@coana-tech/cli 14.12.45 → 14.12.46

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -20878,7 +20878,7 @@ var require_signal_exit = __commonJS({
20878
20878
  };
20879
20879
  };
20880
20880
  } else {
20881
- assert8 = __require("assert");
20881
+ assert11 = __require("assert");
20882
20882
  signals = require_signals();
20883
20883
  isWin = /^win/i.test(process2.platform);
20884
20884
  EE3 = __require("events");
@@ -20901,7 +20901,7 @@ var require_signal_exit = __commonJS({
20901
20901
  return function() {
20902
20902
  };
20903
20903
  }
20904
- assert8.equal(typeof cb, "function", "a callback must be provided for exit handler");
20904
+ assert11.equal(typeof cb, "function", "a callback must be provided for exit handler");
20905
20905
  if (loaded === false) {
20906
20906
  load2();
20907
20907
  }
@@ -21007,7 +21007,7 @@ var require_signal_exit = __commonJS({
21007
21007
  }
21008
21008
  };
21009
21009
  }
21010
- var assert8;
21010
+ var assert11;
21011
21011
  var signals;
21012
21012
  var isWin;
21013
21013
  var EE3;
@@ -34942,7 +34942,7 @@ var require_follow_redirects = __commonJS({
34942
34942
  var http2 = __require("http");
34943
34943
  var https2 = __require("https");
34944
34944
  var Writable = __require("stream").Writable;
34945
- var assert8 = __require("assert");
34945
+ var assert11 = __require("assert");
34946
34946
  var debug = require_debug();
34947
34947
  (function detectUnsupportedEnvironment() {
34948
34948
  var looksLikeNode = typeof process !== "undefined";
@@ -34954,7 +34954,7 @@ var require_follow_redirects = __commonJS({
34954
34954
  })();
34955
34955
  var useNativeURL = false;
34956
34956
  try {
34957
- assert8(new URL3(""));
34957
+ assert11(new URL3(""));
34958
34958
  } catch (error) {
34959
34959
  useNativeURL = error.code === "ERR_INVALID_URL";
34960
34960
  }
@@ -35313,7 +35313,7 @@ var require_follow_redirects = __commonJS({
35313
35313
  if (!isString2(options.host) && !isString2(options.hostname)) {
35314
35314
  options.hostname = "::1";
35315
35315
  }
35316
- assert8.equal(options.protocol, protocol, "protocol mismatch");
35316
+ assert11.equal(options.protocol, protocol, "protocol mismatch");
35317
35317
  debug("options", options);
35318
35318
  return new RedirectableRequest(options, callback);
35319
35319
  }
@@ -35409,7 +35409,7 @@ var require_follow_redirects = __commonJS({
35409
35409
  request.destroy(error);
35410
35410
  }
35411
35411
  function isSubdomain(subdomain, domain) {
35412
- assert8(isString2(subdomain) && isString2(domain));
35412
+ assert11(isString2(subdomain) && isString2(domain));
35413
35413
  var dot = subdomain.length - domain.length - 1;
35414
35414
  return dot > 0 && subdomain[dot] === "." && subdomain.endsWith(domain);
35415
35415
  }
@@ -35580,1131 +35580,6 @@ var require_hpagent = __commonJS({
35580
35580
  }
35581
35581
  });
35582
35582
 
