@pol-studios/db 1.0.31 → 1.0.34
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{DataLayerContext-Dc7nF2IG.d.ts → DataLayerContext-BwMk4VpG.d.ts} +92 -8
- package/dist/UserMetadataContext-QLIv-mfF.d.ts +171 -0
- package/dist/{UserMetadataContext-B8gVWGMl.d.ts → UserMetadataContext-pQb3A8_Q.d.ts} +1 -1
- package/dist/auth/context.d.ts +53 -5
- package/dist/auth/context.js +30 -8
- package/dist/auth/guards.d.ts +9 -9
- package/dist/auth/guards.js +2 -3
- package/dist/auth/hooks.d.ts +108 -4
- package/dist/auth/hooks.js +13 -9
- package/dist/auth/index.d.ts +6 -6
- package/dist/auth/index.js +45 -17
- package/dist/chunk-5HJLTYRA.js +355 -0
- package/dist/chunk-5HJLTYRA.js.map +1 -0
- package/dist/{chunk-WX4ABYIF.js → chunk-67HMVGV7.js} +292 -94
- package/dist/chunk-67HMVGV7.js.map +1 -0
- package/dist/chunk-6KN7KLEG.js +1 -0
- package/dist/{chunk-FZF26ZRB.js → chunk-7BGDQT5X.js} +29 -16
- package/dist/{chunk-FZF26ZRB.js.map → chunk-7BGDQT5X.js.map} +1 -1
- package/dist/{chunk-P4UZ7IXC.js → chunk-7D4SUZUM.js} +1 -5
- package/dist/{chunk-3PJTNH2L.js → chunk-AKIRHA4Q.js} +2 -2
- package/dist/{chunk-OQ7U6EQ3.js → chunk-AML2TLXJ.js} +3801 -3424
- package/dist/chunk-AML2TLXJ.js.map +1 -0
- package/dist/{chunk-5EFDS7SR.js → chunk-DMVUEJG2.js} +7 -2
- package/dist/chunk-DMVUEJG2.js.map +1 -0
- package/dist/{chunk-ADD5MIMK.js → chunk-FESQS4S5.js} +15 -15
- package/dist/{chunk-ADD5MIMK.js.map → chunk-FESQS4S5.js.map} +1 -1
- package/dist/{chunk-U5UNPBKB.js → chunk-FI6JAD5G.js} +3 -3
- package/dist/{chunk-TKWR5AAY.js → chunk-JOULSXOI.js} +2 -2
- package/dist/{chunk-HTJ2FQW5.js → chunk-LF3V3ERS.js} +13 -15
- package/dist/{chunk-HTJ2FQW5.js.map → chunk-LF3V3ERS.js.map} +1 -1
- package/dist/{chunk-5BLKZUKM.js → chunk-MREERKQU.js} +45 -14
- package/dist/chunk-MREERKQU.js.map +1 -0
- package/dist/{chunk-VGEMLNNM.js → chunk-NP34C3O3.js} +306 -704
- package/dist/chunk-NP34C3O3.js.map +1 -0
- package/dist/{chunk-CNIGRBRE.js → chunk-QJZUIAHA.js} +43 -19
- package/dist/{chunk-CNIGRBRE.js.map → chunk-QJZUIAHA.js.map} +1 -1
- package/dist/{chunk-HAWJTZCK.js → chunk-RT4O5H2E.js} +5 -7
- package/dist/chunk-RT4O5H2E.js.map +1 -0
- package/dist/{chunk-2NVSXZKQ.js → chunk-TN7QINPK.js} +74 -309
- package/dist/chunk-TN7QINPK.js.map +1 -0
- package/dist/chunk-UBHORKBS.js +215 -0
- package/dist/chunk-UBHORKBS.js.map +1 -0
- package/dist/{chunk-WVF7RUW5.js → chunk-WM25QE7E.js} +3 -3
- package/dist/{chunk-H6365JPC.js → chunk-YUX6RGLZ.js} +3 -3
- package/dist/{chunk-H6365JPC.js.map → chunk-YUX6RGLZ.js.map} +1 -1
- package/dist/{chunk-H3LNH2NT.js → chunk-Z456IHCB.js} +5 -9
- package/dist/{chunk-H3LNH2NT.js.map → chunk-Z456IHCB.js.map} +1 -1
- package/dist/{chunk-JAATANS3.js → chunk-ZCOFRJQD.js} +3 -3
- package/dist/{chunk-JAATANS3.js.map → chunk-ZCOFRJQD.js.map} +1 -1
- package/dist/client/index.d.ts +1 -1
- package/dist/client/index.js +2 -2
- package/dist/core/index.d.ts +54 -31
- package/dist/{executor-Br27YZvl.d.ts → executor-YJw4m7Q7.d.ts} +9 -1
- package/dist/gen/index.js +1 -1
- package/dist/hooks/index.d.ts +3 -22
- package/dist/hooks/index.js +12 -9
- package/dist/{index-CYFdO0iB.d.ts → index-lveh8qb0.d.ts} +1 -1
- package/dist/index.d.ts +38 -10
- package/dist/index.js +57 -36
- package/dist/index.native.d.ts +19 -13
- package/dist/index.native.js +64 -35
- package/dist/index.web.d.ts +18 -45
- package/dist/index.web.js +58 -49
- package/dist/index.web.js.map +1 -1
- package/dist/mutation/index.d.ts +2 -2
- package/dist/mutation/index.js +5 -5
- package/dist/parser/index.js +4 -4
- package/dist/powersync-bridge/index.d.ts +18 -3
- package/dist/powersync-bridge/index.js +2 -2
- package/dist/query/index.d.ts +1 -1
- package/dist/query/index.js +7 -8
- package/dist/realtime/index.js +7 -9
- package/dist/realtime/index.js.map +1 -1
- package/dist/types/index.d.ts +3 -3
- package/dist/types/index.js +6 -7
- package/dist/{useBatchUpsert-9OYjibLh.d.ts → useBatchUpsert-DAkiCNo3.d.ts} +1 -1
- package/dist/{useDbCount-Dk0yCKlT.d.ts → useDbCount-DWfYB2iu.d.ts} +16 -2
- package/dist/{useResolveFeedback-C1KucfdQ.d.ts → useResolveFeedback-CxLccZKK.d.ts} +197 -93
- package/dist/{useSupabase-DvWVuHHE.d.ts → useSupabase-DSZNeXnF.d.ts} +1 -1
- package/dist/with-auth/index.d.ts +2 -2
- package/dist/with-auth/index.js +46 -33
- package/dist/with-auth/index.js.map +1 -1
- package/package.json +18 -8
- package/dist/UserMetadataContext-DntmpK41.d.ts +0 -33
- package/dist/canvas-C4TBBDUL.node +0 -0
- package/dist/canvas-ZQNCL7JL.js +0 -1541
- package/dist/canvas-ZQNCL7JL.js.map +0 -1
- package/dist/chunk-2NVSXZKQ.js.map +0 -1
- package/dist/chunk-5BLKZUKM.js.map +0 -1
- package/dist/chunk-5EFDS7SR.js.map +0 -1
- package/dist/chunk-HAWJTZCK.js.map +0 -1
- package/dist/chunk-NSIAAYW3.js +0 -1
- package/dist/chunk-O7SETNGD.js +0 -3391
- package/dist/chunk-O7SETNGD.js.map +0 -1
- package/dist/chunk-OQ7U6EQ3.js.map +0 -1
- package/dist/chunk-VGEMLNNM.js.map +0 -1
- package/dist/chunk-WX4ABYIF.js.map +0 -1
- package/dist/dist-NDNRSNOG.js +0 -521
- package/dist/dist-NDNRSNOG.js.map +0 -1
- package/dist/pdf-PHXP7RHD.js +0 -20336
- package/dist/pdf-PHXP7RHD.js.map +0 -1
- /package/dist/{chunk-NSIAAYW3.js.map → chunk-6KN7KLEG.js.map} +0 -0
- /package/dist/{chunk-P4UZ7IXC.js.map → chunk-7D4SUZUM.js.map} +0 -0
- /package/dist/{chunk-3PJTNH2L.js.map → chunk-AKIRHA4Q.js.map} +0 -0
- /package/dist/{chunk-U5UNPBKB.js.map → chunk-FI6JAD5G.js.map} +0 -0
- /package/dist/{chunk-TKWR5AAY.js.map → chunk-JOULSXOI.js.map} +0 -0
- /package/dist/{chunk-WVF7RUW5.js.map → chunk-WM25QE7E.js.map} +0 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/errors/TimeoutError.ts","../src/useDbQuery.ts","../src/auth/context/setupAuthContext.tsx","../src/auth/context/PermissionContext.tsx","../src/auth/context/AuthProvider.tsx","../src/auth/context/UserMetadataContext.tsx","../src/useDbUpsert.ts"],"sourcesContent":["export const TIMEOUT_ERROR_MESSAGE = \"Request timed out\";\nexport const DEFAULT_QUERY_TIMEOUT = 15_000; // 15 seconds\n\nexport function isTimeoutError(error: Error | null | undefined): boolean {\n if (!error) return false;\n return error.name === \"AbortError\" || error.message === TIMEOUT_ERROR_MESSAGE || error.message.toLowerCase().includes(\"timed out\");\n}","import { PostgrestError, PostgrestSingleResponse } from \"@supabase/supabase-js\";\nimport { useMemo, useRef } from \"react\";\nimport { ItemType } from \"@pol-studios/utils\";\nimport { encode, UseQuerySingleReturn } from \"@supabase-cache-helpers/postgrest-react-query\";\nimport { omit } from \"@pol-studios/utils\";\nimport { useQuery, UseQueryOptions } from \"@tanstack/react-query\";\nimport { useDelayedValue } from \"@pol-studios/hooks/state\";\nimport { DEFAULT_QUERY_TIMEOUT, TIMEOUT_ERROR_MESSAGE } from \"./errors/TimeoutError\";\ntype ConfigurationOptions<T> = {\n crossOrganization?: boolean;\n filter?: (item: ItemType<T>) => boolean;\n timeout?: number;\n};\nexport type UseDbQuerySingleReturn<T> = UseQuerySingleReturn<T> & {\n data: T | null | undefined;\n count?: number | null;\n};\nexport function useDbQuery<Result>(query: PromiseLike<PostgrestSingleResponse<Result>> & {\n abortSignal?: (signal: AbortSignal) => PromiseLike<PostgrestSingleResponse<Result>>;\n}, config?: Omit<UseQueryOptions<Result, PostgrestError>, \"queryKey\" | \"queryFn\"> & ConfigurationOptions<Result>) {\n // Debounce query key to prevent rapid query churn during fast navigation\n const queryKey = encode(query, false);\n const queryKeyString = queryKey.join(\"-\");\n const debouncedKeyString = useDelayedValue(queryKeyString, 50);\n\n // Only enable query when key has stabilized (debounced matches current)\n const isKeyStable = queryKeyString === debouncedKeyString;\n const effectiveEnabled = config?.enabled !== false && isKeyStable;\n const timeoutMs = config?.timeout ?? DEFAULT_QUERY_TIMEOUT;\n\n // Track count from Supabase response (for queries with count: \"exact\")\n const countRef = useRef<number | null>(null);\n const request = useQuery(useMemo(() => ({\n queryKey,\n queryFn: async ({\n signal\n }) => {\n const controller = new AbortController();\n signal.addEventListener(\"abort\", () => controller.abort());\n const timeoutId = setTimeout(() => controller.abort(), timeoutMs);\n try {\n // Execute query with abort signal\n const queryWithSignal = query.abortSignal?.(controller.signal) ?? query;\n const result = await queryWithSignal;\n if (result.error) throw result.error;\n // Store count if available (from queries with count: \"exact\")\n countRef.current = result.count ?? null;\n return result.data;\n } catch (err: any) {\n if (err.name === \"AbortError\") {\n throw new Error(TIMEOUT_ERROR_MESSAGE);\n }\n throw err;\n } finally {\n clearTimeout(timeoutId);\n }\n },\n ...omit({\n retry: 1,\n ...config,\n enabled: effectiveEnabled\n }, [\"queryKey\", \"timeout\"])\n }), [queryKey, config, effectiveEnabled, timeoutMs, query]));\n\n // Return request with count property added\n return useMemo(() => ({\n ...request,\n count: countRef.current\n }), [request, countRef.current]) as UseDbQuerySingleReturn<Result>;\n}","/**\n * SetupAuthContext - Shared context for auth state\n *\n * This file is separate to avoid circular dependencies between\n * AuthProvider and PermissionContext.\n */\n\nimport { createContext, ReactNode } from \"react\";\nimport { AuthTokenResponsePassword, SignUpWithPasswordCredentials, User } from \"@supabase/supabase-js\";\nexport type ProfileStatus = \"active\" | \"archived\" | \"suspended\";\n\n/**\n * Represents an effective permission for a user on a specific resource.\n * These are eagerly loaded at login for fast permission checks.\n */\nexport interface EffectivePermission {\n /** The type of resource (e.g., 'project', 'client', 'database') */\n resourceType: string;\n /** The ID of the specific resource */\n resourceId: string;\n /** The permission action (e.g., 'view', 'edit', 'admin') */\n permission: string;\n /** Numeric level for comparison: view=1, edit=2, admin=3 */\n permissionLevel: number;\n /** How the permission was granted */\n source: \"direct\" | \"group\" | \"inherited\";\n /** If inherited, from which resource */\n inheritedFrom: string | null;\n /** When the permission expires, if applicable */\n expiresAt: string | null;\n}\nexport interface SetupAuthContext {\n user?: User | null | undefined;\n isLoading: boolean;\n profile: Profile | null | undefined;\n access: string[];\n /** Eagerly loaded effective permissions for the user */\n effectivePermissions: EffectivePermission[];\n /** Whether the profile is archived */\n isArchived: boolean;\n /** Whether the profile is suspended */\n isSuspended: boolean;\n /** The profile status (active, archived, suspended) */\n profileStatus: ProfileStatus | undefined;\n registerAsync: (register: SignUpWithPasswordCredentials) => Promise<any>;\n signInAsync: (username: string, password: string) => Promise<AuthTokenResponsePassword>;\n signOutAsync: () => Promise<any>;\n refreshAsync: () => Promise<void>;\n onSignOut: (action: () => any) => string;\n removeOnSignOut: (id: string) => any;\n hasAccess?: (key: string) => boolean;\n}\n\n// Profile type - simplified version, the full type is in AuthProvider\nexport interface Profile {\n id: string;\n email?: string;\n fullName?: string;\n status?: ProfileStatus;\n UserAccess?: Array<{\n accessKey: string;\n }>;\n [key: string]: any;\n}\nexport const setupAuthContext = createContext({} as SetupAuthContext);\n\n/**\n * Props for SetupAuthContextProvider\n * A simpler provider that takes pre-computed auth state\n */\nexport interface SetupAuthContextProviderProps {\n children: ReactNode;\n auth: SetupAuthContext;\n}","import { createContext, ReactNode, useCallback, useContext, useEffect, useMemo, useRef, useState } from \"react\";\nimport useSupabase from \"../../useSupabase\";\nimport { setupAuthContext } from \"./setupAuthContext\";\nimport { EntityType, EntityPermissionLevel, EntityAction, EntityPermissionCheck } from \"../types/EntityPermissions\";\n\n// Cache entry with TTL\ninterface CacheEntry {\n permission: EntityPermissionCheck;\n expiresAt: number;\n}\n\n// Entity identifier for batch lookups\ninterface EntityIdentifier {\n entityType: EntityType;\n entityId: number;\n}\n\n// Cache key helper\nfunction getCacheKey(userId: string | undefined, entityType: EntityType, entityId: number): string {\n return `${userId || \"anon\"}:${entityType}:${entityId}`;\n}\n\n// Default loading state\nconst loadingPermission: EntityPermissionCheck = {\n canView: false,\n canAdminView: false,\n canEdit: false,\n canCreate: false,\n canDelete: false,\n canShare: false,\n permissionLevel: null,\n isLoading: true\n};\n\n// No permission state\nconst noPermission: EntityPermissionCheck = {\n canView: false,\n canAdminView: false,\n canEdit: false,\n canCreate: false,\n canDelete: false,\n canShare: false,\n permissionLevel: null,\n isLoading: false,\n isDenied: false\n};\n\n// Denied permission state - explicitly blocked access\nconst deniedPermission: EntityPermissionCheck = {\n canView: false,\n canAdminView: false,\n canEdit: false,\n canCreate: false,\n canDelete: false,\n canShare: false,\n permissionLevel: null,\n isLoading: false,\n isDenied: true\n};\n\n// Map permission level to permission check\n// If permission is 'denied', it means access was explicitly blocked\n// Handles both legacy formats (ReadOnly, AdminReadOnly, ReadWrite, Admin)\n// and new formats (view, edit, admin, denied)\nfunction mapPermissionLevel(level: EntityPermissionLevel | \"denied\" | string | null): EntityPermissionCheck {\n if (!level) {\n return noPermission;\n }\n\n // Normalize to lowercase for comparison to handle both legacy and new formats\n const normalizedLevel = level.toLowerCase();\n switch (normalizedLevel) {\n // Legacy format: ReadOnly, New format: view\n case \"readonly\":\n case \"view\":\n return {\n canView: true,\n canAdminView: false,\n canEdit: false,\n canCreate: false,\n canDelete: false,\n canShare: false,\n permissionLevel: \"ReadOnly\",\n isLoading: false,\n isDenied: false\n };\n // Legacy format: AdminReadOnly (no new equivalent, keep for backwards compatibility)\n case \"adminreadonly\":\n return {\n canView: true,\n canAdminView: true,\n canEdit: false,\n canCreate: false,\n canDelete: false,\n canShare: false,\n permissionLevel: \"AdminReadOnly\",\n isLoading: false,\n isDenied: false\n };\n // Legacy format: ReadWrite, New format: edit\n case \"readwrite\":\n case \"edit\":\n return {\n canView: true,\n