@djangocfg/monitor 2.1.333 → 2.1.335

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.cjs CHANGED
@@ -119,6 +119,7 @@ var _apiKeyOverride = null;
119
119
  var _baseUrlOverride = null;
120
120
  var _withCredentials = true;
121
121
  var _onUnauthorized = null;
122
+ var _refreshHandler = null;
122
123
  var _client = null;
123
124
  function pushClientConfig() {
124
125
  if (!_client) return;
@@ -197,8 +198,30 @@ var auth = {
197
198
  pushClientConfig();
198
199
  },
199
200
  // ── 401 handler ───────────────────────────────────────────────────
201
+ /**
202
+ * Fired when the server returns 401 AND no refresh path recovers it
203
+ * (no refresh token, no refresh handler, refresh failed, or retry
204
+ * still 401). The app should clear local state and redirect to login.
205
+ *
206
+ * NOT fired for 401 that gets transparently recovered by the refresh
207
+ * handler — those are invisible to callers.
208
+ */
200
209
  onUnauthorized(cb) {
201
210
  _onUnauthorized = cb;
211
+ },
212
+ /**
213
+ * Register the refresh strategy. The handler receives the current
214
+ * refresh token and must call your refresh endpoint, returning
215
+ * `{ access, refresh? }` on success or `null` on failure.
216
+ *
217
+ * @example
218
+ * auth.setRefreshHandler(async (refresh) => {
219
+ * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
220
+ * return data ? { access: data.access, refresh: data.refresh } : null;
221
+ * });
222
+ */
223
+ setRefreshHandler(fn) {
224
+ _refreshHandler = fn;
202
225
  }
203
226
  };
204
227
 
@@ -344,6 +367,15 @@ var _API = class _API {
344
367
  setApiKey(key) {
345
368
  auth.setApiKey(key);
346
369
  }
370
+ // ── 401 handling ────────────────────────────────────────────────────────
371
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
372
+ onUnauthorized(cb) {
373
+ auth.onUnauthorized(cb);
374
+ }
375
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
376
+ setRefreshHandler(fn) {
377
+ auth.setRefreshHandler(fn);
378
+ }
347
379
  };
348
380
  __name(_API, "API");
349
381
  var API = _API;
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/index.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_monitor/api.ts","../src/_api/BaseClient.ts","../src/_api/generated/types.gen.ts"],"sourcesContent":["/**\n * @djangocfg/monitor\n *\n * Re-exports types only from the root entry point.\n * Use sub-paths for the actual monitor instances:\n *\n * - `@djangocfg/monitor/client` — browser SDK (use in 'use client' components)\n * - `@djangocfg/monitor/server` — server SDK (route handlers, Server Components)\n */\n\n// EventType and EventLevel are runtime string enums — safe to import in any context (no browser APIs)\nexport { EventType, EventLevel } from './types'\nexport type { MonitorEvent, MonitorConfig, ServerMonitorConfig } from './types'\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n};\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use((response) => {\n if (response.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","/**\n * BaseClient for @djangocfg/monitor\n *\n * Singleton monitorApi instance for the frontend monitor ingest endpoint.\n * Uses MemoryStorageAdapter — ingest is public (no auth tokens needed).