@ms-cloudpack/remote-cache 0.7.8 → 0.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{AzureRemoteCacheClient-LMRNY2C6.js → AzureRemoteCacheClient-YFWJLZNA.js} +2122 -3714
- package/dist/{ReporterDecorator-JLGERQ2U.js → ReporterDecorator-5LUAHYKK.js} +3 -3
- package/dist/{chunk-TXSHKS6T.js → chunk-D7DHZQ7L.js} +300 -326
- package/dist/{chunk-FUGMINXQ.js → chunk-DSANWO7J.js} +1 -1
- package/dist/{chunk-VCWIWY5Y.js → chunk-FW2AO4WO.js} +217 -305
- package/dist/{chunk-IVPGYNQL.js → chunk-GFDVXVVH.js} +1 -1
- package/dist/{chunk-B4GP6UPK.js → chunk-LRFMBF43.js} +137 -184
- package/dist/{getCredential-HXDULEOH.js → getCredential-W6MRP3D2.js} +1381 -808
- package/dist/{getListOfBlobs-TYZM4XYI.js → getListOfBlobs-2GKCJGDO.js} +4 -4
- package/dist/index.js +9 -9
- package/lib/authentication/forks/identity-cache-persistence/cachePersistencePlugin.d.ts +34 -0
- package/lib/authentication/forks/identity-cache-persistence/platforms.d.ts +50 -0
- package/lib/authentication/forks/identity-cache-persistence/provider.d.ts +17 -0
- package/lib/authentication/forks/msal-node-extensions/error/PersistenceError.d.ts +37 -0
- package/lib/authentication/forks/msal-node-extensions/lock/CrossPlatformLock.d.ts +25 -0
- package/lib/authentication/forks/msal-node-extensions/lock/CrossPlatformLockOptions.d.ts +16 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/BasePersistence.d.ts +6 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/FilePersistence.d.ts +31 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/FilePersistenceWithDataProtection.d.ts +30 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/IPersistence.d.ts +17 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/IPersistenceConfiguration.d.ts +16 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/NapiRsKeyRingPersistence.d.ts +19 -0
- package/lib/authentication/forks/msal-node-extensions/persistence/PersistenceCachePlugin.d.ts +35 -0
- package/lib/authentication/forks/msal-node-extensions/utils/Constants.d.ts +44 -0
- package/lib/authentication/forks/msal-node-extensions/utils/TypeGuards.d.ts +10 -0
- package/lib/authentication/getCredential.d.ts +0 -1
- package/lib/registerAzureLogger.d.ts +0 -1
- package/package.json +7 -5
|
@@ -6,14 +6,14 @@ const __filename = topLevelUrl.fileURLToPath(import.meta.url);
|
|
|
6
6
|
const __dirname = topLevelPath.dirname(__filename);
|
|
7
7
|
import {
|
|
8
8
|
require_package
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-DSANWO7J.js";
|
|
10
10
|
import {
|
|
11
11
|
require_commonjs as require_commonjs2,
|
|
12
12
|
require_commonjs2 as require_commonjs3,
|
|
13
13
|
require_commonjs3 as require_commonjs4,
|
|
14
14
|
require_commonjs4 as require_commonjs5,
|
|
15
15
|
require_dist
|
|
16
|
-
} from "./chunk-
|
|
16
|
+
} from "./chunk-D7DHZQ7L.js";
|
|
17
17
|
import {
|
|
18
18
|
__commonJS,
|
|
19
19
|
__esm,
|
|
@@ -22,15 +22,13 @@ import {
|
|
|
22
22
|
__require,
|
|
23
23
|
__toCommonJS,
|
|
24
24
|
__toESM,
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
tslib_es6_exports
|
|
28
|
-
} from "./chunk-B4GP6UPK.js";
|
|
25
|
+
require_commonjs
|
|
26
|
+
} from "./chunk-LRFMBF43.js";
|
|
29
27
|
|
|
30
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
28
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs
|
|
31
29
|
var _Serializer, Serializer;
|
|
32
30
|
var init_Serializer = __esm({
|
|
33
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
31
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs"() {
|
|
34
32
|
"use strict";
|
|
35
33
|
_Serializer = class _Serializer {
|
|
36
34
|
/**
|
|
@@ -47,7 +45,7 @@ var init_Serializer = __esm({
|
|
|
47
45
|
static serializeAccounts(accCache) {
|
|
48
46
|
const accounts = {};
|
|
49
47
|
Object.keys(accCache).map(function(key) {
|
|
50
|
-
var
|
|
48
|
+
var _a2;
|
|
51
49
|
const accountEntity = accCache[key];
|
|
52
50
|
accounts[key] = {
|
|
53
51
|
home_account_id: accountEntity.homeAccountId,
|
|
@@ -60,7 +58,7 @@ var init_Serializer = __esm({
|
|
|
60
58
|
client_info: accountEntity.clientInfo,
|
|
61
59
|
last_modification_time: accountEntity.lastModificationTime,
|
|
62
60
|
last_modification_app: accountEntity.lastModificationApp,
|
|
63
|
-
tenantProfiles: (
|
|
61
|
+
tenantProfiles: (_a2 = accountEntity.tenantProfiles) == null ? void 0 : _a2.map((tenantProfile) => {
|
|
64
62
|
return JSON.stringify(tenantProfile);
|
|
65
63
|
})
|
|
66
64
|
};
|
|
@@ -171,10 +169,10 @@ var init_Serializer = __esm({
|
|
|
171
169
|
}
|
|
172
170
|
});
|
|
173
171
|
|
|
174
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
172
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs
|
|
175
173
|
var Constants, HttpStatus, OIDC_DEFAULT_SCOPES, OIDC_SCOPES, HeaderNames, AADAuthorityConstants, ClaimsRequestKeys, PromptValue, CodeChallengeMethodValues, ServerResponseType, ResponseMode, GrantType, CacheAccountType, Separators, CredentialType, APP_METADATA, CLIENT_INFO, THE_FAMILY_ID, AUTHORITY_METADATA_CONSTANTS, AuthorityMetadataSource, SERVER_TELEM_CONSTANTS, AuthenticationScheme, ThrottlingConstants, Errors, PasswordGrantConstants, ResponseCodes, RegionDiscoverySources, RegionDiscoveryOutcomes, CacheOutcome, DEFAULT_TOKEN_RENEWAL_OFFSET_SEC;
|
|
176
174
|
var init_Constants = __esm({
|
|
177
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
175
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs"() {
|
|
178
176
|
"use strict";
|
|
179
177
|
Constants = {
|
|
180
178
|
LIBRARY_NAME: "MSAL.JS",
|
|
@@ -406,7 +404,7 @@ var init_Constants = __esm({
|
|
|
406
404
|
}
|
|
407
405
|
});
|
|
408
406
|
|
|
409
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
407
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs
|
|
410
408
|
var AuthErrorCodes_exports = {};
|
|
411
409
|
__export(AuthErrorCodes_exports, {
|
|
412
410
|
postRequestFailed: () => postRequestFailed,
|
|
@@ -414,20 +412,20 @@ __export(AuthErrorCodes_exports, {
|
|
|
414
412
|
});
|
|
415
413
|
var unexpectedError, postRequestFailed;
|
|
416
414
|
var init_AuthErrorCodes = __esm({
|
|
417
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
415
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs"() {
|
|
418
416
|
"use strict";
|
|
419
417
|
unexpectedError = "unexpected_error";
|
|
420
418
|
postRequestFailed = "post_request_failed";
|
|
421
419
|
}
|
|
422
420
|
});
|
|
423
421
|
|
|
424
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
422
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs
|
|
425
423
|
function createAuthError(code, additionalMessage) {
|
|
426
424
|
return new AuthError(code, additionalMessage ? `${AuthErrorMessages[code]} ${additionalMessage}` : AuthErrorMessages[code]);
|
|
427
425
|
}
|
|
428
426
|
var AuthErrorMessages, AuthErrorMessage, _AuthError, AuthError;
|
|
429
427
|
var init_AuthError = __esm({
|
|
430
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
428
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs"() {
|
|
431
429
|
"use strict";
|
|
432
430
|
init_Constants();
|
|
433
431
|
init_AuthErrorCodes();
|
|
@@ -465,7 +463,7 @@ var init_AuthError = __esm({
|
|
|
465
463
|
}
|
|
466
464
|
});
|
|
467
465
|
|
|
468
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
466
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs
|
|
469
467
|
var ClientAuthErrorCodes_exports = {};
|
|
470
468
|
__export(ClientAuthErrorCodes_exports, {
|
|
471
469
|
authTimeNotFound: () => authTimeNotFound,
|
|
@@ -515,7 +513,7 @@ __export(ClientAuthErrorCodes_exports, {
|
|
|
515
513
|
});
|
|
516
514
|
var clientInfoDecodingError, clientInfoEmptyError, tokenParsingError, nullOrEmptyToken, endpointResolutionError, networkError, openIdConfigError, hashNotDeserialized, invalidState, stateMismatch, stateNotFound, nonceMismatch, authTimeNotFound, maxAgeTranspired, multipleMatchingTokens, multipleMatchingAccounts, multipleMatchingAppMetadata, requestCannotBeMade, cannotRemoveEmptyScope, cannotAppendScopeSet, emptyInputScopeSet, deviceCodePollingCancelled, deviceCodeExpired, deviceCodeUnknownError, noAccountInSilentRequest, invalidCacheRecord, invalidCacheEnvironment, noAccountFound, noCryptoObject, unexpectedCredentialType, invalidAssertion, invalidClientCredential, tokenRefreshRequired, userTimeoutReached, tokenClaimsCnfRequiredForSignedJwt, authorizationCodeMissingFromServerResponse, bindingKeyNotRemoved, endSessionEndpointNotSupported, keyIdMissing, noNetworkConnectivity, userCanceled, missingTenantIdError, methodNotImplemented, nestedAppAuthBridgeDisabled;
|
|
517
515
|
var init_ClientAuthErrorCodes = __esm({
|
|
518
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
516
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs"() {
|
|
519
517
|
"use strict";
|
|
520
518
|
clientInfoDecodingError = "client_info_decoding_error";
|
|
521
519
|
clientInfoEmptyError = "client_info_empty_error";
|
|
@@ -564,13 +562,13 @@ var init_ClientAuthErrorCodes = __esm({
|
|
|
564
562
|
}
|
|
565
563
|
});
|
|
566
564
|
|
|
567
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
565
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs
|
|
568
566
|
function createClientAuthError(errorCode, additionalMessage) {
|
|
569
567
|
return new ClientAuthError(errorCode, additionalMessage);
|
|
570
568
|
}
|
|
571
569
|
var ClientAuthErrorMessages, ClientAuthErrorMessage, _ClientAuthError, ClientAuthError;
|
|
572
570
|
var init_ClientAuthError = __esm({
|
|
573
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
571
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs"() {
|
|
574
572
|
"use strict";
|
|
575
573
|
init_AuthError();
|
|
576
574
|
init_ClientAuthErrorCodes();
|
|
@@ -807,7 +805,7 @@ var init_ClientAuthError = __esm({
|
|
|
807
805
|
}
|
|
808
806
|
});
|
|
809
807
|
|
|
810
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
808
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs
|
|
811
809
|
var AuthToken_exports = {};
|
|
812
810
|
__export(AuthToken_exports, {
|
|
813
811
|
checkMaxAge: () => checkMaxAge,
|
|
@@ -841,7 +839,7 @@ function checkMaxAge(authTime, maxAge) {
|
|
|
841
839
|
}
|
|
842
840
|
}
|
|
843
841
|
var init_AuthToken = __esm({
|
|
844
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
842
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs"() {
|
|
845
843
|
"use strict";
|
|
846
844
|
init_ClientAuthError();
|
|
847
845
|
init_ClientAuthErrorCodes();
|
|
@@ -851,10 +849,10 @@ var init_AuthToken = __esm({
|
|
|
851
849
|
}
|
|
852
850
|
});
|
|
853
851
|
|
|
854
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
852
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs
|
|
855
853
|
var AuthorityType;
|
|
856
854
|
var init_AuthorityType = __esm({
|
|
857
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
855
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs"() {
|
|
858
856
|
"use strict";
|
|
859
857
|
AuthorityType = {
|
|
860
858
|
Default: 0,
|
|
@@ -865,18 +863,18 @@ var init_AuthorityType = __esm({
|
|
|
865
863
|
}
|
|
866
864
|
});
|
|
867
865
|
|
|
868
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
866
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs
|
|
869
867
|
function isOpenIdConfigResponse(response) {
|
|
870
868
|
return response.hasOwnProperty("authorization_endpoint") && response.hasOwnProperty("token_endpoint") && response.hasOwnProperty("issuer") && response.hasOwnProperty("jwks_uri");
|
|
871
869
|
}
|
|
872
870
|
var init_OpenIdConfigResponse = __esm({
|
|
873
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
871
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs"() {
|
|
874
872
|
"use strict";
|
|
875
873
|
__name(isOpenIdConfigResponse, "isOpenIdConfigResponse");
|
|
876
874
|
}
|
|
877
875
|
});
|
|
878
876
|
|
|
879
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
877
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs
|
|
880
878
|
var ClientConfigurationErrorCodes_exports = {};
|
|
881
879
|
__export(ClientConfigurationErrorCodes_exports, {
|
|
882
880
|
authorityMismatch: () => authorityMismatch,
|
|
@@ -904,7 +902,7 @@ __export(ClientConfigurationErrorCodes_exports, {
|
|
|
904
902
|
});
|
|
905
903
|
var redirectUriEmpty, claimsRequestParsingError, authorityUriInsecure, urlParseError, urlEmptyError, emptyInputScopesError, invalidPromptValue, invalidClaims, tokenRequestEmpty, logoutRequestEmpty, invalidCodeChallengeMethod, pkceParamsMissing, invalidCloudDiscoveryMetadata, invalidAuthorityMetadata, untrustedAuthority, missingSshJwk, missingSshKid, missingNonceAuthenticationHeader, invalidAuthenticationHeader, cannotSetOIDCOptions, cannotAllowNativeBroker, authorityMismatch;
|
|
906
904
|
var init_ClientConfigurationErrorCodes = __esm({
|
|
907
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
905
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs"() {
|
|
908
906
|
"use strict";
|
|
909
907
|
redirectUriEmpty = "redirect_uri_empty";
|
|
910
908
|
claimsRequestParsingError = "claims_request_parsing_error";
|
|
@@ -931,13 +929,13 @@ var init_ClientConfigurationErrorCodes = __esm({
|
|
|
931
929
|
}
|
|
932
930
|
});
|
|
933
931
|
|
|
934
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
932
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs
|
|
935
933
|
function createClientConfigurationError(errorCode) {
|
|
936
934
|
return new ClientConfigurationError(errorCode);
|
|
937
935
|
}
|
|
938
936
|
var ClientConfigurationErrorMessages, ClientConfigurationErrorMessage, _ClientConfigurationError, ClientConfigurationError;
|
|
939
937
|
var init_ClientConfigurationError = __esm({
|
|
940
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
938
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs"() {
|
|
941
939
|
"use strict";
|
|
942
940
|
init_AuthError();
|
|
943
941
|
init_ClientConfigurationErrorCodes();
|
|
@@ -1068,10 +1066,10 @@ var init_ClientConfigurationError = __esm({
|
|
|
1068
1066
|
}
|
|
1069
1067
|
});
|
|
1070
1068
|
|
|
1071
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1069
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs
|
|
1072
1070
|
var _StringUtils, StringUtils;
|
|
1073
1071
|
var init_StringUtils = __esm({
|
|
1074
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1072
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs"() {
|
|
1075
1073
|
"use strict";
|
|
1076
1074
|
_StringUtils = class _StringUtils {
|
|
1077
1075
|
/**
|
|
@@ -1156,7 +1154,7 @@ var init_StringUtils = __esm({
|
|
|
1156
1154
|
}
|
|
1157
1155
|
});
|
|
1158
1156
|
|
|
1159
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1157
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs
|
|
1160
1158
|
var UrlUtils_exports = {};
|
|
1161
1159
|
__export(UrlUtils_exports, {
|
|
1162
1160
|
getDeserializedResponse: () => getDeserializedResponse,
|
|
@@ -1186,7 +1184,7 @@ function getDeserializedResponse(responseString) {
|
|
|
1186
1184
|
return null;
|
|
1187
1185
|
}
|
|
1188
1186
|
var init_UrlUtils = __esm({
|
|
1189
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1187
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs"() {
|
|
1190
1188
|
"use strict";
|
|
1191
1189
|
init_ClientAuthError();
|
|
1192
1190
|
init_ClientAuthErrorCodes();
|
|
@@ -1195,10 +1193,10 @@ var init_UrlUtils = __esm({
|
|
|
1195
1193
|
}
|
|
1196
1194
|
});
|
|
1197
1195
|
|
|
1198
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1196
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs
|
|
1199
1197
|
var _UrlString, UrlString;
|
|
1200
1198
|
var init_UrlString = __esm({
|
|
1201
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1199
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs"() {
|
|
1202
1200
|
"use strict";
|
|
1203
1201
|
init_ClientConfigurationError();
|
|
1204
1202
|
init_StringUtils();
|
|
@@ -1341,14 +1339,14 @@ var init_UrlString = __esm({
|
|
|
1341
1339
|
}
|
|
1342
1340
|
});
|
|
1343
1341
|
|
|
1344
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1342
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs
|
|
1345
1343
|
function getAliasesFromStaticSources(staticAuthorityOptions, logger) {
|
|
1346
|
-
var
|
|
1344
|
+
var _a2;
|
|
1347
1345
|
let staticAliases;
|
|
1348
1346
|
const canonicalAuthority = staticAuthorityOptions.canonicalAuthority;
|
|
1349
1347
|
if (canonicalAuthority) {
|
|
1350
1348
|
const authorityHost = new UrlString(canonicalAuthority).getUrlComponents().HostNameAndPort;
|
|
1351
|
-
staticAliases = getAliasesFromMetadata(authorityHost, (
|
|
1349
|
+
staticAliases = getAliasesFromMetadata(authorityHost, (_a2 = staticAuthorityOptions.cloudDiscoveryMetadata) == null ? void 0 : _a2.metadata, AuthorityMetadataSource.CONFIG, logger) || getAliasesFromMetadata(authorityHost, InstanceDiscoveryMetadata.metadata, AuthorityMetadataSource.HARDCODED_VALUES, logger) || staticAuthorityOptions.knownAuthorities;
|
|
1352
1350
|
}
|
|
1353
1351
|
return staticAliases || [];
|
|
1354
1352
|
}
|
|
@@ -1380,7 +1378,7 @@ function getCloudDiscoveryMetadataFromNetworkResponse(response, authorityHost) {
|
|
|
1380
1378
|
}
|
|
1381
1379
|
var rawMetdataJSON, EndpointMetadata, InstanceDiscoveryMetadata, InstanceDiscoveryMetadataAliases;
|
|
1382
1380
|
var init_AuthorityMetadata = __esm({
|
|
1383
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1381
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs"() {
|
|
1384
1382
|
"use strict";
|
|
1385
1383
|
init_UrlString();
|
|
1386
1384
|
init_Constants();
|
|
@@ -1465,10 +1463,10 @@ var init_AuthorityMetadata = __esm({
|
|
|
1465
1463
|
}
|
|
1466
1464
|
});
|
|
1467
1465
|
|
|
1468
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1466
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs
|
|
1469
1467
|
var ProtocolMode;
|
|
1470
1468
|
var init_ProtocolMode = __esm({
|
|
1471
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1469
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs"() {
|
|
1472
1470
|
"use strict";
|
|
1473
1471
|
ProtocolMode = {
|
|
1474
1472
|
AAD: "AAD",
|
|
@@ -1477,10 +1475,10 @@ var init_ProtocolMode = __esm({
|
|
|
1477
1475
|
}
|
|
1478
1476
|
});
|
|
1479
1477
|
|
|
1480
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1478
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs
|
|
1481
1479
|
var AzureCloudInstance;
|
|
1482
1480
|
var init_AuthorityOptions = __esm({
|
|
1483
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1481
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs"() {
|
|
1484
1482
|
"use strict";
|
|
1485
1483
|
AzureCloudInstance = {
|
|
1486
1484
|
// AzureCloudInstance is not specified.
