@dxos/messaging 0.8.4-main.dedc0f3 → 0.8.4-main.e00bdcdb52
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/neutral/chunk-EC4H56J5.mjs +497 -0
- package/dist/lib/neutral/chunk-EC4H56J5.mjs.map +7 -0
- package/dist/lib/neutral/index.mjs +1249 -0
- package/dist/lib/neutral/index.mjs.map +7 -0
- package/dist/lib/neutral/meta.json +1 -0
- package/dist/lib/{browser → neutral}/testing/index.mjs +18 -46
- package/dist/lib/neutral/testing/index.mjs.map +7 -0
- package/dist/types/src/messenger-monitor.d.ts.map +1 -1
- package/dist/types/src/messenger.blueprint-test.d.ts +1 -1
- package/dist/types/src/messenger.blueprint-test.d.ts.map +1 -1
- package/dist/types/src/messenger.d.ts +3 -2
- package/dist/types/src/messenger.d.ts.map +1 -1
- package/dist/types/src/signal-client/signal-client-monitor.d.ts.map +1 -1
- package/dist/types/src/signal-client/signal-client.d.ts +5 -6
- package/dist/types/src/signal-client/signal-client.d.ts.map +1 -1
- package/dist/types/src/signal-client/signal-local-state.d.ts.map +1 -1
- package/dist/types/src/signal-client/signal-rpc-client-monitor.d.ts.map +1 -1
- package/dist/types/src/signal-client/signal-rpc-client.d.ts +3 -3
- package/dist/types/src/signal-client/signal-rpc-client.d.ts.map +1 -1
- package/dist/types/src/signal-manager/edge-signal-manager.d.ts +5 -5
- package/dist/types/src/signal-manager/edge-signal-manager.d.ts.map +1 -1
- package/dist/types/src/signal-manager/memory-signal-manager.d.ts +5 -4
- package/dist/types/src/signal-manager/memory-signal-manager.d.ts.map +1 -1
- package/dist/types/src/signal-manager/utils.d.ts.map +1 -1
- package/dist/types/src/signal-manager/websocket-signal-manager-monitor.d.ts.map +1 -1
- package/dist/types/src/signal-manager/websocket-signal-manager.d.ts +5 -6
- package/dist/types/src/signal-manager/websocket-signal-manager.d.ts.map +1 -1
- package/dist/types/src/signal-methods.d.ts +5 -5
- package/dist/types/src/signal-methods.d.ts.map +1 -1
- package/dist/types/src/testing/test-builder.d.ts.map +1 -1
- package/dist/types/src/testing/test-peer.d.ts.map +1 -1
- package/dist/types/src/testing/utils.d.ts.map +1 -1
- package/dist/types/tsconfig.tsbuildinfo +1 -1
- package/package.json +24 -29
- package/src/messenger.blueprint-test.ts +13 -12
- package/src/messenger.node.test.ts +7 -38
- package/src/messenger.ts +37 -32
- package/src/signal-client/signal-client.node.test.ts +9 -9
- package/src/signal-client/signal-client.ts +6 -10
- package/src/signal-client/signal-local-state.ts +0 -1
- package/src/signal-client/signal-rpc-client.ts +4 -6
- package/src/signal-manager/edge-signal-manager.ts +27 -15
- package/src/signal-manager/memory-signal-manager.ts +17 -15
- package/src/signal-manager/websocket-signal-manager.node.test.ts +13 -13
- package/src/signal-manager/websocket-signal-manager.ts +9 -16
- package/src/signal-methods.ts +5 -5
- package/src/testing/test-builder.ts +4 -3
- package/src/testing/test-peer.ts +0 -1
- package/src/testing/utils.ts +0 -1
- package/dist/lib/browser/chunk-46VUJLOF.mjs +0 -2426
- package/dist/lib/browser/chunk-46VUJLOF.mjs.map +0 -7
- package/dist/lib/browser/index.mjs +0 -22
- package/dist/lib/browser/index.mjs.map +0 -7
- package/dist/lib/browser/meta.json +0 -1
- package/dist/lib/browser/testing/index.mjs.map +0 -7
- package/dist/lib/node-esm/chunk-4SVYY5G5.mjs +0 -2426
- package/dist/lib/node-esm/chunk-4SVYY5G5.mjs.map +0 -7
- package/dist/lib/node-esm/index.mjs +0 -22
- package/dist/lib/node-esm/index.mjs.map +0 -7
- package/dist/lib/node-esm/meta.json +0 -1
- package/dist/lib/node-esm/testing/index.mjs +0 -172
- package/dist/lib/node-esm/testing/index.mjs.map +0 -7
|
@@ -0,0 +1,497 @@
|
|
|
1
|
+
import "@dxos/node-std/globals";
|
|
2
|
+
|
|
3
|
+
// src/messenger.ts
|
|
4
|
+
import { TimeoutError, scheduleExponentialBackoffTaskInterval, scheduleTask, scheduleTaskInterval } from "@dxos/async";
|
|
5
|
+
import { Context } from "@dxos/context";
|
|
6
|
+
import { invariant } from "@dxos/invariant";
|
|
7
|
+
import { PublicKey } from "@dxos/keys";
|
|
8
|
+
import { log } from "@dxos/log";
|
|
9
|
+
import { TimeoutError as ProtocolTimeoutError } from "@dxos/protocols";
|
|
10
|
+
import { schema } from "@dxos/protocols/proto";
|
|
11
|
+
import { ComplexMap, ComplexSet } from "@dxos/util";
|
|
12
|
+
|
|
13
|
+
// src/messenger-monitor.ts
|
|
14
|
+
import { trace } from "@dxos/tracing";
|
|
15
|
+
var MessengerMonitor = class {
|
|
16
|
+
recordMessageAckFailed() {
|
|
17
|
+
trace.metrics.increment("dxos.mesh.signal.messenger.failed-ack", 1);
|
|
18
|
+
}
|
|
19
|
+
recordReliableMessage(params) {
|
|
20
|
+
trace.metrics.increment("dxos.mesh.signal.messenger.reliable-send", 1, {
|
|
21
|
+
tags: {
|
|
22
|
+
success: params.sent,
|
|
23
|
+
attempts: params.sendAttempts
|
|
24
|
+
}
|
|
25
|
+
});
|
|
26
|
+
}
|
|
27
|
+
};
|
|
28
|
+
|
|
29
|
+
// src/timeouts.ts
|
|
30
|
+
var MESSAGE_TIMEOUT = 1e4;
|
|
31
|
+
|
|
32
|
+
// src/messenger.ts
|
|
33
|
+
var __dxlog_file = "/__w/dxos/dxos/packages/core/mesh/messaging/src/messenger.ts";
|
|
34
|
+
var ReliablePayload = schema.getCodecForType("dxos.mesh.messaging.ReliablePayload");
|
|
35
|
+
var Acknowledgement = schema.getCodecForType("dxos.mesh.messaging.Acknowledgement");
|
|
36
|
+
var RECEIVED_MESSAGES_GC_INTERVAL = 12e4;
|
|
37
|
+
var Messenger = class {
|
|
38
|
+
_monitor = new MessengerMonitor();
|
|
39
|
+
_signalManager;
|
|
40
|
+
// { peerId, payloadType } => listeners set
|
|
41
|
+
_listeners = new ComplexMap(({ peerId, payloadType }) => peerId + payloadType);
|
|
42
|
+
// peerId => listeners set
|
|
43
|
+
_defaultListeners = /* @__PURE__ */ new Map();
|
|
44
|
+
_onAckCallbacks = new ComplexMap(PublicKey.hash);
|
|
45
|
+
_receivedMessages = new ComplexSet(PublicKey.hash);
|
|
46
|
+
/**
|
|
47
|
+
* Keys scheduled to be cleared from _receivedMessages on the next iteration.
