@xyo-network/huri 2.107.3 → 2.107.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +132 -1
- package/dist/browser/index.cjs.map +1 -1
- package/dist/browser/index.js +111 -1
- package/dist/browser/index.js.map +1 -1
- package/dist/neutral/index.cjs +132 -1
- package/dist/neutral/index.cjs.map +1 -1
- package/dist/neutral/index.js +111 -1
- package/dist/neutral/index.js.map +1 -1
- package/dist/node/index.cjs +137 -1
- package/dist/node/index.cjs.map +1 -1
- package/dist/node/index.js +112 -1
- package/dist/node/index.js.map +1 -1
- package/package.json +5 -5
package/dist/browser/index.cjs
CHANGED
|
@@ -1,2 +1,133 @@
|
|
|
1
|
-
"use strict";
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
7
|
+
var __export = (target, all) => {
|
|
8
|
+
for (var name in all)
|
|
9
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
10
|
+
};
|
|
11
|
+
var __copyProps = (to, from, except, desc) => {
|
|
12
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
13
|
+
for (let key of __getOwnPropNames(from))
|
|
14
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
15
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
16
|
+
}
|
|
17
|
+
return to;
|
|
18
|
+
};
|
|
19
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
20
|
+
|
|
21
|
+
// src/index.ts
|
|
22
|
+
var src_exports = {};
|
|
23
|
+
__export(src_exports, {
|
|
24
|
+
Huri: () => Huri
|
|
25
|
+
});
|
|
26
|
+
module.exports = __toCommonJS(src_exports);
|
|
27
|
+
|
|
28
|
+
// src/Huri.ts
|
|
29
|
+
var import_assert = require("@xylabs/assert");
|
|
30
|
+
var import_axios = require("@xylabs/axios");
|
|
31
|
+
var import_hex = require("@xylabs/hex");
|
|
32
|
+
var import_account = require("@xyo-network/account");
|
|
33
|
+
var Huri = class _Huri {
|
|
34
|
+
static {
|
|
35
|
+
__name(this, "Huri");
|
|
36
|
+
}
|
|
37
|
+
archive;
|
|
38
|
+
archivist;
|
|
39
|
+
hash;
|
|
40
|
+
originalHref;
|
|
41
|
+
protocol;
|
|
42
|
+
token;
|
|
43
|
+
isHuri = true;
|
|
44
|
+
constructor(huri, { archivistUri, token } = {}) {
|
|
45
|
+
const huriString = _Huri.isHuri(huri)?.href ?? (typeof huri === "string" ? huri : huri instanceof ArrayBuffer ? new import_account.AddressValue(huri).hex : huri.href);
|
|
46
|
+
this.originalHref = huriString;
|
|
47
|
+
const protocol = _Huri.parseProtocol(huriString);
|
|
48
|
+
this.protocol = protocol ?? "https";
|
|
49
|
+
const path = (0, import_assert.assertEx)(_Huri.parsePath(huriString), () => "Missing path");
|
|
50
|
+
this.hash = (0, import_assert.assertEx)(this.parsePath(path, protocol !== void 0), () => "Missing hash");
|
|
51
|
+
(0, import_assert.assertEx)((0, import_hex.isHash)(this.hash), () => `Invalid hash [${this.hash}]`);
|
|
52
|
+
if (archivistUri) {
|
|
53
|
+
const archivistUriParts = archivistUri.split("://");
|
|
54
|
+
this.protocol = archivistUriParts[0];
|
|
55
|
+
this.archivist = archivistUriParts[1];
|
|
56
|
+
}
|
|
57
|
+
this.token = token;
|
|
58
|
+
this.validateParse();
|
|
59
|
+
}
|
|
60
|
+
/*
|
|
61
|
+
The full href or the hash
|
|
62
|
+
*/
|
|
63
|
+
get href() {
|
|
64
|
+
const parts = [];
|
|
65
|
+
if (this.protocol) {
|
|
66
|
+
parts.push(`${this.protocol}:/`);
|
|
67
|
+
}
|
|
68
|
+
if (this.archive) {
|
|
69
|
+
parts.push(`${this.archive}`);
|
|
70
|
+
}
|
|
71
|
+
if (this.archivist) {
|
|
72
|
+
parts.push(`${this.archivist}`);
|
|
73
|
+
}
|
|
74
|
+
parts.push(this.hash);
|
|
75
|
+
return parts.join("/");
|
|
76
|
+
}
|
|
77
|
+
static async fetch(huri) {
|
|
78
|
+
const AuthHeader = huri.token ? {
|
|
79
|
+
Authorization: `Bearer ${huri.token}`
|
|
80
|
+
} : void 0;
|
|
81
|
+
return (await import_axios.axios.get(huri.href, {
|
|
82
|
+
headers: AuthHeader
|
|
83
|
+
})).data;
|
|
84
|
+
}
|
|
85
|
+
static isHuri(value) {
|
|
86
|
+
if (typeof value === "object") {
|
|
87
|
+
return value.isHuri ? value : void 0;
|
|
88
|
+
}
|
|
89
|
+
}
|
|
90
|
+
static parsePath(huri) {
|
|
91
|
+
const protocolSplit = huri.split("//");
|
|
92
|
+
(0, import_assert.assertEx)(protocolSplit.length <= 2, () => `Invalid format [${huri}]`);
|
|
93
|
+
if (protocolSplit.length === 1) {
|
|
94
|
+
return huri;
|
|
95
|
+
}
|
|
96
|
+
if (protocolSplit.length === 2) {
|
|
97
|
+
return protocolSplit[1];
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
static parseProtocol(huri) {
|
|
101
|
+
const protocolSplit = huri.split("//");
|
|
102
|
+
(0, import_assert.assertEx)(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`);
|
|
103
|
+
const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : void 0;
|
|
104
|
+
if (rawProtocol) {
|
|
105
|
+
const protocolParts = rawProtocol?.split(":");
|
|
106
|
+
(0, import_assert.assertEx)(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`);
|
|
107
|
+
(0, import_assert.assertEx)(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`);
|
|
108
|
+
return protocolParts.shift();
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
async fetch() {
|
|
112
|
+
return await _Huri.fetch(this);
|
|
113
|
+
}
|
|
114
|
+
toString() {
|
|
115
|
+
return this.href;
|
|
116
|
+
}
|
|
117
|
+
parsePath(path, hasProtocol) {
|
|
118
|
+
const pathParts = path.split("/");
|
|
119
|
+
(0, import_assert.assertEx)(!(hasProtocol && pathParts[0].length === 0), () => "Invalid protocol separator");
|
|
120
|
+
pathParts[0].length === 0 ? pathParts.shift() : null;
|
|
121
|
+
const hash = (0, import_assert.assertEx)(pathParts.pop(), () => "No hash specified");
|
|
122
|
+
this.archivist = pathParts.shift() ?? "api.archivist.xyo.network";
|
|
123
|
+
this.archive = pathParts.pop();
|
|
124
|
+
(0, import_assert.assertEx)(pathParts.length === 0, () => "Too many path parts");
|
|
125
|
+
return hash;
|
|
126
|
+
}
|
|
127
|
+
validateParse() {
|
|
128
|
+
(0, import_assert.assertEx)(this.archivist?.length !== 0, () => "Invalid archivist length");
|
|
129
|
+
(0, import_assert.assertEx)(this.archive?.length !== 0, () => "Invalid archive length");
|
|
130
|
+
(0, import_assert.assertEx)(!(this.archive && !this.archivist), () => "If specifying archive, archivist is also required");
|
|
131
|
+
}
|
|
132
|
+
};
|
|
2
133
|
//# sourceMappingURL=index.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/index.ts","../../src/Huri.ts"],"sourcesContent":["export * from './Huri'\n","import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/index.ts","../../src/Huri.ts"],"sourcesContent":["export * from './Huri'\n","import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;;;;;;;ACAA,oBAAyB;AACzB,mBAAsB;AACtB,iBAAsC;AACtC,qBAA6B;AA2BtB,IAAMA,OAAN,MAAMA,MAAAA;EA9Bb,OA8BaA;;;EACXC;EACAC;EACAC;EACAC;EACAC;EACAC;EAEQC,SAAS;EAEjBC,YAAYC,MAA4B,EAAEC,cAAcJ,MAAK,IAAkB,CAAC,GAAG;AACjF,UAAMK,aACJX,MAAKO,OAAOE,IAAAA,GAAOG,SAClB,OAAOH,SAAS,WAAYA,OAC3BA,gBAAgBI,cAAc,IAAIC,4BAAaL,IAAAA,EAAMM,MACrDN,KAAKG;AACT,SAAKR,eAAeO;AAEpB,UAAMN,WAAWL,MAAKgB,cAAcL,UAAAA;AACpC,SAAKN,WAAWA,YAAY;AAE5B,UAAMY,WAAOC,wBAASlB,MAAKmB,UAAUR,UAAAA,GAAa,MAAM,cAAA;AACxD,SAAKR,WAAOe,wBAAS,KAAKC,UAAUF,MAAMZ,aAAae,MAAAA,GAAY,MAAM,cAAA;AAEzEF,oCAASG,mBAAO,KAAKlB,IAAI,GAAG,MAAM,iBAAiB,KAAKA,IAAI,GAAG;AAG/D,QAAIO,cAAc;AAChB,YAAMY,oBAAoBZ,aAAaa,MAAM,KAAA;AAC7C,WAAKlB,WAAWiB,kBAAkB,CAAA;AAClC,WAAKpB,YAAYoB,kBAAkB,CAAA;IACrC;AAEA,SAAKhB,QAAQA;AAEb,SAAKkB,cAAa;EACpB;;;;EAKA,IAAIZ,OAAO;AACT,UAAMa,QAAkB,CAAA;AACxB,QAAI,KAAKpB,UAAU;AACjBoB,YAAMC,KAAK,GAAG,KAAKrB,QAAQ,IAAI;IACjC;AACA,QAAI,KAAKJ,SAAS;AAChBwB,YAAMC,KAAK,GAAG,KAAKzB,OAAO,EAAE;IAC9B;AACA,QAAI,KAAKC,WAAW;AAClBuB,YAAMC,KAAK,GAAG,KAAKxB,SAAS,EAAE;IAChC;AACAuB,UAAMC,KAAK,KAAKvB,IAAI;AACpB,WAAOsB,MAAME,KAAK,GAAA;EACpB;EAEA,aAAaC,MAAmCnB,MAAoC;AAClF,UAAMoB,aAAapB,KAAKH,QAAQ;MAAEwB,eAAe,UAAUrB,KAAKH,KAAK;IAAG,IAAIc;AAC5E,YAAQ,MAAMW,mBAAMC,IAAOvB,KAAKG,MAAM;MAAEqB,SAASJ;IAAW,CAAA,GAAIK;EAClE;EAEA,OAAO3B,OAAO4B,OAAgB;AAC5B,QAAI,OAAOA,UAAU,UAAU;AAC7B,aAAQA,MAAe5B,SAAU4B,QAAiBf;IACpD;EACF;EAEA,OAAeD,UAAUV,MAAc;AACrC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,gCAASkB,cAAcC,UAAU,GAAG,MAAM,mBAAmB5B,IAAAA,GAAO;AACpE,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAO5B;IACT;AACA,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAOD,cAAc,CAAA;IACvB;EACF;EAEA,OAAepB,cAAcP,MAAc;AACzC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,gCAASkB,cAAcC,UAAU,GAAG,MAAM,4BAA4BD,cAAc,CAAA,CAAE,GAAG;AACzF,UAAME,cAAcF,cAAcC,WAAW,IAAID,cAAcG,MAAK,IAAKnB;AACzE,QAAIkB,aAAa;AACf,YAAME,gBAAgBF,aAAaf,MAAM,GAAA;AACzCL,kCAASsB,cAAcH,WAAW,GAAG,MAAM,4BAA4BC,WAAAA,GAAc;AACrFpB,kCAASsB,cAAc,CAAA,EAAGH,WAAW,GAAG,MAAM,qCAAqCC,WAAAA,GAAc;AACjG,aAAOE,cAAcD,MAAK;IAC5B;EACF;EAEA,MAAMX,QAAgC;AACpC,WAAO,MAAM5B,MAAK4B,MAAS,IAAI;EACjC;EAEAa,WAAW;AACT,WAAO,KAAK7B;EACd;EAEQO,UAAUF,MAAcyB,aAAsB;AACpD,UAAMC,YAAY1B,KAAKM,MAAM,GAAA;AAG7BL,gCAAS,EAAEwB,eAAeC,UAAU,CAAA,EAAGN,WAAW,IAAI,MAAM,4BAAA;AAG5DM,cAAU,CAAA,EAAGN,WAAW,IAAIM,UAAUJ,MAAK,IAAK;AAGhD,UAAMpC,WAAOe,wBAASyB,UAAUC,IAAG,GAAI,MAAM,mBAAA;AAG7C,SAAK1C,YAAYyC,UAAUJ,MAAK,KAAM;AAGtC,SAAKtC,UAAU0C,UAAUC,IAAG;AAG5B1B,gCAASyB,UAAUN,WAAW,GAAG,MAAM,qBAAA;AAEvC,WAAOlC;EACT;EAEQqB,gBAAgB;AAEtBN,gCAAS,KAAKhB,WAAWmC,WAAW,GAAG,MAAM,0BAAA;AAG7CnB,gCAAS,KAAKjB,SAASoC,WAAW,GAAG,MAAM,wBAAA;AAG3CnB,gCAAS,EAAE,KAAKjB,WAAW,CAAC,KAAKC,YAAY,MAAM,mDAAA;EACrD;AACF;","names":["Huri","archive","archivist","hash","originalHref","protocol","token","isHuri","constructor","huri","archivistUri","huriString","href","ArrayBuffer","AddressValue","hex","parseProtocol","path","assertEx","parsePath","undefined","isHash","archivistUriParts","split","validateParse","parts","push","join","fetch","AuthHeader","Authorization","axios","get","headers","data","value","protocolSplit","length","rawProtocol","shift","protocolParts","toString","hasProtocol","pathParts","pop"]}
|
package/dist/browser/index.js
CHANGED
|
@@ -1,2 +1,112 @@
|
|
|
1
|
-
var
|
|
1
|
+
var __defProp = Object.defineProperty;
|
|
2
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
3
|
+
|
|
4
|
+
// src/Huri.ts
|
|
5
|
+
import { assertEx } from "@xylabs/assert";
|
|
6
|
+
import { axios } from "@xylabs/axios";
|
|
7
|
+
import { isHash } from "@xylabs/hex";
|
|
8
|
+
import { AddressValue } from "@xyo-network/account";
|
|
9
|
+
var Huri = class _Huri {
|
|
10
|
+
static {
|
|
11
|
+
__name(this, "Huri");
|
|
12
|
+
}
|
|
13
|
+
archive;
|
|
14
|
+
archivist;
|
|
15
|
+
hash;
|
|
16
|
+
originalHref;
|
|
17
|
+
protocol;
|
|
18
|
+
token;
|
|
19
|
+
isHuri = true;
|
|
20
|
+
constructor(huri, { archivistUri, token } = {}) {
|
|
21
|
+
const huriString = _Huri.isHuri(huri)?.href ?? (typeof huri === "string" ? huri : huri instanceof ArrayBuffer ? new AddressValue(huri).hex : huri.href);
|
|
22
|
+
this.originalHref = huriString;
|
|
23
|
+
const protocol = _Huri.parseProtocol(huriString);
|
|
24
|
+
this.protocol = protocol ?? "https";
|
|
25
|
+
const path = assertEx(_Huri.parsePath(huriString), () => "Missing path");
|
|
26
|
+
this.hash = assertEx(this.parsePath(path, protocol !== void 0), () => "Missing hash");
|
|
27
|
+
assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`);
|
|
28
|
+
if (archivistUri) {
|
|
29
|
+
const archivistUriParts = archivistUri.split("://");
|
|
30
|
+
this.protocol = archivistUriParts[0];
|
|
31
|
+
this.archivist = archivistUriParts[1];
|
|
32
|
+
}
|
|
33
|
+
this.token = token;
|
|
34
|
+
this.validateParse();
|
|
35
|
+
}
|
|
36
|
+
/*
|
|
37
|
+
The full href or the hash
|
|
38
|
+
*/
|
|
39
|
+
get href() {
|
|
40
|
+
const parts = [];
|
|
41
|
+
if (this.protocol) {
|
|
42
|
+
parts.push(`${this.protocol}:/`);
|
|
43
|
+
}
|
|
44
|
+
if (this.archive) {
|
|
45
|
+
parts.push(`${this.archive}`);
|
|
46
|
+
}
|
|
47
|
+
if (this.archivist) {
|
|
48
|
+
parts.push(`${this.archivist}`);
|
|
49
|
+
}
|
|
50
|
+
parts.push(this.hash);
|
|
51
|
+
return parts.join("/");
|
|
52
|
+
}
|
|
53
|
+
static async fetch(huri) {
|
|
54
|
+
const AuthHeader = huri.token ? {
|
|
55
|
+
Authorization: `Bearer ${huri.token}`
|
|
56
|
+
} : void 0;
|
|
57
|
+
return (await axios.get(huri.href, {
|
|
58
|
+
headers: AuthHeader
|
|
59
|
+
})).data;
|
|
60
|
+
}
|
|
61
|
+
static isHuri(value) {
|
|
62
|
+
if (typeof value === "object") {
|
|
63
|
+
return value.isHuri ? value : void 0;
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
static parsePath(huri) {
|
|
67
|
+
const protocolSplit = huri.split("//");
|
|
68
|
+
assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`);
|
|
69
|
+
if (protocolSplit.length === 1) {
|
|
70
|
+
return huri;
|
|
71
|
+
}
|
|
72
|
+
if (protocolSplit.length === 2) {
|
|
73
|
+
return protocolSplit[1];
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
static parseProtocol(huri) {
|
|
77
|
+
const protocolSplit = huri.split("//");
|
|
78
|
+
assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`);
|
|
79
|
+
const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : void 0;
|
|
80
|
+
if (rawProtocol) {
|
|
81
|
+
const protocolParts = rawProtocol?.split(":");
|
|
82
|
+
assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`);
|
|
83
|
+
assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`);
|
|
84
|
+
return protocolParts.shift();
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
async fetch() {
|
|
88
|
+
return await _Huri.fetch(this);
|
|
89
|
+
}
|
|
90
|
+
toString() {
|
|
91
|
+
return this.href;
|
|
92
|
+
}
|
|
93
|
+
parsePath(path, hasProtocol) {
|
|
94
|
+
const pathParts = path.split("/");
|
|
95
|
+
assertEx(!(hasProtocol && pathParts[0].length === 0), () => "Invalid protocol separator");
|
|
96
|
+
pathParts[0].length === 0 ? pathParts.shift() : null;
|
|
97
|
+
const hash = assertEx(pathParts.pop(), () => "No hash specified");
|
|
98
|
+
this.archivist = pathParts.shift() ?? "api.archivist.xyo.network";
|
|
99
|
+
this.archive = pathParts.pop();
|
|
100
|
+
assertEx(pathParts.length === 0, () => "Too many path parts");
|
|
101
|
+
return hash;
|
|
102
|
+
}
|
|
103
|
+
validateParse() {
|
|
104
|
+
assertEx(this.archivist?.length !== 0, () => "Invalid archivist length");
|
|
105
|
+
assertEx(this.archive?.length !== 0, () => "Invalid archive length");
|
|
106
|
+
assertEx(!(this.archive && !this.archivist), () => "If specifying archive, archivist is also required");
|
|
107
|
+
}
|
|
108
|
+
};
|
|
109
|
+
export {
|
|
110
|
+
Huri
|
|
111
|
+
};
|
|
2
112
