dev3000 0.0.112 → 0.0.113
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cdp-monitor.d.ts +2 -1
- package/dist/cdp-monitor.d.ts.map +1 -1
- package/dist/cdp-monitor.js +23 -6
- package/dist/cdp-monitor.js.map +1 -1
- package/dist/cli.js +1 -0
- package/dist/cli.js.map +1 -1
- package/dist/dev-environment.d.ts +1 -0
- package/dist/dev-environment.d.ts.map +1 -1
- package/dist/dev-environment.js +2 -1
- package/dist/dev-environment.js.map +1 -1
- package/mcp-server/.next/BUILD_ID +1 -1
- package/mcp-server/.next/build-manifest.json +2 -2
- package/mcp-server/.next/fallback-build-manifest.json +2 -2
- package/mcp-server/.next/prerender-manifest.json +3 -3
- package/mcp-server/.next/server/app/_global-error/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/_global-error/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/_global-error.html +2 -2
- package/mcp-server/.next/server/app/_global-error.rsc +1 -1
- package/mcp-server/.next/server/app/_global-error.segments/__PAGE__.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_global-error.segments/_full.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_global-error.segments/_head.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_global-error.segments/_index.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_global-error.segments/_tree.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_not-found/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/_not-found/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/_not-found.html +1 -1
- package/mcp-server/.next/server/app/_not-found.rsc +2 -2
- package/mcp-server/.next/server/app/_not-found.segments/_full.segment.rsc +2 -2
- package/mcp-server/.next/server/app/_not-found.segments/_head.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_not-found.segments/_index.segment.rsc +2 -2
- package/mcp-server/.next/server/app/_not-found.segments/_not-found/__PAGE__.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_not-found.segments/_not-found.segment.rsc +1 -1
- package/mcp-server/.next/server/app/_not-found.segments/_tree.segment.rsc +2 -2
- package/mcp-server/.next/server/app/auth/error/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/auth/error/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/auth/error.html +1 -1
- package/mcp-server/.next/server/app/auth/error.rsc +2 -2
- package/mcp-server/.next/server/app/auth/error.segments/_full.segment.rsc +2 -2
- package/mcp-server/.next/server/app/auth/error.segments/_head.segment.rsc +1 -1
- package/mcp-server/.next/server/app/auth/error.segments/_index.segment.rsc +2 -2
- package/mcp-server/.next/server/app/auth/error.segments/_tree.segment.rsc +2 -2
- package/mcp-server/.next/server/app/auth/error.segments/auth/error/__PAGE__.segment.rsc +1 -1
- package/mcp-server/.next/server/app/auth/error.segments/auth/error.segment.rsc +1 -1
- package/mcp-server/.next/server/app/auth/error.segments/auth.segment.rsc +1 -1
- package/mcp-server/.next/server/app/index.html +1 -1
- package/mcp-server/.next/server/app/index.rsc +2 -2
- package/mcp-server/.next/server/app/index.segments/__PAGE__.segment.rsc +1 -1
- package/mcp-server/.next/server/app/index.segments/_full.segment.rsc +2 -2
- package/mcp-server/.next/server/app/index.segments/_head.segment.rsc +1 -1
- package/mcp-server/.next/server/app/index.segments/_index.segment.rsc +2 -2
- package/mcp-server/.next/server/app/index.segments/_tree.segment.rsc +2 -2
- package/mcp-server/.next/server/app/logs/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/logs/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/signin/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/signin/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/video/[session]/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/video/[session]/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/workflows/[id]/report/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/workflows/[id]/report/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/workflows/new/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/workflows/new/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/app/workflows/page.js.nft.json +1 -1
- package/mcp-server/.next/server/app/workflows/page_client-reference-manifest.js +1 -1
- package/mcp-server/.next/server/chunks/[root-of-the-server]__157de66b._.js +38 -32
- package/mcp-server/.next/server/chunks/[root-of-the-server]__157de66b._.js.map +1 -1
- package/mcp-server/.next/server/chunks/[root-of-the-server]__446f0436._.js.map +1 -1
- package/mcp-server/.next/server/chunks/[root-of-the-server]__730a8fd0._.js.map +1 -1
- package/mcp-server/.next/server/chunks/[root-of-the-server]__c508da18._.js +1 -1
- package/mcp-server/.next/server/chunks/[root-of-the-server]__c508da18._.js.map +1 -1
- package/mcp-server/.next/server/chunks/bee4f_next_dist_esm_build_templates_app-route_1ece9366.js +6 -5
- package/mcp-server/.next/server/chunks/bee4f_next_dist_esm_build_templates_app-route_1ece9366.js.map +1 -1
- package/mcp-server/.next/server/chunks/mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js +29 -23
- package/mcp-server/.next/server/chunks/mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js.map +1 -1
- package/mcp-server/.next/server/chunks/ssr/[root-of-the-server]__0ff05d72._.js +3 -0
- package/mcp-server/.next/server/chunks/ssr/[root-of-the-server]__0ff05d72._.js.map +1 -0
- package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__9a29b768._.js → [root-of-the-server]__27cc5956._.js} +2 -2
- package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__9a29b768._.js.map → [root-of-the-server]__27cc5956._.js.map} +1 -1
- package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__8ce53954._.js → [root-of-the-server]__34731fcf._.js} +2 -2
- package/mcp-server/.next/server/chunks/ssr/[root-of-the-server]__34731fcf._.js.map +1 -0
- package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__97dbdf3d._.js → [root-of-the-server]__570677dc._.js} +2 -2
- package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__97dbdf3d._.js.map → [root-of-the-server]__570677dc._.js.map} +1 -1
- package/mcp-server/.next/server/chunks/ssr/_cd4dc25e._.js.map +1 -1
- package/mcp-server/.next/server/server-reference-manifest.js +1 -1
- package/mcp-server/.next/server/server-reference-manifest.json +1 -1
- package/mcp-server/.next/static/chunks/{8d5a57e1de949e9f.js → 07848f6bd2a7e5f6.js} +2 -2
- package/mcp-server/.next/static/chunks/aed4fb5252a4bc95.js +3 -0
- package/mcp-server/.next/static/chunks/e8d521464b0c96ca.css +1 -0
- package/mcp-server/app/api/cloud/fix-workflow/steps.ts +236 -63
- package/mcp-server/app/api/cloud/fix-workflow/workflow.ts +19 -6
- package/mcp-server/app/api/cloud/start-fix/route.ts +2 -1
- package/mcp-server/app/workflows/workflows-client.tsx +35 -0
- package/package.json +1 -1
- package/mcp-server/.next/server/chunks/ssr/[root-of-the-server]__3a2dacc6._.js +0 -3
- package/mcp-server/.next/server/chunks/ssr/[root-of-the-server]__3a2dacc6._.js.map +0 -1
- package/mcp-server/.next/server/chunks/ssr/[root-of-the-server]__8ce53954._.js.map +0 -1
- package/mcp-server/.next/static/chunks/2bcc973e2858aaba.js +0 -1
- package/mcp-server/.next/static/chunks/a0e4d9b8d2f627cf.css +0 -1
- /package/mcp-server/.next/static/{aFliqsQDgiIm8sdHtWiID → UcmWUkU-l9iLeWRnSUybj}/_buildManifest.js +0 -0
- /package/mcp-server/.next/static/{aFliqsQDgiIm8sdHtWiID → UcmWUkU-l9iLeWRnSUybj}/_clientMiddlewareManifest.json +0 -0
- /package/mcp-server/.next/static/{aFliqsQDgiIm8sdHtWiID → UcmWUkU-l9iLeWRnSUybj}/_ssgManifest.js +0 -0
package/mcp-server/.next/server/chunks/bee4f_next_dist_esm_build_templates_app-route_1ece9366.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../../node_modules/.pnpm/next%4016.1.0-canary.9_%40opentelemetry%2Bapi%401.9.0_babel-plugin-react-compiler%401.0.0_react-d_e89f05fa6262f945d2946e6441ada21f/node_modules/next/dist/esm/build/templates/app-route.js","../../../../mcp-server/app/.well-known/workflow/v1/flow/route.js"],"sourcesContent":["import { AppRouteRouteModule } from \"next/dist/esm/server/route-modules/app-route/module.compiled\";\nimport { RouteKind } from \"next/dist/esm/server/route-kind\";\nimport { patchFetch as _patchFetch } from \"next/dist/esm/server/lib/patch-fetch\";\nimport { addRequestMeta, getRequestMeta } from \"next/dist/esm/server/request-meta\";\nimport { getTracer, SpanKind } from \"next/dist/esm/server/lib/trace/tracer\";\nimport { setReferenceManifestsSingleton } from \"next/dist/esm/server/app-render/encryption-utils\";\nimport { createServerModuleMap } from \"next/dist/esm/server/app-render/action-utils\";\nimport { normalizeAppPath } from \"next/dist/esm/shared/lib/router/utils/app-paths\";\nimport { NodeNextRequest, NodeNextResponse } from \"next/dist/esm/server/base-http/node\";\nimport { NextRequestAdapter, signalFromNodeResponse } from \"next/dist/esm/server/web/spec-extension/adapters/next-request\";\nimport { BaseServerSpan } from \"next/dist/esm/server/lib/trace/constants\";\nimport { getRevalidateReason } from \"next/dist/esm/server/instrumentation/utils\";\nimport { sendResponse } from \"next/dist/esm/server/send-response\";\nimport { fromNodeOutgoingHttpHeaders, toNodeOutgoingHttpHeaders } from \"next/dist/esm/server/web/utils\";\nimport { getCacheControlHeader } from \"next/dist/esm/server/lib/cache-control\";\nimport { INFINITE_CACHE, NEXT_CACHE_TAGS_HEADER } from \"next/dist/esm/lib/constants\";\nimport { NoFallbackError } from \"next/dist/esm/shared/lib/no-fallback-error.external\";\nimport { CachedRouteKind } from \"next/dist/esm/server/response-cache\";\nimport * as userland from \"INNER_APP_ROUTE\";\n// We inject the nextConfigOutput here so that we can use them in the route\n// module.\nconst nextConfigOutput = \"\"\nconst routeModule = new AppRouteRouteModule({\n definition: {\n kind: RouteKind.APP_ROUTE,\n page: \"/.well-known/workflow/v1/flow/route\",\n pathname: \"/.well-known/workflow/v1/flow\",\n filename: \"route\",\n bundlePath: \"\"\n },\n distDir: process.env.__NEXT_RELATIVE_DIST_DIR || '',\n relativeProjectDir: process.env.__NEXT_RELATIVE_PROJECT_DIR || '',\n resolvedPagePath: \"[project]/mcp-server/app/.well-known/workflow/v1/flow/route.js\",\n nextConfigOutput,\n userland\n});\n// Pull out the exports that we need to expose from the module. This should\n// be eliminated when we've moved the other routes to the new format. These\n// are used to hook into the route.\nconst { workAsyncStorage, workUnitAsyncStorage, serverHooks } = routeModule;\nfunction patchFetch() {\n return _patchFetch({\n workAsyncStorage,\n workUnitAsyncStorage\n });\n}\nexport { routeModule, workAsyncStorage, workUnitAsyncStorage, serverHooks, patchFetch, };\nexport async function handler(req, res, ctx) {\n if (routeModule.isDev) {\n addRequestMeta(req, 'devRequestTimingInternalsEnd', process.hrtime.bigint());\n }\n let srcPage = \"/.well-known/workflow/v1/flow/route\";\n // turbopack doesn't normalize `/index` in the page name\n // so we need to to process dynamic routes properly\n // TODO: fix turbopack providing differing value from webpack\n if (process.env.TURBOPACK) {\n srcPage = srcPage.replace(/\\/index$/, '') || '/';\n } else if (srcPage === '/index') {\n // we always normalize /index specifically\n srcPage = '/';\n }\n const multiZoneDraftMode = process.env.__NEXT_MULTI_ZONE_DRAFT_MODE;\n const prepareResult = await routeModule.prepare(req, res, {\n srcPage,\n multiZoneDraftMode\n });\n if (!prepareResult) {\n res.statusCode = 400;\n res.end('Bad Request');\n ctx.waitUntil == null ? void 0 : ctx.waitUntil.call(ctx, Promise.resolve());\n return null;\n }\n const { buildId, params, nextConfig, parsedUrl, isDraftMode, prerenderManifest, routerServerContext, isOnDemandRevalidate, revalidateOnlyGenerated, resolvedPathname, clientReferenceManifest, serverActionsManifest } = prepareResult;\n const normalizedSrcPage = normalizeAppPath(srcPage);\n let isIsr = Boolean(prerenderManifest.dynamicRoutes[normalizedSrcPage] || prerenderManifest.routes[resolvedPathname]);\n const render404 = async ()=>{\n // TODO: should route-module itself handle rendering the 404\n if (routerServerContext == null ? void 0 : routerServerContext.render404) {\n await routerServerContext.render404(req, res, parsedUrl, false);\n } else {\n res.end('This page could not be found');\n }\n return null;\n };\n if (isIsr && !isDraftMode) {\n const isPrerendered = Boolean(prerenderManifest.routes[resolvedPathname]);\n const prerenderInfo = prerenderManifest.dynamicRoutes[normalizedSrcPage];\n if (prerenderInfo) {\n if (prerenderInfo.fallback === false && !isPrerendered) {\n if (nextConfig.experimental.adapterPath) {\n return await render404();\n }\n throw new NoFallbackError();\n }\n }\n }\n let cacheKey = null;\n if (isIsr && !routeModule.isDev && !isDraftMode) {\n cacheKey = resolvedPathname;\n // ensure /index and / is normalized to one key\n cacheKey = cacheKey === '/index' ? '/' : cacheKey;\n }\n const supportsDynamicResponse = // If we're in development, we always support dynamic HTML\n routeModule.isDev === true || // If this is not SSG or does not have static paths, then it supports\n // dynamic HTML.