@redmix/api 9.0.0-canary.580 → 9.0.0-canary.582

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (167) hide show
  1. package/dist/auth/index.d.ts +2 -2
  2. package/dist/auth/index.d.ts.map +1 -1
  3. package/dist/auth/index.js +10 -49
  4. package/dist/auth/parseJWT.js +3 -26
  5. package/dist/auth/verifiers/base64Sha1Verifier.d.ts +1 -1
  6. package/dist/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -1
  7. package/dist/auth/verifiers/base64Sha1Verifier.js +18 -37
  8. package/dist/auth/verifiers/base64Sha256Verifier.d.ts +1 -1
  9. package/dist/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -1
  10. package/dist/auth/verifiers/base64Sha256Verifier.js +18 -37
  11. package/dist/auth/verifiers/common.d.ts +8 -8
  12. package/dist/auth/verifiers/common.d.ts.map +1 -1
  13. package/dist/auth/verifiers/common.js +19 -58
  14. package/dist/auth/verifiers/index.d.ts +2 -2
  15. package/dist/auth/verifiers/index.d.ts.map +1 -1
  16. package/dist/auth/verifiers/index.js +8 -33
  17. package/dist/auth/verifiers/jwtVerifier.d.ts +1 -1
  18. package/dist/auth/verifiers/jwtVerifier.d.ts.map +1 -1
  19. package/dist/auth/verifiers/jwtVerifier.js +17 -47
  20. package/dist/auth/verifiers/secretKeyVerifier.d.ts +1 -1
  21. package/dist/auth/verifiers/secretKeyVerifier.d.ts.map +1 -1
  22. package/dist/auth/verifiers/secretKeyVerifier.js +7 -26
  23. package/dist/auth/verifiers/sha1Verifier.d.ts +1 -1
  24. package/dist/auth/verifiers/sha1Verifier.d.ts.map +1 -1
  25. package/dist/auth/verifiers/sha1Verifier.js +18 -37
  26. package/dist/auth/verifiers/sha256Verifier.d.ts +1 -1
  27. package/dist/auth/verifiers/sha256Verifier.d.ts.map +1 -1
  28. package/dist/auth/verifiers/sha256Verifier.js +18 -37
  29. package/dist/auth/verifiers/skipVerifier.d.ts +1 -1
  30. package/dist/auth/verifiers/skipVerifier.d.ts.map +1 -1
  31. package/dist/auth/verifiers/skipVerifier.js +4 -23
  32. package/dist/auth/verifiers/timestampSchemeVerifier.d.ts +1 -1
  33. package/dist/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -1
  34. package/dist/auth/verifiers/timestampSchemeVerifier.js +18 -33
  35. package/dist/cache/clients/BaseClient.js +4 -23
  36. package/dist/cache/clients/InMemoryClient.d.ts +1 -1
  37. package/dist/cache/clients/InMemoryClient.d.ts.map +1 -1
  38. package/dist/cache/clients/InMemoryClient.js +6 -35
  39. package/dist/cache/clients/MemcachedClient.d.ts +1 -1
  40. package/dist/cache/clients/MemcachedClient.d.ts.map +1 -1
  41. package/dist/cache/clients/MemcachedClient.js +6 -35
  42. package/dist/cache/clients/RedisClient.d.ts +2 -2
  43. package/dist/cache/clients/RedisClient.d.ts.map +1 -1
  44. package/dist/cache/clients/RedisClient.js +6 -35
  45. package/dist/cache/errors.js +3 -26
  46. package/dist/cache/index.d.ts +5 -5
  47. package/dist/cache/index.d.ts.map +1 -1
  48. package/dist/cache/index.js +14 -52
  49. package/dist/cjs/auth/index.d.ts +51 -0
  50. package/dist/cjs/auth/index.d.ts.map +1 -0
  51. package/dist/cjs/auth/index.js +129 -0
  52. package/dist/cjs/auth/parseJWT.d.ts +6 -0
  53. package/dist/cjs/auth/parseJWT.d.ts.map +1 -0
  54. package/dist/cjs/auth/parseJWT.js +57 -0
  55. package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts +19 -0
  56. package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -0
  57. package/dist/cjs/auth/verifiers/base64Sha1Verifier.js +77 -0
  58. package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts +19 -0
  59. package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -0
  60. package/dist/cjs/auth/verifiers/base64Sha256Verifier.js +77 -0
  61. package/dist/cjs/auth/verifiers/common.d.ts +104 -0
  62. package/dist/cjs/auth/verifiers/common.d.ts.map +1 -0
  63. package/dist/cjs/auth/verifiers/common.js +99 -0
  64. package/dist/cjs/auth/verifiers/index.d.ts +8 -0
  65. package/dist/cjs/auth/verifiers/index.d.ts.map +1 -0
  66. package/dist/cjs/auth/verifiers/index.js +38 -0
  67. package/dist/cjs/auth/verifiers/jwtVerifier.d.ts +26 -0
  68. package/dist/cjs/auth/verifiers/jwtVerifier.d.ts.map +1 -0
  69. package/dist/cjs/auth/verifiers/jwtVerifier.js +86 -0
  70. package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts +14 -0
  71. package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts.map +1 -0
  72. package/dist/cjs/auth/verifiers/secretKeyVerifier.js +40 -0
  73. package/dist/cjs/auth/verifiers/sha1Verifier.d.ts +25 -0
  74. package/dist/cjs/auth/verifiers/sha1Verifier.d.ts.map +1 -0