|
|
48
|
+
*/
|
|
49
|
+
_toClear = new ComplexSet(PublicKey.hash);
|
|
50
|
+
_ctx;
|
|
51
|
+
_closed = true;
|
|
52
|
+
_retryDelay;
|
|
53
|
+
constructor({ signalManager, retryDelay = 1e3 }) {
|
|
54
|
+
this._signalManager = signalManager;
|
|
55
|
+
this._retryDelay = retryDelay;
|
|
56
|
+
this.open();
|
|
57
|
+
}
|
|
58
|
+
open() {
|
|
59
|
+
if (!this._closed) {
|
|
60
|
+
return;
|
|
61
|
+
}
|
|
62
|
+
log("opening messenger", void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 43, S: this });
|
|
63
|
+
this._ctx = new Context({
|
|
64
|
+
onError: (err) => log.catch(err, void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 45, S: this })
|
|
65
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 44 });
|
|
66
|
+
this._ctx.onDispose(this._signalManager.onMessage.on(async (message) => {
|
|
67
|
+
log("received message", {
|
|
68
|
+
from: message.author
|
|
69
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 48, S: this });
|
|
70
|
+
await this._handleMessage(message);
|
|
71
|
+
}));
|
|
72
|
+
scheduleTaskInterval(this._ctx, async () => {
|
|
73
|
+
this._performGc();
|
|
74
|
+
}, RECEIVED_MESSAGES_GC_INTERVAL);
|
|
75
|
+
this._closed = false;
|
|
76
|
+
log("opened messenger", void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 58, S: this });
|
|
77
|
+
}
|
|
78
|
+
async close() {
|
|
79
|
+
if (this._closed) {
|
|
80
|
+
return;
|
|
81
|
+
}
|
|
82
|
+
this._closed = true;
|
|
83
|
+
await this._ctx.dispose();
|
|
84
|
+
}
|
|
85
|
+
async sendMessage(ctx, { author, recipient, payload }) {
|
|
86
|
+
invariant(!this._closed, "Closed", { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 68, S: this, A: ["!this._closed", "'Closed'"] });
|
|
87
|
+
const messageContext = this._ctx.derive();
|
|
88
|
+
const reliablePayload = {
|
|
89
|
+
messageId: PublicKey.random(),
|
|
90
|
+
payload
|
|
91
|
+
};
|
|
92
|
+
invariant(!this._onAckCallbacks.has(reliablePayload.messageId), void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 74, S: this, A: ["!this._onAckCallbacks.has(reliablePayload.messageId)", ""] });
|
|
93
|
+
log("send message", {
|
|
94
|
+
messageId: reliablePayload.messageId,
|
|
95
|
+
author,
|
|
96
|
+
recipient
|
|
97
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 75, S: this });
|
|
98
|
+
let messageReceived;
|
|
99
|
+
let timeoutHit;
|
|
100
|
+
let sendAttempts = 0;
|
|
101
|
+
const promise = new Promise((resolve, reject) => {
|
|
102
|
+
messageReceived = resolve;
|
|
103
|
+
timeoutHit = reject;
|
|
104
|
+
});
|
|
105
|
+
scheduleExponentialBackoffTaskInterval(messageContext, async () => {
|
|
106
|
+
log("retrying message", {
|
|
107
|
+
messageId: reliablePayload.messageId
|
|
108
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 89, S: this });
|
|
109
|
+
sendAttempts++;
|
|
110
|
+
await this._encodeAndSend(ctx, {
|
|
111
|
+
author,
|
|
112
|
+
recipient,
|
|
113
|
+
reliablePayload
|
|
114
|
+
}).catch((err) => log("failed to send message", {
|
|
115
|
+
err
|
|
116
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 97, S: this }));
|
|
117
|
+
}, this._retryDelay);
|
|
118
|
+
scheduleTask(messageContext, () => {
|
|
119
|
+
log("message not delivered", {
|
|
120
|
+
messageId: reliablePayload.messageId
|
|
121
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 102, S: this });
|
|
122
|
+
this._onAckCallbacks.delete(reliablePayload.messageId);
|
|
123
|
+
timeoutHit(new ProtocolTimeoutError({
|
|
124
|
+
message: "signaling message not delivered",
|
|
125
|
+
cause: new TimeoutError(MESSAGE_TIMEOUT, "Message not delivered")
|
|
126
|
+
}));
|
|
127
|
+
void messageContext.dispose();
|
|
128
|
+
this._monitor.recordReliableMessage({
|
|
129
|
+
sendAttempts,
|
|
130
|
+
sent: false
|
|
131
|
+
});
|
|
132
|
+
}, MESSAGE_TIMEOUT);
|
|
133
|
+
this._onAckCallbacks.set(reliablePayload.messageId, () => {
|
|
134
|
+
messageReceived();
|
|
135
|
+
this._onAckCallbacks.delete(reliablePayload.messageId);
|
|
136
|
+
void messageContext.dispose();
|
|
137
|
+
this._monitor.recordReliableMessage({
|
|
138
|
+
sendAttempts,
|
|
139
|
+
sent: true
|
|
140
|
+
});
|
|
141
|
+
});
|
|
142
|
+
await this._encodeAndSend(ctx, {
|
|
143
|
+
author,
|
|
144
|
+
recipient,
|
|
145
|
+
reliablePayload
|
|
146
|
+
});
|
|
147
|
+
return promise;
|
|
148
|
+
}
|
|
149
|
+
/**
|
|
150
|
+
* Subscribes onMessage function to messages that contains payload with payloadType.
|
|
151
|
+
* @param payloadType if not specified, onMessage will be subscribed to all types of messages.
|
|
152
|
+
*/
|
|
153
|
+
async listen({ peer, payloadType, onMessage }) {
|
|
154
|
+
invariant(!this._closed, "Closed", { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 136, S: this, A: ["!this._closed", "'Closed'"] });
|
|
155
|
+
await this._signalManager.subscribeMessages(peer);
|
|
156
|
+
let listeners;
|
|
157
|
+
invariant(peer.peerKey, "Peer key is required", { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 139, S: this, A: ["peer.peerKey", "'Peer key is required'"] });
|
|
158
|
+
if (!payloadType) {
|
|
159
|
+
listeners = this._defaultListeners.get(peer.peerKey);
|
|
160
|
+
if (!listeners) {
|
|
161
|
+
listeners = /* @__PURE__ */ new Set();
|
|
162
|
+
this._defaultListeners.set(peer.peerKey, listeners);
|
|
163
|
+
}
|
|
164
|
+
} else {
|
|
165
|
+
listeners = this._listeners.get({
|
|
166
|
+
peerId: peer.peerKey,
|
|
167
|
+
payloadType
|
|
168
|
+
});
|
|
169
|
+
if (!listeners) {
|
|
170
|
+
listeners = /* @__PURE__ */ new Set();
|
|
171
|
+
this._listeners.set({
|
|
172
|
+
peerId: peer.peerKey,
|
|
173
|
+
payloadType
|
|
174
|
+
}, listeners);
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
listeners.add(onMessage);
|
|
178
|
+
return {
|
|
179
|
+
unsubscribe: async () => {
|
|
180
|
+
listeners.delete(onMessage);
|
|
181
|
+
}
|
|
182
|
+
};
|
|
183
|
+
}
|
|
184
|
+
async _encodeAndSend(ctx, { author, recipient, reliablePayload }) {
|
|
185
|
+
await this._signalManager.sendMessage(ctx, {
|
|
186
|
+
author,
|
|
187
|
+
recipient,
|
|
188
|
+
payload: {
|
|
189
|
+
type_url: "dxos.mesh.messaging.ReliablePayload",
|
|
190
|
+
value: ReliablePayload.encode(reliablePayload, {
|
|
191
|
+
preserveAny: true
|
|
192
|
+
})
|
|
193
|
+
}
|
|
194
|
+
});
|
|
195
|
+
}
|
|
196
|
+
async _handleMessage(message) {
|
|
197
|
+
switch (message.payload.type_url) {
|
|
198
|
+
case "dxos.mesh.messaging.ReliablePayload": {
|
|
199
|
+
await this._handleReliablePayload(message);
|
|
200
|
+
break;
|
|
201
|
+
}
|
|
202
|
+
case "dxos.mesh.messaging.Acknowledgement": {
|
|
203
|
+
await this._handleAcknowledgement({
|
|
204
|
+
payload: message.payload
|
|
205
|
+
});
|
|
206
|
+
break;
|
|
207
|
+
}
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
async _handleReliablePayload({ author, recipient, payload }) {
|
|
211
|
+
invariant(payload.type_url === "dxos.mesh.messaging.ReliablePayload", void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 195, S: this, A: ["payload.type_url === 'dxos.mesh.messaging.ReliablePayload'", ""] });
|
|
212
|
+
const reliablePayload = ReliablePayload.decode(payload.value, {
|
|
213
|
+
preserveAny: true
|
|
214
|
+
});
|
|
215
|
+
log("handling message", {
|
|
216
|
+
messageId: reliablePayload.messageId
|
|
217
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 199, S: this });
|
|
218
|
+
try {
|
|
219
|
+
await this._sendAcknowledgement(this._ctx, {
|
|
220
|
+
author,
|
|
221
|
+
recipient,
|
|
222
|
+
messageId: reliablePayload.messageId
|
|
223
|
+
});
|
|
224
|
+
} catch (err) {
|
|
225
|
+
this._monitor.recordMessageAckFailed();
|
|
226
|
+
throw err;
|
|
227
|
+
}
|
|
228
|
+
if (this._receivedMessages.has(reliablePayload.messageId)) {
|
|
229
|
+
return;
|
|
230
|
+
}
|
|
231
|
+
this._receivedMessages.add(reliablePayload.messageId);
|
|
232
|
+
await this._callListeners({
|
|
233
|
+
author,
|
|
234
|
+
recipient,
|
|
235
|
+
payload: reliablePayload.payload
|
|
236
|
+
});
|
|
237
|
+
}
|
|
238
|
+
async _handleAcknowledgement({ payload }) {
|
|
239
|
+
invariant(payload.type_url === "dxos.mesh.messaging.Acknowledgement", void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 224, S: this, A: ["payload.type_url === 'dxos.mesh.messaging.Acknowledgement'", ""] });
|
|
240
|
+
this._onAckCallbacks.get(Acknowledgement.decode(payload.value).messageId)?.();
|
|
241
|
+
}
|
|
242
|
+
async _sendAcknowledgement(ctx, { author, recipient, messageId }) {
|
|
243
|
+
log("sending ACK", {
|
|
244
|
+
messageId,
|
|
245
|
+
from: recipient,
|
|
246
|
+
to: author
|
|
247
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 228, S: this });
|
|
248
|
+
await this._signalManager.sendMessage(ctx, {
|
|
249
|
+
author: recipient,
|
|
250
|
+
recipient: author,
|
|
251
|
+
payload: {
|
|
252
|
+
type_url: "dxos.mesh.messaging.Acknowledgement",
|
|
253
|
+
value: Acknowledgement.encode({
|
|
254
|
+
messageId
|
|
255
|
+
})
|
|
256
|
+
}
|
|
257
|
+
});
|
|
258
|
+
}
|
|
259
|
+
async _callListeners(message) {
|
|
260
|
+
{
|
|
261
|
+
invariant(message.recipient.peerKey, "Peer key is required", { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 246, S: this, A: ["message.recipient.peerKey", "'Peer key is required'"] });
|
|
262
|
+
const defaultListenerMap = this._defaultListeners.get(message.recipient.peerKey);
|
|
263
|
+
if (defaultListenerMap) {
|
|
264
|
+
for (const listener of defaultListenerMap) {
|
|
265
|
+
await listener(message);
|
|
266
|
+
}
|
|
267
|
+
}
|
|
268
|
+
}
|
|
269
|
+
{
|
|
270
|
+
const listenerMap = this._listeners.get({
|
|
271
|
+
peerId: message.recipient.peerKey,
|
|
272
|
+
payloadType: message.payload.type_url
|
|
273
|
+
});
|
|
274
|
+
if (listenerMap) {
|
|
275
|
+
for (const listener of listenerMap) {
|
|
276
|
+
await listener(message);
|
|
277
|
+
}
|
|
278
|
+
}
|
|
279
|
+
}
|
|
280
|
+
}
|
|
281
|
+
_performGc() {
|
|
282
|
+
const start = performance.now();
|
|
283
|
+
for (const key of this._toClear.keys()) {
|
|
284
|
+
this._receivedMessages.delete(key);
|
|
285
|
+
}
|
|
286
|
+
this._toClear.clear();
|
|
287
|
+
for (const key of this._receivedMessages.keys()) {
|
|
288
|
+
this._toClear.add(key);
|
|
289
|
+
}
|
|
290
|
+
const elapsed = performance.now() - start;
|
|
291
|
+
if (elapsed > 100) {
|
|
292
|
+
log.warn("GC took too long", {
|
|
293
|
+
elapsed
|
|
294
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file, L: 277, S: this });
|
|
295
|
+
}
|
|
296
|
+
}
|
|
297
|
+
};
|
|
298
|
+
|
|
299
|
+
// src/signal-methods.ts
|
|
300
|
+
var PeerInfoHash = ({ peerKey }) => peerKey;
|
|
301
|
+
|
|
302
|
+
// src/signal-manager/memory-signal-manager.ts
|
|
303
|
+
import { Event, Trigger } from "@dxos/async";
|
|
304
|
+
import { Context as Context2 } from "@dxos/context";
|
|
305
|
+
import { invariant as invariant2 } from "@dxos/invariant";
|
|
306
|
+
import { PublicKey as PublicKey2 } from "@dxos/keys";
|
|
307
|
+
import { log as log2 } from "@dxos/log";
|
|
308
|
+
import { schema as schema2 } from "@dxos/protocols/proto";
|
|
309
|
+
import { ComplexMap as ComplexMap2, ComplexSet as ComplexSet2 } from "@dxos/util";
|
|
310
|
+
var __dxlog_file2 = "/__w/dxos/dxos/packages/core/mesh/messaging/src/signal-manager/memory-signal-manager.ts";
|
|
311
|
+
var MemorySignalManagerContext = class {
|
|
312
|
+
// Swarm messages.
