@powerhousedao/connect 1.0.22-dev.0 → 1.0.22-dev.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/assets/{app-DOR_8r1B.js → app-CMvmK1ZV.js} +307 -329
- package/dist/assets/{app-DOR_8r1B.js.map → app-CMvmK1ZV.js.map} +1 -1
- package/dist/assets/{app-loader-uXeiy6sl.js → app-loader-yUQ3CH1e.js} +44 -36
- package/dist/assets/app-loader-yUQ3CH1e.js.map +1 -0
- package/dist/assets/{browser-B5bfipse.js → browser-DwVW0p-5.js} +4 -4
- package/dist/assets/{browser-B5bfipse.js.map → browser-DwVW0p-5.js.map} +1 -1
- package/dist/assets/{ccip-Cu6cyUtU.js → ccip-D3ep6jzQ.js} +4 -4
- package/dist/assets/{ccip-Cu6cyUtU.js.map → ccip-D3ep6jzQ.js.map} +1 -1
- package/dist/assets/{content-Cxj0K1dm.js → content-DcB11C-t.js} +5 -5
- package/dist/assets/{content-Cxj0K1dm.js.map → content-DcB11C-t.js.map} +1 -1
- package/dist/assets/{index-BBO5Ckrr.js → index-B1leI6f5.js} +14 -168
- package/dist/assets/index-B1leI6f5.js.map +1 -0
- package/dist/assets/{index-CT91u5m_.js → index-BlVppmJk.js} +4 -4
- package/dist/assets/{index-CT91u5m_.js.map → index-BlVppmJk.js.map} +1 -1
- package/dist/assets/{index-B7pq58I6.js → index-CFSbUvM7.js} +4 -4
- package/dist/assets/{index-B7pq58I6.js.map → index-CFSbUvM7.js.map} +1 -1
- package/dist/assets/{index-Ct3xGcDm.js → index-DrLZKy3E.js} +4 -4
- package/dist/assets/{index-Ct3xGcDm.js.map → index-DrLZKy3E.js.map} +1 -1
- package/dist/assets/{main.CMSwP7lX.js → main.ejU8LHpz.js} +2 -2
- package/dist/assets/{main.CMSwP7lX.js.map → main.ejU8LHpz.js.map} +1 -1
- package/dist/assets/{reactor-analytics-CrWekgnx.js → reactor-analytics-uLER5fzr.js} +16 -12
- package/dist/assets/reactor-analytics-uLER5fzr.js.map +1 -0
- package/dist/assets/{router-BDGkWvYS.js → router-BzfSlrCZ.js} +7 -7
- package/dist/assets/{router-BDGkWvYS.js.map → router-BzfSlrCZ.js.map} +1 -1
- package/dist/index.html +1 -1
- package/dist/vite-envs.sh +1 -1
- package/package.json +9 -9
- package/dist/assets/app-loader-uXeiy6sl.js.map +0 -1
- package/dist/assets/index-BBO5Ckrr.js.map +0 -1
- package/dist/assets/reactor-analytics-CrWekgnx.js.map +0 -1
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
const __vite__mapDeps=(i,m=__vite__mapDeps,d=(m.f||(m.f=["assets/ccip-
|
|
1
|
+
const __vite__mapDeps=(i,m=__vite__mapDeps,d=(m.f||(m.f=["assets/ccip-D3ep6jzQ.js","assets/main.ejU8LHpz.js","assets/app-loader-yUQ3CH1e.js","assets/app-loader-DaCxVT0x.css","assets/index-CFSbUvM7.js","assets/style-BPUyhu8E.css","assets/index-B1leI6f5.js","assets/browser-DwVW0p-5.js","assets/router-BzfSlrCZ.js","assets/reactor-analytics-uLER5fzr.js"])))=>i.map(i=>d[i]);
|
|
2
2
|
var __defProp = Object.defineProperty;
|
|
3
3
|
var __typeError = (msg) => {
|
|
4
4
|
throw TypeError(msg);
|
|
@@ -18,10 +18,10 @@ var __privateWrapper = (obj, member, setter, getter) => ({
|
|
|
18
18
|
return __privateGet(obj, member, getter);
|
|
19
19
|
}
|
|
20
20
|
});
|
|
21
|
-
var _InternalTransmitter_instances, buildInternalOperationUpdate_fn, _focused, _cleanup, _setup, _a, _online, _cleanup2, _setup2, _b, _gcTimeout, _c, _initialState, _revertState, _cache, _client, _retryer, _defaultOptions, _abortSignalConsumed, _Query_instances, dispatch_fn, _d, _queries, _e2, _observers, _mutationCache, _retryer2, _Mutation_instances, dispatch_fn2, _f, _mutations, _scopes, _mutationId, _g, _queryCache, _mutationCache2, _defaultOptions2, _queryDefaults, _mutationDefaults, _mountCount, _unsubscribeFocus, _unsubscribeOnline, _h, _client2, _currentQuery, _currentQueryInitialState, _currentResult, _currentResultState, _currentResultOptions, _currentThenable, _selectError, _selectFn, _selectResult, _lastQueryWithDefinedData, _staleTimeoutId, _refetchIntervalId, _currentRefetchInterval, _trackedProps, _QueryObserver_instances, executeFetch_fn, updateStaleTimeout_fn, computeRefetchInterval_fn, updateRefetchInterval_fn, updateTimers_fn, clearStaleTimeout_fn, clearRefetchInterval_fn, updateQuery_fn, notify_fn, _i, _subtleCrypto, _keyPair, _keyPairStorage, _did, _ConnectCrypto_instances, initCrypto_fn, initialize_fn, parseDid_fn, generateECDSAKeyPair_fn, exportKeyPair_fn, importKeyPair_fn, _sign, _verify
|
|
22
|
-
import { _ as __vitePreload } from "./main.
