@marqeta/ux-toolkit-sdk-javascript 2.25.0 → 2.25.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,9 +6,6 @@ function _array_like_to_array(arr, len) {
6
6
  function _array_with_holes(arr) {
7
7
  if (Array.isArray(arr)) return arr;
8
8
  }
9
- function _array_without_holes(arr) {
10
- if (Array.isArray(arr)) return _array_like_to_array(arr);
11
- }
12
9
  function _assert_this_initialized(self) {
13
10
  if (self === void 0) {
14
11
  throw new ReferenceError("this hasn't been initialised - super() hasn't been called");
@@ -49,23 +46,6 @@ function _class_call_check(instance, Constructor) {
49
46
  throw new TypeError("Cannot call a class as a function");
50
47
  }
51
48
  }
52
- function _construct(Parent, args, Class) {
53
- if (_is_native_reflect_construct()) {
54
- _construct = Reflect.construct;
55
- } else {
56
- _construct = function construct(Parent, args, Class) {
57
- var a = [
58
- null
59
- ];
60
- a.push.apply(a, args);
61
- var Constructor = Function.bind.apply(Parent, a);
62
- var instance = new Constructor();
63
- if (Class) _set_prototype_of(instance, Class.prototype);
64
- return instance;
65
- };
66
- }
67
- return _construct.apply(null, arguments);
68
- }
69
49
  function _defineProperties(target, props) {
70
50
  for(var i = 0; i < props.length; i++){
71
51
  var descriptor = props[i];
@@ -119,12 +99,6 @@ function _instanceof(left, right) {
119
99
  return left instanceof right;
120
100
  }
121
101
  }
122
- function _is_native_function(fn) {
123
- return Function.toString.call(fn).indexOf("[native code]") !== -1;
124
- }
125
- function _iterable_to_array(iter) {
126
- if (typeof Symbol !== "undefined" && iter[Symbol.iterator] != null || iter["@@iterator"] != null) return Array.from(iter);
127
- }
128
102
  function _iterable_to_array_limit(arr, i) {
129
103
  var _i = arr == null ? null : typeof Symbol !== "undefined" && arr[Symbol.iterator] || arr["@@iterator"];
130
104
  if (_i == null) return;
@@ -152,9 +126,6 @@ function _iterable_to_array_limit(arr, i) {
152
126
  function _non_iterable_rest() {
153
127
  throw new TypeError("Invalid attempt to destructure non-iterable instance.\\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.");
154
128
  }
155
- function _non_iterable_spread() {
156
- throw new TypeError("Invalid attempt to spread non-iterable instance.\\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.");
157
- }
158
129
  function _object_spread(target) {
159
130
  for(var i = 1; i < arguments.length; i++){
160
131
  var source = arguments[i] != null ? arguments[i] : {};
@@ -170,30 +141,6 @@ function _object_spread(target) {
170
141
  }
171
142
  return target;
172
143
  }
173
- function ownKeys(object, enumerableOnly) {
174
- var keys = Object.keys(object);
175
- if (Object.getOwnPropertySymbols) {
176
- var symbols = Object.getOwnPropertySymbols(object);
177
- if (enumerableOnly) {
178
- symbols = symbols.filter(function(sym) {
179
- return Object.getOwnPropertyDescriptor(object, sym).enumerable;
180
- });
181
- }
182
- keys.push.apply(keys, symbols);
183
- }
184
- return keys;
185
- }
186
- function _object_spread_props(target, source) {
187
- source = source != null ? source : {};
188
- if (Object.getOwnPropertyDescriptors) {
189
- Object.defineProperties(target, Object.getOwnPropertyDescriptors(source));
190
- } else {
191
- ownKeys(Object(source)).forEach(function(key) {
192
- Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key));
193
- });
194
- }
195
- return target;
196
- }
197
144
  function _possible_constructor_return(self, call) {
198
145
  if (call && (_type_of(call) === "object" || typeof call === "function")) {
199
146
  return call;
@@ -210,9 +157,6 @@ function _set_prototype_of(o, p) {
210
157
  function _sliced_to_array(arr, i) {
211
158
  return _array_with_holes(arr) || _iterable_to_array_limit(arr, i) || _unsupported_iterable_to_array(arr, i) || _non_iterable_rest();
212
159
  }
213
- function _to_consumable_array(arr) {
214
- return _array_without_holes(arr) || _iterable_to_array(arr) || _unsupported_iterable_to_array(arr) || _non_iterable_spread();
215
- }
216
160
  function _type_of(obj) {
217
161
  "@swc/helpers - typeof";
218
162
  return obj && typeof Symbol !== "undefined" && obj.constructor === Symbol ? "symbol" : typeof obj;
@@ -225,32 +169,6 @@ function _unsupported_iterable_to_array(o, minLen) {
225
169
  if (n === "Map" || n === "Set") return Array.from(n);
226
170
  if (n === "Arguments" || /^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(n)) return _array_like_to_array(o, minLen);
227
171
  }
228
- function _wrap_native_super(Class) {
229
- var _cache = typeof Map === "function" ? new Map() : undefined;
230
- _wrap_native_super = function wrapNativeSuper(Class) {
231
- if (Class === null || !_is_native_function(Class)) return Class;
232
- if (typeof Class !== "function") {
233
- throw new TypeError("Super expression must either be null or a function");
234
- }
235
- if (typeof _cache !== "undefined") {
236
- if (_cache.has(Class)) return _cache.get(Class);
237
- _cache.set(Class, Wrapper);
238
- }
239
- function Wrapper() {
240
- return _construct(Class, arguments, _get_prototype_of(this).constructor);
241
- }
242
- Wrapper.prototype = Object.create(Class.prototype, {
243
- constructor: {
244
- value: Wrapper,
245
- enumerable: false,
246
- writable: true,
247
- configurable: true
248
- }
249
- });
250
- return _set_prototype_of(Wrapper, Class);
251
- };
252
- return _wrap_native_super(Class);
253
- }
254
172
  function _is_native_reflect_construct() {
255
173
  if (typeof Reflect === "undefined" || !Reflect.construct) return false;
256
174
  if (Reflect.construct.sham) return false;
@@ -370,7 +288,7 @@ function _ts_generator(thisArg, body) {
370
288
  };
371
289
  }
372
290
  }
373
- import { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BaseHttpClient, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_FEATURE_FLAG_SERVICE, ITF_HTTP_CLIENT, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemRegistryService, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MOCK_USER, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, __export, __name, __publicField, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, checkHttpStandizedError, commonIOCModule, componentsIOCModule, container, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadBaseContainerModules, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports, qa_exports, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice } from "./chunk-JD66VP74.mjs";
291
+ import { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BaseHttpClient, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_FEATURE_FLAG_SERVICE, ITF_HTTP_CLIENT, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemRegistryService, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MOCK_USER, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, __name, __publicField, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, checkHttpStandizedError, commonIOCModule, componentsIOCModule, container, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadBaseContainerModules, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports, qa_exports, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice } from "./chunk-XCZQTXC4.mjs";
374
292
  // src/ioc/reactNativeContainer.ts
375
293
  import { Container } from "inversify";
376
294
  // src/feature-flags/ioc/reactNativefeatureFlagsIOCModule.ts
@@ -456,1605 +374,10 @@ var reactNativeCommonIOCModule = new ContainerModule2(function(bind) {
456
374
  });
457
375
  // src/auth/ioc/reactNativeAuthIOCModule.ts
458
376
  import { ContainerModule as ContainerModule3 } from "inversify";
459
- // src/auth/adapters/dpop/JoseDpopAuthCredentialService.ts
377
+ // src/auth/adapters/dpop/JsrsasignDpopAuthCredentialService.ts
460
378
  import { injectable as injectable2 } from "inversify";
461
- import { v4 as uuidv4 } from "uuid";
462
- // node_modules/jose/dist/node/esm/runtime/base64url.js
463
- import { Buffer as Buffer2 } from "buffer";
464
- // node_modules/jose/dist/node/esm/lib/buffer_utils.js
465
- var encoder = new TextEncoder();
466
- var decoder = new TextDecoder();
467
- var MAX_INT32 = Math.pow(2, 32);
468
- function concat() {
469
- for(var _len = arguments.length, buffers = new Array(_len), _key = 0; _key < _len; _key++){
470
- buffers[_key] = arguments[_key];
471
- }
472
- var size = buffers.reduce(function(acc, param) {
473
- var length = param.length;
474
- return acc + length;
475
- }, 0);
476
- var buf = new Uint8Array(size);
477
- var i = 0;
478
- var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
479
- try {
480
- for(var _iterator = buffers[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
481
- var buffer = _step.value;
