@budibase/backend-core 2.30.3 → 2.30.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js CHANGED
@@ -4190,7 +4190,7 @@ var require_lib3 = __commonJS({
4190
4190
  var require_utils = __commonJS({
4191
4191
  "../../node_modules/@techpass/passport-openidconnect/lib/utils.js"(exports) {
4192
4192
  "use strict";
4193
- var crypto2 = require("crypto");
4193
+ var crypto3 = require("crypto");
4194
4194
  exports.originalURL = function(req, options2) {
4195
4195
  options2 = options2 || {};
4196
4196
  var app = req.app;
@@ -4210,7 +4210,7 @@ var require_utils = __commonJS({
4210
4210
  return a;
4211
4211
  };
4212
4212
  exports.uid = function(len) {
4213
- return crypto2.randomBytes(Math.ceil(len * 3 / 4)).toString("base64").slice(0, len);
4213
+ return crypto3.randomBytes(Math.ceil(len * 3 / 4)).toString("base64").slice(0, len);
4214
4214
  };
4215
4215
  }
4216
4216
  });
@@ -4381,7 +4381,7 @@ var require_utils2 = __commonJS({
4381
4381
  var require_oauth = __commonJS({
4382
4382
  "../../node_modules/oauth/lib/oauth.js"(exports) {
4383
4383
  "use strict";
4384
- var crypto2 = require("crypto");
4384
+ var crypto3 = require("crypto");
4385
4385
  var sha1 = require_sha1();
4386
4386
  var http = require("http");
4387
4387
  var https = require("https");
@@ -4553,10 +4553,10 @@ var require_oauth = __commonJS({
4553
4553
  hash2 = key;
4554
4554
  } else if (this._signatureMethod == "RSA-SHA1") {
4555
4555
  key = this._privateKey || "";
4556
- hash2 = crypto2.createSign("RSA-SHA1").update(signatureBase).sign(key, "base64");
4556
+ hash2 = crypto3.createSign("RSA-SHA1").update(signatureBase).sign(key, "base64");
4557
4557
  } else {
4558
- if (crypto2.Hmac) {
4559
- hash2 = crypto2.createHmac("sha1", key).update(signatureBase).digest("base64");
4558
+ if (crypto3.Hmac) {
4559
+ hash2 = crypto3.createHmac("sha1", key).update(signatureBase).digest("base64");
4560
4560
  } else {
4561
4561
  hash2 = sha1.HMACSHA1(key, signatureBase);
4562
4562
  }
@@ -4910,7 +4910,7 @@ var require_oauth2 = __commonJS({
4910
4910
  "../../node_modules/oauth/lib/oauth2.js"(exports) {
4911
4911
  "use strict";
4912
4912
  var querystring = require("querystring");
4913
- var crypto2 = require("crypto");
4913
+ var crypto3 = require("crypto");
4914
4914
  var https = require("https");
4915
4915
  var http = require("http");
4916
4916
  var URL2 = require("url");
@@ -16326,7 +16326,7 @@ var require_helpers = __commonJS({
16326
16326
  "../../node_modules/request/lib/helpers.js"(exports) {
16327
16327
  "use strict";
16328
16328
  var jsonSafeStringify = require_stringify();
16329
- var crypto2 = require("crypto");
16329
+ var crypto3 = require("crypto");
16330
16330
  var Buffer2 = require_safe_buffer().Buffer;
16331
16331
  var defer = typeof setImmediate === "undefined" ? process.nextTick : setImmediate;
16332
16332
  function paramsHaveRequestBody(params2) {
@@ -16342,7 +16342,7 @@ var require_helpers = __commonJS({
16342
16342
  return ret;
16343
16343
  }
16344
16344
  function md5(str) {
16345
- return crypto2.createHash("md5").update(str).digest("hex");
16345
+ return crypto3.createHash("md5").update(str).digest("hex");
16346
16346
  }
16347
16347
  function isReadStream(rs) {
16348
16348
  return rs.readable && rs.path && rs.mode;
@@ -16380,7 +16380,7 @@ var require_helpers = __commonJS({
16380
16380
  var require_aws_sign2 = __commonJS({
16381
16381
  "../../node_modules/aws-sign2/index.js"(exports, module2) {
16382
16382
  "use strict";
16383
- var crypto2 = require("crypto");
16383
+ var crypto3 = require("crypto");
16384
16384
  var parse = require("url").parse;
16385
16385
  var keys2 = [
16386
16386
  "acl",
@@ -16404,7 +16404,7 @@ var require_aws_sign2 = __commonJS({
16404
16404
  module2.exports = authorization;
16405
16405
  module2.exports.authorization = authorization;
16406
16406
  function hmacSha1(options2) {
16407
- return crypto2.createHmac("sha1", options2.secret).update(options2.message).digest("base64");
16407
+ return crypto3.createHmac("sha1", options2.secret).update(options2.message).digest("base64");
16408
16408
  }
16409
16409
  module2.exports.hmacSha1 = hmacSha1;
16410
16410
  function sign(options2) {
@@ -16560,14 +16560,14 @@ var require_aws4 = __commonJS({
16560
16560
  var aws4 = exports;
16561
16561
  var url = require("url");
16562
16562
  var querystring = require("querystring");
16563
