@webex/internal-plugin-search 3.10.0-multi-llms.1 → 3.10.0-next.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"names":["_default","exports","default","search"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nexport default {\n search: {},\n};\n"],"mappings":";;;;;;;AAAA;AACA;AACA;AAFA,IAAAA,QAAA,GAAAC,OAAA,CAAAC,OAAA,GAIe;EACbC,MAAM,EAAE,CAAC;AACX,CAAC"}
1
+ {"version":3,"names":["_default","exports","default","search"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nexport default {\n search: {},\n};\n"],"mappings":";;;;;;;AAAA;AACA;AACA;AAFA,IAAAA,QAAA,GAAAC,OAAA,CAAAC,OAAA,GAIe;EACbC,MAAM,EAAE,CAAC;AACX,CAAC","ignoreList":[]}
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"names":["require","_webexCore","_lodash","_search","_interopRequireDefault","_config","registerInternalPlugin","Search","config","payloadTransformer","predicates","name","direction","test","ctx","options","has","_promise","default","resolve","service","url","webex","internal","services","getServiceFromUrl","extract","body","response","then","res","activities","items","transforms","fn","object","encryption","encryptText","searchEncryptionKeyUrl","query","q"],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\nimport '@webex/internal-plugin-conversation';\nimport '@webex/internal-plugin-encryption';\n\nimport {registerInternalPlugin} from '@webex/webex-core';\nimport {has} from 'lodash';\n\nimport Search from './search';\nimport config from './config';\n\nregisterInternalPlugin('search', Search, {\n config,\n payloadTransformer: {\n predicates: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n test(ctx, options) {\n if (!has(options, 'body.query')) {\n return Promise.resolve(false);\n }\n\n if (!has(options, 'body.searchEncryptionKeyUrl')) {\n return Promise.resolve(false);\n }\n\n if (options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n },\n extract(options) {\n return Promise.resolve(options.body);\n },\n },\n {\n name: 'transformObjectArray',\n direction: 'inbound',\n test(ctx, response) {\n return Promise.resolve(has(response, 'body.activities.items[0].objectType')).then(\n (res) => {\n if (!res) {\n return Promise.resolve(false);\n }\n\n if (response.options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (response.options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(response.options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n }\n );\n },\n extract(response) {\n return Promise.resolve(response.body.activities.items);\n },\n },\n ],\n transforms: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n fn(ctx, object) {\n return ctx.webex.internal.encryption\n .encryptText(object.searchEncryptionKeyUrl, object.query)\n .then((q) => {\n object.query = q;\n });\n },\n },\n ],\n },\n});\n\nexport {default} from './search';\n"],"mappings":";;;;;;;;;;;;;;AAGAA,OAAA;AACAA,OAAA;AAEA,IAAAC,UAAA,GAAAD,OAAA;AACA,IAAAE,OAAA,GAAAF,OAAA;AAEA,IAAAG,OAAA,GAAAC,sBAAA,CAAAJ,OAAA;AACA,IAAAK,OAAA,GAAAD,sBAAA,CAAAJ,OAAA;AAVA;AACA;AACA;;AAUA,IAAAM,iCAAsB,EAAC,QAAQ,EAAEC,eAAM,EAAE;EACvCC,MAAM,EAANA,eAAM;EACNC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,CACV;MACEC,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBC,IAAI,WAAAA,KAACC,GAAG,EAAEC,OAAO,EAAE;QACjB,IAAI,CAAC,IAAAC,WAAG,EAACD,OAAO,EAAE,YAAY,CAAC,EAAE;UAC/B,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B;QAEA,IAAI,CAAC,IAAAH,WAAG,EAACD,OAAO,EAAE,6