wrangler 4.83.0 → 4.84.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -366,6 +366,17 @@ function mapWorkerMetadataBindings(bindings) {
366
366
  ];
367
367
  }
368
368
  break;
369
+ case "artifacts":
370
+ {
371
+ configObj.artifacts = [
372
+ ...configObj.artifacts ?? [],
373
+ {
374
+ binding: binding.name,
375
+ namespace: binding.namespace
376
+ }
377
+ ];
378
+ }
379
+ break;
369
380
  case "unsafe_hello_world": {
370
381
  configObj.unsafe_hello_world = [
371
382
  ...configObj.unsafe_hello_world ?? [],
@@ -715,8 +726,8 @@ function constructWranglerConfig(workerOrWorkers) {
715
726
  }
716
727
  return combinedConfig;
717
728
  }
718
- var init_chunk_S3JFRPJM = __esm({
719
- "../workers-utils/dist/chunk-S3JFRPJM.mjs"() {
729
+ var init_chunk_L6UDSO24 = __esm({
730
+ "../workers-utils/dist/chunk-L6UDSO24.mjs"() {
720
731
  init_import_meta_url();
721
732
  init_chunk_OZQVB3L3();
722
733
  init_chunk_DCOBXSFB();
@@ -5286,6 +5297,16 @@ function normalizeAndValidateEnvironment(diagnostics, configPath, rawEnv, isDisp
5286
5297
  validateBindingArray(envName, validateSecretsStoreSecretBinding),
5287
5298
  []
5288
5299
  ),
5300
+ artifacts: notInheritable(
5301
+ diagnostics,
5302
+ topLevelEnv,
5303
+ rawConfig,
5304
+ rawEnv,
5305
+ envName,
5306
+ "artifacts",
5307
+ validateBindingArray(envName, validateArtifactsBinding),
5308
+ []
5309
+ ),
5289
5310
  unsafe_hello_world: notInheritable(
5290
5311
  diagnostics,
5291
5312
  topLevelEnv,
@@ -5683,6 +5704,11 @@ function validateContainerApp(envName, topLevelName, configPath) {
5683
5704
  `"containers.durable_objects" is deprecated. Use the "class_name" field instead.`
5684
5705
  );
5685
5706
  }
5707
+ if ("wrangler_ssh" in containerAppOptional) {
5708
+ diagnostics.warnings.push(
5709
+ `"containers.wrangler_ssh" is deprecated. Use "containers.ssh" instead.`
5710
+ );
5711
+ }
5686
5712
  if ("unsafe" in containerAppOptional) {
5687
5713
  if (containerAppOptional.unsafe && typeof containerAppOptional.unsafe !== "object" || Array.isArray(containerAppOptional.unsafe)) {
5688
5714
  diagnostics.errors.push(
@@ -5706,6 +5732,7 @@ function validateContainerApp(envName, topLevelName, configPath) {
5706
5732
  "class_name",
5707
5733
  "scheduling_policy",
5708
5734
  "instance_type",
5735
+ "ssh",
5709
5736
  "wrangler_ssh",
5710
5737
  "authorized_keys",
5711
5738
  "trusted_user_ca_keys",
@@ -5727,23 +5754,28 @@ function validateContainerApp(envName, topLevelName, configPath) {
5727
5754
  ["image", "secrets", "labels", "disk", "vcpu", "memory_mib"]
5728
5755
  );
5729
5756
  }
5730
- if ("wrangler_ssh" in containerAppOptional) {
5731
- if (!isRequiredProperty(
5732
- containerAppOptional.wrangler_ssh,
5733
- "enabled",
5734
- "boolean"
5735
- )) {
5757
+ let sshField;
5758
+ let sshConfig;
5759
+ if ("ssh" in containerAppOptional) {
5760
+ sshField = "ssh";
5761
+ sshConfig = containerAppOptional.ssh;
5762
+ containerAppOptional.wrangler_ssh = containerAppOptional.ssh;
5763
+ delete containerAppOptional.ssh;
5764
+ } else if ("wrangler_ssh" in containerAppOptional) {
5765
+ sshField = "wrangler_ssh";
5766
+ sshConfig = containerAppOptional.wrangler_ssh;
5767
+ }
5768
+ if (sshField !== void 0) {
5769
+ const sshConfigObject = typeof sshConfig === "object" && sshConfig !== null ? sshConfig : {};
5770
+ if (!isRequiredProperty(sshConfigObject, "enabled", "boolean")) {
5736
5771
  diagnostics.errors.push(
5737
- `${field}.wrangler_ssh.enabled must be a boolean`
5772
+ `${field}.${sshField}.enabled must be a boolean`
5738
5773
  );
5739
5774
  }
5740
- if (!isOptionalProperty(
5741
- containerAppOptional.wrangler_ssh,
5742
- "port",
5743
- "number"
5744
- ) || containerAppOptional.wrangler_ssh.port < 1 || containerAppOptional.wrangler_ssh.port > 65535) {
5775
+ const sshPort = "port" in sshConfigObject ? sshConfigObject.port : void 0;
5776
+ if (!isOptionalProperty(sshConfigObject, "port", "number") || typeof sshPort === "number" && (sshPort < 1 || sshPort > 65535)) {
5745
5777
  diagnostics.errors.push(
5746
- `${field}.wrangler_ssh.port must be a number between 1 and 65535 inclusive`
5778
+ `${field}.${sshField}.port must be a number between 1 and 65535 inclusive`
5747
5779
  );
5748
5780
  }
5749
5781
  }
@@ -5819,6 +5851,43 @@ function validateContainerApp(envName, topLevelName, configPath) {
5819
5851
  constraints.tiers,
5820
5852
  "number"
5821
5853
  );
5854
+ validateOptionalProperty(
5855
+ diagnostics,
5856
+ `${field}.constraints`,
5857
+ "jurisdiction",
5858
+ constraints.jurisdiction,
5859
+ "string"
5860
+ );
5861
+ if (constraints.jurisdiction && !["eu", "fedramp"].includes(constraints.jurisdiction)) {
5862
+ diagnostics.errors.push(
5863
+ `${field}.constraints.jurisdiction must be one of: "eu", "fedramp"`
5864
+ );
5865
+ }
5866
+ if (validateOptionalTypedArray(
5867
+ diagnostics,
5868
+ `${field}.constraints.regions`,
5869
+ constraints.regions,
5870
+ "string"
5871
+ ) && constraints.regions && Array.isArray(constraints.regions)) {
5872
+ const validRegions = [
5873
+ "ENAM",
5874
+ "WNAM",
5875
+ "EEUR",
5876
+ "WEUR",
5877
+ "APAC",
5878
+ "SAM",
5879
+ "ME",
5880
+ "OC",
5881
+ "AFR"
5882
+ ];
5883
+ for (const region of constraints.regions) {
5884
+ if (typeof region === "string" && !validRegions.includes(region.toUpperCase())) {
5885
+ diagnostics.errors.push(
5886
+ `${field}.constraints.regions contains invalid region "${region}". Valid regions are: ${validRegions.join(", ")}`
5887
+ );
5888
+ }
5889
+ }
5890
+ }
5822
5891
  }
5823
5892
  if (typeof containerAppOptional.instance_type === "string") {
5824
5893
  validateOptionalProperty(
@@ -6145,11 +6214,11 @@ Pages requires Durable Object bindings to specify the name of the Worker where t
6145
6214
  }
6146
6215
  }
6147
6216
  }
6148
- var require_XDGAppPaths, require_XDG, require_OSPaths, require_node, require_mod_cjs, require_node2, require_mod_cjs2, require_node3, require_mod_cjs3; exports.unstable_defaultWranglerConfig = void 0; exports.experimental_patchConfig = void 0; var getJSONPath, PatchConfigError, util, objectUtil, ZodParsedType, getParsedType, ZodIssueCode, quotelessJson, ZodError, errorMap, overrideErrorMap, makeIssue, EMPTY_PATH, ParseStatus, INVALID, DIRTY, OK, isAborted, isDirty, isValid, isAsync, errorUtil, ParseInputLazyPath, handleResult, ZodType, cuidRegex, cuid2Regex, ulidRegex, uuidRegex, emailRegex, emojiRegex, ipv4Regex, ipv6Regex, datetimeRegex, ZodString, ZodNumber, ZodBigInt, ZodBoolean, ZodDate, ZodSymbol, ZodUndefined, ZodNull, ZodAny, ZodUnknown, ZodNever, ZodVoid, ZodArray, ZodObject, ZodUnion, getDiscriminator, ZodDiscriminatedUnion, ZodIntersection, ZodTuple, ZodRecord, ZodMap, ZodSet, ZodFunction, ZodLazy, ZodLiteral, ZodEnum, ZodNativeEnum, ZodPromise, ZodEffects, ZodOptional, ZodNullable, ZodDefault, ZodCatch, ZodNaN, BRAND, ZodBranded, ZodPipeline, ZodReadonly, custom, late, ZodFirstPartyTypeKind, instanceOfType, stringType, numberType, nanType, bigIntType, booleanType, dateType, symbolType, undefinedType, nullType, anyType, unknownType, neverType, voidType, arrayType, objectType, strictObjectType, unionType, discriminatedUnionType, intersectionType, tupleType, recordType, mapType, setType, functionType, lazyType, literalType, enumType, nativeEnumType, promiseType, effectsType, optionalType, nullableType, preprocessType, pipelineType, ostring, onumber, oboolean, coerce, NEVER, z, MAX_WORKFLOW_NAME_LENGTH, ALLOWED_STRING_ID_PATTERN, ALLOWED_WORKFLOW_INSTANCE_ID_REGEX, ALLOWED_WORKFLOW_NAME_REGEX, mod_esm_exports, import_mod_cjs, mod_esm_default, getC3CommandFromEnv, getWranglerSendMetricsFromEnv, getWranglerSendErrorReportsFromEnv, getCloudflareApiEnvironmentFromEnv, COMPLIANCE_REGION_CONFIG_PUBLIC, COMPLIANCE_REGION_CONFIG_UNKNOWN, getCloudflareComplianceRegionFromEnv, getCloudflareComplianceRegion, getCloudflareApiBaseUrlFromEnv, getCloudflareApiBaseUrl, getSanitizeLogs, getOutputFileDirectoryFromEnv, getOutputFilePathFromEnv, getCIMatchTag, getCIOverrideName, getCIOverrideNetworkModeHost, getCIGeneratePreviewAlias, getWorkersCIBranchName, getBuildConditionsFromEnv, getBuildPlatformFromEnv, getRegistryPath, getD1ExtraLocationChoices, getDockerPath, getSubdomainMixedStateCheckDisabled, getCloudflareLoadDevVarsFromDotEnv, getCloudflareIncludeProcessEnvFromEnv, getTraceHeader, getDisableConfigWatching, getWranglerHideBanner, getCloudflareEnv, getOpenNextDeployFromEnv, getLocalExplorerEnabledFromEnv, getBrowserRenderingHeadfulFromEnv, getWranglerCacheDirFromEnv, getCloudflaredPathFromEnv, Diagnostics, appendEnvName, isString, isValidName, isValidDateTimeStringFormat, isStringArray, isOneOf, all, isMutuallyExclusiveWith, isBoolean, validateRequiredProperty, validateAtLeastOnePropertyRequired, validateOptionalProperty, validateTypedArray, validateOptionalTypedArray, isRequiredProperty, isOptionalProperty, hasProperty, validateAdditionalProperties, getBindingNames, isBindingList, isNamespaceList, isRecord, validateUniqueNameProperty, bucketFormatMessage, friendlyBindingNames, bindingTypeFriendlyNames, ENGLISH, ALLOWED_INSTANCE_TYPES, isRoute, isRouteArray, validateTailConsumers, validateStreamingTailConsumers, validateAndNormalizeRules, validateTriggers, validateRules, validateRule, validateDefines, validateVars, validateSecrets, validateBindingsProperty, validateUnsafeSettings, validateDurableObjectBinding, workflowNameFormatMessage, validateWorkflowBinding, validateCflogfwdrObject, validateCflogfwdrBinding, validateAssetsConfig, validateNamedSimpleBinding, validateAIBinding, validateVersionMetadataBinding, validateUnsafeBinding, validateBindingArray, validateCloudchamberConfig, validateKVBinding, validateSendEmailBinding, validateQueueBinding, validateR2Binding, validateD1Binding, validateVectorizeBinding, validateAISearchNamespaceBinding, validateAISearchBinding, validateHyperdriveBinding, validateVpcServiceBinding, validateVpcNetworkBinding, validateBindingsHaveUniqueNames, validateServiceBinding, validateAnalyticsEngineBinding, validateWorkerNamespaceBinding, validateMTlsCertificateBinding, validateConsumer, validateCompatibilityDate, validatePipelineBinding, validateSecretsStoreSecretBinding, validateHelloWorldBinding, validateFlagshipBinding, validateWorkerLoaderBinding, validateRateLimitBinding, validatePreviewsConfig, validateMigrations, validateObservability, validateCache, validatePythonModules, supportedPagesConfigFields;
6217
+ var require_XDGAppPaths, require_XDG, require_OSPaths, require_node, require_mod_cjs, require_node2, require_mod_cjs2, require_node3, require_mod_cjs3; exports.unstable_defaultWranglerConfig = void 0; exports.experimental_patchConfig = void 0; var getJSONPath, PatchConfigError, util, objectUtil, ZodParsedType, getParsedType, ZodIssueCode, quotelessJson, ZodError, errorMap, overrideErrorMap, makeIssue, EMPTY_PATH, ParseStatus, INVALID, DIRTY, OK, isAborted, isDirty, isValid, isAsync, errorUtil, ParseInputLazyPath, handleResult, ZodType, cuidRegex, cuid2Regex, ulidRegex, uuidRegex, emailRegex, emojiRegex, ipv4Regex, ipv6Regex, datetimeRegex, ZodString, ZodNumber, ZodBigInt, ZodBoolean, ZodDate, ZodSymbol, ZodUndefined, ZodNull, ZodAny, ZodUnknown, ZodNever, ZodVoid, ZodArray, ZodObject, ZodUnion, getDiscriminator, ZodDiscriminatedUnion, ZodIntersection, ZodTuple, ZodRecord, ZodMap, ZodSet, ZodFunction, ZodLazy, ZodLiteral, ZodEnum, ZodNativeEnum, ZodPromise, ZodEffects, ZodOptional, ZodNullable, ZodDefault, ZodCatch, ZodNaN, BRAND, ZodBranded, ZodPipeline, ZodReadonly, custom, late, ZodFirstPartyTypeKind, instanceOfType, stringType, numberType, nanType, bigIntType, booleanType, dateType, symbolType, undefinedType, nullType, anyType, unknownType, neverType, voidType, arrayType, objectType, strictObjectType, unionType, discriminatedUnionType, intersectionType, tupleType, recordType, mapType, setType, functionType, lazyType, literalType, enumType, nativeEnumType, promiseType, effectsType, optionalType, nullableType, preprocessType, pipelineType, ostring, onumber, oboolean, coerce, NEVER, z, MAX_WORKFLOW_NAME_LENGTH, ALLOWED_STRING_ID_PATTERN, ALLOWED_WORKFLOW_INSTANCE_ID_REGEX, ALLOWED_WORKFLOW_NAME_REGEX, mod_esm_exports, import_mod_cjs, mod_esm_default, getC3CommandFromEnv, getWranglerSendMetricsFromEnv, getWranglerSendErrorReportsFromEnv, getCloudflareApiEnvironmentFromEnv, COMPLIANCE_REGION_CONFIG_PUBLIC, COMPLIANCE_REGION_CONFIG_UNKNOWN, getCloudflareComplianceRegionFromEnv, getCloudflareComplianceRegion, getCloudflareApiBaseUrlFromEnv, getCloudflareApiBaseUrl, getSanitizeLogs, getOutputFileDirectoryFromEnv, getOutputFilePathFromEnv, getCIMatchTag, getCIOverrideName, getCIOverrideNetworkModeHost, getCIGeneratePreviewAlias, getWorkersCIBranchName, getBuildConditionsFromEnv, getBuildPlatformFromEnv, getRegistryPath, getD1ExtraLocationChoices, getDockerPath, getSubdomainMixedStateCheckDisabled, getCloudflareLoadDevVarsFromDotEnv, getCloudflareIncludeProcessEnvFromEnv, getTraceHeader, getDisableConfigWatching, getWranglerHideBanner, getCloudflareEnv, getOpenNextDeployFromEnv, getLocalExplorerEnabledFromEnv, getBrowserRenderingHeadfulFromEnv, getWranglerCacheDirFromEnv, getCloudflaredPathFromEnv, Diagnostics, appendEnvName, isString, isValidName, isValidDateTimeStringFormat, isStringArray, isOneOf, all, isMutuallyExclusiveWith, isBoolean, validateRequiredProperty, validateAtLeastOnePropertyRequired, validateOptionalProperty, validateTypedArray, validateOptionalTypedArray, isRequiredProperty, isOptionalProperty, hasProperty, validateAdditionalProperties, getBindingNames, isBindingList, isNamespaceList, isRecord, validateUniqueNameProperty, bucketFormatMessage, friendlyBindingNames, bindingTypeFriendlyNames, ENGLISH, ALLOWED_INSTANCE_TYPES, isRoute, isRouteArray, validateTailConsumers, validateStreamingTailConsumers, validateAndNormalizeRules, validateTriggers, validateRules, validateRule, validateDefines, validateVars, validateSecrets, validateBindingsProperty, validateUnsafeSettings, validateDurableObjectBinding, workflowNameFormatMessage, validateWorkflowBinding, validateCflogfwdrObject, validateCflogfwdrBinding, validateAssetsConfig, validateNamedSimpleBinding, validateAIBinding, validateVersionMetadataBinding, validateUnsafeBinding, validateBindingArray, validateCloudchamberConfig, validateKVBinding, validateSendEmailBinding, validateQueueBinding, validateR2Binding, validateD1Binding, validateVectorizeBinding, validateAISearchNamespaceBinding, validateAISearchBinding, validateHyperdriveBinding, validateVpcServiceBinding, validateVpcNetworkBinding, validateBindingsHaveUniqueNames, validateServiceBinding, validateAnalyticsEngineBinding, validateWorkerNamespaceBinding, validateMTlsCertificateBinding, validateConsumer, validateCompatibilityDate, validatePipelineBinding, validateSecretsStoreSecretBinding, validateArtifactsBinding, validateHelloWorldBinding, validateFlagshipBinding, validateWorkerLoaderBinding, validateRateLimitBinding, validatePreviewsConfig, validateMigrations, validateObservability, validateCache, validatePythonModules, supportedPagesConfigFields;
