@keetanetwork/anchor 0.0.38 → 0.0.40
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/client/index.d.ts +6 -0
- package/client/index.d.ts.map +1 -1
- package/client/index.js +7 -0
- package/client/index.js.map +1 -1
- package/lib/block-listener.d.ts +93 -0
- package/lib/block-listener.d.ts.map +1 -0
- package/lib/block-listener.js +259 -0
- package/lib/block-listener.js.map +1 -0
- package/lib/encrypted-container.d.ts +53 -3
- package/lib/encrypted-container.d.ts.map +1 -1
- package/lib/encrypted-container.js +549 -93
- package/lib/encrypted-container.js.map +1 -1
- package/lib/error.d.ts.map +1 -1
- package/lib/error.js +3 -1
- package/lib/error.js.map +1 -1
- package/lib/http-server/index.d.ts +14 -1
- package/lib/http-server/index.d.ts.map +1 -1
- package/lib/http-server/index.js +144 -12
- package/lib/http-server/index.js.map +1 -1
- package/lib/queue/drivers/queue_firestore.d.ts +29 -0
- package/lib/queue/drivers/queue_firestore.d.ts.map +1 -0
- package/lib/queue/drivers/queue_firestore.js +279 -0
- package/lib/queue/drivers/queue_firestore.js.map +1 -0
- package/lib/queue/index.d.ts +74 -3
- package/lib/queue/index.d.ts.map +1 -1
- package/lib/queue/index.js +161 -36
- package/lib/queue/index.js.map +1 -1
- package/lib/resolver.d.ts +61 -15
- package/lib/resolver.d.ts.map +1 -1
- package/lib/resolver.js +1132 -686
- package/lib/resolver.js.map +1 -1
- package/lib/utils/signing.d.ts +12 -3
- package/lib/utils/signing.d.ts.map +1 -1
- package/lib/utils/signing.js +7 -13
- package/lib/utils/signing.js.map +1 -1
- package/npm-shrinkwrap.json +6 -6
- package/package.json +2 -1
- package/services/asset-movement/client.d.ts +10 -3
- package/services/asset-movement/client.d.ts.map +1 -1
- package/services/asset-movement/client.js +36 -3
- package/services/asset-movement/client.js.map +1 -1
- package/services/asset-movement/common.d.ts +57 -22
- package/services/asset-movement/common.d.ts.map +1 -1
- package/services/asset-movement/common.js +370 -70
- package/services/asset-movement/common.js.map +1 -1
- package/services/fx/client.d.ts +15 -3
- package/services/fx/client.d.ts.map +1 -1
- package/services/fx/client.js +18 -0
- package/services/fx/client.js.map +1 -1
- package/services/fx/common.d.ts +1 -1
- package/services/fx/common.js.map +1 -1
- package/services/fx/server.d.ts +59 -9
- package/services/fx/server.d.ts.map +1 -1
- package/services/fx/server.js +337 -140
- package/services/fx/server.js.map +1 -1
- package/services/fx/util.d.ts +26 -8
- package/services/fx/util.d.ts.map +1 -1
- package/services/fx/util.js +92 -4
- package/services/fx/util.js.map +1 -1
- package/services/storage/client.d.ts +322 -0
- package/services/storage/client.d.ts.map +1 -0
- package/services/storage/client.js +1058 -0
- package/services/storage/client.js.map +1 -0
- package/services/storage/common.d.ts +653 -0
- package/services/storage/common.d.ts.map +1 -0
- package/services/storage/common.generated.d.ts +17 -0
- package/services/storage/common.generated.d.ts.map +1 -0
- package/services/storage/common.generated.js +863 -0
- package/services/storage/common.generated.js.map +1 -0
- package/services/storage/common.js +587 -0
- package/services/storage/common.js.map +1 -0
- package/services/storage/lib/validators.d.ts +64 -0
- package/services/storage/lib/validators.d.ts.map +1 -0
- package/services/storage/lib/validators.js +82 -0
- package/services/storage/lib/validators.js.map +1 -0
- package/services/storage/server.d.ts +127 -0
- package/services/storage/server.d.ts.map +1 -0
- package/services/storage/server.js +626 -0
- package/services/storage/server.js.map +1 -0
- package/services/storage/test-utils.d.ts +70 -0
- package/services/storage/test-utils.d.ts.map +1 -0
- package/services/storage/test-utils.js +347 -0
- package/services/storage/test-utils.js.map +1 -0
- package/services/storage/utils.d.ts +3 -0
- package/services/storage/utils.d.ts.map +1 -0
- package/services/storage/utils.js +10 -0
- package/services/storage/utils.js.map +1 -0
- package/services/username/client.d.ts +145 -0
- package/services/username/client.d.ts.map +1 -0
- package/services/username/client.js +681 -0
- package/services/username/client.js.map +1 -0
- package/services/username/common.d.ts +136 -0
- package/services/username/common.d.ts.map +1 -0
- package/services/username/common.generated.d.ts +13 -0
- package/services/username/common.generated.d.ts.map +1 -0
- package/services/username/common.generated.js +256 -0
- package/services/username/common.generated.js.map +1 -0
- package/services/username/common.js +226 -0
- package/services/username/common.js.map +1 -0
- package/services/username/server.d.ts +51 -0
- package/services/username/server.d.ts.map +1 -0
- package/services/username/server.js +264 -0
- package/services/username/server.js.map +1 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"server.js","sourceRoot":"","sources":["../../../src/services/storage/server.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,qBAAqB,MAAM,gCAAgC,CAAC;AACxE,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,EACN,oBAAoB,EACpB,MAAM,oBAAoB,CAAC;AAe5B,OAAO,EACN,sCAAsC,EACtC,mCAAmC,EACnC,kCAAkC,EAClC,qCAAqC,EACrC,sCAAsC,EACtC,qCAAqC,EACrC,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EACN,6CAA6C,EAC7C,0CAA0C,EAC1C,0CAA0C,EAC1C,6CAA6C,EAC7C,4CAA4C,EAC5C,qBAAqB,EACrB,MAAM,EACN,yBAAyB,EACzB,8BAA8B,EAC9B,MAAM,aAAa,CAAC;AACrB,OAAO,EAAE,gBAAgB,EAAE,MAAM,4BAA4B,CAAC;AAC9D,OAAO,EAAE,qBAAqB,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAC/F,OAAO,EAAE,uBAAuB,EAAE,MAAM,EAAE,MAAM,2BAA2B,CAAC;AAC5E,OAAO,EAAE,kBAAkB,EAAE,sBAAsB,EAAE,MAAM,qBAAqB,CAAC;AACjF,OAAO,EAAE,kBAAkB,EAAE,uBAAuB,EAAE,MAAM,kCAAkC,CAAC;AAC/F,OAAO,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAI9C;;GAEG;AACH,SAAS,mBAAmB,CAAC,OAAsB;IAClD,MAAM,QAAQ,GAAqC;QAClD,EAAE,EAAE,IAAI;QACR,OAAO,EAAE,OAAO,CAAC,OAAO;KACxB,CAAC;IACF,IAAI,OAAO,CAAC,UAAU,KAAK,SAAS,EAAE,CAAC;QACtC,QAAQ,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IAC1C,CAAC;IACD,OAAM,CAAC,QAAQ,CAAC,CAAC;AAClB,CAAC;AAED,+BAA+B;AAE/B;;;;;;;GAOG;AACH,SAAS,gBAAgB,CACxB,YAAmC,EACnC,OAAgB,EAChB,IAAY,EACZ,SAA2D;IAE3D,KAAK,MAAM,MAAM,IAAI,YAAY,EAAE,CAAC;QACnC,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAClC,IAAI,MAAM,KAAK,IAAI,EAAE,CAAC;YACrB,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;YAEtB,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,CAAC;gBACrD,MAAK,CAAC,IAAI,MAAM,CAAC,YAAY,CAAC,oCAAoC,CAAC,CAAC,CAAC;YACtE,CAAC;YAED,OAAM,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC,CAAC;QAC5B,CAAC;IACF,CAAC;IAED,MAAK,CAAC,IAAI,MAAM,CAAC,WAAW,CAAC,gCAAgC,CAAC,CAAC,CAAC;AACjE,CAAC;AAED;;;;;;GAMG;AACH,SAAS,SAAS,CACjB,YAAmC,EACnC,IAAY;IAEZ,KAAK,MAAM,MAAM,IAAI,YAAY,EAAE,CAAC;QACnC,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAClC,IAAI,MAAM,KAAK,IAAI,EAAE,CAAC;YACrB,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;YACtB,OAAM,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC,CAAC;QAC5B,CAAC;IACF,CAAC;IAED,MAAK,CAAC,IAAI,MAAM,CAAC,WAAW,CAAC,gCAAgC,CAAC,CAAC,CAAC;AACjE,CAAC;AAED;;;;;;;;;;;;;GAaG;AACH,KAAK,UAAU,cAAc,CAC5B,OAAU,EACV,cAAoC;IAEpC,IAAI,CAAC,OAAO,CAAC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC;QACzC,MAAK,CAAC,IAAI,oBAAoB,CAAC,yBAAyB,CAAC,CAAC,CAAC;IAC5D,CAAC;IAED,MAAM,OAAO,GAAG,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,mBAAmB,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,aAAa,EAAE,CAAC;IAC1F,MAAM,QAAQ,GAAG,cAAc,CAAC,OAAO,CAAC,CAAC;IACzC,MAAM,MAAM,GAAG,qBAAqB,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;IAErD,MAAM,KAAK,GAAG,MAAM,gBAAgB,CAAC,OAAO,EAAE,QAAQ,EAAE,MAAM,CAAC,CAAC;IAChE,IAAI,CAAC,KAAK,EAAE,CAAC;QACZ,MAAK,CAAC,IAAI,oBAAoB,CAAC,mBAAmB,CAAC,CAAC,CAAC;IACtD,CAAC;IAED,OAAM,CAAC,OAAO,CAAC,CAAC;AACjB,CAAC;AAED;;;;;;;;;;;;;;GAcG;AACH,KAAK,UAAU,aAAa,CAC3B,GAAiB,EACjB,cAAoC,EACpC,YAA0C;IAE1C,IAAI,SAAiB,CAAC;IACtB,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;QAC7B,SAAS,GAAG,GAAG,CAAC;IACjB,CAAC;SAAM,CAAC;QACP,SAAS,GAAG,GAAG,CAAC,IAAI,CAAC;IACtB,CAAC;IAED,MAAM,MAAM,GAAG,qBAAqB,CAAC,SAAS,CAAC,CAAC;IAChD,IAAI,CAAC,MAAM,CAAC,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC;QAC5C,MAAK,CAAC,IAAI,oBAAoB,CAAC,yBAAyB,CAAC,CAAC,CAAC;IAC5D,CAAC;IAED,MAAM,OAAO,GAAG,YAAY,CAAC,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,GAAG,EAAE,CAAC,CAAC;IACnE,MAAM,QAAQ,GAAG,cAAc,CAAC,OAAO,CAAC,CAAC;IAEzC,MAAM,KAAK,GAAG,MAAM,gBAAgB,CAAC,MAAM,CAAC,OAAO,EAAE,QAAQ,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC;IACnF,IAAI,CAAC,KAAK,EAAE,CAAC;QACZ,MAAK,CAAC,IAAI,oBAAoB,CAAC,mBAAmB,CAAC,CAAC,CAAC;IACtD,CAAC;IAED,OAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AACxB,CAAC;AAED;;;;;;;;;GASG;AACH,SAAS,iBAAiB,CAAC,MAA2B;IACrD,MAAM,YAAY,GAAG,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;IACtC,IAAI,CAAC,YAAY,EAAE,CAAC;QACnB,MAAK,CAAC,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC,CAAC;IACjC,CAAC;IAED,OAAM,CAAC,GAAG,GAAG,YAAY,CAAC,CAAC;AAC5B,CAAC;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,KAAK,UAAU,kBAAkB,CAChC,YAAmC,EACnC,MAA2B,EAC3B,GAAiB,EACjB,SAAgD,EAChD,cAAoC,EACpC,YAAwD;IAExD,MAAM,UAAU,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;IAC7C,SAAS,CAAC,YAAY,EAAE,UAAU,CAAC,CAAC;IAEpC,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,GAAG,EAAE,cAAc,EAAE,UAAS,MAAM;QACvE,OAAM,CAAC,YAAY,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;IAC1C,CAAC,CAAC,CAAC;IAEH,gBAAgB,CAAC,YAAY,EAAE,OAAO,EAAE,UAAU,EAAE,SAAS,CAAC,CAAC;IAE/D,OAAM,CAAC,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC,CAAC;AACjC,CAAC;AAsHD,8BAA8B;AAC9B,MAAM,cAAc,GAAgB;IACnC,aAAa,EAAE,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;IACxC,iBAAiB,EAAE,IAAI;IACvB,iBAAiB,EAAE,GAAG,GAAG,IAAI,GAAG,IAAI,EAAE,QAAQ;IAC9C,cAAc,EAAE,GAAG;IACnB,eAAe,EAAE,KAAK,CAAC,WAAW;CAClC,CAAC;AAEF,uCAAuC;AACvC,MAAM,sBAAsB,GAAG;IAC9B,OAAO,EAAE,EAAE;IACX,YAAY,EAAE,EAAE;IAChB,OAAO,EAAE,kBAAkB;CAC3B,CAAC;AAEF,MAAM,OAAO,+BAAgC,SAAQ,qBAAqB,CAAC,wBAAwD;IACzH,QAAQ,CAA0D;IAClE,OAAO,CAAqB;IAC5B,aAAa,CAAU;IACvB,MAAM,CAAc;IACpB,UAAU,CAAuB;IACjC,mBAAmB,CAAS;IAC5B,gBAAgB,CAAiB;IACjC,YAAY,CAAwB;IACpC,aAAa,CAAyE;IAE/F,YAAY,MAAsC;QACjD,KAAK,CAAC,MAAM,CAAC,CAAC;QAEd,IAAI,CAAC,QAAQ,GAAG,MAAM,CAAC,QAAQ,IAAI,EAAE,CAAC;QACtC,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,OAAO,CAAC;QAC9B,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,aAAa,CAAC;QAC1C,IAAI,CAAC,MAAM,GAAG,EAAE,GAAG,cAAc,EAAE,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;QACtD,IAAI,CAAC,UAAU,GAAG,MAAM,CAAC,UAAU,IAAI,EAAE,CAAC;QAC1C,IAAI,CAAC,mBAAmB,GAAG,MAAM,CAAC,mBAAmB,IAAI,8BAA8B,CAAC;QACxF,IAAI,CAAC,gBAAgB,GAAG,MAAM,CAAC,gBAAgB,IAAI,KAAK,CAAC;QACzD,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,CAAC;QACxC,IAAI,CAAC,aAAa,GAAG;YACpB,OAAO,EAAE,MAAM,CAAC,aAAa,EAAE,OAAO,IAAI,sBAAsB,CAAC,OAAO;YACxE,YAAY,EAAE,MAAM,CAAC,aAAa,EAAE,YAAY,IAAI,sBAAsB,CAAC,YAAY;YACvF,OAAO,EAAE,MAAM,CAAC,aAAa,EAAE,OAAO,IAAI,sBAAsB,CAAC,OAAO;SACxE,CAAC;QAEF,yCAAyC;QACzC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE,CAAC;YACvC,MAAK,CAAC,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC,CAAC;QAC3D,CAAC;QAED,gDAAgD;QAChD,IAAI,IAAI,CAAC,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAK,CAAC,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC,CAAC;QAC/D,CAAC;QAED,mDAAmD;QACnD,IAAI,IAAI,CAAC,MAAM,CAAC,aAAa,IAAI,CAAC,EAAE,CAAC;YACpC,MAAK,CAAC,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC,CAAC;QAC3D,CAAC;QACD,IAAI,IAAI,CAAC,MAAM,CAAC,iBAAiB,IAAI,CAAC,EAAE,CAAC;YACxC,MAAK,CAAC,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC,CAAC;QAC/D,CAAC;QACD,IAAI,IAAI,CAAC,MAAM,CAAC,iBAAiB,IAAI,CAAC,EAAE,CAAC;YACxC,MAAK,CAAC,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC,CAAC;QAC/D,CAAC;QACD,IAAI,IAAI,CAAC,MAAM,CAAC,cAAc,IAAI,CAAC,EAAE,CAAC;YACrC,MAAK,CAAC,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC,CAAC;QAC5D,CAAC;QACD,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,IAAI,CAAC,EAAE,CAAC;YACtC,MAAK,CAAC,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC,CAAC;QAC7D,CAAC;QAED,wCAAwC;QACxC,IAAI,IAAI,CAAC,aAAa,CAAC,OAAO,IAAI,CAAC,EAAE,CAAC;YACrC,MAAK,CAAC,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC,CAAC;QAC5D,CAAC;QACD,IAAI,IAAI,CAAC,aAAa,CAAC,YAAY,IAAI,CAAC,EAAE,CAAC;YAC1C,MAAK,CAAC,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC,CAAC;QACjE,CAAC;IACF,CAAC;IAED,sDAAsD;IACtD,qFAAqF;IAC3E,KAAK,CAAC,UAAU,CAAC,aAA6C;QACvE,MAAM,MAAM,GAAiC,EAAE,CAAC;QAChD,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,CAAC;QAC7B,MAAM,aAAa,GAAG,IAAI,CAAC,aAAa,CAAC;QACzC,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC;QACnC,MAAM,gBAAgB,GAAG,IAAI,CAAC,gBAAgB,CAAC;QAC/C,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC;QACvC,MAAM,aAAa,GAAG,IAAI,CAAC,aAAa,CAAC;QACzC,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;QAE3B;;WAEG;QACH,SAAS,YAAY,CAAI,QAAW,EAAE,gBAAuC;YAC5E,OAAM,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC,CAAC;QAChE,CAAC;QAED;;WAEG;QACH,KAAK,UAAU,aAAa,CAAC,IAAY;YACxC,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;YACvC,IAAI,CAAC,MAAM,EAAE,CAAC;gBACb,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC,CAAC;YACtC,CAAC;YAED,OAAM,CAAC,MAAM,CAAC,CAAC;QAChB,CAAC;QAED;;WAEG;QACH,SAAS,kBAAkB,CAAC,UAAwC;YACnE,MAAM,cAAc,GAAG,UAAU,EAAE,KAAK,IAAI,MAAM,CAAC,cAAc,CAAC;YAClE,OAAM,CAAC,EAAE,GAAG,UAAU,EAAE,KAAK,EAAE,IAAI,CAAC,GAAG,CAAC,cAAc,EAAE,MAAM,CAAC,cAAc,CAAC,EAAE,CAAC,CAAC;QACnF,CAAC;QAED;;WAEG;QACH,SAAS,mBAAmB,CAC3B,OAAsB,EACtB,UAAqD;YAErD,KAAK,MAAM,GAAG,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;gBACnC,IAAI,UAAU,CAAC,UAAU,IAAI,GAAG,CAAC,UAAU,KAAK,UAAU,CAAC,UAAU,EAAE,CAAC;oBACvE,MAAK,CAAC,IAAI,MAAM,CAAC,kBAAkB,CAClC,oBAAoB,GAAG,CAAC,UAAU,cAAc,UAAU,CAAC,UAAU,SAAS,CAC9E,CAAC,CAAC;gBACJ,CAAC;gBACD,IAAI,UAAU,CAAC,KAAK,IAAI,GAAG,CAAC,KAAK,KAAK,UAAU,CAAC,KAAK,EAAE,CAAC;oBACxD,MAAK,CAAC,IAAI,MAAM,CAAC,kBAAkB,CAClC,oCAAoC,GAAG,CAAC,KAAK,kBAAkB,UAAU,CAAC,KAAK,EAAE,CACjF,CAAC,CAAC;gBACJ,CAAC;YACF,CAAC;QACF,CAAC;QAED;;WAEG;QACH,MAAM,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC;QAC/B,IAAI,QAAQ,EAAE,CAAC;YACd,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK;gBACtB,IAAI,YAAoB,CAAC;gBACzB,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;oBAClC,YAAY,GAAG,QAAQ,CAAC;gBACzB,CAAC;qBAAM,CAAC;oBACP,YAAY,GAAG,MAAM,QAAQ,EAAE,CAAC;gBACjC,CAAC;gBAED,OAAM,CAAC;oBACN,MAAM,EAAE,YAAY;oBACpB,WAAW,EAAE,WAAW;iBACxB,CAAC,CAAC;YACJ,CAAC,CAAC;QACH,CAAC;QAED,qBAAqB;QAErB,iDAAiD;QACjD,MAAM,CAAC,oBAAoB,CAAC,GAAG;YAC9B,QAAQ,EAAE,KAAK;YACf,WAAW,EAAE,MAAM,CAAC,aAAa;YACjC,OAAO,EAAE,KAAK,WAAU,MAAM,EAAE,QAAQ,EAAE,QAAQ,EAAE,GAAG;gBACtD,MAAM,UAAU,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;gBAE7C,iCAAiC;gBACjC,MAAM,SAAS,GAAG,IAAI,GAAG,CAAC,GAAG,CAAC,CAAC;gBAC/B,MAAM,eAAe,GAAG,SAAS,CAAC,YAAY,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;gBACjE,MAAM,SAAS,GAAG,SAAS,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;gBAErD,+DAA+D;gBAC/D,IAAI,UAAU,GAA4B,SAAS,CAAC;gBACpD,IAAI,eAAe,KAAK,IAAI,EAAE,CAAC;oBAC9B,UAAU,GAAG,gBAAgB,CAAC,eAAe,CAAC,CAAC;gBAChD,CAAC;gBAED,MAAM,OAAO,GAAa,CAAC,SAAS,IAAI,EAAE,CAAC;qBACzC,KAAK,CAAC,GAAG,CAAC;qBACV,GAAG,CAAC,UAAS,CAAC;oBACd,OAAM,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;gBAClB,CAAC,CAAC;qBACD,MAAM,CAAC,UAAS,CAAC;oBACjB,OAAM,CAAC,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;gBACtB,CAAC,CAAC,CAAC;gBAEJ,mBAAmB;gBACnB,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,GAAG,EAAE,0CAA0C,EAAE;oBACpF,OAAM,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,UAAU,EAAE,IAAI,EAAE,OAAO,EAAE,CAAC,CAAC;gBACzD,CAAC,CAAC,CAAC;gBAEH,gBAAgB;gBAChB,MAAM,EAAE,OAAO,EAAE,YAAY,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,aAAa,CAAC;gBACrE,KAAK,MAAM,GAAG,IAAI,OAAO,EAAE,CAAC;oBAC3B,IAAI,GAAG,CAAC,MAAM,GAAG,YAAY,EAAE,CAAC;wBAC/B,MAAK,CAAC,IAAI,MAAM,CAAC,UAAU,CAAC,iCAAiC,YAAY,MAAM,GAAG,GAAG,CAAC,CAAC,CAAC;oBACzF,CAAC;oBACD,oEAAoE;oBACpE,UAAU,CAAC,SAAS,GAAG,CAAC,CAAC;oBACzB,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;wBAC3B,MAAK,CAAC,IAAI,MAAM,CAAC,UAAU,CAAC,qCAAqC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAC3E,CAAC;gBACF,CAAC;gBACD,IAAI,OAAO,CAAC,MAAM,GAAG,OAAO,EAAE,CAAC;oBAC9B,MAAK,CAAC,IAAI,MAAM,CAAC,UAAU,CAAC,kBAAkB,OAAO,CAAC,MAAM,uBAAuB,OAAO,EAAE,CAAC,CAAC,CAAC;gBAChG,CAAC;gBACD,MAAM,IAAI,GAAG,OAAO,CAAC;gBAErB,gDAAgD;gBAChD,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,GAAG,gBAAgB,CAAC,YAAY,EAAE,OAAO,EAAE,UAAU,EAAE,KAAK,CAAC,CAAC;gBACtF,MAAM,KAAK,GAAG,OAAO,CAAC,eAAe,CAAC,GAAG,EAAE,CAAC;gBAC5C,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;oBAC7B,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAC;gBAC9D,CAAC;gBAED,+DAA+D;gBAC/D,MAAM,UAAU,GAAG,OAAO,CAAC,cAAc;oBACxC,CAAC,CAAC,MAAM,OAAO,CAAC,cAAc,CAAC,KAAK,CAAC;oBACrC,CAAC,CAAC,IAAI,CAAC;gBACR,MAAM,eAAe,GAAG,UAAU,IAAI,MAAM,CAAC;gBAE7C,0CAA0C;gBAC1C,MAAM,IAAI,GAAG,uBAAuB,CAAC,QAAQ,CAAC,CAAC;gBAC/C,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC;gBACnC,IAAI,UAAU,GAAG,eAAe,CAAC,aAAa,EAAE,CAAC;oBAChD,MAAK,CAAC,IAAI,MAAM,CAAC,aAAa,CAAC;wBAC9B,SAAS,EAAE,eAAe;wBAC1B,KAAK,EAAE,eAAe,CAAC,aAAa;wBACpC,OAAO,EAAE,UAAU;qBACnB,CAAC,CAAC,CAAC;gBACL,CAAC;gBAED,MAAM,eAAe,GAAG,kBAAkB,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC;gBACnE,MAAM,qBAAqB,GAAG,eAAe,IAAI,UAAU,KAAK,QAAQ,CAAC;gBACzE,IAAI,qBAAqB,EAAE,CAAC;oBAC3B,IAAI,CAAC;wBACJ,MAAM,SAAS,GAAG,kBAAkB,CAAC,mBAAmB,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC;wBAChF,MAAM,SAAS,GAAG,MAAM,SAAS,CAAC,YAAY,EAAE,CAAC;wBAEjD,IAAI,eAAe,EAAE,CAAC;4BACrB,sDAAsD;4BACtD,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,GAAG,qBAAqB,CAAC,SAAS,CAAC,CAAC;4BAC/D,MAAM,kBAAkB,GAAG,sBAAsB,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC;4BAC1E,KAAK,MAAM,SAAS,IAAI,kBAAkB,EAAE,CAAC;gCAC5C,MAAM,MAAM,GAAG,MAAM,SAAS,CAAC,QAAQ,CAAC,UAAU,EAAE,OAAO,EAAE,QAAQ,CAAC,CAAC;gCACvE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;oCACnB,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC;gCAClD,CAAC;4BACF,CAAC;wBACF,CAAC;oBACF,CAAC;oBAAC,OAAO,CAAC,EAAE,CAAC;wBACZ,IAAI,MAAM,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;4BAC3C,MAAK,CAAC,CAAC,CAAC,CAAC;wBACV,CAAC;wBACD,IAAI,uBAAuB,CAAC,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;4BAC3C,IAAI,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,CAAC;gCACrC,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,gCAAgC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;4BACjF,CAAC;4BACD,IAAI,CAAC,CAAC,IAAI,KAAK,iBAAiB,IAAI,CAAC,CAAC,IAAI,KAAK,mBAAmB,EAAE,CAAC;gCACpE,MAAK,CAAC,IAAI,MAAM,CAAC,uBAAuB,EAAE,CAAC,CAAC;4BAC7C,CAAC;wBACF,CAAC;wBACD,MAAK,CAAC,CAAC,CAAC,CAAC;oBACV,CAAC;gBACF,CAAC;gBAED,8BAA8B;gBAC9B,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,aAAa,CAAC,KAAK,EAAE,UAAU,EAAE,UAAU,EAAE;oBAC9E,WAAW,EAAE;wBACZ,iBAAiB,EAAE,eAAe,CAAC,iBAAiB;wBACpD,iBAAiB,EAAE,eAAe,CAAC,iBAAiB;qBACpD;iBACD,CAAC,CAAC;gBAEH,IAAI,cAAqC,CAAC;gBAC1C,IAAI,CAAC;oBACJ,cAAc,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,UAAU,EAAE,IAAI,EAAE;wBACpD,KAAK;wBACL,IAAI;wBACJ,UAAU;qBACV,CAAC,CAAC;oBAEH,MAAM,OAAO,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;gBAC5C,CAAC;gBAAC,OAAO,CAAC,EAAE,CAAC;oBACZ,IAAI,CAAC;wBACJ,MAAM,OAAO,CAAC,aAAa,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;oBAC7C,CAAC;oBAAC,OAAO,YAAY,EAAE,CAAC;wBACvB;;2BAEG;wBACH,MAAM,EAAE,IAAI,CAAC,sCAAsC,EAAE,EAAE,aAAa,EAAE,WAAW,CAAC,EAAE,EAAE,KAAK,EAAE,YAAY,EAAE,CAAC,CAAC;oBAC9G,CAAC;oBACD,MAAK,CAAC,CAAC,CAAC,CAAC;gBACV,CAAC;gBAED,MAAM,QAAQ,GAAkC;oBAC/C,EAAE,EAAE,IAAI;oBACR,MAAM,EAAE,cAAc;iBACtB,CAAC;gBAEF,OAAM,CAAC,YAAY,CAAC,QAAQ,EAAE,mCAAmC,CAAC,CAAC,CAAC;YACrE,CAAC;SACD,CAAC;QAEF,yCAAyC;QACzC,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,WAAU,MAAM,EAAE,SAAS,EAAE,QAAQ,EAAE,GAAG;YAC7E,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,kBAAkB,CAC9C,YAAY,EACZ,MAAM,EACN,GAAG,EACH,KAAK,EACL,0CAA0C,EAC1C,UAAS,IAAI,EAAE,MAAM;gBACpB,OAAM,CAAC,kCAAkC,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;YACvE,CAAC,CACD,CAAC;YAEF,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,UAAU,CAAC,CAAC;YAC/C,OAAM,CAAC;gBACN,MAAM,EAAE,MAAM,CAAC,IAAI;gBACnB,WAAW,EAAE,yBAAyB;aACtC,CAAC,CAAC;QACJ,CAAC,CAAC;QAEF,0CAA0C;QAC1C,MAAM,CAAC,uBAAuB,CAAC,GAAG,KAAK,WAAU,MAAM,EAAE,SAAS,EAAE,QAAQ,EAAE,GAAG;YAChF,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,kBAAkB,CAC9C,YAAY,EACZ,MAAM,EACN,GAAG,EACH,QAAQ,EACR,6CAA6C,EAC7C,UAAS,IAAI,EAAE,MAAM;gBACpB,OAAM,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC,CAAC;YACnC,CAAC,CACD,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACjD,MAAM,QAAQ,GAAqC;gBAClD,EAAE,EAAE,IAAI;gBACR,OAAO;aACP,CAAC;YAEF,OAAM,CAAC,YAAY,CAAC,QAAQ,EAAE,sCAAsC,CAAC,CAAC,CAAC;QACxE,CAAC,CAAC;QAEF,4CAA4C;QAC5C,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,WAAU,MAAM,EAAE,SAAS,EAAE,QAAQ,EAAE,GAAG;YAC/E,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,kBAAkB,CAC9C,YAAY,EACZ,MAAM,EACN,GAAG,EACH,UAAU,EACV,0CAA0C,EAC1C,UAAS,IAAI,EAAE,MAAM;gBACpB,OAAM,CAAC,kCAAkC,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;YACvE,CAAC,CACD,CAAC;YAEF,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,UAAU,CAAC,CAAC;YAC/C,OAAM,CAAC,YAAY,CAAC,EAAE,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,CAAC,QAAQ,EAAE,EAAE,mCAAmC,CAAC,CAAC,CAAC;QAClG,CAAC,CAAC;QAEF,wCAAwC;QACxC,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,WAAU,OAAO,EAAE,QAAQ;YAC5D,MAAM,OAAO,GAAG,qCAAqC,CAAC,QAAQ,CAAC,CAAC;YAChE,MAAM,OAAO,GAAG,MAAM,cAAc,CAAC,OAAO,EAAE,6CAA6C,CAAC,CAAC;YAC7F,MAAM,aAAa,GAAG,OAAO,CAAC,eAAe,CAAC,GAAG,EAAE,CAAC;YAEpD,0DAA0D;YAC1D,MAAM,eAAe,GAAG,OAAO,CAAC,QAAQ,CAAC,UAAU,KAAK,QAAQ,CAAC;YACjE,IAAI,eAAe,EAAE,CAAC;gBACrB,uFAAuF;gBACvF,iDAAiD;gBACjD,MAAM,cAAc,GAAG;oBACtB,GAAG,OAAO,CAAC,QAAQ;oBACnB,UAAU,EAAE,QAAiB;iBAC7B,CAAC;gBAEF,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,MAAM,CACnC,cAAc,EACd,kBAAkB,CAAC,OAAO,CAAC,UAAU,CAAC,CACtC,CAAC;gBAEF,mBAAmB,CAAC,OAAO,EAAE,EAAE,UAAU,EAAE,QAAQ,EAAE,CAAC,CAAC;gBAEvD,OAAM,CAAC,YAAY,CAAC,mBAAmB,CAAC,OAAO,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC;YAC5F,CAAC;YAED,oDAAoD;YACpD,MAAM,cAAc,GAAG;gBACtB,GAAG,OAAO,CAAC,QAAQ;gBACnB,KAAK,EAAE,aAAa;aACpB,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,MAAM,CACnC,cAAc,EACd,kBAAkB,CAAC,OAAO,CAAC,UAAU,CAAC,CACtC,CAAC;YAEF,mBAAmB,CAAC,OAAO,EAAE,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,CAAC;YAEvD,OAAM,CAAC,YAAY,CAAC,mBAAmB,CAAC,OAAO,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC;QAC5F,CAAC,CAAC;QAEF,oCAAoC;QACpC,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,WAAU,OAAO,EAAE,SAAS,EAAE,QAAQ,EAAE,GAAG;YAC1E,MAAM,OAAO,GAAG,MAAM,aAAa,CAClC,GAAG,EACH,4CAA4C,EAC5C,cAAa,OAAM,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAC1B,CAAC;YAEF,uFAAuF;YACvF,MAAM,KAAK,GAAG,OAAO,CAAC,eAAe,CAAC,GAAG,EAAE,CAAC;YAC5C,MAAM,UAAU,GAAG,OAAO,CAAC,cAAc;gBACxC,CAAC,CAAC,MAAM,OAAO,CAAC,cAAc,CAAC,KAAK,CAAC;gBACrC,CAAC,CAAC,IAAI,CAAC;YACR,MAAM,eAAe,GAAG,UAAU,IAAI,MAAM,CAAC;YAE7C,MAAM,aAAa,GAAG,MAAM,OAAO,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAE1D,uCAAuC;YACvC,IAAI,gBAAgB,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,eAAe,CAAC,iBAAiB,GAAG,aAAa,CAAC,WAAW,CAAC,CAAC;YAClG,IAAI,aAAa,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,eAAe,CAAC,iBAAiB,GAAG,aAAa,CAAC,SAAS,CAAC,CAAC;YAE7F,0EAA0E;YAC1E,IAAI,aAAa,CAAC,gBAAgB,KAAK,SAAS,IAAI,aAAa,CAAC,gBAAgB,GAAG,CAAC,EAAE,CAAC;gBACxF,gBAAgB,GAAG,IAAI,CAAC,GAAG,CAAC,aAAa,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,CAAC;YAC/E,CAAC;YACD,IAAI,aAAa,CAAC,aAAa,KAAK,SAAS,IAAI,aAAa,CAAC,aAAa,GAAG,CAAC,EAAE,CAAC;gBAClF,aAAa,GAAG,IAAI,CAAC,GAAG,CAAC,aAAa,CAAC,aAAa,EAAE,aAAa,CAAC,CAAC;YACtE,CAAC;YAED,MAAM,QAAQ,GAAoC;gBACjD,EAAE,EAAE,IAAI;gBACR,KAAK,EAAE;oBACN,WAAW,EAAE,aAAa,CAAC,WAAW;oBACtC,SAAS,EAAE,aAAa,CAAC,SAAS;oBAClC,gBAAgB;oBAChB,aAAa;iBACb;aACD,CAAC;YAEF,OAAM,CAAC,YAAY,CAAC,QAAQ,EAAE,qCAAqC,CAAC,CAAC,CAAC;QACvE,CAAC,CAAC;QAEF,+DAA+D;QAC/D,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,WAAU,MAAM,EAAE,SAAS,EAAE,QAAQ,EAAE,GAAG;YAC7E,MAAM,UAAU,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;YAC7C,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,GAAG,SAAS,CAAC,YAAY,EAAE,UAAU,CAAC,CAAC;YAE/D,yDAAyD;YACzD,MAAM,SAAS,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAC;YAC7C,IAAI,CAAC,SAAS,CAAC,WAAW,EAAE,CAAC;gBAC5B,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,uCAAuC,CAAC,CAAC,CAAC;YAC7E,CAAC;YAED,6FAA6F;YAC7F,MAAM,aAAa,GAAG,MAAM,CAAC,mBAAmB,CAAC,MAAM,CAAC,IAAI,SAAS,CAAC,OAAO,IAAI,IAAI,CAAC;YACtF,IAAI,CAAC,aAAa,EAAE,CAAC;gBACpB,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,gBAAgB,CAAC,CAAC,CAAC;YACtD,CAAC;YACD,MAAM,YAAY,GAAG,aAAa,CAAC,eAAe,CAAC,GAAG,EAAE,CAAC;YAEzD,mCAAmC;YACnC,MAAM,SAAS,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC;YAC/D,MAAM,YAAY,GAAG,SAAS,CAAC,YAAY,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YAC3D,IAAI,CAAC,YAAY,EAAE,CAAC;gBACnB,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,2BAA2B,CAAC,CAAC,CAAC;YACjE,CAAC;YACD,MAAM,SAAS,GAAG,QAAQ,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;YAC7C,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;gBACjC,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,2BAA2B,CAAC,CAAC,CAAC;YACjE,CAAC;YACD,IAAI,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,GAAG,IAAI,EAAE,CAAC;gBACnC,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC,CAAC;YACtC,CAAC;YAED,sBAAsB;YACtB,MAAM,YAAY,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;YAC5E,IAAI,SAAS,GAAG,YAAY,EAAE,CAAC;gBAC9B,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,wCAAwC,CAAC,CAAC,CAAC;YAC9E,CAAC;YAED,gEAAgE;YAChE,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;YAC/E,IAAI,eAAe,CAAC,MAAM,GAAG,EAAE,IAAI,eAAe,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;gBACjE,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,0BAA0B,CAAC,CAAC,CAAC;YAChE,CAAC;YAED,IAAI,CAAC;gBACJ,2DAA2D;gBAC3D,MAAM,KAAK,GAAG,MAAM,gBAAgB,CAAC,aAAa,EAAE,CAAC,UAAU,EAAE,SAAS,EAAE,YAAY,CAAC,EAAE,SAAS,CAAC,WAAW,EAAE;oBACjH,SAAS,EAAE,CAAC,GAAG,EAAE,GAAG,IAAI;iBACxB,CAAC,CAAC;gBACH,IAAI,CAAC,KAAK,EAAE,CAAC;oBACZ,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC,CAAC;gBACtC,CAAC;YACF,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACZ,IAAI,MAAM,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC3C,MAAK,CAAC,CAAC,CAAC,CAAC;gBACV,CAAC;gBAED,MAAK,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,+BAA+B,CAAC,CAAC,CAAC;YACrE,CAAC;YAED,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,UAAU,CAAC,CAAC;YAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,UAAU,KAAK,QAAQ,EAAE,CAAC;gBAC7C,MAAK,CAAC,IAAI,MAAM,CAAC,YAAY,CAAC,sBAAsB,CAAC,CAAC,CAAC;YACxD,CAAC;YAED,2EAA2E;YAC3E,MAAM,IAAI,GAAG,uBAAuB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;YAClD,MAAM,SAAS,GAAG,kBAAkB,CAAC,mBAAmB,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC;YAChF,MAAM,SAAS,GAAG,MAAM,SAAS,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,GAAG,qBAAqB,CAAC,SAAS,CAAC,CAAC;YAE/D,MAAM,OAAO,GAA8B,EAAE,CAAC;YAC9C,IAAI,gBAAgB,EAAE,CAAC;gBACtB,OAAO,CAAC,6BAA6B,CAAC,GAAG,gBAAgB,CAAC;YAC3D,CAAC;YAED,OAAM,CAAC;gBACN,MAAM,EAAE,OAAO;gBACf,WAAW,EAAE,QAAQ;gBACrB,OAAO;aACP,CAAC,CAAC;QACJ,CAAC,CAAC;QAEF,aAAa;QAEb,OAAM,CAAC,MAAM,CAAC,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,eAAe;QACpB,MAAM,YAAY,GAAG,EAAE,OAAO,EAAE,EAAE,cAAc,EAAE,EAAE,IAAI,EAAE,UAAmB,EAAE,MAAM,EAAE,eAAwB,EAAE,EAAC,EAAC,CAAC;QACpH,MAAM,UAAU,GAA8E;YAC7F,GAAG,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,GAAG,CAAC,aAAa,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,GAAG,YAAY,EAAE;YAC5E,GAAG,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,GAAG,CAAC,aAAa,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,GAAG,YAAY,EAAE;YAC5E,MAAM,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,GAAG,CAAC,aAAa,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,GAAG,YAAY,EAAE;YAC/E,QAAQ,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,GAAG,CAAC,eAAe,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,GAAG,YAAY,EAAE;YACnF,MAAM,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,GAAG,CAAC,aAAa,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,GAAG,YAAY,EAAE;YAC/E,MAAM,EAAE,CAAC,IAAI,GAAG,CAAC,aAAa,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE;YACrD,KAAK,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,GAAG,CAAC,YAAY,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,GAAG,YAAY,EAAE;SAC7E,CAAC;QAEF,OAAM,CAAC;YACN,UAAU;YACV,aAAa,EAAE,IAAI,CAAC,aAAa,CAAC,eAAe,CAAC,GAAG,EAAE;YACvD,MAAM,EAAE,IAAI,CAAC,MAAM;YACnB,mBAAmB,EAAE,IAAI,CAAC,mBAAmB;YAC7C,gBAAgB,EAAE,CAAC,OAAO,EAAE,MAAM,EAAE,YAAY,EAAE,YAAY,CAAC;SAC/D,CAAC,CAAC;IACJ,CAAC;CACD","sourcesContent":["import