BAA6B,CAAC,EAAE;UAChD,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B;QAEA,IAAIJ,OAAO,CAACK,OAAO,KAAK,UAAU,EAAE;UAClC,OAAOH,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAI,CAAC;QAC9B;QAEA,IAAIJ,OAAO,CAACM,GAAG,EAAE;UACf,IAAMD,OAAO,GAAGN,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACC,QAAQ,CAACC,iBAAiB,CAACV,OAAO,CAACM,GAAG,CAAC;UAE1E,OAAOJ,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACC,OAAO,IAAIA,OAAO,CAACT,IAAI,KAAK,UAAU,CAAC;QAChE;QAEA,OAAOM,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;MAC/B,CAAC;MACDO,OAAO,WAAAA,QAACX,OAAO,EAAE;QACf,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACJ,OAAO,CAACY,IAAI,CAAC;MACtC;IACF,CAAC,EACD;MACEhB,IAAI,EAAE,sBAAsB;MAC5BC,SAAS,EAAE,SAAS;MACpBC,IAAI,WAAAA,KAACC,GAAG,EAAEc,QAAQ,EAAE;QAClB,OAAOX,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAAH,WAAG,EAACY,QAAQ,EAAE,qCAAqC,CAAC,CAAC,CAACC,IAAI,CAC/E,UAACC,GAAG,EAAK;UACP,IAAI,CAACA,GAAG,EAAE;YACR,OAAOb,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;UAC/B;UAEA,IAAIS,QAAQ,CAACb,OAAO,CAACK,OAAO,KAAK,UAAU,EAAE;YAC3C,OAAOH,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAI,CAAC;UAC9B;UAEA,IAAIS,QAAQ,CAACb,OAAO,CAACM,GAAG,EAAE;YACxB,IAAMD,OAAO,GAAGN,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACC,QAAQ,CAACC,iBAAiB,CAACG,QAAQ,CAACb,OAAO,CAACM,GAAG,CAAC;YAEnF,OAAOJ,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACC,OAAO,IAAIA,OAAO,CAACT,IAAI,KAAK,UAAU,CAAC;UAChE;UAEA,OAAOM,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B,CACF,CAAC;MACH,CAAC;MACDO,OAAO,WAAAA,QAACE,QAAQ,EAAE;QAChB,OAAOX,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACS,QAAQ,CAACD,IAAI,CAACI,UAAU,CAACC,KAAK,CAAC;MACxD;IACF,CAAC,CACF;IACDC,UAAU,EAAE,CACV;MACEtB,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBsB,EAAE,WAAAA,GAACpB,GAAG,EAAEqB,MAAM,EAAE;QACd,OAAOrB,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACa,UAAU,CACjCC,WAAW,CAACF,MAAM,CAACG,sBAAsB,EAAEH,MAAM,CAACI,KAAK,CAAC,CACxDV,IAAI,CAAC,UAACW,CAAC,EAAK;UACXL,MAAM,CAACI,KAAK,GAAGC,CAAC;QAClB,CAAC,CAAC;MACN;IACF,CAAC;EAEL;AACF,CAAC,CAAC"}
1
+ {"version":3,"names":["require","_webexCore","_lodash","_search","_interopRequireDefault","_config","registerInternalPlugin","Search","config","payloadTransformer","predicates","name","direction","test","ctx","options","has","_promise","default","resolve","service","url","webex","internal","services","getServiceFromUrl","extract","body","response","then","res","activities","items","transforms","fn","object","encryption","encryptText","searchEncryptionKeyUrl","query","q"],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\nimport '@webex/internal-plugin-conversation';\nimport '@webex/internal-plugin-encryption';\n\nimport {registerInternalPlugin} from '@webex/webex-core';\nimport {has} from 'lodash';\n\nimport Search from './search';\nimport config from './config';\n\nregisterInternalPlugin('search', Search, {\n config,\n payloadTransformer: {\n predicates: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n test(ctx, options) {\n if (!has(options, 'body.query')) {\n return Promise.resolve(false);\n }\n\n if (!has(options, 'body.searchEncryptionKeyUrl')) {\n return Promise.resolve(false);\n }\n\n if (options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n },\n extract(options) {\n return Promise.resolve(options.body);\n },\n },\n {\n name: 'transformObjectArray',\n direction: 'inbound',\n