|
|
313
|
+
swarmEvent = new Event();
|
|
314
|
+
// Mapping from topic to set of peers.
|
|
315
|
+
swarms = new ComplexMap2(PublicKey2.hash);
|
|
316
|
+
// Map of connections for each peer for signaling.
|
|
317
|
+
connections = new ComplexMap2(PeerInfoHash);
|
|
318
|
+
};
|
|
319
|
+
var MemorySignalManager = class {
|
|
320
|
+
_context;
|
|
321
|
+
statusChanged = new Event();
|
|
322
|
+
swarmEvent = new Event();
|
|
323
|
+
onMessage = new Event();
|
|
324
|
+
/** Will be used to emit SwarmEvents on .open() and .close() */
|
|
325
|
+
_joinedSwarms = new ComplexSet2(({ topic, peer }) => topic.toHex() + peer.peerKey);
|
|
326
|
+
_ctx;
|
|
327
|
+
// TODO(dmaretskyi): Replace with callback.
|
|
328
|
+
_freezeTrigger = new Trigger().wake();
|
|
329
|
+
constructor(_context) {
|
|
330
|
+
this._context = _context;
|
|
331
|
+
this._ctx = new Context2(void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 35 });
|
|
332
|
+
this._ctx.onDispose(this._context.swarmEvent.on((data) => this.swarmEvent.emit(data)));
|
|
333
|
+
}
|
|
334
|
+
async open() {
|
|
335
|
+
if (!this._ctx.disposed) {
|
|
336
|
+
return;
|
|
337
|
+
}
|
|
338
|
+
this._ctx = new Context2(void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 42 });
|
|
339
|
+
this._ctx.onDispose(this._context.swarmEvent.on((data) => this.swarmEvent.emit(data)));
|
|
340
|
+
await Promise.all([
|
|
341
|
+
...this._joinedSwarms.values()
|
|
342
|
+
].map((value) => this.join(this._ctx, value)));
|
|
343
|
+
}
|
|
344
|
+
async close() {
|
|
345
|
+
if (this._ctx.disposed) {
|
|
346
|
+
return;
|
|
347
|
+
}
|
|
348
|
+
const joinedSwarmsCopy = new ComplexSet2(({ topic, peer }) => topic.toHex() + peer.peerKey, [
|
|
349
|
+
...this._joinedSwarms.values()
|
|
350
|
+
]);
|
|
351
|
+
await Promise.all([
|
|
352
|
+
...this._joinedSwarms.values()
|
|
353
|
+
].map((value) => this.leave(this._ctx, value)));
|
|
354
|
+
this._joinedSwarms = joinedSwarmsCopy;
|
|
355
|
+
await this._ctx.dispose();
|
|
356
|
+
}
|
|
357
|
+
getStatus() {
|
|
358
|
+
return [];
|
|
359
|
+
}
|
|
360
|
+
async join(_ctx, { topic, peer }) {
|
|
361
|
+
invariant2(!this._ctx.disposed, "Closed", { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 67, S: this, A: ["!this._ctx.disposed", "'Closed'"] });
|
|
362
|
+
this._joinedSwarms.add({
|
|
363
|
+
topic,
|
|
364
|
+
peer
|
|
365
|
+
});
|
|
366
|
+
if (!this._context.swarms.has(topic)) {
|
|
367
|
+
this._context.swarms.set(topic, new ComplexSet2(PeerInfoHash));
|
|
368
|
+
}
|
|
369
|
+
this._context.swarms.get(topic).add(peer);
|
|
370
|
+
this._context.swarmEvent.emit({
|
|
371
|
+
topic,
|
|
372
|
+
peerAvailable: {
|
|
373
|
+
peer,
|
|
374
|
+
since: /* @__PURE__ */ new Date()
|
|
375
|
+
}
|
|
376
|
+
});
|
|
377
|
+
for (const [topic2, peers] of this._context.swarms) {
|
|
378
|
+
Array.from(peers).forEach((peer2) => {
|
|
379
|
+
this.swarmEvent.emit({
|
|
380
|
+
topic: topic2,
|
|
381
|
+
peerAvailable: {
|
|
382
|
+
peer: peer2,
|
|
383
|
+
since: /* @__PURE__ */ new Date()
|
|
384
|
+
}
|
|
385
|
+
});
|
|
386
|
+
});
|
|
387
|
+
}
|
|
388
|
+
}
|
|
389
|
+
async leave(_ctx, { topic, peer }) {
|
|
390
|
+
invariant2(!this._ctx.disposed, "Closed", { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 97, S: this, A: ["!this._ctx.disposed", "'Closed'"] });
|
|
391
|
+
this._joinedSwarms.delete({
|
|
392
|
+
topic,
|
|
393
|
+
peer
|
|
394
|
+
});
|
|
395
|
+
if (!this._context.swarms.has(topic)) {
|
|
396
|
+
this._context.swarms.set(topic, new ComplexSet2(PeerInfoHash));
|
|
397
|
+
}
|
|
398
|
+
this._context.swarms.get(topic).delete(peer);
|
|
399
|
+
const swarmEvent = {
|
|
400
|
+
topic,
|
|
401
|
+
peerLeft: {
|
|
402
|
+
peer
|
|
403
|
+
}
|
|
404
|
+
};
|
|
405
|
+
this._context.swarmEvent.emit(swarmEvent);
|
|
406
|
+
}
|
|
407
|
+
async query(_ctx, request) {
|
|
408
|
+
throw new Error("Not implemented");
|
|
409
|
+
}
|
|
410
|
+
async sendMessage(_ctx, { author, recipient, payload }) {
|
|
411
|
+
log2("send message", {
|
|
412
|
+
author,
|
|
413
|
+
recipient,
|
|
414
|
+
...dec(payload)
|
|
415
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 118, S: this });
|
|
416
|
+
invariant2(recipient, void 0, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 123, S: this, A: ["recipient", ""] });
|
|
417
|
+
invariant2(!this._ctx.disposed, "Closed", { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 124, S: this, A: ["!this._ctx.disposed", "'Closed'"] });
|
|
418
|
+
await this._freezeTrigger.wait();
|
|
419
|
+
const remote = this._context.connections.get(recipient);
|
|
420
|
+
if (!remote) {
|
|
421
|
+
log2.warn("recipient is not subscribed for messages", {
|
|
422
|
+
author,
|
|
423
|
+
recipient
|
|
424
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 128, S: this });
|
|
425
|
+
return;
|
|
426
|
+
}
|
|
427
|
+
if (remote._ctx.disposed) {
|
|
428
|
+
log2.warn("recipient is disposed", {
|
|
429
|
+
author,
|
|
430
|
+
recipient
|
|
431
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 135, S: this });
|
|
432
|
+
return;
|
|
433
|
+
}
|
|
434
|
+
remote._freezeTrigger.wait().then(() => {
|
|
435
|
+
if (remote._ctx.disposed) {
|
|
436
|
+
log2.warn("recipient is disposed", {
|
|
437
|
+
author,
|
|
438
|
+
recipient
|
|
439
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 143, S: this });
|
|
440
|
+
return;
|
|
441
|
+
}
|
|
442
|
+
log2("receive message", {
|
|
443
|
+
author,
|
|
444
|
+
recipient,
|
|
445
|
+
...dec(payload)
|
|
446
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 149, S: this });
|
|
447
|
+
remote.onMessage.emit({
|
|
448
|
+
author,
|
|
449
|
+
recipient,
|
|
450
|
+
payload
|
|
451
|
+
});
|
|
452
|
+
}).catch((err) => {
|
|
453
|
+
log2.error("error while waiting for freeze", {
|
|
454
|
+
err
|
|
455
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 160, S: this });
|
|
456
|
+
});
|
|
457
|
+
}
|
|
458
|
+
async subscribeMessages(peerInfo) {
|
|
459
|
+
log2("subscribing", {
|
|
460
|
+
peerInfo
|
|
461
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 166, S: this });
|
|
462
|
+
this._context.connections.set(peerInfo, this);
|
|
463
|
+
}
|
|
464
|
+
async unsubscribeMessages(peerInfo) {
|
|
465
|
+
log2("unsubscribing", {
|
|
466
|
+
peerInfo
|
|
467
|
+
}, { "~LogMeta": "~LogMeta", F: __dxlog_file2, L: 172, S: this });
|
|
468
|
