@xyo-network/url-plugin 2.97.0-rc.1 → 2.97.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/PluginBrowser.d.cts +8 -8
- package/dist/browser/PluginBrowser.d.mts +8 -8
- package/dist/browser/PluginBrowser.d.ts +8 -8
- package/dist/browser/PluginNode.d.cts +8 -8
- package/dist/browser/PluginNode.d.mts +8 -8
- package/dist/browser/PluginNode.d.ts +8 -8
- package/dist/browser/indexBrowser.cjs +1 -75
- package/dist/browser/indexBrowser.cjs.map +1 -1
- package/dist/browser/indexBrowser.js +1 -52
- package/dist/browser/indexBrowser.js.map +1 -1
- package/dist/browser/util/hashFile.d.cts.map +1 -1
- package/dist/browser/util/hashFile.d.mts.map +1 -1
- package/dist/browser/util/hashFile.d.ts.map +1 -1
- package/dist/browser/util/hashHttpUrl.d.cts.map +1 -1
- package/dist/browser/util/hashHttpUrl.d.mts.map +1 -1
- package/dist/browser/util/hashHttpUrl.d.ts.map +1 -1
- package/dist/browser/util/hashUrl.d.cts.map +1 -1
- package/dist/browser/util/hashUrl.d.mts.map +1 -1
- package/dist/browser/util/hashUrl.d.ts.map +1 -1
- package/dist/neutral/PluginBrowser.d.cts +8 -8
- package/dist/neutral/PluginBrowser.d.mts +8 -8
- package/dist/neutral/PluginBrowser.d.ts +8 -8
- package/dist/neutral/PluginNode.d.cts +8 -8
- package/dist/neutral/PluginNode.d.mts +8 -8
- package/dist/neutral/PluginNode.d.ts +8 -8
- package/dist/neutral/indexNode.cjs +1 -147
- package/dist/neutral/indexNode.cjs.map +1 -1
- package/dist/neutral/indexNode.js +1 -114
- package/dist/neutral/indexNode.js.map +1 -1
- package/dist/neutral/util/hashFile.d.cts.map +1 -1
- package/dist/neutral/util/hashFile.d.mts.map +1 -1
- package/dist/neutral/util/hashFile.d.ts.map +1 -1
- package/dist/neutral/util/hashHttpUrl.d.cts.map +1 -1
- package/dist/neutral/util/hashHttpUrl.d.mts.map +1 -1
- package/dist/neutral/util/hashHttpUrl.d.ts.map +1 -1
- package/dist/neutral/util/hashUrl.d.cts.map +1 -1
- package/dist/neutral/util/hashUrl.d.mts.map +1 -1
- package/dist/neutral/util/hashUrl.d.ts.map +1 -1
- package/dist/node/PluginBrowser.d.cts +8 -8
- package/dist/node/PluginBrowser.d.mts +8 -8
- package/dist/node/PluginBrowser.d.ts +8 -8
- package/dist/node/PluginNode.d.cts +8 -8
- package/dist/node/PluginNode.d.mts +8 -8
- package/dist/node/PluginNode.d.ts +8 -8
- package/dist/node/indexNode.cjs +1 -156
- package/dist/node/indexNode.cjs.map +1 -1
- package/dist/node/indexNode.js +1 -117
- package/dist/node/indexNode.js.map +1 -1
- package/dist/node/util/hashFile.d.cts.map +1 -1
- package/dist/node/util/hashFile.d.mts.map +1 -1
- package/dist/node/util/hashFile.d.ts.map +1 -1
- package/dist/node/util/hashHttpUrl.d.cts.map +1 -1
- package/dist/node/util/hashHttpUrl.d.mts.map +1 -1
- package/dist/node/util/hashHttpUrl.d.ts.map +1 -1
- package/dist/node/util/hashUrl.d.cts.map +1 -1
- package/dist/node/util/hashUrl.d.mts.map +1 -1
- package/dist/node/util/hashUrl.d.ts.map +1 -1
- package/package.json +11 -12
|
@@ -1,148 +1,2 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __create = Object.create;
|
|
3
|
-
var __defProp = Object.defineProperty;
|
|
4
|
-
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
-
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
-
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
-
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
-
var __export = (target, all) => {
|
|
9
|
-
for (var name in all)
|
|
10
|
-
__defProp(target, name, { get: all[name], enumerable: true });
|
|
11
|
-
};
|
|
12
|
-
var __copyProps = (to, from, except, desc) => {
|
|
13
|
-
if (from && typeof from === "object" || typeof from === "function") {
|
|
14
|
-
for (let key of __getOwnPropNames(from))
|
|
15
|
-
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
16
|
-
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
17
|
-
}
|
|
18
|
-
return to;
|
|
19
|
-
};
|
|
20
|
-
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
21
|
-
// If the importer is in node compatibility mode or this is not an ESM
|
|
22
|
-
// file that has been converted to a CommonJS file using a Babel-
|
|
23
|
-
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
24
|
-
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
25
|
-
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
26
|
-
mod
|
|
27
|
-
));
|
|
28
|
-
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
|
-
|
|
30
|
-
// src/indexNode.ts
|
|
31
|
-
var indexNode_exports = {};
|
|
32
|
-
__export(indexNode_exports, {
|
|
33
|
-
UrlPlugin: () => UrlPlugin,
|
|
34
|
-
UrlWitness: () => UrlWitness,
|
|
35
|
-
UrlWitnessConfigSchema: () => UrlWitnessConfigSchema,
|
|
36
|
-
default: () => UrlPlugin
|
|
37
|
-
});
|
|
38
|
-
module.exports = __toCommonJS(indexNode_exports);
|
|
39
|
-
|
|
40
|
-
// src/util/hashFile.ts
|
|
41
|
-
var import_node_fs = require("fs");
|
|
42
|
-
var import_node_url = require("url");
|
|
43
|
-
var import_crypto = require("@xylabs/crypto");
|
|
44
|
-
var hashFile = (url) => {
|
|
45
|
-
const path = url.startsWith("file://") ? (0, import_node_url.fileURLToPath)(url) : url;
|
|
46
|
-
const ret = new Promise((resolve, reject) => {
|
|
47
|
-
const hash = import_crypto.Crypto.createHash("sha256");
|
|
48
|
-
const stream = (0, import_node_fs.createReadStream)(path);
|
|
49
|
-
stream.on("data", (data) => {
|
|
50
|
-
hash.update(data);
|
|
51
|
-
});
|
|
52
|
-
stream.on("end", () => {
|
|
53
|
-
resolve(hash.digest("hex"));
|
|
54
|
-
});
|
|
55
|
-
stream.on("error", (err) => {
|
|
56
|
-
reject(err);
|
|
57
|
-
});
|
|
58
|
-
});
|
|
59
|
-
return ret;
|
|
60
|
-
};
|
|
61
|
-
|
|
62
|
-
// src/util/hashHttpUrl.ts
|
|
63
|
-
var import_node_http = __toESM(require("http"), 1);
|
|
64
|
-
var import_node_https = __toESM(require("https"), 1);
|
|
65
|
-
var import_crypto2 = require("@xylabs/crypto");
|
|
66
|
-
var hashHttpUrl = (url) => {
|
|
67
|
-
const ret = new Promise((resolve, reject) => {
|
|
68
|
-
const hash = import_crypto2.Crypto.createHash("sha256");
|
|
69
|
-
const lib = url.startsWith("https") ? import_node_https.default : import_node_http.default;
|
|
70
|
-
lib.get(url, (res) => {
|
|
71
|
-
res.on("data", (data) => {
|
|
72
|
-
hash.update(data);
|
|
73
|
-
});
|
|
74
|
-
res.on("end", () => {
|
|
75
|
-
resolve(hash.digest("hex"));
|
|
76
|
-
});
|
|
77
|
-
}).on("error", (err) => {
|
|
78
|
-
reject(err);
|
|
79
|
-
});
|
|
80
|
-
});
|
|
81
|
-
return ret;
|
|
82
|
-
};
|
|
83
|
-
|
|
84
|
-
// src/util/hashUrl.ts
|
|
85
|
-
var hashUrl = (url) => {
|
|
86
|
-
const scheme = url.split("://")[0]?.toLowerCase();
|
|
87
|
-
switch (scheme) {
|
|
88
|
-
case "file": {
|
|
89
|
-
return hashFile(url);
|
|
90
|
-
}
|
|
91
|
-
case "http":
|