canAdminView: false,\n canEdit: true,\n canCreate: true,\n canDelete: false,\n canShare: false,\n permissionLevel: \"ReadWrite\",\n isLoading: false,\n isDenied: false\n };\n // Legacy format: Admin, New format: admin\n case \"admin\":\n return {\n canView: true,\n canAdminView: true,\n canEdit: true,\n canCreate: true,\n canDelete: true,\n canShare: true,\n permissionLevel: \"Admin\",\n isLoading: false,\n isDenied: false\n };\n // New format: denied - explicit access denial\n case \"denied\":\n return deniedPermission;\n default:\n console.warn(`Unknown permission level: ${level}`);\n return noPermission;\n }\n}\n\n// Context interface\nexport interface PermissionContextValue {\n getPermission: (entityType: EntityType, entityId: number) => EntityPermissionCheck;\n checkPermission: (entityType: EntityType, entityId: number, action: EntityAction) => boolean;\n prefetchPermissions: (entities: EntityIdentifier[]) => Promise<void>;\n invalidatePermission: (entityType: EntityType, entityId: number) => void;\n isLoading: boolean;\n}\n\n/**\n * @deprecated Use permissionContext instead\n */\nexport interface EntityPermissionContextValue extends PermissionContextValue {}\nexport const permissionContext = createContext<PermissionContextValue>({} as PermissionContextValue);\n\n/**\n * @deprecated Use permissionContext instead\n */\nexport const entityPermissionContext = permissionContext;\n\n// TTL for cache entries (5 minutes)\nconst CACHE_TTL_MS = 5 * 60 * 1000;\n\n// TTL for error cache entries (30 seconds) - shorter to allow quick retry\nconst ERROR_CACHE_TTL_MS = 30 * 1000;\n\n// Batch collection delay (50ms)\nconst BATCH_DELAY_MS = 50;\nexport function PermissionProvider({\n children\n}: {\n children: ReactNode;\n}) {\n const supabase = useSupabase();\n const setupAuth = useContext(setupAuthContext);\n const user = setupAuth?.user;\n\n // Permission cache\n const cacheRef = useRef<Map<string, CacheEntry>>(new Map());\n\n // Pending lookups for batching\n const pendingLookupsRef = useRef<Set<string>>(new Set());\n\n // In-flight lookups to prevent duplicate requests during async RPC calls\n const inFlightRef = useRef<Set<string>>(new Set());\n\n // Batch timer ref\n const batchTimerRef = useRef<ReturnType<typeof setTimeout> | null>(null);\n\n // Loading state\n const [isLoading, setIsLoading] = useState(false);\n\n // Force re-render trigger\n const [, forceUpdate] = useState(0);\n\n // Clean up expired cache entries\n const cleanupExpiredEntries = useCallback(() => {\n const now = Date.now();\n const cache = cacheRef.current;\n let hasExpired = false;\n for (const [key, entry] of cache.entries()) {\n if (entry.expiresAt < now) {\n cache.delete(key);\n hasExpired = true;\n }\n }\n if (hasExpired) {\n forceUpdate(prev => prev + 1);\n }\n }, []);\n\n // Periodic cleanup of expired entries\n useEffect(() => {\n const cleanupInterval = setInterval(cleanupExpiredEntries, 60 * 1000);\n return () => clearInterval(cleanupInterval);\n }, [cleanupExpiredEntries]);\n\n // Execute batch lookup\n const executeBatchLookup = useCallback(async () => {\n const pending = Array.from(pendingLookupsRef.current);\n pendingLookupsRef.current.clear();\n if (pending.length === 0 || !user?.id) {\n return;\n }\n\n // Move pending keys to in-flight to prevent duplicate requests\n pending.forEach(k => inFlightRef.current.add(k));\n setIsLoading(true);\n try {\n // Parse pending keys back to entities (format: userId:entityType:entityId)\n const entities = pending.map(key_0 => {\n const parts = key_0.split(\":\");\n // Skip the userId part (index 0), use entityType (index 1) and entityId (index 2)\n const entityType = parts[1];\n const entityIdStr = parts[2];\n return {\n entity_type: entityType as EntityType,\n entity_id: parseInt(entityIdStr, 10)\n };\n });\n\n // Call RPC for batch lookup\n // Using 'as any' because the RPC function type isn't in the generated database types\n const {\n data,\n error\n } = await (supabase.rpc as any)(\"get_user_entity_permissions\", {\n p_user_id: user.id,\n p_entities: entities\n });\n if (error) {\n console.error(\"Failed to fetch entity permissions:\", error);\n // Mark all pending as no permission with shorter TTL to allow quick retry\n const cache_0 = cacheRef.current;\n const now_0 = Date.now();\n for (const key_1 of pending) {\n cache_0.set(key_1, {\n permission: noPermission,\n expiresAt: now_0 + ERROR_CACHE_TTL_MS\n });\n }\n } else if (data) {\n // Update cache with results\n const cache_1 = cacheRef.current;\n const now_1 = Date.now();\n\n // Create a map of results for quick lookup\n // Permission can be a standard level or 'denied' for explicit deny\n const resultsMap = new Map<string, EntityPermissionLevel | \"denied\">();\n // Type the data as an array of permission results\n const results = data as Array<{\n entity_type: EntityType;\n entity_id: number;\n permission: EntityPermissionLevel | \"denied\";\n }>;\n for (const result of results) {\n const key_2 = getCacheKey(user?.id, result.entity_type, result.entity_id);\n resultsMap.set(key_2, result.permission);\n }\n\n // Update cache for all pending keys\n for (const key_3 of pending) {\n const permissionLevel = resultsMap.get(key_3) || null;\n cache_1.set(key_3, {\n permission: mapPermissionLevel(permissionLevel),\n expiresAt: now_1 + CACHE_TTL_MS\n });\n }\n }\n forceUpdate(prev_0 => prev_0 + 1);\n } catch (err) {\n console.error(\"Unexpected error fetching entity permissions:\", err);\n } finally {\n // Remove from in-flight after completion (success or error)\n pending.forEach(k => inFlightRef.current.delete(k));\n setIsLoading(false);\n }\n }, [supabase, user?.id]);\n\n // Schedule batch lookup\n const scheduleBatchLookup = useCallback(() => {\n if (batchTimerRef.current) {\n clearTimeout(batchTimerRef.current);\n }\n batchTimerRef.current = setTimeout(() => {\n batchTimerRef.current = null;\n executeBatchLookup();\n }, BATCH_DELAY_MS);\n }, [executeBatchLookup]);\n\n // Get permission for an entity\n const getPermission = useCallback((entityType_0: EntityType, entityId: number): EntityPermissionCheck => {\n const key_4 = getCacheKey(user?.id, entityType_0, entityId);\n const cache_2 = cacheRef.current;\n const cached = cache_2.get(key_4);\n const now_2 = Date.now();\n\n // Return cached if valid\n if (cached && cached.expiresAt > now_2) {\n return cached.permission;\n }\n\n // Don't add if already pending or in-flight to prevent duplicate requests\n if (!pendingLookupsRef.current.has(key_4) && !inFlightRef.current.has(key_4)) {\n pendingLookupsRef.current.add(key_4);\n scheduleBatchLookup();\n }\n return loadingPermission;\n }, [scheduleBatchLookup, user?.id]);\n\n // Check specific permission action\n const checkPermission = useCallback((entityType_1: EntityType, entityId_0: number, action: EntityAction): boolean => {\n const permission = getPermission(entityType_1, entityId_0);\n if (permission.isLoading) {\n return false;\n }\n switch (action) {\n case \"view\":\n return permission.canView;\n case \"adminView\":\n return permission.canAdminView;\n case \"edit\":\n return permission.canEdit;\n case \"create\":\n return permission.canCreate;\n case \"delete\":\n return permission.canDelete;\n case \"share\":\n return permission.canShare;\n default:\n return false;\n }\n }, [getPermission]);\n\n // Prefetch permissions for multiple entities\n const prefetchPermissions = useCallback(async (entities_0: EntityIdentifier[]): Promise<void> => {\n if (!user?.id || entities_0.length === 0) {\n return;\n }\n const cache_3 = cacheRef.current;\n const now_3 = Date.now();\n\n // Filter out already cached entries, items already pending, and items in-flight\n const toFetch = entities_0.filter(entity => {\n const key_5 = getCacheKey(user?.id, entity.entityType, entity.entityId);\n const cached_0 = cache_3.get(key_5);\n const isPending = pendingLookupsRef.current.has(key_5);\n const isInFlight = inFlightRef.current.has(key_5);\n return !isPending && !isInFlight && (!cached_0 || cached_0.expiresAt <= now_3);\n });\n if (toFetch.length === 0) {\n return;\n }\n setIsLoading(true);\n try {\n const entitiesParam = toFetch.map(e => ({\n entity_type: e.entityType,\n entity_id: e.entityId\n }));\n\n // Using 'as any' because the RPC function type isn't in the generated database types\n const {\n data: data_0,\n error: error_0\n } = await (supabase.rpc as any)(\"get_user_entity_permissions\", {\n p_user_id: user.id,\n p_entities: entitiesParam\n });\n if (error_0) {\n console.error(\"Failed to prefetch entity permissions:\", error_0);\n return;\n }\n if (data_0) {\n // Capture timestamp AFTER the RPC call completes\n const cacheTimestamp = Date.now();\n\n // Permission can be a standard level or 'denied' for explicit deny\n const resultsMap_0 = new Map<string, EntityPermissionLevel | \"denied\">();\n // Type the data as an array of permission results\n const results_0 = data_0 as Array<{\n entity_type: EntityType;\n entity_id: number;\n permission: EntityPermissionLevel | \"denied\";\n }>;\n for (const result_0 of results_0) {\n const key_6 = getCacheKey(user?.id, result_0.entity_type, result_0.entity_id);\n resultsMap_0.set(key_6, result_0.permission);\n }\n for (const entity_0 of toFetch) {\n const key_7 = getCacheKey(user?.id, entity_0.entityType, entity_0.entityId);\n const permissionLevel_0 = resultsMap_0.get(key_7) || null;\n cache_3.set(key_7, {\n permission: mapPermissionLevel(permissionLevel_0),\n expiresAt: cacheTimestamp + CACHE_TTL_MS\n });\n }\n forceUpdate(prev_1 => prev_1 + 1);\n }\n } catch (err_0) {\n console.error(\"Unexpected error prefetching entity permissions:\", err_0);\n } finally {\n setIsLoading(false);\n }\n }, [supabase, user?.id]);\n\n // Invalidate a specific permission\n const invalidatePermission = useCallback((entityType_2: EntityType, entityId_1: number): void => {\n const key_8 = getCacheKey(user?.id, entityType_2, entityId_1);\n cacheRef.current.delete(key_8);\n forceUpdate(prev_2 => prev_2 + 1);\n }, [user?.id]);\n\n // Parse scoped access key format: <entity_type>:<entity_id>:<permission_level>\n // Returns null if the key format is invalid\n const parseScopedAccessKey = useCallback((key_9: string): {\n entityType: EntityType;\n entityId: number;\n } | null => {\n if (!key_9 || typeof key_9 !== \"string\") {\n return null;\n }\n const parts_0 = key_9.split(\":\");\n if (parts_0.length < 2) {\n return null;\n }\n const entityType_3 = parts_0[0];\n const entityId_2 = parseInt(parts_0[1], 10);\n if (isNaN(entityId_2)) {\n return null;\n }\n // Use explicit mapping instead of string manipulation\n // This correctly handles \"database\" -> \"ProjectDatabase\" case\n const entityTypeMap: Record<string, EntityType> = {\n client: \"Client\",\n project: \"Project\",\n database: \"ProjectDatabase\",\n projectdatabase: \"ProjectDatabase\"\n };\n const normalizedEntityType = entityTypeMap[entityType_3.toLowerCase()];\n if (!normalizedEntityType) {\n return null;\n }\n return {\n entityType: normalizedEntityType,\n entityId: entityId_2\n };\n }, []);\n\n // Real-time subscription for permission changes\n useEffect(() => {\n if (!user?.id) {\n return;\n }\n\n // Subscribe to changes on UserAccess table for the current user\n // Use unique channel name per user to avoid collisions\n const channel = supabase.channel(`entity-permissions-${user.id}`).on(\"postgres_changes\", {\n event: \"*\",\n schema: \"core\",\n table: \"UserAccess\",\n filter: `userId=eq.${user.id}`\n }, payload => {\n // Parse the scoped access key from the new record\n if (payload.new && typeof payload.new === \"object\" && \"scopedAccessKey\" in payload.new && typeof payload.new.scopedAccessKey === \"string\") {\n const parsed = parseScopedAccessKey(payload.new.scopedAccessKey);\n if (parsed) {\n invalidatePermission(parsed.entityType, parsed.entityId);\n }\n }\n // Parse the scoped access key from the old record (for deletes/updates)\n if (payload.old && typeof payload.old === \"object\" && \"scopedAccessKey\" in payload.old && typeof payload.old.scopedAccessKey === \"string\") {\n const parsed_0 = parseScopedAccessKey(payload.old.scopedAccessKey);\n if (parsed_0) {\n invalidatePermission(parsed_0.entityType, parsed_0.entityId);\n }\n }\n }).subscribe();\n return () => {\n channel.unsubscribe();\n supabase.removeChannel(channel);\n };\n }, [supabase, user?.id, invalidatePermission, parseScopedAccessKey]);\n\n // Clear cache on user change\n useEffect(() => {\n cacheRef.current.clear();\n pendingLookupsRef.current.clear();\n inFlightRef.current.clear();\n if (batchTimerRef.current) {\n clearTimeout(batchTimerRef.current);\n batchTimerRef.current = null;\n }\n forceUpdate(prev_3 => prev_3 + 1);\n }, [user?.id]);\n\n // Cleanup batch timer on unmount\n useEffect(() => {\n return () => {\n if (batchTimerRef.current) {\n clearTimeout(batchTimerRef.current);\n }\n };\n }, []);\n const value = useMemo(() => ({\n getPermission,\n checkPermission,\n prefetchPermissions,\n invalidatePermission,\n isLoading\n }), [getPermission, checkPermission, prefetchPermissions, invalidatePermission, isLoading]);\n return <permissionContext.Provider value={value}>\n {children}\n </permissionContext.Provider>;\n}\nexport function usePermissions() {\n const context = useContext(permissionContext);\n if (!context || Object.keys(context).length === 0) {\n throw new Error(\"usePermissions must be used within a PermissionProvider\");\n }\n return context;\n}","import { useDbQuery } from \"../../hooks/useDbQuery\";\nimport useSupabase, { typedSupabase } from \"../../useSupabase\";\nimport { isUsable, newUuid } from \"@pol-studios/utils\";\nimport { QueryData, SignUpWithPasswordCredentials, User } from \"@supabase/supabase-js\";\nimport { ReactNode, useCallback, useEffect, useMemo, useRef, useState } from \"react\";\nimport { PermissionProvider } from \"./PermissionContext\";\n// Import from shared context to use internally\nimport { setupAuthContext, type ProfileStatus, type EffectivePermission } from \"./setupAuthContext\";\n// Re-export from shared context to maintain API compatibility\nexport { setupAuthContext, type SetupAuthContext, type SetupAuthContextProviderProps, type ProfileStatus, type EffectivePermission } from \"./setupAuthContext\";\n\n/**\n * Maps permission action strings to numeric levels for comparison.\n * Higher numbers grant more access.