@bcts/gstp 1.0.0-alpha.22 → 1.0.0-beta.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/chunk-CfYAbeIz.mjs +13 -0
- package/dist/index.cjs +151 -77
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +38 -3
- package/dist/index.d.cts.map +1 -1
- package/dist/index.d.mts +38 -3
- package/dist/index.d.mts.map +1 -1
- package/dist/index.iife.js +181 -109
- package/dist/index.iife.js.map +1 -1
- package/dist/index.mjs +141 -62
- package/dist/index.mjs.map +1 -1
- package/package.json +14 -14
- package/src/continuation.ts +81 -41
- package/src/sealed-event.ts +9 -6
- package/src/sealed-request.ts +69 -27
- package/src/sealed-response.ts +7 -6
- package/dist/chunk-DQk6qfdC.mjs +0 -18
package/dist/index.d.mts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.mts","names":[],"sources":["../src/error.ts","../src/continuation.ts","../src/sealed-request.ts","../src/sealed-response.ts","../src/sealed-event.ts","../src/prelude.ts","../src/index.ts"],"mappings":";;;;;;;;;;;AAcA;;;;;;;aAAY,aAAA;EAcV;EAZA,6BAAA;EAkBA;EAfA,gCAAA;EAqBA;EAlBA,+BAAA;EAkBG;EAfH,oBAAA;EAwBqB;EArBrB,uBAAA;EAsBe;EAnBf,+BAAA;EAsBkB;EAnBlB,yBAAA;EAwCqC;EArCrC,QAAA;EAyDuC;EAtDvC,GAAA;AAAA;;;;;;;cASW,SAAA,SAAkB,KAAA;EAAA,SACpB,IAAA,EAAM,aAAA;EAAA,SACE,KAAA,GAAQ,KAAA;cAEb,IAAA,EAAM,aAAA,EAAe,OAAA,UAAiB,KAAA,GAAQ,KAAA;EAHjD;;;EAAA,OAwBF,0BAAA,CAAA,GAA8B,SAAA;;;;SAU9B,6BAAA,CAAA,GAAiC,SAAA;EA/BkB;;;EAAA,OAyCnD,4BAAA,CAAA,GAAgC,SAAA;EAVhC;;;EAAA,OAoBA,mBAAA,CAAA,GAAuB,SAAA;EAAvB;;;EAAA,OAOA,qBAAA,CAAA,GAAyB,SAAA;EAOzB;;;EAAA,OAAA,4BAAA,CAAA,GAAgC,SAAA;EAoBhC;;;EAAA,OAVA,uBAAA,CAAA,GAA2B,SAAA;EAiB3B;;;EAAA,OAPA,QAAA,CAAS,KAAA,GAAQ,KAAA,GAAQ,SAAA;EAOI;;;EAAA,OAA7B,GAAA,CAAI,KAAA,GAAQ,KAAA,GAAQ,SAAA;AAAA
|
|
1
|
+
{"version":3,"file":"index.d.mts","names":[],"sources":["../src/error.ts","../src/continuation.ts","../src/sealed-request.ts","../src/sealed-response.ts","../src/sealed-event.ts","../src/prelude.ts","../src/index.ts"],"mappings":";;;;;;;;;;;AAcA;;;;;;;aAAY,aAAA;EAcV;EAZA,6BAAA;EAkBA;EAfA,gCAAA;EAqBA;EAlBA,+BAAA;EAkBG;EAfH,oBAAA;EAwBqB;EArBrB,uBAAA;EAsBe;EAnBf,+BAAA;EAsBkB;EAnBlB,yBAAA;EAwCqC;EArCrC,QAAA;EAyDuC;EAtDvC,GAAA;AAAA;;;;;;;cASW,SAAA,SAAkB,KAAA;EAAA,SACpB,IAAA,EAAM,aAAA;EAAA,SACE,KAAA,GAAQ,KAAA;cAEb,IAAA,EAAM,aAAA,EAAe,OAAA,UAAiB,KAAA,GAAQ,KAAA;EAHjD;;;EAAA,OAwBF,0BAAA,CAAA,GAA8B,SAAA;;;;SAU9B,6BAAA,CAAA,GAAiC,SAAA;EA/BkB;;;EAAA,OAyCnD,4BAAA,CAAA,GAAgC,SAAA;EAVhC;;;EAAA,OAoBA,mBAAA,CAAA,GAAuB,SAAA;EAAvB;;;EAAA,OAOA,qBAAA,CAAA,GAAyB,SAAA;EAOzB;;;EAAA,OAAA,4BAAA,CAAA,GAAgC,SAAA;EAoBhC;;;EAAA,OAVA,uBAAA,CAAA,GAA2B,SAAA;EAiB3B;;;EAAA,OAPA,QAAA,CAAS,KAAA,GAAQ,KAAA,GAAQ,SAAA;EAOI;;;EAAA,OAA7B,GAAA,CAAI,KAAA,GAAQ,KAAA,GAAQ,SAAA;AAAA;;;;;;;;;;;;;;;;;;;;;;;cCzFhB,YAAA;EAAA,iBACM,MAAA;EAAA,iBACA,QAAA;EAAA,iBACA,WAAA;EDeoB;;;;;;;;;cCJzB,KAAA,EAAO,sBAAA,EAAwB,OAAA,GAAU,IAAA,EAAM,UAAA,GAAa,IAAA;EDgDjC;;;;;;ECpCvC,WAAA,CAAY,OAAA,EAAS,IAAA,GAAO,YAAA;ED+DrB;;;;;;ECrDP,mBAAA,CAAoB,OAAA,EAAS,IAAA,eAAmB,YAAA;;;AApClD;;;;EA8CE,cAAA,CAAe,UAAA,EAAY,IAAA,GAAO,YAAA;EAhCsC;;;;;;EA0CxE,sBAAA,CAAuB,UAAA,EAAY,IAAA,eAAmB,YAAA;EAAnB;;;;;;EAUnC,iBAAA,CAAkB,UAAA,WAAqB,YAAA;EAyDxB;;;EAjDf,KAAA,CAAA,GAAS,QAAA;EAwF0B;;;EAjFnC,EAAA,CAAA,GAAM,IAAA;EA0HQ;;;EAnHd,UAAA,CAAA,GAAc,IAAA;EAgMY;;;;;;;;;;;EAjL1B,WAAA,