|
|
21
|
+
var _InternalTransmitter_instances, buildInternalOperationUpdate_fn, _focused, _cleanup, _setup, _a, _online, _cleanup2, _setup2, _b, _gcTimeout, _c, _initialState, _revertState, _cache, _client, _retryer, _defaultOptions, _abortSignalConsumed, _Query_instances, dispatch_fn, _d, _queries, _e2, _observers, _mutationCache, _retryer2, _Mutation_instances, dispatch_fn2, _f, _mutations, _scopes, _mutationId, _g, _queryCache, _mutationCache2, _defaultOptions2, _queryDefaults, _mutationDefaults, _mountCount, _unsubscribeFocus, _unsubscribeOnline, _h, _client2, _currentQuery, _currentQueryInitialState, _currentResult, _currentResultState, _currentResultOptions, _currentThenable, _selectError, _selectFn, _selectResult, _lastQueryWithDefinedData, _staleTimeoutId, _refetchIntervalId, _currentRefetchInterval, _trackedProps, _QueryObserver_instances, executeFetch_fn, updateStaleTimeout_fn, computeRefetchInterval_fn, updateRefetchInterval_fn, updateTimers_fn, clearStaleTimeout_fn, clearRefetchInterval_fn, updateQuery_fn, notify_fn, _i, _subtleCrypto, _keyPair, _keyPairStorage, _did, _ConnectCrypto_instances, initCrypto_fn, initialize_fn, parseDid_fn, generateECDSAKeyPair_fn, exportKeyPair_fn, importKeyPair_fn, _sign, _verify;
|
|
22
|
+
import { _ as __vitePreload } from "./main.ejU8LHpz.js";
|
|
23
23
|
import { jsx as jsx$1, Fragment, jsxs } from "react/jsx-runtime";
|
|
24
|
-
import { c as createAction, a as createReducer, i as isDocumentAction, R as ReorderStateExamplesInputSchema, D as DeleteStateExampleInputSchema, U as UpdateStateExampleInputSchema, A as AddStateExampleInputSchema, S as SetInitialStateInputSchema, b as SetStateSchemaInputSchema, d as ReorderModuleOperationsInputSchema, e as DeleteOperationInputSchema, M as MoveOperationInputSchema, f as SetOperationReducerInputSchema, g as SetOperationTemplateInputSchema, h as SetOperationDescriptionInputSchema, j as SetOperationSchemaInputSchema, k as SetOperationScopeInputSchema, l as SetOperationNameInputSchema, m as AddOperationInputSchema, n as ReorderOperationExamplesInputSchema, o as DeleteOperationExampleInputSchema, p as UpdateOperationExampleInputSchema, q as AddOperationExampleInputSchema, r as ReorderOperationErrorsInputSchema, s as DeleteOperationErrorInputSchema, t as SetOperationErrorTemplateInputSchema, u as SetOperationErrorDescriptionInputSchema, v as SetOperationErrorNameInputSchema, w as SetOperationErrorCodeInputSchema, x as AddOperationErrorInputSchema, y as ReorderModulesInputSchema, z as DeleteModuleInputSchema, B as SetModuleDescriptionInputSchema, C as SetModuleNameInputSchema, E as AddModuleInputSchema, F as ReorderChangeLogItemsInputSchema, G as DeleteChangeLogItemInputSchema, H as UpdateChangeLogItemInputSchema, I as AddChangeLogItemInputSchema, J as SetAuthorWebsiteInputSchema, K as SetAuthorNameInputSchema, L as SetModelDescriptionInputSchema, N as SetModelExtensionInputSchema, O as SetModelIdInputSchema, P as SetModelNameInputSchema, Q as baseCreateExtendedState, T as baseCreateDocument, V as baseSaveToFile, W as baseSaveToFileHandle, X as baseLoadFromFile, Y as baseLoadFromInput, Z as pascalCase, _ as logger$
|
|
24
|
+
import { c as createAction, a as createReducer, i as isDocumentAction, R as ReorderStateExamplesInputSchema, D as DeleteStateExampleInputSchema, U as UpdateStateExampleInputSchema, A as AddStateExampleInputSchema, S as SetInitialStateInputSchema, b as SetStateSchemaInputSchema, d as ReorderModuleOperationsInputSchema, e as DeleteOperationInputSchema, M as MoveOperationInputSchema, f as SetOperationReducerInputSchema, g as SetOperationTemplateInputSchema, h as SetOperationDescriptionInputSchema, j as SetOperationSchemaInputSchema, k as SetOperationScopeInputSchema, l as SetOperationNameInputSchema, m as AddOperationInputSchema, n as ReorderOperationExamplesInputSchema, o as DeleteOperationExampleInputSchema, p as UpdateOperationExampleInputSchema, q as AddOperationExampleInputSchema, r as ReorderOperationErrorsInputSchema, s as DeleteOperationErrorInputSchema, t as SetOperationErrorTemplateInputSchema, u as SetOperationErrorDescriptionInputSchema, v as SetOperationErrorNameInputSchema, w as SetOperationErrorCodeInputSchema, x as AddOperationErrorInputSchema, y as ReorderModulesInputSchema, z as DeleteModuleInputSchema, B as SetModuleDescriptionInputSchema, C as SetModuleNameInputSchema, E as AddModuleInputSchema, F as ReorderChangeLogItemsInputSchema, G as DeleteChangeLogItemInputSchema, H as UpdateChangeLogItemInputSchema, I as AddChangeLogItemInputSchema, J as SetAuthorWebsiteInputSchema, K as SetAuthorNameInputSchema, L as SetModelDescriptionInputSchema, N as SetModelExtensionInputSchema, O as SetModelIdInputSchema, P as SetModelNameInputSchema, Q as baseCreateExtendedState, T as baseCreateDocument, V as baseSaveToFile, W as baseSaveToFileHandle, X as baseLoadFromFile, Y as baseLoadFromInput, Z as pascalCase, _ as logger$3, $ as Icon, a0 as getDefaultExportFromCjs, a1 as LOCAL, a2 as commonjsGlobal, a3 as PUBLIC, a4 as SWITCHBOARD, a5 as locationInfoByLocation, a6 as sharingTypeOptions, a7 as objectType, a8 as recordType, a9 as stringType, aa as capitalCase, ab as CLOUD, ac as createZip, ad as LZString, ae as buildSignedOperation, af as getI18n, ag as getDefaults, ah as connectConfig, ai as hashDocumentStateForScope, aj as getAugmentedNamespace, ak as childLogger, al as process, am as setErrorHandler, an as driveDocumentModelModule, ao as createBrowserStorage, ap as createBrowserDocumentDriveServer, aq as generateId, ar as reducer$8, as as isDocumentDrive, at as generateAddNodeAction, au as isFileNode, av as uploadDocumentOperations, aw as updateFile, ax as addFolder, ay as isFolderNode, az as deleteNode, aA as updateNode, aB as FILE$1, aC as moveNode, aD as generateNodesCopy, aE as copyNode, aF as createState$1, aG as setDriveName, aH as setAvailableOffline, aI as setSharingType, aJ as SynchronizationUnitNotFoundError, aK as removeTrigger, aL as PullResponderTransmitter, aM as addTrigger, aN as ReadDriveNotFoundError, aO as openUrl, aP as getNodeOptions, aQ as DRIVE$1, aR as FOLDER, aS as requestPublicDrive, aT as serviceWorkerManager, aU as packageJson, aV as t$1 } from "./app-loader-yUQ3CH1e.js";
