@budibase/backend-core 2.30.3 → 2.30.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +113 -89
- package/dist/index.js.map +3 -3
- package/dist/index.js.meta.json +1 -1
- package/dist/package.json +4 -4
- package/dist/plugins.js +1 -0
- package/dist/plugins.js.map +2 -2
- package/dist/plugins.js.meta.json +1 -1
- package/dist/src/context/mainContext.d.ts +2 -0
- package/dist/src/context/mainContext.js +19 -0
- package/dist/src/context/mainContext.js.map +1 -1
- package/dist/src/context/types.d.ts +3 -0
- package/dist/src/features/index.d.ts +3 -4
- package/dist/src/features/index.js +15 -10
- package/dist/src/features/index.js.map +1 -1
- package/dist/src/index.d.ts +2 -0
- package/package.json +4 -4
- package/src/context/mainContext.ts +19 -0
- package/src/context/tests/index.spec.ts +1 -1
- package/src/context/types.ts +3 -0
- package/src/features/index.ts +24 -12
- package/src/features/tests/features.spec.ts +6 -4
- package/src/redis/tests/redis.spec.ts +1 -1
package/dist/index.js
CHANGED
|
@@ -4190,7 +4190,7 @@ var require_lib3 = __commonJS({
|
|
|
4190
4190
|
var require_utils = __commonJS({
|
|
4191
4191
|
"../../node_modules/@techpass/passport-openidconnect/lib/utils.js"(exports) {
|
|
4192
4192
|
"use strict";
|
|
4193
|
-
var
|
|
4193
|
+
var crypto3 = require("crypto");
|
|
4194
4194
|
exports.originalURL = function(req, options2) {
|
|
4195
4195
|
options2 = options2 || {};
|
|
4196
4196
|
var app = req.app;
|
|
@@ -4210,7 +4210,7 @@ var require_utils = __commonJS({
|
|
|
4210
4210
|
return a;
|
|
4211
4211
|
};
|
|
4212
4212
|
exports.uid = function(len) {
|
|
4213
|
-
return
|
|
4213
|
+
return crypto3.randomBytes(Math.ceil(len * 3 / 4)).toString("base64").slice(0, len);
|
|
4214
4214
|
};
|
|
4215
4215
|
}
|
|
4216
4216
|
});
|
|
@@ -4381,7 +4381,7 @@ var require_utils2 = __commonJS({
|
|
|
4381
4381
|
var require_oauth = __commonJS({
|
|
4382
4382
|
"../../node_modules/oauth/lib/oauth.js"(exports) {
|
|
4383
4383
|
"use strict";
|
|
4384
|
-
var
|
|
4384
|
+
var crypto3 = require("crypto");
|
|
4385
4385
|
var sha1 = require_sha1();
|
|
4386
4386
|
var http = require("http");
|
|
4387
4387
|
var https = require("https");
|
|
@@ -4553,10 +4553,10 @@ var require_oauth = __commonJS({
|
|
|
4553
4553
|
hash2 = key;
|
|
4554
4554
|
} else if (this._signatureMethod == "RSA-SHA1") {
|
|
4555
4555
|
key = this._privateKey || "";
|
|
4556
|
-
hash2 =
|
|
4556
|
+
hash2 = crypto3.createSign("RSA-SHA1").update(signatureBase).sign(key, "base64");
|
|
4557
4557
|
} else {
|
|
4558
|
-
if (
|
|
4559
|
-
hash2 =
|
|
4558
|
+
if (crypto3.Hmac) {
|
|
4559
|
+
hash2 = crypto3.createHmac("sha1", key).update(signatureBase).digest("base64");
|
|
4560
4560
|
} else {
|
|
4561
4561
|
hash2 = sha1.HMACSHA1(key, signatureBase);
|
|
4562
4562
|
}
|
|
@@ -4910,7 +4910,7 @@ var require_oauth2 = __commonJS({
|
|
|
4910
4910
|
"../../node_modules/oauth/lib/oauth2.js"(exports) {
|
|
4911
4911
|
"use strict";
|
|
4912
4912
|
var querystring = require("querystring");
|
|
4913
|
-
var
|
|
4913
|
+
var crypto3 = require("crypto");
|
|
4914
4914
|
var https = require("https");
|
|
4915
4915
|
var http = require("http");
|
|
4916
4916
|
var URL2 = require("url");
|
|
@@ -16326,7 +16326,7 @@ var require_helpers = __commonJS({
|
|
|
16326
16326
|
"../../node_modules/request/lib/helpers.js"(exports) {
|
|
16327
16327
|
"use strict";
|
|
16328
16328
|
var jsonSafeStringify = require_stringify();
|
|
16329
|
-
var
|
|
16329
|
+
var crypto3 = require("crypto");
|
|
16330
16330
|
var Buffer2 = require_safe_buffer().Buffer;
|
|
16331
16331
|
var defer = typeof setImmediate === "undefined" ? process.nextTick : setImmediate;
|
|
16332
16332
|
function paramsHaveRequestBody(params2) {
|
|
@@ -16342,7 +16342,7 @@ var require_helpers = __commonJS({
|
|
|
16342
16342
|
return ret;
|
|
16343
16343
|
}
|
|
16344
16344
|
function md5(str) {
|
|
16345
|
-
return
|
|
16345
|
+
return crypto3.createHash("md5").update(str).digest("hex");
|
|
16346
16346
|
}
|
|
16347
16347
|
function isReadStream(rs) {
|
|
16348
16348
|
return rs.readable && rs.path && rs.mode;
|
|
@@ -16380,7 +16380,7 @@ var require_helpers = __commonJS({
|
|
|
16380
16380
|
var require_aws_sign2 = __commonJS({
|
|
16381
16381
|
"../../node_modules/aws-sign2/index.js"(exports, module2) {
|
|
16382
16382
|
"use strict";
|
|
16383
|
-
var
|
|
16383
|
+
var crypto3 = require("crypto");
|
|
16384
16384
|
var parse = require("url").parse;
|
|
16385
16385
|
var keys2 = [
|
|
16386
16386
|
"acl",
|
|
