@super-protocol/pki-sync-client 2.0.11 → 3.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -88,16 +88,23 @@ pki-sync-client sync [options]
88
88
  | `--config` | `-c` | string | *required* | Path to secrets configuration file (YAML) |
89
89
  | `--swarm-env` | | string | `/sp/swarm/swarm-env.yaml` | Path to swarm environment config (YAML) |
90
90
  | `--own-challenge` | | string | `auto` | Authentication challenge type: `auto`, `tdx`, `sev`, or `untrusted` |
91
- | `--verbose` | `-v` | boolean | `false` | Enable verbose logging output |
91
+ | `--log-level` | `-l` | string | | Log level: `fatal`, `error`, `warn`, `info`, `debug`, `trace` |
92
92
  | `--disable-server-identity-check` | | boolean | `false` | Disable server identity verification (not recommended) |
93
93
  | `--save-certs-to-dir` | | string | | Directory to save client certificates (`key.pem`, `ca.pem`, `cert.pem`) |
94
94
  | `--save-certs-prefix` | | string | | Prefix for certificate filenames (e.g., `client` → `client_key.pem`) |
95
95
 
96
+ By default, if `--log-level` is not provided, `SyncClient` runs with logging disabled.
97
+
96
98
  ### Examples
97
99
 
98
- **Simple sync with verbose output:**
100
+ **Simple sync (no logs):**
101
+ ```bash
102
+ pki-sync-client sync -c secrets.yaml
103
+ ```
104
+
105
+ **Simple sync with explicit log level:**
99
106
  ```bash
100
- pki-sync-client sync -c secrets.yaml -v
107
+ pki-sync-client sync -c secrets.yaml --log-level info
101
108
  ```
102
109
 
103
110
  **Sync with custom swarm environment:**
@@ -146,7 +153,7 @@ async function syncSecrets() {
146
153
  networkID: swarmEnv['pki-authority'].networkID,
147
154
  caBundle: swarmEnv['pki-authority'].caBundle,
148
155
  ownChallenge: 'auto',
149
- verbose: true,
156
+ logLevel: 'info',
150
157
  });
151
158
 
152
159
  // Perform sync
@@ -167,7 +174,7 @@ const client = new SyncClient({
167
174
  networkID: 'my-network',
168
175
  caBundle: fs.readFileSync('./ca-bundle.pem', 'utf-8'),
169
176
  ownChallenge: 'tdx',
170
- verbose: true,
177
+ logLevel: 'debug',
171
178
  disableServerIdentityCheck: false,
172
179
  saveCertsToDir: '/etc/app/certs',
173
180
  saveCertsPrefix: 'myapp',
@@ -195,7 +202,7 @@ interface SyncClientOptions {
195
202
  networkID: string; // Network identifier
196
203
  caBundle: string; // PEM-encoded CA certificate bundle
197
204
  ownChallenge: string; // Challenge type: 'auto', 'tdx', 'sev', 'untrusted'
198
- verbose?: boolean; // Enable verbose logging (default: false)
205
+ logLevel?: LogLevel; // Log level: fatal | error | warn | info | debug | trace; if omitted logs are disabled
199
206
  disableServerIdentityCheck?: boolean; // Disable server verification (default: false)
200
207
  saveCertsToDir?: string; // Directory to save certificates
201
208
  saveCertsPrefix?: string; // Prefix for certificate filenames
package/dist/cli.js CHANGED
@@ -8,6 +8,7 @@ const yargs_1 = __importDefault(require("yargs"));
8
8
  const helpers_1 = require("yargs/helpers");
9
9
  const config_1 = require("./config");
10
10
  const sync_client_1 = require("./sync-client");
11
+ const pki_common_1 = require("@super-protocol/pki-common");
11
12
  const DEFAULT_SWARM_ENV_PATH = '/sp/swarm/swarm-env.yaml';
12
13
  async function sync(argv) {
13
14
  try {
@@ -18,7 +19,9 @@ async function sync(argv) {
18
19
  networkID: swarmEnv['pki-authority'].networkID,
19
20
  caBundle: swarmEnv['pki-authority'].caBundle,
20
21
  ownChallenge: argv.ownChallenge,
21
- verbose: argv.verbose,
22
+ retryAttempts: argv.retryAttempts,
23
+ retryDelaySec: argv.retryTimeout,
24
+ logLevel: argv.logLevel,
22
25
  disableServerIdentityCheck: argv.disableServerIdentityCheck,
23
26
  saveCertsToDir: argv.saveCertsToDir,
24
27
  saveCertsPrefix: argv.saveCertsPrefix,
@@ -48,15 +51,25 @@ async function main() {
48
51
  demandOption: true,
49
52
  })
50
53
  .option('own-challenge', {
51
- describe: 'Own challenge string for authentication (auto, tdx, sev, untrusted)',
