@marqeta/ux-toolkit-sdk-javascript 2.25.0 → 2.26.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-JD66VP74.mjs → chunk-HQM634NL.mjs} +441 -465
- package/dist/{chunk-NI4M4RMN.js → chunk-OQLAEQ4N.js} +380 -400
- package/dist/index.d.mts +58 -52
- package/dist/index.d.ts +58 -52
- package/dist/index.js +497 -500
- package/dist/index.mjs +2 -2
- package/dist/react-native.d.mts +3 -5
- package/dist/react-native.d.ts +3 -5
- package/dist/react-native.js +577 -2401
- package/dist/react-native.mjs +40 -1787
- package/package.json +4 -2
package/dist/react-native.mjs
CHANGED
|
@@ -6,9 +6,6 @@ function _array_like_to_array(arr, len) {
|
|
|
6
6
|
function _array_with_holes(arr) {
|
|
7
7
|
if (Array.isArray(arr)) return arr;
|
|
8
8
|
}
|
|
9
|
-
function _array_without_holes(arr) {
|
|
10
|
-
if (Array.isArray(arr)) return _array_like_to_array(arr);
|
|
11
|
-
}
|
|
12
9
|
function _assert_this_initialized(self) {
|
|
13
10
|
if (self === void 0) {
|
|
14
11
|
throw new ReferenceError("this hasn't been initialised - super() hasn't been called");
|
|
@@ -49,23 +46,6 @@ function _class_call_check(instance, Constructor) {
|
|
|
49
46
|
throw new TypeError("Cannot call a class as a function");
|
|
50
47
|
}
|
|
51
48
|
}
|
|
52
|
-
function _construct(Parent, args, Class) {
|
|
53
|
-
if (_is_native_reflect_construct()) {
|
|
54
|
-
_construct = Reflect.construct;
|
|
55
|
-
} else {
|
|
56
|
-
_construct = function construct(Parent, args, Class) {
|
|
57
|
-
var a = [
|
|
58
|
-
null
|
|
59
|
-
];
|
|
60
|
-
a.push.apply(a, args);
|
|
61
|
-
var Constructor = Function.bind.apply(Parent, a);
|
|
62
|
-
var instance = new Constructor();
|
|
63
|
-
if (Class) _set_prototype_of(instance, Class.prototype);
|
|
64
|
-
return instance;
|
|
65
|
-
};
|
|
66
|
-
}
|
|
67
|
-
return _construct.apply(null, arguments);
|
|
68
|
-
}
|
|
69
49
|
function _defineProperties(target, props) {
|
|
70
50
|
for(var i = 0; i < props.length; i++){
|
|
71
51
|
var descriptor = props[i];
|
|
@@ -119,12 +99,6 @@ function _instanceof(left, right) {
|
|
|
119
99
|
return left instanceof right;
|
|
120
100
|
}
|
|
121
101
|
}
|
|
122
|
-
function _is_native_function(fn) {
|
|
123
|
-
return Function.toString.call(fn).indexOf("[native code]") !== -1;
|
|
124
|
-
}
|
|
125
|
-
function _iterable_to_array(iter) {
|
|
126
|
-
if (typeof Symbol !== "undefined" && iter[Symbol.iterator] != null || iter["@@iterator"] != null) return Array.from(iter);
|
|
127
|
-
}
|
|
128
102
|
function _iterable_to_array_limit(arr, i) {
|
|
129
103
|
var _i = arr == null ? null : typeof Symbol !== "undefined" && arr[Symbol.iterator] || arr["@@iterator"];
|
|
130
104
|
if (_i == null) return;
|
|
@@ -152,9 +126,6 @@ function _iterable_to_array_limit(arr, i) {
|
|
|
152
126
|
function _non_iterable_rest() {
|
|
153
127
|
throw new TypeError("Invalid attempt to destructure non-iterable instance.\\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.");
|
|
154
128
|
}
|
|
155
|
-
function _non_iterable_spread() {
|
|
156
|
-
throw new TypeError("Invalid attempt to spread non-iterable instance.\\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.");
|
|
157
|
-
}
|
|
158
129
|
function _object_spread(target) {
|
|
159
130
|
for(var i = 1; i < arguments.length; i++){
|
|
160
131
|
var source = arguments[i] != null ? arguments[i] : {};
|
|
@@ -170,30 +141,6 @@ function _object_spread(target) {
|
|
|
170
141
|
}
|
|
171
142
|
return target;
|
|
172
143
|
}
|
|
173
|
-
function ownKeys(object, enumerableOnly) {
|
|
174
|
-
var keys = Object.keys(object);
|
|
175
|
-
if (Object.getOwnPropertySymbols) {
|
|
176
|
-
var symbols = Object.getOwnPropertySymbols(object);
|
|
177
|
-
if (enumerableOnly) {
|
|
178
|
-
symbols = symbols.filter(function(sym) {
|
|
179
|
-
return Object.getOwnPropertyDescriptor(object, sym).enumerable;
|
|
180
|
-
});
|
|
181
|
-
}
|
|
182
|
-
keys.push.apply(keys, symbols);
|
|
183
|
-
}
|
|
184
|
-
return keys;
|
|
185
|
-
}
|
|
186
|
-
function _object_spread_props(target, source) {
|
|
187
|
-
source = source != null ? source : {};
|
|
188
|
-
if (Object.getOwnPropertyDescriptors) {
|
|
189
|
-
Object.defineProperties(target, Object.getOwnPropertyDescriptors(source));
|
|
190
|
-
} else {
|
|
191
|
-
ownKeys(Object(source)).forEach(function(key) {
|
|
192
|
-
Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key));
|
|
193
|
-
});
|
|
194
|
-
}
|
|
195
|
-
return target;
|
|
196
|
-
}
|
|
197
144
|
function _possible_constructor_return(self, call) {
|
|
198
145
|
if (call && (_type_of(call) === "object" || typeof call === "function")) {
|
|
199
146
|
return call;
|
|
@@ -210,9 +157,6 @@ function _set_prototype_of(o, p) {
|
|
|
210
157
|
function _sliced_to_array(arr, i) {
|
|
211
158
|
return _array_with_holes(arr) || _iterable_to_array_limit(arr, i) || _unsupported_iterable_to_array(arr, i) || _non_iterable_rest();
|
|
212
159
|
}
|
|
213
|
-
function _to_consumable_array(arr) {
|
|
214
|
-
return _array_without_holes(arr) || _iterable_to_array(arr) || _unsupported_iterable_to_array(arr) || _non_iterable_spread();
|
|
215
|
-
}
|
|
216
160
|
function _type_of(obj) {
|
|
217
161
|
"@swc/helpers - typeof";
|
|
218
162
|
return obj && typeof Symbol !== "undefined" && obj.constructor === Symbol ? "symbol" : typeof obj;
|
|
@@ -225,32 +169,6 @@ function _unsupported_iterable_to_array(o, minLen) {
|
|
|
225
169
|
if (n === "Map" || n === "Set") return Array.from(n);
|
|
226
170
|
if (n === "Arguments" || /^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(n)) return _array_like_to_array(o, minLen);
|
|
227
171
|
}
|
|
228
|
-
function _wrap_native_super(Class) {
|
|
229
|
-
var _cache = typeof Map === "function" ? new Map() : undefined;
|
|
230
|
-
_wrap_native_super = function wrapNativeSuper(Class) {
|
|
231
|
-
if (Class === null || !_is_native_function(Class)) return Class;
|
|
232
|
-
if (typeof Class !== "function") {
|
|
233
|
-
throw new TypeError("Super expression must either be null or a function");
|
|
234
|
-
}
|
|
235
|
-
if (typeof _cache !== "undefined") {
|
|
236
|
-
if (_cache.has(Class)) return _cache.get(Class);
|
|
237
|
-
_cache.set(Class, Wrapper);
|
|
238
|
-
}
|
|
239
|
-
function Wrapper() {
|
|
240
|
-
return _construct(Class, arguments, _get_prototype_of(this).constructor);
|
|
241
|
-
}
|
|
242
|
-
Wrapper.prototype = Object.create(Class.prototype, {
|
|
243
|
-
constructor: {
|
|
244
|
-
value: Wrapper,
|
|
245
|
-
enumerable: false,
|
|
246
|
-
writable: true,
|
|
247
|
-
configurable: true
|
|
248
|
-
}
|
|
249
|
-
});
|
|
250
|
-
return _set_prototype_of(Wrapper, Class);
|
|
251
|
-
};
|
|
252
|
-
return _wrap_native_super(Class);
|
|
253
|
-
}
|
|
254
172
|
function _is_native_reflect_construct() {
|
|
255
173
|
if (typeof Reflect === "undefined" || !Reflect.construct) return false;
|
|
256
174
|
if (Reflect.construct.sham) return false;
|
|
@@ -370,7 +288,7 @@ function _ts_generator(thisArg, body) {
|
|
|
370
288
|
};
|
|
371
289
|
}
|
|
372
290
|
}
|
|
373
|
-
import { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BaseHttpClient, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_FEATURE_FLAG_SERVICE, ITF_HTTP_CLIENT, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemRegistryService, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MOCK_USER, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, __export, __name, __publicField, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, checkHttpStandizedError, commonIOCModule, componentsIOCModule, container, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadBaseContainerModules, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports, qa_exports, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice } from "./chunk-JD66VP74.mjs";
|
|
291
|
+
import { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BaseHttpClient, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_FEATURE_FLAG_SERVICE, ITF_HTTP_CLIENT, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemRegistryService, InMemSsoAccessTokenService, InterestTierResponseTypeEnum, IsMockModeEnabled, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MOCK_USER, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, __name, __publicField, accountsIOCModule, addExternalCard, addExternalCardWithUserToken, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, checkHttpStandizedError, commonIOCModule, componentsIOCModule, container, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getExternalCards, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, initiateTransfer, isComponentEnabled, kybIOCModule, kycIOCModule, loadBaseContainerModules, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports, qa_exports, refreshAccessToken, registerDeviceForPushNotifications, removeExternalCard, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice } from "./chunk-HQM634NL.mjs";
|
|
374
292
|
// src/ioc/reactNativeContainer.ts
|
|
375
293
|
import { Container } from "inversify";
|
|
376
294
|
// src/feature-flags/ioc/reactNativefeatureFlagsIOCModule.ts
|
|
@@ -456,1605 +374,10 @@ var reactNativeCommonIOCModule = new ContainerModule2(function(bind) {
|
|
|
456
374
|
});
|
|
457
375
|
// src/auth/ioc/reactNativeAuthIOCModule.ts
|
|
458
376
|
import { ContainerModule as ContainerModule3 } from "inversify";
|
|
459
|
-
// src/auth/adapters/dpop/
|
|
377
|
+
// src/auth/adapters/dpop/JsrsasignDpopAuthCredentialService.ts
|
|
460
378
|
import { injectable as injectable2 } from "inversify";
|
|
461
|
-
import {
|
|
462
|
-
|
|
463
|
-
import { Buffer as Buffer2 } from "buffer";
|
|
464
|
-
// node_modules/jose/dist/node/esm/lib/buffer_utils.js
|
|
465
|
-
var encoder = new TextEncoder();
|
|
466
|
-
var decoder = new TextDecoder();
|
|
467
|
-
var MAX_INT32 = Math.pow(2, 32);
|
|
468
|
-
function concat() {
|
|
469
|
-
for(var _len = arguments.length, buffers = new Array(_len), _key = 0; _key < _len; _key++){
|
|
470
|
-
buffers[_key] = arguments[_key];
|
|
471
|
-
}
|
|
472
|
-
var size = buffers.reduce(function(acc, param) {
|
|
473
|
-
var length = param.length;
|
|
474
|
-
return acc + length;
|
|
475
|
-
}, 0);
|
|
476
|
-
var buf = new Uint8Array(size);
|
|
477
|
-
var i = 0;
|
|
478
|
-
var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
|
|
479
|
-
try {
|
|
480
|
-
for(var _iterator = buffers[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
|
|
481
|
-
var buffer = _step.value;
|
|
482
|
-
buf.set(buffer, i);
|
|
483
|
-
i += buffer.length;
|
|
484
|
-
}
|
|
485
|
-
} catch (err) {
|
|
486
|
-
_didIteratorError = true;
|
|
487
|
-
_iteratorError = err;
|
|
488
|
-
} finally{
|
|
489
|
-
try {
|
|
490
|
-
if (!_iteratorNormalCompletion && _iterator.return != null) {
|
|
491
|
-
_iterator.return();
|
|
492
|
-
}
|
|
493
|
-
} finally{
|
|
494
|
-
if (_didIteratorError) {
|
|
495
|
-
throw _iteratorError;
|
|
496
|
-
}
|
|
497
|
-
}
|
|
498
|
-
}
|
|
499
|
-
return buf;
|
|
500
|
-
}
|
|
501
|
-
__name(concat, "concat");
|
|
502
|
-
// node_modules/jose/dist/node/esm/runtime/base64url.js
|
|
503
|
-
function normalize(input) {
|
|
504
|
-
var encoded = input;
|
|
505
|
-
if (_instanceof(encoded, Uint8Array)) {
|
|
506
|
-
encoded = decoder.decode(encoded);
|
|
507
|
-
}
|
|
508
|
-
return encoded;
|
|
509
|
-
}
|
|
510
|
-
__name(normalize, "normalize");
|
|
511
|
-
var encode = /* @__PURE__ */ __name(function(input) {
|
|
512
|
-
return Buffer2.from(input).toString("base64url");
|
|
513
|
-
}, "encode");
|
|
514
|
-
var decode = /* @__PURE__ */ __name(function(input) {
|
|
515
|
-
return new Uint8Array(Buffer2.from(normalize(input), "base64url"));
|
|
516
|
-
}, "decode");
|
|
517
|
-
