@sesamy/sesamy-js 1.110.0 → 1.112.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/capsule-plugin.iife.js +1 -1
- package/dist/capsule-plugin.mjs +79 -30
- package/dist/sesamy-js.cjs +1 -1
- package/dist/sesamy-js.iife.js +1 -1
- package/dist/sesamy-js.mjs +1 -1
- package/package.json +2 -2
|
@@ -1 +1 @@
|
|
|
1
|
-
var capsulePlugin=(function(e){Object.defineProperty(e,Symbol.toStringTag,{value:`Module`});function t(e){let t=e.length%4,n=(t?e+`=`.repeat(4-t):e).replace(/-/g,`+`).replace(/_/g,`/`),r=atob(n),i=new Uint8Array(r.length);for(let e=0;e<r.length;e++)i[e]=r.charCodeAt(e);return i}function n(e){let t=``;for(let n=0;n<e.length;n++)t+=String.fromCharCode(e[n]);return btoa(t).replace(/\+/g,`-`).replace(/\//g,`_`).replace(/=/g,``)}var r=new Uint8Array([1,0,1]),i=`dca-keys`,a=`keypair`,o=`default`,s=class e{fetchFn;unlockFn;periodKeyCache;clientBound;rsaKeySize;keyDbName;keyPairPromise=null;constructor(e={}){this.fetchFn=e.fetch??globalThis.fetch.bind(globalThis),this.unlockFn=e.unlockFn,this.periodKeyCache=e.periodKeyCache,this.clientBound=e.clientBound??!1,this.rsaKeySize=e.rsaKeySize??2048,this.keyDbName=e.keyDbName??i}parsePage(e){let t=e??document,n=t.querySelector(`script.dca-data`);if(!n)throw Error(`DCA: <script class="dca-data"> not found`);let r=JSON.parse(n.textContent??``),i=t.querySelector(`template.dca-sealed-content`),a={};if(i&&i instanceof HTMLTemplateElement){let e=i.content.querySelectorAll(`[data-dca-content-name]`);for(let t of Array.from(e)){let e=t.getAttribute(`data-dca-content-name`);e&&(a[e]=t.textContent?.trim()??``)}}return{dcaData:r,sealedContent:a}}parseJsonResponse(e){let{sealedContent:t,...n}=e;return{dcaData:n,sealedContent:t}}static hasDcaContent(e){return(e??document).querySelector(`script.dca-data`)!==null}async unlock(e,t,n){let r=e.dcaData.issuerData[t];if(!r)throw Error(`DCA: issuer "${t}" not found in issuerData`);let i={resourceJWT:e.dcaData.resourceJWT,
|
|
1
|
+
var capsulePlugin=(function(e){Object.defineProperty(e,Symbol.toStringTag,{value:`Module`});function t(e){let t=e.length%4,n=(t?e+`=`.repeat(4-t):e).replace(/-/g,`+`).replace(/_/g,`/`),r=atob(n),i=new Uint8Array(r.length);for(let e=0;e<r.length;e++)i[e]=r.charCodeAt(e);return i}function n(e){let t=``;for(let n=0;n<e.length;n++)t+=String.fromCharCode(e[n]);return btoa(t).replace(/\+/g,`-`).replace(/\//g,`_`).replace(/=/g,``)}var r=new Uint8Array([1,0,1]),i=`dca-keys`,a=`keypair`,o=`default`,s=class e{fetchFn;unlockFn;periodKeyCache;clientBound;rsaKeySize;keyDbName;keyPairPromise=null;accessCheck;paywallFn;constructor(e={}){this.fetchFn=e.fetch??globalThis.fetch.bind(globalThis),this.unlockFn=e.unlockFn,this.periodKeyCache=e.periodKeyCache,this.clientBound=e.clientBound??!1,this.rsaKeySize=e.rsaKeySize??2048,this.keyDbName=e.keyDbName??i,this.accessCheck=e.accessCheck,this.paywallFn=e.paywallFn}parsePage(e){let t=e??document,n=t.querySelector(`script.dca-data`);if(!n)throw Error(`DCA: <script class="dca-data"> not found`);let r=JSON.parse(n.textContent??