+
this._context.connections.delete(peerInfo);
|
|
469
|
+
}
|
|
470
|
+
freeze() {
|
|
471
|
+
this._freezeTrigger.reset();
|
|
472
|
+
}
|
|
473
|
+
unfreeze() {
|
|
474
|
+
this._freezeTrigger.wake();
|
|
475
|
+
}
|
|
476
|
+
};
|
|
477
|
+
var dec = (payload) => {
|
|
478
|
+
if (!payload.type_url.endsWith("ReliablePayload")) {
|
|
479
|
+
return {};
|
|
480
|
+
}
|
|
481
|
+
const relPayload = schema2.getCodecForType("dxos.mesh.messaging.ReliablePayload").decode(payload.value);
|
|
482
|
+
if (typeof relPayload?.payload?.data === "object") {
|
|
483
|
+
return {
|
|
484
|
+
payload: Object.keys(relPayload?.payload?.data)[0],
|
|
485
|
+
sessionId: relPayload?.payload?.sessionId
|
|
486
|
+
};
|
|
487
|
+
}
|
|
488
|
+
return {};
|
|
489
|
+
};
|
|
490
|
+
|
|
491
|
+
export {
|
|
492
|
+
Messenger,
|
|
493
|
+
PeerInfoHash,
|
|
494
|
+
MemorySignalManagerContext,
|
|
495
|
+
MemorySignalManager
|
|
496
|
+
};
|
|
497
|
+
//# sourceMappingURL=chunk-EC4H56J5.mjs.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../src/messenger.ts", "../../../src/messenger-monitor.ts", "../../../src/timeouts.ts", "../../../src/signal-methods.ts", "../../../src/signal-manager/memory-signal-manager.ts"],
|
|
4
|
+
"sourcesContent": ["//\n// Copyright 2022 DXOS.org\n//\n\nimport { TimeoutError, scheduleExponentialBackoffTaskInterval, scheduleTask, scheduleTaskInterval } from '@dxos/async';\nimport { type Any } from '@dxos/codec-protobuf';\nimport { Context } from '@dxos/context';\nimport { invariant } from '@dxos/invariant';\nimport { PublicKey } from '@dxos/keys';\nimport { log } from '@dxos/log';\nimport { TimeoutError as ProtocolTimeoutError } from '@dxos/protocols';\nimport { schema } from '@dxos/protocols/proto';\nimport { type ReliablePayload } from '@dxos/protocols/proto/dxos/mesh/messaging';\nimport { ComplexMap, ComplexSet } from '@dxos/util';\n\nimport { MessengerMonitor } from './messenger-monitor';\nimport { type SignalManager } from './signal-manager';\nimport { type Message, type PeerInfo } from './signal-methods';\nimport { MESSAGE_TIMEOUT } from './timeouts';\n\nexport type OnMessage = (params: Message) => Promise<void>;\n\nexport interface MessengerOptions {\n signalManager: SignalManager;\n retryDelay?: number;\n}\n\nconst ReliablePayload = schema.getCodecForType('dxos.mesh.messaging.ReliablePayload');\nconst Acknowledgement = schema.getCodecForType('dxos.mesh.messaging.Acknowledgement');\n\nconst RECEIVED_MESSAGES_GC_INTERVAL = 120_000;\n\n/**\n * Reliable messenger that works trough signal network.\n */\nexport class Messenger {\n private readonly _monitor = new MessengerMonitor();\n private readonly _signalManager: SignalManager;\n // { peerId, payloadType } => listeners set\n private readonly _listeners = new ComplexMap<{ peerId: string; payloadType: string }, Set<OnMessage>>(\n ({ peerId, payloadType }) => peerId + payloadType,\n );\n\n // peerId => listeners set\n private readonly _defaultListeners = new Map<string, Set<OnMessage>>();\n\n private readonly _onAckCallbacks = new ComplexMap<PublicKey, () => void>(PublicKey.hash);\n\n private readonly _receivedMessages = new ComplexSet<PublicKey>(PublicKey.hash);\n\n /**\n * Keys scheduled to be cleared from _receivedMessages on the next iteration.\n */\n private readonly _toClear = new ComplexSet<PublicKey>(PublicKey.hash);\n\n private _ctx!: Context;\n private _closed = true;\n private readonly _retryDelay: number;\n\n constructor({ signalManager, retryDelay = 1000 }: MessengerOptions) {\n this._signalManager = signalManager;\n this._retryDelay = retryDelay;\n\n this.open();\n }\n\n open(): void {\n if (!this._closed) {\n return;\n }\n log('opening messenger');\n this._ctx = new Context({\n onError: (err) => log.catch(err),\n });\n this._ctx.onDispose(\n this._signalManager.onMessage.on(async (message) => {\n log('received message', { from: message.author });\n await this._handleMessage(message);\n }),\n );\n\n // Clear the map periodically.\n scheduleTaskInterval(\n this._ctx,\n async () => {\n this._performGc();\n },\n RECEIVED_MESSAGES_GC_INTERVAL,\n );\n\n this._closed = false;\n log('opened messenger');\n }\n\n async close(): Promise<void> {\n if (this._closed) {\n return;\n }\n this._closed = true;\n await this._ctx.dispose();\n }\n\n async sendMessage(ctx: Context, { author, recipient, payload }: Message): Promise<void> {\n invariant(!this._closed, 'Closed');\n const messageContext = this._ctx.derive();\n\n const reliablePayload: ReliablePayload = {\n messageId: PublicKey.random(),\n payload,\n };\n invariant(!this._onAckCallbacks.has(reliablePayload.messageId!));\n log('send message', { messageId: reliablePayload.messageId, author, recipient });\n\n let messageReceived: () => void;\n let timeoutHit: (err: Error) => void;\n let sendAttempts = 0;\n\n const promise = new Promise<void>((resolve, reject) => {\n messageReceived = resolve;\n timeoutHit = reject;\n });\n\n // Setting retry interval if signal was not acknowledged.\n scheduleExponentialBackoffTaskInterval(\n messageContext,\n async () => {\n log('retrying message', { messageId: reliablePayload.messageId });\n sendAttempts++;\n await this._encodeAndSend(ctx, { author, recipient, reliablePayload }).catch((err) =>\n log('failed to send message', { err }),\n );\n },\n this._retryDelay,\n );\n\n scheduleTask(\n messageContext,\n () => {\n log('message not delivered', { messageId: reliablePayload.messageId });\n this._onAckCallbacks.delete(reliablePayload.messageId!);\n timeoutHit(\n new ProtocolTimeoutError({\n message: 'signaling message not delivered',\n cause: new TimeoutError(MESSAGE_TIMEOUT, 'Message not delivered'),\n }),\n );\n void messageContext.dispose();\n this._monitor.recordReliableMessage({ sendAttempts, sent: false });\n },\n MESSAGE_TIMEOUT,\n );\n\n this._onAckCallbacks.set(reliablePayload.messageId, () => {\n messageReceived();\n this._onAckCallbacks.delete(reliablePayload.messageId!);\n void messageContext.dispose();\n this._monitor.recordReliableMessage({ sendAttempts, sent: true });\n });\n\n await this._encodeAndSend(ctx, { author, recipient, reliablePayload });\n return promise;\n }\n\n /**\n * Subscribes onMessage function to messages that contains payload with payloadType.\n * @param payloadType if not specified, onMessage will be subscribed to all types of messages.