type { ServiceMetadata } from '../../lib/resolver.ts';\nimport type { Signable } from '../../lib/utils/signing.js';\nimport type { NamespaceValidator } from './lib/validators.js';\nimport * as KeetaAnchorHTTPServer from '../../lib/http-server/index.js';\nimport { KeetaNet } from '../../client/index.js';\nimport {\n\tKeetaAnchorUserError\n} from '../../lib/error.js';\nimport type {\n\tKeetaStorageAnchorDeleteResponse,\n\tKeetaStorageAnchorPutResponse,\n\tKeetaStorageAnchorSearchResponse,\n\tKeetaStorageAnchorQuotaResponse,\n\tFullStorageBackend,\n\tQuotaConfig,\n\tStorageObjectVisibility,\n\tStorageObjectMetadata,\n\tPathPolicy,\n\tSearchResults,\n\tStorageGetResult,\n\tSearchPagination\n} from './common.ts';\nimport {\n\tassertKeetaStorageAnchorDeleteResponse,\n\tassertKeetaStorageAnchorPutResponse,\n\tassertKeetaStorageAnchorGetRequest,\n\tassertKeetaStorageAnchorSearchRequest,\n\tassertKeetaStorageAnchorSearchResponse,\n\tassertKeetaStorageAnchorQuotaResponse\n} from './common.generated.js';\nimport {\n\tgetKeetaStorageAnchorDeleteRequestSigningData,\n\tgetKeetaStorageAnchorPutRequestSigningData,\n\tgetKeetaStorageAnchorGetRequestSigningData,\n\tgetKeetaStorageAnchorSearchRequestSigningData,\n\tgetKeetaStorageAnchorQuotaRequestSigningData,\n\tparseContainerPayload,\n\tErrors,\n\tCONTENT_TYPE_OCTET_STREAM,\n\tDEFAULT_SIGNED_URL_TTL_SECONDS\n} from './common.js';\nimport { VerifySignedData } from '../../lib/utils/signing.js';\nimport { assertHTTPSignedField, parseSignatureFromURL } from '../../lib/http-server/common.js';\nimport { arrayBufferLikeToBuffer, Buffer } from '../../lib/utils/buffer.js';\nimport { requiresValidation, findMatchingValidators } from './lib/validators.js';\nimport { EncryptedContainer, EncryptedContainerError } from '../../lib/encrypted-container.js';\nimport { assertVisibility } from './utils.js';\n\ntype Account = InstanceType<typeof KeetaNet.lib.Account>;\n\n/**\n * Build a standardized search response from search results.\n */\nfunction buildSearchResponse(results: SearchResults): KeetaStorageAnchorSearchResponse {\n\tconst response: KeetaStorageAnchorSearchResponse = {\n\t\tok: true,\n\t\tresults: results.results\n\t};\n\tif (results.nextCursor !== undefined) {\n\t\tresponse.nextCursor = results.nextCursor;\n\t}\n\treturn(response);\n}\n\n// #region Module-Level Helpers\n\n/**\n * Find a matching policy for a path, validate it, and check access.\n *\n * @param pathPolicies - Array of path policies to check against\n * @param account - The account to check access for\n * @param path - The path to check\n * @param operation - The operation being performed\n */\nfunction assertPathAccess(\n\tpathPolicies: PathPolicy<unknown>[],\n\taccount: Account,\n\tpath: string,\n\toperation: 'get' | 'put' | 'delete' | 'search' | 'metadata'\n): { policy: PathPolicy<unknown>; parsed: unknown } {\n\tfor (const policy of pathPolicies) {\n\t\tconst parsed = policy.parse(path);\n\t\tif (parsed !== null) {\n\t\t\tpolicy.validate(path);\n\n\t\t\tif (!policy.checkAccess(account, parsed, operation)) {\n\t\t\t\tthrow(new Errors.AccessDenied('Can only access your own namespace'));\n\t\t\t}\n\n\t\t\treturn({ policy, parsed });\n\t\t}\n\t}\n\n\tthrow(new Errors.InvalidPath('Path does not match any policy'));\n}\n\n/**\n * Find a matching policy and parse a path.\n * Used for public endpoints where auth is optional.\n *\n * @param pathPolicies - Array of path policies to check against\n * @param path - The path to parse\n */\nfunction parsePath(\n\tpathPolicies: PathPolicy<unknown>[],\n\tpath: string\n): { policy: PathPolicy<unknown>; parsed: unknown } {\n\tfor (const policy of pathPolicies) {\n\t\tconst parsed = policy.parse(path);\n\t\tif (parsed !== null) {\n\t\t\tpolicy.validate(path);\n\t\t\treturn({ policy, parsed });\n\t\t}\n\t}\n\n\tthrow(new Errors.InvalidPath('Path does not match any policy'));\n}\n\n/**\n * Verify a signed request from POST body.\n * Extracts account and signature from the request, verifies the signature,\n * and returns the authenticated account.\n *\n * @typeParam T - Request type containing optional account and signed fields\n *\n * @param request - The request object containing account and signed fields\n * @param getSigningData - Function to extract signable data from the request\n *\n * @returns The authenticated account\n *\n * @throws KeetaAnchorUserError if authentication is missing or invalid\n */\nasync function verifyBodyAuth<T extends { account?: string; signed?: unknown }>(\n\trequest: T,\n\tgetSigningData: (req: T) => Signable\n): Promise<Account> {\n\tif (!request.account || !request.signed) {\n\t\tthrow(new KeetaAnchorUserError('Authentication required'));\n\t}\n\n\tconst account = KeetaNet.lib.Account.fromPublicKeyString(request.account).assertAccount();\n\tconst signable = getSigningData(request);\n\tconst signed = assertHTTPSignedField(request.signed);\n\n\tconst valid = await VerifySignedData(account, signable, signed);\n\tif (!valid) {\n\t\tthrow(new KeetaAnchorUserError('Invalid signature'));\n\t}\n\n\treturn(account);\n}\n\n/**\n * Verify a signed request from URL query parameters.\n * Parses signature from URL, builds a request object, verifies the signature,\n * and returns the authenticated account.\n *\n * @typeParam T - Request type to build from the account public key\n *\n * @param url - The URL containing signature query parameters\n * @param getSigningData - Function to extract signable data from the request\n * @param buildRequest - Function to build a request object from the account public key\n *\n * @returns The authenticated account\n *\n * @throws KeetaAnchorUserError if authentication is missing or invalid\n */\nasync function verifyURLAuth<T>(\n\turl: URL | string,\n\tgetSigningData: (req: T) => Signable,\n\tbuildRequest: (accountPubKey: string) => T\n): Promise<Account> {\n\tlet urlString: string;\n\tif (typeof url === 'string') {\n\t\turlString = url;\n\t} else {\n\t\turlString = url.href;\n\t}\n\n\tconst parsed = parseSignatureFromURL(urlString);\n\tif (!parsed.account || !parsed.signedField) {\n\t\tthrow(new KeetaAnchorUserError('Authentication required'));\n\t}\n\n\tconst request = buildRequest(parsed.account.publicKeyString.get());\n\tconst signable = getSigningData(request);\n\n\tconst valid = await VerifySignedData(parsed.account, signable, parsed.signedField);\n\tif (!valid) {\n\t\tthrow(new KeetaAnchorUserError('Invalid signature'));\n\t}\n\n\treturn(parsed.account);\n}\n\n/**\n * Extract object path from wildcard route parameter.\n * Prepends a leading slash to create a valid storage path.\n *\n * @param params - Route parameters containing the wildcard match\n *\n * @returns The object path with leading slash\n *\n * @throws InvalidPath if wildcard parameter is missing\n */\nfunction extractObjectPath(params: Map<string, string>): string {\n\tconst wildcardPath = params.get('**');\n\tif (!wildcardPath) {\n\t\tthrow(new Errors.InvalidPath());\n\t}\n\n\treturn('/' + wildcardPath);\n}\n\n/**\n * Authorize access to an object path via URL-signed request.\n * Combines path validation, signature verification, and access control.\n *\n * @typeParam T - Request type to build from path and account\n *\n * @param pathPolicies - Array of path policies to check against\n * @param params - Route parameters containing the wildcard path\n * @param url - The URL containing signature query parameters\n * @param operation - The operation being authorized\n * @param getSigningData - Function to extract signable data from the request\n * @param buildRequest - Function to build a request object from path and account\n *\n * @returns The authenticated account and validated object path\n *\n * @throws InvalidPath if path is invalid or doesn't match any policy\n * @throws AccessDenied if user doesn't have access to the path\n * @throws KeetaAnchorUserError if signature is invalid\n */\nasync function authorizeURLAccess<T>(\n\tpathPolicies: PathPolicy<unknown>[],\n\tparams: Map<string, string>,\n\turl: URL | string,\n\toperation: 'get' | 'put' | 'delete' | 'metadata',\n\tgetSigningData: (req: T) => Signable,\n\tbuildRequest: (path: string, accountPubKey: string) => T\n): Promise<{ account: Account; objectPath: string }> {\n\tconst objectPath = extractObjectPath(params);\n\tparsePath(pathPolicies, objectPath);\n\n\tconst account = await verifyURLAuth(url, getSigningData, function(pubKey) {\n\t\treturn(buildRequest(objectPath, pubKey));\n\t});\n\n\tassertPathAccess(pathPolicies, account, objectPath, operation);\n\n\treturn({ account, objectPath });\n}\n\n// #endregion\n\n/**\n * Configuration for the Storage Anchor\n *\n * The Storage Anchor provides encrypted object storage with the following operations:\n *\n * PUT (Create/Update):\n * 1. Client creates EncryptedContainer with data, shares with anchor for public objects\n * 2. Client signs request (path, visibility, tags) and sends to server\n * 3. Server reserves quota, validates, stores object, commits reservation\n *\n * GET (Retrieve):\n * 1. Client signs request (path) and sends to server\n * 2. Server verifies access, returns EncryptedContainer\n * 3. Client decrypts with their private key\n *\n * DELETE:\n * 1. Client signs request (path) and sends to server\n * 2. Server verifies ownership, removes object\n *\n * SEARCH:\n * 1. Client signs request with criteria (tags, prefix, etc.)\n * 2. Server returns matching metadata (scoped to user's namespace)\n *\n * PUBLIC ACCESS (Pre-signed URLs):\n * 1. Client generates pre-signed URL with expiry, signed by owner\n * 2. Anyone can fetch via URL (no auth headers)\n * 3. Server verifies signature, expiry, and visibility\n * 4. Server decrypts and returns plaintext content\n *\n *\n * +-------------------+ +---------------------+ +------------------+\n * | Client | | Storage Anchor | | Storage Backend |\n * +-------------------+ +---------------------+ +------------------+\n * | | |\n * (PUT) Create EncryptedContainer | |\n * | Sign(path, visibility, tags) | |\n * |---------------------------------->| |\n * | | reserveUpload() ---------------->|\n * | | validate, put() ---------------->|\n * | | commitUpload() ----------------->|\n * |<--------------------------------- | { ok: true, object: metadata } |\n * | | |\n * (GET) Sign(path) ------------------------>| |\n * | | get() -------------------------->|\n * |<--------------------------------- | EncryptedContainer (binary) |\n * | Decrypt with private key | |\n * | | |\n * (PUBLIC) Generate pre-signed URL | |\n * | URL with expires, signature | |\n * (Anyone) Fetch URL ---------------------->| |\n * | | verify signature, expiry |\n * | | get(), decrypt ----------------->|\n * |<--------------------------------- | Plaintext content |\n */\nexport interface KeetaAnchorStorageServerConfig extends KeetaAnchorHTTPServer.KeetaAnchorHTTPServerConfig {\n\t/**\n\t * The data to use for the index page (optional)\n\t */\n\thomepage?: string | (() => Promise<string> | string);\n\n\t/**\n\t * The storage backend to use for storing documents.\n\t * Must implement full capabilities: CRUD, search, and quota management.\n\t */\n\tbackend: FullStorageBackend;\n\n\t/**\n\t * The anchor's account for decrypting objects.\n\t */\n\tanchorAccount: Account;\n\n\t/**\n\t * Quota configuration for storage limits.\n\t * Partial values are merged with defaults.\n\t */\n\tquotas?: Partial<QuotaConfig>;\n\n\t/**\n\t * Namespace validators for special paths\n\t */\n\tvalidators?: NamespaceValidator[];\n\n\t/**\n\t * Default TTL in seconds for pre-signed URLs (default: 3600)\n\t */\n\tsignedUrlDefaultTTL?: number;\n\n\t/**\n\t * CORS origin for public endpoints (default: false).\n\t * - '*' allows all origins\n\t * - specific origin string restricts to that origin\n\t * - false (default) disables CORS headers on public responses\n\t */\n\tpublicCorsOrigin?: string | false;\n\n\t/**\n\t * Path policies for parsing, validating, and access control of storage paths.\n\t * Each policy handles a specific path pattern. First matching policy wins.\n\t */\n\tpathPolicies: PathPolicy<unknown>[];\n\n\t/**\n\t * Tag validation configuration.