test(ctx, response) {\n return Promise.resolve(has(response, 'body.activities.items[0].objectType')).then(\n (res) => {\n if (!res) {\n return Promise.resolve(false);\n }\n\n if (response.options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (response.options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(response.options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n }\n );\n },\n extract(response) {\n return Promise.resolve(response.body.activities.items);\n },\n },\n ],\n transforms: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n fn(ctx, object) {\n return ctx.webex.internal.encryption\n .encryptText(object.searchEncryptionKeyUrl, object.query)\n .then((q) => {\n object.query = q;\n });\n },\n },\n ],\n },\n});\n\nexport {default} from './search';\n"],"mappings":";;;;;;;;;;;;;;AAGAA,OAAA;AACAA,OAAA;AAEA,IAAAC,UAAA,GAAAD,OAAA;AACA,IAAAE,OAAA,GAAAF,OAAA;AAEA,IAAAG,OAAA,GAAAC,sBAAA,CAAAJ,OAAA;AACA,IAAAK,OAAA,GAAAD,sBAAA,CAAAJ,OAAA;AAVA;AACA;AACA;;AAUA,IAAAM,iCAAsB,EAAC,QAAQ,EAAEC,eAAM,EAAE;EACvCC,MAAM,EAANA,eAAM;EACNC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,CACV;MACEC,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBC,IAAI,WAAJA,IAAIA,CAACC,GAAG,EAAEC,OAAO,EAAE;QACjB,IAAI,CAAC,IAAAC,WAAG,EAACD,OAAO,EAAE,YAAY,CAAC,EAAE;UAC/B,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B;QAEA,IAAI,CAAC,IAAAH,WAAG,EAACD,OAAO,EAAE,6BAA6B,CAAC,EAAE;UAChD,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B;QAEA,IAAIJ,OAAO,CAACK,OAAO,KAAK,UAAU,EAAE;UAClC,OAAOH,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAI,CAAC;QAC9B;QAEA,IAAIJ,OAAO,CAACM,GAAG,EAAE;UACf,IAAMD,OAAO,GAAGN,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACC,QAAQ,CAACC,iBAAiB,CAACV,OAAO,CAACM,GAAG,CAAC;UAE1E,OAAOJ,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACC,OAAO,IAAIA,OAAO,CAACT,IAAI,KAAK,UAAU,CAAC;QAChE;QAEA,OAAOM,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;MAC/B,CAAC;MACDO,OAAO,WAAPA,OAAOA,CAACX,OAAO,EAAE;QACf,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACJ,OAAO,CAACY,IAAI,CAAC;MACtC;IACF,CAAC,EACD;MACEhB,IAAI,EAAE,sBAAsB;MAC5BC,SAAS,EAAE,SAAS;MACpBC,IAAI,WAAJA,IAAIA,CAACC,GAAG,EAAEc,QAAQ,EAAE;QAClB,OAAOX,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAAH,WAAG,EAACY,QAAQ,EAAE,qCAAqC,CAAC,CAAC,CAACC,IAAI,CAC/E,UAACC,GAAG,EAAK;UACP,IAAI,CAACA,GAAG,EAAE;YACR,OAAOb,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;UAC/B;UAEA,IAAIS,QAAQ,CAACb,OAAO,CAACK,OAAO,KAAK,UAAU,EAAE;YAC3C,OAAOH,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAI,CAAC;UAC9B;UAEA,IAAIS,QAAQ,CAACb,OAAO,CAACM,GAAG,EAAE;YACxB,IAAMD,OAAO,GAAGN,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACC,QAAQ,CAACC,iBAAiB,CAACG,QAAQ,CAACb,OAAO,CAACM,GAAG,CAAC;YAEnF,OAAOJ,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACC,OAAO,IAAIA,OAAO,CAACT,IAAI,KAAK,UAAU,CAAC;UAChE;UAEA,OAAOM,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B,CACF,CAAC;MACH,CAAC;MACDO,OAAO,WAAPA,OAAOA,CAACE,QAAQ,EAAE;QAChB,OAAOX,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACS,QAAQ,CAACD,IAAI,CAACI,UAAU,CAACC,KAAK,CAAC;MACxD;IACF,CAAC,CACF;IACDC,UAAU,EAAE,CACV;MACEtB,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBsB,EAAE,WAAFA,EAAEA,CAACpB,GAAG,EAAEqB,MAAM,EAAE;QACd,OAAOrB,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACa,UAAU,CACjCC,WAAW,CAACF,MAAM,CAACG,sBAAsB,EAAEH,MAAM,CAACI,KAAK,CAAC,CACxDV,IAAI,CAAC,UAACW,CAAC,EAAK;UACXL,MAAM,CAACI,KAAK,GAAGC,CAAC;QAClB,CAAC,CAAC;MACN;IACF,CAAC;EAEL;AACF,CAAC,CAAC","ignoreList":[]}