\n */\n async listen({\n peer,\n payloadType,\n onMessage,\n }: {\n peer: PeerInfo;\n payloadType?: string;\n onMessage: OnMessage;\n }): Promise<ListeningHandle> {\n invariant(!this._closed, 'Closed');\n\n await this._signalManager.subscribeMessages(peer);\n let listeners: Set<OnMessage> | undefined;\n invariant(peer.peerKey, 'Peer key is required');\n\n if (!payloadType) {\n listeners = this._defaultListeners.get(peer.peerKey);\n if (!listeners) {\n listeners = new Set();\n this._defaultListeners.set(peer.peerKey, listeners);\n }\n } else {\n listeners = this._listeners.get({ peerId: peer.peerKey, payloadType });\n if (!listeners) {\n listeners = new Set();\n this._listeners.set({ peerId: peer.peerKey, payloadType }, listeners);\n }\n }\n\n listeners.add(onMessage);\n\n return {\n unsubscribe: async () => {\n listeners!.delete(onMessage);\n },\n };\n }\n\n private async _encodeAndSend(\n ctx: Context,\n {\n author,\n recipient,\n reliablePayload,\n }: {\n author: PeerInfo;\n recipient: PeerInfo;\n reliablePayload: ReliablePayload;\n },\n ): Promise<void> {\n await this._signalManager.sendMessage(ctx, {\n author,\n recipient,\n payload: {\n type_url: 'dxos.mesh.messaging.ReliablePayload',\n value: ReliablePayload.encode(reliablePayload, { preserveAny: true }),\n },\n });\n }\n\n private async _handleMessage(message: Message): Promise<void> {\n switch (message.payload.type_url) {\n case 'dxos.mesh.messaging.ReliablePayload': {\n await this._handleReliablePayload(message);\n break;\n }\n case 'dxos.mesh.messaging.Acknowledgement': {\n await this._handleAcknowledgement({ payload: message.payload });\n break;\n }\n }\n }\n\n private async _handleReliablePayload({ author, recipient, payload }: Message): Promise<void> {\n invariant(payload.type_url === 'dxos.mesh.messaging.ReliablePayload');\n const reliablePayload: ReliablePayload = ReliablePayload.decode(payload.value, { preserveAny: true });\n\n log('handling message', { messageId: reliablePayload.messageId });\n\n try {\n await this._sendAcknowledgement(this._ctx, {\n author,\n recipient,\n messageId: reliablePayload.messageId,\n });\n } catch (err) {\n this._monitor.recordMessageAckFailed();\n throw err;\n }\n\n // Ignore message if it was already received, i.e. from multiple signal servers.\n if (this._receivedMessages.has(reliablePayload.messageId!)) {\n return;\n }\n\n this._receivedMessages.add(reliablePayload.messageId!);\n\n await this._callListeners({\n author,\n recipient,\n payload: reliablePayload.payload,\n });\n }\n\n private async _handleAcknowledgement({ payload }: { payload: Any }): Promise<void> {\n invariant(payload.type_url === 'dxos.mesh.messaging.Acknowledgement');\n this._onAckCallbacks.get(Acknowledgement.decode(payload.value).messageId)?.();\n }\n\n private async _sendAcknowledgement(\n ctx: Context,\n {\n author,\n recipient,\n messageId,\n }: {\n author: PeerInfo;\n recipient: PeerInfo;\n messageId: PublicKey;\n },\n ): Promise<void> {\n log('sending ACK', { messageId, from: recipient, to: author });\n\n await this._signalManager.sendMessage(ctx, {\n author: recipient,\n recipient: author,\n payload: {\n type_url: 'dxos.mesh.messaging.Acknowledgement',\n value: Acknowledgement.encode({ messageId }),\n },\n });\n }\n\n private async _callListeners(message: Message): Promise<void> {\n {\n invariant(message.recipient.peerKey, 'Peer key is required');\n const defaultListenerMap = this._defaultListeners.get(message.recipient.peerKey);\n if (defaultListenerMap) {\n for (const listener of defaultListenerMap) {\n await listener(message);\n }\n }\n }\n\n {\n const listenerMap = this._listeners.get({\n peerId: message.recipient.peerKey,\n payloadType: message.payload.type_url,\n });\n if (listenerMap) {\n for (const listener of listenerMap) {\n await listener(message);\n }\n }\n }\n }\n\n private _performGc(): void {\n const start = performance.now();\n\n for (const key of this._toClear.keys()) {\n this._receivedMessages.delete(key);\n }\n this._toClear.clear();\n for (const key of this._receivedMessages.keys()) {\n this._toClear.add(key);\n }\n\n const elapsed = performance.now() - start;\n if (elapsed > 100) {\n log.warn('GC took too long', { elapsed });\n }\n }\n}\n\nexport interface ListeningHandle {\n unsubscribe: () => Promise<void>;\n}\n", "//\n// Copyright 2024 DXOS.org\n//\n\nimport { trace } from '@dxos/tracing';\n\nexport class MessengerMonitor {\n public recordMessageAckFailed(): void {\n trace.metrics.increment('dxos.mesh.signal.messenger.failed-ack', 1);\n }\n\n public recordReliableMessage(params: { sendAttempts: number; sent: boolean }): void {\n trace.metrics.increment('dxos.mesh.signal.messenger.reliable-send', 1, {\n tags: {\n success: params.sent,\n attempts: params.sendAttempts,\n },\n });\n }\n}\n", "//\n// Copyright 2023 DXOS.org\n//\n\n/**\n * Timeout for retrying messages.\n */\nexport const MESSAGE_TIMEOUT = 10_000;\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type Event } from '@dxos/async';\nimport { type Context, type Lifecycle } from '@dxos/context';\nimport { type Peer, type SwarmResponse } from '@dxos/protocols/proto/dxos/edge/messenger';\nimport {\n type JoinRequest,\n type LeaveRequest,\n type Message,\n type QueryRequest,\n type SwarmEvent,\n} from '@dxos/protocols/proto/dxos/edge/signal';\nimport { type SignalState } from '@dxos/protocols/proto/dxos/mesh/signal';\n\nexport type { Message, SwarmEvent };\nexport type PeerInfo = Peer;\nexport const PeerInfoHash = ({ peerKey }: PeerInfo) => peerKey;\n\nexport type SignalStatus = {\n host: string;\n state: SignalState;\n error?: string;\n reconnectIn: number;\n connectionStarted: Date;\n lastStateChange: Date;\n};\n\n/**\n * Message routing interface.\n */\nexport interface SignalMethods {\n /**\n * Emits when other peers join or leave the swarm.\n * @deprecated\n * TODO(mykola): Use swarmState in network-manager instead.\n */\n swarmEvent: Event<SwarmEvent>;\n\n /**\n * Emits when a message is received.\n */\n onMessage: Event<Message>;\n\n /**\n * Emits when the swarm state changes.\n */\n swarmState?: Event<SwarmResponse>;\n\n /**\n * Join topic on signal network, to be discoverable by other peers.\n */\n join: (ctx: Context, params: JoinRequest) => Promise<void>;\n\n /**\n * Leave topic on signal network, to stop being discoverable by other peers.