\n\t */\n\ttagValidation?: {\n\t\t/** Maximum number of tags per object (default: 10) */\n\t\tmaxTags?: number;\n\t\t/** Maximum length of each tag (default: 50) */\n\t\tmaxTagLength?: number;\n\t\t/** Pattern for valid tag characters (default: /^[a-zA-Z0-9_-]+$/) */\n\t\tpattern?: RegExp;\n\t};\n}\n\n// Default quota configuration\nconst DEFAULT_QUOTAS: QuotaConfig = {\n\tmaxObjectSize: 10 * 1024 * 1024, // 10MB\n\tmaxObjectsPerUser: 1000,\n\tmaxStoragePerUser: 100 * 1024 * 1024, // 100MB\n\tmaxSearchLimit: 100,\n\tmaxSignedUrlTTL: 86400 // 24 hours\n};\n\n// Default tag validation configuration\nconst DEFAULT_TAG_VALIDATION = {\n\tmaxTags: 10,\n\tmaxTagLength: 50,\n\tpattern: /^[a-zA-Z0-9_-]+$/\n};\n\nexport class KeetaNetStorageAnchorHTTPServer extends KeetaAnchorHTTPServer.KeetaNetAnchorHTTPServer<KeetaAnchorStorageServerConfig> {\n\treadonly homepage: NonNullable<KeetaAnchorStorageServerConfig['homepage']>;\n\treadonly backend: FullStorageBackend;\n\treadonly anchorAccount: Account;\n\treadonly quotas: QuotaConfig;\n\treadonly validators: NamespaceValidator[];\n\treadonly signedUrlDefaultTTL: number;\n\treadonly publicCorsOrigin: string | false;\n\treadonly pathPolicies: PathPolicy<unknown>[];\n\treadonly tagValidation: Required<NonNullable<KeetaAnchorStorageServerConfig['tagValidation']>>;\n\n\tconstructor(config: KeetaAnchorStorageServerConfig) {\n\t\tsuper(config);\n\n\t\tthis.homepage = config.homepage ?? '';\n\t\tthis.backend = config.backend;\n\t\tthis.anchorAccount = config.anchorAccount;\n\t\tthis.quotas = { ...DEFAULT_QUOTAS, ...config.quotas };\n\t\tthis.validators = config.validators ?? [];\n\t\tthis.signedUrlDefaultTTL = config.signedUrlDefaultTTL ?? DEFAULT_SIGNED_URL_TTL_SECONDS;\n\t\tthis.publicCorsOrigin = config.publicCorsOrigin ?? false;\n\t\tthis.pathPolicies = config.pathPolicies;\n\t\tthis.tagValidation = {\n\t\t\tmaxTags: config.tagValidation?.maxTags ?? DEFAULT_TAG_VALIDATION.maxTags,\n\t\t\tmaxTagLength: config.tagValidation?.maxTagLength ?? DEFAULT_TAG_VALIDATION.maxTagLength,\n\t\t\tpattern: config.tagValidation?.pattern ?? DEFAULT_TAG_VALIDATION.pattern\n\t\t};\n\n\t\t// Validate anchorAccount has private key\n\t\tif (!this.anchorAccount.hasPrivateKey) {\n\t\t\tthrow(new Error('anchorAccount must have a private key'));\n\t\t}\n\n\t\t// Validate at least one path policy is provided\n\t\tif (this.pathPolicies.length === 0) {\n\t\t\tthrow(new Error('At least one path policy must be provided'));\n\t\t}\n\n\t\t// Validate quota configuration values are positive\n\t\tif (this.quotas.maxObjectSize <= 0) {\n\t\t\tthrow(new Error('quotas.maxObjectSize must be positive'));\n\t\t}\n\t\tif (this.quotas.maxObjectsPerUser <= 0) {\n\t\t\tthrow(new Error('quotas.maxObjectsPerUser must be positive'));\n\t\t}\n\t\tif (this.quotas.maxStoragePerUser <= 0) {\n\t\t\tthrow(new Error('quotas.maxStoragePerUser must be positive'));\n\t\t}\n\t\tif (this.quotas.maxSearchLimit <= 0) {\n\t\t\tthrow(new Error('quotas.maxSearchLimit must be positive'));\n\t\t}\n\t\tif (this.quotas.maxSignedUrlTTL <= 0) {\n\t\t\tthrow(new Error('quotas.maxSignedUrlTTL must be positive'));\n\t\t}\n\n\t\t// Validate tag validation configuration\n\t\tif (this.tagValidation.maxTags <= 0) {\n\t\t\tthrow(new Error('tagValidation.maxTags must be positive'));\n\t\t}\n\t\tif (this.tagValidation.maxTagLength <= 0) {\n\t\t\tthrow(new Error('tagValidation.maxTagLength must be positive'));\n\t\t}\n\t}\n\n\t// Note: We use this.* properties instead of config.*.\n\t// The config parameter is required by the abstract method signature but unused here.\n\tprotected async initRoutes(_ignoreConfig: KeetaAnchorStorageServerConfig): Promise<KeetaAnchorHTTPServer.Routes> {\n\t\tconst routes: KeetaAnchorHTTPServer.Routes = {};\n\t\tconst backend = this.backend;\n\t\tconst anchorAccount = this.anchorAccount;\n\t\tconst quotas = this.quotas;\n\t\tconst validators = this.validators;\n\t\tconst publicCorsOrigin = this.publicCorsOrigin;\n\t\tconst pathPolicies = this.pathPolicies;\n\t\tconst tagValidation = this.tagValidation;\n\t\tconst logger = this.logger;\n\n\t\t/**\n\t\t * Build a JSON response with assertion.\n\t\t */\n\t\tfunction jsonResponse<T>(response: T, assertionHandler: (input: unknown) => T): { output: string } {\n\t\t\treturn({ output: JSON.stringify(assertionHandler(response)) });\n\t\t}\n\n\t\t/**\n\t\t * Get an object or throw DocumentNotFound.\n\t\t */\n\t\tasync function requireObject(path: string): Promise<StorageGetResult> {\n\t\t\tconst result = await backend.get(path);\n\t\t\tif (!result) {\n\t\t\t\tthrow(new Errors.DocumentNotFound());\n\t\t\t}\n\n\t\t\treturn(result);\n\t\t}\n\n\t\t/**\n\t\t * Enforce server-side search limit cap.\n\t\t */\n\t\tfunction enforceSearchLimit(pagination: SearchPagination | undefined): SearchPagination {\n\t\t\tconst requestedLimit = pagination?.limit ?? quotas.maxSearchLimit;\n\t\t\treturn({ ...pagination, limit: Math.min(requestedLimit, quotas.maxSearchLimit) });\n\t\t}\n\n\t\t/**\n\t\t * Validate search results match expected constraints.\n\t\t */\n\t\tfunction assertSearchResults(\n\t\t\tresults: SearchResults,\n\t\t\tconstraint: { visibility?: 'public'; owner?: string }\n\t\t): void {\n\t\t\tfor (const obj of results.results) {\n\t\t\t\tif (constraint.visibility && obj.visibility !== constraint.visibility) {\n\t\t\t\t\tthrow(new Errors.InvariantViolation(\n\t\t\t\t\t\t`Backend returned ${obj.visibility} object in ${constraint.visibility} search`\n\t\t\t\t\t));\n\t\t\t\t}\n\t\t\t\tif (constraint.owner && obj.owner !== constraint.owner) {\n\t\t\t\t\tthrow(new Errors.InvariantViolation(\n\t\t\t\t\t\t`Backend returned object owned by ${obj.owner} in search for ${constraint.owner}`\n\t\t\t\t\t));\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t/**\n\t\t * If a homepage is provided, setup the route for it\n\t\t */\n\t\tconst homepage = this.homepage;\n\t\tif (homepage) {\n\t\t\troutes['GET /'] = async function() {\n\t\t\t\tlet homepageData: string;\n\t\t\t\tif (typeof homepage === 'string') {\n\t\t\t\t\thomepageData = homepage;\n\t\t\t\t} else {\n\t\t\t\t\thomepageData = await homepage();\n\t\t\t\t}\n\n\t\t\t\treturn({\n\t\t\t\t\toutput: homepageData,\n\t\t\t\t\tcontentType: 'text/html'\n\t\t\t\t});\n\t\t\t};\n\t\t}\n\n\t\t// #region API Routes\n\n\t\t// PUT /api/object/* - Create or update an object\n\t\troutes['PUT /api/object/**'] = {\n\t\t\tbodyType: 'raw',\n\t\t\tmaxBodySize: quotas.maxObjectSize,\n\t\t\thandler: async function(params, postData, _headers, url) {\n\t\t\t\tconst objectPath = extractObjectPath(params);\n\n\t\t\t\t// Get metadata from query params\n\t\t\t\tconst parsedUrl = new URL(url);\n\t\t\t\tconst visibilityParam = parsedUrl.searchParams.get('visibility');\n\t\t\t\tconst tagsParam = parsedUrl.searchParams.get('tags');\n\n\t\t\t\t// Default to private when absent, assert valid value otherwise\n\t\t\t\tlet visibility: StorageObjectVisibility = 'private';\n\t\t\t\tif (visibilityParam !== null) {\n\t\t\t\t\tvisibility = assertVisibility(visibilityParam);\n\t\t\t\t}\n\n\t\t\t\tconst rawTags: string[] = (tagsParam ?? '')\n\t\t\t\t\t.split(',')\n\t\t\t\t\t.map(function(t) {\n\t\t\t\t\t\treturn(t.trim());\n\t\t\t\t\t})\n\t\t\t\t\t.filter(function(t) {\n\t\t\t\t\t\treturn(t.length > 0);\n\t\t\t\t\t});\n\n\t\t\t\t// Verify signature\n\t\t\t\tconst account = await verifyURLAuth(url, getKeetaStorageAnchorPutRequestSigningData, function() {\n\t\t\t\t\treturn({ path: objectPath, visibility, tags: rawTags });\n\t\t\t\t});\n\n\t\t\t\t// Validate tags\n\t\t\t\tconst { maxTags, maxTagLength, pattern: tagPattern } = tagValidation;\n\t\t\t\tfor (const tag of rawTags) {\n\t\t\t\t\tif (tag.length > maxTagLength) {\n\t\t\t\t\t\tthrow(new Errors.InvalidTag(`Tag exceeds maximum length of ${maxTagLength}: \"${tag}\"`));\n\t\t\t\t\t}\n\t\t\t\t\t// Reset lastIndex in case the pattern has the global or sticky flag\n\t\t\t\t\ttagPattern.lastIndex = 0;\n\t\t\t\t\tif (!tagPattern.test(tag)) {\n\t\t\t\t\t\tthrow(new Errors.InvalidTag(`Tag contains invalid characters: \"${tag}\"`));\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif (rawTags.length > maxTags) {\n\t\t\t\t\tthrow(new Errors.InvalidTag(`Too many tags: ${rawTags.length} exceeds maximum of ${maxTags}`));\n\t\t\t\t}\n\t\t\t\tconst tags = rawTags;\n\n\t\t\t\t// Validate path format, metadata, and ownership\n\t\t\t\tconst { policy, parsed } = assertPathAccess(pathPolicies, account, objectPath, 'put');\n\t\t\t\tconst owner = account.publicKeyString.get();\n\t\t\t\tif (policy.validateMetadata) {\n\t\t\t\t\tpolicy.validateMetadata(parsed, { owner, tags, visibility });\n\t\t\t\t}\n\n\t\t\t\t// Resolve per-user quota limits, falling back to global config\n\t\t\t\tconst userLimits = backend.getQuotaLimits\n\t\t\t\t\t? await backend.getQuotaLimits(owner)\n\t\t\t\t\t: null;\n\t\t\t\tconst effectiveLimits = userLimits ?? quotas;\n\n\t\t\t\t// Body is raw binary (EncryptedContainer)\n\t\t\t\tconst data = arrayBufferLikeToBuffer(postData);\n\t\t\t\tconst objectSize = data.byteLength;\n\t\t\t\tif (objectSize > effectiveLimits.maxObjectSize) {\n\t\t\t\t\tthrow(new Errors.QuotaExceeded({\n\t\t\t\t\t\tquotaType: 'maxObjectSize',\n\t\t\t\t\t\tlimit: effectiveLimits.maxObjectSize,\n\t\t\t\t\t\tcurrent: objectSize\n\t\t\t\t\t}));\n\t\t\t\t}\n\n\t\t\t\tconst needsValidation = requiresValidation(objectPath, validators);\n\t\t\t\tconst needsAnchorDecryption = needsValidation || visibility === 'public';\n\t\t\t\tif (needsAnchorDecryption) {\n\t\t\t\t\ttry {\n\t\t\t\t\t\tconst container = EncryptedContainer.fromEncryptedBuffer(data, [anchorAccount]);\n\t\t\t\t\t\tconst plaintext = await container.getPlaintext();\n\n\t\t\t\t\t\tif (needsValidation) {\n\t\t\t\t\t\t\t// Extract content and mimeType from encrypted payload\n\t\t\t\t\t\t\tconst { content, mimeType } = parseContainerPayload(plaintext);\n\t\t\t\t\t\t\tconst matchingValidators = findMatchingValidators(objectPath, validators);\n\t\t\t\t\t\t\tfor (const validator of matchingValidators) {\n\t\t\t\t\t\t\t\tconst result = await validator.validate(objectPath, content, mimeType);\n\t\t\t\t\t\t\t\tif (!result.valid) {\n\t\t\t\t\t\t\t\t\tthrow(new Errors.ValidationFailed(result.error));\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t} catch (e) {\n\t\t\t\t\t\tif (Errors.ValidationFailed.isInstance(e)) {\n\t\t\t\t\t\t\tthrow(e);\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif (EncryptedContainerError.isInstance(e)) {\n\t\t\t\t\t\t\tif (e.code.startsWith('MALFORMED_')) {\n\t\t\t\t\t\t\t\tthrow(new Errors.ValidationFailed(`Invalid encrypted container: ${e.message}`));\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif (e.code === 'NO_MATCHING_KEY' || e.code === 'DECRYPTION_FAILED') {\n\t\t\t\t\t\t\t\tthrow(new Errors.AnchorPrincipalRequired());\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tthrow(e);\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t// Reserve quota before upload\n\t\t\t\tconst reservation = await backend.reserveUpload(owner, objectPath, objectSize, {\n\t\t\t\t\tquotaLimits: {\n\t\t\t\t\t\tmaxObjectsPerUser: effectiveLimits.maxObjectsPerUser,\n\t\t\t\t\t\tmaxStoragePerUser: effectiveLimits.maxStoragePerUser\n\t\t\t\t\t}\n\t\t\t\t});\n\n\t\t\t\tlet objectMetadata: StorageObjectMetadata;\n\t\t\t\ttry {\n\t\t\t\t\tobjectMetadata = await backend.put(objectPath, data, {\n\t\t\t\t\t\towner,\n\t\t\t\t\t\ttags,\n\t\t\t\t\t\tvisibility\n\t\t\t\t\t});\n\n\t\t\t\t\tawait backend.commitUpload(reservation.id);\n\t\t\t\t} catch (e) {\n\t\t\t\t\ttry {\n\t\t\t\t\t\tawait backend.releaseUpload(reservation.id);\n\t\t\t\t\t} catch (releaseError) {\n\t\t\t\t\t\t/**\n\t\t\t\t\t\t * This provides a hint for cleanup\n\t\t\t\t\t\t */\n\t\t\t\t\t\tlogger?.warn('Failed to release upload reservation', { reservationId: reservation.id, error: releaseError });\n\t\t\t\t\t}\n\t\t\t\t\tthrow(e);\n\t\t\t\t}\n\n\t\t\t\tconst response: KeetaStorageAnchorPutResponse = {\n\t\t\t\t\tok: true,\n\t\t\t\t\tobject: objectMetadata\n\t\t\t\t};\n\n\t\t\t\treturn(jsonResponse(response, assertKeetaStorageAnchorPutResponse));\n\t\t\t}\n\t\t};\n\n\t\t// GET /api/object/* - Retrieve an object\n\t\troutes['GET /api/object/**'] = async function(params, _postData, _headers, url) {\n\t\t\tconst { objectPath } = await authorizeURLAccess(\n\t\t\t\tpathPolicies,\n\t\t\t\tparams,\n\t\t\t\turl,\n\t\t\t\t'get',\n\t\t\t\tgetKeetaStorageAnchorGetRequestSigningData,\n\t\t\t\tfunction(path, pubKey) {\n\t\t\t\t\treturn(assertKeetaStorageAnchorGetRequest({ path, account: pubKey }));\n\t\t\t\t}\n\t\t\t);\n\n\t\t\tconst result = await requireObject(objectPath);\n\t\t\treturn({\n\t\t\t\toutput: result.data,\n\t\t\t\tcontentType: CONTENT_TYPE_OCTET_STREAM\n\t\t\t});\n\t\t};\n\n\t\t// DELETE /api/object/* - Delete an object\n\t\troutes['DELETE /api/object/**'] = async function(params, _postData, _headers, url) {\n\t\t\tconst { objectPath } = await authorizeURLAccess(\n\t\t\t\tpathPolicies,\n\t\t\t\tparams,\n\t\t\t\turl,\n\t\t\t\t'delete',\n\t\t\t\tgetKeetaStorageAnchorDeleteRequestSigningData,\n\t\t\t\tfunction(path, pubKey) {\n\t\t\t\t\treturn({ path, account: pubKey });\n\t\t\t\t}\n\t\t\t);\n\n\t\t\tconst deleted = await backend.delete(objectPath);\n\t\t\tconst response: KeetaStorageAnchorDeleteResponse = {\n\t\t\t\tok: true,\n\t\t\t\tdeleted\n\t\t\t};\n\n\t\t\treturn(jsonResponse(response, assertKeetaStorageAnchorDeleteResponse));\n\t\t};\n\n\t\t// GET /api/metadata/* - Get object metadata\n\t\troutes['GET /api/metadata/**'] = async function(params, _postData, _headers, url) {\n\t\t\tconst { objectPath } = await authorizeURLAccess(\n\t\t\t\tpathPolicies,\n\t\t\t\tparams,\n\t\t\t\turl,\n\t\t\t\t'metadata',\n\t\t\t\tgetKeetaStorageAnchorGetRequestSigningData,\n\t\t\t\tfunction(path, pubKey) {\n\t\t\t\t\treturn(assertKeetaStorageAnchorGetRequest({ path, account: pubKey }));\n\t\t\t\t}\n\t\t\t);\n\n\t\t\tconst result = await requireObject(objectPath);\n\t\t\treturn(jsonResponse({ ok: true, object: result.metadata }, assertKeetaStorageAnchorPutResponse));\n\t\t};\n\n\t\t// POST /api/search - Search for objects\n\t\troutes['POST /api/search'] = async function(_params, postData) {\n\t\t\tconst request = assertKeetaStorageAnchorSearchRequest(postData);\n\t\t\tconst account = await verifyBodyAuth(request, getKeetaStorageAnchorSearchRequestSigningData);\n\t\t\tconst accountPubKey = account.publicKeyString.get();\n\n\t\t\t// Check if searching for public objects outside namespace\n\t\t\tconst searchingPublic = request.criteria.visibility === 'public';\n\t\t\tif (searchingPublic) {\n\t\t\t\t// When searching for public objects, we allow searching outside the caller's namespace\n\t\t\t\t// but only for objects with visibility: 'public'\n\t\t\t\tconst scopedCriteria = {\n\t\t\t\t\t...request.criteria,\n\t\t\t\t\tvisibility: 'public' as const\n\t\t\t\t};\n\n\t\t\t\tconst results = await backend.search(\n\t\t\t\t\tscopedCriteria,\n\t\t\t\t\tenforceSearchLimit(request.pagination)\n\t\t\t\t);\n\n\t\t\t\tassertSearchResults(results, { visibility: 'public' });\n\n\t\t\t\treturn(jsonResponse(buildSearchResponse(results), assertKeetaStorageAnchorSearchResponse));\n\t\t\t}\n\n\t\t\t// Scope search to authenticated account's namespace\n\t\t\tconst scopedCriteria = {\n\t\t\t\t...request.criteria,\n\t\t\t\towner: accountPubKey\n\t\t\t};\n\n\t\t\tconst results = await backend.search(\n\t\t\t\tscopedCriteria,\n\t\t\t\tenforceSearchLimit(request.pagination)\n\t\t\t);\n\n\t\t\tassertSearchResults(results, { owner: accountPubKey });\n\n\t\t\treturn(jsonResponse(buildSearchResponse(results), assertKeetaStorageAnchorSearchResponse));\n\t\t};\n\n\t\t// GET /api/quota - Get quota status\n\t\troutes['GET /api/quota'] = async function(_params, _postData, _headers, url) {\n\t\t\tconst account = await verifyURLAuth(\n\t\t\t\turl,\n\t\t\t\tgetKeetaStorageAnchorQuotaRequestSigningData,\n\t\t\t\tfunction() { return({}); }\n\t\t\t);\n\n\t\t\t// Get current usage from backend and compute remaining using per-user or global limits\n\t\t\tconst owner = account.publicKeyString.get();\n\t\t\tconst userLimits = backend.getQuotaLimits\n\t\t\t\t? await backend.getQuotaLimits(owner)\n\t\t\t\t: null;\n\t\t\tconst effectiveLimits = userLimits ?? quotas;\n\n\t\t\tconst backendStatus = await backend.getQuotaStatus(owner);\n\n\t\t\t// Compute remaining from config limits\n\t\t\tlet remainingObjects = Math.max(0, effectiveLimits.maxObjectsPerUser - backendStatus.objectCount);\n\t\t\tlet remainingSize = Math.max(0, effectiveLimits.maxStoragePerUser - backendStatus.totalSize);\n\n\t\t\t// If backend reports its own remaining values, use the tighter constraint\n\t\t\tif (backendStatus.remainingObjects !