@marqeta/ux-toolkit-sdk-javascript 2.23.0 → 2.24.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-KNE4HWXK.mjs → chunk-MUQPF73W.mjs} +4730 -4334
- package/dist/{chunk-CWQR7YQW.js → chunk-PFNJKZXO.js} +4844 -4444
- package/dist/index.d.mts +149 -108
- package/dist/index.d.ts +149 -108
- package/dist/index.js +497 -493
- package/dist/index.mjs +2 -2
- package/dist/react-native.d.mts +17 -3
- package/dist/react-native.d.ts +17 -3
- package/dist/react-native.js +2392 -700
- package/dist/react-native.mjs +1766 -181
- package/package.json +2 -1
package/dist/react-native.mjs
CHANGED
|
@@ -49,6 +49,23 @@ function _class_call_check(instance, Constructor) {
|
|
|
49
49
|
throw new TypeError("Cannot call a class as a function");
|
|
50
50
|
}
|
|
51
51
|
}
|
|
52
|
+
function _construct(Parent, args, Class) {
|
|
53
|
+
if (_is_native_reflect_construct()) {
|
|
54
|
+
_construct = Reflect.construct;
|
|
55
|
+
} else {
|
|
56
|
+
_construct = function construct(Parent, args, Class) {
|
|
57
|
+
var a = [
|
|
58
|
+
null
|
|
59
|
+
];
|
|
60
|
+
a.push.apply(a, args);
|
|
61
|
+
var Constructor = Function.bind.apply(Parent, a);
|
|
62
|
+
var instance = new Constructor();
|
|
63
|
+
if (Class) _set_prototype_of(instance, Class.prototype);
|
|
64
|
+
return instance;
|
|
65
|
+
};
|
|
66
|
+
}
|
|
67
|
+
return _construct.apply(null, arguments);
|
|
68
|
+
}
|
|
52
69
|
function _defineProperties(target, props) {
|
|
53
70
|
for(var i = 0; i < props.length; i++){
|
|
54
71
|
var descriptor = props[i];
|
|
@@ -102,6 +119,9 @@ function _instanceof(left, right) {
|
|
|
102
119
|
return left instanceof right;
|
|
103
120
|
}
|
|
104
121
|
}
|
|
122
|
+
function _is_native_function(fn) {
|
|
123
|
+
return Function.toString.call(fn).indexOf("[native code]") !== -1;
|
|
124
|
+
}
|
|
105
125
|
function _iterable_to_array(iter) {
|
|
106
126
|
if (typeof Symbol !== "undefined" && iter[Symbol.iterator] != null || iter["@@iterator"] != null) return Array.from(iter);
|
|
107
127
|
}
|
|
@@ -205,6 +225,32 @@ function _unsupported_iterable_to_array(o, minLen) {
|
|
|
205
225
|
if (n === "Map" || n === "Set") return Array.from(n);
|
|
206
226
|
if (n === "Arguments" || /^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(n)) return _array_like_to_array(o, minLen);
|
|
207
227
|
}
|
|
228
|
+
function _wrap_native_super(Class) {
|
|
229
|
+
var _cache = typeof Map === "function" ? new Map() : undefined;
|
|
230
|
+
_wrap_native_super = function wrapNativeSuper(Class) {
|
|
231
|
+
if (Class === null || !_is_native_function(Class)) return Class;
|
|
232
|
+
if (typeof Class !== "function") {
|
|
233
|
+
throw new TypeError("Super expression must either be null or a function");
|
|
234
|
+
}
|
|
235
|
+
if (typeof _cache !== "undefined") {
|
|
236
|
+
if (_cache.has(Class)) return _cache.get(Class);
|
|
237
|
+
_cache.set(Class, Wrapper);
|
|
238
|
+
}
|
|
239
|
+
function Wrapper() {
|
|
240
|
+
return _construct(Class, arguments, _get_prototype_of(this).constructor);
|
|
241
|
+
}
|
|
242
|
+
Wrapper.prototype = Object.create(Class.prototype, {
|
|
243
|
+
constructor: {
|
|
244
|
+
value: Wrapper,
|
|
245
|
+
enumerable: false,
|
|
246
|
+
writable: true,
|
|
247
|
+
configurable: true
|
|
248
|
+
}
|
|
249
|
+
});
|
|
250
|
+
return _set_prototype_of(Wrapper, Class);
|
|
251
|
+
};
|
|
252
|
+
return _wrap_native_super(Class);
|
|
253
|
+
}
|
|
208
254
|
function _is_native_reflect_construct() {
|
|
209
255
|
if (typeof Reflect === "undefined" || !Reflect.construct) return false;
|
|
210
256
|
if (Reflect.construct.sham) return false;
|
|
@@ -324,7 +370,7 @@ function _ts_generator(thisArg, body) {
|
|
|
324
370
|
};
|
|
325
371
|
}
|
|
326
372
|
}
|
|
327
|
-
import { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseHttpClient, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_FEATURE_FLAG_SERVICE, ITF_HTTP_CLIENT, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemRegistryService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MOCK_USER, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, __name, __publicField, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, checkHttpStandizedError, commonIOCModule, componentsIOCModule, container, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iHttpClient, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadBaseContainerModules, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports, qa_exports, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice } from "./chunk-KNE4HWXK.mjs";
|
|
373
|
+
import { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BaseHttpClient, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_FEATURE_FLAG_SERVICE, ITF_HTTP_CLIENT, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemRegistryService, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MOCK_USER, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, __export, __name, __publicField, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, checkHttpStandizedError, commonIOCModule, componentsIOCModule, container, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadBaseContainerModules, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports, qa_exports, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice } from "./chunk-MUQPF73W.mjs";
|
|
328
374
|
// src/ioc/reactNativeContainer.ts
|
|
329
375
|
import { Container } from "inversify";
|
|
330
376
|
// src/feature-flags/ioc/reactNativefeatureFlagsIOCModule.ts
|
|
@@ -408,128 +454,1660 @@ var reactNativeCommonIOCModule = new ContainerModule2(function(bind) {
|
|
|
408
454
|
bind(ITF_PERSISTED_CACHE_SERVICE).to(ReactNativeAsyncStorageCacheService).inSingletonScope().whenTargetIsDefault();
|
|
409
455
|
bind(ITF_REGISTRY_SERVICE).to(InMemRegistryService).inSingletonScope();
|
|
410
456
|
});
|
|
411
|
-
// src/ioc/
|
|
412
|
-
var reactNativeContainer = new Container();
|
|
413
|
-
loadBaseContainerModules(reactNativeContainer);
|
|
414
|
-
reactNativeContainer.unload(featureFlagsIOCModule);
|
|
415
|
-
reactNativeContainer.unload(commonIOCModule);
|
|
416
|
-
reactNativeContainer.load(reactNativeFeatureFlagsIOCModule);
|
|
417
|
-
reactNativeContainer.load(reactNativeCommonIOCModule);
|
|
418
|
-
// src/ioc/wlaReactNativeContainer.ts
|
|
419
|
-
import { Container as Container2 } from "inversify";
|
|
420
|
-
// src/auth/ioc/wlaReactNativeAuthIOCModule.ts
|
|
457
|
+
// src/auth/ioc/reactNativeAuthIOCModule.ts
|
|
421
458
|
import { ContainerModule as ContainerModule3 } from "inversify";
|
|
422
|
-
// src/auth/adapters/
|
|
423
|
-
import {
|
|
424
|
-
|
|
425
|
-
|
|
426
|
-
|
|
427
|
-
|
|
428
|
-
|
|
459
|
+
// src/auth/adapters/dpop/JoseDpopAuthCredentialService.ts
|
|
460
|
+
import { injectable as injectable2 } from "inversify";
|
|
461
|
+
import { v4 as uuidv4 } from "uuid";
|
|
462
|
+
// node_modules/jose/dist/node/esm/runtime/base64url.js
|
|
463
|
+
import { Buffer as Buffer2 } from "buffer";
|
|
464
|
+
// node_modules/jose/dist/node/esm/lib/buffer_utils.js
|
|
465
|
+
var encoder = new TextEncoder();
|
|
466
|
+
var decoder = new TextDecoder();
|
|
467
|
+
var MAX_INT32 = Math.pow(2, 32);
|
|
468
|
+
function concat() {
|
|
469
|
+
for(var _len = arguments.length, buffers = new Array(_len), _key = 0; _key < _len; _key++){
|
|
470
|
+
buffers[_key] = arguments[_key];
|
|
471
|
+
}
|
|
472
|
+
var size = buffers.reduce(function(acc, param) {
|
|
473
|
+
var length = param.length;
|
|
474
|
+
return acc + length;
|
|
475
|
+
}, 0);
|
|
476
|
+
var buf = new Uint8Array(size);
|
|
477
|
+
var i = 0;
|
|
478
|
+
var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
|
|
479
|
+
try {
|
|
480
|
+
for(var _iterator = buffers[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
|
|
481
|
+
var buffer = _step.value;
|
|
482
|
+
buf.set(buffer, i);
|
|
483
|
+
i += buffer.length;
|
|
484
|
+
}
|
|
485
|
+
} catch (err) {
|
|
486
|
+
_didIteratorError = true;
|
|
487
|
+
_iteratorError = err;
|
|
488
|
+
} finally{
|
|
489
|
+
try {
|
|
490
|
+
if (!_iteratorNormalCompletion && _iterator.return != null) {
|
|
491
|
+
_iterator.return();
|
|
492
|
+
}
|
|
493
|
+
} finally{
|
|
494
|
+
if (_didIteratorError) {
|
|
495
|
+
throw _iteratorError;
|
|
496
|
+
}
|
|
497
|
+
}
|
|
498
|
+
}
|
|
499
|
+
return buf;
|
|
429
500
|
}
|
|
430
|
-
__name(
|
|
431
|
-
|
|
432
|
-
|
|
501
|
+
__name(concat, "concat");
|
|
502
|
+
// node_modules/jose/dist/node/esm/runtime/base64url.js
|
|
503
|
+
function normalize(input) {
|
|
504
|
+
var encoded = input;
|
|
505
|
+
if (_instanceof(encoded, Uint8Array)) {
|
|
506
|
+
encoded = decoder.decode(encoded);
|
|
507
|
+
}
|
|
508
|
+
return encoded;
|
|
433
509
|
}
|
|
434
|
-
__name(
|
|
435
|
-
var
|
|
510
|
+
__name(normalize, "normalize");
|
|
511
|
+
var encode = /* @__PURE__ */ __name(function(input) {
|
|
512
|
+
return Buffer2.from(input).toString("base64url");
|
|
513
|
+
}, "encode");
|
|
514
|
+
var decode = /* @__PURE__ */ __name(function(input) {
|
|
515
|
+
return new Uint8Array(Buffer2.from(normalize(input), "base64url"));
|
|
516
|
+
}, "decode");
|
|
517
|
+
// node_modules/jose/dist/node/esm/util/errors.js
|
|
518
|
+
var _JOSEError = /*#__PURE__*/ function(Error1) {
|
|
519
|
+
"use strict";
|
|
520
|
+
_inherits(_JOSEError, Error1);
|
|
521
|
+
var _super = _create_super(_JOSEError);
|
|
522
|
+
function _JOSEError(message2, options) {
|
|
523
|
+
_class_call_check(this, _JOSEError);
|
|
524
|
+
var _this;
|
|
525
|
+
var _Error_captureStackTrace, _Error;
|
|
526
|
+
_this = _super.call(this, message2, options);
|
|
527
|
+
__publicField(_assert_this_initialized(_this), "code", "ERR_JOSE_GENERIC");
|
|
528
|
+
_this.name = _this.constructor.name;
|
|
529
|
+
(_Error_captureStackTrace = (_Error = Error).captureStackTrace) === null || _Error_captureStackTrace === void 0 ? void 0 : _Error_captureStackTrace.call(_Error, _assert_this_initialized(_this), _this.constructor);
|
|
530
|
+
return _this;
|
|
531
|
+
}
|
|
532
|
+
return _JOSEError;
|
|
533
|
+
}(_wrap_native_super(Error));
|
|
534
|
+
__name(_JOSEError, "JOSEError");
|
|
535
|
+
__publicField(_JOSEError, "code", "ERR_JOSE_GENERIC");
|
|
536
|
+
var JOSEError = _JOSEError;
|
|
537
|
+
var _JOSENotSupported = /*#__PURE__*/ function(JOSEError) {
|
|
538
|
+
"use strict";
|
|
539
|
+
_inherits(_JOSENotSupported, JOSEError);
|
|
540
|
+
var _super = _create_super(_JOSENotSupported);
|
|
541
|
+
function _JOSENotSupported() {
|
|
542
|
+
_class_call_check(this, _JOSENotSupported);
|
|
543
|
+
var _this;
|
|
544
|
+
_this = _super.call.apply(_super, [
|
|
545
|
+
this
|
|
546
|
+
].concat(Array.prototype.slice.call(arguments)));
|
|
547
|
+
__publicField(_assert_this_initialized(_this), "code", "ERR_JOSE_NOT_SUPPORTED");
|
|
548
|
+
return _this;
|
|
549
|
+
}
|
|
550
|
+
return _JOSENotSupported;
|
|
