@loaders.gl/textures 4.0.0-beta.7 → 4.0.0-beta.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +7 -7
- package/dist/basis-loader.d.ts.map +1 -1
- package/dist/basis-loader.js.map +1 -1
- package/dist/basis-worker-node.js +180 -84
- package/dist/basis-worker.js +2 -2
- package/dist/compressed-texture-worker.js +2 -2
- package/dist/crunch-worker.js +2 -2
- package/dist/ktx2-basis-writer-worker-node.js +180 -84
- package/dist/ktx2-basis-writer-worker.js +2 -2
- package/dist/ktx2-basis-writer.d.ts.map +1 -1
- package/dist/ktx2-basis-writer.js.map +1 -1
- package/dist/lib/texture-api/async-deep-map.d.ts.map +1 -1
- package/dist/lib/texture-api/async-deep-map.js.map +1 -1
- package/dist/lib/texture-api/deep-load.d.ts.map +1 -1
- package/dist/lib/texture-api/deep-load.js.map +1 -1
- package/dist/lib/texture-api/generate-url.d.ts.map +1 -1
- package/dist/lib/texture-api/generate-url.js.map +1 -1
- package/dist/lib/texture-api/load-image-array.d.ts.map +1 -1
- package/dist/lib/texture-api/load-image-array.js.map +1 -1
- package/dist/lib/texture-api/load-image-cube.d.ts.map +1 -1
- package/dist/lib/texture-api/load-image-cube.js.map +1 -1
- package/dist/lib/texture-api/texture-api-types.d.ts.map +1 -1
- package/dist/lib/texture-api/texture-api-types.js.map +1 -1
- package/dist/npy-worker.js +1 -1
- package/package.json +7 -7
- package/src/basis-loader.ts +1 -0
- package/src/ktx2-basis-writer.ts +1 -0
- package/src/lib/texture-api/async-deep-map.ts +1 -0
- package/src/lib/texture-api/deep-load.ts +1 -0
- package/src/lib/texture-api/generate-url.ts +1 -0
- package/src/lib/texture-api/load-image-array.ts +1 -0
- package/src/lib/texture-api/load-image-cube.ts +1 -0
- package/src/lib/texture-api/texture-api-types.ts +1 -0
|
@@ -655,7 +655,7 @@ var require_stream_readable = __commonJS({
|
|
|
655
655
|
if (state.pipesCount === 1)
|
|
656
656
|
write(state.pipes, 0, null);
|
|
657
657
|
else
|
|
658
|
-
|
|
658
|
+
forEach2(state.pipes, write);
|
|
659
659
|
src.emit("data", chunk);
|
|
660
660
|
if (state.awaitDrain > 0)
|
|
661
661
|
return;
|
|
@@ -812,7 +812,7 @@ var require_stream_readable = __commonJS({
|
|
|
812
812
|
}
|
|
813
813
|
}
|
|
814
814
|
var events = ["error", "close", "destroy", "pause", "resume"];
|
|
815
|
-
|
|
815
|
+
forEach2(events, function(ev) {
|
|
816
816
|
stream2.on(ev, self2.emit.bind(self2, ev));
|
|
817
817
|
});
|
|
818
818
|
self2._read = function(n) {
|
|
@@ -887,7 +887,7 @@ var require_stream_readable = __commonJS({
|
|
|
887
887
|
});
|
|
888
888
|
}
|
|
889
889
|
}
|
|
890
|
-
function
|
|
890
|
+
function forEach2(xs, f) {
|
|
891
891
|
for (var i = 0, l = xs.length; i < l; i++) {
|
|
892
892
|
f(xs[i], i);
|
|
893
893
|
}
|
|
@@ -917,7 +917,7 @@ var require_stream_duplex = __commonJS({
|
|
|
917
917
|
var Readable5 = require_stream_readable();
|
|
918
918
|
var Writable = require_stream_writable();
|
|
919
919
|
util.inherits(Duplex, Readable5);
|
|
920
|
-
|
|
920
|
+
forEach2(objectKeys(Writable.prototype), function(method) {
|
|
921
921
|
if (!Duplex.prototype[method])
|
|
922
922
|
Duplex.prototype[method] = Writable.prototype[method];
|
|
923
923
|
});
|
|
@@ -940,7 +940,7 @@ var require_stream_duplex = __commonJS({
|
|
|
940
940
|
return;
|
|
941
941
|
process.nextTick(this.end.bind(this));
|
|
942
942
|
}
|
|
943
|
-
function
|
|
943
|
+
function forEach2(xs, f) {
|
|
944
944
|
for (var i = 0, l = xs.length; i < l; i++) {
|
|
945
945
|
f(xs[i], i);
|
|
946
946
|
}
|
|
@@ -1653,7 +1653,7 @@ var require_stream_duplex2 = __commonJS({
|
|
|
1653
1653
|
var Readable5 = require_stream_readable2();
|
|
1654
1654
|
var Writable = require_stream_writable2();
|
|
1655
1655
|
util.inherits(Duplex, Readable5);
|
|
1656
|
-
|
|
1656
|
+
forEach2(objectKeys(Writable.prototype), function(method) {
|
|
1657
1657
|
if (!Duplex.prototype[method])
|
|
1658
1658
|
Duplex.prototype[method] = Writable.prototype[method];
|
|
1659
1659
|
});
|
|
@@ -1676,7 +1676,7 @@ var require_stream_duplex2 = __commonJS({
|
|
|
1676
1676
|
return;
|
|
1677
1677
|
process.nextTick(this.end.bind(this));
|
|
1678
1678
|
}
|
|
1679
|
-
function
|
|
1679
|
+
function forEach2(xs, f) {
|
|
1680
1680
|
for (var i = 0, l = xs.length; i < l; i++) {
|
|
1681
1681
|
f(xs[i], i);
|
|
1682
1682
|
}
|
|
@@ -2220,7 +2220,7 @@ var require_stream_readable2 = __commonJS({
|
|
|
2220
2220
|
}
|
|
2221
2221
|
}
|
|
2222
2222
|
var events = ["error", "close", "destroy", "pause", "resume"];
|
|
2223
|
-
|
|
2223
|
+
forEach2(events, function(ev) {
|
|
2224
2224
|
stream2.on(ev, self2.emit.bind(self2, ev));
|
|
2225
2225
|
});
|
|
2226
2226
|
self2._read = function(n) {
|
|
@@ -2296,7 +2296,7 @@ var require_stream_readable2 = __commonJS({
|
|
|
2296
2296
|
});
|
|
2297
2297
|
}
|
|
2298
2298
|
}
|
|
2299
|
-
