@proma-dev/sdk 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,540 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __getOwnPropSymbols = Object.getOwnPropertySymbols;
6
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
7
+ var __propIsEnum = Object.prototype.propertyIsEnumerable;
8
+ var __objRest = (source, exclude) => {
9
+ var target = {};
10
+ for (var prop in source)
11
+ if (__hasOwnProp.call(source, prop) && exclude.indexOf(prop) < 0)
12
+ target[prop] = source[prop];
13
+ if (source != null && __getOwnPropSymbols)
14
+ for (var prop of __getOwnPropSymbols(source)) {
15
+ if (exclude.indexOf(prop) < 0 && __propIsEnum.call(source, prop))
16
+ target[prop] = source[prop];
17
+ }
18
+ return target;
19
+ };
20
+ var __export = (target, all) => {
21
+ for (var name in all)
22
+ __defProp(target, name, { get: all[name], enumerable: true });
23
+ };
24
+ var __copyProps = (to, from, except, desc) => {
25
+ if (from && typeof from === "object" || typeof from === "function") {
26
+ for (let key of __getOwnPropNames(from))
27
+ if (!__hasOwnProp.call(to, key) && key !== except)
28
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
29
+ }
30
+ return to;
31
+ };
32
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
33
+
34
+ // src/react/index.ts
35
+ var react_exports = {};
36
+ __export(react_exports, {
37
+ LoginWithProma: () => LoginWithProma,
38
+ PromaProvider: () => PromaProvider,
39
+ usePromaAuth: () => usePromaAuth
40
+ });
41
+ module.exports = __toCommonJS(react_exports);
42
+
43
+ // src/react/login-button.tsx
44
+ var import_react = require("react");
45
+
46
+ // src/pkce.ts
47
+ var PKCE_STORAGE_KEY = "proma_code_verifier";
48
+ function generateCodeVerifier() {
49
+ const bytes = new Uint8Array(32);
50
+ crypto.getRandomValues(bytes);
51
+ return base64url(bytes);
52
+ }
53
+ async function generateCodeChallenge(verifier) {
54
+ const encoder = new TextEncoder();
55
+ const data = encoder.encode(verifier);
56
+ const hash = await crypto.subtle.digest("SHA-256", data);
57
+ return base64url(new Uint8Array(hash));
58
+ }
59
+ function saveCodeVerifier(verifier) {
60
+ if (typeof sessionStorage !== "undefined") {
61
+ sessionStorage.setItem(PKCE_STORAGE_KEY, verifier);
62
+ }
63
+ }
64
+ function consumeCodeVerifier() {
65
+ if (typeof sessionStorage === "undefined") return null;
66
+ const verifier = sessionStorage.getItem(PKCE_STORAGE_KEY);
67
+ sessionStorage.removeItem(PKCE_STORAGE_KEY);
68
+ return verifier;
69
+ }
70
+ function base64url(bytes) {
71
+ const base64 = btoa(String.fromCharCode(...bytes));
72
+ return base64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
73
+ }
74
+
75
+ // src/storage.ts
76
+ var SESSION_KEY = "proma_session";
77
+ var TokenStore = class {
78
+ constructor(storage) {
79
+ this.storage = storage;
80
+ }
81
+ get() {
82
+ try {
83
+ const raw = this.storage.getItem(SESSION_KEY);
84
+ if (!raw) return null;
85
+ return JSON.parse(raw);
86
+ } catch (e) {
87
+ return null;
88
+ }
89
+ }
90
+ set(session) {
91
+ this.storage.setItem(SESSION_KEY, JSON.stringify(session));
92
+ }
93
+ clear() {
94
+ this.storage.removeItem(SESSION_KEY);
95
+ this.storage.removeItem("proma_code_verifier");
96
+ }
97
+ isExpired(session) {
98
+ return Date.now() >= session.expiresAt - 3e4;
99
+ }
100
+ };
101
+ var MemoryStorage = class {
102
+ constructor() {
103
+ this.map = /* @__PURE__ */ new Map();
104
+ }
105
+ getItem(key) {
106
+ var _a;
107
+ return (_a = this.map.get(key)) != null ? _a : null;
108
+ }
109
+ setItem(key, value) {
110
+ this.map.set(key, value);
111
+ }
112
+ removeItem(key) {
113
+ this.map.delete(key);
114
+ }
115
+ };
116
+ function getDefaultStorage() {
117
+ if (typeof localStorage !== "undefined") return localStorage;
118
+ return new MemoryStorage();
119
+ }
120
+
121
+ // src/client.ts
122
+ var DEFAULT_BASE_URL = "https://proma.dev";
123
+ var PromaClient = class {
124
+ constructor(config) {
125
+ this.config = config;
126
+ var _a, _b, _c;
127
+ this.baseUrl = (_a = config.baseUrl) != null ? _a : DEFAULT_BASE_URL;
128
+ this.store = new TokenStore((_b = config.storage) != null ? _b : getDefaultStorage());
129
+ this.defaultScopes = (_c = config.scopes) != null ? _c : ["profile"];
130
+ this.credits = new CreditsApi(this);
131
+ this.ai = new AiApi(this);
132
+ }
133
+ // ---------------------------------------------------------------------------
134
+ // Auth
135
+ // ---------------------------------------------------------------------------
136
+ /**
137
+ * Redirects the user to Proma's login page.
138
+ * Call this on a button click — it will navigate away from the current page.
139
+ *
140
+ * @example
141
+ * button.onclick = () => proma.login()
142
+ */
143
+ async login(scopes) {
144
+ const url = await this.buildAuthorizeUrl(scopes != null ? scopes : this.defaultScopes);
145
+ window.location.href = url;
146
+ }
147
+ /**
148
+ * Builds the authorization URL without navigating.
149
+ * Useful if you want to control the redirect yourself.
150
+ */
151
+ async buildAuthorizeUrl(scopes = this.defaultScopes) {
152
+ const verifier = generateCodeVerifier();
153
+ const challenge = await generateCodeChallenge(verifier);
154
+ saveCodeVerifier(verifier);
155
+ const state = crypto.randomUUID();
156
+ if (typeof sessionStorage !== "undefined") {
157
+ sessionStorage.setItem("proma_oauth_state", state);
158
+ }
159
+ const url = new URL("/api/oauth/authorize", this.baseUrl);
160
+ url.searchParams.set("client_id", this.config.clientId);
161
+ url.searchParams.set("redirect_uri", this.config.redirectUri);
162
+ url.searchParams.set("response_type", "code");
163
+ url.searchParams.set("scope", scopes.join(" "));
164
+ url.searchParams.set("state", state);
165
+ url.searchParams.set("code_challenge", challenge);
166
+ url.searchParams.set("code_challenge_method", "S256");
167
+ return url.toString();
168
+ }
169
+ /**
170
+ * Handles the OAuth callback. Call this on your redirect page.
171
+ * Reads the `code` from the URL, exchanges it for tokens, and stores the session.