@@ -16404,7 +16404,7 @@ var require_aws_sign2 = __commonJS({
|
|
|
16404
16404
|
module2.exports = authorization;
|
|
16405
16405
|
module2.exports.authorization = authorization;
|
|
16406
16406
|
function hmacSha1(options2) {
|
|
16407
|
-
return
|
|
16407
|
+
return crypto3.createHmac("sha1", options2.secret).update(options2.message).digest("base64");
|
|
16408
16408
|
}
|
|
16409
16409
|
module2.exports.hmacSha1 = hmacSha1;
|
|
16410
16410
|
function sign(options2) {
|
|
@@ -16560,14 +16560,14 @@ var require_aws4 = __commonJS({
|
|
|
16560
16560
|
var aws4 = exports;
|
|
16561
16561
|
var url = require("url");
|
|
16562
16562
|
var querystring = require("querystring");
|
|
16563
|
-
var
|
|
16563
|
+
var crypto3 = require("crypto");
|
|
16564
16564
|
var lru = require_lru();
|
|
16565
16565
|
var credentialsCache = lru(1e3);
|
|
16566
16566
|
function hmac(key, string, encoding) {
|
|
16567
|
-
return
|
|
16567
|
+
return crypto3.createHmac("sha256", key).update(string, "utf8").digest(encoding);
|
|
16568
16568
|
}
|
|
16569
16569
|
function hash2(string, encoding) {
|
|
16570
|
-
return
|
|
16570
|
+
return crypto3.createHash("sha256").update(string, "utf8").digest(encoding);
|
|
16571
16571
|
}
|
|
16572
16572
|
function encodeRfc3986(urlEncodedString) {
|
|
16573
16573
|
return urlEncodedString.replace(/[!'()*]/g, function(c) {
|
|
@@ -21887,23 +21887,23 @@ var require_nacl_fast = __commonJS({
|
|
|
21887
21887
|
randombytes = fn;
|
|
21888
21888
|
};
|
|
21889
21889
|
(function() {
|
|
21890
|
-
var
|
|
21891
|
-
if (
|
|
21890
|
+
var crypto3 = typeof self !== "undefined" ? self.crypto || self.msCrypto : null;
|
|
21891
|
+
if (crypto3 && crypto3.getRandomValues) {
|
|
21892
21892
|
var QUOTA = 65536;
|
|
21893
21893
|
nacl.setPRNG(function(x, n) {
|
|
21894
21894
|
var i, v = new Uint8Array(n);
|
|
21895
21895
|
for (i = 0; i < n; i += QUOTA) {
|
|
21896
|
-
|
|
21896
|
+
crypto3.getRandomValues(v.subarray(i, i + Math.min(n - i, QUOTA)));
|
|
21897
21897
|
}
|
|
21898
21898
|
for (i = 0; i < n; i++)
|
|
21899
21899
|
x[i] = v[i];
|
|
21900
21900
|
cleanup3(v);
|
|
21901
21901
|
});
|
|
21902
21902
|
} else if (typeof require !== "undefined") {
|
|
21903
|
-
|
|
21904
|
-
if (
|
|
21903
|
+
crypto3 = require("crypto");
|
|
21904
|
+
if (crypto3 && crypto3.randomBytes) {
|
|
21905
21905
|
nacl.setPRNG(function(x, n) {
|
|
21906
|
-
var i, v =
|
|
21906
|
+
var i, v = crypto3.randomBytes(n);
|
|
21907
21907
|
for (i = 0; i < n; i++)
|
|
21908
21908
|
x[i] = v[i];
|
|
21909
21909
|
cleanup3(v);
|
|
@@ -21943,7 +21943,7 @@ var require_utils3 = __commonJS({
|
|
|
21943
21943
|
var Buffer2 = require_safer().Buffer;
|
|
21944
21944
|
var PrivateKey = require_private_key();
|
|
21945
21945
|
var Key = require_key();
|
|
21946
|
-
var
|
|
21946
|
+
var crypto3 = require("crypto");
|
|
21947
21947
|
var algs = require_algs();
|
|
21948
21948
|
var asn1 = require_lib4();
|
|
21949
21949
|
var ec = require_ec();
|
|
@@ -22027,7 +22027,7 @@ var require_utils3 = __commonJS({
|
|
|
22027
22027
|
bufs.push(salt);
|
|
22028
22028
|
D = Buffer2.concat(bufs);
|
|
22029
22029
|
for (var j = 0; j < count; ++j)
|
|
22030
|
-
D =
|
|
22030
|
+
D = crypto3.createHash("md5").update(D).digest();
|
|
22031
22031
|
material = Buffer2.concat([material, D]);
|
|
22032
22032
|
D_prev = D;
|
|
22033
22033
|
}
|
|
@@ -22049,13 +22049,13 @@ var require_utils3 = __commonJS({
|
|
|
22049
22049
|
return Buffer2.concat(ts).slice(0, size);
|
|
22050
22050
|
function T(I) {
|
|
22051
22051
|
hkey.writeUInt32BE(I, hkey.length - 4);
|
|
22052
|
-
var hmac =
|
|
22052
|
+
var hmac = crypto3.createHmac(hashAlg, passphrase);
|
|
22053
22053
|
hmac.update(hkey);
|
|
22054
22054
|
var Ti = hmac.digest();
|
|
22055
22055
|
var Uc = Ti;
|
|
22056
22056
|
var c = 1;
|
|
22057
22057
|
while (c++ < iterations) {
|
|
22058
|
-
hmac =
|
|
22058
|
+
hmac = crypto3.createHmac(hashAlg, passphrase);
|
|
22059
22059
|
hmac.update(Uc);
|
|
22060
22060
|
Uc = hmac.digest();
|
|
22061
22061
|
for (var x = 0; x < Ti.length; ++x)
|
|
@@ -22426,7 +22426,7 @@ var require_signature = __commonJS({
|
|
|
22426
22426
|
var assert = require_assert();
|
|
22427
22427
|
var Buffer2 = require_safer().Buffer;
|
|
22428
22428
|
var algs = require_algs();
|
|
22429
|
-
var
|
|
22429
|
+
var crypto3 = require("crypto");
|
|
22430
22430
|
var errs = require_errors();
|
|
22431
22431
|
var utils = require_utils3();
|
|
22432
22432
|
var asn1 = require_lib4();
|
|
@@ -22806,7 +22806,7 @@ var require_sec = __commonJS({
|
|
|
22806