|
|
25
25
|
import * as React from "react";
|
|
26
26
|
import React__default, { useLayoutEffect, useEffect, useState, forwardRef, useCallback, useContext, useRef, useMemo, createContext, Component, Fragment as Fragment$1, createElement, useId as useId$1, useSyncExternalStore, isValidElement, cloneElement, Children, useReducer, useDebugValue, Suspense, lazy } from "react";
|
|
27
27
|
import * as ReactDOM from "react-dom";
|
|
@@ -1489,7 +1489,7 @@ class InternalTransmitter {
|
|
|
1489
1489
|
};
|
|
1490
1490
|
});
|
|
1491
1491
|
} catch (error) {
|
|
1492
|
-
logger$
|
|
1492
|
+
logger$3.error(error);
|
|
1493
1493
|
return strands.map(({ operations, ...s2 }) => {
|
|
1494
1494
|
var _a3;
|
|
1495
1495
|
return {
|
|
@@ -20580,7 +20580,7 @@ async function call(client2, args) {
|
|
|
20580
20580
|
} catch (err) {
|
|
20581
20581
|
const data2 = getRevertErrorData(err);
|
|
20582
20582
|
const { offchainLookup, offchainLookupSignature } = await __vitePreload(async () => {
|
|
20583
|
-
const { offchainLookup: offchainLookup2, offchainLookupSignature: offchainLookupSignature2 } = await import("./ccip-
|
|
20583
|
+
const { offchainLookup: offchainLookup2, offchainLookupSignature: offchainLookupSignature2 } = await import("./ccip-D3ep6jzQ.js");
|
|
20584
20584
|
return { offchainLookup: offchainLookup2, offchainLookupSignature: offchainLookupSignature2 };
|
|
20585
20585
|
}, true ? __vite__mapDeps([0,1,2,3]) : void 0);
|
|
20586
20586
|
if (client2.ccipRead !== false && (data2 == null ? void 0 : data2.slice(0, 10)) === offchainLookupSignature && to)
|
|
@@ -51306,7 +51306,7 @@ const downloadFile = async (document2) => {
|
|
|
51306
51306
|
window.document.body.appendChild(link);
|
|
51307
51307
|
link.click();
|
|
51308
51308
|
window.document.body.removeChild(link);
|
|
51309
|
-
}).catch(logger$
|
|
51309
|
+
}).catch(logger$3.error);
|
|
51310
51310
|
};
|
|
51311
51311
|
async function exportFile(document2, getDocumentModelModule2) {
|
|
51312
51312
|
var _a2, _b2;
|
|
@@ -51503,7 +51503,7 @@ async function signOperation(operation, sign, documentId, document2, reducer2, u
|
|
|
51503
51503
|
if (!operation.context) return operation;
|
|
51504
51504
|
if (!operation.context.signer) return operation;
|
|
51505
51505
|
if (!reducer2) {
|
|
51506
|
-
logger$
|
|
51506
|
+
logger$3.error(
|
|
51507
51507
|
`Document model '${document2.documentType}' does not have a reducer`
|
|
51508
51508
|
);
|
|
51509
51509
|
return operation;
|
|
@@ -53405,7 +53405,7 @@ function useFileNodeDocument(props) {
|
|
|
53405
53405
|
}
|
|
53406
53406
|
)
|
|
53407
53407
|
).catch((error) => {
|
|
53408
|
-
logger$
|
|
53408
|
+
logger$3.error(error);
|
|
53409
53409
|
setFileNodeDocument({
|
|
53410
53410
|
driveId,
|
|
53411
53411
|
documentId,
|
|
@@ -53437,7 +53437,7 @@ function useFileNodeDocument(props) {
|
|
|
53437
53437
|
fileNodeDocument.driveId,
|
|
53438
53438
|
fileNodeDocument.documentId,
|
|
53439
53439
|
fileNodeDocument.documentType
|
|
53440
|
-
).then(setSelectedDocument).catch(logger$
|
|
53440
|
+
).then(setSelectedDocument).catch(logger$3.error);
|
|
53441
53441
|
}
|
|
53442
53442
|
});
|
|
53443
53443
|
return removeListener;
|
|
@@ -55763,6 +55763,158 @@ function encodeDIDfromBytes(multicodecName, publicKey) {
|
|
|
55763
55763
|
const bufAsString = base58btc.encode(publicKeywPrefix);
|
|
55764
55764
|
return `did:key:${bufAsString}`;
|
|
55765
55765
|
}
|
|
55766
|
+
const logger$2 = childLogger(["connect", "crypto"]);
|
|
55767
|
+
function ab2hex(ab) {
|
|
55768
|
+
return Array.prototype.map.call(
|
|
55769
|
+
new Uint8Array(ab),
|
|
55770
|
+
(x2) => ("00" + x2.toString(16)).slice(-2)
|
|
55771
|
+
).join("");
|
|
55772
|
+
}
|
|
55773
|
+
const _ConnectCrypto = class _ConnectCrypto {
|
|
55774
|
+
constructor(keyPairStorage) {
|
|
55775
|
+
__privateAdd(this, _ConnectCrypto_instances);
|
|
55776
|
+
__privateAdd(this, _subtleCrypto);
|
|
55777
|
+
__privateAdd(this, _keyPair);
|
|
55778
|
+
__privateAdd(this, _keyPairStorage);
|
|
55779
|
+
__privateAdd(this, _did);
|
|
55780
|
+
__privateAdd(this, _sign, async (...args) => {
|
|
55781
|
+
return (await __privateGet(this, _subtleCrypto)).sign(...args);
|
|
55782
|
+
});
|
|
55783
|
+
__privateAdd(this, _verify, async (...args) => {
|
|
55784
|
+
return (await __privateGet(this, _subtleCrypto)).verify(...args);
|
|
55785
|
+
});
|
|
55786
|
+
__privateSet(this, _keyPairStorage, keyPairStorage);
|
|
55787
|
+
__privateSet(this, _subtleCrypto, __privateMethod(this, _ConnectCrypto_instances, initCrypto_fn).call(this));
|
|
55788
|
+
__privateSet(this, _did, __privateMethod(this, _ConnectCrypto_instances, initialize_fn).call(this));
|
|
55789
|
+
}
|
|
55790
|
+
did() {
|
|
55791
|
+
return __privateGet(this, _did);
|
|
55792
|
+
}
|
|
55793
|
+
async regenerateDid() {
|
|
55794
|
+
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, generateECDSAKeyPair_fn).call(this));
|
|
55795
|
+
await __privateGet(this, _keyPairStorage).saveKeyPair(await __privateMethod(this, _ConnectCrypto_instances, exportKeyPair_fn).call(this));
|
|
55796
|
+
}
|
|
55797
|
+
async sign(data) {
|
|
55798
|
+
var _a2;
|
|
55799
|
+
if ((_a2 = __privateGet(this, _keyPair)) == null ? void 0 : _a2.privateKey) {
|
|
55800
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
55801
|
+
const arrayBuffer = await subtleCrypto.sign(
|
|
55802
|
+
_ConnectCrypto.signAlgorithm,
|
|
55803
|
+
__privateGet(this, _keyPair).privateKey,
|
|
55804
|
+
data.buffer
|
|
55805
|
+
);
|
|
55806
|
+
return new Uint8Array(arrayBuffer);
|
|
55807
|
+
} else {
|
|
55808
|
+
throw new Error("No private key available");
|
|
55809
|
+
}
|
|
55810
|
+
}
|
|
55811
|
+
};
|
|
55812
|
+
_subtleCrypto = new WeakMap();
|
|
55813
|
+
_keyPair = new WeakMap();
|
|
55814
|
+
_keyPairStorage = new WeakMap();
|
|
55815
|
+
_did = new WeakMap();
|
|
55816
|
+
_ConnectCrypto_instances = new WeakSet();