172
+ *
173
+ * @param url - Defaults to `window.location.href`
174
+ * @returns The new session
175
+ *
176
+ * @example
177
+ * // pages/callback.tsx
178
+ * useEffect(() => {
179
+ * proma.handleCallback().then(session => {
180
+ * router.push('/dashboard')
181
+ * })
182
+ * }, [])
183
+ */
184
+ async handleCallback(url) {
185
+ var _a;
186
+ const href = url != null ? url : typeof window !== "undefined" ? window.location.href : "";
187
+ const params = new URL(href).searchParams;
188
+ const code = params.get("code");
189
+ const error = params.get("error");
190
+ if (error) {
191
+ throw new Error((_a = params.get("error_description")) != null ? _a : error);
192
+ }
193
+ if (!code) {
194
+ throw new Error("No authorization code found in URL");
195
+ }
196
+ const returnedState = params.get("state");
197
+ if (typeof sessionStorage !== "undefined") {
198
+ const expectedState = sessionStorage.getItem("proma_oauth_state");
199
+ sessionStorage.removeItem("proma_oauth_state");
200
+ if (!returnedState || returnedState !== expectedState) {
201
+ throw new Error("Invalid state parameter \u2014 possible CSRF attack");
202
+ }
203
+ }
204
+ const verifier = consumeCodeVerifier();
205
+ const body = new URLSearchParams({
206
+ grant_type: "authorization_code",
207
+ code,
208
+ redirect_uri: this.config.redirectUri,
209
+ client_id: this.config.clientId
210
+ });
211
+ if (verifier) body.set("code_verifier", verifier);
212
+ const tokens = await this.fetchTokens(body);
213
+ const session = this.tokensToSession(tokens);
214
+ this.store.set(session);
215
+ return session;
216
+ }
217
+ /**
218
+ * Returns the current session (access token, refresh token, expiry).
219
+ * Automatically refreshes the access token if it is expired.
220
+ * Returns `null` if the user is not logged in.
221
+ */
222
+ async getSession() {
223
+ const session = this.store.get();
224
+ if (!session) return null;
225
+ if (this.store.isExpired(session)) {
226
+ try {
227
+ return await this.refresh(session.refreshToken);
228
+ } catch (e) {
229
+ this.store.clear();
230
+ return null;
231
+ }
232
+ }
233
+ return session;
234
+ }
235
+ /**
236
+ * Returns `true` if the user has a valid (or refreshable) session.
237
+ */
238
+ async isAuthenticated() {
239
+ return await this.getSession() !== null;
240
+ }
241
+ /**
242
+ * Fetches the logged-in user's profile.
243
+ * Requires the `profile` scope.
244
+ */
245
+ async getUser() {
246
+ const token = await this.requireAccessToken();
247
+ const res = await fetch(`${this.baseUrl}/api/oauth/userinfo`, {
248
+ headers: { Authorization: `Bearer ${token}` }
249
+ });
250
+ if (!res.ok) throw new Error("Failed to fetch user info");
251
+ return res.json();
252
+ }
253
+ /**
254
+ * Clears the stored session and logs the user out.
255
+ * Does not revoke the token server-side.
256
+ */
257
+ logout() {
258
+ this.store.clear();
259
+ }
260
+ // ---------------------------------------------------------------------------
261
+ // Internal helpers (used by sub-APIs)
262
+ // ---------------------------------------------------------------------------
263
+ async requireAccessToken() {
264
+ const session = await this.getSession();
265
+ if (!session)
266
+ throw new Error("Not authenticated \u2014 call proma.login() first");
267
+ return session.accessToken;
268
+ }
269
+ async refresh(refreshToken) {
270
+ const body = new URLSearchParams({
271
+ grant_type: "refresh_token",
272
+ refresh_token: refreshToken,
273
+ client_id: this.config.clientId
274
+ });
275
+ const tokens = await this.fetchTokens(body);
276
+ const session = this.tokensToSession(tokens);
277
+ this.store.set(session);
278
+ return session;
279
+ }
280
+ async fetchTokens(body) {
281
+ var _a;
282
+ const res = await fetch(`${this.baseUrl}/api/oauth/token`, {
283
+ method: "POST",
284
+ headers: { "Content-Type": "application/x-www-form-urlencoded" },
285
+ body: body.toString()
286
+ });
287
+ if (!res.ok) {
288
+ const err = await res.json().catch(() => ({ error: "unknown_error" }));
289
+ throw new Error((_a = err.error_description) != null ? _a : err.error);
290
+ }
291
+ return res.json();
292
+ }
293
+ tokensToSession(tokens) {
294
+ return {
295
+ accessToken: tokens.access_token,
296
+ refreshToken: tokens.refresh_token,
297
+ expiresAt: Date.now() + tokens.expires_in * 1e3,
298
+ scope: tokens.scope
299
+ };
300
+ }
301
+ };
302
+ var CreditsApi = class {
303
+ constructor(client) {
304
+ this.client = client;
305
+ }
306
+ /**
307
+ * Returns the user's current credit balance.
308
+ * Requires scope: `credits`
309
+ *
310
+ * @example
311
+ * const { balance, formatted } = await proma.credits.getBalance()
312
+ * console.log(`You have ${formatted}`) // "You have $1.23"
313
+ */
314
+ async getBalance() {
315
+ const token = await this.client.requireAccessToken();
316
+ const res = await fetch(`${this.client.baseUrl}/api/sdk/credits/balance`, {
317
+ headers: { Authorization: `Bearer ${token}` }
318
+ });
319
+ if (!res.ok) throw new Error("Failed to fetch credit balance");
320
+ return res.json();
321
+ }
322
+ /**
323
+ * Deducts credits from the user's account.
324
+ * Requires scope: `credits`
325
+ *
326
+ * @param amount - Micro-credits to spend. 1,000,000 = $1.00
327
+ * @param description - Optional description for the transaction ledger.
328
+ *
329
+ * @example
330
+ * await proma.credits.spend(500_000, 'Generated a report')
331
+ */
332
+ async spend(amount, description) {
333
+ const token = await this.client.requireAccessToken();
334
+ const res = await fetch(`${this.client.baseUrl}/api/sdk/credits/spend`, {
335
+ method: "POST",
336
+ headers: {
337
+ Authorization: `Bearer ${token}`,
338
+ "Content-Type": "application/json"
339
+ },
340
+ body: JSON.stringify({ amount, description })
341
+ });
342
+ if (!res.ok) {
343
+ const err = await res.json().catch(() => ({ error: "unknown" }));
344
+ throw new Error(err.error);
345
+ }
346
+ return res.json();
347
+ }
348
+ };
349
+ var AiApi = class {
350
+ constructor(client) {
351
+ this.client = client;
352
+ }
353
+ /**
354
+ * Sends a chat request through the Proma AI gateway (Gemini).
355
+ * Credits are deducted automatically per token used.
356
+ * Requires scope: `ai:chat`
357
+ *
358
+ * Returns a streaming `Response` — iterate SSE chunks or use a helper library.
359
+ *
360
+ * @example
361
+ * const stream = await proma.ai.chat({
362
+ * messages: [{ role: 'user', content: 'Explain quantum entanglement simply.' }]
363
+ * })
364
+ * const reader = stream.body.getReader()
365
+ */
366
+ async chat(options) {
367
+ var _a;
368
+ const token = await this.client.requireAccessToken();
369
+ const params = Array.isArray(options) ? { messages: options } : options;
370
+ return fetch(`${this.client.baseUrl}/api/gateway/chat`, {
371
+ method: "POST",
372
+ headers: {
373
+ Authorization: `Bearer ${token}`,
374
+ "Content-Type": "application/json"
375
+ },
376
+ body: JSON.stringify({
377
+ messages: params.messages,
378
+ model: (_a = params.model) != null ? _a : "gemini-2.0-flash"
379
+ })
380
+ });
381
+ }
382
+ /**
383
+ * Convenience wrapper around `chat` that collects the full streamed text.
