+4
-1
.eslintrc.yaml
+4
-1
.eslintrc.yaml
+20
-18
src/Javascript/Odd/components/capabilities.ts
+20
-18
src/Javascript/Odd/components/capabilities.ts
···
87
87
88
88
// Compile params
89
89
const params = [
90
-
[ "didExchange", exchangeDid ],
91
-
[ "didWrite", writeDid ],
92
-
[ "redirectTo", redirectTo ],
93
-
[ "sdk", VERSION.toString() ],
94
-
[ "sharedRepo", sharedRepo ? "t" : "f" ],
95
-
[ "sharing", sharing ? "t" : "f" ]
90
+
["didExchange", exchangeDid],
91
+
["didWrite", writeDid],
92
+
["redirectTo", redirectTo],
93
+
["sdk", VERSION.toString()],
94
+
["sharedRepo", sharedRepo ? "t" : "f"],
95
+
["sharing", sharing ? "t" : "f"]
96
96
97
97
].concat(
98
-
app ? [ [ "appFolder", `${app.creator}/${app.name}` ] ] : [],
99
-
fs?.private ? fs.private.map(p => [ "privatePath", Path.toPosix(p, { absolute: true }) ]) : [],
100
-
fs?.public ? fs.public.map(p => [ "publicPath", Path.toPosix(p, { absolute: true }) ]) : [],
101
-
raw ? [ [ "raw", Base64.urlEncode(JSON.stringify(raw)) ] ] : [],
98
+
app ? [["appFolder", `${app.creator}/${app.name}`]] : [],
99
+
fs?.private ? fs.private.map(p => ["privatePath", Path.toPosix(p, { absolute: true })]) : [],
100
+
fs?.public ? fs.public.map(p => ["publicPath", Path.toPosix(p, { absolute: true })]) : [],
101
+
raw ? [["raw", Base64.urlEncode(JSON.stringify(raw))]] : [],
102
102
options.extraParams ? Object.entries(options.extraParams) : []
103
103
104
104
).concat((() => {
105
105
const apps = platform?.apps
106
106
107
107
switch (typeof apps) {
108
-
case "string": return [ [ "app", apps ] ]
109
-
case "object": return apps.map(a => [ "app", a ])
108
+
case "string": return [["app", apps]]
109
+
case "object": return apps.map(a => ["app", a])
110
110
default: return []
111
111
}
112
112
···
115
115
// And, go!
116
116
window.location.href = endpoints.lobby + "?" +
117
117
params
118
-
.map(([ k, v ]) => encodeURIComponent(k) + "=" + encodeURIComponent(v))
118
+
.map(([k, v]) => encodeURIComponent(k) + "=" + encodeURIComponent(v))
119
119
.join("&")
120
120
}
121
121
···
178
178
if (!isLobbyClassifiedInfo(classifiedInfo)) stop()
179
179
globalThis.removeEventListener("message", listen)
180
180
181
-
try { document.body.removeChild(iframe) } catch { }
182
-
183
-
resolve(classifiedInfo)
181
+
try {
182
+
document.body.removeChild(iframe)
183
+
} catch {
184
+
resolve(classifiedInfo)
185
+
}
184
186
}
185
187
186
188
globalThis.addEventListener("message", listen)
···
228
230
// This easy way of detection works because the decrypted session key is encoded in base 64.
229
231
// That means it'll only ever use the first byte to encode it, and if it were UTF-16 it would
230
232
// split up the two bytes. Hence we check for the second byte here.
231
-
const isUtf16 = rawSessionKey[ 1 ] === 0
233
+
const isUtf16 = rawSessionKey[1] === 0
232
234
233
235
const sessionKey = isUtf16
234
236
? Uint8arrays.fromString(
···
255
257
isLobbySecrets(secrets)
256
258
? Object
257
259
.entries(secrets.fs)
258
-
.map(([ posixPath, { bareNameFilter, key } ]) => {
260
+
.map(([posixPath, { bareNameFilter, key }]) => {
259
261
return {
260
262
bareNameFilter: bareNameFilter,
261
263
path: Path.fromPosix(posixPath),
+1
-1
system/Review/elm.json
+1
-1
system/Review/elm.json