6149
6218
  var init_dist = __esm({
6150
6219
  "../workers-utils/dist/index.mjs"() {
6151
6220
  init_import_meta_url();
6152
- init_chunk_S3JFRPJM();
6221
+ init_chunk_L6UDSO24();
6153
6222
  init_chunk_O4YGOZSW();
6154
6223
  init_chunk_A4F3D336();
6155
6224
  init_chunk_A4F3D336();
@@ -6721,6 +6790,7 @@ var init_dist = __esm({
6721
6790
  hyperdrive: [],
6722
6791
  workflows: [],
6723
6792
  secrets_store_secrets: [],
6793
+ artifacts: [],
6724
6794
  services: [],
6725
6795
  analytics_engine_datasets: [],
6726
6796
  ai: void 0,
@@ -11227,7 +11297,7 @@ var init_dist = __esm({
11227
11297
  services: "Worker",
11228
11298
  analytics_engine_datasets: "Analytics Engine Dataset",
11229
11299
  text_blobs: "Text Blob",
11230
- browser: "Browser",
11300
+ browser: "Browser Run",
11231
11301
  ai: "AI",
11232
11302
  images: "Images",
11233
11303
  stream: "Stream",
@@ -11241,6 +11311,7 @@ var init_dist = __esm({
11241
11311
  workflows: "Workflow",
11242
11312
  pipelines: "Pipeline",
11243
11313
  secrets_store_secrets: "Secrets Store Secret",
11314
+ artifacts: "Artifacts",
11244
11315
  ratelimits: "Rate Limit",
11245
11316
  assets: "Assets",
11246
11317
  unsafe_hello_world: "Hello World",
@@ -11258,7 +11329,7 @@ var init_dist = __esm({
11258
11329
  send_email: "Send Email",
11259
11330
  wasm_module: "Wasm Module",
11260
11331
  text_blob: "Text Blob",
11261
- browser: "Browser",
11332
+ browser: "Browser Run",
11262
11333
  ai: "AI",
11263
11334
  images: "Images",
11264
11335
  stream: "Stream",
@@ -11280,6 +11351,7 @@ var init_dist = __esm({
11280
11351
  mtls_certificate: "mTLS Certificate",
11281
11352
  pipeline: "Pipeline",
11282
11353
  secrets_store_secret: "Secrets Store Secret",
11354
+ artifacts: "Artifacts",
11283
11355
  logfwdr: "logfwdr",
11284
11356
  unsafe_hello_world: "Hello World",
11285
11357
  flagship: "Flagship",
@@ -12116,7 +12188,8 @@ Please add a binding for each to "${fieldPath}.bindings":
12116
12188
  "flagship",
12117
12189
  "vpc_network",
12118
12190
  "stream",
12119
- "media"
12191
+ "media",
12192
+ "artifacts"
12120
12193
  ];
12121
12194
  if (safeBindings.includes(value.type)) {
12122
12195
  diagnostics.warnings.push(
@@ -13052,6 +13125,40 @@ ${resolution}`);
13052
13125
  ]);
13053
13126
  return isValid22;
13054
13127
  }, "validateSecretsStoreSecretBinding");
13128
+ validateArtifactsBinding = /* @__PURE__ */ __name2((diagnostics, field, value) => {
13129
+ if (typeof value !== "object" || value === null) {
13130
+ diagnostics.errors.push(
13131
+ `"artifacts" bindings should be objects, but got ${JSON.stringify(value)}`
13132
+ );
13133
+ return false;
13134
+ }
13135
+ let isValid22 = true;
13136
+ if (!isRequiredProperty(value, "binding", "string")) {
13137
+ diagnostics.errors.push(
13138
+ `"${field}" bindings must have a string "binding" field but got ${JSON.stringify(
13139
+ value
13140
+ )}.`
13141
+ );
13142
+ isValid22 = false;
13143
+ }
13144
+ if (!isRequiredProperty(value, "namespace", "string")) {
13145
+ diagnostics.errors.push(
13146
+ `"${field}" bindings must have a string "namespace" field but got ${JSON.stringify(
13147
+ value
13148
+ )}.`
13149
+ );
13150
+ isValid22 = false;
13151
+ }
13152
+ validateAdditionalProperties(diagnostics, field, Object.keys(value), [
13153
+ "binding",
13154
+ "namespace",
13155
+ "remote"
13156
+ ]);
13157
+ if (!isRemoteValid(value, field, diagnostics)) {
13158
+ isValid22 = false;
13159
+ }
13160
+ return isValid22;
13161
+ }, "validateArtifactsBinding");
13055
13162
  validateHelloWorldBinding = /* @__PURE__ */ __name2((diagnostics, field, value) => {
13056
13163
  if (typeof value !== "object" || value === null) {
13057
13164
  diagnostics.errors.push(
@@ -13248,6 +13355,7 @@ ${resolution}`);
13248
13355
  "media",
13249
13356
  "pipelines",
13250
13357
  "secrets_store_secrets",
13358
+ "artifacts",
13251
13359
  "unsafe_hello_world",
13252
13360
  "worker_loaders",
13253
13361
  "ratelimits",
@@ -13417,6 +13525,12 @@ ${resolution}`);
13417
13525
  previews.secrets_store_secrets,
13418
13526
  void 0
13419
13527
  ) && isValid22;
13528
+ isValid22 = validateBindingArray(envName, validateArtifactsBinding)(
13529
+ diagnostics,
13530
+ `${field}.artifacts`,
13531
+ previews.artifacts,
13532
+ void 0
13533
+ ) && isValid22;
13420
13534
  isValid22 = validateBindingArray(envName, validateHelloWorldBinding)(
13421
13535
  diagnostics,
13422
13536
  `${field}.unsafe_hello_world`,
@@ -16644,7 +16758,7 @@ var require_tree = __commonJS({
16644
16758
  var require_util = __commonJS({
16645
16759
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/core/util.js"(exports, module2) {
16646
16760
  init_import_meta_url();
16647
- var assert61 = __require("assert");
16761
+ var assert62 = __require("assert");
16648
16762
  var { kDestroyed, kBodyUsed, kListeners, kBody } = require_symbols();
16649
16763
  var { IncomingMessage } = __require("http");
16650
16764
  var stream2 = __require("stream");
@@ -16665,7 +16779,7 @@ var require_util = __commonJS({
16665
16779
  this[kBodyUsed] = false;
16666
16780
  }
16667
16781
  async *[Symbol.asyncIterator]() {
16668
- assert61(!this[kBodyUsed], "disturbed");
16782
+ assert62(!this[kBodyUsed], "disturbed");
16669
16783
  this[kBodyUsed] = true;
16670
16784
  yield* this[kBody];
16671
16785
  }
@@ -16677,7 +16791,7 @@ var require_util = __commonJS({
16677
16791
  if (isStream2(body)) {
16678
16792
  if (bodyLength(body) === 0) {
16679
16793
  body.on("data", function() {
16680
- assert61(false);
16794
+ assert62(false);
16681
16795
  });
16682
16796
  }
16683
16797
  if (typeof body.readableDidRead !== "boolean") {
@@ -16797,7 +16911,7 @@ var require_util = __commonJS({
16797
16911
  function getHostname(host) {
16798
16912
  if (host[0] === "[") {
16799
16913
  const idx2 = host.indexOf("]");
16800
- assert61(idx2 !== -1);
16914
+ assert62(idx2 !== -1);
16801
16915
  return host.substring(1, idx2);
16802
16916
  }
16803
16917
  const idx = host.indexOf(":");
@@ -16809,7 +16923,7 @@ var require_util = __commonJS({
16809
16923
  if (!host) {
16810
16924
  return null;
16811
16925
  }
16812
- assert61(typeof host === "string");
16926
+ assert62(typeof host === "string");
16813
16927
  const servername = getHostname(host);
16814
16928
  if (net3.isIP(servername)) {
16815
16929
  return "";
@@ -17367,7 +17481,7 @@ var require_util = __commonJS({
17367
17481
  function errorRequest(client, request4, err) {
17368
17482
  try {
17369
17483
  request4.onError(err);
17370
- assert61(request4.aborted);
17484
+ assert62(request4.aborted);
17371
17485
  } catch (err2) {
17372
17486
  client.emit("error", err2);
17373
17487
  }
@@ -17773,7 +17887,7 @@ var require_request = __commonJS({
17773
17887
  InvalidArgumentError,
17774
17888
  NotSupportedError
17775
17889
  } = require_errors();
17776
- var assert61 = __require("assert");
17890
+ var assert62 = __require("assert");
17777
17891
  var {
17778
17892
  isValidHTTPToken,
17779
17893
  isValidHeaderValue,
@@ -17962,8 +18076,8 @@ var require_request = __commonJS({
17962
18076
  }
17963
18077
  }
17964
18078
  onConnect(abort) {
17965
- assert61(!this.aborted);
17966
- assert61(!this.completed);
18079
+ assert62(!this.aborted);
18080
+ assert62(!this.completed);
17967
18081
  if (this.error) {
17968
18082
  abort(this.error);
17969
18083
  } else {
@@ -17975,8 +18089,8 @@ var require_request = __commonJS({
17975
18089
  return this[kHandler].onResponseStarted?.();
17976
18090
  }
17977
18091
  onHeaders(statusCode, headers, resume, statusText) {
17978
- assert61(!this.aborted);
17979
- assert61(!this.completed);
18092
+ assert62(!this.aborted);
18093
+ assert62(!this.completed);
17980
18094
  if (channels.headers.hasSubscribers) {
17981
18095
  channels.headers.publish({ request: this, response: { statusCode, headers, statusText } });
17982
18096
  }
@@ -17987,8 +18101,8 @@ var require_request = __commonJS({
17987
18101
  }
17988
18102
  }
17989
18103
  onData(chunk) {
17990
- assert61(!this.aborted);
17991
- assert61(!this.completed);
18104
+ assert62(!this.aborted);
18105
+ assert62(!this.completed);
17992
18106
  if (channels.bodyChunkReceived.hasSubscribers) {
17993
18107
  channels.bodyChunkReceived.publish({ request: this, chunk });
17994
18108
  }
@@ -18000,14 +18114,14 @@ var require_request = __commonJS({
18000
18114
  }
18001
18115
  }
18002
18116
  onUpgrade(statusCode, headers, socket) {
18003
- assert61(!this.aborted);
18004
- assert61(!this.completed);
18117
+ assert62(!this.aborted);
18118
+ assert62(!this.completed);
18005
18119
  return this[kHandler].onUpgrade(statusCode, headers, socket);
18006
18120
  }
18007
18121
  onComplete(trailers) {
18008
18122
  this.onFinally();
18009
- assert61(!this.aborted);
18010
- assert61(!this.completed);
18123
+ assert62(!this.aborted);
18124
+ assert62(!this.completed);
18011
18125
  this.completed = true;
18012
18126
  if (channels.trailers.hasSubscribers) {
18013
18127
  channels.trailers.publish({ request: this, trailers });
@@ -18492,7 +18606,7 @@ var require_connect = __commonJS({
18492
18606
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/core/connect.js"(exports, module2) {
18493
18607
  init_import_meta_url();
18494
18608
  var net3 = __require("net");
18495
- var assert61 = __require("assert");
18609
+ var assert62 = __require("assert");
18496
18610
  var util5 = require_util();
18497
18611
  var { InvalidArgumentError } = require_errors();
18498
18612
  var tls;
@@ -18541,7 +18655,7 @@ var require_connect = __commonJS({
18541
18655
  }
18542
18656
  servername = servername || options.servername || util5.getServerName(host) || null;
18543
18657
  const sessionKey = servername || hostname2;
18544
- assert61(sessionKey);
18658
+ assert62(sessionKey);
18545
18659
  const session = customSession || sessionCache.get(sessionKey) || null;
18546
18660
  port = port || 443;
18547
18661
  socket = tls.connect({
@@ -18561,7 +18675,7 @@ var require_connect = __commonJS({
18561
18675
  sessionCache.set(sessionKey, session2);
18562
18676
  });
18563
18677
  } else {
18564
- assert61(!httpSocket, "httpSocket can only be sent on TLS update");
18678
+ assert62(!httpSocket, "httpSocket can only be sent on TLS update");
18565
18679
  port = port || 80;
18566
18680
  socket = net3.connect({
18567
18681
  highWaterMark: 64 * 1024,
@@ -19561,7 +19675,7 @@ var require_encoding = __commonJS({
19561
19675
  var require_infra = __commonJS({
19562
19676
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/infra/index.js"(exports, module2) {
19563
19677
  init_import_meta_url();
19564
- var assert61 = __require("assert");
19678
+ var assert62 = __require("assert");
19565
19679
  var { utf8DecodeBytes } = require_encoding();
19566
19680
  function collectASequenceOfCodePoints(condition, input, position) {
19567
19681
  let result = "";
@@ -19632,7 +19746,7 @@ var require_infra = __commonJS({
19632
19746
  __name(isomorphicDecode, "isomorphicDecode");
19633
19747
  var invalidIsomorphicEncodeValueRegex = /[^\x00-\xFF]/;
19634
19748
  function isomorphicEncode(input) {
19635
- assert61(!invalidIsomorphicEncodeValueRegex.test(input));
19749
+ assert62(!invalidIsomorphicEncodeValueRegex.test(input));
19636
19750
  return input;
19637
19751
  }
19638
19752
  __name(isomorphicEncode, "isomorphicEncode");
@@ -19661,7 +19775,7 @@ var require_infra = __commonJS({
19661
19775
  if (result === void 0) {
19662
19776
  throw new TypeError("Value is not JSON serializable");
19663
19777
  }
19664
- assert61(typeof result === "string");
19778
+ assert62(typeof result === "string");
19665
19779
  return result;
19666
19780
  }
19667
19781
  __name(serializeJavascriptValueToJSONString, "serializeJavascriptValueToJSONString");
@@ -19684,14 +19798,14 @@ var require_infra = __commonJS({
19684
19798
  var require_data_url = __commonJS({
19685
19799
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/fetch/data-url.js"(exports, module2) {
19686
19800
  init_import_meta_url();
19687
- var assert61 = __require("assert");
19801
+ var assert62 = __require("assert");
19688
19802
  var { forgivingBase64, collectASequenceOfCodePoints, collectASequenceOfCodePointsFast, isomorphicDecode, removeASCIIWhitespace, removeChars } = require_infra();
19689
19803
  var encoder = new TextEncoder();
19690
19804
  var HTTP_TOKEN_CODEPOINTS = /^[-!#$%&'*+.^_|~A-Za-z0-9]+$/u;
19691
19805
  var HTTP_WHITESPACE_REGEX = /[\u000A\u000D\u0009\u0020]/u;
19692
19806
  var HTTP_QUOTED_STRING_TOKENS = /^[\u0009\u0020-\u007E\u0080-\u00FF]+$/u;
19693
19807
  function dataURLProcessor(dataURL) {
19694
- assert61(dataURL.protocol === "data:");
19808
+ assert62(dataURL.protocol === "data:");
19695
19809
  let input = URLSerializer(dataURL, true);
19696
19810
  input = input.slice(5);
19697
19811
  const position = { position: 0 };
@@ -19863,7 +19977,7 @@ var require_data_url = __commonJS({
19863
19977
  function collectAnHTTPQuotedString(input, position, extractValue3 = false) {
19864
19978
  const positionStart = position.position;
19865
19979
  let value = "";
19866
- assert61(input[position.position] === '"');
19980
+ assert62(input[position.position] === '"');
19867
19981
  position.position++;
19868
19982
  while (true) {
19869
19983
  value += collectASequenceOfCodePoints(
@@ -19884,7 +19998,7 @@ var require_data_url = __commonJS({
19884
19998
  value += input[position.position];
19885
19999
  position.position++;
19886
20000
  } else {
19887
