@neetru/sdk 1.1.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/CHANGELOG.md +33 -3
  2. package/README.md +135 -159
  3. package/dist/auth.cjs +486 -40
  4. package/dist/auth.cjs.map +1 -1
  5. package/dist/auth.d.cts +1 -1
  6. package/dist/auth.d.ts +1 -1
  7. package/dist/auth.mjs +486 -40
  8. package/dist/auth.mjs.map +1 -1
  9. package/dist/catalog.cjs +64 -21
  10. package/dist/catalog.cjs.map +1 -1
  11. package/dist/catalog.d.cts +2 -2
  12. package/dist/catalog.d.ts +2 -2
  13. package/dist/catalog.mjs +64 -21
  14. package/dist/catalog.mjs.map +1 -1
  15. package/dist/checkout.cjs +61 -15
  16. package/dist/checkout.cjs.map +1 -1
  17. package/dist/checkout.d.cts +1 -1
  18. package/dist/checkout.d.ts +1 -1
  19. package/dist/checkout.mjs +61 -15
  20. package/dist/checkout.mjs.map +1 -1
  21. package/dist/db.cjs +67 -22
  22. package/dist/db.cjs.map +1 -1
  23. package/dist/db.d.cts +1 -1
  24. package/dist/db.d.ts +1 -1
  25. package/dist/db.mjs +67 -22
  26. package/dist/db.mjs.map +1 -1
  27. package/dist/entitlements.cjs +102 -21
  28. package/dist/entitlements.cjs.map +1 -1
  29. package/dist/entitlements.d.cts +11 -5
  30. package/dist/entitlements.d.ts +11 -5
  31. package/dist/entitlements.mjs +102 -21
  32. package/dist/entitlements.mjs.map +1 -1
  33. package/dist/index.cjs +491 -41
  34. package/dist/index.cjs.map +1 -1
  35. package/dist/index.d.cts +3 -3
  36. package/dist/index.d.ts +3 -3
  37. package/dist/index.mjs +488 -42
  38. package/dist/index.mjs.map +1 -1
  39. package/dist/mocks.cjs +3 -2
  40. package/dist/mocks.cjs.map +1 -1
  41. package/dist/mocks.d.cts +4 -2
  42. package/dist/mocks.d.ts +4 -2
  43. package/dist/mocks.mjs +3 -2
  44. package/dist/mocks.mjs.map +1 -1
  45. package/dist/notifications.cjs +296 -0
  46. package/dist/notifications.cjs.map +1 -0
  47. package/dist/notifications.d.cts +1 -0
  48. package/dist/notifications.d.ts +1 -0
  49. package/dist/notifications.mjs +293 -0
  50. package/dist/notifications.mjs.map +1 -0
  51. package/dist/react.cjs +7 -3
  52. package/dist/react.cjs.map +1 -1
  53. package/dist/react.d.cts +1 -1
  54. package/dist/react.d.ts +1 -1
  55. package/dist/react.mjs +7 -3
  56. package/dist/react.mjs.map +1 -1
  57. package/dist/support.cjs +61 -15
  58. package/dist/support.cjs.map +1 -1
  59. package/dist/support.d.cts +1 -1
  60. package/dist/support.d.ts +1 -1
  61. package/dist/support.mjs +61 -15
  62. package/dist/support.mjs.map +1 -1
  63. package/dist/telemetry.cjs +131 -16
  64. package/dist/telemetry.cjs.map +1 -1
  65. package/dist/telemetry.d.cts +17 -1
  66. package/dist/telemetry.d.ts +17 -1
  67. package/dist/telemetry.mjs +131 -16
  68. package/dist/telemetry.mjs.map +1 -1
  69. package/dist/{types-BA53dd8S.d.cts → types-CQAfwqUS.d.cts} +172 -8
  70. package/dist/{types-BA53dd8S.d.ts → types-CQAfwqUS.d.ts} +172 -8
  71. package/dist/usage.cjs +61 -15
  72. package/dist/usage.cjs.map +1 -1
  73. package/dist/usage.d.cts +1 -1
  74. package/dist/usage.d.ts +1 -1
  75. package/dist/usage.mjs +61 -15
  76. package/dist/usage.mjs.map +1 -1
  77. package/dist/webhooks.cjs +316 -0
  78. package/dist/webhooks.cjs.map +1 -0
  79. package/dist/webhooks.d.cts +1 -0
  80. package/dist/webhooks.d.ts +1 -0
  81. package/dist/webhooks.mjs +312 -0
  82. package/dist/webhooks.mjs.map +1 -0
  83. package/package.json +22 -6
@@ -0,0 +1,312 @@
1
+ var __require = /* @__PURE__ */ ((x) => typeof require !== "undefined" ? require : typeof Proxy !== "undefined" ? new Proxy(x, {
2
+ get: (a, b) => (typeof require !== "undefined" ? require : a)[b]
3
+ }) : x)(function(x) {
4
+ if (typeof require !== "undefined") return require.apply(this, arguments);
5
+ throw Error('Dynamic require of "' + x + '" is not supported');
6
+ });
7
+
8
+ // src/errors.ts
9
+ var NeetruError = class _NeetruError extends Error {
10
+ code;
11
+ status;
12
+ requestId;
13
+ constructor(code, message, status, requestId) {
14
+ super(message);
15
+ this.name = "NeetruError";
16
+ this.code = code;
17
+ this.status = status;
18
+ this.requestId = requestId;
19
+ Object.setPrototypeOf(this, _NeetruError.prototype);
20
+ }
21
+ };
22
+
23
+ // src/http.ts
24
+ var DEFAULT_RETRIES = 2;
25
+ var RETRYABLE_CODES = /* @__PURE__ */ new Set([
26
+ "rate_limited",
27
+ "server_error",
28
+ "network_error"
29
+ ]);
30
+ function backoffMs(attempt) {
31
+ const base = 200 * Math.pow(4, attempt);
32
+ const jitter = base * 0.2 * (Math.random() * 2 - 1);
33
+ return Math.max(50, Math.round(base + jitter));
34
+ }
35
+ function parseRetryAfter(value) {
36
+ if (!value) return null;
37
+ const secs = Number(value);
38
+ if (Number.isFinite(secs) && secs >= 0) return Math.round(secs * 1e3);
39
+ const dateMs = Date.parse(value);
40
+ if (Number.isFinite(dateMs)) {
41
+ const delta = dateMs - Date.now();
42
+ if (delta > 0) return delta;
43
+ }
44
+ return null;
45
+ }
46
+ function sleep(ms) {
47
+ return new Promise((resolve) => setTimeout(resolve, ms));
48
+ }
49
+ function statusToCode(status) {
50
+ if (status === 401) return "unauthorized";
51
+ if (status === 403) return "forbidden";
52
+ if (status === 404) return "not_found";
53
+ if (status === 422 || status === 400) return "validation_failed";
54
+ if (status === 429) return "rate_limited";
55
+ if (status >= 500) return "server_error";
56
+ return "unknown";
57
+ }
58
+ function buildUrl(baseUrl, path, query) {
59
+ const base = baseUrl.replace(/\/+$/, "");
60
+ const p = path.startsWith("/") ? path : `/${path}`;
61
+ const url = new URL(`${base}${p}`);
62
+ if (query) {
63
+ for (const [k, v] of Object.entries(query)) {
64
+ if (v === void 0) continue;
65
+ url.searchParams.set(k, String(v));
66
+ }
67
+ }
68
+ return url.toString();
69
+ }
70
+ async function safeJson(res) {
71
+ const text = await res.text();
72
+ if (!text) return void 0;
73
+ try {
74
+ return JSON.parse(text);
75
+ } catch {
76
+ return void 0;
77
+ }
78
+ }
79
+ async function httpRequest(config, opts) {
80
+ const method = opts.method ?? "GET";
81
+ const url = buildUrl(config.baseUrl, opts.path, opts.query);
82
+ const maxRetries = opts.retries ?? DEFAULT_RETRIES;
83
+ const headers = {
84
+ accept: "application/json",
85
+ ...opts.headers
86
+ };
87
+ if (opts.requireAuth) {
88
+ if (!config.apiKey) {
89
+ throw new NeetruError(
90
+ "missing_api_key",
91
+ "This operation requires an apiKey. Pass it to createNeetruClient({ apiKey }) or set NEETRU_API_KEY env var."