\n */\n\nimport { API } from './generated/_cfg_monitor'\n\nexport const monitorApi = new API('')\n\nexport function configureMonitorApi(baseUrl: string): void {\n monitorApi.setBaseUrl(baseUrl)\n}\n\nexport class BaseClient {\n protected static monitorApi = monitorApi\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\nexport type ClientOptions = {\n baseUrl: 'http://localhost:8000' | (string & {});\n};\n\n/**\n * * `JS_ERROR` - Js Error\n * * `NETWORK_ERROR` - Network Error\n * * `ERROR` - Error\n * * `WARNING` - Warning\n * * `PAGE_VIEW` - Page View\n * * `PERFORMANCE` - Performance\n * * `CONSOLE` - Console\n */\nexport enum EventTypeEnum {\n JS_ERROR = 'JS_ERROR',\n NETWORK_ERROR = 'NETWORK_ERROR',\n ERROR = 'ERROR',\n WARNING = 'WARNING',\n PAGE_VIEW = 'PAGE_VIEW',\n PERFORMANCE = 'PERFORMANCE',\n CONSOLE = 'CONSOLE'\n}\n\n/**\n * Single browser event payload.\n */\nexport type FrontendEventIngestRequest = {\n build_id?: string;\n environment?: string;\n event_type: EventTypeEnum;\n extra?: unknown;\n fingerprint?: string;\n http_method?: string;\n http_status?: number | null;\n http_url?: string;\n level?: LevelEnum;\n message: string;\n project_name?: string;\n session_id?: string;\n stack_trace?: string;\n url?: string;\n user_agent?: string;\n};\n\n/**\n * Batch of up to 50 browser events.\n */\nexport type IngestBatchRequest = {\n events: Array<FrontendEventIngestRequest>;\n};\n\n/**\n * * `error` - Error\n * * `warning` - Warning\n * * `info` - Info\n * * `debug` - Debug\n */\nexport enum LevelEnum {\n ERROR = 'error',\n WARNING = 'warning',\n INFO = 'info',\n DEBUG = 'debug'\n}\n\nexport type CfgMonitorIngestCreateData = {\n body: IngestBatchRequest;\n path?: never;\n query?: never;\n url: '/cfg/monitor/ingest/';\n};\n\nexport type CfgMonitorIngestCreateResponses = {\n /**\n * Accepted\n */\n 202: unknown;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAgB7D,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AACF;;;AChMA,qBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,aAAN,MAAM,WAAU;AAAA,EAIrB,YAAY,SAAgC,CAAC,GAAG;AAHhD,wBAAQ;AACR,wBAAQ;AAGN,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,8BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AA9DuB;AAAhB,IAAM,YAAN;AAgEA,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,OAAN,MAAM,KAAI;AAAA,EAKf,YAAY,UAAmB,OAAmB,CAAC,GAAG;AAJtD,wBAAS;AAKP,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;AA9BiB;AAAV,IAAM,MAAN;;;ACxBA,IAAM,aAAa,IAAI,IAAI,EAAE;;;ACM7B,IAAK,gBAAL,kBAAKA,mBAAL;AACH,EAAAA,eAAA,cAAW;AACX,EAAAA,eAAA,mBAAgB;AAChB,EAAAA,eAAA,WAAQ;AACR,EAAAA,eAAA,aAAU;AACV,EAAAA,eAAA,eAAY;AACZ,EAAAA,eAAA,iBAAc;AACd,EAAAA,eAAA,aAAU;AAPF,SAAAA;AAAA,GAAA;AA4CL,IAAK,YAAL,kBAAKC,eAAL;AACH,EAAAA,WAAA,WAAQ;AACR,EAAAA,WAAA,aAAU;AACV,EAAAA,WAAA,UAAO;AACP,EAAAA,WAAA,WAAQ;AAJA,SAAAA;AAAA,GAAA;","names":["EventTypeEnum","LevelEnum"]}
1
+ {"version":3,"sources":["../src/index.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_monitor/api.ts","../src/_api/BaseClient.ts","../src/_api/generated/types.gen.ts"],"sourcesContent":["/**\n * @djangocfg/monitor\n *\n * Re-exports types only from the root entry point.\n * Use sub-paths for the actual monitor instances:\n *\n * - `@djangocfg/monitor/client` — browser SDK (use in 'use client' components)\n * - `@djangocfg/monitor/server` — server SDK (route handlers, Server Components)\n */\n\n// EventType and EventLevel are runtime string enums — safe to import in any context (no browser APIs)\nexport { EventType, EventLevel } from './types'\nexport type { MonitorEvent, MonitorConfig, ServerMonitorConfig } from './types'\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","/**\n * BaseClient for @djangocfg/monitor\n *\n * Singleton monitorApi instance for the frontend monitor ingest endpoint.\n * Uses MemoryStorageAdapter — ingest is public (no auth tokens needed).