dev3000 0.0.116 → 0.0.118

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (107) hide show
  1. package/dist/cdp-monitor.d.ts +1 -0
  2. package/dist/cdp-monitor.d.ts.map +1 -1
  3. package/dist/cdp-monitor.js +11 -2
  4. package/dist/cdp-monitor.js.map +1 -1
  5. package/dist/dev-environment.d.ts.map +1 -1
  6. package/dist/dev-environment.js +45 -4
  7. package/dist/dev-environment.js.map +1 -1
  8. package/mcp-server/.next/BUILD_ID +1 -1
  9. package/mcp-server/.next/build-manifest.json +2 -2
  10. package/mcp-server/.next/fallback-build-manifest.json +2 -2
  11. package/mcp-server/.next/prerender-manifest.json +3 -3
  12. package/mcp-server/.next/server/app/.well-known/workflow/v1/step/route.js +1 -1
  13. package/mcp-server/.next/server/app/.well-known/workflow/v1/step/route.js.nft.json +1 -1
  14. package/mcp-server/.next/server/app/_global-error.html +2 -2
  15. package/mcp-server/.next/server/app/_global-error.rsc +1 -1
  16. package/mcp-server/.next/server/app/_global-error.segments/__PAGE__.segment.rsc +1 -1
  17. package/mcp-server/.next/server/app/_global-error.segments/_full.segment.rsc +1 -1
  18. package/mcp-server/.next/server/app/_global-error.segments/_head.segment.rsc +1 -1
  19. package/mcp-server/.next/server/app/_global-error.segments/_index.segment.rsc +1 -1
  20. package/mcp-server/.next/server/app/_global-error.segments/_tree.segment.rsc +1 -1
  21. package/mcp-server/.next/server/app/_not-found/page_client-reference-manifest.js +1 -1
  22. package/mcp-server/.next/server/app/_not-found.html +1 -1
  23. package/mcp-server/.next/server/app/_not-found.rsc +2 -2
  24. package/mcp-server/.next/server/app/_not-found.segments/_full.segment.rsc +2 -2
  25. package/mcp-server/.next/server/app/_not-found.segments/_head.segment.rsc +1 -1
  26. package/mcp-server/.next/server/app/_not-found.segments/_index.segment.rsc +2 -2
  27. package/mcp-server/.next/server/app/_not-found.segments/_not-found/__PAGE__.segment.rsc +1 -1
  28. package/mcp-server/.next/server/app/_not-found.segments/_not-found.segment.rsc +1 -1
  29. package/mcp-server/.next/server/app/_not-found.segments/_tree.segment.rsc +2 -2
  30. package/mcp-server/.next/server/app/api/cloud/fix-workflow/route.js +1 -1
  31. package/mcp-server/.next/server/app/api/cloud/fix-workflow/route.js.nft.json +1 -1
  32. package/mcp-server/.next/server/app/api/cloud/start-fix/route.js +1 -1
  33. package/mcp-server/.next/server/app/api/cloud/start-fix/route.js.nft.json +1 -1
  34. package/mcp-server/.next/server/app/api/jank/[session]/route.js +1 -1
  35. package/mcp-server/.next/server/app/api/jank/[session]/route.js.nft.json +1 -1
  36. package/mcp-server/.next/server/app/auth/error/page_client-reference-manifest.js +1 -1
  37. package/mcp-server/.next/server/app/auth/error.html +1 -1
  38. package/mcp-server/.next/server/app/auth/error.rsc +2 -2
  39. package/mcp-server/.next/server/app/auth/error.segments/_full.segment.rsc +2 -2
  40. package/mcp-server/.next/server/app/auth/error.segments/_head.segment.rsc +1 -1
  41. package/mcp-server/.next/server/app/auth/error.segments/_index.segment.rsc +2 -2
  42. package/mcp-server/.next/server/app/auth/error.segments/_tree.segment.rsc +2 -2
  43. package/mcp-server/.next/server/app/auth/error.segments/auth/error/__PAGE__.segment.rsc +1 -1
  44. package/mcp-server/.next/server/app/auth/error.segments/auth/error.segment.rsc +1 -1
  45. package/mcp-server/.next/server/app/auth/error.segments/auth.segment.rsc +1 -1
  46. package/mcp-server/.next/server/app/index.html +1 -1
  47. package/mcp-server/.next/server/app/index.rsc +2 -2
  48. package/mcp-server/.next/server/app/index.segments/__PAGE__.segment.rsc +1 -1
  49. package/mcp-server/.next/server/app/index.segments/_full.segment.rsc +2 -2
  50. package/mcp-server/.next/server/app/index.segments/_head.segment.rsc +1 -1
  51. package/mcp-server/.next/server/app/index.segments/_index.segment.rsc +2 -2
  52. package/mcp-server/.next/server/app/index.segments/_tree.segment.rsc +2 -2
  53. package/mcp-server/.next/server/app/logs/page_client-reference-manifest.js +1 -1
  54. package/mcp-server/.next/server/app/mcp/route.js +1 -1
  55. package/mcp-server/.next/server/app/mcp/route.js.nft.json +1 -1
  56. package/mcp-server/.next/server/app/page_client-reference-manifest.js +1 -1
  57. package/mcp-server/.next/server/app/signin/page_client-reference-manifest.js +1 -1
  58. package/mcp-server/.next/server/app/video/[session]/page_client-reference-manifest.js +1 -1
  59. package/mcp-server/.next/server/app/workflows/[id]/report/page.js +1 -1
  60. package/mcp-server/.next/server/app/workflows/[id]/report/page.js.nft.json +1 -1
  61. package/mcp-server/.next/server/app/workflows/[id]/report/page_client-reference-manifest.js +1 -1
  62. package/mcp-server/.next/server/app/workflows/new/page_client-reference-manifest.js +1 -1
  63. package/mcp-server/.next/server/app/workflows/page_client-reference-manifest.js +1 -1
  64. package/mcp-server/.next/server/chunks/{[root-of-the-server]__ec6a1335._.js → [root-of-the-server]__1095b0eb._.js} +2 -2
  65. package/mcp-server/.next/server/chunks/[root-of-the-server]__1095b0eb._.js.map +1 -0
  66. package/mcp-server/.next/server/chunks/[root-of-the-server]__157de66b._.js +3 -3
  67. package/mcp-server/.next/server/chunks/[root-of-the-server]__157de66b._.js.map +1 -1
  68. package/mcp-server/.next/server/chunks/[root-of-the-server]__18ce35ee._.js +3 -0
  69. package/mcp-server/.next/server/chunks/[root-of-the-server]__18ce35ee._.js.map +1 -0
  70. package/mcp-server/.next/server/chunks/{[root-of-the-server]__2920484d._.js → [root-of-the-server]__29c39fca._.js} +2 -2
  71. package/mcp-server/.next/server/chunks/{[root-of-the-server]__2920484d._.js.map → [root-of-the-server]__29c39fca._.js.map} +1 -1
  72. package/mcp-server/.next/server/chunks/[root-of-the-server]__55642730._.js +3 -0
  73. package/mcp-server/.next/server/chunks/[root-of-the-server]__55642730._.js.map +1 -0
  74. package/mcp-server/.next/server/chunks/[root-of-the-server]__730a8fd0._.js +1 -1
  75. package/mcp-server/.next/server/chunks/[root-of-the-server]__730a8fd0._.js.map +1 -1
  76. package/mcp-server/.next/server/chunks/{[root-of-the-server]__ece7a7f7._.js → [root-of-the-server]__951b3108._.js} +2 -2
  77. package/mcp-server/.next/server/chunks/{[root-of-the-server]__bcb77a22._.js → [root-of-the-server]__fd11bb92._.js} +2 -2
  78. package/mcp-server/.next/server/chunks/bee4f_next_dist_esm_build_templates_app-route_1ece9366.js +34 -4
  79. package/mcp-server/.next/server/chunks/bee4f_next_dist_esm_build_templates_app-route_1ece9366.js.map +1 -1
  80. package/mcp-server/.next/server/chunks/mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js +19 -19
  81. package/mcp-server/.next/server/chunks/mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js.map +1 -1
  82. package/mcp-server/.next/server/chunks/mcp-server_lib_workflow-storage_ts_30ca7761._.js +3 -0
  83. package/mcp-server/.next/server/chunks/mcp-server_lib_workflow-storage_ts_30ca7761._.js.map +1 -0
  84. package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__bb161645._.js → [root-of-the-server]__34cc4876._.js} +2 -2
  85. package/mcp-server/.next/server/chunks/ssr/_cd4dc25e._.js.map +1 -1
  86. package/mcp-server/.next/server/chunks/ssr/mcp-server_app_workflows_new_new-workflow-client_tsx_1312c046._.js +1 -1
  87. package/mcp-server/.next/server/chunks/ssr/mcp-server_app_workflows_new_new-workflow-client_tsx_1312c046._.js.map +1 -1
  88. package/mcp-server/.next/server/server-reference-manifest.js +1 -1
  89. package/mcp-server/.next/server/server-reference-manifest.json +1 -1
  90. package/mcp-server/.next/static/chunks/{93db5737a327ab0c.js → 7b9a23e7f572d8a7.js} +1 -1
  91. package/mcp-server/.next/static/chunks/98585d170d82e3e8.css +1 -0
  92. package/mcp-server/app/api/cloud/fix-workflow/steps.ts +35 -4
  93. package/mcp-server/app/api/cloud/fix-workflow/workflow.ts +53 -1
  94. package/mcp-server/app/api/cloud/start-fix/route.ts +11 -2
  95. package/mcp-server/app/api/workflows/route.ts +36 -14
  96. package/mcp-server/app/workflows/new-workflow-modal.tsx +90 -23
  97. package/package.json +1 -1
  98. package/mcp-server/.next/server/chunks/[root-of-the-server]__c1681338._.js +0 -3
  99. package/mcp-server/.next/server/chunks/[root-of-the-server]__c1681338._.js.map +0 -1
  100. package/mcp-server/.next/server/chunks/[root-of-the-server]__ec6a1335._.js.map +0 -1
  101. package/mcp-server/.next/static/chunks/000849a6a897f531.css +0 -1
  102. /package/mcp-server/.next/server/chunks/{[root-of-the-server]__ece7a7f7._.js.map → [root-of-the-server]__951b3108._.js.map} +0 -0
  103. /package/mcp-server/.next/server/chunks/{[root-of-the-server]__bcb77a22._.js.map → [root-of-the-server]__fd11bb92._.js.map} +0 -0
  104. /package/mcp-server/.next/server/chunks/ssr/{[root-of-the-server]__bb161645._.js.map → [root-of-the-server]__34cc4876._.js.map} +0 -0
  105. /package/mcp-server/.next/static/{G5taiQ-Jp0B_MdvkQuoIT → GVm-012A2JbRg9oviNAqV}/_buildManifest.js +0 -0
  106. /package/mcp-server/.next/static/{G5taiQ-Jp0B_MdvkQuoIT → GVm-012A2JbRg9oviNAqV}/_clientMiddlewareManifest.json +0 -0
  107. /package/mcp-server/.next/static/{G5taiQ-Jp0B_MdvkQuoIT → GVm-012A2JbRg9oviNAqV}/_ssgManifest.js +0 -0
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../../node_modules/.pnpm/next%4016.1.0-canary.9_%40opentelemetry%2Bapi%401.9.0_babel-plugin-react-compiler%401.0.0_react-d_e89f05fa6262f945d2946e6441ada21f/node_modules/next/dist/esm/build/templates/app-route.js","../../../../mcp-server/app/.well-known/workflow/v1/flow/route.js"],"sourcesContent":["import { AppRouteRouteModule } from \"next/dist/esm/server/route-modules/app-route/module.compiled\";\nimport { RouteKind } from \"next/dist/esm/server/route-kind\";\nimport { patchFetch as _patchFetch } from \"next/dist/esm/server/lib/patch-fetch\";\nimport { addRequestMeta, getRequestMeta } from \"next/dist/esm/server/request-meta\";\nimport { getTracer, SpanKind } from \"next/dist/esm/server/lib/trace/tracer\";\nimport { setReferenceManifestsSingleton } from \"next/dist/esm/server/app-render/encryption-utils\";\nimport { createServerModuleMap } from \"next/dist/esm/server/app-render/action-utils\";\nimport { normalizeAppPath } from \"next/dist/esm/shared/lib/router/utils/app-paths\";\nimport { NodeNextRequest, NodeNextResponse } from \"next/dist/esm/server/base-http/node\";\nimport { NextRequestAdapter, signalFromNodeResponse } from \"next/dist/esm/server/web/spec-extension/adapters/next-request\";\nimport { BaseServerSpan } from \"next/dist/esm/server/lib/trace/constants\";\nimport { getRevalidateReason } from \"next/dist/esm/server/instrumentation/utils\";\nimport { sendResponse } from \"next/dist/esm/server/send-response\";\nimport { fromNodeOutgoingHttpHeaders, toNodeOutgoingHttpHeaders } from \"next/dist/esm/server/web/utils\";\nimport { getCacheControlHeader } from \"next/dist/esm/server/lib/cache-control\";\nimport { INFINITE_CACHE, NEXT_CACHE_TAGS_HEADER } from \"next/dist/esm/lib/constants\";\nimport { NoFallbackError } from \"next/dist/esm/shared/lib/no-fallback-error.external\";\nimport { CachedRouteKind } from \"next/dist/esm/server/response-cache\";\nimport * as userland from \"INNER_APP_ROUTE\";\n// We inject the nextConfigOutput here so that we can use them in the route\n// module.\nconst nextConfigOutput = \"\"\nconst routeModule = new AppRouteRouteModule({\n definition: {\n kind: RouteKind.APP_ROUTE,\n page: \"/.well-known/workflow/v1/flow/route\",\n pathname: \"/.well-known/workflow/v1/flow\",\n filename: \"route\",\n bundlePath: \"\"\n },\n distDir: process.env.__NEXT_RELATIVE_DIST_DIR || '',\n relativeProjectDir: process.env.__NEXT_RELATIVE_PROJECT_DIR || '',\n resolvedPagePath: \"[project]/mcp-server/app/.well-known/workflow/v1/flow/route.js\",\n nextConfigOutput,\n userland\n});\n// Pull out the exports that we need to expose from the module. This should\n// be eliminated when we've moved the other routes to the new format. These\n// are used to hook into the route.\nconst { workAsyncStorage, workUnitAsyncStorage, serverHooks } = routeModule;\nfunction patchFetch() {\n return _patchFetch({\n workAsyncStorage,\n workUnitAsyncStorage\n });\n}\nexport { routeModule, workAsyncStorage, workUnitAsyncStorage, serverHooks, patchFetch, };\nexport async function handler(req, res, ctx) {\n if (routeModule.isDev) {\n addRequestMeta(req, 'devRequestTimingInternalsEnd', process.hrtime.bigint());\n }\n let srcPage = \"/.well-known/workflow/v1/flow/route\";\n // turbopack doesn't normalize `/index` in the page name\n // so we need to to process dynamic routes properly\n // TODO: fix turbopack providing differing value from webpack\n if (process.env.TURBOPACK) {\n srcPage = srcPage.replace(/\\/index$/, '') || '/';\n } else if (srcPage === '/index') {\n // we always normalize /index specifically\n srcPage = '/';\n }\n const multiZoneDraftMode = process.env.__NEXT_MULTI_ZONE_DRAFT_MODE;\n const prepareResult = await routeModule.prepare(req, res, {\n srcPage,\n multiZoneDraftMode\n });\n if (!prepareResult) {\n res.statusCode = 400;\n res.end('Bad Request');\n ctx.waitUntil == null ? void 0 : ctx.waitUntil.call(ctx, Promise.resolve());\n return null;\n }\n const { buildId, params, nextConfig, parsedUrl, isDraftMode, prerenderManifest, routerServerContext, isOnDemandRevalidate, revalidateOnlyGenerated, resolvedPathname, clientReferenceManifest, serverActionsManifest } = prepareResult;\n const normalizedSrcPage = normalizeAppPath(srcPage);\n let isIsr = Boolean(prerenderManifest.dynamicRoutes[normalizedSrcPage] || prerenderManifest.routes[resolvedPathname]);\n const render404 = async ()=>{\n // TODO: should route-module itself handle rendering the 404\n if (routerServerContext == null ? void 0 : routerServerContext.render404) {\n await routerServerContext.render404(req, res, parsedUrl, false);\n } else {\n res.end('This page could not be found');\n }\n return null;\n };\n if (isIsr && !isDraftMode) {\n const isPrerendered = Boolean(prerenderManifest.routes[resolvedPathname]);\n const prerenderInfo = prerenderManifest.dynamicRoutes[normalizedSrcPage];\n if (prerenderInfo) {\n if (prerenderInfo.fallback === false && !isPrerendered) {\n if (nextConfig.experimental.adapterPath) {\n return await render404();\n }\n throw new NoFallbackError();\n }\n }\n }\n let cacheKey = null;\n if (isIsr && !routeModule.isDev && !isDraftMode) {\n cacheKey = resolvedPathname;\n // ensure /index and / is normalized to one key\n cacheKey = cacheKey === '/index' ? '/' : cacheKey;\n }\n const supportsDynamicResponse = // If we're in development, we always support dynamic HTML\n routeModule.isDev === true || // If this is not SSG or does not have static paths, then it supports\n // dynamic HTML.\n !isIsr;\n // This is a revalidation request if the request is for a static\n // page and it is not being resumed from a postponed render and\n // it is not a dynamic RSC request then it is a revalidation\n // request.\n const isStaticGeneration = isIsr && !supportsDynamicResponse;\n // Before rendering (which initializes component tree modules), we have to\n // set the reference manifests to our global store so Server Action's\n // encryption util can access to them at the top level of the page module.\n if (serverActionsManifest && clientReferenceManifest) {\n setReferenceManifestsSingleton({\n page: srcPage,\n clientReferenceManifest,\n serverActionsManifest,\n serverModuleMap: createServerModuleMap({\n serverActionsManifest\n })\n });\n }\n const method = req.method || 'GET';\n const tracer = getTracer();\n const activeSpan = tracer.getActiveScopeSpan();\n const context = {\n params,\n prerenderManifest,\n renderOpts: {\n experimental: {\n authInterrupts: Boolean(nextConfig.experimental.authInterrupts)\n },\n cacheComponents: Boolean(nextConfig.cacheComponents),\n supportsDynamicResponse,\n incrementalCache: getRequestMeta(req, 'incrementalCache'),\n cacheLifeProfiles: nextConfig.cacheLife,\n waitUntil: ctx.waitUntil,\n onClose: (cb)=>{\n res.on('close', cb);\n },\n onAfterTaskError: undefined,\n onInstrumentationRequestError: (error, _request, errorContext, silenceLog)=>routeModule.onRequestError(req, error, errorContext, silenceLog, routerServerContext)\n },\n sharedContext: {\n buildId\n }\n };\n const nodeNextReq = new NodeNextRequest(req);\n const nodeNextRes = new NodeNextResponse(res);\n const nextReq = NextRequestAdapter.fromNodeNextRequest(nodeNextReq, signalFromNodeResponse(res));\n try {\n const invokeRouteModule = async (span)=>{\n return routeModule.handle(nextReq, context).finally(()=>{\n if (!span) return;\n span.setAttributes({\n 'http.status_code': res.statusCode,\n 'next.rsc': false\n });\n const rootSpanAttributes = tracer.getRootSpanAttributes();\n // We were unable to get attributes, probably OTEL is not enabled\n if (!rootSpanAttributes) {\n return;\n }\n if (rootSpanAttributes.get('next.span_type') !== BaseServerSpan.handleRequest) {\n console.warn(`Unexpected root span type '${rootSpanAttributes.get('next.span_type')}'. Please report this Next.js issue https://github.com/vercel/next.js`);\n return;\n }\n const route = rootSpanAttributes.get('next.route');\n if (route) {\n const name = `${method} ${route}`;\n span.setAttributes({\n 'next.route': route,\n 'http.route': route,\n 'next.span_name': name\n });\n span.updateName(name);\n } else {\n span.updateName(`${method} ${srcPage}`);\n }\n });\n };\n const isMinimalMode = Boolean(process.env.MINIMAL_MODE || getRequestMeta(req, 'minimalMode'));\n const handleResponse = async (currentSpan)=>{\n var _cacheEntry_value;\n const responseGenerator = async ({ previousCacheEntry })=>{\n try {\n if (!isMinimalMode && isOnDemandRevalidate && revalidateOnlyGenerated && !previousCacheEntry) {\n res.statusCode = 404;\n // on-demand revalidate always sets this header\n res.setHeader('x-nextjs-cache', 'REVALIDATED');\n res.end('This page could not be found');\n return null;\n }\n const response = await invokeRouteModule(currentSpan);\n req.fetchMetrics = context.renderOpts.fetchMetrics;\n let pendingWaitUntil = context.renderOpts.pendingWaitUntil;\n // Attempt using provided waitUntil if available\n // if it's not we fallback to sendResponse's handling\n if (pendingWaitUntil) {\n if (ctx.waitUntil) {\n ctx.waitUntil(pendingWaitUntil);\n pendingWaitUntil = undefined;\n }\n }\n const cacheTags = context.renderOpts.collectedTags;\n // If the request is for a static response, we can cache it so long\n // as it's not edge.