92
+ );
93
+ }
94
+ headers.authorization = `Bearer ${config.apiKey}`;
95
+ }
96
+ const bodyString = opts.body !== void 0 && method !== "GET" && method !== "DELETE" ? JSON.stringify(opts.body) : void 0;
97
+ if (bodyString !== void 0) {
98
+ headers["content-type"] = "application/json";
99
+ }
100
+ let lastError = null;
101
+ for (let attempt = 0; attempt <= maxRetries; attempt++) {
102
+ const init = { method, headers };
103
+ if (bodyString !== void 0) init.body = bodyString;
104
+ init.signal = AbortSignal.timeout(3e4);
105
+ let res;
106
+ try {
107
+ res = await config.fetch(url, init);
108
+ } catch (err2) {
109
+ const message2 = err2 instanceof DOMException && err2.name === "TimeoutError" ? "Network error: timeout after 30s" : `Network error: ${err2 instanceof Error ? err2.message : "fetch failed"}`;
110
+ lastError = new NeetruError("network_error", message2);
111
+ if (attempt < maxRetries) {
112
+ await sleep(backoffMs(attempt));
113
+ continue;
114
+ }
115
+ throw lastError;
116
+ }
117
+ const requestId = res.headers.get("x-request-id") ?? res.headers.get("x-correlation-id") ?? void 0;
118
+ if (res.ok) {
119
+ const parsed = await safeJson(res);
120
+ return parsed;
121
+ }
122
+ const body = await safeJson(res);
123
+ let code = statusToCode(res.status);
124
+ let message = `HTTP ${res.status}`;
125
+ if (body && typeof body === "object" && "error" in body) {
126
+ const errField = body.error;
127
+ if (typeof errField === "string") {
128
+ message = errField;
129
+ } else if (errField && typeof errField === "object") {
130
+ if (typeof errField.code === "string") code = errField.code;
131
+ if (typeof errField.message === "string") message = errField.message;
132
+ }
133
+ }
134
+ const err = new NeetruError(code, message, res.status, requestId);
135
+ lastError = err;
136
+ const isRetryable = RETRYABLE_CODES.has(code);
137
+ if (isRetryable && attempt < maxRetries) {
138
+ const retryAfter = parseRetryAfter(res.headers.get("retry-after"));
139
+ const delay = retryAfter ?? backoffMs(attempt);
140
+ await sleep(delay);
141
+ continue;
142
+ }
143
+ throw err;
144
+ }
145
+ throw lastError ?? new NeetruError("unknown", "unexpected httpRequest exit");
146
+ }
147
+
148
+ // src/webhooks.ts
149
+ function verifyWebhookSignature(payload, signature, secret) {
150
+ if (!signature || !secret) return false;
151
+ const sigHex = signature.startsWith("sha256=") ? signature.slice(7) : signature;
152
+ if (!/^[0-9a-f]+$/i.test(sigHex)) return false;
153
+ let nodeCrypto;
154
+ try {
155
+ nodeCrypto = __require("crypto");
156
+ } catch {
157
+ if (typeof console !== "undefined") {
158
+ console.warn(
159
+ "[neetru-sdk] verifyWebhookSignature requires Node crypto. In browser, use WebCrypto subtle.verify directly."
160
+ );
161
+ }
162
+ return false;
163
+ }
164
+ const computed = nodeCrypto.createHmac("sha256", secret).update(payload).digest("hex");
165
+ const a = Buffer.from(computed, "hex");
166
+ const b = Buffer.from(sigHex.toLowerCase(), "hex");
167
+ if (a.length !== b.length) return false;
168
+ return nodeCrypto.timingSafeEqual(a, b);
169
+ }
170
+ var VALID_EVENTS = [
171
+ "subscription.activated",
172
+ "subscription.cancelled",
173
+ "subscription.payment_failed",
174
+ "subscription.trial_ending",
175
+ "usage.quota_exceeded",
176
+ "account.suspended",
177
+ "account.reactivated",
178
+ "support.ticket_replied"
179
+ ];
180
+ function toEndpoint(raw) {
181
+ if (!raw || typeof raw !== "object") {
182
+ throw new NeetruError("invalid_response", "Webhook response is not an object");
183
+ }
184
+ const r = raw;
185
+ if (typeof r.id !== "string") {
186
+ throw new NeetruError("invalid_response", "Webhook missing id");
187
+ }
188
+ return {
189
+ id: r.id,
190
+ url: typeof r.url === "string" ? r.url : "",
191
+ events: Array.isArray(r.events) ? r.events.filter(
192
+ (e) => VALID_EVENTS.includes(e)
193
+ ) : [],
194
+ hasSecret: r.hasSecret === true,
195
+ status: r.status === "active" || r.status === "degraded" || r.status === "disabled" ? r.status : "active",
196
+ lastDeliveryAt: typeof r.lastDeliveryAt === "string" ? r.lastDeliveryAt : void 0,
197
+ consecutiveFailures: typeof r.consecutiveFailures === "number" ? r.consecutiveFailures : void 0,
198
+ createdAt: typeof r.createdAt === "string" ? r.createdAt : (/* @__PURE__ */ new Date()).toISOString()
199
+ };
200
+ }
201
+ function validateInput(input) {
202
+ if (!input.url || typeof input.url !== "string") {
203
+ throw new NeetruError("validation_failed", "url \xE9 obrigat\xF3ria");
204
+ }
205
+ try {
206
+ const parsed = new URL(input.url);
207
+ if (parsed.protocol !== "https:" && parsed.protocol !== "http:") {
208
+ throw new Error("invalid protocol");
209
+ }
210
+ } catch {
211
+ throw new NeetruError("validation_failed", `url inv\xE1lida: ${input.url}`);
212
+ }
213
+ if (!Array.isArray(input.events) || input.events.length === 0) {
214
+ throw new NeetruError("validation_failed", "events deve ter pelo menos 1 evento");
215
+ }
216
+ for (const ev of input.events) {
217
+ if (!VALID_EVENTS.includes(ev)) {
218
+ throw new NeetruError("validation_failed", `evento desconhecido: ${ev}`);
219
+ }
220
+ }
221
+ if (input.secret !== void 0 && input.secret.length < 16) {
222
+ throw new NeetruError("validation_failed", "secret deve ter \u226516 chars (recomendado 32+)");
223
+ }
224
+ }
225
+ function createWebhooksNamespace(config) {
226
+ return {
227
+ async register(input) {
228
+ validateInput(input);
229
+ const raw = await httpRequest(config, {
230
+ method: "POST",
231
+ path: "/api/sdk/v1/webhooks",
232
+ body: input,
233
+ requireAuth: true
234
+ });
235
+ return toEndpoint(raw);
236
+ },
237
+ async list() {
238