\n !isIsr;\n // This is a revalidation request if the request is for a static\n // page and it is not being resumed from a postponed render and\n // it is not a dynamic RSC request then it is a revalidation\n // request.\n const isStaticGeneration = isIsr && !supportsDynamicResponse;\n // Before rendering (which initializes component tree modules), we have to\n // set the reference manifests to our global store so Server Action's\n // encryption util can access to them at the top level of the page module.\n if (serverActionsManifest && clientReferenceManifest) {\n setReferenceManifestsSingleton({\n page: srcPage,\n clientReferenceManifest,\n serverActionsManifest,\n serverModuleMap: createServerModuleMap({\n serverActionsManifest\n })\n });\n }\n const method = req.method || 'GET';\n const tracer = getTracer();\n const activeSpan = tracer.getActiveScopeSpan();\n const context = {\n params,\n prerenderManifest,\n renderOpts: {\n experimental: {\n authInterrupts: Boolean(nextConfig.experimental.authInterrupts)\n },\n cacheComponents: Boolean(nextConfig.cacheComponents),\n supportsDynamicResponse,\n incrementalCache: getRequestMeta(req, 'incrementalCache'),\n cacheLifeProfiles: nextConfig.cacheLife,\n waitUntil: ctx.waitUntil,\n onClose: (cb)=>{\n res.on('close', cb);\n },\n onAfterTaskError: undefined,\n onInstrumentationRequestError: (error, _request, errorContext, silenceLog)=>routeModule.onRequestError(req, error, errorContext, silenceLog, routerServerContext)\n },\n sharedContext: {\n buildId\n }\n };\n const nodeNextReq = new NodeNextRequest(req);\n const nodeNextRes = new NodeNextResponse(res);\n const nextReq = NextRequestAdapter.fromNodeNextRequest(nodeNextReq, signalFromNodeResponse(res));\n try {\n const invokeRouteModule = async (span)=>{\n return routeModule.handle(nextReq, context).finally(()=>{\n if (!span) return;\n span.setAttributes({\n 'http.status_code': res.statusCode,\n 'next.rsc': false\n });\n const rootSpanAttributes = tracer.getRootSpanAttributes();\n // We were unable to get attributes, probably OTEL is not enabled\n if (!rootSpanAttributes) {\n return;\n }\n if (rootSpanAttributes.get('next.span_type') !== BaseServerSpan.handleRequest) {\n console.warn(`Unexpected root span type '${rootSpanAttributes.get('next.span_type')}'. Please report this Next.js issue https://github.com/vercel/next.js`);\n return;\n }\n const route = rootSpanAttributes.get('next.route');\n if (route) {\n const name = `${method} ${route}`;\n span.setAttributes({\n 'next.route': route,\n 'http.route': route,\n 'next.span_name': name\n });\n span.updateName(name);\n } else {\n span.updateName(`${method} ${srcPage}`);\n }\n });\n };\n const isMinimalMode = Boolean(process.env.MINIMAL_MODE || getRequestMeta(req, 'minimalMode'));\n const handleResponse = async (currentSpan)=>{\n var _cacheEntry_value;\n const responseGenerator = async ({ previousCacheEntry })=>{\n try {\n if (!isMinimalMode && isOnDemandRevalidate && revalidateOnlyGenerated && !previousCacheEntry) {\n res.statusCode = 404;\n // on-demand revalidate always sets this header\n res.setHeader('x-nextjs-cache', 'REVALIDATED');\n res.end('This page could not be found');\n return null;\n }\n const response = await invokeRouteModule(currentSpan);\n req.fetchMetrics = context.renderOpts.fetchMetrics;\n let pendingWaitUntil = context.renderOpts.pendingWaitUntil;\n // Attempt using provided waitUntil if available\n // if it's not we fallback to sendResponse's handling\n if (pendingWaitUntil) {\n if (ctx.waitUntil) {\n ctx.waitUntil(pendingWaitUntil);\n pendingWaitUntil = undefined;\n }\n }\n const cacheTags = context.renderOpts.collectedTags;\n // If the request is for a static response, we can cache it so long\n // as it's not edge.\n if (isIsr) {\n const blob = await response.blob();\n // Copy the headers from the response.\n const headers = toNodeOutgoingHttpHeaders(response.headers);\n if (cacheTags) {\n headers[NEXT_CACHE_TAGS_HEADER] = cacheTags;\n }\n if (!headers['content-type'] && blob.type) {\n headers['content-type'] = blob.type;\n }\n const revalidate = typeof context.renderOpts.collectedRevalidate === 'undefined' || context.renderOpts.collectedRevalidate >= INFINITE_CACHE ? false : context.renderOpts.collectedRevalidate;\n const expire = typeof context.renderOpts.collectedExpire === 'undefined' || context.renderOpts.collectedExpire >= INFINITE_CACHE ? undefined : context.renderOpts.collectedExpire;\n // Create the cache entry for the response.\n const cacheEntry = {\n value: {\n kind: CachedRouteKind.APP_ROUTE,\n status: response.status,\n body: Buffer.from(await blob.arrayBuffer()),\n headers\n },\n cacheControl: {\n revalidate,\n expire\n }\n };\n return cacheEntry;\n } else {\n // send response without caching if not ISR\n await sendResponse(nodeNextReq, nodeNextRes, response, context.renderOpts.pendingWaitUntil);\n return null;\n }\n } catch (err) {\n // if this is a background revalidate we need to report\n // the request error here as it won't be bubbled\n if (previousCacheEntry == null ? void 0 : previousCacheEntry.isStale) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: srcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n throw err;\n }\n };\n const cacheEntry = await routeModule.handleResponse({\n req,\n nextConfig,\n cacheKey,\n routeKind: RouteKind.APP_ROUTE,\n isFallback: false,\n prerenderManifest,\n isRoutePPREnabled: false,\n isOnDemandRevalidate,\n revalidateOnlyGenerated,\n responseGenerator,\n waitUntil: ctx.waitUntil,\n isMinimalMode\n });\n // we don't create a cacheEntry for ISR\n if (!isIsr) {\n return null;\n }\n if ((cacheEntry == null ? void 0 : (_cacheEntry_value = cacheEntry.value) == null ? void 0 : _cacheEntry_value.kind) !== CachedRouteKind.APP_ROUTE) {\n var _cacheEntry_value1;\n throw Object.defineProperty(new Error(`Invariant: app-route received invalid cache entry ${cacheEntry == null ? void 0 : (_cacheEntry_value1 = cacheEntry.value) == null ? void 0 : _cacheEntry_value1.kind}`), \"__NEXT_ERROR_CODE\", {\n value: \"E701\",\n enumerable: false,\n configurable: true\n });\n }\n if (!isMinimalMode) {\n res.setHeader('x-nextjs-cache', isOnDemandRevalidate ? 'REVALIDATED' : cacheEntry.isMiss ? 'MISS' : cacheEntry.isStale ? 'STALE' : 'HIT');\n }\n // Draft mode should never be cached\n if (isDraftMode) {\n res.setHeader('Cache-Control', 'private, no-cache, no-store, max-age=0, must-revalidate');\n }\n const headers = fromNodeOutgoingHttpHeaders(cacheEntry.value.headers);\n if (!(isMinimalMode && isIsr)) {\n headers.delete(NEXT_CACHE_TAGS_HEADER);\n }\n // If cache control is already set on the response we don't\n // override it to allow users to customize it via next.config\n if (cacheEntry.cacheControl && !res.getHeader('Cache-Control') && !headers.get('Cache-Control')) {\n headers.set('Cache-Control', getCacheControlHeader(cacheEntry.cacheControl));\n }\n await sendResponse(nodeNextReq, nodeNextRes, // @ts-expect-error - Argument of type 'Buffer<ArrayBufferLike>' is not assignable to parameter of type 'BodyInit | null | undefined'.\n new Response(cacheEntry.value.body, {\n headers,\n status: cacheEntry.value.status || 200\n }));\n return null;\n };\n // TODO: activeSpan code path is for when wrapped by\n // next-server can be removed when this is no longer used\n if (activeSpan) {\n await handleResponse(activeSpan);\n } else {\n await tracer.withPropagatedContext(req.headers, ()=>tracer.trace(BaseServerSpan.handleRequest, {\n spanName: `${method} ${srcPage}`,\n kind: SpanKind.SERVER,\n attributes: {\n 'http.method': method,\n 'http.target': req.url\n }\n }, handleResponse));\n }\n } catch (err) {\n if (!(err instanceof NoFallbackError)) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: normalizedSrcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n // rethrow so that we can handle serving error page\n // If this is during static generation, throw the error again.\n if (isIsr) throw err;\n // Otherwise, send a 500 response.\n await sendResponse(nodeNextReq, nodeNextRes, new Response(null, {\n status: 500\n }));\n return null;\n }\n}\n\n//# sourceMappingURL=app-route.js.map\n","// biome-ignore-all lint: generated file\n/* eslint-disable */\nimport { workflowEntrypoint } from 'workflow/runtime';\n\nconst workflowCode = `var __defProp = Object.defineProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\n\n// app/api/cloud/check-pr/workflow.ts\nvar workflow_exports = {};\n__export(workflow_exports, {\n cloudCheckPRWorkflow: () => cloudCheckPRWorkflow\n});\nasync function cloudCheckPRWorkflow(params) {\n const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n console.log(\\`[Workflow] Preview URL: \\${previewUrl}\\`);\n console.log(\\`[Workflow] PR #\\${prNumber}: \\${prTitle}\\`);\n console.log(\\`[Workflow] Changed files: \\${changedFiles.length}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n const report = await generateReportStep({\n prTitle,\n prBody,\n prNumber,\n previewUrl,\n changedFiles,\n pagesToCheck,\n crawlResults,\n verification,\n performanceResults,\n repoOwner,\n repoName\n });\n const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n return Response.json({\n success: verification.allChecksPassed,\n reportUrl: blobResult.blobUrl,\n prComment: true,\n verification: verification.summary,\n performance: performanceResults.summary,\n message: verification.allChecksPassed ? \"All PR checks passed! \\\\u2705\" : \"Some PR checks failed - see report for details\"\n });\n}\n__name(cloudCheckPRWorkflow, \"cloudCheckPRWorkflow\");\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n\n// app/api/cloud/fix-workflow/workflow.ts\nvar workflow_exports2 = {};\n__export(workflow_exports2, {\n cloudFixWorkflow: () => cloudFixWorkflow\n});\nasync function cloudFixWorkflow(params) {\n const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch } = params;\n console.log(\"[Workflow] Starting cloud fix workflow...\");\n console.log(\\`[Workflow] Dev URL: \\${devUrl}\\`);\n console.log(\\`[Workflow] Project: \\${projectName}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n console.log(\\`[Workflow] Bypass Token: \\${bypassToken ? \"provided\" : \"not provided\"}\\`);\n if (repoOwner && repoName) {\n console.log(\\`[Workflow] GitHub Repo: \\${repoOwner}/\\${repoName}\\`);\n console.log(\\`[Workflow] Base Branch: \\${baseBranch}\\`);\n }\n if (repoUrl) {\n console.log(\\`[Workflow] Will create sandbox from: \\${repoUrl}\\`);\n console.log(\\`[Workflow] Branch: \\${repoBranch || \"main\"}\\`);\n }\n const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from param: \\${!!vercelOidcTokenParam}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from env: \\${!!process.env.VERCEL_OIDC_TOKEN}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN available: \\${!!vercelOidcToken}\\`);\n let sandboxInfo = null;\n if (repoUrl) {\n sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n }\n const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n const logAnalysis = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError);\n const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl);\n let prResult = null;\n const hasGitPatch = fixProposal.includes(\"\\`\\`\\`diff\");\n if (repoOwner && repoName && hasGitPatch) {\n prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n } else if (repoOwner && repoName && !hasGitPatch) {\n console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n }\n return Response.json({\n ...blobResult,\n pr: prResult\n });\n}\n__name(cloudFixWorkflow, \"cloudFixWorkflow\");\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n\n// virtual-entry.js\nglobalThis.__private_workflows = /* @__PURE__ */ new Map();\nObject.values(workflow_exports).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\nObject.values(workflow_exports2).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\n//# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["app/api/cloud/check-pr/workflow.ts", "app/api/cloud/fix-workflow/workflow.ts", "virtual-entry.js"],