551
|
+
}(JOSEError);
|
|
552
|
+
__name(_JOSENotSupported, "JOSENotSupported");
|
|
553
|
+
__publicField(_JOSENotSupported, "code", "ERR_JOSE_NOT_SUPPORTED");
|
|
554
|
+
var JOSENotSupported = _JOSENotSupported;
|
|
555
|
+
var _JWSInvalid = /*#__PURE__*/ function(JOSEError) {
|
|
556
|
+
"use strict";
|
|
557
|
+
_inherits(_JWSInvalid, JOSEError);
|
|
558
|
+
var _super = _create_super(_JWSInvalid);
|
|
559
|
+
function _JWSInvalid() {
|
|
560
|
+
_class_call_check(this, _JWSInvalid);
|
|
561
|
+
var _this;
|
|
562
|
+
_this = _super.call.apply(_super, [
|
|
563
|
+
this
|
|
564
|
+
].concat(Array.prototype.slice.call(arguments)));
|
|
565
|
+
__publicField(_assert_this_initialized(_this), "code", "ERR_JWS_INVALID");
|
|
566
|
+
return _this;
|
|
567
|
+
}
|
|
568
|
+
return _JWSInvalid;
|
|
569
|
+
}(JOSEError);
|
|
570
|
+
__name(_JWSInvalid, "JWSInvalid");
|
|
571
|
+
__publicField(_JWSInvalid, "code", "ERR_JWS_INVALID");
|
|
572
|
+
var JWSInvalid = _JWSInvalid;
|
|
573
|
+
var _JWTInvalid = /*#__PURE__*/ function(JOSEError) {
|
|
574
|
+
"use strict";
|
|
575
|
+
_inherits(_JWTInvalid, JOSEError);
|
|
576
|
+
var _super = _create_super(_JWTInvalid);
|
|
577
|
+
function _JWTInvalid() {
|
|
578
|
+
_class_call_check(this, _JWTInvalid);
|
|
579
|
+
var _this;
|
|
580
|
+
_this = _super.call.apply(_super, [
|
|
581
|
+
this
|
|
582
|
+
].concat(Array.prototype.slice.call(arguments)));
|
|
583
|
+
__publicField(_assert_this_initialized(_this), "code", "ERR_JWT_INVALID");
|
|
584
|
+
return _this;
|
|
585
|
+
}
|
|
586
|
+
return _JWTInvalid;
|
|
587
|
+
}(JOSEError);
|
|
588
|
+
__name(_JWTInvalid, "JWTInvalid");
|
|
589
|
+
__publicField(_JWTInvalid, "code", "ERR_JWT_INVALID");
|
|
590
|
+
var JWTInvalid = _JWTInvalid;
|
|
591
|
+
// node_modules/jose/dist/node/esm/runtime/is_key_object.js
|
|
592
|
+
import * as util from "util";
|
|
593
|
+
var is_key_object_default = /* @__PURE__ */ __name(function(obj) {
|
|
594
|
+
return util.types.isKeyObject(obj);
|
|
595
|
+
}, "default");
|
|
596
|
+
// node_modules/jose/dist/node/esm/runtime/webcrypto.js
|
|
597
|
+
import * as crypto from "crypto";
|
|
598
|
+
import * as util2 from "util";
|
|
599
|
+
var webcrypto2 = crypto.webcrypto;
|
|
600
|
+
var webcrypto_default = webcrypto2;
|
|
601
|
+
var isCryptoKey = /* @__PURE__ */ __name(function(key) {
|
|
602
|
+
return util2.types.isCryptoKey(key);
|
|
603
|
+
}, "isCryptoKey");
|
|
604
|
+
// node_modules/jose/dist/node/esm/lib/crypto_key.js
|
|
605
|
+
function unusable(name) {
|
|
606
|
+
var prop = arguments.length > 1 && arguments[1] !== void 0 ? arguments[1] : "algorithm.name";
|
|
607
|
+
return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
|
|
608
|
+
}
|
|
609
|
+
__name(unusable, "unusable");
|
|
610
|
+
function isAlgorithm(algorithm, name) {
|
|
611
|
+
return algorithm.name === name;
|
|
612
|
+
}
|
|
613
|
+
__name(isAlgorithm, "isAlgorithm");
|
|
614
|
+
function getHashLength(hash) {
|
|
615
|
+
return parseInt(hash.name.slice(4), 10);
|
|
616
|
+
}
|
|
617
|
+
__name(getHashLength, "getHashLength");
|
|
618
|
+
function getNamedCurve(alg) {
|
|
619
|
+
switch(alg){
|
|
620
|
+
case "ES256":
|
|
621
|
+
return "P-256";
|
|
622
|
+
case "ES384":
|
|
623
|
+
return "P-384";
|
|
624
|
+
case "ES512":
|
|
625
|
+
return "P-521";
|
|
626
|
+
default:
|
|
627
|
+
throw new Error("unreachable");
|
|
628
|
+
}
|
|
629
|
+
}
|
|
630
|
+
__name(getNamedCurve, "getNamedCurve");
|
|
631
|
+
function checkUsage(key, usages) {
|
|
632
|
+
if (usages.length && !usages.some(function(expected) {
|
|
633
|
+
return key.usages.includes(expected);
|
|
634
|
+
})) {
|
|
635
|
+
var msg = "CryptoKey does not support this operation, its usages must include ";
|
|
636
|
+
if (usages.length > 2) {
|
|
637
|
+
var last = usages.pop();
|
|
638
|
+
msg += "one of ".concat(usages.join(", "), ", or ").concat(last, ".");
|
|
639
|
+
} else if (usages.length === 2) {
|
|
640
|
+
msg += "one of ".concat(usages[0], " or ").concat(usages[1], ".");
|
|
641
|
+
} else {
|
|
642
|
+
msg += "".concat(usages[0], ".");
|
|
643
|
+
}
|
|
644
|
+
throw new TypeError(msg);
|
|
645
|
+
}
|
|
646
|
+
}
|
|
647
|
+
__name(checkUsage, "checkUsage");
|
|
648
|
+
function checkSigCryptoKey(key, alg) {
|
|
649
|
+
for(var _len = arguments.length, usages = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
|
|
650
|
+
usages[_key - 2] = arguments[_key];
|
|
651
|
+
}
|
|
652
|
+
switch(alg){
|
|
653
|
+
case "HS256":
|
|
654
|
+
case "HS384":
|
|
655
|
+
case "HS512":
|
|
656
|
+
{
|
|
657
|
+
if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
|
|
658
|
+
var expected = parseInt(alg.slice(2), 10);
|
|
659
|
+
var actual = getHashLength(key.algorithm.hash);
|
|
660
|
+
if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
|
|
661
|
+
break;
|
|
662
|
+
}
|
|
663
|
+
case "RS256":
|
|
664
|
+
case "RS384":
|
|
665
|
+
case "RS512":
|
|
666
|
+
{
|
|
667
|
+
if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
|
|
668
|
+
var expected1 = parseInt(alg.slice(2), 10);
|
|
669
|
+
var actual1 = getHashLength(key.algorithm.hash);
|
|
670
|
+
if (actual1 !== expected1) throw unusable("SHA-".concat(expected1), "algorithm.hash");
|
|
671
|
+
break;
|
|
672
|
+
}
|
|
673
|
+
case "PS256":
|
|
674
|
+
case "PS384":
|
|
675
|
+
case "PS512":
|
|
676
|
+
{
|
|
677
|
+
if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
|
|
678
|
+
var expected2 = parseInt(alg.slice(2), 10);
|
|
679
|
+
var actual2 = getHashLength(key.algorithm.hash);
|
|
680
|
+
if (actual2 !== expected2) throw unusable("SHA-".concat(expected2), "algorithm.hash");
|
|
681
|
+
break;
|
|
682
|
+
}
|
|
683
|
+
case "EdDSA":
|
|
684
|
+
{
|
|
685
|
+
if (key.algorithm.name !== "Ed25519" && key.algorithm.name !== "Ed448") {
|
|
686
|
+
throw unusable("Ed25519 or Ed448");
|
|
687
|
+
}
|
|
688
|
+
break;
|
|
689
|
+
}
|
|
690
|
+
case "Ed25519":
|
|
691
|
+
{
|
|
692
|
+
if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
|
|
693
|
+
break;
|
|
694
|
+
}
|
|
695
|
+
case "ES256":
|
|
696
|
+
case "ES384":
|
|
697
|
+
case "ES512":
|
|
698
|
+
{
|
|
699
|
+
if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
|
|
700
|
+
var expected3 = getNamedCurve(alg);
|
|
701
|
+
var actual3 = key.algorithm.namedCurve;
|
|
702
|
+
if (actual3 !== expected3) throw unusable(expected3, "algorithm.namedCurve");
|
|
703
|
+
break;
|
|
704
|
+
}
|
|
705
|
+
default:
|
|
706
|
+
throw new TypeError("CryptoKey does not support this operation");
|
|
707
|
+
}
|
|
708
|
+
checkUsage(key, usages);
|
|
709
|
+
}
|
|
710
|
+
__name(checkSigCryptoKey, "checkSigCryptoKey");
|
|
711
|
+
// node_modules/jose/dist/node/esm/lib/invalid_key_input.js
|
|
712
|
+
function message(msg, actual) {
|
|
713
|
+
for(var _len = arguments.length, types4 = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
|
|
714
|
+
types4[_key - 2] = arguments[_key];
|
|
715
|
+
}
|
|
716
|
+
types4 = types4.filter(Boolean);
|
|
717
|
+
if (types4.length > 2) {
|
|
718
|
+
var last = types4.pop();
|
|
719
|
+
msg += "one of type ".concat(types4.join(", "), ", or ").concat(last, ".");
|
|
720
|
+
} else if (types4.length === 2) {
|
|
721
|
+
msg += "one of type ".concat(types4[0], " or ").concat(types4[1], ".");
|
|
722
|
+
} else {
|
|
723
|
+
msg += "of type ".concat(types4[0], ".");
|
|
724
|
+
}
|
|
725
|
+
if (actual == null) {
|
|
726
|
+
msg += " Received ".concat(actual);
|
|
727
|
+
} else if (typeof actual === "function" && actual.name) {
|
|
728
|
+
msg += " Received function ".concat(actual.name);
|
|
729
|
+
} else if ((typeof actual === "undefined" ? "undefined" : _type_of(actual)) === "object" && actual != null) {
|
|
730
|
+
var _actual_constructor;
|
|
731
|
+
if ((_actual_constructor = actual.constructor) === null || _actual_constructor === void 0 ? void 0 : _actual_constructor.name) {
|
|
732
|
+
msg += " Received an instance of ".concat(actual.constructor.name);
|
|
733
|
+
}
|
|
734
|
+
}
|
|
735
|
+
return msg;
|
|
736
|
+
}
|
|
737
|
+
__name(message, "message");
|
|
738
|
+
var invalid_key_input_default = /* @__PURE__ */ __name(function(actual) {
|
|
739
|
+
for(var _len = arguments.length, types4 = new Array(_len > 1 ? _len - 1 : 0), _key = 1; _key < _len; _key++){
|
|
740
|
+
types4[_key - 1] = arguments[_key];
|
|
741
|
+
}
|
|
742
|
+
return message.apply(void 0, [
|
|
743
|
+
"Key must be ",
|
|
744
|
+
actual
|
|
745
|
+
].concat(_to_consumable_array(types4)));
|
|
746
|
+
}, "default");
|
|
747
|
+
function withAlg(alg, actual) {
|
|
748
|
+
for(var _len = arguments.length, types4 = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
|
|
749
|
+
types4[_key - 2] = arguments[_key];
|
|
750
|
+
}
|
|
751
|
+
return message.apply(void 0, [
|
|
752
|
+
"Key for the ".concat(alg, " algorithm must be "),
|
|
753
|
+
actual
|
|
754
|
+
].concat(_to_consumable_array(types4)));
|
|
755
|
+
}
|
|
756
|
+
__name(withAlg, "withAlg");
|
|
757
|
+
// node_modules/jose/dist/node/esm/runtime/is_key_like.js
|
|
758
|
+
var is_key_like_default = /* @__PURE__ */ __name(function(key) {
|
|
759
|
+
return is_key_object_default(key) || isCryptoKey(key);
|
|
760
|
+
}, "default");
|
|
761
|
+
var types3 = [
|
|
762
|
+
"KeyObject"
|
|
763
|
+
];
|
|
764
|
+
if (globalThis.CryptoKey || (webcrypto_default === null || webcrypto_default === void 0 ? void 0 : webcrypto_default.CryptoKey)) {
|
|
765
|
+
types3.push("CryptoKey");
|
|
766
|
+
}
|
|
767
|
+
// node_modules/jose/dist/node/esm/lib/is_disjoint.js
|
|
768
|
+
var isDisjoint = /* @__PURE__ */ __name(function() {
|
|
769
|
+
for(var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++){
|
|
770
|
+
headers[_key] = arguments[_key];
|
|
771
|
+
}
|
|
772
|
+
var sources = headers.filter(Boolean);
|
|
773
|
+
if (sources.length === 0 || sources.length === 1) {
|
|
774
|
+
return true;
|
|
775
|
+
}
|
|
776
|
+
var acc;
|
|
777
|
+
var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
|
|
778
|
+
try {
|
|
779
|
+
for(var _iterator = sources[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
|
|
780
|
+
var header = _step.value;
|
|
781
|
+
var parameters = Object.keys(header);
|
|
782
|
+
if (!acc || acc.size === 0) {
|
|
783
|
+
acc = new Set(parameters);
|
|
784
|
+
continue;
|
|
785
|
+
}
|
|
786
|
+
var _iteratorNormalCompletion1 = true, _didIteratorError1 = false, _iteratorError1 = undefined;
|
|
787
|
+
try {
|
|
788
|
+
for(var _iterator1 = parameters[Symbol.iterator](), _step1; !(_iteratorNormalCompletion1 = (_step1 = _iterator1.next()).done); _iteratorNormalCompletion1 = true){
|
|
789
|
+
var parameter = _step1.value;
|
|
790
|
+
if (acc.has(parameter)) {
|
|
791
|
+
return false;
|
|
792
|
+
}
|
|
793
|
+
acc.add(parameter);
|
|
794
|
+
}
|
|
795
|
+
} catch (err) {
|
|
796
|
+
_didIteratorError1 = true;
|
|
797
|
+
_iteratorError1 = err;