- var crypto2 = require("crypto");
16563
+ var crypto3 = require("crypto");
16564
16564
  var lru = require_lru();
16565
16565
  var credentialsCache = lru(1e3);
16566
16566
  function hmac(key, string, encoding) {
16567
- return crypto2.createHmac("sha256", key).update(string, "utf8").digest(encoding);
16567
+ return crypto3.createHmac("sha256", key).update(string, "utf8").digest(encoding);
16568
16568
  }
16569
16569
  function hash2(string, encoding) {
16570
- return crypto2.createHash("sha256").update(string, "utf8").digest(encoding);
16570
+ return crypto3.createHash("sha256").update(string, "utf8").digest(encoding);
16571
16571
  }
16572
16572
  function encodeRfc3986(urlEncodedString) {
16573
16573
  return urlEncodedString.replace(/[!'()*]/g, function(c) {
@@ -21887,23 +21887,23 @@ var require_nacl_fast = __commonJS({
21887
21887
  randombytes = fn;
21888
21888
  };
21889
21889
  (function() {
21890
- var crypto2 = typeof self !== "undefined" ? self.crypto || self.msCrypto : null;
21891
- if (crypto2 && crypto2.getRandomValues) {
21890
+ var crypto3 = typeof self !== "undefined" ? self.crypto || self.msCrypto : null;
21891
+ if (crypto3 && crypto3.getRandomValues) {
21892
21892
  var QUOTA = 65536;
21893
21893
  nacl.setPRNG(function(x, n) {
21894
21894
  var i, v = new Uint8Array(n);
21895
21895
  for (i = 0; i < n; i += QUOTA) {
21896
- crypto2.getRandomValues(v.subarray(i, i + Math.min(n - i, QUOTA)));
21896
+ crypto3.getRandomValues(v.subarray(i, i + Math.min(n - i, QUOTA)));
21897
21897
  }
21898
21898
  for (i = 0; i < n; i++)
21899
21899
  x[i] = v[i];
21900
21900
  cleanup3(v);
21901
21901
  });
21902
21902
  } else if (typeof require !== "undefined") {
21903
- crypto2 = require("crypto");
21904
- if (crypto2 && crypto2.randomBytes) {
21903
+ crypto3 = require("crypto");
21904
+ if (crypto3 && crypto3.randomBytes) {
21905
21905
  nacl.setPRNG(function(x, n) {
21906
- var i, v = crypto2.randomBytes(n);
21906
+ var i, v = crypto3.randomBytes(n);
21907
21907
  for (i = 0; i < n; i++)
21908
21908
  x[i] = v[i];
21909
21909
  cleanup3(v);
@@ -21943,7 +21943,7 @@ var require_utils3 = __commonJS({
21943
21943
  var Buffer2 = require_safer().Buffer;
21944
21944
  var PrivateKey = require_private_key();
21945
21945
  var Key = require_key();
21946
- var crypto2 = require("crypto");
21946
+ var crypto3 = require("crypto");
21947
21947
  var algs = require_algs();
21948
21948
  var asn1 = require_lib4();
21949
21949
  var ec = require_ec();
@@ -22027,7 +22027,7 @@ var require_utils3 = __commonJS({
22027
22027
  bufs.push(salt);
22028
22028
  D = Buffer2.concat(bufs);
22029
22029
  for (var j = 0; j < count; ++j)
22030
- D = crypto2.createHash("md5").update(D).digest();
22030
+ D = crypto3.createHash("md5").update(D).digest();
22031
22031
  material = Buffer2.concat([material, D]);
22032
22032
  D_prev = D;
22033
22033
  }
@@ -22049,13 +22049,13 @@ var require_utils3 = __commonJS({
22049
22049
  return Buffer2.concat(ts).slice(0, size);
22050
22050
  function T(I) {
22051
22051
  hkey.writeUInt32BE(I, hkey.length - 4);
22052
- var hmac = crypto2.createHmac(hashAlg, passphrase);
22052
+ var hmac = crypto3.createHmac(hashAlg, passphrase);
22053
22053
  hmac.update(hkey);
22054
22054
  var Ti = hmac.digest();
22055
22055
  var Uc = Ti;
22056
22056
  var c = 1;
22057
22057
  while (c++ < iterations) {
22058
- hmac = crypto2.createHmac(hashAlg, passphrase);
22058
+ hmac = crypto3.createHmac(hashAlg, passphrase);
22059
22059
  hmac.update(Uc);
22060
22060
  Uc = hmac.digest();
22061
22061
  for (var x = 0; x < Ti.length; ++x)
@@ -22426,7 +22426,7 @@ var require_signature = __commonJS({
22426
22426
  var assert = require_assert();
22427
22427
  var Buffer2 = require_safer().Buffer;
22428
22428
  var algs = require_algs();
22429
- var crypto2 = require("crypto");
22429
+ var crypto3 = require("crypto");
22430
22430
  var errs = require_errors();
22431
22431
  var utils = require_utils3();
22432
22432
  var asn1 = require_lib4();
@@ -22806,7 +22806,7 @@ var require_sec = __commonJS({
22806
22806
  var require_ecc_jsbn = __commonJS({
22807
22807
  "../../node_modules/ecc-jsbn/index.js"(exports) {
22808
22808
  "use strict";
22809
- var crypto2 = require("crypto");
22809
+ var crypto3 = require("crypto");
22810
22810
  var BigInteger = require_jsbn().BigInteger;
22811
22811
  var ECPointFp = require_ec().ECPointFp;