+ const raw = await httpRequest(config, {
239
+ method: "GET",
240
+ path: "/api/sdk/v1/webhooks",
241
+ requireAuth: true
242
+ });
243
+ const list = Array.isArray(raw?.endpoints) ? raw.endpoints : [];
244
+ return list.map(toEndpoint);
245
+ },
246
+ async unregister(id) {
247
+ if (!id) throw new NeetruError("validation_failed", "id obrigat\xF3rio");
248
+ await httpRequest(config, {
249
+ method: "DELETE",
250
+ path: `/api/sdk/v1/webhooks/${encodeURIComponent(id)}`,
251
+ requireAuth: true
252
+ });
253
+ return { ok: true };
254
+ },
255
+ async test(id) {
256
+ if (!id) throw new NeetruError("validation_failed", "id obrigat\xF3rio");
257
+ const raw = await httpRequest(config, {
258
+ method: "POST",
259
+ path: `/api/sdk/v1/webhooks/${encodeURIComponent(id)}/test`,
260
+ requireAuth: true
261
+ });
262
+ if (!raw || typeof raw !== "object") {
263
+ return { ok: false, error: "invalid response" };
264
+ }
265
+ const r = raw;
266
+ return {
267
+ ok: r.ok === true,
268
+ statusCode: typeof r.statusCode === "number" ? r.statusCode : void 0,
269
+ durationMs: typeof r.durationMs === "number" ? r.durationMs : void 0,
270
+ error: typeof r.error === "string" ? r.error : void 0
271
+ };
272
+ }
273
+ };
274
+ }
275
+ var MockWebhooks = class {
276
+ endpoints = /* @__PURE__ */ new Map();
277
+ nextId = 1;
278
+ async register(input) {
279
+ validateInput(input);
280
+ const id = `mock_wh_${this.nextId++}`;
281
+ const endpoint = {
282
+ id,
283
+ url: input.url,
284
+ events: input.events,
285
+ hasSecret: !!input.secret,
286
+ status: "active",
287
+ createdAt: (/* @__PURE__ */ new Date()).toISOString()
288
+ };
289
+ this.endpoints.set(id, endpoint);
290
+ return endpoint;
291
+ }
292
+ async list() {
293
+ return [...this.endpoints.values()];
294
+ }
295
+ async unregister(id) {
296
+ if (!this.endpoints.has(id)) {
297
+ throw new NeetruError("not_found", `Webhook ${id} n\xE3o encontrado`);
298
+ }
299
+ this.endpoints.delete(id);
300
+ return { ok: true };
301
+ }
302
+ async test(id) {
303
+ if (!this.endpoints.has(id)) {
304
+ throw new NeetruError("not_found", `Webhook ${id} n\xE3o encontrado`);
305
+ }
306
+ return { ok: true, statusCode: 200, durationMs: 42 };
307
+ }
308
+ };
309
+
310
+ export { MockWebhooks, createWebhooksNamespace, verifyWebhookSignature };
311
+ //# sourceMappingURL=webhooks.mjs.map
312
+ //# sourceMappingURL=webhooks.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/errors.ts","../src/http.ts","../src/webhooks.ts"],"names":["err","message"],"mappings":";;;;;;;;AAgCO,IAAM,WAAA,GAAN,MAAM,YAAA,SAAoB,KAAA,CAAM;AAAA,EACrB,IAAA;AAAA,EACA,MAAA;AAAA,EACA,SAAA;AAAA,EAEhB,WAAA,CACE,IAAA,EACA,OAAA,EACA,MAAA,EACA,SAAA,EACA;AACA,IAAA,KAAA,CAAM,OAAO,CAAA;AACb,IAAA,IAAA,CAAK,IAAA,GAAO,aAAA;AACZ,IAAA,IAAA,CAAK,IAAA,GAAO,IAAA;AACZ,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,SAAA,GAAY,SAAA;AAEjB,IAAA,MAAA,CAAO,cAAA,CAAe,IAAA,EAAM,YAAA,CAAY,SAAS,CAAA;AAAA,EACnD;AACF,CAAA;;;ACXA,IAAM,eAAA,GAAkB,CAAA;AACxB,IAAM,eAAA,uBAAsB,GAAA,CAAqB;AAAA,EAC/C,cAAA;AAAA,EACA,cAAA;AAAA,EACA;AACF,CAAC,CAAA;AAGD,SAAS,UAAU,OAAA,EAAyB;AAC1C,EAAA,MAAM,IAAA,GAAO,GAAA,GAAM,IAAA,CAAK,GAAA,CAAI,GAAG,OAAO,CAAA;AACtC,EAAA,MAAM,SAAS,IAAA,GAAO,GAAA,IAAO,IAAA,CAAK,MAAA,KAAW,CAAA,GAAI,CAAA,CAAA;AACjD,EAAA,OAAO,KAAK,GAAA,CAAI,EAAA,EAAI,KAAK,KAAA,CAAM,IAAA,GAAO,MAAM,CAAC,CAAA;AAC/C;AAMA,SAAS,gBAAgB,KAAA,EAAqC;AAC5D,EAAA,IAAI,CAAC,OAAO,OAAO,IAAA;AACnB,EAAA,MAAM,IAAA,GAAO,OAAO,KAAK,CAAA;AACzB,EAAA,IAAI,MAAA,CAAO,QAAA,CAAS,IAAI,CAAA,IAAK,IAAA,IAAQ,GAAG,OAAO,IAAA,CAAK,KAAA,CAAM,IAAA,GAAO,GAAI,CAAA;AACrE,EAAA,MAAM,MAAA,GAAS,IAAA,CAAK,KAAA,CAAM,KAAK,CAAA;AAC/B,EAAA,IAAI,MAAA,CAAO,QAAA,CAAS,MAAM,CAAA,EAAG;AAC3B,IAAA,MAAM,KAAA,GAAQ,MAAA,GAAS,IAAA,CAAK,GAAA,EAAI;AAChC,IAAA,IAAI,KAAA,GAAQ,GAAG,OAAO,KAAA;AAAA,EACxB;AACA,EAAA,OAAO,IAAA;AACT;AAEA,SAAS,MAAM,EAAA,EAA2B;AACxC,EAAA,OAAO,IAAI,OAAA,CAAQ,CAAC,YAAY,UAAA,CAAW,OAAA,EAAS,EAAE,CAAC,CAAA;AACzD;AAGA,SAAS,aAAa,MAAA,EAAiC;AACrD,EAAA,IAAI,MAAA,KAAW,KAAK,OAAO,cAAA;AAC3B,EAAA,IAAI,MAAA,KAAW,KAAK,OAAO,WAAA;AAC3B,EAAA,IAAI,MAAA,KAAW,KAAK,OAAO,WAAA;AAC3B,EAAA,IAAI,MAAA,KAAW,GAAA,IAAO,MAAA,KAAW,GAAA,EAAK,OAAO,mBAAA;AAC7C,EAAA,IAAI,MAAA,KAAW,KAAK,OAAO,cAAA;AAC3B,EAAA,IAAI,MAAA,IAAU,KAAK,OAAO,cAAA;AAC1B,EAAA,OAAO,SAAA;AACT;AAEA,SAAS,QAAA,CAAS,OAAA,EAAiB,IAAA,EAAc,KAAA,EAA6C;AAE5F,EAAA,MAAM,IAAA,GAAO,OAAA,CAAQ,OAAA,CAAQ,MAAA,EAAQ,EAAE,CAAA;AACvC,EAAA,MAAM,IAAI,IAAA,CAAK,UAAA,CAAW,GAAG,CAAA,GAAI,IAAA,GAAO,IAAI,IAAI,CAAA,CAAA;AAChD,EAAA,MAAM,MAAM,IAAI,GAAA,CAAI,GAAG,IAAI,CAAA,EAAG,CAAC,CAAA,CAAE,CAAA;AACjC,EAAA,IAAI,KAAA,EAAO;AACT,IAAA,KAAA,MAAW,CAAC,CAAA,EAAG,CAAC,KAAK,MAAA,CAAO,OAAA,CAAQ,KAAK,CAAA,EAAG;AAC1C,MAAA,IAAI,MAAM,MAAA,EAAW;AACrB,MAAA,GAAA,CAAI,YAAA,CAAa,GAAA,CAAI,CAAA,EAAG,MAAA,CAAO,CAAC,CAAC,CAAA;AAAA,IACnC;AAAA,EACF;AACA,EAAA,OAAO,IAAI,QAAA,EAAS;AACtB;AAGA,eAAe,SAAS,GAAA,EAAiC;AACvD,EAAA,MAAM,IAAA,GAAO,MAAM,GAAA,CAAI,IAAA,EAAK;AAC5B,EAAA,IAAI,CAAC,MAAM,OAAO,MAAA;AAClB,EAAA,IAAI;AACF,IAAA,OAAO,IAAA,CAAK,MAAM,IAAI,CAAA;AAAA,EACxB,CAAA,CAAA,MAAQ;AACN,IAAA,OAAO,MAAA;AAAA,EACT;AACF;AAQA,eAAsB,WAAA,CACpB,QACA,IAAA,EACY;AACZ,EAAA,MAAM,MAAA,GAAS,KAAK,MAAA,IAAU,KAAA;AAC9B,EAAA,MAAM,MAAM,QAAA,CAAS,MAAA,CAAO,SAAS,IAAA,CAAK,IAAA,EAAM,KAAK,KAAK,CAAA;AAC1D,EAAA,MAAM,UAAA,GAAa,KAAK,OAAA,IAAW,eAAA;AAEnC,EAAA,MAAM,OAAA,GAAkC;AAAA,IACtC,MAAA,EAAQ,kBAAA;AAAA,IACR,GAAG,IAAA,CAAK;AAAA,GACV;AAEA,EAAA,IAAI,KAAK,WAAA,EAAa;AACpB,IAAA,IAAI,CAAC,OAAO,MAAA,EAAQ;AAClB,MAAA,MAAM,IAAI,WAAA;AAAA,QACR,iBAAA;AAAA,QACA;AAAA,OACF;AAAA,IACF;AACA,IAAA,OAAA,CAAQ,aAAA,GAAgB,CAAA,OAAA,EAAU,MAAA,CAAO,MAAM,CAAA,CAAA;AAAA,EACjD;AAGA,EAAA,MAAM,UAAA,GACJ,IAAA,CAAK,IAAA,KAAS,MAAA,IAAa,MAAA,KAAW,KAAA,IAAS,MAAA,KAAW,QAAA,GACtD,IAAA,CAAK,SAAA,CAAU,IAAA,CAAK,IAAI,CAAA,GACxB,MAAA;AACN,EAAA,IAAI,eAAe,MAAA,EAAW;AAC5B,IAAA