CAAY,GAAA,GAAM,IAAA;EA7EG;;;;;;;;;EAiGrB,SAAA,CAAU,EAAA,GAAK,IAAA;EA7EmB;;;;;;;EA8FlC,OAAA,CAAQ,GAAA,GAAM,IAAA,EAAM,EAAA,GAAK,IAAA;EAlEzB;;;;;;;;;;;;;;;;;;EAwFA,UAAA,CAAW,SAAA,GAAY,SAAA,GAAY,QAAA;EAAxB;;;;;;;;;;;;;;;;;;EAAA,OAqCJ,eAAA,CACL,iBAAA,EAAmB,QAAA,EACnB,UAAA,GAAa,IAAA,EACb,GAAA,GAAM,IAAA,EACN,SAAA,GAAY,WAAA,GACX,YAAA;;;AC3LL;;;;;;EDuQE,MAAA,CAAO,KAAA,EAAO,YAAA;ECzPyB;;;EDwRvC,QAAA,CAAA;AAAA;;;;;;;;;UCtSe,qBAAA;EFxBM;;;EE4BrB,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,aAAA;EFxBxB;;;EE6BlB,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,aAAA;EFYvB;;;EEPvC,oBAAA,CAAqB,gBAAA,EAAkB,QAAA,GAAW,aAAA;EFyChB;;;EEpClC,4BAAA,CAA6B,gBAAA,EAAkB,QAAA,eAAuB,aAAA;EFqD3C;;;EEhD3B,OAAA,IAAW,OAAA;EFhDkB;;;EEqD7B,MAAA,IAAU,WAAA;EFnDe;;;EEwDzB,KAAA,IAAS,QAAA;EFtDwB;;;EE2DjC,gBAAA,IAAoB,QAAA;AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;ADxDtB;;cCsFa,aAAA,YAAyB,qBAAA;EAAA,QAC5B,QAAA;EAAA,iBACS,OAAA;EAAA,QACT,MAAA;EAAA,QACA,iBAAA;EAAA,QAED,WAAA,CAAA;EDxDsB;;;;;;;EAAA,OC2EtB,GAAA,CAAI,IAAA,oBAAwB,QAAA,EAAU,EAAA,EAAI,IAAA,EAAM,MAAA,EAAQ,WAAA,GAAc,aAAA;ED9BvE;;;;;;;EAAA,OCyCC,WAAA,CAAY,IAAA,EAAM,UAAA,EAAY,EAAA,EAAI,IAAA,EAAM,MAAA,EAAQ,WAAA,GAAc,aAAA;ED8EhD;;;ECnErB,aAAA,CAAc,SAAA,EAAW,WAAA,EAAa,KAAA,EAAO,sBAAA,GAAyB,aAAA;EDuEnE;;;EC/DH,qBAAA,CACE,SAAA,EAAW,WAAA,EACX,KAAA,EAAO,sBAAA,eACN,aAAA;ED/Ic;;;ECyJjB,QAAA,CAAA,GAAY,QAAA;ED5IO;;;ECmJnB,kBAAA,CAAA,GAAsB,QAAA;EDnJkD;;;EC0JxE,kBAAA,CAAmB,KAAA,EAAO,WAAA,GAAc,QAAA;ED9I5B;;;;;;;;;EC2JZ,mBAAA,CAAoB,KAAA,EAAO,WAAA,GAAc,QAAA;ED7HzC;;;;;;;;;;;;EC6IA,yBAAA,GAAA,CAA6B,KAAA,EAAO,WAAA,GAAc,CAAA;ED9FlD;;;ECyGA,iCAAA,GAAA,CAAqC,KAAA,EAAO,WAAA,GAAc,CAAA;EDrF3C;;;ECgGf,0BAAA,GAAA,CAA8B,KAAA,EAAO,WAAA,GAAc,CAAA;ED/E3C;;;EC0FR,QAAA,CAAS,IAAA,WAAe,aAAA;EDpED;;;EC4EvB,QAAA,CAAS,IAAA,EAAM,IAAA,GAAO,aAAA;EDtCD;;;EC8CrB,IAAA,CAAA,GAAQ,UAAA;ED5CA;;;ECmDR,EAAA,CAAA,GAAM,IAAA;EDjDH;;;ECwDH,IAAA,CAAA;EDmDA;;;EC5CA,IAAA,CAAA,GAAQ,IAAA;;;AA1PV;EAqQE,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,aAAA;;;;EAQ1C,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,aAAA;EApQA;;;EA4Q9D,oBAAA,CAAqB,gBAAA,EAAkB,QAAA,GAAW,aAAA;EAlQoB;;;EA0QtE,4BAAA,CAA6B,gBAAA,EAAkB,QAAA,eAAuB,aAAA;EAtPlD;;;EA8PpB,OAAA,CAAA,GAAW,OAAA;EAjSM;;;EAwSjB,MAAA,CAAA,GAAU,WAAA;EAnSe;;;EA0SzB,KAAA,CAAA,GAAS,QAAA;EArS8B;;;EA4SvC,gBAAA,CAAA,GAAoB,QAAA;EAvS2B;;;EAkT/C,SAAA,CAAA,GAAa,OAAA;EA7SF;;;EAoTX,YAAA,CAAA,GAAgB,UAAA;EA1SP;;;;;AAmCX;;;EAuRE,UAAA,CAAW,UAAA,GAAa,IAAA,EAAM,MAAA,GAAS,MAAA,EAAQ,SAAA,GAAY,WAAA,GAAc,QAAA;EA9PxB;;;;;;;;EA2QjD,uBAAA,CACE,UAAA,GAAa,IAAA,EACb,MAAA,GAAS,MAAA,EACT,UAAA,GAAa,WAAA,KACZ,QAAA;EAzPmE;;;;;;;;;EAAA,OAwT/D,eAAA,CACL,iBAAA,EAAmB,QAAA,EACnB,UAAA,EAAY,IAAA,cACZ,GAAA,EAAK,IAAA,cACL,SAAA,EAAW,WAAA,GACV,aAAA;EA7PiC;;;EA8UpC,QAAA,CAAA;EAxTqC;;;EAiUrC,MAAA,CAAO,KAAA,EAAO,aAAA;AAAA;;;;;;;;;UC1jBC,sBAAA;EHuBM;;;EGnBrB,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,cAAA;EHuBxB;;;EGlBlB,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,cAAA;EH2DvB;;;EGtDvC,oBAAA,CAAqB,gBAAA,EAAkB,QAAA,eAAuB,cAAA;EHwF5B;;;EGnFlC,MAAA,IAAU,WAAA;EHoGiB;;;EG/F3B,KAAA,IAAS,QAAA;EHDoB;;;EGM7B,gBAAA,IAAoB,QAAA;AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;cA6BT,cAAA,YAA0B,sBAAA;EAAA,QAC7B,SAAA;EAAA,iBACS,OAAA;EAAA,QACT,MAAA;EAAA,QACA,iBAAA;EAAA,QAED,WAAA,CAAA;;AFlCT;;;;;SEwDS,UAAA,CAAW,EAAA,EAAI,IAAA,EAAM,MAAA,EAAQ,WAAA,GAAc,cAAA;EF9B7B;;;;;;EAAA,OEwCd,UAAA,CAAW,EAAA,EAAI,IAAA,EAAM,MAAA,EAAQ,WAAA,GAAc,cAAA;EFVI;;;;;;;;EAAA,OEsB/C,eAAA,CAAgB,MAAA,EAAQ,WAAA,GAAc,cAAA;EFoFtB;;;;;EEvEvB,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,cAAA;EFiHvC;;;EEtGH,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,cAAA;EFrG7C;;;EEgHjB,oBAAA,CAAqB,gBAAA,EAAkB,QAAA,eAAuB,cAAA;EFnG3C;;;EE2GnB,MAAA,CAAA,GAAU,WAAA;EF3G8D;;;EEkHxE,KAAA,CAAA,GAAS,QAAA;EFtGG;;;EE6GZ,gBAAA,CAAA,GAAoB,QAAA;EFnGA;;;EE8GpB,UAAA,CAAW,MAAA,EAAQ,sBAAA,GAAyB,cAAA;EFpG7B;;;;EE6Gf,kBAAA,CAAmB,MAAA,EAAQ,sBAAA,eAAqC,cAAA;EFnGV;;;EE2GtD,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,cAAA;EFzF1C;;;;EEkGA,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,cAAA;EFpFhD;;;EE4Fd,IAAA,CAAA;EFzDA;;;EEgEA,KAAA,CAAA;EF/Cc;;;EEsDd,EAAA,CAAA,GAAM,IAAA;EFhCN;;;;EEwCA,QAAA,CAAA,GAAY,IAAA;EFFS;;;;EEUrB,MAAA,CAAA,GAAU,QAAA;EFRR;;;EEeF,aAAA,GAAA,CAAiB,OAAA,GAAU,IAAA,cAAkB,CAAA,GAAI,CAAA;EF+DjD;;;;EEvDA,KAAA,CAAA,GAAS,QAAA;EFsFD;;;EE/ER,YAAA,GAAA,CAAgB,OAAA,GAAU,IAAA,cAAkB,CAAA,GAAI,CAAA;EDvNjC;;;;;;;;ECuOf,UAAA,CAAW,UAAA,GAAa,IAAA,EAAM,MAAA,GAAS,MAAA,EAAQ,SAAA,GAAY,WAAA,GAAc,QAAA;EDpN1B;;;;;;;;ECiO/C,uBAAA,CACE,UAAA,GAAa,IAAA,EACb,MAAA,GAAS,MAAA,EACT,UAAA,GAAa,WAAA,KACZ,QAAA;EDpPc;;;;;;;;;EAAA,OCmTV,wBAAA,CACL,iBAAA,EAAmB,QAAA,EACnB,UAAA,EAAY,IAAA,cACZ,GAAA,EAAK,IAAA,cACL,mBAAA,EAAqB,WAAA,GACpB,cAAA;ED9S+C;;;ECkYlD,QAAA,CAAA;ED7XsE;;;ECsYtE,MAAA,CAAO,KAAA,EAAO,cAAA;AAAA;;;;;AHjbhB;;;;UInBiB,mBAAA,WAA8B,sBAAA;EJuB3B;;;EInBlB,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,WAAA,CAAY,CAAA;EJ4Df;;;EIvDvC,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,WAAA,CAAY,CAAA;EJyFxC;;;EIpFlC,oBAAA,CAAqB,gBAAA,EAAkB,QAAA,GAAW,WAAA,CAAY,CAAA;EJqGnC;;;EIhG3B,4BAAA,CAA6B,gBAAA,EAAkB,QAAA,eAAuB,WAAA,CAAY,CAAA;EJArD;;;EIK7B,KAAA,IAAS,KAAA,CAAM,CAAA;EJHU;;;EIQzB,MAAA,IAAU,WAAA;EJNuB;;;EIWjC,KAAA,IAAS,QAAA;EJU4B;;;EILrC,gBAAA,IAAoB,QAAA;AAAA;;;;;;;;;;;;;;;;;;;;;;AHbtB;;;;;;;cG4Ca,WAAA,WAAsB,sBAAA,aAAmC,mBAAA,CAAoB,CAAA;EAAA,QAChF,MAAA;EAAA,iBACS,OAAA;EAAA,QACT,MAAA;EAAA,QACA,iBAAA;EAAA,QAED,WAAA,CAAA;EHM+C;;;;;;;EAAA,OGa/C,GAAA,WAAc,sBAAA,CAAA,CACnB,OAAA,EAAS,CAAA,EACT,EAAA,EAAI,IAAA,EACJ,MAAA,EAAQ,WAAA,GACP,WAAA,CAAY,CAAA;EHmEU;;;EGxDzB,QAAA,CAAS,IAAA,WAAe,WAAA,CAAY,CAAA;EHqHrB;;;EG7Gf,QAAA,CAAS,IAAA,EAAM,IAAA,GAAO,WAAA,CAAY,CAAA;EH4LpB;;;EGpLd,OAAA,CAAA,GAAW,CAAA;EHlGM;;;EGyGjB,EAAA,CAAA,GAAM,IAAA;EH7FM;;;EGoGZ,IAAA,CAAA;EHpG2D;;;EG2G3D,IAAA,CAAA,GAAQ,IAAA;EH/FoB;;;EG0G5B,SAAA,CAAU,KAAA,EAAO,sBAAA,GAAyB,WAAA,CAAY,CAAA;EHhGN;;;EGwGhD,iBAAA,CAAkB,KAAA,EAAO,sBAAA,eAAqC,WAAA,CAAY,CAAA;EH9FxC;;;EGyGlC,oBAAA,CAAqB,gBAAA,EAAkB,QAAA,GAAW,WAAA,CAAY,CAAA;EH/FR;;;EGuGtD,4BAAA,CAA6B,gBAAA,EAAkB,QAAA,eAAuB,WAAA,CAAY,CAAA;EHrFlF;;;EG6FA,KAAA,CAAA,GAAS,KAAA,CAAM,CAAA;EH/Ef;;;EGsFA,MAAA,CAAA,GAAU,WAAA;EHvEE;;;EG8EZ,KAAA,CAAA,GAAS,QAAA;EHzCT;;;EGgDA,gBAAA,CAAA,GAAoB,QAAA;EHhDA;;;EG2DpB,OAAA,CAAA,GAAW,KAAA,CAAM,CAAA;EHrCkB;;;;;;;;EGqDnC,UAAA,CAAW,UAAA,GAAa,IAAA,EAAM,MAAA,GAAS,MAAA,EAAQ,SAAA,GAAY,WAAA,GAAc,QAAA;EHZvE;;;;;;;;EGyBF,uBAAA,CACE,UAAA,GAAa,IAAA,EACb,MAAA,GAAS,MAAA,EACT,UAAA,GAAa,WAAA,KACZ,QAAA;;;AFvNL;;;;;;;;SE6RS,eAAA,WAA0B,sBAAA,CAAA,CAC/B,iBAAA,EAAmB,QAAA,EACnB,UAAA,EAAY,IAAA,cACZ,GAAA,EAAK,IAAA,cACL,mBAAA,EAAqB,WAAA,EACrB,gBAAA,IAAoB,GAAA,EAAK,QAAA,KAAa,CAAA,GACrC,WAAA,CAAY,CAAA;EFhRgC;;;EEmW/C,QAAA,CAAA;EFpVS;;;EE6VT,MAAA,CAAO,KAAA,EAAO,WAAA,CAAY,CAAA;AAAA;AAAA;;;;;cEvaf,OAAA"}