package/dist/search.js CHANGED
@@ -109,7 +109,7 @@ var Search = _webexCore.WebexPlugin.extend((_obj = {
109
109
  return resActivities;
110
110
  });
111
111
  },
112
- version: "3.10.0-multi-llms.1"
113
- }, ((0, _applyDecoratedDescriptor2.default)(_obj, "bindSearchKey", [_common.oneFlight], (0, _getOwnPropertyDescriptor.default)(_obj, "bindSearchKey"), _obj)), _obj));
112
+ version: "3.10.0-next.10"
113
+ }, (0, _applyDecoratedDescriptor2.default)(_obj, "bindSearchKey", [_common.oneFlight], (0, _getOwnPropertyDescriptor.default)(_obj, "bindSearchKey"), _obj), _obj));
114
114
  var _default = exports.default = Search;
115
115
  //# sourceMappingURL=search.js.map
@@ -1 +1 @@
1
- {"version":3,"names":["_lodash","require","_common","_webexCore","_obj","Search","WebexPlugin","extend","namespace","people","options","queryString","query","_deleteProperty","default","_promise","reject","Error","request","api","resource","method","body","then","res","bindSearchKey","_this","webex","internal","encryption","kms","createUnboundKeys","count","_ref","_ref2","_slicedToArray2","key","createResource","userIds","device","userId","set","uri","search","_this2","promise","resolve","searchEncryptionKeyUrl","service","_assign","resActivities","get","includeRemoteClusterReferences","breadcrumbs","promises","_keys","forEach","cluster","editedCluster","concat","clusterActivityUrls","items","map","activity","activityUrl","bulkActivitiesPromise","conversation","bulkActivitiesFetch","catch","err","logger","warn","push","all","clusterResults","reduce","accumulator","clusterResult","version","_applyDecoratedDescriptor2","oneFlight","_getOwnPropertyDescriptor","_default","exports"],"sources":["search.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nimport {get} from 'lodash';\nimport {oneFlight} from '@webex/common';\nimport {WebexPlugin} from '@webex/webex-core';\n\nconst Search = WebexPlugin.extend({\n namespace: 'Search',\n\n people(options) {\n options = options || {};\n\n if (!options.queryString && options.query) {\n options.queryString = options.query;\n Reflect.deleteProperty(options, 'query');\n }\n\n if (!options.queryString) {\n return Promise.reject(new Error('`options.query` is required'));\n }\n\n return this.request({\n api: 'argonaut',\n resource: 'directory',\n method: 'POST',\n body: options,\n }).then((res) => res.body);\n },\n\n @oneFlight\n bindSearchKey() {\n return this.webex.internal.encryption.kms.createUnboundKeys({count: 1}).then(([key]) =>\n this.webex.internal.encryption.kms\n .createResource({\n key,\n userIds: [this.webex.internal.device.userId],\n })\n .then(() => this.webex.internal.device.set('searchEncryptionKeyUrl', key.uri))\n );\n },\n\n /**\n * Fetches search result activities\n * @param {Object} options\n * @param {boolean} options.includeRemoteClusterReferences when true,\n * includes search results from remote clusters\n * @returns {Promise<Array>} Resolves with the activities\n */\n search(options) {\n /* eslint max-nested-callbacks: [0] */\n options = options || {};\n\n let promise = Promise.resolve();\n\n if (!this.webex.internal.device.searchEncryptionKeyUrl) {\n promise = this.bindSearchKey();\n }\n\n return promise\n .then(() =>\n this.webex.request({\n service: 'argonaut',\n resource: 'search',\n