function
|
|
2299
|
+
function forEach2(xs, f) {
|
|
2300
2300
|
for (var i = 0, l = xs.length; i < l; i++) {
|
|
2301
2301
|
f(xs[i], i);
|
|
2302
2302
|
}
|
|
@@ -22770,7 +22770,7 @@ var require_helpers = __commonJS({
|
|
|
22770
22770
|
"../../node_modules/request/lib/helpers.js"(exports) {
|
|
22771
22771
|
"use strict";
|
|
22772
22772
|
var jsonSafeStringify = require_stringify();
|
|
22773
|
-
var
|
|
22773
|
+
var crypto2 = require("crypto");
|
|
22774
22774
|
var Buffer2 = require_safe_buffer().Buffer;
|
|
22775
22775
|
var defer = typeof setImmediate === "undefined" ? process.nextTick : setImmediate;
|
|
22776
22776
|
function paramsHaveRequestBody(params) {
|
|
@@ -22786,7 +22786,7 @@ var require_helpers = __commonJS({
|
|
|
22786
22786
|
return ret;
|
|
22787
22787
|
}
|
|
22788
22788
|
function md5(str) {
|
|
22789
|
-
return
|
|
22789
|
+
return crypto2.createHash("md5").update(str).digest("hex");
|
|
22790
22790
|
}
|
|
22791
22791
|
function isReadStream(rs) {
|
|
22792
22792
|
return rs.readable && rs.path && rs.mode;
|
|
@@ -22823,7 +22823,7 @@ var require_helpers = __commonJS({
|
|
|
22823
22823
|
// ../../node_modules/aws-sign2/index.js
|
|
22824
22824
|
var require_aws_sign2 = __commonJS({
|
|
22825
22825
|
"../../node_modules/aws-sign2/index.js"(exports, module2) {
|
|
22826
|
-
var
|
|
22826
|
+
var crypto2 = require("crypto");
|
|
22827
22827
|
var parse = require("url").parse;
|
|
22828
22828
|
var keys = [
|
|
22829
22829
|
"acl",
|
|
@@ -22847,7 +22847,7 @@ var require_aws_sign2 = __commonJS({
|
|
|
22847
22847
|
module2.exports = authorization;
|
|
22848
22848
|
module2.exports.authorization = authorization;
|
|
22849
22849
|
function hmacSha1(options) {
|
|
22850
|
-
return
|
|
22850
|
+
return crypto2.createHmac("sha1", options.secret).update(options.message).digest("base64");
|
|
22851
22851
|
}
|
|
22852
22852
|
module2.exports.hmacSha1 = hmacSha1;
|
|
22853
22853
|
function sign(options) {
|
|
@@ -23001,14 +23001,14 @@ var require_aws4 = __commonJS({
|
|
|
23001
23001
|
var aws4 = exports;
|
|
23002
23002
|
var url = require("url");
|
|
23003
23003
|
var querystring = require("querystring");
|
|
23004
|
-
var
|
|
23004
|
+
var crypto2 = require("crypto");
|
|
23005
23005
|
var lru = require_lru();
|
|
23006
23006
|
var credentialsCache = lru(1e3);
|
|
23007
23007
|
function hmac(key, string, encoding) {
|
|
23008
|
-
return
|
|
23008
|
+
return crypto2.createHmac("sha256", key).update(string, "utf8").digest(encoding);
|
|
23009
23009
|
}
|
|
23010
23010
|
function hash(string, encoding) {
|
|
23011
|
-
return
|
|
23011
|
+
return crypto2.createHash("sha256").update(string, "utf8").digest(encoding);
|
|
23012
23012
|
}
|
|
23013
23013
|
function encodeRfc3986(urlEncodedString) {
|
|
23014
23014
|
return urlEncodedString.replace(/[!'()*]/g, function(c) {
|
|
@@ -28319,23 +28319,23 @@ var require_nacl_fast = __commonJS({
|
|
|
28319
28319
|
randombytes = fn;
|
|
28320
28320
|
};
|
|
28321
28321
|
(function() {
|
|
28322
|
-
var
|
|
28323
|
-
if (
|
|
28322
|
+
var crypto2 = typeof self !== "undefined" ? self.crypto || self.msCrypto : null;
|
|
28323
|
+
if (crypto2 && crypto2.getRandomValues) {
|
|
28324
28324
|
var QUOTA = 65536;
|
|
28325
28325
|
nacl.setPRNG(function(x, n) {
|
|
28326
28326
|
var i, v = new Uint8Array(n);
|
|
28327
28327
|
for (i = 0; i < n; i += QUOTA) {
|
|
28328
|
-
|
|
28328
|
+
crypto2.getRandomValues(v.subarray(i, i + Math.min(n - i, QUOTA)));
|
|
28329
28329
|
}
|
|
28330
28330
|
for (i = 0; i < n; i++)
|
|
28331
28331
|
x[i] = v[i];
|
|
28332
28332
|
cleanup(v);
|
|
28333
28333
|
});
|
|
28334
28334
|
} else if (typeof require !== "undefined") {
|
|
28335
|
-
|
|
28336
|
-
if (
|
|
28335
|
+
crypto2 = require("crypto");
|
|
28336
|
+
if (crypto2 && crypto2.randomBytes) {
|
|
28337
28337
|
nacl.setPRNG(function(x, n) {
|
|
28338
|
-
var i, v =
|
|
28338
|
+
var i, v = crypto2.randomBytes(n);
|
|
28339
28339
|
for (i = 0; i < n; i++)
|
|
28340
28340
|
x[i] = v[i];
|
|
28341
28341
|
cleanup(v);
|
|
@@ -28374,7 +28374,7 @@ var require_utils = __commonJS({
|
|
|
28374
28374
|
var Buffer2 = require_safer().Buffer;
|
|
28375
28375
|
var PrivateKey = require_private_key();
|
|
28376
28376
|
var Key = require_key();
|
|
28377
|
-
var
|
|
28377
|
+
var crypto2 = require("crypto");
|
|
28378
28378
|
var algs = require_algs();
|
|
28379
28379
|
var asn1 = require_lib();
|
|
28380
28380
|
var ec = require_ec();
|
|
@@ -28458,7 +28458,7 @@ var require_utils = __commonJS({
|
|
|
28458
28458
|
bufs.push(salt);
|
|
28459
28459
|
D = Buffer2.concat(bufs);
|
|
28460
28460
|
for (var j = 0; j < count; ++j)
|
|
28461
|
-
D =
|
|
28461
|
+
D = crypto2.createHash("md5").update(D).digest();
|
|
28462
28462
|
material = Buffer2.concat([material, D]);
|
|
28463