``),i=t.querySelector(`template.dca-sealed-content`),a={};if(i&&i instanceof HTMLTemplateElement){let e=i.content.querySelectorAll(`[data-dca-content-name]`);for(let t of Array.from(e)){let e=t.getAttribute(`data-dca-content-name`);e&&(a[e]=t.textContent?.trim()??``)}}return{dcaData:r,sealedContent:a}}parseJsonResponse(e){let{sealedContent:t,...n}=e;return{dcaData:n,sealedContent:t}}static hasDcaContent(e){return(e??document).querySelector(`script.dca-data`)!==null}async unlock(e,t,n){let r=e.dcaData.issuerData[t];if(!r)throw Error(`DCA: issuer "${t}" not found in issuerData`);let i={resourceJWT:e.dcaData.resourceJWT,contentEncryptionKeys:r.contentEncryptionKeys,...e.dcaData.contentKeyMap?{contentKeyMap:e.dcaData.contentKeyMap}:{},...n};if(this.clientBound&&(i.clientPublicKey=await this.getPublicKey()),this.unlockFn)return this.unlockFn(r.unlockUrl,i);let a=await this.fetchFn(r.unlockUrl,{method:`POST`,headers:{"Content-Type":`application/json`},body:JSON.stringify(i)});if(!a.ok)throw Error(`DCA unlock failed: ${a.status} ${a.statusText}`);return a.json()}async unlockWithShareToken(e,t,n,r){return this.unlock(e,t,{...r,shareToken:n})}static getShareTokenFromUrl(e=`share`){if(typeof window>`u`||typeof URL>`u`)return null;try{return new URL(window.location.href).searchParams.get(e)}catch{return null}}async decrypt(e,n,r,i){let a=e.dcaData.contentSealData[n];if(!a)throw Error(`DCA: contentSealData not found for "${n}"`);let o=e.sealedContent[n];if(!o)throw Error(`DCA: sealed content not found for "${n}"`);let s=i??r.contentEncryptionKeys.find(e=>(e.contentName??`default`)===n);if(!s)throw Error(`DCA: no key provided for "${n}"`);let c=r.transport===`client-bound`,l=s.periodKeys?Object.fromEntries(s.periodKeys.map(e=>[e.bucket,e.key])):void 0,u;if(s.contentKey){if(u=c?await this.rsaUnwrapKey(s.contentKey):t(s.contentKey),l&&this.periodKeyCache){let t=c?await this.unwrapPeriodKeyMap(l):l,r=e.dcaData.contentKeyMap?.[n]??n;await this.cachePeriodKeys(r,t)}}else if(l){let t=c?await this.unwrapPeriodKeyMap(l):l;if(u=await this.unwrapWithPeriodKeys(e.dcaData.sealedContentKeys[n]??[],t),this.periodKeyCache){let r=e.dcaData.contentKeyMap?.[n]??n;await this.cachePeriodKeys(r,t)}}else{let t=e.dcaData.contentKeyMap?.[n]??n,r=await this.getCachedPeriodKeys(t,e.dcaData.sealedContentKeys[n]??[]);if(r)u=await this.unwrapWithPeriodKeys(e.dcaData.sealedContentKeys[n]??[],r);else throw Error(`DCA: no contentKey or periodKeys available for "${n}"`)}let d=t(o),f=t(a.nonce),p=new TextEncoder().encode(a.aad),m=await crypto.subtle.importKey(`raw`,u,{name:`AES-GCM`},!1,[`decrypt`]),h=await crypto.subtle.decrypt({name:`AES-GCM`,iv:f,additionalData:p,tagLength:128},m,d);return new TextDecoder().decode(h)}async decryptAll(e,t){let n={},r=new Map(t.contentEncryptionKeys.map(e=>[e.contentName??