@dxos/client-services 0.5.8 → 0.5.9-main.8359215
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/browser/{chunk-JECXTGZA.mjs → chunk-QNCZI356.mjs} +34 -27
- package/dist/lib/browser/chunk-QNCZI356.mjs.map +7 -0
- package/dist/lib/browser/index.mjs +1 -1
- package/dist/lib/browser/meta.json +1 -1
- package/dist/lib/browser/packlets/testing/index.mjs +4 -4
- package/dist/lib/browser/packlets/testing/index.mjs.map +3 -3
- package/dist/lib/node/{chunk-OR7LRWDY.cjs → chunk-ELQ5XXZX.cjs} +34 -27
- package/dist/lib/node/chunk-ELQ5XXZX.cjs.map +7 -0
- package/dist/lib/node/index.cjs +44 -44
- package/dist/lib/node/meta.json +1 -1
- package/dist/lib/node/packlets/testing/index.cjs +10 -10
- package/dist/lib/node/packlets/testing/index.cjs.map +3 -3
- package/dist/types/src/packlets/devtools/network.d.ts +4 -4
- package/dist/types/src/packlets/devtools/network.d.ts.map +1 -1
- package/dist/types/src/packlets/network/network-service.d.ts +2 -2
- package/dist/types/src/packlets/network/network-service.d.ts.map +1 -1
- package/dist/types/src/packlets/services/service-context.d.ts +4 -5
- package/dist/types/src/packlets/services/service-context.d.ts.map +1 -1
- package/dist/types/src/packlets/services/service-host.d.ts.map +1 -1
- package/dist/types/src/packlets/spaces/data-space.d.ts +1 -0
- package/dist/types/src/packlets/spaces/data-space.d.ts.map +1 -1
- package/dist/types/src/packlets/spaces/spaces-service.d.ts.map +1 -1
- package/dist/types/src/packlets/testing/test-builder.d.ts +3 -3
- package/dist/types/src/packlets/testing/test-builder.d.ts.map +1 -1
- package/dist/types/src/version.d.ts +1 -1
- package/dist/types/src/version.d.ts.map +1 -1
- package/package.json +36 -36
- package/src/packlets/devtools/network.ts +4 -4
- package/src/packlets/identity/identity-manager.test.ts +2 -2
- package/src/packlets/identity/identity.test.ts +8 -4
- package/src/packlets/invitations/invitations-handler.ts +2 -2
- package/src/packlets/network/network-service.ts +2 -2
- package/src/packlets/services/service-context.ts +3 -3
- package/src/packlets/services/service-host.ts +6 -7
- package/src/packlets/spaces/data-space.ts +11 -1
- package/src/packlets/spaces/spaces-service.ts +1 -0
- package/src/packlets/testing/test-builder.ts +4 -4
- package/src/version.ts +1 -5
- package/dist/lib/browser/chunk-JECXTGZA.mjs.map +0 -7
- package/dist/lib/node/chunk-OR7LRWDY.cjs.map +0 -7
|
@@ -7,7 +7,7 @@ import {
|
|
|
7
7
|
InvitationsManager,
|
|
8
8
|
ServiceContext,
|
|
9
9
|
SpaceInvitationProtocol
|
|
10
|
-
} from "../../chunk-
|
|
10
|
+
} from "../../chunk-QNCZI356.mjs";
|
|
11
11
|
|
|
12
12
|
// packages/sdk/client-services/src/packlets/testing/credential-utils.ts
|
|
13
13
|
import { createCredential } from "@dxos/credentials";
|
|
@@ -224,7 +224,7 @@ import { FeedFactory, FeedStore } from "@dxos/feed-store";
|
|
|
224
224
|
import { Keyring } from "@dxos/keyring";
|
|
225
225
|
import { createTestLevel } from "@dxos/kv-store/testing";
|
|
226
226
|
import { MemorySignalManager, MemorySignalManagerContext } from "@dxos/messaging";
|
|
227
|
-
import { MemoryTransportFactory,
|
|
227
|
+
import { MemoryTransportFactory, SwarmNetworkManager } from "@dxos/network-manager";
|
|
228
228
|
import { Invitation as Invitation2 } from "@dxos/protocols/proto/dxos/client/services";
|
|
229
229
|
import { createStorage, StorageType } from "@dxos/random-access-storage";
|
|
230
230
|
import { BlobStore } from "@dxos/teleport-extension-object-sync";
|
|
@@ -239,7 +239,7 @@ var createServiceContext = async ({ signalContext = new MemorySignalManagerConte
|
|
|
239
239
|
type: StorageType.RAM
|
|
240
240
|
}) } = {}) => {
|
|
241
241
|
const signalManager = new MemorySignalManager(signalContext);
|
|
242
|
-
const networkManager = new
|
|
242
|
+
const networkManager = new SwarmNetworkManager({
|
|
243
243
|
signalManager,
|
|
244
244
|
transportFactory: MemoryTransportFactory
|
|
245
245
|
});
|
|
@@ -322,7 +322,7 @@ var TestPeer = class {
|
|
|
322
322
|
return this._props.snapshotStore ??= new SnapshotStore(this.storage.createDirectory("snapshots"));
|
|
323
323
|
}
|
|
324
324
|
get networkManager() {
|
|
325
|
-
return this._props.networkManager ??= new
|
|
325
|
+
return this._props.networkManager ??= new SwarmNetworkManager({
|
|
326
326
|
signalManager: new MemorySignalManager(this.signalContext),
|
|
327
327
|
transportFactory: MemoryTransportFactory
|
|
328
328
|
});
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/packlets/testing/credential-utils.ts", "../../../../../src/packlets/testing/invitation-utils.ts", "../../../../../src/packlets/testing/test-builder.ts"],
|
|
4
|
-
"sourcesContent": ["//\n// Copyright 2023 DXOS.org\n//\n\nimport { createCredential } from '@dxos/credentials';\nimport { type Signer } from '@dxos/crypto';\nimport { PublicKey } from '@dxos/keys';\nimport { type Credential } from '@dxos/protocols/proto/dxos/halo/credentials';\n\nexport const createMockCredential = async ({\n signer,\n issuer,\n}: {\n signer: Signer;\n issuer: PublicKey;\n}): Promise<Credential> =>\n createCredential({\n signer,\n issuer,\n subject: new PublicKey(Buffer.from('test')),\n assertion: {\n '@type': 'example.testing.rpc.MessageWithAny',\n payload: {\n '@type': 'google.protobuf.Any',\n value: Buffer.from('test'),\n },\n },\n });\n", "//\n// Copyright 2023 DXOS.org\n//\n\nimport { Trigger } from '@dxos/async';\nimport { InvitationEncoder, type AuthenticatingInvitation, type CancellableInvitation } from '@dxos/client-protocol';\nimport { invariant } from '@dxos/invariant';\nimport { Invitation } from '@dxos/protocols/proto/dxos/client/services';\nimport { type DeviceProfileDocument } from '@dxos/protocols/proto/dxos/halo/credentials';\n\nimport { ServiceContext } from '../services';\n\n/**\n * Strip secrets from invitation before giving it to the peer.\n */\nexport const sanitizeInvitation = (invitation: Invitation): Invitation => {\n return InvitationEncoder.decode(InvitationEncoder.encode(invitation));\n};\n\nexport type InvitationHost = {\n share(options?: Partial<Invitation>): CancellableInvitation;\n};\n\nexport type InvitationGuest = {\n join(invitation: Invitation | string, deviceProfile?: DeviceProfileDocument): AuthenticatingInvitation;\n};\n\nexport type PerformInvitationCallbacks<T> = {\n onConnecting?: (value: T) => boolean | void;\n onConnected?: (value: T) => boolean | void;\n onReady?: (value: T) => boolean | void;\n onAuthenticating?: (value: T) => boolean | void;\n onSuccess?: (value: T) => boolean | void;\n onCancelled?: (value: T) => boolean | void;\n onTimeout?: (value: T) => boolean | void;\n onError?: (value: T) => boolean | void;\n};\n\nexport type PerformInvitationParams = {\n host: ServiceContext | InvitationHost;\n guest: ServiceContext | InvitationGuest;\n options?: Partial<Invitation>;\n hooks?: {\n host?: PerformInvitationCallbacks<CancellableInvitation>;\n guest?: PerformInvitationCallbacks<AuthenticatingInvitation>;\n };\n guestDeviceProfile?: DeviceProfileDocument;\n codeInputDelay?: number;\n};\n\nexport type Result = { invitation?: Invitation; error?: Error };\n\nexport const performInvitation = ({\n host,\n guest,\n options,\n hooks,\n guestDeviceProfile,\n codeInputDelay,\n}: PerformInvitationParams): [Promise<Result>, Promise<Result>] => {\n let guestError = false;\n let guestConnected = false;\n const hostComplete = new Trigger<Result>();\n const guestComplete = new Trigger<Result>();\n const authCode = new Trigger<string>();\n\n void createInvitation(host, options).then((hostObservable) => {\n hostObservable.subscribe(\n async (hostInvitation: Invitation) => {\n switch (hostInvitation.state) {\n case Invitation.State.CONNECTING: {\n if (guestConnected) {\n break;\n }\n guestConnected = true;\n if (hooks?.host?.onConnecting?.