28463
|
D_prev = D;
|
|
28464
28464
|
}
|
|
@@ -28480,13 +28480,13 @@ var require_utils = __commonJS({
|
|
|
28480
28480
|
return Buffer2.concat(ts).slice(0, size);
|
|
28481
28481
|
function T(I) {
|
|
28482
28482
|
hkey.writeUInt32BE(I, hkey.length - 4);
|
|
28483
|
-
var hmac =
|
|
28483
|
+
var hmac = crypto2.createHmac(hashAlg, passphrase);
|
|
28484
28484
|
hmac.update(hkey);
|
|
28485
28485
|
var Ti = hmac.digest();
|
|
28486
28486
|
var Uc = Ti;
|
|
28487
28487
|
var c = 1;
|
|
28488
28488
|
while (c++ < iterations) {
|
|
28489
|
-
hmac =
|
|
28489
|
+
hmac = crypto2.createHmac(hashAlg, passphrase);
|
|
28490
28490
|
hmac.update(Uc);
|
|
28491
28491
|
Uc = hmac.digest();
|
|
28492
28492
|
for (var x = 0; x < Ti.length; ++x)
|
|
@@ -28855,7 +28855,7 @@ var require_signature = __commonJS({
|
|
|
28855
28855
|
var assert3 = require_assert();
|
|
28856
28856
|
var Buffer2 = require_safer().Buffer;
|
|
28857
28857
|
var algs = require_algs();
|
|
28858
|
-
var
|
|
28858
|
+
var crypto2 = require("crypto");
|
|
28859
28859
|
var errs = require_errors();
|
|
28860
28860
|
var utils = require_utils();
|
|
28861
28861
|
var asn1 = require_lib();
|
|
@@ -29233,7 +29233,7 @@ var require_sec = __commonJS({
|
|
|
29233
29233
|
// ../../node_modules/ecc-jsbn/index.js
|
|
29234
29234
|
var require_ecc_jsbn = __commonJS({
|
|
29235
29235
|
"../../node_modules/ecc-jsbn/index.js"(exports) {
|
|
29236
|
-
var
|
|
29236
|
+
var crypto2 = require("crypto");
|
|
29237
29237
|
var BigInteger = require_jsbn().BigInteger;
|
|
29238
29238
|
var ECPointFp = require_ec().ECPointFp;
|
|
29239
29239
|
var Buffer2 = require_safer().Buffer;
|
|
@@ -29257,7 +29257,7 @@ var require_ecc_jsbn = __commonJS({
|
|
|
29257
29257
|
}
|
|
29258
29258
|
} else {
|
|
29259
29259
|
var n1 = n.subtract(BigInteger.ONE);
|
|
29260
|
-
var r = new BigInteger(
|
|
29260
|
+
var r = new BigInteger(crypto2.randomBytes(n.bitLength()));
|
|
29261
29261
|
priv = r.mod(n1).add(BigInteger.ONE);
|
|
29262
29262
|
this.P = c.getG().multiply(priv);
|
|
29263
29263
|
}
|
|
@@ -29286,14 +29286,14 @@ var require_dhe = __commonJS({
|
|
|
29286
29286
|
generateED25519
|
|
29287
29287
|
};
|
|
29288
29288
|
var assert3 = require_assert();
|
|
29289
|
-
var
|
|
29289
|
+
var crypto2 = require("crypto");
|
|
29290
29290
|
var Buffer2 = require_safer().Buffer;
|
|
29291
29291
|
var algs = require_algs();
|
|
29292
29292
|
var utils = require_utils();
|
|
29293
29293
|
var nacl = require_nacl_fast();
|
|
29294
29294
|
var Key = require_key();
|
|
29295
29295
|
var PrivateKey = require_private_key();
|
|
29296
|
-
var CRYPTO_HAVE_ECDH =
|
|
29296
|
+
var CRYPTO_HAVE_ECDH = crypto2.createECDH !== void 0;
|
|
29297
29297
|
var ecdh = require_ecc_jsbn();
|
|
29298
29298
|
var ec = require_ec();
|
|
29299
29299
|
var jsbn = require_jsbn().BigInteger;
|
|
@@ -29307,7 +29307,7 @@ var require_dhe = __commonJS({
|
|
|
29307
29307
|
if (!CRYPTO_HAVE_ECDH) {
|
|
29308
29308
|
throw new Error("Due to bugs in the node 0.10 crypto API, node 0.12.x or later is required to use DH");
|
|
29309
29309
|
}
|
|
29310
|
-
this._dh =
|
|
29310
|
+
this._dh = crypto2.createDiffieHellman(
|
|
29311
29311
|
key.part.p.data,
|
|
29312
29312
|
void 0,
|
|
29313
29313
|
key.part.g.data,
|
|
@@ -29334,7 +29334,7 @@ var require_dhe = __commonJS({
|
|
|
29334
29334
|
"nistp384": "secp384r1",
|
|
29335
29335
|
"nistp521": "secp521r1"
|
|
29336
29336
|
}[key.curve];
|
|
29337
|
-
this._dh =
|
|
29337
|
+
this._dh = crypto2.createECDH(curve);
|
|
29338
29338
|
if (typeof this._dh !== "object" || typeof this._dh.setPrivateKey !== "function") {
|
|
29339
29339
|
CRYPTO_HAVE_ECDH = false;
|
|
29340
29340
|
DiffieHellman.call(this, key);
|
|
@@ -29486,7 +29486,7 @@ var require_dhe = __commonJS({
|
|
|
29486
29486
|
return this._key;
|
|
29487
29487
|
} else {
|
|
29488
29488
|
var n = this._ecParams.getN();
|
|
29489
|
-
var r = new jsbn(
|
|
29489
|
+
var r = new jsbn(crypto2.randomBytes(n.bitLength()));
|
|
29490
29490
|
var n1 = n.subtract(jsbn.ONE);
|
|
29491
29491
|
priv = r.mod(n1).add(jsbn.ONE);
|
|
29492
29492
|
pub = this._ecParams.getG().multiply(priv);
|
|
@@ -29592,7 +29592,7 @@ var require_dhe = __commonJS({
|
|
|
29592
29592
|
"nistp384": "secp384r1",
|
|
29593
29593
|
"nistp521": "secp521r1"
|
|
29594
29594
|
}[curve];
|
|
29595
|
-
var dh =
|
|
29595
|
+
var dh = crypto2.createECDH(osCurve);
|
|
29596
29596
|
dh.generateKeys();
|
|
29597
29597
|
parts.push({
|
|
29598
29598
|
name: "curve",
|
|
@@ -29610,7 +29610,7 @@ var require_dhe = __commonJS({
|
|
|
29610
29610
|
var ecParams = new X9ECParameters(curve);
|
|
29611
29611
|
var n = ecParams.getN();
|
|
29612
29612
|
var cByteLen = Math.ceil((n.bitLength() + 64) / 8);
|
|
29613
|
-
var c = new jsbn(
|
|
29613
|
+