`default`,e]));for(let[i,a]of r)n[i]=await this.decrypt(e,i,t,a);return n}async processPage(t={}){let n=t.root??document;if(this.accessCheck){let t=e.getPublisherContentId(n);if(!t)return console.warn(`DCA: accessCheck is configured but no publisher-content-id attribute was found on the page. Treating as denied.`),this.paywallFn&&this.paywallFn(t,n),{};let r=await this.accessCheck(t);if(!r||!r.hasAccess)return this.paywallFn&&this.paywallFn(t,n),{}}let r=this.parsePage(n),i=t.issuerName??Object.keys(r.dcaData.issuerData)[0];if(!i)throw Error(`DCA: no issuers found in issuerData`);let a=t.shareToken===void 0?e.getShareTokenFromUrl(t.shareTokenParam):t.shareToken,o=a?await this.unlockWithShareToken(r,i,a,t.additionalBody):await this.unlock(r,i,t.additionalBody);return this.decryptAll(r,o)}renderToPage(e,t){let n=t??document,r=new Set;for(let[t,i]of Object.entries(e)){let e=n.querySelector(`[data-dca-content-name="${CSS.escape(t)}"]`);e&&(e.innerHTML=i,r.add(t))}return r}static getPublisherContentId(e){let t=e??document;if(t instanceof Element){let e=t.closest(`[publisher-content-id]`);if(e)return e.getAttribute(`publisher-content-id`)}let n=t.querySelector(`script.dca-data`);if(n){let e=n.closest(`[publisher-content-id]`);if(e)return e.getAttribute(`publisher-content-id`)}return null}observe(e,t){let n=e??document.body,r=new MutationObserver(e=>{for(let n of e)for(let e of Array.from(n.addedNodes)){if(!(e instanceof HTMLElement))continue;let n=[];if(e.matches(`script.dca-data`)){let t=e.parentElement??e;n.includes(t)||n.push(t)}let r=e.querySelectorAll(`script.dca-data`);for(let t of Array.from(r)){let r=t.parentElement??e;n.includes(r)||n.push(r)}for(let e of n)this.processPage({...t,root:e}).then(t=>{Object.keys(t).length>0&&this.renderToPage(t,e)}).catch(e=>console.error(`DCA auto-process failed:`,e))}});return r.observe(n,{childList:!0,subtree:!0}),r}async unwrapWithPeriodKeys(e,n){for(let r of e){let e=n[r.t];if(!e)continue;let i=t(e),a=t(r.nonce),o=t(r.key),s=await crypto.subtle.importKey(`raw`,i,{name:`AES-GCM`},!1,[`decrypt`]);try{let e=await crypto.subtle.decrypt({name:`AES-GCM`,iv:a,tagLength:128},s,o);return new Uint8Array(e)}catch{continue}}throw Error(`DCA: could not unwrap contentKey — no matching periodKey`)}async cachePeriodKeys(e,t){if(this.periodKeyCache)for(let[n,r]of Object.entries(t))await this.periodKeyCache.set(`dca:pk:${e}:${n}`,r)}async getCachedPeriodKeys(e,t){if(!this.periodKeyCache)return null;let n={},r=!1;for(let i of t){let t=await this.periodKeyCache.get(`dca:pk:${e}:${i.t}`);t&&(n[i.t]=t,r=!0)}return r?n:null}async getPublicKey(){let e=await this.ensureKeyPair(),t=await crypto.subtle.exportKey(`spki`,e.publicKey);return n(new Uint8Array(t))}async hasKeyPair(){try{let e=await this.openKeyDb();return await this.idbGet(e,o)!