(hostObservable)) {\n break;\n }\n const guestObservable = acceptInvitation(guest, hostInvitation, guestDeviceProfile);\n guestObservable.subscribe(\n async (guestInvitation: Invitation) => {\n switch (guestInvitation.state) {\n case Invitation.State.CONNECTING: {\n if (hooks?.guest?.onConnecting?.(guestObservable)) {\n break;\n }\n invariant(hostInvitation.swarmKey!.equals(guestInvitation.swarmKey!));\n break;\n }\n\n case Invitation.State.CONNECTED: {\n hooks?.guest?.onConnected?.(guestObservable);\n break;\n }\n\n case Invitation.State.READY_FOR_AUTHENTICATION: {\n if (hooks?.guest?.onReady?.(guestObservable)) {\n break;\n }\n const code = await authCode.wait();\n if (codeInputDelay == null) {\n await guestObservable.authenticate(code);\n } else {\n setTimeout(async () => {\n if (!guestError) {\n await guestObservable.authenticate(code);\n }\n }, codeInputDelay);\n }\n break;\n }\n\n case Invitation.State.AUTHENTICATING: {\n hooks?.guest?.onAuthenticating?.(guestObservable);\n break;\n }\n\n case Invitation.State.SUCCESS: {\n if (hooks?.guest?.onSuccess?.(guestObservable)) {\n break;\n }\n guestComplete.wake({ invitation: guestInvitation });\n break;\n }\n\n case Invitation.State.CANCELLED: {\n if (hooks?.guest?.onCancelled?.(guestObservable)) {\n break;\n }\n guestComplete.wake({ invitation: guestInvitation });\n break;\n }\n\n case Invitation.State.TIMEOUT: {\n if (hooks?.guest?.onTimeout?.(guestObservable)) {\n return;\n }\n guestComplete.wake({ invitation: guestInvitation });\n }\n }\n },\n (error: Error) => {\n guestError = true;\n if (hooks?.guest?.onError?.(guestObservable)) {\n return;\n }\n guestComplete.wake({ error });\n },\n );\n break;\n }\n\n case Invitation.State.CONNECTED: {\n hooks?.host?.onConnected?.(hostObservable);\n break;\n }\n\n case Invitation.State.READY_FOR_AUTHENTICATION: {\n if (hooks?.host?.onReady?.(hostObservable)) {\n break;\n }\n if (hostInvitation.authCode) {\n authCode.wake(hostInvitation.authCode);\n }\n break;\n }\n\n case Invitation.State.AUTHENTICATING: {\n hooks?.host?.onAuthenticating?.(hostObservable);\n break;\n }\n\n case Invitation.State.SUCCESS: {\n if (hooks?.host?.onSuccess?.(hostObservable)) {\n break;\n }\n hostComplete.wake({ invitation: hostInvitation });\n break;\n }\n\n case Invitation.State.CANCELLED: {\n if (hooks?.host?.onCancelled?.(hostObservable)) {\n break;\n }\n hostComplete.wake({ invitation: hostInvitation });\n break;\n }\n\n case Invitation.State.TIMEOUT: {\n if (hooks?.host?.onTimeout?.(hostObservable)) {\n break;\n }\n hostComplete.wake({ invitation: hostInvitation });\n break;\n }\n }\n },\n (error: Error) => {\n if (hooks?.host?.onError?.(hostObservable)) {\n return;\n }\n hostComplete.wake({ error });\n },\n );\n });\n\n return [hostComplete.wait(), guestComplete.wait()];\n};\n\nconst createInvitation = async (\n host: ServiceContext | InvitationHost,\n options?: Partial<Invitation>,\n): Promise<CancellableInvitation> => {\n options ??= {\n authMethod: Invitation.AuthMethod.NONE,\n ...(options ?? {}),\n };\n\n if (host instanceof ServiceContext) {\n return host.invitationsManager.createInvitation({\n kind: Invitation.Kind.SPACE,\n ...options,\n });\n }\n\n return host.share(options);\n};\n\nconst acceptInvitation = (\n guest: ServiceContext | InvitationGuest,\n invitation: Invitation,\n guestDeviceProfile?: DeviceProfileDocument,\n): AuthenticatingInvitation => {\n invitation = sanitizeInvitation(invitation);\n\n if (guest instanceof ServiceContext) {\n return guest.invitationsManager.acceptInvitation({\n invitation,\n deviceProfile: guestDeviceProfile,\n });\n }\n\n return guest.join(invitation, guestDeviceProfile);\n};\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type Config } from '@dxos/config';\nimport { Context } from '@dxos/context';\nimport { createCredentialSignerWithChain, CredentialGenerator } from '@dxos/credentials';\nimport { failUndefined } from '@dxos/debug';\nimport { EchoHost } from '@dxos/echo-db';\nimport { MetadataStore, SnapshotStore, SpaceManager, valueEncoding } from '@dxos/echo-pipeline';\nimport { FeedFactory, FeedStore } from '@dxos/feed-store';\nimport { Keyring } from '@dxos/keyring';\nimport { type LevelDB } from '@dxos/kv-store';\nimport { createTestLevel } from '@dxos/kv-store/testing';\nimport { MemorySignalManager, MemorySignalManagerContext } from '@dxos/messaging';\nimport { MemoryTransportFactory, NetworkManager } from '@dxos/network-manager';\nimport { Invitation } from '@dxos/protocols/proto/dxos/client/services';\nimport { createStorage, StorageType, type Storage } from '@dxos/random-access-storage';\nimport { BlobStore } from '@dxos/teleport-extension-object-sync';\n\nimport { InvitationsHandler, InvitationsManager, SpaceInvitationProtocol } from '../invitations';\nimport { ClientServicesHost, ServiceContext } from '../services';\nimport { DataSpaceManager, type SigningContext } from '../spaces';\n\n//\n// TODO(burdon): Replace with test builder.\n//\n\nexport const createServiceHost = (config: Config, signalManagerContext: MemorySignalManagerContext) => {\n return new ClientServicesHost({\n config,\n signalManager: new MemorySignalManager(signalManagerContext),\n transportFactory: MemoryTransportFactory,\n });\n};\n\nexport const createServiceContext = async ({\n signalContext = new MemorySignalManagerContext(),\n storage = createStorage({ type: StorageType.RAM }),\n}: {\n signalContext?: MemorySignalManagerContext;\n storage?: Storage;\n} = {}) => {\n const signalManager = new MemorySignalManager(signalContext);\n const networkManager = new NetworkManager({\n signalManager,\n transportFactory: MemoryTransportFactory,\n });\n const level = createTestLevel();\n await level.open();\n\n return new ServiceContext(storage, level, networkManager, signalManager, {\n invitationConnectionDefaultParams: { controlHeartbeatInterval: 200 },\n });\n};\n\nexport const createPeers = async (numPeers: number) => {\n const signalContext = new MemorySignalManagerContext();\n\n return await Promise.all(\n Array.from(Array(numPeers)).map(async () => {\n const peer = await createServiceContext({ signalContext });\n await peer.open(new Context());\n return peer;\n }),\n );\n};\n\nexport const createIdentity = async (peer: ServiceContext) => {\n await peer.createIdentity();\n return peer;\n};\n\nexport class TestBuilder {\n public readonly signalContext = new MemorySignalManagerContext();\n private readonly _ctx = new Context();\n\n createPeer(peerOptions?: TestPeerOpts): TestPeer {\n const peer = new TestPeer(this.signalContext, peerOptions);\n this._ctx.onDispose(async () => peer.destroy());\n return peer;\n }\n\n async destroy() {\n await this._ctx.dispose();\n }\n}\n\nexport type TestPeerOpts = {\n dataStore?: StorageType;\n};\n\nexport type TestPeerProps = {\n storage?: Storage;\n level?: LevelDB;\n feedStore?: FeedStore<any>;\n metadataStore?: MetadataStore;\n keyring?: Keyring;\n networkManager?: NetworkManager;\n spaceManager?: SpaceManager;\n dataSpaceManager?: DataSpaceManager;\n snapshotStore?: SnapshotStore;\n signingContext?: SigningContext;\n blobStore?: BlobStore;\n echoHost?: EchoHost;\n invitationsManager?: InvitationsManager;\n};\n\nexport class TestPeer {\n private _props: TestPeerProps = {};\n\n constructor(\n private readonly signalContext: MemorySignalManagerContext,\n private readonly opts: TestPeerOpts = { dataStore: StorageType.RAM },\n ) {}\n\n get props() {\n return this._props;\n }\n\n get storage() {\n return (this._props.storage ??