,OAAA,CAAQ,cAAc,CAAA,GAAI,kBAAA;AAAA,EAC5B;AAEA,EAAA,IAAI,SAAA,GAAgC,IAAA;AAEpC,EAAA,KAAA,IAAS,OAAA,GAAU,CAAA,EAAG,OAAA,IAAW,UAAA,EAAY,OAAA,EAAA,EAAW;AACtD,IAAA,MAAM,IAAA,GAAoB,EAAE,MAAA,EAAQ,OAAA,EAAQ;AAC5C,IAAA,IAAI,UAAA,KAAe,MAAA,EAAW,IAAA,CAAK,IAAA,GAAO,UAAA;AAG1C,IAAA,IAAA,CAAK,MAAA,GAAS,WAAA,CAAY,OAAA,CAAQ,GAAM,CAAA;AAExC,IAAA,IAAI,GAAA;AACJ,IAAA,IAAI;AACF,MAAA,GAAA,GAAM,MAAM,MAAA,CAAO,KAAA,CAAM,GAAA,EAAK,IAAI,CAAA;AAAA,IACpC,SAASA,IAAAA,EAAK;AACZ,MAAA,MAAMC,QAAAA,GACJD,IAAAA,YAAe,YAAA,IAAgBA,IAAAA,CAAI,IAAA,KAAS,cAAA,GACxC,kCAAA,GACA,CAAA,eAAA,EAAkBA,IAAAA,YAAe,KAAA,GAAQA,IAAAA,CAAI,OAAA,GAAU,cAAc,CAAA,CAAA;AAC3E,MAAA,SAAA,GAAY,IAAI,WAAA,CAAY,eAAA,EAAiBC,QAAO,CAAA;AACpD,MAAA,IAAI,UAAU,UAAA,EAAY;AACxB,QAAA,MAAM,KAAA,CAAM,SAAA,CAAU,OAAO,CAAC,CAAA;AAC9B,QAAA;AAAA,MACF;AACA,MAAA,MAAM,SAAA;AAAA,IACR;AAEA,IAAA,MAAM,SAAA,GACJ,GAAA,CAAI,OAAA,CAAQ,GAAA,CAAI,cAAc,KAAK,GAAA,CAAI,OAAA,CAAQ,GAAA,CAAI,kBAAkB,CAAA,IAAK,MAAA;AAE5E,IAAA,IAAI,IAAI,EAAA,EAAI;AACV,MAAA,MAAM,MAAA,GAAS,MAAM,QAAA,CAAS,GAAG,CAAA;AACjC,MAAA,OAAO,MAAA;AAAA,IACT;AAEA,IAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,GAAG,CAAA;AAGhC,IAAA,IAAI,IAAA,GAAe,YAAA,CAAa,GAAA,CAAI,MAAM,CAAA;AAC1C,IAAA,IAAI,OAAA,GAAU,CAAA,KAAA,EAAQ,GAAA,CAAI,MAAM,CAAA,CAAA;AAChC,IAAA,IAAI,IAAA,IAAQ,OAAO,IAAA,KAAS,QAAA,IAAY,WAAW,IAAA,EAAM;AACvD,MAAA,MAAM,WAAW,IAAA,CAAK,KAAA;AACtB,MAAA,IAAI,OAAO,aAAa,QAAA,EAAU;AAChC,QAAA,OAAA,GAAU,QAAA;AAAA,MACZ,CAAA,MAAA,IAAW,QAAA,IAAY,OAAO,QAAA,KAAa,QAAA,EAAU;AACnD,QAAA,IAAI,OAAO,QAAA,CAAS,IAAA,KAAS,QAAA,SAAiB,QAAA,CAAS,IAAA;AACvD,QAAA,IAAI,OAAO,QAAA,CAAS,OAAA,KAAY,QAAA,YAAoB,QAAA,CAAS,OAAA;AAAA,MAC/D;AAAA,IACF;AACA,IAAA,MAAM,MAAM,IAAI,WAAA,CAAY,MAAM,OAAA,EAAS,GAAA,CAAI,QAAQ,SAAS,CAAA;AAChE,IAAA,SAAA,GAAY,GAAA;AAEZ,IAAA,MAAM,WAAA,GAAc,eAAA,CAAgB,GAAA,CAAI,IAAuB,CAAA;AAC/D,IAAA,IAAI,WAAA,IAAe,UAAU,UAAA,EAAY;AACvC,MAAA,MAAM,aAAa,eAAA,CAAgB,GAAA,CAAI,OAAA,CAAQ,GAAA,CAAI,aAAa,CAAC,CAAA;AACjE,MAAA,MAAM,KAAA,GAAQ,UAAA,IAAc,SAAA,CAAU,OAAO,CAAA;AAC7C,MAAA,MAAM,MAAM,KAAK,CAAA;AACjB,MAAA;AAAA,IACF;AACA,IAAA,MAAM,GAAA;AAAA,EACR;AAGA,EAAA,MAAM,SAAA,IAAa,IAAI,WAAA,CAAY,SAAA,EAAW,6BAA6B,CAAA;AAC7E;;;AClGO,SAAS,sBAAA,CACd,OAAA,EACA,SAAA,EACA,MAAA,EACS;AACT,EAAA,IAAI,CAAC,SAAA,IAAa,CAAC,MAAA,EAAQ,OAAO,KAAA;AAElC,EAAA,MAAM,MAAA,GAAS,UAAU,UAAA,CAAW,SAAS,IAAI,SAAA,CAAU,KAAA,CAAM,CAAC,CAAA,GAAI,SAAA;AACtE,EAAA,IAAI,CAAC,cAAA,CAAe,IAAA,CAAK,MAAM,GAAG,OAAO,KAAA;AAOzC,EAAA,IAAI,UAAA;AACJ,EAAA,IAAI;AAEF,IAAA,UAAA,GAAa,UAAQ,QAAa,CAAA;AAAA,EACpC,CAAA,CAAA,MAAQ;AACN,IAAA,IAAI,OAAO,YAAY,WAAA,EAAa;AAClC,MAAA,OAAA,CAAQ,IAAA;AAAA,QACN;AAAA,OACF;AAAA,IACF;AACA,IAAA,OAAO,KAAA;AAAA,EACT;AAEA,EAAA,MAAM,QAAA,GAAW,UAAA,CAAW,UAAA,CAAW,QAAA,EAAU,MAAM,EAAE,MAAA,CAAO,OAAO,CAAA,CAAE,MAAA,CAAO,KAAK,CAAA;AACrF,EAAA,MAAM,CAAA,GAAI,MAAA,CAAO,IAAA,CAAK,QAAA,EAAU,KAAK,CAAA;AACrC,EAAA,MAAM,IAAI,MAAA,CAAO,IAAA,CAAK,MAAA,CAAO,WAAA,IAAe,KAAK,CAAA;AACjD,EAAA,IAAI,CAAA,CAAE,MAAA,KAAW,CAAA,CAAE,MAAA,EAAQ,OAAO,KAAA;AAClC,EAAA,OAAO,UAAA,CAAW,eAAA,CAAgB,CAAA,EAAG,CAAC,CAAA;AACxC;AAIA,IAAM,YAAA,GAAwC;AAAA,EAC5C,wBAAA;AAAA,EACA,wBAAA;AAAA,EACA,6BAAA;AAAA,EACA,2BAAA;AAAA,EACA,sBAAA;AAAA,EACA,mBAAA;AAAA,EACA,qBAAA;AAAA,EACA;AACF,CAAA;AAEA,SAAS,WAAW,GAAA,EAA+B;AACjD,EAAA,IAAI,CAAC,GAAA,IAAO,OAAO,GAAA,KAAQ,QAAA,EAAU;AACnC,IAAA,MAAM,IAAI,WAAA,CAAY,kBAAA,EAAoB,mCAAmC,CAAA;AAAA,EAC/E;AACA,EAAA,MAAM,CAAA,GAAI,GAAA;AACV,EAAA,IAAI,OAAO,CAAA,CAAE,EAAA,KAAO,QAAA,EAAU;AAC5B,IAAA,MAAM,IAAI,WAAA,CAAY,kBAAA,EAAoB,oBAAoB,CAAA;AAAA,EAChE;AACA,EAAA,OAAO;AAAA,IACL,IAAI,CAAA,CAAE,EAAA;AAAA,IACN,KAAK,OAAO,CAAA,CAAE,GAAA,KAAQ,QAAA,GAAW,EAAE,GAAA,GAAM,EAAA;AAAA,IACzC,QAAQ,KAAA,CAAM,OAAA,CAAQ,EAAE,MAAM,CAAA,GACzB,EAAE,MAAA,CAAqB,MAAA;AAAA,MAAO,CAAC,CAAA,KAC9B,YAAA,CAAa,QAAA,CAAS,CAAiB;AAAA,QAEzC,EAAC;AAAA,IACL,SAAA,EAAW,EAAE,SAAA,KAAc,IAAA;AAAA,IAC3B,MAAA,EACE,CAAA,CAAE,MAAA,KAAW,QAAA,IAAY,CAAA,CAAE,MAAA,KAAW,UAAA,IAAc,CAAA,CAAE,MAAA,KAAW,UAAA,GAC7D,CAAA,CAAE,MAAA,GACF,QAAA;AAAA,IACN,gBAAgB,OAAO,CAAA,CAAE,cAAA,KAAmB,QAAA,GAAW,EAAE,cAAA,GAAiB,MAAA;AAAA,IAC1E,qBACE,OAAO,CAAA,CAAE,mBAAA,KAAwB,QAAA,GAAW,EAAE,mBAAA,GAAsB,MAAA;AAAA,IACtE,SAAA,EAAW,OAAO,CAAA,CAAE,SAAA,KAAc,QAAA,GAAW,EAAE,SAAA,GAAA,iBAAY,IAAI,IAAA,EAAK,EAAE,WAAA;AAAY,GACpF;AACF;AAEA,SAAS,cAAc,KAAA,EAAmC;AACxD,EAAA,IAAI,CAAC,KAAA,CAAM,GAAA,IAAO,OAAO,KAAA,CAAM,QAAQ,QAAA,EAAU;AAC/C,IAAA,MAAM,IAAI,WAAA,CAAY,mBAAA,EAAqB,yBAAmB,CAAA;AAAA,EAChE;AACA,EAAA,IAAI;AACF,IAAA,MAAM,MAAA,GAAS,IAAI,GAAA,CAAI,KAAA,CAAM,GAAG,CAAA;AAChC,IAAA,IAAI,MAAA,CAAO,QAAA,KAAa,QAAA,IAAY,MAAA,CAAO,aAAa,OAAA,EAAS;AAC/D,MAAA,MAAM,IAAI,MAAM,kBAAkB,CAAA;AAAA,IACpC;AAAA,EAEF,CAAA,CAAA,MAAQ;AACN,IAAA,MAAM,IAAI,WAAA,CAAY,mBAAA,EAAqB,CAAA,iBAAA,EAAiB,KAAA,CAAM,GAAG,CAAA,CAAE,CAAA;AAAA,EACzE;AACA,EAAA,IAAI,CAAC,MAAM,OAAA,CAAQ,KAAA,CAAM,MAAM,CAAA,IAAK,KAAA,CAAM,MAAA,CAAO,MAAA,KAAW,CAAA,EAAG;AAC7D,IAAA,MAAM,IAAI,WAAA,CAAY,mBAAA,EAAqB,qCAAqC,CAAA;AAAA,EAClF;AACA,EAAA,KAAA,MAAW,EAAA,IAAM,MAAM,MAAA,EAAQ;AAC7B,IAAA,IAAI,CAAC,YAAA,CAAa,QAAA,CAAS,EAAE,CAAA,EAAG;AAC9B,MAAA,MAAM,IAAI,WAAA,CAAY,mBAAA,EAAqB,CAAA,qBAAA,EAAwB,EAAE,CAAA,CAAE,CAAA;AAAA,IACzE;AAAA,EACF;AACA,EAAA,IAAI,MAAM,MAAA,KAAW,MAAA,IAAa,KAAA,CAAM,MAAA,CAAO,SAAS,EAAA,EAAI;AAC1D,IAAA,MAAM,IAAI,WAAA,CAAY,mBAAA,EAAqB,kDAA6C,CAAA;AAAA,EAC1F;AACF;AAEO,SAAS,wBAAwB,MAAA,EAA2C;AACjF,EAAA,OAAO;AAAA,IACL,MAAM,SAAS,KAAA,EAAO;AACpB,MAAA,aAAA,CAAc,KAAK,CAAA;AACnB,MAAA,MAAM,GAAA,GAAM,MAAM,WAAA,CAAqB,MAAA,EAAQ;AAAA,QAC7C,MAAA,EAAQ,MAAA;AAAA,QACR,IAAA,EAAM,sBAAA;AAAA,QACN,IAAA,EAAM,KAAA;AAAA,QACN,WAAA,EAAa;AAAA,OACd,CAAA;AACD,MAAA,OAAO,WAAW,GAAG,CAAA;AAAA,IACvB,CAAA;AAAA,IACA,MAAM,IAAA,GAAO;AACX,MAAA,MAAM,GAAA,GAAM,MAAM,WAAA,CAAuC,MAAA,EAAQ;AAAA,QAC/D,MAAA,EAAQ,KAAA;AAAA,QACR,IAAA,EAAM,sBAAA;AAAA,QACN,WAAA,EAAa;AAAA,OACd,CAAA;AACD,MAAA,MAAM,IAAA,GAAO,MAAM,OAAA,CAAQ,GAAA,EAAK,SAAS,CAAA,GAAI,GAAA,CAAI,YAAY,EAAC;AAC9D,MAAA,OAAO,IAAA,CAAK,IAAI,UAAU,CAAA;AAAA,IAC5B,CAAA;AAAA,IACA,MAAM,WAAW,EAAA,EAAI;AACnB,MAAA,IAAI,CAAC,EAAA,EAAI,MAAM,IAAI,WAAA,CAAY,qBAAqB,mBAAgB,CAAA;AACpE,MAAA,MAAM,YAAqB,MAAA,EAAQ;AAAA,QACjC,MAAA,EAAQ,QAAA;AAAA,QACR,IAAA,EAAM,CAAA,qBAAA,EAAwB,kBAAA,CAAmB,EAAE,CAAC,CAAA,CAAA;AAAA,QACpD,WAAA,EAAa;AAAA,OACd,CAAA;AACD,MAAA,OAAO,EAAE,IAAI,IAAA,EAAK;AAAA,IACpB,CAAA;AAAA,IACA,MAAM,KAAK,EAAA,EAAI;AACb,MAAA,IAAI,CAAC,EAAA,EAAI,MAAM,IAAI,WAAA,CAAY,qBAAqB,mBAAgB,CAAA;AACpE,MAAA,MAAM,GAAA,GAAM,MAAM,WAAA,CAAqB,MAAA,EAAQ;AAAA,QAC7C,MAAA,EAAQ,MAAA;AAAA,QACR,IAAA,EAAM,CAAA,qBAAA,EAAwB,kBAAA,CAAmB,EAAE,CAAC,CAAA,KAAA,CAAA;AAAA,QACpD,WAAA,EAAa;AAAA,OACd,CAAA;AACD,MAAA,IAAI,CAAC,GAAA,IAAO,OAAO,GAAA,KAAQ,QAAA,EAAU;AACnC,QAAA,OAAO,EAAE,EAAA,EAAI,KAAA,EAAO,KAAA,EAAO,kBAAA,EAAmB;AAAA,MAChD;AACA,MAAA,MAAM,CAAA,GAAI,GAAA;AACV,MAAA,OAAO;AAAA,QACL,EAAA,EAAI,EAAE,EAAA,KAAO,IAAA;AAAA,QACb,YAAY,OAAO,CAAA,CAAE,UAAA,KAAe,QAAA,GAAW,EAAE,UAAA,GAAa,MAAA;AAAA,QAC9D,YAAY,OAAO,CAAA,CAAE,UAAA,KAAe,QAAA,GAAW,EAAE,UAAA,GAAa,MAAA;AAAA,QAC9D,OAAO,OAAO,CAAA,CAAE,KAAA,KAAU,QAAA,GAAW,EAAE,KAAA,GAAQ;AAAA,OACjD;AAAA,IACF;AAAA,GACF;AACF;AAIO,IAAM,eAAN,MAAgD;AAAA,EAC7C,SAAA,uBAAgB,GAAA,EAA6B;AAAA,EAC7C,MAAA,GAAS,CAAA;AAAA,EAEjB,MAAM,SAAS,KAAA,EAAuD;AACpE,IAAA,aAAA,CAAc,KAAK,CAAA;AACnB,IAAA,MAAM,EAAA,GAAK,CAAA,QAAA,EAAW,IAAA,CAAK,MAAA,EAAQ,CAAA,CAAA;AACnC,IAAA,MAAM,QAAA,GAA4B;AAAA,MAChC,EAAA;AAAA,MACA,KAAK,KAAA,CAAM,GAAA;AAAA,MACX,QAAQ,KAAA,CAAM,MAAA;AAAA,MACd,SAAA,EAAW,CAAC,CAAC,KAAA,CAAM,MAAA;AAAA,MACnB,MAAA,EAAQ,QAAA;AAAA,MACR,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA;AAAY,KACpC;AACA,IAAA,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAA,EAAI,QAAQ,CAAA;AAC/B,IAAA,OAAO,QAAA;AAAA,EACT;AAAA,EAEA,MAAM,IAAA,GAAmC;AACvC,IAAA,OAAO,CAAC,GAAG,IAAA,CAAK,SAAA,CAAU,QAAQ,CAAA;AAAA,EACpC;AAAA,EAEA,MAAM,WAAW,EAAA,EAAmC;AAClD,IAAA,IAAI,CAAC,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAE,CAAA,EAAG;AAC3B,MAAA,MAAM,IAAI,WAAA,CAAY,WAAA,EAAa,CAAA,QAAA,EAAW,EAAE,CAAA,kBAAA,CAAiB,CAAA;AAAA,IACnE;AACA,IAAA,IAAA,CAAK,SAAA,CAAU,OAAO,EAAE,CAAA;AACxB,IAAA,OAAO,EAAE,IAAI,IAAA,EAAK;AAAA,EACpB;AAAA,EAEA,MAAM,KAAK,EAAA,EAAwC;AACjD,IAAA,IAAI,CAAC,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,EAAE,CAAA,EAAG;AAC3B,MAAA,MAAM,IAAI,WAAA,CAAY,WAAA,EAAa,CAAA,QAAA,EAAW,EAAE,CAAA,kBAAA,CAAiB,CAAA;AAAA,IACnE;AACA,IAAA,OAAO,EAAE,EAAA,EAAI,IAAA,EAAM,UAAA,EAAY,GAAA,EAAK,YAAY,EAAA,EAAG;AAAA,EACrD;AACF","file":"webhooks.mjs","sourcesContent":["/**\n * Erros tipados do SDK.\n *\n * Todo erro lançado pelo SDK estende `NeetruError` — caller pode discriminar\n * por `.code` (string estável) sem parsing de message.\n */\n\n/** Códigos de erro estáveis do SDK. Adicionar aqui requer minor bump. */\nexport type NeetruErrorCode =\n | 'invalid_config'\n | 'missing_api_key'\n | 'unauthorized'\n | 'forbidden'\n | 'not_found'\n | 'rate_limited'\n | 'validation_failed'\n | 'network_error'\n | 'invalid_response'\n | 'server_error'\n | 'unknown';\n\n/**\n * Erro tipado padrão do SDK. Sempre lançado em vez de Error genérico.\n *\n * @example\n * ```ts\n * try { await client.catalog.list(); }\n * catch (e) {\n * if (e instanceof NeetruError && e.code === 'rate_limited') retry();\n * }\n * ```\n */\nexport class NeetruError extends Error {\n public readonly code: NeetruErrorCode | string;\n public readonly status?: number;\n public readonly requestId?: string;\n\n constructor(\n code: NeetruErrorCode | string,\n message: string,\n status?: number,\n requestId?: string,\n ) {\n super(message);\n this.name = 'NeetruError';\n this.code = code;\n this.status = status;\n this.requestId = requestId;\n // Preserva o prototype chain ao herdar de Error (downlevel quirk de TS).\n Object.setPrototypeOf(this, NeetruError.prototype);\n }\n}\n","/**\n * HTTP transport interno do SDK.\n *\n * Responsabilidades:\n * - Construir URL absoluta a partir de `baseUrl` + path\n * - Injetar Bearer token quando `requireAuth=true`\n * - Mapear status HTTP → `NeetruError` com `code` estável\n * - Parse defensivo de JSON (não lança em body vazio em 204)\n * - Retry/backoff exponencial em `rate_limited` (429), `server_error` (5xx)\n * e `network_error` (timeout/falha de rede). Honra `Retry-After` quando\n * presente. Default 2 retries (3 tentativas no total). Caller opta-out\n * com `retries: 0`.\n */\nimport { NeetruError, type NeetruErrorCode } from './errors';\nimport type { ResolvedConfig } from './types';\n\n/** Opções da request HTTP. */\nexport interface HttpRequestOptions {\n method?: 'GET' | 'POST' | 'PUT' | 'PATCH' | 'DELETE';\n /** Path relativo (ex: `/api/v1/cli/catalog`). Concatenado a `baseUrl`. */\n path: string;\n /** Query string params (chave → valor primitivo). Valores `undefined` ignorados. */\n query?: Record<string, string | number | boolean | undefined>;\n /** Body JSON-serializável. Ignorado em GET/DELETE. */\n body?: unknown;\n /**\n * Se true, injeta `Authorization: Bearer <apiKey>`. Lança `missing_api_key`\n * se config.apiKey ausente. Default false.\n */\n requireAuth?: boolean;\n /** Cabeçalhos extras. */\n headers?: Record<string, string>;\n /**\n * Número de retries em códigos transientes (`rate_limited`, `server_error`,\n * `network_error`). Default 2 (= 3 tentativas total). Caller passa `0` pra\n * desativar (útil em operações não-idempotentes específicas).\n */\n retries?: number;\n}\n\nconst DEFAULT_RETRIES = 2;\nconst RETRYABLE_CODES = new Set<NeetruErrorCode>([\n 'rate_limited',\n 'server_error',\n 'network_error',\n]);\n\n/** Backoff exponencial com jitter ±20%. attempt: 0=primeira, 1=primeiro retry, ... */\nfunction backoffMs(attempt: number): number {\n const base = 200 * Math.pow(4, attempt); // 200ms, 800ms, 3.2s, ...