|
package/dist/index.iife.js
CHANGED
|
@@ -1,26 +1,19 @@
|
|
|
1
|
-
var bctsGstp = (function(exports, _bcts_components, _bcts_envelope, _bcts_known_values, _bcts_xid) {
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
//#region \0rolldown/runtime.js
|
|
1
|
+
var bctsGstp = (function(exports, _bcts_components, _bcts_envelope, _bcts_dcbor, _bcts_known_values, _bcts_xid) {
|
|
2
|
+
Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
|
|
3
|
+
//#region \0rolldown/runtime.js
|
|
5
4
|
var __defProp = Object.defineProperty;
|
|
6
5
|
var __exportAll = (all, no_symbols) => {
|
|
7
6
|
let target = {};
|
|
8
|
-
for (var name in all) {
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
}
|
|
14
|
-
if (!no_symbols) {
|
|
15
|
-
__defProp(target, Symbol.toStringTag, { value: "Module" });
|
|
16
|
-
}
|
|
7
|
+
for (var name in all) __defProp(target, name, {
|
|
8
|
+
get: all[name],
|
|
9
|
+
enumerable: true
|
|
10
|
+
});
|
|
11
|
+
if (!no_symbols) __defProp(target, Symbol.toStringTag, { value: "Module" });
|
|
17
12
|
return target;
|
|
18
13
|
};
|
|
19
|
-
|
|
20
|
-
//#
|
|
21
|
-
|
|
22
|
-
//#region src/error.ts
|
|
23
|
-
/**
|
|
14
|
+
//#endregion
|
|
15
|
+
//#region src/error.ts
|
|
16
|
+
/**
|
|
24
17
|
* Copyright © 2023-2026 Blockchain Commons, LLC
|
|
25
18
|
* Copyright © 2025-2026 Parity Technologies
|
|
26
19
|
*
|
|
@@ -73,61 +66,60 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
73
66
|
* Returned when the sender is missing an encryption key.
|
|
74
67
|
*/
|
|
75
68
|
static senderMissingEncryptionKey() {
|
|
76
|
-
return new GstpError(
|
|
69
|
+
return new GstpError("SENDER_MISSING_ENCRYPTION_KEY", "sender must have an encryption key");
|
|
77
70
|
}
|
|
78
71
|
/**
|
|
79
72
|
* Returned when the recipient is missing an encryption key.
|
|
80
73
|
*/
|
|
81
74
|
static recipientMissingEncryptionKey() {
|
|
82
|
-
return new GstpError(
|
|
75
|
+
return new GstpError("RECIPIENT_MISSING_ENCRYPTION_KEY", "recipient must have an encryption key");
|
|
83
76
|
}
|
|
84
77
|
/**
|
|
85
78
|
* Returned when the sender is missing a verification key.
|
|
86
79
|
*/
|
|
87
80
|
static senderMissingVerificationKey() {
|
|
88
|
-
return new GstpError(
|
|
81
|
+
return new GstpError("SENDER_MISSING_VERIFICATION_KEY", "sender must have a verification key");
|
|
89
82
|
}
|
|
90
83
|
/**
|
|
91
84
|
* Returned when the continuation has expired.
|
|
92
85
|
*/
|
|
93
86
|
static continuationExpired() {
|
|
94
|
-
return new GstpError(
|
|
87
|
+
return new GstpError("CONTINUATION_EXPIRED", "continuation expired");
|
|
95
88
|
}
|
|
96
89
|
/**
|
|
97
90
|
* Returned when the continuation ID is invalid.
|
|
98
91
|
*/
|
|
99
92
|
static continuationIdInvalid() {
|
|
100
|
-
return new GstpError(
|
|
93
|
+
return new GstpError("CONTINUATION_ID_INVALID", "continuation ID invalid");
|
|
101
94
|
}
|
|
102
95
|
/**
|
|
103
96
|
* Returned when the peer continuation is not encrypted.