22806
|
var require_ecc_jsbn = __commonJS({
|
|
22807
22807
|
"../../node_modules/ecc-jsbn/index.js"(exports) {
|
|
22808
22808
|
"use strict";
|
|
22809
|
-
var
|
|
22809
|
+
var crypto3 = require("crypto");
|
|
22810
22810
|
var BigInteger = require_jsbn().BigInteger;
|
|
22811
22811
|
var ECPointFp = require_ec().ECPointFp;
|
|
22812
22812
|
var Buffer2 = require_safer().Buffer;
|
|
@@ -22830,7 +22830,7 @@ var require_ecc_jsbn = __commonJS({
|
|
|
22830
22830
|
}
|
|
22831
22831
|
} else {
|
|
22832
22832
|
var n1 = n.subtract(BigInteger.ONE);
|
|
22833
|
-
var r = new BigInteger(
|
|
22833
|
+
var r = new BigInteger(crypto3.randomBytes(n.bitLength()));
|
|
22834
22834
|
priv = r.mod(n1).add(BigInteger.ONE);
|
|
22835
22835
|
this.P = c.getG().multiply(priv);
|
|
22836
22836
|
}
|
|
@@ -22860,14 +22860,14 @@ var require_dhe = __commonJS({
|
|
|
22860
22860
|
generateED25519
|
|
22861
22861
|
};
|
|
22862
22862
|
var assert = require_assert();
|
|
22863
|
-
var
|
|
22863
|
+
var crypto3 = require("crypto");
|
|
22864
22864
|
var Buffer2 = require_safer().Buffer;
|
|
22865
22865
|
var algs = require_algs();
|
|
22866
22866
|
var utils = require_utils3();
|
|
22867
22867
|
var nacl = require_nacl_fast();
|
|
22868
22868
|
var Key = require_key();
|
|
22869
22869
|
var PrivateKey = require_private_key();
|
|
22870
|
-
var CRYPTO_HAVE_ECDH =
|
|
22870
|
+
var CRYPTO_HAVE_ECDH = crypto3.createECDH !== void 0;
|
|
22871
22871
|
var ecdh = require_ecc_jsbn();
|
|
22872
22872
|
var ec = require_ec();
|
|
22873
22873
|
var jsbn = require_jsbn().BigInteger;
|
|
@@ -22881,7 +22881,7 @@ var require_dhe = __commonJS({
|
|
|
22881
22881
|
if (!CRYPTO_HAVE_ECDH) {
|
|
22882
22882
|
throw new Error("Due to bugs in the node 0.10 crypto API, node 0.12.x or later is required to use DH");
|
|
22883
22883
|
}
|
|
22884
|
-
this._dh =
|
|
22884
|
+
this._dh = crypto3.createDiffieHellman(
|
|
22885
22885
|
key.part.p.data,
|
|
22886
22886
|
void 0,
|
|
22887
22887
|
key.part.g.data,
|
|
@@ -22908,7 +22908,7 @@ var require_dhe = __commonJS({
|
|
|
22908
22908
|
"nistp384": "secp384r1",
|
|
22909
22909
|
"nistp521": "secp521r1"
|
|
22910
22910
|
}[key.curve];
|
|
22911
|
-
this._dh =
|
|
22911
|
+
this._dh = crypto3.createECDH(curve);
|
|
22912
22912
|
if (typeof this._dh !== "object" || typeof this._dh.setPrivateKey !== "function") {
|
|
22913
22913
|
CRYPTO_HAVE_ECDH = false;
|
|
22914
22914
|
DiffieHellman.call(this, key);
|
|
@@ -23060,7 +23060,7 @@ var require_dhe = __commonJS({
|
|
|
23060
23060
|
return this._key;
|
|
23061
23061
|
} else {
|
|
23062
23062
|
var n = this._ecParams.getN();
|
|
23063
|
-
var r = new jsbn(
|
|
23063
|
+
var r = new jsbn(crypto3.randomBytes(n.bitLength()));
|
|
23064
23064
|
var n1 = n.subtract(jsbn.ONE);
|
|
23065
23065
|
priv = r.mod(n1).add(jsbn.ONE);
|
|
23066
23066
|
pub = this._ecParams.getG().multiply(priv);
|
|
@@ -23166,7 +23166,7 @@ var require_dhe = __commonJS({
|
|
|
23166
23166
|
"nistp384": "secp384r1",
|
|
23167
23167
|
"nistp521": "secp521r1"
|
|
23168
23168
|
}[curve];
|
|
23169
|
-
var dh =
|
|
23169
|
+
var dh = crypto3.createECDH(osCurve);
|
|
23170
23170
|
dh.generateKeys();
|
|
23171
23171
|
parts.push({
|
|
23172
23172
|
name: "curve",
|
|
@@ -23184,7 +23184,7 @@ var require_dhe = __commonJS({
|
|
|
23184
23184
|
var ecParams = new X9ECParameters(curve);
|
|
23185
23185
|
var n = ecParams.getN();
|
|
23186
23186
|
var cByteLen = Math.ceil((n.bitLength() + 64) / 8);
|
|
23187
|
-
var c = new jsbn(
|
|
23187
|
+
var c = new jsbn(crypto3.randomBytes(cByteLen));
|
|
23188
23188
|
var n1 = n.subtract(jsbn.ONE);
|
|
23189
23189
|
var priv = c.mod(n1).add(jsbn.ONE);
|
|
23190
23190
|
var pub = ecParams.getG().multiply(priv);
|
|
@@ -25521,7 +25521,7 @@ var require_ssh_private = __commonJS({
|
|
|
25521
25521
|
var Buffer2 = require_safer().Buffer;
|
|
25522
25522
|
var algs = require_algs();
|
|
25523
25523
|
var utils = require_utils3();
|
|
25524
|
-
var
|
|
25524
|
+
var crypto3 = require("crypto");
|
|
25525
25525
|
var Key = require_key();
|
|
25526
25526
|
var PrivateKey = require_private_key();
|
|
25527
25527
|
var pem = require_pem();
|
|
@@ -25595,7 +25595,7 @@ var require_ssh_private = __commonJS({
|
|
|
25595
25595
|
out = Buffer2.from(out);
|
|
25596
25596
|
var ckey = out.slice(0, cinf.keySize);
|
|
25597
25597
|
var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize);
|
|
25598
|
-
var cipherStream =
|
|
25598
|
+
var cipherStream = crypto3.createDecipheriv(
|
|
25599
25599
|
cinf.opensslName,