|
|
798
|
+
} finally{
|
|
799
|
+
try {
|
|
800
|
+
if (!_iteratorNormalCompletion1 && _iterator1.return != null) {
|
|
801
|
+
_iterator1.return();
|
|
802
|
+
}
|
|
803
|
+
} finally{
|
|
804
|
+
if (_didIteratorError1) {
|
|
805
|
+
throw _iteratorError1;
|
|
806
|
+
}
|
|
807
|
+
}
|
|
808
|
+
}
|
|
809
|
+
}
|
|
810
|
+
} catch (err) {
|
|
811
|
+
_didIteratorError = true;
|
|
812
|
+
_iteratorError = err;
|
|
813
|
+
} finally{
|
|
814
|
+
try {
|
|
815
|
+
if (!_iteratorNormalCompletion && _iterator.return != null) {
|
|
816
|
+
_iterator.return();
|
|
817
|
+
}
|
|
818
|
+
} finally{
|
|
819
|
+
if (_didIteratorError) {
|
|
820
|
+
throw _iteratorError;
|
|
821
|
+
}
|
|
822
|
+
}
|
|
823
|
+
}
|
|
824
|
+
return true;
|
|
825
|
+
}, "isDisjoint");
|
|
826
|
+
var is_disjoint_default = isDisjoint;
|
|
827
|
+
// node_modules/jose/dist/node/esm/lib/is_object.js
|
|
828
|
+
function isObjectLike(value) {
|
|
829
|
+
return (typeof value === "undefined" ? "undefined" : _type_of(value)) === "object" && value !== null;
|
|
830
|
+
}
|
|
831
|
+
__name(isObjectLike, "isObjectLike");
|
|
832
|
+
function isObject(input) {
|
|
833
|
+
if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
|
|
834
|
+
return false;
|
|
835
|
+
}
|
|
836
|
+
if (Object.getPrototypeOf(input) === null) {
|
|
837
|
+
return true;
|
|
838
|
+
}
|
|
839
|
+
var proto = input;
|
|
840
|
+
while(Object.getPrototypeOf(proto) !== null){
|
|
841
|
+
proto = Object.getPrototypeOf(proto);
|
|
842
|
+
}
|
|
843
|
+
return Object.getPrototypeOf(input) === proto;
|
|
844
|
+
}
|
|
845
|
+
__name(isObject, "isObject");
|
|
846
|
+
// node_modules/jose/dist/node/esm/runtime/get_named_curve.js
|
|
847
|
+
import { KeyObject } from "crypto";
|
|
848
|
+
// node_modules/jose/dist/node/esm/lib/is_jwk.js
|
|
849
|
+
function isJWK(key) {
|
|
850
|
+
return isObject(key) && typeof key.kty === "string";
|
|
851
|
+
}
|
|
852
|
+
__name(isJWK, "isJWK");
|
|
853
|
+
function isPrivateJWK(key) {
|
|
854
|
+
return key.kty !== "oct" && typeof key.d === "string";
|
|
855
|
+
}
|
|
856
|
+
__name(isPrivateJWK, "isPrivateJWK");
|
|
857
|
+
function isPublicJWK(key) {
|
|
858
|
+
return key.kty !== "oct" && typeof key.d === "undefined";
|
|
859
|
+
}
|
|
860
|
+
__name(isPublicJWK, "isPublicJWK");
|
|
861
|
+
function isSecretJWK(key) {
|
|
862
|
+
return isJWK(key) && key.kty === "oct" && typeof key.k === "string";
|
|
863
|
+
}
|
|
864
|
+
__name(isSecretJWK, "isSecretJWK");
|
|
865
|
+
// node_modules/jose/dist/node/esm/runtime/get_named_curve.js
|
|
866
|
+
var namedCurveToJOSE = /* @__PURE__ */ __name(function(namedCurve) {
|
|
867
|
+
switch(namedCurve){
|
|
868
|
+
case "prime256v1":
|
|
869
|
+
return "P-256";
|
|
870
|
+
case "secp384r1":
|
|
871
|
+
return "P-384";
|
|
872
|
+
case "secp521r1":
|
|
873
|
+
return "P-521";
|
|
874
|
+
case "secp256k1":
|
|
875
|
+
return "secp256k1";
|
|
876
|
+
default:
|
|
877
|
+
throw new JOSENotSupported("Unsupported key curve for this operation");
|
|
878
|
+
}
|
|
879
|
+
}, "namedCurveToJOSE");
|
|
880
|
+
var getNamedCurve2 = /* @__PURE__ */ __name(function(kee, raw) {
|
|
881
|
+
var key;
|
|
882
|
+
if (isCryptoKey(kee)) {
|
|
883
|
+
key = KeyObject.from(kee);
|
|
884
|
+
} else if (is_key_object_default(kee)) {
|
|
885
|
+
key = kee;
|
|
886
|
+
} else if (isJWK(kee)) {
|
|
887
|
+
return kee.crv;
|
|
888
|
+
} else {
|
|
889
|
+
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
890
|
+
kee
|
|
891
|
+
].concat(_to_consumable_array(types3))));
|
|
892
|
+
}
|
|
893
|
+
if (key.type === "secret") {
|
|
894
|
+
throw new TypeError('only "private" or "public" type keys can be used for this operation');
|
|
895
|
+
}
|
|
896
|
+
switch(key.asymmetricKeyType){
|
|
897
|
+
case "ed25519":
|
|
898
|
+
case "ed448":
|
|
899
|
+
return "Ed".concat(key.asymmetricKeyType.slice(2));
|
|
900
|
+
case "x25519":
|
|
901
|
+
case "x448":
|
|
902
|
+
return "X".concat(key.asymmetricKeyType.slice(1));
|
|
903
|
+
case "ec":
|
|
904
|
+
{
|
|
905
|
+
var namedCurve = key.asymmetricKeyDetails.namedCurve;
|
|
906
|
+
if (raw) {
|
|
907
|
+
return namedCurve;
|
|
908
|
+
}
|
|
909
|
+
return namedCurveToJOSE(namedCurve);
|
|
910
|
+
}
|
|
911
|
+
default:
|
|
912
|
+
throw new TypeError("Invalid asymmetric key type for this operation");
|
|
913
|
+
}
|
|
914
|
+
}, "getNamedCurve");
|
|
915
|
+
var get_named_curve_default = getNamedCurve2;
|
|
916
|
+
// node_modules/jose/dist/node/esm/runtime/check_key_length.js
|
|
917
|
+
import { KeyObject as KeyObject2 } from "crypto";
|
|
918
|
+
var check_key_length_default = /* @__PURE__ */ __name(function(key, alg) {
|
|
919
|
+
var modulusLength;
|
|
920
|
+
try {
|
|
921
|
+
if (_instanceof(key, KeyObject2)) {
|
|
922
|
+
var _key_asymmetricKeyDetails;
|
|
923
|
+
modulusLength = (_key_asymmetricKeyDetails = key.asymmetricKeyDetails) === null || _key_asymmetricKeyDetails === void 0 ? void 0 : _key_asymmetricKeyDetails.modulusLength;
|
|
924
|
+
} else {
|
|
925
|
+
modulusLength = Buffer.from(key.n, "base64url").byteLength << 3;
|
|
926
|
+
}
|
|
927
|
+
} catch (e) {}
|
|
928
|
+
if (typeof modulusLength !== "number" || modulusLength < 2048) {
|
|
929
|
+
throw new TypeError("".concat(alg, " requires key modulusLength to be 2048 bits or larger"));
|
|
930
|
+
}
|
|
931
|
+
}, "default");
|
|
932
|
+
// node_modules/jose/dist/node/esm/runtime/jwk_to_key.js
|
|
933
|
+
import { createPrivateKey, createPublicKey } from "crypto";
|
|
934
|
+
var parse = /* @__PURE__ */ __name(function(key) {
|
|
935
|
+
if (key.d) {
|
|
936
|
+
return createPrivateKey({
|
|
937
|
+
format: "jwk",
|
|
938
|
+
key: key
|
|
939
|
+
});
|
|
940
|
+
}
|
|
941
|
+
return createPublicKey({
|
|
942
|
+
format: "jwk",
|
|
943
|
+
key: key
|
|
944
|
+
});
|
|
945
|
+
}, "parse");
|
|
946
|
+
var jwk_to_key_default = parse;
|
|
947
|
+
function importJWK(jwk, alg) {
|
|
948
|
+
return _importJWK.apply(this, arguments);
|
|
949
|
+
}
|
|
950
|
+
function _importJWK() {
|
|
951
|
+
_importJWK = // node_modules/jose/dist/node/esm/key/import.js
|
|
952
|
+
_async_to_generator(function(jwk, alg) {
|
|
953
|
+
return _ts_generator(this, function(_state) {
|
|
954
|
+
if (!isObject(jwk)) {
|
|
955
|
+
throw new TypeError("JWK must be an object");
|
|
956
|
+
}
|
|
957
|
+
alg || (alg = jwk.alg);
|
|
958
|
+
switch(jwk.kty){
|
|
959
|
+
case "oct":
|
|
960
|
+
if (typeof jwk.k !== "string" || !jwk.k) {
|
|
961
|
+
throw new TypeError('missing "k" (Key Value) Parameter value');
|
|
962
|
+
}
|
|
963
|
+
return [
|
|
964
|
+
2,
|
|
965
|
+
decode(jwk.k)
|
|
966
|
+
];
|
|
967
|
+
case "RSA":
|
|
968
|
+
if ("oth" in jwk && jwk.oth !== void 0) {
|
|
969
|
+
throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
|
|
970
|
+
}
|
|
971
|
+
case "EC":
|
|
972
|
+
case "OKP":
|
|
973
|
+
return [
|
|
974
|
+
2,
|
|
975
|
+
jwk_to_key_default(_object_spread_props(_object_spread({}, jwk), {
|
|
976
|
+
alg: alg
|
|
977
|
+
}))
|
|
978
|
+
];
|
|
979
|
+
default:
|
|
980
|
+
throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
|
|
981
|
+
}
|
|
982
|
+
return [
|
|
983
|
+
2
|
|
984
|
+
];
|
|
985
|
+
});
|
|
986
|
+
});
|
|
987
|
+
return _importJWK.apply(this, arguments);
|
|
988
|
+
}
|
|
989
|
+
__name(importJWK, "importJWK");
|
|
990
|
+
// node_modules/jose/dist/node/esm/lib/check_key_type.js
|
|
991
|
+
var tag = /* @__PURE__ */ __name(function(key) {
|
|
992
|
+
return key === null || key === void 0 ? void 0 : key[Symbol.toStringTag];
|
|
993
|
+
}, "tag");
|
|
994
|
+
var jwkMatchesOp = /* @__PURE__ */ __name(function(alg, key, usage) {
|
|
995
|
+
var _key_key_ops_includes, _key_key_ops;
|
|
996
|
+
if (key.use !== void 0 && key.use !== "sig") {
|
|
997
|
+
throw new TypeError("Invalid key for this operation, when present its use must be sig");
|
|
998
|
+
}
|
|
999
|
+
if (key.key_ops !== void 0 && ((_key_key_ops_includes = (_key_key_ops = key.key_ops).includes) === null || _key_key_ops_includes === void 0 ? void 0 : _key_key_ops_includes.call(_key_key_ops, usage)) !== true) {
|
|
1000
|
+
throw new TypeError("Invalid key for this operation, when present its key_ops must include ".concat(usage));
|
|
1001
|
+
}
|
|
1002
|
+
if (key.alg !== void 0 && key.alg !== alg) {
|
|
1003
|
+
throw new TypeError("Invalid key for this operation, when present its alg must be ".concat(alg));
|
|
1004
|
+
}
|
|
1005
|
+
return true;
|
|
1006
|
+
}, "jwkMatchesOp");
|
|
1007
|
+
var symmetricTypeCheck = /* @__PURE__ */ __name(function(alg, key, usage, allowJwk) {
|
|
1008
|
+
if (_instanceof(key, Uint8Array)) return;
|
|
1009
|
+
if (allowJwk && isJWK(key)) {
|
|
1010
|
+
if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage)) return;
|
|
1011
|
+
throw new TypeError('JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present');
|
|
1012
|
+
}
|
|
1013
|
+
if (!is_key_like_default(key)) {
|
|
1014
|
+
throw new TypeError(withAlg.apply(void 0, [
|
|
1015
|
+
alg,
|
|
1016
|
+
key
|
|
1017
|
+
].concat(_to_consumable_array(types3), [
|
|
1018
|
+
"Uint8Array",
|
|
1019
|
+
allowJwk ? "JSON Web Key" : null
|
|
1020
|
+
])));
|
|
1021
|
+
}
|
|
1022
|
+
if (key.type !== "secret") {
|
|
1023
|
+
throw new TypeError("".concat(tag(key), ' instances for symmetric algorithms must be of type "secret"'));
|
|
1024
|
+
}
|
|
1025
|
+
}, "symmetricTypeCheck");
|
|
1026
|
+
var asymmetricTypeCheck = /* @__PURE__ */ __name(function(alg, key, usage, allowJwk) {
|
|
1027
|
+
if (allowJwk && isJWK(key)) {
|
|
1028
|
+
switch(usage){
|
|
1029
|
+
case "sign":
|
|
1030
|
+
if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage)) return;
|
|
1031
|
+
throw new TypeError("JSON Web Key for this operation be a private JWK");
|
|
1032
|
+
case "verify":
|
|
1033
|
+
if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage)) return;
|
|
1034
|
+
throw new TypeError("JSON Web Key for this operation be a public JWK");
|
|
1035
|
+
}
|
|
1036
|
+
}
|
|
1037
|
+
if (!is_key_like_default(key)) {
|
|
1038
|
+
throw new TypeError(withAlg.apply(void 0, [
|
|
1039
|
+
alg,
|
|
1040
|
+
key
|
|
1041
|
+
].concat(_to_consumable_array(types3), [
|
|
1042
|
+
allowJwk ? "JSON Web Key" : null
|
|
1043
|
+
])));
|
|
1044
|
+
}
|
|
1045
|
+
if (key.type === "secret") {
|
|
1046
|
+
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithms must not be of type "secret"'));
|
|
1047
|
+
}
|
|
1048
|
+
if (usage === "sign" && key.type === "public") {
|
|
1049
|
+
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm signing must be of type "private"'));
|
|
1050
|
+
}
|
|
1051
|
+
if (usage === "decrypt" && key.type === "public") {
|
|
1052
|
+
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm decryption must be of type "private"'));
|
|
1053
|
+
}
|
|
1054
|
+
if (key.algorithm && usage === "verify" && key.type === "private") {
|
|