  "sourcesContent": ["/**\n * Cloud Check PR Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that checks a PR's changes\n */ /**__internal_workflows{\"workflows\":{\"app/api/cloud/check-pr/workflow.ts\":{\"cloudCheckPRWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\"}}},\"steps\":{\"app/api/cloud/check-pr/workflow.ts\":{\"checkPerformanceStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\"},\"crawlPreviewPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\"},\"generateReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\"},\"identifyAffectedPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\"},\"uploadReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\"},\"verifyPRClaimsStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\"}}}}*/;\nexport async function cloudCheckPRWorkflow(params) {\n    const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n    console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n    console.log(`[Workflow] Preview URL: ${previewUrl}`);\n    console.log(`[Workflow] PR #${prNumber}: ${prTitle}`);\n    console.log(`[Workflow] Changed files: ${changedFiles.length}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    // Step 1: Determine which pages to check based on changed files\n    const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n    // Step 2: Crawl the preview deployment\n    const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n    // Step 3: Verify PR claims against actual behavior\n    const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n    // Step 4: Check performance metrics\n    const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n    // Step 5: Generate comprehensive report\n    const report = await generateReportStep({\n        prTitle,\n        prBody,\n        prNumber,\n        previewUrl,\n        changedFiles,\n        pagesToCheck,\n        crawlResults,\n        verification,\n        performanceResults,\n        repoOwner,\n        repoName\n    });\n    // Step 6: Upload report to blob storage\n    const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n    return Response.json({\n        success: verification.allChecksPassed,\n        reportUrl: blobResult.blobUrl,\n        prComment: true,\n        verification: verification.summary,\n        performance: performanceResults.summary,\n        message: verification.allChecksPassed ? \"All PR checks passed! \u2705\" : \"Some PR checks failed - see report for details\"\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\n// biome-ignore lint/suspicious/noExplicitAny: AI-generated crawl data has dynamic structure\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\n// biome-ignore lint/suspicious/noExplicitAny: Report data has dynamic structure from previous steps\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n", "/**\n * Cloud Fix Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that orchestrates the fix process\n */ /**__internal_workflows{\"workflows\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"cloudFixWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\"}}},\"steps\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"analyzeLogsWithAgent\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\"},\"createD3kSandbox\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\"},\"createGitHubPR\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\"},\"fetchRealLogs\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\"},\"uploadToBlob\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\"}}}}*/;\nexport async function cloudFixWorkflow(params) {\n    const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch } = params;\n    console.log(\"[Workflow] Starting cloud fix workflow...\");\n    console.log(`[Workflow] Dev URL: ${devUrl}`);\n    console.log(`[Workflow] Project: ${projectName}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    console.log(`[Workflow] Bypass Token: ${bypassToken ? \"provided\" : \"not provided\"}`);\n    if (repoOwner && repoName) {\n        console.log(`[Workflow] GitHub Repo: ${repoOwner}/${repoName}`);\n        console.log(`[Workflow] Base Branch: ${baseBranch}`);\n    }\n    if (repoUrl) {\n        console.log(`[Workflow] Will create sandbox from: ${repoUrl}`);\n        console.log(`[Workflow] Branch: ${repoBranch || \"main\"}`);\n    }\n    // Use VERCEL_OIDC_TOKEN from params (passed from request header) or fall back to env\n    // At runtime, OIDC token is in x-vercel-oidc-token header, not process.env\n    const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from param: ${!!vercelOidcTokenParam}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN available: ${!!vercelOidcToken}`);\n    // Step 0: Create d3k sandbox if repoUrl provided\n    // This step also captures CLS data from inside the sandbox\n    let sandboxInfo = null;\n    if (repoUrl) {\n        sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n    }\n    // Step 1: Fetch real logs (using sandbox MCP if available, otherwise devUrl directly)\n    // If we got CLS data from Step 0, pass it to Step 1 to avoid re-fetching\n    // Use bypass token from sandbox if available, otherwise use provided one\n    const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n    const logAnalysis = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError);\n    // Step 2: Invoke AI agent to analyze logs and create fix\n    const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n    // Step 3: Upload to blob storage with full context\n    const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl);\n    // Step 4: Create GitHub PR if repo info provided AND there are actual fixes to apply\n    let prResult = null;\n    const hasGitPatch = fixProposal.includes(\"```diff\");\n    if (repoOwner && repoName && hasGitPatch) {\n        prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n    } else if (repoOwner && repoName && !hasGitPatch) {\n        console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n    }\n    // Note: Sandbox cleanup is handled automatically by the sandbox timeout\n    // We cannot store cleanup functions as they're not serializable\n    return Response.json({\n        ...blobResult,\n        pr: prResult\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n", "globalThis.__private_workflows = new Map();\nimport * as workflowFile0 from './app/api/cloud/check-pr/workflow.ts';\n            Object.values(workflowFile0).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))\nimport * as workflowFile1 from './app/api/cloud/fix-workflow/workflow.ts';\n            Object.values(workflowFile1).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))"],
  "mappings": ";;;;;;;;AAAA;AAAA;AAAA;AAAA;AAQA,eAAsB,qBAAqB,QAAQ;AAC/C,QAAM,EAAE,YAAY,SAAS,QAAQ,cAAc,WAAW,UAAU,SAAS,IAAI;AACrF,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,2BAA2B,UAAU,EAAE;AACnD,UAAQ,IAAI,kBAAkB,QAAQ,KAAK,OAAO,EAAE;AACpD,UAAQ,IAAI,6BAA6B,aAAa,MAAM,EAAE;AAC9D,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAE/D,QAAM,eAAe,MAAM,0BAA0B,cAAc,MAAM;AAEzE,QAAM,eAAe,MAAM,sBAAsB,YAAY,YAAY;AAEzE,QAAM,eAAe,MAAM,mBAAmB,SAAS,QAAQ,cAAc,YAAY;AAEzF,QAAM,qBAAqB,MAAM,qBAAqB,YAAY,YAAY;AAE9E,QAAM,SAAS,MAAM,mBAAmB;AAAA,IACpC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACJ,CAAC;AAED,QAAM,aAAa,MAAM,iBAAiB,QAAQ,WAAW,UAAU,QAAQ;AAC/E,SAAO,SAAS,KAAK;AAAA,IACjB,SAAS,aAAa;AAAA,IACtB,WAAW,WAAW;AAAA,IACtB,WAAW;AAAA,IACX,cAAc,aAAa;AAAA,IAC3B,aAAa,mBAAmB;AAAA,IAChC,SAAS,aAAa,kBAAkB,iCAA4B;AAAA,EACxE,CAAC;AACL;AAvCsB;AAyCtB,IAAI,4BAA4B,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,qEAAqE;AACjJ,IAAI,wBAAwB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,iEAAiE;AAEzI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AAEvI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC/H,qBAAqB,aAAa;;;ACzDlC,IAAAA,oBAAA;AAAA,SAAAA,mBAAA;AAAA;AAAA;AAQA,eAAsB,iBAAiB,QAAQ;AAC3C,QAAM,EAAE,QAAQ,aAAa,aAAa,iBAAiB,sBAAsB,WAAW,UAAU,aAAa,QAAQ,aAAa,SAAS,WAAW,IAAI;AAChK,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,uBAAuB,MAAM,EAAE;AAC3C,UAAQ,IAAI,uBAAuB,WAAW,EAAE;AAChD,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAC/D,UAAQ,IAAI,4BAA4B,cAAc,aAAa,cAAc,EAAE;AACnF,MAAI,aAAa,UAAU;AACvB,YAAQ,IAAI,2BAA2B,SAAS,IAAI,QAAQ,EAAE;AAC9D,YAAQ,IAAI,2BAA2B,UAAU,EAAE;AAAA,EACvD;AACA,MAAI,SAAS;AACT,YAAQ,IAAI,wCAAwC,OAAO,EAAE;AAC7D,YAAQ,IAAI,sBAAsB,cAAc,MAAM,EAAE;AAAA,EAC5D;AAGA,QAAM,kBAAkB,wBAAwB,QAAQ,IAAI;AAC5D,UAAQ,IAAI,4CAA4C,CAAC,CAAC,oBAAoB,EAAE;AAChF,UAAQ,IAAI,0CAA0C,CAAC,CAAC,QAAQ,IAAI,iBAAiB,EAAE;AACvF,UAAQ,IAAI,2CAA2C,CAAC,CAAC,eAAe,EAAE;AAG1E,MAAI,cAAc;AAClB,MAAI,SAAS;AACT,kBAAc,MAAM,iBAAiB,SAAS,cAAc,QAAQ,aAAa,aAAa,eAAe;AAAA,EACjH;AAIA,QAAM,uBAAuB,aAAa,eAAe;AACzD,QAAM,cAAc,MAAM,cAAc,aAAa,UAAU,QAAQ,sBAAsB,aAAa,QAAQ,aAAa,SAAS,aAAa,QAAQ;AAE7J,QAAM,cAAc,MAAM,qBAAqB,aAAa,aAAa,UAAU,MAAM;AAEzF,QAAM,aAAa,MAAM,aAAa,aAAa,aAAa,aAAa,aAAa,UAAU,MAAM;AAE1G,MAAI,WAAW;AACf,QAAM,cAAc,YAAY,SAAS,SAAS;AAClD,MAAI,aAAa,YAAY,aAAa;AACtC,eAAW,MAAM,eAAe,aAAa,WAAW,SAAS,WAAW,UAAU,YAAY,WAAW;AAAA,EACjH,WAAW,aAAa,YAAY,CAAC,aAAa;AAC9C,YAAQ,IAAI,0EAA0E;AAAA,EAC1F;AAGA,SAAO,SAAS,KAAK;AAAA,IACjB,GAAG;AAAA,IACH,IAAI;AAAA,EACR,CAAC;AACL;AAlDsB;AAoDtB,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AACnI,IAAI,gBAAgB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6DAA6D;AAC7H,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oEAAoE;AAC3I,IAAI,eAAe,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC3H,IAAI,iBAAiB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AAC/H,iBAAiB,aAAa;;;ACjE9B,WAAW,sBAAsB,oBAAI,IAAI;AAE7B,OAAO,OAAO,gBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;AAEtH,OAAO,OAAOC,iBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;",
  "names": ["workflow_exports", "workflow_exports"]
}
\n`;\n\nexport const POST = workflowEntrypoint(workflowCode);"],"names":[],"mappings":"uCAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,MACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,CAAA,CAAA,MAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OCfA,EAAA,CAAA,CAAA,OAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAgHtB,CAAC,CAEY,EAAO,CAAA,EAAA,EAAA,kBAAA,AAAkB,EAAC,2BDpGvC,IAAA,EAAA,EAAA,CAAA,CAAA,OAIA,IAAM,EAAc,IAAI,EAAA,mBAAmB,CAAC,CACxC,WAAY,CACR,KAAM,EAAA,SAAS,CAAC,SAAS,CACzB,KAAM,sCACN,SAAU,gCACV,SAAU,QACV,WAAY,EAChB,EACA,QAAS,CAAA,OACT,IADiD,eACc,CAA3C,EACpB,iBAAkB,iEAClB,iBAZqB,GAarB,SAAA,CACJ,GAIM,CAAE,kBAAgB,sBAAE,CAAoB,aAAE,CAAW,CAAE,CAAG,EAChE,SAAS,IACL,MAAO,CAAA,EAAA,EAAA,UAAA,AAAW,EAAC,kBACf,uBACA,CACJ,EACJ,CAEO,eAAe,EAAQ,CAAG,CAAE,CAAG,CAAE,CAAG,EACnC,EAAY,KAAK,EAAE,AACnB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,+BAAgC,QAAQ,MAAM,CAAC,MAAM,IAE7E,IAAI,EAAU,sCAKV,EAAU,EAAQ,OAAO,CAAC,WAAY,KAAO,IAMjD,IAAM,EAAgB,MAAM,EAAY,OAAO,CAAC,EAAK,EAAK,SACtD,EACA,mBAHE,CAAA,CAIN,GACA,GAAI,CAAC,EAID,OAHA,EAAI,IADY,MACF,CAAG,IACjB,EAAI,GAAG,CAAC,eACS,MAAjB,CAAwB,CAApB,IAAyB,KAAhB,EAAoB,EAAI,SAAS,CAAC,IAAI,CAAC,EAAK,QAAQ,OAAO,IACjE,KAEX,GAAM,SAAE,CAAO,QAAE,CAAM,CAAE,YAAU,WAAE,CAAS,aAAE,CAAW,mBAAE,CAAiB,qBAAE,CAAmB,sBAAE,CAAoB,yBAAE,CAAuB,kBAAE,CAAgB,yBAAE,CAAuB,uBAAE,CAAqB,CAAE,CAAG,EACnN,EAAoB,CAAA,EAAA,EAAA,gBAAA,AAAgB,EAAC,GACvC,GAAQ,EAAQ,EAAkB,aAAa,CAAC,EAAkB,EAAI,EAAkB,MAAM,CAAC,EAAA,AAAiB,EAC9G,EAAY,WAEV,AAAuB,QAAO,KAAK,EAAI,EAAoB,SAAA,AAAS,EAAE,AACtE,MAAM,EAAoB,SAAS,CAAC,EAAK,EAAK,GAAW,GAEzD,EAAI,GAAG,CAAC,gCAEL,MAEX,GAAI,GAAS,CAAC,EAAa,CACvB,IAAM,GAAgB,CAAQ,EAAkB,MAAM,CAAC,EAAiB,CAClE,EAAgB,EAAkB,aAAa,CAAC,EAAkB,CACxE,GAAI,IAC+B,IAA3B,EAAc,KADH,GACW,EAAc,CAAC,EAAe,CACpD,GAAI,EAAW,YAAY,CAAC,WAAW,CACnC,CADqC,MAC9B,MAAM,GAEjB,OAAM,IAAI,EAAA,eAAe,AAC7B,CAER,CACA,IAAI,EAAW,MACX,GAAU,EAAY,IAAb,CAAkB,EAAK,EAAD,EAG/B,EAAW,AAAa,OAHqB,KAC7C,EAAW,CAAA,EAEwB,IAAM,CAAA,EAE7C,IAAM,GACgB,IAAtB,EAAY,EAAkB,GAAb,EAEjB,CAAC,EAKK,EAAqB,GAAS,CAAC,EAIjC,GAAyB,GACzB,CAAA,EAAA,EAAA,iBADkD,aAClD,AAA8B,EAAC,CAC3B,KAAM,EACN,EAd2F,wBAe3F,wBACA,