22812
22812
  var Buffer2 = require_safer().Buffer;
@@ -22830,7 +22830,7 @@ var require_ecc_jsbn = __commonJS({
22830
22830
  }
22831
22831
  } else {
22832
22832
  var n1 = n.subtract(BigInteger.ONE);
22833
- var r = new BigInteger(crypto2.randomBytes(n.bitLength()));
22833
+ var r = new BigInteger(crypto3.randomBytes(n.bitLength()));
22834
22834
  priv = r.mod(n1).add(BigInteger.ONE);
22835
22835
  this.P = c.getG().multiply(priv);
22836
22836
  }
@@ -22860,14 +22860,14 @@ var require_dhe = __commonJS({
22860
22860
  generateED25519
22861
22861
  };
22862
22862
  var assert = require_assert();
22863
- var crypto2 = require("crypto");
22863
+ var crypto3 = require("crypto");
22864
22864
  var Buffer2 = require_safer().Buffer;
22865
22865
  var algs = require_algs();
22866
22866
  var utils = require_utils3();
22867
22867
  var nacl = require_nacl_fast();
22868
22868
  var Key = require_key();
22869
22869
  var PrivateKey = require_private_key();
22870
- var CRYPTO_HAVE_ECDH = crypto2.createECDH !== void 0;
22870
+ var CRYPTO_HAVE_ECDH = crypto3.createECDH !== void 0;
22871
22871
  var ecdh = require_ecc_jsbn();
22872
22872
  var ec = require_ec();
22873
22873
  var jsbn = require_jsbn().BigInteger;
@@ -22881,7 +22881,7 @@ var require_dhe = __commonJS({
22881
22881
  if (!CRYPTO_HAVE_ECDH) {
22882
22882
  throw new Error("Due to bugs in the node 0.10 crypto API, node 0.12.x or later is required to use DH");
22883
22883
  }
22884
- this._dh = crypto2.createDiffieHellman(
22884
+ this._dh = crypto3.createDiffieHellman(
22885
22885
  key.part.p.data,
22886
22886
  void 0,
22887
22887
  key.part.g.data,
@@ -22908,7 +22908,7 @@ var require_dhe = __commonJS({
22908
22908
  "nistp384": "secp384r1",
22909
22909
  "nistp521": "secp521r1"
22910
22910
  }[key.curve];
22911
- this._dh = crypto2.createECDH(curve);
22911
+ this._dh = crypto3.createECDH(curve);
22912
22912
  if (typeof this._dh !== "object" || typeof this._dh.setPrivateKey !== "function") {
22913
22913
  CRYPTO_HAVE_ECDH = false;
22914
22914
  DiffieHellman.call(this, key);
@@ -23060,7 +23060,7 @@ var require_dhe = __commonJS({
23060
23060
  return this._key;
23061
23061
  } else {
23062
23062
  var n = this._ecParams.getN();
23063
- var r = new jsbn(crypto2.randomBytes(n.bitLength()));
23063
+ var r = new jsbn(crypto3.randomBytes(n.bitLength()));
23064
23064
  var n1 = n.subtract(jsbn.ONE);
23065
23065
  priv = r.mod(n1).add(jsbn.ONE);
23066
23066
  pub = this._ecParams.getG().multiply(priv);
@@ -23166,7 +23166,7 @@ var require_dhe = __commonJS({
23166
23166
  "nistp384": "secp384r1",
23167
23167
  "nistp521": "secp521r1"
23168
23168
  }[curve];
23169
- var dh = crypto2.createECDH(osCurve);
23169
+ var dh = crypto3.createECDH(osCurve);
23170
23170
  dh.generateKeys();
23171
23171
  parts.push({
23172
23172
  name: "curve",
@@ -23184,7 +23184,7 @@ var require_dhe = __commonJS({
23184
23184
  var ecParams = new X9ECParameters(curve);
23185
23185
  var n = ecParams.getN();
23186
23186
  var cByteLen = Math.ceil((n.bitLength() + 64) / 8);
23187
- var c = new jsbn(crypto2.randomBytes(cByteLen));
23187
+ var c = new jsbn(crypto3.randomBytes(cByteLen));
23188
23188
  var n1 = n.subtract(jsbn.ONE);
23189
23189
  var priv = c.mod(n1).add(jsbn.ONE);
23190
23190
  var pub = ecParams.getG().multiply(priv);
@@ -25521,7 +25521,7 @@ var require_ssh_private = __commonJS({
25521
25521
  var Buffer2 = require_safer().Buffer;
25522
25522
  var algs = require_algs();
25523
25523
  var utils = require_utils3();
25524
- var crypto2 = require("crypto");
25524
+ var crypto3 = require("crypto");
25525
25525
  var Key = require_key();
25526
25526
  var PrivateKey = require_private_key();
25527
25527
  var pem = require_pem();
@@ -25595,7 +25595,7 @@ var require_ssh_private = __commonJS({
25595
25595
  out = Buffer2.from(out);
25596
25596
  var ckey = out.slice(0, cinf.keySize);
25597
25597
  var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize);
25598
- var cipherStream = crypto2.createDecipheriv(
25598
+ var cipherStream = crypto3.createDecipheriv(
25599
25599
  cinf.opensslName,
25600
25600
  ckey,
25601
25601
  iv
@@ -25660,7 +25660,7 @@ var require_ssh_private = __commonJS({
25660
25660
  var privBuf;
25661
25661
  if (PrivateKey.isPrivateKey(key)) {
25662
25662
  privBuf = new SSHBuffer({});
25663
- var checkInt = crypto2.randomBytes(4).readUInt32BE(0);
25663
