create-pulsekit 0.1.0 → 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2025 Benoit Ortalo-Magne
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
package/README.md CHANGED
@@ -1,10 +1,10 @@
1
1
  <p align="center">
2
- <img src="https://raw.githubusercontent.com/benoiteom/pulse-analytics/main/assets/logo.svg" alt="PulseKit" width="200" />
2
+ <img src="https://raw.githubusercontent.com/benoiteom/pulsekit/main/assets/logo.svg" alt="PulseKit" width="200" />
3
3
  </p>
4
4
 
5
5
  # create-pulsekit
6
6
 
7
- CLI scaffolding tool for setting up [PulseKit](https://github.com/benoiteom/pulse-analytics) analytics in a Next.js project.
7
+ CLI scaffolding tool for setting up [PulseKit](https://github.com/benoiteom/pulsekit) analytics in a Next.js project.
8
8
 
9
9
  ## Usage
10
10
 
package/dist/index.js CHANGED
@@ -115,12 +115,12 @@ const supabase = createClient(
115
115
  export const POST = createPulseHandler({
116
116
  supabase,
117
117
  config: {
118
- allowLocalhost: true,
119
118
  siteId: "default",
119
+ secret: process.env.PULSE_SECRET,
120
120
  },
121
121
  });
122
122
  `;
123
- const refreshRoute = `import { createRefreshHandler } from "@pulsekit/next";
123
+ const refreshRoute = `import { createRefreshHandler, withPulseAuth } from "@pulsekit/next";
124
124
  import { createClient } from "@supabase/supabase-js";
125
125
 
126
126
  const supabase = createClient(
@@ -128,9 +128,9 @@ const supabase = createClient(
128
128
  process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!
129
129
  );
130
130
 
131
- export const POST = createRefreshHandler({ supabase });
131
+ export const POST = withPulseAuth(createRefreshHandler({ supabase }));
132
132
  `;
133
- const consolidateRoute = `import { createConsolidateHandler } from "@pulsekit/next";
133
+ const consolidateRoute = `import { createConsolidateHandler, withPulseAuth } from "@pulsekit/next";
134
134
  import { createClient } from "@supabase/supabase-js";
135
135
 
136
136
  const supabase = createClient(
@@ -138,11 +138,18 @@ const supabase = createClient(
138
138
  process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!
139
139
  );
140
140
 
141
- export const POST = createConsolidateHandler({ supabase });
141
+ export const POST = withPulseAuth(createConsolidateHandler({ supabase }));
142
+ `;
143
+ const authRoute = `import { createPulseAuthHandler } from "@pulsekit/next";
144
+
145
+ const handler = createPulseAuthHandler({ secret: process.env.PULSE_SECRET! });
146
+
147
+ export const POST = handler;
148
+ export const DELETE = handler;
142
149
  `;
143
150
  const dashboardPage = `import { Suspense } from "react";
144
151
  import { createClient } from "@supabase/supabase-js";
145
- import { PulseDashboard } from "@pulsekit/react";
152
+ import { PulseDashboard, PulseAuthGate } from "@pulsekit/react";
146
153
  import { getPulseTimezone } from "@pulsekit/next";
147
154
  import { Spinner } from "@/components/ui/spinner";
148
155
  import "@pulsekit/react/pulse.css";
@@ -167,9 +174,11 @@ async function Dashboard() {
167
174
 
168
175
  export default function AnalyticsPage() {
169
176
  return (
170
- <Suspense fallback={<div className="flex items-center justify-center min-h-screen p-6"><Spinner className="size-6" /></div>}>
171
- <Dashboard />
172
- </Suspense>
177
+ <PulseAuthGate secret={process.env.PULSE_SECRET}>
178
+ <Suspense fallback={<div className="flex items-center justify-center min-h-screen p-6"><Spinner className="size-6" /></div>}>
179
+ <Dashboard />
180
+ </Suspense>
181
+ </PulseAuthGate>
173
182
  );
174
183
  }
175
184
  `;
@@ -201,6 +210,7 @@ export { Spinner }
201
210
  }
202
211
  const files = [
203
212
  { rel: "api/pulse/route.ts", content: pulseRoute },
213
+ { rel: "api/pulse/auth/route.ts", content: authRoute },
204
214
  { rel: "api/pulse/refresh-aggregates/route.ts", content: refreshRoute },
205
215
  { rel: "api/pulse/consolidate/route.ts", content: consolidateRoute },
206
216
  { rel: "admin/analytics/page.tsx", content: dashboardPage }
@@ -364,7 +374,7 @@ async function injectInstrumentation() {
364
374
  var import_node_fs5 = __toESM(require("fs"));
365
375
  var import_node_path5 = __toESM(require("path"));
366
376
  var SQL_MAP = JSON.parse(
367
- `{"001_init_pulse.sql":"create schema if not exists analytics;\\n\\n-- Add analytics to the schemas exposed by PostgREST\\nalter role authenticator set pgrst.db_schemas = 'public, graphql_public, analytics';\\n\\n-- Schema-level access\\ngrant usage on schema analytics to anon, authenticated, service_role;\\nalter default privileges in schema analytics grant all on tables to anon, authenticated, service_role;\\n\\ncreate table if not exists analytics.pulse_events (\\n id bigserial primary key,\\n site_id text not null,\\n session_id text,\\n path text not null,\\n event_type text not null,\\n meta jsonb,\\n created_at timestamptz not null default now()\\n);\\n\\ncreate index if not exists idx_pulse_events_site_created_at\\n on analytics.pulse_events (site_id, created_at);\\n\\ncreate index if not exists idx_pulse_events_site_path_created_at\\n on analytics.pulse_events (site_id, path, created_at);\\n\\nalter table analytics.pulse_events enable row level security; \\n \\n-- Allow the anon key (API route) to insert events\\ndrop policy if exists \\"Allow anon insert on pulse_events\\" on analytics.pulse_events;\\ncreate policy \\"Allow anon insert on pulse_events\\"\\n on analytics.pulse_events\\n for insert\\n to anon\\n with check (true);\\n\\n-- Only authenticated users (dashboard) can read events\\ndrop policy if exists \\"Allow authenticated select on pulse_events\\" on analytics.pulse_events;\\ncreate policy \\"Allow authenticated select on pulse_events\\"\\n on analytics.pulse_events\\n for select\\n to authenticated\\n using (true);\\n\\ncreate table if not exists analytics.pulse_aggregates (\\n date date not null,\\n site_id text not null,\\n path text not null,\\n total_views integer not null default 0,\\n unique_visitors integer not null default 0,\\n primary key (date, site_id, path)\\n);\\n\\n-- Grant table-level access (must be after table creation)\\ngrant all on all tables in schema analytics to anon, authenticated, service_role;\\ngrant all on all sequences in schema analytics to anon, authenticated, service_role;\\n\\nalter table analytics.pulse_aggregates enable row level security;\\n\\n-- Allow reading aggregates (dashboard)\\ndrop policy if exists \\"Allow authenticated select on pulse_aggregates\\" on analytics.pulse_aggregates;\\ncreate policy \\"Allow authenticated select on pulse_aggregates\\"\\n on analytics.pulse_aggregates\\n for select\\n to authenticated\\n using (true);\\n\\ndrop policy if exists \\"Allow anon select on pulse_aggregates\\" on analytics.pulse_aggregates;\\ncreate policy \\"Allow anon select on pulse_aggregates\\"\\n on analytics.pulse_aggregates\\n for select\\n to anon\\n using (true);\\n\\n-- Reload PostgREST config and schema cache (must be last)\\nnotify pgrst, 'reload config';\\nnotify pgrst, 'reload schema';\\n","002_aggregation_function.sql":"-- Aggregation function: rolls up raw events into daily aggregates\\ncreate or replace function analytics.pulse_refresh_aggregates(days_back integer default 7)\\nreturns void\\nlanguage sql\\nsecurity definer\\nas $$\\n insert into analytics.pulse_aggregates (date, site_id, path, total_views, unique_visitors)\\n select\\n date_trunc('day', created_at)::date as date,\\n site_id,\\n path,\\n count(*) as total_views,\\n count(distinct session_id) as unique_visitors\\n from analytics.pulse_events\\n where created_at >= now() - (days_back || ' days')::interval\\n group by 1, 2, 3\\n on conflict (date, site_id, path) do update\\n set\\n total_views = excluded.total_views,\\n unique_visitors = excluded.unique_visitors;\\n$$;\\n\\n-- Allow all roles to execute the aggregation function\\n-- security definer ensures it runs with the owner's privileges regardless of caller\\ngrant execute on function analytics.pulse_refresh_aggregates(integer) to anon, authenticated, service_role;\\n","003_geo_and_timezone.sql":"-- Add geo columns to pulse_events\\nalter table analytics.pulse_events\\n add column if not exists country text,\\n add column if not exists region text,\\n add column if not exists city text,\\n add column if not exists timezone text,\\n add column if not exists latitude double precision,\\n add column if not exists longitude double precision;\\n\\n-- Timezone-aware stats: queries raw events with AT TIME ZONE\\n-- so the dashboard can display data bucketed by the viewer's local day.