// node_modules/jose/dist/node/esm/util/errors.js
|
|
518
|
-
var _JOSEError = /*#__PURE__*/ function(Error1) {
|
|
519
|
-
"use strict";
|
|
520
|
-
_inherits(_JOSEError, Error1);
|
|
521
|
-
var _super = _create_super(_JOSEError);
|
|
522
|
-
function _JOSEError(message2, options) {
|
|
523
|
-
_class_call_check(this, _JOSEError);
|
|
524
|
-
var _this;
|
|
525
|
-
var _Error_captureStackTrace, _Error;
|
|
526
|
-
_this = _super.call(this, message2, options);
|
|
527
|
-
__publicField(_assert_this_initialized(_this), "code", "ERR_JOSE_GENERIC");
|
|
528
|
-
_this.name = _this.constructor.name;
|
|
529
|
-
(_Error_captureStackTrace = (_Error = Error).captureStackTrace) === null || _Error_captureStackTrace === void 0 ? void 0 : _Error_captureStackTrace.call(_Error, _assert_this_initialized(_this), _this.constructor);
|
|
530
|
-
return _this;
|
|
531
|
-
}
|
|
532
|
-
return _JOSEError;
|
|
533
|
-
}(_wrap_native_super(Error));
|
|
534
|
-
__name(_JOSEError, "JOSEError");
|
|
535
|
-
__publicField(_JOSEError, "code", "ERR_JOSE_GENERIC");
|
|
536
|
-
var JOSEError = _JOSEError;
|
|
537
|
-
var _JOSENotSupported = /*#__PURE__*/ function(JOSEError) {
|
|
538
|
-
"use strict";
|
|
539
|
-
_inherits(_JOSENotSupported, JOSEError);
|
|
540
|
-
var _super = _create_super(_JOSENotSupported);
|
|
541
|
-
function _JOSENotSupported() {
|
|
542
|
-
_class_call_check(this, _JOSENotSupported);
|
|
543
|
-
var _this;
|
|
544
|
-
_this = _super.call.apply(_super, [
|
|
545
|
-
this
|
|
546
|
-
].concat(Array.prototype.slice.call(arguments)));
|
|
547
|
-
__publicField(_assert_this_initialized(_this), "code", "ERR_JOSE_NOT_SUPPORTED");
|
|
548
|
-
return _this;
|
|
549
|
-
}
|
|
550
|
-
return _JOSENotSupported;
|
|
551
|
-
}(JOSEError);
|
|
552
|
-
__name(_JOSENotSupported, "JOSENotSupported");
|
|
553
|
-
__publicField(_JOSENotSupported, "code", "ERR_JOSE_NOT_SUPPORTED");
|
|
554
|
-
var JOSENotSupported = _JOSENotSupported;
|
|
555
|
-
var _JWSInvalid = /*#__PURE__*/ function(JOSEError) {
|
|
556
|
-
"use strict";
|
|
557
|
-
_inherits(_JWSInvalid, JOSEError);
|
|
558
|
-
var _super = _create_super(_JWSInvalid);
|
|
559
|
-
function _JWSInvalid() {
|
|
560
|
-
_class_call_check(this, _JWSInvalid);
|
|
561
|
-
var _this;
|
|
562
|
-
_this = _super.call.apply(_super, [
|
|
563
|
-
this
|
|
564
|
-
].concat(Array.prototype.slice.call(arguments)));
|
|
565
|
-
__publicField(_assert_this_initialized(_this), "code", "ERR_JWS_INVALID");
|
|
566
|
-
return _this;
|
|
567
|
-
}
|
|
568
|
-
return _JWSInvalid;
|
|
569
|
-
}(JOSEError);
|
|
570
|
-
__name(_JWSInvalid, "JWSInvalid");
|
|
571
|
-
__publicField(_JWSInvalid, "code", "ERR_JWS_INVALID");
|
|
572
|
-
var JWSInvalid = _JWSInvalid;
|
|
573
|
-
var _JWTInvalid = /*#__PURE__*/ function(JOSEError) {
|
|
574
|
-
"use strict";
|
|
575
|
-
_inherits(_JWTInvalid, JOSEError);
|
|
576
|
-
var _super = _create_super(_JWTInvalid);
|
|
577
|
-
function _JWTInvalid() {
|
|
578
|
-
_class_call_check(this, _JWTInvalid);
|
|
579
|
-
var _this;
|
|
580
|
-
_this = _super.call.apply(_super, [
|
|
581
|
-
this
|
|
582
|
-
].concat(Array.prototype.slice.call(arguments)));
|
|
583
|
-
__publicField(_assert_this_initialized(_this), "code", "ERR_JWT_INVALID");
|
|
584
|
-
return _this;
|
|
585
|
-
}
|
|
586
|
-
return _JWTInvalid;
|
|
587
|
-
}(JOSEError);
|
|
588
|
-
__name(_JWTInvalid, "JWTInvalid");
|
|
589
|
-
__publicField(_JWTInvalid, "code", "ERR_JWT_INVALID");
|
|
590
|
-
var JWTInvalid = _JWTInvalid;
|
|
591
|
-
// node_modules/jose/dist/node/esm/runtime/is_key_object.js
|
|
592
|
-
import * as util from "util";
|
|
593
|
-
var is_key_object_default = /* @__PURE__ */ __name(function(obj) {
|
|
594
|
-
return util.types.isKeyObject(obj);
|
|
595
|
-
}, "default");
|
|
596
|
-
// node_modules/jose/dist/node/esm/runtime/webcrypto.js
|
|
597
|
-
import * as crypto from "crypto";
|
|
598
|
-
import * as util2 from "util";
|
|
599
|
-
var webcrypto2 = crypto.webcrypto;
|
|
600
|
-
var webcrypto_default = webcrypto2;
|
|
601
|
-
var isCryptoKey = /* @__PURE__ */ __name(function(key) {
|
|
602
|
-
return util2.types.isCryptoKey(key);
|
|
603
|
-
}, "isCryptoKey");
|
|
604
|
-
// node_modules/jose/dist/node/esm/lib/crypto_key.js
|
|
605
|
-
function unusable(name) {
|
|
606
|
-
var prop = arguments.length > 1 && arguments[1] !== void 0 ? arguments[1] : "algorithm.name";
|
|
607
|
-
return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
|
|
608
|
-
}
|
|
609
|
-
__name(unusable, "unusable");
|
|
610
|
-
function isAlgorithm(algorithm, name) {
|
|
611
|
-
return algorithm.name === name;
|
|
612
|
-
}
|
|
613
|
-
__name(isAlgorithm, "isAlgorithm");
|
|
614
|
-
function getHashLength(hash) {
|
|
615
|
-
return parseInt(hash.name.slice(4), 10);
|
|
616
|
-
}
|
|
617
|
-
__name(getHashLength, "getHashLength");
|
|
618
|
-
function getNamedCurve(alg) {
|
|
619
|
-
switch(alg){
|
|
620
|
-
case "ES256":
|
|
621
|
-
return "P-256";
|
|
622
|
-
case "ES384":
|
|
623
|
-
return "P-384";
|
|
624
|
-
case "ES512":
|
|
625
|
-
return "P-521";
|
|
626
|
-
default:
|
|
627
|
-
throw new Error("unreachable");
|
|
628
|
-
}
|
|
629
|
-
}
|
|
630
|
-
__name(getNamedCurve, "getNamedCurve");
|
|
631
|
-
function checkUsage(key, usages) {
|
|
632
|
-
if (usages.length && !usages.some(function(expected) {
|
|
633
|
-
return key.usages.includes(expected);
|
|
634
|
-
})) {
|
|
635
|
-
var msg = "CryptoKey does not support this operation, its usages must include ";
|
|
636
|
-
if (usages.length > 2) {
|
|
637
|
-
var last = usages.pop();
|
|
638
|
-
msg += "one of ".concat(usages.join(", "), ", or ").concat(last, ".");
|
|
639
|
-
} else if (usages.length === 2) {
|
|
640
|
-
msg += "one of ".concat(usages[0], " or ").concat(usages[1], ".");
|
|
641
|
-
} else {
|
|
642
|
-
msg += "".concat(usages[0], ".");
|
|
643
|
-
}
|
|
644
|
-
throw new TypeError(msg);
|
|
645
|
-
}
|
|
646
|
-
}
|
|
647
|
-
__name(checkUsage, "checkUsage");
|
|
648
|
-
function checkSigCryptoKey(key, alg) {
|
|
649
|
-
for(var _len = arguments.length, usages = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
|
|
650
|
-
usages[_key - 2] = arguments[_key];
|
|
651
|
-
}
|
|
652
|
-
switch(alg){
|
|
653
|
-
case "HS256":
|
|
654
|
-
case "HS384":
|
|
655
|
-
case "HS512":
|
|
656
|
-
{
|
|
657
|
-
if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
|
|
658
|
-
var expected = parseInt(alg.slice(2), 10);
|
|
659
|
-
var actual = getHashLength(key.algorithm.hash);
|
|
660
|
-
if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
|
|
661
|
-
break;
|
|
662
|
-
}
|
|
663
|
-
case "RS256":
|
|
664
|
-
case "RS384":
|
|
665
|
-
case "RS512":
|
|
666
|
-
{
|
|
667
|
-
if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
|
|
668
|
-
var expected1 = parseInt(alg.slice(2), 10);
|
|
669
|
-
var actual1 = getHashLength(key.algorithm.hash);
|
|
670
|
-
if (actual1 !== expected1) throw unusable("SHA-".concat(expected1), "algorithm.hash");
|
|
671
|
-
break;
|
|
672
|
-
}
|
|
673
|
-
case "PS256":
|
|
674
|
-
case "PS384":
|
|
675
|
-
case "PS512":
|
|
676
|
-
{
|
|
677
|
-
if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
|
|
678
|
-
var expected2 = parseInt(alg.slice(2), 10);
|
|
679
|
-
var actual2 = getHashLength(key.algorithm.hash);
|
|
680
|
-
if (actual2 !== expected2) throw unusable("SHA-".concat(expected2), "algorithm.hash");
|
|
681
|
-
break;
|
|
682
|
-
}
|
|
683
|
-
case "EdDSA":
|
|
684
|
-
{
|
|
685
|
-
if (key.algorithm.name !== "Ed25519" && key.algorithm.name !== "Ed448") {
|
|
686
|
-
throw unusable("Ed25519 or Ed448");
|
|
687
|
-
}
|
|
688
|
-
break;
|
|
689
|
-
}
|
|
690
|
-
case "Ed25519":
|
|
691
|
-
{
|
|
692
|
-
if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
|
|
693
|
-
break;
|
|
694
|
-
}
|
|
695
|
-
case "ES256":
|
|
696
|
-
case "ES384":
|
|
697
|
-
case "ES512":
|
|
698
|
-
{
|
|
699
|
-
if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
|
|
700
|
-
var expected3 = getNamedCurve(alg);
|
|
701
|
-
var actual3 = key.algorithm.namedCurve;
|
|
702
|
-
if (actual3 !== expected3) throw unusable(expected3, "algorithm.namedCurve");
|
|
703
|
-
break;
|
|
704
|
-
}
|
|
705
|
-
default:
|
|
706
|
-
throw new TypeError("CryptoKey does not support this operation");
|
|
707
|
-
}
|
|
708
|
-
checkUsage(key, usages);
|
|
709
|
-
}
|
|
710
|
-
__name(checkSigCryptoKey, "checkSigCryptoKey");
|
|
711
|
-
// node_modules/jose/dist/node/esm/lib/invalid_key_input.js
|
|
712
|
-
function message(msg, actual) {
|
|
713
|
-
for(var _len = arguments.length, types4 = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
|
|
714
|
-
types4[_key - 2] = arguments[_key];
|
|
715
|
-
}
|
|
716
|
-
types4 = types4.filter(Boolean);
|
|
717
|
-
if (types4.length > 2) {
|
|
718
|
-
var last = types4.pop();
|
|
719
|
-
msg += "one of type ".concat(types4.join(", "), ", or ").concat(last, ".");
|
|
720
|
-
} else if (types4.length === 2) {
|
|
721
|
-
msg += "one of type ".concat(types4[0], " or ").concat(types4[1], ".");
|
|
722
|
-
} else {
|
|
723
|
-
msg += "of type ".concat(types4[0], ".");
|
|
724
|
-
}
|
|
725
|
-
if (actual == null) {
|
|
726
|
-
msg += " Received ".concat(actual);
|
|
727
|
-
} else if (typeof actual === "function" && actual.name) {
|
|
728
|
-
msg += " Received function ".concat(actual.name);
|
|
729
|
-
} else if ((typeof actual === "undefined" ? "undefined" : _type_of(actual)) === "object" && actual != null) {
|
|
730
|
-
var _actual_constructor;
|
|
731
|
-
if ((_actual_constructor = actual.constructor) === null || _actual_constructor === void 0 ? void 0 : _actual_constructor.name) {
|
|
732
|
-
msg += " Received an instance of ".concat(actual.constructor.name);
|
|
733
|
-
}
|
|
734
|
-
}
|
|
735
|
-
return msg;
|
|
736
|
-
}
|
|
737
|
-
__name(message, "message");
|
|
738
|
-
var invalid_key_input_default = /* @__PURE__ */ __name(function(actual) {
|
|
739
|
-
for(var _len = arguments.length, types4 = new Array(_len > 1 ? _len - 1 : 0), _key = 1; _key < _len; _key++){
|
|
740
|
-
types4[_key - 1] = arguments[_key];
|
|
741
|
-
}
|
|
742
|
-
return message.apply(void 0, [
|
|
743
|
-
"Key must be ",
|
|
744
|
-
actual
|
|
745
|
-
].concat(_to_consumable_array(types4)));
|
|
746
|
-
}, "default");
|
|
747
|
-
function withAlg(alg, actual) {
|
|
748
|
-
for(var _len = arguments.length, types4 = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++){
|
|
749
|
-
types4[_key - 2] = arguments[_key];
|
|
750
|
-
}
|
|
751
|
-
return message.apply(void 0, [
|
|
752
|
-
"Key for the ".concat(alg, " algorithm must be "),
|
|
753
|
-
actual
|
|
754
|
-
].concat(_to_consumable_array(types4)));
|
|
755
|
-
}
|
|
756
|
-
__name(withAlg, "withAlg");
|
|
757
|
-
// node_modules/jose/dist/node/esm/runtime/is_key_like.js
|
|
758
|
-
var is_key_like_default = /* @__PURE__ */ __name(function(key) {
|
|
759
|
-
return is_key_object_default(key) || isCryptoKey(key);
|
|
760
|
-
}, "default");
|
|
761
|
-
var types3 = [
|
|
762
|
-
"KeyObject"
|
|
763
|
-
];
|
|
764
|
-
if (globalThis.CryptoKey || (webcrypto_default === null || webcrypto_default === void 0 ? void 0 : webcrypto_default.CryptoKey)) {
|
|
765
|
-
types3.push("CryptoKey");
|
|
766
|
-
}
|
|
767
|
-
// node_modules/jose/dist/node/esm/lib/is_disjoint.js
|
|
768
|
-
var isDisjoint = /* @__PURE__ */ __name(function() {
|
|
769
|
-
for(var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++){
|
|
770
|
-
headers[_key] = arguments[_key];
|
|
771
|
-
}
|
|
772
|
-
var sources = headers.filter(Boolean);
|
|
773
|
-
if (sources.length === 0 || sources.length === 1) {
|
|
774
|
-
return true;
|
|
775
|
-
}
|
|
776
|
-
var acc;
|
|
777
|
-
var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