+ var checkInt = crypto3.randomBytes(4).readUInt32BE(0);
25664
25664
  privBuf.writeInt(checkInt);
25665
25665
  privBuf.writeInt(checkInt);
25666
25666
  privBuf.write(key.toBuffer("rfc4253"));
@@ -25674,7 +25674,7 @@ var require_ssh_private = __commonJS({
25674
25674
  case "none":
25675
25675
  break;
25676
25676
  case "bcrypt":
25677
- var salt = crypto2.randomBytes(16);
25677
+ var salt = crypto3.randomBytes(16);
25678
25678
  var rounds = 16;
25679
25679
  var kdfssh = new SSHBuffer({});
25680
25680
  kdfssh.writeBuffer(salt);
@@ -25701,7 +25701,7 @@ var require_ssh_private = __commonJS({
25701
25701
  out = Buffer2.from(out);
25702
25702
  var ckey = out.slice(0, cinf.keySize);
25703
25703
  var iv = out.slice(cinf.keySize, cinf.keySize + cinf.blockSize);
25704
- var cipherStream = crypto2.createCipheriv(
25704
+ var cipherStream = crypto3.createCipheriv(
25705
25705
  cinf.opensslName,
25706
25706
  ckey,
25707
25707
  iv
@@ -25764,7 +25764,7 @@ var require_pem = __commonJS({
25764
25764
  };
25765
25765
  var assert = require_assert();
25766
25766
  var asn1 = require_lib4();
25767
- var crypto2 = require("crypto");
25767
+ var crypto3 = require("crypto");
25768
25768
  var Buffer2 = require_safer().Buffer;
25769
25769
  var algs = require_algs();
25770
25770
  var utils = require_utils3();
@@ -25932,7 +25932,7 @@ var require_pem = __commonJS({
25932
25932
  alg = void 0;
25933
25933
  }
25934
25934
  if (cipher && key && iv) {
25935
- var cipherStream = crypto2.createDecipheriv(cipher, key, iv);
25935
+ var cipherStream = crypto3.createDecipheriv(cipher, key, iv);
25936
25936
  var chunk, chunks = [];
25937
25937
  cipherStream.once("error", function(e) {
25938
25938
  if (e.toString().indexOf("bad decrypt") !== -1) {
@@ -26360,7 +26360,7 @@ var require_putty = __commonJS({
26360
26360
  var rfc4253 = require_rfc4253();
26361
26361
  var Key = require_key();
26362
26362
  var SSHBuffer = require_ssh_buffer();
26363
- var crypto2 = require("crypto");
26363
+ var crypto3 = require("crypto");
26364
26364
  var PrivateKey = require_private_key();
26365
26365
  var errors = require_errors();
26366
26366
  function read(buf, options2) {
@@ -26430,7 +26430,7 @@ var require_putty = __commonJS({
26430
26430
  );
26431
26431
  }
26432
26432
  var iv = Buffer2.alloc(16, 0);
26433
- var decipher = crypto2.createDecipheriv(
26433
+ var decipher = crypto3.createDecipheriv(
26434
26434
  "aes-256-cbc",
26435
26435
  derivePPK2EncryptionKey(options2.passphrase),
26436
26436
  iv
@@ -26481,11 +26481,11 @@ var require_putty = __commonJS({
26481
26481
  return key;
26482
26482
  }
26483
26483
  function derivePPK2EncryptionKey(passphrase) {
26484
- var hash1 = crypto2.createHash("sha1").update(Buffer2.concat([
26484
+ var hash1 = crypto3.createHash("sha1").update(Buffer2.concat([
26485
26485
  Buffer2.from([0, 0, 0, 0]),
26486
26486
  Buffer2.from(passphrase)
26487
26487
  ])).digest();
26488
- var hash2 = crypto2.createHash("sha1").update(Buffer2.concat([
26488
+ var hash2 = crypto3.createHash("sha1").update(Buffer2.concat([
26489
26489
  Buffer2.from([0, 0, 0, 1]),
26490
26490
  Buffer2.from(passphrase)
26491
26491
  ])).digest();
@@ -26641,7 +26641,7 @@ var require_private_key = __commonJS({
26641
26641
  var assert = require_assert();
26642
26642
  var Buffer2 = require_safer().Buffer;
26643
26643
  var algs = require_algs();
26644
- var crypto2 = require("crypto");
26644
+ var crypto3 = require("crypto");
26645
26645
  var Fingerprint = require_fingerprint();
26646
26646
  var Signature = require_signature();
26647
26647
  var errs = require_errors();
@@ -26752,14 +26752,14 @@ var require_private_key = __commonJS({
26752
26752
  var v, nm, err;
26753
26753
  try {
26754
26754
  nm = hashAlgo.toUpperCase();
26755
- v = crypto2.createSign(nm);
26755
+ v = crypto3.createSign(nm);
26756
26756
  } catch (e) {
26757
26757
  err = e;
26758
26758
  }
26759
26759
  if (v === void 0 || err instanceof Error && err.message.match(/Unknown message digest/)) {
26760
26760
  nm = "RSA-";
26761
26761
  nm += hashAlgo.toUpperCase();
26762
- v = crypto2.createSign(nm);
26762
+ v = crypto3.createSign(nm);
26763
26763
  }
26764
26764
  assert.ok(v, "failed to create verifier");
26765
26765
  var oldSign = v.sign.bind(v);
@@ -26845,7 +26845,7 @@ var require_identity = __commonJS({
26845
26845
  module2.exports = Identity6;
26846