1055
|
+
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm verifying must be of type "public"'));
|
|
1056
|
+
}
|
|
1057
|
+
if (key.algorithm && usage === "encrypt" && key.type === "private") {
|
|
1058
|
+
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm encryption must be of type "public"'));
|
|
1059
|
+
}
|
|
1060
|
+
}, "asymmetricTypeCheck");
|
|
1061
|
+
function checkKeyType(allowJwk, alg, key, usage) {
|
|
1062
|
+
var symmetric = alg.startsWith("HS") || alg === "dir" || alg.startsWith("PBES2") || /^A\d{3}(?:GCM)?KW$/.test(alg);
|
|
1063
|
+
if (symmetric) {
|
|
1064
|
+
symmetricTypeCheck(alg, key, usage, allowJwk);
|
|
1065
|
+
} else {
|
|
1066
|
+
asymmetricTypeCheck(alg, key, usage, allowJwk);
|
|
1067
|
+
}
|
|
1068
|
+
}
|
|
1069
|
+
__name(checkKeyType, "checkKeyType");
|
|
1070
|
+
var check_key_type_default = checkKeyType.bind(void 0, false);
|
|
1071
|
+
var checkKeyTypeWithJwk = checkKeyType.bind(void 0, true);
|
|
1072
|
+
// node_modules/jose/dist/node/esm/lib/validate_crit.js
|
|
1073
|
+
function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
|
|
1074
|
+
if (joseHeader.crit !== void 0 && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === void 0) {
|
|
1075
|
+
throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
|
|
1076
|
+
}
|
|
1077
|
+
if (!protectedHeader || protectedHeader.crit === void 0) {
|
|
1078
|
+
return /* @__PURE__ */ new Set();
|
|
1079
|
+
}
|
|
1080
|
+
if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some(function(input) {
|
|
1081
|
+
return typeof input !== "string" || input.length === 0;
|
|
1082
|
+
})) {
|
|
1083
|
+
throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
|
|
1084
|
+
}
|
|
1085
|
+
var recognized;
|
|
1086
|
+
if (recognizedOption !== void 0) {
|
|
1087
|
+
recognized = new Map(_to_consumable_array(Object.entries(recognizedOption)).concat(_to_consumable_array(recognizedDefault.entries())));
|
|
1088
|
+
} else {
|
|
1089
|
+
recognized = recognizedDefault;
|
|
1090
|
+
}
|
|
1091
|
+
var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
|
|
1092
|
+
try {
|
|
1093
|
+
for(var _iterator = protectedHeader.crit[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
|
|
1094
|
+
var parameter = _step.value;
|
|
1095
|
+
if (!recognized.has(parameter)) {
|
|
1096
|
+
throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
|
|
1097
|
+
}
|
|
1098
|
+
if (joseHeader[parameter] === void 0) {
|
|
1099
|
+
throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
|
|
1100
|
+
}
|
|
1101
|
+
if (recognized.get(parameter) && protectedHeader[parameter] === void 0) {
|
|
1102
|
+
throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
|
|
1103
|
+
}
|
|
1104
|
+
}
|
|
1105
|
+
} catch (err) {
|
|
1106
|
+
_didIteratorError = true;
|
|
1107
|
+
_iteratorError = err;
|
|
1108
|
+
} finally{
|
|
1109
|
+
try {
|
|
1110
|
+
if (!_iteratorNormalCompletion && _iterator.return != null) {
|
|
1111
|
+
_iterator.return();
|
|
1112
|
+
}
|
|
1113
|
+
} finally{
|
|
1114
|
+
if (_didIteratorError) {
|
|
1115
|
+
throw _iteratorError;
|
|
1116
|
+
}
|
|
1117
|
+
}
|
|
1118
|
+
}
|
|
1119
|
+
return new Set(protectedHeader.crit);
|
|
1120
|
+
}
|
|
1121
|
+
__name(validateCrit, "validateCrit");
|
|
1122
|
+
var validate_crit_default = validateCrit;
|
|
1123
|
+
// node_modules/jose/dist/node/esm/runtime/key_to_jwk.js
|
|
1124
|
+
import { KeyObject as KeyObject3 } from "crypto";
|
|
1125
|
+
var keyToJWK = /* @__PURE__ */ __name(function(key) {
|
|
1126
|
+
var keyObject;
|
|
1127
|
+
if (isCryptoKey(key)) {
|
|
1128
|
+
if (!key.extractable) {
|
|
1129
|
+
throw new TypeError("CryptoKey is not extractable");
|
|
1130
|
+
}
|
|
1131
|
+
keyObject = KeyObject3.from(key);
|
|
1132
|
+
} else if (is_key_object_default(key)) {
|
|
1133
|
+
keyObject = key;
|
|
1134
|
+
} else if (_instanceof(key, Uint8Array)) {
|
|
1135
|
+
return {
|
|
1136
|
+
kty: "oct",
|
|
1137
|
+
k: encode(key)
|
|
1138
|
+
};
|
|
1139
|
+
} else {
|
|
1140
|
+
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
1141
|
+
key
|
|
1142
|
+
].concat(_to_consumable_array(types3), [
|
|
1143
|
+
"Uint8Array"
|
|
1144
|
+
])));
|
|
1145
|
+
}
|
|
1146
|
+
if (keyObject.type !== "secret" && ![
|
|
1147
|
+
"rsa",
|
|
1148
|
+
"ec",
|
|
1149
|
+
"ed25519",
|
|
1150
|
+
"x25519",
|
|
1151
|
+
"ed448",
|
|
1152
|
+
"x448"
|
|
1153
|
+
].includes(keyObject.asymmetricKeyType)) {
|
|
1154
|
+
throw new JOSENotSupported("Unsupported key asymmetricKeyType");
|
|
1155
|
+
}
|
|
1156
|
+
return keyObject.export({
|
|
1157
|
+
format: "jwk"
|
|
1158
|
+
});
|
|
1159
|
+
}, "keyToJWK");
|
|
1160
|
+
var key_to_jwk_default = keyToJWK;
|
|
1161
|
+
function exportJWK(key) {
|
|
1162
|
+
return _exportJWK.apply(this, arguments);
|
|
1163
|
+
}
|
|
1164
|
+
function _exportJWK() {
|
|
1165
|
+
_exportJWK = // node_modules/jose/dist/node/esm/key/export.js
|
|
1166
|
+
_async_to_generator(function(key) {
|
|
1167
|
+
return _ts_generator(this, function(_state) {
|
|
1168
|
+
return [
|
|
1169
|
+
2,
|
|
1170
|
+
key_to_jwk_default(key)
|
|
1171
|
+
];
|
|
1172
|
+
});
|
|
1173
|
+
});
|
|
1174
|
+
return _exportJWK.apply(this, arguments);
|
|
1175
|
+
}
|
|
1176
|
+
__name(exportJWK, "exportJWK");
|
|
1177
|
+
// node_modules/jose/dist/node/esm/runtime/dsa_digest.js
|
|
1178
|
+
function dsaDigest(alg) {
|
|
1179
|
+
switch(alg){
|
|
1180
|
+
case "PS256":
|
|
1181
|
+
case "RS256":
|
|
1182
|
+
case "ES256":
|
|
1183
|
+
case "ES256K":
|
|
1184
|
+
return "sha256";
|
|
1185
|
+
case "PS384":
|
|
1186
|
+
case "RS384":
|
|
1187
|
+
case "ES384":
|
|
1188
|
+
return "sha384";
|
|
1189
|
+
case "PS512":
|
|
1190
|
+
case "RS512":
|
|
1191
|
+
case "ES512":
|
|
1192
|
+
return "sha512";
|
|
1193
|
+
case "Ed25519":
|
|
1194
|
+
case "EdDSA":
|
|
1195
|
+
return void 0;
|
|
1196
|
+
default:
|
|
1197
|
+
throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
|
|
1198
|
+
}
|
|
1199
|
+
}
|
|
1200
|
+
__name(dsaDigest, "dsaDigest");
|
|
1201
|
+
// node_modules/jose/dist/node/esm/runtime/node_key.js
|
|
1202
|
+
import { constants, KeyObject as KeyObject4 } from "crypto";
|
|
1203
|
+
var ecCurveAlgMap = /* @__PURE__ */ new Map([
|
|
1204
|
+
[
|
|
1205
|
+
"ES256",
|
|
1206
|
+
"P-256"
|
|
1207
|
+
],
|
|
1208
|
+
[
|
|
1209
|
+
"ES256K",
|
|
1210
|
+
"secp256k1"
|
|
1211
|
+
],
|
|
1212
|
+
[
|
|
1213
|
+
"ES384",
|
|
1214
|
+
"P-384"
|
|
1215
|
+
],
|
|
1216
|
+
[
|
|
1217
|
+
"ES512",
|
|
1218
|
+
"P-521"
|
|
1219
|
+
]
|
|
1220
|
+
]);
|
|
1221
|
+
function keyForCrypto(alg, key) {
|
|
1222
|
+
var asymmetricKeyType;
|
|
1223
|
+
var asymmetricKeyDetails;
|
|
1224
|
+
var isJWK2;
|
|
1225
|
+
if (_instanceof(key, KeyObject4)) {
|
|
1226
|
+
asymmetricKeyType = key.asymmetricKeyType;
|
|
1227
|
+
asymmetricKeyDetails = key.asymmetricKeyDetails;
|
|
1228
|
+
} else {
|
|
1229
|
+
isJWK2 = true;
|
|
1230
|
+
switch(key.kty){
|
|
1231
|
+
case "RSA":
|
|
1232
|
+
asymmetricKeyType = "rsa";
|
|
1233
|
+
break;
|
|
1234
|
+
case "EC":
|
|
1235
|
+
asymmetricKeyType = "ec";
|
|
1236
|
+
break;
|
|
1237
|
+
case "OKP":
|
|
1238
|
+
{
|
|
1239
|
+
if (key.crv === "Ed25519") {
|
|
1240
|
+
asymmetricKeyType = "ed25519";
|
|
1241
|
+
break;
|
|
1242
|
+
}
|
|
1243
|
+
if (key.crv === "Ed448") {
|
|
1244
|
+
asymmetricKeyType = "ed448";
|
|
1245
|
+
break;
|
|
1246
|
+
}
|
|
1247
|
+
throw new TypeError("Invalid key for this operation, its crv must be Ed25519 or Ed448");
|
|
1248
|
+
}
|
|
1249
|
+
default:
|
|
1250
|
+
throw new TypeError("Invalid key for this operation, its kty must be RSA, OKP, or EC");
|
|
1251
|
+
}
|
|
1252
|
+
}
|
|
1253
|
+
var options;
|
|
1254
|
+
switch(alg){
|
|
1255
|
+
case "Ed25519":
|
|
1256
|
+
if (asymmetricKeyType !== "ed25519") {
|
|
1257
|
+
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ed25519");
|
|
1258
|
+
}
|
|
1259
|
+
break;
|
|
1260
|
+
case "EdDSA":
|
|
1261
|
+
if (![
|
|
1262
|
+
"ed25519",
|
|
1263
|
+
"ed448"
|
|
1264
|
+
].includes(asymmetricKeyType)) {
|
|
1265
|
+
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ed25519 or ed448");
|
|
1266
|
+
}
|
|
1267
|
+
break;
|
|
1268
|
+
case "RS256":
|
|
1269
|
+
case "RS384":
|
|
1270
|
+
case "RS512":
|
|
1271
|
+
if (asymmetricKeyType !== "rsa") {
|
|
1272
|
+
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be rsa");
|
|
1273
|
+
}
|
|
1274
|
+
check_key_length_default(key, alg);
|
|
1275
|
+
break;
|
|
1276
|
+
case "PS256":
|
|
1277
|
+
case "PS384":
|
|
1278
|
+
case "PS512":
|
|
1279
|
+
if (asymmetricKeyType === "rsa-pss") {
|
|
1280
|
+
var hashAlgorithm = asymmetricKeyDetails.hashAlgorithm, mgf1HashAlgorithm = asymmetricKeyDetails.mgf1HashAlgorithm, saltLength = asymmetricKeyDetails.saltLength;
|
|
1281
|
+
var length = parseInt(alg.slice(-3), 10);
|
|
1282
|
+
if (hashAlgorithm !== void 0 && (hashAlgorithm !== "sha".concat(length) || mgf1HashAlgorithm !== hashAlgorithm)) {
|
|
1283
|
+
throw new TypeError('Invalid key for this operation, its RSA-PSS parameters do not meet the requirements of "alg" '.concat(alg));
|
|
1284
|
+
}
|
|
1285
|
+
if (saltLength !== void 0 && saltLength > length >> 3) {
|
|
1286
|
+
throw new TypeError('Invalid key for this operation, its RSA-PSS parameter saltLength does not meet the requirements of "alg" '.concat(alg));
|
|
1287
|
+
}
|
|
1288
|
+
} else if (asymmetricKeyType !== "rsa") {
|
|
1289
|
+
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be rsa or rsa-pss");
|
|
1290
|
+
}
|
|
1291
|
+
check_key_length_default(key, alg);
|
|
1292
|
+
options = {
|
|
1293
|
+
padding: constants.RSA_PKCS1_PSS_PADDING,
|
|
1294
|
+
saltLength: constants.RSA_PSS_SALTLEN_DIGEST
|
|
1295
|
+
};
|
|
1296
|
+
break;
|
|
1297
|
+
case "ES256":
|
|
1298
|
+
case "ES256K":
|
|
1299
|
+
case "ES384":
|
|
1300
|
+
case "ES512":
|
|
1301
|
+
{
|
|
1302
|
+
if (asymmetricKeyType !== "ec") {
|
|
1303
|
+
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ec");
|
|
1304
|
+
}
|
|
1305
|
+
var actual = get_named_curve_default(key);
|
|
1306
|
+
var expected = ecCurveAlgMap.get(alg);
|
|
1307
|
+
if (actual !== expected) {
|
|
1308
|
+
throw new TypeError("Invalid key curve for the algorithm, its curve must be ".concat(expected, ", got ").concat(actual));
|
|
1309
|
+
}
|
|
1310
|
+
options = {
|
|
1311
|
+
dsaEncoding: "ieee-p1363"
|
|
1312
|
+
};
|
|
1313
|
+
break;
|
|
1314
|
+
}
|
|
1315
|
+
default:
|
|
1316
|
+
throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
|
|
1317
|
+
}
|
|
1318
|
+
if (isJWK2) {
|
|
1319
|
+
return _object_spread({
|
|
1320
|
+
format: "jwk",
|
|
1321
|
+
key: key
|
|
1322
|
+
}, options);
|
|
1323
|
+
}
|
|
1324
|
+
return options ? _object_spread_props(_object_spread({}, options), {
|
|
1325
|
+
key: key
|
|
1326
|
+
}) : key;
|
|
1327
|
+
}
|
|
1328
|
+
__name(keyForCrypto, "keyForCrypto");
|
|
1329
|
+