var c = new jsbn(crypto2.randomBytes(cByteLen));
|
|
29614
29614
|
var n1 = n.subtract(jsbn.ONE);
|
|
29615
29615
|
var priv = c.mod(n1).add(jsbn.ONE);
|
|
29616
29616
|
var pub = ecParams.getG().multiply(priv);
|
|
@@ -31942,7 +31942,7 @@ var require_ssh_private = __commonJS({
|
|
|
31942
31942
|
var Buffer2 = require_safer().Buffer;
|
|
31943
31943
|
var algs = require_algs();
|
|
31944
31944
|
var utils = require_utils();
|
|
31945
|
-
var
|
|
31945
|
+
var crypto2 = require("crypto");
|
|
31946
31946
|
var Key = require_key();
|
|
31947
31947
|
var PrivateKey = require_private_key();
|
|
31948
31948
|
var pem = require_pem();
|
|
@@ -32016,7 +32016,7 @@ var require_ssh_private = __commonJS({
|
|
|
32016
32016
|
out = Buffer2.from(out);
|
|
32017
32017
|
var ckey = out.slice(0, cinf.keySize);
|
|
32018
32018
|
var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize);
|
|
32019
|
-
var cipherStream =
|
|
32019
|
+
var cipherStream = crypto2.createDecipheriv(
|
|
32020
32020
|
cinf.opensslName,
|
|
32021
32021
|
ckey,
|
|
32022
32022
|
iv
|
|
@@ -32081,7 +32081,7 @@ var require_ssh_private = __commonJS({
|
|
|
32081
32081
|
var privBuf;
|
|
32082
32082
|
if (PrivateKey.isPrivateKey(key)) {
|
|
32083
32083
|
privBuf = new SSHBuffer({});
|
|
32084
|
-
var checkInt =
|
|
32084
|
+
var checkInt = crypto2.randomBytes(4).readUInt32BE(0);
|
|
32085
32085
|
privBuf.writeInt(checkInt);
|
|
32086
32086
|
privBuf.writeInt(checkInt);
|
|
32087
32087
|
privBuf.write(key.toBuffer("rfc4253"));
|
|
@@ -32095,7 +32095,7 @@ var require_ssh_private = __commonJS({
|
|
|
32095
32095
|
case "none":
|
|
32096
32096
|
break;
|
|
32097
32097
|
case "bcrypt":
|
|
32098
|
-
var salt =
|
|
32098
|
+
var salt = crypto2.randomBytes(16);
|
|
32099
32099
|
var rounds = 16;
|
|
32100
32100
|
var kdfssh = new SSHBuffer({});
|
|
32101
32101
|
kdfssh.writeBuffer(salt);
|
|
@@ -32122,7 +32122,7 @@ var require_ssh_private = __commonJS({
|
|
|
32122
32122
|
out = Buffer2.from(out);
|
|
32123
32123
|
var ckey = out.slice(0, cinf.keySize);
|
|
32124
32124
|
var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize);
|
|
32125
|
-
var cipherStream =
|
|
32125
|
+
var cipherStream = crypto2.createCipheriv(
|
|
32126
32126
|
cinf.opensslName,
|
|
32127
32127
|
ckey,
|
|
32128
32128
|
iv
|
|
@@ -32184,7 +32184,7 @@ var require_pem = __commonJS({
|
|
|
32184
32184
|
};
|
|
32185
32185
|
var assert3 = require_assert();
|
|
32186
32186
|
var asn1 = require_lib();
|
|
32187
|
-
var
|
|
32187
|
+
var crypto2 = require("crypto");
|
|
32188
32188
|
var Buffer2 = require_safer().Buffer;
|
|
32189
32189
|
var algs = require_algs();
|
|
32190
32190
|
var utils = require_utils();
|
|
@@ -32352,7 +32352,7 @@ var require_pem = __commonJS({
|
|
|
32352
32352
|
alg = void 0;
|
|
32353
32353
|
}
|
|
32354
32354
|
if (cipher && key && iv) {
|
|
32355
|
-
var cipherStream =
|
|
32355
|
+
var cipherStream = crypto2.createDecipheriv(cipher, key, iv);
|
|
32356
32356
|
var chunk, chunks = [];
|
|
32357
32357
|
cipherStream.once("error", function(e) {
|
|
32358
32358
|
if (e.toString().indexOf("bad decrypt") !== -1) {
|
|
@@ -32777,7 +32777,7 @@ var require_putty = __commonJS({
|
|
|
32777
32777
|
var rfc4253 = require_rfc4253();
|
|
32778
32778
|
var Key = require_key();
|
|
32779
32779
|
var SSHBuffer = require_ssh_buffer();
|
|
32780
|
-
var
|
|
32780
|
+
var crypto2 = require("crypto");
|
|
32781
32781
|
var PrivateKey = require_private_key();
|
|
32782
32782
|
var errors = require_errors();
|
|
32783
32783
|
function read2(buf, options) {
|
|
@@ -32847,7 +32847,7 @@ var require_putty = __commonJS({
|
|
|
32847
32847
|
);
|
|
32848
32848
|
}
|
|
32849
32849
|
var iv = Buffer2.alloc(16, 0);
|
|
32850
|
-
var decipher =
|
|
32850
|
+
var decipher = crypto2.createDecipheriv(
|
|
32851
32851
|
"aes-256-cbc",
|
|
32852
32852
|
derivePPK2EncryptionKey(options.passphrase),
|
|
32853
32853
|
iv
|
|
@@ -32898,11 +32898,11 @@ var require_putty = __commonJS({
|
|
|
32898
32898
|
return key;
|
|
32899
32899
|
}
|
|
32900
32900
|
function derivePPK2EncryptionKey(passphrase) {
|
|
32901
|
-
var hash1 =
|
|
32901
|
+
var hash1 = crypto2.createHash("sha1").update(Buffer2.concat([
|
|
32902
32902
|
Buffer2.from([0, 0, 0, 0]),
|
|
32903
32903
|
Buffer2.from(passphrase)
|
|
32904
32904
|
])).digest();
|
|
32905
|
-
var hash2 =
|
|
32905
|
+
var hash2 = crypto2.createHash("sha1").update(Buffer2.concat([
|
|
32906
32906
|
Buffer2.from([0, 0, 0, 1]),
|
|
32907
32907
|
Buffer2.from(passphrase)
|
|
32908
32908
|
])).digest();
|
|
@@ -33056,7 +33056,7 @@ var require_private_key = __commonJS({
|
|
|
33056
33056
|
var assert3 = require_assert();
|
|
33057
33057
|
var Buffer2 = require_safer().Buffer;
|
|
33058
33058
|
var algs = require_algs();
|
|
33059
|
-
var
|
|
33059
