@geekmidas/constructs 0.0.18 → 0.0.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (84) hide show
  1. package/dist/{EndpointBuilder-DlDft4mJ.mjs → EndpointBuilder-D47py-H1.mjs} +1 -1
  2. package/dist/{EndpointBuilder-DlDft4mJ.mjs.map → EndpointBuilder-D47py-H1.mjs.map} +1 -1
  3. package/dist/{EndpointBuilder-CFnjYXmL.cjs → EndpointBuilder-vxy3s960.cjs} +1 -1
  4. package/dist/{EndpointBuilder-CFnjYXmL.cjs.map → EndpointBuilder-vxy3s960.cjs.map} +1 -1
  5. package/dist/{EndpointFactory-mTfi8x1X.cjs → EndpointFactory-DSTXeokM.cjs} +2 -2
  6. package/dist/EndpointFactory-DSTXeokM.cjs.map +1 -0
  7. package/dist/{EndpointFactory-Ctln6czP.mjs → EndpointFactory-HOCnoBNT.mjs} +2 -2
  8. package/dist/EndpointFactory-HOCnoBNT.mjs.map +1 -0
  9. package/dist/{HonoEndpointAdaptor-DuyE06nH.mjs → HonoEndpointAdaptor-BI0tA0Fg.mjs} +2 -2
  10. package/dist/{HonoEndpointAdaptor-DuyE06nH.mjs.map → HonoEndpointAdaptor-BI0tA0Fg.mjs.map} +1 -1
  11. package/dist/{HonoEndpointAdaptor-DsqGuEIb.d.mts → HonoEndpointAdaptor-BTwjymKt.d.mts} +3 -3
  12. package/dist/{HonoEndpointAdaptor-DajXbh80.d.cts → HonoEndpointAdaptor-CDL4pkMO.d.cts} +3 -3
  13. package/dist/{HonoEndpointAdaptor-CfLRHHFw.cjs → HonoEndpointAdaptor-CdWWj3EJ.cjs} +2 -2
  14. package/dist/{HonoEndpointAdaptor-CfLRHHFw.cjs.map → HonoEndpointAdaptor-CdWWj3EJ.cjs.map} +1 -1
  15. package/dist/{Subscriber-D-FPWts6.cjs → Subscriber-Bdh8rMSL.cjs} +1 -1
  16. package/dist/{Subscriber-D-FPWts6.cjs.map → Subscriber-Bdh8rMSL.cjs.map} +1 -1
  17. package/dist/{Subscriber-CGb8LjZa.mjs → Subscriber-CJOWwaw1.mjs} +1 -1
  18. package/dist/{Subscriber-CGb8LjZa.mjs.map → Subscriber-CJOWwaw1.mjs.map} +1 -1
  19. package/dist/{SubscriberBuilder-BcAspHv9.mjs → SubscriberBuilder-BWQmiYd8.mjs} +2 -2
  20. package/dist/{SubscriberBuilder-BcAspHv9.mjs.map → SubscriberBuilder-BWQmiYd8.mjs.map} +1 -1
  21. package/dist/{SubscriberBuilder-BfE2cL1q.cjs → SubscriberBuilder-DieD_60p.cjs} +2 -2
  22. package/dist/{SubscriberBuilder-BfE2cL1q.cjs.map → SubscriberBuilder-DieD_60p.cjs.map} +1 -1
  23. package/dist/{TestEndpointAdaptor-DhRjJHyk.d.mts → TestEndpointAdaptor-Bl2ic-yr.d.mts} +9 -9
  24. package/dist/{TestEndpointAdaptor-B9tUIlCC.d.cts → TestEndpointAdaptor-ByXqQufk.d.cts} +9 -9
  25. package/dist/{TestEndpointAdaptor-B9hyZ-mF.cjs → TestEndpointAdaptor-C5qwQSnQ.cjs} +36 -16
  26. package/dist/TestEndpointAdaptor-C5qwQSnQ.cjs.map +1 -0
  27. package/dist/{TestEndpointAdaptor-DbwrL-RJ.mjs → TestEndpointAdaptor-DFDT9m8q.mjs} +37 -17
  28. package/dist/TestEndpointAdaptor-DFDT9m8q.mjs.map +1 -0
  29. package/dist/adaptors/aws.d.cts +1 -1
  30. package/dist/adaptors/hono.cjs +1 -1
  31. package/dist/adaptors/hono.d.cts +2 -2
  32. package/dist/adaptors/hono.d.mts +1 -1
  33. package/dist/adaptors/hono.mjs +1 -1
  34. package/dist/adaptors/testing.cjs +1 -1
  35. package/dist/adaptors/testing.d.cts +2 -2
  36. package/dist/adaptors/testing.d.mts +1 -1
  37. package/dist/adaptors/testing.mjs +1 -1
  38. package/dist/crons/Cron.d.cts +1 -1
  39. package/dist/crons/CronBuilder.d.cts +1 -1
  40. package/dist/crons/index.d.cts +5 -5
  41. package/dist/endpoints/AmazonApiGatewayEndpointAdaptor.d.cts +1 -1
  42. package/dist/endpoints/AmazonApiGatewayV1EndpointAdaptor.d.cts +1 -1
  43. package/dist/endpoints/AmazonApiGatewayV2EndpointAdaptor.d.cts +1 -1
  44. package/dist/endpoints/Endpoint.d.cts +1 -1
  45. package/dist/endpoints/EndpointBuilder.cjs +1 -1
  46. package/dist/endpoints/EndpointBuilder.d.cts +1 -1
  47. package/dist/endpoints/EndpointBuilder.mjs +1 -1
  48. package/dist/endpoints/EndpointFactory.cjs +2 -2
  49. package/dist/endpoints/EndpointFactory.d.cts +1 -1
  50. package/dist/endpoints/EndpointFactory.mjs +2 -2
  51. package/dist/endpoints/HonoEndpointAdaptor.cjs +1 -1
  52. package/dist/endpoints/HonoEndpointAdaptor.d.cts +2 -2
  53. package/dist/endpoints/HonoEndpointAdaptor.d.mts +1 -1
  54. package/dist/endpoints/HonoEndpointAdaptor.mjs +1 -1
  55. package/dist/endpoints/TestEndpointAdaptor.cjs +1 -1
  56. package/dist/endpoints/TestEndpointAdaptor.d.cts +2 -2
  57. package/dist/endpoints/TestEndpointAdaptor.d.mts +1 -1
  58. package/dist/endpoints/TestEndpointAdaptor.mjs +1 -1
  59. package/dist/endpoints/audit.d.cts +1 -1
  60. package/dist/endpoints/helpers.d.cts +1 -1
  61. package/dist/endpoints/index.cjs +2 -2
  62. package/dist/endpoints/index.d.cts +3 -3
  63. package/dist/endpoints/index.d.mts +2 -2
  64. package/dist/endpoints/index.mjs +2 -2
  65. package/dist/endpoints/processAudits.d.cts +1 -1
  66. package/dist/functions/index.d.cts +1 -1
  67. package/dist/index-CkBMFqhI.d.cts +10 -0
  68. package/dist/subscribers/Subscriber.cjs +1 -1
  69. package/dist/subscribers/Subscriber.mjs +1 -1
  70. package/dist/subscribers/SubscriberBuilder.cjs +2 -2
  71. package/dist/subscribers/SubscriberBuilder.mjs +2 -2
  72. package/dist/subscribers/index.cjs +2 -2
  73. package/dist/subscribers/index.d.mts +2 -2
  74. package/dist/subscribers/index.mjs +2 -2
  75. package/package.json +6 -6
  76. package/src/endpoints/HonoEndpointAdaptor.ts +2 -2
  77. package/src/endpoints/TestEndpointAdaptor.ts +51 -52
  78. package/src/endpoints/__tests__/HonoEndpointAdaptor.spec.ts +3 -2
  79. package/src/endpoints/__tests__/TestEndpointAdaptor.audits.spec.ts +614 -0
  80. package/dist/EndpointFactory-Ctln6czP.mjs.map +0 -1
  81. package/dist/EndpointFactory-mTfi8x1X.cjs.map +0 -1
  82. package/dist/TestEndpointAdaptor-B9hyZ-mF.cjs.map +0 -1
  83. package/dist/TestEndpointAdaptor-DbwrL-RJ.mjs.map +0 -1
  84. package/dist/index-m7xBtcAW.d.cts +0 -10
@@ -1 +1 @@
1
- {"version":3,"file":"HonoEndpointAdaptor-CfLRHHFw.cjs","names":["endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >","c: Context<any, string, {}>","data: unknown","schema?: T","serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>","app: Hono","serviceDiscovery: ServiceDiscovery<any, any>","routes: string[]","envParser: EnvironmentParser<{}>","Hono","logger: TLogger","options?: HonoEndpointOptions","endpoints: Endpoint<string, HttpMethod, any, any, TServices, TLogger>[]","ResponseBuilder","metadata","output","result","validationError: any","e: any","docsPath: string","openApiOptions?: HonoEndpointOptions['openApiOptions']"],"sources":["../src/endpoints/HonoEndpointAdaptor.ts"],"sourcesContent":["import type { AuditStorage, AuditableAction } from '@geekmidas/audit';\nimport type { EnvironmentParser } from '@geekmidas/envkit';\nimport type { EventPublisher } from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport { checkRateLimit, getRateLimitHeaders } from '@geekmidas/rate-limit';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { type Context, Hono } from 'hono';\nimport { setCookie } from 'hono/cookie';\nimport { logger as honoLogger } from 'hono/logger';\nimport { timing } from 'hono/timing';\nimport { validator } from 'hono/validator';\nimport type { HttpMethod, LowerHttpMethod } from '../types';\nimport {\n Endpoint,\n type EndpointContext,\n type EndpointSchemas,\n ResponseBuilder,\n} from './Endpoint';\nimport { getEndpointsFromRoutes } from './helpers';\nimport { parseHonoQuery } from './parseHonoQuery';\n\nimport { wrapError } from '@geekmidas/errors';\nimport {\n type Service,\n ServiceDiscovery,\n type ServiceRecord,\n} from '@geekmidas/services';\nimport type { ContentfulStatusCode } from 'hono/utils/http-status';\nimport { publishConstructEvents } from '../publisher';\nimport type { MappedAudit } from './audit';\nimport {\n createAuditContext,\n executeWithAuditTransaction,\n} from './processAudits';\n\nexport interface HonoEndpointOptions {\n /**\n * Path where OpenAPI documentation will be served.\n * Set to false to disable docs route.\n * @default '/docs'\n */\n docsPath?: string | false;\n /**\n * OpenAPI schema options\n */\n openApiOptions?: {\n title?: string;\n version?: string;\n description?: string;\n };\n}\n\nexport class HonoEndpoint<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n> {\n constructor(\n private readonly endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n ) {}\n\n static isDev = process.env.NODE_ENV === 'development';\n\n static async validate<T extends StandardSchemaV1>(\n c: Context<any, string, {}>,\n data: unknown,\n schema?: T,\n ) {\n if (!schema) {\n return undefined;\n }\n\n const parsed = await Endpoint.validate(schema, data);\n\n if (parsed.issues) {\n return c.json(parsed.issues, 422);\n }\n\n return parsed.value;\n }\n addRoute(\n serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>,\n app: Hono,\n ): void {\n HonoEndpoint.addRoute(this.endpoint, serviceDiscovery, app);\n }\n\n static applyEventMiddleware(\n app: Hono,\n serviceDiscovery: ServiceDiscovery<any, any>,\n ) {\n app.use(async (c, next) => {\n await next();\n // @ts-ignore\n const endpoint = c.get('__endpoint') as Endpoint<\n any,\n any,\n any,\n any,\n any,\n any,\n any,\n any\n >;\n // @ts-ignore\n const response = c.get('__response');\n // @ts-ignore\n const logger = c.get('__logger') as Logger;\n\n if (Endpoint.isSuccessStatus(c.res.status) && endpoint) {\n // Process events (audits are handled in the handler with transaction support)\n await publishConstructEvents<any, any>(\n endpoint,\n response,\n serviceDiscovery,\n logger,\n );\n }\n });\n }\n\n static async fromRoutes<TLogger extends Logger, TServices extends Service[]>(\n routes: string[],\n envParser: EnvironmentParser<{}>,\n app = new Hono(),\n logger: TLogger,\n cwd = process.cwd(),\n options?: HonoEndpointOptions,\n ): Promise<Hono> {\n const endpoints = await getEndpointsFromRoutes<TServices>(routes, cwd);\n const serviceDiscovery = ServiceDiscovery.getInstance<\n ServiceRecord<TServices>,\n TLogger\n >(logger, envParser);\n\n HonoEndpoint.addRoutes(endpoints, serviceDiscovery, app, options);\n\n return app;\n }\n\n static addRoutes<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n >(\n endpoints: Endpoint<string, HttpMethod, any, any, TServices, TLogger>[],\n serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>,\n app: Hono,\n options?: HonoEndpointOptions,\n ): void {\n // Add timing middleware (always enabled)\n app.use('*', timing());\n\n // Add logger middleware in development mode\n\n if (HonoEndpoint.isDev) {\n app.use('*', honoLogger());\n }\n\n // Add docs route if not disabled\n const docsPath =\n options?.docsPath !== false ? options?.docsPath || '/docs' : null;\n if (docsPath) {\n HonoEndpoint.addDocsRoute(\n endpoints,\n app,\n docsPath,\n options?.openApiOptions,\n );\n }\n\n // Sort endpoints to ensure static routes come before dynamic ones\n const sortedEndpoints = endpoints.sort((a, b) => {\n const aSegments = a.route.split('/');\n const bSegments = b.route.split('/');\n\n // Compare each segment\n for (let i = 0; i < Math.max(aSegments.length, bSegments.length); i++) {\n const aSegment = aSegments[i] || '';\n const bSegment = bSegments[i] || '';\n\n // If one is dynamic and the other is not, static comes first\n const aIsDynamic = aSegment.startsWith(':');\n const bIsDynamic = bSegment.startsWith(':');\n\n if (!aIsDynamic && bIsDynamic) return -1;\n if (aIsDynamic && !bIsDynamic) return 1;\n\n // If both are the same type, compare alphabetically\n if (aSegment !== bSegment) {\n return aSegment.localeCompare(bSegment);\n }\n }\n\n return 0;\n });\n HonoEndpoint.applyEventMiddleware(app, serviceDiscovery);\n for (const endpoint of sortedEndpoints) {\n HonoEndpoint.addRoute(endpoint, serviceDiscovery, app);\n }\n }\n\n static addRoute<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n >(\n endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>,\n app: Hono,\n ): void {\n const { route } = endpoint;\n const method = endpoint.method.toLowerCase() as LowerHttpMethod<TMethod>;\n\n app[method](\n route,\n validator('json', (value, c) =>\n HonoEndpoint.validate(c, value, endpoint.input?.body),\n ),\n validator('query', (_, c) => {\n const parsedQuery = parseHonoQuery(c);\n return HonoEndpoint.validate(c, parsedQuery, endpoint.input?.query);\n }),\n validator('param', (params, c) =>\n HonoEndpoint.validate(c, params, endpoint.input?.params),\n ),\n async (c) => {\n const logger = endpoint.logger.child({\n endpoint: endpoint.fullPath,\n route: endpoint.route,\n host: c.header('host'),\n method: endpoint.method,\n path: c.req.path,\n }) as TLogger;\n\n try {\n const headerValues = c.req.header();\n\n const header = Endpoint.createHeaders(headerValues);\n const cookie = Endpoint.createCookies(headerValues.cookie);\n\n const services = await serviceDiscovery.register(endpoint.services);\n\n const session = await endpoint.getSession({\n services,\n logger,\n header,\n cookie,\n });\n\n const isAuthorized = await endpoint.authorize({\n header,\n cookie,\n services,\n logger,\n session,\n });\n\n if (!isAuthorized) {\n logger.warn('Unauthorized access attempt');\n return c.json({ error: 'Unauthorized' }, 401);\n }\n\n // Check rate limit if configured\n if (endpoint.rateLimit) {\n const rateLimitInfo = await checkRateLimit(endpoint.rateLimit, {\n header,\n services,\n logger,\n session,\n path: c.req.path,\n method: endpoint.method,\n });\n\n // Set rate limit headers\n const rateLimitHeaders = getRateLimitHeaders(\n rateLimitInfo,\n endpoint.rateLimit,\n );\n for (const [key, value] of Object.entries(rateLimitHeaders)) {\n if (value) {\n c.header(key, value);\n }\n }\n }\n\n // Create audit context if audit storage is configured\n const auditContext = await createAuditContext(\n endpoint,\n serviceDiscovery,\n logger,\n {\n session,\n header,\n cookie,\n services: services as Record<string, unknown>,\n },\n );\n\n // Warn if declarative audits are configured but no audit storage\n const audits = endpoint.audits as MappedAudit<\n TAuditAction,\n TOutSchema\n >[];\n if (!auditContext && audits?.length) {\n logger.warn('No auditor storage service available');\n }\n\n // Resolve database service if configured\n const rawDb = endpoint.databaseService\n ? await serviceDiscovery\n .register([endpoint.databaseService])\n .then(\n (s) =>\n s[endpoint.databaseService!.serviceName as keyof typeof s],\n )\n : undefined;\n\n // Execute handler with automatic audit transaction support\n const result = await executeWithAuditTransaction(\n auditContext,\n async (auditor) => {\n // Use audit transaction as db only if the storage uses the same database service\n const sameDatabase =\n auditContext?.storage?.databaseServiceName &&\n auditContext.storage.databaseServiceName ===\n endpoint.databaseService?.serviceName;\n const db = sameDatabase\n ? (auditor?.getTransaction?.