35583
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/error.js
35584
- var require_error2 = __commonJS({
35585
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/error.js"(exports, module) {
35586
- "use strict";
35587
- function formatPurlErrorMessage(message = "") {
35588
- const { length } = message;
35589
- let formatted = "";
35590
- if (length) {
35591
- const code0 = message.charCodeAt(0);
35592
- formatted = code0 >= 65 || code0 <= 90 ? `${message[0].toLowerCase()}${message.slice(1)}` : message;
35593
- if (length > 1 && message.charCodeAt(length - 1) === 46 && message.charCodeAt(length - 2) !== 46) {
35594
- formatted = formatted.slice(0, -1);
35595
- }
35596
- }
35597
- return `Invalid purl: ${formatted}`;
35598
- }
35599
- var PurlError = class extends Error {
35600
- constructor(message) {
35601
- super(formatPurlErrorMessage(message));
35602
- }
35603
- };
35604
- module.exports = {
35605
- formatPurlErrorMessage,
35606
- PurlError
35607
- };
35608
- }
35609
- });
35610
-
35611
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/decode.js
35612
- var require_decode = __commonJS({
35613
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/decode.js"(exports, module) {
35614
- "use strict";
35615
- var { PurlError } = require_error2();
35616
- var { decodeURIComponent: decodeURIComponent2 } = globalThis;
35617
- function decodePurlComponent(comp, encodedURIComponent) {
35618
- try {
35619
- return decodeURIComponent2(encodedURIComponent);
35620
- } catch {
35621
- }
35622
- throw new PurlError(`unable to decode "${comp}" component`);
35623
- }
35624
- module.exports = {
35625
- decodePurlComponent
35626
- };
35627
- }
35628
- });
35629
-
35630
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/constants.js
35631
- var require_constants = __commonJS({
35632
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/constants.js"(exports, module) {
35633
- "use strict";
35634
- var LOOP_SENTINEL = 1e6;
35635
- var REUSED_SEARCH_PARAMS = new URLSearchParams();
35636
- var REUSED_SEARCH_PARAMS_KEY = "_";
35637
- var REUSED_SEARCH_PARAMS_OFFSET = 2;
35638
- module.exports = {
35639
- LOOP_SENTINEL,
35640
- REUSED_SEARCH_PARAMS,
35641
- REUSED_SEARCH_PARAMS_KEY,
35642
- REUSED_SEARCH_PARAMS_OFFSET
35643
- };
35644
- }
35645
- });
35646
-
35647
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/objects.js
35648
- var require_objects = __commonJS({
35649
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/objects.js"(exports, module) {
35650
- "use strict";
35651
- var { LOOP_SENTINEL } = require_constants();
35652
- function isObject2(value) {
35653
- return value !== null && typeof value === "object";
35654
- }
35655
- function recursiveFreeze(value_) {
35656
- if (value_ === null || !(typeof value_ === "object" || typeof value_ === "function") || Object.isFrozen(value_)) {
35657
- return value_;
35658
- }
35659
- const queue = [value_];
35660
- let { length: queueLength } = queue;
35661
- let pos2 = 0;
35662
- while (pos2 < queueLength) {
35663
- if (pos2 === LOOP_SENTINEL) {
35664
- throw new Error(
35665
- "Detected infinite loop in object crawl of recursiveFreeze"
35666
- );
35667
- }
35668
- const obj = queue[pos2++];
35669
- Object.freeze(obj);
35670
- if (Array.isArray(obj)) {
35671
- for (let i2 = 0, { length } = obj; i2 < length; i2 += 1) {
35672
- const item = obj[i2];
35673
- if (item !== null && (typeof item === "object" || typeof item === "function") && !Object.isFrozen(item)) {
35674
- queue[queueLength++] = item;
35675
- }
35676
- }
35677
- } else {
35678
- const keys = Reflect.ownKeys(obj);
35679
- for (let i2 = 0, { length } = keys; i2 < length; i2 += 1) {
35680
- const propValue = obj[keys[i2]];
35681
- if (propValue !== null && (typeof propValue === "object" || typeof propValue === "function") && !Object.isFrozen(propValue)) {
35682
- queue[queueLength++] = propValue;
35683
- }
35684
- }
35685
- }
35686
- }
35687
- return value_;
35688
- }
35689
- module.exports = {
35690
- isObject: isObject2,
35691
- recursiveFreeze
35692
- };
35693
- }
35694
- });
35695
-
35696
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/strings.js
35697
- var require_strings = __commonJS({
35698
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/strings.js"(exports, module) {
35699
- "use strict";
35700
- var { compare: localeCompare } = new Intl.Collator();
35701
- var regexSemverNumberedGroups = /^(0|[1-9]\d*)\.(0|[1-9]\d*)\.(0|[1-9]\d*)(?:-((?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*)(?:\.(?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*))*))?(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?$/;
35702
- function isBlank(str) {
35703
- for (let i2 = 0, { length } = str; i2 < length; i2 += 1) {
35704
- const code2 = str.charCodeAt(i2);
35705
- if (!// Whitespace characters according to ECMAScript spec:
35706
- // https://tc39.es/ecma262/#sec-white-space
35707
- (code2 === 32 || // Space
35708
- code2 === 9 || // Tab
35709
- code2 === 10 || // Line Feed
35710
- code2 === 11 || // Vertical Tab
35711
- code2 === 12 || // Form Feed
35712
- code2 === 13 || // Carriage Return
35713
- code2 === 160 || // No-Break Space
35714
- code2 === 5760 || // Ogham Space Mark
35715
- code2 === 8192 || // En Quad
35716
- code2 === 8193 || // Em Quad
35717
- code2 === 8194 || // En Space
35718
- code2 === 8195 || // Em Space
35719
- code2 === 8196 || // Three-Per-Em Space
35720
- code2 === 8197 || // Four-Per-Em Space
35721
- code2 === 8198 || // Six-Per-Em Space
35722
- code2 === 8199 || // Figure Space
35723
- code2 === 8200 || // Punctuation Space
35724
- code2 === 8201 || // Thin Space
35725
- code2 === 8202 || // Hair Space
35726
- code2 === 8232 || // Line Separator
35727
- code2 === 8233 || // Paragraph Separator
35728
- code2 === 8239 || // Narrow No-Break Space
35729
- code2 === 8287 || // Medium Mathematical Space
35730
- code2 === 12288 || // Ideographic Space
35731
- code2 === 65279)) {
35732
- return false;
35733
- }
35734
- }
35735
- return true;
35736
- }
35737
- function isNonEmptyString(value) {
35738
- return typeof value === "string" && value.length > 0;
35739
- }
35740
- function isSemverString(value) {
35741
- return typeof value === "string" && regexSemverNumberedGroups.test(value);
35742
- }
35743
- function lowerName(purl) {
35744
- purl.name = purl.name.toLowerCase();
35745
- }
35746
- function lowerNamespace(purl) {
35747
- const { namespace: namespace2 } = purl;
35748
- if (typeof namespace2 === "string") {
35749
- purl.namespace = namespace2.toLowerCase();
35750
- }
35751
- }
35752
- function lowerVersion(purl) {
35753
- const { version: version3 } = purl;
35754
- if (typeof version3 === "string") {
35755
- purl.version = version3.toLowerCase();
35756
- }
35757
- }
35758
- function replaceDashesWithUnderscores(str) {
35759
- let result = "";
35760
- let fromIndex = 0;
35761
- let index2 = 0;
35762
- while ((index2 = str.indexOf("-", fromIndex)) !== -1) {
35763
- result = result + str.slice(fromIndex, index2) + "_";
35764
- fromIndex = index2 + 1;
35765
- }
35766
- return fromIndex ? result + str.slice(fromIndex) : str;
35767
- }
35768
- function replaceUnderscoresWithDashes(str) {
35769
- let result = "";
35770
- let fromIndex = 0;
35771
- let index2 = 0;
35772
- while ((index2 = str.indexOf("_", fromIndex)) !== -1) {
35773
- result = result + str.slice(fromIndex, index2) + "-";
35774
- fromIndex = index2 + 1;
35775
- }
35776
- return fromIndex ? result + str.slice(fromIndex) : str;
35777
- }
35778
- function trimLeadingSlashes(str) {
35779
- let start = 0;
35780
- while (str.charCodeAt(start) === 47) {
35781
- start += 1;
35782
- }
35783
- return start === 0 ? str : str.slice(start);
35784
- }
35785
- module.exports = {
35786
- isBlank,
35787
- isNonEmptyString,
35788
- isSemverString,
35789
- localeCompare,
35790
- lowerName,
35791
- lowerNamespace,
35792
- lowerVersion,
35793
- replaceDashesWithUnderscores,
35794
- replaceUnderscoresWithDashes,
35795
- trimLeadingSlashes
35796
- };
35797
- }
35798
- });
35799
-
35800
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/encode.js
35801
- var require_encode = __commonJS({
35802
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/encode.js"(exports, module) {
35803
- "use strict";
35804
- var {
35805
- REUSED_SEARCH_PARAMS,
35806
- REUSED_SEARCH_PARAMS_KEY,
35807
- REUSED_SEARCH_PARAMS_OFFSET
35808
- } = require_constants();
35809
- var { isObject: isObject2 } = require_objects();
35810
- var { isNonEmptyString } = require_strings();
35811
- var { encodeURIComponent: encodeURIComponent2 } = globalThis;
35812
- function encodeNamespace(namespace2) {
35813
- return isNonEmptyString(namespace2) ? encodeURIComponent2(namespace2).replace(/%3A/g, ":").replace(/%2F/g, "/") : "";
35814
- }
35815
- function encodeQualifierParam(param) {
35816
- if (isNonEmptyString(param)) {
35817
- REUSED_SEARCH_PARAMS.set(REUSED_SEARCH_PARAMS_KEY, param);
35818
- return replacePlusSignWithPercentEncodedSpace(
35819
- REUSED_SEARCH_PARAMS.toString().slice(REUSED_SEARCH_PARAMS_OFFSET)
35820
- );
35821
- }
35822
- return "";
35823
- }
35824
- function encodeQualifiers(qualifiers) {
35825
- if (isObject2(qualifiers)) {
35826
- const qualifiersKeys = Object.keys(qualifiers).sort();
35827
- const searchParams = new URLSearchParams();
35828
- for (let i2 = 0, { length } = qualifiersKeys; i2 < length; i2 += 1) {
35829
- const key = qualifiersKeys[i2];
35830
- searchParams.set(key, qualifiers[key]);
35831
- }
35832
- return replacePlusSignWithPercentEncodedSpace(searchParams.toString());
35833
- }
35834
- return "";
35835
- }
35836
- function encodeSubpath(subpath) {
35837
- return isNonEmptyString(subpath) ? encodeURIComponent2(subpath).replace(/%2F/g, "/") : "";
35838
- }
35839
- function encodeVersion(version3) {
35840
- return isNonEmptyString(version3) ? encodeURIComponent2(version3).replace(/%3A/g, ":").replace(/%2B/g, "+") : "";
35841
- }
35842
- function replacePlusSignWithPercentEncodedSpace(str) {
35843
- return str.replace(/\+/g, "%20");
35844
- }
35845
- module.exports = {
35846
- encodeNamespace,
35847
- encodeVersion,
35848
- encodeQualifiers,
35849
- encodeQualifierParam,
35850
- encodeSubpath,
35851
- encodeURIComponent: encodeURIComponent2
35852
- };
35853
- }
35854
- });
35855
-
35856
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/helpers.js
35857
- var require_helpers = __commonJS({
35858
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/helpers.js"(exports, module) {
35859
- "use strict";
35860
- function createHelpersNamespaceObject(helpers, options_ = {}) {
35861
- const { comparator, ...defaults2 } = { __proto__: null, ...options_ };
35862
- const helperNames = Object.keys(helpers).sort();
35863
- const propNames = [
35864
- ...new Set([...Object.values(helpers)].map(Object.keys).flat())
35865
- ].sort(comparator);
35866
- const nsObject = /* @__PURE__ */ Object.create(null);
35867
- for (let i2 = 0, { length } = propNames; i2 < length; i2 += 1) {
35868
- const propName = propNames[i2];
35869
- const helpersForProp = /* @__PURE__ */ Object.create(null);
35870
- for (let j = 0, { length: length_j } = helperNames; j < length_j; j += 1) {
35871
- const helperName = helperNames[j];
35872
- const helperValue = helpers[helperName][propName] ?? defaults2[helperName];
35873
- if (helperValue !== void 0) {
35874
- helpersForProp[helperName] = helperValue;
35875
- }
35876
- }
35877
- nsObject[propName] = helpersForProp;
35878
- }
35879
- return nsObject;
35880
- }
35881
- module.exports = {
35882
- createHelpersNamespaceObject
35883
- };
35884
- }
35885
- });
35886
-
35887
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/normalize.js
35888
- var require_normalize = __commonJS({
35889
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/normalize.js"(exports, module) {
35890
- "use strict";
35891
- var { isObject: isObject2 } = require_objects();
35892
- var { isBlank } = require_strings();
35893
- function normalizeName(rawName) {
35894
- return typeof rawName === "string" ? rawName.trim() : void 0;
35895
- }
35896
- function normalizeNamespace(rawNamespace) {
35897
- return typeof rawNamespace === "string" ? normalizePath(rawNamespace) : void 0;
35898
- }
35899
- function normalizePath(pathname, callback) {
35900
- let collapsed = "";
35901
- let start = 0;
35902
- while (pathname.charCodeAt(start) === 47) {
35903
- start += 1;
35904
- }
35905
- let nextIndex = pathname.indexOf("/", start);
35906
- if (nextIndex === -1) {
35907
- return pathname.slice(start);
35908
- }
35909
- while (nextIndex !== -1) {
35910
- const segment = pathname.slice(start, nextIndex);
35911
- if (callback === void 0 || callback(segment)) {
35912
- collapsed = collapsed + (collapsed.length === 0 ? "" : "/") + segment;
35913
- }
35914
- start = nextIndex + 1;
35915
- while (pathname.charCodeAt(start) === 47) {
35916
- start += 1;
35917
- }
35918
- nextIndex = pathname.indexOf("/", start);
35919
- }
35920
- const lastSegment = pathname.slice(start);
35921
- if (lastSegment.length !== 0 && (callback === void 0 || callback(lastSegment))) {
35922
- collapsed = collapsed + "/" + lastSegment;
35923
- }
35924
- return collapsed;
35925
- }
35926
- function normalizeQualifiers(rawQualifiers) {
35927
- let qualifiers;
35928
- for (const { 0: key, 1: value } of qualifiersToEntries(rawQualifiers)) {
35929
- const strValue = typeof value === "string" ? value : String(value);
35930
- const trimmed = strValue.trim();
35931
- if (trimmed.length === 0) {
35932
- continue;
35933
- }
35934
- if (qualifiers === void 0) {
35935
- qualifiers = { __proto__: null };
35936
- }
35937
- qualifiers[key.toLowerCase()] = trimmed;
35938
- }
35939
- return qualifiers;
35940
- }
35941
- function normalizeSubpath(rawSubpath) {
35942
- return typeof rawSubpath === "string" ? normalizePath(rawSubpath, subpathFilter) : void 0;
35943
- }
35944
- function normalizeType(rawType) {
35945
- return typeof rawType === "string" ? rawType.trim().toLowerCase() : void 0;
35946
- }
35947
- function normalizeVersion(rawVersion) {
35948
- return typeof rawVersion === "string" ? rawVersion.trim() : void 0;
35949
- }
35950
- function qualifiersToEntries(rawQualifiers) {
35951
- if (isObject2(rawQualifiers)) {
35952
- return rawQualifiers instanceof URLSearchParams ? rawQualifiers.entries() : Object.entries(rawQualifiers);
35953
- }
35954
- return typeof rawQualifiers === "string" ? new URLSearchParams(rawQualifiers).entries() : Object.entries({});
35955
- }
35956
- function subpathFilter(segment) {
35957
- const { length } = segment;
35958
- if (length === 1 && segment.charCodeAt(0) === 46) return false;
35959
- if (length === 2 && segment.charCodeAt(0) === 46 && segment.charCodeAt(1) === 46) {
35960
- return false;
35961
- }
35962
- return !isBlank(segment);
35963
- }
35964
- module.exports = {
35965
- normalizeName,
35966
- normalizeNamespace,
35967
- normalizePath,
35968
- normalizeQualifiers,
35969
- normalizeSubpath,
35970
- normalizeType,
35971
- normalizeVersion
35972
- };
35973
- }
35974
- });
35975
-
35976
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/lang.js
35977
- var require_lang = __commonJS({
35978
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/lang.js"(exports, module) {
35979
- "use strict";
35980
- function isNullishOrEmptyString(value) {
35981
- return value === null || value === void 0 || typeof value === "string" && value.length === 0;
35982
- }
35983
- module.exports = {
35984
- isNullishOrEmptyString
35985
- };
35986
- }
35987
- });
35988
-
35989
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/validate.js
35990
- var require_validate = __commonJS({
35991
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/validate.js"(exports, module) {
35992
- "use strict";
35993
- var { PurlError } = require_error2();
35994
- var { isNullishOrEmptyString } = require_lang();
35995
- var { isNonEmptyString } = require_strings();
35996
- function validateEmptyByType(type, name2, value, throws2) {
35997
- if (!isNullishOrEmptyString(value)) {
35998
- if (throws2) {
35999
- throw new PurlError(`${type} "${name2}" component must be empty`);
36000
- }
36001
- return false;
36002
- }
36003
- return true;
36004
- }
36005
- function validateName(name2, throws2) {
36006
- return validateRequired("name", name2, throws2) && validateStrings("name", name2, throws2);
36007
- }
36008
- function validateNamespace(namespace2, throws2) {
36009
- return validateStrings("namespace", namespace2, throws2);
36010
- }
36011
- function validateQualifiers(qualifiers, throws2) {
36012
- if (qualifiers === null || qualifiers === void 0) {
36013
- return true;
36014
- }
36015
- if (typeof qualifiers !== "object") {
36016
- if (throws2) {
36017
- throw new PurlError('"qualifiers" must be an object');
36018
- }
36019
- return false;
36020
- }
36021
- const keysIterable = (
36022
- // URL searchParams have an "keys" method that returns an iterator.
36023
- typeof qualifiers.keys === "function" ? qualifiers.keys() : Object.keys(qualifiers)
36024
- );
36025
- for (const key of keysIterable) {
36026
- if (!validateQualifierKey(key, throws2)) {
36027
- return false;
36028
- }
36029
- }
36030
- return true;
36031
- }
36032
- function validateQualifierKey(key, throws2) {
36033
- if (!validateStartsWithoutNumber("qualifier", key, throws2)) {
36034
- return false;
36035
- }
36036
- for (let i2 = 0, { length } = key; i2 < length; i2 += 1) {
36037
- const code2 = key.charCodeAt(i2);
36038
- if (!(code2 >= 48 && code2 <= 57 || // 0-9
36039
- code2 >= 65 && code2 <= 90 || // A-Z
36040
- code2 >= 97 && code2 <= 122 || // a-z
36041
- code2 === 46 || // .
36042
- code2 === 45 || // -
36043
- code2 === 95)) {
36044
- if (throws2) {
36045
- throw new PurlError(
36046
- `qualifier "${key}" contains an illegal character`
36047
- );
36048
- }
36049
- return false;
36050
- }
36051
- }
36052
- return true;
36053
- }
36054
- function validateRequired(name2, value, throws2) {
36055
- if (isNullishOrEmptyString(value)) {
36056
- if (throws2) {
36057
- throw new PurlError(`"${name2}" is a required component`);
36058
- }
36059
- return false;
36060
- }
36061
- return true;
36062
- }
36063
- function validateRequiredByType(type, name2, value, throws2) {
36064
- if (isNullishOrEmptyString(value)) {
36065
- if (throws2) {
36066
- throw new PurlError(`${type} requires a "${name2}" component`);
36067
- }
36068
- return false;
36069
- }
36070
- return true;
36071
- }
36072
- function validateStartsWithoutNumber(name2, value, throws2) {
36073
- if (isNonEmptyString(value)) {
36074
- const code2 = value.charCodeAt(0);
36075
- if (code2 >= 48 && code2 <= 57) {
36076
- if (throws2) {
36077
- throw new PurlError(
36078
- `${name2} "${value}" cannot start with a number`
36079
- );
36080
- }
36081
- return false;
36082
- }
36083
- }
36084
- return true;
36085
- }
36086
- function validateStrings(name2, value, throws2) {
36087
- if (value === null || value === void 0 || typeof value === "string") {
36088
- return true;
36089
- }
36090
- if (throws2) {
36091
- throw new PurlError(`"'${name2}" must be a string`);
36092
- }
36093
- return false;
36094
- }
36095
- function validateSubpath(subpath, throws2) {
36096
- return validateStrings("subpath", subpath, throws2);
36097
- }
36098
- function validateType(type, throws2) {
36099
- if (!validateRequired("type", type, throws2) || !validateStrings("type", type, throws2) || !validateStartsWithoutNumber("type", type, throws2)) {
36100
- return false;
36101
- }
36102
- for (let i2 = 0, { length } = type; i2 < length; i2 += 1) {
36103
- const code2 = type.charCodeAt(i2);
36104
- if (!(code2 >= 48 && code2 <= 57 || // 0-9
36105
- code2 >= 65 && code2 <= 90 || // A-Z
36106
- code2 >= 97 && code2 <= 122 || // a-z
36107
- code2 === 46 || // .
36108
- code2 === 43 || // +
36109
- code2 === 45)) {
36110
- if (throws2) {
36111
- throw new PurlError(
36112
- `type "${type}" contains an illegal character`
36113
- );
36114
- }
36115
- return false;
36116
- }
36117
- }
36118
- return true;
36119
- }
36120
- function validateVersion(version3, throws2) {
36121
- return validateStrings("version", version3, throws2);
36122
- }
36123
- module.exports = {
36124
- validateEmptyByType,
36125
- validateName,
36126
- validateNamespace,
36127
- validateQualifiers,
36128
- validateQualifierKey,
36129
- validateRequired,
36130
- validateRequiredByType,
36131
- validateStartsWithoutNumber,
36132
- validateStrings,
36133
- validateSubpath,
36134
- validateType,
36135
- validateVersion
36136
- };
36137
- }
36138
- });
36139
-
36140
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/purl-component.js
36141
- var require_purl_component = __commonJS({
36142
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/purl-component.js"(exports, module) {
36143
- "use strict";
36144
- var {
36145
- encodeNamespace,
36146
- encodeVersion,
36147
- encodeQualifiers,
36148
- encodeQualifierParam,
36149
- encodeSubpath,
36150
- encodeURIComponent: encodeURIComponent2
36151
- } = require_encode();
36152
- var { createHelpersNamespaceObject } = require_helpers();
36153
- var {
36154
- normalizeType,
36155
- normalizeNamespace,
36156
- normalizeName,
36157
- normalizeVersion,
36158
- normalizeQualifiers,
36159
- normalizeSubpath
36160
- } = require_normalize();
36161
- var { localeCompare, isNonEmptyString } = require_strings();
36162
- var {
36163
- validateType,
36164
- validateNamespace,
36165
- validateName,
36166
- validateVersion,
36167
- validateQualifiers,
36168
- validateQualifierKey,
36169
- validateSubpath
36170
- } = require_validate();
36171
- var PurlComponentEncoder = (comp) => isNonEmptyString(comp) ? encodeURIComponent2(comp) : "";
36172
- var PurlComponentStringNormalizer = (comp) => typeof comp === "string" ? comp : void 0;
36173
- var PurlComponentValidator = (_comp, _throws) => true;
36174
- var componentSortOrderLookup = {
36175
- __proto__: null,
36176
- type: 0,
36177
- namespace: 1,
36178
- name: 2,
36179
- version: 3,
36180
- qualifiers: 4,
36181
- qualifierKey: 5,
36182
- qualifierValue: 6,
36183
- subpath: 7
36184
- };
36185
- function componentSortOrder(comp) {
36186
- return componentSortOrderLookup[comp] ?? comp;
36187
- }
36188
- function componentComparator(compA, compB) {
36189
- return localeCompare(componentSortOrder(compA), componentSortOrder(compB));
36190
- }
36191
- module.exports = {
36192
- // Rules for each purl component:
36193
- // https://github.com/package-url/purl-spec/blob/master/PURL-SPECIFICATION.rst#rules-for-each-purl-component
36194
- PurlComponent: createHelpersNamespaceObject(
36195
- {
36196
- encode: {
36197
- namespace: encodeNamespace,
36198
- version: encodeVersion,
36199
- qualifiers: encodeQualifiers,
36200
- qualifierKey: encodeQualifierParam,
36201
- qualifierValue: encodeQualifierParam,
36202
- subpath: encodeSubpath
36203
- },
36204
- normalize: {
36205
- type: normalizeType,
36206
- namespace: normalizeNamespace,
36207
- name: normalizeName,
36208
- version: normalizeVersion,
36209
- qualifiers: normalizeQualifiers,
36210
- subpath: normalizeSubpath
36211
- },
36212
- validate: {
36213
- type: validateType,
36214
- namespace: validateNamespace,
36215
- name: validateName,
36216
- version: validateVersion,
36217
- qualifierKey: validateQualifierKey,
36218
- qualifiers: validateQualifiers,
36219
- subpath: validateSubpath
36220
- }
36221
- },
36222
- {
36223
- comparator: componentComparator,
36224
- encode: PurlComponentEncoder,
36225
- normalize: PurlComponentStringNormalizer,
36226
- validate: PurlComponentValidator
36227
- }
36228
- )
36229
- };
36230
- }
36231
- });
36232
-
36233
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/purl-qualifier-names.js
36234
- var require_purl_qualifier_names = __commonJS({
36235
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/purl-qualifier-names.js"(exports, module) {
36236
- "use strict";
36237
- module.exports = {
36238
- // Known qualifiers:
36239
- // https://github.com/package-url/purl-spec/blob/master/PURL-SPECIFICATION.rst#known-qualifiers-keyvalue-pairs
36240
- PurlQualifierNames: {
36241
- __proto__: null,
36242
- RepositoryUrl: "repository_url",
36243
- DownloadUrl: "download_url",
36244
- VcsUrl: "vcs_url",
36245
- FileName: "file_name",
36246
- Checksum: "checksum"
36247
- }
36248
- };
36249
- }
36250
- });
36251
-
36252
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/purl-type.js
36253
- var require_purl_type = __commonJS({
36254
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/purl-type.js"(exports, module) {
36255
- "use strict";
36256
- var { isNullishOrEmptyString } = require_lang();
36257
- var { createHelpersNamespaceObject } = require_helpers();
36258
- var {
36259
- isSemverString,
36260
- lowerName,
36261
- lowerNamespace,
36262
- lowerVersion,
36263
- replaceDashesWithUnderscores,
36264
- replaceUnderscoresWithDashes
36265
- } = require_strings();
36266
- var { validateEmptyByType, validateRequiredByType } = require_validate();
36267
- var { PurlError } = require_error2();
36268
- var PurlTypNormalizer = (purl) => purl;
36269
- var PurlTypeValidator = (_purl, _throws) => true;
36270
- module.exports = {
36271
- // PURL types:
36272
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst
36273
- PurlType: createHelpersNamespaceObject(
36274
- {
36275
- normalize: {
36276
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#alpm
36277
- alpm(purl) {
36278
- lowerNamespace(purl);
36279
- lowerName(purl);
36280
- return purl;
36281
- },
36282
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#apk
36283
- apk(purl) {
36284
- lowerNamespace(purl);
36285
- lowerName(purl);
36286
- return purl;
36287
- },
36288
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#bitbucket
36289
- bitbucket(purl) {
36290
- lowerNamespace(purl);
36291
- lowerName(purl);
36292
- return purl;
36293
- },
36294
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#bitnami
36295
- bitnami(purl) {
36296
- lowerName(purl);
36297
- return purl;
36298
- },
36299
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#composer
36300
- composer(purl) {
36301
- lowerNamespace(purl);
36302
- lowerName(purl);
36303
- return purl;
36304
- },
36305
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#deb
36306
- deb(purl) {
36307
- lowerNamespace(purl);
36308
- lowerName(purl);
36309
- return purl;
36310
- },
36311
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#other-candidate-types-to-define
36312
- gitlab(purl) {
36313
- lowerNamespace(purl);
36314
- lowerName(purl);
36315
- return purl;
36316
- },
36317
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#github
36318
- github(purl) {
36319
- lowerNamespace(purl);
36320
- lowerName(purl);
36321
- return purl;
36322
- },
36323
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#golang
36324
- // golang(purl) {
36325
- // // Ignore case-insensitive rule because go.mod are case-sensitive.
36326
- // // Pending spec change: https://github.com/package-url/purl-spec/pull/196
36327
- // lowerNamespace(purl)
36328
- // lowerName(purl)
36329
- // return purl
36330
- // },
36331
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#hex
36332
- hex(purl) {
36333
- lowerNamespace(purl);
36334
- lowerName(purl);
36335
- return purl;
36336
- },
36337
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#huggingface
36338
- huggingface(purl) {
36339
- lowerVersion(purl);
36340
- return purl;
36341
- },
36342
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#mlflow
36343
- mlflow(purl) {
36344
- if (purl.qualifiers?.repository_url?.includes("databricks")) {
36345
- lowerName(purl);
36346
- }
36347
- return purl;
36348
- },
36349
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#npm
36350
- npm(purl) {
36351
- lowerNamespace(purl);
36352
- lowerName(purl);
36353
- return purl;
36354
- },
36355
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#luarocks
36356
- luarocks(purl) {
36357
- lowerVersion(purl);
36358
- return purl;
36359
- },
36360
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#oci
36361
- oci(purl) {
36362
- lowerName(purl);
36363
- return purl;
36364
- },
36365
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#pub
36366
- pub(purl) {
36367
- lowerName(purl);
36368
- purl.name = replaceDashesWithUnderscores(purl.name);
36369
- return purl;
36370
- },
36371
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#pypi
36372
- pypi(purl) {
36373
- lowerNamespace(purl);
36374
- lowerName(purl);
36375
- purl.name = replaceUnderscoresWithDashes(purl.name);
36376
- return purl;
36377
- },
36378
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#qpkg
36379
- qpkg(purl) {
36380
- lowerNamespace(purl);
36381
- return purl;
36382
- },
36383
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#rpm
36384
- rpm(purl) {
36385
- lowerNamespace(purl);
36386
- return purl;
36387
- }
36388
- },
36389
- validate: {
36390
- // TODO: cocoapods name validation
36391
- // TODO: cpan namespace validation
36392
- // TODO: swid qualifier validation
36393
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#conan
36394
- conan(purl, throws2) {
36395
- if (isNullishOrEmptyString(purl.namespace)) {
36396
- if (purl.qualifiers?.channel) {
36397
- if (throws2) {
36398
- throw new PurlError(
36399
- 'conan requires a "namespace" component when a "channel" qualifier is present'
36400
- );
36401
- }
36402
- return false;
36403
- }
36404
- } else if (isNullishOrEmptyString(purl.qualifiers)) {
36405
- if (throws2) {
36406
- throw new PurlError(
36407
- 'conan requires a "qualifiers" component when a namespace is present'
36408
- );
36409
- }
36410
- return false;
36411
- }
36412
- return true;
36413
- },
36414
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#cran
36415
- cran(purl, throws2) {
36416
- return validateRequiredByType(
36417
- "cran",
36418
- "version",
36419
- purl.version,
36420
- throws2
36421
- );
36422
- },
36423
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#golang
36424
- golang(purl) {
36425
- const { version: version3 } = purl;
36426
- const length = typeof version3 === "string" ? version3.length : 0;
36427
- if (length && version3.charCodeAt(0) === 118 && !isSemverString(version3.slice(1))) {
36428
- if (throws) {
36429
- throw new PurlError(
36430
- 'golang "version" component starting with a "v" must be followed by a valid semver version'
36431
- );
36432
- }
36433
- return false;
36434
- }
36435
- return true;
36436
- },
36437
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#maven
36438
- maven(purl, throws2) {
36439
- return validateRequiredByType(
36440
- "maven",
36441
- "namespace",
36442
- purl.namespace,
36443
- throws2
36444
- );
36445
- },
36446
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#mlflow
36447
- mlflow(purl, throws2) {
36448
- return validateEmptyByType(
36449
- "mlflow",
36450
- "namespace",
36451
- purl.namespace,
36452
- throws2
36453
- );
36454
- },
36455
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#oci
36456
- oci(purl, throws2) {
36457
- return validateEmptyByType(
36458
- "oci",
36459
- "namespace",
36460
- purl.namespace,
36461
- throws2
36462
- );
36463
- },
36464
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#pub
36465
- pub(purl, throws2) {
36466
- const { name: name2 } = purl;
36467
- for (let i2 = 0, { length } = name2; i2 < length; i2 += 1) {
36468
- const code2 = name2.charCodeAt(i2);
36469
- if (!(code2 >= 48 && code2 <= 57 || // 0-9
36470
- code2 >= 97 && code2 <= 122 || // a-z
36471
- code2 === 95)) {
36472
- if (throws2) {
36473
- throw new PurlError(
36474
- 'pub "name" component may only contain [a-z0-9_] characters'
36475
- );
36476
- }
36477
- return false;
36478
- }
36479
- }
36480
- return true;
36481
- },
36482
- // https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#swift
36483
- swift(purl, throws2) {
36484
- return validateRequiredByType(
36485
- "swift",
36486
- "namespace",
36487
- purl.namespace,
36488
- throws2
36489
- ) && validateRequiredByType(
36490
- "swift",
36491
- "version",
36492
- purl.version,
36493
- throws2
36494
- );
36495
- }
36496
- }
36497
- },
36498
- {
36499
- normalize: PurlTypNormalizer,
36500
- validate: PurlTypeValidator
36501
- }
36502
- )
36503
- };
36504
- }
36505
- });
36506
-
36507
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/package-url.js
36508
- var require_package_url = __commonJS({
36509
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/src/package-url.js"(exports, module) {
36510
- "use strict";
36511
- var { decodePurlComponent } = require_decode();
36512
- var { isObject: isObject2, recursiveFreeze } = require_objects();
36513
- var { isBlank, isNonEmptyString, trimLeadingSlashes } = require_strings();
36514
- var { PurlComponent } = require_purl_component();
36515
- var { PurlQualifierNames } = require_purl_qualifier_names();
36516
- var { PurlType } = require_purl_type();
36517
- var { PurlError } = require_error2();
36518
- var PackageURL7 = class _PackageURL {
36519
- static Component = recursiveFreeze(PurlComponent);
36520
- static KnownQualifierNames = recursiveFreeze(PurlQualifierNames);
36521
- static Type = recursiveFreeze(PurlType);
36522
- constructor(rawType, rawNamespace, rawName, rawVersion, rawQualifiers, rawSubpath) {
36523
- const type = isNonEmptyString(rawType) ? PurlComponent.type.normalize(rawType) : rawType;
36524
- PurlComponent.type.validate(type, true);
36525
- const namespace2 = isNonEmptyString(rawNamespace) ? PurlComponent.namespace.normalize(rawNamespace) : rawNamespace;
36526
- PurlComponent.namespace.validate(namespace2, true);
36527
- const name2 = isNonEmptyString(rawName) ? PurlComponent.name.normalize(rawName) : rawName;
36528
- PurlComponent.name.validate(name2, true);
36529
- const version3 = isNonEmptyString(rawVersion) ? PurlComponent.version.normalize(rawVersion) : rawVersion;
36530
- PurlComponent.version.validate(version3, true);
36531
- const qualifiers = typeof rawQualifiers === "string" || isObject2(rawQualifiers) ? PurlComponent.qualifiers.normalize(rawQualifiers) : rawQualifiers;
36532
- PurlComponent.qualifiers.validate(qualifiers, true);
36533
- const subpath = isNonEmptyString(rawSubpath) ? PurlComponent.subpath.normalize(rawSubpath) : rawSubpath;
36534
- PurlComponent.subpath.validate(subpath, true);
36535
- this.type = type;
36536
- this.name = name2;
36537
- this.namespace = namespace2 ?? void 0;
36538
- this.version = version3 ?? void 0;
36539
- this.qualifiers = qualifiers ?? void 0;
36540
- this.subpath = subpath ?? void 0;
36541
- const typeHelpers = PurlType[type];
36542
- if (typeHelpers) {
36543
- typeHelpers.normalize(this);
36544
- typeHelpers.validate(this, true);
36545
- }
36546
- }
36547
- toString() {
36548
- const { namespace: namespace2, name: name2, version: version3, qualifiers, subpath, type } = this;
36549
- let purlStr = `pkg:${PurlComponent.type.encode(type)}/`;
36550
- if (namespace2) {
36551
- purlStr = `${purlStr}${PurlComponent.namespace.encode(namespace2)}/`;
36552
- }
36553
- purlStr = `${purlStr}${PurlComponent.name.encode(name2)}`;
36554
- if (version3) {
36555
- purlStr = `${purlStr}@${PurlComponent.version.encode(version3)}`;
36556
- }
36557
- if (qualifiers) {
36558
- purlStr = `${purlStr}?${PurlComponent.qualifiers.encode(qualifiers)}`;
36559
- }
36560
- if (subpath) {
36561
- purlStr = `${purlStr}#${PurlComponent.subpath.encode(subpath)}`;
36562
- }
36563
- return purlStr;
36564
- }
36565
- static fromString(purlStr) {
36566
- return new _PackageURL(..._PackageURL.parseString(purlStr));
36567
- }
36568
- static parseString(purlStr) {
36569
- if (typeof purlStr !== "string") {
36570
- throw new Error("A purl string argument is required.");
36571
- }
36572
- if (isBlank(purlStr)) {
36573
- return [
36574
- void 0,
36575
- void 0,
36576
- void 0,
36577
- void 0,
36578
- void 0,
36579
- void 0
36580
- ];
36581
- }
36582
- const colonIndex = purlStr.indexOf(":");
36583
- let url2;
36584
- let maybeUrlWithAuth;
36585
- if (colonIndex !== -1) {
36586
- try {
36587
- const beforeColon = purlStr.slice(0, colonIndex);
36588
- const afterColon = purlStr.slice(colonIndex + 1);
36589
- const trimmedAfterColon = trimLeadingSlashes(afterColon);
36590
- url2 = new URL(`${beforeColon}:${trimmedAfterColon}`);
36591
- maybeUrlWithAuth = afterColon.length === trimmedAfterColon.length ? url2 : new URL(purlStr);
36592
- } catch (e) {
36593
- throw new PurlError("failed to parse as URL", {
36594
- cause: e
36595
- });
36596
- }
36597
- }
36598
- if (url2?.protocol !== "pkg:") {
36599
- throw new PurlError('missing required "pkg" scheme component');
36600
- }
36601
- if (maybeUrlWithAuth.username !== "" || maybeUrlWithAuth.password !== "") {
36602
- throw new PurlError('cannot contain a "user:pass@host:port"');
36603
- }
36604
- const { pathname } = url2;
36605
- const firstSlashIndex = pathname.indexOf("/");
36606
- const rawType = decodePurlComponent(
36607
- "type",
36608
- firstSlashIndex === -1 ? pathname : pathname.slice(0, firstSlashIndex)
36609
- );
36610
- if (firstSlashIndex < 1) {
36611
- return [
36612
- rawType,
36613
- void 0,
36614
- void 0,
36615
- void 0,
36616
- void 0,
36617
- void 0
36618
- ];
36619
- }
36620
- let rawVersion;
36621
- let atSignIndex = pathname.lastIndexOf("@");
36622
- if (atSignIndex !== -1 && pathname.charCodeAt(atSignIndex - 1) === 47) {
36623
- atSignIndex = -1;
36624
- }
36625
- const beforeVersion = pathname.slice(
36626
- rawType.length + 1,
36627
- atSignIndex === -1 ? pathname.length : atSignIndex
36628
- );
36629
- if (atSignIndex !== -1) {
36630
- rawVersion = decodePurlComponent(
36631
- "version",
36632
- pathname.slice(atSignIndex + 1)
36633
- );
36634
- }
36635
- let rawNamespace;
36636
- let rawName;
36637
- const lastSlashIndex = beforeVersion.lastIndexOf("/");
36638
- if (lastSlashIndex === -1) {
36639
- rawName = decodePurlComponent("name", beforeVersion);
36640
- } else {
36641
- rawName = decodePurlComponent(
36642
- "name",
36643
- beforeVersion.slice(lastSlashIndex + 1)
36644
- );
36645
- rawNamespace = decodePurlComponent(
36646
- "namespace",
36647
- beforeVersion.slice(0, lastSlashIndex)
36648
- );
36649
- }
36650
- let rawQualifiers;
36651
- const { searchParams } = url2;
36652
- if (searchParams.size !== 0) {
36653
- searchParams.forEach(
36654
- (value) => decodePurlComponent("qualifiers", value)
36655
- );
36656
- rawQualifiers = searchParams;
36657
- }
36658
- let rawSubpath;
36659
- const { hash } = url2;
36660
- if (hash.length !== 0) {
36661
- rawSubpath = decodePurlComponent("subpath", hash.slice(1));
36662
- }
36663
- return [
36664
- rawType,
36665
- rawNamespace,
36666
- rawName,
36667
- rawVersion,
36668
- rawQualifiers,
36669
- rawSubpath
36670
- ];
36671
- }
36672
- };
36673
- for (const staticProp of ["Component", "KnownQualifierNames", "Type"]) {
36674
- Reflect.defineProperty(PackageURL7, staticProp, {
36675
- ...Reflect.getOwnPropertyDescriptor(PackageURL7, staticProp),
36676
- writable: false
36677
- });
36678
- }
36679
- Reflect.setPrototypeOf(PackageURL7.prototype, null);
36680
- module.exports = {
36681
- PackageURL: PackageURL7,
36682
- PurlComponent,
36683
- PurlQualifierNames,
36684
- PurlType
36685
- };
36686
- }
36687
- });
36688
-
36689
- // ../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/index.js
36690
- var require_packageurl_js = __commonJS({
36691
- "../../node_modules/.pnpm/packageurl-js@2.0.1/node_modules/packageurl-js/index.js"(exports, module) {
36692
- "use strict";
36693
- var {
36694
- PackageURL: PackageURL7,
36695
- PurlComponent,
36696
- PurlQualifierNames,
36697
- PurlType
36698
- } = require_package_url();
36699
- module.exports = {
36700
- PackageURL: PackageURL7,
36701
- PurlComponent,
36702
- PurlQualifierNames,
36703
- PurlType
36704
- };
36705
- }
36706
- });
36707
-
36708
35583
  // ../../node_modules/.pnpm/@actions+core@1.10.1/node_modules/@actions/core/lib/utils.js
36709
35584
  var require_utils = __commonJS({
36710
35585
  "../../node_modules/.pnpm/@actions+core@1.10.1/node_modules/@actions/core/lib/utils.js"(exports) {
@@ -37291,7 +36166,7 @@ var require_tunnel = __commonJS({
37291
36166
  var http2 = __require("http");
37292
36167
  var https2 = __require("https");
37293
36168
  var events = __require("events");
37294
- var assert8 = __require("assert");
36169
+ var assert11 = __require("assert");
37295
36170
  var util6 = __require("util");
37296
36171
  exports.httpOverHttp = httpOverHttp;
37297
36172
  exports.httpsOverHttp = httpsOverHttp;
@@ -37804,7 +36679,7 @@ var require_errors3 = __commonJS({
37804
36679
  });
37805
36680
 
37806
36681
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/core/constants.js
37807
- var require_constants2 = __commonJS({
36682
+ var require_constants = __commonJS({
37808
36683
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/core/constants.js"(exports, module) {
37809
36684
  "use strict";
37810
36685
  var headerNameLowerCasedRecord = {};
@@ -37922,7 +36797,7 @@ var require_constants2 = __commonJS({
37922
36797
  var require_util2 = __commonJS({
37923
36798
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/core/util.js"(exports, module) {
37924
36799
  "use strict";
37925
- var assert8 = __require("assert");
36800
+ var assert11 = __require("assert");
37926
36801
  var { kDestroyed, kBodyUsed } = require_symbols();
37927
36802
  var { IncomingMessage } = __require("http");
37928
36803
  var stream4 = __require("stream");
@@ -37931,7 +36806,7 @@ var require_util2 = __commonJS({
37931
36806
  var { Blob: Blob2 } = __require("buffer");
37932
36807
  var nodeUtil = __require("util");
37933
36808
  var { stringify: stringify4 } = __require("querystring");
37934
- var { headerNameLowerCasedRecord } = require_constants2();
36809
+ var { headerNameLowerCasedRecord } = require_constants();
37935
36810
  var [nodeMajor, nodeMinor] = process.versions.node.split(".").map((v) => Number(v));
37936
36811
  function nop() {
37937
36812
  }
@@ -38004,7 +36879,7 @@ var require_util2 = __commonJS({
38004
36879
  function getHostname(host) {
38005
36880
  if (host[0] === "[") {
38006
36881
  const idx2 = host.indexOf("]");
38007
- assert8(idx2 !== -1);
36882
+ assert11(idx2 !== -1);
38008
36883
  return host.substring(1, idx2);
38009
36884
  }
38010
36885
  const idx = host.indexOf(":");
@@ -38015,7 +36890,7 @@ var require_util2 = __commonJS({
38015
36890
  if (!host) {
38016
36891
  return null;
38017
36892
  }
38018
- assert8.strictEqual(typeof host, "string");
36893
+ assert11.strictEqual(typeof host, "string");
38019
36894
  const servername = getHostname(host);
38020
36895
  if (net.isIP(servername)) {
38021
36896
  return "";
@@ -40376,7 +39251,7 @@ var require_main = __commonJS({
40376
39251
  });
40377
39252
 