\n */\n\nimport { API } from './generated/_cfg_monitor'\n\nexport const monitorApi = new API('')\n\nexport function configureMonitorApi(baseUrl: string): void {\n monitorApi.setBaseUrl(baseUrl)\n}\n\nexport class BaseClient {\n protected static monitorApi = monitorApi\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\nexport type ClientOptions = {\n baseUrl: 'http://localhost:8000' | (string & {});\n};\n\n/**\n * * `JS_ERROR` - Js Error\n * * `NETWORK_ERROR` - Network Error\n * * `ERROR` - Error\n * * `WARNING` - Warning\n * * `PAGE_VIEW` - Page View\n * * `PERFORMANCE` - Performance\n * * `CONSOLE` - Console\n */\nexport enum EventTypeEnum {\n JS_ERROR = 'JS_ERROR',\n NETWORK_ERROR = 'NETWORK_ERROR',\n ERROR = 'ERROR',\n WARNING = 'WARNING',\n PAGE_VIEW = 'PAGE_VIEW',\n PERFORMANCE = 'PERFORMANCE',\n CONSOLE = 'CONSOLE'\n}\n\n/**\n * Single browser event payload.\n */\nexport type FrontendEventIngestRequest = {\n build_id?: string;\n environment?: string;\n event_type: EventTypeEnum;\n extra?: unknown;\n fingerprint?: string;\n http_method?: string;\n http_status?: number | null;\n http_url?: string;\n level?: LevelEnum;\n message: string;\n project_name?: string;\n session_id?: string;\n stack_trace?: string;\n url?: string;\n user_agent?: string;\n};\n\n/**\n * Batch of up to 50 browser events.\n */\nexport type IngestBatchRequest = {\n events: Array<FrontendEventIngestRequest>;\n};\n\n/**\n * * `error` - Error\n * * `warning` - Warning\n * * `info` - Info\n * * `debug` - Debug\n */\nexport enum LevelEnum {\n ERROR = 'error',\n WARNING = 'warning',\n INFO = 'info',\n DEBUG = 'debug'\n}\n\nexport type CfgMonitorIngestCreateData = {\n body: IngestBatchRequest;\n path?: never;\n query?: never;\n url: '/cfg/monitor/ingest/';\n};\n\nexport type CfgMonitorIngestCreateResponses = {\n /**\n * Accepted\n */\n 202: unknown;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAsB7C,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;;;ACtOA,qBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,aAAN,MAAM,WAAU;AAAA,EAIrB,YAAY,SAAgC,CAAC,GAAG;AAHhD,wBAAQ;AACR,wBAAQ;AAGN,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,8BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AA9DuB;AAAhB,IAAM,YAAN;AAgEA,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,OAAN,MAAM,KAAI;AAAA,EAKf,YAAY,UAAmB,OAAmB,CAAC,GAAG;AAJtD,wBAAS;AAKP,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;AA1CiB;AAAV,IAAM,MAAN;;;ACxBA,IAAM,aAAa,IAAI,IAAI,EAAE;;;ACM7B,IAAK,gBAAL,kBAAKA,mBAAL;AACH,EAAAA,eAAA,cAAW;AACX,EAAAA,eAAA,mBAAgB;AAChB,EAAAA,eAAA,WAAQ;AACR,EAAAA,eAAA,aAAU;AACV,EAAAA,eAAA,eAAY;AACZ,EAAAA,eAAA,iBAAc;AACd,EAAAA,eAAA,aAAU;AAPF,SAAAA;AAAA,GAAA;AA4CL,IAAK,YAAL,kBAAKC,eAAL;AACH,EAAAA,WAAA,WAAQ;AACR,EAAAA,WAAA,aAAU;AACV,EAAAA,WAAA,UAAO;AACP,EAAAA,WAAA,WAAQ;AAJA,SAAAA;AAAA,GAAA;","names":["EventTypeEnum","LevelEnum"]}
package/dist/index.mjs CHANGED
@@ -95,6 +95,7 @@ var _apiKeyOverride = null;
95
95
  var _baseUrlOverride = null;
96
96
  var _withCredentials = true;
97
97
  var _onUnauthorized = null;
98
+ var _refreshHandler = null;
98
99
  var _client = null;
99
100
  function pushClientConfig() {
100
101
  if (!_client) return;
@@ -173,8 +174,30 @@ var auth = {
173
174
  pushClientConfig();
174
175
  },
175
176
  // ── 401 handler ───────────────────────────────────────────────────
177
+ /**
178
+ * Fired when the server returns 401 AND no refresh path recovers it
179
+ * (no refresh token, no refresh handler, refresh failed, or retry
180
+ * still 401). The app should clear local state and redirect to login.