|
|
@@ -1499,32 +1497,32 @@ var init_AuthorityOptions = __esm({
|
|
|
1499
1497
|
}
|
|
1500
1498
|
});
|
|
1501
1499
|
|
|
1502
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1500
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs
|
|
1503
1501
|
function isCloudInstanceDiscoveryResponse(response) {
|
|
1504
1502
|
return response.hasOwnProperty("tenant_discovery_endpoint") && response.hasOwnProperty("metadata");
|
|
1505
1503
|
}
|
|
1506
1504
|
var init_CloudInstanceDiscoveryResponse = __esm({
|
|
1507
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1505
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs"() {
|
|
1508
1506
|
"use strict";
|
|
1509
1507
|
__name(isCloudInstanceDiscoveryResponse, "isCloudInstanceDiscoveryResponse");
|
|
1510
1508
|
}
|
|
1511
1509
|
});
|
|
1512
1510
|
|
|
1513
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1511
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs
|
|
1514
1512
|
function isCloudInstanceDiscoveryErrorResponse(response) {
|
|
1515
1513
|
return response.hasOwnProperty("error") && response.hasOwnProperty("error_description");
|
|
1516
1514
|
}
|
|
1517
1515
|
var init_CloudInstanceDiscoveryErrorResponse = __esm({
|
|
1518
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1516
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs"() {
|
|
1519
1517
|
"use strict";
|
|
1520
1518
|
__name(isCloudInstanceDiscoveryErrorResponse, "isCloudInstanceDiscoveryErrorResponse");
|
|
1521
1519
|
}
|
|
1522
1520
|
});
|
|
1523
1521
|
|
|
1524
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1522
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs
|
|
1525
1523
|
var PerformanceEvents, PerformanceEventAbbreviations;
|
|
1526
1524
|
var init_PerformanceEvent = __esm({
|
|
1527
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1525
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs"() {
|
|
1528
1526
|
"use strict";
|
|
1529
1527
|
PerformanceEvents = {
|
|
1530
1528
|
/**
|
|
@@ -1974,10 +1972,10 @@ var init_PerformanceEvent = __esm({
|
|
|
1974
1972
|
}
|
|
1975
1973
|
});
|
|
1976
1974
|
|
|
1977
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1975
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs
|
|
1978
1976
|
var invoke, invokeAsync;
|
|
1979
1977
|
var init_FunctionWrappers = __esm({
|
|
1980
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1978
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs"() {
|
|
1981
1979
|
"use strict";
|
|
1982
1980
|
invoke = /* @__PURE__ */ __name((callback, eventName, logger, telemetryClient, correlationId) => {
|
|
1983
1981
|
return (...args) => {
|
|
@@ -2040,10 +2038,10 @@ var init_FunctionWrappers = __esm({
|
|
|
2040
2038
|
}
|
|
2041
2039
|
});
|
|
2042
2040
|
|
|
2043
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2041
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs
|
|
2044
2042
|
var _RegionDiscovery, RegionDiscovery;
|
|
2045
2043
|
var init_RegionDiscovery = __esm({
|
|
2046
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2044
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs"() {
|
|
2047
2045
|
"use strict";
|
|
2048
2046
|
init_Constants();
|
|
2049
2047
|
init_PerformanceEvent();
|
|
@@ -2061,8 +2059,8 @@ var init_RegionDiscovery = __esm({
|
|
|
2061
2059
|
* @returns Promise<string | null>
|
|
2062
2060
|
*/
|
|
2063
2061
|
async detectRegion(environmentRegion, regionDiscoveryMetadata) {
|
|
2064
|
-
var
|
|
2065
|
-
(
|
|
2062
|
+
var _a2;
|
|
2063
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RegionDiscoveryDetectRegion, this.correlationId);
|
|
2066
2064
|
let autodetectedRegionName = environmentRegion;
|
|
2067
2065
|
if (!autodetectedRegionName) {
|
|
2068
2066
|
const options = _RegionDiscovery.IMDS_OPTIONS;
|
|
@@ -2103,8 +2101,8 @@ var init_RegionDiscovery = __esm({
|
|
|
2103
2101
|
* @returns Promise<NetworkResponse<string>>
|
|
2104
2102
|
*/
|
|
2105
2103
|
async getRegionFromIMDS(version3, options) {
|
|
2106
|
-
var
|
|
2107
|
-
(
|
|
2104
|
+
var _a2;
|
|
2105
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RegionDiscoveryGetRegionFromIMDS, this.correlationId);
|
|
2108
2106
|
return this.networkInterface.sendGetRequestAsync(`${Constants.IMDS_ENDPOINT}?api-version=${version3}&format=text`, options, Constants.IMDS_TIMEOUT);
|
|
2109
2107
|
}
|
|
2110
2108
|
/**
|
|
@@ -2113,8 +2111,8 @@ var init_RegionDiscovery = __esm({
|
|
|
2113
2111
|
* @returns Promise<string | null>
|
|
2114
2112
|
*/
|
|
2115
2113
|
async getCurrentVersion(options) {
|
|
2116
|
-
var
|
|
2117
|
-
(
|
|
2114
|
+
var _a2;
|
|
2115
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RegionDiscoveryGetCurrentVersion, this.correlationId);
|
|
2118
2116
|
try {
|
|
2119
2117
|
const response = await this.networkInterface.sendGetRequestAsync(`${Constants.IMDS_ENDPOINT}?format=json`, options);
|
|
2120
2118
|
if (response.status === ResponseCodes.httpBadRequest && response.body && response.body["newest-versions"] && response.body["newest-versions"].length > 0) {
|
|
@@ -2136,7 +2134,7 @@ var init_RegionDiscovery = __esm({
|
|
|
2136
2134
|
}
|
|
2137
2135
|
});
|
|
2138
2136
|
|
|
2139
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2137
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs
|
|
2140
2138
|
var TimeUtils_exports = {};
|
|
2141
2139
|
__export(TimeUtils_exports, {
|
|
2142
2140
|
delay: () => delay,
|
|
@@ -2160,7 +2158,7 @@ function delay(t, value) {
|
|
|
2160
2158
|
return new Promise((resolve) => setTimeout(() => resolve(value), t));
|
|
2161
2159
|
}
|
|
2162
2160
|
var init_TimeUtils = __esm({
|
|
2163
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2161
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs"() {
|
|
2164
2162
|
"use strict";
|
|
2165
2163
|
__name(nowSeconds, "nowSeconds");
|
|
2166
2164
|
__name(isTokenExpired, "isTokenExpired");
|
|
@@ -2169,7 +2167,7 @@ var init_TimeUtils = __esm({
|
|
|
2169
2167
|
}
|
|
2170
2168
|
});
|
|
2171
2169
|
|
|
2172
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2170
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs
|
|
2173
2171
|
var CacheHelpers_exports = {};
|
|
2174
2172
|
__export(CacheHelpers_exports, {
|
|
2175
2173
|
createAccessTokenEntity: () => createAccessTokenEntity,
|
|
@@ -2212,7 +2210,7 @@ function createIdTokenEntity(homeAccountId, environment, idToken, clientId, tena
|
|
|
2212
2210
|
return idTokenEntity;
|
|
2213
2211
|
}
|
|
2214
2212
|
function createAccessTokenEntity(homeAccountId, environment, accessToken, clientId, tenantId, scopes, expiresOn, extExpiresOn, base64Decode, refreshOn, tokenType, userAssertionHash, keyId, requestedClaims, requestedClaimsHash) {
|
|
2215
|
-
var
|
|
2213
|
+
var _a2, _b2;
|
|
2216
2214
|
const atEntity = {
|
|
2217
2215
|
homeAccountId,
|
|
2218
2216
|
credentialType: CredentialType.ACCESS_TOKEN,
|
|
@@ -2236,12 +2234,12 @@ function createAccessTokenEntity(homeAccountId, environment, accessToken, client
|
|
|
2236
2234
|
atEntity.requestedClaims = requestedClaims;
|
|
2237
2235
|
atEntity.requestedClaimsHash = requestedClaimsHash;
|
|
2238
2236
|
}
|
|
2239
|
-
if (((
|
|
2237
|
+
if (((_a2 = atEntity.tokenType) == null ? void 0 : _a2.toLowerCase()) !== AuthenticationScheme.BEARER.toLowerCase()) {
|
|
2240
2238
|
atEntity.credentialType = CredentialType.ACCESS_TOKEN_WITH_AUTH_SCHEME;
|
|
2241
2239
|
switch (atEntity.tokenType) {
|
|
2242
2240
|
case AuthenticationScheme.POP:
|
|
2243
2241
|
const tokenClaims = extractTokenClaims(accessToken, base64Decode);
|
|
2244
|
-
if (!((
|
|
2242
|
+
if (!((_b2 = tokenClaims == null ? void 0 : tokenClaims.cnf) == null ? void 0 : _b2.kid)) {
|
|
2245
2243
|
throw createClientAuthError(tokenClaimsCnfRequiredForSignedJwt);
|
|
2246
2244
|
}
|
|
2247
2245
|
atEntity.keyId = tokenClaims.cnf.kid;
|
|
@@ -2377,7 +2375,7 @@ function isAuthorityMetadataExpired(metadata) {
|
|
|
2377
2375
|
return metadata.expiresAt <= nowSeconds();
|
|
2378
2376
|
}
|
|
2379
2377
|
var init_CacheHelpers = __esm({
|
|
2380
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2378
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs"() {
|
|
2381
2379
|
"use strict";
|
|
2382
2380
|
init_AuthToken();
|
|
2383
2381
|
init_ClientAuthError();
|
|
@@ -2409,12 +2407,12 @@ var init_CacheHelpers = __esm({
|
|
|
2409
2407
|
}
|
|
2410
2408
|
});
|
|
2411
2409
|
|
|
2412
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2410
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs
|
|
2413
2411
|
function getTenantFromAuthorityString(authority) {
|
|
2414
|
-
var
|
|
2412
|
+
var _a2;
|
|
2415
2413
|
const authorityUrl = new UrlString(authority);
|
|
2416
2414
|
const authorityUrlComponents = authorityUrl.getUrlComponents();
|
|
2417
|
-
const tenantId = (
|
|
2415
|
+
const tenantId = (_a2 = authorityUrlComponents.PathSegments.slice(-1)[0]) == null ? void 0 : _a2.toLowerCase();
|
|
2418
2416
|
switch (tenantId) {
|
|
2419
2417
|
case AADAuthorityConstants.COMMON:
|
|
2420
2418
|
case AADAuthorityConstants.ORGANIZATIONS:
|
|
@@ -2445,7 +2443,7 @@ function buildStaticAuthorityOptions(authOptions) {
|
|
|
2445
2443
|
}
|
|
2446
2444
|
var _Authority, Authority;
|
|
2447
2445
|
var init_Authority = __esm({
|
|
2448
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2446
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs"() {
|
|
2449
2447
|
"use strict";
|
|
2450
2448
|
init_AuthorityType();
|
|
2451
2449
|
init_OpenIdConfigResponse();
|
|
@@ -2675,8 +2673,8 @@ var init_Authority = __esm({
|
|
|
2675
2673
|
* and the /authorize, /token and logout endpoints.
|
|
2676
2674
|
*/
|
|
2677
2675
|
async resolveEndpointsAsync() {
|
|
2678
|
-
var
|
|
2679
|
-
(
|
|
2676
|
+
var _a2, _b2;
|
|
2677
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityResolveEndpointsAsync, this.correlationId);
|
|
2680
2678
|
const metadataEntity = this.getCurrentMetadataEntity();
|
|
2681
2679
|
const cloudDiscoverySource = await invokeAsync(this.updateCloudDiscoveryMetadata.bind(this), PerformanceEvents.AuthorityUpdateCloudDiscoveryMetadata, this.logger, this.performanceClient, this.correlationId)(metadataEntity);
|
|
2682
2680
|
this.canonicalAuthority = this.canonicalAuthority.replace(this.hostnameAndPort, metadataEntity.preferred_network);
|
|
@@ -2684,7 +2682,7 @@ var init_Authority = __esm({
|
|
|
2684
2682
|
this.updateCachedMetadata(metadataEntity, cloudDiscoverySource, {
|
|
2685
2683
|
source: endpointSource
|
|
2686
2684
|
});
|
|
2687
|
-
(
|
|
2685
|
+
(_b2 = this.performanceClient) == null ? void 0 : _b2.addFields({
|
|
2688
2686
|
cloudDiscoverySource,
|
|
2689
2687
|
authorityEndpointSource: endpointSource
|
|
2690
2688
|
}, this.correlationId);
|
|
@@ -2735,12 +2733,12 @@ var init_Authority = __esm({
|
|
|
2735
2733
|
* @param metadataEntity
|
|
2736
2734
|
*/
|
|
2737
2735
|
async updateEndpointMetadata(metadataEntity) {
|
|
2738
|
-
var
|
|
2739
|
-
(
|
|
2736
|
+
var _a2, _b2, _c;
|
|
2737
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityUpdateEndpointMetadata, this.correlationId);
|
|
2740
2738
|
const localMetadata = this.updateEndpointMetadataFromLocalSources(metadataEntity);
|
|
2741
2739
|
if (localMetadata) {
|
|
2742
2740
|
if (localMetadata.source === AuthorityMetadataSource.HARDCODED_VALUES) {
|
|
2743
|
-
if ((
|
|
2741
|
+
if ((_b2 = this.authorityOptions.azureRegionConfiguration) == null ? void 0 : _b2.azureRegion) {
|
|
2744
2742
|
if (localMetadata.metadata) {
|
|
2745
2743
|
const hardcodedMetadata = await invokeAsync(this.updateMetadataWithRegionalInformation.bind(this), PerformanceEvents.AuthorityUpdateMetadataWithRegionalInformation, this.logger, this.performanceClient, this.correlationId)(localMetadata.metadata);
|
|
2746
2744
|
updateAuthorityEndpointMetadata(metadataEntity, hardcodedMetadata, false);
|
|
@@ -2831,8 +2829,8 @@ var init_Authority = __esm({
|
|
|
2831
2829
|
* @param hasHardcodedMetadata boolean
|
|
2832
2830
|
*/
|
|
2833
2831
|
async getEndpointMetadataFromNetwork() {
|
|
2834
|
-
var
|
|
2835
|
-
(
|
|
2832
|
+
var _a2;
|
|
2833
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityGetEndpointMetadataFromNetwork, this.correlationId);
|
|
2836
2834
|
const options = {};
|
|
2837
2835
|
const openIdConfigurationEndpoint = this.defaultOpenIdConfigurationEndpoint;
|
|
2838
2836
|
this.logger.verbose(`Authority.getEndpointMetadataFromNetwork: attempting to retrieve OAuth endpoints from ${openIdConfigurationEndpoint}`);
|
|
@@ -2864,9 +2862,9 @@ var init_Authority = __esm({
|
|
|
2864
2862
|
* User selected Azure region will be used if configured.
|
|
2865
2863
|
*/
|
|
2866
2864
|
async updateMetadataWithRegionalInformation(metadata) {
|
|
2867
|
-
var
|
|
2868
|
-
(
|
|
2869
|
-
const userConfiguredAzureRegion = (
|
|
2865
|
+
var _a2, _b2, _c;
|
|
2866
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityUpdateMetadataWithRegionalInformation, this.correlationId);
|
|
2867
|
+
const userConfiguredAzureRegion = (_b2 = this.authorityOptions.azureRegionConfiguration) == null ? void 0 : _b2.azureRegion;
|
|
2870
2868
|
if (userConfiguredAzureRegion) {
|
|
2871
2869
|
if (userConfiguredAzureRegion !== Constants.AZURE_REGION_AUTO_DISCOVER_FLAG) {
|
|
2872
2870
|
this.regionDiscoveryMetadata.region_outcome = RegionDiscoveryOutcomes.CONFIGURED_NO_AUTO_DETECTION;
|
|
@@ -2890,8 +2888,8 @@ var init_Authority = __esm({
|
|
|
2890
2888
|
* @returns AuthorityMetadataSource
|
|
2891
2889
|
*/
|
|
2892
2890
|
async updateCloudDiscoveryMetadata(metadataEntity) {
|
|
2893
|
-
var
|
|
2894
|
-
(
|
|
2891
|
+
var _a2;
|
|
2892
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityUpdateCloudDiscoveryMetadata, this.correlationId);
|
|
2895
2893
|
const localMetadataSource = this.updateCloudDiscoveryMetadataFromLocalSources(metadataEntity);
|
|
2896
2894
|
if (localMetadataSource) {
|
|
2897
2895
|
return localMetadataSource;
|
|
@@ -2973,8 +2971,8 @@ var init_Authority = __esm({
|
|
|
2973
2971
|
* @param hasHardcodedMetadata boolean
|
|
2974
2972
|
*/
|
|
2975
2973
|
async getCloudDiscoveryMetadataFromNetwork() {
|
|
2976
|
-
var
|
|
2977
|
-
(
|
|
2974
|
+
var _a2;
|
|
2975
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityGetCloudDiscoveryMetadataFromNetwork, this.correlationId);
|
|
2978
2976
|
const instanceDiscoveryEndpoint = `${Constants.AAD_INSTANCE_DISCOVERY_ENDPT}${this.canonicalAuthority}oauth2/v2.0/authorize`;
|
|
2979
2977
|
const options = {};
|
|
2980
2978
|
let match = null;
|
|
@@ -3163,7 +3161,7 @@ Error Description: ${typedError.message}`);
|
|
|
3163
3161
|
}
|
|
3164
3162
|
});
|
|
3165
3163
|
|
|
3166
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3164
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs
|
|
3167
3165
|
var AuthorityFactory_exports = {};
|
|
3168
3166
|
__export(AuthorityFactory_exports, {
|
|
3169
3167
|
createDiscoveredInstance: () => createDiscoveredInstance
|
|
@@ -3180,7 +3178,7 @@ async function createDiscoveredInstance(authorityUri, networkClient, cacheManage
|
|
|
3180
3178
|
}
|
|
3181
3179
|
}
|
|
3182
3180
|
var init_AuthorityFactory = __esm({
|
|
3183
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3181
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs"() {
|
|
3184
3182
|
"use strict";
|
|
3185
3183
|
init_Authority();
|
|
3186
3184
|
init_ClientAuthError();
|
|
@@ -3191,7 +3189,7 @@ var init_AuthorityFactory = __esm({
|
|
|
3191
3189
|
}
|
|
3192
3190
|
});
|
|
3193
3191
|
|
|
3194
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3192
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs
|
|
3195
3193
|
async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
|
|
3196
3194
|
if (typeof clientAssertion === "string") {
|
|
3197
3195
|
return clientAssertion;
|
|
@@ -3204,13 +3202,13 @@ async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
|
|
|
3204
3202
|
}
|
|
3205
3203
|
}
|
|
3206
3204
|
var init_ClientAssertionUtils = __esm({
|
|
3207
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3205
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs"() {
|
|
3208
3206
|
"use strict";
|
|
3209
3207
|
__name(getClientAssertion, "getClientAssertion");
|
|
3210
3208
|
}
|
|
3211
3209
|
});
|
|
3212
3210
|
|
|
3213
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3211
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs
|
|
3214
3212
|
var AADServerParamKeys_exports = {};
|
|
3215
3213
|
__export(AADServerParamKeys_exports, {
|
|
3216
3214
|
ACCESS_TOKEN: () => ACCESS_TOKEN,
|
|
@@ -3268,7 +3266,7 @@ __export(AADServerParamKeys_exports, {
|
|
|
3268
3266
|
});
|
|
3269
3267
|
var CLIENT_ID, REDIRECT_URI, RESPONSE_TYPE, RESPONSE_MODE, GRANT_TYPE, CLAIMS, SCOPE, ERROR, ERROR_DESCRIPTION, ACCESS_TOKEN, ID_TOKEN, REFRESH_TOKEN, EXPIRES_IN, REFRESH_TOKEN_EXPIRES_IN, STATE, NONCE, PROMPT, SESSION_STATE, CLIENT_INFO2, CODE, CODE_CHALLENGE, CODE_CHALLENGE_METHOD, CODE_VERIFIER, CLIENT_REQUEST_ID, X_CLIENT_SKU, X_CLIENT_VER, X_CLIENT_OS, X_CLIENT_CPU, X_CLIENT_CURR_TELEM, X_CLIENT_LAST_TELEM, X_MS_LIB_CAPABILITY, X_APP_NAME, X_APP_VER, POST_LOGOUT_URI, ID_TOKEN_HINT, DEVICE_CODE, CLIENT_SECRET, CLIENT_ASSERTION, CLIENT_ASSERTION_TYPE, TOKEN_TYPE, REQ_CNF, OBO_ASSERTION, REQUESTED_TOKEN_USE, ON_BEHALF_OF, FOCI, CCS_HEADER, RETURN_SPA_CODE, NATIVE_BROKER, LOGOUT_HINT, SID, LOGIN_HINT, DOMAIN_HINT;
|
|
3270
3268
|
var init_AADServerParamKeys = __esm({
|
|
3271
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3269
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs"() {
|
|
3272
3270
|
"use strict";
|
|
3273
3271
|
CLIENT_ID = "client_id";
|
|
3274
3272
|
REDIRECT_URI = "redirect_uri";
|
|
@@ -3325,23 +3323,29 @@ var init_AADServerParamKeys = __esm({
|
|
|
3325
3323
|
}
|
|
3326
3324
|
});
|
|
3327
3325
|
|
|
3328
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3326
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs
|
|
3329
3327
|
var DEFAULT_CRYPTO_IMPLEMENTATION;
|
|
3330
3328
|
var init_ICrypto = __esm({
|
|
3331
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3329
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs"() {
|
|
3332
3330
|
"use strict";
|
|
3333
3331
|
init_ClientAuthError();
|
|
3334
3332
|
init_ClientAuthErrorCodes();
|
|
3335
3333
|
DEFAULT_CRYPTO_IMPLEMENTATION = {
|
|
3336
|
-
createNewGuid: () => {
|
|
3334
|
+
createNewGuid: /* @__PURE__ */ __name(() => {
|
|
3337
3335
|
throw createClientAuthError(methodNotImplemented);
|
|
3338
|
-
},
|
|
3339
|
-
base64Decode: () => {
|
|
3336
|
+
}, "createNewGuid"),
|
|
3337
|
+
base64Decode: /* @__PURE__ */ __name(() => {
|
|
3340
3338
|
throw createClientAuthError(methodNotImplemented);
|
|
3341
|
-
},
|
|
3342
|
-
base64Encode: () => {
|
|
3339
|
+
}, "base64Decode"),
|
|
3340
|
+
base64Encode: /* @__PURE__ */ __name(() => {
|
|
3343
3341
|
throw createClientAuthError(methodNotImplemented);
|
|
3344
|
-
},
|
|
3342
|
+
}, "base64Encode"),
|
|
3343
|
+
base64UrlEncode: /* @__PURE__ */ __name(() => {
|
|
3344
|
+
throw createClientAuthError(methodNotImplemented);
|
|
3345
|
+
}, "base64UrlEncode"),
|
|
3346
|
+
encodeKid: /* @__PURE__ */ __name(() => {
|
|
3347
|
+
throw createClientAuthError(methodNotImplemented);
|
|
3348
|
+
}, "encodeKid"),
|
|
3345
3349
|
async getPublicKeyThumbprint() {
|
|
3346
3350
|
throw createClientAuthError(methodNotImplemented);
|
|
3347
3351
|
},
|
|
@@ -3361,10 +3365,10 @@ var init_ICrypto = __esm({
|
|
|
3361
3365
|
}
|
|
3362
3366
|
});
|
|
3363
3367
|
|
|
3364
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3368
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs
|
|
3365
3369
|
var LogLevel, _Logger, Logger;
|
|
3366
3370
|
var init_Logger = __esm({
|
|
3367
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3371
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs"() {
|
|
3368
3372
|
"use strict";
|
|
3369
3373
|
init_Constants();
|
|
3370
3374
|
(function(LogLevel2) {
|
|
@@ -3390,8 +3394,8 @@ var init_Logger = __esm({
|
|
|
3390
3394
|
}
|
|
3391
3395
|
static createDefaultLoggerOptions() {
|
|
3392
3396
|
return {
|
|
3393
|
-
loggerCallback: () => {
|
|
3394
|
-
},
|
|
3397
|
+
loggerCallback: /* @__PURE__ */ __name(() => {
|
|
3398
|
+
}, "loggerCallback"),
|
|
3395
3399
|
piiLoggingEnabled: false,
|
|
3396
3400
|
logLevel: LogLevel.Info
|
|
3397
3401
|
};
|
|
@@ -3539,20 +3543,20 @@ var init_Logger = __esm({
|
|
|
3539
3543
|
}
|
|
3540
3544
|
});
|
|
3541
3545
|
|
|
3542
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3546
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs
|
|
3543
3547
|
var name, version;
|
|
3544
3548
|
var init_packageMetadata = __esm({
|
|
3545
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3549
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs"() {
|
|
3546
3550
|
"use strict";
|
|
3547
3551
|
name = "@azure/msal-common";
|
|
3548
|
-
version = "14.