= createStorage({ type: this.opts.dataStore }));\n }\n\n get keyring() {\n return (this._props.keyring ??= new Keyring(this.storage.createDirectory('keyring')));\n }\n\n get level() {\n return (this._props.level ??= createTestLevel());\n }\n\n get feedStore() {\n return (this._props.feedStore ??= new FeedStore({\n factory: new FeedFactory({\n root: this.storage.createDirectory('feeds'),\n signer: this.keyring,\n hypercore: {\n valueEncoding,\n },\n }),\n }));\n }\n\n get metadataStore() {\n return (this._props.metadataStore ??= new MetadataStore(this.storage.createDirectory('metadata')));\n }\n\n get blobStore() {\n return (this._props.blobStore ??= new BlobStore(this.storage.createDirectory('blobs')));\n }\n\n get snapshotStore() {\n return (this._props.snapshotStore ??= new SnapshotStore(this.storage.createDirectory('snapshots')));\n }\n\n get networkManager() {\n return (this._props.networkManager ??= new NetworkManager({\n signalManager: new MemorySignalManager(this.signalContext),\n transportFactory: MemoryTransportFactory,\n }));\n }\n\n get spaceManager() {\n return (this._props.spaceManager ??= new SpaceManager({\n feedStore: this.feedStore,\n networkManager: this.networkManager,\n metadataStore: this.metadataStore,\n snapshotStore: this.snapshotStore,\n blobStore: this.blobStore,\n }));\n }\n\n get identity() {\n return this._props.signingContext ?? failUndefined();\n }\n\n get echoHost() {\n return (this._props.echoHost ??= new EchoHost({\n kv: this.level,\n storage: this.storage,\n }));\n }\n\n get dataSpaceManager(): DataSpaceManager {\n return (this._props.dataSpaceManager ??= new DataSpaceManager(\n this.spaceManager,\n this.metadataStore,\n this.keyring,\n this.identity,\n this.feedStore,\n this.echoHost,\n this.invitationsManager,\n ));\n }\n\n get invitationsManager() {\n return (this._props.invitationsManager ??= new InvitationsManager(\n new InvitationsHandler(this.networkManager),\n (invitation) => {\n if (invitation.kind === Invitation.Kind.SPACE) {\n return new SpaceInvitationProtocol(this.dataSpaceManager, this.identity!, this.keyring, invitation.spaceKey!);\n } else {\n throw new Error('not implemented');\n }\n },\n this.metadataStore,\n ));\n }\n\n async createIdentity() {\n this._props.signingContext ??= await createSigningContext(this.keyring);\n }\n\n async destroy() {\n await this.level.close();\n await this.storage.reset();\n }\n}\n\nexport const createSigningContext = async (keyring: Keyring): Promise<SigningContext> => {\n const identityKey = await keyring.createKey();\n const deviceKey = await keyring.createKey();\n\n return {\n identityKey,\n deviceKey,\n credentialSigner: createCredentialSignerWithChain(\n keyring,\n {\n credential: await new CredentialGenerator(keyring, identityKey, deviceKey).createDeviceAuthorization(deviceKey),\n },\n deviceKey,\n ),\n recordCredential: async () => {}, // No-op.\n getProfile: () => undefined,\n };\n};\n"],
|
|
5
|
-
"mappings": ";;;;;;;;;;;;AAIA,SAASA,wBAAwB;AAEjC,SAASC,iBAAiB;AAGnB,IAAMC,uBAAuB,OAAO,EACzCC,QACAC,OAAM,MAKNC,iBAAiB;EACfF;EACAC;EACAE,SAAS,IAAIC,UAAUC,OAAOC,KAAK,MAAA,CAAA;EACnCC,WAAW;IACT,SAAS;IACTC,SAAS;MACP,SAAS;MACTC,OAAOJ,OAAOC,KAAK,MAAA;IACrB;EACF;AACF,CAAA;;;ACvBF,SAASI,eAAe;AACxB,SAASC,yBAAoF;AAC7F,SAASC,iBAAiB;AAC1B,SAASC,kBAAkB;;AAQpB,IAAMC,qBAAqB,CAACC,eAAAA;AACjC,SAAOC,kBAAkBC,OAAOD,kBAAkBE,OAAOH,UAAAA,CAAAA;AAC3D;AAmCO,IAAMI,oBAAoB,CAAC,EAChCC,MACAC,OACAC,SACAC,OACAC,oBACAC,eAAc,MACU;AACxB,MAAIC,aAAa;AACjB,MAAIC,iBAAiB;AACrB,QAAMC,eAAe,IAAIC,QAAAA;AACzB,QAAMC,gBAAgB,IAAID,QAAAA;AAC1B,QAAME,WAAW,IAAIF,QAAAA;AAErB,OAAKG,iBAAiBZ,MAAME,OAAAA,EAASW,KAAK,CAACC,mBAAAA;AACzCA,mBAAeC,UACb,OAAOC,mBAAAA;AACL,cAAQA,eAAeC,OAAK;QAC1B,KAAKC,WAAWC,MAAMC,YAAY;AAChC,cAAIb,gBAAgB;AAClB;UACF;AACAA,2BAAiB;AACjB,cAAIJ,OAAOH,MAAMqB,eAAeP,cAAAA,GAAiB;AAC/C;UACF;AACA,gBAAMQ,kBAAkBC,iBAAiBtB,OAAOe,gBAAgBZ,kBAAAA;AAChEkB,0BAAgBP,UACd,OAAOS,oBAAAA;AACL,oBAAQA,gBAAgBP,OAAK;cAC3B,KAAKC,WAAWC,MAAMC,YAAY;AAChC,oBAAIjB,OAAOF,OAAOoB,eAAeC,eAAAA,GAAkB;AACjD;gBACF;AACAG,0BAAUT,eAAeU,SAAUC,OAAOH,gBAAgBE,QAAQ,GAAA,QAAA;;;;;;;;;AAClE;cACF;cAEA,KAAKR,WAAWC,MAAMS,WAAW;AAC/BzB,uBAAOF,OAAO4B,cAAcP,eAAAA;AAC5B;cACF;cAEA,KAAKJ,WAAWC,MAAMW,0BAA0B;AAC9C,oBAAI3B,OAAOF,OAAO8B,UAAUT,eAAAA,GAAkB;AAC5C;gBACF;AACA,sBAAMU,OAAO,MAAMrB,SAASsB,KAAI;AAChC,oBAAI5B,kBAAkB,MAAM;AAC1B,wBAAMiB,gBAAgBY,aAAaF,IAAAA;gBACrC,OAAO;AACLG,6BAAW,YAAA;AACT,wBAAI,CAAC7B,YAAY;AACf,4BAAMgB,gBAAgBY,aAAaF,IAAAA;oBACrC;kBACF,GAAG3B,cAAAA;gBACL;AACA;cACF;cAEA,KAAKa,WAAWC,MAAMiB,gBAAgB;AACpCjC,uBAAOF,OAAOoC,mBAAmBf,eAAAA;AACjC;cACF;cAEA,KAAKJ,WAAWC,MAAMmB,SAAS;AAC7B,oBAAInC,OAAOF,OAAOsC,YAAYjB,eAAAA,GAAkB;AAC9C;gBACF;AACAZ,8BAAc8B,KAAK;kBAAE7C,YAAY6B;gBAAgB,CAAA;AACjD;cACF;cAEA,KAAKN,WAAWC,MAAMsB,WAAW;AAC/B,oBAAItC,OAAOF,OAAOyC,cAAcpB,eAAAA,GAAkB;AAChD;gBACF;AACAZ,8BAAc8B,KAAK;kBAAE7C,YAAY6B;gBAAgB,CAAA;AACjD;cACF;cAEA,KAAKN,WAAWC,MAAMwB,SAAS;AAC7B,oBAAIxC,OAAOF,OAAO2C,YAAYtB,eAAAA,GAAkB;AAC9C;gBACF;AACAZ,8BAAc8B,KAAK;kBAAE7C,YAAY6B;gBAAgB,CAAA;cACnD;YACF;UACF,GACA,CAACqB,UAAAA;AACCvC,yBAAa;AACb,gBAAIH,OAAOF,OAAO6C,UAAUxB,eAAAA,GAAkB;AAC5C;YACF;AACAZ,0BAAc8B,KAAK;cAAEK;YAAM,CAAA;UAC7B,CAAA;AAEF;QACF;QAEA,KAAK3B,WAAWC,MAAMS,WAAW;AAC/BzB,iBAAOH,MAAM6B,cAAcf,cAAAA;AAC3B;QACF;QAEA,KAAKI,WAAWC,MAAMW,0BAA0B;AAC9C,cAAI3B,OAAOH,MAAM+B,UAAUjB,cAAAA,GAAiB;AAC1C;UACF;AACA,cAAIE,eAAeL,UAAU;AAC3BA,qBAAS6B,KAAKxB,eAAeL,QAAQ;UACvC;AACA;QACF;QAEA,KAAKO,WAAWC,MAAMiB,gBAAgB;AACpCjC,iBAAOH,MAAMqC,mBAAmBvB,cAAAA;AAChC;QACF;QAEA,KAAKI,WAAWC,MAAMmB,SAAS;AAC7B,cAAInC,OAAOH,MAAMuC,YAAYzB,cAAAA,GAAiB;AAC5C;UACF;AACAN,uBAAagC,KAAK;YAAE7C,YAAYqB;UAAe,CAAA;AAC/C;QACF;QAEA,KAAKE,WAAWC,MAAMsB,WAAW;AAC/B,cAAItC,OAAOH,MAAM0C,cAAc5B,cAAAA,GAAiB;AAC9C;UACF;AACAN,uBAAagC,KAAK;YAAE7C,YAAYqB;UAAe,CAAA;AAC/C;QACF;QAEA,KAAKE,WAAWC,MAAMwB,SAAS;AAC7B,cAAIxC,OAAOH,MAAM4C,YAAY9B,cAAAA,GAAiB;AAC5C;UACF;AACAN,uBAAagC,KAAK;YAAE7C,YAAYqB;UAAe,CAAA;AAC/C;QACF;MACF;IACF,GACA,CAAC6B,UAAAA;AACC,UAAI1C,OAAOH,MAAM8C,UAAUhC,cAAAA,GAAiB;AAC1C;MACF;AACAN,mBAAagC,KAAK;QAAEK;MAAM,CAAA;IAC5B,CAAA;EAEJ,CAAA;AAEA,SAAO;IAACrC,aAAayB,KAAI;IAAIvB,cAAcuB,KAAI;;AACjD;AAEA,IAAMrB,mBAAmB,OACvBZ,MACAE,YAAAA;AAEAA,cAAY;IACV6C,YAAY7B,WAAW8B,WAAWC;IAClC,GAAI/C,WAAW,CAAC;EAClB;AAEA,MAAIF,gBAAgBkD,gBAAgB;AAClC,WAAOlD,KAAKmD,mBAAmBvC,iBAAiB;MAC9CwC,MAAMlC,WAAWmC,KAAKC;MACtB,GAAGpD;IACL,CAAA;EACF;AAEA,SAAOF,KAAKuD,MAAMrD,OAAAA;AACpB;AAEA,IAAMqB,mBAAmB,CACvBtB,OACAN,YACAS,uBAAAA;AAEAT,eAAaD,mBAAmBC,UAAAA;AAEhC,MAAIM,iBAAiBiD,gBAAgB;AACnC,WAAOjD,MAAMkD,mBAAmB5B,iBAAiB;MAC/C5B;MACA6D,eAAepD;IACjB,CAAA;EACF;AAEA,SAAOH,MAAMwD,KAAK9D,YAAYS,kBAAAA;AAChC;;;AC9OA,SAASsD,eAAe;AACxB,SAASC,iCAAiCC,2BAA2B;AACrE,SAASC,qBAAqB;AAC9B,SAASC,gBAAgB;AACzB,SAASC,eAAeC,eAAeC,cAAcC,qBAAqB;AAC1E,SAASC,aAAaC,iBAAiB;AACvC,SAASC,eAAe;AAExB,SAASC,uBAAuB;AAChC,SAASC,qBAAqBC,kCAAkC;AAChE,SAASC,wBAAwBC,