\n const jitter = base * 0.2 * (Math.random() * 2 - 1);\n return Math.max(50, Math.round(base + jitter));\n}\n\n/**\n * Honra `Retry-After` header (segundos ou HTTP-date). Retorna ms ou null se\n * inválido. RFC 9110 §10.2.3.\n */\nfunction parseRetryAfter(value: string | null): number | null {\n if (!value) return null;\n const secs = Number(value);\n if (Number.isFinite(secs) && secs >= 0) return Math.round(secs * 1000);\n const dateMs = Date.parse(value);\n if (Number.isFinite(dateMs)) {\n const delta = dateMs - Date.now();\n if (delta > 0) return delta;\n }\n return null;\n}\n\nfunction sleep(ms: number): Promise<void> {\n return new Promise((resolve) => setTimeout(resolve, ms));\n}\n\n/** Mapeamento status → code estável do NeetruError. */\nfunction statusToCode(status: number): NeetruErrorCode {\n if (status === 401) return 'unauthorized';\n if (status === 403) return 'forbidden';\n if (status === 404) return 'not_found';\n if (status === 422 || status === 400) return 'validation_failed';\n if (status === 429) return 'rate_limited';\n if (status >= 500) return 'server_error';\n return 'unknown';\n}\n\nfunction buildUrl(baseUrl: string, path: string, query?: HttpRequestOptions['query']): string {\n // Trim trailing slash em base e leading em path pra evitar `//`.\n const base = baseUrl.replace(/\\/+$/, '');\n const p = path.startsWith('/') ? path : `/${path}`;\n const url = new URL(`${base}${p}`);\n if (query) {\n for (const [k, v] of Object.entries(query)) {\n if (v === undefined) continue;\n url.searchParams.set(k, String(v));\n }\n }\n return url.toString();\n}\n\n/** Parse JSON defensivo — retorna `undefined` em body vazio. */\nasync function safeJson(res: Response): Promise<unknown> {\n const text = await res.text();\n if (!text) return undefined;\n try {\n return JSON.parse(text);\n } catch {\n return undefined;\n }\n}\n\n/**\n * Executa request HTTP. Em sucesso retorna body parseado; em erro lança\n * `NeetruError` com `code` derivado do status. Aplica retry/backoff\n * automático em códigos transientes (rate_limited/server_error/network_error)\n * conforme `opts.retries` (default 2 = 3 tentativas).\n */\nexport async function httpRequest<T>(\n config: ResolvedConfig,\n opts: HttpRequestOptions,\n): Promise<T> {\n const method = opts.method ?? 'GET';\n const url = buildUrl(config.baseUrl, opts.path, opts.query);\n const maxRetries = opts.retries ?? DEFAULT_RETRIES;\n\n const headers: Record<string, string> = {\n accept: 'application/json',\n ...opts.headers,\n };\n\n if (opts.requireAuth) {\n if (!config.apiKey) {\n throw new NeetruError(\n 'missing_api_key',\n 'This operation requires an apiKey. Pass it to createNeetruClient({ apiKey }) or set NEETRU_API_KEY env var.',\n );\n }\n headers.authorization = `Bearer ${config.apiKey}`;\n }\n\n // Body só é serializado uma vez — reusado entre tentativas.\n const bodyString =\n opts.body !== undefined && method !== 'GET' && method !== 'DELETE'\n ? JSON.stringify(opts.body)\n : undefined;\n if (bodyString !== undefined) {\n headers['content-type'] = 'application/json';\n }\n\n let lastError: NeetruError | null = null;\n\n for (let attempt = 0; attempt <= maxRetries; attempt++) {\n const init: RequestInit = { method, headers };\n if (bodyString !== undefined) init.body = bodyString;\n // BUG-020 fix (2026-05-13): timeout default 30s. AbortSignal.timeout\n // requer Node 18+ ou browsers recentes.\n init.signal = AbortSignal.timeout(30_000);\n\n let res: Response;\n try {\n res = await config.fetch(url, init);\n } catch (err) {\n const message =\n err instanceof DOMException && err.name === 'TimeoutError'\n ? 'Network error: timeout after 30s'\n : `Network error: ${err instanceof Error ? err.message : 'fetch failed'}`;\n lastError = new NeetruError('network_error', message);\n if (attempt < maxRetries) {\n await sleep(backoffMs(attempt));\n continue;\n }\n throw lastError;\n }\n\n const requestId =\n res.headers.get('x-request-id') ?? res.headers.get('x-correlation-id') ?? undefined;\n\n if (res.ok) {\n const parsed = await safeJson(res);\n return parsed as T;\n }\n\n const body = (await safeJson(res)) as\n | { error?: { code?: string; message?: string } | string }\n | undefined;\n let code: string = statusToCode(res.status);\n let message = `HTTP ${res.status}`;\n if (body && typeof body === 'object' && 'error' in body) {\n const errField = body.error;\n if (typeof errField === 'string') {\n message = errField;\n } else if (errField && typeof errField === 'object') {\n if (typeof errField.code === 'string') code = errField.code;\n if (typeof errField.message === 'string') message = errField.message;\n }\n }\n const err = new NeetruError(code, message, res.status, requestId);\n lastError = err;\n\n const isRetryable = RETRYABLE_CODES.has(code as NeetruErrorCode);\n if (isRetryable && attempt < maxRetries) {\n const retryAfter = parseRetryAfter(res.headers.get('retry-after'));\n const delay = retryAfter ?? backoffMs(attempt);\n await sleep(delay);\n continue;\n }\n throw err;\n }\n\n // Unreachable — loop sempre retorna ou lança. Safety net.\n throw lastError ?? new NeetruError('unknown', 'unexpected httpRequest exit');\n}\n","/**\n * Webhooks namespace (v1.2) — produtos SaaS registram endpoints HTTP no Core\n * pra receber notificações de eventos.\n *\n * Casos típicos:\n * - `subscription.activated` quando cliente conclui checkout\n * - `subscription.cancelled` / `subscription.payment_failed`\n * - `usage.quota_exceeded` quando produto bate teto mensal\n * - `account.suspended` quando staff Neetru suspende uma conta\n *\n * Pull-vs-push: o SDK existente é pull-only (`getQuota`, etc). Webhooks\n * fecham o gap pra eventos assíncronos sem o produto precisar fazer polling.