\n if (isIsr) {\n const blob = await response.blob();\n // Copy the headers from the response.\n const headers = toNodeOutgoingHttpHeaders(response.headers);\n if (cacheTags) {\n headers[NEXT_CACHE_TAGS_HEADER] = cacheTags;\n }\n if (!headers['content-type'] && blob.type) {\n headers['content-type'] = blob.type;\n }\n const revalidate = typeof context.renderOpts.collectedRevalidate === 'undefined' || context.renderOpts.collectedRevalidate >= INFINITE_CACHE ? false : context.renderOpts.collectedRevalidate;\n const expire = typeof context.renderOpts.collectedExpire === 'undefined' || context.renderOpts.collectedExpire >= INFINITE_CACHE ? undefined : context.renderOpts.collectedExpire;\n // Create the cache entry for the response.\n const cacheEntry = {\n value: {\n kind: CachedRouteKind.APP_ROUTE,\n status: response.status,\n body: Buffer.from(await blob.arrayBuffer()),\n headers\n },\n cacheControl: {\n revalidate,\n expire\n }\n };\n return cacheEntry;\n } else {\n // send response without caching if not ISR\n await sendResponse(nodeNextReq, nodeNextRes, response, context.renderOpts.pendingWaitUntil);\n return null;\n }\n } catch (err) {\n // if this is a background revalidate we need to report\n // the request error here as it won't be bubbled\n if (previousCacheEntry == null ? void 0 : previousCacheEntry.isStale) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: srcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n throw err;\n }\n };\n const cacheEntry = await routeModule.handleResponse({\n req,\n nextConfig,\n cacheKey,\n routeKind: RouteKind.APP_ROUTE,\n isFallback: false,\n prerenderManifest,\n isRoutePPREnabled: false,\n isOnDemandRevalidate,\n revalidateOnlyGenerated,\n responseGenerator,\n waitUntil: ctx.waitUntil,\n isMinimalMode\n });\n // we don't create a cacheEntry for ISR\n if (!isIsr) {\n return null;\n }\n if ((cacheEntry == null ? void 0 : (_cacheEntry_value = cacheEntry.value) == null ? void 0 : _cacheEntry_value.kind) !== CachedRouteKind.APP_ROUTE) {\n var _cacheEntry_value1;\n throw Object.defineProperty(new Error(`Invariant: app-route received invalid cache entry ${cacheEntry == null ? void 0 : (_cacheEntry_value1 = cacheEntry.value) == null ? void 0 : _cacheEntry_value1.kind}`), \"__NEXT_ERROR_CODE\", {\n value: \"E701\",\n enumerable: false,\n configurable: true\n });\n }\n if (!isMinimalMode) {\n res.setHeader('x-nextjs-cache', isOnDemandRevalidate ? 'REVALIDATED' : cacheEntry.isMiss ? 'MISS' : cacheEntry.isStale ? 'STALE' : 'HIT');\n }\n // Draft mode should never be cached\n if (isDraftMode) {\n res.setHeader('Cache-Control', 'private, no-cache, no-store, max-age=0, must-revalidate');\n }\n const headers = fromNodeOutgoingHttpHeaders(cacheEntry.value.headers);\n if (!(isMinimalMode && isIsr)) {\n headers.delete(NEXT_CACHE_TAGS_HEADER);\n }\n // If cache control is already set on the response we don't\n // override it to allow users to customize it via next.config\n if (cacheEntry.cacheControl && !res.getHeader('Cache-Control') && !headers.get('Cache-Control')) {\n headers.set('Cache-Control', getCacheControlHeader(cacheEntry.cacheControl));\n }\n await sendResponse(nodeNextReq, nodeNextRes, // @ts-expect-error - Argument of type 'Buffer<ArrayBufferLike>' is not assignable to parameter of type 'BodyInit | null | undefined'.\n new Response(cacheEntry.value.body, {\n headers,\n status: cacheEntry.value.status || 200\n }));\n return null;\n };\n // TODO: activeSpan code path is for when wrapped by\n // next-server can be removed when this is no longer used\n if (activeSpan) {\n await handleResponse(activeSpan);\n } else {\n await tracer.withPropagatedContext(req.headers, ()=>tracer.trace(BaseServerSpan.handleRequest, {\n spanName: `${method} ${srcPage}`,\n kind: SpanKind.SERVER,\n attributes: {\n 'http.method': method,\n 'http.target': req.url\n }\n }, handleResponse));\n }\n } catch (err) {\n if (!(err instanceof NoFallbackError)) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: normalizedSrcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n // rethrow so that we can handle serving error page\n // If this is during static generation, throw the error again.\n if (isIsr) throw err;\n // Otherwise, send a 500 response.\n await sendResponse(nodeNextReq, nodeNextRes, new Response(null, {\n status: 500\n }));\n return null;\n }\n}\n\n//# sourceMappingURL=app-route.js.map\n","// biome-ignore-all lint: generated file\n/* eslint-disable */\nimport { workflowEntrypoint } from 'workflow/runtime';\n\nconst workflowCode = `var __defProp = Object.defineProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\n\n// app/api/cloud/fix-workflow/workflow.ts\nvar workflow_exports = {};\n__export(workflow_exports, {\n cloudFixWorkflow: () => cloudFixWorkflow\n});\nasync function cloudFixWorkflow(params) {\n const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch } = params;\n console.log(\"[Workflow] Starting cloud fix workflow...\");\n console.log(\\`[Workflow] Dev URL: \\${devUrl}\\`);\n console.log(\\`[Workflow] Project: \\${projectName}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n console.log(\\`[Workflow] Bypass Token: \\${bypassToken ? \"provided\" : \"not provided\"}\\`);\n if (repoOwner && repoName) {\n console.log(\\`[Workflow] GitHub Repo: \\${repoOwner}/\\${repoName}\\`);\n console.log(\\`[Workflow] Base Branch: \\${baseBranch}\\`);\n }\n if (repoUrl) {\n console.log(\\`[Workflow] Will create sandbox from: \\${repoUrl}\\`);\n console.log(\\`[Workflow] Branch: \\${repoBranch || \"main\"}\\`);\n }\n const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from param: \\${!!vercelOidcTokenParam}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from env: \\${!!process.env.VERCEL_OIDC_TOKEN}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN available: \\${!!vercelOidcToken}\\`);\n let sandboxInfo = null;\n if (repoUrl) {\n sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n }\n const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n const step1Result = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError, sandboxInfo?.beforeScreenshotUrl);\n const { logAnalysis, beforeScreenshotUrl } = step1Result;\n const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl, beforeScreenshotUrl, sandboxInfo?.gitDiff);\n let prResult = null;\n const hasGitPatch = fixProposal.includes(\"\\`\\`\\`diff\");\n if (repoOwner && repoName && hasGitPatch) {\n prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n } else if (repoOwner && repoName && !hasGitPatch) {\n console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n }\n return Response.json({\n ...blobResult,\n pr: prResult\n });\n}\n__name(cloudFixWorkflow, \"cloudFixWorkflow\");\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n\n// app/api/cloud/check-pr/workflow.ts\nvar workflow_exports2 = {};\n__export(workflow_exports2, {\n cloudCheckPRWorkflow: () => cloudCheckPRWorkflow\n});\nasync function cloudCheckPRWorkflow(params) {\n const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n console.log(\\`[Workflow] Preview URL: \\${previewUrl}\\`);\n console.log(\\`[Workflow] PR #\\${prNumber}: \\${prTitle}\\`);\n console.log(\\`[Workflow] Changed files: \\${changedFiles.length}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n const report = await generateReportStep({\n prTitle,\n prBody,\n prNumber,\n previewUrl,\n changedFiles,\n pagesToCheck,\n crawlResults,\n verification,\n performanceResults,\n repoOwner,\n repoName\n });\n const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n return Response.json({\n success: verification.allChecksPassed,\n reportUrl: blobResult.blobUrl,\n prComment: true,\n verification: verification.summary,\n performance: performanceResults.summary,\n message: verification.allChecksPassed ? \"All PR checks passed! \\\\u2705\" : \"Some PR checks failed - see report for details\"\n });\n}\n__name(cloudCheckPRWorkflow, \"cloudCheckPRWorkflow\");\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n\n// virtual-entry.js\nglobalThis.__private_workflows = /* @__PURE__ */ new Map();\nObject.values(workflow_exports).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\nObject.values(workflow_exports2).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\n//# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["app/api/cloud/fix-workflow/workflow.ts", "app/api/cloud/check-pr/workflow.ts", "virtual-entry.js"],
  "sourcesContent": ["/**__internal_workflows{\"workflows\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"cloudFixWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\"}}},\"steps\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"analyzeLogsWithAgent\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\"},\"createD3kSandbox\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\"},\"createGitHubPR\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\"},\"fetchRealLogs\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\"},\"uploadToBlob\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\"}}}}*/;\n/**\n * Cloud Fix Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that orchestrates the fix process\n */ export async function cloudFixWorkflow(params) {\n    const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch } = params;\n    console.log(\"[Workflow] Starting cloud fix workflow...\");\n    console.log(`[Workflow] Dev URL: ${devUrl}`);\n    console.log(`[Workflow] Project: ${projectName}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    console.log(`[Workflow] Bypass Token: ${bypassToken ? \"provided\" : \"not provided\"}`);\n    if (repoOwner && repoName) {\n        console.log(`[Workflow] GitHub Repo: ${repoOwner}/${repoName}`);\n        console.log(`[Workflow] Base Branch: ${baseBranch}`);\n    }\n    if (repoUrl) {\n        console.log(`[Workflow] Will create sandbox from: ${repoUrl}`);\n        console.log(`[Workflow] Branch: ${repoBranch || \"main\"}`);\n    }\n    // Use VERCEL_OIDC_TOKEN from params (passed from request header) or fall back to env\n    // At runtime, OIDC token is in x-vercel-oidc-token header, not process.env\n    const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from param: ${!!vercelOidcTokenParam}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN available: ${!!vercelOidcToken}`);\n    // Step 0: Create d3k sandbox if repoUrl provided\n    // This step also captures CLS data, \"before\" screenshot, and git diff from inside the sandbox\n    let sandboxInfo = null;\n    if (repoUrl) {\n        sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n    }\n    // Step 1: Fetch real logs (using sandbox MCP if available, otherwise devUrl directly)\n    // If we got CLS data from Step 0, pass it to Step 1 to avoid re-fetching\n    // Use bypass token from sandbox if available, otherwise use provided one\n    // Also pass the beforeScreenshotUrl from Step 0 if available\n    const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n    const step1Result = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError, sandboxInfo?.beforeScreenshotUrl);\n    const { logAnalysis, beforeScreenshotUrl } = step1Result;\n    // Step 2: Invoke AI agent to analyze logs and create fix\n    const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n    // Step 3: Upload to blob storage with full context, screenshot, and git diff\n    const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl, beforeScreenshotUrl, sandboxInfo?.gitDiff);\n    // Step 4: Create GitHub PR if repo info provided AND there are actual fixes to apply\n    let prResult = null;\n    const hasGitPatch = fixProposal.includes(\"```diff\");\n    if (repoOwner && repoName && hasGitPatch) {\n        prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n    } else if (repoOwner && repoName && !hasGitPatch) {\n        console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n    }\n    // Note: Sandbox cleanup is handled automatically by the sandbox timeout\n    // We cannot store cleanup functions as they're not serializable\n    return Response.json({\n        ...blobResult,\n        pr: prResult\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n", "/**__internal_workflows{\"workflows\":{\"app/api/cloud/check-pr/workflow.ts\":{\"cloudCheckPRWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\"}}},\"steps\":{\"app/api/cloud/check-pr/workflow.ts\":{\"checkPerformanceStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\"},\"crawlPreviewPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\"},\"generateReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\"},\"identifyAffectedPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\"},\"uploadReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\"},\"verifyPRClaimsStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\"}}}}*/;\n/**\n * Cloud Check PR Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that checks a PR's changes\n */ export async function cloudCheckPRWorkflow(params) {\n    const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n    console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n    console.log(`[Workflow] Preview URL: ${previewUrl}`);\n    console.log(`[Workflow] PR #${prNumber}: ${prTitle}`);\n    console.log(`[Workflow] Changed files: ${changedFiles.length}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    // Step 1: Determine which pages to check based on changed files\n    const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n    // Step 2: Crawl the preview deployment\n    const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n    // Step 3: Verify PR claims against actual behavior\n    const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n    // Step 4: Check performance metrics\n    const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n    // Step 5: Generate comprehensive report\n    const report = await generateReportStep({\n        prTitle,\n        prBody,\n        prNumber,\n        previewUrl,\n        changedFiles,\n        pagesToCheck,\n        crawlResults,\n        verification,\n        performanceResults,\n        repoOwner,\n        repoName\n    });\n    // Step 6: Upload report to blob storage\n    const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n    return Response.json({\n        success: verification.allChecksPassed,\n        reportUrl: blobResult.blobUrl,\n        prComment: true,\n        verification: verification.summary,\n        performance: performanceResults.summary,\n        message: verification.allChecksPassed ? \"All PR checks passed! \u2705\" : \"Some PR checks failed - see report for details\"\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\n// biome-ignore lint/suspicious/noExplicitAny: AI-generated crawl data has dynamic structure\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\n// biome-ignore lint/suspicious/noExplicitAny: Report data has dynamic structure from previous steps\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n", "globalThis.__private_workflows = new Map();\nimport * as workflowFile0 from './app/api/cloud/fix-workflow/workflow.ts';\n            Object.values(workflowFile0).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))\nimport * as workflowFile1 from './app/api/cloud/check-pr/workflow.ts';\n            Object.values(workflowFile1).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))"],
  "mappings": ";;;;;;;;AAAA;AAAA;AAAA;AAAA;AAQI,eAAsB,iBAAiB,QAAQ;AAC/C,QAAM,EAAE,QAAQ,aAAa,aAAa,iBAAiB,sBAAsB,WAAW,UAAU,aAAa,QAAQ,aAAa,SAAS,WAAW,IAAI;AAChK,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,uBAAuB,MAAM,EAAE;AAC3C,UAAQ,IAAI,uBAAuB,WAAW,EAAE;AAChD,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAC/D,UAAQ,IAAI,4BAA4B,cAAc,aAAa,cAAc,EAAE;AACnF,MAAI,aAAa,UAAU;AACvB,YAAQ,IAAI,2BAA2B,SAAS,IAAI,QAAQ,EAAE;AAC9D,YAAQ,IAAI,2BAA2B,UAAU,EAAE;AAAA,EACvD;AACA,MAAI,SAAS;AACT,YAAQ,IAAI,wCAAwC,OAAO,EAAE;AAC7D,YAAQ,IAAI,sBAAsB,cAAc,MAAM,EAAE;AAAA,EAC5D;AAGA,QAAM,kBAAkB,wBAAwB,QAAQ,IAAI;AAC5D,UAAQ,IAAI,4CAA4C,CAAC,CAAC,oBAAoB,EAAE;AAChF,UAAQ,IAAI,0CAA0C,CAAC,CAAC,QAAQ,IAAI,iBAAiB,EAAE;AACvF,UAAQ,IAAI,2CAA2C,CAAC,CAAC,eAAe,EAAE;AAG1E,MAAI,cAAc;AAClB,MAAI,SAAS;AACT,kBAAc,MAAM,iBAAiB,SAAS,cAAc,QAAQ,aAAa,aAAa,eAAe;AAAA,EACjH;AAKA,QAAM,uBAAuB,aAAa,eAAe;AACzD,QAAM,cAAc,MAAM,cAAc,aAAa,UAAU,QAAQ,sBAAsB,aAAa,QAAQ,aAAa,SAAS,aAAa,UAAU,aAAa,mBAAmB;AAC/L,QAAM,EAAE,aAAa,oBAAoB,IAAI;AAE7C,QAAM,cAAc,MAAM,qBAAqB,aAAa,aAAa,UAAU,MAAM;AAEzF,QAAM,aAAa,MAAM,aAAa,aAAa,aAAa,aAAa,aAAa,UAAU,QAAQ,qBAAqB,aAAa,OAAO;AAErJ,MAAI,WAAW;AACf,QAAM,cAAc,YAAY,SAAS,SAAS;AAClD,MAAI,aAAa,YAAY,aAAa;AACtC,eAAW,MAAM,eAAe,aAAa,WAAW,SAAS,WAAW,UAAU,YAAY,WAAW;AAAA,EACjH,WAAW,aAAa,YAAY,CAAC,aAAa;AAC9C,YAAQ,IAAI,0EAA0E;AAAA,EAC1F;AAGA,SAAO,SAAS,KAAK;AAAA,IACjB,GAAG;AAAA,IACH,IAAI;AAAA,EACR,CAAC;AACL;AApD0B;AAsD1B,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AACnI,IAAI,gBAAgB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6DAA6D;AAC7H,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oEAAoE;AAC3I,IAAI,eAAe,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC3H,IAAI,iBAAiB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AAC/H,iBAAiB,aAAa;;;ACnE9B,IAAAA,oBAAA;AAAA,SAAAA,mBAAA;AAAA;AAAA;AAQI,eAAsB,qBAAqB,QAAQ;AACnD,QAAM,EAAE,YAAY,SAAS,QAAQ,cAAc,WAAW,UAAU,SAAS,IAAI;AACrF,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,2BAA2B,UAAU,EAAE;AACnD,UAAQ,IAAI,kBAAkB,QAAQ,KAAK,OAAO,EAAE;AACpD,UAAQ,IAAI,6BAA6B,aAAa,MAAM,EAAE;AAC9D,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAE/D,QAAM,eAAe,MAAM,0BAA0B,cAAc,MAAM;AAEzE,QAAM,eAAe,MAAM,sBAAsB,YAAY,YAAY;AAEzE,QAAM,eAAe,MAAM,mBAAmB,SAAS,QAAQ,cAAc,YAAY;AAEzF,QAAM,qBAAqB,MAAM,qBAAqB,YAAY,YAAY;AAE9E,QAAM,SAAS,MAAM,mBAAmB;AAAA,IACpC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACJ,CAAC;AAED,QAAM,aAAa,MAAM,iBAAiB,QAAQ,WAAW,UAAU,QAAQ;AAC/E,SAAO,SAAS,KAAK;AAAA,IACjB,SAAS,aAAa;AAAA,IACtB,WAAW,WAAW;AAAA,IACtB,WAAW;AAAA,IACX,cAAc,aAAa;AAAA,IAC3B,aAAa,mBAAmB;AAAA,IAChC,SAAS,aAAa,kBAAkB,iCAA4B;AAAA,EACxE,CAAC;AACL;AAvC0B;AAyC1B,IAAI,4BAA4B,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,qEAAqE;AACjJ,IAAI,wBAAwB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,iEAAiE;AAEzI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AAEvI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC/H,qBAAqB,aAAa;;;ACzDlC,WAAW,sBAAsB,oBAAI,IAAI;AAE7B,OAAO,OAAO,gBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;AAEtH,OAAO,OAAOC,iBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;",