|
|
25600
25600
|
ckey,
|
|
25601
25601
|
iv
|
|
@@ -25660,7 +25660,7 @@ var require_ssh_private = __commonJS({
|
|
|
25660
25660
|
var privBuf;
|
|
25661
25661
|
if (PrivateKey.isPrivateKey(key)) {
|
|
25662
25662
|
privBuf = new SSHBuffer({});
|
|
25663
|
-
var checkInt =
|
|
25663
|
+
var checkInt = crypto3.randomBytes(4).readUInt32BE(0);
|
|
25664
25664
|
privBuf.writeInt(checkInt);
|
|
25665
25665
|
privBuf.writeInt(checkInt);
|
|
25666
25666
|
privBuf.write(key.toBuffer("rfc4253"));
|
|
@@ -25674,7 +25674,7 @@ var require_ssh_private = __commonJS({
|
|
|
25674
25674
|
case "none":
|
|
25675
25675
|
break;
|
|
25676
25676
|
case "bcrypt":
|
|
25677
|
-
var salt =
|
|
25677
|
+
var salt = crypto3.randomBytes(16);
|
|
25678
25678
|
var rounds = 16;
|
|
25679
25679
|
var kdfssh = new SSHBuffer({});
|
|
25680
25680
|
kdfssh.writeBuffer(salt);
|
|
@@ -25701,7 +25701,7 @@ var require_ssh_private = __commonJS({
|
|
|
25701
25701
|
out = Buffer2.from(out);
|
|
25702
25702
|
var ckey = out.slice(0, cinf.keySize);
|
|
25703
25703
|
var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize);
|
|
25704
|
-
var cipherStream =
|
|
25704
|
+
var cipherStream = crypto3.createCipheriv(
|
|
25705
25705
|
cinf.opensslName,
|
|
25706
25706
|
ckey,
|
|
25707
25707
|
iv
|
|
@@ -25764,7 +25764,7 @@ var require_pem = __commonJS({
|
|
|
25764
25764
|
};
|
|
25765
25765
|
var assert = require_assert();
|
|
25766
25766
|
var asn1 = require_lib4();
|
|
25767
|
-
var
|
|
25767
|
+
var crypto3 = require("crypto");
|
|
25768
25768
|
var Buffer2 = require_safer().Buffer;
|
|
25769
25769
|
var algs = require_algs();
|
|
25770
25770
|
var utils = require_utils3();
|
|
@@ -25932,7 +25932,7 @@ var require_pem = __commonJS({
|
|
|
25932
25932
|
alg = void 0;
|
|
25933
25933
|
}
|
|
25934
25934
|
if (cipher && key && iv) {
|
|
25935
|
-
var cipherStream =
|
|
25935
|
+
var cipherStream = crypto3.createDecipheriv(cipher, key, iv);
|
|
25936
25936
|
var chunk, chunks = [];
|
|
25937
25937
|
cipherStream.once("error", function(e) {
|
|
25938
25938
|
if (e.toString().indexOf("bad decrypt") !== -1) {
|
|
@@ -26360,7 +26360,7 @@ var require_putty = __commonJS({
|
|
|
26360
26360
|
var rfc4253 = require_rfc4253();
|
|
26361
26361
|
var Key = require_key();
|
|
26362
26362
|
var SSHBuffer = require_ssh_buffer();
|
|
26363
|
-
var
|
|
26363
|
+
var crypto3 = require("crypto");
|
|
26364
26364
|
var PrivateKey = require_private_key();
|
|
26365
26365
|
var errors = require_errors();
|
|
26366
26366
|
function read(buf, options2) {
|
|
@@ -26430,7 +26430,7 @@ var require_putty = __commonJS({
|
|
|
26430
26430
|
);
|
|
26431
26431
|
}
|
|
26432
26432
|
var iv = Buffer2.alloc(16, 0);
|
|
26433
|
-
var decipher =
|
|
26433
|
+
var decipher = crypto3.createDecipheriv(
|
|
26434
26434
|
"aes-256-cbc",
|
|
26435
26435
|
derivePPK2EncryptionKey(options2.passphrase),
|
|
26436
26436
|
iv
|
|
@@ -26481,11 +26481,11 @@ var require_putty = __commonJS({
|
|
|
26481
26481
|
return key;
|
|
26482
26482
|
}
|
|
26483
26483
|
function derivePPK2EncryptionKey(passphrase) {
|
|
26484
|
-
var hash1 =
|
|
26484
|
+
var hash1 = crypto3.createHash("sha1").update(Buffer2.concat([
|
|
26485
26485
|
Buffer2.from([0, 0, 0, 0]),
|
|
26486
26486
|
Buffer2.from(passphrase)
|
|
26487
26487
|
])).digest();
|
|
26488
|
-
var hash2 =
|
|
26488
|
+
var hash2 = crypto3.createHash("sha1").update(Buffer2.concat([
|
|
26489
26489
|
Buffer2.from([0, 0, 0, 1]),
|
|
26490
26490
|
Buffer2.from(passphrase)
|
|
26491
26491
|
])).digest();
|
|
@@ -26641,7 +26641,7 @@ var require_private_key = __commonJS({
|
|
|
26641
26641
|
var assert = require_assert();
|
|
26642
26642
|
var Buffer2 = require_safer().Buffer;
|
|
26643
26643
|
var algs = require_algs();
|
|
26644
|
-
var
|
|
26644
|
+
var crypto3 = require("crypto");
|
|
26645
26645
|
var Fingerprint = require_fingerprint();
|
|
26646
26646
|
var Signature = require_signature();
|
|
26647
26647
|
var errs = require_errors();
|
|
@@ -26752,14 +26752,14 @@ var require_private_key = __commonJS({
|
|
|
26752
26752
|
var v, nm, err;
|
|
26753
26753
|
try {
|
|
26754
26754
|
nm = hashAlgo.toUpperCase();
|
|
26755
|
-
v =
|
|
26755
|
+
v = crypto3.createSign(nm);
|
|
26756
26756
|
} catch (e) {
|
|
26757
26757
|
err = e;
|
|
26758
26758
|
}
|
|
26759
26759
|
if (v === void 0 || err instanceof Error && err.message.match(/Unknown message digest/)) {
|
|
26760
26760
|
nm = "RSA-";
|
|
26761
26761
|
nm += hashAlgo.toUpperCase();
|
|
26762
|
-
v =
|
|
26762
|
+
v = crypto3.createSign(nm);