  75. package/dist/cjs/auth/verifiers/sha1Verifier.js +85 -0
  76. package/dist/cjs/auth/verifiers/sha256Verifier.d.ts +25 -0
  77. package/dist/cjs/auth/verifiers/sha256Verifier.d.ts.map +1 -0
  78. package/dist/cjs/auth/verifiers/sha256Verifier.js +85 -0
  79. package/dist/cjs/auth/verifiers/skipVerifier.d.ts +13 -0
  80. package/dist/cjs/auth/verifiers/skipVerifier.d.ts.map +1 -0
  81. package/dist/cjs/auth/verifiers/skipVerifier.js +37 -0
  82. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts +16 -0
  83. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -0
  84. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.js +81 -0
  85. package/dist/cjs/bins/redwood.d.ts +9 -0
  86. package/dist/cjs/bins/redwood.d.ts.map +1 -0
  87. package/dist/cjs/bins/rwfw.d.ts +3 -0
  88. package/dist/cjs/bins/rwfw.d.ts.map +1 -0
  89. package/dist/cjs/bins/tsc.d.ts +3 -0
  90. package/dist/cjs/bins/tsc.d.ts.map +1 -0
  91. package/dist/{bins → cjs/bins}/tsc.js +2 -2
  92. package/dist/cjs/cache/clients/BaseClient.d.ts +11 -0
  93. package/dist/cjs/cache/clients/BaseClient.d.ts.map +1 -0
  94. package/dist/cjs/cache/clients/BaseClient.js +27 -0
  95. package/dist/cjs/cache/clients/InMemoryClient.d.ts +31 -0
  96. package/dist/cjs/cache/clients/InMemoryClient.d.ts.map +1 -0
  97. package/dist/cjs/cache/clients/InMemoryClient.js +100 -0
  98. package/dist/cjs/cache/clients/MemcachedClient.d.ts +16 -0
  99. package/dist/cjs/cache/clients/MemcachedClient.d.ts.map +1 -0
  100. package/dist/cjs/cache/clients/MemcachedClient.js +75 -0
  101. package/dist/cjs/cache/clients/RedisClient.d.ts +20 -0
  102. package/dist/cjs/cache/clients/RedisClient.d.ts.map +1 -0
  103. package/dist/cjs/cache/clients/RedisClient.js +79 -0
  104. package/dist/cjs/cache/errors.d.ts +4 -0
  105. package/dist/cjs/cache/errors.d.ts.map +1 -0
  106. package/dist/cjs/cache/errors.js +33 -0
  107. package/dist/cjs/cache/index.d.ts +35 -0
  108. package/dist/cjs/cache/index.d.ts.map +1 -0
  109. package/dist/cjs/cache/index.js +171 -0
  110. package/dist/cjs/cors.d.ts +16 -0
  111. package/dist/cjs/cors.d.ts.map +1 -0
  112. package/dist/cjs/cors.js +93 -0
  113. package/dist/cjs/errors.d.ts +5 -0
  114. package/dist/cjs/errors.d.ts.map +1 -0
  115. package/dist/cjs/errors.js +38 -0
  116. package/dist/cjs/event.d.ts +3 -0
  117. package/dist/cjs/event.d.ts.map +1 -0
  118. package/dist/cjs/event.js +34 -0
  119. package/dist/cjs/functions/fixtures/apiGatewayProxyEvent.fixture.d.ts +4 -0
  120. package/dist/cjs/functions/fixtures/apiGatewayProxyEvent.fixture.d.ts.map +1 -0
  121. package/dist/cjs/functions/fixtures/apiGatewayProxyEvent.fixture.js +72 -0
  122. package/dist/cjs/index.d.ts +11 -0
  123. package/dist/cjs/index.d.ts.map +1 -0
  124. package/dist/cjs/index.js +63 -0
  125. package/dist/cjs/logger/index.d.ts +179 -0
  126. package/dist/cjs/logger/index.d.ts.map +1 -0
  127. package/dist/cjs/logger/index.js +195 -0
  128. package/dist/cjs/package.json +1 -0
  129. package/dist/cjs/transforms.d.ts +35 -0
  130. package/dist/cjs/transforms.d.ts.map +1 -0
  131. package/dist/cjs/transforms.js +98 -0
  132. package/dist/cjs/types.d.ts +25 -0
  133. package/dist/cjs/types.d.ts.map +1 -0
  134. package/dist/cjs/types.js +16 -0
  135. package/dist/cjs/validations/errors.d.ts +101 -0
  136. package/dist/cjs/validations/errors.d.ts.map +1 -0
  137. package/dist/cjs/validations/errors.js +298 -0
  138. package/dist/cjs/validations/validations.d.ts +222 -0
  139. package/dist/cjs/validations/validations.d.ts.map +1 -0
  140. package/dist/cjs/validations/validations.js +351 -0
  141. package/dist/cjs/webhooks/index.d.ts +76 -0
  142. package/dist/cjs/webhooks/index.d.ts.map +1 -0
  143. package/dist/cjs/webhooks/index.js +107 -0
  144. package/dist/cors.d.ts +1 -1
  145. package/dist/cors.d.ts.map +1 -1
  146. package/dist/cors.js +7 -30
  147. package/dist/errors.js +3 -26
  148. package/dist/event.js +5 -28
  149. package/dist/functions/fixtures/apiGatewayProxyEvent.fixture.js +4 -27
  150. package/dist/index.d.ts +8 -8
  151. package/dist/index.d.ts.map +1 -1
  152. package/dist/index.js +17 -46
  153. package/dist/logger/index.d.ts.map +1 -1
  154. package/dist/logger/index.js +6 -48
  155. package/dist/package.json +1 -0
  156. package/dist/transforms.js +6 -33
  157. package/dist/types.js +1 -16
  158. package/dist/validations/errors.d.ts +1 -1
  159. package/dist/validations/errors.d.ts.map +1 -1
  160. package/dist/validations/errors.js +8 -66