  "names": ["workflow_exports", "workflow_exports"]
}
\n`;\n\nexport const POST = workflowEntrypoint(workflowCode);"],"names":[],"mappings":"uCAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,MACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,CAAA,CAAA,MAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OCfA,EAAA,CAAA,CAAA,OAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAiHtB,CAAC,CAEY,EAAO,CAAA,EAAA,EAAA,kBAAA,AAAkB,EAAC,2BDrGvC,IAAA,EAAA,EAAA,CAAA,CAAA,OAIA,IAAM,EAAc,IAAI,EAAA,mBAAmB,CAAC,CACxC,WAAY,CACR,KAAM,EAAA,SAAS,CAAC,SAAS,CACzB,KAAM,sCACN,SAAU,gCACV,SAAU,QACV,WAAY,EAChB,EACA,QAAS,CAAA,OACT,IADiD,eACc,CAA3C,EACpB,iBAAkB,iEAClB,iBAZqB,GAarB,SAAA,CACJ,GAIM,kBAAE,CAAgB,CAAE,sBAAoB,aAAE,CAAW,CAAE,CAAG,EAChE,SAAS,IACL,MAAO,CAAA,EAAA,EAAA,UAAA,AAAW,EAAC,kBACf,uBACA,CACJ,EACJ,CAEO,eAAe,EAAQ,CAAG,CAAE,CAAG,CAAE,CAAG,EACnC,EAAY,KAAK,EAAE,AACnB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,+BAAgC,QAAQ,MAAM,CAAC,MAAM,IAE7E,IAAI,EAAU,sCAKV,EAAU,EAAQ,OAAO,CAAC,WAAY,KAAO,IAMjD,IAAM,EAAgB,MAAM,EAAY,OAAO,CAAC,EAAK,EAAK,SACtD,EACA,mBAHE,CAAA,CAIN,GACA,GAAI,CAAC,EAID,OAHA,EAAI,IADY,MACF,CAAG,IACjB,EAAI,GAAG,CAAC,eACS,MAAjB,CAAwB,CAApB,IAAyB,KAAhB,EAAoB,EAAI,SAAS,CAAC,IAAI,CAAC,EAAK,QAAQ,OAAO,IACjE,KAEX,GAAM,SAAE,CAAO,QAAE,CAAM,YAAE,CAAU,CAAE,WAAS,aAAE,CAAW,mBAAE,CAAiB,qBAAE,CAAmB,sBAAE,CAAoB,yBAAE,CAAuB,kBAAE,CAAgB,yBAAE,CAAuB,uBAAE,CAAqB,CAAE,CAAG,EACnN,EAAoB,CAAA,EAAA,EAAA,gBAAA,AAAgB,EAAC,GACvC,GAAQ,CAAQ,GAAkB,aAAa,CAAC,EAAkB,EAAI,EAAkB,MAAM,CAAC,EAAA,AAAiB,EAC9G,EAAY,WAEa,MAAvB,EAA8B,KAAK,EAAI,EAAoB,SAAA,AAAS,EAAE,AACtE,MAAM,EAAoB,SAAS,CAAC,EAAK,EAAK,GAAW,GAEzD,EAAI,GAAG,CAAC,gCAEL,MAEX,GAAI,GAAS,CAAC,EAAa,CACvB,IAAM,GAAgB,CAAQ,EAAkB,MAAM,CAAC,EAAiB,CAClE,EAAgB,EAAkB,aAAa,CAAC,EAAkB,CACxE,GAAI,IAC+B,IAA3B,EAAc,KADH,GACW,EAAc,CAAC,EAAe,CACpD,GAAI,EAAW,YAAY,CAAC,WAAW,CACnC,CADqC,MAC9B,MAAM,GAEjB,OAAM,IAAI,EAAA,eAAe,AAC7B,CAER,CACA,IAAI,EAAW,MACX,GAAU,EAAY,IAAb,CAAkB,EAAK,EAAD,EAG/B,EAAW,AAAa,OAHqB,KAC7C,EAAW,CAAA,EAEwB,IAAM,CAAA,EAE7C,IAAM,EACN,CAAsB,MAAV,EAAkB,GAAb,EAEjB,CAAC,EAKK,EAAqB,GAAS,CAAC,EAIjC,GAAyB,GACzB,CAAA,EAAA,EAAA,iBADkD,aAClD,AAA8B,EAAC,CAC3B,KAAM,EACN,EAd2F,8CAe3F,EACA,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,uBACnC,CACJ,EACJ,GAEJ,IAAM,EAAS,EAAI,MAAM,EAAI,MACvB,EAAS,CAAA,EAAA,EAAA,SAAA,AAAS,IAClB,EAAa,EAAO,kBAAkB,GACtC,EAAU,QACZ,oBACA,EACA,WAAY,CACR,aAAc,CACV,eAAgB,EAAQ,EAAW,YAAY,CAAC,cAAc,AAClE,EACA,iBAAiB,CAAQ,EAAW,eAAe,yBACnD,EACA,iBAAkB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,oBACtC,kBAAmB,EAAW,SAAS,CACvC,UAAW,EAAI,SAAS,CACxB,QAAS,AAAC,IACN,EAAI,EAAE,CAAC,QAAS,EACpB,EACA,sBAAkB,EAClB,8BAA+B,CAAC,EAAO,EAAU,EAAc,IAAa,EAAY,cAAc,CAAC,EAAK,EAAO,EAAc,EAAY,EACjJ,EACA,cAAe,SACX,CACJ,CACJ,EACM,EAAc,IAAI,EAAA,eAAe,CAAC,GAClC,EAAc,IAAI,EAAA,gBAAgB,CAAC,GACnC,EAAU,EAAA,kBAAkB,CAAC,mBAAmB,CAAC,EAAa,CAAA,EAAA,EAAA,sBAAA,AAAsB,EAAC,IAC3F,GAAI,CACA,IAAM,EAAoB,MAAO,GACtB,EAAY,MAAM,CAAC,EAAS,GAAS,OAAO,CAAC,KAChD,GAAI,CAAC,EAAM,OACX,EAAK,aAAa,CAAC,CACf,mBAAoB,EAAI,UAAU,CAClC,YAAY,CAChB,GACA,IAAM,EAAqB,EAAO,qBAAqB,GAEvD,GAAI,CAAC,EACD,OAEJ,GAAI,EAAmB,GAAG,CAAC,EAHF,kBAGwB,EAAA,cAAc,CAAC,aAAa,CAAE,YAC3E,QAAQ,IAAI,CAAC,CAAC,2BAA2B,EAAE,EAAmB,GAAG,CAAC,kBAAkB,qEAAqE,CAAC,EAG9J,IAAM,EAAQ,EAAmB,GAAG,CAAC,cACrC,GAAI,EAAO,CACP,IAAM,EAAO,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAO,CACjC,EAAK,aAAa,CAAC,CACf,aAAc,EACd,aAAc,EACd,iBAAkB,CACtB,GACA,EAAK,UAAU,CAAC,EACpB,MACI,CADG,CACE,UAAU,CAAC,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAE9C,GAEE,GAAgB,CAAoC,CAAA,EAAA,EAAA,EAA5B,YAA4B,AAAc,EAAC,EAAK,eACxE,EAAiB,MAAO,QACtB,EA4FI,EA3FR,IAAM,EAAoB,MAAO,oBAAE,CAAkB,CAAE,IACnD,GAAI,CACA,GAAI,CAAC,GAAiB,GAAwB,GAA2B,CAAC,EAKtE,OAJA,EAAI,SADsF,CAC5E,CAAG,IAEjB,EAAI,SAAS,CAAC,iBAAkB,eAChC,EAAI,GAAG,CAAC,gCACD,KAEX,IAAM,EAAW,MAAM,EAAkB,EACzC,GAAI,YAAY,CAAG,EAAQ,UAAU,CAAC,YAAY,CAClD,IAAI,EAAmB,EAAQ,UAAU,CAAC,gBAAgB,CAGtD,GACI,EAAI,SAAS,EAAE,CACf,CAFc,CAEV,SAAS,CAAC,GACd,OAAmB,GAG3B,IAAM,EAAY,EAAQ,UAAU,CAAC,aAAa,CAGlD,IAAI,EA6BA,OADA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,EAAU,EAAQ,UAAU,CAAC,gBAAgB,EACnF,IA7BA,EACP,IAAM,EAAO,MAAM,EAAS,IAAI,GAE1B,EAAU,CAAA,EAAA,EAAA,yBAAA,AAAyB,EAAC,EAAS,OAAO,EACtD,IACA,CAAO,CAAC,EAAA,GADG,mBACmB,CAAC,CAAG,CAAA,EAElC,CAAC,CAAO,CAAC,eAAe,EAAI,EAAK,IAAI,EAAE,CACvC,CAAO,CAAC,eAAe,CAAG,EAAK,IAAI,AAAJ,EAEnC,IAAM,EAAa,AAAkD,SAA3C,EAAQ,UAAU,CAAC,mBAAmB,IAAoB,EAAQ,UAAU,CAAC,mBAAmB,EAAI,EAAA,cAAA,AAAc,GAAG,AAAQ,EAAQ,UAAU,CAAC,mBAAmB,CACvL,EAAS,KAA8C,IAAvC,EAAQ,UAAU,CAAC,eAAe,EAAoB,EAAQ,UAAU,CAAC,eAAe,EAAI,EAAA,cAAc,MAAG,EAAY,EAAQ,UAAU,CAAC,eAAe,CAcjL,MAZmB,CAYZ,AAXH,MAAO,CACH,KAAM,EAAA,eAAe,CAAC,SAAS,CAC/B,OAAQ,EAAS,MAAM,CACvB,KAAM,OAAO,IAAI,CAAC,MAAM,EAAK,WAAW,YACxC,CACJ,EACA,aAAc,YACV,SACA,CACJ,CACJ,CAEJ,CAKJ,CAAE,KALS,CAKF,EAAK,CAeV,MAZ0B,MAAtB,EAA6B,KAAK,EAAI,EAAmB,OAAA,AAAO,EAAE,CAElE,MAAM,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,uBACA,CACJ,EACJ,GAAG,AATgB,EASJ,GAEb,CACV,CACJ,EACM,EAAa,MAAM,EAAY,cAAc,CAAC,CAChD,MACA,sBACA,EACA,UAAW,EAAA,SAAS,CAAC,SAAS,CAC9B,YAAY,oBACZ,EACA,mBAAmB,uBACnB,0BACA,oBACA,EACA,UAAW,EAAI,SAAS,eACxB,CACJ,GAEA,GAAI,CAAC,EACD,KADQ,EACD,KAEX,GAAI,CAAe,MAAd,CAAqB,EAAS,AAA0C,GAA9C,IAAK,EAAoB,EAAW,KAAA,AAAK,EAAY,KAAK,EAAI,EAAkB,IAAI,IAAM,EAAA,eAAe,CAAC,SAAS,CAE9I,CAFgJ,KAE1I,OAAO,cAAc,CAAC,AAAI,MAAM,CAAC,kDAAkD,EAAgB,MAAd,CAAqB,EAAS,AAA2C,GAA/C,IAAK,EAAqB,EAAW,KAAK,AAAL,EAAiB,KAAK,EAAI,EAAmB,IAAI,CAAA,CAAE,EAAG,oBAAqB,CACjO,MAAO,OACP,YAAY,EACZ,cAAc,CAClB,EAEA,CAAC,GACD,EAAI,SAAS,CADG,AACF,iBAAkB,EAAuB,cAAgB,EAAW,MAAM,CAAG,OAAS,EAAW,OAAO,CAAG,QAAU,OAGnI,GACA,EAAI,QADS,CACA,CAAC,gBAAiB,2DAEnC,IAAM,EAAU,CAAA,EAAA,EAAA,2BAAA,AAA2B,EAAC,EAAW,KAAK,CAAC,OAAO,EAcpE,OAbI,AAAE,CAAD,EAAkB,GACnB,EADwB,AAChB,GADmB,GACb,CAAC,EAAA,sBAAsB,GAIrC,EAAW,YAAY,EAAK,EAAI,AAAL,SAAc,CAAC,kBAAqB,EAAD,AAAS,GAAG,CAAC,kBAAkB,AAC7F,EAAQ,GAAG,CAAC,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,EAAW,YAAY,GAE9E,MAAM,CAAA,EAAA,EAAA,YAAY,AAAZ,EAAa,EAAa,EAChC,IAAI,SAAS,EAAW,KAAK,CAAC,IAAI,CAAE,SAChC,EACA,OAAQ,EAAW,KAAK,CAAC,MAAM,EAAI,GACvC,IACO,IACX,EAGI,EACA,MAAM,EAAe,EADT,CAGZ,MAAM,EAAO,qBAAqB,CAAC,EAAI,OAAO,CAAE,IAAI,EAAO,KAAK,CAAC,EAAA,cAAc,CAAC,aAAa,CAAE,CACvF,SAAU,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAChC,KAAM,EAAA,QAAQ,CAAC,MAAM,CACrB,WAAY,CACR,cAAe,EACf,cAAe,EAAI,GAAG,AAC1B,CACJ,EAAG,GAEf,CAAE,MAAO,EAAK,CAeV,GAdM,aAAe,EAAA,eAAe,EAEhC,CAFmC,KAE7B,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,uBACA,CACJ,EACJ,GAAG,AATgB,EASJ,GAIf,EAAO,MAAM,EAKjB,OAHA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,IAAI,SAAS,KAAM,CAC5D,OAAQ,GACZ,IACO,IACX,CACJ,EAEA,qCAAqC","ignoreList":[0]}
1
+ {"version":3,"sources":["../../../../node_modules/.pnpm/next%4016.1.0-canary.9_%40opentelemetry%2Bapi%401.9.0_babel-plugin-react-compiler%401.0.0_react-d_e89f05fa6262f945d2946e6441ada21f/node_modules/next/dist/esm/build/templates/app-route.js","../../../../mcp-server/app/.well-known/workflow/v1/flow/route.js"],"sourcesContent":["import { AppRouteRouteModule } from \"next/dist/esm/server/route-modules/app-route/module.compiled\";\nimport { RouteKind } from \"next/dist/esm/server/route-kind\";\nimport { patchFetch as _patchFetch } from \"next/dist/esm/server/lib/patch-fetch\";\nimport { addRequestMeta, getRequestMeta } from \"next/dist/esm/server/request-meta\";\nimport { getTracer, SpanKind } from \"next/dist/esm/server/lib/trace/tracer\";\nimport { setReferenceManifestsSingleton } from \"next/dist/esm/server/app-render/encryption-utils\";\nimport { createServerModuleMap } from \"next/dist/esm/server/app-render/action-utils\";\nimport { normalizeAppPath } from \"next/dist/esm/shared/lib/router/utils/app-paths\";\nimport { NodeNextRequest, NodeNextResponse } from \"next/dist/esm/server/base-http/node\";\nimport { NextRequestAdapter, signalFromNodeResponse } from \"next/dist/esm/server/web/spec-extension/adapters/next-request\";\nimport { BaseServerSpan } from \"next/dist/esm/server/lib/trace/constants\";\nimport { getRevalidateReason } from \"next/dist/esm/server/instrumentation/utils\";\nimport { sendResponse } from \"next/dist/esm/server/send-response\";\nimport { fromNodeOutgoingHttpHeaders, toNodeOutgoingHttpHeaders } from \"next/dist/esm/server/web/utils\";\nimport { getCacheControlHeader } from \"next/dist/esm/server/lib/cache-control\";\nimport { INFINITE_CACHE, NEXT_CACHE_TAGS_HEADER } from \"next/dist/esm/lib/constants\";\nimport { NoFallbackError } from \"next/dist/esm/shared/lib/no-fallback-error.external\";\nimport { CachedRouteKind } from \"next/dist/esm/server/response-cache\";\nimport * as userland from \"INNER_APP_ROUTE\";\n// We inject the nextConfigOutput here so that we can use them in the route\n// module.\nconst nextConfigOutput = \"\"\nconst routeModule = new AppRouteRouteModule({\n definition: {\n kind: RouteKind.APP_ROUTE,\n page: \"/.well-known/workflow/v1/flow/route\",\n pathname: \"/.well-known/workflow/v1/flow\",\n filename: \"route\",\n bundlePath: \"\"\n },\n distDir: process.env.__NEXT_RELATIVE_DIST_DIR || '',\n relativeProjectDir: process.env.__NEXT_RELATIVE_PROJECT_DIR || '',\n resolvedPagePath: \"[project]/mcp-server/app/.well-known/workflow/v1/flow/route.js\",\n nextConfigOutput,\n userland\n});\n// Pull out the exports that we need to expose from the module. This should\n// be eliminated when we've moved the other routes to the new format. These\n// are used to hook into the route.\nconst { workAsyncStorage, workUnitAsyncStorage, serverHooks } = routeModule;\nfunction patchFetch() {\n return _patchFetch({\n workAsyncStorage,\n workUnitAsyncStorage\n });\n}\nexport { routeModule, workAsyncStorage, workUnitAsyncStorage, serverHooks, patchFetch, };\nexport async function handler(req, res, ctx) {\n if (routeModule.isDev) {\n addRequestMeta(req, 'devRequestTimingInternalsEnd', process.hrtime.bigint());\n }\n let srcPage = \"/.well-known/workflow/v1/flow/route\";\n // turbopack doesn't normalize `/index` in the page name\n // so we need to to process dynamic routes properly\n // TODO: fix turbopack providing differing value from webpack\n if (process.env.TURBOPACK) {\n srcPage = srcPage.replace(/\\/index$/, '') || '/';\n } else if (srcPage === '/index') {\n // we always normalize /index specifically\n srcPage = '/';\n }\n const multiZoneDraftMode = process.env.__NEXT_MULTI_ZONE_DRAFT_MODE;\n const prepareResult = await routeModule.prepare(req, res, {\n srcPage,\n multiZoneDraftMode\n });\n if (!prepareResult) {\n res.statusCode = 400;\n res.end('Bad Request');\n ctx.waitUntil == null ? void 0 : ctx.waitUntil.call(ctx, Promise.resolve());\n return null;\n }\n const { buildId, params, nextConfig, parsedUrl, isDraftMode, prerenderManifest, routerServerContext, isOnDemandRevalidate, revalidateOnlyGenerated, resolvedPathname, clientReferenceManifest, serverActionsManifest } = prepareResult;\n const normalizedSrcPage = normalizeAppPath(srcPage);\n let isIsr = Boolean(prerenderManifest.dynamicRoutes[normalizedSrcPage] || prerenderManifest.routes[resolvedPathname]);\n const render404 = async ()=>{\n // TODO: should route-module itself handle rendering the 404\n if (routerServerContext == null ? void 0 : routerServerContext.render404) {\n await routerServerContext.render404(req, res, parsedUrl, false);\n } else {\n res.end('This page could not be found');\n }\n return null;\n };\n if (isIsr && !isDraftMode) {\n const isPrerendered = Boolean(prerenderManifest.routes[resolvedPathname]);\n const prerenderInfo = prerenderManifest.dynamicRoutes[normalizedSrcPage];\n if (prerenderInfo) {\n if (prerenderInfo.fallback === false && !isPrerendered) {\n if (nextConfig.experimental.adapterPath) {\n return await render404();\n }\n throw new NoFallbackError();\n }\n }\n }\n let cacheKey = null;\n if (isIsr && !routeModule.isDev && !isDraftMode) {\n cacheKey = resolvedPathname;\n // ensure /index and / is normalized to one key\n cacheKey = cacheKey === '/index' ? '/' : cacheKey;\n }\n const supportsDynamicResponse = // If we're in development, we always support dynamic HTML\n routeModule.isDev === true || // If this is not SSG or does not have static paths, then it supports\n // dynamic HTML.\n !isIsr;\n // This is a revalidation request if the request is for a static\n // page and it is not being resumed from a postponed render and\n // it is not a dynamic RSC request then it is a revalidation\n // request.\n const isStaticGeneration = isIsr && !supportsDynamicResponse;\n // Before rendering (which initializes component tree modules), we have to\n // set the reference manifests to our global store so Server Action's\n // encryption util can access to them at the top level of the page module.\n if (serverActionsManifest && clientReferenceManifest) {\n setReferenceManifestsSingleton({\n page: srcPage,\n clientReferenceManifest,\n serverActionsManifest,\n serverModuleMap: createServerModuleMap({\n serverActionsManifest\n })\n });\n }\n const method = req.method || 'GET';\n const tracer = getTracer();\n const activeSpan = tracer.getActiveScopeSpan();\n const context = {\n params,\n prerenderManifest,\n renderOpts: {\n experimental: {\n authInterrupts: Boolean(nextConfig.experimental.authInterrupts)\n },\n cacheComponents: Boolean(nextConfig.cacheComponents),\n supportsDynamicResponse,\n incrementalCache: getRequestMeta(req, 'incrementalCache'),\n cacheLifeProfiles: nextConfig.cacheLife,\n waitUntil: ctx.waitUntil,\n onClose: (cb)=>{\n res.on('close', cb);\n },\n onAfterTaskError: undefined,\n onInstrumentationRequestError: (error, _request, errorContext, silenceLog)=>routeModule.onRequestError(req, error, errorContext, silenceLog, routerServerContext)\n },\n sharedContext: {\n buildId\n }\n };\n const nodeNextReq = new NodeNextRequest(req);\n const nodeNextRes = new NodeNextResponse(res);\n const nextReq = NextRequestAdapter.fromNodeNextRequest(nodeNextReq, signalFromNodeResponse(res));\n try {\n const invokeRouteModule = async (span)=>{\n return routeModule.handle(nextReq, context).finally(()=>{\n if (!span) return;\n span.setAttributes({\n 'http.status_code': res.statusCode,\n 'next.rsc': false\n });\n const rootSpanAttributes = tracer.getRootSpanAttributes();\n // We were unable to get attributes, probably OTEL is not enabled\n if (!rootSpanAttributes) {\n return;\n }\n if (rootSpanAttributes.get('next.span_type') !== BaseServerSpan.handleRequest) {\n console.warn(`Unexpected root span type '${rootSpanAttributes.get('next.span_type')}'. Please report this Next.js issue https://github.com/vercel/next.js`);\n return;\n }\n const route = rootSpanAttributes.get('next.route');\n if (route) {\n const name = `${method} ${route}`;\n span.setAttributes({\n 'next.route': route,\n 'http.route': route,\n 'next.span_name': name\n });\n span.updateName(name);\n } else {\n span.updateName(`${method} ${srcPage}`);\n }\n });\n };\n const isMinimalMode = Boolean(process.env.MINIMAL_MODE || getRequestMeta(req, 'minimalMode'));\n const handleResponse = async (currentSpan)=>{\n var _cacheEntry_value;\n const responseGenerator = async ({ previousCacheEntry })=>{\n try {\n if (!isMinimalMode && isOnDemandRevalidate && revalidateOnlyGenerated && !previousCacheEntry) {\n res.statusCode = 404;\n // on-demand revalidate always sets this header\n res.setHeader('x-nextjs-cache', 'REVALIDATED');\n res.end('This page could not be found');\n return null;\n }\n const response = await invokeRouteModule(currentSpan);\n req.fetchMetrics = context.renderOpts.fetchMetrics;\n let pendingWaitUntil = context.renderOpts.pendingWaitUntil;\n // Attempt using provided waitUntil if available\n // if it's not we fallback to sendResponse's handling\n if (pendingWaitUntil) {\n if (ctx.waitUntil) {\n ctx.waitUntil(pendingWaitUntil);\n pendingWaitUntil = undefined;\n }\n }\n const cacheTags = context.renderOpts.collectedTags;\n // If the request is for a static response, we can cache it so long\n // as it's not edge.\n if (isIsr) {\n const blob = await response.blob();\n // Copy the headers from the response.\n const headers = toNodeOutgoingHttpHeaders(response.headers);\n if (cacheTags) {\n headers[NEXT_CACHE_TAGS_HEADER] = cacheTags;\n }\n if (!headers['content-type'] && blob.type) {\n headers['content-type'] = blob.type;\n }\n const revalidate = typeof context.renderOpts.collectedRevalidate === 'undefined' || context.renderOpts.collectedRevalidate >= INFINITE_CACHE ? false : context.renderOpts.collectedRevalidate;\n const expire = typeof context.renderOpts.collectedExpire === 'undefined' || context.renderOpts.collectedExpire >= INFINITE_CACHE ? undefined : context.renderOpts.collectedExpire;\n // Create the cache entry for the response.\n const cacheEntry = {\n value: {\n kind: CachedRouteKind.APP_ROUTE,\n status: response.status,\n body: Buffer.from(await blob.arrayBuffer()),\n headers\n },\n cacheControl: {\n revalidate,\n expire\n }\n };\n return cacheEntry;\n } else {\n // send response without caching if not ISR\n await sendResponse(nodeNextReq, nodeNextRes, response, context.renderOpts.pendingWaitUntil);\n return null;\n }\n } catch (err) {\n // if this is a background revalidate we need to report\n // the request error here as it won't be bubbled\n if (previousCacheEntry == null ? void 0 : previousCacheEntry.isStale) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: srcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n throw err;\n }\n };\n const cacheEntry = await routeModule.handleResponse({\n req,\n nextConfig,\n cacheKey,\n routeKind: RouteKind.APP_ROUTE,\n isFallback: false,\n prerenderManifest,\n isRoutePPREnabled: false,\n isOnDemandRevalidate,\n revalidateOnlyGenerated,\n responseGenerator,\n waitUntil: ctx.waitUntil,\n isMinimalMode\n });\n // we don't create a cacheEntry for ISR\n if (!isIsr) {\n return null;\n }\n if ((cacheEntry == null ? void 0 : (_cacheEntry_value = cacheEntry.value) == null ? void 0 : _cacheEntry_value.kind) !