|
92
|
-
case "https": {
|
|
93
|
-
return hashHttpUrl(url);
|
|
94
|
-
}
|
|
95
|
-
default: {
|
|
96
|
-
throw new Error(`Unsupported URL scheme: ${scheme}`);
|
|
97
|
-
}
|
|
98
|
-
}
|
|
99
|
-
};
|
|
100
|
-
|
|
101
|
-
// src/Witness/Config.ts
|
|
102
|
-
var import_url_payload_plugin = require("@xyo-network/url-payload-plugin");
|
|
103
|
-
var UrlWitnessConfigSchema = `${import_url_payload_plugin.UrlSchema}.witness.config`;
|
|
104
|
-
|
|
105
|
-
// src/Witness/Witness.ts
|
|
106
|
-
var import_assert = require("@xylabs/assert");
|
|
107
|
-
var import_abstract_witness = require("@xyo-network/abstract-witness");
|
|
108
|
-
var import_url_payload_plugin2 = require("@xyo-network/url-payload-plugin");
|
|
109
|
-
var UrlWitness = class _UrlWitness extends import_abstract_witness.AbstractWitness {
|
|
110
|
-
static configSchemas = [...super.configSchemas, UrlWitnessConfigSchema];
|
|
111
|
-
static defaultConfigSchema = UrlWitnessConfigSchema;
|
|
112
|
-
static hashUrl = void 0;
|
|
113
|
-
get urls() {
|
|
114
|
-
return this.config?.urls;
|
|
115
|
-
}
|
|
116
|
-
async observeHandler(payloads = []) {
|
|
117
|
-
if (_UrlWitness.hashUrl === void 0) {
|
|
118
|
-
throw new Error("Set UrlWitness.hashUrl before using");
|
|
119
|
-
}
|
|
120
|
-
const urls = this.urls?.map((url) => ({ schema: import_url_payload_plugin2.UrlSchema, url })) ?? payloads.filter((p) => p.schema === import_url_payload_plugin2.UrlSchema).map((p) => {
|
|
121
|
-
return { schema: import_url_payload_plugin2.UrlSchema, url: p.url };
|
|
122
|
-
});
|
|
123
|
-
const hashed = await Promise.all(
|
|
124
|
-
urls.map(async (url) => {
|
|
125
|
-
return { ...url, hash: await (0, import_assert.assertEx)(_UrlWitness.hashUrl, () => "Set UrlWitness.hashUrl before using")(url.url) };
|
|
126
|
-
})
|
|
127
|
-
);
|
|
128
|
-
return hashed;
|
|
129
|
-
}
|
|
130
|
-
};
|
|
131
|
-
|
|
132
|
-
// src/PluginNode.ts
|
|
133
|
-
var import_payload_model = require("@xyo-network/payload-model");
|
|
134
|
-
var import_payloadset_plugin = require("@xyo-network/payloadset-plugin");
|
|
135
|
-
var import_url_payload_plugin3 = require("@xyo-network/url-payload-plugin");
|
|
136
|
-
var UrlPlugin = () => (0, import_payloadset_plugin.createPayloadSetWitnessPlugin)(
|
|
137
|
-
{ required: { [import_url_payload_plugin3.UrlSchema]: 1 }, schema: import_payload_model.PayloadSetSchema },
|
|
138
|
-
{
|
|
139
|
-
witness: async (params) => {
|
|
140
|
-
const result = await UrlWitness.create(params);
|
|
141
|
-
return result;
|
|
142
|
-
}
|
|
143
|
-
}
|
|
144
|
-
);
|
|
145
|
-
|
|
146
|
-
// src/indexNode.ts
|
|
147
|
-
UrlWitness.hashUrl = hashUrl;
|
|
1
|
+
"use strict";var R=Object.create;var m=Object.defineProperty;var T=Object.getOwnPropertyDescriptor;var F=Object.getOwnPropertyNames;var $=Object.getPrototypeOf,q=Object.prototype.hasOwnProperty;var A=(r,t)=>{for(var s in t)m(r,s,{get:t[s],enumerable:!0})},f=(r,t,s,a)=>{if(t&&typeof t=="object"||typeof t=="function")for(let e of F(t))!q.call(r,e)&&e!==s&&m(r,e,{get:()=>t[e],enumerable:!(a=T(t,e))||a.enumerable});return r};var d=(r,t,s)=>(s=r!=null?R($(r)):{},f(t||!r||!r.__esModule?m(s,"default",{value:r,enumerable:!0}):s,r)),j=r=>f(m({},"__esModule",{value:!0}),r);var k={};A(k,{UrlPlugin:()=>p,UrlWitness:()=>i,UrlWitnessConfigSchema:()=>h,default:()=>p});module.exports=j(k);var U=require("fs"),g=require("url"),u=require("@xylabs/crypto"),P=r=>{let t=r.startsWith("file://")?(0,g.fileURLToPath)(r):r;return new Promise((a,e)=>{let c=u.Crypto.createHash("sha256"),o=(0,U.createReadStream)(t);o.on("data",n=>{c.update(n)}),o.on("end",()=>{a(c.digest("hex"))}),o.on("error",n=>{e(n)})})};var S=d(require("http"),1),W=d(require("https"),1),y=require("@xylabs/crypto"),x=r=>new Promise((s,a)=>{let e=y.Crypto.createHash("sha256");(r.startsWith("https")?W.default:S.default).get(r,o=>{o.on("data",n=>{e.update(n)}),o.on("end",()=>{s(e.digest("hex"))})}).on("error",o=>{a(o)})});var w=r=>{let t=r.split("://")[0]?.toLowerCase();switch(t){case"file":return P(r);case"http":case"https":return x(r);default:throw new Error(`Unsupported URL scheme: ${t}`)}};var C=require("@xyo-network/url-payload-plugin"),h=`${C.UrlSchema}.witness.config`;var b=require("@xylabs/assert"),H=require("@xyo-network/abstract-witness"),l=require("@xyo-network/url-payload-plugin");var i=class r extends H.AbstractWitness{static configSchemas=[...super.configSchemas,h];static defaultConfigSchema=h;static hashUrl=void 0;get urls(){return this.config?.urls}async observeHandler(t=[]){if(r.hashUrl===void 0)throw new Error("Set UrlWitness.hashUrl before using");let s=this.urls?.map(e=>({schema:l.UrlSchema,url:e}))??t.filter(e=>e.schema===l.UrlSchema).map(e=>({schema:l.UrlSchema,url:e.url}));return await Promise.all(s.map(async e=>({...e,hash:await(0,b.assertEx)(r.hashUrl,()=>"Set UrlWitness.hashUrl before using")(e.url)})))}};var v=require("@xyo-network/payload-model"),E=require("@xyo-network/payloadset-plugin"),L=require("@xyo-network/url-payload-plugin");var p=()=>(0,E.createPayloadSetWitnessPlugin)({required:{[L.UrlSchema]:1},schema:v.PayloadSetSchema},{witness:async r=>await i.create(r)});i.hashUrl=w;
|
|
148
2
|
//# sourceMappingURL=indexNode.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/indexNode.ts","../../src/util/hashFile.ts","../../src/util/hashHttpUrl.ts","../../src/util/hashUrl.ts","../../src/Witness/Config.ts","../../src/Witness/Witness.ts","../../src/PluginNode.ts"],"sourcesContent":["import { hashUrl } from './util'\nimport { UrlWitness } from './Witness'\n\nUrlWitness.hashUrl = hashUrl\n\nexport { UrlPlugin as default, UrlPlugin } from './PluginNode'\nexport * from './Witness'\n","import { createReadStream } from 'node:fs'\nimport { fileURLToPath } from 'node:url'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashFile = (url: string): Promise<string> => {\n const path = url.startsWith('file://') ? fileURLToPath(url) : url\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const stream = createReadStream(path)\n stream.on('data', (data) => {\n hash.update(data)\n })\n stream.on('end', () => {\n resolve(hash.digest('hex'))\n })\n stream.on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import http from 'node:http'\nimport https from 'node:https'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashHttpUrl = (url: string): Promise<string> => {\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const lib = url.startsWith('https') ? https : http\n lib\n .get(url, (res) => {\n res.on('data', (data) => {\n hash.update(data)\n })\n res.on('end', () => {\n resolve(hash.digest('hex'))\n })\n })\n .on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import { hashFile } from './hashFile'\nimport { hashHttpUrl } from './hashHttpUrl'\n\nexport const hashUrl = (url: string): Promise<string> => {\n const scheme = url.split('://')[0]?.toLowerCase()\n switch (scheme) {\n case 'file': {\n return hashFile(url)\n }\n case 'http':\n case 'https': {\n return hashHttpUrl(url)\n }\n default: {\n throw new Error(`Unsupported URL scheme: ${scheme}`)\n }\n }\n}\n","import { UrlSchema } from '@xyo-network/url-payload-plugin'\nimport { WitnessConfig } from '@xyo-network/witness-model'\n\nexport const UrlWitnessConfigSchema = `${UrlSchema}.witness.config` as const\nexport type UrlWitnessConfigSchema = typeof UrlWitnessConfigSchema\n\nexport type UrlWitnessConfig = WitnessConfig<{\n schema: UrlWitnessConfigSchema\n urls?: string[]\n}>\n","import { assertEx } from '@xylabs/assert'\nimport { AbstractWitness } from '@xyo-network/abstract-witness'\nimport { Payload, Schema } from '@xyo-network/payload-model'\nimport { UrlPayload, UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitnessConfigSchema } from './Config'\nimport { UrlWitnessParams } from './Params'\n\nexport class UrlWitness<TParams extends UrlWitnessParams = UrlWitnessParams> extends AbstractWitness<TParams> {\n static override readonly configSchemas: Schema[] = [...super.configSchemas, UrlWitnessConfigSchema]\n static override readonly defaultConfigSchema: Schema = UrlWitnessConfigSchema\n static hashUrl: ((url: string) => Promise<string>) | undefined = undefined\n\n get urls() {\n return this.config?.urls\n }\n\n protected override async observeHandler(payloads: Payload[] = []): Promise<Payload[]> {\n if (UrlWitness.hashUrl === undefined) {\n throw new Error('Set UrlWitness.hashUrl before using')\n }\n const urls: UrlPayload[] =\n this.urls?.map((url) => ({ schema: UrlSchema, url })) ??\n payloads\n .filter((p): p is UrlPayload => p.schema === UrlSchema)\n .map((p) => {\n return { schema: UrlSchema, url: p.url }\n })\n const hashed = await Promise.all(\n urls.map(async (url) => {\n // TODO: Different schema for hashed url\n return { ...url, hash: await assertEx(UrlWitness.hashUrl, () => 'Set UrlWitness.hashUrl before using')(url.url) }\n }),\n )\n // TODO: Handle partial success\n return hashed\n }\n}\n","import { PayloadSetSchema } from '@xyo-network/payload-model'\nimport { createPayloadSetWitnessPlugin } from '@xyo-network/payloadset-plugin'\nimport { UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitness } from './Witness'\n\nexport const UrlPlugin = () =>\n createPayloadSetWitnessPlugin<UrlWitness>(\n { required: { [UrlSchema]: 1 }, schema: PayloadSetSchema },\n {\n witness: async (params) => {\n const result = await UrlWitness.create(params)\n return result\n },\n },\n )\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/indexNode.ts","../../src/util/hashFile.ts","../../src/util/hashHttpUrl.ts","../../src/util/hashUrl.ts","../../src/Witness/Config.ts","../../src/Witness/Witness.ts","../../src/PluginNode.ts"],"sourcesContent":["import { hashUrl } from './util'\nimport { UrlWitness } from './Witness'\n\nUrlWitness.hashUrl = hashUrl\n\nexport { UrlPlugin as default, UrlPlugin } from './PluginNode'\nexport * from './Witness'\n","import { createReadStream } from 'node:fs'\nimport { fileURLToPath } from 'node:url'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashFile = (url: string): Promise<string> => {\n const path = url.startsWith('file://') ? fileURLToPath(url) : url\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const stream = createReadStream(path)\n stream.on('data', (data) => {\n hash.update(data)\n })\n stream.on('end', () => {\n resolve(hash.digest('hex'))\n })\n stream.on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import http from 'node:http'\nimport https from 'node:https'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashHttpUrl = (url: string): Promise<string> => {\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const lib = url.startsWith('https') ? https : http\n lib\n .get(url, (res) => {\n res.on('data', (data) => {\n hash.update(data)\n })\n res.on('end', () => {\n resolve(hash.digest('hex'))\n })\n })\n .on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import { hashFile } from './hashFile'\nimport { hashHttpUrl } from './hashHttpUrl'\n\nexport const hashUrl = (url: string): Promise<string> => {\n const scheme = url.split('://')[0]?.toLowerCase()\n switch (scheme) {\n case 'file': {\n return hashFile(url)\n }\n case 'http':\n case 'https': {\n return hashHttpUrl(url)\n }\n default: {\n throw new Error(`Unsupported URL scheme: ${scheme}`)\n }\n }\n}\n","import { UrlSchema } from '@xyo-network/url-payload-plugin'\nimport { WitnessConfig } from '@xyo-network/witness-model'\n\nexport const UrlWitnessConfigSchema = `${UrlSchema}.witness.config` as const\nexport type UrlWitnessConfigSchema = typeof UrlWitnessConfigSchema\n\nexport type UrlWitnessConfig = WitnessConfig<{\n schema: UrlWitnessConfigSchema\n urls?: string[]\n}>\n","import { assertEx } from '@xylabs/assert'\nimport { AbstractWitness } from '@xyo-network/abstract-witness'\nimport { Payload, Schema } from '@xyo-network/payload-model'\nimport { UrlPayload, UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitnessConfigSchema } from './Config'\nimport { UrlWitnessParams } from './Params'\n\nexport class UrlWitness<TParams extends UrlWitnessParams = UrlWitnessParams> extends AbstractWitness<TParams> {\n static override readonly configSchemas: Schema[] = [...super.configSchemas, UrlWitnessConfigSchema]\n static override readonly defaultConfigSchema: Schema = UrlWitnessConfigSchema\n static hashUrl: ((url: string) => Promise<string>) | undefined = undefined\n\n get urls() {\n return this.config?.urls\n }\n\n protected override async observeHandler(payloads: Payload[] = []): Promise<Payload[]> {\n if (UrlWitness.hashUrl === undefined) {\n throw new Error('Set UrlWitness.hashUrl before using')\n }\n const urls: UrlPayload[] =\n this.urls?.map((url) => ({ schema: UrlSchema, url })) ??