==void 0}catch{return!1}}ensureKeyPair(){return this.keyPairPromise||=this.loadOrCreateKeyPair(),this.keyPairPromise}async loadOrCreateKeyPair(){try{let e=await this.openKeyDb(),t=await this.idbGet(e,o);if(t?.publicKey&&t?.privateKey)return{publicKey:t.publicKey,privateKey:t.privateKey}}catch{}let e=await crypto.subtle.generateKey({name:`RSA-OAEP`,modulusLength:this.rsaKeySize,publicExponent:r,hash:`SHA-256`},!0,[`encrypt`,`decrypt`]),t=await crypto.subtle.exportKey(`jwk`,e.privateKey),n=await crypto.subtle.importKey(`jwk`,t,{name:`RSA-OAEP`,hash:`SHA-256`},!1,[`decrypt`]),i={publicKey:e.publicKey,privateKey:n};try{let t=await this.openKeyDb();await this.idbPut(t,o,{id:o,publicKey:e.publicKey,privateKey:n,createdAt:Date.now(),keySize:this.rsaKeySize})}catch{}return i}async rsaUnwrapKey(e){let n=await this.ensureKeyPair(),r=t(e),i=await crypto.subtle.decrypt({name:`RSA-OAEP`},n.privateKey,r);return new Uint8Array(i)}async unwrapPeriodKeyMap(e){let t={};for(let[r,i]of Object.entries(e))t[r]=n(await this.rsaUnwrapKey(i));return t}keyDbPromise=null;openKeyDb(){return this.keyDbPromise||=new Promise((e,t)=>{let n=indexedDB.open(this.keyDbName,1);n.onupgradeneeded=()=>{let e=n.result;e.objectStoreNames.contains(a)||e.createObjectStore(a,{keyPath:`id`})},n.onsuccess=()=>e(n.result),n.onerror=()=>t(n.error)}),this.keyDbPromise}idbGet(e,t){return new Promise((n,r)=>{let i=e.transaction(a,`readonly`).objectStore(a).get(t);i.onsuccess=()=>n(i.result),i.onerror=()=>r(i.error)})}idbPut(e,t,n){return new Promise((t,r)=>{let i=e.transaction(a,`readwrite`).objectStore(a).put(n);i.onsuccess=()=>t(),i.onerror=()=>r(i.error)})}};function c(e){return s.hasDcaContent(e)}var l=function(e){return e.AUTH_INITIALIZED=`sesamyJsAuthInitialized`,e.READY=`sesamyJsReady`,e.AUTHENTICATED=`sesamyJsAuthenticated`,e.LOGOUT=`sesamyJsLogout`,e.CLEAR_CACHE=`sesamyJsClearCache`,e.USER_ATTRIBUTE_CHANGED=`sesamyUserAttributeChanged`,e.PURCHASE=`sesamyJsPurchase`,e.CONSENT_CHANGED=`sesamyJsConsentChanged`,e}({}),u=3600*1e3;function d(){let e=null;return{init(t,n){let r=async(e,t)=>{let r=await n.getToken(!1),i=new Headers(t?.headers);return r&&i.set(`Authorization`,`Bearer ${r}`),globalThis.fetch(e,{...t,headers:i,credentials:t?.credentials??`same-origin`})};window.addEventListener(l.LOGOUT,()=>{try{let e=[];for(let t=0;t<sessionStorage.length;t++){let n=sessionStorage.key(t);n?.startsWith(`dca:unlock:`)&&e.push(n)}e.forEach(e=>sessionStorage.removeItem(e))}catch{}}),e=new s({fetch:r,clientBound:t.clientBound??!1,rsaKeySize:t.rsaKeySize??2048,unlockFn:async(e,t)=>{let n=JSON.stringify(t),i=`dca:unlock:${e}:${n}`;try{let e=sessionStorage.getItem(i);if(e){let{ts:t,data:n}=JSON.parse(e);if(Date.now()-t<u)return n;sessionStorage.removeItem(i)}}catch{}let a=await r(e,{method:`POST`,headers:{"Content-Type":`application/json`},body:n});if(!a.ok)throw Error(`DCA unlock failed: ${a.status} ${a.statusText}`);let o=await a.json();try{sessionStorage.setItem(i,JSON.stringify({ts:Date.now(),data:o}))}catch{}return o}})},getDcaClient(){return e},async processPage(){if(!e||!c())return null;let t=await e.processPage();return e.renderToPage(t),t}}}return e.createCapsulePlugin=d,e})({});
|
package/dist/capsule-plugin.mjs
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
//#region ../../node_modules/.pnpm/@sesamy+capsule@0.
