAAO,CAAA;AAAA,IACzE,QAAQ,CAAC,IAAA,KAAS,GAAG,MAAA,CAAO,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IAC/C,IAAA,EAAM,OAAO,IAAA,KAA4B;AACvC,MAAA,MAAM,IAAI,MAAM,EAAA,CAAG,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAC3C,MAAA,OAAO;AAAA,QACL,QAAQ,CAAA,CAAE,MAAA;AAAA,QACV,aAAa,CAAA,CAAE,WAAA;AAAA,QACf,gBAAgB,CAAA,CAAE,cAAA;AAAA,QAClB,MAAM,CAAA,CAAE,IAAA;AAAA,QACR,OAAO,CAAA,CAAE;AAAA,OACX;AAAA,IACF,CAAA;AAAA,IACA,KAAA,EAAO,CAAC,IAAA,EAAM,IAAA,KAAS,GAAG,KAAA,CAAM,aAAA,CAAc,IAAI,CAAA,EAAG,IAAI,CAAA;AAAA,IACzD,SAAS,CAAC,IAAA,KAAS,GAAG,OAAA,CAAQ,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IACjD,oBAAA,EAAsB,OAAO,IAAA,KAAiC;AAC5D,MAAA,MAAM,OAAA,GAAU,cAAc,IAAI,CAAA;AAClC,MAAA,IAAI,CAAC,GAAG,oBAAA,EAAsB;AAC5B,QAAA,MAAM,KAAA,GAAQ,MAAM,EAAA,CAAG,OAAA,CAAQ,OAAO,CAAA;AACtC,QAAA,OAAO,OAAA,CAAQ,GAAA;AAAA,UACb,KAAA,CAAM,GAAA,CAAI,OAAO,IAAA,KAAS;AACxB,YAAA,MAAM,SAAA,GAAY,EAAA,CAAG,WAAA,CAAY,OAAA,EAAS,IAAI,CAAA;AAC9C,YAAA,MAAM,CAAA,GAAI,MAAM,EAAA,CAAG,IAAA,CAAK,SAAS,CAAA;AACjC,YAAA,OAAO;AAAA,cACL,IAAA;AAAA,cACA,QAAQ,CAAA,CAAE,MAAA;AAAA,cACV,aAAa,CAAA,CAAE,WAAA;AAAA,cACf,gBAAgB,CAAA,CAAE;AAAA,aACpB;AAAA,UACF,CAAC;AAAA,SACH;AAAA,MACF;AACA,MAAA,OAAO,EAAA,CAAG,qBAAqB,OAAO,CAAA;AAAA,IACxC,CAAA;AAAA,IACA,EAAA,EAAI,CAAC,IAAA,EAAM,IAAA,KAAS,GAAG,EAAA,CAAG,aAAA,CAAc,IAAI,CAAA,EAAG,IAAI,CAAA;AAAA,IACnD,EAAA,EAAI,CAAC,GAAA,EAAK,IAAA,EAAM,IAAA,KACd,EAAA,CAAG,EAAA,CAAG,aAAA,CAAc,GAAG,CAAA,EAAG,aAAA,CAAc,IAAI,GAAG,IAAI,CAAA;AAAA,IACrD,EAAA,EAAI,CAAC,GAAA,EAAK,IAAA,KAAS,EAAA,CAAG,EAAA,CAAG,aAAA,CAAc,GAAG,CAAA,EAAG,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IAChE,UAAU,CAAC,IAAA,KAAS,GAAG,QAAA,CAAS,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IACnD,WAAA,EAAa,CAAC,IAAA,EAAM,CAAA,KAAM,GAAG,WAAA,CAAY,aAAA,CAAc,IAAI,CAAA,EAAG,CAAC;AAAA,GACjE;AACF;AAgBA,IAAM,sBAAN,MAA6C;AAAA,EAU3C,WAAA,CACW,EAAA,EACD,UAAA,EACR,OAAA,EACA;AAHS,IAAA,IAAA,CAAA,EAAA,GAAA,EAAA;AACD,IAAA,IAAA,CAAA,UAAA,GAAA,UAAA;AAGR,IAAA,IAAA,CAAK,EAAA,GAAK,YAAY,UAAU,CAAA;AAChC,IAAA,IAAA,CAAK,WAAA,GAAc;AAAA,MACjB,eAAA,EAAiB,EAAE,eAAA,EAAiB,QAAA,EAAW;AAAA,MAC/C,GAAG,OAAA,EAAS;AAAA,KACd;AAAA,EACF;AAAA,EATW,EAAA;AAAA,EACD,UAAA;AAAA,EAXD,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EAES,EAAA;AAAA,EACD,WAAA;AAAA,EAcR,MAAM,IAAA,CAAK,OAAA,EAAiB,QAAA,EAA6C;AACvE,IAAA,MAAM,IAAA,GAAO,IAAIC,aAAA,CAAK,EAAE,GAAG,KAAK,WAAA,EAAa,EAAA,EAAI,IAAA,CAAK,UAAA,EAAY,CAAA;AAClE,IAAA,MAAM,EAAE,UAAU,MAAA,EAAQ,MAAA,KAAW,MAAM,IAAA,CAAK,KAAK,OAAO,CAAA;AAC5D,IAAA,OAAO,EAAE,QAAA,EAAU,MAAA,EAAQ,MAAA,EAAO;AAAA,EACpC;AAAA,EAEA,MAAM,OAAA,GAAyB;AAAA,EAE/B;AAAA;AAAA,EAGA,cAAA,GAA8B;AAC5B,IAAA,OAAO,IAAA,CAAK,UAAA;AAAA,EACd;AACF,CAAA;AAMO,IAAM,0BAAN,MAAyD;AAAA,EAU9D,YAAoB,cAAA,EAAyC;AAAzC,IAAA,IAAA,CAAA,cAAA,GAAA,cAAA;AAAA,EAA0C;AAAA,EAA1C,cAAA;AAAA,EATX,EAAA,GAAK,UAAA;AAAA,EACL,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EAEQ,SAAA,uBAAgB,GAAA,EAAiC;AAAA,EAIzD,MAAM,IAAI,EAAA,EAA8B;AACtC,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAE,CAAA;AACrC,IAAA,IAAI,CAAC,OAAA,EAAS,MAAM,IAAI,qBAAqB,EAAE,CAAA;AAC/C,IAAA,OAAO,OAAA;AAAA,EACT;AAAA,EAEA,MAAM,QAAQ,EAAA,EAA2B;AACvC,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAE,CAAA;AACrC,IAAA,IAAI,OAAA,EAAS;AACX,MAAA,MAAM,QAAQ,OAAA,EAAQ;AACtB,MAAA,IAAA,CAAK,SAAA,CAAU,OAAO,EAAE,CAAA;AAAA,IAC1B;AAAA,EACF;AAAA,EAEA,MAAM,KAAA,CAAM,UAAA,EAAoB,WAAA,EAAqC;AAAA,EAErE;AAAA,EAEA,MAAM,OAAO,UAAA,EAAmC;AAAA,EAEhD;AAAA,EAEA,MAAM,OAAO,OAAA,EAA8D;AACzE,IAAA,MAAM,EAAA,GAAK,OAAA,EAAS,EAAA,IAAM,UAAA,EAAW;AACrC,IAAA,MAAM,eAA6B,EAAC;AAEpC,IAAA,IAAI,SAAS,YAAA,EAAc;AACzB,MAAA,KAAA,MAAW,CAAC,MAAM,OAAO,CAAA,IAAK,OAAO,OAAA,CAAQ,OAAA,CAAQ,YAAY,CAAA,EAAG;AAClE,QAAA,YAAA,CAAa,IAAI,CAAA,GAAI,OAAA;AAAA,MACvB;AAAA,IACF;AAEA,IAAA,MAAM,EAAA,GAAK,IAAIC,mBAAA,CAAW,YAAY,CAAA;AACtC,IAAA,MAAM,UAAU,IAAI,mBAAA,CAAoB,EAAA,EAAI,EAAA,EAAI,KAAK,cAAc,CAAA;AACnE,IAAA,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAA,EAAI,OAAO,CAAA;AAC9B,IAAA,OAAO,EAAE,OAAA,EAAQ;AAAA,EACnB;AAAA,EAEA,MAAM,QAAA,CACJ,SAAA,EACA,QAAA,EAC0B;AAC1B,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,SAAS,CAAA;AAC5C,IAAA,IAAI,CAAC,OAAA,EAAS,MAAM,IAAI,qBAAqB,SAAS,CAAA;AAEtD,IAAA,MAAM,EAAA,GAAK,QAAQ,cAAA,EAAe;AAClC,IAAA,MAAM,KAAA,GAAQ,GAAG,WAAA,EAAY;AAC7B,IAAA,MAAM,QAAgC,EAAC;AAEvC,IAAA,KAAA,MAAW,KAAK,KAAA,EAAO;AACrB,MAAA,IAAI;AACF,QAAA,MAAM,IAAA,GAAO,MAAM,EAAA,CAAG,IAAA,CAAK,CAAC,CAAA;AAC5B,QAAA,IAAI,KAAK,MAAA,EAAQ;AACf,UAAA,KAAA,CAAM,CAAC,CAAA,GAAI,MAAM,EAAA,CAAG,SAAS,CAAC,CAAA;AAAA,QAChC;AAAA,MACF,CAAA,CAAA,MAAQ;AAAA,MAER;AAAA,IACF;AAEA,IAAA,OAAO;AAAA,MACL,SAAA;AAAA,MACA,YAAY,IAAA,CAAK,EAAA;AAAA,MACjB,IAAA,EAAM,EAAE,KAAA,EAAM;AAAA,MACd,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA;AAAY,KACpC;AAAA,EACF;AAAA,EAEA,MAAM,IAAA,CACJ,SAAA,EACA,QAAA,EACkB;AAClB,IAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,GAAA,CAAI,SAAS,CAAA;AAExC,IAAA,MAAM,OAAA,GAAU,MAAM,OAAA,CAAQ,EAAA,CAAG,qBAAqB,GAAG,CAAA;AACzD,IAAA,MAAM,eAA2C,EAAC;AAClD,IAAA,KAAA,MAAW,SAAS,OAAA,EAAS;AAC3B,MAAA,IAAI,MAAM,MAAA,EAAQ;AAChB,QAAA,YAAA,CAAa,KAAA,CAAM,IAAI,CAAA,GAAI,MAAM,QAAQ,EAAA,CAAG,cAAA,CAAe,MAAM,IAAI,CAAA;AAAA,MACvE;AAAA,IACF;AAEA,IAAA,MAAM,UAAA,GAAa,MAAM,IAAA,CAAK,MAAA,CAAO;AAAA,MACnC,IAAI,UAAA,EAAW;AAAA,MACf;AAAA,KACD,CAAA;AACD,IAAA,OAAO,UAAA,CAAW,OAAA;AAAA,EACpB;AAAA,EAEA,MAAM,OAAA,CACJ,QAAA,EACA,QAAA,EACkB;AAClB,IAAA,MAAM,EAAE,KAAA,EAAM,GAAI,QAAA,CAAS,IAAA;AAC3B,IAAA,MAAM,eAA6B,EAAC;AACpC,IAAA,KAAA,MAAW,CAAC,IAAA,EAAM,OAAO,KAAK,MAAA,CAAO,OAAA,CAAQ,KAAK,CAAA,EAAG;AACnD,MAAA,YAAA,CAAa,IAAI,CAAA,GAAI,OAAA;AAAA,IACvB;AAEA,IAAA,MAAM,EAAA,GAAK,IAAIA,mBAAA,CAAW,YAAY,CAAA;AACtC,IAAA,MAAM,UAAU,IAAI,mBAAA;AAAA,MAClB,QAAA,CAAS,SAAA;AAAA,MACT,EAAA;AAAA,MACA,IAAA,CAAK;AAAA,KACP;AACA,IAAA,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,OAAA,CAAQ,EAAA,EAAI,OAAO,CAAA;AACtC,IAAA,OAAO,OAAA;AAAA,EACT;AAAA,EAEA,MAAM,eAAe,SAAA,EAA2C;AAAA,EAGhE;AACF","file":"index.cjs","sourcesContent":["// ============================================================================\n// Sandbox Filesystem\n// ============================================================================\n\nexport interface DirentEntry {\n name: string;\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n}\n\nexport interface FileStat {\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n size: number;\n mtime: Date;\n}\n\n// ============================================================================\n// Network & lifecycle\n// ============================================================================\n\nexport interface SandboxNetworkConfig {\n allowOut?: string[];\n denyOut?: string[];\n allowPublicTraffic?: boolean;\n}\n\nexport interface SandboxLifecycleConfig {\n onTimeout: \"kill\" | \"pause\";\n autoResume?: boolean;\n}\n\n/**\n * Provider-agnostic filesystem interface.\n *\n * Implementations that don't support a method should throw\n * {@link SandboxNotSupportedError}.