- assert61(quoteOrBackslash === '"');
20001
+ assert62(quoteOrBackslash === '"');
19888
20002
  break;
19889
20003
  }
19890
20004
  }
@@ -19895,7 +20009,7 @@ var require_data_url = __commonJS({
19895
20009
  }
19896
20010
  __name(collectAnHTTPQuotedString, "collectAnHTTPQuotedString");
19897
20011
  function serializeAMimeType(mimeType) {
19898
- assert61(mimeType !== "failure");
20012
+ assert62(mimeType !== "failure");
19899
20013
  const { parameters, essence } = mimeType;
19900
20014
  let serialization = essence;
19901
20015
  for (let [name2, value] of parameters.entries()) {
@@ -20083,7 +20197,7 @@ var require_runtime_features = __commonJS({
20083
20197
  var require_webidl = __commonJS({
20084
20198
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/webidl/index.js"(exports, module2) {
20085
20199
  init_import_meta_url();
20086
- var assert61 = __require("assert");
20200
+ var assert62 = __require("assert");
20087
20201
  var { types: types13, inspect: inspect3 } = __require("util");
20088
20202
  var { runtimeFeatures } = require_runtime_features();
20089
20203
  var UNDEFINED = 1;
@@ -20439,7 +20553,7 @@ var require_webidl = __commonJS({
20439
20553
  offset = jsBufferSource.byteOffset;
20440
20554
  length = jsBufferSource.byteLength;
20441
20555
  } else {
20442
- assert61(types13.isAnyArrayBuffer(jsBufferSource));
20556
+ assert62(types13.isAnyArrayBuffer(jsBufferSource));
20443
20557
  length = jsBufferSource.byteLength;
20444
20558
  }
20445
20559
  if (jsArrayBuffer.detached) {
@@ -20692,7 +20806,7 @@ var require_util2 = __commonJS({
20692
20806
  var { collectAnHTTPQuotedString, parseMIMEType } = require_data_url();
20693
20807
  var { performance: performance2 } = __require("perf_hooks");
20694
20808
  var { ReadableStreamFrom, isValidHTTPToken, normalizedMethodRecordsBase } = require_util();
20695
- var assert61 = __require("assert");
20809
+ var assert62 = __require("assert");
20696
20810
  var { isUint8Array } = __require("util/types");
20697
20811
  var { webidl } = require_webidl();
20698
20812
  var { isomorphicEncode, collectASequenceOfCodePoints, removeChars } = require_infra();
@@ -20895,7 +21009,7 @@ var require_util2 = __commonJS({
20895
21009
  __name(clonePolicyContainer, "clonePolicyContainer");
20896
21010
  function determineRequestsReferrer(request4) {
20897
21011
  const policy = request4.referrerPolicy;
20898
- assert61(policy);
21012
+ assert62(policy);
20899
21013
  let referrerSource = null;
20900
21014
  if (request4.referrer === "client") {
20901
21015
  const globalOrigin = getGlobalOrigin();
@@ -20959,7 +21073,7 @@ var require_util2 = __commonJS({
20959
21073
  }
20960
21074
  __name(determineRequestsReferrer, "determineRequestsReferrer");
20961
21075
  function stripURLForReferrer(url4, originOnly = false) {
20962
- assert61(webidl.is.URL(url4));
21076
+ assert62(webidl.is.URL(url4));
20963
21077
  url4 = new URL(url4);
20964
21078
  if (urlIsLocal(url4)) {
20965
21079
  return "no-referrer";
@@ -21223,7 +21337,7 @@ var require_util2 = __commonJS({
21223
21337
  }
21224
21338
  __name(readAllBytes, "readAllBytes");
21225
21339
  function urlIsLocal(url4) {
21226
- assert61("protocol" in url4);
21340
+ assert62("protocol" in url4);
21227
21341
  const protocol = url4.protocol;
21228
21342
  return protocol === "about:" || protocol === "blob:" || protocol === "data:";
21229
21343
  }
@@ -21233,7 +21347,7 @@ var require_util2 = __commonJS({
21233
21347
  }
21234
21348
  __name(urlHasHttpsScheme, "urlHasHttpsScheme");
21235
21349
  function urlIsHttpHttpsScheme(url4) {
21236
- assert61("protocol" in url4);
21350
+ assert62("protocol" in url4);
21237
21351
  const protocol = url4.protocol;
21238
21352
  return protocol === "http:" || protocol === "https:";
21239
21353
  }
@@ -21406,7 +21520,7 @@ var require_util2 = __commonJS({
21406
21520
  continue;
21407
21521
  }
21408
21522
  } else {
21409
- assert61(input.charCodeAt(position.position) === 44);
21523
+ assert62(input.charCodeAt(position.position) === 44);
21410
21524
  position.position++;
21411
21525
  }
21412
21526
  }
@@ -21681,7 +21795,7 @@ var require_formdata_parser = __commonJS({
21681
21795
  var { HTTP_TOKEN_CODEPOINTS } = require_data_url();
21682
21796
  var { makeEntry } = require_formdata();
21683
21797
  var { webidl } = require_webidl();
21684
- var assert61 = __require("assert");
21798
+ var assert62 = __require("assert");
21685
21799
  var { isomorphicDecode } = require_infra();
21686
21800
  var dd = Buffer.from("--");
21687
21801
  var decoder = new TextDecoder();
@@ -21710,7 +21824,7 @@ var require_formdata_parser = __commonJS({
21710
21824
  }
21711
21825
  __name(validateBoundary, "validateBoundary");
21712
21826
  function multipartFormDataParser(input, mimeType) {
21713
- assert61(mimeType !== "failure" && mimeType.essence === "multipart/form-data");
21827
+ assert62(mimeType !== "failure" && mimeType.essence === "multipart/form-data");
21714
21828
  const boundaryString = mimeType.parameters.get("boundary");
21715
21829
  if (boundaryString === void 0) {
21716
21830
  throw parsingError("missing boundary in content-type header");
@@ -21766,8 +21880,8 @@ var require_formdata_parser = __commonJS({
21766
21880
  } else {
21767
21881
  value = decoderIgnoreBOM.decode(Buffer.from(body));
21768
21882
  }
21769
- assert61(webidl.is.USVString(name2));
21770
- assert61(typeof value === "string" && webidl.is.USVString(value) || webidl.is.File(value));
21883
+ assert62(webidl.is.USVString(name2));
21884
+ assert62(typeof value === "string" && webidl.is.USVString(value) || webidl.is.File(value));
21771
21885
  entryList.push(makeEntry(name2, value, filename));
21772
21886
  }
21773
21887
  }
@@ -22042,7 +22156,7 @@ var require_body = __commonJS({
22042
22156
  } = require_util2();
22043
22157
  var { FormData: FormData13, setFormDataState } = require_formdata();
22044
22158
  var { webidl } = require_webidl();
22045
- var assert61 = __require("assert");
22159
+ var assert62 = __require("assert");
22046
22160
  var { isErrored, isDisturbed } = __require("stream");
22047
22161
  var { isUint8Array } = __require("util/types");
22048
22162
  var { serializeAMimeType } = require_data_url();
@@ -22081,7 +22195,7 @@ var require_body = __commonJS({
22081
22195
  type: "bytes"
22082
22196
  });
22083
22197
  }
22084
- assert61(webidl.is.ReadableStream(stream2));
22198
+ assert62(webidl.is.ReadableStream(stream2));
22085
22199
  let action = null;
22086
22200
  let source = null;
22087
22201
  let length = null;
@@ -22189,8 +22303,8 @@ Content-Type: ${value.type || "application/octet-stream"}\r
22189
22303
  __name(extractBody, "extractBody");
22190
22304
  function safelyExtractBody(object, keepalive = false) {
22191
22305
  if (webidl.is.ReadableStream(object)) {
22192
- assert61(!util5.isDisturbed(object), "The body has already been consumed.");
22193
- assert61(!object.locked, "The stream is locked.");
22306
+ assert62(!util5.isDisturbed(object), "The body has already been consumed.");
22307
+ assert62(!object.locked, "The stream is locked.");
22194
22308
  }
22195
22309
  return extractBody(object, keepalive);
22196
22310
  }
@@ -22324,7 +22438,7 @@ Content-Type: ${value.type || "application/octet-stream"}\r
22324
22438
  var require_client_h1 = __commonJS({
22325
22439
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/dispatcher/client-h1.js"(exports, module2) {
22326
22440
  init_import_meta_url();
22327
- var assert61 = __require("assert");
22441
+ var assert62 = __require("assert");
22328
22442
  var util5 = require_util();
22329
22443
  var { channels } = require_diagnostics();
22330
22444
  var timers = require_timers();
@@ -22415,7 +22529,7 @@ var require_client_h1 = __commonJS({
22415
22529
  * @returns {number}
22416
22530
  */
22417
22531
  wasm_on_status: /* @__PURE__ */ __name((p7, at3, len) => {
22418
- assert61(currentParser.ptr === p7);
22532
+ assert62(currentParser.ptr === p7);
22419
22533
  const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
22420
22534
  return currentParser.onStatus(new FastBuffer(currentBufferRef.buffer, start, len));
22421
22535
  }, "wasm_on_status"),
@@ -22424,7 +22538,7 @@ var require_client_h1 = __commonJS({
22424
22538
  * @returns {number}
22425
22539
  */
22426
22540
  wasm_on_message_begin: /* @__PURE__ */ __name((p7) => {
22427
- assert61(currentParser.ptr === p7);
22541
+ assert62(currentParser.ptr === p7);
22428
22542
  return currentParser.onMessageBegin();
22429
22543
  }, "wasm_on_message_begin"),
22430
22544
  /**
@@ -22434,7 +22548,7 @@ var require_client_h1 = __commonJS({
22434
22548
  * @returns {number}
22435
22549
  */
22436
22550
  wasm_on_header_field: /* @__PURE__ */ __name((p7, at3, len) => {
22437
- assert61(currentParser.ptr === p7);
22551
+ assert62(currentParser.ptr === p7);
22438
22552
  const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
22439
22553
  return currentParser.onHeaderField(new FastBuffer(currentBufferRef.buffer, start, len));
22440
22554
  }, "wasm_on_header_field"),
@@ -22445,7 +22559,7 @@ var require_client_h1 = __commonJS({
22445
22559
  * @returns {number}
22446
22560
  */
22447
22561
  wasm_on_header_value: /* @__PURE__ */ __name((p7, at3, len) => {
22448
- assert61(currentParser.ptr === p7);
22562
+ assert62(currentParser.ptr === p7);
22449
22563
  const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
22450
22564
  return currentParser.onHeaderValue(new FastBuffer(currentBufferRef.buffer, start, len));
22451
22565
  }, "wasm_on_header_value"),
@@ -22457,7 +22571,7 @@ var require_client_h1 = __commonJS({
22457
22571
  * @returns {number}
22458
22572
  */
22459
22573
  wasm_on_headers_complete: /* @__PURE__ */ __name((p7, statusCode, upgrade, shouldKeepAlive) => {
22460
- assert61(currentParser.ptr === p7);
22574
+ assert62(currentParser.ptr === p7);
22461
22575
  return currentParser.onHeadersComplete(statusCode, upgrade === 1, shouldKeepAlive === 1);
22462
22576
  }, "wasm_on_headers_complete"),
22463
22577
  /**
@@ -22467,7 +22581,7 @@ var require_client_h1 = __commonJS({
22467
22581
  * @returns {number}
22468
22582
  */
22469
22583
  wasm_on_body: /* @__PURE__ */ __name((p7, at3, len) => {
22470
- assert61(currentParser.ptr === p7);
22584
+ assert62(currentParser.ptr === p7);
22471
22585
  const start = at3 - currentBufferPtr + currentBufferRef.byteOffset;
22472
22586
  return currentParser.onBody(new FastBuffer(currentBufferRef.buffer, start, len));
22473
22587
  }, "wasm_on_body"),
@@ -22476,7 +22590,7 @@ var require_client_h1 = __commonJS({
22476
22590
  * @returns {number}
22477
22591
  */
22478
22592
  wasm_on_message_complete: /* @__PURE__ */ __name((p7) => {
22479
- assert61(currentParser.ptr === p7);
22593
+ assert62(currentParser.ptr === p7);
22480
22594
  return currentParser.onMessageComplete();
22481
22595
  }, "wasm_on_message_complete")
22482
22596
  }
@@ -22551,10 +22665,10 @@ var require_client_h1 = __commonJS({
22551
22665
  if (this.socket.destroyed || !this.paused) {
22552
22666
  return;
22553
22667
  }
22554
- assert61(this.ptr != null);
22555
- assert61(currentParser === null);
22668
+ assert62(this.ptr != null);
22669
+ assert62(currentParser === null);
22556
22670
  this.llhttp.llhttp_resume(this.ptr);
22557
- assert61(this.timeoutType === TIMEOUT_BODY);
22671
+ assert62(this.timeoutType === TIMEOUT_BODY);
22558
22672
  if (this.timeout) {
22559
22673
  if (this.timeout.refresh) {
22560
22674
  this.timeout.refresh();
@@ -22577,9 +22691,9 @@ var require_client_h1 = __commonJS({
22577
22691
  * @param {Buffer} chunk
22578
22692
  */
22579
22693
  execute(chunk) {
22580
- assert61(currentParser === null);
22581
- assert61(this.ptr != null);
22582
- assert61(!this.paused);
22694
+ assert62(currentParser === null);
22695
+ assert62(this.ptr != null);
22696
+ assert62(!this.paused);
22583
22697
  const { socket, llhttp } = this;
22584
22698
  if (chunk.length > currentBufferSize) {
22585
22699
  if (currentBufferPtr) {
@@ -22621,8 +22735,8 @@ var require_client_h1 = __commonJS({
22621
22735
  }
22622
22736
  }
22623
22737
  destroy() {
22624
- assert61(currentParser === null);
22625
- assert61(this.ptr != null);
22738
+ assert62(currentParser === null);
22739
+ assert62(this.ptr != null);
22626
22740
  this.llhttp.llhttp_free(this.ptr);
22627
22741
  this.ptr = null;
22628
22742
  this.timeout && timers.clearTimeout(this.timeout);
@@ -22708,14 +22822,14 @@ var require_client_h1 = __commonJS({
22708
22822
  */
22709
22823
  onUpgrade(head) {
22710
22824
  const { upgrade, client, socket, headers, statusCode } = this;
22711
- assert61(upgrade);
22712
- assert61(client[kSocket] === socket);
22713
- assert61(!socket.destroyed);
22714
- assert61(!this.paused);
22715
- assert61((headers.length & 1) === 0);
22825
+ assert62(upgrade);
22826
+ assert62(client[kSocket] === socket);
22827
+ assert62(!socket.destroyed);
22828
+ assert62(!this.paused);
22829
+ assert62((headers.length & 1) === 0);
22716
22830
  const request4 = client[kQueue][client[kRunningIdx]];
22717
- assert61(request4);
22718
- assert61(request4.upgrade || request4.method === "CONNECT");
22831
+ assert62(request4);
22832
+ assert62(request4.upgrade || request4.method === "CONNECT");
22719
22833
  this.statusCode = 0;
22720
22834
  this.statusText = "";
22721
22835
  this.shouldKeepAlive = false;
@@ -22753,8 +22867,8 @@ var require_client_h1 = __commonJS({
22753
22867
  if (!request4) {
22754
22868
  return -1;
22755
22869
  }
22756
- assert61(!this.upgrade);
22757
- assert61(this.statusCode < 200);
22870
+ assert62(!this.upgrade);
22871
+ assert62(this.statusCode < 200);
22758
22872
  if (statusCode === 100) {
22759
22873
  util5.destroy(socket, new SocketError("bad response", util5.getSocketInfo(socket)));
22760
22874
  return -1;
@@ -22763,7 +22877,7 @@ var require_client_h1 = __commonJS({
22763
22877
  util5.destroy(socket, new SocketError("bad upgrade", util5.getSocketInfo(socket)));
22764
22878
  return -1;
22765
22879
  }
22766
- assert61(this.timeoutType === TIMEOUT_HEADERS);
22880
+ assert62(this.timeoutType === TIMEOUT_HEADERS);
22767
22881
  this.statusCode = statusCode;
22768
22882
  this.shouldKeepAlive = shouldKeepAlive || // Override llhttp value which does not allow keepAlive for HEAD.