  161. package/dist/validations/validations.js +8 -44
  162. package/dist/webhooks/index.d.ts +3 -3
  163. package/dist/webhooks/index.d.ts.map +1 -1
  164. package/dist/webhooks/index.js +25 -46
  165. package/package.json +53 -18
  166. /package/dist/{bins → cjs/bins}/redwood.js +0 -0
  167. /package/dist/{bins → cjs/bins}/rwfw.js +0 -0
@@ -1,55 +1,25 @@
1
- "use strict";
2
- var __create = Object.create;
3
- var __defProp = Object.defineProperty;
4
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
- var __getOwnPropNames = Object.getOwnPropertyNames;
6
- var __getProtoOf = Object.getPrototypeOf;
7
- var __hasOwnProp = Object.prototype.hasOwnProperty;
8
- var __export = (target, all) => {
9
- for (var name in all)
10
- __defProp(target, name, { get: all[name], enumerable: true });
11
- };
12
- var __copyProps = (to, from, except, desc) => {
13
- if (from && typeof from === "object" || typeof from === "function") {
14
- for (let key of __getOwnPropNames(from))
15
- if (!__hasOwnProp.call(to, key) && key !== except)
16
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
- }
18
- return to;
19
- };
20
- var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
- // If the importer is in node compatibility mode or this is not an ESM
22
- // file that has been converted to a CommonJS file using a Babel-
23
- // compatible transform (i.e. "__esModule" has not been set), then set
24
- // "default" to the CommonJS "module.exports" for node compatibility.
25
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
- mod
27
- ));
28
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
- var jwtVerifier_exports = {};
30
- __export(jwtVerifier_exports, {
31
- default: () => jwtVerifier_default,
32
- jwtVerifier: () => jwtVerifier,
33
- verifySignature: () => verifySignature
34
- });
35
- module.exports = __toCommonJS(jwtVerifier_exports);
36
- var import_jsonwebtoken = __toESM(require("jsonwebtoken"));
37
- var import_common = require("./common");
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
2
+ import jwt from "jsonwebtoken";
3
+ import {
4
+ WebhookSignError,
5
+ WebhookVerificationError,
6
+ DEFAULT_WEBHOOK_SECRET
7
+ } from "./common.js";
38
8
  const createSignature = ({
39
9
  payload,
40
- secret = import_common.DEFAULT_WEBHOOK_SECRET,
10
+ secret = DEFAULT_WEBHOOK_SECRET,
41
11
  options
42
12
  }) => {
43
13
  try {
44
14
  const signOptions = options?.issuer ? { issuer: options?.issuer } : void 0;
45
- return import_jsonwebtoken.default.sign(payload, secret, { ...signOptions });
15
+ return jwt.sign(payload, secret, { ...signOptions });
46
16
  } catch (error) {
47
- throw new import_common.WebhookSignError(error.message);
17
+ throw new WebhookSignError(error.message);
48
18
  }
49
19
  };
50
20
  const verifySignature = ({
51
21
  payload,
52
- secret = import_common.DEFAULT_WEBHOOK_SECRET,
22
+ secret = DEFAULT_WEBHOOK_SECRET,
53
23
  signature,
54
24
  options
55
25
  }) => {
@@ -58,13 +28,13 @@ const verifySignature = ({
58
28
  console.warn("Missing payload");
59
29
  }
60
30
  if (options?.issuer) {
61
- import_jsonwebtoken.default.verify(signature, secret, { issuer: options?.issuer });
31
+ jwt.verify(signature, secret, { issuer: options?.issuer });
62
32
  } else {
63
- import_jsonwebtoken.default.verify(signature, secret);
33
+ jwt.verify(signature, secret);
64
34
  }
65
35
  return true;
66
36
  } catch {
67
- throw new import_common.WebhookVerificationError();
37
+ throw new WebhookVerificationError();
68
38
  }
69
39
  };
70
40
  const jwtVerifier = (options) => {
@@ -79,8 +49,8 @@ const jwtVerifier = (options) => {
79
49
  };
80
50
  };
81
51
  var jwtVerifier_default = jwtVerifier;
82
- // Annotate the CommonJS export names for ESM import in node:
83
- 0 && (module.exports = {
52
+ export {
53
+ jwtVerifier_default as default,
84
54
  jwtVerifier,
85
55
  verifySignature
86
- });
56
+ };
@@ -1,4 +1,4 @@
1
- import type { WebhookVerifier, VerifyOptions } from './common';
1
+ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface SecretKeyVerifier extends WebhookVerifier {
3
3
  type: 'secretKeyVerifier';
4
4
  }
@@ -1 +1 @@
1
- {"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAE9D,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;;;GAMG;AACH,QAAA,MAAM,iBAAiB,cAAe,aAAa,KAAG,iBAgBrD,CAAA;AAED,eAAe,iBAAiB,CAAA"}
1
+ {"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;;;GAMG;AACH,QAAA,MAAM,iBAAiB,cAAe,aAAa,KAAG,iBAgBrD,CAAA;AAED,eAAe,iBAAiB,CAAA"}
@@ -1,36 +1,14 @@
1
