wrangler 4.83.0 → 4.84.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/config-schema.json +119 -5
- package/package.json +9 -9
- package/templates/startDevWorker/ProxyWorker.ts +11 -3
- package/wrangler-dist/InspectorProxyWorker.js +1 -0
- package/wrangler-dist/ProxyWorker.js +3 -2
- package/wrangler-dist/cli.d.ts +48 -9
- package/wrangler-dist/cli.js +601 -326
- package/wrangler-dist/metafile-cjs.json +1 -1
package/wrangler-dist/cli.js
CHANGED
|
@@ -366,6 +366,17 @@ function mapWorkerMetadataBindings(bindings) {
|
|
|
366
366
|
];
|
|
367
367
|
}
|
|
368
368
|
break;
|
|
369
|
+
case "artifacts":
|
|
370
|
+
{
|
|
371
|
+
configObj.artifacts = [
|
|
372
|
+
...configObj.artifacts ?? [],
|
|
373
|
+
{
|
|
374
|
+
binding: binding.name,
|
|
375
|
+
namespace: binding.namespace
|
|
376
|
+
}
|
|
377
|
+
];
|
|
378
|
+
}
|
|
379
|
+
break;
|
|
369
380
|
case "unsafe_hello_world": {
|
|
370
381
|
configObj.unsafe_hello_world = [
|
|
371
382
|
...configObj.unsafe_hello_world ?? [],
|
|
@@ -715,8 +726,8 @@ function constructWranglerConfig(workerOrWorkers) {
|
|
|
715
726
|
}
|
|
716
727
|
return combinedConfig;
|
|
717
728
|
}
|
|
718
|
-
var
|
|
719
|
-
"../workers-utils/dist/chunk-
|
|
729
|
+
var init_chunk_L6UDSO24 = __esm({
|
|
730
|
+
"../workers-utils/dist/chunk-L6UDSO24.mjs"() {
|
|
720
731
|
init_import_meta_url();
|
|
721
732
|
init_chunk_OZQVB3L3();
|
|
722
733
|
init_chunk_DCOBXSFB();
|
|
@@ -5286,6 +5297,16 @@ function normalizeAndValidateEnvironment(diagnostics, configPath, rawEnv, isDisp
|
|
|
5286
5297
|
validateBindingArray(envName, validateSecretsStoreSecretBinding),
|
|
5287
5298
|
[]
|
|
5288
5299
|
),
|
|
5300
|
+
artifacts: notInheritable(
|
|
5301
|
+
diagnostics,
|
|
5302
|
+
topLevelEnv,
|
|
5303
|
+
rawConfig,
|
|
5304
|
+
rawEnv,
|
|
5305
|
+
envName,
|
|
5306
|
+
"artifacts",
|
|
5307
|
+
validateBindingArray(envName, validateArtifactsBinding),
|
|
5308
|
+
[]
|
|
5309
|
+
),
|
|
5289
5310
|
unsafe_hello_world: notInheritable(
|
|
5290
5311
|
diagnostics,
|
|
5291
5312
|
topLevelEnv,
|
|
@@ -5683,6 +5704,11 @@ function validateContainerApp(envName, topLevelName, configPath) {
|
|
|
5683
5704
|
`"containers.durable_objects" is deprecated. Use the "class_name" field instead.`
|
|
5684
5705
|
);
|
|
5685
5706
|
}
|
|
5707
|
+
if ("wrangler_ssh" in containerAppOptional) {
|
|
5708
|
+
diagnostics.warnings.push(
|
|
5709
|
+
`"containers.wrangler_ssh" is deprecated. Use "containers.ssh" instead.`
|
|
5710
|
+
);
|
|
5711
|
+
}
|
|
5686
5712
|
if ("unsafe" in containerAppOptional) {
|
|
5687
5713
|
if (containerAppOptional.unsafe && typeof containerAppOptional.unsafe !== "object" || Array.isArray(containerAppOptional.unsafe)) {
|
|
5688
5714
|
diagnostics.errors.push(
|
|
@@ -5706,6 +5732,7 @@ function validateContainerApp(envName, topLevelName, configPath) {
|
|
|
5706
5732
|
"class_name",
|
|
5707
5733
|
"scheduling_policy",
|
|
5708
5734
|
"instance_type",
|
|
5735
|
+
"ssh",
|
|
5709
5736
|
"wrangler_ssh",
|
|
5710
5737
|
"authorized_keys",
|
|
5711
5738
|
"trusted_user_ca_keys",
|
|
@@ -5727,23 +5754,28 @@ function validateContainerApp(envName, topLevelName, configPath) {
|
|
|
5727
5754
|
["image", "secrets", "labels", "disk", "vcpu", "memory_mib"]
|
|
5728
5755
|
);
|
|
5729
5756
|
}
|
|
5730
|
-
|
|
5731
|
-
|
|
5732
|
-
|
|
5733
|
-
|
|
5734
|
-
|
|
5735
|
-
|
|
5757
|
+
let sshField;
|
|
5758
|
+
let sshConfig;
|
|
5759
|
+
if ("ssh" in containerAppOptional) {
|
|
5760
|
+
sshField = "ssh";
|
|
5761
|
+
sshConfig = containerAppOptional.ssh;
|
|
5762
|
+
containerAppOptional.wrangler_ssh = containerAppOptional.ssh;
|
|
5763
|
+
delete containerAppOptional.ssh;
|
|
5764
|
+
} else if ("wrangler_ssh" in containerAppOptional) {
|
|
5765
|
+
sshField = "wrangler_ssh";
|
|
5766
|
+
sshConfig = containerAppOptional.wrangler_ssh;
|
|
5767
|
+
}
|
|
5768
|
+
if (sshField !== void 0) {
|
|
5769
|
+
const sshConfigObject = typeof sshConfig === "object" && sshConfig !== null ? sshConfig : {};
|
|
5770
|
+
if (!isRequiredProperty(sshConfigObject, "enabled", "boolean")) {
|
|
5736
5771
|
diagnostics.errors.push(
|
|
5737
|
-
`${field}.
|
|
5772
|
+
`${field}.${sshField}.enabled must be a boolean`
|
|
5738
5773
|
);
|
|
5739
5774
|
}
|
|
5740
|
-
|
|
5741
|
-
|
|
5742
|
-
"port",
|
|
5743
|
-
"number"
|
|
5744
|
-
) || containerAppOptional.wrangler_ssh.port < 1 || containerAppOptional.wrangler_ssh.port > 65535) {
|
|
5775
|
+
const sshPort = "port" in sshConfigObject ? sshConfigObject.port : void 0;
|
|
5776
|
+
if (!isOptionalProperty(sshConfigObject, "port", "number") || typeof sshPort === "number" && (sshPort < 1 || sshPort > 65535)) {
|
|
5745
5777
|
diagnostics.errors.push(
|
|
5746
|
-
`${field}.
|
|
5778
|
+
`${field}.${sshField}.port must be a number between 1 and 65535 inclusive`
|
|
5747
5779
|
);
|
|
5748
5780
|
}
|
|
5749
5781
|
}
|
|
@@ -5819,6 +5851,43 @@ function validateContainerApp(envName, topLevelName, configPath) {
|
|
|
5819
5851
|
constraints.tiers,
|
|
5820
5852
|
"number"
|
|
5821
5853
|
);
|
|
5854
|
+
validateOptionalProperty(
|
|
5855
|
+
diagnostics,
|
|
5856
|
+
`${field}.constraints`,
|
|
5857
|
+
"jurisdiction",
|
|
5858
|
+
constraints.jurisdiction,
|
|
5859
|
+
"string"
|
|
5860
|
+
);
|
|
5861
|
+
if (constraints.jurisdiction && !["eu", "fedramp"].includes(constraints.jurisdiction)) {
|
|
5862
|
+
diagnostics.errors.push(
|
|
5863
|
+
`${field}.constraints.jurisdiction must be one of: "eu", "fedramp"`
|
|
5864
|
+
);
|
|
5865
|
+
}
|
|
5866
|
+
if (validateOptionalTypedArray(
|
|
5867
|
+
diagnostics,
|
|
5868
|
+
`${field}.constraints.regions`,
|
|
5869
|
+
constraints.regions,
|
|
5870
|
+
"string"
|
|
5871
|
+
) && constraints.regions && Array.isArray(constraints.regions)) {
|
|
5872
|
+
const validRegions = [
|
|
5873
|
+
"ENAM",
|
|
5874
|
+
"WNAM",
|
|
5875
|
+
"EEUR",
|
|
5876
|
+
"WEUR",
|
|
5877
|
+
"APAC",
|
|
5878
|
+
"SAM",
|
|
5879
|
+
"ME",
|
|
5880
|
+
"OC",
|
|
5881
|
+
"AFR"
|
|
5882
|
+
];
|
|
5883
|
+
for (const region of constraints.regions) {
|
|
5884
|
+
if (typeof region === "string" && !validRegions.includes(region.toUpperCase())) {
|
|
5885
|
+
diagnostics.errors.push(
|
|
5886
|
+
`${field}.constraints.regions contains invalid region "${region}". Valid regions are: ${validRegions.join(", ")}`
|
|
5887
|
+
);
|
|
5888
|
+
}
|
|
5889
|
+
}
|
|
5890
|
+
}
|
|
5822
5891
|
}
|
|
5823
5892
|
if (typeof containerAppOptional.instance_type === "string") {
|
|
5824
5893
|
validateOptionalProperty(
|
|
@@ -6145,11 +6214,11 @@ Pages requires Durable Object bindings to specify the name of the Worker where t
|
|
|
6145
6214
|
}
|
|
6146
6215
|
}
|
|
6147
6216
|
}
|
|
6148
|
-
var require_XDGAppPaths, require_XDG, require_OSPaths, require_node, require_mod_cjs, require_node2, require_mod_cjs2, require_node3, require_mod_cjs3; exports.unstable_defaultWranglerConfig = void 0; exports.experimental_patchConfig = void 0; var getJSONPath, PatchConfigError, util, objectUtil, ZodParsedType, getParsedType, ZodIssueCode, quotelessJson, ZodError, errorMap, overrideErrorMap, makeIssue, EMPTY_PATH, ParseStatus, INVALID, DIRTY, OK, isAborted, isDirty, isValid, isAsync, errorUtil, ParseInputLazyPath, handleResult, ZodType, cuidRegex, cuid2Regex, ulidRegex, uuidRegex, emailRegex, emojiRegex, ipv4Regex, ipv6Regex, datetimeRegex, ZodString, ZodNumber, ZodBigInt, ZodBoolean, ZodDate, ZodSymbol, ZodUndefined, ZodNull, ZodAny, ZodUnknown, ZodNever, ZodVoid, ZodArray, ZodObject, ZodUnion, getDiscriminator, ZodDiscriminatedUnion, ZodIntersection, ZodTuple, ZodRecord, ZodMap, ZodSet, ZodFunction, ZodLazy, ZodLiteral, ZodEnum, ZodNativeEnum, ZodPromise, ZodEffects, ZodOptional, ZodNullable, ZodDefault, ZodCatch, ZodNaN, BRAND, ZodBranded, ZodPipeline, ZodReadonly, custom, late, ZodFirstPartyTypeKind, instanceOfType, stringType, numberType, nanType, bigIntType, booleanType, dateType, symbolType, undefinedType, nullType, anyType, unknownType, neverType, voidType, arrayType, objectType, strictObjectType, unionType, discriminatedUnionType, intersectionType, tupleType, recordType, mapType, setType, functionType, lazyType, literalType, enumType, nativeEnumType, promiseType, effectsType, optionalType, nullableType, preprocessType, pipelineType, ostring, onumber, oboolean, coerce, NEVER, z, MAX_WORKFLOW_NAME_LENGTH, ALLOWED_STRING_ID_PATTERN, ALLOWED_WORKFLOW_INSTANCE_ID_REGEX, ALLOWED_WORKFLOW_NAME_REGEX, mod_esm_exports, import_mod_cjs, mod_esm_default, getC3CommandFromEnv, getWranglerSendMetricsFromEnv, getWranglerSendErrorReportsFromEnv, getCloudflareApiEnvironmentFromEnv, COMPLIANCE_REGION_CONFIG_PUBLIC, COMPLIANCE_REGION_CONFIG_UNKNOWN, getCloudflareComplianceRegionFromEnv, getCloudflareComplianceRegion, getCloudflareApiBaseUrlFromEnv, getCloudflareApiBaseUrl, getSanitizeLogs, getOutputFileDirectoryFromEnv, getOutputFilePathFromEnv, getCIMatchTag, getCIOverrideName, getCIOverrideNetworkModeHost, getCIGeneratePreviewAlias, getWorkersCIBranchName, getBuildConditionsFromEnv, getBuildPlatformFromEnv, getRegistryPath, getD1ExtraLocationChoices, getDockerPath, getSubdomainMixedStateCheckDisabled, getCloudflareLoadDevVarsFromDotEnv, getCloudflareIncludeProcessEnvFromEnv, getTraceHeader, getDisableConfigWatching, getWranglerHideBanner, getCloudflareEnv, getOpenNextDeployFromEnv, getLocalExplorerEnabledFromEnv, getBrowserRenderingHeadfulFromEnv, getWranglerCacheDirFromEnv, getCloudflaredPathFromEnv, Diagnostics, appendEnvName, isString, isValidName, isValidDateTimeStringFormat, isStringArray, isOneOf, all, isMutuallyExclusiveWith, isBoolean, validateRequiredProperty, validateAtLeastOnePropertyRequired, validateOptionalProperty, validateTypedArray, validateOptionalTypedArray, isRequiredProperty, isOptionalProperty, hasProperty, validateAdditionalProperties, getBindingNames, isBindingList, isNamespaceList, isRecord, validateUniqueNameProperty, bucketFormatMessage, friendlyBindingNames, bindingTypeFriendlyNames, ENGLISH, ALLOWED_INSTANCE_TYPES, isRoute, isRouteArray, validateTailConsumers, validateStreamingTailConsumers, validateAndNormalizeRules, validateTriggers, validateRules, validateRule, validateDefines, validateVars, validateSecrets, validateBindingsProperty, validateUnsafeSettings, validateDurableObjectBinding, workflowNameFormatMessage, validateWorkflowBinding, validateCflogfwdrObject, validateCflogfwdrBinding, validateAssetsConfig, validateNamedSimpleBinding, validateAIBinding, validateVersionMetadataBinding, validateUnsafeBinding, validateBindingArray, validateCloudchamberConfig, validateKVBinding, validateSendEmailBinding, validateQueueBinding, validateR2Binding, validateD1Binding, validateVectorizeBinding, validateAISearchNamespaceBinding, validateAISearchBinding, validateHyperdriveBinding, validateVpcServiceBinding, validateVpcNetworkBinding, validateBindingsHaveUniqueNames, validateServiceBinding, validateAnalyticsEngineBinding, validateWorkerNamespaceBinding, validateMTlsCertificateBinding, validateConsumer, validateCompatibilityDate, validatePipelineBinding, validateSecretsStoreSecretBinding, validateHelloWorldBinding, validateFlagshipBinding, validateWorkerLoaderBinding, validateRateLimitBinding, validatePreviewsConfig, validateMigrations, validateObservability, validateCache, validatePythonModules, supportedPagesConfigFields;
|
|
6217
|
+
var require_XDGAppPaths, require_XDG, require_OSPaths, require_node, require_mod_cjs, require_node2, require_mod_cjs2, require_node3, require_mod_cjs3; exports.unstable_defaultWranglerConfig = void 0; exports.experimental_patchConfig = void 0; var getJSONPath, PatchConfigError, util, objectUtil, ZodParsedType, getParsedType, ZodIssueCode, quotelessJson, ZodError, errorMap, overrideErrorMap, makeIssue, EMPTY_PATH, ParseStatus, INVALID, DIRTY, OK, isAborted, isDirty, isValid, isAsync, errorUtil, ParseInputLazyPath, handleResult, ZodType, cuidRegex, cuid2Regex, ulidRegex, uuidRegex, emailRegex, emojiRegex, ipv4Regex, ipv6Regex, datetimeRegex, ZodString, ZodNumber, ZodBigInt, ZodBoolean, ZodDate, ZodSymbol, ZodUndefined, ZodNull, ZodAny, ZodUnknown, ZodNever, ZodVoid, ZodArray, ZodObject, ZodUnion, getDiscriminator, ZodDiscriminatedUnion, ZodIntersection, ZodTuple, ZodRecord, ZodMap, ZodSet, ZodFunction, ZodLazy, ZodLiteral, ZodEnum, ZodNativeEnum, ZodPromise, ZodEffects, ZodOptional, ZodNullable, ZodDefault, ZodCatch, ZodNaN, BRAND, ZodBranded, ZodPipeline, ZodReadonly, custom, late, ZodFirstPartyTypeKind, instanceOfType, stringType, numberType, nanType, bigIntType, booleanType, dateType, symbolType, undefinedType, nullType, anyType, unknownType, neverType, voidType, arrayType, objectType, strictObjectType, unionType, discriminatedUnionType, intersectionType, tupleType, recordType, mapType, setType, functionType, lazyType, literalType, enumType, nativeEnumType, promiseType, effectsType, optionalType, nullableType, preprocessType, pipelineType, ostring, onumber, oboolean, coerce, NEVER, z, MAX_WORKFLOW_NAME_LENGTH, ALLOWED_STRING_ID_PATTERN, ALLOWED_WORKFLOW_INSTANCE_ID_REGEX, ALLOWED_WORKFLOW_NAME_REGEX, mod_esm_exports, import_mod_cjs, mod_esm_default, getC3CommandFromEnv, getWranglerSendMetricsFromEnv, getWranglerSendErrorReportsFromEnv, getCloudflareApiEnvironmentFromEnv, COMPLIANCE_REGION_CONFIG_PUBLIC, COMPLIANCE_REGION_CONFIG_UNKNOWN, getCloudflareComplianceRegionFromEnv, getCloudflareComplianceRegion, getCloudflareApiBaseUrlFromEnv, getCloudflareApiBaseUrl, getSanitizeLogs, getOutputFileDirectoryFromEnv, getOutputFilePathFromEnv, getCIMatchTag, getCIOverrideName, getCIOverrideNetworkModeHost, getCIGeneratePreviewAlias, getWorkersCIBranchName, getBuildConditionsFromEnv, getBuildPlatformFromEnv, getRegistryPath, getD1ExtraLocationChoices, getDockerPath, getSubdomainMixedStateCheckDisabled, getCloudflareLoadDevVarsFromDotEnv, getCloudflareIncludeProcessEnvFromEnv, getTraceHeader, getDisableConfigWatching, getWranglerHideBanner, getCloudflareEnv, getOpenNextDeployFromEnv, getLocalExplorerEnabledFromEnv, getBrowserRenderingHeadfulFromEnv, getWranglerCacheDirFromEnv, getCloudflaredPathFromEnv, Diagnostics, appendEnvName, isString, isValidName, isValidDateTimeStringFormat, isStringArray, isOneOf, all, isMutuallyExclusiveWith, isBoolean, validateRequiredProperty, validateAtLeastOnePropertyRequired, validateOptionalProperty, validateTypedArray, validateOptionalTypedArray, isRequiredProperty, isOptionalProperty, hasProperty, validateAdditionalProperties, getBindingNames, isBindingList, isNamespaceList, isRecord, validateUniqueNameProperty, bucketFormatMessage, friendlyBindingNames, bindingTypeFriendlyNames, ENGLISH, ALLOWED_INSTANCE_TYPES, isRoute, isRouteArray, validateTailConsumers, validateStreamingTailConsumers, validateAndNormalizeRules, validateTriggers, validateRules, validateRule, validateDefines, validateVars, validateSecrets, validateBindingsProperty, validateUnsafeSettings, validateDurableObjectBinding, workflowNameFormatMessage, validateWorkflowBinding, validateCflogfwdrObject, validateCflogfwdrBinding, validateAssetsConfig, validateNamedSimpleBinding, validateAIBinding, validateVersionMetadataBinding, validateUnsafeBinding, validateBindingArray, validateCloudchamberConfig, validateKVBinding, validateSendEmailBinding, validateQueueBinding, validateR2Binding, validateD1Binding, validateVectorizeBinding, validateAISearchNamespaceBinding, validateAISearchBinding, validateHyperdriveBinding, validateVpcServiceBinding, validateVpcNetworkBinding, validateBindingsHaveUniqueNames, validateServiceBinding, validateAnalyticsEngineBinding, validateWorkerNamespaceBinding, validateMTlsCertificateBinding, validateConsumer, validateCompatibilityDate, validatePipelineBinding, validateSecretsStoreSecretBinding, validateArtifactsBinding, validateHelloWorldBinding, validateFlagshipBinding, validateWorkerLoaderBinding, validateRateLimitBinding, validatePreviewsConfig, validateMigrations, validateObservability, validateCache, validatePythonModules, supportedPagesConfigFields;
|
|
6149
6218
|
var init_dist = __esm({
|
|
6150
6219
|