\n payloads\n .filter((p): p is UrlPayload => p.schema === UrlSchema)\n .map((p) => {\n return { schema: UrlSchema, url: p.url }\n })\n const hashed = await Promise.all(\n urls.map(async (url) => {\n // TODO: Different schema for hashed url\n return { ...url, hash: await assertEx(UrlWitness.hashUrl, () => 'Set UrlWitness.hashUrl before using')(url.url) }\n }),\n )\n // TODO: Handle partial success\n return hashed\n }\n}\n","import { PayloadSetSchema } from '@xyo-network/payload-model'\nimport { createPayloadSetWitnessPlugin } from '@xyo-network/payloadset-plugin'\nimport { UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitness } from './Witness'\n\nexport const UrlPlugin = () =>\n createPayloadSetWitnessPlugin<UrlWitness>(\n { required: { [UrlSchema]: 1 }, schema: PayloadSetSchema },\n {\n witness: async (params) => {\n const result = await UrlWitness.create(params)\n return result\n },\n },\n )\n"],"mappings":"0jBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,eAAAE,EAAA,eAAAC,EAAA,2BAAAC,EAAA,YAAAF,IAAA,eAAAG,EAAAL,GCAA,IAAAM,EAAiC,cACjCC,EAA8B,eAE9BC,EAAuB,0BAEVC,EAAYC,GAAiC,CACxD,IAAMC,EAAOD,EAAI,WAAW,SAAS,KAAI,iBAAcA,CAAG,EAAIA,EAc9D,OAbY,IAAI,QAAgB,CAACE,EAASC,IAAW,CACnD,IAAMC,EAAO,SAAO,WAAW,QAAQ,EACjCC,KAAS,oBAAiBJ,CAAI,EACpCI,EAAO,GAAG,OAASC,GAAS,CAC1BF,EAAK,OAAOE,CAAI,CAClB,CAAC,EACDD,EAAO,GAAG,MAAO,IAAM,CACrBH,EAAQE,EAAK,OAAO,KAAK,CAAC,CAC5B,CAAC,EACDC,EAAO,GAAG,QAAUE,GAAQ,CAC1BJ,EAAOI,CAAG,CACZ,CAAC,CACH,CAAC,CAEH,ECrBA,IAAAC,EAAiB,qBACjBC,EAAkB,sBAElBC,EAAuB,0BAEVC,EAAeC,GACd,IAAI,QAAgB,CAACC,EAASC,IAAW,CACnD,IAAMC,EAAO,SAAO,WAAW,QAAQ,GAC3BH,EAAI,WAAW,OAAO,EAAI,EAAAI,QAAQ,EAAAC,SAE3C,IAAIL,EAAMM,GAAQ,CACjBA,EAAI,GAAG,OAASC,GAAS,CACvBJ,EAAK,OAAOI,CAAI,CAClB,CAAC,EACDD,EAAI,GAAG,MAAO,IAAM,CAClBL,EAAQE,EAAK,OAAO,KAAK,CAAC,CAC5B,CAAC,CACH,CAAC,EACA,GAAG,QAAUK,GAAQ,CACpBN,EAAOM,CAAG,CACZ,CAAC,CACL,CAAC,EClBI,IAAMC,EAAWC,GAAiC,CACvD,IAAMC,EAASD,EAAI,MAAM,KAAK,EAAE,CAAC,GAAG,YAAY,EAChD,OAAQC,EAAQ,CACd,IAAK,OACH,OAAOC,EAASF,CAAG,EAErB,IAAK,OACL,IAAK,QACH,OAAOG,EAAYH,CAAG,EAExB,QACE,MAAM,IAAI,MAAM,2BAA2BC,CAAM,EAAE,CAEvD,CACF,ECjBA,IAAAG,EAA0B,2CAGbC,EAAyB,GAAG,WAAS,kBCHlD,IAAAC,EAAyB,0BACzBC,EAAgC,yCAEhCC,EAAsC,2CAK/B,IAAMC,EAAN,MAAMC,UAAwE,iBAAyB,CAC5G,OAAyB,cAA0B,CAAC,GAAG,MAAM,cAAeC,CAAsB,EAClG,OAAyB,oBAA8BA,EACvD,OAAO,QAA0D,OAEjE,IAAI,MAAO,CACT,OAAO,KAAK,QAAQ,IACtB,CAEA,MAAyB,eAAeC,EAAsB,CAAC,EAAuB,CACpF,GAAIF,EAAW,UAAY,OACzB,MAAM,IAAI,MAAM,qCAAqC,EAEvD,IAAMG,EACJ,KAAK,MAAM,IAAKC,IAAS,CAAE,OAAQ,YAAW,IAAAA,CAAI,EAAE,GACpDF,EACG,OAAQG,GAAuBA,EAAE,SAAW,WAAS,EACrD,IAAKA,IACG,CAAE,OAAQ,YAAW,IAAKA,EAAE,GAAI,EACxC,EAQL,OAPe,MAAM,QAAQ,IAC3BF,EAAK,IAAI,MAAOC,IAEP,CAAE,GAAGA,EAAK,KAAM,QAAM,YAASJ,EAAW,QAAS,IAAM,qCAAqC,EAAEI,EAAI,GAAG,CAAE,EACjH,CACH,CAGF,CACF,ECrCA,IAAAE,EAAiC,sCACjCC,EAA8C,0CAC9CC,EAA0B,2CAInB,IAAMC,EAAY,OACvB,iCACE,CAAE,SAAU,CAAE,CAAC,WAAS,EAAG,CAAE,EAAG,OAAQ,kBAAiB,EACzD,CACE,QAAS,MAAOC,GACC,MAAMC,EAAW,OAAOD,CAAM,CAGjD,CACF,ENZFE,EAAW,QAAUC","names":["indexNode_exports","__export","UrlPlugin","UrlWitness","UrlWitnessConfigSchema","__toCommonJS","import_node_fs","import_node_url","import_crypto","hashFile","url","path","resolve","reject","hash","stream","data","err","import_node_http","import_node_https","import_crypto","hashHttpUrl","url","resolve","reject","hash","https","http","res","data","err","hashUrl","url","scheme","hashFile","hashHttpUrl","import_url_payload_plugin","UrlWitnessConfigSchema","import_assert","import_abstract_witness","import_url_payload_plugin","UrlWitness","_UrlWitness","UrlWitnessConfigSchema","payloads","urls","url","p","import_payload_model","import_payloadset_plugin","import_url_payload_plugin","UrlPlugin","params","UrlWitness","UrlWitness","hashUrl"]}
|
|
@@ -1,115 +1,2 @@
|
|
|
1
|
-
|
|
2
|
-
import { createReadStream } from "node:fs";
|
|
3
|
-
import { fileURLToPath } from "node:url";
|
|
4
|
-
import { Crypto } from "@xylabs/crypto";
|
|
5
|
-
var hashFile = (url) => {
|
|
6
|
-
const path = url.startsWith("file://") ? fileURLToPath(url) : url;
|
|
7
|
-
const ret = new Promise((resolve, reject) => {
|
|
8
|
-
const hash = Crypto.createHash("sha256");
|
|
9
|
-
const stream = createReadStream(path);
|
|
10
|
-
stream.on("data", (data) => {
|
|
11
|
-
hash.update(data);
|
|
12
|
-
});
|
|
13
|
-
stream.on("end", () => {
|
|
14
|
-
resolve(hash.digest("hex"));
|
|
15
|
-
});
|
|
16
|
-
stream.on("error", (err) => {
|
|
17
|
-
reject(err);
|
|
18
|
-
});
|
|
19
|
-
});
|
|
20
|
-
return ret;
|
|
21
|
-
};
|
|
22
|
-
|
|
23
|
-
// src/util/hashHttpUrl.ts
|
|
24
|
-
import http from "node:http";
|
|
25
|
-
import https from "node:https";
|
|
26
|
-
import { Crypto as Crypto2 } from "@xylabs/crypto";
|
|
27
|
-
var hashHttpUrl = (url) => {
|
|
28
|
-
const ret = new Promise((resolve, reject) => {
|
|
29
|
-
const hash = Crypto2.createHash("sha256");
|
|
30
|
-
const lib = url.startsWith("https") ? https : http;
|
|
31
|
-
lib.get(url, (res) => {
|
|
32
|
-
res.on("data", (data) => {
|
|
33
|
-
hash.update(data);
|
|
34
|
-
});
|
|
35
|
-
res.on("end", () => {
|
|
36
|
-
resolve(hash.digest("hex"));
|
|
37
|
-
});
|
|
38
|
-
}).on("error", (err) => {
|
|
39
|
-
reject(err);
|
|
40
|
-
});
|
|
41
|
-
});
|
|
42
|
-
return ret;
|
|
43
|
-
};
|
|
44
|
-
|
|
45
|
-
// src/util/hashUrl.ts
|
|
46
|
-
var hashUrl = (url) => {
|
|
47
|
-
const scheme = url.split("://")[0]?.toLowerCase();
|
|
48
|
-
switch (scheme) {
|
|
49
|
-
case "file": {
|
|
50
|
-
return hashFile(url);
|
|
51
|
-
}
|
|
52
|
-
case "http":
|
|
53
|
-
case "https": {
|
|
54
|
-
return hashHttpUrl(url);
|
|
55
|
-
}
|
|
56
|
-
default: {
|
|
57
|
-
throw new Error(`Unsupported URL scheme: ${scheme}`);
|
|
58
|
-
}
|
|
59
|
-
}
|
|
60
|
-
};
|
|
61
|
-
|
|
62
|
-
// src/Witness/Config.ts
|
|
63
|
-
import { UrlSchema } from "@xyo-network/url-payload-plugin";
|
|
64
|
-
var UrlWitnessConfigSchema = `${UrlSchema}.witness.config`;
|
|
65
|
-
|
|
66
|
-
// src/Witness/Witness.ts
|
|
67
|
-
import { assertEx } from "@xylabs/assert";
|
|
68
|
-
import { AbstractWitness } from "@xyo-network/abstract-witness";
|
|
69
|
-
import { UrlSchema as UrlSchema2 } from "@xyo-network/url-payload-plugin";
|
|
70
|
-
var UrlWitness = class _UrlWitness extends AbstractWitness {
|
|
71
|
-
static configSchemas = [...super.configSchemas, UrlWitnessConfigSchema];
|
|
72
|
-
static defaultConfigSchema = UrlWitnessConfigSchema;
|
|
73
|
-
static hashUrl = void 0;
|
|
74
|
-
get urls() {
|
|
75
|
-
return this.config?.urls;
|
|
76
|
-
}
|
|
77
|
-
async observeHandler(payloads = []) {
|
|
78
|
-
if (_UrlWitness.hashUrl === void 0) {
|
|
79
|
-
throw new Error("Set UrlWitness.hashUrl before using");
|
|
80
|
-
}
|
|
81
|
-
const urls = this.urls?.map((url) => ({ schema: UrlSchema2, url })) ?? payloads.filter((p) => p.schema === UrlSchema2).map((p) => {
|
|
82
|
-
return { schema: UrlSchema2, url: p.url };
|
|
83
|
-
});
|
|
84
|
-
const hashed = await Promise.all(
|
|
85
|
-
urls.map(async (url) => {
|
|
86
|
-
return { ...url, hash: await assertEx(_UrlWitness.hashUrl, () => "Set UrlWitness.hashUrl before using")(url.url) };
|
|
87
|
-
})
|
|
88
|
-
);
|
|
89
|
-
return hashed;
|
|
90
|
-
}
|
|
91
|
-
};
|
|
92
|
-
|
|
93
|
-