|
|
26763
26763
|
}
|
|
26764
26764
|
assert.ok(v, "failed to create verifier");
|
|
26765
26765
|
var oldSign = v.sign.bind(v);
|
|
@@ -26845,7 +26845,7 @@ var require_identity = __commonJS({
|
|
|
26845
26845
|
module2.exports = Identity6;
|
|
26846
26846
|
var assert = require_assert();
|
|
26847
26847
|
var algs = require_algs();
|
|
26848
|
-
var
|
|
26848
|
+
var crypto3 = require("crypto");
|
|
26849
26849
|
var Fingerprint = require_fingerprint();
|
|
26850
26850
|
var Signature = require_signature();
|
|
26851
26851
|
var errs = require_errors();
|
|
@@ -27163,7 +27163,7 @@ var require_openssh_cert = __commonJS({
|
|
|
27163
27163
|
};
|
|
27164
27164
|
var assert = require_assert();
|
|
27165
27165
|
var SSHBuffer = require_ssh_buffer();
|
|
27166
|
-
var
|
|
27166
|
+
var crypto3 = require("crypto");
|
|
27167
27167
|
var Buffer2 = require_safer().Buffer;
|
|
27168
27168
|
var algs = require_algs();
|
|
27169
27169
|
var Key = require_key();
|
|
@@ -27352,7 +27352,7 @@ var require_openssh_cert = __commonJS({
|
|
|
27352
27352
|
assert.object(cert.signatures.openssh, "signature for openssh format");
|
|
27353
27353
|
var sig = cert.signatures.openssh;
|
|
27354
27354
|
if (sig.nonce === void 0)
|
|
27355
|
-
sig.nonce =
|
|
27355
|
+
sig.nonce = crypto3.randomBytes(16);
|
|
27356
27356
|
var buf = new SSHBuffer({});
|
|
27357
27357
|
buf.writeString(getCertType(cert.subjectKey));
|
|
27358
27358
|
buf.writeBuffer(sig.nonce);
|
|
@@ -28158,7 +28158,7 @@ var require_certificate = __commonJS({
|
|
|
28158
28158
|
var assert = require_assert();
|
|
28159
28159
|
var Buffer2 = require_safer().Buffer;
|
|
28160
28160
|
var algs = require_algs();
|
|
28161
|
-
var
|
|
28161
|
+
var crypto3 = require("crypto");
|
|
28162
28162
|
var Fingerprint = require_fingerprint();
|
|
28163
28163
|
var Signature = require_signature();
|
|
28164
28164
|
var errs = require_errors();
|
|
@@ -28245,7 +28245,7 @@ var require_certificate = __commonJS({
|
|
|
28245
28245
|
throw new InvalidAlgorithmError(algo);
|
|
28246
28246
|
if (this._hashCache[algo])
|
|
28247
28247
|
return this._hashCache[algo];
|
|
28248
|
-
var hash2 =
|
|
28248
|
+
var hash2 = crypto3.createHash(algo).update(this.toBuffer("x509")).digest();
|
|
28249
28249
|
this._hashCache[algo] = hash2;
|
|
28250
28250
|
return hash2;
|
|
28251
28251
|
};
|
|
@@ -28516,7 +28516,7 @@ var require_fingerprint = __commonJS({
|
|
|
28516
28516
|
var assert = require_assert();
|
|
28517
28517
|
var Buffer2 = require_safer().Buffer;
|
|
28518
28518
|
var algs = require_algs();
|
|
28519
|
-
var
|
|
28519
|
+
var crypto3 = require("crypto");
|
|
28520
28520
|
var errs = require_errors();
|
|
28521
28521
|
var Key = require_key();
|
|
28522
28522
|
var PrivateKey = require_private_key();
|
|
@@ -28583,9 +28583,9 @@ var require_fingerprint = __commonJS({
|
|
|
28583
28583
|
);
|
|
28584
28584
|
}
|
|
28585
28585
|
var theirHash = other.hash(this.algorithm, this.hashType);
|
|
28586
|
-
var theirHash2 =
|
|
28586
|
+
var theirHash2 = crypto3.createHash(this.algorithm).update(theirHash).digest("base64");
|
|
28587
28587
|
if (this.hash2 === void 0)
|
|
28588
|
-
this.hash2 =
|
|
28588
|
+
this.hash2 = crypto3.createHash(this.algorithm).update(this.hash).digest("base64");
|
|
28589
28589
|
return this.hash2 === theirHash2;
|
|
28590
28590
|
};
|
|
28591
28591
|
var base64RE = /^[A-Za-z0-9+\/=]+$/;
|
|
@@ -28711,7 +28711,7 @@ var require_key = __commonJS({
|
|
|
28711
28711
|
module2.exports = Key;
|
|
28712
28712
|
var assert = require_assert();
|
|
28713
28713
|
var algs = require_algs();
|
|
28714
|
-
var
|
|
28714
|
+
var crypto3 = require("crypto");
|
|
28715
28715
|
var Fingerprint = require_fingerprint();
|
|
28716
28716
|
var Signature = require_signature();
|
|
28717
28717
|
var DiffieHellman = require_dhe().DiffieHellman;
|
|
@@ -28809,7 +28809,7 @@ var require_key = __commonJS({
|
|
|
28809
28809
|
} else {
|
|
28810
28810
|
throw new Error("Hash type " + type + " not supported");
|
|
28811
28811
|
}
|
|
28812
|
-
var hash2 =
|
|
28812
|
+
var hash2 = crypto3.createHash(algo).update(buf).digest();
|
|
28813
28813
|
this._hashCache[cacheKey] = hash2;
|
|
28814
28814
|
return hash2;
|
|
28815
28815
|
};
|
|
@@ -28857,14 +28857,14 @@ var require_key = __commonJS({
|
|
|
28857
28857
|
var v, nm, err;
|
|
28858
28858
|
try {
|
|
28859
28859
|
nm = hashAlgo.toUpperCase();
|
|
28860
|
-
v =
|
|
28860
|
+
v = crypto3.createVerify(nm);
|
|
28861
28861
|
} catch (e) {
|
|
28862
28862
|
err = e;
|
|
28863
28863