|
|
3552
|
+
version = "14.12.0";
|
|
3549
3553
|
}
|
|
3550
3554
|
});
|
|
3551
3555
|
|
|
3552
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3556
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs
|
|
3553
3557
|
var _ScopeSet, ScopeSet;
|
|
3554
3558
|
var init_ScopeSet = __esm({
|
|
3555
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3559
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs"() {
|
|
3556
3560
|
"use strict";
|
|
3557
3561
|
init_ClientConfigurationError();
|
|
3558
3562
|
init_StringUtils();
|
|
@@ -3739,7 +3743,7 @@ var init_ScopeSet = __esm({
|
|
|
3739
3743
|
}
|
|
3740
3744
|
});
|
|
3741
3745
|
|
|
3742
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3746
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs
|
|
3743
3747
|
function buildClientInfo(rawClientInfo, base64Decode) {
|
|
3744
3748
|
if (!rawClientInfo) {
|
|
3745
3749
|
throw createClientAuthError(clientInfoEmptyError);
|
|
@@ -3762,7 +3766,7 @@ function buildClientInfoFromHomeAccountId(homeAccountId) {
|
|
|
3762
3766
|
};
|
|
3763
3767
|
}
|
|
3764
3768
|
var init_ClientInfo = __esm({
|
|
3765
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3769
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs"() {
|
|
3766
3770
|
"use strict";
|
|
3767
3771
|
init_ClientAuthError();
|
|
3768
3772
|
init_Constants();
|
|
@@ -3772,7 +3776,7 @@ var init_ClientInfo = __esm({
|
|
|
3772
3776
|
}
|
|
3773
3777
|
});
|
|
3774
3778
|
|
|
3775
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3779
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs
|
|
3776
3780
|
function tenantIdMatchesHomeTenant(tenantId, homeAccountId) {
|
|
3777
3781
|
return !!tenantId && !!homeAccountId && tenantId === homeAccountId.split(".")[1];
|
|
3778
3782
|
}
|
|
@@ -3805,7 +3809,7 @@ function updateAccountTenantProfileData(baseAccountInfo, tenantProfile, idTokenC
|
|
|
3805
3809
|
return updatedAccountInfo;
|
|
3806
3810
|
}
|
|
3807
3811
|
var init_AccountInfo = __esm({
|
|
3808
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3812
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs"() {
|
|
3809
3813
|
"use strict";
|
|
3810
3814
|
__name(tenantIdMatchesHomeTenant, "tenantIdMatchesHomeTenant");
|
|
3811
3815
|
__name(buildTenantProfileFromIdTokenClaims, "buildTenantProfileFromIdTokenClaims");
|
|
@@ -3813,7 +3817,7 @@ var init_AccountInfo = __esm({
|
|
|
3813
3817
|
}
|
|
3814
3818
|
});
|
|
3815
3819
|
|
|
3816
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3820
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs
|
|
3817
3821
|
function getTenantIdFromIdTokenClaims(idTokenClaims) {
|
|
3818
3822
|
if (idTokenClaims) {
|
|
3819
3823
|
const tenantId = idTokenClaims.tid || idTokenClaims.tfp || idTokenClaims.acr;
|
|
@@ -3822,16 +3826,16 @@ function getTenantIdFromIdTokenClaims(idTokenClaims) {
|
|
|
3822
3826
|
return null;
|
|
3823
3827
|
}
|
|
3824
3828
|
var init_TokenClaims = __esm({
|
|
3825
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3829
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs"() {
|
|
3826
3830
|
"use strict";
|
|
3827
3831
|
__name(getTenantIdFromIdTokenClaims, "getTenantIdFromIdTokenClaims");
|
|
3828
3832
|
}
|
|
3829
3833
|
});
|
|
3830
3834
|
|
|
3831
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3835
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs
|
|
3832
3836
|
var _AccountEntity, AccountEntity;
|
|
3833
3837
|
var init_AccountEntity = __esm({
|
|
3834
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3838
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs"() {
|
|
3835
3839
|
"use strict";
|
|
3836
3840
|
init_Constants();
|
|
3837
3841
|
init_ClientInfo();
|
|
@@ -3952,7 +3956,7 @@ var init_AccountEntity = __esm({
|
|
|
3952
3956
|
* @returns
|
|
3953
3957
|
*/
|
|
3954
3958
|
static createFromAccountInfo(accountInfo, cloudGraphHostName, msGraphHost) {
|
|
3955
|
-
var
|
|
3959
|
+
var _a2;
|
|
3956
3960
|
const account = new _AccountEntity();
|
|
3957
3961
|
account.authorityType = accountInfo.authorityType || CacheAccountType.GENERIC_ACCOUNT_TYPE;
|
|
3958
3962
|
account.homeAccountId = accountInfo.homeAccountId;
|
|
@@ -3964,7 +3968,7 @@ var init_AccountEntity = __esm({
|
|
|
3964
3968
|
account.name = accountInfo.name;
|
|
3965
3969
|
account.cloudGraphHostName = cloudGraphHostName;
|
|
3966
3970
|
account.msGraphHost = msGraphHost;
|
|
3967
|
-
account.tenantProfiles = Array.from(((
|
|
3971
|
+
account.tenantProfiles = Array.from(((_a2 = accountInfo.tenantProfiles) == null ? void 0 : _a2.values()) || []);
|
|
3968
3972
|
return account;
|
|
3969
3973
|
}
|
|
3970
3974
|
/**
|
|
@@ -4021,20 +4025,20 @@ var init_AccountEntity = __esm({
|
|
|
4021
4025
|
}
|
|
4022
4026
|
});
|
|
4023
4027
|
|
|
4024
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4028
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs
|
|
4025
4029
|
var cacheQuotaExceededErrorCode, cacheUnknownErrorCode;
|
|
4026
4030
|
var init_CacheErrorCodes = __esm({
|
|
4027
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4031
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs"() {
|
|
4028
4032
|
"use strict";
|
|
4029
4033
|
cacheQuotaExceededErrorCode = "cache_quota_exceeded";
|
|
4030
4034
|
cacheUnknownErrorCode = "cache_error_unknown";
|
|
4031
4035
|
}
|
|
4032
4036
|
});
|
|
4033
4037
|
|
|
4034
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4038
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs
|
|
4035
4039
|
var CacheErrorMessages, _CacheError, CacheError;
|
|
4036
4040
|
var init_CacheError = __esm({
|
|
4037
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4041
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs"() {
|
|
4038
4042
|
"use strict";
|
|
4039
4043
|
init_CacheErrorCodes();
|
|
4040
4044
|
CacheErrorMessages = {
|
|
@@ -4056,10 +4060,10 @@ var init_CacheError = __esm({
|
|
|
4056
4060
|
}
|
|
4057
4061
|
});
|
|
4058
4062
|
|
|
4059
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4063
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs
|
|
4060
4064
|
var _CacheManager, CacheManager, _DefaultStorageClass, DefaultStorageClass;
|
|
4061
4065
|
var init_CacheManager = __esm({
|
|
4062
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4066
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs"() {
|
|
4063
4067
|
"use strict";
|
|
4064
4068
|
init_Constants();
|
|
4065
4069
|
init_CacheHelpers();
|
|
@@ -4212,7 +4216,7 @@ var init_CacheManager = __esm({
|
|
|
4212
4216
|
* @param correlationId {?string} correlation id
|
|
4213
4217
|
*/
|
|
4214
4218
|
async saveCacheRecord(cacheRecord, storeInCache, correlationId) {
|
|
4215
|
-
var
|
|
4219
|
+
var _a2, _b2, _c, _d;
|
|
4216
4220
|
if (!cacheRecord) {
|
|
4217
4221
|
throw createClientAuthError(invalidCacheRecord);
|
|
4218
4222
|
}
|
|
@@ -4233,9 +4237,9 @@ var init_CacheManager = __esm({
|
|
|
4233
4237
|
this.setAppMetadata(cacheRecord.appMetadata);
|
|
4234
4238
|
}
|
|
4235
4239
|
} catch (e) {
|
|
4236
|
-
(
|
|
4240
|
+
(_a2 = this.commonLogger) == null ? void 0 : _a2.error(`CacheManager.saveCacheRecord: failed`);
|
|
4237
4241
|
if (e instanceof Error) {
|
|
4238
|
-
(
|
|
4242
|
+
(_b2 = this.commonLogger) == null ? void 0 : _b2.errorPii(`CacheManager.saveCacheRecord: ${e.message}`, correlationId);
|
|
4239
4243
|
if (e.name === "QuotaExceededError" || e.name === "NS_ERROR_DOM_QUOTA_REACHED" || e.message.includes("exceeded the quota")) {
|
|
4240
4244
|
(_c = this.commonLogger) == null ? void 0 : _c.error(`CacheManager.saveCacheRecord: exceeded storage quota`, correlationId);
|
|
4241
4245
|
throw new CacheError(cacheQuotaExceededErrorCode);
|
|
@@ -4289,7 +4293,7 @@ var init_CacheManager = __esm({
|
|
|
4289
4293
|
const allAccountKeys = this.getAccountKeys();
|
|
4290
4294
|
const matchingAccounts = [];
|
|
4291
4295
|
allAccountKeys.forEach((cacheKey) => {
|
|
4292
|
-
var
|
|
4296
|
+
var _a2;
|
|
4293
4297
|
if (!this.isAccountKey(cacheKey, accountFilter.homeAccountId)) {
|
|
4294
4298
|
return;
|
|
4295
4299
|
}
|
|
@@ -4319,7 +4323,7 @@ var init_CacheManager = __esm({
|
|
|
4319
4323
|
localAccountId: accountFilter == null ? void 0 : accountFilter.localAccountId,
|
|
4320
4324
|
name: accountFilter == null ? void 0 : accountFilter.name
|
|
4321
4325
|
};
|
|
4322
|
-
const matchingTenantProfiles = (
|
|
4326
|
+
const matchingTenantProfiles = (_a2 = entity.tenantProfiles) == null ? void 0 : _a2.filter((tenantProfile) => {
|
|
4323
4327
|
return this.tenantProfileMatchesFilter(tenantProfile, tenantProfileFilter);
|
|
4324
4328
|
});
|
|
4325
4329
|
if (matchingTenantProfiles && matchingTenantProfiles.length === 0) {
|
|
@@ -4523,9 +4527,9 @@ var init_CacheManager = __esm({
|
|
|
4523
4527
|
* @returns
|
|
4524
4528
|
*/
|
|
4525
4529
|
updateOutdatedCachedAccount(accountKey, accountEntity, logger) {
|
|
4526
|
-
var
|
|
4530
|
+
var _a2;
|
|
4527
4531
|
if (accountEntity && accountEntity.isSingleTenant()) {
|
|
4528
|
-
(
|
|
4532
|
+
(_a2 = this.commonLogger) == null ? void 0 : _a2.verbose("updateOutdatedCachedAccount: Found a single-tenant (outdated) account entity in the cache, migrating to multi-tenant account entity");
|
|
4529
4533
|
const matchingAccountKeys = this.getAccountKeys().filter((key) => {
|
|
4530
4534
|
return key.startsWith(accountEntity.homeAccountId);
|
|
4531
4535
|
});
|
|
@@ -4927,8 +4931,8 @@ var init_CacheManager = __esm({
|
|
|
4927
4931
|
* @returns true if the downcased name properties are present and match in the filter and the entity
|
|
4928
4932
|
*/
|
|
4929
4933
|
matchName(claims, name3) {
|
|
4930
|
-
var
|
|
4931
|
-
return !!(name3.toLowerCase() === ((
|
|
4934
|
+
var _a2;
|
|
4935
|
+
return !!(name3.toLowerCase() === ((_a2 = claims.name) == null ? void 0 : _a2.toLowerCase()));
|
|
4932
4936
|
}
|
|
4933
4937
|
/**
|
|
4934
4938
|
* helper to match usernames
|
|
@@ -4995,8 +4999,8 @@ var init_CacheManager = __esm({
|
|
|
4995
4999
|
* @param realm
|
|
4996
5000
|
*/
|
|
4997
5001
|
matchRealm(entity, realm) {
|
|
4998
|
-
var
|
|
4999
|
-
return !!(((
|
|
5002
|
+
var _a2;
|
|
5003
|
+
return !!(((_a2 = entity.realm) == null ? void 0 : _a2.toLowerCase()) === realm.toLowerCase());
|
|
5000
5004
|
}
|
|
5001
5005
|
/**
|
|
5002
5006
|
* helper to match nativeAccountId
|
|
@@ -5064,7 +5068,7 @@ var init_CacheManager = __esm({
|
|
|
5064
5068
|
/**
|
|
5065
5069
|
* Returns true if the credential's keyId matches the one in the request, false otherwise
|
|
5066
5070
|
* @param entity
|
|
5067
|
-
* @param
|
|
5071
|
+
* @param keyId
|
|
5068
5072
|
*/
|
|
5069
5073
|
matchKeyId(entity, keyId) {
|
|
5070
5074
|
return !!(entity.keyId && entity.keyId === keyId);
|
|
@@ -5185,7 +5189,7 @@ var init_CacheManager = __esm({
|
|
|
5185
5189
|
}
|
|
5186
5190
|
});
|
|
5187
5191
|
|
|
5188
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5192
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs
|
|
5189
5193
|
function buildClientConfiguration({ authOptions: userAuthOptions, systemOptions: userSystemOptions, loggerOptions: userLoggerOption, cacheOptions: userCacheOptions, storageInterface: storageImplementation, networkInterface: networkImplementation, cryptoInterface: cryptoImplementation, clientCredentials, libraryInfo, telemetry, serverTelemetryManager, persistencePlugin, serializableCache }) {
|
|
5190
5194
|
const loggerOptions = {
|
|
5191
5195
|
...DEFAULT_LOGGER_IMPLEMENTATION,
|
|
@@ -5220,7 +5224,7 @@ function isOidcProtocolMode(config) {
|
|
|
5220
5224
|
}
|
|
5221
5225
|
var DEFAULT_SYSTEM_OPTIONS, DEFAULT_LOGGER_IMPLEMENTATION, DEFAULT_CACHE_OPTIONS, DEFAULT_NETWORK_IMPLEMENTATION, DEFAULT_LIBRARY_INFO, DEFAULT_CLIENT_CREDENTIALS, DEFAULT_AZURE_CLOUD_OPTIONS, DEFAULT_TELEMETRY_OPTIONS;
|
|
5222
5226
|
var init_ClientConfiguration = __esm({
|
|
5223
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5227
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs"() {
|
|
5224
5228
|
"use strict";
|
|
5225
5229
|
init_ICrypto();
|
|
5226
5230
|
init_Logger();
|
|
@@ -5236,8 +5240,8 @@ var init_ClientConfiguration = __esm({
|
|
|
5236
5240
|
preventCorsPreflight: false
|
|
5237
5241
|
};
|
|
5238
5242
|
DEFAULT_LOGGER_IMPLEMENTATION = {
|
|
5239
|
-
loggerCallback: () => {
|
|
5240
|
-
},
|
|
5243
|
+
loggerCallback: /* @__PURE__ */ __name(() => {
|
|
5244
|
+
}, "loggerCallback"),
|
|
5241
5245
|
piiLoggingEnabled: false,
|
|
5242
5246
|
logLevel: LogLevel.Info,
|
|
5243
5247
|
correlationId: Constants.EMPTY_STRING
|
|
@@ -5279,10 +5283,10 @@ var init_ClientConfiguration = __esm({
|
|
|
5279
5283
|
}
|
|
5280
5284
|
});
|
|
5281
5285
|
|
|
5282
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5286
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs
|
|
5283
5287
|
var _ServerError, ServerError;
|
|
5284
5288
|
var init_ServerError = __esm({
|
|
5285
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5289
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs"() {
|
|
5286
5290
|
"use strict";
|
|
5287
5291
|
init_AuthError();
|
|
5288
5292
|
_ServerError = class _ServerError extends AuthError {
|
|
@@ -5298,10 +5302,10 @@ var init_ServerError = __esm({
|
|
|
5298
5302
|
}
|
|
5299
5303
|
});
|
|
5300
5304
|
|
|
5301
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5305
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs
|
|
5302
5306
|
var _ThrottlingUtils, ThrottlingUtils;
|
|
5303
5307
|
var init_ThrottlingUtils = __esm({
|
|
5304
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5308
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs"() {
|
|
5305
5309
|
"use strict";
|
|
5306
5310
|
init_Constants();
|
|
5307
5311
|
init_ServerError();
|
|
@@ -5319,7 +5323,7 @@ var init_ThrottlingUtils = __esm({
|
|
|
5319
5323
|
* @param thumbprint
|
|
5320
5324
|
*/
|
|
5321
5325
|
static preProcess(cacheManager, thumbprint) {
|
|
5322
|
-
var
|
|
5326
|
+
var _a2;
|
|
5323
5327
|
const key = _ThrottlingUtils.generateThrottlingStorageKey(thumbprint);
|
|
5324
5328
|
const value = cacheManager.getThrottlingCache(key);
|
|
5325
5329
|
if (value) {
|
|
@@ -5327,7 +5331,7 @@ var init_ThrottlingUtils = __esm({
|
|
|
5327
5331
|
cacheManager.removeItem(key);
|
|
5328
5332
|
return;
|
|
5329
5333
|
}
|
|
5330
|
-
throw new ServerError(((
|
|
5334
|
+
throw new ServerError(((_a2 = value.errorCodes) == null ? void 0 : _a2.join(" ")) || Constants.EMPTY_STRING, value.errorMessage, value.subError);
|
|
5331
5335
|
}
|
|
5332
5336
|
}
|
|
5333
5337
|
/**
|
|
@@ -5396,10 +5400,10 @@ var init_ThrottlingUtils = __esm({
|
|
|
5396
5400
|
}
|
|
5397
5401
|
});
|
|
5398
5402
|
|
|
5399
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5403
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs
|
|
5400
5404
|
var _NetworkManager, NetworkManager;
|
|
5401
5405
|
var init_NetworkManager = __esm({
|
|
5402
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5406
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs"() {
|
|
5403
5407
|
"use strict";
|
|
5404
5408
|
init_ThrottlingUtils();
|
|
5405
5409
|
init_AuthError();
|
|
@@ -5437,10 +5441,10 @@ var init_NetworkManager = __esm({
|
|
|
5437
5441
|
}
|
|
5438
5442
|
});
|
|
5439
5443
|
|
|
5440
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5444
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs
|
|
5441
5445
|
var CcsCredentialType;
|
|
5442
5446
|
var init_CcsCredential = __esm({
|
|
5443
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5447
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs"() {
|
|
5444
5448
|
"use strict";
|
|
5445
5449
|
CcsCredentialType = {
|
|
5446
5450
|
HOME_ACCOUNT_ID: "home_account_id",
|
|
@@ -5449,10 +5453,10 @@ var init_CcsCredential = __esm({
|
|
|
5449
5453
|
}
|
|
5450
5454
|
});
|
|
5451
5455
|
|
|
5452
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5456
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs
|
|
5453
5457
|
var _RequestValidator, RequestValidator;
|
|
5454
5458
|
var init_RequestValidator = __esm({
|
|
5455
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5459
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs"() {
|
|
5456
5460
|
"use strict";
|
|
5457
5461
|
init_ClientConfigurationError();
|
|
5458
5462
|
init_Constants();
|
|
@@ -5532,10 +5536,10 @@ var init_RequestValidator = __esm({
|
|
|
5532
5536
|
}
|
|
5533
5537
|
});
|
|
5534
5538
|
|
|
5535
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5539
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs
|
|
5536
5540
|
var _RequestParameterBuilder, RequestParameterBuilder;
|
|
5537
5541
|
var init_RequestParameterBuilder = __esm({
|
|
5538
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5542
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs"() {
|
|
5539
5543
|
"use strict";
|
|
5540
5544
|
init_Constants();
|
|
5541
5545
|
init_AADServerParamKeys();
|
|
@@ -5912,10 +5916,10 @@ var init_RequestParameterBuilder = __esm({
|
|
|
5912
5916
|
}
|
|
5913
5917
|
});
|
|
5914
5918
|
|
|
5915
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5919
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs
|
|
5916
5920
|
var _BaseClient, BaseClient;
|
|
5917
5921
|
var init_BaseClient = __esm({
|
|
5918
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5922
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs"() {
|
|
5919
5923
|
"use strict";
|
|
5920
5924
|
init_ClientConfiguration();
|
|
5921
5925
|
init_NetworkManager();
|
|
@@ -5970,13 +5974,13 @@ var init_BaseClient = __esm({
|
|
|
5970
5974
|
* @param thumbprint
|
|
5971
5975
|
*/
|
|
5972
5976
|
async executePostToTokenEndpoint(tokenEndpoint, queryString, headers, thumbprint, correlationId, queuedEvent) {
|
|
5973
|
-
var
|
|
5977
|
+
var _a2, _b2, _c, _d;
|
|
5974
5978
|
if (queuedEvent) {
|
|
5975
|
-
(
|
|
5979
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(queuedEvent, correlationId);
|
|
5976
5980
|
}
|
|
5977
5981
|
const response = await this.networkManager.sendPostRequest(thumbprint, tokenEndpoint, { body: queryString, headers });
|
|
5978
5982
|
(_d = this.performanceClient) == null ? void 0 : _d.addFields({
|
|
5979
|
-
refreshTokenSize: ((
|
|
5983
|
+
refreshTokenSize: ((_b2 = response.body.refresh_token) == null ? void 0 : _b2.length) || 0,
|
|
5980
5984
|
httpVerToken: ((_c = response.headers) == null ? void 0 : _c[HeaderNames.X_MS_HTTP_VERSION]) || ""
|
|
5981
5985
|
}, correlationId);
|
|
5982
5986
|
if (this.config.serverTelemetryManager && response.status < 500 && response.status !== 429) {
|
|
@@ -5989,8 +5993,8 @@ var init_BaseClient = __esm({
|
|
|
5989
5993
|
* @param updatedAuthority
|
|
5990
5994
|
*/
|
|
5991
5995
|
async updateAuthority(cloudInstanceHostname, correlationId) {
|
|
5992
|
-
var
|
|
5993
|
-
(
|
|
5996
|
+
var _a2;
|
|
5997
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.UpdateTokenEndpointAuthority, correlationId);
|
|
5994
5998
|
const cloudInstanceAuthorityUri = `https://${cloudInstanceHostname}/${this.authority.tenant}/`;
|
|
5995
5999
|
const cloudInstanceAuthority = await createDiscoveredInstance(cloudInstanceAuthorityUri, this.networkClient, this.cacheManager, this.authority.options, this.logger, correlationId, this.performanceClient);
|
|
5996
6000
|
this.authority = cloudInstanceAuthority;
|
|
@@ -6012,7 +6016,7 @@ var init_BaseClient = __esm({
|
|
|
6012
6016
|
}
|
|
6013
6017
|
});
|
|
6014
6018
|
|
|
6015
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6019
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs
|
|
6016
6020
|
var InteractionRequiredAuthErrorCodes_exports = {};
|
|
6017
6021
|
__export(InteractionRequiredAuthErrorCodes_exports, {
|
|
6018
6022
|
badToken: () => badToken,
|
|
@@ -6025,7 +6029,7 @@ __export(InteractionRequiredAuthErrorCodes_exports, {
|
|
|
6025
6029
|
});
|
|
6026
6030
|
var noTokensFound, nativeAccountUnavailable, refreshTokenExpired, interactionRequired, consentRequired, loginRequired, badToken;
|
|
6027
6031
|
var init_InteractionRequiredAuthErrorCodes = __esm({
|
|
6028
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6032
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs"() {
|
|
6029
6033
|
"use strict";
|
|
6030
6034
|
noTokensFound = "no_tokens_found";
|
|
6031
6035
|
nativeAccountUnavailable = "native_account_unavailable";
|
|
@@ -6037,7 +6041,7 @@ var init_InteractionRequiredAuthErrorCodes = __esm({
|
|
|
6037
6041
|
}
|
|
6038
6042
|
});
|
|
6039
6043
|
|
|
6040
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6044
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs
|
|
6041
6045
|
function isInteractionRequiredError(errorCode, errorString, subError) {
|
|
6042
6046
|
const isInteractionRequiredErrorCode = !!errorCode && InteractionRequiredServerErrorMessage.indexOf(errorCode) > -1;
|
|
6043
6047
|
const isInteractionRequiredSubError = !!subError && InteractionRequiredAuthSubErrorMessage.indexOf(subError) > -1;
|
|
@@ -6051,7 +6055,7 @@ function createInteractionRequiredAuthError(errorCode) {
|
|
|
6051
6055
|
}
|
|
6052
6056
|
var InteractionRequiredServerErrorMessage, InteractionRequiredAuthSubErrorMessage, InteractionRequiredAuthErrorMessages, InteractionRequiredAuthErrorMessage, _InteractionRequiredAuthError, InteractionRequiredAuthError;
|
|
6053
6057
|
var init_InteractionRequiredAuthError = __esm({
|
|
6054
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6058
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs"() {
|
|
6055
6059
|
"use strict";
|
|
6056
6060
|
init_Constants();
|
|
6057
6061
|
init_AuthError();
|
|
@@ -6109,10 +6113,10 @@ var init_InteractionRequiredAuthError = __esm({
|
|
|
6109
6113
|
}
|
|
6110
6114
|
});
|
|
6111
6115
|
|
|
6112
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6116
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs
|
|
6113
6117
|
var _CacheRecord, CacheRecord;
|
|
6114
6118
|
var init_CacheRecord = __esm({
|
|
6115
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6119
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs"() {
|
|
6116
6120
|
"use strict";
|
|
6117
6121
|
_CacheRecord = class _CacheRecord {
|
|
6118
6122
|
constructor(accountEntity, idTokenEntity, accessTokenEntity, refreshTokenEntity, appMetadataEntity) {
|
|
@@ -6128,10 +6132,10 @@ var init_CacheRecord = __esm({
|
|
|
6128
6132
|
}
|
|
6129
6133
|
});
|
|
6130
6134
|
|
|
6131
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6135
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs
|
|
6132
6136
|
var _ProtocolUtils, ProtocolUtils;
|
|
6133
6137
|
var init_ProtocolUtils = __esm({
|
|
6134
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6138
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs"() {
|
|
6135
6139
|
"use strict";
|
|
6136
6140
|
init_Constants();
|
|
6137
6141
|
init_ClientAuthError();
|
|
@@ -6196,10 +6200,10 @@ var init_ProtocolUtils = __esm({
|
|
|
6196
6200
|
}
|
|
6197
6201
|
});
|
|
6198
6202
|
|
|
6199
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6203
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs
|
|
6200
6204
|
var KeyLocation, _PopTokenGenerator, PopTokenGenerator;
|
|
6201
6205
|
var init_PopTokenGenerator = __esm({
|
|
6202
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6206
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs"() {
|
|
6203
6207
|
"use strict";
|
|
6204
6208
|
init_TimeUtils();
|
|
6205
6209
|
init_UrlString();
|
|
@@ -6221,14 +6225,13 @@ var init_PopTokenGenerator = __esm({
|
|
|
6221
6225
|
* @returns
|
|
6222
6226
|
*/
|
|
6223
6227
|
async generateCnf(request, logger) {
|
|
6224
|
-
var
|
|
6225
|
-
(
|
|
6228
|
+
var _a2;
|
|
6229
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.PopTokenGenerateCnf, request.correlationId);
|
|
6226
6230
|
const reqCnf = await invokeAsync(this.generateKid.bind(this), PerformanceEvents.PopTokenGenerateCnf, logger, this.performanceClient, request.correlationId)(request);
|
|
6227
|
-
const reqCnfString = this.cryptoUtils.