"../workers-utils/dist/index.mjs"() {
|
|
6151
6220
|
init_import_meta_url();
|
|
6152
|
-
|
|
6221
|
+
init_chunk_L6UDSO24();
|
|
6153
6222
|
init_chunk_O4YGOZSW();
|
|
6154
6223
|
init_chunk_A4F3D336();
|
|
6155
6224
|
init_chunk_A4F3D336();
|
|
@@ -6721,6 +6790,7 @@ var init_dist = __esm({
|
|
|
6721
6790
|
hyperdrive: [],
|
|
6722
6791
|
workflows: [],
|
|
6723
6792
|
secrets_store_secrets: [],
|
|
6793
|
+
artifacts: [],
|
|
6724
6794
|
services: [],
|
|
6725
6795
|
analytics_engine_datasets: [],
|
|
6726
6796
|
ai: void 0,
|
|
@@ -11227,7 +11297,7 @@ var init_dist = __esm({
|
|
|
11227
11297
|
services: "Worker",
|
|
11228
11298
|
analytics_engine_datasets: "Analytics Engine Dataset",
|
|
11229
11299
|
text_blobs: "Text Blob",
|
|
11230
|
-
browser: "Browser",
|
|
11300
|
+
browser: "Browser Run",
|
|
11231
11301
|
ai: "AI",
|
|
11232
11302
|
images: "Images",
|
|
11233
11303
|
stream: "Stream",
|
|
@@ -11241,6 +11311,7 @@ var init_dist = __esm({
|
|
|
11241
11311
|
workflows: "Workflow",
|
|
11242
11312
|
pipelines: "Pipeline",
|
|
11243
11313
|
secrets_store_secrets: "Secrets Store Secret",
|
|
11314
|
+
artifacts: "Artifacts",
|
|
11244
11315
|
ratelimits: "Rate Limit",
|
|
11245
11316
|
assets: "Assets",
|
|
11246
11317
|
unsafe_hello_world: "Hello World",
|
|
@@ -11258,7 +11329,7 @@ var init_dist = __esm({
|
|
|
11258
11329
|
send_email: "Send Email",
|
|
11259
11330
|
wasm_module: "Wasm Module",
|
|
11260
11331
|
text_blob: "Text Blob",
|
|
11261
|
-
browser: "Browser",
|
|
11332
|
+
browser: "Browser Run",
|
|
11262
11333
|
ai: "AI",
|
|
11263
11334
|
images: "Images",
|
|
11264
11335
|
stream: "Stream",
|
|
@@ -11280,6 +11351,7 @@ var init_dist = __esm({
|
|
|
11280
11351
|
mtls_certificate: "mTLS Certificate",
|
|
11281
11352
|
pipeline: "Pipeline",
|
|
11282
11353
|
secrets_store_secret: "Secrets Store Secret",
|
|
11354
|
+
artifacts: "Artifacts",
|
|
11283
11355
|
logfwdr: "logfwdr",
|
|
11284
11356
|
unsafe_hello_world: "Hello World",
|
|
11285
11357
|
flagship: "Flagship",
|
|
@@ -12116,7 +12188,8 @@ Please add a binding for each to "${fieldPath}.bindings":
|
|
|
12116
12188
|
"flagship",
|
|
12117
12189
|
"vpc_network",
|
|
12118
12190
|
"stream",
|
|
12119
|
-
"media"
|
|
12191
|
+
"media",
|
|
12192
|
+
"artifacts"
|
|
12120
12193
|
];
|
|
12121
12194
|
if (safeBindings.includes(value.type)) {
|
|
12122
12195
|
diagnostics.warnings.push(
|
|
@@ -13052,6 +13125,40 @@ ${resolution}`);
|
|
|
13052
13125
|
]);
|
|
13053
13126
|
return isValid22;
|
|
13054
13127
|
}, "validateSecretsStoreSecretBinding");
|
|
13128
|
+
validateArtifactsBinding = /* @__PURE__ */ __name2((diagnostics, field, value) => {
|
|
13129
|
+
if (typeof value !== "object" || value === null) {
|
|
13130
|
+
diagnostics.errors.push(
|
|
13131
|
+
`"artifacts" bindings should be objects, but got ${JSON.stringify(value)}`
|
|
13132
|
+
);
|
|
13133
|
+
return false;
|
|
13134
|
+
}
|
|
13135
|
+
let isValid22 = true;
|
|
13136
|
+
if (!isRequiredProperty(value, "binding", "string")) {
|
|
13137
|
+
diagnostics.errors.push(
|
|
13138
|
+
`"${field}" bindings must have a string "binding" field but got ${JSON.stringify(
|
|
13139
|
+
value
|
|
13140
|
+
)}.`
|
|
13141
|
+
);
|
|
13142
|
+
isValid22 = false;
|
|
13143
|
+
}
|
|
13144
|
+
if (!isRequiredProperty(value, "namespace", "string")) {
|
|
13145
|
+
diagnostics.errors.push(
|
|
13146
|
+
`"${field}" bindings must have a string "namespace" field but got ${JSON.stringify(
|
|
13147
|
+
value
|
|
13148
|
+
)}.`
|
|
13149
|
+
);
|
|
13150
|
+
isValid22 = false;
|
|
13151
|
+
}
|
|
13152
|
+
validateAdditionalProperties(diagnostics, field, Object.keys(value), [
|
|
13153
|
+
"binding",
|
|
13154
|
+
"namespace",
|
|
13155
|
+
"remote"
|
|
13156
|
+
]);
|
|
13157
|
+
if (!isRemoteValid(value, field, diagnostics)) {
|
|
13158
|
+
isValid22 = false;
|
|
13159
|
+
}
|
|
13160
|
+
return isValid22;
|
|
13161
|
+
}, "validateArtifactsBinding");
|
|
13055
13162
|
validateHelloWorldBinding = /* @__PURE__ */ __name2((diagnostics, field, value) => {
|
|
13056
13163
|
if (typeof value !== "object" || value === null) {
|
|
13057
13164
|
diagnostics.errors.push(
|
|
@@ -13248,6 +13355,7 @@ ${resolution}`);
|
|
|
13248
13355
|
"media",
|
|
13249
13356
|
"pipelines",
|
|
13250
13357
|
"secrets_store_secrets",
|
|
13358
|
+
"artifacts",
|
|
13251
13359
|
"unsafe_hello_world",
|
|
13252
13360
|
"worker_loaders",
|
|
13253
13361
|
"ratelimits",
|
|
@@ -13417,6 +13525,12 @@ ${resolution}`);
|
|
|
13417
13525
|
previews.secrets_store_secrets,
|
|
13418
13526
|
void 0
|
|
13419
13527
|
) && isValid22;
|
|
13528
|
+
isValid22 = validateBindingArray(envName, validateArtifactsBinding)(
|
|
13529
|
+
diagnostics,
|
|
13530
|
+
`${field}.artifacts`,
|
|
13531
|
+
previews.artifacts,
|
|
13532
|
+
void 0
|
|
13533
|
+
) && isValid22;
|
|
13420
13534
|
isValid22 = validateBindingArray(envName, validateHelloWorldBinding)(
|
|
13421
13535
|
diagnostics,
|
|
13422
13536
|
`${field}.unsafe_hello_world`,
|
|
@@ -16644,7 +16758,7 @@ var require_tree = __commonJS({
|
|
|
16644
16758
|
var require_util = __commonJS({
|
|
16645
16759
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/core/util.js"(exports, module2) {
|
|
16646
16760
|
init_import_meta_url();
|
|
16647
|
-
var
|
|
16761
|
+
var assert62 = __require("assert");
|
|
16648
16762
|
var { kDestroyed, kBodyUsed, kListeners, kBody } = require_symbols();
|
|
16649
16763
|
var { IncomingMessage } = __require("http");
|
|
16650
16764
|
var stream2 = __require("stream");
|
|
@@ -16665,7 +16779,7 @@ var require_util = __commonJS({
|
|
|
16665
16779
|
this[kBodyUsed] = false;
|
|
16666
16780
|
}
|
|
16667
16781
|
async *[Symbol.asyncIterator]() {
|
|
16668
|
-
|
|
16782
|
+
assert62(!this[kBodyUsed], "disturbed");
|
|
16669
16783
|
this[kBodyUsed] = true;
|
|
16670
16784
|
yield* this[kBody];
|
|
16671
16785
|
}
|
|
@@ -16677,7 +16791,7 @@ var require_util = __commonJS({
|
|
|
16677
16791
|
if (isStream2(body)) {
|
|
16678
16792
|
if (bodyLength(body) === 0) {
|
|
16679
16793
|
body.on("data", function() {
|
|
16680
|
-
|
|
16794
|
+
assert62(false);
|
|
16681
16795
|
});
|
|
16682
16796
|
}
|
|
16683
16797
|
if (typeof body.readableDidRead !== "boolean") {
|
|
@@ -16797,7 +16911,7 @@ var require_util = __commonJS({
|
|
|
16797
16911
|
function getHostname(host) {
|
|
16798
16912
|
if (host[0] === "[") {
|
|
16799
16913
|
const idx2 = host.indexOf("]");
|
|
16800
|
-
|
|
16914
|
+
assert62(idx2 !== -1);
|
|
16801
16915
|
return host.substring(1, idx2);
|
|
16802
16916
|
}
|
|
16803
16917
|
const idx = host.indexOf(":");
|
|
@@ -16809,7 +16923,7 @@ var require_util = __commonJS({
|
|
|
16809
16923
|
if (!host) {
|
|
16810
16924
|
return null;
|
|
16811
16925
|
}
|
|
16812
|
-
|
|
16926
|
+
assert62(typeof host === "string");
|
|
16813
16927
|
const servername = getHostname(host);
|
|
16814
16928
|
if (net3.isIP(servername)) {
|
|
16815
16929
|
return "";
|
|
@@ -17367,7 +17481,7 @@ var require_util = __commonJS({
|
|
|
17367
17481
|
function errorRequest(client, request4, err) {
|
|
17368
17482
|
try {
|
|
17369
17483
|
request4.onError(err);
|
|
17370
|
-
|
|
17484
|
+
assert62(request4.aborted);
|
|
17371
17485
|
} catch (err2) {
|
|
17372
17486
|
client.emit("error", err2);
|
|
17373
17487
|
}
|
|
@@ -17773,7 +17887,7 @@ var require_request = __commonJS({
|
|
|
17773
17887
|
InvalidArgumentError,
|
|
17774
17888
|
NotSupportedError
|
|
17775
17889
|
} = require_errors();
|
|
17776
|
-
var
|
|
17890
|
+
var assert62 = __require("assert");
|
|
17777
17891
|
var {
|
|
17778
17892
|
isValidHTTPToken,
|
|
17779
17893
|
isValidHeaderValue,
|
|
@@ -17962,8 +18076,8 @@ var require_request = __commonJS({
|
|
|
17962
18076
|
}
|
|
17963
18077
|
}
|
|
17964
18078
|
onConnect(abort) {
|
|
17965
|
-
|
|
17966
|
-
|
|
18079
|
+
assert62(!this.aborted);
|
|
18080
|
+
assert62(!this.completed);
|
|
17967
18081
|
if (this.error) {
|
|
17968
18082
|
abort(this.error);
|
|
17969
18083
|
} else {
|
|
@@ -17975,8 +18089,8 @@ var require_request = __commonJS({
|
|
|
17975
18089
|
return this[kHandler].onResponseStarted?.();
|
|
17976
18090
|
}
|
|
17977
18091
|
onHeaders(statusCode, headers, resume, statusText) {
|
|
17978
|
-
|
|
17979
|
-
|
|
18092
|
+
assert62(!this.aborted);
|
|
18093
|
+
assert62(!this.completed);
|
|
17980
18094
|
if (channels.headers.hasSubscribers) {
|
|
17981
18095
|
channels.headers.publish({ request: this, response: { statusCode, headers, statusText } });
|
|
17982
18096
|
}
|
|
@@ -17987,8 +18101,8 @@ var require_request = __commonJS({
|
|
|
17987
18101
|
}
|
|
17988
18102
|
}
|
|
17989
18103
|
onData(chunk) {
|
|
17990
|
-
|
|
17991
|
-
|
|
18104
|
+
assert62(!this.aborted);
|
|
18105
|
+
assert62(!this.completed);
|
|
17992
18106
|
if (channels.bodyChunkReceived.hasSubscribers) {
|
|
17993
18107
|
channels.bodyChunkReceived.publish({ request: this, chunk });
|
|
17994
18108
|
}
|
|
@@ -18000,14 +18114,14 @@ var require_request = __commonJS({
|
|
|
18000
18114
|
}
|
|
18001
18115
|
}
|
|
18002
18116
|
onUpgrade(statusCode, headers, socket) {
|
|
18003
|
-
|
|
18004
|
-
|
|
18117
|
+
assert62(!this.aborted);
|
|
18118
|
+
assert62(!this.completed);
|
|
18005
18119
|
return this[kHandler].onUpgrade(statusCode, headers, socket);
|
|
18006
18120
|
}
|
|
18007
18121
|
onComplete(trailers) {
|
|
18008
18122
|
this.onFinally();
|
|
18009
|
-
|
|
18010
|
-
|
|
18123
|
+
assert62(!this.aborted);
|
|
18124
|
+
assert62(!this.completed);
|
|
18011
18125
|
this.completed = true;
|
|
18012
18126
|
if (channels.trailers.hasSubscribers) {
|
|
18013
18127
|
channels.trailers.publish({ request: this, trailers });
|
|
@@ -18492,7 +18606,7 @@ var require_connect = __commonJS({
|
|
|
18492
18606
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/core/connect.js"(exports, module2) {
|
|
18493
18607
|
init_import_meta_url();
|
|
18494
18608
|
var net3 = __require("net");
|
|
18495
|
-
var
|
|
18609
|
+
var assert62 = __require("assert");
|
|
18496
18610
|
var util5 = require_util();
|
|
18497
18611
|
var { InvalidArgumentError } = require_errors();
|
|
18498
18612
|
var tls;
|
|
@@ -18541,7 +18655,7 @@ var require_connect = __commonJS({
|
|
|
18541
18655
|
}
|
|
18542
18656
|
servername = servername || options.servername || util5.getServerName(host) || null;
|
|
18543
18657
|
const sessionKey = servername || hostname2;
|
|
18544
|
-
|
|
18658
|
+
assert62(sessionKey);
|
|
18545
18659
|
const session = customSession || sessionCache.get(sessionKey) || null;
|
|
18546
18660
|
port = port || 443;
|
|
18547
18661
|
socket = tls.connect({
|
|
@@ -18561,7 +18675,7 @@ var require_connect = __commonJS({
|
|
|
18561
18675
|
sessionCache.set(sessionKey, session2);
|
|
18562
18676
|
});
|
|
18563
18677
|
} else {
|
|
18564
|
-
|
|
18678
|
+
assert62(!httpSocket, "httpSocket can only be sent on TLS update");
|
|
18565
18679
|
port = port || 80;
|
|
18566
18680
|
socket = net3.connect({
|
|
18567
18681
|
highWaterMark: 64 * 1024,
|
|
@@ -19561,7 +19675,7 @@ var require_encoding = __commonJS({
|
|
|
19561
19675
|
var require_infra = __commonJS({
|
|
19562
19676
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/infra/index.js"(exports, module2) {
|
|
19563
19677
|
init_import_meta_url();
|
|
19564
|
-
var
|
|
19678
|
+
var assert62 = __require("assert");
|
|
19565
19679
|
var { utf8DecodeBytes } = require_encoding();
|
|
19566
19680
|
function collectASequenceOfCodePoints(condition, input, position) {
|
|
19567
19681
|
let result = "";
|
|
@@ -19632,7 +19746,7 @@ var require_infra = __commonJS({
|
|
|
19632
19746
|
__name(isomorphicDecode, "isomorphicDecode");
|
|
19633
19747
|
var invalidIsomorphicEncodeValueRegex = /[^\x00-\xFF]/;
|
|
19634
19748
|
function isomorphicEncode(input) {
|
|
19635
|
-
|
|
19749
|
+
assert62(!invalidIsomorphicEncodeValueRegex.test(input));
|
|
19636
19750
|
return input;
|
|
19637
19751
|
}
|
|
19638
19752
|
__name(isomorphicEncode, "isomorphicEncode");
|
|
@@ -19661,7 +19775,7 @@ var require_infra = __commonJS({
|
|
|
19661
19775
|
if (result === void 0) {
|
|
19662
19776
|
throw new TypeError("Value is not JSON serializable");
|
|
19663
19777
|
}
|
|
19664
|
-
|
|
19778
|
+
assert62(typeof result === "string");
|
|
19665
19779
|
return result;
|
|
19666
19780
|
}
|
|
19667
19781
|
__name(serializeJavascriptValueToJSONString, "serializeJavascriptValueToJSONString");
|
|
@@ -19684,14 +19798,14 @@ var require_infra = __commonJS({
|
|
|
19684
19798
|
var require_data_url = __commonJS({
|
|
19685
19799
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/fetch/data-url.js"(exports, module2) {
|
|
19686
19800
|
init_import_meta_url();
|
|
19687
|
-
var
|
|
19801
|
+
var assert62 = __require("assert");
|
|
19688
19802
|
var { forgivingBase64, collectASequenceOfCodePoints, collectASequenceOfCodePointsFast, isomorphicDecode, removeASCIIWhitespace, removeChars } = require_infra();
|
|
19689
19803
|
var encoder = new TextEncoder();
|
|
19690
19804
|
var HTTP_TOKEN_CODEPOINTS = /^[-!#$%&'*+.^_|~A-Za-z0-9]+$/u;
|
|
19691
19805
|
var HTTP_WHITESPACE_REGEX = /[\u000A\u000D\u0009\u0020]/u;
|
|
19692
19806
|
var HTTP_QUOTED_STRING_TOKENS = /^[\u0009\u0020-\u007E\u0080-\u00FF]+$/u;
|
|
19693
19807
|
function dataURLProcessor(dataURL) {
|
|
19694
|
-
|
|
19808
|
+
assert62(dataURL.protocol === "data:");
|
|
19695
19809
|
let input = URLSerializer(dataURL, true);
|
|
19696
19810
|
input = input.slice(5);
|
|
19697
19811
|
const position = { position: 0 };
|
|
@@ -19863,7 +19977,7 @@ var require_data_url = __commonJS({
|
|
|
19863
19977
|
function collectAnHTTPQuotedString(input, position, extractValue3 = false) {
|
|
19864
19978
|
const positionStart = position.position;
|
|
19865
19979
|
let value = "";
|
|
19866
|
-
|
|
19980
|
+
assert62(input[position.position] === '"');
|
|
19867
19981
|
position.position++;
|
|
19868
19982
|
while (true) {
|
|
19869
19983
|
value += collectASequenceOfCodePoints(
|
|
@@ -19884,7 +19998,7 @@ var require_data_url = __commonJS({
|
|
|
19884
19998
|
value += input[position.position];
|
|
19885
19999
|
position.position++;
|
|
19886
20000
|
} else {
|
|
19887
|
-
|
|
20001
|
+
assert62(quoteOrBackslash === '"');
|
|
19888
20002
|
break;
|
|
19889
20003
|
}
|
|
19890
20004
|
}
|
|
@@ -19895,7 +20009,7 @@ var require_data_url = __commonJS({
|
|
|
19895
20009
|
}
|
|
19896
20010
|
__name(collectAnHTTPQuotedString, "collectAnHTTPQuotedString");
|
|
19897
20011
|
function serializeAMimeType(mimeType) {
|
|
19898
|
-
|
|
20012
|
+
assert62(mimeType !== "failure");
|
|
19899
20013
|
const { parameters, essence } = mimeType;
|
|
19900
20014
|
let serialization = essence;
|
|
19901
20015
|
for (let [name2, value] of parameters.entries()) {
|
|
@@ -20083,7 +20197,7 @@ var require_runtime_features = __commonJS({
|
|
|
20083
20197
|
var require_webidl = __commonJS({
|
|
20084
20198
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/webidl/index.js"(exports, module2) {
|
|
20085
20199
|
init_import_meta_url();
|
|
20086
|
-
var
|
|
20200
|
+
var assert62 = __require("assert");
|
|
20087
20201
|
var { types: types13, inspect: inspect3 } = __require("util");
|
|
20088
20202
|
var { runtimeFeatures } = require_runtime_features();
|
|
20089
20203
|
var UNDEFINED = 1;
|
|
@@ -20439,7 +20553,7 @@ var require_webidl = __commonJS({
|
|
|
20439
20553
|
offset = jsBufferSource.byteOffset;
|
|
20440
20554
|
length = jsBufferSource.byteLength;
|
|
20441
20555
|
} else {
|
|
20442
|
-
|
|
20556
|
+
assert62(types13.isAnyArrayBuffer(jsBufferSource));
|
|
20443
20557
|
length = jsBufferSource.byteLength;
|
|
20444
20558
|
}
|
|
20445
20559
|
if (jsArrayBuffer.detached) {
|
|
@@ -20692,7 +20806,7 @@ var require_util2 = __commonJS({
|
|
|
20692
20806
|
var { collectAnHTTPQuotedString, parseMIMEType } = require_data_url();
|
|
20693
20807
|
var { performance: performance2 } = __require("perf_hooks");
|
|
20694
20808
|
var { ReadableStreamFrom, isValidHTTPToken, normalizedMethodRecordsBase } = require_util();
|
|
20695
|
-
var
|
|
20809
|
+
var assert62 = __require("assert");