482
- buf.set(buffer, i);
483
- i += buffer.length;
484
- }
485
- } catch (err) {
486
- _didIteratorError = true;
487
- _iteratorError = err;
488
- } finally{
489
- try {
490
- if (!_iteratorNormalCompletion && _iterator.return != null) {
491
- _iterator.return();
492
- }
493
- } finally{
494
- if (_didIteratorError) {
495
- throw _iteratorError;
496
- }
497
- }
498
- }
499
- return buf;
500
- }
501
- __name(concat, "concat");
502
- // node_modules/jose/dist/node/esm/runtime/base64url.js
503
- function normalize(input) {
504
- var encoded = input;
505
- if (_instanceof(encoded, Uint8Array)) {
506
- encoded = decoder.decode(encoded);
507
- }
508
- return encoded;
509
- }
510
- __name(normalize, "normalize");
511
- var encode = /* @__PURE__ */ __name(function(input) {
512
- return Buffer2.from(input).toString("base64url");
513
- }, "encode");
514
- var decode = /* @__PURE__ */ __name(function(input) {
515
- return new Uint8Array(Buffer2.from(normalize(input), "base64url"));
516
- }, "decode");
517
- // node_modules/jose/dist/node/esm/util/errors.js
518
- var _JOSEError = /*#__PURE__*/ function(Error1) {
519
- "use strict";
520
- _inherits(_JOSEError, Error1);
521
- var _super = _create_super(_JOSEError);
522
- function _JOSEError(message2, options) {
523
- _class_call_check(this, _JOSEError);
524
- var _this;
525
- var _Error_captureStackTrace, _Error;
526
- _this = _super.call(this, message2, options);
527
- __publicField(_assert_this_initialized(_this), "code", "ERR_JOSE_GENERIC");
528
- _this.name = _this.constructor.name;
529
- (_Error_captureStackTrace = (_Error = Error).captureStackTrace) === null || _Error_captureStackTrace === void 0 ? void 0 : _Error_captureStackTrace.call(_Error, _assert_this_initialized(_this), _this.constructor);
530
- return _this;
531
- }
532
- return _JOSEError;
533
- }(_wrap_native_super(Error));
534
- __name(_JOSEError, "JOSEError");
535
- __publicField(_JOSEError, "code", "ERR_JOSE_GENERIC");
536
- var JOSEError = _JOSEError;
537
- var _JOSENotSupported = /*#__PURE__*/ function(JOSEError) {
538
- "use strict";
539
- _inherits(_JOSENotSupported, JOSEError);
540
- var _super = _create_super(_JOSENotSupported);
541
- function _JOSENotSupported() {
542
- _class_call_check(this, _JOSENotSupported);
543
- var _this;
544
- _this = _super.call.apply(_super, [
545
- this
546
- ].concat(Array.prototype.slice.call(arguments)));
547
- __publicField(_assert_this_initialized(_this), "code", "ERR_JOSE_NOT_SUPPORTED");
548
- return _this;
549
- }
550
- return _JOSENotSupported;
551
- }(JOSEError);
552
- __name(_JOSENotSupported, "JOSENotSupported");
553
- __publicField(_JOSENotSupported, "code", "ERR_JOSE_NOT_SUPPORTED");
554
- var JOSENotSupported = _JOSENotSupported;
555
- var _JWSInvalid = /*#__PURE__*/ function(JOSEError) {
556
- "use strict";
557
- _inherits(_JWSInvalid, JOSEError);
558
- var _super = _create_super(_JWSInvalid);
559
- function _JWSInvalid() {
560
- _class_call_check(this, _JWSInvalid);
561
- var _this;
562
- _this = _super.call.apply(_super, [
563
- this
564
- ].concat(Array.prototype.slice.call(arguments)));
565
- __publicField(_assert_this_initialized(_this), "code", "ERR_JWS_INVALID");
566
- return _this;
567
- }
568
- return _JWSInvalid;
569
- }(JOSEError);
570
- __name(_JWSInvalid, "JWSInvalid");
571
- __publicField(_JWSInvalid, "code", "ERR_JWS_INVALID");
572
- var JWSInvalid = _JWSInvalid;
573
- var _JWTInvalid = /*#__PURE__*/ function(JOSEError) {
574
- "use strict";
575
- _inherits(_JWTInvalid, JOSEError);
576
- var _super = _create_super(_JWTInvalid);
577
- function _JWTInvalid() {
578
- _class_call_check(this, _JWTInvalid);
579
- var _this;
580
- _this = _super.call.apply(_super, [
581
- this
582
- ].concat(Array.prototype.slice.call(arguments)));
583
- __publicField(_assert_this_initialized(_this), "code", "ERR_JWT_INVALID");
584
- return _this;
585
- }
586
- return _JWTInvalid;
587
- }(JOSEError);
588
- __name(_JWTInvalid, "JWTInvalid");
589
- __publicField(_JWTInvalid, "code", "ERR_JWT_INVALID");
590
- var JWTInvalid = _JWTInvalid;
591
- // node_modules/jose/dist/node/esm/runtime/is_key_object.js
592
- import * as util from "util";
593
- var is_key_object_default = /* @__PURE__ */ __name(function(obj) {
594
- return util.types.isKeyObject(obj);
595
- }, "default");
596
- // node_modules/jose/dist/node/esm/runtime/webcrypto.js
597
- import * as crypto from "crypto";
598
- import * as util2 from "util";
599
- var webcrypto2 = crypto.webcrypto;
600
- var webcrypto_default = webcrypto2;
601
- var isCryptoKey = /* @__PURE__ */ __name(function(key) {
602
- return util2.types.isCryptoKey(key);
603
- }, "isCryptoKey");
604
- // node_modules/jose/dist/node/esm/lib/crypto_key.js
605
- function unusable(name) {
606
- var prop = arguments.length > 1 && arguments[1] !== void 0 ? arguments[1] : "algorithm.name";
607
- return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
608
- }
609
- __name(unusable, "unusable");
610
- function isAlgorithm(algorithm, name) {
611
- return algorithm.name === name;
612
- }
613
- __name(isAlgorithm, "isAlgorithm");
614
- function getHashLength(hash) {
615
- return parseInt(hash.name.slice(4), 10);
616
- }
617
- __name(getHashLength, "getHashLength");
618
- function getNamedCurve(alg) {
619
- switch(alg){
620
- case "ES256":
621
- return "P-256";
622
- case "ES384":
623
- return "P-384";
624
- case "ES512":
625
- return "P-521";
626
- default:
627
- throw new Error("unreachable");
628
- }
629
- }
630
- __name(getNamedCurve, "getNamedCurve");
631
- function checkUsage(key, usages) {
632
- if (usages.length && !usages.some(function(expected) {
633
- return key.usages.includes(expected);
634
- })) {
635
- var msg = "CryptoKey does not support this operation, its usages must include ";
636
- if (usages.length > 2) {
637
- var last = usages.pop();
638
- msg += "one of ".concat(usages.join(", "), ", or ").concat(last, ".");
639
- } else if (usages.length === 2) {
640
- msg += "one of ".concat(usages[0], " or ").concat(usages[1], ".");
641
- } else {
642
- msg += "".concat(usages[0], ".");
643
- }
644
- throw new TypeError(msg);
645
- }
646
- }
647
- __name(checkUsage, "checkUsage");
648
- function checkSigCryptoKey(key, alg) {
649
- for(var _len = arguments.length, usages = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
650
- usages[_key - 2] = arguments[_key];
651
- }
652
- switch(alg){
653
- case "HS256":
654
- case "HS384":
655
- case "HS512":
656
- {
657
- if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
658
- var expected = parseInt(alg.slice(2), 10);
659
- var actual = getHashLength(key.algorithm.hash);
660
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
661
- break;
662
- }
663
- case "RS256":
664
- case "RS384":
665
- case "RS512":
666
- {
667
- if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
668
- var expected1 = parseInt(alg.slice(2), 10);
669
- var actual1 = getHashLength(key.algorithm.hash);
670
- if (actual1 !== expected1) throw unusable("SHA-".concat(expected1), "algorithm.hash");
671
- break;
672
- }
673
- case "PS256":
674
- case "PS384":
675
- case "PS512":
676
- {
677
- if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
678
- var expected2 = parseInt(alg.slice(2), 10);
679
- var actual2 = getHashLength(key.algorithm.hash);
680
- if (actual2 !== expected2) throw unusable("SHA-".concat(expected2), "algorithm.hash");
681
- break;
682
- }
683
- case "EdDSA":
684
- {
685
- if (key.algorithm.name !== "Ed25519" && key.algorithm.name !== "Ed448") {
686
- throw unusable("Ed25519 or Ed448");
687
- }
688
- break;
689
- }
690
- case "Ed25519":
691
- {
692
- if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
693
- break;
694
- }
695
- case "ES256":
696
- case "ES384":
697
- case "ES512":
698
- {
699
- if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
700
- var expected3 = getNamedCurve(alg);
701
- var actual3 = key.algorithm.namedCurve;
702
- if (actual3 !== expected3) throw unusable(expected3, "algorithm.namedCurve");
703
- break;
704
- }
705
- default:
706
- throw new TypeError("CryptoKey does not support this operation");
707
- }
708
- checkUsage(key, usages);
709
- }
710
- __name(checkSigCryptoKey, "checkSigCryptoKey");
711
- // node_modules/jose/dist/node/esm/lib/invalid_key_input.js
712
- function message(msg, actual) {
713
- for(var _len = arguments.length, types4 = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
714
- types4[_key - 2] = arguments[_key];
715
- }
716
- types4 = types4.filter(Boolean);
717
- if (types4.length > 2) {
718
- var last = types4.pop();
719
- msg += "one of type ".concat(types4.join(", "), ", or ").concat(last, ".");
720
- } else if (types4.length === 2) {
721
- msg += "one of type ".concat(types4[0], " or ").concat(types4[1], ".");
