@autobe/agent
Version:
AI backend server code generator
711 lines • 104 kB
JavaScript
"use strict";
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || (function () {
var ownKeys = function(o) {
ownKeys = Object.getOwnPropertyNames || function (o) {
var ar = [];
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
return ar;
};
return ownKeys(o);
};
return function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
__setModuleDefault(result, mod);
return result;
};
})();
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
return new (P || (P = Promise))(function (resolve, reject) {
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
step((generator = generator.apply(thisArg, _arguments || [])).next());
});
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.orchestrateRealizeAuthorizationWrite = orchestrateRealizeAuthorizationWrite;
const __typia_transform__validateReport = __importStar(require("typia/lib/internal/_validateReport.js"));
const __typia_transform__llmApplicationFinalize = __importStar(require("typia/lib/internal/_llmApplicationFinalize.js"));
const typia_1 = __importDefault(require("typia"));
const uuid_1 = require("uuid");
const assertSchemaModel_1 = require("../../context/assertSchemaModel");
const executeCachedBatch_1 = require("../../utils/executeCachedBatch");
const AutoBePreliminaryController_1 = require("../common/AutoBePreliminaryController");
const transformRealizeAuthorizationWriteHistory_1 = require("./histories/transformRealizeAuthorizationWriteHistory");
const orchestrateRealizeAuthorizationCorrect_1 = require("./orchestrateRealizeAuthorizationCorrect");
const AuthorizationFileSystem_1 = require("./utils/AuthorizationFileSystem");
const InternalFileSystem_1 = require("./utils/InternalFileSystem");
/**
* 1. Create decorator and its parameters. and design the Authorization Provider.
* 2. According to Authorization Provider design, create the Provider.
*
* @param ctx
*/
function orchestrateRealizeAuthorizationWrite(ctx) {
return __awaiter(this, void 0, void 0, function* () {
var _a, _b, _c, _d, _e, _f;
ctx.dispatch({
type: "realizeAuthorizationStart",
id: (0, uuid_1.v7)(),
step: (_b = (_a = ctx.state().test) === null || _a === void 0 ? void 0 : _a.step) !== null && _b !== void 0 ? _b : 0,
created_at: new Date().toISOString(),
});
const actors = (_d = (_c = ctx.state().analyze) === null || _c === void 0 ? void 0 : _c.actors) !== null && _d !== void 0 ? _d : [];
const progress = {
total: actors.length,
completed: 0,
};
const templates = yield (yield ctx.compiler()).getTemplate({
phase: "realize",
dbms: "sqlite",
});
const authorizations = yield (0, executeCachedBatch_1.executeCachedBatch)(ctx, actors.map((a) => (promptCacheKey) => process(ctx, {
actor: a,
templates: InternalFileSystem_1.InternalFileSystem.DEFAULT.map((el) => ({
[el]: templates[el],
})).reduce((acc, cur) => Object.assign(acc, cur), {}),
progress,
promptCacheKey,
})));
ctx.dispatch({
type: "realizeAuthorizationComplete",
id: (0, uuid_1.v7)(),
created_at: new Date().toISOString(),
step: (_f = (_e = ctx.state().test) === null || _e === void 0 ? void 0 : _e.step) !== null && _f !== void 0 ? _f : 0,
});
return authorizations;
});
}
function process(ctx, props) {
return __awaiter(this, void 0, void 0, function* () {
const preliminary = new AutoBePreliminaryController_1.AutoBePreliminaryController({
source: SOURCE,
application: {
version: "3.1",
components: {
schemas: {
"IAutoBeRealizeAuthorizationWriteApplication.IProps": {
type: "object",
properties: {
thinking: {
type: "string",
description: "Think before you act.\n\nBefore requesting preliminary data or completing your task, reflect on your\ncurrent state and explain your reasoning:\n\nFor preliminary requests (getAnalysisFiles, getPrismaSchemas, etc.):\n- What critical information is missing that you don't already have?\n- Why do you need it specifically right now?\n- Be brief - state the gap, don't list everything you have.\n\nFor completion (complete):\n- What key assets did you acquire?\n- What did you accomplish?\n- Why is it sufficient to complete?\n- Summarize - don't enumerate every single item.\n\nThis reflection helps you avoid duplicate requests and premature completion."
