@webex/internal-plugin-search 3.10.0-next.2 → 3.10.0-next.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/config.js.map +1 -1
- package/dist/index.js.map +1 -1
- package/dist/search.js +2 -2
- package/dist/search.js.map +1 -1
- package/package.json +5 -5
package/dist/config.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["_default","exports","default","search"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nexport default {\n search: {},\n};\n"],"mappings":";;;;;;;AAAA;AACA;AACA;AAFA,IAAAA,QAAA,GAAAC,OAAA,CAAAC,OAAA,GAIe;EACbC,MAAM,EAAE,CAAC;AACX,CAAC"}
|
|
1
|
+
{"version":3,"names":["_default","exports","default","search"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nexport default {\n search: {},\n};\n"],"mappings":";;;;;;;AAAA;AACA;AACA;AAFA,IAAAA,QAAA,GAAAC,OAAA,CAAAC,OAAA,GAIe;EACbC,MAAM,EAAE,CAAC;AACX,CAAC","ignoreList":[]}
|
package/dist/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["require","_webexCore","_lodash","_search","_interopRequireDefault","_config","registerInternalPlugin","Search","config","payloadTransformer","predicates","name","direction","test","ctx","options","has","_promise","default","resolve","service","url","webex","internal","services","getServiceFromUrl","extract","body","response","then","res","activities","items","transforms","fn","object","encryption","encryptText","searchEncryptionKeyUrl","query","q"],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\nimport '@webex/internal-plugin-conversation';\nimport '@webex/internal-plugin-encryption';\n\nimport {registerInternalPlugin} from '@webex/webex-core';\nimport {has} from 'lodash';\n\nimport Search from './search';\nimport config from './config';\n\nregisterInternalPlugin('search', Search, {\n config,\n payloadTransformer: {\n predicates: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n test(ctx, options) {\n if (!has(options, 'body.query')) {\n return Promise.resolve(false);\n }\n\n if (!has(options, 'body.searchEncryptionKeyUrl')) {\n return Promise.resolve(false);\n }\n\n if (options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n },\n extract(options) {\n return Promise.resolve(options.body);\n },\n },\n {\n name: 'transformObjectArray',\n direction: 'inbound',\n test(ctx, response) {\n return Promise.resolve(has(response, 'body.activities.items[0].objectType')).then(\n (res) => {\n if (!res) {\n return Promise.resolve(false);\n }\n\n if (response.options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (response.options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(response.options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n }\n );\n },\n extract(response) {\n return Promise.resolve(response.body.activities.items);\n },\n },\n ],\n transforms: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n fn(ctx, object) {\n return ctx.webex.internal.encryption\n .encryptText(object.searchEncryptionKeyUrl, object.query)\n .then((q) => {\n object.query = q;\n });\n },\n },\n ],\n },\n});\n\nexport {default} from './search';\n"],"mappings":";;;;;;;;;;;;;;AAGAA,OAAA;AACAA,OAAA;AAEA,IAAAC,UAAA,GAAAD,OAAA;AACA,IAAAE,OAAA,GAAAF,OAAA;AAEA,IAAAG,OAAA,GAAAC,sBAAA,CAAAJ,OAAA;AACA,IAAAK,OAAA,GAAAD,sBAAA,CAAAJ,OAAA;AAVA;AACA;AACA;;AAUA,IAAAM,iCAAsB,EAAC,QAAQ,EAAEC,eAAM,EAAE;EACvCC,MAAM,EAANA,eAAM;EACNC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,CACV;MACEC,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBC,IAAI,