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,uBACnC,CACJ,EACJ,GAEJ,IAAM,EAAS,EAAI,MAAM,EAAI,MACvB,EAAS,CAAA,EAAA,EAAA,SAAS,AAAT,IACT,EAAa,EAAO,kBAAkB,GACtC,EAAU,QACZ,oBACA,EACA,WAAY,CACR,aAAc,CACV,gBAAgB,CAAQ,EAAW,YAAY,CAAC,cACpD,AADkE,EAElE,iBAAiB,CAAQ,EAAW,eAAe,yBACnD,EACA,iBAAkB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,oBACtC,kBAAmB,EAAW,SAAS,CACvC,UAAW,EAAI,SAAS,CACxB,QAAS,AAAC,IACN,EAAI,EAAE,CAAC,QAAS,EACpB,EACA,sBAAkB,EAClB,8BAA+B,CAAC,EAAO,EAAU,EAAc,IAAa,EAAY,cAAc,CAAC,EAAK,EAAO,EAAc,EAAY,EACjJ,EACA,cAAe,SACX,CACJ,CACJ,EACM,EAAc,IAAI,EAAA,eAAe,CAAC,GAClC,EAAc,IAAI,EAAA,gBAAgB,CAAC,GACnC,EAAU,EAAA,kBAAkB,CAAC,mBAAmB,CAAC,EAAa,CAAA,EAAA,EAAA,sBAAA,AAAsB,EAAC,IAC3F,GAAI,CACA,IAAM,EAAoB,MAAO,GACtB,EAAY,MAAM,CAAC,EAAS,GAAS,OAAO,CAAC,KAChD,GAAI,CAAC,EAAM,OACX,EAAK,aAAa,CAAC,CACf,mBAAoB,EAAI,UAAU,CAClC,YAAY,CAChB,GACA,IAAM,EAAqB,EAAO,qBAAqB,GAEvD,GAAI,CAAC,EACD,OAEJ,GAAI,EAAmB,GAAG,CAAC,EAHF,kBAGwB,EAAA,cAAc,CAAC,aAAa,CAAE,YAC3E,QAAQ,IAAI,CAAC,CAAC,2BAA2B,EAAE,EAAmB,GAAG,CAAC,kBAAkB,qEAAqE,CAAC,EAG9J,IAAM,EAAQ,EAAmB,GAAG,CAAC,cACrC,GAAI,EAAO,CACP,IAAM,EAAO,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAO,CACjC,EAAK,aAAa,CAAC,CACf,aAAc,EACd,aAAc,EACd,iBAAkB,CACtB,GACA,EAAK,UAAU,CAAC,EACpB,MACI,CADG,CACE,UAAU,CAAC,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAE9C,GAEE,GAAgB,CAAoC,CAAA,EAAA,EAAA,EAA5B,YAA4B,AAAc,EAAC,EAAK,eACxE,EAAiB,MAAO,QACtB,EA4FI,EA3FR,IAAM,EAAoB,MAAO,oBAAE,CAAkB,CAAE,IACnD,GAAI,CACA,GAAI,CAAC,GAAiB,GAAwB,GAA2B,CAAC,EAKtE,OAJA,EAAI,SADsF,CAC5E,CAAG,IAEjB,EAAI,SAAS,CAAC,iBAAkB,eAChC,EAAI,GAAG,CAAC,gCACD,KAEX,IAAM,EAAW,MAAM,EAAkB,GACzC,EAAI,YAAY,CAAG,EAAQ,UAAU,CAAC,YAAY,CAClD,IAAI,EAAmB,EAAQ,UAAU,CAAC,gBAAgB,CAGtD,GACI,EAAI,SAAS,EAAE,CACf,CAFc,CAEV,SAAS,CAAC,GACd,EAAmB,QAG3B,IAAM,EAAY,EAAQ,UAAU,CAAC,aAAa,CAGlD,IAAI,EA6BA,OADA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,EAAU,EAAQ,UAAU,CAAC,gBAAgB,EACnF,IA7BA,EACP,IAAM,EAAO,MAAM,EAAS,IAAI,GAE1B,EAAU,CAAA,EAAA,EAAA,yBAAA,AAAyB,EAAC,EAAS,OAAO,EACtD,IACA,CAAO,CAAC,EAAA,GADG,mBACmB,CAAC,CAAG,CAAA,EAElC,CAAC,CAAO,CAAC,eAAe,EAAI,EAAK,IAAI,EAAE,CACvC,CAAO,CAAC,eAAe,CAAG,EAAK,IAAI,AAAJ,EAEnC,IAAM,EAAa,KAAkD,IAA3C,EAAQ,UAAU,CAAC,mBAAmB,IAAoB,EAAQ,UAAU,CAAC,mBAAmB,EAAI,EAAA,cAAA,AAAc,GAAG,AAAQ,EAAQ,UAAU,CAAC,mBAAmB,CACvL,EAAS,KAA8C,IAAvC,EAAQ,UAAU,CAAC,eAAe,EAAoB,EAAQ,UAAU,CAAC,eAAe,EAAI,EAAA,cAAc,MAAG,EAAY,EAAQ,UAAU,CAAC,eAAe,CAcjL,MAZmB,CAYZ,AAXH,MAAO,CACH,KAAM,EAAA,eAAe,CAAC,SAAS,CAC/B,OAAQ,EAAS,MAAM,CACvB,KAAM,OAAO,IAAI,CAAC,MAAM,EAAK,WAAW,YACxC,CACJ,EACA,aAAc,CACV,oBACA,CACJ,CACJ,CAEJ,CAKJ,CAAE,KALS,CAKF,EAAK,CAeV,MAZ0B,MAAtB,EAA6B,KAAK,EAAI,EAAmB,OAAA,AAAO,EAAE,CAElE,MAAM,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,CAClC,0CACA,CACJ,EACJ,GAAG,AATgB,EASJ,GAEb,CACV,CACJ,EACM,EAAa,MAAM,EAAY,cAAc,CAAC,KAChD,EACA,aACA,WACA,UAAW,EAAA,SAAS,CAAC,SAAS,CAC9B,YAAY,oBACZ,EACA,mBAAmB,uBACnB,0BACA,EACA,oBACA,UAAW,EAAI,SAAS,eACxB,CACJ,GAEA,GAAI,CAAC,EACD,KADQ,EACD,KAEX,GAAI,CAAe,MAAd,CAAqB,EAAS,AAA0C,GAA9C,IAAK,EAAoB,EAAW,KAAA,AAAK,EAAY,KAAK,EAAI,EAAkB,IAAI,IAAM,EAAA,eAAe,CAAC,SAAS,CAE9I,CAFgJ,KAE1I,OAAO,cAAc,CAAC,AAAI,MAAM,CAAC,kDAAkD,EAAgB,MAAd,CAAqB,EAAS,AAA2C,GAA/C,IAAK,EAAqB,EAAW,KAAK,AAAL,EAAiB,KAAK,EAAI,EAAmB,IAAI,CAAA,CAAE,EAAG,oBAAqB,CACjO,MAAO,OACP,YAAY,EACZ,cAAc,CAClB,EAEA,CAAC,GACD,EAAI,SAAS,CADG,AACF,iBAAkB,EAAuB,cAAgB,EAAW,MAAM,CAAG,OAAS,EAAW,OAAO,CAAG,QAAU,OAGnI,GACA,EAAI,QADS,CACA,CAAC,gBAAiB,2DAEnC,IAAM,EAAU,CAAA,EAAA,EAAA,2BAAA,AAA2B,EAAC,EAAW,KAAK,CAAC,OAAO,EAcpE,OAbI,AAAE,CAAD,EAAkB,GACnB,EADwB,AAChB,GADmB,GACb,CAAC,EAAA,sBAAsB,GAIrC,EAAW,YAAY,EAAK,EAAI,AAAL,SAAc,CAAC,kBAAqB,EAAD,AAAS,GAAG,CAAC,kBAAkB,AAC7F,EAAQ,GAAG,CAAC,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,EAAW,YAAY,GAE9E,MAAM,CAAA,EAAA,EAAA,YAAY,AAAZ,EAAa,EAAa,EAChC,IAAI,SAAS,EAAW,KAAK,CAAC,IAAI,CAAE,SAChC,EACA,OAAQ,EAAW,KAAK,CAAC,MAAM,EAAI,GACvC,IACO,IACX,EAGI,EACA,MAAM,EAAe,EADT,CAGZ,MAAM,EAAO,qBAAqB,CAAC,EAAI,OAAO,CAAE,IAAI,EAAO,KAAK,CAAC,EAAA,cAAc,CAAC,aAAa,CAAE,CACvF,SAAU,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAChC,KAAM,EAAA,QAAQ,CAAC,MAAM,CACrB,WAAY,CACR,cAAe,EACf,cAAe,EAAI,GAAG,AAC1B,CACJ,EAAG,GAEf,CAAE,MAAO,EAAK,CAeV,GAdM,aAAe,EAAA,eAAe,EAEhC,CAFmC,KAE7B,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,EACA,sBACJ,EACJ,GAAG,AATgB,EASJ,GAIf,EAAO,MAAM,EAKjB,OAHA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,IAAI,SAAS,KAAM,CAC5D,OAAQ,GACZ,IACO,IACX,CACJ,EAEA,qCAAqC","ignoreList":[0]}
|
|
1
|
+
{"version":3,"sources":["../../../../node_modules/.pnpm/next%4016.1.0-canary.9_%40opentelemetry%2Bapi%401.9.0_babel-plugin-react-compiler%401.0.0_react-d_e89f05fa6262f945d2946e6441ada21f/node_modules/next/dist/esm/build/templates/app-route.js","../../../../mcp-server/app/.well-known/workflow/v1/flow/route.js"],"sourcesContent":["import { AppRouteRouteModule } from \"next/dist/esm/server/route-modules/app-route/module.compiled\";\nimport { RouteKind } from \"next/dist/esm/server/route-kind\";\nimport { patchFetch as _patchFetch } from \"next/dist/esm/server/lib/patch-fetch\";\nimport { addRequestMeta, getRequestMeta } from \"next/dist/esm/server/request-meta\";\nimport { getTracer, SpanKind } from \"next/dist/esm/server/lib/trace/tracer\";\nimport { setReferenceManifestsSingleton } from \"next/dist/esm/server/app-render/encryption-utils\";\nimport { createServerModuleMap } from \"next/dist/esm/server/app-render/action-utils\";\nimport { normalizeAppPath } from \"next/dist/esm/shared/lib/router/utils/app-paths\";\nimport { NodeNextRequest, NodeNextResponse } from \"next/dist/esm/server/base-http/node\";\nimport { NextRequestAdapter, signalFromNodeResponse } from \"next/dist/esm/server/web/spec-extension/adapters/next-request\";\nimport { BaseServerSpan } from \"next/dist/esm/server/lib/trace/constants\";\nimport { getRevalidateReason } from \"next/dist/esm/server/instrumentation/utils\";\nimport { sendResponse } from \"next/dist/esm/server/send-response\";\nimport { fromNodeOutgoingHttpHeaders, toNodeOutgoingHttpHeaders } from \"next/dist/esm/server/web/utils\";\nimport { getCacheControlHeader } from \"next/dist/esm/server/lib/cache-control\";\nimport { INFINITE_CACHE, NEXT_CACHE_TAGS_HEADER } from \"next/dist/esm/lib/constants\";\nimport { NoFallbackError } from \"next/dist/esm/shared/lib/no-fallback-error.external\";\nimport { CachedRouteKind } from \"next/dist/esm/server/response-cache\";\nimport * as userland from \"INNER_APP_ROUTE\";\n// We inject the nextConfigOutput here so that we can use them in the route\n// module.\nconst nextConfigOutput = \"\"\nconst routeModule = new AppRouteRouteModule({\n definition: {\n kind: RouteKind.APP_ROUTE,\n page: \"/.well-known/workflow/v1/flow/route\",\n pathname: \"/.well-known/workflow/v1/flow\",\n filename: \"route\",\n bundlePath: \"\"\n },\n distDir: process.env.__NEXT_RELATIVE_DIST_DIR || '',\n relativeProjectDir: process.env.__NEXT_RELATIVE_PROJECT_DIR || '',\n resolvedPagePath: \"[project]/mcp-server/app/.well-known/workflow/v1/flow/route.js\",\n nextConfigOutput,\n userland\n});\n// Pull out the exports that we need to expose from the module. This should\n// be eliminated when we've moved the other routes to the new format. These\n// are used to hook into the route.\nconst { workAsyncStorage, workUnitAsyncStorage, serverHooks } = routeModule;\nfunction patchFetch() {\n return _patchFetch({\n workAsyncStorage,\n workUnitAsyncStorage\n });\n}\nexport { routeModule, workAsyncStorage, workUnitAsyncStorage, serverHooks, patchFetch, };\nexport async function handler(req, res, ctx) {\n if (routeModule.isDev) {\n addRequestMeta(req, 'devRequestTimingInternalsEnd', process.hrtime.bigint());\n }\n let srcPage = \"/.well-known/workflow/v1/flow/route\";\n // turbopack doesn't normalize `/index` in the page name\n // so we need to to process dynamic routes properly\n // TODO: fix turbopack providing differing value from webpack\n if (process.env.TURBOPACK) {\n srcPage = srcPage.replace(/\\/index$/, '') || '/';\n } else if (srcPage === '/index') {\n // we always normalize /index specifically\n srcPage = '/';\n }\n const multiZoneDraftMode = process.env.__NEXT_MULTI_ZONE_DRAFT_MODE;\n const prepareResult = await routeModule.prepare(req, res, {\n srcPage,\n multiZoneDraftMode\n });\n if (!prepareResult) {\n res.statusCode = 400;\n res.end('Bad Request');\n ctx.waitUntil == null ? void 0 : ctx.waitUntil.call(ctx, Promise.resolve());\n return null;\n }\n const { buildId, params, nextConfig, parsedUrl, isDraftMode, prerenderManifest, routerServerContext, isOnDemandRevalidate, revalidateOnlyGenerated, resolvedPathname, clientReferenceManifest, serverActionsManifest } = prepareResult;\n const normalizedSrcPage = normalizeAppPath(srcPage);\n let isIsr = Boolean(prerenderManifest.dynamicRoutes[normalizedSrcPage] || prerenderManifest.routes[resolvedPathname]);\n const render404 = async ()=>{\n // TODO: should route-module itself handle rendering the 404\n if (routerServerContext == null ? void 0 : routerServerContext.render404) {\n await routerServerContext.render404(req, res, parsedUrl, false);\n } else {\n res.end('This page could not be found');\n }\n return null;\n };\n if (isIsr && !isDraftMode) {\n const isPrerendered = Boolean(prerenderManifest.routes[resolvedPathname]);\n const prerenderInfo = prerenderManifest.dynamicRoutes[normalizedSrcPage];\n if (prerenderInfo) {\n if (prerenderInfo.fallback === false && !isPrerendered) {\n if (nextConfig.experimental.adapterPath) {\n return await render404();\n }\n throw new NoFallbackError();\n }\n }\n }\n let cacheKey = null;\n if (isIsr && !routeModule.isDev && !isDraftMode) {\n cacheKey = resolvedPathname;\n // ensure /index and / is normalized to one key\n cacheKey = cacheKey === '/index' ? '/' : cacheKey;\n }\n const supportsDynamicResponse = // If we're in development, we always support dynamic HTML\n routeModule.isDev === true || // If this is not SSG or does not have static paths, then it supports\n // dynamic HTML.\n !isIsr;\n // This is a revalidation request if the request is for a static\n // page and it is not being resumed from a postponed render and\n // it is not a dynamic RSC request then it is a revalidation\n // request.\n const isStaticGeneration = isIsr && !supportsDynamicResponse;\n // Before rendering (which initializes component tree modules), we have to\n // set the reference manifests to our global store so Server Action's\n // encryption util can access to them at the top level of the page module.\n if (serverActionsManifest && clientReferenceManifest) {\n setReferenceManifestsSingleton({\n page: srcPage,\n clientReferenceManifest,\n serverActionsManifest,\n serverModuleMap: createServerModuleMap({\n serverActionsManifest\n })\n });\n }\n const method = req.method || 'GET';\n const tracer = getTracer();\n const activeSpan = tracer.getActiveScopeSpan();\n const context = {\n params,\n prerenderManifest,\n renderOpts: {\n experimental: {\n authInterrupts: Boolean(nextConfig.experimental.authInterrupts)\n },\n cacheComponents: Boolean(nextConfig.cacheComponents),\n supportsDynamicResponse,\n incrementalCache: getRequestMeta(req, 'incrementalCache'),\n cacheLifeProfiles: nextConfig.cacheLife,\n waitUntil: ctx.waitUntil,\n onClose: (cb)=>{\n res.on('close', cb);\n },\n onAfterTaskError: undefined,\n onInstrumentationRequestError: (error, _request, errorContext, silenceLog)=>routeModule.onRequestError(req, error, errorContext, silenceLog, routerServerContext)\n },\n sharedContext: {\n buildId\n }\n };\n const nodeNextReq = new NodeNextRequest(req);\n const nodeNextRes = new NodeNextResponse(res);\n const nextReq = NextRequestAdapter.fromNodeNextRequest(nodeNextReq, signalFromNodeResponse(res));\n try {\n const invokeRouteModule = async (span)=>{\n return routeModule.handle(nextReq, context).finally(()=>{\n if (!span) return;\n span.setAttributes({\n 'http.status_code': res.statusCode,\n 'next.rsc': false\n });\n const rootSpanAttributes = tracer.getRootSpanAttributes();\n // We were unable to get attributes, probably OTEL is not enabled\n if (!rootSpanAttributes) {\n return;\n }\n if (rootSpanAttributes.get('next.span_type') !