},
request: {
oneOf: [
{
$ref: "#/components/schemas/IAutoBePreliminaryGetPrismaSchemas"
},
{
$ref: "#/components/schemas/IAutoBeRealizeAuthorizationWriteApplication.IComplete"
}
],
discriminator: {
propertyName: "type",
mapping: {
getPrismaSchemas: "#/components/schemas/IAutoBePreliminaryGetPrismaSchemas",
complete: "#/components/schemas/IAutoBeRealizeAuthorizationWriteApplication.IComplete"
}
},
description: "Type discriminator for the request.\n\nDetermines which action to perform: preliminary data retrieval\n(getPrismaSchemas) or final authentication generation (complete). When\npreliminary returns empty array, that type is removed from the union,\nphysically preventing repeated calls."
}
},
required: [
"thinking",
"request"
]
},
IAutoBePreliminaryGetPrismaSchemas: {
type: "object",
properties: {
type: {
"const": "getPrismaSchemas",
description: "Type discriminator for the request.\n\nDetermines which action to perform: preliminary data retrieval or actual\ntask execution. Value \"getPrismaSchemas\" indicates this is a preliminary\ndata request for Prisma schemas."
},
schemaNames: {
type: "array",
items: {
type: "string"
},
minItems: 1,
description: "List of Prisma table names to retrieve.\n\nTable names from the Prisma schema file representing database entities\n(e.g., \"user\", \"post\", \"comment\").\n\nCRITICAL: DO NOT request the same schema names that you have already\nrequested in previous calls."
}
},
required: [
"type",
"schemaNames"
],
description: "Request to retrieve Prisma database schema definitions for context.\n\nThis type is used in the preliminary phase to request specific Prisma table\nschemas needed for generating type-safe API operations."
},
"IAutoBeRealizeAuthorizationWriteApplication.IComplete": {
type: "object",
properties: {
type: {
"const": "complete",
description: "Type discriminator for the request.\n\nDetermines which action to perform: preliminary data retrieval or actual\ntask execution. Value \"complete\" indicates this is the final task\nexecution request."
},
provider: {
$ref: "#/components/schemas/IAutoBeRealizeAuthorizationWriteApplication.IProvider",
description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers."
},
decorator: {
$ref: "#/components/schemas/IAutoBeRealizeAuthorizationWriteApplication.IDecorator",
description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods."
},
payload: {
$ref: "#/components/schemas/IAutoBeRealizeAuthorizationWriteApplication.IPayloadType",
description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures."
}
},
required: [
"type",
"provider",
"decorator",
"payload"
],
description: "Request to generate authentication components.\n\nExecutes authentication generation to create provider function, decorator,\nand payload type for the specified role. All components work together to\nprovide JWT-based authentication and authorization."
},
"IAutoBeRealizeAuthorizationWriteApplication.IProvider": {
type: "object",
properties: {
name: {
type: "string",
pattern: "^[a-z][a-zA-Z0-9]*$",
description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention."
},
content: {
type: "string",
description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data."
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationWriteApplication.IDecorator": {
type: "object",
properties: {
name: {
type: "string",
pattern: "^[A-Z][a-zA-Z0-9]*$",
description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention."
},
content: {
type: "string",
description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface."
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationWriteApplication.IPayloadType": {
type: "object",
properties: {
name: {
type: "string",
pattern: "^[A-Z][a-zA-Z0-9]*$",
description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention."
},
content: {
type: "string",
description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures."
}
},
required: [
"name",
"content"
]
}
}
},
functions: [
{
name: "process",
async: false,
parameters: [
{
name: "next",
description: " Request containing either preliminary data request or complete\ntask",
required: true,
schema: {
$ref: "#/components/schemas/IAutoBeRealizeAuthorizationWriteApplication.IProps"
}
}
],
description: "Process authentication component generation task or preliminary data\nrequests.\n\nGenerates JWT-based authentication infrastructure (provider, decorator,\npayload) for role-based authorization. Integrates with NestJS patterns and\njwtAuthorize utility."