54
+ describe: 'Own challenge string for authentication (auto, tdx, sev-snp, untrusted)',
52
55
  type: 'string',
53
56
  default: 'auto',
54
57
  })
55
- .option('verbose', {
56
- alias: 'v',
57
- describe: 'Verbose output',
58
- type: 'boolean',
59
- default: false,
58
+ .option('log-level', {
59
+ alias: 'l',
60
+ describe: 'Log level',
61
+ choices: Object.values(pki_common_1.LogLevel),
62
+ type: 'string',
63
+ })
64
+ .option('retry-attempts', {
65
+ describe: 'Number of retry attempts per server for retryable network/DNS errors',
66
+ type: 'number',
67
+ default: 3,
68
+ })
69
+ .option('retry-timeout', {
70
+ describe: 'Timeout between retries in seconds for retryable network/DNS errors',
71
+ type: 'number',
72
+ default: 10,
60
73
  })
61
74
  .option('disable-server-identity-check', {
62
75
  describe: 'Disable server identity verification',
@@ -83,4 +96,4 @@ main().catch((error) => {
83
96
  console.error('Error:', error.message);
84
97
  process.exit(1);
85
98
  });
86
- //# sourceMappingURL=data:application/json;base64,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
99
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,20 +1,36 @@
1
1
  import { SyncConfig } from './config';
2
+ import { LogLevel, type DetectedCpuType } from '@super-protocol/pki-common';
2
3
  export interface SyncClientOptions {
3
4
  servers: string[];
4
5
  networkID: string;
5
6
  caBundle: string;
6
- ownChallenge: string;
7
- verbose?: boolean;
7
+ ownChallenge: DetectedCpuType | 'auto';
8
+ retryAttempts?: number;
9
+ retryDelaySec?: number;
10
+ logLevel?: LogLevel;
8
11
  disableServerIdentityCheck?: boolean;
9
12
  saveCertsToDir?: string;
10
13
  saveCertsPrefix?: string;
11
14
  }
12
15
  export declare class SyncClient {
16
+ private static readonly DEFAULT_RETRY_ATTEMPTS;
17
+ private static readonly DEFAULT_RETRY_DELAY_SEC;
18
+ private static readonly RETRYABLE_NETWORK_ERROR_CODES;
19
+ private static readonly RETRYABLE_HTTP_STATUS_CODES;
13
20
  private options;
14
21
  private challenge;
15
22
  private logger;
16
- private static detectCpuType;
23
+ private retryAttempts;
24
+ private retryDelaySec;
25
+ private static readonly UNKNOWN_AXIOS_ERROR_REASON;
26
+ private static readonly NON_AXIOS_ERROR_REASON;
27
+ private static resolveLogger;
17
28
  constructor(options: SyncClientOptions);
29
+ private static normalizeRetryAttempts;
30
+ private static normalizeRetryDelaySec;
31
+ private static evaluateRetry;
32
+ private static waitRetryDelay;
33
+ private syncFromServer;
18
34
  private saveCertificates;
19
35
  sync(config: SyncConfig): Promise<void>;
20
36
  }
@@ -33,51 +33,144 @@ const axios_1 = __importDefault(require("axios"));
33
33
  const fs = __importStar(require("fs"));
34
34
  const path = __importStar(require("path"));
35
35
  class SyncClient {
36
+ static DEFAULT_RETRY_ATTEMPTS = 3;
37
+ static DEFAULT_RETRY_DELAY_SEC = 10;
38
+ static RETRYABLE_NETWORK_ERROR_CODES = new Set([
39
+ 'ETIMEDOUT',
40
+ 'ECONNRESET',
41
+ 'ECONNREFUSED',
42
+ 'EAI_AGAIN',
43
+ 'ENOTFOUND',
44
+ 'ECONNABORTED',
45
+ ]);
46
+ static RETRYABLE_HTTP_STATUS_CODES = new Set([429, 502]);
36
47
  options;
37
48
  challenge;
38
49
  logger;
39
- static detectCpuType() {
40
- try {
41
- const tdxPath = '/dev/tdx_guest';
42
- const sevPath = '/dev/sev-guest';
43
- if (fs.existsSync(tdxPath)) {
44
- const stats = fs.statSync(tdxPath);
45
- if (stats.isCharacterDevice()) {
46
- return 'tdx';
47
- }
48
- }
49
- if (fs.existsSync(sevPath)) {
50
- const stats = fs.statSync(sevPath);
51
- if (stats.isCharacterDevice()) {
52
- return 'sev';
53
- }
54
- }
50
+ retryAttempts;
51
+ retryDelaySec;
52
+ static UNKNOWN_AXIOS_ERROR_REASON = 'unknown-axios-error';
53
+ static NON_AXIOS_ERROR_REASON = 'non-axios-error';
54
+ static resolveLogger(options) {
55
+ if (options.logLevel == null) {
56
+ return new pki_common_1.CommonMockLog();
55
57
  }
56
- catch (error) {
57
- // If we can't check devices, fall back to untrusted
