@autobe/agent
Version:
AI backend server code generator
502 lines • 34.3 kB
JavaScript
"use strict";
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || (function () {
var ownKeys = function(o) {
ownKeys = Object.getOwnPropertyNames || function (o) {
var ar = [];
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
return ar;
};
return ownKeys(o);
};
return function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
__setModuleDefault(result, mod);
return result;
};
})();
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
return new (P || (P = Promise))(function (resolve, reject) {
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
step((generator = generator.apply(thisArg, _arguments || [])).next());
});
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.orchestrateRealizeAuthorizationCorrect = orchestrateRealizeAuthorizationCorrect;
const __typia_transform__validateReport = __importStar(require("typia/lib/internal/_validateReport.js"));
const core_1 = require("@agentica/core");
const typia_1 = __importDefault(require("typia"));
const assertSchemaModel_1 = require("../../context/assertSchemaModel");
const enforceToolCall_1 = require("../../utils/enforceToolCall");
const transformRealizeAuthorizationCorrectHistories_1 = require("./transformRealizeAuthorizationCorrectHistories");
const AuthorizationFileSystem_1 = require("./utils/AuthorizationFileSystem");
const AutoBeRealizeAuthorizationReplaceImport_1 = require("./utils/AutoBeRealizeAuthorizationReplaceImport");
function orchestrateRealizeAuthorizationCorrect(ctx_1, authorization_1, prismaClients_1, templateFiles_1) {
return __awaiter(this, arguments, void 0, function* (ctx, authorization, prismaClients, templateFiles, life = 4) {
var _a, _b, _c, _d, _e;
const compiler = yield ctx.compiler();
const providerContent = yield compiler.typescript.beautify(AutoBeRealizeAuthorizationReplaceImport_1.AutoBeRealizeAuthorizationReplaceImport.replaceProviderImport(authorization.role, authorization.provider.content));
const decoratorContent = yield compiler.typescript.beautify(AutoBeRealizeAuthorizationReplaceImport_1.AutoBeRealizeAuthorizationReplaceImport.replaceDecoratorImport(authorization.role, authorization.decorator.content));
// Check Compile
const files = Object.assign(Object.assign(Object.assign({}, templateFiles), prismaClients), { [AuthorizationFileSystem_1.AuthorizationFileSystem.decoratorPath(authorization.decorator.name)]: decoratorContent, [AuthorizationFileSystem_1.AuthorizationFileSystem.providerPath(authorization.provider.name)]: providerContent, [AuthorizationFileSystem_1.AuthorizationFileSystem.payloadPath(authorization.payload.name)]: authorization.payload.content });
const compiled = yield compiler.typescript.compile({
files,
});
ctx.dispatch({
type: "realizeAuthorizationValidate",
created_at: new Date().toISOString(),
authorization: authorization,
result: compiled,
step: (_b = (_a = ctx.state().test) === null || _a === void 0 ? void 0 : _a.step) !== null && _b !== void 0 ? _b : 0,
});
if (compiled.type === "success") {
return authorization;
}
else if (compiled.type === "exception" || life === 0) {
return authorization;
}
const pointer = {
value: null,
};
const agentica = new core_1.MicroAgentica({
model: ctx.model,
vendor: ctx.vendor,
config: Object.assign(Object.assign({}, ((_c = ctx.config) !== null && _c !== void 0 ? _c : {})), { executor: {
describe: null,
} }),
histories: (0, transformRealizeAuthorizationCorrectHistories_1.transformRealizeAuthorizationCorrectHistories)(ctx, authorization, templateFiles, compiled.diagnostics),
controllers: [
createApplication({
model: ctx.model,
build: (next) => {
pointer.value = next;
},
}),
],
});
(0, enforceToolCall_1.enforceToolCall)(agentica);
yield agentica
.conversate("Please correct the decorator and the provider.")