\n */\nfunction getPermissionLevel(action: string): number {\n switch (action.toLowerCase()) {\n case \"view\":\n case \"read\":\n return 1;\n case \"edit\":\n case \"write\":\n return 2;\n case \"admin\":\n case \"delete\":\n case \"share\":\n return 3;\n default:\n return 0;\n }\n}\nconst profileQuery = typedSupabase?.schema(\"core\").from(\"Profile\").select(\"*, UserAccess(accessKey), status\").single();\nexport type Profile = QueryData<typeof profileQuery>;\nexport interface AuthProviderProps {\n children: ReactNode;\n /**\n * Enable entity-level permissions system (Project, Client, ProjectDatabase access control).\n * When enabled, wraps children with PermissionProvider.\n * @default false\n */\n enableEntityPermissions?: boolean;\n}\n\n// ============================================================================\n// Types for access-related tables (synced via PowerSync)\n// ============================================================================\n\ninterface UserAccessRow {\n id: string;\n accessKey: string;\n effect: string;\n expiresAt: string | null;\n grantedAt: string | null;\n grantedBy: string | null;\n userId: string;\n}\ninterface UserGroupRow {\n id: string;\n userId: string;\n groupId: number;\n expiresAt: string | null;\n grantedAt: string | null;\n grantedBy: string | null;\n}\ninterface GroupAccessKeyRow {\n id: string;\n groupId: number;\n accessKey: string;\n effect: string;\n expiresAt?: string | null;\n}\ninterface GroupRow {\n id: number;\n name: string;\n isActive: number; // PowerSync stores booleans as 0/1\n description?: string | null;\n createdAt?: string | null;\n createdBy?: string | null;\n}\ninterface ProfileRow {\n id: string;\n email?: string | null;\n firstName?: string | null;\n lastName?: string | null;\n fullName?: string | null;\n status?: string | null;\n [key: string]: unknown;\n}\n\n/** Check if a date string is not expired (null = never expires) */\nfunction isNotExpired(expiresAt: string | null | undefined): boolean {\n return !expiresAt || new Date(expiresAt) > new Date();\n}\nexport function AuthProvider({\n children,\n enableEntityPermissions = false\n}: AuthProviderProps) {\n const supabase = useSupabase();\n const [currentUser, setCurrentUser] = useState<User | null | undefined>(undefined);\n const [userNeedsChange, setUserNeedsChange] = useState(true);\n // Prevents premature isLoading=false during async gap between auth event and session fetch\n const [onSignOutCallbacks, setOnSignOutCallbacks] = useState(new Map<string, () => any>());\n async function registerAsync(register: SignUpWithPasswordCredentials) {\n const response = await supabase.auth.signUp(register);\n setCurrentUser(prev => {\n const newUser = response.data.user;\n if (prev?.id === newUser?.id) {\n return prev;\n }\n return newUser;\n });\n return response;\n }\n async function signInAsync(username: string, password: string) {\n const response_0 = await supabase.auth.signInWithPassword({\n email: username,\n password\n });\n if (response_0.data) {\n setCurrentUser(prev_0 => {\n const newUser_0 = response_0.data.user;\n if (prev_0?.id === newUser_0?.id) {\n return prev_0;\n }\n return newUser_0;\n });\n }\n return response_0;\n }\n async function signOutAsync() {\n const response_1 = await supabase.auth.signOut();\n if (isUsable(response_1.error) === false) {\n Array.from(onSignOutCallbacks.values()).forEach(x => {\n x();\n });\n }\n return response_1;\n }\n function onSignOut(action: () => any) {\n const id = newUuid();\n setOnSignOutCallbacks(x_0 => new Map(x_0).set(id, action));\n return id;\n }\n function removeOnSignOut(id_0: string) {\n setOnSignOutCallbacks(x_1 => {\n const map = new Map(x_1);\n map.delete(id_0);\n return map;\n });\n }\n async function refreshAsync() {}\n useEffect(() => {\n const request = supabase.auth.onAuthStateChange(event => {\n if (event === \"SIGNED_IN\" || event === \"SIGNED_OUT\") {\n setUserNeedsChange(true);\n }\n });\n return () => {\n request.data.subscription.unsubscribe();\n };\n }, [supabase.auth]);\n useEffect(() => {\n if (userNeedsChange === false) return;\n supabase.auth.getSession().then(x_2 => {\n setCurrentUser(prev_1 => {\n const newUser_1 = x_2?.data?.session?.user ?? null;\n if (newUser_1 === null) return null;\n // Only update reference if user actually changed\n if (prev_1?.id === newUser_1?.id) {\n return prev_1;\n }\n return newUser_1;\n });\n setUserNeedsChange(false);\n }).catch(error => {\n console.error(\"Failed to get session:\", error);\n setCurrentUser(prev_2 => prev_2 === null ? prev_2 : null);\n setUserNeedsChange(false);\n });\n }, [userNeedsChange]);\n\n // Query user's profile using V3 hook\n const {\n data: profileData,\n isLoading: profileLoading,\n refetch: refetchProfile\n } = useDbQuery<ProfileRow>(\"core.Profile\", {\n where: {\n id: currentUser?.id\n },\n enabled: isUsable(currentUser)\n });\n // Cast to Profile type to match the context interface\n const profile = profileData?.[0] as Profile | null ?? null;\n\n // Query user's direct access using V3 hook\n const {\n data: directAccess,\n isLoading: directAccessLoading,\n refetch: refetchDirectAccess\n } = useDbQuery<UserAccessRow>(\"core.UserAccess\", {\n where: {\n userId: currentUser?.id\n },\n enabled: isUsable(currentUser)\n });\n\n // Query user's group memberships using V3 hook\n const {\n data: userGroups,\n isLoading: userGroupsLoading,\n refetch: refetchUserGroups\n } = useDbQuery<UserGroupRow>(\"core.UserGroup\", {\n where: {\n userId: currentUser?.id\n },\n enabled: isUsable(currentUser)\n });\n\n // Query active groups using V3 hook\n const {\n data: groups,\n isLoading: groupsLoading,\n refetch: refetchGroups\n } = useDbQuery<GroupRow>(\"core.Group\", {\n where: {\n isActive: 1\n },\n // PowerSync stores booleans as 0/1\n enabled: isUsable(currentUser)\n });\n\n // Get group IDs the user belongs to\n const groupIds = useMemo(() => userGroups?.map(ug => ug.groupId) ?? [], [userGroups]);\n\n // Map groups by ID for O(1) lookups\n const groupsMap = useMemo(() => new Map(groups?.map(g => [g.id, g]) ?? []), [groups]);\n\n // Query group access keys for user's groups using V3 hook\n const {\n data: groupAccess,\n isLoading: groupAccessLoading,\n refetch: refetchGroupAccess\n } = useDbQuery<GroupAccessKeyRow>(\"core.GroupAccessKey\", {\n where: groupIds.length > 0 ? {\n groupId: {\n in: groupIds\n }\n } : undefined,\n enabled: groupIds.length > 0\n });\n\n // Stable refetch callback for access data (replaces RPC calls)\n const refetchAccessData = useCallback(() => {\n refetchDirectAccess();\n refetchUserGroups();\n refetchGroups();\n refetchGroupAccess();\n }, [refetchDirectAccess, refetchUserGroups, refetchGroups, refetchGroupAccess]);\n\n // Track user's group IDs for filtering GroupAccessKey changes\n const userGroupIdsRef = useRef<Set<number>>(new Set());\n\n // Update group IDs ref when userGroups changes\n useEffect(() => {\n if (userGroups) {\n const groupIdSet = new Set<number>();\n for (const ug_0 of userGroups) {\n if (ug_0.groupId) {\n groupIdSet.add(typeof ug_0.groupId === \"number\" ? ug_0.groupId : parseInt(ug_0.groupId, 10));\n }\n }\n userGroupIdsRef.current = groupIdSet;\n }\n }, [userGroups]);\n\n // Real-time subscription for access key changes (direct + group-based)\n useEffect(() => {\n if (!currentUser?.id) return;\n const channel = supabase.channel(`user-access-keys-${currentUser.id}`)\n // Direct access changes\n .on(\"postgres_changes\", {\n event: \"*\",\n schema: \"core\",\n table: \"UserAccess\",\n filter: `userId=eq.${currentUser.id}`\n }, () => {\n refetchAccessData();\n })\n // Group membership changes for this user\n .on(\"postgres_changes\", {\n event: \"*\",\n schema: \"core\",\n table: \"UserGroup\",\n filter: `userId=eq.${currentUser.id}`\n }, () => {\n refetchAccessData();\n })\n // Group access key changes (check if user is in affected group)\n .on(\"postgres_changes\", {\n event: \"*\",\n schema: \"core\",\n table: \"GroupAccessKey\"\n }, payload => {\n const groupId = (payload.new as {\n groupId?: number;\n })?.groupId || (payload.old as {\n groupId?: number;\n })?.groupId;\n if (groupId && userGroupIdsRef.current.has(groupId)) {\n refetchAccessData();\n }\n })\n // Group activation/deactivation\n .on(\"postgres_changes\", {\n event: \"UPDATE\",\n schema: \"core\",\n table: \"Group\"\n }, payload_0 => {\n const oldActive = (payload_0.old as {\n isActive?: boolean;\n })?.isActive;\n const newActive = (payload_0.new as {\n isActive?: boolean;\n })?.isActive;\n const groupId_0 = (payload_0.new as {\n id?: number;\n })?.id;\n // Refetch if activation status changed and user is in this group\n if (oldActive !== newActive && groupId_0 && userGroupIdsRef.current.has(groupId_0)) {\n refetchAccessData();\n }\n }).subscribe();\n return () => {\n channel.unsubscribe();\n supabase.removeChannel(channel);\n };\n }, [supabase, currentUser?.id, refetchAccessData]);\n\n // Real-time subscription for profile status changes (force signout if archived/suspended)\n useEffect(() => {\n if (!currentUser?.id) return;\n const profileChannel = supabase.channel(`profile-status-${currentUser.id}`).on(\"postgres_changes\", {\n event: \"UPDATE\",\n schema: \"core\",\n table: \"Profile\",\n filter: `id=eq.${currentUser.id}`\n }, payload_1 => {\n const newStatus = (payload_1.new as {\n status?: string;\n })?.status;\n const oldStatus = (payload_1.old as {\n status?: string;\n })?.status;\n\n // If status changed to archived/suspended, force sign out\n if (oldStatus === \"active\" && (newStatus === \"archived\" || newStatus === \"suspended\")) {\n signOutAsync();\n }\n\n // Refetch profile data to update UI\n refetchProfile();\n }).subscribe();\n return () => {\n profileChannel.unsubscribe();\n supabase.removeChannel(profileChannel);\n };\n }, [supabase, currentUser?.id, refetchProfile]);\n\n // All access keys with metadata (for detailed permission info)\n const allAccessKeys = useMemo(() => {\n const keys: Array<{\n accessKey: string;\n effect: string;\n source: \"direct\" | \"group\";\n expiresAt?: string | null;\n }> = [];\n\n // Add direct access keys (filter out expired)\n directAccess?.forEach(a => {\n if (isNotExpired(a.expiresAt)) {\n keys.push({\n accessKey: a.accessKey,\n effect: a.effect ?? \"allow\",\n source: \"direct\",\n expiresAt: a.expiresAt\n });\n }\n });\n\n // Add group access keys (only from active groups user belongs to)\n const activeGroupIds = new Set(userGroups?.filter(ug_1 => {\n const group = groupsMap.get(ug_1.groupId); // O(1) lookup\n return group?.isActive === 1 && isNotExpired(ug_1.expiresAt);\n }).map(ug_2 => ug_2.groupId) ?? []);\n groupAccess?.forEach(ga => {\n if (activeGroupIds.has(ga.groupId) && isNotExpired(ga.expiresAt)) {\n keys.push({\n accessKey: ga.accessKey,\n effect: ga.effect ?? \"allow\",\n source: \"group\",\n expiresAt: ga.expiresAt\n });\n }\n });\n return keys;\n }, [directAccess, userGroups, groupsMap, groupAccess]);\n\n // Combine access keys into a simple string array for hasAccess checks\n const combinedAccess: string[] = useMemo(() => {\n const uniqueKeys = new Set<string>();\n for (const item of allAccessKeys) {\n // Only include \"allow\" effect keys\n if (item.accessKey && item.effect === \"allow\") {\n uniqueKeys.add(item.accessKey);\n }\n }\n return Array.from(uniqueKeys);\n }, [allAccessKeys]);\n\n // Compute effective permissions client-side from access keys\n const effectivePermissions: EffectivePermission[] = useMemo(() => {\n const permissions: EffectivePermission[] = [];\n for (const item_0 of allAccessKeys) {\n // Only process \"allow\" effect keys\n if (item_0.effect !== \"allow\") continue;\n\n // Parse access key format: type:id:action or type:*:action\n const parts = item_0.accessKey.split(\":\");\n if (parts.length === 3) {\n const [resourceType, resourceId, permission] = parts;\n const permissionLevel = getPermissionLevel(permission);\n permissions.push({\n resourceType,\n resourceId,\n permission,\n permissionLevel,\n source: item_0.source,\n inheritedFrom: null,\n expiresAt: item_0.expiresAt ?? null\n });\n }\n }\n return permissions;\n }, [allAccessKeys]);\n\n // Compute profile status values\n const profileStatus = profile?.status as ProfileStatus | undefined;\n const isArchived = profileStatus === \"archived\";\n const isSuspended = profileStatus === \"suspended\";\n const hasAccess = useCallback((key: string) => {\n // Archived/suspended users have no access\n if (isArchived || isSuspended) {\n return false;\n }\n const accessGiven = combinedAccess;\n if (isUsable(accessGiven) === false) return false;\n // Super-admin key bypasses all permission checks\n if (accessGiven.includes(\"*:*:*\")) return true;\n if (accessGiven.includes(key)) return true;\n if (isUsable(key) === false) return true;\n\n // Check if this is an entity-level permission key (format: type:id:action)\n const parts_0 = key.split(\":\");\n if (parts_0.length === 3) {\n const [type, id_1, action_0] = parts_0;\n const requiredLevel = getPermissionLevel(action_0);\n\n // Check against effective permissions\n const hasPermission = effectivePermissions.some(p => p.resourceType === type && p.resourceId === id_1 && p.permissionLevel >= requiredLevel);\n if (hasPermission) {\n return true;\n }\n }\n return false;\n }, [combinedAccess, effectivePermissions, isArchived, isSuspended]);\n\n // Compute overall loading state for auth data\n const isAccessLoading = directAccessLoading || userGroupsLoading || groupsLoading || groupAccessLoading;\n const authStateWithLoading = useMemo(() => ({\n hasAccess,\n user: currentUser,\n profile,\n access: combinedAccess,\n effectivePermissions,\n profileStatus,\n isArchived,\n isSuspended,\n isLoading: currentUser === null ? false : profileLoading || isAccessLoading || currentUser === undefined,\n signInAsync,\n signOutAsync,\n onSignOut,\n removeOnSignOut,\n registerAsync,\n refreshAsync\n }), [profile, profileLoading, isAccessLoading, currentUser, combinedAccess, effectivePermissions, profileStatus, isArchived, isSuspended, hasAccess]);\n const content = enableEntityPermissions ? <PermissionProvider>{children}</PermissionProvider> : children;\n return <setupAuthContext.Provider value={authStateWithLoading}>\n {content}\n </setupAuthContext.Provider>;\n}","import { c as _c } from \"react/compiler-runtime\";\nimport { ReactNode, createContext, useContext, useEffect, useMemo, useState, useCallback, useRef } from \"react\";\nimport { useDbQuery as useQuery } from \"../../useDbQuery\";\nimport { useDbUpsert as useUpsert } from \"../../useDbUpsert\";\nimport useSupabase, { Database } from \"../../useSupabase\";\nimport { isUsable } from \"@pol-studios/utils\";\nimport { setupAuthContext } from \"./AuthProvider\";\n\n// UserMetadata query constant\nconst UserMetadataQuery = {\n schema: \"core\",\n table: \"UserMetadata\",\n defaultQuery: \"key, userId, value\"\n} as const;\n\n// Type definitions for UserMetadata\nexport type UserMetadataRow = Database[\"core\"][\"Tables\"][\"UserMetadata\"][\"Row\"];\nexport type UserMetadataInsert = Database[\"core\"][\"Tables\"][\"UserMetadata\"][\"Insert\"];\nexport type UserMetadataUpdate = Database[\"core\"][\"Tables\"][\"UserMetadata\"][\"Update\"];\n\n// Context interface\nexport interface UserMetadataContextType {\n metadata: Record<string, string>;\n isLoading: boolean;\n error: Error | null;\n setMetadata: (key: string, value: string) => Promise<void>;\n getMetadata: (key: string) => string | undefined;\n removeMetadata: (key: string) => Promise<void>;\n refreshMetadata: () => Promise<void>;\n}\n\n// Create context\nexport const userMetadataContext = createContext<UserMetadataContextType | null>(null);\n\n// Provider component\nexport function UserMetadataProvider({\n children\n}: {\n children: ReactNode;\n}) {\n const supabase = useSupabase();\n const [metadata, setMetadataState] = useState<Record<string, string>>({});\n const [isLoading, setIsLoading] = useState(true);\n const [error, setError] = useState<Error | null>(null);\n\n // Get current user ID from auth context\n const setupAuth = useContext(setupAuthContext);\n const userId = setupAuth?.user?.id;\n\n // Query to fetch all user metadata\n const metadataQuery = useQuery(supabase.schema(\"core\").from(\"UserMetadata\").select(UserMetadataQuery.defaultQuery).eq(\"userId\", userId!).order(\"key\"), {\n enabled: isUsable(userId),\n crossOrganization: true\n });\n\n // Upsert mutation for updating metadata\n const upsertMutation = useUpsert({\n table: \"UserMetadata\",\n schema: \"core\"\n }, [\"userId\", \"key\"] // composite primary keys\n );\n\n // Ref to hold mutation to avoid infinite loops in useCallback dependencies\n const upsertMutationRef = useRef(upsertMutation);\n upsertMutationRef.current = upsertMutation;\n\n // Update local state when query data changes\n useEffect(() => {\n if (metadataQuery.data && Array.isArray(metadataQuery.data)) {\n const metadataMap: Record<string, string> = {};\n metadataQuery.data.forEach((item: any) => {\n metadataMap[item.key] = item.value;\n });\n setMetadataState(metadataMap);\n setIsLoading(false);\n setError(null);\n } else if (metadataQuery.error) {\n setError(metadataQuery.error);\n setIsLoading(false);\n } else if (metadataQuery.isLoading) {\n setIsLoading(true);\n } else if (metadataQuery.data && !Array.isArray(metadataQuery.data)) {\n // Handle case where data is not an array (e.g., empty response or count)\n setMetadataState({});\n setIsLoading(false);\n }\n }, [metadataQuery.data, metadataQuery.error, metadataQuery.isLoading]);\n\n // Set metadata function\n const setMetadata = useCallback(async (key: string, value: string) => {\n if (!userId) {\n throw new Error(\"User not authenticated\");\n }\n try {\n await upsertMutationRef.current.mutateAsync({\n userId,\n key,\n value\n });\n\n // Update local state optimistically\n setMetadataState(prev => ({\n ...prev,\n [key]: value\n }));\n } catch (err) {\n setError(err as Error);\n throw err;\n }\n }, [userId]);\n\n // Get metadata function\n const getMetadata = useCallback((key_0: string): string | undefined => {\n return metadata[key_0];\n }, [metadata]);\n\n // Remove metadata function\n const removeMetadata = useCallback(async (key_1: string) => {\n if (!userId) {\n throw new Error(\"User not authenticated\");\n }\n try {\n await supabase.schema(\"core\").from(\"UserMetadata\").delete().eq(\"userId\", userId).eq(\"key\", key_1);\n\n // Update local state\n setMetadataState(prev_0 => {\n const newState = {\n ...prev_0\n };\n delete newState[key_1];\n return newState;\n });\n } catch (err_0) {\n setError(err_0 as Error);\n throw err_0;\n }\n }, [userId, supabase]);\n\n // Refresh metadata function\n const refreshMetadata = useCallback(async () => {\n await metadataQuery.refetch();\n }, [metadataQuery]);\n\n // Context value\n const contextValue = useMemo(() => ({\n metadata,\n isLoading,\n error,\n setMetadata,\n getMetadata,\n removeMetadata,\n refreshMetadata\n }), [metadata, isLoading, error, setMetadata, getMetadata, removeMetadata, refreshMetadata]);\n return <userMetadataContext.Provider value={contextValue}>\n {children}\n </userMetadataContext.Provider>;\n}\n\n// Hook to use the context\nexport function useUserMetadata() {\n const context = useContext(userMetadataContext);\n if (!context) {\n throw new Error(\"useUserMetadata must be used within a UserMetadataProvider\");\n }\n return context;\n}\n\n// Convenience hook for getting a specific metadata value\nexport function useUserMetadataValue(key) {\n const $ = _c(3);\n const {\n getMetadata\n } = useUserMetadata();\n let t0;\n if ($[0] !== getMetadata || $[1] !== key) {\n t0 = getMetadata(key);\n $[0] = getMetadata;\n $[1] = key;\n $[2] = t0;\n } else {\n t0 = $[2];\n }\n return t0;\n}\n\n// Convenience hook for setting a specific metadata value\nexport function useSetUserMetadata() {\n const $ = _c(3);\n const {\n setMetadata,\n removeMetadata\n } = useUserMetadata();\n let t0;\n if ($[0] !== removeMetadata || $[1] !== setMetadata) {\n t0 = {\n setMetadata,\n removeMetadata\n };\n $[0] = removeMetadata;\n $[1] = setMetadata;\n $[2] = t0;\n } else {\n t0 = $[2];\n }\n return t0;\n}\n\n// Advanced state-like hook with JSON serialization support\nexport function useUserMetadataState(key, defaultValue, options) {\n const $ = _c(11);\n const {\n metadata,\n setMetadata,\n isLoading\n } = useUserMetadata();\n const serialize = options?.serialize ?? _temp;\n const deserialize = options?.deserialize ?? _temp2;\n let t0;\n bb0: {\n const rawValue = metadata[key];\n if (!rawValue) {\n t0 = defaultValue;\n break bb0;\n }\n ;\n try {\n let t2;\n if ($[0] !== deserialize || $[1] !== rawValue) {\n t2 = deserialize(rawValue);\n $[0] = deserialize;\n $[1] = rawValue;\n $[2] = t2;\n } else {\n t2 = $[2];\n }\n t0 = t2;\n } catch (t1) {\n const error = t1;\n console.warn(`Failed to deserialize metadata for key \"${key}\":`, error);\n t0 = defaultValue;\n }\n }\n const currentValue = t0;\n let t1;\n if ($[3] !== key || $[4] !== serialize || $[5] !== setMetadata) {\n t1 = async value_1 => {\n const serializedValue = serialize(value_1);\n await setMetadata(key, serializedValue);\n };\n $[3] = key;\n $[4] = serialize;\n $[5] = setMetadata;\n $[6] = t1;\n } else {\n t1 = $[6];\n }\n const setValue = t1;\n let t2;\n if ($[7] !== currentValue || $[8] !== isLoading || $[9] !== setValue) {\n t2 = [currentValue, setValue, isLoading];\n $[7] = currentValue;\n $[8] = isLoading;\n $[9] = setValue;\n $[10] = t2;\n } else {\n t2 = $[10];\n }\n return t2;\n}\nfunction _temp2(value_0) {\n return JSON.parse(value_0);\n}\nfunction _temp(value) {\n return JSON.stringify(value);\n}","import { c as _c } from \"react/compiler-runtime\";\nimport { useMutation } from \"@tanstack/react-query\";\nimport useSupabase, { Database } from \"./useSupabase\";\nimport { useQueriesForTableLoader, useUpdateMutation, useUpsertItem } from \"@supabase-cache-helpers/postgrest-react-query\";\nimport { GetResult } from \"./parser/select-query-parser\";\nimport { GenericSchema } from \"./parser/types\";\nimport { isUsable } from \"@pol-studios/utils\";\nimport { omit } from \"@pol-studios/utils\";\nimport { buildNormalizedQuery } from \"@supabase-cache-helpers/postgrest-core\";\ntype ItemType<T> = T extends Array<infer U> ? U : T;\nexport type MutationOption = Parameters<typeof useUpdateMutation>[3];\nexport type useDbUpsertResponse = ReturnType<typeof useDbUpsert>;\nexport function useDbUpsert(relation, t0, query, mutationOption) {\n const $ = _c(16);\n let t1;\n if ($[0] !== t0) {\n t1 = t0 === undefined ? [\"id\"] : t0;\n $[0] = t0;\n $[1] = t1;\n } else {\n t1 = $[1];\n }\n const primaryKeys = t1;\n const tableName = typeof relation === \"object\" ? relation.table : relation;\n const schemaName = typeof relation === \"object\" ? String(relation.schema) : \"public\";\n const supabase = useSupabase();\n let t2;\n if ($[2] !== primaryKeys) {\n t2 = primaryKeys.map(_temp);\n $[2] = primaryKeys;\n $[3] = t2;\n } else {\n t2 = $[3];\n }\n const primaryKeysAsStrings = t2 as string[];\n const t3 = primaryKeysAsStrings as any;\n const t4 = relation as any;\n let t5;\n if ($[4] !== t3 || $[5] !== t4) {\n t5 = {\n primaryKeys: t3,\n table: t4,\n schema: \"public\"\n };\n $[4] = t3;\n $[5] = t4;\n $[6] = t5;\n } else {\n t5 = $[6];\n }\n const upsertItem = useUpsertItem(t5);\n const queriesForTable = useQueriesForTableLoader(tableName);\n let t6;\n if ($[7] !== primaryKeys || $[8] !== primaryKeysAsStrings || $[9] !== queriesForTable || $[10] !== query || $[11] !== schemaName || $[12] !== supabase || $[13] !== tableName || $[14] !== upsertItem) {\n t6 = {\n mutationFn: async item => {\n let result = null;\n const selectQuery = buildNormalizedQuery({\n queriesForTable,\n query\n });\n const insert = async function insert() {\n const keysToFilter = primaryKeys.filter(x => isUsable((item as any)[x]) === false);\n const keysToFilterAsStrings = keysToFilter.map(_temp2) as string[];\n const response = await (supabase as any).schema(schemaName as \"public\" | \"core\").from(tableName).insert(omit(item as any, keysToFilterAsStrings as any) as any).select(query).single();\n if (response.error) {\n throw response.error;\n }\n result = response.data as any;\n if (result) {\n upsertItem(result as any);\n }\n };\n const isUpsertable = primaryKeys.every(x_0 => x_0 in item && isUsable((item as any)[x_0]));\n if (isUpsertable) {\n const query_0 = (supabase as any).schema(schemaName as \"public\" | \"core\").from(tableName).update(omit(item as any, primaryKeysAsStrings as any) as any);\n primaryKeys.forEach(x_1 => {\n query_0.eq(String(x_1), (item as any)[x_1]);\n });\n const queryResponse = await query_0.select(selectQuery?.selectQuery).single();\n console.log(\"queryResponse\", queryResponse, tableName);\n if (queryResponse.status === 406) {\n await insert();\n } else {\n if (queryResponse.error) {\n throw queryResponse.error;\n }\n if (queryResponse.data) {\n result = queryResponse.data as any;\n if (result) {\n upsertItem(result as any);\n }\n }\n }\n } else {\n await insert();\n }\n return result as any;\n }\n };\n $[7] = primaryKeys;\n $[8] = primaryKeysAsStrings;\n $[9] = queriesForTable;\n $[10] = query;\n $[11] = schemaName;\n $[12] = supabase;\n $[13] = tableName;\n $[14] = upsertItem;\n $[15] = t6;\n } else {\n t6 = $[15];\n }\n const mutation = useMutation(t6);\n return mutation;\n}\nfunction _temp2(k_0) {\n return String(k_0);\n}\nfunction _temp(k) {\n return String(k);\n}"],"mappings":";;;;;;;;;;;;;;;AAAO,IAAM,wBAAwB;AAC9B,IAAM,wBAAwB;AAE9B,SAAS,eAAe,OAA0C;AACvE,MAAI,CAAC,MAAO,QAAO;AACnB,SAAO,MAAM,SAAS,gBAAgB,MAAM,YAAY,yBAAyB,MAAM,QAAQ,YAAY,EAAE,SAAS,WAAW;AACnI;;;ACLA,SAAS,SAAS,cAAc;AAGhC,SAAS,YAAY;AACrB,SAAS,gBAAiC;AAC1C,SAAS,uBAAuB;AAWzB,SAASA,YAAmB,OAEhC,QAA+G;AAEhH,QAAM,WAAW,OAAO,OAAO,KAAK;AACpC,QAAM,iBAAiB,SAAS,KAAK,GAAG;AACxC,QAAM,qBAAqB,gBAAgB,gBAAgB,EAAE;AAG7D,QAAM,cAAc,mBAAmB;AACvC,QAAM,mBAAmB,QAAQ,YAAY,SAAS;AACtD,QAAM,YAAY,QAAQ,WAAW;AAGrC,QAAM,WAAW,OAAsB,IAAI;AAC3C,QAAM,UAAU,SAAS,QAAQ,OAAO;AAAA,IACtC;AAAA,IACA,SAAS,OAAO;AAAA,MACd;AAAA,IACF,MAAM;AACJ,YAAM,aAAa,IAAI,gBAAgB;AACvC,aAAO,iBAAiB,SAAS,MAAM,WAAW,MAAM,CAAC;AACzD,YAAM,YAAY,WAAW,MAAM,WAAW,MAAM,GAAG,SAAS;AAChE,UAAI;AAEF,cAAM,kBAAkB,MAAM,cAAc,WAAW,MAAM,KAAK;AAClE,cAAM,SAAS,MAAM;AACrB,YAAI,OAAO,MAAO,OAAM,OAAO;AAE/B,iBAAS,UAAU,OAAO,SAAS;AACnC,eAAO,OAAO;AAAA,MAChB,SAAS,KAAU;AACjB,YAAI,IAAI,SAAS,cAAc;AAC7B,gBAAM,IAAI,MAAM,qBAAqB;AAAA,QACvC;AACA,cAAM;AAAA,MACR,UAAE;AACA,qBAAa,SAAS;AAAA,MACxB;AAAA,IACF;AAAA,IACA,GAAG,KAAK;AAAA,MACN,OAAO;AAAA,MACP,GAAG;AAAA,MACH,SAAS;AAAA,IACX,GAAG,CAAC,YAAY,SAAS,CAAC;AAAA,EAC5B,IAAI,CAAC,UAAU,QAAQ,kBAAkB,WAAW,KAAK,CAAC,CAAC;AAG3D,SAAO,QAAQ,OAAO;AAAA,IACpB,GAAG;AAAA,IACH,OAAO,SAAS;AAAA,EAClB,IAAI,CAAC,SAAS,SAAS,OAAO,CAAC;AACjC;;;AC9DA,SAAS,qBAAgC;AAyDlC,IAAM,mBAAmB,cAAc,CAAC,CAAqB;;;AChEpE,SAAS,iBAAAC,gBAA0B,aAAa,YAAY,WAAW,WAAAC,UAAS,UAAAC,SAAQ,gBAAgB;AA6gB/F;AA3fT,SAAS,YAAY,QAA4B,YAAwB,UAA0B;AACjG,SAAO,GAAG,UAAU,MAAM,IAAI,UAAU,IAAI,QAAQ;AACtD;AAGA,IAAM,oBAA2C;AAAA,EAC/C,SAAS;AAAA,EACT,cAAc;AAAA,EACd,SAAS;AAAA,EACT,WAAW;AAAA,EACX,WAAW;AAAA,EACX,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,WAAW;AACb;AAGA,IAAM,eAAsC;AAAA,EAC1C,SAAS;AAAA,EACT,cAAc;AAAA,EACd,SAAS;AAAA,EACT,WAAW;AAAA,EACX,WAAW;AAAA,EACX,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,WAAW;AAAA,EACX,UAAU;AACZ;AAGA,IAAM,mBAA0C;AAAA,EAC9C,SAAS;AAAA,EACT,cAAc;AAAA,EACd,SAAS;AAAA,EACT,WAAW;AAAA,EACX,WAAW;AAAA,EACX,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,WAAW;AAAA,EACX,UAAU;AACZ;AAMA,SAAS,mBAAmB,OAAgF;AAC1G,MAAI,CAAC,OAAO;AACV,WAAO;AAAA,EACT;AAGA,QAAM,kBAAkB,MAAM,YAAY;AAC1C,UAAQ,iBAAiB;AAAA;AAAA,IAEvB,KAAK;AAAA,IACL,KAAK;AACH,aAAO;AAAA,QACL,SAAS;AAAA,QACT,cAAc;AAAA,QACd,SAAS;AAAA,QACT,WAAW;AAAA,QACX,WAAW;AAAA,QACX,UAAU;AAAA,QACV,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,UAAU;AAAA,MACZ;AAAA;AAAA,IAEF,KAAK;AACH,aAAO;AAAA,QACL,SAAS;AAAA,QACT,cAAc;AAAA,QACd,SAAS;AAAA,QACT,WAAW;AAAA,QACX,WAAW;AAAA,QACX,UAAU;AAAA,QACV,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,UAAU;AAAA,MACZ;AAAA;AAAA,IAEF,KAAK;AAAA,IACL,KAAK;AACH,aAAO;AAAA,QACL,SAAS;AAAA,QACT,cAAc;AAAA,QACd,SAAS;AAAA,QACT,WAAW;AAAA,QACX,WAAW;AAAA,QACX,UAAU;AAAA,QACV,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,UAAU;AAAA,MACZ;AAAA;AAAA,IAEF,KAAK;AACH,aAAO;AAAA,QACL,SAAS;AAAA,QACT,cAAc;AAAA,QACd,SAAS;AAAA,QACT,WAAW;AAAA,QACX,WAAW;AAAA,QACX,UAAU;AAAA,QACV,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,UAAU;AAAA,MACZ;AAAA;AAAA,IAEF,KAAK;AACH,aAAO;AAAA,IACT;AACE,cAAQ,KAAK,6BAA6B,KAAK,EAAE;AACjD,aAAO;AAAA,EACX;AACF;AAeO,IAAM,oBAAoBC,eAAsC,CAAC,CAA2B;AAK5F,IAAM,0BAA0B;AAGvC,IAAM,eAAe,IAAI,KAAK;AAG9B,IAAM,qBAAqB,KAAK;AAGhC,IAAM,iBAAiB;AAChB,SAAS,mBAAmB;AAAA,EACjC;AACF,GAEG;AACD,QAAM,WAAW,YAAY;AAC7B,QAAM,YAAY,WAAW,gBAAgB;AAC7C,QAAM,OAAO,WAAW;AAGxB,QAAM,WAAWC,QAAgC,oBAAI,IAAI,CAAC;AAG1D,QAAM,oBAAoBA,QAAoB,oBAAI,IAAI,CAAC;AAGvD,QAAM,cAAcA,QAAoB,oBAAI,IAAI,CAAC;AAGjD,QAAM,gBAAgBA,QAA6C,IAAI;AAGvE,QAAM,CAAC,WAAW,YAAY,IAAI,SAAS,KAAK;AAGhD,QAAM,CAAC,EAAE,WAAW,IAAI,SAAS,CAAC;AAGlC,QAAM,wBAAwB,YAAY,MAAM;AAC9C,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,QAAQ,SAAS;AACvB,QAAI,aAAa;AACjB,eAAW,CAAC,KAAK,KAAK,KAAK,MAAM,QAAQ,GAAG;AAC1C,UAAI,MAAM,YAAY,KAAK;AACzB,cAAM,OAAO,GAAG;AAChB,qBAAa;AAAA,MACf;AAAA,IACF;AACA,QAAI,YAAY;AACd,kBAAY,UAAQ,OAAO,CAAC;AAAA,IAC9B;AAAA,EACF,GAAG,CAAC,CAAC;AAGL,YAAU,MAAM;AACd,UAAM,kBAAkB,YAAY,uBAAuB,KAAK,GAAI;AACpE,WAAO,MAAM,cAAc,eAAe;AAAA,EAC5C,GAAG,CAAC,qBAAqB,CAAC;AAG1B,QAAM,qBAAqB,YAAY,YAAY;AACjD,UAAM,UAAU,MAAM,KAAK,kBAAkB,OAAO;AACpD,sBAAkB,QAAQ,MAAM;AAChC,QAAI,QAAQ,WAAW,KAAK,CAAC,MAAM,IAAI;AACrC;AAAA,IACF;AAGA,YAAQ,QAAQ,OAAK,YAAY,QAAQ,IAAI,CAAC,CAAC;AAC/C,iBAAa,IAAI;AACjB,QAAI;AAEF,YAAM,WAAW,QAAQ,IAAI,WAAS;AACpC,cAAM,QAAQ,MAAM,MAAM,GAAG;AAE7B,cAAM,aAAa,MAAM,CAAC;AAC1B,cAAM,cAAc,MAAM,CAAC;AAC3B,eAAO;AAAA,UACL,aAAa;AAAA,UACb,WAAW,SAAS,aAAa,EAAE;AAAA,QACrC;AAAA,MACF,CAAC;AAID,YAAM;AAAA,QACJ;AAAA,QACA;AAAA,MACF,IAAI,MAAO,SAAS,IAAY,+BAA+B;AAAA,QAC7D,WAAW,KAAK;AAAA,QAChB,YAAY;AAAA,MACd,CAAC;AACD,UAAI,OAAO;AACT,gBAAQ,MAAM,uCAAuC,KAAK;AAE1D,cAAM,UAAU,SAAS;AACzB,cAAM,QAAQ,KAAK,IAAI;AACvB,mBAAW,SAAS,SAAS;AAC3B,kBAAQ,IAAI,OAAO;AAAA,YACjB,YAAY;AAAA,YACZ,WAAW,QAAQ;AAAA,UACrB,CAAC;AAAA,QACH;AAAA,MACF,WAAW,MAAM;AAEf,cAAM,UAAU,SAAS;AACzB,cAAM,QAAQ,KAAK,IAAI;AAIvB,cAAM,aAAa,oBAAI,IAA8C;AAErE,cAAM,UAAU;AAKhB,mBAAW,UAAU,SAAS;AAC5B,gBAAM,QAAQ,YAAY,MAAM,IAAI,OAAO,aAAa,OAAO,SAAS;AACxE,qBAAW,IAAI,OAAO,OAAO,UAAU;AAAA,QACzC;AAGA,mBAAW,SAAS,SAAS;AAC3B,gBAAM,kBAAkB,WAAW,IAAI,KAAK,KAAK;AACjD,kBAAQ,IAAI,OAAO;AAAA,YACjB,YAAY,mBAAmB,eAAe;AAAA,YAC9C,WAAW,QAAQ;AAAA,UACrB,CAAC;AAAA,QACH;AAAA,MACF;AACA,kBAAY,YAAU,SAAS,CAAC;AAAA,IAClC,SAAS,KAAK;AACZ,cAAQ,MAAM,iDAAiD,GAAG;AAAA,IACpE,UAAE;AAEA,cAAQ,QAAQ,OAAK,YAAY,QAAQ,OAAO,CAAC,CAAC;AAClD,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,UAAU,MAAM,EAAE,CAAC;AAGvB,QAAM,sBAAsB,YAAY,MAAM;AAC5C,QAAI,cAAc,SAAS;AACzB,mBAAa,cAAc,OAAO;AAAA,IACpC;AACA,kBAAc,UAAU,WAAW,MAAM;AACvC,oBAAc,UAAU;AACxB,yBAAmB;AAAA,IACrB,GAAG,cAAc;AAAA,EACnB,GAAG,CAAC,kBAAkB,CAAC;AAGvB,QAAM,gBAAgB,YAAY,CAAC,cAA0B,aAA4C;AACvG,UAAM,QAAQ,YAAY,MAAM,IAAI,cAAc,QAAQ;AAC1D,UAAM,UAAU,SAAS;AACzB,UAAM,SAAS,QAAQ,IAAI,KAAK;AAChC,UAAM,QAAQ,KAAK,IAAI;AAGvB,QAAI,UAAU,OAAO,YAAY,OAAO;AACtC,aAAO,OAAO;AAAA,IAChB;AAGA,QAAI,CAAC,kBAAkB,QAAQ,IAAI,KAAK,KAAK,CAAC,YAAY,QAAQ,IAAI,KAAK,GAAG;AAC5E,wBAAkB,QAAQ,IAAI,KAAK;AACnC,0BAAoB;AAAA,IACtB;AACA,WAAO;AAAA,EACT,GAAG,CAAC,qBAAqB,MAAM,EAAE,CAAC;AAGlC,QAAM,kBAAkB,YAAY,CAAC,cAA0B,YAAoB,WAAkC;AACnH,UAAM,aAAa,cAAc,cAAc,UAAU;AACzD,QAAI,WAAW,WAAW;AACxB,aAAO;AAAA,IACT;AACA,YAAQ,QAAQ;AAAA,MACd,KAAK;AACH,eAAO,WAAW;AAAA,MACpB,KAAK;AACH,eAAO,WAAW;AAAA,MACpB,KAAK;AACH,eAAO,WAAW;AAAA,MACpB,KAAK;AACH,eAAO,WAAW;AAAA,MACpB,KAAK;AACH,eAAO,WAAW;AAAA,MACpB,KAAK;AACH,eAAO,WAAW;AAAA,MACpB;AACE,eAAO;AAAA,IACX;AAAA,EACF,GAAG,CAAC,aAAa,CAAC;AAGlB,QAAM,sBAAsB,YAAY,OAAO,eAAkD;AAC/F,QAAI,CAAC,MAAM,MAAM,WAAW,WAAW,GAAG;AACxC;AAAA,IACF;AACA,UAAM,UAAU,SAAS;AACzB,UAAM,QAAQ,KAAK,IAAI;AAGvB,UAAM,UAAU,WAAW,OAAO,YAAU;AAC1C,YAAM,QAAQ,YAAY,MAAM,IAAI,OAAO,YAAY,OAAO,QAAQ;AACtE,YAAM,WAAW,QAAQ,IAAI,KAAK;AAClC,YAAM,YAAY,kBAAkB,QAAQ,IAAI,KAAK;AACrD,YAAM,aAAa,YAAY,QAAQ,IAAI,KAAK;AAChD,aAAO,CAAC,aAAa,CAAC,eAAe,CAAC,YAAY,SAAS,aAAa;AAAA,IAC1E,CAAC;AACD,QAAI,QAAQ,WAAW,GAAG;AACxB;AAAA,IACF;AACA,iBAAa,IAAI;AACjB,QAAI;AACF,YAAM,gBAAgB,QAAQ,IAAI,QAAM;AAAA,QACtC,aAAa,EAAE;AAAA,QACf,WAAW,EAAE;AAAA,MACf,EAAE;AAGF,YAAM;AAAA,QACJ,MAAM;AAAA,QACN,OAAO;AAAA,MACT,IAAI,MAAO,SAAS,IAAY,+BAA+B;AAAA,QAC7D,WAAW,KAAK;AAAA,QAChB,YAAY;AAAA,MACd,CAAC;AACD,UAAI,SAAS;AACX,gBAAQ,MAAM,0CAA0C,OAAO;AAC/D;AAAA,MACF;AACA,UAAI,QAAQ;AAEV,cAAM,iBAAiB,KAAK,IAAI;AAGhC,cAAM,eAAe,oBAAI,IAA8C;AAEvE,cAAM,YAAY;AAKlB,mBAAW,YAAY,WAAW;AAChC,gBAAM,QAAQ,YAAY,MAAM,IAAI,SAAS,aAAa,SAAS,SAAS;AAC5E,uBAAa,IAAI,OAAO,SAAS,UAAU;AAAA,QAC7C;AACA,mBAAW,YAAY,SAAS;AAC9B,gBAAM,QAAQ,YAAY,MAAM,IAAI,SAAS,YAAY,SAAS,QAAQ;AAC1E,gBAAM,oBAAoB,aAAa,IAAI,KAAK,KAAK;AACrD,kBAAQ,IAAI,OAAO;AAAA,YACjB,YAAY,mBAAmB,iBAAiB;AAAA,YAChD,WAAW,iBAAiB;AAAA,UAC9B,CAAC;AAAA,QACH;AACA,oBAAY,YAAU,SAAS,CAAC;AAAA,MAClC;AAAA,IACF,SAAS,OAAO;AACd,cAAQ,MAAM,oDAAoD,KAAK;AAAA,IACzE,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,UAAU,MAAM,EAAE,CAAC;AAGvB,QAAM,uBAAuB,YAAY,CAAC,cAA0B,eAA6B;AAC/F,UAAM,QAAQ,YAAY,MAAM,IAAI,cAAc,UAAU;AAC5D,aAAS,QAAQ,OAAO,KAAK;AAC7B,gBAAY,YAAU,SAAS,CAAC;AAAA,EAClC,GAAG,CAAC,MAAM,EAAE,CAAC;AAIb,QAAM,uBAAuB,YAAY,CAAC,UAG9B;AACV,QAAI,CAAC,SAAS,OAAO,UAAU,UAAU;AACvC,aAAO;AAAA,IACT;AACA,UAAM,UAAU,MAAM,MAAM,GAAG;AAC/B,QAAI,QAAQ,SAAS,GAAG;AACtB,aAAO;AAAA,IACT;AACA,UAAM,eAAe,QAAQ,CAAC;AAC9B,UAAM,aAAa,SAAS,QAAQ,CAAC,GAAG,EAAE;AAC1C,QAAI,MAAM,UAAU,GAAG;AACrB,aAAO;AAAA,IACT;AAGA,UAAM,gBAA4C;AAAA,MAChD,QAAQ;AAAA,MACR,SAAS;AAAA,MACT,UAAU;AAAA,MACV,iBAAiB;AAAA,IACnB;AACA,UAAM,uBAAuB,cAAc,aAAa,YAAY,CAAC;AACrE,QAAI,CAAC,sBAAsB;AACzB,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL,YAAY;AAAA,MACZ,UAAU;AAAA,IACZ;AAAA,EACF,GAAG,CAAC,CAAC;AAGL,YAAU,MAAM;AACd,QAAI,CAAC,MAAM,IAAI;AACb;AAAA,IACF;AAIA,UAAM,UAAU,SAAS,QAAQ,sBAAsB,KAAK,EAAE,EAAE,EAAE,GAAG,oBAAoB;AAAA,MACvF,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,OAAO;AAAA,MACP,QAAQ,aAAa,KAAK,EAAE;AAAA,IAC9B,GAAG,aAAW;AAEZ,UAAI,QAAQ,OAAO,OAAO,QAAQ,QAAQ,YAAY,qBAAqB,QAAQ,OAAO,OAAO,QAAQ,IAAI,oBAAoB,UAAU;AACzI,cAAM,SAAS,qBAAqB,QAAQ,IAAI,eAAe;AAC/D,YAAI,QAAQ;AACV,+BAAqB,OAAO,YAAY,OAAO,QAAQ;AAAA,QACzD;AAAA,MACF;AAEA,UAAI,QAAQ,OAAO,OAAO,QAAQ,QAAQ,YAAY,qBAAqB,QAAQ,OAAO,OAAO,QAAQ,IAAI,oBAAoB,UAAU;AACzI,cAAM,WAAW,qBAAqB,QAAQ,IAAI,eAAe;AACjE,YAAI,UAAU;AACZ,+BAAqB,SAAS,YAAY,SAAS,QAAQ;AAAA,QAC7D;AAAA,MACF;AAAA,IACF,CAAC,EAAE,UAAU;AACb,WAAO,MAAM;AACX,cAAQ,YAAY;AACpB,eAAS,cAAc,OAAO;AAAA,IAChC;AAAA,EACF,GAAG,CAAC,UAAU,MAAM,IAAI,sBAAsB,oBAAoB,CAAC;AAGnE,YAAU,MAAM;AACd,aAAS,QAAQ,MAAM;AACvB,sBAAkB,QAAQ,MAAM;AAChC,gBAAY,QAAQ,MAAM;AAC1B,QAAI,cAAc,SAAS;AACzB,mBAAa,cAAc,OAAO;AAClC,oBAAc,UAAU;AAAA,IAC1B;AACA,gBAAY,YAAU,SAAS,CAAC;AAAA,EAClC,GAAG,CAAC,MAAM,EAAE,CAAC;AAGb,YAAU,MAAM;AACd,WAAO,MAAM;AACX,UAAI,cAAc,SAAS;AACzB,qBAAa,cAAc,OAAO;AAAA,MACpC;AAAA,IACF;AAAA,EACF,GAAG,CAAC,CAAC;AACL,QAAM,QAAQC,SAAQ,OAAO;AAAA,IAC3B;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI,CAAC,eAAe,iBAAiB,qBAAqB,sBAAsB,SAAS,CAAC;AAC1F,SAAO,oBAAC,kBAAkB,UAAlB,EAA2B,OAC9B,UACH;AACJ;AACO,SAAS,iBAAiB;AAC/B,QAAM,UAAU,WAAW,iBAAiB;AAC5C,MAAI,CAAC,WAAW,OAAO,KAAK,OAAO,EAAE,WAAW,GAAG;AACjD,UAAM,IAAI,MAAM,yDAAyD;AAAA,EAC3E;AACA,SAAO;AACT;;;ACrhBA,SAAS,UAAU,eAAe;AAElC,SAAoB,eAAAC,cAAa,aAAAC,YAAW,WAAAC,UAAS,UAAAC,SAAQ,YAAAC,iBAAgB;AA4ejC,gBAAAC,YAAA;AAje5C,SAAS,mBAAmB,QAAwB;AAClD,UAAQ,OAAO,YAAY,GAAG;AAAA,IAC5B,KAAK;AAAA,IACL,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AAAA,IACL,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF;AACA,IAAM,eAAe,eAAe,OAAO,MAAM,EAAE,KAAK,SAAS,EAAE,OAAO,kCAAkC,EAAE,OAAO;AA2DrH,SAAS,aAAa,WAA+C;AACnE,SAAO,CAAC,aAAa,IAAI,KAAK,SAAS,IAAI,oBAAI,KAAK;AACtD;AACO,SAAS,aAAa;AAAA,EAC3B;AAAA,EACA,0BAA0B;AAC5B,GAAsB;AACpB,QAAM,WAAW,YAAY;AAC7B,QAAM,CAAC,aAAa,cAAc,IAAIC,UAAkC,MAAS;AACjF,QAAM,CAAC,iBAAiB,kBAAkB,IAAIA,UAAS,IAAI;AAE3D,QAAM,CAAC,oBAAoB,qBAAqB,IAAIA,UAAS,oBAAI,IAAuB,CAAC;AACzF,iBAAe,cAAc,UAAyC;AACpE,UAAM,WAAW,MAAM,SAAS,KAAK,OAAO,QAAQ;AACpD,mBAAe,UAAQ;AACrB,YAAM,UAAU,SAAS,KAAK;AAC9B,UAAI,MAAM,OAAO,SAAS,IAAI;AAC5B,eAAO;AAAA,MACT;AACA,aAAO;AAAA,IACT,CAAC;AACD,WAAO;AAAA,EACT;AACA,iBAAe,YAAY,UAAkB,UAAkB;AAC7D,UAAM,aAAa,MAAM,SAAS,KAAK,mBAAmB;AAAA,MACxD,OAAO;AAAA,MACP;AAAA,IACF,CAAC;AACD,QAAI,WAAW,MAAM;AACnB,qBAAe,YAAU;AACvB,cAAM,YAAY,WAAW,KAAK;AAClC,YAAI,QAAQ,OAAO,WAAW,IAAI;AAChC,iBAAO;AAAA,QACT;AACA,eAAO;AAAA,MACT,CAAC;AAAA,IACH;AACA,WAAO;AAAA,EACT;AACA,iBAAe,eAAe;AAC5B,UAAM,aAAa,MAAM,SAAS,KAAK,QAAQ;AAC/C,QAAI,SAAS,WAAW,KAAK,MAAM,OAAO;AACxC,YAAM,KAAK,mBAAmB,OAAO,CAAC,EAAE,QAAQ,OAAK;AACnD,UAAE;AAAA,MACJ,CAAC;AAAA,IACH;AACA,WAAO;AAAA,EACT;AACA,WAAS,UAAU,QAAmB;AACpC,UAAM,KAAK,QAAQ;AACnB,0BAAsB,SAAO,IAAI,IAAI,GAAG,EAAE,IAAI,IAAI,MAAM,CAAC;AACzD,WAAO;AAAA,EACT;AACA,WAAS,gBAAgB,MAAc;AACrC,0BAAsB,SAAO;AAC3B,YAAM,MAAM,IAAI,IAAI,GAAG;AACvB,UAAI,OAAO,IAAI;AACf,aAAO;AAAA,IACT,CAAC;AAAA,EACH;AACA,iBAAe,eAAe;AAAA,EAAC;AAC/B,EAAAC,WAAU,MAAM;AACd,UAAM,UAAU,SAAS,KAAK,kBAAkB,WAAS;AACvD,UAAI,UAAU,eAAe,UAAU,cAAc;AACnD,2BAAmB,IAAI;AAAA,MACzB;AAAA,IACF,CAAC;AACD,WAAO,MAAM;AACX,cAAQ,KAAK,aAAa,YAAY;AAAA,IACxC;AAAA,EACF,GAAG,CAAC,SAAS,IAAI,CAAC;AAClB,EAAAA,WAAU,MAAM;AACd,QAAI,oBAAoB,MAAO;AAC/B,aAAS,KAAK,WAAW,EAAE,KAAK,SAAO;AACrC,qBAAe,YAAU;AACvB,cAAM,YAAY,KAAK,MAAM,SAAS,QAAQ;AAC9C,YAAI,cAAc,KAAM,QAAO;AAE/B,YAAI,QAAQ,OAAO,WAAW,IAAI;AAChC,iBAAO;AAAA,QACT;AACA,eAAO;AAAA,MACT,CAAC;AACD,yBAAmB,KAAK;AAAA,IAC1B,CAAC,EAAE,MAAM,WAAS;AAChB,cAAQ,MAAM,0BAA0B,KAAK;AAC7C,qBAAe,YAAU,WAAW,OAAO,SAAS,IAAI;AACxD,yBAAmB,KAAK;AAAA,IAC1B,CAAC;AAAA,EACH,GAAG,CAAC,eAAe,CAAC;AAGpB,QAAM;AAAA,IACJ,MAAM;AAAA,IACN,WAAW;AAAA,IACX,SAAS;AAAA,EACX,IAAI,WAAuB,gBAAgB;AAAA,IACzC,OAAO;AAAA,MACL,IAAI,aAAa;AAAA,IACnB;AAAA,IACA,SAAS,SAAS,WAAW;AAAA,EAC/B,CAAC;AAED,QAAM,UAAU,cAAc,CAAC,KAAuB;AAGtD,QAAM;AAAA,IACJ,MAAM;AAAA,IACN,WAAW;AAAA,IACX,SAAS;AAAA,EACX,IAAI,WAA0B,mBAAmB;AAAA,IAC/C,OAAO;AAAA,MACL,QAAQ,aAAa;AAAA,IACvB;AAAA,IACA,SAAS,SAAS,WAAW;AAAA,EAC/B,CAAC;AAGD,QAAM;AAAA,IACJ,MAAM;AAAA,IACN,WAAW;AAAA,IACX,SAAS;AAAA,EACX,IAAI,WAAyB,kBAAkB;AAAA,IAC7C,OAAO;AAAA,MACL,QAAQ,aAAa;AAAA,IACvB;AAAA,IACA,SAAS,SAAS,WAAW;AAAA,EAC/B,CAAC;AAGD,QAAM;AAAA,IACJ,MAAM;AAAA,IACN,WAAW;AAAA,IACX,SAAS;AAAA,EACX,IAAI,WAAqB,cAAc;AAAA,IACrC,OAAO;AAAA,MACL,UAAU;AAAA,IACZ;AAAA;AAAA,IAEA,SAAS,SAAS,WAAW;AAAA,EAC/B,CAAC;AAGD,QAAM,WAAWC,SAAQ,MAAM,YAAY,IAAI,QAAM,GAAG,OAAO,KAAK,CAAC,GAAG,CAAC,UAAU,CAAC;AAGpF,QAAM,YAAYA,SAAQ,MAAM,IAAI,IAAI,QAAQ,IAAI,OAAK,CAAC,EAAE,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,MAAM,CAAC;AAGpF,QAAM;AAAA,IACJ,MAAM;AAAA,IACN,WAAW;AAAA,IACX,SAAS;AAAA,EACX,IAAI,WAA8B,uBAAuB;AAAA,IACvD,OAAO,SAAS,SAAS,IAAI;AAAA,MAC3B,SAAS;AAAA,QACP,IAAI;AAAA,MACN;AAAA,IACF,IAAI;AAAA,IACJ,SAAS,SAAS,SAAS;AAAA,EAC7B,CAAC;AAGD,QAAM,oBAAoBC,aAAY,MAAM;AAC1C,wBAAoB;AACpB,sBAAkB;AAClB,kBAAc;AACd,uBAAmB;AAAA,EACrB,GAAG,CAAC,qBAAqB,mBAAmB,eAAe,kBAAkB,CAAC;AAG9E,QAAM,kBAAkBC,QAAoB,oBAAI,IAAI,CAAC;AAGrD,EAAAH,WAAU,MAAM;AACd,QAAI,YAAY;AACd,YAAM,aAAa,oBAAI,IAAY;AACnC,iBAAW,QAAQ,YAAY;AAC7B,YAAI,KAAK,SAAS;AAChB,qBAAW,IAAI,OAAO,KAAK,YAAY,WAAW,KAAK,UAAU,SAAS,KAAK,SAAS,EAAE,CAAC;AAAA,QAC7F;AAAA,MACF;AACA,sBAAgB,UAAU;AAAA,IAC5B;AAAA,EACF,GAAG,CAAC,UAAU,CAAC;AAGf,EAAAA,WAAU,MAAM;AACd,QAAI,CAAC,aAAa,GAAI;AACtB,UAAM,UAAU,SAAS,QAAQ,oBAAoB,YAAY,EAAE,EAAE,EAEpE,GAAG,oBAAoB;AAAA,MACtB,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,OAAO;AAAA,MACP,QAAQ,aAAa,YAAY,EAAE;AAAA,IACrC,GAAG,MAAM;AACP,wBAAkB;AAAA,IACpB,CAAC,EAEA,GAAG,oBAAoB;AAAA,MACtB,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,OAAO;AAAA,MACP,QAAQ,aAAa,YAAY,EAAE;AAAA,IACrC,GAAG,MAAM;AACP,wBAAkB;AAAA,IACpB,CAAC,EAEA,GAAG,oBAAoB;AAAA,MACtB,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,OAAO;AAAA,IACT,GAAG,aAAW;AACZ,YAAM,UAAW,QAAQ,KAErB,WAAY,QAAQ,KAEpB;AACJ,UAAI,WAAW,gBAAgB,QAAQ,IAAI,OAAO,GAAG;AACnD,0BAAkB;AAAA,MACpB;AAAA,IACF,CAAC,EAEA,GAAG,oBAAoB;AAAA,MACtB,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,OAAO;AAAA,IACT,GAAG,eAAa;AACd,YAAM,YAAa,UAAU,KAEzB;AACJ,YAAM,YAAa,UAAU,KAEzB;AACJ,YAAM,YAAa,UAAU,KAEzB;AAEJ,UAAI,cAAc,aAAa,aAAa,gBAAgB,QAAQ,IAAI,SAAS,GAAG;AAClF,0BAAkB;AAAA,MACpB;AAAA,IACF,CAAC,EAAE,UAAU;AACb,WAAO,MAAM;AACX,cAAQ,YAAY;AACpB,eAAS,cAAc,OAAO;AAAA,IAChC;AAAA,EACF,GAAG,CAAC,UAAU,aAAa,IAAI,iBAAiB,CAAC;AAGjD,EAAAA,WAAU,MAAM;AACd,QAAI,CAAC,aAAa,GAAI;AACtB,UAAM,iBAAiB,SAAS,QAAQ,kBAAkB,YAAY,EAAE,EAAE,EAAE,GAAG,oBAAoB;AAAA,MACjG,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,OAAO;AAAA,MACP,QAAQ,SAAS,YAAY,EAAE;AAAA,IACjC,GAAG,eAAa;AACd,YAAM,YAAa,UAAU,KAEzB;AACJ,YAAM,YAAa,UAAU,KAEzB;AAGJ,UAAI,cAAc,aAAa,cAAc,cAAc,cAAc,cAAc;AACrF,qBAAa;AAAA,MACf;AAGA,qBAAe;AAAA,IACjB,CAAC,EAAE,UAAU;AACb,WAAO,MAAM;AACX,qBAAe,YAAY;AAC3B,eAAS,cAAc,cAAc;AAAA,IACvC;AAAA,EACF,GAAG,CAAC,UAAU,aAAa,IAAI,cAAc,CAAC;AAG9C,QAAM,gBAAgBC,SAAQ,MAAM;AAClC,UAAM,OAKD,CAAC;AAGN,kBAAc,QAAQ,OAAK;AACzB,UAAI,aAAa,EAAE,SAAS,GAAG;AAC7B,aAAK,KAAK;AAAA,UACR,WAAW,EAAE;AAAA,UACb,QAAQ,EAAE,UAAU;AAAA,UACpB,QAAQ;AAAA,UACR,WAAW,EAAE;AAAA,QACf,CAAC;AAAA,MACH;AAAA,IACF,CAAC;AAGD,UAAM,iBAAiB,IAAI,IAAI,YAAY,OAAO,UAAQ;AACxD,YAAM,QAAQ,UAAU,IAAI,KAAK,OAAO;AACxC,aAAO,OAAO,aAAa,KAAK,aAAa,KAAK,SAAS;AAAA,IAC7D,CAAC,EAAE,IAAI,UAAQ,KAAK,OAAO,KAAK,CAAC,CAAC;AAClC,iBAAa,QAAQ,QAAM;AACzB,UAAI,eAAe,IAAI,GAAG,OAAO,KAAK,aAAa,GAAG,SAAS,GAAG;AAChE,aAAK,KAAK;AAAA,UACR,WAAW,GAAG;AAAA,UACd,QAAQ,GAAG,UAAU;AAAA,UACrB,QAAQ;AAAA,UACR,WAAW,GAAG;AAAA,QAChB,CAAC;AAAA,MACH;AAAA,IACF,CAAC;AACD,WAAO;AAAA,EACT,GAAG,CAAC,cAAc,YAAY,WAAW,WAAW,CAAC;AAGrD,QAAM,iBAA2BA,SAAQ,MAAM;AAC7C,UAAM,aAAa,oBAAI,IAAY;AACnC,eAAW,QAAQ,eAAe;AAEhC,UAAI,KAAK,aAAa,KAAK,WAAW,SAAS;AAC7C,mBAAW,IAAI,KAAK,SAAS;AAAA,MAC/B;AAAA,IACF;AACA,WAAO,MAAM,KAAK,UAAU;AAAA,EAC9B,GAAG,CAAC,aAAa,CAAC;AAGlB,QAAM,uBAA8CA,SAAQ,MAAM;AAChE,UAAM,cAAqC,CAAC;AAC5C,eAAW,UAAU,eAAe;AAElC,UAAI,OAAO,WAAW,QAAS;AAG/B,YAAM,QAAQ,OAAO,UAAU,MAAM,GAAG;AACxC,UAAI,MAAM,WAAW,GAAG;AACtB,cAAM,CAAC,cAAc,YAAY,UAAU,IAAI;AAC/C,cAAM,kBAAkB,mBAAmB,UAAU;AACrD,oBAAY,KAAK;AAAA,UACf;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA,QAAQ,OAAO;AAAA,UACf,eAAe;AAAA,UACf,WAAW,OAAO,aAAa;AAAA,QACjC,CAAC;AAAA,MACH;AAAA,IACF;AACA,WAAO;AAAA,EACT,GAAG,CAAC,aAAa,CAAC;AAGlB,QAAM,gBAAgB,SAAS;AAC/B,QAAM,aAAa,kBAAkB;AACrC,QAAM,cAAc,kBAAkB;AACtC,QAAM,YAAYC,aAAY,CAAC,QAAgB;AAE7C,QAAI,cAAc,aAAa;AAC7B,aAAO;AAAA,IACT;AACA,UAAM,cAAc;AACpB,QAAI,SAAS,WAAW,MAAM,MAAO,QAAO;AAE5C,QAAI,YAAY,SAAS,OAAO,EAAG,QAAO;AAC1C,QAAI,YAAY,SAAS,GAAG,EAAG,QAAO;AACtC,QAAI,SAAS,GAAG,MAAM,MAAO,QAAO;AAGpC,UAAM,UAAU,IAAI,MAAM,GAAG;AAC7B,QAAI,QAAQ,WAAW,GAAG;AACxB,YAAM,CAAC,MAAM,MAAM,QAAQ,IAAI;AAC/B,YAAM,gBAAgB,mBAAmB,QAAQ;AAGjD,YAAM,gBAAgB,qBAAqB,KAAK,OAAK,EAAE,iBAAiB,QAAQ,EAAE,eAAe,QAAQ,EAAE,mBAAmB,aAAa;AAC3I,UAAI,eAAe;AACjB,eAAO;AAAA,MACT;AAAA,IACF;AACA,WAAO;AAAA,EACT,GAAG,CAAC,gBAAgB,sBAAsB,YAAY,WAAW,CAAC;AAGlE,QAAM,kBAAkB,uBAAuB,qBAAqB,iBAAiB;AACrF,QAAM,uBAAuBD,SAAQ,OAAO;AAAA,IAC1C;AAAA,IACA,MAAM;AAAA,IACN;AAAA,IACA,QAAQ;AAAA,IACR;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,WAAW,gBAAgB,OAAO,QAAQ,kBAAkB,mBAAmB,gBAAgB;AAAA,IAC/F;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI,CAAC,SAAS,gBAAgB,iBAAiB,aAAa,gBAAgB,sBAAsB,eAAe,YAAY,aAAa,SAAS,CAAC;AACpJ,QAAM,UAAU,0BAA0B,gBAAAH,KAAC,sBAAoB,UAAS,IAAwB;AAChG,SAAO,gBAAAA,KAAC,iBAAiB,UAAjB,EAA0B,OAAO,sBACpC,mBACH;AACJ;;;ACpfA,SAAS,KAAKM,WAAU;AACxB,SAAoB,iBAAAC,gBAAe,cAAAC,aAAY,aAAAC,YAAW,WAAAC,UAAS,YAAAC,WAAU,eAAAC,cAAa,UAAAC,eAAc;;;ACDxG,SAAS,KAAK,UAAU;AACxB,SAAS,mBAAmB;AAK5B,SAAS,YAAAC,iBAAgB;AACzB,SAAS,QAAAC,aAAY;AAKd,SAAS,YAAY,UAAU,IAAI,OAAO,gBAAgB;AAC/D,QAAM,IAAI,GAAG,EAAE;AACf,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,IAAI;AACf,SAAK,OAAO,SAAY,CAAC,IAAI,IAAI;AACjC,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AAAA,EACT,OAAO;AACL,SAAK,EAAE,CAAC;AAAA,EACV;AACA,QAAM,cAAc;AACpB,QAAM,YAAY,OAAO,aAAa,WAAW,SAAS,QAAQ;AAClE,QAAM,aAAa,OAAO,aAAa,WAAW,OAAO,SAAS,MAAM,IAAI;AAC5E,QAAM,WAAW,YAAY;AAC7B,