|
|
104
97
|
*/
|
|
105
98
|
static peerContinuationNotEncrypted() {
|
|
106
|
-
return new GstpError(
|
|
99
|
+
return new GstpError("PEER_CONTINUATION_NOT_ENCRYPTED", "peer continuation must be encrypted");
|
|
107
100
|
}
|
|
108
101
|
/**
|
|
109
102
|
* Returned when a request is missing the peer continuation.
|
|
110
103
|
*/
|
|
111
104
|
static missingPeerContinuation() {
|
|
112
|
-
return new GstpError(
|
|
105
|
+
return new GstpError("MISSING_PEER_CONTINUATION", "requests must contain a peer continuation");
|
|
113
106
|
}
|
|
114
107
|
/**
|
|
115
108
|
* Envelope error wrapper.
|
|
116
109
|
*/
|
|
117
110
|
static envelope(cause) {
|
|
118
|
-
return new GstpError(
|
|
111
|
+
return new GstpError("ENVELOPE", "envelope error", cause);
|
|
119
112
|
}
|
|
120
113
|
/**
|
|
121
114
|
* XID error wrapper.
|
|
122
115
|
*/
|
|
123
116
|
static xid(cause) {
|
|
124
|
-
return new GstpError(
|
|
117
|
+
return new GstpError("XID", "XID error", cause);
|
|
125
118
|
}
|
|
126
119
|
};
|
|
127
|
-
|
|
128
|
-
//#
|
|
129
|
-
|
|
130
|
-
/**
|
|
120
|
+
//#endregion
|
|
121
|
+
//#region src/continuation.ts
|
|
122
|
+
/**
|
|
131
123
|
* Copyright © 2023-2026 Blockchain Commons, LLC
|
|
132
124
|
* Copyright © 2025-2026 Parity Technologies
|
|
133
125
|
*
|
|
@@ -138,7 +130,22 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
138
130
|
* eliminating the need for local state storage and enhancing security
|
|
139
131
|
* for devices with limited storage or requiring distributed state management.
|
|
140
132
|
*
|
|
141
|
-
* Ported from gstp-rust/src/continuation.rs
|
|
133
|
+
* Ported from gstp-rust/src/continuation.rs.
|
|
134
|
+
*
|
|
135
|
+
* Wire shape — mirrors Rust:
|
|
136
|
+
* ```
|
|
137
|
+
* {
|
|
138
|
+
* <state envelope>
|
|
139
|
+
* } [
|
|
140
|
+
* 'id': ARID(...)
|
|
141
|
+
* 'validUntil': Date(...) ← CBOR tag 1, not ISO 8601 text
|
|
142
|
+
* ]
|
|
143
|
+
* ```
|
|
144
|
+
*
|
|
145
|
+
* The `state` envelope is **wrapped** before assertions are attached,
|
|
146
|
+
* matching Rust `self.state.wrap().add_optional_assertion(...)`. The
|
|
147
|
+
* earlier port attached the assertions directly to the un-wrapped state,
|
|
148
|
+
* producing a different digest tree.
|
|
142
149
|
*/
|
|
143
150
|
/**
|
|
144
151
|
* Represents an encrypted state continuation.
|
|
@@ -245,8 +252,10 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
245
252
|
/**
|
|
246
253
|
* Checks if the continuation is valid at the given time.
|
|
247
254
|
*
|
|
248
|
-
*
|
|
249
|
-
*
|
|
255
|
+
* Mirrors Rust `is_valid_date(now)`: at the exact `valid_until`
|
|
256
|
+
* instant, the continuation is **expired** (returns `false`). The
|
|
257
|
+
* earlier port used `<=` here, which differed from Rust by one
|
|
258
|
+
* millisecond at the boundary.
|
|
250
259
|
*
|
|
251
260
|
* @param now - The time to check against, or undefined to skip time validation
|
|
252
261
|
* @returns true if the continuation is valid at the given time
|
|
@@ -254,7 +263,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
254
263
|
isValidDate(now) {
|
|
255
264
|
if (this._validUntil === void 0) return true;
|
|
256
265
|
if (now === void 0) return true;
|
|
257
|
-
return now.getTime()
|
|
266
|
+
return now.getTime() < this._validUntil.getTime();
|
|
258
267
|
}
|
|
259
268
|
/**
|
|
260
269
|
* Checks if the continuation has the expected ID.
|
|
@@ -283,21 +292,39 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
283
292
|
/**
|
|
284
293
|
* Converts the continuation to an envelope.
|
|
285
294
|
*
|
|
286
|
-
*
|
|
295
|
+
* Mirrors Rust `Continuation::to_envelope`:
|
|
296
|
+
*
|
|
297
|
+
* ```rust
|
|
298
|
+
* self.state.wrap()
|
|
299
|
+
* .add_optional_assertion(ID, self.valid_id)
|
|
300
|
+
* .add_optional_assertion(VALID_UNTIL, self.valid_until)
|
|
301
|
+
* ```
|
|
302
|
+
*
|
|
303
|
+
* The state is wrapped first; the optional assertions then live on
|
|
304
|
+
* the wrap node. `valid_until` is encoded as a CBOR-tagged Date
|
|
305
|
+
* (tag 1) — never as a plain ISO 8601 string.
|
|
287
306
|
*
|
|
288
307
|
* @param recipient - Optional recipient to encrypt the envelope to
|
|
289
308
|
* @returns The continuation as an envelope
|
|
290
309
|
*/
|
|
291
310
|
toEnvelope(recipient) {
|
|
292
|
-
let envelope = this._state;
|
|
311
|
+
let envelope = this._state.wrap();
|
|
293
312
|
if (this._validId !== void 0) envelope = envelope.addAssertion(_bcts_known_values.ID, this._validId);
|
|
294
|
-
if (this._validUntil !== void 0) envelope = envelope.addAssertion(_bcts_known_values.VALID_UNTIL, this._validUntil
|
|
313
|
+
if (this._validUntil !== void 0) envelope = envelope.addAssertion(_bcts_known_values.VALID_UNTIL, _bcts_dcbor.CborDate.fromDatetime(this._validUntil));
|
|
295
314
|
if (recipient !== void 0) envelope = envelope.encryptToRecipients([recipient]);
|
|
296
315
|
return envelope;
|
|
297
316
|
}
|
|
298
317
|
/**
|
|
299
318
|
* Parses a continuation from an envelope.