|
|
55817
|
+
initCrypto_fn = function() {
|
|
55818
|
+
return new Promise((resolve, reject) => {
|
|
55819
|
+
var _a2;
|
|
55820
|
+
if (typeof window === "undefined") {
|
|
55821
|
+
__vitePreload(() => import("node:crypto"), true ? [] : void 0).then((module) => {
|
|
55822
|
+
resolve(module.webcrypto.subtle);
|
|
55823
|
+
}).catch(reject);
|
|
55824
|
+
} else {
|
|
55825
|
+
if (!((_a2 = window.crypto) == null ? void 0 : _a2.subtle)) {
|
|
55826
|
+
reject(new Error("Crypto module not available"));
|
|
55827
|
+
}
|
|
55828
|
+
resolve(window.crypto.subtle);
|
|
55829
|
+
}
|
|
55830
|
+
});
|
|
55831
|
+
};
|
|
55832
|
+
initialize_fn = async function() {
|
|
55833
|
+
const loadedKeyPair = await __privateGet(this, _keyPairStorage).loadKeyPair();
|
|
55834
|
+
if (loadedKeyPair) {
|
|
55835
|
+
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, importKeyPair_fn).call(this, loadedKeyPair));
|
|
55836
|
+
logger$2.info("Found key pair");
|
|
55837
|
+
} else {
|
|
55838
|
+
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, generateECDSAKeyPair_fn).call(this));
|
|
55839
|
+
logger$2.info("Created key pair");
|
|
55840
|
+
await __privateGet(this, _keyPairStorage).saveKeyPair(await __privateMethod(this, _ConnectCrypto_instances, exportKeyPair_fn).call(this));
|
|
55841
|
+
}
|
|
55842
|
+
const did = await __privateMethod(this, _ConnectCrypto_instances, parseDid_fn).call(this);
|
|
55843
|
+
logger$2.info("Connect DID:", did);
|
|
55844
|
+
return did;
|
|
55845
|
+
};
|
|
55846
|
+
parseDid_fn = async function() {
|
|
55847
|
+
if (!__privateGet(this, _keyPair)) {
|
|
55848
|
+
throw new Error("No key pair available");
|
|
55849
|
+
}
|
|
55850
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
55851
|
+
const publicKeyRaw = await subtleCrypto.exportKey(
|
|
55852
|
+
"raw",
|
|
55853
|
+
__privateGet(this, _keyPair).publicKey
|
|
55854
|
+
);
|
|
55855
|
+
const multicodecName = "p256-pub";
|
|
55856
|
+
const rawKey = rawKeyInHexfromUncompressed(ab2hex(publicKeyRaw));
|
|
55857
|
+
const compressedKey = compressedKeyInHexfromRaw(rawKey);
|
|
55858
|
+
const did = encodeDIDfromHexString(multicodecName, compressedKey);
|
|
55859
|
+
return did;
|
|
55860
|
+
};
|
|
55861
|
+
generateECDSAKeyPair_fn = async function() {
|
|
55862
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
55863
|
+
const keyPair = await subtleCrypto.generateKey(
|
|
55864
|
+
_ConnectCrypto.algorithm,
|
|
55865
|
+
true,
|
|
55866
|
+
["sign", "verify"]
|
|
55867
|
+
);
|
|
55868
|
+
return keyPair;
|
|
55869
|
+
};
|
|
55870
|
+
exportKeyPair_fn = async function() {
|
|
55871
|
+
if (!__privateGet(this, _keyPair)) {
|
|
55872
|
+
throw new Error("No key pair available");
|
|
55873
|
+
}
|
|
55874
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
55875
|
+
const jwkKeyPair = {
|
|
55876
|
+
publicKey: await subtleCrypto.exportKey(
|
|
55877
|
+
"jwk",
|
|
55878
|
+
__privateGet(this, _keyPair).publicKey
|
|
55879
|
+
),
|
|
55880
|
+
privateKey: await subtleCrypto.exportKey(
|
|
55881
|
+
"jwk",
|
|
55882
|
+
__privateGet(this, _keyPair).privateKey
|
|
55883
|
+
)
|
|
55884
|
+
};
|
|
55885
|
+
return jwkKeyPair;
|
|
55886
|
+
};
|
|
55887
|
+
importKeyPair_fn = async function(jwkKeyPair) {
|
|
55888
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
55889
|
+
return {
|
|
55890
|
+
publicKey: await subtleCrypto.importKey(
|
|
55891
|
+
"jwk",
|
|
55892
|
+
jwkKeyPair.publicKey,
|
|
55893
|
+
_ConnectCrypto.algorithm,
|
|
55894
|
+
true,
|
|
55895
|
+
["verify"]
|
|
55896
|
+
),
|
|
55897
|
+
privateKey: await subtleCrypto.importKey(
|
|
55898
|
+
"jwk",
|
|
55899
|
+
jwkKeyPair.privateKey,
|
|
55900
|
+
_ConnectCrypto.algorithm,
|
|
55901
|
+
true,
|
|
55902
|
+
["sign"]
|
|
55903
|
+
)
|
|
55904
|
+
};
|
|
55905
|
+
};
|
|
55906
|
+
_sign = new WeakMap();
|
|
55907
|
+
_verify = new WeakMap();
|
|
55908
|
+
__publicField(_ConnectCrypto, "algorithm", {
|
|
55909
|
+
name: "ECDSA",
|
|
55910
|
+
namedCurve: "P-256"
|
|
55911
|
+
});
|
|
55912
|
+
__publicField(_ConnectCrypto, "signAlgorithm", {
|
|
55913
|
+
name: "ECDSA",
|
|
55914
|
+
namedCurve: "P-256",
|
|
55915
|
+
hash: "SHA-256"
|
|
55916
|
+
});
|
|
55917
|
+
let ConnectCrypto = _ConnectCrypto;
|
|
55766
55918
|
async function getHMRModule() {
|
|
55767
55919
|
if (import.meta.hot) {
|
|
55768
55920
|
return import.meta.hot;
|
|
@@ -73194,7 +73346,7 @@ const useFilteredDocumentModels = () => {
|
|
|
73194
73346
|
return filteredDocumentModels;
|
|
73195
73347
|
};
|
|
73196
73348
|
async function loadBaseEditors() {
|
|
73197
|
-
const documentModelEditor = await __vitePreload(() => import("./index-
|
|
73349
|
+
const documentModelEditor = await __vitePreload(() => import("./index-CFSbUvM7.js"), true ? __vite__mapDeps([4,2,1,3]) : void 0);
|
|
73198
73350
|
await __vitePreload(() => Promise.resolve({}), true ? __vite__mapDeps([5]) : void 0);
|
|
73199
73351
|
const module = documentModelEditor.documentModelEditorModule;
|
|
73200
73352
|
return [module];
|
|
@@ -73248,7 +73400,7 @@ async function initReactor(reactor) {
|
|
|
73248
73400
|
listeners: [],
|
|
73249
73401
|
triggers: []
|
|
73250
73402
|
}
|
|
73251
|
-
}).catch(logger$
|
|
73403
|
+
}).catch(logger$3.error);
|
|
73252
73404
|
}
|
|
73253
73405
|
}
|
|
73254
73406
|
async function createReactor() {
|
|
@@ -73342,35 +73494,43 @@ const acceptedCookiesAtom = atomWithStorage(
|
|
|
73342
73494
|
const useAcceptedCookies = () => {
|
|
73343
73495
|
return useAtom(acceptedCookiesAtom);
|
|
73344
73496
|
};
|
|
73345
|
-
|
|
73346
|
-
|
|
73347
|
-
return window.connectCrypto;
|
|
73348
|
-
}
|
|
73497
|
+
let _connectCrypto;
|
|
73498
|
+
async function initConnectCrypto() {
|
|
73349
73499
|
const { ConnectCrypto: ConnectCrypto2 } = await __vitePreload(async () => {
|
|
73350
|
-
const { ConnectCrypto: ConnectCrypto3 } = await import("./index-
|
|
73500
|
+
const { ConnectCrypto: ConnectCrypto3 } = await import("./index-B1leI6f5.js");
|
|
73351
73501
|
return { ConnectCrypto: ConnectCrypto3 };
|
|
73352
|
-