|
|
1
|
+
//#region ../../node_modules/.pnpm/@sesamy+capsule@0.10.0/node_modules/@sesamy/capsule/dist/index.mjs
|
|
2
2
|
function e(e) {
|
|
3
3
|
let t = e.length % 4, n = (t ? e + "=".repeat(4 - t) : e).replace(/-/g, "+").replace(/_/g, "/"), r = atob(n), i = new Uint8Array(r.length);
|
|
4
4
|
for (let e = 0; e < r.length; e++) i[e] = r.charCodeAt(e);
|
|
@@ -21,8 +21,10 @@ var n = new Uint8Array([
|
|
|
21
21
|
rsaKeySize;
|
|
22
22
|
keyDbName;
|
|
23
23
|
keyPairPromise = null;
|
|
24
|
+
accessCheck;
|
|
25
|
+
paywallFn;
|
|
24
26
|
constructor(e = {}) {
|
|
25
|
-
this.fetchFn = e.fetch ?? globalThis.fetch.bind(globalThis), this.unlockFn = e.unlockFn, this.periodKeyCache = e.periodKeyCache, this.clientBound = e.clientBound ?? !1, this.rsaKeySize = e.rsaKeySize ?? 2048, this.keyDbName = e.keyDbName ?? r;
|
|
27
|
+
this.fetchFn = e.fetch ?? globalThis.fetch.bind(globalThis), this.unlockFn = e.unlockFn, this.periodKeyCache = e.periodKeyCache, this.clientBound = e.clientBound ?? !1, this.rsaKeySize = e.rsaKeySize ?? 2048, this.keyDbName = e.keyDbName ?? r, this.accessCheck = e.accessCheck, this.paywallFn = e.paywallFn;
|
|
26
28
|
}
|
|
27
29
|
parsePage(e) {
|
|
28
30
|
let t = e ?? document, n = t.querySelector("script.dca-data");
|
|
@@ -55,7 +57,7 @@ var n = new Uint8Array([
|
|
|
55
57
|
if (!r) throw Error(`DCA: issuer "${t}" not found in issuerData`);
|
|
56
58
|
let i = {
|
|
57
59
|
resourceJWT: e.dcaData.resourceJWT,
|
|
58
|
-
|
|
60
|
+
contentEncryptionKeys: r.contentEncryptionKeys,
|
|
59
61
|
...e.dcaData.contentKeyMap ? { contentKeyMap: e.dcaData.contentKeyMap } : {},
|
|
60
62
|
...n
|
|
61
63
|
};
|
|
@@ -82,48 +84,55 @@ var n = new Uint8Array([
|
|
|
82
84
|
return null;
|
|
83
85
|
}
|
|
84
86
|
}
|
|
85
|
-
async decrypt(t, n, r) {
|
|
86
|
-
let
|
|
87
|
-
if (!
|
|
88
|
-
let
|
|
89
|
-
if (!
|
|
90
|
-
let
|
|
91
|
-
if (!