() ?? rawDb)\n : rawDb;\n\n const responseBuilder = new ResponseBuilder();\n const response = await endpoint.handler(\n {\n services,\n logger,\n body: c.req.valid('json'),\n query: c.req.valid('query'),\n params: c.req.valid('param'),\n session,\n header,\n cookie,\n auditor,\n db,\n } as unknown as EndpointContext<\n TInput,\n TServices,\n TLogger,\n TSession,\n TAuditAction,\n TDatabase,\n TAuditStorage\n >,\n responseBuilder,\n );\n\n // Check if response has metadata\n let data = response;\n let metadata = responseBuilder.getMetadata();\n\n if (Endpoint.hasMetadata(response)) {\n data = response.data;\n metadata = response.metadata;\n }\n\n const output = endpoint.outputSchema\n ? await endpoint.parseOutput(data)\n : undefined;\n\n return { output, metadata, responseBuilder };\n },\n // Process declarative audits after handler (inside transaction)\n async (result, auditor) => {\n if (!audits?.length) return;\n\n for (const audit of audits) {\n if (audit.when && !audit.when(result.output as any)) {\n continue;\n }\n const payload = audit.payload(result.output as any);\n const entityId = audit.entityId?.(result.output as any);\n auditor.audit(audit.type as any, payload as any, {\n table: audit.table,\n entityId,\n });\n }\n },\n );\n\n const { output, metadata } = result;\n\n try {\n let status = endpoint.status as ContentfulStatusCode;\n\n // Apply response metadata\n if (metadata.status) {\n status = metadata.status as ContentfulStatusCode;\n }\n\n if (metadata.headers) {\n for (const [key, value] of Object.entries(metadata.headers)) {\n c.header(key, value);\n }\n }\n\n if (metadata.cookies) {\n for (const [name, { value, options }] of metadata.cookies) {\n setCookie(c, name, value, options);\n }\n }\n\n // @ts-ignore\n c.set('__response', output);\n // @ts-ignore\n c.set('__endpoint', endpoint);\n // @ts-ignore\n c.set('__logger', logger);\n // @ts-ignore\n c.set('__session', session);\n // @ts-ignore\n c.set('__services', services);\n\n if (HonoEndpoint.isDev) {\n logger.info({ status, body: output }, 'Outgoing response');\n }\n\n return c.json(output ?? {}, status);\n } catch (validationError: any) {\n logger.error(validationError, 'Output validation failed');\n const error = wrapError(\n validationError,\n 422,\n 'Response validation failed',\n );\n if (HonoEndpoint.isDev) {\n logger.info(\n { status: error.statusCode, body: error },\n 'Outgoing response',\n );\n }\n return c.json(error, error.statusCode as ContentfulStatusCode);\n }\n } catch (e: any) {\n logger.error(e, 'Error processing endpoint request');\n const error = wrapError(e, 500, 'Internal Server Error');\n if (HonoEndpoint.isDev) {\n logger.info(\n { status: error.statusCode, body: error },\n 'Outgoing response',\n );\n }\n return c.json(error, error.statusCode as ContentfulStatusCode);\n }\n },\n );\n }\n\n static addDocsRoute<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n >(\n endpoints: Endpoint<string, HttpMethod, any, any, TServices, TLogger>[],\n app: Hono,\n docsPath: string,\n openApiOptions?: HonoEndpointOptions['openApiOptions'],\n ): void {\n app.get(docsPath, async (c) => {\n try {\n const openApiSchema = await Endpoint.buildOpenApiSchema(\n endpoints,\n openApiOptions,\n );\n\n return c.json(openApiSchema);\n } catch (error) {\n console.error('Error generating OpenAPI schema:', error);\n return c.json(\n { error: 'Failed to generate OpenAPI documentation' },\n 500,\n );\n }\n });\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;AAoDA,IAAa,eAAb,MAAa,aAkBX;CACA,YACmBA,UAgBjB;EAhBiB;CAgBf;CAEJ,OAAO,QAAQ,QAAQ,IAAI,aAAa;CAExC,aAAa,SACXC,GACAC,MACAC,QACA;AACA,OAAK,OACH;EAGF,MAAM,SAAS,MAAM,0BAAS,SAAS,QAAQ,KAAK;AAEpD,MAAI,OAAO,OACT,QAAO,EAAE,KAAK,OAAO,QAAQ,IAAI;AAGnC,SAAO,OAAO;CACf;CACD,SACEC,kBACAC,KACM;AACN,eAAa,SAAS,KAAK,UAAU,kBAAkB,IAAI;CAC5D;CAED,OAAO,qBACLA,KACAC,kBACA;AACA,MAAI,IAAI,OAAO,GAAG,SAAS;AACzB,SAAM,MAAM;GAEZ,MAAM,WAAW,EAAE,IAAI,aAAa;GAWpC,MAAM,WAAW,EAAE,IAAI,aAAa;GAEpC,MAAM,SAAS,EAAE,IAAI,WAAW;AAEhC,OAAI,0BAAS,gBAAgB,EAAE,IAAI,OAAO,IAAI,SAE5C,OAAM,yCACJ,UACA,UACA,kBACA,OACD;EAEJ,EAAC;CACH;CAED,aAAa,WACXC,QACAC,WACA,MAAM,IAAIC,aACVC,QACA,MAAM,QAAQ,KAAK,EACnBC,SACe;EACf,MAAM,YAAY,MAAM,uCAAkC,QAAQ,IAAI;EACtE,MAAM,mBAAmB,sCAAiB,YAGxC,QAAQ,UAAU;AAEpB,eAAa,UAAU,WAAW,kBAAkB,KAAK,QAAQ;AAEjE,SAAO;CACR;CAED,OAAO,UAILC,WACAR,kBACAC,KACAM,SACM;AAEN,MAAI,IAAI,KAAK,yBAAQ,CAAC;AAItB,MAAI,aAAa,MACf,KAAI,IAAI,KAAK,yBAAY,CAAC;EAI5B,MAAM,WACJ,SAAS,aAAa,QAAQ,SAAS,YAAY,UAAU;AAC/D,MAAI,SACF,cAAa,aACX,WACA,KACA,UACA,SAAS,eACV;EAIH,MAAM,kBAAkB,UAAU,KAAK,CAAC,GAAG,MAAM;GAC/C,MAAM,YAAY,EAAE,MAAM,MAAM,IAAI;GACpC,MAAM,YAAY,EAAE,MAAM,MAAM,IAAI;AAGpC,QAAK,IAAI,IAAI,GAAG,IAAI,KAAK,IAAI,UAAU,QAAQ,UAAU,OAAO,EAAE,KAAK;IACrE,MAAM,WAAW,UAAU,MAAM;IACjC,MAAM,WAAW,UAAU,MAAM;IAGjC,MAAM,aAAa,SAAS,WAAW,IAAI;IAC3C,MAAM,aAAa,SAAS,WAAW,IAAI;AAE3C,SAAK,cAAc,WAAY,QAAO;AACtC,QAAI,eAAe,WAAY,QAAO;AAGtC,QAAI,aAAa,SACf,QAAO,SAAS,cAAc,SAAS;GAE1C;AAED,UAAO;EACR,EAAC;AACF,eAAa,qBAAqB,KAAK,iBAAiB;AACxD,OAAK,MAAM,YAAY,gBACrB,cAAa,SAAS,UAAU,kBAAkB,IAAI;CAEzD;CAED,OAAO,SAmBLX,UAgBAI,kBACAC,KACM;EACN,MAAM,EAAE,OAAO,GAAG;EAClB,MAAM,SAAS,SAAS,OAAO,aAAa;AAE5C,MAAI,QACF,OACA,8BAAU,QAAQ,CAAC,OAAO,MACxB,aAAa,SAAS,GAAG,OAAO,SAAS,OAAO,KAAK,CACtD,EACD,8BAAU,SAAS,CAAC,GAAG,MAAM;GAC3B,MAAM,cAAc,sCAAe,EAAE;AACrC,UAAO,aAAa,SAAS,GAAG,aAAa,SAAS,OAAO,MAAM;EACpE,EAAC,EACF,8BAAU,SAAS,CAAC,QAAQ,MAC1B,aAAa,SAAS,GAAG,QAAQ,SAAS,OAAO,OAAO,CACzD,EACD,OAAO,MAAM;GACX,MAAM,SAAS,SAAS,OAAO,MAAM;IACnC,UAAU,SAAS;IACnB,OAAO,SAAS;IAChB,MAAM,EAAE,OAAO,OAAO;IACtB,QAAQ,SAAS;IACjB,MAAM,EAAE,IAAI;GACb,EAAC;AAEF,OAAI;IACF,MAAM,eAAe,EAAE,IAAI,QAAQ;IAEnC,MAAM,SAAS,0BAAS,cAAc,aAAa;IACnD,MAAM,SAAS,0BAAS,cAAc,aAAa,OAAO;IAE1D,MAAM,WAAW,MAAM,iBAAiB,SAAS,SAAS,SAAS;IAEnE,MAAM,UAAU,MAAM,SAAS,WAAW;KACxC;KACA;KACA;KACA;IACD,EAAC;IAEF,MAAM,eAAe,MAAM,SAAS,UAAU;KAC5C;KACA;KACA;KACA;KACA;IACD,EAAC;AAEF,SAAK,cAAc;AACjB,YAAO,KAAK,8BAA8B;AAC1C,YAAO,EAAE,KAAK,EAAE,OAAO,eAAgB,GAAE,IAAI;IAC9C;AAGD,QAAI,SAAS,WAAW;KACtB,MAAM,gBAAgB,MAAM,2CAAe,SAAS,WAAW;MAC7D;MACA;MACA;MACA;MACA,MAAM,EAAE,IAAI;MACZ,QAAQ,SAAS;KAClB,EAAC;KAGF,MAAM,mBAAmB,gDACvB,eACA,SAAS,UACV;AACD,UAAK,MAAM,CAAC,KAAK,MAAM,IAAI,OAAO,QAAQ,iBAAiB,CACzD,KAAI,MACF,GAAE,OAAO,KAAK,MAAM;IAGzB;IAGD,MAAM,eAAe,MAAM,yCACzB,UACA,kBACA,QACA;KACE;KACA;KACA;KACU;IACX,EACF;IAGD,MAAM,SAAS,SAAS;AAIxB,SAAK,gBAAgB,QAAQ,OAC3B,QAAO,KAAK,uCAAuC;IAIrD,MAAM,QAAQ,SAAS,kBACnB,MAAM,iBACH,SAAS,CAAC,SAAS,eAAgB,EAAC,CACpC,KACC,CAAC,MACC,EAAE,SAAS,gBAAiB,aAC/B;IAIP,MAAM,SAAS,MAAM,kDACnB,cACA,OAAO,YAAY;KAEjB,MAAM,eACJ,cAAc,SAAS,uBACvB,aAAa,QAAQ,wBACnB,SAAS,iBAAiB;KAC9B,MAAM,KAAK,eACN,SAAS,kBAAkB,IAAI,QAChC;KAEJ,MAAM,kBAAkB,IAAIQ;KAC5B,MAAM,WAAW,MAAM,SAAS,QAC9B;MACE;MACA;MACA,MAAM,EAAE,IAAI,MAAM,OAAO;MACzB,OAAO,EAAE,IAAI,MAAM,QAAQ;MAC3B,QAAQ,EAAE,IAAI,MAAM,QAAQ;MAC5B;MACA;MACA;MACA;MACA;KACD,GASD,gBACD;KAGD,IAAI,OAAO;KACX,IAAIC,aAAW,gBAAgB,aAAa;AAE5C,SAAI,0BAAS,YAAY,SAAS,EAAE;AAClC,aAAO,SAAS;AAChB,mBAAW,SAAS;KACrB;KAED,MAAMC,WAAS,SAAS,eACpB,MAAM,SAAS,YAAY,KAAK;AAGpC,YAAO;MAAE;MAAQ;MAAU;KAAiB;IAC7C,GAED,OAAOC,UAAQ,YAAY;AACzB,UAAK,QAAQ,OAAQ;AAErB,UAAK,MAAM,SAAS,QAAQ;AAC1B,UAAI,MAAM,SAAS,MAAM,KAAKA,SAAO,OAAc,CACjD;MAEF,MAAM,UAAU,MAAM,QAAQA,SAAO,OAAc;MACnD,MAAM,WAAW,MAAM,WAAWA,SAAO,OAAc;AACvD,cAAQ,MAAM,MAAM,MAAa,SAAgB;OAC/C,OAAO,MAAM;OACb;MACD,EAAC;KACH;IACF,EACF;IAED,MAAM,EAAE,QAAQ,UAAU,GAAG;AAE7B,QAAI;KACF,IAAI,SAAS,SAAS;AAGtB,SAAI,SAAS,OACX,UAAS,SAAS;AAGpB,SAAI,SAAS,QACX,MAAK,MAAM,CAAC,KAAK,MAAM,IAAI,OAAO,QAAQ,SAAS,QAAQ,CACzD,GAAE,OAAO,KAAK,MAAM;AAIxB,SAAI,SAAS,QACX,MAAK,MAAM,CAAC,MAAM,EAAE,OAAO,SAAS,CAAC,IAAI,SAAS,QAChD,4BAAU,GAAG,MAAM,OAAO,QAAQ;AAKtC,OAAE,IAAI,cAAc,OAAO;AAE3B,OAAE,IAAI,cAAc,SAAS;AAE7B,OAAE,IAAI,YAAY,OAAO;AAEzB,OAAE,IAAI,aAAa,QAAQ;AAE3B,OAAE,IAAI,cAAc,SAAS;AAE7B,SAAI,aAAa,MACf,QAAO,KAAK;MAAE;MAAQ,MAAM;KAAQ,GAAE,oBAAoB;AAG5D,YAAO,EAAE,KAAK,UAAU,CAAE,GAAE,OAAO;IACpC,SAAQC,iBAAsB;AAC7B,YAAO,MAAM,iBAAiB,2BAA2B;KACzD,MAAM,QAAQ,kCACZ,iBACA,KACA,6BACD;AACD,SAAI,aAAa,MACf,QAAO,KACL;MAAE,QAAQ,MAAM;MAAY,MAAM;KAAO,GACzC,oBACD;AAEH,YAAO,EAAE,KAAK,OAAO,MAAM,WAAmC;IAC/D;GACF,SAAQC,GAAQ;AACf,WAAO,MAAM,GAAG,oCAAoC;IACpD,MAAM,QAAQ,kCAAU,GAAG,KAAK,wBAAwB;AACxD,QAAI,aAAa,MACf,QAAO,KACL;KAAE,QAAQ,MAAM;KAAY,MAAM;IAAO,GACzC,oBACD;AAEH,WAAO,EAAE,KAAK,OAAO,MAAM,WAAmC;GAC/D;EACF,EACF;CACF;CAED,OAAO,aAILN,WACAP,KACAc,UACAC,gBACM;AACN,MAAI,IAAI,UAAU,OAAO,MAAM;AAC7B,OAAI;IACF,MAAM,gBAAgB,MAAM,0BAAS,mBACnC,WACA,eACD;AAED,WAAO,EAAE,KAAK,cAAc;GAC7B,SAAQ,OAAO;AACd,YAAQ,MAAM,oCAAoC,MAAM;AACxD,WAAO,EAAE,KACP,EAAE,OAAO,2CAA4C,GACrD,IACD;GACF;EACF,EAAC;CACH;AACF"}
1
+ {"version":3,"file":"HonoEndpointAdaptor-CdWWj3EJ.cjs","names":["endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >","c: Context<any, string, {}>","data: unknown","schema?: T","serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>","app: Hono","serviceDiscovery: ServiceDiscovery<any, any>","routes: string[]","envParser: EnvironmentParser<{}>","Hono","logger: TLogger","options?: HonoEndpointOptions","endpoints: Endpoint<string, HttpMethod, any, any, TServices, TLogger>[]","ResponseBuilder","metadata","output","result","validationError: any","e: any","docsPath: string","openApiOptions?: HonoEndpointOptions['openApiOptions']"],"sources":["../src/endpoints/HonoEndpointAdaptor.ts"],"sourcesContent":["import type { AuditStorage, AuditableAction } from '@geekmidas/audit';\nimport type { EnvironmentParser } from '@geekmidas/envkit';\nimport type { EventPublisher } from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport { checkRateLimit, getRateLimitHeaders } from '@geekmidas/rate-limit';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { type Context, Hono } from 'hono';\nimport { setCookie } from 'hono/cookie';\nimport { logger as honoLogger } from 'hono/logger';\nimport { timing } from 'hono/timing';\nimport { validator } from 'hono/validator';\nimport type { HttpMethod, LowerHttpMethod } from '../types';\nimport {\n Endpoint,\n type EndpointContext,\n type EndpointSchemas,\n ResponseBuilder,\n} from './Endpoint';\nimport { getEndpointsFromRoutes } from './helpers';\nimport { parseHonoQuery } from './parseHonoQuery';\n\nimport { wrapError } from '@geekmidas/errors';\nimport {\n type Service,\n ServiceDiscovery,\n type ServiceRecord,\n} from '@geekmidas/services';\nimport type { ContentfulStatusCode } from 'hono/utils/http-status';\nimport { publishConstructEvents } from '../publisher';\nimport type { MappedAudit } from './audit';\nimport {\n createAuditContext,\n executeWithAuditTransaction,\n} from './processAudits';\n\nexport interface HonoEndpointOptions {\n /**\n * Path where OpenAPI documentation will be served.\n * Set to false to disable docs route.\n * @default '/docs'\n */\n docsPath?: string | false;\n /**\n * OpenAPI schema options\n */\n openApiOptions?: {\n title?: string;\n version?: string;\n description?: string;\n };\n}\n\nexport class HonoEndpoint<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n> {\n constructor(\n private readonly endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n ) {}\n\n static isDev = process.env.NODE_ENV === 'development';\n\n static async validate<T extends StandardSchemaV1>(\n c: Context<any, string, {}>,\n data: unknown,\n schema?: T,\n ) {\n if (!schema) {\n return undefined;\n }\n\n const parsed = await Endpoint.validate(schema, data);\n\n if (parsed.issues) {\n return c.json(parsed.issues, 422);\n }\n\n return parsed.value;\n }\n addRoute(\n serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>,\n app: Hono,\n ): void {\n HonoEndpoint.addRoute(this.endpoint, serviceDiscovery, app);\n }\n\n static applyEventMiddleware(\n app: Hono,\n serviceDiscovery: ServiceDiscovery<any, any>,\n ) {\n app.use(async (c, next) => {\n await next();\n // @ts-ignore\n const endpoint = c.get('__endpoint') as Endpoint<\n any,\n any,\n any,\n any,\n any,\n any,\n any,\n any\n >;\n // @ts-ignore\n const response = c.get('__response');\n // @ts-ignore\n const logger = c.get('__logger') as Logger;\n\n if (Endpoint.isSuccessStatus(c.res.status) && endpoint) {\n // Process events (audits are handled in the handler with transaction support)\n await publishConstructEvents<any, any>(\n endpoint,\n response,\n serviceDiscovery,\n logger,\n );\n }\n });\n }\n\n static async fromRoutes<TLogger extends Logger, TServices extends Service[]>(\n routes: string[],\n envParser: EnvironmentParser<{}>,\n app = new Hono(),\n logger: TLogger,\n cwd = process.cwd(),\n options?: HonoEndpointOptions,\n ): Promise<Hono> {\n const endpoints = await getEndpointsFromRoutes<TServices>(routes, cwd);\n const serviceDiscovery = ServiceDiscovery.getInstance<\n ServiceRecord<TServices>,\n TLogger\n >(logger, envParser);\n\n HonoEndpoint.addRoutes(endpoints, serviceDiscovery, app, options);\n\n return app;\n }\n\n static addRoutes<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n >(\n endpoints: Endpoint<string, HttpMethod, any, any, TServices, TLogger>[],\n serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>,\n app: Hono,\n options?: HonoEndpointOptions,\n ): void {\n // Add timing middleware (always enabled)\n app.use('*', timing());\n\n // Add logger middleware in development mode\n\n if (HonoEndpoint.isDev) {\n app.use('*', honoLogger());\n }\n\n // Add docs route if not disabled\n const docsPath =\n options?.docsPath !