- "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
- var __getOwnPropNames = Object.getOwnPropertyNames;
5
- var __hasOwnProp = Object.prototype.hasOwnProperty;
6
- var __export = (target, all) => {
7
- for (var name in all)
8
- __defProp(target, name, { get: all[name], enumerable: true });
9
- };
10
- var __copyProps = (to, from, except, desc) => {
11
- if (from && typeof from === "object" || typeof from === "function") {
12
- for (let key of __getOwnPropNames(from))
13
- if (!__hasOwnProp.call(to, key) && key !== except)
14
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
- }
16
- return to;
17
- };
18
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var secretKeyVerifier_exports = {};
20
- __export(secretKeyVerifier_exports, {
21
- default: () => secretKeyVerifier_default
22
- });
23
- module.exports = __toCommonJS(secretKeyVerifier_exports);
24
- var import_common = require("./common");
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
2
+ import { WebhookVerificationError, DEFAULT_WEBHOOK_SECRET } from "./common.js";
25
3
  const secretKeyVerifier = (_options) => {
26
4
  return {
27
5
  sign: ({ secret }) => {
28
6
  return secret;
29
7
  },
30
- verify: ({ signature, secret = import_common.DEFAULT_WEBHOOK_SECRET }) => {
8
+ verify: ({ signature, secret = DEFAULT_WEBHOOK_SECRET }) => {
31
9
  const verified = signature === secret;
32
10
  if (!verified) {
33
- throw new import_common.WebhookVerificationError();
11
+ throw new WebhookVerificationError();
34
12
  }
35
13
  return verified;
36
14
  },
@@ -38,3 +16,6 @@ const secretKeyVerifier = (_options) => {
38
16
  };
39
17
  };
40
18
  var secretKeyVerifier_default = secretKeyVerifier;
19
+ export {
20
+ secretKeyVerifier_default as default
21
+ };
@@ -1,4 +1,4 @@
1
- import type { WebhookVerifier, VerifyOptions } from './common';
1
+ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface Sha1Verifier extends WebhookVerifier {
3
3
  type: 'sha1Verifier';
4
4
  }
@@ -1 +1 @@
1
- {"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAE9D,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,oCAIzB;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,YAAY,cAAe,aAAa,KAAG,YAUhD,CAAA;AAED,eAAe,YAAY,CAAA"}
1
+ {"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,oCAIzB;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,YAAY,cAAe,aAAa,KAAG,YAUhD,CAAA;AAED,eAAe,YAAY,CAAA"}
@@ -1,29 +1,10 @@
1
- "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
- var __getOwnPropNames = Object.getOwnPropertyNames;
5
- var __hasOwnProp = Object.prototype.hasOwnProperty;
6
- var __export = (target, all) => {
7
- for (var name in all)
8
- __defProp(target, name, { get: all[name], enumerable: true });
9
- };
10
- var __copyProps = (to, from, except, desc) => {
11
- if (from && typeof from === "object" || typeof from === "function") {
12
- for (let key of __getOwnPropNames(from))
13
- if (!__hasOwnProp.call(to, key) && key !== except)
14
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
- }
16
- return to;
17
- };
18
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var sha1Verifier_exports = {};
20
- __export(sha1Verifier_exports, {
21
- default: () => sha1Verifier_default,
22
- verifySignature: () => verifySignature
23
- });
24
- module.exports = __toCommonJS(sha1Verifier_exports);
25
- var import_crypto = require("crypto");
26
- var import_common = require("./common");
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
2
+ import { createHmac, timingSafeEqual } from "crypto";
3
+ import {
4
+ WebhookVerificationError,
5
+ VERIFICATION_ERROR_MESSAGE,
6
+ DEFAULT_WEBHOOK_SECRET
7
+ } from "./common.js";
27
8
  function toNormalizedJsonString(payload) {
28
9
  return JSON.stringify(payload).replace(/[^\\]\\u[\da-f]{4}/g, (s) => {
29
10
  return s.substr(0, 3) + s.substr(3).toUpperCase();
@@ -31,10 +12,10 @@ function toNormalizedJsonString(payload) {
31
12
  }
32
13
  const createSignature = ({
33
14
  payload,
34
- secret = import_common.DEFAULT_WEBHOOK_SECRET
15
+ secret = DEFAULT_WEBHOOK_SECRET
35
16
  }) => {
36
17
  const algorithm = "sha1";
37
- const hmac = (0, import_crypto.createHmac)(algorithm, secret);
18
+ const hmac = createHmac(algorithm, secret);
38
19
  payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
39
20
  const digest = Buffer.from(
40
21
  algorithm + "=" + hmac.update(payload).digest("hex"),
@@ -44,26 +25,26 @@ const createSignature = ({
44
25
  };
45
26
  const verifySignature = ({
46
27
  payload,
47