|
|
20696
20810
|
var { isUint8Array } = __require("util/types");
|
|
20697
20811
|
var { webidl } = require_webidl();
|
|
20698
20812
|
var { isomorphicEncode, collectASequenceOfCodePoints, removeChars } = require_infra();
|
|
@@ -20895,7 +21009,7 @@ var require_util2 = __commonJS({
|
|
|
20895
21009
|
__name(clonePolicyContainer, "clonePolicyContainer");
|
|
20896
21010
|
function determineRequestsReferrer(request4) {
|
|
20897
21011
|
const policy = request4.referrerPolicy;
|
|
20898
|
-
|
|
21012
|
+
assert62(policy);
|
|
20899
21013
|
let referrerSource = null;
|
|
20900
21014
|
if (request4.referrer === "client") {
|
|
20901
21015
|
const globalOrigin = getGlobalOrigin();
|
|
@@ -20959,7 +21073,7 @@ var require_util2 = __commonJS({
|
|
|
20959
21073
|
}
|
|
20960
21074
|
__name(determineRequestsReferrer, "determineRequestsReferrer");
|
|
20961
21075
|
function stripURLForReferrer(url4, originOnly = false) {
|
|
20962
|
-
|
|
21076
|
+
assert62(webidl.is.URL(url4));
|
|
20963
21077
|
url4 = new URL(url4);
|
|
20964
21078
|
if (urlIsLocal(url4)) {
|
|
20965
21079
|
return "no-referrer";
|
|
@@ -21223,7 +21337,7 @@ var require_util2 = __commonJS({
|
|
|
21223
21337
|
}
|
|
21224
21338
|
__name(readAllBytes, "readAllBytes");
|
|
21225
21339
|
function urlIsLocal(url4) {
|
|
21226
|
-
|
|
21340
|
+
assert62("protocol" in url4);
|
|
21227
21341
|
const protocol = url4.protocol;
|
|
21228
21342
|
return protocol === "about:" || protocol === "blob:" || protocol === "data:";
|
|
21229
21343
|
}
|
|
@@ -21233,7 +21347,7 @@ var require_util2 = __commonJS({
|
|
|
21233
21347
|
}
|
|
21234
21348
|
__name(urlHasHttpsScheme, "urlHasHttpsScheme");
|
|
21235
21349
|
function urlIsHttpHttpsScheme(url4) {
|
|
21236
|
-
|
|
21350
|
+
assert62("protocol" in url4);
|
|
21237
21351
|
const protocol = url4.protocol;
|
|
21238
21352
|
return protocol === "http:" || protocol === "https:";
|
|
21239
21353
|
}
|
|
@@ -21406,7 +21520,7 @@ var require_util2 = __commonJS({
|
|
|
21406
21520
|
continue;
|
|
21407
21521
|
}
|
|
21408
21522
|
} else {
|
|
21409
|
-
|
|
21523
|
+
assert62(input.charCodeAt(position.position) === 44);
|
|
21410
21524
|
position.position++;
|
|
21411
21525
|
}
|
|
21412
21526
|
}
|
|
@@ -21681,7 +21795,7 @@ var require_formdata_parser = __commonJS({
|
|
|
21681
21795
|
var { HTTP_TOKEN_CODEPOINTS } = require_data_url();
|
|
21682
21796
|
var { makeEntry } = require_formdata();
|
|
21683
21797
|
var { webidl } = require_webidl();
|
|
21684
|
-
var
|
|
21798
|
+
var assert62 = __require("assert");
|
|
21685
21799
|
var { isomorphicDecode } = require_infra();
|
|
21686
21800
|
var dd = Buffer.from("--");
|
|
21687
21801
|
var decoder = new TextDecoder();
|
|
@@ -21710,7 +21824,7 @@ var require_formdata_parser = __commonJS({
|
|
|
21710
21824
|
}
|
|
21711
21825
|
__name(validateBoundary, "validateBoundary");
|
|
21712
21826
|
function multipartFormDataParser(input, mimeType) {
|
|
21713
|
-
|
|
21827
|
+
assert62(mimeType !== "failure" && mimeType.essence === "multipart/form-data");
|
|
21714
21828
|
const boundaryString = mimeType.parameters.get("boundary");
|
|
21715
21829
|
if (boundaryString === void 0) {
|
|
21716
21830
|
throw parsingError("missing boundary in content-type header");
|
|
@@ -21766,8 +21880,8 @@ var require_formdata_parser = __commonJS({
|
|
|
21766
21880
|
} else {
|
|
21767
21881
|
value = decoderIgnoreBOM.decode(Buffer.from(body));
|
|
21768
21882
|
}
|
|
21769
|
-
|
|
21770
|
-
|
|
21883
|
+
assert62(webidl.is.USVString(name2));
|
|
21884
|
+
assert62(typeof value === "string" && webidl.is.USVString(value) || webidl.is.File(value));
|
|
21771
21885
|
entryList.push(makeEntry(name2, value, filename));
|
|
21772
21886
|
}
|
|
21773
21887
|
}
|
|
@@ -22042,7 +22156,7 @@ var require_body = __commonJS({
|
|
|
22042
22156
|
} = require_util2();
|
|
22043
22157
|
var { FormData: FormData13, setFormDataState } = require_formdata();
|
|
22044
22158
|
var { webidl } = require_webidl();
|
|
22045
|
-
var
|
|
22159
|
+
var assert62 = __require("assert");
|
|
22046
22160
|
var { isErrored, isDisturbed } = __require("stream");
|
|
22047
22161
|
var { isUint8Array } = __require("util/types");
|
|
22048
22162
|
var { serializeAMimeType } = require_data_url();
|
|
@@ -22081,7 +22195,7 @@ var require_body = __commonJS({
|
|
|
22081
22195
|
type: "bytes"
|
|
22082
22196
|
});
|
|
22083
22197
|
}
|
|
22084
|
-
|
|
22198
|
+
assert62(webidl.is.ReadableStream(stream2));
|
|
22085
22199
|
let action = null;
|
|
22086
22200
|
let source = null;
|
|
22087
22201
|
let length = null;
|
|
@@ -22189,8 +22303,8 @@ Content-Type: ${value.type || "application/octet-stream"}\r
|
|
|
22189
22303
|
__name(extractBody, "extractBody");
|
|
22190
22304
|
function safelyExtractBody(object, keepalive = false) {
|
|
22191
22305
|
if (webidl.is.ReadableStream(object)) {
|
|
22192
|
-
|
|
22193
|
-
|
|
22306
|
+
assert62(!util5.isDisturbed(object), "The body has already been consumed.");
|
|
22307
|
+
assert62(!object.locked, "The stream is locked.");
|
|
22194
22308
|
}
|
|
22195
22309
|
return extractBody(object, keepalive);
|
|
22196
22310
|
}
|
|
@@ -22324,7 +22438,7 @@ Content-Type: ${value.type || "application/octet-stream"}\r
|
|
|
22324
22438
|
var require_client_h1 = __commonJS({
|
|
22325
22439
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/dispatcher/client-h1.js"(exports, module2) {
|
|
22326
22440
|
init_import_meta_url();
|
|
22327
|
-
var
|
|
22441
|
+
var assert62 = __require("assert");
|
|
22328
22442
|
var util5 = require_util();
|
|
22329
22443
|
var { channels } = require_diagnostics();
|
|
22330
22444
|
var timers = require_timers();
|
|
@@ -22415,7 +22529,7 @@ var require_client_h1 = __commonJS({
|
|
|
22415
22529
|
* @returns {number}
|
|
22416
22530
|
*/
|
|
22417
22531
|
wasm_on_status: /* @__PURE__ */ __name((p7, at3, len) => {
|
|
22418
|
-
|
|
22532
|
+
assert62(currentParser.ptr === p7);
|
|
22419
22533
|
const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
|
|
22420
22534
|
return currentParser.onStatus(new FastBuffer(currentBufferRef.buffer, start, len));
|
|
22421
22535
|
}, "wasm_on_status"),
|
|
@@ -22424,7 +22538,7 @@ var require_client_h1 = __commonJS({
|
|
|
22424
22538
|
* @returns {number}
|
|
22425
22539
|
*/
|
|
22426
22540
|
wasm_on_message_begin: /* @__PURE__ */ __name((p7) => {
|
|
22427
|
-
|
|
22541
|
+
assert62(currentParser.ptr === p7);
|
|
22428
22542
|
return currentParser.onMessageBegin();
|
|
22429
22543
|
}, "wasm_on_message_begin"),
|
|
22430
22544
|
/**
|
|
@@ -22434,7 +22548,7 @@ var require_client_h1 = __commonJS({
|
|
|
22434
22548
|
* @returns {number}
|
|
22435
22549
|
*/
|
|
22436
22550
|
wasm_on_header_field: /* @__PURE__ */ __name((p7, at3, len) => {
|
|
22437
|
-
|
|
22551
|
+
assert62(currentParser.ptr === p7);
|
|
22438
22552
|
const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
|
|
22439
22553
|
return currentParser.onHeaderField(new FastBuffer(currentBufferRef.buffer, start, len));
|
|
22440
22554
|
}, "wasm_on_header_field"),
|
|
@@ -22445,7 +22559,7 @@ var require_client_h1 = __commonJS({
|
|
|
22445
22559
|
* @returns {number}
|
|
22446
22560
|
*/
|
|
22447
22561
|
wasm_on_header_value: /* @__PURE__ */ __name((p7, at3, len) => {
|
|
22448
|
-
|
|
22562
|
+
assert62(currentParser.ptr === p7);
|
|
22449
22563
|
const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
|
|
22450
22564
|
return currentParser.onHeaderValue(new FastBuffer(currentBufferRef.buffer, start, len));
|
|
22451
22565
|
}, "wasm_on_header_value"),
|
|
@@ -22457,7 +22571,7 @@ var require_client_h1 = __commonJS({
|
|
|
22457
22571
|
* @returns {number}
|
|
22458
22572
|
*/
|
|
22459
22573
|
wasm_on_headers_complete: /* @__PURE__ */ __name((p7, statusCode, upgrade, shouldKeepAlive) => {
|
|
22460
|
-
|
|
22574
|
+
assert62(currentParser.ptr === p7);
|
|
22461
22575
|
return currentParser.onHeadersComplete(statusCode, upgrade === 1, shouldKeepAlive === 1);
|
|
22462
22576
|
}, "wasm_on_headers_complete"),
|
|
22463
22577
|
/**
|
|
@@ -22467,7 +22581,7 @@ var require_client_h1 = __commonJS({
|
|
|
22467
22581
|
* @returns {number}
|
|
22468
22582
|
*/
|
|
22469
22583
|
wasm_on_body: /* @__PURE__ */ __name((p7, at3, len) => {
|
|
22470
|
-
|
|
22584
|
+
assert62(currentParser.ptr === p7);
|
|
22471
22585
|
const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
|
|
22472
22586
|
return currentParser.onBody(new FastBuffer(currentBufferRef.buffer, start, len));
|
|
22473
22587
|
}, "wasm_on_body"),
|
|
@@ -22476,7 +22590,7 @@ var require_client_h1 = __commonJS({
|
|
|
22476
22590
|
* @returns {number}
|
|
22477
22591
|
*/
|
|
22478
22592
|
wasm_on_message_complete: /* @__PURE__ */ __name((p7) => {
|
|
22479
|
-
|
|
22593
|
+
assert62(currentParser.ptr === p7);
|
|
22480
22594
|
return currentParser.onMessageComplete();
|
|
22481
22595
|
}, "wasm_on_message_complete")
|
|
22482
22596
|
}
|
|
@@ -22551,10 +22665,10 @@ var require_client_h1 = __commonJS({
|
|
|
22551
22665
|
if (this.socket.destroyed || !this.paused) {
|
|
22552
22666
|
return;
|
|
22553
22667
|
}
|
|
22554
|
-
|
|
22555
|
-
|
|
22668
|
+
assert62(this.ptr != null);
|
|
22669
|
+
assert62(currentParser === null);
|
|
22556
22670
|
this.llhttp.llhttp_resume(this.ptr);
|
|
22557
|
-
|
|
22671
|
+
assert62(this.timeoutType === TIMEOUT_BODY);
|
|
22558
22672
|
if (this.timeout) {
|
|
22559
22673
|
if (this.timeout.refresh) {
|
|
22560
22674
|
this.timeout.refresh();
|
|
@@ -22577,9 +22691,9 @@ var require_client_h1 = __commonJS({
|
|
|
22577
22691
|
* @param {Buffer} chunk
|
|
22578
22692
|
*/
|
|
22579
22693
|
execute(chunk) {
|
|
22580
|
-
|
|
22581
|
-
|
|
22582
|
-
|
|
22694
|
+
assert62(currentParser === null);
|
|
22695
|
+
assert62(this.ptr != null);
|
|
22696
|
+
assert62(!this.paused);
|
|
22583
22697
|
const { socket, llhttp } = this;
|
|
22584
22698
|
if (chunk.length > currentBufferSize) {
|
|
22585
22699
|
if (currentBufferPtr) {
|
|
@@ -22621,8 +22735,8 @@ var require_client_h1 = __commonJS({
|
|
|
22621
22735
|
}
|
|
22622
22736
|
}
|
|
22623
22737
|
destroy() {
|
|
22624
|
-
|
|
22625
|
-
|
|
22738
|
+
assert62(currentParser === null);
|
|
22739
|
+
assert62(this.ptr != null);
|
|
22626
22740
|
this.llhttp.llhttp_free(this.ptr);
|
|
22627
22741
|
this.ptr = null;
|
|
22628
22742
|
this.timeout && timers.clearTimeout(this.timeout);
|
|
@@ -22708,14 +22822,14 @@ var require_client_h1 = __commonJS({
|
|
|
22708
22822
|
*/
|
|
22709
22823
|
onUpgrade(head) {
|
|
22710
22824
|
const { upgrade, client, socket, headers, statusCode } = this;
|
|
22711
|
-
|
|
22712
|
-
|
|
22713
|
-
|
|
22714
|
-
|
|
22715
|
-
|
|
22825
|
+
assert62(upgrade);
|
|
22826
|
+
assert62(client[kSocket] === socket);
|
|
22827
|
+
assert62(!socket.destroyed);
|
|
22828
|
+
assert62(!this.paused);
|
|
22829
|
+
assert62((headers.length & 1) === 0);
|
|
22716
22830
|
const request4 = client[kQueue][client[kRunningIdx]];
|
|
22717
|
-
|
|
22718
|
-
|
|
22831
|
+
assert62(request4);
|
|
22832
|
+
assert62(request4.upgrade || request4.method === "CONNECT");
|
|
22719
22833
|
this.statusCode = 0;
|
|
22720
22834
|
this.statusText = "";
|
|
22721
22835
|
this.shouldKeepAlive = false;
|
|
@@ -22753,8 +22867,8 @@ var require_client_h1 = __commonJS({
|
|
|
22753
22867
|
if (!request4) {
|
|
22754
22868
|
return -1;
|
|
22755
22869
|
}
|
|
22756
|
-
|
|
22757
|
-
|
|
22870
|
+
assert62(!this.upgrade);
|
|
22871
|
+
assert62(this.statusCode < 200);
|
|
22758
22872
|
if (statusCode === 100) {
|
|
22759
22873
|
util5.destroy(socket, new SocketError("bad response", util5.getSocketInfo(socket)));
|
|
22760
22874
|
return -1;
|
|
@@ -22763,7 +22877,7 @@ var require_client_h1 = __commonJS({
|
|
|
22763
22877
|
util5.destroy(socket, new SocketError("bad upgrade", util5.getSocketInfo(socket)));
|
|
22764
22878
|
return -1;
|
|
22765
22879
|
}
|
|
22766
|
-
|
|
22880
|
+
assert62(this.timeoutType === TIMEOUT_HEADERS);
|
|
22767
22881
|
this.statusCode = statusCode;
|
|
22768
22882
|
this.shouldKeepAlive = shouldKeepAlive || // Override llhttp value which does not allow keepAlive for HEAD.
|
|
22769
22883
|
request4.method === "HEAD" && !socket[kReset2] && this.connection.toLowerCase() === "keep-alive";
|
|
@@ -22776,16 +22890,16 @@ var require_client_h1 = __commonJS({
|
|
|
22776
22890
|
}
|
|
22777
22891
|
}
|
|
22778
22892
|
if (request4.method === "CONNECT") {
|
|
22779
|
-
|
|
22893
|
+
assert62(client[kRunning] === 1);
|
|
22780
22894
|
this.upgrade = true;
|
|
22781
22895
|
return 2;
|
|
22782
22896
|
}
|
|
22783
22897
|
if (upgrade) {
|
|
22784
|
-
|
|
22898
|
+
assert62(client[kRunning] === 1);
|
|
22785
22899
|
this.upgrade = true;
|
|
22786
22900
|
return 2;
|
|
22787
22901
|
}
|
|
22788
|
-
|
|
22902
|
+
assert62((this.headers.length & 1) === 0);
|
|
22789
22903
|
this.headers = [];
|
|
22790
22904
|
this.headersSize = 0;
|
|
22791
22905
|
if (this.shouldKeepAlive && client[kPipelining]) {
|
|
@@ -22832,14 +22946,14 @@ var require_client_h1 = __commonJS({
|
|
|
22832
22946
|
return -1;
|
|
22833
22947
|
}
|
|
22834
22948
|
const request4 = client[kQueue][client[kRunningIdx]];
|
|
22835
|
-
|
|
22836
|
-
|
|
22949
|
+
assert62(request4);
|
|
22950
|
+
assert62(this.timeoutType === TIMEOUT_BODY);
|
|
22837
22951
|
if (this.timeout) {
|
|
22838
22952
|
if (this.timeout.refresh) {
|
|
22839
22953
|
this.timeout.refresh();
|
|
22840
22954
|
}
|
|
22841
22955
|
}
|
|
22842
|
-
|
|
22956
|
+
assert62(statusCode >= 200);
|
|
22843
22957
|
if (maxResponseSize > -1 && this.bytesRead + buf.length > maxResponseSize) {
|
|
22844
22958
|
util5.destroy(socket, new ResponseExceededMaxSizeError());
|
|
22845
22959
|
return -1;
|
|
@@ -22861,10 +22975,10 @@ var require_client_h1 = __commonJS({
|
|
|
22861
22975
|
if (upgrade) {
|
|
22862
22976
|
return 0;
|
|
22863
22977
|
}
|
|
22864
|
-
|
|
22865
|
-
|
|
22978
|
+
assert62(statusCode >= 100);
|
|
22979
|
+
assert62((this.headers.length & 1) === 0);
|
|
22866
22980
|
const request4 = client[kQueue][client[kRunningIdx]];
|
|
22867
|
-
|
|
22981
|
+
assert62(request4);
|
|
22868
22982
|
this.statusCode = 0;
|
|
22869
22983
|
this.statusText = "";
|
|
22870
22984
|
this.bytesRead = 0;
|
|
@@ -22883,7 +22997,7 @@ var require_client_h1 = __commonJS({
|
|
|
22883
22997
|
request4.onComplete(headers);
|
|
22884
22998
|
client[kQueue][client[kRunningIdx]++] = null;
|
|
22885
22999
|
if (socket[kWriting]) {
|
|
22886
|
-
|
|
23000
|
+
assert62(client[kRunning] === 0);
|
|
22887
23001
|
util5.destroy(socket, new InformationalError("reset"));
|
|
22888
23002
|
return constants5.ERROR.PAUSED;
|
|
22889
23003
|
} else if (!shouldKeepAlive) {
|
|
@@ -22908,7 +23022,7 @@ var require_client_h1 = __commonJS({
|
|
|
22908
23022
|
const { socket, timeoutType, client, paused } = parser2;
|
|
22909
23023
|
if (timeoutType === TIMEOUT_HEADERS) {
|
|
22910
23024
|
if (!socket[kWriting] || socket.writableNeedDrain || client[kRunning] > 1) {
|
|
22911
|
-
|
|
23025
|
+
assert62(!paused, "cannot be paused while waiting for headers");
|
|
22912
23026
|
util5.destroy(socket, new HeadersTimeoutError());
|
|
22913
23027
|
}
|
|
22914
23028
|
} else if (timeoutType === TIMEOUT_BODY) {
|
|
@@ -22916,7 +23030,7 @@ var require_client_h1 = __commonJS({
|
|
|
22916
23030
|
util5.destroy(socket, new BodyTimeoutError());
|
|
22917
23031
|
}
|
|
22918
23032
|
} else if (timeoutType === TIMEOUT_KEEP_ALIVE) {
|
|
22919
|
-
|
|
23033
|
+
assert62(client[kRunning] === 0 && client[kKeepAliveTimeoutValue]);
|
|
22920
23034
|
util5.destroy(socket, new InformationalError("socket idle timeout"));
|
|
22921
23035
|
}
|
|
22922
23036
|
}
|
|
@@ -22995,7 +23109,7 @@ var require_client_h1 = __commonJS({
|
|
|
22995
23109
|
}
|
|
22996
23110
|
__name(connectH1, "connectH1");
|
|
22997
23111
|
function onHttpSocketError(err) {
|
|
22998
|
-
|
|
23112
|
+
assert62(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
|
|
22999
23113
|
const parser2 = this[kParser];
|
|
23000
23114
|
if (err.code === "ECONNRESET" && parser2.statusCode && !parser2.shouldKeepAlive) {