722
- } else {
723
- msg += "of type ".concat(types4[0], ".");
724
- }
725
- if (actual == null) {
726
- msg += " Received ".concat(actual);
727
- } else if (typeof actual === "function" && actual.name) {
728
- msg += " Received function ".concat(actual.name);
729
- } else if ((typeof actual === "undefined" ? "undefined" : _type_of(actual)) === "object" && actual != null) {
730
- var _actual_constructor;
731
- if ((_actual_constructor = actual.constructor) === null || _actual_constructor === void 0 ? void 0 : _actual_constructor.name) {
732
- msg += " Received an instance of ".concat(actual.constructor.name);
733
- }
734
- }
735
- return msg;
736
- }
737
- __name(message, "message");
738
- var invalid_key_input_default = /* @__PURE__ */ __name(function(actual) {
739
- for(var _len = arguments.length, types4 = new Array(_len > 1 ? _len - 1 : 0), _key = 1; _key < _len; _key++){
740
- types4[_key - 1] = arguments[_key];
741
- }
742
- return message.apply(void 0, [
743
- "Key must be ",
744
- actual
745
- ].concat(_to_consumable_array(types4)));
746
- }, "default");
747
- function withAlg(alg, actual) {
748
- for(var _len = arguments.length, types4 = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
749
- types4[_key - 2] = arguments[_key];
750
- }
751
- return message.apply(void 0, [
752
- "Key for the ".concat(alg, " algorithm must be "),
753
- actual
754
- ].concat(_to_consumable_array(types4)));
755
- }
756
- __name(withAlg, "withAlg");
757
- // node_modules/jose/dist/node/esm/runtime/is_key_like.js
758
- var is_key_like_default = /* @__PURE__ */ __name(function(key) {
759
- return is_key_object_default(key) || isCryptoKey(key);
760
- }, "default");
761
- var types3 = [
762
- "KeyObject"
763
- ];
764
- if (globalThis.CryptoKey || (webcrypto_default === null || webcrypto_default === void 0 ? void 0 : webcrypto_default.CryptoKey)) {
765
- types3.push("CryptoKey");
766
- }
767
- // node_modules/jose/dist/node/esm/lib/is_disjoint.js
768
- var isDisjoint = /* @__PURE__ */ __name(function() {
769
- for(var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++){
770
- headers[_key] = arguments[_key];
771
- }
772
- var sources = headers.filter(Boolean);
773
- if (sources.length === 0 || sources.length === 1) {
774
- return true;
775
- }
776
- var acc;
777
- var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
778
- try {
779
- for(var _iterator = sources[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
780
- var header = _step.value;
781
- var parameters = Object.keys(header);
782
- if (!acc || acc.size === 0) {
783
- acc = new Set(parameters);
784
- continue;
785
- }
786
- var _iteratorNormalCompletion1 = true, _didIteratorError1 = false, _iteratorError1 = undefined;
787
- try {
788
- for(var _iterator1 = parameters[Symbol.iterator](), _step1; !(_iteratorNormalCompletion1 = (_step1 = _iterator1.next()).done); _iteratorNormalCompletion1 = true){
789
- var parameter = _step1.value;
790
- if (acc.has(parameter)) {
791
- return false;
792
- }
793
- acc.add(parameter);
794
- }
795
- } catch (err) {
796
- _didIteratorError1 = true;
797
- _iteratorError1 = err;
798
- } finally{
799
- try {
800
- if (!_iteratorNormalCompletion1 && _iterator1.return != null) {
801
- _iterator1.return();
802
- }
803
- } finally{
804
- if (_didIteratorError1) {
805
- throw _iteratorError1;
806
- }
807
- }
808
- }
809
- }
810
- } catch (err) {
811
- _didIteratorError = true;
812
- _iteratorError = err;
813
- } finally{
814
- try {
815
- if (!_iteratorNormalCompletion && _iterator.return != null) {
816
- _iterator.return();
817
- }
818
- } finally{
819
- if (_didIteratorError) {
820
- throw _iteratorError;
821
- }
822
- }
823
- }
824
- return true;
825
- }, "isDisjoint");
826
- var is_disjoint_default = isDisjoint;
827
- // node_modules/jose/dist/node/esm/lib/is_object.js
828
- function isObjectLike(value) {
829
- return (typeof value === "undefined" ? "undefined" : _type_of(value)) === "object" && value !== null;
830
- }
831
- __name(isObjectLike, "isObjectLike");
832
- function isObject(input) {
833
- if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
834
- return false;
835
- }
836
- if (Object.getPrototypeOf(input) === null) {
837
- return true;
838
- }
839
- var proto = input;
840
- while(Object.getPrototypeOf(proto) !== null){
841
- proto = Object.getPrototypeOf(proto);
842
- }
843
- return Object.getPrototypeOf(input) === proto;
844
- }
845
- __name(isObject, "isObject");
846
- // node_modules/jose/dist/node/esm/runtime/get_named_curve.js
847
- import { KeyObject } from "crypto";
848
- // node_modules/jose/dist/node/esm/lib/is_jwk.js
849
- function isJWK(key) {
850
- return isObject(key) && typeof key.kty === "string";
851
- }
852
- __name(isJWK, "isJWK");
853
- function isPrivateJWK(key) {
854
- return key.kty !== "oct" && typeof key.d === "string";
855
- }
856
- __name(isPrivateJWK, "isPrivateJWK");
857
- function isPublicJWK(key) {
858
- return key.kty !== "oct" && typeof key.d === "undefined";
859
- }
860
- __name(isPublicJWK, "isPublicJWK");
861
- function isSecretJWK(key) {
862
- return isJWK(key) && key.kty === "oct" && typeof key.k === "string";
863
- }
864
- __name(isSecretJWK, "isSecretJWK");
865
- // node_modules/jose/dist/node/esm/runtime/get_named_curve.js
866
- var namedCurveToJOSE = /* @__PURE__ */ __name(function(namedCurve) {
867
- switch(namedCurve){
868
- case "prime256v1":
869
- return "P-256";
870
- case "secp384r1":
871
- return "P-384";
872
- case "secp521r1":
873
- return "P-521";
874
- case "secp256k1":
875
- return "secp256k1";
876
- default:
877
- throw new JOSENotSupported("Unsupported key curve for this operation");
878
- }
879
- }, "namedCurveToJOSE");
880
- var getNamedCurve2 = /* @__PURE__ */ __name(function(kee, raw) {
881
- var key;
882
- if (isCryptoKey(kee)) {
883
- key = KeyObject.from(kee);
884
- } else if (is_key_object_default(kee)) {
885
- key = kee;
886
- } else if (isJWK(kee)) {
887
- return kee.crv;
888
- } else {
889
- throw new TypeError(invalid_key_input_default.apply(void 0, [
890
- kee
891
- ].concat(_to_consumable_array(types3))));
892
- }
893
- if (key.type === "secret") {
894
- throw new TypeError('only "private" or "public" type keys can be used for this operation');
895
- }
896
- switch(key.asymmetricKeyType){
897
- case "ed25519":
898
- case "ed448":
899
- return "Ed".concat(key.asymmetricKeyType.slice(2));
900
- case "x25519":
901
- case "x448":
902
- return "X".concat(key.asymmetricKeyType.slice(1));
903
- case "ec":
904
- {
905
- var namedCurve = key.asymmetricKeyDetails.namedCurve;
906
- if (raw) {
907
- return namedCurve;
908
- }
909
- return namedCurveToJOSE(namedCurve);
910
- }
911
- default:
912
- throw new TypeError("Invalid asymmetric key type for this operation");
913
- }
914
- }, "getNamedCurve");
915
- var get_named_curve_default = getNamedCurve2;
916
- // node_modules/jose/dist/node/esm/runtime/check_key_length.js
917
- import { KeyObject as KeyObject2 } from "crypto";
918
- var check_key_length_default = /* @__PURE__ */ __name(function(key, alg) {
919
- var modulusLength;
920
- try {
921
- if (_instanceof(key, KeyObject2)) {
922
- var _key_asymmetricKeyDetails;
923
- modulusLength = (_key_asymmetricKeyDetails = key.asymmetricKeyDetails) === null || _key_asymmetricKeyDetails === void 0 ? void 0 : _key_asymmetricKeyDetails.modulusLength;
924
- } else {
925
- modulusLength = Buffer.from(key.n, "base64url").byteLength << 3;
926
- }
927
- } catch (e) {}
928
- if (typeof modulusLength !== "number" || modulusLength < 2048) {
929
- throw new TypeError("".concat(alg, " requires key modulusLength to be 2048 bits or larger"));
930
- }
931
- }, "default");
932
- // node_modules/jose/dist/node/esm/runtime/jwk_to_key.js
933
- import { createPrivateKey, createPublicKey } from "crypto";
934
- var parse = /* @__PURE__ */ __name(function(key) {
935
- if (key.d) {
936
- return createPrivateKey({
937
- format: "jwk",
938
- key: key
939
- });
940
- }
941
- return createPublicKey({
942
- format: "jwk",
943
- key: key
944
- });
945
- }, "parse");
946
- var jwk_to_key_default = parse;
947
- function importJWK(jwk, alg) {
948
- return _importJWK.apply(this, arguments);
949
- }
950
- function _importJWK() {
951
- _importJWK = // node_modules/jose/dist/node/esm/key/import.js
952
- _async_to_generator(function(jwk, alg) {
953
- return _ts_generator(this, function(_state) {
954
- if (!isObject(jwk)) {
955
- throw new TypeError("JWK must be an object");
956
- }
957
- alg || (alg = jwk.alg);
958
- switch(jwk.kty){
959
- case "oct":
960
- if (typeof jwk.k !== "string" || !jwk.k) {
961
- throw new TypeError('missing "k" (Key Value) Parameter value');
962
- }
963
- return [
964
- 2,
965
- decode(jwk.k)
966
- ];
967
- case "RSA":
968
- if ("oth" in jwk && jwk.oth !== void 0) {
