Security News
ESLint is Now Language-Agnostic: Linting JSON, Markdown, and Beyond
ESLint has added JSON and Markdown linting support with new officially-supported plugins, expanding its versatility beyond JavaScript.
@glif/filecoin-message-confirmer
Advanced tools
npm i @glif/filecoin-message-confirmer
const confirmMessage = require('@glif/filecoin-message-confirmer')
const messageCid =
'bafy2bzacebnyjf5oxzvts5f4ifqgee2yrqb7epdepnw3y2yk25ju5su2episg'
const optionalConfig = {}
const confirmed = await confirmMessage(messageCid, optionalConfig)
// > true if message is confirmed
// > false if message happened far in the past (just use a block explorer) or if the message isn't yet confirmed after ~7-8 minutes after sending
The confirmer takes an optional config:
interface ConfirmerConfig {
apiAddress: string
token?: string
// the amount of time to timeout the request
timeoutAfter?: number
// the number of times this function calls itself, recursively
totalRetries?: number
}
It's recommended to stick with the default values for timeoutAfter
(90000 ms) and totalRetries
(5 times)
npm i
npm run test
This repository is dual-licensed under Apache 2.0 and MIT terms.
FAQs
A service for confirming a Filecoin message.
We found that @glif/filecoin-message-confirmer demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
ESLint has added JSON and Markdown linting support with new officially-supported plugins, expanding its versatility beyond JavaScript.
Security News
Members Hub is conducting large-scale campaigns to artificially boost Discord server metrics, undermining community trust and platform integrity.
Security News
NIST has failed to meet its self-imposed deadline of clearing the NVD's backlog by the end of the fiscal year. Meanwhile, CVE's awaiting analysis have increased by 33% since June.