|
|
92
|
-
let
|
|
93
|
-
if (
|
|
94
|
-
if (
|
|
95
|
-
let e =
|
|
87
|
+
async decrypt(t, n, r, i) {
|
|
88
|
+
let a = t.dcaData.contentSealData[n];
|
|
89
|
+
if (!a) throw Error(`DCA: contentSealData not found for "${n}"`);
|
|
90
|
+
let o = t.sealedContent[n];
|
|
91
|
+
if (!o) throw Error(`DCA: sealed content not found for "${n}"`);
|
|
92
|
+
let s = i ?? r.contentEncryptionKeys.find((e) => (e.contentName ?? "default") === n);
|
|
93
|
+
if (!s) throw Error(`DCA: no key provided for "${n}"`);
|
|
94
|
+
let c = r.transport === "client-bound", l = s.periodKeys ? Object.fromEntries(s.periodKeys.map((e) => [e.bucket, e.key])) : void 0, u;
|
|
95
|
+
if (s.contentKey) {
|
|
96
|
+
if (u = c ? await this.rsaUnwrapKey(s.contentKey) : e(s.contentKey), l && this.periodKeyCache) {
|
|
97
|
+
let e = c ? await this.unwrapPeriodKeyMap(l) : l, r = t.dcaData.contentKeyMap?.[n] ?? n;
|
|
96
98
|
await this.cachePeriodKeys(r, e);
|
|
97
99
|
}
|
|
98
|
-
} else if (
|
|
99
|
-
let e =
|
|
100
|
-
if (
|
|
100
|
+
} else if (l) {
|
|
101
|
+
let e = c ? await this.unwrapPeriodKeyMap(l) : l;
|
|
102
|
+
if (u = await this.unwrapWithPeriodKeys(t.dcaData.sealedContentKeys[n] ?? [], e), this.periodKeyCache) {
|
|
101
103
|
let r = t.dcaData.contentKeyMap?.[n] ?? n;
|
|
102
104
|
await this.cachePeriodKeys(r, e);
|
|
103
105
|
}
|
|
104
106
|
} else {
|
|
105
107
|
let e = t.dcaData.contentKeyMap?.[n] ?? n, r = await this.getCachedPeriodKeys(e, t.dcaData.sealedContentKeys[n] ?? []);
|
|
106
|
-
if (r)
|
|
108
|
+
if (r) u = await this.unwrapWithPeriodKeys(t.dcaData.sealedContentKeys[n] ?? [], r);
|
|
107
109
|
else throw Error(`DCA: no contentKey or periodKeys available for "${n}"`);
|
|
108
110
|
}
|
|
109
|
-
let
|
|
111
|
+
let d = e(o), f = e(a.nonce), p = new TextEncoder().encode(a.aad), m = await crypto.subtle.importKey("raw", u, { name: "AES-GCM" }, !1, ["decrypt"]), h = await crypto.subtle.decrypt({
|
|
110
112
|
name: "AES-GCM",
|
|
111
|
-
iv:
|
|
112
|
-
additionalData:
|
|
113
|
+
iv: f,
|
|
114
|
+
additionalData: p,
|
|
113
115
|
tagLength: 128
|
|
114
|
-
},
|
|
115
|
-
return new TextDecoder().decode(
|
|
116
|
+
}, m, d);
|
|
117
|
+
return new TextDecoder().decode(h);
|
|
116
118
|
}
|
|
117
119
|
async decryptAll(e, t) {
|
|
118
|
-
let n = {};
|
|
119
|
-
for (let
|
|
120
|
+
let n = {}, r = new Map(t.contentEncryptionKeys.map((e) => [e.contentName ?? "default", e]));
|
|
121
|
+
for (let [i, a] of r) n[i] = await this.decrypt(e, i, t, a);
|
|
120
122
|
return n;
|
|
121
123
|
}
|
|
122
124
|
async processPage(e = {}) {
|
|
123
|
-
let t =
|
|
124
|
-
if (
|
|
125
|
-
|
|
126
|
-
|
|
125
|
+
let t = e.root ?? document;
|
|
126
|
+
if (this.accessCheck) {
|
|
127
|
+
let e = o.getPublisherContentId(t);
|
|
128
|
+