969
- throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
970
- }
971
- case "EC":
972
- case "OKP":
973
- return [
974
- 2,
975
- jwk_to_key_default(_object_spread_props(_object_spread({}, jwk), {
976
- alg: alg
977
- }))
978
- ];
979
- default:
980
- throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
981
- }
982
- return [
983
- 2
984
- ];
985
- });
986
- });
987
- return _importJWK.apply(this, arguments);
988
- }
989
- __name(importJWK, "importJWK");
990
- // node_modules/jose/dist/node/esm/lib/check_key_type.js
991
- var tag = /* @__PURE__ */ __name(function(key) {
992
- return key === null || key === void 0 ? void 0 : key[Symbol.toStringTag];
993
- }, "tag");
994
- var jwkMatchesOp = /* @__PURE__ */ __name(function(alg, key, usage) {
995
- var _key_key_ops_includes, _key_key_ops;
996
- if (key.use !== void 0 && key.use !== "sig") {
997
- throw new TypeError("Invalid key for this operation, when present its use must be sig");
998
- }
999
- if (key.key_ops !== void 0 && ((_key_key_ops_includes = (_key_key_ops = key.key_ops).includes) === null || _key_key_ops_includes === void 0 ? void 0 : _key_key_ops_includes.call(_key_key_ops, usage)) !== true) {
1000
- throw new TypeError("Invalid key for this operation, when present its key_ops must include ".concat(usage));
1001
- }
1002
- if (key.alg !== void 0 && key.alg !== alg) {
1003
- throw new TypeError("Invalid key for this operation, when present its alg must be ".concat(alg));
1004
- }
1005
- return true;
1006
- }, "jwkMatchesOp");
1007
- var symmetricTypeCheck = /* @__PURE__ */ __name(function(alg, key, usage, allowJwk) {
1008
- if (_instanceof(key, Uint8Array)) return;
1009
- if (allowJwk && isJWK(key)) {
1010
- if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage)) return;
1011
- throw new TypeError('JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present');
1012
- }
1013
- if (!is_key_like_default(key)) {
1014
- throw new TypeError(withAlg.apply(void 0, [
1015
- alg,
1016
- key
1017
- ].concat(_to_consumable_array(types3), [
1018
- "Uint8Array",
1019
- allowJwk ? "JSON Web Key" : null
1020
- ])));
1021
- }
1022
- if (key.type !== "secret") {
1023
- throw new TypeError("".concat(tag(key), ' instances for symmetric algorithms must be of type "secret"'));
1024
- }
1025
- }, "symmetricTypeCheck");
1026
- var asymmetricTypeCheck = /* @__PURE__ */ __name(function(alg, key, usage, allowJwk) {
1027
- if (allowJwk && isJWK(key)) {
1028
- switch(usage){
1029
- case "sign":
1030
- if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage)) return;
1031
- throw new TypeError("JSON Web Key for this operation be a private JWK");
1032
- case "verify":
1033
- if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage)) return;
1034
- throw new TypeError("JSON Web Key for this operation be a public JWK");
1035
- }
1036
- }
1037
- if (!is_key_like_default(key)) {
1038
- throw new TypeError(withAlg.apply(void 0, [
1039
- alg,
1040
- key
1041
- ].concat(_to_consumable_array(types3), [
1042
- allowJwk ? "JSON Web Key" : null
1043
- ])));
1044
- }
1045
- if (key.type === "secret") {
1046
- throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithms must not be of type "secret"'));
1047
- }
1048
- if (usage === "sign" && key.type === "public") {
1049
- throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm signing must be of type "private"'));
1050
- }
1051
- if (usage === "decrypt" && key.type === "public") {
1052
- throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm decryption must be of type "private"'));
1053
- }
1054
- if (key.algorithm && usage === "verify" && key.type === "private") {
1055
- throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm verifying must be of type "public"'));
1056
- }
1057
- if (key.algorithm && usage === "encrypt" && key.type === "private") {
1058
- throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm encryption must be of type "public"'));
1059
- }
1060
- }, "asymmetricTypeCheck");
1061
- function checkKeyType(allowJwk, alg, key, usage) {
1062
- var symmetric = alg.startsWith("HS") || alg === "dir" || alg.startsWith("PBES2") || /^A\d{3}(?:GCM)?KW$/.test(alg);
1063
- if (symmetric) {
1064
- symmetricTypeCheck(alg, key, usage, allowJwk);
1065
- } else {
1066
- asymmetricTypeCheck(alg, key, usage, allowJwk);
1067
- }
1068
- }
1069
- __name(checkKeyType, "checkKeyType");
1070
- var check_key_type_default = checkKeyType.bind(void 0, false);
1071
- var checkKeyTypeWithJwk = checkKeyType.bind(void 0, true);
1072
- // node_modules/jose/dist/node/esm/lib/validate_crit.js
1073
- function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
1074
- if (joseHeader.crit !== void 0 && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === void 0) {
1075
- throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
1076
- }
1077
- if (!protectedHeader || protectedHeader.crit === void 0) {
1078
- return /* @__PURE__ */ new Set();
1079
- }
1080
- if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some(function(input) {
1081
- return typeof input !== "string" || input.length === 0;
1082
- })) {
1083
- throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
1084
- }
1085
- var recognized;
1086
- if (recognizedOption !== void 0) {
1087
- recognized = new Map(_to_consumable_array(Object.entries(recognizedOption)).concat(_to_consumable_array(recognizedDefault.entries())));
1088
- } else {
1089
- recognized = recognizedDefault;
1090
- }
1091
- var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
1092
- try {
1093
- for(var _iterator = protectedHeader.crit[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
1094
- var parameter = _step.value;
1095
- if (!recognized.has(parameter)) {
1096
- throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
1097
- }
1098
- if (joseHeader[parameter] === void 0) {
1099
- throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
1100
- }
1101
- if (recognized.get(parameter) && protectedHeader[parameter] === void 0) {
1102
- throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
1103
- }
1104
- }
1105
- } catch (err) {
1106
- _didIteratorError = true;
1107
- _iteratorError = err;
1108
- } finally{
1109
- try {
1110
- if (!_iteratorNormalCompletion && _iterator.return != null) {
1111
- _iterator.return();
1112
- }
1113
- } finally{
1114
- if (_didIteratorError) {
1115
- throw _iteratorError;
1116
- }
1117
- }
1118
- }
1119
- return new Set(protectedHeader.crit);
1120
- }
1121
- __name(validateCrit, "validateCrit");
1122
- var validate_crit_default = validateCrit;
1123
- // node_modules/jose/dist/node/esm/runtime/key_to_jwk.js
1124
- import { KeyObject as KeyObject3 } from "crypto";
1125
- var keyToJWK = /* @__PURE__ */ __name(function(key) {
1126
- var keyObject;
1127
- if (isCryptoKey(key)) {
1128
- if (!key.extractable) {
1129
- throw new TypeError("CryptoKey is not extractable");
1130
- }
1131
- keyObject = KeyObject3.from(key);
1132
- } else if (is_key_object_default(key)) {
1133
- keyObject = key;
1134
- } else if (_instanceof(key, Uint8Array)) {
1135
- return {
1136
- kty: "oct",
1137
- k: encode(key)
1138
- };
1139
- } else {
1140
- throw new TypeError(invalid_key_input_default.apply(void 0, [
1141
- key
1142
- ].concat(_to_consumable_array(types3), [
1143
- "Uint8Array"
1144
- ])));
1145
- }
1146
- if (keyObject.type !== "secret" && ![
1147
- "rsa",
1148
- "ec",
1149
- "ed25519",
1150
- "x25519",
1151
- "ed448",
1152
- "x448"
1153
- ].includes(keyObject.asymmetricKeyType)) {
1154
- throw new JOSENotSupported("Unsupported key asymmetricKeyType");
1155
- }
1156
- return keyObject.export({
1157
- format: "jwk"
1158
- });
1159
- }, "keyToJWK");
1160
- var key_to_jwk_default = keyToJWK;
1161
- function exportJWK(key) {
1162
- return _exportJWK.apply(this, arguments);
1163
- }
1164
- function _exportJWK() {
1165
- _exportJWK = // node_modules/jose/dist/node/esm/key/export.js
1166
- _async_to_generator(function(key) {
1167
- return _ts_generator(this, function(_state) {
1168
- return [
1169
- 2,
1170
- key_to_jwk_default(key)
1171
- ];
1172
- });
1173
- });
1174
- return _exportJWK.apply(this, arguments);
1175
- }
1176
- __name(exportJWK, "exportJWK");
1177
- // node_modules/jose/dist/node/esm/runtime/dsa_digest.js
1178
- function dsaDigest(alg) {
1179
- switch(alg){
1180
- case "PS256":
1181
- case "RS256":
1182
- case "ES256":
1183
- case "ES256K":
1184
- return "sha256";
1185
- case "PS384":
1186
- case "RS384":
1187
- case "ES384":
1188
- return "sha384";
1189
- case "PS512":
1190
- case "RS512":
1191
- case "ES512":
1192
- return "sha512";
1193
- case "Ed25519":
1194
- case "EdDSA":
1195
- return void 0;
1196
- default:
1197
- throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
1198
- }
1199
- }
1200
- __name(dsaDigest, "dsaDigest");