181
+ *
182
+ * NOT fired for 401 that gets transparently recovered by the refresh
183
+ * handler — those are invisible to callers.
184
+ */
176
185
  onUnauthorized(cb) {
177
186
  _onUnauthorized = cb;
187
+ },
188
+ /**
189
+ * Register the refresh strategy. The handler receives the current
190
+ * refresh token and must call your refresh endpoint, returning
191
+ * `{ access, refresh? }` on success or `null` on failure.
192
+ *
193
+ * @example
194
+ * auth.setRefreshHandler(async (refresh) => {
195
+ * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
196
+ * return data ? { access: data.access, refresh: data.refresh } : null;
197
+ * });
198
+ */
199
+ setRefreshHandler(fn) {
200
+ _refreshHandler = fn;
178
201
  }
179
202
  };
180
203
 
@@ -320,6 +343,15 @@ var _API = class _API {
320
343
  setApiKey(key) {
321
344
  auth.setApiKey(key);
322
345
  }
346
+ // ── 401 handling ────────────────────────────────────────────────────────
347
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
348
+ onUnauthorized(cb) {
349
+ auth.onUnauthorized(cb);
350
+ }
351
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
352
+ setRefreshHandler(fn) {
353
+ auth.setRefreshHandler(fn);
354
+ }
323
355
  };
324
356
  __name(_API, "API");
325
357
  var API = _API;
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_monitor/api.ts","../src/_api/BaseClient.ts","../src/_api/generated/types.gen.ts"],"sourcesContent":["// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n};\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use((response) => {\n if (response.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","/**\n * BaseClient for @djangocfg/monitor\n *\n * Singleton monitorApi instance for the frontend monitor ingest endpoint.\n * Uses MemoryStorageAdapter — ingest is public (no auth tokens needed).\n */\n\nimport { API } from './generated/_cfg_monitor'\n\nexport const monitorApi = new API('')\n\nexport function configureMonitorApi(baseUrl: string): void {\n monitorApi.setBaseUrl(baseUrl)\n}\n\nexport class BaseClient {\n protected static monitorApi = monitorApi\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\nexport type ClientOptions = {\n baseUrl: 'http://localhost:8000' | (string & {});\n};\n\n/**\n * * `JS_ERROR` - Js Error\n * * `NETWORK_ERROR` - Network Error\n * * `ERROR` - Error\n * * `WARNING` - Warning\n * * `PAGE_VIEW` - Page View\n * * `PERFORMANCE` - Performance\n * * `CONSOLE` - Console\n */\nexport enum EventTypeEnum {\n JS_ERROR = 'JS_ERROR',\n NETWORK_ERROR = 'NETWORK_ERROR',\n ERROR = 'ERROR',\n WARNING = 'WARNING',\n PAGE_VIEW = 'PAGE_VIEW',\n PERFORMANCE = 'PERFORMANCE',\n CONSOLE = 'CONSOLE'\n}\n\n/**\n * Single browser event payload.\n */\nexport type FrontendEventIngestRequest = {\n build_id?: string;\n environment?: string;\n event_type: EventTypeEnum;\n extra?: unknown;\n fingerprint?: string;\n http_method?: string;\n http_status?: number | null;\n http_url?: string;\n level?: LevelEnum;\n message: string;\n project_name?: string;\n session_id?: string;\n stack_trace?: string;\n url?: string;\n user_agent?: string;\n};\n\n/**\n * Batch of up to 50 browser events.