|
}
|
|
28864
28864
|
if (v === void 0 || err instanceof Error && err.message.match(/Unknown message digest/)) {
|
|
28865
28865
|
nm = "RSA-";
|
|
28866
28866
|
nm += hashAlgo.toUpperCase();
|
|
28867
|
-
v =
|
|
28867
|
+
v = crypto3.createVerify(nm);
|
|
28868
28868
|
}
|
|
28869
28869
|
assert.ok(v, "failed to create verifier");
|
|
28870
28870
|
var oldVerify = v.verify.bind(v);
|
|
@@ -30669,7 +30669,7 @@ var require_signer = __commonJS({
|
|
|
30669
30669
|
"../../node_modules/http-signature/lib/signer.js"(exports, module2) {
|
|
30670
30670
|
"use strict";
|
|
30671
30671
|
var assert = require_assert();
|
|
30672
|
-
var
|
|
30672
|
+
var crypto3 = require("crypto");
|
|
30673
30673
|
var http = require("http");
|
|
30674
30674
|
var util = require("util");
|
|
30675
30675
|
var sshpk = require_lib5();
|
|
@@ -30706,7 +30706,7 @@ var require_signer = __commonJS({
|
|
|
30706
30706
|
this.rs_keyId = options2.keyId;
|
|
30707
30707
|
if (typeof options2.key !== "string" && !Buffer.isBuffer(options2.key))
|
|
30708
30708
|
throw new TypeError("options.key for HMAC must be a string or Buffer");
|
|
30709
|
-
this.rs_signer =
|
|
30709
|
+
this.rs_signer = crypto3.createHmac(alg[1].toUpperCase(), options2.key);
|
|
30710
30710
|
this.rs_signer.sign = function() {
|
|
30711
30711
|
var digest = this.digest("base64");
|
|
30712
30712
|
return {
|
|
@@ -30924,7 +30924,7 @@ var require_signer = __commonJS({
|
|
|
30924
30924
|
if (alg[0] === "hmac") {
|
|
30925
30925
|
if (typeof options2.key !== "string" && !Buffer.isBuffer(options2.key))
|
|
30926
30926
|
throw new TypeError("options.key must be a string or Buffer");
|
|
30927
|
-
var hmac =
|
|
30927
|
+
var hmac = crypto3.createHmac(alg[1].toUpperCase(), options2.key);
|
|
30928
30928
|
hmac.update(stringToSign);
|
|
30929
30929
|
signature = hmac.digest("base64");
|
|
30930
30930
|
} else {
|
|
@@ -30970,7 +30970,7 @@ var require_verify = __commonJS({
|
|
|
30970
30970
|
"../../node_modules/http-signature/lib/verify.js"(exports, module2) {
|
|
30971
30971
|
"use strict";
|
|
30972
30972
|
var assert = require_assert();
|
|
30973
|
-
var
|
|
30973
|
+
var crypto3 = require("crypto");
|
|
30974
30974
|
var sshpk = require_lib5();
|
|
30975
30975
|
var utils = require_utils4();
|
|
30976
30976
|
var HASH_ALGOS = utils.HASH_ALGOS;
|
|
@@ -31018,12 +31018,12 @@ var require_verify = __commonJS({
|
|
|
31018
31018
|
if (alg[0] !== "hmac")
|
|
31019
31019
|
return false;
|
|
31020
31020
|
var hashAlg = alg[1].toUpperCase();
|
|
31021
|
-
var hmac =
|
|
31021
|
+
var hmac = crypto3.createHmac(hashAlg, secret);
|
|
31022
31022
|
hmac.update(parsedSignature.signingString);
|
|
31023
|
-
var h1 =
|
|
31023
|
+
var h1 = crypto3.createHmac(hashAlg, secret);
|
|
31024
31024
|
h1.update(hmac.digest());
|
|
31025
31025
|
h1 = h1.digest();
|
|
31026
|
-
var h2 =
|
|
31026
|
+
var h2 = crypto3.createHmac(hashAlg, secret);
|
|
31027
31027
|
h2.update(new Buffer(parsedSignature.params.signature, "base64"));
|
|
31028
31028
|
h2 = h2.digest();
|
|
31029
31029
|
if (typeof h1 === "string")
|
|
@@ -48976,12 +48976,12 @@ var require_auth = __commonJS({
|
|
|
48976
48976
|
var require_oauth_sign = __commonJS({
|
|
48977
48977
|
"../../node_modules/oauth-sign/index.js"(exports) {
|
|
48978
48978
|
"use strict";
|
|
48979
|
-
var
|
|
48979
|
+
var crypto3 = require("crypto");
|
|
48980
48980
|
function sha(key, body2, algorithm) {
|
|
48981
|
-
return
|
|
48981
|
+
return crypto3.createHmac(algorithm, key).update(body2).digest("base64");
|
|
48982
48982
|
}
|
|
48983
48983
|
function rsa(key, body2) {
|
|
48984
|
-
return
|
|
48984
|
+
return crypto3.createSign("RSA-SHA1").update(body2).sign(key, "base64");
|
|
48985
48985
|
}
|
|
48986
48986
|
function rfc3986(str) {
|
|
48987
48987
|
return encodeURIComponent(str).replace(/!/g, "%21").replace(/\*/g, "%2A").replace(/\(/g, "%28").replace(/\)/g, "%29").replace(/'/g, "%27");
|
|
@@ -49088,7 +49088,7 @@ var require_oauth4 = __commonJS({
|
|
|
49088
49088
|
var caseless = require_caseless();
|
|
49089
49089
|
var uuid2 = require("uuid/v4");
|
|
49090
49090
|
var oauth = require_oauth_sign();
|
|
49091
|
-
var
|
|
49091
|
+
var crypto3 = require("crypto");
|
|
49092
49092
|
var Buffer2 = require_safe_buffer().Buffer;
|
|
49093
49093
|
function OAuth(request) {
|
|
49094
49094
|
this.request = request;
|
|
@@ -49140,7 +49140,7 @@ var require_oauth4 = __commonJS({
|
|
|
49140
49140
|
if (["HMAC-SHA1", "RSA-SHA1"].indexOf(_oauth.signature_method || "HMAC-SHA1") < 0) {
|