\\ncreate or replace function analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text default 'UTC',\\n p_days_back integer default 7\\n)\\nreturns table (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nlanguage sql\\nsecurity definer\\nstable\\nas $$\\n select\\n date_trunc('day', created_at at time zone p_timezone)::date as date,\\n path,\\n count(*) as total_views,\\n count(distinct session_id) as unique_visitors\\n from analytics.pulse_events\\n where site_id = p_site_id\\n and created_at >= now() - make_interval(days => p_days_back + 1)\\n group by 1, 2;\\n$$;\\n\\ngrant execute on function analytics.pulse_stats_by_timezone(text, text, integer)\\n to anon, authenticated, service_role;\\n\\n-- Drop first so return type can change (CREATE OR REPLACE cannot alter return columns)\\ndrop function if exists analytics.pulse_location_stats(text, integer);\\n\\n-- Location stats: visitor counts grouped by country + city, with averaged coordinates\\ncreate or replace function analytics.pulse_location_stats(\\n p_site_id text,\\n p_days_back integer default 7\\n)\\nreturns table (\\n country text,\\n city text,\\n latitude double precision,\\n longitude double precision,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nlanguage sql\\nsecurity definer\\nstable\\nas $$\\n select\\n country,\\n city,\\n avg(latitude) as latitude,\\n avg(longitude) as longitude,\\n count(*) as total_views,\\n count(distinct session_id) as unique_visitors\\n from analytics.pulse_events\\n where site_id = p_site_id\\n and created_at >= now() - make_interval(days => p_days_back)\\n and country is not null\\n group by 1, 2\\n order by total_views desc;\\n$$;\\n\\ngrant execute on function analytics.pulse_location_stats(text, integer)\\n to anon, authenticated, service_role;\\n","004_web_vitals.sql":"-- 004_web_vitals.sql\\n-- Partial index + RPC for Web Vitals p75 aggregation\\n\\n-- Partial index: only covers vitals events, stays small\\nCREATE INDEX IF NOT EXISTS idx_pulse_events_vitals\\n ON analytics.pulse_events (site_id, created_at)\\n WHERE event_type = 'vitals';\\n\\n-- RPC: returns per-metric p75 for each page + site-wide (__overall__)\\nCREATE OR REPLACE FUNCTION analytics.pulse_vitals_stats(\\n p_site_id TEXT,\\n p_days_back INT DEFAULT 7\\n)\\nRETURNS TABLE (\\n path TEXT,\\n metric TEXT,\\n p75 DOUBLE PRECISION,\\n sample_count BIGINT\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH vitals_raw AS (\\n SELECT\\n e.path,\\n kv.key AS metric,\\n kv.value::double precision AS val\\n FROM analytics.pulse_events e,\\n LATERAL jsonb_each_text(e.meta) AS kv(key, value)\\n WHERE e.site_id = p_site_id\\n AND e.event_type = 'vitals'\\n AND e.created_at >= NOW() - (p_days_back || ' days')::interval\\n AND kv.key IN ('lcp', 'inp', 'cls', 'fcp', 'ttfb')\\n )\\n -- Per-page stats\\n SELECT\\n vr.path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.path, vr.metric\\n\\n UNION ALL\\n\\n -- Site-wide stats\\n SELECT\\n '__overall__'::text AS path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.metric;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_vitals_stats(TEXT, INT)\\n TO anon, authenticated, service_role;\\n","005_error_tracking.sql":"-- 005_error_tracking.sql\\n-- Fix existing RPCs to filter by event_type = 'pageview', add error tracking\\n\\n-- \u2500\u2500 Fix pulse_refresh_aggregates: only aggregate pageview events \u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_refresh_aggregates(days_back integer default 7)\\nRETURNS void\\nLANGUAGE sql\\nSECURITY DEFINER\\nAS $$\\n INSERT INTO analytics.pulse_aggregates (date, site_id, path, total_views, unique_visitors)\\n SELECT\\n date_trunc('day', created_at)::date AS date,\\n site_id,\\n path,\\n count(*) AS total_views,\\n count(distinct session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE created_at >= now() - (days_back || ' days')::interval\\n AND event_type = 'pageview'\\n GROUP BY 1, 2, 3\\n ON CONFLICT (date, site_id, path) DO UPDATE\\n SET\\n total_views = excluded.total_views,\\n unique_visitors = excluded.unique_visitors;\\n$$;\\n\\n-- \u2500\u2500 Fix pulse_stats_by_timezone: only count pageview events \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text default 'UTC',\\n p_days_back integer default 7\\n)\\nRETURNS TABLE (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n date_trunc('day', created_at AT TIME ZONE p_timezone)::date AS date,\\n path,\\n count(*) AS total_views,\\n count(distinct session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND created_at >= now() - make_interval(days => p_days_back + 1)\\n AND event_type = 'pageview'\\n GROUP BY 1, 2;\\n$$;\\n\\n-- \u2500\u2500 Fix pulse_location_stats: only count pageview events \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_location_stats(\\n p_site_id text,\\n p_days_back integer default 7\\n)\\nRETURNS TABLE (\\n country text,\\n city text,\\n latitude double precision,\\n longitude double precision,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n country,\\n city,\\n avg(latitude) AS latitude,\\n avg(longitude) AS longitude,\\n count(*) AS total_views,\\n count(distinct session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND created_at >= now() - make_interval(days => p_days_back)\\n AND country IS NOT NULL\\n AND event_type = 'pageview'\\n GROUP BY 1, 2\\n ORDER BY total_views DESC;\\n$$;\\n\\n-- \u2500\u2500 Partial index for error events \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE INDEX IF NOT EXISTS idx_pulse_events_errors\\n ON analytics.pulse_events (site_id, created_at)\\n WHERE event_type IN ('error', 'server_error');\\n\\n-- \u2500\u2500 Error stats RPC \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_error_stats(\\n p_site_id TEXT,\\n p_days_back INT DEFAULT 7\\n)\\nRETURNS TABLE (\\n error_type TEXT,\\n message TEXT,\\n path TEXT,\\n total_count BIGINT,\\n session_count BIGINT,\\n last_seen TIMESTAMPTZ,\\n first_seen TIMESTAMPTZ,\\n sample_meta JSONB\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH ranked AS (\\n SELECT\\n e.event_type AS error_type,\\n e.meta->>'message' AS message,\\n e.path,\\n count(*) AS total_count,\\n count(DISTINCT e.session_id) AS session_count,\\n max(e.created_at) AS last_seen,\\n min(e.created_at) AS first_seen,\\n -- Get the full meta from the most recent occurrence\\n (ARRAY_AGG(e.meta ORDER BY e.created_at DESC))[1] AS sample_meta\\n FROM analytics.pulse_events e\\n WHERE e.site_id = p_site_id\\n AND e.event_type IN ('error', 'server_error')\\n AND e.created_at >= NOW() - (p_days_back || ' days')::interval\\n GROUP BY e.event_type, e.meta->>'message', e.path\\n )\\n SELECT * FROM ranked\\n ORDER BY last_seen DESC\\n LIMIT 50;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_error_stats(TEXT, INT)\\n TO anon, authenticated, service_role;\\n","006_date_range_support.sql":"-- 006_date_range_support.sql\\n-- Replace p_days_back with p_start_date / p_end_date date range params.\\n-- Both default to NULL \u2192 falls back to last 7 days when not provided.\\n\\n-- \u2500\u2500 pulse_stats_by_timezone \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_stats_by_timezone(text, text, integer);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text DEFAULT 'UTC',\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n date_trunc('day', created_at AT TIME ZONE p_timezone)::date AS date,\\n path,\\n count(*) AS total_views,\\n count(DISTINCT session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n AND created_at >= (COALESCE(p_start_date, current_date - 7)::timestamp AT TIME ZONE p_timezone)\\n AND created_at < ((COALESCE(p_end_date, current_date) + interval '1 day')::timestamp AT TIME ZONE p_timezone)\\n GROUP BY 1, 2;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_stats_by_timezone(text, text, date, date)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 pulse_location_stats \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_location_stats(text, integer);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_location_stats(\\n p_site_id text,\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n country text,\\n city text,\\n latitude double precision,\\n longitude double precision,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n country,\\n city,\\n avg(latitude) AS latitude,\\n avg(longitude) AS longitude,\\n count(*) AS total_views,\\n count(DISTINCT session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n AND country IS NOT NULL\\n AND created_at >= COALESCE(p_start_date, current_date - 7)::timestamptz\\n AND created_at < (COALESCE(p_end_date, current_date) + interval '1 day')::timestamptz\\n GROUP BY 1, 2\\n ORDER BY total_views