|
|
1
|
+
{"version":3,"names":["require","_webexCore","_lodash","_search","_interopRequireDefault","_config","registerInternalPlugin","Search","config","payloadTransformer","predicates","name","direction","test","ctx","options","has","_promise","default","resolve","service","url","webex","internal","services","getServiceFromUrl","extract","body","response","then","res","activities","items","transforms","fn","object","encryption","encryptText","searchEncryptionKeyUrl","query","q"],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\nimport '@webex/internal-plugin-conversation';\nimport '@webex/internal-plugin-encryption';\n\nimport {registerInternalPlugin} from '@webex/webex-core';\nimport {has} from 'lodash';\n\nimport Search from './search';\nimport config from './config';\n\nregisterInternalPlugin('search', Search, {\n config,\n payloadTransformer: {\n predicates: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n test(ctx, options) {\n if (!has(options, 'body.query')) {\n return Promise.resolve(false);\n }\n\n if (!has(options, 'body.searchEncryptionKeyUrl')) {\n return Promise.resolve(false);\n }\n\n if (options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n },\n extract(options) {\n return Promise.resolve(options.body);\n },\n },\n {\n name: 'transformObjectArray',\n direction: 'inbound',\n test(ctx, response) {\n return Promise.resolve(has(response, 'body.activities.items[0].objectType')).then(\n (res) => {\n if (!res) {\n return Promise.resolve(false);\n }\n\n if (response.options.service === 'argonaut') {\n return Promise.resolve(true);\n }\n\n if (response.options.url) {\n const service = ctx.webex.internal.services.getServiceFromUrl(response.options.url);\n\n return Promise.resolve(service && service.name === 'argonaut');\n }\n\n return Promise.resolve(false);\n }\n );\n },\n extract(response) {\n return Promise.resolve(response.body.activities.items);\n },\n },\n ],\n transforms: [\n {\n name: 'encryptSearchQuery',\n direction: 'outbound',\n fn(ctx, object) {\n return ctx.webex.internal.encryption\n .encryptText(object.searchEncryptionKeyUrl, object.query)\n .then((q) => {\n object.query = q;\n });\n },\n },\n ],\n },\n});\n\nexport {default} from './search';\n"],"mappings":";;;;;;;;;;;;;;AAGAA,OAAA;AACAA,OAAA;AAEA,IAAAC,UAAA,GAAAD,OAAA;AACA,IAAAE,OAAA,GAAAF,OAAA;AAEA,IAAAG,OAAA,GAAAC,sBAAA,CAAAJ,OAAA;AACA,IAAAK,OAAA,GAAAD,sBAAA,CAAAJ,OAAA;AAVA;AACA;AACA;;AAUA,IAAAM,iCAAsB,EAAC,QAAQ,EAAEC,eAAM,EAAE;EACvCC,MAAM,EAANA,eAAM;EACNC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,CACV;MACEC,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBC,IAAI,WAAJA,IAAIA,CAACC,GAAG,EAAEC,OAAO,EAAE;QACjB,IAAI,CAAC,IAAAC,WAAG,EAACD,OAAO,EAAE,YAAY,CAAC,EAAE;UAC/B,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B;QAEA,IAAI,CAAC,IAAAH,WAAG,EAACD,OAAO,EAAE,6BAA6B,CAAC,EAAE;UAChD,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B;QAEA,IAAIJ,OAAO,CAACK,OAAO,KAAK,UAAU,EAAE;UAClC,OAAOH,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAI,CAAC;QAC9B;QAEA,IAAIJ,OAAO,CAACM,GAAG,EAAE;UACf,IAAMD,OAAO,GAAGN,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACC,QAAQ,CAACC,iBAAiB,CAACV,OAAO,CAACM,GAAG,CAAC;UAE1E,OAAOJ,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACC,OAAO,IAAIA,OAAO,CAACT,IAAI,KAAK,UAAU,CAAC;QAChE;QAEA,OAAOM,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;MAC/B,CAAC;MACDO,OAAO,WAAPA,OAAOA,CAACX,OAAO,EAAE;QACf,OAAOE,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACJ,OAAO,CAACY,IAAI,CAAC;MACtC;IACF,CAAC,EACD;MACEhB,IAAI,EAAE,sBAAsB;MAC5BC,SAAS,EAAE,SAAS;MACpBC,IAAI,WAAJA,IAAIA,CAACC,GAAG,EAAEc,QAAQ,EAAE;QAClB,OAAOX,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAAH,WAAG,EAACY,QAAQ,EAAE,qCAAqC,CAAC,CAAC,CAACC,IAAI,CAC/E,UAACC,GAAG,EAAK;UACP,IAAI,CAACA,GAAG,EAAE;YACR,OAAOb,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;UAC/B;UAEA,IAAIS,QAAQ,CAACb,OAAO,CAACK,OAAO,KAAK,UAAU,EAAE;YAC3C,OAAOH,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,IAAI,CAAC;UAC9B;UAEA,IAAIS,QAAQ,CAACb,OAAO,CAACM,GAAG,EAAE;YACxB,IAAMD,OAAO,GAAGN,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACC,QAAQ,CAACC,iBAAiB,CAACG,QAAQ,CAACb,OAAO,CAACM,GAAG,CAAC;YAEnF,OAAOJ,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACC,OAAO,IAAIA,OAAO,CAACT,IAAI,KAAK,UAAU,CAAC;UAChE;UAEA,OAAOM,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAAC,KAAK,CAAC;QAC/B,CACF,CAAC;MACH,CAAC;MACDO,OAAO,WAAPA,OAAOA,CAACE,QAAQ,EAAE;QAChB,OAAOX,QAAA,CAAAC,OAAA,CAAQC,OAAO,CAACS,QAAQ,CAACD,IAAI,CAACI,UAAU,CAACC,KAAK,CAAC;MACxD;IACF,CAAC,CACF;IACDC,UAAU,EAAE,CACV;MACEtB,IAAI,EAAE,oBAAoB;MAC1BC,SAAS,EAAE,UAAU;MACrBsB,EAAE,WAAFA,EAAEA,CAACpB,GAAG,EAAEqB,MAAM,EAAE;QACd,OAAOrB,GAAG,CAACQ,KAAK,CAACC,QAAQ,CAACa,UAAU,CACjCC,WAAW,CAACF,MAAM,CAACG,sBAAsB,EAAEH,MAAM,CAACI,KAAK,CAAC,CACxDV,IAAI,CAAC,UAACW,CAAC,EAAK;UACXL,MAAM,CAACI,KAAK,GAAGC,CAAC;QAClB,CAAC,CAAC;MACN;IACF,CAAC;EAEL;AACF,CAAC,CAAC","ignoreList":[]}
|
package/dist/search.js
CHANGED
|
@@ -109,7 +109,7 @@ var Search = _webexCore.WebexPlugin.extend((_obj = {
|
|
|
109
109
|
return resActivities;
|
|
110
110
|
});
|
|
111
111
|
},
|
|
112
|
-
version: "3.10.0-next.
|
|
113
|
-
}, (
|
|
112
|
+
version: "3.10.0-next.4"
|
|
113
|
+
}, (0, _applyDecoratedDescriptor2.default)(_obj, "bindSearchKey", [_common.oneFlight], (0, _getOwnPropertyDescriptor.default)(_obj, "bindSearchKey"), _obj), _obj));
|
|
114
114
|
var _default = exports.default = Search;
|
|
115
115
|
//# sourceMappingURL=search.js.map
|