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/Huri.ts"],"sourcesContent":["import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/Huri.ts"],"sourcesContent":["import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":";;;;AAAA,SAASA,gBAAgB;AACzB,SAASC,aAAa;AACtB,SAAwBC,cAAc;AACtC,SAASC,oBAAoB;AA2BtB,IAAMC,OAAN,MAAMA,MAAAA;EA9Bb,OA8BaA;;;EACXC;EACAC;EACAC;EACAC;EACAC;EACAC;EAEQC,SAAS;EAEjBC,YAAYC,MAA4B,EAAEC,cAAcJ,MAAK,IAAkB,CAAC,GAAG;AACjF,UAAMK,aACJX,MAAKO,OAAOE,IAAAA,GAAOG,SAClB,OAAOH,SAAS,WAAYA,OAC3BA,gBAAgBI,cAAc,IAAIC,aAAaL,IAAAA,EAAMM,MACrDN,KAAKG;AACT,SAAKR,eAAeO;AAEpB,UAAMN,WAAWL,MAAKgB,cAAcL,UAAAA;AACpC,SAAKN,WAAWA,YAAY;AAE5B,UAAMY,OAAOC,SAASlB,MAAKmB,UAAUR,UAAAA,GAAa,MAAM,cAAA;AACxD,SAAKR,OAAOe,SAAS,KAAKC,UAAUF,MAAMZ,aAAae,MAAAA,GAAY,MAAM,cAAA;AAEzEF,aAASG,OAAO,KAAKlB,IAAI,GAAG,MAAM,iBAAiB,KAAKA,IAAI,GAAG;AAG/D,QAAIO,cAAc;AAChB,YAAMY,oBAAoBZ,aAAaa,MAAM,KAAA;AAC7C,WAAKlB,WAAWiB,kBAAkB,CAAA;AAClC,WAAKpB,YAAYoB,kBAAkB,CAAA;IACrC;AAEA,SAAKhB,QAAQA;AAEb,SAAKkB,cAAa;EACpB;;;;EAKA,IAAIZ,OAAO;AACT,UAAMa,QAAkB,CAAA;AACxB,QAAI,KAAKpB,UAAU;AACjBoB,YAAMC,KAAK,GAAG,KAAKrB,QAAQ,IAAI;IACjC;AACA,QAAI,KAAKJ,SAAS;AAChBwB,YAAMC,KAAK,GAAG,KAAKzB,OAAO,EAAE;IAC9B;AACA,QAAI,KAAKC,WAAW;AAClBuB,YAAMC,KAAK,GAAG,KAAKxB,SAAS,EAAE;IAChC;AACAuB,UAAMC,KAAK,KAAKvB,IAAI;AACpB,WAAOsB,MAAME,KAAK,GAAA;EACpB;EAEA,aAAaC,MAAmCnB,MAAoC;AAClF,UAAMoB,aAAapB,KAAKH,QAAQ;MAAEwB,eAAe,UAAUrB,KAAKH,KAAK;IAAG,IAAIc;AAC5E,YAAQ,MAAMW,MAAMC,IAAOvB,KAAKG,MAAM;MAAEqB,SAASJ;IAAW,CAAA,GAAIK;EAClE;EAEA,OAAO3B,OAAO4B,OAAgB;AAC5B,QAAI,OAAOA,UAAU,UAAU;AAC7B,aAAQA,MAAe5B,SAAU4B,QAAiBf;IACpD;EACF;EAEA,OAAeD,UAAUV,MAAc;AACrC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,aAASkB,cAAcC,UAAU,GAAG,MAAM,mBAAmB5B,IAAAA,GAAO;AACpE,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAO5B;IACT;AACA,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAOD,cAAc,CAAA;IACvB;EACF;EAEA,OAAepB,cAAcP,MAAc;AACzC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,aAASkB,cAAcC,UAAU,GAAG,MAAM,4BAA4BD,cAAc,CAAA,CAAE,GAAG;AACzF,UAAME,cAAcF,cAAcC,WAAW,IAAID,cAAcG,MAAK,IAAKnB;AACzE,QAAIkB,aAAa;AACf,YAAME,gBAAgBF,aAAaf,MAAM,GAAA;AACzCL,eAASsB,cAAcH,WAAW,GAAG,MAAM,4BAA4BC,WAAAA,GAAc;AACrFpB,eAASsB,cAAc,CAAA,EAAGH,WAAW,GAAG,MAAM,qCAAqCC,WAAAA,GAAc;AACjG,aAAOE,cAAcD,MAAK;IAC5B;EACF;EAEA,MAAMX,QAAgC;AACpC,WAAO,MAAM5B,MAAK4B,MAAS,IAAI;EACjC;EAEAa,WAAW;AACT,WAAO,KAAK7B;EACd;EAEQO,UAAUF,MAAcyB,aAAsB;AACpD,UAAMC,YAAY1B,KAAKM,MAAM,GAAA;AAG7BL,aAAS,EAAEwB,eAAeC,UAAU,CAAA,EAAGN,WAAW,IAAI,MAAM,4BAAA;AAG5DM,cAAU,CAAA,EAAGN,WAAW,IAAIM,UAAUJ,MAAK,IAAK;AAGhD,UAAMpC,OAAOe,SAASyB,UAAUC,IAAG,GAAI,MAAM,mBAAA;AAG7C,SAAK1C,YAAYyC,UAAUJ,MAAK,KAAM;AAGtC,SAAKtC,UAAU0C,UAAUC,IAAG;AAG5B1B,aAASyB,UAAUN,WAAW,GAAG,MAAM,qBAAA;AAEvC,WAAOlC;EACT;EAEQqB,gBAAgB;AAEtBN,aAAS,KAAKhB,WAAWmC,WAAW,GAAG,MAAM,0BAAA;AAG7CnB,aAAS,KAAKjB,SAASoC,WAAW,GAAG,MAAM,wBAAA;AAG3CnB,aAAS,EAAE,KAAKjB,WAAW,CAAC,KAAKC,YAAY,MAAM,mDAAA;EACrD;AACF;","names":["assertEx","axios","isHash","AddressValue","Huri","archive","archivist","hash","originalHref","protocol","token","isHuri","constructor","huri","archivistUri","huriString","href","ArrayBuffer","AddressValue","hex","parseProtocol","path","assertEx","parsePath","undefined","isHash","archivistUriParts","split","validateParse","parts","push","join","fetch","AuthHeader","Authorization","axios","get","headers","data","value","protocolSplit","length","rawProtocol","shift","protocolParts","toString","hasProtocol","pathParts","pop"]}
|
package/dist/neutral/index.cjs
CHANGED
|
@@ -1,2 +1,133 @@
|
|
|
1
|
-
"use strict";
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
7
|
+
var __export = (target, all) => {
|
|
8
|
+
for (var name in all)
|
|
9
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
10
|
+
};
|
|
11
|
+
var __copyProps = (to, from, except, desc) => {
|
|
12
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
13
|
+
for (let key of __getOwnPropNames(from))
|
|
14
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
15
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
16
|
+
}
|
|
17
|
+
return to;
|
|
18
|
+
};
|
|
19
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
20
|
+
|
|
21
|
+
// src/index.ts
|
|
22
|
+
var src_exports = {};
|
|
23
|
+
__export(src_exports, {
|
|
24
|
+
Huri: () => Huri
|
|
25
|
+
});
|
|
26
|
+
module.exports = __toCommonJS(src_exports);
|
|
27
|
+
|
|
28
|
+
// src/Huri.ts
|
|
29
|
+
var import_assert = require("@xylabs/assert");
|
|
30
|
+
var import_axios = require("@xylabs/axios");
|
|
31
|
+
var import_hex = require("@xylabs/hex");
|
|
32
|
+
var import_account = require("@xyo-network/account");
|
|
33
|
+
var Huri = class _Huri {
|
|
34
|
+
static {
|
|
35
|
+
__name(this, "Huri");
|
|
36
|
+
}
|
|
37
|
+
archive;
|
|
38
|
+
archivist;
|
|
39
|
+
hash;
|
|
40
|
+
originalHref;
|
|
41
|
+
protocol;
|
|
42
|
+
token;
|
|
43
|
+
isHuri = true;
|
|
44
|
+
constructor(huri, { archivistUri, token } = {}) {
|
|
45
|
+
const huriString = _Huri.isHuri(huri)?.href ?? (typeof huri === "string" ? huri : huri instanceof ArrayBuffer ? new import_account.AddressValue(huri).hex : huri.href);
|
|
46
|
+
this.originalHref = huriString;
|
|
47
|
+
const protocol = _Huri.parseProtocol(huriString);
|
|
48
|
+
this.protocol = protocol ?? "https";
|
|
49
|
+
const path = (0, import_assert.assertEx)(_Huri.parsePath(huriString), () => "Missing path");
|
|
50
|
+
this.hash = (0, import_assert.assertEx)(this.parsePath(path, protocol !== void 0), () => "Missing hash");
|
|
51
|
+
(0, import_assert.assertEx)((0, import_hex.isHash)(this.hash), () => `Invalid hash [${this.hash}]`);
|
|
52
|
+
if (archivistUri) {
|
|
53
|
+
const archivistUriParts = archivistUri.split("://");
|
|
54
|
+
this.protocol = archivistUriParts[0];
|
|
55
|
+
this.archivist = archivistUriParts[1];
|
|
56
|
+
}
|
|
57
|
+
this.token = token;
|
|
58
|
+
this.validateParse();
|
|
59
|
+
}
|
|
60
|
+
/*
|
|
61
|
+
The full href or the hash
|
|
62
|
+
*/
|
|
63
|
+
get href() {
|
|
64
|
+
const parts = [];
|
|
65
|
+
if (this.protocol) {
|
|
66
|
+
parts.push(`${this.protocol}:/`);
|
|
67
|
+
}
|
|
68
|
+
if (this.archive) {
|
|
69
|
+
parts.push(`${this.archive}`);
|
|
70
|
+
}
|
|
71
|
+
if (this.archivist) {
|
|
72
|
+
parts.push(`${this.archivist}`);
|
|
73
|
+
}
|
|
74
|
+
parts.push(this.hash);
|
|
75
|
+
return parts.join("/");
|
|
76
|
+
}
|
|
77
|
+
static async fetch(huri) {
|
|
78
|
+
const AuthHeader = huri.token ? {
|
|
79
|
+
Authorization: `Bearer ${huri.token}`
|
|
80
|
+
} : void 0;
|
|
81
|
+
return (await import_axios.axios.get(huri.href, {
|
|
82
|
+
headers: AuthHeader
|
|
83
|
+
})).data;
|
|
84
|
+
}
|
|
85
|
+
static isHuri(value) {
|
|
86
|
+
if (typeof value === "object") {
|
|
87
|
+
return value.isHuri ? value : void 0;
|
|
88
|
+
}
|
|
89
|
+
}
|
|
90
|
+
static parsePath(huri) {
|
|
91
|
+
const protocolSplit = huri.split("//");
|
|
92
|
+
(0, import_assert.assertEx)(protocolSplit.length <= 2, () => `Invalid format [${huri}]`);
|
|
93
|
+
if (protocolSplit.length === 1) {
|
|
94
|
+
return huri;
|
|
95
|
+
}
|
|
96
|
+
if (protocolSplit.length === 2) {
|
|
97
|
+
return protocolSplit[1];
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
static parseProtocol(huri) {
|
|
101
|
+
const protocolSplit = huri.split("//");
|
|
102
|
+
(0, import_assert.assertEx)(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`);
|
|
103
|
+
const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : void 0;
|
|
104
|
+
if (rawProtocol) {
|
|
105
|
+
const protocolParts = rawProtocol?.split(":");
|
|
106
|
+