- secret = import_common.DEFAULT_WEBHOOK_SECRET,
28
+ secret = DEFAULT_WEBHOOK_SECRET,
48
29
  signature
49
30
  }) => {
50
31
  try {
51
32
  const algorithm = signature.split("=")[0];
52
33
  const webhookSignature = Buffer.from(signature || "", "utf8");
53
- const hmac = (0, import_crypto.createHmac)(algorithm, secret);
34
+ const hmac = createHmac(algorithm, secret);
54
35
  payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
55
36
  const digest = Buffer.from(
56
37
  algorithm + "=" + hmac.update(payload).digest("hex"),
57
38
  "utf8"
58
39
  );
59
- const verified = webhookSignature.length === digest.length && (0, import_crypto.timingSafeEqual)(digest, webhookSignature);
40
+ const verified = webhookSignature.length === digest.length && timingSafeEqual(digest, webhookSignature);
60
41
  if (verified) {
61
42
  return verified;
62
43
  }
63
- throw new import_common.WebhookVerificationError();
44
+ throw new WebhookVerificationError();
64
45
  } catch (error) {
65
- throw new import_common.WebhookVerificationError(
66
- `${import_common.VERIFICATION_ERROR_MESSAGE}: ${error.message}`
46
+ throw new WebhookVerificationError(
47
+ `${VERIFICATION_ERROR_MESSAGE}: ${error.message}`
67
48
  );
68
49
  }
69
50
  };
@@ -79,7 +60,7 @@ const sha1Verifier = (_options) => {
79
60
  };
80
61
  };
81
62
  var sha1Verifier_default = sha1Verifier;
82
- // Annotate the CommonJS export names for ESM import in node:
83
- 0 && (module.exports = {
63
+ export {
64
+ sha1Verifier_default as default,
84
65
  verifySignature
85
- });
66
+ };
@@ -1,4 +1,4 @@
1
- import type { WebhookVerifier, VerifyOptions } from './common';
1
+ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface Sha256Verifier extends WebhookVerifier {
3
3
  type: 'sha256Verifier';
4
4
  }
@@ -1 +1 @@
1
- {"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAE9D,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,oCAIzB;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,cAAc,cAAe,aAAa,KAAG,cAUlD,CAAA;AAED,eAAe,cAAc,CAAA"}
1
+ {"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,oCAIzB;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,cAAc,cAAe,aAAa,KAAG,cAUlD,CAAA;AAED,eAAe,cAAc,CAAA"}
@@ -1,29 +1,10 @@
1
- "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
- var __getOwnPropNames = Object.getOwnPropertyNames;
5
- var __hasOwnProp = Object.prototype.hasOwnProperty;
6
- var __export = (target, all) => {
7
- for (var name in all)
8
- __defProp(target, name, { get: all[name], enumerable: true });
9
- };
10
- var __copyProps = (to, from, except, desc) => {
11
- if (from && typeof from === "object" || typeof from === "function") {
12
- for (let key of __getOwnPropNames(from))
13
- if (!__hasOwnProp.call(to, key) && key !== except)
14
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
- }
16
- return to;
17
- };
18
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var sha256Verifier_exports = {};
20
- __export(sha256Verifier_exports, {
21
- default: () => sha256Verifier_default,
22
- verifySignature: () => verifySignature
23
- });
24
- module.exports = __toCommonJS(sha256Verifier_exports);
25
- var import_crypto = require("crypto");
26
- var import_common = require("./common");
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
2
+ import { createHmac, timingSafeEqual } from "crypto";
3
+ import {
4
+ WebhookVerificationError,
5
+ VERIFICATION_ERROR_MESSAGE,
6
+ DEFAULT_WEBHOOK_SECRET
7
+ } from "./common.js";
27
8
  function toNormalizedJsonString(payload) {
28
9
  return JSON.stringify(payload).replace(/[^\\]\\u[\da-f]{4}/g, (s) => {
29
10
  return s.substr(0, 3) + s.substr(3).toUpperCase();
@@ -31,10 +12,10 @@ function toNormalizedJsonString(payload) {
31
12
  }
32
13
  const createSignature = ({
33
14
  payload,
34
- secret = import_common.DEFAULT_WEBHOOK_SECRET
15
+ secret = DEFAULT_WEBHOOK_SECRET
35
16
  }) => {
36
17
  const algorithm = "sha256";
37
- const hmac = (0, import_crypto.createHmac)(algorithm, secret);
18
+ const hmac = createHmac(algorithm, secret);
38
19
  payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
39
20
  const digest = Buffer.from(
40
21
  algorithm + "=" + hmac.update(payload).digest("hex"),
@@ -44,26 +25,26 @@ const createSignature = ({
44
25
  };
45
26
  const verifySignature = ({
46
27
  payload,
47
- secret = import_common.DEFAULT_WEBHOOK_SECRET,
28
+ secret = DEFAULT_WEBHOOK_SECRET,
48
29
  signature
49
30
  }) => {
50
31
  try {
51
32
  const algorithm = signature.split("=")[0];
52
33