|
+
var crypto2 = require("crypto");
|
|
33060
33060
|
var Fingerprint = require_fingerprint();
|
|
33061
33061
|
var Signature = require_signature();
|
|
33062
33062
|
var errs = require_errors();
|
|
@@ -33167,14 +33167,14 @@ var require_private_key = __commonJS({
|
|
|
33167
33167
|
var v, nm, err;
|
|
33168
33168
|
try {
|
|
33169
33169
|
nm = hashAlgo.toUpperCase();
|
|
33170
|
-
v =
|
|
33170
|
+
v = crypto2.createSign(nm);
|
|
33171
33171
|
} catch (e) {
|
|
33172
33172
|
err = e;
|
|
33173
33173
|
}
|
|
33174
33174
|
if (v === void 0 || err instanceof Error && err.message.match(/Unknown message digest/)) {
|
|
33175
33175
|
nm = "RSA-";
|
|
33176
33176
|
nm += hashAlgo.toUpperCase();
|
|
33177
|
-
v =
|
|
33177
|
+
v = crypto2.createSign(nm);
|
|
33178
33178
|
}
|
|
33179
33179
|
assert3.ok(v, "failed to create verifier");
|
|
33180
33180
|
var oldSign = v.sign.bind(v);
|
|
@@ -33259,7 +33259,7 @@ var require_identity = __commonJS({
|
|
|
33259
33259
|
module2.exports = Identity;
|
|
33260
33260
|
var assert3 = require_assert();
|
|
33261
33261
|
var algs = require_algs();
|
|
33262
|
-
var
|
|
33262
|
+
var crypto2 = require("crypto");
|
|
33263
33263
|
var Fingerprint = require_fingerprint();
|
|
33264
33264
|
var Signature = require_signature();
|
|
33265
33265
|
var errs = require_errors();
|
|
@@ -33576,7 +33576,7 @@ var require_openssh_cert = __commonJS({
|
|
|
33576
33576
|
};
|
|
33577
33577
|
var assert3 = require_assert();
|
|
33578
33578
|
var SSHBuffer = require_ssh_buffer();
|
|
33579
|
-
var
|
|
33579
|
+
var crypto2 = require("crypto");
|
|
33580
33580
|
var Buffer2 = require_safer().Buffer;
|
|
33581
33581
|
var algs = require_algs();
|
|
33582
33582
|
var Key = require_key();
|
|
@@ -33765,7 +33765,7 @@ var require_openssh_cert = __commonJS({
|
|
|
33765
33765
|
assert3.object(cert.signatures.openssh, "signature for openssh format");
|
|
33766
33766
|
var sig = cert.signatures.openssh;
|
|
33767
33767
|
if (sig.nonce === void 0)
|
|
33768
|
-
sig.nonce =
|
|
33768
|
+
sig.nonce = crypto2.randomBytes(16);
|
|
33769
33769
|
var buf = new SSHBuffer({});
|
|
33770
33770
|
buf.writeString(getCertType(cert.subjectKey));
|
|
33771
33771
|
buf.writeBuffer(sig.nonce);
|
|
@@ -34568,7 +34568,7 @@ var require_certificate = __commonJS({
|
|
|
34568
34568
|
var assert3 = require_assert();
|
|
34569
34569
|
var Buffer2 = require_safer().Buffer;
|
|
34570
34570
|
var algs = require_algs();
|
|
34571
|
-
var
|
|
34571
|
+
var crypto2 = require("crypto");
|
|
34572
34572
|
var Fingerprint = require_fingerprint();
|
|
34573
34573
|
var Signature = require_signature();
|
|
34574
34574
|
var errs = require_errors();
|
|
@@ -34655,7 +34655,7 @@ var require_certificate = __commonJS({
|
|
|
34655
34655
|
throw new InvalidAlgorithmError(algo);
|
|
34656
34656
|
if (this._hashCache[algo])
|
|
34657
34657
|
return this._hashCache[algo];
|
|
34658
|
-
var hash =
|
|
34658
|
+
var hash = crypto2.createHash(algo).update(this.toBuffer("x509")).digest();
|
|
34659
34659
|
this._hashCache[algo] = hash;
|
|
34660
34660
|
return hash;
|
|
34661
34661
|
};
|
|
@@ -34925,7 +34925,7 @@ var require_fingerprint = __commonJS({
|
|
|
34925
34925
|
var assert3 = require_assert();
|
|
34926
34926
|
var Buffer2 = require_safer().Buffer;
|
|
34927
34927
|
var algs = require_algs();
|
|
34928
|
-
var
|
|
34928
|
+
var crypto2 = require("crypto");
|
|
34929
34929
|
var errs = require_errors();
|
|
34930
34930
|
var Key = require_key();
|
|
34931
34931
|
var PrivateKey = require_private_key();
|
|
@@ -34992,9 +34992,9 @@ var require_fingerprint = __commonJS({
|
|
|
34992
34992
|
);
|
|
34993
34993
|
}
|
|
34994
34994
|
var theirHash = other.hash(this.algorithm, this.hashType);
|
|
34995
|
-
var theirHash2 =
|
|
34995
|
+
var theirHash2 = crypto2.createHash(this.algorithm).update(theirHash).digest("base64");
|
|
34996
34996
|
if (this.hash2 === void 0)
|
|
34997
|
-
this.hash2 =
|
|
34997
|
+
this.hash2 = crypto2.createHash(this.algorithm).update(this.hash).digest("base64");
|
|
34998
34998
|
return this.hash2 === theirHash2;
|
|
34999
34999
|
};
|
|
35000
35000
|
var base64RE = /^[A-Za-z0-9+\/=]+$/;
|
|
@@ -35119,7 +35119,7 @@ var require_key = __commonJS({
|
|
|
35119
35119
|
module2.exports = Key;
|
|
35120
35120
|
var assert3 = require_assert();
|
|
35121
35121
|
var algs = require_algs();
|
|
35122
|
-
var
|
|
35122
|
+
var crypto2 = require("crypto");
|
|
35123
35123
|
var Fingerprint = require_fingerprint();
|
|
35124
35124
|
var Signature = require_signature();
|
|
35125
35125
|
var DiffieHellman = require_dhe().DiffieHellman;
|
|
@@ -35217,7 +35217,7 @@ var require_key = __commonJS({
|
|
|
35217
35217
|
} else {
|
|
35218
35218
|
throw new Error("Hash type " + type + " not supported");
|
|
35219
35219
|