384
+ * Use this when you don't need streaming and just want the final string.
385
+ *
386
+ * @example
387
+ * const text = await proma.ai.chatText({
388
+ * messages: [{ role: 'user', content: 'Hello!' }]
389
+ * })
390
+ * console.log(text)
391
+ */
392
+ async chatText(options) {
393
+ var _a, _b, _c, _d, _e, _f, _g;
394
+ const res = await this.chat(options);
395
+ if (!res.ok) {
396
+ const err = await res.json().catch(() => ({ error: "upstream_error" }));
397
+ throw new Error(err.error);
398
+ }
399
+ const reader = (_a = res.body) == null ? void 0 : _a.getReader();
400
+ if (!reader) return "";
401
+ const decoder = new TextDecoder();
402
+ let fullText = "";
403
+ while (true) {
404
+ const { done, value } = await reader.read();
405
+ if (done) break;
406
+ const chunk = decoder.decode(value, { stream: true });
407
+ for (const line of chunk.split("\n")) {
408
+ if (!line.startsWith("data: ")) continue;
409
+ const json = line.slice(6).trim();
410
+ if (json === "[DONE]") continue;
411
+ try {
412
+ const parsed = JSON.parse(json);
413
+ const text = (_g = (_f = (_e = (_d = (_c = (_b = parsed.candidates) == null ? void 0 : _b[0]) == null ? void 0 : _c.content) == null ? void 0 : _d.parts) == null ? void 0 : _e[0]) == null ? void 0 : _f.text) != null ? _g : "";
414
+ fullText += text;
415
+ } catch (e) {
416
+ }
417
+ }
418
+ }
419
+ return fullText;
420
+ }
421
+ };
422
+
423
+ // src/react/login-button.tsx
424
+ function LoginWithProma({
425
+ clientId,
426
+ redirectUri,
427
+ scopes = ["profile"],
428
+ baseUrl,
429
+ onError,
430
+ children,
431
+ className
432
+ }) {
433
+ const [isLoading, setIsLoading] = (0, import_react.useState)(false);
434
+ async function handleClick() {
435
+ setIsLoading(true);
436
+ try {
437
+ const client = new PromaClient({ clientId, redirectUri, baseUrl });
438
+ await client.login(scopes);
439
+ } catch (err) {
440
+ setIsLoading(false);
441
+ onError == null ? void 0 : onError(err instanceof Error ? err : new Error("Authorization failed"));
442
+ }
443
+ }
444
+ return /* @__PURE__ */ React.createElement(
445
+ "button",
446
+ {
447
+ type: "button",
448
+ onClick: handleClick,
449
+ disabled: isLoading,
450
+ className: className != null ? className : "proma-login-button",
451
+ "aria-label": "Login with Proma"
452
+ },
453
+ isLoading ? "Redirecting\u2026" : children != null ? children : /* @__PURE__ */ React.createElement(React.Fragment, null, /* @__PURE__ */ React.createElement(PromaLogo, null), "Login with Proma")
454
+ );
455
+ }
456
+ function PromaLogo() {
457
+ return /* @__PURE__ */ React.createElement(
458
+ "svg",
459
+ {
460
+ width: 16,
461
+ height: 16,
462
+ viewBox: "0 0 24 24",
463
+ fill: "currentColor",
464
+ "aria-hidden": "true"
465
+ },
466
+ /* @__PURE__ */ React.createElement(
467
+ "path",
468
+ {
469
+ d: "M12 2C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zm-1-13h2v6h-2zm0 8h2v2h-2z"
470
+ }
471
+ )
472
+ );
473
+ }
474
+
475
+ // src/react/proma-provider.tsx
476
+ var import_react2 = require("react");
477
+ var PromaContext = (0, import_react2.createContext)(null);
478
+ function PromaProvider(_a) {
479
+ var _b = _a, { children } = _b, config = __objRest(_b, ["children"]);
480
+ const [client] = (0, import_react2.useState)(() => new PromaClient(config));
481
+ const [user, setUser] = (0, import_react2.useState)(null);
482
+ const [isLoading, setIsLoading] = (0, import_react2.useState)(true);
483
+ (0, import_react2.useEffect)(() => {
484
+ let cancelled = false;
485
+ async function restore() {
486
+ try {
487
+ const session = await client.getSession();
488
+ if (!session || cancelled) {
489
+ setIsLoading(false);
490
+ return;
491
+ }
492
+ const userInfo = await client.getUser();
493
+ if (!cancelled) setUser(userInfo);
494
+ } catch (e) {
495
+ } finally {
496
+ if (!cancelled) setIsLoading(false);
497
+ }
498
+ }
499
+ void restore();
500
+ return () => {
501
+ cancelled = true;
502
+ };
503
+ }, [client]);
504
+ const login = (0, import_react2.useCallback)(
505
+ (scopes) => client.login(scopes),
506
+ [client]
507
+ );
508
+ const logout = (0, import_react2.useCallback)(() => {
509
+ client.logout();
510
+ setUser(null);
511
+ }, [client]);
512
+ return /* @__PURE__ */ React.createElement(
513
+ PromaContext.Provider,
514
+ {
515
+ value: {
516
+ user,
517
+ isLoading,
518
+ isAuthenticated: !!user,
519
+ login,
520
+ logout,
521
+ client
522
+ }
523
+ },
524
+ children
525
+ );
526
+ }
527
+ function usePromaAuth() {
528
+ const ctx = (0, import_react2.useContext)(PromaContext);
529
+ if (!ctx) {
530
+ throw new Error("usePromaAuth must be used inside <PromaProvider>");
531
+ }
532
+ return ctx;
533
+ }
534
+ // Annotate the CommonJS export names for ESM import in node:
535
+ 0 && (module.exports = {
536
+ LoginWithProma,
537
+ PromaProvider,
538
+ usePromaAuth
539
+ });
540