|
|
778
|
-
try {
|
|
779
|
-
for(var _iterator = sources[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
|
|
780
|
-
var header = _step.value;
|
|
781
|
-
var parameters = Object.keys(header);
|
|
782
|
-
if (!acc || acc.size === 0) {
|
|
783
|
-
acc = new Set(parameters);
|
|
784
|
-
continue;
|
|
785
|
-
}
|
|
786
|
-
var _iteratorNormalCompletion1 = true, _didIteratorError1 = false, _iteratorError1 = undefined;
|
|
787
|
-
try {
|
|
788
|
-
for(var _iterator1 = parameters[Symbol.iterator](), _step1; !(_iteratorNormalCompletion1 = (_step1 = _iterator1.next()).done); _iteratorNormalCompletion1 = true){
|
|
789
|
-
var parameter = _step1.value;
|
|
790
|
-
if (acc.has(parameter)) {
|
|
791
|
-
return false;
|
|
792
|
-
}
|
|
793
|
-
acc.add(parameter);
|
|
794
|
-
}
|
|
795
|
-
} catch (err) {
|
|
796
|
-
_didIteratorError1 = true;
|
|
797
|
-
_iteratorError1 = err;
|
|
798
|
-
} finally{
|
|
799
|
-
try {
|
|
800
|
-
if (!_iteratorNormalCompletion1 && _iterator1.return != null) {
|
|
801
|
-
_iterator1.return();
|
|
802
|
-
}
|
|
803
|
-
} finally{
|
|
804
|
-
if (_didIteratorError1) {
|
|
805
|
-
throw _iteratorError1;
|
|
806
|
-
}
|
|
807
|
-
}
|
|
808
|
-
}
|
|
809
|
-
}
|
|
810
|
-
} catch (err) {
|
|
811
|
-
_didIteratorError = true;
|
|
812
|
-
_iteratorError = err;
|
|
813
|
-
} finally{
|
|
814
|
-
try {
|
|
815
|
-
if (!_iteratorNormalCompletion && _iterator.return != null) {
|
|
816
|
-
_iterator.return();
|
|
817
|
-
}
|
|
818
|
-
} finally{
|
|
819
|
-
if (_didIteratorError) {
|
|
820
|
-
throw _iteratorError;
|
|
821
|
-
}
|
|
822
|
-
}
|
|
823
|
-
}
|
|
824
|
-
return true;
|
|
825
|
-
}, "isDisjoint");
|
|
826
|
-
var is_disjoint_default = isDisjoint;
|
|
827
|
-
// node_modules/jose/dist/node/esm/lib/is_object.js
|
|
828
|
-
function isObjectLike(value) {
|
|
829
|
-
return (typeof value === "undefined" ? "undefined" : _type_of(value)) === "object" && value !== null;
|
|
830
|
-
}
|
|
831
|
-
__name(isObjectLike, "isObjectLike");
|
|
832
|
-
function isObject(input) {
|
|
833
|
-
if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
|
|
834
|
-
return false;
|
|
835
|
-
}
|
|
836
|
-
if (Object.getPrototypeOf(input) === null) {
|
|
837
|
-
return true;
|
|
838
|
-
}
|
|
839
|
-
var proto = input;
|
|
840
|
-
while(Object.getPrototypeOf(proto) !== null){
|
|
841
|
-
proto = Object.getPrototypeOf(proto);
|
|
842
|
-
}
|
|
843
|
-
return Object.getPrototypeOf(input) === proto;
|
|
844
|
-
}
|
|
845
|
-
__name(isObject, "isObject");
|
|
846
|
-
// node_modules/jose/dist/node/esm/runtime/get_named_curve.js
|
|
847
|
-
import { KeyObject } from "crypto";
|
|
848
|
-
// node_modules/jose/dist/node/esm/lib/is_jwk.js
|
|
849
|
-
function isJWK(key) {
|
|
850
|
-
return isObject(key) && typeof key.kty === "string";
|
|
851
|
-
}
|
|
852
|
-
__name(isJWK, "isJWK");
|
|
853
|
-
function isPrivateJWK(key) {
|
|
854
|
-
return key.kty !== "oct" && typeof key.d === "string";
|
|
855
|
-
}
|
|
856
|
-
__name(isPrivateJWK, "isPrivateJWK");
|
|
857
|
-
function isPublicJWK(key) {
|
|
858
|
-
return key.kty !== "oct" && typeof key.d === "undefined";
|
|
859
|
-
}
|
|
860
|
-
__name(isPublicJWK, "isPublicJWK");
|
|
861
|
-
function isSecretJWK(key) {
|
|
862
|
-
return isJWK(key) && key.kty === "oct" && typeof key.k === "string";
|
|
863
|
-
}
|
|
864
|
-
__name(isSecretJWK, "isSecretJWK");
|
|
865
|
-
// node_modules/jose/dist/node/esm/runtime/get_named_curve.js
|
|
866
|
-
var namedCurveToJOSE = /* @__PURE__ */ __name(function(namedCurve) {
|
|
867
|
-
switch(namedCurve){
|
|
868
|
-
case "prime256v1":
|
|
869
|
-
return "P-256";
|
|
870
|
-
case "secp384r1":
|
|
871
|
-
return "P-384";
|
|
872
|
-
case "secp521r1":
|
|
873
|
-
return "P-521";
|
|
874
|
-
case "secp256k1":
|
|
875
|
-
return "secp256k1";
|
|
876
|
-
default:
|
|
877
|
-
throw new JOSENotSupported("Unsupported key curve for this operation");
|
|
878
|
-
}
|
|
879
|
-
}, "namedCurveToJOSE");
|
|
880
|
-
var getNamedCurve2 = /* @__PURE__ */ __name(function(kee, raw) {
|
|
881
|
-
var key;
|
|
882
|
-
if (isCryptoKey(kee)) {
|
|
883
|
-
key = KeyObject.from(kee);
|
|
884
|
-
} else if (is_key_object_default(kee)) {
|
|
885
|
-
key = kee;
|
|
886
|
-
} else if (isJWK(kee)) {
|
|
887
|
-
return kee.crv;
|
|
888
|
-
} else {
|
|
889
|
-
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
890
|
-
kee
|
|
891
|
-
].concat(_to_consumable_array(types3))));
|
|
892
|
-
}
|
|
893
|
-
if (key.type === "secret") {
|
|
894
|
-
throw new TypeError('only "private" or "public" type keys can be used for this operation');
|
|
895
|
-
}
|
|
896
|
-
switch(key.asymmetricKeyType){
|
|
897
|
-
case "ed25519":
|
|
898
|
-
case "ed448":
|
|
899
|
-
return "Ed".concat(key.asymmetricKeyType.slice(2));
|
|
900
|
-
case "x25519":
|
|
901
|
-
case "x448":
|
|
902
|
-
return "X".concat(key.asymmetricKeyType.slice(1));
|
|
903
|
-
case "ec":
|
|
904
|
-
{
|
|
905
|
-
var namedCurve = key.asymmetricKeyDetails.namedCurve;
|
|
906
|
-
if (raw) {
|
|
907
|
-
return namedCurve;
|
|
908
|
-
}
|
|
909
|
-
return namedCurveToJOSE(namedCurve);
|
|
910
|
-
}
|
|
911
|
-
default:
|
|
912
|
-
throw new TypeError("Invalid asymmetric key type for this operation");
|
|
913
|
-
}
|
|
914
|
-
}, "getNamedCurve");
|
|
915
|
-
var get_named_curve_default = getNamedCurve2;
|
|
916
|
-
// node_modules/jose/dist/node/esm/runtime/check_key_length.js
|
|
917
|
-
import { KeyObject as KeyObject2 } from "crypto";
|
|
918
|
-
var check_key_length_default = /* @__PURE__ */ __name(function(key, alg) {
|
|
919
|
-
var modulusLength;
|
|
920
|
-
try {
|
|
921
|
-
if (_instanceof(key, KeyObject2)) {
|
|
922
|
-
var _key_asymmetricKeyDetails;
|
|
923
|
-
modulusLength = (_key_asymmetricKeyDetails = key.asymmetricKeyDetails) === null || _key_asymmetricKeyDetails === void 0 ? void 0 : _key_asymmetricKeyDetails.modulusLength;
|
|
924
|
-
} else {
|
|
925
|
-
modulusLength = Buffer.from(key.n, "base64url").byteLength << 3;
|
|
926
|
-
}
|
|
927
|
-
} catch (e) {}
|
|
928
|
-
if (typeof modulusLength !== "number" || modulusLength < 2048) {
|
|
929
|
-
throw new TypeError("".concat(alg, " requires key modulusLength to be 2048 bits or larger"));
|
|
930
|
-
}
|
|
931
|
-
}, "default");
|
|
932
|
-
// node_modules/jose/dist/node/esm/runtime/jwk_to_key.js
|
|
933
|
-
import { createPrivateKey, createPublicKey } from "crypto";
|
|
934
|
-
var parse = /* @__PURE__ */ __name(function(key) {
|
|
935
|
-
if (key.d) {
|
|
936
|
-
return createPrivateKey({
|
|
937
|
-
format: "jwk",
|
|
938
|
-
key: key
|
|
939
|
-
});
|
|
940
|
-
}
|
|
941
|
-
return createPublicKey({
|
|
942
|
-
format: "jwk",
|
|
943
|
-
key: key
|
|
944
|
-
});
|
|
945
|
-
}, "parse");
|
|
946
|
-
var jwk_to_key_default = parse;
|
|
947
|
-
function importJWK(jwk, alg) {
|
|
948
|
-
return _importJWK.apply(this, arguments);
|
|
949
|
-
}
|
|
950
|
-
function _importJWK() {
|
|
951
|
-
_importJWK = // node_modules/jose/dist/node/esm/key/import.js
|
|
952
|
-
_async_to_generator(function(jwk, alg) {
|
|
953
|
-
return _ts_generator(this, function(_state) {
|
|
954
|
-
if (!isObject(jwk)) {
|
|
955
|
-
throw new TypeError("JWK must be an object");
|
|
956
|
-
}
|
|
957
|
-
alg || (alg = jwk.alg);
|
|
958
|
-
switch(jwk.kty){
|
|
959
|
-
case "oct":
|
|
960
|
-
if (typeof jwk.k !== "string" || !jwk.k) {
|
|
961
|
-
throw new TypeError('missing "k" (Key Value) Parameter value');
|
|
962
|
-
}
|
|
963
|
-
return [
|
|
964
|
-
2,
|
|
965
|
-
decode(jwk.k)
|
|
966
|
-
];
|
|
967
|
-
case "RSA":
|
|
968
|
-
if ("oth" in jwk && jwk.oth !== void 0) {
|
|
969
|
-
throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
|
|
970
|
-
}
|
|
971
|
-
case "EC":
|
|
972
|
-
case "OKP":
|
|
973
|
-
return [
|
|
974
|
-
2,
|
|
975
|
-
jwk_to_key_default(_object_spread_props(_object_spread({}, jwk), {
|
|
976
|
-
alg: alg
|
|
977
|
-
}))
|
|
978
|
-
];
|
|
979
|
-
default:
|
|
980
|
-
throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
|
|
981
|
-
}
|
|
982
|
-
return [
|
|
983
|
-
2
|
|
984
|
-
];
|
|
985
|
-
});
|
|
986
|
-
});
|
|
987
|
-
return _importJWK.apply(this, arguments);
|
|
988
|
-
}
|
|
989
|
-
__name(importJWK, "importJWK");
|
|
990
|
-
// node_modules/jose/dist/node/esm/lib/check_key_type.js
|
|
991
|
-
var tag = /* @__PURE__ */ __name(function(key) {
|
|
992
|
-
return key === null || key === void 0 ? void 0 : key[Symbol.toStringTag];
|
|
993
|
-
}, "tag");
|
|
994
|
-
var jwkMatchesOp = /* @__PURE__ */ __name(function(alg, key, usage) {
|
|
995
|
-
var _key_key_ops_includes, _key_key_ops;
|
|
996
|
-
if (key.use !== void 0 && key.use !== "sig") {
|
|
997
|
-
throw new TypeError("Invalid key for this operation, when present its use must be sig");
|
|
998
|
-
}
|
|
999
|
-
if (key.key_ops !== void 0 && ((_key_key_ops_includes = (_key_key_ops = key.key_ops).includes) === null || _key_key_ops_includes === void 0 ? void 0 : _key_key_ops_includes.call(_key_key_ops, usage)) !== true) {
|
|
1000
|
-
throw new TypeError("Invalid key for this operation, when present its key_ops must include ".concat(usage));
|
|
1001
|
-
}
|
|
1002
|
-
if (key.alg !== void 0 && key.alg !== alg) {
|
|
1003
|
-
throw new TypeError("Invalid key for this operation, when present its alg must be ".concat(alg));
|
|
1004
|
-
}
|
|
1005
|
-
return true;
|
|
1006
|
-
}, "jwkMatchesOp");
|
|
1007
|
-
var symmetricTypeCheck = /* @__PURE__ */ __name(function(alg, key, usage, allowJwk) {
|
|
1008
|
-
if (_instanceof(key, Uint8Array)) return;
|
|
1009
|
-
if (allowJwk && isJWK(key)) {
|
|
1010
|
-
if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage)) return;
|
|
1011
|
-
throw new TypeError('JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present');
|
|
1012
|
-
}
|
|
1013
|
-
if (!is_key_like_default(key)) {
|
|
1014
|
-
throw new TypeError(withAlg.apply(void 0, [
|
|
1015
|
-
alg,
|
|
1016
|
-
key
|
|
1017
|
-
].concat(_to_consumable_array(types3), [
|
|
1018
|
-
"Uint8Array",
|
|
1019
|
-
allowJwk ? "JSON Web Key" : null
|
|
1020
|
-
])));
|
|
1021
|
-
}
|
|
1022
|
-
if (key.type !== "secret") {
|
|
1023
|
-
throw new TypeError("".concat(tag(key), ' instances for symmetric algorithms must be of type "secret"'));
|
|
1024
|
-
}
|
|
1025
|
-
}, "symmetricTypeCheck");
|
|
1026
|
-
var asymmetricTypeCheck = /* @__PURE__ */ __name(function(alg, key, usage, allowJwk) {
|
|
1027
|
-
if (allowJwk && isJWK(key)) {
|
|
1028
|
-
switch(usage){
|
|
1029
|
-
case "sign":
|
|
1030
|
-
if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage)) return;
|
|
1031
|
-
throw new TypeError("JSON Web Key for this operation be a private JWK");
|
|
1032
|
-
case "verify":
|
|
1033
|
-
if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage)) return;
|
|
1034
|
-
throw new TypeError("JSON Web Key for this operation be a public JWK");
|
|
1035
|
-
}
|
|
1036
|
-
}
|
|
1037
|
-
if (!is_key_like_default(key)) {
|
|
1038
|
-
throw new TypeError(withAlg.apply(void 0, [
|
|
1039
|
-
alg,
|
|
1040
|
-
key
|
|
1041
|
-
].concat(_to_consumable_array(types3), [
|
|
1042
|
-
allowJwk ? "JSON Web Key" : null
|
|
1043
|
-
])));
|
|
1044
|
-
}
|
|
1045
|
-
if (key.type === "secret") {
|
|
1046
|
-
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithms must not be of type "secret"'));
|
|
1047
|
-
}
|
|
1048
|
-
if (usage === "sign" && key.type === "public") {
|
|
1049
|
-
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm signing must be of type "private"'));
|
|
1050
|
-
}
|
|
1051
|
-
if (usage === "decrypt" && key.type === "public") {
|
|
1052
|
-
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm decryption must be of type "private"'));
|
|
1053
|
-
}
|
|
1054
|
-