}, true ? __vite__mapDeps([6,1,
|
|
73353
|
-
const { BrowserKeyStorage
|
|
73354
|
-
const { BrowserKeyStorage:
|
|
73355
|
-
return { BrowserKeyStorage:
|
|
73356
|
-
}, true ? __vite__mapDeps([6,1,
|
|
73357
|
-
const
|
|
73358
|
-
await
|
|
73359
|
-
return
|
|
73360
|
-
}
|
|
73502
|
+
}, true ? __vite__mapDeps([6,2,1,3]) : void 0);
|
|
73503
|
+
const { BrowserKeyStorage } = await __vitePreload(async () => {
|
|
73504
|
+
const { BrowserKeyStorage: BrowserKeyStorage2 } = await import("./index-B1leI6f5.js");
|
|
73505
|
+
return { BrowserKeyStorage: BrowserKeyStorage2 };
|
|
73506
|
+
}, true ? __vite__mapDeps([6,2,1,3]) : void 0);
|
|
73507
|
+
const connectCrypto = new ConnectCrypto2(new BrowserKeyStorage());
|
|
73508
|
+
await connectCrypto.did();
|
|
73509
|
+
return connectCrypto;
|
|
73510
|
+
}
|
|
73511
|
+
function getConnectCrypto() {
|
|
73512
|
+
if (window.connectCrypto) {
|
|
73513
|
+
return Promise.resolve(window.connectCrypto);
|
|
73514
|
+
}
|
|
73515
|
+
if (_connectCrypto) {
|
|
73516
|
+
return _connectCrypto;
|
|
73517
|
+
}
|
|
73518
|
+
_connectCrypto = initConnectCrypto();
|
|
73519
|
+
return _connectCrypto;
|
|
73520
|
+
}
|
|
73361
73521
|
function useConnectCrypto() {
|
|
73362
73522
|
return useMemo(
|
|
73363
73523
|
() => ({
|
|
73364
73524
|
async regenerateDid() {
|
|
73365
|
-
const crypto2 = await
|
|
73525
|
+
const crypto2 = await getConnectCrypto();
|
|
73366
73526
|
return crypto2.regenerateDid();
|
|
73367
73527
|
},
|
|
73368
73528
|
async did() {
|
|
73369
|
-
const crypto2 = await
|
|
73529
|
+
const crypto2 = await getConnectCrypto();
|
|
73370
73530
|
return crypto2.did();
|
|
73371
73531
|
},
|
|
73372
73532
|
sign: async (data) => {
|
|
73373
|
-
const crypto2 = await
|
|
73533
|
+
const crypto2 = await getConnectCrypto();
|
|
73374
73534
|
return await crypto2.sign(data);
|
|
73375
73535
|
}
|
|
73376
73536
|
}),
|
|
@@ -73384,7 +73544,7 @@ function useConnectDid() {
|
|
|
73384
73544
|
if (did) {
|
|
73385
73545
|
return;
|
|
73386
73546
|
}
|
|
73387
|
-
|
|
73547
|
+
getConnectCrypto().then((c2) => c2.did()).then((did2) => setDid(did2)).catch(logger$3.error);
|
|
73388
73548
|
});
|
|
73389
73549
|
return did;
|
|
73390
73550
|
}
|
|
@@ -73400,9 +73560,9 @@ function useRenown() {
|
|
|
73400
73560
|
return;
|
|
73401
73561
|
}
|
|
73402
73562
|
const { initRenownBrowser } = await __vitePreload(async () => {
|
|
73403
|
-
const { initRenownBrowser: initRenownBrowser2 } = await import("./index-
|
|
73563
|
+
const { initRenownBrowser: initRenownBrowser2 } = await import("./index-B1leI6f5.js");
|
|
73404
73564
|
return { initRenownBrowser: initRenownBrowser2 };
|
|
73405
|
-
}, true ? __vite__mapDeps([6,1,
|
|
73565
|
+
}, true ? __vite__mapDeps([6,2,1,3]) : void 0);
|
|
73406
73566
|
const renownBrowser = initRenownBrowser(did2);
|
|
73407
73567
|
const renown2 = {
|
|
73408
73568
|
user: function() {
|
|
@@ -73474,7 +73634,7 @@ const useLogin = () => {
|
|
|
73474
73634
|
}
|
|
73475
73635
|
} catch (error) {
|
|
73476
73636
|
setStatus("not-authorized");
|
|
73477
|
-
logger$
|
|
73637
|
+
logger$3.error(error);
|
|
73478
73638
|
}
|
|
73479
73639
|
},
|
|
73480
73640
|
[renown]
|
|
@@ -73612,11 +73772,11 @@ function useDocumentDrives$1() {
|
|
|
73612
73772
|
const drive = await reactor.getDrive(id);
|
|
73613
73773
|
documentDrives2.push(drive);
|
|
73614
73774
|
} catch (error) {
|
|
73615
|
-
logger$
|
|
73775
|
+
logger$3.error(error);
|
|
73616
73776
|
}
|
|
73617
73777
|
}
|
|
73618
73778
|
} catch (error) {
|
|
73619
|
-
logger$
|
|
73779
|
+
logger$3.error(error);
|
|
73620
73780
|
} finally {
|
|
73621
73781
|
setDocumentDrives(documentDrives2);
|
|
73622
73782
|
}
|
|
@@ -73637,7 +73797,7 @@ function useDocumentDrives$1() {
|
|
|
73637
73797
|
"syncStatus",
|
|
73638
73798
|
async (_event, _status, error) => {
|
|
73639
73799
|
if (error) {
|
|
73640
|
-
logger$
|
|
73800
|
+
logger$3.error(error);
|
|
73641
73801
|
}
|
|
73642
73802
|
await refreshDocumentDrives();
|
|
73643
73803
|
}
|
|
@@ -74529,186 +74689,6 @@ createContext({
|
|
|
74529
74689
|
...ReadModeInstance$1,
|
|
74530
74690
|
readDrives: []
|
|
74531
74691
|
});
|
|
74532
|
-
function ab2hex(ab) {
|
|
74533
|
-
return Array.prototype.map.call(new Uint8Array(ab), (x2) => ("00" + x2.toString(16)).slice(-2)).join("");
|
|
74534
|
-
}
|
|
74535
|
-
const _ConnectCrypto = class _ConnectCrypto {
|
|
74536
|
-
constructor(keyPairStorage) {
|
|
74537
|
-
__privateAdd(this, _ConnectCrypto_instances);
|
|
74538
|
-
__privateAdd(this, _subtleCrypto);
|
|
74539
|
-
__privateAdd(this, _keyPair);
|
|
74540
|
-
__privateAdd(this, _keyPairStorage);
|
|
74541
|
-
__privateAdd(this, _did);
|
|
74542
|
-
// eslint-disable-next-line no-unused-private-class-members
|
|
74543
|
-
__privateAdd(this, _sign, async (...args) => {
|
|
74544
|
-
return (await __privateGet(this, _subtleCrypto)).sign(...args);
|
|
74545
|
-
});
|
|
74546
|
-
// eslint-disable-next-line no-unused-private-class-members
|
|
74547
|
-
__privateAdd(this, _verify, async (...args) => {
|
|
74548
|
-
return (await __privateGet(this, _subtleCrypto)).verify(...args);
|
|
74549
|
-
});
|
|
74550
|
-
__privateSet(this, _keyPairStorage, keyPairStorage);
|
|
74551
|
-
__privateSet(this, _subtleCrypto, __privateMethod(this, _ConnectCrypto_instances, initCrypto_fn).call(this));
|
|
74552
|
-
__privateSet(this, _did, __privateMethod(this, _ConnectCrypto_instances, initialize_fn).call(this));
|
|
74553
|
-
}
|
|
74554
|
-
did() {
|
|
74555
|
-
return __privateGet(this, _did);
|
|
74556
|
-
}
|
|
74557
|
-
async regenerateDid() {
|
|
74558
|
-
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, generateECDSAKeyPair_fn).call(this));
|
|
74559
|
-
await __privateGet(this, _keyPairStorage).saveKeyPair(await __privateMethod(this, _ConnectCrypto_instances, exportKeyPair_fn).call(this));
|
|
74560
|
-
}
|
|
74561
|
-
async sign(data) {
|
|
74562
|
-
var _a2;
|
|
74563
|
-
if ((_a2 = __privateGet(this, _keyPair)) == null ? void 0 : _a2.privateKey) {
|
|
74564
|
-