(0, import_assert.assertEx)(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`);
|
|
107
|
+
(0, import_assert.assertEx)(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`);
|
|
108
|
+
return protocolParts.shift();
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
async fetch() {
|
|
112
|
+
return await _Huri.fetch(this);
|
|
113
|
+
}
|
|
114
|
+
toString() {
|
|
115
|
+
return this.href;
|
|
116
|
+
}
|
|
117
|
+
parsePath(path, hasProtocol) {
|
|
118
|
+
const pathParts = path.split("/");
|
|
119
|
+
(0, import_assert.assertEx)(!(hasProtocol && pathParts[0].length === 0), () => "Invalid protocol separator");
|
|
120
|
+
pathParts[0].length === 0 ? pathParts.shift() : null;
|
|
121
|
+
const hash = (0, import_assert.assertEx)(pathParts.pop(), () => "No hash specified");
|
|
122
|
+
this.archivist = pathParts.shift() ?? "api.archivist.xyo.network";
|
|
123
|
+
this.archive = pathParts.pop();
|
|
124
|
+
(0, import_assert.assertEx)(pathParts.length === 0, () => "Too many path parts");
|
|
125
|
+
return hash;
|
|
126
|
+
}
|
|
127
|
+
validateParse() {
|
|
128
|
+
(0, import_assert.assertEx)(this.archivist?.length !== 0, () => "Invalid archivist length");
|
|
129
|
+
(0, import_assert.assertEx)(this.archive?.length !== 0, () => "Invalid archive length");
|
|
130
|
+
(0, import_assert.assertEx)(!(this.archive && !this.archivist), () => "If specifying archive, archivist is also required");
|
|
131
|
+
}
|
|
132
|
+
};
|
|
2
133
|
//# sourceMappingURL=index.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/index.ts","../../src/Huri.ts"],"sourcesContent":["export * from './Huri'\n","import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/index.ts","../../src/Huri.ts"],"sourcesContent":["export * from './Huri'\n","import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;;;;;;;ACAA,oBAAyB;AACzB,mBAAsB;AACtB,iBAAsC;AACtC,qBAA6B;AA2BtB,IAAMA,OAAN,MAAMA,MAAAA;EA9Bb,OA8BaA;;;EACXC;EACAC;EACAC;EACAC;EACAC;EACAC;EAEQC,SAAS;EAEjBC,YAAYC,MAA4B,EAAEC,cAAcJ,MAAK,IAAkB,CAAC,GAAG;AACjF,UAAMK,aACJX,MAAKO,OAAOE,IAAAA,GAAOG,SAClB,OAAOH,SAAS,WAAYA,OAC3BA,gBAAgBI,cAAc,IAAIC,4BAAaL,IAAAA,EAAMM,MACrDN,KAAKG;AACT,SAAKR,eAAeO;AAEpB,UAAMN,WAAWL,MAAKgB,cAAcL,UAAAA;AACpC,SAAKN,WAAWA,YAAY;AAE5B,UAAMY,WAAOC,wBAASlB,MAAKmB,UAAUR,UAAAA,GAAa,MAAM,cAAA;AACxD,SAAKR,WAAOe,wBAAS,KAAKC,UAAUF,MAAMZ,aAAae,MAAAA,GAAY,MAAM,cAAA;AAEzEF,oCAASG,mBAAO,KAAKlB,IAAI,GAAG,MAAM,iBAAiB,KAAKA,IAAI,GAAG;AAG/D,QAAIO,cAAc;AAChB,YAAMY,oBAAoBZ,aAAaa,MAAM,KAAA;AAC7C,WAAKlB,WAAWiB,kBAAkB,CAAA;AAClC,WAAKpB,YAAYoB,kBAAkB,CAAA;IACrC;AAEA,SAAKhB,QAAQA;AAEb,SAAKkB,cAAa;EACpB;;;;EAKA,IAAIZ,OAAO;AACT,UAAMa,QAAkB,CAAA;AACxB,QAAI,KAAKpB,UAAU;AACjBoB,YAAMC,KAAK,GAAG,KAAKrB,QAAQ,IAAI;IACjC;AACA,QAAI,KAAKJ,SAAS;AAChBwB,YAAMC,KAAK,GAAG,KAAKzB,OAAO,EAAE;IAC9B;AACA,QAAI,KAAKC,WAAW;AAClBuB,YAAMC,KAAK,GAAG,KAAKxB,SAAS,EAAE;IAChC;AACAuB,UAAMC,KAAK,KAAKvB,IAAI;AACpB,WAAOsB,MAAME,KAAK,GAAA;EACpB;EAEA,aAAaC,MAAmCnB,MAAoC;AAClF,UAAMoB,aAAapB,KAAKH,QAAQ;MAAEwB,eAAe,UAAUrB,KAAKH,KAAK;IAAG,IAAIc;AAC5E,YAAQ,MAAMW,mBAAMC,IAAOvB,KAAKG,MAAM;MAAEqB,SAASJ;IAAW,CAAA,GAAIK;EAClE;EAEA,OAAO3B,OAAO4B,OAAgB;AAC5B,QAAI,OAAOA,UAAU,UAAU;AAC7B,aAAQA,MAAe5B,SAAU4B,QAAiBf;IACpD;EACF;EAEA,OAAeD,UAAUV,MAAc;AACrC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,gCAASkB,cAAcC,UAAU,GAAG,MAAM,mBAAmB5B,IAAAA,GAAO;AACpE,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAO5B;IACT;AACA,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAOD,cAAc,CAAA;IACvB;EACF;EAEA,OAAepB,cAAcP,MAAc;AACzC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,gCAASkB,cAAcC,UAAU,GAAG,MAAM,4BAA4BD,cAAc,CAAA,CAAE,GAAG;AACzF,UAAME,cAAcF,cAAcC,WAAW,IAAID,cAAcG,MAAK,IAAKnB;AACzE,QAAIkB,aAAa;AACf,YAAME,gBAAgBF,aAAaf,MAAM,GAAA;AACzCL,kCAASsB,cAAcH,WAAW,GAAG,MAAM,4BAA4BC,WAAAA,GAAc;AACrFpB,kCAASsB,cAAc,CAAA,EAAGH,WAAW,GAAG,MAAM,qCAAqCC,WAAAA,GAAc;AACjG,aAAOE,cAAcD,MAAK;IAC5B;EACF;EAEA,MAAMX,QAAgC;AACpC,WAAO,MAAM5B,MAAK4B,MAAS,IAAI;EACjC;EAEAa,WAAW;AACT,WAAO,KAAK7B;EACd;EAEQO,UAAUF,MAAcyB,aAAsB;AACpD,UAAMC,YAAY1B,KAAKM,MAAM,GAAA;AAG7BL,gCAAS,EAAEwB,eAAeC,UAAU,CAAA,EAAGN,WAAW,IAAI,MAAM,4BAAA;AAG5DM,cAAU,CAAA,EAAGN,WAAW,IAAIM,UAAUJ,MAAK,IAAK;AAGhD,UAAMpC,WAAOe,wBAASyB,UAAUC,IAAG,GAAI,MAAM,mBAAA;AAG7C,SAAK1C,YAAYyC,UAAUJ,MAAK,KAAM;AAGtC,SAAKtC,UAAU0C,UAAUC,IAAG;AAG5B1B,gCAASyB,UAAUN,WAAW,GAAG,MAAM,qBAAA;AAEvC,WAAOlC;EACT;EAEQqB,gBAAgB;AAEtBN,gCAAS,KAAKhB,WAAWmC,WAAW,GAAG,MAAM,0BAAA;AAG7CnB,gCAAS,KAAKjB,SAASoC,WAAW,GAAG,MAAM,wBAAA;AAG3CnB,gCAAS,EAAE,KAAKjB,WAAW,CAAC,KAAKC,YAAY,MAAM,mDAAA;EACrD;AACF;","names":["Huri","archive","archivist","hash","originalHref","protocol","token","isHuri","constructor","huri","archivistUri","huriString","href","ArrayBuffer","AddressValue","hex","parseProtocol","path","assertEx","parsePath","undefined","isHash","archivistUriParts","split","validateParse","parts","push","join","fetch","AuthHeader","Authorization","axios","get","headers","data","value","protocolSplit","length","rawProtocol","shift","protocolParts","toString","hasProtocol","pathParts","pop"]}
|
package/dist/neutral/index.js
CHANGED
|
@@ -1,2 +1,112 @@
|
|
|
1
|
-
var
|
|
1
|
+
var __defProp = Object.defineProperty;
|
|
2
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
3
|
+
|
|
4
|
+
// src/Huri.ts
|
|
5
|
+
import { assertEx } from "@xylabs/assert";
|
|
6
|
+
import { axios } from "@xylabs/axios";
|
|
7
|
+
import { isHash } from "@xylabs/hex";
|
|
8
|
+
import { AddressValue } from "@xyo-network/account";
|
|
9
|
+
var Huri = class _Huri {
|
|
10
|
+
static {
|
|
11
|
+
__name(this, "Huri");
|
|
12
|
+
}
|
|
13
|
+
archive;
|
|
14
|
+
archivist;
|
|
15
|
+
hash;
|
|
16
|
+
originalHref;
|
|
17
|
+
protocol;
|
|
18
|
+
token;
|
|
19
|
+
isHuri = true;
|
|
20
|
+
constructor(huri, { archivistUri, token } = {}) {
|
|
21
|
+
const huriString = _Huri.isHuri(huri)?.href ?? (typeof huri === "string" ? huri : huri instanceof ArrayBuffer ? new AddressValue(huri).hex : huri.href);
|
|
22
|
+
this.originalHref = huriString;
|
|
23
|
+
const protocol = _Huri.parseProtocol(huriString);
|
|
24
|
+
this.protocol = protocol ?? "https";
|
|
25
|
+
const path = assertEx(_Huri.parsePath(huriString), () => "Missing path");
|
|
26
|
+
this.hash = assertEx(this.parsePath(path, protocol !== void 0), () => "Missing hash");
|
|
27
|
+
assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`);
|
|
28
|
+
if (archivistUri) {
|
|
29
|
+
const archivistUriParts = archivistUri.split("://");
|
|
30
|
+
this.protocol = archivistUriParts[0];
|
|
31
|
+
this.archivist = archivistUriParts[1];
|
|
32
|
+
}
|
|
33
|
+
this.token = token;
|
|
34
|
+
this.validateParse();
|
|
35
|
+
}
|
|
36
|
+
/*
|
|
37
|
+
The full href or the hash
|
|
38
|
+
*/
|
|
39
|
+
get href() {
|
|
40
|
+
const parts = [];
|
|
41
|
+
if (this.protocol) {
|
|
42
|
+
parts.push(`${this.protocol}:/`);
|
|
43
|
+
}
|
|
44
|
+
if (this.archive) {
|
|
45
|
+
parts.push(`${this.archive}`);
|
|
46
|
+
}
|
|
47
|
+
if (this.archivist) {
|
|
48
|
+
parts.push(`${this.archivist}`);
|
|
49
|
+
}
|
|
50
|
+
parts.push(this.hash);
|
|
51
|
+
return parts.join("/");
|
|
52
|
+
}
|
|
53
|
+
static async fetch(huri) {
|
|
54
|
+
const AuthHeader = huri.token ? {
|
|
55
|
+
Authorization: `Bearer ${huri.token}`
|
|
56
|
+
} : void 0;
|
|
57
|
+
return (await axios.get(huri.href, {
|
|
58
|
+