+ //# sourceMappingURL=index.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/react/index.ts","../../src/react/login-button.tsx","../../src/pkce.ts","../../src/storage.ts","../../src/client.ts","../../src/react/proma-provider.tsx"],"sourcesContent":["export { LoginWithProma } from './login-button';\nexport { PromaProvider, usePromaAuth } from './proma-provider';\n","import { type ReactNode, useState } from 'react';\n\nimport { PromaClient } from '../client';\nimport type { OAuthScope } from '../types';\n\ninterface LoginWithPromaProps {\n clientId: string;\n redirectUri: string;\n scopes?: OAuthScope[];\n baseUrl?: string;\n onError?: (error: Error) => void;\n children?: ReactNode;\n className?: string;\n}\n\n/**\n * A ready-to-use \"Login with Proma\" button.\n *\n * @example\n * <LoginWithProma\n * clientId=\"proma_app_abc123\"\n * redirectUri=\"https://myapp.com/callback\"\n * scopes={['profile', 'credits']}\n * />\n */\nexport function LoginWithProma({\n clientId,\n redirectUri,\n scopes = ['profile'],\n baseUrl,\n onError,\n children,\n className,\n}: LoginWithPromaProps) {\n const [isLoading, setIsLoading] = useState(false);\n\n async function handleClick() {\n setIsLoading(true);\n\n try {\n const client = new PromaClient({ clientId, redirectUri, baseUrl });\n await client.login(scopes);\n } catch (err) {\n setIsLoading(false);\n onError?.(err instanceof Error ? err : new Error('Authorization failed'));\n }\n }\n\n return (\n <button\n type={'button'}\n onClick={handleClick}\n disabled={isLoading}\n className={className ?? 'proma-login-button'}\n aria-label={'Login with Proma'}\n >\n {isLoading\n ? 'Redirecting…'\n : (children ?? (\n <>\n <PromaLogo />\n Login with Proma\n </>\n ))}\n </button>\n );\n}\n\nfunction PromaLogo() {\n return (\n <svg\n width={16}\n height={16}\n viewBox={'0 0 24 24'}\n fill={'currentColor'}\n aria-hidden={'true'}\n >\n <path\n d={\n 'M12 2C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zm-1-13h2v6h-2zm0 8h2v2h-2z'\n }\n />\n </svg>\n );\n}\n","/**\n * PKCE helpers — browser + Node 18+ compatible via SubtleCrypto.\n */\n\nconst PKCE_STORAGE_KEY = 'proma_code_verifier';\n\n/**\n * Generates a cryptographically random code_verifier (43–128 chars from unreserved character set).\n */\nexport function generateCodeVerifier(): string {\n const bytes = new Uint8Array(32);\n crypto.getRandomValues(bytes);\n return base64url(bytes);\n}\n\n/**\n * Derives the code_challenge from a code_verifier using SHA-256 (S256 method).\n */\nexport async function generateCodeChallenge(verifier: string): Promise<string> {\n const encoder = new TextEncoder();\n const data = encoder.encode(verifier);\n const hash = await crypto.subtle.digest('SHA-256', data);\n return base64url(new Uint8Array(hash));\n}\n\n/**\n * Saves the code_verifier to sessionStorage for retrieval after the redirect.\n */\nexport function saveCodeVerifier(verifier: string): void {\n if (typeof sessionStorage !== 'undefined') {\n sessionStorage.setItem(PKCE_STORAGE_KEY, verifier);\n }\n}\n\n/**\n * Reads and removes the code_verifier from sessionStorage.\n */\nexport function consumeCodeVerifier(): string | null {\n if (typeof sessionStorage === 'undefined') return null;\n const verifier = sessionStorage.getItem(PKCE_STORAGE_KEY);\n sessionStorage.removeItem(PKCE_STORAGE_KEY);\n return verifier;\n}\n\nfunction base64url(bytes: Uint8Array): string {\n const base64 = btoa(String.fromCharCode(...bytes));\n return base64.replace(/\\+/g, '-').replace(/\\//g, '_').replace(/=+$/, '');\n}\n","import type { Session, TokenStorage } from './types';\n\nconst SESSION_KEY = 'proma_session';\n\nexport class TokenStore {\n constructor(private readonly storage: TokenStorage) {}\n\n get(): Session | null {\n try {\n const raw = this.storage.getItem(SESSION_KEY);\n if (!raw) return null;\n return JSON.parse(raw) as Session;\n } catch {\n return null;\n }\n }\n\n set(session: Session): void {\n this.storage.setItem(SESSION_KEY, JSON.stringify(session));\n }\n\n clear(): void {\n this.storage.removeItem(SESSION_KEY);\n // Also clear the PKCE verifier if present\n this.storage.removeItem('proma_code_verifier');\n }\n\n isExpired(session: Session): boolean {\n // Consider expired 30 seconds before actual expiry\n return Date.now() >= session.expiresAt - 30_000;\n }\n}\n\n/** Default in-memory storage for environments without localStorage (SSR, Node). */\nexport class MemoryStorage implements TokenStorage {\n private map = new Map<string, string>();\n getItem(key: string) {\n return this.map.get(key) ?? null;\n }\n setItem(key: string, value: string) {\n this.map.set(key, value);\n }\n removeItem(key: string) {\n this.map.delete(key);\n }\n}\n\nexport function getDefaultStorage(): TokenStorage {\n if (typeof localStorage !== 'undefined') return localStorage;\n return new MemoryStorage();\n}\n","import {\n consumeCodeVerifier,\n generateCodeChallenge,\n generateCodeVerifier,\n saveCodeVerifier,\n} from './pkce';\nimport { TokenStore, getDefaultStorage } from './storage';\nimport type {\n BalanceResponse,\n ChatMessage,\n ChatOptions,\n OAuthScope,\n PromaClientConfig,\n Session,\n SpendCreditsResponse,\n TokenResponse,\n UserInfo,\n} from './types';\n\nconst DEFAULT_BASE_URL = 'https://proma.dev';\n\nexport class PromaClient {\n readonly baseUrl: string;\n private readonly store: TokenStore;\n private readonly defaultScopes: OAuthScope[];\n\n /** Credits API — requires the `credits` scope. */\n readonly credits: CreditsApi;\n\n /** AI gateway API — requires the `ai:chat` scope. */\n readonly ai: AiApi;\n\n constructor(private readonly config: PromaClientConfig) {\n this.baseUrl = config.baseUrl ?? DEFAULT_BASE_URL;\n this.store = new TokenStore(config.storage ?? getDefaultStorage());\n this.defaultScopes = config.scopes ?? ['profile'];\n this.credits = new CreditsApi(this);\n this.ai = new AiApi(this);\n }\n\n // ---------------------------------------------------------------------------\n // Auth\n // ---------------------------------------------------------------------------\n\n /**\n * Redirects the user to Proma's login page.