22769
22883
  request4.method === "HEAD" && !socket[kReset2] && this.connection.toLowerCase() === "keep-alive";
@@ -22776,16 +22890,16 @@ var require_client_h1 = __commonJS({
22776
22890
  }
22777
22891
  }
22778
22892
  if (request4.method === "CONNECT") {
22779
- assert61(client[kRunning] === 1);
22893
+ assert62(client[kRunning] === 1);
22780
22894
  this.upgrade = true;
22781
22895
  return 2;
22782
22896
  }
22783
22897
  if (upgrade) {
22784
- assert61(client[kRunning] === 1);
22898
+ assert62(client[kRunning] === 1);
22785
22899
  this.upgrade = true;
22786
22900
  return 2;
22787
22901
  }
22788
- assert61((this.headers.length & 1) === 0);
22902
+ assert62((this.headers.length & 1) === 0);
22789
22903
  this.headers = [];
22790
22904
  this.headersSize = 0;
22791
22905
  if (this.shouldKeepAlive && client[kPipelining]) {
@@ -22832,14 +22946,14 @@ var require_client_h1 = __commonJS({
22832
22946
  return -1;
22833
22947
  }
22834
22948
  const request4 = client[kQueue][client[kRunningIdx]];
22835
- assert61(request4);
22836
- assert61(this.timeoutType === TIMEOUT_BODY);
22949
+ assert62(request4);
22950
+ assert62(this.timeoutType === TIMEOUT_BODY);
22837
22951
  if (this.timeout) {
22838
22952
  if (this.timeout.refresh) {
22839
22953
  this.timeout.refresh();
22840
22954
  }
22841
22955
  }
22842
- assert61(statusCode >= 200);
22956
+ assert62(statusCode >= 200);
22843
22957
  if (maxResponseSize > -1 && this.bytesRead + buf.length > maxResponseSize) {
22844
22958
  util5.destroy(socket, new ResponseExceededMaxSizeError());
22845
22959
  return -1;
@@ -22861,10 +22975,10 @@ var require_client_h1 = __commonJS({
22861
22975
  if (upgrade) {
22862
22976
  return 0;
22863
22977
  }
22864
- assert61(statusCode >= 100);
22865
- assert61((this.headers.length & 1) === 0);
22978
+ assert62(statusCode >= 100);
22979
+ assert62((this.headers.length & 1) === 0);
22866
22980
  const request4 = client[kQueue][client[kRunningIdx]];
22867
- assert61(request4);
22981
+ assert62(request4);
22868
22982
  this.statusCode = 0;
22869
22983
  this.statusText = "";
22870
22984
  this.bytesRead = 0;
@@ -22883,7 +22997,7 @@ var require_client_h1 = __commonJS({
22883
22997
  request4.onComplete(headers);
22884
22998
  client[kQueue][client[kRunningIdx]++] = null;
22885
22999
  if (socket[kWriting]) {
22886
- assert61(client[kRunning] === 0);
23000
+ assert62(client[kRunning] === 0);
22887
23001
  util5.destroy(socket, new InformationalError("reset"));
22888
23002
  return constants5.ERROR.PAUSED;
22889
23003
  } else if (!shouldKeepAlive) {
@@ -22908,7 +23022,7 @@ var require_client_h1 = __commonJS({
22908
23022
  const { socket, timeoutType, client, paused } = parser2;
22909
23023
  if (timeoutType === TIMEOUT_HEADERS) {
22910
23024
  if (!socket[kWriting] || socket.writableNeedDrain || client[kRunning] > 1) {
22911
- assert61(!paused, "cannot be paused while waiting for headers");
23025
+ assert62(!paused, "cannot be paused while waiting for headers");
22912
23026
  util5.destroy(socket, new HeadersTimeoutError());
22913
23027
  }
22914
23028
  } else if (timeoutType === TIMEOUT_BODY) {
@@ -22916,7 +23030,7 @@ var require_client_h1 = __commonJS({
22916
23030
  util5.destroy(socket, new BodyTimeoutError());
22917
23031
  }
22918
23032
  } else if (timeoutType === TIMEOUT_KEEP_ALIVE) {
22919
- assert61(client[kRunning] === 0 && client[kKeepAliveTimeoutValue]);
23033
+ assert62(client[kRunning] === 0 && client[kKeepAliveTimeoutValue]);
22920
23034
  util5.destroy(socket, new InformationalError("socket idle timeout"));
22921
23035
  }
22922
23036
  }
@@ -22995,7 +23109,7 @@ var require_client_h1 = __commonJS({
22995
23109
  }
22996
23110
  __name(connectH1, "connectH1");
22997
23111
  function onHttpSocketError(err) {
22998
- assert61(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
23112
+ assert62(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
22999
23113
  const parser2 = this[kParser];
23000
23114
  if (err.code === "ECONNRESET" && parser2.statusCode && !parser2.shouldKeepAlive) {
23001
23115
  parser2.onMessageComplete();
@@ -23032,7 +23146,7 @@ var require_client_h1 = __commonJS({
23032
23146
  client[kSocket] = null;
23033
23147
  client[kHTTPContext] = null;
23034
23148
  if (client.destroyed) {
23035
- assert61(client[kPending] === 0);
23149
+ assert62(client[kPending] === 0);
23036
23150
  const requests = client[kQueue].splice(client[kRunningIdx]);
23037
23151
  for (let i7 = 0; i7 < requests.length; i7++) {
23038
23152
  const request4 = requests[i7];
@@ -23044,7 +23158,7 @@ var require_client_h1 = __commonJS({
23044
23158
  util5.errorRequest(client, request4, err);
23045
23159
  }
23046
23160
  client[kPendingIdx] = client[kRunningIdx];
23047
- assert61(client[kRunning] === 0);
23161
+ assert62(client[kRunning] === 0);
23048
23162
  client.emit("disconnect", client[kUrl], [client], err);
23049
23163
  client[kResume]();
23050
23164
  }
@@ -23203,13 +23317,13 @@ upgrade: ${upgrade}\r
23203
23317
  } else if (util5.isIterable(body)) {
23204
23318
  writeIterable(abort, body, client, request4, socket, contentLength, header, expectsPayload);
23205
23319
  } else {
23206
- assert61(false);
23320
+ assert62(false);
23207
23321
  }
23208
23322
  return true;
23209
23323
  }
23210
23324
  __name(writeH1, "writeH1");
23211
23325
  function writeStream(abort, body, client, request4, socket, contentLength, header, expectsPayload) {
23212
- assert61(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
23326
+ assert62(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
23213
23327
  let finished = false;
23214
23328
  const writer = new AsyncWriter({ abort, socket, request: request4, contentLength, client, expectsPayload, header });
23215
23329
  const onData = /* @__PURE__ */ __name(function(chunk) {
@@ -23246,7 +23360,7 @@ upgrade: ${upgrade}\r
23246
23360
  return;
23247
23361
  }
23248
23362
  finished = true;
23249
- assert61(socket.destroyed || socket[kWriting] && client[kRunning] <= 1);
23363
+ assert62(socket.destroyed || socket[kWriting] && client[kRunning] <= 1);
23250
23364
  socket.off("drain", onDrain).off("error", onFinished);
23251
23365
  body.removeListener("data", onData).removeListener("end", onFinished).removeListener("close", onClose);
23252
23366
  if (!err) {
@@ -23286,12 +23400,12 @@ upgrade: ${upgrade}\r
23286
23400
  \r
23287
23401
  `, "latin1");
23288
23402
  } else {
23289
- assert61(contentLength === null, "no body must not have content length");
23403
+ assert62(contentLength === null, "no body must not have content length");
23290
23404
  socket.write(`${header}\r
23291
23405
  `, "latin1");
23292
23406
  }
23293
23407
  } else if (util5.isBuffer(body)) {
23294
- assert61(contentLength === body.byteLength, "buffer body must have content length");
23408
+ assert62(contentLength === body.byteLength, "buffer body must have content length");
23295
23409
  socket.cork();
23296
23410
  socket.write(`${header}content-length: ${contentLength}\r
23297
23411
  \r
@@ -23311,7 +23425,7 @@ upgrade: ${upgrade}\r
23311
23425
  }
23312
23426
  __name(writeBuffer, "writeBuffer");
23313
23427
  async function writeBlob(abort, body, client, request4, socket, contentLength, header, expectsPayload) {
23314
- assert61(contentLength === body.size, "blob body must have content length");
23428
+ assert62(contentLength === body.size, "blob body must have content length");
23315
23429
  try {
23316
23430
  if (contentLength != null && contentLength !== body.size) {
23317
23431
  throw new RequestContentLengthMismatchError();
@@ -23335,7 +23449,7 @@ upgrade: ${upgrade}\r
23335
23449
  }
23336
23450
  __name(writeBlob, "writeBlob");
23337
23451
  async function writeIterable(abort, body, client, request4, socket, contentLength, header, expectsPayload) {
23338
- assert61(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
23452
+ assert62(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
23339
23453
  let callback = null;
23340
23454
  function onDrain() {
23341
23455
  if (callback) {
@@ -23346,7 +23460,7 @@ upgrade: ${upgrade}\r
23346
23460
  }
23347
23461
  __name(onDrain, "onDrain");
23348
23462
  const waitForDrain = /* @__PURE__ */ __name(() => new Promise((resolve32, reject) => {
23349
- assert61(callback === null);
23463
+ assert62(callback === null);
23350
23464
  if (socket[kError]) {
23351
23465
  reject(socket[kError]);
23352
23466
  } else {
@@ -23499,7 +23613,7 @@ ${len.toString(16)}\r
23499
23613
  const { socket, client, abort } = this;
23500
23614
  socket[kWriting] = false;
23501
23615
  if (err) {
23502
- assert61(client[kRunning] <= 1, "pipeline should only contain this request");
23616
+ assert62(client[kRunning] <= 1, "pipeline should only contain this request");
23503
23617
  abort(err);
23504
23618
  }
23505
23619
  }
@@ -23512,7 +23626,7 @@ ${len.toString(16)}\r
23512
23626
  var require_client_h2 = __commonJS({
23513
23627
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/dispatcher/client-h2.js"(exports, module2) {
23514
23628
  init_import_meta_url();
23515
- var assert61 = __require("assert");
23629
+ var assert62 = __require("assert");
23516
23630
  var { pipeline } = __require("stream");
23517
23631
  var util5 = require_util();
23518
23632
  var {
@@ -23738,7 +23852,7 @@ var require_client_h2 = __commonJS({
23738
23852
  }
23739
23853
  __name(onHttp2SendPing, "onHttp2SendPing");
23740
23854
  function onHttp2SessionError(err) {
23741
- assert61(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
23855
+ assert62(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
23742
23856
  this[kSocket][kError] = err;
23743
23857
  this[kClient][kOnError](err);
23744
23858
  }
@@ -23771,7 +23885,7 @@ var require_client_h2 = __commonJS({
23771
23885
  util5.errorRequest(client, request4, err);
23772
23886
  client[kPendingIdx] = client[kRunningIdx];
23773
23887
  }
23774
- assert61(client[kRunning] === 0);
23888
+ assert62(client[kRunning] === 0);
23775
23889
  client.emit("disconnect", client[kUrl], [client], err);
23776
23890
  client.emit("connectionError", client[kUrl], [client], err);
23777
23891
  client[kResume]();
@@ -23788,7 +23902,7 @@ var require_client_h2 = __commonJS({
23788
23902
  state2.ping.interval = null;
23789
23903
  }
23790
23904
  if (client.destroyed) {
23791
- assert61(client[kPending] === 0);
23905
+ assert62(client[kPending] === 0);
23792
23906
  const requests = client[kQueue].splice(client[kRunningIdx]);
23793
23907
  for (let i7 = 0; i7 < requests.length; i7++) {
23794
23908
  const request4 = requests[i7];
@@ -23806,13 +23920,13 @@ var require_client_h2 = __commonJS({
23806
23920
  this[kHTTP2Session].destroy(err);
23807
23921
  }
23808
23922
  client[kPendingIdx] = client[kRunningIdx];
23809
- assert61(client[kRunning] === 0);
23923
+ assert62(client[kRunning] === 0);
23810
23924
  client.emit("disconnect", client[kUrl], [client], err);
23811
23925
  client[kResume]();
23812
23926
  }
23813
23927
  __name(onHttp2SocketClose, "onHttp2SocketClose");
23814
23928
  function onHttp2SocketError(err) {
23815
- assert61(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
23929
+ assert62(err.code !== "ERR_TLS_CERT_ALTNAME_INVALID");
23816
23930
  this[kError] = err;
23817
23931
  this[kClient][kOnError](err);
23818
23932
  }
@@ -23969,7 +24083,7 @@ var require_client_h2 = __commonJS({
23969
24083
  process.emitWarning(new RequestContentLengthMismatchError());
23970
24084
  }
23971
24085
  if (contentLength != null) {
23972
- assert61(body || contentLength === 0, "no body must not have content length");
24086
+ assert62(body || contentLength === 0, "no body must not have content length");
23973
24087
  headers[HTTP2_HEADER_CONTENT_LENGTH] = `${contentLength}`;
23974
24088
  }
23975
24089
  session.ref();
@@ -24138,7 +24252,7 @@ var require_client_h2 = __commonJS({
24138
24252
  expectsPayload
24139
24253
  );
24140
24254
  } else {
24141
- assert61(false);
24255
+ assert62(false);
24142
24256
  }
24143
24257
  }
24144
24258
  }
@@ -24146,7 +24260,7 @@ var require_client_h2 = __commonJS({
24146
24260
  function writeBuffer(abort, h2stream, body, client, request4, socket, contentLength, expectsPayload) {
24147
24261
  try {
24148
24262
  if (body != null && util5.isBuffer(body)) {
24149
- assert61(contentLength === body.byteLength, "buffer body must have content length");
24263
+ assert62(contentLength === body.byteLength, "buffer body must have content length");
24150
24264
  h2stream.cork();
24151
24265
  h2stream.write(body);
24152
24266
  h2stream.uncork();
@@ -24164,7 +24278,7 @@ var require_client_h2 = __commonJS({
24164
24278
  }
24165
24279
  __name(writeBuffer, "writeBuffer");
24166
24280
  function writeStream(abort, socket, expectsPayload, h2stream, body, client, request4, contentLength) {
24167
- assert61(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
24281
+ assert62(contentLength !== 0 || client[kRunning] === 0, "stream body cannot be pipelined");
24168
24282
  const pipe = pipeline(
24169
24283
  body,
24170
24284
  h2stream,
@@ -24190,7 +24304,7 @@ var require_client_h2 = __commonJS({
24190
24304
  }
24191
24305
  __name(writeStream, "writeStream");
24192
24306
  async function writeBlob(abort, h2stream, body, client, request4, socket, contentLength, expectsPayload) {
24193
- assert61(contentLength === body.size, "blob body must have content length");
24307
+ assert62(contentLength === body.size, "blob body must have content length");
24194
24308
  try {
24195
24309
  if (contentLength != null && contentLength !== body.size) {
24196
24310
  throw new RequestContentLengthMismatchError();
@@ -24212,7 +24326,7 @@ var require_client_h2 = __commonJS({
24212
24326
  }
24213
24327
  __name(writeBlob, "writeBlob");
24214
24328
  async function writeIterable(abort, h2stream, body, client, request4, socket, contentLength, expectsPayload) {
24215
- assert61(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
24329
+ assert62(contentLength !== 0 || client[kRunning] === 0, "iterator body cannot be pipelined");
24216
24330
  let callback = null;
24217
24331
  function onDrain() {
24218
24332
  if (callback) {
@@ -24223,7 +24337,7 @@ var require_client_h2 = __commonJS({
24223
24337
  }
24224
24338
  __name(onDrain, "onDrain");
24225
24339
  const waitForDrain = /* @__PURE__ */ __name(() => new Promise((resolve32, reject) => {
24226
- assert61(callback === null);
24340
+ assert62(callback === null);
24227
24341
  if (socket[kError]) {
24228
24342
  reject(socket[kError]);
24229
24343
  } else {
@@ -24263,7 +24377,7 @@ var require_client_h2 = __commonJS({
24263
24377
  var require_client = __commonJS({
24264
24378
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/dispatcher/client.js"(exports, module2) {
24265
24379
  init_import_meta_url();
24266
- var assert61 = __require("assert");
24380
+ var assert62 = __require("assert");
24267
24381
  var net3 = __require("net");
24268
24382
  var http6 = __require("http");
24269
24383
  var util5 = require_util();
@@ -24576,25 +24690,25 @@ var require_client = __commonJS({
24576
24690
  };
24577
24691
  function onError(client, err) {
24578
24692
  if (client[kRunning] === 0 && err.code !== "UND_ERR_INFO" && err.code !== "UND_ERR_SOCKET") {
24579
- assert61(client[kPendingIdx] === client[kRunningIdx]);
24693
+ assert62(client[kPendingIdx] === client[kRunningIdx]);
24580
24694
  const requests = client[kQueue].splice(client[kRunningIdx]);
24581
24695
  for (let i7 = 0; i7 < requests.length; i7++) {
24582
24696
  const request4 = requests[i7];
24583
24697
  util5.errorRequest(client, request4, err);
24584
24698
  }
24585
- assert61(client[kSize] === 0);
24699
+ assert62(client[kSize] === 0);
24586
24700
  }
24587
24701
  }
24588
24702
  __name(onError, "onError");
24589
24703
  function connect(client) {
24590
- assert61(!client[kConnecting]);
24591
- assert61(!client[kHTTPContext]);
24704
+ assert62(!client[kConnecting]);
24705
+ assert62(!client[kHTTPContext]);
24592
24706
  let { host, hostname: hostname2, protocol, port } = client[kUrl];
24593
24707
  if (hostname2[0] === "[") {
24594
24708
  const idx = hostname2.indexOf("]");
24595
- assert61(idx !== -1);
24709
+ assert62(idx !== -1);
24596
24710
  const ip = hostname2.substring(1, idx);
24597
- assert61(net3.isIPv6(ip));
24711
+ assert62(net3.isIPv6(ip));
24598
24712
  hostname2 = ip;
24599
24713
  }
24600
24714
  client[kConnecting] = true;
@@ -24631,7 +24745,7 @@ var require_client = __commonJS({
24631
24745
  client[kResume]();
24632
24746
  return;
24633
24747
  }
24634
- assert61(socket);
24748
+ assert62(socket);
24635
24749
  try {
24636
24750
  client[kHTTPContext] = socket.alpnProtocol === "h2" ? connectH2(client, socket) : connectH1(client, socket);
24637
24751
  } catch (err2) {
@@ -24690,7 +24804,7 @@ var require_client = __commonJS({
24690
24804
  });
24691
24805
  }
24692
24806
  if (err.code === "ERR_TLS_CERT_ALTNAME_INVALID") {
24693
- assert61(client[kRunning] === 0);
24807
+ assert62(client[kRunning] === 0);
24694
24808
  while (client[kPending] > 0 && client[kQueue][client[kPendingIdx]].servername === client[kServerName]) {
24695
24809
  const request4 = client[kQueue][client[kPendingIdx]++];
24696
24810
  util5.errorRequest(client, request4, err);
@@ -24723,7 +24837,7 @@ var require_client = __commonJS({
24723
24837
  function _resume(client, sync) {
24724
24838
  while (true) {
24725
24839
  if (client.destroyed) {
24726
- assert61(client[kPending] === 0);
24840
+ assert62(client[kPending] === 0);
24727
24841
  return;
24728
24842
  }
24729
24843
  if (client[kClosedResolve] && !client[kSize]) {
@@ -26632,7 +26746,7 @@ var require_env_http_proxy_agent = __commonJS({
26632
26746
  var require_retry_handler = __commonJS({
26633
26747
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/handler/retry-handler.js"(exports, module2) {
26634
26748
  init_import_meta_url();
26635
- var assert61 = __require("assert");
26749
+ var assert62 = __require("assert");
26636
26750
  var { kRetryHandlerDefaultRetry } = require_symbols();
26637
26751
  var { RequestRetryError } = require_errors();
26638
26752
  var WrapHandler = require_wrap_handler();
@@ -26819,8 +26933,8 @@ var require_retry_handler = __commonJS({
26819
26933
  });
26820
26934
  }
26821
26935
  const { start, size, end = size ? size - 1 : null } = contentRange;
26822
- assert61(this.start === start, "content-range mismatch");
26823
- assert61(this.end == null || this.end === end, "content-range mismatch");
26936
+ assert62(this.start === start, "content-range mismatch");
26937