headers: AuthHeader
|
|
59
|
+
})).data;
|
|
60
|
+
}
|
|
61
|
+
static isHuri(value) {
|
|
62
|
+
if (typeof value === "object") {
|
|
63
|
+
return value.isHuri ? value : void 0;
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
static parsePath(huri) {
|
|
67
|
+
const protocolSplit = huri.split("//");
|
|
68
|
+
assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`);
|
|
69
|
+
if (protocolSplit.length === 1) {
|
|
70
|
+
return huri;
|
|
71
|
+
}
|
|
72
|
+
if (protocolSplit.length === 2) {
|
|
73
|
+
return protocolSplit[1];
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
static parseProtocol(huri) {
|
|
77
|
+
const protocolSplit = huri.split("//");
|
|
78
|
+
assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`);
|
|
79
|
+
const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : void 0;
|
|
80
|
+
if (rawProtocol) {
|
|
81
|
+
const protocolParts = rawProtocol?.split(":");
|
|
82
|
+
assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`);
|
|
83
|
+
assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`);
|
|
84
|
+
return protocolParts.shift();
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
async fetch() {
|
|
88
|
+
return await _Huri.fetch(this);
|
|
89
|
+
}
|
|
90
|
+
toString() {
|
|
91
|
+
return this.href;
|
|
92
|
+
}
|
|
93
|
+
parsePath(path, hasProtocol) {
|
|
94
|
+
const pathParts = path.split("/");
|
|
95
|
+
assertEx(!(hasProtocol && pathParts[0].length === 0), () => "Invalid protocol separator");
|
|
96
|
+
pathParts[0].length === 0 ? pathParts.shift() : null;
|
|
97
|
+
const hash = assertEx(pathParts.pop(), () => "No hash specified");
|
|
98
|
+
this.archivist = pathParts.shift() ?? "api.archivist.xyo.network";
|
|
99
|
+
this.archive = pathParts.pop();
|
|
100
|
+
assertEx(pathParts.length === 0, () => "Too many path parts");
|
|
101
|
+
return hash;
|
|
102
|
+
}
|
|
103
|
+
validateParse() {
|
|
104
|
+
assertEx(this.archivist?.length !== 0, () => "Invalid archivist length");
|
|
105
|
+
assertEx(this.archive?.length !== 0, () => "Invalid archive length");
|
|
106
|
+
assertEx(!(this.archive && !this.archivist), () => "If specifying archive, archivist is also required");
|
|
107
|
+
}
|
|
108
|
+
};
|
|
109
|
+
export {
|
|
110
|
+
Huri
|
|
111
|
+
};
|
|
2
112
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/Huri.ts"],"sourcesContent":["import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/Huri.ts"],"sourcesContent":["import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":";;;;AAAA,SAASA,gBAAgB;AACzB,SAASC,aAAa;AACtB,SAAwBC,cAAc;AACtC,SAASC,oBAAoB;AA2BtB,IAAMC,OAAN,MAAMA,MAAAA;EA9Bb,OA8BaA;;;EACXC;EACAC;EACAC;EACAC;EACAC;EACAC;EAEQC,SAAS;EAEjBC,YAAYC,MAA4B,EAAEC,cAAcJ,MAAK,IAAkB,CAAC,GAAG;AACjF,UAAMK,aACJX,MAAKO,OAAOE,IAAAA,GAAOG,SAClB,OAAOH,SAAS,WAAYA,OAC3BA,gBAAgBI,cAAc,IAAIC,aAAaL,IAAAA,EAAMM,MACrDN,KAAKG;AACT,SAAKR,eAAeO;AAEpB,UAAMN,WAAWL,MAAKgB,cAAcL,UAAAA;AACpC,SAAKN,WAAWA,YAAY;AAE5B,UAAMY,OAAOC,SAASlB,MAAKmB,UAAUR,UAAAA,GAAa,MAAM,cAAA;AACxD,SAAKR,OAAOe,SAAS,KAAKC,UAAUF,MAAMZ,aAAae,MAAAA,GAAY,MAAM,cAAA;AAEzEF,aAASG,OAAO,KAAKlB,IAAI,GAAG,MAAM,iBAAiB,KAAKA,IAAI,GAAG;AAG/D,QAAIO,cAAc;AAChB,YAAMY,oBAAoBZ,aAAaa,MAAM,KAAA;AAC7C,WAAKlB,WAAWiB,kBAAkB,CAAA;AAClC,WAAKpB,YAAYoB,kBAAkB,CAAA;IACrC;AAEA,SAAKhB,QAAQA;AAEb,SAAKkB,cAAa;EACpB;;;;EAKA,IAAIZ,OAAO;AACT,UAAMa,QAAkB,CAAA;AACxB,QAAI,KAAKpB,UAAU;AACjBoB,YAAMC,KAAK,GAAG,KAAKrB,QAAQ,IAAI;IACjC;AACA,QAAI,KAAKJ,SAAS;AAChBwB,YAAMC,KAAK,GAAG,KAAKzB,OAAO,EAAE;IAC9B;AACA,QAAI,KAAKC,WAAW;AAClBuB,YAAMC,KAAK,GAAG,KAAKxB,SAAS,EAAE;IAChC;AACAuB,UAAMC,KAAK,KAAKvB,IAAI;AACpB,WAAOsB,MAAME,KAAK,GAAA;EACpB;EAEA,aAAaC,MAAmCnB,MAAoC;AAClF,UAAMoB,aAAapB,KAAKH,QAAQ;MAAEwB,eAAe,UAAUrB,KAAKH,KAAK;IAAG,IAAIc;AAC5E,YAAQ,MAAMW,MAAMC,IAAOvB,KAAKG,MAAM;MAAEqB,SAASJ;IAAW,CAAA,GAAIK;EAClE;EAEA,OAAO3B,OAAO4B,OAAgB;AAC5B,QAAI,OAAOA,UAAU,UAAU;AAC7B,aAAQA,MAAe5B,SAAU4B,QAAiBf;IACpD;EACF;EAEA,OAAeD,UAAUV,MAAc;AACrC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,aAASkB,cAAcC,UAAU,GAAG,MAAM,mBAAmB5B,IAAAA,GAAO;AACpE,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAO5B;IACT;AACA,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAOD,cAAc,CAAA;IACvB;EACF;EAEA,OAAepB,cAAcP,MAAc;AACzC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,aAASkB,cAAcC,UAAU,GAAG,MAAM,4BAA4BD,cAAc,CAAA,CAAE,GAAG;AACzF,UAAME,cAAcF,cAAcC,WAAW,IAAID,cAAcG,MAAK,IAAKnB;AACzE,QAAIkB,aAAa;AACf,YAAME,gBAAgBF,aAAaf,MAAM,GAAA;AACzCL,eAASsB,cAAcH,WAAW,GAAG,MAAM,4BAA4BC,WAAAA,GAAc;AACrFpB,eAASsB,cAAc,CAAA,EAAGH,WAAW,GAAG,MAAM,qCAAqCC,WAAAA,GAAc;AACjG,aAAOE,cAAcD,MAAK;IAC5B;EACF;EAEA,MAAMX,QAAgC;AACpC,WAAO,MAAM5B,MAAK4B,MAAS,IAAI;EACjC;EAEAa,WAAW;AACT,WAAO,KAAK7B;EACd;EAEQO,UAAUF,MAAcyB,aAAsB;AACpD,UAAMC,YAAY1B,KAAKM,MAAM,GAAA;AAG7BL,aAAS,EAAEwB,eAAeC,UAAU,CAAA,EAAGN,WAAW,IAAI,MAAM,4BAAA;AAG5DM,cAAU,CAAA,EAAGN,WAAW,IAAIM,UAAUJ,MAAK,IAAK;AAGhD,UAAMpC,OAAOe,SAASyB,UAAUC,IAAG,GAAI,MAAM,mBAAA;AAG7C,SAAK1C,YAAYyC,UAAUJ,MAAK,KAAM;AAGtC,SAAKtC,UAAU0C,UAAUC,IAAG;AAG5B1B,aAASyB,UAAUN,WAAW,GAAG,MAAM,qBAAA;AAEvC,WAAOlC;EACT;EAEQqB,gBAAgB;AAEtBN,aAAS,KAAKhB,WAAWmC,WAAW,GAAG,MAAM,0BAAA;AAG7CnB,aAAS,KAAKjB,SAASoC,WAAW,GAAG,MAAM,wBAAA;AAG3CnB,aAAS,EAAE,KAAKjB,WAAW,CAAC,KAAKC,YAAY,MAAM,mDAAA;EACrD;AACF;","names":["assertEx","axios","isHash","AddressValue","Huri","archive","archivist","hash","originalHref","protocol","token","isHuri","constructor","huri","archivistUri","huriString","href","ArrayBuffer","AddressValue","hex","parseProtocol","path","assertEx","parsePath","undefined","isHash","archivistUriParts","split","validateParse","parts","push","join","fetch","AuthHeader","Authorization","axios","get","headers","data","value","protocolSplit","length","rawProtocol","shift","protocolParts","toString","hasProtocol","pathParts","pop"]}
|
package/dist/node/index.cjs
CHANGED
|
@@ -1,2 +1,138 @@
|
|
|
1
|
-
"use strict";
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
7
|
+
var __export = (target, all) => {
|
|
8
|
+
for (var name in all)
|
|
9
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
10
|
+
};
|
|
11
|
+
var __copyProps = (to, from, except, desc) => {
|
|
12
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
13
|
+
for (let key of __getOwnPropNames(from))
|
|
14
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
15
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
16
|
+
}
|
|
17
|
+
return to;
|
|
18
|
+
};
|
|
19
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
20
|
+
|
|
21
|
+
// src/index.ts
|
|
22
|
+
var src_exports = {};
|
|
23
|
+
__export(src_exports, {
|
|
24
|
+
Huri: () => Huri
|
|
25
|
+
});
|
|
26
|
+
module.exports = __toCommonJS(src_exports);
|
|
27
|
+
|
|
28
|
+
// src/Huri.ts
|
|
29
|
+
var import_assert = require("@xylabs/assert");
|
|
30
|
+
var import_axios = require("@xylabs/axios");
|
|
31
|
+
var import_hex = require("@xylabs/hex");
|
|
32
|
+
var import_account = require("@xyo-network/account");
|
|
33
|
+
var _Huri = class _Huri {
|
|
34
|
+
archive;
|
|
35
|
+
archivist;
|
|
36
|
+
hash;
|
|
37
|
+
originalHref;
|
|
38
|
+
protocol;
|
|
39
|
+
token;
|
|
40
|
+
isHuri = true;
|
|
41
|
+
constructor(huri, { archivistUri, token } = {}) {
|
|
42
|
+
var _a;
|
|
43
|
+
const huriString = ((_a = _Huri.isHuri(huri)) == null ? void 0 : _a.href) ?? (typeof huri === "string" ? huri : huri instanceof ArrayBuffer ? new import_account.AddressValue(huri).hex : huri.href);