if (key.algorithm && usage === "verify" && key.type === "private") {
|
|
1055
|
-
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm verifying must be of type "public"'));
|
|
1056
|
-
}
|
|
1057
|
-
if (key.algorithm && usage === "encrypt" && key.type === "private") {
|
|
1058
|
-
throw new TypeError("".concat(tag(key), ' instances for asymmetric algorithm encryption must be of type "public"'));
|
|
1059
|
-
}
|
|
1060
|
-
}, "asymmetricTypeCheck");
|
|
1061
|
-
function checkKeyType(allowJwk, alg, key, usage) {
|
|
1062
|
-
var symmetric = alg.startsWith("HS") || alg === "dir" || alg.startsWith("PBES2") || /^A\d{3}(?:GCM)?KW$/.test(alg);
|
|
1063
|
-
if (symmetric) {
|
|
1064
|
-
symmetricTypeCheck(alg, key, usage, allowJwk);
|
|
1065
|
-
} else {
|
|
1066
|
-
asymmetricTypeCheck(alg, key, usage, allowJwk);
|
|
1067
|
-
}
|
|
1068
|
-
}
|
|
1069
|
-
__name(checkKeyType, "checkKeyType");
|
|
1070
|
-
var check_key_type_default = checkKeyType.bind(void 0, false);
|
|
1071
|
-
var checkKeyTypeWithJwk = checkKeyType.bind(void 0, true);
|
|
1072
|
-
// node_modules/jose/dist/node/esm/lib/validate_crit.js
|
|
1073
|
-
function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
|
|
1074
|
-
if (joseHeader.crit !== void 0 && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === void 0) {
|
|
1075
|
-
throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
|
|
1076
|
-
}
|
|
1077
|
-
if (!protectedHeader || protectedHeader.crit === void 0) {
|
|
1078
|
-
return /* @__PURE__ */ new Set();
|
|
1079
|
-
}
|
|
1080
|
-
if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some(function(input) {
|
|
1081
|
-
return typeof input !== "string" || input.length === 0;
|
|
1082
|
-
})) {
|
|
1083
|
-
throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
|
|
1084
|
-
}
|
|
1085
|
-
var recognized;
|
|
1086
|
-
if (recognizedOption !== void 0) {
|
|
1087
|
-
recognized = new Map(_to_consumable_array(Object.entries(recognizedOption)).concat(_to_consumable_array(recognizedDefault.entries())));
|
|
1088
|
-
} else {
|
|
1089
|
-
recognized = recognizedDefault;
|
|
1090
|
-
}
|
|
1091
|
-
var _iteratorNormalCompletion = true, _didIteratorError = false, _iteratorError = undefined;
|
|
1092
|
-
try {
|
|
1093
|
-
for(var _iterator = protectedHeader.crit[Symbol.iterator](), _step; !(_iteratorNormalCompletion = (_step = _iterator.next()).done); _iteratorNormalCompletion = true){
|
|
1094
|
-
var parameter = _step.value;
|
|
1095
|
-
if (!recognized.has(parameter)) {
|
|
1096
|
-
throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
|
|
1097
|
-
}
|
|
1098
|
-
if (joseHeader[parameter] === void 0) {
|
|
1099
|
-
throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
|
|
1100
|
-
}
|
|
1101
|
-
if (recognized.get(parameter) && protectedHeader[parameter] === void 0) {
|
|
1102
|
-
throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
|
|
1103
|
-
}
|
|
1104
|
-
}
|
|
1105
|
-
} catch (err) {
|
|
1106
|
-
_didIteratorError = true;
|
|
1107
|
-
_iteratorError = err;
|
|
1108
|
-
} finally{
|
|
1109
|
-
try {
|
|
1110
|
-
if (!_iteratorNormalCompletion && _iterator.return != null) {
|
|
1111
|
-
_iterator.return();
|
|
1112
|
-
}
|
|
1113
|
-
} finally{
|
|
1114
|
-
if (_didIteratorError) {
|
|
1115
|
-
throw _iteratorError;
|
|
1116
|
-
}
|
|
1117
|
-
}
|
|
1118
|
-
}
|
|
1119
|
-
return new Set(protectedHeader.crit);
|
|
1120
|
-
}
|
|
1121
|
-
__name(validateCrit, "validateCrit");
|
|
1122
|
-
var validate_crit_default = validateCrit;
|
|
1123
|
-
// node_modules/jose/dist/node/esm/runtime/key_to_jwk.js
|
|
1124
|
-
import { KeyObject as KeyObject3 } from "crypto";
|
|
1125
|
-
var keyToJWK = /* @__PURE__ */ __name(function(key) {
|
|
1126
|
-
var keyObject;
|
|
1127
|
-
if (isCryptoKey(key)) {
|
|
1128
|
-
if (!key.extractable) {
|
|
1129
|
-
throw new TypeError("CryptoKey is not extractable");
|
|
1130
|
-
}
|
|
1131
|
-
keyObject = KeyObject3.from(key);
|
|
1132
|
-
} else if (is_key_object_default(key)) {
|
|
1133
|
-
keyObject = key;
|
|
1134
|
-
} else if (_instanceof(key, Uint8Array)) {
|
|
1135
|
-
return {
|
|
1136
|
-
kty: "oct",
|
|
1137
|
-
k: encode(key)
|
|
1138
|
-
};
|
|
1139
|
-
} else {
|
|
1140
|
-
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
1141
|
-
key
|
|
1142
|
-
].concat(_to_consumable_array(types3), [
|
|
1143
|
-
"Uint8Array"
|
|
1144
|
-
])));
|
|
1145
|
-
}
|
|
1146
|
-
if (keyObject.type !== "secret" && ![
|
|
1147
|
-
"rsa",
|
|
1148
|
-
"ec",
|
|
1149
|
-
"ed25519",
|
|
1150
|
-
"x25519",
|
|
1151
|
-
"ed448",
|
|
1152
|
-
"x448"
|
|
1153
|
-
].includes(keyObject.asymmetricKeyType)) {
|
|
1154
|
-
throw new JOSENotSupported("Unsupported key asymmetricKeyType");
|
|
1155
|
-
}
|
|
1156
|
-
return keyObject.export({
|
|
1157
|
-
format: "jwk"
|
|
1158
|
-
});
|
|
1159
|
-
}, "keyToJWK");
|
|
1160
|
-
var key_to_jwk_default = keyToJWK;
|
|
1161
|
-
function exportJWK(key) {
|
|
1162
|
-
return _exportJWK.apply(this, arguments);
|
|
1163
|
-
}
|
|
1164
|
-
function _exportJWK() {
|
|
1165
|
-
_exportJWK = // node_modules/jose/dist/node/esm/key/export.js
|
|
1166
|
-
_async_to_generator(function(key) {
|
|
1167
|
-
return _ts_generator(this, function(_state) {
|
|
1168
|
-
return [
|
|
1169
|
-
2,
|
|
1170
|
-
key_to_jwk_default(key)
|
|
1171
|
-
];
|
|
1172
|
-
});
|
|
1173
|
-
});
|
|
1174
|
-
return _exportJWK.apply(this, arguments);
|
|
1175
|
-
}
|
|
1176
|
-
__name(exportJWK, "exportJWK");
|
|
1177
|
-
// node_modules/jose/dist/node/esm/runtime/dsa_digest.js
|
|
1178
|
-
function dsaDigest(alg) {
|
|
1179
|
-
switch(alg){
|
|
1180
|
-
case "PS256":
|
|
1181
|
-
case "RS256":
|
|
1182
|
-
case "ES256":
|
|
1183
|
-
case "ES256K":
|
|
1184
|
-
return "sha256";
|
|
1185
|
-
case "PS384":
|
|
1186
|
-
case "RS384":
|
|
1187
|
-
case "ES384":
|
|
1188
|
-
return "sha384";
|
|
1189
|
-
case "PS512":
|
|
1190
|
-
case "RS512":
|
|
1191
|
-
case "ES512":
|
|
1192
|
-
return "sha512";
|
|
1193
|
-
case "Ed25519":
|
|
1194
|
-
case "EdDSA":
|
|
1195
|
-
return void 0;
|
|
1196
|
-
default:
|
|
1197
|
-
throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
|
|
1198
|
-
}
|
|
1199
|
-
}
|
|
1200
|
-
__name(dsaDigest, "dsaDigest");
|
|
1201
|
-
// node_modules/jose/dist/node/esm/runtime/node_key.js
|
|
1202
|
-
import { constants, KeyObject as KeyObject4 } from "crypto";
|
|
1203
|
-
var ecCurveAlgMap = /* @__PURE__ */ new Map([
|
|
1204
|
-
[
|
|
1205
|
-
"ES256",
|
|
1206
|
-
"P-256"
|
|
1207
|
-
],
|
|
1208
|
-
[
|
|
1209
|
-
"ES256K",
|
|
1210
|
-
"secp256k1"
|
|
1211
|
-
],
|
|
1212
|
-
[
|
|
1213
|
-
"ES384",
|
|
1214
|
-
"P-384"
|
|
1215
|
-
],
|
|
1216
|
-
[
|
|
1217
|
-
"ES512",
|
|
1218
|
-
"P-521"
|
|
1219
|
-
]
|
|
1220
|
-
]);
|
|
1221
|
-
function keyForCrypto(alg, key) {
|
|
1222
|
-
var asymmetricKeyType;
|
|
1223
|
-
var asymmetricKeyDetails;
|
|
1224
|
-
var isJWK2;
|
|
1225
|
-
if (_instanceof(key, KeyObject4)) {
|
|
1226
|
-
asymmetricKeyType = key.asymmetricKeyType;
|
|
1227
|
-
asymmetricKeyDetails = key.asymmetricKeyDetails;
|
|
1228
|
-
} else {
|
|
1229
|
-
isJWK2 = true;
|
|
1230
|
-
switch(key.kty){
|
|
1231
|
-
case "RSA":
|
|
1232
|
-
asymmetricKeyType = "rsa";
|
|
1233
|
-
break;
|
|
1234
|
-
case "EC":
|
|
1235
|
-
asymmetricKeyType = "ec";
|
|
1236
|
-
break;
|
|
1237
|
-
case "OKP":
|
|
1238
|
-
{
|
|
1239
|
-
if (key.crv === "Ed25519") {
|
|
1240
|
-
asymmetricKeyType = "ed25519";
|
|
1241
|
-
break;
|
|
1242
|
-
}
|
|
1243
|
-
if (key.crv === "Ed448") {
|
|
1244
|
-
asymmetricKeyType = "ed448";
|
|
1245
|
-
break;
|
|
1246
|
-
}
|
|
1247
|
-
throw new TypeError("Invalid key for this operation, its crv must be Ed25519 or Ed448");
|
|
1248
|
-
}
|
|
1249
|
-
default:
|
|
1250
|
-
throw new TypeError("Invalid key for this operation, its kty must be RSA, OKP, or EC");
|
|
1251
|
-
}
|
|
1252
|
-
}
|
|
1253
|
-
var options;
|
|
1254
|
-
switch(alg){
|
|
1255
|
-
case "Ed25519":
|
|
1256
|
-
if (asymmetricKeyType !== "ed25519") {
|
|
1257
|
-
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ed25519");
|
|
1258
|
-
}
|
|
1259
|
-
break;
|
|
1260
|
-
case "EdDSA":
|
|
1261
|
-
if (![
|
|
1262
|
-
"ed25519",
|
|
1263
|
-
"ed448"
|
|
1264
|
-
].includes(asymmetricKeyType)) {
|
|
1265
|
-
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ed25519 or ed448");
|
|
1266
|
-
}
|
|
1267
|
-
break;
|
|
1268
|
-
case "RS256":
|
|
1269
|
-
case "RS384":
|
|
1270
|
-
case "RS512":
|
|
1271
|
-
if (asymmetricKeyType !== "rsa") {
|
|
1272
|
-
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be rsa");
|
|
1273
|
-
}
|
|
1274
|
-
check_key_length_default(key, alg);
|
|
1275
|
-
break;
|
|
1276
|
-
case "PS256":
|
|
1277
|
-
case "PS384":
|
|
1278
|
-
case "PS512":
|
|
1279
|
-
if (asymmetricKeyType === "rsa-pss") {
|
|
1280
|
-
var hashAlgorithm = asymmetricKeyDetails.hashAlgorithm, mgf1HashAlgorithm = asymmetricKeyDetails.mgf1HashAlgorithm, saltLength = asymmetricKeyDetails.saltLength;
|
|
1281
|
-
var length = parseInt(alg.slice(-3), 10);
|
|
1282
|
-
if (hashAlgorithm !== void 0 && (hashAlgorithm !== "sha".concat(length) || mgf1HashAlgorithm !== hashAlgorithm)) {
|
|
1283
|
-
throw new TypeError('Invalid key for this operation, its RSA-PSS parameters do not meet the requirements of "alg" '.concat(alg));
|
|
1284
|
-
}
|
|
1285
|
-
if (saltLength !== void 0 && saltLength > length >> 3) {
|
|
1286
|
-
throw new TypeError('Invalid key for this operation, its RSA-PSS parameter saltLength does not meet the requirements of "alg" '.concat(alg));
|
|
1287
|
-
}
|
|
1288
|
-
} else if (asymmetricKeyType !== "rsa") {
|
|
1289
|
-
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be rsa or rsa-pss");
|
|
1290
|
-
}
|
|
1291
|
-
check_key_length_default(key, alg);
|
|
1292
|
-
options = {
|
|
1293
|
-
padding: constants.RSA_PKCS1_PSS_PADDING,
|
|
1294
|
-
saltLength: constants.RSA_PSS_SALTLEN_DIGEST
|
|
1295
|
-
};
|
|
1296
|
-
break;
|
|
1297
|
-
case "ES256":
|
|
1298
|
-
case "ES256K":
|
|
1299
|
-
case "ES384":
|
|
1300
|
-
case "ES512":
|
|
1301
|
-
{
|
|
1302
|
-
if (asymmetricKeyType !== "ec") {
|
|
1303
|
-
throw new TypeError("Invalid key for this operation, its asymmetricKeyType must be ec");
|
|
1304
|
-
}
|
|
1305
|
-
var actual = get_named_curve_default(key);
|
|
1306
|
-
var expected = ecCurveAlgMap.get(alg);
|
|
1307
|
-
if (actual !== expected) {
|
|
1308
|
-
throw new TypeError("Invalid key curve for the algorithm, its curve must be ".concat(expected, ", got ").concat(actual));
|
|
1309
|
-
}
|
|
1310
|
-
options = {
|
|
1311
|
-
dsaEncoding: "ieee-p1363"
|
|
1312
|
-
};
|
|
1313
|
-
break;
|
|
1314
|
-
}
|
|
1315
|
-
default:
|
|
1316
|
-
throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
|
|
1317
|
-
}
|
|
1318
|
-
if (isJWK2) {
|
|
1319
|
-
return _object_spread({
|
|
1320
|
-
format: "jwk",
|
|
1321
|
-
key: key
|
|
1322
|
-
}, options);
|
|
1323
|
-
}
|
|
1324
|
-
return options ? _object_spread_props(_object_spread({}, options), {
|
|
1325
|
-
key: key
|
|
1326
|
-
}) : key;
|
|
1327
|
-
}
|
|
1328
|
-
__name(keyForCrypto, "keyForCrypto");
|
|
1329
|
-
// node_modules/jose/dist/node/esm/runtime/sign.js
|
|
1330
|
-
import * as crypto2 from "crypto";
|
|
1331
|
-
import { promisify } from "util";
|
|
1332
|
-
// node_modules/jose/dist/node/esm/runtime/hmac_digest.js
|
|
1333
|
-
function hmacDigest(alg) {
|
|
1334
|
-
switch(alg){
|
|
1335
|
-
case "HS256":
|
|
1336
|
-
return "sha256";
|
|
1337
|
-
case "HS384":
|
|
1338
|
-
return "sha384";
|
|
1339
|
-
case "HS512":
|
|
1340
|
-
return "sha512";
|
|
1341
|
-
default:
|
|
1342
|
-
throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
|
|
1343
|
-
}
|
|
1344
|
-
}
|
|
1345
|
-
__name(hmacDigest, "hmacDigest");
|