|
|
300
319
|
*
|
|
320
|
+
* Mirrors Rust `Continuation::try_from_envelope`:
|
|
321
|
+
*
|
|
322
|
+
* ```rust
|
|
323
|
+
* state: envelope.try_unwrap()?, // unwrap
|
|
324
|
+
* valid_id: envelope.extract_optional_object_for_predicate(ID)?,
|
|
325
|
+
* valid_until: envelope.extract_optional_object_for_predicate(VALID_UNTIL)?,
|
|
326
|
+
* ```
|
|
327
|
+
*
|
|
301
328
|
* @param encryptedEnvelope - The envelope to parse
|
|
302
329
|
* @param expectedId - Optional ID to validate against
|
|
303
330
|
* @param now - Optional time to validate against
|
|
@@ -312,23 +339,32 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
312
339
|
} catch (e) {
|
|
313
340
|
throw GstpError.envelope(e instanceof Error ? e : new Error(String(e)));
|
|
314
341
|
}
|
|
315
|
-
|
|
316
|
-
let validId;
|
|
342
|
+
let state;
|
|
317
343
|
try {
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
|
|
321
|
-
|
|
344
|
+
state = envelope.tryUnwrap();
|
|
345
|
+
} catch (e) {
|
|
346
|
+
throw GstpError.envelope(e instanceof Error ? e : new Error(String(e)));
|
|
347
|
+
}
|
|
348
|
+
let validId;
|
|
349
|
+
const idObj = envelope.optionalObjectForPredicate(_bcts_known_values.ID);
|
|
350
|
+
if (idObj !== void 0) {
|
|
351
|
+
const leafCbor = idObj.asLeaf();
|
|
352
|
+
if (leafCbor !== void 0) try {
|
|
353
|
+
validId = _bcts_components.ARID.fromTaggedCbor(leafCbor);
|
|
354
|
+
} catch (e) {
|
|
355
|
+
throw GstpError.envelope(e instanceof Error ? e : new Error(String(e)));
|
|
322
356
|
}
|
|
323
|
-
}
|
|
357
|
+
}
|
|
324
358
|
let validUntil;
|
|
325
|
-
|
|
326
|
-
|
|
327
|
-
|
|
328
|
-
|
|
329
|
-
|
|
359
|
+
const validUntilObj = envelope.optionalObjectForPredicate(_bcts_known_values.VALID_UNTIL);
|
|
360
|
+
if (validUntilObj !== void 0) {
|
|
361
|
+
const leafCbor = validUntilObj.asLeaf();
|
|
362
|
+
if (leafCbor !== void 0) try {
|
|
363
|
+
validUntil = _bcts_dcbor.CborDate.fromTaggedCbor(leafCbor).datetime();
|
|
364
|
+
} catch (e) {
|
|
365
|
+
throw GstpError.envelope(e instanceof Error ? e : new Error(String(e)));
|
|
330
366
|
}
|
|
331
|
-
}
|
|
367
|
+
}
|
|
332
368
|
const continuation = new Continuation(state, validId, validUntil);
|
|
333
369
|
if (!continuation.isValidDate(now)) throw GstpError.continuationExpired();
|
|
334
370
|
if (!continuation.isValidId(expectedId)) throw GstpError.continuationIdInvalid();
|
|
@@ -362,10 +398,50 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
362
398
|
return `${parts.join(", ")})`;
|
|
363
399
|
}
|
|
364
400
|
};
|
|
365
|
-
|
|
366
|
-
//#
|
|
367
|
-
|
|
368
|
-
|
|
401
|
+
//#endregion
|
|
402
|
+
//#region src/sealed-request.ts
|
|
403
|
+
/**
|
|
404
|
+
* Copyright © 2023-2026 Blockchain Commons, LLC
|
|
405
|
+
* Copyright © 2025-2026 Parity Technologies
|
|
406
|
+
*
|
|
407
|
+
*
|
|
408
|
+
* SealedRequest - Sealed request messages for GSTP
|
|
409
|
+
*
|
|
410
|
+
* A SealedRequest wraps a Request with sender information and state
|
|
411
|
+
* continuations for secure, authenticated request messages.
|
|
412
|
+
*
|
|
413
|
+
* Ported from gstp-rust/src/sealed_request.rs
|
|
414
|
+
*/
|
|
415
|
+
/**
|
|
416
|
+
* Decode a CBOR value into a typed JS value.
|
|
417
|
+
*
|
|
418
|
+
* Mirrors the type-driven `T: TryFrom<CBOR>` dispatch Rust's
|
|
419
|
+
* `extract_object_for_parameter` relies on. TS lacks compile-time
|
|
420
|
+
* trait dispatch, so we hand-roll the most common cases:
|
|
421
|
+
* - tag 1 (`Date`) → JS `Date`,
|
|
422
|
+
* - tag 40012 (`ARID`) → `ARID`,
|
|
423
|
+
* - integer / text / bool / number / byte-string primitives,
|
|
424
|
+
* - everything else → the raw `Cbor` value.
|
|
425
|
+
*
|
|
426
|
+
* Callers needing other typed extraction should use
|
|
427
|
+
* `objectForParameter()` directly and decode the envelope themselves.
|
|
428
|
+
*/
|
|
429
|
+
function extractCborAsT(cbor) {
|
|
430
|
+
const tagged = cbor.asTagged();
|
|
431
|
+
if (tagged !== void 0) {
|
|
432
|
+
const [tag] = tagged;
|
|
433
|
+
const tagNumber = Number(tag.value);
|
|
434
|
+
if (tagNumber === 1) return _bcts_dcbor.CborDate.fromTaggedCbor(cbor).datetime();
|
|
435
|
+
if (tagNumber === 40012) return _bcts_components.ARID.fromTaggedCbor(cbor);
|
|
436
|
+
}
|
|
437
|
+
if (cbor.isInteger()) return cbor.toInteger();
|
|
438
|
+
if (cbor.isText()) return cbor.toText();
|
|
439
|
+
if (cbor.isBool()) return cbor.toBool();
|
|
440
|
+
if (cbor.isNumber()) return cbor.toNumber();
|
|
441
|
+
if (cbor.isByteString()) return cbor.toByteString();
|
|
442
|
+
return cbor;
|
|
443
|
+
}
|
|
444
|
+
/**
|
|
369
445
|
* A sealed request that combines a Request with sender information and
|
|
370
446
|
* state continuations for secure communication.