\n *\n * Segurança:\n * - Endpoint do produto recebe HMAC SHA-256 em header `X-Neetru-Signature`\n * usando `secret` opcional do registro. Sem `secret`, header ausente —\n * produto deve usar HTTPS + IP allowlist.\n * - Replay protection: header `X-Neetru-Timestamp` (ms) — produto deve\n * rejeitar > 5min de skew.\n * - Retry: Core retenta 3x com backoff exponencial (1s, 5s, 25s) se 5xx\n * ou timeout. Após 3 falhas → marca endpoint `degraded` por 1h.\n *\n * Endpoints REST (em prod):\n * - `POST /api/sdk/v1/webhooks` — registra novo endpoint\n * - `GET /api/sdk/v1/webhooks` — lista endpoints do produto\n * - `DELETE /api/sdk/v1/webhooks/{id}` — remove endpoint\n * - `POST /api/sdk/v1/webhooks/{id}/test` — dispara evento de teste\n *\n * Mock em `NEETRU_ENV=dev`: tudo in-memory, sem rede.\n */\nimport { NeetruError } from './errors';\nimport { httpRequest } from './http';\nimport type { ResolvedConfig } from './types';\n\n/** Eventos Neetru que produtos podem assinar. Lista expansível por minor bump. */\nexport type WebhookEvent =\n | 'subscription.activated'\n | 'subscription.cancelled'\n | 'subscription.payment_failed'\n | 'subscription.trial_ending'\n | 'usage.quota_exceeded'\n | 'account.suspended'\n | 'account.reactivated'\n | 'support.ticket_replied';\n\nexport interface WebhookEndpoint {\n id: string;\n url: string;\n events: WebhookEvent[];\n /** Quando true, `X-Neetru-Signature` é enviado em cada dispatch. */\n hasSecret: boolean;\n status: 'active' | 'degraded' | 'disabled';\n /** ISO timestamp do último dispatch bem-sucedido. */\n lastDeliveryAt?: string;\n /** Quantos dispatches falharam consecutivos (resetado em sucesso). */\n consecutiveFailures?: number;\n createdAt: string;\n}\n\nexport interface RegisterWebhookInput {\n url: string;\n events: WebhookEvent[];\n /**\n * Secret pra HMAC SHA-256 (mín 16 chars). Recomendado.\n * Quando ausente, dispatches vão sem assinatura — produto deve ter\n * IP allowlist ou outra defesa.\n */\n secret?: string;\n}\n\nexport interface WebhookTestResult {\n ok: boolean;\n statusCode?: number;\n durationMs?: number;\n error?: string;\n}\n\nexport interface WebhooksNamespace {\n /** Registra um novo endpoint. */\n register(input: RegisterWebhookInput): Promise<WebhookEndpoint>;\n /** Lista endpoints registrados pelo produto. */\n list(): Promise<WebhookEndpoint[]>;\n /** Remove um endpoint. */\n unregister(id: string): Promise<{ ok: true }>;\n /** Dispara evento de teste pra validar conectividade. */\n test(id: string): Promise<WebhookTestResult>;\n}\n\n/**\n * Verifica assinatura HMAC SHA-256 de payload de webhook recebido pelo\n * produto consumer. Constant-time compare pra resistir a timing attack.\n *\n * @param payload Corpo cru da request (string ou Buffer). NÃO use o objeto\n * parseado — JSON.stringify pode diferir do que foi assinado.\n * @param signature Header `X-Neetru-Signature` recebido (formato `sha256=<hex>`).\n * @param secret Secret registrado em `webhooks.register({ secret })`.\n * @returns true se assinatura confere, false caso contrário.\n *\n * @example\n * ```ts\n * // Express handler\n * app.post('/webhooks/neetru', express.raw({ type: 'application/json' }), (req, res) => {\n * const sig = req.header('X-Neetru-Signature');\n * if (!verifyWebhookSignature(req.body, sig, process.env.WEBHOOK_SECRET!)) {\n * return res.status(401).end();\n * }\n * const event = JSON.parse(req.body.toString('utf8'));\n * // ... handle event\n * res.json({ ok: true });\n * });\n * ```\n */\nexport function verifyWebhookSignature(\n payload: string | Uint8Array,\n signature: string | null | undefined,\n secret: string,\n): boolean {\n if (!signature || !secret) return false;\n // Aceita \"sha256=<hex>\" ou \"<hex>\" cru.\n const sigHex = signature.startsWith('sha256=') ? signature.slice(7) : signature;\n if (!/^[0-9a-f]+$/i.test(sigHex)) return false;\n\n // Crypto API: Node tem `node:crypto`, browsers têm WebCrypto. Aqui usamos\n // node:crypto (SDK roda majoritariamente server-side em produto Node). Se\n // o consumer for browser puro precisando verificar, basta importar o\n // namespace direto e usar WebCrypto — não é o caso típico, então não\n // pagamos o custo de bundle.\n let nodeCrypto: typeof import('node:crypto');\n try {\n // eslint-disable-next-line @typescript-eslint/no-require-imports\n nodeCrypto = require('node:crypto');\n } catch {\n if (typeof console !== 'undefined') {\n console.warn(\n '[neetru-sdk] verifyWebhookSignature requires Node crypto. In browser, use WebCrypto subtle.verify directly.',\n );\n }\n return false;\n }\n\n const computed = nodeCrypto.createHmac('sha256', secret).update(payload).digest('hex');\n const a = Buffer.from(computed, 'hex');\n const b = Buffer.from(sigHex.toLowerCase(), 'hex');\n if (a.length !== b.length) return false;\n return nodeCrypto.timingSafeEqual(a, b);\n}\n\n// ─── HTTP impl ──────────────────────────────────────────────────────────────\n\nconst VALID_EVENTS: readonly WebhookEvent[] = [\n 'subscription.activated',\n 'subscription.cancelled',\n 'subscription.payment_failed',\n 'subscription.trial_ending',\n 'usage.quota_exceeded',\n 'account.suspended',\n 'account.reactivated',\n 'support.ticket_replied',\n];\n\nfunction toEndpoint(raw: unknown): WebhookEndpoint {\n if (!raw || typeof raw !== 'object') {\n throw new NeetruError('invalid_response', 'Webhook response is not an object');\n }\n const r = raw as Record<string, unknown>;\n if (typeof r.id !