|
|
23001
23115
|
parser2.onMessageComplete();
|
|
@@ -23032,7 +23146,7 @@ var require_client_h1 = __commonJS({
|
|
|
23032
23146
|
client[kSocket] = null;
|
|
23033
23147
|
client[kHTTPContext] = null;
|
|
23034
23148
|
if (client.destroyed) {
|
|
23035
|
-
|
|
23149
|
+
assert62(client[kPending] === 0);
|
|
23036
23150
|
const requests = client[kQueue].splice(client[kRunningIdx]);
|
|
23037
23151
|
for (let i7 = 0; i7 < requests.length; i7++) {
|
|
23038
23152
|
const request4 = requests[i7];
|
|
@@ -23044,7 +23158,7 @@ var require_client_h1 = __commonJS({
|
|
|
23044
23158
|
util5.errorRequest(client, request4, err);
|
|
23045
23159
|
}
|
|
23046
23160
|
client[kPendingIdx] = client[kRunningIdx];
|
|
23047
|
-
|
|
23161
|
+
assert62(client[kRunning] === 0);
|
|
23048
23162
|
client.emit("disconnect", client[kUrl], [client], err);
|
|
23049
23163
|
client[kResume]();
|
|
23050
23164
|
}
|
|
@@ -23203,13 +23317,13 @@ upgrade: ${upgrade}\r
|
|
|
23203
23317
|
} else if (util5.isIterable(body)) {
|
|
23204
23318
|
writeIterable(abort, body, client, request4, socket, contentLength, header, expectsPayload);
|
|
23205
23319
|
} else {
|
|
23206
|
-
|
|
23320
|
+
assert62(false);
|
|
23207
23321
|
}
|
|
23208
23322
|
return true;
|
|
23209
23323
|
}
|
|
23210
23324
|
__name(writeH1, "writeH1");
|
|
23211
23325
|
function writeStream(abort, body, client, request4, socket, contentLength, header, expectsPayload) {
|
|
23212
|
-
|
|
23326
|
+
assert62(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
|
|
23213
23327
|
let finished = false;
|
|
23214
23328
|
const writer = new AsyncWriter({ abort, socket, request: request4, contentLength, client, expectsPayload, header });
|
|
23215
23329
|
const onData = /* @__PURE__ */ __name(function(chunk) {
|
|
@@ -23246,7 +23360,7 @@ upgrade: ${upgrade}\r
|
|
|
23246
23360
|
return;
|
|
23247
23361
|
}
|
|
23248
23362
|
finished = true;
|
|
23249
|
-
|
|
23363
|
+
assert62(socket.destroyed || socket[kWriting] && client[kRunning] <= 1);
|
|
23250
23364
|
socket.off("drain", onDrain).off("error", onFinished);
|
|
23251
23365
|
body.removeListener("data", onData).removeListener("end", onFinished).removeListener("close", onClose);
|
|
23252
23366
|
if (!err) {
|
|
@@ -23286,12 +23400,12 @@ upgrade: ${upgrade}\r
|
|
|
23286
23400
|
\r
|
|
23287
23401
|
`, "latin1");
|
|
23288
23402
|
} else {
|
|
23289
|
-
|
|
23403
|
+
assert62(contentLength === null, "no body must not have content length");
|
|
23290
23404
|
socket.write(`${header}\r
|
|
23291
23405
|
`, "latin1");
|
|
23292
23406
|
}
|
|
23293
23407
|
} else if (util5.isBuffer(body)) {
|
|
23294
|
-
|
|
23408
|
+
assert62(contentLength === body.byteLength, "buffer body must have content length");
|
|
23295
23409
|
socket.cork();
|
|
23296
23410
|
socket.write(`${header}content-length: ${contentLength}\r
|
|
23297
23411
|
\r
|
|
@@ -23311,7 +23425,7 @@ upgrade: ${upgrade}\r
|
|
|
23311
23425
|
}
|
|
23312
23426
|
__name(writeBuffer, "writeBuffer");
|
|
23313
23427
|
async function writeBlob(abort, body, client, request4, socket, contentLength, header, expectsPayload) {
|
|
23314
|
-
|
|
23428
|
+
assert62(contentLength === body.size, "blob body must have content length");
|
|
23315
23429
|
try {
|
|
23316
23430
|
if (contentLength != null && contentLength !== body.size) {
|
|
23317
23431
|
throw new RequestContentLengthMismatchError();
|
|
@@ -23335,7 +23449,7 @@ upgrade: ${upgrade}\r
|
|
|
23335
23449
|
}
|
|
23336
23450
|
__name(writeBlob, "writeBlob");
|
|
23337
23451
|
async function writeIterable(abort, body, client, request4, socket, contentLength, header, expectsPayload) {
|
|
23338
|
-
|
|
23452
|
+
assert62(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
|
|
23339
23453
|
let callback = null;
|
|
23340
23454
|
function onDrain() {
|
|
23341
23455
|
if (callback) {
|
|
@@ -23346,7 +23460,7 @@ upgrade: ${upgrade}\r
|
|
|
23346
23460
|
}
|
|
23347
23461
|
__name(onDrain, "onDrain");
|
|
23348
23462
|
const waitForDrain = /* @__PURE__ */ __name(() => new Promise((resolve32, reject) => {
|
|
23349
|
-
|
|
23463
|
+
assert62(callback === null);
|
|
23350
23464
|
if (socket[kError]) {
|
|
23351
23465
|
reject(socket[kError]);
|
|
23352
23466
|
} else {
|
|
@@ -23499,7 +23613,7 @@ ${len.toString(16)}\r
|
|
|
23499
23613
|
const { socket, client, abort } = this;
|
|
23500
23614
|
socket[kWriting] = false;
|
|
23501
23615
|
if (err) {
|
|
23502
|
-
|
|
23616
|
+
assert62(client[kRunning] <= 1, "pipeline should only contain this request");
|
|
23503
23617
|
abort(err);
|
|
23504
23618
|
}
|
|
23505
23619
|
}
|
|
@@ -23512,7 +23626,7 @@ ${len.toString(16)}\r
|
|
|
23512
23626
|
var require_client_h2 = __commonJS({
|
|
23513
23627
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/dispatcher/client-h2.js"(exports, module2) {
|
|
23514
23628
|
init_import_meta_url();
|
|
23515
|
-
var
|
|
23629
|
+
var assert62 = __require("assert");
|
|
23516
23630
|
var { pipeline } = __require("stream");
|
|
23517
23631
|
var util5 = require_util();
|
|
23518
23632
|
var {
|
|
@@ -23738,7 +23852,7 @@ var require_client_h2 = __commonJS({
|
|
|
23738
23852
|
}
|
|
23739
23853
|
__name(onHttp2SendPing, "onHttp2SendPing");
|
|
23740
23854
|
function onHttp2SessionError(err) {
|
|
23741
|
-
|
|
23855
|
+
assert62(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
|
|
23742
23856
|
this[kSocket][kError] = err;
|
|
23743
23857
|
this[kClient][kOnError](err);
|
|
23744
23858
|
}
|
|
@@ -23771,7 +23885,7 @@ var require_client_h2 = __commonJS({
|
|
|
23771
23885
|
util5.errorRequest(client, request4, err);
|
|
23772
23886
|
client[kPendingIdx] = client[kRunningIdx];
|
|
23773
23887
|
}
|
|
23774
|
-
|
|
23888
|
+
assert62(client[kRunning] === 0);
|
|
23775
23889
|
client.emit("disconnect", client[kUrl], [client], err);
|
|
23776
23890
|
client.emit("connectionError", client[kUrl], [client], err);
|
|
23777
23891
|
client[kResume]();
|
|
@@ -23788,7 +23902,7 @@ var require_client_h2 = __commonJS({
|
|
|
23788
23902
|
state2.ping.interval = null;
|
|
23789
23903
|
}
|
|
23790
23904
|
if (client.destroyed) {
|
|
23791
|
-
|
|
23905
|
+
assert62(client[kPending] === 0);
|
|
23792
23906
|
const requests = client[kQueue].splice(client[kRunningIdx]);
|
|
23793
23907
|
for (let i7 = 0; i7 < requests.length; i7++) {
|
|
23794
23908
|
const request4 = requests[i7];
|
|
@@ -23806,13 +23920,13 @@ var require_client_h2 = __commonJS({
|
|
|
23806
23920
|
this[kHTTP2Session].destroy(err);
|
|
23807
23921
|
}
|
|
23808
23922
|
client[kPendingIdx] = client[kRunningIdx];
|
|
23809
|
-
|
|
23923
|
+
assert62(client[kRunning] === 0);
|
|
23810
23924
|
client.emit("disconnect", client[kUrl], [client], err);
|
|
23811
23925
|
client[kResume]();
|
|
23812
23926
|
}
|
|
23813
23927
|
__name(onHttp2SocketClose, "onHttp2SocketClose");
|
|
23814
23928
|
function onHttp2SocketError(err) {
|
|
23815
|
-
|
|
23929
|
+
assert62(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
|
|
23816
23930
|
this[kError] = err;
|
|
23817
23931
|
this[kClient][kOnError](err);
|
|
23818
23932
|
}
|
|
@@ -23969,7 +24083,7 @@ var require_client_h2 = __commonJS({
|
|
|
23969
24083
|
process.emitWarning(new RequestContentLengthMismatchError());
|
|
23970
24084
|
}
|
|
23971
24085
|
if (contentLength != null) {
|
|
23972
|
-
|
|
24086
|
+
assert62(body || contentLength === 0, "no body must not have content length");
|
|
23973
24087
|
headers[HTTP2_HEADER_CONTENT_LENGTH] = `${contentLength}`;
|
|
23974
24088
|
}
|
|
23975
24089
|
session.ref();
|
|
@@ -24138,7 +24252,7 @@ var require_client_h2 = __commonJS({
|
|
|
24138
24252
|
expectsPayload
|
|
24139
24253
|
);
|
|
24140
24254
|
} else {
|
|
24141
|
-
|
|
24255
|
+
assert62(false);
|
|
24142
24256
|
}
|
|
24143
24257
|
}
|
|
24144
24258
|
}
|
|
@@ -24146,7 +24260,7 @@ var require_client_h2 = __commonJS({
|
|
|
24146
24260
|
function writeBuffer(abort, h2stream, body, client, request4, socket, contentLength, expectsPayload) {
|
|
24147
24261
|
try {
|
|
24148
24262
|
if (body != null && util5.isBuffer(body)) {
|
|
24149
|
-
|
|
24263
|
+
assert62(contentLength === body.byteLength, "buffer body must have content length");
|
|
24150
24264
|
h2stream.cork();
|
|
24151
24265
|
h2stream.write(body);
|
|
24152
24266
|
h2stream.uncork();
|
|
@@ -24164,7 +24278,7 @@ var require_client_h2 = __commonJS({
|
|
|
24164
24278
|
}
|
|
24165
24279
|
__name(writeBuffer, "writeBuffer");
|
|
24166
24280
|
function writeStream(abort, socket, expectsPayload, h2stream, body, client, request4, contentLength) {
|
|
24167
|
-
|
|
24281
|
+
assert62(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
|
|
24168
24282
|
const pipe = pipeline(
|
|
24169
24283
|
body,
|
|
24170
24284
|
h2stream,
|
|
@@ -24190,7 +24304,7 @@ var require_client_h2 = __commonJS({
|
|
|
24190
24304
|
}
|
|
24191
24305
|
__name(writeStream, "writeStream");
|
|
24192
24306
|
async function writeBlob(abort, h2stream, body, client, request4, socket, contentLength, expectsPayload) {
|
|
24193
|
-
|
|
24307
|
+
assert62(contentLength === body.size, "blob body must have content length");
|
|
24194
24308
|
try {
|
|
24195
24309
|
if (contentLength != null && contentLength !== body.size) {
|
|
24196
24310
|
throw new RequestContentLengthMismatchError();
|
|
@@ -24212,7 +24326,7 @@ var require_client_h2 = __commonJS({
|
|
|
24212
24326
|
}
|
|
24213
24327
|
__name(writeBlob, "writeBlob");
|
|
24214
24328
|
async function writeIterable(abort, h2stream, body, client, request4, socket, contentLength, expectsPayload) {
|
|
24215
|
-
|
|
24329
|
+
assert62(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
|
|
24216
24330
|
let callback = null;
|
|
24217
24331
|
function onDrain() {
|
|
24218
24332
|
if (callback) {
|
|
@@ -24223,7 +24337,7 @@ var require_client_h2 = __commonJS({
|
|
|
24223
24337
|
}
|
|
24224
24338
|
__name(onDrain, "onDrain");
|
|
24225
24339
|
const waitForDrain = /* @__PURE__ */ __name(() => new Promise((resolve32, reject) => {
|
|
24226
|
-
|
|
24340
|
+
assert62(callback === null);
|
|
24227
24341
|
if (socket[kError]) {
|
|
24228
24342
|
reject(socket[kError]);
|
|
24229
24343
|
} else {
|
|
@@ -24263,7 +24377,7 @@ var require_client_h2 = __commonJS({
|
|
|
24263
24377
|
var require_client = __commonJS({
|
|
24264
24378
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/dispatcher/client.js"(exports, module2) {
|
|
24265
24379
|
init_import_meta_url();
|
|
24266
|
-
var
|
|
24380
|
+
var assert62 = __require("assert");
|
|
24267
24381
|
var net3 = __require("net");
|
|
24268
24382
|
var http6 = __require("http");
|
|
24269
24383
|
var util5 = require_util();
|
|
@@ -24576,25 +24690,25 @@ var require_client = __commonJS({
|
|
|
24576
24690
|
};
|
|
24577
24691
|
function onError(client, err) {
|
|
24578
24692
|
if (client[kRunning] === 0 && err.code !== "UND_ERR_INFO" && err.code !== "UND_ERR_SOCKET") {
|
|
24579
|
-
|
|
24693
|
+
assert62(client[kPendingIdx] === client[kRunningIdx]);
|
|
24580
24694
|
const requests = client[kQueue].splice(client[kRunningIdx]);
|
|
24581
24695
|
for (let i7 = 0; i7 < requests.length; i7++) {
|
|
24582
24696
|
const request4 = requests[i7];
|
|
24583
24697
|
util5.errorRequest(client, request4, err);
|
|
24584
24698
|
}
|
|
24585
|
-
|
|
24699
|
+
assert62(client[kSize] === 0);
|
|
24586
24700
|
}
|
|
24587
24701
|
}
|
|
24588
24702
|
__name(onError, "onError");
|
|
24589
24703
|
function connect(client) {
|
|
24590
|
-
|
|
24591
|
-
|
|
24704
|
+
assert62(!client[kConnecting]);
|
|
24705
|
+
assert62(!client[kHTTPContext]);
|
|
24592
24706
|
let { host, hostname: hostname2, protocol, port } = client[kUrl];
|
|
24593
24707
|
if (hostname2[0] === "[") {
|
|
24594
24708
|
const idx = hostname2.indexOf("]");
|
|
24595
|
-
|
|
24709
|
+
assert62(idx !== -1);
|
|
24596
24710
|
const ip = hostname2.substring(1, idx);
|
|
24597
|
-
|
|
24711
|
+
assert62(net3.isIPv6(ip));
|
|
24598
24712
|
hostname2 = ip;
|
|
24599
24713
|
}
|
|
24600
24714
|
client[kConnecting] = true;
|
|
@@ -24631,7 +24745,7 @@ var require_client = __commonJS({
|
|
|
24631
24745
|
client[kResume]();
|
|
24632
24746
|
return;
|
|
24633
24747
|
}
|
|
24634
|
-
|
|
24748
|
+
assert62(socket);
|
|
24635
24749
|
try {
|
|
24636
24750
|
client[kHTTPContext] = socket.alpnProtocol === "h2" ? connectH2(client, socket) : connectH1(client, socket);
|
|
24637
24751
|
} catch (err2) {
|
|
@@ -24690,7 +24804,7 @@ var require_client = __commonJS({
|
|
|
24690
24804
|
});
|
|
24691
24805
|
}
|
|
24692
24806
|
if (err.code === "ERR_TLS_CERT_ALTNAME_INVALID") {
|
|
24693
|
-
|
|
24807
|
+
assert62(client[kRunning] === 0);
|
|
24694
24808
|
while (client[kPending] > 0 && client[kQueue][client[kPendingIdx]].servername === client[kServerName]) {
|
|
24695
24809
|
const request4 = client[kQueue][client[kPendingIdx]++];
|
|
24696
24810
|
util5.errorRequest(client, request4, err);
|
|
@@ -24723,7 +24837,7 @@ var require_client = __commonJS({
|
|
|
24723
24837
|
function _resume(client, sync) {
|
|
24724
24838
|
while (true) {
|
|
24725
24839
|
if (client.destroyed) {
|
|
24726
|
-
|
|
24840
|
+
assert62(client[kPending] === 0);
|
|
24727
24841
|
return;
|
|
24728
24842
|
}
|
|
24729
24843
|
if (client[kClosedResolve] && !client[kSize]) {
|
|
@@ -26632,7 +26746,7 @@ var require_env_http_proxy_agent = __commonJS({
|
|
|
26632
26746
|
var require_retry_handler = __commonJS({
|
|
26633
26747
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/handler/retry-handler.js"(exports, module2) {
|
|
26634
26748
|
init_import_meta_url();
|
|
26635
|
-
var
|
|
26749
|
+
var assert62 = __require("assert");
|
|
26636
26750
|
var { kRetryHandlerDefaultRetry } = require_symbols();
|
|
26637
26751
|
var { RequestRetryError } = require_errors();
|
|
26638
26752
|
var WrapHandler = require_wrap_handler();
|
|
@@ -26819,8 +26933,8 @@ var require_retry_handler = __commonJS({
|
|
|
26819
26933
|
});
|
|
26820
26934
|
}
|
|
26821
26935
|
const { start, size, end = size ? size - 1 : null } = contentRange;
|
|
26822
|
-
|
|
26823
|
-
|
|
26936
|
+
assert62(this.start === start, "content-range mismatch");
|
|
26937
|
+
assert62(this.end == null || this.end === end, "content-range mismatch");
|
|
26824
26938
|
return;
|
|
26825
26939
|
}
|
|
26826
26940
|
if (this.end == null) {
|
|
@@ -26837,11 +26951,11 @@ var require_retry_handler = __commonJS({
|
|
|
26837
26951
|
return;
|
|
26838
26952
|
}
|
|
26839
26953
|
const { start, size, end = size ? size - 1 : null } = range;
|
|
26840
|
-
|
|
26954
|
+
assert62(
|
|
26841
26955
|
start != null && Number.isFinite(start),
|
|
26842
26956
|
"content-range mismatch"
|
|
26843
26957
|
);
|
|
26844
|
-
|
|
26958
|
+
assert62(end != null && Number.isFinite(end), "invalid content-length");
|
|
26845
26959
|
this.start = start;
|
|
26846
26960
|
this.end = end;
|
|
26847
26961
|
}
|
|
@@ -26849,8 +26963,8 @@ var require_retry_handler = __commonJS({
|
|
|
26849
26963
|
const contentLength = headers["content-length"];
|
|
26850
26964
|
this.end = contentLength != null ? Number(contentLength) - 1 : null;
|
|
26851
26965
|
}
|
|
26852
|
-
|
|
26853
|
-
|
|
26966
|
+
assert62(Number.isFinite(this.start));
|
|
26967
|
+
assert62(
|
|
26854
26968
|
this.end == null || Number.isFinite(this.end),
|
|
26855
26969
|
"invalid content-length"
|
|
26856
26970
|
);
|
|
@@ -27031,7 +27145,7 @@ var require_h2c_client = __commonJS({
|
|
|
27031
27145
|
var require_readable = __commonJS({
|
|
27032
27146
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/readable.js"(exports, module2) {
|
|
27033
27147
|
init_import_meta_url();
|
|
27034
|
-
var
|
|
27148
|
+
var assert62 = __require("assert");
|
|
27035
27149
|
var { Readable: Readable11 } = __require("stream");
|
|
27036
27150
|
var { RequestAbortedError, NotSupportedError, InvalidArgumentError, AbortError: AbortError2 } = require_errors();
|
|
27037
27151
|
var util5 = require_util();
|
|
@@ -27228,7 +27342,7 @@ var require_readable = __commonJS({
|
|
|
27228
27342
|
this[kBody] = ReadableStreamFrom(this);
|
|
27229
27343
|
if (this[kConsume]) {