40378
39253
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/fetch/constants.js
40379
- var require_constants3 = __commonJS({
39254
+ var require_constants2 = __commonJS({
40380
39255
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/fetch/constants.js"(exports, module) {
40381
39256
  "use strict";
40382
39257
  var { MessageChannel, receiveMessageOnPort } = __require("worker_threads");
@@ -40614,11 +39489,11 @@ var require_global = __commonJS({
40614
39489
  var require_util3 = __commonJS({
40615
39490
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/fetch/util.js"(exports, module) {
40616
39491
  "use strict";
40617
- var { redirectStatusSet, referrerPolicySet: referrerPolicyTokens, badPortsSet } = require_constants3();
39492
+ var { redirectStatusSet, referrerPolicySet: referrerPolicyTokens, badPortsSet } = require_constants2();
40618
39493
  var { getGlobalOrigin } = require_global();
40619
39494
  var { performance: performance2 } = __require("perf_hooks");
40620
39495
  var { isBlobLike, toUSVString, ReadableStreamFrom } = require_util2();
40621
- var assert8 = __require("assert");
39496
+ var assert11 = __require("assert");
40622
39497
  var { isUint8Array } = __require("util/types");
40623
39498
  var supportedHashes = [];
40624
39499
  var crypto5;
@@ -40808,7 +39683,7 @@ var require_util3 = __commonJS({
40808
39683
  }
40809
39684
  function determineRequestsReferrer(request) {
40810
39685
  const policy = request.referrerPolicy;
40811
- assert8(policy);
39686
+ assert11(policy);
40812
39687
  let referrerSource = null;
40813
39688
  if (request.referrer === "client") {
40814
39689
  const globalOrigin = getGlobalOrigin();
@@ -40866,7 +39741,7 @@ var require_util3 = __commonJS({
40866
39741
  }
40867
39742
  }
40868
39743
  function stripURLForReferrer(url2, originOnly) {
40869
- assert8(url2 instanceof URL);
39744
+ assert11(url2 instanceof URL);
40870
39745
  if (url2.protocol === "file:" || url2.protocol === "about:" || url2.protocol === "blank:") {
40871
39746
  return "no-referrer";
40872
39747
  }
@@ -41045,7 +39920,7 @@ var require_util3 = __commonJS({
41045
39920
  if (result === void 0) {
41046
39921
  throw new TypeError("Value is not JSON serializable");
41047
39922
  }
41048
- assert8(typeof result === "string");
39923
+ assert11(typeof result === "string");
41049
39924
  return result;
41050
39925
  }
41051
39926
  var esIteratorPrototype = Object.getPrototypeOf(Object.getPrototypeOf([][Symbol.iterator]()));
@@ -41139,7 +40014,7 @@ var require_util3 = __commonJS({
41139
40014
  }
41140
40015
  function isomorphicEncode(input) {
41141
40016
  for (let i2 = 0; i2 < input.length; i2++) {
41142
- assert8(input.charCodeAt(i2) <= 255);
40017
+ assert11(input.charCodeAt(i2) <= 255);
41143
40018
  }
41144
40019
  return input;
41145
40020
  }
@@ -41159,7 +40034,7 @@ var require_util3 = __commonJS({
41159
40034
  }
41160
40035
  }
41161
40036
  function urlIsLocal(url2) {
41162
- assert8("protocol" in url2);
40037
+ assert11("protocol" in url2);
41163
40038
  const protocol = url2.protocol;
41164
40039
  return protocol === "about:" || protocol === "blob:" || protocol === "data:";
41165
40040
  }
@@ -41170,7 +40045,7 @@ var require_util3 = __commonJS({
41170
40045
  return url2.protocol === "https:";
41171
40046
  }
41172
40047
  function urlIsHttpHttpsScheme(url2) {
41173
- assert8("protocol" in url2);
40048
+ assert11("protocol" in url2);
41174
40049
  const protocol = url2.protocol;
41175
40050
  return protocol === "http:" || protocol === "https:";
41176
40051
  }
@@ -41612,7 +40487,7 @@ var require_webidl = __commonJS({
41612
40487
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/fetch/dataURL.js
41613
40488
  var require_dataURL = __commonJS({
41614
40489
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/fetch/dataURL.js"(exports, module) {
41615
- var assert8 = __require("assert");
40490
+ var assert11 = __require("assert");
41616
40491
  var { atob: atob2 } = __require("buffer");
41617
40492
  var { isomorphicDecode } = require_util3();
41618
40493
  var encoder = new TextEncoder();
@@ -41620,7 +40495,7 @@ var require_dataURL = __commonJS({
41620
40495
  var HTTP_WHITESPACE_REGEX = /(\u000A|\u000D|\u0009|\u0020)/;
41621
40496
  var HTTP_QUOTED_STRING_TOKENS = /[\u0009|\u0020-\u007E|\u0080-\u00FF]/;
41622
40497
  function dataURLProcessor(dataURL) {
41623
- assert8(dataURL.protocol === "data:");
40498
+ assert11(dataURL.protocol === "data:");
41624
40499
  let input = URLSerializer(dataURL, true);
41625
40500
  input = input.slice(5);
41626
40501
  const position = { position: 0 };
@@ -41806,7 +40681,7 @@ var require_dataURL = __commonJS({
41806
40681
  function collectAnHTTPQuotedString(input, position, extractValue2) {
41807
40682
  const positionStart = position.position;
41808
40683
  let value = "";
41809
- assert8(input[position.position] === '"');
40684
+ assert11(input[position.position] === '"');
41810
40685
  position.position++;
41811
40686
  while (true) {
41812
40687
  value += collectASequenceOfCodePoints(
@@ -41827,7 +40702,7 @@ var require_dataURL = __commonJS({
41827
40702
  value += input[position.position];
41828
40703
  position.position++;
41829
40704
  } else {
41830
- assert8(quoteOrBackslash === '"');
40705
+ assert11(quoteOrBackslash === '"');
41831
40706
  break;
41832
40707
  }
41833
40708
  }
@@ -41837,7 +40712,7 @@ var require_dataURL = __commonJS({
41837
40712
  return input.slice(positionStart, position.position);
41838
40713
  }
41839
40714
  function serializeAMimeType(mimeType) {
41840
- assert8(mimeType !== "failure");
40715
+ assert11(mimeType !== "failure");
41841
40716
  const { parameters, essence } = mimeType;
41842
40717
  let serialization = essence;
41843
40718
  for (let [name2, value] of parameters.entries()) {
@@ -42253,10 +41128,10 @@ var require_body = __commonJS({
42253
41128
  var { FormData: FormData4 } = require_formdata();
42254
41129
  var { kState } = require_symbols2();
42255
41130
  var { webidl } = require_webidl();
42256
- var { DOMException: DOMException2, structuredClone } = require_constants3();
41131
+ var { DOMException: DOMException2, structuredClone } = require_constants2();
42257
41132
  var { Blob: Blob2, File: NativeFile } = __require("buffer");
42258
41133
  var { kBodyUsed } = require_symbols();
42259
- var assert8 = __require("assert");
41134
+ var assert11 = __require("assert");
42260
41135
  var { isErrored } = require_util2();
42261
41136
  var { isUint8Array, isArrayBuffer: isArrayBuffer2 } = __require("util/types");
42262
41137
  var { File: UndiciFile } = require_file2();
@@ -42294,7 +41169,7 @@ var require_body = __commonJS({
42294
41169
  type: void 0
42295
41170
  });
42296
41171
  }
42297
- assert8(isReadableStreamLike(stream4));
41172
+ assert11(isReadableStreamLike(stream4));
42298
41173
  let action = null;
42299
41174
  let source = null;
42300
41175
  let length = null;
@@ -42410,8 +41285,8 @@ Content-Type: ${value.type || "application/octet-stream"}\r
42410
41285
  ReadableStream2 = __require("stream/web").ReadableStream;
42411
41286
  }
42412
41287
  if (object instanceof ReadableStream2) {
42413
- assert8(!util6.isDisturbed(object), "The body has already been consumed.");
42414
- assert8(!object.locked, "The stream is locked.");
41288
+ assert11(!util6.isDisturbed(object), "The body has already been consumed.");
41289
+ assert11(!object.locked, "The stream is locked.");
42415
41290
  }
42416
41291
  return extractBody(object, keepalive);
42417
41292
  }
@@ -42622,7 +41497,7 @@ var require_request = __commonJS({
42622
41497
  InvalidArgumentError: InvalidArgumentError2,
42623
41498
  NotSupportedError
42624
41499
  } = require_errors3();
42625
- var assert8 = __require("assert");
41500
+ var assert11 = __require("assert");
42626
41501
  var { kHTTP2BuildRequest, kHTTP2CopyHeaders, kHTTP1BuildRequest } = require_symbols();
42627
41502
  var util6 = require_util2();
42628
41503
  var tokenRegExp = /^[\^_`a-zA-Z\-0-9!#$%&'*+.|~]+$/;
@@ -42803,8 +41678,8 @@ var require_request = __commonJS({
42803
41678
  }
42804
41679
  }
42805
41680
  onConnect(abort) {
42806
- assert8(!this.aborted);
42807
- assert8(!this.completed);
41681
+ assert11(!this.aborted);
41682
+ assert11(!this.completed);
42808
41683
  if (this.error) {
42809
41684
  abort(this.error);
42810
41685
  } else {
@@ -42813,8 +41688,8 @@ var require_request = __commonJS({
42813
41688
  }
42814
41689
  }
42815
41690
  onHeaders(statusCode, headers, resume, statusText) {
42816
- assert8(!this.aborted);
42817
- assert8(!this.completed);
41691
+ assert11(!this.aborted);
41692
+ assert11(!this.completed);
42818
41693
  if (channels.headers.hasSubscribers) {
42819
41694
  channels.headers.publish({ request: this, response: { statusCode, headers, statusText } });
42820
41695
  }
@@ -42825,8 +41700,8 @@ var require_request = __commonJS({
42825
41700
  }
42826
41701
  }
42827
41702
  onData(chunk2) {
42828
- assert8(!this.aborted);
42829
- assert8(!this.completed);
41703
+ assert11(!this.aborted);
41704
+ assert11(!this.completed);
42830
41705
  try {
42831
41706
  return this[kHandler].onData(chunk2);
42832
41707
  } catch (err) {
@@ -42835,13 +41710,13 @@ var require_request = __commonJS({
42835
41710
  }
42836
41711
  }
42837
41712
  onUpgrade(statusCode, headers, socket) {
42838
- assert8(!this.aborted);
42839
- assert8(!this.completed);
41713
+ assert11(!this.aborted);
41714
+ assert11(!this.completed);
42840
41715
  return this[kHandler].onUpgrade(statusCode, headers, socket);
42841
41716
  }
42842
41717
  onComplete(trailers) {
42843
41718
  this.onFinally();
42844
- assert8(!this.aborted);
41719
+ assert11(!this.aborted);
42845
41720
  this.completed = true;
42846
41721
  if (channels.trailers.hasSubscribers) {
42847
41722
  channels.trailers.publish({ request: this, trailers });
@@ -43172,7 +42047,7 @@ var require_connect = __commonJS({
43172
42047
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/core/connect.js"(exports, module) {
43173
42048
  "use strict";
43174
42049
  var net = __require("net");
43175
- var assert8 = __require("assert");
42050
+ var assert11 = __require("assert");
43176
42051
  var util6 = require_util2();
43177
42052
  var { InvalidArgumentError: InvalidArgumentError2, ConnectTimeoutError } = require_errors3();
43178
42053
  var tls;
@@ -43242,7 +42117,7 @@ var require_connect = __commonJS({
43242
42117
  servername = servername || options.servername || util6.getServerName(host) || null;
43243
42118
  const sessionKey = servername || hostname;
43244
42119
  const session = sessionCache.get(sessionKey) || null;
43245
- assert8(sessionKey);
42120
+ assert11(sessionKey);
43246
42121
  socket = tls.connect({
43247
42122
  highWaterMark: 16384,
43248
42123
  // TLS in node can't have bigger HWM anyway...
@@ -43261,7 +42136,7 @@ var require_connect = __commonJS({
43261
42136
  sessionCache.set(sessionKey, session2);
43262
42137
  });
43263
42138
  } else {
43264
- assert8(!httpSocket, "httpSocket can only be sent on TLS update");
42139
+ assert11(!httpSocket, "httpSocket can only be sent on TLS update");
43265
42140
  socket = net.connect({
43266
42141
  highWaterMark: 64 * 1024,
43267
42142
  // Same as nodejs fs streams.
@@ -43344,7 +42219,7 @@ var require_utils2 = __commonJS({
43344
42219
  });
43345
42220
 
