···2424# PORT: The port to listen on
2525PORT=8000
26262727-# DOMAIN_AUTHORITY: The domain authority for this instance
2828-DOMAIN_AUTHORITY=xyz.statusphere
2929-3027# Database Configuration
3128DATABASE_URL=quickslice.db
3229
+1
server/gleam.toml
···1919gleam_stdlib = ">= 0.60.0 and < 1.0.0"
2020mist = ">= 5.0.3 and < 6.0.0"
2121wisp = ">= 2.1.0 and < 3.0.0"
2222+wisp_flash = ">= 2.0.0 and < 3.0.0"
2223gleam_erlang = ">= 1.0.0 and < 2.0.0"
2324gleam_otp = ">= 1.2.0 and < 2.0.0"
2425gleam_http = ">= 4.0.0 and < 5.0.0"
+2
server/manifest.toml
···4949 { name = "thoas", version = "1.2.1", build_tools = ["rebar3"], requirements = [], otp_app = "thoas", source = "hex", outer_checksum = "E38697EDFFD6E91BD12CEA41B155115282630075C2A727E7A6B2947F5408B86A" },
5050 { name = "unicode_util_compat", version = "0.7.1", build_tools = ["rebar3"], requirements = [], otp_app = "unicode_util_compat", source = "hex", outer_checksum = "B3A917854CE3AE233619744AD1E0102E05673136776FB2FA76234F3E03B23642" },
5151 { name = "wisp", version = "2.1.0", build_tools = ["gleam"], requirements = ["directories", "exception", "filepath", "gleam_crypto", "gleam_erlang", "gleam_http", "gleam_json", "gleam_stdlib", "houdini", "logging", "marceau", "mist", "simplifile"], otp_app = "wisp", source = "hex", outer_checksum = "362BDDD11BF48EB38CDE51A73BC7D1B89581B395CA998E3F23F11EC026151C54" },
5252+ { name = "wisp_flash", version = "2.0.0", build_tools = ["gleam"], requirements = ["gleam_stdlib", "wisp"], otp_app = "wisp_flash", source = "hex", outer_checksum = "C67A295E42030EEB8A7D31CD64971790EC010FA2644CBDC0835BF88D97DE998D" },
5253]
53545455[requirements]
···7879sqlight = { version = ">= 1.0.0 and < 2.0.0" }
7980thoas = { version = ">= 1.0.0 and < 2.0.0" }
8081wisp = { version = ">= 2.1.0 and < 3.0.0" }
8282+wisp_flash = { version = ">= 2.0.0 and < 3.0.0" }
+4-9
server/src/backfill.gleam
···84848585/// Check if an NSID matches the configured domain authority
8686/// NSID format is like "com.example.post" where "com.example" is the authority
8787-pub fn nsid_matches_domain_authority(nsid: String) -> Bool {
8888- case envoy.get("DOMAIN_AUTHORITY") {
8989- Error(_) -> False
9090- Ok(domain_authority) -> {
9191- // NSID format: authority.name (e.g., "com.example.post")
9292- // We need to check if the NSID starts with the domain authority
9393- string.starts_with(nsid, domain_authority <> ".")
9494- }
9595- }
8787+pub fn nsid_matches_domain_authority(nsid: String, domain_authority: String) -> Bool {
8888+ // NSID format: authority.name (e.g., "com.example.post")
8989+ // We need to check if the NSID starts with the domain authority
9090+ string.starts_with(nsid, domain_authority <> ".")
9691}
97929893/// Resolve a DID to get ATP data (PDS endpoint and handle)