feat: Upgrade to Astro with full PDPA compliance
PDPA Features: ✅ Cookie consent banner ✅ Consent logging API ✅ Admin dashboard ✅ Privacy Policy ✅ Terms & Conditions Technical: ✅ Astro 5.x + Tailwind v4 ✅ Docker on port 80 ✅ SQLite database ✅ 15 pages built Ready for Easypanel deployment.
This commit is contained in:
143
node_modules/@libsql/core/lib-cjs/config.js
generated
vendored
Normal file
143
node_modules/@libsql/core/lib-cjs/config.js
generated
vendored
Normal file
@@ -0,0 +1,143 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.expandConfig = exports.isInMemoryConfig = void 0;
|
||||
const api_js_1 = require("./api.js");
|
||||
const uri_js_1 = require("./uri.js");
|
||||
const util_js_1 = require("./util.js");
|
||||
const inMemoryMode = ":memory:";
|
||||
function isInMemoryConfig(config) {
|
||||
return (config.scheme === "file" &&
|
||||
(config.path === ":memory:" || config.path.startsWith(":memory:?")));
|
||||
}
|
||||
exports.isInMemoryConfig = isInMemoryConfig;
|
||||
function expandConfig(config, preferHttp) {
|
||||
if (typeof config !== "object") {
|
||||
// produce a reasonable error message in the common case where users type
|
||||
// `createClient("libsql://...")` instead of `createClient({url: "libsql://..."})`
|
||||
throw new TypeError(`Expected client configuration as object, got ${typeof config}`);
|
||||
}
|
||||
let { url, authToken, tls, intMode, concurrency } = config;
|
||||
// fill simple defaults right here
|
||||
concurrency = Math.max(0, concurrency || 20);
|
||||
intMode ??= "number";
|
||||
let connectionQueryParams = []; // recognized query parameters which we sanitize through white list of valid key-value pairs
|
||||
// convert plain :memory: url to URI format to make logic more uniform
|
||||
if (url === inMemoryMode) {
|
||||
url = "file::memory:";
|
||||
}
|
||||
// parse url parameters first and override config with update values
|
||||
const uri = (0, uri_js_1.parseUri)(url);
|
||||
const originalUriScheme = uri.scheme.toLowerCase();
|
||||
const isInMemoryMode = originalUriScheme === "file" &&
|
||||
uri.path === inMemoryMode &&
|
||||
uri.authority === undefined;
|
||||
let queryParamsDef;
|
||||
if (isInMemoryMode) {
|
||||
queryParamsDef = {
|
||||
cache: {
|
||||
values: ["shared", "private"],
|
||||
update: (key, value) => connectionQueryParams.push(`${key}=${value}`),
|
||||
},
|
||||
};
|
||||
}
|
||||
else {
|
||||
queryParamsDef = {
|
||||
tls: {
|
||||
values: ["0", "1"],
|
||||
update: (_, value) => (tls = value === "1"),
|
||||
},
|
||||
authToken: {
|
||||
update: (_, value) => (authToken = value),
|
||||
},
|
||||
};
|
||||
}
|
||||
for (const { key, value } of uri.query?.pairs ?? []) {
|
||||
if (!Object.hasOwn(queryParamsDef, key)) {
|
||||
throw new api_js_1.LibsqlError(`Unsupported URL query parameter ${JSON.stringify(key)}`, "URL_PARAM_NOT_SUPPORTED");
|
||||
}
|
||||
const queryParamDef = queryParamsDef[key];
|
||||
if (queryParamDef.values !== undefined &&
|
||||
!queryParamDef.values.includes(value)) {
|
||||
throw new api_js_1.LibsqlError(`Unknown value for the "${key}" query argument: ${JSON.stringify(value)}. Supported values are: [${queryParamDef.values.map((x) => '"' + x + '"').join(", ")}]`, "URL_INVALID");
|
||||
}
|
||||
if (queryParamDef.update !== undefined) {
|
||||
queryParamDef?.update(key, value);
|
||||
}
|
||||
}
|
||||
// fill complex defaults & validate config
|
||||
const connectionQueryParamsString = connectionQueryParams.length === 0
|
||||
? ""
|
||||
: `?${connectionQueryParams.join("&")}`;
|
||||
const path = uri.path + connectionQueryParamsString;
|
||||
let scheme;
|
||||
if (originalUriScheme === "libsql") {
|
||||
if (tls === false) {
|
||||
if (uri.authority?.port === undefined) {
|
||||
throw new api_js_1.LibsqlError('A "libsql:" URL with ?tls=0 must specify an explicit port', "URL_INVALID");
|
||||
}
|
||||
scheme = preferHttp ? "http" : "ws";
|
||||
}
|
||||
else {
|
||||
scheme = preferHttp ? "https" : "wss";
|
||||
}
|
||||
}
|
||||
else {
|
||||
scheme = originalUriScheme;
|
||||
}
|
||||
if (scheme === "http" || scheme === "ws") {
|
||||
tls ??= false;
|
||||
}
|
||||
else {
|
||||
tls ??= true;
|
||||
}
|
||||
if (scheme !== "http" &&
|
||||
scheme !== "ws" &&
|
||||
scheme !== "https" &&
|
||||
scheme !== "wss" &&
|
||||
scheme !== "file") {
|
||||
throw new api_js_1.LibsqlError('The client supports only "libsql:", "wss:", "ws:", "https:", "http:" and "file:" URLs, ' +
|
||||
`got ${JSON.stringify(uri.scheme + ":")}. ` +
|
||||
`For more information, please read ${util_js_1.supportedUrlLink}`, "URL_SCHEME_NOT_SUPPORTED");
|
||||
}
|
||||
if (intMode !== "number" && intMode !== "bigint" && intMode !== "string") {
|
||||
throw new TypeError(`Invalid value for intMode, expected "number", "bigint" or "string", got ${JSON.stringify(intMode)}`);
|
||||
}
|
||||
if (uri.fragment !== undefined) {
|
||||
throw new api_js_1.LibsqlError(`URL fragments are not supported: ${JSON.stringify("#" + uri.fragment)}`, "URL_INVALID");
|
||||
}
|
||||
if (isInMemoryMode) {
|
||||
return {
|
||||
scheme: "file",
|
||||
tls: false,
|
||||
path,
|
||||
intMode,
|
||||
concurrency,
|
||||
syncUrl: config.syncUrl,
|
||||
syncInterval: config.syncInterval,
|
||||
readYourWrites: config.readYourWrites,
|
||||
offline: config.offline,
|
||||
fetch: config.fetch,
|
||||
authToken: undefined,
|
||||
encryptionKey: undefined,
|
||||
remoteEncryptionKey: undefined,
|
||||
authority: undefined,
|
||||
};
|
||||
}
|
||||
return {
|
||||
scheme,
|
||||
tls,
|
||||
authority: uri.authority,
|
||||
path,
|
||||
authToken,
|
||||
intMode,
|
||||
concurrency,
|
||||
encryptionKey: config.encryptionKey,
|
||||
remoteEncryptionKey: config.remoteEncryptionKey,
|
||||
syncUrl: config.syncUrl,
|
||||
syncInterval: config.syncInterval,
|
||||
readYourWrites: config.readYourWrites,
|
||||
offline: config.offline,
|
||||
fetch: config.fetch,
|
||||
};
|
||||
}
|
||||
exports.expandConfig = expandConfig;
|
||||
Reference in New Issue
Block a user