43346
42221
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/llhttp/constants.js
43347
- var require_constants4 = __commonJS({
42222
+ var require_constants3 = __commonJS({
43348
42223
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/llhttp/constants.js"(exports) {
43349
42224
  "use strict";
43350
42225
  Object.defineProperty(exports, "__esModule", { value: true });
@@ -43670,7 +42545,7 @@ var require_RedirectHandler = __commonJS({
43670
42545
  "use strict";
43671
42546
  var util6 = require_util2();
43672
42547
  var { kBodyUsed } = require_symbols();
43673
- var assert8 = __require("assert");
42548
+ var assert11 = __require("assert");
43674
42549
  var { InvalidArgumentError: InvalidArgumentError2 } = require_errors3();
43675
42550
  var EE3 = __require("events");
43676
42551
  var redirectableStatusCodes = [300, 301, 302, 303, 307, 308];
@@ -43681,7 +42556,7 @@ var require_RedirectHandler = __commonJS({
43681
42556
  this[kBodyUsed] = false;
43682
42557
  }
43683
42558
  async *[Symbol.asyncIterator]() {
43684
- assert8(!this[kBodyUsed], "disturbed");
42559
+ assert11(!this[kBodyUsed], "disturbed");
43685
42560
  this[kBodyUsed] = true;
43686
42561
  yield* this[kBody];
43687
42562
  }
@@ -43702,7 +42577,7 @@ var require_RedirectHandler = __commonJS({
43702
42577
  if (util6.isStream(this.opts.body)) {
43703
42578
  if (util6.bodyLength(this.opts.body) === 0) {
43704
42579
  this.opts.body.on("data", function() {
43705
- assert8(false);
42580
+ assert11(false);
43706
42581
  });
43707
42582
  }
43708
42583
  if (typeof this.opts.body.readableDidRead !== "boolean") {
@@ -43806,7 +42681,7 @@ var require_RedirectHandler = __commonJS({
43806
42681
  }
43807
42682
  }
43808
42683
  } else {
43809
- assert8(headers == null, "headers must be an object or an array");
42684
+ assert11(headers == null, "headers must be an object or an array");
43810
42685
  }
43811
42686
  return ret;
43812
42687
  }
@@ -43854,7 +42729,7 @@ var require_llhttp_simd_wasm = __commonJS({
43854
42729
  var require_client = __commonJS({
43855
42730
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/client.js"(exports, module) {
43856
42731
  "use strict";
43857
- var assert8 = __require("assert");
42732
+ var assert11 = __require("assert");
43858
42733
  var net = __require("net");
43859
42734
  var http2 = __require("http");
43860
42735
  var { pipeline: pipeline2 } = __require("stream");
@@ -44192,7 +43067,7 @@ var require_client = __commonJS({
44192
43067
  }
44193
43068
  };
44194
43069
  function onHttp2SessionError(err) {
44195
- assert8(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
43070
+ assert11(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
44196
43071
  this[kSocket][kError] = err;
44197
43072
  onError(this[kClient], err);
44198
43073
  }
@@ -44213,7 +43088,7 @@ var require_client = __commonJS({
44213
43088
  client[kSocket] = null;
44214
43089
  client[kHTTP2Session] = null;
44215
43090
  if (client.destroyed) {
44216
- assert8(this[kPending] === 0);
43091
+ assert11(this[kPending] === 0);
44217
43092
  const requests = client[kQueue].splice(client[kRunningIdx]);
44218
43093
  for (let i2 = 0; i2 < requests.length; i2++) {
44219
43094
  const request = requests[i2];
@@ -44225,7 +43100,7 @@ var require_client = __commonJS({
44225
43100
  errorRequest(client, request, err);
44226
43101
  }
44227
43102
  client[kPendingIdx] = client[kRunningIdx];
44228
- assert8(client[kRunning] === 0);
43103
+ assert11(client[kRunning] === 0);
44229
43104
  client.emit(
44230
43105
  "disconnect",
44231
43106
  client[kUrl],
@@ -44234,7 +43109,7 @@ var require_client = __commonJS({
44234
43109
  );
44235
43110
  resume(client);
44236
43111
  }
44237
- var constants4 = require_constants4();
43112
+ var constants4 = require_constants3();
44238
43113
  var createRedirectInterceptor = require_redirectInterceptor();
44239
43114
  var EMPTY_BUF = Buffer.alloc(0);
44240
43115
  async function lazyllhttp() {
@@ -44252,35 +43127,35 @@ var require_client = __commonJS({
44252
43127
  return 0;
44253
43128
  },
44254
43129
  wasm_on_status: (p, at, len) => {
44255
- assert8.strictEqual(currentParser.ptr, p);
43130
+ assert11.strictEqual(currentParser.ptr, p);
44256
43131
  const start = at - currentBufferPtr + currentBufferRef.byteOffset;
44257
43132
  return currentParser.onStatus(new FastBuffer(currentBufferRef.buffer, start, len)) || 0;
44258
43133
  },
44259
43134
  wasm_on_message_begin: (p) => {
44260
- assert8.strictEqual(currentParser.ptr, p);
43135
+ assert11.strictEqual(currentParser.ptr, p);
44261
43136
  return currentParser.onMessageBegin() || 0;
44262
43137
  },
44263
43138
  wasm_on_header_field: (p, at, len) => {
44264
- assert8.strictEqual(currentParser.ptr, p);
43139
+ assert11.strictEqual(currentParser.ptr, p);
44265
43140
  const start = at - currentBufferPtr + currentBufferRef.byteOffset;
44266
43141
  return currentParser.onHeaderField(new FastBuffer(currentBufferRef.buffer, start, len)) || 0;
44267
43142
  },
44268
43143
  wasm_on_header_value: (p, at, len) => {
44269
- assert8.strictEqual(currentParser.ptr, p);
43144
+ assert11.strictEqual(currentParser.ptr, p);
44270
43145
  const start = at - currentBufferPtr + currentBufferRef.byteOffset;
44271
43146
  return currentParser.onHeaderValue(new FastBuffer(currentBufferRef.buffer, start, len)) || 0;
44272
43147
  },
44273
43148
  wasm_on_headers_complete: (p, statusCode, upgrade, shouldKeepAlive) => {
44274
- assert8.strictEqual(currentParser.ptr, p);
43149
+ assert11.strictEqual(currentParser.ptr, p);
44275
43150
  return currentParser.onHeadersComplete(statusCode, Boolean(upgrade), Boolean(shouldKeepAlive)) || 0;
44276
43151
  },
44277
43152
  wasm_on_body: (p, at, len) => {
44278
- assert8.strictEqual(currentParser.ptr, p);
43153
+ assert11.strictEqual(currentParser.ptr, p);
44279
43154
  const start = at - currentBufferPtr + currentBufferRef.byteOffset;
44280
43155
  return currentParser.onBody(new FastBuffer(currentBufferRef.buffer, start, len)) || 0;
44281
43156
  },
44282
43157
  wasm_on_message_complete: (p) => {
44283
- assert8.strictEqual(currentParser.ptr, p);
43158
+ assert11.strictEqual(currentParser.ptr, p);
44284
43159
  return currentParser.onMessageComplete() || 0;
44285
43160
  }
44286
43161
  /* eslint-enable camelcase */
@@ -44299,7 +43174,7 @@ var require_client = __commonJS({
44299
43174
  var TIMEOUT_IDLE = 3;
44300
43175
  var Parser4 = class {
44301
43176
  constructor(client, socket, { exports: exports2 }) {
44302
- assert8(Number.isFinite(client[kMaxHeadersSize]) && client[kMaxHeadersSize] > 0);
43177
+ assert11(Number.isFinite(client[kMaxHeadersSize]) && client[kMaxHeadersSize] > 0);
44303
43178
  this.llhttp = exports2;
44304
43179
  this.ptr = this.llhttp.llhttp_alloc(constants4.TYPE.RESPONSE);
44305
43180
  this.client = client;
@@ -44345,10 +43220,10 @@ var require_client = __commonJS({
44345
43220
  if (this.socket.destroyed || !this.paused) {
44346
43221
  return;
44347
43222
  }
44348
- assert8(this.ptr != null);
44349
- assert8(currentParser == null);
43223
+ assert11(this.ptr != null);
43224
+ assert11(currentParser == null);
44350
43225
  this.llhttp.llhttp_resume(this.ptr);
44351
- assert8(this.timeoutType === TIMEOUT_BODY);
43226
+ assert11(this.timeoutType === TIMEOUT_BODY);
44352
43227
  if (this.timeout) {
44353
43228
  if (this.timeout.refresh) {
44354
43229
  this.timeout.refresh();
@@ -44368,9 +43243,9 @@ var require_client = __commonJS({
44368
43243
  }
44369
43244
  }
44370
43245
  execute(data2) {
44371
- assert8(this.ptr != null);
44372
- assert8(currentParser == null);
44373
- assert8(!this.paused);
43246
+ assert11(this.ptr != null);
43247
+ assert11(currentParser == null);
43248
+ assert11(!this.paused);
44374
43249
  const { socket, llhttp } = this;
44375
43250
  if (data2.length > currentBufferSize) {
44376
43251
  if (currentBufferPtr) {
@@ -44412,8 +43287,8 @@ var require_client = __commonJS({
44412
43287
  }
44413
43288
  }
44414
43289
  destroy() {
44415
- assert8(this.ptr != null);
44416
- assert8(currentParser == null);
43290
+ assert11(this.ptr != null);
43291
+ assert11(currentParser == null);
44417
43292
  this.llhttp.llhttp_free(this.ptr);
44418
43293
  this.ptr = null;
44419
43294
  timers.clearTimeout(this.timeout);
@@ -44470,17 +43345,17 @@ var require_client = __commonJS({
44470
43345
  }
44471
43346
  onUpgrade(head) {
44472
43347
  const { upgrade, client, socket, headers, statusCode } = this;
44473
- assert8(upgrade);
43348
+ assert11(upgrade);
44474
43349
  const request = client[kQueue][client[kRunningIdx]];
44475
- assert8(request);
44476
- assert8(!socket.destroyed);
44477
- assert8(socket === client[kSocket]);
44478
- assert8(!this.paused);
44479
- assert8(request.upgrade || request.method === "CONNECT");
43350
+ assert11(request);
43351
+ assert11(!socket.destroyed);
43352
+ assert11(socket === client[kSocket]);
43353
+ assert11(!this.paused);
43354
+ assert11(request.upgrade || request.method === "CONNECT");
44480
43355
  this.statusCode = null;
44481
43356
  this.statusText = "";
44482
43357
  this.shouldKeepAlive = null;
44483
- assert8(this.headers.length % 2 === 0);
43358
+ assert11(this.headers.length % 2 === 0);
44484
43359
  this.headers = [];
44485
43360
  this.headersSize = 0;
44486
43361
  socket.unshift(head);
@@ -44508,8 +43383,8 @@ var require_client = __commonJS({
44508
43383
  if (!request) {
44509
43384
  return -1;
44510
43385
  }
44511
- assert8(!this.upgrade);
44512
- assert8(this.statusCode < 200);
43386
+ assert11(!this.upgrade);
43387
+ assert11(this.statusCode < 200);
44513
43388
  if (statusCode === 100) {
44514
43389
  util6.destroy(socket, new SocketError("bad response", util6.getSocketInfo(socket)));
44515
43390
  return -1;
@@ -44518,7 +43393,7 @@ var require_client = __commonJS({
44518
43393
  util6.destroy(socket, new SocketError("bad upgrade", util6.getSocketInfo(socket)));
44519
43394
  return -1;
44520
43395
  }
44521
- assert8.strictEqual(this.timeoutType, TIMEOUT_HEADERS);
43396
+ assert11.strictEqual(this.timeoutType, TIMEOUT_HEADERS);
44522
43397
  this.statusCode = statusCode;
44523
43398
  this.shouldKeepAlive = shouldKeepAlive || // Override llhttp value which does not allow keepAlive for HEAD.
44524
43399
  request.method === "HEAD" && !socket[kReset] && this.connection.toLowerCase() === "keep-alive";
@@ -44531,16 +43406,16 @@ var require_client = __commonJS({
44531
43406
  }
44532
43407
  }
44533
43408
  if (request.method === "CONNECT") {
44534
- assert8(client[kRunning] === 1);
43409
+ assert11(client[kRunning] === 1);
44535
43410
  this.upgrade = true;
44536
43411
  return 2;
44537
43412
  }
44538
43413
  if (upgrade) {
44539
- assert8(client[kRunning] === 1);
43414
+ assert11(client[kRunning] === 1);
44540
43415
  this.upgrade = true;
44541
43416
  return 2;
44542
43417
  }
44543
- assert8(this.headers.length % 2 === 0);
43418
+ assert11(this.headers.length % 2 === 0);
44544
43419
  this.headers = [];
44545
43420
  this.headersSize = 0;
44546
43421
  if (this.shouldKeepAlive && client[kPipelining]) {
@@ -44583,14 +43458,14 @@ var require_client = __commonJS({
44583
43458
  return -1;
44584
43459
  }
44585
43460
  const request = client[kQueue][client[kRunningIdx]];
44586
- assert8(request);
44587
- assert8.strictEqual(this.timeoutType, TIMEOUT_BODY);
43461
+ assert11(request);
43462
+ assert11.strictEqual(this.timeoutType, TIMEOUT_BODY);
44588
43463
  if (this.timeout) {
44589
43464
  if (this.timeout.refresh) {
44590
43465
  this.timeout.refresh();
44591
43466
  }
44592
43467
  }
44593
- assert8(statusCode >= 200);
43468
+ assert11(statusCode >= 200);
44594
43469
  if (maxResponseSize > -1 && this.bytesRead + buf.length > maxResponseSize) {
44595
43470
  util6.destroy(socket, new ResponseExceededMaxSizeError());
44596
43471
  return -1;
@@ -44609,15 +43484,15 @@ var require_client = __commonJS({
44609
43484
  return;
44610
43485
  }
44611
43486
  const request = client[kQueue][client[kRunningIdx]];
44612
- assert8(request);
44613
- assert8(statusCode >= 100);
43487
+ assert11(request);
43488
+ assert11(statusCode >= 100);
44614
43489
  this.statusCode = null;
44615
43490
  this.statusText = "";
44616
43491
  this.bytesRead = 0;
44617
43492
  this.contentLength = "";
44618
43493
  this.keepAlive = "";
44619
43494
  this.connection = "";
44620
- assert8(this.headers.length % 2 === 0);
43495
+ assert11(this.headers.length % 2 === 0);
44621
43496
  this.headers = [];
44622
43497
  this.headersSize = 0;
44623
43498
  if (statusCode < 200) {
@@ -44630,7 +43505,7 @@ var require_client = __commonJS({
44630
43505
  request.onComplete(headers);
44631
43506
  client[kQueue][client[kRunningIdx]++] = null;
44632
43507
  if (socket[kWriting]) {
44633
- assert8.strictEqual(client[kRunning], 0);
43508
+ assert11.strictEqual(client[kRunning], 0);
44634
43509
  util6.destroy(socket, new InformationalError("reset"));
44635
43510
  return constants4.ERROR.PAUSED;
44636
43511
  } else if (!shouldKeepAlive) {
@@ -44650,7 +43525,7 @@ var require_client = __commonJS({
44650
43525
  const { socket, timeoutType, client } = parser;
44651
43526
  if (timeoutType === TIMEOUT_HEADERS) {
44652
43527
  if (!socket[kWriting] || socket.writableNeedDrain || client[kRunning] > 1) {
44653
- assert8(!parser.paused, "cannot be paused while waiting for headers");
43528
+ assert11(!parser.paused, "cannot be paused while waiting for headers");
44654
43529
  util6.destroy(socket, new HeadersTimeoutError());
44655
43530
  }
44656
43531
  } else if (timeoutType === TIMEOUT_BODY) {
@@ -44658,7 +43533,7 @@ var require_client = __commonJS({
44658
43533
  util6.destroy(socket, new BodyTimeoutError());
44659
43534
  }
44660
43535
  } else if (timeoutType === TIMEOUT_IDLE) {
44661
- assert8(client[kRunning] === 0 && client[kKeepAliveTimeoutValue]);
43536
+ assert11(client[kRunning] === 0 && client[kKeepAliveTimeoutValue]);
44662
43537
  util6.destroy(socket, new InformationalError("socket idle timeout"));
44663
43538
  }
44664
43539
  }
@@ -44670,7 +43545,7 @@ var require_client = __commonJS({
44670
43545
  }
44671
43546
  function onSocketError(err) {
44672
43547
  const { [kClient]: client, [kParser]: parser } = this;
44673
- assert8(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
43548
+ assert11(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
44674
43549
  if (client[kHTTPConnVersion] !== "h2") {
44675
43550
  if (err.code === "ECONNRESET" && parser.statusCode && !parser.shouldKeepAlive) {
44676
43551
  parser.onMessageComplete();
@@ -44682,13 +43557,13 @@ var require_client = __commonJS({
44682
43557
  }
44683
43558
  function onError(client, err) {
44684
43559
  if (client[kRunning] === 0 && err.code !== "UND_ERR_INFO" && err.code !== "UND_ERR_SOCKET") {
44685
- assert8(client[kPendingIdx] === client[kRunningIdx]);
43560
+ assert11(client[kPendingIdx] === client[kRunningIdx]);
44686
43561
  const requests = client[kQueue].splice(client[kRunningIdx]);
44687
43562
  for (let i2 = 0; i2 < requests.length; i2++) {
44688
43563
  const request = requests[i2];
44689
43564
  errorRequest(client, request, err);
44690
43565
  }
44691
- assert8(client[kSize] === 0);
43566
+ assert11(client[kSize] === 0);
44692
43567
  }
44693
43568
  }
44694
43569
  function onSocketEnd() {
@@ -44713,7 +43588,7 @@ var require_client = __commonJS({
44713
43588
  const err = this[kError] || new SocketError("closed", util6.getSocketInfo(this));
44714
43589
  client[kSocket] = null;
44715
43590
  if (client.destroyed) {
44716
- assert8(client[kPending] === 0);
43591
+ assert11(client[kPending] === 0);
44717
43592
  const requests = client[kQueue].splice(client[kRunningIdx]);
44718
43593
  for (let i2 = 0; i2 < requests.length; i2++) {
44719
43594
  const request = requests[i2];
@@ -44725,19 +43600,19 @@ var require_client = __commonJS({
44725
43600
  errorRequest(client, request, err);
44726
43601
  }
44727
43602
  client[kPendingIdx] = client[kRunningIdx];
44728
- assert8(client[kRunning] === 0);
43603
+ assert11(client[kRunning] === 0);
44729
43604
  client.emit("disconnect", client[kUrl], [client], err);
44730
43605
  resume(client);
44731
43606
  }
44732
43607
  async function connect(client) {
44733
- assert8(!client[kConnecting]);
44734
- assert8(!client[kSocket]);
43608
+ assert11(!client[kConnecting]);
43609
+ assert11(!client[kSocket]);
44735
43610
  let { host, hostname, protocol, port } = client[kUrl];
44736
43611
  if (hostname[0] === "[") {
44737
43612
  const idx = hostname.indexOf("]");
44738
- assert8(idx !== -1);
43613
+ assert11(idx !== -1);
44739
43614
  const ip = hostname.substring(1, idx);
44740
- assert8(net.isIP(ip));
43615
+ assert11(net.isIP(ip));
44741
43616
  hostname = ip;
44742
43617
  }
44743
43618
  client[kConnecting] = true;
@@ -44777,7 +43652,7 @@ var require_client = __commonJS({
44777
43652
  return;
44778
43653
  }
44779
43654
  client[kConnecting] = false;
44780
- assert8(socket);
43655
+ assert11(socket);
44781
43656
  const isH2 = socket.alpnProtocol === "h2";
44782
43657
  if (isH2) {
44783
43658
  if (!h2ExperimentalWarned) {
@@ -44853,7 +43728,7 @@ var require_client = __commonJS({
44853
43728
  });
44854
43729
  }
44855
43730
  if (err.code === "ERR_TLS_CERT_ALTNAME_INVALID") {
44856
- assert8(client[kRunning] === 0);
43731
+ assert11(client[kRunning] === 0);
44857
43732
  while (client[kPending] > 0 && client[kQueue][client[kPendingIdx]].servername === client[kServerName]) {
44858
43733
  const request = client[kQueue][client[kPendingIdx]++];
44859
43734
  errorRequest(client, request, err);
@@ -44885,7 +43760,7 @@ var require_client = __commonJS({
44885
43760
  function _resume(client, sync) {
44886
43761
  while (true) {
44887
43762
  if (client.destroyed) {
44888
- assert8(client[kPending] === 0);
43763
+ assert11(client[kPending] === 0);
44889
43764
  return;
44890
43765
  }
44891
43766
  if (client[kClosedResolve] && !client[kSize]) {
@@ -45057,13 +43932,13 @@ upgrade: ${upgrade}\r
45057
43932
  \r
45058
43933
  `, "latin1");
45059
43934
  } else {
45060
- assert8(contentLength === null, "no body must not have content length");
43935
+ assert11(contentLength === null, "no body must not have content length");
45061
43936
  socket.write(`${header}\r
45062
43937
  `, "latin1");
45063
43938
  }
45064
43939
  request.onRequestSent();
45065
43940
  } else if (util6.isBuffer(body)) {
45066
- assert8(contentLength === body.byteLength, "buffer body must have content length");
43941
+ assert11(contentLength === body.byteLength, "buffer body must have content length");
45067
43942
  socket.cork();
45068
43943
  socket.write(`${header}content-length: ${contentLength}\r
45069
43944
  \r
@@ -45086,7 +43961,7 @@ upgrade: ${upgrade}\r
45086
43961
  } else if (util6.isIterable(body)) {
45087
43962
  writeIterable({ body, client, request, socket, contentLength, header, expectsPayload });
45088
43963
  } else {
45089
- assert8(false);
43964
+ assert11(false);
45090
43965
  }
45091
43966
  return true;
45092
43967
  }
@@ -45155,7 +44030,7 @@ upgrade: ${upgrade}\r
45155
44030
  process.emitWarning(new RequestContentLengthMismatchError());
45156
44031
  }
45157
44032
  if (contentLength != null) {
45158
- assert8(body, "no body must not have content length");
44033
+ assert11(body, "no body must not have content length");
45159
44034
  headers[HTTP2_HEADER_CONTENT_LENGTH] = `${contentLength}`;
45160
44035
  }
45161
44036
  session.ref();
@@ -45211,7 +44086,7 @@ upgrade: ${upgrade}\r
45211
44086
  if (!body) {
45212
44087
  request.onRequestSent();
45213
44088
  } else if (util6.isBuffer(body)) {
45214
- assert8(contentLength === body.byteLength, "buffer body must have content length");
44089
+ assert11(contentLength === body.byteLength, "buffer body must have content length");
45215
44090
  stream4.cork();
45216
44091
  stream4.write(body);
45217
44092
  stream4.uncork();
@@ -45265,12 +44140,12 @@ upgrade: ${upgrade}\r
45265
44140
  socket: client[kSocket]
45266
44141
  });
45267
44142
  } else {
45268
- assert8(false);
44143
+ assert11(false);
45269
44144
  }
45270
44145
  }
45271
44146
  }
45272
44147
  function writeStream({ h2stream, body, client, request, socket, contentLength, header, expectsPayload }) {
45273
- assert8(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
44148
+ assert11(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
45274
44149
  if (client[kHTTPConnVersion] === "h2") {
45275
44150
  let onPipeData = function(chunk2) {
45276
44151
  request.onBodySent(chunk2);
@@ -45328,7 +44203,7 @@ upgrade: ${upgrade}\r
45328
44203
  return;
45329
44204
  }
45330
44205
  finished = true;
45331
- assert8(socket.destroyed || socket[kWriting] && client[kRunning] <= 1);
44206
+ assert11(socket.destroyed || socket[kWriting] && client[kRunning] <= 1);
45332
44207
  socket.off("drain", onDrain).off("error", onFinished);
45333
44208
  body.removeListener("data", onData).removeListener("end", onFinished).removeListener("error", onFinished).removeListener("close", onAbort);
45334
44209
  if (!err) {
@@ -45352,7 +44227,7 @@ upgrade: ${upgrade}\r
45352
44227
  socket.on("drain", onDrain).on("error", onFinished);
45353
44228
  }
45354
44229
  async function writeBlob({ h2stream, body, client, request, socket, contentLength, header, expectsPayload }) {
45355
- assert8(contentLength === body.size, "blob body must have content length");
44230
+ assert11(contentLength === body.size, "blob body must have content length");
45356
44231
  const isH2 = client[kHTTPConnVersion] === "h2";
45357
44232
  try {
45358
44233
  if (contentLength != null && contentLength !== body.size) {
@@ -45382,7 +44257,7 @@ upgrade: ${upgrade}\r
45382
44257
  }
45383
44258
  }
45384
44259
  async function writeIterable({ h2stream, body, client, request, socket, contentLength, header, expectsPayload }) {
45385
- assert8(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
44260
+ assert11(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
45386
44261
  let callback = null;
45387
44262
  function onDrain() {
45388
44263
  if (callback) {
@@ -45392,7 +44267,7 @@ upgrade: ${upgrade}\r
45392
44267
  }
45393
44268
  }
45394
44269
  const waitForDrain = () => new Promise((resolve20, reject) => {
45395
- assert8(callback === null);
44270
+ assert11(callback === null);
45396
44271
  if (socket[kError]) {
45397
44272
  reject(socket[kError]);
45398
44273
  } else {
@@ -45540,7 +44415,7 @@ ${len.toString(16)}\r
45540
44415
  const { socket, client } = this;
45541
44416
  socket[kWriting] = false;
45542
44417
  if (err) {
45543
- assert8(client[kRunning] <= 1, "pipeline should only contain this request");
44418
+ assert11(client[kRunning] <= 1, "pipeline should only contain this request");
45544
44419
  util6.destroy(socket, err);
45545
44420
  }
45546
44421
  }
@@ -45548,7 +44423,7 @@ ${len.toString(16)}\r
45548
44423
  function errorRequest(client, request, err) {
45549
44424
  try {
45550
44425
  request.onError(err);
45551
- assert8(request.aborted);
44426
+ assert11(request.aborted);
45552
44427
  } catch (err2) {
45553
44428
  client.emit("error", err2);
45554
44429
  }
@@ -46182,7 +45057,7 @@ var require_agent = __commonJS({
46182
45057
  var require_readable2 = __commonJS({
46183
45058
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/api/readable.js"(exports, module) {
46184
45059
  "use strict";
46185
- var assert8 = __require("assert");
45060
+ var assert11 = __require("assert");
46186
45061
  var { Readable: Readable2 } = __require("stream");
46187
45062
  var { RequestAbortedError, NotSupportedError, InvalidArgumentError: InvalidArgumentError2 } = require_errors3();
46188
45063
  var util6 = require_util2();
@@ -46291,7 +45166,7 @@ var require_readable2 = __commonJS({
46291
45166
  this[kBody] = ReadableStreamFrom(this);
46292
45167
  if (this[kConsume]) {
46293
45168
  this[kBody].getReader();
46294
- assert8(this[kBody].locked);
45169
+ assert11(this[kBody].locked);
46295
45170
  }
46296
45171
  }
46297
45172
  return this[kBody];
@@ -46342,7 +45217,7 @@ var require_readable2 = __commonJS({
46342
45217
  if (isUnusable(stream4)) {
46343
45218
  throw new TypeError("unusable");
46344
45219
  }
46345
- assert8(!stream4[kConsume]);
45220
+ assert11(!stream4[kConsume]);
46346
45221
  return new Promise((resolve20, reject) => {
46347
45222
  stream4[kConsume] = {
46348
45223
  type,
@@ -46433,13 +45308,13 @@ var require_readable2 = __commonJS({
46433
45308
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/api/util.js
46434
45309
  var require_util4 = __commonJS({
46435
45310
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/api/util.js"(exports, module) {
46436
- var assert8 = __require("assert");
45311
+ var assert11 = __require("assert");
46437
45312
  var {
46438
45313
  ResponseStatusCodeError
46439
45314
  } = require_errors3();
46440
45315
  var { toUSVString } = require_util2();
46441
45316
  async function getResolveErrorBodyCallback({ callback, body, contentType, statusCode, statusMessage, headers }) {
46442
- assert8(body);
45317
+ assert11(body);
46443
45318
  let chunks = [];
46444
45319
  let limit = 0;
46445
45320
  for await (const chunk2 of body) {
@@ -46867,7 +45742,7 @@ var require_api_pipeline = __commonJS({
46867
45742
  var util6 = require_util2();
46868
45743
  var { AsyncResource } = __require("async_hooks");
46869
45744
  var { addSignal, removeSignal } = require_abort_signal();
46870
- var assert8 = __require("assert");
45745
+ var assert11 = __require("assert");
46871
45746
  var kResume = Symbol("resume");
46872
45747
  var PipelineRequest = class extends Readable2 {
46873
45748
  constructor() {
@@ -46967,7 +45842,7 @@ var require_api_pipeline = __commonJS({
46967
45842
  }
46968
45843
  onConnect(abort, context) {
46969
45844
  const { ret, res } = this;
46970
- assert8(!res, "pipeline cannot be retried");
45845
+ assert11(!res, "pipeline cannot be retried");
46971
45846
  if (ret.destroyed) {
46972
45847
  throw new RequestAbortedError();
46973
45848
  }
@@ -47056,7 +45931,7 @@ var require_api_upgrade = __commonJS({
47056
45931
  var { AsyncResource } = __require("async_hooks");
47057
45932
  var util6 = require_util2();
47058
45933
  var { addSignal, removeSignal } = require_abort_signal();
47059
- var assert8 = __require("assert");
45934
+ var assert11 = __require("assert");
47060
45935
  var UpgradeHandler = class extends AsyncResource {
47061
45936
  constructor(opts, callback) {
47062
45937
  if (!opts || typeof opts !== "object") {
@@ -47089,7 +45964,7 @@ var require_api_upgrade = __commonJS({
47089
45964
  }
47090
45965
  onUpgrade(statusCode, rawHeaders, socket) {
47091
45966
  const { callback, opaque, context } = this;
47092
- assert8.strictEqual(statusCode, 101);
45967
+ assert11.strictEqual(statusCode, 101);
47093
45968
  removeSignal(this);
47094
45969
  this.callback = null;
47095
45970
  const headers = this.responseHeaders === "raw" ? util6.parseRawHeaders(rawHeaders) : util6.parseHeaders(rawHeaders);
@@ -48196,7 +47071,7 @@ var require_proxy_agent = __commonJS({
48196
47071
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/handler/RetryHandler.js
48197
47072
  var require_RetryHandler = __commonJS({
48198
47073
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/handler/RetryHandler.js"(exports, module) {
48199
- var assert8 = __require("assert");
47074
+ var assert11 = __require("assert");
48200
47075
  var { kRetryHandlerDefaultRetry } = require_symbols();
48201
47076
  var { RequestRetryError } = require_errors3();
48202
47077
  var { isDisturbed, parseHeaders, parseRangeHeader } = require_util2();
@@ -48361,8 +47236,8 @@ var require_RetryHandler = __commonJS({
48361
47236
  return false;
48362
47237
  }
48363
47238
  const { start, size, end: end2 = size } = contentRange;
48364
- assert8(this.start === start, "content-range mismatch");
48365
- assert8(this.end == null || this.end === end2, "content-range mismatch");
47239
+ assert11(this.start === start, "content-range mismatch");
47240
+ assert11(this.end == null || this.end === end2, "content-range mismatch");
48366
47241
  this.resume = resume;
48367
47242
  return true;
48368
47243
  }
@@ -48378,12 +47253,12 @@ var require_RetryHandler = __commonJS({
48378
47253
  );
48379
47254
  }
48380
47255
  const { start, size, end: end2 = size } = range;
48381
- assert8(
47256
+ assert11(
48382
47257
  start != null && Number.isFinite(start) && this.start !== start,
48383
47258
  "content-range mismatch"
48384
47259
  );
48385
- assert8(Number.isFinite(start));
48386
- assert8(
47260
+ assert11(Number.isFinite(start));
47261
+ assert11(
48387
47262
  end2 != null && Number.isFinite(end2) && this.end !== end2,
48388
47263
  "invalid content-length"
48389
47264
  );
@@ -48394,8 +47269,8 @@ var require_RetryHandler = __commonJS({
48394
47269
  const contentLength = headers["content-length"];
48395
47270
  this.end = contentLength != null ? Number(contentLength) : null;
48396
47271
  }
48397
- assert8(Number.isFinite(this.start));
48398
- assert8(
47272
+ assert11(Number.isFinite(this.start));
47273
+ assert11(
48399
47274
  this.end == null || Number.isFinite(this.end),
48400
47275
  "invalid content-length"
48401
47276
  );
@@ -48537,7 +47412,7 @@ var require_headers = __commonJS({
48537
47412
  isValidHeaderValue
48538
47413
  } = require_util3();
48539
47414
  var { webidl } = require_webidl();
48540
- var assert8 = __require("assert");
47415
+ var assert11 = __require("assert");
48541
47416
  var kHeadersMap = Symbol("headers map");
48542
47417
  var kHeadersSortedMap = Symbol("headers map sorted");
48543
47418
  function isHTTPWhiteSpaceCharCode(code2) {
@@ -48795,7 +47670,7 @@ var require_headers = __commonJS({
48795
47670
  headers.push([name2, cookies[j]]);
48796
47671
  }
48797
47672
  } else {
48798
- assert8(value !== null);
47673
+ assert11(value !== null);
48799
47674
  headers.push([name2, value]);
48800
47675
  }
48801
47676
  }
@@ -48931,14 +47806,14 @@ var require_response = __commonJS({
48931
47806
  redirectStatusSet,
48932
47807
  nullBodyStatus,
48933
47808
  DOMException: DOMException2
48934
- } = require_constants3();
47809
+ } = require_constants2();
48935
47810
  var { kState, kHeaders, kGuard, kRealm } = require_symbols2();
48936
47811
  var { webidl } = require_webidl();
48937
47812
  var { FormData: FormData4 } = require_formdata();
48938
47813
  var { getGlobalOrigin } = require_global();
48939
47814
  var { URLSerializer } = require_dataURL();
48940
47815
  var { kHeadersList, kConstruct } = require_symbols();
48941
- var assert8 = __require("assert");
47816
+ var assert11 = __require("assert");
48942
47817
  var { types } = __require("util");
48943
47818
  var ReadableStream2 = globalThis.ReadableStream || __require("stream/web").ReadableStream;
48944
47819
  var textEncoder2 = new TextEncoder("utf-8");
@@ -49154,7 +48029,7 @@ var require_response = __commonJS({
49154
48029
  return p in state ? state[p] : target[p];
49155
48030
  },
49156
48031
  set(target, p, value) {
49157
- assert8(!(p in state));
48032
+ assert11(!(p in state));
49158
48033
  target[p] = value;
49159
48034
  return true;
49160
48035
  }
@@ -49188,11 +48063,11 @@ var require_response = __commonJS({
49188
48063
  body: null
49189
48064
  });
49190
48065
  } else {
49191
- assert8(false);
48066
+ assert11(false);
49192
48067
  }
49193
48068
  }
49194
48069
  function makeAppropriateNetworkError(fetchParams, err = null) {
49195
- assert8(isCancelled(fetchParams));
48070
+ assert11(isCancelled(fetchParams));
49196
48071
  return isAborted(fetchParams) ? makeNetworkError(Object.assign(new DOMException2("The operation was aborted.", "AbortError"), { cause: err })) : makeNetworkError(Object.assign(new DOMException2("Request was cancelled."), { cause: err }));
49197
48072
  }
49198
48073
  function initializeResponse(response, init, body) {
@@ -49313,14 +48188,14 @@ var require_request2 = __commonJS({
49313
48188
  requestCredentials,
49314
48189
  requestCache,
49315
48190
  requestDuplex
49316
- } = require_constants3();
48191
+ } = require_constants2();
49317
48192
  var { kEnumerableProperty } = util6;
49318
48193
  var { kHeaders, kSignal, kState, kGuard, kRealm } = require_symbols2();
49319
48194
  var { webidl } = require_webidl();
49320
48195
  var { getGlobalOrigin } = require_global();
49321
48196
  var { URLSerializer } = require_dataURL();
49322
48197
  var { kHeadersList, kConstruct } = require_symbols();
49323
- var assert8 = __require("assert");
48198
+ var assert11 = __require("assert");
49324
48199
  var { getMaxListeners, setMaxListeners, getEventListeners, defaultMaxListeners } = __require("events");
49325
48200
  var TransformStream = globalThis.TransformStream;
49326
48201
  var kAbortController = Symbol("abortController");
@@ -49364,7 +48239,7 @@ var require_request2 = __commonJS({
49364
48239
  request = makeRequest({ urlList: [parsedURL] });
49365
48240
  fallbackMode = "cors";
49366
48241
  } else {
49367
- assert8(input instanceof _Request);
48242
+ assert11(input instanceof _Request);
49368
48243
  request = input[kState];
49369
48244
  signal = input[kSignal];
49370
48245
  }
@@ -49973,7 +48848,7 @@ var require_fetch = __commonJS({
49973
48848
  urlHasHttpsScheme
49974
48849
  } = require_util3();
49975
48850
  var { kState, kHeaders, kGuard, kRealm } = require_symbols2();
49976
- var assert8 = __require("assert");
48851
+ var assert11 = __require("assert");
49977
48852
  var { safelyExtractBody } = require_body();
49978
48853
  var {
49979
48854
  redirectStatusSet,
@@ -49982,7 +48857,7 @@ var require_fetch = __commonJS({
49982
48857
  requestBodyHeader,
49983
48858
  subresourceSet,
49984
48859
  DOMException: DOMException2
49985
- } = require_constants3();
48860
+ } = require_constants2();
49986
48861
  var { kHeadersList } = require_symbols();
49987
48862
  var EE3 = __require("events");
49988
48863
  var { Readable: Readable2, pipeline: pipeline2 } = __require("stream");
@@ -50053,7 +48928,7 @@ var require_fetch = __commonJS({
50053
48928
  requestObject.signal,
50054
48929
  () => {
50055
48930
  locallyAborted = true;
50056
- assert8(controller != null);
48931
+ assert11(controller != null);
50057
48932
  controller.abort(requestObject.signal.reason);
50058
48933
  abortFetch(p, request, responseObject, requestObject.signal.reason);
50059
48934
  }
@@ -50186,7 +49061,7 @@ var require_fetch = __commonJS({
50186
49061
  taskDestination,
50187
49062
  crossOriginIsolatedCapability
50188
49063
  };
50189
- assert8(!request.body || request.body.stream);
49064
+ assert11(!request.body || request.body.stream);
50190
49065
  if (request.window === "client") {
50191
49066
  request.window = request.client?.globalObject?.constructor?.name === "Window" ? request.client : "no-window";
50192
49067
  }
@@ -50279,7 +49154,7 @@ var require_fetch = __commonJS({
50279
49154
  } else if (request.responseTainting === "opaque") {
50280
49155
  response = filterResponse(response, "opaque");
50281
49156
  } else {
50282
- assert8(false);
49157
+ assert11(false);
50283
49158
  }
50284
49159
  }
50285
49160
  let internalResponse = response.status === 0 ? response : response.internalResponse;
@@ -50471,7 +49346,7 @@ var require_fetch = __commonJS({
50471
49346
  } else if (request.redirect === "follow") {
50472
49347
  response = await httpRedirectFetch(fetchParams, response);
50473
49348
  } else {
50474
- assert8(false);
49349
+ assert11(false);
50475
49350
  }
50476
49351
  }
50477
49352
  response.timingInfo = timingInfo;
@@ -50524,7 +49399,7 @@ var require_fetch = __commonJS({
50524
49399
  request.headersList.delete("host");
50525
49400
  }
50526
49401
  if (request.body != null) {
50527
- assert8(request.body.source != null);
49402
+ assert11(request.body.source != null);
50528
49403
  request.body = safelyExtractBody(request.body.source)[0];
50529
49404
  }
50530
49405
  const timingInfo = fetchParams.timingInfo;
@@ -50657,7 +49532,7 @@ var require_fetch = __commonJS({
50657
49532
  return response;
50658
49533
  }
50659
49534
  async function httpNetworkFetch(fetchParams, includeCredentials = false, forceNewConnection = false) {
50660
- assert8(!fetchParams.controller.connection || fetchParams.controller.connection.destroyed);
49535
+ assert11(!fetchParams.controller.connection || fetchParams.controller.connection.destroyed);
50661
49536
  fetchParams.controller.connection = {
50662
49537
  abort: null,
50663
49538
  destroyed: false,
@@ -51346,7 +50221,7 @@ var require_util5 = __commonJS({
51346
50221
  } = require_symbols3();
51347
50222
  var { ProgressEvent } = require_progressevent();
51348
50223
  var { getEncoding } = require_encoding();
51349
- var { DOMException: DOMException2 } = require_constants3();
50224
+ var { DOMException: DOMException2 } = require_constants2();
51350
50225
  var { serializeAMimeType, parseMIMEType } = require_dataURL();
51351
50226
  var { types } = __require("util");
51352
50227
  var { StringDecoder: StringDecoder2 } = __require("string_decoder");
@@ -51792,7 +50667,7 @@ var require_symbols4 = __commonJS({
51792
50667
  var require_util6 = __commonJS({
51793
50668
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/cache/util.js"(exports, module) {
51794
50669
  "use strict";
51795
- var assert8 = __require("assert");
50670
+ var assert11 = __require("assert");
51796
50671
  var { URLSerializer } = require_dataURL();
51797
50672
  var { isValidHeaderName: isValidHeaderName2 } = require_util3();
51798
50673
  function urlEquals(A, B2, excludeFragment = false) {
@@ -51801,7 +50676,7 @@ var require_util6 = __commonJS({
51801
50676
  return serializedA === serializedB;
51802
50677
  }
51803
50678
  function fieldValues(header) {
51804
- assert8(header !== null);
50679
+ assert11(header !== null);
51805
50680
  const values = [];
51806
50681
  for (let value of header.split(",")) {
51807
50682
  value = value.trim();
@@ -51835,7 +50710,7 @@ var require_cache = __commonJS({
51835
50710
  var { kState, kHeaders, kGuard, kRealm } = require_symbols2();
51836
50711
  var { fetching } = require_fetch();
51837
50712
  var { urlIsHttpHttpsScheme, createDeferredPromise, readAllBytes } = require_util3();
51838
- var assert8 = __require("assert");
50713
+ var assert11 = __require("assert");
51839
50714
  var { getGlobalDispatcher } = require_global2();
51840
50715
  var Cache = class _Cache {
51841
50716
  /**
@@ -52096,7 +50971,7 @@ var require_cache = __commonJS({
52096
50971
  return false;
52097
50972
  }
52098
50973
  } else {
52099
- assert8(typeof request === "string");
50974
+ assert11(typeof request === "string");
52100
50975
  r = new Request2(request)[kState];
52101
50976
  }
52102
50977
  const operations = [];
@@ -52205,7 +51080,7 @@ var require_cache = __commonJS({
52205
51080
  }
52206
51081
  for (const requestResponse of requestResponses) {
52207
51082
  const idx = cache.indexOf(requestResponse);
52208
- assert8(idx !== -1);
51083
+ assert11(idx !== -1);
52209
51084
  cache.splice(idx, 1);
52210
51085
  }
52211
51086
  } else if (operation.type === "put") {
@@ -52237,7 +51112,7 @@ var require_cache = __commonJS({
52237
51112
  requestResponses = this.#queryCache(operation.request);
52238
51113
  for (const requestResponse of requestResponses) {
52239
51114
  const idx = cache.indexOf(requestResponse);
52240
- assert8(idx !== -1);
51115
+ assert11(idx !== -1);
52241
51116
  cache.splice(idx, 1);
52242
51117
  }
52243
51118
  cache.push([operation.request, operation.response]);
@@ -52460,7 +51335,7 @@ var require_cachestorage = __commonJS({
52460
51335
  });
52461
51336
 