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,aAAa;AACxB,SAAK,YAAY,IAAI,KAAK;AAC1B,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AAAA,EACT,OAAO;AACL,SAAK,EAAE,CAAC;AAAA,EACV;AACA,QAAM,uBAAuB;AAC7B,QAAM,KAAK;AACX,QAAM,KAAK;AACX,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,MAAM,EAAE,CAAC,MAAM,IAAI;AAC9B,SAAK;AAAA,MACH,aAAa;AAAA,MACb,OAAO;AAAA,MACP,QAAQ;AAAA,IACV;AACA,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AAAA,EACT,OAAO;AACL,SAAK,EAAE,CAAC;AAAA,EACV;AACA,QAAM,aAAa,cAAc,EAAE;AACnC,QAAM,kBAAkB,yBAAyB,SAAS;AAC1D,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,eAAe,EAAE,CAAC,MAAM,wBAAwB,EAAE,CAAC,MAAM,mBAAmB,EAAE,EAAE,MAAM,SAAS,EAAE,EAAE,MAAM,cAAc,EAAE,EAAE,MAAM,YAAY,EAAE,EAAE,MAAM,aAAa,EAAE,EAAE,MAAM,YAAY;AACrM,SAAK;AAAA,MACH,YAAY,OAAM,SAAQ;AACxB,YAAI,SAAS;AACb,cAAM,cAAc,qBAAqB;AAAA,UACvC;AAAA,UACA;AAAA,QACF,CAAC;AACD,cAAM,SAAS,eAAeC,UAAS;AACrC,gBAAM,eAAe,YAAY,OAAO,OAAKC,UAAU,KAAa,CAAC,CAAC,MAAM,KAAK;AACjF,gBAAM,wBAAwB,aAAa,IAAI,MAAM;AACrD,gBAAM,WAAW,MAAO,SAAiB,OAAO,UAA+B,EAAE,KAAK,SAAS,EAAE,OAAOC,MAAK,MAAa,qBAA4B,CAAQ,EAAE,OAAO,KAAK,EAAE,OAAO;AACrL,cAAI,SAAS,OAAO;AAClB,kBAAM,SAAS;AAAA,UACjB;AACA,mBAAS,SAAS;AAClB,cAAI,QAAQ;AACV,uBAAW,MAAa;AAAA,UAC1B;AAAA,QACF;AACA,cAAM,eAAe,YAAY,MAAM,SAAO,OAAO,QAAQD,UAAU,KAAa,GAAG,CAAC,CAAC;AACzF,YAAI,cAAc;AAChB,gBAAM,UAAW,SAAiB,OAAO,UAA+B,EAAE,KAAK,SAAS,EAAE,OAAOC,MAAK,MAAa,oBAA2B,CAAQ;AACtJ,sBAAY,QAAQ,SAAO;AACzB,oBAAQ,GAAG,OAAO,GAAG,GAAI,KAAa,GAAG,CAAC;AAAA,UAC5C,CAAC;AACD,gBAAM,gBAAgB,MAAM,QAAQ,OAAO,aAAa,WAAW,EAAE,OAAO;AAC5E,kBAAQ,IAAI,iBAAiB,eAAe,SAAS;AACrD,cAAI,cAAc,WAAW,KAAK;AAChC,kBAAM,OAAO;AAAA,UACf,OAAO;AACL,gBAAI,cAAc,OAAO;AACvB,oBAAM,cAAc;AAAA,YACtB;AACA,gBAAI,cAAc,MAAM;AACtB,uBAAS,cAAc;AACvB,kBAAI,QAAQ;AACV,2BAAW,MAAa;AAAA,cAC1B;AAAA,YACF;AAAA,UACF;AAAA,QACF,OAAO;AACL,gBAAM,OAAO;AAAA,QACf;AACA,eAAO;AAAA,MACT;AAAA,IACF;AACA,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,EAAE,IAAI;AACR,MAAE,EAAE,IAAI;AACR,MAAE,EAAE,IAAI;AACR,MAAE,EAAE,IAAI;AACR,MAAE,EAAE,IAAI;AACR,MAAE,EAAE,IAAI;AAAA,EACV,OAAO;AACL,SAAK,EAAE,EAAE;AAAA,EACX;AACA,QAAM,WAAW,YAAY,EAAE;AAC/B,SAAO;AACT;AACA,SAAS,OAAO,KAAK;AACnB,SAAO,OAAO,GAAG;AACnB;AACA,SAAS,MAAM,GAAG;AAChB,SAAO,OAAO,CAAC;AACjB;;;ADnHA,SAAS,YAAAC,iBAAgB;AAoJhB,gBAAAC,YAAA;AAhJT,IAAM,oBAAoB;AAAA,EACxB,QAAQ;AAAA,EACR,OAAO;AAAA,EACP,cAAc;AAChB;AAmBO,IAAM,sBAAsBC,eAA8C,IAAI;AAG9E,SAAS,qBAAqB;AAAA,EACnC;AACF,GAEG;AACD,QAAM,WAAW,YAAY;AAC7B,QAAM,CAAC,UAAU,gBAAgB,IAAIC,UAAiC,CAAC,CAAC;AACxE,QAAM,CAAC,WAAW,YAAY,IAAIA,UAAS,IAAI;AAC/C,QAAM,CAAC,OAAO,QAAQ,IAAIA,UAAuB,IAAI;AAGrD,QAAM,YAAYC,YAAW,gBAAgB;AAC7C,QAAM,SAAS,WAAW,MAAM;AAGhC,QAAM,gBAAgBC,YAAS,SAAS,OAAO,MAAM,EAAE,KAAK,cAAc,EAAE,OAAO,kBAAkB,YAAY,EAAE,GAAG,UAAU,MAAO,EAAE,MAAM,KAAK,GAAG;AAAA,IACrJ,SAASC,UAAS,MAAM;AAAA,IACxB,mBAAmB;AAAA,EACrB,CAAC;AAGD,QAAM,iBAAiB;AAAA,IAAU;AAAA,MAC/B,OAAO;AAAA,MACP,QAAQ;AAAA,IACV;AAAA,IAAG,CAAC,UAAU,KAAK;AAAA;AAAA,EACnB;AAGA,QAAM,oBAAoBC,QAAO,cAAc;AAC/C,oBAAkB,UAAU;AAG5B,EAAAC,WAAU,MAAM;AACd,QAAI,cAAc,QAAQ,MAAM,QAAQ,cAAc,IAAI,GAAG;AAC3D,YAAM,cAAsC,CAAC;AAC7C,oBAAc,KAAK,QAAQ,CAAC,SAAc;AACxC,oBAAY,KAAK,GAAG,IAAI,KAAK;AAAA,MAC/B,CAAC;AACD,uBAAiB,WAAW;AAC5B,mBAAa,KAAK;AAClB,eAAS,IAAI;AAAA,IACf,WAAW,cAAc,OAAO;AAC9B,eAAS,cAAc,KAAK;AAC5B,mBAAa,KAAK;AAAA,IACpB,WAAW,cAAc,WAAW;AAClC,mBAAa,IAAI;AAAA,IACnB,WAAW,cAAc,QAAQ,CAAC,MAAM,QAAQ,cAAc,IAAI,GAAG;AAEnE,uBAAiB,CAAC,CAAC;AACnB,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,cAAc,MAAM,cAAc,OAAO,cAAc,SAAS,CAAC;AAGrE,QAAM,cAAcC,aAAY,OAAO,KAAa,UAAkB;AACpE,QAAI,CAAC,QAAQ;AACX,YAAM,IAAI,MAAM,wBAAwB;AAAA,IAC1C;AACA,QAAI;AACF,YAAM,kBAAkB,QAAQ,YAAY;AAAA,QAC1C;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAGD,uBAAiB,WAAS;AAAA,QACxB,GAAG;AAAA,QACH,CAAC,GAAG,GAAG;AAAA,MACT,EAAE;AAAA,IACJ,SAAS,KAAK;AACZ,eAAS,GAAY;AACrB,YAAM;AAAA,IACR;AAAA,EACF,GAAG,CAAC,MAAM,CAAC;AAGX,QAAM,cAAcA,aAAY,CAAC,UAAsC;AACrE,WAAO,SAAS,KAAK;AAAA,EACvB,GAAG,CAAC,QAAQ,CAAC;AAGb,QAAM,iBAAiBA,aAAY,OAAO,UAAkB;AAC1D,QAAI,CAAC,QAAQ;AACX,YAAM,IAAI,MAAM,wBAAwB;AAAA,IAC1C;AACA,QAAI;AACF,YAAM,SAAS,OAAO,MAAM,EAAE,KAAK,cAAc,EAAE,OAAO,EAAE,GAAG,UAAU,MAAM,EAAE,GAAG,OAAO,KAAK;AAGhG,uBAAiB,YAAU;AACzB,cAAM,WAAW;AAAA,UACf,GAAG;AAAA,QACL;AACA,eAAO,SAAS,KAAK;AACrB,eAAO;AAAA,MACT,CAAC;AAAA,IACH,SAAS,OAAO;AACd,eAAS,KAAc;AACvB,YAAM;AAAA,IACR;AAAA,EACF,GAAG,CAAC,QAAQ,QAAQ,CAAC;AAGrB,QAAM,kBAAkBA,aAAY,YAAY;AAC9C,UAAM,cAAc,QAAQ;AAAA,EAC9B,GAAG,CAAC,aAAa,CAAC;AAGlB,QAAM,eAAeC,SAAQ,OAAO;AAAA,IAClC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI,CAAC,UAAU,WAAW,OAAO,aAAa,aAAa,gBAAgB,eAAe,CAAC;AAC3F,SAAO,gBAAAT,KAAC,oBAAoB,UAApB,EAA6B,OAAO,cACvC,UACH;AACJ;AAGO,SAAS,kBAAkB;AAChC,QAAM,UAAUG,YAAW,mBAAmB;AAC9C,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,MAAM,4DAA4D;AAAA,EAC9E;AACA,SAAO;AACT;AAGO,SAAS,qBAAqB,KAAK;AACxC,QAAM,IAAIO,IAAG,CAAC;AACd,QAAM;AAAA,IACJ;AAAA,EACF,IAAI,gBAAgB;AACpB,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,eAAe,EAAE,CAAC,MAAM,KAAK;AACxC,SAAK,YAAY,GAAG;AACpB,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AAAA,EACT,OAAO;AACL,SAAK,EAAE,CAAC;AAAA,EACV;AACA,SAAO;AACT;AAGO,SAAS,qBAAqB;AACnC,QAAM,IAAIA,IAAG,CAAC;AACd,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,EACF,IAAI,gBAAgB;AACpB,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,kBAAkB,EAAE,CAAC,MAAM,aAAa;AACnD,SAAK;AAAA,MACH;AAAA,MACA;AAAA,IACF;AACA,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AAAA,EACT,OAAO;AACL,SAAK,EAAE,CAAC;AAAA,EACV;AACA,SAAO;AACT;AAGO,SAAS,qBAAqB,KAAK,cAAc,SAAS;AAC/D,QAAM,IAAIA,IAAG,EAAE;AACf,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI,gBAAgB;AACpB,QAAM,YAAY,SAAS,aAAaC;AACxC,QAAM,cAAc,SAAS,eAAeC;AAC5C,MAAI;AACJ,OAAK;AACH,UAAM,WAAW,SAAS,GAAG;AAC7B,QAAI,CAAC,UAAU;AACb,WAAK;AACL,YAAM;AAAA,IACR;AACA;AACA,QAAI;AACF,UAAIC;AACJ,UAAI,EAAE,CAAC,MAAM,eAAe,EAAE,CAAC,MAAM,UAAU;AAC7C,QAAAA,MAAK,YAAY,QAAQ;AACzB,UAAE,CAAC,IAAI;AACP,UAAE,CAAC,IAAI;AACP,UAAE,CAAC,IAAIA;AAAA,MACT,OAAO;AACL,QAAAA,MAAK,EAAE,CAAC;AAAA,MACV;AACA,WAAKA;AAAA,IACP,SAASC,KAAI;AACX,YAAM,QAAQA;AACd,cAAQ,KAAK,2CAA2C,GAAG,MAAM,KAAK;AACtE,WAAK;AAAA,IACP;AAAA,EACF;AACA,QAAM,eAAe;AACrB,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,OAAO,EAAE,CAAC,MAAM,aAAa,EAAE,CAAC,MAAM,aAAa;AAC9D,SAAK,OAAM,YAAW;AACpB,YAAM,kBAAkB,UAAU,OAAO;AACzC,YAAM,YAAY,KAAK,eAAe;AAAA,IACxC;AACA,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AAAA,EACT,OAAO;AACL,SAAK,EAAE,CAAC;AAAA,EACV;AACA,QAAM,WAAW;AACjB,MAAI;AACJ,MAAI,EAAE,CAAC,MAAM,gBAAgB,EAAE,CAAC,MAAM,aAAa,EAAE,CAAC,MAAM,UAAU;AACpE,SAAK,CAAC,cAAc,UAAU,SAAS;AACvC,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,CAAC,IAAI;AACP,MAAE,EAAE,IAAI;AAAA,EACV,OAAO;AACL,SAAK,EAAE,EAAE;AAAA,EACX;AACA,SAAO;AACT;AACA,SAASF,QAAO,SAAS;AACvB,SAAO,KAAK,MAAM,OAAO;AAC3B;AACA,SAASD,OAAM,OAAO;AACpB,SAAO,KAAK,UAAU,KAAK;AAC7B;","names":["useDbQuery","createContext","useMemo","useRef","createContext","useRef","useMemo","useCallback","useEffect","useMemo","useRef","useState","jsx","useState","useEffect","useMemo","useCallback","useRef","_c","createContext","useContext","useEffect","useMemo","useState","useCallback","useRef","isUsable","omit","insert","isUsable","omit","isUsable","jsx","createContext","useState","useContext","useDbQuery","isUsable","useRef","useEffect","useCallback","useMemo","_c","_temp","_temp2","t2","t1"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=chunk-6KN7KLEG.js.map
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import {
|
|
2
2
|
__require
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-7D4SUZUM.js";
|
|
4
4
|
|
|
5
5
|
// src/powersync-bridge/index.ts
|
|
6
6
|
var _powerSyncAvailable = null;
|
|
@@ -32,13 +32,31 @@ function isPowerSyncSyncStatus(value) {
|
|
|
32
32
|
const status = value;
|
|
33
33
|
return typeof status.connected === "boolean" && typeof status.connecting === "boolean" && typeof status.hasSynced === "boolean" && typeof status.uploading === "boolean" && typeof status.downloading === "boolean";
|
|
34
34
|
}
|
|
35
|
-
function convertToDataLayerSyncStatus(powerSyncStatus, pendingCount = 0) {
|
|
35
|
+
function convertToDataLayerSyncStatus(powerSyncStatus, pendingCount = 0, error) {
|
|
36
|
+
let syncError = null;
|
|
37
|
+
if (error) {
|
|
38
|
+
if (error instanceof Error) {
|
|
39
|
+
syncError = error;
|
|
40
|
+
} else {
|
|
41
|
+
const err = new Error(error.message);
|
|
42
|
+
err.name = error.type ?? "SyncError";
|
|
43
|
+
Object.defineProperty(err, "isPermanent", {
|
|
44
|
+
value: error.isPermanent ?? false,
|
|
45
|
+
enumerable: false
|
|
46
|
+
});
|
|
47
|
+
Object.defineProperty(err, "timestamp", {
|
|
48
|
+
value: error.timestamp ?? /* @__PURE__ */ new Date(),
|
|
49
|
+
enumerable: false
|
|
50
|
+
});
|
|
51
|
+
syncError = err;
|
|
52
|
+
}
|
|
53
|
+
}
|
|
36
54
|
return {
|
|
37
55
|
isConnected: powerSyncStatus.connected,
|
|
38
56
|
isSyncing: powerSyncStatus.uploading || powerSyncStatus.downloading,
|
|
39
57
|
lastSyncedAt: powerSyncStatus.lastSyncedAt,
|
|
40
58
|
pendingUploads: pendingCount,
|
|
41
|
-
error:
|
|
59
|
+
error: syncError
|
|
42
60
|
};
|
|
43
61
|
}
|
|
44
62
|
function convertToDataLayerSyncControl(powerSyncControl) {
|
|
@@ -54,22 +72,17 @@ function convertToDataLayerSyncControl(powerSyncControl) {
|
|
|
54
72
|
ids: values
|
|
55
73
|
});
|
|
56
74
|
},
|
|
57
|
-
//
|
|
58
|
-
// The bridge just provides placeholders that get overridden
|
|
59
|
-
retryFailedUploads: async () => {
|
|
60
|
-
console.warn("retryFailedUploads: Use useSyncControl hook for this functionality");
|
|
61
|
-
},
|
|
62
|
-
clearFailedUploads: () => {
|
|
63
|
-
console.warn("clearFailedUploads: Use useSyncControl hook for this functionality");
|
|
64
|
-
},
|
|
65
|
-
failedUploads: [],
|
|
75
|
+
// Auto-retry controls - managed by the provider/context
|
|
66
76
|
pauseAutoRetry: () => {
|
|
67
|
-
console.warn("pauseAutoRetry: Use useSyncControl hook for this functionality");
|
|
68
77
|
},
|
|
69
78
|
resumeAutoRetry: () => {
|
|
70
|
-
console.warn("resumeAutoRetry: Use useSyncControl hook for this functionality");
|
|
71
79
|
},
|
|
72
|
-
isAutoRetryPaused: false
|
|
80
|
+
isAutoRetryPaused: false,
|
|
81
|
+
// Pending mutations - managed by the provider/context, not this bridge
|
|
82
|
+
addPendingMutation: () => {
|
|
83
|
+
},
|
|
84
|
+
removePendingMutation: () => {
|
|
85
|
+
}
|
|
73
86
|
};
|
|
74
87
|
}
|
|
75
88
|
function createDatabaseGetter(getPowerSyncDb) {
|
|
@@ -92,4 +105,4 @@ export {
|
|
|
92
105
|
createDatabaseGetter,
|
|
93
106
|
getPowerSyncInstance
|
|
94
107
|
};
|
|
95
|
-
//# sourceMappingURL=chunk-
|
|
108
|
+
//# sourceMappingURL=chunk-7BGDQT5X.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/powersync-bridge/index.ts"],"sourcesContent":["/**\n * PowerSync Bridge for @pol-studios/db\n *\n * This module provides integration utilities between @pol-studios/db and\n * @pol-studios/powersync packages. It re-exports key types and provides\n * helper functions for type-safe integration.\n *\n * The @pol-studios/powersync package is an optional peer dependency.\n * This bridge allows the db package to work seamlessly with or without\n * the powersync package installed.\n *\n * @example\n * ```typescript\n * import { isPowerSyncAvailable, usePowerSyncDatabase } from '@pol-studios/db/powersync-bridge';\n *\n * if (isPowerSyncAvailable()) {\n * // Use PowerSync features\n * }\n * ```\n */\n\n// =============================================================================\n// Type Re-exports from @pol-studios/powersync\n// =============================================================================\n\n/**\n * Re-export core types from @pol-studios/powersync for convenience.\n * These types are defined here to avoid runtime dependency on the package.\n */\n\n/**\n * Abstract interface for PowerSync database operations.\n * This matches the interface from @pol-studios/powersync/core.\n */\nexport interface AbstractPowerSyncDatabase {\n /** Execute a query and return all results */\n getAll<T>(sql: string, params?: unknown[]): Promise<T[]>;\n /** Execute a query and return first result or null */\n get<T>(sql: string, params?: unknown[]): Promise<T | null>;\n /** Execute a SQL statement (INSERT, UPDATE, DELETE) */\n execute(sql: string, params?: unknown[]): Promise<{\n rowsAffected: number;\n }>;\n /** Whether the database is currently connected */\n connected: boolean;\n /** Current sync status */\n currentStatus: {\n connected: boolean;\n connecting: boolean;\n hasSynced: boolean;\n lastSyncedAt: Date | null;\n dataFlowStatus?: {\n uploading: boolean;\n downloading: boolean;\n };\n downloadProgress?: {\n downloadedFraction: number;\n downloadedOperations: number;\n totalOperations: number;\n };\n };\n /** Initialize the database */\n init(): Promise<void>;\n /** Close the database connection */\n close(): Promise<void>;\n /** Connect to the PowerSync service */\n connect(connector: unknown): Promise<void>;\n /** Disconnect from the PowerSync service */\n disconnect(): Promise<void>;\n /** Register a listener for status changes */\n registerListener(listener: {\n statusChanged?: (status: unknown) => void;\n }): () => void;\n /** Get the next pending CRUD transaction */\n getNextCrudTransaction(): Promise<unknown>;\n}\n\n/**\n * Sync status from @pol-studios/powersync.\n */\nexport interface PowerSyncSyncStatus {\n /** Whether connected to the PowerSync service */\n connected: boolean;\n /** Whether currently attempting to connect */\n connecting: boolean;\n /** Whether initial sync has completed */\n hasSynced: boolean;\n /** Timestamp of last successful sync */\n lastSyncedAt: Date | null;\n /** Whether currently uploading local changes */\n uploading: boolean;\n /** Whether currently downloading remote changes */\n downloading: boolean;\n /** Download progress details */\n downloadProgress: {\n current: number;\n target: number;\n percentage: number;\n } | null;\n}\n\n/**\n * Connection health status from @pol-studios/powersync.\n */\nexport interface PowerSyncConnectionHealth {\n /** Current connection status */\n status: \"healthy\" | \"degraded\" | \"disconnected\";\n /** Last measured query latency in milliseconds */\n latency: number | null;\n /** Timestamp of the last health check */\n lastHealthCheck: Date | null;\n /** Number of consecutive health check failures */\n consecutiveFailures: number;\n /** Total reconnection attempts since last successful connection */\n reconnectAttempts: number;\n}\n\n/**\n * Sync metrics from @pol-studios/powersync.