\n */\nexport interface SandboxFileSystem {\n /** Base directory used when resolving relative paths. */\n readonly workspaceBase: string;\n readFile(path: string): Promise<string>;\n readFileBuffer(path: string): Promise<Uint8Array>;\n writeFile(path: string, content: string | Uint8Array): Promise<void>;\n appendFile(path: string, content: string | Uint8Array): Promise<void>;\n exists(path: string): Promise<boolean>;\n stat(path: string): Promise<FileStat>;\n mkdir(path: string, options?: { recursive?: boolean }): Promise<void>;\n readdir(path: string): Promise<string[]>;\n readdirWithFileTypes(path: string): Promise<DirentEntry[]>;\n rm(\n path: string,\n options?: { recursive?: boolean; force?: boolean }\n ): Promise<void>;\n cp(\n src: string,\n dest: string,\n options?: { recursive?: boolean }\n ): Promise<void>;\n mv(src: string, dest: string): Promise<void>;\n readlink(path: string): Promise<string>;\n resolvePath(base: string, path: string): string;\n}\n\n// ============================================================================\n// Execution\n// ============================================================================\n\nexport interface ExecOptions {\n timeout?: number;\n cwd?: string;\n env?: Record<string, string>;\n}\n\nexport interface ExecResult {\n exitCode: number;\n stdout: string;\n stderr: string;\n}\n\n// ============================================================================\n// Capabilities\n// ============================================================================\n\nexport interface SandboxCapabilities {\n /** Sandbox supports filesystem operations */\n filesystem: boolean;\n /** Sandbox supports shell/command execution */\n execution: boolean;\n /** Sandbox state can be persisted and restored */\n persistence: boolean;\n}\n\n// ============================================================================\n// Sandbox\n// ============================================================================\n\nexport interface Sandbox {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n readonly fs: SandboxFileSystem;\n\n exec(command: string, options?: ExecOptions): Promise<ExecResult>;\n destroy(): Promise<void>;\n}\n\n// ============================================================================\n// Snapshots\n// ============================================================================\n\nexport interface SandboxSnapshot {\n sandboxId: string;\n providerId: string;\n /** Provider-specific serialised state */\n data: unknown;\n createdAt: string;\n}\n\n// ============================================================================\n// Provider\n// ============================================================================\n\nexport interface SandboxCreateOptions {\n /** Preferred sandbox ID (provider may ignore) */\n id?: string;\n /** Seed the filesystem with these files */\n initialFiles?: Record<string, string | Uint8Array>;\n /** Environment variables available inside the sandbox */\n env?: Record<string, string>;\n /** Key-value metadata surfaced via provider list/query APIs */\n metadata?: Record<string, string>;\n /** Sandbox idle timeout in milliseconds */\n timeoutMs?: number;\n /** Enable or disable outbound internet access */\n allowInternetAccess?: boolean;\n /** Outbound network allow/deny rules */\n network?: SandboxNetworkConfig;\n /** Sandbox timeout behaviour */\n lifecycle?: SandboxLifecycleConfig;\n}\n\nexport interface SandboxCreateResult {\n sandbox: Sandbox;\n}\n\nexport interface SandboxProvider<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TSandbox extends Sandbox = Sandbox,\n> {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n\n create(options?: TOptions): Promise<SandboxCreateResult>;\n get(sandboxId: string): Promise<TSandbox>;\n destroy(sandboxId: string): Promise<void>;\n pause(sandboxId: string, ttlSeconds?: number): Promise<void>;\n /** Resume a paused sandbox. No-op if already running. */\n resume(sandboxId: string): Promise<void>;\n /**\n * Capture a snapshot of a running sandbox. `options` is a per-call override\n * merged on top of the provider's static defaults.\n */\n snapshot(sandboxId: string, options?: TOptions): Promise<SandboxSnapshot>;\n /**\n * Restore a sandbox from a snapshot. `options` is a per-call override\n * merged on top of the provider's static defaults.\n */\n restore(snapshot: SandboxSnapshot, options?: TOptions): Promise<Sandbox>;\n /** Delete a previously captured snapshot. No-op if already deleted. */\n deleteSnapshot(snapshot: SandboxSnapshot): Promise<void>;\n /**\n * Fork a running sandbox into a new one. `options` is a per-call override\n * merged on top of the provider's static defaults.\n */\n fork(sandboxId: string, options?: TOptions): Promise<Sandbox>;\n}\n\n// ============================================================================\n// SandboxOps — workflow-side activity interface (like ThreadOps)\n// ============================================================================\n\nexport interface SandboxOps<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n> {\n createSandbox(\n options?: TOptions,\n ctx?: TCtx\n ): Promise<{ sandboxId: string } | null>;\n destroySandbox(sandboxId: string): Promise<void>;\n pauseSandbox(sandboxId: string): Promise<void>;\n /** Resume a paused sandbox. No-op if already running. */\n resumeSandbox(sandboxId: string): Promise<void>;\n /** Capture a snapshot. `options` is a per-call override merged on top of provider defaults. */\n snapshotSandbox(\n sandboxId: string,\n options?: TOptions\n ): Promise<SandboxSnapshot>;\n /** Create a fresh sandbox from a snapshot. `options` is a per-call override merged on top of provider defaults. */\n restoreSandbox(\n snapshot: SandboxSnapshot,\n options?: TOptions\n ): Promise<string>;\n /** Delete a previously captured snapshot. No-op if already deleted. */\n deleteSandboxSnapshot(snapshot: SandboxSnapshot): Promise<void>;\n /** Fork a running sandbox. `options` is a per-call override merged on top of provider defaults. */\n forkSandbox(sandboxId: string, options?: TOptions): Promise<string>;\n}\n\n/**\n * Maps generic {@link SandboxOps} method names to adapter-prefixed names.\n *\n * @example\n * ```typescript\n * type InMemOps = PrefixedSandboxOps<\"inMemory\">;\n * // → { inMemoryCreateSandbox, inMemoryDestroySandbox, inMemorySnapshotSandbox }\n * ```\n */\nexport type PrefixedSandboxOps<\n TPrefix extends string,\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n> = {\n [K in keyof SandboxOps<\n TOptions,\n TCtx\n > as `${TPrefix}${Capitalize<K & string>}`]: SandboxOps<TOptions, TCtx>[K];\n};\n\n// ============================================================================\n// Errors\n// ============================================================================\n\nimport { ApplicationFailure } from \"@temporalio/common\";\n\nexport class SandboxNotSupportedError extends ApplicationFailure {\n constructor(operation: string) {\n super(\n `Sandbox does not support: ${operation}`,\n \"SandboxNotSupportedError\",\n true\n );\n }\n}\n\nexport class SandboxNotFoundError extends ApplicationFailure {\n constructor(sandboxId: string) {\n super(`Sandbox not found: ${sandboxId}`, \"SandboxNotFoundError\", true);\n }\n}\n","import { uuid4 } from \"@temporalio/workflow\";\n\nconst BASE62 = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789\";\n\n/**\n * Generate a compact, workflow-deterministic identifier.