|
|
6231
|
+
const reqCnfString = this.cryptoUtils.base64UrlEncode(JSON.stringify(reqCnf));
|
|
6228
6232
|
return {
|
|
6229
6233
|
kid: reqCnf.kid,
|
|
6230
|
-
reqCnfString
|
|
6231
|
-
reqCnfHash: await this.cryptoUtils.hashString(reqCnfString)
|
|
6234
|
+
reqCnfString
|
|
6232
6235
|
};
|
|
6233
6236
|
}
|
|
6234
6237
|
/**
|
|
@@ -6237,8 +6240,8 @@ var init_PopTokenGenerator = __esm({
|
|
|
6237
6240
|
* @returns
|
|
6238
6241
|
*/
|
|
6239
6242
|
async generateKid(request) {
|
|
6240
|
-
var
|
|
6241
|
-
(
|
|
6243
|
+
var _a2;
|
|
6244
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.PopTokenGenerateKid, request.correlationId);
|
|
6242
6245
|
const kidThumbprint = await this.cryptoUtils.getPublicKeyThumbprint(request);
|
|
6243
6246
|
return {
|
|
6244
6247
|
kid: kidThumbprint,
|
|
@@ -6284,10 +6287,10 @@ var init_PopTokenGenerator = __esm({
|
|
|
6284
6287
|
}
|
|
6285
6288
|
});
|
|
6286
6289
|
|
|
6287
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6290
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs
|
|
6288
6291
|
var _TokenCacheContext, TokenCacheContext;
|
|
6289
6292
|
var init_TokenCacheContext = __esm({
|
|
6290
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6293
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs"() {
|
|
6291
6294
|
"use strict";
|
|
6292
6295
|
_TokenCacheContext = class _TokenCacheContext {
|
|
6293
6296
|
constructor(tokenCache, hasChanged) {
|
|
@@ -6312,12 +6315,12 @@ var init_TokenCacheContext = __esm({
|
|
|
6312
6315
|
}
|
|
6313
6316
|
});
|
|
6314
6317
|
|
|
6315
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6318
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs
|
|
6316
6319
|
function parseServerErrorNo(serverResponse) {
|
|
6317
|
-
var
|
|
6320
|
+
var _a2, _b2;
|
|
6318
6321
|
const errorCodePrefix = "code=";
|
|
6319
|
-
const errorCodePrefixIndex = (
|
|
6320
|
-
return errorCodePrefixIndex && errorCodePrefixIndex >= 0 ? (
|
|
6322
|
+
const errorCodePrefixIndex = (_a2 = serverResponse.error_uri) == null ? void 0 : _a2.lastIndexOf(errorCodePrefix);
|
|
6323
|
+
return errorCodePrefixIndex && errorCodePrefixIndex >= 0 ? (_b2 = serverResponse.error_uri) == null ? void 0 : _b2.substring(errorCodePrefixIndex + errorCodePrefix.length) : void 0;
|
|
6321
6324
|
}
|
|
6322
6325
|
function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClaims, base64Decode, clientInfo, environment, claimsTenantId, authCodePayload, nativeAccountId, logger) {
|
|
6323
6326
|
logger == null ? void 0 : logger.verbose("setCachedAccount called");
|
|
@@ -6350,7 +6353,7 @@ function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClai
|
|
|
6350
6353
|
}
|
|
6351
6354
|
var _ResponseHandler, ResponseHandler;
|
|
6352
6355
|
var init_ResponseHandler = __esm({
|
|
6353
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6356
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs"() {
|
|
6354
6357
|
"use strict";
|
|
6355
6358
|
init_ClientAuthError();
|
|
6356
6359
|
init_ServerError();
|
|
@@ -6418,10 +6421,10 @@ var init_ResponseHandler = __esm({
|
|
|
6418
6421
|
* @param refreshAccessToken
|
|
6419
6422
|
*/
|
|
6420
6423
|
validateTokenResponse(serverResponse, refreshAccessToken) {
|
|
6421
|
-
var
|
|
6424
|
+
var _a2;
|
|
6422
6425
|
if (serverResponse.error || serverResponse.error_description || serverResponse.suberror) {
|
|
6423
6426
|
const errString = `${serverResponse.error_codes} - [${serverResponse.timestamp}]: ${serverResponse.error_description} - Correlation ID: ${serverResponse.correlation_id} - Trace ID: ${serverResponse.trace_id}`;
|
|
6424
|
-
const serverErrorNo = ((
|
|
6427
|
+
const serverErrorNo = ((_a2 = serverResponse.error_codes) == null ? void 0 : _a2.length) ? serverResponse.error_codes[0] : void 0;
|
|
6425
6428
|
const serverError = new ServerError(serverResponse.error, errString, serverResponse.suberror, serverErrorNo);
|
|
6426
6429
|
if (refreshAccessToken && serverResponse.status && serverResponse.status >= HttpStatus.SERVER_ERROR_RANGE_START && serverResponse.status <= HttpStatus.SERVER_ERROR_RANGE_END) {
|
|
6427
6430
|
this.logger.warning(`executeTokenRequest:validateTokenResponse - AAD is currently unavailable and the access token is unable to be refreshed.
|
|
@@ -6444,8 +6447,8 @@ ${serverError}`);
|
|
|
6444
6447
|
* @param authority
|
|
6445
6448
|
*/
|
|
6446
6449
|
async handleServerTokenResponse(serverTokenResponse, authority, reqTimestamp, request, authCodePayload, userAssertionHash, handlingRefreshTokenResponse, forceCacheRefreshTokenResponse, serverRequestId) {
|
|
6447
|
-
var
|
|
6448
|
-
(
|
|
6450
|
+
var _a2;
|
|
6451
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.HandleServerTokenResponse, serverTokenResponse.correlation_id);
|
|
6449
6452
|
let idTokenClaims;
|
|
6450
6453
|
if (serverTokenResponse.id_token) {
|
|
6451
6454
|
idTokenClaims = extractTokenClaims(serverTokenResponse.id_token || Constants.EMPTY_STRING, this.cryptoObj.base64Decode);
|
|
@@ -6565,7 +6568,7 @@ ${serverError}`);
|
|
|
6565
6568
|
* @param stateString
|
|
6566
6569
|
*/
|
|
6567
6570
|
static async generateAuthenticationResult(cryptoObj, authority, cacheRecord, fromTokenCache, request, idTokenClaims, requestState, serverTokenResponse, requestId) {
|
|
6568
|
-
var
|
|
6571
|
+
var _a2, _b2, _c, _d, _e;
|
|
6569
6572
|
let accessToken = Constants.EMPTY_STRING;
|
|
6570
6573
|
let responseScopes = [];
|
|
6571
6574
|
let expiresOn = null;
|
|
@@ -6573,7 +6576,7 @@ ${serverError}`);
|
|
|
6573
6576
|
let refreshOn;
|
|
6574
6577
|
let familyId = Constants.EMPTY_STRING;
|
|
6575
6578
|
if (cacheRecord.accessToken) {
|
|
6576
|
-
if (cacheRecord.accessToken.tokenType === AuthenticationScheme.POP) {
|
|
6579
|
+
if (cacheRecord.accessToken.tokenType === AuthenticationScheme.POP && !request.popKid) {
|
|
6577
6580
|
const popTokenGenerator = new PopTokenGenerator(cryptoObj);
|
|
6578
6581
|
const { secret, keyId } = cacheRecord.accessToken;
|
|
6579
6582
|
if (!keyId) {
|
|
@@ -6603,7 +6606,7 @@ ${serverError}`);
|
|
|
6603
6606
|
void 0,
|
|
6604
6607
|
// tenantProfile optional
|
|
6605
6608
|
idTokenClaims,
|
|
6606
|
-
(
|
|
6609
|
+
(_a2 = cacheRecord.idToken) == null ? void 0 : _a2.secret
|
|
6607
6610
|
) : null;
|
|
6608
6611
|
return {
|
|
6609
6612
|
authority: authority.canonicalAuthority,
|
|
@@ -6611,7 +6614,7 @@ ${serverError}`);
|
|
|
6611
6614
|
tenantId: tid,
|
|
6612
6615
|
scopes: responseScopes,
|
|
6613
6616
|
account: accountInfo,
|
|
6614
|
-
idToken: ((
|
|
6617
|
+
idToken: ((_b2 = cacheRecord == null ? void 0 : cacheRecord.idToken) == null ? void 0 : _b2.secret) || "",
|
|
6615
6618
|
idTokenClaims: idTokenClaims || {},
|
|
6616
6619
|
accessToken,
|
|
6617
6620
|
fromCache: fromTokenCache,
|
|
@@ -6636,10 +6639,10 @@ ${serverError}`);
|
|
|
6636
6639
|
}
|
|
6637
6640
|
});
|
|
6638
6641
|
|
|
6639
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6642
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs
|
|
6640
6643
|
var _AuthorizationCodeClient, AuthorizationCodeClient;
|
|
6641
6644
|
var init_AuthorizationCodeClient = __esm({
|
|
6642
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6645
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs"() {
|
|
6643
6646
|
"use strict";
|
|
6644
6647
|
init_BaseClient();
|
|
6645
6648
|
init_RequestParameterBuilder();
|
|
@@ -6663,10 +6666,10 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6663
6666
|
init_ClientConfigurationErrorCodes();
|
|
6664
6667
|
_AuthorizationCodeClient = class _AuthorizationCodeClient extends BaseClient {
|
|
6665
6668
|
constructor(configuration, performanceClient) {
|
|
6666
|
-
var
|
|
6669
|
+
var _a2;
|
|
6667
6670
|
super(configuration, performanceClient);
|
|
6668
6671
|
this.includeRedirectUri = true;
|
|
6669
|
-
this.oidcDefaultScopes = (
|
|
6672
|
+
this.oidcDefaultScopes = (_a2 = this.config.authOptions.authority.options.OIDCOptions) == null ? void 0 : _a2.defaultScopes;
|
|
6670
6673
|
}
|
|
6671
6674
|
/**
|
|
6672
6675
|
* Creates the URL of the authorization request letting the user input credentials and consent to the
|
|
@@ -6679,8 +6682,8 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6679
6682
|
* @param request
|
|
6680
6683
|
*/
|
|
6681
6684
|
async getAuthCodeUrl(request) {
|
|
6682
|
-
var
|
|
6683
|
-
(
|
|
6685
|
+
var _a2;
|
|
6686
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.GetAuthCodeUrl, request.correlationId);
|
|
6684
6687
|
const queryString = await invokeAsync(this.createAuthCodeUrlQueryString.bind(this), PerformanceEvents.AuthClientCreateQueryString, this.logger, this.performanceClient, request.correlationId)(request);
|
|
6685
6688
|
return UrlString.appendQueryString(this.authority.authorizationEndpoint, queryString);
|
|
6686
6689
|
}
|
|
@@ -6690,14 +6693,14 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6690
6693
|
* @param request
|
|
6691
6694
|
*/
|
|
6692
6695
|
async acquireToken(request, authCodePayload) {
|
|
6693
|
-
var
|
|
6694
|
-
(
|
|
6696
|
+
var _a2, _b2;
|
|
6697
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientAcquireToken, request.correlationId);
|
|
6695
6698
|
if (!request.code) {
|
|
6696
6699
|
throw createClientAuthError(requestCannotBeMade);
|
|
6697
6700
|
}
|
|
6698
6701
|
const reqTimestamp = nowSeconds();
|
|
6699
6702
|
const response = await invokeAsync(this.executeTokenRequest.bind(this), PerformanceEvents.AuthClientExecuteTokenRequest, this.logger, this.performanceClient, request.correlationId)(this.authority, request);
|
|
6700
|
-
const requestId = (
|
|
6703
|
+
const requestId = (_b2 = response.headers) == null ? void 0 : _b2[HeaderNames.X_MS_REQUEST_ID];
|
|
6701
6704
|
const responseHandler = new ResponseHandler(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, this.config.serializableCache, this.config.persistencePlugin, this.performanceClient);
|
|
6702
6705
|
responseHandler.validateTokenResponse(response.body);
|
|
6703
6706
|
return invokeAsync(responseHandler.handleServerTokenResponse.bind(responseHandler), PerformanceEvents.HandleServerTokenResponse, this.logger, this.performanceClient, request.correlationId)(response.body, this.authority, reqTimestamp, request, authCodePayload, void 0, void 0, void 0, requestId);
|
|
@@ -6733,8 +6736,8 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6733
6736
|
* @param request
|
|
6734
6737
|
*/
|
|
6735
6738
|
async executeTokenRequest(authority, request) {
|
|
6736
|
-
var
|
|
6737
|
-
(
|
|
6739
|
+
var _a2, _b2;
|
|
6740
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientExecuteTokenRequest, request.correlationId);
|
|
6738
6741
|
const queryParametersString = this.createTokenQueryParameters(request);
|
|
6739
6742
|
const endpoint = UrlString.appendQueryString(authority.tokenEndpoint, queryParametersString);
|
|
6740
6743
|
const requestBody = await invokeAsync(this.createTokenRequestBody.bind(this), PerformanceEvents.AuthClientCreateTokenRequestBody, this.logger, this.performanceClient, request.correlationId)(request);
|
|
@@ -6752,7 +6755,7 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6752
6755
|
}
|
|
6753
6756
|
const headers = this.createTokenRequestHeaders(ccsCredential || request.ccsCredential);
|
|
6754
6757
|
const thumbprint = {
|
|
6755
|
-
clientId: ((
|
|
6758
|
+
clientId: ((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2.clientId) || this.config.authOptions.clientId,
|
|
6756
6759
|
authority: authority.canonicalAuthority,
|
|
6757
6760
|
scopes: request.scopes,
|
|
6758
6761
|
claims: request.claims,
|
|
@@ -6769,10 +6772,10 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6769
6772
|
* @param request
|
|
6770
6773
|
*/
|
|
6771
6774
|
async createTokenRequestBody(request) {
|
|
6772
|
-
var
|
|
6773
|
-
(
|
|
6775
|
+
var _a2, _b2;
|
|
6776
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientCreateTokenRequestBody, request.correlationId);
|
|
6774
6777
|
const parameterBuilder = new RequestParameterBuilder();
|
|
6775
|
-
parameterBuilder.addClientId(((
|
|
6778
|
+
parameterBuilder.addClientId(((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2[CLIENT_ID]) || this.config.authOptions.clientId);
|
|
6776
6779
|
if (!this.includeRedirectUri) {
|
|
6777
6780
|
RequestValidator.validateRedirectUri(request.redirectUri);
|
|
6778
6781
|
} else {
|
|
@@ -6801,8 +6804,14 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6801
6804
|
parameterBuilder.addClientInfo();
|
|
6802
6805
|
if (request.authenticationScheme === AuthenticationScheme.POP) {
|
|
6803
6806
|
const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils, this.performanceClient);
|
|
6804
|
-
|
|
6805
|
-
|
|
6807
|
+
let reqCnfData;
|
|
6808
|
+
if (!request.popKid) {
|
|
6809
|
+
const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
|
|
6810
|
+
reqCnfData = generatedReqCnfData.reqCnfString;
|
|
6811
|
+
} else {
|
|
6812
|
+
reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
|
|
6813
|
+
}
|
|
6814
|
+
parameterBuilder.addPopToken(reqCnfData);
|
|
6806
6815
|
} else if (request.authenticationScheme === AuthenticationScheme.SSH) {
|
|
6807
6816
|
if (request.sshJwk) {
|
|
6808
6817
|
parameterBuilder.addSshJwk(request.sshJwk);
|
|
@@ -6859,10 +6868,10 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6859
6868
|
* @param request
|
|
6860
6869
|
*/
|
|
6861
6870
|
async createAuthCodeUrlQueryString(request) {
|
|
6862
|
-
var
|
|
6863
|
-
(
|
|
6871
|
+
var _a2, _b2;
|
|
6872
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientCreateQueryString, request.correlationId);
|
|
6864
6873
|
const parameterBuilder = new RequestParameterBuilder();
|
|
6865
|
-
parameterBuilder.addClientId(((
|
|
6874
|
+
parameterBuilder.addClientId(((_b2 = request.extraQueryParameters) == null ? void 0 : _b2[CLIENT_ID]) || this.config.authOptions.clientId);
|
|
6866
6875
|
const requestScopes = [
|
|
6867
6876
|
...request.scopes || [],
|
|
6868
6877
|
...request.extraScopesToConsent || []
|
|
@@ -6954,8 +6963,14 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6954
6963
|
parameterBuilder.addNativeBroker();
|
|
6955
6964
|
if (request.authenticationScheme === AuthenticationScheme.POP) {
|
|
6956
6965
|
const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils);
|
|
6957
|
-
|
|
6958
|
-
|
|
6966
|
+
let reqCnfData;
|
|
6967
|
+
if (!request.popKid) {
|
|
6968
|
+
const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
|
|
6969
|
+
reqCnfData = generatedReqCnfData.reqCnfString;
|
|
6970
|
+
} else {
|
|
6971
|
+
reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
|
|
6972
|
+
}
|
|
6973
|
+
parameterBuilder.addPopToken(reqCnfData);
|
|
6959
6974
|
}
|
|
6960
6975
|
}
|
|
6961
6976
|
return parameterBuilder.createQueryString();
|
|
@@ -6991,12 +7006,12 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
6991
7006
|
* @param account
|
|
6992
7007
|
*/
|
|
6993
7008
|
extractAccountSid(account) {
|
|
6994
|
-
var
|
|
6995
|
-
return ((
|
|
7009
|
+
var _a2;
|
|
7010
|
+
return ((_a2 = account.idTokenClaims) == null ? void 0 : _a2.sid) || null;
|
|
6996
7011
|
}
|
|
6997
7012
|
extractLoginHint(account) {
|
|
6998
|
-
var
|
|
6999
|
-
return ((
|
|
7013
|
+
var _a2;
|
|
7014
|
+
return ((_a2 = account.idTokenClaims) == null ? void 0 : _a2.login_hint) || null;
|
|
7000
7015
|
}
|
|
7001
7016
|
};
|
|
7002
7017
|
__name(_AuthorizationCodeClient, "AuthorizationCodeClient");
|
|
@@ -7004,10 +7019,10 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
7004
7019
|
}
|
|
7005
7020
|
});
|
|
7006
7021
|
|
|
7007
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7022
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs
|
|
7008
7023
|
var DEFAULT_REFRESH_TOKEN_EXPIRATION_OFFSET_SECONDS, _RefreshTokenClient, RefreshTokenClient;
|
|
7009
7024
|
var init_RefreshTokenClient = __esm({
|
|
7010
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7025
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs"() {
|
|
7011
7026
|
"use strict";
|
|
7012
7027
|
init_ClientConfiguration();
|
|
7013
7028
|
init_BaseClient();
|
|
@@ -7038,11 +7053,11 @@ var init_RefreshTokenClient = __esm({
|
|
|
7038
7053
|
super(configuration, performanceClient);
|
|
7039
7054
|
}
|
|
7040
7055
|
async acquireToken(request) {
|
|
7041
|
-
var
|
|
7042
|
-
(
|
|
7056
|
+
var _a2, _b2;
|
|
7057
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireToken, request.correlationId);
|
|
7043
7058
|
const reqTimestamp = nowSeconds();
|
|
7044
7059
|
const response = await invokeAsync(this.executeTokenRequest.bind(this), PerformanceEvents.RefreshTokenClientExecuteTokenRequest, this.logger, this.performanceClient, request.correlationId)(request, this.authority);
|
|
7045
|
-
const requestId = (
|
|
7060
|
+
const requestId = (_b2 = response.headers) == null ? void 0 : _b2[HeaderNames.X_MS_REQUEST_ID];
|
|
7046
7061
|
const responseHandler = new ResponseHandler(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, this.config.serializableCache, this.config.persistencePlugin);
|
|
7047
7062
|
responseHandler.validateTokenResponse(response.body);
|
|
7048
7063
|
return invokeAsync(responseHandler.handleServerTokenResponse.bind(responseHandler), PerformanceEvents.HandleServerTokenResponse, this.logger, this.performanceClient, request.correlationId)(response.body, this.authority, reqTimestamp, request, void 0, void 0, true, request.forceCache, requestId);
|
|
@@ -7052,11 +7067,11 @@ var init_RefreshTokenClient = __esm({
|
|
|
7052
7067
|
* @param request
|
|
7053
7068
|
*/
|
|
7054
7069
|
async acquireTokenByRefreshToken(request) {
|
|
7055
|
-
var
|
|
7070
|
+
var _a2;
|
|
7056
7071
|
if (!request) {
|
|