|
|
27230
27344
|
this[kBody].getReader();
|
|
27231
|
-
|
|
27345
|
+
assert62(this[kBody].locked);
|
|
27232
27346
|
}
|
|
27233
27347
|
}
|
|
27234
27348
|
return this[kBody];
|
|
@@ -27299,7 +27413,7 @@ var require_readable = __commonJS({
|
|
|
27299
27413
|
}
|
|
27300
27414
|
__name(isUnusable, "isUnusable");
|
|
27301
27415
|
function consume(stream2, type) {
|
|
27302
|
-
|
|
27416
|
+
assert62(!stream2[kConsume]);
|
|
27303
27417
|
return new Promise((resolve32, reject) => {
|
|
27304
27418
|
if (isUnusable(stream2)) {
|
|
27305
27419
|
const rState = stream2._readableState;
|
|
@@ -27445,7 +27559,7 @@ var require_readable = __commonJS({
|
|
|
27445
27559
|
var require_api_request = __commonJS({
|
|
27446
27560
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/api-request.js"(exports, module2) {
|
|
27447
27561
|
init_import_meta_url();
|
|
27448
|
-
var
|
|
27562
|
+
var assert62 = __require("assert");
|
|
27449
27563
|
var { AsyncResource } = __require("async_hooks");
|
|
27450
27564
|
var { Readable: Readable11 } = require_readable();
|
|
27451
27565
|
var { InvalidArgumentError, RequestAbortedError } = require_errors();
|
|
@@ -27516,7 +27630,7 @@ var require_api_request = __commonJS({
|
|
|
27516
27630
|
abort(this.reason);
|
|
27517
27631
|
return;
|
|
27518
27632
|
}
|
|
27519
|
-
|
|
27633
|
+
assert62(this.callback);
|
|
27520
27634
|
this.abort = abort;
|
|
27521
27635
|
this.context = context2;
|
|
27522
27636
|
}
|
|
@@ -27683,7 +27797,7 @@ var require_abort_signal = __commonJS({
|
|
|
27683
27797
|
var require_api_stream = __commonJS({
|
|
27684
27798
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/api-stream.js"(exports, module2) {
|
|
27685
27799
|
init_import_meta_url();
|
|
27686
|
-
var
|
|
27800
|
+
var assert62 = __require("assert");
|
|
27687
27801
|
var { finished } = __require("stream");
|
|
27688
27802
|
var { AsyncResource } = __require("async_hooks");
|
|
27689
27803
|
var { InvalidArgumentError, InvalidReturnValueError } = require_errors();
|
|
@@ -27746,7 +27860,7 @@ var require_api_stream = __commonJS({
|
|
|
27746
27860
|
abort(this.reason);
|
|
27747
27861
|
return;
|
|
27748
27862
|
}
|
|
27749
|
-
|
|
27863
|
+
assert62(this.callback);
|
|
27750
27864
|
this.abort = abort;
|
|
27751
27865
|
this.context = context2;
|
|
27752
27866
|
}
|
|
@@ -27854,7 +27968,7 @@ var require_api_pipeline = __commonJS({
|
|
|
27854
27968
|
Duplex: Duplex2,
|
|
27855
27969
|
PassThrough: PassThrough4
|
|
27856
27970
|
} = __require("stream");
|
|
27857
|
-
var
|
|
27971
|
+
var assert62 = __require("assert");
|
|
27858
27972
|
var { AsyncResource } = __require("async_hooks");
|
|
27859
27973
|
var {
|
|
27860
27974
|
InvalidArgumentError,
|
|
@@ -27978,7 +28092,7 @@ var require_api_pipeline = __commonJS({
|
|
|
27978
28092
|
abort(this.reason);
|
|
27979
28093
|
return;
|
|
27980
28094
|
}
|
|
27981
|
-
|
|
28095
|
+
assert62(!res, "pipeline cannot be retried");
|
|
27982
28096
|
this.abort = abort;
|
|
27983
28097
|
this.context = context2;
|
|
27984
28098
|
}
|
|
@@ -28063,7 +28177,7 @@ var require_api_upgrade = __commonJS({
|
|
|
28063
28177
|
init_import_meta_url();
|
|
28064
28178
|
var { InvalidArgumentError, SocketError } = require_errors();
|
|
28065
28179
|
var { AsyncResource } = __require("async_hooks");
|
|
28066
|
-
var
|
|
28180
|
+
var assert62 = __require("assert");
|
|
28067
28181
|
var util5 = require_util();
|
|
28068
28182
|
var { kHTTP2Stream } = require_symbols();
|
|
28069
28183
|
var { addSignal, removeSignal } = require_abort_signal();
|
|
@@ -28095,7 +28209,7 @@ var require_api_upgrade = __commonJS({
|
|
|
28095
28209
|
abort(this.reason);
|
|
28096
28210
|
return;
|
|
28097
28211
|
}
|
|
28098
|
-
|
|
28212
|
+
assert62(this.callback);
|
|
28099
28213
|
this.abort = abort;
|
|
28100
28214
|
this.context = null;
|
|
28101
28215
|
}
|
|
@@ -28103,7 +28217,7 @@ var require_api_upgrade = __commonJS({
|
|
|
28103
28217
|
throw new SocketError("bad upgrade", null);
|
|
28104
28218
|
}
|
|
28105
28219
|
onUpgrade(statusCode, rawHeaders, socket) {
|
|
28106
|
-
|
|
28220
|
+
assert62(socket[kHTTP2Stream] === true ? statusCode === 200 : statusCode === 101);
|
|
28107
28221
|
const { callback, opaque, context: context2 } = this;
|
|
28108
28222
|
removeSignal(this);
|
|
28109
28223
|
this.callback = null;
|
|
@@ -28159,7 +28273,7 @@ var require_api_upgrade = __commonJS({
|
|
|
28159
28273
|
var require_api_connect = __commonJS({
|
|
28160
28274
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/api-connect.js"(exports, module2) {
|
|
28161
28275
|
init_import_meta_url();
|
|
28162
|
-
var
|
|
28276
|
+
var assert62 = __require("assert");
|
|
28163
28277
|
var { AsyncResource } = __require("async_hooks");
|
|
28164
28278
|
var { InvalidArgumentError, SocketError } = require_errors();
|
|
28165
28279
|
var util5 = require_util();
|
|
@@ -28191,7 +28305,7 @@ var require_api_connect = __commonJS({
|
|
|
28191
28305
|
abort(this.reason);
|
|
28192
28306
|
return;
|
|
28193
28307
|
}
|
|
28194
|
-
|
|
28308
|
+
assert62(this.callback);
|
|
28195
28309
|
this.abort = abort;
|
|
28196
28310
|
this.context = context2;
|
|
28197
28311
|
}
|
|
@@ -30286,7 +30400,7 @@ var require_global2 = __commonJS({
|
|
|
30286
30400
|
var require_decorator_handler = __commonJS({
|
|
30287
30401
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/handler/decorator-handler.js"(exports, module2) {
|
|
30288
30402
|
init_import_meta_url();
|
|
30289
|
-
var
|
|
30403
|
+
var assert62 = __require("assert");
|
|
30290
30404
|
var WrapHandler = require_wrap_handler();
|
|
30291
30405
|
module2.exports = class DecoratorHandler {
|
|
30292
30406
|
static {
|
|
@@ -30306,25 +30420,25 @@ var require_decorator_handler = __commonJS({
|
|
|
30306
30420
|
this.#handler.onRequestStart?.(...args);
|
|
30307
30421
|
}
|
|
30308
30422
|
onRequestUpgrade(...args) {
|
|
30309
|
-
|
|
30310
|
-
|
|
30423
|
+
assert62(!this.#onCompleteCalled);
|
|
30424
|
+
assert62(!this.#onErrorCalled);
|
|
30311
30425
|
return this.#handler.onRequestUpgrade?.(...args);
|
|
30312
30426
|
}
|
|
30313
30427
|
onResponseStart(...args) {
|
|
30314
|
-
|
|
30315
|
-
|
|
30316
|
-
|
|
30428
|
+
assert62(!this.#onCompleteCalled);
|
|
30429
|
+
assert62(!this.#onErrorCalled);
|
|
30430
|
+
assert62(!this.#onResponseStartCalled);
|
|
30317
30431
|
this.#onResponseStartCalled = true;
|
|
30318
30432
|
return this.#handler.onResponseStart?.(...args);
|
|
30319
30433
|
}
|
|
30320
30434
|
onResponseData(...args) {
|
|
30321
|
-
|
|
30322
|
-
|
|
30435
|
+
assert62(!this.#onCompleteCalled);
|
|
30436
|
+
assert62(!this.#onErrorCalled);
|
|
30323
30437
|
return this.#handler.onResponseData?.(...args);
|
|
30324
30438
|
}
|
|
30325
30439
|
onResponseEnd(...args) {
|
|
30326
|
-
|
|
30327
|
-
|
|
30440
|
+
assert62(!this.#onCompleteCalled);
|
|
30441
|
+
assert62(!this.#onErrorCalled);
|
|
30328
30442
|
this.#onCompleteCalled = true;
|
|
30329
30443
|
return this.#handler.onResponseEnd?.(...args);
|
|
30330
30444
|
}
|
|
@@ -30347,7 +30461,7 @@ var require_redirect_handler = __commonJS({
|
|
|
30347
30461
|
init_import_meta_url();
|
|
30348
30462
|
var util5 = require_util();
|
|
30349
30463
|
var { kBodyUsed } = require_symbols();
|
|
30350
|
-
var
|
|
30464
|
+
var assert62 = __require("assert");
|
|
30351
30465
|
var { InvalidArgumentError } = require_errors();
|
|
30352
30466
|
var EE = __require("events");
|
|
30353
30467
|
var redirectableStatusCodes = [300, 301, 302, 303, 307, 308];
|
|
@@ -30363,7 +30477,7 @@ var require_redirect_handler = __commonJS({
|
|
|
30363
30477
|
this[kBodyUsed] = false;
|
|
30364
30478
|
}
|
|
30365
30479
|
async *[Symbol.asyncIterator]() {
|
|
30366
|
-
|
|
30480
|
+
assert62(!this[kBodyUsed], "disturbed");
|
|
30367
30481
|
this[kBodyUsed] = true;
|
|
30368
30482
|
yield* this[kBody];
|
|
30369
30483
|
}
|
|
@@ -30393,7 +30507,7 @@ var require_redirect_handler = __commonJS({
|
|
|
30393
30507
|
if (util5.isStream(this.opts.body)) {
|
|
30394
30508
|
if (util5.bodyLength(this.opts.body) === 0) {
|
|
30395
30509
|
this.opts.body.on("data", function() {
|
|
30396
|
-
|
|
30510
|
+
assert62(false);
|
|
30397
30511
|
});
|
|
30398
30512
|
}
|
|
30399
30513
|
if (typeof this.opts.body.readableDidRead !== "boolean") {
|
|
@@ -30499,7 +30613,7 @@ var require_redirect_handler = __commonJS({
|
|
|
30499
30613
|
}
|
|
30500
30614
|
}
|
|
30501
30615
|
} else {
|
|
30502
|
-
|
|
30616
|
+
assert62(headers == null, "headers must be an object or an array");
|
|
30503
30617
|
}
|
|
30504
30618
|
return ret;
|
|
30505
30619
|
}
|
|
@@ -32537,7 +32651,7 @@ var require_memory_cache_store = __commonJS({
|
|
|
32537
32651
|
var require_cache_revalidation_handler = __commonJS({
|
|
32538
32652
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/handler/cache-revalidation-handler.js"(exports, module2) {
|
|
32539
32653
|
init_import_meta_url();
|
|
32540
|
-
var
|
|
32654
|
+
var assert62 = __require("assert");
|
|
32541
32655
|
var CacheRevalidationHandler = class {
|
|
32542
32656
|
static {
|
|
32543
32657
|
__name(this, "CacheRevalidationHandler");
|
|
@@ -32577,7 +32691,7 @@ var require_cache_revalidation_handler = __commonJS({
|
|
|
32577
32691
|
this.#handler.onRequestUpgrade?.(controller, statusCode, headers, socket);
|
|
32578
32692
|
}
|
|
32579
32693
|
onResponseStart(controller, statusCode, headers, statusMessage) {
|
|
32580
|
-
|
|
32694
|
+
assert62(this.#callback != null);
|
|
32581
32695
|
this.#successful = statusCode === 304 || this.#allowErrorStatusCodes && statusCode >= 500 && statusCode <= 504;
|
|
32582
32696
|
this.#callback(this.#successful, this.#context);
|
|
32583
32697
|
this.#callback = null;
|
|
@@ -32627,7 +32741,7 @@ var require_cache_revalidation_handler = __commonJS({
|
|
|
32627
32741
|
var require_cache2 = __commonJS({
|
|
32628
32742
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/interceptor/cache.js"(exports, module2) {
|
|
32629
32743
|
init_import_meta_url();
|
|
32630
|
-
var
|
|
32744
|
+
var assert62 = __require("assert");
|
|
32631
32745
|
var { Readable: Readable11 } = __require("stream");
|
|
32632
32746
|
var util5 = require_util();
|
|
32633
32747
|
var CacheHandler = require_cache_handler();
|
|
@@ -32723,8 +32837,8 @@ var require_cache2 = __commonJS({
|
|
|
32723
32837
|
__name(handleUncachedResponse, "handleUncachedResponse");
|
|
32724
32838
|
function sendCachedValue(handler, opts, result, age, context2, isStale2) {
|
|
32725
32839
|
const stream2 = util5.isStream(result.body) ? result.body : Readable11.from(result.body ?? []);
|
|
32726
|
-
|
|
32727
|
-
|
|
32840
|
+
assert62(!stream2.destroyed, "stream should not be destroyed");
|
|
32841
|
+
assert62(!stream2.readableDidRead, "stream should not be readableDidRead");
|
|
32728
32842
|
const controller = {
|
|
32729
32843
|
resume() {
|
|
32730
32844
|
stream2.resume();
|
|
@@ -34006,7 +34120,7 @@ var require_headers = __commonJS({
|
|
|
34006
34120
|
isValidHeaderValue
|
|
34007
34121
|
} = require_util2();
|
|
34008
34122
|
var { webidl } = require_webidl();
|
|
34009
|
-
var
|
|
34123
|
+
var assert62 = __require("assert");
|
|
34010
34124
|
var util5 = __require("util");
|
|
34011
34125
|
function isHTTPWhiteSpaceCharCode(code) {
|
|
34012
34126
|
return code === 10 || code === 13 || code === 9 || code === 32;
|
|
@@ -34231,11 +34345,11 @@ var require_headers = __commonJS({
|
|
|
34231
34345
|
const iterator = this.headersMap[Symbol.iterator]();
|
|
34232
34346
|
const firstValue = iterator.next().value;
|
|
34233
34347
|
array[0] = [firstValue[0], firstValue[1].value];
|
|
34234
|
-
|
|
34348
|
+
assert62(firstValue[1].value !== null);
|
|
34235
34349
|
for (let i7 = 1, j7 = 0, right2 = 0, left2 = 0, pivot = 0, x7, value; i7 < size; ++i7) {
|
|
34236
34350
|
value = iterator.next().value;
|
|
34237
34351
|
x7 = array[i7] = [value[0], value[1].value];
|
|
34238
|
-
|
|
34352
|
+
assert62(x7[1] !== null);
|
|
34239
34353
|
left2 = 0;
|
|
34240
34354
|
right2 = i7;
|
|
34241
34355
|
while (left2 < right2) {
|
|
@@ -34262,7 +34376,7 @@ var require_headers = __commonJS({
|
|
|
34262
34376
|
let i7 = 0;
|
|
34263
34377
|
for (const { 0: name2, 1: { value } } of this.headersMap) {
|
|
34264
34378
|
array[i7++] = [name2, value];
|
|
34265
|
-
|
|
34379
|
+
assert62(value !== null);
|
|
34266
34380
|
}
|
|
34267
34381
|
return array.sort(compareHeaderName);
|
|
34268
34382
|
}
|
|
@@ -34490,7 +34604,7 @@ var require_response = __commonJS({
|
|
|
34490
34604
|
var { webidl } = require_webidl();
|
|
34491
34605
|
var { URLSerializer } = require_data_url();
|
|
34492
34606
|
var { kConstruct } = require_symbols();
|
|
34493
|
-
var
|
|
34607
|
+
var assert62 = __require("assert");
|
|
34494
34608
|
var { isomorphicEncode, serializeJavascriptValueToJSONString } = require_infra();
|
|
34495
34609
|
var textEncoder = new TextEncoder("utf-8");
|
|
34496
34610
|
var Response11 = class _Response {
|
|
@@ -34754,7 +34868,7 @@ var require_response = __commonJS({
|
|
|
34754
34868
|
return p7 in state2 ? state2[p7] : target[p7];
|
|
34755
34869
|
},
|
|
34756
34870
|
set(target, p7, value) {
|
|
34757
|
-
|
|
34871
|
+
assert62(!(p7 in state2));
|
|
34758
34872
|
target[p7] = value;
|
|
34759
34873
|
return true;
|
|
34760
34874
|
}
|
|
@@ -34789,12 +34903,12 @@ var require_response = __commonJS({
|
|
|
34789
34903
|
body: null
|
|
34790
34904
|
});
|
|
34791
34905
|
} else {
|
|
34792
|
-
|
|
34906
|
+
assert62(false);
|
|
34793
34907
|
}
|
|
34794
34908
|
}
|
|
34795
34909
|
__name(filterResponse, "filterResponse");
|
|
34796
34910
|
function makeAppropriateNetworkError(fetchParams, err = null) {
|
|
34797
|
-
|
|
34911
|
+
assert62(isCancelled(fetchParams));
|
|
34798
34912
|
return isAborted4(fetchParams) ? makeNetworkError(Object.assign(new DOMException("The operation was aborted.", "AbortError"), { cause: err })) : makeNetworkError(Object.assign(new DOMException("Request was cancelled."), { cause: err }));
|
|
34799
34913
|
}
|
|
34800
34914
|
__name(makeAppropriateNetworkError, "makeAppropriateNetworkError");
|
|
@@ -34928,7 +35042,7 @@ var require_request2 = __commonJS({
|
|
|
34928
35042
|
var { webidl } = require_webidl();
|
|
34929
35043
|
var { URLSerializer } = require_data_url();
|
|
34930
35044
|
var { kConstruct } = require_symbols();
|
|
34931
|
-
var
|
|
35045
|
+
var assert62 = __require("assert");
|
|
34932
35046
|
var { getMaxListeners, setMaxListeners, defaultMaxListeners } = __require("events");
|
|
34933
35047
|
var kAbortController = Symbol("abortController");
|
|
34934
35048
|
var requestFinalizer = new FinalizationRegistry(({ signal, abort }) => {
|
|
@@ -35008,7 +35122,7 @@ var require_request2 = __commonJS({
|
|
|
35008
35122
|
request4 = makeRequest({ urlList: [parsedURL] });
|
|
35009
35123
|
fallbackMode = "cors";
|
|
35010
35124
|
} else {
|
|
35011
|
-
|
|
35125
|
+
assert62(webidl.is.Request(input));
|
|
35012
35126
|
request4 = input.#state;
|
|
35013
35127
|
signal = input.#signal;
|
|
35014
35128
|
this.#dispatcher = init4.dispatcher || input.#dispatcher;
|
|
@@ -35668,7 +35782,7 @@ var require_request2 = __commonJS({
|
|
|
35668
35782
|
var require_subresource_integrity = __commonJS({
|
|
35669
35783
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/subresource-integrity/subresource-integrity.js"(exports, module2) {
|
|
35670
35784
|
init_import_meta_url();
|
|
35671
|
-
var
|
|
35785
|
+
var assert62 = __require("assert");
|
|
35672
35786
|
var { runtimeFeatures } = require_runtime_features();
|
|
35673
35787
|
var validSRIHashAlgorithmTokenSet = /* @__PURE__ */ new Map([["sha256", 0], ["sha384", 1], ["sha512", 2]]);
|
|
35674
35788
|
var crypto9;
|
|
@@ -35716,7 +35830,7 @@ var require_subresource_integrity = __commonJS({
|
|
|
35716
35830
|
const result = [];
|
|
35717
35831
|
let strongest = null;
|
|
35718
35832
|
for (const item of metadataList) {
|
|
35719
|
-
|
|
35833
|
+
assert62(isValidSRIHashAlgorithm(item.alg), "Invalid SRI hash algorithm token");
|
|
35720
35834