26846
  var assert = require_assert();
26847
26847
  var algs = require_algs();
26848
- var crypto2 = require("crypto");
26848
+ var crypto3 = require("crypto");
26849
26849
  var Fingerprint = require_fingerprint();
26850
26850
  var Signature = require_signature();
26851
26851
  var errs = require_errors();
@@ -27163,7 +27163,7 @@ var require_openssh_cert = __commonJS({
27163
27163
  };
27164
27164
  var assert = require_assert();
27165
27165
  var SSHBuffer = require_ssh_buffer();
27166
- var crypto2 = require("crypto");
27166
+ var crypto3 = require("crypto");
27167
27167
  var Buffer2 = require_safer().Buffer;
27168
27168
  var algs = require_algs();
27169
27169
  var Key = require_key();
@@ -27352,7 +27352,7 @@ var require_openssh_cert = __commonJS({
27352
27352
  assert.object(cert.signatures.openssh, "signature for openssh format");
27353
27353
  var sig = cert.signatures.openssh;
27354
27354
  if (sig.nonce === void 0)
27355
- sig.nonce = crypto2.randomBytes(16);
27355
+ sig.nonce = crypto3.randomBytes(16);
27356
27356
  var buf = new SSHBuffer({});
27357
27357
  buf.writeString(getCertType(cert.subjectKey));
27358
27358
  buf.writeBuffer(sig.nonce);
@@ -28158,7 +28158,7 @@ var require_certificate = __commonJS({
28158
28158
  var assert = require_assert();
28159
28159
  var Buffer2 = require_safer().Buffer;
28160
28160
  var algs = require_algs();
28161
- var crypto2 = require("crypto");
28161
+ var crypto3 = require("crypto");
28162
28162
  var Fingerprint = require_fingerprint();
28163
28163
  var Signature = require_signature();
28164
28164
  var errs = require_errors();
@@ -28245,7 +28245,7 @@ var require_certificate = __commonJS({
28245
28245
  throw new InvalidAlgorithmError(algo);
28246
28246
  if (this._hashCache[algo])
28247
28247
  return this._hashCache[algo];
28248
- var hash2 = crypto2.createHash(algo).update(this.toBuffer("x509")).digest();
28248
+ var hash2 = crypto3.createHash(algo).update(this.toBuffer("x509")).digest();
28249
28249
  this._hashCache[algo] = hash2;
28250
28250
  return hash2;
28251
28251
  };
@@ -28516,7 +28516,7 @@ var require_fingerprint = __commonJS({
28516
28516
  var assert = require_assert();
28517
28517
  var Buffer2 = require_safer().Buffer;
28518
28518
  var algs = require_algs();
28519
- var crypto2 = require("crypto");
28519
+ var crypto3 = require("crypto");
28520
28520
  var errs = require_errors();
28521
28521
  var Key = require_key();
28522
28522
  var PrivateKey = require_private_key();
@@ -28583,9 +28583,9 @@ var require_fingerprint = __commonJS({
28583
28583
  );
28584
28584
  }
28585
28585
  var theirHash = other.hash(this.algorithm, this.hashType);
28586
- var theirHash2 = crypto2.createHash(this.algorithm).update(theirHash).digest("base64");
28586
+ var theirHash2 = crypto3.createHash(this.algorithm).update(theirHash).digest("base64");
28587
28587
  if (this.hash2 === void 0)
28588
- this.hash2 = crypto2.createHash(this.algorithm).update(this.hash).digest("base64");
28588
+ this.hash2 = crypto3.createHash(this.algorithm).update(this.hash).digest("base64");
28589
28589
  return this.hash2 === theirHash2;
28590
28590
  };
28591
28591
  var base64RE = /^[A-Za-z0-9+\/=]+$/;
@@ -28711,7 +28711,7 @@ var require_key = __commonJS({
28711
28711
  module2.exports = Key;
28712
28712
  var assert = require_assert();
28713
28713
  var algs = require_algs();
28714
- var crypto2 = require("crypto");
28714
+ var crypto3 = require("crypto");
28715
28715
  var Fingerprint = require_fingerprint();
28716
28716
  var Signature = require_signature();
28717
28717
  var DiffieHellman = require_dhe().DiffieHellman;
@@ -28809,7 +28809,7 @@ var require_key = __commonJS({
28809
28809
  } else {
28810
28810
  throw new Error("Hash type " + type + " not supported");
28811
28811
  }
28812
- var hash2 = crypto2.createHash(algo).update(buf).digest();
28812
+ var hash2 = crypto3.createHash(algo).update(buf).digest();
28813
28813
  this._hashCache[cacheKey] = hash2;
28814
28814
  return hash2;
28815
28815
  };
@@ -28857,14 +28857,14 @@ var require_key = __commonJS({
28857
28857
  var v, nm, err;
28858
28858
  try {
28859
28859
  nm = hashAlgo.toUpperCase();
28860
- v = crypto2.createVerify(nm);
28860
+ v = crypto3.createVerify(nm);
28861
28861
  } catch (e) {
28862
28862
  err = e;
28863
28863
  }
28864
28864
  if (v === void 0 || err instanceof Error && err.message.match(/Unknown message digest/)) {