52462
51337
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/cookies/constants.js
52463
- var require_constants5 = __commonJS({
51338
+ var require_constants4 = __commonJS({
52464
51339
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/cookies/constants.js"(exports, module) {
52465
51340
  "use strict";
52466
51341
  var maxAttributeValueSize = 1024;
@@ -52476,7 +51351,7 @@ var require_constants5 = __commonJS({
52476
51351
  var require_util7 = __commonJS({
52477
51352
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/cookies/util.js"(exports, module) {
52478
51353
  "use strict";
52479
- var assert8 = __require("assert");
51354
+ var assert11 = __require("assert");
52480
51355
  var { kHeadersList } = require_symbols();
52481
51356
  function isCTLExcludingHtab(value) {
52482
51357
  if (value.length === 0) {
@@ -52617,10 +51492,10 @@ var require_util7 = __commonJS({
52617
51492
  kHeadersListNode = Object.getOwnPropertySymbols(headers).find(
52618
51493
  (symbol) => symbol.description === "headers list"
52619
51494
  );
52620
- assert8(kHeadersListNode, "Headers cannot be parsed");
51495
+ assert11(kHeadersListNode, "Headers cannot be parsed");
52621
51496
  }
52622
51497
  const headersList = headers[kHeadersListNode];
52623
- assert8(headersList);
51498
+ assert11(headersList);
52624
51499
  return headersList;
52625
51500
  }
52626
51501
  module.exports = {
@@ -52635,10 +51510,10 @@ var require_util7 = __commonJS({
52635
51510
  var require_parse = __commonJS({
52636
51511
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/cookies/parse.js"(exports, module) {
52637
51512
  "use strict";
52638
- var { maxNameValuePairSize, maxAttributeValueSize } = require_constants5();
51513
+ var { maxNameValuePairSize, maxAttributeValueSize } = require_constants4();
52639
51514
  var { isCTLExcludingHtab } = require_util7();
52640
51515
  var { collectASequenceOfCodePointsFast } = require_dataURL();
52641
- var assert8 = __require("assert");
51516
+ var assert11 = __require("assert");
52642
51517
  function parseSetCookie(header) {
52643
51518
  if (isCTLExcludingHtab(header)) {
52644
51519
  return null;
@@ -52680,7 +51555,7 @@ var require_parse = __commonJS({
52680
51555
  if (unparsedAttributes.length === 0) {
52681
51556
  return cookieAttributeList;
52682
51557
  }
52683
- assert8(unparsedAttributes[0] === ";");
51558
+ assert11(unparsedAttributes[0] === ";");
52684
51559
  unparsedAttributes = unparsedAttributes.slice(1);
52685
51560
  let cookieAv = "";
52686
51561
  if (unparsedAttributes.includes(";")) {
@@ -52900,7 +51775,7 @@ var require_cookies = __commonJS({
52900
51775
  });
52901
51776
 
52902
51777
  // ../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/websocket/constants.js
52903
- var require_constants6 = __commonJS({
51778
+ var require_constants5 = __commonJS({
52904
51779
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/websocket/constants.js"(exports, module) {
52905
51780
  "use strict";
52906
51781
  var uid = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
@@ -53208,7 +52083,7 @@ var require_util8 = __commonJS({
53208
52083
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/websocket/util.js"(exports, module) {
53209
52084
  "use strict";
53210
52085
  var { kReadyState, kController, kResponse, kBinaryType, kWebSocketURL } = require_symbols5();
53211
- var { states, opcodes } = require_constants6();
52086
+ var { states, opcodes } = require_constants5();
53212
52087
  var { MessageEvent, ErrorEvent } = require_events();
53213
52088
  function isEstablished(ws) {
53214
52089
  return ws[kReadyState] === states.OPEN;
@@ -53298,7 +52173,7 @@ var require_connection = __commonJS({
53298
52173
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/websocket/connection.js"(exports, module) {
53299
52174
  "use strict";
53300
52175
  var diagnosticsChannel = __require("diagnostics_channel");
53301
- var { uid, states } = require_constants6();
52176
+ var { uid, states } = require_constants5();
53302
52177
  var {
53303
52178
  kReadyState,
53304
52179
  kSentClose,
@@ -53445,7 +52320,7 @@ var require_connection = __commonJS({
53445
52320
  var require_frame = __commonJS({
53446
52321
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/websocket/frame.js"(exports, module) {
53447
52322
  "use strict";
53448
- var { maxUnsigned16Bit } = require_constants6();
52323
+ var { maxUnsigned16Bit } = require_constants5();
53449
52324
  var crypto5;
53450
52325
  try {
53451
52326
  crypto5 = __require("crypto");
@@ -53504,7 +52379,7 @@ var require_receiver = __commonJS({
53504
52379
  "use strict";
53505
52380
  var { Writable } = __require("stream");
53506
52381
  var diagnosticsChannel = __require("diagnostics_channel");
53507
- var { parserStates, opcodes, states, emptyBuffer } = require_constants6();
52382
+ var { parserStates, opcodes, states, emptyBuffer } = require_constants5();
53508
52383
  var { kReadyState, kSentClose, kResponse, kReceivedClose } = require_symbols5();
53509
52384
  var { isValidStatusCode, failWebsocketConnection, websocketMessageReceived } = require_util8();
53510
52385
  var { WebsocketFrameSend } = require_frame();
@@ -53739,10 +52614,10 @@ var require_websocket = __commonJS({
53739
52614
  "../../node_modules/.pnpm/undici@5.28.5/node_modules/undici/lib/websocket/websocket.js"(exports, module) {
53740
52615
  "use strict";
53741
52616
  var { webidl } = require_webidl();
53742
- var { DOMException: DOMException2 } = require_constants3();
52617
+ var { DOMException: DOMException2 } = require_constants2();
53743
52618
  var { URLSerializer } = require_dataURL();
53744
52619
  var { getGlobalOrigin } = require_global();
53745
- var { staticPropertyDescriptors, states, opcodes, emptyBuffer } = require_constants6();
52620
+ var { staticPropertyDescriptors, states, opcodes, emptyBuffer } = require_constants5();
53746
52621
  var {
53747
52622
  kWebSocketURL,
53748
52623
  kReadyState,
@@ -57070,7 +55945,7 @@ var require_sync = __commonJS({
57070
55945
  var Glob = require_glob().Glob;
57071
55946
  var util6 = __require("util");
57072
55947
  var path9 = __require("path");
57073
- var assert8 = __require("assert");
55948
+ var assert11 = __require("assert");
57074
55949
  var isAbsolute2 = require_path_is_absolute();
57075
55950
  var common = require_common3();
57076
55951
  var setopts = common.setopts;
@@ -57100,7 +55975,7 @@ var require_sync = __commonJS({
57100
55975
  this._finish();
57101
55976
  }
57102
55977
  GlobSync.prototype._finish = function() {
57103
- assert8.ok(this instanceof GlobSync);
55978
+ assert11.ok(this instanceof GlobSync);
57104
55979
  if (this.realpath) {
57105
55980
  var self2 = this;
57106
55981
  this.matches.forEach(function(matchset, index2) {
@@ -57122,7 +55997,7 @@ var require_sync = __commonJS({
57122
55997
  common.finish(this);
57123
55998
  };
57124
55999
  GlobSync.prototype._process = function(pattern, index2, inGlobStar) {
57125
- assert8.ok(this instanceof GlobSync);
56000
+ assert11.ok(this instanceof GlobSync);
57126
56001
  var n = 0;
57127
56002
  while (typeof pattern[n] === "string") {
57128
56003
  n++;
@@ -57544,7 +56419,7 @@ var require_glob = __commonJS({
57544
56419
  var inherits2 = require_inherits();
57545
56420
  var EE3 = __require("events").EventEmitter;
57546
56421
  var path9 = __require("path");
57547
- var assert8 = __require("assert");
56422
+ var assert11 = __require("assert");
57548
56423
  var isAbsolute2 = require_path_is_absolute();
57549
56424
  var globSync = require_sync();
57550
56425
  var common = require_common3();
@@ -57647,7 +56522,7 @@ var require_glob = __commonJS({
57647
56522
  }
57648
56523
  }
57649
56524
  Glob.prototype._finish = function() {
57650
- assert8(this instanceof Glob);
56525
+ assert11(this instanceof Glob);
57651
56526
  if (this.aborted)
57652
56527
  return;
57653
56528
  if (this.realpath && !this._didRealpath)
@@ -57736,8 +56611,8 @@ var require_glob = __commonJS({
57736
56611
  }
57737
56612
  };
57738
56613
  Glob.prototype._process = function(pattern, index2, inGlobStar, cb) {
57739
- assert8(this instanceof Glob);
57740
- assert8(typeof cb === "function");
56614
+ assert11(this instanceof Glob);
56615
+ assert11(typeof cb === "function");
57741
56616
  if (this.aborted)
57742
56617
  return;
57743
56618
  this._processing++;
@@ -58093,7 +56968,7 @@ var require_glob = __commonJS({
58093
56968
  // ../../node_modules/.pnpm/rimraf@3.0.2/node_modules/rimraf/rimraf.js
58094
56969
  var require_rimraf = __commonJS({
58095
56970
  "../../node_modules/.pnpm/rimraf@3.0.2/node_modules/rimraf/rimraf.js"(exports, module) {
58096
- var assert8 = __require("assert");
56971
+ var assert11 = __require("assert");
58097
56972
  var path9 = __require("path");
58098
56973
  var fs12 = __require("fs");
58099
56974
  var glob = void 0;
@@ -58137,11 +57012,11 @@ var require_rimraf = __commonJS({
58137
57012
  cb = options;
58138
57013
  options = {};
58139
57014
  }
58140
- assert8(p, "rimraf: missing path");
58141
- assert8.equal(typeof p, "string", "rimraf: path should be a string");
58142
- assert8.equal(typeof cb, "function", "rimraf: callback function required");
58143
- assert8(options, "rimraf: invalid options argument provided");
58144
- assert8.equal(typeof options, "object", "rimraf: options should be object");
57015
+ assert11(p, "rimraf: missing path");
57016
+ assert11.equal(typeof p, "string", "rimraf: path should be a string");
57017
+ assert11.equal(typeof cb, "function", "rimraf: callback function required");
57018
+ assert11(options, "rimraf: invalid options argument provided");
57019
+ assert11.equal(typeof options, "object", "rimraf: options should be object");
58145
57020
  defaults2(options);
58146
57021
  let busyTries = 0;
58147
57022
  let errState = null;
@@ -58184,9 +57059,9 @@ var require_rimraf = __commonJS({
58184
57059
  });
58185
57060
  };
58186
57061
  var rimraf_ = (p, options, cb) => {
58187
- assert8(p);
58188
- assert8(options);
58189
- assert8(typeof cb === "function");
57062
+ assert11(p);
57063
+ assert11(options);
57064
+ assert11(typeof cb === "function");
58190
57065
  options.lstat(p, (er, st) => {
58191
57066
  if (er && er.code === "ENOENT")
58192
57067
  return cb(null);
@@ -58208,9 +57083,9 @@ var require_rimraf = __commonJS({
58208
57083
  });
58209
57084
  };
58210
57085
  var fixWinEPERM = (p, options, er, cb) => {
58211
- assert8(p);
58212
- assert8(options);
58213
- assert8(typeof cb === "function");
57086
+ assert11(p);
57087
+ assert11(options);
57088
+ assert11(typeof cb === "function");
58214
57089
  options.chmod(p, 438, (er2) => {
58215
57090
  if (er2)
58216
57091
  cb(er2.code === "ENOENT" ? null : er);
@@ -58226,8 +57101,8 @@ var require_rimraf = __commonJS({
58226
57101
  });
58227
57102
  };
58228
57103
  var fixWinEPERMSync = (p, options, er) => {
58229
- assert8(p);
58230
- assert8(options);
57104
+ assert11(p);
57105
+ assert11(options);
58231
57106
  try {
58232
57107
  options.chmodSync(p, 438);
58233
57108
  } catch (er2) {
@@ -58251,9 +57126,9 @@ var require_rimraf = __commonJS({
58251
57126
  options.unlinkSync(p);
58252
57127
  };
58253
57128
  var rmdir = (p, options, originalEr, cb) => {
58254
- assert8(p);
58255
- assert8(options);
58256
- assert8(typeof cb === "function");
57129
+ assert11(p);
57130
+ assert11(options);
57131
+ assert11(typeof cb === "function");
58257
57132
  options.rmdir(p, (er) => {
58258
57133
  if (er && (er.code === "ENOTEMPTY" || er.code === "EEXIST" || er.code === "EPERM"))
58259
57134
  rmkids(p, options, cb);
@@ -58264,9 +57139,9 @@ var require_rimraf = __commonJS({
58264
57139
  });
58265
57140
  };
58266
57141
  var rmkids = (p, options, cb) => {
58267
- assert8(p);
58268
- assert8(options);
58269
- assert8(typeof cb === "function");
57142
+ assert11(p);
57143
+ assert11(options);
57144
+ assert11(typeof cb === "function");
58270
57145
  options.readdir(p, (er, files) => {
58271
57146
  if (er)
58272
57147
  return cb(er);
@@ -58289,10 +57164,10 @@ var require_rimraf = __commonJS({
58289
57164
  var rimrafSync = (p, options) => {
58290
57165
  options = options || {};
58291
57166
  defaults2(options);
58292
- assert8(p, "rimraf: missing path");
58293
- assert8.equal(typeof p, "string", "rimraf: path should be a string");
58294
- assert8(options, "rimraf: missing options");
58295
- assert8.equal(typeof options, "object", "rimraf: options should be object");
57167
+ assert11(p, "rimraf: missing path");
57168
+ assert11.equal(typeof p, "string", "rimraf: path should be a string");
57169
+ assert11(options, "rimraf: missing options");
57170
+ assert11.equal(typeof options, "object", "rimraf: options should be object");
58296
57171
  let results;
58297
57172
  if (options.disableGlob || !glob.hasMagic(p)) {
58298
57173
  results = [p];
@@ -58334,8 +57209,8 @@ var require_rimraf = __commonJS({
58334
57209
  }
58335
57210
  };
58336
57211
  var rmdirSync = (p, options, originalEr) => {
58337
- assert8(p);
58338
- assert8(options);
57212
+ assert11(p);
57213
+ assert11(options);
58339
57214
  try {
58340
57215
  options.rmdirSync(p);
58341
57216
  } catch (er) {
@@ -58348,8 +57223,8 @@ var require_rimraf = __commonJS({
58348
57223
  }
58349
57224
  };
58350
57225
  var rmkidsSync = (p, options) => {
58351
- assert8(p);
58352
- assert8(options);
57226
+ assert11(p);
57227
+ assert11(options);
58353
57228
  options.readdirSync(p).forEach((f2) => rimrafSync(path9.join(p, f2), options));
58354
57229
  const retries = isWindows4 ? 100 : 1;
58355
57230
  let i2 = 0;
@@ -61679,7 +60554,7 @@ var require_expand = __commonJS({
61679
60554
  });
61680
60555
 
61681
60556
  // ../../node_modules/.pnpm/braces@3.0.2/node_modules/braces/lib/constants.js
61682
- var require_constants7 = __commonJS({
60557
+ var require_constants6 = __commonJS({
61683
60558
  "../../node_modules/.pnpm/braces@3.0.2/node_modules/braces/lib/constants.js"(exports, module) {
61684
60559
  "use strict";
61685
60560
  module.exports = {
@@ -61812,7 +60687,7 @@ var require_parse2 = __commonJS({
61812
60687
  /* ' */
61813
60688
  CHAR_NO_BREAK_SPACE,
61814
60689
  CHAR_ZERO_WIDTH_NOBREAK_SPACE
61815
- } = require_constants7();
60690
+ } = require_constants6();
61816
60691
  var parse15 = (input, options = {}) => {
61817
60692
  if (typeof input !== "string") {
61818
60693
  throw new TypeError("Expected a string");
@@ -62083,7 +60958,7 @@ var require_braces = __commonJS({
62083
60958
  });
62084
60959
 
62085
60960
  // ../../node_modules/.pnpm/picomatch@2.3.1/node_modules/picomatch/lib/constants.js
62086
- var require_constants8 = __commonJS({
60961
+ var require_constants7 = __commonJS({
62087
60962
  "../../node_modules/.pnpm/picomatch@2.3.1/node_modules/picomatch/lib/constants.js"(exports, module) {
62088
60963
  "use strict";
62089
60964
  var path9 = __require("path");
@@ -62290,7 +61165,7 @@ var require_utils5 = __commonJS({
62290
61165
  REGEX_REMOVE_BACKSLASH,
62291
61166
  REGEX_SPECIAL_CHARS,
62292
61167
  REGEX_SPECIAL_CHARS_GLOBAL
62293
- } = require_constants8();
61168
+ } = require_constants7();
62294
61169
  exports.isObject = (val2) => val2 !== null && typeof val2 === "object" && !Array.isArray(val2);
62295
61170
  exports.hasRegexChars = (str) => REGEX_SPECIAL_CHARS.test(str);
62296
61171
  exports.isRegexChar = (str) => str.length === 1 && exports.hasRegexChars(str);
@@ -62376,7 +61251,7 @@ var require_scan = __commonJS({
62376
61251
  /* ) */
62377
61252
  CHAR_RIGHT_SQUARE_BRACKET
62378
61253
  /* ] */
62379
- } = require_constants8();
61254
+ } = require_constants7();
62380
61255
  var isPathSeparator = (code2) => {
62381
61256
  return code2 === CHAR_FORWARD_SLASH || code2 === CHAR_BACKWARD_SLASH;
62382
61257
  };
@@ -62674,7 +61549,7 @@ var require_scan = __commonJS({
62674
61549
  var require_parse3 = __commonJS({
62675
61550
  "../../node_modules/.pnpm/picomatch@2.3.1/node_modules/picomatch/lib/parse.js"(exports, module) {
62676
61551
  "use strict";
62677
- var constants4 = require_constants8();
61552
+ var constants4 = require_constants7();
62678
61553
  var utils = require_utils5();
62679
61554
  var {
62680
61555
  MAX_LENGTH,
@@ -63451,7 +62326,7 @@ var require_picomatch = __commonJS({
63451
62326
  var scan = require_scan();
63452
62327
  var parse15 = require_parse3();
63453
62328
  var utils = require_utils5();
63454
- var constants4 = require_constants8();
62329
+ var constants4 = require_constants7();
63455
62330
  var isObject2 = (val2) => val2 && typeof val2 === "object" && !Array.isArray(val2);
63456
62331
  var picomatch4 = (glob, options, returnState = false) => {
63457
62332
  if (Array.isArray(glob)) {
@@ -63749,7 +62624,7 @@ var require_micromatch = __commonJS({
63749
62624
  });
63750
62625
 