method: 'POST',\n body: Object.assign(options, {\n searchEncryptionKeyUrl: this.webex.internal.device.searchEncryptionKeyUrl,\n }),\n })\n )\n .then((res) => {\n const resActivities = get(res, 'body.activities.items', []);\n\n if (options.includeRemoteClusterReferences && res.body.breadcrumbs) {\n const {breadcrumbs} = res.body;\n const promises = [];\n\n Object.keys(breadcrumbs).forEach((cluster) => {\n // Map activity URLs to their cluster\n const editedCluster = `${cluster}:identityLookup`;\n const clusterActivityUrls = breadcrumbs[cluster].items.map(\n (activity) => activity.activityUrl\n );\n\n // Find activities per cluster\n const bulkActivitiesPromise = this.webex.internal.conversation\n .bulkActivitiesFetch(clusterActivityUrls, {cluster: editedCluster})\n .catch((err) => {\n this.logger.warn('search: error fetching from remote clusters', err);\n\n return Promise.resolve([]);\n });\n\n promises.push(bulkActivitiesPromise);\n });\n\n return Promise.all(promises).then((clusterResults) =>\n clusterResults.reduce(\n (accumulator, clusterResult) => accumulator.concat(clusterResult),\n resActivities\n )\n );\n }\n\n return resActivities;\n });\n },\n});\n\nexport default Search;\n"],"mappings":";;;;;;;;;;;;;;;AAIA,IAAAA,OAAA,GAAAC,OAAA;AACA,IAAAC,OAAA,GAAAD,OAAA;AACA,IAAAE,UAAA,GAAAF,OAAA;AAA8C,IAAAG,IAAA;AAN9C;AACA;AACA;AAMA,IAAMC,MAAM,GAAGC,sBAAW,CAACC,MAAM,EAAAH,IAAA,GAAC;EAChCI,SAAS,EAAE,QAAQ;EAEnBC,MAAM,WAAAA,OAACC,OAAO,EAAE;IACdA,OAAO,GAAGA,OAAO,IAAI,CAAC,CAAC;IAEvB,IAAI,CAACA,OAAO,CAACC,WAAW,IAAID,OAAO,CAACE,KAAK,EAAE;MACzCF,OAAO,CAACC,WAAW,GAAGD,OAAO,CAACE,KAAK;MACnC,IAAAC,eAAA,CAAAC,OAAA,EAAuBJ,OAAO,EAAE,OAAO,CAAC;IAC1C;IAEA,IAAI,CAACA,OAAO,CAACC,WAAW,EAAE;MACxB,OAAOI,QAAA,CAAAD,OAAA,CAAQE,MAAM,CAAC,IAAIC,KAAK,CAAC,6BAA6B,CAAC,CAAC;IACjE;IAEA,OAAO,IAAI,CAACC,OAAO,CAAC;MAClBC,GAAG,EAAE,UAAU;MACfC,QAAQ,EAAE,WAAW;MACrBC,MAAM,EAAE,MAAM;MACdC,IAAI,EAAEZ;IACR,CAAC,CAAC,CAACa,IAAI,CAAC,UAACC,GAAG;MAAA,OAAKA,GAAG,CAACF,IAAI;IAAA,EAAC;EAC5B,CAAC;EAGDG,aAAa,WAAAA,cAAA,EAAG;IAAA,IAAAC,KAAA;IACd,OAAO,IAAI,CAACC,KAAK,CAACC,QAAQ,CAACC,UAAU,CAACC,GAAG,CAACC,iBAAiB,CAAC;MAACC,KAAK,EAAE;IAAC,CAAC,CAAC,CAACT,IAAI,CAAC,UAAAU,IAAA;MAAA,IAAAC,KAAA,OAAAC,eAAA,CAAArB,OAAA,EAAAmB,IAAA;QAAEG,GAAG,GAAAF,KAAA;MAAA,OAChFR,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACC,UAAU,CAACC,GAAG,CAC/BO,cAAc,CAAC;QACdD,GAAG,EAAHA,GAAG;QACHE,OAAO,EAAE,CAACZ,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACC,MAAM;MAC7C,CAAC,CAAC,CACDjB,IAAI,CAAC;QAAA,OAAMG,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACE,GAAG,CAAC,wBAAwB,EAAEL,GAAG,CAACM,GAAG,CAAC;MAAA,EAAC;IAAA,CAClF,CAAC;EACH,CAAC;EAED;AACF;AACA;AACA;AACA;AACA;AACA;EACEC,MAAM,WAAAA,OAACjC,OAAO,EAAE;IAAA,IAAAkC,MAAA;IACd;IACAlC,OAAO,GAAGA,OAAO,IAAI,CAAC,CAAC;IAEvB,IAAImC,OAAO,GAAG9B,QAAA,CAAAD,OAAA,CAAQgC,OAAO,CAAC,CAAC;IAE/B,IAAI,CAAC,IAAI,CAACnB,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACQ,sBAAsB,EAAE;MACtDF,OAAO,GAAG,IAAI,CAACpB,aAAa,CAAC,CAAC;IAChC;IAEA,OAAOoB,OAAO,CACXtB,IAAI,CAAC;MAAA,OACJqB,MAAI,CAACjB,KAAK,CAACT,OAAO,CAAC;QACjB8B,OAAO,EAAE,UAAU;QACnB5B,QAAQ,EAAE,QAAQ;QAClBC,MAAM,EAAE,MAAM;QACdC,IAAI,EAAE,IAAA2B,OAAA,CAAAnC,OAAA,EAAcJ,OAAO,EAAE;UAC3BqC,sBAAsB,EAAEH,MAAI,CAACjB,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACQ;QACrD,CAAC;MACH,CAAC,CAAC;IAAA,CACJ,CAAC,CACAxB,IAAI,CAAC,UAACC,GAAG,EAAK;MACb,IAAM0B,aAAa,GAAG,IAAAC,WAAG,EAAC3B,GAAG,EAAE,uBAAuB,EAAE,