|
|
6
|
-
"names": ["createCredential", "PublicKey", "createMockCredential", "signer", "issuer", "createCredential", "subject", "PublicKey", "Buffer", "from", "assertion", "payload", "value", "Trigger", "InvitationEncoder", "invariant", "Invitation", "sanitizeInvitation", "invitation", "InvitationEncoder", "decode", "encode", "performInvitation", "host", "guest", "options", "hooks", "guestDeviceProfile", "codeInputDelay", "guestError", "guestConnected", "hostComplete", "Trigger", "guestComplete", "authCode", "createInvitation", "then", "hostObservable", "subscribe", "hostInvitation", "state", "Invitation", "State", "CONNECTING", "onConnecting", "guestObservable", "acceptInvitation", "guestInvitation", "invariant", "swarmKey", "equals", "CONNECTED", "onConnected", "READY_FOR_AUTHENTICATION", "onReady", "code", "wait", "authenticate", "setTimeout", "AUTHENTICATING", "onAuthenticating", "SUCCESS", "onSuccess", "wake", "CANCELLED", "onCancelled", "TIMEOUT", "onTimeout", "error", "onError", "authMethod", "AuthMethod", "NONE", "ServiceContext", "invitationsManager", "kind", "Kind", "SPACE", "share", "deviceProfile", "join", "Context", "createCredentialSignerWithChain", "CredentialGenerator", "failUndefined", "EchoHost", "MetadataStore", "SnapshotStore", "SpaceManager", "valueEncoding", "FeedFactory", "FeedStore", "Keyring", "createTestLevel", "MemorySignalManager", "MemorySignalManagerContext", "MemoryTransportFactory", "
|
|
4
|
+
"sourcesContent": ["//\n// Copyright 2023 DXOS.org\n//\n\nimport { createCredential } from '@dxos/credentials';\nimport { type Signer } from '@dxos/crypto';\nimport { PublicKey } from '@dxos/keys';\nimport { type Credential } from '@dxos/protocols/proto/dxos/halo/credentials';\n\nexport const createMockCredential = async ({\n signer,\n issuer,\n}: {\n signer: Signer;\n issuer: PublicKey;\n}): Promise<Credential> =>\n createCredential({\n signer,\n issuer,\n subject: new PublicKey(Buffer.from('test')),\n assertion: {\n '@type': 'example.testing.rpc.MessageWithAny',\n payload: {\n '@type': 'google.protobuf.Any',\n value: Buffer.from('test'),\n },\n },\n });\n", "//\n// Copyright 2023 DXOS.org\n//\n\nimport { Trigger } from '@dxos/async';\nimport { InvitationEncoder, type AuthenticatingInvitation, type CancellableInvitation } from '@dxos/client-protocol';\nimport { invariant } from '@dxos/invariant';\nimport { Invitation } from '@dxos/protocols/proto/dxos/client/services';\nimport { type DeviceProfileDocument } from '@dxos/protocols/proto/dxos/halo/credentials';\n\nimport { ServiceContext } from '../services';\n\n/**\n * Strip secrets from invitation before giving it to the peer.\n */\nexport const sanitizeInvitation = (invitation: Invitation): Invitation => {\n return InvitationEncoder.decode(InvitationEncoder.encode(invitation));\n};\n\nexport type InvitationHost = {\n share(options?: Partial<Invitation>): CancellableInvitation;\n};\n\nexport type InvitationGuest = {\n join(invitation: Invitation | string, deviceProfile?: DeviceProfileDocument): AuthenticatingInvitation;\n};\n\nexport type PerformInvitationCallbacks<T> = {\n onConnecting?: (value: T) => boolean | void;\n onConnected?: (value: T) => boolean | void;\n onReady?: (value: T) => boolean | void;\n onAuthenticating?: (value: T) => boolean | void;\n onSuccess?: (value: T) => boolean | void;\n onCancelled?: (value: T) => boolean | void;\n onTimeout?: (value: T) => boolean | void;\n onError?: (value: T) => boolean | void;\n};\n\nexport type PerformInvitationParams = {\n host: ServiceContext | InvitationHost;\n guest: ServiceContext | InvitationGuest;\n options?: Partial<Invitation>;\n hooks?: {\n host?: PerformInvitationCallbacks<CancellableInvitation>;\n guest?: PerformInvitationCallbacks<AuthenticatingInvitation>;\n };\n guestDeviceProfile?: DeviceProfileDocument;\n codeInputDelay?: number;\n};\n\nexport type Result = { invitation?: Invitation; error?: Error };\n\nexport const performInvitation = ({\n host,\n guest,\n options,\n hooks,\n guestDeviceProfile,\n codeInputDelay,\n}: PerformInvitationParams): [Promise<Result>, Promise<Result>] => {\n let guestError = false;\n let guestConnected = false;\n const hostComplete = new Trigger<Result>();\n const guestComplete = new Trigger<Result>();\n const authCode = new Trigger<string>();\n\n void createInvitation(host, options).then((hostObservable) => {\n hostObservable.subscribe(\n async (hostInvitation: Invitation) => {\n switch (hostInvitation.state) {\n case Invitation.State.CONNECTING: {\n if (guestConnected) {\n break;\n }\n guestConnected = true;\n if (hooks?.host?.onConnecting?.(hostObservable)) {\n break;\n }\n const guestObservable = acceptInvitation(guest, hostInvitation, guestDeviceProfile);\n guestObservable.subscribe(\n async (guestInvitation: Invitation) => {\n switch (guestInvitation.state) {\n case Invitation.State.CONNECTING: {\n if (hooks?.guest?.onConnecting?.(guestObservable)) {\n break;\n }\n invariant(hostInvitation.swarmKey!.equals(guestInvitation.swarmKey!));\n break;\n }\n\n case Invitation.State.CONNECTED: {\n hooks?.guest?.onConnected?.(guestObservable);\n break;\n }\n\n case Invitation.State.READY_FOR_AUTHENTICATION: {\n if (hooks?.guest?.onReady?.(guestObservable)) {\n break;\n }\n const code = await authCode.wait();\n if (codeInputDelay == null) {\n await guestObservable.authenticate(code);\n } else {\n setTimeout(async () => {\n if (!guestError) {\n await guestObservable.authenticate(code);\n }\n }, codeInputDelay);\n }\n break;\n }\n\n case Invitation.State.AUTHENTICATING: {\n hooks?.guest?.onAuthenticating?.(guestObservable);\n break;\n }\n\n case Invitation.State.SUCCESS: {\n if (hooks?.guest?.onSuccess?.(guestObservable)) {\n break;\n }\n guestComplete.wake({ invitation: guestInvitation });\n break;\n }\n\n case Invitation.State.CANCELLED: {\n if (hooks?.guest?.onCancelled?.(guestObservable)) {\n break;\n }\n guestComplete.wake({ invitation: guestInvitation });\n break;\n }\n\n case Invitation.State.TIMEOUT: {\n if (hooks?.guest?.onTimeout?.(guestObservable)) {\n return;\n }\n guestComplete.wake({ invitation: guestInvitation });\n }\n }\n },\n (error: Error) => {\n guestError = true;\n if (hooks?.guest?.onError?.(guestObservable)) {\n return;\n }\n guestComplete.wake({ error });\n },\n );\n break;\n }\n\n case Invitation.State.CONNECTED: {\n hooks?.host?.onConnected?.(hostObservable);\n break;\n }\n\n case Invitation.State.READY_FOR_AUTHENTICATION: {\n if (hooks?.host?.onReady?.(hostObservable)) {\n break;\n }\n if (hostInvitation.authCode) {\n authCode.wake(hostInvitation.authCode);\n }\n break;\n }\n\n case Invitation.State.AUTHENTICATING: {\n hooks?.host?.onAuthenticating?.