|
1346
|
-
// node_modules/jose/dist/node/esm/runtime/get_sign_verify_key.js
|
|
1347
|
-
import { KeyObject as KeyObject5, createSecretKey } from "crypto";
|
|
1348
|
-
function getSignVerifyKey(alg, key, usage) {
|
|
1349
|
-
if (_instanceof(key, Uint8Array)) {
|
|
1350
|
-
if (!alg.startsWith("HS")) {
|
|
1351
|
-
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
1352
|
-
key
|
|
1353
|
-
].concat(_to_consumable_array(types3))));
|
|
1354
|
-
}
|
|
1355
|
-
return createSecretKey(key);
|
|
1356
|
-
}
|
|
1357
|
-
if (_instanceof(key, KeyObject5)) {
|
|
1358
|
-
return key;
|
|
1359
|
-
}
|
|
1360
|
-
if (isCryptoKey(key)) {
|
|
1361
|
-
checkSigCryptoKey(key, alg, usage);
|
|
1362
|
-
return KeyObject5.from(key);
|
|
1363
|
-
}
|
|
1364
|
-
if (isJWK(key)) {
|
|
1365
|
-
if (alg.startsWith("HS")) {
|
|
1366
|
-
return createSecretKey(Buffer.from(key.k, "base64url"));
|
|
1367
|
-
}
|
|
1368
|
-
return key;
|
|
1369
|
-
}
|
|
1370
|
-
throw new TypeError(invalid_key_input_default.apply(void 0, [
|
|
1371
|
-
key
|
|
1372
|
-
].concat(_to_consumable_array(types3), [
|
|
1373
|
-
"Uint8Array",
|
|
1374
|
-
"JSON Web Key"
|
|
1375
|
-
])));
|
|
1376
|
-
}
|
|
1377
|
-
__name(getSignVerifyKey, "getSignVerifyKey");
|
|
1378
|
-
// node_modules/jose/dist/node/esm/runtime/sign.js
|
|
1379
|
-
var oneShotSign = promisify(crypto2.sign);
|
|
1380
|
-
var sign2 = /* @__PURE__ */ __name(function() {
|
|
1381
|
-
var _ref = _async_to_generator(function(alg, key, data) {
|
|
1382
|
-
var k, hmac;
|
|
1383
|
-
return _ts_generator(this, function(_state) {
|
|
1384
|
-
k = getSignVerifyKey(alg, key, "sign");
|
|
1385
|
-
if (alg.startsWith("HS")) {
|
|
1386
|
-
hmac = crypto2.createHmac(hmacDigest(alg), k);
|
|
1387
|
-
hmac.update(data);
|
|
1388
|
-
return [
|
|
1389
|
-
2,
|
|
1390
|
-
hmac.digest()
|
|
1391
|
-
];
|
|
1392
|
-
}
|
|
1393
|
-
return [
|
|
1394
|
-
2,
|
|
1395
|
-
oneShotSign(dsaDigest(alg), data, keyForCrypto(alg, k))
|
|
1396
|
-
];
|
|
1397
|
-
});
|
|
1398
|
-
});
|
|
1399
|
-
return function(alg, key, data) {
|
|
1400
|
-
return _ref.apply(this, arguments);
|
|
1401
|
-
};
|
|
1402
|
-
}(), "sign");
|
|
1403
|
-
var sign_default = sign2;
|
|
1404
|
-
// node_modules/jose/dist/node/esm/lib/epoch.js
|
|
1405
|
-
var epoch_default = /* @__PURE__ */ __name(function(date) {
|
|
1406
|
-
return Math.floor(date.getTime() / 1e3);
|
|
1407
|
-
}, "default");
|
|
1408
|
-
// node_modules/jose/dist/node/esm/lib/secs.js
|
|
1409
|
-
var minute = 60;
|
|
1410
|
-
var hour = minute * 60;
|
|
1411
|
-
var day = hour * 24;
|
|
1412
|
-
var week = day * 7;
|
|
1413
|
-
var year = day * 365.25;
|
|
1414
|
-
var REGEX = /^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;
|
|
1415
|
-
var secs_default = /* @__PURE__ */ __name(function(str) {
|
|
1416
|
-
var matched = REGEX.exec(str);
|
|
1417
|
-
if (!matched || matched[4] && matched[1]) {
|
|
1418
|
-
throw new TypeError("Invalid time period format");
|
|
1419
|
-
}
|
|
1420
|
-
var value = parseFloat(matched[2]);
|
|
1421
|
-
var unit = matched[3].toLowerCase();
|
|
1422
|
-
var numericDate;
|
|
1423
|
-
switch(unit){
|
|
1424
|
-
case "sec":
|
|
1425
|
-
case "secs":
|
|
1426
|
-
case "second":
|
|
1427
|
-
case "seconds":
|
|
1428
|
-
case "s":
|
|
1429
|
-
numericDate = Math.round(value);
|
|
1430
|
-
break;
|
|
1431
|
-
case "minute":
|
|
1432
|
-
case "minutes":
|
|
1433
|
-
case "min":
|
|
1434
|
-
case "mins":
|
|
1435
|
-
case "m":
|
|
1436
|
-
numericDate = Math.round(value * minute);
|
|
1437
|
-
break;
|
|
1438
|
-
case "hour":
|
|
1439
|
-
case "hours":
|
|
1440
|
-
case "hr":
|
|
1441
|
-
case "hrs":
|
|
1442
|
-
case "h":
|
|
1443
|
-
numericDate = Math.round(value * hour);
|
|
1444
|
-
break;
|
|
1445
|
-
case "day":
|
|
1446
|
-
case "days":
|
|
1447
|
-
case "d":
|
|
1448
|
-
numericDate = Math.round(value * day);
|
|
1449
|
-
break;
|
|
1450
|
-
case "week":
|
|
1451
|
-
case "weeks":
|
|
1452
|
-
case "w":
|
|
1453
|
-
numericDate = Math.round(value * week);
|
|
1454
|
-
break;
|
|
1455
|
-
default:
|
|
1456
|
-
numericDate = Math.round(value * year);
|
|
1457
|
-
break;
|
|
1458
|
-
}
|
|
1459
|
-
if (matched[1] === "-" || matched[4] === "ago") {
|
|
1460
|
-
return -numericDate;
|
|
1461
|
-
}
|
|
1462
|
-
return numericDate;
|
|
1463
|
-
}, "default");
|
|
1464
|
-
// node_modules/jose/dist/node/esm/jws/flattened/sign.js
|
|
1465
|
-
var _FlattenedSign = /*#__PURE__*/ function() {
|
|
1466
|
-
"use strict";
|
|
1467
|
-
function _FlattenedSign(payload) {
|
|
1468
|
-
_class_call_check(this, _FlattenedSign);
|
|
1469
|
-
__publicField(this, "_payload");
|
|
1470
|
-
__publicField(this, "_protectedHeader");
|
|
1471
|
-
__publicField(this, "_unprotectedHeader");
|
|
1472
|
-
if (!_instanceof(payload, Uint8Array)) {
|
|
1473
|
-
throw new TypeError("payload must be an instance of Uint8Array");
|
|
1474
|
-
}
|
|
1475
|
-
this._payload = payload;
|
|
1476
|
-
}
|
|
1477
|
-
_create_class(_FlattenedSign, [
|
|
1478
|
-
{
|
|
1479
|
-
key: "setProtectedHeader",
|
|
1480
|
-
value: function setProtectedHeader(protectedHeader) {
|
|
1481
|
-
if (this._protectedHeader) {
|
|
1482
|
-
throw new TypeError("setProtectedHeader can only be called once");
|
|
1483
|
-
}
|
|
1484
|
-
this._protectedHeader = protectedHeader;
|
|
1485
|
-
return this;
|
|
1486
|
-
}
|
|
1487
|
-
},
|
|
1488
|
-
{
|
|
1489
|
-
key: "setUnprotectedHeader",
|
|
1490
|
-
value: function setUnprotectedHeader(unprotectedHeader) {
|
|
1491
|
-
if (this._unprotectedHeader) {
|
|
1492
|
-
throw new TypeError("setUnprotectedHeader can only be called once");
|
|
1493
|
-
}
|
|
1494
|
-
this._unprotectedHeader = unprotectedHeader;
|
|
1495
|
-
return this;
|
|
1496
|
-
}
|
|
1497
|
-
},
|
|
1498
|
-
{
|
|
1499
|
-
key: "sign",
|
|
1500
|
-
value: function sign(key, options) {
|
|
1501
|
-
var _this = this;
|
|
1502
|
-
return _async_to_generator(function() {
|
|
1503
|
-
var joseHeader, extensions, b64, alg, payload, protectedHeader, data, signature, jws;
|
|
1504
|
-
return _ts_generator(this, function(_state) {
|
|
1505
|
-
switch(_state.label){
|
|
1506
|
-
case 0:
|
|
1507
|
-
if (!_this._protectedHeader && !_this._unprotectedHeader) {
|
|
1508
|
-
throw new JWSInvalid("either setProtectedHeader or setUnprotectedHeader must be called before #sign()");
|
|
1509
|
-
}
|
|
1510
|
-
if (!is_disjoint_default(_this._protectedHeader, _this._unprotectedHeader)) {
|
|
1511
|
-
throw new JWSInvalid("JWS Protected and JWS Unprotected Header Parameter names must be disjoint");
|
|
1512
|
-
}
|
|
1513
|
-
joseHeader = _object_spread({}, _this._protectedHeader, _this._unprotectedHeader);
|
|
1514
|
-
extensions = validate_crit_default(JWSInvalid, /* @__PURE__ */ new Map([
|
|
1515
|
-
[
|
|
1516
|
-
"b64",
|
|
1517
|
-
true
|
|
1518
|
-
]
|
|
1519
|
-
]), options === null || options === void 0 ? void 0 : options.crit, _this._protectedHeader, joseHeader);
|
|
1520
|
-
b64 = true;
|
|
1521
|
-
if (extensions.has("b64")) {
|
|
1522
|
-
b64 = _this._protectedHeader.b64;
|
|
1523
|
-
if (typeof b64 !== "boolean") {
|
|
1524
|
-
throw new JWSInvalid('The "b64" (base64url-encode payload) Header Parameter must be a boolean');
|
|
1525
|
-
}
|
|
1526
|
-
}
|
|
1527
|
-
alg = joseHeader.alg;
|
|
1528
|
-
if (typeof alg !== "string" || !alg) {
|
|
1529
|
-
throw new JWSInvalid('JWS "alg" (Algorithm) Header Parameter missing or invalid');
|
|
1530
|
-
}
|
|
1531
|
-
checkKeyTypeWithJwk(alg, key, "sign");
|
|
1532
|
-
payload = _this._payload;
|
|
1533
|
-
if (b64) {
|
|
1534
|
-
payload = encoder.encode(encode(payload));
|
|
1535
|
-
}
|
|
1536
|
-
if (_this._protectedHeader) {
|
|
1537
|
-
protectedHeader = encoder.encode(encode(JSON.stringify(_this._protectedHeader)));
|
|
1538
|
-
} else {
|
|
1539
|
-
protectedHeader = encoder.encode("");
|
|
1540
|
-
}
|
|
1541
|
-
data = concat(protectedHeader, encoder.encode("."), payload);
|
|
1542
|
-
return [
|
|
1543
|
-
4,
|
|
1544
|
-
sign_default(alg, key, data)
|
|
1545
|
-
];
|
|
1546
|
-
case 1:
|
|
1547
|
-
signature = _state.sent();
|
|
1548
|
-
jws = {
|
|
1549
|
-
signature: encode(signature),
|
|
1550
|
-
payload: ""
|
|
1551
|
-
};
|
|
1552
|
-
if (b64) {
|
|
1553
|
-
jws.payload = decoder.decode(payload);
|
|
1554
|
-
}
|
|
1555
|
-
if (_this._unprotectedHeader) {
|
|
1556
|
-
jws.header = _this._unprotectedHeader;
|
|
1557
|
-
}
|
|
1558
|
-
if (_this._protectedHeader) {
|
|
1559
|
-
jws.protected = decoder.decode(protectedHeader);
|
|
1560
|
-
}
|
|
1561
|
-
return [
|
|
1562
|
-
2,
|
|
1563
|
-
jws
|
|
1564
|
-
];
|
|
1565
|
-
}
|
|
1566
|
-
});
|
|
1567
|
-
})();
|
|
1568
|
-
}
|
|
1569
|
-
}
|
|
1570
|
-
]);
|
|
1571
|
-
return _FlattenedSign;
|
|
1572
|
-
}();
|
|
1573
|
-
__name(_FlattenedSign, "FlattenedSign");
|
|
1574
|
-
var FlattenedSign = _FlattenedSign;
|
|
1575
|
-
// node_modules/jose/dist/node/esm/jws/compact/sign.js
|
|
1576
|
-
var _CompactSign = /*#__PURE__*/ function() {
|
|
1577
|
-
"use strict";
|
|
1578
|
-
function _CompactSign(payload) {
|
|
1579
|
-
_class_call_check(this, _CompactSign);
|
|
1580
|
-
__publicField(this, "_flattened");
|
|
1581
|
-
this._flattened = new FlattenedSign(payload);
|
|
1582
|
-
}
|
|
1583
|
-
_create_class(_CompactSign, [
|
|
1584
|
-
{
|
|
1585
|
-
key: "setProtectedHeader",
|
|
1586
|
-
value: function setProtectedHeader(protectedHeader) {
|
|
1587
|
-
this._flattened.setProtectedHeader(protectedHeader);
|
|
1588
|
-
return this;
|
|
1589
|
-
}
|
|
1590
|
-
},
|
|
1591
|
-
{
|
|
1592
|
-
key: "sign",
|
|
1593
|
-
value: function sign(key, options) {
|
|
1594
|
-
var _this = this;
|
|
1595
|
-
return _async_to_generator(function() {
|
|
1596
|
-
var jws;
|
|
1597
|
-
return _ts_generator(this, function(_state) {
|
|
1598
|
-
switch(_state.label){
|
|
1599
|
-
case 0:
|
|
1600
|
-
return [
|
|
1601
|
-
4,
|
|
1602
|
-
_this._flattened.sign(key, options)
|
|
1603
|
-
];
|
|
1604
|
-
case 1:
|
|
1605
|
-
jws = _state.sent();
|
|
1606
|
-
if (jws.payload === void 0) {
|
|
1607
|
-
throw new TypeError("use the flattened module for creating JWS with b64: false");
|
|
1608
|
-
}
|
|
1609
|
-
return [
|
|
1610
|
-
2,
|
|
1611
|
-
"".concat(jws.protected, ".").concat(jws.payload, ".").concat(jws.signature)
|
|
1612
|
-
];
|
|
1613
|
-
}
|
|
1614
|
-
});
|
|
1615
|
-
})();
|
|
1616
|
-
}
|
|
1617
|
-
}
|
|
1618
|
-
]);
|
|
1619
|
-
return _CompactSign;
|
|
1620
|
-
}();
|
|
1621
|
-
__name(_CompactSign, "CompactSign");
|
|
1622
|
-
var CompactSign = _CompactSign;
|
|
1623
|
-
// node_modules/jose/dist/node/esm/jwt/produce.js
|
|
1624
|
-
function validateInput(label, input) {
|
|
1625
|
-
if (!Number.isFinite(input)) {
|
|
1626
|
-
throw new TypeError("Invalid ".concat(label, " input"));
|
|
1627
|
-
}
|
|
1628
|
-
return input;
|
|
1629
|
-
}
|
|
1630
|
-
__name(validateInput, "validateInput");
|
|
1631
|
-
var _ProduceJWT = /*#__PURE__*/ function() {
|
|
1632
|
-
"use strict";
|
|
1633
|
-
function _ProduceJWT() {
|
|
1634
|
-
var payload = arguments.length > 0 && arguments[0] !== void 0 ? arguments[0] : {};
|
|
1635
|
-
_class_call_check(this, _ProduceJWT);
|
|
1636
|
-
__publicField(this, "_payload");
|
|
1637
|
-
if (!isObject(payload)) {
|
|
1638
|
-
throw new TypeError("JWT Claims Set MUST be an object");
|
|
1639
|
-
}
|
|
1640
|
-
this._payload = payload;
|
|
1641
|
-
}
|
|
1642
|
-
_create_class(_ProduceJWT, [
|
|
1643
|
-
{
|
|
1644
|
-
key: "setIssuer",
|
|
1645
|
-
value: function setIssuer(issuer) {
|
|
1646
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1647
|
-
iss: issuer
|
|
1648
|
-
});
|
|
1649
|
-
return this;
|
|
1650
|
-
}
|
|
1651
|
-
},
|
|
1652
|
-
{
|
|
1653
|
-
key: "setSubject",