// node_modules/jose/dist/node/esm/runtime/sign.js
|
|
1330
|
+
import * as crypto2 from "crypto";
|
|
1331
|
+
import { promisify } from "util";
|
|
1332
|
+
// node_modules/jose/dist/node/esm/runtime/hmac_digest.js
|
|
1333
|
+
function hmacDigest(alg) {
|
|
1334
|
+
switch(alg){
|
|
1335
|
+
case "HS256":
|
|
1336
|
+
return "sha256";
|
|
1337
|
+
case "HS384":
|
|
1338
|
+
return "sha384";
|
|
1339
|
+
case "HS512":
|
|
1340
|
+
return "sha512";
|
|
1341
|
+
default:
|
|
1342
|
+
throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
|
|
1343
|
+
}
|
|
1344
|
+
}
|
|
1345
|
+
__name(hmacDigest, "hmacDigest");
|
|
1346
|
+
// node_modules/jose/dist/node/esm/runtime/get_sign_verify_key.js
|
|
1347
|
+
import { KeyObject as KeyObject5, createSecretKey } from "crypto";
|
|
1348
|
+
function getSignVerifyKey(alg, key, usage) {
|
|
1349
|
+
if (_instanceof(key, Uint8Array)) {
|
|
1350
|
+
if (!alg.startsWith("HS")) {
|
|
1351
|
+
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
1352
|
+
key
|
|
1353
|
+
].concat(_to_consumable_array(types3))));
|
|
1354
|
+
}
|
|
1355
|
+
return createSecretKey(key);
|
|
1356
|
+
}
|
|
1357
|
+
if (_instanceof(key, KeyObject5)) {
|
|
1358
|
+
return key;
|
|
1359
|
+
}
|
|
1360
|
+
if (isCryptoKey(key)) {
|
|
1361
|
+
checkSigCryptoKey(key, alg, usage);
|
|
1362
|
+
return KeyObject5.from(key);
|
|
1363
|
+
}
|
|
1364
|
+
if (isJWK(key)) {
|
|
1365
|
+
if (alg.startsWith("HS")) {
|
|
1366
|
+
return createSecretKey(Buffer.from(key.k, "base64url"));
|
|
1367
|
+
}
|
|
1368
|
+
return key;
|
|
1369
|
+
}
|
|
1370
|
+
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
1371
|
+
key
|
|
1372
|
+
].concat(_to_consumable_array(types3), [
|
|
1373
|
+
"Uint8Array",
|
|
1374
|
+
"JSON Web Key"
|
|
1375
|
+
])));
|
|
1376
|
+
}
|
|
1377
|
+
__name(getSignVerifyKey, "getSignVerifyKey");
|
|
1378
|
+
// node_modules/jose/dist/node/esm/runtime/sign.js
|
|
1379
|
+
var oneShotSign = promisify(crypto2.sign);
|
|
1380
|
+
var sign2 = /* @__PURE__ */ __name(function() {
|
|
1381
|
+
var _ref = _async_to_generator(function(alg, key, data) {
|
|
1382
|
+
var k, hmac;
|
|
1383
|
+
return _ts_generator(this, function(_state) {
|
|
1384
|
+
k = getSignVerifyKey(alg, key, "sign");
|
|
1385
|
+
if (alg.startsWith("HS")) {
|
|
1386
|
+
hmac = crypto2.createHmac(hmacDigest(alg), k);
|
|
1387
|
+
hmac.update(data);
|
|
1388
|
+
return [
|
|
1389
|
+
2,
|
|
1390
|
+
hmac.digest()
|
|
1391
|
+
];
|
|
1392
|
+
}
|
|
1393
|
+
return [
|
|
1394
|
+
2,
|
|
1395
|
+
oneShotSign(dsaDigest(alg), data, keyForCrypto(alg, k))
|
|
1396
|
+
];
|
|
1397
|
+
});
|
|
1398
|
+
});
|
|
1399
|
+
return function(alg, key, data) {
|
|
1400
|
+
return _ref.apply(this, arguments);
|
|
1401
|
+
};
|
|
1402
|
+
}(), "sign");
|
|
1403
|
+
var sign_default = sign2;
|
|
1404
|
+
// node_modules/jose/dist/node/esm/lib/epoch.js
|
|
1405
|
+
var epoch_default = /* @__PURE__ */ __name(function(date) {
|
|
1406
|
+
return Math.floor(date.getTime() / 1e3);
|
|
1407
|
+
}, "default");
|
|
1408
|
+
// node_modules/jose/dist/node/esm/lib/secs.js
|
|
1409
|
+
var minute = 60;
|
|
1410
|
+
var hour = minute * 60;
|
|
1411
|
+
var day = hour * 24;
|
|
1412
|
+
var week = day * 7;
|
|
1413
|
+
var year = day * 365.25;
|
|
1414
|
+
var REGEX = /^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;
|
|
1415
|
+
var secs_default = /* @__PURE__ */ __name(function(str) {
|
|
1416
|
+
var matched = REGEX.exec(str);
|
|
1417
|
+
if (!matched || matched[4] && matched[1]) {
|
|
1418
|
+
throw new TypeError("Invalid time period format");
|
|
1419
|
+
}
|
|
1420
|
+
var value = parseFloat(matched[2]);
|
|
1421
|
+
var unit = matched[3].toLowerCase();
|
|
1422
|
+
var numericDate;
|
|
1423
|
+
switch(unit){
|
|
1424
|
+
case "sec":
|
|
1425
|
+
case "secs":
|
|
1426
|
+
case "second":
|
|
1427
|
+
case "seconds":
|
|
1428
|
+
case "s":
|
|
1429
|
+
numericDate = Math.round(value);
|
|
1430
|
+
break;
|
|
1431
|
+
case "minute":
|
|
1432
|
+
case "minutes":
|
|
1433
|
+
case "min":
|
|
1434
|
+
case "mins":
|
|
1435
|
+
case "m":
|
|
1436
|
+
numericDate = Math.round(value * minute);
|
|
1437
|
+
break;
|
|
1438
|
+
case "hour":
|
|
1439
|
+
case "hours":
|
|
1440
|
+
case "hr":
|
|
1441
|
+
case "hrs":
|
|
1442
|
+
case "h":
|
|
1443
|
+
numericDate = Math.round(value * hour);
|
|
1444
|
+
break;
|
|
1445
|
+
case "day":
|
|
1446
|
+
case "days":
|
|
1447
|
+
case "d":
|
|
1448
|
+
numericDate = Math.round(value * day);
|
|
1449
|
+
break;
|
|
1450
|
+
case "week":
|
|
1451
|
+
case "weeks":
|
|
1452
|
+
case "w":
|
|
1453
|
+
numericDate = Math.round(value * week);
|
|
1454
|
+
break;
|
|
1455
|
+
default:
|
|
1456
|
+
numericDate = Math.round(value * year);
|
|
1457
|
+
break;
|
|
1458
|
+
}
|
|
1459
|
+
if (matched[1] === "-" || matched[4] === "ago") {
|
|
1460
|
+
return -numericDate;
|
|
1461
|
+
}
|
|
1462
|
+
return numericDate;
|
|
1463
|
+
}, "default");
|
|
1464
|
+
// node_modules/jose/dist/node/esm/jws/flattened/sign.js
|
|
1465
|
+
var _FlattenedSign = /*#__PURE__*/ function() {
|
|
436
1466
|
"use strict";
|
|
437
|
-
function
|
|
438
|
-
_class_call_check(this,
|
|
439
|
-
__publicField(this, "
|
|
440
|
-
__publicField(this, "
|
|
1467
|
+
function _FlattenedSign(payload) {
|
|
1468
|
+
_class_call_check(this, _FlattenedSign);
|
|
1469
|
+
__publicField(this, "_payload");
|
|
1470
|
+
__publicField(this, "_protectedHeader");
|
|
1471
|
+
__publicField(this, "_unprotectedHeader");
|
|
1472
|
+
if (!_instanceof(payload, Uint8Array)) {
|
|
1473
|
+
throw new TypeError("payload must be an instance of Uint8Array");
|
|
1474
|
+
}
|
|
1475
|
+
this._payload = payload;
|
|
441
1476
|
}
|
|
442
|
-
_create_class(
|
|
1477
|
+
_create_class(_FlattenedSign, [
|
|
443
1478
|
{
|
|
444
|
-
key: "
|
|
445
|
-
value: function
|
|
1479
|
+
key: "setProtectedHeader",
|
|
1480
|
+
value: function setProtectedHeader(protectedHeader) {
|
|
1481
|
+
if (this._protectedHeader) {
|
|
1482
|
+
throw new TypeError("setProtectedHeader can only be called once");
|
|
1483
|
+
}
|
|
1484
|
+
this._protectedHeader = protectedHeader;
|
|
1485
|
+
return this;
|
|
1486
|
+
}
|
|
1487
|
+
},
|
|
1488
|
+
{
|
|
1489
|
+
key: "setUnprotectedHeader",
|
|
1490
|
+
value: function setUnprotectedHeader(unprotectedHeader) {
|
|
1491
|
+
if (this._unprotectedHeader) {
|
|
1492
|
+
throw new TypeError("setUnprotectedHeader can only be called once");
|
|
1493
|
+
}
|
|
1494
|
+
this._unprotectedHeader = unprotectedHeader;
|
|
1495
|
+
return this;
|
|
1496
|
+
}
|
|
1497
|
+
},
|
|
1498
|
+
{
|
|
1499
|
+
key: "sign",
|
|
1500
|
+
value: function sign(key, options) {
|
|
446
1501
|
var _this = this;
|
|
447
1502
|
return _async_to_generator(function() {
|
|
448
|
-
var
|
|
1503
|
+
var joseHeader, extensions, b64, alg, payload, protectedHeader, data, signature, jws;
|
|
449
1504
|
return _ts_generator(this, function(_state) {
|
|
450
1505
|
switch(_state.label){
|
|
451
1506
|
case 0:
|
|
1507
|
+
if (!_this._protectedHeader && !_this._unprotectedHeader) {
|
|
1508
|
+
throw new JWSInvalid("either setProtectedHeader or setUnprotectedHeader must be called before #sign()");
|
|
1509
|
+
}
|
|
1510
|
+
if (!is_disjoint_default(_this._protectedHeader, _this._unprotectedHeader)) {
|
|
1511
|
+
throw new JWSInvalid("JWS Protected and JWS Unprotected Header Parameter names must be disjoint");
|
|
1512
|
+
}
|
|
1513
|
+
joseHeader = _object_spread({}, _this._protectedHeader, _this._unprotectedHeader);
|
|
1514
|
+
extensions = validate_crit_default(JWSInvalid, /* @__PURE__ */ new Map([
|
|
1515
|
+
[
|
|
1516
|
+
"b64",
|
|
1517
|
+
true
|
|
1518
|
+
]
|
|
1519
|
+
]), options === null || options === void 0 ? void 0 : options.crit, _this._protectedHeader, joseHeader);
|
|
1520
|
+
b64 = true;
|
|
1521
|
+
if (extensions.has("b64")) {
|
|
1522
|
+
b64 = _this._protectedHeader.b64;
|
|
1523
|
+
if (typeof b64 !== "boolean") {
|
|
1524
|
+
throw new JWSInvalid('The "b64" (base64url-encode payload) Header Parameter must be a boolean');
|
|
1525
|
+
}
|
|
1526
|
+
}
|
|
1527
|
+
alg = joseHeader.alg;
|
|
1528
|
+
if (typeof alg !== "string" || !alg) {
|
|
1529
|
+
throw new JWSInvalid('JWS "alg" (Algorithm) Header Parameter missing or invalid');
|
|
1530
|
+
}
|
|
1531
|
+
checkKeyTypeWithJwk(alg, key, "sign");
|
|
1532
|
+
payload = _this._payload;
|
|
1533
|
+
if (b64) {
|
|
1534
|
+
payload = encoder.encode(encode(payload));
|
|
1535
|
+
}
|
|
1536
|
+
if (_this._protectedHeader) {
|
|
1537
|
+
protectedHeader = encoder.encode(encode(JSON.stringify(_this._protectedHeader)));
|
|
1538
|
+
} else {
|
|
1539
|
+
protectedHeader = encoder.encode("");
|
|
1540
|
+
}
|
|
1541
|
+
data = concat(protectedHeader, encoder.encode("."), payload);
|
|
452
1542
|
return [
|
|
453
1543
|
4,
|
|
454
|
-
|
|
1544
|
+
sign_default(alg, key, data)
|
|
455
1545
|
];
|
|
456
1546
|
case 1:
|
|
457
|
-
|
|
1547
|
+
signature = _state.sent();
|
|
1548
|
+
jws = {
|
|
1549
|
+
signature: encode(signature),
|
|
1550
|
+
payload: ""
|
|
1551
|
+
};
|
|
1552
|
+
if (b64) {
|
|
1553
|
+
jws.payload = decoder.decode(payload);
|
|
1554
|
+
}
|
|
1555
|
+
if (_this._unprotectedHeader) {
|
|
1556
|
+
jws.header = _this._unprotectedHeader;
|
|
1557
|
+
}
|
|
1558
|
+
if (_this._protectedHeader) {
|
|
1559
|
+
jws.protected = decoder.decode(protectedHeader);
|
|
1560
|
+
}
|
|
458
1561
|
return [
|
|
459
1562
|
2,
|
|
460
|
-
|
|
1563
|
+
jws
|
|
461
1564
|
];
|
|
462
1565
|
}
|
|
463
1566
|
});
|
|
464
1567
|
})();
|
|
465
1568
|
}
|
|
1569
|
+
}
|
|
1570
|
+
]);
|
|
1571
|
+
return _FlattenedSign;
|
|
1572
|
+
}();
|
|
1573
|
+
__name(_FlattenedSign, "FlattenedSign");
|
|
1574
|
+
var FlattenedSign = _FlattenedSign;
|
|
1575
|
+
// node_modules/jose/dist/node/esm/jws/compact/sign.js
|
|
1576
|
+
var _CompactSign = /*#__PURE__*/ function() {
|
|
1577
|
+
"use strict";
|
|
1578
|
+
function _CompactSign(payload) {
|
|
1579
|
+
_class_call_check(this, _CompactSign);
|
|
1580
|
+
__publicField(this, "_flattened");
|
|
1581
|
+
this._flattened = new FlattenedSign(payload);
|
|
1582
|
+
}
|
|
1583
|
+
_create_class(_CompactSign, [
|
|
1584
|
+
{
|
|
1585
|
+
key: "setProtectedHeader",
|
|
1586
|
+
value: function setProtectedHeader(protectedHeader) {
|
|
1587
|
+
this._flattened.setProtectedHeader(protectedHeader);
|
|
1588
|
+
return this;
|
|
1589
|
+
}
|
|
466
1590
|
},
|
|
467
1591
|
{
|
|
468
|
-
key: "
|
|
469
|
-
value: function
|
|
1592
|
+
key: "sign",
|
|
1593
|
+
value: function sign(key, options) {
|
|
470
1594
|
var _this = this;
|
|
471
1595
|
return _async_to_generator(function() {
|
|
472
|
-
var
|
|
1596
|
+
var jws;
|
|
473
1597
|
return _ts_generator(this, function(_state) {
|
|
474
1598
|
switch(_state.label){
|
|
475
1599
|
case 0:
|
|
476
1600
|
return [
|
|
477
1601
|
4,
|
|
478
|
-
_this.