(hostObservable);\n break;\n }\n\n case Invitation.State.SUCCESS: {\n if (hooks?.host?.onSuccess?.(hostObservable)) {\n break;\n }\n hostComplete.wake({ invitation: hostInvitation });\n break;\n }\n\n case Invitation.State.CANCELLED: {\n if (hooks?.host?.onCancelled?.(hostObservable)) {\n break;\n }\n hostComplete.wake({ invitation: hostInvitation });\n break;\n }\n\n case Invitation.State.TIMEOUT: {\n if (hooks?.host?.onTimeout?.(hostObservable)) {\n break;\n }\n hostComplete.wake({ invitation: hostInvitation });\n break;\n }\n }\n },\n (error: Error) => {\n if (hooks?.host?.onError?.(hostObservable)) {\n return;\n }\n hostComplete.wake({ error });\n },\n );\n });\n\n return [hostComplete.wait(), guestComplete.wait()];\n};\n\nconst createInvitation = async (\n host: ServiceContext | InvitationHost,\n options?: Partial<Invitation>,\n): Promise<CancellableInvitation> => {\n options ??= {\n authMethod: Invitation.AuthMethod.NONE,\n ...(options ?? {}),\n };\n\n if (host instanceof ServiceContext) {\n return host.invitationsManager.createInvitation({\n kind: Invitation.Kind.SPACE,\n ...options,\n });\n }\n\n return host.share(options);\n};\n\nconst acceptInvitation = (\n guest: ServiceContext | InvitationGuest,\n invitation: Invitation,\n guestDeviceProfile?: DeviceProfileDocument,\n): AuthenticatingInvitation => {\n invitation = sanitizeInvitation(invitation);\n\n if (guest instanceof ServiceContext) {\n return guest.invitationsManager.acceptInvitation({\n invitation,\n deviceProfile: guestDeviceProfile,\n });\n }\n\n return guest.join(invitation, guestDeviceProfile);\n};\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type Config } from '@dxos/config';\nimport { Context } from '@dxos/context';\nimport { createCredentialSignerWithChain, CredentialGenerator } from '@dxos/credentials';\nimport { failUndefined } from '@dxos/debug';\nimport { EchoHost } from '@dxos/echo-db';\nimport { MetadataStore, SnapshotStore, SpaceManager, valueEncoding } from '@dxos/echo-pipeline';\nimport { FeedFactory, FeedStore } from '@dxos/feed-store';\nimport { Keyring } from '@dxos/keyring';\nimport { type LevelDB } from '@dxos/kv-store';\nimport { createTestLevel } from '@dxos/kv-store/testing';\nimport { MemorySignalManager, MemorySignalManagerContext } from '@dxos/messaging';\nimport { MemoryTransportFactory, SwarmNetworkManager } from '@dxos/network-manager';\nimport { Invitation } from '@dxos/protocols/proto/dxos/client/services';\nimport { createStorage, StorageType, type Storage } from '@dxos/random-access-storage';\nimport { BlobStore } from '@dxos/teleport-extension-object-sync';\n\nimport { InvitationsHandler, InvitationsManager, SpaceInvitationProtocol } from '../invitations';\nimport { ClientServicesHost, ServiceContext } from '../services';\nimport { DataSpaceManager, type SigningContext } from '../spaces';\n\n//\n// TODO(burdon): Replace with test builder.\n//\n\nexport const createServiceHost = (config: Config, signalManagerContext: MemorySignalManagerContext) => {\n return new ClientServicesHost({\n config,\n signalManager: new MemorySignalManager(signalManagerContext),\n transportFactory: MemoryTransportFactory,\n });\n};\n\nexport const createServiceContext = async ({\n signalContext = new MemorySignalManagerContext(),\n storage = createStorage({ type: StorageType.RAM }),\n}: {\n signalContext?: MemorySignalManagerContext;\n storage?: Storage;\n} = {}) => {\n const signalManager = new MemorySignalManager(signalContext);\n const networkManager = new SwarmNetworkManager({\n signalManager,\n transportFactory: MemoryTransportFactory,\n });\n const level = createTestLevel();\n await level.open();\n\n return new ServiceContext(storage, level, networkManager, signalManager, {\n invitationConnectionDefaultParams: { controlHeartbeatInterval: 200 },\n });\n};\n\nexport const createPeers = async (numPeers: number) => {\n const signalContext = new MemorySignalManagerContext();\n\n return await Promise.all(\n Array.from(Array(numPeers)).map(async () => {\n const peer = await createServiceContext({ signalContext });\n await peer.open(new Context());\n return peer;\n }),\n );\n};\n\nexport const createIdentity = async (peer: ServiceContext) => {\n await peer.createIdentity();\n return peer;\n};\n\nexport class TestBuilder {\n public readonly signalContext = new MemorySignalManagerContext();\n private readonly _ctx = new Context();\n\n createPeer(peerOptions?: TestPeerOpts): TestPeer {\n const peer = new TestPeer(this.signalContext, peerOptions);\n this._ctx.onDispose(async () => peer.destroy());\n return peer;\n }\n\n async destroy() {\n await this._ctx.dispose();\n }\n}\n\nexport type TestPeerOpts = {\n dataStore?: StorageType;\n};\n\nexport type TestPeerProps = {\n storage?: Storage;\n level?: LevelDB;\n feedStore?: FeedStore<any>;\n metadataStore?: MetadataStore;\n keyring?: Keyring;\n networkManager?: SwarmNetworkManager;\n spaceManager?: SpaceManager;\n dataSpaceManager?: DataSpaceManager;\n snapshotStore?: SnapshotStore;\n signingContext?: SigningContext;\n blobStore?: BlobStore;\n echoHost?: EchoHost;\n invitationsManager?: InvitationsManager;\n};\n\nexport class TestPeer {\n private _props: TestPeerProps = {};\n\n constructor(\n private readonly signalContext: MemorySignalManagerContext,\n private readonly opts: TestPeerOpts = { dataStore: StorageType.RAM },\n ) {}\n\n get props() {\n return this._props;\n }\n\n get storage() {\n return (this._props.storage ??= createStorage({ type: this.opts.dataStore }));\n }\n\n get keyring() {\n return (this._props.keyring ??= new Keyring(this.storage.createDirectory('keyring')));\n }\n\n get level() {\n return (this._props.level ??= createTestLevel());\n }\n\n get feedStore() {\n return (this._props.feedStore ??= new FeedStore({\n factory: new FeedFactory({\n root: this.storage.createDirectory('feeds'),\n signer: this.keyring,\n hypercore: {\n valueEncoding,\n },\n }),\n }));\n }\n\n get metadataStore() {\n return (this._props.metadataStore ??= new MetadataStore(this.storage.createDirectory('metadata')));\n }\n\n get blobStore() {\n return (this._props.blobStore ??= new BlobStore(this.storage.createDirectory('blobs')));\n }\n\n get snapshotStore() {\n return (this._props.snapshotStore ??= new SnapshotStore(this.storage.createDirectory('snapshots')));\n }\n\n get networkManager() {\n return (this._props.networkManager ??= new SwarmNetworkManager({\n signalManager: new MemorySignalManager(this.signalContext),\n transportFactory: MemoryTransportFactory,\n }));\n }\n\n get spaceManager() {\n return (this._props.spaceManager ??= new SpaceManager({\n feedStore: this.feedStore,\n networkManager: this.networkManager,\n metadataStore: this.metadataStore,\n snapshotStore: this.snapshotStore,\n blobStore: this.blobStore,\n }));\n }\n\n get identity() {\n return this._props.signingContext ?? failUndefined();\n }\n\n get echoHost() {\n return (this._props.echoHost ??= new EchoHost({\n kv: this.level,\n storage: this.storage,\n }));\n }\n\n get dataSpaceManager(): DataSpaceManager {\n return (this._props.dataSpaceManager ??