// src/PluginNode.ts
|
|
94
|
-
import { PayloadSetSchema } from "@xyo-network/payload-model";
|
|
95
|
-
import { createPayloadSetWitnessPlugin } from "@xyo-network/payloadset-plugin";
|
|
96
|
-
import { UrlSchema as UrlSchema3 } from "@xyo-network/url-payload-plugin";
|
|
97
|
-
var UrlPlugin = () => createPayloadSetWitnessPlugin(
|
|
98
|
-
{ required: { [UrlSchema3]: 1 }, schema: PayloadSetSchema },
|
|
99
|
-
{
|
|
100
|
-
witness: async (params) => {
|
|
101
|
-
const result = await UrlWitness.create(params);
|
|
102
|
-
return result;
|
|
103
|
-
}
|
|
104
|
-
}
|
|
105
|
-
);
|
|
106
|
-
|
|
107
|
-
// src/indexNode.ts
|
|
108
|
-
UrlWitness.hashUrl = hashUrl;
|
|
109
|
-
export {
|
|
110
|
-
UrlPlugin,
|
|
111
|
-
UrlWitness,
|
|
112
|
-
UrlWitnessConfigSchema,
|
|
113
|
-
UrlPlugin as default
|
|
114
|
-
};
|
|
1
|
+
import{createReadStream as U}from"node:fs";import{fileURLToPath as g}from"node:url";import{Crypto as u}from"@xylabs/crypto";var c=r=>{let e=r.startsWith("file://")?g(r):r;return new Promise((n,t)=>{let m=u.createHash("sha256"),s=U(e);s.on("data",a=>{m.update(a)}),s.on("end",()=>{n(m.digest("hex"))}),s.on("error",a=>{t(a)})})};import P from"node:http";import S from"node:https";import{Crypto as W}from"@xylabs/crypto";var p=r=>new Promise((i,n)=>{let t=W.createHash("sha256");(r.startsWith("https")?S:P).get(r,s=>{s.on("data",a=>{t.update(a)}),s.on("end",()=>{i(t.digest("hex"))})}).on("error",s=>{n(s)})});var f=r=>{let e=r.split("://")[0]?.toLowerCase();switch(e){case"file":return c(r);case"http":case"https":return p(r);default:throw new Error(`Unsupported URL scheme: ${e}`)}};import{UrlSchema as y}from"@xyo-network/url-payload-plugin";var h=`${y}.witness.config`;import{assertEx as x}from"@xylabs/assert";import{AbstractWitness as w}from"@xyo-network/abstract-witness";import{UrlSchema as l}from"@xyo-network/url-payload-plugin";var o=class r extends w{static configSchemas=[...super.configSchemas,h];static defaultConfigSchema=h;static hashUrl=void 0;get urls(){return this.config?.urls}async observeHandler(e=[]){if(r.hashUrl===void 0)throw new Error("Set UrlWitness.hashUrl before using");let i=this.urls?.map(t=>({schema:l,url:t}))??e.filter(t=>t.schema===l).map(t=>({schema:l,url:t.url}));return await Promise.all(i.map(async t=>({...t,hash:await x(r.hashUrl,()=>"Set UrlWitness.hashUrl before using")(t.url)})))}};import{PayloadSetSchema as C}from"@xyo-network/payload-model";import{createPayloadSetWitnessPlugin as b}from"@xyo-network/payloadset-plugin";import{UrlSchema as H}from"@xyo-network/url-payload-plugin";var d=()=>b({required:{[H]:1},schema:C},{witness:async r=>await o.create(r)});o.hashUrl=f;export{d as UrlPlugin,o as UrlWitness,h as UrlWitnessConfigSchema,d as default};
|
|
115
2
|
//# sourceMappingURL=indexNode.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/util/hashFile.ts","../../src/util/hashHttpUrl.ts","../../src/util/hashUrl.ts","../../src/Witness/Config.ts","../../src/Witness/Witness.ts","../../src/PluginNode.ts","../../src/indexNode.ts"],"sourcesContent":["import { createReadStream } from 'node:fs'\nimport { fileURLToPath } from 'node:url'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashFile = (url: string): Promise<string> => {\n const path = url.startsWith('file://') ? fileURLToPath(url) : url\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const stream = createReadStream(path)\n stream.on('data', (data) => {\n hash.update(data)\n })\n stream.on('end', () => {\n resolve(hash.digest('hex'))\n })\n stream.on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import http from 'node:http'\nimport https from 'node:https'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashHttpUrl = (url: string): Promise<string> => {\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const lib = url.startsWith('https') ? https : http\n lib\n .get(url, (res) => {\n res.on('data', (data) => {\n hash.update(data)\n })\n res.on('end', () => {\n resolve(hash.digest('hex'))\n })\n })\n .on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import { hashFile } from './hashFile'\nimport { hashHttpUrl } from './hashHttpUrl'\n\nexport const hashUrl = (url: string): Promise<string> => {\n const scheme = url.split('://')[0]?.toLowerCase()\n switch (scheme) {\n case 'file': {\n return hashFile(url)\n }\n case 'http':\n case 'https': {\n return hashHttpUrl(url)\n }\n default: {\n throw new Error(`Unsupported URL scheme: ${scheme}`)\n }\n }\n}\n","import { UrlSchema } from '@xyo-network/url-payload-plugin'\nimport { WitnessConfig } from '@xyo-network/witness-model'\n\nexport const UrlWitnessConfigSchema = `${UrlSchema}.witness.config` as const\nexport type UrlWitnessConfigSchema = typeof UrlWitnessConfigSchema\n\nexport type UrlWitnessConfig = WitnessConfig<{\n schema: UrlWitnessConfigSchema\n urls?: string[]\n}>\n","import { assertEx } from '@xylabs/assert'\nimport { AbstractWitness } from '@xyo-network/abstract-witness'\nimport { Payload, Schema } from '@xyo-network/payload-model'\nimport { UrlPayload, UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitnessConfigSchema } from './Config'\nimport { UrlWitnessParams } from './Params'\n\nexport class UrlWitness<TParams extends UrlWitnessParams = UrlWitnessParams> extends AbstractWitness<TParams> {\n static override readonly configSchemas: Schema[] = [...super.configSchemas, UrlWitnessConfigSchema]\n static override readonly defaultConfigSchema: Schema = UrlWitnessConfigSchema\n static hashUrl: ((url: string) => Promise<string>) | undefined = undefined\n\n get urls() {\n return this.config?.urls\n }\n\n protected override async observeHandler(payloads: Payload[] = []): Promise<Payload[]> {\n if (UrlWitness.hashUrl === undefined) {\n throw new Error('Set UrlWitness.hashUrl before using')\n }\n const urls: UrlPayload[] =\n this.urls?.map((url) => ({ schema: UrlSchema, url })) ??