58
+ const allowedLevels = Object.values(pki_common_1.LogLevel);
59
+ if (!allowedLevels.includes(options.logLevel)) {
60
+ throw new Error(`Unsupported log level: ${options.logLevel}. Supported: ${allowedLevels.join(', ')}`);
58
61
  }
59
- return 'untrusted';
62
+ return new pki_common_1.CommonPinoLog(options.logLevel);
60
63
  }
61
64
  constructor(options) {
62
65
  this.options = options;
63
- this.logger = new pki_common_1.ConsoleLog(options.verbose ? pki_common_1.LogLevel.Debug : pki_common_1.LogLevel.Warn);
66
+ this.logger = SyncClient.resolveLogger(options);
67
+ this.retryAttempts = SyncClient.normalizeRetryAttempts(options.retryAttempts);
68
+ this.retryDelaySec = SyncClient.normalizeRetryDelaySec(options.retryDelaySec);
64
69
  const challengeType = options.ownChallenge === 'auto'
65
- ? SyncClient.detectCpuType()
70
+ ? (0, pki_common_1.detectCpuType)()
66
71
  : options.ownChallenge;
67
- if (challengeType === 'tdx') {
72
+ if (challengeType === pki_common_1.ChallengeType.TDX) {
68
73
  this.challenge = { type: pki_common_1.ChallengeType.TDX };
69
74
  }
70
- else if (challengeType === 'sev') {
75
+ else if (challengeType === pki_common_1.ChallengeType.SEVSNP) {
71
76
  this.challenge = { type: pki_common_1.ChallengeType.SEVSNP };
72
77
  }
73
- else if (challengeType === 'untrusted') {
78
+ else if (challengeType === pki_common_1.ChallengeType.Untrusted) {
74
79
  this.challenge = {
75
80
  type: pki_common_1.ChallengeType.Untrusted,
76
81
  idHex: Buffer.from('pki-sync-client-untrusted-id').toString('hex'),
77
82
  };
78
83
  }
79
84
  else {
80
- throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev, untrusted, auto`);
85
+ throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev-snp, untrusted, auto`);
86
+ }
87
+ }
88
+ static normalizeRetryAttempts(value) {
89
+ if (value == null) {
90
+ return SyncClient.DEFAULT_RETRY_ATTEMPTS;
91
+ }
92
+ if (!Number.isInteger(value) || value < 1) {
93
+ throw new Error('Invalid retryAttempts: must be an integer greater than or equal to 1');
94
+ }
95
+ return value;
96
+ }
97
+ static normalizeRetryDelaySec(value) {
98
+ if (value == null) {
99
+ return SyncClient.DEFAULT_RETRY_DELAY_SEC;
100
+ }
101
+ if (!Number.isInteger(value) || value < 0) {
102
+ throw new Error('Invalid retryDelaySec: must be an integer greater than or equal to 0');
103
+ }
104
+ return value;
105
+ }
106
+ static evaluateRetry(error) {
107
+ if (!axios_1.default.isAxiosError(error)) {
108
+ return {
109
+ isRetryable: false,
110
+ reason: SyncClient.NON_AXIOS_ERROR_REASON,
111
+ };
112
+ }
113
+ const httpStatus = error.response?.status;
114
+ if (httpStatus != null) {
115
+ const reason = `http-status:${httpStatus}`;
116
+ return {
117
+ isRetryable: SyncClient.RETRYABLE_HTTP_STATUS_CODES.has(httpStatus),
118
+ reason,
119
+ };
120
+ }
121
+ const errorCode = error.code;
122
+ if (errorCode != null) {
123
+ const reason = `network-code:${errorCode}`;
124
+ return {
125
+ isRetryable: SyncClient.RETRYABLE_NETWORK_ERROR_CODES.has(errorCode),
126
+ reason,
127
+ };
128
+ }
129
+ return {
130
+ isRetryable: false,
131
+ reason: SyncClient.UNKNOWN_AXIOS_ERROR_REASON,
132
+ };
133
+ }
134
+ static async waitRetryDelay(delaySec) {
135
+ if (delaySec <= 0) {
136
+ return;
137
+ }
138
+ await new Promise((resolve) => {
139
+ setTimeout(resolve, delaySec * 1000);
140
+ });
141
+ }
142
+ async syncFromServer(server, config) {
143
+ this.logger.info(`Trying server: ${server}`);
144
+ const pkiConfig = {
145
+ clientCertProvider: {
146
+ type: 'pki-ca',
147
+ challenge: this.challenge,
148
+ baseUrl: `https://${server}/api/v1/pki`,
149
+ caBundle: this.options.caBundle,
150
+ disableServerIdentityCheck: this.options.disableServerIdentityCheck ?? false,
151
+ },
152
+ networkID: this.options.networkID,
153
+ };
154
+ const pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig, this.logger);
155
+ const httpsAgent = await pkiClientFactory.getHTTPSAgent();
156