== CachedRouteKind.APP_ROUTE) {\n var _cacheEntry_value1;\n throw Object.defineProperty(new Error(`Invariant: app-route received invalid cache entry ${cacheEntry == null ? void 0 : (_cacheEntry_value1 = cacheEntry.value) == null ? void 0 : _cacheEntry_value1.kind}`), \"__NEXT_ERROR_CODE\", {\n value: \"E701\",\n enumerable: false,\n configurable: true\n });\n }\n if (!isMinimalMode) {\n res.setHeader('x-nextjs-cache', isOnDemandRevalidate ? 'REVALIDATED' : cacheEntry.isMiss ? 'MISS' : cacheEntry.isStale ? 'STALE' : 'HIT');\n }\n // Draft mode should never be cached\n if (isDraftMode) {\n res.setHeader('Cache-Control', 'private, no-cache, no-store, max-age=0, must-revalidate');\n }\n const headers = fromNodeOutgoingHttpHeaders(cacheEntry.value.headers);\n if (!(isMinimalMode && isIsr)) {\n headers.delete(NEXT_CACHE_TAGS_HEADER);\n }\n // If cache control is already set on the response we don't\n // override it to allow users to customize it via next.config\n if (cacheEntry.cacheControl && !res.getHeader('Cache-Control') && !headers.get('Cache-Control')) {\n headers.set('Cache-Control', getCacheControlHeader(cacheEntry.cacheControl));\n }\n await sendResponse(nodeNextReq, nodeNextRes, // @ts-expect-error - Argument of type 'Buffer<ArrayBufferLike>' is not assignable to parameter of type 'BodyInit | null | undefined'.\n new Response(cacheEntry.value.body, {\n headers,\n status: cacheEntry.value.status || 200\n }));\n return null;\n };\n // TODO: activeSpan code path is for when wrapped by\n // next-server can be removed when this is no longer used\n if (activeSpan) {\n await handleResponse(activeSpan);\n } else {\n await tracer.withPropagatedContext(req.headers, ()=>tracer.trace(BaseServerSpan.handleRequest, {\n spanName: `${method} ${srcPage}`,\n kind: SpanKind.SERVER,\n attributes: {\n 'http.method': method,\n 'http.target': req.url\n }\n }, handleResponse));\n }\n } catch (err) {\n if (!(err instanceof NoFallbackError)) {\n const silenceLog = false;\n await routeModule.onRequestError(req, err, {\n routerKind: 'App Router',\n routePath: normalizedSrcPage,\n routeType: 'route',\n revalidateReason: getRevalidateReason({\n isStaticGeneration,\n isOnDemandRevalidate\n })\n }, silenceLog, routerServerContext);\n }\n // rethrow so that we can handle serving error page\n // If this is during static generation, throw the error again.\n if (isIsr) throw err;\n // Otherwise, send a 500 response.\n await sendResponse(nodeNextReq, nodeNextRes, new Response(null, {\n status: 500\n }));\n return null;\n }\n}\n\n//# sourceMappingURL=app-route.js.map\n","// biome-ignore-all lint: generated file\n/* eslint-disable */\nimport { workflowEntrypoint } from 'workflow/runtime';\n\nconst workflowCode = `var __defProp = Object.defineProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\n\n// app/api/cloud/fix-workflow/workflow.ts\nvar workflow_exports = {};\n__export(workflow_exports, {\n cloudFixWorkflow: () => cloudFixWorkflow\n});\nasync function cloudFixWorkflow(params) {\n const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch, runId, userId } = params;\n const timestamp = (/* @__PURE__ */ new Date()).toISOString();\n console.log(\"[Workflow] Starting cloud fix workflow...\");\n console.log(\\`[Workflow] Dev URL: \\${devUrl}\\`);\n console.log(\\`[Workflow] Project: \\${projectName}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n console.log(\\`[Workflow] Bypass Token: \\${bypassToken ? \"provided\" : \"not provided\"}\\`);\n if (repoOwner && repoName) {\n console.log(\\`[Workflow] GitHub Repo: \\${repoOwner}/\\${repoName}\\`);\n console.log(\\`[Workflow] Base Branch: \\${baseBranch}\\`);\n }\n if (repoUrl) {\n console.log(\\`[Workflow] Will create sandbox from: \\${repoUrl}\\`);\n console.log(\\`[Workflow] Branch: \\${repoBranch || \"main\"}\\`);\n }\n const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from param: \\${!!vercelOidcTokenParam}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN from env: \\${!!process.env.VERCEL_OIDC_TOKEN}\\`);\n console.log(\\`[Workflow] VERCEL_OIDC_TOKEN available: \\${!!vercelOidcToken}\\`);\n const updateProgress = /* @__PURE__ */ __name(async (stepNumber, currentStep, sandboxUrl) => {\n if (runId && userId) {\n await updateWorkflowProgressStep(userId, runId, projectName, timestamp, stepNumber, currentStep, sandboxUrl);\n }\n }, \"updateProgress\");\n let sandboxInfo = null;\n if (repoUrl) {\n await updateProgress(0, \"Creating development sandbox...\");\n sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n if (sandboxInfo?.devUrl) {\n await updateProgress(0, \"Sandbox ready, starting dev server...\", sandboxInfo.devUrl);\n }\n }\n await updateProgress(1, \"Capturing performance metrics (CLS, LCP, errors)...\");\n const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n const step1Result = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError, sandboxInfo?.beforeScreenshotUrl);\n const { logAnalysis, beforeScreenshotUrl } = step1Result;\n await updateProgress(1, \\`Captured \\${logAnalysis.length > 5e3 ? \"detailed\" : \"initial\"} diagnostics\\`);\n await updateProgress(2, \"AI agent analyzing logs and generating fixes...\");\n const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n const hasError = fixProposal.toLowerCase().includes(\"error\") || fixProposal.toLowerCase().includes(\"issue\");\n const hasFix = fixProposal.includes(\"\\`\\`\\`diff\");\n if (hasFix) {\n await updateProgress(2, \"AI generated a fix proposal with code changes\");\n } else if (hasError) {\n await updateProgress(2, \"AI identified issues but no code fix needed\");\n } else {\n await updateProgress(2, \"AI analysis complete - system appears healthy\");\n }\n await updateProgress(3, \"Compiling full report with screenshots...\");\n const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl, beforeScreenshotUrl, sandboxInfo?.gitDiff);\n await updateProgress(3, \"Report uploaded to Vercel Blob\");\n let prResult = null;\n const hasGitPatch = fixProposal.includes(\"\\`\\`\\`diff\");\n if (repoOwner && repoName && hasGitPatch) {\n await updateProgress(4, \\`Creating PR on \\${repoOwner}/\\${repoName}...\\`);\n prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n if (prResult?.success) {\n await updateProgress(4, \\`PR #\\${prResult.prNumber} created successfully\\`);\n }\n } else if (repoOwner && repoName && !hasGitPatch) {\n await updateProgress(4, \"No code changes needed - skipping PR\");\n console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n }\n return Response.json({\n ...blobResult,\n pr: prResult\n });\n}\n__name(cloudFixWorkflow, \"cloudFixWorkflow\");\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\nvar updateWorkflowProgressStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//updateWorkflowProgressStep\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n\n// app/api/cloud/check-pr/workflow.ts\nvar workflow_exports2 = {};\n__export(workflow_exports2, {\n cloudCheckPRWorkflow: () => cloudCheckPRWorkflow\n});\nasync function cloudCheckPRWorkflow(params) {\n const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n console.log(\\`[Workflow] Preview URL: \\${previewUrl}\\`);\n console.log(\\`[Workflow] PR #\\${prNumber}: \\${prTitle}\\`);\n console.log(\\`[Workflow] Changed files: \\${changedFiles.length}\\`);\n console.log(\\`[Workflow] Timestamp: \\${(/* @__PURE__ */ new Date()).toISOString()}\\`);\n const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n const report = await generateReportStep({\n prTitle,\n prBody,\n prNumber,\n previewUrl,\n changedFiles,\n pagesToCheck,\n crawlResults,\n verification,\n performanceResults,\n repoOwner,\n repoName\n });\n const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n return Response.json({\n success: verification.allChecksPassed,\n reportUrl: blobResult.blobUrl,\n prComment: true,\n verification: verification.summary,\n performance: performanceResults.summary,\n message: verification.allChecksPassed ? \"All PR checks passed! \\\\u2705\" : \"Some PR checks failed - see report for details\"\n });\n}\n__name(cloudCheckPRWorkflow, \"cloudCheckPRWorkflow\");\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n\n// virtual-entry.js\nglobalThis.__private_workflows = /* @__PURE__ */ new Map();\nObject.values(workflow_exports).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\nObject.values(workflow_exports2).map((item) => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item));\n//# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["app/api/cloud/fix-workflow/workflow.ts", "app/api/cloud/check-pr/workflow.ts", "virtual-entry.js"],
  "sourcesContent": ["/**__internal_workflows{\"workflows\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"cloudFixWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\"}}},\"steps\":{\"app/api/cloud/fix-workflow/workflow.ts\":{\"analyzeLogsWithAgent\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\"},\"createD3kSandbox\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\"},\"createGitHubPR\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\"},\"fetchRealLogs\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\"},\"updateWorkflowProgressStep\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//updateWorkflowProgressStep\"},\"uploadToBlob\":{\"stepId\":\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\"}}}}*/;\n/**\n * Cloud Fix Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that orchestrates the fix process\n */ export async function cloudFixWorkflow(params) {\n    const { devUrl, projectName, vercelToken, vercelOidcToken: vercelOidcTokenParam, repoOwner, repoName, baseBranch = \"main\", bypassToken, repoUrl, repoBranch, runId, userId } = params;\n    const timestamp = new Date().toISOString();\n    console.log(\"[Workflow] Starting cloud fix workflow...\");\n    console.log(`[Workflow] Dev URL: ${devUrl}`);\n    console.log(`[Workflow] Project: ${projectName}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    console.log(`[Workflow] Bypass Token: ${bypassToken ? \"provided\" : \"not provided\"}`);\n    if (repoOwner && repoName) {\n        console.log(`[Workflow] GitHub Repo: ${repoOwner}/${repoName}`);\n        console.log(`[Workflow] Base Branch: ${baseBranch}`);\n    }\n    if (repoUrl) {\n        console.log(`[Workflow] Will create sandbox from: ${repoUrl}`);\n        console.log(`[Workflow] Branch: ${repoBranch || \"main\"}`);\n    }\n    // Use VERCEL_OIDC_TOKEN from params (passed from request header) or fall back to env\n    // At runtime, OIDC token is in x-vercel-oidc-token header, not process.env\n    const vercelOidcToken = vercelOidcTokenParam || process.env.VERCEL_OIDC_TOKEN;\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from param: ${!!vercelOidcTokenParam}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`);\n    console.log(`[Workflow] VERCEL_OIDC_TOKEN available: ${!!vercelOidcToken}`);\n    // Helper to update progress if tracking is enabled\n    const updateProgress = async (stepNumber, currentStep, sandboxUrl)=>{\n        if (runId && userId) {\n            await updateWorkflowProgressStep(userId, runId, projectName, timestamp, stepNumber, currentStep, sandboxUrl);\n        }\n    };\n    // Step 0: Create d3k sandbox if repoUrl provided\n    // This step also captures CLS data, \"before\" screenshot, and git diff from inside the sandbox\n    let sandboxInfo = null;\n    if (repoUrl) {\n        await updateProgress(0, \"Creating development sandbox...\");\n        sandboxInfo = await createD3kSandbox(repoUrl, repoBranch || \"main\", projectName, vercelToken, vercelOidcToken);\n        if (sandboxInfo?.devUrl) {\n            await updateProgress(0, \"Sandbox ready, starting dev server...\", sandboxInfo.devUrl);\n        }\n    }\n    // Step 1: Fetch real logs (using sandbox MCP if available, otherwise devUrl directly)\n    // If we got CLS data from Step 0, pass it to Step 1 to avoid re-fetching\n    // Use bypass token from sandbox if available, otherwise use provided one\n    // Also pass the beforeScreenshotUrl from Step 0 if available\n    await updateProgress(1, \"Capturing performance metrics (CLS, LCP, errors)...\");\n    const effectiveBypassToken = sandboxInfo?.bypassToken || bypassToken;\n    const step1Result = await fetchRealLogs(sandboxInfo?.mcpUrl || devUrl, effectiveBypassToken, sandboxInfo?.devUrl, sandboxInfo?.clsData, sandboxInfo?.mcpError, sandboxInfo?.beforeScreenshotUrl);\n    const { logAnalysis, beforeScreenshotUrl } = step1Result;\n    await updateProgress(1, `Captured ${logAnalysis.length > 5000 ? \"detailed\" : \"initial\"} diagnostics`);\n    // Step 2: Invoke AI agent to analyze logs and create fix\n    await updateProgress(2, \"AI agent analyzing logs and generating fixes...\");\n    const fixProposal = await analyzeLogsWithAgent(logAnalysis, sandboxInfo?.devUrl || devUrl);\n    // Provide feedback on what was found\n    const hasError = fixProposal.toLowerCase().includes(\"error\") || fixProposal.toLowerCase().includes(\"issue\");\n    const hasFix = fixProposal.includes(\"```diff\");\n    if (hasFix) {\n        await updateProgress(2, \"AI generated a fix proposal with code changes\");\n    } else if (hasError) {\n        await updateProgress(2, \"AI identified issues but no code fix needed\");\n    } else {\n        await updateProgress(2, \"AI analysis complete - system appears healthy\");\n    }\n    // Step 3: Upload to blob storage with full context, screenshot, and git diff\n    await updateProgress(3, \"Compiling full report with screenshots...\");\n    const blobResult = await uploadToBlob(fixProposal, projectName, logAnalysis, sandboxInfo?.devUrl || devUrl, beforeScreenshotUrl, sandboxInfo?.gitDiff);\n    await updateProgress(3, \"Report uploaded to Vercel Blob\");\n    // Step 4: Create GitHub PR if repo info provided AND there are actual fixes to apply\n    let prResult = null;\n    const hasGitPatch = fixProposal.includes(\"```diff\");\n    if (repoOwner && repoName && hasGitPatch) {\n        await updateProgress(4, `Creating PR on ${repoOwner}/${repoName}...`);\n        prResult = await createGitHubPR(fixProposal, blobResult.blobUrl, repoOwner, repoName, baseBranch, projectName);\n        if (prResult?.success) {\n            await updateProgress(4, `PR #${prResult.prNumber} created successfully`);\n        }\n    } else if (repoOwner && repoName && !hasGitPatch) {\n        await updateProgress(4, \"No code changes needed - skipping PR\");\n        console.log(\"[Workflow] No git patch found - skipping PR creation (system is healthy)\");\n    }\n    // Note: Sandbox cleanup is handled automatically by the sandbox timeout\n    // We cannot store cleanup functions as they're not serializable\n    return Response.json({\n        ...blobResult,\n        pr: prResult\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar createD3kSandbox = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createD3kSandbox\");\nvar fetchRealLogs = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//fetchRealLogs\");\nvar analyzeLogsWithAgent = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//analyzeLogsWithAgent\");\nvar uploadToBlob = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//uploadToBlob\");\nvar createGitHubPR = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//createGitHubPR\");\n// Step wrapper for updating workflow progress (uses dynamic import like other steps)\nvar updateWorkflowProgressStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/fix-workflow/workflow.ts//updateWorkflowProgressStep\");\ncloudFixWorkflow.workflowId = \"workflow//app/api/cloud/fix-workflow/workflow.ts//cloudFixWorkflow\";\n", "/**__internal_workflows{\"workflows\":{\"app/api/cloud/check-pr/workflow.ts\":{\"cloudCheckPRWorkflow\":{\"workflowId\":\"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\"}}},\"steps\":{\"app/api/cloud/check-pr/workflow.ts\":{\"checkPerformanceStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\"},\"crawlPreviewPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\"},\"generateReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\"},\"identifyAffectedPagesStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\"},\"uploadReportStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\"},\"verifyPRClaimsStep\":{\"stepId\":\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\"}}}}*/;\n/**\n * Cloud Check PR Workflow Function - Core workflow logic\n *\n * This file contains ONLY the workflow function and step wrappers.\n * It does NOT import workflow/api to avoid bundler issues.\n */ /**\n * Main workflow function that checks a PR's changes\n */ export async function cloudCheckPRWorkflow(params) {\n    const { previewUrl, prTitle, prBody, changedFiles, repoOwner, repoName, prNumber } = params;\n    console.log(\"[Workflow] Starting cloud check-pr workflow...\");\n    console.log(`[Workflow] Preview URL: ${previewUrl}`);\n    console.log(`[Workflow] PR #${prNumber}: ${prTitle}`);\n    console.log(`[Workflow] Changed files: ${changedFiles.length}`);\n    console.log(`[Workflow] Timestamp: ${new Date().toISOString()}`);\n    // Step 1: Determine which pages to check based on changed files\n    const pagesToCheck = await identifyAffectedPagesStep(changedFiles, prBody);\n    // Step 2: Crawl the preview deployment\n    const crawlResults = await crawlPreviewPagesStep(previewUrl, pagesToCheck);\n    // Step 3: Verify PR claims against actual behavior\n    const verification = await verifyPRClaimsStep(prTitle, prBody, crawlResults, changedFiles);\n    // Step 4: Check performance metrics\n    const performanceResults = await checkPerformanceStep(previewUrl, pagesToCheck);\n    // Step 5: Generate comprehensive report\n    const report = await generateReportStep({\n        prTitle,\n        prBody,\n        prNumber,\n        previewUrl,\n        changedFiles,\n        pagesToCheck,\n        crawlResults,\n        verification,\n        performanceResults,\n        repoOwner,\n        repoName\n    });\n    // Step 6: Upload report to blob storage\n    const blobResult = await uploadReportStep(report, repoOwner, repoName, prNumber);\n    return Response.json({\n        success: verification.allChecksPassed,\n        reportUrl: blobResult.blobUrl,\n        prComment: true,\n        verification: verification.summary,\n        performance: performanceResults.summary,\n        message: verification.allChecksPassed ? \"All PR checks passed! \u2705\" : \"Some PR checks failed - see report for details\"\n    });\n}\n// Step function wrappers that dynamically import the actual implementations\nvar identifyAffectedPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//identifyAffectedPagesStep\");\nvar crawlPreviewPagesStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//crawlPreviewPagesStep\");\n// biome-ignore lint/suspicious/noExplicitAny: AI-generated crawl data has dynamic structure\nvar verifyPRClaimsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//verifyPRClaimsStep\");\nvar checkPerformanceStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//checkPerformanceStep\");\n// biome-ignore lint/suspicious/noExplicitAny: Report data has dynamic structure from previous steps\nvar generateReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//generateReportStep\");\nvar uploadReportStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//app/api/cloud/check-pr/workflow.ts//uploadReportStep\");\ncloudCheckPRWorkflow.workflowId = \"workflow//app/api/cloud/check-pr/workflow.ts//cloudCheckPRWorkflow\";\n", "globalThis.__private_workflows = new Map();\nimport * as workflowFile0 from './app/api/cloud/fix-workflow/workflow.ts';\n            Object.values(workflowFile0).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))\nimport * as workflowFile1 from './app/api/cloud/check-pr/workflow.ts';\n            Object.values(workflowFile1).map(item => item?.workflowId && globalThis.__private_workflows.set(item.workflowId, item))"],