== false ? options?.docsPath || '/docs' : null;\n if (docsPath) {\n HonoEndpoint.addDocsRoute(\n endpoints,\n app,\n docsPath,\n options?.openApiOptions,\n );\n }\n\n // Sort endpoints to ensure static routes come before dynamic ones\n const sortedEndpoints = endpoints.sort((a, b) => {\n const aSegments = a.route.split('/');\n const bSegments = b.route.split('/');\n\n // Compare each segment\n for (let i = 0; i < Math.max(aSegments.length, bSegments.length); i++) {\n const aSegment = aSegments[i] || '';\n const bSegment = bSegments[i] || '';\n\n // If one is dynamic and the other is not, static comes first\n const aIsDynamic = aSegment.startsWith(':');\n const bIsDynamic = bSegment.startsWith(':');\n\n if (!aIsDynamic && bIsDynamic) return -1;\n if (aIsDynamic && !bIsDynamic) return 1;\n\n // If both are the same type, compare alphabetically\n if (aSegment !== bSegment) {\n return aSegment.localeCompare(bSegment);\n }\n }\n\n return 0;\n });\n HonoEndpoint.applyEventMiddleware(app, serviceDiscovery);\n for (const endpoint of sortedEndpoints) {\n HonoEndpoint.addRoute(endpoint, serviceDiscovery, app);\n }\n }\n\n static addRoute<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n >(\n endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n serviceDiscovery: ServiceDiscovery<ServiceRecord<TServices>, TLogger>,\n app: Hono,\n ): void {\n const { route } = endpoint;\n const method = endpoint.method.toLowerCase() as LowerHttpMethod<TMethod>;\n\n app[method](\n route,\n validator('json', (value, c) =>\n HonoEndpoint.validate(c, value, endpoint.input?.body),\n ),\n validator('query', (_, c) => {\n const parsedQuery = parseHonoQuery(c);\n return HonoEndpoint.validate(c, parsedQuery, endpoint.input?.query);\n }),\n validator('param', (params, c) =>\n HonoEndpoint.validate(c, params, endpoint.input?.params),\n ),\n async (c) => {\n const logger = endpoint.logger.child({\n endpoint: endpoint.fullPath,\n route: endpoint.route,\n host: c.header('host'),\n method: endpoint.method,\n path: c.req.path,\n }) as TLogger;\n\n try {\n const headerValues = c.req.header();\n\n const header = Endpoint.createHeaders(headerValues);\n const cookie = Endpoint.createCookies(headerValues.cookie);\n\n const services = await serviceDiscovery.register(endpoint.services);\n\n const session = await endpoint.getSession({\n services,\n logger,\n header,\n cookie,\n });\n\n const isAuthorized = await endpoint.authorize({\n header,\n cookie,\n services,\n logger,\n session,\n });\n\n if (!isAuthorized) {\n logger.warn('Unauthorized access attempt');\n return c.json({ error: 'Unauthorized' }, 401);\n }\n\n // Check rate limit if configured\n if (endpoint.rateLimit) {\n const rateLimitInfo = await checkRateLimit(endpoint.rateLimit, {\n header,\n services,\n logger,\n session,\n path: c.req.path,\n method: endpoint.method,\n });\n\n // Set rate limit headers\n const rateLimitHeaders = getRateLimitHeaders(\n rateLimitInfo,\n endpoint.rateLimit,\n );\n for (const [key, value] of Object.entries(rateLimitHeaders)) {\n if (value) {\n c.header(key, value);\n }\n }\n }\n\n // Create audit context if audit storage is configured\n const auditContext = await createAuditContext(\n endpoint,\n serviceDiscovery,\n logger,\n {\n session,\n header,\n cookie,\n services: services as Record<string, unknown>,\n },\n );\n\n // Warn if declarative audits are configured but no audit storage\n const audits = endpoint.audits as MappedAudit<\n TAuditAction,\n TOutSchema\n >[];\n if (!auditContext && audits?.length) {\n logger.warn('No auditor storage service available');\n }\n\n // Resolve database service if configured\n const rawDb = endpoint.databaseService\n ? await serviceDiscovery\n .register([endpoint.databaseService])\n .then(\n (s) =>\n s[endpoint.databaseService!.serviceName as keyof typeof s],\n )\n : undefined;\n\n // Execute handler with automatic audit transaction support\n const result = await executeWithAuditTransaction(\n auditContext,\n async (auditor) => {\n // Use audit transaction as db only if the storage uses the same database service\n const sameDatabase =\n auditContext?.storage?.databaseServiceName &&\n auditContext.storage.databaseServiceName ===\n endpoint.databaseService?.serviceName;\n const db = sameDatabase\n ? (auditor?.getTransaction?.() ?? rawDb)\n : rawDb;\n\n const responseBuilder = new ResponseBuilder();\n const response = await endpoint.handler(\n {\n services,\n logger,\n body: c.req.valid('json'),\n query: c.req.valid('query'),\n params: c.req.valid('param'),\n session,\n header,\n cookie,\n auditor,\n db,\n } as unknown as EndpointContext<\n TInput,\n TServices,\n TLogger,\n TSession,\n TAuditAction,\n TDatabase,\n TAuditStorage\n >,\n responseBuilder,\n );\n\n // Check if response has metadata\n let data = response;\n let metadata = responseBuilder.getMetadata();\n\n if (Endpoint.hasMetadata(response)) {\n data = response.data;\n metadata = response.metadata;\n }\n\n const output = endpoint.outputSchema\n ? await endpoint.parseOutput(data)\n : undefined;\n\n return { output, metadata, responseBuilder };\n },\n // Process declarative audits after handler (inside transaction)\n async (result, auditor) => {\n if (!audits?.length) return;\n\n for (const audit of audits) {\n if (audit.when && !audit.when(result.output as any)) {\n continue;\n }\n const payload = audit.payload(result.output as any);\n const entityId = audit.entityId?.(result.output as any);\n auditor.audit(audit.type as any, payload as any, {\n table: audit.table,\n entityId,\n });\n }\n },\n );\n\n const { output, metadata } = result;\n\n try {\n let status = endpoint.status as ContentfulStatusCode;\n\n // Apply response metadata\n if (metadata.status) {\n status = metadata.status as ContentfulStatusCode;\n }\n\n if (metadata.headers) {\n for (const [key, value] of Object.entries(metadata.headers)) {\n c.header(key, value);\n }\n }\n\n if (metadata.cookies) {\n for (const [name, { value, options }] of metadata.cookies) {\n setCookie(c, name, value, options);\n }\n }\n\n // @ts-ignore\n c.set('__response', output);\n // @ts-ignore\n c.set('__endpoint', endpoint);\n // @ts-ignore\n c.set('__logger', logger);\n // @ts-ignore\n c.set('__session', session);\n // @ts-ignore\n c.set('__services', services);\n\n if (HonoEndpoint.isDev) {\n logger.info({ status, body: output }, 'Outgoing response');\n }\n // @ts-ignore\n return c.json(output, status);\n } catch (validationError: any) {\n logger.error(validationError, 'Output validation failed');\n const error = wrapError(\n validationError,\n 422,\n 'Response validation failed',\n );\n if (HonoEndpoint.isDev) {\n logger.info(\n { status: error.statusCode, body: error },\n 'Outgoing response',\n );\n }\n return c.json(error, error.statusCode as ContentfulStatusCode);\n }\n } catch (e: any) {\n logger.error(e, 'Error processing endpoint request');\n const error = wrapError(e, 500, 'Internal Server Error');\n if (HonoEndpoint.isDev) {\n logger.info(\n { status: error.statusCode, body: error },\n 'Outgoing response',\n );\n }\n return c.json(error, error.statusCode as ContentfulStatusCode);\n }\n },\n );\n }\n\n static addDocsRoute<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n >(\n endpoints: Endpoint<string, HttpMethod, any, any, TServices, TLogger>[],\n app: Hono,\n docsPath: string,\n openApiOptions?: HonoEndpointOptions['openApiOptions'],\n ): void {\n app.get(docsPath, async (c) => {\n try {\n const openApiSchema = await Endpoint.buildOpenApiSchema(\n endpoints,\n openApiOptions,\n );\n\n return c.json(openApiSchema);\n } catch (error) {\n console.error('Error generating OpenAPI schema:', error);\n return c.json(\n { error: 'Failed to generate OpenAPI documentation' },\n 500,\n );\n }\n });\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;AAoDA,IAAa,eAAb,MAAa,aAkBX;CACA,YACmBA,UAgBjB;EAhBiB;CAgBf;CAEJ,OAAO,QAAQ,QAAQ,IAAI,aAAa;CAExC,aAAa,SACXC,GACAC,MACAC,QACA;AACA,OAAK,OACH;EAGF,MAAM,SAAS,MAAM,0BAAS,SAAS,QAAQ,KAAK;AAEpD,MAAI,OAAO,OACT,QAAO,EAAE,KAAK,OAAO,QAAQ,IAAI;AAGnC,SAAO,OAAO;CACf;CACD,SACEC,kBACAC,KACM;AACN,eAAa,SAAS,KAAK,UAAU,kBAAkB,IAAI;CAC5D;CAED,OAAO,qBACLA,KACAC,kBACA;AACA,MAAI,IAAI,OAAO,GAAG,SAAS;AACzB,SAAM,MAAM;GAEZ,MAAM,WAAW,EAAE,IAAI,aAAa;GAWpC,MAAM,WAAW,EAAE,IAAI,aAAa;GAEpC,MAAM,SAAS,EAAE,IAAI,WAAW;AAEhC,OAAI,0BAAS,gBAAgB,EAAE,IAAI,OAAO,IAAI,SAE5C,OAAM,yCACJ,UACA,UACA,kBACA,OACD;EAEJ,EAAC;CACH;CAED,aAAa,WACXC,QACAC,WACA,MAAM,IAAIC,aACVC,QACA,MAAM,QAAQ,KAAK,EACnBC,SACe;EACf,MAAM,YAAY,MAAM,uCAAkC,QAAQ,IAAI;EACtE,MAAM,mBAAmB,sCAAiB,YAGxC,QAAQ,UAAU;AAEpB,eAAa,UAAU,WAAW,kBAAkB,KAAK,QAAQ;AAEjE,SAAO;CACR;CAED,OAAO,UAILC,WACAR,kBACAC,KACAM,SACM;AAEN,MAAI,IAAI,KAAK,yBAAQ,CAAC;AAItB,MAAI,aAAa,MACf,KAAI,IAAI,KAAK,yBAAY,CAAC;EAI5B,MAAM,WACJ,SAAS,aAAa,QAAQ,SAAS,YAAY,UAAU;AAC/D,MAAI,SACF,cAAa,aACX,WACA,KACA,UACA,SAAS,eACV;EAIH,MAAM,kBAAkB,UAAU,KAAK,CAAC,GAAG,MAAM;GAC/C,MAAM,YAAY,EAAE,MAAM,MAAM,IAAI;GACpC,MAAM,YAAY,EAAE,MAAM,MAAM,IAAI;AAGpC,QAAK,IAAI,IAAI,GAAG,IAAI,KAAK,IAAI,UAAU,QAAQ,UAAU,OAAO,EAAE,KAAK;IACrE,MAAM,WAAW,UAAU,MAAM;IACjC,MAAM,WAAW,UAAU,MAAM;IAGjC,MAAM,aAAa,SAAS,WAAW,IAAI;IAC3C,MAAM,aAAa,SAAS,WAAW,IAAI;AAE3C,SAAK,cAAc,WAAY,QAAO;AACtC,QAAI,eAAe,WAAY,QAAO;AAGtC,QAAI,aAAa,SACf,QAAO,SAAS,cAAc,SAAS;GAE1C;AAED,UAAO;EACR,EAAC;AACF,eAAa,qBAAqB,KAAK,iBAAiB;AACxD,OAAK,MAAM,YAAY,gBACrB,cAAa,SAAS,UAAU,kBAAkB,IAAI;CAEzD;CAED,OAAO,SAmBLX,UAgBAI,kBACAC,KACM;EACN,MAAM,EAAE,OAAO,GAAG;EAClB,MAAM,SAAS,SAAS,OAAO,aAAa;AAE5C,MAAI,QACF,OACA,8BAAU,QAAQ,CAAC,OAAO,MACxB,aAAa,SAAS,GAAG,OAAO,SAAS,OAAO,KAAK,CACtD,EACD,8BAAU,SAAS,CAAC,GAAG,MAAM;GAC3B,MAAM,cAAc,sCAAe,EAAE;AACrC,UAAO,aAAa,SAAS,GAAG,aAAa,SAAS,OAAO,MAAM;EACpE,EAAC,EACF,8BAAU,SAAS,CAAC,QAAQ,MAC1B,aAAa,SAAS,GAAG,QAAQ,SAAS,OAAO,OAAO,CACzD,EACD,OAAO,MAAM;GACX,MAAM,SAAS,SAAS,OAAO,MAAM;IACnC,UAAU,SAAS;IACnB,OAAO,SAAS;IAChB,MAAM,EAAE,OAAO,OAAO;IACtB,QAAQ,SAAS;IACjB,MAAM,EAAE,IAAI;GACb,EAAC;AAEF,OAAI;IACF,MAAM,eAAe,EAAE,IAAI,QAAQ;IAEnC,MAAM,SAAS,0BAAS,cAAc,aAAa;IACnD,MAAM,SAAS,0BAAS,cAAc,aAAa,OAAO;IAE1D,MAAM,WAAW,MAAM,iBAAiB,SAAS,SAAS,SAAS;IAEnE,MAAM,UAAU,MAAM,SAAS,WAAW;KACxC;KACA;KACA;KACA;IACD,EAAC;IAEF,MAAM,eAAe,MAAM,SAAS,UAAU;KAC5C;KACA;KACA;KACA;KACA;IACD,EAAC;AAEF,SAAK,cAAc;AACjB,YAAO,KAAK,8BAA8B;AAC1C,YAAO,EAAE,KAAK,EAAE,OAAO,eAAgB,GAAE,IAAI;IAC9C;AAGD,QAAI,SAAS,WAAW;KACtB,MAAM,gBAAgB,MAAM,2CAAe,SAAS,WAAW;MAC7D;MACA;MACA;MACA;MACA,MAAM,EAAE,IAAI;MACZ,QAAQ,SAAS;KAClB,EAAC;KAGF,MAAM,mBAAmB,gDACvB,eACA,SAAS,UACV;AACD,UAAK,MAAM,CAAC,KAAK,MAAM,IAAI,OAAO,QAAQ,iBAAiB,CACzD,KAAI,MACF,GAAE,OAAO,KAAK,MAAM;IAGzB;IAGD,MAAM,eAAe,MAAM,yCACzB,UACA,kBACA,QACA;KACE;KACA;KACA;KACU;IACX,EACF;IAGD,MAAM,SAAS,SAAS;AAIxB,SAAK,gBAAgB,QAAQ,OAC3B,QAAO,KAAK,uCAAuC;IAIrD,MAAM,QAAQ,SAAS,kBACnB,MAAM,iBACH,SAAS,CAAC,SAAS,eAAgB,EAAC,CACpC,KACC,CAAC,MACC,EAAE,SAAS,gBAAiB,aAC/B;IAIP,MAAM,SAAS,MAAM,kDACnB,cACA,OAAO,YAAY;KAEjB,MAAM,eACJ,cAAc,SAAS,uBACvB,aAAa,QAAQ,wBACnB,SAAS,iBAAiB;KAC9B,MAAM,KAAK,eACN,SAAS,kBAAkB,IAAI,QAChC;KAEJ,MAAM,kBAAkB,IAAIQ;KAC5B,MAAM,WAAW,MAAM,SAAS,QAC9B;MACE;MACA;MACA,MAAM,EAAE,IAAI,MAAM,OAAO;MACzB,OAAO,EAAE,IAAI,MAAM,QAAQ;MAC3B,QAAQ,EAAE,IAAI,MAAM,QAAQ;MAC5B;MACA;MACA;MACA;MACA;KACD,GASD,gBACD;KAGD,IAAI,OAAO;KACX,IAAIC,aAAW,gBAAgB,aAAa;AAE5C,SAAI,0BAAS,YAAY,SAAS,EAAE;AAClC,aAAO,SAAS;AAChB,mBAAW,SAAS;KACrB;KAED,MAAMC,WAAS,SAAS,eACpB,MAAM,SAAS,YAAY,KAAK;AAGpC,YAAO;MAAE;MAAQ;MAAU;KAAiB;IAC7C,GAED,OAAOC,UAAQ,YAAY;AACzB,UAAK,QAAQ,OAAQ;AAErB,UAAK,MAAM,SAAS,QAAQ;AAC1B,UAAI,MAAM,SAAS,MAAM,KAAKA,SAAO,OAAc,CACjD;MAEF,MAAM,UAAU,MAAM,QAAQA,SAAO,OAAc;MACnD,MAAM,WAAW,MAAM,WAAWA,SAAO,OAAc;AACvD,cAAQ,MAAM,MAAM,MAAa,SAAgB;OAC/C,OAAO,MAAM;OACb;MACD,EAAC;KACH;IACF,EACF;IAED,MAAM,EAAE,QAAQ,UAAU,GAAG;AAE7B,QAAI;KACF,IAAI,SAAS,SAAS;AAGtB,SAAI,SAAS,OACX,UAAS,SAAS;AAGpB,SAAI,SAAS,QACX,MAAK,MAAM,CAAC,KAAK,MAAM,IAAI,OAAO,QAAQ,SAAS,QAAQ,CACzD,GAAE,OAAO,KAAK,MAAM;AAIxB,SAAI,SAAS,QACX,MAAK,MAAM,CAAC,MAAM,EAAE,OAAO,SAAS,CAAC,IAAI,SAAS,QAChD,4BAAU,GAAG,MAAM,OAAO,QAAQ;AAKtC,OAAE,IAAI,cAAc,OAAO;AAE3B,OAAE,IAAI,cAAc,SAAS;AAE7B,OAAE,IAAI,YAAY,OAAO;AAEzB,OAAE,IAAI,aAAa,QAAQ;AAE3B,OAAE,IAAI,cAAc,SAAS;AAE7B,SAAI,aAAa,MACf,QAAO,KAAK;MAAE;MAAQ,MAAM;KAAQ,GAAE,oBAAoB;AAG5D,YAAO,EAAE,KAAK,QAAQ,OAAO;IAC9B,SAAQC,iBAAsB;AAC7B,YAAO,MAAM,iBAAiB,2BAA2B;KACzD,MAAM,QAAQ,kCACZ,iBACA,KACA,6BACD;AACD,SAAI,aAAa,MACf,QAAO,KACL;MAAE,QAAQ,MAAM;MAAY,MAAM;KAAO,GACzC,oBACD;AAEH,YAAO,EAAE,KAAK,OAAO,MAAM,WAAmC;IAC/D;GACF,SAAQC,GAAQ;AACf,WAAO,MAAM,GAAG,oCAAoC;IACpD,MAAM,QAAQ,kCAAU,GAAG,KAAK,wBAAwB;AACxD,QAAI,aAAa,MACf,QAAO,KACL;KAAE,QAAQ,MAAM;KAAY,MAAM;IAAO,GACzC,oBACD;AAEH,WAAO,EAAE,KAAK,OAAO,MAAM,WAAmC;GAC/D;EACF,EACF;CACF;CAED,OAAO,aAILN,WACAP,KACAc,UACAC,gBACM;AACN,MAAI,IAAI,UAAU,OAAO,MAAM;AAC7B,OAAI;IACF,MAAM,gBAAgB,MAAM,0BAAS,mBACnC,WACA,eACD;AAED,WAAO,EAAE,KAAK,cAAc;GAC7B,SAAQ,OAAO;AACd,YAAQ,MAAM,oCAAoC,MAAM;AACxD,WAAO,EAAE,KACP,EAAE,OAAO,2CAA4C,GACrD,IACD;GACF;EACF,EAAC;CACH;AACF"}
@@ -31,4 +31,4 @@ Object.defineProperty(exports, 'Subscriber', {
31
31
  return Subscriber;
32
32
  }
33
33
  });
34
- //# sourceMappingURL=Subscriber-D-FPWts6.cjs.map
34