if (!e) return console.warn("DCA: accessCheck is configured but no publisher-content-id attribute was found on the page. Treating as denied."), this.paywallFn && this.paywallFn(e, t), {};
|
|
129
|
+
let n = await this.accessCheck(e);
|
|
130
|
+
if (!n || !n.hasAccess) return this.paywallFn && this.paywallFn(e, t), {};
|
|
131
|
+
}
|
|
132
|
+
let n = this.parsePage(t), r = e.issuerName ?? Object.keys(n.dcaData.issuerData)[0];
|
|
133
|
+
if (!r) throw Error("DCA: no issuers found in issuerData");
|
|
134
|
+
let i = e.shareToken === void 0 ? o.getShareTokenFromUrl(e.shareTokenParam) : e.shareToken, a = i ? await this.unlockWithShareToken(n, r, i, e.additionalBody) : await this.unlock(n, r, e.additionalBody);
|
|
135
|
+
return this.decryptAll(n, a);
|
|
127
136
|
}
|
|
128
137
|
renderToPage(e, t) {
|
|
129
138
|
let n = t ?? document, r = /* @__PURE__ */ new Set();
|
|
@@ -133,6 +142,46 @@ var n = new Uint8Array([
|
|
|
133
142
|
}
|
|
134
143
|
return r;
|
|
135
144
|
}
|
|
145
|
+
static getPublisherContentId(e) {
|
|
146
|
+
let t = e ?? document;
|
|
147
|
+
if (t instanceof Element) {
|
|
148
|
+
let e = t.closest("[publisher-content-id]");
|
|
149
|
+
if (e) return e.getAttribute("publisher-content-id");
|
|
150
|
+
}
|
|
151
|
+
let n = t.querySelector("script.dca-data");
|
|
152
|
+
if (n) {
|
|
153
|
+
let e = n.closest("[publisher-content-id]");
|
|
154
|
+
if (e) return e.getAttribute("publisher-content-id");
|
|
155
|
+
}
|
|
156
|
+
return null;
|
|
157
|
+
}
|
|
158
|
+
observe(e, t) {
|
|
159
|
+
let n = e ?? document.body, r = new MutationObserver((e) => {
|
|
160
|
+
for (let n of e) for (let e of Array.from(n.addedNodes)) {
|
|
161
|
+
if (!(e instanceof HTMLElement)) continue;
|
|
162
|
+
let n = [];
|
|
163
|
+
if (e.matches("script.dca-data")) {
|
|
164
|
+
let t = e.parentElement ?? e;
|
|
165
|
+
n.includes(t) || n.push(t);
|
|
166
|
+
}
|
|
167
|
+
let r = e.querySelectorAll("script.dca-data");
|
|
168
|
+
for (let t of Array.from(r)) {
|
|
169
|
+
let r = t.parentElement ?? e;
|
|
170
|
+
n.includes(r) || n.push(r);
|
|
171
|
+
}
|
|
172
|
+
for (let e of n) this.processPage({
|
|
173
|
+
...t,
|
|
174
|
+
root: e
|
|
175
|
+
}).then((t) => {
|
|
176
|
+
Object.keys(t).length > 0 && this.renderToPage(t, e);
|
|
177
|
+
}).catch((e) => console.error("DCA auto-process failed:", e));
|
|
178
|
+
}
|
|
179
|
+
});
|
|
180
|
+
return r.observe(n, {
|
|
181
|
+
childList: !0,
|
|
182
|
+
subtree: !0
|
|
183
|
+
}), r;
|
|
184
|
+
}
|
|
136
185
|
async unwrapWithPeriodKeys(t, n) {
|
|
137
186
|
for (let r of t) {
|
|
138
187
|
let t = n[r.t];
|
|
@@ -259,7 +308,7 @@ function u() {
|
|
|
259
308
|
return r && i.set("Authorization", `Bearer ${r}`), globalThis.fetch(e, {
|
|
260
309
|
...t,
|
|
261
310
|
headers: i,
|
|
262
|
-
credentials:
|
|
311
|
+
credentials: t?.credentials ?? "same-origin"
|
|
263
312
|
});
|
|
264
313
|
};
|
|
265
314
|
window.addEventListener(c.LOGOUT, () => {
|