7057
7072
|
throw createClientConfigurationError(tokenRequestEmpty);
|
|
7058
7073
|
}
|
|
7059
|
-
(
|
|
7074
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenByRefreshToken, request.correlationId);
|
|
7060
7075
|
if (!request.account) {
|
|
7061
7076
|
throw createClientAuthError(noAccountInSilentRequest);
|
|
7062
7077
|
}
|
|
@@ -7081,8 +7096,8 @@ var init_RefreshTokenClient = __esm({
|
|
|
7081
7096
|
* @param request
|
|
7082
7097
|
*/
|
|
7083
7098
|
async acquireTokenWithCachedRefreshToken(request, foci) {
|
|
7084
|
-
var
|
|
7085
|
-
(
|
|
7099
|
+
var _a2;
|
|
7100
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, request.correlationId);
|
|
7086
7101
|
const refreshToken = invoke(this.cacheManager.getRefreshToken.bind(this.cacheManager), PerformanceEvents.CacheManagerGetRefreshToken, this.logger, this.performanceClient, request.correlationId)(request.account, foci, void 0, this.performanceClient, request.correlationId);
|
|
7087
7102
|
if (!refreshToken) {
|
|
7088
7103
|
throw createInteractionRequiredAuthError(noTokensFound);
|
|
@@ -7116,14 +7131,14 @@ var init_RefreshTokenClient = __esm({
|
|
|
7116
7131
|
* @param authority
|
|
7117
7132
|
*/
|
|
7118
7133
|
async executeTokenRequest(request, authority) {
|
|
7119
|
-
var
|
|
7120
|
-
(
|
|
7134
|
+
var _a2, _b2;
|
|
7135
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientExecuteTokenRequest, request.correlationId);
|
|
7121
7136
|
const queryParametersString = this.createTokenQueryParameters(request);
|
|
7122
7137
|
const endpoint = UrlString.appendQueryString(authority.tokenEndpoint, queryParametersString);
|
|
7123
7138
|
const requestBody = await invokeAsync(this.createTokenRequestBody.bind(this), PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, this.logger, this.performanceClient, request.correlationId)(request);
|
|
7124
7139
|
const headers = this.createTokenRequestHeaders(request.ccsCredential);
|
|
7125
7140
|
const thumbprint = {
|
|
7126
|
-
clientId: ((
|
|
7141
|
+
clientId: ((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2.clientId) || this.config.authOptions.clientId,
|
|
7127
7142
|
authority: authority.canonicalAuthority,
|
|
7128
7143
|
scopes: request.scopes,
|
|
7129
7144
|
claims: request.claims,
|
|
@@ -7140,11 +7155,11 @@ var init_RefreshTokenClient = __esm({
|
|
|
7140
7155
|
* @param request
|
|
7141
7156
|
*/
|
|
7142
7157
|
async createTokenRequestBody(request) {
|
|
7143
|
-
var
|
|
7144
|
-
(
|
|
7158
|
+
var _a2, _b2, _c;
|
|
7159
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, request.correlationId);
|
|
7145
7160
|
const correlationId = request.correlationId;
|
|
7146
7161
|
const parameterBuilder = new RequestParameterBuilder();
|
|
7147
|
-
parameterBuilder.addClientId(((
|
|
7162
|
+
parameterBuilder.addClientId(((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2[CLIENT_ID]) || this.config.authOptions.clientId);
|
|
7148
7163
|
if (request.redirectUri) {
|
|
7149
7164
|
parameterBuilder.addRedirectUri(request.redirectUri);
|
|
7150
7165
|
}
|
|
@@ -7169,8 +7184,14 @@ var init_RefreshTokenClient = __esm({
|
|
|
7169
7184
|
}
|
|
7170
7185
|
if (request.authenticationScheme === AuthenticationScheme.POP) {
|
|
7171
7186
|
const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils, this.performanceClient);
|
|
7172
|
-
|
|
7173
|
-
|
|
7187
|
+
let reqCnfData;
|
|
7188
|
+
if (!request.popKid) {
|
|
7189
|
+
const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
|
|
7190
|
+
reqCnfData = generatedReqCnfData.reqCnfString;
|
|
7191
|
+
} else {
|
|
7192
|
+
reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
|
|
7193
|
+
}
|
|
7194
|
+
parameterBuilder.addPopToken(reqCnfData);
|
|
7174
7195
|
} else if (request.authenticationScheme === AuthenticationScheme.SSH) {
|
|
7175
7196
|
if (request.sshJwk) {
|
|
7176
7197
|
parameterBuilder.addSshJwk(request.sshJwk);
|
|
@@ -7207,10 +7228,10 @@ var init_RefreshTokenClient = __esm({
|
|
|
7207
7228
|
}
|
|
7208
7229
|
});
|
|
7209
7230
|
|
|
7210
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7231
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs
|
|
7211
7232
|
var _SilentFlowClient, SilentFlowClient;
|
|
7212
7233
|
var init_SilentFlowClient = __esm({
|
|
7213
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7234
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs"() {
|
|
7214
7235
|
"use strict";
|
|
7215
7236
|
init_BaseClient();
|
|
7216
7237
|
init_TimeUtils();
|
|
@@ -7234,11 +7255,11 @@ var init_SilentFlowClient = __esm({
|
|
|
7234
7255
|
* @param request
|
|
7235
7256
|
*/
|
|
7236
7257
|
async acquireToken(request) {
|
|
7237
|
-
var
|
|
7258
|
+
var _a2;
|
|
7238
7259
|
try {
|
|
7239
7260
|
const [authResponse, cacheOutcome] = await this.acquireCachedToken({
|
|
7240
7261
|
...request,
|
|
7241
|
-
scopes: ((
|
|
7262
|
+
scopes: ((_a2 = request.scopes) == null ? void 0 : _a2.length) ? request.scopes : [...OIDC_DEFAULT_SCOPES]
|
|
7242
7263
|
});
|
|
7243
7264
|
if (cacheOutcome === CacheOutcome.PROACTIVELY_REFRESHED) {
|
|
7244
7265
|
this.logger.info("SilentFlowClient:acquireCachedToken - Cached access token's refreshOn property has been exceeded'. It's not expired, but must be refreshed.");
|
|
@@ -7261,8 +7282,8 @@ var init_SilentFlowClient = __esm({
|
|
|
7261
7282
|
* @param request
|
|
7262
7283
|
*/
|
|
7263
7284
|
async acquireCachedToken(request) {
|
|
7264
|
-
var
|
|
7265
|
-
(
|
|
7285
|
+
var _a2;
|
|
7286
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.SilentFlowClientAcquireCachedToken, request.correlationId);
|
|
7266
7287
|
let lastCacheOutcome = CacheOutcome.NOT_APPLICABLE;
|
|
7267
7288
|
if (request.forceRefresh || !this.config.cacheOptions.claimsBasedCachingEnabled && !StringUtils.isEmptyObj(request.claims)) {
|
|
7268
7289
|
this.setCacheOutcome(CacheOutcome.FORCE_REFRESH_OR_CLAIMS, request.correlationId);
|
|
@@ -7301,9 +7322,9 @@ var init_SilentFlowClient = __esm({
|
|
|
7301
7322
|
];
|
|
7302
7323
|
}
|
|
7303
7324
|
setCacheOutcome(cacheOutcome, correlationId) {
|
|
7304
|
-
var
|
|
7305
|
-
(
|
|
7306
|
-
(
|
|
7325
|
+
var _a2, _b2;
|
|
7326
|
+
(_a2 = this.serverTelemetryManager) == null ? void 0 : _a2.setCacheOutcome(cacheOutcome);
|
|
7327
|
+
(_b2 = this.performanceClient) == null ? void 0 : _b2.addFields({
|
|
7307
7328
|
cacheOutcome
|
|
7308
7329
|
}, correlationId);
|
|
7309
7330
|
if (cacheOutcome !== CacheOutcome.NOT_APPLICABLE) {
|
|
@@ -7315,8 +7336,8 @@ var init_SilentFlowClient = __esm({
|
|
|
7315
7336
|
* @param cacheRecord
|
|
7316
7337
|
*/
|
|
7317
7338
|
async generateResultFromCacheRecord(cacheRecord, request) {
|
|
7318
|
-
var
|
|
7319
|
-
(
|
|
7339
|
+
var _a2;
|
|
7340
|
+
(_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.SilentFlowClientGenerateResultFromCacheRecord, request.correlationId);
|
|
7320
7341
|
let idTokenClaims;
|
|
7321
7342
|
if (cacheRecord.idToken) {
|
|
7322
7343
|
idTokenClaims = extractTokenClaims(cacheRecord.idToken.secret, this.config.cryptoInterface.base64Decode);
|
|
@@ -7336,10 +7357,10 @@ var init_SilentFlowClient = __esm({
|
|
|
7336
7357
|
}
|
|
7337
7358
|
});
|
|
7338
7359
|
|
|
7339
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7360
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs
|
|
7340
7361
|
var _ServerTelemetryManager, ServerTelemetryManager;
|
|
7341
7362
|
var init_ServerTelemetryManager = __esm({
|
|
7342
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7363
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs"() {
|
|
7343
7364
|
"use strict";
|
|
7344
7365
|
init_Constants();
|
|
7345
7366
|
init_AuthError();
|
|
@@ -7515,9 +7536,9 @@ var init_ServerTelemetryManager = __esm({
|
|
|
7515
7536
|
}
|
|
7516
7537
|
});
|
|
7517
7538
|
|
|
7518
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7539
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs
|
|
7519
7540
|
var init_dist = __esm({
|
|
7520
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7541
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs"() {
|
|
7521
7542
|
"use strict";
|
|
7522
7543
|
init_AuthToken();
|
|
7523
7544
|
init_AuthorityFactory();
|
|
@@ -7558,10 +7579,10 @@ var init_dist = __esm({
|
|
|
7558
7579
|
}
|
|
7559
7580
|
});
|
|
7560
7581
|
|
|
7561
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7582
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs
|
|
7562
7583
|
var _Deserializer, Deserializer;
|
|
7563
7584
|
var init_Deserializer = __esm({
|
|
7564
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7585
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs"() {
|
|
7565
7586
|
"use strict";
|
|
7566
7587
|
init_dist();
|
|
7567
7588
|
_Deserializer = class _Deserializer {
|
|
@@ -7581,7 +7602,7 @@ var init_Deserializer = __esm({
|
|
|
7581
7602
|
const accountObjects = {};
|
|
7582
7603
|
if (accounts) {
|
|
7583
7604
|
Object.keys(accounts).map(function(key) {
|
|
7584
|
-
var
|
|
7605
|
+
var _a2;
|
|
7585
7606
|
const serializedAcc = accounts[key];
|
|
7586
7607
|
const mappedAcc = {
|
|
7587
7608
|
homeAccountId: serializedAcc.home_account_id,
|
|
@@ -7594,7 +7615,7 @@ var init_Deserializer = __esm({
|
|
|
7594
7615
|
clientInfo: serializedAcc.client_info,
|
|
7595
7616
|
lastModificationTime: serializedAcc.last_modification_time,
|
|
7596
7617
|
lastModificationApp: serializedAcc.last_modification_app,
|
|
7597
|
-
tenantProfiles: (
|
|
7618
|
+
tenantProfiles: (_a2 = serializedAcc.tenantProfiles) == null ? void 0 : _a2.map((serializedTenantProfile) => {
|
|
7598
7619
|
return JSON.parse(serializedTenantProfile);
|
|
7599
7620
|
})
|
|
7600
7621
|
};
|
|
@@ -7720,24 +7741,24 @@ var init_Deserializer = __esm({
|
|
|
7720
7741
|
}
|
|
7721
7742
|
});
|
|
7722
7743
|
|
|
7723
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7744
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs
|
|
7724
7745
|
var internals_exports = {};
|
|
7725
7746
|
__export(internals_exports, {
|
|
7726
7747
|
Deserializer: () => Deserializer,
|
|
7727
7748
|
Serializer: () => Serializer
|
|
7728
7749
|
});
|
|
7729
7750
|
var init_internals = __esm({
|
|
7730
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7751
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs"() {
|
|
7731
7752
|
"use strict";
|
|
7732
7753
|
init_Serializer();
|
|
7733
7754
|
init_Deserializer();
|
|
7734
7755
|
}
|
|
7735
7756
|
});
|
|
7736
7757
|
|
|
7737
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7738
|
-
var AUTHORIZATION_HEADER_NAME, METADATA_HEADER_NAME, APP_SERVICE_SECRET_HEADER_NAME, SERVICE_FABRIC_SECRET_HEADER_NAME, API_VERSION_QUERY_PARAMETER_NAME, RESOURCE_BODY_OR_QUERY_PARAMETER_NAME, DEFAULT_MANAGED_IDENTITY_ID, MANAGED_IDENTITY_DEFAULT_TENANT, DEFAULT_AUTHORITY_FOR_MANAGED_IDENTITY, ManagedIdentityEnvironmentVariableNames, ManagedIdentitySourceNames, ManagedIdentityIdType, HttpMethod, ProxyStatus, REGION_ENVIRONMENT_VARIABLE, RANDOM_OCTET_SIZE, Hash, CharSet, Constants2, ApiId, JwtConstants, LOOPBACK_SERVER_CONSTANTS, MANAGED_IDENTITY_MAX_RETRIES, MANAGED_IDENTITY_RETRY_DELAY, MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON;
|
|
7758
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs
|
|
7759
|
+
var AUTHORIZATION_HEADER_NAME, METADATA_HEADER_NAME, APP_SERVICE_SECRET_HEADER_NAME, SERVICE_FABRIC_SECRET_HEADER_NAME, API_VERSION_QUERY_PARAMETER_NAME, RESOURCE_BODY_OR_QUERY_PARAMETER_NAME, DEFAULT_MANAGED_IDENTITY_ID, MANAGED_IDENTITY_DEFAULT_TENANT, DEFAULT_AUTHORITY_FOR_MANAGED_IDENTITY, ManagedIdentityEnvironmentVariableNames, ManagedIdentitySourceNames, ManagedIdentityIdType, HttpMethod, ProxyStatus, REGION_ENVIRONMENT_VARIABLE, RANDOM_OCTET_SIZE, Hash, CharSet, Constants2, ApiId, JwtConstants, LOOPBACK_SERVER_CONSTANTS, AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES, MANAGED_IDENTITY_MAX_RETRIES, MANAGED_IDENTITY_RETRY_DELAY, MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON;
|
|
7739
7760
|
var init_Constants2 = __esm({
|
|
7740
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7761
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs"() {
|
|
7741
7762
|
"use strict";
|
|
7742
7763
|
init_dist();
|
|
7743
7764
|
AUTHORIZATION_HEADER_NAME = "Authorization";
|
|
@@ -7820,6 +7841,7 @@ var init_Constants2 = __esm({
|
|
|
7820
7841
|
INTERVAL_MS: 100,
|
|
7821
7842
|
TIMEOUT_MS: 5e3
|
|
7822
7843
|
};
|
|
7844
|
+
AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES = 4096;
|
|
7823
7845
|
MANAGED_IDENTITY_MAX_RETRIES = 3;
|
|
7824
7846
|
MANAGED_IDENTITY_RETRY_DELAY = 1e3;
|
|
7825
7847
|
MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON = [
|
|
@@ -7833,10 +7855,10 @@ var init_Constants2 = __esm({
|
|
|
7833
7855
|
}
|
|
7834
7856
|
});
|
|
7835
7857
|
|
|
7836
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7858
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs
|
|
7837
7859
|
var _NetworkUtils, NetworkUtils;
|
|
7838
7860
|
var init_NetworkUtils = __esm({
|
|
7839
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7861
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs"() {
|
|
7840
7862
|
"use strict";
|
|
7841
7863
|
_NetworkUtils = class _NetworkUtils {
|
|
7842
7864
|
static getNetworkResponse(headers, body, statusCode) {
|
|
@@ -7875,12 +7897,12 @@ var init_NetworkUtils = __esm({
|
|
|
7875
7897
|
}
|
|
7876
7898
|
});
|
|
7877
7899
|
|
|
7878
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7900
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs
|
|
7879
7901
|
import http from "http";
|
|
7880
7902
|
import https from "https";
|
|
7881
7903
|
var _HttpClient, HttpClient, networkRequestViaProxy, networkRequestViaHttps, parseBody;
|
|
7882
7904
|
var init_HttpClient = __esm({
|
|
7883
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
7905
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs"() {
|
|
7884
7906
|
"use strict";
|
|
7885
7907
|
init_dist();
|
|
7886
7908
|
init_Constants2();
|
|
@@ -8105,15 +8127,19 @@ Headers: ${JSON.stringify(headers)}`
|
|
|
8105
8127
|
}
|
|
8106
8128
|
});
|
|
8107
8129
|
|
|
8108
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8109
|
-
var invalidManagedIdentityIdType, missingId, networkUnavailable, unableToCreateAzureArc, unableToCreateCloudShell, unableToCreateSource, unableToReadSecretFile, userAssignedNotAvailableAtRuntime, wwwAuthenticateHeaderMissing, wwwAuthenticateHeaderUnsupportedFormat, MsiEnvironmentVariableUrlMalformedErrorCodes;
|
|
8130
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs
|
|
8131
|
+
var invalidFileExtension, invalidFilePath, invalidManagedIdentityIdType, invalidSecret, missingId, networkUnavailable, platformNotSupported, unableToCreateAzureArc, unableToCreateCloudShell, unableToCreateSource, unableToReadSecretFile, userAssignedNotAvailableAtRuntime, wwwAuthenticateHeaderMissing, wwwAuthenticateHeaderUnsupportedFormat, MsiEnvironmentVariableUrlMalformedErrorCodes;
|
|
8110
8132
|
var init_ManagedIdentityErrorCodes = __esm({
|
|
8111
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8133
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs"() {
|
|
8112
8134
|
"use strict";
|
|
8113
8135
|
init_Constants2();
|
|
8136
|
+
invalidFileExtension = "invalid_file_extension";
|
|
8137
|
+
invalidFilePath = "invalid_file_path";
|
|
8114
8138
|
invalidManagedIdentityIdType = "invalid_managed_identity_id_type";
|
|
8139
|
+
invalidSecret = "invalid_secret";
|
|
8115
8140
|
missingId = "missing_client_id";
|
|
8116
8141
|
networkUnavailable = "network_unavailable";
|
|
8142
|
+
platformNotSupported = "platform_not_supported";
|
|
8117
8143
|
unableToCreateAzureArc = "unable_to_create_azure_arc";
|
|
8118
8144
|
unableToCreateCloudShell = "unable_to_create_cloud_shell";
|
|
8119
8145
|
unableToCreateSource = "unable_to_create_source";
|
|
@@ -8130,19 +8156,23 @@ var init_ManagedIdentityErrorCodes = __esm({
|
|
|
8130
8156
|
}
|
|
8131
8157
|
});
|
|
8132
8158
|
|
|
8133
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8159
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs
|
|
8134
8160
|
function createManagedIdentityError(errorCode) {
|
|
8135
8161
|
return new ManagedIdentityError(errorCode);
|
|
8136
8162
|
}
|
|
8137
8163
|
var ManagedIdentityErrorMessages, _ManagedIdentityError, ManagedIdentityError;
|
|
8138
8164
|
var init_ManagedIdentityError = __esm({
|
|
8139
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8165
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs"() {
|
|
8140
8166
|
"use strict";
|
|
8141
8167
|
init_dist();
|
|
8142
8168
|
init_ManagedIdentityErrorCodes();
|
|
8143
8169
|
init_Constants2();
|
|
8144
8170
|
ManagedIdentityErrorMessages = {
|
|
8171
|
+
[invalidFileExtension]: "The file path in the WWW-Authenticate header does not contain a .key file.",
|
|
8172
|
+
[invalidFilePath]: "The file path in the WWW-Authenticate header is not in a valid Windows or Linux Format.",
|
|
8145
8173
|
[invalidManagedIdentityIdType]: "More than one ManagedIdentityIdType was provided.",
|
|
8174
|
+
[invalidSecret]: "The secret in the file on the file path in the WWW-Authenticate header is greater than 4096 bytes.",
|
|
8175
|
+
[platformNotSupported]: "The platform is not supported by Azure Arc. Azure Arc only supports Windows and Linux.",
|
|
8146
8176
|
[missingId]: "A ManagedIdentityId id was not provided.",
|
|
8147
8177
|
[MsiEnvironmentVariableUrlMalformedErrorCodes.AZURE_POD_IDENTITY_AUTHORITY_HOST]: `The Managed Identity's '${ManagedIdentityEnvironmentVariableNames.AZURE_POD_IDENTITY_AUTHORITY_HOST}' environment variable is malformed.`,
|
|
8148
8178
|