+ //# sourceMappingURL=Subscriber-Bdh8rMSL.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"Subscriber-D-FPWts6.cjs","names":["ConsoleLogger","Construct","obj: any","ConstructType","handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >","timeout: number","_subscribedEvents?: TSubscribedEvents","outputSchema?: OutSchema","services: TServices","logger: TLogger","publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >"],"sources":["../src/subscribers/Subscriber.ts"],"sourcesContent":["import type { Logger } from '@geekmidas/logger';\nimport { ConsoleLogger } from '@geekmidas/logger/console';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\n\nimport { Construct, ConstructType } from '../Construct';\n\nimport type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { InferStandardSchema } from '@geekmidas/schema';\nimport type { Service, ServiceRecord } from '@geekmidas/services';\n\nconst DEFAULT_LOGGER = new ConsoleLogger() as any;\n\n// Helper type to extract payload types for subscribed events\ntype ExtractEventPayloads<\n TPublisher extends EventPublisher<any> | undefined,\n TEventTypes extends any[],\n> = TPublisher extends EventPublisher<any>\n ? Extract<ExtractPublisherMessage<TPublisher>, { type: TEventTypes[number] }>\n : never;\n\nexport class Subscriber<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends\n ExtractPublisherMessage<TEventPublisher>['type'][] = ExtractPublisherMessage<TEventPublisher>['type'][],\n> extends Construct<\n TLogger,\n TEventPublisherServiceName,\n TEventPublisher,\n OutSchema,\n TServices\n> {\n __IS_SUBSCRIBER__ = true;\n\n static isSubscriber(\n obj: any,\n ): obj is Subscriber<any, any, any, any, any, any> {\n return Boolean(\n obj &&\n obj.__IS_SUBSCRIBER__ === true &&\n obj.type === ConstructType.Subscriber,\n );\n }\n\n constructor(\n public readonly handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n public readonly timeout: number = 30000,\n protected _subscribedEvents?: TSubscribedEvents,\n public readonly outputSchema?: OutSchema,\n public readonly services: TServices = [] as unknown as TServices,\n public readonly logger: TLogger = DEFAULT_LOGGER as TLogger,\n public readonly publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >,\n ) {\n super(\n ConstructType.Subscriber,\n logger,\n services,\n [],\n publisherService,\n outputSchema,\n );\n }\n\n get subscribedEvents(): TSubscribedEvents | undefined {\n return this._subscribedEvents;\n }\n}\n\n// Handler type for subscribers that receives an array of events\nexport type SubscriberHandler<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n> = (\n ctx: SubscriberContext<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger\n >,\n) => OutSchema extends StandardSchemaV1\n ? InferStandardSchema<OutSchema> | Promise<InferStandardSchema<OutSchema>>\n : any | Promise<any>;\n\n// Context type for subscriber handlers\nexport type SubscriberContext<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n> = {\n events: ExtractEventPayloads<TEventPublisher, TSubscribedEvents>[];\n services: ServiceRecord<TServices>;\n logger: TLogger;\n};\n"],"mappings":";;;;;AAaA,MAAM,iBAAiB,IAAIA;AAU3B,IAAa,aAAb,cAQUC,4BAMR;CACA,oBAAoB;CAEpB,OAAO,aACLC,KACiD;AACjD,SAAO,QACL,OACE,IAAI,sBAAsB,QAC1B,IAAI,SAASC,gCAAc,WAC9B;CACF;CAED,YACkBC,SAOAC,UAAkB,KACxBC,mBACMC,cACAC,WAAsB,CAAE,GACxBC,SAAkB,gBAClBC,kBAIhB;AACA,QACEP,gCAAc,YACd,QACA,UACA,CAAE,GACF,kBACA,aACD;EAxBe;EAOA;EACN;EACM;EACA;EACA;EACA;CAajB;CAED,IAAI,mBAAkD;AACpD,SAAO,KAAK;CACb;AACF"}
1
+ {"version":3,"file":"Subscriber-Bdh8rMSL.cjs","names":["ConsoleLogger","Construct","obj: any","ConstructType","handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >","timeout: number","_subscribedEvents?: TSubscribedEvents","outputSchema?: OutSchema","services: TServices","logger: TLogger","publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >"],"sources":["../src/subscribers/Subscriber.ts"],"sourcesContent":["import type { Logger } from '@geekmidas/logger';\nimport { ConsoleLogger } from '@geekmidas/logger/console';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\n\nimport { Construct, ConstructType } from '../Construct';\n\nimport type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { InferStandardSchema } from '@geekmidas/schema';\nimport type { Service, ServiceRecord } from '@geekmidas/services';\n\nconst DEFAULT_LOGGER = new ConsoleLogger() as any;\n\n// Helper type to extract payload types for subscribed events\ntype ExtractEventPayloads<\n TPublisher extends EventPublisher<any> | undefined,\n TEventTypes extends any[],\n> = TPublisher extends EventPublisher<any>\n ? Extract<ExtractPublisherMessage<TPublisher>, { type: TEventTypes[number] }>\n : never;\n\nexport class Subscriber<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends\n ExtractPublisherMessage<TEventPublisher>['type'][] = ExtractPublisherMessage<TEventPublisher>['type'][],\n> extends Construct<\n TLogger,\n TEventPublisherServiceName,\n TEventPublisher,\n OutSchema,\n TServices\n> {\n __IS_SUBSCRIBER__ = true;\n\n static isSubscriber(\n obj: any,\n ): obj is Subscriber<any, any, any, any, any, any> {\n return Boolean(\n obj &&\n obj.__IS_SUBSCRIBER__ === true &&\n obj.type === ConstructType.Subscriber,\n );\n }\n\n constructor(\n public readonly handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n public readonly timeout: number = 30000,\n protected _subscribedEvents?: TSubscribedEvents,\n public readonly outputSchema?: OutSchema,\n public readonly services: TServices = [] as unknown as TServices,\n public readonly logger: TLogger = DEFAULT_LOGGER as TLogger,\n public readonly publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >,\n ) {\n super(\n ConstructType.Subscriber,\n logger,\n services,\n [],\n publisherService,\n outputSchema,\n );\n }\n\n get subscribedEvents(): TSubscribedEvents | undefined {\n return this._subscribedEvents;\n }\n}\n\n// Handler type for subscribers that receives an array of events\nexport type SubscriberHandler<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n> = (\n ctx: SubscriberContext<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger\n >,\n) => OutSchema extends StandardSchemaV1\n ? InferStandardSchema<OutSchema> | Promise<InferStandardSchema<OutSchema>>\n : any | Promise<any>;\n\n// Context type for subscriber handlers\nexport type SubscriberContext<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n> = {\n events: ExtractEventPayloads<TEventPublisher, TSubscribedEvents>[];\n services: ServiceRecord<TServices>;\n logger: TLogger;\n};\n"],"mappings":";;;;;AAaA,MAAM,iBAAiB,IAAIA;AAU3B,IAAa,aAAb,cAQUC,4BAMR;CACA,oBAAoB;CAEpB,OAAO,aACLC,KACiD;AACjD,SAAO,QACL,OACE,IAAI,sBAAsB,QAC1B,IAAI,SAASC,gCAAc,WAC9B;CACF;CAED,YACkBC,SAOAC,UAAkB,KACxBC,mBACMC,cACAC,WAAsB,CAAE,GACxBC,SAAkB,gBAClBC,kBAIhB;AACA,QACEP,gCAAc,YACd,QACA,UACA,CAAE,GACF,kBACA,aACD;EAxBe;EAOA;EACN;EACM;EACA;EACA;EACA;CAajB;CAED,IAAI,mBAAkD;AACpD,SAAO,KAAK;CACb;AACF"}
@@ -25,4 +25,4 @@ var Subscriber = class extends Construct {
25
25
 
26
26
  //#endregion
27
27
  export { Subscriber };
28
- //# sourceMappingURL=Subscriber-CGb8LjZa.mjs.map
28
+ //# sourceMappingURL=Subscriber-CJOWwaw1.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"Subscriber-CGb8LjZa.mjs","names":["DEFAULT_LOGGER","obj: any","handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >","timeout: number","_subscribedEvents?: TSubscribedEvents","outputSchema?: OutSchema","services: TServices","logger: TLogger","publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >"],"sources":["../src/subscribers/Subscriber.ts"],"sourcesContent":["import type { Logger } from '@geekmidas/logger';\nimport { ConsoleLogger } from '@geekmidas/logger/console';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\n\nimport { Construct, ConstructType } from '../Construct';\n\nimport type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { InferStandardSchema } from '@geekmidas/schema';\nimport type { Service, ServiceRecord } from '@geekmidas/services';\n\nconst DEFAULT_LOGGER = new ConsoleLogger() as any;\n\n// Helper type to extract payload types for subscribed events\ntype ExtractEventPayloads<\n TPublisher extends EventPublisher<any> | undefined,\n TEventTypes extends any[],\n> = TPublisher extends EventPublisher<any>\n ? Extract<ExtractPublisherMessage<TPublisher>, { type: TEventTypes[number] }>\n : never;\n\nexport class Subscriber<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends\n ExtractPublisherMessage<TEventPublisher>['type'][] = ExtractPublisherMessage<TEventPublisher>['type'][],\n> extends Construct<\n TLogger,\n TEventPublisherServiceName,\n TEventPublisher,\n OutSchema,\n TServices\n> {\n __IS_SUBSCRIBER__ = true;\n\n static isSubscriber(\n obj: any,\n ): obj is Subscriber<any, any, any, any, any, any> {\n return Boolean(\n obj &&\n obj.__IS_SUBSCRIBER__ === true &&\n obj.type === ConstructType.Subscriber,\n );\n }\n\n constructor(\n public readonly handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n public readonly timeout: number = 30000,\n protected _subscribedEvents?: TSubscribedEvents,\n public readonly outputSchema?: OutSchema,\n public readonly services: TServices = [] as unknown as TServices,\n public readonly logger: TLogger = DEFAULT_LOGGER as TLogger,\n public readonly publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >,\n ) {\n super(\n ConstructType.Subscriber,\n logger,\n services,\n [],\n publisherService,\n outputSchema,\n );\n }\n\n get subscribedEvents(): TSubscribedEvents | undefined {\n return this._subscribedEvents;\n }\n}\n\n// Handler type for subscribers that receives an array of events\nexport type SubscriberHandler<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n> = (\n ctx: SubscriberContext<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger\n >,\n) => OutSchema extends StandardSchemaV1\n ? InferStandardSchema<OutSchema> | Promise<InferStandardSchema<OutSchema>>\n : any | Promise<any>;\n\n// Context type for subscriber handlers\nexport type SubscriberContext<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n> = {\n events: ExtractEventPayloads<TEventPublisher, TSubscribedEvents>[];\n services: ServiceRecord<TServices>;\n logger: TLogger;\n};\n"],"mappings":";;;;AAaA,MAAMA,mBAAiB,IAAI;AAU3B,IAAa,aAAb,cAQU,UAMR;CACA,oBAAoB;CAEpB,OAAO,aACLC,KACiD;AACjD,SAAO,QACL,OACE,IAAI,sBAAsB,QAC1B,IAAI,SAAS,cAAc,WAC9B;CACF;CAED,YACkBC,SAOAC,UAAkB,KACxBC,mBACMC,cACAC,WAAsB,CAAE,GACxBC,SAAkBP,kBAClBQ,kBAIhB;AACA,QACE,cAAc,YACd,QACA,UACA,CAAE,GACF,kBACA,aACD;EAxBe;EAOA;EACN;EACM;EACA;EACA;EACA;CAajB;CAED,IAAI,mBAAkD;AACpD,SAAO,KAAK;CACb;AACF"}
1
+ {"version":3,"file":"Subscriber-CJOWwaw1.mjs","names":["DEFAULT_LOGGER","obj: any","handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >","timeout: number","_subscribedEvents?: TSubscribedEvents","outputSchema?: OutSchema","services: TServices","logger: TLogger","publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >"],"sources":["../src/subscribers/Subscriber.ts"],"sourcesContent":["import type { Logger } from '@geekmidas/logger';\nimport { ConsoleLogger } from '@geekmidas/logger/console';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\n\nimport { Construct, ConstructType } from '../Construct';\n\nimport type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { InferStandardSchema } from '@geekmidas/schema';\nimport type { Service, ServiceRecord } from '@geekmidas/services';\n\nconst DEFAULT_LOGGER = new ConsoleLogger() as any;\n\n// Helper type to extract payload types for subscribed events\ntype ExtractEventPayloads<\n TPublisher extends EventPublisher<any> | undefined,\n TEventTypes extends any[],\n> = TPublisher extends EventPublisher<any>\n ? Extract<ExtractPublisherMessage<TPublisher>, { type: TEventTypes[number] }>\n : never;\n\nexport class Subscriber<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends\n ExtractPublisherMessage<TEventPublisher>['type'][] = ExtractPublisherMessage<TEventPublisher>['type'][],\n> extends Construct<\n TLogger,\n TEventPublisherServiceName,\n TEventPublisher,\n OutSchema,\n TServices\n> {\n __IS_SUBSCRIBER__ = true;\n\n static isSubscriber(\n obj: any,\n ): obj is Subscriber<any, any, any, any, any, any> {\n return Boolean(\n obj &&\n obj.__IS_SUBSCRIBER__ === true &&\n obj.type === ConstructType.Subscriber,\n );\n }\n\n constructor(\n public readonly handler: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n public readonly timeout: number = 30000,\n protected _subscribedEvents?: TSubscribedEvents,\n public readonly outputSchema?: OutSchema,\n public readonly services: TServices = [] as unknown as TServices,\n public readonly logger: TLogger = DEFAULT_LOGGER as TLogger,\n public readonly publisherService?: Service<\n TEventPublisherServiceName,\n TEventPublisher\n >,\n ) {\n super(\n ConstructType.Subscriber,\n logger,\n services,\n [],\n publisherService,\n outputSchema,\n );\n }\n\n get subscribedEvents(): TSubscribedEvents | undefined {\n return this._subscribedEvents;\n }\n}\n\n// Handler type for subscribers that receives an array of events\nexport type SubscriberHandler<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n> = (\n ctx: SubscriberContext<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger\n >,\n) => OutSchema extends StandardSchemaV1\n ? InferStandardSchema<OutSchema> | Promise<InferStandardSchema<OutSchema>>\n : any | Promise<any>;\n\n// Context type for subscriber handlers\nexport type SubscriberContext<\n TEventPublisher extends EventPublisher<any> | undefined,\n TSubscribedEvents extends ExtractPublisherMessage<TEventPublisher>['type'][],\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n> = {\n events: ExtractEventPayloads<TEventPublisher, TSubscribedEvents>[];\n services: ServiceRecord<TServices>;\n logger: TLogger;\n};\n"],"mappings":";;;;AAaA,MAAMA,mBAAiB,IAAI;AAU3B,IAAa,aAAb,cAQU,UAMR;CACA,oBAAoB;CAEpB,OAAO,aACLC,KACiD;AACjD,SAAO,QACL,OACE,IAAI,sBAAsB,QAC1B,IAAI,SAAS,cAAc,WAC9B;CACF;CAED,YACkBC,SAOAC,UAAkB,KACxBC,mBACMC,cACAC,WAAsB,CAAE,GACxBC,SAAkBP,kBAClBQ,kBAIhB;AACA,QACE,cAAc,YACd,QACA,UACA,CAAE,GACF,kBACA,aACD;EAxBe;EAOA;EACN;EACM;EACA;EACA;EACA;CAajB;CAED,IAAI,mBAAkD;AACpD,SAAO,KAAK;CACb;AACF"}
@@ -1,4 +1,4 @@
1
- import { Subscriber } from "./Subscriber-CGb8LjZa.mjs";
1
+ import { Subscriber } from "./Subscriber-CJOWwaw1.mjs";
2
2
  import { DEFAULT_LOGGER } from "@geekmidas/logger/console";
3
3
 
4
4
  //#region src/subscribers/SubscriberBuilder.ts
@@ -51,4 +51,4 @@ var SubscriberBuilder = class {
51
51
 