}
|
|
35220
|
-
var hash =
|
|
35220
|
+
var hash = crypto2.createHash(algo).update(buf).digest();
|
|
35221
35221
|
this._hashCache[cacheKey] = hash;
|
|
35222
35222
|
return hash;
|
|
35223
35223
|
};
|
|
@@ -35265,14 +35265,14 @@ var require_key = __commonJS({
|
|
|
35265
35265
|
var v, nm, err;
|
|
35266
35266
|
try {
|
|
35267
35267
|
nm = hashAlgo.toUpperCase();
|
|
35268
|
-
v =
|
|
35268
|
+
v = crypto2.createVerify(nm);
|
|
35269
35269
|
} catch (e) {
|
|
35270
35270
|
err = e;
|
|
35271
35271
|
}
|
|
35272
35272
|
if (v === void 0 || err instanceof Error && err.message.match(/Unknown message digest/)) {
|
|
35273
35273
|
nm = "RSA-";
|
|
35274
35274
|
nm += hashAlgo.toUpperCase();
|
|
35275
|
-
v =
|
|
35275
|
+
v = crypto2.createVerify(nm);
|
|
35276
35276
|
}
|
|
35277
35277
|
assert3.ok(v, "failed to create verifier");
|
|
35278
35278
|
var oldVerify = v.verify.bind(v);
|
|
@@ -37067,7 +37067,7 @@ var require_jsprim = __commonJS({
|
|
|
37067
37067
|
var require_signer = __commonJS({
|
|
37068
37068
|
"../../node_modules/http-signature/lib/signer.js"(exports, module2) {
|
|
37069
37069
|
var assert3 = require_assert();
|
|
37070
|
-
var
|
|
37070
|
+
var crypto2 = require("crypto");
|
|
37071
37071
|
var http2 = require("http");
|
|
37072
37072
|
var util = require("util");
|
|
37073
37073
|
var sshpk = require_lib2();
|
|
@@ -37104,7 +37104,7 @@ var require_signer = __commonJS({
|
|
|
37104
37104
|
this.rs_keyId = options.keyId;
|
|
37105
37105
|
if (typeof options.key !== "string" && !Buffer.isBuffer(options.key))
|
|
37106
37106
|
throw new TypeError("options.key for HMAC must be a string or Buffer");
|
|
37107
|
-
this.rs_signer =
|
|
37107
|
+
this.rs_signer = crypto2.createHmac(alg[1].toUpperCase(), options.key);
|
|
37108
37108
|
this.rs_signer.sign = function() {
|
|
37109
37109
|
var digest = this.digest("base64");
|
|
37110
37110
|
return {
|
|
@@ -37322,7 +37322,7 @@ var require_signer = __commonJS({
|
|
|
37322
37322
|
if (alg[0] === "hmac") {
|
|
37323
37323
|
if (typeof options.key !== "string" && !Buffer.isBuffer(options.key))
|
|
37324
37324
|
throw new TypeError("options.key must be a string or Buffer");
|
|
37325
|
-
var hmac =
|
|
37325
|
+
var hmac = crypto2.createHmac(alg[1].toUpperCase(), options.key);
|
|
37326
37326
|
hmac.update(stringToSign);
|
|
37327
37327
|
signature = hmac.digest("base64");
|
|
37328
37328
|
} else {
|
|
@@ -37367,7 +37367,7 @@ var require_signer = __commonJS({
|
|
|
37367
37367
|
var require_verify = __commonJS({
|
|
37368
37368
|
"../../node_modules/http-signature/lib/verify.js"(exports, module2) {
|
|
37369
37369
|
var assert3 = require_assert();
|
|
37370
|
-
var
|
|
37370
|
+
var crypto2 = require("crypto");
|
|
37371
37371
|
var sshpk = require_lib2();
|
|
37372
37372
|
var utils = require_utils2();
|
|
37373
37373
|
var HASH_ALGOS = utils.HASH_ALGOS;
|
|
@@ -37415,12 +37415,12 @@ var require_verify = __commonJS({
|
|
|
37415
37415
|
if (alg[0] !== "hmac")
|
|
37416
37416
|
return false;
|
|
37417
37417
|
var hashAlg = alg[1].toUpperCase();
|
|
37418
|
-
var hmac =
|
|
37418
|
+
var hmac = crypto2.createHmac(hashAlg, secret);
|
|
37419
37419
|
hmac.update(parsedSignature.signingString);
|
|
37420
|
-
var h1 =
|
|
37420
|
+
var h1 = crypto2.createHmac(hashAlg, secret);
|
|
37421
37421
|
h1.update(hmac.digest());
|
|
37422
37422
|
h1 = h1.digest();
|
|
37423
|
-
var h2 =
|
|
37423
|
+
var h2 = crypto2.createHmac(hashAlg, secret);
|
|
37424
37424
|
h2.update(new Buffer(parsedSignature.params.signature, "base64"));
|
|
37425
37425
|
h2 = h2.digest();
|
|
37426
37426
|
if (typeof h1 === "string")
|
|
@@ -55215,9 +55215,9 @@ var require_har2 = __commonJS({
|
|
|
55215
55215
|
// ../../node_modules/uuid/lib/rng.js
|
|
55216
55216
|
var require_rng = __commonJS({
|
|
55217
55217
|
"../../node_modules/uuid/lib/rng.js"(exports, module2) {
|
|
55218
|
-
var
|
|
55218
|
+
var crypto2 = require("crypto");
|
|
55219
55219
|
module2.exports = function nodeRNG() {
|
|
55220
|
-
return
|
|
55220
|
+
return crypto2.randomBytes(16);
|
|
55221
55221
|
};
|
|
55222
55222
|
}
|
|
55223
55223
|
});
|
|
@@ -55423,12 +55423,12 @@ var require_auth = __commonJS({
|
|
|
55423
55423
|
// ../../node_modules/oauth-sign/index.js
|
|
55424
55424
|
var require_oauth_sign = __commonJS({
|
|
55425
55425
|
"../../node_modules/oauth-sign/index.js"(exports) {
|
|
55426
|
-
var
|
|
55426
|
+
var crypto2 = require("crypto");
|
|
55427
55427
|
function sha(key, body, algorithm) {
|
|
55428
|
-
return
|
|
55428
|
+
return crypto2.createHmac(algorithm, key).update(body).digest("base64");
|
|
55429
55429
|
}
|
|
55430
55430
|
function rsa(key, body) {
|
|
55431
|
-
return
|
|
55431
|
+
return crypto2.createSign("RSA-SHA1").update(body).sign(key, "base64");
|
|
55432