== undefined && backendStatus.remainingObjects > 0) {\n\t\t\t\tremainingObjects = Math.min(backendStatus.remainingObjects, remainingObjects);\n\t\t\t}\n\t\t\tif (backendStatus.remainingSize !== undefined && backendStatus.remainingSize > 0) {\n\t\t\t\tremainingSize = Math.min(backendStatus.remainingSize, remainingSize);\n\t\t\t}\n\n\t\t\tconst response: KeetaStorageAnchorQuotaResponse = {\n\t\t\t\tok: true,\n\t\t\t\tquota: {\n\t\t\t\t\tobjectCount: backendStatus.objectCount,\n\t\t\t\t\ttotalSize: backendStatus.totalSize,\n\t\t\t\t\tremainingObjects,\n\t\t\t\t\tremainingSize\n\t\t\t\t}\n\t\t\t};\n\n\t\t\treturn(jsonResponse(response, assertKeetaStorageAnchorQuotaResponse));\n\t\t};\n\n\t\t// GET /api/public/** - Public object access via pre-signed URL\n\t\troutes['GET /api/public/**'] = async function(params, _postData, _headers, url) {\n\t\t\tconst objectPath = extractObjectPath(params);\n\t\t\tconst { policy, parsed } = parsePath(pathPolicies, objectPath);\n\n\t\t\t// Parse signature using standard signed field convention\n\t\t\tconst urlParsed = parseSignatureFromURL(url);\n\t\t\tif (!urlParsed.signedField) {\n\t\t\t\tthrow(new Errors.SignatureInvalid('Missing required signature parameters'));\n\t\t\t}\n\n\t\t\t// Resolve signer: policy-specified or from URL account param (any-signer for public objects)\n\t\t\tconst signerAccount = policy.getAuthorizedSigner(parsed) ?? urlParsed.account ?? null;\n\t\t\tif (!signerAccount) {\n\t\t\t\tthrow(new Errors.SignatureInvalid('Missing signer'));\n\t\t\t}\n\t\t\tconst signerPubKey = signerAccount.publicKeyString.get();\n\n\t\t\t// Parse and validate expires param\n\t\t\tconst parsedUrl = typeof url === 'string' ? new URL(url) : url;\n\t\t\tconst expiresParam = parsedUrl.searchParams.get('expires');\n\t\t\tif (!expiresParam) {\n\t\t\t\tthrow(new Errors.SignatureInvalid('Missing expires parameter'));\n\t\t\t}\n\t\t\tconst expiresAt = parseInt(expiresParam, 10);\n\t\t\tif (!Number.isFinite(expiresAt)) {\n\t\t\t\tthrow(new Errors.SignatureInvalid('Invalid expires parameter'));\n\t\t\t}\n\t\t\tif (Date.now() > expiresAt * 1000) {\n\t\t\t\tthrow(new Errors.SignatureExpired());\n\t\t\t}\n\n\t\t\t// Enforce maximum TTL\n\t\t\tconst maxExpiresAt = Math.floor(Date.now() / 1000) + quotas.maxSignedUrlTTL;\n\t\t\tif (expiresAt > maxExpiresAt) {\n\t\t\t\tthrow(new Errors.SignatureExpired('Signed URL TTL exceeds maximum allowed'));\n\t\t\t}\n\n\t\t\t// Pre-validate signature is valid base64 with reasonable length\n\t\t\tconst signatureBuffer = Buffer.from(urlParsed.signedField.signature, 'base64');\n\t\t\tif (signatureBuffer.length < 64 || signatureBuffer.length > 256) {\n\t\t\t\tthrow(new Errors.SignatureInvalid('Invalid signature format'));\n\t\t\t}\n\n\t\t\ttry {\n\t\t\t\t// Allow 5 minutes of clock skew for signature verification\n\t\t\t\tconst valid = await VerifySignedData(signerAccount, [objectPath, expiresAt, signerPubKey], urlParsed.signedField, {\n\t\t\t\t\tmaxSkewMs: 5 * 60 * 1000\n\t\t\t\t});\n\t\t\t\tif (!valid) {\n\t\t\t\t\tthrow(new Errors.SignatureInvalid());\n\t\t\t\t}\n\t\t\t} catch (e) {\n\t\t\t\tif (Errors.SignatureInvalid.isInstance(e)) {\n\t\t\t\t\tthrow(e);\n\t\t\t\t}\n\n\t\t\t\tthrow(new Errors.SignatureInvalid('Signature verification failed'));\n\t\t\t}\n\n\t\t\tconst result = await requireObject(objectPath);\n\t\t\tif (result.metadata.visibility !== 'public') {\n\t\t\t\tthrow(new Errors.AccessDenied('Object is not public'));\n\t\t\t}\n\n\t\t\t// Decrypt using anchor account and extract mimeType from encrypted payload\n\t\t\tconst data = arrayBufferLikeToBuffer(result.data);\n\t\t\tconst container = EncryptedContainer.fromEncryptedBuffer(data, [anchorAccount]);\n\t\t\tconst plaintext = await container.getPlaintext();\n\t\t\tconst { content, mimeType } = parseContainerPayload(plaintext);\n\n\t\t\tconst headers: { [key: string]: string } = {};\n\t\t\tif (publicCorsOrigin) {\n\t\t\t\theaders['Access-Control-Allow-Origin'] = publicCorsOrigin;\n\t\t\t}\n\n\t\t\treturn({\n\t\t\t\toutput: content,\n\t\t\t\tcontentType: mimeType,\n\t\t\t\theaders\n\t\t\t});\n\t\t};\n\n\t\t// #endregion\n\n\t\treturn(routes);\n\t}\n\n\tasync serviceMetadata(): Promise<NonNullable<ServiceMetadata['services']['storage']>[string]> {\n\t\tconst authRequired = { options: { authentication: { type: 'required' as const, method: 'keeta-account' as const }}};\n\t\tconst operations: NonNullable<ServiceMetadata['services']['storage']>[string]['operations'] = {\n\t\t\tput: { url: (new URL('/api/object', this.url)).toString(), ...authRequired },\n\t\t\tget: { url: (new URL('/api/object', this.url)).toString(), ...authRequired },\n\t\t\tdelete: { url: (new URL('/api/object', this.url)).toString(), ...authRequired },\n\t\t\tmetadata: { url: (new URL('/api/metadata', this.url)).toString(), ...authRequired },\n\t\t\tsearch: { url: (new URL('/api/search', this.url)).toString(), ...authRequired },\n\t\t\tpublic: (new URL('/api/public', this.url)).toString(),\n\t\t\tquota: { url: (new URL('/api/quota', this.url)).toString(), ...authRequired }\n\t\t};\n\n\t\treturn({\n\t\t\toperations,\n\t\t\tanchorAccount: this.anchorAccount.publicKeyString.get(),\n\t\t\tquotas: this.quotas,\n\t\t\tsignedUrlDefaultTTL: this.signedUrlDefaultTTL,\n\t\t\tsearchableFields: ['owner', 'tags', 'visibility', 'pathPrefix']\n\t\t});\n\t}\n}\n"]}
|
|
@@ -0,0 +1,70 @@
|
|
|
1
|
+
import { KeetaNet } from '../../client/index.js';
|
|
2
|
+
import type { PathPolicy, FullStorageBackend, StorageObjectMetadata, StoragePutMetadata, StorageGetResult, SearchCriteria, SearchPagination, SearchResults, QuotaStatus, QuotaLimits, UploadReservation } from './common.js';
|
|
3
|
+
import { Buffer } from '../../lib/utils/buffer.js';
|
|
4
|
+
/**
|
|
5
|
+
* Parsed path for the test path policy: /user/<pubkey>/<relativePath>
|
|
6
|
+
*/
|
|
7
|
+
export type TestParsedPath = {
|
|
8
|
+
path: string;
|
|
9
|
+
owner: string;
|
|
10
|
+
relativePath: string;
|
|
11
|
+
};
|
|
12
|
+
/**
|
|
13
|
+
* Test path policy implementing the /user/<pubkey>/<path> pattern.
|
|
14
|
+
* Owner-based access control: only the owner can access their namespace.
|
|
15
|
+
*/
|
|
16
|
+
export declare class TestPathPolicy implements PathPolicy<TestParsedPath> {
|
|
17
|
+
#private;
|
|
18
|
+
parse(path: string): TestParsedPath | null;
|
|
19
|
+
validate(path: string): TestParsedPath;
|
|
20
|
+
isValid(path: string): boolean;
|
|
21
|
+
checkAccess(account: InstanceType<typeof KeetaNet.lib.Account>, parsed: TestParsedPath, _ignoreOperation: 'get' | 'put' | 'delete' | 'search' | 'metadata'): boolean;
|
|
22
|
+
getAuthorizedSigner(parsed: TestParsedPath): InstanceType<typeof KeetaNet.lib.Account> | null;
|
|
23
|
+
validateMetadata(parsed: TestParsedPath, metadata: StoragePutMetadata): void;
|
|
24
|
+
/**
|
|
25
|
+
* Helper to construct a path for a given owner and relative path.
|
|
26
|
+
*/
|
|
27
|
+
makePath(owner: string, relativePath: string): string;
|
|
28
|
+
/**
|
|
29
|
+
* Helper to get the namespace prefix for an owner.
|
|
30
|
+
*/
|
|
31
|
+
getNamespacePrefix(owner: string): string;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Shared instance of TestPathPolicy for use in tests.
|
|
35
|
+
*/
|
|
36
|
+
export declare const testPathPolicy: TestPathPolicy;
|
|
37
|
+
/**
|
|
38
|
+
* Create test metadata with sensible defaults.
|
|
39
|
+
*/
|
|
40
|
+
export declare function testMetadata(owner: string, overrides?: Partial<StoragePutMetadata>): StoragePutMetadata;
|
|
41
|
+
/**
|
|
42
|
+
* In-memory storage backend with full capabilities: CRUD, search, and quota management.
|
|
43
|
+
* Intended for testing and development purposes.
|
|
44
|
+
*/
|
|
45
|
+
export declare class MemoryStorageBackend implements FullStorageBackend {
|
|
46
|
+
#private;
|
|
47
|
+
private storage;
|
|
48
|
+
private reservations;
|
|
49
|
+
private reservationCounter;
|
|
50
|
+
private readonly quotaConfig;
|
|
51
|
+
put(path: string, data: Buffer, metadata: StoragePutMetadata): Promise<StorageObjectMetadata>;
|
|
52
|
+
get(path: string): Promise<StorageGetResult | null>;
|
|
53
|
+
delete(path: string): Promise<boolean>;
|
|
54
|
+
search(criteria: SearchCriteria, pagination: SearchPagination): Promise<SearchResults>;
|
|
55
|
+
getQuotaStatus(owner: string): Promise<QuotaStatus>;
|
|
56
|
+
getQuotaLimits(owner: string): Promise<QuotaLimits | null>;
|
|
57
|
+
setQuotaLimits(owner: string, limits: QuotaLimits): void;
|
|
58
|
+
reserveUpload(owner: string, path: string, size: number, options?: {
|
|
59
|
+
ttlMs?: number;
|
|
60
|
+
quotaLimits?: {
|
|
61
|
+
maxObjectsPerUser: number;
|
|
62
|
+
maxStoragePerUser: number;
|
|
63
|
+
};
|
|
64
|
+
}): Promise<UploadReservation>;
|
|
65
|
+
commitUpload(reservationId: string): Promise<void>;
|
|
66
|
+
releaseUpload(reservationId: string): Promise<void>;
|
|
67
|
+
clear(): void;
|
|
68
|
+
get size(): number;
|
|
69
|
+
}
|
|
70
|
+
//# sourceMappingURL=test-utils.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"test-utils.d.ts","sourceRoot":"","sources":["../../../src/services/storage/test-utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,KAAK,EACX,UAAU,EACV,kBAAkB,EAClB,qBAAqB,EACrB,kBAAkB,EAClB,gBAAgB,EAChB,cAAc,EACd,gBAAgB,EAChB,aAAa,EACb,WAAW,EACX,WAAW,EACX,iBAAiB,EACjB,MAAM,aAAa,CAAC;AAErB,OAAO,EAAE,MAAM,EAAE,MAAM,2BAA2B,CAAC;AAInD;;GAEG;AACH,MAAM,MAAM,cAAc,GAAG;IAC5B,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,EAAE,MAAM,CAAC;IACd,YAAY,EAAE,MAAM,CAAC;CACrB,CAAC;AAEF;;;GAGG;AACH,qBAAa,cAAe,YAAW,UAAU,CAAC,cAAc,CAAC;;IAIhE,KAAK,CAAC,IAAI,EAAE,MAAM,GAAG,cAAc,GAAG,IAAI;IAS1C,QAAQ,CAAC,IAAI,EAAE,MAAM,GAAG,cAAc;IAsBtC,OAAO,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO;IAI9B,WAAW,CACV,OAAO,EAAE,YAAY,CAAC,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,EAClD,MAAM,EAAE,cAAc,EACtB,gBAAgB,EAAE,KAAK,GAAG,KAAK,GAAG,QAAQ,GAAG,QAAQ,GAAG,UAAU,GAChE,OAAO;IAKV,mBAAmB,CAAC,MAAM,EAAE,cAAc,GAAG,YAAY,CAAC,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,GAAG,IAAI;IAI7F,gBAAgB,CAAC,MAAM,EAAE,cAAc,EAAE,QAAQ,EAAE,kBAAkB,GAAG,IAAI;IAO5E;;OAEG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,GAAG,MAAM;IAIrD;;OAEG;IACH,kBAAkB,CAAC,KAAK,EAAE,MAAM,GAAG,MAAM;CAGzC;AAED;;GAEG;AACH,eAAO,MAAM,cAAc,EAAE,cAAqC,CAAC;AAEnE;;GAEG;AACH,wBAAgB,YAAY,CAC3B,KAAK,EAAE,MAAM,EACb,SAAS,CAAC,EAAE,OAAO,CAAC,kBAAkB,CAAC,GACrC,kBAAkB,CAOpB;AAyJD;;;GAGG;AACH,qBAAa,oBAAqB,YAAW,kBAAkB;;IAC9D,OAAO,CAAC,OAAO,CAAmC;IAClD,OAAO,CAAC,YAAY,CAAwC;IAE5D,OAAO,CAAC,kBAAkB,CAAK;IAG/B,OAAO,CAAC,QAAQ,CAAC,WAAW,CAG1B;IAeI,GAAG,CAAC,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,kBAAkB,GAAG,OAAO,CAAC,qBAAqB,CAAC;IAI7F,GAAG,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,GAAG,IAAI,CAAC;IAInD,MAAM,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAItC,MAAM,CAAC,QAAQ,EAAE,cAAc,EAAE,UAAU,EAAE,gBAAgB,GAAG,OAAO,CAAC,aAAa,CAAC;IAItF,cAAc,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,CAAC;IAiCnD,cAAc,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,GAAG,IAAI,CAAC;IAIhE,cAAc,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,WAAW,GAAG,IAAI;IAIlD,aAAa,CAAC,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE;QACxE,KAAK,CAAC,EAAE,MAAM,CAAC;QACf,WAAW,CAAC,EAAE;YAAE,iBAAiB,EAAE,MAAM,CAAC;YAAC,iBAAiB,EAAE,MAAM,CAAA;SAAE,CAAC;KACvE,GAAG,OAAO,CAAC,iBAAiB,CAAC;IAoFxB,YAAY,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAUlD,aAAa,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAUzD,KAAK,IAAI,IAAI;IAMb,IAAI,IAAI,IAAI,MAAM,CAEjB;CACD"}
|
|
@@ -0,0 +1,347 @@
|
|
|
1
|
+
import { KeetaNet } from '../../client/index.js';
|
|
2
|
+
import { Errors } from './common.js';
|
|
3
|
+
import { Buffer } from '../../lib/utils/buffer.js';
|
|
4
|
+
/**
|
|
5
|
+
* Test path policy implementing the /user/<pubkey>/<path> pattern.
|
|
6
|
+
* Owner-based access control: only the owner can access their namespace.