EAAE,CAAC;MAE3D,IAAId,OAAO,CAAC0C,8BAA8B,IAAI5B,GAAG,CAACF,IAAI,CAAC+B,WAAW,EAAE;QAClE,IAAOA,WAAW,GAAI7B,GAAG,CAACF,IAAI,CAAvB+B,WAAW;QAClB,IAAMC,QAAQ,GAAG,EAAE;QAEnB,IAAAC,KAAA,CAAAzC,OAAA,EAAYuC,WAAW,CAAC,CAACG,OAAO,CAAC,UAACC,OAAO,EAAK;UAC5C;UACA,IAAMC,aAAa,MAAAC,MAAA,CAAMF,OAAO,oBAAiB;UACjD,IAAMG,mBAAmB,GAAGP,WAAW,CAACI,OAAO,CAAC,CAACI,KAAK,CAACC,GAAG,CACxD,UAACC,QAAQ;YAAA,OAAKA,QAAQ,CAACC,WAAW;UAAA,CACpC,CAAC;;UAED;UACA,IAAMC,qBAAqB,GAAGrB,MAAI,CAACjB,KAAK,CAACC,QAAQ,CAACsC,YAAY,CAC3DC,mBAAmB,CAACP,mBAAmB,EAAE;YAACH,OAAO,EAAEC;UAAa,CAAC,CAAC,CAClEU,KAAK,CAAC,UAACC,GAAG,EAAK;YACdzB,MAAI,CAAC0B,MAAM,CAACC,IAAI,CAAC,6CAA6C,EAAEF,GAAG,CAAC;YAEpE,OAAOtD,QAAA,CAAAD,OAAA,CAAQgC,OAAO,CAAC,EAAE,CAAC;UAC5B,CAAC,CAAC;UAEJQ,QAAQ,CAACkB,IAAI,CAACP,qBAAqB,CAAC;QACtC,CAAC,CAAC;QAEF,OAAOlD,QAAA,CAAAD,OAAA,CAAQ2D,GAAG,CAACnB,QAAQ,CAAC,CAAC/B,IAAI,CAAC,UAACmD,cAAc;UAAA,OAC/CA,cAAc,CAACC,MAAM,CACnB,UAACC,WAAW,EAAEC,aAAa;YAAA,OAAKD,WAAW,CAACjB,MAAM,CAACkB,aAAa,CAAC;UAAA,GACjE3B,aACF,CAAC;QAAA,CACH,CAAC;MACH;MAEA,OAAOA,aAAa;IACtB,CAAC,CAAC;EACN,CAAC;EAAA4B,OAAA;AACH,CAAC,OAAAC,0BAAA,CAAAjE,OAAA,EAAAV,IAAA,oBA7EE4E,iBAAS,OAAAC,yBAAA,CAAAnE,OAAA,EAAAV,IAAA,oBAAAA,IAAA,IAAAA,IAAA,CA6EX,CAAC;AAAC,IAAA8E,QAAA,GAAAC,OAAA,CAAArE,OAAA,GAEYT,MAAM"}
1
+ {"version":3,"names":["_lodash","require","_common","_webexCore","_obj","Search","WebexPlugin","extend","namespace","people","options","queryString","query","_deleteProperty","default","_promise","reject","Error","request","api","resource","method","body","then","res","bindSearchKey","_this","webex","internal","encryption","kms","createUnboundKeys","count","_ref","_ref2","_slicedToArray2","key","createResource","userIds","device","userId","set","uri","search","_this2","promise","resolve","searchEncryptionKeyUrl","service","_assign","resActivities","get","includeRemoteClusterReferences","breadcrumbs","promises","_keys","forEach","cluster","editedCluster","concat","clusterActivityUrls","items","map","activity","activityUrl","bulkActivitiesPromise","conversation","bulkActivitiesFetch","catch","err","logger","warn","push","all","clusterResults","reduce","accumulator","clusterResult","version","_applyDecoratedDescriptor2","oneFlight","_getOwnPropertyDescriptor","_default","exports"],"sources":["search.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nimport {get} from 'lodash';\nimport {oneFlight} from '@webex/common';\nimport {WebexPlugin} from '@webex/webex-core';\n\nconst Search = WebexPlugin.extend({\n namespace: 'Search',\n\n people(options) {\n options = options || {};\n\n if (!options.queryString && options.query) {\n options.queryString = options.query;\n Reflect.deleteProperty(options, 'query');\n }\n\n if (!options.queryString) {\n return Promise.reject(new Error('`options.query` is required'));\n }\n\n return this.request({\n api: 'argonaut',\n resource: 'directory',\n method: 'POST',\n body: options,\n }).then((res) => res.body);\n },\n\n @oneFlight\n bindSearchKey() {\n return this.webex.internal.encryption.kms.createUnboundKeys({count: 1}).then(([key]) =>\n this.webex.internal.encryption.kms\n .createResource({\n key,\n userIds: [this.webex.internal.device.userId],\n })\n .then(() => this.webex.internal.device.set('searchEncryptionKeyUrl', key.uri))\n );\n },\n\n /**\n * Fetches search result activities\n * @param {Object} options\n * @param {boolean} options.includeRemoteClusterReferences when