= new DataSpaceManager(\n this.spaceManager,\n this.metadataStore,\n this.keyring,\n this.identity,\n this.feedStore,\n this.echoHost,\n this.invitationsManager,\n ));\n }\n\n get invitationsManager() {\n return (this._props.invitationsManager ??= new InvitationsManager(\n new InvitationsHandler(this.networkManager),\n (invitation) => {\n if (invitation.kind === Invitation.Kind.SPACE) {\n return new SpaceInvitationProtocol(this.dataSpaceManager, this.identity!, this.keyring, invitation.spaceKey!);\n } else {\n throw new Error('not implemented');\n }\n },\n this.metadataStore,\n ));\n }\n\n async createIdentity() {\n this._props.signingContext ??= await createSigningContext(this.keyring);\n }\n\n async destroy() {\n await this.level.close();\n await this.storage.reset();\n }\n}\n\nexport const createSigningContext = async (keyring: Keyring): Promise<SigningContext> => {\n const identityKey = await keyring.createKey();\n const deviceKey = await keyring.createKey();\n\n return {\n identityKey,\n deviceKey,\n credentialSigner: createCredentialSignerWithChain(\n keyring,\n {\n credential: await new CredentialGenerator(keyring, identityKey, deviceKey).createDeviceAuthorization(deviceKey),\n },\n deviceKey,\n ),\n recordCredential: async () => {}, // No-op.\n getProfile: () => undefined,\n };\n};\n"],
|
|
5
|
+
"mappings": ";;;;;;;;;;;;AAIA,SAASA,wBAAwB;AAEjC,SAASC,iBAAiB;AAGnB,IAAMC,uBAAuB,OAAO,EACzCC,QACAC,OAAM,MAKNC,iBAAiB;EACfF;EACAC;EACAE,SAAS,IAAIC,UAAUC,OAAOC,KAAK,MAAA,CAAA;EACnCC,WAAW;IACT,SAAS;IACTC,SAAS;MACP,SAAS;MACTC,OAAOJ,OAAOC,KAAK,MAAA;IACrB;EACF;AACF,CAAA;;;ACvBF,SAASI,eAAe;AACxB,SAASC,yBAAoF;AAC7F,SAASC,iBAAiB;AAC1B,SAASC,kBAAkB;;AAQpB,IAAMC,qBAAqB,CAACC,eAAAA;AACjC,SAAOC,kBAAkBC,OAAOD,kBAAkBE,OAAOH,UAAAA,CAAAA;AAC3D;AAmCO,IAAMI,oBAAoB,CAAC,EAChCC,MACAC,OACAC,SACAC,OACAC,oBACAC,eAAc,MACU;AACxB,MAAIC,aAAa;AACjB,MAAIC,iBAAiB;AACrB,QAAMC,eAAe,IAAIC,QAAAA;AACzB,QAAMC,gBAAgB,IAAID,QAAAA;AAC1B,QAAME,WAAW,IAAIF,QAAAA;AAErB,OAAKG,iBAAiBZ,MAAME,OAAAA,EAASW,KAAK,CAACC,mBAAAA;AACzCA,mBAAeC,UACb,OAAOC,mBAAAA;AACL,cAAQA,eAAeC,OAAK;QAC1B,KAAKC,WAAWC,MAAMC,YAAY;AAChC,cAAIb,gBAAgB;AAClB;UACF;AACAA,2BAAiB;AACjB,cAAIJ,OAAOH,MAAMqB,eAAeP,cAAAA,GAAiB;AAC/C;UACF;AACA,gBAAMQ,kBAAkBC,iBAAiBtB,OAAOe,gBAAgBZ,kBAAAA;AAChEkB,0BAAgBP,UACd,OAAOS,oBAAAA;AACL,oBAAQA,gBAAgBP,OAAK;cAC3B,KAAKC,WAAWC,MAAMC,YAAY;AAChC,oBAAIjB,OAAOF,OAAOoB,eAAeC,eAAAA,GAAkB;AACjD;gBACF;AACAG,0BAAUT,eAAeU,SAAUC,OAAOH,gBAAgBE,QAAQ,GAAA,QAAA;;;;;;;;;AAClE;cACF;cAEA,KAAKR,WAAWC,MAAMS,WAAW;AAC/BzB,uBAAOF,OAAO4B,cAAcP,eAAAA;AAC5B;cACF;cAEA,KAAKJ,WAAWC,MAAMW,0BAA0B;AAC9C,oBAAI3B,OAAOF,OAAO8B,UAAUT,eAAAA,GAAkB;AAC5C;gBACF;AACA,sBAAMU,OAAO,MAAMrB,SAASsB,KAAI;AAChC,oBAAI5B,kBAAkB,MAAM;AAC1B,wBAAMiB,gBAAgBY,aAAaF,IAAAA;gBACrC,OAAO;AACLG,6BAAW,YAAA;AACT,wBAAI,CAAC7B,YAAY;AACf,4BAAMgB,gBAAgBY,aAAaF,IAAAA;oBACrC;kBACF,GAAG3B,cAAAA;gBACL;AACA;cACF;cAEA,KAAKa,WAAWC,MAAMiB,gBAAgB;AACpCjC,uBAAOF,OAAOoC,mBAAmBf,eAAAA;AACjC;cACF;cAEA,KAAKJ,WAAWC,MAAMmB,SAAS;AAC7B,oBAAInC,OAAOF,OAAOsC,YAAYjB,eAAAA,GAAkB;AAC9C;gBACF;AACAZ,8BAAc8B,KAAK;kBAAE7C,YAAY6B;gBAAgB,CAAA;AACjD;cACF;cAEA,KAAKN,WAAWC,MAAMsB,WAAW;AAC/B,oBAAItC,OAAOF,OAAOyC,cAAcpB,eAAAA,GAAkB;AAChD;gBACF;AACAZ,8BAAc8B,KAAK;kBAAE7C,YAAY6B;gBAAgB,CAAA;AACjD;cACF;cAEA,KAAKN,WAAWC,MAAMwB,SAAS;AAC7B,oBAAIxC,OAAOF,OAAO2C,YAAYtB,eAAAA,GAAkB;AAC9C;gBACF;AACAZ,8BAAc8B,KAAK;kBAAE7C,YAAY6B;gBAAgB,CAAA;cACnD;YACF;UACF,GACA,CAACqB,UAAAA;AACCvC,yBAAa;AACb,gBAAIH,OAAOF,OAAO6C,UAAUxB,eAAAA,GAAkB;AAC5C;YACF;AACAZ,0BAAc8B,KAAK;cAAEK;YAAM,CAAA;UAC7B,CAAA;AAEF;QACF;QAEA,KAAK3B,WAAWC,MAAMS,WAAW;AAC/BzB,iBAAOH,MAAM6B,cAAcf,cAAAA;AAC3B;QACF;QAEA,KAAKI,WAAWC,MAAMW,0BAA0B;AAC9C,cAAI3B,OAAOH,MAAM+B,UAAUjB,cAAAA,GAAiB;AAC1C;UACF;AACA,cAAIE,eAAeL,UAAU;AAC3BA,qBAAS6B,KAAKxB,eAAeL,QAAQ;UACvC;AACA;QACF;QAEA,KAAKO,WAAWC,MAAMiB,gBAAgB;AACpCjC,iBAAOH,MAAMqC,mBAAmBvB,cAAAA;AAChC;QACF;QAEA,KAAKI,WAAWC,MAAMmB,SAAS;AAC7B,cAAInC,OAAOH,MAAMuC,YAAYzB,cAAAA,GAAiB;AAC5C;UACF;AACAN,uBAAagC,KAAK;YAAE7C,YAAYqB;UAAe,CAAA;AAC/C;QACF;QAEA,KAAKE,WAAWC,MAAMsB,WAAW;AAC/B,cAAItC,OAAOH,MAAM0C,cAAc5B,cAAAA,GAAiB;AAC9C;UACF;AACAN,uBAAagC,KAAK;YAAE7C,YAAYqB;UAAe,CAAA;AAC/C;QACF;QAEA,KAAKE,WAAWC,MAAMwB,SAAS;AAC7B,cAAIxC,OAAOH,MAAM4C,YAAY9B,cAAAA,GAAiB;AAC5C;UACF;AACAN,uBAAagC,KAAK;YAAE7C,YAAYqB;UAAe,CAAA;AAC/C;QACF;MACF;IACF,GACA,CAAC6B,UAAAA;AACC,UAAI1C,OAAOH,MAAM8C,UAAUhC,cAAAA,GAAiB;AAC1C;MACF;AACAN,mBAAagC,KAAK;QAAEK;MAAM,CAAA;IAC5B,CAAA;EAEJ,CAAA;AAEA,SAAO;IAACrC,aAAayB,KAAI;IAAIvB,cAAcuB,KAAI;;AACjD;AAEA,IAAMrB,mBAAmB,OACvBZ,MACAE,YAAAA;AAEAA,cAAY;IACV6C,YAAY7B,WAAW8B,WAAWC;IAClC,GAAI/C,WAAW,CAAC;EAClB;AAEA,MAAIF,gBAAgBkD,gBAAgB;AAClC,WAAOlD,KAAKmD,mBAAmBvC,iBAAiB;MAC9CwC,MAAMlC,WAAWmC,KAAKC;MACtB,GAAGpD;IACL,CAAA;EACF;AAEA,SAAOF,KAAKuD,MAAMrD,OAAAA;AACpB;AAEA,IAAMqB,mBAAmB,CACvBtB,OACAN,YACAS,uBAAAA;AAEAT,eAAaD,mBAAmBC,UAAAA;AAEhC,MAAIM,iBAAiBiD,gBAAgB;AACnC,WAAOjD,MAAMkD,mBAAmB5B,iBAAiB;MAC/C5B;MACA6D,eAAepD;IACjB,CAAA;EACF;AAEA,SAAOH,MAAMwD,KAAK9D,YAAYS,kBAAAA;AAChC;;;AC9OA,SAASsD,eAAe;AACxB,SAASC,iCAAiCC,2BAA2B;AACrE,SAASC,qBAAqB;AAC9B,SAASC,gBAAgB;AACzB,SAASC,eAAeC,eAAeC,cAAcC,qBAAqB;AAC1E,SAASC,aAAaC,iBAAiB;AACvC,SAASC,eAAe;AAExB,SAASC,uBAAuB;AAChC,SAASC,qBAAqBC,kCAAkC;AAChE,SAASC,wBAAwBC,2BAA2B;AAC5D,SAASC,cAAAA,mBAAkB;AAC3B,SAASC,eAAeC,mBAAiC;AACzD,SAASC,iBAAiB;AAUnB,IAAMC,oBAAoB,CAACC,QAAgBC,yBAAAA;AAChD,SAAO,IAAIC,mBAAmB;IAC5BF;IACAG,eAAe,IAAIC,oBAAoBH,oBAAAA;IACvCI,kBAAkBC;EACpB,CAAA;AACF;AAEO,IAAMC,uBAAuB,OAAO,EACzCC,gBAAgB,IAAIC,2BAAAA,GACpBC,UAAUC,cAAc;EAAEC,MAAMC,YAAYC;AAAI,CAAA,EAAE,IAIhD,CAAC,MAAC;AACJ,QAAMX,gBAAgB,IAAIC,oBAAoBI,aAAAA;AAC9C,QAAMO,iBAAiB,IAAIC,oBAAoB;IAC7Cb;IACAE,kBAAkBC;EACpB,CAAA;AACA,QAAMW,QAAQC,gBAAAA;AACd,QAAMD,MAAME,KAAI;AAEhB,SAAO,IAAIC,eAAeV,SAASO,OAAOF,gBAAgBZ,eAAe;IACvEkB,mCAAmC;MAAEC,0BAA0B;IAAI;EACrE,CAAA;AACF;AAEO,IAAMC,cAAc,OAAOC,aAAAA;AAChC,QAAMhB,gBAAgB,IAAIC,2BAAAA;AAE1B,SAAO,MAAMgB,QAAQC,IACnBC,MAAMC,KAAKD,MAAMH,QAAAA,CAAAA,EAAWK,IAAI,YAAA;AAC9B,UAAMC,OAAO,MAAMvB,qBAAqB;MAAEC;IAAc,CAAA;AACxD,UAAMsB,KAAKX,KAAK,IAAIY,QAAAA,CAAAA;AACpB,WAAOD;EACT,CAAA,CAAA;AAEJ;AAEO,IAAME,iBAAiB,OAAOF,SAAAA;AACnC,QAAMA,KAAKE,eAAc;AACzB,SAAOF;AACT;AAEO,IAAMG,cAAN,MAAMA;EAAN;AACWzB,yBAAgB,IAAIC,2BAAAA;AACnByB,gBAAO,IAAIH,QAAAA;;EAE5BI,WAAWC,aAAsC;AAC/C,UAAMN,OAAO,IAAIO,SAAS,KAAK7B,eAAe4B,WAAAA;AAC9C,SAAKF,KAAKI,UAAU,YAAYR,KAAKS,QAAO,CAAA;AAC5C,WAAOT;EACT;EAEA,MAAMS,UAAU;AACd,UAAM,KAAKL,KAAKM,QAAO;EACzB;AACF;AAsBO,IAAMH,WAAN,MAAMA;EAGXI,YACmBjC,eACAkC,OAAqB;IAAEC,WAAW9B,YAAYC;EAAI,GACnE;SAFiBN,gBAAAA;SACAkC,OAAAA;SAJXE,SAAwB,CAAC;EAK9B;EAEH,IAAIC,QAAQ;AACV,WAAO,KAAKD;EACd;EAEA,IAAIlC,UAAU;AACZ,WAAQ,KAAKkC,OAAOlC,YAAYC,cAAc;MAAEC,MAAM,KAAK8B,KAAKC;IAAU,CAAA;EAC5E;EAEA,IAAIG,UAAU;AACZ,WAAQ,KAAKF,OAAOE,YAAY,IAAIC,QAAQ,KAAKrC,QAAQsC,gBAAgB,SAAA,CAAA;EAC3E;EAEA,IAAI/B,QAAQ;AACV,WAAQ,KAAK2B,OAAO3B,UAAUC,gBAAAA;EAChC;EAEA,IAAI+B,YAAY;AACd,WAAQ,KAAKL,OAAOK,cAAc,IAAIC,UAAU;MAC9CC,SAAS,IAAIC,YAAY;QACvBC,MAAM,KAAK3C,QAAQsC,gBAAgB,OAAA;QACnCM,QAAQ,KAAKR;QACbS,WAAW;UACTC;QACF;MACF,CAAA;IACF,CAAA;EACF;EAEA,IAAIC,gBAAgB;AAClB,WAAQ,KAAKb,OAAOa,kBAAkB,IAAIC,cAAc,KAAKhD,QAAQsC,gBAAgB,UAAA,CAAA;EACvF;EAEA,IAAIW,YAAY;AACd,WAAQ,KAAKf,OAAOe,cAAc,IAAIC,UAAU,KAAKlD,QAAQsC,gBAAgB,OAAA,CAAA;EAC/E;EAEA,IAAIa,gBAAgB;AAClB,WAAQ,KAAKjB,OAAOiB,kBAAkB,IAAIC,cAAc,KAAKpD,QAAQsC,gBAAgB,WAAA,CAAA;EACvF;EAEA,IAAIjC,iBAAiB;AACnB,WAAQ,KAAK6B,OAAO7B,mBAAmB,IAAIC,oBAAoB;MAC7Db,eAAe,IAAIC,oBAAoB,KAAKI,aAAa;MACzDH,kBAAkBC;IACpB,CAAA;EACF;EAEA,IAAIyD,eAAe;AACjB,WAAQ,KAAKnB,OAAOmB,iBAAiB,IAAIC,aAAa;MACpDf,WAAW,KAAKA;MAChBlC,gBAAgB,KAAKA;MACrB0C,eAAe,KAAKA;MACpBI,eAAe,KAAKA;MACpBF,WAAW,KAAKA;IAClB,CAAA;EACF;EAEA,IAAIM,WAAW;AACb,WAAO,KAAKrB,OAAOsB,kBAAkBC,cAAAA;EACvC;EAEA,IAAIC,WAAW;AACb,WAAQ,KAAKxB,OAAOwB,aAAa,IAAIC,SAAS;MAC5CC,IAAI,KAAKrD;MACTP,SAAS,KAAKA;IAChB,CAAA;EACF;EAEA,IAAI6D,mBAAqC;AACvC,WAAQ,KAAK3B,OAAO2B,qBAAqB,IAAIC,iBAC3C,KAAKT,cACL,KAAKN,eACL,KAAKX,SACL,KAAKmB,UACL,KAAKhB,WACL,KAAKmB,UACL,KAAKK,kBAAkB;EAE3B;EAEA,IAAIA,qBAAqB;AACvB,WAAQ,KAAK7B,OAAO6B,uBAAuB,IAAIC,mBAC7C,IAAIC,mBAAmB,KAAK5D,cAAc,GAC1C,CAAC6D,eAAAA;AACC,UAAIA,WAAWC,SAASC,YAAWC,KAAKC,OAAO;AAC7C,eAAO,IAAIC,wBAAwB,KAAKV,kBAAkB,KAAKN,UAAW,KAAKnB,SAAS8B,WAAWM,QAAQ;MAC7G,OAAO;AACL,cAAM,IAAIC,MAAM,iBAAA;MAClB;IACF,GACA,KAAK1B,aAAa;EAEtB;EAEA,MAAMzB,iBAAiB;AACrB,SAAKY,OAAOsB,mBAAmB,MAAMkB,qBAAqB,KAAKtC,OAAO;EACxE;EAEA,MAAMP,UAAU;AACd,UAAM,KAAKtB,MAAMoE,MAAK;AACtB,UAAM,KAAK3E,QAAQ4E,MAAK;EAC1B;AACF;AAEO,IAAMF,uBAAuB,OAAOtC,YAAAA;AACzC,QAAMyC,cAAc,MAAMzC,QAAQ0C,UAAS;AAC3C,QAAMC,YAAY,MAAM3C,QAAQ0C,UAAS;AAEzC,SAAO;IACLD;IACAE;IACAC,kBAAkBC,gCAChB7C,SACA;MACE8C,YAAY,MAAM,IAAIC,oBAAoB/C,SAASyC,aAAaE,SAAAA,EAAWK,0BAA0BL,SAAAA;IACvG,GACAA,SAAAA;IAEFM,kBAAkB,YAAA;IAAa;IAC/BC,YAAY,MAAMC;EACpB;AACF;",
|
|
6
|
+
"names": ["createCredential", "PublicKey", "createMockCredential", "signer", "issuer", "createCredential", "subject", "PublicKey", "Buffer", "from", "assertion", "payload", "value", "Trigger", "InvitationEncoder", "invariant", "Invitation", "sanitizeInvitation", "invitation", "InvitationEncoder", "decode", "encode", "performInvitation", "host", "guest", "options", "hooks", "guestDeviceProfile", "codeInputDelay", "guestError", "guestConnected", "hostComplete", "Trigger", "guestComplete", "authCode", "createInvitation", "then", "hostObservable", "subscribe", "hostInvitation", "state", "Invitation", "State", "CONNECTING", "onConnecting", "guestObservable", "acceptInvitation", "guestInvitation", "invariant", "swarmKey", "equals", "CONNECTED", "onConnected", "READY_FOR_AUTHENTICATION", "onReady", "code", "wait", "authenticate", "setTimeout", "AUTHENTICATING", "onAuthenticating", "SUCCESS", "onSuccess", "wake", "CANCELLED", "onCancelled", "TIMEOUT", "onTimeout", "error", "onError", "authMethod", "AuthMethod", "NONE", "ServiceContext", "invitationsManager", "kind", "Kind", "SPACE", "share", "deviceProfile", "join", "Context", "createCredentialSignerWithChain", "CredentialGenerator", "failUndefined", "EchoHost", "MetadataStore", "SnapshotStore", "SpaceManager", "valueEncoding", "FeedFactory", "FeedStore", "Keyring", "createTestLevel", "MemorySignalManager", "MemorySignalManagerContext", "MemoryTransportFactory", "SwarmNetworkManager", "Invitation", "createStorage", "StorageType", "BlobStore", "createServiceHost", "config", "signalManagerContext", "ClientServicesHost", "signalManager", "MemorySignalManager", "transportFactory", "MemoryTransportFactory", "createServiceContext", "signalContext", "MemorySignalManagerContext", "storage", "createStorage", "type", "StorageType", "RAM", "networkManager", "SwarmNetworkManager", "level", "createTestLevel", "open", "ServiceContext", "invitationConnectionDefaultParams", "controlHeartbeatInterval", "createPeers", "numPeers", "Promise", "all", "Array", "from", "map", "peer", "Context", "createIdentity", "TestBuilder", "_ctx", "createPeer", "peerOptions", "TestPeer", "onDispose", "destroy", "dispose", "constructor", "opts", "dataStore", "_props", "props", "keyring", "Keyring", "createDirectory", "feedStore", "FeedStore", "factory", "FeedFactory", "root", "signer", "hypercore", "valueEncoding", "metadataStore", "MetadataStore", "blobStore", "BlobStore", "snapshotStore", "SnapshotStore", "spaceManager", "SpaceManager", "identity", "signingContext", "failUndefined", "echoHost", "EchoHost", "kv", "dataSpaceManager", "DataSpaceManager", "invitationsManager", "InvitationsManager", "InvitationsHandler", "invitation", "kind", "Invitation", "Kind", "SPACE", "SpaceInvitationProtocol", "spaceKey", "Error", "createSigningContext", "close", "reset", "identityKey", "createKey", "deviceKey", "credentialSigner", "createCredentialSignerWithChain", "credential", "CredentialGenerator", "createDeviceAuthorization", "recordCredential", "getProfile", "undefined"]
|
|
7
7
|
}
|
|
@@ -26,8 +26,8 @@ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__ge
|
|
|
26
26
|
mod
|
|
27
27
|
));
|
|
28
28
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
|
-
var
|
|
30
|
-
__export(
|
|
29
|
+
var chunk_ELQ5XXZX_exports = {};
|
|
30
|
+
__export(chunk_ELQ5XXZX_exports, {
|
|
31
31
|
ClientRpcServer: () => ClientRpcServer,
|
|
32
32
|
ClientServicesHost: () => ClientServicesHost,
|
|
33
33
|
ClientServicesProviderResource: () => ClientServicesProviderResource,
|
|
@@ -67,7 +67,7 @@ __export(chunk_OR7LRWDY_exports, {
|
|
|
67
67
|
subscribeToSpaces: () => subscribeToSpaces,
|
|
68
68
|
subscribeToSwarmInfo: () => subscribeToSwarmInfo
|
|
69
69
|
});
|
|
70
|
-
module.exports = __toCommonJS(
|
|
70
|
+
module.exports = __toCommonJS(chunk_ELQ5XXZX_exports);
|
|
71
71
|
var import_async = require("@dxos/async");
|
|
72
72
|
var import_codec_protobuf = require("@dxos/codec-protobuf");
|
|
73
73
|
var import_feed_store = require("@dxos/feed-store");
|
|
@@ -3776,11 +3776,14 @@ var DataSpace = class {
|
|
|
3776
3776
|
state: import_services9.SpaceState[this._state]
|
|
3777
3777
|
}, {
|
|
3778
3778
|
F: __dxlog_file13,
|
|
3779
|
-
L:
|
|
3779
|
+
L: 142,
|
|
3780
3780
|
S: this,
|
|
3781
3781
|
C: (f, a) => f(...a)
|
|
3782
3782
|
});
|
|
3783
3783
|
}
|
|
3784
|
+
get id() {
|
|
3785
|
+
return this._inner.id;
|
|
3786
|
+
}
|
|
3784
3787
|
get key() {
|
|
3785
3788
|
return this._inner.key;
|
|
3786
3789
|
}
|
|
@@ -3826,7 +3829,7 @@ var DataSpace = class {
|
|
|
3826
3829
|
state: import_services9.SpaceState[this._state]
|
|
3827
3830
|
}, {
|
|
3828
3831
|
F: __dxlog_file13,
|
|
3829
|
-
L:
|
|
3832
|
+
L: 205,
|
|
3830
3833
|
S: this,
|
|
3831
3834
|
C: (f, a) => f(...a)
|
|
3832
3835
|
});
|
|
@@ -3844,7 +3847,7 @@ var DataSpace = class {
|
|
|
3844
3847
|
state: import_services9.SpaceState[this._state]
|
|
3845
3848
|
}, {
|
|
3846
3849
|
F: __dxlog_file13,
|
|
3847
|
-
L:
|
|
3850
|
+
L: 219,
|
|
3848
3851
|
S: this,
|
|
3849
3852
|
C: (f, a) => f(...a)
|
|
3850
3853
|
});
|
|
@@ -3876,7 +3879,7 @@ var DataSpace = class {
|
|
|
3876
3879
|
if (err instanceof import_protocols8.CancelledError || err instanceof import_context9.ContextDisposedError) {
|
|
3877
3880
|
(0, import_log10.log)("data pipeline initialization cancelled", err, {
|
|
3878
3881
|
F: __dxlog_file13,
|
|
3879
|
-
L:
|
|
3882
|
+
L: 252,
|
|
3880
3883
|
S: this,
|
|
3881
3884
|
C: (f, a) => f(...a)
|
|
3882
3885
|
});
|
|
@@ -3884,7 +3887,7 @@ var DataSpace = class {
|
|
|
3884
3887
|
}
|
|
3885
3888
|
import_log10.log.error("Error initializing data pipeline", err, {
|
|
3886
3889
|
F: __dxlog_file13,
|
|
3887
|
-
L:
|
|
3890
|
+
L: 256,
|
|
3888
3891
|
S: this,
|
|
3889
3892
|
C: (f, a) => f(...a)
|
|
3890
3893
|
});
|
|
@@ -3893,7 +3896,7 @@ var DataSpace = class {
|
|
|
3893
3896
|