55432
|
}
|
|
55433
55433
|
function rfc3986(str) {
|
|
55434
55434
|
return encodeURIComponent(str).replace(/!/g, "%21").replace(/\*/g, "%2A").replace(/\(/g, "%28").replace(/\)/g, "%29").replace(/'/g, "%27");
|
|
@@ -55535,7 +55535,7 @@ var require_oauth = __commonJS({
|
|
|
55535
55535
|
var caseless = require_caseless();
|
|
55536
55536
|
var uuid = require_v4();
|
|
55537
55537
|
var oauth = require_oauth_sign();
|
|
55538
|
-
var
|
|
55538
|
+
var crypto2 = require("crypto");
|
|
55539
55539
|
var Buffer2 = require_safe_buffer().Buffer;
|
|
55540
55540
|
function OAuth(request) {
|
|
55541
55541
|
this.request = request;
|
|
@@ -55587,7 +55587,7 @@ var require_oauth = __commonJS({
|
|
|
55587
55587
|
if (["HMAC-SHA1", "RSA-SHA1"].indexOf(_oauth.signature_method || "HMAC-SHA1") < 0) {
|
|
55588
55588
|
this.request.emit("error", new Error("oauth: " + _oauth.signature_method + " signature_method not supported with body_hash signing."));
|
|
55589
55589
|
}
|
|
55590
|
-
var shasum =
|
|
55590
|
+
var shasum = crypto2.createHash("sha1");
|
|
55591
55591
|
shasum.update(body || "");
|
|
55592
55592
|
var sha1 = shasum.digest("hex");
|
|
55593
55593
|
return Buffer2.from(sha1, "hex").toString("base64");
|
|
@@ -55656,15 +55656,15 @@ var require_oauth = __commonJS({
|
|
|
55656
55656
|
var require_hawk = __commonJS({
|
|
55657
55657
|
"../../node_modules/request/lib/hawk.js"(exports) {
|
|
55658
55658
|
"use strict";
|
|
55659
|
-
var
|
|
55659
|
+
var crypto2 = require("crypto");
|
|
55660
55660
|
function randomString(size) {
|
|
55661
55661
|
var bits = (size + 1) * 6;
|
|
55662
|
-
var buffer =
|
|
55662
|
+
var buffer = crypto2.randomBytes(Math.ceil(bits / 8));
|
|
55663
55663
|
var string = buffer.toString("base64").replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g, "");
|
|
55664
55664
|
return string.slice(0, size);
|
|
55665
55665
|
}
|
|
55666
55666
|
function calculatePayloadHash(payload, algorithm, contentType) {
|
|
55667
|
-
var hash =
|
|
55667
|
+
var hash = crypto2.createHash(algorithm);
|
|
55668
55668
|
hash.update("hawk.1.payload\n");
|
|
55669
55669
|
hash.update((contentType ? contentType.split(";")[0].trim().toLowerCase() : "") + "\n");
|
|
55670
55670
|
hash.update(payload || "");
|
|
@@ -55680,7 +55680,7 @@ var require_hawk = __commonJS({
|
|
|
55680
55680
|
if (opts.app) {
|
|
55681
55681
|
normalized = normalized + opts.app + "\n" + (opts.dlg || "") + "\n";
|
|
55682
55682
|
}
|
|
55683
|
-
var hmac =
|
|
55683
|
+
var hmac = crypto2.createHmac(credentials.algorithm, credentials.key).update(normalized);
|
|
55684
55684
|
var digest = hmac.digest("base64");
|
|
55685
55685
|
return digest;
|
|
55686
55686
|
};
|
|
@@ -63885,7 +63885,7 @@ function getVersion() {
|
|
|
63885
63885
|
);
|
|
63886
63886
|
globalThis._loadersgl_.version = NPM_TAG;
|
|
63887
63887
|
} else {
|
|
63888
|
-
globalThis._loadersgl_.version = "4.0.0-beta.
|
|
63888
|
+
globalThis._loadersgl_.version = "4.0.0-beta.8";
|
|
63889
63889
|
}
|
|
63890
63890
|
}
|
|
63891
63891
|
return globalThis._loadersgl_.version;
|
|
@@ -64259,6 +64259,30 @@ async function parseData({
|
|
|
64259
64259
|
return await parser(data, { ...options }, context, loader);
|
|
64260
64260
|
}
|
|
64261
64261
|
|
|
64262
|
+
// ../loader-utils/src/lib/binary-utils/array-buffer-utils.ts
|
|
64263
|
+
function concatenateArrayBuffers(...sources) {
|
|
64264
|
+
const sourceArrays = sources.map(
|
|
64265
|
+
(source2) => source2 instanceof ArrayBuffer ? new Uint8Array(source2) : source2
|
|
64266
|
+
);
|
|
64267
|
+
const byteLength = sourceArrays.reduce((length, typedArray) => length + typedArray.byteLength, 0);
|
|
64268
|
+
const result = new Uint8Array(byteLength);
|
|
64269
|
+
let offset = 0;
|
|
64270
|
+
for (const sourceArray of sourceArrays) {
|
|
64271
|
+
result.set(sourceArray, offset);
|
|
64272
|
+
offset += sourceArray.byteLength;
|
|
64273
|
+
}
|
|
64274
|
+
return result.buffer;
|
|
64275
|
+
}
|
|
64276
|
+
|
|
64277
|
+
// ../loader-utils/src/lib/iterators/async-iteration.ts
|
|
64278
|
+
async function concatenateArrayBuffersAsync(asyncIterator) {
|
|
64279
|
+
const arrayBuffers = [];
|
|
64280
|
+
for await (const chunk of asyncIterator) {
|
|
64281
|
+
arrayBuffers.push(chunk);
|
|
64282
|
+
}
|
|
64283
|
+
return concatenateArrayBuffers(...arrayBuffers);
|
|
64284
|
+
}
|
|
64285
|
+
|
|
64262
64286
|
// ../loader-utils/src/lib/path-utils/file-aliases.ts
|
|
64263
64287
|
var pathPrefix = "";
|
|
64264
64288
|
var fileAliases = {};
|
|
@@ -64390,12 +64414,12 @@ async function concatenateReadStream(readStream) {
|
|
|
64390
64414
|
arrayBufferChunks.push(toArrayBuffer(chunk));
|
|
64391
64415
|
});
|
|
64392
64416
|
readStream.on("end", () => {
|
|
64393
|
-
const arrayBuffer =
|
|
64417