+ const secretNames = config.secrets.map((s) => s.secretName);
157
+ const response = await axios_1.default.post(`https://${server}/api/v1/secrets/get`, { objects: secretNames }, { httpsAgent });
158
+ const result = response.data;
159
+ for (const secret of config.secrets) {
160
+ const base64Content = result.secrets[secret.secretName];
161
+ if (base64Content == null) {
162
+ throw new Error(`Secret "${secret.secretName}" not found in response`);
163
+ }
164
+ const dir = path.dirname(secret.saveTo);
165
+ await fs.promises.mkdir(dir, { recursive: true });
166
+ await fs.promises.writeFile(secret.saveTo, base64Content, {
167
+ encoding: 'base64',
168
+ mode: 0o600,
169
+ });
170
+ this.logger.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
171
+ }
172
+ if (this.options.saveCertsToDir) {
173
+ await this.saveCertificates(pkiClientFactory, this.options.saveCertsToDir, this.options.saveCertsPrefix);
81
174
  }
82
175
  }
83
176
  async saveCertificates(pkiClientFactory, certsDir, prefix) {
@@ -106,54 +199,33 @@ class SyncClient {
106
199
  }
107
200
  async sync(config) {
108
201
  for (const server of this.options.servers) {
109
- try {
110
- this.logger.info(`Trying server: ${server}`);
111
- const pkiConfig = {
112
- clientCertProvider: {
113
- type: 'pki-ca',
114
- challenge: this.challenge,
115
- baseUrl: `https://${server}/api/v1/pki`,
116
- caBundle: this.options.caBundle,
117
- disableServerIdentityCheck: this.options.disableServerIdentityCheck ?? false,
118
- },
119
- networkID: this.options.networkID,
120
- };
121
- const pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig, this.logger);
122
- const httpsAgent = await pkiClientFactory.getHTTPSAgent();
123
- // Collect all secret names
124
- const secretNames = config.secrets.map((s) => s.secretName);
125
- // Make POST request to fetch secrets
126
- const response = await axios_1.default.post(`https://${server}/api/v1/secrets/get`, { objects: secretNames }, { httpsAgent });
127
- const result = response.data;
128
- // Write secrets to files
129
- for (const secret of config.secrets) {
130
- const base64Content = result.secrets[secret.secretName];
131
- if (base64Content == null) {
132
- throw new Error(`Secret "${secret.secretName}" not found in response`);
133
- }
134
- const content = Buffer.from(base64Content, 'base64');
135
- // Ensure directory exists
136
- const dir = path.dirname(secret.saveTo);
137
- await fs.promises.mkdir(dir, { recursive: true });
138
- await fs.promises.writeFile(secret.saveTo, content, {
139
- mode: 0o600,
140
- });
141
- this.logger.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
202
+ for (let attempt = 1; attempt <= this.retryAttempts; attempt++) {
203
+ try {
204
+ this.logger.info(`Sync attempt ${attempt}/${this.retryAttempts} for server: ${server}`);
205
+ await this.syncFromServer(server, config);
206
+ this.logger.info(`Successfully synced from server: ${server}`);
207
+ return;
142
208
  }
143
- // Save certificates if directory is specified
144
- if (this.options.saveCertsToDir) {
145
- await this.saveCertificates(pkiClientFactory, this.options.saveCertsToDir, this.options.saveCertsPrefix);
209
+ catch (error) {
210
+ const errorMessage = error instanceof Error ? error.message : String(error);
211
+ const retryDecision = SyncClient.evaluateRetry(error);
212
+ const hasMoreAttempts = attempt < this.retryAttempts;
213
+ this.logger.error(`Failed attempt ${attempt}/${this.retryAttempts} for server ${server}: ${errorMessage}. Reason: ${retryDecision.reason}`);
214
+ if (!retryDecision.isRetryable) {
215
+ this.logger.error(`Error is not retryable for server ${server}; moving to next server. Reason: ${retryDecision.reason}`);
216
+ break;
217
+ }
218
+ if (!hasMoreAttempts) {
219
+ this.logger.error(`Retry attempts exhausted for server ${server}; moving to next server. Reason: ${retryDecision.reason}`);
220
+ break;
221
+ }
222
+ this.logger.info(`Retrying server ${server} in ${this.retryDelaySec} second(s). Reason: ${retryDecision.reason}`);