|
|
7
|
+
*/
|
|
8
|
+
export class TestPathPolicy {
|
|
9
|
+
// Matches /user/<owner> or /user/<owner>/ or /user/<owner>/<path>
|
|
10
|
+
#pattern = /^\/user\/([^/]+)(\/(.*))?$/;
|
|
11
|
+
parse(path) {
|
|
12
|
+
const match = path.match(this.#pattern);
|
|
13
|
+
if (!match?.[1]) {
|
|
14
|
+
return (null);
|
|
15
|
+
}
|
|
16
|
+
return ({ path, owner: match[1], relativePath: match[3] ?? '' });
|
|
17
|
+
}
|
|
18
|
+
validate(path) {
|
|
19
|
+
const parsed = this.parse(path);
|
|
20
|
+
if (!parsed) {
|
|
21
|
+
throw (new Errors.InvalidPath('Path must match /user/<pubkey>/<path>'));
|
|
22
|
+
}
|
|
23
|
+
// Reject empty segments in original path
|
|
24
|
+
if (path.includes('//')) {
|
|
25
|
+
throw (new Errors.InvalidPath('Path contains empty segments'));
|
|
26
|
+
}
|
|
27
|
+
// Reject path traversal attempts
|
|
28
|
+
const segments = parsed.relativePath.split('/');
|
|
29
|
+
for (const seg of segments) {
|
|
30
|
+
if (seg === '..' || seg === '.') {
|
|
31
|
+
throw (new Errors.InvalidPath('Path contains relative segments'));
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
return (parsed);
|
|
35
|
+
}
|
|
36
|
+
isValid(path) {
|
|
37
|
+
return (this.parse(path) !== null);
|
|
38
|
+
}
|
|
39
|
+
checkAccess(account, parsed, _ignoreOperation) {
|
|
40
|
+
// Owner-based access: account must match the path owner
|
|
41
|
+
return (parsed.owner === account.publicKeyString.get());
|
|
42
|
+
}
|
|
43
|
+
getAuthorizedSigner(parsed) {
|
|
44
|
+
return (KeetaNet.lib.Account.fromPublicKeyString(parsed.owner).assertAccount());
|
|
45
|
+
}
|
|
46
|
+
validateMetadata(parsed, metadata) {
|
|
47
|
+
// Require public visibility for paths under public/
|
|
48
|
+
if (parsed.relativePath.startsWith('public/') && metadata.visibility !== 'public') {
|
|
49
|
+
throw (new Errors.InvalidMetadata('Objects under /public/ must have public visibility'));
|
|
50
|
+
}
|
|
51
|
+
}
|
|
52
|
+
/**
|
|
53
|
+
* Helper to construct a path for a given owner and relative path.
|
|
54
|
+
*/
|
|
55
|
+
makePath(owner, relativePath) {
|
|
56
|
+
return (`/user/${owner}/${relativePath}`);
|
|
57
|
+
}
|
|
58
|
+
/**
|
|
59
|
+
* Helper to get the namespace prefix for an owner.
|
|
60
|
+
*/
|
|
61
|
+
getNamespacePrefix(owner) {
|
|
62
|
+
return (`/user/${owner}/`);
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
/**
|
|
66
|
+
* Shared instance of TestPathPolicy for use in tests.
|
|
67
|
+
*/
|
|
68
|
+
export const testPathPolicy = new TestPathPolicy();
|
|
69
|
+
/**
|
|
70
|
+
* Create test metadata with sensible defaults.
|
|
71
|
+
*/
|
|
72
|
+
export function testMetadata(owner, overrides) {
|
|
73
|
+
return ({
|
|
74
|
+
owner,
|
|
75
|
+
tags: [],
|
|
76
|
+
visibility: 'private',
|
|
77
|
+
...overrides
|
|
78
|
+
});
|
|
79
|
+
}
|
|
80
|
+
// #endregion
|
|
81
|
+
// #region Shared Storage Operations
|
|
82
|
+
function putToStorage(storage, path, data, metadata) {
|
|
83
|
+
const now = new Date().toISOString();
|
|
84
|
+
const existing = storage.get(path);
|
|
85
|
+
const objectMetadata = {
|
|
86
|
+
path,
|
|
87
|
+
owner: metadata.owner,
|
|
88
|
+
tags: metadata.tags,
|
|
89
|
+
visibility: metadata.visibility,
|
|
90
|
+
size: data.length,
|
|
91
|
+
createdAt: existing?.metadata.createdAt ?? now,
|
|
92
|
+
...(existing ? { updatedAt: now } : {})
|
|
93
|
+
};
|
|
94
|
+
storage.set(path, { data, metadata: objectMetadata });
|
|
95
|
+
return (objectMetadata);
|
|
96
|
+
}
|
|
97
|
+
function getFromStorage(storage, path) {
|
|
98
|
+
const entry = storage.get(path);
|
|
99
|
+
if (!entry) {
|
|
100
|
+
return (null);
|
|
101
|
+
}
|
|
102
|
+
return ({
|
|
103
|
+
data: Buffer.from(entry.data),
|
|
104
|
+
metadata: { ...entry.metadata }
|
|
105
|
+
});
|
|
106
|
+
}
|
|
107
|
+
function searchStorage(storage, criteria, pagination) {
|
|
108
|
+
const results = [];
|
|
109
|
+
const limit = pagination.limit ?? 100;
|
|
110
|
+
const startAfter = pagination.cursor;
|
|
111
|
+
let foundCursor = !startAfter;
|
|
112
|
+
for (const [path, entry] of storage.entries()) {
|
|
113
|
+
if (!foundCursor) {
|
|
114
|
+
if (path === startAfter) {
|
|
115
|
+
foundCursor = true;
|
|
116
|
+
}
|
|
117
|
+
continue;
|
|
118
|
+
}
|
|
119
|
+
const metadata = entry.metadata;
|
|
120
|
+
if (criteria.pathPrefix) {
|
|
121
|
+
const prefix = criteria.pathPrefix.endsWith('/')
|
|
122
|
+
? criteria.pathPrefix
|
|
123
|
+
: criteria.pathPrefix + '/';
|
|
124
|
+
if (!path.startsWith(prefix) && path !== criteria.pathPrefix) {
|
|
125
|
+
continue;
|
|
126
|
+
}
|
|
127
|
+
if (!criteria.recursive) {
|
|
128
|
+
const remainder = path.slice(prefix.length);
|
|
129
|
+
if (remainder.includes('/')) {
|
|
130
|
+
continue;
|
|
131
|
+
}
|
|
132
|
+
}
|
|
133
|
+
}
|
|
134
|
+
if (criteria.owner && metadata.owner !== criteria.owner) {
|
|
135
|
+
continue;
|
|
136
|
+
}
|
|
137
|
+
if (criteria.tags && criteria.tags.length > 0) {
|
|
138
|
+
const hasMatchingTag = criteria.tags.some(function (tag) {
|
|
139
|
+
return (metadata.tags.includes(tag));
|
|
140
|
+
});
|
|
141
|
+
if (!hasMatchingTag) {
|
|
142
|
+
continue;
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
if (criteria.name) {
|
|
146
|
+
const filename = path.split('/').pop();
|
|
147
|
+
if (!filename?.includes(criteria.name)) {
|
|
148
|
+
continue;
|
|
149
|
+
}
|
|
150
|
+
}
|
|
151
|
+
if (criteria.visibility && metadata.visibility !== criteria.visibility) {
|
|
152
|
+
continue;
|
|
153
|
+
}
|
|
154
|
+
results.push(metadata);
|
|
155
|
+
if (results.length >= limit) {
|
|
156
|
+
return ({ results, nextCursor: path });
|
|
157
|
+
}
|
|
158
|
+
}
|
|
159
|
+
return ({ results });
|
|
160
|
+
}
|
|
161
|
+
function computeQuotaStatus(storage, owner, quotaConfig) {
|
|
162
|
+
let objectCount = 0;
|
|
163
|
+
let totalSize = 0;
|
|
164
|
+
for (const entry of storage.values()) {
|
|
165
|
+
if (entry.metadata.owner === owner) {
|
|
166
|
+
objectCount++;
|
|
167
|
+
totalSize += entry.metadata.size;
|
|
168
|
+
}
|
|
169
|
+
}
|
|
170
|
+
return ({
|
|
171
|
+
objectCount,
|
|
172
|
+
totalSize,
|
|
173
|
+
remainingObjects: Math.max(0, quotaConfig.maxObjectsPerUser - objectCount),
|
|
174
|
+
remainingSize: Math.max(0, quotaConfig.maxStoragePerUser - totalSize)
|
|
175
|
+
});
|
|
176
|
+
}
|
|
177
|
+
// #endregion
|
|
178
|
+
// #region Memory Storage Backend
|
|
179
|
+
/**
|
|
180
|
+
* In-memory storage backend with full capabilities: CRUD, search, and quota management.
|
|
181
|
+
* Intended for testing and development purposes.
|
|
182
|
+
*/
|
|
183
|
+
export class MemoryStorageBackend {
|
|
184
|
+
storage = new Map();
|
|
185
|
+
reservations = new Map();
|
|
186
|
+
#reservationsByPath = new Map(); // "owner:path" -> reservationId
|
|
187
|
+
reservationCounter = 0;
|
|
188
|
+
#quotaLimitsPerUser = new Map();
|
|
189
|
+
quotaConfig = {
|
|
190
|
+
maxObjectsPerUser: 1000,
|
|
191
|
+
maxStoragePerUser: 100 * 1024 * 1024 // 100MB
|
|
192
|
+
};
|
|
193
|
+
/**
|
|
194
|
+
* Prune expired reservations to keep quota accounting accurate.
|
|
195
|
+
*/
|
|
196
|
+
#pruneExpiredReservations() {
|
|
197
|
+
const now = Date.now();
|
|
198
|
+
for (const [id, reservation] of this.reservations) {
|
|
199
|
+
if (new Date(reservation.expiresAt).getTime() <= now) {
|
|
200
|
+
this.reservations.delete(id);
|
|
201
|
+
this.#reservationsByPath.delete(`${reservation.owner}:${reservation.path}`);
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
async put(path, data, metadata) {
|
|
206
|
+
return (putToStorage(this.storage, path, data, metadata));
|
|
207
|
+
}
|
|
208
|
+
async get(path) {
|
|
209
|
+
return (getFromStorage(this.storage, path));
|
|
210
|
+
}
|
|
211
|
+
async delete(path) {
|
|
212
|
+
return (this.storage.delete(path));
|
|
213
|
+
}
|
|
214
|
+
async search(criteria, pagination) {
|
|
215
|
+
return (searchStorage(this.storage, criteria, pagination));
|
|
216
|
+
}
|
|
217
|
+
async getQuotaStatus(owner) {
|
|
218
|
+
// Prune expired reservations first
|
|
219
|
+
this.#pruneExpiredReservations();
|
|
220
|
+
// Get base quota from actual storage
|
|
221
|
+
const baseQuota = computeQuotaStatus(this.storage, owner, this.quotaConfig);
|
|
222
|
+
// Add pending reservations for this owner
|
|
223
|
+
let reservedObjects = 0;
|
|
224
|
+
let reservedSize = 0;
|
|
225
|
+
for (const reservation of this.reservations.values()) {
|
|
226
|
+
if (reservation.owner === owner) {
|
|
227
|
+
// Only count as new object if path doesn't exist
|
|
228
|
+
if (!this.storage.has(reservation.path)) {
|
|
229
|
+
reservedObjects++;
|
|
230
|
+
}
|
|
231
|
+
reservedSize += reservation.size;
|
|
232
|
+
}
|
|
233
|
+
}
|
|
234
|
+
const objectCount = baseQuota.objectCount + reservedObjects;
|
|
235
|
+
const totalSize = baseQuota.totalSize + reservedSize;
|
|
236
|
+
const remainingObjects = Math.max(0, (baseQuota.remainingObjects ?? 0) - reservedObjects);
|
|
237
|
+
const remainingSize = Math.max(0, (baseQuota.remainingSize ?? 0) - reservedSize);
|
|
238
|
+
return ({
|
|
239
|
+
objectCount,
|
|
240
|
+
totalSize,
|
|
241
|
+
remainingObjects,
|
|
242
|
+
remainingSize
|
|
243
|
+
});
|
|
244
|
+
}
|
|
245
|
+
async getQuotaLimits(owner) {
|
|
246
|
+
return (this.#quotaLimitsPerUser.get(owner) ?? null);
|
|
247
|
+
}
|
|
248
|
+
setQuotaLimits(owner, limits) {
|
|
249
|
+
this.#quotaLimitsPerUser.set(owner, limits);
|
|
250
|
+
}
|
|
251
|
+
async reserveUpload(owner, path, size, options) {
|
|
252
|
+
// Validate size parameter
|
|
253
|
+
if (size < 0) {
|
|
254
|
+
throw (new Errors.InvariantViolation('Reservation size cannot be negative'));
|
|
255
|
+
}
|
|
256
|
+
// Prune expired reservations first
|
|
257
|
+
this.#pruneExpiredReservations();
|
|
258
|
+
// Default TTL: 5 minutes
|
|
259
|
+
const DEFAULT_RESERVATION_TTL_MS = 5 * 60 * 1000;
|
|
260
|
+
const ttl = options?.ttlMs ?? DEFAULT_RESERVATION_TTL_MS;
|
|
261
|
+
// Use provided quota limits or fall back to backend defaults
|
|
262
|
+
const limits = options?.quotaLimits ?? this.quotaConfig;
|
|
263
|
+
// Check if this would exceed quota
|
|
264
|
+
const quotaStatus = await this.getQuotaStatus(owner);
|
|
265
|
+
const isNewObject = !this.storage.has(path);
|
|
266
|
+
const existingSize = this.storage.get(path)?.data.length ?? 0;
|
|
267
|
+
const sizeDelta = size - existingSize;
|
|
268
|
+
// Calculate remaining based on provided limits
|
|
269
|
+
const remainingObjects = limits.maxObjectsPerUser - quotaStatus.objectCount;
|
|
270
|
+
const remainingSize = limits.maxStoragePerUser - quotaStatus.totalSize;
|
|
271
|
+
if (isNewObject && remainingObjects <= 0) {
|
|
272
|
+
throw (new Errors.QuotaExceeded({
|
|
273
|
+
quotaType: 'maxObjectsPerUser',
|
|
274
|
+
limit: limits.maxObjectsPerUser,
|
|
275
|
+
current: quotaStatus.objectCount
|
|
276
|
+
}));
|
|
277
|
+
}
|
|
278
|
+
if (sizeDelta > 0 && remainingSize < sizeDelta) {
|
|
279
|
+
throw (new Errors.QuotaExceeded({
|
|
280
|
+
quotaType: 'maxStoragePerUser',
|
|
281
|
+
limit: limits.maxStoragePerUser,
|
|
282
|
+
current: quotaStatus.totalSize + sizeDelta
|
|
283
|
+
}));
|
|
284
|
+
}
|
|
285
|
+
// Check for existing reservation for this (owner, path)
|
|
286
|
+
// If a reservation already exists, we calculate the additional quota needed
|
|
287
|
+
// by comparing the new sizeDelta with the existing reservation's reserved size.