== BaseServerSpan.handleRequest) {\n console.warn(`Unexpected root span type '${rootSpanAttributes.get('next.span_type')}'. Please report this Next.js issue https://github.com/vercel/next.js`);\n return;\n }\n const route = rootSpanAttributes.get('next.route');\n if (route) {\n const name = `${method} ${route}`;\n span.setAttributes({\n 'next.route': route,\n 'http.route': route,\n 'next.span_name': name\n });\n span.updateName(name);\n } else {\n span.updateName(`${method} ${srcPage}`);\n }\n });\n };\n const isMinimalMode = Boolean(process.env.MINIMAL_MODE || getRequestMeta(req, 'minimalMode'));\n const handleResponse = async (currentSpan)=>{\n var _cacheEntry_value;\n const responseGenerator = async ({ previousCacheEntry })=>{\n try {\n if (!isMinimalMode && isOnDemandRevalidate && revalidateOnlyGenerated && !previousCacheEntry) {\n res.statusCode = 404;\n // on-demand revalidate always sets this header\n res.setHeader('x-nextjs-cache', 'REVALIDATED');\n res.end('This page could not be found');\n return null;\n }\n const response = await invokeRouteModule(currentSpan);\n req.fetchMetrics = context.renderOpts.fetchMetrics;\n let pendingWaitUntil = context.renderOpts.pendingWaitUntil;\n // Attempt using provided waitUntil if available\n // if it's not we fallback to sendResponse's handling\n if (pendingWaitUntil) {\n if (ctx.waitUntil) {\n ctx.waitUntil(pendingWaitUntil);\n pendingWaitUntil = undefined;\n }\n }\n const cacheTags = context.renderOpts.collectedTags;\n // If the request is for a static response, we can cache it so long\n // as it's not edge.\n if (isIsr) {\n const blob = await response.blob();\n // Copy the headers from the response.\n const headers = toNodeOutgoingHttpHeaders(response.headers);\n if (cacheTags) {\n headers[NEXT_CACHE_TAGS_HEADER] = cacheTags;\n }\n if (!headers['content-type'] && blob.type) {\n headers['content-type'] = blob.type;\n }\n const revalidate = typeof context.renderOpts.collectedRevalidate === 'undefined' || context.renderOpts.collectedRevalidate >= INFINITE_CACHE ? false : context.renderOpts.collectedRevalidate;\n const expire = typeof context.renderOpts.collectedExpire === 'undefined' || context.renderOpts.collectedExpire >= INFINITE_CACHE ? undefined : context.renderOpts.collectedExpire;\n // Create the cache entry for the response.\n const cacheEntry = {\n value: {\n kind: CachedRouteKind.APP_ROUTE,\n status: response.status,\n body: Buffer.from(await blob.arrayBuffer()),\n headers\n },\n cacheControl: {\n revalidate,\n expire\n }\n };\n return cacheEntry;\n } else {\n // send response without caching if not ISR\n await sendResponse(nodeNextReq, nodeNextRes, response, context.renderOpts.pendingWaitUntil);\n return null;\n }\n } catch (err) {\n // if this is a background revalidate we need to report\n // the request error here as it won't be bubbled\n if (previousCacheEntry == null ? void 0 : previousCacheEntry.isStale) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: srcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n throw err;\n }\n };\n const cacheEntry = await routeModule.handleResponse({\n req,\n nextConfig,\n cacheKey,\n routeKind: RouteKind.APP_ROUTE,\n isFallback: false,\n prerenderManifest,\n isRoutePPREnabled: false,\n isOnDemandRevalidate,\n revalidateOnlyGenerated,\n responseGenerator,\n waitUntil: ctx.waitUntil,\n isMinimalMode\n });\n // we don't create a cacheEntry for ISR\n if (!isIsr) {\n return null;\n }\n if ((cacheEntry == null ? void 0 : (_cacheEntry_value = cacheEntry.value) == null ? void 0 : _cacheEntry_value.kind) !== CachedRouteKind.APP_ROUTE) {\n var _cacheEntry_value1;\n throw Object.defineProperty(new Error(`Invariant: app-route received invalid cache entry ${cacheEntry == null ? void 0 : (_cacheEntry_value1 = cacheEntry.value) == null ? void 0 : _cacheEntry_value1.kind}`), \"__NEXT_ERROR_CODE\", {\n value: \"E701\",\n enumerable: false,\n configurable: true\n });\n }\n if (!isMinimalMode) {\n res.setHeader('x-nextjs-cache', isOnDemandRevalidate ? 'REVALIDATED' : cacheEntry.isMiss ? 'MISS' : cacheEntry.isStale ? 'STALE' : 'HIT');\n }\n // Draft mode should never be cached\n if (isDraftMode) {\n res.setHeader('Cache-Control', 'private, no-cache, no-store, max-age=0, must-revalidate');\n }\n const headers = fromNodeOutgoingHttpHeaders(cacheEntry.value.headers);\n if (!(isMinimalMode && isIsr)) {\n headers.delete(NEXT_CACHE_TAGS_HEADER);\n }\n // If cache control is already set on the response we don't\n // override it to allow users to customize it via next.config\n if (cacheEntry.cacheControl && !res.getHeader('Cache-Control') && !headers.get('Cache-Control')) {\n headers.set('Cache-Control', getCacheControlHeader(cacheEntry.cacheControl));\n }\n await sendResponse(nodeNextReq, nodeNextRes, // @ts-expect-error - Argument of type 'Buffer<ArrayBufferLike>' is not assignable to parameter of type 'BodyInit | null | undefined'.\n new Response(cacheEntry.value.body, {\n headers,\n status: cacheEntry.value.status || 200\n }));\n return null;\n };\n // TODO: activeSpan code path is for when wrapped by\n // next-server can be removed when this is no longer used\n if (activeSpan) {\n await handleResponse(activeSpan);\n } else {\n await tracer.withPropagatedContext(req.headers, ()=>tracer.trace(BaseServerSpan.handleRequest, {\n spanName: `${method} ${srcPage}`,\n kind: SpanKind.SERVER,\n attributes: {\n 'http.method': method,\n 'http.target': req.url\n }\n }, handleResponse));\n }\n } catch (err) {\n if (!(err instanceof NoFallbackError)) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: normalizedSrcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n // rethrow so that we can handle serving error page\n // If this is during static generation, throw the error again.\n if (isIsr) throw err;\n // Otherwise, send a 500 response.\n await sendResponse(nodeNextReq, nodeNextRes, new Response(null, {\n status: 500\n }));\n return null;\n }\n}\n\n//# sourceMappingURL=app-route.js.map\n","// biome-ignore-all lint: generated file\n/* eslint-disable */\nimport { workflowEntrypoint } from 'workflow/runtime';\n\nconst workflowCode = `var __defProp = Object.defineProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\n\n// app/api/cloud/check-pr/workflow.ts\nvar workflow_exports = {};\n__export(workflow_exports, {\n cloudCheckPRWorkflow: () => cloudCheckPRWorkflow\n});\nasync function cloudCheckPRWorkflow(params) {\n const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n console.log(\\`[Workflow] Preview URL: \\${previewUrl}\\`);\n console.log(\\`[Workflow] PR #\\${prNumber}: \\${prTitle}\\`);\n console.log(\\`[Workflow] Changed files: \\${changedFiles.length}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n const report = await generateReportStep({\n prTitle,\n prBody,\n prNumber,\n previewUrl,\n changedFiles,\n pagesToCheck,\n crawlResults,\n verification,\n performanceResults,\n repoOwner,\n repoName\n });\n const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n return Response.json({\n success: verification.allChecksPassed,\n reportUrl: blobResult.blobUrl,\n prComment: true,\n verification: verification.summary,\n performance: performanceResults.summary,\n message: verification.allChecksPassed ? \"All PR checks passed! \\\\u2705\" : \"Some PR checks failed - see report for details\"\n });\n}\n__name(cloudCheckPRWorkflow, \"cloudCheckPRWorkflow\");\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n\n// app/api/cloud/fix-workflow/workflow.ts\nvar workflow_exports2 = {};\n__export(workflow_exports2, {\n cloudFixWorkflow: () => cloudFixWorkflow\n});\nasync function cloudFixWorkflow(params) {\n const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch } = params;\n console.log(\"[Workflow] Starting cloud fix workflow...\");\n console.log(\\`[Workflow] Dev URL: \\${devUrl}\\`);\n console.log(\\`[Workflow] Project: \\${projectName}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n console.log(\\`[Workflow] Bypass Token: \\${bypassToken ? \"provided\" : \"not provided\"}\\`);\n if (repoOwner && repoName) {\n console.log(\\`[Workflow] GitHub Repo: \\${repoOwner}/\\${repoName}\\`);\n console.log(\\`[Workflow] Base Branch: \\${baseBranch}\\`);\n }\n if (repoUrl) {\n console.log(\\`[Workflow] Will create sandbox from: \\${repoUrl}\\`);\n console.log(\\`[Workflow] Branch: \\${repoBranch || \"main\"}\\`);\n }\n const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from param: \\${!!vercelOidcTokenParam}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from env: \\${!!process.env.VERCEL_OIDC_TOKEN}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN available: \\${!!vercelOidcToken}\\`);\n let sandboxInfo = null;\n if (repoUrl) {\n sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n }\n const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n const step1Result = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError);\n const { logAnalysis, beforeScreenshotUrl } = step1Result;\n const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl, beforeScreenshotUrl);\n let prResult = null;\n const hasGitPatch = fixProposal.includes(\"\\`\\`\\`diff\");\n if (repoOwner && repoName && hasGitPatch) {\n prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n } else if (repoOwner && repoName && !hasGitPatch) {\n console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n }\n return Response.json({\n ...blobResult,\n pr: prResult\n });\n}\n__name(cloudFixWorkflow, \"cloudFixWorkflow\");\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n\n// virtual-entry.js\nglobalThis.__private_workflows = /* @__PURE__ */ new Map();\nObject.values(workflow_exports).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\nObject.values(workflow_exports2).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\n//# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["app/api/cloud/check-pr/workflow.ts", "app/api/cloud/fix-workflow/workflow.ts", "virtual-entry.js"],
  "sourcesContent": ["/**\n * Cloud Check PR Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that checks a PR's changes\n */ /**__internal_workflows{\"workflows\":{\"app/api/cloud/check-pr/workflow.ts\":{\"cloudCheckPRWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\"}}},\"steps\":{\"app/api/cloud/check-pr/workflow.ts\":{\"checkPerformanceStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\"},\"crawlPreviewPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\"},\"generateReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\"},\"identifyAffectedPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\"},\"uploadReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\"},\"verifyPRClaimsStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\"}}}}*/;\nexport async function cloudCheckPRWorkflow(params) {\n    const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n    console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n    console.log(`[Workflow] Preview URL: ${previewUrl}`);\n    console.log(`[Workflow] PR #${prNumber}: ${prTitle}`);\n    console.log(`[Workflow] Changed files: ${changedFiles.length}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    // Step 1: Determine which pages to check based on changed files\n    const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n    // Step 2: Crawl the preview deployment\n    const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n    // Step 3: Verify PR claims against actual behavior\n    const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n    // Step 4: Check performance metrics\n    const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n    // Step 5: Generate comprehensive report\n    const report = await generateReportStep({\n        prTitle,\n        prBody,\n        prNumber,\n        previewUrl,\n        changedFiles,\n        pagesToCheck,\n        crawlResults,\n        verification,\n        performanceResults,\n        repoOwner,\n        repoName\n    });\n    // Step 6: Upload report to blob storage\n    const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n    return Response.json({\n        success: verification.allChecksPassed,\n        reportUrl: blobResult.blobUrl,\n        prComment: true,\n        verification: verification.summary,\n        performance: performanceResults.summary,\n        message: verification.allChecksPassed ? \"All PR checks passed! \u2705\" : \"Some PR checks failed - see report for details\"\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\n// biome-ignore lint/suspicious/noExplicitAny: AI-generated crawl data has dynamic structure\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\n// biome-ignore lint/suspicious/noExplicitAny: Report data has dynamic structure from previous steps\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n", "/**\n * Cloud Fix Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that orchestrates the fix process\n */ /**__internal_workflows{\"workflows\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"cloudFixWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\"}}},\"steps\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"analyzeLogsWithAgent\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\"},\"createD3kSandbox\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\"},\"createGitHubPR\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\"},\"fetchRealLogs\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\"},\"uploadToBlob\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\"}}}}*/;\nexport async function cloudFixWorkflow(params) {\n    const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch } = params;\n    console.log(\"[Workflow] Starting cloud fix workflow...