1201
- // node_modules/jose/dist/node/esm/runtime/node_key.js
1202
- import { constants, KeyObject as KeyObject4 } from "crypto";
1203
- var ecCurveAlgMap = /* @__PURE__ */ new Map([
1204
- [
1205
- "ES256",
1206
- "P-256"
1207
- ],
1208
- [
1209
- "ES256K",
1210
- "secp256k1"
1211
- ],
1212
- [
1213
- "ES384",
1214
- "P-384"
1215
- ],
1216
- [
1217
- "ES512",
1218
- "P-521"
1219
- ]
1220
- ]);
1221
- function keyForCrypto(alg, key) {
1222
- var asymmetricKeyType;
1223
- var asymmetricKeyDetails;
1224
- var isJWK2;
1225
- if (_instanceof(key, KeyObject4)) {
1226
- asymmetricKeyType = key.asymmetricKeyType;
1227
- asymmetricKeyDetails = key.asymmetricKeyDetails;
1228
- } else {
1229
- isJWK2 = true;
1230
- switch(key.kty){
1231
- case "RSA":
1232
- asymmetricKeyType = "rsa";
1233
- break;
1234
- case "EC":
1235
- asymmetricKeyType = "ec";
1236
- break;
1237
- case "OKP":
1238
- {
1239
- if (key.crv === "Ed25519") {
1240
- asymmetricKeyType = "ed25519";
1241
- break;
1242
- }
1243
- if (key.crv === "Ed448") {
1244
- asymmetricKeyType = "ed448";
1245
- break;
1246
- }
1247
- throw new TypeError("Invalid key for this operation, its crv must be Ed25519 or Ed448");
1248
- }
1249
- default:
1250
- throw new TypeError("Invalid key for this operation, its kty must be RSA, OKP, or EC");
1251
- }
1252
- }
1253
- var options;
1254
- switch(alg){
1255
- case "Ed25519":
1256
- if (asymmetricKeyType !== "ed25519") {
1257
- throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ed25519");
1258
- }
1259
- break;
1260
- case "EdDSA":
1261
- if (![
1262
- "ed25519",
1263
- "ed448"
1264
- ].includes(asymmetricKeyType)) {
1265
- throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ed25519 or ed448");
1266
- }
1267
- break;
1268
- case "RS256":
1269
- case "RS384":
1270
- case "RS512":
1271
- if (asymmetricKeyType !== "rsa") {
1272
- throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be rsa");
1273
- }
1274
- check_key_length_default(key, alg);
1275
- break;
1276
- case "PS256":
1277
- case "PS384":
1278
- case "PS512":
1279
- if (asymmetricKeyType === "rsa-pss") {
1280
- var hashAlgorithm = asymmetricKeyDetails.hashAlgorithm, mgf1HashAlgorithm = asymmetricKeyDetails.mgf1HashAlgorithm, saltLength = asymmetricKeyDetails.saltLength;
1281
- var length = parseInt(alg.slice(-3), 10);
1282
- if (hashAlgorithm !== void 0 && (hashAlgorithm !== "sha".concat(length) || mgf1HashAlgorithm !== hashAlgorithm)) {
1283
- throw new TypeError('Invalid key for this operation, its RSA-PSS parameters do not meet the requirements of "alg" '.concat(alg));
1284
- }
1285
- if (saltLength !== void 0 && saltLength > length >> 3) {
1286
- throw new TypeError('Invalid key for this operation, its RSA-PSS parameter saltLength does not meet the requirements of "alg" '.concat(alg));
1287
- }
1288
- } else if (asymmetricKeyType !== "rsa") {
1289
- throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be rsa or rsa-pss");
1290
- }
1291
- check_key_length_default(key, alg);
1292
- options = {
1293
- padding: constants.RSA_PKCS1_PSS_PADDING,
1294
- saltLength: constants.RSA_PSS_SALTLEN_DIGEST
1295
- };
1296
- break;
1297
- case "ES256":
1298
- case "ES256K":
1299
- case "ES384":
1300
- case "ES512":
1301
- {
1302
- if (asymmetricKeyType !== "ec") {
1303
- throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ec");
1304
- }
1305
- var actual = get_named_curve_default(key);
1306
- var expected = ecCurveAlgMap.get(alg);
1307
- if (actual !== expected) {
1308
- throw new TypeError("Invalid key curve for the algorithm, its curve must be ".concat(expected, ", got ").concat(actual));
1309
- }
1310
- options = {
1311
- dsaEncoding: "ieee-p1363"
1312
- };
1313
- break;
1314
- }
1315
- default:
1316
- throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
1317
- }
1318
- if (isJWK2) {
1319
- return _object_spread({
1320
- format: "jwk",
1321
- key: key
1322
- }, options);
1323
- }
1324
- return options ? _object_spread_props(_object_spread({}, options), {
1325
- key: key
1326
- }) : key;
1327
- }
1328
- __name(keyForCrypto, "keyForCrypto");
1329
- // node_modules/jose/dist/node/esm/runtime/sign.js
1330
- import * as crypto2 from "crypto";
1331
- import { promisify } from "util";
1332
- // node_modules/jose/dist/node/esm/runtime/hmac_digest.js
1333
- function hmacDigest(alg) {
1334
- switch(alg){
1335
- case "HS256":
1336
- return "sha256";
1337
- case "HS384":
1338
- return "sha384";
1339
- case "HS512":
1340
- return "sha512";
1341
- default:
1342
- throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
1343
- }
1344
- }
1345
- __name(hmacDigest, "hmacDigest");
1346
- // node_modules/jose/dist/node/esm/runtime/get_sign_verify_key.js
1347
- import { KeyObject as KeyObject5, createSecretKey } from "crypto";
1348
- function getSignVerifyKey(alg, key, usage) {
1349
- if (_instanceof(key, Uint8Array)) {
1350
- if (!alg.startsWith("HS")) {
1351
- throw new TypeError(invalid_key_input_default.apply(void 0, [
1352
- key
1353
- ].concat(_to_consumable_array(types3))));
1354
- }
1355
- return createSecretKey(key);
1356
- }
1357
- if (_instanceof(key, KeyObject5)) {
1358
- return key;
1359
- }
1360
- if (isCryptoKey(key)) {
1361
- checkSigCryptoKey(key, alg, usage);
1362
- return KeyObject5.from(key);
1363
- }
1364
- if (isJWK(key)) {
1365
- if (alg.startsWith("HS")) {
1366
- return createSecretKey(Buffer.from(key.k, "base64url"));
1367
- }
1368
- return key;
1369
- }
1370
- throw new TypeError(invalid_key_input_default.apply(void 0, [
1371
- key
1372
- ].concat(_to_consumable_array(types3), [
1373
- "Uint8Array",
1374
- "JSON Web Key"
1375
- ])));
1376
- }
1377
- __name(getSignVerifyKey, "getSignVerifyKey");
1378
- // node_modules/jose/dist/node/esm/runtime/sign.js
1379
- var oneShotSign = promisify(crypto2.sign);
1380
- var sign2 = /* @__PURE__ */ __name(function() {
1381
- var _ref = _async_to_generator(function(alg, key, data) {
1382
- var k, hmac;
1383
- return _ts_generator(this, function(_state) {
1384
- k = getSignVerifyKey(alg, key, "sign");
1385
- if (alg.startsWith("HS")) {
1386
- hmac = crypto2.createHmac(hmacDigest(alg), k);
1387
- hmac.update(data);
1388
- return [
1389
- 2,
1390
- hmac.digest()
1391
- ];
1392
- }
1393
- return [
1394
- 2,
1395
- oneShotSign(dsaDigest(alg), data, keyForCrypto(alg, k))
1396
- ];
1397
- });
1398
- });
1399
- return function(alg, key, data) {
1400
- return _ref.apply(this, arguments);
1401
- };
1402
- }(), "sign");
1403
- var sign_default = sign2;
1404
- // node_modules/jose/dist/node/esm/lib/epoch.js
1405
- var epoch_default = /* @__PURE__ */ __name(function(date) {
1406
- return Math.floor(date.getTime() / 1e3);
1407
- }, "default");
1408
- // node_modules/jose/dist/node/esm/lib/secs.js
1409
- var minute = 60;
1410
- var hour = minute * 60;
1411
- var day = hour * 24;
1412
- var week = day * 7;
1413
- var year = day * 365.25;
1414
- var REGEX = /^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;
1415
- var secs_default = /* @__PURE__ */ __name(function(str) {
1416
- var matched = REGEX.exec(str);
1417
- if (!matched || matched[4] && matched[1]) {
1418
- throw new TypeError("Invalid time period format");
1419
- }
1420
- var value = parseFloat(matched[2]);
1421
- var unit = matched[3].toLowerCase();
1422
- var numericDate;
1423
- switch(unit){
1424
- case "sec":
1425
- case "secs":
1426
- case "second":
1427
- case "seconds":
1428
- case "s":
1429
- numericDate = Math.round(value);
1430
- break;
1431
- case "minute":
1432
- case "minutes":
1433
- case "min":
1434
- case "mins":
1435
- case "m":
1436
- numericDate = Math.round(value * minute);
1437
- break;
1438
- case "hour":
1439
- case "hours":
1440
- case "hr":
1441
- case "hrs":
1442
- case "h":
1443
- numericDate = Math.round(value * hour);
1444
- break;
1445
- case "day":
1446
- case "days":
1447
- case "d":
1448
- numericDate = Math.round(value * day);
1449
- break;
1450
- case "week":
1451
- case "weeks":
1452
- case "w":
1453
- numericDate = Math.round(value * week);
1454
- break;
1455
- default:
1456
- numericDate = Math.round(value * year);
1457
- break;
1458
- }
1459
- if (matched[1] === "-" || matched[4] === "ago") {
1460
- return -numericDate;
1461
- }
1462
- return numericDate;
1463
- }, "default");
1464
- // node_modules/jose/dist/node/esm/jws/flattened/sign.js
1465
- var _FlattenedSign = /*#__PURE__*/ function() {
1466
- "use strict";
1467
- function _FlattenedSign(payload) {
1468
- _class_call_check(this, _FlattenedSign);
1469
- __publicField(this, "_payload");
1470
- __publicField(this, "_protectedHeader");
1471
- __publicField(this, "_unprotectedHeader");
1472
- if (!_instanceof(payload, Uint8Array)) {
1473
- throw new TypeError("payload must be an instance of Uint8Array");
1474
- }
1475
- this._payload = payload;