63751
62626
  // ../../node_modules/.pnpm/semver@7.7.1/node_modules/semver/internal/constants.js
63752
- var require_constants9 = __commonJS({
62627
+ var require_constants8 = __commonJS({
63753
62628
  "../../node_modules/.pnpm/semver@7.7.1/node_modules/semver/internal/constants.js"(exports, module) {
63754
62629
  var SEMVER_SPEC_VERSION = "2.0.0";
63755
62630
  var MAX_LENGTH = 256;
@@ -63795,7 +62670,7 @@ var require_re = __commonJS({
63795
62670
  MAX_SAFE_COMPONENT_LENGTH,
63796
62671
  MAX_SAFE_BUILD_LENGTH,
63797
62672
  MAX_LENGTH
63798
- } = require_constants9();
62673
+ } = require_constants8();
63799
62674
  var debug = require_debug2();
63800
62675
  exports = module.exports = {};
63801
62676
  var re = exports.re = [];
@@ -63918,7 +62793,7 @@ var require_identifiers = __commonJS({
63918
62793
  var require_semver = __commonJS({
63919
62794
  "../../node_modules/.pnpm/semver@7.7.1/node_modules/semver/classes/semver.js"(exports, module) {
63920
62795
  var debug = require_debug2();
63921
- var { MAX_LENGTH, MAX_SAFE_INTEGER } = require_constants9();
62796
+ var { MAX_LENGTH, MAX_SAFE_INTEGER } = require_constants8();
63922
62797
  var { safeRe: re, safeSrc: src, t } = require_re();
63923
62798
  var parseOptions = require_parse_options();
63924
62799
  var { compareIdentifiers } = require_identifiers();
@@ -64724,7 +63599,7 @@ var require_range2 = __commonJS({
64724
63599
  tildeTrimReplace,
64725
63600
  caretTrimReplace
64726
63601
  } = require_re();
64727
- var { FLAG_INCLUDE_PRERELEASE, FLAG_LOOSE } = require_constants9();
63602
+ var { FLAG_INCLUDE_PRERELEASE, FLAG_LOOSE } = require_constants8();
64728
63603
  var isNullSet = (c) => c.value === "<0.0.0-0";
64729
63604
  var isAny = (c) => c.value === "";
64730
63605
  var isSatisfiable = (comparators, options) => {
@@ -65522,7 +64397,7 @@ var require_subset = __commonJS({
65522
64397
  var require_semver2 = __commonJS({
65523
64398
  "../../node_modules/.pnpm/semver@7.7.1/node_modules/semver/index.js"(exports, module) {
65524
64399
  var internalRe = require_re();
65525
- var constants4 = require_constants9();
64400
+ var constants4 = require_constants8();
65526
64401
  var SemVer = require_semver();
65527
64402
  var identifiers = require_identifiers();
65528
64403
  var parse15 = require_parse4();
@@ -65613,7 +64488,7 @@ var require_semver2 = __commonJS({
65613
64488
  });
65614
64489
 
65615
64490
  // ../../node_modules/.pnpm/picomatch@4.0.3/node_modules/picomatch/lib/constants.js
65616
- var require_constants10 = __commonJS({
64491
+ var require_constants9 = __commonJS({
65617
64492
  "../../node_modules/.pnpm/picomatch@4.0.3/node_modules/picomatch/lib/constants.js"(exports, module) {
65618
64493
  "use strict";
65619
64494
  var WIN_SLASH = "\\\\/";
@@ -65820,7 +64695,7 @@ var require_utils6 = __commonJS({
65820
64695
  REGEX_REMOVE_BACKSLASH,
65821
64696
  REGEX_SPECIAL_CHARS,
65822
64697
  REGEX_SPECIAL_CHARS_GLOBAL
65823
- } = require_constants10();
64698
+ } = require_constants9();
65824
64699
  exports.isObject = (val2) => val2 !== null && typeof val2 === "object" && !Array.isArray(val2);
65825
64700
  exports.hasRegexChars = (str) => REGEX_SPECIAL_CHARS.test(str);
65826
64701
  exports.isRegexChar = (str) => str.length === 1 && exports.hasRegexChars(str);
@@ -65911,7 +64786,7 @@ var require_scan2 = __commonJS({
65911
64786
  /* ) */
65912
64787
  CHAR_RIGHT_SQUARE_BRACKET
65913
64788
  /* ] */
65914
- } = require_constants10();
64789
+ } = require_constants9();
65915
64790
  var isPathSeparator = (code2) => {
65916
64791
  return code2 === CHAR_FORWARD_SLASH || code2 === CHAR_BACKWARD_SLASH;
65917
64792
  };
@@ -66209,7 +65084,7 @@ var require_scan2 = __commonJS({
66209
65084
  var require_parse5 = __commonJS({
66210
65085
  "../../node_modules/.pnpm/picomatch@4.0.3/node_modules/picomatch/lib/parse.js"(exports, module) {
66211
65086
  "use strict";
66212
- var constants4 = require_constants10();
65087
+ var constants4 = require_constants9();
66213
65088
  var utils = require_utils6();
66214
65089
  var {
66215
65090
  MAX_LENGTH,
@@ -66980,7 +65855,7 @@ var require_picomatch3 = __commonJS({
66980
65855
  var scan = require_scan2();
66981
65856
  var parse15 = require_parse5();
66982
65857
  var utils = require_utils6();
66983
- var constants4 = require_constants10();
65858
+ var constants4 = require_constants9();
66984
65859
  var isObject2 = (val2) => val2 && typeof val2 === "object" && !Array.isArray(val2);
66985
65860
  var picomatch4 = (glob, options, returnState = false) => {
66986
65861
  if (Array.isArray(glob)) {
@@ -67131,7 +66006,7 @@ var require_picomatch4 = __commonJS({
67131
66006
  });
67132
66007
 
67133
66008
  // ../../node_modules/.pnpm/adm-zip@0.5.16/node_modules/adm-zip/util/constants.js
67134
- var require_constants11 = __commonJS({
66009
+ var require_constants10 = __commonJS({
67135
66010
  "../../node_modules/.pnpm/adm-zip@0.5.16/node_modules/adm-zip/util/constants.js"(exports, module) {
67136
66011
  module.exports = {
67137
66012
  /* The local file header */
@@ -67414,7 +66289,7 @@ var require_utils7 = __commonJS({
67414
66289
  "../../node_modules/.pnpm/adm-zip@0.5.16/node_modules/adm-zip/util/utils.js"(exports, module) {
67415
66290
  var fsystem = __require("fs");
67416
66291
  var pth = __require("path");
67417
- var Constants = require_constants11();
66292
+ var Constants = require_constants10();
67418
66293
  var Errors = require_errors4();
67419
66294
  var isWin = typeof process === "object" && "win32" === process.platform;
67420
66295
  var is_Obj = (obj) => typeof obj === "object" && obj !== null;
@@ -67751,7 +66626,7 @@ var require_decoder = __commonJS({
67751
66626
  var require_util9 = __commonJS({
67752
66627
  "../../node_modules/.pnpm/adm-zip@0.5.16/node_modules/adm-zip/util/index.js"(exports, module) {
67753
66628
  module.exports = require_utils7();
67754
- module.exports.Constants = require_constants11();
66629
+ module.exports.Constants = require_constants10();
67755
66630
  module.exports.Errors = require_errors4();
67756
66631
  module.exports.FileAttr = require_fattr();
67757
66632
  module.exports.decoder = require_decoder();
@@ -74438,10 +73313,6 @@ var ApiUrls = {
74438
73313
  };
74439
73314
 
74440
73315
  // ../web-compat-utils/src/maven-dependency-utils.ts
74441
- var import_packageurl_js = __toESM(require_packageurl_js(), 1);
74442
- function prettyPrintMavenDependency({ packageName, type, classifier, version: version3 }) {
74443
- return [packageName, type, classifier, version3].filter((s2) => s2).join(":");
74444
- }
74445
73316
  function deserializeMavenDependency(s2) {
74446
73317
  const [groupId, artifactId, version3] = s2.split(":");
74447
73318
  return {
@@ -74450,45 +73321,8 @@ function deserializeMavenDependency(s2) {
74450
73321
  resolvedType: "unknown"
74451
73322
  };
74452
73323
  }
74453
- function parsePackageUrlToMavenDependency(purlString) {
74454
- const purl = import_packageurl_js.PackageURL.fromString(purlString);
74455
- if (purl.type !== "maven" /* MAVEN */) {
74456
- throw new Error(`Expected maven package URL, got ${purl.type}`);
74457
- }
74458
- const packageName = purl.namespace ? `${purl.namespace}:${purl.name}` : purl.name;
74459
- return {
74460
- packageName,
74461
- version: purl.version ?? null,
74462
- type: purl.qualifiers?.type,
74463
- classifier: purl.qualifiers?.classifier,
74464
- resolvedType: "unknown"
74465
- };
74466
- }
74467
- function serializeMavenDependencyToPackageUrl(mavenDep) {
74468
- const [groupId, artifactId] = mavenDep.packageName.split(":");
74469
- const qualifiers = {};
74470
- if (mavenDep.type) {
74471
- qualifiers.type = mavenDep.type;
74472
- }
74473
- if (mavenDep.classifier) {
74474
- qualifiers.classifier = mavenDep.classifier;
74475
- }
74476
- const purl = new import_packageurl_js.PackageURL(
74477
- "maven" /* MAVEN */,
74478
- groupId,
74479
- artifactId,
74480
- mavenDep.version,
74481
- Object.keys(qualifiers).length > 0 ? qualifiers : void 0,
74482
- void 0
74483
- );
74484
- return purl.toString();
74485
- }
74486
73324
 
74487
73325
  // ../web-compat-utils/src/nuget-dependency-utils.ts
74488
- var import_packageurl_js2 = __toESM(require_packageurl_js(), 1);
74489
- function prettyPrintNugetDependency({ packageName, version: version3 }) {
74490
- return `${packageName}/${version3}`.toLocaleLowerCase();
74491
- }
74492
73326
  function deserializeNugetDependency(s2) {
74493
73327
  const [packageName, version3] = s2.split("/");
74494
73328
  return {
@@ -74497,21 +73331,6 @@ function deserializeNugetDependency(s2) {
74497
73331
  resolvedType: "unknown"
74498
73332
  };
74499
73333
  }
74500
- function parsePackageUrlToNugetDependency(purlString) {
74501
- const purl = import_packageurl_js2.PackageURL.fromString(purlString);
74502
- if (purl.type !== "nuget" /* NUGET */) {
74503
- throw new Error(`Expected nuget package URL, got ${purl.type}`);
74504
- }
74505
- return {
74506
- packageName: purl.name.toLocaleLowerCase(),
74507
- version: purl.version ?? null,
74508
- resolvedType: "unknown"
74509
- };
74510
- }
74511
- function serializeNugetDependencyToPackageUrl(nugetDep) {
74512
- const purl = new import_packageurl_js2.PackageURL("nuget" /* NUGET */, void 0, nugetDep.packageName, nugetDep.version, void 0, void 0);
74513
- return purl.toString();
74514
- }
74515
73334
 
74516
73335
  // ../web-compat-utils/src/package-utils.ts
74517
73336
  function extractNameAndVersion(packageNameAtVersion) {
@@ -74542,10 +73361,6 @@ function extractNameAndVersion(packageNameAtVersion) {
74542
73361
  }
74543
73362
 
74544
73363
  // ../web-compat-utils/src/rust-dependency-utils.ts
74545
- var import_packageurl_js3 = __toESM(require_packageurl_js(), 1);
74546
- function prettyPrintRustDependency({ packageName, version: version3 }) {
74547
- return `${packageName}@${version3}`;
74548
- }
74549
73364
  function deserializeRustDependency(s2) {
74550
73365
  const [packageName, version3] = s2.split("@");
74551
73366
  return {
@@ -74554,21 +73369,6 @@ function deserializeRustDependency(s2) {
74554
73369
  resolvedType: "unknown"
74555
73370
  };
74556
73371
  }
74557
- function parsePackageUrlToRustDependency(purlString) {
74558
- const purl = import_packageurl_js3.PackageURL.fromString(purlString);
74559
- if (purl.type !== "cargo" /* CARGO */) {
74560
- throw new Error(`Expected cargo package URL, got ${purl.type}`);
74561
- }
74562
- return {
74563
- packageName: purl.name,
74564
- version: purl.version ?? null,
74565
- resolvedType: "unknown"
74566
- };
74567
- }
74568
- function serializeRustDependencyToPackageUrl(rustDep) {
74569
- const purl = new import_packageurl_js3.PackageURL("cargo" /* CARGO */, void 0, rustDep.packageName, rustDep.version, void 0, void 0);
74570
- return purl.toString();
74571
- }
74572
73372
 
74573
73373
  // ../web-compat-utils/src/precompute-dependency-results.ts
74574
73374
  function deserializeDependencyChain(ecosystem, s2) {
@@ -75456,7 +74256,7 @@ ${error.message}`);
75456
74256
  // dist/whole-program-code-aware-vulnerability-scanner/analyze-in-buckets.js
75457
74257
  var import_lodash17 = __toESM(require_lodash(), 1);
75458
74258
  var import_semver3 = __toESM(require_semver2(), 1);
75459
- import assert7 from "assert";
74259
+ import assert10 from "assert";
75460
74260
  import { relative as relative6 } from "path";
75461
74261
 
75462
74262
  // ../utils/src/promise-queue.ts
@@ -75624,7 +74424,7 @@ function getVulnReachability(c) {
75624
74424
 
75625
74425
  // dist/analyzers/pip-analyzer.js
75626
74426
  var import_lodash16 = __toESM(require_lodash(), 1);
75627
- import assert6 from "assert";
74427
+ import assert9 from "assert";
75628
74428
  import { resolve as resolve17 } from "path";
75629
74429
 
75630
74430
  // ../utils/src/pip-utils.ts
@@ -75896,7 +74696,7 @@ function addPathToTrie(root3, vulnPath) {
75896
74696
 
75897
74697
  // dist/whole-program-code-aware-vulnerability-scanner/python/python-code-aware-vulnerability-scanner.js
75898
74698
  var import_lodash14 = __toESM(require_lodash(), 1);
75899
- import assert5 from "assert";
74699
+ import assert8 from "assert";
75900
74700
  import { existsSync as existsSync11 } from "fs";
75901
74701
  import { cp as cp5, readdir as readdir3, readFile as readFile10, rm as rm5, writeFile as writeFile8 } from "fs/promises";
75902
74702
  import { basename as basename9, dirname as dirname12, join as join17, resolve as resolve15, sep as sep3 } from "path";
@@ -76043,12 +74843,6 @@ function getUrlForPackage(packageName, version3) {
76043
74843
  return `https://api.nuget.org/v3-flatcontainer/${lowerName}/${lowerVersion}/${lowerName}.${lowerVersion}.nupkg`;
76044
74844
  }
76045
74845
 
76046
- // ../web-compat-utils/src/assertions.ts
76047
- function assertDefined(value) {
76048
- if (value === void 0 || value === null) throw new Error("Expected value to be defined");
76049
- return value;
76050
- }
76051
-
76052
74846
  // dist/whole-program-code-aware-vulnerability-scanner/dotnet/dotnet-code-aware-vulnerability-scanner.js
76053
74847
  var import_picomatch = __toESM(require_picomatch4(), 1);
76054
74848
 
@@ -76071,8 +74865,7 @@ var CocoaHeuristics = {
76071
74865
  // dist/whole-program-code-aware-vulnerability-scanner/dotnet/dotnet-code-aware-vulnerability-scanner.js
76072
74866
  var import_adm_zip = __toESM(require_adm_zip(), 1);
76073
74867
  import { mkdir, readFile as readFile5, writeFile as writeFile3 } from "fs/promises";
76074
- var import_packageurl_js4 = __toESM(require_packageurl_js(), 1);
76075
- import { randomUUID } from "crypto";
74868
+ import { randomUUID } from "node:crypto";
76076
74869
 
76077
74870
  // dist/whole-program-code-aware-vulnerability-scanner/dotnet/constants.js
76078
74871
  import { join as join9 } from "node:path";
@@ -76084,38 +74877,49 @@ import { join as join10 } from "node:path";
76084
74877
  var classGraphAnalysisCliPath = join10(COANA_REPOS_PATH(), "class-graph-analysis", "dist", "bundle", "class-graph-analysis-cli.mjs");
76085
74878
 
76086
74879
  // dist/whole-program-code-aware-vulnerability-scanner/dotnet/dotnet-code-aware-vulnerability-scanner.js
74880
+ import assert2 from "node:assert";
76087
74881
  var { uniq: uniq2, uniqWith, isEqual } = import_lodash6.default;
76088
74882
  var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilityScanner {
76089
74883
  apps;
76090
74884
  deps;
74885
+ depIdToPackageMap;
76091
74886
  timeoutInSeconds;
76092
74887
  statusUpdater;
76093
74888
  name = "COCOA";
76094
- constructor(apps, deps, timeoutInSeconds, statusUpdater) {
74889
+ constructor(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater) {
76095
74890
  this.apps = apps;
76096
74891
  this.deps = deps;
74892
+ this.depIdToPackageMap = depIdToPackageMap;
76097
74893
  this.timeoutInSeconds = timeoutInSeconds;
76098
74894
  this.statusUpdater = statusUpdater;
76099
74895
  }
76100
74896
  static initFromDependencyTree(dependencyTree, timeoutInSeconds, statusUpdater) {
76101
- return new _DotnetCodeAwareVulnerabilityScanner({
76102
- [serializeNugetDependencyToPackageUrl(dependencyTree)]: {
74897
+ const apps = {
74898
+ [randomUUID()]: {
76103
74899
  src: dependencyTree.src,
76104
74900
  bin: dependencyTree.bin,
76105
74901
  ecosystemSpecificPackageInfo: {
76106
74902
  type: "DOTNET"
76107
74903
  }
76108
74904
  }
76109
- }, Object.fromEntries(Object.values(dependencyTree.transitiveDependencies).map((dep) => [
76110
- serializeNugetDependencyToPackageUrl(dep),
76111
- {
74905
+ };
74906
+ const deps = {};
74907
+ const depIdToPackageMap = {};
74908
+ Object.values(dependencyTree.transitiveDependencies).forEach((dep) => {
74909
+ const uuid = randomUUID();
74910
+ depIdToPackageMap[uuid] = {
74911
+ name: dep.packageName,
74912
+ version: dep.version ?? void 0
74913
+ };
74914
+ deps[uuid] = {
76112
74915
  src: dep.src,
76113
74916
  bin: dep.bin,
76114
74917
  ecosystemSpecificPackageInfo: {
76115
74918
  type: "DOTNET"
76116
74919
  }
76117
- }
76118
- ])), timeoutInSeconds, statusUpdater);
74920
+ };
74921
+ });
74922
+ return new _DotnetCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
76119
74923
  }
76120
74924
  static async initFromSocketArtifacts(subprojectDir, manifestFiles, artifacts, tmpDir, timeoutInSeconds, statusUpdater) {
76121
74925
  const apps = {
@@ -76128,28 +74932,33 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76128
74932
  }
76129
74933
  }
76130
74934
  };
76131
- const deps = await convertSocketArtifacts(artifacts, tmpDir);
76132
- return new _DotnetCodeAwareVulnerabilityScanner(apps, deps, timeoutInSeconds, statusUpdater);
74935
+ const { deps, depIdToPackageMap } = await convertSocketArtifacts(artifacts, tmpDir);
74936
+ return new _DotnetCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
76133
74937
  }
76134
74938
  static async runOnAlreadyDownloadedPackages([appPath, ...depPaths], vulnerability, options) {
76135
- const apps = {};
76136
- apps[randomUUID()] = {
76137
- bin: await isDirectory(appPath) ? await getFiles(appPath) : [appPath],
76138
- ecosystemSpecificPackageInfo: {
76139
- type: "DOTNET"
74939
+ const apps = {
74940
+ [randomUUID()]: {
74941
+ bin: await isDirectory(appPath) ? await getFiles(appPath) : [appPath],
74942
+ ecosystemSpecificPackageInfo: {
74943
+ type: "DOTNET"
74944
+ }
76140
74945
  }
76141
74946
  };
76142
74947
  const deps = {};
74948
+ const depIdToPackageMap = {};
76143
74949
  for (const depPath of depPaths) {
76144
- const purl = new import_packageurl_js4.PackageURL("nuget", randomUUID(), randomUUID(), "1.0.0", null, null).toString();
76145
- deps[purl] = {
74950
+ const uuid = randomUUID();
74951
+ depIdToPackageMap[uuid] = {
74952
+ name: ""
74953
+ };
74954
+ deps[uuid] = {
76146
74955
  bin: await isDirectory(depPath) ? await getFiles(depPath) : [depPath],
76147
74956
  ecosystemSpecificPackageInfo: {
76148
74957
  type: "DOTNET"
76149
74958
  }
76150
74959
  };
76151
74960
  }
76152
- const scanner = new _DotnetCodeAwareVulnerabilityScanner(apps, deps, options.timeoutInSeconds);
74961
+ const scanner = new _DotnetCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, options.timeoutInSeconds);
76153
74962
  const result = await scanner.runAnalysis([vulnerability], CocoaHeuristics.ALL_PACKAGES, false);
76154
74963
  if (result.type === "error")
76155
74964
  return { error: result.message, terminatedEarly: true };
@@ -76162,24 +74971,32 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76162
74971
  return withTmpDirectory("dotnet-run-on-dependency-chain", async (tmpDir) => {
76163
74972
  try {
76164
74973
  const nugetDependencyChain = await convertDependencyChain(dependencyChain, tmpDir);
76165
- const scanner = new _DotnetCodeAwareVulnerabilityScanner({
76166
- [serializeNugetDependencyToPackageUrl(nugetDependencyChain[0])]: {
74974
+ const apps = {
74975
+ [randomUUID()]: {
76167
74976
  src: nugetDependencyChain[0].src,
76168
74977
  bin: nugetDependencyChain[0].bin,
76169
74978
  ecosystemSpecificPackageInfo: {
76170
74979
  type: "DOTNET"
76171
74980
  }
76172
74981
  }
76173
- }, Object.fromEntries(nugetDependencyChain.slice(1).map((dep) => [
76174
- serializeNugetDependencyToPackageUrl(dep),
76175
- {
74982
+ };
74983
+ const deps = {};
74984
+ const depIdToPackageMap = {};
74985
+ nugetDependencyChain.slice(1).forEach((dep) => {
74986
+ const uuid = randomUUID();
74987
+ depIdToPackageMap[uuid] = {
74988
+ name: dep.packageName,
74989
+ version: dep.version ?? void 0
74990
+ };
74991
+ deps[uuid] = {
76176
74992
  src: dep.src,
76177
74993
  bin: dep.bin,
76178
74994
  ecosystemSpecificPackageInfo: {
76179
74995
  type: "DOTNET"
76180
74996
  }
76181
- }
76182
- ])), timeoutInSeconds, statusUpdater);
74997
+ };
74998
+ });
74999
+ const scanner = new _DotnetCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
76183
75000
  const result = await scanner.actuallyRunAnalysis(vulnerability.vulnerabilityAccessPaths);
76184
75001
  if (result.type === "error")
76185
75002
  return { error: result.message, terminatedEarly: false };
@@ -76206,7 +75023,7 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76206
75023
  if (result.error)
76207
75024
  return void 0;
76208
75025
  const packageIds = JSON.parse(await readFile5(outputFile, "utf-8")).result;
76209
- return packageIds?.filter((packageId) => !Object.hasOwn(this.apps, packageId))?.map((packageId) => parsePackageUrlToNugetDependency(packageId).packageName);
75026
+ return packageIds?.filter((packageId) => Object.hasOwn(this.depIdToPackageMap, packageId))?.map((packageId) => this.depIdToPackageMap[packageId].name);
76210
75027
  });
76211
75028
  }
76212
75029
  async runAnalysis(vulnerabilities, heuristic, _analyzesAllVulns, _experiment) {
@@ -76214,7 +75031,7 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76214
75031
  this.statusUpdater?.("Preparing code for analysis...");
76215
75032
  const packagesToAnalyze = heuristic.getPackagesToAnalyze(vulnerabilities);
76216
75033
  const packagesToAnalyzeSet = new Set(packagesToAnalyze);
76217
- const filteredDeps = !packagesToAnalyze ? this.deps : Object.fromEntries(Object.entries(this.deps).filter(([purl]) => packagesToAnalyzeSet.has(parsePackageUrlToNugetDependency(purl).packageName)));
75034
+ const filteredDeps = !packagesToAnalyze ? this.deps : Object.fromEntries(Object.entries(this.deps).filter(([packageId]) => packagesToAnalyzeSet.has(this.depIdToPackageMap[packageId].name)));
76218
75035
  return await this.actuallyRunAnalysis(vulnerabilities.flatMap((v) => v.vulnerabilityAccessPaths), filteredDeps);
76219
75036
  } catch (e) {
76220
75037
  return { type: "error", message: e.message };
@@ -76222,7 +75039,6 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76222
75039
  }
76223
75040
  async actuallyRunAnalysis(vulnerabilityAccessPaths, filteredDeps) {
76224
75041
  this.statusUpdater?.("Running analysis...");
76225
- const appPackageIds = new Set(Object.keys(this.apps));
76226
75042
  return withTmpDirectory("dotnet-run-analysis", async (tmpDir) => {
76227
75043
  const options = {
76228
75044
  apps: this.apps,
@@ -76244,11 +75060,11 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76244
75060
  diagnostics,
76245
75061
  terminatedEarly: diagnostics.timeout,
76246
75062
  reachedDependencies: true,
76247
- computeDetectedOccurrences: ({ vulnerabilityAccessPaths: vulnerabilityAccessPaths2 }) => _DotnetCodeAwareVulnerabilityScanner.computeDetectedOccurrences(appPackageIds, vulnerablePaths, i(vulnerabilityAccessPaths2.map((vulnerabilityAccessPath) => vulnerabilityAccessPath.slice(1).split(":")[0])))
75063
+ computeDetectedOccurrences: ({ vulnerabilityAccessPaths: vulnerabilityAccessPaths2 }) => _DotnetCodeAwareVulnerabilityScanner.computeDetectedOccurrences(this.depIdToPackageMap, vulnerablePaths, i(vulnerabilityAccessPaths2.map((vulnerabilityAccessPath) => vulnerabilityAccessPath.slice(1).split(":")[0])))
76248
75064
  };
76249
75065
  });
76250
75066
  }
76251
- static computeDetectedOccurrences(appPackageIds, vulnerablePaths, vulnerableClasses) {
75067
+ static computeDetectedOccurrences(depIdToPackageMap, vulnerablePaths, vulnerableClasses) {
76252
75068
  const affectedPackages = /* @__PURE__ */ new Set();
76253
75069
  const classStacks = [];
76254
75070
  for (const vulnerableClass of vulnerableClasses) {
@@ -76257,12 +75073,17 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76257
75073
  continue;
76258
75074
  classStacks.push(...vulnerablePathsForClass.map((vulnPath) => {
76259
75075
  return vulnPath.map(({ fullyQualifiedName, confidence, packageId }) => ({
76260
- package: appPackageIds.has(packageId) ? "<app>" : prettyPrintNugetDependency(parsePackageUrlToNugetDependency(packageId)),
75076
+ package: Object.hasOwn(depIdToPackageMap, packageId) ? `${depIdToPackageMap[packageId].name}/${depIdToPackageMap[packageId].version}` : "<app>",
76261
75077
  class: fullyQualifiedName,
76262
75078
  confidence
76263
75079
  }));
76264
75080
  }));
76265
- vulnerablePathsForClass.flatMap((vulnPath) => vulnPath).filter(({ packageId }) => !appPackageIds.has(packageId)).map(({ packageId }) => parsePackageUrlToNugetDependency(packageId)).forEach((node) => affectedPackages.add(`${node.packageName}@${node.version}`));
75081
+ vulnerablePathsForClass.flatMap((vulnPath) => vulnPath).forEach(({ packageId }) => {
75082
+ if (Object.hasOwn(depIdToPackageMap, packageId)) {
75083
+ const depPkg = depIdToPackageMap[packageId];
75084
+ affectedPackages.add(`${depPkg.name}@${depPkg.version}`);
75085
+ }
75086
+ });
76266
75087
  }
76267
75088
  return {
76268
75089
  analysisLevel: "class-level",
@@ -76271,7 +75092,7 @@ var DotnetCodeAwareVulnerabilityScanner = class _DotnetCodeAwareVulnerabilitySca
76271
75092
  };
76272
75093
  }
76273
75094
  getPackagesExcludedUnrelatedToHeuristic() {
76274
- return Object.entries(this.deps).filter(([_, { src, bin }]) => !src?.length && (!bin || bin.some((f2) => !existsSync5(f2)))).map(([purl]) => parsePackageUrlToNugetDependency(purl).packageName);
75095
+ return Object.entries(this.deps).filter(([_, { src, bin }]) => !src?.length && (!bin || bin.some((f2) => !existsSync5(f2)))).map(([packageId]) => this.depIdToPackageMap[packageId].name);
76275
75096
  }
76276
75097
  };
76277
75098
  async function extractNugetPackage(nupkgFilePath, packageName, version3, tmpDir) {
@@ -76322,9 +75143,10 @@ async function downloadAndExtractNugetPackage(packageName, version3, tmpDir) {
76322
75143
  }
76323
75144
  async function convertDependencyChain(dependencyChain, tmpDir) {
76324
75145
  const nugetDependencyChain = await asyncMap(dependencyChain, async (dep) => {
75146
+ assert2(dep.version);
76325
75147
  return {
76326
75148
  ...dep,
76327
- bin: await downloadAndExtractNugetPackage(dep.packageName, assertDefined(dep.version), tmpDir)
75149
+ bin: await downloadAndExtractNugetPackage(dep.packageName, dep.version, tmpDir)
76328
75150
  };
76329
75151
  }, 4);
76330
75152
  return nugetDependencyChain;
@@ -76362,16 +75184,22 @@ async function convertSocketArtifacts(artifacts, tmpDir) {
76362
75184
  return await downloadAndExtractNugetPackage(packageName, version3, tmpDir);
76363
75185
  }
76364
75186
  const deps = {};
75187
+ const depIdToPackageMap = {};
76365
75188
  await asyncForEach(artifacts, async (artifact) => {
76366
- const purl = new import_packageurl_js4.PackageURL(artifact.type, artifact.namespace, artifact.name, artifact.version, artifact.qualifiers, artifact.subpath).toString();
76367
- deps[purl] = {
75189
+ assert2(artifact.version);
75190
+ const uuid = randomUUID();
75191
+ depIdToPackageMap[uuid] = {
75192
+ name: artifact.name,
75193
+ version: artifact.version
75194
+ };
75195
+ deps[uuid] = {
76368
75196
  ecosystemSpecificPackageInfo: {
76369
75197
  type: "DOTNET"
76370
75198
  },
76371
- bin: await resolveNuGetPackage(artifact.name, assertDefined(artifact.version))
75199
+ bin: await resolveNuGetPackage(artifact.name, artifact.version)
76372
75200
  };
76373
75201
  }, 4);
76374
- return deps;
75202
+ return { deps, depIdToPackageMap };
76375
75203
  }
76376
75204
 