}
]
},
kinds: ["prismaSchemas"],
state: ctx.state(),
});
return yield preliminary.orchestrate(ctx, (out) => __awaiter(this, void 0, void 0, function* () {
var _a, _b, _c;
const pointer = {
value: null,
};
const result = yield ctx.conversate(Object.assign({ source: "realizeAuthorizationWrite", controller: createController({
model: ctx.model,
build: (next) => {
pointer.value = next;
},
preliminary,
}), enforceFunctionCall: true, promptCacheKey: props.promptCacheKey }, (0, transformRealizeAuthorizationWriteHistory_1.transformRealizeAuthorizationWriteHistory)({
actor: props.actor,
preliminary,
})));
if (pointer.value === null)
return out(result)(null);
const compiler = yield ctx.compiler();
const authorization = {
actor: props.actor,
decorator: {
location: AuthorizationFileSystem_1.AuthorizationFileSystem.decoratorPath(pointer.value.decorator.name),
name: pointer.value.decorator.name,
content: pointer.value.decorator.content,
},
payload: {
location: AuthorizationFileSystem_1.AuthorizationFileSystem.payloadPath(pointer.value.payload.name),
name: pointer.value.payload.name,
content: yield compiler.typescript.beautify(pointer.value.payload.content),
},
provider: {
location: AuthorizationFileSystem_1.AuthorizationFileSystem.providerPath(pointer.value.provider.name),
name: pointer.value.provider.name,
content: pointer.value.provider.content,
},
};
ctx.dispatch({
type: "realizeAuthorizationWrite",
id: (0, uuid_1.v7)(),
created_at: new Date().toISOString(),
authorization: authorization,
metric: result.metric,
tokenUsage: result.tokenUsage,
completed: ++props.progress.completed,
total: props.progress.total,
step: (_b = (_a = ctx.state().test) === null || _a === void 0 ? void 0 : _a.step) !== null && _b !== void 0 ? _b : 0,
});
const prismaCompiled = (_c = ctx.state().prisma) === null || _c === void 0 ? void 0 : _c.compiled;
const prismaClient = (prismaCompiled === null || prismaCompiled === void 0 ? void 0 : prismaCompiled.type) === "success" ? prismaCompiled.nodeModules : {};
return out(result)(yield (0, orchestrateRealizeAuthorizationCorrect_1.orchestrateRealizeAuthorizationCorrect)(ctx, {
template: props.templates,
authorization,
prismaClient,
}));
}));
});
}
function createController(props) {
(0, assertSchemaModel_1.assertSchemaModel)(props.model);
const validate = (input) => {
const result = (() => { const _io0 = input => "string" === typeof input.thinking && ("object" === typeof input.request && null !== input.request && _iu0(input.request)); const _io1 = input => "getPrismaSchemas" === input.type && (Array.isArray(input.schemaNames) && (1 <= input.schemaNames.length && input.schemaNames.every(elem => "string" === typeof elem))); const _io2 = input => "complete" === input.type && ("object" === typeof input.provider && null !== input.provider && _io3(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io4(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io5(input.payload)); const _io3 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io4 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io5 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _iu0 = input => (() => {
if ("getPrismaSchemas" === input.type)
return _io1(input);
else if ("complete" === input.type)
return _io2(input);
else
return false;
})(); const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.thinking || _report(_exceptionable, {
path: _path + ".thinking",
expected: "string",
value: input.thinking
}), ("object" === typeof input.request && null !== input.request || _report(_exceptionable, {
path: _path + ".request",
expected: "(IAutoBePreliminaryGetPrismaSchemas | IAutoBeRealizeAuthorizationWriteApplication.IComplete)",
value: input.request
})) && _vu0(input.request, _path + ".request", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".request",
expected: "(IAutoBePreliminaryGetPrismaSchemas | IAutoBeRealizeAuthorizationWriteApplication.IComplete)",
value: input.request
})].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["getPrismaSchemas" === input.type || _report(_exceptionable, {
path: _path + ".type",
expected: "\"getPrismaSchemas\"",
value: input.type
}), (Array.isArray(input.schemaNames) || _report(_exceptionable, {
path: _path + ".schemaNames",
expected: "(Array<string> & MinItems<1>)",
value: input.schemaNames
})) && ((1 <= input.schemaNames.length || _report(_exceptionable, {
path: _path + ".schemaNames",
expected: "Array<> & MinItems<1>",
value: input.schemaNames
})) && input.schemaNames.map((elem, _index2) => "string" === typeof elem || _report(_exceptionable, {
path: _path + ".schemaNames[" + _index2 + "]",
expected: "string",
value: elem
})).every(flag => flag)) || _report(_exceptionable, {
path: _path + ".schemaNames",
expected: "(Array<string> & MinItems<1>)",
value: input.schemaNames
})].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["complete" === input.type || _report(_exceptionable, {
path: _path + ".type",
expected: "\"complete\"",
value: input.type
}), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IProvider",
value: input.provider
})) && _vo3(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IProvider",
value: input.provider
}), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IDecorator",
value: input.decorator
})) && _vo4(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IDecorator",
value: input.decorator
}), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IPayloadType",
value: input.payload
})) && _vo5(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IPayloadType",
value: input.payload
})].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