[MsiEnvironmentVariableUrlMalformedErrorCodes.IDENTITY_ENDPOINT]: `The Managed Identity's '${ManagedIdentityEnvironmentVariableNames.IDENTITY_ENDPOINT}' environment variable is malformed.`,
|
|
@@ -8170,10 +8200,10 @@ var init_ManagedIdentityError = __esm({
|
|
|
8170
8200
|
}
|
|
8171
8201
|
});
|
|
8172
8202
|
|
|
8173
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8203
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs
|
|
8174
8204
|
var _ManagedIdentityId, ManagedIdentityId;
|
|
8175
8205
|
var init_ManagedIdentityId = __esm({
|
|
8176
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8206
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs"() {
|
|
8177
8207
|
"use strict";
|
|
8178
8208
|
init_ManagedIdentityError();
|
|
8179
8209
|
init_Constants2();
|
|
@@ -8224,10 +8254,10 @@ var init_ManagedIdentityId = __esm({
|
|
|
8224
8254
|
}
|
|
8225
8255
|
});
|
|
8226
8256
|
|
|
8227
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8257
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs
|
|
8228
8258
|
var _LinearRetryPolicy, LinearRetryPolicy;
|
|
8229
8259
|
var init_LinearRetryPolicy = __esm({
|
|
8230
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8260
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs"() {
|
|
8231
8261
|
"use strict";
|
|
8232
8262
|
_LinearRetryPolicy = class _LinearRetryPolicy {
|
|
8233
8263
|
constructor(maxRetries, retryDelay, httpStatusCodesToRetryOn) {
|
|
@@ -8265,10 +8295,10 @@ var init_LinearRetryPolicy = __esm({
|
|
|
8265
8295
|
}
|
|
8266
8296
|
});
|
|
8267
8297
|
|
|
8268
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8298
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs
|
|
8269
8299
|
var _HttpClientWithRetries, HttpClientWithRetries;
|
|
8270
8300
|
var init_HttpClientWithRetries = __esm({
|
|
8271
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8301
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs"() {
|
|
8272
8302
|
"use strict";
|
|
8273
8303
|
init_dist();
|
|
8274
8304
|
init_Constants2();
|
|
@@ -8305,7 +8335,7 @@ var init_HttpClientWithRetries = __esm({
|
|
|
8305
8335
|
}
|
|
8306
8336
|
});
|
|
8307
8337
|
|
|
8308
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8338
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs
|
|
8309
8339
|
function buildAppConfiguration({ auth, broker, cache, system, telemetry }) {
|
|
8310
8340
|
const systemOptions = {
|
|
8311
8341
|
...DEFAULT_SYSTEM_OPTIONS2,
|
|
@@ -8344,7 +8374,7 @@ function buildManagedIdentityConfiguration({ managedIdentityIdParams, system })
|
|
|
8344
8374
|
}
|
|
8345
8375
|
var DEFAULT_AUTH_OPTIONS, DEFAULT_CACHE_OPTIONS2, DEFAULT_LOGGER_OPTIONS, DEFAULT_SYSTEM_OPTIONS2, DEFAULT_TELEMETRY_OPTIONS2;
|
|
8346
8376
|
var init_Configuration = __esm({
|
|
8347
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8377
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs"() {
|
|
8348
8378
|
"use strict";
|
|
8349
8379
|
init_dist();
|
|
8350
8380
|
init_HttpClient();
|
|
@@ -8377,8 +8407,8 @@ var init_Configuration = __esm({
|
|
|
8377
8407
|
claimsBasedCachingEnabled: false
|
|
8378
8408
|
};
|
|
8379
8409
|
DEFAULT_LOGGER_OPTIONS = {
|
|
8380
|
-
loggerCallback: () => {
|
|
8381
|
-
},
|
|
8410
|
+
loggerCallback: /* @__PURE__ */ __name(() => {
|
|
8411
|
+
}, "loggerCallback"),
|
|
8382
8412
|
piiLoggingEnabled: false,
|
|
8383
8413
|
logLevel: LogLevel.Info
|
|
8384
8414
|
};
|
|
@@ -8492,10 +8522,10 @@ var init_esm_node = __esm({
|
|
|
8492
8522
|
}
|
|
8493
8523
|
});
|
|
8494
8524
|
|
|
8495
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8525
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs
|
|
8496
8526
|
var _GuidGenerator, GuidGenerator;
|
|
8497
8527
|
var init_GuidGenerator = __esm({
|
|
8498
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8528
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs"() {
|
|
8499
8529
|
"use strict";
|
|
8500
8530
|
init_esm_node();
|
|
8501
8531
|
_GuidGenerator = class _GuidGenerator {
|
|
@@ -8521,10 +8551,10 @@ var init_GuidGenerator = __esm({
|
|
|
8521
8551
|
}
|
|
8522
8552
|
});
|
|
8523
8553
|
|
|
8524
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8554
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs
|
|
8525
8555
|
var _EncodingUtils, EncodingUtils;
|
|
8526
8556
|
var init_EncodingUtils = __esm({
|
|
8527
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8557
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs"() {
|
|
8528
8558
|
"use strict";
|
|
8529
8559
|
init_dist();
|
|
8530
8560
|
_EncodingUtils = class _EncodingUtils {
|
|
@@ -8569,11 +8599,11 @@ var init_EncodingUtils = __esm({
|
|
|
8569
8599
|
}
|
|
8570
8600
|
});
|
|
8571
8601
|
|
|
8572
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8602
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs
|
|
8573
8603
|
import crypto2 from "crypto";
|
|
8574
8604
|
var _HashUtils, HashUtils;
|
|
8575
8605
|
var init_HashUtils = __esm({
|
|
8576
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8606
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs"() {
|
|
8577
8607
|
"use strict";
|
|
8578
8608
|
init_Constants2();
|
|
8579
8609
|
_HashUtils = class _HashUtils {
|
|
@@ -8590,11 +8620,11 @@ var init_HashUtils = __esm({
|
|
|
8590
8620
|
}
|
|
8591
8621
|
});
|
|
8592
8622
|
|
|
8593
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8623
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs
|
|
8594
8624
|
import crypto3 from "crypto";
|
|
8595
8625
|
var _PkceGenerator, PkceGenerator;
|
|
8596
8626
|
var init_PkceGenerator = __esm({
|
|
8597
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8627
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs"() {
|
|
8598
8628
|
"use strict";
|
|
8599
8629
|
init_dist();
|
|
8600
8630
|
init_Constants2();
|
|
@@ -8643,10 +8673,10 @@ var init_PkceGenerator = __esm({
|
|
|
8643
8673
|
}
|
|
8644
8674
|
});
|
|
8645
8675
|
|
|
8646
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8676
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs
|
|
8647
8677
|
var _CryptoProvider, CryptoProvider;
|
|
8648
8678
|
var init_CryptoProvider = __esm({
|
|
8649
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8679
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs"() {
|
|
8650
8680
|
"use strict";
|
|
8651
8681
|
init_GuidGenerator();
|
|
8652
8682
|
init_EncodingUtils();
|
|
@@ -8658,6 +8688,20 @@ var init_CryptoProvider = __esm({
|
|
|
8658
8688
|
this.guidGenerator = new GuidGenerator();
|
|
8659
8689
|
this.hashUtils = new HashUtils();
|
|
8660
8690
|
}
|
|
8691
|
+
/**
|
|
8692
|
+
* base64 URL safe encoded string
|
|
8693
|
+
*/
|
|
8694
|
+
base64UrlEncode() {
|
|
8695
|
+
throw new Error("Method not implemented.");
|
|
8696
|
+
}
|
|
8697
|
+
/**
|
|
8698
|
+
* Stringifies and base64Url encodes input public key
|
|
8699
|
+
* @param inputKid
|
|
8700
|
+
* @returns Base64Url encoded public key
|
|
8701
|
+
*/
|
|
8702
|
+
encodeKid() {
|
|
8703
|
+
throw new Error("Method not implemented.");
|
|
8704
|
+
}
|
|
8661
8705
|
/**
|
|
8662
8706
|
* Creates a new random GUID - used to populate state and nonce.
|
|
8663
8707
|
* @returns string (GUID)
|
|
@@ -8722,10 +8766,10 @@ var init_CryptoProvider = __esm({
|
|
|
8722
8766
|
}
|
|
8723
8767
|
});
|
|
8724
8768
|
|
|
8725
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8769
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs
|
|
8726
8770
|
var _NodeStorage, NodeStorage;
|
|
8727
8771
|
var init_NodeStorage = __esm({
|
|
8728
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
8772
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs"() {
|
|
8729
8773
|
"use strict";
|
|
8730
8774
|
init_dist();
|
|
8731
8775
|
init_Deserializer();
|
|
@@ -9126,10 +9170,10 @@ var init_NodeStorage = __esm({
|
|
|
9126
9170
|
}
|
|
9127
9171
|
});
|
|
9128
9172
|
|
|
9129
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
9173
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs
|
|
9130
9174
|
var defaultSerializedCache, _TokenCache, TokenCache;
|
|
9131
9175
|
var init_TokenCache = __esm({
|
|
9132
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
9176
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs"() {
|
|
9133
9177
|
"use strict";
|
|
9134
9178
|
init_dist();
|
|
9135
9179
|
init_Deserializer();
|
|
@@ -10140,8 +10184,7 @@ var require_JsonWebTokenError = __commonJS({
|
|
|
10140
10184
|
}
|
|
10141
10185
|
this.name = "JsonWebTokenError";
|
|
10142
10186
|
this.message = message;
|
|
10143
|
-
if (error)
|
|
10144
|
-
this.inner = error;
|
|
10187
|
+
if (error) this.inner = error;
|
|
10145
10188
|
}, "JsonWebTokenError");
|
|
10146
10189
|
JsonWebTokenError.prototype = Object.create(Error.prototype);
|
|
10147
10190
|
JsonWebTokenError.prototype.constructor = JsonWebTokenError;
|
|
@@ -11912,19 +11955,18 @@ var require_subset = __commonJS({
|
|
|
11912
11955
|
sub = new Range(sub, options);
|
|
11913
11956
|
dom = new Range(dom, options);
|
|
11914
11957
|
let sawNonNull = false;
|
|
11915
|
-
OUTER:
|
|
11916
|
-
for (const
|
|
11917
|
-
|
|
11918
|
-
|
|
11919
|
-
|
|
11920
|
-
|
|
11921
|
-
continue OUTER;
|
|
11922
|
-
}
|
|
11923
|
-
}
|
|
11924
|
-
if (sawNonNull) {
|
|
11925
|
-
return false;
|
|
11958
|
+
OUTER: for (const simpleSub of sub.set) {
|
|
11959
|
+
for (const simpleDom of dom.set) {
|
|
11960
|
+
const isSub = simpleSubset(simpleSub, simpleDom, options);
|
|
11961
|
+
sawNonNull = sawNonNull || isSub !== null;
|
|
11962
|
+
if (isSub) {
|
|
11963
|
+
continue OUTER;
|
|
11926
11964
|
}
|
|
11927
11965
|
}
|
|
11966
|
+
if (sawNonNull) {
|
|
11967
|
+
return false;
|
|
11968
|
+
}
|
|
11969
|
+
}
|
|
11928
11970
|
return true;
|
|
11929
11971
|
}, "subset");
|
|
11930
11972
|
var minimumVersionWithPreRelease = [new Comparator(">=0.0.0-0")];
|
|
@@ -12185,11 +12227,9 @@ var require_validateAsymmetricKey = __commonJS({
|
|
|
12185
12227
|
ES512: "secp521r1"
|
|
12186
12228
|
};
|
|
12187
12229
|
module.exports = function(algorithm, key) {
|
|
12188
|
-
if (!algorithm || !key)
|
|
12189
|
-
return;
|
|
12230
|
+
if (!algorithm || !key) return;
|
|
12190
12231
|
const keyType = key.asymmetricKeyType;
|
|
12191
|
-
if (!keyType)
|
|
12192
|
-
return;
|
|
12232
|
+
if (!keyType) return;
|
|
12193
12233
|
const allowedAlgorithms = allowedAlgorithmsForKeys[keyType];
|
|
12194
12234
|
if (!allowedAlgorithms) {
|
|
12195
12235
|
throw new Error(`Unknown key type "${keyType}".`);
|
|
@@ -12266,8 +12306,7 @@ var require_verify = __commonJS({
|
|
|
12266
12306
|
done = callback;
|
|
12267
12307
|
} else {
|
|
12268
12308
|
done = /* @__PURE__ */ __name(function(err, data) {
|
|
12269
|
-
if (err)
|
|
12270
|
-
throw err;
|
|
12309
|
+
if (err) throw err;
|
|
12271
12310
|
return data;
|
|
12272
12311
|
}, "done");
|
|
12273
12312
|
}
|
|
@@ -12941,15 +12980,15 @@ var require_sign = __commonJS({
|
|
|
12941
12980
|
SUPPORTED_ALGS.splice(3, 0, "PS256", "PS384", "PS512");
|
|
12942
12981
|
}
|
|
12943
12982
|
var sign_options_schema = {
|
|
12944
|
-
expiresIn: { isValid: function(value) {
|
|
12983
|
+
expiresIn: { isValid: /* @__PURE__ */ __name(function(value) {
|
|
12945
12984
|
return isInteger(value) || isString(value) && value;
|
|
12946
|
-
}, message: '"expiresIn" should be a number of seconds or string representing a timespan' },
|
|
12947
|
-
notBefore: { isValid: function(value) {
|
|
12985
|
+
}, "isValid"), message: '"expiresIn" should be a number of seconds or string representing a timespan' },
|
|
12986
|
+
notBefore: { isValid: /* @__PURE__ */ __name(function(value) {
|
|
12948
12987
|
return isInteger(value) || isString(value) && value;
|
|
12949
|
-
}, message: '"notBefore" should be a number of seconds or string representing a timespan' },
|
|
12950
|
-
audience: { isValid: function(value) {
|
|
12988
|
+
}, "isValid"), message: '"notBefore" should be a number of seconds or string representing a timespan' },
|
|
12989
|
+
audience: { isValid: /* @__PURE__ */ __name(function(value) {
|
|
12951
12990
|
return isString(value) || Array.isArray(value);
|
|
12952
|
-
}, message: '"audience" must be a string or array' },
|
|
12991
|
+
}, "isValid"), message: '"audience" must be a string or array' },
|
|
12953
12992
|
algorithm: { isValid: includes.bind(null, SUPPORTED_ALGS), message: '"algorithm" must be a valid string enum value' },
|
|
12954
12993
|
header: { isValid: isPlainObject, message: '"header" must be an object' },
|
|
12955
12994
|
encoding: { isValid: isString, message: '"encoding" must be a string' },
|
|
@@ -13164,10 +13203,10 @@ var require_package14 = __commonJS({
|
|
|
13164
13203
|
}
|
|
13165
13204
|
});
|
|
13166
13205
|
|
|
13167
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13206
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs
|
|
13168
13207
|
var import_jsonwebtoken, _ClientAssertion, ClientAssertion;
|
|
13169
13208
|
var init_ClientAssertion = __esm({
|
|
13170
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13209
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs"() {
|
|
13171
13210
|
"use strict";
|
|
13172
13211
|
import_jsonwebtoken = __toESM(require_package14(), 1);
|
|
13173
13212
|
init_dist();
|
|
@@ -13269,20 +13308,20 @@ var init_ClientAssertion = __esm({
|
|
|
13269
13308
|
}
|
|
13270
13309
|
});
|
|
13271
13310
|
|
|
13272
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13311
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs
|
|
13273
13312
|
var name2, version2;
|
|
13274
13313
|
var init_packageMetadata2 = __esm({
|
|
13275
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13314
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs"() {
|
|
13276
13315
|
"use strict";
|
|
13277
13316
|
name2 = "@azure/msal-node";
|
|
13278
|
-
version2 = "2.9.
|
|
13317
|
+
version2 = "2.9.2";
|
|
13279
13318
|
}
|
|
13280
13319
|
});
|
|
13281
13320
|
|
|
13282
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13321
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs
|
|
13283
13322
|
var NodeAuthErrorMessage, _NodeAuthError, NodeAuthError;
|
|
13284
13323
|
var init_NodeAuthError = __esm({
|
|
13285
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13324
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs"() {
|
|
13286
13325
|
"use strict";
|
|
13287
13326
|
init_dist();
|
|
13288
13327
|
NodeAuthErrorMessage = {
|
|
@@ -13368,10 +13407,10 @@ var init_NodeAuthError = __esm({
|
|
|
13368
13407
|
}
|
|
13369
13408
|
});
|
|
13370
13409
|
|
|
13371
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13410
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs
|
|
13372
13411
|
var _UsernamePasswordClient, UsernamePasswordClient;
|
|
13373
13412
|
var init_UsernamePasswordClient = __esm({
|
|
13374
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13413
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs"() {
|
|
13375
13414
|
"use strict";
|
|
13376
13415
|
init_dist();
|
|
13377
13416
|
_UsernamePasswordClient = class _UsernamePasswordClient extends BaseClient {
|
|
@@ -13461,10 +13500,10 @@ var init_UsernamePasswordClient = __esm({
|
|
|
13461
13500
|
}
|
|
13462
13501
|
});
|
|
13463
13502
|
|
|
13464
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13503
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs
|
|
13465
13504
|
var _ClientApplication, ClientApplication;
|
|
13466
13505
|
var init_ClientApplication = __esm({
|
|
13467
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13506
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs"() {
|
|
13468
13507
|
"use strict";
|
|
13469
13508
|
init_dist();
|
|
13470
13509
|
init_Configuration();
|
|
@@ -13790,11 +13829,11 @@ var init_ClientApplication = __esm({
|
|
|
13790
13829
|
}
|
|
13791
13830
|
});
|
|
13792
13831
|
|
|
13793
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13832
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs
|
|
13794
13833
|
import http2 from "http";
|
|
13795
13834
|
var _LoopbackClient, LoopbackClient;
|
|
13796
13835
|
var init_LoopbackClient = __esm({
|
|
13797
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13836
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs"() {
|
|
13798
13837
|
"use strict";
|
|
13799
13838
|
init_dist();
|
|
13800
13839
|
init_NodeAuthError();
|
|
@@ -13870,10 +13909,10 @@ var init_LoopbackClient = __esm({
|
|
|
13870
13909
|
}
|
|
13871
13910
|
});
|
|
13872
13911
|
|
|
13873
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13912
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs
|
|
13874
13913
|
var _DeviceCodeClient, DeviceCodeClient;
|
|
13875
13914
|
var init_DeviceCodeClient = __esm({
|
|
13876
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
13915
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs"() {
|
|
13877
13916
|
"use strict";
|
|
13878
13917
|
init_dist();
|
|
13879
13918
|
_DeviceCodeClient = class _DeviceCodeClient extends BaseClient {
|
|
@@ -14057,10 +14096,10 @@ var init_DeviceCodeClient = __esm({
|
|
|
14057
14096
|
}
|
|
14058
14097
|
});
|
|
14059
14098
|
|
|
14060
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14099
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs
|
|
14061
14100
|
var _PublicClientApplication, PublicClientApplication;
|
|
14062
14101
|
var init_PublicClientApplication = __esm({
|
|
14063
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14102
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs"() {
|
|
14064
14103
|
"use strict";
|
|
14065
14104
|
init_Constants2();
|
|
14066
14105
|
init_dist();
|
|
@@ -14127,7 +14166,7 @@ var init_PublicClientApplication = __esm({
|
|
|
14127
14166
|
* Acquires a token interactively via the browser by requesting an authorization code then exchanging it for a token.