\n *\n * Uses Temporal's `uuid4()` internally (seeded by the workflow's RNG),\n * then re-encodes the hex bytes into a base-62 alphabet for a shorter,\n * more token-efficient identifier (~3 tokens vs ~10 for a full UUID).\n *\n * Suitable for thread IDs, child workflow IDs, or any workflow-scoped identifier.\n *\n * @param length - Number of base-62 characters (default 12, ~71 bits of entropy)\n */\nexport function getShortId(length = 12): string {\n const hex = uuid4().replace(/-/g, \"\");\n let result = \"\";\n for (let i = 0; i < length; i++) {\n const byte = parseInt(hex.slice(i * 2, i * 2 + 2), 16);\n result += BASE62[byte % BASE62.length];\n }\n return result;\n}\n","import {\n Bash,\n InMemoryFs,\n type BashOptions,\n type IFileSystem,\n type InitialFiles,\n} from \"just-bash\";\nimport type {\n Sandbox,\n SandboxCapabilities,\n SandboxCreateOptions,\n SandboxCreateResult,\n SandboxFileSystem,\n SandboxProvider,\n SandboxSnapshot,\n ExecOptions,\n ExecResult,\n DirentEntry,\n FileStat,\n} from \"../../../lib/sandbox/types\";\nimport { SandboxNotFoundError } from \"../../../lib/sandbox/types\";\nimport { getShortId } from \"../../../lib/thread/id\";\n\n// ============================================================================\n// Adapter: IFileSystem → SandboxFileSystem\n// ============================================================================\n\nfunction toSandboxFs(fs: IFileSystem): SandboxFileSystem {\n const workspaceBase = \"/\";\n const normalisePath = (path: string): string =>\n fs.resolvePath(workspaceBase, path);\n\n return {\n workspaceBase,\n readFile: (path) => fs.readFile(normalisePath(path)),\n readFileBuffer: (path) => fs.readFileBuffer(normalisePath(path)),\n writeFile: (path, content) => fs.writeFile(normalisePath(path), content),\n appendFile: (path, content) => fs.appendFile(normalisePath(path), content),\n exists: (path) => fs.exists(normalisePath(path)),\n stat: async (path): Promise<FileStat> => {\n const s = await fs.stat(normalisePath(path));\n return {\n isFile: s.isFile,\n isDirectory: s.isDirectory,\n isSymbolicLink: s.isSymbolicLink,\n size: s.size,\n mtime: s.mtime,\n };\n },\n mkdir: (path, opts) => fs.mkdir(normalisePath(path), opts),\n readdir: (path) => fs.readdir(normalisePath(path)),\n readdirWithFileTypes: async (path): Promise<DirentEntry[]> => {\n const dirPath = normalisePath(path);\n if (!fs.readdirWithFileTypes) {\n const names = await fs.readdir(dirPath);\n return Promise.all(\n names.map(async (name) => {\n const childPath = fs.resolvePath(dirPath, name);\n const s = await fs.stat(childPath);\n return {\n name,\n isFile: s.isFile,\n isDirectory: s.isDirectory,\n isSymbolicLink: s.isSymbolicLink,\n };\n })\n );\n }\n return fs.readdirWithFileTypes(dirPath);\n },\n rm: (path, opts) => fs.rm(normalisePath(path), opts),\n cp: (src, dest, opts) =>\n fs.cp(normalisePath(src), normalisePath(dest), opts),\n mv: (src, dest) => fs.mv(normalisePath(src), normalisePath(dest)),\n readlink: (path) => fs.readlink(normalisePath(path)),\n resolvePath: (base, p) => fs.resolvePath(normalisePath(base), p),\n };\n}\n\n// ============================================================================\n// InMemorySandbox\n// ============================================================================\n\nexport interface InMemorySandboxOptions {\n /** Options forwarded to `just-bash` `Bash` (minus `fs` which is managed) */\n bashOptions?: Omit<BashOptions, \"fs\">;\n}\n\n/**\n * An in-memory {@link Sandbox} backed by `just-bash`.\n */\nexport type InMemorySandbox = Sandbox & { fs: SandboxFileSystem };\n\nclass InMemorySandboxImpl implements Sandbox {\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n\n readonly fs: SandboxFileSystem;\n private bashOptions: Omit<BashOptions, \"fs\">;\n\n constructor(\n readonly id: string,\n private justBashFs: IFileSystem,\n options?: InMemorySandboxOptions\n ) {\n this.fs = toSandboxFs(justBashFs);\n this.bashOptions = {\n executionLimits: { maxStringLength: 52_428_800 },\n ...options?.bashOptions,\n };\n }\n\n async exec(command: string, _options?: ExecOptions): Promise<ExecResult> {\n const bash = new Bash({ ...this.bashOptions, fs: this.justBashFs });\n const { exitCode, stderr, stdout } = await bash.exec(command);\n return { exitCode, stdout, stderr };\n }\n\n async destroy(): Promise<void> {\n // In-memory: nothing to clean up\n }\n\n /** Expose the underlying IFileSystem for snapshot serialisation */\n _getJustBashFs(): IFileSystem {\n return this.justBashFs;\n }\n}\n\n// ============================================================================\n// InMemorySandboxProvider\n// ============================================================================\n\nexport class InMemorySandboxProvider implements SandboxProvider {\n readonly id = \"inMemory\";\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n\n private sandboxes = new Map<string, InMemorySandboxImpl>();\n\n constructor(private defaultOptions?: InMemorySandboxOptions) {}\n\n async get(id: string): Promise<Sandbox> {\n const sandbox = this.sandboxes.get(id);\n if (!sandbox) throw new SandboxNotFoundError(id);\n return sandbox;\n }\n\n async destroy(id: string): Promise<void> {\n const sandbox = this.sandboxes.get(id);\n if (sandbox) {\n await sandbox.destroy();\n this.sandboxes.delete(id);\n }\n }\n\n async pause(_sandboxId: string, _ttlSeconds?: number): Promise<void> {\n // In-memory: nothing to pause\n }\n\n async resume(_sandboxId: string): Promise<void> {\n // In-memory: nothing to resume\n }\n\n async create(options?: SandboxCreateOptions): Promise<SandboxCreateResult> {\n const id = options?.id ?? getShortId();\n const initialFiles: InitialFiles = {};\n\n if (options?.initialFiles) {\n for (const [path, content] of Object.entries(options.initialFiles)) {\n initialFiles[path] = content;\n }\n }\n\n const fs = new InMemoryFs(initialFiles);\n const sandbox = new InMemorySandboxImpl(id, fs, this.defaultOptions);\n this.sandboxes.set(id, sandbox);\n return { sandbox };\n }\n\n async snapshot(\n sandboxId: string,\n _options?: SandboxCreateOptions\n ): Promise<SandboxSnapshot> {\n const sandbox = this.sandboxes.get(sandboxId);\n if (!sandbox) throw new SandboxNotFoundError(sandboxId);\n\n const fs = sandbox._getJustBashFs();\n const paths = fs.getAllPaths();\n const files: Record<string, string> = {};\n\n for (const p of paths) {\n try {\n const stat = await fs.stat(p);\n if (stat.isFile) {\n files[p] = await fs.readFile(p);\n }\n } catch {\n // skip entries that can't be read (e.g. broken symlinks)\n }\n }\n\n return {\n sandboxId,\n providerId: this.id,\n data: { files },\n createdAt: new Date().toISOString(),\n };\n }\n\n async fork(\n sandboxId: string,\n _options?: SandboxCreateOptions\n ): Promise<Sandbox> {\n const sandbox = await this.get(sandboxId);\n\n const entries = await sandbox.fs.readdirWithFileTypes(\"/\");\n const initialFiles: Record<string, Uint8Array> = {};\n for (const entry of entries) {\n if (entry.isFile) {\n initialFiles[entry.name] = await sandbox.fs.readFileBuffer(entry.name);\n }\n }\n\n const newSandbox = await this.create({\n id: getShortId(),\n initialFiles,\n });\n return newSandbox.sandbox;\n }\n\n async restore(\n snapshot: SandboxSnapshot,\n _options?: SandboxCreateOptions\n ): Promise<Sandbox> {\n const { files } = snapshot.data as { files: Record<string, string> };\n const initialFiles: InitialFiles = {};\n for (const [path, content] of Object.entries(files)) {\n initialFiles[path] = content;\n }\n\n const fs = new InMemoryFs(initialFiles);\n const sandbox = new InMemorySandboxImpl(\n snapshot.sandboxId,\n fs,\n this.defaultOptions\n );\n this.sandboxes.set(sandbox.id, sandbox);\n return sandbox;\n }\n\n async deleteSnapshot(_snapshot: SandboxSnapshot): Promise<void> {\n // In-memory snapshots are opaque data held by the caller — nothing to\n // delete on the provider side.\n }\n}\n"]}