\");\n    console.log(`[Workflow] Dev URL: ${devUrl}`);\n    console.log(`[Workflow] Project: ${projectName}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    console.log(`[Workflow] Bypass Token: ${bypassToken ? \"provided\" : \"not provided\"}`);\n    if (repoOwner && repoName) {\n        console.log(`[Workflow] GitHub Repo: ${repoOwner}/${repoName}`);\n        console.log(`[Workflow] Base Branch: ${baseBranch}`);\n    }\n    if (repoUrl) {\n        console.log(`[Workflow] Will create sandbox from: ${repoUrl}`);\n        console.log(`[Workflow] Branch: ${repoBranch || \"main\"}`);\n    }\n    // Use VERCEL_OIDC_TOKEN from params (passed from request header) or fall back to env\n    // At runtime, OIDC token is in x-vercel-oidc-token header, not process.env\n    const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from param: ${!!vercelOidcTokenParam}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN available: ${!!vercelOidcToken}`);\n    // Step 0: Create d3k sandbox if repoUrl provided\n    // This step also captures CLS data from inside the sandbox\n    let sandboxInfo = null;\n    if (repoUrl) {\n        sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n    }\n    // Step 1: Fetch real logs (using sandbox MCP if available, otherwise devUrl directly)\n    // If we got CLS data from Step 0, pass it to Step 1 to avoid re-fetching\n    // Use bypass token from sandbox if available, otherwise use provided one\n    const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n    const step1Result = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError);\n    const { logAnalysis, beforeScreenshotUrl } = step1Result;\n    // Step 2: Invoke AI agent to analyze logs and create fix\n    const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n    // Step 3: Upload to blob storage with full context and screenshot\n    const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl, beforeScreenshotUrl);\n    // Step 4: Create GitHub PR if repo info provided AND there are actual fixes to apply\n    let prResult = null;\n    const hasGitPatch = fixProposal.includes(\"```diff\");\n    if (repoOwner && repoName && hasGitPatch) {\n        prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n    } else if (repoOwner && repoName && !hasGitPatch) {\n        console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n    }\n    // Note: Sandbox cleanup is handled automatically by the sandbox timeout\n    // We cannot store cleanup functions as they're not serializable\n    return Response.json({\n        ...blobResult,\n        pr: prResult\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n", "globalThis.__private_workflows = new Map();\nimport * as workflowFile0 from './app/api/cloud/check-pr/workflow.ts';\n            Object.values(workflowFile0).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))\nimport * as workflowFile1 from './app/api/cloud/fix-workflow/workflow.ts';\n            Object.values(workflowFile1).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))"],
  "mappings": ";;;;;;;;AAAA;AAAA;AAAA;AAAA;AAQA,eAAsB,qBAAqB,QAAQ;AAC/C,QAAM,EAAE,YAAY,SAAS,QAAQ,cAAc,WAAW,UAAU,SAAS,IAAI;AACrF,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,2BAA2B,UAAU,EAAE;AACnD,UAAQ,IAAI,kBAAkB,QAAQ,KAAK,OAAO,EAAE;AACpD,UAAQ,IAAI,6BAA6B,aAAa,MAAM,EAAE;AAC9D,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAE/D,QAAM,eAAe,MAAM,0BAA0B,cAAc,MAAM;AAEzE,QAAM,eAAe,MAAM,sBAAsB,YAAY,YAAY;AAEzE,QAAM,eAAe,MAAM,mBAAmB,SAAS,QAAQ,cAAc,YAAY;AAEzF,QAAM,qBAAqB,MAAM,qBAAqB,YAAY,YAAY;AAE9E,QAAM,SAAS,MAAM,mBAAmB;AAAA,IACpC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACJ,CAAC;AAED,QAAM,aAAa,MAAM,iBAAiB,QAAQ,WAAW,UAAU,QAAQ;AAC/E,SAAO,SAAS,KAAK;AAAA,IACjB,SAAS,aAAa;AAAA,IACtB,WAAW,WAAW;AAAA,IACtB,WAAW;AAAA,IACX,cAAc,aAAa;AAAA,IAC3B,aAAa,mBAAmB;AAAA,IAChC,SAAS,aAAa,kBAAkB,iCAA4B;AAAA,EACxE,CAAC;AACL;AAvCsB;AAyCtB,IAAI,4BAA4B,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,qEAAqE;AACjJ,IAAI,wBAAwB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,iEAAiE;AAEzI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AAEvI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC/H,qBAAqB,aAAa;;;ACzDlC,IAAAA,oBAAA;AAAA,SAAAA,mBAAA;AAAA;AAAA;AAQA,eAAsB,iBAAiB,QAAQ;AAC3C,QAAM,EAAE,QAAQ,aAAa,aAAa,iBAAiB,sBAAsB,WAAW,UAAU,aAAa,QAAQ,aAAa,SAAS,WAAW,IAAI;AAChK,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,uBAAuB,MAAM,EAAE;AAC3C,UAAQ,IAAI,uBAAuB,WAAW,EAAE;AAChD,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAC/D,UAAQ,IAAI,4BAA4B,cAAc,aAAa,cAAc,EAAE;AACnF,MAAI,aAAa,UAAU;AACvB,YAAQ,IAAI,2BAA2B,SAAS,IAAI,QAAQ,EAAE;AAC9D,YAAQ,IAAI,2BAA2B,UAAU,EAAE;AAAA,EACvD;AACA,MAAI,SAAS;AACT,YAAQ,IAAI,wCAAwC,OAAO,EAAE;AAC7D,YAAQ,IAAI,sBAAsB,cAAc,MAAM,EAAE;AAAA,EAC5D;AAGA,QAAM,kBAAkB,wBAAwB,QAAQ,IAAI;AAC5D,UAAQ,IAAI,4CAA4C,CAAC,CAAC,oBAAoB,EAAE;AAChF,UAAQ,IAAI,0CAA0C,CAAC,CAAC,QAAQ,IAAI,iBAAiB,EAAE;AACvF,UAAQ,IAAI,2CAA2C,CAAC,CAAC,eAAe,EAAE;AAG1E,MAAI,cAAc;AAClB,MAAI,SAAS;AACT,kBAAc,MAAM,iBAAiB,SAAS,cAAc,QAAQ,aAAa,aAAa,eAAe;AAAA,EACjH;AAIA,QAAM,uBAAuB,aAAa,eAAe;AACzD,QAAM,cAAc,MAAM,cAAc,aAAa,UAAU,QAAQ,sBAAsB,aAAa,QAAQ,aAAa,SAAS,aAAa,QAAQ;AAC7J,QAAM,EAAE,aAAa,oBAAoB,IAAI;AAE7C,QAAM,cAAc,MAAM,qBAAqB,aAAa,aAAa,UAAU,MAAM;AAEzF,QAAM,aAAa,MAAM,aAAa,aAAa,aAAa,aAAa,aAAa,UAAU,QAAQ,mBAAmB;AAE/H,MAAI,WAAW;AACf,QAAM,cAAc,YAAY,SAAS,SAAS;AAClD,MAAI,aAAa,YAAY,aAAa;AACtC,eAAW,MAAM,eAAe,aAAa,WAAW,SAAS,WAAW,UAAU,YAAY,WAAW;AAAA,EACjH,WAAW,aAAa,YAAY,CAAC,aAAa;AAC9C,YAAQ,IAAI,0EAA0E;AAAA,EAC1F;AAGA,SAAO,SAAS,KAAK;AAAA,IACjB,GAAG;AAAA,IACH,IAAI;AAAA,EACR,CAAC;AACL;AAnDsB;AAqDtB,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AACnI,IAAI,gBAAgB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6DAA6D;AAC7H,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oEAAoE;AAC3I,IAAI,eAAe,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC3H,IAAI,iBAAiB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AAC/H,iBAAiB,aAAa;;;AClE9B,WAAW,sBAAsB,oBAAI,IAAI;AAE7B,OAAO,OAAO,gBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;AAEtH,OAAO,OAAOC,iBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;",
  "names": ["workflow_exports", "workflow_exports"]
}
\n`;\n\nexport const POST = workflowEntrypoint(workflowCode);"],"names":[],"mappings":"uCAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,MACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,CAAA,CAAA,MAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OCfA,EAAA,CAAA,CAAA,OAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAiHtB,CAAC,CAEY,EAAO,CAAA,EAAA,EAAA,kBAAA,AAAkB,EAAC,2BDrGvC,IAAA,EAAA,EAAA,CAAA,CAAA,OAIA,IAAM,EAAc,IAAI,EAAA,mBAAmB,CAAC,CACxC,WAAY,CACR,KAAM,EAAA,SAAS,CAAC,SAAS,CACzB,KAAM,sCACN,SAAU,gCACV,SAAU,QACV,WAAY,EAChB,EACA,QAAS,CAAA,OACT,IADiD,eACc,CAA3C,EACpB,iBAAkB,iEAClB,iBAZqB,GAarB,SAAA,CACJ,GAIM,kBAAE,CAAgB,CAAE,sBAAoB,aAAE,CAAW,CAAE,CAAG,EAChE,SAAS,IACL,MAAO,CAAA,EAAA,EAAA,UAAA,AAAW,EAAC,kBACf,uBACA,CACJ,EACJ,CAEO,eAAe,EAAQ,CAAG,CAAE,CAAG,CAAE,CAAG,EACnC,EAAY,KAAK,EAAE,AACnB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,+BAAgC,QAAQ,MAAM,CAAC,MAAM,IAE7E,IAAI,EAAU,sCAKV,EAAU,EAAQ,OAAO,CAAC,WAAY,KAAO,IAMjD,IAAM,EAAgB,MAAM,EAAY,OAAO,CAAC,EAAK,EAAK,SACtD,EACA,mBAHE,CAAA,CAIN,GACA,GAAI,CAAC,EAID,OAHA,EAAI,IADY,MACF,CAAG,IACjB,EAAI,GAAG,CAAC,eACS,MAAjB,CAAwB,CAApB,IAAyB,KAAhB,EAAoB,EAAI,SAAS,CAAC,IAAI,CAAC,EAAK,QAAQ,OAAO,IACjE,KAEX,GAAM,SAAE,CAAO,QAAE,CAAM,YAAE,CAAU,CAAE,WAAS,aAAE,CAAW,mBAAE,CAAiB,qBAAE,CAAmB,sBAAE,CAAoB,yBAAE,CAAuB,kBAAE,CAAgB,yBAAE,CAAuB,uBAAE,CAAqB,CAAE,CAAG,EACnN,EAAoB,CAAA,EAAA,EAAA,gBAAA,AAAgB,EAAC,GACvC,GAAQ,CAAQ,GAAkB,aAAa,CAAC,EAAkB,EAAI,EAAkB,MAAM,CAAC,EAAA,AAAiB,EAC9G,EAAY,WAEa,MAAvB,EAA8B,KAAK,EAAI,EAAoB,SAAA,AAAS,EAAE,AACtE,MAAM,EAAoB,SAAS,CAAC,EAAK,EAAK,GAAW,GAEzD,EAAI,GAAG,CAAC,gCAEL,MAEX,GAAI,GAAS,CAAC,EAAa,CACvB,IAAM,GAAgB,CAAQ,EAAkB,MAAM,CAAC,EAAiB,CAClE,EAAgB,EAAkB,aAAa,CAAC,EAAkB,CACxE,GAAI,IAC+B,IAA3B,EAAc,KADH,GACW,EAAc,CAAC,EAAe,CACpD,GAAI,EAAW,YAAY,CAAC,WAAW,CACnC,CADqC,MAC9B,MAAM,GAEjB,OAAM,IAAI,EAAA,eAAe,AAC7B,CAER,CACA,IAAI,EAAW,MACX,GAAU,EAAY,IAAb,CAAkB,EAAK,EAAD,EAG/B,EAAW,AAAa,OAHqB,KAC7C,EAAW,CAAA,EAEwB,IAAM,CAAA,EAE7C,IAAM,EACN,CAAsB,MAAV,EAAkB,GAAb,EAEjB,CAAC,EAKK,EAAqB,GAAS,CAAC,EAIjC,GAAyB,GACzB,CAAA,EAAA,EAAA,iBADkD,aAClD,AAA8B,EAAC,CAC3B,KAAM,EACN,EAd2F,8CAe3F,EACA,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,uBACnC,CACJ,EACJ,GAEJ,IAAM,EAAS,EAAI,MAAM,EAAI,MACvB,EAAS,CAAA,EAAA,EAAA,SAAA,AAAS,IAClB,EAAa,EAAO,kBAAkB,GACtC,EAAU,QACZ,oBACA,EACA,WAAY,CACR,aAAc,CACV,eAAgB,EAAQ,EAAW,YAAY,CAAC,cAAc,AAClE,EACA,iBAAiB,CAAQ,EAAW,eAAe,yBACnD,EACA,iBAAkB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,oBACtC,kBAAmB,EAAW,SAAS,CACvC,UAAW,EAAI,SAAS,CACxB,QAAS,AAAC,IACN,EAAI,EAAE,CAAC,QAAS,EACpB,EACA,sBAAkB,EAClB,8BAA+B,CAAC,EAAO,EAAU,EAAc,IAAa,EAAY,cAAc,CAAC,EAAK,EAAO,EAAc,EAAY,EACjJ,EACA,cAAe,SACX,CACJ,CACJ,EACM,EAAc,IAAI,EAAA,eAAe,CAAC,GAClC,EAAc,IAAI,EAAA,gBAAgB,CAAC,GACnC,EAAU,EAAA,kBAAkB,CAAC,mBAAmB,CAAC,EAAa,CAAA,EAAA,EAAA,sBAAA,AAAsB,EAAC,IAC3F,GAAI,CACA,IAAM,EAAoB,MAAO,GACtB,EAAY,MAAM,CAAC,EAAS,GAAS,OAAO,CAAC,KAChD,GAAI,CAAC,EAAM,OACX,EAAK,aAAa,CAAC,CACf,mBAAoB,EAAI,UAAU,CAClC,YAAY,CAChB,GACA,IAAM,EAAqB,EAAO,qBAAqB,GAEvD,GAAI,CAAC,EACD,OAEJ,GAAI,EAAmB,GAAG,CAAC,EAHF,kBAGwB,EAAA,cAAc,CAAC,aAAa,CAAE,YAC3E,QAAQ,IAAI,CAAC,CAAC,2BAA2B,EAAE,EAAmB,GAAG,CAAC,kBAAkB,qEAAqE,CAAC,EAG9J,IAAM,EAAQ,EAAmB,GAAG,CAAC,cACrC,GAAI,EAAO,CACP,IAAM,EAAO,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAO,CACjC,EAAK,aAAa,CAAC,CACf,aAAc,EACd,aAAc,EACd,iBAAkB,CACtB,GACA,EAAK,UAAU,CAAC,EACpB,MACI,CADG,CACE,UAAU,CAAC,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAE9C,GAEE,GAAgB,CAAoC,CAAA,EAAA,EAAA,EAA5B,YAA4B,AAAc,EAAC,EAAK,eACxE,EAAiB,MAAO,QACtB,EA4FI,EA3FR,IAAM,EAAoB,MAAO,oBAAE,CAAkB,CAAE,IACnD,GAAI,CACA,GAAI,CAAC,GAAiB,GAAwB,GAA2B,CAAC,EAKtE,OAJA,EAAI,SADsF,CAC5E,CAAG,IAEjB,EAAI,SAAS,CAAC,iBAAkB,eAChC,EAAI,GAAG,CAAC,gCACD,KAEX,IAAM,EAAW,MAAM,EAAkB,EACzC,GAAI,YAAY,CAAG,EAAQ,UAAU,CAAC,YAAY,CAClD,IAAI,EAAmB,EAAQ,UAAU,CAAC,gBAAgB,CAGtD,GACI,EAAI,SAAS,EAAE,CACf,CAFc,CAEV,SAAS,CAAC,GACd,OAAmB,GAG3B,IAAM,EAAY,EAAQ,UAAU,CAAC,aAAa,CAGlD,IAAI,EA6BA,OADA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,EAAU,EAAQ,UAAU,CAAC,gBAAgB,EACnF,IA7BA,EACP,IAAM,EAAO,MAAM,EAAS,IAAI,GAE1B,EAAU,CAAA,EAAA,EAAA,yBAAA,AAAyB,EAAC,EAAS,OAAO,EACtD,IACA,CAAO,CAAC,EAAA,GADG,mBACmB,CAAC,CAAG,CAAA,EAElC,CAAC,CAAO,CAAC,eAAe,EAAI,EAAK,IAAI,EAAE,CACvC,CAAO,CAAC,eAAe,CAAG,EAAK,IAAI,AAAJ,EAEnC,IAAM,EAAa,AAAkD,SAA3C,EAAQ,UAAU,CAAC,mBAAmB,IAAoB,EAAQ,UAAU,CAAC,mBAAmB,EAAI,EAAA,cAAA,AAAc,GAAG,AAAQ,EAAQ,UAAU,CAAC,mBAAmB,CACvL,EAAS,KAA8C,IAAvC,EAAQ,UAAU,CAAC,eAAe,EAAoB,EAAQ,UAAU,CAAC,eAAe,EAAI,EAAA,cAAc,MAAG,EAAY,EAAQ,UAAU,CAAC,eAAe,CAcjL,MAZmB,CAYZ,AAXH,MAAO,CACH,KAAM,EAAA,eAAe,CAAC,SAAS,CAC/B,OAAQ,EAAS,MAAM,CACvB,KAAM,OAAO,IAAI,CAAC,MAAM,EAAK,WAAW,YACxC,CACJ,EACA,aAAc,YACV,SACA,CACJ,CACJ,CAEJ,CAKJ,CAAE,KALS,CAKF,EAAK,CAeV,MAZ0B,MAAtB,EAA6B,KAAK,EAAI,EAAmB,OAAA,AAAO,EAAE,CAElE,MAAM,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,uBACA,CACJ,EACJ,GAAG,AATgB,EASJ,GAEb,CACV,CACJ,EACM,EAAa,MAAM,EAAY,cAAc,CAAC,CAChD,MACA,sBACA,EACA,UAAW,EAAA,SAAS,CAAC,SAAS,CAC9B,YAAY,oBACZ,EACA,mBAAmB,uBACnB,0BACA,oBACA,EACA,UAAW,EAAI,SAAS,eACxB,CACJ,GAEA,GAAI,CAAC,EACD,KADQ,EACD,KAEX,GAAI,CAAe,MAAd,CAAqB,EAAS,AAA0C,GAA9C,IAAK,EAAoB,EAAW,KAAA,AAAK,EAAY,KAAK,EAAI,EAAkB,IAAI,IAAM,EAAA,eAAe,CAAC,SAAS,CAE9I,CAFgJ,KAE1I,OAAO,cAAc,CAAC,AAAI,MAAM,CAAC,kDAAkD,EAAgB,MAAd,CAAqB,EAAS,AAA2C,GAA/C,IAAK,EAAqB,EAAW,KAAK,AAAL,EAAiB,KAAK,EAAI,EAAmB,IAAI,CAAA,CAAE,EAAG,oBAAqB,CACjO,MAAO,OACP,YAAY,EACZ,cAAc,CAClB,EAEA,CAAC,GACD,EAAI,SAAS,CADG,AACF,iBAAkB,EAAuB,cAAgB,EAAW,MAAM,CAAG,OAAS,EAAW,OAAO,CAAG,QAAU,OAGnI,GACA,EAAI,QADS,CACA,CAAC,gBAAiB,2DAEnC,IAAM,EAAU,CAAA,EAAA,EAAA,2BAAA,AAA2B,EAAC,EAAW,KAAK,CAAC,OAAO,EAcpE,OAbI,AAAE,CAAD,EAAkB,GACnB,EADwB,AAChB,GADmB,GACb,CAAC,EAAA,sBAAsB,GAIrC,EAAW,YAAY,EAAK,EAAI,AAAL,SAAc,CAAC,kBAAqB,EAAD,AAAS,GAAG,CAAC,kBAAkB,AAC7F,EAAQ,GAAG,CAAC,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,EAAW,YAAY,GAE9E,MAAM,CAAA,EAAA,EAAA,YAAY,AAAZ,EAAa,EAAa,EAChC,IAAI,SAAS,EAAW,KAAK,CAAC,IAAI,CAAE,SAChC,EACA,OAAQ,EAAW,KAAK,CAAC,MAAM,EAAI,GACvC,IACO,IACX,EAGI,EACA,MAAM,EAAe,EADT,CAGZ,MAAM,EAAO,qBAAqB,CAAC,EAAI,OAAO,CAAE,IAAI,EAAO,KAAK,CAAC,EAAA,cAAc,CAAC,aAAa,CAAE,CACvF,SAAU,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAChC,KAAM,EAAA,QAAQ,CAAC,MAAM,CACrB,WAAY,CACR,cAAe,EACf,cAAe,EAAI,GAAG,AAC1B,CACJ,EAAG,GAEf,CAAE,MAAO,EAAK,CAeV,GAdM,aAAe,EAAA,eAAe,EAEhC,CAFmC,KAE7B,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,uBACA,CACJ,EACJ,GAAG,AATgB,EASJ,GAIf,EAAO,MAAM,EAKjB,OAHA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,IAAI,SAAS,KAAM,CAC5D,OAAQ,GACZ,IACO,IACX,CACJ,EAEA,qCAAqC","ignoreList":[0]}