|
if (result.length === 0) {
|
|
35721
35835
|
result.push(item);
|
|
35722
35836
|
strongest = item;
|
|
@@ -35855,7 +35969,7 @@ var require_fetch = __commonJS({
|
|
|
35855
35969
|
includesCredentials,
|
|
35856
35970
|
isTraversableNavigable
|
|
35857
35971
|
} = require_util2();
|
|
35858
|
-
var
|
|
35972
|
+
var assert62 = __require("assert");
|
|
35859
35973
|
var { safelyExtractBody, extractBody } = require_body();
|
|
35860
35974
|
var {
|
|
35861
35975
|
redirectStatusSet,
|
|
@@ -35942,7 +36056,7 @@ var require_fetch = __commonJS({
|
|
|
35942
36056
|
requestObject.signal,
|
|
35943
36057
|
() => {
|
|
35944
36058
|
locallyAborted = true;
|
|
35945
|
-
|
|
36059
|
+
assert62(controller != null);
|
|
35946
36060
|
controller.abort(requestObject.signal.reason);
|
|
35947
36061
|
const realResponse = responseObject?.deref();
|
|
35948
36062
|
abortFetch(p7, request4, realResponse, requestObject.signal.reason, controller.controller);
|
|
@@ -36048,7 +36162,7 @@ var require_fetch = __commonJS({
|
|
|
36048
36162
|
requestObject = null
|
|
36049
36163
|
// Keep alive to prevent AbortController GC, see #4627
|
|
36050
36164
|
}) {
|
|
36051
|
-
|
|
36165
|
+
assert62(dispatcher);
|
|
36052
36166
|
let taskDestination = null;
|
|
36053
36167
|
let crossOriginIsolatedCapability = false;
|
|
36054
36168
|
if (request4.client != null) {
|
|
@@ -36073,7 +36187,7 @@ var require_fetch = __commonJS({
|
|
|
36073
36187
|
// Keep requestObject alive to prevent its AbortController from being GC'd
|
|
36074
36188
|
requestObject
|
|
36075
36189
|
};
|
|
36076
|
-
|
|
36190
|
+
assert62(!request4.body || request4.body.stream);
|
|
36077
36191
|
if (request4.window === "client") {
|
|
36078
36192
|
request4.window = request4.client?.globalObject?.constructor?.name === "Window" ? request4.client : "no-window";
|
|
36079
36193
|
}
|
|
@@ -36161,7 +36275,7 @@ var require_fetch = __commonJS({
|
|
|
36161
36275
|
} else if (request4.responseTainting === "opaque") {
|
|
36162
36276
|
response = filterResponse(response, "opaque");
|
|
36163
36277
|
} else {
|
|
36164
|
-
|
|
36278
|
+
assert62(false);
|
|
36165
36279
|
}
|
|
36166
36280
|
}
|
|
36167
36281
|
let internalResponse = response.status === 0 ? response : response.internalResponse;
|
|
@@ -36394,7 +36508,7 @@ var require_fetch = __commonJS({
|
|
|
36394
36508
|
} else if (request4.redirect === "follow") {
|
|
36395
36509
|
response = await httpRedirectFetch(fetchParams, response);
|
|
36396
36510
|
} else {
|
|
36397
|
-
|
|
36511
|
+
assert62(false);
|
|
36398
36512
|
}
|
|
36399
36513
|
}
|
|
36400
36514
|
response.timingInfo = timingInfo;
|
|
@@ -36448,7 +36562,7 @@ var require_fetch = __commonJS({
|
|
|
36448
36562
|
request4.headersList.delete("host", true);
|
|
36449
36563
|
}
|
|
36450
36564
|
if (request4.body != null) {
|
|
36451
|
-
|
|
36565
|
+
assert62(request4.body.source != null);
|
|
36452
36566
|
request4.body = safelyExtractBody(request4.body.source)[0];
|
|
36453
36567
|
}
|
|
36454
36568
|
const timingInfo = fetchParams.timingInfo;
|
|
@@ -36600,7 +36714,7 @@ var require_fetch = __commonJS({
|
|
|
36600
36714
|
}
|
|
36601
36715
|
__name(httpNetworkOrCacheFetch, "httpNetworkOrCacheFetch");
|
|
36602
36716
|
async function httpNetworkFetch(fetchParams, includeCredentials = false, forceNewConnection = false) {
|
|
36603
|
-
|
|
36717
|
+
assert62(!fetchParams.controller.connection || fetchParams.controller.connection.destroyed);
|
|
36604
36718
|
fetchParams.controller.connection = {
|
|
36605
36719
|
abort: null,
|
|
36606
36720
|
destroyed: false,
|
|
@@ -36954,7 +37068,7 @@ var require_fetch = __commonJS({
|
|
|
36954
37068
|
var require_util3 = __commonJS({
|
|
36955
37069
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/cache/util.js"(exports, module2) {
|
|
36956
37070
|
init_import_meta_url();
|
|
36957
|
-
var
|
|
37071
|
+
var assert62 = __require("assert");
|
|
36958
37072
|
var { URLSerializer } = require_data_url();
|
|
36959
37073
|
var { isValidHeaderName } = require_util2();
|
|
36960
37074
|
function urlEquals(A4, B4, excludeFragment = false) {
|
|
@@ -36964,7 +37078,7 @@ var require_util3 = __commonJS({
|
|
|
36964
37078
|
}
|
|
36965
37079
|
__name(urlEquals, "urlEquals");
|
|
36966
37080
|
function getFieldValues(header) {
|
|
36967
|
-
|
|
37081
|
+
assert62(header !== null);
|
|
36968
37082
|
const values = [];
|
|
36969
37083
|
for (let value of header.split(",")) {
|
|
36970
37084
|
value = value.trim();
|
|
@@ -36986,7 +37100,7 @@ var require_util3 = __commonJS({
|
|
|
36986
37100
|
var require_cache3 = __commonJS({
|
|
36987
37101
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/cache/cache.js"(exports, module2) {
|
|
36988
37102
|
init_import_meta_url();
|
|
36989
|
-
var
|
|
37103
|
+
var assert62 = __require("assert");
|
|
36990
37104
|
var { kConstruct } = require_symbols();
|
|
36991
37105
|
var { urlEquals, getFieldValues } = require_util3();
|
|
36992
37106
|
var { kEnumerableProperty, isDisturbed } = require_util();
|
|
@@ -37239,7 +37353,7 @@ var require_cache3 = __commonJS({
|
|
|
37239
37353
|
return false;
|
|
37240
37354
|
}
|
|
37241
37355
|
} else {
|
|
37242
|
-
|
|
37356
|
+
assert62(typeof request4 === "string");
|
|
37243
37357
|
r10 = getRequestState(new Request7(request4));
|
|
37244
37358
|
}
|
|
37245
37359
|
const operations = [];
|
|
@@ -37350,7 +37464,7 @@ var require_cache3 = __commonJS({
|
|
|
37350
37464
|
}
|
|
37351
37465
|
for (const requestResponse of requestResponses) {
|
|
37352
37466
|
const idx = cache5.indexOf(requestResponse);
|
|
37353
|
-
|
|
37467
|
+
assert62(idx !== -1);
|
|
37354
37468
|
cache5.splice(idx, 1);
|
|
37355
37469
|
}
|
|
37356
37470
|
} else if (operation.type === "put") {
|
|
@@ -37382,7 +37496,7 @@ var require_cache3 = __commonJS({
|
|
|
37382
37496
|
requestResponses = this.#queryCache(operation.request);
|
|
37383
37497
|
for (const requestResponse of requestResponses) {
|
|
37384
37498
|
const idx = cache5.indexOf(requestResponse);
|
|
37385
|
-
|
|
37499
|
+
assert62(idx !== -1);
|
|
37386
37500
|
cache5.splice(idx, 1);
|
|
37387
37501
|
}
|
|
37388
37502
|
cache5.push([operation.request, operation.response]);
|
|
@@ -37845,7 +37959,7 @@ var require_parse = __commonJS({
|
|
|
37845
37959
|
var { collectASequenceOfCodePointsFast } = require_infra();
|
|
37846
37960
|
var { maxNameValuePairSize, maxAttributeValueSize } = require_constants4();
|
|
37847
37961
|
var { isCTLExcludingHtab } = require_util4();
|
|
37848
|
-
var
|
|
37962
|
+
var assert62 = __require("assert");
|
|
37849
37963
|
var { unescape: qsUnescape } = __require("querystring");
|
|
37850
37964
|
function parseSetCookie(header) {
|
|
37851
37965
|
if (isCTLExcludingHtab(header)) {
|
|
@@ -37889,7 +38003,7 @@ var require_parse = __commonJS({
|
|
|
37889
38003
|
if (unparsedAttributes.length === 0) {
|
|
37890
38004
|
return cookieAttributeList;
|
|
37891
38005
|
}
|
|
37892
|
-
|
|
38006
|
+
assert62(unparsedAttributes[0] === ";");
|
|
37893
38007
|
unparsedAttributes = unparsedAttributes.slice(1);
|
|
37894
38008
|
let cookieAv = "";
|
|
37895
38009
|
if (unparsedAttributes.includes(";")) {
|
|
@@ -38768,7 +38882,7 @@ var require_connection = __commonJS({
|
|
|
38768
38882
|
var { Headers: Headers5, getHeadersList } = require_headers();
|
|
38769
38883
|
var { getDecodeSplit } = require_util2();
|
|
38770
38884
|
var { WebsocketFrameSend } = require_frame();
|
|
38771
|
-
var
|
|
38885
|
+
var assert62 = __require("assert");
|
|
38772
38886
|
var { runtimeFeatures } = require_runtime_features();
|
|
38773
38887
|
var crypto9 = runtimeFeatures.has("crypto") ? __require("crypto") : null;
|
|
38774
38888
|
var warningEmitted2 = false;
|
|
@@ -38874,7 +38988,7 @@ var require_connection = __commonJS({
|
|
|
38874
38988
|
if (reason.length !== 0 && code === null) {
|
|
38875
38989
|
code = 1e3;
|
|
38876
38990
|
}
|
|
38877
|
-
|
|
38991
|
+
assert62(code === null || Number.isInteger(code));
|
|
38878
38992
|
if (code === null && reason.length === 0) {
|
|
38879
38993
|
frame.frameData = emptyBuffer;
|
|
38880
38994
|
} else if (code !== null && reason === null) {
|
|
@@ -39016,7 +39130,7 @@ var require_receiver = __commonJS({
|
|
|
39016
39130
|
"../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/websocket/receiver.js"(exports, module2) {
|
|
39017
39131
|
init_import_meta_url();
|
|
39018
39132
|
var { Writable: Writable5 } = __require("stream");
|
|
39019
|
-
var
|
|
39133
|
+
var assert62 = __require("assert");
|
|
39020
39134
|
var { parserStates, opcodes, states, emptyBuffer, sentCloseFrameState } = require_constants5();
|
|
39021
39135
|
var {
|
|
39022
39136
|
isValidStatusCode,
|
|
@@ -39262,7 +39376,7 @@ var require_receiver = __commonJS({
|
|
|
39262
39376
|
return output;
|
|
39263
39377
|
}
|
|
39264
39378
|
parseCloseBody(data) {
|
|
39265
|
-
|
|
39379
|
+
assert62(data.length !== 1);
|
|
39266
39380
|
let code;
|
|
39267
39381
|
if (data.length >= 2) {
|
|
39268
39382
|
code = data.readUInt16BE(0);
|
|
@@ -44871,6 +44985,12 @@ function convertConfigToBindings(config, options) {
|
|
|
44871
44985
|
}
|
|
44872
44986
|
break;
|
|
44873
44987
|
}
|
|
44988
|
+
case "artifacts": {
|
|
44989
|
+
for (const { binding, ...x7 } of info) {
|
|
44990
|
+
output[binding] = { type: "artifacts", ...x7 };
|
|
44991
|
+
}
|
|
44992
|
+
break;
|
|
44993
|
+
}
|
|
44874
44994
|
case "unsafe_hello_world": {
|
|
44875
44995
|
if (pages) {
|
|
44876
44996
|
break;
|
|
@@ -45134,11 +45254,12 @@ function extractBindingsOfType(type, bindings) {
|
|
|
45134
45254
|
[getBindingKey(type)]: binding[0]
|
|
45135
45255
|
}));
|
|
45136
45256
|
}
|
|
45137
|
-
var nameBindings;
|
|
45257
|
+
var PREVIEW_TOKEN_REFRESH_INTERVAL, nameBindings;
|
|
45138
45258
|
var init_utils2 = __esm({
|
|
45139
45259
|
"src/api/startDevWorker/utils.ts"() {
|
|
45140
45260
|
init_import_meta_url();
|
|
45141
45261
|
__name(assertNever2, "assertNever");
|
|
45262
|
+
PREVIEW_TOKEN_REFRESH_INTERVAL = 50 * 60 * 1e3;
|
|
45142
45263
|
__name(createDeferred, "createDeferred");
|
|
45143
45264
|
__name(unwrapHook, "unwrapHook");
|
|
45144
45265
|
__name(getBinaryFileContents, "getBinaryFileContents");
|
|
@@ -48381,7 +48502,7 @@ var require_signal_exit = __commonJS({
|
|
|
48381
48502
|
};
|
|
48382
48503
|
};
|
|
48383
48504
|
} else {
|
|
48384
|
-
|
|
48505
|
+
assert62 = __require("assert");
|
|
48385
48506
|
signals = require_signals();
|
|
48386
48507
|
isWin = /^win/i.test(process19.platform);
|
|
48387
48508
|
EE = __require("events");
|
|
@@ -48404,7 +48525,7 @@ var require_signal_exit = __commonJS({
|
|
|
48404
48525
|
return function() {
|
|
48405
48526
|
};
|
|
48406
48527
|
}
|
|
48407
|
-
|
|
48528
|
+
assert62.equal(typeof cb2, "function", "a callback must be provided for exit handler");
|
|
48408
48529
|
if (loaded === false) {
|
|
48409
48530
|
load();
|
|
48410
48531
|
}
|
|
@@ -48510,7 +48631,7 @@ var require_signal_exit = __commonJS({
|
|
|
48510
48631
|
}
|
|
48511
48632
|
}, "processEmit");
|
|
48512
48633
|
}
|
|
48513
|
-
var
|
|
48634
|
+
var assert62;
|
|
48514
48635
|
var signals;
|
|
48515
48636
|
var isWin;
|
|
48516
48637
|
var EE;
|
|
@@ -49721,7 +49842,7 @@ function getProcessAncestry(pid = process.pid) {
|
|
|
49721
49842
|
}
|
|
49722
49843
|
}
|
|
49723
49844
|
var init_dist2 = __esm({
|
|
49724
|
-
"../../node_modules/.pnpm/process-ancestry@0.0
|
|
49845
|
+
"../../node_modules/.pnpm/process-ancestry@0.1.0/node_modules/process-ancestry/dist/index.js"() {
|
|
49725
49846
|
init_import_meta_url();
|
|
49726
49847
|
__name(getProcessInfo, "getProcessInfo");
|
|
49727
49848
|
__name(getAncestryUnix, "getAncestryUnix");
|
|
@@ -49731,7 +49852,7 @@ var init_dist2 = __esm({
|
|
|
49731
49852
|
}
|
|
49732
49853
|
});
|
|
49733
49854
|
|
|
49734
|
-
// ../../node_modules/.pnpm/am-i-vibing@0.1.
|
|
49855
|
+
// ../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/detector-CddkGnEB.mjs
|
|
49735
49856
|
function checkEnvVar(envVarDef, env6 = process.env) {
|
|
49736
49857
|
const [envVar, expectedValue] = typeof envVarDef === "string" ? [envVarDef, void 0] : envVarDef;
|
|
49737
49858
|
const actualValue = env6[envVar];
|
|
@@ -49771,11 +49892,18 @@ function createDetectedResult(provider) {
|
|
|
49771
49892
|
};
|
|
49772
49893
|
}
|
|
49773
49894
|
function detectAgenticEnvironment(env6 = process.env, processAncestry) {
|
|
49774
|
-
for (const provider of providers)
|
|
49775
|
-
|
|
49776
|
-
|
|
49777
|
-
if (
|
|
49778
|
-
|
|
49895
|
+
for (const provider of providers) if (provider.envVars?.some((group) => checkEnvVars(group, env6))) return createDetectedResult(provider);
|
|
49896
|
+
let cachedAncestry = processAncestry;
|
|
49897
|
+
const getAncestry = /* @__PURE__ */ __name(() => {
|
|
49898
|
+
if (cachedAncestry === void 0) try {
|
|
49899
|
+
cachedAncestry = getProcessAncestry();
|
|
49900
|
+
} catch {
|
|
49901
|
+
cachedAncestry = [];
|
|
49902
|
+
}
|
|
49903
|
+
return cachedAncestry;
|
|
49904
|
+
}, "getAncestry");
|
|
49905
|
+
for (const provider of providers) if (provider.processChecks?.some((processName) => checkProcess(processName, getAncestry()))) return createDetectedResult(provider);
|
|
49906
|
+
for (const provider of providers) if (runCustomDetectors(provider)) return createDetectedResult(provider);
|
|
49779
49907
|
return {
|
|
49780
49908
|
isAgentic: false,
|
|
49781
49909
|
id: null,
|
|
@@ -49784,16 +49912,17 @@ function detectAgenticEnvironment(env6 = process.env, processAncestry) {
|
|
|
49784
49912
|
};
|
|
49785
49913
|
}
|
|
49786
49914
|
var providers;
|
|
49787
|
-
var
|
|
49788
|
-
"../../node_modules/.pnpm/am-i-vibing@0.1.
|
|
49915
|
+
var init_detector_CddkGnEB = __esm({
|
|
49916
|
+
"../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/detector-CddkGnEB.mjs"() {
|
|
49789
49917
|
init_import_meta_url();
|
|
49790
49918
|
init_dist2();
|
|
49791
49919
|
providers = [
|
|
49792
49920
|
{
|
|
49793
|
-
id: "
|
|
49794
|
-
name: "
|
|
49921
|
+
id: "opencode",
|
|
49922
|
+
name: "OpenCode",
|
|
49795
49923
|
type: "agent",
|
|
49796
49924
|
envVars: [{ any: [
|
|
49925
|
+
"OPENCODE",
|
|
49797
49926
|
"OPENCODE_BIN_PATH",
|
|
49798
49927
|
"OPENCODE_SERVER",
|
|
49799
49928
|
"OPENCODE_APP_INFO",
|
|
@@ -49934,11 +50063,11 @@ var init_detector_LEsE74_L = __esm({
|
|
|
49934
50063
|
}
|
|
49935
50064
|
});
|
|
49936
50065
|
|
|
49937
|
-
// ../../node_modules/.pnpm/am-i-vibing@0.1.
|
|
50066
|
+
// ../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/index.mjs
|
|
49938
50067
|
var init_dist3 = __esm({
|
|
49939
|
-
"../../node_modules/.pnpm/am-i-vibing@0.1.
|
|
50068
|
+
"../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/index.mjs"() {
|
|
49940
50069
|
init_import_meta_url();
|
|
49941
|
-
|
|
50070
|
+
init_detector_CddkGnEB();
|
|
49942
50071
|
}
|
|
49943
50072
|
});
|
|
49944
50073
|
|
|
@@ -54623,7 +54752,7 @@ var name, version;
|
|
|
54623
54752
|
var init_package = __esm({
|
|
54624
54753
|
"package.json"() {
|
|
54625
54754
|
name = "wrangler";
|
|
54626
|
-
version = "4.
|
|
54755
|
+
version = "4.84.0";
|
|
54627
54756
|
}
|
|
54628
54757
|
});
|
|
54629
54758
|
function getWranglerVersion() {
|
|
@@ -62698,6 +62827,7 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
|
|
|
62698
62827
|
"secrets_store_secret",
|
|
62699
62828
|
bindings
|
|
62700
62829
|
);
|
|
62830
|
+
const artifacts = extractBindingsOfType("artifacts", bindings);
|
|
62701
62831
|
const services = extractBindingsOfType("service", bindings);
|
|
62702
62832
|
const vpc_services = extractBindingsOfType("vpc_service", bindings);
|
|
62703
62833
|
const vpc_networks = extractBindingsOfType("vpc_network", bindings);
|
|
@@ -62755,9 +62885,7 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
|
|
|
62755
62885
|
if (context2.local && context2.registry !== null) {
|
|
62756
62886
|
const registryDefinition = context2.registry?.[script_name];
|
|
62757
62887
|
hasConnectionStatus = true;
|
|
62758
|
-
if (registryDefinition && registryDefinition.