|
|
288
|
+
const pathKey = `${owner}:${path}`;
|
|
289
|
+
const existingId = this.#reservationsByPath.get(pathKey);
|
|
290
|
+
if (existingId) {
|
|
291
|
+
const existing = this.reservations.get(existingId);
|
|
292
|
+
if (existing) {
|
|
293
|
+
const clampedSizeDelta = Math.max(0, sizeDelta);
|
|
294
|
+
const additionalSize = clampedSizeDelta - existing.size;
|
|
295
|
+
// Re-check quota if size is increasing beyond current reservation
|
|
296
|
+
if (additionalSize > 0 && remainingSize < additionalSize) {
|
|
297
|
+
throw (new Errors.QuotaExceeded({
|
|
298
|
+
quotaType: 'maxStoragePerUser',
|
|
299
|
+
limit: limits.maxStoragePerUser,
|
|
300
|
+
current: quotaStatus.totalSize + additionalSize
|
|
301
|
+
}));
|
|
302
|
+
}
|
|
303
|
+
// Update to max size, extend expiry
|
|
304
|
+
existing.size = Math.max(existing.size, clampedSizeDelta);
|
|
305
|
+
existing.expiresAt = new Date(Date.now() + ttl).toISOString();
|
|
306
|
+
return (existing);
|
|
307
|
+
}
|
|
308
|
+
}
|
|
309
|
+
const now = new Date();
|
|
310
|
+
const reservation = {
|
|
311
|
+
id: `res_${++this.reservationCounter}`,
|
|
312
|
+
owner,
|
|
313
|
+
path,
|
|
314
|
+
size: Math.max(0, sizeDelta),
|
|
315
|
+
createdAt: now.toISOString(),
|
|
316
|
+
expiresAt: new Date(now.getTime() + ttl).toISOString()
|
|
317
|
+
};
|
|
318
|
+
this.reservations.set(reservation.id, reservation);
|
|
319
|
+
this.#reservationsByPath.set(pathKey, reservation.id);
|
|
320
|
+
return (reservation);
|
|
321
|
+
}
|
|
322
|
+
async commitUpload(reservationId) {
|
|
323
|
+
// Simply remove the reservation - the actual storage was already updated via put()
|
|
324
|
+
const reservation = this.reservations.get(reservationId);
|
|
325
|
+
if (reservation) {
|
|
326
|
+
this.#reservationsByPath.delete(`${reservation.owner}:${reservation.path}`);
|
|
327
|
+
}
|
|
328
|
+
this.reservations.delete(reservationId);
|
|
329
|
+
}
|
|
330
|
+
async releaseUpload(reservationId) {
|
|
331
|
+
// Remove the reservation, freeing the reserved quota
|
|
332
|
+
const reservation = this.reservations.get(reservationId);
|
|
333
|
+
if (reservation) {
|
|
334
|
+
this.#reservationsByPath.delete(`${reservation.owner}:${reservation.path}`);
|
|
335
|
+
}
|
|
336
|
+
this.reservations.delete(reservationId);
|
|
337
|
+
}
|
|
338
|
+
clear() {
|
|
339
|
+
this.storage.clear();
|
|
340
|
+
this.reservations.clear();
|
|
341
|
+
this.#reservationsByPath.clear();
|
|
342
|
+
}
|
|
343
|
+
get size() {
|
|
344
|
+
return (this.storage.size);
|
|
345
|
+
}
|
|
346
|
+
}
|
|
347
|
+
//# sourceMappingURL=test-utils.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"test-utils.js","sourceRoot":"","sources":["../../../src/services/storage/test-utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AAcjD,OAAO,EAAE,MAAM,EAAE,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,MAAM,EAAE,MAAM,2BAA2B,CAAC;AAanD;;;GAGG;AACH,MAAM,OAAO,cAAc;IAC1B,kEAAkE;IACzD,QAAQ,GAAG,4BAA4B,CAAC;IAEjD,KAAK,CAAC,IAAY;QACjB,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACxC,IAAI,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;YACjB,OAAM,CAAC,IAAI,CAAC,CAAC;QACd,CAAC;QAED,OAAM,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC,CAAC,EAAE,YAAY,EAAE,KAAK,CAAC,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAED,QAAQ,CAAC,IAAY;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAChC,IAAI,CAAC,MAAM,EAAE,CAAC;YACb,MAAK,CAAC,IAAI,MAAM,CAAC,WAAW,CAAC,uCAAuC,CAAC,CAAC,CAAC;QACxE,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;YACzB,MAAK,CAAC,IAAI,MAAM,CAAC,WAAW,CAAC,8BAA8B,CAAC,CAAC,CAAC;QAC/D,CAAC;QAED,iCAAiC;QACjC,MAAM,QAAQ,GAAG,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAChD,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC5B,IAAI,GAAG,KAAK,IAAI,IAAI,GAAG,KAAK,GAAG,EAAE,CAAC;gBACjC,MAAK,CAAC,IAAI,MAAM,CAAC,WAAW,CAAC,iCAAiC,CAAC,CAAC,CAAC;YAClE,CAAC;QACF,CAAC;QAED,OAAM,CAAC,MAAM,CAAC,CAAC;IAChB,CAAC;IAED,OAAO,CAAC,IAAY;QACnB,OAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,IAAI,CAAC,CAAC;IACnC,CAAC;IAED,WAAW,CACV,OAAkD,EAClD,MAAsB,EACtB,gBAAkE;QAElE,wDAAwD;QACxD,OAAM,CAAC,MAAM,CAAC,KAAK,KAAK,OAAO,CAAC,eAAe,CAAC,GAAG,EAAE,CAAC,CAAC;IACxD,CAAC;IAED,mBAAmB,CAAC,MAAsB;QACzC,OAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,mBAAmB,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,CAAC,CAAC;IAChF,CAAC;IAED,gBAAgB,CAAC,MAAsB,EAAE,QAA4B;QACpE,oDAAoD;QACpD,IAAI,MAAM,CAAC,YAAY,CAAC,UAAU,CAAC,SAAS,CAAC,IAAI,QAAQ,CAAC,UAAU,KAAK,QAAQ,EAAE,CAAC;YACnF,MAAK,CAAC,IAAI,MAAM,CAAC,eAAe,CAAC,oDAAoD,CAAC,CAAC,CAAC;QACzF,CAAC;IACF,CAAC;IAED;;OAEG;IACH,QAAQ,CAAC,KAAa,EAAE,YAAoB;QAC3C,OAAM,CAAC,SAAS,KAAK,IAAI,YAAY,EAAE,CAAC,CAAC;IAC1C,CAAC;IAED;;OAEG;IACH,kBAAkB,CAAC,KAAa;QAC/B,OAAM,CAAC,SAAS,KAAK,GAAG,CAAC,CAAC;IAC3B,CAAC;CACD;AAED;;GAEG;AACH,MAAM,CAAC,MAAM,cAAc,GAAmB,IAAI,cAAc,EAAE,CAAC;AAEnE;;GAEG;AACH,MAAM,UAAU,YAAY,CAC3B,KAAa,EACb,SAAuC;IAEvC,OAAM,CAAC;QACN,KAAK;QACL,IAAI,EAAE,EAAE;QACR,UAAU,EAAE,SAAS;QACrB,GAAG,SAAS;KACZ,CAAC,CAAC;AACJ,CAAC;AAgBD,aAAa;AAEb,oCAAoC;AAEpC,SAAS,YAAY,CACpB,OAAkC,EAClC,IAAY,EACZ,IAAY,EACZ,QAA4B;IAE5B,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;IACrC,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;IACnC,MAAM,cAAc,GAA0B;QAC7C,IAAI;QACJ,KAAK,EAAE,QAAQ,CAAC,KAAK;QACrB,IAAI,EAAE,QAAQ,CAAC,IAAI;QACnB,UAAU,EAAE,QAAQ,CAAC,UAAU;QAC/B,IAAI,EAAE,IAAI,CAAC,MAAM;QACjB,SAAS,EAAE,QAAQ,EAAE,QAAQ,CAAC,SAAS,IAAI,GAAG;QAC9C,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;KACvC,CAAC;IAEF,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,cAAc,EAAE,CAAC,CAAC;IACtD,OAAM,CAAC,cAAc,CAAC,CAAC;AACxB,CAAC;AAED,SAAS,cAAc,CACtB,OAAkC,EAClC,IAAY;IAEZ,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;IAChC,IAAI,CAAC,KAAK,EAAE,CAAC;QACZ,OAAM,CAAC,IAAI,CAAC,CAAC;IACd,CAAC;IAED,OAAM,CAAC;QACN,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;QAC7B,QAAQ,EAAE,EAAE,GAAG,KAAK,CAAC,QAAQ,EAAE;KAC/B,CAAC,CAAC;AACJ,CAAC;AAED,SAAS,aAAa,CACrB,OAAkC,EAClC,QAAwB,EACxB,UAA4B;IAE5B,MAAM,OAAO,GAA4B,EAAE,CAAC;IAC5C,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,IAAI,GAAG,CAAC;IACtC,MAAM,UAAU,GAAG,UAAU,CAAC,MAAM,CAAC;IACrC,IAAI,WAAW,GAAG,CAAC,UAAU,CAAC;IAE9B,KAAK,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,IAAI,OAAO,CAAC,OAAO,EAAE,EAAE,CAAC;QAC/C,IAAI,CAAC,WAAW,EAAE,CAAC;YAClB,IAAI,IAAI,KAAK,UAAU,EAAE,CAAC;gBACzB,WAAW,GAAG,IAAI,CAAC;YACpB,CAAC;YACD,SAAS;QACV,CAAC;QAED,MAAM,QAAQ,GAAG,KAAK,CAAC,QAAQ,CAAC;QAEhC,IAAI,QAAQ,CAAC,UAAU,EAAE,CAAC;YACzB,MAAM,MAAM,GAAG,QAAQ,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC;gBAC/C,CAAC,CAAC,QAAQ,CAAC,UAAU;gBACrB,CAAC,CAAC,QAAQ,CAAC,UAAU,GAAG,GAAG,CAAC;YAC7B,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,IAAI,KAAK,QAAQ,CAAC,UAAU,EAAE,CAAC;gBAC9D,SAAS;YACV,CAAC;YACD,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBACzB,MAAM,SAAS,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;gBAC5C,IAAI,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC7B,SAAS;gBACV,CAAC;YACF,CAAC;QACF,CAAC;QAED,IAAI,QAAQ,CAAC,KAAK,IAAI,QAAQ,CAAC,KAAK,KAAK,QAAQ,CAAC,KAAK,EAAE,CAAC;YACzD,SAAS;QACV,CAAC;QAED,IAAI,QAAQ,CAAC,IAAI,IAAI,QAAQ,CAAC,IAAI,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC/C,MAAM,cAAc,GAAG,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,UAAS,GAAG;gBACrD,OAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,cAAc,EAAE,CAAC;gBACrB,SAAS;YACV,CAAC;QACF,CAAC;QAED,IAAI,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnB,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;YACvC,IAAI,CAAC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;gBACxC,SAAS;YACV,CAAC;QACF,CAAC;QAED,IAAI,QAAQ,CAAC,UAAU,IAAI,QAAQ,CAAC,UAAU,KAAK,QAAQ,CAAC,UAAU,EAAE,CAAC;YACxE,SAAS;QACV,CAAC;QAED,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAEvB,IAAI,OAAO,CAAC,MAAM,IAAI,KAAK,EAAE,CAAC;YAC7B,OAAM,CAAC,EAAE,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,CAAC,CAAC;QACvC,CAAC;IACF,CAAC;IAED,OAAM,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC;AACrB,CAAC;AAED,SAAS,kBAAkB,CAC1B,OAAkC,EAClC,KAAa,EACb,WAAwB;IAExB,IAAI,WAAW,GAAG,CAAC,CAAC;IACpB,IAAI,SAAS,GAAG,CAAC,CAAC;IAClB,KAAK,MAAM,KAAK,IAAI,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC;QACtC,IAAI,KAAK,CAAC,QAAQ,CAAC,KAAK,KAAK,KAAK,EAAE,CAAC;YACpC,WAAW,EAAE,CAAC;YAEd,SAAS,IAAI,KAAK,CAAC,QAAQ,CAAC,IAAI,CAAC;QAClC,CAAC;IACF,CAAC;IAED,OAAM,CAAC;QACN,WAAW;QACX,SAAS;QACT,gBAAgB,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,WAAW,CAAC,iBAAiB,GAAG,WAAW,CAAC;QAC1E,aAAa,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,WAAW,CAAC,iBAAiB,GAAG,SAAS,CAAC;KACrE,CAAC,CAAC;AACJ,CAAC;AAED,aAAa;AAEb,iCAAiC;AAEjC;;;GAGG;AACH,MAAM,OAAO,oBAAoB;IACxB,OAAO,GAAG,IAAI,GAAG,EAAwB,CAAC;IAC1C,YAAY,GAAG,IAAI,GAAG,EAA6B,CAAC;IACnD,mBAAmB,GAAG,IAAI,GAAG,EAAkB,CAAC,CAAC,gCAAgC;IAClF,kBAAkB,GAAG,CAAC,CAAC;IACtB,mBAAmB,GAAG,IAAI,GAAG,EAAuB,CAAC;IAE7C,WAAW,GAAgB;QAC3C,iBAAiB,EAAE,IAAI;QACvB,iBAAiB,EAAE,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,QAAQ;KAC7C,CAAC;IAEF;;OAEG;IACH,yBAAyB;QACxB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,KAAK,MAAM,CAAC,EAAE,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACnD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC;gBACtD,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC7B,IAAI,CAAC,mBAAmB,CAAC,MAAM,CAAC,GAAG,WAAW,CAAC,KAAK,IAAI,WAAW,CAAC,IAAI,EAAE,CAAC,CAAC;YAC7E,CAAC;QACF,CAAC;IACF,CAAC;IAED,KAAK,CAAC,GAAG,CAAC,IAAY,EAAE,IAAY,EAAE,QAA4B;QACjE,OAAM,CAAC,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,QAAQ,CAAC,CAAC,CAAC;IAC1D,CAAC;IAED,KAAK,CAAC,GAAG,CAAC,IAAY;QACrB,OAAM,CAAC,cAAc,CAAC,IAAI,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC;IAC5C,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,IAAY;QACxB,OAAM,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;IACnC,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,QAAwB,EAAE,UAA4B;QAClE,OAAM,CAAC,aAAa,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,UAAU,CAAC,CAAC,CAAC;IAC3D,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,KAAa;QACjC,mCAAmC;QACnC,IAAI,CAAC,yBAAyB,EAAE,CAAC;QAEjC,qCAAqC;QACrC,MAAM,SAAS,GAAG,kBAAkB,CAAC,IAAI,CAAC,OAAO,EAAE,KAAK,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;QAE5E,0CAA0C;QAC1C,IAAI,eAAe,GAAG,CAAC,CAAC;QACxB,IAAI,YAAY,GAAG,CAAC,CAAC;QACrB,KAAK,MAAM,WAAW,IAAI,IAAI,CAAC,YAAY,CAAC,MAAM,EAAE,EAAE,CAAC;YACtD,IAAI,WAAW,CAAC,KAAK,KAAK,KAAK,EAAE,CAAC;gBACjC,iDAAiD;gBACjD,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzC,eAAe,EAAE,CAAC;gBACnB,CAAC;gBAED,YAAY,IAAI,WAAW,CAAC,IAAI,CAAC;YAClC,CAAC;QACF,CAAC;QAED,MAAM,WAAW,GAAG,SAAS,CAAC,WAAW,GAAG,eAAe,CAAC;QAC5D,MAAM,SAAS,GAAG,SAAS,CAAC,SAAS,GAAG,YAAY,CAAC;QACrD,MAAM,gBAAgB,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,IAAI,CAAC,CAAC,GAAG,eAAe,CAAC,CAAC;QAC1F,MAAM,aAAa,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,aAAa,IAAI,CAAC,CAAC,GAAG,YAAY,CAAC,CAAC;QACjF,OAAM,CAAC;YACN,WAAW;YACX,SAAS;YACT,gBAAgB;YAChB,aAAa;SACb,CAAC,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,KAAa;QACjC,OAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,IAAI,CAAC,CAAC;IACrD,CAAC;IAED,cAAc,CAAC,KAAa,EAAE,MAAmB;QAChD,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;IAC7C,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,KAAa,EAAE,IAAY,EAAE,IAAY,EAAE,OAG9D;QACA,0BAA0B;QAC1B,IAAI,IAAI,GAAG,CAAC,EAAE,CAAC;YACd,MAAK,CAAC,IAAI,MAAM,CAAC,kBAAkB,CAAC,qCAAqC,CAAC,CAAC,CAAC;QAC7E,CAAC;QAED,mCAAmC;QACnC,IAAI,CAAC,yBAAyB,EAAE,CAAC;QAEjC,yBAAyB;QACzB,MAAM,0BAA0B,GAAG,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;QACjD,MAAM,GAAG,GAAG,OAAO,EAAE,KAAK,IAAI,0BAA0B,CAAC;QAEzD,6DAA6D;QAC7D,MAAM,MAAM,GAAG,OAAO,EAAE,WAAW,IAAI,IAAI,CAAC,WAAW,CAAC;QAExD,mCAAmC;QACnC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;QACrD,MAAM,WAAW,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QAC5C,MAAM,YAAY,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,IAAI,CAAC,MAAM,IAAI,CAAC,CAAC;QAC9D,MAAM,SAAS,GAAG,IAAI,GAAG,YAAY,CAAC;QAEtC,+CAA+C;QAC/C,MAAM,gBAAgB,GAAG,MAAM,CAAC,iBAAiB,GAAG,WAAW,CAAC,WAAW,CAAC;QAC5E,MAAM,aAAa,GAAG,MAAM,CAAC,iBAAiB,GAAG,WAAW,CAAC,SAAS,CAAC;QAEvE,IAAI,WAAW,IAAI,gBAAgB,IAAI,CAAC,EAAE,CAAC;YAC1C,MAAK,CAAC,IAAI,MAAM,CAAC,aAAa,CAAC;gBAC9B,SAAS,EAAE,mBAAmB;gBAC9B,KAAK,EAAE,MAAM,CAAC,iBAAiB;gBAC/B,OAAO,EAAE,WAAW,CAAC,WAAW;aAChC,CAAC,CAAC,CAAC;QACL,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,aAAa,GAAG,SAAS,EAAE,CAAC;YAChD,MAAK,CAAC,IAAI,MAAM,CAAC,aAAa,CAAC;gBAC9B,SAAS,EAAE,mBAAmB;gBAC9B,KAAK,EAAE,MAAM,CAAC,iBAAiB;gBAC/B,OAAO,EAAE,WAAW,CAAC,SAAS,GAAG,SAAS;aAC1C,CAAC,CAAC,CAAC;QACL,CAAC;QAED,wDAAwD;QACxD,4EAA4E;QAC5E,gFAAgF;QAChF,MAAM,OAAO,GAAG,GAAG,KAAK,IAAI,IAAI,EAAE,CAAC;QACnC,MAAM,UAAU,GAAG,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QACzD,IAAI,UAAU,EAAE,CAAC;YAChB,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YACnD,IAAI,QAAQ,EAAE,CAAC;gBACd,MAAM,gBAAgB,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC;gBAChD,MAAM,cAAc,GAAG,gBAAgB,GAAG,QAAQ,CAAC,IAAI,CAAC;gBAExD,kEAAkE;gBAClE,IAAI,cAAc,GAAG,CAAC,IAAI,aAAa,GAAG,cAAc,EAAE,CAAC;oBAC1D,MAAK,CAAC,IAAI,MAAM,CAAC,aAAa,CAAC;wBAC9B,SAAS,EAAE,mBAAmB;wBAC9B,KAAK,EAAE,MAAM,CAAC,iBAAiB;wBAC/B,OAAO,EAAE,WAAW,CAAC,SAAS,GAAG,cAAc;qBAC/C,CAAC,CAAC,CAAC;gBACL,CAAC;gBAED,oCAAoC;gBACpC,QAAQ,CAAC,IAAI,GAAG,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,gBAAgB,CAAC,CAAC;gBAC1D,QAAQ,CAAC,SAAS,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,GAAG,CAAC,CAAC,WAAW,EAAE,CAAC;gBAC9D,OAAM,CAAC,QAAQ,CAAC,CAAC;YAClB,CAAC;QACF,CAAC;QAED,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,WAAW,GAAsB;YACtC,EAAE,EAAE,OAAO,EAAE,IAAI,CAAC,kBAAkB,EAAE;YACtC,KAAK;YACL,IAAI;YACJ,IAAI,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,SAAS,CAAC;YAC5B,SAAS,EAAE,GAAG,CAAC,WAAW,EAAE;YAC5B,SAAS,EAAE,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,CAAC,WAAW,EAAE;SACtD,CAAC;QAEF,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,EAAE,WAAW,CAAC,CAAC;QACnD,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,OAAO,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;QACtD,OAAM,CAAC,WAAW,CAAC,CAAC;IACrB,CAAC;IAED,KAAK,CAAC,YAAY,CAAC,aAAqB;QACvC,mFAAmF;QACnF,MAAM,WAAW,GAAG,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;QACzD,IAAI,WAAW,EAAE,CAAC;YACjB,IAAI,CAAC,mBAAmB,CAAC,MAAM,CAAC,GAAG,WAAW,CAAC,KAAK,IAAI,WAAW,CAAC,IAAI,EAAE,CAAC,CAAC;QAC7E,CAAC;QAED,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;IACzC,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,aAAqB;QACxC,qDAAqD;QACrD,MAAM,WAAW,GAAG,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;QACzD,IAAI,WAAW,EAAE,CAAC;YACjB,IAAI,CAAC,mBAAmB,CAAC,MAAM,CAAC,GAAG,WAAW,CAAC,KAAK,IAAI,WAAW,CAAC,IAAI,EAAE,CAAC,CAAC;QAC7E,CAAC;QAED,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;IACzC,CAAC;IAED,KAAK;QACJ,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC;QACrB,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;QAC1B,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;IAClC,CAAC;IAED,IAAI,IAAI;QACP,OAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IAC3B,CAAC;CACD","sourcesContent":["import { KeetaNet } from '../../client/index.js';\nimport type {\n\tPathPolicy,\n\tFullStorageBackend,\n\tStorageObjectMetadata,\n\tStoragePutMetadata,\n\tStorageGetResult,\n\tSearchCriteria,\n\tSearchPagination,\n\tSearchResults,\n\tQuotaStatus,\n\tQuotaLimits,\n\tUploadReservation\n} from './common.js';\nimport { Errors } from './common.js';\nimport { Buffer } from '../../lib/utils/buffer.js';\n\n// #region Test Path Policy\n\n/**\n * Parsed path for the test path policy: /user/<pubkey>/<relativePath>\n */\nexport type TestParsedPath = {\n\tpath: string;\n\towner: string;\n\trelativePath: string;\n};\n\n/**\n * Test path policy implementing the /user/<pubkey>/<path> pattern.