223
+ await SyncClient.waitRetryDelay(this.retryDelaySec);
146
224
  }
147
- this.logger.info(`Successfully synced from server: ${server}`);
148
- return; // Success - exit from method
149
- }
150
- catch (error) {
151
- this.logger.error(`Failed to sync from server ${server}: ${error.message}`);
152
- // Continue to next server
153
225
  }
154
226
  }
155
227
  throw new Error('Failed to sync from all servers');
156
228
  }
157
229
  }
158
230
  exports.SyncClient = SyncClient;
159
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic3luYy1jbGllbnQuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvc3luYy1jbGllbnQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7QUFDQSwyREFJb0M7QUFDcEMsMkRBS29DO0FBQ3BDLGtEQUEwQjtBQUMxQix1Q0FBeUI7QUFDekIsMkNBQTZCO0FBYTdCLE1BQWEsVUFBVTtJQUNYLE9BQU8sQ0FBb0I7SUFDM0IsU0FBUyxDQUFrQjtJQUMzQixNQUFNLENBQWE7SUFFbkIsTUFBTSxDQUFDLGFBQWE7UUFDeEIsSUFBSSxDQUFDO1lBQ0QsTUFBTSxPQUFPLEdBQUcsZ0JBQWdCLENBQUM7WUFDakMsTUFBTSxPQUFPLEdBQUcsZ0JBQWdCLENBQUM7WUFFakMsSUFBSSxFQUFFLENBQUMsVUFBVSxDQUFDLE9BQU8sQ0FBQyxFQUFFLENBQUM7Z0JBQ3pCLE1BQU0sS0FBSyxHQUFHLEVBQUUsQ0FBQyxRQUFRLENBQUMsT0FBTyxDQUFDLENBQUM7Z0JBQ25DLElBQUksS0FBSyxDQUFDLGlCQUFpQixFQUFFLEVBQUUsQ0FBQztvQkFDNUIsT0FBTyxLQUFLLENBQUM7Z0JBQ2pCLENBQUM7WUFDTCxDQUFDO1lBRUQsSUFBSSxFQUFFLENBQUMsVUFBVSxDQUFDLE9BQU8sQ0FBQyxFQUFFLENBQUM7Z0JBQ3pCLE1BQU0sS0FBSyxHQUFHLEVBQUUsQ0FBQyxRQUFRLENBQUMsT0FBTyxDQUFDLENBQUM7Z0JBQ25DLElBQUksS0FBSyxDQUFDLGlCQUFpQixFQUFFLEVBQUUsQ0FBQztvQkFDNUIsT0FBTyxLQUFLLENBQUM7Z0JBQ2pCLENBQUM7WUFDTCxDQUFDO1FBQ0wsQ0FBQztRQUFDLE9BQU8sS0FBSyxFQUFFLENBQUM7WUFDYixvREFBb0Q7UUFDeEQsQ0FBQztRQUVELE9BQU8sV0FBVyxDQUFDO0lBQ3ZCLENBQUM7SUFFRCxZQUFZLE9BQTBCO1FBQ2xDLElBQUksQ0FBQyxPQUFPLEdBQUcsT0FBTyxDQUFDO1FBQ3ZCLElBQUksQ0FBQyxNQUFNLEdBQUcsSUFBSSx1QkFBVSxDQUN4QixPQUFPLENBQUMsT0FBTyxDQUFDLENBQUMsQ0FBQyxxQkFBUSxDQUFDLEtBQUssQ0FBQyxDQUFDLENBQUMscUJBQVEsQ0FBQyxJQUFJLENBQ25ELENBQUM7UUFFRixNQUFNLGFBQWEsR0FDZixPQUFPLENBQUMsWUFBWSxLQUFLLE1BQU07WUFDM0IsQ0FBQyxDQUFDLFVBQVUsQ0FBQyxhQUFhLEVBQUU7WUFDNUIsQ0FBQyxDQUFDLE9BQU8sQ0FBQyxZQUFZLENBQUM7UUFFL0IsSUFBSSxhQUFhLEtBQUssS0FBSyxFQUFFLENBQUM7WUFDMUIsSUFBSSxDQUFDLFNBQVMsR0FBRyxFQUFFLElBQUksRUFBRSwwQkFBYSxDQUFDLEdBQUcsRUFBRSxDQUFDO1FBQ2pELENBQUM7YUFBTSxJQUFJLGFBQWEsS0FBSyxLQUFLLEVBQUUsQ0FBQztZQUNqQyxJQUFJLENBQUMsU0FBUyxHQUFHLEVBQUUsSUFBSSxFQUFFLDBCQUFhLENBQUMsTUFBTSxFQUFFLENBQUM7UUFDcEQsQ0FBQzthQUFNLElBQUksYUFBYSxLQUFLLFdBQVcsRUFBRSxDQUFDO1lBQ3ZDLElBQUksQ0FBQyxTQUFTLEdBQUc7Z0JBQ2IsSUFBSSxFQUFFLDBCQUFhLENBQUMsU0FBUztnQkFDN0IsS0FBSyxFQUFFLE1BQU0sQ0FBQyxJQUFJLENBQUMsOEJBQThCLENBQUMsQ0FBQyxRQUFRLENBQ3ZELEtBQUssQ0FDUjthQUNKLENBQUM7UUFDTixDQUFDO2FBQU0sQ0FBQztZQUNKLE1BQU0sSUFBSSxLQUFLLENBQ1gsK0JBQStCLGFBQWEsd0NBQXdDLENBQ3ZGLENBQUM7UUFDTixDQUFDO0lBQ0wsQ0FBQztJQUVPLEtBQUssQ0FBQyxnQkFBZ0IsQ0FDMUIsZ0JBQWtDLEVBQ2xDLFFBQWdCLEVBQ2hCLE1BQWU7UUFFZiwwQkFBMEI7UUFDMUIsTUFBTSxFQUFFLENBQUMsUUFBUSxDQUFDLEtBQUssQ0FBQyxRQUFRLEVBQUUsRUFBRSxTQUFTLEVBQUUsSUFBSSxFQUFFLENBQUMsQ0FBQztRQUV2RCxNQUFNLElBQUksR0FBRyxNQUFNLGdCQUFnQixDQUFDLE9BQU8sRUFBRSxDQUFDO1FBQzlDLE1BQU0sRUFDRixJQUFJLEVBQUUsVUFBVSxFQUNoQix3QkFBd0IsRUFDeEIsRUFBRSxHQUNMLEdBQUcsSUFBQSw0Q0FBK0IsRUFBQyxJQUFJLENBQUMsQ0FBQztRQUUxQyxNQUFNLFNBQVMsR0FBRyxNQUFNLENBQUMsQ0FBQyxDQUFDLEdBQUcsTUFBTSxHQUFHLENBQUMsQ0FBQyxDQUFDLEVBQUUsQ0FBQztRQUU3QyxtQkFBbUI7UUFDbkIsTUFBTSxPQUFPLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxRQUFRLEVBQUUsR0FBRyxTQUFTLFNBQVMsQ0FBQyxDQUFDO1FBQzNELE1BQU0sRUFBRSxDQUFDLFFBQVEsQ0FBQyxTQUFTLENBQUMsT0FBTyxFQUFFLElBQUksQ0FBQyxPQUFPLENBQUMsYUFBYSxFQUFFO1lBQzdELElBQUksRUFBRSxLQUFLO1NBQ2QsQ0FBQyxDQUFDO1FBQ0gsSUFBSSxDQUFDLE1BQU0sQ0FBQyxJQUFJLENBQUMsd0JBQXdCLE9BQU8sRUFBRSxDQUFDLENBQUM7UUFFcEQsc0JBQXNCO1FBQ3RCLE1BQU0sTUFBTSxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsUUFBUSxFQUFFLEdBQUcsU0FBUyxRQUFRLENBQUMsQ0FBQztRQUN6RCxNQUFNLEVBQUUsQ0FBQyxRQUFRLENBQUMsU0FBUyxDQUFDLE1BQU0sRUFBRSxFQUFFLEVBQUUsRUFBRSxJQUFJLEVBQUUsS0FBSyxFQUFFLENBQUMsQ0FBQztRQUN6RCxJQUFJLENBQUMsTUFBTSxDQUFDLElBQUksQ0FBQywyQkFBMkIsTUFBTSxFQUFFLENBQUMsQ0FBQztRQUV0RCxrREFBa0Q7UUFDbEQsTUFBTSxvQkFBb0IsR0FBRyxVQUFVLEdBQUcsd0JBQXdCLENBQUM7UUFDbkUsTUFBTSxRQUFRLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxRQUFRLEVBQUUsR0FBRyxTQUFTLFVBQVUsQ0FBQyxDQUFDO1FBQzdELE1BQU0sRUFBRSxDQUFDLFFBQVEsQ0FBQyxTQUFTLENBQUMsUUFBUSxFQUFFLG9CQUFvQixFQUFFO1lBQ3hELElBQUksRUFBRSxLQUFLO1NBQ2QsQ0FBQyxDQUFDO1FBQ0gsSUFBSSxDQUFDLE1BQU0sQ0FBQyxJQUFJLENBQUMsOEJBQThCLFFBQVEsRUFBRSxDQUFDLENBQUM7SUFDL0QsQ0FBQztJQUVELEtBQUssQ0FBQyxJQUFJLENBQUMsTUFBa0I7UUFDekIsS0FBSyxNQUFNLE1BQU0sSUFBSSxJQUFJLENBQUMsT0FBTyxDQUFDLE9BQU8sRUFBRSxDQUFDO1lBQ3hDLElBQUksQ0FBQztnQkFDRCxJQUFJLENBQUMsTUFBTSxDQUFDLElBQUksQ0FBQyxrQkFBa0IsTUFBTSxFQUFFLENBQUMsQ0FBQztnQkFFN0MsTUFBTSxTQUFTLEdBQW9CO29CQUMvQixrQkFBa0IsRUFBRTt3QkFDaEIsSUFBSSxFQUFFLFFBQVE7d0JBQ2QsU0FBUyxFQUFFLElBQUksQ0FBQyxTQUFTO3dCQUN6QixPQUFPLEVBQUUsV0FBVyxNQUFNLGFBQWE7d0JBQ3ZDLFFBQVEsRUFBRSxJQUFJLENBQUMsT0FBTyxDQUFDLFFBQVE7d0JBQy9CLDBCQUEwQixFQUN0QixJQUFJLENBQUMsT0FBTyxDQUFDLDBCQUEwQixJQUFJLEtBQUs7cUJBQ3ZEO29CQUNELFNBQVMsRUFBRSxJQUFJLENBQUMsT0FBTyxDQUFDLFNBQVM7aUJBQ3BDLENBQUM7Z0JBRUYsTUFBTSxnQkFBZ0IsR0FBRyxJQUFJLDZCQUFnQixDQUN6QyxTQUFTLEVBQ1QsSUFBSSxDQUFDLE1BQU0sQ0FDZCxDQUFDO2dCQUNGLE1BQU0sVUFBVSxHQUFHLE1BQU0sZ0JBQWdCLENBQUMsYUFBYSxFQUFFLENBQUM7Z0JBRTFELDJCQUEyQjtnQkFDM0IsTUFBTSxXQUFXLEdBQUcsTUFBTSxDQUFDLE9BQU8sQ0FBQyxHQUFHLENBQUMsQ0FBQyxDQUFDLEVBQUUsRUFBRSxDQUFDLENBQUMsQ0FBQyxVQUFVLENBQUMsQ0FBQztnQkFFNUQscUNBQXFDO2dCQUNyQyxNQUFNLFFBQVEsR0FBRyxNQUFNLGVBQUssQ0FBQyxJQUFJLENBQzdCLFdBQVcsTUFBTSxxQkFBcUIsRUFDdEMsRUFBRSxPQUFPLEVBQUUsV0FBVyxFQUFFLEVBQ3hCLEVBQUUsVUFBVSxFQUFFLENBQ2pCLENBQUM7Z0JBRUYsTUFBTSxNQUFNLEdBQUcsUUFBUSxDQUFDLElBQUksQ0FBQztnQkFFN0IseUJBQXlCO2dCQUN6QixLQUFLLE1BQU0sTUFBTSxJQUFJLE1BQU0sQ0FBQyxPQUFPLEVBQUUsQ0FBQztvQkFDbEMsTUFBTSxhQUFhLEdBQUcsTUFBTSxDQUFDLE9BQU8sQ0FBQyxNQUFNLENBQUMsVUFBVSxDQUFDLENBQUM7b0JBQ3hELElBQUksYUFBYSxJQUFJLElBQUksRUFBRSxDQUFDO3dCQUN4QixNQUFNLElBQUksS0FBSyxDQUNYLFdBQVcsTUFBTSxDQUFDLFVBQVUseUJBQXlCLENBQ3hELENBQUM7b0JBQ04sQ0FBQztvQkFDRCxNQUFNLE9BQU8sR0FBRyxNQUFNLENBQUMsSUFBSSxDQUFDLGFBQWEsRUFBRSxRQUFRLENBQUMsQ0FBQztvQkFFckQsMEJBQTBCO29CQUMxQixNQUFNLEdBQUcsR0FBRyxJQUFJLENBQUMsT0FBTyxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUMsQ0FBQztvQkFDeEMsTUFBTSxFQUFFLENBQUMsUUFBUSxDQUFDLEtBQUssQ0FBQyxHQUFHLEVBQUUsRUFBRSxTQUFTLEVBQUUsSUFBSSxFQUFFLENBQUMsQ0FBQztvQkFFbEQsTUFBTSxFQUFFLENBQUMsUUFBUSxDQUFDLFNBQVMsQ0FBQyxNQUFNLENBQUMsTUFBTSxFQUFFLE9BQU8sRUFBRTt3QkFDaEQsSUFBSSxFQUFFLEtBQUs7cUJBQ2QsQ0FBQyxDQUFDO29CQUVILElBQUksQ0FBQyxNQUFNLENBQUMsSUFBSSxDQUNaLGlCQUFpQixNQUFNLENBQUMsVUFBVSxRQUFRLE1BQU0sQ0FBQyxNQUFNLEVBQUUsQ0FDNUQsQ0FBQztnQkFDTixDQUFDO2dCQUVELDhDQUE4QztnQkFDOUMsSUFBSSxJQUFJLENBQUMsT0FBTyxDQUFDLGNBQWMsRUFBRSxDQUFDO29CQUM5QixNQUFNLElBQUksQ0FBQyxnQkFBZ0IsQ0FDdkIsZ0JBQWdCLEVBQ2hCLElBQUksQ0FBQyxPQUFPLENBQUMsY0FBYyxFQUMzQixJQUFJLENBQUMsT0FBTyxDQUFDLGVBQWUsQ0FDL0IsQ0FBQztnQkFDTixDQUFDO2dCQUVELElBQUksQ0FBQyxNQUFNLENBQUMsSUFBSSxDQUFDLG9DQUFvQyxNQUFNLEVBQUUsQ0FBQyxDQUFDO2dCQUMvRCxPQUFPLENBQUMsNkJBQTZCO1lBQ3pDLENBQUM7WUFBQyxPQUFPLEtBQVUsRUFBRSxDQUFDO2dCQUNsQixJQUFJLENBQUMsTUFBTSxDQUFDLEtBQUssQ0FDYiw4QkFBOEIsTUFBTSxLQUFLLEtBQUssQ0FBQyxPQUFPLEVBQUUsQ0FDM0QsQ0FBQztnQkFDRiwwQkFBMEI7WUFDOUIsQ0FBQztRQUNMLENBQUM7UUFFRCxNQUFNLElBQUksS0FBSyxDQUFDLGlDQUFpQyxDQUFDLENBQUM7SUFDdkQsQ0FBQztDQUNKO0FBaExELGdDQWdMQyJ9
231
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sync-client.js","sourceRoot":"","sources":["../src/sync-client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AACA,2DAIoC;AACpC,2DASoC;AACpC,kDAA0B;AAC1B,uCAAyB;AACzB,2CAA6B;AAe7B,MAAa,UAAU;IACX,MAAM,CAAU,sBAAsB,GAAG,CAAC,CAAC;IAC3C,MAAM,CAAU,uBAAuB,GAAG,EAAE,CAAC;IAC7C,MAAM,CAAU,6BAA6B,GAAG,IAAI,GAAG,CAAC;QAC5D,WAAW;QACX,YAAY;QACZ,cAAc;QACd,WAAW;QACX,WAAW;QACX,cAAc;KACjB,CAAC,CAAC;IACK,MAAM,CAAU,2BAA2B,GAAG,IAAI,GAAG,CAAC,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;IAElE,OAAO,CAAoB;IAC3B,SAAS,CAAkB;IAC3B,MAAM,CAAM;IACZ,aAAa,CAAS;IACtB,aAAa,CAAS;IAEtB,MAAM,CAAU,0BAA0B,GAAG,qBAAqB,CAAC;IAEnE,MAAM,CAAU,sBAAsB,GAAG,iBAAiB,CAAC;IAE3D,MAAM,CAAC,aAAa,CAAC,OAA0B