path: _path + ".name",
expected: "string & CamelCasePattern",
value: input.name
})) || _report(_exceptionable, {
path: _path + ".name",
expected: "(string & CamelCasePattern)",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vo4 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
path: _path + ".name",
expected: "string & PascalCasePattern",
value: input.name
})) || _report(_exceptionable, {
path: _path + ".name",
expected: "(string & PascalCasePattern)",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vo5 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
path: _path + ".name",
expected: "string & PascalCasePattern",
value: input.name
})) || _report(_exceptionable, {
path: _path + ".name",
expected: "(string & PascalCasePattern)",
value: input.name
}), "string" === typeof input.content || _report(_exceptionable, {
path: _path + ".content",
expected: "string",
value: input.content
})].every(flag => flag); const _vu0 = (input, _path, _exceptionable = true) => (() => {
if ("getPrismaSchemas" === input.type)
return _vo1(input, _path, true && _exceptionable);
else if ("complete" === input.type)
return _vo2(input, _path, true && _exceptionable);
else
return _report(_exceptionable, {
path: _path,
expected: "(IAutoBePreliminaryGetPrismaSchemas | IAutoBeRealizeAuthorizationWriteApplication.IComplete)",
value: input
});
})(); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
if (false === __is(input)) {
errors = [];
_report = __typia_transform__validateReport._validateReport(errors);
((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
path: _path + "",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IProps",
value: input
})) && _vo0(input, _path + "", true) || _report(true, {
path: _path + "",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IProps",
value: input
}))(input, "$input", true);
const success = 0 === errors.length;
return success ? {
success,
data: input
} : {
success,
errors,
data: input
};
}
return {
success: true,
data: input
};
}; })()(input);
if (result.success === false || result.data.request.type === "complete")
return result;
return props.preliminary.validate({
thinking: result.data.thinking,
request: result.data.request,
});
};
const application = collection[props.model === "chatgpt"
? "chatgpt"
: props.model === "gemini"
? "gemini"
: "claude"](validate);
return {
protocol: "class",
name: SOURCE,
application,
execute: {
process: (next) => {
if (next.request.type === "complete")
props.build(next.request);
},
},
};
}
const collection = {
chatgpt: (validate) => (() => {
const application = {
model: "chatgpt",
options: {
reference: true,
strict: false,
separate: null
},
functions: [
{
name: "process",
parameters: {
description: " Request containing either preliminary data request or complete\ntask\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationWriteApplication.IProps}",
type: "object",
properties: {
thinking: {
description: "Think before you act.\n\nBefore requesting preliminary data or completing your task, reflect on your\ncurrent state and explain your reasoning:\n\nFor preliminary requests (getAnalysisFiles, getPrismaSchemas, etc.):\n- What critical information is missing that you don't already have?\n- Why do you need it specifically right now?\n- Be brief - state the gap, don't list everything you have.\n\nFor completion (complete):\n- What key assets did you acquire?\n- What did you accomplish?\n- Why is it sufficient to complete?\n- Summarize - don't enumerate every single item.\n\nThis reflection helps you avoid duplicate requests and premature completion.",
type: "string"
},
request: {
description: "Type discriminator for the request.\n\nDetermines which action to perform: preliminary data retrieval\n(getPrismaSchemas) or final authentication generation (complete). When\npreliminary returns empty array, that type is removed from the union,\nphysically preventing repeated calls.",
anyOf: [
{
$ref: "#/$defs/IAutoBePreliminaryGetPrismaSchemas"
},
{
$ref: "#/$defs/IAutoBeRealizeAuthorizationWriteApplication.IComplete"
}
],
"x-discriminator": {
propertyName: "type",
mapping: {
getPrismaSchemas: "#/$defs/IAutoBePreliminaryGetPrismaSchemas",
complete: "#/$defs/IAutoBeRealizeAuthorizationWriteApplication.IComplete"
}
}
}
},
required: [
"thinking",
"request"
],
additionalProperties: false,
$defs: {
IAutoBePreliminaryGetPrismaSchemas: {
description: "Request to retrieve Prisma database schema definitions for context.\n\nThis type is used in the preliminary phase to request specific Prisma table\nschemas needed for generating type-safe API operations.",
type: "object",
properties: {
type: {
description: "Type discriminator for the request.\n\nDetermines which action to perform: preliminary data retrieval or actual\ntask execution. Value \"getPrismaSchemas\" indicates this is a preliminary\ndata request for Prisma schemas.",
type: "string",
"enum": [
"getPrismaSchemas"
]
},
schemaNames: {
description: "List of Prisma table names to retrieve.\n\nTable names from the Prisma schema file representing database entities\n(e.g., \"user\", \"post\", \"comment\").\n\nCRITICAL: DO NOT request the same schema names that you have already\nrequested in previous calls.\n\n\n@minItems 1",
type: "array",
items: {
type: "string"
}
}
},
required: [
"type",
"schemaNames"
]
},
"IAutoBeRealizeAuthorizationWriteApplication.IComplete": {
description: "Request to generate authentication components.\n\nExecutes authentication generation to create provider function, decorator,\nand payload type for the specified role. All components work together to\nprovide JWT-based authentication and authorization.",