\n * Owner-based access control: only the owner can access their namespace.\n */\nexport class TestPathPolicy implements PathPolicy<TestParsedPath> {\n\t// Matches /user/<owner> or /user/<owner>/ or /user/<owner>/<path>\n\treadonly #pattern = /^\\/user\\/([^/]+)(\\/(.*))?$/;\n\n\tparse(path: string): TestParsedPath | null {\n\t\tconst match = path.match(this.#pattern);\n\t\tif (!match?.[1]) {\n\t\t\treturn(null);\n\t\t}\n\n\t\treturn({ path, owner: match[1], relativePath: match[3] ?? '' });\n\t}\n\n\tvalidate(path: string): TestParsedPath {\n\t\tconst parsed = this.parse(path);\n\t\tif (!parsed) {\n\t\t\tthrow(new Errors.InvalidPath('Path must match /user/<pubkey>/<path>'));\n\t\t}\n\n\t\t// Reject empty segments in original path\n\t\tif (path.includes('//')) {\n\t\t\tthrow(new Errors.InvalidPath('Path contains empty segments'));\n\t\t}\n\n\t\t// Reject path traversal attempts\n\t\tconst segments = parsed.relativePath.split('/');\n\t\tfor (const seg of segments) {\n\t\t\tif (seg === '..' || seg === '.') {\n\t\t\t\tthrow(new Errors.InvalidPath('Path contains relative segments'));\n\t\t\t}\n\t\t}\n\n\t\treturn(parsed);\n\t}\n\n\tisValid(path: string): boolean {\n\t\treturn(this.parse(path) !== null);\n\t}\n\n\tcheckAccess(\n\t\taccount: InstanceType<typeof KeetaNet.lib.Account>,\n\t\tparsed: TestParsedPath,\n\t\t_ignoreOperation: 'get' | 'put' | 'delete' | 'search' | 'metadata'\n\t): boolean {\n\t\t// Owner-based access: account must match the path owner\n\t\treturn(parsed.owner === account.publicKeyString.get());\n\t}\n\n\tgetAuthorizedSigner(parsed: TestParsedPath): InstanceType<typeof KeetaNet.lib.Account> | null {\n\t\treturn(KeetaNet.lib.Account.fromPublicKeyString(parsed.owner).assertAccount());\n\t}\n\n\tvalidateMetadata(parsed: TestParsedPath, metadata: StoragePutMetadata): void {\n\t\t// Require public visibility for paths under public/\n\t\tif (parsed.relativePath.startsWith('public/') && metadata.visibility !== 'public') {\n\t\t\tthrow(new Errors.InvalidMetadata('Objects under /public/ must have public visibility'));\n\t\t}\n\t}\n\n\t/**\n\t * Helper to construct a path for a given owner and relative path.\n\t */\n\tmakePath(owner: string, relativePath: string): string {\n\t\treturn(`/user/${owner}/${relativePath}`);\n\t}\n\n\t/**\n\t * Helper to get the namespace prefix for an owner.\n\t */\n\tgetNamespacePrefix(owner: string): string {\n\t\treturn(`/user/${owner}/`);\n\t}\n}\n\n/**\n * Shared instance of TestPathPolicy for use in tests.\n */\nexport const testPathPolicy: TestPathPolicy = new TestPathPolicy();\n\n/**\n * Create test metadata with sensible defaults.\n */\nexport function testMetadata(\n\towner: string,\n\toverrides?: Partial<StoragePutMetadata>\n): StoragePutMetadata {\n\treturn({\n\t\towner,\n\t\ttags: [],\n\t\tvisibility: 'private',\n\t\t...overrides\n\t});\n}\n\n// #endregion\n\n// #region Types\n\ntype StorageEntry = {\n\tdata: Buffer;\n\tmetadata: StorageObjectMetadata;\n};\n\ntype QuotaConfig = {\n\tmaxObjectsPerUser: number;\n\tmaxStoragePerUser: number;\n};\n\n// #endregion\n\n// #region Shared Storage Operations\n\nfunction putToStorage(\n\tstorage: Map<string, StorageEntry>,\n\tpath: string,\n\tdata: Buffer,\n\tmetadata: StoragePutMetadata\n): StorageObjectMetadata {\n\tconst now = new Date().toISOString();\n\tconst existing = storage.get(path);\n\tconst objectMetadata: StorageObjectMetadata = {\n\t\tpath,\n\t\towner: metadata.owner,\n\t\ttags: metadata.tags,\n\t\tvisibility: metadata.visibility,\n\t\tsize: data.length,\n\t\tcreatedAt: existing?.metadata.createdAt ?? now,\n\t\t...(existing ? { updatedAt: now } : {})\n\t};\n\n\tstorage.set(path, { data, metadata: objectMetadata });\n\treturn(objectMetadata);\n}\n\nfunction getFromStorage(\n\tstorage: Map<string, StorageEntry>,\n\tpath: string\n): StorageGetResult | null {\n\tconst entry = storage.get(path);\n\tif (!entry) {\n\t\treturn(null);\n\t}\n\n\treturn({\n\t\tdata: Buffer.from(entry.data),\n\t\tmetadata: { ...entry.metadata }\n\t});\n}\n\nfunction searchStorage(\n\tstorage: Map<string, StorageEntry>,\n\tcriteria: SearchCriteria,\n\tpagination: SearchPagination\n): SearchResults {\n\tconst results: StorageObjectMetadata[] = [];\n\tconst limit = pagination.limit ?? 100;\n\tconst startAfter = pagination.cursor;\n\tlet foundCursor = !startAfter;\n\n\tfor (const [path, entry] of storage.entries()) {\n\t\tif (!foundCursor) {\n\t\t\tif (path === startAfter) {\n\t\t\t\tfoundCursor = true;\n\t\t\t}\n\t\t\tcontinue;\n\t\t}\n\n\t\tconst metadata = entry.metadata;\n\n\t\tif (criteria.pathPrefix) {\n\t\t\tconst prefix = criteria.pathPrefix.endsWith('/')\n\t\t\t\t? criteria.pathPrefix\n\t\t\t\t: criteria.pathPrefix + '/';\n\t\t\tif (!path.startsWith(prefix) && path !== criteria.pathPrefix) {\n\t\t\t\tcontinue;\n\t\t\t}\n\t\t\tif (!criteria.recursive) {\n\t\t\t\tconst remainder = path.slice(prefix.length);\n\t\t\t\tif (remainder.includes('/')) {\n\t\t\t\t\tcontinue;\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif (criteria.owner && metadata.owner !== criteria.owner) {\n\t\t\tcontinue;\n\t\t}\n\n\t\tif (criteria.tags && criteria.tags.length > 0) {\n\t\t\tconst hasMatchingTag = criteria.tags.some(function(tag) {\n\t\t\t\treturn(metadata.tags.includes(tag));\n\t\t\t});\n\t\t\tif (!hasMatchingTag) {\n\t\t\t\tcontinue;\n\t\t\t}\n\t\t}\n\n\t\tif (criteria.name) {\n\t\t\tconst filename = path.split('/').pop();\n\t\t\tif (!filename?.includes(criteria.name)) {\n\t\t\t\tcontinue;\n\t\t\t}\n\t\t}\n\n\t\tif (criteria.visibility && metadata.visibility !== criteria.visibility) {\n\t\t\tcontinue;\n\t\t}\n\n\t\tresults.push(metadata);\n\n\t\tif (results.length >= limit) {\n\t\t\treturn({ results, nextCursor: path });\n\t\t}\n\t}\n\n\treturn({ results });\n}\n\nfunction computeQuotaStatus(\n\tstorage: Map<string, StorageEntry>,\n\towner: string,\n\tquotaConfig: QuotaConfig\n): QuotaStatus {\n\tlet objectCount = 0;\n\tlet totalSize = 0;\n\tfor (const entry of storage.values()) {\n\t\tif (entry.metadata.owner === owner) {\n\t\t\tobjectCount++;\n\n\t\t\ttotalSize += entry.metadata.size;\n\t\t}\n\t}\n\n\treturn({\n\t\tobjectCount,\n\t\ttotalSize,\n\t\tremainingObjects: Math.max(0, quotaConfig.maxObjectsPerUser - objectCount),\n\t\tremainingSize: Math.max(0, quotaConfig.maxStoragePerUser - totalSize)\n\t});\n}\n\n// #endregion\n\n// #region Memory Storage Backend\n\n/**\n * In-memory storage backend with full capabilities: CRUD, search, and quota management.\n * Intended for testing and development purposes.\n */\nexport class MemoryStorageBackend implements FullStorageBackend {\n\tprivate storage = new Map<string, StorageEntry>();\n\tprivate reservations = new Map<string, UploadReservation>();\n\treadonly #reservationsByPath = new Map<string, string>(); // \"owner:path\" -> reservationId\n\tprivate reservationCounter = 0;\n\treadonly #quotaLimitsPerUser = new Map<string, QuotaLimits>();\n\n\tprivate readonly quotaConfig: QuotaConfig = {\n\t\tmaxObjectsPerUser: 1000,\n\t\tmaxStoragePerUser: 100 * 1024 * 1024 // 100MB\n\t};\n\n\t/**\n\t * Prune expired reservations to keep quota accounting accurate.\n\t */\n\t#pruneExpiredReservations(): void {\n\t\tconst now = Date.now();\n\t\tfor (const [id, reservation] of this.reservations) {\n\t\t\tif (new Date(reservation.expiresAt).getTime() <= now) {\n\t\t\t\tthis.reservations.delete(id);\n\t\t\t\tthis.#reservationsByPath.delete(`${reservation.owner}:${reservation.path}`);\n\t\t\t}\n\t\t}\n\t}\n\n\tasync put(path: string, data: Buffer, metadata: StoragePutMetadata): Promise<StorageObjectMetadata> {\n\t\treturn(putToStorage(this.storage, path, data, metadata));\n\t}\n\n\tasync get(path: string): Promise<StorageGetResult | null> {\n\t\treturn(getFromStorage(this.storage, path));\n\t}\n\n\tasync delete(path: string): Promise<boolean> {\n\t\treturn(this.storage.delete(path));\n\t}\n\n\tasync search(criteria: SearchCriteria, pagination: SearchPagination): Promise<SearchResults> {\n\t\treturn(searchStorage(this.storage, criteria, pagination));\n\t}\n\n\tasync getQuotaStatus(owner: string): Promise<QuotaStatus> {\n\t\t// Prune expired reservations first\n\t\tthis.#pruneExpiredReservations();\n\n\t\t// Get base quota from actual storage\n\t\tconst baseQuota = computeQuotaStatus(this.storage, owner, this.quotaConfig);\n\n\t\t// Add pending reservations for this owner\n\t\tlet reservedObjects = 0;\n\t\tlet reservedSize = 0;\n\t\tfor (const reservation of this.reservations.values()) {\n\t\t\tif (reservation.owner === owner) {\n\t\t\t\t// Only count as new object if path doesn't exist\n\t\t\t\tif (!this.storage.has(reservation.path)) {\n\t\t\t\t\treservedObjects++;\n\t\t\t\t}\n\n\t\t\t\treservedSize += reservation.size;\n\t\t\t}\n\t\t}\n\n\t\tconst objectCount = baseQuota.objectCount + reservedObjects;\n\t\tconst totalSize = baseQuota.totalSize + reservedSize;\n\t\tconst remainingObjects = Math.max(0, (baseQuota.remainingObjects ?? 0) - reservedObjects);\n\t\tconst remainingSize = Math.max(0, (baseQuota.remainingSize ?? 0) - reservedSize);\n\t\treturn({\n\t\t\tobjectCount,\n\t\t\ttotalSize,\n\t\t\tremainingObjects,\n\t\t\tremainingSize\n\t\t});\n\t}\n\n\tasync getQuotaLimits(owner: string): Promise<QuotaLimits | null> {\n\t\treturn(this.#quotaLimitsPerUser.get(owner) ?? null);\n\t}\n\n\tsetQuotaLimits(owner: string, limits: QuotaLimits): void {\n\t\tthis.#quotaLimitsPerUser.set(owner, limits);\n\t}\n\n\tasync reserveUpload(owner: string, path: string, size: number, options?: {\n\t\tttlMs?: number;\n\t\tquotaLimits?: { maxObjectsPerUser: number; maxStoragePerUser: number };\n\t}): Promise<UploadReservation> {\n\t\t// Validate size parameter\n\t\tif (size < 0) {\n\t\t\tthrow(new Errors.InvariantViolation('Reservation size cannot be negative'));\n\t\t}\n\n\t\t// Prune expired reservations first\n\t\tthis.#pruneExpiredReservations();\n\n\t\t// Default TTL: 5 minutes\n\t\tconst DEFAULT_RESERVATION_TTL_MS = 5 * 60 * 1000;\n\t\tconst ttl = options?.ttlMs ?? DEFAULT_RESERVATION_TTL_MS;\n\n\t\t// Use provided quota limits or fall back to backend defaults\n\t\tconst limits = options?.quotaLimits ?? this.quotaConfig;\n\n\t\t// Check if this would exceed quota\n\t\tconst quotaStatus = await this.getQuotaStatus(owner);\n\t\tconst isNewObject = !this.storage.has(path);\n\t\tconst existingSize = this.storage.get(path)?.data.length ?? 0;\n\t\tconst sizeDelta = size - existingSize;\n\n\t\t// Calculate remaining based on provided limits\n\t\tconst remainingObjects = limits.maxObjectsPerUser - quotaStatus.objectCount;\n\t\tconst remainingSize = limits.maxStoragePerUser - quotaStatus.totalSize;\n\n\t\tif (isNewObject && remainingObjects <= 0) {\n\t\t\tthrow(new Errors.QuotaExceeded({\n\t\t\t\tquotaType: 'maxObjectsPerUser',\n\t\t\t\tlimit: limits.maxObjectsPerUser,\n\t\t\t\tcurrent: quotaStatus.objectCount\n\t\t\t}));\n\t\t}\n\n\t\tif (sizeDelta > 0 && remainingSize < sizeDelta) {\n\t\t\tthrow(new Errors.QuotaExceeded({\n\t\t\t\tquotaType: 'maxStoragePerUser',\n\t\t\t\tlimit: limits.maxStoragePerUser,\n\t\t\t\tcurrent: quotaStatus.totalSize + sizeDelta\n\t\t\t}));\n\t\t}\n\n\t\t// Check for existing reservation for this (owner, path)\n\t\t// If a reservation already exists, we calculate the additional quota needed\n\t\t// by comparing the new sizeDelta with the existing reservation's reserved size.\n\t\tconst pathKey = `${owner}:${path}`;\n\t\tconst existingId = this.#reservationsByPath.get(pathKey);\n\t\tif (existingId) {\n\t\t\tconst existing = this.reservations.get(existingId);\n\t\t\tif (existing) {\n\t\t\t\tconst clampedSizeDelta = Math.max(0, sizeDelta);\n\t\t\t\tconst additionalSize = clampedSizeDelta - existing.size;\n\n\t\t\t\t// Re-check quota if size is increasing beyond current reservation\n\t\t\t\tif (additionalSize > 0 && remainingSize < additionalSize) {\n\t\t\t\t\tthrow(new Errors.QuotaExceeded({\n\t\t\t\t\t\tquotaType: 'maxStoragePerUser',\n\t\t\t\t\t\tlimit: limits.maxStoragePerUser,\n\t\t\t\t\t\tcurrent: quotaStatus.totalSize + additionalSize\n\t\t\t\t\t}));\n\t\t\t\t}\n\n\t\t\t\t// Update to max size, extend expiry\n\t\t\t\texisting.size = Math.max(existing.size, clampedSizeDelta);\n\t\t\t\texisting.expiresAt = new Date(Date.now() + ttl).toISOString();\n\t\t\t\treturn(existing);\n\t\t\t}\n\t\t}\n\n\t\tconst now = new Date();\n\t\tconst reservation: UploadReservation = {\n\t\t\tid: `res_${++this.reservationCounter}`,\n\t\t\towner,\n\t\t\tpath,\n\t\t\tsize: Math.max(0, sizeDelta),\n\t\t\tcreatedAt: now.toISOString(),\n\t\t\texpiresAt: new Date(now.getTime() + ttl).toISOString()\n\t\t};\n\n\t\tthis.reservations.set(reservation.id, reservation);\n\t\tthis.#reservationsByPath.set(pathKey, reservation.id);\n\t\treturn(reservation);\n\t}\n\n\tasync commitUpload(reservationId: string): Promise<void> {\n\t\t// Simply remove the reservation - the actual storage was already updated via put()\n\t\tconst reservation = this.reservations.get(reservationId);\n\t\tif (reservation) {\n\t\t\tthis.#reservationsByPath.delete(`${reservation.owner}:${reservation.path}`);\n\t\t}\n\n\t\tthis.reservations.delete(reservationId);\n\t}\n\n\tasync releaseUpload(reservationId: string): Promise<void> {\n\t\t// Remove the reservation, freeing the reserved quota\n\t\tconst reservation = this.reservations.get(reservationId);\n\t\tif (reservation) {\n\t\t\tthis.#reservationsByPath.delete(`${reservation.owner}:${reservation.path}`);\n\t\t}\n\n\t\tthis.reservations.delete(reservationId);\n\t}\n\n\tclear(): void {\n\t\tthis.storage.clear();\n\t\tthis.reservations.clear();\n\t\tthis.#reservationsByPath.clear();\n\t}\n\n\tget size(): number {\n\t\treturn(this.storage.size);\n\t}\n}\n\n// #endregion\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../../src/services/storage/utils.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAC;AAK3D,wBAAgB,gBAAgB,CAAC,KAAK,EAAE,OAAO,GAAG,uBAAuB,CAOxE"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { Errors } from './common.js';
|
|
2
|
+
const VALID_VISIBILITIES = new Set(['public', 'private']);
|
|
3
|
+
export function assertVisibility(value) {
|
|
4
|
+
if (typeof value !== 'string' || !VALID_VISIBILITIES.has(value)) {
|
|
5
|
+
throw (new Errors.InvalidMetadata(`visibility must be 'public' or 'private'`));
|
|
6
|
+
}
|
|
7
|
+
// eslint-disable-next-line @typescript-eslint/consistent-type-assertions
|
|
8
|
+
return value;
|
|
9
|
+
}
|
|
10
|
+
//# sourceMappingURL=utils.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"utils.js","sourceRoot":"","sources":["../../../src/services/storage/utils.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,MAAM,EAAE,MAAM,aAAa,CAAC;AAErC,MAAM,kBAAkB,GAAG,IAAI,GAAG,CAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC,CAAC;AAElE,MAAM,UAAU,gBAAgB,CAAC,KAAc;IAC9C,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC;QACjE,MAAK,CAAC,IAAI,MAAM,CAAC,eAAe,CAAC,0CAA0C,CAAC,CAAC,CAAC;IAC/E,CAAC;IAED,yEAAyE;IACzE,OAAO,KAAiC,CAAC;AAC1C,CAAC","sourcesContent":["import type { StorageObjectVisibility } from './common.ts';\nimport { Errors } from './common.js';\n\nconst VALID_VISIBILITIES = new Set<string>(['public', 'private']);\n\nexport function assertVisibility(value: unknown): StorageObjectVisibility {\n\tif (typeof value !== 'string' || !VALID_VISIBILITIES.has(value)) {\n\t\tthrow(new Errors.InvalidMetadata(`visibility must be 'public' or 'private'`));\n\t}\n\n\t// eslint-disable-next-line @typescript-eslint/consistent-type-assertions\n\treturn(value as StorageObjectVisibility);\n}\n"]}
|