\n */\n leave: (ctx: Context, params: LeaveRequest) => Promise<void>;\n\n /**\n * Query peers in the swarm without joining it.\n */\n query: (ctx: Context, params: QueryRequest) => Promise<SwarmResponse>;\n\n /**\n * Send message to peer.\n */\n sendMessage: (ctx: Context, message: Message) => Promise<void>;\n\n /**\n * Start receiving messages from peer.\n * @deprecated\n */\n // TODO(burdon): Return unsubscribe function. Encapsulate callback/routing here.\n subscribeMessages: (peer: PeerInfo) => Promise<void>;\n\n /**\n * Stop receiving messages from peer.\n * @deprecated\n */\n unsubscribeMessages: (peer: PeerInfo) => Promise<void>;\n}\n\n/**\n * Signaling client.\n * TODO(mykola): Delete.\n * @deprecated\n */\nexport interface SignalClientMethods extends SignalMethods, Required<Lifecycle> {\n getStatus(): SignalStatus;\n}\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { Event, Trigger } from '@dxos/async';\nimport { type Any } from '@dxos/codec-protobuf';\nimport { Context } from '@dxos/context';\nimport { invariant } from '@dxos/invariant';\nimport { PublicKey } from '@dxos/keys';\nimport { log } from '@dxos/log';\nimport { schema } from '@dxos/protocols/proto';\nimport { type SwarmResponse } from '@dxos/protocols/proto/dxos/edge/messenger';\nimport { type QueryRequest } from '@dxos/protocols/proto/dxos/edge/signal';\nimport { ComplexMap, ComplexSet } from '@dxos/util';\n\nimport { type Message, type PeerInfo, PeerInfoHash, type SignalStatus, type SwarmEvent } from '../signal-methods';\nimport { type SignalManager } from './signal-manager';\n\n/**\n * Common signaling context that connects multiple MemorySignalManager instances.\n */\nexport class MemorySignalManagerContext {\n // Swarm messages.\n readonly swarmEvent = new Event<SwarmEvent>();\n\n // Mapping from topic to set of peers.\n readonly swarms = new ComplexMap<PublicKey, ComplexSet<PeerInfo>>(PublicKey.hash);\n\n // Map of connections for each peer for signaling.\n readonly connections = new ComplexMap<PeerInfo, MemorySignalManager>(PeerInfoHash);\n}\n\n/**\n * In memory signal manager for testing.\n */\nexport class MemorySignalManager implements SignalManager {\n readonly statusChanged = new Event<SignalStatus[]>();\n readonly swarmEvent = new Event<SwarmEvent>();\n\n readonly onMessage = new Event<Message>();\n\n /** Will be used to emit SwarmEvents on .open() and .close() */\n private _joinedSwarms = new ComplexSet<{ topic: PublicKey; peer: PeerInfo }>(\n ({ topic, peer }) => topic.toHex() + peer.peerKey,\n );\n\n private _ctx!: Context;\n\n // TODO(dmaretskyi): Replace with callback.\n private readonly _freezeTrigger = new Trigger().wake();\n\n constructor(private readonly _context: MemorySignalManagerContext) {\n this._ctx = new Context();\n\n this._ctx.onDispose(this._context.swarmEvent.on((data) => this.swarmEvent.emit(data)));\n }\n\n async open(): Promise<void> {\n if (!this._ctx.disposed) {\n return;\n }\n this._ctx = new Context();\n this._ctx.onDispose(this._context.swarmEvent.on((data) => this.swarmEvent.emit(data)));\n\n await Promise.all([...this._joinedSwarms.values()].map((value) => this.join(this._ctx, value)));\n }\n\n async close(): Promise<void> {\n if (this._ctx.disposed) {\n return;\n }\n // save copy of joined swarms.\n const joinedSwarmsCopy = new ComplexSet<{ topic: PublicKey; peer: PeerInfo }>(\n ({ topic, peer }) => topic.toHex() + peer.peerKey,\n [...this._joinedSwarms.values()],\n );\n\n await Promise.all([...this._joinedSwarms.values()].map((value) => this.leave(this._ctx, value)));\n\n // assign joined swarms back because .leave() deletes it.\n this._joinedSwarms = joinedSwarmsCopy;\n\n await this._ctx.dispose();\n }\n\n getStatus(): SignalStatus[] {\n return [];\n }\n\n async join(_ctx: Context, { topic, peer }: { topic: PublicKey; peer: PeerInfo }): Promise<void> {\n invariant(!this._ctx.disposed, 'Closed');\n\n this._joinedSwarms.add({ topic, peer });\n\n if (!this._context.swarms.has(topic)) {\n this._context.swarms.set(topic, new ComplexSet(PeerInfoHash));\n }\n\n this._context.swarms.get(topic)!.add(peer);\n this._context.swarmEvent.emit({\n topic,\n peerAvailable: {\n peer,\n since: new Date(),\n },\n });\n\n // Emitting swarm events for each peer.\n for (const [topic, peers] of this._context.swarms) {\n Array.from(peers).forEach((peer) => {\n this.swarmEvent.emit({\n topic,\n peerAvailable: {\n peer,\n since: new Date(),\n },\n });\n });\n }\n }\n\n async leave(_ctx: Context, { topic, peer }: { topic: PublicKey; peer: PeerInfo }): Promise<void> {\n invariant(!this._ctx.disposed, 'Closed');\n\n this._joinedSwarms.delete({ topic, peer });\n\n if (!this._context.swarms.has(topic)) {\n this._context.swarms.set(topic, new ComplexSet(PeerInfoHash));\n }\n\n this._context.swarms.get(topic)!.delete(peer);\n\n const swarmEvent: SwarmEvent = {\n topic,\n peerLeft: {\n peer,\n },\n };\n\n this._context.swarmEvent.emit(swarmEvent);\n }\n\n async query(_ctx: Context, request: QueryRequest): Promise<SwarmResponse> {\n throw new Error('Not implemented');\n }\n\n async sendMessage(\n _ctx: Context,\n {\n author,\n recipient,\n payload,\n }: {\n author: PeerInfo;\n recipient: PeerInfo;\n payload: Any;\n },\n ): Promise<void> {\n log('send message', { author, recipient, ...dec(payload) });\n\n invariant(recipient);\n invariant(!this._ctx.disposed, 'Closed');\n\n await this._freezeTrigger.wait();\n\n const remote = this._context.connections.get(recipient);\n if (!remote) {\n log.warn('recipient is not subscribed for messages', { author, recipient });\n return;\n }\n\n if (remote._ctx.disposed) {\n log.warn('recipient is disposed', { author, recipient });\n return;\n }\n\n remote._freezeTrigger\n .wait()\n .then(() => {\n if (remote._ctx.disposed) {\n log.warn('recipient is disposed', { author, recipient });\n return;\n }\n\n log('receive message', { author, recipient, ...dec(payload) });\n\n remote.onMessage.emit({ author, recipient, payload });\n })\n .catch((err) => {\n log.error('error while waiting for freeze', { err });\n });\n }\n\n async subscribeMessages(peerInfo: PeerInfo): Promise<void> {\n log('subscribing', { peerInfo });\n this._context.connections.set(peerInfo, this);\n }\n\n async unsubscribeMessages(peerInfo: PeerInfo): Promise<void> {\n log('unsubscribing', { peerInfo });\n this._context.connections.delete(peerInfo);\n }\n\n freeze(): void {\n this._freezeTrigger.reset();\n }\n\n unfreeze(): void {\n this._freezeTrigger.wake();\n }\n}\nconst dec = (payload: Any) => {\n if (!payload.type_url.endsWith('ReliablePayload')) {\n return {};\n }\n\n const relPayload = schema.getCodecForType('dxos.mesh.messaging.ReliablePayload').decode(payload.value);\n\n if (typeof relPayload?.payload?.data === 'object') {\n return { payload: Object.keys(relPayload?.payload?.data)[0], sessionId: relPayload?.payload?.sessionId };\n }\n\n return {};\n};\n"],