|
49141
49141
|
this.request.emit("error", new Error("oauth: " + _oauth.signature_method + " signature_method not supported with body_hash signing."));
|
|
49142
49142
|
}
|
|
49143
|
-
var shasum =
|
|
49143
|
+
var shasum = crypto3.createHash("sha1");
|
|
49144
49144
|
shasum.update(body2 || "");
|
|
49145
49145
|
var sha1 = shasum.digest("hex");
|
|
49146
49146
|
return Buffer2.from(sha1, "hex").toString("base64");
|
|
@@ -49209,15 +49209,15 @@ var require_oauth4 = __commonJS({
|
|
|
49209
49209
|
var require_hawk = __commonJS({
|
|
49210
49210
|
"../../node_modules/request/lib/hawk.js"(exports) {
|
|
49211
49211
|
"use strict";
|
|
49212
|
-
var
|
|
49212
|
+
var crypto3 = require("crypto");
|
|
49213
49213
|
function randomString(size) {
|
|
49214
49214
|
var bits = (size + 1) * 6;
|
|
49215
|
-
var buffer =
|
|
49215
|
+
var buffer = crypto3.randomBytes(Math.ceil(bits / 8));
|
|
49216
49216
|
var string = buffer.toString("base64").replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g, "");
|
|
49217
49217
|
return string.slice(0, size);
|
|
49218
49218
|
}
|
|
49219
49219
|
function calculatePayloadHash(payload, algorithm, contentType) {
|
|
49220
|
-
var hash2 =
|
|
49220
|
+
var hash2 = crypto3.createHash(algorithm);
|
|
49221
49221
|
hash2.update("hawk.1.payload\n");
|
|
49222
49222
|
hash2.update((contentType ? contentType.split(";")[0].trim().toLowerCase() : "") + "\n");
|
|
49223
49223
|
hash2.update(payload || "");
|
|
@@ -49233,7 +49233,7 @@ var require_hawk = __commonJS({
|
|
|
49233
49233
|
if (opts.app) {
|
|
49234
49234
|
normalized = normalized + opts.app + "\n" + (opts.dlg || "") + "\n";
|
|
49235
49235
|
}
|
|
49236
|
-
var hmac =
|
|
49236
|
+
var hmac = crypto3.createHmac(credentials.algorithm, credentials.key).update(normalized);
|
|
49237
49237
|
var digest = hmac.digest("base64");
|
|
49238
49238
|
return digest;
|
|
49239
49239
|
};
|
|
@@ -53654,7 +53654,7 @@ var require_strategy2 = __commonJS({
|
|
|
53654
53654
|
var OAuth2 = require_oauth3().OAuth2;
|
|
53655
53655
|
var SessionStateStore = require_session();
|
|
53656
53656
|
var InternalOAuthError = require_internaloautherror();
|
|
53657
|
-
var
|
|
53657
|
+
var crypto3 = require("crypto");
|
|
53658
53658
|
var base64url = require_base64url2();
|
|
53659
53659
|
var AuthorizationError = require_authorizationerror();
|
|
53660
53660
|
function Strategy(options2, verify) {
|
|
@@ -54043,11 +54043,11 @@ var require_strategy2 = __commonJS({
|
|
|
54043
54043
|
delete meta[param];
|
|
54044
54044
|
}
|
|
54045
54045
|
if (config.pkce) {
|
|
54046
|
-
var verifier = base64url(
|
|
54046
|
+
var verifier = base64url(crypto3.pseudoRandomBytes(32));
|
|
54047
54047
|
switch (config.pkce) {
|
|
54048
54048
|
case "S256":
|
|
54049
54049
|
params2.code_challenge = base64url(
|
|
54050
|
-
|
|
54050
|
+
crypto3.createHash("sha256").update(verifier).digest()
|
|
54051
54051
|
);
|
|
54052
54052
|
break;
|
|
54053
54053
|
case "plain":
|
|
@@ -54598,6 +54598,7 @@ var AutomationActionStepId = /* @__PURE__ */ ((AutomationActionStepId2) => {
|
|
|
54598
54598
|
AutomationActionStepId2["COLLECT"] = "COLLECT";
|
|
54599
54599
|
AutomationActionStepId2["OPENAI"] = "OPENAI";
|
|
54600
54600
|
AutomationActionStepId2["TRIGGER_AUTOMATION_RUN"] = "TRIGGER_AUTOMATION_RUN";
|
|
54601
|
+
AutomationActionStepId2["BRANCH"] = "BRANCH";
|
|
54601
54602
|
AutomationActionStepId2["discord"] = "discord";
|
|
54602
54603
|
AutomationActionStepId2["slack"] = "slack";
|
|
54603
54604
|
AutomationActionStepId2["zapier"] = "zapier";
|
|
@@ -56040,6 +56041,7 @@ __export(context_exports, {
|
|
|
56040
56041
|
getCurrentContext: () => getCurrentContext,
|
|
56041
56042
|
getDevAppDB: () => getDevAppDB,
|
|
56042
56043
|
getEnvironmentVariables: () => getEnvironmentVariables,
|
|
56044
|
+
getFeatureFlags: () => getFeatureFlags,
|
|
56043
56045
|
getGlobalDB: () => getGlobalDB,
|
|
56044
56046
|
getGlobalDBName: () => getGlobalDBName,
|
|
56045
56047
|
getIdentity: () => getIdentity,
|
|
@@ -56053,7 +56055,8 @@ __export(context_exports, {
|
|
|
56053
56055
|
isMultiTenant: () => isMultiTenant,
|
|
56054
56056
|
isScim: () => isScim,
|
|
56055
56057
|
isTenancyEnabled: () => isTenancyEnabled,
|
|
56056
|
-
isTenantIdSet: () => isTenantIdSet
|
|
56058
|
+
isTenantIdSet: () => isTenantIdSet,
|
|
56059
|
+
setFeatureFlags: () => setFeatureFlags
|
|
56057
56060
|
});
|
|
56058
56061
|
|
|
56059
56062
|
// src/context/identity.ts
|
|
@@ -60351,6 +60354,21 @@ function getCurrentContext() {
|
|
|
60351