  "mappings": ";;;;;;;;AAAA;AAAA;AAAA;AAAA;AAQI,eAAsB,iBAAiB,QAAQ;AAC/C,QAAM,EAAE,QAAQ,aAAa,aAAa,iBAAiB,sBAAsB,WAAW,UAAU,aAAa,QAAQ,aAAa,SAAS,YAAY,OAAO,OAAO,IAAI;AAC/K,QAAM,aAAY,oBAAI,KAAK,GAAE,YAAY;AACzC,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,uBAAuB,MAAM,EAAE;AAC3C,UAAQ,IAAI,uBAAuB,WAAW,EAAE;AAChD,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAC/D,UAAQ,IAAI,4BAA4B,cAAc,aAAa,cAAc,EAAE;AACnF,MAAI,aAAa,UAAU;AACvB,YAAQ,IAAI,2BAA2B,SAAS,IAAI,QAAQ,EAAE;AAC9D,YAAQ,IAAI,2BAA2B,UAAU,EAAE;AAAA,EACvD;AACA,MAAI,SAAS;AACT,YAAQ,IAAI,wCAAwC,OAAO,EAAE;AAC7D,YAAQ,IAAI,sBAAsB,cAAc,MAAM,EAAE;AAAA,EAC5D;AAGA,QAAM,kBAAkB,wBAAwB,QAAQ,IAAI;AAC5D,UAAQ,IAAI,4CAA4C,CAAC,CAAC,oBAAoB,EAAE;AAChF,UAAQ,IAAI,0CAA0C,CAAC,CAAC,QAAQ,IAAI,iBAAiB,EAAE;AACvF,UAAQ,IAAI,2CAA2C,CAAC,CAAC,eAAe,EAAE;AAE1E,QAAM,iBAAiB,8BAAO,YAAY,aAAa,eAAa;AAChE,QAAI,SAAS,QAAQ;AACjB,YAAM,2BAA2B,QAAQ,OAAO,aAAa,WAAW,YAAY,aAAa,UAAU;AAAA,IAC/G;AAAA,EACJ,GAJuB;AAOvB,MAAI,cAAc;AAClB,MAAI,SAAS;AACT,UAAM,eAAe,GAAG,iCAAiC;AACzD,kBAAc,MAAM,iBAAiB,SAAS,cAAc,QAAQ,aAAa,aAAa,eAAe;AAC7G,QAAI,aAAa,QAAQ;AACrB,YAAM,eAAe,GAAG,yCAAyC,YAAY,MAAM;AAAA,IACvF;AAAA,EACJ;AAKA,QAAM,eAAe,GAAG,qDAAqD;AAC7E,QAAM,uBAAuB,aAAa,eAAe;AACzD,QAAM,cAAc,MAAM,cAAc,aAAa,UAAU,QAAQ,sBAAsB,aAAa,QAAQ,aAAa,SAAS,aAAa,UAAU,aAAa,mBAAmB;AAC/L,QAAM,EAAE,aAAa,oBAAoB,IAAI;AAC7C,QAAM,eAAe,GAAG,YAAY,YAAY,SAAS,MAAO,aAAa,SAAS,cAAc;AAEpG,QAAM,eAAe,GAAG,iDAAiD;AACzE,QAAM,cAAc,MAAM,qBAAqB,aAAa,aAAa,UAAU,MAAM;AAEzF,QAAM,WAAW,YAAY,YAAY,EAAE,SAAS,OAAO,KAAK,YAAY,YAAY,EAAE,SAAS,OAAO;AAC1G,QAAM,SAAS,YAAY,SAAS,SAAS;AAC7C,MAAI,QAAQ;AACR,UAAM,eAAe,GAAG,+CAA+C;AAAA,EAC3E,WAAW,UAAU;AACjB,UAAM,eAAe,GAAG,6CAA6C;AAAA,EACzE,OAAO;AACH,UAAM,eAAe,GAAG,+CAA+C;AAAA,EAC3E;AAEA,QAAM,eAAe,GAAG,2CAA2C;AACnE,QAAM,aAAa,MAAM,aAAa,aAAa,aAAa,aAAa,aAAa,UAAU,QAAQ,qBAAqB,aAAa,OAAO;AACrJ,QAAM,eAAe,GAAG,gCAAgC;AAExD,MAAI,WAAW;AACf,QAAM,cAAc,YAAY,SAAS,SAAS;AAClD,MAAI,aAAa,YAAY,aAAa;AACtC,UAAM,eAAe,GAAG,kBAAkB,SAAS,IAAI,QAAQ,KAAK;AACpE,eAAW,MAAM,eAAe,aAAa,WAAW,SAAS,WAAW,UAAU,YAAY,WAAW;AAC7G,QAAI,UAAU,SAAS;AACnB,YAAM,eAAe,GAAG,OAAO,SAAS,QAAQ,uBAAuB;AAAA,IAC3E;AAAA,EACJ,WAAW,aAAa,YAAY,CAAC,aAAa;AAC9C,UAAM,eAAe,GAAG,sCAAsC;AAC9D,YAAQ,IAAI,0EAA0E;AAAA,EAC1F;AAGA,SAAO,SAAS,KAAK;AAAA,IACjB,GAAG;AAAA,IACH,IAAI;AAAA,EACR,CAAC;AACL;AAnF0B;AAqF1B,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AACnI,IAAI,gBAAgB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6DAA6D;AAC7H,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oEAAoE;AAC3I,IAAI,eAAe,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC3H,IAAI,iBAAiB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AAE/H,IAAI,6BAA6B,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0EAA0E;AACvJ,iBAAiB,aAAa;;;ACpG9B,IAAAA,oBAAA;AAAA,SAAAA,mBAAA;AAAA;AAAA;AAQI,eAAsB,qBAAqB,QAAQ;AACnD,QAAM,EAAE,YAAY,SAAS,QAAQ,cAAc,WAAW,UAAU,SAAS,IAAI;AACrF,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,2BAA2B,UAAU,EAAE;AACnD,UAAQ,IAAI,kBAAkB,QAAQ,KAAK,OAAO,EAAE;AACpD,UAAQ,IAAI,6BAA6B,aAAa,MAAM,EAAE;AAC9D,UAAQ,IAAI,0BAAyB,oBAAI,KAAK,GAAE,YAAY,CAAC,EAAE;AAE/D,QAAM,eAAe,MAAM,0BAA0B,cAAc,MAAM;AAEzE,QAAM,eAAe,MAAM,sBAAsB,YAAY,YAAY;AAEzE,QAAM,eAAe,MAAM,mBAAmB,SAAS,QAAQ,cAAc,YAAY;AAEzF,QAAM,qBAAqB,MAAM,qBAAqB,YAAY,YAAY;AAE9E,QAAM,SAAS,MAAM,mBAAmB;AAAA,IACpC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACJ,CAAC;AAED,QAAM,aAAa,MAAM,iBAAiB,QAAQ,WAAW,UAAU,QAAQ;AAC/E,SAAO,SAAS,KAAK;AAAA,IACjB,SAAS,aAAa;AAAA,IACtB,WAAW,WAAW;AAAA,IACtB,WAAW;AAAA,IACX,cAAc,aAAa;AAAA,IAC3B,aAAa,mBAAmB;AAAA,IAChC,SAAS,aAAa,kBAAkB,iCAA4B;AAAA,EACxE,CAAC;AACL;AAvC0B;AAyC1B,IAAI,4BAA4B,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,qEAAqE;AACjJ,IAAI,wBAAwB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,iEAAiE;AAEzI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,gEAAgE;AAEvI,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,8DAA8D;AACnI,IAAI,mBAAmB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,4DAA4D;AAC/H,qBAAqB,aAAa;;;ACzDlC,WAAW,sBAAsB,oBAAI,IAAI;AAE7B,OAAO,OAAO,gBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;AAEtH,OAAO,OAAOC,iBAAa,EAAE,IAAI,UAAQ,MAAM,cAAc,WAAW,oBAAoB,IAAI,KAAK,YAAY,IAAI,CAAC;",
  "names": ["workflow_exports", "workflow_exports"]
}
\n`;\n\nexport const POST = workflowEntrypoint(workflowCode);"],"names":[],"mappings":"uCAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,MACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,EAAA,CAAA,CAAA,OACA,EAAA,CAAA,CAAA,MAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OCfA,EAAA,CAAA,CAAA,OAAA,IAAA,EAAA,EAAA,CAAA,CAAA,OAEA,IAAM,EAAe,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AA+ItB,CAAC,CAEY,EAAO,CAAA,EAAA,EAAA,kBAAA,AAAkB,EAAC,2BDnIvC,IAAA,EAAA,EAAA,CAAA,CAAA,OAIA,IAAM,EAAc,IAAI,EAAA,mBAAmB,CAAC,CACxC,WAAY,CACR,KAAM,EAAA,SAAS,CAAC,SAAS,CACzB,KAAM,sCACN,SAAU,gCACV,SAAU,QACV,WAAY,EAChB,EACA,QAAS,CAAA,OACT,IADiD,eACc,CAA3C,EACpB,iBAAkB,iEAClB,iBAZqB,GAarB,SAAA,CACJ,GAIM,kBAAE,CAAgB,sBAAE,CAAoB,aAAE,CAAW,CAAE,CAAG,EAChE,SAAS,IACL,MAAO,CAAA,EAAA,EAAA,UAAA,AAAW,EAAC,kBACf,uBACA,CACJ,EACJ,CAEO,eAAe,EAAQ,CAAG,CAAE,CAAG,CAAE,CAAG,EACnC,EAAY,KAAK,EAAE,AACnB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,+BAAgC,QAAQ,MAAM,CAAC,MAAM,IAE7E,IAAI,EAAU,sCAKV,EAAU,EAAQ,OAAO,CAAC,WAAY,KAAO,IAMjD,IAAM,EAAgB,MAAM,EAAY,OAAO,CAAC,EAAK,EAAK,SACtD,EACA,mBAHE,CAAA,CAIN,GACA,GAAI,CAAC,EAID,OAHA,EAAI,IADY,MACF,CAAG,IACjB,EAAI,GAAG,CAAC,eACS,MAAjB,CAAwB,CAApB,IAAyB,KAAhB,EAAoB,EAAI,SAAS,CAAC,IAAI,CAAC,EAAK,QAAQ,OAAO,IACjE,KAEX,GAAM,SAAE,CAAO,QAAE,CAAM,YAAE,CAAU,WAAE,CAAS,CAAE,aAAW,mBAAE,CAAiB,qBAAE,CAAmB,sBAAE,CAAoB,yBAAE,CAAuB,CAAE,kBAAgB,yBAAE,CAAuB,uBAAE,CAAqB,CAAE,CAAG,EACnN,EAAoB,CAAA,EAAA,EAAA,gBAAA,AAAgB,EAAC,GACvC,GAAQ,CAAQ,GAAkB,aAAa,CAAC,EAAkB,EAAI,EAAkB,MAAM,CAAC,EAAA,AAAiB,EAC9G,EAAY,WAEa,MAAvB,EAA8B,KAAK,EAAI,EAAoB,SAAA,AAAS,EAAE,AACtE,MAAM,EAAoB,SAAS,CAAC,EAAK,EAAK,GAAW,GAEzD,EAAI,GAAG,CAAC,gCAEL,MAEX,GAAI,GAAS,CAAC,EAAa,CACvB,IAAM,GAAgB,CAAQ,EAAkB,MAAM,CAAC,EAAiB,CAClE,EAAgB,EAAkB,aAAa,CAAC,EAAkB,CACxE,GAAI,GAC+B,KAA3B,EAAc,KADH,GACW,EAAc,CAAC,EAAe,CACpD,GAAI,EAAW,YAAY,CAAC,WAAW,CACnC,CADqC,MAC9B,MAAM,GAEjB,OAAM,IAAI,EAAA,eAAe,AAC7B,CAER,CACA,IAAI,EAAW,MACX,GAAU,EAAY,IAAb,CAAkB,EAAK,EAAD,EAG/B,EAAW,AAAa,OAHqB,KAC7C,EAAW,CAAA,EAEwB,IAAM,CAAA,EAE7C,IAAM,GACgB,IAAtB,EAAY,EAAkB,GAAb,EAEjB,CAAC,EAKK,EAAqB,GAAS,CAAC,EAIjC,GAAyB,GACzB,CAAA,EAAA,EAAA,iBADkD,aAClD,AAA8B,EAAC,CAC3B,KAAM,IAbqF,sBAc3F,wBACA,EACA,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,uBACnC,CACJ,EACJ,GAEJ,IAAM,EAAS,EAAI,MAAM,EAAI,MACvB,EAAS,CAAA,EAAA,EAAA,SAAA,AAAS,IAClB,EAAa,EAAO,kBAAkB,GACtC,EAAU,QACZ,oBACA,EACA,WAAY,CACR,aAAc,CACV,gBAAgB,CAAQ,EAAW,YAAY,CAAC,cAAc,AAClE,EACA,iBAAiB,CAAQ,EAAW,eAAe,yBACnD,EACA,iBAAkB,CAAA,EAAA,EAAA,cAAA,AAAc,EAAC,EAAK,oBACtC,kBAAmB,EAAW,SAAS,CACvC,UAAW,EAAI,SAAS,CACxB,QAAS,AAAC,IACN,EAAI,EAAE,CAAC,QAAS,EACpB,EACA,sBAAkB,EAClB,8BAA+B,CAAC,EAAO,EAAU,EAAc,IAAa,EAAY,cAAc,CAAC,EAAK,EAAO,EAAc,EAAY,EACjJ,EACA,cAAe,SACX,CACJ,CACJ,EACM,EAAc,IAAI,EAAA,eAAe,CAAC,GAClC,EAAc,IAAI,EAAA,gBAAgB,CAAC,GACnC,EAAU,EAAA,kBAAkB,CAAC,mBAAmB,CAAC,EAAa,CAAA,EAAA,EAAA,sBAAA,AAAsB,EAAC,IAC3F,GAAI,CACA,IAAM,EAAoB,MAAO,GACtB,EAAY,MAAM,CAAC,EAAS,GAAS,OAAO,CAAC,KAChD,GAAI,CAAC,EAAM,OACX,EAAK,aAAa,CAAC,CACf,mBAAoB,EAAI,UAAU,CAClC,YAAY,CAChB,GACA,IAAM,EAAqB,EAAO,qBAAqB,GAEvD,GAAI,CAAC,EACD,OAEJ,GAAI,EAAmB,GAAG,CAAC,EAHF,kBAGwB,EAAA,cAAc,CAAC,aAAa,CAAE,YAC3E,QAAQ,IAAI,CAAC,CAAC,2BAA2B,EAAE,EAAmB,GAAG,CAAC,kBAAkB,qEAAqE,CAAC,EAG9J,IAAM,EAAQ,EAAmB,GAAG,CAAC,cACrC,GAAI,EAAO,CACP,IAAM,EAAO,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAO,CACjC,EAAK,aAAa,CAAC,CACf,aAAc,EACd,aAAc,EACd,iBAAkB,CACtB,GACA,EAAK,UAAU,CAAC,EACpB,MACI,CADG,CACE,UAAU,CAAC,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAE9C,GAEE,GAAgB,CAAoC,CAAA,EAAA,EAAA,EAA5B,YAA4B,AAAc,EAAC,EAAK,eACxE,EAAiB,MAAO,QACtB,EA4FI,EA3FR,IAAM,EAAoB,MAAO,oBAAE,CAAkB,CAAE,IACnD,GAAI,CACA,GAAI,CAAC,GAAiB,GAAwB,GAA2B,CAAC,EAKtE,OAJA,EAAI,SADsF,CAC5E,CAAG,IAEjB,EAAI,SAAS,CAAC,iBAAkB,eAChC,EAAI,GAAG,CAAC,gCACD,KAEX,IAAM,EAAW,MAAM,EAAkB,GACzC,EAAI,YAAY,CAAG,EAAQ,UAAU,CAAC,YAAY,CAClD,IAAI,EAAmB,EAAQ,UAAU,CAAC,gBAAgB,CAGtD,GACI,EAAI,SAAS,EAAE,CACf,CAFc,CAEV,SAAS,CAAC,GACd,OAAmB,GAG3B,IAAM,EAAY,EAAQ,UAAU,CAAC,aAAa,CAGlD,IAAI,EA6BA,OADA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,EAAU,EAAQ,UAAU,CAAC,gBAAgB,EACnF,IA7BA,EACP,IAAM,EAAO,MAAM,EAAS,IAAI,GAE1B,EAAU,CAAA,EAAA,EAAA,yBAAA,AAAyB,EAAC,EAAS,OAAO,EACtD,IACA,CAAO,CAAC,EAAA,GADG,mBACmB,CAAC,CAAG,CAAA,EAElC,CAAC,CAAO,CAAC,eAAe,EAAI,EAAK,IAAI,EAAE,CACvC,CAAO,CAAC,eAAe,CAAG,EAAK,IAAI,AAAJ,EAEnC,IAAM,EAAa,KAAkD,IAA3C,EAAQ,UAAU,CAAC,mBAAmB,IAAoB,EAAQ,UAAU,CAAC,mBAAmB,EAAI,EAAA,cAAA,AAAc,GAAG,AAAQ,EAAQ,UAAU,CAAC,mBAAmB,CACvL,EAAS,KAA8C,IAAvC,EAAQ,UAAU,CAAC,eAAe,EAAoB,EAAQ,UAAU,CAAC,eAAe,EAAI,EAAA,cAAc,MAAG,EAAY,EAAQ,UAAU,CAAC,eAAe,CAcjL,MAZmB,CAYZ,AAXH,MAAO,CACH,KAAM,EAAA,eAAe,CAAC,SAAS,CAC/B,OAAQ,EAAS,MAAM,CACvB,KAAM,OAAO,IAAI,CAAC,MAAM,EAAK,WAAW,IACxC,SACJ,EACA,aAAc,YACV,SACA,CACJ,CACJ,CAEJ,CAKJ,CAAE,KALS,CAKF,EAAK,CAeV,MAZ0B,MAAtB,EAA6B,KAAK,EAAI,EAAmB,OAAA,AAAO,EAAE,CAElE,MAAM,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,uBACA,CACJ,EACJ,GAAG,AATgB,EASJ,GAEb,CACV,CACJ,EACM,EAAa,MAAM,EAAY,cAAc,CAAC,KAChD,aACA,WACA,EACA,UAAW,EAAA,SAAS,CAAC,SAAS,CAC9B,YAAY,oBACZ,EACA,mBAAmB,uBACnB,EACA,4CACA,EACA,UAAW,EAAI,SAAS,eACxB,CACJ,GAEA,GAAI,CAAC,EACD,KADQ,EACD,KAEX,GAAI,CAAe,MAAd,CAAqB,EAAS,AAA0C,GAA9C,IAAK,EAAoB,EAAW,KAAA,AAAK,EAAY,KAAK,EAAI,EAAkB,IAAI,IAAM,EAAA,eAAe,CAAC,SAAS,CAE9I,CAFgJ,KAE1I,OAAO,cAAc,CAAC,AAAI,MAAM,CAAC,kDAAkD,EAAgB,MAAd,CAAqB,EAAS,AAA2C,GAA/C,IAAK,EAAqB,EAAW,KAAK,AAAL,EAAiB,KAAK,EAAI,EAAmB,IAAI,CAAA,CAAE,EAAG,oBAAqB,CACjO,MAAO,OACP,YAAY,EACZ,cAAc,CAClB,EAEA,CAAC,GACD,EAAI,SAAS,CADG,AACF,iBAAkB,EAAuB,cAAgB,EAAW,MAAM,CAAG,OAAS,EAAW,OAAO,CAAG,QAAU,OAGnI,GACA,EAAI,QADS,CACA,CAAC,gBAAiB,2DAEnC,IAAM,EAAU,CAAA,EAAA,EAAA,2BAAA,AAA2B,EAAC,EAAW,KAAK,CAAC,OAAO,EAcpE,OAbI,AAAE,CAAD,EAAkB,GACnB,EADwB,AAChB,GADmB,GACb,CAAC,EAAA,sBAAsB,GAIrC,EAAW,YAAY,EAAK,EAAI,AAAL,SAAc,CAAC,kBAAqB,EAAD,AAAS,GAAG,CAAC,kBAAkB,AAC7F,EAAQ,GAAG,CAAC,gBAAiB,CAAA,EAAA,EAAA,qBAAA,AAAqB,EAAC,EAAW,YAAY,GAE9E,MAAM,CAAA,EAAA,EAAA,YAAY,AAAZ,EAAa,EAAa,EAChC,IAAI,SAAS,EAAW,KAAK,CAAC,IAAI,CAAE,SAChC,EACA,OAAQ,EAAW,KAAK,CAAC,MAAM,EAAI,GACvC,IACO,IACX,EAGI,EACA,MAAM,EAAe,EADT,CAGZ,MAAM,EAAO,qBAAqB,CAAC,EAAI,OAAO,CAAE,IAAI,EAAO,KAAK,CAAC,EAAA,cAAc,CAAC,aAAa,CAAE,CACvF,SAAU,CAAA,EAAG,EAAO,CAAC,EAAE,EAAA,CAAS,CAChC,KAAM,EAAA,QAAQ,CAAC,MAAM,CACrB,WAAY,CACR,cAAe,EACf,cAAe,EAAI,GAAG,AAC1B,CACJ,EAAG,GAEf,CAAE,MAAO,EAAK,CAeV,GAdM,aAAe,EAAA,eAAe,EAEhC,CAFmC,KAE7B,EAAY,cAAc,CAAC,EAAK,EAAK,CACvC,WAAY,aACZ,UAAW,EACX,UAAW,QACX,iBAAkB,CAAA,EAAA,EAAA,mBAAA,AAAmB,EAAC,oBAClC,EACA,sBACJ,EACJ,GAAG,AATgB,EASJ,GAIf,EAAO,MAAM,EAKjB,OAHA,MAAM,CAAA,EAAA,EAAA,YAAA,AAAY,EAAC,EAAa,EAAa,IAAI,SAAS,KAAM,CAC5D,OAAQ,GACZ,IACO,IACX,CACJ,EAEA,qCAAqC","ignoreList":[0]}
@@ -1,4 +1,4 @@
1
- module.exports=[1177,e=>{"use strict";async function o(e,o,t,s,r){console.log(`[Step 0] Creating d3k sandbox for ${t}...`),console.log(`[Step 0] Repository: ${e}`),console.log(`[Step 0] Branch: ${o}`),console.log(`[Step 0] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`),console.log(`[Step 0] VERCEL_OIDC_TOKEN passed as param: ${!!r}`),console.log(`[Step 0] VERCEL_TOKEN available: ${!!process.env.VERCEL_TOKEN}`),console.log(`[Step 0] User access token provided: ${!!s}`),r&&!process.env.VERCEL_OIDC_TOKEN&&(process.env.VERCEL_OIDC_TOKEN=r,console.log("[Step 0] Set VERCEL_OIDC_TOKEN from workflow context"));let a=await createD3kSandboxUtil({repoUrl:e,branch:o,projectDir:"",packageManager:"pnpm",debug:!0});console.log("[Step 0] Sandbox created successfully"),console.log(`[Step 0] Dev URL: ${a.devUrl}`),console.log(`[Step 0] MCP URL: ${a.mcpUrl}`),console.log("[Step 0] Getting Chromium path for screenshots...");let n="/tmp/chromium";try{let e=await runSandboxCommand(a.sandbox,"node",["-e","require('@sparticuz/chromium').executablePath().then(p => console.log(p))"]);0===e.exitCode&&e.stdout.trim()&&(n=e.stdout.trim(),console.log(`[Step 0] Chromium path: ${n}`))}catch{console.log(`[Step 0] Could not get chromium path, using default: ${n}`)}console.log("[Step 0] ===== CHROMIUM CDP TEST (d3k exact command) =====");try{let e=`
1
+ module.exports=[1177,e=>{"use strict";async function t(e,t,o,s,r){console.log(`[Step 0] Creating d3k sandbox for ${o}...`),console.log(`[Step 0] Repository: ${e}`),console.log(`[Step 0] Branch: ${t}`),console.log(`[Step 0] VERCEL_OIDC_TOKEN from env: ${!!process.env.VERCEL_OIDC_TOKEN}`),console.log(`[Step 0] VERCEL_OIDC_TOKEN passed as param: ${!!r}`),console.log(`[Step 0] VERCEL_TOKEN available: ${!!process.env.VERCEL_TOKEN}`),console.log(`[Step 0] User access token provided: ${!!s}`),r&&!process.env.VERCEL_OIDC_TOKEN&&(process.env.VERCEL_OIDC_TOKEN=r,console.log("[Step 0] Set VERCEL_OIDC_TOKEN from workflow context"));let a=await createD3kSandboxUtil({repoUrl:e,branch:t,projectDir:"",packageManager:"pnpm",debug:!0});console.log("[Step 0] Sandbox created successfully"),console.log(`[Step 0] Dev URL: ${a.devUrl}`),console.log(`[Step 0] MCP URL: ${a.mcpUrl}`),console.log("[Step 0] Getting Chromium path for screenshots...");let n="/tmp/chromium";try{let e=await runSandboxCommand(a.sandbox,"node",["-e","require('@sparticuz/chromium').executablePath().then(p => console.log(p))"]);0===e.exitCode&&e.stdout.trim()&&(n=e.stdout.trim(),console.log(`[Step 0] Chromium path: ${n}`))}catch{console.log(`[Step 0] Could not get chromium path, using default: ${n}`)}console.log("[Step 0] ===== CHROMIUM CDP TEST (d3k exact command) =====");try{let e=`
2
2
  exec 2>&1
3
3
  echo "=== Chromium CDP Test (d3k exact command) ==="
4
4
  echo "Chromium path: ${n}"
@@ -77,14 +77,14 @@ LOADINGHTML
77
77
  fi
78
78
  echo ""
79
79
  echo "=== End d3k exact command test ==="
80
- `,o=await runSandboxCommand(a.sandbox,"bash",["-c",e]);console.log(`[Step 0] d3k Chrome test (exit ${o.exitCode}):
81
- ${o.stdout||"(no output)"}`),o.stderr&&console.log(`[Step 0] d3k Chrome test stderr: ${o.stderr}`)}catch(e){console.log(`[Step 0] d3k Chrome test error: ${e instanceof Error?e.message:String(e)}`)}console.log("[Step 0] ===== END d3k EXACT COMMAND TEST ====="),console.log("[Step 0] Capturing BEFORE screenshot...");let l=null;try{let e=await captureScreenshotInSandbox(a.sandbox,"http://localhost:3000",n,"before");e&&(l=await uploadScreenshot(e,"before",t))}catch(e){console.log(`[Step 0] Before screenshot failed: ${e instanceof Error?e.message:String(e)}`)}console.log("[Step 0] Capturing CLS metrics from inside sandbox...");let i=null,c=null;try{let e='curl -s -X POST http://localhost:3684/mcp -H "Content-Type: application/json" -d \'{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"fix_my_app","arguments":{"mode":"snapshot","focusArea":"performance","returnRawData":true}}}\'';console.log("[Step 0] Executing MCP command inside sandbox..."),console.log(`[Step 0] MCP command: ${e.substring(0,200)}...`);let o="",t="",s=-1;try{let r=await runSandboxCommand(a.sandbox,"bash",["-c",e]);o=r.stdout,t=r.stderr,s=r.exitCode,console.log(`[Step 0] MCP command exit code: ${s}`),console.log(`[Step 0] MCP stdout length: ${o.length} bytes`),t&&console.log(`[Step 0] MCP stderr: ${t.substring(0,500)}`)}catch(o){let e=o instanceof Error?o.message:String(o);console.log(`[Step 0] sandbox.runCommand threw: ${e}`),c=`sandbox.runCommand failed: ${e}`}if(0===s&&o)try{let e=JSON.parse(o);if(e.result?.content){for(let o of e.result.content)if("text"===o.type&&o.text)try{i=JSON.parse(o.text),console.log("[Step 0] Successfully parsed CLS data");break}catch{i={rawOutput:o.text}}}console.log("[Step 0] CLS data captured:",JSON.stringify(i).substring(0,500))}catch(e){c=`Failed to parse MCP response: ${e instanceof Error?e.message:String(e)}`,console.log(`[Step 0] ${c}`),console.log(`[Step 0] Raw stdout: ${o.substring(0,1e3)}`)}else 0!==s&&!c&&(c=`MCP command failed with exit code ${s}`,console.log(`[Step 0] ${c}`),t&&console.log(`[Step 0] stderr: ${t}`))}catch(e){c=`MCP execution error: ${e instanceof Error?e.message:String(e)}`,console.log(`[Step 0] ${c}`)}console.log("[Step 0] === Dumping sandbox logs before returning ===");try{let e=await runSandboxCommand(a.sandbox,"sh",["-c",'for log in /home/vercel-sandbox/.d3k/logs/*.log; do [ -f "$log" ] && echo "=== $log ===" && tail -100 "$log" || true; done 2>/dev/null || echo "No log files found"']);console.log(e.stdout)}catch(e){console.log(`[Step 0] Failed to dump logs: ${e instanceof Error?e.message:String(e)}`)}console.log("[Step 0] === End sandbox log dump ==="),console.log("[Step 0] Capturing git diff from sandbox...");let p=null;try{let e=await runSandboxCommand(a.sandbox,"sh",["-c","cd /vercel/sandbox && git diff --no-color 2>/dev/null || echo 'No git diff available'"]);0===e.exitCode&&e.stdout.trim()&&"No git diff available"!==e.stdout.trim()?(p=e.stdout.trim(),console.log(`[Step 0] Git diff captured (${p.length} chars)`),console.log(`[Step 0] Git diff preview:
82
- ${p.substring(0,500)}...`)):console.log("[Step 0] No git changes detected in sandbox")}catch(e){console.log(`[Step 0] Failed to capture git diff: ${e instanceof Error?e.message:String(e)}`)}return{mcpUrl:a.mcpUrl,devUrl:a.devUrl,bypassToken:a.bypassToken,clsData:i,mcpError:c,beforeScreenshotUrl:l,chromiumPath:n,gitDiff:p}}async function t(e,o,t,s,r,a){if(s)return console.log("[Step 1] Using CLS data captured in Step 0"),a&&console.log(`[Step 1] Before screenshot from Step 0: ${a}`),{logAnalysis:JSON.stringify(s,null,2),beforeScreenshotUrl:a||null};r&&console.log(`[Step 1] Note: MCP error from Step 0: ${r}`);let n=!!t,l=t||e,i=n?e:null;console.log(`[Step 1] Fetching logs from: ${l}`),console.log(`[Step 1] Using sandbox: ${n?"yes":"no"}`),i&&console.log(`[Step 1] MCP URL: ${i}`),console.log(`[Step 1] Bypass token: ${o?"provided":"not provided"}`);try{let e=o?`${l}?x-vercel-protection-bypass=${o}`:l;if(console.log(`[Step 1] Final URL: ${e.replace(o||"","***")}`),n&&i){console.log("[Step 1] Using d3k MCP server to capture CLS metrics and errors..."),console.log("[Step 1] Validating d3k MCP server access...");let o=new AbortController,t=setTimeout(()=>o.abort(),3e4);try{let e=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/list"}),signal:o.signal});if(clearTimeout(t),e.ok){let o=await e.text();try{let e=null;for(let t of o.split("\n"))if(t.startsWith("data: "))try{e=JSON.parse(t.substring(6));break}catch{}e||(e=JSON.parse(o));let t=e.result?.tools?.map(e=>e.name)||[];console.log(`[Step 1] ✅ d3k MCP server accessible`),console.log(`[Step 1] Available tools (${t.length}): ${t.join(", ")}`);let s=t.some(e=>e.includes("chrome-devtools")),r=t.some(e=>e.includes("nextjs")),a=t.includes("fix_my_app");console.log(`[Step 1] Chrome DevTools MCP: ${s?"✅":"❌"}`),console.log(`[Step 1] Next.js DevTools MCP: ${r?"✅":"❌"}`),console.log(`[Step 1] fix_my_app tool: ${a?"✅":"❌"}`)}catch{console.log(`[Step 1] MCP server responded but couldn't parse tools list: ${o.substring(0,200)}`)}}else console.log(`[Step 1] ⚠️ MCP server not accessible: ${e.status}`)}catch(s){clearTimeout(t);let e=s instanceof Error?s.message:String(s),o=s instanceof Error&&"AbortError"===s.name;console.log(`[Step 1] ⚠️ Failed to validate MCP server: ${o?"Timed out after 30s":e}`)}console.log("[Step 1] Navigating browser to app URL...");let s=new AbortController,r=setTimeout(()=>s.abort(),3e4);try{let o=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/call",params:{name:"execute_browser_action",arguments:{action:"navigate",params:{url:e}}}}),signal:s.signal});clearTimeout(r),o.ok?console.log("[Step 1] Browser navigation completed"):console.log(`[Step 1] Browser navigation failed: ${o.status}`)}catch(o){clearTimeout(r);let e=o instanceof Error&&"AbortError"===o.name;console.log(`[Step 1] Browser navigation error: ${e?"Timed out after 30s":o instanceof Error?o.message:String(o)}`)}console.log("[Step 1] Waiting 5s for page load..."),await new Promise(e=>setTimeout(e,5e3));let a=null;console.log("[Step 1] Capturing 'before' screenshot...");let n=new AbortController,c=setTimeout(()=>n.abort(),3e4);try{let e=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/call",params:{name:"chrome-devtools_take_snapshot",arguments:{}}}),signal:n.signal});if(clearTimeout(c),e.ok){let o=await e.text();for(let e of o.split("\n"))if(e.startsWith("data: "))try{let o=JSON.parse(e.substring(6));if(o.result?.content){for(let e of o.result.content)if("image"===e.type&&e.data){let o=Buffer.from(e.data,"base64"),t=new Date().toISOString().replace(/[:.]/g,"-"),s=`screenshot-before-${t}.png`;a=(await put(s,o,{access:"public",contentType:"image/png"})).url,console.log(`[Step 1] ✅ Before screenshot uploaded: ${a}`)}}}catch{}a||(console.log("[Step 1] Screenshot response received but no image data found"),console.log(`[Step 1] Response preview: ${o.substring(0,500)}`))}else console.log(`[Step 1] Screenshot request failed: ${e.status}`)}catch(o){clearTimeout(c);let e=o instanceof Error&&"AbortError"===o.name;console.log(`[Step 1] Screenshot capture error: ${e?"Timed out after 30s":o instanceof Error?o.message:String(o)}`)}console.log("[Step 1] Fetching d3k logs from sandbox to verify it's working...");let p=new AbortController,d=setTimeout(()=>p.abort(),15e3);try{let e=await fetch(`${i}/api/logs`,{signal:p.signal});if(clearTimeout(d),e.ok){let o=await e.text();console.log(`[Step 1] d3k logs (last 1000 chars):
83
- ${o.slice(-1e3)}`)}else console.log(`[Step 1] Could not fetch d3k logs: ${e.status}`)}catch(o){clearTimeout(d);let e=o instanceof Error&&"AbortError"===o.name;console.log(`[Step 1] Failed to fetch d3k logs: ${e?"Timed out after 15s":o instanceof Error?o.message:String(o)}`)}console.log("[Step 1] Calling fix_my_app with focusArea='performance'...");let g=new AbortController,h=setTimeout(()=>g.abort(),18e4);try{let e=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:1,method:"tools/call",params:{name:"fix_my_app",arguments:{mode:"snapshot",focusArea:"performance",timeRangeMinutes:5,returnRawData:!1}}}),signal:g.signal});if(clearTimeout(h),!e.ok)throw Error(`MCP request failed: ${e.status}`);let o=await e.text();console.log(`[Step 1] fix_my_app response length: ${o.length} bytes`),console.log(`[Step 1] fix_my_app response preview (first 500 chars):
84
- ${o.substring(0,500)}`);let t=o.split("\n");console.log(`[Step 1] Response split into ${t.length} lines`);let s="",r=0,n=0;for(let e of t)if(e.startsWith("data: ")){r++;try{let o=JSON.parse(e.substring(6));if(console.log(`[Step 1] Parsed JSON line ${r}:`,JSON.stringify(o).substring(0,200)),o.result?.content)for(let e of o.result.content)"text"===e.type&&(n++,s+=e.text,console.log(`[Step 1] Added text content block ${n}, length: ${e.text.length}`));else o.error&&console.log(`[Step 1] ERROR in response: ${JSON.stringify(o.error)}`)}catch(o){console.log(`[Step 1] Failed to parse JSON line ${r}: ${o instanceof Error?o.message:String(o)}`),console.log(`[Step 1] Problem line: ${e.substring(0,200)}`)}}return console.log(`[Step 1] Processed ${r} data lines, ${n} content blocks`),console.log(`[Step 1] Got ${s.length} chars from fix_my_app (performance analysis)`),0===s.length&&console.log(`[Step 1] WARNING: fix_my_app returned NO data. Full response:
85
- ${o}`),{logAnalysis:`d3k Performance Analysis for ${l}
80
+ `,t=await runSandboxCommand(a.sandbox,"bash",["-c",e]);console.log(`[Step 0] d3k Chrome test (exit ${t.exitCode}):
81
+ ${t.stdout||"(no output)"}`),t.stderr&&console.log(`[Step 0] d3k Chrome test stderr: ${t.stderr}`)}catch(e){console.log(`[Step 0] d3k Chrome test error: ${e instanceof Error?e.message:String(e)}`)}console.log("[Step 0] ===== END d3k EXACT COMMAND TEST ====="),console.log("[Step 0] Capturing BEFORE screenshot...");let l=null;try{let e=await captureScreenshotInSandbox(a.sandbox,"http://localhost:3000",n,"before");e&&(l=await uploadScreenshot(e,"before",o))}catch(e){console.log(`[Step 0] Before screenshot failed: ${e instanceof Error?e.message:String(e)}`)}console.log("[Step 0] Capturing CLS metrics from inside sandbox...");let i=null,c=null;try{let e='curl -s -X POST http://localhost:3684/mcp -H "Content-Type: application/json" -d \'{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"fix_my_app","arguments":{"mode":"snapshot","focusArea":"performance","returnRawData":true}}}\'';console.log("[Step 0] Executing MCP command inside sandbox..."),console.log(`[Step 0] MCP command: ${e.substring(0,200)}...`);let t="",o="",s=-1;try{let r=await runSandboxCommand(a.sandbox,"bash",["-c",e]);t=r.stdout,o=r.stderr,s=r.exitCode,console.log(`[Step 0] MCP command exit code: ${s}`),console.log(`[Step 0] MCP stdout length: ${t.length} bytes`),o&&console.log(`[Step 0] MCP stderr: ${o.substring(0,500)}`)}catch(t){let e=t instanceof Error?t.message:String(t);console.log(`[Step 0] sandbox.runCommand threw: ${e}`),c=`sandbox.runCommand failed: ${e}`}if(0===s&&t)try{let e=JSON.parse(t);if(e.result?.content){for(let t of e.result.content)if("text"===t.type&&t.text){try{i=JSON.parse(t.text),console.log("[Step 0] Successfully parsed CLS data as JSON")}catch{i={rawOutput:t.text},console.log("[Step 0] CLS data stored as rawOutput (not JSON)")}break}}i?console.log("[Step 0] CLS data captured:",JSON.stringify(i).substring(0,500)):(console.log("[Step 0] No CLS data extracted from MCP response"),console.log(`[Step 0] Response structure: ${JSON.stringify(e).substring(0,500)}`))}catch(e){c=`Failed to parse MCP response: ${e instanceof Error?e.message:String(e)}`,console.log(`[Step 0] ${c}`),console.log(`[Step 0] Raw stdout: ${t.substring(0,1e3)}`),i={rawMcpOutput:t.substring(0,1e4),parseError:c},console.log("[Step 0] Using raw stdout as fallback CLS data")}else 0!==s&&!c&&(c=`MCP command failed with exit code ${s}`,console.log(`[Step 0] ${c}`),o&&console.log(`[Step 0] stderr: ${o}`))}catch(e){c=`MCP execution error: ${e instanceof Error?e.message:String(e)}`,console.log(`[Step 0] ${c}`)}i||(console.log("[Step 0] WARNING: No CLS data captured, creating placeholder to prevent Step 1 timeout"),i={warning:"MCP fix_my_app did not return data",mcpError:c||"Unknown error",sandboxDevUrl:a.devUrl,sandboxMcpUrl:a.mcpUrl}),console.log(`[Step 0] Final clsData truthy check: ${!!i}`),console.log("[Step 0] === Dumping sandbox logs before returning ===");try{let e=await runSandboxCommand(a.sandbox,"sh",["-c",'for log in /home/vercel-sandbox/.d3k/logs/*.log; do [ -f "$log" ] && echo "=== $log ===" && tail -100 "$log" || true; done 2>/dev/null || echo "No log files found"']);console.log(e.stdout)}catch(e){console.log(`[Step 0] Failed to dump logs: ${e instanceof Error?e.message:String(e)}`)}console.log("[Step 0] === End sandbox log dump ==="),console.log("[Step 0] Capturing git diff from sandbox...");let p=null;try{let e=await runSandboxCommand(a.sandbox,"sh",["-c","cd /vercel/sandbox && git diff --no-color 2>/dev/null || echo 'No git diff available'"]);0===e.exitCode&&e.stdout.trim()&&"No git diff available"!==e.stdout.trim()?(p=e.stdout.trim(),console.log(`[Step 0] Git diff captured (${p.length} chars)`),console.log(`[Step 0] Git diff preview:
82
+ ${p.substring(0,500)}...`)):console.log("[Step 0] No git changes detected in sandbox")}catch(e){console.log(`[Step 0] Failed to capture git diff: ${e instanceof Error?e.message:String(e)}`)}return{mcpUrl:a.mcpUrl,devUrl:a.devUrl,bypassToken:a.bypassToken,clsData:i,mcpError:c,beforeScreenshotUrl:l,chromiumPath:n,gitDiff:p}}async function o(e,t,o,s,r,a){if(console.log(`[Step 1] Received clsData: ${s?"truthy":"falsy"}, type: ${typeof s}`),s&&console.log(`[Step 1] clsData preview: ${JSON.stringify(s).substring(0,200)}`),s)return console.log("[Step 1] Using CLS data captured in Step 0 (skipping MCP calls)"),a&&console.log(`[Step 1] Before screenshot from Step 0: ${a}`),{logAnalysis:JSON.stringify(s,null,2),beforeScreenshotUrl:a||null};console.log("[Step 1] ⚠️ No CLS data from Step 0, will try MCP calls (may timeout)"),r&&console.log(`[Step 1] Note: MCP error from Step 0: ${r}`);let n=!!o,l=o||e,i=n?e:null;console.log(`[Step 1] Fetching logs from: ${l}`),console.log(`[Step 1] Using sandbox: ${n?"yes":"no"}`),i&&console.log(`[Step 1] MCP URL: ${i}`),console.log(`[Step 1] Bypass token: ${t?"provided":"not provided"}`);try{let e=t?`${l}?x-vercel-protection-bypass=${t}`:l;if(console.log(`[Step 1] Final URL: ${e.replace(t||"","***")}`),n&&i){console.log("[Step 1] Using d3k MCP server to capture CLS metrics and errors..."),console.log("[Step 1] Validating d3k MCP server access...");let t=new AbortController,o=setTimeout(()=>t.abort(),3e4);try{let e=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/list"}),signal:t.signal});if(clearTimeout(o),e.ok){let t=await e.text();try{let e=null;for(let o of t.split("\n"))if(o.startsWith("data: "))try{e=JSON.parse(o.substring(6));break}catch{}e||(e=JSON.parse(t));let o=e.result?.tools?.map(e=>e.name)||[];console.log(`[Step 1] ✅ d3k MCP server accessible`),console.log(`[Step 1] Available tools (${o.length}): ${o.join(", ")}`);let s=o.some(e=>e.includes("chrome-devtools")),r=o.some(e=>e.includes("nextjs")),a=o.includes("fix_my_app");console.log(`[Step 1] Chrome DevTools MCP: ${s?"✅":"❌"}`),console.log(`[Step 1] Next.js DevTools MCP: ${r?"✅":"❌"}`),console.log(`[Step 1] fix_my_app tool: ${a?"✅":"❌"}`)}catch{console.log(`[Step 1] MCP server responded but couldn't parse tools list: ${t.substring(0,200)}`)}}else console.log(`[Step 1] ⚠️ MCP server not accessible: ${e.status}`)}catch(s){clearTimeout(o);let e=s instanceof Error?s.message:String(s),t=s instanceof Error&&"AbortError"===s.name;console.log(`[Step 1] ⚠️ Failed to validate MCP server: ${t?"Timed out after 30s":e}`)}console.log("[Step 1] Navigating browser to app URL...");let s=new AbortController,r=setTimeout(()=>s.abort(),3e4);try{let t=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/call",params:{name:"execute_browser_action",arguments:{action:"navigate",params:{url:e}}}}),signal:s.signal});clearTimeout(r),t.ok?console.log("[Step 1] Browser navigation completed"):console.log(`[Step 1] Browser navigation failed: ${t.status}`)}catch(t){clearTimeout(r);let e=t instanceof Error&&"AbortError"===t.name;console.log(`[Step 1] Browser navigation error: ${e?"Timed out after 30s":t instanceof Error?t.message:String(t)}`)}console.log("[Step 1] Waiting 5s for page load..."),await new Promise(e=>setTimeout(e,5e3));let a=null;console.log("[Step 1] Capturing 'before' screenshot...");let n=new AbortController,c=setTimeout(()=>n.abort(),3e4);try{let e=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:0,method:"tools/call",params:{name:"chrome-devtools_take_snapshot",arguments:{}}}),signal:n.signal});if(clearTimeout(c),e.ok){let t=await e.text();for(let e of t.split("\n"))if(e.startsWith("data: "))try{let t=JSON.parse(e.substring(6));if(t.result?.content){for(let e of t.result.content)if("image"===e.type&&e.data){let t=Buffer.from(e.data,"base64"),o=new Date().toISOString().replace(/[:.]/g,"-"),s=`screenshot-before-${o}.png`;a=(await put(s,t,{access:"public",contentType:"image/png"})).url,console.log(`[Step 1] ✅ Before screenshot uploaded: ${a}`)}}}catch{}a||(console.log("[Step 1] Screenshot response received but no image data found"),console.log(`[Step 1] Response preview: ${t.substring(0,500)}`))}else console.log(`[Step 1] Screenshot request failed: ${e.status}`)}catch(t){clearTimeout(c);let e=t instanceof Error&&"AbortError"===t.name;console.log(`[Step 1] Screenshot capture error: ${e?"Timed out after 30s":t instanceof Error?t.message:String(t)}`)}console.log("[Step 1] Fetching d3k logs from sandbox to verify it's working...");let p=new AbortController,d=setTimeout(()=>p.abort(),15e3);try{let e=await fetch(`${i}/api/logs`,{signal:p.signal});if(clearTimeout(d),e.ok){let t=await e.text();console.log(`[Step 1] d3k logs (last 1000 chars):
83
+ ${t.slice(-1e3)}`)}else console.log(`[Step 1] Could not fetch d3k logs: ${e.status}`)}catch(t){clearTimeout(d);let e=t instanceof Error&&"AbortError"===t.name;console.log(`[Step 1] Failed to fetch d3k logs: ${e?"Timed out after 15s":t instanceof Error?t.message:String(t)}`)}console.log("[Step 1] Calling fix_my_app with focusArea='performance'...");let g=new AbortController,u=setTimeout(()=>g.abort(),18e4);try{let e=await fetch(`${i}/mcp`,{method:"POST",headers:{"Content-Type":"application/json",Accept:"application/json, text/event-stream"},body:JSON.stringify({jsonrpc:"2.0",id:1,method:"tools/call",params:{name:"fix_my_app",arguments:{mode:"snapshot",focusArea:"performance",timeRangeMinutes:5,returnRawData:!1}}}),signal:g.signal});if(clearTimeout(u),!e.ok)throw Error(`MCP request failed: ${e.status}`);let t=await e.text();console.log(`[Step 1] fix_my_app response length: ${t.length} bytes`),console.log(`[Step 1] fix_my_app response preview (first 500 chars):
84
+ ${t.substring(0,500)}`);let o=t.split("\n");console.log(`[Step 1] Response split into ${o.length} lines`);let s="",r=0,n=0;for(let e of o)if(e.startsWith("data: ")){r++;try{let t=JSON.parse(e.substring(6));if(console.log(`[Step 1] Parsed JSON line ${r}:`,JSON.stringify(t).substring(0,200)),t.result?.content)for(let e of t.result.content)"text"===e.type&&(n++,s+=e.text,console.log(`[Step 1] Added text content block ${n}, length: ${e.text.length}`));else t.error&&console.log(`[Step 1] ERROR in response: ${JSON.stringify(t.error)}`)}catch(t){console.log(`[Step 1] Failed to parse JSON line ${r}: ${t instanceof Error?t.message:String(t)}`),console.log(`[Step 1] Problem line: ${e.substring(0,200)}`)}}return console.log(`[Step 1] Processed ${r} data lines, ${n} content blocks`),console.log(`[Step 1] Got ${s.length} chars from fix_my_app (performance analysis)`),0===s.length&&console.log(`[Step 1] WARNING: fix_my_app returned NO data. Full response:
85
+ ${t}`),{logAnalysis:`d3k Performance Analysis for ${l}
86
86
 