|
|
1602
|
+
_this._flattened.sign(key, options)
|
|
479
1603
|
];
|
|
480
1604
|
case 1:
|
|
481
|
-
|
|
1605
|
+
jws = _state.sent();
|
|
1606
|
+
if (jws.payload === void 0) {
|
|
1607
|
+
throw new TypeError("use the flattened module for creating JWS with b64: false");
|
|
1608
|
+
}
|
|
482
1609
|
return [
|
|
483
1610
|
2,
|
|
484
|
-
|
|
1611
|
+
"".concat(jws.protected, ".").concat(jws.payload, ".").concat(jws.signature)
|
|
485
1612
|
];
|
|
486
1613
|
}
|
|
487
1614
|
});
|
|
488
1615
|
})();
|
|
489
1616
|
}
|
|
1617
|
+
}
|
|
1618
|
+
]);
|
|
1619
|
+
return _CompactSign;
|
|
1620
|
+
}();
|
|
1621
|
+
__name(_CompactSign, "CompactSign");
|
|
1622
|
+
var CompactSign = _CompactSign;
|
|
1623
|
+
// node_modules/jose/dist/node/esm/jwt/produce.js
|
|
1624
|
+
function validateInput(label, input) {
|
|
1625
|
+
if (!Number.isFinite(input)) {
|
|
1626
|
+
throw new TypeError("Invalid ".concat(label, " input"));
|
|
1627
|
+
}
|
|
1628
|
+
return input;
|
|
1629
|
+
}
|
|
1630
|
+
__name(validateInput, "validateInput");
|
|
1631
|
+
var _ProduceJWT = /*#__PURE__*/ function() {
|
|
1632
|
+
"use strict";
|
|
1633
|
+
function _ProduceJWT() {
|
|
1634
|
+
var payload = arguments.length > 0 && arguments[0] !== void 0 ? arguments[0] : {};
|
|
1635
|
+
_class_call_check(this, _ProduceJWT);
|
|
1636
|
+
__publicField(this, "_payload");
|
|
1637
|
+
if (!isObject(payload)) {
|
|
1638
|
+
throw new TypeError("JWT Claims Set MUST be an object");
|
|
1639
|
+
}
|
|
1640
|
+
this._payload = payload;
|
|
1641
|
+
}
|
|
1642
|
+
_create_class(_ProduceJWT, [
|
|
1643
|
+
{
|
|
1644
|
+
key: "setIssuer",
|
|
1645
|
+
value: function setIssuer(issuer) {
|
|
1646
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1647
|
+
iss: issuer
|
|
1648
|
+
});
|
|
1649
|
+
return this;
|
|
1650
|
+
}
|
|
1651
|
+
},
|
|
1652
|
+
{
|
|
1653
|
+
key: "setSubject",
|
|
1654
|
+
value: function setSubject(subject) {
|
|
1655
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1656
|
+
sub: subject
|
|
1657
|
+
});
|
|
1658
|
+
return this;
|
|
1659
|
+
}
|
|
1660
|
+
},
|
|
1661
|
+
{
|
|
1662
|
+
key: "setAudience",
|
|
1663
|
+
value: function setAudience(audience) {
|
|
1664
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1665
|
+
aud: audience
|
|
1666
|
+
});
|
|
1667
|
+
return this;
|
|
1668
|
+
}
|
|
1669
|
+
},
|
|
1670
|
+
{
|
|
1671
|
+
key: "setJti",
|
|
1672
|
+
value: function setJti(jwtId) {
|
|
1673
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1674
|
+
jti: jwtId
|
|
1675
|
+
});
|
|
1676
|
+
return this;
|
|
1677
|
+
}
|
|
490
1678
|
},
|
|
491
1679
|
{
|
|
492
|
-
key: "
|
|
493
|
-
value: function
|
|
1680
|
+
key: "setNotBefore",
|
|
1681
|
+
value: function setNotBefore(input) {
|
|
1682
|
+
if (typeof input === "number") {
|
|
1683
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1684
|
+
nbf: validateInput("setNotBefore", input)
|
|
1685
|
+
});
|
|
1686
|
+
} else if (_instanceof(input, Date)) {
|
|
1687
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1688
|
+
nbf: validateInput("setNotBefore", epoch_default(input))
|
|
1689
|
+
});
|
|
1690
|
+
} else {
|
|
1691
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1692
|
+
nbf: epoch_default(/* @__PURE__ */ new Date()) + secs_default(input)
|
|
1693
|
+
});
|
|
1694
|
+
}
|
|
1695
|
+
return this;
|
|
1696
|
+
}
|
|
1697
|
+
},
|
|
1698
|
+
{
|
|
1699
|
+
key: "setExpirationTime",
|
|
1700
|
+
value: function setExpirationTime(input) {
|
|
1701
|
+
if (typeof input === "number") {
|
|
1702
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1703
|
+
exp: validateInput("setExpirationTime", input)
|
|
1704
|
+
});
|
|
1705
|
+
} else if (_instanceof(input, Date)) {
|
|
1706
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1707
|
+
exp: validateInput("setExpirationTime", epoch_default(input))
|
|
1708
|
+
});
|
|
1709
|
+
} else {
|
|
1710
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1711
|
+
exp: epoch_default(/* @__PURE__ */ new Date()) + secs_default(input)
|
|
1712
|
+
});
|
|
1713
|
+
}
|
|
1714
|
+
return this;
|
|
1715
|
+
}
|
|
1716
|
+
},
|
|
1717
|
+
{
|
|
1718
|
+
key: "setIssuedAt",
|
|
1719
|
+
value: function setIssuedAt(input) {
|
|
1720
|
+
if (typeof input === "undefined") {
|
|
1721
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1722
|
+
iat: epoch_default(/* @__PURE__ */ new Date())
|
|
1723
|
+
});
|
|
1724
|
+
} else if (_instanceof(input, Date)) {
|
|
1725
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1726
|
+
iat: validateInput("setIssuedAt", epoch_default(input))
|
|
1727
|
+
});
|
|
1728
|
+
} else if (typeof input === "string") {
|
|
1729
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1730
|
+
iat: validateInput("setIssuedAt", epoch_default(/* @__PURE__ */ new Date()) + secs_default(input))
|
|
1731
|
+
});
|
|
1732
|
+
} else {
|
|
1733
|
+
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1734
|
+
iat: validateInput("setIssuedAt", input)
|
|
1735
|
+
});
|
|
1736
|
+
}
|
|
1737
|
+
return this;
|
|
1738
|
+
}
|
|
1739
|
+
}
|
|
1740
|
+
]);
|
|
1741
|
+
return _ProduceJWT;
|
|
1742
|
+
}();
|
|
1743
|
+
__name(_ProduceJWT, "ProduceJWT");
|
|
1744
|
+
var ProduceJWT = _ProduceJWT;
|
|
1745
|
+
// node_modules/jose/dist/node/esm/jwt/sign.js
|
|
1746
|
+
var _SignJWT = /*#__PURE__*/ function(ProduceJWT) {
|
|
1747
|
+
"use strict";
|
|
1748
|
+
_inherits(_SignJWT, ProduceJWT);
|
|
1749
|
+
var _super = _create_super(_SignJWT);
|
|
1750
|
+
function _SignJWT() {
|
|
1751
|
+
_class_call_check(this, _SignJWT);
|
|
1752
|
+
var _this;
|
|
1753
|
+
_this = _super.call.apply(_super, [
|
|
1754
|
+
this
|
|
1755
|
+
].concat(Array.prototype.slice.call(arguments)));
|
|
1756
|
+
__publicField(_assert_this_initialized(_this), "_protectedHeader");
|
|
1757
|
+
return _this;
|
|
1758
|
+
}
|
|
1759
|
+
_create_class(_SignJWT, [
|
|
1760
|
+
{
|
|
1761
|
+
key: "setProtectedHeader",
|
|
1762
|
+
value: function setProtectedHeader(protectedHeader) {
|
|
1763
|
+
this._protectedHeader = protectedHeader;
|
|
1764
|
+
return this;
|
|
1765
|
+
}
|
|
1766
|
+
},
|
|
1767
|
+
{
|
|
1768
|
+
key: "sign",
|
|
1769
|
+
value: function sign(key, options) {
|
|
494
1770
|
var _this = this;
|
|
495
1771
|
return _async_to_generator(function() {
|
|
496
|
-
var
|
|
1772
|
+
var _this__protectedHeader, sig;
|
|
497
1773
|
return _ts_generator(this, function(_state) {
|
|
498
|
-
|
|
499
|
-
|
|
1774
|
+
sig = new CompactSign(encoder.encode(JSON.stringify(_this._payload)));
|
|
1775
|
+
sig.setProtectedHeader(_this._protectedHeader);
|
|
1776
|
+
if (Array.isArray((_this__protectedHeader = _this._protectedHeader) === null || _this__protectedHeader === void 0 ? void 0 : _this__protectedHeader.crit) && _this._protectedHeader.crit.includes("b64") && _this._protectedHeader.b64 === false) {
|
|
1777
|
+
throw new JWTInvalid("JWTs MUST NOT use unencoded payload");
|
|
1778
|
+
}
|
|
1779
|
+
return [
|
|
1780
|
+
2,
|
|
1781
|
+
sig.sign(key, options)
|
|
1782
|
+
];
|
|
1783
|
+
});
|
|
1784
|
+
})();
|
|
1785
|
+
}
|
|
1786
|
+
}
|
|
1787
|
+
]);
|
|
1788
|
+
return _SignJWT;
|
|
1789
|
+
}(ProduceJWT);
|
|
1790
|
+
__name(_SignJWT, "SignJWT");
|
|
1791
|
+
var SignJWT = _SignJWT;
|
|
1792
|
+
// node_modules/jose/dist/node/esm/util/base64url.js
|
|
1793
|
+
var base64url_exports = {};
|
|
1794
|
+
__export(base64url_exports, {
|
|
1795
|
+
decode: function() {
|
|
1796
|
+
return decode2;
|
|
1797
|
+
},
|
|
1798
|
+
encode: function() {
|
|
1799
|
+
return encode2;
|
|
1800
|
+
}
|
|
1801
|
+
});
|
|
1802
|
+
var encode2 = encode;
|
|
1803
|
+
var decode2 = decode;
|
|
1804
|
+
// node_modules/jose/dist/node/esm/runtime/generate.js
|
|
1805
|
+
import { createSecretKey as createSecretKey2, generateKeyPair as generateKeyPairCb } from "crypto";
|
|
1806
|
+
import { promisify as promisify2 } from "util";
|
|
1807
|
+
var generate = promisify2(generateKeyPairCb);
|
|
1808
|
+
function generateKeyPair(alg, options) {
|
|
1809
|
+
return _generateKeyPair.apply(this, arguments);
|
|
1810
|
+
}
|
|
1811
|
+
function _generateKeyPair() {
|
|
1812
|
+
_generateKeyPair = _async_to_generator(function(alg, options) {
|
|
1813
|
+
var _options_modulusLength, modulusLength, keypair, _options_crv, crv;
|
|
1814
|
+
return _ts_generator(this, function(_state) {
|
|
1815
|
+
switch(_state.label){
|
|
1816
|
+
case 0:
|
|
1817
|
+
switch(alg){
|
|
1818
|
+
case "RS256":
|
|
1819
|
+
return [
|
|
1820
|
+
3,
|
|
1821
|
+
1
|
|
1822
|
+
];
|
|
1823
|
+
case "RS384":
|
|
1824
|
+
return [
|
|
1825
|
+
3,
|
|
1826
|
+
1
|
|
1827
|
+
];
|
|
1828
|
+
case "RS512":
|
|
1829
|
+
return [
|
|
1830
|
+
3,
|
|
1831
|
+
1
|
|
1832
|
+
];
|
|
1833
|
+
case "PS256":
|
|
1834
|
+
return [
|
|
1835
|
+
3,
|
|
1836
|
+
1
|
|
1837
|
+
];
|
|
1838
|
+
case "PS384":
|
|
1839
|
+
return [
|
|
1840
|
+
3,
|
|
1841
|
+
1
|
|
1842
|
+
];
|
|
1843
|
+
case "PS512":
|
|
1844
|
+
return [
|
|
1845
|
+
3,
|
|
1846
|
+
1
|
|
1847
|
+
];
|
|
1848
|
+
case "RSA-OAEP":
|
|
1849
|
+
return [
|
|
1850
|
+
3,
|
|
1851
|
+
1
|
|
1852
|
+
];
|
|
1853
|
+
case "RSA-OAEP-256":
|
|
1854
|
+
return [
|
|
1855
|
+
3,
|
|
1856
|
+
1
|
|
1857
|
+
];
|
|
1858
|
+
case "RSA-OAEP-384":
|
|
1859
|
+
return [
|
|
1860
|
+
3,
|
|
1861
|
+
1
|
|
1862
|
+
];
|
|
1863
|
+
case "RSA-OAEP-512":
|
|
1864
|
+
return [
|
|
1865
|
+
3,
|
|
1866
|
+
1
|
|
1867
|
+
];
|
|
1868
|
+
case "RSA1_5":
|
|
1869
|
+
return [
|
|
1870
|
+
3,
|
|
1871
|
+
1
|
|
1872
|
+
];
|
|
1873
|
+
case "ES256":
|
|
1874
|
+
return [
|
|
1875
|
+
3,
|
|
1876
|
+
3
|
|
1877
|
+
];
|
|
1878
|
+
case "ES256K":
|
|
1879
|
+
return [
|
|
1880
|
+
3,
|
|
1881
|
+
4
|
|