|
|
44
|
+
this.originalHref = huriString;
|
|
45
|
+
const protocol = _Huri.parseProtocol(huriString);
|
|
46
|
+
this.protocol = protocol ?? "https";
|
|
47
|
+
const path = (0, import_assert.assertEx)(_Huri.parsePath(huriString), () => "Missing path");
|
|
48
|
+
this.hash = (0, import_assert.assertEx)(this.parsePath(path, protocol !== void 0), () => "Missing hash");
|
|
49
|
+
(0, import_assert.assertEx)((0, import_hex.isHash)(this.hash), () => `Invalid hash [${this.hash}]`);
|
|
50
|
+
if (archivistUri) {
|
|
51
|
+
const archivistUriParts = archivistUri.split("://");
|
|
52
|
+
this.protocol = archivistUriParts[0];
|
|
53
|
+
this.archivist = archivistUriParts[1];
|
|
54
|
+
}
|
|
55
|
+
this.token = token;
|
|
56
|
+
this.validateParse();
|
|
57
|
+
}
|
|
58
|
+
/*
|
|
59
|
+
The full href or the hash
|
|
60
|
+
*/
|
|
61
|
+
get href() {
|
|
62
|
+
const parts = [];
|
|
63
|
+
if (this.protocol) {
|
|
64
|
+
parts.push(`${this.protocol}:/`);
|
|
65
|
+
}
|
|
66
|
+
if (this.archive) {
|
|
67
|
+
parts.push(`${this.archive}`);
|
|
68
|
+
}
|
|
69
|
+
if (this.archivist) {
|
|
70
|
+
parts.push(`${this.archivist}`);
|
|
71
|
+
}
|
|
72
|
+
parts.push(this.hash);
|
|
73
|
+
return parts.join("/");
|
|
74
|
+
}
|
|
75
|
+
static async fetch(huri) {
|
|
76
|
+
const AuthHeader = huri.token ? {
|
|
77
|
+
Authorization: `Bearer ${huri.token}`
|
|
78
|
+
} : void 0;
|
|
79
|
+
return (await import_axios.axios.get(huri.href, {
|
|
80
|
+
headers: AuthHeader
|
|
81
|
+
})).data;
|
|
82
|
+
}
|
|
83
|
+
static isHuri(value) {
|
|
84
|
+
if (typeof value === "object") {
|
|
85
|
+
return value.isHuri ? value : void 0;
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
static parsePath(huri) {
|
|
89
|
+
const protocolSplit = huri.split("//");
|
|
90
|
+
(0, import_assert.assertEx)(protocolSplit.length <= 2, () => `Invalid format [${huri}]`);
|
|
91
|
+
if (protocolSplit.length === 1) {
|
|
92
|
+
return huri;
|
|
93
|
+
}
|
|
94
|
+
if (protocolSplit.length === 2) {
|
|
95
|
+
return protocolSplit[1];
|
|
96
|
+
}
|
|
97
|
+
}
|
|
98
|
+
static parseProtocol(huri) {
|
|
99
|
+
const protocolSplit = huri.split("//");
|
|
100
|
+
(0, import_assert.assertEx)(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`);
|
|
101
|
+
const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : void 0;
|
|
102
|
+
if (rawProtocol) {
|
|
103
|
+
const protocolParts = rawProtocol == null ? void 0 : rawProtocol.split(":");
|
|
104
|
+
(0, import_assert.assertEx)(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`);
|
|
105
|
+
(0, import_assert.assertEx)(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`);
|
|
106
|
+
return protocolParts.shift();
|
|
107
|
+
}
|
|
108
|
+
}
|
|
109
|
+
async fetch() {
|
|
110
|
+
return await _Huri.fetch(this);
|
|
111
|
+
}
|
|
112
|
+
toString() {
|
|
113
|
+
return this.href;
|
|
114
|
+
}
|
|
115
|
+
parsePath(path, hasProtocol) {
|
|
116
|
+
const pathParts = path.split("/");
|
|
117
|
+
(0, import_assert.assertEx)(!(hasProtocol && pathParts[0].length === 0), () => "Invalid protocol separator");
|
|
118
|
+
pathParts[0].length === 0 ? pathParts.shift() : null;
|
|
119
|
+
const hash = (0, import_assert.assertEx)(pathParts.pop(), () => "No hash specified");
|
|
120
|
+
this.archivist = pathParts.shift() ?? "api.archivist.xyo.network";
|
|
121
|
+
this.archive = pathParts.pop();
|
|
122
|
+
(0, import_assert.assertEx)(pathParts.length === 0, () => "Too many path parts");
|
|
123
|
+
return hash;
|
|
124
|
+
}
|
|
125
|
+
validateParse() {
|
|
126
|
+
var _a, _b;
|
|
127
|
+
(0, import_assert.assertEx)(((_a = this.archivist) == null ? void 0 : _a.length) !== 0, () => "Invalid archivist length");
|
|
128
|
+
(0, import_assert.assertEx)(((_b = this.archive) == null ? void 0 : _b.length) !== 0, () => "Invalid archive length");
|
|
129
|
+
(0, import_assert.assertEx)(!(this.archive && !this.archivist), () => "If specifying archive, archivist is also required");
|
|
130
|
+
}
|
|
131
|
+
};
|
|
132
|
+
__name(_Huri, "Huri");
|
|
133
|
+
var Huri = _Huri;
|
|
134
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
135
|
+
0 && (module.exports = {
|
|
136
|
+
Huri
|
|
137
|
+
});
|
|
2
138
|
//# sourceMappingURL=index.cjs.map
|
package/dist/node/index.cjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/index.ts","../../src/Huri.ts"],"sourcesContent":["export * from './Huri'\n","import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/index.ts","../../src/Huri.ts"],"sourcesContent":["export * from './Huri'\n","import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;;;;;;;ACAA,oBAAyB;AACzB,mBAAsB;AACtB,iBAAsC;AACtC,qBAA6B;AA2BtB,IAAMA,QAAN,MAAMA,MAAAA;EACXC;EACAC;EACAC;EACAC;EACAC;EACAC;EAEQC,SAAS;EAEjBC,YAAYC,MAA4B,EAAEC,cAAcJ,MAAK,IAAkB,CAAC,GAAG;AAxCrF;AAyCI,UAAMK,eACJX,WAAKO,OAAOE,IAAAA,MAAZT,mBAAmBY,UAClB,OAAOH,SAAS,WAAYA,OAC3BA,gBAAgBI,cAAc,IAAIC,4BAAaL,IAAAA,EAAMM,MACrDN,KAAKG;AACT,SAAKR,eAAeO;AAEpB,UAAMN,WAAWL,MAAKgB,cAAcL,UAAAA;AACpC,SAAKN,WAAWA,YAAY;AAE5B,UAAMY,WAAOC,wBAASlB,MAAKmB,UAAUR,UAAAA,GAAa,MAAM,cAAA;AACxD,SAAKR,WAAOe,wBAAS,KAAKC,UAAUF,MAAMZ,aAAae,MAAAA,GAAY,MAAM,cAAA;AAEzEF,oCAASG,mBAAO,KAAKlB,IAAI,GAAG,MAAM,iBAAiB,KAAKA,IAAI,GAAG;AAG/D,QAAIO,cAAc;AAChB,YAAMY,oBAAoBZ,aAAaa,MAAM,KAAA;AAC7C,WAAKlB,WAAWiB,kBAAkB,CAAA;AAClC,WAAKpB,YAAYoB,kBAAkB,CAAA;IACrC;AAEA,SAAKhB,QAAQA;AAEb,SAAKkB,cAAa;EACpB;;;;EAKA,IAAIZ,OAAO;AACT,UAAMa,QAAkB,CAAA;AACxB,QAAI,KAAKpB,UAAU;AACjBoB,YAAMC,KAAK,GAAG,KAAKrB,QAAQ,IAAI;IACjC;AACA,QAAI,KAAKJ,SAAS;AAChBwB,YAAMC,KAAK,GAAG,KAAKzB,OAAO,EAAE;IAC9B;AACA,QAAI,KAAKC,WAAW;AAClBuB,YAAMC,KAAK,GAAG,KAAKxB,SAAS,EAAE;IAChC;AACAuB,UAAMC,KAAK,KAAKvB,IAAI;AACpB,WAAOsB,MAAME,KAAK,GAAA;EACpB;EAEA,aAAaC,MAAmCnB,MAAoC;AAClF,UAAMoB,aAAapB,KAAKH,QAAQ;MAAEwB,eAAe,UAAUrB,KAAKH,KAAK;IAAG,IAAIc;AAC5E,YAAQ,MAAMW,mBAAMC,IAAOvB,KAAKG,MAAM;MAAEqB,SAASJ;IAAW,CAAA,GAAIK;EAClE;EAEA,OAAO3B,OAAO4B,OAAgB;AAC5B,QAAI,OAAOA,UAAU,UAAU;AAC7B,aAAQA,MAAe5B,SAAU4B,QAAiBf;IACpD;EACF;EAEA,OAAeD,UAAUV,MAAc;AACrC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,gCAASkB,cAAcC,UAAU,GAAG,MAAM,mBAAmB5B,IAAAA,GAAO;AACpE,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAO5B;IACT;AACA,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAOD,cAAc,CAAA;IACvB;EACF;EAEA,OAAepB,cAAcP,MAAc;AACzC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,gCAASkB,cAAcC,UAAU,GAAG,MAAM,4BAA4BD,cAAc,CAAA,CAAE,GAAG;AACzF,UAAME,cAAcF,cAAcC,WAAW,IAAID,cAAcG,MAAK,IAAKnB;AACzE,QAAIkB,aAAa;AACf,YAAME,gBAAgBF,2CAAaf,MAAM;AACzCL,kCAASsB,cAAcH,WAAW,GAAG,MAAM,4BAA4BC,WAAAA,GAAc;AACrFpB,kCAASsB,cAAc,CAAA,EAAGH,WAAW,GAAG,MAAM,qCAAqCC,WAAAA,GAAc;AACjG,aAAOE,cAAcD,MAAK;IAC5B;EACF;EAEA,MAAMX,QAAgC;AACpC,WAAO,MAAM5B,MAAK4B,MAAS,IAAI;EACjC;EAEAa,WAAW;AACT,WAAO,KAAK7B;EACd;EAEQO,UAAUF,MAAcyB,aAAsB;AACpD,UAAMC,YAAY1B,KAAKM,MAAM,GAAA;AAG7BL,gCAAS,EAAEwB,eAAeC,UAAU,CAAA,EAAGN,WAAW,IAAI,MAAM,4BAAA;AAG5DM,cAAU,CAAA,EAAGN,WAAW,IAAIM,UAAUJ,MAAK,IAAK;AAGhD,UAAMpC,WAAOe,wBAASyB,UAAUC,IAAG,GAAI,MAAM,mBAAA;AAG7C,SAAK1C,YAAYyC,UAAUJ,MAAK,KAAM;AAGtC,SAAKtC,UAAU0C,UAAUC,IAAG;AAG5B1B,gCAASyB,UAAUN,WAAW,GAAG,MAAM,qBAAA;AAEvC,WAAOlC;EACT;EAEQqB,gBAAgB;AAxJ1B;AA0JIN,kCAAS,UAAKhB,cAAL,mBAAgBmC,YAAW,GAAG,MAAM,0BAAA;AAG7CnB,kCAAS,UAAKjB,YAAL,mBAAcoC,YAAW,GAAG,MAAM,wBAAA;AAG3CnB,gCAAS,EAAE,KAAKjB,WAAW,CAAC,KAAKC,YAAY,MAAM,mDAAA;EACrD;AACF;AApIaF;AAAN,IAAMA,OAAN;","names":["Huri","archive","archivist","hash","originalHref","protocol","token","isHuri","constructor","huri","archivistUri","huriString","href","ArrayBuffer","AddressValue","hex","parseProtocol","path","assertEx","parsePath","undefined","isHash","archivistUriParts","split","validateParse","parts","push","join","fetch","AuthHeader","Authorization","axios","get","headers","data","value","protocolSplit","length","rawProtocol","shift","protocolParts","toString","hasProtocol","pathParts","pop"]}