  const webhookSignature = Buffer.from(signature || "", "utf8");
53
- const hmac = (0, import_crypto.createHmac)(algorithm, secret);
34
+ const hmac = createHmac(algorithm, secret);
54
35
  payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
55
36
  const digest = Buffer.from(
56
37
  algorithm + "=" + hmac.update(payload).digest("hex"),
57
38
  "utf8"
58
39
  );
59
- const verified = webhookSignature.length === digest.length && (0, import_crypto.timingSafeEqual)(digest, webhookSignature);
40
+ const verified = webhookSignature.length === digest.length && timingSafeEqual(digest, webhookSignature);
60
41
  if (verified) {
61
42
  return verified;
62
43
  }
63
- throw new import_common.WebhookVerificationError();
44
+ throw new WebhookVerificationError();
64
45
  } catch (error) {
65
- throw new import_common.WebhookVerificationError(
66
- `${import_common.VERIFICATION_ERROR_MESSAGE}: ${error.message}`
46
+ throw new WebhookVerificationError(
47
+ `${VERIFICATION_ERROR_MESSAGE}: ${error.message}`
67
48
  );
68
49
  }
69
50
  };
@@ -79,7 +60,7 @@ const sha256Verifier = (_options) => {
79
60
  };
80
61
  };
81
62
  var sha256Verifier_default = sha256Verifier;
82
- // Annotate the CommonJS export names for ESM import in node:
83
- 0 && (module.exports = {
63
+ export {
64
+ sha256Verifier_default as default,
84
65
  verifySignature
85
- });
66
+ };
@@ -1,4 +1,4 @@
1
- import type { VerifyOptions, WebhookVerifier } from './common';
1
+ import type { VerifyOptions, WebhookVerifier } from './common.js';
2
2
  export interface SkipVerifier extends WebhookVerifier {
3
3
  type: 'skipVerifier';
4
4
  }
@@ -1 +1 @@
1
- {"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,UAAU,CAAA;AAE9D,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AACD;;;;;GAKG;AACH,QAAA,MAAM,YAAY,cAAe,aAAa,KAAG,YAYhD,CAAA;AAED,eAAe,YAAY,CAAA"}
1
+ {"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AACD;;;;;GAKG;AACH,QAAA,MAAM,YAAY,cAAe,aAAa,KAAG,YAYhD,CAAA;AAED,eAAe,YAAY,CAAA"}
@@ -1,26 +1,4 @@
1
- "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
- var __getOwnPropNames = Object.getOwnPropertyNames;
5
- var __hasOwnProp = Object.prototype.hasOwnProperty;
6
- var __export = (target, all) => {
7
- for (var name in all)
8
- __defProp(target, name, { get: all[name], enumerable: true });
9
- };
10
- var __copyProps = (to, from, except, desc) => {
11
- if (from && typeof from === "object" || typeof from === "function") {
12
- for (let key of __getOwnPropNames(from))
13
- if (!__hasOwnProp.call(to, key) && key !== except)
14
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
- }
16
- return to;
17
- };
18
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var skipVerifier_exports = {};
20
- __export(skipVerifier_exports, {
21
- default: () => skipVerifier_default
22
- });
23
- module.exports = __toCommonJS(skipVerifier_exports);
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
24
2
  const skipVerifier = (_options) => {
25
3
  return {
26
4
  sign: () => {
@@ -35,3 +13,6 @@ const skipVerifier = (_options) => {
35
13
  };
36
14
  };
37
15
  var skipVerifier_default = skipVerifier;
16
+ export {
17
+ skipVerifier_default as default
18
+ };
@@ -1,4 +1,4 @@
1
- import type { WebhookVerifier, VerifyOptions } from './common';
1
+ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface TimestampSchemeVerifier extends WebhookVerifier {
3
3
  type: 'timestampSchemeVerifier';
4
4
  }
@@ -1 +1 @@
1
- {"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAE9D,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;;;GAQG;AACH,QAAA,MAAM,uBAAuB,aACjB,aAAa,KACtB,uBAcF,CAAA;AAED,eAAe,uBAAuB,CAAA"}
1
+ {"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;;;GAQG;AACH,QAAA,MAAM,uBAAuB,aACjB,aAAa,KACtB,uBAcF,CAAA;AAED,eAAe,uBAAuB,CAAA"}
@@ -1,37 +1,19 @@
1
- "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
- var __getOwnPropNames = Object.getOwnPropertyNames;
5
- var __hasOwnProp = Object.prototype.hasOwnProperty;
6
- var __export = (target, all) => {
7
- for (var name in all)
8
- __defProp(target, name, { get: all[name], enumerable: true });
9
- };
10
- var __copyProps = (to, from, except, desc) => {
11
- if (from && typeof from === "object" || typeof from === "function") {
12
- for (let key of __getOwnPropNames(from))
13
- if (!__hasOwnProp.call(to, key) && key !== except)
14
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
- }
16
- return to;
17
- };
18
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var timestampSchemeVerifier_exports = {};