== 'string') {\n throw new NeetruError('invalid_response', 'Webhook missing id');\n }\n return {\n id: r.id,\n url: typeof r.url === 'string' ? r.url : '',\n events: Array.isArray(r.events)\n ? (r.events as unknown[]).filter((e): e is WebhookEvent =>\n VALID_EVENTS.includes(e as WebhookEvent),\n )\n : [],\n hasSecret: r.hasSecret === true,\n status:\n r.status === 'active' || r.status === 'degraded' || r.status === 'disabled'\n ? r.status\n : 'active',\n lastDeliveryAt: typeof r.lastDeliveryAt === 'string' ? r.lastDeliveryAt : undefined,\n consecutiveFailures:\n typeof r.consecutiveFailures === 'number' ? r.consecutiveFailures : undefined,\n createdAt: typeof r.createdAt === 'string' ? r.createdAt : new Date().toISOString(),\n };\n}\n\nfunction validateInput(input: RegisterWebhookInput): void {\n if (!input.url || typeof input.url !== 'string') {\n throw new NeetruError('validation_failed', 'url é obrigatória');\n }\n try {\n const parsed = new URL(input.url);\n if (parsed.protocol !== 'https:' && parsed.protocol !== 'http:') {\n throw new Error('invalid protocol');\n }\n // Em prod, http: é warning (não bloqueia) — testes locais podem usar\n } catch {\n throw new NeetruError('validation_failed', `url inválida: ${input.url}`);\n }\n if (!Array.isArray(input.events) || input.events.length === 0) {\n throw new NeetruError('validation_failed', 'events deve ter pelo menos 1 evento');\n }\n for (const ev of input.events) {\n if (!VALID_EVENTS.includes(ev)) {\n throw new NeetruError('validation_failed', `evento desconhecido: ${ev}`);\n }\n }\n if (input.secret !== undefined && input.secret.length < 16) {\n throw new NeetruError('validation_failed', 'secret deve ter ≥16 chars (recomendado 32+)');\n }\n}\n\nexport function createWebhooksNamespace(config: ResolvedConfig): WebhooksNamespace {\n return {\n async register(input) {\n validateInput(input);\n const raw = await httpRequest<unknown>(config, {\n method: 'POST',\n path: '/api/sdk/v1/webhooks',\n body: input,\n requireAuth: true,\n });\n return toEndpoint(raw);\n },\n async list() {\n const raw = await httpRequest<{ endpoints?: unknown[] }>(config, {\n method: 'GET',\n path: '/api/sdk/v1/webhooks',\n requireAuth: true,\n });\n const list = Array.isArray(raw?.endpoints) ? raw.endpoints : [];\n return list.map(toEndpoint);\n },\n async unregister(id) {\n if (!id) throw new NeetruError('validation_failed', 'id obrigatório');\n await httpRequest<unknown>(config, {\n method: 'DELETE',\n path: `/api/sdk/v1/webhooks/${encodeURIComponent(id)}`,\n requireAuth: true,\n });\n return { ok: true };\n },\n async test(id) {\n if (!id) throw new NeetruError('validation_failed', 'id obrigatório');\n const raw = await httpRequest<unknown>(config, {\n method: 'POST',\n path: `/api/sdk/v1/webhooks/${encodeURIComponent(id)}/test`,\n requireAuth: true,\n });\n if (!raw || typeof raw !== 'object') {\n return { ok: false, error: 'invalid response' };\n }\n const r = raw as Record<string, unknown>;\n return {\n ok: r.ok === true,\n statusCode: typeof r.statusCode === 'number' ? r.statusCode : undefined,\n durationMs: typeof r.durationMs === 'number' ? r.durationMs : undefined,\n error: typeof r.error === 'string' ? r.error : undefined,\n };\n },\n };\n}\n\n// ─── Mock impl (dev / tests) ────────────────────────────────────────────────\n\nexport class MockWebhooks implements WebhooksNamespace {\n private endpoints = new Map<string, WebhookEndpoint>();\n private nextId = 1;\n\n async register(input: RegisterWebhookInput): Promise<WebhookEndpoint> {\n validateInput(input);\n const id = `mock_wh_${this.nextId++}`;\n const endpoint: WebhookEndpoint = {\n id,\n url: input.url,\n events: input.events,\n hasSecret: !!input.secret,\n status: 'active',\n createdAt: new Date().toISOString(),\n };\n this.endpoints.set(id, endpoint);\n return endpoint;\n }\n\n async list(): Promise<WebhookEndpoint[]> {\n return [...this.endpoints.values()];\n }\n\n async unregister(id: string): Promise<{ ok: true }> {\n if (!this.endpoints.has(id)) {\n throw new NeetruError('not_found', `Webhook ${id} não encontrado`);\n }\n this.endpoints.delete(id);\n return { ok: true };\n }\n\n async test(id: string): Promise<WebhookTestResult> {\n if (!this.endpoints.has(id)) {\n throw new NeetruError('not_found', `Webhook ${id} não encontrado`);\n }\n return { ok: true, statusCode: 200, durationMs: 42 };\n }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@neetru/sdk",
3
- "version": "1.1.0",
3
+ "version": "1.2.0",
4
4
  "description": "Neetru SDK 1.1 — biblioteca runtime estável para consumir o ecossistema Neetru (auth OIDC, catalog, entitlements, telemetry, usage metering, support tickets, datastore, checkout).",
5
5
  "type": "module",
6
6
  "main": "./dist/index.cjs",
@@ -66,13 +66,25 @@
66
66
  "types": "./dist/react.d.ts",
67
67
  "import": "./dist/react.mjs",
68
68
  "require": "./dist/react.cjs"
69
+ },
70
+ "./webhooks": {
71
+ "types": "./dist/webhooks.d.ts",
72
+ "import": "./dist/webhooks.mjs",
73
+ "require": "./dist/webhooks.cjs"
74
+ },
75
+ "./notifications": {
76
+ "types": "./dist/notifications.d.ts",
77
+ "import": "./dist/notifications.mjs",
78
+ "require": "./dist/notifications.cjs"
69
79
  }
70
80
  },
71
81
  "peerDependencies": {
72
82
  "react": "^18.0.0 || ^19.0.0"
73
83
  },
74
84
  "peerDependenciesMeta": {
75
- "react": { "optional": true }
85
+ "react": {
86
+ "optional": true
87
+ }
76
88
  },
77
89
  "sideEffects": false,
78
90
  "scripts": {
@@ -82,14 +94,18 @@
82
94
  "lint": "tsc --noEmit",
83
95
  "docs:gen": "typedoc --options scripts/typedoc.config.json"
84
96
  },
85
- "files": ["dist", "README.md", "CHANGELOG.md"],
97
+ "files": [
98
+ "dist",
99
+ "README.md",
100
+ "CHANGELOG.md"
101
+ ],
86
102
  "engines": {
87
- "node": ">=18"
103
+ "node": ">=20"
88
104
  },
89
105
  "license": "UNLICENSED",
90
106
  "devDependencies": {
91
107
  "tsup": "^8.3.5",
92
- "typedoc": "^0.26.0",
93
- "typescript": "^5.7.0"
108
+ "typedoc": "^0.28.19",
109
+ "typescript": "^5.9.3"
94
110
  }
95
111
  }