type: "object",
properties: {
type: {
description: "Type discriminator for the request.\n\nDetermines which action to perform: preliminary data retrieval or actual\ntask execution. Value \"complete\" indicates this is the final task\nexecution request.",
type: "string",
"enum": [
"complete"
]
},
provider: {
description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
$ref: "#/$defs/IAutoBeRealizeAuthorizationWriteApplication.IProvider"
},
decorator: {
description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
$ref: "#/$defs/IAutoBeRealizeAuthorizationWriteApplication.IDecorator"
},
payload: {
description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
$ref: "#/$defs/IAutoBeRealizeAuthorizationWriteApplication.IPayloadType"
}
},
required: [
"type",
"provider",
"decorator",
"payload"
]
},
"IAutoBeRealizeAuthorizationWriteApplication.IProvider": {
type: "object",
properties: {
name: {
description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.\n\n\n@pattern ^[a-z][a-zA-Z0-9]*$",
type: "string"
},
content: {
description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
type: "string"
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationWriteApplication.IDecorator": {
type: "object",
properties: {
name: {
description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
type: "string"
},
content: {
description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
type: "string"
}
},
required: [
"name",
"content"
]
},
"IAutoBeRealizeAuthorizationWriteApplication.IPayloadType": {
type: "object",
properties: {
name: {
description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
type: "string"
},
content: {
description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
type: "string"
}
},
required: [
"name",
"content"
]
}
}
},
description: "Process authentication component generation task or preliminary data\nrequests.\n\nGenerates JWT-based authentication infrastructure (provider, decorator,\npayload) for role-based authorization. Integrates with NestJS patterns and\njwtAuthorize utility.",
validate: (() => { const _io0 = input => "string" === typeof input.thinking && ("object" === typeof input.request && null !== input.request && _iu0(input.request)); const _io1 = input => "getPrismaSchemas" === input.type && (Array.isArray(input.schemaNames) && (1 <= input.schemaNames.length && input.schemaNames.every(elem => "string" === typeof elem))); const _io2 = input => "complete" === input.type && ("object" === typeof input.provider && null !== input.provider && _io3(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io4(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io5(input.payload)); const _io3 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io4 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io5 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _iu0 = input => (() => {
if ("getPrismaSchemas" === input.type)
return _io1(input);
else if ("complete" === input.type)
return _io2(input);
else
return false;
})(); const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.thinking || _report(_exceptionable, {
path: _path + ".thinking",
expected: "string",
value: input.thinking
}), ("object" === typeof input.request && null !== input.request || _report(_exceptionable, {
path: _path + ".request",
expected: "(IAutoBePreliminaryGetPrismaSchemas | IAutoBeRealizeAuthorizationWriteApplication.IComplete)",
value: input.request
})) && _vu0(input.request, _path + ".request", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".request",
expected: "(IAutoBePreliminaryGetPrismaSchemas | IAutoBeRealizeAuthorizationWriteApplication.IComplete)",
value: input.request
})].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["getPrismaSchemas" === input.type || _report(_exceptionable, {
path: _path + ".type",
expected: "\"getPrismaSchemas\"",
value: input.type
}), (Array.isArray(input.schemaNames) || _report(_exceptionable, {
path: _path + ".schemaNames",
expected: "(Array<string> & MinItems<1>)",
value: input.schemaNames
})) && ((1 <= input.schemaNames.length || _report(_exceptionable, {
path: _path + ".schemaNames",
expected: "Array<> & MinItems<1>",
value: input.schemaNames
})) && input.schemaNames.map((elem, _index2) => "string" === typeof elem || _report(_exceptionable, {
path: _path + ".schemaNames[" + _index2 + "]",
expected: "string",
value: elem
})).every(flag => flag)) || _report(_exceptionable, {
path: _path + ".schemaNames",
expected: "(Array<string> & MinItems<1>)",
value: input.schemaNames
})].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["complete" === input.type || _report(_exceptionable, {
path: _path + ".type",
expected: "\"complete\"",
value: input.type
}), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IProvider",
value: input.provider
})) && _vo3(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".provider",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IProvider",
value: input.provider
}), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IDecorator",
value: input.decorator
})) && _vo4(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".decorator",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IDecorator",
value: input.decorator
}), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
path: _path + ".payload",
expected: "IAutoBeRealizeAuthorizationWriteApplication.IPayloadType",
value: input.payload
})) && _vo5(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
path: _path + ".p