20
- __export(timestampSchemeVerifier_exports, {
21
- default: () => timestampSchemeVerifier_default
22
- });
23
- module.exports = __toCommonJS(timestampSchemeVerifier_exports);
24
- var import_crypto = require("crypto");
25
- var import_common = require("./common");
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
2
+ import { createHmac } from "crypto";
3
+ import {
4
+ WebhookVerificationError,
5
+ DEFAULT_WEBHOOK_SECRET,
6
+ DEFAULT_TOLERANCE
7
+ } from "./common.js";
26
8
  const getHmac = ({ secret }) => {
27
9
  if (typeof secret === "undefined" || secret === "") {
28
- throw new import_common.WebhookVerificationError();
10
+ throw new WebhookVerificationError();
29
11
  }
30
- return (0, import_crypto.createHmac)("sha256", secret);
12
+ return createHmac("sha256", secret);
31
13
  };
32
14
  const createSignature = ({
33
15
  payload,
34
- secret = import_common.DEFAULT_WEBHOOK_SECRET,
16
+ secret = DEFAULT_WEBHOOK_SECRET,
35
17
  timestamp = Date.now()
36
18
  }) => {
37
19
  const hmac = getHmac({ secret });
@@ -40,28 +22,28 @@ const createSignature = ({
40
22
  };
41
23
  const verifySignature = ({
42
24
  payload,
43
- secret = import_common.DEFAULT_WEBHOOK_SECRET,
25
+ secret = DEFAULT_WEBHOOK_SECRET,
44
26
  signature,
45
27
  options
46
28
  }) => {
47
29
  const match = /t=(\d+),v1=([\da-f]+)/.exec(signature);
48
30
  if (!match) {
49
- throw new import_common.WebhookVerificationError();
31
+ throw new WebhookVerificationError();
50
32
  }
51
33
  const signedStamp = Number(match[1]);
52
34
  const signedPayload = match[2];
53
35
  const timestamp = options?.currentTimestampOverride ?? Date.now();
54
- const tolerance = options?.tolerance ?? import_common.DEFAULT_TOLERANCE;
36
+ const tolerance = options?.tolerance ?? DEFAULT_TOLERANCE;
55
37
  const difference = Math.abs(timestamp - signedStamp);
56
38
  if (difference > tolerance) {
57
- throw new import_common.WebhookVerificationError();
39
+ throw new WebhookVerificationError();
58
40
  }
59
41
  const hmac = getHmac({ secret });
60
42
  hmac.update(signedStamp + "." + payload);
61
43
  if (hmac.digest("hex") === signedPayload) {
62
44
  return true;
63
45
  }
64
- throw new import_common.WebhookVerificationError();
46
+ throw new WebhookVerificationError();
65
47
  };
66
48
  const timestampSchemeVerifier = (options) => {
67
49
  return {
@@ -79,3 +61,6 @@ const timestampSchemeVerifier = (options) => {
79
61
  };
80
62
  };
81
63
  var timestampSchemeVerifier_default = timestampSchemeVerifier;
64
+ export {
65
+ timestampSchemeVerifier_default as default
66
+ };
@@ -1,27 +1,8 @@
1
- "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
- var __getOwnPropNames = Object.getOwnPropertyNames;
5
- var __hasOwnProp = Object.prototype.hasOwnProperty;
6
- var __export = (target, all) => {
7
- for (var name in all)
8
- __defProp(target, name, { get: all[name], enumerable: true });
9
- };
10
- var __copyProps = (to, from, except, desc) => {
11
- if (from && typeof from === "object" || typeof from === "function") {
12
- for (let key of __getOwnPropNames(from))
13
- if (!__hasOwnProp.call(to, key) && key !== except)
14
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
- }
16
- return to;
17
- };
18
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var BaseClient_exports = {};
20
- __export(BaseClient_exports, {
21
- default: () => BaseClient
22
- });
23
- module.exports = __toCommonJS(BaseClient_exports);
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
24
2
  class BaseClient {
25
3
  constructor() {
26
4
  }
27
5
  }
6
+ export {
7
+ BaseClient as default
8
+ };
@@ -1,4 +1,4 @@
1
- import BaseClient from './BaseClient';
1
+ import BaseClient from './BaseClient.js';
2
2
  type CacheOptions = {
3
3
  expires?: number;
4
4
  };
@@ -1 +1 @@
1
- {"version":3,"file":"InMemoryClient.d.ts","sourceRoot":"","sources":["../../../src/cache/clients/InMemoryClient.ts"],"names":[],"mappings":"AAEA,OAAO,UAAU,MAAM,cAAc,CAAA;AAErC,KAAK,YAAY,GAAG;IAClB,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB,CAAA;AAED,MAAM,CAAC,OAAO,OAAO,cAAe,SAAQ,UAAU;IACpD,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;QAAE,OAAO,EAAE,MAAM,CAAC;QAAC,KAAK,EAAE,MAAM,CAAA;KAAE,CAAC,CAAA;gBAG/C,IAAI,KAAK;IAKrB;;;;;OAKG;IACH,IAAI,QAAQ,UAIX;IAGK,UAAU;IACV,OAAO;IAEP,GAAG,CAAC,GAAG,EAAE,MAAM;IAWf,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO,GAAE,YAAiB;IAU3D,GAAG,CAAC,GAAG,EAAE,MAAM;IASrB;;OAEG;IACG,KAAK;IAIX,gBAAgB,CAAC,KAAK,EAAE,GAAG;IAU3B,QAAQ,CAAC,KAAK,EAAE,GAAG;CAGpB"}