+ assert62(this.end == null || this.end === end, "content-range mismatch");
26824
26938
  return;
26825
26939
  }
26826
26940
  if (this.end == null) {
@@ -26837,11 +26951,11 @@ var require_retry_handler = __commonJS({
26837
26951
  return;
26838
26952
  }
26839
26953
  const { start, size, end = size ? size - 1 : null } = range;
26840
- assert61(
26954
+ assert62(
26841
26955
  start != null && Number.isFinite(start),
26842
26956
  "content-range mismatch"
26843
26957
  );
26844
- assert61(end != null && Number.isFinite(end), "invalid content-length");
26958
+ assert62(end != null && Number.isFinite(end), "invalid content-length");
26845
26959
  this.start = start;
26846
26960
  this.end = end;
26847
26961
  }
@@ -26849,8 +26963,8 @@ var require_retry_handler = __commonJS({
26849
26963
  const contentLength = headers["content-length"];
26850
26964
  this.end = contentLength != null ? Number(contentLength) - 1 : null;
26851
26965
  }
26852
- assert61(Number.isFinite(this.start));
26853
- assert61(
26966
+ assert62(Number.isFinite(this.start));
26967
+ assert62(
26854
26968
  this.end == null || Number.isFinite(this.end),
26855
26969
  "invalid content-length"
26856
26970
  );
@@ -27031,7 +27145,7 @@ var require_h2c_client = __commonJS({
27031
27145
  var require_readable = __commonJS({
27032
27146
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/readable.js"(exports, module2) {
27033
27147
  init_import_meta_url();
27034
- var assert61 = __require("assert");
27148
+ var assert62 = __require("assert");
27035
27149
  var { Readable: Readable11 } = __require("stream");
27036
27150
  var { RequestAbortedError, NotSupportedError, InvalidArgumentError, AbortError: AbortError2 } = require_errors();
27037
27151
  var util5 = require_util();
@@ -27228,7 +27342,7 @@ var require_readable = __commonJS({
27228
27342
  this[kBody] = ReadableStreamFrom(this);
27229
27343
  if (this[kConsume]) {
27230
27344
  this[kBody].getReader();
27231
- assert61(this[kBody].locked);
27345
+ assert62(this[kBody].locked);
27232
27346
  }
27233
27347
  }
27234
27348
  return this[kBody];
@@ -27299,7 +27413,7 @@ var require_readable = __commonJS({
27299
27413
  }
27300
27414
  __name(isUnusable, "isUnusable");
27301
27415
  function consume(stream2, type) {
27302
- assert61(!stream2[kConsume]);
27416
+ assert62(!stream2[kConsume]);
27303
27417
  return new Promise((resolve32, reject) => {
27304
27418
  if (isUnusable(stream2)) {
27305
27419
  const rState = stream2._readableState;
@@ -27445,7 +27559,7 @@ var require_readable = __commonJS({
27445
27559
  var require_api_request = __commonJS({
27446
27560
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/api-request.js"(exports, module2) {
27447
27561
  init_import_meta_url();
27448
- var assert61 = __require("assert");
27562
+ var assert62 = __require("assert");
27449
27563
  var { AsyncResource } = __require("async_hooks");
27450
27564
  var { Readable: Readable11 } = require_readable();
27451
27565
  var { InvalidArgumentError, RequestAbortedError } = require_errors();
@@ -27516,7 +27630,7 @@ var require_api_request = __commonJS({
27516
27630
  abort(this.reason);
27517
27631
  return;
27518
27632
  }
27519
- assert61(this.callback);
27633
+ assert62(this.callback);
27520
27634
  this.abort = abort;
27521
27635
  this.context = context2;
27522
27636
  }
@@ -27683,7 +27797,7 @@ var require_abort_signal = __commonJS({
27683
27797
  var require_api_stream = __commonJS({
27684
27798
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/api-stream.js"(exports, module2) {
27685
27799
  init_import_meta_url();
27686
- var assert61 = __require("assert");
27800
+ var assert62 = __require("assert");
27687
27801
  var { finished } = __require("stream");
27688
27802
  var { AsyncResource } = __require("async_hooks");
27689
27803
  var { InvalidArgumentError, InvalidReturnValueError } = require_errors();
@@ -27746,7 +27860,7 @@ var require_api_stream = __commonJS({
27746
27860
  abort(this.reason);
27747
27861
  return;
27748
27862
  }
27749
- assert61(this.callback);
27863
+ assert62(this.callback);
27750
27864
  this.abort = abort;
27751
27865
  this.context = context2;
27752
27866
  }
@@ -27854,7 +27968,7 @@ var require_api_pipeline = __commonJS({
27854
27968
  Duplex: Duplex2,
27855
27969
  PassThrough: PassThrough4
27856
27970
  } = __require("stream");
27857
- var assert61 = __require("assert");
27971
+ var assert62 = __require("assert");
27858
27972
  var { AsyncResource } = __require("async_hooks");
27859
27973
  var {
27860
27974
  InvalidArgumentError,
@@ -27978,7 +28092,7 @@ var require_api_pipeline = __commonJS({
27978
28092
  abort(this.reason);
27979
28093
  return;
27980
28094
  }
27981
- assert61(!res, "pipeline cannot be retried");
28095
+ assert62(!res, "pipeline cannot be retried");
27982
28096
  this.abort = abort;
27983
28097
  this.context = context2;
27984
28098
  }
@@ -28063,7 +28177,7 @@ var require_api_upgrade = __commonJS({
28063
28177
  init_import_meta_url();
28064
28178
  var { InvalidArgumentError, SocketError } = require_errors();
28065
28179
  var { AsyncResource } = __require("async_hooks");
28066
- var assert61 = __require("assert");
28180
+ var assert62 = __require("assert");
28067
28181
  var util5 = require_util();
28068
28182
  var { kHTTP2Stream } = require_symbols();
28069
28183
  var { addSignal, removeSignal } = require_abort_signal();
@@ -28095,7 +28209,7 @@ var require_api_upgrade = __commonJS({
28095
28209
  abort(this.reason);
28096
28210
  return;
28097
28211
  }
28098
- assert61(this.callback);
28212
+ assert62(this.callback);
28099
28213
  this.abort = abort;
28100
28214
  this.context = null;
28101
28215
  }
@@ -28103,7 +28217,7 @@ var require_api_upgrade = __commonJS({
28103
28217
  throw new SocketError("bad upgrade", null);
28104
28218
  }
28105
28219
  onUpgrade(statusCode, rawHeaders, socket) {
28106
- assert61(socket[kHTTP2Stream] === true ? statusCode === 200 : statusCode === 101);
28220
+ assert62(socket[kHTTP2Stream] === true ? statusCode === 200 : statusCode === 101);
28107
28221
  const { callback, opaque, context: context2 } = this;
28108
28222
  removeSignal(this);
28109
28223
  this.callback = null;
@@ -28159,7 +28273,7 @@ var require_api_upgrade = __commonJS({
28159
28273
  var require_api_connect = __commonJS({
28160
28274
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/api/api-connect.js"(exports, module2) {
28161
28275
  init_import_meta_url();
28162
- var assert61 = __require("assert");
28276
+ var assert62 = __require("assert");
28163
28277
  var { AsyncResource } = __require("async_hooks");
28164
28278
  var { InvalidArgumentError, SocketError } = require_errors();
28165
28279
  var util5 = require_util();
@@ -28191,7 +28305,7 @@ var require_api_connect = __commonJS({
28191
28305
  abort(this.reason);
28192
28306
  return;
28193
28307
  }
28194
- assert61(this.callback);
28308
+ assert62(this.callback);
28195
28309
  this.abort = abort;
28196
28310
  this.context = context2;
28197
28311
  }
@@ -30286,7 +30400,7 @@ var require_global2 = __commonJS({
30286
30400
  var require_decorator_handler = __commonJS({
30287
30401
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/handler/decorator-handler.js"(exports, module2) {
30288
30402
  init_import_meta_url();
30289
- var assert61 = __require("assert");
30403
+ var assert62 = __require("assert");
30290
30404
  var WrapHandler = require_wrap_handler();
30291
30405
  module2.exports = class DecoratorHandler {
30292
30406
  static {
@@ -30306,25 +30420,25 @@ var require_decorator_handler = __commonJS({
30306
30420
  this.#handler.onRequestStart?.(...args);
30307
30421
  }
30308
30422
  onRequestUpgrade(...args) {
30309
- assert61(!this.#onCompleteCalled);
30310
- assert61(!this.#onErrorCalled);
30423
+ assert62(!this.#onCompleteCalled);
30424
+ assert62(!this.#onErrorCalled);
30311
30425
  return this.#handler.onRequestUpgrade?.(...args);
30312
30426
  }
30313
30427
  onResponseStart(...args) {
30314
- assert61(!this.#onCompleteCalled);
30315
- assert61(!this.#onErrorCalled);
30316
- assert61(!this.#onResponseStartCalled);
30428
+ assert62(!this.#onCompleteCalled);
30429
+ assert62(!this.#onErrorCalled);
30430
+ assert62(!this.#onResponseStartCalled);
30317
30431
  this.#onResponseStartCalled = true;
30318
30432
  return this.#handler.onResponseStart?.(...args);
30319
30433
  }
30320
30434
  onResponseData(...args) {
30321
- assert61(!this.#onCompleteCalled);
30322
- assert61(!this.#onErrorCalled);
30435
+ assert62(!this.#onCompleteCalled);
30436
+ assert62(!this.#onErrorCalled);
30323
30437
  return this.#handler.onResponseData?.(...args);
30324
30438
  }
30325
30439
  onResponseEnd(...args) {
30326
- assert61(!this.#onCompleteCalled);
30327
- assert61(!this.#onErrorCalled);
30440
+ assert62(!this.#onCompleteCalled);
30441
+ assert62(!this.#onErrorCalled);
30328
30442
  this.#onCompleteCalled = true;
30329
30443
  return this.#handler.onResponseEnd?.(...args);
30330
30444
  }
@@ -30347,7 +30461,7 @@ var require_redirect_handler = __commonJS({
30347
30461
  init_import_meta_url();
30348
30462
  var util5 = require_util();
30349
30463
  var { kBodyUsed } = require_symbols();
30350
- var assert61 = __require("assert");
30464
+ var assert62 = __require("assert");
30351
30465
  var { InvalidArgumentError } = require_errors();
30352
30466
  var EE = __require("events");
30353
30467
  var redirectableStatusCodes = [300, 301, 302, 303, 307, 308];
@@ -30363,7 +30477,7 @@ var require_redirect_handler = __commonJS({
30363
30477
  this[kBodyUsed] = false;
30364
30478
  }
30365
30479
  async *[Symbol.asyncIterator]() {
30366
- assert61(!this[kBodyUsed], "disturbed");
30480
+ assert62(!this[kBodyUsed], "disturbed");
30367
30481
  this[kBodyUsed] = true;
30368
30482
  yield* this[kBody];
30369
30483
  }
@@ -30393,7 +30507,7 @@ var require_redirect_handler = __commonJS({
30393
30507
  if (util5.isStream(this.opts.body)) {
30394
30508
  if (util5.bodyLength(this.opts.body) === 0) {
30395
30509
  this.opts.body.on("data", function() {
30396
- assert61(false);
30510
+ assert62(false);
30397
30511
  });
30398
30512
  }
30399
30513
  if (typeof this.opts.body.readableDidRead !== "boolean") {
@@ -30499,7 +30613,7 @@ var require_redirect_handler = __commonJS({
30499
30613
  }
30500
30614
  }
30501
30615
  } else {
30502
- assert61(headers == null, "headers must be an object or an array");
30616
+ assert62(headers == null, "headers must be an object or an array");
30503
30617
  }
30504
30618
  return ret;
30505
30619
  }
@@ -32537,7 +32651,7 @@ var require_memory_cache_store = __commonJS({
32537
32651
  var require_cache_revalidation_handler = __commonJS({
32538
32652
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/handler/cache-revalidation-handler.js"(exports, module2) {
32539
32653
  init_import_meta_url();
32540
- var assert61 = __require("assert");
32654
+ var assert62 = __require("assert");
32541
32655
  var CacheRevalidationHandler = class {
32542
32656
  static {
32543
32657
  __name(this, "CacheRevalidationHandler");
@@ -32577,7 +32691,7 @@ var require_cache_revalidation_handler = __commonJS({
32577
32691
  this.#handler.onRequestUpgrade?.(controller, statusCode, headers, socket);
32578
32692
  }
32579
32693
  onResponseStart(controller, statusCode, headers, statusMessage) {
32580
- assert61(this.#callback != null);
32694
+ assert62(this.#callback != null);
32581
32695
  this.#successful = statusCode === 304 || this.#allowErrorStatusCodes && statusCode >= 500 && statusCode <= 504;
32582
32696
  this.#callback(this.#successful, this.#context);
32583
32697
  this.#callback = null;
@@ -32627,7 +32741,7 @@ var require_cache_revalidation_handler = __commonJS({
32627
32741
  var require_cache2 = __commonJS({
32628
32742
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/interceptor/cache.js"(exports, module2) {
32629
32743
  init_import_meta_url();
32630
- var assert61 = __require("assert");
32744
+ var assert62 = __require("assert");
32631
32745
  var { Readable: Readable11 } = __require("stream");
32632
32746
  var util5 = require_util();
32633
32747
  var CacheHandler = require_cache_handler();
@@ -32723,8 +32837,8 @@ var require_cache2 = __commonJS({
32723
32837
  __name(handleUncachedResponse, "handleUncachedResponse");
32724
32838
  function sendCachedValue(handler, opts, result, age, context2, isStale2) {
32725
32839
  const stream2 = util5.isStream(result.body) ? result.body : Readable11.from(result.body ?? []);
32726
- assert61(!stream2.destroyed, "stream should not be destroyed");
32727
- assert61(!stream2.readableDidRead, "stream should not be readableDidRead");
32840
+ assert62(!stream2.destroyed, "stream should not be destroyed");
32841
+ assert62(!stream2.readableDidRead, "stream should not be readableDidRead");
32728
32842
  const controller = {
32729
32843
  resume() {
32730
32844
  stream2.resume();
@@ -34006,7 +34120,7 @@ var require_headers = __commonJS({
34006
34120
  isValidHeaderValue
34007
34121
  } = require_util2();
34008
34122
  var { webidl } = require_webidl();
34009
- var assert61 = __require("assert");
34123
+ var assert62 = __require("assert");
34010
34124
  var util5 = __require("util");
34011
34125
  function isHTTPWhiteSpaceCharCode(code) {
34012
34126
  return code === 10 || code === 13 || code === 9 || code === 32;
@@ -34231,11 +34345,11 @@ var require_headers = __commonJS({
34231
34345
  const iterator = this.headersMap[Symbol.iterator]();
34232
34346
  const firstValue = iterator.next().value;
34233
34347
  array[0] = [firstValue[0], firstValue[1].value];
34234
- assert61(firstValue[1].value !== null);
34348
+ assert62(firstValue[1].value !== null);
34235
34349
  for (let i7 = 1, j7 = 0, right2 = 0, left2 = 0, pivot = 0, x7, value; i7 < size; ++i7) {
34236
34350
  value = iterator.next().value;
34237
34351
  x7 = array[i7] = [value[0], value[1].value];
34238
- assert61(x7[1] !== null);
34352
+ assert62(x7[1] !== null);
34239
34353
  left2 = 0;
34240
34354
  right2 = i7;
34241
34355
  while (left2 < right2) {
@@ -34262,7 +34376,7 @@ var require_headers = __commonJS({
34262
34376
  let i7 = 0;
34263
34377
  for (const { 0: name2, 1: { value } } of this.headersMap) {
34264
34378
  array[i7++] = [name2, value];
34265
- assert61(value !== null);
34379
+ assert62(value !== null);
34266
34380
  }
34267
34381
  return array.sort(compareHeaderName);
34268
34382
  }
@@ -34490,7 +34604,7 @@ var require_response = __commonJS({
34490
34604
  var { webidl } = require_webidl();
34491
34605
  var { URLSerializer } = require_data_url();
34492
34606
  var { kConstruct } = require_symbols();
34493
- var assert61 = __require("assert");
34607
+ var assert62 = __require("assert");
34494
34608
  var { isomorphicEncode, serializeJavascriptValueToJSONString } = require_infra();
34495
34609
  var textEncoder = new TextEncoder("utf-8");
34496
34610
  var Response11 = class _Response {
@@ -34754,7 +34868,7 @@ var require_response = __commonJS({
34754
34868
  return p7 in state2 ? state2[p7] : target[p7];
34755
34869
  },
34756
34870
  set(target, p7, value) {
34757
- assert61(!(p7 in state2));
34871
+ assert62(!(p7 in state2));
34758
34872
  target[p7] = value;
34759
34873
  return true;
34760
34874
  }
@@ -34789,12 +34903,12 @@ var require_response = __commonJS({
34789
34903
  body: null
34790
34904
  });
34791
34905
  } else {
34792
- assert61(false);
34906
+ assert62(false);
34793
34907
  }
34794
34908
  }
34795
34909
  __name(filterResponse, "filterResponse");
34796
34910
  function makeAppropriateNetworkError(fetchParams, err = null) {
34797
- assert61(isCancelled(fetchParams));
34911
+ assert62(isCancelled(fetchParams));
34798
34912
  return isAborted4(fetchParams) ? makeNetworkError(Object.assign(new DOMException("The operation was aborted.", "AbortError"), { cause: err })) : makeNetworkError(Object.assign(new DOMException("Request was cancelled."), { cause: err }));
34799
34913
  }
34800
34914
  __name(makeAppropriateNetworkError, "makeAppropriateNetworkError");
@@ -34928,7 +35042,7 @@ var require_request2 = __commonJS({
34928
35042
  var { webidl } = require_webidl();
34929
35043
  var { URLSerializer } = require_data_url();
34930
35044
  var { kConstruct } = require_symbols();
34931
- var assert61 = __require("assert");
35045
+ var assert62 = __require("assert");
34932
35046
  var { getMaxListeners, setMaxListeners, defaultMaxListeners } = __require("events");
34933
35047
  var kAbortController = Symbol("abortController");
34934
35048
  var requestFinalizer = new FinalizationRegistry(({ signal, abort }) => {
@@ -35008,7 +35122,7 @@ var require_request2 = __commonJS({
35008
35122
  request4 = makeRequest({ urlList: [parsedURL] });
35009
35123
  fallbackMode = "cors";
35010
35124
  } else {
35011
- assert61(webidl.is.Request(input));
35125
+ assert62(webidl.is.Request(input));
35012
35126
  request4 = input.#state;
35013
35127
  signal = input.#signal;
35014
35128
  this.#dispatcher = init4.dispatcher || input.#dispatcher;
@@ -35668,7 +35782,7 @@ var require_request2 = __commonJS({
35668
35782
  var require_subresource_integrity = __commonJS({
35669
35783
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/subresource-integrity/subresource-integrity.js"(exports, module2) {
35670
35784
  init_import_meta_url();
35671
- var assert61 = __require("assert");
35785
+ var assert62 = __require("assert");
35672
35786
  var { runtimeFeatures } = require_runtime_features();
35673
35787
  var validSRIHashAlgorithmTokenSet = /* @__PURE__ */ new Map([["sha256", 0], ["sha384", 1], ["sha512", 2]]);
35674
35788
  var crypto9;
@@ -35716,7 +35830,7 @@ var require_subresource_integrity = __commonJS({
35716
35830
  const result = [];
35717
35831
  let strongest = null;
35718
35832
  for (const item of metadataList) {
35719
- assert61(isValidSRIHashAlgorithm(item.alg), "Invalid SRI hash algorithm token");
35833
+ assert62(isValidSRIHashAlgorithm(item.alg), "Invalid SRI hash algorithm token");
35720
35834
  if (result.length === 0) {
35721
35835
  result.push(item);
35722
35836
  strongest = item;
@@ -35855,7 +35969,7 @@ var require_fetch = __commonJS({
35855
35969
  includesCredentials,
35856
35970
  isTraversableNavigable
35857
35971
  } = require_util2();
35858
- var assert61 = __require("assert");
35972
+ var assert62 = __require("assert");
35859
35973
  var { safelyExtractBody, extractBody } = require_body();
35860
35974
  var {
35861
35975
  redirectStatusSet,
@@ -35942,7 +36056,7 @@ var require_fetch = __commonJS({
35942
36056
  requestObject.signal,
35943
36057
  () => {
35944
36058