28865
28865
  nm = "RSA-";
28866
28866
  nm += hashAlgo.toUpperCase();
28867
- v = crypto2.createVerify(nm);
28867
+ v = crypto3.createVerify(nm);
28868
28868
  }
28869
28869
  assert.ok(v, "failed to create verifier");
28870
28870
  var oldVerify = v.verify.bind(v);
@@ -30669,7 +30669,7 @@ var require_signer = __commonJS({
30669
30669
  "../../node_modules/http-signature/lib/signer.js"(exports, module2) {
30670
30670
  "use strict";
30671
30671
  var assert = require_assert();
30672
- var crypto2 = require("crypto");
30672
+ var crypto3 = require("crypto");
30673
30673
  var http = require("http");
30674
30674
  var util = require("util");
30675
30675
  var sshpk = require_lib5();
@@ -30706,7 +30706,7 @@ var require_signer = __commonJS({
30706
30706
  this.rs_keyId = options2.keyId;
30707
30707
  if (typeof options2.key !== "string" && !Buffer.isBuffer(options2.key))
30708
30708
  throw new TypeError("options.key for HMAC must be a string or Buffer");
30709
- this.rs_signer = crypto2.createHmac(alg[1].toUpperCase(), options2.key);
30709
+ this.rs_signer = crypto3.createHmac(alg[1].toUpperCase(), options2.key);
30710
30710
  this.rs_signer.sign = function() {
30711
30711
  var digest = this.digest("base64");
30712
30712
  return {
@@ -30924,7 +30924,7 @@ var require_signer = __commonJS({
30924
30924
  if (alg[0] === "hmac") {
30925
30925
  if (typeof options2.key !== "string" && !Buffer.isBuffer(options2.key))
30926
30926
  throw new TypeError("options.key must be a string or Buffer");
30927
- var hmac = crypto2.createHmac(alg[1].toUpperCase(), options2.key);
30927
+ var hmac = crypto3.createHmac(alg[1].toUpperCase(), options2.key);
30928
30928
  hmac.update(stringToSign);
30929
30929
  signature = hmac.digest("base64");
30930
30930
  } else {
@@ -30970,7 +30970,7 @@ var require_verify = __commonJS({
30970
30970
  "../../node_modules/http-signature/lib/verify.js"(exports, module2) {
30971
30971
  "use strict";
30972
30972
  var assert = require_assert();
30973
- var crypto2 = require("crypto");
30973
+ var crypto3 = require("crypto");
30974
30974
  var sshpk = require_lib5();
30975
30975
  var utils = require_utils4();
30976
30976
  var HASH_ALGOS = utils.HASH_ALGOS;
@@ -31018,12 +31018,12 @@ var require_verify = __commonJS({
31018
31018
  if (alg[0] !== "hmac")
31019
31019
  return false;
31020
31020
  var hashAlg = alg[1].toUpperCase();
31021
- var hmac = crypto2.createHmac(hashAlg, secret);
31021
+ var hmac = crypto3.createHmac(hashAlg, secret);
31022
31022
  hmac.update(parsedSignature.signingString);
31023
- var h1 = crypto2.createHmac(hashAlg, secret);
31023
+ var h1 = crypto3.createHmac(hashAlg, secret);
31024
31024
  h1.update(hmac.digest());
31025
31025
  h1 = h1.digest();
31026
- var h2 = crypto2.createHmac(hashAlg, secret);
31026
+ var h2 = crypto3.createHmac(hashAlg, secret);
31027
31027
  h2.update(new Buffer(parsedSignature.params.signature, "base64"));
31028
31028
  h2 = h2.digest();
31029
31029
  if (typeof h1 === "string")
@@ -48976,12 +48976,12 @@ var require_auth = __commonJS({
48976
48976
  var require_oauth_sign = __commonJS({
48977
48977
  "../../node_modules/oauth-sign/index.js"(exports) {
48978
48978
  "use strict";
48979
- var crypto2 = require("crypto");
48979
+ var crypto3 = require("crypto");
48980
48980
  function sha(key, body2, algorithm) {
48981
- return crypto2.createHmac(algorithm, key).update(body2).digest("base64");
48981
+ return crypto3.createHmac(algorithm, key).update(body2).digest("base64");
48982
48982
  }
48983
48983
  function rsa(key, body2) {
48984
- return crypto2.createSign("RSA-SHA1").update(body2).sign(key, "base64");
48984
+ return crypto3.createSign("RSA-SHA1").update(body2).sign(key, "base64");
48985
48985
  }
48986
48986
  function rfc3986(str) {
48987
48987
  return encodeURIComponent(str).replace(/!/g, "%21").replace(/\*/g, "%2A").replace(/\(/g, "%28").replace(/\)/g, "%29").replace(/'/g, "%27");
@@ -49088,7 +49088,7 @@ var require_oauth4 = __commonJS({
49088
49088
  var caseless = require_caseless();
49089
49089
  var uuid2 = require("uuid/v4");
49090
49090
  var oauth = require_oauth_sign();
49091
- var crypto2 = require("crypto");
49091
+ var crypto3 = require("crypto");
49092
49092
  var Buffer2 = require_safe_buffer().Buffer;
49093
49093
  function OAuth(request) {
49094
49094
  this.request = request;