\n payloads\n .filter((p): p is UrlPayload => p.schema === UrlSchema)\n .map((p) => {\n return { schema: UrlSchema, url: p.url }\n })\n const hashed = await Promise.all(\n urls.map(async (url) => {\n // TODO: Different schema for hashed url\n return { ...url, hash: await assertEx(UrlWitness.hashUrl, () => 'Set UrlWitness.hashUrl before using')(url.url) }\n }),\n )\n // TODO: Handle partial success\n return hashed\n }\n}\n","import { PayloadSetSchema } from '@xyo-network/payload-model'\nimport { createPayloadSetWitnessPlugin } from '@xyo-network/payloadset-plugin'\nimport { UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitness } from './Witness'\n\nexport const UrlPlugin = () =>\n createPayloadSetWitnessPlugin<UrlWitness>(\n { required: { [UrlSchema]: 1 }, schema: PayloadSetSchema },\n {\n witness: async (params) => {\n const result = await UrlWitness.create(params)\n return result\n },\n },\n )\n","import { hashUrl } from './util'\nimport { UrlWitness } from './Witness'\n\nUrlWitness.hashUrl = hashUrl\n\nexport { UrlPlugin as default, UrlPlugin } from './PluginNode'\nexport * from './Witness'\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../../src/util/hashFile.ts","../../src/util/hashHttpUrl.ts","../../src/util/hashUrl.ts","../../src/Witness/Config.ts","../../src/Witness/Witness.ts","../../src/PluginNode.ts","../../src/indexNode.ts"],"sourcesContent":["import { createReadStream } from 'node:fs'\nimport { fileURLToPath } from 'node:url'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashFile = (url: string): Promise<string> => {\n const path = url.startsWith('file://') ? fileURLToPath(url) : url\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const stream = createReadStream(path)\n stream.on('data', (data) => {\n hash.update(data)\n })\n stream.on('end', () => {\n resolve(hash.digest('hex'))\n })\n stream.on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import http from 'node:http'\nimport https from 'node:https'\n\nimport { Crypto } from '@xylabs/crypto'\n\nexport const hashHttpUrl = (url: string): Promise<string> => {\n const ret = new Promise<string>((resolve, reject) => {\n const hash = Crypto.createHash('sha256')\n const lib = url.startsWith('https') ? https : http\n lib\n .get(url, (res) => {\n res.on('data', (data) => {\n hash.update(data)\n })\n res.on('end', () => {\n resolve(hash.digest('hex'))\n })\n })\n .on('error', (err) => {\n reject(err)\n })\n })\n return ret\n}\n","import { hashFile } from './hashFile'\nimport { hashHttpUrl } from './hashHttpUrl'\n\nexport const hashUrl = (url: string): Promise<string> => {\n const scheme = url.split('://')[0]?.toLowerCase()\n switch (scheme) {\n case 'file': {\n return hashFile(url)\n }\n case 'http':\n case 'https': {\n return hashHttpUrl(url)\n }\n default: {\n throw new Error(`Unsupported URL scheme: ${scheme}`)\n }\n }\n}\n","import { UrlSchema } from '@xyo-network/url-payload-plugin'\nimport { WitnessConfig } from '@xyo-network/witness-model'\n\nexport const UrlWitnessConfigSchema = `${UrlSchema}.witness.config` as const\nexport type UrlWitnessConfigSchema = typeof UrlWitnessConfigSchema\n\nexport type UrlWitnessConfig = WitnessConfig<{\n schema: UrlWitnessConfigSchema\n urls?: string[]\n}>\n","import { assertEx } from '@xylabs/assert'\nimport { AbstractWitness } from '@xyo-network/abstract-witness'\nimport { Payload, Schema } from '@xyo-network/payload-model'\nimport { UrlPayload, UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitnessConfigSchema } from './Config'\nimport { UrlWitnessParams } from './Params'\n\nexport class UrlWitness<TParams extends UrlWitnessParams = UrlWitnessParams> extends AbstractWitness<TParams> {\n static override readonly configSchemas: Schema[] = [...super.configSchemas, UrlWitnessConfigSchema]\n static override readonly defaultConfigSchema: Schema = UrlWitnessConfigSchema\n static hashUrl: ((url: string) => Promise<string>) | undefined = undefined\n\n get urls() {\n return this.config?.urls\n }\n\n protected override async observeHandler(payloads: Payload[] = []): Promise<Payload[]> {\n if (UrlWitness.hashUrl === undefined) {\n throw new Error('Set UrlWitness.hashUrl before using')\n }\n const urls: UrlPayload[] =\n this.urls?.map((url) => ({ schema: UrlSchema, url })) ??\n payloads\n .filter((p): p is UrlPayload => p.schema === UrlSchema)\n .map((p) => {\n return { schema: UrlSchema, url: p.url }\n })\n const hashed = await Promise.all(\n urls.map(async (url) => {\n // TODO: Different schema for hashed url\n return { ...url, hash: await assertEx(UrlWitness.hashUrl, () => 'Set UrlWitness.hashUrl before using')(url.url) }\n }),\n )\n // TODO: Handle partial success\n return hashed\n }\n}\n","import { PayloadSetSchema } from '@xyo-network/payload-model'\nimport { createPayloadSetWitnessPlugin } from '@xyo-network/payloadset-plugin'\nimport { UrlSchema } from '@xyo-network/url-payload-plugin'\n\nimport { UrlWitness } from './Witness'\n\nexport const UrlPlugin = () =>\n createPayloadSetWitnessPlugin<UrlWitness>(\n { required: { [UrlSchema]: 1 }, schema: PayloadSetSchema },\n {\n witness: async (params) => {\n const result = await UrlWitness.create(params)\n return result\n },\n },\n )\n","import { hashUrl } from './util'\nimport { UrlWitness } from './Witness'\n\nUrlWitness.hashUrl = hashUrl\n\nexport { UrlPlugin as default, UrlPlugin } from './PluginNode'\nexport * from './Witness'\n"],"mappings":"AAAA,OAAS,oBAAAA,MAAwB,UACjC,OAAS,iBAAAC,MAAqB,WAE9B,OAAS,UAAAC,MAAc,iBAEhB,IAAMC,EAAYC,GAAiC,CACxD,IAAMC,EAAOD,EAAI,WAAW,SAAS,EAAIH,EAAcG,CAAG,EAAIA,EAc9D,OAbY,IAAI,QAAgB,CAACE,EAASC,IAAW,CACnD,IAAMC,EAAON,EAAO,WAAW,QAAQ,EACjCO,EAAST,EAAiBK,CAAI,EACpCI,EAAO,GAAG,OAASC,GAAS,CAC1BF,EAAK,OAAOE,CAAI,CAClB,CAAC,EACDD,EAAO,GAAG,MAAO,IAAM,CACrBH,EAAQE,EAAK,OAAO,KAAK,CAAC,CAC5B,CAAC,EACDC,EAAO,GAAG,QAAUE,GAAQ,CAC1BJ,EAAOI,CAAG,CACZ,CAAC,CACH,CAAC,CAEH,ECrBA,OAAOC,MAAU,YACjB,OAAOC,MAAW,aAElB,OAAS,UAAAC,MAAc,iBAEhB,IAAMC,EAAeC,GACd,IAAI,QAAgB,CAACC,EAASC,IAAW,CACnD,IAAMC,EAAOL,EAAO,WAAW,QAAQ,GAC3BE,EAAI,WAAW,OAAO,EAAIH,EAAQD,GAE3C,IAAII,EAAMI,GAAQ,CACjBA,EAAI,GAAG,OAASC,GAAS,CACvBF,EAAK,OAAOE,CAAI,CAClB,CAAC,EACDD,EAAI,GAAG,MAAO,IAAM,CAClBH,EAAQE,EAAK,OAAO,KAAK,CAAC,CAC5B,CAAC,CACH,CAAC,EACA,GAAG,QAAUG,GAAQ,CACpBJ,EAAOI,CAAG,CACZ,CAAC,CACL,CAAC,EClBI,IAAMC,EAAWC,GAAiC,CACvD,IAAMC,EAASD,EAAI,MAAM,KAAK,EAAE,CAAC,GAAG,YAAY,EAChD,OAAQC,EAAQ,CACd,IAAK,OACH,OAAOC,EAASF,CAAG,EAErB,IAAK,OACL,IAAK,QACH,OAAOG,EAAYH,CAAG,EAExB,QACE,MAAM,IAAI,MAAM,2BAA2BC,CAAM,EAAE,CAEvD,CACF,ECjBA,OAAS,aAAAG,MAAiB,kCAGnB,IAAMC,EAAyB,GAAGD,CAAS,kBCHlD,OAAS,YAAAE,MAAgB,iBACzB,OAAS,mBAAAC,MAAuB,gCAEhC,OAAqB,aAAAC,MAAiB,kCAK/B,IAAMC,EAAN,MAAMC,UAAwEC,CAAyB,CAC5G,OAAyB,cAA0B,CAAC,GAAG,MAAM,cAAeC,CAAsB,EAClG,OAAyB,oBAA8BA,EACvD,OAAO,QAA0D,OAEjE,IAAI,MAAO,CACT,OAAO,KAAK,QAAQ,IACtB,CAEA,MAAyB,eAAeC,EAAsB,CAAC,EAAuB,CACpF,GAAIH,EAAW,UAAY,OACzB,MAAM,IAAI,MAAM,qCAAqC,EAEvD,IAAMI,EACJ,KAAK,MAAM,IAAKC,IAAS,CAAE,OAAQC,EAAW,IAAAD,CAAI,EAAE,GACpDF,EACG,OAAQI,GAAuBA,EAAE,SAAWD,CAAS,EACrD,IAAKC,IACG,CAAE,OAAQD,EAAW,IAAKC,EAAE,GAAI,EACxC,EAQL,OAPe,MAAM,QAAQ,IAC3BH,EAAK,IAAI,MAAOC,IAEP,CAAE,GAAGA,EAAK,KAAM,MAAMG,EAASR,EAAW,QAAS,IAAM,qCAAqC,EAAEK,EAAI,GAAG,CAAE,EACjH,CACH,CAGF,CACF,ECrCA,OAAS,oBAAAI,MAAwB,6BACjC,OAAS,iCAAAC,MAAqC,iCAC9C,OAAS,aAAAC,MAAiB,kCAInB,IAAMC,EAAY,IACvBC,EACE,CAAE,SAAU,CAAE,CAACC,CAAS,EAAG,CAAE,EAAG,OAAQC,CAAiB,EACzD,CACE,QAAS,MAAOC,GACC,MAAMC,EAAW,OAAOD,CAAM,CAGjD,CACF,ECZFE,EAAW,QAAUC","names":["createReadStream","fileURLToPath","Crypto","hashFile","url","path","resolve","reject","hash","stream","data","err","http","https","Crypto","hashHttpUrl","url","resolve","reject","hash","res","data","err","hashUrl","url","scheme","hashFile","hashHttpUrl","UrlSchema","UrlWitnessConfigSchema","assertEx","AbstractWitness","UrlSchema","UrlWitness","_UrlWitness","AbstractWitness","UrlWitnessConfigSchema","payloads","urls","url","UrlSchema","p","assertEx","PayloadSetSchema","createPayloadSetWitnessPlugin","UrlSchema","UrlPlugin","createPayloadSetWitnessPlugin","UrlSchema","PayloadSetSchema","params","UrlWitness","UrlWitness","hashUrl"]}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashFile.d.ts","sourceRoot":"","sources":["../../../src/util/hashFile.