DESC;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_location_stats(text, date, date)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 pulse_vitals_stats \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_vitals_stats(text, int);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_vitals_stats(\\n p_site_id text,\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n path text,\\n metric text,\\n p75 double precision,\\n sample_count bigint\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH vitals_raw AS (\\n SELECT\\n e.path,\\n kv.key AS metric,\\n kv.value::double precision AS val\\n FROM analytics.pulse_events e,\\n LATERAL jsonb_each_text(e.meta) AS kv(key, value)\\n WHERE e.site_id = p_site_id\\n AND e.event_type = 'vitals'\\n AND e.created_at >= COALESCE(p_start_date, current_date - 7)::timestamptz\\n AND e.created_at < (COALESCE(p_end_date, current_date) + interval '1 day')::timestamptz\\n AND kv.key IN ('lcp', 'inp', 'cls', 'fcp', 'ttfb')\\n )\\n -- Per-page stats\\n SELECT\\n vr.path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.path, vr.metric\\n\\n UNION ALL\\n\\n -- Site-wide stats\\n SELECT\\n '__overall__'::text AS path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.metric;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_vitals_stats(text, date, date)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 pulse_error_stats \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_error_stats(text, int);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_error_stats(\\n p_site_id text,\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n error_type text,\\n message text,\\n path text,\\n total_count bigint,\\n session_count bigint,\\n last_seen timestamptz,\\n first_seen timestamptz,\\n sample_meta jsonb\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH ranked AS (\\n SELECT\\n e.event_type AS error_type,\\n e.meta->>'message' AS message,\\n e.path,\\n count(*) AS total_count,\\n count(DISTINCT e.session_id) AS session_count,\\n max(e.created_at) AS last_seen,\\n min(e.created_at) AS first_seen,\\n (ARRAY_AGG(e.meta ORDER BY e.created_at DESC))[1] AS sample_meta\\n FROM analytics.pulse_events e\\n WHERE e.site_id = p_site_id\\n AND e.event_type IN ('error', 'server_error')\\n AND e.created_at >= COALESCE(p_start_date, current_date - 7)::timestamptz\\n AND e.created_at < (COALESCE(p_end_date, current_date) + interval '1 day')::timestamptz\\n GROUP BY e.event_type, e.meta->>'message', e.path\\n )\\n SELECT * FROM ranked\\n ORDER BY last_seen DESC\\n LIMIT 50;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_error_stats(text, date, date)\\n TO anon, authenticated, service_role;\\n","007_data_lifecycle.sql":"-- 007_data_lifecycle.sql\\n-- Automatic data consolidation & cleanup.\\n-- Rolls pageview counts older than retention_days into pulse_aggregates,\\n-- then deletes all old raw events (all event types).\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_consolidate_and_cleanup(\\n retention_days int DEFAULT 30\\n)\\nRETURNS TABLE (rows_consolidated bigint, rows_deleted bigint)\\nLANGUAGE plpgsql\\nSECURITY DEFINER\\nAS $$\\nDECLARE\\n v_cutoff timestamptz;\\n v_consolidated bigint;\\n v_deleted bigint;\\nBEGIN\\n v_cutoff := now() - make_interval(days => retention_days);\\n\\n -- Step 1: Roll up old pageview events into daily aggregates\\n WITH inserted AS (\\n INSERT INTO analytics.pulse_aggregates (date, site_id, path, total_views, unique_visitors)\\n SELECT\\n date_trunc('day', created_at)::date AS date,\\n site_id,\\n path,\\n count(*)::int AS total_views,\\n count(DISTINCT session_id)::int AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE created_at < v_cutoff\\n AND event_type = 'pageview'\\n GROUP BY 1, 2, 3\\n ON CONFLICT (date, site_id, path) DO UPDATE SET\\n total_views = GREATEST(analytics.pulse_aggregates.total_views, excluded.total_views),\\n unique_visitors = GREATEST(analytics.pulse_aggregates.unique_visitors, excluded.unique_visitors)\\n RETURNING 1\\n )\\n SELECT count(*) INTO v_consolidated FROM inserted;\\n\\n -- Step 2: Delete all old events (pageviews, vitals, errors, etc.)\\n WITH deleted AS (\\n DELETE FROM analytics.pulse_events\\n WHERE created_at < v_cutoff\\n RETURNING 1\\n )\\n SELECT count(*) INTO v_deleted FROM deleted;\\n\\n RETURN QUERY SELECT v_consolidated, v_deleted;\\nEND;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_consolidate_and_cleanup(int)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 Replace pulse_stats_by_timezone to union raw events + aggregates \u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_stats_by_timezone(text, text, date, date);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text DEFAULT 'UTC',\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n WITH\\n -- Find the earliest raw pageview date for this site\\n oldest_raw AS (\\n SELECT min(date_trunc('day', created_at AT TIME ZONE p_timezone)::date) AS min_date\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n ),\\n -- Aggregated data for dates before the oldest raw event\\n from_aggregates AS (\\n SELECT\\n a.date,\\n a.path,\\n a.total_views::bigint,\\n a.unique_visitors::bigint\\n FROM analytics.pulse_aggregates a, oldest_raw o\\n WHERE a.site_id = p_site_id\\n AND a.date >= COALESCE(p_start_date, current_date - 7)\\n AND a.date < COALESCE(p_end_date, current_date) + 1\\n AND (o.min_date IS NULL OR a.date < o.min_date)\\n ),\\n -- Raw events for recent data\\n from_raw AS (\\n SELECT\\n date_trunc('day', created_at AT TIME ZONE p_timezone)::date AS date,\\n path,\\n count(*) AS total_views,\\n count(DISTINCT session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n AND created_at >= (COALESCE(p_start_date, current_date - 7)::timestamp AT TIME ZONE p_timezone)\\n AND created_at < ((COALESCE(p_end_date, current_date) + interval '1 day')::timestamp AT TIME ZONE p_timezone)\\n GROUP BY 1, 2\\n )\\n SELECT * FROM from_aggregates\\n UNION ALL\\n SELECT * FROM from_raw;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_stats_by_timezone(text, text, date, date)\\n TO anon, authenticated, service_role;\\n"}`
377
+ `{"001_init_pulse.sql":"create schema if not exists analytics;\\n\\n-- Add analytics to the schemas exposed by PostgREST\\nalter role authenticator set pgrst.db_schemas = 'public, graphql_public, analytics';\\n\\n-- Schema-level access\\ngrant usage on schema analytics to anon, authenticated, service_role;\\nalter default privileges in schema analytics grant all on tables to anon, authenticated, service_role;\\n\\ncreate table if not exists analytics.pulse_events (\\n id bigserial primary key,\\n site_id text not null,\\n session_id text,\\n path text not null,\\n event_type text not null,\\n meta jsonb,\\n created_at timestamptz not null default now()\\n);\\n\\ncreate index if not exists idx_pulse_events_site_created_at\\n on analytics.pulse_events (site_id, created_at);\\n\\ncreate index if not exists idx_pulse_events_site_path_created_at\\n on analytics.pulse_events (site_id, path, created_at);\\n\\nalter table analytics.pulse_events enable row level security; \\n \\n-- Allow the anon key (API route) to insert events\\ndrop policy if exists \\"Allow anon insert on pulse_events\\" on analytics.pulse_events;\\ncreate policy \\"Allow anon insert on pulse_events\\"\\n on analytics.pulse_events\\n for insert\\n to anon\\n with check (true);\\n\\n-- Only authenticated users (dashboard) can read events\\ndrop policy if exists \\"Allow authenticated select on pulse_events\\" on analytics.pulse_events;\\ncreate policy \\"Allow authenticated select on pulse_events\\"\\n on analytics.pulse_events\\n for select\\n to authenticated\\n using (true);\\n\\ncreate table if not exists analytics.pulse_aggregates (\\n date date not null,\\n site_id text not null,\\n path text not null,\\n total_views integer not null default 0,\\n unique_visitors integer not null default 0,\\n primary key (date, site_id, path)\\n);\\n\\n-- Grant table-level access (must be after table creation)\\ngrant all on all tables in schema analytics to anon, authenticated, service_role;\\ngrant all on all sequences in schema analytics to anon, authenticated, service_role;\\n\\nalter table analytics.pulse_aggregates enable row level security;\\n\\n-- Allow reading aggregates (dashboard)\\ndrop policy if exists \\"Allow authenticated select on pulse_aggregates\\" on analytics.pulse_aggregates;\\ncreate policy \\"Allow authenticated select on pulse_aggregates\\"\\n on analytics.pulse_aggregates\\n for select\\n to authenticated\\n using (true);\\n\\ndrop policy if exists \\"Allow anon select on pulse_aggregates\\" on analytics.pulse_aggregates;\\ncreate policy \\"Allow anon select on