\n * Call this on a button click — it will navigate away from the current page.\n *\n * @example\n * button.onclick = () => proma.login()\n */\n async login(scopes?: OAuthScope[]): Promise<void> {\n const url = await this.buildAuthorizeUrl(scopes ?? this.defaultScopes);\n window.location.href = url;\n }\n\n /**\n * Builds the authorization URL without navigating.\n * Useful if you want to control the redirect yourself.\n */\n async buildAuthorizeUrl(\n scopes: OAuthScope[] = this.defaultScopes,\n ): Promise<string> {\n const verifier = generateCodeVerifier();\n const challenge = await generateCodeChallenge(verifier);\n saveCodeVerifier(verifier);\n\n // Generate and persist state for CSRF protection\n const state = crypto.randomUUID();\n if (typeof sessionStorage !== 'undefined') {\n sessionStorage.setItem('proma_oauth_state', state);\n }\n\n const url = new URL('/api/oauth/authorize', this.baseUrl);\n url.searchParams.set('client_id', this.config.clientId);\n url.searchParams.set('redirect_uri', this.config.redirectUri);\n url.searchParams.set('response_type', 'code');\n url.searchParams.set('scope', scopes.join(' '));\n url.searchParams.set('state', state);\n url.searchParams.set('code_challenge', challenge);\n url.searchParams.set('code_challenge_method', 'S256');\n\n return url.toString();\n }\n\n /**\n * Handles the OAuth callback. Call this on your redirect page.\n * Reads the `code` from the URL, exchanges it for tokens, and stores the session.\n *\n * @param url - Defaults to `window.location.href`\n * @returns The new session\n *\n * @example\n * // pages/callback.tsx\n * useEffect(() => {\n * proma.handleCallback().then(session => {\n * router.push('/dashboard')\n * })\n * }, [])\n */\n async handleCallback(url?: string): Promise<Session> {\n const href =\n url ?? (typeof window !== 'undefined' ? window.location.href : '');\n const params = new URL(href).searchParams;\n const code = params.get('code');\n const error = params.get('error');\n\n if (error) {\n throw new Error(params.get('error_description') ?? error);\n }\n\n if (!code) {\n throw new Error('No authorization code found in URL');\n }\n\n // Validate state parameter to prevent CSRF attacks\n const returnedState = params.get('state');\n if (typeof sessionStorage !== 'undefined') {\n const expectedState = sessionStorage.getItem('proma_oauth_state');\n sessionStorage.removeItem('proma_oauth_state');\n if (!returnedState || returnedState !== expectedState) {\n throw new Error('Invalid state parameter — possible CSRF attack');\n }\n }\n\n const verifier = consumeCodeVerifier();\n\n const body = new URLSearchParams({\n grant_type: 'authorization_code',\n code,\n redirect_uri: this.config.redirectUri,\n client_id: this.config.clientId,\n });\n\n if (verifier) body.set('code_verifier', verifier);\n\n const tokens = await this.fetchTokens(body);\n const session = this.tokensToSession(tokens);\n this.store.set(session);\n return session;\n }\n\n /**\n * Returns the current session (access token, refresh token, expiry).\n * Automatically refreshes the access token if it is expired.\n * Returns `null` if the user is not logged in.\n */\n async getSession(): Promise<Session | null> {\n const session = this.store.get();\n if (!session) return null;\n\n if (this.store.isExpired(session)) {\n try {\n return await this.refresh(session.refreshToken);\n } catch {\n this.store.clear();\n return null;\n }\n }\n\n return session;\n }\n\n /**\n * Returns `true` if the user has a valid (or refreshable) session.\n */\n async isAuthenticated(): Promise<boolean> {\n return (await this.getSession()) !== null;\n }\n\n /**\n * Fetches the logged-in user's profile.\n * Requires the `profile` scope.\n */\n async getUser(): Promise<UserInfo> {\n const token = await this.requireAccessToken();\n const res = await fetch(`${this.baseUrl}/api/oauth/userinfo`, {\n headers: { Authorization: `Bearer ${token}` },\n });\n if (!res.ok) throw new Error('Failed to fetch user info');\n return res.json() as Promise<UserInfo>;\n }\n\n /**\n * Clears the stored session and logs the user out.\n * Does not revoke the token server-side.\n */\n logout(): void {\n this.store.clear();\n }\n\n // ---------------------------------------------------------------------------\n // Internal helpers (used by sub-APIs)\n // ---------------------------------------------------------------------------\n\n async requireAccessToken(): Promise<string> {\n const session = await this.getSession();\n if (!session)\n throw new Error('Not authenticated — call proma.login() first');\n return session.accessToken;\n }\n\n private async refresh(refreshToken: string): Promise<Session> {\n const body = new URLSearchParams({\n grant_type: 'refresh_token',\n refresh_token: refreshToken,\n client_id: this.config.clientId,\n });\n const tokens = await this.fetchTokens(body);\n const session = this.tokensToSession(tokens);\n this.store.set(session);\n return session;\n }\n\n private async fetchTokens(body: URLSearchParams): Promise<TokenResponse> {\n const res = await fetch(`${this.baseUrl}/api/oauth/token`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/x-www-form-urlencoded' },\n body: body.toString(),\n });\n if (!res.ok) {\n const err = (await res\n .json()\n .catch(() => ({ error: 'unknown_error' }))) as {\n error: string;\n error_description?: string;\n };\n throw new Error(err.error_description ?? err.error);\n }\n return res.json() as Promise<TokenResponse>;\n }\n\n private tokensToSession(tokens: TokenResponse): Session {\n return {\n accessToken: tokens.access_token,\n refreshToken: tokens.refresh_token,\n expiresAt: Date.now() + tokens.expires_in * 1000,\n scope: tokens.scope,\n };\n }\n}\n\n// ---------------------------------------------------------------------------\n// Credits API\n// ---------------------------------------------------------------------------\n\nclass CreditsApi {\n constructor(private readonly client: PromaClient) {}\n\n /**\n * Returns the user's current credit balance.