|
|
1
|
+
{"version":3,"sources":["../../../../src/lib/sandbox/types.ts","../../../../src/lib/thread/id.ts","../../../../src/adapters/sandbox/inmemory/index.ts"],"names":["ApplicationFailure","uuid4","Bash","InMemoryFs"],"mappings":";;;;;;;AAsYO,IAAM,oBAAA,GAAN,cAAmCA,yBAAA,CAAmB;AAAA,EAC3D,YAAY,SAAA,EAAmB;AAC7B,IAAA,KAAA,CAAM,CAAA,mBAAA,EAAsB,SAAS,CAAA,CAAA,EAAI,sBAAA,EAAwB,IAAI,CAAA;AAAA,EACvE;AACF,CAAA;ACxYA,IAAM,MAAA,GAAS,gEAAA;AAaR,SAAS,UAAA,CAAW,SAAS,EAAA,EAAY;AAC9C,EAAA,MAAM,GAAA,GAAMC,cAAA,EAAM,CAAE,OAAA,CAAQ,MAAM,EAAE,CAAA;AACpC,EAAA,IAAI,MAAA,GAAS,EAAA;AACb,EAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,MAAA,EAAQ,CAAA,EAAA,EAAK;AAC/B,IAAA,MAAM,IAAA,GAAO,QAAA,CAAS,GAAA,CAAI,KAAA,CAAM,CAAA,GAAI,GAAG,CAAA,GAAI,CAAA,GAAI,CAAC,CAAA,EAAG,EAAE,CAAA;AACrD,IAAA,MAAA,IAAU,MAAA,CAAO,IAAA,GAAO,MAAA,CAAO,MAAM,CAAA;AAAA,EACvC;AACA,EAAA,OAAO,MAAA;AACT;;;ACKA,SAAS,YAAY,EAAA,EAAoC;AACvD,EAAA,MAAM,aAAA,GAAgB,GAAA;AACtB,EAAA,MAAM,gBAAgB,CAAC,IAAA,KACrB,EAAA,CAAG,WAAA,CAAY,eAAe,IAAI,CAAA;AAEpC,EAAA,OAAO;AAAA,IACL,aAAA;AAAA,IACA,UAAU,CAAC,IAAA,KAAS,GAAG,QAAA,CAAS,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IACnD,gBAAgB,CAAC,IAAA,KAAS,GAAG,cAAA,CAAe,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IAC/D,SAAA,EAAW,CAAC,IAAA,EAAM,OAAA,KAAY,GAAG,SAAA,CAAU,aAAA,CAAc,IAAI,CAAA,EAAG,OAAO,CAAA;AAAA,IACvE,UAAA,EAAY,CAAC,IAAA,EAAM,OAAA,KAAY,GAAG,UAAA,CAAW,aAAA,CAAc,IAAI,CAAA,EAAG,OAAO,CAAA;AAAA,IACzE,QAAQ,CAAC,IAAA,KAAS,GAAG,MAAA,CAAO,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IAC/C,IAAA,EAAM,OAAO,IAAA,KAA4B;AACvC,MAAA,MAAM,IAAI,MAAM,EAAA,CAAG,IAAA,CAAK,aAAA,CAAc,IAAI,CAAC,CAAA;AAC3C,MAAA,OAAO;AAAA,QACL,QAAQ,CAAA,CAAE,MAAA;AAAA,QACV,aAAa,CAAA,CAAE,WAAA;AAAA,QACf,gBAAgB,CAAA,CAAE,cAAA;AAAA,QAClB,MAAM,CAAA,CAAE,IAAA;AAAA,QACR,OAAO,CAAA,CAAE;AAAA,OACX;AAAA,IACF,CAAA;AAAA,IACA,KAAA,EAAO,CAAC,IAAA,EAAM,IAAA,KAAS,GAAG,KAAA,CAAM,aAAA,CAAc,IAAI,CAAA,EAAG,IAAI,CAAA;AAAA,IACzD,SAAS,CAAC,IAAA,KAAS,GAAG,OAAA,CAAQ,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IACjD,oBAAA,EAAsB,OAAO,IAAA,KAAiC;AAC5D,MAAA,MAAM,OAAA,GAAU,cAAc,IAAI,CAAA;AAClC,MAAA,IAAI,CAAC,GAAG,oBAAA,EAAsB;AAC5B,QAAA,MAAM,KAAA,GAAQ,MAAM,EAAA,CAAG,OAAA,CAAQ,OAAO,CAAA;AACtC,QAAA,OAAO,OAAA,CAAQ,GAAA;AAAA,UACb,KAAA,CAAM,GAAA,CAAI,OAAO,IAAA,KAAS;AACxB,YAAA,MAAM,SAAA,GAAY,EAAA,CAAG,WAAA,CAAY,OAAA,EAAS,IAAI,CAAA;AAC9C,YAAA,MAAM,CAAA,GAAI,MAAM,EAAA,CAAG,IAAA,CAAK,SAAS,CAAA;AACjC,YAAA,OAAO;AAAA,cACL,IAAA;AAAA,cACA,QAAQ,CAAA,CAAE,MAAA;AAAA,cACV,aAAa,CAAA,CAAE,WAAA;AAAA,cACf,gBAAgB,CAAA,CAAE;AAAA,aACpB;AAAA,UACF,CAAC;AAAA,SACH;AAAA,MACF;AACA,MAAA,OAAO,EAAA,CAAG,qBAAqB,OAAO,CAAA;AAAA,IACxC,CAAA;AAAA,IACA,EAAA,EAAI,CAAC,IAAA,EAAM,IAAA,KAAS,GAAG,EAAA,CAAG,aAAA,CAAc,IAAI,CAAA,EAAG,IAAI,CAAA;AAAA,IACnD,EAAA,EAAI,CAAC,GAAA,EAAK,IAAA,EAAM,IAAA,KACd,EAAA,CAAG,EAAA,CAAG,aAAA,CAAc,GAAG,CAAA,EAAG,aAAA,CAAc,IAAI,GAAG,IAAI,CAAA;AAAA,IACrD,EAAA,EAAI,CAAC,GAAA,EAAK,IAAA,KAAS,EAAA,CAAG,EAAA,CAAG,aAAA,CAAc,GAAG,CAAA,EAAG,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IAChE,UAAU,CAAC,IAAA,KAAS,GAAG,QAAA,CAAS,aAAA,CAAc,IAAI,CAAC,CAAA;AAAA,IACnD,WAAA,EAAa,CAAC,IAAA,EAAM,CAAA,KAAM,GAAG,WAAA,CAAY,aAAA,CAAc,IAAI,CAAA,EAAG,CAAC;AAAA,GACjE;AACF;AAgBA,IAAM,sBAAN,MAA6C;AAAA,EAU3C,WAAA,CACW,EAAA,EACD,UAAA,EACR,OAAA,EACA;AAHS,IAAA,IAAA,CAAA,EAAA,GAAA,EAAA;AACD,IAAA,IAAA,CAAA,UAAA,GAAA,UAAA;AAGR,IAAA,IAAA,CAAK,EAAA,GAAK,YAAY,UAAU,CAAA;AAChC,IAAA,IAAA,CAAK,WAAA,GAAc;AAAA,MACjB,eAAA,EAAiB,EAAE,eAAA,EAAiB,QAAA,EAAW;AAAA,MAC/C,GAAG,OAAA,EAAS;AAAA,KACd;AAAA,EACF;AAAA,EATW,EAAA;AAAA,EACD,UAAA;AAAA,EAXD,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EAES,EAAA;AAAA,EACD,WAAA;AAAA,EAcR,MAAM,IAAA,CAAK,OAAA,EAAiB,QAAA,EAA6C;AACvE,IAAA,MAAM,IAAA,GAAO,IAAIC,aAAA,CAAK,EAAE,GAAG,KAAK,WAAA,EAAa,EAAA,EAAI,IAAA,CAAK,UAAA,EAAY,CAAA;AAClE,IAAA,MAAM,EAAE,UAAU,MAAA,EAAQ,MAAA,KAAW,MAAM,IAAA,CAAK,KAAK,OAAO,CAAA;AAC5D,IAAA,OAAO,EAAE,QAAA,EAAU,MAAA,EAAQ,MAAA,EAAO;AAAA,EACpC;AAAA,EAEA,MAAM,OAAA,GAAyB;AAAA,EAE/B;AAAA;AAAA,EAGA,cAAA,GAA8B;AAC5B,IAAA,OAAO,IAAA,CAAK,UAAA;AAAA,EACd;AACF,CAAA;AAWO,IAAM,cAAA,GAAiB;AAAA,EAC5B,OAAA;AAAA,EACA,QAAA;AAAA,EACA,UAAA;AAAA,EACA,SAAA;AAAA,EACA;AACF;AAGO,IAAM,0BAAN,MAEP;AAAA,EAaE,YAAoB,cAAA,EAAyC;AAAzC,IAAA,IAAA,CAAA,cAAA,GAAA,cAAA;AAAA,EAA0C;AAAA,EAA1C,cAAA;AAAA,EAZX,EAAA,GAAK,UAAA;AAAA,EACL,YAAA,GAAoC;AAAA,IAC3C,UAAA,EAAY,IAAA;AAAA,IACZ,SAAA,EAAW,IAAA;AAAA,IACX,WAAA,EAAa;AAAA,GACf;AAAA,EACS,wBAAmD,IAAI,GAAA;AAAA,IAC9D;AAAA,GACF;AAAA,EAEQ,SAAA,uBAAgB,GAAA,EAAiC;AAAA,EAIzD,MAAM,IAAI,EAAA,EAA8B;AACtC,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAE,CAAA;AACrC,IAAA,IAAI,CAAC,OAAA,EAAS,MAAM,IAAI,qBAAqB,EAAE,CAAA;AAC/C,IAAA,OAAO,OAAA;AAAA,EACT;AAAA,EAEA,MAAM,QAAQ,EAAA,EAA2B;AACvC,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAE,CAAA;AACrC,IAAA,IAAI,OAAA,EAAS;AACX,MAAA,MAAM,QAAQ,OAAA,EAAQ;AACtB,MAAA,IAAA,CAAK,SAAA,CAAU,OAAO,EAAE,CAAA;AAAA,IAC1B;AAAA,EACF;AAAA,EAEA,MAAM,KAAA,CAAM,UAAA,EAAoB,WAAA,EAAqC;AAAA,EAErE;AAAA,EAEA,MAAM,OAAO,UAAA,EAAmC;AAAA,EAEhD;AAAA,EAEA,MAAM,OAAO,OAAA,EAA8D;AACzE,IAAA,MAAM,EAAA,GAAK,OAAA,EAAS,EAAA,IAAM,UAAA,EAAW;AACrC,IAAA,MAAM,eAA6B,EAAC;AAEpC,IAAA,IAAI,SAAS,YAAA,EAAc;AACzB,MAAA,KAAA,MAAW,CAAC,MAAM,OAAO,CAAA,IAAK,OAAO,OAAA,CAAQ,OAAA,CAAQ,YAAY,CAAA,EAAG;AAClE,QAAA,YAAA,CAAa,IAAI,CAAA,GAAI,OAAA;AAAA,MACvB;AAAA,IACF;AAEA,IAAA,MAAM,EAAA,GAAK,IAAIC,mBAAA,CAAW,YAAY,CAAA;AACtC,IAAA,MAAM,UAAU,IAAI,mBAAA,CAAoB,EAAA,EAAI,EAAA,EAAI,KAAK,cAAc,CAAA;AACnE,IAAA,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAA,EAAI,OAAO,CAAA;AAC9B,IAAA,OAAO,EAAE,OAAA,EAAQ;AAAA,EACnB;AAAA,EAEA,MAAM,QAAA,CACJ,SAAA,EACA,QAAA,EAC0B;AAC1B,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,SAAS,CAAA;AAC5C,IAAA,IAAI,CAAC,OAAA,EAAS,MAAM,IAAI,qBAAqB,SAAS,CAAA;AAEtD,IAAA,MAAM,EAAA,GAAK,QAAQ,cAAA,EAAe;AAClC,IAAA,MAAM,KAAA,GAAQ,GAAG,WAAA,EAAY;AAC7B,IAAA,MAAM,QAAgC,EAAC;AAEvC,IAAA,KAAA,MAAW,KAAK,KAAA,EAAO;AACrB,MAAA,IAAI;AACF,QAAA,MAAM,IAAA,GAAO,MAAM,EAAA,CAAG,IAAA,CAAK,CAAC,CAAA;AAC5B,QAAA,IAAI,KAAK,MAAA,EAAQ;AACf,UAAA,KAAA,CAAM,CAAC,CAAA,GAAI,MAAM,EAAA,CAAG,SAAS,CAAC,CAAA;AAAA,QAChC;AAAA,MACF,CAAA,CAAA,MAAQ;AAAA,MAER;AAAA,IACF;AAEA,IAAA,OAAO;AAAA,MACL,SAAA;AAAA,MACA,YAAY,IAAA,CAAK,EAAA;AAAA,MACjB,IAAA,EAAM,EAAE,KAAA,EAAM;AAAA,MACd,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA;AAAY,KACpC;AAAA,EACF;AAAA,