package/dist/search.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["_lodash","require","_common","_webexCore","_obj","Search","WebexPlugin","extend","namespace","people","options","queryString","query","_deleteProperty","default","_promise","reject","Error","request","api","resource","method","body","then","res","bindSearchKey","_this","webex","internal","encryption","kms","createUnboundKeys","count","_ref","_ref2","_slicedToArray2","key","createResource","userIds","device","userId","set","uri","search","_this2","promise","resolve","searchEncryptionKeyUrl","service","_assign","resActivities","get","includeRemoteClusterReferences","breadcrumbs","promises","_keys","forEach","cluster","editedCluster","concat","clusterActivityUrls","items","map","activity","activityUrl","bulkActivitiesPromise","conversation","bulkActivitiesFetch","catch","err","logger","warn","push","all","clusterResults","reduce","accumulator","clusterResult","version","_applyDecoratedDescriptor2","oneFlight","_getOwnPropertyDescriptor","_default","exports"],"sources":["search.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nimport {get} from 'lodash';\nimport {oneFlight} from '@webex/common';\nimport {WebexPlugin} from '@webex/webex-core';\n\nconst Search = WebexPlugin.extend({\n namespace: 'Search',\n\n people(options) {\n options = options || {};\n\n if (!options.queryString && options.query) {\n options.queryString = options.query;\n Reflect.deleteProperty(options, 'query');\n }\n\n if (!options.queryString) {\n return Promise.reject(new Error('`options.query` is required'));\n }\n\n return this.request({\n api: 'argonaut',\n resource: 'directory',\n method: 'POST',\n body: options,\n }).then((res) => res.body);\n },\n\n @oneFlight\n bindSearchKey() {\n return this.webex.internal.encryption.kms.createUnboundKeys({count: 1}).then(([key]) =>\n this.webex.internal.encryption.kms\n .createResource({\n key,\n userIds: [this.webex.internal.device.userId],\n })\n .then(() => this.webex.internal.device.set('searchEncryptionKeyUrl', key.uri))\n );\n },\n\n /**\n * Fetches search result activities\n * @param {Object} options\n * @param {boolean} options.includeRemoteClusterReferences when true,\n * includes search results from remote clusters\n * @returns {Promise<Array>} Resolves with the activities\n */\n search(options) {\n /* eslint max-nested-callbacks: [0] */\n options = options || {};\n\n let promise = Promise.resolve();\n\n if (!this.webex.internal.device.searchEncryptionKeyUrl) {\n promise = this.bindSearchKey();\n }\n\n return promise\n .then(() =>\n this.webex.request({\n service: 'argonaut',\n resource: 'search',\n method: 'POST',\n body: Object.assign(options, {\n searchEncryptionKeyUrl: this.webex.internal.device.searchEncryptionKeyUrl,\n }),\n })\n )\n .then((res) => {\n const resActivities = get(res, 'body.activities.items', []);\n\n if (options.includeRemoteClusterReferences && res.body.breadcrumbs) {\n const {breadcrumbs} = res.body;\n const promises = [];\n\n Object.keys(breadcrumbs).forEach((cluster) => {\n // Map activity URLs to their cluster\n const editedCluster = `${cluster}:identityLookup`;\n const clusterActivityUrls = breadcrumbs[cluster].items.map(\n (activity) => activity.activityUrl\n );\n\n // Find activities per cluster\n const bulkActivitiesPromise = this.webex.internal.conversation\n .bulkActivitiesFetch(clusterActivityUrls, {cluster: editedCluster})\n .catch((err) => {\n this.logger.warn('search: error fetching from remote clusters', err);\n\n return Promise.resolve([]);\n });\n\n promises.push(bulkActivitiesPromise);\n });\n\n return Promise.all(promises).then((clusterResults) =>\n clusterResults.reduce(\n (accumulator, clusterResult) => accumulator.concat(clusterResult),\n resActivities\n )\n );\n }\n\n return resActivities;\n });\n },\n});\n\nexport default Search;\n"],"mappings":";;;;;;;;;;;;;;;AAIA,IAAAA,OAAA,GAAAC,OAAA;AACA,IAAAC,OAAA,GAAAD,OAAA;AACA,IAAAE,UAAA,GAAAF,OAAA;AAA8C,IAAAG,IAAA;AAN9C;AACA;AACA;AAMA,IAAMC,MAAM,GAAGC,sBAAW,CAACC,MAAM,EAAAH,IAAA,GAAC;EAChCI,SAAS,EAAE,QAAQ;EAEnBC,MAAM,
|
|
1
|
+
{"version":3,"names":["_lodash","require","_common","_webexCore","_obj","Search","WebexPlugin","extend","namespace","people","options","queryString","query","_deleteProperty","default","_promise","reject","Error","request","api","resource","method","body","then","res","bindSearchKey","_this","webex","internal","encryption","kms","createUnboundKeys","count","_ref","_ref2","_slicedToArray2","key","createResource","userIds","device","userId","set","uri","search","_this2","promise","resolve","searchEncryptionKeyUrl","service","_assign","resActivities","get","includeRemoteClusterReferences","breadcrumbs","promises","_keys","forEach","cluster","editedCluster","concat","clusterActivityUrls","items","map","activity","activityUrl","bulkActivitiesPromise","conversation","bulkActivitiesFetch","catch","err","logger","warn","push","all","clusterResults","reduce","accumulator","clusterResult","version","_applyDecoratedDescriptor2","oneFlight","_getOwnPropertyDescriptor","_default","exports"],"sources":["search.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\nimport {get} from 'lodash';\nimport {oneFlight} from '@webex/common';\nimport {WebexPlugin} from '@webex/webex-core';\n\nconst Search = WebexPlugin.extend({\n namespace: 'Search',\n\n people(options) {\n options = options || {};\n\n if (!options.queryString && options.query) {\n options.queryString = options.query;\n Reflect.deleteProperty(options, 'query');\n }\n\n if (!options.queryString) {\n return Promise.reject(new Error('`options.query` is required'));\n }\n\n return this.request({\n api: 'argonaut',\n resource: 'directory',\n method: 'POST',\n body: options,\n }).then((res) => res.body);\n },\n\n @oneFlight\n bindSearchKey() {\n return this.webex.internal.encryption.kms.createUnboundKeys({count: 1}).then(([key]) =>\n this.webex.internal.encryption.kms\n .createResource({\n key,\n userIds: [this.webex.internal.device.userId],\n })\n .then(() => this.webex.internal.device.set('searchEncryptionKeyUrl', key.uri))\n );\n },\n\n /**\n * Fetches search result activities\n * @param {Object} options\n * @param {boolean} options.includeRemoteClusterReferences when true,\n * includes search results from remote clusters\n * @returns {Promise<Array>} Resolves with the activities\n */\n search(options) {\n /* eslint max-nested-callbacks: [0] */\n options = options || {};\n\n let promise = Promise.resolve();\n\n if (!this.webex.internal.device.searchEncryptionKeyUrl) {\n promise = this.bindSearchKey();\n }\n\n return promise\n .then(() =>\n this.webex.request({\n service: 'argonaut',\n resource: 'search',\n method: 'POST',\n body: Object.assign(options, {\n searchEncryptionKeyUrl: this.webex.internal.device.searchEncryptionKeyUrl,\n }),\n })\n )\n .then((res) => {\n const resActivities = get(res, 'body.activities.items', []);\n\n if (options.includeRemoteClusterReferences && res.body.breadcrumbs) {\n const {breadcrumbs} = res.body;\n const promises = [];\n\n Object.keys(breadcrumbs).forEach((cluster) => {\n // Map activity URLs to their cluster\n const editedCluster = `${cluster}:identityLookup`;\n const clusterActivityUrls = breadcrumbs[cluster].items.map(\n (activity) => activity.activityUrl\n );\n\n // Find activities per cluster\n const bulkActivitiesPromise = this.webex.internal.conversation\n .bulkActivitiesFetch(clusterActivityUrls, {cluster: editedCluster})\n .catch((err) => {\n this.logger.warn('search: error fetching from remote clusters', err);\n\n return Promise.resolve([]);\n });\n\n promises.push(bulkActivitiesPromise);\n });\n\n return Promise.all(promises).then((clusterResults) =>\n clusterResults.reduce(\n (accumulator, clusterResult) => accumulator.concat(clusterResult),\n resActivities\n )\n );\n }\n\n return resActivities;\n });\n },\n});\n\nexport default Search;\n"],"mappings":";;;;;;;;;;;;;;;AAIA,IAAAA,OAAA,GAAAC,OAAA;AACA,IAAAC,OAAA,GAAAD,OAAA;AACA,IAAAE,UAAA,GAAAF,OAAA;AAA8C,IAAAG,IAAA;AAN9C;AACA;AACA;AAMA,IAAMC,MAAM,GAAGC,sBAAW,CAACC,MAAM,EAAAH,IAAA,GAAC;EAChCI,SAAS,EAAE,QAAQ;EAEnBC,MAAM,WAANA,MAAMA,CAACC,OAAO,EAAE;IACdA,OAAO,GAAGA,OAAO,IAAI,CAAC,CAAC;IAEvB,IAAI,CAACA,OAAO,CAACC,WAAW,IAAID,OAAO,CAACE,KAAK,EAAE;MACzCF,OAAO,CAACC,WAAW,GAAGD,OAAO,CAACE,KAAK;MACnC,IAAAC,eAAA,CAAAC,OAAA,EAAuBJ,OAAO,EAAE,OAAO,CAAC;IAC1C;IAEA,IAAI,CAACA,OAAO,CAACC,WAAW,EAAE;MACxB,OAAOI,QAAA,CAAAD,OAAA,CAAQE,MAAM,CAAC,IAAIC,KAAK,CAAC,6BAA6B,CAAC,CAAC;IACjE;IAEA,OAAO,IAAI,CAACC,OAAO,CAAC;MAClBC,GAAG,EAAE,UAAU;MACfC,QAAQ,EAAE,WAAW;MACrBC,MAAM,EAAE,MAAM;MACdC,IAAI,EAAEZ;IACR,CAAC,CAAC,CAACa,IAAI,CAAC,UAACC,GAAG;MAAA,OAAKA,GAAG,CAACF,IAAI;IAAA,EAAC;EAC5B,CAAC;EAGDG,aAAa,WAAbA,aAAaA,CAAA,EAAG;IAAA,IAAAC,KAAA;IACd,OAAO,IAAI,CAACC,KAAK,CAACC,QAAQ,CAACC,UAAU,CAACC,GAAG,CAACC,iBAAiB,CAAC;MAACC,KAAK,EAAE;IAAC,CAAC,CAAC,CAACT,IAAI,CAAC,UAAAU,IAAA;MAAA,IAAAC,KAAA,OAAAC,eAAA,CAAArB,OAAA,EAAAmB,IAAA;QAAEG,GAAG,GAAAF,KAAA;MAAA,OAChFR,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACC,UAAU,CAACC,GAAG,CAC/BO,cAAc,CAAC;QACdD,GAAG,EAAHA,GAAG;QACHE,OAAO,EAAE,CAACZ,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACC,MAAM;MAC7C,CAAC,CAAC,CACDjB,IAAI,CAAC;QAAA,OAAMG,KAAI,CAACC,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACE,GAAG,CAAC,wBAAwB,EAAEL