;QACnD,IAAI,OAAO,CAAC,QAAQ,IAAI,IAAI,EAAE,CAAC;YAC3B,OAAO,IAAI,0BAAO,EAAE,CAAC;QACzB,CAAC;QAED,MAAM,aAAa,GAAG,MAAM,CAAC,MAAM,CAAC,qBAAQ,CAAa,CAAC;QAC1D,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CACX,0BAA0B,OAAO,CAAC,QAAQ,gBAAgB,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CACvF,CAAC;QACN,CAAC;QAED,OAAO,IAAI,0BAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACzC,CAAC;IAED,YAAY,OAA0B;QAClC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,UAAU,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,sBAAsB,CAClD,OAAO,CAAC,aAAa,CACxB,CAAC;QACF,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,sBAAsB,CAClD,OAAO,CAAC,aAAa,CACxB,CAAC;QAEF,MAAM,aAAa,GACf,OAAO,CAAC,YAAY,KAAK,MAAM;YAC3B,CAAC,CAAC,IAAA,0BAAa,GAAE;YACjB,CAAC,CAAC,OAAO,CAAC,YAAY,CAAC;QAE/B,IAAI,aAAa,KAAK,0BAAa,CAAC,GAAG,EAAE,CAAC;YACtC,IAAI,CAAC,SAAS,GAAG,EAAE,IAAI,EAAE,0BAAa,CAAC,GAAG,EAAE,CAAC;QACjD,CAAC;aAAM,IAAI,aAAa,KAAK,0BAAa,CAAC,MAAM,EAAE,CAAC;YAChD,IAAI,CAAC,SAAS,GAAG,EAAE,IAAI,EAAE,0BAAa,CAAC,MAAM,EAAE,CAAC;QACpD,CAAC;aAAM,IAAI,aAAa,KAAK,0BAAa,CAAC,SAAS,EAAE,CAAC;YACnD,IAAI,CAAC,SAAS,GAAG;gBACb,IAAI,EAAE,0BAAa,CAAC,SAAS;gBAC7B,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,QAAQ,CACvD,KAAK,CACR;aACJ,CAAC;QACN,CAAC;aAAM,CAAC;YACJ,MAAM,IAAI,KAAK,CACX,+BAA+B,aAAa,4CAA4C,CAC3F,CAAC;QACN,CAAC;IACL,CAAC;IAEO,MAAM,CAAC,sBAAsB,CAAC,KAAyB;QAC3D,IAAI,KAAK,IAAI,IAAI,EAAE,CAAC;YAChB,OAAO,UAAU,CAAC,sBAAsB,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACX,sEAAsE,CACzE,CAAC;QACN,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,sBAAsB,CAAC,KAAyB;QAC3D,IAAI,KAAK,IAAI,IAAI,EAAE,CAAC;YAChB,OAAO,UAAU,CAAC,uBAAuB,CAAC;QAC9C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACX,sEAAsE,CACzE,CAAC;QACN,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,aAAa,CAAC,KAAc;QAIvC,IAAI,CAAC,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE,CAAC;YAC7B,OAAO;gBACH,WAAW,EAAE,KAAK;gBAClB,MAAM,EAAE,UAAU,CAAC,sBAAsB;aAC5C,CAAC;QACN,CAAC;QAED,MAAM,UAAU,GAAG,KAAK,CAAC,QAAQ,EAAE,MAAM,CAAC;QAC1C,IAAI,UAAU,IAAI,IAAI,EAAE,CAAC;YACrB,MAAM,MAAM,GAAG,eAAe,UAAU,EAAE,CAAC;YAC3C,OAAO;gBACH,WAAW,EACP,UAAU,CAAC,2BAA2B,CAAC,GAAG,CAAC,UAAU,CAAC;gBAC1D,MAAM;aACT,CAAC;QACN,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,CAAC;QAC7B,IAAI,SAAS,IAAI,IAAI,EAAE,CAAC;YACpB,MAAM,MAAM,GAAG,gBAAgB,SAAS,EAAE,CAAC;YAC3C,OAAO;gBACH,WAAW,EACP,UAAU,CAAC,6BAA6B,CAAC,GAAG,CAAC,SAAS,CAAC;gBAC3D,MAAM;aACT,CAAC;QACN,CAAC;QAED,OAAO;YACH,WAAW,EAAE,KAAK;YAClB,MAAM,EAAE,UAAU,CAAC,0BAA0B;SAChD,CAAC;IACN,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,cAAc,CAAC,QAAgB;QAChD,IAAI,QAAQ,IAAI,CAAC,EAAE,CAAC;YAChB,OAAO;QACX,CAAC;QAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC1B,UAAU,CAAC,OAAO,EAAE,QAAQ,GAAG,IAAI,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,KAAK,CAAC,cAAc,CACxB,MAAc,EACd,MAAkB;QAElB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,MAAM,EAAE,CAAC,CAAC;QAE7C,MAAM,SAAS,GAAoB;YAC/B,kBAAkB,EAAE;gBAChB,IAAI,EAAE,QAAQ;gBACd,SAAS,EAAE,IAAI,CAAC,SAAS;gBACzB,OAAO,EAAE,WAAW,MAAM,aAAa;gBACvC,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;gBAC/B,0BAA0B,EACtB,IAAI,CAAC,OAAO,CAAC,0BAA0B,IAAI,KAAK;aACvD;YACD,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,SAAS;SACpC,CAAC;QAEF,MAAM,gBAAgB,GAAG,IAAI,6BAAgB,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QACtE,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,aAAa,EAAE,CAAC;QAE1D,MAAM,WAAW,GAAG,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC;QAE5D,MAAM,QAAQ,GAAG,MAAM,eAAK,CAAC,IAAI,CAC7B,WAAW,MAAM,qBAAqB,EACtC,EAAE,OAAO,EAAE,WAAW,EAAE,EACxB,EAAE,UAAU,EAAE,CACjB,CAAC;QAEF,MAAM,MAAM,GAAG,QAAQ,CAAC,IAAI,CAAC;QAE7B,KAAK,MAAM,MAAM,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;YAClC,MAAM,aAAa,GAAG,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACxD,IAAI,aAAa,IAAI,IAAI,EAAE,CAAC;gBACxB,MAAM,IAAI,KAAK,CACX,WAAW,MAAM,CAAC,UAAU,yBAAyB,CACxD,CAAC;YACN,CAAC;YAED,MAAM,GAAG,GAAG,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACxC,MAAM,