pulse_aggregates\\"\\n on analytics.pulse_aggregates\\n for select\\n to anon\\n using (true);\\n\\n-- Reload PostgREST config and schema cache (must be last)\\nnotify pgrst, 'reload config';\\nnotify pgrst, 'reload schema';\\n","002_aggregation_function.sql":"-- Aggregation function: rolls up raw events into daily aggregates\\ncreate or replace function analytics.pulse_refresh_aggregates(days_back integer default 7)\\nreturns void\\nlanguage sql\\nsecurity definer\\nas $$\\n insert into analytics.pulse_aggregates (date, site_id, path, total_views, unique_visitors)\\n select\\n date_trunc('day', created_at)::date as date,\\n site_id,\\n path,\\n count(*) as total_views,\\n count(distinct session_id) as unique_visitors\\n from analytics.pulse_events\\n where created_at >= now() - (days_back || ' days')::interval\\n group by 1, 2, 3\\n on conflict (date, site_id, path) do update\\n set\\n total_views = excluded.total_views,\\n unique_visitors = excluded.unique_visitors;\\n$$;\\n\\n-- Allow all roles to execute the aggregation function\\n-- security definer ensures it runs with the owner's privileges regardless of caller\\ngrant execute on function analytics.pulse_refresh_aggregates(integer) to anon, authenticated, service_role;\\n","003_geo_and_timezone.sql":"-- Add geo columns to pulse_events\\nalter table analytics.pulse_events\\n add column if not exists country text,\\n add column if not exists region text,\\n add column if not exists city text,\\n add column if not exists timezone text,\\n add column if not exists latitude double precision,\\n add column if not exists longitude double precision;\\n\\n-- Timezone-aware stats: queries raw events with AT TIME ZONE\\n-- so the dashboard can display data bucketed by the viewer's local day.\\ncreate or replace function analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text default 'UTC',\\n p_days_back integer default 7\\n)\\nreturns table (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nlanguage sql\\nsecurity definer\\nstable\\nas $$\\n select\\n date_trunc('day', created_at at time zone p_timezone)::date as date,\\n path,\\n count(*) as total_views,\\n count(distinct session_id) as unique_visitors\\n from analytics.pulse_events\\n where site_id = p_site_id\\n and created_at >= now() - make_interval(days => p_days_back + 1)\\n group by 1, 2;\\n$$;\\n\\ngrant execute on function analytics.pulse_stats_by_timezone(text, text, integer)\\n to anon, authenticated, service_role;\\n\\n-- Drop first so return type can change (CREATE OR REPLACE cannot alter return columns)\\ndrop function if exists analytics.pulse_location_stats(text, integer);\\n\\n-- Location stats: visitor counts grouped by country + city, with averaged coordinates\\ncreate or replace function analytics.pulse_location_stats(\\n p_site_id text,\\n p_days_back integer default 7\\n)\\nreturns table (\\n country text,\\n city text,\\n latitude double precision,\\n longitude double precision,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nlanguage sql\\nsecurity definer\\nstable\\nas $$\\n select\\n country,\\n city,\\n avg(latitude) as latitude,\\n avg(longitude) as longitude,\\n count(*) as total_views,\\n count(distinct session_id) as unique_visitors\\n from analytics.pulse_events\\n where site_id = p_site_id\\n and created_at >= now() - make_interval(days => p_days_back)\\n and country is not null\\n group by 1, 2\\n order by total_views desc;\\n$$;\\n\\ngrant execute on function analytics.pulse_location_stats(text, integer)\\n to anon, authenticated, service_role;\\n","004_web_vitals.sql":"-- 004_web_vitals.sql\\n-- Partial index + RPC for Web Vitals p75 aggregation\\n\\n-- Partial index: only covers vitals events, stays small\\nCREATE INDEX IF NOT EXISTS idx_pulse_events_vitals\\n ON analytics.pulse_events (site_id, created_at)\\n WHERE event_type = 'vitals';\\n\\n-- RPC: returns per-metric p75 for each page + site-wide (__overall__)\\nCREATE OR REPLACE FUNCTION analytics.pulse_vitals_stats(\\n p_site_id TEXT,\\n p_days_back INT DEFAULT 7\\n)\\nRETURNS TABLE (\\n path TEXT,\\n metric TEXT,\\n p75 DOUBLE PRECISION,\\n sample_count BIGINT\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH vitals_raw AS (\\n SELECT\\n e.path,\\n kv.key AS metric,\\n kv.value::double precision AS val\\n FROM analytics.pulse_events e,\\n LATERAL jsonb_each_text(e.meta) AS kv(key, value)\\n WHERE e.site_id = p_site_id\\n AND e.event_type = 'vitals'\\n AND e.created_at >= NOW() - (p_days_back || ' days')::interval\\n AND kv.key IN ('lcp', 'inp', 'cls', 'fcp', 'ttfb')\\n )\\n -- Per-page stats\\n SELECT\\n vr.path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.path, vr.metric\\n\\n UNION ALL\\n\\n -- Site-wide stats\\n SELECT\\n '__overall__'::text AS path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.metric;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_vitals_stats(TEXT, INT)\\n TO anon, authenticated, service_role;\\n","005_error_tracking.sql":"-- 005_error_tracking.sql\\n-- Fix existing RPCs to filter by event_type = 'pageview', add error tracking\\n\\n-- \u2500\u2500 Fix pulse_refresh_aggregates: only aggregate pageview events \u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_refresh_aggregates(days_back integer default 7)\\nRETURNS void\\nLANGUAGE sql\\nSECURITY DEFINER\\nAS $$\\n INSERT INTO analytics.pulse_aggregates (date, site_id, path, total_views, unique_visitors)\\n SELECT\\n date_trunc('day', created_at)::date AS date,\\n site_id,\\n path,\\n count(*) AS total_views,\\n count(distinct session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE created_at >= now() - (days_back || ' days')::interval\\n AND event_type = 'pageview'\\n GROUP BY 1, 2, 3\\n ON CONFLICT (date, site_id, path) DO UPDATE\\n SET\\n total_views = excluded.total_views,\\n unique_visitors = excluded.unique_visitors;\\n$$;\\n\\n-- \u2500\u2500 Fix pulse_stats_by_timezone: only count pageview events \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text default 'UTC',\\n p_days_back integer default 7\\n)\\nRETURNS TABLE (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n date_trunc('day', created_at AT TIME ZONE p_timezone)::date AS date,\\n path,\\n count(*) AS total_views,\\n count(distinct session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND created_at >= now() - make_interval(days => p_days_back + 1)\\n AND event_type = 'pageview'\\n GROUP BY 1, 2;\\n$$;\\n\\n-- \u2500\u2500 Fix pulse_location_stats: only count pageview events \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_location_stats(\\n p_site_id text,\\n p_days_back integer default 7\\n)\\nRETURNS TABLE (\\n country text,\\n city text,\\n latitude double precision,\\n longitude double precision,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n country,\\n city,\\n avg(latitude) AS latitude,\\n avg(longitude) AS longitude,\\n count(*) AS total_views,\\n count(distinct session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND created_at >= now() - make_interval(days => p_days_back)\\n AND country IS NOT NULL\\n AND event_type = 'pageview'\\n GROUP BY 1, 2\\n ORDER BY total_views DESC;\\n$$;\\n\\n-- \u2500\u2500 Partial index for error events \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE INDEX IF NOT EXISTS idx_pulse_events_errors\\n ON analytics.pulse_events (site_id, created_at)\\n WHERE event_type IN ('error', 'server_error');\\n\\n-- \u2500\u2500 Error stats RPC \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nCREATE OR REPLACE FUNCTION analytics.pulse_error_stats(\\n p_site_id TEXT,\\n p_days_back INT DEFAULT 7\\n)\\nRETURNS TABLE (\\n error_type TEXT,\\n message TEXT,\\n path TEXT,\\n total_count BIGINT,\\n session_count BIGINT,\\n last_seen TIMESTAMPTZ,\\n first_seen TIMESTAMPTZ,\\n sample_meta JSONB\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH ranked AS (\\n SELECT\\n e.event_type AS error_type,\\n e.meta->>'message' AS message,\\n e.path,\\n count(*) AS total_count,\\n count(DISTINCT e.session_id) AS session_count,\\n max(e.created_at) AS last_seen,\\n min(e.created_at) AS first_seen,\\n -- Get the full meta from the most recent occurrence\\n (ARRAY_AGG(e.meta ORDER BY e.created_at DESC))[1] AS sample_meta\\n FROM analytics.pulse_events e\\n WHERE e.site_id = p_site_id\\n AND e.event_type IN ('error', 'server_error')\\n AND e.created_at >= NOW() - (p_days_back || ' days')::interval\\n GROUP BY e.event_type, e.meta->>'message', e.path\\n )\\n SELECT * FROM ranked\\n ORDER BY last_seen DESC\\n LIMIT 50;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_error_stats(TEXT, INT)\\n TO anon, authenticated, service_role;\\n","006_date_range_support.sql":"-- 006_date_range_support.sql\\n-- Replace p_days_back with p_start_date / p_end_date date range params.