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
74565
|
-
const arrayBuffer = await subtleCrypto.sign(_ConnectCrypto.signAlgorithm, __privateGet(this, _keyPair).privateKey, data.buffer);
|
|
74566
|
-
return new Uint8Array(arrayBuffer);
|
|
74567
|
-
} else {
|
|
74568
|
-
throw new Error("No private key available");
|
|
74569
|
-
}
|
|
74570
|
-
}
|
|
74571
|
-
};
|
|
74572
|
-
_subtleCrypto = new WeakMap();
|
|
74573
|
-
_keyPair = new WeakMap();
|
|
74574
|
-
_keyPairStorage = new WeakMap();
|
|
74575
|
-
_did = new WeakMap();
|
|
74576
|
-
_ConnectCrypto_instances = new WeakSet();
|
|
74577
|
-
initCrypto_fn = function() {
|
|
74578
|
-
return new Promise((resolve, reject) => {
|
|
74579
|
-
var _a2;
|
|
74580
|
-
if (typeof window === "undefined") {
|
|
74581
|
-
__vitePreload(() => import("node:crypto"), true ? [] : void 0).then((module) => {
|
|
74582
|
-
resolve(module.webcrypto.subtle);
|
|
74583
|
-
}).catch(reject);
|
|
74584
|
-
} else {
|
|
74585
|
-
if (!((_a2 = window.crypto) == null ? void 0 : _a2.subtle)) {
|
|
74586
|
-
reject(new Error("Crypto module not available"));
|
|
74587
|
-
}
|
|
74588
|
-
resolve(window.crypto.subtle);
|
|
74589
|
-
}
|
|
74590
|
-
});
|
|
74591
|
-
};
|
|
74592
|
-
initialize_fn = async function() {
|
|
74593
|
-
const loadedKeyPair = await __privateGet(this, _keyPairStorage).loadKeyPair();
|
|
74594
|
-
if (loadedKeyPair) {
|
|
74595
|
-
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, importKeyPair_fn).call(this, loadedKeyPair));
|
|
74596
|
-
console.log("Found key pair");
|
|
74597
|
-
} else {
|
|
74598
|
-
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, generateECDSAKeyPair_fn).call(this));
|
|
74599
|
-
console.log("Created key pair");
|
|
74600
|
-
await __privateGet(this, _keyPairStorage).saveKeyPair(await __privateMethod(this, _ConnectCrypto_instances, exportKeyPair_fn).call(this));
|
|
74601
|
-
}
|
|
74602
|
-
const did = await __privateMethod(this, _ConnectCrypto_instances, parseDid_fn).call(this);
|
|
74603
|
-
console.log("Connect DID:", did);
|
|
74604
|
-
return did;
|
|
74605
|
-
};
|
|
74606
|
-
parseDid_fn = async function() {
|
|
74607
|
-
if (!__privateGet(this, _keyPair)) {
|
|
74608
|
-
throw new Error("No key pair available");
|
|
74609
|
-
}
|
|
74610
|
-
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
74611
|
-
const publicKeyRaw = await subtleCrypto.exportKey("raw", __privateGet(this, _keyPair).publicKey);
|
|
74612
|
-
const multicodecName = "p256-pub";
|
|
74613
|
-
const rawKey = rawKeyInHexfromUncompressed(ab2hex(publicKeyRaw));
|
|
74614
|
-
const compressedKey = compressedKeyInHexfromRaw(rawKey);
|
|
74615
|
-
const did = encodeDIDfromHexString(multicodecName, compressedKey);
|
|
74616
|
-
return did;
|
|
74617
|
-
};
|
|
74618
|
-
generateECDSAKeyPair_fn = async function() {
|
|
74619
|
-
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
74620
|
-
const keyPair = await subtleCrypto.generateKey(_ConnectCrypto.algorithm, true, ["sign", "verify"]);
|
|
74621
|
-
return keyPair;
|
|
74622
|
-
};
|
|
74623
|
-
exportKeyPair_fn = async function() {
|
|
74624
|
-
if (!__privateGet(this, _keyPair)) {
|
|
74625
|
-
throw new Error("No key pair available");
|
|
74626
|
-
}
|
|
74627
|
-
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
74628
|
-
const jwkKeyPair = {
|
|
74629
|
-
publicKey: await subtleCrypto.exportKey("jwk", __privateGet(this, _keyPair).publicKey),
|
|
74630
|
-
privateKey: await subtleCrypto.exportKey("jwk", __privateGet(this, _keyPair).privateKey)
|
|
74631
|
-
};
|
|
74632
|
-
return jwkKeyPair;
|
|
74633
|
-
};
|
|
74634
|
-
importKeyPair_fn = async function(jwkKeyPair) {
|
|
74635
|
-
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
74636
|
-
return {
|
|
74637
|
-
publicKey: await subtleCrypto.importKey("jwk", jwkKeyPair.publicKey, _ConnectCrypto.algorithm, true, ["verify"]),
|
|
74638
|
-
privateKey: await subtleCrypto.importKey("jwk", jwkKeyPair.privateKey, _ConnectCrypto.algorithm, true, ["sign"])
|
|
74639
|
-
};
|
|
74640
|
-
};
|
|
74641
|
-
_sign = new WeakMap();
|
|
74642
|
-
_verify = new WeakMap();
|
|
74643
|
-
__publicField(_ConnectCrypto, "algorithm", {
|
|
74644
|
-
name: "ECDSA",
|
|
74645
|
-
namedCurve: "P-256"
|
|
74646
|
-
});
|
|
74647
|
-
__publicField(_ConnectCrypto, "signAlgorithm", {
|
|
74648
|
-
name: "ECDSA",
|
|
74649
|
-
namedCurve: "P-256",
|
|
74650
|
-
hash: "SHA-256"
|
|
74651
|
-
});
|
|
74652
|
-
let ConnectCrypto = _ConnectCrypto;
|
|
74653
|
-
const _BrowserKeyStorage = class _BrowserKeyStorage {
|
|
74654
|
-
constructor() {
|
|
74655
|
-
__privateAdd(this, _BrowserKeyStorage_instances);
|
|
74656
|
-
__privateAdd(this, _db);
|
|
74657
|
-
__privateSet(this, _db, new Promise((resolve, reject) => {
|
|
74658
|
-
const req = indexedDB.open(__privateGet(_BrowserKeyStorage, _DB_NAME), 1);
|
|
74659
|
-
req.onupgradeneeded = () => {
|
|
74660
|
-
req.result.createObjectStore(__privateGet(_BrowserKeyStorage, _STORE_NAME));
|
|
74661
|
-
};
|
|
74662
|
-
req.onsuccess = () => resolve(req.result);
|
|
74663
|
-
req.onerror = () => reject(req.error);
|
|
74664
|
-
}));
|
|
74665
|
-
}
|
|
74666
|
-
async saveKeyPair(keyPair) {
|
|
74667
|
-
const store = await __privateMethod(this, _BrowserKeyStorage_instances, useStore_fn).call(this);
|
|
74668
|
-
const request = store.put(keyPair, __privateGet(_BrowserKeyStorage, _KEY));
|
|
74669
|
-
return new Promise((resolve, reject) => {
|
|
74670
|
-
request.onsuccess = () => {
|
|
74671
|
-
resolve();
|
|
74672
|
-
};
|
|
74673
|
-
request.onerror = () => {
|
|
74674
|
-
reject(new Error("Failed to save key pair"));
|
|
74675
|
-
};
|
|
74676
|
-
});
|
|
74677
|
-
}
|
|
74678
|
-
async loadKeyPair() {
|
|
74679
|
-
const store = await __privateMethod(this, _BrowserKeyStorage_instances, useStore_fn).call(this, "readonly");
|
|
74680
|
-
const request = store.getAll();
|
|
74681
|
-
return new Promise((resolve, reject) => {
|
|
74682
|
-
request.onsuccess = () => {
|
|
74683
|
-
const keyPair = request.result.length ? request.result[0] : void 0;
|
|
74684
|
-
resolve(keyPair);