52
52
  //#endregion
53
53
  export { SubscriberBuilder };
54
- //# sourceMappingURL=SubscriberBuilder-BcAspHv9.mjs.map
54
+ //# sourceMappingURL=SubscriberBuilder-BWQmiYd8.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"SubscriberBuilder-BcAspHv9.mjs","names":["timeout: number","schema: T","services: T","logger: T","publisher: Service<TName, T>","event: TEvent","fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >"],"sources":["../src/subscribers/SubscriberBuilder.ts"],"sourcesContent":["import type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport { DEFAULT_LOGGER } from '@geekmidas/logger/console';\nimport type { Service } from '@geekmidas/services';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { Subscriber, type SubscriberHandler } from './Subscriber';\n\nexport class SubscriberBuilder<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends any[] = [],\n> {\n private _subscribedEvents: TSubscribedEvents = [] as any;\n private _timeout?: number;\n private outputSchema?: OutSchema;\n private _services: TServices = [] as Service[] as TServices;\n private _logger: TLogger = DEFAULT_LOGGER;\n private _publisher?: Service<TEventPublisherServiceName, TEventPublisher>;\n\n constructor() {\n this._timeout = 30000; // Default timeout\n }\n\n timeout(timeout: number): this {\n this._timeout = timeout;\n return this;\n }\n\n output<T extends StandardSchemaV1>(\n schema: T,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n T,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this.outputSchema = schema as unknown as OutSchema;\n return this as any;\n }\n\n services<T extends Service[]>(\n services: T,\n ): SubscriberBuilder<\n [...TServices, ...T],\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._services = [...this._services, ...services] as any;\n return this as any;\n }\n\n logger<T extends Logger>(\n logger: T,\n ): SubscriberBuilder<\n TServices,\n T,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._logger = logger as unknown as TLogger;\n return this as any;\n }\n\n publisher<T extends EventPublisher<any>, TName extends string>(\n publisher: Service<TName, T>,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n T,\n TName,\n TSubscribedEvents\n > {\n this._publisher = publisher as any;\n return this as any;\n }\n\n subscribe<\n TEvent extends TEventPublisher extends EventPublisher<any>\n ?\n | ExtractPublisherMessage<TEventPublisher>['type']\n | ExtractPublisherMessage<TEventPublisher>['type'][]\n : never,\n >(\n event: TEvent,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TEvent extends any[]\n ? [...TSubscribedEvents, ...TEvent]\n : [...TSubscribedEvents, TEvent]\n > {\n const eventsToAdd = Array.isArray(event) ? event : [event];\n this._subscribedEvents = [...this._subscribedEvents, ...eventsToAdd] as any;\n return this as any;\n }\n\n handle(\n fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n ): Subscriber<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n const subscriber = new Subscriber(\n fn,\n this._timeout,\n this._subscribedEvents,\n this.outputSchema,\n this._services,\n this._logger,\n this._publisher,\n );\n\n // Reset builder state after creating the subscriber to prevent pollution\n this._services = [] as Service[] as TServices;\n this._logger = DEFAULT_LOGGER;\n this._publisher = undefined;\n this._subscribedEvents = [] as any;\n this._timeout = 30000; // Reset to default\n this.outputSchema = undefined;\n\n return subscriber;\n }\n}\n"],"mappings":";;;;AAUA,IAAa,oBAAb,MAOE;CACA,AAAQ,oBAAuC,CAAE;CACjD,AAAQ;CACR,AAAQ;CACR,AAAQ,YAAuB,CAAE;CACjC,AAAQ,UAAmB;CAC3B,AAAQ;CAER,cAAc;AACZ,OAAK,WAAW;CACjB;CAED,QAAQA,SAAuB;AAC7B,OAAK,WAAW;AAChB,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,eAAe;AACpB,SAAO;CACR;CAED,SACEC,UAQA;AACA,OAAK,YAAY,CAAC,GAAG,KAAK,WAAW,GAAG,QAAS;AACjD,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,UAAU;AACf,SAAO;CACR;CAED,UACEC,WAQA;AACA,OAAK,aAAa;AAClB,SAAO;CACR;CAED,UAOEC,OAUA;EACA,MAAM,cAAc,MAAM,QAAQ,MAAM,GAAG,QAAQ,CAAC,KAAM;AAC1D,OAAK,oBAAoB,CAAC,GAAG,KAAK,mBAAmB,GAAG,WAAY;AACpE,SAAO;CACR;CAED,OACEC,IAcA;EACA,MAAM,aAAa,IAAI,WACrB,IACA,KAAK,UACL,KAAK,mBACL,KAAK,cACL,KAAK,WACL,KAAK,SACL,KAAK;AAIP,OAAK,YAAY,CAAE;AACnB,OAAK,UAAU;AACf,OAAK;AACL,OAAK,oBAAoB,CAAE;AAC3B,OAAK,WAAW;AAChB,OAAK;AAEL,SAAO;CACR;AACF"}
1
+ {"version":3,"file":"SubscriberBuilder-BWQmiYd8.mjs","names":["timeout: number","schema: T","services: T","logger: T","publisher: Service<TName, T>","event: TEvent","fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >"],"sources":["../src/subscribers/SubscriberBuilder.ts"],"sourcesContent":["import type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport { DEFAULT_LOGGER } from '@geekmidas/logger/console';\nimport type { Service } from '@geekmidas/services';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { Subscriber, type SubscriberHandler } from './Subscriber';\n\nexport class SubscriberBuilder<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends any[] = [],\n> {\n private _subscribedEvents: TSubscribedEvents = [] as any;\n private _timeout?: number;\n private outputSchema?: OutSchema;\n private _services: TServices = [] as Service[] as TServices;\n private _logger: TLogger = DEFAULT_LOGGER;\n private _publisher?: Service<TEventPublisherServiceName, TEventPublisher>;\n\n constructor() {\n this._timeout = 30000; // Default timeout\n }\n\n timeout(timeout: number): this {\n this._timeout = timeout;\n return this;\n }\n\n output<T extends StandardSchemaV1>(\n schema: T,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n T,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this.outputSchema = schema as unknown as OutSchema;\n return this as any;\n }\n\n services<T extends Service[]>(\n services: T,\n ): SubscriberBuilder<\n [...TServices, ...T],\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._services = [...this._services, ...services] as any;\n return this as any;\n }\n\n logger<T extends Logger>(\n logger: T,\n ): SubscriberBuilder<\n TServices,\n T,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._logger = logger as unknown as TLogger;\n return this as any;\n }\n\n publisher<T extends EventPublisher<any>, TName extends string>(\n publisher: Service<TName, T>,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n T,\n TName,\n TSubscribedEvents\n > {\n this._publisher = publisher as any;\n return this as any;\n }\n\n subscribe<\n TEvent extends TEventPublisher extends EventPublisher<any>\n ?\n | ExtractPublisherMessage<TEventPublisher>['type']\n | ExtractPublisherMessage<TEventPublisher>['type'][]\n : never,\n >(\n event: TEvent,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TEvent extends any[]\n ? [...TSubscribedEvents, ...TEvent]\n : [...TSubscribedEvents, TEvent]\n > {\n const eventsToAdd = Array.isArray(event) ? event : [event];\n this._subscribedEvents = [...this._subscribedEvents, ...eventsToAdd] as any;\n return this as any;\n }\n\n handle(\n fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n ): Subscriber<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n const subscriber = new Subscriber(\n fn,\n this._timeout,\n this._subscribedEvents,\n this.outputSchema,\n this._services,\n this._logger,\n this._publisher,\n );\n\n // Reset builder state after creating the subscriber to prevent pollution\n this._services = [] as Service[] as TServices;\n this._logger = DEFAULT_LOGGER;\n this._publisher = undefined;\n this._subscribedEvents = [] as any;\n this._timeout = 30000; // Reset to default\n this.outputSchema = undefined;\n\n return subscriber;\n }\n}\n"],"mappings":";;;;AAUA,IAAa,oBAAb,MAOE;CACA,AAAQ,oBAAuC,CAAE;CACjD,AAAQ;CACR,AAAQ;CACR,AAAQ,YAAuB,CAAE;CACjC,AAAQ,UAAmB;CAC3B,AAAQ;CAER,cAAc;AACZ,OAAK,WAAW;CACjB;CAED,QAAQA,SAAuB;AAC7B,OAAK,WAAW;AAChB,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,eAAe;AACpB,SAAO;CACR;CAED,SACEC,UAQA;AACA,OAAK,YAAY,CAAC,GAAG,KAAK,WAAW,GAAG,QAAS;AACjD,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,UAAU;AACf,SAAO;CACR;CAED,UACEC,WAQA;AACA,OAAK,aAAa;AAClB,SAAO;CACR;CAED,UAOEC,OAUA;EACA,MAAM,cAAc,MAAM,QAAQ,MAAM,GAAG,QAAQ,CAAC,KAAM;AAC1D,OAAK,oBAAoB,CAAC,GAAG,KAAK,mBAAmB,GAAG,WAAY;AACpE,SAAO;CACR;CAED,OACEC,IAcA;EACA,MAAM,aAAa,IAAI,WACrB,IACA,KAAK,UACL,KAAK,mBACL,KAAK,cACL,KAAK,WACL,KAAK,SACL,KAAK;AAIP,OAAK,YAAY,CAAE;AACnB,OAAK,UAAU;AACf,OAAK;AACL,OAAK,oBAAoB,CAAE;AAC3B,OAAK,WAAW;AAChB,OAAK;AAEL,SAAO;CACR;AACF"}
@@ -1,5 +1,5 @@
1
1
  const require_chunk = require('./chunk-CUT6urMc.cjs');
2
- const require_Subscriber = require('./Subscriber-D-FPWts6.cjs');
2
+ const require_Subscriber = require('./Subscriber-Bdh8rMSL.cjs');
3
3
  const __geekmidas_logger_console = require_chunk.__toESM(require("@geekmidas/logger/console"));
4
4
 
5
5
  //#region src/subscribers/SubscriberBuilder.ts
@@ -57,4 +57,4 @@ Object.defineProperty(exports, 'SubscriberBuilder', {
57
57
  return SubscriberBuilder;
58
58
  }
59
59
  });
60
- //# sourceMappingURL=SubscriberBuilder-BfE2cL1q.cjs.map
60
+ //# sourceMappingURL=SubscriberBuilder-DieD_60p.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"SubscriberBuilder-BfE2cL1q.cjs","names":["DEFAULT_LOGGER","timeout: number","schema: T","services: T","logger: T","publisher: Service<TName, T>","event: TEvent","fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >","Subscriber"],"sources":["../src/subscribers/SubscriberBuilder.ts"],"sourcesContent":["import type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport { DEFAULT_LOGGER } from '@geekmidas/logger/console';\nimport type { Service } from '@geekmidas/services';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { Subscriber, type SubscriberHandler } from './Subscriber';\n\nexport class SubscriberBuilder<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends any[] = [],\n> {\n private _subscribedEvents: TSubscribedEvents = [] as any;\n private _timeout?: number;\n private outputSchema?: OutSchema;\n private _services: TServices = [] as Service[] as TServices;\n private _logger: TLogger = DEFAULT_LOGGER;\n private _publisher?: Service<TEventPublisherServiceName, TEventPublisher>;\n\n constructor() {\n this._timeout = 30000; // Default timeout\n }\n\n timeout(timeout: number): this {\n this._timeout = timeout;\n return this;\n }\n\n output<T extends StandardSchemaV1>(\n schema: T,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n T,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this.outputSchema = schema as unknown as OutSchema;\n return this as any;\n }\n\n services<T extends Service[]>(\n services: T,\n ): SubscriberBuilder<\n [...TServices, ...T],\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._services = [...this._services, ...services] as any;\n return this as any;\n }\n\n logger<T extends Logger>(\n logger: T,\n ): SubscriberBuilder<\n TServices,\n T,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._logger = logger as unknown as TLogger;\n return this as any;\n }\n\n publisher<T extends EventPublisher<any>, TName extends string>(\n publisher: Service<TName, T>,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n T,\n TName,\n TSubscribedEvents\n > {\n this._publisher = publisher as any;\n return this as any;\n }\n\n subscribe<\n TEvent extends TEventPublisher extends EventPublisher<any>\n ?\n | ExtractPublisherMessage<TEventPublisher>['type']\n | ExtractPublisherMessage<TEventPublisher>['type'][]\n : never,\n >(\n event: TEvent,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TEvent extends any[]\n ? [...TSubscribedEvents, ...TEvent]\n : [...TSubscribedEvents, TEvent]\n > {\n const eventsToAdd = Array.isArray(event) ? event : [event];\n this._subscribedEvents = [...this._subscribedEvents, ...eventsToAdd] as any;\n return this as any;\n }\n\n handle(\n fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n ): Subscriber<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n const subscriber = new Subscriber(\n fn,\n this._timeout,\n this._subscribedEvents,\n this.outputSchema,\n this._services,\n this._logger,\n this._publisher,\n );\n\n // Reset builder state after creating the subscriber to prevent pollution\n this._services = [] as Service[] as TServices;\n this._logger = DEFAULT_LOGGER;\n this._publisher = undefined;\n this._subscribedEvents = [] as any;\n this._timeout = 30000; // Reset to default\n this.outputSchema = undefined;\n\n return subscriber;\n }\n}\n"],"mappings":";;;;;AAUA,IAAa,oBAAb,MAOE;CACA,AAAQ,oBAAuC,CAAE;CACjD,AAAQ;CACR,AAAQ;CACR,AAAQ,YAAuB,CAAE;CACjC,AAAQ,UAAmBA;CAC3B,AAAQ;CAER,cAAc;AACZ,OAAK,WAAW;CACjB;CAED,QAAQC,SAAuB;AAC7B,OAAK,WAAW;AAChB,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,eAAe;AACpB,SAAO;CACR;CAED,SACEC,UAQA;AACA,OAAK,YAAY,CAAC,GAAG,KAAK,WAAW,GAAG,QAAS;AACjD,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,UAAU;AACf,SAAO;CACR;CAED,UACEC,WAQA;AACA,OAAK,aAAa;AAClB,SAAO;CACR;CAED,UAOEC,OAUA;EACA,MAAM,cAAc,MAAM,QAAQ,MAAM,GAAG,QAAQ,CAAC,KAAM;AAC1D,OAAK,oBAAoB,CAAC,GAAG,KAAK,mBAAmB,GAAG,WAAY;AACpE,SAAO;CACR;CAED,OACEC,IAcA;EACA,MAAM,aAAa,IAAIC,8BACrB,IACA,KAAK,UACL,KAAK,mBACL,KAAK,cACL,KAAK,WACL,KAAK,SACL,KAAK;AAIP,OAAK,YAAY,CAAE;AACnB,OAAK,UAAUR;AACf,OAAK;AACL,OAAK,oBAAoB,CAAE;AAC3B,OAAK,WAAW;AAChB,OAAK;AAEL,SAAO;CACR;AACF"}
1