  locallyAborted = true;
35945
- assert61(controller != null);
36059
+ assert62(controller != null);
35946
36060
  controller.abort(requestObject.signal.reason);
35947
36061
  const realResponse = responseObject?.deref();
35948
36062
  abortFetch(p7, request4, realResponse, requestObject.signal.reason, controller.controller);
@@ -36048,7 +36162,7 @@ var require_fetch = __commonJS({
36048
36162
  requestObject = null
36049
36163
  // Keep alive to prevent AbortController GC, see #4627
36050
36164
  }) {
36051
- assert61(dispatcher);
36165
+ assert62(dispatcher);
36052
36166
  let taskDestination = null;
36053
36167
  let crossOriginIsolatedCapability = false;
36054
36168
  if (request4.client != null) {
@@ -36073,7 +36187,7 @@ var require_fetch = __commonJS({
36073
36187
  // Keep requestObject alive to prevent its AbortController from being GC'd
36074
36188
  requestObject
36075
36189
  };
36076
- assert61(!request4.body || request4.body.stream);
36190
+ assert62(!request4.body || request4.body.stream);
36077
36191
  if (request4.window === "client") {
36078
36192
  request4.window = request4.client?.globalObject?.constructor?.name === "Window" ? request4.client : "no-window";
36079
36193
  }
@@ -36161,7 +36275,7 @@ var require_fetch = __commonJS({
36161
36275
  } else if (request4.responseTainting === "opaque") {
36162
36276
  response = filterResponse(response, "opaque");
36163
36277
  } else {
36164
- assert61(false);
36278
+ assert62(false);
36165
36279
  }
36166
36280
  }
36167
36281
  let internalResponse = response.status === 0 ? response : response.internalResponse;
@@ -36394,7 +36508,7 @@ var require_fetch = __commonJS({
36394
36508
  } else if (request4.redirect === "follow") {
36395
36509
  response = await httpRedirectFetch(fetchParams, response);
36396
36510
  } else {
36397
- assert61(false);
36511
+ assert62(false);
36398
36512
  }
36399
36513
  }
36400
36514
  response.timingInfo = timingInfo;
@@ -36448,7 +36562,7 @@ var require_fetch = __commonJS({
36448
36562
  request4.headersList.delete("host", true);
36449
36563
  }
36450
36564
  if (request4.body != null) {
36451
- assert61(request4.body.source != null);
36565
+ assert62(request4.body.source != null);
36452
36566
  request4.body = safelyExtractBody(request4.body.source)[0];
36453
36567
  }
36454
36568
  const timingInfo = fetchParams.timingInfo;
@@ -36600,7 +36714,7 @@ var require_fetch = __commonJS({
36600
36714
  }
36601
36715
  __name(httpNetworkOrCacheFetch, "httpNetworkOrCacheFetch");
36602
36716
  async function httpNetworkFetch(fetchParams, includeCredentials = false, forceNewConnection = false) {
36603
- assert61(!fetchParams.controller.connection || fetchParams.controller.connection.destroyed);
36717
+ assert62(!fetchParams.controller.connection || fetchParams.controller.connection.destroyed);
36604
36718
  fetchParams.controller.connection = {
36605
36719
  abort: null,
36606
36720
  destroyed: false,
@@ -36954,7 +37068,7 @@ var require_fetch = __commonJS({
36954
37068
  var require_util3 = __commonJS({
36955
37069
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/cache/util.js"(exports, module2) {
36956
37070
  init_import_meta_url();
36957
- var assert61 = __require("assert");
37071
+ var assert62 = __require("assert");
36958
37072
  var { URLSerializer } = require_data_url();
36959
37073
  var { isValidHeaderName } = require_util2();
36960
37074
  function urlEquals(A4, B4, excludeFragment = false) {
@@ -36964,7 +37078,7 @@ var require_util3 = __commonJS({
36964
37078
  }
36965
37079
  __name(urlEquals, "urlEquals");
36966
37080
  function getFieldValues(header) {
36967
- assert61(header !== null);
37081
+ assert62(header !== null);
36968
37082
  const values = [];
36969
37083
  for (let value of header.split(",")) {
36970
37084
  value = value.trim();
@@ -36986,7 +37100,7 @@ var require_util3 = __commonJS({
36986
37100
  var require_cache3 = __commonJS({
36987
37101
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/cache/cache.js"(exports, module2) {
36988
37102
  init_import_meta_url();
36989
- var assert61 = __require("assert");
37103
+ var assert62 = __require("assert");
36990
37104
  var { kConstruct } = require_symbols();
36991
37105
  var { urlEquals, getFieldValues } = require_util3();
36992
37106
  var { kEnumerableProperty, isDisturbed } = require_util();
@@ -37239,7 +37353,7 @@ var require_cache3 = __commonJS({
37239
37353
  return false;
37240
37354
  }
37241
37355
  } else {
37242
- assert61(typeof request4 === "string");
37356
+ assert62(typeof request4 === "string");
37243
37357
  r10 = getRequestState(new Request7(request4));
37244
37358
  }
37245
37359
  const operations = [];
@@ -37350,7 +37464,7 @@ var require_cache3 = __commonJS({
37350
37464
  }
37351
37465
  for (const requestResponse of requestResponses) {
37352
37466
  const idx = cache5.indexOf(requestResponse);
37353
- assert61(idx !== -1);
37467
+ assert62(idx !== -1);
37354
37468
  cache5.splice(idx, 1);
37355
37469
  }
37356
37470
  } else if (operation.type === "put") {
@@ -37382,7 +37496,7 @@ var require_cache3 = __commonJS({
37382
37496
  requestResponses = this.#queryCache(operation.request);
37383
37497
  for (const requestResponse of requestResponses) {
37384
37498
  const idx = cache5.indexOf(requestResponse);
37385
- assert61(idx !== -1);
37499
+ assert62(idx !== -1);
37386
37500
  cache5.splice(idx, 1);
37387
37501
  }
37388
37502
  cache5.push([operation.request, operation.response]);
@@ -37845,7 +37959,7 @@ var require_parse = __commonJS({
37845
37959
  var { collectASequenceOfCodePointsFast } = require_infra();
37846
37960
  var { maxNameValuePairSize, maxAttributeValueSize } = require_constants4();
37847
37961
  var { isCTLExcludingHtab } = require_util4();
37848
- var assert61 = __require("assert");
37962
+ var assert62 = __require("assert");
37849
37963
  var { unescape: qsUnescape } = __require("querystring");
37850
37964
  function parseSetCookie(header) {
37851
37965
  if (isCTLExcludingHtab(header)) {
@@ -37889,7 +38003,7 @@ var require_parse = __commonJS({
37889
38003
  if (unparsedAttributes.length === 0) {
37890
38004
  return cookieAttributeList;
37891
38005
  }
37892
- assert61(unparsedAttributes[0] === ";");
38006
+ assert62(unparsedAttributes[0] === ";");
37893
38007
  unparsedAttributes = unparsedAttributes.slice(1);
37894
38008
  let cookieAv = "";
37895
38009
  if (unparsedAttributes.includes(";")) {
@@ -38768,7 +38882,7 @@ var require_connection = __commonJS({
38768
38882
  var { Headers: Headers5, getHeadersList } = require_headers();
38769
38883
  var { getDecodeSplit } = require_util2();
38770
38884
  var { WebsocketFrameSend } = require_frame();
38771
- var assert61 = __require("assert");
38885
+ var assert62 = __require("assert");
38772
38886
  var { runtimeFeatures } = require_runtime_features();
38773
38887
  var crypto9 = runtimeFeatures.has("crypto") ? __require("crypto") : null;
38774
38888
  var warningEmitted2 = false;
@@ -38874,7 +38988,7 @@ var require_connection = __commonJS({
38874
38988
  if (reason.length !== 0 && code === null) {
38875
38989
  code = 1e3;
38876
38990
  }
38877
- assert61(code === null || Number.isInteger(code));
38991
+ assert62(code === null || Number.isInteger(code));
38878
38992
  if (code === null && reason.length === 0) {
38879
38993
  frame.frameData = emptyBuffer;
38880
38994
  } else if (code !== null && reason === null) {
@@ -39016,7 +39130,7 @@ var require_receiver = __commonJS({
39016
39130
  "../../node_modules/.pnpm/undici@7.24.8/node_modules/undici/lib/web/websocket/receiver.js"(exports, module2) {
39017
39131
  init_import_meta_url();
39018
39132
  var { Writable: Writable5 } = __require("stream");
39019
- var assert61 = __require("assert");
39133
+ var assert62 = __require("assert");
39020
39134
  var { parserStates, opcodes, states, emptyBuffer, sentCloseFrameState } = require_constants5();
39021
39135
  var {
39022
39136
  isValidStatusCode,
@@ -39262,7 +39376,7 @@ var require_receiver = __commonJS({
39262
39376
  return output;
39263
39377
  }
39264
39378
  parseCloseBody(data) {
39265
- assert61(data.length !== 1);
39379
+ assert62(data.length !== 1);
39266
39380
  let code;
39267
39381
  if (data.length >= 2) {
39268
39382
  code = data.readUInt16BE(0);
@@ -44871,6 +44985,12 @@ function convertConfigToBindings(config, options) {
44871
44985
  }
44872
44986
  break;
44873
44987
  }
44988
+ case "artifacts": {
44989
+ for (const { binding, ...x7 } of info) {
44990
+ output[binding] = { type: "artifacts", ...x7 };
44991
+ }
44992
+ break;
44993
+ }
44874
44994
  case "unsafe_hello_world": {
44875
44995
  if (pages) {
44876
44996
  break;
@@ -45134,11 +45254,12 @@ function extractBindingsOfType(type, bindings) {
45134
45254
  [getBindingKey(type)]: binding[0]
45135
45255
  }));
45136
45256
  }
45137
- var nameBindings;
45257
+ var PREVIEW_TOKEN_REFRESH_INTERVAL, nameBindings;
45138
45258
  var init_utils2 = __esm({
45139
45259
  "src/api/startDevWorker/utils.ts"() {
45140
45260
  init_import_meta_url();
45141
45261
  __name(assertNever2, "assertNever");
45262
+ PREVIEW_TOKEN_REFRESH_INTERVAL = 50 * 60 * 1e3;
45142
45263
  __name(createDeferred, "createDeferred");
45143
45264
  __name(unwrapHook, "unwrapHook");
45144
45265
  __name(getBinaryFileContents, "getBinaryFileContents");
@@ -48381,7 +48502,7 @@ var require_signal_exit = __commonJS({
48381
48502
  };
48382
48503
  };
48383
48504
  } else {
48384
- assert61 = __require("assert");
48505
+ assert62 = __require("assert");
48385
48506
  signals = require_signals();
48386
48507
  isWin = /^win/i.test(process19.platform);
48387
48508
  EE = __require("events");
@@ -48404,7 +48525,7 @@ var require_signal_exit = __commonJS({
48404
48525
  return function() {
48405
48526
  };
48406
48527
  }
48407
- assert61.equal(typeof cb2, "function", "a callback must be provided for exit handler");
48528
+ assert62.equal(typeof cb2, "function", "a callback must be provided for exit handler");
48408
48529
  if (loaded === false) {
48409
48530
  load();
48410
48531
  }
@@ -48510,7 +48631,7 @@ var require_signal_exit = __commonJS({
48510
48631
  }
48511
48632
  }, "processEmit");
48512
48633
  }
48513
- var assert61;
48634
+ var assert62;
48514
48635
  var signals;
48515
48636
  var isWin;
48516
48637
  var EE;
@@ -49721,7 +49842,7 @@ function getProcessAncestry(pid = process.pid) {
49721
49842
  }
49722
49843
  }
49723
49844
  var init_dist2 = __esm({
49724
- "../../node_modules/.pnpm/process-ancestry@0.0.2/node_modules/process-ancestry/dist/index.js"() {
49845
+ "../../node_modules/.pnpm/process-ancestry@0.1.0/node_modules/process-ancestry/dist/index.js"() {
49725
49846
  init_import_meta_url();
49726
49847
  __name(getProcessInfo, "getProcessInfo");
49727
49848
  __name(getAncestryUnix, "getAncestryUnix");
@@ -49731,7 +49852,7 @@ var init_dist2 = __esm({
49731
49852
  }
49732
49853
  });
49733
49854
 
49734
- // ../../node_modules/.pnpm/am-i-vibing@0.1.0/node_modules/am-i-vibing/dist/detector-LEsE74_L.js
49855
+ // ../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/detector-CddkGnEB.mjs
49735
49856
  function checkEnvVar(envVarDef, env6 = process.env) {
49736
49857
  const [envVar, expectedValue] = typeof envVarDef === "string" ? [envVarDef, void 0] : envVarDef;
49737
49858
  const actualValue = env6[envVar];
@@ -49771,11 +49892,18 @@ function createDetectedResult(provider) {
49771
49892
  };
49772
49893
  }
49773
49894
  function detectAgenticEnvironment(env6 = process.env, processAncestry) {
49774
- for (const provider of providers) {
49775
- if (provider.envVars?.some((group) => checkEnvVars(group, env6))) return createDetectedResult(provider);
49776
- if (provider.processChecks?.some((processName) => checkProcess(processName, processAncestry))) return createDetectedResult(provider);
49777
- if (runCustomDetectors(provider)) return createDetectedResult(provider);
49778
- }
49895
+ for (const provider of providers) if (provider.envVars?.some((group) => checkEnvVars(group, env6))) return createDetectedResult(provider);
49896
+ let cachedAncestry = processAncestry;
49897
+ const getAncestry = /* @__PURE__ */ __name(() => {
49898
+ if (cachedAncestry === void 0) try {
49899
+ cachedAncestry = getProcessAncestry();
49900
+ } catch {
49901
+ cachedAncestry = [];
49902
+ }
49903
+ return cachedAncestry;
49904
+ }, "getAncestry");
49905
+ for (const provider of providers) if (provider.processChecks?.some((processName) => checkProcess(processName, getAncestry()))) return createDetectedResult(provider);
49906
+ for (const provider of providers) if (runCustomDetectors(provider)) return createDetectedResult(provider);
49779
49907
  return {
49780
49908
  isAgentic: false,
49781
49909
  id: null,
@@ -49784,16 +49912,17 @@ function detectAgenticEnvironment(env6 = process.env, processAncestry) {
49784
49912
  };
49785
49913
  }
49786
49914
  var providers;
49787
- var init_detector_LEsE74_L = __esm({
49788
- "../../node_modules/.pnpm/am-i-vibing@0.1.0/node_modules/am-i-vibing/dist/detector-LEsE74_L.js"() {
49915
+ var init_detector_CddkGnEB = __esm({
49916
+ "../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/detector-CddkGnEB.mjs"() {
49789
49917
  init_import_meta_url();
49790
49918
  init_dist2();
49791
49919
  providers = [
49792
49920
  {
49793
- id: "sst-opencode",
49794
- name: "SST OpenCode",
49921
+ id: "opencode",
49922
+ name: "OpenCode",
49795
49923
  type: "agent",
49796
49924
  envVars: [{ any: [
49925
+ "OPENCODE",
49797
49926
  "OPENCODE_BIN_PATH",
49798
49927
  "OPENCODE_SERVER",
49799
49928
  "OPENCODE_APP_INFO",
@@ -49934,11 +50063,11 @@ var init_detector_LEsE74_L = __esm({
49934
50063
  }
49935
50064
  });
49936
50065
 
49937
- // ../../node_modules/.pnpm/am-i-vibing@0.1.0/node_modules/am-i-vibing/dist/index.js
50066
+ // ../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/index.mjs
49938
50067
  var init_dist3 = __esm({
49939
- "../../node_modules/.pnpm/am-i-vibing@0.1.0/node_modules/am-i-vibing/dist/index.js"() {
50068
+ "../../node_modules/.pnpm/am-i-vibing@0.1.1/node_modules/am-i-vibing/dist/index.mjs"() {
49940
50069
  init_import_meta_url();
49941
- init_detector_LEsE74_L();
50070
+ init_detector_CddkGnEB();
49942
50071
  }
49943
50072
  });
49944
50073
 
@@ -54623,7 +54752,7 @@ var name, version;
54623
54752
  var init_package = __esm({
54624
54753
  "package.json"() {
54625
54754
  name = "wrangler";
54626
- version = "4.83.0";
54755
+ version = "4.84.0";
54627
54756
  }
54628
54757
  });
54629
54758
  function getWranglerVersion() {
@@ -62698,6 +62827,7 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
62698
62827
  "secrets_store_secret",
62699
62828
  bindings
62700
62829
  );
62830
+ const artifacts = extractBindingsOfType("artifacts", bindings);
62701
62831
  const services = extractBindingsOfType("service", bindings);
62702
62832
  const vpc_services = extractBindingsOfType("vpc_service", bindings);
62703
62833
  const vpc_networks = extractBindingsOfType("vpc_network", bindings);
@@ -62755,9 +62885,7 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
62755
62885
  if (context2.local && context2.registry !== null) {
62756
62886
  const registryDefinition = context2.registry?.[script_name];
62757
62887
  hasConnectionStatus = true;
62758
- if (registryDefinition && registryDefinition.durableObjects.some(
62759
- (d8) => d8.className === class_name
62760
- )) {
62888
+ if (registryDefinition && registryDefinition.debugPortAddress) {
62761
62889
  value += `, defined in ${script_name}`;
62762
62890
  mode = getMode({ isSimulatedLocally: true, connected: true });
62763
62891
  } else {
@@ -62983,6 +63111,18 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
62983
63111
  })
62984
63112
  );
62985
63113
  }
63114
+ if (artifacts.length > 0) {
63115
+ output.push(
63116
+ ...artifacts.map(({ binding, namespace }) => {
63117
+ return {
63118
+ name: binding,
63119
+ type: getBindingTypeFriendlyName("artifacts"),
63120
+ value: namespace,
63121
+ mode: getMode({ isSimulatedLocally: false })
63122
+ };
63123
+ })
63124
+ );
63125
+ }
62986
63126
  if (unsafe_hello_world.length > 0) {
62987
63127
  output.push(
62988
63128
  ...unsafe_hello_world.map(({ binding, enable_timer }) => {
@@ -63027,7 +63167,7 @@ function printBindings(bindings, tailConsumers = [], streamingTailConsumers = []
63027
63167
  } else {
63028
63168
  const registryDefinition = context2.registry?.[service];
63029
63169
  hasConnectionStatus = true;
63030
- if (registryDefinition && (!entrypoint || registryDefinition.entrypointAddresses?.[entrypoint])) {
63170
+ if (registryDefinition && registryDefinition.debugPortAddress) {
63031
63171
  mode = getMode({ isSimulatedLocally: true, connected: true });
63032
63172
  } else {
63033
63173
  mode = getMode({ isSimulatedLocally: true, connected: false });
@@ -63689,6 +63829,7 @@ function buildMiniflareBindingOptions(config, remoteProxyConnectionString) {
63689
63829
  bindings
63690
63830
  );
63691
63831
  const flagshipBindings = extractBindingsOfType("flagship", bindings);
63832
+ const artifactsBindings = extractBindingsOfType("artifacts", bindings);
63692
63833
  const workerLoaders = extractBindingsOfType("worker_loader", bindings);
63693
63834
  const sendEmailBindings = extractBindingsOfType("send_email", bindings);
63694
63835
  const ratelimits = [
@@ -63789,6 +63930,9 @@ function buildMiniflareBindingOptions(config, remoteProxyConnectionString) {
63789
63930
  for (const media of mediaBindings) {
63790
63931
  warnOrError("media", media.remote, "always-remote");
63791
63932
  }
63933
+ for (const artifact of artifactsBindings) {
63934
+ warnOrError("artifacts", artifact.remote, "always-remote");
63935
+ }
63792
63936
  const unsafeBindings = [];
63793
63937
  const unsafeBindingsWithLocalDev = Object.entries(bindings ?? {}).filter(
63794
63938
  (b11) => isUnsafeServiceBindingWithDevCfg(b11[1])
@@ -63927,6 +64071,15 @@ function buildMiniflareBindingOptions(config, remoteProxyConnectionString) {
63927
64071
  }
63928
64072
  ])
63929
64073
  ),
64074
+ artifacts: Object.fromEntries(
64075
+ artifactsBindings.map((binding) => [
64076
+ binding.binding,
64077
+ {
64078
+ namespace: binding.namespace,
64079
+ remoteProxyConnectionString
64080
+ }
64081
+ ])
64082
+ ),
63930
64083
  workerLoaders: Object.fromEntries(
63931
64084
  workerLoaders.map(({ binding }) => [binding, {}])
63932
64085
  ),
@@ -64069,7 +64222,7 @@ function buildSitesOptions({
64069
64222
  }
64070
64223
  async function buildMiniflareOptions(log2, config, proxyToUserWorkerAuthenticationSecret, remoteProxyConnectionString, onDevRegistryUpdate) {