60354
|
return void 0;
|
|
60352
60355
|
}
|
|
60353
60356
|
}
|
|
60357
|
+
function getFeatureFlags(key) {
|
|
60358
|
+
const context = getCurrentContext();
|
|
60359
|
+
if (!context) {
|
|
60360
|
+
return void 0;
|
|
60361
|
+
}
|
|
60362
|
+
return context.featureFlagCache?.[key];
|
|
60363
|
+
}
|
|
60364
|
+
function setFeatureFlags(key, value) {
|
|
60365
|
+
const context = getCurrentContext();
|
|
60366
|
+
if (!context) {
|
|
60367
|
+
return;
|
|
60368
|
+
}
|
|
60369
|
+
context.featureFlagCache ??= {};
|
|
60370
|
+
context.featureFlagCache[key] = value;
|
|
60371
|
+
}
|
|
60354
60372
|
|
|
60355
60373
|
// src/cache/base/index.ts
|
|
60356
60374
|
function generateTenantKey(key) {
|
|
@@ -66028,7 +66046,8 @@ __export(features_exports, {
|
|
|
66028
66046
|
Flag: () => Flag,
|
|
66029
66047
|
FlagSet: () => FlagSet,
|
|
66030
66048
|
flags: () => flags,
|
|
66031
|
-
init: () => init8
|
|
66049
|
+
init: () => init8,
|
|
66050
|
+
shutdown: () => shutdown5
|
|
66032
66051
|
});
|
|
66033
66052
|
var import_posthog_node2 = require("posthog-node");
|
|
66034
66053
|
var import_dd_trace3 = __toESM(require("dd-trace"));
|
|
@@ -66045,6 +66064,9 @@ function init8(opts) {
|
|
|
66045
66064
|
console.log("posthog disabled");
|
|
66046
66065
|
}
|
|
66047
66066
|
}
|
|
66067
|
+
function shutdown5() {
|
|
66068
|
+
posthog?.shutdown();
|
|
66069
|
+
}
|
|
66048
66070
|
var Flag = class {
|
|
66049
66071
|
constructor(defaultValue) {
|
|
66050
66072
|
this.defaultValue = defaultValue;
|
|
@@ -66095,6 +66117,7 @@ var NumberFlag = class extends Flag {
|
|
|
66095
66117
|
var FlagSet = class {
|
|
66096
66118
|
constructor(flagSchema) {
|
|
66097
66119
|
this.flagSchema = flagSchema;
|
|
66120
|
+
this.setId = crypto.randomUUID();
|
|
66098
66121
|
}
|
|
66099
66122
|
defaults() {
|
|
66100
66123
|
return Object.keys(this.flagSchema).reduce((acc, key) => {
|
|
@@ -66116,6 +66139,11 @@ var FlagSet = class {
|
|
|
66116
66139
|
}
|
|
66117
66140
|
async fetch(ctx) {
|
|
66118
66141
|
return await import_dd_trace3.default.trace("features.fetch", async (span) => {
|
|
66142
|
+
const cachedFlags = getFeatureFlags(this.setId);
|
|
66143
|
+
if (cachedFlags) {
|
|
66144
|
+
span?.addTags({ fromCache: true });
|
|
66145
|
+
return cachedFlags;
|
|
66146
|
+
}
|
|
66119
66147
|
const tags = {};
|
|
66120
66148
|
const flagValues = this.defaults();
|
|
66121
66149
|
const currentTenantId = getTenantId();
|
|
@@ -66134,7 +66162,7 @@ var FlagSet = class {
|
|
|
66134
66162
|
specificallySetFalse.add(feature);
|
|
66135
66163
|
}
|
|
66136
66164
|
if (!this.isFlagName(feature)) {
|
|
66137
|
-
|
|
66165
|
+
continue;
|
|
66138
66166
|
}
|
|
66139
66167
|
if (typeof flagValues[feature] !== "boolean") {
|
|
66140
66168
|
throw new Error(`Feature: ${feature} is not a boolean`);
|
|
@@ -66161,8 +66189,7 @@ var FlagSet = class {
|
|
|
66161
66189
|
tags[`identity.type`] = identity?.type;
|
|
66162
66190
|
tags[`identity.tenantId`] = identity?.tenantId;
|
|
66163
66191
|
tags[`identity._id`] = identity?._id;
|
|
66164
|
-
|
|
66165
|
-
if (usePosthog && posthog && identity?.type === "user" /* USER */) {
|
|
66192
|
+
if (posthog && identity?.type === "user" /* USER */) {
|
|
66166
66193
|
tags[`readFromPostHog`] = true;
|
|
66167
66194
|
const personProperties = {};
|
|
66168
66195
|
if (identity.tenantId) {
|
|
@@ -66174,7 +66201,6 @@ var FlagSet = class {
|
|
|
66174
66201
|
personProperties
|
|
66175
66202
|
}
|
|
66176
66203
|
);
|
|
66177
|
-
console.log("posthog flags", JSON.stringify(posthogFlags));
|
|
66178
66204
|
for (const [name, value] of Object.entries(posthogFlags.featureFlags)) {
|
|
66179
66205
|
if (!this.isFlagName(name)) {
|
|
66180
66206
|
console.warn(`Unexpected posthog flag "${name}": ${value}`);
|
|
@@ -66193,6 +66219,7 @@ var FlagSet = class {
|
|
|
66193
66219
|
}
|
|
66194
66220
|
}
|
|
66195
66221
|
}
|
|
66222
|
+
setFeatureFlags(this.setId, flagValues);
|
|
66196
66223
|
for (const [key, value] of Object.entries(flagValues)) {
|
|
66197
66224
|
tags[`flags.${key}.value`] = value;
|
|
66198
66225
|
}
|
|
@@ -66202,10 +66229,7 @@ var FlagSet = class {
|
|
|
66202
66229
|
}
|
|
66203
66230
|
};
|
|
66204
66231
|
var flags = new FlagSet({
|
|
66205
|
-
|
|
66206
|
-
GOOGLE_SHEETS: Flag.boolean(false),
|
|
66207
|
-
USER_GROUPS: Flag.boolean(false),
|
|
66208
|
-
ONBOARDING_TOUR: Flag.boolean(false)
|
|
66232
|
+
DEFAULT_VALUES: Flag.boolean(false)
|
|
66209
66233
|
});
|
|
66210
66234
|
|
|
66211
66235
|
// src/auth/index.ts
|