EAEA,MAAM,IAAA,CACJ,SAAA,EACA,QAAA,EACkB;AAClB,IAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,GAAA,CAAI,SAAS,CAAA;AAExC,IAAA,MAAM,OAAA,GAAU,MAAM,OAAA,CAAQ,EAAA,CAAG,qBAAqB,GAAG,CAAA;AACzD,IAAA,MAAM,eAA2C,EAAC;AAClD,IAAA,KAAA,MAAW,SAAS,OAAA,EAAS;AAC3B,MAAA,IAAI,MAAM,MAAA,EAAQ;AAChB,QAAA,YAAA,CAAa,KAAA,CAAM,IAAI,CAAA,GAAI,MAAM,QAAQ,EAAA,CAAG,cAAA,CAAe,MAAM,IAAI,CAAA;AAAA,MACvE;AAAA,IACF;AAEA,IAAA,MAAM,UAAA,GAAa,MAAM,IAAA,CAAK,MAAA,CAAO;AAAA,MACnC,IAAI,UAAA,EAAW;AAAA,MACf;AAAA,KACD,CAAA;AACD,IAAA,OAAO,UAAA,CAAW,OAAA;AAAA,EACpB;AAAA,EAEA,MAAM,OAAA,CACJ,QAAA,EACA,QAAA,EACkB;AAClB,IAAA,MAAM,EAAE,KAAA,EAAM,GAAI,QAAA,CAAS,IAAA;AAC3B,IAAA,MAAM,eAA6B,EAAC;AACpC,IAAA,KAAA,MAAW,CAAC,IAAA,EAAM,OAAO,KAAK,MAAA,CAAO,OAAA,CAAQ,KAAK,CAAA,EAAG;AACnD,MAAA,YAAA,CAAa,IAAI,CAAA,GAAI,OAAA;AAAA,IACvB;AAEA,IAAA,MAAM,EAAA,GAAK,IAAIA,mBAAA,CAAW,YAAY,CAAA;AACtC,IAAA,MAAM,UAAU,IAAI,mBAAA;AAAA,MAClB,QAAA,CAAS,SAAA;AAAA,MACT,EAAA;AAAA,MACA,IAAA,CAAK;AAAA,KACP;AACA,IAAA,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,OAAA,CAAQ,EAAA,EAAI,OAAO,CAAA;AACtC,IAAA,OAAO,OAAA;AAAA,EACT;AAAA,EAEA,MAAM,eAAe,SAAA,EAA2C;AAAA,EAGhE;AACF","file":"index.cjs","sourcesContent":["// ============================================================================\n// Sandbox Filesystem\n// ============================================================================\n\nexport interface DirentEntry {\n name: string;\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n}\n\nexport interface FileStat {\n isFile: boolean;\n isDirectory: boolean;\n isSymbolicLink: boolean;\n size: number;\n mtime: Date;\n}\n\n// ============================================================================\n// Network & lifecycle\n// ============================================================================\n\nexport interface SandboxNetworkConfig {\n allowOut?: string[];\n denyOut?: string[];\n allowPublicTraffic?: boolean;\n}\n\nexport interface SandboxLifecycleConfig {\n onTimeout: \"kill\" | \"pause\";\n autoResume?: boolean;\n}\n\n/**\n * Provider-agnostic filesystem interface.\n *\n * Implementations that don't support a method should throw\n * {@link SandboxNotSupportedError}.\n */\nexport interface SandboxFileSystem {\n /** Base directory used when resolving relative paths. */\n readonly workspaceBase: string;\n readFile(path: string): Promise<string>;\n readFileBuffer(path: string): Promise<Uint8Array>;\n writeFile(path: string, content: string | Uint8Array): Promise<void>;\n appendFile(path: string, content: string | Uint8Array): Promise<void>;\n exists(path: string): Promise<boolean>;\n stat(path: string): Promise<FileStat>;\n mkdir(path: string, options?: { recursive?: boolean }): Promise<void>;\n readdir(path: string): Promise<string[]>;\n readdirWithFileTypes(path: string): Promise<DirentEntry[]>;\n rm(\n path: string,\n options?: { recursive?: boolean; force?: boolean }\n ): Promise<void>;\n cp(\n src: string,\n dest: string,\n options?: { recursive?: boolean }\n ): Promise<void>;\n mv(src: string, dest: string): Promise<void>;\n readlink(path: string): Promise<string>;\n resolvePath(base: string, path: string): string;\n}\n\n// ============================================================================\n// Execution\n// ============================================================================\n\nexport interface ExecOptions {\n timeout?: number;\n cwd?: string;\n env?: Record<string, string>;\n}\n\nexport interface ExecResult {\n exitCode: number;\n stdout: string;\n stderr: string;\n}\n\n// ============================================================================\n// Capabilities\n// ============================================================================\n\n/**\n * Runtime capability flags carried by a {@link Sandbox} instance.\n *\n * These are an orthogonal mechanism to the type-level\n * {@link SandboxCapability} union: this flag bag is for runtime\n * introspection (\"does the sandbox support a filesystem?\") whereas\n * {@link SandboxCapability} narrows the type-level provider/ops contract.\n */\nexport interface SandboxCapabilities {\n /** Sandbox supports filesystem operations */\n filesystem: boolean;\n /** Sandbox supports shell/command execution */\n execution: boolean;\n /** Sandbox state can be persisted and restored */\n persistence: boolean;\n}\n\n/**\n * Type-level capability vocabulary for {@link SandboxProvider} and\n * {@link SandboxOps}. Adapters declare the subset they actually support; the\n * conditional types on each contract gate the corresponding methods so\n * unsupported calls become a compile-time error rather than a runtime\n * {@link SandboxNotSupportedError}.\n *\n * `pause` and `resume` are split because some adapters might support one\n * direction without the other. The `snapshot` cap covers both `snapshot()`\n * and `deleteSnapshot()` since they always travel together in practice.\n */\nexport type SandboxCapability =\n | \"pause\"\n | \"resume\"\n | \"snapshot\"\n | \"restore\"\n | \"fork\";\n\n// ============================================================================\n// Sandbox\n// ============================================================================\n\nexport interface Sandbox {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n readonly fs: SandboxFileSystem;\n\n exec(command: string, options?: ExecOptions): Promise<ExecResult>;\n destroy(): Promise<void>;\n}\n\n// ============================================================================\n// Snapshots\n// ============================================================================\n\nexport interface SandboxSnapshot {\n sandboxId: string;\n providerId: string;\n /** Provider-specific serialised state */\n data: unknown;\n createdAt: string;\n}\n\n// ============================================================================\n// Provider\n// ============================================================================\n\nexport interface SandboxCreateOptions {\n /** Preferred sandbox ID (provider may ignore) */\n id?: string;\n /** Seed the filesystem with these files */\n initialFiles?: Record<string, string | Uint8Array>;\n /** Environment variables available inside the sandbox */\n env?: Record<string, string>;\n /** Key-value metadata surfaced via provider list/query APIs */\n metadata?: Record<string, string>;\n /** Sandbox idle timeout in milliseconds */\n timeoutMs?: number;\n /** Enable or disable outbound internet access */\n allowInternetAccess?: boolean;\n /** Outbound network allow/deny rules */\n network?: SandboxNetworkConfig;\n /** Sandbox timeout behaviour */\n lifecycle?: SandboxLifecycleConfig;\n}\n\nexport interface SandboxCreateResult {\n sandbox: Sandbox;\n}\n\n/**\n * Internal helper: drop keys whose value is `never` from an object type.\n *\n * Used by the capability-gated contracts below so that an absent capability\n * removes the corresponding key entirely, instead of leaving a required\n * field with type `never` (which would make implementations impossible).\n */\ntype OmitNever<T> = {\n [K in keyof T as [T[K]] extends [never] ? never : K]: T[K];\n};\n\n/**\n * Capability-gated provider lifecycle methods.