|
|
5
|
+
"mappings": ";;;AAIA,SAASA,cAAcC,wCAAwCC,cAAcC,4BAA4B;AAEzG,SAASC,eAAe;AACxB,SAASC,iBAAiB;AAC1B,SAASC,iBAAiB;AAC1B,SAASC,WAAW;AACpB,SAASP,gBAAgBQ,4BAA4B;AACrD,SAASC,cAAc;AAEvB,SAASC,YAAYC,kBAAkB;;;ACTvC,SAASC,aAAa;AAEf,IAAMC,mBAAN,MAAMA;EACJC,yBAA+B;AACpCF,UAAMG,QAAQC,UAAU,yCAAyC,CAAA;EACnE;EAEOC,sBAAsBC,QAAuD;AAClFN,UAAMG,QAAQC,UAAU,4CAA4C,GAAG;MACrEG,MAAM;QACJC,SAASF,OAAOG;QAChBC,UAAUJ,OAAOK;MACnB;IACF,CAAA;EACF;AACF;;;ACZO,IAAMC,kBAAkB;;;AFoB/B,IAAA,eAAMC;AAGN,IAAMC,kBAAAA,OAAAA,gBAAgC,qCAAA;AAEtC,IAAA,kBAAA,OAAA,gBAAA,qCAAA;;AAKmBC,IAAAA,YAAAA,MAA8B;EAC/C,WAAA,IAAA,iBAAA;EACiBC;;EAKAC,aAAAA,IAAAA,WAAwBC,CAAAA,EAA8B,QAAA,YAAA,MAAA,SAAA,WAAA;;EAItDC,oBAAoB,oBAAIC,IAAAA;EAEzC,kBAAA,IAAA,WAAA,UAAA,IAAA;;;;;EAMQC,WAAU,IAAK,WAAA,UAAA,IAAA;EACNC;EAEjB,UAAA;;cAEOA,EAAAA,eAAcC,aAAAA,IAAAA,GAAAA;AAEnB,SAAKC,iBAAI;AACX,SAAA,cAAA;AAEAA,SAAa,KAAA;;;AAGX,QAAA,CAAA,KAAA,SAAA;AACI;IACJ;QACEC,qBAAsBC,QAAMC,EAAAA,YAAAA,YAAAA,GAAAA,cAAAA,GAAAA,IAAAA,GAAAA,KAAAA,CAAAA;AAC9B,SAAA,OAAA,IAAA,QAAA;MACI,SAAMC,CAAAA,QACR,IAAI,MAACb,KAAAA,QAAec,EAAAA,YAAa,YAAOC,GAAAA,cAAAA,GAAAA,IAAAA,GAAAA,KAAAA,CAAAA;qBAClC,YAAA,GAAA,cAAoB,GAAA,GAAA,CAAA;cAAEC,UAAMD,KAAQE,eAAM,UAAA,GAAA,OAAA,YAAA;AAAC,UAAA,oBAAA;QAC/C,MAAU,QAACC;MACb,GAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,IAAA,GAAA,KAAA,CAAA;AAGF,YAAA,KAAA,eAA8B,OAAA;IAC9BC,CAAAA,CAAAA;AAIE,yBACApB,KAAAA,MAAAA,YAAAA;AAGE,WAACO,WAAU;IACfc,GAAAA,6BAAI;AACN,SAAA,UAAA;AAEA,QAAMC,oBAAuB,QAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,IAAA,GAAA,KAAA,CAAA;;gBAEzB;AACF,QAAA,KAAA,SAAA;AACI;IACJ;AACF,SAAA,UAAA;AAEA,UAAMC,KAAAA,KAAYC,QAAgBN;;QAEhC,YAAMO,KAAAA,EAAAA,QAAsBC,WAAW,QAAA,GAAA;AAEvC,cAAMC,CAAAA,KAAAA,SAAmC,UAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,IAAA,GAAA,MAAA,GAAA,CAAA,iBAAA,UAAA,EAAA,CAAA;UACvCC,iBAAWC,KAAUC,KAAM,OAAA;UAC3BC,kBAAAA;MACF,WAAA,UAAA,OAAA;MACAC;IACAX;cAAsBO,CAAAA,KAAWD,gBAAgBC,IAAAA,gBAAS,SAAA,GAAA,QAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,IAAA,GAAA,MAAA,GAAA,CAAA,wDAAA,EAAA,EAAA,CAAA;QAAEV,gBAAAA;MAAQe,WAAAA,gBAAAA;MAAU;MAE1EC;IACJ,GAAA,EAAA,YAAIC,YAAAA,GAAAA,cAAAA,GAAAA,IAAAA,GAAAA,KAAAA,CAAAA;AACJ,QAAIC;AAEJ,QAAA;QACEF,eAAAA;UACAC,UAAAA,IAAaE,QAAAA,CAAAA,SAAAA,WAAAA;AACf,wBAAA;AAEA,mBAAA;IACAC,CAAAA;2CAGyDV,gBAAS,YAAA;AAAC,UAAA,oBAAA;QAC/DQ,WAAAA,gBAAAA;MACA,GAAA,EAAA,YAAWG,YAAc,GAACf,cAAK,GAAA,IAAA,GAAA,KAAA,CAAA;;YAAUS,KAAAA,eAAAA,KAAAA;QAAWN;QAAmBf;;eACjC,CAAA,QAAA,IAAA,0BAAA;QAGnCJ;MAGPgC,GAAAA,EAAAA,YACEf,YACA,GAAA,cAAA,GAAA,IAAA,GAAA,KAAA,CAAA,CAAA;YACM,WAAA;iBAA2BG,gBAAWD,MAAAA;AAA0B,UAAA,yBAAA;QAChE,WAACc,gBAAuBd;MAC5BQ,GAAAA,EAAAA,YACE,YAAIO,GAAAA,cAAqB,GAAA,KAAA,GAAA,KAAA,CAAA;WACvB1B,gBAAS,OAAA,gBAAA,SAAA;iBACF,IAAI2B,qBAAaC;QAC1B,SAAA;QAEF,OAAKnB,IAAAA,aAAsB,iBAAA,uBAAA;MAC3B,CAAA,CAAA;WAAsCW,eAAAA,QAAAA;WAAcS,SAAM,sBAAA;QAAM;QAElED,MAAAA;MAGE,CAACH;sBACHP;SACA,gBAAKO,IAAgBK,gBAAOnB,WAAgBC,MAAAA;AAC5C,sBAAKH;AACL,WAAKsB,gBAASC,OAAAA,gBAAsB,SAAA;WAAEZ,eAAAA,QAAAA;WAAcS,SAAM,sBAAA;QAAK;QACjE,MAAA;MAEA,CAAA;;UAAyCZ,KAAAA,eAAAA,KAAAA;MAAWN;MAAgB;MACpE;IACF,CAAA;AAEA,WAAA;;;;;;QAeE,OAAW1B,EAAAA,MAAAA,aAAegD,UAAAA,GAAkBC;AAC5C,cAAIC,CAAAA,KAAAA,SAAAA,UAAAA,EAAAA,YAAAA,YAAAA,GAAAA,cAAAA,GAAAA,KAAAA,GAAAA,MAAAA,GAAAA,CAAAA,iBAAAA,UAAAA,EAAAA,CAAAA;AACJnB,UAAAA,KAAUkB,eAAc,kBAAA,IAAA;AAExB,QAAI;cACFC,KAAAA,SAAiBhD,wBAAsB+C,EAAKE,YAAO,YAAA,GAAA,cAAA,GAAA,KAAA,GAAA,MAAA,GAAA,CAAA,gBAAA,wBAAA,EAAA,CAAA;QACnD,CAAA,aAAKD;kBACHA,KAAY,kBAAIE,IAAAA,KAAAA,OAAAA;UAChB,CAAA,WAAKlD;AACP,oBAAA,oBAAA,IAAA;AACK,aAAA,kBAAA,IAAA,KAAA,SAAA,SAAA;MACLgD;;kBAAwDG,KAAAA,WAAAA,IAAAA;QAAY,QAAA,KAAA;QAChE;;UAEF,CAAA,WAAKpD;oBAAyBgD,oBAAAA,IAAKE;aAASE,WAAAA,IAAAA;UAAeH,QAAAA,KAAAA;UAC7D;QACF,GAAA,SAAA;MAEAA;IAEA;cACEI,IAAAA,SAAa;;MAEb,aAAA,YAAA;AACF,kBAAA,OAAA,SAAA;MACF;IAEA;;uBAaIrC,KAAAA,EAAAA,QAAAA,WAAAA,gBAAAA,GAAAA;UACAe,KAAAA,eAAAA,YAAAA,KAAAA;MACAF;;eAEEyB;kBAAiDC;QAAkB,OAAA,gBAAA,OAAA,iBAAA;UACrE,aAAA;QACF,CAAA;MACF;IAEA,CAAA;;uBAES,SAAA;oBAAuC,QAAA,UAAA;;AAG5C,cAAA,KAAA,uBAAA,OAAA;AACK;MAAuC;;AACmB,cAAA,KAAA,uBAAA;UAC7D,SAAA,QAAA;QACF,CAAA;AACF;MACF;IAEA;;QAEE,uBAAyC1D,EAAAA,QAAAA,WAAsB,QAACgC,GAAQyB;cAASC,QAAa,aAAA,uCAAA,QAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,KAAA,GAAA,MAAA,GAAA,CAAA,8DAAA,EAAA,EAAA,CAAA;AAAK,UAAA,kBAAA,gBAAA,OAAA,QAAA,OAAA;MAE/F,aAAA;;AAA2D,QAAA,oBAAA;MAE3D,WAAA,gBAAA;qBACQ,YAACC,GAAAA,cAAyB,GAAChC,KAAI,GAAE,KAAA,CAAA;;YAEzCO,KAAAA,qBAAAA,KAAAA,MAAAA;QACAL;QACF;QACA,WAAY,gBAAA;MACZ,CAAA;aACA,KAAMf;AACR,WAAA,SAAA,uBAAA;AAEA,YAAA;IACA;AAEA,QAAA,KAAA,kBAAA,IAAA,gBAAA,SAAA,GAAA;AAEI;IAEJ;SACEK,kBAAAA,IAAAA,gBAAAA,SAAAA;UACAe,KAAAA,eAAAA;MACAF;MACF;MACF,SAAA,gBAAA;IAEA,CAAA;;QAEE,uBAAyB4B,EAAAA,QAAAA,GAAAA;AAC3B,cAAA,QAAA,aAAA,uCAAA,QAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,KAAA,GAAA,MAAA,GAAA,CAAA,8DAAA,EAAA,EAAA,CAAA;AAEA,SAAcD,gBAAAA,IACZlC,gBAGES,OAAS,QACTL,KAKD,EACc,SAAA,IAAA;;6BACMA,KAAAA,EAAAA,QAAAA,WAAAA,UAAAA,GAAAA;QAAWX,eAAMgB;MAAW2B;MAAW,MAAA;MAE5D,IAAM;qBACI3B,YAAAA,GAAAA,cAAAA,GAAAA,KAAAA,GAAAA,KAAAA,CAAAA;UACRA,KAAAA,eAAWf,YAAAA,KAAAA;MACXa,QAAAA;iBACE8B;eACAL;kBAAgC5B;QAAU,OAAA,gBAAA,OAAA;UAC5C;QACF,CAAA;MACF;IAEA,CAAA;;uBAEcZ,SAAQiB;;AAElB,gBAAI6B,QAAAA,UAAoB,SAAA,wBAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,KAAA,GAAA,MAAA,GAAA,CAAA,6BAAA,wBAAA,EAAA,CAAA;YACtB,qBAAuBA,KAAAA,kBAAoB,IAAA,QAAA,UAAA,OAAA;8BAC1B9C;AACjB,mBAAA,YAAA,oBAAA;AACF,gBAAA,SAAA,OAAA;QACF;MAEA;;;YAGIsC,cAAatC,KAAQe,WAAQ8B,IAAAA;QAC/B,QAAA,QAAA,UAAA;QACIE,aAAa,QAAA,QAAA;;uBAEPC;AACR,mBAAA,YAAA,aAAA;AACF,gBAAA,SAAA,OAAA;QACF;MACF;IAEQC;;eAGD;UACH,QAAK5D,YAAiB,IAACyC;AACzB,eAAA,OAAA,KAAA,SAAA,KAAA,GAAA;AACI,WAACoB,kBAAc,OAAA,GAAA;IACnB;SACE,SAAKA,MAASC;AAChB,eAAA,OAAA,KAAA,kBAAA,KAAA,GAAA;AAEA,WAAMC,SAAUC,IAAAA,GAAAA;IAChB;UACEhD,UAAS,YAAA,IAAA,IAAoB;kBAAE+C,KAAAA;AAAQ,UAAA,KAAA,oBAAA;QACzC;MACF,GAAA,EAAA,YAAA,YAAA,GAAA,cAAA,GAAA,KAAA,GAAA,KAAA,CAAA;IACF;;;;;AGlUO,IAAME,eAAe,CAAC,EAAEC,QAAO,MAAiBA;;;ACdvD,SAASC,OAAOC,eAAe;AAE/B,SAASC,WAAAA,gBAAe;AACxB,SAASC,aAAAA,kBAAiB;AAC1B,SAASC,aAAAA,kBAAiB;AAC1B,SAASC,OAAAA,YAAW;AACpB,SAASC,UAAAA,eAAc;AAGvB,SAASC,cAAAA,aAAYC,cAAAA,mBAAkB;AAKvC,IAAAC,gBAAA;AAKWC,IAAa,6BAAbA,MAAqC;;EAGrCC,aAAaC,IAAAA,MAAAA;;EAGbC,SAAAA,IAAAA,YAAkBD,WAA0CE,IAAAA;;EAGvE,cAAA,IAAAF,YAAA,YAAA;;AAIWG,IAAAA,sBAAAA,MAA4C;EAC5CL;EAEAM,gBAAgBC,IAAAA,MAAiB;EAE1C,aAAA,IAAA,MAAA;EAKQC,YAAe,IAAA,MAAA;;EAEoB,gBAAA,IAAAC,YAAA,CAAA,EAAA,OAAA,KAAA,MAAA,MAAA,MAAA,IAAA,KAAA,OAAA;EAC1BC;;mBAEYC,IAAAA,QAAAA,EAAAA,KAAAA;cACtBH,UAAWI;AAEhB,SAAKJ,WAAKK;AACZ,SAAA,OAAA,IAAAD,SAAA,QAAA,EAAA,YAAA,YAAA,GAAAb,eAAA,GAAA,GAAA,CAAA;AAEA,SAAMe,KAAsB,UAAA,KAAA,SAAA,WAAA,GAAA,CAAA,SAAA,KAAA,WAAA,KAAA,IAAA,CAAA,CAAA;;eAExB;AACF,QAAA,CAAA,KAAA,KAAA,UAAA;AACI;IACJ;AAEA,SAAA,OAAMC,IAAQC,SAAI,QAAA,EAAA,YAAA,YAAA,GAAAjB,eAAA,GAAA,GAAA,CAAA;cAAI,UAAKkB,KAAa,SAAO,WAAA,GAAA,CAAA,SAAA,KAAA,WAAA,KAAA,IAAA,CAAA,CAAA;UAAQ,QAACC,IAAU;MACpE,GAAA,KAAA,cAAA,OAAA;IAEA,EAAMC,IAAAA,CAAAA,UAAuB,KAAA,KAAA,KAAA,MAAA,KAAA,CAAA,CAAA;;gBAEzB;AACF,QAAA,KAAA,KAAA,UAAA;AACA;IACA;UAEkC,mBAAA,IAAAV,YAAA,CAAA,EAAA,OAAA,KAAA,MAAA,MAAA,MAAA,IAAA,KAAA,SAAA;MAGlC,GAAMM,KAAAA,cAAY,OAAA;;UAAqC,QAACG,IAAU;MAElE,GAAA,KAAA,cAAA,OAAA;IACA,EAAA,IAAKD,CAAAA,UAAAA,KAAa,MAAGG,KAAAA,MAAAA,KAAAA,CAAAA,CAAAA;AAGvB,SAAA,gBAAA;AAEAC,UAAAA,KAA4B,KAAA,QAAA;;EAE5B,YAAA;AAEA,WAAWb,CAAAA;;QAGT,KAAKS,MAAAA,EAAAA,OAAiB,KAAC,GAAA;eAAEK,CAAAA,KAAAA,KAAAA,UAAAA,UAAAA,EAAAA,YAAAA,YAAAA,GAAAA,eAAAA,GAAAA,IAAAA,GAAAA,MAAAA,GAAAA,CAAAA,uBAAAA,UAAAA,EAAAA,CAAAA;SAAOC,cAAAA,IAAAA;MAAK;MAEjC;;AAEJ,QAAA,CAAA,KAAA,SAAA,OAAA,IAAA,KAAA,GAAA;AAEI,WAACZ,SAASV,OAAWqB,IAAAA,OAAYC,IAAAA,YAAAA,YAAAA,CAAAA;IACrC;SACED,SAAAA,OAAAA,IAAAA,KAAAA,EAAAA,IAAAA,IAAAA;SACAE,SAAAA,WAAe,KAAA;;qBAEFC;QACb;QACF,OAAA,oBAAA,KAAA;MAEA;IACA,CAAA;eAEI,CAAIH,QAACtB,KAAW0B,KAAK,KAAA,SAAA,QAAA;iBACnBJ,KAAAA,EAAAA,QAAAA,CAAAA,UAAAA;aACAE,WAAAA,KAAe;;yBAEFC;YACb,MAAAF;YACF,OAAA,oBAAA,KAAA;UACF;QACF,CAAA;MACF,CAAA;IAEA;;QAGE,MAAKN,MAAAA,EAAAA,OAAcU,KAAO,GAAA;eAAEL,CAAAA,KAAAA,KAAAA,UAAAA,UAAAA,EAAAA,YAAAA,YAAAA,GAAAA,eAAAA,GAAAA,IAAAA,GAAAA,MAAAA,GAAAA,CAAAA,uBAAAA,UAAAA,EAAAA,CAAAA;SAAOC,cAAAA,OAAAA;MAAK;MAEpC;;AAEJ,QAAA,CAAA,KAAA,SAAA,OAAA,IAAA,KAAA,GAAA;AAEI,WAACZ,SAASV,OAAWqB,IAAAA,OAAQK,IAAOJ,YAAAA,YAAAA,CAAAA;IAExC;SACED,SAAAA,OAAAA,IAAAA,KAAAA,EAAAA,OAAAA,IAAAA;UACAM,aAAU;;MAEV,UAAA;QACF;MAEI;IACN;AAEA,SAAMC,SAAqBC,WAA+C,KAAA,UAAA;;EAE1E,MAAA,MAAA,MAAA,SAAA;AAEA,UAAMC,IAAAA,MACJvB,iBAGEwB;;oBAQoBC,MAAAA,EAAAA,QAAAA,WAAAA,QAAAA,GAAAA;SAAQD,gBAAAA;MAAW;MAAgB;MAEzDE,GAAAA,IAAUF,OAAAA;IACVE,GAAAA,EAAAA,YAAW,YAAUC,GAAAA,eAAU,GAAA,KAAA,GAAA,KAAA,CAAA;AAE/B,IAAAD,WAAU,WAACxB,QAAe0B,EAAAA,YAAI,YAAA,GAAArC,eAAA,GAAA,KAAA,GAAA,MAAA,GAAA,CAAA,aAAA,EAAA,EAAA,CAAA;AAE9B,IAAAmC,WAAMG,CAAAA,KAAS,KAAK1B,UAASR,UAAW,EAACmC,YAAIN,YAAAA,GAAAA,eAAAA,GAAAA,KAAAA,GAAAA,MAAAA,GAAAA,CAAAA,uBAAAA,UAAAA,EAAAA,CAAAA;AAC7C,UAAKK,KAAAA,eAAQ,KAAA;UACXE,SAAS,KAAA,SAAA,YAAA,IAAA,SAAA;iBAA8CN;WAAQD,KAAAA,4CAAAA;QAAU;QACzE;MACF,GAAA,EAAA,YAAA,YAAA,GAAAjC,eAAA,GAAA,KAAA,GAAA,KAAA,CAAA;AAEIsC;;eACkCJ,KAAAA,UAAAA;WAAQD,KAAAA,yBAAAA;QAAU;QACtD;MACF,GAAA,EAAA,YAAA,YAAA,GAAAjC,eAAA,GAAA,KAAA,GAAA,KAAA,CAAA;AAEAsC;;0BAIe,KAAA,EAAA,KAAA,MAAA;iBAA2BJ,KAAAA,UAAAA;aAAQD,KAAAA,yBAAAA;UAAU;UACtD;QACF,GAAA,EAAA,YAAA,YAAA,GAAAjC,eAAA,GAAA,KAAA,GAAA,KAAA,CAAA;AAEI;;WAA6BiC,mBAAAA;QAAW;QAAgB;QAE5DK,GAAO/B,IAAAA,OAAUoB;uBAAOO,YAAAA,GAAAA,eAAAA,GAAAA,KAAAA,GAAAA,KAAAA,CAAAA;aAAQD,UAAAA,KAAAA;QAAWQ;QAAQ;QAE/C;MACJD,CAAAA;aAA8CE,CAAAA,QAAAA;AAAI,MAAAF,KAAA,MAAA,kCAAA;QACpD;MACJ,GAAA,EAAA,YAAA,YAAA,GAAAxC,eAAA,GAAA,KAAA,GAAA,KAAA,CAAA;IAEA,CAAA;;0BACuB2C,UAAAA;AAAS,IAAAH,KAAA,eAAA;MAC1B;IACN,GAAA,EAAA,YAAA,YAAA,GAAAxC,eAAA,GAAA,KAAA,GAAA,KAAA,CAAA;AAEA,SAAM4C,SAAAA,YAAoBD,IAAkB,UAAiB,IAAA;;4BACpCA,UAAAA;AAAS,IAAAH,KAAA,iBAAA;MAC5B;IACN,GAAA,EAAA,YAAA,YAAA,GAAAxC,eAAA,GAAA,KAAA,GAAA,KAAA,CAAA;AAEA6C,SAAe,SAAA,YAAA,OAAA,QAAA;;EAEf,SAAA;AAEAC,SAAAA,eAAiB,MAAA;;EAEjB,WAAA;AACF,SAAA,eAAA,KAAA;EACA;;UAEI,CAAA,YAAQ;AACV,MAAA,CAAA,QAAA,SAAA,SAAA,iBAAA,GAAA;AAEA,WAAMC,CAAAA;EAEN;QACE,aAAOC,QAAA,gBAAA,qCAAA,EAAA,OAAA,QAAA,KAAA;aAAEP,YAASQ,SAAYF,SAAYN,UAASS;WAAUC;MAA0C,SAAA,OAAA,KAAA,YAAA,SAAA,IAAA,EAAA,CAAA;MACzG,WAAA,YAAA,SAAA;IAEA;EACF;;;",
|
|
6
|
+
"names": ["TimeoutError", "scheduleExponentialBackoffTaskInterval", "scheduleTask", "scheduleTaskInterval", "Context", "invariant", "PublicKey", "log", "ProtocolTimeoutError", "schema", "ComplexMap", "ComplexSet", "trace", "MessengerMonitor", "recordMessageAckFailed", "metrics", "increment", "recordReliableMessage", "params", "tags", "success", "sent", "attempts", "sendAttempts", "MESSAGE_TIMEOUT", "ReliablePayload", "RECEIVED_MESSAGES_GC_INTERVAL", "_signalManager", "_listeners", "_defaultListeners", "Map", "_receivedMessages", "ComplexSet", "_closed", "_retryDelay", "retryDelay", "open", "onError", "catch", "err", "onDispose", "onMessage", "message", "from", "author", "_handleMessage", "scheduleTaskInterval", "log", "close", "sendMessage", "ctx", "messageContext", "_ctx", "reliablePayload", "messageId", "PublicKey", "random", "payload", "invariant", "recipient", "messageReceived", "timeoutHit", "sendAttempts", "reject", "scheduleExponentialBackoffTaskInterval", "_encodeAndSend", "scheduleTask", "_onAckCallbacks", "ProtocolTimeoutError", "TimeoutError", "MESSAGE_TIMEOUT", "sent", "delete", "_monitor", "recordReliableMessage", "subscribeMessages", "peer", "listeners", "peerKey", "Set", "payloadType", "unsubscribe", "value", "preserveAny", "_sendAcknowledgement", "Acknowledgement", "to", "type_url", "defaultListenerMap", "listenerMap", "listener", "_performGc", "_toClear", "add", "elapsed", "performance", "PeerInfoHash", "peerKey", "Event", "Trigger", "Context", "invariant", "PublicKey", "log", "schema", "ComplexMap", "ComplexSet", "__dxlog_file", "swarmEvent", "swarms", "ComplexMap", "connections", "PeerInfoHash", "statusChanged", "onMessage", "Event", "_ctx", "ComplexSet", "_freezeTrigger", "_context", "Context", "onDispose", "open", "Promise", "all", "_joinedSwarms", "value", "close", "joinedSwarmsCopy", "getStatus", "topic", "peer", "peerAvailable", "Date", "emit", "delete", "peerLeft", "query", "request", "sendMessage", "recipient", "author", "invariant", "disposed", "wait", "remote", "get", "log", "payload", "err", "peerInfo", "unsubscribeMessages", "freeze", "unfreeze", "relPayload", "schema", "Object", "data", "sessionId"]
|
|
7
|
+
}
|