\n * Requires scope: `credits`\n *\n * @example\n * const { balance, formatted } = await proma.credits.getBalance()\n * console.log(`You have ${formatted}`) // \"You have $1.23\"\n */\n async getBalance(): Promise<BalanceResponse> {\n const token = await this.client.requireAccessToken();\n const res = await fetch(`${this.client.baseUrl}/api/sdk/credits/balance`, {\n headers: { Authorization: `Bearer ${token}` },\n });\n if (!res.ok) throw new Error('Failed to fetch credit balance');\n return res.json() as Promise<BalanceResponse>;\n }\n\n /**\n * Deducts credits from the user's account.\n * Requires scope: `credits`\n *\n * @param amount - Micro-credits to spend. 1,000,000 = $1.00\n * @param description - Optional description for the transaction ledger.\n *\n * @example\n * await proma.credits.spend(500_000, 'Generated a report')\n */\n async spend(\n amount: number,\n description?: string,\n ): Promise<SpendCreditsResponse> {\n const token = await this.client.requireAccessToken();\n const res = await fetch(`${this.client.baseUrl}/api/sdk/credits/spend`, {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({ amount, description }),\n });\n if (!res.ok) {\n const err = (await res.json().catch(() => ({ error: 'unknown' }))) as {\n error: string;\n };\n throw new Error(err.error);\n }\n return res.json() as Promise<SpendCreditsResponse>;\n }\n}\n\n// ---------------------------------------------------------------------------\n// AI API\n// ---------------------------------------------------------------------------\n\nclass AiApi {\n constructor(private readonly client: PromaClient) {}\n\n /**\n * Sends a chat request through the Proma AI gateway (Gemini).\n * Credits are deducted automatically per token used.\n * Requires scope: `ai:chat`\n *\n * Returns a streaming `Response` — iterate SSE chunks or use a helper library.\n *\n * @example\n * const stream = await proma.ai.chat({\n * messages: [{ role: 'user', content: 'Explain quantum entanglement simply.' }]\n * })\n * const reader = stream.body.getReader()\n */\n async chat(options: ChatOptions | ChatMessage[]): Promise<Response> {\n const token = await this.client.requireAccessToken();\n const params: ChatOptions = Array.isArray(options)\n ? { messages: options }\n : options;\n\n return fetch(`${this.client.baseUrl}/api/gateway/chat`, {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n messages: params.messages,\n model: params.model ?? 'gemini-2.0-flash',\n }),\n });\n }\n\n /**\n * Convenience wrapper around `chat` that collects the full streamed text.\n * Use this when you don't need streaming and just want the final string.\n *\n * @example\n * const text = await proma.ai.chatText({\n * messages: [{ role: 'user', content: 'Hello!' }]\n * })\n * console.log(text)\n */\n async chatText(options: ChatOptions | ChatMessage[]): Promise<string> {\n const res = await this.chat(options);\n if (!res.ok) {\n const err = (await res\n .json()\n .catch(() => ({ error: 'upstream_error' }))) as { error: string };\n throw new Error(err.error);\n }\n\n const reader = res.body?.getReader();\n if (!reader) return '';\n\n const decoder = new TextDecoder();\n let fullText = '';\n\n while (true) {\n const { done, value } = await reader.read();\n if (done) break;\n\n const chunk = decoder.decode(value, { stream: true });\n // Parse SSE lines: \"data: {...}\"\n for (const line of chunk.split('\\n')) {\n if (!line.startsWith('data: ')) continue;\n const json = line.slice(6).trim();\n if (json === '[DONE]') continue;\n try {\n const parsed = JSON.parse(json) as {\n candidates?: Array<{\n content?: { parts?: Array<{ text?: string }> };\n }>;\n };\n const text = parsed.candidates?.[0]?.content?.parts?.[0]?.text ?? '';\n fullText += text;\n } catch {\n // skip malformed chunks\n }\n }\n }\n\n return fullText;\n }\n}\n","import {\n createContext,\n useCallback,\n useContext,\n useEffect,\n useState,\n} from 'react';\n\nimport { PromaClient } from '../client';\nimport type { OAuthScope, PromaClientConfig, UserInfo } from '../types';\n\ninterface PromaAuthState {\n user: UserInfo | null;\n isLoading: boolean;\n isAuthenticated: boolean;\n /** Redirects the user to Proma's login page. */\n login: (scopes?: OAuthScope[]) => Promise<void>;\n /** Clears the session. */\n logout: () => void;\n /** The underlying PromaClient instance. */\n client: PromaClient;\n}\n\nconst PromaContext = createContext<PromaAuthState | null>(null);\n\ntype PromaProviderProps = PromaClientConfig & {\n children: React.ReactNode;\n};\n\n/**\n * Wraps your app with Proma auth context.\n * Call `usePromaAuth()` in any child component to access auth state.