+ {"version":3,"file":"SubscriberBuilder-DieD_60p.cjs","names":["DEFAULT_LOGGER","timeout: number","schema: T","services: T","logger: T","publisher: Service<TName, T>","event: TEvent","fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >","Subscriber"],"sources":["../src/subscribers/SubscriberBuilder.ts"],"sourcesContent":["import type {\n EventPublisher,\n ExtractPublisherMessage,\n} from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport { DEFAULT_LOGGER } from '@geekmidas/logger/console';\nimport type { Service } from '@geekmidas/services';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { Subscriber, type SubscriberHandler } from './Subscriber';\n\nexport class SubscriberBuilder<\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n OutSchema extends StandardSchemaV1 | undefined = undefined,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TSubscribedEvents extends any[] = [],\n> {\n private _subscribedEvents: TSubscribedEvents = [] as any;\n private _timeout?: number;\n private outputSchema?: OutSchema;\n private _services: TServices = [] as Service[] as TServices;\n private _logger: TLogger = DEFAULT_LOGGER;\n private _publisher?: Service<TEventPublisherServiceName, TEventPublisher>;\n\n constructor() {\n this._timeout = 30000; // Default timeout\n }\n\n timeout(timeout: number): this {\n this._timeout = timeout;\n return this;\n }\n\n output<T extends StandardSchemaV1>(\n schema: T,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n T,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this.outputSchema = schema as unknown as OutSchema;\n return this as any;\n }\n\n services<T extends Service[]>(\n services: T,\n ): SubscriberBuilder<\n [...TServices, ...T],\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._services = [...this._services, ...services] as any;\n return this as any;\n }\n\n logger<T extends Logger>(\n logger: T,\n ): SubscriberBuilder<\n TServices,\n T,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n this._logger = logger as unknown as TLogger;\n return this as any;\n }\n\n publisher<T extends EventPublisher<any>, TName extends string>(\n publisher: Service<TName, T>,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n T,\n TName,\n TSubscribedEvents\n > {\n this._publisher = publisher as any;\n return this as any;\n }\n\n subscribe<\n TEvent extends TEventPublisher extends EventPublisher<any>\n ?\n | ExtractPublisherMessage<TEventPublisher>['type']\n | ExtractPublisherMessage<TEventPublisher>['type'][]\n : never,\n >(\n event: TEvent,\n ): SubscriberBuilder<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TEvent extends any[]\n ? [...TSubscribedEvents, ...TEvent]\n : [...TSubscribedEvents, TEvent]\n > {\n const eventsToAdd = Array.isArray(event) ? event : [event];\n this._subscribedEvents = [...this._subscribedEvents, ...eventsToAdd] as any;\n return this as any;\n }\n\n handle(\n fn: SubscriberHandler<\n TEventPublisher,\n TSubscribedEvents,\n TServices,\n TLogger,\n OutSchema\n >,\n ): Subscriber<\n TServices,\n TLogger,\n OutSchema,\n TEventPublisher,\n TEventPublisherServiceName,\n TSubscribedEvents\n > {\n const subscriber = new Subscriber(\n fn,\n this._timeout,\n this._subscribedEvents,\n this.outputSchema,\n this._services,\n this._logger,\n this._publisher,\n );\n\n // Reset builder state after creating the subscriber to prevent pollution\n this._services = [] as Service[] as TServices;\n this._logger = DEFAULT_LOGGER;\n this._publisher = undefined;\n this._subscribedEvents = [] as any;\n this._timeout = 30000; // Reset to default\n this.outputSchema = undefined;\n\n return subscriber;\n }\n}\n"],"mappings":";;;;;AAUA,IAAa,oBAAb,MAOE;CACA,AAAQ,oBAAuC,CAAE;CACjD,AAAQ;CACR,AAAQ;CACR,AAAQ,YAAuB,CAAE;CACjC,AAAQ,UAAmBA;CAC3B,AAAQ;CAER,cAAc;AACZ,OAAK,WAAW;CACjB;CAED,QAAQC,SAAuB;AAC7B,OAAK,WAAW;AAChB,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,eAAe;AACpB,SAAO;CACR;CAED,SACEC,UAQA;AACA,OAAK,YAAY,CAAC,GAAG,KAAK,WAAW,GAAG,QAAS;AACjD,SAAO;CACR;CAED,OACEC,QAQA;AACA,OAAK,UAAU;AACf,SAAO;CACR;CAED,UACEC,WAQA;AACA,OAAK,aAAa;AAClB,SAAO;CACR;CAED,UAOEC,OAUA;EACA,MAAM,cAAc,MAAM,QAAQ,MAAM,GAAG,QAAQ,CAAC,KAAM;AAC1D,OAAK,oBAAoB,CAAC,GAAG,KAAK,mBAAmB,GAAG,WAAY;AACpE,SAAO;CACR;CAED,OACEC,IAcA;EACA,MAAM,aAAa,IAAIC,8BACrB,IACA,KAAK,UACL,KAAK,mBACL,KAAK,cACL,KAAK,WACL,KAAK,SACL,KAAK;AAIP,OAAK,YAAY,CAAE;AACnB,OAAK,UAAUR;AACf,OAAK;AACL,OAAK,oBAAoB,CAAE;AAC3B,OAAK,WAAW;AAChB,OAAK;AAEL,SAAO;CACR;AACF"}
@@ -24,22 +24,22 @@ declare class TestEndpointAdaptor<TRoute extends string, TMethod extends HttpMet
24
24
  /**
25
25
  * Conditional audit storage requirement - required when TAuditStorage is configured
26
26
  */
27
- type AuditStorageRequirement<TAuditStorage extends AuditStorage | undefined = undefined, TAuditStorageServiceName extends string = string> = TAuditStorage extends undefined ? {} : {
28
- /** Audit storage service - required when endpoint uses .auditor() */
29
- auditorStorage: Service<TAuditStorageServiceName, TAuditStorage>;
27
+ type AuditStorageRequirement<TAuditStorage extends AuditStorage | undefined = undefined> = TAuditStorage extends undefined ? {} : {
28
+ /** Audit storage instance - required when endpoint uses .auditor() */
29
+ auditorStorage: TAuditStorage;
30
30
  };
31
31
  /**
32
32
  * Conditional database requirement - required when TDatabase is configured
33
33
  */
34
- type DatabaseRequirement<TDatabase = undefined, TDatabaseServiceName extends string = string> = TDatabase extends undefined ? {} : {
35
- /** Database service - required when endpoint uses .database() */
36
- database: Service<TDatabaseServiceName, TDatabase>;
34
+ type DatabaseRequirement<TDatabase = undefined> = TDatabase extends undefined ? {} : {
35
+ /** Database instance - required when endpoint uses .database() */
36
+ database: TDatabase;
37
37
  };
38
- type TestRequestAdaptor<TInput extends EndpointSchemas = {}, TServices extends Service[] = [], TEventPublisher extends EventPublisher<any> | undefined = undefined, TEventPublisherServiceName extends string = string, TAuditStorage extends AuditStorage | undefined = undefined, TAuditStorageServiceName extends string = string, TDatabase = undefined, TDatabaseServiceName extends string = string> = {
38
+ type TestRequestAdaptor<TInput extends EndpointSchemas = {}, TServices extends Service[] = [], TEventPublisher extends EventPublisher<any> | undefined = undefined, TEventPublisherServiceName extends string = string, TAuditStorage extends AuditStorage | undefined = undefined, _TAuditStorageServiceName extends string = string, TDatabase = undefined, _TDatabaseServiceName extends string = string> = {
39
39
  services: ServiceRecord<TServices>;
40
40
  headers: Record<string, string>;
41
41
  publisher?: Service<TEventPublisherServiceName, TEventPublisher>;
42
- } & InferComposableStandardSchema<TInput> & AuditStorageRequirement<TAuditStorage, TAuditStorageServiceName> & DatabaseRequirement<TDatabase, TDatabaseServiceName>;
42
+ } & InferComposableStandardSchema<TInput> & AuditStorageRequirement<TAuditStorage> & DatabaseRequirement<TDatabase>;
43
43
  //#endregion
44
44
  export { TestEndpointAdaptor, TestHttpResponse, TestRequestAdaptor };
45
- //# sourceMappingURL=TestEndpointAdaptor-DhRjJHyk.d.mts.map
45
+ //# sourceMappingURL=TestEndpointAdaptor-Bl2ic-yr.d.mts.map
@@ -24,22 +24,22 @@ declare class TestEndpointAdaptor<TRoute extends string, TMethod extends HttpMet
24
24
  /**
25
25
  * Conditional audit storage requirement - required when TAuditStorage is configured
26
26
  */
27
- type AuditStorageRequirement<TAuditStorage extends AuditStorage | undefined = undefined, TAuditStorageServiceName extends string = string> = TAuditStorage extends undefined ? {} : {
28
- /** Audit storage service - required when endpoint uses .auditor() */
29
- auditorStorage: Service<TAuditStorageServiceName, TAuditStorage>;
27
+ type AuditStorageRequirement<TAuditStorage extends AuditStorage | undefined = undefined> = TAuditStorage extends undefined ? {} : {
28
+ /** Audit storage instance - required when endpoint uses .auditor() */
29
+ auditorStorage: TAuditStorage;
30
30
  };
31
31
  /**
32
32
  * Conditional database requirement - required when TDatabase is configured
33
33
  */
34
- type DatabaseRequirement<TDatabase = undefined, TDatabaseServiceName extends string = string> = TDatabase extends undefined ? {} : {
35
- /** Database service - required when endpoint uses .database() */
36
- database: Service<TDatabaseServiceName, TDatabase>;
34
+ type DatabaseRequirement<TDatabase = undefined> = TDatabase extends undefined ? {} : {
35
+ /** Database instance - required when endpoint uses .database() */
36
+ database: TDatabase;
37
37
  };
38
- type TestRequestAdaptor<TInput extends EndpointSchemas = {}, TServices extends Service[] = [], TEventPublisher extends EventPublisher<any> | undefined = undefined, TEventPublisherServiceName extends string = string, TAuditStorage extends AuditStorage | undefined = undefined, TAuditStorageServiceName extends string = string, TDatabase = undefined, TDatabaseServiceName extends string = string> = {
38
+ type TestRequestAdaptor<TInput extends EndpointSchemas = {}, TServices extends Service[] = [], TEventPublisher extends EventPublisher<any> | undefined = undefined, TEventPublisherServiceName extends string = string, TAuditStorage extends AuditStorage | undefined = undefined, _TAuditStorageServiceName extends string = string, TDatabase = undefined, _TDatabaseServiceName extends string = string> = {
39
39
  services: ServiceRecord<TServices>;
40
40
  headers: Record<string, string>;
41
41
  publisher?: Service<TEventPublisherServiceName, TEventPublisher>;
42
- } & InferComposableStandardSchema<TInput> & AuditStorageRequirement<TAuditStorage, TAuditStorageServiceName> & DatabaseRequirement<TDatabase, TDatabaseServiceName>;
42
+ } & InferComposableStandardSchema<TInput> & AuditStorageRequirement<TAuditStorage> & DatabaseRequirement<TDatabase>;
43
43
  //#endregion
44
44
  export { TestEndpointAdaptor, TestHttpResponse, TestRequestAdaptor };
45
- //# sourceMappingURL=TestEndpointAdaptor-B9tUIlCC.d.cts.map
45
+ //# sourceMappingURL=TestEndpointAdaptor-ByXqQufk.d.cts.map
@@ -3,6 +3,7 @@ const require_publisher = require('./publisher-lFQleddL.cjs');
3
3
  const require_Endpoint = require('./Endpoint-DDpF7NO1.cjs');
4
4
  const require_processAudits = require('./processAudits-BFokHhCO.cjs');
5
5
  const __geekmidas_services = require_chunk.__toESM(require("@geekmidas/services"));
6
+ const __geekmidas_audit = require_chunk.__toESM(require("@geekmidas/audit"));
6
7
  const __geekmidas_envkit = require_chunk.__toESM(require("@geekmidas/envkit"));
7
8
 
8
9
  //#region src/endpoints/TestEndpointAdaptor.ts
@@ -47,24 +48,43 @@ var TestEndpointAdaptor = class TestEndpointAdaptor {
47
48
  header,
48
49
  cookie
49
50
  });
50
- const auditorStorageService = ctx.auditorStorage;
51
- const endpointWithAuditor = auditorStorageService ? {
52
- ...this.endpoint,
53
- auditorStorageService
54
- } : this.endpoint;
55
- const auditContext = await require_processAudits.createAuditContext(endpointWithAuditor, this.serviceDiscovery, logger, {
56
- session,
57
- header,
58
- cookie,
59
- services: ctx.services
60
- });
51
+ const auditorStorage = ctx.auditorStorage;
52
+ let auditContext;
53
+ if (auditorStorage) {
54
+ let actor = {
55
+ id: "system",
56
+ type: "system"
57
+ };
58
+ if (this.endpoint.actorExtractor) try {
59
+ actor = await this.endpoint.actorExtractor({
60
+ services: ctx.services,
61
+ session,
62
+ header,
63
+ cookie,
64
+ logger
65
+ });
66
+ } catch (error) {
67
+ logger.error(error, "Failed to extract actor for audits");
68
+ }
69
+ const auditor = new __geekmidas_audit.DefaultAuditor({
70
+ actor,
71
+ storage: auditorStorage,
72
+ metadata: {
73
+ endpoint: this.endpoint.route,
74
+ method: this.endpoint.method
75
+ }
76
+ });
77
+ auditContext = {
78
+ auditor,
79
+ storage: auditorStorage
80
+ };
81
+ }
61
82
  const audits = this.endpoint.audits;
62
83
  if (!auditContext && audits?.length) logger.warn("No auditor storage service available");
63
- const databaseService = ctx.database;
64
- const rawDb = databaseService ? await this.serviceDiscovery.register([databaseService]).then((s) => s[databaseService.serviceName]) : void 0;
84
+ const rawDb = ctx.database;
65
85
  const result = await require_processAudits.executeWithAuditTransaction(auditContext, async (auditor) => {
66
- const sameDatabase = auditContext?.storage?.databaseServiceName && auditContext.storage.databaseServiceName === databaseService?.serviceName;
67
- const db = sameDatabase ? auditor?.getTransaction?.() ?? rawDb : rawDb;
86
+ const trx = auditor?.getTransaction?.();
87
+ const db = trx ?? rawDb;
68
88
  const responseBuilder = new require_Endpoint.ResponseBuilder();
69
89
  const response = await this.endpoint.handler({
70
90
  body,
@@ -130,4 +150,4 @@ Object.defineProperty(exports, 'TestEndpointAdaptor', {
130
150
  return TestEndpointAdaptor;
131
151
  }
132
152
  });
133
- //# sourceMappingURL=TestEndpointAdaptor-B9hyZ-mF.cjs.map
153