64071
64224
  const upstream = typeof config.localUpstream === "string" ? `${config.upstreamProtocol}://${config.localUpstream}` : void 0;
64072
- const { sourceOptions, entrypointNames } = await buildSourceOptions(config);
64225
+ const { sourceOptions } = await buildSourceOptions(config);
64073
64226
  const { bindingOptions, externalWorkers } = buildMiniflareBindingOptions(
64074
64227
  config,
64075
64228
  remoteProxyConnectionString
@@ -64088,7 +64241,6 @@ async function buildMiniflareOptions(log2, config, proxyToUserWorkerAuthenticati
64088
64241
  liveReload: config.liveReload,
64089
64242
  upstream,
64090
64243
  unsafeDevRegistryPath: config.devRegistry,
64091
- unsafeDevRegistryDurableObjectProxy: true,
64092
64244
  unsafeHandleDevRegistryUpdate: onDevRegistryUpdate,
64093
64245
  unsafeProxySharedSecret: proxyToUserWorkerAuthenticationSecret,
64094
64246
  unsafeTriggerHandlers: true,
@@ -64114,13 +64266,6 @@ async function buildMiniflareOptions(log2, config, proxyToUserWorkerAuthenticati
64114
64266
  ...bindingOptions,
64115
64267
  ...sitesOptions,
64116
64268
  ...assetOptions,
64117
- // Allow each entrypoint to be accessed directly over `127.0.0.1:0`
64118
- unsafeDirectSockets: entrypointNames.map((name2) => ({
64119
- host: "127.0.0.1",
64120
- port: 0,
64121
- entrypoint: name2,
64122
- proxy: true
64123
- })),
64124
64269
  containerEngine: config.containerEngine,
64125
64270
  zone: config.zone
64126
64271
  },
@@ -132564,7 +132709,7 @@ var init_user2 = __esm({
132564
132709
  "connectivity:admin": "See, change, and bind to Connectivity Directory services, including creating services targeting Cloudflare Tunnel.",
132565
132710
  "email_routing:write": "See and change Email Routing settings, rules, and destination addresses.",
132566
132711
  "email_sending:write": "See and change Email Sending settings and configuration.",
132567
- "browser:write": "See and manage Browser Rendering sessions"
132712
+ "browser:write": "See and manage Browser Run sessions"
132568
132713
  };
132569
132714
  DefaultScopeKeys = Object.keys(DefaultScopes);
132570
132715
  __name(validateScopeKeys, "validateScopeKeys");
@@ -152114,6 +152259,25 @@ function containerConfigToCreateRequest(accountId, containerApp, imageRef, durab
152114
152259
  rollout_active_grace_period: containerApp.rollout_active_grace_period
152115
152260
  };
152116
152261
  }
152262
+ function formatContainerSnippetForDisplay(container, configPath) {
152263
+ const configurationForDisplay = container.configuration === void 0 ? void 0 : Object.fromEntries(
152264
+ Object.entries(container.configuration).map(([key, value]) => [
152265
+ key === "wrangler_ssh" ? "ssh" : key,
152266
+ value
152267
+ ])
152268
+ );
152269
+ return formatConfigSnippet(
152270
+ {
152271
+ containers: [
152272
+ {
152273
+ ...container,
152274
+ configuration: configurationForDisplay
152275
+ }
152276
+ ]
152277
+ },
152278
+ configPath
152279
+ );
152280
+ }
152117
152281
  async function apply(args, containerConfig, config) {
152118
152282
  if (!config.containers || config.containers.length === 0) {
152119
152283
  return;
@@ -152171,14 +152335,12 @@ async function apply(args, containerConfig, config) {
152171
152335
  normalisedPrevApp,
152172
152336
  sortObjectRecursive(modifyReq)
152173
152337
  );
152174
- const prev = formatConfigSnippet(
152175
- // note this really is a CreateApplicationRequest, not a ContainerApp
152176
- // but this function doesn't actually care about the type
152177
- { containers: [normalisedPrevApp] },
152338
+ const prev = formatContainerSnippetForDisplay(
152339
+ normalisedPrevApp,
152178
152340
  config.configPath
152179
152341
  );
152180
- const now = formatConfigSnippet(
152181
- { containers: [nowContainer] },
152342
+ const now = formatContainerSnippetForDisplay(
152343
+ nowContainer,
152182
152344
  config.configPath
152183
152345
  );
152184
152346
  const diff = new Diff(prev, now);
@@ -152206,8 +152368,8 @@ async function apply(args, containerConfig, config) {
152206
152368
  }
152207
152369
  } else {
152208
152370
  updateStatus(bold.underline(green.underline("NEW")) + ` ${appConfig.name}`);
152209
- const configStr = formatConfigSnippet(
152210
- { containers: [appConfig] },
152371
+ const configStr = formatContainerSnippetForDisplay(
152372
+ appConfig,
152211
152373
  config.configPath
152212
152374
  );
152213
152375
  configStr.trimEnd().split("\n").forEach((el) => log(` ${el}`));
@@ -152300,6 +152462,7 @@ var init_deploy = __esm({
152300
152462
  __name(createApplicationToModifyApplication, "createApplicationToModifyApplication");
152301
152463
  __name(observabilityToConfiguration, "observabilityToConfiguration");
152302
152464
  __name(containerConfigToCreateRequest, "containerConfigToCreateRequest");
152465
+ __name(formatContainerSnippetForDisplay, "formatContainerSnippetForDisplay");
152303
152466
  __name(apply, "apply");
152304
152467
  __name(mergeIfUnsafe, "mergeIfUnsafe");
152305
152468
  __name(formatError, "formatError");
@@ -153355,6 +153518,7 @@ var init_config5 = __esm({
153355
153518
  regions: container.constraints?.regions?.map(
153356
153519
  (region) => region.toUpperCase()
153357
153520
  ),
153521
+ jurisdiction: container.constraints?.jurisdiction?.toLowerCase(),
153358
153522
  cities: container.constraints?.cities?.map(
153359
153523
  (city) => city.toLowerCase()
153360
153524
  )
@@ -158398,7 +158562,7 @@ async function fetchBrowserRendering(config, resource, options = {}) {
158398
158562
  if (!response.ok) {
158399
158563
  const errorMessage = parseErrorMessage(text);
158400
158564
  throw new APIError({
158401
- text: `Browser Rendering API error: ${errorMessage}`,
158565
+ text: `Browser Run API error: ${errorMessage}`,
158402
158566
  notes: [{ text: `${method} ${url4} -> ${response.status}` }],
158403
158567
  status: response.status
158404
158568
  });
@@ -158407,7 +158571,7 @@ async function fetchBrowserRendering(config, resource, options = {}) {
158407
158571
  return JSON.parse(text);
158408
158572
  } catch {
158409
158573
  throw new APIError({
158410
- text: "Received a malformed response from the Browser Rendering API",
158574
+ text: "Received a malformed response from the Browser Run API",
158411
158575
  notes: [
158412
158576
  { text: text.length > 100 ? `${text.substring(0, 100)}...` : text },
158413
158577
  { text: `${method} ${url4} -> ${response.status}` }
@@ -158442,9 +158606,9 @@ var init_create2 = __esm({
158442
158606
  MAX_KEEP_ALIVE_SECONDS = 600;
158443
158607
  browserCreateCommand = createCommand({
158444
158608
  metadata: {
158445
- description: "Create a new browser rendering session",
158609
+ description: "Create a new Browser Run session",
158446
158610
  status: "open beta",
158447
- owner: "Product: Browser Rendering"
158611
+ owner: "Product: Browser Run"
158448
158612
  },
158449
158613
  behaviour: {
158450
158614
  printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
@@ -158532,9 +158696,9 @@ var init_close = __esm({
158532
158696
  init_utils6();
158533
158697
  browserCloseCommand = createCommand({
158534
158698
  metadata: {
158535
- description: "Close a browser rendering session",
158699
+ description: "Close a Browser Run session",
158536
158700
  status: "open beta",
158537
- owner: "Product: Browser Rendering"
158701
+ owner: "Product: Browser Run"
158538
158702
  },
158539
158703
  behaviour: {
158540
158704
  printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
@@ -158583,9 +158747,9 @@ var init_list3 = __esm({
158583
158747
  init_utils6();
158584
158748
  browserListCommand = createCommand({
158585
158749
  metadata: {
158586
- description: "List active browser rendering sessions",
158750
+ description: "List active Browser Run sessions",
158587
158751
  status: "open beta",
158588
- owner: "Product: Browser Rendering"
158752
+ owner: "Product: Browser Run"
158589
158753
  },
158590
158754
  behaviour: {
158591
158755
  printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
@@ -158608,7 +158772,7 @@ var init_list3 = __esm({
158608
158772
  return;
158609
158773
  }
158610
158774
  if (sessions.length === 0) {
158611
- logger.log("No active browser rendering sessions found.");
158775
+ logger.log("No active Browser Run sessions found.");
158612
158776
  return;
158613
158777
  }
158614
158778
  logger.table(
@@ -158685,7 +158849,7 @@ var init_view = __esm({
158685
158849
  metadata: {
158686
158850
  description: "View a live browser session",
158687
158851
  status: "open beta",
158688
- owner: "Product: Browser Rendering"
158852
+ owner: "Product: Browser Run"
158689
158853
  },
158690
158854
  behaviour: {
158691
158855
  printBanner: /* @__PURE__ */ __name((args) => !args.json, "printBanner")
@@ -158722,7 +158886,7 @@ var init_view = __esm({
158722
158886
  );
158723
158887
  if (sessions.length === 0) {
158724
158888
  throw new UserError(
158725
- "No active browser rendering sessions found. Use `wrangler browser create` to create one."
158889
+ "No active Browser Run sessions found. Use `wrangler browser create` to create one."
158726
158890
  );
158727
158891
  }
158728
158892
  if (sessions.length === 1) {
@@ -158821,9 +158985,9 @@ var init_browser_rendering2 = __esm({
158821
158985
  init_view();
158822
158986
  browserNamespace = createNamespace({
158823
158987
  metadata: {
158824
- description: "\u{1F310} Manage Browser Rendering sessions",
158988
+ description: "\u{1F310} Manage Browser Run sessions",
158825
158989
  status: "open beta",
158826
- owner: "Product: Browser Rendering",
158990
+ owner: "Product: Browser Run",
158827
158991
  category: "Compute & AI"
158828
158992
  }
158829
158993
  });
@@ -159439,6 +159603,7 @@ function createWorkerUploadForm(worker, bindings, options) {
159439
159603
  "secrets_store_secret",
159440
159604
  bindings
159441
159605
  );
159606
+ const artifacts = extractBindingsOfType("artifacts", bindings);
159442
159607
  const unsafe_hello_world = extractBindingsOfType(
159443
159608
  "unsafe_hello_world",
159444
159609
  bindings
@@ -159647,6 +159812,13 @@ function createWorkerUploadForm(worker, bindings, options) {
159647
159812
  secret_name
159648
159813
  });
159649
159814
  });
159815
+ artifacts.forEach(({ binding, namespace }) => {
159816
+ metadataBindings.push({
159817
+ name: binding,
159818
+ type: "artifacts",
159819
+ namespace
159820
+ });
159821
+ });
159650
159822
  unsafe_hello_world.forEach(({ binding, enable_timer }) => {
159651
159823
  metadataBindings.push({
159652
159824
  name: binding,
@@ -164996,6 +165168,7 @@ var init_config6 = __esm({
164996
165168
  hyperdrive: [],
164997
165169
  workflows: [],
164998
165170
  secrets_store_secrets: [],
165171
+ artifacts: [],
164999
165172
  services: [],
165000
165173
  analytics_engine_datasets: [],
165001
165174
  ai: void 0,
@@ -183440,6 +183613,7 @@ var init_export2 = __esm({
183440
183613
  init_cfetch();
183441
183614
  init_create_command();
183442
183615
  init_get_local_persistence_path();
183616
+ init_dialogs();
183443
183617
  init_logger();
183444
183618
  init_paths();
183445
183619
  init_user3();
@@ -183469,6 +183643,12 @@ var init_export2 = __esm({
183469
183643
  description: "Export from a remote D1 database",
183470
183644
  conflicts: "local"
183471
183645
  },
183646
+ "skip-confirmation": {
183647
+ type: "boolean",
183648
+ description: "Skip confirmation",
183649
+ alias: "y",
183650
+ default: false
183651
+ },
183472
183652
  output: {
183473
183653
  type: "string",
183474
183654
  description: "Path to the SQL file for your export",
@@ -183504,7 +183684,7 @@ var init_export2 = __esm({
183504
183684
  },
183505
183685
  positionalArgs: ["name"],
183506
183686
  async handler(args, { config }) {
183507
- const { remote, name: name2, output, schema, data, table } = args;
183687
+ const { remote, name: name2, output, schema, data, table, skipConfirmation } = args;
183508
183688
  if (!schema && !data) {
183509
183689
  throw new UserError(`You cannot specify both --no-schema and --no-data`);
183510
183690
  }
@@ -183516,6 +183696,16 @@ var init_export2 = __esm({
183516
183696
  }
183517
183697
  const tables = table ?? [];
183518
183698
  if (remote) {
183699
+ if (!skipConfirmation) {
183700
+ const response = await confirm(
183701
+ `\u26A0\uFE0F This process may take some time, during which your D1 database will be unavailable to serve queries.
183702
+ Ok to proceed?`
183703
+ );
183704
+ if (!response) {
183705
+ logger.log(`Not exporting.`);
183706
+ return;
183707
+ }
183708
+ }
183519
183709
  return await exportRemotely(config, name2, output, tables, !schema, !data);
183520
183710
  } else {
183521
183711
  return await exportLocal(config, name2, output, tables, !schema, !data);
@@ -196801,13 +196991,13 @@ var require_esprima2 = __commonJS({
196801
196991
  /***/
196802
196992
  function(module3, exports2) {
196803
196993
  Object.defineProperty(exports2, "__esModule", { value: true });
196804
- function assert61(condition, message) {
196994
+ function assert62(condition, message) {
196805
196995
  if (!condition) {
196806
196996
  throw new Error("ASSERT: " + message);
196807
196997
  }
196808
196998
  }
196809
- __name(assert61, "assert");
196810
- exports2.assert = assert61;
196999
+ __name(assert62, "assert");
197000
+ exports2.assert = assert62;
196811
197001
  },
196812
197002
  /* 10 */
196813
197003
  /***/
@@ -210528,12 +210718,12 @@ var require_lib4 = __commonJS({
210528
210718
  return x7;
210529
210719
  }
210530
210720
  __name(nonNull, "nonNull");
210531
- function assert61(x7) {
210721
+ function assert62(x7) {
210532
210722
  if (!x7) {
210533
210723
  throw new Error("Assert fail");
210534
210724
  }
210535
210725
  }
210536
- __name(assert61, "assert");
210726
+ __name(assert62, "assert");
210537
210727
  var TSErrors = ParseErrorEnum`typescript`({
210538
210728
  AbstractMethodHasImplementation: /* @__PURE__ */ __name(({
210539
210729
  methodName
@@ -211561,7 +211751,7 @@ var require_lib4 = __commonJS({
211561
211751
  return this.finishNode(t13, "TSTypeAnnotation");
211562
211752
  }
211563
211753
  tsParseType() {
211564
- assert61(this.state.inType);
211754
+ assert62(this.state.inType);
211565
211755
  const type = this.tsParseNonConditionalType();
211566
211756
  if (this.state.inDisallowConditionalTypesContext || this.hasPrecedingLineBreak() || !this.eat(81)) {
211567
211757
  return type;
@@ -212609,7 +212799,7 @@ var require_lib4 = __commonJS({
212609
212799
  return arrow.node;
212610
212800
  }
212611
212801
  if (!jsx2) {
212612
- assert61(!this.hasPlugin("jsx"));
212802
+ assert62(!this.hasPlugin("jsx"));
212613
212803
  typeCast = this.tryParse(() => super.parseMaybeAssign(refExpressionErrors, afterLeftParse), state2);
212614
212804
  if (!typeCast.error) return typeCast.node;
212615
212805
  }
@@ -243553,7 +243743,7 @@ var init_deployments4 = __esm({
243553
243743
  force: {
243554
243744
  type: "boolean",
243555
243745
  alias: "f",
243556
- description: "Skip confirmation",
243746
+ description: "Delete even if the deployment has an active alias",
243557
243747
  default: false
243558
243748
  }
243559
243749
  },
@@ -243582,7 +243772,8 @@ var init_deployments4 = __esm({
243582
243772
  await fetchResult(
243583
243773
  COMPLIANCE_REGION_CONFIG_PUBLIC,
243584
243774
  `/accounts/${accountId}/pages/projects/${projectName}/deployments/${deploymentId}`,
243585
- { method: "DELETE" }
243775
+ { method: "DELETE" },
243776
+ new URLSearchParams({ force: force.toString() })
243586
243777
  );
243587
243778
  saveToConfigCache(PAGES_CONFIG_CACHE_FILENAME, {
243588
243779
  account_id: accountId,
@@ -282083,6 +282274,8 @@ function getBindingValue(binding) {
282083
282274
  return String(binding.pipeline ?? "");
282084
282275
  case "secrets_store_secret":
282085
282276
  return binding.secret_name ? `${binding.store_id}/${binding.secret_name}` : String(binding.store_id ?? "");
282277
+ case "artifacts":
282278
+ return String(binding.namespace ?? "");
282086
282279
  case "ratelimit":
282087
282280
  return String(binding.namespace_id ?? "");
282088
282281
  case "vpc_service":
@@ -282201,6 +282394,12 @@ function extractConfigBindings(config) {
282201
282394
  secret_name: secret.secret_name
282202
282395
  };
282203
282396
  }
282397
+ for (const artifact of previews?.artifacts ?? []) {
282398
+ env6[artifact.binding] = {
282399
+ type: "artifacts",
282400
+ namespace: artifact.namespace
282401
+ };
282402
+ }
282204
282403
  for (const ratelimit of previews?.ratelimits ?? []) {
282205
282404
  env6[ratelimit.name] = {
282206
282405
  type: "ratelimit",
@@ -283407,10 +283606,10 @@ var require_difflib = __commonJS({
283407
283606
  "../../node_modules/.pnpm/@ewoudenberg+difflib@0.1.0/node_modules/@ewoudenberg/difflib/lib/difflib.js"(exports) {
283408
283607
  init_import_meta_url();
283409
283608
  (function() {
283410
- var Differ, Heap, IS_CHARACTER_JUNK, IS_LINE_JUNK, SequenceMatcher, _any, _arrayCmp, _calculateRatio, _countLeading, _formatRangeContext, _formatRangeUnified, _has, assert61, contextDiff, floor, getCloseMatches, max, min, ndiff, restore, unifiedDiff, indexOf = [].indexOf;
283609
+ var Differ, Heap, IS_CHARACTER_JUNK, IS_LINE_JUNK, SequenceMatcher, _any, _arrayCmp, _calculateRatio, _countLeading, _formatRangeContext, _formatRangeUnified, _has, assert62, contextDiff, floor, getCloseMatches, max, min, ndiff, restore, unifiedDiff, indexOf = [].indexOf;
283411
283610
  ({ floor, max, min } = Math);
283412
283611
  Heap = require_heap2();
283413
- assert61 = __require("assert");
283612
+ assert62 = __require("assert");
283414
283613
  _calculateRatio = /* @__PURE__ */ __name(function(matches, length) {
283415
283614
  if (length) {
283416
283615
  return 2 * matches / length;
@@ -283981,7 +284180,7 @@ var require_difflib = __commonJS({
283981
284180
  }
283982
284181
  _plainReplace(a7, alo, ahi, b11, blo, bhi) {
283983
284182
  var first, g7, l8, len, len1, line, lines, m7, ref, second;
283984
- assert61(alo < ahi && blo < bhi);
284183
+ assert62(alo < ahi && blo < bhi);
283985
284184
  if (bhi - blo < ahi - alo) {
283986
284185
  first = this._dump("+", b11, blo, bhi);
283987
284186
  second = this._dump("-", a7, alo, ahi);
@@ -287713,6 +287912,12 @@ var init_bucket2 = __esm({
287713
287912
  status: "stable",
287714
287913
  owner: "Product: R2"
287715
287914
  },
287915
+ behaviour: {
287916
+ // This is an account-level command and does not require a valid project config.