|
|
1654
|
-
value: function setSubject(subject) {
|
|
1655
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1656
|
-
sub: subject
|
|
1657
|
-
});
|
|
1658
|
-
return this;
|
|
1659
|
-
}
|
|
1660
|
-
},
|
|
1661
|
-
{
|
|
1662
|
-
key: "setAudience",
|
|
1663
|
-
value: function setAudience(audience) {
|
|
1664
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1665
|
-
aud: audience
|
|
1666
|
-
});
|
|
1667
|
-
return this;
|
|
1668
|
-
}
|
|
1669
|
-
},
|
|
1670
|
-
{
|
|
1671
|
-
key: "setJti",
|
|
1672
|
-
value: function setJti(jwtId) {
|
|
1673
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1674
|
-
jti: jwtId
|
|
1675
|
-
});
|
|
1676
|
-
return this;
|
|
1677
|
-
}
|
|
1678
|
-
},
|
|
1679
|
-
{
|
|
1680
|
-
key: "setNotBefore",
|
|
1681
|
-
value: function setNotBefore(input) {
|
|
1682
|
-
if (typeof input === "number") {
|
|
1683
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1684
|
-
nbf: validateInput("setNotBefore", input)
|
|
1685
|
-
});
|
|
1686
|
-
} else if (_instanceof(input, Date)) {
|
|
1687
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1688
|
-
nbf: validateInput("setNotBefore", epoch_default(input))
|
|
1689
|
-
});
|
|
1690
|
-
} else {
|
|
1691
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1692
|
-
nbf: epoch_default(/* @__PURE__ */ new Date()) + secs_default(input)
|
|
1693
|
-
});
|
|
1694
|
-
}
|
|
1695
|
-
return this;
|
|
1696
|
-
}
|
|
1697
|
-
},
|
|
1698
|
-
{
|
|
1699
|
-
key: "setExpirationTime",
|
|
1700
|
-
value: function setExpirationTime(input) {
|
|
1701
|
-
if (typeof input === "number") {
|
|
1702
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1703
|
-
exp: validateInput("setExpirationTime", input)
|
|
1704
|
-
});
|
|
1705
|
-
} else if (_instanceof(input, Date)) {
|
|
1706
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1707
|
-
exp: validateInput("setExpirationTime", epoch_default(input))
|
|
1708
|
-
});
|
|
1709
|
-
} else {
|
|
1710
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1711
|
-
exp: epoch_default(/* @__PURE__ */ new Date()) + secs_default(input)
|
|
1712
|
-
});
|
|
1713
|
-
}
|
|
1714
|
-
return this;
|
|
1715
|
-
}
|
|
1716
|
-
},
|
|
1717
|
-
{
|
|
1718
|
-
key: "setIssuedAt",
|
|
1719
|
-
value: function setIssuedAt(input) {
|
|
1720
|
-
if (typeof input === "undefined") {
|
|
1721
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1722
|
-
iat: epoch_default(/* @__PURE__ */ new Date())
|
|
1723
|
-
});
|
|
1724
|
-
} else if (_instanceof(input, Date)) {
|
|
1725
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1726
|
-
iat: validateInput("setIssuedAt", epoch_default(input))
|
|
1727
|
-
});
|
|
1728
|
-
} else if (typeof input === "string") {
|
|
1729
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1730
|
-
iat: validateInput("setIssuedAt", epoch_default(/* @__PURE__ */ new Date()) + secs_default(input))
|
|
1731
|
-
});
|
|
1732
|
-
} else {
|
|
1733
|
-
this._payload = _object_spread_props(_object_spread({}, this._payload), {
|
|
1734
|
-
iat: validateInput("setIssuedAt", input)
|
|
1735
|
-
});
|
|
1736
|
-
}
|
|
1737
|
-
return this;
|
|
1738
|
-
}
|
|
1739
|
-
}
|
|
1740
|
-
]);
|
|
1741
|
-
return _ProduceJWT;
|
|
1742
|
-
}();
|
|
1743
|
-
__name(_ProduceJWT, "ProduceJWT");
|
|
1744
|
-
var ProduceJWT = _ProduceJWT;
|
|
1745
|
-
// node_modules/jose/dist/node/esm/jwt/sign.js
|
|
1746
|
-
var _SignJWT = /*#__PURE__*/ function(ProduceJWT) {
|
|
1747
|
-
"use strict";
|
|
1748
|
-
_inherits(_SignJWT, ProduceJWT);
|
|
1749
|
-
var _super = _create_super(_SignJWT);
|
|
1750
|
-
function _SignJWT() {
|
|
1751
|
-
_class_call_check(this, _SignJWT);
|
|
1752
|
-
var _this;
|
|
1753
|
-
_this = _super.call.apply(_super, [
|
|
1754
|
-
this
|
|
1755
|
-
].concat(Array.prototype.slice.call(arguments)));
|
|
1756
|
-
__publicField(_assert_this_initialized(_this), "_protectedHeader");
|
|
1757
|
-
return _this;
|
|
1758
|
-
}
|
|
1759
|
-
_create_class(_SignJWT, [
|
|
1760
|
-
{
|
|
1761
|
-
key: "setProtectedHeader",
|
|
1762
|
-
value: function setProtectedHeader(protectedHeader) {
|
|
1763
|
-
this._protectedHeader = protectedHeader;
|
|
1764
|
-
return this;
|
|
1765
|
-
}
|
|
1766
|
-
},
|
|
1767
|
-
{
|
|
1768
|
-
key: "sign",
|
|
1769
|
-
value: function sign(key, options) {
|
|
1770
|
-
var _this = this;
|
|
1771
|
-
return _async_to_generator(function() {
|
|
1772
|
-
var _this__protectedHeader, sig;
|
|
1773
|
-
return _ts_generator(this, function(_state) {
|
|
1774
|
-
sig = new CompactSign(encoder.encode(JSON.stringify(_this._payload)));
|
|
1775
|
-
sig.setProtectedHeader(_this._protectedHeader);
|
|
1776
|
-
if (Array.isArray((_this__protectedHeader = _this._protectedHeader) === null || _this__protectedHeader === void 0 ? void 0 : _this__protectedHeader.crit) && _this._protectedHeader.crit.includes("b64") && _this._protectedHeader.b64 === false) {
|
|
1777
|
-
throw new JWTInvalid("JWTs MUST NOT use unencoded payload");
|
|
1778
|
-
}
|
|
1779
|
-
return [
|
|
1780
|
-
2,
|
|
1781
|
-
sig.sign(key, options)
|
|
1782
|
-
];
|
|
1783
|
-
});
|
|
1784
|
-
})();
|
|
1785
|
-
}
|
|
1786
|
-
}
|
|
1787
|
-
]);
|
|
1788
|
-
return _SignJWT;
|
|
1789
|
-
}(ProduceJWT);
|
|
1790
|
-
__name(_SignJWT, "SignJWT");
|
|
1791
|
-
var SignJWT = _SignJWT;
|
|
1792
|
-
// node_modules/jose/dist/node/esm/util/base64url.js
|
|
1793
|
-
var base64url_exports = {};
|
|
1794
|
-
__export(base64url_exports, {
|
|
1795
|
-
decode: function() {
|
|
1796
|
-
return decode2;
|
|
1797
|
-
},
|
|
1798
|
-
encode: function() {
|
|
1799
|
-
return encode2;
|
|
1800
|
-
}
|
|
1801
|
-
});
|
|
1802
|
-
var encode2 = encode;
|
|
1803
|
-
var decode2 = decode;
|
|
1804
|
-
// node_modules/jose/dist/node/esm/runtime/generate.js
|
|
1805
|
-
import { createSecretKey as createSecretKey2, generateKeyPair as generateKeyPairCb } from "crypto";
|
|
1806
|
-
import { promisify as promisify2 } from "util";
|
|
1807
|
-
var generate = promisify2(generateKeyPairCb);
|
|
1808
|
-
function generateKeyPair(alg, options) {
|
|
1809
|
-
return _generateKeyPair.apply(this, arguments);
|
|
1810
|
-
}
|
|
1811
|
-
function _generateKeyPair() {
|
|
1812
|
-
_generateKeyPair = _async_to_generator(function(alg, options) {
|
|
1813
|
-
var _options_modulusLength, modulusLength, keypair, _options_crv, crv;
|
|
1814
|
-
return _ts_generator(this, function(_state) {
|
|
1815
|
-
switch(_state.label){
|
|
1816
|
-
case 0:
|
|
1817
|
-
switch(alg){
|
|
1818
|
-
case "RS256":
|
|
1819
|
-
return [
|
|
1820
|
-
3,
|
|
1821
|
-
1
|
|
1822
|
-
];
|
|
1823
|
-
case "RS384":
|
|
1824
|
-
return [
|
|
1825
|
-
3,
|
|
1826
|
-
1
|
|
1827
|
-
];
|
|
1828
|
-
case "RS512":
|
|
1829
|
-
return [
|
|
1830
|
-
3,
|
|
1831
|
-
1
|
|
1832
|
-
];
|
|
1833
|
-
case "PS256":
|
|
1834
|
-
return [
|
|
1835
|
-
3,
|
|
1836
|
-
1
|
|
1837
|
-
];
|
|
1838
|
-
case "PS384":
|
|
1839
|
-
return [
|
|
1840
|
-
3,
|
|
1841
|
-
1
|
|
1842
|
-
];
|
|
1843
|
-
case "PS512":
|
|
1844
|
-
return [
|
|
1845
|
-
3,
|
|
1846
|
-
1
|
|
1847
|
-
];
|
|
1848
|
-
case "RSA-OAEP":
|
|
1849
|
-
return [
|
|
1850
|
-
3,
|
|
1851
|
-
1
|
|
1852
|
-
];
|
|
1853
|
-
case "RSA-OAEP-256":
|
|
1854
|
-
return [
|
|
1855
|
-
3,
|
|
1856
|
-
1
|
|
1857
|
-
];
|
|
1858
|
-
case "RSA-OAEP-384":
|
|
1859
|
-
return [
|
|
1860
|
-
3,
|
|
1861
|
-
1
|
|
1862
|
-
];
|
|
1863
|
-
case "RSA-OAEP-512":
|
|
1864
|
-
return [
|
|
1865
|
-
3,
|
|
1866
|
-
1
|
|
1867
|
-
];
|
|
1868
|
-
case "RSA1_5":
|
|
1869
|
-
return [
|
|
1870
|
-
3,
|
|
1871
|
-
1
|
|
1872
|
-
];
|
|
1873
|
-
case "ES256":
|
|
1874
|
-
return [
|
|
1875
|
-
3,
|
|
1876
|
-
3
|
|
1877
|
-
];
|
|
1878
|
-
case "ES256K":
|
|
1879
|
-
return [
|
|
1880
|
-
3,
|
|
1881
|
-
4
|
|
1882
|
-
];
|
|
1883
|
-
case "ES384":
|
|
1884
|
-
return [
|
|
1885
|
-
3,
|
|
1886
|
-
5
|
|
1887
|
-
];
|
|
1888
|
-
case "ES512":
|
|
1889
|
-
return [
|
|
1890
|
-
3,
|
|
1891
|
-
6
|
|
1892
|
-
];
|
|
1893
|
-
case "Ed25519":
|
|
1894
|
-
return [
|
|
1895
|
-
3,
|
|
1896
|
-
7
|
|
1897
|
-
];
|
|
1898
|
-
case "EdDSA":
|
|
1899
|
-
return [
|
|
1900
|
-
3,
|
|
1901
|
-
8
|
|
1902
|
-
];
|
|
1903
|
-
case "ECDH-ES":
|
|
1904
|
-
return [
|
|
1905
|
-
3,
|
|
1906
|
-
9
|
|
1907
|
-
];
|
|
1908
|
-
case "ECDH-ES+A128KW":
|
|
1909
|
-
return [
|
|
1910
|
-
3,
|
|
1911
|
-
9
|
|
1912
|
-
];
|
|
1913
|
-
case "ECDH-ES+A192KW":
|
|
1914
|
-
return [
|
|
1915
|
-
3,
|
|
1916
|
-
9
|
|
1917
|
-
];
|
|
1918
|
-
case "ECDH-ES+A256KW":
|
|
1919
|
-
return [
|
|
1920
|
-
3,
|
|
1921
|
-
9
|
|
1922
|
-
];
|
|
1923
|
-
}
|
|
1924
|
-
return [
|
|
1925
|
-
3,
|
|
1926
|
-
10
|
|
1927
|
-
];
|
|
1928
|
-
case 1:
|
|
1929
|
-
modulusLength = (_options_modulusLength = options === null || options === void 0 ? void 0 : options.modulusLength) !== null && _options_modulusLength !== void 0 ? _options_modulusLength : 2048;
|
|
1930
|
-
if (typeof modulusLength !== "number" || modulusLength < 2048) {
|
|
1931
|
-
throw new JOSENotSupported("Invalid or unsupported modulusLength option provided, 2048 bits or larger keys must be used");
|
|
1932
|
-
}
|
|
1933
|
-
return [
|
|
1934
|
-
4,
|
|
1935
|
-
generate("rsa", {
|
|
1936
|
-
modulusLength: modulusLength,
|
|
1937
|
-
publicExponent: 65537
|
|
1938
|
-
})
|
|
1939
|
-
];
|
|
1940
|
-
case 2:
|
|
1941
|
-
keypair = _state.sent();
|
|
1942
|
-
return [
|
|
1943
|
-
2,
|
|
1944
|
-
keypair
|
|
1945
|
-
];
|
|
1946
|
-
case 3:
|
|
1947
|
-
return [
|
|
1948
|
-
2,
|
|
1949
|
-
generate("ec", {
|
|
1950
|
-
namedCurve: "P-256"
|
|
1951
|
-
})
|
|
1952
|
-
];
|
|
1953
|
-
case 4:
|
|
1954
|
-
return [
|
|
1955
|
-
2,
|
|
1956
|
-
generate("ec", {
|
|
1957
|
-
namedCurve: "secp256k1"
|
|
1958
|
-
})
|
|
1959
|
-
];
|
|
1960
|
-
case 5:
|
|
1961
|
-
return [
|
|
1962
|
-
2,
|
|
1963
|
-
generate("ec", {
|
|
1964
|
-
namedCurve: "P-384"
|
|
1965
|
-
})
|
|
1966
|
-
];
|
|
1967
|
-
case 6:
|
|
1968
|
-
return [
|
|
1969
|
-
2,
|
|
1970
|
-
generate("ec", {
|
|
1971
|
-
namedCurve: "P-521"
|
|
1972
|
-
})
|
|
1973
|
-
];
|
|
1974
|
-
case 7:
|
|
1975
|
-
return [
|
|
1976
|
-
2,
|
|
1977
|
-
generate("ed25519")
|
|
1978
|
-
];
|
|
1979
|
-
case 8:
|
|
1980
|
-
{
|
|
1981
|
-
switch(options === null || options === void 0 ? void 0 : options.crv){
|
|
1982
|
-
case void 0:
|
|
1983
|
-
case "Ed25519":
|
|
1984
|
-
return [
|
|
1985
|
-
2,
|
|
1986
|
-
generate("ed25519")
|
|
1987
|
-
];
|
|
1988
|
-
case "Ed448":
|
|
1989
|
-
return [
|
|
1990
|
-
2,
|
|
1991
|
-
generate("ed448")
|
|
1992
|
-
];
|
|
1993
|
-
default:
|
|
1994
|
-
throw new JOSENotSupported("Invalid or unsupported crv option provided, supported values are Ed25519 and Ed448");
|
|
1995
|
-
}
|
|
1996
|
-
}
|
|
1997
|
-
_state.label = 9;
|
|
1998
|
-
case 9:
|
|
1999
|
-
{
|
|
2000
|
-
;
|
|
2001
|
-
crv = (_options_crv = options === null || options === void 0 ? void 0 : options.crv) !== null && _options_crv !== void 0 ? _options_crv : "P-256";
|
|
2002
|
-
switch(crv){
|
|
2003
|
-
case void 0:
|
|
2004
|
-
case "P-256":
|
|
2005
|
-
case "P-384":
|
|
2006
|
-
case "P-521":
|
|
2007
|
-
return [
|
|
2008
|
-
2,
|
|
2009
|
-
generate("ec", {
|
|
2010
|
-
namedCurve: crv
|
|
2011
|
-
})
|
|
2012
|
-
];
|
|
2013
|
-
case "X25519":
|
|
2014
|
-
return [
|
|
2015
|
-
2,
|
|
2016
|
-
generate("x25519")
|
|
2017
|
-
];
|
|
2018
|
-
case "X448":
|
|
2019
|
-
return [
|
|
2020
|
-
2,
|
|
2021
|
-
generate("x448")
|
|
2022
|
-
];
|
|
2023
|
-
default:
|
|
2024
|
-
throw new JOSENotSupported("Invalid or unsupported crv option provided, supported values are P-256, P-384, P-521, X25519, and X448");
|
|
2025
|
-
}
|
|
2026
|
-
}
|
|
2027
|
-
_state.label = 10;
|
|
2028
|
-
case 10:
|