1476
- }
1477
- _create_class(_FlattenedSign, [
1478
- {
1479
- key: "setProtectedHeader",
1480
- value: function setProtectedHeader(protectedHeader) {
1481
- if (this._protectedHeader) {
1482
- throw new TypeError("setProtectedHeader can only be called once");
1483
- }
1484
- this._protectedHeader = protectedHeader;
1485
- return this;
1486
- }
1487
- },
1488
- {
1489
- key: "setUnprotectedHeader",
1490
- value: function setUnprotectedHeader(unprotectedHeader) {
1491
- if (this._unprotectedHeader) {
1492
- throw new TypeError("setUnprotectedHeader can only be called once");
1493
- }
1494
- this._unprotectedHeader = unprotectedHeader;
1495
- return this;
1496
- }
1497
- },
1498
- {
1499
- key: "sign",
1500
- value: function sign(key, options) {
1501
- var _this = this;
1502
- return _async_to_generator(function() {
1503
- var joseHeader, extensions, b64, alg, payload, protectedHeader, data, signature, jws;
1504
- return _ts_generator(this, function(_state) {
1505
- switch(_state.label){
1506
- case 0:
1507
- if (!_this._protectedHeader && !_this._unprotectedHeader) {
1508
- throw new JWSInvalid("either setProtectedHeader or setUnprotectedHeader must be called before #sign()");
1509
- }
1510
- if (!is_disjoint_default(_this._protectedHeader, _this._unprotectedHeader)) {
1511
- throw new JWSInvalid("JWS Protected and JWS Unprotected Header Parameter names must be disjoint");
1512
- }
1513
- joseHeader = _object_spread({}, _this._protectedHeader, _this._unprotectedHeader);
1514
- extensions = validate_crit_default(JWSInvalid, /* @__PURE__ */ new Map([
1515
- [
1516
- "b64",
1517
- true
1518
- ]
1519
- ]), options === null || options === void 0 ? void 0 : options.crit, _this._protectedHeader, joseHeader);
1520
- b64 = true;
1521
- if (extensions.has("b64")) {
1522
- b64 = _this._protectedHeader.b64;
1523
- if (typeof b64 !== "boolean") {
1524
- throw new JWSInvalid('The "b64" (base64url-encode payload) Header Parameter must be a boolean');
1525
- }
1526
- }
1527
- alg = joseHeader.alg;
1528
- if (typeof alg !== "string" || !alg) {
1529
- throw new JWSInvalid('JWS "alg" (Algorithm) Header Parameter missing or invalid');
1530
- }
1531
- checkKeyTypeWithJwk(alg, key, "sign");
1532
- payload = _this._payload;
1533
- if (b64) {
1534
- payload = encoder.encode(encode(payload));
1535
- }
1536
- if (_this._protectedHeader) {
1537
- protectedHeader = encoder.encode(encode(JSON.stringify(_this._protectedHeader)));
1538
- } else {
1539
- protectedHeader = encoder.encode("");
1540
- }
1541
- data = concat(protectedHeader, encoder.encode("."), payload);
1542
- return [
1543
- 4,
1544
- sign_default(alg, key, data)
1545
- ];
1546
- case 1:
1547
- signature = _state.sent();
1548
- jws = {
1549
- signature: encode(signature),
1550
- payload: ""
1551
- };
1552
- if (b64) {
1553
- jws.payload = decoder.decode(payload);
1554
- }
1555
- if (_this._unprotectedHeader) {
1556
- jws.header = _this._unprotectedHeader;
1557
- }
1558
- if (_this._protectedHeader) {
1559
- jws.protected = decoder.decode(protectedHeader);
1560
- }
1561
- return [
1562
- 2,
1563
- jws
1564
- ];
1565
- }
1566
- });
1567
- })();
1568
- }
1569
- }
1570
- ]);
1571
- return _FlattenedSign;
1572
- }();
1573
- __name(_FlattenedSign, "FlattenedSign");
1574
- var FlattenedSign = _FlattenedSign;
1575
- // node_modules/jose/dist/node/esm/jws/compact/sign.js
1576
- var _CompactSign = /*#__PURE__*/ function() {
1577
- "use strict";
1578
- function _CompactSign(payload) {
1579
- _class_call_check(this, _CompactSign);
1580
- __publicField(this, "_flattened");
1581
- this._flattened = new FlattenedSign(payload);
1582
- }
1583
- _create_class(_CompactSign, [
1584
- {
1585
- key: "setProtectedHeader",
1586
- value: function setProtectedHeader(protectedHeader) {
1587
- this._flattened.setProtectedHeader(protectedHeader);
1588
- return this;
1589
- }
1590
- },
1591
- {
1592
- key: "sign",
1593
- value: function sign(key, options) {
1594
- var _this = this;
1595
- return _async_to_generator(function() {
1596
- var jws;
1597
- return _ts_generator(this, function(_state) {
1598
- switch(_state.label){
1599
- case 0:
1600
- return [
1601
- 4,
1602
- _this._flattened.sign(key, options)
1603
- ];
1604
- case 1:
1605
- jws = _state.sent();
1606
- if (jws.payload === void 0) {
1607
- throw new TypeError("use the flattened module for creating JWS with b64: false");
1608
- }
1609
- return [
1610
- 2,
1611
- "".concat(jws.protected, ".").concat(jws.payload, ".").concat(jws.signature)
1612
- ];
1613
- }
1614
- });
1615
- })();
1616
- }
1617
- }
1618
- ]);
1619
- return _CompactSign;
1620
- }();
1621
- __name(_CompactSign, "CompactSign");
1622
- var CompactSign = _CompactSign;
1623
- // node_modules/jose/dist/node/esm/jwt/produce.js
1624
- function validateInput(label, input) {
1625
- if (!Number.isFinite(input)) {
1626
- throw new TypeError("Invalid ".concat(label, " input"));
1627
- }
1628
- return input;
1629
- }
1630
- __name(validateInput, "validateInput");
1631
- var _ProduceJWT = /*#__PURE__*/ function() {
1632
- "use strict";
1633
- function _ProduceJWT() {
1634
- var payload = arguments.length > 0 && arguments[0] !== void 0 ? arguments[0] : {};
1635
- _class_call_check(this, _ProduceJWT);
1636
- __publicField(this, "_payload");
1637
- if (!isObject(payload)) {
1638
- throw new TypeError("JWT Claims Set MUST be an object");
1639
- }
1640
- this._payload = payload;
1641
- }
1642
- _create_class(_ProduceJWT, [
1643
- {
1644
- key: "setIssuer",
1645
- value: function setIssuer(issuer) {
1646
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1647
- iss: issuer
1648
- });
1649
- return this;
1650
- }
1651
- },
1652
- {
1653
- key: "setSubject",
1654
- value: function setSubject(subject) {
1655
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1656
- sub: subject
1657
- });
1658
- return this;
1659
- }
1660
- },
1661
- {
1662
- key: "setAudience",
1663
- value: function setAudience(audience) {
1664
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1665
- aud: audience
1666
- });
1667
- return this;
1668
- }
1669
- },
1670
- {
1671
- key: "setJti",
1672
- value: function setJti(jwtId) {
1673
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1674
- jti: jwtId
1675
- });
1676
- return this;
1677
- }
1678
- },
1679
- {
1680
- key: "setNotBefore",
1681
- value: function setNotBefore(input) {
1682
- if (typeof input === "number") {
1683
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1684
- nbf: validateInput("setNotBefore", input)
1685
- });
1686
- } else if (_instanceof(input, Date)) {
1687
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1688
- nbf: validateInput("setNotBefore", epoch_default(input))
1689
- });
1690
- } else {
1691
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1692
- nbf: epoch_default(/* @__PURE__ */ new Date()) + secs_default(input)
1693
- });
1694
- }
1695
- return this;
1696
- }
1697
- },
1698
- {
1699
- key: "setExpirationTime",
1700
- value: function setExpirationTime(input) {
1701
- if (typeof input === "number") {
1702
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1703
- exp: validateInput("setExpirationTime", input)
1704
- });
1705
- } else if (_instanceof(input, Date)) {
1706
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1707
- exp: validateInput("setExpirationTime", epoch_default(input))
1708
- });
1709
- } else {
1710
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1711
- exp: epoch_default(/* @__PURE__ */ new Date()) + secs_default(input)
1712
- });
1713
- }
1714
- return this;
1715
- }
1716
- },
1717
- {
1718
- key: "setIssuedAt",
1719
- value: function setIssuedAt(input) {
1720
- if (typeof input === "undefined") {
1721
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1722
- iat: epoch_default(/* @__PURE__ */ new Date())
1723
- });
1724
- } else if (_instanceof(input, Date)) {
1725
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1726
- iat: validateInput("setIssuedAt", epoch_default(input))
1727
- });
1728
- } else if (typeof input === "string") {
1729
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1730
- iat: validateInput("setIssuedAt", epoch_default(/* @__PURE__ */ new Date()) + secs_default(input))
1731
- });
1732
- } else {
1733
- this._payload = _object_spread_props(_object_spread({}, this._payload), {
1734
- iat: validateInput("setIssuedAt", input)
1735
- });
1736
- }
1737
- return this;
1738
- }
1739
- }
1740
- ]);
1741
- return _ProduceJWT;
1742
- }();
1743
- __name(_ProduceJWT, "ProduceJWT");
1744
- var ProduceJWT = _ProduceJWT;
1745
- // node_modules/jose/dist/node/esm/jwt/sign.js
1746
- var _SignJWT = /*#__PURE__*/ function(ProduceJWT) {
1747
- "use strict";
1748
- _inherits(_SignJWT, ProduceJWT);
1749
- var _super = _create_super(_SignJWT);
1750
- function _SignJWT() {