|
+
const arrayBuffer = concatenateArrayBuffers2(arrayBufferChunks);
|
|
64394
64418
|
resolve(arrayBuffer);
|
|
64395
64419
|
});
|
|
64396
64420
|
});
|
|
64397
64421
|
}
|
|
64398
|
-
function
|
|
64422
|
+
function concatenateArrayBuffers2(sources) {
|
|
64399
64423
|
const sourceArrays = sources.map(
|
|
64400
64424
|
(source2) => source2 instanceof ArrayBuffer ? new Uint8Array(source2) : source2
|
|
64401
64425
|
);
|
|
@@ -64523,6 +64547,77 @@ var NodeFileSystem = class {
|
|
|
64523
64547
|
}
|
|
64524
64548
|
};
|
|
64525
64549
|
|
|
64550
|
+
// ../crypto/src/lib/hash.ts
|
|
64551
|
+
var Hash = class {
|
|
64552
|
+
constructor(options = {}) {
|
|
64553
|
+
this.hashBatches = this.hashBatches.bind(this);
|
|
64554
|
+
}
|
|
64555
|
+
async preload() {
|
|
64556
|
+
return;
|
|
64557
|
+
}
|
|
64558
|
+
async *hashBatches(asyncIterator, encoding = "base64") {
|
|
64559
|
+
var _a, _b;
|
|
64560
|
+
const arrayBuffers = [];
|
|
64561
|
+
for await (const arrayBuffer of asyncIterator) {
|
|
64562
|
+
arrayBuffers.push(arrayBuffer);
|
|
64563
|
+
yield arrayBuffer;
|
|
64564
|
+
}
|
|
64565
|
+
const output = await this.concatenate(arrayBuffers);
|
|
64566
|
+
const hash = await this.hash(output, encoding);
|
|
64567
|
+
(_b = (_a = this.options.crypto) == null ? void 0 : _a.onEnd) == null ? void 0 : _b.call(_a, { hash });
|
|
64568
|
+
}
|
|
64569
|
+
// HELPERS
|
|
64570
|
+
async concatenate(asyncIterator) {
|
|
64571
|
+
return await concatenateArrayBuffersAsync(asyncIterator);
|
|
64572
|
+
}
|
|
64573
|
+
};
|
|
64574
|
+
|
|
64575
|
+
// ../polyfills/src/crypto/node-hash.ts
|
|
64576
|
+
var crypto = __toESM(require("crypto"), 1);
|
|
64577
|
+
var NodeHash = class extends Hash {
|
|
64578
|
+
constructor(options) {
|
|
64579
|
+
var _a, _b;
|
|
64580
|
+
super();
|
|
64581
|
+
this.name = "crypto-node";
|
|
64582
|
+
this.options = options;
|
|
64583
|
+
if (!((_b = (_a = this.options) == null ? void 0 : _a.crypto) == null ? void 0 : _b.algorithm)) {
|
|
64584
|
+
throw new Error(this.name);
|
|
64585
|
+
}
|
|
64586
|
+
}
|
|
64587
|
+
/**
|
|
64588
|
+
* Atomic hash calculation
|
|
64589
|
+
* @returns base64 encoded hash
|
|
64590
|
+
*/
|
|
64591
|
+
async hash(input, encoding) {
|
|
64592
|
+
var _a, _b, _c, _d;
|
|
64593
|
+
const algorithm = (_c = (_b = (_a = this.options) == null ? void 0 : _a.crypto) == null ? void 0 : _b.algorithm) == null ? void 0 : _c.toLowerCase();
|
|
64594
|
+
try {
|
|
64595
|
+
if (!crypto.createHash) {
|
|
64596
|
+
throw new Error("crypto.createHash not available");
|
|
64597
|
+
}
|
|
64598
|
+
const hash = (_d = crypto.createHash) == null ? void 0 : _d(algorithm);
|
|
64599
|
+
const inputArray = new Uint8Array(input);
|
|
64600
|
+
return hash.update(inputArray).digest("base64");
|
|
64601
|
+
} catch (error) {
|
|
64602
|
+
throw Error(`${algorithm} hash not available. ${error}`);
|
|
64603
|
+
}
|
|
64604
|
+
}
|
|
64605
|
+
async *hashBatches(asyncIterator, encoding = "base64") {
|
|
64606
|
+
var _a, _b, _c, _d, _e, _f, _g;
|
|
64607
|
+
if (!crypto.createHash) {
|
|
64608
|
+
throw new Error("crypto.createHash not available");
|
|
64609
|
+
}
|
|
64610
|
+
const hash = (_d = crypto.createHash) == null ? void 0 : _d((_c = (_b = (_a = this.options) == null ? void 0 : _a.crypto) == null ? void 0 : _b.algorithm) == null ? void 0 : _c.toLowerCase());
|
|
64611
|
+
for await (const chunk of asyncIterator) {
|
|
64612
|
+
const inputArray = new Uint8Array(chunk);
|
|
64613
|
+
hash.update(inputArray);
|
|
64614
|
+
yield chunk;
|
|
64615
|
+
}
|
|
64616
|
+
const digest = hash.digest(encoding);
|
|
64617
|
+
(_g = (_f = (_e = this.options) == null ? void 0 : _e.crypto) == null ? void 0 : _f.onEnd) == null ? void 0 : _g.call(_f, { hash: digest });
|
|
64618
|
+
}
|
|
64619
|
+
};
|
|
64620
|
+
|
|
64526
64621
|
// ../polyfills/src/index.ts
|
|
64527
64622
|
var import_node_process = require("node:process");
|
|
64528
64623
|
|
|
@@ -65254,6 +65349,7 @@ globalThis.loaders.makeNodeStream = makeNodeStream;
|
|
|
65254
65349
|
globalThis.loaders.NodeFile = NodeFile;
|
|
65255
65350
|
globalThis.loaders.NodeFileSystem = NodeFileSystem;
|
|
65256
65351
|
globalThis.loaders.fetchNode = fetchNode;
|
|
65352
|
+
globalThis.loaders.NodeHash = NodeHash;
|
|
65257
65353
|
if (!globalThis.TextEncoder) {
|
|
65258
65354
|
globalThis.TextEncoder = TextEncoder2;
|
|
65259
65355
|
}
|
|
@@ -65288,7 +65384,7 @@ if (nodeVersion2 < 18) {
|
|
|
65288
65384
|
}
|
|
65289
65385
|
|
|
65290
65386
|
// src/lib/utils/version.ts
|
|
65291
|
-
var VERSION2 = true ? "4.0.0-beta.
|
|
65387
|
+
var VERSION2 = true ? "4.0.0-beta.8" : "beta";
|
|
65292
65388
|
|
|
65293
65389
|
// src/lib/parsers/basis-module-loader.ts
|
|
65294
65390
|
var BASIS_EXTERNAL_LIBRARIES = {
|