|
2029
|
-
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
2030
|
-
case 11:
|
|
2031
|
-
return [
|
|
2032
|
-
2
|
|
2033
|
-
];
|
|
2034
|
-
}
|
|
2035
|
-
});
|
|
2036
|
-
});
|
|
2037
|
-
return _generateKeyPair.apply(this, arguments);
|
|
2038
|
-
}
|
|
2039
|
-
__name(generateKeyPair, "generateKeyPair");
|
|
2040
|
-
function generateKeyPair2(alg, options) {
|
|
2041
|
-
return _generateKeyPair2.apply(this, arguments);
|
|
2042
|
-
}
|
|
2043
|
-
function _generateKeyPair2() {
|
|
2044
|
-
_generateKeyPair2 = // node_modules/jose/dist/node/esm/key/generate_key_pair.js
|
|
2045
|
-
_async_to_generator(function(alg, options) {
|
|
2046
|
-
return _ts_generator(this, function(_state) {
|
|
2047
|
-
return [
|
|
2048
|
-
2,
|
|
2049
|
-
generateKeyPair(alg, options)
|
|
2050
|
-
];
|
|
2051
|
-
});
|
|
2052
|
-
});
|
|
2053
|
-
return _generateKeyPair2.apply(this, arguments);
|
|
2054
|
-
}
|
|
2055
|
-
__name(generateKeyPair2, "generateKeyPair");
|
|
2056
|
-
// src/auth/adapters/dpop/JoseDpopAuthCredentialService.ts
|
|
2057
|
-
import { digestStringAsync, CryptoDigestAlgorithm, CryptoEncoding } from "expo-crypto";
|
|
379
|
+
import { digestStringAsync, CryptoDigestAlgorithm, CryptoEncoding, randomUUID } from "expo-crypto";
|
|
380
|
+
import * as jsrsasign from "jsrsasign";
|
|
2058
381
|
function _ts_decorate2(decorators, target, key, desc) {
|
|
2059
382
|
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
2060
383
|
if ((typeof Reflect === "undefined" ? "undefined" : _type_of(Reflect)) === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
@@ -2062,42 +385,27 @@ function _ts_decorate2(decorators, target, key, desc) {
|
|
|
2062
385
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
2063
386
|
}
|
|
2064
387
|
__name(_ts_decorate2, "_ts_decorate");
|
|
2065
|
-
var
|
|
388
|
+
var _JsrsasignDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredentialService) {
|
|
2066
389
|
"use strict";
|
|
2067
|
-
_inherits(
|
|
2068
|
-
var _super = _create_super(
|
|
2069
|
-
function
|
|
2070
|
-
_class_call_check(this,
|
|
390
|
+
_inherits(_JsrsasignDpopAuthCredentialService, BaseDpopAuthCredentialService);
|
|
391
|
+
var _super = _create_super(_JsrsasignDpopAuthCredentialService);
|
|
392
|
+
function _JsrsasignDpopAuthCredentialService() {
|
|
393
|
+
_class_call_check(this, _JsrsasignDpopAuthCredentialService);
|
|
2071
394
|
return _super.apply(this, arguments);
|
|
2072
395
|
}
|
|
2073
|
-
_create_class(
|
|
396
|
+
_create_class(_JsrsasignDpopAuthCredentialService, [
|
|
2074
397
|
{
|
|
2075
398
|
key: "generateAuthKeyPair",
|
|
2076
399
|
value: function generateAuthKeyPair() {
|
|
2077
400
|
var _this = this;
|
|
2078
401
|
return _async_to_generator(function() {
|
|
2079
|
-
var
|
|
402
|
+
var keyPair, publicJwk, privateJwk;
|
|
2080
403
|
return _ts_generator(this, function(_state) {
|
|
2081
404
|
switch(_state.label){
|
|
2082
405
|
case 0:
|
|
2083
|
-
|
|
2084
|
-
|
|
2085
|
-
|
|
2086
|
-
];
|
|
2087
|
-
case 1:
|
|
2088
|
-
_ref = _state.sent(), publicKey = _ref.publicKey, privateKey = _ref.privateKey;
|
|
2089
|
-
return [
|
|
2090
|
-
4,
|
|
2091
|
-
exportJWK(publicKey)
|
|
2092
|
-
];
|
|
2093
|
-
case 2:
|
|
2094
|
-
publicJwk = _state.sent();
|
|
2095
|
-
return [
|
|
2096
|
-
4,
|
|
2097
|
-
exportJWK(privateKey)
|
|
2098
|
-
];
|
|
2099
|
-
case 3:
|
|
2100
|
-
privateJwk = _state.sent();
|
|
406
|
+
keyPair = jsrsasign.KEYUTIL.generateKeypair("EC", "secp256r1");
|
|
407
|
+
publicJwk = jsrsasign.KEYUTIL.getJWKFromKey(keyPair.pubKeyObj);
|
|
408
|
+
privateJwk = jsrsasign.KEYUTIL.getJWKFromKey(keyPair.prvKeyObj);
|
|
2101
409
|
return [
|
|
2102
410
|
4,
|
|
2103
411
|
_this.setAuthKeyPair({
|
|
@@ -2105,7 +413,7 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2105
413
|
privateJwk: privateJwk
|
|
2106
414
|
})
|
|
2107
415
|
];
|
|
2108
|
-
case
|
|
416
|
+
case 1:
|
|
2109
417
|
_state.sent();
|
|
2110
418
|
return [
|
|
2111
419
|
2
|
|
@@ -2120,28 +428,14 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2120
428
|
value: function setAuthKeyPair(keyPair) {
|
|
2121
429
|
var _this = this;
|
|
2122
430
|
return _async_to_generator(function() {
|
|
2123
|
-
var privateJwk
|
|
431
|
+
var privateJwk;
|
|
2124
432
|
return _ts_generator(this, function(_state) {
|
|
2125
|
-
|
|
2126
|
-
|
|
2127
|
-
|
|
2128
|
-
|
|
2129
|
-
|
|
2130
|
-
|
|
2131
|
-
"privateKey"
|
|
2132
|
-
];
|
|
2133
|
-
return [
|
|
2134
|
-
4,
|
|
2135
|
-
_this.importPrivateKey(privateJwk)
|
|
2136
|
-
];
|
|
2137
|
-
case 1:
|
|
2138
|
-
_1.apply(_, _tmp.concat([
|
|
2139
|
-
_state.sent()
|
|
2140
|
-
]));
|
|
2141
|
-
return [
|
|
2142
|
-
2
|
|
2143
|
-
];
|
|
2144
|
-
}
|
|
433
|
+
privateJwk = keyPair.privateJwk;
|
|
434
|
+
_this.cacheService.set("keyPair", keyPair);
|
|
435
|
+
_this.cacheService.set("privateKey", jsrsasign.KEYUTIL.getKey(privateJwk));
|
|
436
|
+
return [
|
|
437
|
+
2
|
|
438
|
+
];
|
|
2145
439
|
});
|
|
2146
440
|
})();
|
|
2147
441
|
}
|
|
@@ -2157,7 +451,7 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2157
451
|
value: function createProofToken(method, resourceUrl) {
|
|
2158
452
|
var _this = this;
|
|
2159
453
|
return _async_to_generator(function() {
|
|
2160
|
-
var keyPair, importedPrivateKey, publicJwk, now, url,
|
|
454
|
+
var keyPair, importedPrivateKey, publicJwk, now, url, header, payload, _tmp, jwt;
|
|
2161
455
|
return _ts_generator(this, function(_state) {
|
|
2162
456
|
switch(_state.label){
|
|
2163
457
|
case 0:
|
|
@@ -2186,11 +480,15 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2186
480
|
if (!publicJwk.kty) {
|
|
2187
481
|
throw new Error("Invalid public key: missing kty property");
|
|
2188
482
|
}
|
|
2189
|
-
|
|
483
|
+
header = {
|
|
484
|
+
alg: "ES256",
|
|
485
|
+
typ: "dpop+jwt",
|
|
486
|
+
jwk: publicJwk
|
|
487
|
+
};
|
|
2190
488
|
_tmp = {
|
|
2191
489
|
htm: method,
|
|
2192
490
|
htu: url.origin + url.pathname,
|
|
2193
|
-
jti:
|
|
491
|
+
jti: randomUUID(),
|
|
2194
492
|
iat: now
|
|
2195
493
|
};
|
|
2196
494
|
return [
|
|
@@ -2198,22 +496,11 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2198
496
|
_this.getAth()
|
|
2199
497
|
];
|
|
2200
498
|
case 3:
|
|
2201
|
-
|
|
2202
|
-
|
|
2203
|
-
(_tmp.ath = _state.sent(), _tmp)
|
|
2204
|
-
]))).setProtectedHeader({
|
|
2205
|
-
alg: "ES256",
|
|
2206
|
-
typ: "dpop+jwt",
|
|
2207
|
-
jwk: publicJwk
|
|
2208
|
-
});
|
|
2209
|
-
return [
|
|
2210
|
-
4,
|
|
2211
|
-
jwt.sign(importedPrivateKey)
|
|
2212
|
-
];
|
|
2213
|
-
case 4:
|
|
499
|
+
payload = (_tmp.ath = _state.sent(), _tmp);
|
|
500
|
+
jwt = jsrsasign.KJUR.jws.JWS.sign("ES256", header, payload, importedPrivateKey);
|
|
2214
501
|
return [
|
|
2215
502
|
2,
|
|
2216
|
-
|
|
503
|
+
jwt
|
|
2217
504
|
];
|
|
2218
505
|
}
|
|
2219
506
|
});
|
|
@@ -2242,7 +529,7 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2242
529
|
];
|
|
2243
530
|
case 1:
|
|
2244
531
|
hash = _state.sent();
|
|
2245
|
-
ath =
|
|
532
|
+
ath = jsrsasign.hextob64u(hash);
|
|
2246
533
|
_this.cacheService.set("ath", ath);
|
|
2247
534
|
return [
|
|
2248
535
|
2,
|
|
@@ -2252,53 +539,19 @@ var _JoseDpopAuthCredentialService = /*#__PURE__*/ function(BaseDpopAuthCredenti
|
|
|
2252
539
|
});
|
|
2253
540
|
})();
|
|
2254
541
|
}
|
|
2255
|
-
},
|
|
2256
|
-
{
|
|
2257
|
-
key: "hexToUint8Array",
|
|
2258
|
-
value: function hexToUint8Array(hex) {
|
|
2259
|
-
var bytes = new Uint8Array(hex.length / 2);
|
|
2260
|
-
for(var i = 0; i < hex.length; i += 2){
|
|
2261
|
-
bytes[i / 2] = parseInt(hex.substr(i, 2), 16);
|
|
2262
|
-
}
|
|
2263
|
-
return bytes;
|
|
2264
|
-
}
|
|
2265
|
-
},
|
|
2266
|
-
{
|
|
2267
|
-
key: "importPrivateKey",
|
|
2268
|
-
value: function importPrivateKey(privateJwk) {
|
|
2269
|
-
return _async_to_generator(function() {
|
|
2270
|
-
return _ts_generator(this, function(_state) {
|
|
2271
|
-
switch(_state.label){
|
|
2272
|
-
case 0:
|
|
2273
|
-
if (!privateJwk.kty) {
|
|
2274
|
-
throw new Error("Invalid private key: missing kty property");
|
|
2275
|
-
}
|
|
2276
|
-
return [
|
|
2277
|
-
4,
|
|
2278
|
-
importJWK(privateJwk, "ES256")
|
|
2279
|
-
];
|
|
2280
|
-
case 1:
|
|
2281
|
-
return [
|
|
2282
|
-
2,
|
|
2283
|
-
_state.sent()
|
|
2284
|
-
];
|
|
2285
|
-
}
|
|
2286
|
-
});
|
|
2287
|
-
})();
|
|
2288
|
-
}
|
|
2289
542
|
}
|
|
2290
543
|
]);
|
|
2291
|
-
return
|
|
544
|
+
return _JsrsasignDpopAuthCredentialService;
|
|
2292
545
|
}(BaseDpopAuthCredentialService);
|
|
2293
|
-
__name(
|
|
2294
|
-
var
|
|
2295
|
-
|
|
546
|
+
__name(_JsrsasignDpopAuthCredentialService, "JsrsasignDpopAuthCredentialService");
|
|
547
|
+
var JsrsasignDpopAuthCredentialService = _JsrsasignDpopAuthCredentialService;
|
|
548
|
+
JsrsasignDpopAuthCredentialService = _ts_decorate2([
|
|
2296
549
|
injectable2()
|
|
2297
|
-
],
|
|
550
|
+
], JsrsasignDpopAuthCredentialService);
|
|
2298
551
|
// src/auth/ioc/reactNativeAuthIOCModule.ts
|
|
2299
552
|
var reactNativeAuthIOCModule = new ContainerModule3(function(bind) {
|
|
2300
553
|
bind(ITF_AUTH_SERVICE).to(RestAuthService).inSingletonScope();
|
|
2301
|
-
bind(ITF_AUTH_CREDENTIAL_SERVICE).to(
|
|
554
|
+
bind(ITF_AUTH_CREDENTIAL_SERVICE).to(JsrsasignDpopAuthCredentialService).inSingletonScope();
|
|
2302
555
|
bind(ITF_AUTHENTICATED_HTTP_CLIENT).to(M2mAuthenticatedHttpClient).inSingletonScope();
|
|
2303
556
|
});
|
|
2304
557
|
// src/ioc/reactNativeContainer.ts
|
|
@@ -2570,4 +823,4 @@ wlaReactNativeContainer.unload(commonIOCModule);
|
|
|
2570
823
|
wlaReactNativeContainer.load(reactNativeCommonIOCModule);
|
|
2571
824
|
wlaReactNativeContainer.unload(featureFlagsIOCModule);
|
|
2572
825
|
wlaReactNativeContainer.load(reactNativeFeatureFlagsIOCModule);
|
|
2573
|
-
export { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AddSourceCard, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetSourceCards, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_ADD_SOURCE_CARD, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_SOURCE_CARDS, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_INITIATE_FUNDING, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REMOVE_SOURCE_CARD, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemSsoAccessTokenService, InitiateFunding, InterestTierResponseTypeEnum, IsMockModeEnabled, JoseDpopAuthCredentialService, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, RemoveSourceCard, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, MOCK_USER as STATEMENTS_MOCK_USER, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, accountsIOCModule, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, commonIOCModule, componentsIOCModule, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports as development, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, isComponentEnabled, kybIOCModule, kycIOCModule, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports as localhost, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports as mockMode, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports as production, qa_exports as qa, reactNativeAuthIOCModule, reactNativeContainer as reactNativeSdkJsContainer, refreshAccessToken, registerDeviceForPushNotifications, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports as sandbox, container as sdkJsContainer, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice, wlaReactNativeAuthIOCModule, wlaReactNativeContainer as wlaReactNativeSdkJsContainer };
|
|
826
|
+