+ //# sourceMappingURL=TestEndpointAdaptor-C5qwQSnQ.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"TestEndpointAdaptor-C5qwQSnQ.cjs","names":["name: string","value: string","options?: CookieOptions","endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >","EnvironmentParser","serviceDiscovery: ServiceDiscovery<\n any,\n any\n >","ctx: TestRequestAdaptor<\n TInput,\n TServices,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TDatabase,\n TDatabaseServiceName\n >","auditContext: AuditExecutionContext<TAuditAction> | undefined","actor: AuditActor","DefaultAuditor","ResponseBuilder","metadata","output","result","headers: Record<string, string | string[]>","setCookieValues: string[]","cookie"],"sources":["../src/endpoints/TestEndpointAdaptor.ts"],"sourcesContent":["import type { AuditActor, AuditStorage, AuditableAction } from '@geekmidas/audit';\nimport { DefaultAuditor } from '@geekmidas/audit';\nimport { EnvironmentParser } from '@geekmidas/envkit';\nimport type { EventPublisher } from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport type {\n InferComposableStandardSchema,\n InferStandardSchema,\n} from '@geekmidas/schema';\nimport {\n type Service,\n ServiceDiscovery,\n type ServiceRecord,\n} from '@geekmidas/services';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { publishConstructEvents } from '../publisher';\nimport type { HttpMethod } from '../types';\nimport {\n type CookieOptions,\n Endpoint,\n type EndpointSchemas,\n ResponseBuilder,\n} from './Endpoint';\nimport type { MappedAudit } from './audit';\nimport {\n type AuditExecutionContext,\n executeWithAuditTransaction,\n} from './processAudits';\n\nexport type TestHttpResponse<TBody = any> = {\n body: TBody;\n status: number;\n headers: Record<string, string | string[]>;\n};\n\n/**\n * Serializes a cookie into a Set-Cookie header string\n */\nfunction serializeCookie(\n name: string,\n value: string,\n options?: CookieOptions,\n): string {\n let cookieString = `${name}=${value}`;\n\n if (options) {\n if (options.maxAge !== undefined) {\n cookieString += `; Max-Age=${options.maxAge}`;\n }\n if (options.expires) {\n cookieString += `; Expires=${options.expires.toUTCString()}`;\n }\n if (options.domain) {\n cookieString += `; Domain=${options.domain}`;\n }\n if (options.path) {\n cookieString += `; Path=${options.path}`;\n }\n if (options.httpOnly) {\n cookieString += '; HttpOnly';\n }\n if (options.secure) {\n cookieString += '; Secure';\n }\n if (options.sameSite) {\n cookieString += `; SameSite=${options.sameSite}`;\n }\n }\n\n return cookieString;\n}\n\nexport class TestEndpointAdaptor<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n> {\n static getDefaultServiceDiscover<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n >(\n endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n ) {\n return ServiceDiscovery.getInstance(\n endpoint.logger,\n new EnvironmentParser({}),\n );\n }\n constructor(\n private readonly endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n private serviceDiscovery: ServiceDiscovery<\n any,\n any\n > = TestEndpointAdaptor.getDefaultServiceDiscover(endpoint),\n ) {}\n\n async fullRequest(\n ctx: TestRequestAdaptor<\n TInput,\n TServices,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TDatabase,\n TDatabaseServiceName\n >,\n ): Promise<TestHttpResponse<InferStandardSchema<TOutSchema>>> {\n const body = await this.endpoint.parseInput((ctx as any).body, 'body');\n const query = await this.endpoint.parseInput((ctx as any).query, 'query');\n const params = await this.endpoint.parseInput(\n (ctx as any).params,\n 'params',\n );\n\n const header = Endpoint.createHeaders(ctx.headers);\n const cookie = Endpoint.createCookies(ctx.headers.cookie);\n const logger = this.endpoint.logger.child({\n route: this.endpoint.route,\n host: ctx.headers.host,\n method: this.endpoint.method,\n }) as TLogger;\n const session = await this.endpoint.getSession({\n logger,\n services: ctx.services,\n header,\n cookie,\n });\n\n // Create audit context if audit storage is provided\n // The auditorStorage instance is required when endpoint uses .auditor()\n const auditorStorage = (ctx as any).auditorStorage as TAuditStorage;\n let auditContext: AuditExecutionContext<TAuditAction> | undefined;\n\n if (auditorStorage) {\n // Extract actor if configured\n let actor: AuditActor = { id: 'system', type: 'system' };\n if (this.endpoint.actorExtractor) {\n try {\n actor = await this.endpoint.actorExtractor({\n services: ctx.services as any,\n session,\n header,\n cookie,\n logger,\n });\n } catch (error) {\n logger.error(error as Error, 'Failed to extract actor for audits');\n }\n }\n\n const auditor = new DefaultAuditor<TAuditAction>({\n actor,\n storage: auditorStorage as AuditStorage,\n metadata: {\n endpoint: this.endpoint.route,\n method: this.endpoint.method,\n },\n });\n\n auditContext = { auditor, storage: auditorStorage as AuditStorage };\n }\n\n // Warn if declarative audits are configured but no audit storage\n const audits = this.endpoint.audits as MappedAudit<\n TAuditAction,\n TOutSchema\n >[];\n if (!auditContext && audits?.length) {\n logger.warn('No auditor storage service available');\n }\n\n // Use database instance directly from context\n // The database instance is required when endpoint uses .database()\n const rawDb = (ctx as any).database as TDatabase;\n\n // Execute handler with automatic audit transaction support\n const result = await executeWithAuditTransaction(\n auditContext,\n async (auditor) => {\n // Use audit transaction as db if available (when storage has same database)\n // For testing, the tester controls whether to use transactional auditing\n const trx = auditor?.getTransaction?.();\n const db = trx ?? rawDb;\n\n const responseBuilder = new ResponseBuilder();\n const response = await this.endpoint.handler(\n {\n body,\n query,\n params,\n session,\n services: ctx.services,\n logger,\n header,\n cookie,\n auditor,\n db,\n } as any,\n responseBuilder,\n );\n\n // Check if response has metadata\n let data = response;\n let metadata = responseBuilder.getMetadata();\n\n if (Endpoint.hasMetadata(response)) {\n data = response.data;\n metadata = response.metadata;\n }\n\n const output = await this.endpoint.parseOutput(data);\n\n return { output, metadata, responseBuilder };\n },\n // Process declarative audits after handler (inside transaction)\n async (result, auditor) => {\n if (!audits?.length) return;\n\n for (const audit of audits) {\n if (audit.when && !audit.when(result.output as any)) {\n continue;\n }\n const payload = audit.payload(result.output as any);\n const entityId = audit.entityId?.(result.output as any);\n auditor.audit(audit.type as any, payload as any, {\n table: audit.table,\n entityId,\n });\n }\n },\n );\n\n const { output, metadata } = result;\n\n ctx.publisher && (await this.serviceDiscovery.register([ctx.publisher]));\n await publishConstructEvents(this.endpoint, output, this.serviceDiscovery);\n\n // Convert cookies to Set-Cookie headers\n const headers: Record<string, string | string[]> = {\n ...(metadata.headers || {}),\n };\n\n if (metadata.cookies && metadata.cookies.size > 0) {\n const setCookieValues: string[] = [];\n for (const [name, cookie] of metadata.cookies.entries()) {\n setCookieValues.push(\n serializeCookie(name, cookie.value, cookie.options),\n );\n }\n headers['set-cookie'] = setCookieValues;\n }\n\n // Return HTTP response format\n return {\n body: output,\n status: metadata.status || 200,\n headers,\n };\n }\n\n async request(\n ctx: TestRequestAdaptor<\n TInput,\n TServices,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TDatabase,\n TDatabaseServiceName\n >,\n ): Promise<InferStandardSchema<TOutSchema>> {\n const response = await this.fullRequest(ctx);\n return response.body;\n }\n}\n\n/**\n * Conditional audit storage requirement - required when TAuditStorage is configured\n */\ntype AuditStorageRequirement<\n TAuditStorage extends AuditStorage | undefined = undefined,\n> = TAuditStorage extends undefined\n ? {}\n : {\n /** Audit storage instance - required when endpoint uses .auditor() */\n auditorStorage: TAuditStorage;\n };\n\n/**\n * Conditional database requirement - required when TDatabase is configured\n */\ntype DatabaseRequirement<TDatabase = undefined> = TDatabase extends undefined\n ? {}\n : {\n /** Database instance - required when endpoint uses .database() */\n database: TDatabase;\n };\n\nexport type TestRequestAdaptor<\n TInput extends EndpointSchemas = {},\n TServices extends Service[] = [],\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n _TAuditStorageServiceName extends string = string,\n TDatabase = undefined,\n _TDatabaseServiceName extends string = string,\n> = {\n services: ServiceRecord<TServices>;\n headers: Record<string, string>;\n publisher?: Service<TEventPublisherServiceName, TEventPublisher>;\n} & InferComposableStandardSchema<TInput> &\n AuditStorageRequirement<TAuditStorage> &\n DatabaseRequirement<TDatabase>;\n"],"mappings":";;;;;;;;;;;;AAsCA,SAAS,gBACPA,MACAC,OACAC,SACQ;CACR,IAAI,gBAAgB,EAAE,KAAK,GAAG,MAAM;AAEpC,KAAI,SAAS;AACX,MAAI,QAAQ,kBACV,kBAAiB,YAAY,QAAQ,OAAO;AAE9C,MAAI,QAAQ,QACV,kBAAiB,YAAY,QAAQ,QAAQ,aAAa,CAAC;AAE7D,MAAI,QAAQ,OACV,kBAAiB,WAAW,QAAQ,OAAO;AAE7C,MAAI,QAAQ,KACV,kBAAiB,SAAS,QAAQ,KAAK;AAEzC,MAAI,QAAQ,SACV,iBAAgB;AAElB,MAAI,QAAQ,OACV,iBAAgB;AAElB,MAAI,QAAQ,SACV,kBAAiB,aAAa,QAAQ,SAAS;CAElD;AAED,QAAO;AACR;AAED,IAAa,sBAAb,MAAa,oBAkBX;CACA,OAAO,0BAmBLC,UAgBA;AACA,SAAO,sCAAiB,YACtB,SAAS,QACT,IAAIC,qCAAkB,CAAE,GACzB;CACF;CACD,YACmBD,UAgBTE,mBAGJ,oBAAoB,0BAA0B,SAAS,EAC3D;EApBiB;EAgBT;CAIN;CAEJ,MAAM,YACJC,KAU4D;EAC5D,MAAM,OAAO,MAAM,KAAK,SAAS,WAAY,IAAY,MAAM,OAAO;EACtE,MAAM,QAAQ,MAAM,KAAK,SAAS,WAAY,IAAY,OAAO,QAAQ;EACzE,MAAM,SAAS,MAAM,KAAK,SAAS,WAChC,IAAY,QACb,SACD;EAED,MAAM,SAAS,0BAAS,cAAc,IAAI,QAAQ;EAClD,MAAM,SAAS,0BAAS,cAAc,IAAI,QAAQ,OAAO;EACzD,MAAM,SAAS,KAAK,SAAS,OAAO,MAAM;GACxC,OAAO,KAAK,SAAS;GACrB,MAAM,IAAI,QAAQ;GAClB,QAAQ,KAAK,SAAS;EACvB,EAAC;EACF,MAAM,UAAU,MAAM,KAAK,SAAS,WAAW;GAC7C;GACA,UAAU,IAAI;GACd;GACA;EACD,EAAC;EAIF,MAAM,iBAAkB,IAAY;EACpC,IAAIC;AAEJ,MAAI,gBAAgB;GAElB,IAAIC,QAAoB;IAAE,IAAI;IAAU,MAAM;GAAU;AACxD,OAAI,KAAK,SAAS,eAChB,KAAI;AACF,YAAQ,MAAM,KAAK,SAAS,eAAe;KACzC,UAAU,IAAI;KACd;KACA;KACA;KACA;IACD,EAAC;GACH,SAAQ,OAAO;AACd,WAAO,MAAM,OAAgB,qCAAqC;GACnE;GAGH,MAAM,UAAU,IAAIC,iCAA6B;IAC/C;IACA,SAAS;IACT,UAAU;KACR,UAAU,KAAK,SAAS;KACxB,QAAQ,KAAK,SAAS;IACvB;GACF;AAED,kBAAe;IAAE;IAAS,SAAS;GAAgC;EACpE;EAGD,MAAM,SAAS,KAAK,SAAS;AAI7B,OAAK,gBAAgB,QAAQ,OAC3B,QAAO,KAAK,uCAAuC;EAKrD,MAAM,QAAS,IAAY;EAG3B,MAAM,SAAS,MAAM,kDACnB,cACA,OAAO,YAAY;GAGjB,MAAM,MAAM,SAAS,kBAAkB;GACvC,MAAM,KAAK,OAAO;GAElB,MAAM,kBAAkB,IAAIC;GAC5B,MAAM,WAAW,MAAM,KAAK,SAAS,QACnC;IACE;IACA;IACA;IACA;IACA,UAAU,IAAI;IACd;IACA;IACA;IACA;IACA;GACD,GACD,gBACD;GAGD,IAAI,OAAO;GACX,IAAIC,aAAW,gBAAgB,aAAa;AAE5C,OAAI,0BAAS,YAAY,SAAS,EAAE;AAClC,WAAO,SAAS;AAChB,iBAAW,SAAS;GACrB;GAED,MAAMC,WAAS,MAAM,KAAK,SAAS,YAAY,KAAK;AAEpD,UAAO;IAAE;IAAQ;IAAU;GAAiB;EAC7C,GAED,OAAOC,UAAQ,YAAY;AACzB,QAAK,QAAQ,OAAQ;AAErB,QAAK,MAAM,SAAS,QAAQ;AAC1B,QAAI,MAAM,SAAS,MAAM,KAAKA,SAAO,OAAc,CACjD;IAEF,MAAM,UAAU,MAAM,QAAQA,SAAO,OAAc;IACnD,MAAM,WAAW,MAAM,WAAWA,SAAO,OAAc;AACvD,YAAQ,MAAM,MAAM,MAAa,SAAgB;KAC/C,OAAO,MAAM;KACb;IACD,EAAC;GACH;EACF,EACF;EAED,MAAM,EAAE,QAAQ,UAAU,GAAG;AAE7B,MAAI,aAAc,MAAM,KAAK,iBAAiB,SAAS,CAAC,IAAI,SAAU,EAAC;AACvE,QAAM,yCAAuB,KAAK,UAAU,QAAQ,KAAK,iBAAiB;EAG1E,MAAMC,UAA6C,EACjD,GAAI,SAAS,WAAW,CAAE,EAC3B;AAED,MAAI,SAAS,WAAW,SAAS,QAAQ,OAAO,GAAG;GACjD,MAAMC,kBAA4B,CAAE;AACpC,QAAK,MAAM,CAAC,MAAMC,SAAO,IAAI,SAAS,QAAQ,SAAS,CACrD,iBAAgB,KACd,gBAAgB,MAAMA,SAAO,OAAOA,SAAO,QAAQ,CACpD;AAEH,WAAQ,gBAAgB;EACzB;AAGD,SAAO;GACL,MAAM;GACN,QAAQ,SAAS,UAAU;GAC3B;EACD;CACF;CAED,MAAM,QACJV,KAU0C;EAC1C,MAAM,WAAW,MAAM,KAAK,YAAY,IAAI;AAC5C,SAAO,SAAS;CACjB;AACF"}
@@ -1,7 +1,8 @@
1
1
  import { publishConstructEvents } from "./publisher-Bw4770Hi.mjs";
2
2
  import { Endpoint, ResponseBuilder } from "./Endpoint-S6Yh2_PN.mjs";
3
- import { createAuditContext, executeWithAuditTransaction } from "./processAudits-DfcB-X-4.mjs";
3
+ import { executeWithAuditTransaction } from "./processAudits-DfcB-X-4.mjs";
4
4
  import { ServiceDiscovery } from "@geekmidas/services";
5
+ import { DefaultAuditor } from "@geekmidas/audit";
5
6
  import { EnvironmentParser } from "@geekmidas/envkit";
6
7
 
7
8
  //#region src/endpoints/TestEndpointAdaptor.ts
@@ -46,24 +47,43 @@ var TestEndpointAdaptor = class TestEndpointAdaptor {
46
47
  header,
47
48
  cookie
48
49
  });
49
- const auditorStorageService = ctx.auditorStorage;
50
- const endpointWithAuditor = auditorStorageService ? {
51
- ...this.endpoint,
52
- auditorStorageService
53
- } : this.endpoint;
54
- const auditContext = await createAuditContext(endpointWithAuditor, this.serviceDiscovery, logger, {
55
- session,
56
- header,
57
- cookie,
58
- services: ctx.services
59
- });
50
+ const auditorStorage = ctx.auditorStorage;
51
+ let auditContext;
52
+ if (auditorStorage) {
53
+ let actor = {
54
+ id: "system",
55
+ type: "system"
56
+ };
57
+ if (this.endpoint.actorExtractor) try {
58
+ actor = await this.endpoint.actorExtractor({
59
+ services: ctx.services,
60
+ session,
61
+ header,
62
+ cookie,
63
+ logger
64
+ });
65
+ } catch (error) {
66
+ logger.error(error, "Failed to extract actor for audits");
67
+ }
68
+ const auditor = new DefaultAuditor({
69
+ actor,
70
+ storage: auditorStorage,
71
+ metadata: {
72
+ endpoint: this.endpoint.route,
73
+ method: this.endpoint.method
74
+ }
75
+ });
76
+ auditContext = {
77
+ auditor,
78
+ storage: auditorStorage
79
+ };
80
+ }
60
81
  const audits = this.endpoint.audits;
61
82
  if (!auditContext && audits?.length) logger.warn("No auditor storage service available");
62
- const databaseService = ctx.database;
63
- const rawDb = databaseService ? await this.serviceDiscovery.register([databaseService]).then((s) => s[databaseService.serviceName]) : void 0;
83
+ const rawDb = ctx.database;
64
84
  const result = await executeWithAuditTransaction(auditContext, async (auditor) => {
65
- const sameDatabase = auditContext?.storage?.databaseServiceName && auditContext.storage.databaseServiceName === databaseService?.serviceName;
66
- const db = sameDatabase ? auditor?.getTransaction?.() ?? rawDb : rawDb;
85
+ const trx = auditor?.getTransaction?.();
86
+ const db = trx ?? rawDb;
67
87
  const responseBuilder = new ResponseBuilder();
68
88
  const response = await this.endpoint.handler({
69
89
  body,
@@ -124,4 +144,4 @@ var TestEndpointAdaptor = class TestEndpointAdaptor {
124
144
 
125
145
  //#endregion
126
146
  export { TestEndpointAdaptor };
127
- //# sourceMappingURL=TestEndpointAdaptor-DbwrL-RJ.mjs.map
147