true,\n * includes search results from remote clusters\n * @returns {Promise<Array>} Resolves with the activities\n */\n search(options) {\n /* eslint max-nested-callbacks: [0] */\n options = options || {};\n\n let promise = Promise.resolve();\n\n if (!this.webex.internal.device.searchEncryptionKeyUrl) {\n promise = this.bindSearchKey();\n }\n\n return promise\n .then(() =>\n this.webex.request({\n service: 'argonaut',\n resource: 'search',\n method: 'POST',\n body: Object.assign(options, {\n searchEncryptionKeyUrl: this.webex.internal.device.searchEncryptionKeyUrl,\n }),\n })\n )\n .then((res) => {\n const resActivities = get(res, 'body.activities.items', []);\n\n if (options.includeRemoteClusterReferences && res.body.breadcrumbs) {\n const {breadcrumbs} = res.body;\n const promises = [];\n\n Object.keys(breadcrumbs).forEach((cluster) => {\n // Map activity URLs to their cluster\n const editedCluster = `${cluster}:identityLookup`;\n const clusterActivityUrls = breadcrumbs[cluster].items.map(\n (activity) => activity.activityUrl\n );\n\n // Find activities per cluster\n const bulkActivitiesPromise = this.webex.internal.conversation\n .bulkActivitiesFetch(clusterActivityUrls, {cluster: editedCluster})\n .catch((err) => {\n this.logger.warn('search: error fetching from remote clusters', err);\n\n return Promise.resolve([]);\n });\n\n promises.push(bulkActivitiesPromise);\n });\n\n return Promise.all(promises).then((clusterResults) =>\n clusterResults.reduce(\n (accumulator, clusterResult) => accumulator.concat(clusterResult),\n resActivities\n )\n );\n }\n\n return resActivities;\n });\n },\n});\n\nexport default Search;\n"],"mappings":";;;;;;;;;;;;;;;AAIA,IAAAA,OAAA,GAAAC,OAAA;AACA,IAAAC,OAAA,GAAAD,OAAA;AACA,IAAAE,UAAA,GAAAF,OAAA;AAA8C,IAAAG,IAAA;AAN9C;AACA;AACA;AAMA,IAAMC,MAAM,GAAGC,sBAAW,CAACC,MAAM,EAAAH,IAAA,GAAC;EAChCI,SAAS,EAAE,QAAQ;EAEnBC,MAAM,WAANA,MAAMA,CAACC,OAAO,EAAE;IACdA,OAAO,GAAGA,OAAO,IAAI,CAAC,CAAC;IAEvB,IAAI,CAACA,OAAO,CAACC,WAAW,IAAID,OAAO,CAACE,KAAK,EAAE;MACzCF,OAAO,CAACC,WAAW,GAAGD,OAAO,CAACE,KAAK;MACnC,IAAAC,eAAA,CAAAC,OAAA,EAAuBJ,OAAO,EAAE,OAAO,CAAC;IAC1C;IAEA,IAAI,CAACA,OAAO,CAACC,WAAW,EAAE;MACxB,OAAOI,QAAA,CAAAD,OAAA,CAAQE,MAAM,CAAC,IAAIC,KAAK,CAAC,6BAA6B,CAAC,CAAC;IACjE;IAEA,OAAO,IAAI,CAACC,OAAO,CAAC;MAClBC,GAAG,EAAE,UAAU;MACfC,QAAQ,EAAE,WAAW;MACrBC,MAAM,EAAE,MAAM;MACdC,IAAI,EAAEZ;IACR,CAAC,CAAC,CAACa,IAAI,CAAC,UAACC,GAAG;MAAA,OAAKA,GAAG,CAACF,IAAI;IAAA,EAAC;EAC5B,CAAC;EAGDG,aAAa,WAAbA,aAAaA,CAAA,EAAG;IAAA,IAAAC,KAAA;IACd,OAAO,IAAI,CAACC,KAAK,CAACC,QAAQ,CAACC,UAAU,CAACC,GAAG,CAACC,iBAAiB,CAAC;MAACC,KAAK,EAAE;IAAC,CAAC,CAAC,CAACT,IAAI,CAAC,UAAAU,IAAA;MAAA,IAAAC,KAAA,OAAAC,eAAA,CAAArB,OAAA,EAAAmB,IAAA;QAAEG,GAAG,GAAAF,KAAA;MAAA,OAChFR,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACC,UAAU,CAACC,GAAG,CAC/BO,cAAc,CAAC;QACdD,GAAG,EAAHA,GAAG;QACHE,OAAO,EAAE,CAACZ,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACC,MAAM;MAC7C,CAAC,CAAC,CACDjB,IAAI,CAAC;QAAA,OAAMG,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACE,GAAG,CAAC,wBAAwB,EAAEL,GAAG,CAACM,GAAG,CAAC;MAAA,EAAC;IAAA,CAClF,CAAC;EACH,CAAC;EAED;AACF;AACA;AACA;AACA;AACA;AACA;EACEC,MAAM,WAANA,MAAMA,CAACjC,OAAO,EAAE;IAAA,IAAAkC,MAAA;IACd;IACAlC,OAAO,GAAGA,OAAO,IAAI,CAAC,CAAC;IAEvB,IAAImC,OAAO,GAAG9B,QAAA,CAAAD,OAAA,CAAQgC,OAAO,CAAC,CAAC;IAE/B,IAAI,CAAC,IAAI,CAACnB,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACQ,sBAAsB,EAAE;MACtDF,OAAO,GAAG,IAAI,CAACpB,aAAa,CAAC,CAAC;IAChC;IAEA,OAAOoB,OAAO,CACXtB,IAAI,CAAC;MAAA,OACJqB,MAAI,CAACjB,KAAK,CAACT,OAAO,CAAC;QACjB8B,OAAO,EAAE,UAAU;QACnB5B,QAAQ,EAAE,QAAQ;QAClBC,MAAM,EAAE,MAAM;QACdC,IAAI,EAAE,IAAA2B,OAAA,CAAAnC,OAAA,EAAcJ,OAAO,EAAE;UAC3BqC,sBAAsB,EAAEH,MAAI,CAACjB,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACQ;QACrD,CAAC;MACH,CAAC,CAAC;IAAA,CACJ,CAAC,CACAxB,IAAI,CAAC,UAACC,GAAG,EAAK;MACb,IAAM0B,aAAa,GAAG,IAAAC,WAAG,EAAC3B,GAAG,EAAE,uBAAuB,EAAE,EAAE,CAAC;MAE3D,IAAId,OAAO,CAAC0C,8BAA8B,IAAI5B,GAAG,CAACF,IAAI,CAAC+B,WAAW,EAAE;QAClE,IAAOA,WAAW,GAAI7B,GAAG,CAACF,IAAI,CAAvB+B,WAAW;QAClB,IAAMC,QAAQ,GAAG,EAAE;QAEnB,IAAAC,KAAA,CAAAzC,OAAA,EAAYuC,WAAW,CAAC,CAACG,OAAO,CAAC,UAACC,OAAO,EAAK;UAC5C;UACA,IAAMC,aAAa,MAAAC,MAAA,CAAMF,OAAO,oBAAiB;UACjD,IAAMG,mBAAmB,GAAGP,WAAW,CAACI,OAAO,CAAC,CAACI,KAAK,CAACC,GAAG,CACxD,UAACC,QAAQ;YAAA,OAAKA,QAAQ,CAACC,WAAW;UAAA,CACpC,CAAC;;UAED;UACA,IAAMC,qBAAqB,GAAGrB,MAAI,CAACjB,KAAK,CAACC,QAAQ,CAACsC,YAAY,CAC3DC,mBAAmB,CAACP,mBAAmB,EAAE;YAACH,OAAO,EAAEC;UAAa,CAAC,CAAC,CAClEU,KAAK,CAAC,UAACC,GAAG,EAAK;YACdzB,MAAI,CAAC0B,MAAM,CAACC,IAAI,CAAC,6CAA6C,EAAEF,GAAG,CAAC;YAEpE,OAAOtD,QAAA,CAAAD,OAAA,CAAQgC,OAAO,CAAC,EAAE,CAAC;UAC5B,CAAC,CAAC;UAEJQ,QAAQ,CAACkB,IAAI,CAACP,qBAAqB,CAAC;QACtC,CAAC,CAAC;QAEF,OAAOlD,QAAA,CAAAD,OAAA,CAAQ2D,GAAG,CAACnB,QAAQ,CAAC,CAAC/B,IAAI,CAAC,UAACmD,cAAc;UAAA,OAC/CA,cAAc,CAACC,MAAM,CACnB,UAACC,WAAW,EAAEC,aAAa;YAAA,OAAKD,WAAW,CAACjB,MAAM,CAACkB,aAAa,CAAC;UAAA,GACjE3B,aACF,CAAC;QAAA,CACH,CAAC;MACH;MAEA,OAAOA,aAAa;IACtB,CAAC,CAAC;EACN,CAAC;EAAA4B,OAAA;AACH,CAAC,MAAAC,0BAAA,CAAAjE,OAAA,EAAAV,IAAA,oBA7EE4E,iBAAS,OAAAC,yBAAA,CAAAnE,OAAA,EAAAV,IAAA,oBAAAA,IAAA,GAAAA,IAAA,CA6EX,CAAC;AAAC,IAAA8E,QAAA,GAAAC,OAAA,CAAArE,OAAA,GAEYT,MAAM","ignoreList":[]}
package/package.json CHANGED
@@ -25,20 +25,20 @@
25
25
  "@webex/eslint-config-legacy": "0.0.0",
26
26
  "@webex/jest-config-legacy": "0.0.0",
27
27
  "@webex/legacy-tools": "0.0.0",
28
- "@webex/test-helper-chai": "3.9.0-multi-llms.1",
29
- "@webex/test-helper-mocha": "3.9.0-multi-llms.1",
30
- "@webex/test-helper-mock-webex": "3.9.0-multi-llms.1",
31
- "@webex/test-helper-retry": "3.9.0-multi-llms.1",
32
- "@webex/test-helper-test-users": "3.9.0-multi-llms.1",
28
+ "@webex/test-helper-chai": "3.10.0-next.1",
29
+ "@webex/test-helper-mocha": "3.10.0-next.1",
30
+ "@webex/test-helper-mock-webex": "3.10.0-next.1",
31
+ "@webex/test-helper-retry": "3.10.0-next.1",
32
+ "@webex/test-helper-test-users": "3.10.0-next.1",
33
33
  "eslint": "^8.24.0",
34
34
  "prettier": "^2.7.1"
35
35
  },
36
36
  "dependencies": {
37
- "@webex/common": "3.9.0-multi-llms.1",
38
- "@webex/internal-plugin-conversation": "3.10.0-multi-llms.1",
39
- "@webex/internal-plugin-device": "3.10.0-multi-llms.1",
40
- "@webex/internal-plugin-encryption": "3.10.0-multi-llms.1",
41
- "@webex/webex-core": "3.10.0-multi-llms.1",
37
+ "@webex/common": "3.10.0-next.1",
38
+ "@webex/internal-plugin-conversation": "3.10.0-next.10",
39
+ "@webex/internal-plugin-device": "3.10.0-next.10",
40
+ "@webex/internal-plugin-encryption": "3.10.0-next.10",
41
+ "@webex/webex-core": "3.10.0-next.10",
42
42
  "lodash": "^4.17.21",
43
43
  "uuid": "^3.3.2"
44
44
  },
@@ -50,5 +50,5 @@
50
50
  "test:browser": "webex-legacy-tools test --integration --runner karma",
51
51
  "test:style": "eslint ./src/**/*.*"
52
52
  },
53
- "version": "3.10.0-multi-llms.1"
53
+ "version": "3.10.0-next.10"
54
54
  }