|
|
14128
14167
|
*/
|
|
14129
14168
|
async acquireTokenInteractive(request) {
|
|
14130
|
-
var
|
|
14169
|
+
var _a2;
|
|
14131
14170
|
const correlationId = request.correlationId || this.cryptoProvider.createNewGuid();
|
|
14132
14171
|
this.logger.trace("acquireTokenInteractive called", correlationId);
|
|
14133
14172
|
const { openBrowser, successTemplate, errorTemplate, windowHandle, loopbackClient: customLoopbackClient, ...remainingProperties } = request;
|
|
@@ -14143,7 +14182,7 @@ var init_PublicClientApplication = __esm({
|
|
|
14143
14182
|
...remainingProperties.extraQueryParameters,
|
|
14144
14183
|
...remainingProperties.tokenQueryParameters
|
|
14145
14184
|
},
|
|
14146
|
-
accountId: (
|
|
14185
|
+
accountId: (_a2 = remainingProperties.account) == null ? void 0 : _a2.nativeAccountId
|
|
14147
14186
|
};
|
|
14148
14187
|
return this.nativeBrokerPlugin.acquireTokenInteractive(brokerRequest, windowHandle);
|
|
14149
14188
|
}
|
|
@@ -14278,10 +14317,10 @@ var init_PublicClientApplication = __esm({
|
|
|
14278
14317
|
}
|
|
14279
14318
|
});
|
|
14280
14319
|
|
|
14281
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14320
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs
|
|
14282
14321
|
var _ClientCredentialClient, ClientCredentialClient;
|
|
14283
14322
|
var init_ClientCredentialClient = __esm({
|
|
14284
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14323
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs"() {
|
|
14285
14324
|
"use strict";
|
|
14286
14325
|
init_dist();
|
|
14287
14326
|
_ClientCredentialClient = class _ClientCredentialClient extends BaseClient {
|
|
@@ -14313,7 +14352,7 @@ var init_ClientCredentialClient = __esm({
|
|
|
14313
14352
|
* looks up cache if the tokens are cached already
|
|
14314
14353
|
*/
|
|
14315
14354
|
async getCachedAuthenticationResult(request, config, cryptoUtils, authority, cacheManager, serverTelemetryManager) {
|
|
14316
|
-
var
|
|
14355
|
+
var _a2, _b2;
|
|
14317
14356
|
const clientConfiguration = config;
|
|
14318
14357
|
const managedIdentityConfiguration = config;
|
|
14319
14358
|
let lastCacheOutcome = CacheOutcome.NOT_APPLICABLE;
|
|
@@ -14322,7 +14361,7 @@ var init_ClientCredentialClient = __esm({
|
|
|
14322
14361
|
cacheContext = new TokenCacheContext(clientConfiguration.serializableCache, false);
|
|
14323
14362
|
await clientConfiguration.persistencePlugin.beforeCacheAccess(cacheContext);
|
|
14324
14363
|
}
|
|
14325
|
-
const cachedAccessToken = this.readAccessTokenFromCache(authority, ((
|
|
14364
|
+
const cachedAccessToken = this.readAccessTokenFromCache(authority, ((_a2 = managedIdentityConfiguration.managedIdentityId) == null ? void 0 : _a2.id) || clientConfiguration.authOptions.clientId, new ScopeSet(request.scopes || []), cacheManager);
|
|
14326
14365
|
if (clientConfiguration.serializableCache && clientConfiguration.persistencePlugin && cacheContext) {
|
|
14327
14366
|
await clientConfiguration.persistencePlugin.afterCacheAccess(cacheContext);
|
|
14328
14367
|
}
|
|
@@ -14330,7 +14369,7 @@ var init_ClientCredentialClient = __esm({
|
|
|
14330
14369
|
serverTelemetryManager == null ? void 0 : serverTelemetryManager.setCacheOutcome(CacheOutcome.NO_CACHED_ACCESS_TOKEN);
|
|
14331
14370
|
return [null, CacheOutcome.NO_CACHED_ACCESS_TOKEN];
|
|
14332
14371
|
}
|
|
14333
|
-
if (TimeUtils_exports.isTokenExpired(cachedAccessToken.expiresOn, ((
|
|
14372
|
+
if (TimeUtils_exports.isTokenExpired(cachedAccessToken.expiresOn, ((_b2 = clientConfiguration.systemOptions) == null ? void 0 : _b2.tokenRenewalOffsetSeconds) || DEFAULT_TOKEN_RENEWAL_OFFSET_SEC)) {
|
|
14334
14373
|
serverTelemetryManager == null ? void 0 : serverTelemetryManager.setCacheOutcome(CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED);
|
|
14335
14374
|
return [null, CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED];
|
|
14336
14375
|
}
|
|
@@ -14456,10 +14495,10 @@ var init_ClientCredentialClient = __esm({
|
|
|
14456
14495
|
}
|
|
14457
14496
|
});
|
|
14458
14497
|
|
|
14459
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14498
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs
|
|
14460
14499
|
var _OnBehalfOfClient, OnBehalfOfClient;
|
|
14461
14500
|
var init_OnBehalfOfClient = __esm({
|
|
14462
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14501
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs"() {
|
|
14463
14502
|
"use strict";
|
|
14464
14503
|
init_dist();
|
|
14465
14504
|
init_EncodingUtils();
|
|
@@ -14492,14 +14531,14 @@ var init_OnBehalfOfClient = __esm({
|
|
|
14492
14531
|
* @param request
|
|
14493
14532
|
*/
|
|
14494
14533
|
async getCachedAuthenticationResult(request) {
|
|
14495
|
-
var
|
|
14534
|
+
var _a2, _b2;
|
|
14496
14535
|
const cachedAccessToken = this.readAccessTokenFromCacheForOBO(this.config.authOptions.clientId, request);
|
|
14497
14536
|
if (!cachedAccessToken) {
|
|
14498
|
-
(
|
|
14537
|
+
(_a2 = this.serverTelemetryManager) == null ? void 0 : _a2.setCacheOutcome(CacheOutcome.NO_CACHED_ACCESS_TOKEN);
|
|
14499
14538
|
this.logger.info("SilentFlowClient:acquireCachedToken - No access token found in cache for the given properties.");
|
|
14500
14539
|
throw createClientAuthError(ClientAuthErrorCodes_exports.tokenRefreshRequired);
|
|
14501
14540
|
} else if (TimeUtils_exports.isTokenExpired(cachedAccessToken.expiresOn, this.config.systemOptions.tokenRenewalOffsetSeconds)) {
|
|
14502
|
-
(
|
|
14541
|
+
(_b2 = this.serverTelemetryManager) == null ? void 0 : _b2.setCacheOutcome(CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED);
|
|
14503
14542
|
this.logger.info(`OnbehalfofFlow:getCachedAuthenticationResult - Cached access token is expired or will expire within ${this.config.systemOptions.tokenRenewalOffsetSeconds} seconds.`);
|
|
14504
14543
|
throw createClientAuthError(ClientAuthErrorCodes_exports.tokenRefreshRequired);
|
|
14505
14544
|
}
|
|
@@ -14642,10 +14681,10 @@ var init_OnBehalfOfClient = __esm({
|
|
|
14642
14681
|
}
|
|
14643
14682
|
});
|
|
14644
14683
|
|
|
14645
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14684
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs
|
|
14646
14685
|
var _ConfidentialClientApplication, ConfidentialClientApplication;
|
|
14647
14686
|
var init_ConfidentialClientApplication = __esm({
|
|
14648
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14687
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs"() {
|
|
14649
14688
|
"use strict";
|
|
14650
14689
|
init_ClientApplication();
|
|
14651
14690
|
init_ClientAssertion();
|
|
@@ -14766,7 +14805,7 @@ var init_ConfidentialClientApplication = __esm({
|
|
|
14766
14805
|
}
|
|
14767
14806
|
}
|
|
14768
14807
|
setClientCredential(configuration) {
|
|
14769
|
-
var
|
|
14808
|
+
var _a2;
|
|
14770
14809
|
const clientSecretNotEmpty = !!configuration.auth.clientSecret;
|
|
14771
14810
|
const clientAssertionNotEmpty = !!configuration.auth.clientAssertion;
|
|
14772
14811
|
const certificate = configuration.auth.clientCertificate || {
|
|
@@ -14791,7 +14830,7 @@ var init_ConfidentialClientApplication = __esm({
|
|
|
14791
14830
|
if (!certificateNotEmpty) {
|
|
14792
14831
|
throw createClientAuthError(ClientAuthErrorCodes_exports.invalidClientCredential);
|
|
14793
14832
|
} else {
|
|
14794
|
-
this.clientAssertion = ClientAssertion.fromCertificate(certificate.thumbprint, certificate.privateKey, (
|
|
14833
|
+
this.clientAssertion = ClientAssertion.fromCertificate(certificate.thumbprint, certificate.privateKey, (_a2 = configuration.auth.clientCertificate) == null ? void 0 : _a2.x5c);
|
|
14795
14834
|
}
|
|
14796
14835
|
}
|
|
14797
14836
|
};
|
|
@@ -14800,10 +14839,10 @@ var init_ConfidentialClientApplication = __esm({
|
|
|
14800
14839
|
}
|
|
14801
14840
|
});
|
|
14802
14841
|
|
|
14803
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14842
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs
|
|
14804
14843
|
var ManagedIdentityUserAssignedIdQueryParameterNames, _BaseManagedIdentitySource, BaseManagedIdentitySource;
|
|
14805
14844
|
var init_BaseManagedIdentitySource = __esm({
|
|
14806
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14845
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs"() {
|
|
14807
14846
|
"use strict";
|
|
14808
14847
|
init_dist();
|
|
14809
14848
|
init_Constants2();
|
|
@@ -14903,10 +14942,10 @@ var init_BaseManagedIdentitySource = __esm({
|
|
|
14903
14942
|
}
|
|
14904
14943
|
});
|
|
14905
14944
|
|
|
14906
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14945
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs
|
|
14907
14946
|
var _ManagedIdentityRequestParameters, ManagedIdentityRequestParameters;
|
|
14908
14947
|
var init_ManagedIdentityRequestParameters = __esm({
|
|
14909
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14948
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs"() {
|
|
14910
14949
|
"use strict";
|
|
14911
14950
|
init_dist();
|
|
14912
14951
|
_ManagedIdentityRequestParameters = class _ManagedIdentityRequestParameters {
|
|
@@ -14938,10 +14977,10 @@ var init_ManagedIdentityRequestParameters = __esm({
|
|
|
14938
14977
|
}
|
|
14939
14978
|
});
|
|
14940
14979
|
|
|
14941
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14980
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs
|
|
14942
14981
|
var APP_SERVICE_MSI_API_VERSION, _AppService, AppService;
|
|
14943
14982
|
var init_AppService = __esm({
|
|
14944
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14983
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs"() {
|
|
14945
14984
|
"use strict";
|
|
14946
14985
|
init_BaseManagedIdentitySource();
|
|
14947
14986
|
init_Constants2();
|
|
@@ -14984,11 +15023,12 @@ var init_AppService = __esm({
|
|
|
14984
15023
|
}
|
|
14985
15024
|
});
|
|
14986
15025
|
|
|
14987
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
14988
|
-
import { readFileSync } from "fs";
|
|
14989
|
-
|
|
15026
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs
|
|
15027
|
+
import { statSync, readFileSync } from "fs";
|
|
15028
|
+
import path from "path";
|
|
15029
|
+
var ARC_API_VERSION, SUPPORTED_AZURE_ARC_PLATFORMS, _AzureArc, AzureArc;
|
|
14990
15030
|
var init_AzureArc = __esm({
|
|
14991
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15031
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs"() {
|
|
14992
15032
|
"use strict";
|
|
14993
15033
|
init_dist();
|
|
14994
15034
|
init_ManagedIdentityRequestParameters();
|
|
@@ -14997,6 +15037,10 @@ var init_AzureArc = __esm({
|
|
|
14997
15037
|
init_Constants2();
|
|
14998
15038
|
init_ManagedIdentityErrorCodes();
|
|
14999
15039
|
ARC_API_VERSION = "2019-11-01";
|
|
15040
|
+
SUPPORTED_AZURE_ARC_PLATFORMS = {
|
|
15041
|
+
win32: `${process.env["ProgramData"]}\\AzureConnectedMachineAgent\\Tokens\\`,
|
|
15042
|
+
linux: "/var/opt/azcmagent/tokens/"
|
|
15043
|
+
};
|
|
15000
15044
|
_AzureArc = class _AzureArc extends BaseManagedIdentitySource {
|
|
15001
15045
|
constructor(logger, nodeStorage, networkClient, cryptoProvider, identityEndpoint) {
|
|
15002
15046
|
super(logger, nodeStorage, networkClient, cryptoProvider);
|
|
@@ -15039,10 +15083,30 @@ var init_AzureArc = __esm({
|
|
|
15039
15083
|
if (!wwwAuthHeader.includes("Basic realm=")) {
|
|
15040
15084
|
throw createManagedIdentityError(wwwAuthenticateHeaderUnsupportedFormat);
|
|
15041
15085
|
}
|
|
15042
|
-
const
|
|
15086
|
+
const secretFilePath = wwwAuthHeader.split("Basic realm=")[1];
|
|
15087
|
+
if (!SUPPORTED_AZURE_ARC_PLATFORMS.hasOwnProperty(process.platform)) {
|
|
15088
|
+
throw createManagedIdentityError(platformNotSupported);
|
|
15089
|
+
}
|
|
15090
|
+
const expectedSecretFilePath = SUPPORTED_AZURE_ARC_PLATFORMS[process.platform];
|
|
15091
|
+
const fileName = path.basename(secretFilePath);
|
|
15092
|
+
if (!fileName.endsWith(".key")) {
|
|
15093
|
+
throw createManagedIdentityError(invalidFileExtension);
|
|
15094
|
+
}
|
|
15095
|
+
if (expectedSecretFilePath + fileName !== secretFilePath) {
|
|
15096
|
+
throw createManagedIdentityError(invalidFilePath);
|
|
15097
|
+
}
|
|
15098
|
+
let secretFileSize;
|
|
15099
|
+
try {
|
|
15100
|
+
secretFileSize = await statSync(secretFilePath).size;
|
|
15101
|
+
} catch (e) {
|
|
15102
|
+
throw createManagedIdentityError(unableToReadSecretFile);
|
|
15103
|
+
}
|
|
15104
|
+
if (secretFileSize > AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES) {
|
|
15105
|
+
throw createManagedIdentityError(invalidSecret);
|
|
15106
|
+
}
|
|
15043
15107
|
let secret;
|
|
15044
15108
|
try {
|
|
15045
|
-
secret = readFileSync(
|
|
15109
|
+
secret = readFileSync(secretFilePath, "utf-8");
|
|
15046
15110
|
} catch (e) {
|
|
15047
15111
|
throw createManagedIdentityError(unableToReadSecretFile);
|
|
15048
15112
|
}
|
|
@@ -15067,10 +15131,10 @@ var init_AzureArc = __esm({
|
|
|
15067
15131
|
}
|
|
15068
15132
|
});
|
|
15069
15133
|
|
|
15070
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15134
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs
|
|
15071
15135
|
var _CloudShell, CloudShell;
|
|
15072
15136
|
var init_CloudShell = __esm({
|
|
15073
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15137
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs"() {
|
|
15074
15138
|
"use strict";
|
|
15075
15139
|
init_ManagedIdentityRequestParameters();
|
|
15076
15140
|
init_BaseManagedIdentitySource();
|
|
@@ -15111,10 +15175,10 @@ var init_CloudShell = __esm({
|
|
|
15111
15175
|
}
|
|
15112
15176
|
});
|
|
15113
15177
|
|
|
15114
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15178
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs
|
|
15115
15179
|
var IMDS_TOKEN_PATH, DEFAULT_IMDS_ENDPOINT, IMDS_API_VERSION, _Imds, Imds;
|
|
15116
15180
|
var init_Imds = __esm({
|
|
15117
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15181
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs"() {
|
|
15118
15182
|
"use strict";
|
|
15119
15183
|
init_ManagedIdentityRequestParameters();
|
|
15120
15184
|
init_BaseManagedIdentitySource();
|
|
@@ -15154,10 +15218,10 @@ var init_Imds = __esm({
|
|
|
15154
15218
|
}
|
|
15155
15219
|
});
|
|
15156
15220
|
|
|
15157
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15221
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs
|
|
15158
15222
|
var SERVICE_FABRIC_MSI_API_VERSION, _ServiceFabric, ServiceFabric;
|
|
15159
15223
|
var init_ServiceFabric = __esm({
|
|
15160
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15224
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs"() {
|
|
15161
15225
|
"use strict";
|
|
15162
15226
|
init_ManagedIdentityRequestParameters();
|
|
15163
15227
|
init_BaseManagedIdentitySource();
|
|
@@ -15204,10 +15268,10 @@ var init_ServiceFabric = __esm({
|
|
|
15204
15268
|
}
|
|
15205
15269
|
});
|
|
15206
15270
|
|
|
15207
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15271
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs
|
|
15208
15272
|
var _ManagedIdentityClient, ManagedIdentityClient;
|
|
15209
15273
|
var init_ManagedIdentityClient = __esm({
|
|
15210
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15274
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs"() {
|
|
15211
15275
|
"use strict";
|
|
15212
15276
|
init_AppService();
|
|
15213
15277
|
init_AzureArc();
|
|
@@ -15260,10 +15324,10 @@ var init_ManagedIdentityClient = __esm({
|
|
|
15260
15324
|
}
|
|
15261
15325
|
});
|
|
15262
15326
|
|
|
15263
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15327
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs
|
|
15264
15328
|
var _ManagedIdentityApplication, ManagedIdentityApplication;
|
|
15265
15329
|
var init_ManagedIdentityApplication = __esm({
|
|
15266
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15330
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs"() {
|
|
15267
15331
|
"use strict";
|
|
15268
15332
|
init_dist();
|
|
15269
15333
|
init_Configuration();
|
|
@@ -15356,10 +15420,10 @@ var init_ManagedIdentityApplication = __esm({
|
|
|
15356
15420
|
}
|
|
15357
15421
|
});
|
|
15358
15422
|
|
|
15359
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15423
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs
|
|
15360
15424
|
var _DistributedCachePlugin, DistributedCachePlugin;
|
|
15361
15425
|
var init_DistributedCachePlugin = __esm({
|
|
15362
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15426
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs"() {
|
|
15363
15427
|
"use strict";
|
|
15364
15428
|
init_dist();
|
|
15365
15429
|
_DistributedCachePlugin = class _DistributedCachePlugin {
|
|
@@ -15389,7 +15453,7 @@ var init_DistributedCachePlugin = __esm({
|
|
|
15389
15453
|
}
|
|
15390
15454
|
});
|
|
15391
15455
|
|
|
15392
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15456
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs
|
|
15393
15457
|
var dist_exports = {};
|
|
15394
15458
|
__export(dist_exports, {
|
|
15395
15459
|
AuthError: () => AuthError,
|
|
@@ -15431,7 +15495,7 @@ __export(dist_exports, {
|
|
|
15431
15495
|
version: () => version2
|
|
15432
15496
|
});
|
|
15433
15497
|
var init_dist2 = __esm({
|
|
15434
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.
|
|
15498
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs"() {
|
|
15435
15499
|
"use strict";
|
|
15436
15500
|
init_internals();
|
|
15437
15501
|
init_PublicClientApplication();
|
|
@@ -15458,11 +15522,11 @@ var init_dist2 = __esm({
|
|
|
15458
15522
|
var require_package15 = __commonJS({
|
|
15459
15523
|
"../../node_modules/.store/is-docker-npm-2.2.1-3f18a53aff/package/index.js"(exports, module) {
|
|
15460
15524
|
"use strict";
|
|
15461
|
-
var
|
|
15525
|
+
var fs3 = __require("fs");
|
|
15462
15526
|
var isDocker;
|
|
15463
15527
|
function hasDockerEnv() {
|
|
15464
15528
|
try {
|
|
15465
|
-
|
|
15529
|
+
fs3.statSync("/.dockerenv");
|
|
15466
15530
|
return true;
|
|
15467
15531
|
} catch (_) {
|
|
15468
15532
|
return false;
|
|
@@ -15471,7 +15535,7 @@ var require_package15 = __commonJS({
|
|
|
15471
15535
|
__name(hasDockerEnv, "hasDockerEnv");
|
|
15472
15536
|
function hasDockerCGroup() {
|
|
15473
15537
|
try {
|
|
15474
|
-
return
|
|
15538
|
+
return fs3.readFileSync("/proc/self/cgroup", "utf8").includes("docker");
|
|
15475
15539
|
} catch (_) {
|
|
15476
15540
|
return false;
|
|
15477
15541
|
}
|
|
@@ -15491,7 +15555,7 @@ var require_package16 = __commonJS({
|
|
|
15491
15555
|
"../../node_modules/.store/is-wsl-npm-2.2.0-2ba10d6393/package/index.js"(exports, module) {
|
|
15492
15556
|
"use strict";
|
|
15493
15557
|
var os = __require("os");
|
|
15494
|
-
var
|
|
15558
|
+
var fs3 = __require("fs");
|
|
15495
15559
|
var isDocker = require_package15();
|
|
15496
15560
|
var isWsl = /* @__PURE__ */ __name(() => {
|
|
15497
15561
|
if (process.platform !== "linux") {
|
|
@@ -15504,7 +15568,7 @@ var require_package16 = __commonJS({
|
|
|
15504
15568
|
return true;
|
|
15505
15569
|
}
|
|
15506
15570
|
try {
|
|
15507
|
-
return
|
|
15571
|
+
return fs3.readFileSync("/proc/version", "utf8").toLowerCase().includes("microsoft") ? !isDocker() : false;
|
|
15508
15572
|
} catch (_) {
|
|
15509
15573
|
return false;
|
|
15510
15574
|
}
|
|
@@ -15543,17 +15607,17 @@ var require_package17 = __commonJS({
|
|
|
15543
15607
|
// ../../node_modules/.store/open-npm-8.4.2-1f763e8b75/package/index.js
|
|
15544
15608
|
var require_package18 = __commonJS({
|
|
15545
15609
|
"../../node_modules/.store/open-npm-8.4.2-1f763e8b75/package/index.js"(exports, module) {
|
|
15546
|
-
var
|
|
15610
|
+
var path5 = __require("path");
|
|
15547
15611
|
var childProcess = __require("child_process");
|
|
15548
|
-
var { promises:
|
|
15612
|
+
var { promises: fs3, constants: fsConstants } = __require("fs");
|
|
15549
15613
|
var isWsl = require_package16();
|
|
15550
15614
|
var isDocker = require_package15();
|
|
15551
15615
|
var defineLazyProperty = require_package17();
|
|
15552
|
-
var localXdgOpenPath =
|
|
15616
|
+
var localXdgOpenPath = path5.join(__dirname, "xdg-open");
|
|
15553
15617
|
var { platform, arch } = process;
|
|
15554
15618
|
var hasContainerEnv = /* @__PURE__ */ __name(() => {
|
|
15555
15619
|
try {
|
|
15556
|
-
|
|
15620
|
+
fs3.statSync("/run/.containerenv");
|
|
15557
15621
|
return true;
|
|
15558
15622
|
} catch {
|
|
15559
15623
|
return false;
|
|
@@ -15577,14 +15641,14 @@ var require_package18 = __commonJS({
|
|
|
15577
15641
|
const configFilePath = "/etc/wsl.conf";
|
|
15578
15642
|
let isConfigFileExists = false;
|
|
15579
15643
|
try {
|
|
15580
|
-
await
|
|
15644
|
+
await fs3.access(configFilePath, fsConstants.F_OK);
|
|
15581
15645
|
isConfigFileExists = true;
|
|
15582
15646
|
} catch {
|
|
15583
15647
|
}
|
|
15584
15648
|
if (!isConfigFileExists) {
|
|
15585
15649
|
return defaultMountPoint;
|
|
15586
15650
|
}
|
|
15587
|
-
const configContent = await
|
|
15651
|
+
const configContent = await fs3.readFile(configFilePath, { encoding: "utf8" });
|
|
15588
15652
|
const configMountPoint = /(?<!#.*)root\s*=\s*(?<mountPoint>.*)/g.exec(configContent);
|
|
15589
15653
|
if (!configMountPoint) {
|
|
15590
15654
|
return defaultMountPoint;
|
|
@@ -15684,7 +15748,7 @@ var require_package18 = __commonJS({
|
|
|
15684
15748
|
const isBundled = !__dirname || __dirname === "/";
|
|
15685
15749
|
let exeLocalXdgOpen = false;
|
|
15686
15750
|
try {
|
|
15687
|
-
await
|
|
15751
|
+
await fs3.access(localXdgOpenPath, fsConstants.X_OK);
|
|
15688
15752
|
exeLocalXdgOpen = true;
|
|
15689
15753
|
} catch {
|
|
15690
15754
|
}
|
|
@@ -15798,9 +15862,9 @@ var require_package18 = __commonJS({
|
|
|
15798
15862
|
}
|
|
15799
15863
|
});
|
|
15800
15864
|
|
|
15801
|
-
// ../../node_modules/.store/@azure-identity-npm-4.2.