\n */\nexport interface PowerSyncMetrics {\n /** Total number of sync operations attempted */\n totalSyncs: number;\n /** Number of successful sync operations */\n successfulSyncs: number;\n /** Number of failed sync operations */\n failedSyncs: number;\n /** Duration of the last sync in milliseconds */\n lastSyncDuration: number | null;\n /** Average sync duration in milliseconds */\n averageSyncDuration: number | null;\n /** Total bytes downloaded across all syncs */\n totalDataDownloaded: number;\n /** Total bytes uploaded across all syncs */\n totalDataUploaded: number;\n /** Last sync error details */\n lastError: {\n type: string;\n message: string;\n timestamp: Date;\n } | null;\n}\n\n/**\n * Sync control actions from @pol-studios/powersync.\n */\nexport interface PowerSyncControlActions {\n /** Trigger a sync operation */\n triggerSync: () => Promise<void>;\n /** Pause sync operations */\n pause: () => Promise<void>;\n /** Resume sync operations */\n resume: () => Promise<void>;\n /** Disconnect from the PowerSync service */\n disconnect: () => Promise<void>;\n /** Set the sync scope for selective sync */\n setScope: (scope: {\n type: string;\n ids: string[];\n } | null) => void;\n}\n\n// =============================================================================\n// Availability Check\n// =============================================================================\n\n/**\n * Flag to track whether @pol-studios/powersync is available.\n * This is set lazily on first check.\n */\nlet _powerSyncAvailable: boolean | null = null;\n\n/**\n * Check if @pol-studios/powersync is available.\n *\n * This function performs a lazy check to see if the powersync package\n * is installed and can be imported. The result is cached for subsequent calls.\n *\n * @returns true if @pol-studios/powersync is available, false otherwise\n *\n * @example\n * ```typescript\n * import { isPowerSyncAvailable } from '@pol-studios/db/powersync-bridge';\n *\n * if (isPowerSyncAvailable()) {\n * // Safe to use PowerSync features\n * const { usePowerSync } = await import('@pol-studios/powersync');\n * }\n * ```\n */\nexport function isPowerSyncAvailable(): boolean {\n if (_powerSyncAvailable === null) {\n try {\n // Try to require the package to check availability\n // This will throw if the package is not installed\n require.resolve(\"@pol-studios/powersync\");\n _powerSyncAvailable = true;\n } catch {\n _powerSyncAvailable = false;\n }\n }\n return _powerSyncAvailable;\n}\n\n/**\n * Reset the availability check cache.\n * Useful for testing or when package installation state might change.\n */\nexport function resetPowerSyncAvailabilityCache(): void {\n _powerSyncAvailable = null;\n}\n\n// =============================================================================\n// Type Guards\n// =============================================================================\n\n/**\n * Type guard to check if a value is an AbstractPowerSyncDatabase.\n *\n * @param value - The value to check\n * @returns true if value implements AbstractPowerSyncDatabase interface\n */\nexport function isAbstractPowerSyncDatabase(value: unknown): value is AbstractPowerSyncDatabase {\n if (typeof value !== \"object\" || value === null) {\n return false;\n }\n const db = value as Record<string, unknown>;\n return typeof db.getAll === \"function\" && typeof db.get === \"function\" && typeof db.execute === \"function\" && typeof db.init === \"function\" && typeof db.close === \"function\" && typeof db.connect === \"function\" && typeof db.disconnect === \"function\" && typeof db.registerListener === \"function\" && \"connected\" in db && \"currentStatus\" in db;\n}\n\n/**\n * Type guard to check if a value is a PowerSyncSyncStatus.\n *\n * @param value - The value to check\n * @returns true if value matches PowerSyncSyncStatus interface\n */\nexport function isPowerSyncSyncStatus(value: unknown): value is PowerSyncSyncStatus {\n if (typeof value !== \"object\" || value === null) {\n return false;\n }\n const status = value as Record<string, unknown>;\n return typeof status.connected === \"boolean\" && typeof status.connecting === \"boolean\" && typeof status.hasSynced === \"boolean\" && typeof status.uploading === \"boolean\" && typeof status.downloading === \"boolean\";\n}\n\n// =============================================================================\n// Conversion Utilities\n// =============================================================================\n\n/**\n * Convert PowerSync sync status to the V3 DataLayer SyncStatus format.\n *\n * This utility helps bridge the sync status from @pol-studios/powersync\n * to the format expected by @pol-studios/db's DataLayerProvider.\n *\n * @param powerSyncStatus - The sync status from @pol-studios/powersync\n * @param pendingCount - Number of pending uploads (from pendingMutations)\n * @returns SyncStatus in @pol-studios/db format\n */\nexport function convertToDataLayerSyncStatus(powerSyncStatus: PowerSyncSyncStatus, pendingCount: number = 0): import(\"../core/types\").SyncStatus {\n return {\n isConnected: powerSyncStatus.connected,\n isSyncing: powerSyncStatus.uploading || powerSyncStatus.downloading,\n lastSyncedAt: powerSyncStatus.lastSyncedAt,\n pendingUploads: pendingCount,\n error: null\n };\n}\n\n/**\n * Convert PowerSync sync control to the V3 DataLayer SyncControl format.\n *\n * @param powerSyncControl - The sync control actions from @pol-studios/powersync\n * @returns SyncControl in @pol-studios/db format\n */\nexport function convertToDataLayerSyncControl(powerSyncControl: PowerSyncControlActions): import(\"../core/types\").SyncControl {\n return {\n triggerSync: powerSyncControl.triggerSync,\n startLiveSync: powerSyncControl.resume,\n stopLiveSync: () => {\n powerSyncControl.pause();\n },\n setScope: async (scopeName: string, values: string[]) => {\n powerSyncControl.setScope({\n type: scopeName,\n ids: values\n });\n },\n // Failed upload controls - these are managed by useSyncControl hook directly\n // The bridge just provides placeholders that get overridden\n retryFailedUploads: async () => {\n console.warn(\"retryFailedUploads: Use useSyncControl hook for this functionality\");\n },\n clearFailedUploads: () => {\n console.warn(\"clearFailedUploads: Use useSyncControl hook for this functionality\");\n },\n failedUploads: [],\n pauseAutoRetry: () => {\n console.warn(\"pauseAutoRetry: Use useSyncControl hook for this functionality\");\n },\n resumeAutoRetry: () => {\n console.warn(\"resumeAutoRetry: Use useSyncControl hook for this functionality\");\n },\n isAutoRetryPaused: false\n };\n}\n\n// =============================================================================\n// Integration Helpers\n// =============================================================================\n\n/**\n * Create a database instance getter that works with PowerSync context.\n *\n * This is useful for integrating PowerSyncProvider with DataLayerProvider\n * by providing a way to get the database instance from the PowerSync context.\n *\n * @param getPowerSyncDb - Function to get the PowerSync database from context\n * @returns A function that returns the database or null\n */\nexport function createDatabaseGetter(getPowerSyncDb: () => AbstractPowerSyncDatabase | null): () => AbstractPowerSyncDatabase | null {\n return getPowerSyncDb;\n}\n\n/**\n * Options for setting up DataLayerProvider with PowerSync integration.\n */\nexport interface PowerSyncIntegrationOptions {\n /**\n * The PowerSync database instance from PowerSyncProvider.\n */\n database: AbstractPowerSyncDatabase | null;\n\n /**\n * Whether the PowerSync database is ready.\n */\n isReady: boolean;\n\n /**\n * Current sync status from PowerSyncProvider.\n */\n syncStatus?: PowerSyncSyncStatus;\n\n /**\n * Sync control actions from PowerSyncProvider.\n */\n syncControl?: PowerSyncControlActions;\n\n /**\n * Number of pending mutations.\n */\n pendingCount?: number;\n}\n\n/**\n * Get the powerSyncInstance prop for DataLayerProvider from PowerSync context values.\n *\n * This helper extracts the necessary values from @pol-studios/powersync hooks\n * and returns them in a format suitable for DataLayerProvider.\n *\n * @param options - The PowerSync integration options\n * @returns The powerSyncInstance to pass to DataLayerProvider, or null if not ready\n *\n * @example\n * ```typescript\n * // Inside a component wrapped with PowerSyncProvider\n * const { db, isReady } = usePowerSync();\n * const { status, pendingCount } = useSyncStatus();\n * const syncControl = useSyncControl();\n *\n * const powerSyncInstance = getPowerSyncInstance({\n * database: db,\n * isReady,\n * syncStatus: status,\n * syncControl,\n * pendingCount,\n * });\n *\n * return (\n * <DataLayerProvider\n * config={config}\n * powerSyncInstance={powerSyncInstance}\n * supabaseClient={supabase}\n * queryClient={queryClient}\n * >\n * {children}\n * </DataLayerProvider>\n * );\n * ```\n */\nexport function getPowerSyncInstance(options: PowerSyncIntegrationOptions): AbstractPowerSyncDatabase | null {\n if (!options.isReady || !options.database) {\n return null;\n }\n return options.database;\n}\n\n// =============================================================================\n// Re-export for Convenience\n// =============================================================================\n\n/**\n * Re-export the PowerSyncDatabase type from the query executor for convenience.\n * This is the minimal interface used internally by @pol-studios/db.\n */\nexport type { PowerSyncDatabase } from \"../query/executor\";"],"mappings":";;;;;AA0KA,IAAI,sBAAsC;AAoBnC,SAAS,uBAAgC;AAC9C,MAAI,wBAAwB,MAAM;AAChC,QAAI;AAGF,gBAAQ,QAAQ,wBAAwB;AACxC,4BAAsB;AAAA,IACxB,QAAQ;AACN,4BAAsB;AAAA,IACxB;AAAA,EACF;AACA,SAAO;AACT;AAMO,SAAS,kCAAwC;AACtD,wBAAsB;AACxB;AAYO,SAAS,4BAA4B,OAAoD;AAC9F,MAAI,OAAO,UAAU,YAAY,UAAU,MAAM;AAC/C,WAAO;AAAA,EACT;AACA,QAAM,KAAK;AACX,SAAO,OAAO,GAAG,WAAW,cAAc,OAAO,GAAG,QAAQ,cAAc,OAAO,GAAG,YAAY,cAAc,OAAO,GAAG,SAAS,cAAc,OAAO,GAAG,UAAU,cAAc,OAAO,GAAG,YAAY,cAAc,OAAO,GAAG,eAAe,cAAc,OAAO,GAAG,qBAAqB,cAAc,eAAe,MAAM,mBAAmB;AACnV;AAQO,SAAS,sBAAsB,OAA8C;AAClF,MAAI,OAAO,UAAU,YAAY,UAAU,MAAM;AAC/C,WAAO;AAAA,EACT;AACA,QAAM,SAAS;AACf,SAAO,OAAO,OAAO,cAAc,aAAa,OAAO,OAAO,eAAe,aAAa,OAAO,OAAO,cAAc,aAAa,OAAO,OAAO,cAAc,aAAa,OAAO,OAAO,gBAAgB;AAC5M;AAgBO,SAAS,6BAA6B,iBAAsC,eAAuB,GAAuC;AAC/I,SAAO;AAAA,IACL,aAAa,gBAAgB;AAAA,IAC7B,WAAW,gBAAgB,aAAa,gBAAgB;AAAA,IACxD,cAAc,gBAAgB;AAAA,IAC9B,gBAAgB;AAAA,IAChB,OAAO;AAAA,EACT;AACF;AAQO,SAAS,8BAA8B,kBAAgF;AAC5H,SAAO;AAAA,IACL,aAAa,iBAAiB;AAAA,IAC9B,eAAe,iBAAiB;AAAA,IAChC,cAAc,MAAM;AAClB,uBAAiB,MAAM;AAAA,IACzB;AAAA,IACA,UAAU,OAAO,WAAmB,WAAqB;AACvD,uBAAiB,SAAS;AAAA,QACxB,MAAM;AAAA,QACN,KAAK;AAAA,MACP,CAAC;AAAA,IACH;AAAA;AAAA;AAAA,IAGA,oBAAoB,YAAY;AAC9B,cAAQ,KAAK,oEAAoE;AAAA,IACnF;AAAA,IACA,oBAAoB,MAAM;AACxB,cAAQ,KAAK,oEAAoE;AAAA,IACnF;AAAA,IACA,eAAe,CAAC;AAAA,IAChB,gBAAgB,MAAM;AACpB,cAAQ,KAAK,gEAAgE;AAAA,IAC/E;AAAA,IACA,iBAAiB,MAAM;AACrB,cAAQ,KAAK,iEAAiE;AAAA,IAChF;AAAA,IACA,mBAAmB;AAAA,EACrB;AACF;AAeO,SAAS,qBAAqB,gBAAgG;AACnI,SAAO;AACT;AAoEO,SAAS,qBAAqB,SAAwE;AAC3G,MAAI,CAAC,QAAQ,WAAW,CAAC,QAAQ,UAAU;AACzC,WAAO;AAAA,EACT;AACA,SAAO,QAAQ;AACjB;","names":[]}
|
|
1
|
+
{"version":3,"sources":["../src/powersync-bridge/index.ts"],"sourcesContent":["/**\n * PowerSync Bridge for @pol-studios/db\n *\n * This module provides integration utilities between @pol-studios/db and\n * @pol-studios/powersync packages. It re-exports key types and provides\n * helper functions for type-safe integration.\n *\n * The @pol-studios/powersync package is an optional peer dependency.\n * This bridge allows the db package to work seamlessly with or without\n * the powersync package installed.\n *\n * @example\n * ```typescript\n * import { isPowerSyncAvailable, usePowerSyncDatabase } from '@pol-studios/db/powersync-bridge';\n *\n * if (isPowerSyncAvailable()) {\n * // Use PowerSync features\n * }\n * ```\n */\n\n// =============================================================================\n// Type Re-exports from @pol-studios/powersync\n// =============================================================================\n\n/**\n * Re-export core types from @pol-studios/powersync for convenience.\n * These types are defined here to avoid runtime dependency on the package.\n */\n\n/**\n * Abstract interface for PowerSync database operations.\n * This matches the interface from @pol-studios/powersync/core.\n */\nexport interface AbstractPowerSyncDatabase {\n /** Execute a query and return all results */\n getAll<T>(sql: string, params?: unknown[]): Promise<T[]>;\n /** Execute a query and return first result or null */\n get<T>(sql: string, params?: unknown[]): Promise<T | null>;\n /** Execute a SQL statement (INSERT, UPDATE, DELETE) */\n execute(sql: string, params?: unknown[]): Promise<{\n rowsAffected: number;\n }>;\n /** Whether the database is currently connected */\n connected: boolean;\n /** Current sync status */\n currentStatus: {\n connected: boolean;\n connecting: boolean;\n hasSynced: boolean;\n lastSyncedAt: Date | null;\n dataFlowStatus?: {\n uploading: boolean;\n downloading: boolean;\n };\n downloadProgress?: {\n downloadedFraction: number;\n downloadedOperations: number;\n totalOperations: number;\n };\n };\n /** Initialize the database */\n init(): Promise<void>;\n /** Close the database connection */\n close(): Promise<void>;\n /** Connect to the PowerSync service */\n connect(connector: unknown): Promise<void>;\n /** Disconnect from the PowerSync service */\n disconnect(): Promise<void>;\n /** Register a listener for status changes */\n registerListener(listener: {\n statusChanged?: (status: unknown) => void;\n }): () => void;\n /** Get the next pending CRUD transaction */\n getNextCrudTransaction(): Promise<unknown>;\n}\n\n/**\n * Sync status from @pol-studios/powersync.\n */\nexport interface PowerSyncSyncStatus {\n /** Whether connected to the PowerSync service */\n connected: boolean;\n /** Whether currently attempting to connect */\n connecting: boolean;\n /** Whether initial sync has completed */\n hasSynced: boolean;\n /** Timestamp of last successful sync */\n lastSyncedAt: Date | null;\n /** Whether currently uploading local changes */\n uploading: boolean;\n /** Whether currently downloading remote changes */\n downloading: boolean;\n /** Download progress details */\n downloadProgress: {\n current: number;\n target: number;\n percentage: number;\n } | null;\n}\n\n/**\n * Connection health status from @pol-studios/powersync.