,GAAG,CAACM,GAAG,CAAC;MAAA,EAAC;IAAA,CAClF,CAAC;EACH,CAAC;EAED;AACF;AACA;AACA;AACA;AACA;AACA;EACEC,MAAM,WAANA,MAAMA,CAACjC,OAAO,EAAE;IAAA,IAAAkC,MAAA;IACd;IACAlC,OAAO,GAAGA,OAAO,IAAI,CAAC,CAAC;IAEvB,IAAImC,OAAO,GAAG9B,QAAA,CAAAD,OAAA,CAAQgC,OAAO,CAAC,CAAC;IAE/B,IAAI,CAAC,IAAI,CAACnB,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACQ,sBAAsB,EAAE;MACtDF,OAAO,GAAG,IAAI,CAACpB,aAAa,CAAC,CAAC;IAChC;IAEA,OAAOoB,OAAO,CACXtB,IAAI,CAAC;MAAA,OACJqB,MAAI,CAACjB,KAAK,CAACT,OAAO,CAAC;QACjB8B,OAAO,EAAE,UAAU;QACnB5B,QAAQ,EAAE,QAAQ;QAClBC,MAAM,EAAE,MAAM;QACdC,IAAI,EAAE,IAAA2B,OAAA,CAAAnC,OAAA,EAAcJ,OAAO,EAAE;UAC3BqC,sBAAsB,EAAEH,MAAI,CAACjB,KAAK,CAACC,QAAQ,CAACW,MAAM,CAACQ;QACrD,CAAC;MACH,CAAC,CAAC;IAAA,CACJ,CAAC,CACAxB,IAAI,CAAC,UAACC,GAAG,EAAK;MACb,IAAM0B,aAAa,GAAG,IAAAC,WAAG,EAAC3B,GAAG,EAAE,uBAAuB,EAAE,EAAE,CAAC;MAE3D,IAAId,OAAO,CAAC0C,8BAA8B,IAAI5B,GAAG,CAACF,IAAI,CAAC+B,WAAW,EAAE;QAClE,IAAOA,WAAW,GAAI7B,GAAG,CAACF,IAAI,CAAvB+B,WAAW;QAClB,IAAMC,QAAQ,GAAG,EAAE;QAEnB,IAAAC,KAAA,CAAAzC,OAAA,EAAYuC,WAAW,CAAC,CAACG,OAAO,CAAC,UAACC,OAAO,EAAK;UAC5C;UACA,IAAMC,aAAa,MAAAC,MAAA,CAAMF,OAAO,oBAAiB;UACjD,IAAMG,mBAAmB,GAAGP,WAAW,CAACI,OAAO,CAAC,CAACI,KAAK,CAACC,GAAG,CACxD,UAACC,QAAQ;YAAA,OAAKA,QAAQ,CAACC,WAAW;UAAA,CACpC,CAAC;;UAED;UACA,IAAMC,qBAAqB,GAAGrB,MAAI,CAACjB,KAAK,CAACC,QAAQ,CAACsC,YAAY,CAC3DC,mBAAmB,CAACP,mBAAmB,EAAE;YAACH,OAAO,EAAEC;UAAa,CAAC,CAAC,CAClEU,KAAK,CAAC,UAACC,GAAG,EAAK;YACdzB,MAAI,CAAC0B,MAAM,CAACC,IAAI,CAAC,6CAA6C,EAAEF,GAAG,CAAC;YAEpE,OAAOtD,QAAA,CAAAD,OAAA,CAAQgC,OAAO,CAAC,EAAE,CAAC;UAC5B,CAAC,CAAC;UAEJQ,QAAQ,CAACkB,IAAI,CAACP,qBAAqB,CAAC;QACtC,CAAC,CAAC;QAEF,OAAOlD,QAAA,CAAAD,OAAA,CAAQ2D,GAAG,CAACnB,QAAQ,CAAC,CAAC/B,IAAI,CAAC,UAACmD,cAAc;UAAA,OAC/CA,cAAc,CAACC,MAAM,CACnB,UAACC,WAAW,EAAEC,aAAa;YAAA,OAAKD,WAAW,CAACjB,MAAM,CAACkB,aAAa,CAAC;UAAA,GACjE3B,aACF,CAAC;QAAA,CACH,CAAC;MACH;MAEA,OAAOA,aAAa;IACtB,CAAC,CAAC;EACN,CAAC;EAAA4B,OAAA;AACH,CAAC,MAAAC,0BAAA,CAAAjE,OAAA,EAAAV,IAAA,oBA7EE4E,iBAAS,OAAAC,yBAAA,CAAAnE,OAAA,EAAAV,IAAA,oBAAAA,IAAA,GAAAA,IAAA,CA6EX,CAAC;AAAC,IAAA8E,QAAA,GAAAC,OAAA,CAAArE,OAAA,GAEYT,MAAM","ignoreList":[]}
|
package/package.json
CHANGED
|
@@ -35,10 +35,10 @@
|
|
|
35
35
|
},
|
|
36
36
|
"dependencies": {
|
|
37
37
|
"@webex/common": "3.8.1-next.11",
|
|
38
|
-
"@webex/internal-plugin-conversation": "3.10.0-next.
|
|
39
|
-
"@webex/internal-plugin-device": "3.10.0-next.
|
|
40
|
-
"@webex/internal-plugin-encryption": "3.10.0-next.
|
|
41
|
-
"@webex/webex-core": "3.10.0-next.
|
|
38
|
+
"@webex/internal-plugin-conversation": "3.10.0-next.4",
|
|
39
|
+
"@webex/internal-plugin-device": "3.10.0-next.4",
|
|
40
|
+
"@webex/internal-plugin-encryption": "3.10.0-next.4",
|
|
41
|
+
"@webex/webex-core": "3.10.0-next.4",
|
|
42
42
|
"lodash": "^4.17.21",
|
|
43
43
|
"uuid": "^3.3.2"
|
|
44
44
|
},
|
|
@@ -50,5 +50,5 @@
|
|
|
50
50
|
"test:browser": "webex-legacy-tools test --integration --runner karma",
|
|
51
51
|
"test:style": "eslint ./src/**/*.*"
|
|
52
52
|
},
|
|
53
|
-
"version": "3.10.0-next.
|
|
53
|
+
"version": "3.10.0-next.4"
|
|
54
54
|
}
|