@webqit/webflo 0.8.56-0 → 0.8.59

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -12,7 +12,7 @@
12
12
  "vanila-javascript"
13
13
  ],
14
14
  "homepage": "https://webqit.io/tooling/webflo",
15
- "version": "0.8.56-0",
15
+ "version": "0.8.59",
16
16
  "license": "MIT",
17
17
  "repository": {
18
18
  "type": "git",
@@ -38,7 +38,7 @@
38
38
  "@octokit/webhooks": "^7.15.1",
39
39
  "@webqit/backpack": "^0.0.37",
40
40
  "@webqit/browser-pie": "^0.0.16",
41
- "@webqit/pseudo-browser": "^0.3.35",
41
+ "@webqit/pseudo-browser": "^0.3.36",
42
42
  "@webqit/util": "^0.8.7",
43
43
  "client-sessions": "^0.8.0",
44
44
  "cookie": "^0.4.1",
@@ -133,7 +133,7 @@ export default function(layout, params) {
133
133
  // Thus the origin server would still not be contacted by the self.fetch() below, leading to inconsistencies in responses.
134
134
  // So, we detect this scenerio and avoid it.
135
135
  if (evt.request.mode === 'navigate' && evt.request.cache === 'force-cache' && evt.request.destination === 'document') {
136
- return cache_fetch(evt, true/** cacheRefresh */);
136
+ return cache_fetch(evt/** , truecacheRefresh */);
137
137
  }
138
138
  if (_any((params.cache_first_url_list || []).map(c => c.trim()).filter(c => c), pattern => Minimatch.Minimatch(evt.request.url, pattern))) {
139
139
  return cache_fetch(evt, true/** cacheRefresh */);
@@ -144,6 +144,9 @@ export default function(layout, params) {
144
144
  return network_fetch(evt);
145
145
  };
146
146
 
147
+ //evt.request.mode navigate evt.request.cache force-cache evt.request.destination document request.headers.get('Accept') text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
148
+ //evt.request.mode navigate evt.request.cache force-cache evt.request.destination document request.headers.get('Accept') text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
149
+
147
150
  const getCacheName = request => request.headers.get('Accept') === 'application/json'
148
151
  ? params.cache_name + '_json'
149
152
  : params.cache_name;
@@ -140,28 +140,24 @@ export async function deploy(Ui, origin, flags = {}, layout = {}) {
140
140
  */
141
141
  export async function hook(Ui, event, deployCallback, flags = {}, layout = {}) {
142
142
  const eventHandler = Webhooks.createEventHandler();
143
- console.log('-------------------------event.request.headers', event.request.headers)
144
143
  if (event.request.headers.has('user-agent') && event.request.headers.get('user-agent').startsWith('GitHub-Hookshot/')) {
145
- console.log('-------------------------111111111111111111')
146
- const submits = await event.request.parse();
147
- console.log('-------------------------submits', submits)
148
- const matches = (await origins.match(submits.payload.repository.full_name, flags, layout)).filter(o => o.autodeploy);
149
- console.log('-------------------------matches', matches)
144
+ const payload = await event.request.json();
145
+ const matches = (await origins.match(payload.repository.full_name, flags, layout)).filter(o => o.autodeploy);
150
146
  var deployParams;
151
147
  if (!(deployParams = matches[0])) {
152
148
  return;
153
149
  }
154
150
  if (matches.length > 1) {
155
- throw new Error(`Failed deploy attempt (${submits.payload.repository.full_name}): Multiple deploy settings found.`);
151
+ throw new Error(`Failed deploy attempt (${payload.repository.full_name}): Multiple deploy settings found.`);
156
152
  }
157
153
  if (!deployParams.autodeploy_secret) {
158
- throw new Error(`Failed deploy attempt (${submits.payload.repository.full_name}): The deploy settings do not contain a secret.`);
154
+ throw new Error(`Failed deploy attempt (${payload.repository.full_name}): The deploy settings do not contain a secret.`);
159
155
  }
160
- if (!Webhooks.verify(deployParams.autodeploy_secret, submits.payload, event.request.headers['x-hub-signature'])) {
161
- throw new Error(`Failed deploy attempt (${submits.payload.repository.full_name}): Signature mismatch.`);
156
+ if (!Webhooks.verify(deployParams.autodeploy_secret, payload, event.request.headers.get('x-hub-signature'))) {
157
+ throw new Error(`Failed deploy attempt (${payload.repository.full_name}): Signature mismatch.`);
162
158
  }
163
- if (submits.payload.repository.disabled || submits.payload.repository.archived) {
164
- throw new Error(`Failed deploy attempt (${submits.payload.repository.full_name}): Repository disabled or archived.`);
159
+ if (payload.repository.disabled || payload.repository.archived) {
160
+ throw new Error(`Failed deploy attempt (${payload.repository.full_name}): Repository disabled or archived.`);
165
161
  }
166
162
  eventHandler.on('push', async ({ name, payload }) => {
167
163
  Ui.log('---------------------------');
@@ -182,9 +178,9 @@ export async function hook(Ui, event, deployCallback, flags = {}, layout = {}) {
182
178
  }
183
179
  });
184
180
  return eventHandler.receive({
185
- id: event.request.headers['x-github-delivery'],
186
- name: event.request.headers['x-github-event'],
187
- payload: submits.payload /* JSON object */,
181
+ id: event.request.headers.get('x-github-delivery'),
182
+ name: event.request.headers.get('x-github-event'),
183
+ payload: payload /* JSON object */,
188
184
  });
189
185
  }
190
186
  }