.finally(() => {
const tokenUsage = agentica.getTokenUsage();
ctx.usage().record(tokenUsage, ["realize"]);
});
if (pointer.value === null)
throw new Error("Failed to correct decorator.");
const result = Object.assign(Object.assign({}, pointer.value), { decorator: Object.assign(Object.assign({}, pointer.value.decorator), { location: AuthorizationFileSystem_1.AuthorizationFileSystem.decoratorPath(pointer.value.decorator.name) }), provider: Object.assign(Object.assign({}, pointer.value.provider), { location: AuthorizationFileSystem_1.AuthorizationFileSystem.providerPath(pointer.value.provider.name) }), payload: {
name: pointer.value.payload.name,
location: AuthorizationFileSystem_1.AuthorizationFileSystem.payloadPath(pointer.value.payload.name),
content: yield compiler.typescript.beautify(pointer.value.payload.content),
}, role: authorization.role });
ctx.dispatch(Object.assign(Object.assign({}, pointer.value), { type: "realizeAuthorizationCorrect", created_at: new Date().toISOString(), authorization: result, result: compiled, step: (_e = (_d = ctx.state().test) === null || _d === void 0 ? void 0 : _d.step) !== null && _e !== void 0 ? _e : 0 }));
return yield orchestrateRealizeAuthorizationCorrect(ctx, result, prismaClients, templateFiles, life - 1);
});
}
function createApplication(props) {
(0, assertSchemaModel_1.assertSchemaModel)(props.model);
const application = collection[props.model];
return {
protocol: "class",
name: "Correct Authorization",
application,
execute: {
correctDecorator: (next) => {
props.build(next);
},
},
};
}
const claude = {
model: "claude",
options: {
reference: true,
separate: null
},
functions: [
{
name: "correctDecorator",
parameters: {
description: "Current Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}",
type: "object",
properties: {
error_analysis: {
description: "Step 1: TypeScript compilation error analysis and diagnosis.\n\nAI identifies and categorizes all compilation errors (type mismatches,\nimport issues, syntax errors) by component (providers/decorator/payload).\nLists specific error messages with their locations and types for\nsystematic troubleshooting.",
type: "string"
},
solution_guidance: {
description: "Step 2: Solution guidance and fix recommendations.\n\nAI provides clear, actionable instructions on how to resolve each\nidentified error. Includes specific steps like \"add property X to\ninterface Y\", \"update import path from A to B\", or \"change type from C to\nD\". Focus on guidance rather than generating complete code\nimplementations.",
type: "string"
},
provider: {
description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
$ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
},
decorator: {
description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
$ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
},
payload: {
description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
$ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
}
},
required: [
"error_analysis",
"solution_guidance",
"provider",
"decorator",
"payload"
],
additionalProperties: false,
$defs: {
"IAutoBeRealizeAuthorizationApplication.IProvider": {
type: "object",
properties: {
name: {
description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.",
type: "string"
},
content: {
description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
type: "string"
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationApplication.IDecorator": {
type: "object",
properties: {
name: {
description: "The name of the Decorator to be generated in {Role}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.",
type: "string"
},
content: {
description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
type: "string"
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationApplication.IPayloadType": {
type: "object",
properties: {
name: {
description: "The name of the Payload type to be generated in {Role}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.",
type: "string"
},
content: {
description: "Complete TypeScript code for the Payload type interface in {Role}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
type: "string"
}
},
required: [
"name",
"content"
]
}
}
},
validate: (() => { const _io0 = input => "string" === typeof input.error_analysis && "string" === typeof input.solution_guidance && ("object" === typeof input.provider && null !== input.provider && _io1(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.error_analysis || _report(_exceptionable, {
path: _path + ".error_analysis",
expected: "string",
value: input.error_analysis
}), "string" === typeof input.solution_guidance || _report(_exceptionable, {
path: _path + ".solution_guidance",
expected: "string",
value: input.solution_guidance
}), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
value: input.provider
})) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
value: input.provider
}), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
value: input.decorator
})) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
value: input.decorator
}), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
value: input.payload
})) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
value: input.payload
})].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name || _report(_exceptionable, {
path: _path + ".name",
expected: "string",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name || _report(_exceptionable, {
path: _path + ".name",
expected: "string",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name || _report(_exceptionable, {
path: _path + ".name",
expected: "string",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
if (false === __is(input)) {
errors = [];
_report = __typia_transform__validateReport._validateReport(errors);
((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
path: _path + "",
expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
value: input