1882
|
+
];
|
|
1883
|
+
case "ES384":
|
|
1884
|
+
return [
|
|
1885
|
+
3,
|
|
1886
|
+
5
|
|
1887
|
+
];
|
|
1888
|
+
case "ES512":
|
|
1889
|
+
return [
|
|
1890
|
+
3,
|
|
1891
|
+
6
|
|
1892
|
+
];
|
|
1893
|
+
case "Ed25519":
|
|
1894
|
+
return [
|
|
1895
|
+
3,
|
|
1896
|
+
7
|
|
1897
|
+
];
|
|
1898
|
+
case "EdDSA":
|
|
1899
|
+
return [
|
|
1900
|
+
3,
|
|
1901
|
+
8
|
|
1902
|
+
];
|
|
1903
|
+
case "ECDH-ES":
|
|
1904
|
+
return [
|
|
1905
|
+
3,
|
|
1906
|
+
9
|
|
1907
|
+
];
|
|
1908
|
+
case "ECDH-ES+A128KW":
|
|
1909
|
+
return [
|
|
1910
|
+
3,
|
|
1911
|
+
9
|
|
1912
|
+
];
|
|
1913
|
+
case "ECDH-ES+A192KW":
|
|
1914
|
+
return [
|
|
1915
|
+
3,
|
|
1916
|
+
9
|
|
1917
|
+
];
|
|
1918
|
+
case "ECDH-ES+A256KW":
|
|
1919
|
+
return [
|
|
1920
|
+
3,
|
|
1921
|
+
9
|
|
1922
|
+
];
|
|
1923
|
+
}
|
|
1924
|
+
return [
|
|
1925
|
+
3,
|
|
1926
|
+
10
|
|
1927
|
+
];
|
|
1928
|
+
case 1:
|
|
1929
|
+
modulusLength = (_options_modulusLength = options === null || options === void 0 ? void 0 : options.modulusLength) !== null && _options_modulusLength !== void 0 ? _options_modulusLength : 2048;
|
|
1930
|
+
if (typeof modulusLength !== "number" || modulusLength < 2048) {
|
|
1931
|
+
throw new JOSENotSupported("Invalid or unsupported modulusLength option provided, 2048 bits or larger keys must be used");
|
|
1932
|
+
}
|
|
1933
|
+
return [
|
|
1934
|
+
4,
|
|
1935
|
+
generate("rsa", {
|
|
1936
|
+
modulusLength: modulusLength,
|
|
1937
|
+
publicExponent: 65537
|
|
1938
|
+
})
|
|
1939
|
+
];
|
|
1940
|
+
case 2:
|
|
1941
|
+
keypair = _state.sent();
|
|
1942
|
+
return [
|
|
1943
|
+
2,
|
|
1944
|
+
keypair
|
|
1945
|
+
];
|
|
1946
|
+
case 3:
|
|
1947
|
+
return [
|
|
1948
|
+
2,
|
|
1949
|
+
generate("ec", {
|
|
1950
|
+
namedCurve: "P-256"
|
|
1951
|
+
})
|
|
1952
|
+
];
|
|
1953
|
+
case 4:
|
|
1954
|
+
return [
|
|
1955
|
+
2,
|
|
1956
|
+
generate("ec", {
|
|
1957
|
+
namedCurve: "secp256k1"
|
|
1958
|
+
})
|
|
1959
|
+
];
|
|
1960
|
+
case 5:
|
|
1961
|
+
return [
|
|
1962
|
+
2,
|
|
1963
|
+
generate("ec", {
|
|
1964
|
+
namedCurve: "P-384"
|
|
1965
|
+
})
|
|
1966
|
+
];
|
|
1967
|
+
case 6:
|
|
1968
|
+
return [
|
|
1969
|
+
2,
|
|
1970
|
+
generate("ec", {
|
|
1971
|
+
namedCurve: "P-521"
|
|
1972
|
+
})
|
|
1973
|
+
];
|
|
1974
|
+
case 7:
|
|
1975
|
+
return [
|
|
1976
|
+
2,
|
|
1977
|
+
generate("ed25519")
|
|
1978
|
+
];
|
|
1979
|
+
case 8:
|
|
1980
|
+
{
|
|
1981
|
+
switch(options === null || options === void 0 ? void 0 : options.crv){
|
|
1982
|
+
case void 0:
|
|
1983
|
+
case "Ed25519":
|
|
500
1984
|
return [
|
|
501
|
-
|
|
502
|
-
|
|
1985
|
+
2,
|
|
1986
|
+
generate("ed25519")
|
|
503
1987
|
];
|
|
504
|
-
case
|
|
505
|
-
finalParams = _state.sent();
|
|
1988
|
+
case "Ed448":
|
|
506
1989
|
return [
|
|
507
1990
|
2,
|
|
508
|
-
|
|
1991
|
+
generate("ed448")
|
|
509
1992
|
];
|
|
1993
|
+
default:
|
|
1994
|
+
throw new JOSENotSupported("Invalid or unsupported crv option provided, supported values are Ed25519 and Ed448");
|
|
510
1995
|
}
|
|
511
|
-
}
|
|
512
|
-
|
|
1996
|
+
}
|
|
1997
|
+
_state.label = 9;
|
|
1998
|
+
case 9:
|
|
1999
|
+
{
|
|
2000
|
+
;
|
|
2001
|
+
crv = (_options_crv = options === null || options === void 0 ? void 0 : options.crv) !== null && _options_crv !== void 0 ? _options_crv : "P-256";
|
|
2002
|
+
switch(crv){
|
|
2003
|
+
case void 0:
|
|
2004
|
+
case "P-256":
|
|
2005
|
+
case "P-384":
|
|
2006
|
+
case "P-521":
|
|
2007
|
+
return [
|
|
2008
|
+
2,
|
|
2009
|
+
generate("ec", {
|
|
2010
|
+
namedCurve: crv
|
|
2011
|
+
})
|
|
2012
|
+
];
|
|
2013
|
+
case "X25519":
|
|
2014
|
+
return [
|
|
2015
|
+
2,
|
|
2016
|
+
generate("x25519")
|
|
2017
|
+
];
|
|
2018
|
+
case "X448":
|
|
2019
|
+
return [
|
|
2020
|
+
2,
|
|
2021
|
+
generate("x448")
|
|
2022
|
+
];
|
|
2023
|
+
default:
|
|
2024
|
+
throw new JOSENotSupported("Invalid or unsupported crv option provided, supported values are P-256, P-384, P-521, X25519, and X448");
|
|
2025
|
+
}
|
|
2026
|
+
}
|
|
2027
|
+
_state.label = 10;
|
|
2028
|
+
case 10:
|
|
2029
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
2030
|
+
case 11:
|
|
2031
|
+
return [
|
|
2032
|
+
2
|
|
2033
|
+
];
|
|
513
2034
|
}
|
|
514
|
-
}
|
|
2035
|
+
});
|
|
2036
|
+
});
|
|
2037
|
+
return _generateKeyPair.apply(this, arguments);
|
|
2038
|
+
}
|
|
2039
|
+
__name(generateKeyPair, "generateKeyPair");
|
|
2040
|
+
function generateKeyPair2(alg, options) {
|
|
2041
|
+
return _generateKeyPair2.apply(this, arguments);
|
|
2042
|
+
}
|
|
2043
|
+
function _generateKeyPair2() {
|
|
2044
|
+
_generateKeyPair2 = // node_modules/jose/dist/node/esm/key/generate_key_pair.js
|
|
2045
|
+
_async_to_generator(function(alg, options) {
|
|
2046
|
+
return _ts_generator(this, function(_state) {
|
|
2047
|
+
return [
|
|
2048
|
+
2,
|
|
2049
|
+
generateKeyPair(alg, options)
|
|
2050
|
+
];
|
|
2051
|
+
});
|
|
2052
|
+
});
|
|
2053
|
+
return _generateKeyPair2.apply(this, arguments);
|
|
2054
|
+
}
|
|
2055
|
+
__name(generateKeyPair2, "generateKeyPair");
|
|
2056
|
+
// src/auth/adapters/dpop/JoseDpopAuthCredentialService.ts
|
|
2057
|
+
function _ts_decorate2(decorators, target, key, desc) {
|
|
2058
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
2059
|
+
if ((typeof Reflect === "undefined" ? "undefined" : _type_of(Reflect)) === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
2060
|
+
else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
2061
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
2062
|
+
}
|
|
2063
|
+
__name(_ts_decorate2, "_ts_decorate");
|
|
2064
|
+
var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredentialService) {
|
|
2065
|
+
"use strict";
|
|
2066
|
+
_inherits(_JoseDpopAuthCredentialService, BaseDpopAuthCredentialService);
|
|
2067
|
+
var _super = _create_super(_JoseDpopAuthCredentialService);
|
|
2068
|
+
function _JoseDpopAuthCredentialService() {
|
|
2069
|
+
_class_call_check(this, _JoseDpopAuthCredentialService);
|
|
2070
|
+
return _super.apply(this, arguments);
|
|
2071
|
+
}
|
|
2072
|
+
_create_class(_JoseDpopAuthCredentialService, [
|
|
515
2073
|
{
|
|
516
|
-
key: "
|
|
517
|
-
value: function
|
|
2074
|
+
key: "generateAuthKeyPair",
|
|
2075
|
+
value: function generateAuthKeyPair() {
|
|
518
2076
|
var _this = this;
|
|
519
2077
|
return _async_to_generator(function() {
|
|
520
|
-
var
|
|
2078
|
+
var _ref, publicKey, privateKey, publicJwk, privateJwk;
|
|
521
2079
|
return _ts_generator(this, function(_state) {
|
|
522
2080
|
switch(_state.label){
|
|
523
2081
|
case 0:
|
|
524
2082
|
return [
|
|
525
2083
|
4,
|
|
526
|
-
|
|
2084
|
+
generateKeyPair2("ES256")
|
|
527
2085
|
];
|
|
528
2086
|
case 1:
|
|
529
|
-
|
|
2087
|
+
_ref = _state.sent(), publicKey = _ref.publicKey, privateKey = _ref.privateKey;
|
|
530
2088
|
return [
|
|
531
|
-
|
|
532
|
-
|
|
2089
|
+
4,
|
|
2090
|
+
exportJWK(publicKey)
|
|
2091
|
+
];
|
|
2092
|
+
case 2:
|
|
2093
|
+
publicJwk = _state.sent();
|
|
2094
|
+
return [
|
|
2095
|
+
4,
|
|
2096
|
+
exportJWK(privateKey)
|
|
2097
|
+
];
|
|
2098
|
+
case 3:
|
|
2099
|
+
privateJwk = _state.sent();
|
|
2100
|
+
return [
|
|
2101
|
+
4,
|
|
2102
|
+
_this.setAuthKeyPair({
|
|
2103
|
+
publicJwk: publicJwk,
|
|
2104
|
+
privateJwk: privateJwk
|
|
2105
|
+
})
|
|
2106
|
+
];
|
|
2107
|
+
case 4:
|
|
2108
|
+
_state.sent();
|
|
2109
|
+
return [
|
|
2110
|
+
2
|
|
533
2111
|
];
|
|
534
2112
|
}
|
|
535
2113
|
});
|
|
@@ -537,23 +2115,30 @@ var _SsoAuthenticatedHttpClient = /*#__PURE__*/ function() {
|
|
|
537
2115
|
}
|
|
538
2116
|
},
|
|
539
2117
|
{
|
|
540
|
-
key: "
|
|
541
|
-
value: function
|
|
2118
|
+
key: "setAuthKeyPair",
|
|
2119
|
+
value: function setAuthKeyPair(keyPair) {
|
|
542
2120
|
var _this = this;
|
|
543
2121
|
return _async_to_generator(function() {
|
|
544
|
-
var
|
|
2122
|
+
var privateJwk, _, _1, _tmp;
|
|
545
2123
|
return _ts_generator(this, function(_state) {
|
|
546
2124
|
switch(_state.label){
|
|
547
2125
|
case 0:
|
|
2126
|
+
privateJwk = keyPair.privateJwk;
|
|
2127
|
+
_this.cacheService.set("keyPair", keyPair);
|
|
2128
|
+
_1 = (_ = _this.cacheService).set;
|
|
2129
|
+
_tmp = [
|
|
2130
|
+
"privateKey"
|
|
2131
|
+
];
|
|
548
2132
|
return [
|
|
549
2133
|
4,
|
|
550
|
-
_this.
|
|
2134
|
+
_this.importPrivateKey(privateJwk)
|
|
551
2135
|
];
|
|
552
2136
|
case 1:
|
|
553
|
-
|
|
2137
|
+
_1.apply(_, _tmp.concat([
|
|
2138
|
+
_state.sent()
|
|
2139
|
+
]));
|
|
554
2140
|
return [
|
|
555
|
-
2
|
|
556
|
-
_this.httpClient.delete(path, finalParams)
|
|
2141
|
+
2
|
|
557
2142
|
];
|
|
558
2143
|
}
|
|
559
2144
|
});
|
|
@@ -561,23 +2146,73 @@ var _SsoAuthenticatedHttpClient = /*#__PURE__*/ function() {
|
|
|
561
2146
|
}
|
|
562
2147
|
},
|
|
563
2148
|
{
|
|
564
|
-
key: "
|
|
565
|
-
value: function
|
|
2149
|
+
key: "getAuthPrivateKey",
|
|
2150
|
+
value: function getAuthPrivateKey() {
|
|
2151
|
+
return this.cacheService.get("privateKey");
|
|
2152
|
+
}
|
|
2153
|
+
},
|
|
2154
|
+
{
|
|
2155
|
+
key: "createProofToken",
|
|
2156
|
+
value: function createProofToken(method, resourceUrl) {
|
|
566
2157
|
var _this = this;
|
|
567
2158
|
return _async_to_generator(function() {
|
|
568
|
-
var
|
|
2159
|
+
var keyPair, importedPrivateKey, publicJwk, now, url, jwt, _, _tmp;
|
|
569
2160
|
return _ts_generator(this, function(_state) {
|
|
570
2161
|
switch(_state.label){
|
|
571
2162
|
case 0:
|
|
2163
|
+
keyPair = _this.getAuthKeyPair();
|
|
2164
|
+
importedPrivateKey = _this.getAuthPrivateKey();
|
|
2165
|
+
if (!!keyPair) return [
|
|
2166
|
+
3,
|
|
2167
|
+
2
|
|
2168
|
+
];
|
|
572
2169
|
return [
|
|
573
2170
|
4,
|
|
574
|
-
_this.