\n *\n * Each field becomes `never` when its capability is absent from `TCaps`;\n * the wrapping `OmitNever` removes those keys entirely, so the method\n * isn't part of the type surface for adapters that don't support it.\n */\ntype SandboxProviderCapMethods<\n TOptions extends SandboxCreateOptions,\n TSandbox extends Sandbox,\n TCaps extends SandboxCapability,\n> = OmitNever<{\n pause: \"pause\" extends TCaps\n ? (sandboxId: string, ttlSeconds?: number) => Promise<void>\n : never;\n resume: \"resume\" extends TCaps ? (sandboxId: string) => Promise<void> : never;\n snapshot: \"snapshot\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<SandboxSnapshot>\n : never;\n deleteSnapshot: \"snapshot\" extends TCaps\n ? (snapshot: SandboxSnapshot) => Promise<void>\n : never;\n restore: \"restore\" extends TCaps\n ? (snapshot: SandboxSnapshot, options?: TOptions) => Promise<TSandbox>\n : never;\n fork: \"fork\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<TSandbox>\n : never;\n}>;\n\n/**\n * Always-present provider lifecycle methods. These do not depend on the\n * capability set and are required by every adapter.\n */\ninterface SandboxProviderBase<\n TOptions extends SandboxCreateOptions,\n TSandbox extends Sandbox,\n TCaps extends SandboxCapability,\n> {\n readonly id: string;\n readonly capabilities: SandboxCapabilities;\n /**\n * Runtime-introspectable list of supported capabilities.\n *\n * Constrained to `ReadonlySet<TCaps & SandboxCapability>` so the runtime\n * set cannot include capabilities not declared at the type level — a\n * provider typed as `SandboxProvider<…, never>` cannot ship a runtime\n * set that contains `\"pause\"`, etc.\n *\n * The other direction (type declares a cap, runtime set omits it)\n * cannot be enforced by TypeScript alone; adapters should derive both\n * `TCaps` and the runtime set from the same `as const` array (see\n * `SandboxManager`'s constructor-time consistency check) so the two\n * surfaces cannot drift.\n */\n readonly supportedCapabilities: ReadonlySet<TCaps & SandboxCapability>;\n\n create(options?: TOptions): Promise<SandboxCreateResult>;\n get(sandboxId: string): Promise<TSandbox>;\n destroy(sandboxId: string): Promise<void>;\n}\n\n/**\n * Provider-side sandbox lifecycle contract.\n *\n * Generic over an optional capability set (`TCaps`). Each capability gates\n * a specific method: when the cap is absent the corresponding key is\n * **removed** from the type entirely, so calling it produces a TypeScript\n * error at the call site instead of a runtime\n * {@link SandboxNotSupportedError}.\n *\n * The default `TCaps = SandboxCapability` resolves to the full union, so\n * existing usages that only pass `TOptions` / `TSandbox` continue to see\n * the full method surface (backwards compatible).\n *\n * Adapters that don't support a method should narrow `TCaps` accordingly:\n *\n * - In-memory / E2B: `SandboxCapability` (default — all caps present).\n * - Bedrock Code Interpreter / Daytona: `never` (only base ops).\n * - Bedrock AgentCore Runtime: `\"pause\" | \"resume\"`.\n */\nexport type SandboxProvider<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TSandbox extends Sandbox = Sandbox,\n TCaps extends SandboxCapability = SandboxCapability,\n> = SandboxProviderBase<TOptions, TSandbox, TCaps> &\n SandboxProviderCapMethods<TOptions, TSandbox, TCaps>;\n\n// ============================================================================\n// SandboxOps — workflow-side activity interface (like ThreadOps)\n// ============================================================================\n\n/**\n * Capability-gated workflow-side methods. Mirrors the provider's gating:\n * keys whose capability is absent from `TCaps` are removed from the type.\n */\ntype SandboxOpsCapMethods<\n TOptions extends SandboxCreateOptions,\n TCaps extends SandboxCapability,\n> = OmitNever<{\n pauseSandbox: \"pause\" extends TCaps\n ? (sandboxId: string) => Promise<void>\n : never;\n resumeSandbox: \"resume\" extends TCaps\n ? (sandboxId: string) => Promise<void>\n : never;\n snapshotSandbox: \"snapshot\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<SandboxSnapshot>\n : never;\n deleteSandboxSnapshot: \"snapshot\" extends TCaps\n ? (snapshot: SandboxSnapshot) => Promise<void>\n : never;\n restoreSandbox: \"restore\" extends TCaps\n ? (snapshot: SandboxSnapshot, options?: TOptions) => Promise<string>\n : never;\n forkSandbox: \"fork\" extends TCaps\n ? (sandboxId: string, options?: TOptions) => Promise<string>\n : never;\n}>;\n\n/**\n * Always-present workflow-side lifecycle methods.\n */\ninterface SandboxOpsBase<\n TOptions extends SandboxCreateOptions,\n TCtx,\n> {\n createSandbox(\n options?: TOptions,\n ctx?: TCtx\n ): Promise<{ sandboxId: string } | null>;\n destroySandbox(sandboxId: string): Promise<void>;\n}\n\n/**\n * Workflow-side counterpart to {@link SandboxProvider}. Exposed as a set of\n * Temporal activities and consumed by `createSession`'s `sandboxOps` field\n * and by `defineSubagent`'s `sandbox.proxy`.\n *\n * Generic over a capability set (`TCaps`) — same semantics as the provider:\n * keys whose capability is absent are removed from the type, so calling\n * them is a TypeScript error rather than a runtime throw. The default\n * `TCaps = SandboxCapability` keeps the full method surface for existing\n * consumers.\n */\nexport type SandboxOps<\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n TCaps extends SandboxCapability = SandboxCapability,\n> = SandboxOpsBase<TOptions, TCtx> & SandboxOpsCapMethods<TOptions, TCaps>;\n\n/**\n * Maps generic {@link SandboxOps} method names to adapter-prefixed names.\n *\n * Inherits the capability gating from {@link SandboxOps}: when `TCaps` omits\n * a capability the prefixed key carries the `never` type so call sites are\n * type-protected.\n *\n * @example\n * ```typescript\n * type InMemOps = PrefixedSandboxOps<\"inMemory\">;\n * // → { inMemoryCreateSandbox, inMemoryDestroySandbox, inMemorySnapshotSandbox, … }\n * ```\n */\nexport type PrefixedSandboxOps<\n TPrefix extends string,\n TOptions extends SandboxCreateOptions = SandboxCreateOptions,\n TCtx = unknown,\n TCaps extends SandboxCapability = SandboxCapability,\n> = {\n [K in keyof SandboxOps<\n TOptions,\n TCtx,\n TCaps\n > as `${TPrefix}${Capitalize<K & string>}`]: SandboxOps<\n TOptions,\n TCtx,\n TCaps\n >[K];\n};\n\n// ============================================================================\n// Errors\n// ============================================================================\n\nimport { ApplicationFailure } from \"@temporalio/common\";\n\n/**\n * Thrown by adapters that still surface an unsupported method at runtime.\n *\n * After the capability-generic refactor most adapters drop their\n * unsupported methods entirely so the type system rejects them at call\n * sites. This symbol is still exported so consumers running against older\n * adapter versions can keep their backwards-compatible error-handling\n * paths until they finish migrating.