@@ -49140,7 +49140,7 @@ var require_oauth4 = __commonJS({
49140
49140
  if (["HMAC-SHA1", "RSA-SHA1"].indexOf(_oauth.signature_method || "HMAC-SHA1") < 0) {
49141
49141
  this.request.emit("error", new Error("oauth: " + _oauth.signature_method + " signature_method not supported with body_hash signing."));
49142
49142
  }
49143
- var shasum = crypto2.createHash("sha1");
49143
+ var shasum = crypto3.createHash("sha1");
49144
49144
  shasum.update(body2 || "");
49145
49145
  var sha1 = shasum.digest("hex");
49146
49146
  return Buffer2.from(sha1, "hex").toString("base64");
@@ -49209,15 +49209,15 @@ var require_oauth4 = __commonJS({
49209
49209
  var require_hawk = __commonJS({
49210
49210
  "../../node_modules/request/lib/hawk.js"(exports) {
49211
49211
  "use strict";
49212
- var crypto2 = require("crypto");
49212
+ var crypto3 = require("crypto");
49213
49213
  function randomString(size) {
49214
49214
  var bits = (size + 1) * 6;
49215
- var buffer = crypto2.randomBytes(Math.ceil(bits / 8));
49215
+ var buffer = crypto3.randomBytes(Math.ceil(bits / 8));
49216
49216
  var string = buffer.toString("base64").replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g, "");
49217
49217
  return string.slice(0, size);
49218
49218
  }
49219
49219
  function calculatePayloadHash(payload, algorithm, contentType) {
49220
- var hash2 = crypto2.createHash(algorithm);
49220
+ var hash2 = crypto3.createHash(algorithm);
49221
49221
  hash2.update("hawk.1.payload\n");
49222
49222
  hash2.update((contentType ? contentType.split(";")[0].trim().toLowerCase() : "") + "\n");
49223
49223
  hash2.update(payload || "");
@@ -49233,7 +49233,7 @@ var require_hawk = __commonJS({
49233
49233
  if (opts.app) {
49234
49234
  normalized = normalized + opts.app + "\n" + (opts.dlg || "") + "\n";
49235
49235
  }
49236
- var hmac = crypto2.createHmac(credentials.algorithm, credentials.key).update(normalized);
49236
+ var hmac = crypto3.createHmac(credentials.algorithm, credentials.key).update(normalized);
49237
49237
  var digest = hmac.digest("base64");
49238
49238
  return digest;
49239
49239
  };
@@ -53654,7 +53654,7 @@ var require_strategy2 = __commonJS({
53654
53654
  var OAuth2 = require_oauth3().OAuth2;
53655
53655
  var SessionStateStore = require_session();
53656
53656
  var InternalOAuthError = require_internaloautherror();
53657
- var crypto2 = require("crypto");
53657
+ var crypto3 = require("crypto");
53658
53658
  var base64url = require_base64url2();
53659
53659
  var AuthorizationError = require_authorizationerror();
53660
53660
  function Strategy(options2, verify) {
@@ -54043,11 +54043,11 @@ var require_strategy2 = __commonJS({
54043
54043
  delete meta[param];
54044
54044
  }
54045
54045
  if (config.pkce) {
54046
- var verifier = base64url(crypto2.pseudoRandomBytes(32));
54046
+ var verifier = base64url(crypto3.pseudoRandomBytes(32));
54047
54047
  switch (config.pkce) {
54048
54048
  case "S256":
54049
54049
  params2.code_challenge = base64url(
54050
- crypto2.createHash("sha256").update(verifier).digest()
54050
+ crypto3.createHash("sha256").update(verifier).digest()
54051
54051
  );
54052
54052
  break;
54053
54053
  case "plain":
@@ -54598,6 +54598,7 @@ var AutomationActionStepId = /* @__PURE__ */ ((AutomationActionStepId2) => {
54598
54598
  AutomationActionStepId2["COLLECT"] = "COLLECT";
54599
54599
  AutomationActionStepId2["OPENAI"] = "OPENAI";
54600
54600
  AutomationActionStepId2["TRIGGER_AUTOMATION_RUN"] = "TRIGGER_AUTOMATION_RUN";
54601
+ AutomationActionStepId2["BRANCH"] = "BRANCH";
54601
54602
  AutomationActionStepId2["discord"] = "discord";
54602
54603
  AutomationActionStepId2["slack"] = "slack";
54603
54604
  AutomationActionStepId2["zapier"] = "zapier";
@@ -56040,6 +56041,7 @@ __export(context_exports, {
56040
56041
  getCurrentContext: () => getCurrentContext,
56041
56042
  getDevAppDB: () => getDevAppDB,
56042
56043
  getEnvironmentVariables: () => getEnvironmentVariables,
56044
+ getFeatureFlags: () => getFeatureFlags,
56043
56045
  getGlobalDB: () => getGlobalDB,
56044
56046
  getGlobalDBName: () => getGlobalDBName,
56045
56047
  getIdentity: () => getIdentity,
@@ -56053,7 +56055,8 @@ __export(context_exports, {
56053
56055
  isMultiTenant: () => isMultiTenant,
56054
56056
  isScim: () => isScim,
56055
56057
  isTenancyEnabled: () => isTenancyEnabled,
56056
- isTenantIdSet: () => isTenantIdSet
56058