export { ACCOUNT_CLOSED_CUI_AUTH_TOKEN, ACCOUNT_LIMITED_CUI_AUTH_TOKEN, ACCOUNT_LOADING_CUI_AUTH_TOKEN, ACCOUNT_SUSPENDED_CUI_AUTH_TOKEN, ACCOUNT_UNVERIFIED_CUI_AUTH_TOKEN, ACTIVE_CARD_ACTIONS, ACTIVE_IOC_CONTAINER, ADDRESS_ISSUE_SSN, AUTH_REFRESH_INTERVAL_ID, AccountBalancesEntity, AccountHolderGroupEntity, AccountType, ActivateCardByTokenOrPan, AtmLocationAccessFeesEnum, AtmLocationAvailabilityEnum, AtmLocationDistanceUnitEnum, AtmLocationHandicapAccessibleEnum, AtmLocationHasSharedDepositEnum, AtmLocationIsSurchargeFreeAllianceEnum, AtmLocationLocationTypeEnum, AtmLocationSupportsContactLessEnum, AtmLocationSurchargeFreeAllianceNetworkEnum, BAD_GENERAL_SSN, BannerTypeEnum, BaseDpopAuthCredentialService, BookTransferResponseStatusEnum, BrowserMessageService, CREATE_USERS_BAD_REQUEST, CREATE_USERS_INTERNAL_SERVER_ERROR, CUI_ENABLED_SHORT_CODE, CardEntity, CardFulfillmentRequestCardFulfillmentReasonEnum, CardStates, CardholderContextEntity, CardholderVerificationMethods, CleanupOnUnload, ConsentAction, ConsentPaymentScope, ConsentPaymentType, ConsentPermissionType, ConsentScope, ConsentStatus, CreateCardUseCase, CreateUserRequestIdentificationsInnerTypeEnum, CreateUserResponseStatusEnum, Currency, DEFAULT_THEME, DEPOSIT_ACCOUNTS_TERMINATED_CUI_AUTH_TOKEN, DOB_ISSUE_SSN, DeleteDocumentForDispute, DepositAccountEntity, Direction, DownloadDocumentForDispute, DpopAuthCredentialService, EMPTY_DEPOSIT_ACCOUNTS_CUI_AUTH_TOKEN, ExternalAccountStatus, FFLAGS_SESSION_STORAGE_KEY, FaqParagraphTypeEnum, FormField, GaMeasurementAnalyticsService, GetAccountBalances, GetAccountHolderGroup, GetActiveEnvName, GetActiveTheme, GetAllStepsOfDispute, GetCardByToken, GetCardsByUserToken, GetDepositAccounts, GetEnvConfigValueByName, GetIconsByName, GetLanguageCode, GetPinByCardToken, GetShowpanByCardToken, GetStatementAsset, GetStatements, GetStepOfDisputeByStepId, GetTransactionDetails, GetTransactions, GetUser, INTR_ACTIVATE_CARD_BY_TOKEN_OR_PAN, INTR_CLEANUP_ON_UNLOAD, INTR_DELETE_DOCUMENT_FOR_DISPUTE, INTR_DOWNLOAD_DOCUMENT_FOR_DISPUTE, INTR_GET_ACCT_BALANCE_BY_TOKEN, INTR_GET_ACCT_HOLDER_GRP_BY_TOKEN, INTR_GET_ACTIVE_ENV_NAME, INTR_GET_ACTIVE_THEME, INTR_GET_ALL_STEPS_OF_DISPUTE, INTR_GET_CARDS_BY_USER_TOKEN, INTR_GET_CARD_BY_TOKEN, INTR_GET_CLIENT_ID, INTR_GET_DEPOSIT_ACCT_BY_TOKEN, INTR_GET_ENV_CONFIG_VALUE_BY_NAME, INTR_GET_ICONS, INTR_GET_LANGUAGE_CODE, INTR_GET_PIN_BY_CARD_TOKEN, INTR_GET_SESSION_ID, INTR_GET_SHOWPAN_BY_CARD_TOKEN, INTR_GET_STATEMENTS, INTR_GET_STATEMENT_ASSET, INTR_GET_STEP_OF_DISPUTE_BY_STEP_ID, INTR_GET_TRANSACTIONS, INTR_GET_TRANSACTIONS_V2, INTR_GET_TRANSACTION_DETAILS, INTR_GET_USER, INTR_IS_MOCK_MODE_ENABLED, INTR_LOCK_CARD_BY_TOKEN, INTR_POST_CREATE_USER, INTR_PUT_UPDATE_USER, INTR_REGISTER_CLEANUP_HANDLER, INTR_REPLACE_CARD_BY_TOKEN, INTR_RETRIEVE_DOCUMENT_FOR_DISPUTE, INTR_SET_ACTIVE_ENV_NAME, INTR_SET_ACTIVE_THEME_BY_NAME, INTR_SET_MOCK_MODE, INTR_START_DISPUTE, INTR_SUBMIT_ANS_DISPUTE, INTR_SUBMIT_DISPUTE, INTR_UNLOCK_CARD_BY_TOKEN, INTR_UPDATE_PIN_BY_CARD_TOKEN, INTR_UPLOAD_DOCUMENT_FOR_DISPUTE, INVALID_ACCOUNT_HOLDER, INVALID_CARD_DETAILS_CUI_AUTH_TOKEN, INVALID_CUI_AUTH_TOKEN, ITF_ACCOUNT_REPOSITORY, ITF_ANALYTICS_SERVICE, ITF_AUTHENTICATED_HTTP_CLIENT, ITF_AUTH_CREDENTIAL_SERVICE, ITF_AUTH_CREDS_MESSAGE_SERVICE, ITF_AUTH_SERVICE, ITF_CACHE_SERVICE, ITF_CARD_REPOSITORY, ITF_DISPUTES_REPOSITORY, ITF_ICONS_REPOSITORY, ITF_IDP_SERVICE, ITF_KYB, ITF_KYC, ITF_MONEY_MOVEMENT, ITF_PERSISTED_CACHE_SERVICE, ITF_REGISTRY_SERVICE, ITF_SESSION_SERVICE, ITF_SSO_ACCESS_TOKEN_SERVICE, ITF_STATEMENTS, ITF_STATEMENT_ASSET, ITF_THEME_REPOSITORY, ITF_TRANSACTIONS, ITF_USERS, ITF_WLA_SERVICE, InMemSsoAccessTokenService, InterestTierResponseTypeEnum, IsMockModeEnabled, JsrsasignDpopAuthCredentialService, KYB_ADDRESS_ISSUE_SSN, KYB_BAD_GENERAL_SSN, KYB_DOB_ISSUE_SSN, KYB_LOADING_SSN, KYB_NAME_ISSUE_SSN, KYB_OBAC_ISSUE_SSN, KybEvaluationStatus, KycVerificationRequestIdentifierTypeEnum, LIST_OF_ENABLED_COMPONENTS, LOADING_SSN, LocalStorageCacheService, LockCardByToken, LoyaltyTier, M2mAuthenticatedHttpClient, MOCK_AMOUNT_STEP_RESPONSE, MOCK_CUSTOMER_ENDPOINT, MOCK_DELETE_DOCUMENTS_RESPONSE, MOCK_DISPUTE_ID, MOCK_DOCUMENT1, MOCK_DOCUMENT2, MOCK_DOCUMENT_ID1, MOCK_DOCUMENT_ID2, MOCK_FRAUD_STEP_RESPONSE, MOCK_GET_ALL_STEPS_RESPONSE, MOCK_INVALID_TRANSACTION_TOKEN, MOCK_RECOGNIZED_TRANSACTION_RESPONSE, MOCK_RETRIEVE_DOCUMENTS_RESPONSE, MOCK_START_DISPUTE_RESPONSE, MOCK_STATEMENT_ASSET_SIGNED_URL_PDF, MOCK_STEP1_RESPONSE, MOCK_STEP_COMPLETION_RESPONSE, MOCK_SUBMIT_DISPUTE_RESPONSE, MOCK_TRANSFORMED_ERROR_RESPONSE, MOCK_UPLOAD_DOCUMENTS_RESPONSE, MockAccountRepository, MockAnalyticsService, MockAuthCredentialService, MockAuthService, MockCacheService, MockCardRepository, MockComponentsRepository, MockDisputesRepository, MockFeatureFlagService, MockGetEnvConfigValueByName, MockIdpService, MockMoneyMovementRepository, MockPersistedCacheService, MockRegistryService, MockSessionService, MockThemeRepository, MockTransactionsRepository, MockiUsersRepository, MqSDKError, NAME_ISSUE_SSN, NOT_OK_CUI_AUTH_TOKEN, NOT_OK_DPOP_TOKEN, OBAC_ISSUE_SSN, OfferStatus, OnboardingStatus, OriginationDirection, OriginationTransferReasonCode, OriginationTransferScheme, OutageType, PushRegistrationRequestDevicePlatformEnum, PutUpdateUser, REFRESHED_CUI_AUTH_TOKEN, REPOSITORY_METHOD_FAILING_SHORT_CODE, RegisterCleanupHandler, ReplaceCardByToken, ReplaceCardRequestReasonEnum, RestAuthService, RestComponentsRepository, RestIdpService, RestKybRepository, RestKycRepository, RestUsersRepository, RestWlaService, RetrieveDocumentForDispute, RevokeConsentStatus, SESSION_TTL, MOCK_USER as STATEMENTS_MOCK_USER, SUSPENDED_CARD_ACTIONS, SessionStorageFeatureFlagService, SetActiveEnvName, SetActiveThemeByName, SetMockMode, SetPinRequestUsecaseEnum, ShippingMethodEnum, SsoAuthenticatedHttpClient, StandardizedError, StartDispute, StatementAssetStateEnum, StubFeatureFlagService, SubmitAnswerForDisputeQuestion, SubmitDispute, TERMINATED_CARD_ACTIONS, TEST_ACTIVE_CARD, TEST_ACTIVE_CARD_VIRTUAL, TEST_CARD, TEST_CARDHOLDER_VERIFICATION_METHOD, TEST_CARD_ACTIONS, TEST_CARD_PRODUCT_TOKEN, TEST_CARD_TOKEN, TEST_CARD_TOKEN_INVALID, TEST_CARD_TOKEN_IS_ACTIVE, TEST_CARD_TOKEN_IS_ACTIVE_VIRTUAL, TEST_CARD_TOKEN_IS_EXPIRED, TEST_CARD_TOKEN_IS_SUSPENDED, TEST_CARD_TOKEN_IS_SUSPENDED_VIRTUAL, TEST_CARD_TOKEN_IS_TERMINATED, TEST_CARD_TOKEN_IS_UNACTIVATED, TEST_CARD_TOKEN_IS_VIRTUAL, TEST_CARD_TOKEN_LIMIT_EXCEEDED, TEST_CARD_TOKEN_LOADING, TEST_CLIENT_ID, TEST_CVV_NUMBER, TEST_DEPOSIT_ACCOUNT, TEST_EXPIRATION, TEST_OK_RESPONSE, TEST_PIN, TEST_SESSION_ID, TEST_SOURCE_CARD, TEST_SOURCE_CARDS_RESPONSE, TEST_SUSPENDED_CARD_VIRTUAL, TEST_THEME_NAME, TEST_THEME_OBJECT, TEST_USER_TOKEN, TEST_WEAK_PINS, TransactionChallengeAuthenticationMethod, TransactionChallengeCancelReason, TransactionChallengeDecisionRequestResultEnum, TransactionChallengeDecisionResponseStatusEnum, TransactionChallengeResponseCardNetworkEnum, TransactionChallengeResponseStateEnum, TransactionChallengeTransactionResponseSubTypeEnum, TransactionChallengeTransactionResponseTransactionTypeEnum, TransactionDetailIconTypeEnum, TransactionDetailResponseIconTypeEnum, TransactionDetailsBannerType, TransactionDirection, TransactionDisputeStatus, TransactionRecordStatus, TransactionStatus, TransactionType, TransferStatus, UnlockCardByToken, UpdatePinByCardToken, UploadDocumentForDispute, UserEntity, UserRole, VALID_CUI_AUTH_TOKEN, VALID_CUI_USER_RESPONSE, VALID_DPOP_TOKEN, VALID_OAUTH_TOKEN, VALID_PROGRAM_SHORT_CODE, VALID_USER_TOKEN_HASH, VanillaSessionService, WindowCacheService, WlaIocModule, WlaSdkError, WlaUserStatus, accountsIOCModule, addExternalCard, addExternalCardWithUserToken, authIOCModule, bookTransfer, cardsIOCModule, changeWlaPassword, checkAndRefreshAuthToken, commonIOCModule, componentsIOCModule, convertObjKeysToCamelCase, convertObjKeysToLowerCamelCase, createOriginationTransfer, createProofToken, createWlaCard, createWlaExternalAccount, deepMergeThemeObject, deleteRegistrationForPushNotifications, development_exports as development, disputesIOCModule, envConfigIOCModule, featureFlagIsEnabled, featureFlagsIOCModule, formatDateForApi, generateAuthKeyPair, generateStatementsDateQueries, getAccountTransactions, getActiveIocContainer, getAuthKeyPair, getCachedAuthApiEndpoint, getCachedAuthApiHeadersResolver, getCachedAuthToken, getCachedAuthTokenExpiration, getCardholderContext, getClientId, getConsentById, getConsents, getExternalAccount, getExternalAccountList, getExternalCards, getMockUpdatedUserRequestToCreateResponse, getMockUserRequestToCreateResponse, getNextTransactionChallenge, getOfferDetails, getOffers, getOutagesByToken, getOutagesList, getSessionId, getSsoAccessTokenHandler, getTransactionChallengeByToken, getTransferByToken, getTransfers, getUserProgram, getUserTokenHash, getUserTransactionsV2, getWlaAccountDetails, getWlaCardByToken, getWlaFaqs, getWlaRewardSummaries, getWlaTransactionByToken, getWlaUserProfile, handleGetStatementAsset, handleGetStatements, iAccountRepository, iAnalyticsService, iAuthCredentialService, iAuthCredsMessageService, iAuthService, iAuthenticatedHttpClient, iCacheService, iCardRepository, iComponentsRepository, iDisputesRepository, iFeatureFlagService, iGetEnvConfigValueByName, iIconsRepository, iIdpService, iKybRepository, iKycRepository, iMoneyMovementRepository, iPersistedCacheService, iRegistryService, iSessionService, iSsoAccessTokenService, iStatementsRepository, iThemeRepository, iTransactionsRepository, iUsersRepository, iconsIOCModule, idpIOCModule, initPasswordAndLogin, initializeOnboarding, initiateTransfer, isComponentEnabled, kybIOCModule, kycIOCModule, loadEnabledComponentsByShortCode, loadFeatureFlags, localhost_exports as localhost, loginWithIdAndPassword, markAccountActivated, markAccountVerified, markPasswordSetupDone, mockAccountBalances, mockAccountHolderGroup, mockAccountsIOCModule, mockAnalyticsIOCModule, mockAuthIOCModule, mockCardsIOCModule, mockCommonIOCModule, mockCreateUserRequest, mockCreatedUserResponse, mockDepositAccountJson, mockDisputesIOCModule, mockEnvConfigIOCModule, mockFeatureFlagIOCModule, mockIdpIOCModule, mockInvalidCreateUserRequest, mockInvalidKybEvaluationRequest, mockInvalidKybVerificationRequest, mockInvalidKycVerificationRequest, mockKybEvaluationRequest, mockKybEvaluationResponse, mockKybIOCModule, mockKybVerificationRequest, mockKybVerificationResponse, mockKycVerificationRequest, mockKycVerificationResponse, mockMode_exports as mockMode, mockMoneyMovementIOCModule, mockSourceCards, mockThemesIOCModule, mockUpdateUserResponse, mockUsersIOCModule, moneyMovementIOCModule, mswAccountHandlers, mswAnalyticsHandlers, mswAuthHandlers, mswCardsHandlers, mswComponentsHandlers, mswDisputesHandlers, mswKybHandlers, mswKycHandlers, mswSourceCardsHandler, mswStatementsHandlers, mswTransactionsHandlers, mswUsersHandlers, postCreateUser, postTransactionChallengeDecision, postVerifyKyb, postVerifyKyc, postWlaSendResetPasswordLink, production_exports as production, qa_exports as qa, reactNativeAuthIOCModule, reactNativeContainer as reactNativeSdkJsContainer, refreshAccessToken, registerDeviceForPushNotifications, removeExternalCard, replaceWlaCard, requestOtpCode, resendVerificationEmail, revokeConsent, sandbox_exports as sandbox, container as sdkJsContainer, searchAtms, setActiveIocContainer, setAuthKeyPair, setAuthParams, setCachedAuthApiEndpoint, setCachedAuthApiHeadersResolver, setCachedAuthToken, setSsoAccessTokenHandler, setWlaCardPin, setWlaConfig, statementsIOCModule, themesIOCModule, toDateType, trackEvent, transactionsIOCModule, updateConsentStatus, updateExternalAccount, usersIOCModule, verifyExternalAccount, verifyOTP, verifyUserDevice, wlaReactNativeAuthIOCModule, wlaReactNativeContainer as wlaReactNativeSdkJsContainer };
|