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,QAAQ,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashFile.d.ts","sourceRoot":"","sources":["../../../src/util/hashFile.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,QAAQ,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAgBpD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashFile.d.ts","sourceRoot":"","sources":["../../../src/util/hashFile.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,QAAQ,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashFile.d.ts","sourceRoot":"","sources":["../../../src/util/hashFile.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,QAAQ,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAgBpD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashFile.d.ts","sourceRoot":"","sources":["../../../src/util/hashFile.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,QAAQ,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashFile.d.ts","sourceRoot":"","sources":["../../../src/util/hashFile.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,QAAQ,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAgBpD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashHttpUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashHttpUrl.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,WAAW,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashHttpUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashHttpUrl.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,WAAW,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAkBvD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashHttpUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashHttpUrl.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,WAAW,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashHttpUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashHttpUrl.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,WAAW,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAkBvD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashHttpUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashHttpUrl.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,WAAW,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashHttpUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashHttpUrl.ts"],"names":[],"mappings":"AAKA,eAAO,MAAM,WAAW,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAkBvD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashUrl.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashUrl.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAcnD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashUrl.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashUrl.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAcnD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hashUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashUrl.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,QAAS,MAAM,KAAG,
|
|
1
|
+
{"version":3,"file":"hashUrl.d.ts","sourceRoot":"","sources":["../../../src/util/hashUrl.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,QAAS,MAAM,KAAG,OAAO,CAAC,MAAM,CAcnD,CAAA"}
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { UrlWitness } from './Witness';
|
|
2
2
|
export declare const UrlPlugin: () => import("@xyo-network/payloadset-plugin").PayloadSetWitnessPlugin<UrlWitness<import("@xylabs/object").BaseParamsFields & {
|
|
3
|
-
account?: import("@xyo-network/account-model").AccountInstance | "random"
|
|
4
|
-
addToResolvers?: boolean
|
|
5
|
-
additionalSigners?: import("@xyo-network/account-model").AccountInstance[]
|
|
6
|
-
allowNameResolution?: boolean
|
|
3
|
+
account?: import("@xyo-network/account-model").AccountInstance | "random";
|
|
4
|
+
addToResolvers?: boolean;
|
|
5
|
+
additionalSigners?: import("@xyo-network/account-model").AccountInstance[];
|
|
6
|
+
allowNameResolution?: boolean;
|
|
7
7
|
config: import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & {
|
|
8
8
|
schema: "network.xyo.url.witness.config";
|
|
9
9
|
} & {
|
|
10
|
-
schema: "
|
|
11
|
-
urls?: string[]
|
|
10
|
+
schema: import("./Witness").UrlWitnessConfigSchema;
|
|
11
|
+
urls?: string[];
|
|
12
12
|
}, "schema"> & {
|
|
13
13
|
schema: "network.xyo.url.witness.config";
|
|
14
14
|
}, "schema"> & {
|
|
15
15
|
schema: string;
|
|
16
16
|
};
|
|
17
|
-
ephemeralQueryAccountEnabled?: boolean
|
|
18
|
-
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[]
|
|
17
|
+
ephemeralQueryAccountEnabled?: boolean;
|
|
18
|
+
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[];
|
|
19
19
|
}>>;
|
|
20
20
|
//# sourceMappingURL=PluginBrowser.d.ts.map
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { UrlWitness } from './Witness';
|
|
2
2
|
export declare const UrlPlugin: () => import("@xyo-network/payloadset-plugin").PayloadSetWitnessPlugin<UrlWitness<import("@xylabs/object").BaseParamsFields & {
|
|
3
|
-
account?: import("@xyo-network/account-model").AccountInstance | "random"
|
|
4
|
-
addToResolvers?: boolean
|
|
5
|
-
additionalSigners?: import("@xyo-network/account-model").AccountInstance[]
|
|
6
|
-
allowNameResolution?: boolean
|
|
3
|
+
account?: import("@xyo-network/account-model").AccountInstance | "random";
|
|
4
|
+
addToResolvers?: boolean;
|
|
5
|
+
additionalSigners?: import("@xyo-network/account-model").AccountInstance[];
|
|
6
|
+
allowNameResolution?: boolean;
|
|
7
7
|
config: import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & {
|
|
8
8
|
schema: "network.xyo.url.witness.config";
|
|
9
9
|
} & {
|
|
10
|
-
schema: "
|
|
11
|
-
urls?: string[]
|
|
10
|
+
schema: import("./Witness").UrlWitnessConfigSchema;
|
|
11
|
+
urls?: string[];
|
|
12
12
|
}, "schema"> & {
|
|
13
13
|
schema: "network.xyo.url.witness.config";
|
|
14
14
|
}, "schema"> & {
|
|