76377
75205
  // dist/whole-program-code-aware-vulnerability-scanner/java/java-code-aware-vulnerability-scanner.js
@@ -90009,8 +88837,7 @@ var AlucardHeuristics = {
90009
88837
  };
90010
88838
 
90011
88839
  // dist/whole-program-code-aware-vulnerability-scanner/java/java-code-aware-vulnerability-scanner.js
90012
- var import_packageurl_js5 = __toESM(require_packageurl_js(), 1);
90013
- import { randomUUID as randomUUID2 } from "crypto";
88840
+ import { randomUUID as randomUUID2 } from "node:crypto";
90014
88841
 
90015
88842
  // dist/whole-program-code-aware-vulnerability-scanner/java/constants.js
90016
88843
  import { join as join12 } from "node:path";
@@ -90021,38 +88848,53 @@ var treeSitterScalaPath = join12(COANA_REPOS_PATH(), "tree-sitter-scala");
90021
88848
 
90022
88849
  // dist/whole-program-code-aware-vulnerability-scanner/java/java-code-aware-vulnerability-scanner.js
90023
88850
  var import_picomatch2 = __toESM(require_picomatch4(), 1);
88851
+ import assert3 from "node:assert";
90024
88852
  var { uniq: uniq3, uniqWith: uniqWith2, isEqual: isEqual2 } = import_lodash8.default;
90025
88853
  var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner {
90026
88854
  apps;
90027
88855
  deps;
88856
+ depIdToPackageMap;
90028
88857
  timeoutInSeconds;
90029
88858
  statusUpdater;
90030
88859
  name = "ALUCARD";
90031
- constructor(apps, deps, timeoutInSeconds, statusUpdater) {
88860
+ constructor(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater) {
90032
88861
  this.apps = apps;
90033
88862
  this.deps = deps;
88863
+ this.depIdToPackageMap = depIdToPackageMap;
90034
88864
  this.timeoutInSeconds = timeoutInSeconds;
90035
88865
  this.statusUpdater = statusUpdater;
90036
88866
  }
90037
88867
  static initFromDependencyTree(dependencyTree, timeoutInSeconds, statusUpdater) {
90038
- return new _JavaCodeAwareVulnerabilityScanner({
90039
- [serializeMavenDependencyToPackageUrl(dependencyTree)]: {
88868
+ const apps = {
88869
+ [randomUUID2()]: {
90040
88870
  src: dependencyTree.src,
90041
88871
  bin: dependencyTree.bin,
90042
88872
  ecosystemSpecificPackageInfo: {
90043
88873
  type: "JVM"
90044
88874
  }
90045
88875
  }
90046
- }, Object.fromEntries(Object.values(dependencyTree.transitiveDependencies).map((dep) => [
90047
- serializeMavenDependencyToPackageUrl(dep),
90048
- {
88876
+ };
88877
+ const deps = {};
88878
+ const depIdToPackageMap = {};
88879
+ Object.values(dependencyTree.transitiveDependencies).forEach((dep) => {
88880
+ const uuid = randomUUID2();
88881
+ const [groupId, artifactId] = dep.packageName.split(":");
88882
+ depIdToPackageMap[uuid] = {
88883
+ groupId,
88884
+ artifactId,
88885
+ type: dep.type,
88886
+ classifier: dep.classifier,
88887
+ version: dep.version ?? void 0
88888
+ };
88889
+ deps[uuid] = {
90049
88890
  src: dep.src,
90050
88891
  bin: dep.bin,
90051
88892
  ecosystemSpecificPackageInfo: {
90052
88893
  type: "JVM"
90053
88894
  }
90054
- }
90055
- ])), timeoutInSeconds, statusUpdater);
88895
+ };
88896
+ });
88897
+ return new _JavaCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
90056
88898
  }
90057
88899
  static async initFromSocketArtifacts(subprojectDir, manifestFiles, artifacts, tmpDir, timeoutInSeconds, statusUpdater) {
90058
88900
  const wsPaths = uniq3(manifestFiles.map(inferWorkspaceFromManifestPath));
@@ -90065,8 +88907,8 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90065
88907
  }
90066
88908
  }
90067
88909
  };
90068
- const deps = await convertSocketArtifacts2(subprojectDir, artifacts, tmpDir);
90069
- return new _JavaCodeAwareVulnerabilityScanner(apps, deps, timeoutInSeconds, statusUpdater);
88910
+ const { deps, depIdToPackageMap } = await convertSocketArtifacts2(subprojectDir, artifacts, tmpDir);
88911
+ return new _JavaCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
90070
88912
  }
90071
88913
  static async runOnAlreadyDownloadedPackages([appPath, ...depPaths], vulnerability, options) {
90072
88914
  const apps = {};
@@ -90077,16 +88919,21 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90077
88919
  }
90078
88920
  };
90079
88921
  const deps = {};
88922
+ const depIdToPackageMap = {};
90080
88923
  for (const depPath of depPaths) {
90081
- const purl = new import_packageurl_js5.PackageURL("maven", randomUUID2(), randomUUID2(), "1.0.0", null, null).toString();
90082
- deps[purl] = {
88924
+ const uuid = randomUUID2();
88925
+ depIdToPackageMap[uuid] = {
88926
+ groupId: "",
88927
+ artifactId: ""
88928
+ };
88929
+ deps[uuid] = {
90083
88930
  bin: await isDirectory(depPath) ? await getFiles(depPath) : [depPath],
90084
88931
  ecosystemSpecificPackageInfo: {
90085
88932
  type: "JVM"
90086
88933
  }
90087
88934
  };
90088
88935
  }
90089
- const scanner = new _JavaCodeAwareVulnerabilityScanner(apps, deps, options.timeoutInSeconds);
88936
+ const scanner = new _JavaCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, options.timeoutInSeconds);
90090
88937
  const result = await scanner.runAnalysis([vulnerability], AlucardHeuristics.ALL_PACKAGES, false);
90091
88938
  if (result.type === "error")
90092
88939
  return { error: result.message, terminatedEarly: true };
@@ -90099,24 +88946,36 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90099
88946
  return withTmpDirectory("java-run-on-dependency-chain", async (tmpDir) => {
90100
88947
  try {
90101
88948
  const mavenDependencyChain = await convertDependencyChain2(dependencyChain, tmpDir);
90102
- const scanner = new _JavaCodeAwareVulnerabilityScanner({
90103
- [serializeMavenDependencyToPackageUrl(mavenDependencyChain[0])]: {
88949
+ const apps = {
88950
+ [randomUUID2()]: {
90104
88951
  src: mavenDependencyChain[0].src,
90105
88952
  bin: mavenDependencyChain[0].bin,
90106
88953
  ecosystemSpecificPackageInfo: {
90107
88954
  type: "JVM"
90108
88955
  }
90109
88956
  }
90110
- }, Object.fromEntries(mavenDependencyChain.slice(1).map((dep) => [
90111
- serializeMavenDependencyToPackageUrl(dep),
90112
- {
88957
+ };
88958
+ const deps = {};
88959
+ const depIdToPackageMap = {};
88960
+ mavenDependencyChain.slice(1).forEach((dep) => {
88961
+ const [groupId, artifactId] = dep.packageName.split(":");
88962
+ const uuid = randomUUID2();
88963
+ depIdToPackageMap[uuid] = {
88964
+ groupId,
88965
+ artifactId,
88966
+ type: dep.type,
88967
+ classifier: dep.classifier,
88968
+ version: dep.version ?? void 0
88969
+ };
88970
+ deps[uuid] = {
90113
88971
  src: dep.src,
90114
88972
  bin: dep.bin,
90115
88973
  ecosystemSpecificPackageInfo: {
90116
88974
  type: "JVM"
90117
88975
  }
90118
- }
90119
- ])), timeoutInSeconds, statusUpdater);
88976
+ };
88977
+ });
88978
+ const scanner = new _JavaCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
90120
88979
  const result = await scanner.actuallyRunAnalysis(vulnerability.vulnerabilityAccessPaths);
90121
88980
  if (result.type === "error")
90122
88981
  return { error: result.message, terminatedEarly: false };
@@ -90143,7 +89002,7 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90143
89002
  if (result.error)
90144
89003
  return void 0;
90145
89004
  const packageIds = JSON.parse(await readFile6(outputFile, "utf-8")).result;
90146
- return packageIds?.filter((packageId) => !Object.hasOwn(this.apps, packageId))?.map((packageId) => parsePackageUrlToMavenDependency(packageId).packageName);
89005
+ return packageIds?.filter((packageId) => Object.hasOwn(this.depIdToPackageMap, packageId))?.map((packageId) => `${this.depIdToPackageMap[packageId].groupId}:${this.depIdToPackageMap[packageId].artifactId}}`);
90147
89006
  });
90148
89007
  }
90149
89008
  async runAnalysis(vulnerabilities, heuristic, _analyzesAllVulns, _experiment) {
@@ -90151,7 +89010,7 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90151
89010
  this.statusUpdater?.("Preparing code for analysis...");
90152
89011
  const packagesToAnalyze = heuristic.getPackagesToAnalyze(vulnerabilities);
90153
89012
  const packagesToAnalyzeSet = new Set(packagesToAnalyze);
90154
- const filteredDeps = !packagesToAnalyze ? this.deps : Object.fromEntries(Object.entries(this.deps).filter(([purl]) => packagesToAnalyzeSet.has(parsePackageUrlToMavenDependency(purl).packageName)));
89013
+ const filteredDeps = !packagesToAnalyze ? this.deps : Object.fromEntries(Object.entries(this.deps).filter(([packageId]) => packagesToAnalyzeSet.has(`${this.depIdToPackageMap[packageId].groupId}:${this.depIdToPackageMap[packageId].artifactId}}`)));
90155
89014
  return await this.actuallyRunAnalysis(vulnerabilities.flatMap((v) => v.vulnerabilityAccessPaths), filteredDeps);
90156
89015
  } catch (e) {
90157
89016
  return { type: "error", message: e.message };
@@ -90159,7 +89018,6 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90159
89018
  }
90160
89019
  async actuallyRunAnalysis(vulnerabilityAccessPaths, filteredDeps) {
90161
89020
  this.statusUpdater?.("Running analysis...");
90162
- const appPackageIds = new Set(Object.keys(this.apps));
90163
89021
  return withTmpDirectory("java-run-analysis", async (tmpDir) => {
90164
89022
  const options = {
90165
89023
  apps: this.apps,
@@ -90181,11 +89039,14 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90181
89039
  diagnostics,
90182
89040
  terminatedEarly: diagnostics.timeout,
90183
89041
  reachedDependencies: true,
90184
- computeDetectedOccurrences: ({ vulnerabilityAccessPaths: vulnerabilityAccessPaths2 }) => _JavaCodeAwareVulnerabilityScanner.computeDetectedOccurrences(appPackageIds, vulnerablePaths, i(vulnerabilityAccessPaths2.map((vulnerabilityAccessPath) => vulnerabilityAccessPath.slice(1).split(":")[0])))
89042
+ computeDetectedOccurrences: ({ vulnerabilityAccessPaths: vulnerabilityAccessPaths2 }) => _JavaCodeAwareVulnerabilityScanner.computeDetectedOccurrences(this.depIdToPackageMap, vulnerablePaths, i(vulnerabilityAccessPaths2.map((vulnerabilityAccessPath) => vulnerabilityAccessPath.slice(1).split(":")[0])))
90185
89043
  };
90186
89044
  });
90187
89045
  }
90188
- static computeDetectedOccurrences(appPackageIds, vulnerablePaths, vulnerableClasses) {
89046
+ static computeDetectedOccurrences(depIdToPackageMap, vulnerablePaths, vulnerableClasses) {
89047
+ function prettyPrintMavenPackage(pkg) {
89048
+ return [pkg.groupId, pkg.artifactId, pkg.type, pkg.classifier, pkg.version].filter(Boolean).join(":");
89049
+ }
90189
89050
  const affectedPackages = /* @__PURE__ */ new Set();
90190
89051
  const classStacks = [];
90191
89052
  for (const vulnerableClass of vulnerableClasses) {
@@ -90194,12 +89055,17 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90194
89055
  continue;
90195
89056
  classStacks.push(...vulnerablePathsForClass.map((vulnPath) => {
90196
89057
  return vulnPath.map(({ fullyQualifiedName, confidence, packageId }) => ({
90197
- package: appPackageIds.has(packageId) ? "<app>" : prettyPrintMavenDependency(parsePackageUrlToMavenDependency(packageId)),
89058
+ package: Object.hasOwn(depIdToPackageMap, packageId) ? prettyPrintMavenPackage(depIdToPackageMap[packageId]) : "<app>",
90198
89059
  class: fullyQualifiedName,
90199
89060
  confidence
90200
89061
  }));
90201
89062
  }));
90202
- vulnerablePathsForClass.flatMap((vulnPath) => vulnPath).filter(({ packageId }) => !appPackageIds.has(packageId)).map(({ packageId }) => parsePackageUrlToMavenDependency(packageId)).forEach((node) => affectedPackages.add(`${node.packageName}@${node.version}`));
89063
+ vulnerablePathsForClass.flatMap((vulnPath) => vulnPath).forEach(({ packageId }) => {
89064
+ if (Object.hasOwn(depIdToPackageMap, packageId)) {
89065
+ const depPkg = depIdToPackageMap[packageId];
89066
+ affectedPackages.add(`${depPkg.groupId}:${depPkg.artifactId}@${depPkg.version}`);
89067
+ }
89068
+ });
90203
89069
  }
90204
89070
  return {
90205
89071
  analysisLevel: "class-level",
@@ -90208,7 +89074,7 @@ var JavaCodeAwareVulnerabilityScanner = class _JavaCodeAwareVulnerabilityScanner
90208
89074
  };
90209
89075
  }
90210
89076
  getPackagesExcludedUnrelatedToHeuristic() {
90211
- return Object.entries(this.deps).filter(([_, { src, bin }]) => !src?.length && (!bin || bin.some((f2) => !existsSync7(f2)))).map(([purl]) => parsePackageUrlToMavenDependency(purl).packageName);
89077
+ return Object.entries(this.deps).filter(([_, { src, bin }]) => !src?.length && (!bin || bin.some((f2) => !existsSync7(f2)))).map(([packageId]) => `${this.depIdToPackageMap[packageId].groupId}:${this.depIdToPackageMap[packageId].artifactId}}`);
90212
89078
  }
90213
89079
  };
90214
89080
  function inferWorkspaceFromManifestPath(manifestFile) {
@@ -90247,9 +89113,10 @@ async function convertDependencyChain2(dependencyChain, tmpDir) {
90247
89113
  }
90248
89114
  const mavenDependencyChain = await asyncMap(dependencyChain, async (dep) => {
90249
89115
  const [groupId, artifactId] = dep.packageName.split(":");
89116
+ assert3(dep.version);
90250
89117
  return {
90251
89118
  ...dep,
90252
- bin: await downloadMavenArtifacts(groupId, artifactId, assertDefined(dep.version))
89119
+ bin: await downloadMavenArtifacts(groupId, artifactId, dep.version)
90253
89120
  };
90254
89121
  });
90255
89122
  return mavenDependencyChain;
@@ -90306,22 +89173,32 @@ async function convertSocketArtifacts2(rootDir, artifacts, tmpDir) {
90306
89173
  return success ? artifactFile : void 0;
90307
89174
  }
90308
89175
  const deps = {};
89176
+ const depIdToPackageMap = {};
90309
89177
  await asyncForEach(artifacts, async (artifact) => {
89178
+ assert3(artifact.namespace);
89179
+ assert3(artifact.version);
90310
89180
  const manifestFilesForArtifact = i([
90311
89181
  ...artifact.manifestFiles?.map((ref) => ref.file) ?? [],
90312
89182
  ...artifact.toplevelAncestors?.flatMap((ancestorId) => artifacts.find((a2) => a2.id === ancestorId)?.manifestFiles?.map((m) => m.file) ?? []) ?? []
90313
89183
  ]);
90314
89184
  const pomFile = manifestFilesForArtifact.find((manifestFile) => pomMatcher(basename5(manifestFile)));
90315
- const artifactFile = await resolveArtifact(assertDefined(artifact.namespace), artifact.name, artifact.qualifiers?.type, artifact.qualifiers?.classifier, assertDefined(artifact.version), pomFile);
90316
- const purl = new import_packageurl_js5.PackageURL(artifact.type, artifact.namespace, artifact.name, artifact.version, artifact.qualifiers, artifact.subpath).toString();
90317
- deps[purl] = {
89185
+ const artifactFile = await resolveArtifact(artifact.namespace, artifact.name, artifact.qualifiers?.type, artifact.qualifiers?.classifier, artifact.version, pomFile);
89186
+ const uuid = randomUUID2();
89187
+ depIdToPackageMap[uuid] = {
89188
+ groupId: artifact.namespace,
89189
+ artifactId: artifact.name,
89190
+ type: artifact.qualifiers?.type,
89191
+ classifier: artifact.qualifiers?.classifier,
89192
+ version: artifact.version
89193
+ };
89194
+ deps[uuid] = {
90318
89195
  ecosystemSpecificPackageInfo: {
90319
89196
  type: "JVM"
90320
89197
  },
90321
89198
  bin: artifactFile ? [artifactFile] : void 0
90322
89199
  };
90323
89200
  }, 4);
90324
- return deps;
89201
+ return { deps, depIdToPackageMap };
90325
89202
  }
90326
89203
 
90327
89204
  // dist/whole-program-code-aware-vulnerability-scanner/js/js-code-aware-vulnerability-scanner.js
@@ -91708,7 +90585,7 @@ var makeCommand = (syncFile, asyncFile, syncNoFile, asyncNoFile, validate2) => {
91708
90585
  import { EventEmitter as EE2 } from "events";
91709
90586
 
91710
90587
  // ../../node_modules/.pnpm/minizlib@3.0.2/node_modules/minizlib/dist/esm/index.js
91711
- import assert2 from "assert";
90588
+ import assert4 from "assert";
91712
90589
  import { Buffer as Buffer2 } from "buffer";
91713
90590
  import * as realZlib2 from "zlib";
91714
90591
 