\n */\nexport type IngestBatchRequest = {\n events: Array<FrontendEventIngestRequest>;\n};\n\n/**\n * * `error` - Error\n * * `warning` - Warning\n * * `info` - Info\n * * `debug` - Debug\n */\nexport enum LevelEnum {\n ERROR = 'error',\n WARNING = 'warning',\n INFO = 'info',\n DEBUG = 'debug'\n}\n\nexport type CfgMonitorIngestCreateData = {\n body: IngestBatchRequest;\n path?: never;\n query?: never;\n url: '/cfg/monitor/ingest/';\n};\n\nexport type CfgMonitorIngestCreateResponses = {\n /**\n * Accepted\n */\n 202: unknown;\n};\n"],"mappings":";;;;;;AAMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAgB7D,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AACF;;;AChMA,SAA+B,qBAAqB;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,aAAN,MAAM,WAAU;AAAA,EAIrB,YAAY,SAAgC,CAAC,GAAG;AAHhD,wBAAQ;AACR,wBAAQ;AAGN,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,WAAW,cAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AA9DuB;AAAhB,IAAM,YAAN;AAgEA,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,OAAN,MAAM,KAAI;AAAA,EAKf,YAAY,UAAmB,OAAmB,CAAC,GAAG;AAJtD,wBAAS;AAKP,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;AA9BiB;AAAV,IAAM,MAAN;;;ACxBA,IAAM,aAAa,IAAI,IAAI,EAAE;;;ACM7B,IAAK,gBAAL,kBAAKA,mBAAL;AACH,EAAAA,eAAA,cAAW;AACX,EAAAA,eAAA,mBAAgB;AAChB,EAAAA,eAAA,WAAQ;AACR,EAAAA,eAAA,aAAU;AACV,EAAAA,eAAA,eAAY;AACZ,EAAAA,eAAA,iBAAc;AACd,EAAAA,eAAA,aAAU;AAPF,SAAAA;AAAA,GAAA;AA4CL,IAAK,YAAL,kBAAKC,eAAL;AACH,EAAAA,WAAA,WAAQ;AACR,EAAAA,WAAA,aAAU;AACV,EAAAA,WAAA,UAAO;AACP,EAAAA,WAAA,WAAQ;AAJA,SAAAA;AAAA,GAAA;","names":["EventTypeEnum","LevelEnum"]}
1
+ {"version":3,"sources":["../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_monitor/api.ts","../src/_api/BaseClient.ts","../src/_api/generated/types.gen.ts"],"sourcesContent":["// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","/**\n * BaseClient for @djangocfg/monitor\n *\n * Singleton monitorApi instance for the frontend monitor ingest endpoint.\n * Uses MemoryStorageAdapter — ingest is public (no auth tokens needed).\n */\n\nimport { API } from './generated/_cfg_monitor'\n\nexport const monitorApi = new API('')\n\nexport function configureMonitorApi(baseUrl: string): void {\n monitorApi.setBaseUrl(baseUrl)\n}\n\nexport class BaseClient {\n protected static monitorApi = monitorApi\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\nexport type ClientOptions = {\n baseUrl: 'http://localhost:8000' | (string & {});\n};\n\n/**\n * * `JS_ERROR` - Js Error\n * * `NETWORK_ERROR` - Network Error\n * * `ERROR` - Error\n * * `WARNING` - Warning\n * * `PAGE_VIEW` - Page View\n * * `PERFORMANCE` - Performance\n * * `CONSOLE` - Console\n */\nexport enum EventTypeEnum {\n JS_ERROR = 'JS_ERROR',\n NETWORK_ERROR = 'NETWORK_ERROR',\n ERROR = 'ERROR',\n WARNING = 'WARNING',\n PAGE_VIEW = 'PAGE_VIEW',\n PERFORMANCE = 'PERFORMANCE',\n CONSOLE = 'CONSOLE'\n}\n\n/**\n * Single browser event payload.