1
+ {"version":3,"file":"InMemoryClient.d.ts","sourceRoot":"","sources":["../../../src/cache/clients/InMemoryClient.ts"],"names":[],"mappings":"AAEA,OAAO,UAAU,MAAM,iBAAiB,CAAA;AAExC,KAAK,YAAY,GAAG;IAClB,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB,CAAA;AAED,MAAM,CAAC,OAAO,OAAO,cAAe,SAAQ,UAAU;IACpD,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;QAAE,OAAO,EAAE,MAAM,CAAC;QAAC,KAAK,EAAE,MAAM,CAAA;KAAE,CAAC,CAAA;gBAG/C,IAAI,KAAK;IAKrB;;;;;OAKG;IACH,IAAI,QAAQ,UAIX;IAGK,UAAU;IACV,OAAO;IAEP,GAAG,CAAC,GAAG,EAAE,MAAM;IAWf,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO,GAAE,YAAiB;IAU3D,GAAG,CAAC,GAAG,EAAE,MAAM;IASrB;;OAEG;IACG,KAAK;IAIX,gBAAgB,CAAC,KAAK,EAAE,GAAG;IAU3B,QAAQ,CAAC,KAAK,EAAE,GAAG;CAGpB"}
@@ -1,38 +1,6 @@
1
- "use strict";
2
- var __create = Object.create;
3
- var __defProp = Object.defineProperty;
4
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
- var __getOwnPropNames = Object.getOwnPropertyNames;
6
- var __getProtoOf = Object.getPrototypeOf;
7
- var __hasOwnProp = Object.prototype.hasOwnProperty;
8
- var __export = (target, all) => {
9
- for (var name in all)
10
- __defProp(target, name, { get: all[name], enumerable: true });
11
- };
12
- var __copyProps = (to, from, except, desc) => {
13
- if (from && typeof from === "object" || typeof from === "function") {
14
- for (let key of __getOwnPropNames(from))
15
- if (!__hasOwnProp.call(to, key) && key !== except)
16
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
- }
18
- return to;
19
- };
20
- var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
- // If the importer is in node compatibility mode or this is not an ESM
22
- // file that has been converted to a CommonJS file using a Babel-
23
- // compatible transform (i.e. "__esModule" has not been set), then set
24
- // "default" to the CommonJS "module.exports" for node compatibility.
25
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
- mod
27
- ));
28
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
- var InMemoryClient_exports = {};
30
- __export(InMemoryClient_exports, {
31
- default: () => InMemoryClient
32
- });
33
- module.exports = __toCommonJS(InMemoryClient_exports);
34
- var import_BaseClient = __toESM(require("./BaseClient"));
35
- class InMemoryClient extends import_BaseClient.default {
1
+ import bannerPath from "node:path"; import bannerUrl from "node:url"; const __filename = bannerUrl.fileURLToPath(import.meta.url); const __dirname = bannerPath.dirname(__filename);
2
+ import BaseClient from "./BaseClient.js";
3
+ class InMemoryClient extends BaseClient {
36
4
  storage;
37
5
  // initialize with pre-cached data if needed
38
6
  constructor(data = {}) {
@@ -98,3 +66,6 @@ class InMemoryClient extends import_BaseClient.default {
98
66
  return !!this.cacheKeyForValue(value);
99
67
  }
100
68
  }
69
+ export {
70
+ InMemoryClient as default
71
+ };
@@ -1,5 +1,5 @@
1
1
  import type { Client as ClientType, ClientOptions, ServerOptions } from 'memjs';
2
- import BaseClient from './BaseClient';
2
+ import BaseClient from './BaseClient.js';
3
3
  export default class MemcachedClient extends BaseClient {
4
4
  client?: ClientType | null;
5
5
  servers: string;
@@ -1 +1 @@
1
- {"version":3,"file":"MemcachedClient.d.ts","sourceRoot":"","sources":["../../../src/cache/clients/MemcachedClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,MAAM,IAAI,UAAU,EAAE,aAAa,EAAE,aAAa,EAAE,MAAM,OAAO,CAAA;AAE/E,OAAO,UAAU,MAAM,cAAc,CAAA;AAErC,MAAM,CAAC,OAAO,OAAO,eAAgB,SAAQ,UAAU;IACrD,MAAM,CAAC,EAAE,UAAU,GAAG,IAAI,CAAA;IAC1B,OAAO,SAAA;IACP,OAAO,8EAAA;gBAEK,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,aAAa,GAAG,aAAa;IAM9D,OAAO;IAKP,UAAU;IAKV,GAAG,CAAC,GAAG,EAAE,MAAM;IAcf,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO,EAAE;QAAE,OAAO,CAAC,EAAE,MAAM,CAAA;KAAE;IAQ9D,GAAG,CAAC,GAAG,EAAE,MAAM;CAQtB"}
1
+ {"version":3,"file":"MemcachedClient.d.ts","sourceRoot":"","sources":["../../../src/cache/clients/MemcachedClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,MAAM,IAAI,UAAU,EAAE,aAAa,EAAE,aAAa,EAAE,MAAM,OAAO,CAAA;AAE/E,OAAO,UAAU,MAAM,iBAAiB,CAAA;AAExC,MAAM,CAAC,OAAO,OAAO,eAAgB,SAAQ,UAAU;IACrD,MAAM,CAAC,EAAE,UAAU,GAAG,IAAI,CAAA;IAC1B,OAAO,SAAA;IACP,OAAO,8EAAA;gBAEK,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,aAAa,GAAG,aAAa;IAM9D,OAAO;IAKP,UAAU;IAKV,GAAG,CAAC,GAAG,EAAE,MAAM;IAcf,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO,EAAE;QAAE,OAAO,CAAC,EAAE,MAAM,CAAA;KAAE;IAQ9D,GAAG,CAAC,GAAG,EAAE,MAAM;CAQtB"}