1751
- _class_call_check(this, _SignJWT);
1752
- var _this;
1753
- _this = _super.call.apply(_super, [
1754
- this
1755
- ].concat(Array.prototype.slice.call(arguments)));
1756
- __publicField(_assert_this_initialized(_this), "_protectedHeader");
1757
- return _this;
1758
- }
1759
- _create_class(_SignJWT, [
1760
- {
1761
- key: "setProtectedHeader",
1762
- value: function setProtectedHeader(protectedHeader) {
1763
- this._protectedHeader = protectedHeader;
1764
- return this;
1765
- }
1766
- },
1767
- {
1768
- key: "sign",
1769
- value: function sign(key, options) {
1770
- var _this = this;
1771
- return _async_to_generator(function() {
1772
- var _this__protectedHeader, sig;
1773
- return _ts_generator(this, function(_state) {
1774
- sig = new CompactSign(encoder.encode(JSON.stringify(_this._payload)));
1775
- sig.setProtectedHeader(_this._protectedHeader);
1776
- if (Array.isArray((_this__protectedHeader = _this._protectedHeader) === null || _this__protectedHeader === void 0 ? void 0 : _this__protectedHeader.crit) && _this._protectedHeader.crit.includes("b64") && _this._protectedHeader.b64 === false) {
1777
- throw new JWTInvalid("JWTs MUST NOT use unencoded payload");
1778
- }
1779
- return [
1780
- 2,
1781
- sig.sign(key, options)
1782
- ];
1783
- });
1784
- })();
1785
- }
1786
- }
1787
- ]);
1788
- return _SignJWT;
1789
- }(ProduceJWT);
1790
- __name(_SignJWT, "SignJWT");
1791
- var SignJWT = _SignJWT;
1792
- // node_modules/jose/dist/node/esm/util/base64url.js
1793
- var base64url_exports = {};
1794
- __export(base64url_exports, {
1795
- decode: function() {
1796
- return decode2;
1797
- },
1798
- encode: function() {
1799
- return encode2;
1800
- }
1801
- });
1802
- var encode2 = encode;
1803
- var decode2 = decode;
1804
- // node_modules/jose/dist/node/esm/runtime/generate.js
1805
- import { createSecretKey as createSecretKey2, generateKeyPair as generateKeyPairCb } from "crypto";
1806
- import { promisify as promisify2 } from "util";
1807
- var generate = promisify2(generateKeyPairCb);
1808
- function generateKeyPair(alg, options) {
1809
- return _generateKeyPair.apply(this, arguments);
1810
- }
1811
- function _generateKeyPair() {
1812
- _generateKeyPair = _async_to_generator(function(alg, options) {
1813
- var _options_modulusLength, modulusLength, keypair, _options_crv, crv;
1814
- return _ts_generator(this, function(_state) {
1815
- switch(_state.label){
1816
- case 0:
1817
- switch(alg){
1818
- case "RS256":
1819
- return [
1820
- 3,
1821
- 1
1822
- ];
1823
- case "RS384":
1824
- return [
1825
- 3,
1826
- 1
1827
- ];
1828
- case "RS512":
1829
- return [
1830
- 3,
1831
- 1
1832
- ];
1833
- case "PS256":
1834
- return [
1835
- 3,
1836
- 1
1837
- ];
1838
- case "PS384":
1839
- return [
1840
- 3,
1841
- 1
1842
- ];
1843
- case "PS512":
1844
- return [
1845
- 3,
1846
- 1
1847
- ];
1848
- case "RSA-OAEP":
1849
- return [
1850
- 3,
1851
- 1
1852
- ];
1853
- case "RSA-OAEP-256":
1854
- return [
1855
- 3,
1856
- 1
1857
- ];
1858
- case "RSA-OAEP-384":
1859
- return [
1860
- 3,
1861
- 1
1862
- ];
1863
- case "RSA-OAEP-512":
1864
- return [
1865
- 3,
1866
- 1
1867
- ];
1868
- case "RSA1_5":
1869
- return [
1870
- 3,
1871
- 1
1872
- ];
1873
- case "ES256":
1874
- return [
1875
- 3,
1876
- 3
1877
- ];
1878
- case "ES256K":
1879
- return [
1880
- 3,
1881
- 4
1882
- ];
1883
- case "ES384":
1884
- return [
1885
- 3,
1886
- 5
1887
- ];
1888
- case "ES512":
1889
- return [
1890
- 3,
1891
- 6
1892
- ];
1893
- case "Ed25519":
1894
- return [
1895
- 3,
1896
- 7
1897
- ];
1898
- case "EdDSA":
1899
- return [
1900
- 3,
1901
- 8
1902
- ];
1903
- case "ECDH-ES":
1904
- return [
1905
- 3,
1906
- 9
1907
- ];
1908
- case "ECDH-ES+A128KW":
1909
- return [
1910
- 3,
1911
- 9
1912
- ];
1913
- case "ECDH-ES+A192KW":
1914
- return [
1915
- 3,
1916
- 9
1917
- ];
1918
- case "ECDH-ES+A256KW":
1919
- return [
1920
- 3,
1921
- 9
1922
- ];
1923
- }
1924
- return [
1925
- 3,
1926
- 10
1927
- ];
1928
- case 1:
1929
- modulusLength = (_options_modulusLength = options === null || options === void 0 ? void 0 : options.modulusLength) !== null && _options_modulusLength !== void 0 ? _options_modulusLength : 2048;
1930
- if (typeof modulusLength !== "number" || modulusLength < 2048) {
1931
- throw new JOSENotSupported("Invalid or unsupported modulusLength option provided, 2048 bits or larger keys must be used");
1932
- }
1933
- return [
1934
- 4,
1935
- generate("rsa", {
1936
- modulusLength: modulusLength,
1937
- publicExponent: 65537
1938
- })
1939
- ];
1940
- case 2:
1941
- keypair = _state.sent();
1942
- return [
1943
- 2,
1944
- keypair
1945
- ];
1946
- case 3:
1947
- return [
1948
- 2,
1949
- generate("ec", {
1950
- namedCurve: "P-256"
1951
- })
1952
- ];
1953
- case 4:
1954
- return [
1955
- 2,
1956
- generate("ec", {
1957
- namedCurve: "secp256k1"
1958
- })
1959
- ];
1960
- case 5:
1961
- return [
1962
- 2,
1963
- generate("ec", {
1964
- namedCurve: "P-384"
1965
- })
1966
- ];
1967
- case 6:
1968
- return [
1969
- 2,
1970
- generate("ec", {
1971
- namedCurve: "P-521"
1972
- })
1973
- ];
1974
- case 7:
1975
- return [
1976
- 2,
1977
- generate("ed25519")
1978
- ];
1979
- case 8:
1980
- {
1981
- switch(options === null || options === void 0 ? void 0 : options.crv){
1982
- case void 0:
1983
- case "Ed25519":
1984
- return [
1985
- 2,
1986
- generate("ed25519")
1987
- ];
1988
- case "Ed448":
1989
- return [
1990
- 2,
1991
- generate("ed448")
1992
- ];
1993
- default:
1994
- throw new JOSENotSupported("Invalid or unsupported crv option provided, supported values are Ed25519 and Ed448");
1995
- }
1996
- }
1997
- _state.label = 9;
1998
- case 9:
1999
- {
2000
- ;
2001
- crv = (_options_crv = options === null || options === void 0 ? void 0 : options.crv) !== null && _options_crv !== void 0 ? _options_crv : "P-256";
2002
- switch(crv){
2003
- case void 0:
2004
- case "P-256":
2005
- case "P-384":
2006
- case "P-521":
2007
- return [
2008
- 2,
2009
- generate("ec", {
2010
- namedCurve: crv
2011
- })
2012
- ];
2013
- case "X25519":
2014
- return [
2015
- 2,
2016
- generate("x25519")
2017
- ];
2018
- case "X448":
2019
- return [
2020
- 2,
2021
- generate("x448")
2022
- ];
2023
- default:
2024
- throw new JOSENotSupported("Invalid or unsupported crv option provided, supported values are P-256, P-384, P-521, X25519, and X448");
2025
- }
2026
- }
2027
- _state.label = 10;
2028
- case 10:
2029
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
2030
- case 11:
2031
- return [
2032
- 2
2033
- ];
2034
- }
2035
- });
2036
- });
2037
- return _generateKeyPair.apply(this, arguments);
2038
- }
2039
- __name(generateKeyPair, "generateKeyPair");
2040
- function generateKeyPair2(alg, options) {
2041
- return _generateKeyPair2.apply(this, arguments);
2042
- }
2043
- function _generateKeyPair2() {
2044
- _generateKeyPair2 = // node_modules/jose/dist/node/esm/key/generate_key_pair.js
2045
- _async_to_generator(function(alg, options) {
2046
- return _ts_generator(this, function(_state) {
2047
- return [
2048
- 2,
2049
- generateKeyPair(alg, options)
2050
- ];
2051
- });
2052
- });
2053
- return _generateKeyPair2.apply(this, arguments);
2054
- }
2055
- __name(generateKeyPair2, "generateKeyPair");
2056
- // src/auth/adapters/dpop/JoseDpopAuthCredentialService.ts
2057
- import { digestStringAsync, CryptoDigestAlgorithm, CryptoEncoding } from "expo-crypto";
379
+ import { digestStringAsync, CryptoDigestAlgorithm, CryptoEncoding, randomUUID } from "expo-crypto";
380
+ import * as jsrsasign from "jsrsasign";
2058
381
  function _ts_decorate2(decorators, target, key, desc) {
2059
382
  var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
2060
383
  if ((typeof Reflect === "undefined" ? "undefined" : _type_of(Reflect)) === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
@@ -2062,42 +385,27 @@ function _ts_decorate2(decorators, target, key, desc) {
2062
385
  return c > 3 && r && Object.defineProperty(target, key, r), r;
2063
386
  }
2064
387
  __name(_ts_decorate2, "_ts_decorate");
2065
- var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredentialService) {
388
+ var _JsrsasignDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredentialService) {
2066
389
  "use strict";
2067
- _inherits(_JoseDpopAuthCredentialService, BaseDpopAuthCredentialService);
2068
- var _super = _create_super(_JoseDpopAuthCredentialService);
2069
- function _JoseDpopAuthCredentialService() {
2070
- _class_call_check(this, _JoseDpopAuthCredentialService);
390
+ _inherits(_JsrsasignDpopAuthCredentialService, BaseDpopAuthCredentialService);
391
+ var _super = _create_super(_JsrsasignDpopAuthCredentialService);
392
+ function _JsrsasignDpopAuthCredentialService() {
393
+ _class_call_check(this, _JsrsasignDpopAuthCredentialService);
2071
394