|
|
371
447
|
*
|
|
@@ -457,25 +533,32 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
457
533
|
}
|
|
458
534
|
/**
|
|
459
535
|
* Returns all objects for a parameter.
|
|
536
|
+
*
|
|
537
|
+
* Mirrors Rust `SealedRequest::objects_for_parameter` which delegates
|
|
538
|
+
* to `Expression::objects_for_parameter`. GSTP requests can carry
|
|
539
|
+
* multiple parameters with the same ID — e.g. a DKG invite has
|
|
540
|
+
* one `participant` per group member — and a decoder must see
|
|
541
|
+
* every one of them.
|
|
460
542
|
*/
|
|
461
543
|
objectsForParameter(param) {
|
|
462
|
-
|
|
463
|
-
return obj !== void 0 ? [obj] : [];
|
|
544
|
+
return this._request.body().objectsForParameter(param);
|
|
464
545
|
}
|
|
465
546
|
/**
|
|
466
547
|
* Extracts an object for a parameter as a specific type.
|
|
548
|
+
*
|
|
549
|
+
* Mirrors Rust `SealedRequest::extract_object_for_parameter` — Rust
|
|
550
|
+
* uses a `T: TryFrom<CBOR>` constraint and dispatches to whatever
|
|
551
|
+
* `From<CBOR> for T` impl is in scope (e.g. tag-1 CBOR decodes to
|
|
552
|
+
* `chrono::DateTime`, tag-40012 to `ARID`, etc.). TS lacks that
|
|
553
|
+
* trait dispatch, so we recognise the most common tagged types
|
|
554
|
+
* (`Date` via tag 1, `ARID` via tag 40012) plus the primitive
|
|
555
|
+
* fall-through. Callers needing other typed extraction should use
|
|
556
|
+
* `objectForParameter()` directly and decode the envelope themselves.
|
|
467
557
|
*/
|
|
468
558
|
extractObjectForParameter(param) {
|
|
469
559
|
const envelope = this.objectForParameter(param);
|
|
470
560
|
if (envelope === void 0) throw GstpError.envelope(/* @__PURE__ */ new Error(`Parameter not found: ${param}`));
|
|
471
|
-
return envelope.extractSubject((cbor) =>
|
|
472
|
-
if (cbor.isInteger()) return cbor.toInteger();
|
|
473
|
-
if (cbor.isText()) return cbor.toText();
|
|
474
|
-
if (cbor.isBool()) return cbor.toBool();
|
|
475
|
-
if (cbor.isNumber()) return cbor.toNumber();
|
|
476
|
-
if (cbor.isByteString()) return cbor.toByteString();
|
|
477
|
-
return cbor;
|
|
478
|
-
});
|
|
561
|
+
return envelope.extractSubject((cbor) => extractCborAsT(cbor));
|
|
479
562
|
}
|
|
480
563
|
/**
|
|
481
564
|
* Extracts an optional object for a parameter.
|
|
@@ -483,14 +566,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
483
566
|
extractOptionalObjectForParameter(param) {
|
|
484
567
|
const envelope = this.objectForParameter(param);
|
|
485
568
|
if (envelope === void 0) return;
|
|
486
|
-
return envelope.extractSubject((cbor) =>
|
|
487
|
-
if (cbor.isInteger()) return cbor.toInteger();
|
|
488
|
-
if (cbor.isText()) return cbor.toText();
|
|
489
|
-
if (cbor.isBool()) return cbor.toBool();
|
|
490
|
-
if (cbor.isNumber()) return cbor.toNumber();
|
|
491
|
-
if (cbor.isByteString()) return cbor.toByteString();
|
|
492
|
-
return cbor;
|
|
493
|
-
});
|
|
569
|
+
return envelope.extractSubject((cbor) => extractCborAsT(cbor));
|
|
494
570
|
}
|
|
495
571
|
/**
|
|
496
572
|
* Extracts all objects for a parameter as a specific type.
|
|
@@ -622,7 +698,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
622
698
|
*/
|
|
623
699
|
toEnvelopeForRecipients(validUntil, signer, recipients) {
|
|
624
700
|
const continuation = new Continuation(this._state ?? _bcts_envelope.Envelope.new(null), this.id(), validUntil);
|
|
625
|
-
const senderEncryptionKey = this._sender.
|
|
701
|
+
const senderEncryptionKey = this._sender.encryptionKey();
|
|
626
702
|
if (senderEncryptionKey === void 0) throw GstpError.senderMissingEncryptionKey();
|
|
627
703
|
const senderContinuation = continuation.toEnvelope(senderEncryptionKey);
|
|
628
704
|
let result = this._request.toEnvelope();
|
|
@@ -664,7 +740,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
664
740
|
} catch (e) {
|
|
665
741
|
throw GstpError.xid(e instanceof Error ? e : new Error(String(e)));
|
|
666
742
|
}
|
|
667
|
-
const senderVerificationKey = sender.
|
|
743
|
+
const senderVerificationKey = sender.verificationKey();
|
|
668
744
|
if (senderVerificationKey === void 0) throw GstpError.senderMissingVerificationKey();
|
|
669
745
|
let requestEnvelope;
|
|
670
746
|
try {
|
|
@@ -710,10 +786,9 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
710
786
|
return true;
|
|
711
787
|
}
|
|
712
788
|
};
|
|
713
|
-
|
|
714
|
-
//#
|
|
715
|
-
|
|
716
|
-
/**
|
|
789
|
+
//#endregion
|
|
790
|
+
//#region src/sealed-response.ts
|
|
791
|
+
/**
|
|
717
792
|
* A sealed response that combines a Response with sender information and
|
|
718
793
|
* state continuations for secure communication.