|
|
62759
|
-
(d8) => d8.className === class_name
|
|
62760
|
-
)) {
|
|
62888
|
+
if (registryDefinition && registryDefinition.debugPortAddress) {
|
|
62761
62889
|
value += `, defined in ${script_name}`;
|
|
62762
62890
|
mode = getMode({ isSimulatedLocally: true, connected: true });
|
|
62763
62891
|
} else {
|
|
@@ -62983,6 +63111,18 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
|
|
|
62983
63111
|
})
|
|
62984
63112
|
);
|
|
62985
63113
|
}
|
|
63114
|
+
if (artifacts.length > 0) {
|
|
63115
|
+
output.push(
|
|
63116
|
+
...artifacts.map(({ binding, namespace }) => {
|
|
63117
|
+
return {
|
|
63118
|
+
name: binding,
|
|
63119
|
+
type: getBindingTypeFriendlyName("artifacts"),
|
|
63120
|
+
value: namespace,
|
|
63121
|
+
mode: getMode({ isSimulatedLocally: false })
|
|
63122
|
+
};
|
|
63123
|
+
})
|
|
63124
|
+
);
|
|
63125
|
+
}
|
|
62986
63126
|
if (unsafe_hello_world.length > 0) {
|
|
62987
63127
|
output.push(
|
|
62988
63128
|
...unsafe_hello_world.map(({ binding, enable_timer }) => {
|
|
@@ -63027,7 +63167,7 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
|
|
|
63027
63167
|
} else {
|
|
63028
63168
|
const registryDefinition = context2.registry?.[service];
|
|
63029
63169
|
hasConnectionStatus = true;
|
|
63030
|
-
if (registryDefinition &&
|
|
63170
|
+
if (registryDefinition && registryDefinition.debugPortAddress) {
|
|
63031
63171
|
mode = getMode({ isSimulatedLocally: true, connected: true });
|
|
63032
63172
|
} else {
|
|
63033
63173
|
mode = getMode({ isSimulatedLocally: true, connected: false });
|
|
@@ -63689,6 +63829,7 @@ function buildMiniflareBindingOptions(config, remoteProxyConnectionString) {
|
|
|
63689
63829
|
bindings
|
|
63690
63830
|
);
|
|
63691
63831
|
const flagshipBindings = extractBindingsOfType("flagship", bindings);
|
|
63832
|
+
const artifactsBindings = extractBindingsOfType("artifacts", bindings);
|
|
63692
63833
|
const workerLoaders = extractBindingsOfType("worker_loader", bindings);
|
|
63693
63834
|
const sendEmailBindings = extractBindingsOfType("send_email", bindings);
|
|
63694
63835
|
const ratelimits = [
|
|
@@ -63789,6 +63930,9 @@ function buildMiniflareBindingOptions(config, remoteProxyConnectionString) {
|
|
|
63789
63930
|
for (const media of mediaBindings) {
|
|
63790
63931
|
warnOrError("media", media.remote, "always-remote");
|
|
63791
63932
|
}
|
|
63933
|
+
for (const artifact of artifactsBindings) {
|
|
63934
|
+
warnOrError("artifacts", artifact.remote, "always-remote");
|
|
63935
|
+
}
|
|
63792
63936
|
const unsafeBindings = [];
|
|
63793
63937
|
const unsafeBindingsWithLocalDev = Object.entries(bindings ?? {}).filter(
|
|
63794
63938
|
(b11) => isUnsafeServiceBindingWithDevCfg(b11[1])
|
|
@@ -63927,6 +64071,15 @@ function buildMiniflareBindingOptions(config, remoteProxyConnectionString) {
|
|
|
63927
64071
|
}
|
|
63928
64072
|
])
|
|
63929
64073
|
),
|
|
64074
|
+
artifacts: Object.fromEntries(
|
|
64075
|
+
artifactsBindings.map((binding) => [
|
|
64076
|
+
binding.binding,
|
|
64077
|
+
{
|
|
64078
|
+
namespace: binding.namespace,
|
|
64079
|
+
remoteProxyConnectionString
|
|
64080
|
+
}
|
|
64081
|
+
])
|
|
64082
|
+
),
|
|
63930
64083
|
workerLoaders: Object.fromEntries(
|
|
63931
64084
|
workerLoaders.map(({ binding }) => [binding, {}])
|
|
63932
64085
|
),
|
|
@@ -64069,7 +64222,7 @@ function buildSitesOptions({
|
|
|
64069
64222
|
}
|
|
64070
64223
|
async function buildMiniflareOptions(log2, config, proxyToUserWorkerAuthenticationSecret, remoteProxyConnectionString, onDevRegistryUpdate) {
|
|
64071
64224
|
const upstream = typeof config.localUpstream === "string" ? `${config.upstreamProtocol}://${config.localUpstream}` : void 0;
|
|
64072
|
-
const { sourceOptions
|
|
64225
|
+
const { sourceOptions } = await buildSourceOptions(config);
|
|
64073
64226
|
const { bindingOptions, externalWorkers } = buildMiniflareBindingOptions(
|
|
64074
64227
|
config,
|
|
64075
64228
|
remoteProxyConnectionString
|
|
@@ -64088,7 +64241,6 @@ async function buildMiniflareOptions(log2, config, proxyToUserWorkerAuthenticati
|
|
|
64088
64241
|
liveReload: config.liveReload,
|
|
64089
64242
|
upstream,
|
|
64090
64243
|
unsafeDevRegistryPath: config.devRegistry,
|
|
64091
|
-
unsafeDevRegistryDurableObjectProxy: true,
|
|
64092
64244
|
unsafeHandleDevRegistryUpdate: onDevRegistryUpdate,
|
|
64093
64245
|
unsafeProxySharedSecret: proxyToUserWorkerAuthenticationSecret,
|
|
64094
64246
|
unsafeTriggerHandlers: true,
|
|
@@ -64114,13 +64266,6 @@ async function buildMiniflareOptions(log2, config, proxyToUserWorkerAuthenticati
|
|
|
64114
64266
|
...bindingOptions,
|
|
64115
64267
|
...sitesOptions,
|
|
64116
64268
|
...assetOptions,
|
|
64117
|
-
// Allow each entrypoint to be accessed directly over `127.0.0.1:0`
|
|
64118
|
-
unsafeDirectSockets: entrypointNames.map((name2) => ({
|
|
64119
|
-
host: "127.0.0.1",
|
|
64120
|
-
port: 0,
|
|
64121
|
-
entrypoint: name2,
|
|
64122
|
-
proxy: true
|
|
64123
|
-
})),
|
|
64124
64269
|
containerEngine: config.containerEngine,
|
|
64125
64270
|
zone: config.zone
|
|
64126
64271
|
},
|
|
@@ -132564,7 +132709,7 @@ var init_user2 = __esm({
|
|
|
132564
132709
|
"connectivity:admin": "See, change, and bind to Connectivity Directory services, including creating services targeting Cloudflare Tunnel.",
|
|
132565
132710
|
"email_routing:write": "See and change Email Routing settings, rules, and destination addresses.",
|
|
132566
132711
|
"email_sending:write": "See and change Email Sending settings and configuration.",
|
|
132567
|
-
"browser:write": "See and manage Browser
|
|
132712
|
+
"browser:write": "See and manage Browser Run sessions"
|
|
132568
132713
|
};
|
|
132569
132714
|
DefaultScopeKeys = Object.keys(DefaultScopes);
|
|
132570
132715
|
__name(validateScopeKeys, "validateScopeKeys");
|
|
@@ -152114,6 +152259,25 @@ function containerConfigToCreateRequest(accountId, containerApp, imageRef, durab
|
|
|
152114
152259
|
rollout_active_grace_period: containerApp.rollout_active_grace_period
|
|
152115
152260
|
};
|
|
152116
152261
|
}
|
|
152262
|
+
function formatContainerSnippetForDisplay(container, configPath) {
|
|
152263
|
+
const configurationForDisplay = container.configuration === void 0 ? void 0 : Object.fromEntries(
|
|
152264
|
+
Object.entries(container.configuration).map(([key, value]) => [
|
|
152265
|
+
key === "wrangler_ssh" ? "ssh" : key,
|
|
152266
|
+
value
|
|
152267
|
+
])
|
|
152268
|
+
);
|
|
152269
|
+
return formatConfigSnippet(
|
|
152270
|
+
{
|
|
152271
|
+
containers: [
|
|
152272
|
+
{
|
|
152273
|
+
...container,
|
|
152274
|
+
configuration: configurationForDisplay
|
|
152275
|
+
}
|
|
152276
|
+
]
|
|
152277
|
+
},
|
|
152278
|
+
configPath
|
|
152279
|
+
);
|
|
152280
|
+
}
|
|
152117
152281
|
async function apply(args, containerConfig, config) {
|
|
152118
152282
|
if (!config.containers || config.containers.length === 0) {
|
|
152119
152283
|
return;
|
|
@@ -152171,14 +152335,12 @@ async function apply(args, containerConfig, config) {
|
|
|
152171
152335
|
normalisedPrevApp,
|
|
152172
152336
|
sortObjectRecursive(modifyReq)
|
|
152173
152337
|
);
|
|
152174
|
-
const prev =
|
|
152175
|
-
|
|
152176
|
-
// but this function doesn't actually care about the type
|
|
152177
|
-
{ containers: [normalisedPrevApp] },
|
|
152338
|
+
const prev = formatContainerSnippetForDisplay(
|
|
152339
|
+
normalisedPrevApp,
|
|
152178
152340
|
config.configPath
|
|
152179
152341
|
);
|
|
152180
|
-
const now =
|
|
152181
|
-
|
|
152342
|
+
const now = formatContainerSnippetForDisplay(
|
|
152343
|
+
nowContainer,
|
|
152182
152344
|
config.configPath
|
|
152183
152345
|
);
|
|
152184
152346
|
const diff = new Diff(prev, now);
|
|
@@ -152206,8 +152368,8 @@ async function apply(args, containerConfig, config) {
|
|
|
152206
152368
|
}
|
|
152207
152369
|
} else {
|
|
152208
152370
|
updateStatus(bold.underline(green.underline("NEW")) + ` ${appConfig.name}`);
|
|
152209
|
-
const configStr =
|
|
152210
|
-
|
|
152371
|
+
const configStr = formatContainerSnippetForDisplay(
|
|
152372
|
+
appConfig,
|
|
152211
152373
|
config.configPath
|
|
152212
152374
|
);
|
|
152213
152375
|
configStr.trimEnd().split("\n").forEach((el) => log(` ${el}`));
|
|
@@ -152300,6 +152462,7 @@ var init_deploy = __esm({
|
|
|
152300
152462
|
__name(createApplicationToModifyApplication, "createApplicationToModifyApplication");
|
|
152301
152463
|
__name(observabilityToConfiguration, "observabilityToConfiguration");
|
|
152302
152464
|
__name(containerConfigToCreateRequest, "containerConfigToCreateRequest");
|
|
152465
|
+
__name(formatContainerSnippetForDisplay, "formatContainerSnippetForDisplay");
|
|
152303
152466
|
__name(apply, "apply");
|
|
152304
152467
|
__name(mergeIfUnsafe, "mergeIfUnsafe");
|
|
152305
152468
|
__name(formatError, "formatError");
|
|
@@ -153355,6 +153518,7 @@ var init_config5 = __esm({
|
|
|
153355
153518
|
regions: container.constraints?.regions?.map(
|
|
153356
153519
|
(region) => region.toUpperCase()
|
|
153357
153520
|
),
|
|
153521
|
+
jurisdiction: container.constraints?.jurisdiction?.toLowerCase(),
|
|
153358
153522
|
cities: container.constraints?.cities?.map(
|
|
153359
153523
|
(city) => city.toLowerCase()
|
|
153360
153524
|
)
|
|
@@ -158398,7 +158562,7 @@ async function fetchBrowserRendering(config, resource, options = {}) {
|
|
|
158398
158562
|
if (!response.ok) {
|
|
158399
158563
|
const errorMessage = parseErrorMessage(text);
|
|
158400
158564
|
throw new APIError({
|
|
158401
|
-
text: `Browser
|
|
158565
|
+
text: `Browser Run API error: ${errorMessage}`,
|
|
158402
158566
|
notes: [{ text: `${method} ${url4} -> ${response.status}` }],
|
|
158403
158567
|
status: response.status
|
|
158404
158568
|
});
|
|
@@ -158407,7 +158571,7 @@ async function fetchBrowserRendering(config, resource, options = {}) {
|
|
|
158407
158571
|
return JSON.parse(text);
|
|
158408
158572
|
} catch {
|
|
158409
158573
|
throw new APIError({
|
|
158410
|
-
text: "Received a malformed response from the Browser
|
|
158574
|
+
text: "Received a malformed response from the Browser Run API",
|
|
158411
158575
|
notes: [
|
|
158412
158576
|
{ text: text.length > 100 ? `${text.substring(0, 100)}...` : text },
|
|
158413
158577
|
{ text: `${method} ${url4} -> ${response.status}` }
|
|
@@ -158442,9 +158606,9 @@ var init_create2 = __esm({
|
|
|
158442
158606
|
MAX_KEEP_ALIVE_SECONDS = 600;
|
|
158443
158607
|
browserCreateCommand = createCommand({
|
|
158444
158608
|
metadata: {
|
|
158445
|
-
description: "Create a new
|
|
158609
|
+
description: "Create a new Browser Run session",
|
|
158446
158610
|
status: "open beta",
|
|
158447
|
-
owner: "Product: Browser
|
|
158611
|
+
owner: "Product: Browser Run"
|
|
158448
158612
|
},
|
|
158449
158613
|
behaviour: {
|
|
158450
158614
|
printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
|
|
@@ -158532,9 +158696,9 @@ var init_close = __esm({
|
|
|
158532
158696
|
init_utils6();
|
|
158533
158697
|
browserCloseCommand = createCommand({
|
|
158534
158698
|
metadata: {
|
|
158535
|
-
description: "Close a
|
|
158699
|
+
description: "Close a Browser Run session",
|
|
158536
158700
|
status: "open beta",
|
|
158537
|
-
owner: "Product: Browser
|
|
158701
|
+
owner: "Product: Browser Run"
|
|
158538
158702
|
},
|
|
158539
158703
|
behaviour: {
|
|
158540
158704
|
printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
|
|
@@ -158583,9 +158747,9 @@ var init_list3 = __esm({
|
|
|
158583
158747
|
init_utils6();
|
|
158584
158748
|
browserListCommand = createCommand({
|
|
158585
158749
|
metadata: {
|
|
158586
|
-
description: "List active
|
|
158750
|
+
description: "List active Browser Run sessions",
|
|
158587
158751
|
status: "open beta",
|
|
158588
|
-
owner: "Product: Browser
|
|
158752
|
+
owner: "Product: Browser Run"
|
|
158589
158753
|
},
|
|
158590
158754
|
behaviour: {
|
|
158591
158755
|
printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
|
|
@@ -158608,7 +158772,7 @@ var init_list3 = __esm({
|
|
|
158608
158772
|
return;
|
|
158609
158773
|
}
|
|
158610
158774
|
if (sessions.length === 0) {
|
|
158611
|
-
logger.log("No active
|
|
158775
|
+
logger.log("No active Browser Run sessions found.");
|
|
158612
158776
|
return;
|
|
158613
158777
|
}
|
|
158614
158778
|
logger.table(
|
|
@@ -158685,7 +158849,7 @@ var init_view = __esm({
|
|
|
158685
158849
|
metadata: {
|
|
158686
158850
|
description: "View a live browser session",
|
|
158687
158851
|
status: "open beta",
|
|
158688
|
-
owner: "Product: Browser
|
|
158852
|
+
owner: "Product: Browser Run"
|
|
158689
158853
|
},
|
|
158690
158854
|
behaviour: {
|
|
158691
158855
|
printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
|
|
@@ -158722,7 +158886,7 @@ var init_view = __esm({
|
|
|
158722
158886
|
);
|
|
158723
158887
|
if (sessions.length === 0) {
|
|
158724
158888
|
throw new UserError(
|
|
158725
|
-
"No active
|
|
158889
|
+
"No active Browser Run sessions found. Use `wrangler browser create` to create one."
|
|
158726
158890
|
);
|
|
158727
158891
|
}
|
|
158728
158892
|
if (sessions.length === 1) {
|
|
@@ -158821,9 +158985,9 @@ var init_browser_rendering2 = __esm({
|
|
|
158821
158985
|
init_view();
|
|
158822
158986
|
browserNamespace = createNamespace({
|
|
158823
158987
|
metadata: {
|
|
158824
|
-
description: "\u{1F310} Manage Browser
|
|
158988
|
+
description: "\u{1F310} Manage Browser Run sessions",
|
|
158825
158989
|
status: "open beta",
|
|
158826
|
-
owner: "Product: Browser
|
|
158990
|
+
owner: "Product: Browser Run",
|
|
158827
158991
|
category: "Compute & AI"
|
|
158828
158992
|
}
|
|
158829
158993
|
});
|
|
@@ -159439,6 +159603,7 @@ function createWorkerUploadForm(worker, bindings, options) {
|
|
|
159439
159603
|
"secrets_store_secret",
|
|
159440
159604
|
bindings
|
|
159441
159605
|
);
|
|
159606
|
+
const artifacts = extractBindingsOfType("artifacts", bindings);
|
|
159442
159607
|
const unsafe_hello_world = extractBindingsOfType(
|
|
159443
159608
|
"unsafe_hello_world",
|
|
159444
159609
|
bindings
|
|
@@ -159647,6 +159812,13 @@ function createWorkerUploadForm(worker, bindings, options) {
|
|
|
159647
159812
|
secret_name
|
|
159648
159813
|
});
|
|
159649
159814
|
});
|
|
159815
|
+
artifacts.forEach(({ binding, namespace }) => {
|
|
159816
|
+
metadataBindings.push({
|
|
159817
|
+
name: binding,
|
|
159818
|
+
type: "artifacts",
|
|
159819
|
+
namespace
|
|
159820
|
+
});
|
|
159821
|
+
});
|
|
159650
159822
|
unsafe_hello_world.forEach(({ binding, enable_timer }) => {
|
|
159651
159823
|
metadataBindings.push({
|
|
159652
159824
|
name: binding,
|
|
@@ -164996,6 +165168,7 @@ var init_config6 = __esm({
|
|
|
164996
165168
|
hyperdrive: [],
|
|
164997
165169
|
workflows: [],
|
|
164998
165170
|
secrets_store_secrets: [],
|
|
165171
|
+
artifacts: [],
|
|
164999
165172
|
services: [],
|
|
165000
165173
|
analytics_engine_datasets: [],
|
|
165001
165174
|
ai: void 0,
|
|
@@ -183440,6 +183613,7 @@ var init_export2 = __esm({
|
|
|
183440
183613
|
init_cfetch();
|
|
183441
183614
|
init_create_command();
|
|
183442
183615
|
init_get_local_persistence_path();
|
|
183616
|
+
init_dialogs();
|
|
183443
183617
|
init_logger();
|
|
183444
183618
|
init_paths();
|
|
183445
183619
|
init_user3();
|
|
@@ -183469,6 +183643,12 @@ var init_export2 = __esm({
|
|
|
183469
183643
|
description: "Export from a remote D1 database",
|
|
183470
183644
|
conflicts: "local"
|
|
183471
183645
|
},
|
|
183646
|
+
"skip-confirmation": {
|
|
183647
|
+
type: "boolean",
|
|
183648
|
+
description: "Skip confirmation",
|
|
183649
|
+
alias: "y",
|
|
183650
|
+
default: false
|
|
183651
|
+
},
|
|
183472
183652
|
output: {
|
|
183473
183653
|
type: "string",
|
|
183474
183654
|
description: "Path to the SQL file for your export",
|
|
@@ -183504,7 +183684,7 @@ var init_export2 = __esm({
|
|
|
183504
183684
|
},
|
|
183505
183685
|
positionalArgs: ["name"],
|
|
183506
183686
|
async handler(args, { config }) {
|
|
183507
|
-
const { remote, name: name2, output, schema, data, table } = args;
|
|
183687
|
+
const { remote, name: name2, output, schema, data, table, skipConfirmation } = args;
|
|
183508
183688
|
if (!schema && !data) {
|
|
183509
183689
|
throw new UserError(`You cannot specify both --no-schema and --no-data`);
|
|
183510
183690
|
}
|
|
@@ -183516,6 +183696,16 @@ var init_export2 = __esm({
|
|
|
183516
183696
|
}
|
|
183517
183697
|
const tables = table ?? [];
|
|
183518
183698
|
if (remote) {
|
|
183699
|
+
if (!skipConfirmation) {
|
|
183700
|
+
const response = await confirm(
|
|
183701
|
+
`\u26A0\uFE0F This process may take some time, during which your D1 database will be unavailable to serve queries.
|
|
183702
|
+
Ok to proceed?`
|
|
183703
|
+
);
|
|
183704
|
+
if (!response) {
|
|
183705
|
+
logger.log(`Not exporting.`);
|
|
183706
|
+
return;
|
|
183707
|
+
}
|
|
183708
|
+
}
|
|
183519
183709
|
return await exportRemotely(config, name2, output, tables, !schema, !data);
|
|
183520
183710
|
} else {
|
|
183521
183711
|
return await exportLocal(config, name2, output, tables, !schema, !data);
|
|
@@ -196801,13 +196991,13 @@ var require_esprima2 = __commonJS({
|
|
|
196801
196991
|
/***/
|
|
196802
196992
|
function(module3, exports2) {
|
|
196803
196993
|
Object.defineProperty(exports2, "__esModule", { value: true });
|
|
196804
|
-
function
|
|
196994
|
+
function assert62(condition, message) {
|
|
196805
196995
|
if (!condition) {
|
|
196806
196996
|
throw new Error("ASSERT: " + message);
|
|
196807
196997
|
}
|
|
196808
196998
|
}
|
|
196809
|
-
__name(
|
|
196810
|
-
exports2.assert =
|
|
196999
|
+
__name(assert62, "assert");
|
|
197000
|
+
exports2.assert = assert62;
|
|
196811
197001
|
},
|
|
196812
197002
|
/* 10 */
|
|
196813
197003
|
/***/
|
|
@@ -210528,12 +210718,12 @@ var require_lib4 = __commonJS({
|
|
|
210528
210718
|
return x7;
|
|
210529
210719
|
}
|
|
210530
210720
|
__name(nonNull, "nonNull");
|
|
210531
|
-
function
|
|
210721
|
+
function assert62(x7) {
|
|
210532
210722
|
if (!x7) {
|
|
210533
210723
|
throw new Error("Assert fail");
|
|
210534
210724
|
}
|
|
210535
210725
|
}
|
|
210536
|
-
__name(
|
|
210726
|
+
__name(assert62, "assert");
|
|
210537
210727
|
var TSErrors = ParseErrorEnum`typescript`({
|
|
210538
210728
|
AbstractMethodHasImplementation: /* @__PURE__ */ __name(({
|
|
210539
210729
|
methodName
|
|
@@ -211561,7 +211751,7 @@ var require_lib4 = __commonJS({
|
|
|
211561
211751
|
return this.finishNode(t13, "TSTypeAnnotation");
|
|
211562
211752
|
}
|
|
211563
211753
|
tsParseType() {
|
|
211564
|
-
|
|
211754
|
+
assert62(this.state.inType);
|
|
211565
211755
|
const type = this.tsParseNonConditionalType();
|
|
211566
211756
|
if (this.state.inDisallowConditionalTypesContext || this.hasPrecedingLineBreak() || !this.eat(81)) {
|
|
211567
211757
|
return type;
|
|
@@ -212609,7 +212799,7 @@ var require_lib4 = __commonJS({
|
|
|
212609
212799
|
return arrow.node;
|
|
212610
212800
|
}
|
|
212611
212801
|
if (!jsx2) {
|
|
212612
|
-
|
|
212802
|
+
assert62(!this.hasPlugin("jsx"));
|
|
212613
212803
|
typeCast = this.tryParse(() => super.parseMaybeAssign(refExpressionErrors, afterLeftParse), state2);
|
|
212614
212804
|
if (!typeCast.error) return typeCast.node;
|
|
212615
212805
|
}
|
|
@@ -243553,7 +243743,7 @@ var init_deployments4 = __esm({
|
|
|
243553
243743
|
force: {
|
|
243554
243744
|
type: "boolean",
|
|
243555
243745
|
alias: "f",
|
|
243556
|
-
description: "
|
|
243746
|
+
description: "Delete even if the deployment has an active alias",
|
|
243557
243747
|
default: false
|
|
243558
243748
|
}
|
|
243559
243749
|
},
|
|
@@ -243582,7 +243772,8 @@ var init_deployments4 = __esm({
|
|
|
243582
243772
|
await fetchResult(
|
|
243583
243773
|
COMPLIANCE_REGION_CONFIG_PUBLIC,
|
|
243584
243774
|
`/accounts/${accountId}/pages/projects/${projectName}/deployments/${deploymentId}`,
|
|
243585
|
-
{ method: "DELETE" }
|
|
243775
|
+
{ method: "DELETE" },
|
|
243776
|
+
new URLSearchParams({ force: force.toString() })
|
|
243586
243777
|
);
|
|
243587
243778
|
saveToConfigCache(PAGES_CONFIG_CACHE_FILENAME, {
|
|
243588
243779
|
account_id: accountId,
|
|
@@ -282083,6 +282274,8 @@ function getBindingValue(binding) {
|
|
|
282083
282274
|
return String(binding.pipeline ?? "");
|
|
282084
282275
|
case "secrets_store_secret":
|
|
282085
282276
|
return binding.secret_name ? `${binding.store_id}/${binding.secret_name}` : String(binding.store_id ?? "");
|
|
282277
|
+
case "artifacts":
|
|
282278
|
+
return String(binding.namespace ?? "");
|
|
282086
282279
|
case "ratelimit":
|
|
282087
282280
|
return String(binding.namespace_id ?? "");
|
|
282088
282281
|
case "vpc_service":
|
|
@@ -282201,6 +282394,12 @@ function extractConfigBindings(config) {
|
|
|
282201
282394
|
secret_name: secret.secret_name
|
|
282202
282395
|
};
|
|
282203
282396
|
}
|
|
282397
|
+
for (const artifact of previews?.artifacts ?? []) {
|
|
282398
|
+
env6[artifact.binding] = {
|
|
282399
|
+
type: "artifacts",
|
|
282400
|
+
namespace: artifact.namespace
|
|
282401
|
+
};
|
|
282402
|
+
}
|
|
282204
282403
|
for (const ratelimit of previews?.ratelimits ?? []) {
|
|
282205
282404
|
env6[ratelimit.name] = {
|
|
282206
282405
|
type: "ratelimit",
|
|
@@ -283407,10 +283606,10 @@ var require_difflib = __commonJS({
|
|
|
283407
283606
|
"../../node_modules/.pnpm/@ewoudenberg+difflib@0.1.0/node_modules/@ewoudenberg/difflib/lib/difflib.js"(exports) {
|
|
283408
283607
|
init_import_meta_url();
|
|
283409
283608
|
(function() {
|
|
283410
|
-
var Differ, Heap, IS_CHARACTER_JUNK, IS_LINE_JUNK, SequenceMatcher, _any, _arrayCmp, _calculateRatio, _countLeading, _formatRangeContext, _formatRangeUnified, _has,
|
|
283609
|
+
var Differ, Heap, IS_CHARACTER_JUNK, IS_LINE_JUNK, SequenceMatcher, _any, _arrayCmp, _calculateRatio, _countLeading, _formatRangeContext, _formatRangeUnified, _has, assert62, contextDiff, floor, getCloseMatches, max, min, ndiff, restore, unifiedDiff, indexOf = [].indexOf;
|
|
283411
283610
|
({ floor, max, min } = Math);
|
|
283412
283611
|
Heap = require_heap2();
|
|
283413
|
-
|
|
283612
|
+
assert62 = __require("assert");
|
|
283414
283613
|
_calculateRatio = /* @__PURE__ */ __name(function(matches, length) {
|
|
283415
283614
|
if (length) {
|
|
283416
283615
|
return 2 * matches / length;
|
|
@@ -283981,7 +284180,7 @@ var require_difflib = __commonJS({
|
|
|
283981
284180
|
}
|
|
283982
284181
|
_plainReplace(a7, alo, ahi, b11, blo, bhi) {
|
|
283983
284182
|
var first, g7, l8, len, len1, line, lines, m7, ref, second;
|
|
283984
|
-
|
|
284183
|
+
assert62(alo < ahi && blo < bhi);
|
|
283985
284184
|
if (bhi - blo < ahi - alo) {
|
|
283986
284185
|
first = this._dump("+", b11, blo, bhi);
|
|
283987
284186
|
second = this._dump("-", a7, alo, ahi);
|
|
@@ -287713,6 +287912,12 @@ var init_bucket2 = __esm({
|
|
|
287713
287912
|
status: "stable",
|
|
287714
287913
|
owner: "Product: R2"
|
|
287715
287914
|
},
|
|
287915
|
+
behaviour: {
|
|
287916
|
+
// This is an account-level command and does not require a valid project config.