  return _super.apply(this, arguments);
2072
395
  }
2073
- _create_class(_JoseDpopAuthCredentialService, [
396
+ _create_class(_JsrsasignDpopAuthCredentialService, [
2074
397
  {
2075
398
  key: "generateAuthKeyPair",
2076
399
  value: function generateAuthKeyPair() {
2077
400
  var _this = this;
2078
401
  return _async_to_generator(function() {
2079
- var _ref, publicKey, privateKey, publicJwk, privateJwk;
402
+ var keyPair, publicJwk, privateJwk;
2080
403
  return _ts_generator(this, function(_state) {
2081
404
  switch(_state.label){
2082
405
  case 0:
2083
- return [
2084
- 4,
2085
- generateKeyPair2("ES256")
2086
- ];
2087
- case 1:
2088
- _ref = _state.sent(), publicKey = _ref.publicKey, privateKey = _ref.privateKey;
2089
- return [
2090
- 4,
2091
- exportJWK(publicKey)
2092
- ];
2093
- case 2:
2094
- publicJwk = _state.sent();
2095
- return [
2096
- 4,
2097
- exportJWK(privateKey)
2098
- ];
2099
- case 3:
2100
- privateJwk = _state.sent();
406
+ keyPair = jsrsasign.KEYUTIL.generateKeypair("EC", "secp256r1");
407
+ publicJwk = jsrsasign.KEYUTIL.getJWKFromKey(keyPair.pubKeyObj);
408
+ privateJwk = jsrsasign.KEYUTIL.getJWKFromKey(keyPair.prvKeyObj);
2101
409
  return [
2102
410
  4,
2103
411
  _this.setAuthKeyPair({
@@ -2105,7 +413,7 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2105
413
  privateJwk: privateJwk
2106
414
  })
2107
415
  ];
2108
- case 4:
416
+ case 1:
2109
417
  _state.sent();
2110
418
  return [
2111
419
  2
@@ -2120,28 +428,14 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2120
428
  value: function setAuthKeyPair(keyPair) {
2121
429
  var _this = this;
2122
430
  return _async_to_generator(function() {
2123
- var privateJwk, _, _1, _tmp;
431
+ var privateJwk;
2124
432
  return _ts_generator(this, function(_state) {
2125
- switch(_state.label){
2126
- case 0:
2127
- privateJwk = keyPair.privateJwk;
2128
- _this.cacheService.set("keyPair", keyPair);
2129
- _1 = (_ = _this.cacheService).set;
2130
- _tmp = [
2131
- "privateKey"
2132
- ];
2133
- return [
2134
- 4,
2135
- _this.importPrivateKey(privateJwk)
2136
- ];
2137
- case 1:
2138
- _1.apply(_, _tmp.concat([
2139
- _state.sent()
2140
- ]));
2141
- return [
2142
- 2
2143
- ];
2144
- }
433
+ privateJwk = keyPair.privateJwk;
434
+ _this.cacheService.set("keyPair", keyPair);
435
+ _this.cacheService.set("privateKey", jsrsasign.KEYUTIL.getKey(privateJwk));
436
+ return [
437
+ 2
438
+ ];
2145
439
  });
2146
440
  })();
2147
441
  }
@@ -2157,7 +451,7 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2157
451
  value: function createProofToken(method, resourceUrl) {
2158
452
  var _this = this;
2159
453
  return _async_to_generator(function() {
2160
- var keyPair, importedPrivateKey, publicJwk, now, url, jwt, _, _tmp;
454
+ var keyPair, importedPrivateKey, publicJwk, now, url, header, payload, _tmp, jwt;
2161
455
  return _ts_generator(this, function(_state) {
2162
456
  switch(_state.label){
2163
457
  case 0:
@@ -2186,11 +480,15 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2186
480
  if (!publicJwk.kty) {
2187
481
  throw new Error("Invalid public key: missing kty property");
2188
482
  }
2189
- _ = SignJWT.bind;
483
+ header = {
484
+ alg: "ES256",
485
+ typ: "dpop+jwt",
486
+ jwk: publicJwk
487
+ };
2190
488
  _tmp = {
2191
489
  htm: method,
2192
490
  htu: url.origin + url.pathname,
2193
- jti: uuidv4(),
491
+ jti: randomUUID(),
2194
492
  iat: now
2195
493
  };
2196
494
  return [
@@ -2198,22 +496,11 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2198
496
  _this.getAth()
2199
497
  ];
2200
498
  case 3:
2201
- jwt = (new (_.apply(SignJWT, [
2202
- void 0,
2203
- (_tmp.ath = _state.sent(), _tmp)
2204
- ]))).setProtectedHeader({
2205
- alg: "ES256",
2206
- typ: "dpop+jwt",
2207
- jwk: publicJwk
2208
- });
2209
- return [
2210
- 4,
2211
- jwt.sign(importedPrivateKey)
2212
- ];
2213
- case 4:
499
+ payload = (_tmp.ath = _state.sent(), _tmp);
500
+ jwt = jsrsasign.KJUR.jws.JWS.sign("ES256", header, payload, importedPrivateKey);
2214
501
  return [
2215
502
  2,
2216
- _state.sent()
503
+ jwt
2217
504
  ];
2218
505
  }
2219
506
  });
@@ -2242,7 +529,7 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2242
529
  ];
2243
530
  case 1:
2244
531
  hash = _state.sent();
2245
- ath = base64url_exports.encode(_this.hexToUint8Array(hash));
532
+ ath = jsrsasign.hextob64u(hash);
2246
533
  _this.cacheService.set("ath", ath);
2247
534
  return [
2248
535
  2,
@@ -2252,53 +539,19 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
2252
539
  });
2253
540
  })();
2254
541
  }
2255
- },
2256
- {
2257
- key: "hexToUint8Array",
2258
- value: function hexToUint8Array(hex) {
2259
- var bytes = new Uint8Array(hex.length / 2);
2260
- for(var i = 0; i < hex.length; i += 2){
2261
- bytes[i / 2] = parseInt(hex.substr(i, 2), 16);
2262
- }
2263
- return bytes;
2264
- }
2265
- },
2266
- {
2267
- key: "importPrivateKey",
2268
- value: function importPrivateKey(privateJwk) {
2269
- return _async_to_generator(function() {
2270
- return _ts_generator(this, function(_state) {
2271
- switch(_state.label){
2272
- case 0:
2273
- if (!privateJwk.kty) {
2274
- throw new Error("Invalid private key: missing kty property");
2275
- }
2276
- return [
2277
- 4,
2278
- importJWK(privateJwk, "ES256")
2279
- ];
2280
- case 1:
2281
- return [
2282
- 2,
2283
- _state.sent()
2284
- ];
2285
- }
2286
- });
2287
- })();
2288
- }
2289
542
  }
2290
543
  ]);
2291
- return _JoseDpopAuthCredentialService;
544
+ return _JsrsasignDpopAuthCredentialService;
2292
545
  }(BaseDpopAuthCredentialService);
2293
- __name(_JoseDpopAuthCredentialService, "JoseDpopAuthCredentialService");
2294
- var JoseDpopAuthCredentialService = _JoseDpopAuthCredentialService;
2295
- JoseDpopAuthCredentialService = _ts_decorate2([
546
+ __name(_JsrsasignDpopAuthCredentialService, "JsrsasignDpopAuthCredentialService");
547
+ var JsrsasignDpopAuthCredentialService = _JsrsasignDpopAuthCredentialService;
548
+ JsrsasignDpopAuthCredentialService = _ts_decorate2([
2296
549
  injectable2()
2297
- ], JoseDpopAuthCredentialService);
550
+ ], JsrsasignDpopAuthCredentialService);
2298
551
  // src/auth/ioc/reactNativeAuthIOCModule.ts
2299
552
  var reactNativeAuthIOCModule = new ContainerModule3(function(bind) {
2300
553
  bind(ITF_AUTH_SERVICE).to(RestAuthService).inSingletonScope();
2301
- bind(ITF_AUTH_CREDENTIAL_SERVICE).to(JoseDpopAuthCredentialService).inSingletonScope();
554
+ bind(ITF_AUTH_CREDENTIAL_SERVICE).to(JsrsasignDpopAuthCredentialService).inSingletonScope();
2302
555
  bind(ITF_AUTHENTICATED_HTTP_CLIENT).to(M2mAuthenticatedHttpClient).inSingletonScope();
2303
556
  });
2304
557
  // src/ioc/reactNativeContainer.ts
@@ -2570,4 +823,4 @@ wlaReactNativeContainer.unload(commonIOCModule);
2570
823
  wlaReactNativeContainer.load(reactNativeCommonIOCModule);
2571
824
  wlaReactNativeContainer.unload(featureFlagsIOCModule);
2572
825
  wlaReactNativeContainer.load(reactNativeFeatureFlagsIOCModule);
2573
- export { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, JoseDpopAuthCredentialService, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, MOCK_USER as STATEMENTS_MOCK_USER, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, commonIOCModule, componentsIOCModule, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports as development, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports as localhost, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports as mockMode, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports as production, qa_exports as qa, reactNativeAuthIOCModule, reactNativeContainer as reactNativeSdkJsContainer, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports as sandbox, container as sdkJsContainer, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice, wlaReactNativeAuthIOCModule, wlaReactNativeContainer as wlaReactNativeSdkJsContainer };
826
+ export { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, JsrsasignDpopAuthCredentialService, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, MOCK_USER as STATEMENTS_MOCK_USER, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, commonIOCModule, componentsIOCModule, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports as development, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports as localhost, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports as mockMode, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports as production, qa_exports as qa, reactNativeAuthIOCModule, reactNativeContainer as reactNativeSdkJsContainer, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports as sandbox, container as sdkJsContainer, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice, wlaReactNativeAuthIOCModule, wlaReactNativeContainer as wlaReactNativeSdkJsContainer };