+ isTenantIdSet: () => isTenantIdSet,
56059
+ setFeatureFlags: () => setFeatureFlags
56057
56060
  });
56058
56061
 
56059
56062
  // src/context/identity.ts
@@ -60351,6 +60354,21 @@ function getCurrentContext() {
60351
60354
  return void 0;
60352
60355
  }
60353
60356
  }
60357
+ function getFeatureFlags(key) {
60358
+ const context = getCurrentContext();
60359
+ if (!context) {
60360
+ return void 0;
60361
+ }
60362
+ return context.featureFlagCache?.[key];
60363
+ }
60364
+ function setFeatureFlags(key, value) {
60365
+ const context = getCurrentContext();
60366
+ if (!context) {
60367
+ return;
60368
+ }
60369
+ context.featureFlagCache ??= {};
60370
+ context.featureFlagCache[key] = value;
60371
+ }
60354
60372
 
60355
60373
  // src/cache/base/index.ts
60356
60374
  function generateTenantKey(key) {
@@ -66028,7 +66046,8 @@ __export(features_exports, {
66028
66046
  Flag: () => Flag,
66029
66047
  FlagSet: () => FlagSet,
66030
66048
  flags: () => flags,
66031
- init: () => init8
66049
+ init: () => init8,
66050
+ shutdown: () => shutdown5
66032
66051
  });
66033
66052
  var import_posthog_node2 = require("posthog-node");
66034
66053
  var import_dd_trace3 = __toESM(require("dd-trace"));
@@ -66045,6 +66064,9 @@ function init8(opts) {
66045
66064
  console.log("posthog disabled");
66046
66065
  }
66047
66066
  }
66067
+ function shutdown5() {
66068
+ posthog?.shutdown();
66069
+ }
66048
66070
  var Flag = class {
66049
66071
  constructor(defaultValue) {
66050
66072
  this.defaultValue = defaultValue;
@@ -66095,6 +66117,7 @@ var NumberFlag = class extends Flag {
66095
66117
  var FlagSet = class {
66096
66118
  constructor(flagSchema) {
66097
66119
  this.flagSchema = flagSchema;
66120
+ this.setId = crypto.randomUUID();
66098
66121
  }
66099
66122
  defaults() {
66100
66123
  return Object.keys(this.flagSchema).reduce((acc, key) => {
@@ -66116,6 +66139,11 @@ var FlagSet = class {
66116
66139
  }
66117
66140
  async fetch(ctx) {
66118
66141
  return await import_dd_trace3.default.trace("features.fetch", async (span) => {
66142
+ const cachedFlags = getFeatureFlags(this.setId);
66143
+ if (cachedFlags) {
66144
+ span?.addTags({ fromCache: true });
66145
+ return cachedFlags;
66146
+ }
66119
66147
  const tags = {};
66120
66148
  const flagValues = this.defaults();
66121
66149
  const currentTenantId = getTenantId();
@@ -66134,7 +66162,7 @@ var FlagSet = class {
66134
66162
  specificallySetFalse.add(feature);
66135
66163
  }
66136
66164
  if (!this.isFlagName(feature)) {
66137
- throw new Error(`Feature: ${feature} is not an allowed option`);
66165
+ continue;
66138
66166
  }
66139
66167
  if (typeof flagValues[feature] !== "boolean") {
66140
66168
  throw new Error(`Feature: ${feature} is not a boolean`);
@@ -66161,8 +66189,7 @@ var FlagSet = class {
66161
66189
  tags[`identity.type`] = identity?.type;
66162
66190
  tags[`identity.tenantId`] = identity?.tenantId;
66163
66191
  tags[`identity._id`] = identity?._id;
66164
- const usePosthog = environment_default.isTest() || environment_default.isQA();
66165
- if (usePosthog && posthog && identity?.type === "user" /* USER */) {
66192
+ if (posthog && identity?.type === "user" /* USER */) {
66166
66193
  tags[`readFromPostHog`] = true;
66167
66194
  const personProperties = {};
66168
66195
  if (identity.tenantId) {
@@ -66174,7 +66201,6 @@ var FlagSet = class {
66174
66201
  personProperties
66175
66202
  }
66176
66203
  );
66177
- console.log("posthog flags", JSON.stringify(posthogFlags));
66178
66204
  for (const [name, value] of Object.entries(posthogFlags.featureFlags)) {
66179
66205
  if (!this.isFlagName(name)) {
66180
66206
  console.warn(`Unexpected posthog flag "${name}": ${value}`);
@@ -66193,6 +66219,7 @@ var FlagSet = class {
66193
66219
  }
66194
66220
  }
66195
66221
  }
66222
+ setFeatureFlags(this.setId, flagValues);
66196
66223
  for (const [key, value] of Object.entries(flagValues)) {
66197
66224
  tags[`flags.${key}.value`] = value;
66198
66225
  }
@@ -66202,10 +66229,7 @@ var FlagSet = class {
66202
66229
  }
66203
66230
  };
66204
66231
  var flags = new FlagSet({
66205
- LICENSING: Flag.boolean(false),
66206
- GOOGLE_SHEETS: Flag.boolean(false),
66207
- USER_GROUPS: Flag.boolean(false),
66208
- ONBOARDING_TOUR: Flag.boolean(false)
66232
+ DEFAULT_VALUES: Flag.boolean(false)
66209
66233
  });
66210
66234
 
66211
66235
  // src/auth/index.ts