|
|
719
794
|
*
|
|
@@ -927,7 +1002,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
927
1002
|
let senderContinuation;
|
|
928
1003
|
if (this._state !== void 0) {
|
|
929
1004
|
const continuation = new Continuation(this._state, void 0, validUntil);
|
|
930
|
-
const senderEncryptionKey = this._sender.
|
|
1005
|
+
const senderEncryptionKey = this._sender.encryptionKey();
|
|
931
1006
|
if (senderEncryptionKey === void 0) throw GstpError.senderMissingEncryptionKey();
|
|
932
1007
|
senderContinuation = continuation.toEnvelope(senderEncryptionKey);
|
|
933
1008
|
}
|
|
@@ -970,7 +1045,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
970
1045
|
} catch (e) {
|
|
971
1046
|
throw GstpError.xid(e instanceof Error ? e : new Error(String(e)));
|
|
972
1047
|
}
|
|
973
|
-
const senderVerificationKey = sender.
|
|
1048
|
+
const senderVerificationKey = sender.verificationKey();
|
|
974
1049
|
if (senderVerificationKey === void 0) throw GstpError.senderMissingVerificationKey();
|
|
975
1050
|
let responseEnvelope;
|
|
976
1051
|
try {
|
|
@@ -1020,10 +1095,9 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
1020
1095
|
return true;
|
|
1021
1096
|
}
|
|
1022
1097
|
};
|
|
1023
|
-
|
|
1024
|
-
//#
|
|
1025
|
-
|
|
1026
|
-
/**
|
|
1098
|
+
//#endregion
|
|
1099
|
+
//#region src/sealed-event.ts
|
|
1100
|
+
/**
|
|
1027
1101
|
* A sealed event that combines an Event with sender information and
|
|
1028
1102
|
* state continuations for secure communication.
|
|
1029
1103
|
*
|
|
@@ -1190,7 +1264,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
1190
1264
|
* @returns The sealed event as an envelope
|
|
1191
1265
|
*/
|
|
1192
1266
|
toEnvelopeForRecipients(validUntil, signer, recipients) {
|
|
1193
|
-
const senderEncryptionKey = this._sender.
|
|
1267
|
+
const senderEncryptionKey = this._sender.encryptionKey();
|
|
1194
1268
|
if (senderEncryptionKey === void 0) throw GstpError.senderMissingEncryptionKey();
|
|
1195
1269
|
let senderContinuation;
|
|
1196
1270
|
if (this._state !== void 0) senderContinuation = new Continuation(this._state, void 0, validUntil).toEnvelope(senderEncryptionKey);
|
|
@@ -1235,7 +1309,7 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
1235
1309
|
} catch (e) {
|
|
1236
1310
|
throw GstpError.xid(e instanceof Error ? e : new Error(String(e)));
|
|
1237
1311
|
}
|
|
1238
|
-
const senderVerificationKey = sender.
|
|
1312
|
+
const senderVerificationKey = sender.verificationKey();
|
|
1239
1313
|
if (senderVerificationKey === void 0) throw GstpError.senderMissingVerificationKey();
|
|
1240
1314
|
let eventEnvelope;
|
|
1241
1315
|
try {
|
|
@@ -1282,9 +1356,8 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
1282
1356
|
return true;
|
|
1283
1357
|
}
|
|
1284
1358
|
};
|
|
1285
|
-
|
|
1286
|
-
//#
|
|
1287
|
-
//#region src/prelude.ts
|
|
1359
|
+
//#endregion
|
|
1360
|
+
//#region src/prelude.ts
|
|
1288
1361
|
var prelude_exports = /* @__PURE__ */ __exportAll({
|
|
1289
1362
|
Continuation: () => Continuation,
|
|
1290
1363
|
GstpError: () => GstpError,
|
|
@@ -1293,25 +1366,24 @@ Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
|
1293
1366
|
SealedRequest: () => SealedRequest,
|
|
1294
1367
|
SealedResponse: () => SealedResponse
|
|
1295
1368
|
});
|
|
1296
|
-
|
|
1297
|
-
//#
|
|
1298
|
-
//#region src/index.ts
|
|
1369
|
+
//#endregion
|
|
1370
|
+
//#region src/index.ts
|
|
1299
1371
|
const VERSION = "0.13.0";
|
|
1372
|
+
//#endregion
|
|
1373
|
+
exports.Continuation = Continuation;
|
|
1374
|
+
exports.GstpError = GstpError;
|
|
1375
|
+
exports.GstpErrorCode = GstpErrorCode;
|
|
1376
|
+
exports.SealedEvent = SealedEvent;
|
|
1377
|
+
exports.SealedRequest = SealedRequest;
|
|
1378
|
+
exports.SealedResponse = SealedResponse;
|
|
1379
|
+
exports.VERSION = VERSION;
|
|
1380
|
+
Object.defineProperty(exports, "prelude", {
|
|
1381
|
+
enumerable: true,
|
|
1382
|
+
get: function() {
|
|
1383
|
+
return prelude_exports;
|
|
1384
|
+
}
|
|
1385
|
+
});
|
|
1386
|
+
return exports;
|
|
1387
|
+
})({}, bctsComponents, bctsEnvelope, bctsDcbor, bctsKnownValues, bctsXid);
|
|
1300
1388
|
|
|
1301
|
-
//#endregion
|
|
1302
|
-
exports.Continuation = Continuation;
|
|
1303
|
-
exports.GstpError = GstpError;
|
|
1304
|
-
exports.GstpErrorCode = GstpErrorCode;
|
|
1305
|
-
exports.SealedEvent = SealedEvent;
|
|
1306
|
-
exports.SealedRequest = SealedRequest;
|
|
1307
|
-
exports.SealedResponse = SealedResponse;
|
|
1308
|
-
exports.VERSION = VERSION;
|
|
1309
|
-
Object.defineProperty(exports, 'prelude', {
|
|
1310
|
-
enumerable: true,
|
|
1311
|
-
get: function () {
|
|
1312
|
-
return prelude_exports;
|
|
1313
|
-
}
|
|
1314
|
-
});
|
|
1315
|
-
return exports;
|
|
1316
|
-
})({}, bctsComponents, bctsEnvelope, bctsKnownValues, bctsXid);
|
|
1317
1389
|
//# sourceMappingURL=index.iife.js.map
|