|
package/mcp-server/.next/server/chunks/mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js
CHANGED
|
@@ -1,11 +1,9 @@
|
|
|
1
|
-
module.exports=[1177,e=>{"use strict";async function t(e,t,o,s
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
${t
|
|
5
|
-
${t.substring(0,500)}`);let a=t.split("\n");console.log(`[Step 1] Response split into ${a.length} lines`);let r="",i=0,c=0;for(let e of a)if(e.startsWith("data: ")){i++;try{let t=JSON.parse(e.substring(6));if(console.log(`[Step 1] Parsed JSON line ${i}:`,JSON.stringify(t).substring(0,200)),t.result?.content)for(let e of t.result.content)"text"===e.type&&(c++,r+=e.text,console.log(`[Step 1] Added text content block ${c}, length: ${e.text.length}`));else t.error&&console.log(`[Step 1] ERROR in response: ${JSON.stringify(t.error)}`)}catch(t){console.log(`[Step 1] Failed to parse JSON line ${i}: ${t instanceof Error?t.message:String(t)}`),console.log(`[Step 1] Problem line: ${e.substring(0,200)}`)}}return console.log(`[Step 1] Processed ${i} data lines, ${c} content blocks`),console.log(`[Step 1] Got ${r.length} chars from fix_my_app (performance analysis)`),0===r.length&&console.log(`[Step 1] WARNING: fix_my_app returned NO data. Full response:
|
|
6
|
-
${t}`),`d3k Performance Analysis for ${n}
|
|
1
|
+
module.exports=[1177,e=>{"use strict";async function t(e,t,o,r,s){console.log(`[Step 0] Creating d3k sandbox for ${o}...`),console.log(`[Step 0] Repository: ${e}`),console.log(`[Step 0] Branch: ${t}`),console.log(`[Step 0] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`),console.log(`[Step 0] VERCEL_OIDC_TOKEN passed as param: ${!!s}`),console.log(`[Step 0] VERCEL_TOKEN available: ${!!process.env.VERCEL_TOKEN}`),console.log(`[Step 0] User access token provided: ${!!r}`),s&&!process.env.VERCEL_OIDC_TOKEN&&(process.env.VERCEL_OIDC_TOKEN=s,console.log("[Step 0] Set VERCEL_OIDC_TOKEN from workflow context"));let a=await createD3kSandboxUtil({repoUrl:e,branch:t,projectDir:"",packageManager:"pnpm",debug:!0});console.log("[Step 0] Sandbox created successfully"),console.log(`[Step 0] Dev URL: ${a.devUrl}`),console.log(`[Step 0] MCP URL: ${a.mcpUrl}`),console.log("[Step 0] Capturing CLS metrics from inside sandbox...");let n=null,l=null;async function i(e,t,o){let r=await e.runCommand({cmd:t,args:o}),s="",a="";for await(let e of r.logs())"stdout"===e.stream?s+=e.data:a+=e.data;return await r.wait(),{exitCode:r.exitCode,stdout:s,stderr:a}}try{let e='curl -s -X POST http://localhost:3684/mcp -H "Content-Type: application/json" -d \'{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"fix_my_app","arguments":{"mode":"snapshot","focusArea":"performance","returnRawData":true}}}\'';console.log("[Step 0] Executing MCP command inside sandbox..."),console.log(`[Step 0] MCP command: ${e.substring(0,200)}...`);let t="",o="",r=-1;try{let s=await i(a.sandbox,"bash",["-c",e]);t=s.stdout,o=s.stderr,r=s.exitCode,console.log(`[Step 0] MCP command exit code: ${r}`),console.log(`[Step 0] MCP stdout length: ${t.length} bytes`),o&&console.log(`[Step 0] MCP stderr: ${o.substring(0,500)}`)}catch(t){let e=t instanceof Error?t.message:String(t);console.log(`[Step 0] sandbox.runCommand threw: ${e}`),l=`sandbox.runCommand failed: ${e}`}if(0===r&&t)try{let e=JSON.parse(t);if(e.result?.content){for(let t of e.result.content)if("text"===t.type&&t.text)try{n=JSON.parse(t.text),console.log("[Step 0] Successfully parsed CLS data");break}catch{n={rawOutput:t.text}}}console.log("[Step 0] CLS data captured:",JSON.stringify(n).substring(0,500))}catch(e){l=`Failed to parse MCP response: ${e instanceof Error?e.message:String(e)}`,console.log(`[Step 0] ${l}`),console.log(`[Step 0] Raw stdout: ${t.substring(0,1e3)}`)}else 0!==r&&!l&&(l=`MCP command failed with exit code ${r}`,console.log(`[Step 0] ${l}`),o&&console.log(`[Step 0] stderr: ${o}`))}catch(e){l=`MCP execution error: ${e instanceof Error?e.message:String(e)}`,console.log(`[Step 0] ${l}`)}console.log("[Step 0] === Dumping sandbox logs before returning ===");try{let e=await i(a.sandbox,"sh",["-c",'for log in /home/vercel-sandbox/.d3k/logs/*.log; do [ -f "$log" ] && echo "=== $log ===" && tail -100 "$log" || true; done 2>/dev/null || echo "No log files found"']);console.log(e.stdout)}catch(e){console.log(`[Step 0] Failed to dump logs: ${e instanceof Error?e.message:String(e)}`)}return console.log("[Step 0] === End sandbox log dump ==="),{mcpUrl:a.mcpUrl,devUrl:a.devUrl,bypassToken:a.bypassToken,clsData:n,mcpError:l}}async function o(e,t,o,r,s){if(r)return console.log("[Step 1] Using CLS data captured in Step 0"),{logAnalysis:JSON.stringify(r,null,2),beforeScreenshotUrl:null};s&&console.log(`[Step 1] Note: MCP error from Step 0: ${s}`);let a=!!o,n=o||e,l=a?e:null;console.log(`[Step 1] Fetching logs from: ${n}`),console.log(`[Step 1] Using sandbox: ${a?"yes":"no"}`),l&&console.log(`[Step 1] MCP URL: ${l}`),console.log(`[Step 1] Bypass token: ${t?"provided":"not provided"}`);try{let e=t?`${n}?x-vercel-protection-bypass=${t}`:n;if(console.log(`[Step 1] Final URL: ${e.replace(t||"","***")}`),a&&l){console.log("[Step 1] Using d3k MCP server to capture CLS metrics and errors..."),console.log("[Step 1] Validating d3k MCP server access...");let t=new AbortController,o=setTimeout(()=>t.abort(),3e4);try{let e=await fetch(`${l}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/list"}),signal:t.signal});if(clearTimeout(o),e.ok){let t=await e.text();try{let e=null;for(let o of t.split("\n"))if(o.startsWith("data: "))try{e=JSON.parse(o.substring(6));break}catch{}e||(e=JSON.parse(t));let o=e.result?.tools?.map(e=>e.name)||[];console.log(`[Step 1] ✅ d3k MCP server accessible`),console.log(`[Step 1] Available tools (${o.length}): ${o.join(", ")}`);let r=o.some(e=>e.includes("chrome-devtools")),s=o.some(e=>e.includes("nextjs")),a=o.includes("fix_my_app");console.log(`[Step 1] Chrome DevTools MCP: ${r?"✅":"❌"}`),console.log(`[Step 1] Next.js DevTools MCP: ${s?"✅":"❌"}`),console.log(`[Step 1] fix_my_app tool: ${a?"✅":"❌"}`)}catch{console.log(`[Step 1] MCP server responded but couldn't parse tools list: ${t.substring(0,200)}`)}}else console.log(`[Step 1] ⚠️ MCP server not accessible: ${e.status}`)}catch(r){clearTimeout(o);let e=r instanceof Error?r.message:String(r),t=r instanceof Error&&"AbortError"===r.name;console.log(`[Step 1] ⚠️ Failed to validate MCP server: ${t?"Timed out after 30s":e}`)}console.log("[Step 1] Navigating browser to app URL...");let r=new AbortController,s=setTimeout(()=>r.abort(),3e4);try{let t=await fetch(`${l}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/call",params:{name:"execute_browser_action",arguments:{action:"navigate",params:{url:e}}}}),signal:r.signal});clearTimeout(s),t.ok?console.log("[Step 1] Browser navigation completed"):console.log(`[Step 1] Browser navigation failed: ${t.status}`)}catch(t){clearTimeout(s);let e=t instanceof Error&&"AbortError"===t.name;console.log(`[Step 1] Browser navigation error: ${e?"Timed out after 30s":t instanceof Error?t.message:String(t)}`)}console.log("[Step 1] Waiting 5s for page load..."),await new Promise(e=>setTimeout(e,5e3));let a=null;console.log("[Step 1] Capturing 'before' screenshot...");let i=new AbortController,c=setTimeout(()=>i.abort(),3e4);try{let e=await fetch(`${l}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/call",params:{name:"chrome-devtools_take_snapshot",arguments:{}}}),signal:i.signal});if(clearTimeout(c),e.ok){let t=await e.text();for(let e of t.split("\n"))if(e.startsWith("data: "))try{let t=JSON.parse(e.substring(6));if(t.result?.content){for(let e of t.result.content)if("image"===e.type&&e.data){let t=Buffer.from(e.data,"base64"),o=new Date().toISOString().replace(/[:.]/g,"-"),r=`screenshot-before-${o}.png`;a=(await put(r,t,{access:"public",contentType:"image/png"})).url,console.log(`[Step 1] ✅ Before screenshot uploaded: ${a}`)}}}catch{}a||(console.log("[Step 1] Screenshot response received but no image data found"),console.log(`[Step 1] Response preview: ${t.substring(0,500)}`))}else console.log(`[Step 1] Screenshot request failed: ${e.status}`)}catch(t){clearTimeout(c);let e=t instanceof Error&&"AbortError"===t.name;console.log(`[Step 1] Screenshot capture error: ${e?"Timed out after 30s":t instanceof Error?t.message:String(t)}`)}console.log("[Step 1] Fetching d3k logs from sandbox to verify it's working...");let p=new AbortController,g=setTimeout(()=>p.abort(),15e3);try{let e=await fetch(`${l}/api/logs`,{signal:p.signal});if(clearTimeout(g),e.ok){let t=await e.text();console.log(`[Step 1] d3k logs (last 1000 chars):
|
|
2
|
+
${t.slice(-1e3)}`)}else console.log(`[Step 1] Could not fetch d3k logs: ${e.status}`)}catch(t){clearTimeout(g);let e=t instanceof Error&&"AbortError"===t.name;console.log(`[Step 1] Failed to fetch d3k logs: ${e?"Timed out after 15s":t instanceof Error?t.message:String(t)}`)}console.log("[Step 1] Calling fix_my_app with focusArea='performance'...");let d=new AbortController,u=setTimeout(()=>d.abort(),18e4);try{let e=await fetch(`${l}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:1,method:"tools/call",params:{name:"fix_my_app",arguments:{mode:"snapshot",focusArea:"performance",timeRangeMinutes:5,returnRawData:!1}}}),signal:d.signal});if(clearTimeout(u),!e.ok)throw Error(`MCP request failed: ${e.status}`);let t=await e.text();console.log(`[Step 1] fix_my_app response length: ${t.length} bytes`),console.log(`[Step 1] fix_my_app response preview (first 500 chars):
|
|
3
|
+
${t.substring(0,500)}`);let o=t.split("\n");console.log(`[Step 1] Response split into ${o.length} lines`);let r="",s=0,i=0;for(let e of o)if(e.startsWith("data: ")){s++;try{let t=JSON.parse(e.substring(6));if(console.log(`[Step 1] Parsed JSON line ${s}:`,JSON.stringify(t).substring(0,200)),t.result?.content)for(let e of t.result.content)"text"===e.type&&(i++,r+=e.text,console.log(`[Step 1] Added text content block ${i}, length: ${e.text.length}`));else t.error&&console.log(`[Step 1] ERROR in response: ${JSON.stringify(t.error)}`)}catch(t){console.log(`[Step 1] Failed to parse JSON line ${s}: ${t instanceof Error?t.message:String(t)}`),console.log(`[Step 1] Problem line: ${e.substring(0,200)}`)}}return console.log(`[Step 1] Processed ${s} data lines, ${i} content blocks`),console.log(`[Step 1] Got ${r.length} chars from fix_my_app (performance analysis)`),0===r.length&&console.log(`[Step 1] WARNING: fix_my_app returned NO data. Full response:
|
|
4
|
+
${t}`),{logAnalysis:`d3k Performance Analysis for ${n}
|
|
7
5
|
|
|
8
|
-
${r}
|
|
6
|
+
${r}`,beforeScreenshotUrl:a}}catch(e){clearTimeout(u),e instanceof Error&&"AbortError"===e.name?console.log("[Step 1] fix_my_app timed out after 3 minutes, using fallback method"):console.log(`[Step 1] fix_my_app error: ${e instanceof Error?e.message:String(e)}`)}}console.log("[Step 1] Using AI Gateway with browser automation...");let o=createGateway({apiKey:process.env.AI_GATEWAY_API_KEY,baseURL:"https://ai-gateway.vercel.sh/v1/ai"})("anthropic/claude-sonnet-4-20250514"),r=`You are a web application debugger with access to browser automation tools via Playwright MCP.