\n *\n * @example\n * <PromaProvider clientId=\"proma_app_xxx\" redirectUri=\"https://myapp.com/callback\">\n * <App />\n * </PromaProvider>\n */\nexport function PromaProvider({ children, ...config }: PromaProviderProps) {\n const [client] = useState(() => new PromaClient(config));\n const [user, setUser] = useState<UserInfo | null>(null);\n const [isLoading, setIsLoading] = useState(true);\n\n // Restore session on mount\n useEffect(() => {\n let cancelled = false;\n\n async function restore() {\n try {\n const session = await client.getSession();\n if (!session || cancelled) {\n setIsLoading(false);\n return;\n }\n const userInfo = await client.getUser();\n if (!cancelled) setUser(userInfo);\n } catch {\n // no valid session\n } finally {\n if (!cancelled) setIsLoading(false);\n }\n }\n\n void restore();\n return () => {\n cancelled = true;\n };\n }, [client]);\n\n const login = useCallback(\n (scopes?: OAuthScope[]) => client.login(scopes),\n [client],\n );\n\n const logout = useCallback(() => {\n client.logout();\n setUser(null);\n }, [client]);\n\n return (\n <PromaContext.Provider\n value={{\n user,\n isLoading,\n isAuthenticated: !!user,\n login,\n logout,\n client,\n }}\n >\n {children}\n </PromaContext.Provider>\n );\n}\n\n/**\n * Returns the current Proma auth state.\n * Must be used inside a `<PromaProvider>`.\n *\n * @example\n * const { user, isLoading, login, logout } = usePromaAuth()\n */\nexport function usePromaAuth(): PromaAuthState {\n const ctx = useContext(PromaContext);\n if (!ctx) {\n throw new Error('usePromaAuth must be used inside <PromaProvider>');\n }\n return ctx;\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,mBAAyC;;;ACIzC,IAAM,mBAAmB;AAKlB,SAAS,uBAA+B;AAC7C,QAAM,QAAQ,IAAI,WAAW,EAAE;AAC/B,SAAO,gBAAgB,KAAK;AAC5B,SAAO,UAAU,KAAK;AACxB;AAKA,eAAsB,sBAAsB,UAAmC;AAC7E,QAAM,UAAU,IAAI,YAAY;AAChC,QAAM,OAAO,QAAQ,OAAO,QAAQ;AACpC,QAAM,OAAO,MAAM,OAAO,OAAO,OAAO,WAAW,IAAI;AACvD,SAAO,UAAU,IAAI,WAAW,IAAI,CAAC;AACvC;AAKO,SAAS,iBAAiB,UAAwB;AACvD,MAAI,OAAO,mBAAmB,aAAa;AACzC,mBAAe,QAAQ,kBAAkB,QAAQ;AAAA,EACnD;AACF;AAKO,SAAS,sBAAqC;AACnD,MAAI,OAAO,mBAAmB,YAAa,QAAO;AAClD,QAAM,WAAW,eAAe,QAAQ,gBAAgB;AACxD,iBAAe,WAAW,gBAAgB;AAC1C,SAAO;AACT;AAEA,SAAS,UAAU,OAA2B;AAC5C,QAAM,SAAS,KAAK,OAAO,aAAa,GAAG,KAAK,CAAC;AACjD,SAAO,OAAO,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,EAAE;AACzE;;;AC7CA,IAAM,cAAc;AAEb,IAAM,aAAN,MAAiB;AAAA,EACtB,YAA6B,SAAuB;AAAvB;AAAA,EAAwB;AAAA,EAErD,MAAsB;AACpB,QAAI;AACF,YAAM,MAAM,KAAK,QAAQ,QAAQ,WAAW;AAC5C,UAAI,CAAC,IAAK,QAAO;AACjB,aAAO,KAAK,MAAM,GAAG;AAAA,IACvB,SAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,IAAI,SAAwB;AAC1B,SAAK,QAAQ,QAAQ,aAAa,KAAK,UAAU,OAAO,CAAC;AAAA,EAC3D;AAAA,EAEA,QAAc;AACZ,SAAK,QAAQ,WAAW,WAAW;AAEnC,SAAK,QAAQ,WAAW,qBAAqB;AAAA,EAC/C;AAAA,EAEA,UAAU,SAA2B;AAEnC,WAAO,KAAK,IAAI,KAAK,QAAQ,YAAY;AAAA,EAC3C;AACF;AAGO,IAAM,gBAAN,MAA4C;AAAA,EAA5C;AACL,SAAQ,MAAM,oBAAI,IAAoB;AAAA;AAAA,EACtC,QAAQ,KAAa;AApCvB;AAqCI,YAAO,UAAK,IAAI,IAAI,GAAG,MAAhB,YAAqB;AAAA,EAC9B;AAAA,EACA,QAAQ,KAAa,OAAe;AAClC,SAAK,IAAI,IAAI,KAAK,KAAK;AAAA,EACzB;AAAA,EACA,WAAW,KAAa;AACtB,SAAK,IAAI,OAAO,GAAG;AAAA,EACrB;AACF;AAEO,SAAS,oBAAkC;AAChD,MAAI,OAAO,iBAAiB,YAAa,QAAO;AAChD,SAAO,IAAI,cAAc;AAC3B;;;AC/BA,IAAM,mBAAmB;AAElB,IAAM,cAAN,MAAkB;AAAA,EAWvB,YAA6B,QAA2B;AAA3B;AAhC/B;AAiCI,SAAK,WAAU,YAAO,YAAP,YAAkB;AACjC,SAAK,QAAQ,IAAI,YAAW,YAAO,YAAP,YAAkB,kBAAkB,CAAC;AACjE,SAAK,iBAAgB,YAAO,WAAP,YAAiB,CAAC,SAAS;AAChD,SAAK,UAAU,IAAI,WAAW,IAAI;AAClC,SAAK,KAAK,IAAI,MAAM,IAAI;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,MAAM,MAAM,QAAsC;AAChD,UAAM,MAAM,MAAM,KAAK,kBAAkB,0BAAU,KAAK,aAAa;AACrE,WAAO,SAAS,OAAO;AAAA,EACzB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAM,kBACJ,SAAuB,KAAK,eACX;AACjB,UAAM,WAAW,qBAAqB;AACtC,UAAM,YAAY,MAAM,sBAAsB,QAAQ;AACtD,qBAAiB,QAAQ;AAGzB,UAAM,QAAQ,OAAO,WAAW;AAChC,QAAI,OAAO,mBAAmB,aAAa;AACzC,qBAAe,QAAQ,qBAAqB,KAAK;AAAA,IACnD;AAEA,UAAM,MAAM,IAAI,IAAI,wBAAwB,KAAK,OAAO;AACxD,QAAI,aAAa,IAAI,aAAa,KAAK,OAAO,QAAQ;AACtD,QAAI,aAAa,IAAI,gBAAgB,KAAK,OAAO,WAAW;AAC5D,QAAI,aAAa,IAAI,iBAAiB,MAAM;AAC5C,QAAI,aAAa,IAAI,SAAS,OAAO,KAAK,GAAG,CAAC;AAC9C,QAAI,aAAa,IAAI,SAAS,KAAK;AACnC,QAAI,aAAa,IAAI,kBAAkB,SAAS;AAChD,QAAI,aAAa,IAAI,yBAAyB,MAAM;AAEpD,WAAO,IAAI,SAAS;AAAA,EACtB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAiBA,MAAM,eAAe,KAAgC;AApGvD;AAqGI,UAAM,OACJ,oBAAQ,OAAO,WAAW,cAAc,OAAO,SAAS,OAAO;AACjE,UAAM,SAAS,IAAI,IAAI,IAAI,EAAE;AAC7B,UAAM,OAAO,OAAO,IAAI,MAAM;AAC9B,UAAM,QAAQ,OAAO,IAAI,OAAO;AAEhC,QAAI,OAAO;AACT,YAAM,IAAI,OAAM,YAAO,IAAI,mBAAmB,MAA9B,YAAmC,KAAK;AAAA,IAC1D;AAEA,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,MAAM,oCAAoC;AAAA,IACtD;AAGA,UAAM,gBAAgB,OAAO,IAAI,OAAO;AACxC,QAAI,OAAO,mBAAmB,aAAa;AACzC,YAAM,gBAAgB,eAAe,QAAQ,mBAAmB;AAChE,qBAAe,WAAW,mBAAmB;AAC7C,UAAI,CAAC,iBAAiB,kBAAkB,eAAe;AACrD,cAAM,IAAI,MAAM,qDAAgD;AAAA,MAClE;AAAA,IACF;AAEA,UAAM,WAAW,oBAAoB;AAErC,UAAM,OAAO,IAAI,gBAAgB;AAAA,MAC/B,YAAY;AAAA,MACZ;AAAA,MACA,cAAc,KAAK,OAAO;AAAA,MAC1B,WAAW,KAAK,OAAO;AAAA,IACzB,CAAC;AAED,QAAI,SAAU,MAAK,IAAI,iBAAiB,QAAQ;AAEhD,UAAM,SAAS,MAAM,KAAK,YAAY,IAAI;AAC1C,UAAM,UAAU,KAAK,gBAAgB,MAAM;AAC3C,SAAK,MAAM,IAAI,OAAO;AACtB,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAM,aAAsC;AAC1C,UAAM,UAAU,KAAK,MAAM,IAAI;AAC/B,QAAI,CAAC,QAAS,QAAO;AAErB,QAAI,KAAK,MAAM,UAAU,OAAO,GAAG;AACjC,UAAI;AACF,eAAO,MAAM,KAAK,QAAQ,QAAQ,YAAY;AAAA,MAChD,SAAQ;AACN,aAAK,MAAM,MAAM;AACjB,eAAO;AAAA,MACT;AAAA,IACF;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,kBAAoC;AACxC,WAAQ,MAAM,KAAK,WAAW,MAAO;AAAA,EACvC;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAM,UAA6B;AACjC,UAAM,QAAQ,MAAM,KAAK,