\\n-- Both default to NULL \u2192 falls back to last 7 days when not provided.\\n\\n-- \u2500\u2500 pulse_stats_by_timezone \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_stats_by_timezone(text, text, integer);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text DEFAULT 'UTC',\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n date_trunc('day', created_at AT TIME ZONE p_timezone)::date AS date,\\n path,\\n count(*) AS total_views,\\n count(DISTINCT session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n AND created_at >= (COALESCE(p_start_date, current_date - 7)::timestamp AT TIME ZONE p_timezone)\\n AND created_at < ((COALESCE(p_end_date, current_date) + interval '1 day')::timestamp AT TIME ZONE p_timezone)\\n GROUP BY 1, 2;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_stats_by_timezone(text, text, date, date)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 pulse_location_stats \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_location_stats(text, integer);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_location_stats(\\n p_site_id text,\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n country text,\\n city text,\\n latitude double precision,\\n longitude double precision,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n SELECT\\n country,\\n city,\\n avg(latitude) AS latitude,\\n avg(longitude) AS longitude,\\n count(*) AS total_views,\\n count(DISTINCT session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n AND country IS NOT NULL\\n AND created_at >= COALESCE(p_start_date, current_date - 7)::timestamptz\\n AND created_at < (COALESCE(p_end_date, current_date) + interval '1 day')::timestamptz\\n GROUP BY 1, 2\\n ORDER BY total_views DESC;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_location_stats(text, date, date)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 pulse_vitals_stats \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_vitals_stats(text, int);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_vitals_stats(\\n p_site_id text,\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n path text,\\n metric text,\\n p75 double precision,\\n sample_count bigint\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH vitals_raw AS (\\n SELECT\\n e.path,\\n kv.key AS metric,\\n kv.value::double precision AS val\\n FROM analytics.pulse_events e,\\n LATERAL jsonb_each_text(e.meta) AS kv(key, value)\\n WHERE e.site_id = p_site_id\\n AND e.event_type = 'vitals'\\n AND e.created_at >= COALESCE(p_start_date, current_date - 7)::timestamptz\\n AND e.created_at < (COALESCE(p_end_date, current_date) + interval '1 day')::timestamptz\\n AND kv.key IN ('lcp', 'inp', 'cls', 'fcp', 'ttfb')\\n )\\n -- Per-page stats\\n SELECT\\n vr.path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.path, vr.metric\\n\\n UNION ALL\\n\\n -- Site-wide stats\\n SELECT\\n '__overall__'::text AS path,\\n vr.metric,\\n percentile_cont(0.75) WITHIN GROUP (ORDER BY vr.val) AS p75,\\n count(*)::bigint AS sample_count\\n FROM vitals_raw vr\\n GROUP BY vr.metric;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_vitals_stats(text, date, date)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 pulse_error_stats \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_error_stats(text, int);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_error_stats(\\n p_site_id text,\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n error_type text,\\n message text,\\n path text,\\n total_count bigint,\\n session_count bigint,\\n last_seen timestamptz,\\n first_seen timestamptz,\\n sample_meta jsonb\\n)\\nLANGUAGE sql SECURITY DEFINER STABLE\\nAS $$\\n WITH ranked AS (\\n SELECT\\n e.event_type AS error_type,\\n e.meta->>'message' AS message,\\n e.path,\\n count(*) AS total_count,\\n count(DISTINCT e.session_id) AS session_count,\\n max(e.created_at) AS last_seen,\\n min(e.created_at) AS first_seen,\\n (ARRAY_AGG(e.meta ORDER BY e.created_at DESC))[1] AS sample_meta\\n FROM analytics.pulse_events e\\n WHERE e.site_id = p_site_id\\n AND e.event_type IN ('error', 'server_error')\\n AND e.created_at >= COALESCE(p_start_date, current_date - 7)::timestamptz\\n AND e.created_at < (COALESCE(p_end_date, current_date) + interval '1 day')::timestamptz\\n GROUP BY e.event_type, e.meta->>'message', e.path\\n )\\n SELECT * FROM ranked\\n ORDER BY last_seen DESC\\n LIMIT 50;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_error_stats(text, date, date)\\n TO anon, authenticated, service_role;\\n","007_data_lifecycle.sql":"-- 007_data_lifecycle.sql\\n-- Automatic data consolidation & cleanup.\\n-- Rolls pageview counts older than retention_days into pulse_aggregates,\\n-- then deletes all old raw events (all event types).\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_consolidate_and_cleanup(\\n retention_days int DEFAULT 30\\n)\\nRETURNS TABLE (rows_consolidated bigint, rows_deleted bigint)\\nLANGUAGE plpgsql\\nSECURITY DEFINER\\nAS $$\\nDECLARE\\n v_cutoff timestamptz;\\n v_consolidated bigint;\\n v_deleted bigint;\\nBEGIN\\n v_cutoff := now() - make_interval(days => retention_days);\\n\\n -- Step 1: Roll up old pageview events into daily aggregates\\n WITH inserted AS (\\n INSERT INTO analytics.pulse_aggregates (date, site_id, path, total_views, unique_visitors)\\n SELECT\\n date_trunc('day', created_at)::date AS date,\\n site_id,\\n path,\\n count(*)::int AS total_views,\\n count(DISTINCT session_id)::int AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE created_at < v_cutoff\\n AND event_type = 'pageview'\\n GROUP BY 1, 2, 3\\n ON CONFLICT (date, site_id, path) DO UPDATE SET\\n total_views = GREATEST(analytics.pulse_aggregates.total_views, excluded.total_views),\\n unique_visitors = GREATEST(analytics.pulse_aggregates.unique_visitors, excluded.unique_visitors)\\n RETURNING 1\\n )\\n SELECT count(*) INTO v_consolidated FROM inserted;\\n\\n -- Step 2: Delete all old events (pageviews, vitals, errors, etc.)\\n WITH deleted AS (\\n DELETE FROM analytics.pulse_events\\n WHERE created_at < v_cutoff\\n RETURNING 1\\n )\\n SELECT count(*) INTO v_deleted FROM deleted;\\n\\n RETURN QUERY SELECT v_consolidated, v_deleted;\\nEND;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_consolidate_and_cleanup(int)\\n TO anon, authenticated, service_role;\\n\\n-- \u2500\u2500 Replace pulse_stats_by_timezone to union raw events + aggregates \u2500\u2500\\nDROP FUNCTION IF EXISTS analytics.pulse_stats_by_timezone(text, text, date, date);\\n\\nCREATE OR REPLACE FUNCTION analytics.pulse_stats_by_timezone(\\n p_site_id text,\\n p_timezone text DEFAULT 'UTC',\\n p_start_date date DEFAULT NULL,\\n p_end_date date DEFAULT NULL\\n)\\nRETURNS TABLE (\\n date date,\\n path text,\\n total_views bigint,\\n unique_visitors bigint\\n)\\nLANGUAGE sql\\nSECURITY DEFINER\\nSTABLE\\nAS $$\\n WITH\\n -- Find the earliest raw pageview date for this site\\n oldest_raw AS (\\n SELECT min(date_trunc('day', created_at AT TIME ZONE p_timezone)::date) AS min_date\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n ),\\n -- Aggregated data for dates before the oldest raw event\\n from_aggregates AS (\\n SELECT\\n a.date,\\n a.path,\\n a.total_views::bigint,\\n a.unique_visitors::bigint\\n FROM analytics.pulse_aggregates a, oldest_raw o\\n WHERE a.site_id = p_site_id\\n AND a.date >= COALESCE(p_start_date, current_date - 7)\\n AND a.date < COALESCE(p_end_date, current_date) + 1\\n AND (o.min_date IS NULL OR a.date < o.min_date)\\n ),\\n -- Raw events for recent data\\n from_raw AS (\\n SELECT\\n date_trunc('day', created_at AT TIME ZONE p_timezone)::date AS date,\\n path,\\n count(*) AS total_views,\\n count(DISTINCT session_id) AS unique_visitors\\n FROM analytics.pulse_events\\n WHERE site_id = p_site_id\\n AND event_type = 'pageview'\\n AND created_at >= (COALESCE(p_start_date, current_date - 7)::timestamp AT TIME ZONE p_timezone)\\n AND created_at < ((COALESCE(p_end_date, current_date) + interval '1 day')::timestamp AT TIME ZONE p_timezone)\\n GROUP BY 1, 2\\n )\\n SELECT * FROM from_aggregates\\n UNION ALL\\n SELECT * FROM from_raw;\\n$$;\\n\\nGRANT EXECUTE ON FUNCTION analytics.pulse_stats_by_timezone(text, text, date, date)\\n TO anon, authenticated, service_role;\\n","008_security_hardening.sql":"-- 008_security_hardening.sql\\n-- Tighten grants and RLS policies for production security.\\n-- Replaces the overly broad GRANT ALL from 001_init_pulse.sql with\\n-- minimum-privilege grants per role.