state: import_services9.SpaceState[this._state]
|
|
3894
3897
|
}, {
|
|
3895
3898
|
F: __dxlog_file13,
|
|
3896
|
-
L:
|
|
3899
|
+
L: 258,
|
|
3897
3900
|
S: this,
|
|
3898
3901
|
C: (f, a) => f(...a)
|
|
3899
3902
|
});
|
|
@@ -3913,7 +3916,7 @@ var DataSpace = class {
|
|
|
3913
3916
|
state: import_services9.SpaceState[this._state]
|
|
3914
3917
|
}, {
|
|
3915
3918
|
F: __dxlog_file13,
|
|
3916
|
-
L:
|
|
3919
|
+
L: 274,
|
|
3917
3920
|
S: this,
|
|
3918
3921
|
C: (f, a) => f(...a)
|
|
3919
3922
|
});
|
|
@@ -3923,7 +3926,7 @@ var DataSpace = class {
|
|
|
3923
3926
|
await (0, import_context9.cancelWithContext)(this._ctx, this.automergeSpaceState.ensureEpochInitialized());
|
|
3924
3927
|
(0, import_log10.log)("data pipeline ready", void 0, {
|
|
3925
3928
|
F: __dxlog_file13,
|
|
3926
|
-
L:
|
|
3929
|
+
L: 286,
|
|
3927
3930
|
S: this,
|
|
3928
3931
|
C: (f, a) => f(...a)
|
|
3929
3932
|
});
|
|
@@ -3933,7 +3936,7 @@ var DataSpace = class {
|
|
|
3933
3936
|
state: import_services9.SpaceState[this._state]
|
|
3934
3937
|
}, {
|
|
3935
3938
|
F: __dxlog_file13,
|
|
3936
|
-
L:
|
|
3939
|
+
L: 290,
|
|
3937
3940
|
S: this,
|
|
3938
3941
|
C: (f, a) => f(...a)
|
|
3939
3942
|
});
|
|
@@ -3949,7 +3952,7 @@ var DataSpace = class {
|
|
|
3949
3952
|
await this._createWritableFeeds();
|
|
3950
3953
|
(0, import_log10.log)("writable feeds created", void 0, {
|
|
3951
3954
|
F: __dxlog_file13,
|
|
3952
|
-
L:
|
|
3955
|
+
L: 306,
|
|
3953
3956
|
S: this,
|
|
3954
3957
|
C: (f, a) => f(...a)
|
|
3955
3958
|
});
|
|
@@ -4012,7 +4015,7 @@ var DataSpace = class {
|
|
|
4012
4015
|
rootUrl
|
|
4013
4016
|
}, {
|
|
4014
4017
|
F: __dxlog_file13,
|
|
4015
|
-
L:
|
|
4018
|
+
L: 372,
|
|
4016
4019
|
S: this,
|
|
4017
4020
|
C: (f, a) => f(...a)
|
|
4018
4021
|
});
|
|
@@ -4042,7 +4045,7 @@ var DataSpace = class {
|
|
|
4042
4045
|
rootUrl
|
|
4043
4046
|
}, {
|
|
4044
4047
|
F: __dxlog_file13,
|
|
4045
|
-
L:
|
|
4048
|
+
L: 399,
|
|
4046
4049
|
S: this,
|
|
4047
4050
|
C: (f, a) => f(...a)
|
|
4048
4051
|
});
|
|
@@ -4057,7 +4060,7 @@ var DataSpace = class {
|
|
|
4057
4060
|
err
|
|
4058
4061
|
}, {
|
|
4059
4062
|
F: __dxlog_file13,
|
|
4060
|
-
L:
|
|
4063
|
+
L: 405,
|
|
4061
4064
|
S: this,
|
|
4062
4065
|
C: (f, a) => f(...a)
|
|
4063
4066
|
});
|
|
@@ -4112,7 +4115,7 @@ var DataSpace = class {
|
|
|
4112
4115
|
const newRoot = this._echoHost.automergeRepo.create(rootHandle.docSync());
|
|
4113
4116
|
(0, import_invariant11.invariant)(typeof newRoot.url === "string" && newRoot.url.length > 0, void 0, {
|
|
4114
4117
|
F: __dxlog_file13,
|
|
4115
|
-
L:
|
|
4118
|
+
L: 455,
|
|
4116
4119
|
S: this,
|
|
4117
4120
|
A: [
|
|
4118
4121
|
"typeof newRoot.url === 'string' && newRoot.url.length > 0",
|
|
@@ -4131,7 +4134,7 @@ var DataSpace = class {
|
|
|
4131
4134
|
{
|
|
4132
4135
|
import_log10.log.info("Fragmenting", void 0, {
|
|
4133
4136
|
F: __dxlog_file13,
|
|
4134
|
-
L:
|
|
4137
|
+
L: 467,
|
|
4135
4138
|
S: this,
|
|
4136
4139
|
C: (f, a) => f(...a)
|
|
4137
4140
|
});
|
|
@@ -4143,7 +4146,7 @@ var DataSpace = class {
|
|
|
4143
4146
|
const otherObjects = objects.filter(([key]) => key !== properties?.[0]);
|
|
4144
4147
|
(0, import_invariant11.invariant)(properties, "Properties not found", {
|
|
4145
4148
|
F: __dxlog_file13,
|
|
4146
|
-
L:
|
|
4149
|
+
L: 477,
|
|
4147
4150
|
S: this,
|
|
4148
4151
|
A: [
|
|
4149
4152
|
"properties",
|
|
@@ -4159,14 +4162,14 @@ var DataSpace = class {
|
|
|
4159
4162
|
const newRoot = this._echoHost.automergeRepo.create(newSpaceDoc);
|
|
4160
4163
|
(0, import_invariant11.invariant)(typeof newRoot.url === "string" && newRoot.url.length > 0, void 0, {
|
|
4161
4164
|
F: __dxlog_file13,
|
|
4162
|
-
L:
|
|
4165
|
+
L: 482,
|
|
4163
4166
|
S: this,
|
|
4164
4167
|
A: [
|
|
4165
4168
|
"typeof newRoot.url === 'string' && newRoot.url.length > 0",
|
|
4166
4169
|
""
|
|
4167
4170
|
]
|
|
4168
4171
|
});
|
|
4169
|
-
const docLoader = new import_echo_pipeline2.AutomergeDocumentLoaderImpl(this.key, this._echoHost.automergeRepo);
|
|
4172
|
+
const docLoader = new import_echo_pipeline2.AutomergeDocumentLoaderImpl(await (0, import_echo_pipeline2.createIdFromSpaceKey)(this.key), this._echoHost.automergeRepo, this.key);
|
|
4170
4173
|
await docLoader.loadSpaceRootDocHandle(this._ctx, {
|
|
4171
4174
|
rootUrl: newRoot.url
|
|
4172
4175
|
});
|
|
@@ -4228,7 +4231,7 @@ var DataSpace = class {
|
|
|
4228
4231
|
state: import_services9.SpaceState[this._state]
|
|
4229
4232
|
}, {
|
|
4230
4233
|
F: __dxlog_file13,
|
|
4231
|
-
L:
|
|
4234
|
+
L: 552,
|
|
4232
4235
|
S: this,
|
|
4233
4236
|
C: (f, a) => f(...a)
|
|
4234
4237
|
});
|
|
@@ -4238,6 +4241,9 @@ var DataSpace = class {
|
|
|
4238
4241
|
_ts_decorate4([
|
|
4239
4242
|
import_tracing4.trace.info()
|
|
4240
4243
|
], DataSpace.prototype, "_inner", void 0);
|
|
4244
|
+
_ts_decorate4([
|
|
4245
|
+
import_tracing4.trace.info()
|
|
4246
|
+
], DataSpace.prototype, "id", null);
|
|
4241
4247
|
_ts_decorate4([
|
|
4242
4248
|
import_tracing4.trace.info()
|
|
4243
4249
|
], DataSpace.prototype, "key", null);
|
|
@@ -5017,6 +5023,7 @@ var SpacesServiceImpl = class {
|
|
|
5017
5023
|
}
|
|
5018
5024
|
_serializeSpace(space) {
|
|
5019
5025
|
return {
|
|
5026
|
+
id: space.id,
|
|
5020
5027
|
spaceKey: space.key,
|
|
5021
5028
|
state: space.state,
|
|
5022
5029
|
error: space.error ? (0, import_protocols11.encodeError)(space.error) : void 0,
|
|
@@ -5362,7 +5369,7 @@ var ServiceRegistry = class {
|
|
|
5362
5369
|
delete this._handlers[name];
|
|
5363
5370
|
}
|
|
5364
5371
|
};
|
|
5365
|
-
var DXOS_VERSION = "0.5.
|
|
5372
|
+
var DXOS_VERSION = "0.5.9-main.8359215";
|
|
5366
5373
|
var getPlatform = () => {
|
|
5367
5374
|
if (process.browser) {
|
|
5368
5375
|
if (typeof window !== "undefined") {
|
|
@@ -6055,7 +6062,7 @@ var ClientServicesHost = class {
|
|
|
6055
6062
|
"'network manager already set'"
|
|
6056
6063
|
]
|
|
6057
6064
|
});
|
|
6058
|
-
this._networkManager = new import_network_manager2.
|
|
6065
|
+
this._networkManager = new import_network_manager2.SwarmNetworkManager({
|
|
6059
6066
|
log: connectionLog,
|
|
6060
6067
|
transportFactory,
|
|
6061
6068
|
signalManager
|
|
@@ -6266,11 +6273,11 @@ var ClientServicesHost = class {
|
|
|
6266
6273
|
""
|
|
6267
6274
|
]
|
|
6268
6275
|
});
|
|
6269
|
-
const document =
|
|
6276
|
+
const document = this._serviceContext.echoHost.automergeRepo.find(automergeIndex);
|
|
6270
6277
|
await document.whenReady();
|
|
6271
6278
|
const properties = {
|
|
6272
6279
|
system: {
|
|
6273
|
-
type: (0, import_echo_protocol.encodeReference)((0, import_echo_schema2.getTypeReference)(import_client_protocol5.
|
|
6280
|
+
type: (0, import_echo_protocol.encodeReference)((0, import_echo_schema2.getTypeReference)(import_client_protocol5.PropertiesType))
|
|
6274
6281
|
},
|
|
6275
6282
|
data: {
|
|
6276
6283
|
[import_client_protocol5.defaultKey]: identity.identityKey.toHex()
|
|
@@ -6383,4 +6390,4 @@ var findConfigs = () => {
|
|
|
6383
6390
|
subscribeToSpaces,
|
|
6384
6391
|
subscribeToSwarmInfo
|
|
6385
6392
|
});
|
|
6386
|
-
//# sourceMappingURL=chunk-
|
|
6393
|
+
//# sourceMappingURL=chunk-ELQ5XXZX.cjs.map
|