87
- ${s}`,beforeScreenshotUrl:a}}catch(e){clearTimeout(h),e instanceof Error&&"AbortError"===e.name?console.log("[Step 1] fix_my_app timed out after 3 minutes, using fallback method"):console.log(`[Step 1] fix_my_app error: ${e instanceof Error?e.message:String(e)}`)}}console.log("[Step 1] Using AI Gateway with browser automation...");let t=createGateway({apiKey:process.env.AI_GATEWAY_API_KEY,baseURL:"https://ai-gateway.vercel.sh/v1/ai"})("anthropic/claude-sonnet-4-20250514"),s=`You are a web application debugger with access to browser automation tools via Playwright MCP.
87
+ ${s}`,beforeScreenshotUrl:a}}catch(e){clearTimeout(u),e instanceof Error&&"AbortError"===e.name?console.log("[Step 1] fix_my_app timed out after 3 minutes, using fallback method"):console.log(`[Step 1] fix_my_app error: ${e instanceof Error?e.message:String(e)}`)}}console.log("[Step 1] Using AI Gateway with browser automation...");let o=createGateway({apiKey:process.env.AI_GATEWAY_API_KEY,baseURL:"https://ai-gateway.vercel.sh/v1/ai"})("anthropic/claude-sonnet-4-20250514"),s=`You are a web application debugger with access to browser automation tools via Playwright MCP.
88
88
 