\\n\\n-- \u2500\u2500 1. Revoke overly broad table/sequence grants \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\n\\nREVOKE ALL ON ALL TABLES IN SCHEMA analytics FROM anon;\\nREVOKE ALL ON ALL SEQUENCES IN SCHEMA analytics FROM anon;\\nREVOKE ALL ON ALL TABLES IN SCHEMA analytics FROM authenticated;\\n\\n-- \u2500\u2500 2. Grant minimum privileges per role \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\n\\n-- anon: INSERT only on pulse_events (used by the ingestion API route)\\nGRANT INSERT ON analytics.pulse_events TO anon;\\nGRANT USAGE ON SEQUENCE analytics.pulse_events_id_seq TO anon;\\n\\n-- authenticated: read-only on all analytics tables\\nGRANT SELECT ON ALL TABLES IN SCHEMA analytics TO authenticated;\\n\\n-- service_role: full access (admin operations, consolidation, etc.)\\nGRANT ALL ON ALL TABLES IN SCHEMA analytics TO service_role;\\nGRANT ALL ON ALL SEQUENCES IN SCHEMA analytics TO service_role;\\n\\n-- \u2500\u2500 3. Restrict anon insert to valid event types only \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\n\\nDROP POLICY IF EXISTS \\"Allow anon insert on pulse_events\\" ON analytics.pulse_events;\\nCREATE POLICY \\"Allow anon insert on pulse_events\\"\\n ON analytics.pulse_events\\n FOR INSERT\\n TO anon\\n WITH CHECK (\\n event_type IN ('pageview', 'custom', 'vitals', 'error', 'server_error')\\n );\\n\\n-- \u2500\u2500 4. Remove anon read access on aggregates (not needed publicly) \u2500\u2500\u2500\\n\\nDROP POLICY IF EXISTS \\"Allow anon select on pulse_aggregates\\" ON analytics.pulse_aggregates;\\n\\n-- \u2500\u2500 5. Revoke RPC execute from anon \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\n-- Read RPCs should only be callable by authenticated/service_role.\\n-- The admin dashboard must use the service_role key (server-side only).\\n\\nREVOKE EXECUTE ON FUNCTION analytics.pulse_stats_by_timezone(text, text, date, date) FROM anon;\\nREVOKE EXECUTE ON FUNCTION analytics.pulse_location_stats(text, date, date) FROM anon;\\nREVOKE EXECUTE ON FUNCTION analytics.pulse_vitals_stats(text, date, date) FROM anon;\\nREVOKE EXECUTE ON FUNCTION analytics.pulse_error_stats(text, date, date) FROM anon;\\n\\n-- \u2500\u2500 6. Consolidate/cleanup is admin-only (service_role via cron) \u2500\u2500\u2500\u2500\u2500\\n\\nREVOKE EXECUTE ON FUNCTION analytics.pulse_consolidate_and_cleanup(int) FROM anon, authenticated;\\n\\n-- \u2500\u2500 7. Fix default privileges for future tables \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\\n\\nALTER DEFAULT PRIVILEGES IN SCHEMA analytics REVOKE ALL ON TABLES FROM anon, authenticated;\\nALTER DEFAULT PRIVILEGES IN SCHEMA analytics GRANT SELECT ON TABLES TO authenticated;\\nALTER DEFAULT PRIVILEGES IN SCHEMA analytics GRANT ALL ON TABLES TO service_role;\\n\\nNOTIFY pgrst, 'reload config';\\nNOTIFY pgrst, 'reload schema';\\n"}`
368
378
  );
369
379
  function writeMigration() {
370
380
  console.log(" Writing database migration...\n");
@@ -412,3 +422,4 @@ main().catch((err) => {
412
422
  console.error("\n Error:", err.message || err);
413
423
  process.exit(1);
414
424
  });
425
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/detect.ts","../src/install.ts","../src/scaffold.ts","../src/inject.ts","../src/inject-instrumentation.ts","../src/migration.ts","../src/index.ts"],"sourcesContent":["import fs from \"node:fs\";\nimport path from \"node:path\";\n\nexport type PackageManager = \"npm\" | \"pnpm\" | \"yarn\" | \"bun\";\n\nexport function detectPackageManager(): PackageManager {\n const cwd = process.cwd();\n\n if (\n fs.existsSync(path.join(cwd, \"bun.lock\")) ||\n fs.existsSync(path.join(cwd, \"bun.lockb\"))\n ) {\n return \"bun\";\n }\n if (fs.existsSync(path.join(cwd, \"pnpm-lock.yaml\"))) {\n return \"pnpm\";\n }\n if (fs.existsSync(path.join(cwd, \"yarn.lock\"))) {\n return \"yarn\";\n }\n return \"npm\";\n}\n\nexport function validateNextJsProject(): void {\n const cwd = process.cwd();\n\n const pkgPath = path.join(cwd, \"package.json\");\n if (!fs.existsSync(pkgPath)) {\n throw new Error(\n \"No package.json found. Run this command from the root of a Next.js project.\"\n );\n }\n\n const pkg = JSON.parse(fs.readFileSync(pkgPath, \"utf8\"));\n const allDeps = { ...pkg.dependencies, ...pkg.devDependencies };\n if (!allDeps[\"next\"]) {\n throw new Error(\n \"next is not listed in package.json. This command requires a Next.js project.\"\n );\n }\n\n if (!fs.existsSync(getAppDir())) {\n throw new Error(\n \"No app/ directory found. PulseKit requires the Next.js App Router.\"\n );\n }\n}\n\nexport function getAppDir(): string {\n const cwd = process.cwd();\n const srcAppDir = path.join(cwd, \"src\", \"app\");\n if (fs.existsSync(srcAppDir)) {\n return srcAppDir;\n }\n return path.join(cwd, \"app\");\n}\n","import { execSync } from \"node:child_process\";\nimport type { PackageManager } from \"./detect\";\n\nconst PACKAGES = [\n \"@pulsekit/core\",\n \"@pulsekit/next\",\n \"@pulsekit/react\",\n \"@supabase/supabase-js@latest\",\n];\n\nexport async function installPackages(pm: PackageManager): Promise<void> {\n console.log(\" Installing packages...\\n\");\n\n const commands: Record<PackageManager, string> = {\n npm: `npm install ${PACKAGES.join(\" \")}`,\n pnpm: `pnpm add ${PACKAGES.join(\" \")}`,\n yarn: `yarn add ${PACKAGES.join(\" \")}`,\n bun: `bun add ${PACKAGES.join(\" \")}`,\n };\n\n const cmd = commands[pm];\n console.log(` > ${cmd}\\n`);\n\n try {\n execSync(cmd, { cwd: process.cwd(), stdio: \"inherit\" });\n } catch {\n throw new Error(\n `Package installation failed. Try running manually:\\n ${cmd}`\n );\n }\n}\n","import fs from \"node:fs\";\nimport path from \"node:path\";\nimport { getAppDir } from \"./detect\";\n\nexport function scaffoldFiles(): void {\n console.log(\" Scaffolding files...\\n\");\n\n const appDir = getAppDir();\n\n const pulseRoute = `import { createPulseHandler } from \"@pulsekit/next\";\nimport { createClient } from \"@supabase/supabase-js\";\n\nconst supabase = createClient(\n process.env.NEXT_PUBLIC_SUPABASE_URL!,\n process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!\n);\n\nexport const POST = createPulseHandler({\n supabase,\n config: {\n siteId: \"default\",\n secret: process.env.PULSE_SECRET,\n },\n});\n`;\n\n const refreshRoute = `import { createRefreshHandler, withPulseAuth } from \"@pulsekit/next\";\nimport { createClient } from \"@supabase/supabase-js\";\n\nconst supabase = createClient(\n process.env.NEXT_PUBLIC_SUPABASE_URL!,\n process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!\n);\n\nexport const POST = withPulseAuth(createRefreshHandler({ supabase }));\n`;\n\n const consolidateRoute = `import { createConsolidateHandler, withPulseAuth } from \"@pulsekit/next\";\nimport { createClient } from \"@supabase/supabase-js\";\n\nconst supabase = createClient(\n process.env.NEXT_PUBLIC_SUPABASE_URL!,\n process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!\n);\n\nexport const POST = withPulseAuth(createConsolidateHandler({ supabase }));\n`;\n\n const authRoute = `import { createPulseAuthHandler } from \"@pulsekit/next\";\n\nconst handler = createPulseAuthHandler({ secret: process.env.PULSE_SECRET! });\n\nexport const POST = handler;\nexport const DELETE = handler;\n`;\n\n const dashboardPage = `import { Suspense } from \"react\";\nimport { createClient } from \"@supabase/supabase-js\";\nimport { PulseDashboard, PulseAuthGate } from \"@pulsekit/react\";\nimport { getPulseTimezone } from \"@pulsekit/next\";\nimport { Spinner } from \"@/components/ui/spinner\";\nimport \"@pulsekit/react/pulse.css\";\n\nconst supabase = createClient(\n process.env.NEXT_PUBLIC_SUPABASE_URL!,\n process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!