})) && _vo0(input, _path + "", true) || _report(true, {
path: _path + "",
expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
value: input
}))(input, "$input", true);
const success = 0 === errors.length;
return success ? {
success,
data: input
} : {
success,
errors,
data: input
};
}
return {
success: true,
data: input
};
}; })()
}
]
};
const collection = {
chatgpt: {
model: "chatgpt",
options: {
reference: true,
strict: false,
separate: null
},
functions: [
{
name: "correctDecorator",
parameters: {
description: "Current Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}\n\n### Description of {@link provider} property:\n\n> Authentication Provider function configuration containing the function\n> name and implementation code. The Provider handles JWT token\n> verification, role validation, and database queries to authenticate\n> users.\n\n### Description of {@link decorator} property:\n\n> Authentication Decorator configuration containing the decorator name and\n> implementation code. The Decorator integrates with NestJS parameter\n> decorators to automatically inject authenticated user data into\n> Controller methods.\n\n### Description of {@link payload} property:\n\n> Authentication Payload Type configuration containing the payload type\n> name and implementation code. The Payload Type is used to define the\n> structure of the authenticated user data that will be injected into\n> Controller methods when using the decorator. It serves as the TypeScript\n> type for the parameter in Controller method signatures.",
type: "object",
properties: {
error_analysis: {
description: "Step 1: TypeScript compilation error analysis and diagnosis.\n\nAI identifies and categorizes all compilation errors (type mismatches,\nimport issues, syntax errors) by component (providers/decorator/payload).\nLists specific error messages with their locations and types for\nsystematic troubleshooting.",
type: "string"
},
solution_guidance: {
description: "Step 2: Solution guidance and fix recommendations.\n\nAI provides clear, actionable instructions on how to resolve each\nidentified error. Includes specific steps like \"add property X to\ninterface Y\", \"update import path from A to B\", or \"change type from C to\nD\". Focus on guidance rather than generating complete code\nimplementations.",
type: "string"
},
provider: {
$ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
},
decorator: {
$ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
},
payload: {
$ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
}
},
required: [
"error_analysis",
"solution_guidance",
"provider",
"decorator",
"payload"
],
additionalProperties: false,
$defs: {
"IAutoBeRealizeAuthorizationApplication.IProvider": {
type: "object",
properties: {
name: {
description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.",
type: "string"
},
content: {
description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
type: "string"
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationApplication.IDecorator": {
type: "object",
properties: {
name: {
description: "The name of the Decorator to be generated in {Role}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.",
type: "string"
},
content: {
description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
type: "string"
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationApplication.IPayloadType": {
type: "object",
properties: {
name: {
description: "The name of the Payload type to be generated in {Role}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.",
type: "string"
},
content: {
description: "Complete TypeScript code for the Payload type interface in {Role}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
type: "string"
}
},
required: [
"name",
"content"
]
}
}
},
validate: (() => { const _io0 = input => "string" === typeof input.error_analysis && "string" === typeof input.solution_guidance && ("object" === typeof input.provider && null !== input.provider && _io1(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.error_analysis || _report(_exceptionable, {
path: _path + ".error_analysis",
expected: "string",
value: input.error_analysis
}), "string" === typeof input.solution_guidance || _report(_exceptionable, {
path: _path + ".solution_guidance",
expected: "string",
value: input.solution_guidance
}), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
value: input.provider
})) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
value: input.provider
}), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
value: input.decorator
})) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
value: input.decorator
}), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
value: input.payload
})) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
value: input.payload
})].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name || _report(_exceptionable, {
path: _path + ".name",
expected: "string",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name || _report(_exceptionable, {
path: _path + ".name",
expected: "string",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name || _report(_exceptionable, {
path: _path + ".name",
expected: "string",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
if (false === __is(input)) {
errors = [];
_report = __typia_transform__validateReport._validateReport(errors);
((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
path: _path + "",
expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
value: input
})) && _vo0(input, _path + "", true) || _report(true, {
path: _path + "",
expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
value: input
}))(input, "$input", true);
const success = 0 === errors.length;
return success ? {
success,
data: input
} : {
success,
errors,
data: input
};
}
return {
success: true,
data: input
};
}; })()
}
]
},
claude,
llama: claude,
deepseek: claude,
"3.1": claude,
};
//# sourceMappingURL=orchestrateRealizeAuthorizationCorrect.js.map