+ //# sourceMappingURL=TestEndpointAdaptor-DFDT9m8q.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"TestEndpointAdaptor-DFDT9m8q.mjs","names":["name: string","value: string","options?: CookieOptions","endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >","serviceDiscovery: ServiceDiscovery<\n any,\n any\n >","ctx: TestRequestAdaptor<\n TInput,\n TServices,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TDatabase,\n TDatabaseServiceName\n >","auditContext: AuditExecutionContext<TAuditAction> | undefined","actor: AuditActor","metadata","output","result","headers: Record<string, string | string[]>","setCookieValues: string[]","cookie"],"sources":["../src/endpoints/TestEndpointAdaptor.ts"],"sourcesContent":["import type { AuditActor, AuditStorage, AuditableAction } from '@geekmidas/audit';\nimport { DefaultAuditor } from '@geekmidas/audit';\nimport { EnvironmentParser } from '@geekmidas/envkit';\nimport type { EventPublisher } from '@geekmidas/events';\nimport type { Logger } from '@geekmidas/logger';\nimport type {\n InferComposableStandardSchema,\n InferStandardSchema,\n} from '@geekmidas/schema';\nimport {\n type Service,\n ServiceDiscovery,\n type ServiceRecord,\n} from '@geekmidas/services';\nimport type { StandardSchemaV1 } from '@standard-schema/spec';\nimport { publishConstructEvents } from '../publisher';\nimport type { HttpMethod } from '../types';\nimport {\n type CookieOptions,\n Endpoint,\n type EndpointSchemas,\n ResponseBuilder,\n} from './Endpoint';\nimport type { MappedAudit } from './audit';\nimport {\n type AuditExecutionContext,\n executeWithAuditTransaction,\n} from './processAudits';\n\nexport type TestHttpResponse<TBody = any> = {\n body: TBody;\n status: number;\n headers: Record<string, string | string[]>;\n};\n\n/**\n * Serializes a cookie into a Set-Cookie header string\n */\nfunction serializeCookie(\n name: string,\n value: string,\n options?: CookieOptions,\n): string {\n let cookieString = `${name}=${value}`;\n\n if (options) {\n if (options.maxAge !== undefined) {\n cookieString += `; Max-Age=${options.maxAge}`;\n }\n if (options.expires) {\n cookieString += `; Expires=${options.expires.toUTCString()}`;\n }\n if (options.domain) {\n cookieString += `; Domain=${options.domain}`;\n }\n if (options.path) {\n cookieString += `; Path=${options.path}`;\n }\n if (options.httpOnly) {\n cookieString += '; HttpOnly';\n }\n if (options.secure) {\n cookieString += '; Secure';\n }\n if (options.sameSite) {\n cookieString += `; SameSite=${options.sameSite}`;\n }\n }\n\n return cookieString;\n}\n\nexport class TestEndpointAdaptor<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n> {\n static getDefaultServiceDiscover<\n TRoute extends string,\n TMethod extends HttpMethod,\n TInput extends EndpointSchemas = {},\n TOutSchema extends StandardSchemaV1 | undefined = undefined,\n TServices extends Service[] = [],\n TLogger extends Logger = Logger,\n TSession = unknown,\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n TAuditStorageServiceName extends string = string,\n TAuditAction extends AuditableAction<string, unknown> = AuditableAction<\n string,\n unknown\n >,\n TDatabase = undefined,\n TDatabaseServiceName extends string = string,\n >(\n endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n ) {\n return ServiceDiscovery.getInstance(\n endpoint.logger,\n new EnvironmentParser({}),\n );\n }\n constructor(\n private readonly endpoint: Endpoint<\n TRoute,\n TMethod,\n TInput,\n TOutSchema,\n TServices,\n TLogger,\n TSession,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TAuditAction,\n TDatabase,\n TDatabaseServiceName\n >,\n private serviceDiscovery: ServiceDiscovery<\n any,\n any\n > = TestEndpointAdaptor.getDefaultServiceDiscover(endpoint),\n ) {}\n\n async fullRequest(\n ctx: TestRequestAdaptor<\n TInput,\n TServices,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TDatabase,\n TDatabaseServiceName\n >,\n ): Promise<TestHttpResponse<InferStandardSchema<TOutSchema>>> {\n const body = await this.endpoint.parseInput((ctx as any).body, 'body');\n const query = await this.endpoint.parseInput((ctx as any).query, 'query');\n const params = await this.endpoint.parseInput(\n (ctx as any).params,\n 'params',\n );\n\n const header = Endpoint.createHeaders(ctx.headers);\n const cookie = Endpoint.createCookies(ctx.headers.cookie);\n const logger = this.endpoint.logger.child({\n route: this.endpoint.route,\n host: ctx.headers.host,\n method: this.endpoint.method,\n }) as TLogger;\n const session = await this.endpoint.getSession({\n logger,\n services: ctx.services,\n header,\n cookie,\n });\n\n // Create audit context if audit storage is provided\n // The auditorStorage instance is required when endpoint uses .auditor()\n const auditorStorage = (ctx as any).auditorStorage as TAuditStorage;\n let auditContext: AuditExecutionContext<TAuditAction> | undefined;\n\n if (auditorStorage) {\n // Extract actor if configured\n let actor: AuditActor = { id: 'system', type: 'system' };\n if (this.endpoint.actorExtractor) {\n try {\n actor = await this.endpoint.actorExtractor({\n services: ctx.services as any,\n session,\n header,\n cookie,\n logger,\n });\n } catch (error) {\n logger.error(error as Error, 'Failed to extract actor for audits');\n }\n }\n\n const auditor = new DefaultAuditor<TAuditAction>({\n actor,\n storage: auditorStorage as AuditStorage,\n metadata: {\n endpoint: this.endpoint.route,\n method: this.endpoint.method,\n },\n });\n\n auditContext = { auditor, storage: auditorStorage as AuditStorage };\n }\n\n // Warn if declarative audits are configured but no audit storage\n const audits = this.endpoint.audits as MappedAudit<\n TAuditAction,\n TOutSchema\n >[];\n if (!auditContext && audits?.length) {\n logger.warn('No auditor storage service available');\n }\n\n // Use database instance directly from context\n // The database instance is required when endpoint uses .database()\n const rawDb = (ctx as any).database as TDatabase;\n\n // Execute handler with automatic audit transaction support\n const result = await executeWithAuditTransaction(\n auditContext,\n async (auditor) => {\n // Use audit transaction as db if available (when storage has same database)\n // For testing, the tester controls whether to use transactional auditing\n const trx = auditor?.getTransaction?.();\n const db = trx ?? rawDb;\n\n const responseBuilder = new ResponseBuilder();\n const response = await this.endpoint.handler(\n {\n body,\n query,\n params,\n session,\n services: ctx.services,\n logger,\n header,\n cookie,\n auditor,\n db,\n } as any,\n responseBuilder,\n );\n\n // Check if response has metadata\n let data = response;\n let metadata = responseBuilder.getMetadata();\n\n if (Endpoint.hasMetadata(response)) {\n data = response.data;\n metadata = response.metadata;\n }\n\n const output = await this.endpoint.parseOutput(data);\n\n return { output, metadata, responseBuilder };\n },\n // Process declarative audits after handler (inside transaction)\n async (result, auditor) => {\n if (!audits?.length) return;\n\n for (const audit of audits) {\n if (audit.when && !audit.when(result.output as any)) {\n continue;\n }\n const payload = audit.payload(result.output as any);\n const entityId = audit.entityId?.(result.output as any);\n auditor.audit(audit.type as any, payload as any, {\n table: audit.table,\n entityId,\n });\n }\n },\n );\n\n const { output, metadata } = result;\n\n ctx.publisher && (await this.serviceDiscovery.register([ctx.publisher]));\n await publishConstructEvents(this.endpoint, output, this.serviceDiscovery);\n\n // Convert cookies to Set-Cookie headers\n const headers: Record<string, string | string[]> = {\n ...(metadata.headers || {}),\n };\n\n if (metadata.cookies && metadata.cookies.size > 0) {\n const setCookieValues: string[] = [];\n for (const [name, cookie] of metadata.cookies.entries()) {\n setCookieValues.push(\n serializeCookie(name, cookie.value, cookie.options),\n );\n }\n headers['set-cookie'] = setCookieValues;\n }\n\n // Return HTTP response format\n return {\n body: output,\n status: metadata.status || 200,\n headers,\n };\n }\n\n async request(\n ctx: TestRequestAdaptor<\n TInput,\n TServices,\n TEventPublisher,\n TEventPublisherServiceName,\n TAuditStorage,\n TAuditStorageServiceName,\n TDatabase,\n TDatabaseServiceName\n >,\n ): Promise<InferStandardSchema<TOutSchema>> {\n const response = await this.fullRequest(ctx);\n return response.body;\n }\n}\n\n/**\n * Conditional audit storage requirement - required when TAuditStorage is configured\n */\ntype AuditStorageRequirement<\n TAuditStorage extends AuditStorage | undefined = undefined,\n> = TAuditStorage extends undefined\n ? {}\n : {\n /** Audit storage instance - required when endpoint uses .auditor() */\n auditorStorage: TAuditStorage;\n };\n\n/**\n * Conditional database requirement - required when TDatabase is configured\n */\ntype DatabaseRequirement<TDatabase = undefined> = TDatabase extends undefined\n ? {}\n : {\n /** Database instance - required when endpoint uses .database() */\n database: TDatabase;\n };\n\nexport type TestRequestAdaptor<\n TInput extends EndpointSchemas = {},\n TServices extends Service[] = [],\n TEventPublisher extends EventPublisher<any> | undefined = undefined,\n TEventPublisherServiceName extends string = string,\n TAuditStorage extends AuditStorage | undefined = undefined,\n _TAuditStorageServiceName extends string = string,\n TDatabase = undefined,\n _TDatabaseServiceName extends string = string,\n> = {\n services: ServiceRecord<TServices>;\n headers: Record<string, string>;\n publisher?: Service<TEventPublisherServiceName, TEventPublisher>;\n} & InferComposableStandardSchema<TInput> &\n AuditStorageRequirement<TAuditStorage> &\n DatabaseRequirement<TDatabase>;\n"],"mappings":";;;;;;;;;;;AAsCA,SAAS,gBACPA,MACAC,OACAC,SACQ;CACR,IAAI,gBAAgB,EAAE,KAAK,GAAG,MAAM;AAEpC,KAAI,SAAS;AACX,MAAI,QAAQ,kBACV,kBAAiB,YAAY,QAAQ,OAAO;AAE9C,MAAI,QAAQ,QACV,kBAAiB,YAAY,QAAQ,QAAQ,aAAa,CAAC;AAE7D,MAAI,QAAQ,OACV,kBAAiB,WAAW,QAAQ,OAAO;AAE7C,MAAI,QAAQ,KACV,kBAAiB,SAAS,QAAQ,KAAK;AAEzC,MAAI,QAAQ,SACV,iBAAgB;AAElB,MAAI,QAAQ,OACV,iBAAgB;AAElB,MAAI,QAAQ,SACV,kBAAiB,aAAa,QAAQ,SAAS;CAElD;AAED,QAAO;AACR;AAED,IAAa,sBAAb,MAAa,oBAkBX;CACA,OAAO,0BAmBLC,UAgBA;AACA,SAAO,iBAAiB,YACtB,SAAS,QACT,IAAI,kBAAkB,CAAE,GACzB;CACF;CACD,YACmBA,UAgBTC,mBAGJ,oBAAoB,0BAA0B,SAAS,EAC3D;EApBiB;EAgBT;CAIN;CAEJ,MAAM,YACJC,KAU4D;EAC5D,MAAM,OAAO,MAAM,KAAK,SAAS,WAAY,IAAY,MAAM,OAAO;EACtE,MAAM,QAAQ,MAAM,KAAK,SAAS,WAAY,IAAY,OAAO,QAAQ;EACzE,MAAM,SAAS,MAAM,KAAK,SAAS,WAChC,IAAY,QACb,SACD;EAED,MAAM,SAAS,SAAS,cAAc,IAAI,QAAQ;EAClD,MAAM,SAAS,SAAS,cAAc,IAAI,QAAQ,OAAO;EACzD,MAAM,SAAS,KAAK,SAAS,OAAO,MAAM;GACxC,OAAO,KAAK,SAAS;GACrB,MAAM,IAAI,QAAQ;GAClB,QAAQ,KAAK,SAAS;EACvB,EAAC;EACF,MAAM,UAAU,MAAM,KAAK,SAAS,WAAW;GAC7C;GACA,UAAU,IAAI;GACd;GACA;EACD,EAAC;EAIF,MAAM,iBAAkB,IAAY;EACpC,IAAIC;AAEJ,MAAI,gBAAgB;GAElB,IAAIC,QAAoB;IAAE,IAAI;IAAU,MAAM;GAAU;AACxD,OAAI,KAAK,SAAS,eAChB,KAAI;AACF,YAAQ,MAAM,KAAK,SAAS,eAAe;KACzC,UAAU,IAAI;KACd;KACA;KACA;KACA;IACD,EAAC;GACH,SAAQ,OAAO;AACd,WAAO,MAAM,OAAgB,qCAAqC;GACnE;GAGH,MAAM,UAAU,IAAI,eAA6B;IAC/C;IACA,SAAS;IACT,UAAU;KACR,UAAU,KAAK,SAAS;KACxB,QAAQ,KAAK,SAAS;IACvB;GACF;AAED,kBAAe;IAAE;IAAS,SAAS;GAAgC;EACpE;EAGD,MAAM,SAAS,KAAK,SAAS;AAI7B,OAAK,gBAAgB,QAAQ,OAC3B,QAAO,KAAK,uCAAuC;EAKrD,MAAM,QAAS,IAAY;EAG3B,MAAM,SAAS,MAAM,4BACnB,cACA,OAAO,YAAY;GAGjB,MAAM,MAAM,SAAS,kBAAkB;GACvC,MAAM,KAAK,OAAO;GAElB,MAAM,kBAAkB,IAAI;GAC5B,MAAM,WAAW,MAAM,KAAK,SAAS,QACnC;IACE;IACA;IACA;IACA;IACA,UAAU,IAAI;IACd;IACA;IACA;IACA;IACA;GACD,GACD,gBACD;GAGD,IAAI,OAAO;GACX,IAAIC,aAAW,gBAAgB,aAAa;AAE5C,OAAI,SAAS,YAAY,SAAS,EAAE;AAClC,WAAO,SAAS;AAChB,iBAAW,SAAS;GACrB;GAED,MAAMC,WAAS,MAAM,KAAK,SAAS,YAAY,KAAK;AAEpD,UAAO;IAAE;IAAQ;IAAU;GAAiB;EAC7C,GAED,OAAOC,UAAQ,YAAY;AACzB,QAAK,QAAQ,OAAQ;AAErB,QAAK,MAAM,SAAS,QAAQ;AAC1B,QAAI,MAAM,SAAS,MAAM,KAAKA,SAAO,OAAc,CACjD;IAEF,MAAM,UAAU,MAAM,QAAQA,SAAO,OAAc;IACnD,MAAM,WAAW,MAAM,WAAWA,SAAO,OAAc;AACvD,YAAQ,MAAM,MAAM,MAAa,SAAgB;KAC/C,OAAO,MAAM;KACb;IACD,EAAC;GACH;EACF,EACF;EAED,MAAM,EAAE,QAAQ,UAAU,GAAG;AAE7B,MAAI,aAAc,MAAM,KAAK,iBAAiB,SAAS,CAAC,IAAI,SAAU,EAAC;AACvE,QAAM,uBAAuB,KAAK,UAAU,QAAQ,KAAK,iBAAiB;EAG1E,MAAMC,UAA6C,EACjD,GAAI,SAAS,WAAW,CAAE,EAC3B;AAED,MAAI,SAAS,WAAW,SAAS,QAAQ,OAAO,GAAG;GACjD,MAAMC,kBAA4B,CAAE;AACpC,QAAK,MAAM,CAAC,MAAMC,SAAO,IAAI,SAAS,QAAQ,SAAS,CACrD,iBAAgB,KACd,gBAAgB,MAAMA,SAAO,OAAOA,SAAO,QAAQ,CACpD;AAEH,WAAQ,gBAAgB;EACzB;AAGD,SAAO;GACL,MAAM;GACN,QAAQ,SAAS,UAAU;GAC3B;EACD;CACF;CAED,MAAM,QACJR,KAU0C;EAC1C,MAAM,WAAW,MAAM,KAAK,YAAY,IAAI;AAC5C,SAAO,SAAS;CACjB;AACF"}
@@ -3,7 +3,7 @@ import "../types-Bp9ysFXd.cjs";
3
3
  import "../Function-VI1TB3Mh.cjs";
4
4
  import "../BaseFunctionBuilder-DUZMbEr3.cjs";
5
5
  import "../FunctionBuilder-CjVEFTYC.cjs";
6
- import "../index-m7xBtcAW.cjs";
6
+ import "../index-CkBMFqhI.cjs";
7
7
  import "../Authorizer-BTmly8ps.cjs";
8
8
  import "../Endpoint-Bu8Phz6y.cjs";
9
9
  import "../AmazonApiGatewayEndpointAdaptor-ro0RMLzr.cjs";
@@ -8,6 +8,6 @@ require('../Endpoint-DDpF7NO1.cjs');
8
8
  require('../processAudits-BFokHhCO.cjs');
9
9
  require('../helpers-Khuhi_Qx.cjs');
10
10
  require('../parseHonoQuery-CT8Cvin-.cjs');
11
- const require_HonoEndpointAdaptor = require('../HonoEndpointAdaptor-CfLRHHFw.cjs');
11
+ const require_HonoEndpointAdaptor = require('../HonoEndpointAdaptor-CdWWj3EJ.cjs');
12
12
 
13
13
  exports.HonoEndpoint = require_HonoEndpointAdaptor.HonoEndpoint;
@@ -3,8 +3,8 @@ import "../types-Bp9ysFXd.cjs";
3
3
  import "../Function-VI1TB3Mh.cjs";
4
4
  import "../BaseFunctionBuilder-DUZMbEr3.cjs";
5
5
  import "../FunctionBuilder-CjVEFTYC.cjs";
6
- import "../index-m7xBtcAW.cjs";
6
+ import "../index-CkBMFqhI.cjs";
7
7
  import "../Authorizer-BTmly8ps.cjs";
8
8
  import "../Endpoint-Bu8Phz6y.cjs";
9
- import { HonoEndpoint } from "../HonoEndpointAdaptor-DajXbh80.cjs";
9
+ import { HonoEndpoint } from "../HonoEndpointAdaptor-CDL4pkMO.cjs";
10
10
  export { HonoEndpoint };
@@ -6,5 +6,5 @@ import "../FunctionBuilder-D1ofSeMd.mjs";
6
6
  import "../index-Sxtb_Pzw.mjs";
7
7
  import "../Authorizer-pmPvIVgv.mjs";
8
8
  import "../Endpoint-Bbs_sFvg.mjs";
9
- import { HonoEndpoint } from "../HonoEndpointAdaptor-DsqGuEIb.mjs";
9
+ import { HonoEndpoint } from "../HonoEndpointAdaptor-BTwjymKt.mjs";
10
10
  export { HonoEndpoint };