|
package/dist/node/index.js
CHANGED
|
@@ -1,2 +1,113 @@
|
|
|
1
|
-
var
|
|
1
|
+
var __defProp = Object.defineProperty;
|
|
2
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
3
|
+
|
|
4
|
+
// src/Huri.ts
|
|
5
|
+
import { assertEx } from "@xylabs/assert";
|
|
6
|
+
import { axios } from "@xylabs/axios";
|
|
7
|
+
import { isHash } from "@xylabs/hex";
|
|
8
|
+
import { AddressValue } from "@xyo-network/account";
|
|
9
|
+
var _Huri = class _Huri {
|
|
10
|
+
archive;
|
|
11
|
+
archivist;
|
|
12
|
+
hash;
|
|
13
|
+
originalHref;
|
|
14
|
+
protocol;
|
|
15
|
+
token;
|
|
16
|
+
isHuri = true;
|
|
17
|
+
constructor(huri, { archivistUri, token } = {}) {
|
|
18
|
+
var _a;
|
|
19
|
+
const huriString = ((_a = _Huri.isHuri(huri)) == null ? void 0 : _a.href) ?? (typeof huri === "string" ? huri : huri instanceof ArrayBuffer ? new AddressValue(huri).hex : huri.href);
|
|
20
|
+
this.originalHref = huriString;
|
|
21
|
+
const protocol = _Huri.parseProtocol(huriString);
|
|
22
|
+
this.protocol = protocol ?? "https";
|
|
23
|
+
const path = assertEx(_Huri.parsePath(huriString), () => "Missing path");
|
|
24
|
+
this.hash = assertEx(this.parsePath(path, protocol !== void 0), () => "Missing hash");
|
|
25
|
+
assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`);
|
|
26
|
+
if (archivistUri) {
|
|
27
|
+
const archivistUriParts = archivistUri.split("://");
|
|
28
|
+
this.protocol = archivistUriParts[0];
|
|
29
|
+
this.archivist = archivistUriParts[1];
|
|
30
|
+
}
|
|
31
|
+
this.token = token;
|
|
32
|
+
this.validateParse();
|
|
33
|
+
}
|
|
34
|
+
/*
|
|
35
|
+
The full href or the hash
|
|
36
|
+
*/
|
|
37
|
+
get href() {
|
|
38
|
+
const parts = [];
|
|
39
|
+
if (this.protocol) {
|
|
40
|
+
parts.push(`${this.protocol}:/`);
|
|
41
|
+
}
|
|
42
|
+
if (this.archive) {
|
|
43
|
+
parts.push(`${this.archive}`);
|
|
44
|
+
}
|
|
45
|
+
if (this.archivist) {
|
|
46
|
+
parts.push(`${this.archivist}`);
|
|
47
|
+
}
|
|
48
|
+
parts.push(this.hash);
|
|
49
|
+
return parts.join("/");
|
|
50
|
+
}
|
|
51
|
+
static async fetch(huri) {
|
|
52
|
+
const AuthHeader = huri.token ? {
|
|
53
|
+
Authorization: `Bearer ${huri.token}`
|
|
54
|
+
} : void 0;
|
|
55
|
+
return (await axios.get(huri.href, {
|
|
56
|
+
headers: AuthHeader
|
|
57
|
+
})).data;
|
|
58
|
+
}
|
|
59
|
+
static isHuri(value) {
|
|
60
|
+
if (typeof value === "object") {
|
|
61
|
+
return value.isHuri ? value : void 0;
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
static parsePath(huri) {
|
|
65
|
+
const protocolSplit = huri.split("//");
|
|
66
|
+
assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`);
|
|
67
|
+
if (protocolSplit.length === 1) {
|
|
68
|
+
return huri;
|
|
69
|
+
}
|
|
70
|
+
if (protocolSplit.length === 2) {
|
|
71
|
+
return protocolSplit[1];
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
static parseProtocol(huri) {
|
|
75
|
+
const protocolSplit = huri.split("//");
|
|
76
|
+
assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`);
|
|
77
|
+
const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : void 0;
|
|
78
|
+
if (rawProtocol) {
|
|
79
|
+
const protocolParts = rawProtocol == null ? void 0 : rawProtocol.split(":");
|
|
80
|
+
assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`);
|
|
81
|
+
assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`);
|
|
82
|
+
return protocolParts.shift();
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
async fetch() {
|
|
86
|
+
return await _Huri.fetch(this);
|
|
87
|
+
}
|
|
88
|
+
toString() {
|
|
89
|
+
return this.href;
|
|
90
|
+
}
|
|
91
|
+
parsePath(path, hasProtocol) {
|
|
92
|
+
const pathParts = path.split("/");
|
|
93
|
+
assertEx(!(hasProtocol && pathParts[0].length === 0), () => "Invalid protocol separator");
|
|
94
|
+
pathParts[0].length === 0 ? pathParts.shift() : null;
|
|
95
|
+
const hash = assertEx(pathParts.pop(), () => "No hash specified");
|
|
96
|
+
this.archivist = pathParts.shift() ?? "api.archivist.xyo.network";
|
|
97
|
+
this.archive = pathParts.pop();
|
|
98
|
+
assertEx(pathParts.length === 0, () => "Too many path parts");
|
|
99
|
+
return hash;
|
|
100
|
+
}
|
|
101
|
+
validateParse() {
|
|
102
|
+
var _a, _b;
|
|
103
|
+
assertEx(((_a = this.archivist) == null ? void 0 : _a.length) !== 0, () => "Invalid archivist length");
|
|
104
|
+
assertEx(((_b = this.archive) == null ? void 0 : _b.length) !== 0, () => "Invalid archive length");
|
|
105
|
+
assertEx(!(this.archive && !this.archivist), () => "If specifying archive, archivist is also required");
|
|
106
|
+
}
|
|
107
|
+
};
|
|
108
|
+
__name(_Huri, "Huri");
|
|
109
|
+
var Huri = _Huri;
|
|
110
|
+
export {
|
|
111
|
+
Huri
|
|
112
|
+
};
|
|
2
113
|
//# sourceMappingURL=index.js.map
|
package/dist/node/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/Huri.ts"],"sourcesContent":["import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/Huri.ts"],"sourcesContent":["import { assertEx } from '@xylabs/assert'\nimport { axios } from '@xylabs/axios'\nimport { Address, Hash, isHash } from '@xylabs/hex'\nimport { AddressValue } from '@xyo-network/account'\nimport { Payload } from '@xyo-network/payload-model'\n\nexport type ObjectCategory = 'block' | 'payload'\n\nexport type HuriFetchFunction = (huri: Huri) => Promise<Payload | undefined>\n\n/* \n Valid Huri:\n\n [<protocol>://][<archivist>/[<archive>/]]<hash>\n\n defaults:\n protocol: https\n archivist: api.archivist.xyo.network\n*/\n\nexport interface HuriOptions {\n archivistUri?: string\n token?: string\n}\n\nexport interface FetchedPayload<T extends Payload = Payload> {\n huri?: Huri\n payload: T\n}\n\nexport class Huri<T extends Payload = Payload> {\n archive?: string\n archivist?: Address | string\n hash: Hash\n originalHref: string\n protocol?: string\n token?: string\n\n private isHuri = true\n\n constructor(huri: Hash | Huri | string, { archivistUri, token }: HuriOptions = {}) {\n const huriString =\n Huri.isHuri(huri)?.href ??\n (typeof huri === 'string' ? (huri as string)\n : huri instanceof ArrayBuffer ? new AddressValue(huri).hex\n : huri.href)\n this.originalHref = huriString\n\n const protocol = Huri.parseProtocol(huriString)\n this.protocol = protocol ?? 'https'\n\n const path = assertEx(Huri.parsePath(huriString), () => 'Missing path')\n this.hash = assertEx(this.parsePath(path, protocol !