@@ -91900,7 +90777,7 @@ var ZlibBase = class extends Minipass {
91900
90777
  }
91901
90778
  reset() {
91902
90779
  if (!this.#sawError) {
91903
- assert2(this.#handle, "zlib binding closed");
90780
+ assert4(this.#handle, "zlib binding closed");
91904
90781
  return this.#handle.reset?.();
91905
90782
  }
91906
90783
  }
@@ -91945,7 +90822,7 @@ var ZlibBase = class extends Minipass {
91945
90822
  chunk2 = Buffer2.from(chunk2, encoding);
91946
90823
  if (this.#sawError)
91947
90824
  return;
91948
- assert2(this.#handle, "zlib binding closed");
90825
+ assert4(this.#handle, "zlib binding closed");
91949
90826
  const nativeHandle = this.#handle._handle;
91950
90827
  const originalNativeClose = nativeHandle.close;
91951
90828
  nativeHandle.close = () => {
@@ -92011,7 +90888,7 @@ var Zlib = class extends ZlibBase {
92011
90888
  throw new Error("not supported in this implementation");
92012
90889
  if (this.#level !== level || this.#strategy !== strategy) {
92013
90890
  this.flush(constants3.Z_SYNC_FLUSH);
92014
- assert2(this.handle, "zlib binding closed");
90891
+ assert4(this.handle, "zlib binding closed");
92015
90892
  const origFlush = this.handle.flush;
92016
90893
  this.handle.flush = (flushFlag, cb) => {
92017
90894
  if (typeof flushFlag === "function") {
@@ -94711,7 +93588,7 @@ var create2 = makeCommand(createFileSync, createFile, createSync, createAsync, (
94711
93588
  import fs9 from "node:fs";
94712
93589
 
94713
93590
  // ../../node_modules/.pnpm/tar@7.4.3/node_modules/tar/dist/esm/unpack.js
94714
- import assert3 from "node:assert";
93591
+ import assert5 from "node:assert";
94715
93592
  import { randomBytes } from "node:crypto";
94716
93593
  import fs8 from "node:fs";
94717
93594
  import path6 from "node:path";
@@ -95606,7 +94483,7 @@ var Unpack = class extends Parser3 {
95606
94483
  if (!this[CHECKPATH](entry)) {
95607
94484
  return entry.resume();
95608
94485
  }
95609
- assert3.equal(typeof entry.absolute, "string");
94486
+ assert5.equal(typeof entry.absolute, "string");
95610
94487
  switch (entry.type) {
95611
94488
  case "Directory":
95612
94489
  case "GNUDumpDir":
@@ -96838,7 +95715,7 @@ function transformSourceLocations(fileMappings, detectedOccurrences) {
96838
95715
 
96839
95716
  // dist/whole-program-code-aware-vulnerability-scanner/go/go-code-aware-vulnerability-scanner.js
96840
95717
  var import_lodash11 = __toESM(require_lodash(), 1);
96841
- import assert4 from "assert";
95718
+ import assert6 from "assert";
96842
95719
  import { existsSync as existsSync9, createReadStream, createWriteStream as createWriteStream2 } from "fs";
96843
95720
  import { readFile as readFile8, rm as rm4, cp as cp4 } from "fs/promises";
96844
95721
  import zlib2 from "zlib";
@@ -96941,7 +95818,7 @@ ${stderr}`);
96941
95818
  }
96942
95819
  }
96943
95820
  static async runOnDependencyChain([first2, ...rest], vuln, options = {}) {
96944
- assert4(first2.version);
95821
+ assert6(first2.version);
96945
95822
  const { Dir, GoMod } = JSON.parse(await runCommandResolveStdOut(cmdt`go mod download -json ${first2.packageName}@v${first2.version}`));
96946
95823
  const projectDir = await createTmpDirectory("go-run-on-dependency-chain-");
96947
95824
  try {
@@ -96975,7 +95852,7 @@ ${stderr}`);
96975
95852
  }
96976
95853
  static async runOnAlreadyDownloadedPackages(packages, vuln, options = {}) {
96977
95854
  for (const pkg of packages)
96978
- assert4(existsSync9(join15(pkg, "go.mod")), `${pkg} does not contain a go.mod file`);
95855
+ assert6(existsSync9(join15(pkg, "go.mod")), `${pkg} does not contain a go.mod file`);
96979
95856
  const [app, ...dependencies] = packages;
96980
95857
  const projectDir = await createTmpDirectory("go-run-on-already-downloaded-packages-");
96981
95858
  try {
@@ -97034,8 +95911,7 @@ function getUrlForCrate(crateName, version3) {
97034
95911
  }
97035
95912
 
97036
95913
  // dist/whole-program-code-aware-vulnerability-scanner/rust/rust-code-aware-vulnerability-scanner.js
97037
- var import_packageurl_js6 = __toESM(require_packageurl_js(), 1);
97038
- import { randomUUID as randomUUID3 } from "crypto";
95914
+ import { randomUUID as randomUUID3 } from "node:crypto";
97039
95915
 
97040
95916
  // ../../node_modules/.pnpm/smol-toml@1.4.1/node_modules/smol-toml/dist/error.js
97041
95917
  function getLineColFromPtr(string, ptr) {
@@ -97738,32 +96614,46 @@ var treeSitterRustPath = join16(REPOS_PATH(), "tree-sitter", "tree-sitter-rust")
97738
96614
 
97739
96615
  // dist/whole-program-code-aware-vulnerability-scanner/rust/rust-code-aware-vulnerability-scanner.js
97740
96616
  var import_picomatch3 = __toESM(require_picomatch4(), 1);
96617
+ import assert7 from "node:assert";
97741
96618
  var { uniq: uniq6, uniqWith: uniqWith3, isEqual: isEqual3 } = import_lodash12.default;
97742
96619
  var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner {
97743
96620
  apps;
97744
96621
  deps;
96622
+ depIdToPackageMap;
97745
96623
  timeoutInSeconds;
97746
96624
  statusUpdater;
97747
96625
  name = "RUSTICA";
97748
- constructor(apps, deps, timeoutInSeconds, statusUpdater) {
96626
+ constructor(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater) {
97749
96627
  this.apps = apps;
97750
96628
  this.deps = deps;
96629
+ this.depIdToPackageMap = depIdToPackageMap;
97751
96630
  this.timeoutInSeconds = timeoutInSeconds;
97752
96631
  this.statusUpdater = statusUpdater;
97753
96632
  }
97754
96633
  static initFromDependencyTree(dependencyTree, timeoutInSeconds, statusUpdater) {
97755
- return new _RustCodeAwareVulnerabilityScanner({
97756
- [serializeRustDependencyToPackageUrl(dependencyTree)]: {
96634
+ const apps = {
96635
+ [randomUUID3()]: {
97757
96636
  src: dependencyTree.src,
97758
96637
  ecosystemSpecificPackageInfo: {
97759
96638
  type: "RUST",
97760
96639
  crate: dependencyTree.packageName.replaceAll("-", "_")
97761
96640
  }
97762
96641
  }
97763
- }, Object.fromEntries(Object.values(dependencyTree.transitiveDependencies).map((dep) => [
97764
- serializeRustDependencyToPackageUrl(dep),
97765
- { src: dep.src, ecosystemSpecificPackageInfo: { type: "RUST", crate: dep.packageName.replaceAll("-", "_") } }
97766
- ])), timeoutInSeconds, statusUpdater);
96642
+ };
96643
+ const deps = {};
96644
+ const depIdToPackageMap = {};
96645
+ Object.values(dependencyTree.transitiveDependencies).forEach((dep) => {
96646
+ const uuid = randomUUID3();
96647
+ depIdToPackageMap[uuid] = {
96648
+ name: dep.packageName,
96649
+ version: dep.version ?? void 0
96650
+ };
96651
+ deps[uuid] = {
96652
+ src: dep.src,
96653
+ ecosystemSpecificPackageInfo: { type: "RUST", crate: dep.packageName.replaceAll("-", "_") }
96654
+ };
96655
+ });
96656
+ return new _RustCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
97767
96657
  }
97768
96658
  static async initFromSocketArtifacts(subprojectDir, manifestFiles, artifacts, tmpDir, timeoutInSeconds, statusUpdater) {
97769
96659
  const apps = {};
@@ -97781,8 +96671,8 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97781
96671
  }
97782
96672
  };
97783
96673
  }
97784
- const deps = await convertSocketArtifacts3(artifacts, tmpDir);
97785
- return new _RustCodeAwareVulnerabilityScanner(apps, deps, timeoutInSeconds, statusUpdater);
96674
+ const { deps, depIdToPackageMap } = await convertSocketArtifacts3(artifacts, tmpDir);
96675
+ return new _RustCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
97786
96676
  }
97787
96677
  static async runOnAlreadyDownloadedPackages([appPath, ...depPaths], vulnerability, options) {
97788
96678
  const apps = {};
@@ -97801,6 +96691,7 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97801
96691
  };
97802
96692
  }
97803
96693
  const deps = {};
96694
+ const depIdToPackageMap = {};
97804
96695
  for (const depPath of depPaths) {
97805
96696
  for (const cargoToml of (await getFiles(depPath)).filter((f2) => basename8(f2) === "Cargo.toml")) {
97806
96697
  if (!cargoToml)
@@ -97808,7 +96699,11 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97808
96699
  const depCrateInfo = await getCrateInfo(cargoToml);
97809
96700
  if (!depCrateInfo.name)
97810
96701
  continue;
97811
- deps[randomUUID3()] = {
96702
+ const uuid = randomUUID3();
96703
+ depIdToPackageMap[uuid] = {
96704
+ name: ""
96705
+ };
96706
+ deps[uuid] = {
97812
96707
  src: [depCrateInfo.lib],
97813
96708
  ecosystemSpecificPackageInfo: {
97814
96709
  type: "RUST",
@@ -97817,7 +96712,7 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97817
96712
  };
97818
96713
  }
97819
96714
  }
97820
- const scanner = new _RustCodeAwareVulnerabilityScanner(apps, deps, options.timeoutInSeconds);
96715
+ const scanner = new _RustCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, options.timeoutInSeconds);
97821
96716
  const result = await scanner.runAnalysis([vulnerability], RusticaHeuristics.ALL_PACKAGES, false);
97822
96717
  if (result.type === "error")
97823
96718
  return { error: result.message, terminatedEarly: true };
@@ -97830,24 +96725,32 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97830
96725
  return withTmpDirectory("rust-run-on-dependency-chain", async (tmpDir) => {
97831
96726
  try {
97832
96727
  const rustDependencyChain = await convertDependencyChain3(dependencyChain, tmpDir);
97833
- const scanner = new _RustCodeAwareVulnerabilityScanner({
97834
- [serializeRustDependencyToPackageUrl(rustDependencyChain[0])]: {
96728
+ const apps = {
96729
+ [randomUUID3()]: {
97835
96730
  src: rustDependencyChain[0].src,
97836
96731
  ecosystemSpecificPackageInfo: {
97837
96732
  type: "RUST",
97838
96733
  crate: rustDependencyChain[0].packageName.replaceAll("-", "_")
97839
96734
  }
97840
96735
  }
97841
- }, Object.fromEntries(rustDependencyChain.slice(1).map((dep) => [
97842
- serializeRustDependencyToPackageUrl(dep),
97843
- {
96736
+ };
96737
+ const deps = {};
96738
+ const depIdToPackageMap = {};
96739
+ rustDependencyChain.slice(1).forEach((dep) => {
96740
+ const uuid = randomUUID3();
96741
+ depIdToPackageMap[uuid] = {
96742
+ name: dep.packageName,
96743
+ version: dep.version ?? void 0
96744
+ };
96745
+ deps[uuid] = {
97844
96746
  src: dep.src,
97845
96747
  ecosystemSpecificPackageInfo: {
97846
96748
  type: "RUST",
97847
96749
  crate: dep.packageName.replaceAll("-", "_")
97848
96750
  }
97849
- }
97850
- ])), timeoutInSeconds, statusUpdater);
96751
+ };
96752
+ });
96753
+ const scanner = new _RustCodeAwareVulnerabilityScanner(apps, deps, depIdToPackageMap, timeoutInSeconds, statusUpdater);
97851
96754
  const result = await scanner.actuallyRunAnalysis(vulnerability.vulnerabilityAccessPaths);
97852
96755
  if (result.type === "error")
97853
96756
  return { error: result.message, terminatedEarly: false };
@@ -97874,7 +96777,7 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97874
96777
  if (result.error)
97875
96778
  return void 0;
97876
96779
  const packageIds = JSON.parse(await readFile9(outputFile, "utf-8")).result;
97877
- return packageIds?.filter((packageId) => !Object.hasOwn(this.apps, packageId))?.map((packageId) => parsePackageUrlToRustDependency(packageId).packageName);
96780
+ return packageIds?.filter((packageId) => Object.hasOwn(this.depIdToPackageMap, packageId))?.map((packageId) => this.depIdToPackageMap[packageId].name);
97878
96781
  });
97879
96782
  }
97880
96783
  async runAnalysis(vulnerabilities, heuristic, _analyzesAllVulns) {
@@ -97882,7 +96785,7 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97882
96785
  this.statusUpdater?.("Preparing code for analysis...");
97883
96786
  const packagesToAnalyze = heuristic.getPackagesToAnalyze(vulnerabilities);
97884
96787
  const packagesToAnalyzeSet = new Set(packagesToAnalyze);
97885
- const filteredDeps = !packagesToAnalyze ? this.deps : Object.fromEntries(Object.entries(this.deps).filter(([purl]) => packagesToAnalyzeSet.has(parsePackageUrlToRustDependency(purl).packageName)));
96788
+ const filteredDeps = !packagesToAnalyze ? this.deps : Object.fromEntries(Object.entries(this.deps).filter(([packageId]) => packagesToAnalyzeSet.has(this.depIdToPackageMap[packageId].name)));
97886
96789
  return await this.actuallyRunAnalysis(vulnerabilities.flatMap((v) => v.vulnerabilityAccessPaths), filteredDeps);
97887
96790
  } catch (e) {
97888
96791
  return { type: "error", message: e.message };
@@ -97890,7 +96793,6 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97890
96793
  }
97891
96794
  async actuallyRunAnalysis(vulnerabilityAccessPaths, filteredDeps) {
97892
96795
  this.statusUpdater?.("Running analysis...");
97893
- const appPackageIds = new Set(Object.keys(this.apps));
97894
96796
  return withTmpDirectory("rust-run-analysis", async (tmpDir) => {
97895
96797
  const options = {
97896
96798
  apps: this.apps,
@@ -97913,14 +96815,14 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97913
96815
  diagnostics,
97914
96816
  terminatedEarly: diagnostics.timeout,
97915
96817
  reachedDependencies: true,
97916
- computeDetectedOccurrences: ({ vulnerabilityAccessPaths: vulnerabilityAccessPaths2 }) => _RustCodeAwareVulnerabilityScanner.computeDetectedOccurrences(appPackageIds, vulnerablePaths, i(vulnerabilityAccessPaths2.map(
96818
+ computeDetectedOccurrences: ({ vulnerabilityAccessPaths: vulnerabilityAccessPaths2 }) => _RustCodeAwareVulnerabilityScanner.computeDetectedOccurrences(this.depIdToPackageMap, vulnerablePaths, i(vulnerabilityAccessPaths2.map(
97917
96819
  // Note, rust uses '::' as path separator, so we need to split on ': ' and not only ':'
97918
96820
  (vulnerabilityAccessPath) => vulnerabilityAccessPath.slice(1).split(": ")[0]
97919
96821
  )))
97920
96822
  };
97921
96823
  });
97922
96824
  }
97923
- static computeDetectedOccurrences(appPackageIds, vulnerablePaths, vulnerableClasses) {
96825
+ static computeDetectedOccurrences(depIdToPackageMap, vulnerablePaths, vulnerableClasses) {
97924
96826
  const affectedPackages = /* @__PURE__ */ new Set();
97925
96827
  const classStacks = [];
97926
96828
  for (const vulnerableClass of vulnerableClasses) {
@@ -97929,12 +96831,17 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97929
96831
  continue;
97930
96832
  classStacks.push(...vulnerablePathsForClass.map((vulnPath) => {
97931
96833
  return vulnPath.map(({ fullyQualifiedName, confidence, packageId }) => ({
97932
- package: appPackageIds.has(packageId) ? "<app>" : prettyPrintRustDependency(parsePackageUrlToRustDependency(packageId)),
96834
+ package: Object.hasOwn(depIdToPackageMap, packageId) ? `${depIdToPackageMap[packageId].name}@${depIdToPackageMap[packageId].version}` : "<app>",
97933
96835
  class: fullyQualifiedName,
97934
96836
  confidence
97935
96837
  }));
97936
96838
  }));
97937
- vulnerablePathsForClass.flatMap((vulnPath) => vulnPath).filter(({ packageId }) => !appPackageIds.has(packageId)).map(({ packageId }) => parsePackageUrlToRustDependency(packageId)).forEach((node) => affectedPackages.add(`${node.packageName}@${node.version}`));
96839
+ vulnerablePathsForClass.flatMap((vulnPath) => vulnPath).forEach(({ packageId }) => {
96840
+ if (Object.hasOwn(depIdToPackageMap, packageId)) {
96841
+ const depPkg = depIdToPackageMap[packageId];
96842
+ affectedPackages.add(`${depPkg.name}@${depPkg.version}`);
96843
+ }
96844
+ });
97938
96845
  }
97939
96846
  return {
97940
96847
  analysisLevel: "class-level",
@@ -97943,7 +96850,7 @@ var RustCodeAwareVulnerabilityScanner = class _RustCodeAwareVulnerabilityScanner
97943
96850
  };
97944
96851
  }
97945
96852
  getPackagesExcludedUnrelatedToHeuristic() {
97946
- return Object.entries(this.deps).filter(([_, { src }]) => !src?.length).map(([purl]) => parsePackageUrlToRustDependency(purl).packageName);
96853
+ return Object.entries(this.deps).filter(([_, { src }]) => !src?.length).map(([packageId]) => this.depIdToPackageMap[packageId].name);
97947
96854
  }
97948
96855
  };
97949
96856
  async function convertDependencyChain3(dependencyChain, tmpDir) {
@@ -97962,9 +96869,10 @@ async function convertDependencyChain3(dependencyChain, tmpDir) {
97962
96869
  return [depCrateInfo.lib];
97963
96870
  }
97964
96871
  const rustDependencyChain = await asyncMap(dependencyChain, async (dep) => {
96872
+ assert7(dep.version);
97965
96873
  return {
97966
96874
  ...dep,
97967
- src: await downloadAndExtractCargoCrate2(dep.packageName, assertDefined(dep.version))
96875
+ src: await downloadAndExtractCargoCrate2(dep.packageName, dep.version)
97968
96876
  };
97969
96877
  }, 4);
97970
96878
  return rustDependencyChain;
@@ -98064,17 +96972,23 @@ async function convertSocketArtifacts3(artifacts, tmpDir) {
98064
96972
  return await downloadAndExtractCargoCrate(packageName, version3, tmpDir);
98065
96973
  }
98066
96974
  const deps = {};
96975
+ const depIdToPackageMap = {};
98067
96976
  await asyncForEach(artifacts, async (artifact) => {
98068
- const purl = new import_packageurl_js6.PackageURL(artifact.type, artifact.namespace, artifact.name, artifact.version, artifact.qualifiers, artifact.subpath).toString();
98069
- deps[purl] = {
96977
+ assert7(artifact.version);
96978
+ const uuid = randomUUID3();
96979
+ depIdToPackageMap[uuid] = {
96980
+ name: artifact.name,
96981
+ version: artifact.version
96982
+ };
96983
+ deps[uuid] = {
98070
96984
  ecosystemSpecificPackageInfo: {
98071
96985
  type: "RUST",
98072
96986
  crate: artifact.name.replaceAll("-", "_")
98073
96987
  },
98074
- src: await resolveCargoCrate(artifact.name, assertDefined(artifact.version))
96988
+ src: await resolveCargoCrate(artifact.name, artifact.version)
98075
96989
  };
98076
96990
  }, 4);
98077
- return deps;
96991
+ return { deps, depIdToPackageMap };
98078
96992
  }
98079
96993
  async function getCrateInfo(cargoTomlPath) {
98080
96994
  let name2;
@@ -98457,7 +97371,7 @@ ${msg}`;
98457
97371
  });
98458
97372
  }
98459
97373
  static async runOnDependencyChain(chain, vuln, options) {
98460
- assert5(chain.every((dep) => dep.version));
97374
+ assert8(chain.every((dep) => dep.version));
98461
97375
  const [first2, ...rest] = chain;
98462
97376
  return withTmpDirectory("python-run-on-dep-chain", async (tmpDir) => {
98463
97377
  const scanner = new this({
@@ -98596,7 +97510,7 @@ ${msg}`;
98596
97510
  async updateVirtualEnvInfo(virtualEnvFolder, packageInstallationStats) {
98597
97511
  const entries = await readdir3(join17(virtualEnvFolder, ".venv", "lib"));
98598
97512
  const pydir = entries.find((entry) => entry.startsWith("python"));
98599
- assert5(pydir, `No python* directory found in virtual environment: ${util5.inspect(entries)}`);
97513
+ assert8(pydir, `No python* directory found in virtual environment: ${util5.inspect(entries)}`);
98600
97514
  this.virtualEnvInfo = {
98601
97515
  virtualEnvFolder,
98602
97516
  virtualEnvPathToSitePackages: `${virtualEnvFolder}/.venv/lib/${pydir}/site-packages`,
@@ -98796,7 +97710,7 @@ var PipAnalyzer = class {
98796
97710
  });
98797
97711
  async runPhantomDependencyAnalysis() {
98798
97712
  const info = (await this.prepareScanner()).getVirtualEnvInfo();
98799
- assert6(info !== void 0);
97713
+ assert9(info !== void 0);
98800
97714
  const { subprojectDir, workspacePath, workspaceData } = this.state;
98801
97715
  let declaredDeps;
98802
97716
  if (workspaceData.type === "coana") {
@@ -98843,7 +97757,7 @@ var CLI_VERSION_TO_USE_CACHING_FROM = { PIP: "14.9.15" };
98843
97757
  var CLI_VERSION_TO_USE_CACHING_FROM_DEFAULT = "13.16.6";
98844
97758
  var SOCKET_MODE = process.env.SOCKET_MODE === "true";
98845
97759
  function assertVulnChainDetails(vs) {
98846
- assert7(vs.every((v) => v.vulnChainDetails));
97760
+ assert10(vs.every((v) => v.vulnChainDetails));
98847
97761
  }
98848
97762
  var apiKey = COANA_API_KEY ? { type: "present", value: COANA_API_KEY } : { type: "missing" };
98849
97763
  var dashboardAPI = new DashboardAPI(SOCKET_MODE, process.env.DISABLE_ANALYTICS_SHARING === "true");
@@ -99483,52 +98397,6 @@ mime-types/index.js:
99483
98397
  * MIT Licensed
99484
98398
  *)
99485
98399
 
99486
- packageurl-js/src/package-url.js:
99487
- (*!
99488
- Copyright (c) the purl authors
99489
-
99490
- Permission is hereby granted, free of charge, to any person obtaining a copy
99491
- of this software and associated documentation files (the "Software"), to deal
99492
- in the Software without restriction, including without limitation the rights
99493
- to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
99494
- copies of the Software, and to permit persons to whom the Software is
99495
- furnished to do so, subject to the following conditions:
99496
-
99497
- The above copyright notice and this permission notice shall be included in all
99498
- copies or substantial portions of the Software.
99499
-
99500
- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
99501
- IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
99502
- FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
99503
- AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
99504
- LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
99505
- OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
99506
- SOFTWARE.
99507
- *)
99508
-
99509
- packageurl-js/index.js:
99510
- (*!
99511
- Copyright (c) the purl authors
99512
-
99513
- Permission is hereby granted, free of charge, to any person obtaining a copy
99514
- of this software and associated documentation files (the "Software"), to deal
99515
- in the Software without restriction, including without limitation the rights
99516
- to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
99517
- copies of the Software, and to permit persons to whom the Software is
99518
- furnished to do so, subject to the following conditions:
99519
-
99520
- The above copyright notice and this permission notice shall be included in all
99521
- copies or substantial portions of the Software.
99522
-
99523
- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
99524
- IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
99525
- FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
99526
- AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
99527
- LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
99528
- OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
99529
- SOFTWARE.
99530
- *)
99531
-
99532
98400
  undici/lib/fetch/body.js:
99533
98401
  (*! formdata-polyfill. MIT License. Jimmy Wärting <https://jimmy.warting.se/opensource> *)
99534
98402