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,GAAG,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;YAElD,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,MAAM,EAAE,aAAa,EAAE;gBACtD,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,KAAK;aACd,CAAC,CAAC;YAEH,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,iBAAiB,MAAM,CAAC,UAAU,QAAQ,MAAM,CAAC,MAAM,EAAE,CAC5D,CAAC;QACN,CAAC;QAED,IAAI,IAAI,CAAC,OAAO,CAAC,cAAc,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,gBAAgB,CACvB,gBAAgB,EAChB,IAAI,CAAC,OAAO,CAAC,cAAc,EAC3B,IAAI,CAAC,OAAO,CAAC,eAAe,CAC/B,CAAC;QACN,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,gBAAgB,CAC1B,gBAAkC,EAClC,QAAgB,EAChB,MAAe;QAEf,0BAA0B;QAC1B,MAAM,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,QAAQ,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAEvD,MAAM,IAAI,GAAG,MAAM,gBAAgB,CAAC,OAAO,EAAE,CAAC;QAC9C,MAAM,EACF,IAAI,EAAE,UAAU,EAChB,wBAAwB,EACxB,EAAE,GACL,GAAG,IAAA,4CAA+B,EAAC,IAAI,CAAC,CAAC;QAE1C,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;QAE7C,mBAAmB;QACnB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,SAAS,CAAC,CAAC;QAC3D,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,aAAa,EAAE;YAC7D,IAAI,EAAE,KAAK;SACd,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wBAAwB,OAAO,EAAE,CAAC,CAAC;QAEpD,sBAAsB;QACtB,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,QAAQ,CAAC,CAAC;QACzD,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,MAAM,EAAE,EAAE,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,CAAC,CAAC;QACzD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,2BAA2B,MAAM,EAAE,CAAC,CAAC;QAEtD,kDAAkD;QAClD,MAAM,oBAAoB,GAAG,UAAU,GAAG,wBAAwB,CAAC;QACnE,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,UAAU,CAAC,CAAC;QAC7D,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,EAAE,oBAAoB,EAAE;YACxD,IAAI,EAAE,KAAK;SACd,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,KAAK,CAAC,IAAI,CAAC,MAAkB;QACzB,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;YACxC,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,IAAI,IAAI,CAAC,aAAa,EAAE,OAAO,EAAE,EAAE,CAAC;gBAC7D,IAAI,CAAC;oBACD,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,gBAAgB,OAAO,IAAI,IAAI,CAAC,aAAa,gBAAgB,MAAM,EAAE,CACxE,CAAC;oBAEF,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;oBAC1C,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,oCAAoC,MAAM,EAAE,CAC/C,CAAC;oBACF,OAAO;gBACX,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;oBAC3D,MAAM,aAAa,GAAG,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;oBACtD,MAAM,eAAe,GAAG,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC;oBAErD,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,kBAAkB,OAAO,IAAI,IAAI,CAAC,aAAa,eAAe,MAAM,KAAK,YAAY,aAAa,aAAa,CAAC,MAAM,EAAE,CAC3H,CAAC;oBAEF,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC;wBAC7B,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,qCAAqC,MAAM,oCAAoC,aAAa,CAAC,MAAM,EAAE,CACxG,CAAC;wBACF,MAAM;oBACV,CAAC;oBAED,IAAI,CAAC,eAAe,EAAE,CAAC;wBACnB,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,uCAAuC,MAAM,oCAAoC,aAAa,CAAC,MAAM,EAAE,CAC1G,CAAC;wBACF,MAAM;oBACV,CAAC;oBAED,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,mBAAmB,MAAM,OAAO,IAAI,CAAC,aAAa,uBAAuB,aAAa,CAAC,MAAM,EAAE,CAClG,CAAC;oBACF,MAAM,UAAU,CAAC,cAAc,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBACxD,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACvD,CAAC;;AAnSL,gCAoSC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@super-protocol/pki-sync-client",
3
- "version": "2.0.11",
3
+ "version": "3.0.0",
4
4
  "description": "PKI sync client utility",
5
5
  "main": "dist/index.js",
6
6
  "bin": {
@@ -23,8 +23,8 @@
23
23
  "license": "ISC",
24
24
  "dependencies": {
25
25
  "@sinclair/typebox": "0.33.22",
26
- "@super-protocol/pki-client": "^2.1.7",
27
- "@super-protocol/pki-common": "^2.0.3",
26
+ "@super-protocol/pki-client": "^3.0.0",
27
+ "@super-protocol/pki-common": "^3.0.2",
28
28
  "axios": "^1.7.0",
29
29
  "js-yaml": "^4.1.0",
30
30
  "yargs": "^17.7.2"