|
|
287917
|
+
// Keeping config parsing out of the critical path avoids blocking users who are
|
|
287918
|
+
// using `wrangler r2 bucket list` to debug/fix an invalid wrangler.jsonc/toml.
|
|
287919
|
+
provideConfig: false
|
|
287920
|
+
},
|
|
287716
287921
|
args: {
|
|
287717
287922
|
jurisdiction: {
|
|
287718
287923
|
describe: "The jurisdiction to list",
|
|
@@ -288383,10 +288588,30 @@ var init_cors2 = __esm({
|
|
|
288383
288588
|
async handler({ bucket, file: file3, jurisdiction, force }, { config }) {
|
|
288384
288589
|
const accountId = await requireAuth(config);
|
|
288385
288590
|
const jsonFilePath = path3__namespace.default.resolve(file3);
|
|
288386
|
-
const corsConfig = parseJSON(
|
|
288387
|
-
|
|
288591
|
+
const corsConfig = parseJSON(
|
|
288592
|
+
readFileSync(jsonFilePath),
|
|
288593
|
+
jsonFilePath
|
|
288594
|
+
);
|
|
288595
|
+
if (corsConfig.CORSRules) {
|
|
288596
|
+
throw new UserError(
|
|
288597
|
+
"Wrangler detected an AWS S3 CORS configuration format.\nCloudflare R2 expects a 'rules' array instead of 'CORSRules'.\nSee: https://developers.cloudflare.com/r2/buckets/cors/#example"
|
|
288598
|
+
);
|
|
288599
|
+
}
|
|
288600
|
+
const rules = corsConfig.rules;
|
|
288601
|
+
if (!rules || !Array.isArray(rules)) {
|
|
288388
288602
|
throw new UserError(
|
|
288389
|
-
`The CORS configuration file must contain a 'rules' array as expected by the
|
|
288603
|
+
`The CORS configuration file must contain a 'rules' array as expected by the R2 API: https://developers.cloudflare.com/api/operations/r2-put-bucket-cors-policy`
|
|
288604
|
+
);
|
|
288605
|
+
}
|
|
288606
|
+
const hasS3Keys = rules.some(
|
|
288607
|
+
(rule) => rule && typeof rule === "object" && !Array.isArray(rule) && ("AllowedOrigins" in rule || "AllowedMethods" in rule || "AllowedHeaders" in rule)
|
|
288608
|
+
);
|
|
288609
|
+
if (hasS3Keys) {
|
|
288610
|
+
throw new UserError(
|
|
288611
|
+
`Wrangler detected AWS S3 style keys (e.g. 'AllowedOrigins').
|
|
288612
|
+
Cloudflare R2 requires lowercase keys nested inside an 'allowed' object.
|
|
288613
|
+
Example: { "allowed": { "origins": ["*"], "methods": ["GET"] } }
|
|
288614
|
+
See: https://developers.cloudflare.com/r2/buckets/cors/#example`
|
|
288390
288615
|
);
|
|
288391
288616
|
}
|
|
288392
288617
|
if (!force) {
|
|
@@ -288399,13 +288624,13 @@ var init_cors2 = __esm({
|
|
|
288399
288624
|
}
|
|
288400
288625
|
}
|
|
288401
288626
|
logger.log(
|
|
288402
|
-
`Setting CORS configuration (${
|
|
288627
|
+
`Setting CORS configuration (${rules.length} rules) for bucket '${bucket}'...`
|
|
288403
288628
|
);
|
|
288404
288629
|
await putCORSPolicy(
|
|
288405
288630
|
config,
|
|
288406
288631
|
accountId,
|
|
288407
288632
|
bucket,
|
|
288408
|
-
|
|
288633
|
+
rules,
|
|
288409
288634
|
jurisdiction
|
|
288410
288635
|
);
|
|
288411
288636
|
logger.log(`\u2728 Set CORS configuration for bucket '${bucket}'.`);
|
|
@@ -295610,6 +295835,19 @@ function collectCoreBindings(args) {
|
|
|
295610
295835
|
envName
|
|
295611
295836
|
);
|
|
295612
295837
|
}
|
|
295838
|
+
for (const [index, artifact] of (env6.artifacts ?? []).entries()) {
|
|
295839
|
+
if (!artifact.binding) {
|
|
295840
|
+
throwMissingBindingError({
|
|
295841
|
+
binding: artifact,
|
|
295842
|
+
bindingType: "artifacts",
|
|
295843
|
+
configPath: args.config,
|
|
295844
|
+
envName,
|
|
295845
|
+
fieldName: "binding",
|
|
295846
|
+
index
|
|
295847
|
+
});
|
|
295848
|
+
}
|
|
295849
|
+
addBinding(artifact.binding, "Artifacts", "artifacts", envName);
|
|
295850
|
+
}
|
|
295613
295851
|
for (const [index, helloWorld] of (env6.unsafe_hello_world ?? []).entries()) {
|
|
295614
295852
|
if (!helloWorld.binding) {
|
|
295615
295853
|
throwMissingBindingError({
|
|
@@ -296271,6 +296509,23 @@ function collectCoreBindingsPerEnvironment(args) {
|
|
|
296271
296509
|
type: "SecretsStoreSecret"
|
|
296272
296510
|
});
|
|
296273
296511
|
}
|
|
296512
|
+
for (const [index, artifact] of (env6.artifacts ?? []).entries()) {
|
|
296513
|
+
if (!artifact.binding) {
|
|
296514
|
+
throwMissingBindingError({
|
|
296515
|
+
binding: artifact,
|
|
296516
|
+
bindingType: "artifacts",
|
|
296517
|
+
configPath: args.config,
|
|
296518
|
+
envName,
|
|
296519
|
+
fieldName: "binding",
|
|
296520
|
+
index
|
|
296521
|
+
});
|
|
296522
|
+
}
|
|
296523
|
+
bindings.push({
|
|
296524
|
+
bindingCategory: "artifacts",
|
|
296525
|
+
name: artifact.binding,
|
|
296526
|
+
type: "Artifacts"
|
|
296527
|
+
});
|
|
296528
|
+
}
|
|
296274
296529
|
for (const [index, helloWorld] of (env6.unsafe_hello_world ?? []).entries()) {
|
|
296275
296530
|
if (!helloWorld.binding) {
|
|
296276
296531
|
throwMissingBindingError({
|
|
@@ -309017,6 +309272,11 @@ function removeRemoteConfigFieldFromBindings(normalizedConfig) {
|
|
|
309017
309272
|
({ remote: _5, ...binding }) => binding
|
|
309018
309273
|
);
|
|
309019
309274
|
}
|
|
309275
|
+
if (normalizedConfig.artifacts?.length) {
|
|
309276
|
+
normalizedConfig.artifacts = normalizedConfig.artifacts.map(
|
|
309277
|
+
({ remote: _5, ...binding }) => binding
|
|
309278
|
+
);
|
|
309279
|
+
}
|
|
309020
309280
|
const singleBindingFields = [
|
|
309021
309281
|
"browser",
|
|
309022
309282
|
"ai",
|
|
@@ -309307,6 +309567,7 @@ var init_config_diffs = __esm({
|
|
|
309307
309567
|
mtls_certificates: true,
|
|
309308
309568
|
pipelines: true,
|
|
309309
309569
|
secrets_store_secrets: true,
|
|
309570
|
+
artifacts: true,
|
|
309310
309571
|
ratelimits: true,
|
|
309311
309572
|
analytics_engine_datasets: true,
|
|
309312
309573
|
unsafe_hello_world: true,
|
|
@@ -311375,10 +311636,16 @@ function runBuild({
|
|
|
311375
311636
|
}));
|
|
311376
311637
|
}
|
|
311377
311638
|
__name(build5, "build");
|
|
311378
|
-
build5().catch((err) => {
|
|
311639
|
+
const buildPromise = build5().catch((err) => {
|
|
311379
311640
|
onErr(err);
|
|
311380
311641
|
});
|
|
311381
|
-
return () =>
|
|
311642
|
+
return () => {
|
|
311643
|
+
const immediateStop = stopWatching?.();
|
|
311644
|
+
if (immediateStop) {
|
|
311645
|
+
return immediateStop;
|
|
311646
|
+
}
|
|
311647
|
+
void buildPromise.then(() => stopWatching?.());
|
|
311648
|
+
};
|
|
311382
311649
|
}
|
|
311383
311650
|
var init_use_esbuild = __esm({
|
|
311384
311651
|
"src/dev/use-esbuild.ts"() {
|
|
@@ -313635,6 +313902,9 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313635
313902
|
#latestConfig;
|
|
313636
313903
|
#latestBundle;
|
|
313637
313904
|
#latestRoutes;
|
|
313905
|
+
#latestProxyData;
|
|
313906
|
+
// Timer for proactive token refresh before the 1-hour expiry
|
|
313907
|
+
#refreshTimer;
|
|
313638
313908
|
async #previewSession(props) {
|
|
313639
313909
|
try {
|
|
313640
313910
|
const { workerAccount, workerContext } = await getWorkerAccountAndContext(props);
|
|
@@ -313655,13 +313925,7 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313655
313925
|
return;
|
|
313656
313926
|
}
|
|
313657
313927
|
handlePreviewSessionCreationError(err, props.accountId);
|
|
313658
|
-
|
|
313659
|
-
type: "error",
|
|
313660
|
-
reason: "Failed to create a preview token",
|
|
313661
|
-
cause: castErrorCause(err),
|
|
313662
|
-
source: "RemoteRuntimeController",
|
|
313663
|
-
data: void 0
|
|
313664
|
-
});
|
|
313928
|
+
throw err;
|
|
313665
313929
|
}
|
|
313666
313930
|
}
|
|
313667
313931
|
async #previewToken(props) {
|
|
@@ -313790,7 +314054,7 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313790
314054
|
}
|
|
313791
314055
|
async #updatePreviewToken(config, bundle, auth, routes, bundleId) {
|
|
313792
314056
|
if (bundleId !== this.#currentBundleId) {
|
|
313793
|
-
return;
|
|
314057
|
+
return false;
|
|
313794
314058
|
}
|
|
313795
314059
|
const token = await this.#previewToken({
|
|
313796
314060
|
bundle,
|
|
@@ -313820,28 +314084,43 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313820
314084
|
minimal_mode: config.dev.remote === "minimal"
|
|
313821
314085
|
});
|
|
313822
314086
|
if (bundleId !== this.#currentBundleId || !token) {
|
|
313823
|
-
return;
|
|
314087
|
+
return false;
|
|
313824
314088
|
}
|
|
313825
314089
|
const accessHeaders = await getAccessHeaders(token.host);
|
|
314090
|
+
const proxyData = {
|
|
314091
|
+
userWorkerUrl: {
|
|
314092
|
+
protocol: "https:",
|
|
314093
|
+
hostname: token.host,
|
|
314094
|
+
port: "443"
|
|
314095
|
+
},
|
|
314096
|
+
headers: {
|
|
314097
|
+
"cf-workers-preview-token": token.value,
|
|
314098
|
+
...accessHeaders,
|
|
314099
|
+
"cf-connecting-ip": ""
|
|
314100
|
+
},
|
|
314101
|
+
liveReload: config.dev.liveReload,
|
|
314102
|
+
proxyLogsToController: true
|
|
314103
|
+
};
|
|
314104
|
+
this.#latestProxyData = proxyData;
|
|
313826
314105
|
this.emitReloadCompleteEvent({
|
|
313827
314106
|
type: "reloadComplete",
|
|
313828
314107
|
bundle,
|
|
313829
314108
|
config,
|
|
313830
|
-
proxyData
|
|
313831
|
-
userWorkerUrl: {
|
|
313832
|
-
protocol: "https:",
|
|
313833
|
-
hostname: token.host,
|
|
313834
|
-
port: "443"
|
|
313835
|
-
},
|
|
313836
|
-
headers: {
|
|
313837
|
-
"cf-workers-preview-token": token.value,
|
|
313838
|
-
...accessHeaders,
|
|
313839
|
-
"cf-connecting-ip": ""
|
|
313840
|
-
},
|
|
313841
|
-
liveReload: config.dev.liveReload,
|
|
313842
|
-
proxyLogsToController: true
|
|
313843
|
-
}
|
|
314109
|
+
proxyData
|
|
313844
314110
|
});
|
|
314111
|
+
this.#scheduleRefresh(PREVIEW_TOKEN_REFRESH_INTERVAL);
|
|
314112
|
+
return true;
|
|
314113
|
+
}
|
|
314114
|
+
#scheduleRefresh(interval) {
|
|
314115
|
+
clearTimeout(this.#refreshTimer);
|
|
314116
|
+
this.#refreshTimer = setTimeout(() => {
|
|
314117
|
+
if (this.#latestProxyData) {
|
|
314118
|
+
this.onPreviewTokenExpired({
|
|
314119
|
+
type: "previewTokenExpired",
|
|
314120
|
+
proxyData: this.#latestProxyData
|
|
314121
|
+
});
|
|
314122
|
+
}
|
|
314123
|
+
}, interval);
|
|
313845
314124
|
}
|
|
313846
314125
|
async #onBundleComplete({ config, bundle }, id) {
|
|
313847
314126
|
logger.log(source_default.dim("\u2394 Starting remote preview..."));
|
|
@@ -313850,6 +314129,7 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313850
314129
|
if (!config.dev?.auth) {
|
|
313851
314130
|
throw new MissingConfigError("config.dev.auth");
|
|
313852
314131
|
}
|
|
314132
|
+
assert53__default.default(config.dev.auth);
|
|
313853
314133
|
const auth = await unwrapHook(config.dev.auth);
|
|
313854
314134
|
this.#latestConfig = config;
|
|
313855
314135
|
this.#latestBundle = bundle;
|
|
@@ -313882,29 +314162,24 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313882
314162
|
);
|
|
313883
314163
|
return;
|
|
313884
314164
|
}
|
|
313885
|
-
this.emitReloadStartEvent({
|
|
313886
|
-
type: "reloadStart",
|
|
313887
|
-
config: this.#latestConfig,
|
|
313888
|
-
bundle: this.#latestBundle
|
|
313889
|
-
});
|
|
313890
|
-
if (!this.#latestConfig.dev?.auth) {
|
|
313891
|
-
throw new MissingConfigError("config.dev.auth");
|
|
313892
|
-
}
|
|
313893
|
-
const auth = await unwrapHook(this.#latestConfig.dev.auth);
|
|
313894
314165
|
try {
|
|
314166
|
+
assert53__default.default(this.#latestConfig.dev.auth);
|
|
314167
|
+
const auth = await unwrapHook(this.#latestConfig.dev.auth);
|
|
313895
314168
|
this.#session = await this.#getPreviewSession(
|
|
313896
314169
|
this.#latestConfig,
|
|
313897
314170
|
auth,
|
|
313898
314171
|
this.#latestRoutes
|
|
313899
314172
|
);
|
|
313900
|
-
await this.#updatePreviewToken(
|
|
314173
|
+
const refreshed = await this.#updatePreviewToken(
|
|
313901
314174
|
this.#latestConfig,
|
|
313902
314175
|
this.#latestBundle,
|
|
313903
314176
|
auth,
|
|
313904
314177
|
this.#latestRoutes,
|
|
313905
314178
|
this.#currentBundleId
|
|
313906
314179
|
);
|
|
313907
|
-
|
|
314180
|
+
if (refreshed) {
|
|
314181
|
+
logger.log(source_default.green("\u2714 Preview token refreshed successfully"));
|
|
314182
|
+
}
|
|
313908
314183
|
} catch (error2) {
|
|
313909
314184
|
if (error2 instanceof Error && error2.name == "AbortError") {
|
|
313910
314185
|
return;
|
|
@@ -313924,6 +314199,7 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313924
314199
|
onBundleStart(_5) {
|
|
313925
314200
|
this.#abortController.abort();
|
|
313926
314201
|
this.#abortController = new AbortController();
|
|
314202
|
+
clearTimeout(this.#refreshTimer);
|
|
313927
314203
|
}
|
|
313928
314204
|
onBundleComplete(ev) {
|
|
313929
314205
|
const id = ++this.#currentBundleId;
|
|
@@ -313939,7 +314215,7 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313939
314215
|
void this.#mutex.runWith(() => this.#onBundleComplete(ev, id));
|
|
313940
314216
|
}
|
|
313941
314217
|
onPreviewTokenExpired(_5) {
|
|
313942
|
-
logger.log(source_default.dim("\u2394
|
|
314218
|
+
logger.log(source_default.dim("\u2394 Refreshing preview token..."));
|
|
313943
314219
|
void this.#mutex.runWith(() => this.#refreshPreviewToken());
|
|
313944
314220
|
}
|
|
313945
314221
|
async teardown() {
|
|
@@ -313949,6 +314225,7 @@ var init_RemoteRuntimeController = __esm({
|
|
|
313949
314225
|
}
|
|
313950
314226
|
logger.debug("RemoteRuntimeController teardown beginning...");
|
|
313951
314227
|
this.#session = void 0;
|
|
314228
|
+
clearTimeout(this.#refreshTimer);
|
|
313952
314229
|
this.#abortController.abort();
|
|
313953
314230
|
this.#activeTail?.removeAllListeners("error");
|
|
313954
314231
|
this.#activeTail?.on("error", () => {
|
|
@@ -314304,7 +314581,7 @@ __export(remoteBindings_exports, {
|
|
|
314304
314581
|
function pickRemoteBindings(bindings) {
|
|
314305
314582
|
return Object.fromEntries(
|
|
314306
314583
|
Object.entries(bindings ?? {}).filter(([, binding]) => {
|
|
314307
|
-
if (binding.type === "ai" || binding.type === "media") {
|
|
314584
|
+
if (binding.type === "ai" || binding.type === "media" || binding.type === "artifacts") {
|
|
314308
314585
|
return true;
|
|
314309
314586
|
}
|
|
314310
314587
|
if (binding.type === "vpc_service") {
|
|
@@ -314618,10 +314895,6 @@ var init_LocalRuntimeController = __esm({
|
|
|
314618
314895
|
if (data.config.dev?.remote !== false) {
|
|
314619
314896
|
const { maybeStartOrUpdateRemoteProxySession: maybeStartOrUpdateRemoteProxySession2, pickRemoteBindings: pickRemoteBindings2 } = await Promise.resolve().then(() => (init_remoteBindings(), remoteBindings_exports));
|
|
314620
314897
|
const remoteBindings = pickRemoteBindings2(configBundle.bindings ?? {});
|
|
314621
|
-
const auth = Object.keys(remoteBindings).length === 0 ? (
|
|
314622
|
-
// If there are no remote bindings (this is a local only session) there's no need to get auth data
|
|
314623
|
-
void 0
|
|
314624
|
-
) : await unwrapHook(data.config.dev.auth);
|
|
314625
314898
|
this.#remoteProxySessionData = await maybeStartOrUpdateRemoteProxySession2(
|
|
314626
314899
|
{
|
|
314627
314900
|
name: configBundle.name,
|
|
@@ -314629,7 +314902,10 @@ var init_LocalRuntimeController = __esm({
|
|
|
314629
314902
|
bindings: remoteBindings
|
|
314630
314903
|
},
|
|
314631
314904
|
this.#remoteProxySessionData ?? null,
|
|
314632
|
-
|
|
314905
|
+
Object.keys(remoteBindings).length === 0 ? (
|
|
314906
|
+
// If there are no remote bindings (this is a local only session) there's no need to get auth data
|
|
314907
|
+
void 0
|
|
314908
|
+
) : data.config.dev.auth
|
|
314633
314909
|
);
|
|
314634
314910
|
}
|
|
314635
314911
|
if (data.config.containers?.length && data.config.dev.enableContainers && this.#currentContainerBuildId !== data.config.dev.containerBuildId) {
|
|
@@ -318206,8 +318482,7 @@ async function getMiniflareOptionsFromConfig(args) {
|
|
|
318206
318482
|
script: "",
|
|
318207
318483
|
modules: true,
|
|
318208
318484
|
...miniflareOptions,
|
|
318209
|
-
unsafeDevRegistryPath: getRegistryPath()
|
|
318210
|
-
unsafeDevRegistryDurableObjectProxy: true
|
|
318485
|
+
unsafeDevRegistryPath: getRegistryPath()
|
|
318211
318486
|
};
|
|
318212
318487
|
}
|
|
318213
318488
|
function getMiniflarePersistRoot(persist) {
|