|
|
74685
|
-
};
|
|
74686
|
-
request.onerror = () => {
|
|
74687
|
-
reject(new Error("Failed to load key pair"));
|
|
74688
|
-
};
|
|
74689
|
-
});
|
|
74690
|
-
}
|
|
74691
|
-
};
|
|
74692
|
-
_DB_NAME = new WeakMap();
|
|
74693
|
-
_STORE_NAME = new WeakMap();
|
|
74694
|
-
_KEY = new WeakMap();
|
|
74695
|
-
_db = new WeakMap();
|
|
74696
|
-
_BrowserKeyStorage_instances = new WeakSet();
|
|
74697
|
-
useStore_fn = async function(mode2 = "readwrite") {
|
|
74698
|
-
const database = await __privateGet(this, _db);
|
|
74699
|
-
const transaction = database.transaction(__privateGet(_BrowserKeyStorage, _STORE_NAME), mode2);
|
|
74700
|
-
const store = transaction.objectStore(__privateGet(_BrowserKeyStorage, _STORE_NAME));
|
|
74701
|
-
return store;
|
|
74702
|
-
};
|
|
74703
|
-
__privateAdd(_BrowserKeyStorage, _DB_NAME, "browserKeyDB");
|
|
74704
|
-
__privateAdd(_BrowserKeyStorage, _STORE_NAME, "keyPairs");
|
|
74705
|
-
__privateAdd(_BrowserKeyStorage, _KEY, "keyPair");
|
|
74706
|
-
let BrowserKeyStorage = _BrowserKeyStorage;
|
|
74707
|
-
(async () => {
|
|
74708
|
-
const connectCrypto2 = new ConnectCrypto(new BrowserKeyStorage());
|
|
74709
|
-
await connectCrypto2.did();
|
|
74710
|
-
return connectCrypto2;
|
|
74711
|
-
})();
|
|
74712
74692
|
atom(void 0);
|
|
74713
74693
|
const documentDrivesAtom = atom(/* @__PURE__ */ new Map());
|
|
74714
74694
|
function drivesToHash(drives) {
|
|
@@ -75078,21 +75058,21 @@ const ReadModeContextProvider = (props) => {
|
|
|
75078
75058
|
const accessLevel = readMode ? "READ" : "WRITE";
|
|
75079
75059
|
const server = ReadModeInstance.getServer();
|
|
75080
75060
|
if (server && typeof server.setAllDefaultDrivesAccessLevel === "function") {
|
|
75081
|
-
server.setAllDefaultDrivesAccessLevel(accessLevel).catch(logger$
|
|
75061
|
+
server.setAllDefaultDrivesAccessLevel(accessLevel).catch(logger$3.error);
|
|
75082
75062
|
}
|
|
75083
75063
|
}, [readMode, ready]);
|
|
75084
75064
|
useEffect(() => {
|
|
75085
75065
|
if (!ready) {
|
|
75086
75066
|
return;
|
|
75087
75067
|
}
|
|
75088
|
-
getReadDrives(ReadModeInstance).then((drives) => setReadDrives(drives)).catch(logger$
|
|
75068
|
+
getReadDrives(ReadModeInstance).then((drives) => setReadDrives(drives)).catch(logger$3.error);
|
|
75089
75069
|
const unsubscribe = ReadModeInstance.onReadDrivesUpdate((newDrives) => {
|
|
75090
75070
|
setReadDrives(
|
|
75091
75071
|
(readDrives2) => readDrives2.length !== newDrives.length || drivesToHash$1(readDrives2) !== drivesToHash$1(newDrives) ? newDrives : readDrives2
|
|
75092
75072
|
);
|
|
75093
|
-
}).catch(logger$
|
|
75073
|
+
}).catch(logger$3.error);
|
|
75094
75074
|
return () => {
|
|
75095
|
-
unsubscribe.then((unsub) => unsub == null ? void 0 : unsub()).catch(logger$
|
|
75075
|
+
unsubscribe.then((unsub) => unsub == null ? void 0 : unsub()).catch(logger$3.error);
|
|
75096
75076
|
};
|
|
75097
75077
|
}, [ready]);
|
|
75098
75078
|
const context = useMemo(() => {
|
|
@@ -80718,7 +80698,7 @@ const DangerZone = ({
|
|
|
80718
80698
|
clearStorage().then(() => {
|
|
80719
80699
|
navigate("/");
|
|
80720
80700
|
onRefresh();
|
|
80721
|
-
}).catch(logger$
|
|
80701
|
+
}).catch(logger$3.error);
|
|
80722
80702
|
},
|
|
80723
80703
|
onCancel: () => showModal("settingsModal", { onRefresh })
|
|
80724
80704
|
});
|
|
@@ -88280,7 +88260,7 @@ async function createAnalyticsStore({ databaseName }) {
|
|
|
88280
88260
|
return globalAnalytics.store;
|
|
88281
88261
|
}
|
|
88282
88262
|
const { BrowserAnalyticsStore } = await __vitePreload(async () => {
|
|
88283
|
-
const { BrowserAnalyticsStore: BrowserAnalyticsStore2 } = await import("./browser-
|
|
88263
|
+
const { BrowserAnalyticsStore: BrowserAnalyticsStore2 } = await import("./browser-DwVW0p-5.js");
|
|
88284
88264
|
return { BrowserAnalyticsStore: BrowserAnalyticsStore2 };
|
|
88285
88265
|
}, true ? __vite__mapDeps([7,2,1,3]) : void 0);
|
|
88286
88266
|
const store = new BrowserAnalyticsStore({ databaseName });
|
|
@@ -88337,7 +88317,7 @@ class ProcessorManager {
|
|
|
88337
88317
|
this.drive = drive;
|
|
88338
88318
|
}
|
|
88339
88319
|
async registerFactory(identifier2, factory) {
|
|
88340
|
-
this.logger.
|
|
88320
|
+
this.logger.debug(`Registering factory '${identifier2}'.`);
|
|
88341
88321
|
this.idToFactory.set(identifier2, factory);
|
|
88342
88322
|
const driveIds = await this.drive.getDrives();
|
|
88343
88323
|
for (const driveId of driveIds) {
|
|
@@ -88356,7 +88336,7 @@ class ProcessorManager {
|
|
|
88356
88336
|
this.identifierToListeners.set(identifier2, []);
|
|
88357
88337
|
}
|
|
88358
88338
|
async registerDrive(driveId) {
|
|
88359
|
-
this.logger.
|
|
88339
|
+
this.logger.debug(`Registering drive '${driveId}'.`);
|
|
88360
88340
|
for (const [identifier2, factory] of this.idToFactory) {
|
|
88361
88341
|
await this.createProcessors(driveId, identifier2, factory);
|
|
88362
88342
|
}
|
|
@@ -88412,7 +88392,7 @@ atomStore.sub(reactorAtom, () => {
|
|
|
88412
88392
|
return atomStore.get(processorManagerAtom);
|
|
88413
88393
|
});
|
|
88414
88394
|
const Router = React__default.lazy(async () => {
|
|
88415
|
-
const createRouterComponent = await __vitePreload(() => import("./router-
|
|
88395
|
+
const createRouterComponent = await __vitePreload(() => import("./router-BzfSlrCZ.js").then((n2) => n2.r), true ? __vite__mapDeps([8,1,2,3]) : void 0);
|
|
88416
88396
|
const router = await createRouterComponent.default();
|
|
88417
88397
|
return { default: router };
|
|
88418
88398
|
});
|
|
@@ -88424,7 +88404,7 @@ const Preloader = () => {
|
|
|
88424
88404
|
return null;
|
|
88425
88405
|
};
|
|
88426
88406
|
const ReactorAnalyticsProvider = lazy(
|
|
88427
|
-
() => __vitePreload(() => import("./reactor-analytics-
|
|
88407
|
+
() => __vitePreload(() => import("./reactor-analytics-uLER5fzr.js"), true ? __vite__mapDeps([9,1,2,3]) : void 0)
|
|
88428
88408
|
);
|
|
88429
88409
|
const App = () => /* @__PURE__ */ jsx$1(React__default.StrictMode, { children: /* @__PURE__ */ jsx$1(Suspense, { fallback: /* @__PURE__ */ jsx$1(Fragment, {}), children: /* @__PURE__ */ jsxs(Provider, { store: atomStore, children: [