== undefined), () => 'Missing hash') as Hash\n\n assertEx(isHash(this.hash), () => `Invalid hash [${this.hash}]`)\n\n //if archivistUri sent, overwrite protocol and archivist\n if (archivistUri) {\n const archivistUriParts = archivistUri.split('://')\n this.protocol = archivistUriParts[0]\n this.archivist = archivistUriParts[1]\n }\n\n this.token = token\n\n this.validateParse()\n }\n\n /*\n The full href or the hash\n */\n get href() {\n const parts: string[] = []\n if (this.protocol) {\n parts.push(`${this.protocol}:/`)\n }\n if (this.archive) {\n parts.push(`${this.archive}`)\n }\n if (this.archivist) {\n parts.push(`${this.archivist}`)\n }\n parts.push(this.hash)\n return parts.join('/')\n }\n\n static async fetch<T extends Payload = Payload>(huri: Huri): Promise<T | undefined> {\n const AuthHeader = huri.token ? { Authorization: `Bearer ${huri.token}` } : undefined\n return (await axios.get<T>(huri.href, { headers: AuthHeader })).data\n }\n\n static isHuri(value: unknown) {\n if (typeof value === 'object') {\n return (value as Huri).isHuri ? (value as Huri) : undefined\n }\n }\n\n private static parsePath(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid format [${huri}]`)\n if (protocolSplit.length === 1) {\n return huri\n }\n if (protocolSplit.length === 2) {\n return protocolSplit[1]\n }\n }\n\n private static parseProtocol(huri: string) {\n const protocolSplit = huri.split('//')\n assertEx(protocolSplit.length <= 2, () => `Invalid second protocol [${protocolSplit[2]}]`)\n const rawProtocol = protocolSplit.length === 2 ? protocolSplit.shift() : undefined\n if (rawProtocol) {\n const protocolParts = rawProtocol?.split(':')\n assertEx(protocolParts.length === 2, () => `Invalid protocol format [${rawProtocol}]`)\n assertEx(protocolParts[1].length === 0, () => `Invalid protocol format (post :) [${rawProtocol}]`)\n return protocolParts.shift()\n }\n }\n\n async fetch(): Promise<T | undefined> {\n return await Huri.fetch<T>(this)\n }\n\n toString() {\n return this.href\n }\n\n private parsePath(path: string, hasProtocol: boolean) {\n const pathParts = path.split('/')\n\n //if the protocol was found, then there is not allowed to be a leading /\n assertEx(!(hasProtocol && pathParts[0].length === 0), () => 'Invalid protocol separator')\n\n //remove leading '/' if needed\n pathParts[0].length === 0 ? pathParts.shift() : null\n\n //hash is assumed to be the last part\n const hash = assertEx(pathParts.pop(), () => 'No hash specified')\n\n //archivist is assumed to be the first part\n this.archivist = pathParts.shift() ?? 'api.archivist.xyo.network'\n\n //the archive is whatever is left\n this.archive = pathParts.pop()\n\n //after we pull off all the path parts, there should be nothing left\n assertEx(pathParts.length === 0, () => 'Too many path parts')\n\n return hash\n }\n\n private validateParse() {\n //the archivist should not be zero length\n assertEx(this.archivist?.length !== 0, () => 'Invalid archivist length')\n\n //the archivist should not be zero length (can be undefined)\n assertEx(this.archive?.length !== 0, () => 'Invalid archive length')\n\n //the archive should not be set if the archivist is not set\n assertEx(!(this.archive && !this.archivist), () => 'If specifying archive, archivist is also required')\n }\n}\n"],"mappings":";;;;AAAA,SAASA,gBAAgB;AACzB,SAASC,aAAa;AACtB,SAAwBC,cAAc;AACtC,SAASC,oBAAoB;AA2BtB,IAAMC,QAAN,MAAMA,MAAAA;EACXC;EACAC;EACAC;EACAC;EACAC;EACAC;EAEQC,SAAS;EAEjBC,YAAYC,MAA4B,EAAEC,cAAcJ,MAAK,IAAkB,CAAC,GAAG;AAxCrF;AAyCI,UAAMK,eACJX,WAAKO,OAAOE,IAAAA,MAAZT,mBAAmBY,UAClB,OAAOH,SAAS,WAAYA,OAC3BA,gBAAgBI,cAAc,IAAIC,aAAaL,IAAAA,EAAMM,MACrDN,KAAKG;AACT,SAAKR,eAAeO;AAEpB,UAAMN,WAAWL,MAAKgB,cAAcL,UAAAA;AACpC,SAAKN,WAAWA,YAAY;AAE5B,UAAMY,OAAOC,SAASlB,MAAKmB,UAAUR,UAAAA,GAAa,MAAM,cAAA;AACxD,SAAKR,OAAOe,SAAS,KAAKC,UAAUF,MAAMZ,aAAae,MAAAA,GAAY,MAAM,cAAA;AAEzEF,aAASG,OAAO,KAAKlB,IAAI,GAAG,MAAM,iBAAiB,KAAKA,IAAI,GAAG;AAG/D,QAAIO,cAAc;AAChB,YAAMY,oBAAoBZ,aAAaa,MAAM,KAAA;AAC7C,WAAKlB,WAAWiB,kBAAkB,CAAA;AAClC,WAAKpB,YAAYoB,kBAAkB,CAAA;IACrC;AAEA,SAAKhB,QAAQA;AAEb,SAAKkB,cAAa;EACpB;;;;EAKA,IAAIZ,OAAO;AACT,UAAMa,QAAkB,CAAA;AACxB,QAAI,KAAKpB,UAAU;AACjBoB,YAAMC,KAAK,GAAG,KAAKrB,QAAQ,IAAI;IACjC;AACA,QAAI,KAAKJ,SAAS;AAChBwB,YAAMC,KAAK,GAAG,KAAKzB,OAAO,EAAE;IAC9B;AACA,QAAI,KAAKC,WAAW;AAClBuB,YAAMC,KAAK,GAAG,KAAKxB,SAAS,EAAE;IAChC;AACAuB,UAAMC,KAAK,KAAKvB,IAAI;AACpB,WAAOsB,MAAME,KAAK,GAAA;EACpB;EAEA,aAAaC,MAAmCnB,MAAoC;AAClF,UAAMoB,aAAapB,KAAKH,QAAQ;MAAEwB,eAAe,UAAUrB,KAAKH,KAAK;IAAG,IAAIc;AAC5E,YAAQ,MAAMW,MAAMC,IAAOvB,KAAKG,MAAM;MAAEqB,SAASJ;IAAW,CAAA,GAAIK;EAClE;EAEA,OAAO3B,OAAO4B,OAAgB;AAC5B,QAAI,OAAOA,UAAU,UAAU;AAC7B,aAAQA,MAAe5B,SAAU4B,QAAiBf;IACpD;EACF;EAEA,OAAeD,UAAUV,MAAc;AACrC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,aAASkB,cAAcC,UAAU,GAAG,MAAM,mBAAmB5B,IAAAA,GAAO;AACpE,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAO5B;IACT;AACA,QAAI2B,cAAcC,WAAW,GAAG;AAC9B,aAAOD,cAAc,CAAA;IACvB;EACF;EAEA,OAAepB,cAAcP,MAAc;AACzC,UAAM2B,gBAAgB3B,KAAKc,MAAM,IAAA;AACjCL,aAASkB,cAAcC,UAAU,GAAG,MAAM,4BAA4BD,cAAc,CAAA,CAAE,GAAG;AACzF,UAAME,cAAcF,cAAcC,WAAW,IAAID,cAAcG,MAAK,IAAKnB;AACzE,QAAIkB,aAAa;AACf,YAAME,gBAAgBF,2CAAaf,MAAM;AACzCL,eAASsB,cAAcH,WAAW,GAAG,MAAM,4BAA4BC,WAAAA,GAAc;AACrFpB,eAASsB,cAAc,CAAA,EAAGH,WAAW,GAAG,MAAM,qCAAqCC,WAAAA,GAAc;AACjG,aAAOE,cAAcD,MAAK;IAC5B;EACF;EAEA,MAAMX,QAAgC;AACpC,WAAO,MAAM5B,MAAK4B,MAAS,IAAI;EACjC;EAEAa,WAAW;AACT,WAAO,KAAK7B;EACd;EAEQO,UAAUF,MAAcyB,aAAsB;AACpD,UAAMC,YAAY1B,KAAKM,MAAM,GAAA;AAG7BL,aAAS,EAAEwB,eAAeC,UAAU,CAAA,EAAGN,WAAW,IAAI,MAAM,4BAAA;AAG5DM,cAAU,CAAA,EAAGN,WAAW,IAAIM,UAAUJ,MAAK,IAAK;AAGhD,UAAMpC,OAAOe,SAASyB,UAAUC,IAAG,GAAI,MAAM,mBAAA;AAG7C,SAAK1C,YAAYyC,UAAUJ,MAAK,KAAM;AAGtC,SAAKtC,UAAU0C,UAAUC,IAAG;AAG5B1B,aAASyB,UAAUN,WAAW,GAAG,MAAM,qBAAA;AAEvC,WAAOlC;EACT;EAEQqB,gBAAgB;AAxJ1B;AA0JIN,eAAS,UAAKhB,cAAL,mBAAgBmC,YAAW,GAAG,MAAM,0BAAA;AAG7CnB,eAAS,UAAKjB,YAAL,mBAAcoC,YAAW,GAAG,MAAM,wBAAA;AAG3CnB,aAAS,EAAE,KAAKjB,WAAW,CAAC,KAAKC,YAAY,MAAM,mDAAA;EACrD;AACF;AApIaF;AAAN,IAAMA,OAAN;","names":["assertEx","axios","isHash","AddressValue","Huri","archive","archivist","hash","originalHref","protocol","token","isHuri","constructor","huri","archivistUri","huriString","href","ArrayBuffer","AddressValue","hex","parseProtocol","path","assertEx","parsePath","undefined","isHash","archivistUriParts","split","validateParse","parts","push","join","fetch","AuthHeader","Authorization","axios","get","headers","data","value","protocolSplit","length","rawProtocol","shift","protocolParts","toString","hasProtocol","pathParts","pop"]}
|
package/package.json
CHANGED
|
@@ -13,13 +13,13 @@
|
|
|
13
13
|
"@xylabs/assert": "^3.5.1",
|
|
14
14
|
"@xylabs/axios": "^3.5.1",
|
|
15
15
|
"@xylabs/hex": "^3.5.1",
|
|
16
|
-
"@xyo-network/account": "~2.107.
|
|
17
|
-
"@xyo-network/payload-model": "~2.107.
|
|
16
|
+
"@xyo-network/account": "~2.107.4",
|
|
17
|
+
"@xyo-network/payload-model": "~2.107.4"
|
|
18
18
|
},
|
|
19
19
|
"devDependencies": {
|
|
20
20
|
"@xylabs/delay": "^3.5.1",
|
|
21
|
-
"@xylabs/ts-scripts-yarn3": "^3.11.
|
|
22
|
-
"@xylabs/tsconfig": "^3.11.
|
|
21
|
+
"@xylabs/ts-scripts-yarn3": "^3.11.10",
|
|
22
|
+
"@xylabs/tsconfig": "^3.11.10",
|
|
23
23
|
"typescript": "^5.5.2"
|
|
24
24
|
},
|
|
25
25
|
"description": "Primary SDK for using XYO Protocol 2.0",
|
|
@@ -61,6 +61,6 @@
|
|
|
61
61
|
},
|
|
62
62
|
"sideEffects": false,
|
|
63
63
|
"types": "dist/node/index.d.ts",
|
|
64
|
-
"version": "2.107.
|
|
64
|
+
"version": "2.107.4",
|
|
65
65
|
"type": "module"
|
|
66
66
|
}
|