\n */\nexport type FrontendEventIngestRequest = {\n build_id?: string;\n environment?: string;\n event_type: EventTypeEnum;\n extra?: unknown;\n fingerprint?: string;\n http_method?: string;\n http_status?: number | null;\n http_url?: string;\n level?: LevelEnum;\n message: string;\n project_name?: string;\n session_id?: string;\n stack_trace?: string;\n url?: string;\n user_agent?: string;\n};\n\n/**\n * Batch of up to 50 browser events.\n */\nexport type IngestBatchRequest = {\n events: Array<FrontendEventIngestRequest>;\n};\n\n/**\n * * `error` - Error\n * * `warning` - Warning\n * * `info` - Info\n * * `debug` - Debug\n */\nexport enum LevelEnum {\n ERROR = 'error',\n WARNING = 'warning',\n INFO = 'info',\n DEBUG = 'debug'\n}\n\nexport type CfgMonitorIngestCreateData = {\n body: IngestBatchRequest;\n path?: never;\n query?: never;\n url: '/cfg/monitor/ingest/';\n};\n\nexport type CfgMonitorIngestCreateResponses = {\n /**\n * Accepted\n */\n 202: unknown;\n};\n"],"mappings":";;;;;;AAMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAsB7C,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;;;ACtOA,SAA+B,qBAAqB;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,aAAN,MAAM,WAAU;AAAA,EAIrB,YAAY,SAAgC,CAAC,GAAG;AAHhD,wBAAQ;AACR,wBAAQ;AAGN,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,WAAW,cAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AA9DuB;AAAhB,IAAM,YAAN;AAgEA,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,OAAN,MAAM,KAAI;AAAA,EAKf,YAAY,UAAmB,OAAmB,CAAC,GAAG;AAJtD,wBAAS;AAKP,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;AA1CiB;AAAV,IAAM,MAAN;;;ACxBA,IAAM,aAAa,IAAI,IAAI,EAAE;;;ACM7B,IAAK,gBAAL,kBAAKA,mBAAL;AACH,EAAAA,eAAA,cAAW;AACX,EAAAA,eAAA,mBAAgB;AAChB,EAAAA,eAAA,WAAQ;AACR,EAAAA,eAAA,aAAU;AACV,EAAAA,eAAA,eAAY;AACZ,EAAAA,eAAA,iBAAc;AACd,EAAAA,eAAA,aAAU;AAPF,SAAAA;AAAA,GAAA;AA4CL,IAAK,YAAL,kBAAKC,eAAL;AACH,EAAAA,WAAA,WAAQ;AACR,EAAAA,WAAA,aAAU;AACV,EAAAA,WAAA,UAAO;AACP,EAAAA,WAAA,WAAQ;AAJA,SAAAA;AAAA,GAAA;","names":["EventTypeEnum","LevelEnum"]}
package/dist/server.cjs CHANGED
@@ -118,6 +118,9 @@ var _apiKeyOverride = null;
118
118
  var _baseUrlOverride = null;
119
119
  var _withCredentials = true;
120
120
  var _onUnauthorized = null;
121
+ var _refreshHandler = null;
122
+ var _refreshInflight = null;
123
+ var RETRY_MARKER = "X-Auth-Retry";
121
124
  var _client = null;
122
125
  function pushClientConfig() {
123
126
  if (!_client) return;
@@ -196,10 +199,53 @@ var auth = {
196
199
  pushClientConfig();
197
200
  },
198
201
  // ── 401 handler ───────────────────────────────────────────────────
202
+ /**
203
+ * Fired when the server returns 401 AND no refresh path recovers it
204
+ * (no refresh token, no refresh handler, refresh failed, or retry
205
+ * still 401). The app should clear local state and redirect to login.