287917
+ // Keeping config parsing out of the critical path avoids blocking users who are
287918
+ // using `wrangler r2 bucket list` to debug/fix an invalid wrangler.jsonc/toml.
287919
+ provideConfig: false
287920
+ },
287716
287921
  args: {
287717
287922
  jurisdiction: {
287718
287923
  describe: "The jurisdiction to list",
@@ -288383,10 +288588,30 @@ var init_cors2 = __esm({
288383
288588
  async handler({ bucket, file: file3, jurisdiction, force }, { config }) {
288384
288589
  const accountId = await requireAuth(config);
288385
288590
  const jsonFilePath = path3__namespace.default.resolve(file3);
288386
- const corsConfig = parseJSON(readFileSync(jsonFilePath), jsonFilePath);
288387
- if (!corsConfig.rules || !Array.isArray(corsConfig.rules)) {
288591
+ const corsConfig = parseJSON(
288592
+ readFileSync(jsonFilePath),
288593
+ jsonFilePath
288594
+ );
288595
+ if (corsConfig.CORSRules) {
288596
+ throw new UserError(
288597
+ "Wrangler detected an AWS S3 CORS configuration format.\nCloudflare R2 expects a 'rules' array instead of 'CORSRules'.\nSee: https://developers.cloudflare.com/r2/buckets/cors/#example"
288598
+ );
288599
+ }
288600
+ const rules = corsConfig.rules;
288601
+ if (!rules || !Array.isArray(rules)) {
288388
288602
  throw new UserError(
288389
- `The CORS configuration file must contain a 'rules' array as expected by the request body of the CORS API: https://developers.cloudflare.com/api/operations/r2-put-bucket-cors-policy`
288603
+ `The CORS configuration file must contain a 'rules' array as expected by the R2 API: https://developers.cloudflare.com/api/operations/r2-put-bucket-cors-policy`
288604
+ );
288605
+ }
288606
+ const hasS3Keys = rules.some(
288607
+ (rule) => rule && typeof rule === "object" && !Array.isArray(rule) && ("AllowedOrigins" in rule || "AllowedMethods" in rule || "AllowedHeaders" in rule)
288608
+ );
288609
+ if (hasS3Keys) {
288610
+ throw new UserError(
288611
+ `Wrangler detected AWS S3 style keys (e.g. 'AllowedOrigins').
288612
+ Cloudflare R2 requires lowercase keys nested inside an 'allowed' object.
288613
+ Example: { "allowed": { "origins": ["*"], "methods": ["GET"] } }
288614
+ See: https://developers.cloudflare.com/r2/buckets/cors/#example`
288390
288615
  );
288391
288616
  }
288392
288617
  if (!force) {
@@ -288399,13 +288624,13 @@ var init_cors2 = __esm({
288399
288624
  }
288400
288625
  }
288401
288626
  logger.log(
288402
- `Setting CORS configuration (${corsConfig.rules.length} rules) for bucket '${bucket}'...`
288627
+ `Setting CORS configuration (${rules.length} rules) for bucket '${bucket}'...`
288403
288628
  );
288404
288629
  await putCORSPolicy(
288405
288630
  config,
288406
288631
  accountId,
288407
288632
  bucket,
288408
- corsConfig.rules,
288633
+ rules,
288409
288634
  jurisdiction
288410
288635
  );
288411
288636
  logger.log(`\u2728 Set CORS configuration for bucket '${bucket}'.`);
@@ -295610,6 +295835,19 @@ function collectCoreBindings(args) {
295610
295835
  envName
295611
295836
  );
295612
295837
  }
295838
+ for (const [index, artifact] of (env6.artifacts ?? []).entries()) {
295839
+ if (!artifact.binding) {
295840
+ throwMissingBindingError({
295841
+ binding: artifact,
295842
+ bindingType: "artifacts",
295843
+ configPath: args.config,
295844
+ envName,
295845
+ fieldName: "binding",
295846
+ index
295847
+ });
295848
+ }
295849
+ addBinding(artifact.binding, "Artifacts", "artifacts", envName);
295850
+ }
295613
295851
  for (const [index, helloWorld] of (env6.unsafe_hello_world ?? []).entries()) {
295614
295852
  if (!helloWorld.binding) {
295615
295853
  throwMissingBindingError({
@@ -296271,6 +296509,23 @@ function collectCoreBindingsPerEnvironment(args) {
296271
296509
  type: "SecretsStoreSecret"
296272
296510
  });
296273
296511
  }
296512
+ for (const [index, artifact] of (env6.artifacts ?? []).entries()) {
296513
+ if (!artifact.binding) {
296514
+ throwMissingBindingError({
296515
+ binding: artifact,
296516
+ bindingType: "artifacts",
296517
+ configPath: args.config,
296518
+ envName,
296519
+ fieldName: "binding",
296520
+ index
296521
+ });
296522
+ }
296523
+ bindings.push({
296524
+ bindingCategory: "artifacts",
296525
+ name: artifact.binding,
296526
+ type: "Artifacts"
296527
+ });
296528
+ }
296274
296529
  for (const [index, helloWorld] of (env6.unsafe_hello_world ?? []).entries()) {
296275
296530
  if (!helloWorld.binding) {
296276
296531
  throwMissingBindingError({
@@ -309017,6 +309272,11 @@ function removeRemoteConfigFieldFromBindings(normalizedConfig) {
309017
309272
  ({ remote: _5, ...binding }) => binding
309018
309273
  );
309019
309274
  }
309275
+ if (normalizedConfig.artifacts?.length) {
309276
+ normalizedConfig.artifacts = normalizedConfig.artifacts.map(
309277
+ ({ remote: _5, ...binding }) => binding
309278
+ );
309279
+ }
309020
309280
  const singleBindingFields = [
309021
309281
  "browser",
309022
309282
  "ai",
@@ -309307,6 +309567,7 @@ var init_config_diffs = __esm({
309307
309567
  mtls_certificates: true,
309308
309568
  pipelines: true,
309309
309569
  secrets_store_secrets: true,
309570
+ artifacts: true,
309310
309571
  ratelimits: true,
309311
309572
  analytics_engine_datasets: true,
309312
309573
  unsafe_hello_world: true,
@@ -311375,10 +311636,16 @@ function runBuild({
311375
311636
  }));
311376
311637
  }
311377
311638
  __name(build5, "build");
311378
- build5().catch((err) => {
311639
+ const buildPromise = build5().catch((err) => {
311379
311640
  onErr(err);
311380
311641
  });
311381
- return () => stopWatching?.();
311642
+ return () => {
311643
+ const immediateStop = stopWatching?.();
311644
+ if (immediateStop) {
311645
+ return immediateStop;
311646
+ }
311647
+ void buildPromise.then(() => stopWatching?.());
311648
+ };
311382
311649
  }
311383
311650
  var init_use_esbuild = __esm({
311384
311651
  "src/dev/use-esbuild.ts"() {
@@ -313635,6 +313902,9 @@ var init_RemoteRuntimeController = __esm({
313635
313902
  #latestConfig;
313636
313903
  #latestBundle;
313637
313904
  #latestRoutes;
313905
+ #latestProxyData;
313906
+ // Timer for proactive token refresh before the 1-hour expiry
313907
+ #refreshTimer;
313638
313908
  async #previewSession(props) {
313639
313909
  try {
313640
313910
  const { workerAccount, workerContext } = await getWorkerAccountAndContext(props);
@@ -313655,13 +313925,7 @@ var init_RemoteRuntimeController = __esm({
313655
313925
  return;
313656
313926
  }
313657
313927
  handlePreviewSessionCreationError(err, props.accountId);
313658
- this.emitErrorEvent({
313659
- type: "error",
313660
- reason: "Failed to create a preview token",
313661
- cause: castErrorCause(err),
313662
- source: "RemoteRuntimeController",
313663
- data: void 0
313664
- });
313928
+ throw err;
313665
313929
  }
313666
313930
  }
313667
313931
  async #previewToken(props) {
@@ -313790,7 +314054,7 @@ var init_RemoteRuntimeController = __esm({
313790
314054
  }
313791
314055
  async #updatePreviewToken(config, bundle, auth, routes, bundleId) {
313792
314056
  if (bundleId !== this.#currentBundleId) {
313793
- return;
314057
+ return false;
313794
314058
  }
313795
314059
  const token = await this.#previewToken({
313796
314060
  bundle,
@@ -313820,28 +314084,43 @@ var init_RemoteRuntimeController = __esm({
313820
314084
  minimal_mode: config.dev.remote === "minimal"
313821
314085
  });
313822
314086
  if (bundleId !== this.#currentBundleId || !token) {
313823
- return;
314087
+ return false;
313824
314088
  }
313825
314089
  const accessHeaders = await getAccessHeaders(token.host);
314090
+ const proxyData = {
314091
+ userWorkerUrl: {
314092
+ protocol: "https:",
314093
+ hostname: token.host,
314094
+ port: "443"
314095
+ },
314096
+ headers: {
314097
+ "cf-workers-preview-token": token.value,
314098
+ ...accessHeaders,
314099
+ "cf-connecting-ip": ""
314100
+ },
314101
+ liveReload: config.dev.liveReload,
314102
+ proxyLogsToController: true
314103
+ };
314104
+ this.#latestProxyData = proxyData;
313826
314105
  this.emitReloadCompleteEvent({
313827
314106
  type: "reloadComplete",
313828
314107
  bundle,
313829
314108
  config,
313830
- proxyData: {
313831
- userWorkerUrl: {
313832
- protocol: "https:",
313833
- hostname: token.host,
313834
- port: "443"
313835
- },
313836
- headers: {
313837
- "cf-workers-preview-token": token.value,
313838
- ...accessHeaders,
313839
- "cf-connecting-ip": ""
313840
- },
313841
- liveReload: config.dev.liveReload,
313842
- proxyLogsToController: true
313843
- }
314109
+ proxyData
313844
314110
  });
314111
+ this.#scheduleRefresh(PREVIEW_TOKEN_REFRESH_INTERVAL);
314112
+ return true;
314113
+ }
314114
+ #scheduleRefresh(interval) {
314115
+ clearTimeout(this.#refreshTimer);
314116
+ this.#refreshTimer = setTimeout(() => {
314117
+ if (this.#latestProxyData) {
314118
+ this.onPreviewTokenExpired({
314119
+ type: "previewTokenExpired",
314120
+ proxyData: this.#latestProxyData
314121
+ });
314122
+ }
314123
+ }, interval);
313845
314124
  }
313846
314125
  async #onBundleComplete({ config, bundle }, id) {
313847
314126
  logger.log(source_default.dim("\u2394 Starting remote preview..."));
@@ -313850,6 +314129,7 @@ var init_RemoteRuntimeController = __esm({
313850
314129
  if (!config.dev?.auth) {
313851
314130
  throw new MissingConfigError("config.dev.auth");
313852
314131
  }
314132
+ assert53__default.default(config.dev.auth);
313853
314133
  const auth = await unwrapHook(config.dev.auth);
313854
314134
  this.#latestConfig = config;
313855
314135
  this.#latestBundle = bundle;
@@ -313882,29 +314162,24 @@ var init_RemoteRuntimeController = __esm({
313882
314162
  );
313883
314163
  return;
313884
314164
  }
313885
- this.emitReloadStartEvent({
313886
- type: "reloadStart",
313887
- config: this.#latestConfig,
313888
- bundle: this.#latestBundle
313889
- });
313890
- if (!this.#latestConfig.dev?.auth) {
313891
- throw new MissingConfigError("config.dev.auth");
313892
- }
313893
- const auth = await unwrapHook(this.#latestConfig.dev.auth);
313894
314165
  try {
314166
+ assert53__default.default(this.#latestConfig.dev.auth);
314167
+ const auth = await unwrapHook(this.#latestConfig.dev.auth);
313895
314168
  this.#session = await this.#getPreviewSession(
313896
314169
  this.#latestConfig,
313897
314170
  auth,
313898
314171
  this.#latestRoutes
313899
314172
  );
313900
- await this.#updatePreviewToken(
314173
+ const refreshed = await this.#updatePreviewToken(
313901
314174
  this.#latestConfig,
313902
314175
  this.#latestBundle,
313903
314176
  auth,
313904
314177
  this.#latestRoutes,
313905
314178
  this.#currentBundleId
313906
314179
  );
313907
- logger.log(source_default.green("\u2714 Preview token refreshed successfully"));
314180
+ if (refreshed) {
314181
+ logger.log(source_default.green("\u2714 Preview token refreshed successfully"));
314182
+ }
313908
314183
  } catch (error2) {
313909
314184
  if (error2 instanceof Error && error2.name == "AbortError") {
313910
314185
  return;
@@ -313924,6 +314199,7 @@ var init_RemoteRuntimeController = __esm({
313924
314199
  onBundleStart(_5) {
313925
314200
  this.#abortController.abort();
313926
314201
  this.#abortController = new AbortController();
314202
+ clearTimeout(this.#refreshTimer);
313927
314203
  }
313928
314204
  onBundleComplete(ev) {
313929
314205
  const id = ++this.#currentBundleId;
@@ -313939,7 +314215,7 @@ var init_RemoteRuntimeController = __esm({
313939
314215
  void this.#mutex.runWith(() => this.#onBundleComplete(ev, id));
313940
314216
  }
313941
314217
  onPreviewTokenExpired(_5) {
313942
- logger.log(source_default.dim("\u2394 Preview token expired, refreshing..."));
314218
+ logger.log(source_default.dim("\u2394 Refreshing preview token..."));
313943
314219
  void this.#mutex.runWith(() => this.#refreshPreviewToken());
313944
314220
  }
313945
314221
  async teardown() {
@@ -313949,6 +314225,7 @@ var init_RemoteRuntimeController = __esm({
313949
314225
  }
313950
314226
  logger.debug("RemoteRuntimeController teardown beginning...");
313951
314227
  this.#session = void 0;
314228
+ clearTimeout(this.#refreshTimer);
313952
314229
  this.#abortController.abort();
313953
314230
  this.#activeTail?.removeAllListeners("error");
313954
314231
  this.#activeTail?.on("error", () => {
@@ -314304,7 +314581,7 @@ __export(remoteBindings_exports, {
314304
314581
  function pickRemoteBindings(bindings) {
314305
314582
  return Object.fromEntries(
314306
314583
  Object.entries(bindings ?? {}).filter(([, binding]) => {
314307
- if (binding.type === "ai" || binding.type === "media") {
314584
+ if (binding.type === "ai" || binding.type === "media" || binding.type === "artifacts") {
314308
314585
  return true;
314309
314586
  }
314310
314587
  if (binding.type === "vpc_service") {
@@ -314618,10 +314895,6 @@ var init_LocalRuntimeController = __esm({
314618
314895
  if (data.config.dev?.remote !== false) {
314619
314896
  const { maybeStartOrUpdateRemoteProxySession: maybeStartOrUpdateRemoteProxySession2, pickRemoteBindings: pickRemoteBindings2 } = await Promise.resolve().then(() => (init_remoteBindings(), remoteBindings_exports));
314620
314897
  const remoteBindings = pickRemoteBindings2(configBundle.bindings ?? {});
314621
- const auth = Object.keys(remoteBindings).length === 0 ? (
314622
- // If there are no remote bindings (this is a local only session) there's no need to get auth data
314623
- void 0
314624
- ) : await unwrapHook(data.config.dev.auth);
314625
314898
  this.#remoteProxySessionData = await maybeStartOrUpdateRemoteProxySession2(
314626
314899
  {
314627
314900
  name: configBundle.name,
@@ -314629,7 +314902,10 @@ var init_LocalRuntimeController = __esm({
314629
314902
  bindings: remoteBindings
314630
314903
  },
314631
314904
  this.#remoteProxySessionData ?? null,
314632
- auth
314905
+ Object.keys(remoteBindings).length === 0 ? (
314906
+ // If there are no remote bindings (this is a local only session) there's no need to get auth data
314907
+ void 0
314908
+ ) : data.config.dev.auth
314633
314909
  );
314634
314910
  }
314635
314911
  if (data.config.containers?.length && data.config.dev.enableContainers && this.#currentContainerBuildId !== data.config.dev.containerBuildId) {
@@ -318206,8 +318482,7 @@ async function getMiniflareOptionsFromConfig(args) {
318206
318482
  script: "",
318207
318483
  modules: true,
318208
318484
  ...miniflareOptions,
318209
- unsafeDevRegistryPath: getRegistryPath(),
318210
- unsafeDevRegistryDurableObjectProxy: true
318485
+ unsafeDevRegistryPath: getRegistryPath()
318211
318486
  };
318212
318487
  }
318213
318488
  function getMiniflarePersistRoot(persist) {