\n */\nexport interface PowerSyncConnectionHealth {\n /** Current connection status */\n status: \"healthy\" | \"degraded\" | \"disconnected\";\n /** Last measured query latency in milliseconds */\n latency: number | null;\n /** Timestamp of the last health check */\n lastHealthCheck: Date | null;\n /** Number of consecutive health check failures */\n consecutiveFailures: number;\n /** Total reconnection attempts since last successful connection */\n reconnectAttempts: number;\n}\n\n/**\n * Sync metrics from @pol-studios/powersync.\n */\nexport interface PowerSyncMetrics {\n /** Total number of sync operations attempted */\n totalSyncs: number;\n /** Number of successful sync operations */\n successfulSyncs: number;\n /** Number of failed sync operations */\n failedSyncs: number;\n /** Duration of the last sync in milliseconds */\n lastSyncDuration: number | null;\n /** Average sync duration in milliseconds */\n averageSyncDuration: number | null;\n /** Total bytes downloaded across all syncs */\n totalDataDownloaded: number;\n /** Total bytes uploaded across all syncs */\n totalDataUploaded: number;\n /** Last sync error details */\n lastError: {\n type: string;\n message: string;\n timestamp: Date;\n } | null;\n}\n\n/**\n * Sync control actions from @pol-studios/powersync.\n */\nexport interface PowerSyncControlActions {\n /** Trigger a sync operation */\n triggerSync: () => Promise<void>;\n /** Pause sync operations */\n pause: () => Promise<void>;\n /** Resume sync operations */\n resume: () => Promise<void>;\n /** Disconnect from the PowerSync service */\n disconnect: () => Promise<void>;\n /** Set the sync scope for selective sync */\n setScope: (scope: {\n type: string;\n ids: string[];\n } | null) => void;\n}\n\n// =============================================================================\n// Availability Check\n// =============================================================================\n\n/**\n * Flag to track whether @pol-studios/powersync is available.\n * This is set lazily on first check.\n */\nlet _powerSyncAvailable: boolean | null = null;\n\n/**\n * Check if @pol-studios/powersync is available.\n *\n * This function performs a lazy check to see if the powersync package\n * is installed and can be imported. The result is cached for subsequent calls.\n *\n * @returns true if @pol-studios/powersync is available, false otherwise\n *\n * @example\n * ```typescript\n * import { isPowerSyncAvailable } from '@pol-studios/db/powersync-bridge';\n *\n * if (isPowerSyncAvailable()) {\n * // Safe to use PowerSync features\n * const { usePowerSync } = await import('@pol-studios/powersync');\n * }\n * ```\n */\nexport function isPowerSyncAvailable(): boolean {\n if (_powerSyncAvailable === null) {\n try {\n // Try to require the package to check availability\n // This will throw if the package is not installed\n require.resolve(\"@pol-studios/powersync\");\n _powerSyncAvailable = true;\n } catch {\n _powerSyncAvailable = false;\n }\n }\n return _powerSyncAvailable;\n}\n\n/**\n * Reset the availability check cache.\n * Useful for testing or when package installation state might change.\n */\nexport function resetPowerSyncAvailabilityCache(): void {\n _powerSyncAvailable = null;\n}\n\n// =============================================================================\n// Type Guards\n// =============================================================================\n\n/**\n * Type guard to check if a value is an AbstractPowerSyncDatabase.\n *\n * @param value - The value to check\n * @returns true if value implements AbstractPowerSyncDatabase interface\n */\nexport function isAbstractPowerSyncDatabase(value: unknown): value is AbstractPowerSyncDatabase {\n if (typeof value !== \"object\" || value === null) {\n return false;\n }\n const db = value as Record<string, unknown>;\n return typeof db.getAll === \"function\" && typeof db.get === \"function\" && typeof db.execute === \"function\" && typeof db.init === \"function\" && typeof db.close === \"function\" && typeof db.connect === \"function\" && typeof db.disconnect === \"function\" && typeof db.registerListener === \"function\" && \"connected\" in db && \"currentStatus\" in db;\n}\n\n/**\n * Type guard to check if a value is a PowerSyncSyncStatus.\n *\n * @param value - The value to check\n * @returns true if value matches PowerSyncSyncStatus interface\n */\nexport function isPowerSyncSyncStatus(value: unknown): value is PowerSyncSyncStatus {\n if (typeof value !== \"object\" || value === null) {\n return false;\n }\n const status = value as Record<string, unknown>;\n return typeof status.connected === \"boolean\" && typeof status.connecting === \"boolean\" && typeof status.hasSynced === \"boolean\" && typeof status.uploading === \"boolean\" && typeof status.downloading === \"boolean\";\n}\n\n// =============================================================================\n// Conversion Utilities\n// =============================================================================\n\n/**\n * Error information that can be passed from PowerSync layer.\n * This allows propagating sync errors through the bridge.\n */\nexport interface PowerSyncErrorInfo {\n /** Error message */\n message: string;\n /** Error type/category (e.g., 'network', 'auth', 'conflict') */\n type?: string;\n /** Whether this is a permanent error */\n isPermanent?: boolean;\n /** Timestamp when error occurred */\n timestamp?: Date;\n}\n\n/**\n * Convert PowerSync sync status to the V3 DataLayer SyncStatus format.\n *\n * This utility helps bridge the sync status from @pol-studios/powersync\n * to the format expected by @pol-studios/db's DataLayerProvider.\n *\n * @param powerSyncStatus - The sync status from @pol-studios/powersync\n * @param pendingCount - Number of pending uploads (from pendingMutations)\n * @param error - Optional error information from PowerSync layer\n * @returns SyncStatus in @pol-studios/db format\n */\nexport function convertToDataLayerSyncStatus(powerSyncStatus: PowerSyncSyncStatus, pendingCount: number = 0, error?: PowerSyncErrorInfo | Error | null): import(\"../core/types\").SyncStatus {\n // Convert error to Error instance if provided\n let syncError: Error | null = null;\n if (error) {\n if (error instanceof Error) {\n syncError = error;\n } else {\n // Create an Error with the message and attach additional properties\n const err = new Error(error.message);\n err.name = error.type ?? 'SyncError';\n // Attach metadata as non-enumerable properties for debugging\n Object.defineProperty(err, 'isPermanent', {\n value: error.isPermanent ?? false,\n enumerable: false\n });\n Object.defineProperty(err, 'timestamp', {\n value: error.timestamp ?? new Date(),\n enumerable: false\n });\n syncError = err;\n }\n }\n return {\n isConnected: powerSyncStatus.connected,\n isSyncing: powerSyncStatus.uploading || powerSyncStatus.downloading,\n lastSyncedAt: powerSyncStatus.lastSyncedAt,\n pendingUploads: pendingCount,\n error: syncError\n };\n}\n\n/**\n * Convert PowerSync sync control to the V3 DataLayer SyncControl format.\n *\n * @param powerSyncControl - The sync control actions from @pol-studios/powersync\n * @returns SyncControl in @pol-studios/db format\n */\nexport function convertToDataLayerSyncControl(powerSyncControl: PowerSyncControlActions): import(\"../core/types\").SyncControl {\n return {\n triggerSync: powerSyncControl.triggerSync,\n startLiveSync: powerSyncControl.resume,\n stopLiveSync: () => {\n powerSyncControl.pause();\n },\n setScope: async (scopeName: string, values: string[]) => {\n powerSyncControl.setScope({\n type: scopeName,\n ids: values\n });\n },\n // Auto-retry controls - managed by the provider/context\n pauseAutoRetry: () => {\n // No-op - actual implementation provided by PowerSyncProvider via DataLayerProvider props\n },\n resumeAutoRetry: () => {\n // No-op - actual implementation provided by PowerSyncProvider via DataLayerProvider props\n },\n isAutoRetryPaused: false,\n // Pending mutations - managed by the provider/context, not this bridge\n addPendingMutation: () => {\n // No-op - actual implementation provided by PowerSyncProvider via DataLayerProvider props\n },\n removePendingMutation: () => {\n // No-op - actual implementation provided by PowerSyncProvider via DataLayerProvider props\n }\n };\n}\n\n// =============================================================================\n// Integration Helpers\n// =============================================================================\n\n/**\n * Create a database instance getter that works with PowerSync context.\n *\n * This is useful for integrating PowerSyncProvider with DataLayerProvider\n * by providing a way to get the database instance from the PowerSync context.\n *\n * @param getPowerSyncDb - Function to get the PowerSync database from context\n * @returns A function that returns the database or null\n */\nexport function createDatabaseGetter(getPowerSyncDb: () => AbstractPowerSyncDatabase | null): () => AbstractPowerSyncDatabase | null {\n return getPowerSyncDb;\n}\n\n/**\n * Options for setting up DataLayerProvider with PowerSync integration.\n */\nexport interface PowerSyncIntegrationOptions {\n /**\n * The PowerSync database instance from PowerSyncProvider.\n */\n database: AbstractPowerSyncDatabase | null;\n\n /**\n * Whether the PowerSync database is ready.\n */\n isReady: boolean;\n\n /**\n * Current sync status from PowerSyncProvider.\n */\n syncStatus?: PowerSyncSyncStatus;\n\n /**\n * Sync control actions from PowerSyncProvider.\n */\n syncControl?: PowerSyncControlActions;\n\n /**\n * Number of pending mutations.\n */\n pendingCount?: number;\n}\n\n/**\n * Get the powerSyncInstance prop for DataLayerProvider from PowerSync context values.\n *\n * This helper extracts the necessary values from @pol-studios/powersync hooks\n * and returns them in a format suitable for DataLayerProvider.\n *\n * @param options - The PowerSync integration options\n * @returns The powerSyncInstance to pass to DataLayerProvider, or null if not ready\n *\n * @example\n * ```typescript\n * // Inside a component wrapped with PowerSyncProvider\n * const { db, isReady } = usePowerSync();\n * const { status, pendingCount } = useSyncStatus();\n * const syncControl = useSyncControl();\n *\n * const powerSyncInstance = getPowerSyncInstance({\n * database: db,\n * isReady,\n * syncStatus: status,\n * syncControl,\n * pendingCount,\n * });\n *\n * return (\n * <DataLayerProvider\n * config={config}\n * powerSyncInstance={powerSyncInstance}\n * supabaseClient={supabase}\n * queryClient={queryClient}\n * >\n * {children}\n * </DataLayerProvider>\n * );\n * ```\n */\nexport function getPowerSyncInstance(options: PowerSyncIntegrationOptions): AbstractPowerSyncDatabase | null {\n if (!options.isReady || !options.database) {\n return null;\n }\n return options.database;\n}\n\n// =============================================================================\n// Re-export for Convenience\n// =============================================================================\n\n/**\n * Re-export the PowerSyncDatabase type from the query executor for convenience.\n * This is the minimal interface used internally by @pol-studios/db.\n */\nexport type { PowerSyncDatabase } from \"../query/executor\";"],"mappings":";;;;;AA0KA,IAAI,sBAAsC;AAoBnC,SAAS,uBAAgC;AAC9C,MAAI,wBAAwB,MAAM;AAChC,QAAI;AAGF,gBAAQ,QAAQ,wBAAwB;AACxC,4BAAsB;AAAA,IACxB,QAAQ;AACN,4BAAsB;AAAA,IACxB;AAAA,EACF;AACA,SAAO;AACT;AAMO,SAAS,kCAAwC;AACtD,wBAAsB;AACxB;AAYO,SAAS,4BAA4B,OAAoD;AAC9F,MAAI,OAAO,UAAU,YAAY,UAAU,MAAM;AAC/C,WAAO;AAAA,EACT;AACA,QAAM,KAAK;AACX,SAAO,OAAO,GAAG,WAAW,cAAc,OAAO,GAAG,QAAQ,cAAc,OAAO,GAAG,YAAY,cAAc,OAAO,GAAG,SAAS,cAAc,OAAO,GAAG,UAAU,cAAc,OAAO,GAAG,YAAY,cAAc,OAAO,GAAG,eAAe,cAAc,OAAO,GAAG,qBAAqB,cAAc,eAAe,MAAM,mBAAmB;AACnV;AAQO,SAAS,sBAAsB,OAA8C;AAClF,MAAI,OAAO,UAAU,YAAY,UAAU,MAAM;AAC/C,WAAO;AAAA,EACT;AACA,QAAM,SAAS;AACf,SAAO,OAAO,OAAO,cAAc,aAAa,OAAO,OAAO,eAAe,aAAa,OAAO,OAAO,cAAc,aAAa,OAAO,OAAO,cAAc,aAAa,OAAO,OAAO,gBAAgB;AAC5M;AAgCO,SAAS,6BAA6B,iBAAsC,eAAuB,GAAG,OAA+E;AAE1L,MAAI,YAA0B;AAC9B,MAAI,OAAO;AACT,QAAI,iBAAiB,OAAO;AAC1B,kBAAY;AAAA,IACd,OAAO;AAEL,YAAM,MAAM,IAAI,MAAM,MAAM,OAAO;AACnC,UAAI,OAAO,MAAM,QAAQ;AAEzB,aAAO,eAAe,KAAK,eAAe;AAAA,QACxC,OAAO,MAAM,eAAe;AAAA,QAC5B,YAAY;AAAA,MACd,CAAC;AACD,aAAO,eAAe,KAAK,aAAa;AAAA,QACtC,OAAO,MAAM,aAAa,oBAAI,KAAK;AAAA,QACnC,YAAY;AAAA,MACd,CAAC;AACD,kBAAY;AAAA,IACd;AAAA,EACF;AACA,SAAO;AAAA,IACL,aAAa,gBAAgB;AAAA,IAC7B,WAAW,gBAAgB,aAAa,gBAAgB;AAAA,IACxD,cAAc,gBAAgB;AAAA,IAC9B,gBAAgB;AAAA,IAChB,OAAO;AAAA,EACT;AACF;AAQO,SAAS,8BAA8B,kBAAgF;AAC5H,SAAO;AAAA,IACL,aAAa,iBAAiB;AAAA,IAC9B,eAAe,iBAAiB;AAAA,IAChC,cAAc,MAAM;AAClB,uBAAiB,MAAM;AAAA,IACzB;AAAA,IACA,UAAU,OAAO,WAAmB,WAAqB;AACvD,uBAAiB,SAAS;AAAA,QACxB,MAAM;AAAA,QACN,KAAK;AAAA,MACP,CAAC;AAAA,IACH;AAAA;AAAA,IAEA,gBAAgB,MAAM;AAAA,IAEtB;AAAA,IACA,iBAAiB,MAAM;AAAA,IAEvB;AAAA,IACA,mBAAmB;AAAA;AAAA,IAEnB,oBAAoB,MAAM;AAAA,IAE1B;AAAA,IACA,uBAAuB,MAAM;AAAA,IAE7B;AAAA,EACF;AACF;AAeO,SAAS,qBAAqB,gBAAgG;AACnI,SAAO;AACT;AAoEO,SAAS,qBAAqB,SAAwE;AAC3G,MAAI,CAAC,QAAQ,WAAW,CAAC,QAAQ,UAAU;AACzC,WAAO;AAAA,EACT;AACA,SAAO,QAAQ;AACjB;","names":[]}
|
|
@@ -10,9 +10,6 @@ var __require = /* @__PURE__ */ ((x) => typeof require !== "undefined" ? require
|
|
|
10
10
|
if (typeof require !== "undefined") return require.apply(this, arguments);
|
|
11
11
|
throw Error('Dynamic require of "' + x + '" is not supported');
|
|
12
12
|
});
|
|
13
|
-
var __esm = (fn, res) => function __init() {
|
|
14
|
-
return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
|
|
15
|
-
};
|
|
16
13
|
var __commonJS = (cb, mod) => function __require2() {
|
|
17
14
|
return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
|
|
18
15
|
};
|
|
@@ -35,8 +32,7 @@ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__ge
|
|
|
35
32
|
|
|
36
33
|
export {
|
|
37
34
|
__require,
|
|
38
|
-
__esm,
|
|
39
35
|
__commonJS,
|
|
40
36
|
__toESM
|
|
41
37
|
};
|
|
42
|
-
//# sourceMappingURL=chunk-
|
|
38
|
+
//# sourceMappingURL=chunk-7D4SUZUM.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import {
|
|
2
2
|
__commonJS,
|
|
3
3
|
__toESM
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-7D4SUZUM.js";
|
|
5
5
|
|
|
6
6
|
// ../../../node_modules/.pnpm/xregexp@5.1.1/node_modules/xregexp/tools/output/categories.js
|
|
7
7
|
var require_categories = __commonJS({
|
|
@@ -2775,4 +2775,4 @@ xregexp/src/addons/unicode-scripts.js:
|
|
|
2775
2775
|
* Unicode data by Mathias Bynens <mathiasbynens.be>
|
|
2776
2776
|
*)
|
|
2777
2777
|
*/
|
|
2778
|
-
//# sourceMappingURL=chunk-
|
|
2778
|
+
//# sourceMappingURL=chunk-AKIRHA4Q.js.map
|