\n);\n\nasync function Dashboard() {\n const timezone = await getPulseTimezone();\n\n return (\n <PulseDashboard\n supabase={supabase}\n siteId=\"default\"\n timeframe=\"7d\"\n timezone={timezone}\n />\n );\n}\n\nexport default function AnalyticsPage() {\n return (\n <PulseAuthGate secret={process.env.PULSE_SECRET}>\n <Suspense fallback={<div className=\"flex items-center justify-center min-h-screen p-6\"><Spinner className=\"size-6\" /></div>}>\n <Dashboard />\n </Suspense>\n </PulseAuthGate>\n );\n}\n`;\n\n // Scaffold the spinner component if not already present\n const spinnerContent = `import { LoaderIcon } from \"lucide-react\"\nimport { cn } from \"@/lib/utils\"\n\nfunction Spinner({ className, ...props }: React.ComponentProps<\"svg\">) {\n return (\n <LoaderIcon\n role=\"status\"\n aria-label=\"Loading\"\n className={cn(\"size-4 animate-spin\", className)}\n {...props}\n />\n )\n}\n\nexport { Spinner }\n`;\n\n const cwd = process.cwd();\n const componentsBase = appDir.includes(path.join(\"src\", \"app\"))\n ? path.join(cwd, \"src\", \"components\", \"ui\")\n : path.join(cwd, \"components\", \"ui\");\n\n const spinnerPath = path.join(componentsBase, \"spinner.tsx\");\n fs.mkdirSync(componentsBase, { recursive: true });\n if (fs.existsSync(spinnerPath)) {\n console.log(\" Skipped (already exists): components/ui/spinner.tsx\");\n } else {\n fs.writeFileSync(spinnerPath, spinnerContent, \"utf8\");\n console.log(\" Created: components/ui/spinner.tsx\");\n }\n\n const files = [\n { rel: \"api/pulse/route.ts\", content: pulseRoute },\n { rel: \"api/pulse/auth/route.ts\", content: authRoute },\n { rel: \"api/pulse/refresh-aggregates/route.ts\", content: refreshRoute },\n { rel: \"api/pulse/consolidate/route.ts\", content: consolidateRoute },\n { rel: \"admin/analytics/page.tsx\", content: dashboardPage },\n ];\n\n for (const { rel, content } of files) {\n const fullPath = path.join(appDir, rel);\n fs.mkdirSync(path.dirname(fullPath), { recursive: true });\n\n if (fs.existsSync(fullPath)) {\n console.log(` Skipped (already exists): ${rel}`);\n continue;\n }\n\n fs.writeFileSync(fullPath, content, \"utf8\");\n console.log(` Created: ${rel}`);\n }\n\n console.log(\"\");\n}\n","import fs from \"node:fs\";\nimport path from \"node:path\";\nimport { getAppDir } from \"./detect\";\n\nexport async function injectPulseTracker(): Promise<void> {\n console.log(\" Injecting PulseTracker into layout...\\n\");\n\n const appDir = getAppDir();\n\n const candidates = [\n path.join(appDir, \"layout.tsx\"),\n path.join(appDir, \"layout.jsx\"),\n path.join(appDir, \"layout.js\"),\n ];\n\n let foundPath: string | null = null;\n for (const candidate of candidates) {\n if (fs.existsSync(candidate)) {\n foundPath = candidate;\n break;\n }\n }\n\n if (!foundPath) {\n printManualInstructions();\n return;\n }\n\n let content = fs.readFileSync(foundPath, \"utf8\");\n\n if (content.includes(\"PulseTracker\")) {\n console.log(\" PulseTracker already present in layout. Skipping.\\n\");\n return;\n }\n\n // Add import after the last existing import\n const importStatement =\n 'import { PulseTracker } from \"@pulsekit/next/client\";';\n\n const importRegex = /^import\\s.+$/gm;\n let lastImportEnd = -1;\n let match: RegExpExecArray | null;\n while ((match = importRegex.exec(content)) !== null) {\n lastImportEnd = match.index + match[0].length;\n }\n\n if (lastImportEnd === -1) {\n content = importStatement + \"\\n\" + content;\n } else {\n content =\n content.slice(0, lastImportEnd) +\n \"\\n\" +\n importStatement +\n content.slice(lastImportEnd);\n }\n\n // Inject <PulseTracker /> before </body>\n const bodyCloseIndex = content.lastIndexOf(\"</body>\");\n if (bodyCloseIndex === -1) {\n printManualInstructions();\n return;\n }\n\n // Detect indentation from the </body> line\n const lineStart = content.lastIndexOf(\"\\n\", bodyCloseIndex) + 1;\n const indent = content.slice(lineStart, bodyCloseIndex).match(/^\\s*/)?.[0] ?? \" \";\n const trackerJsx = `${indent} <PulseTracker excludePaths={[\"/admin/analytics\"]} />\\n`;\n\n content =\n content.slice(0, lineStart) + trackerJsx + content.slice(lineStart);\n\n fs.writeFileSync(foundPath, content, \"utf8\");\n console.log(\n ` Modified: ${path.relative(process.cwd(), foundPath)}\\n`\n );\n}\n\nfunction printManualInstructions(): void {\n console.log(\n \" Could not auto-inject PulseTracker. Add it manually to your layout:\\n\"\n );\n console.log(' import { PulseTracker } from \"@pulsekit/next/client\";');\n console.log(\"\");\n console.log(\" // Add inside your <body> tag:\");\n console.log(\n ' <PulseTracker excludePaths={[\"/admin/analytics\"]} />\\n'\n );\n}\n","import fs from \"node:fs\";\nimport path from \"node:path\";\nimport { getAppDir } from \"./detect\";\n\nconst FULL_CONTENT = `import { createClient } from \"@supabase/supabase-js\";\nimport { createPulseErrorReporter } from \"@pulsekit/next\";\n\nconst supabase = createClient(\n process.env.NEXT_PUBLIC_SUPABASE_URL!,\n process.env.NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY!\n);\n\nexport const onRequestError = createPulseErrorReporter({\n supabase,\n siteId: \"default\",\n});\n`;\n\nconst IMPORT_LINE = 'import { createPulseErrorReporter } from \"@pulsekit/next\";';\n\nconst EXPORT_BLOCK = `\nexport const onRequestError = createPulseErrorReporter({\n supabase,\n siteId: \"default\",\n});\n`;\n\nexport async function injectInstrumentation(): Promise<void> {\n console.log(\" Setting up error reporting instrumentation...\\n\");\n\n const appDir = getAppDir();\n // src/app -> src/instrumentation.ts; app/ -> instrumentation.ts\n const useSrc = appDir.includes(path.join(\"src\", \"app\"));\n const baseDir = useSrc ? path.join(process.cwd(), \"src\") : process.cwd();\n\n const candidates = [\n path.join(baseDir, \"instrumentation.ts\"),\n path.join(baseDir, \"instrumentation.js\"),\n ];\n\n let foundPath: string | null = null;\n for (const candidate of candidates) {\n if (fs.existsSync(candidate)) {\n foundPath = candidate;\n break;\n }\n }\n\n // Case 1: No file exists — create it\n if (!foundPath) {\n const targetPath = path.join(baseDir, \"instrumentation.ts\");\n fs.writeFileSync(targetPath, FULL_CONTENT, \"utf8\");\n console.log(` Created: ${path.relative(process.cwd(), targetPath)}\\n`);\n return;\n }\n\n const content = fs.readFileSync(foundPath, \"utf8\");\n\n // Case 3: Already has onRequestError — skip\n if (content.includes(\"onRequestError\")) {\n console.log(\" onRequestError already present in instrumentation. Skipping.\\n\");\n console.log(\" To add PulseKit error reporting manually, add:\\n\");\n console.log(` ${IMPORT_LINE}`);\n console.log(\"\");\n console.log(\" export const onRequestError = createPulseErrorReporter({\");\n console.log(\" supabase,\");\n console.log(' siteId: \"default\",');\n console.log(\" });\\n\");\n return;\n }\n\n // Case 2: File exists without onRequestError — append\n const importRegex = /^import\\s.+$/gm;\n let lastImportEnd = -1;\n let match: RegExpExecArray | null;\n while ((match = importRegex.exec(content)) !== null) {\n lastImportEnd = match.index + match[0].length;\n }\n\n let updated: string;\n if (lastImportEnd === -1) {\n updated = IMPORT_LINE + \"\\n\" + content + EXPORT_BLOCK;\n } else {\n updated =\n content.slice(0, lastImportEnd) +\n \"\\n\" +\n IMPORT_LINE +\n content.slice(lastImportEnd) +\n EXPORT_BLOCK;\n }\n\n fs.writeFileSync(foundPath, updated, \"utf8\");\n console.log(` Modified: ${path.relative(process.cwd(), foundPath)}\\n`);\n}\n","import fs from \"node:fs\";\nimport path from \"node:path\";\n\nconst SQL_MAP: Record<string, string> = JSON.parse(\n process.env.__EMBEDDED_SQL__!\n);\n\nexport function writeMigration(): void {\n console.log(\" Writing database migration...\\n\");\n\n const supabaseDir = path.join(process.cwd(), \"supabase\", \"migrations\");\n fs.mkdirSync(supabaseDir, { recursive: true });\n\n // Combine all SQL files into a single migration\n const files = Object.keys(SQL_MAP).sort();\n const combined = files\n .map((file) => `-- ${file}\\n${SQL_MAP[file]}`)\n .join(\"\\n\\n\");\n\n // Use a fixed timestamp so re-running doesn't create duplicates\n const filename = \"20250101000000_pulse_analytics.sql\";\n const fullPath = path.join(supabaseDir, filename);\n\n if (fs.existsSync(fullPath)) {\n console.log(` Skipped (already exists): supabase/migrations/${filename}\\n`);\n return;\n }\n\n fs.writeFileSync(fullPath, combined, \"utf8\");\n console.log(` Created: supabase/migrations/${filename}\\n`);\n}\n","import { detectPackageManager, validateNextJsProject } from \"./detect\";\nimport { installPackages } from \"./install\";\nimport { scaffoldFiles } from \"./scaffold\";\nimport { injectPulseTracker } from \"./inject\";\nimport { injectInstrumentation } from \"./inject-instrumentation\";\nimport { writeMigration } from \"./migration\";\n\nasync function main() {\n console.log(\"\\n create-pulsekit\\n\");\n console.log(\" Setting up PulseKit analytics in your Next.js project.\\n\");\n\n const pm = detectPackageManager();\n console.log(` Detected package manager: ${pm}\\n`);\n\n validateNextJsProject();\n\n await installPackages(pm);\n\n scaffoldFiles();\n\n await injectPulseTracker();\n\n await injectInstrumentation();\n\n writeMigration();\n\n console.log(\"\\n Done! PulseKit has been added to your project.