15
15
|
schema: string;
|
|
16
16
|
};
|
|
17
|
-
ephemeralQueryAccountEnabled?: boolean
|
|
18
|
-
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[]
|
|
17
|
+
ephemeralQueryAccountEnabled?: boolean;
|
|
18
|
+
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[];
|
|
19
19
|
}>>;
|
|
20
20
|
//# sourceMappingURL=PluginBrowser.d.ts.map
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { UrlWitness } from './Witness';
|
|
2
2
|
export declare const UrlPlugin: () => import("@xyo-network/payloadset-plugin").PayloadSetWitnessPlugin<UrlWitness<import("@xylabs/object").BaseParamsFields & {
|
|
3
|
-
account?: import("@xyo-network/account-model").AccountInstance | "random"
|
|
4
|
-
addToResolvers?: boolean
|
|
5
|
-
additionalSigners?: import("@xyo-network/account-model").AccountInstance[]
|
|
6
|
-
allowNameResolution?: boolean
|
|
3
|
+
account?: import("@xyo-network/account-model").AccountInstance | "random";
|
|
4
|
+
addToResolvers?: boolean;
|
|
5
|
+
additionalSigners?: import("@xyo-network/account-model").AccountInstance[];
|
|
6
|
+
allowNameResolution?: boolean;
|
|
7
7
|
config: import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & {
|
|
8
8
|
schema: "network.xyo.url.witness.config";
|
|
9
9
|
} & {
|
|
10
|
-
schema: "
|
|
11
|
-
urls?: string[]
|
|
10
|
+
schema: import("./Witness").UrlWitnessConfigSchema;
|
|
11
|
+
urls?: string[];
|
|
12
12
|
}, "schema"> & {
|
|
13
13
|
schema: "network.xyo.url.witness.config";
|
|
14
14
|
}, "schema"> & {
|
|
15
15
|
schema: string;
|
|
16
16
|
};
|
|
17
|
-
ephemeralQueryAccountEnabled?: boolean
|
|
18
|
-
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[]
|
|
17
|
+
ephemeralQueryAccountEnabled?: boolean;
|
|
18
|
+
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[];
|
|
19
19
|
}>>;
|
|
20
20
|
//# sourceMappingURL=PluginBrowser.d.ts.map
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { UrlWitness } from './Witness';
|
|
2
2
|
export declare const UrlPlugin: () => import("@xyo-network/payloadset-plugin").PayloadSetWitnessPlugin<UrlWitness<import("@xylabs/object").BaseParamsFields & {
|
|
3
|
-
account?: import("@xyo-network/account-model").AccountInstance | "random"
|
|
4
|
-
addToResolvers?: boolean
|
|
5
|
-
additionalSigners?: import("@xyo-network/account-model").AccountInstance[]
|
|
6
|
-
allowNameResolution?: boolean
|
|
3
|
+
account?: import("@xyo-network/account-model").AccountInstance | "random";
|
|
4
|
+
addToResolvers?: boolean;
|
|
5
|
+
additionalSigners?: import("@xyo-network/account-model").AccountInstance[];
|
|
6
|
+
allowNameResolution?: boolean;
|
|
7
7
|
config: import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & {
|
|
8
8
|
schema: "network.xyo.url.witness.config";
|
|
9
9
|
} & {
|
|
10
|
-
schema: "
|
|
11
|
-
urls?: string[]
|
|
10
|
+
schema: import("./Witness").UrlWitnessConfigSchema;
|
|
11
|
+
urls?: string[];
|
|
12
12
|
}, "schema"> & {
|
|
13
13
|
schema: "network.xyo.url.witness.config";
|
|
14
14
|
}, "schema"> & {
|
|
15
15
|
schema: string;
|
|
16
16
|
};
|
|
17
|
-
ephemeralQueryAccountEnabled?: boolean
|
|
18
|
-
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[]
|
|
17
|
+
ephemeralQueryAccountEnabled?: boolean;
|
|
18
|
+
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[];
|
|
19
19
|
}>>;
|
|
20
20
|
//# sourceMappingURL=PluginNode.d.ts.map
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { UrlWitness } from './Witness';
|
|
2
2
|
export declare const UrlPlugin: () => import("@xyo-network/payloadset-plugin").PayloadSetWitnessPlugin<UrlWitness<import("@xylabs/object").BaseParamsFields & {
|
|
3
|
-
account?: import("@xyo-network/account-model").AccountInstance | "random"
|
|
4
|
-
addToResolvers?: boolean
|
|
5
|
-
additionalSigners?: import("@xyo-network/account-model").AccountInstance[]
|
|
6
|
-
allowNameResolution?: boolean
|
|
3
|
+
account?: import("@xyo-network/account-model").AccountInstance | "random";
|
|
4
|
+
addToResolvers?: boolean;
|
|
5
|
+
additionalSigners?: import("@xyo-network/account-model").AccountInstance[];
|
|
6
|
+
allowNameResolution?: boolean;
|
|
7
7
|
config: import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & {
|
|
8
8
|
schema: "network.xyo.url.witness.config";
|
|
9
9
|
} & {
|
|
10
|
-
schema: "
|
|
11
|
-
urls?: string[]
|
|
10
|
+
schema: import("./Witness").UrlWitnessConfigSchema;
|
|
11
|
+
urls?: string[];
|
|
12
12
|
}, "schema"> & {
|
|
13
13
|
schema: "network.xyo.url.witness.config";
|
|
14
14
|
}, "schema"> & {
|
|
15
15
|
schema: string;
|
|
16
16
|
};
|
|
17
|
-
ephemeralQueryAccountEnabled?: boolean
|
|
18
|
-
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[]
|
|
17
|
+
ephemeralQueryAccountEnabled?: boolean;
|
|
18
|
+
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[];
|
|
19
19
|
}>>;
|
|
20
20
|
//# sourceMappingURL=PluginNode.d.ts.map
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { UrlWitness } from './Witness';
|
|
2
2
|
export declare const UrlPlugin: () => import("@xyo-network/payloadset-plugin").PayloadSetWitnessPlugin<UrlWitness<import("@xylabs/object").BaseParamsFields & {
|
|
3
|
-
account?: import("@xyo-network/account-model").AccountInstance | "random"
|
|
4
|
-
addToResolvers?: boolean
|
|
5
|
-
additionalSigners?: import("@xyo-network/account-model").AccountInstance[]
|
|
6
|
-
allowNameResolution?: boolean
|
|
3
|
+
account?: import("@xyo-network/account-model").AccountInstance | "random";
|
|
4
|
+
addToResolvers?: boolean;
|
|
5
|
+
additionalSigners?: import("@xyo-network/account-model").AccountInstance[];
|
|
6
|
+
allowNameResolution?: boolean;
|
|
7
7
|
config: import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & import("@xyo-network/payload-model").SchemaFields & import("@xyo-network/payload-model").PayloadFields & Omit<import("@xyo-network/module-model").ArchivingModuleConfig & import("@xyo-network/module-model").ModuleConfigFields & {
|
|
8
8
|
schema: "network.xyo.url.witness.config";
|
|
9
9
|
} & {
|
|
10
|
-
schema: "
|
|
11
|
-
urls?: string[]
|
|
10
|
+
schema: import("./Witness").UrlWitnessConfigSchema;
|
|
11
|
+
urls?: string[];
|
|
12
12
|
}, "schema"> & {
|
|
13
13
|
schema: "network.xyo.url.witness.config";
|
|
14
14
|
}, "schema"> & {
|
|
15
15
|
schema: string;
|
|
16
16
|
};
|
|
17
|
-
ephemeralQueryAccountEnabled?: boolean
|
|
18
|
-
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[]
|
|
17
|
+
ephemeralQueryAccountEnabled?: boolean;
|
|
18
|
+
moduleIdentifierTransformers?: import("@xyo-network/module-model").ModuleIdentifierTransformer[];
|
|
19
19
|
}>>;
|
|
20
20
|
//# sourceMappingURL=PluginNode.d.ts.map
|