mBAAmB;AAC5C,UAAM,MAAM,MAAM,MAAM,GAAG,KAAK,OAAO,uBAAuB;AAAA,MAC5D,SAAS,EAAE,eAAe,UAAU,KAAK,GAAG;AAAA,IAC9C,CAAC;AACD,QAAI,CAAC,IAAI,GAAI,OAAM,IAAI,MAAM,2BAA2B;AACxD,WAAO,IAAI,KAAK;AAAA,EAClB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,SAAe;AACb,SAAK,MAAM,MAAM;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA,EAMA,MAAM,qBAAsC;AAC1C,UAAM,UAAU,MAAM,KAAK,WAAW;AACtC,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,mDAA8C;AAChE,WAAO,QAAQ;AAAA,EACjB;AAAA,EAEA,MAAc,QAAQ,cAAwC;AAC5D,UAAM,OAAO,IAAI,gBAAgB;AAAA,MAC/B,YAAY;AAAA,MACZ,eAAe;AAAA,MACf,WAAW,KAAK,OAAO;AAAA,IACzB,CAAC;AACD,UAAM,SAAS,MAAM,KAAK,YAAY,IAAI;AAC1C,UAAM,UAAU,KAAK,gBAAgB,MAAM;AAC3C,SAAK,MAAM,IAAI,OAAO;AACtB,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,YAAY,MAA+C;AAtN3E;AAuNI,UAAM,MAAM,MAAM,MAAM,GAAG,KAAK,OAAO,oBAAoB;AAAA,MACzD,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oCAAoC;AAAA,MAC/D,MAAM,KAAK,SAAS;AAAA,IACtB,CAAC;AACD,QAAI,CAAC,IAAI,IAAI;AACX,YAAM,MAAO,MAAM,IAChB,KAAK,EACL,MAAM,OAAO,EAAE,OAAO,gBAAgB,EAAE;AAI3C,YAAM,IAAI,OAAM,SAAI,sBAAJ,YAAyB,IAAI,KAAK;AAAA,IACpD;AACA,WAAO,IAAI,KAAK;AAAA,EAClB;AAAA,EAEQ,gBAAgB,QAAgC;AACtD,WAAO;AAAA,MACL,aAAa,OAAO;AAAA,MACpB,cAAc,OAAO;AAAA,MACrB,WAAW,KAAK,IAAI,IAAI,OAAO,aAAa;AAAA,MAC5C,OAAO,OAAO;AAAA,IAChB;AAAA,EACF;AACF;AAMA,IAAM,aAAN,MAAiB;AAAA,EACf,YAA6B,QAAqB;AAArB;AAAA,EAAsB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUnD,MAAM,aAAuC;AAC3C,UAAM,QAAQ,MAAM,KAAK,OAAO,mBAAmB;AACnD,UAAM,MAAM,MAAM,MAAM,GAAG,KAAK,OAAO,OAAO,4BAA4B;AAAA,MACxE,SAAS,EAAE,eAAe,UAAU,KAAK,GAAG;AAAA,IAC9C,CAAC;AACD,QAAI,CAAC,IAAI,GAAI,OAAM,IAAI,MAAM,gCAAgC;AAC7D,WAAO,IAAI,KAAK;AAAA,EAClB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAYA,MAAM,MACJ,QACA,aAC+B;AAC/B,UAAM,QAAQ,MAAM,KAAK,OAAO,mBAAmB;AACnD,UAAM,MAAM,MAAM,MAAM,GAAG,KAAK,OAAO,OAAO,0BAA0B;AAAA,MACtE,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,eAAe,UAAU,KAAK;AAAA,QAC9B,gBAAgB;AAAA,MAClB;AAAA,MACA,MAAM,KAAK,UAAU,EAAE,QAAQ,YAAY,CAAC;AAAA,IAC9C,CAAC;AACD,QAAI,CAAC,IAAI,IAAI;AACX,YAAM,MAAO,MAAM,IAAI,KAAK,EAAE,MAAM,OAAO,EAAE,OAAO,UAAU,EAAE;AAGhE,YAAM,IAAI,MAAM,IAAI,KAAK;AAAA,IAC3B;AACA,WAAO,IAAI,KAAK;AAAA,EAClB;AACF;AAMA,IAAM,QAAN,MAAY;AAAA,EACV,YAA6B,QAAqB;AAArB;AAAA,EAAsB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAenD,MAAM,KAAK,SAAyD;AA/TtE;AAgUI,UAAM,QAAQ,MAAM,KAAK,OAAO,mBAAmB;AACnD,UAAM,SAAsB,MAAM,QAAQ,OAAO,IAC7C,EAAE,UAAU,QAAQ,IACpB;AAEJ,WAAO,MAAM,GAAG,KAAK,OAAO,OAAO,qBAAqB;AAAA,MACtD,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,eAAe,UAAU,KAAK;AAAA,QAC9B,gBAAgB;AAAA,MAClB;AAAA,MACA,MAAM,KAAK,UAAU;AAAA,QACnB,UAAU,OAAO;AAAA,QACjB,QAAO,YAAO,UAAP,YAAgB;AAAA,MACzB,CAAC;AAAA,IACH,CAAC;AAAA,EACH;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAYA,MAAM,SAAS,SAAuD;AA5VxE;AA6VI,UAAM,MAAM,MAAM,KAAK,KAAK,OAAO;AACnC,QAAI,CAAC,IAAI,IAAI;AACX,YAAM,MAAO,MAAM,IAChB,KAAK,EACL,MAAM,OAAO,EAAE,OAAO,iBAAiB,EAAE;AAC5C,YAAM,IAAI,MAAM,IAAI,KAAK;AAAA,IAC3B;AAEA,UAAM,UAAS,SAAI,SAAJ,mBAAU;AACzB,QAAI,CAAC,OAAQ,QAAO;AAEpB,UAAM,UAAU,IAAI,YAAY;AAChC,QAAI,WAAW;AAEf,WAAO,MAAM;AACX,YAAM,EAAE,MAAM,MAAM,IAAI,MAAM,OAAO,KAAK;AAC1C,UAAI,KAAM;AAEV,YAAM,QAAQ,QAAQ,OAAO,OAAO,EAAE,QAAQ,KAAK,CAAC;AAEpD,iBAAW,QAAQ,MAAM,MAAM,IAAI,GAAG;AACpC,YAAI,CAAC,KAAK,WAAW,QAAQ,EAAG;AAChC,cAAM,OAAO,KAAK,MAAM,CAAC,EAAE,KAAK;AAChC,YAAI,SAAS,SAAU;AACvB,YAAI;AACF,gBAAM,SAAS,KAAK,MAAM,IAAI;AAK9B,gBAAM,QAAO,0CAAO,eAAP,mBAAoB,OAApB,mBAAwB,YAAxB,mBAAiC,UAAjC,mBAAyC,OAAzC,mBAA6C,SAA7C,YAAqD;AAClE,sBAAY;AAAA,QACd,SAAQ;AAAA,QAER;AAAA,MACF;AAAA,IACF;AAEA,WAAO;AAAA,EACT;AACF;;;AH5WO,SAAS,eAAe;AAAA,EAC7B;AAAA,EACA;AAAA,EACA,SAAS,CAAC,SAAS;AAAA,EACnB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,GAAwB;AACtB,QAAM,CAAC,WAAW,YAAY,QAAI,uBAAS,KAAK;AAEhD,iBAAe,cAAc;AAC3B,iBAAa,IAAI;AAEjB,QAAI;AACF,YAAM,SAAS,IAAI,YAAY,EAAE,UAAU,aAAa,QAAQ,CAAC;AACjE,YAAM,OAAO,MAAM,MAAM;AAAA,IAC3B,SAAS,KAAK;AACZ,mBAAa,KAAK;AAClB,yCAAU,eAAe,QAAQ,MAAM,IAAI,MAAM,sBAAsB;AAAA,IACzE;AAAA,EACF;AAEA,SACE;AAAA,IAAC;AAAA;AAAA,MACC,MAAM;AAAA,MACN,SAAS;AAAA,MACT,UAAU;AAAA,MACV,WAAW,gCAAa;AAAA,MACxB,cAAY;AAAA;AAAA,IAEX,YACG,sBACC,8BACC,0DACE,oCAAC,eAAU,GAAE,kBAEf;AAAA,EAER;AAEJ;AAEA,SAAS,YAAY;AACnB,SACE;AAAA,IAAC;AAAA;AAAA,MACC,OAAO;AAAA,MACP,QAAQ;AAAA,MACR,SAAS;AAAA,MACT,MAAM;AAAA,MACN,eAAa;AAAA;AAAA,IAEb;AAAA,MAAC;AAAA;AAAA,QACC,GACE;AAAA;AAAA,IAEJ;AAAA,EACF;AAEJ;;;AIpFA,IAAAA,gBAMO;AAiBP,IAAM,mBAAe,6BAAqC,IAAI;AAevD,SAAS,cAAc,IAA6C;AAA7C,eAAE,WAtChC,IAsC8B,IAAe,mBAAf,IAAe,CAAb;AAC9B,QAAM,CAAC,MAAM,QAAI,wBAAS,MAAM,IAAI,YAAY,MAAM,CAAC;AACvD,QAAM,CAAC,MAAM,OAAO,QAAI,wBAA0B,IAAI;AACtD,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,IAAI;AAG/C,+BAAU,MAAM;AACd,QAAI,YAAY;AAEhB,mBAAe,UAAU;AACvB,UAAI;AACF,cAAM,UAAU,MAAM,OAAO,WAAW;AACxC,YAAI,CAAC,WAAW,WAAW;AACzB,uBAAa,KAAK;AAClB;AAAA,QACF;AACA,cAAM,WAAW,MAAM,OAAO,QAAQ;AACtC,YAAI,CAAC,UAAW,SAAQ,QAAQ;AAAA,MAClC,SAAQ;AAAA,MAER,UAAE;AACA,YAAI,CAAC,UAAW,cAAa,KAAK;AAAA,MACpC;AAAA,IACF;AAEA,SAAK,QAAQ;AACb,WAAO,MAAM;AACX,kBAAY;AAAA,IACd;AAAA,EACF,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,YAAQ;AAAA,IACZ,CAAC,WAA0B,OAAO,MAAM,MAAM;AAAA,IAC9C,CAAC,MAAM;AAAA,EACT;AAEA,QAAM,aAAS,2BAAY,MAAM;AAC/B,WAAO,OAAO;AACd,YAAQ,IAAI;AAAA,EACd,GAAG,CAAC,MAAM,CAAC;AAEX,SACE;AAAA,IAAC,aAAa;AAAA,IAAb;AAAA,MACC,OAAO;AAAA,QACL;AAAA,QACA;AAAA,QACA,iBAAiB,CAAC,CAAC;AAAA,QACnB;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA;AAAA,IAEC;AAAA,EACH;AAEJ;AASO,SAAS,eAA+B;AAC7C,QAAM,UAAM,0BAAW,YAAY;AACnC,MAAI,CAAC,KAAK;AACR,UAAM,IAAI,MAAM,kDAAkD;AAAA,EACpE;AACA,SAAO;AACT;","names":["import_react"]}