\n */\nexport class SandboxNotSupportedError extends ApplicationFailure {\n constructor(operation: string) {\n super(\n `Sandbox does not support: ${operation}`,\n \"SandboxNotSupportedError\",\n true\n );\n }\n}\n\nexport class SandboxNotFoundError extends ApplicationFailure {\n constructor(sandboxId: string) {\n super(`Sandbox not found: ${sandboxId}`, \"SandboxNotFoundError\", true);\n }\n}\n","import { uuid4 } from \"@temporalio/workflow\";\n\nconst BASE62 = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789\";\n\n/**\n * Generate a compact, workflow-deterministic identifier.\n *\n * Uses Temporal's `uuid4()` internally (seeded by the workflow's RNG),\n * then re-encodes the hex bytes into a base-62 alphabet for a shorter,\n * more token-efficient identifier (~3 tokens vs ~10 for a full UUID).\n *\n * Suitable for thread IDs, child workflow IDs, or any workflow-scoped identifier.\n *\n * @param length - Number of base-62 characters (default 12, ~71 bits of entropy)\n */\nexport function getShortId(length = 12): string {\n const hex = uuid4().replace(/-/g, \"\");\n let result = \"\";\n for (let i = 0; i < length; i++) {\n const byte = parseInt(hex.slice(i * 2, i * 2 + 2), 16);\n result += BASE62[byte % BASE62.length];\n }\n return result;\n}\n","import {\n Bash,\n InMemoryFs,\n type BashOptions,\n type IFileSystem,\n type InitialFiles,\n} from \"just-bash\";\nimport type {\n Sandbox,\n SandboxCapabilities,\n SandboxCapability,\n SandboxCreateOptions,\n SandboxCreateResult,\n SandboxFileSystem,\n SandboxProvider,\n SandboxSnapshot,\n ExecOptions,\n ExecResult,\n DirentEntry,\n FileStat,\n} from \"../../../lib/sandbox/types\";\nimport { SandboxNotFoundError } from \"../../../lib/sandbox/types\";\nimport { getShortId } from \"../../../lib/thread/id\";\n\n// ============================================================================\n// Adapter: IFileSystem → SandboxFileSystem\n// ============================================================================\n\nfunction toSandboxFs(fs: IFileSystem): SandboxFileSystem {\n const workspaceBase = \"/\";\n const normalisePath = (path: string): string =>\n fs.resolvePath(workspaceBase, path);\n\n return {\n workspaceBase,\n readFile: (path) => fs.readFile(normalisePath(path)),\n readFileBuffer: (path) => fs.readFileBuffer(normalisePath(path)),\n writeFile: (path, content) => fs.writeFile(normalisePath(path), content),\n appendFile: (path, content) => fs.appendFile(normalisePath(path), content),\n exists: (path) => fs.exists(normalisePath(path)),\n stat: async (path): Promise<FileStat> => {\n const s = await fs.stat(normalisePath(path));\n return {\n isFile: s.isFile,\n isDirectory: s.isDirectory,\n isSymbolicLink: s.isSymbolicLink,\n size: s.size,\n mtime: s.mtime,\n };\n },\n mkdir: (path, opts) => fs.mkdir(normalisePath(path), opts),\n readdir: (path) => fs.readdir(normalisePath(path)),\n readdirWithFileTypes: async (path): Promise<DirentEntry[]> => {\n const dirPath = normalisePath(path);\n if (!fs.readdirWithFileTypes) {\n const names = await fs.readdir(dirPath);\n return Promise.all(\n names.map(async (name) => {\n const childPath = fs.resolvePath(dirPath, name);\n const s = await fs.stat(childPath);\n return {\n name,\n isFile: s.isFile,\n isDirectory: s.isDirectory,\n isSymbolicLink: s.isSymbolicLink,\n };\n })\n );\n }\n return fs.readdirWithFileTypes(dirPath);\n },\n rm: (path, opts) => fs.rm(normalisePath(path), opts),\n cp: (src, dest, opts) =>\n fs.cp(normalisePath(src), normalisePath(dest), opts),\n mv: (src, dest) => fs.mv(normalisePath(src), normalisePath(dest)),\n readlink: (path) => fs.readlink(normalisePath(path)),\n resolvePath: (base, p) => fs.resolvePath(normalisePath(base), p),\n };\n}\n\n// ============================================================================\n// InMemorySandbox\n// ============================================================================\n\nexport interface InMemorySandboxOptions {\n /** Options forwarded to `just-bash` `Bash` (minus `fs` which is managed) */\n bashOptions?: Omit<BashOptions, \"fs\">;\n}\n\n/**\n * An in-memory {@link Sandbox} backed by `just-bash`.\n */\nexport type InMemorySandbox = Sandbox & { fs: SandboxFileSystem };\n\nclass InMemorySandboxImpl implements Sandbox {\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n\n readonly fs: SandboxFileSystem;\n private bashOptions: Omit<BashOptions, \"fs\">;\n\n constructor(\n readonly id: string,\n private justBashFs: IFileSystem,\n options?: InMemorySandboxOptions\n ) {\n this.fs = toSandboxFs(justBashFs);\n this.bashOptions = {\n executionLimits: { maxStringLength: 52_428_800 },\n ...options?.bashOptions,\n };\n }\n\n async exec(command: string, _options?: ExecOptions): Promise<ExecResult> {\n const bash = new Bash({ ...this.bashOptions, fs: this.justBashFs });\n const { exitCode, stderr, stdout } = await bash.exec(command);\n return { exitCode, stdout, stderr };\n }\n\n async destroy(): Promise<void> {\n // In-memory: nothing to clean up\n }\n\n /** Expose the underlying IFileSystem for snapshot serialisation */\n _getJustBashFs(): IFileSystem {\n return this.justBashFs;\n }\n}\n\n// ============================================================================\n// InMemorySandboxProvider\n// ============================================================================\n\n/**\n * Single source of truth for the in-memory adapter's capability set. The\n * runtime `supportedCapabilities` set and the type-level `TCaps` are both\n * derived from this array, so the two surfaces cannot drift.\n */\nexport const IN_MEMORY_CAPS = [\n \"pause\",\n \"resume\",\n \"snapshot\",\n \"restore\",\n \"fork\",\n] as const satisfies readonly SandboxCapability[];\nexport type InMemoryCaps = (typeof IN_MEMORY_CAPS)[number];\n\nexport class InMemorySandboxProvider\n implements SandboxProvider<SandboxCreateOptions, Sandbox, InMemoryCaps>\n{\n readonly id = \"inMemory\";\n readonly capabilities: SandboxCapabilities = {\n filesystem: true,\n execution: true,\n persistence: true,\n };\n readonly supportedCapabilities: ReadonlySet<InMemoryCaps> = new Set(\n IN_MEMORY_CAPS\n );\n\n private sandboxes = new Map<string, InMemorySandboxImpl>();\n\n constructor(private defaultOptions?: InMemorySandboxOptions) {}\n\n async get(id: string): Promise<Sandbox> {\n const sandbox = this.sandboxes.get(id);\n if (!sandbox) throw new SandboxNotFoundError(id);\n return sandbox;\n }\n\n async destroy(id: string): Promise<void> {\n const sandbox = this.sandboxes.get(id);\n if (sandbox) {\n await sandbox.destroy();\n this.sandboxes.delete(id);\n }\n }\n\n async pause(_sandboxId: string, _ttlSeconds?: number): Promise<void> {\n // In-memory: nothing to pause\n }\n\n async resume(_sandboxId: string): Promise<void> {\n // In-memory: nothing to resume\n }\n\n async create(options?: SandboxCreateOptions): Promise<SandboxCreateResult> {\n const id = options?.id ?? getShortId();\n const initialFiles: InitialFiles = {};\n\n if (options?.initialFiles) {\n for (const [path, content] of Object.entries(options.initialFiles)) {\n