\\n\");\n console.log(\" To finish setup:\");\n console.log(\" 1. Add your Supabase credentials to .env.local:\");\n console.log(\" NEXT_PUBLIC_SUPABASE_URL=<your-supabase-url>\");\n console.log(\" NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY=<your-anon-key>\");\n console.log(\" 2. Run the database migration:\");\n console.log(\" npx supabase link\");\n console.log(\" npx supabase db push\");\n console.log(\" 3. Start your dev server and visit /admin/analytics\");\n}\n\nmain().catch((err) => {\n console.error(\"\\n Error:\", err.message || err);\n process.exit(1);\n});\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,qBAAe;AACf,uBAAiB;AAIV,SAAS,uBAAuC;AACrD,QAAM,MAAM,QAAQ,IAAI;AAExB,MACE,eAAAA,QAAG,WAAW,iBAAAC,QAAK,KAAK,KAAK,UAAU,CAAC,KACxC,eAAAD,QAAG,WAAW,iBAAAC,QAAK,KAAK,KAAK,WAAW,CAAC,GACzC;AACA,WAAO;AAAA,EACT;AACA,MAAI,eAAAD,QAAG,WAAW,iBAAAC,QAAK,KAAK,KAAK,gBAAgB,CAAC,GAAG;AACnD,WAAO;AAAA,EACT;AACA,MAAI,eAAAD,QAAG,WAAW,iBAAAC,QAAK,KAAK,KAAK,WAAW,CAAC,GAAG;AAC9C,WAAO;AAAA,EACT;AACA,SAAO;AACT;AAEO,SAAS,wBAA8B;AAC5C,QAAM,MAAM,QAAQ,IAAI;AAExB,QAAM,UAAU,iBAAAA,QAAK,KAAK,KAAK,cAAc;AAC7C,MAAI,CAAC,eAAAD,QAAG,WAAW,OAAO,GAAG;AAC3B,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AAEA,QAAM,MAAM,KAAK,MAAM,eAAAA,QAAG,aAAa,SAAS,MAAM,CAAC;AACvD,QAAM,UAAU,EAAE,GAAG,IAAI,cAAc,GAAG,IAAI,gBAAgB;AAC9D,MAAI,CAAC,QAAQ,MAAM,GAAG;AACpB,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AAEA,MAAI,CAAC,eAAAA,QAAG,WAAW,UAAU,CAAC,GAAG;AAC/B,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AACF;AAEO,SAAS,YAAoB;AAClC,QAAM,MAAM,QAAQ,IAAI;AACxB,QAAM,YAAY,iBAAAC,QAAK,KAAK,KAAK,OAAO,KAAK;AAC7C,MAAI,eAAAD,QAAG,WAAW,SAAS,GAAG;AAC5B,WAAO;AAAA,EACT;AACA,SAAO,iBAAAC,QAAK,KAAK,KAAK,KAAK;AAC7B;;;ACvDA,gCAAyB;AAGzB,IAAM,WAAW;AAAA,EACf;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEA,eAAsB,gBAAgB,IAAmC;AACvE,UAAQ,IAAI,4BAA4B;AAExC,QAAM,WAA2C;AAAA,IAC/C,KAAK,eAAe,SAAS,KAAK,GAAG,CAAC;AAAA,IACtC,MAAM,YAAY,SAAS,KAAK,GAAG,CAAC;AAAA,IACpC,MAAM,YAAY,SAAS,KAAK,GAAG,CAAC;AAAA,IACpC,KAAK,WAAW,SAAS,KAAK,GAAG,CAAC;AAAA,EACpC;AAEA,QAAM,MAAM,SAAS,EAAE;AACvB,UAAQ,IAAI,OAAO,GAAG;AAAA,CAAI;AAE1B,MAAI;AACF,4CAAS,KAAK,EAAE,KAAK,QAAQ,IAAI,GAAG,OAAO,UAAU,CAAC;AAAA,EACxD,QAAQ;AACN,UAAM,IAAI;AAAA,MACR;AAAA,IAAyD,GAAG;AAAA,IAC9D;AAAA,EACF;AACF;;;AC9BA,IAAAC,kBAAe;AACf,IAAAC,oBAAiB;AAGV,SAAS,gBAAsB;AACpC,UAAQ,IAAI,0BAA0B;AAEtC,QAAM,SAAS,UAAU;AAEzB,QAAM,aAAa;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAiBnB,QAAM,eAAe;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAWrB,QAAM,mBAAmB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAWzB,QAAM,YAAY;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAQlB,QAAM,gBAAgB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAqCtB,QAAM,iBAAiB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAiBvB,QAAM,MAAM,QAAQ,IAAI;AACxB,QAAM,iBAAiB,OAAO,SAAS,kBAAAC,QAAK,KAAK,OAAO,KAAK,CAAC,IAC1D,kBAAAA,QAAK,KAAK,KAAK,OAAO,cAAc,IAAI,IACxC,kBAAAA,QAAK,KAAK,KAAK,cAAc,IAAI;AAErC,QAAM,cAAc,kBAAAA,QAAK,KAAK,gBAAgB,aAAa;AAC3D,kBAAAC,QAAG,UAAU,gBAAgB,EAAE,WAAW,KAAK,CAAC;AAChD,MAAI,gBAAAA,QAAG,WAAW,WAAW,GAAG;AAC9B,YAAQ,IAAI,yDAAyD;AAAA,EACvE,OAAO;AACL,oBAAAA,QAAG,cAAc,aAAa,gBAAgB,MAAM;AACpD,YAAQ,IAAI,wCAAwC;AAAA,EACtD;AAEA,QAAM,QAAQ;AAAA,IACZ,EAAE,KAAK,sBAAsB,SAAS,WAAW;AAAA,IACjD,EAAE,KAAK,2BAA2B,SAAS,UAAU;AAAA,IACrD,EAAE,KAAK,yCAAyC,SAAS,aAAa;AAAA,IACtE,EAAE,KAAK,kCAAkC,SAAS,iBAAiB;AAAA,IACnE,EAAE,KAAK,4BAA4B,SAAS,cAAc;AAAA,EAC5D;AAEA,aAAW,EAAE,KAAK,QAAQ,KAAK,OAAO;AACpC,UAAM,WAAW,kBAAAD,QAAK,KAAK,QAAQ,GAAG;AACtC,oBAAAC,QAAG,UAAU,kBAAAD,QAAK,QAAQ,QAAQ,GAAG,EAAE,WAAW,KAAK,CAAC;AAExD,QAAI,gBAAAC,QAAG,WAAW,QAAQ,GAAG;AAC3B,cAAQ,IAAI,iCAAiC,GAAG,EAAE;AAClD;AAAA,IACF;AAEA,oBAAAA,QAAG,cAAc,UAAU,SAAS,MAAM;AAC1C,YAAQ,IAAI,gBAAgB,GAAG,EAAE;AAAA,EACnC;AAEA,UAAQ,IAAI,EAAE;AAChB;;;AClJA,IAAAC,kBAAe;AACf,IAAAC,oBAAiB;AAGjB,eAAsB,qBAAoC;AACxD,UAAQ,IAAI,2CAA2C;AAEvD,QAAM,SAAS,UAAU;AAEzB,QAAM,aAAa;AAAA,IACjB,kBAAAC,QAAK,KAAK,QAAQ,YAAY;AAAA,IAC9B,kBAAAA,QAAK,KAAK,QAAQ,YAAY;AAAA,IAC9B,kBAAAA,QAAK,KAAK,QAAQ,WAAW;AAAA,EAC/B;AAEA,MAAI,YAA2B;AAC/B,aAAW,aAAa,YAAY;AAClC,QAAI,gBAAAC,QAAG,WAAW,SAAS,GAAG;AAC5B,kBAAY;AACZ;AAAA,IACF;AAAA,EACF;AAEA,MAAI,CAAC,WAAW;AACd,4BAAwB;AACxB;AAAA,EACF;AAEA,MAAI,UAAU,gBAAAA,QAAG,aAAa,WAAW,MAAM;AAE/C,MAAI,QAAQ,SAAS,cAAc,GAAG;AACpC,YAAQ,IAAI,yDAAyD;AACrE;AAAA,EACF;AAGA,QAAM,kBACJ;AAEF,QAAM,cAAc;AACpB,MAAI,gBAAgB;AACpB,MAAI;AACJ,UAAQ,QAAQ,YAAY,KAAK,OAAO,OAAO,MAAM;AACnD,oBAAgB,MAAM,QAAQ,MAAM,CAAC,EAAE;AAAA,EACzC;AAEA,MAAI,kBAAkB,IAAI;AACxB,cAAU,kBAAkB,OAAO;AAAA,EACrC,OAAO;AACL,cACE,QAAQ,MAAM,GAAG,aAAa,IAC9B,OACA,kBACA,QAAQ,MAAM,aAAa;AAAA,EAC/B;AAGA,QAAM,iBAAiB,QAAQ,YAAY,SAAS;AACpD,MAAI,mBAAmB,IAAI;AACzB,4BAAwB;AACxB;AAAA,EACF;AAGA,QAAM,YAAY,QAAQ,YAAY,MAAM,cAAc,IAAI;AAC9D,QAAM,SAAS,QAAQ,MAAM,WAAW,cAAc,EAAE,MAAM,MAAM,IAAI,CAAC,KAAK;AAC9E,QAAM,aAAa,GAAG,MAAM;AAAA;AAE5B,YACE,QAAQ,MAAM,GAAG,SAAS,IAAI,aAAa,QAAQ,MAAM,SAAS;AAEpE,kBAAAA,QAAG,cAAc,WAAW,SAAS,MAAM;AAC3C,UAAQ;AAAA,IACN,iBAAiB,kBAAAD,QAAK,SAAS,QAAQ,IAAI,GAAG,SAAS,CAAC;AAAA;AAAA,EAC1D;AACF;AAEA,SAAS,0BAAgC;AACvC,UAAQ;AAAA,IACN;AAAA,EACF;AACA,UAAQ,IAAI,2DAA2D;AACvE,UAAQ,IAAI,EAAE;AACd,UAAQ,IAAI,oCAAoC;AAChD,UAAQ;AAAA,IACN;AAAA,EACF;AACF;;;ACvFA,IAAAE,kBAAe;AACf,IAAAC,oBAAiB;AAGjB,IAAM,eAAe;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAcrB,IAAM,cAAc;AAEpB,IAAM,eAAe;AAAA;AAAA;AAAA;AAAA;AAAA;AAOrB,eAAsB,wBAAuC;AAC3D,UAAQ,IAAI,mDAAmD;AAE/D,QAAM,SAAS,UAAU;AAEzB,QAAM,SAAS,OAAO,SAAS,kBAAAC,QAAK,KAAK,OAAO,KAAK,CAAC;AACtD,QAAM,UAAU,SAAS,kBAAAA,QAAK,KAAK,QAAQ,IAAI,GAAG,KAAK,IAAI,QAAQ,IAAI;AAEvE,QAAM,aAAa;AAAA,IACjB,kBAAAA,QAAK,KAAK,SAAS,oBAAoB;AAAA,IACvC,kBAAAA,QAAK,KAAK,SAAS,oBAAoB;AAAA,EACzC;AAEA,MAAI,YAA2B;AAC/B,aAAW,aAAa,YAAY;AAClC,QAAI,gBAAAC,QAAG,WAAW,SAAS,GAAG;AAC5B,kBAAY;AACZ;AAAA,IACF;AAAA,EACF;AAGA,MAAI,CAAC,WAAW;AACd,UAAM,aAAa,kBAAAD,QAAK,KAAK,SAAS,oBAAoB;AAC1D,oBAAAC,QAAG,cAAc,YAAY,cAAc,MAAM;AACjD,YAAQ,IAAI,gBAAgB,kBAAAD,QAAK,SAAS,QAAQ,IAAI,GAAG,UAAU,CAAC;AAAA,CAAI;AACxE;AAAA,EACF;AAEA,QAAM,UAAU,gBAAAC,QAAG,aAAa,WAAW,MAAM;AAGjD,MAAI,QAAQ,SAAS,gBAAgB,GAAG;AACtC,YAAQ,IAAI,oEAAoE;AAChF,YAAQ,IAAI,sDAAsD;AAClE,YAAQ,IAAI,OAAO,WAAW,EAAE;AAChC,YAAQ,IAAI,EAAE;AACd,YAAQ,IAAI,8DAA8D;AAC1E,YAAQ,IAAI,iBAAiB;AAC7B,YAAQ,IAAI,0BAA0B;AACtC,YAAQ,IAAI,WAAW;AACvB;AAAA,EACF;AAGA,QAAM,cAAc;AACpB,MAAI,gBAAgB;AACpB,MAAI;AACJ,UAAQ,QAAQ,YAAY,KAAK,OAAO,OAAO,MAAM;AACnD,oBAAgB,MAAM,QAAQ,MAAM,CAAC,EAAE;AAAA,EACzC;AAEA,MAAI;AACJ,MAAI,kBAAkB,IAAI;AACxB,cAAU,cAAc,OAAO,UAAU;AAAA,EAC3C,OAAO;AACL,cACE,QAAQ,MAAM,GAAG,aAAa,IAC9B,OACA,cACA,QAAQ,MAAM,aAAa,IAC3B;AAAA,EACJ;AAEA,kBAAAA,QAAG,cAAc,WAAW,SAAS,MAAM;AAC3C,UAAQ,IAAI,iBAAiB,kBAAAD,QAAK,SAAS,QAAQ,IAAI,GAAG,SAAS,CAAC;AAAA,CAAI;AAC1E;;;AC7FA,IAAAE,kBAAe;AACf,IAAAC,oBAAiB;AAEjB,IAAM,UAAkC,KAAK;AAAA,EAC3C;AACF;AAEO,SAAS,iBAAuB;AACrC,UAAQ,IAAI,mCAAmC;AAE/C,QAAM,cAAc,kBAAAC,QAAK,KAAK,QAAQ,IAAI,GAAG,YAAY,YAAY;AACrE,kBAAAC,QAAG,UAAU,aAAa,EAAE,WAAW,KAAK,CAAC;AAG7C,QAAM,QAAQ,OAAO,KAAK,OAAO,EAAE,KAAK;AACxC,QAAM,WAAW,MACd,IAAI,CAAC,SAAS,MAAM,IAAI;AAAA,EAAK,QAAQ,IAAI,CAAC,EAAE,EAC5C,KAAK,MAAM;AAGd,QAAM,WAAW;AACjB,QAAM,WAAW,kBAAAD,QAAK,KAAK,aAAa,QAAQ;AAEhD,MAAI,gBAAAC,QAAG,WAAW,QAAQ,GAAG;AAC3B,YAAQ,IAAI,qDAAqD,QAAQ;AAAA,CAAI;AAC7E;AAAA,EACF;AAEA,kBAAAA,QAAG,cAAc,UAAU,UAAU,MAAM;AAC3C,UAAQ,IAAI,oCAAoC,QAAQ;AAAA,CAAI;AAC9D;;;ACvBA,eAAe,OAAO;AACpB,UAAQ,IAAI,uBAAuB;AACnC,UAAQ,IAAI,4DAA4D;AAExE,QAAM,KAAK,qBAAqB;AAChC,UAAQ,IAAI,+BAA+B,EAAE;AAAA,CAAI;AAEjD,wBAAsB;AAEtB,QAAM,gBAAgB,EAAE;AAExB,gBAAc;AAEd,QAAM,mBAAmB;AAEzB,QAAM,sBAAsB;AAE5B,iBAAe;AAEf,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,oBAAoB;AAChC,UAAQ,IAAI,qDAAqD;AACjE,UAAQ,IAAI,qDAAqD;AACjE,UAAQ,IAAI,6DAA6D;AACzE,UAAQ,IAAI,oCAAoC;AAChD,UAAQ,IAAI,0BAA0B;AACtC,UAAQ,IAAI,6BAA6B;AACzC,UAAQ,IAAI,yDAAyD;AACvE;AAEA,KAAK,EAAE,MAAM,CAAC,QAAQ;AACpB,UAAQ,MAAM,cAAc,IAAI,WAAW,GAAG;AAC9C,UAAQ,KAAK,CAAC;AAChB,CAAC;","names":["fs","path","import_node_fs","import_node_path","path","fs","import_node_fs","import_node_path","path","fs","import_node_fs","import_node_path","path","fs","import_node_fs","import_node_path","path","fs"]}
package/package.json CHANGED
@@ -1,8 +1,30 @@
1
1
  {
2
2
  "name": "create-pulsekit",
3
- "version": "0.1.0",
3
+ "version": "0.1.1",
4
4
  "description": "Set up PulseKit analytics in your Next.js project",
5
+ "keywords": [
6
+ "analytics",
7
+ "nextjs",
8
+ "supabase",
9
+ "cli",
10
+ "scaffolding",
11
+ "pulsekit"
12
+ ],
13
+ "license": "MIT",
14
+ "author": "Benoit Ortalo-Magne",
15
+ "repository": {
16
+ "type": "git",
17
+ "url": "https://github.com/benoiteom/pulsekit.git",
18
+ "directory": "packages/create-pulsekit"
19
+ },
20
+ "homepage": "https://github.com/benoiteom/pulsekit/tree/main/packages/create-pulsekit",
21
+ "bugs": "https://github.com/benoiteom/pulsekit/issues",
22
+ "engines": {
23
+ "node": ">=20"
24
+ },
25
+ "main": "./dist/index.js",
5
26
  "bin": "./dist/index.js",
27
+ "sideEffects": false,
6
28
  "files": [
7
29
  "dist"
8
30
  ],
@@ -13,6 +35,7 @@
13
35
  "scripts": {
14
36
  "prebuild": "cp ../core/sql/*.sql src/sql/",
15
37
  "build": "tsup",
16
- "clean": "rm -rf dist"
38
+ "clean": "rm -rf dist",
39
+ "lint": "eslint src/"
17
40
  }
18
41
  }