89
89
  Your task is to visit this URL and capture any errors, warnings, or issues:
90
90
  ${e}
@@ -104,9 +104,9 @@ Analyze the console messages and provide a detailed report including:
104
104
  - Any visual issues you can identify from the screenshot
105
105
  - Screenshot URL if captured
106
106
 
107
- Format your response as a clear, structured report that helps identify what's broken in the application.`,{text:r}=await generateText({model:t,prompt:s,toolChoice:"auto",maxTokens:4e3});return console.log(`[Step 1] Browser automation response (first 500 chars): ${r.substring(0,500)}...`),{logAnalysis:`Browser Automation Analysis for ${l}
107
+ Format your response as a clear, structured report that helps identify what's broken in the application.`,{text:r}=await generateText({model:o,prompt:s,toolChoice:"auto",maxTokens:4e3});return console.log(`[Step 1] Browser automation response (first 500 chars): ${r.substring(0,500)}...`),{logAnalysis:`Browser Automation Analysis for ${l}
108
108
 
109
- ${r}`,beforeScreenshotUrl:null}}catch(e){console.error("[Step 1] Error with browser automation:",e),console.log("[Step 1] Falling back to simple HTTP fetch...");try{let e=o?`${l}?x-vercel-protection-bypass=${o}`:l,t={"User-Agent":"dev3000-cloud-fix/1.0",Accept:"text/html,application/json,*/*"};o&&(t["x-vercel-protection-bypass"]=o);let s=await fetch(e,{method:"GET",headers:t}),r=await s.text(),a=r.match(/<title[^>]*>([^<]*)<\/title>/i),n=a?a[1].trim():"(no title found)";console.log(`[Step 1] HTTP fallback - Page title: "${n}"`);let i=`Dev Server URL: ${l}
109
+ ${r}`,beforeScreenshotUrl:null}}catch(e){console.error("[Step 1] Error with browser automation:",e),console.log("[Step 1] Falling back to simple HTTP fetch...");try{let e=t?`${l}?x-vercel-protection-bypass=${t}`:l,o={"User-Agent":"dev3000-cloud-fix/1.0",Accept:"text/html,application/json,*/*"};t&&(o["x-vercel-protection-bypass"]=t);let s=await fetch(e,{method:"GET",headers:o}),r=await s.text(),a=r.match(/<title[^>]*>([^<]*)<\/title>/i),n=a?a[1].trim():"(no title found)";console.log(`[Step 1] HTTP fallback - Page title: "${n}"`);let i=`Dev Server URL: ${l}
110
110
  `;return i+=`Page Title: ${n}
111
111
  HTTP Status: ${s.status} ${s.statusText}
112
112
 
@@ -120,13 +120,13 @@ ${r.substring(0,5e3)}
120
120
  `:s.ok?i+="No errors detected in response.\n":i+=`Response body:
121
121
  ${r.substring(0,2e3)}
122
122
 
123
- `,{logAnalysis:i,beforeScreenshotUrl:null}}catch(o){let e=o instanceof Error?o.message:String(o);return{logAnalysis:`Failed to fetch logs from ${l}
123
+ `,{logAnalysis:i,beforeScreenshotUrl:null}}catch(t){let e=t instanceof Error?t.message:String(t);return{logAnalysis:`Failed to fetch logs from ${l}
124
124
 
125
125
  Error: ${e}
126
126
 
127
- This may indicate the dev server is not accessible or has crashed.`,beforeScreenshotUrl:null}}}}async function s(e,o){console.log("[Step 2] Invoking AI agent to analyze logs...");let t=createGateway({apiKey:process.env.AI_GATEWAY_API_KEY,baseURL:"https://ai-gateway.vercel.sh/v1/ai"})("anthropic/claude-sonnet-4-20250514"),s=`You are a skilled software engineer debugging an application.
127
+ This may indicate the dev server is not accessible or has crashed.`,beforeScreenshotUrl:null}}}}async function s(e,t){console.log("[Step 2] Invoking AI agent to analyze logs...");let o=createGateway({apiKey:process.env.AI_GATEWAY_API_KEY,baseURL:"https://ai-gateway.vercel.sh/v1/ai"})("anthropic/claude-sonnet-4-20250514"),s=`You are a skilled software engineer debugging an application.
128
128
 
129
- The dev server is running at: ${o}
129
+ The dev server is running at: ${t}
130
130
 
131
131
  Here's the log analysis from the MCP fix_my_app tool:
132
132
  ${e}
@@ -171,7 +171,7 @@ Format your response EXACTLY as follows:
171
171
  IMPORTANT:
172
172
  - The Git Patch section must be a valid unified diff that can be applied directly with 'git apply'.
173
173
  - If no errors are found, respond with "✅ **SYSTEM HEALTHY** - No errors found" and do NOT include a Git Patch section.
174
- - Only include a Git Patch if there are actual issues that need fixing.`,{text:r}=await generateText({model:t,prompt:s});return console.log(`[Step 2] AI agent response (first 500 chars): ${r.substring(0,500)}...`),r}async function r(e,o,t,s,r,a){console.log("[Step 3] Uploading fix proposal to blob storage..."),r&&console.log(`[Step 3] Including before screenshot: ${r}`),a&&console.log(`[Step 3] Including git diff (${a.length} chars)`);let n=r?`## Before Screenshot
174
+ - Only include a Git Patch if there are actual issues that need fixing.`,{text:r}=await generateText({model:o,prompt:s});return console.log(`[Step 2] AI agent response (first 500 chars): ${r.substring(0,500)}...`),r}async function r(e,t,o,s,r,a){console.log("[Step 3] Uploading fix proposal to blob storage..."),r&&console.log(`[Step 3] Including before screenshot: ${r}`),a&&console.log(`[Step 3] Including git diff (${a.length} chars)`);let n=r?`## Before Screenshot
175
175
 
176
176
  This screenshot was captured when the sandbox dev server first loaded, proving the page rendered successfully.
177
177
 
@@ -189,7 +189,7 @@ ${a}
189
189
 
190
190
  ---
191
191
 
192
- `:"",i=new Date().toISOString(),c=`# Fix Proposal for ${o}
192
+ `:"",i=new Date().toISOString(),c=`# Fix Proposal for ${t}
193
193
 
194
194
  **Generated**: ${i}
195
195
 
@@ -202,7 +202,7 @@ ${a}
202
202
  ${n}${l}## Original Log Analysis
203
203
 
204
204
  \`\`\`
205
- ${t}
205
+ ${o}
206
206
  \`\`\`
207
207
 
208
208
  ---
@@ -227,12 +227,12 @@ dev3000 monitors your development server, captures errors in real-time, and uses
227
227
  - Suggest specific code changes
228
228
 
229
229
  Learn more at https://github.com/vercel-labs/dev3000
230
- `,p=i.replace(/[:.]/g,"-"),d=`fix-${o}-${p}.md`,g=await put(d,c,{access:"public",contentType:"text/markdown"});return console.log(`[Step 3] Fix proposal uploaded to: ${g.url}`),{success:!0,projectName:o,fixProposal:e,blobUrl:g.url,beforeScreenshotUrl:r||null,message:"Fix analysis completed and uploaded to blob storage"}}async function a(e,o,t,s,r,a){console.log(`[Step 4] Creating GitHub PR for ${t}/${s}...`);let n=process.env.GITHUB_TOKEN;if(!n)return console.error("[Step 4] GITHUB_TOKEN not found in environment"),{success:!1,error:"GitHub token not configured"};try{let l=e.match(/```diff\n([\s\S]*?)\n```/);if(!l)return console.error("[Step 4] No git patch found in fix proposal"),{success:!1,error:"No git patch found in fix proposal"};let i=l[1];console.log(`[Step 4] Extracted patch (${i.length} chars)`);let c=parsePatchToFileChanges(i);if(0===c.length)return console.error("[Step 4] Failed to parse any file changes from patch"),{success:!1,error:"Failed to parse file changes from patch"};console.log(`[Step 4] Parsed ${c.length} file change(s)`);let p=`dev3000-fix-${a}-${Date.now()}`;console.log(`[Step 4] Branch name: ${p}`);let d=await fetch(`https://api.github.com/repos/${t}/${s}/git/ref/heads/${r}`,{headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json"}});if(!d.ok){let e=await d.text();return console.error(`[Step 4] Failed to get base branch: ${e}`),{success:!1,error:`Failed to get base branch: ${d.status}`}}let g=(await d.json()).object.sha;console.log(`[Step 4] Base SHA: ${g}`);let h=await fetch(`https://api.github.com/repos/${t}/${s}/git/refs`,{method:"POST",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({ref:`refs/heads/${p}`,sha:g})});if(!h.ok){let e=await h.text();return console.error(`[Step 4] Failed to create branch: ${e}`),{success:!1,error:`Failed to create branch: ${h.status}`}}for(let e of(console.log(`[Step 4] Created branch: ${p}`),c)){console.log(`[Step 4] Processing file: ${e.path}`);let o=await fetch(`https://api.github.com/repos/${t}/${s}/contents/${e.path}?ref=${p}`,{headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json"}}),r="",l="";if(o.ok){let e=await o.json();l=e.sha,r=Buffer.from(e.content,"base64").toString("utf-8")}else console.log("[Step 4] File doesn't exist, will create new file");let i=applyPatchChanges(r,e.changes),c=await fetch(`https://api.github.com/repos/${t}/${s}/contents/${e.path}`,{method:"PUT",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({message:`Fix: Apply dev3000 fix for ${a}`,content:Buffer.from(i).toString("base64"),branch:p,...l&&{sha:l}})});if(!c.ok){let o=await c.text();return console.error(`[Step 4] Failed to update file ${e.path}: ${o}`),{success:!1,error:`Failed to update file ${e.path}: ${c.status}`}}console.log(`[Step 4] Updated file: ${e.path}`)}let u=`## Automated Fix Proposal
230
+ `,p=i.replace(/[:.]/g,"-"),d=`fix-${t}-${p}.md`,g=await put(d,c,{access:"public",contentType:"text/markdown"});return console.log(`[Step 3] Fix proposal uploaded to: ${g.url}`),{success:!0,projectName:t,fixProposal:e,blobUrl:g.url,beforeScreenshotUrl:r||null,message:"Fix analysis completed and uploaded to blob storage"}}async function a(e,t,o,s,r,a){console.log(`[Step 4] Creating GitHub PR for ${o}/${s}...`);let n=process.env.GITHUB_TOKEN;if(!n)return console.error("[Step 4] GITHUB_TOKEN not found in environment"),{success:!1,error:"GitHub token not configured"};try{let l=e.match(/```diff\n([\s\S]*?)\n```/);if(!l)return console.error("[Step 4] No git patch found in fix proposal"),{success:!1,error:"No git patch found in fix proposal"};let i=l[1];console.log(`[Step 4] Extracted patch (${i.length} chars)`);let c=parsePatchToFileChanges(i);if(0===c.length)return console.error("[Step 4] Failed to parse any file changes from patch"),{success:!1,error:"Failed to parse file changes from patch"};console.log(`[Step 4] Parsed ${c.length} file change(s)`);let p=`dev3000-fix-${a}-${Date.now()}`;console.log(`[Step 4] Branch name: ${p}`);let d=await fetch(`https://api.github.com/repos/${o}/${s}/git/ref/heads/${r}`,{headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json"}});if(!d.ok){let e=await d.text();return console.error(`[Step 4] Failed to get base branch: ${e}`),{success:!1,error:`Failed to get base branch: ${d.status}`}}let g=(await d.json()).object.sha;console.log(`[Step 4] Base SHA: ${g}`);let u=await fetch(`https://api.github.com/repos/${o}/${s}/git/refs`,{method:"POST",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({ref:`refs/heads/${p}`,sha:g})});if(!u.ok){let e=await u.text();return console.error(`[Step 4] Failed to create branch: ${e}`),{success:!1,error:`Failed to create branch: ${u.status}`}}for(let e of(console.log(`[Step 4] Created branch: ${p}`),c)){console.log(`[Step 4] Processing file: ${e.path}`);let t=await fetch(`https://api.github.com/repos/${o}/${s}/contents/${e.path}?ref=${p}`,{headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json"}}),r="",l="";if(t.ok){let e=await t.json();l=e.sha,r=Buffer.from(e.content,"base64").toString("utf-8")}else console.log("[Step 4] File doesn't exist, will create new file");let i=applyPatchChanges(r,e.changes),c=await fetch(`https://api.github.com/repos/${o}/${s}/contents/${e.path}`,{method:"PUT",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({message:`Fix: Apply dev3000 fix for ${a}`,content:Buffer.from(i).toString("base64"),branch:p,...l&&{sha:l}})});if(!c.ok){let t=await c.text();return console.error(`[Step 4] Failed to update file ${e.path}: ${t}`),{success:!1,error:`Failed to update file ${e.path}: ${c.status}`}}console.log(`[Step 4] Updated file: ${e.path}`)}let h=`## Automated Fix Proposal
231
231
 
232
232
  This PR was automatically generated by [dev3000](https://github.com/vercel-labs/dev3000) after analyzing your application.
233
233
 
234
234
  ### Fix Details
235
- View the full analysis: [${o}](${o})
235
+ View the full analysis: [${t}](${t})
236
236
 
237
237
  ${e}
238
238
 
@@ -240,6 +240,6 @@ ${e}
240
240
 
241
241
  🤖 Generated with [Claude Code](https://claude.com/claude-code)
242
242
 
243
- Co-Authored-By: Claude (dev3000) <noreply@anthropic.com>`,f=await fetch(`https://api.github.com/repos/${t}/${s}/pulls`,{method:"POST",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({title:`Fix: ${a} - Automated fix from dev3000`,head:p,base:r,body:u})});if(!f.ok){let e=await f.text();return console.error(`[Step 4] Failed to create PR: ${e}`),{success:!1,error:`Failed to create PR: ${f.status}`}}let m=await f.json();return console.log(`[Step 4] Created PR: ${m.html_url}`),{success:!0,prUrl:m.html_url,prNumber:m.number,branch:p}}catch(e){return console.error("[Step 4] Error creating PR:",e),{success:!1,error:e instanceof Error?e.message:String(e)}}}async function n(e){console.log("[Cleanup] Stopping sandbox...");try{await e(),console.log("[Cleanup] Sandbox stopped successfully")}catch(e){console.error("[Cleanup] Error stopping sandbox:",e)}}e.s(["analyzeLogsWithAgent",()=>s,"cleanupSandbox",()=>n,"createD3kSandbox",()=>o,"createGitHubPR",()=>a,"fetchRealLogs",()=>t,"uploadToBlob",()=>r])}];
243
+ Co-Authored-By: Claude (dev3000) <noreply@anthropic.com>`,f=await fetch(`https://api.github.com/repos/${o}/${s}/pulls`,{method:"POST",headers:{Authorization:`Bearer ${n}`,Accept:"application/vnd.github.v3+json","Content-Type":"application/json"},body:JSON.stringify({title:`Fix: ${a} - Automated fix from dev3000`,head:p,base:r,body:h})});if(!f.ok){let e=await f.text();return console.error(`[Step 4] Failed to create PR: ${e}`),{success:!1,error:`Failed to create PR: ${f.status}`}}let m=await f.json();return console.log(`[Step 4] Created PR: ${m.html_url}`),{success:!0,prUrl:m.html_url,prNumber:m.number,branch:p}}catch(e){return console.error("[Step 4] Error creating PR:",e),{success:!1,error:e instanceof Error?e.message:String(e)}}}async function n(e){console.log("[Cleanup] Stopping sandbox...");try{await e(),console.log("[Cleanup] Sandbox stopped successfully")}catch(e){console.error("[Cleanup] Error stopping sandbox:",e)}}e.s(["analyzeLogsWithAgent",()=>s,"cleanupSandbox",()=>n,"createD3kSandbox",()=>t,"createGitHubPR",()=>a,"fetchRealLogs",()=>o,"uploadToBlob",()=>r])}];
244
244
 
245
245
  //# sourceMappingURL=mcp-server_app_api_cloud_fix-workflow_steps_ts_b65f3271._.js.map