initialFiles[path] = content;\n }\n }\n\n const fs = new InMemoryFs(initialFiles);\n const sandbox = new InMemorySandboxImpl(id, fs, this.defaultOptions);\n this.sandboxes.set(id, sandbox);\n return { sandbox };\n }\n\n async snapshot(\n sandboxId: string,\n _options?: SandboxCreateOptions\n ): Promise<SandboxSnapshot> {\n const sandbox = this.sandboxes.get(sandboxId);\n if (!sandbox) throw new SandboxNotFoundError(sandboxId);\n\n const fs = sandbox._getJustBashFs();\n const paths = fs.getAllPaths();\n const files: Record<string, string> = {};\n\n for (const p of paths) {\n try {\n const stat = await fs.stat(p);\n if (stat.isFile) {\n files[p] = await fs.readFile(p);\n }\n } catch {\n // skip entries that can't be read (e.g. broken symlinks)\n }\n }\n\n return {\n sandboxId,\n providerId: this.id,\n data: { files },\n createdAt: new Date().toISOString(),\n };\n }\n\n async fork(\n sandboxId: string,\n _options?: SandboxCreateOptions\n ): Promise<Sandbox> {\n const sandbox = await this.get(sandboxId);\n\n const entries = await sandbox.fs.readdirWithFileTypes(\"/\");\n const initialFiles: Record<string, Uint8Array> = {};\n for (const entry of entries) {\n if (entry.isFile) {\n initialFiles[entry.name] = await sandbox.fs.readFileBuffer(entry.name);\n }\n }\n\n const newSandbox = await this.create({\n id: getShortId(),\n initialFiles,\n });\n return newSandbox.sandbox;\n }\n\n async restore(\n snapshot: SandboxSnapshot,\n _options?: SandboxCreateOptions\n ): Promise<Sandbox> {\n const { files } = snapshot.data as { files: Record<string, string> };\n const initialFiles: InitialFiles = {};\n for (const [path, content] of Object.entries(files)) {\n initialFiles[path] = content;\n }\n\n const fs = new InMemoryFs(initialFiles);\n const sandbox = new InMemorySandboxImpl(\n snapshot.sandboxId,\n fs,\n this.defaultOptions\n );\n this.sandboxes.set(sandbox.id, sandbox);\n return sandbox;\n }\n\n async deleteSnapshot(_snapshot: SandboxSnapshot): Promise<void> {\n // In-memory snapshots are opaque data held by the caller — nothing to\n // delete on the provider side.\n }\n}\n"]}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { BashOptions } from 'just-bash';
|
|
2
|
-
import {
|
|
2
|
+
import { b as Sandbox, c as SandboxFileSystem, d as SandboxProvider, a as SandboxCreateOptions, e as SandboxCapabilities, f as SandboxCreateResult, g as SandboxSnapshot } from '../../../types-CJ7tCdl6.cjs';
|
|
3
3
|
import '@temporalio/common';
|
|
4
4
|
|
|
5
5
|
interface InMemorySandboxOptions {
|
|
@@ -12,10 +12,18 @@ interface InMemorySandboxOptions {
|
|
|
12
12
|
type InMemorySandbox = Sandbox & {
|
|
13
13
|
fs: SandboxFileSystem;
|
|
14
14
|
};
|
|
15
|
-
|
|
15
|
+
/**
|
|
16
|
+
* Single source of truth for the in-memory adapter's capability set. The
|
|
17
|
+
* runtime `supportedCapabilities` set and the type-level `TCaps` are both
|
|
18
|
+
* derived from this array, so the two surfaces cannot drift.
|
|
19
|
+
*/
|
|
20
|
+
declare const IN_MEMORY_CAPS: readonly ["pause", "resume", "snapshot", "restore", "fork"];
|
|
21
|
+
type InMemoryCaps = (typeof IN_MEMORY_CAPS)[number];
|
|
22
|
+
declare class InMemorySandboxProvider implements SandboxProvider<SandboxCreateOptions, Sandbox, InMemoryCaps> {
|
|
16
23
|
private defaultOptions?;
|
|
17
24
|
readonly id = "inMemory";
|
|
18
25
|
readonly capabilities: SandboxCapabilities;
|
|
26
|
+
readonly supportedCapabilities: ReadonlySet<InMemoryCaps>;
|
|
19
27
|
private sandboxes;
|
|
20
28
|
constructor(defaultOptions?: InMemorySandboxOptions | undefined);
|
|
21
29
|
get(id: string): Promise<Sandbox>;
|
|
@@ -29,4 +37,4 @@ declare class InMemorySandboxProvider implements SandboxProvider {
|
|
|
29
37
|
deleteSnapshot(_snapshot: SandboxSnapshot): Promise<void>;
|
|
30
38
|
}
|
|
31
39
|
|
|
32
|
-
export { type InMemorySandbox, type InMemorySandboxOptions, InMemorySandboxProvider };
|
|
40
|
+
export { IN_MEMORY_CAPS, type InMemoryCaps, type InMemorySandbox, type InMemorySandboxOptions, InMemorySandboxProvider };
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { BashOptions } from 'just-bash';
|
|
2
|
-
import {
|
|
2
|
+
import { b as Sandbox, c as SandboxFileSystem, d as SandboxProvider, a as SandboxCreateOptions, e as SandboxCapabilities, f as SandboxCreateResult, g as SandboxSnapshot } from '../../../types-CJ7tCdl6.js';
|
|
3
3
|
import '@temporalio/common';
|
|
4
4
|
|
|
5
5
|
interface InMemorySandboxOptions {
|
|
@@ -12,10 +12,18 @@ interface InMemorySandboxOptions {
|
|
|
12
12
|
type InMemorySandbox = Sandbox & {
|
|
13
13
|
fs: SandboxFileSystem;
|
|
14
14
|
};
|
|
15
|
-
|
|
15
|
+
/**
|
|
16
|
+
* Single source of truth for the in-memory adapter's capability set. The
|
|
17
|
+
* runtime `supportedCapabilities` set and the type-level `TCaps` are both
|
|
18
|
+
* derived from this array, so the two surfaces cannot drift.
|
|
19
|
+
*/
|
|
20
|
+
declare const IN_MEMORY_CAPS: readonly ["pause", "resume", "snapshot", "restore", "fork"];
|
|
21
|
+
type InMemoryCaps = (typeof IN_MEMORY_CAPS)[number];
|
|
22
|
+
declare class InMemorySandboxProvider implements SandboxProvider<SandboxCreateOptions, Sandbox, InMemoryCaps> {
|
|
16
23
|
private defaultOptions?;
|
|
17
24
|
readonly id = "inMemory";
|
|
18
25
|
readonly capabilities: SandboxCapabilities;
|
|
26
|
+
readonly supportedCapabilities: ReadonlySet<InMemoryCaps>;
|
|
19
27
|
private sandboxes;
|
|
20
28
|
constructor(defaultOptions?: InMemorySandboxOptions | undefined);
|
|
21
29
|
get(id: string): Promise<Sandbox>;
|
|
@@ -29,4 +37,4 @@ declare class InMemorySandboxProvider implements SandboxProvider {
|
|
|
29
37
|
deleteSnapshot(_snapshot: SandboxSnapshot): Promise<void>;
|
|
30
38
|
}
|
|
31
39
|
|
|
32
|
-
export { type InMemorySandbox, type InMemorySandboxOptions, InMemorySandboxProvider };
|
|
40
|
+
export { IN_MEMORY_CAPS, type InMemoryCaps, type InMemorySandbox, type InMemorySandboxOptions, InMemorySandboxProvider };
|
|
@@ -99,6 +99,13 @@ var InMemorySandboxImpl = class {
|
|
|
99
99
|
return this.justBashFs;
|
|
100
100
|
}
|
|
101
101
|
};
|
|
102
|
+
var IN_MEMORY_CAPS = [
|
|
103
|
+
"pause",
|
|
104
|
+
"resume",
|
|
105
|
+
"snapshot",
|
|
106
|
+
"restore",
|
|
107
|
+
"fork"
|
|
108
|
+
];
|
|
102
109
|
var InMemorySandboxProvider = class {
|
|
103
110
|
constructor(defaultOptions) {
|
|
104
111
|
this.defaultOptions = defaultOptions;
|
|
@@ -110,6 +117,9 @@ var InMemorySandboxProvider = class {
|
|
|
110
117
|
execution: true,
|
|
111
118
|
persistence: true
|
|
112
119
|
};
|
|
120
|
+
supportedCapabilities = new Set(
|
|
121
|
+
IN_MEMORY_CAPS
|
|
122
|
+
);
|
|
113
123
|
sandboxes = /* @__PURE__ */ new Map();
|
|
114
124
|
async get(id) {
|
|
115
125
|
const sandbox = this.sandboxes.get(id);
|
|
@@ -196,6 +206,6 @@ var InMemorySandboxProvider = class {
|
|
|
196
206
|
}
|
|
197
207
|
};
|
|
198
208
|
|
|
199
|
-
export { InMemorySandboxProvider };
|
|
209
|
+
export { IN_MEMORY_CAPS, InMemorySandboxProvider };
|
|
200
210
|
//# sourceMappingURL=index.js.map
|
|
201
211
|
//# sourceMappingURL=index.js.map
|