|
|
9
7
|
|
|
10
8
|
Your task is to visit this URL and capture any errors, warnings, or issues:
|
|
11
9
|
${e}
|
|
@@ -25,26 +23,26 @@ Analyze the console messages and provide a detailed report including:
|
|
|
25
23
|
- Any visual issues you can identify from the screenshot
|
|
26
24
|
- Screenshot URL if captured
|
|
27
25
|
|
|
28
|
-
Format your response as a clear, structured report that helps identify what's broken in the application.`,{text:
|
|
26
|
+
Format your response as a clear, structured report that helps identify what's broken in the application.`,{text:s}=await generateText({model:o,prompt:r,toolChoice:"auto",maxTokens:4e3});return console.log(`[Step 1] Browser automation response (first 500 chars): ${s.substring(0,500)}...`),{logAnalysis:`Browser Automation Analysis for ${n}
|
|
29
27
|
|
|
30
|
-
${
|
|
31
|
-
`;return
|
|
28
|
+
${s}`,beforeScreenshotUrl:null}}catch(e){console.error("[Step 1] Error with browser automation:",e),console.log("[Step 1] Falling back to simple HTTP fetch...");try{let e=t?`${n}?x-vercel-protection-bypass=${t}`:n,o={"User-Agent":"dev3000-cloud-fix/1.0",Accept:"text/html,application/json,*/*"};t&&(o["x-vercel-protection-bypass"]=t);let r=await fetch(e,{method:"GET",headers:o}),s=await r.text(),a=`Dev Server URL: ${n}
|
|
29
|
+
`;return a+=`HTTP Status: ${r.status} ${r.statusText}
|
|
32
30
|
|
|
33
31
|
Note: Browser automation failed, using fallback HTTP fetch.
|
|
34
32
|
|
|
35
|
-
`,
|
|
33
|
+
`,r.ok||(a+=`ERROR: HTTP ${r.status} ${r.statusText}
|
|
36
34
|
|
|
37
|
-
`),
|
|
38
|
-
${
|
|
35
|
+
`),s.includes("ReferenceError")||s.includes("Error")||s.includes("error")?a+=`Response body contains error information:
|
|
36
|
+
${s.substring(0,5e3)}
|
|
39
37
|
|
|
40
|
-
`:
|
|
41
|
-
${
|
|
38
|
+
`:r.ok?a+="No errors detected in response.\n":a+=`Response body:
|
|
39
|
+
${s.substring(0,2e3)}
|
|
42
40
|
|
|
43
|
-
`,
|
|
41
|
+
`,{logAnalysis:a,beforeScreenshotUrl:null}}catch(t){let e=t instanceof Error?t.message:String(t);return{logAnalysis:`Failed to fetch logs from ${n}
|
|
44
42
|
|
|
45
43
|
Error: ${e}
|
|
46
44
|
|
|
47
|
-
This may indicate the dev server is not accessible or has crashed
|
|
45
|
+
This may indicate the dev server is not accessible or has crashed.`,beforeScreenshotUrl:null}}}}async function r(e,t){console.log("[Step 2] Invoking AI agent to analyze logs...");let o=createGateway({apiKey:process.env.AI_GATEWAY_API_KEY,baseURL:"https://ai-gateway.vercel.sh/v1/ai"})("anthropic/claude-sonnet-4-20250514"),r=`You are a skilled software engineer debugging an application.
|
|
48
46
|
|
|
49
47
|
The dev server is running at: ${t}
|
|
50
48
|
|
|
@@ -91,15 +89,23 @@ Format your response EXACTLY as follows:
|
|
|
91
89
|
IMPORTANT:
|
|
92
90
|
- The Git Patch section must be a valid unified diff that can be applied directly with 'git apply'.
|
|
93
91
|
- If no errors are found, respond with "✅ **SYSTEM HEALTHY** - No errors found" and do NOT include a Git Patch section.
|
|
94
|
-
- Only include a Git Patch if there are actual issues that need fixing.`,{text:
|
|
92
|
+
- Only include a Git Patch if there are actual issues that need fixing.`,{text:s}=await generateText({model:o,prompt:r});return console.log(`[Step 2] AI agent response (first 500 chars): ${s.substring(0,500)}...`),s}async function s(e,t,o,r,s){console.log("[Step 3] Uploading fix proposal to blob storage..."),s&&console.log(`[Step 3] Including before screenshot: ${s}`);let a=s?`## Before Screenshot
|
|
95
93
|
|
|
96
|
-
|
|
94
|
+
This screenshot was captured when the sandbox dev server first loaded, proving the page rendered successfully.
|
|
95
|
+
|
|
96
|
+

|
|
97
|
+
|
|
98
|
+
---
|
|
99
|
+
|
|
100
|
+
`:"",n=new Date().toISOString(),l=`# Fix Proposal for ${t}
|
|
101
|
+
|
|
102
|
+
**Generated**: ${n}
|
|
97
103
|
**Powered by**: [dev3000](https://github.com/vercel-labs/dev3000) with Claude Code
|
|
98
|
-
**Dev Server**: ${
|
|
104
|
+
**Dev Server**: ${r}
|
|
99
105
|
|
|
100
106
|
---
|
|
101
107
|
|
|
102
|
-
## Original Log Analysis
|
|
108
|
+
${a}## Original Log Analysis
|
|
103
109
|
|
|
104
110
|
\`\`\`
|
|
105
111
|
${o}
|
|
@@ -127,7 +133,7 @@ dev3000 monitors your development server, captures errors in real-time, and uses
|
|
|
127
133
|
- Suggest specific code changes
|
|
128
134
|
|
|
129
135
|
Learn more at https://github.com/vercel-labs/dev3000
|
|
130
|
-
`,n
|
|
136
|
+
`,i=n.replace(/[:.]/g,"-"),c=`fix-${t}-${i}.md`,p=await put(c,l,{access:"public",contentType:"text/markdown"});return console.log(`[Step 3] Fix proposal uploaded to: ${p.url}`),{success:!0,projectName:t,fixProposal:e,blobUrl:p.url,beforeScreenshotUrl:s||null,message:"Fix analysis completed and uploaded to blob storage"}}async function a(e,t,o,r,s,a){console.log(`[Step 4] Creating GitHub PR for ${o}/${r}...`);let n=process.env.GITHUB_TOKEN;if(!n)return console.error("[Step 4] GITHUB_TOKEN not found in environment"),{success:!1,error:"GitHub token not configured"};try{let l=e.match(/```diff\n([\s\S]*?)\n```/);if(!l)return console.error("[Step 4] No git patch found in fix proposal"),{success:!1,error:"No git patch found in fix proposal"};let i=l[1];console.log(`[Step 4] Extracted patch (${i.length} chars)`);let c=parsePatchToFileChanges(i);if(0===c.length)return console.error("[Step 4] Failed to parse any file changes from patch"),{success:!1,error:"Failed to parse file changes from patch"};console.log(`[Step 4] Parsed ${c.length} file change(s)`);let p=`dev3000-fix-${a}-${Date.now()}`;console.log(`[Step 4] Branch name: ${p}`);let g=await fetch(`https://api.github.com/repos/${o}/${r}/git/ref/heads/${s}`,{headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json"}});if(!g.ok){let e=await g.text();return console.error(`[Step 4] Failed to get base branch: ${e}`),{success:!1,error:`Failed to get base branch: ${g.status}`}}let d=(await g.json()).object.sha;console.log(`[Step 4] Base SHA: ${d}`);let u=await fetch(`https://api.github.com/repos/${o}/${r}/git/refs`,{method:"POST",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({ref:`refs/heads/${p}`,sha:d})});if(!u.ok){let e=await u.text();return console.error(`[Step 4] Failed to create branch: ${e}`),{success:!1,error:`Failed to create branch: ${u.status}`}}for(let e of(console.log(`[Step 4] Created branch: ${p}`),c)){console.log(`[Step 4] Processing file: ${e.path}`);let t=await fetch(`https://api.github.com/repos/${o}/${r}/contents/${e.path}?ref=${p}`,{headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json"}}),s="",l="";if(t.ok){let e=await t.json();l=e.sha,s=Buffer.from(e.content,"base64").toString("utf-8")}else console.log("[Step 4] File doesn't exist, will create new file");let i=applyPatchChanges(s,e.changes),c=await fetch(`https://api.github.com/repos/${o}/${r}/contents/${e.path}`,{method:"PUT",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({message:`Fix: Apply dev3000 fix for ${a}`,content:Buffer.from(i).toString("base64"),branch:p,...l&&{sha:l}})});if(!c.ok){let t=await c.text();return console.error(`[Step 4] Failed to update file ${e.path}: ${t}`),{success:!1,error:`Failed to update file ${e.path}: ${c.status}`}}console.log(`[Step 4] Updated file: ${e.path}`)}let h=`## Automated Fix Proposal
|
|
131
137
|
|
|
132
138
|
This PR was automatically generated by [dev3000](https://github.com/vercel-labs/dev3000) after analyzing your application.
|
|
133
139
|
|
|
@@ -140,6 +146,6 @@ ${e}
|
|
|
140
146
|
|
|
141
147
|
🤖 Generated with [Claude Code](https://claude.com/claude-code)
|
|
142
148
|
|
|
143
|
-
Co-Authored-By: Claude (dev3000) <noreply@anthropic.com>`,f=await fetch(`https://api.github.com/repos/${o}/${
|
|
149
|
+
Co-Authored-By: Claude (dev3000) <noreply@anthropic.com>`,f=await fetch(`https://api.github.com/repos/${o}/${r}/pulls`,{method:"POST",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({title:`Fix: ${a} - Automated fix from dev3000`,head:p,base:s,body:h})});if(!f.ok){let e=await f.text();return console.error(`[Step 4] Failed to create PR: ${e}`),{success:!1,error:`Failed to create PR: ${f.status}`}}let m=await f.json();return console.log(`[Step 4] Created PR: ${m.html_url}`),{success:!0,prUrl:m.html_url,prNumber:m.number,branch:p}}catch(e){return console.error("[Step 4] Error creating PR:",e),{success:!1,error:e instanceof Error?e.message:String(e)}}}async function n(e){console.log("[Cleanup] Stopping sandbox...");try{await e(),console.log("[Cleanup] Sandbox stopped successfully")}catch(e){console.error("[Cleanup] Error stopping sandbox:",e)}}e.s(["analyzeLogsWithAgent",()=>r,"cleanupSandbox",()=>n,"createD3kSandbox",()=>t,"createGitHubPR",()=>a,"fetchRealLogs",()=>o,"uploadToBlob",()=>s])}];
|
|
144
150
|
|
|
145
151
|
//# sourceMappingURL=mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js.map
|