|
|
88430
88410
|
/* @__PURE__ */ jsx$1(Preloader, {}),
|
|
@@ -88448,7 +88428,7 @@ const app = /* @__PURE__ */ Object.freeze(/* @__PURE__ */ Object.defineProperty(
|
|
|
88448
88428
|
default: App
|
|
88449
88429
|
}, Symbol.toStringTag, { value: "Module" }));
|
|
88450
88430
|
export {
|
|
88451
|
-
|
|
88431
|
+
subscribeExternalPackages as $,
|
|
88452
88432
|
useUiNodesContext as A,
|
|
88453
88433
|
Button$1 as B,
|
|
88454
88434
|
CONFLICT as C,
|
|
@@ -88469,110 +88449,108 @@ export {
|
|
|
88469
88449
|
Router$1 as R,
|
|
88470
88450
|
SUCCESS as S,
|
|
88471
88451
|
AnalyticsProvider as T,
|
|
88472
|
-
|
|
88473
|
-
|
|
88452
|
+
RENOWN_URL as U,
|
|
88453
|
+
getEnsInfo as V,
|
|
88474
88454
|
WagmiContext$1 as W,
|
|
88475
|
-
|
|
88476
|
-
|
|
88477
|
-
|
|
88478
|
-
|
|
88455
|
+
ConnectCrypto as X,
|
|
88456
|
+
getHMRModule as Y,
|
|
88457
|
+
addExternalPackage as Z,
|
|
88458
|
+
removeExternalPackage as _,
|
|
88479
88459
|
PopoverTrigger as a,
|
|
88480
|
-
|
|
88481
|
-
|
|
88482
|
-
|
|
88483
|
-
|
|
88484
|
-
|
|
88485
|
-
|
|
88486
|
-
|
|
88487
|
-
|
|
88488
|
-
|
|
88489
|
-
|
|
88490
|
-
|
|
88491
|
-
|
|
88492
|
-
|
|
88493
|
-
|
|
88494
|
-
|
|
88495
|
-
|
|
88496
|
-
|
|
88497
|
-
|
|
88498
|
-
|
|
88499
|
-
|
|
88500
|
-
|
|
88501
|
-
|
|
88502
|
-
|
|
88503
|
-
|
|
88504
|
-
|
|
88505
|
-
|
|
88506
|
-
|
|
88507
|
-
|
|
88508
|
-
|
|
88509
|
-
|
|
88510
|
-
|
|
88511
|
-
|
|
88512
|
-
|
|
88513
|
-
|
|
88514
|
-
|
|
88515
|
-
|
|
88516
|
-
|
|
88517
|
-
|
|
88518
|
-
|
|
88519
|
-
|
|
88520
|
-
|
|
88521
|
-
|
|
88522
|
-
|
|
88523
|
-
|
|
88524
|
-
|
|
88525
|
-
|
|
88526
|
-
|
|
88527
|
-
|
|
88528
|
-
|
|
88529
|
-
|
|
88530
|
-
|
|
88531
|
-
|
|
88532
|
-
|
|
88533
|
-
|
|
88534
|
-
|
|
88535
|
-
|
|
88536
|
-
|
|
88537
|
-
|
|
88538
|
-
|
|
88539
|
-
|
|
88540
|
-
|
|
88541
|
-
|
|
88542
|
-
|
|
88543
|
-
|
|
88460
|
+
Content2 as a$,
|
|
88461
|
+
RENOWN_NETWORK_ID as a0,
|
|
88462
|
+
RENOWN_CHAIN_ID as a1,
|
|
88463
|
+
getChain as a2,
|
|
88464
|
+
DateTime as a3,
|
|
88465
|
+
AnalyticsPath as a4,
|
|
88466
|
+
PassthroughAnalyticsProfiler as a5,
|
|
88467
|
+
clsx as a6,
|
|
88468
|
+
get as a7,
|
|
88469
|
+
set as a8,
|
|
88470
|
+
appendErrors as a9,
|
|
88471
|
+
deleteOperation as aA,
|
|
88472
|
+
addOperationError as aB,
|
|
88473
|
+
deleteOperationError as aC,
|
|
88474
|
+
setOperationErrorName as aD,
|
|
88475
|
+
BaseError$3 as aE,
|
|
88476
|
+
getUrl as aF,
|
|
88477
|
+
stringify$1 as aG,
|
|
88478
|
+
decodeErrorResult as aH,
|
|
88479
|
+
isAddressEqual as aI,
|
|
88480
|
+
call as aJ,
|
|
88481
|
+
concat$3 as aK,
|
|
88482
|
+
encodeAbiParameters as aL,
|
|
88483
|
+
HttpRequestError as aM,
|
|
88484
|
+
isHex as aN,
|
|
88485
|
+
mergeClassNameProps as aO,
|
|
88486
|
+
MISSING as aP,
|
|
88487
|
+
SYNCING as aQ,
|
|
88488
|
+
INITIAL_SYNC as aR,
|
|
88489
|
+
ConnectDropdownMenu as aS,
|
|
88490
|
+
useOnClickOutside as aT,
|
|
88491
|
+
useEventListener as aU,
|
|
88492
|
+
useCopyToClipboard as aV,
|
|
88493
|
+
Select as aW,
|
|
88494
|
+
Provider$1 as aX,
|
|
88495
|
+
Root3 as aY,
|
|
88496
|
+
Trigger$1 as aZ,
|
|
88497
|
+
Portal as a_,
|
|
88498
|
+
useFormContext as aa,
|
|
88499
|
+
Primitive as ab,
|
|
88500
|
+
cva as ac,
|
|
88501
|
+
FormProvider as ad,
|
|
88502
|
+
Controller as ae,
|
|
88503
|
+
Slot as af,
|
|
88504
|
+
useForm as ag,
|
|
88505
|
+
Root2 as ah,
|
|
88506
|
+
List as ai,
|
|
88507
|
+
Trigger as aj,
|
|
88508
|
+
Content$1 as ak,
|
|
88509
|
+
setModelName as al,
|
|
88510
|
+
setModelId as am,
|
|
88511
|
+
setModelDescription as an,
|
|
88512
|
+
setModelExtension as ao,
|
|
88513
|
+
setAuthorName as ap,
|
|
88514
|
+
setAuthorWebsite as aq,
|
|
88515
|
+
setStateSchema as ar,
|
|
88516
|
+
setInitialState as as,
|
|
88517
|
+
addModule as at,
|
|
88518
|
+
setModuleName as au,
|
|
88519
|
+
deleteModule as av,
|
|
88520
|
+
addOperation as aw,
|
|
88521
|
+
setOperationName as ax,
|
|
88522
|
+
setOperationSchema as ay,
|
|
88523
|
+
setOperationDescription as az,
|
|
88544
88524
|
PopoverContent as b,
|
|
88545
|
-
|
|
88546
|
-
|
|
88547
|
-
|
|
88548
|
-
|
|
88549
|
-
|
|
88550
|
-
|
|
88551
|
-
|
|
88552
|
-
|
|
88553
|
-
|
|
88554
|
-
|
|
88555
|
-
|
|
88556
|
-
|
|
88557
|
-
|
|
88558
|
-
|
|
88559
|
-
|
|
88560
|
-
|
|
88561
|
-
|
|
88562
|
-
|
|
88563
|
-
|
|
88564
|
-
|
|
88565
|
-
|
|
88566
|
-
|
|
88567
|
-
|
|
88568
|
-
|
|
88569
|
-
|
|
88570
|
-
|
|
88571
|
-
|
|
88572
|
-
|
|
88573
|
-
|
|
88574
|
-
useDocumentDriveById as bt,
|
|
88575
|
-
app as bu,
|
|
88525
|
+
validateInitialState as b0,
|
|
88526
|
+
validateStateSchemaName as b1,
|
|
88527
|
+
validateModules as b2,
|
|
88528
|
+
useDocumentDrives as b3,
|
|
88529
|
+
useDriveContext as b4,
|
|
88530
|
+
FILE as b5,
|
|
88531
|
+
useConnectDid as b6,
|
|
88532
|
+
useConnectCrypto as b7,
|
|
88533
|
+
useAtomValue as b8,
|
|
88534
|
+
themeAtom as b9,
|
|
88535
|
+
useUser as ba,
|
|
88536
|
+
useUserPermissions as bb,
|
|
88537
|
+
exportFile as bc,
|
|
88538
|
+
useGetDocumentModelModule as bd,
|
|
88539
|
+
addActionContext as be,
|
|
88540
|
+
signOperation as bf,
|
|
88541
|
+
useHotkeys as bg,
|
|
88542
|
+
DriveLayout as bh,
|
|
88543
|
+
DriveContextProvider as bi,
|
|
88544
|
+
SearchBar as bj,
|
|
88545
|
+
useQueryClient as bk,
|
|
88546
|
+
useAnalyticsEngine as bl,
|
|
88547
|
+
AnalyticsGranularity as bm,
|
|
88548
|
+
useGetEditor as bn,
|
|
88549
|
+
isSameDocument as bo,
|
|
88550
|
+
useFilteredDocumentModels as bp,
|
|
88551
|
+
useDriveEditor as bq,
|
|
88552
|
+
useDocumentDriveById as br,
|
|
88553
|
+
app as bs,
|
|
88576
88554
|
getEnsName as c,
|
|
88577
88555
|
BaseError$1 as d,
|
|
88578
88556
|
useDocumentDriveServer as e,
|
|
@@ -88598,4 +88576,4 @@ export {
|
|
|
88598
88576
|
isLatestVersion as y,
|
|
88599
88577
|
useParams as z
|
|
88600
88578
|
};
|
|
88601
|
-
//# sourceMappingURL=app-
|
|
88579
|
+
//# sourceMappingURL=app-CMvmK1ZV.js.map
|