|
|
2171
|
+
_this.generateAuthKeyPair()
|
|
575
2172
|
];
|
|
576
2173
|
case 1:
|
|
577
|
-
|
|
2174
|
+
_state.sent();
|
|
2175
|
+
keyPair = _this.getAuthKeyPair();
|
|
2176
|
+
importedPrivateKey = _this.getAuthPrivateKey();
|
|
2177
|
+
_state.label = 2;
|
|
2178
|
+
case 2:
|
|
2179
|
+
publicJwk = keyPair.publicJwk;
|
|
2180
|
+
if (!publicJwk) {
|
|
2181
|
+
throw new Error("Auth keys not found");
|
|
2182
|
+
}
|
|
2183
|
+
now = Math.floor(Date.now() / 1e3);
|
|
2184
|
+
url = new URL(resourceUrl);
|
|
2185
|
+
if (!publicJwk.kty) {
|
|
2186
|
+
throw new Error("Invalid public key: missing kty property");
|
|
2187
|
+
}
|
|
2188
|
+
_ = SignJWT.bind;
|
|
2189
|
+
_tmp = {
|
|
2190
|
+
htm: method,
|
|
2191
|
+
htu: url.origin + url.pathname,
|
|
2192
|
+
jti: uuidv4(),
|
|
2193
|
+
iat: now
|
|
2194
|
+
};
|
|
2195
|
+
return [
|
|
2196
|
+
4,
|
|
2197
|
+
_this.getAth()
|
|
2198
|
+
];
|
|
2199
|
+
case 3:
|
|
2200
|
+
jwt = (new (_.apply(SignJWT, [
|
|
2201
|
+
void 0,
|
|
2202
|
+
(_tmp.ath = _state.sent(), _tmp)
|
|
2203
|
+
]))).setProtectedHeader({
|
|
2204
|
+
alg: "ES256",
|
|
2205
|
+
typ: "dpop+jwt",
|
|
2206
|
+
jwk: publicJwk
|
|
2207
|
+
});
|
|
2208
|
+
return [
|
|
2209
|
+
4,
|
|
2210
|
+
jwt.sign(importedPrivateKey)
|
|
2211
|
+
];
|
|
2212
|
+
case 4:
|
|
578
2213
|
return [
|
|
579
2214
|
2,
|
|
580
|
-
|
|
2215
|
+
_state.sent()
|
|
581
2216
|
];
|
|
582
2217
|
}
|
|
583
2218
|
});
|
|
@@ -585,41 +2220,32 @@ var _SsoAuthenticatedHttpClient = /*#__PURE__*/ function() {
|
|
|
585
2220
|
}
|
|
586
2221
|
},
|
|
587
2222
|
{
|
|
588
|
-
key: "
|
|
589
|
-
value: function
|
|
590
|
-
var noContentType = arguments.length > 2 && arguments[2] !== void 0 ? arguments[2] : false;
|
|
2223
|
+
key: "generateAth",
|
|
2224
|
+
value: function generateAth() {
|
|
591
2225
|
var _this = this;
|
|
592
2226
|
return _async_to_generator(function() {
|
|
593
|
-
var accessToken,
|
|
2227
|
+
var accessToken, crypto3, hash, ath;
|
|
594
2228
|
return _ts_generator(this, function(_state) {
|
|
595
2229
|
switch(_state.label){
|
|
596
2230
|
case 0:
|
|
2231
|
+
accessToken = _this.getCachedAuthToken();
|
|
2232
|
+
if (!accessToken) return [
|
|
2233
|
+
2,
|
|
2234
|
+
void 0
|
|
2235
|
+
];
|
|
597
2236
|
return [
|
|
598
2237
|
4,
|
|
599
|
-
|
|
2238
|
+
import("crypto")
|
|
600
2239
|
];
|
|
601
2240
|
case 1:
|
|
602
|
-
|
|
603
|
-
|
|
604
|
-
|
|
605
|
-
|
|
606
|
-
|
|
607
|
-
"Content-Type",
|
|
608
|
-
"application/json"
|
|
609
|
-
]
|
|
610
|
-
] : []));
|
|
611
|
-
if (!hasAuthorizationHeader) {
|
|
612
|
-
headers.push([
|
|
613
|
-
"Authorization",
|
|
614
|
-
"SSO ".concat(accessToken)
|
|
615
|
-
]);
|
|
616
|
-
}
|
|
2241
|
+
crypto3 = _state.sent();
|
|
2242
|
+
hash = crypto3.createHash("sha256");
|
|
2243
|
+
hash.update(accessToken);
|
|
2244
|
+
ath = base64url_exports.encode(new Uint8Array(hash.digest()));
|
|
2245
|
+
_this.cacheService.set("ath", ath);
|
|
617
2246
|
return [
|
|
618
2247
|
2,
|
|
619
|
-
|
|
620
|
-
method: method,
|
|
621
|
-
headers: Object.fromEntries(headers)
|
|
622
|
-
})
|
|
2248
|
+
ath
|
|
623
2249
|
];
|
|
624
2250
|
}
|
|
625
2251
|
});
|
|
@@ -627,30 +2253,23 @@ var _SsoAuthenticatedHttpClient = /*#__PURE__*/ function() {
|
|
|
627
2253
|
}
|
|
628
2254
|
},
|
|
629
2255
|
{
|
|
630
|
-
key: "
|
|
631
|
-
value: function
|
|
632
|
-
var _this = this;
|
|
2256
|
+
key: "importPrivateKey",
|
|
2257
|
+
value: function importPrivateKey(privateJwk) {
|
|
633
2258
|
return _async_to_generator(function() {
|
|
634
|
-
var handler, accessToken;
|
|
635
2259
|
return _ts_generator(this, function(_state) {
|
|
636
2260
|
switch(_state.label){
|
|
637
2261
|
case 0:
|
|
638
|
-
|
|
639
|
-
|
|
640
|
-
throw new Error("No SSO access token handler set");
|
|
2262
|
+
if (!privateJwk.kty) {
|
|
2263
|
+
throw new Error("Invalid private key: missing kty property");
|
|
641
2264
|
}
|
|
642
2265
|
return [
|
|
643
2266
|
4,
|
|
644
|
-
|
|
2267
|
+
importJWK(privateJwk, "ES256")
|
|
645
2268
|
];
|
|
646
2269
|
case 1:
|
|
647
|
-
accessToken = _state.sent().accessToken;
|
|
648
|
-
if (!accessToken) {
|
|
649
|
-
throw new Error("No SSO access token was returned from handler");
|
|
650
|
-
}
|
|
651
2270
|
return [
|
|
652
2271
|
2,
|
|
653
|
-
|
|
2272
|
+
_state.sent()
|
|
654
2273
|
];
|
|
655
2274
|
}
|
|
656
2275
|
});
|
|
@@ -658,81 +2277,47 @@ var _SsoAuthenticatedHttpClient = /*#__PURE__*/ function() {
|
|
|
658
2277
|
}
|
|
659
2278
|
}
|
|
660
2279
|
]);
|
|
661
|
-
return
|
|
662
|
-
}();
|
|
663
|
-
__name(
|
|
664
|
-
var
|
|
665
|
-
_ts_decorate2([
|
|
666
|
-
inject(ITF_HTTP_CLIENT),
|
|
667
|
-
named("pinned"),
|
|
668
|
-
_ts_metadata("design:type", typeof iHttpClient === "undefined" ? Object : iHttpClient)
|
|
669
|
-
], SsoAuthenticatedHttpClient.prototype, "httpClient", void 0);
|
|
670
|
-
_ts_decorate2([
|
|
671
|
-
inject(ITF_SSO_ACCESS_TOKEN_SERVICE),
|
|
672
|
-
_ts_metadata("design:type", typeof iSsoAccessTokenService === "undefined" ? Object : iSsoAccessTokenService)
|
|
673
|
-
], SsoAuthenticatedHttpClient.prototype, "ssoAccessTokenService", void 0);
|
|
674
|
-
SsoAuthenticatedHttpClient = _ts_decorate2([
|
|
2280
|
+
return _JoseDpopAuthCredentialService;
|
|
2281
|
+
}(BaseDpopAuthCredentialService);
|
|
2282
|
+
__name(_JoseDpopAuthCredentialService, "JoseDpopAuthCredentialService");
|
|
2283
|
+
var JoseDpopAuthCredentialService = _JoseDpopAuthCredentialService;
|
|
2284
|
+
JoseDpopAuthCredentialService = _ts_decorate2([
|
|
675
2285
|
injectable2()
|
|
676
|
-
],
|
|
677
|
-
// src/auth/
|
|
678
|
-
|
|
679
|
-
|
|
680
|
-
|
|
681
|
-
|
|
682
|
-
|
|
683
|
-
|
|
684
|
-
|
|
685
|
-
|
|
686
|
-
|
|
687
|
-
|
|
688
|
-
|
|
689
|
-
|
|
690
|
-
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
return this._handler;
|
|
697
|
-
}
|
|
698
|
-
},
|
|
699
|
-
{
|
|
700
|
-
key: "setHandler",
|
|
701
|
-
value: function setHandler(handler) {
|
|
702
|
-
var _this = this;
|
|
703
|
-
return _async_to_generator(function() {
|
|
704
|
-
return _ts_generator(this, function(_state) {
|
|
705
|
-
_this._handler = handler;
|
|
706
|
-
return [
|
|
707
|
-
2
|
|
708
|
-
];
|
|
709
|
-
});
|
|
710
|
-
})();
|
|
711
|
-
}
|
|
712
|
-
}
|
|
713
|
-
]);
|
|
714
|
-
return _InMemSsoAccessTokenService;
|
|
715
|
-
}();
|
|
716
|
-
__name(_InMemSsoAccessTokenService, "InMemSsoAccessTokenService");
|
|
717
|
-
var InMemSsoAccessTokenService = _InMemSsoAccessTokenService;
|
|
718
|
-
InMemSsoAccessTokenService = _ts_decorate3([
|
|
719
|
-
injectable3()
|
|
720
|
-
], InMemSsoAccessTokenService);
|
|
2286
|
+
], JoseDpopAuthCredentialService);
|
|
2287
|
+
// src/auth/ioc/reactNativeAuthIOCModule.ts
|
|
2288
|
+
var reactNativeAuthIOCModule = new ContainerModule3(function(bind) {
|
|
2289
|
+
bind(ITF_AUTH_SERVICE).to(RestAuthService).inSingletonScope();
|
|
2290
|
+
bind(ITF_AUTH_CREDENTIAL_SERVICE).to(JoseDpopAuthCredentialService).inSingletonScope();
|
|
2291
|
+
bind(ITF_AUTHENTICATED_HTTP_CLIENT).to(M2mAuthenticatedHttpClient).inSingletonScope();
|
|
2292
|
+
});
|
|
2293
|
+
// src/ioc/reactNativeContainer.ts
|
|
2294
|
+
var reactNativeContainer = new Container();
|
|
2295
|
+
loadBaseContainerModules(reactNativeContainer);
|
|
2296
|
+
reactNativeContainer.unload(featureFlagsIOCModule);
|
|
2297
|
+
reactNativeContainer.unload(commonIOCModule);
|
|
2298
|
+
reactNativeContainer.unload(authIOCModule);
|
|
2299
|
+
reactNativeContainer.load(reactNativeFeatureFlagsIOCModule);
|
|
2300
|
+
reactNativeContainer.load(reactNativeCommonIOCModule);
|
|
2301
|
+
reactNativeContainer.load(reactNativeAuthIOCModule);
|
|
2302
|
+
// src/ioc/wlaReactNativeContainer.ts
|
|
2303
|
+
import { Container as Container2 } from "inversify";
|
|
2304
|
+
// src/auth/ioc/wlaReactNativeAuthIOCModule.ts
|
|
2305
|
+
import { ContainerModule as ContainerModule4 } from "inversify";
|
|
721
2306
|
// src/http-client/adapters/PinnedReactNativeFetchHttpClient.ts
|
|
722
|
-
import { inject
|
|
2307
|
+
import { inject, injectable as injectable3 } from "inversify";
|
|
723
2308
|
import { Platform } from "react-native";
|
|
724
2309
|
import { fetch as rnFetch } from "react-native-ssl-pinning";
|
|
725
|
-
function
|
|
2310
|
+
function _ts_decorate3(decorators, target, key, desc) {
|
|
726
2311
|
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
727
2312
|
if ((typeof Reflect === "undefined" ? "undefined" : _type_of(Reflect)) === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
728
2313
|
else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
729
2314
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
730
2315
|
}
|
|
731
|
-
__name(
|
|
732
|
-
function
|
|
2316
|
+
__name(_ts_decorate3, "_ts_decorate");
|
|
2317
|
+
function _ts_metadata(k, v) {
|
|
733
2318
|
if ((typeof Reflect === "undefined" ? "undefined" : _type_of(Reflect)) === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
734
2319
|
}
|
|
735
|
-
__name(
|
|
2320
|
+
__name(_ts_metadata, "_ts_metadata");
|
|
736
2321
|
var _PinnedReactNativeFetchHttpClient = /*#__PURE__*/ function(BaseHttpClient) {
|
|
737
2322
|
"use strict";
|
|
738
2323
|
_inherits(_PinnedReactNativeFetchHttpClient, BaseHttpClient);
|
|
@@ -952,15 +2537,15 @@ var _PinnedReactNativeFetchHttpClient = /*#__PURE__*/ function(BaseHttpClient) {
|
|
|
952
2537
|
}(BaseHttpClient);
|
|
953
2538
|
__name(_PinnedReactNativeFetchHttpClient, "PinnedReactNativeFetchHttpClient");
|
|
954
2539
|
var PinnedReactNativeFetchHttpClient = _PinnedReactNativeFetchHttpClient;
|
|
955
|
-
|
|
956
|
-
|
|
957
|
-
|
|
2540
|
+
_ts_decorate3([
|
|
2541
|
+
inject(INTR_GET_ENV_CONFIG_VALUE_BY_NAME),
|
|
2542
|
+
_ts_metadata("design:type", typeof GetEnvConfigValueByName === "undefined" ? Object : GetEnvConfigValueByName)
|
|
958
2543
|
], PinnedReactNativeFetchHttpClient.prototype, "getEnvConfigValueByName", void 0);
|
|
959
|
-
PinnedReactNativeFetchHttpClient =
|
|
960
|
-
|
|
2544
|
+
PinnedReactNativeFetchHttpClient = _ts_decorate3([
|
|
2545
|
+
injectable3()
|
|
961
2546
|
], PinnedReactNativeFetchHttpClient);
|
|
962
2547
|
// src/auth/ioc/wlaReactNativeAuthIOCModule.ts
|
|
963
|
-
var wlaReactNativeAuthIOCModule = new
|
|
2548
|
+
var wlaReactNativeAuthIOCModule = new ContainerModule4(function(bind) {
|
|
964
2549
|
bind(ITF_AUTHENTICATED_HTTP_CLIENT).to(SsoAuthenticatedHttpClient).inSingletonScope();
|
|
965
2550
|
bind(ITF_SSO_ACCESS_TOKEN_SERVICE).to(InMemSsoAccessTokenService).inSingletonScope();
|
|
966
2551
|
bind(ITF_HTTP_CLIENT).to(PinnedReactNativeFetchHttpClient).inSingletonScope().whenTargetNamed("pinned");
|
|
@@ -974,4 +2559,4 @@ wlaReactNativeContainer.unload(commonIOCModule);
|
|
|
974
2559
|
wlaReactNativeContainer.load(reactNativeCommonIOCModule);
|
|
975
2560
|
wlaReactNativeContainer.unload(featureFlagsIOCModule);
|
|
976
2561
|
wlaReactNativeContainer.load(reactNativeFeatureFlagsIOCModule);
|
|
977
|
-
export { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, MOCK_USER as STATEMENTS_MOCK_USER, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, commonIOCModule, componentsIOCModule, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports as development, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports as localhost, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports as mockMode, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports as production, qa_exports as qa, reactNativeContainer as reactNativeSdkJsContainer, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports as sandbox, container as sdkJsContainer, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice, wlaReactNativeContainer as wlaReactNativeSdkJsContainer };
|
|
2562
|
+
export { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, JoseDpopAuthCredentialService, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, MOCK_USER as STATEMENTS_MOCK_USER, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, commonIOCModule, componentsIOCModule, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports as development, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports as localhost, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports as mockMode, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports as production, qa_exports as qa, reactNativeAuthIOCModule, reactNativeContainer as reactNativeSdkJsContainer, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports as sandbox, container as sdkJsContainer, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice, wlaReactNativeAuthIOCModule, wlaReactNativeContainer as wlaReactNativeSdkJsContainer };
|