206
+ *
207
+ * NOT fired for 401 that gets transparently recovered by the refresh
208
+ * handler — those are invisible to callers.
209
+ */
199
210
  onUnauthorized(cb) {
200
211
  _onUnauthorized = cb;
212
+ },
213
+ /**
214
+ * Register the refresh strategy. The handler receives the current
215
+ * refresh token and must call your refresh endpoint, returning
216
+ * `{ access, refresh? }` on success or `null` on failure.
217
+ *
218
+ * @example
219
+ * auth.setRefreshHandler(async (refresh) => {
220
+ * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
221
+ * return data ? { access: data.access, refresh: data.refresh } : null;
222
+ * });
223
+ */
224
+ setRefreshHandler(fn) {
225
+ _refreshHandler = fn;
201
226
  }
202
227
  };
228
+ async function tryRefresh() {
229
+ if (_refreshInflight) return _refreshInflight;
230
+ if (!_refreshHandler) return null;
231
+ const refresh = auth.getRefreshToken();
232
+ if (!refresh) return null;
233
+ _refreshInflight = (async () => {
234
+ try {
235
+ const result = await _refreshHandler(refresh);
236
+ if (!result?.access) return null;
237
+ auth.setToken(result.access);
238
+ if (result.refresh) auth.setRefreshToken(result.refresh);
239
+ return result.access;
240
+ } catch {
241
+ return null;
242
+ } finally {
243
+ _refreshInflight = null;
244
+ }
245
+ })();
246
+ return _refreshInflight;
247
+ }
248
+ __name(tryRefresh, "tryRefresh");
203
249
  function installAuthOnClient(client2) {
204
250
  if (_client) return;
205
251
  _client = client2;
@@ -216,14 +262,48 @@ function installAuthOnClient(client2) {
216
262
  if (apiKey) request.headers.set("X-API-Key", apiKey);
217
263
  return request;
218
264
  });
219
- client2.interceptors.response.use((response) => {
220
- if (response.status === 401 && _onUnauthorized) {
221
- try {
222
- _onUnauthorized(response);
223
- } catch {
265
+ client2.interceptors.response.use(async (response, request) => {
266
+ if (response.status !== 401) return response;
267
+ if (request.headers.get(RETRY_MARKER)) {
268
+ if (_onUnauthorized) {
269
+ try {
270
+ _onUnauthorized(response);
271
+ } catch {
272
+ }
224
273
  }
274
+ return response;
275
+ }
276
+ const newToken = await tryRefresh();
277
+ if (!newToken) {
278
+ if (_onUnauthorized) {
279
+ try {
280
+ _onUnauthorized(response);
281
+ } catch {
282
+ }
283
+ }
284
+ return response;
285
+ }
286
+ const retry = request.clone();
287
+ retry.headers.set("Authorization", `Bearer ${newToken}`);
288
+ retry.headers.set(RETRY_MARKER, "1");
289
+ try {
290
+ const retried = await fetch(retry);
291
+ if (retried.status === 401 && _onUnauthorized) {
292
+ try {
293
+ _onUnauthorized(retried);
294
+ } catch {
295
+ }
296
+ }
297
+ return retried;
298
+ } catch {
299
+ if (_onUnauthorized) {
300
+ try {
301
+ _onUnauthorized(response);
302
+ } catch {
303
+ }
304
+ }
305
+ return response;
225
306
  }
226
- return response;
227
307
  });
228
308
  }
229
309
  __name(installAuthOnClient, "installAuthOnClient");
@@ -370,6 +450,15 @@ var _API = class _API {
370
450
  setApiKey(key) {
371
451
  auth.setApiKey(key);
372
452
  }
453
+ // ── 401 handling ────────────────────────────────────────────────────────
454
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
455
+ onUnauthorized(cb) {
456
+ auth.onUnauthorized(cb);
457
+ }
458
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
459
+ setRefreshHandler(fn) {
460
+ auth.setRefreshHandler(fn);
461
+ }
373
462
  };
374
463
  __name(_API, "API");
375
464
  var API = _API;