|
|
15865
|
+
// ../../node_modules/.store/@azure-identity-npm-4.2.1-857ff0b183/package/dist/index.js
|
|
15802
15866
|
var require_dist2 = __commonJS({
|
|
15803
|
-
"../../node_modules/.store/@azure-identity-npm-4.2.
|
|
15867
|
+
"../../node_modules/.store/@azure-identity-npm-4.2.1-857ff0b183/package/dist/index.js"(exports) {
|
|
15804
15868
|
"use strict";
|
|
15805
15869
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15806
15870
|
var logger$q = require_commonjs();
|
|
@@ -15809,10 +15873,11 @@ var require_dist2 = __commonJS({
|
|
|
15809
15873
|
var coreRestPipeline = require_commonjs4();
|
|
15810
15874
|
var abortController = require_dist();
|
|
15811
15875
|
var coreTracing = require_commonjs3();
|
|
15812
|
-
var
|
|
15876
|
+
var fs3 = __require("fs");
|
|
15813
15877
|
var os = __require("os");
|
|
15814
|
-
var
|
|
15878
|
+
var path5 = __require("path");
|
|
15815
15879
|
var msalCommon = (init_dist2(), __toCommonJS(dist_exports));
|
|
15880
|
+
var fs$1 = __require("node:fs");
|
|
15816
15881
|
var https2 = __require("https");
|
|
15817
15882
|
var promises = __require("fs/promises");
|
|
15818
15883
|
var child_process = __require("child_process");
|
|
@@ -15827,9 +15892,9 @@ var require_dist2 = __commonJS({
|
|
|
15827
15892
|
var d = Object.getOwnPropertyDescriptor(e, k);
|
|
15828
15893
|
Object.defineProperty(n, k, d.get ? d : {
|
|
15829
15894
|
enumerable: true,
|
|
15830
|
-
get: function() {
|
|
15895
|
+
get: /* @__PURE__ */ __name(function() {
|
|
15831
15896
|
return e[k];
|
|
15832
|
-
}
|
|
15897
|
+
}, "get")
|
|
15833
15898
|
});
|
|
15834
15899
|
}
|
|
15835
15900
|
});
|
|
@@ -15840,7 +15905,7 @@ var require_dist2 = __commonJS({
|
|
|
15840
15905
|
__name(_interopNamespaceDefault, "_interopNamespaceDefault");
|
|
15841
15906
|
var msalCommon__namespace = /* @__PURE__ */ _interopNamespaceDefault(msalCommon);
|
|
15842
15907
|
var child_process__namespace = /* @__PURE__ */ _interopNamespaceDefault(child_process);
|
|
15843
|
-
var SDK_VERSION = `4.2.
|
|
15908
|
+
var SDK_VERSION = `4.2.1`;
|
|
15844
15909
|
var DeveloperSignOnClientId = "04b07795-8ddb-461a-bbee-02f9e1bf7b46";
|
|
15845
15910
|
var DefaultTenantId = "common";
|
|
15846
15911
|
exports.AzureAuthorityHosts = void 0;
|
|
@@ -15874,11 +15939,11 @@ var require_dist2 = __commonJS({
|
|
|
15874
15939
|
}
|
|
15875
15940
|
};
|
|
15876
15941
|
function generatePluginConfiguration(options) {
|
|
15877
|
-
var
|
|
15942
|
+
var _a2, _b2, _c, _d, _e, _f, _g;
|
|
15878
15943
|
const config = {
|
|
15879
15944
|
cache: {},
|
|
15880
15945
|
broker: {
|
|
15881
|
-
isEnabled: (
|
|
15946
|
+
isEnabled: (_b2 = (_a2 = options.brokerOptions) === null || _a2 === void 0 ? void 0 : _a2.enabled) !== null && _b2 !== void 0 ? _b2 : false,
|
|
15882
15947
|
enableMsaPassthrough: (_d = (_c = options.brokerOptions) === null || _c === void 0 ? void 0 : _c.legacyEnableMsaPassthrough) !== null && _d !== void 0 ? _d : false,
|
|
15883
15948
|
parentWindowHandle: (_e = options.brokerOptions) === null || _e === void 0 ? void 0 : _e.parentWindowHandle
|
|
15884
15949
|
}
|
|
@@ -16061,14 +16126,14 @@ ${errorDetail}`);
|
|
|
16061
16126
|
}
|
|
16062
16127
|
__name(createConfigurationErrorMessage, "createConfigurationErrorMessage");
|
|
16063
16128
|
function processMultiTenantRequest(tenantId, getTokenOptions, additionallyAllowedTenantIds = [], logger2) {
|
|
16064
|
-
var
|
|
16129
|
+
var _a2;
|
|
16065
16130
|
let resolvedTenantId;
|
|
16066
16131
|
if (process.env.AZURE_IDENTITY_DISABLE_MULTITENANTAUTH) {
|
|
16067
16132
|
resolvedTenantId = tenantId;
|
|
16068
16133
|
} else if (tenantId === "adfs") {
|
|
16069
16134
|
resolvedTenantId = tenantId;
|
|
16070
16135
|
} else {
|
|
16071
|
-
resolvedTenantId = (
|
|
16136
|
+
resolvedTenantId = (_a2 = getTokenOptions === null || getTokenOptions === void 0 ? void 0 : getTokenOptions.tenantId) !== null && _a2 !== void 0 ? _a2 : tenantId;
|
|
16072
16137
|
}
|
|
16073
16138
|
if (tenantId && resolvedTenantId !== tenantId && !additionallyAllowedTenantIds.includes("*") && !additionallyAllowedTenantIds.some((t) => t.localeCompare(resolvedTenantId) === 0)) {
|
|
16074
16139
|
const message = createConfigurationErrorMessage(tenantId);
|
|
@@ -16176,9 +16241,9 @@ ${errorDetail}`);
|
|
|
16176
16241
|
__name(getIdentityClientAuthorityHost, "getIdentityClientAuthorityHost");
|
|
16177
16242
|
var _IdentityClient = class _IdentityClient extends coreClient.ServiceClient {
|
|
16178
16243
|
constructor(options) {
|
|
16179
|
-
var
|
|
16244
|
+
var _a2, _b2;
|
|
16180
16245
|
const packageDetails = `azsdk-js-identity/${SDK_VERSION}`;
|
|
16181
|
-
const userAgentPrefix = ((
|
|
16246
|
+
const userAgentPrefix = ((_a2 = options === null || options === void 0 ? void 0 : options.userAgentOptions) === null || _a2 === void 0 ? void 0 : _a2.userAgentPrefix) ? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}` : `${packageDetails}`;
|
|
16182
16247
|
const baseUri = getIdentityClientAuthorityHost(options);
|
|
16183
16248
|
if (!baseUri.startsWith("https:")) {
|
|
16184
16249
|
throw new Error("The authorityHost address must use the 'https' protocol.");
|
|
@@ -16190,7 +16255,7 @@ ${errorDetail}`);
|
|
|
16190
16255
|
}, baseUri }));
|
|
16191
16256
|
this.authorityHost = baseUri;
|
|
16192
16257
|
this.abortControllers = /* @__PURE__ */ new Map();
|
|
16193
|
-
this.allowLoggingAccountIdentifiers = (
|
|
16258
|
+
this.allowLoggingAccountIdentifiers = (_b2 = options === null || options === void 0 ? void 0 : options.loggingOptions) === null || _b2 === void 0 ? void 0 : _b2.allowLoggingAccountIdentifiers;
|
|
16194
16259
|
this.tokenCredentialOptions = Object.assign({}, options);
|
|
16195
16260
|
}
|
|
16196
16261
|
async sendTokenRequest(request) {
|
|
@@ -16292,8 +16357,8 @@ ${errorDetail}`);
|
|
|
16292
16357
|
this.abortControllers.set(key, void 0);
|
|
16293
16358
|
}
|
|
16294
16359
|
getCorrelationId(options) {
|
|
16295
|
-
var
|
|
16296
|
-
const parameter = (
|
|
16360
|
+
var _a2;
|
|
16361
|
+
const parameter = (_a2 = options === null || options === void 0 ? void 0 : options.body) === null || _a2 === void 0 ? void 0 : _a2.split("&").map((part) => part.split("=")).find(([key]) => key === "client-request-id");
|
|
16297
16362
|
return parameter && parameter.length ? parameter[1] || noCorrelationId : noCorrelationId;
|
|
16298
16363
|
}
|
|
16299
16364
|
// The MSAL network module methods follow
|
|
@@ -16400,8 +16465,8 @@ ${errorDetail}`);
|
|
|
16400
16465
|
const vsCodeFolder = "Code";
|
|
16401
16466
|
const homedir = os.homedir();
|
|
16402
16467
|
function loadProperty(...pathSegments) {
|
|
16403
|
-
const fullPath =
|
|
16404
|
-
const settings = JSON.parse(
|
|
16468
|
+
const fullPath = path5.join(...pathSegments, vsCodeFolder, ...settingsPath);
|
|
16469
|
+
const settings = JSON.parse(fs3.readFileSync(fullPath, { encoding: "utf8" }));
|
|
16405
16470
|
return settings[property];
|
|
16406
16471
|
}
|
|
16407
16472
|
__name(loadProperty, "loadProperty");
|
|
@@ -16476,7 +16541,7 @@ ${errorDetail}`);
|
|
|
16476
16541
|
* `TokenCredential` implementation might make.
|
|
16477
16542
|
*/
|
|
16478
16543
|
async getToken(scopes, options) {
|
|
16479
|
-
var
|
|
16544
|
+
var _a2, _b2;
|
|
16480
16545
|
await this.prepareOnce();
|
|
16481
16546
|
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds, logger$o) || this.tenantId;
|
|
16482
16547
|
if (findCredentials === void 0) {
|
|
@@ -16498,7 +16563,7 @@ ${errorDetail}`);
|
|
|
16498
16563
|
scopeString += " offline_access";
|
|
16499
16564
|
}
|
|
16500
16565
|
const credentials = await findCredentials();
|
|
16501
|
-
const { password: refreshToken } = (
|
|
16566
|
+
const { password: refreshToken } = (_b2 = (_a2 = credentials.find(({ account }) => account === this.cloudName)) !== null && _a2 !== void 0 ? _a2 : credentials[0]) !== null && _b2 !== void 0 ? _b2 : {};
|
|
16502
16567
|
if (refreshToken) {
|
|
16503
16568
|
const tokenResponse = await this.identityClient.refreshAccessToken(tenantId, AzureAccountClientId, scopeString, refreshToken, void 0);
|
|
16504
16569
|
if (tokenResponse) {
|
|
@@ -16679,15 +16744,6 @@ ${errorDetail}`);
|
|
|
16679
16744
|
});
|
|
16680
16745
|
}
|
|
16681
16746
|
__name(prepareRequestOptions$3, "prepareRequestOptions$3");
|
|
16682
|
-
function readFileAsync$1(path4, options) {
|
|
16683
|
-
return new Promise((resolve, reject) => fs.readFile(path4, options, (err, data) => {
|
|
16684
|
-
if (err) {
|
|
16685
|
-
reject(err);
|
|
16686
|
-
}
|
|
16687
|
-
resolve(data);
|
|
16688
|
-
}));
|
|
16689
|
-
}
|
|
16690
|
-
__name(readFileAsync$1, "readFileAsync$1");
|
|
16691
16747
|
async function filePathRequest(identityClient, requestPrepareOptions) {
|
|
16692
16748
|
const response = await identityClient.sendRequest(coreRestPipeline.createPipelineRequest(requestPrepareOptions));
|
|
16693
16749
|
if (response.status !== 401) {
|
|
@@ -16705,6 +16761,37 @@ ${errorDetail}`);
|
|
|
16705
16761
|
}
|
|
16706
16762
|
}
|
|
16707
16763
|
__name(filePathRequest, "filePathRequest");
|
|
16764
|
+
function platformToFilePath() {
|
|
16765
|
+
switch (process.platform) {
|
|
16766
|
+
case "win32":
|
|
16767
|
+
if (!process.env.PROGRAMDATA) {
|
|
16768
|
+
throw new Error(`${msiName$4}: PROGRAMDATA environment variable has no value.`);
|
|
16769
|
+
}
|
|
16770
|
+
return `${process.env.PROGRAMDATA}\\AzureConnectedMachineAgent\\Tokens`;
|
|
16771
|
+
case "linux":
|
|
16772
|
+
return "/var/opt/azcmagent/tokens";
|
|
16773
|
+
default:
|
|
16774
|
+
throw new Error(`${msiName$4}: Unsupported platform ${process.platform}.`);
|
|
16775
|
+
}
|
|
16776
|
+
}
|
|
16777
|
+
__name(platformToFilePath, "platformToFilePath");
|
|
16778
|
+
function validateKeyFile(filePath) {
|
|
16779
|
+
if (!filePath) {
|
|
16780
|
+
throw new Error(`${msiName$4}: Failed to find the token file.`);
|
|
16781
|
+
}
|
|
16782
|
+
if (!filePath.endsWith(".key")) {
|
|
16783
|
+
throw new Error(`${msiName$4}: unexpected file path from HIMDS service: ${filePath}.`);
|
|
16784
|
+
}
|
|
16785
|
+
const expectedPath = platformToFilePath();
|
|
16786
|
+
if (!filePath.startsWith(expectedPath)) {
|
|
16787
|
+
throw new Error(`${msiName$4}: unexpected file path from HIMDS service: ${filePath}.`);
|
|
16788
|
+
}
|
|
16789
|
+
const stats = fs$1.statSync(filePath);
|
|
16790
|
+
if (stats.size > 4096) {
|
|
16791
|
+
throw new Error(`${msiName$4}: The file at ${filePath} is larger than expected at ${stats.size} bytes.`);
|
|
16792
|
+
}
|
|
16793
|
+
}
|
|
16794
|
+
__name(validateKeyFile, "validateKeyFile");
|
|
16708
16795
|
var arcMsi = {
|
|
16709
16796
|
name: "arc",
|
|
16710
16797
|
async isAvailable({ scopes }) {
|
|
@@ -16720,7 +16807,7 @@ ${errorDetail}`);
|
|
|
16720
16807
|
return result;
|
|
16721
16808
|
},
|
|
16722
16809
|
async getToken(configuration, getTokenOptions = {}) {
|
|
16723
|
-
var
|
|
16810
|
+
var _a2;
|
|
16724
16811
|
const { identityClient, scopes, clientId, resourceId } = configuration;
|
|
16725
16812
|
if (clientId) {
|
|
16726
16813
|
logger$l.warning(`${msiName$4}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
|
|
@@ -16731,11 +16818,9 @@ ${errorDetail}`);
|
|
|
16731
16818
|
logger$l.info(`${msiName$4}: Authenticating.`);
|
|
16732
16819
|
const requestOptions = Object.assign(Object.assign({ disableJsonStringifyOnBody: true, deserializationMapper: void 0, abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$3(scopes, clientId, resourceId)), { allowInsecureConnection: true });
|
|
16733
16820
|
const filePath = await filePathRequest(identityClient, requestOptions);
|
|
16734
|
-
|
|
16735
|
-
|
|
16736
|
-
}
|
|
16737
|
-
const key = await readFileAsync$1(filePath, { encoding: "utf-8" });
|
|
16738
|
-
(_a = requestOptions.headers) === null || _a === void 0 ? void 0 : _a.set("Authorization", `Basic ${key}`);
|
|
16821
|
+
validateKeyFile(filePath);
|
|
16822
|
+
const key = await fs$1.promises.readFile(filePath, { encoding: "utf-8" });
|
|
16823
|
+
(_a2 = requestOptions.headers) === null || _a2 === void 0 ? void 0 : _a2.set("Authorization", `Basic ${key}`);
|
|
16739
16824
|
const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({}, requestOptions), {
|
|
16740
16825
|
// Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
|
|
16741
16826
|
allowInsecureConnection: true
|
|
@@ -17020,7 +17105,7 @@ ${errorDetail}`);
|
|
|
17020
17105
|
var msiName$1 = "ManagedIdentityCredential - IMDS";
|
|
17021
17106
|
var logger$h = credentialLogger(msiName$1);
|
|
17022
17107
|
function prepareRequestOptions(scopes, clientId, resourceId, options) {
|
|
17023
|
-
var
|
|
17108
|
+
var _a2;
|
|
17024
17109
|
const resource = mapScopesToResource(scopes);
|
|
17025
17110
|
if (!resource) {
|
|
17026
17111
|
throw new Error(`${msiName$1}: Multiple scopes are not supported.`);
|
|
@@ -17041,7 +17126,7 @@ ${errorDetail}`);
|
|
|
17041
17126
|
const params = new URLSearchParams(queryParameters);
|
|
17042
17127
|
query = `?${params.toString()}`;
|
|
17043
17128
|
}
|
|
17044
|
-
const url = new URL(imdsEndpointPath, (
|
|
17129
|
+
const url = new URL(imdsEndpointPath, (_a2 = process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) !== null && _a2 !== void 0 ? _a2 : imdsHost);
|
|
17045
17130
|
const rawHeaders = {
|
|
17046
17131
|
Accept: "application/json",
|
|
17047
17132
|
Metadata: "true"
|
|
@@ -17076,10 +17161,10 @@ ${errorDetail}`);
|
|
|
17076
17161
|
skipQuery: true
|
|
17077
17162
|
});
|
|
17078
17163
|
return tracingClient.withSpan("ManagedIdentityCredential-pingImdsEndpoint", getTokenOptions, async (options) => {
|
|
17079
|
-
var
|
|
17164
|
+
var _a2, _b2;
|
|
17080
17165
|
requestOptions.tracingOptions = options.tracingOptions;
|
|
17081
17166
|
const request = coreRestPipeline.createPipelineRequest(requestOptions);
|
|
17082
|
-
request.timeout = ((
|
|
17167
|
+
request.timeout = ((_a2 = options.requestOptions) === null || _a2 === void 0 ? void 0 : _a2.timeout) || 1e3;
|
|
17083
17168
|
request.allowInsecureConnection = true;
|
|
17084
17169
|
let response;
|
|
17085
17170
|
try {
|
|
@@ -17093,7 +17178,7 @@ ${errorDetail}`);
|
|
|
17093
17178
|
return false;
|
|
17094
17179
|
}
|
|
17095
17180
|
if (response.status === 403) {
|
|
17096
|
-
if ((
|
|
17181
|
+
if ((_b2 = response.bodyAsText) === null || _b2 === void 0 ? void 0 : _b2.includes("unreachable")) {
|
|
17097
17182
|
logger$h.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
|
|
17098
17183
|
logger$h.info(`${msiName$1}: ${response.bodyAsText}`);
|
|
17099
17184
|
return false;
|
|
@@ -17185,9 +17270,9 @@ ${errorDetail}`);
|
|
|
17185
17270
|
RegionalAuthority2["GovernmentUSDodCentral"] = "usdodcentral";
|
|
17186
17271
|
})(RegionalAuthority || (RegionalAuthority = {}));
|
|
17187
17272
|
function calculateRegionalAuthority(regionalAuthority) {
|
|
17188
|
-
var
|
|
17273
|
+
var _a2, _b2;
|
|
17189
17274
|
let azureRegion = regionalAuthority;
|
|
17190
|
-
if (azureRegion === void 0 && ((
|
|
17275
|
+
if (azureRegion === void 0 && ((_b2 = (_a2 = globalThis.process) === null || _a2 === void 0 ? void 0 : _a2.env) === null || _b2 === void 0 ? void 0 : _b2.AZURE_REGIONAL_AUTHORITY_NAME) !== void 0) {
|
|
17191
17276
|
azureRegion = process.env.AZURE_REGIONAL_AUTHORITY_NAME;
|
|
17192
17277
|
}
|
|
17193
17278
|
if (azureRegion === RegionalAuthority.AutoDiscoverRegion) {
|
|
@@ -17198,9 +17283,9 @@ ${errorDetail}`);
|
|
|
17198
17283
|
__name(calculateRegionalAuthority, "calculateRegionalAuthority");
|
|
17199
17284
|
var msalLogger = credentialLogger("MsalClient");
|
|
17200
17285
|
function generateMsalConfiguration(clientId, tenantId, msalClientOptions = {}) {
|
|
17201
|
-
var
|
|
17286
|
+
var _a2, _b2, _c;
|
|
17202
17287
|
const resolvedTenant = resolveTenantId(msalLogger, tenantId, clientId);
|
|
17203
|
-
const authority = getAuthority(resolvedTenant, (
|
|
17288
|
+
const authority = getAuthority(resolvedTenant, (_a2 = msalClientOptions.authorityHost) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_AUTHORITY_HOST);
|
|
17204
17289
|
const httpClient = new IdentityClient(Object.assign(Object.assign({}, msalClientOptions.tokenCredentialOptions), { authorityHost: authority, loggingOptions: msalClientOptions.loggingOptions }));
|
|
17205
17290
|
const msalConfig = {
|
|
17206
17291
|
auth: {
|
|
@@ -17211,7 +17296,7 @@ ${errorDetail}`);
|
|
|
17211
17296
|
system: {
|
|
17212
17297
|
networkClient: httpClient,
|
|
17213
17298
|
loggerOptions: {
|
|
17214
|
-
loggerCallback: defaultLoggerCallback((
|
|
17299
|
+
loggerCallback: defaultLoggerCallback((_b2 = msalClientOptions.logger) !== null && _b2 !== void 0 ? _b2 : msalLogger),
|
|
17215
17300
|
logLevel: getMSALLogLevel(logger$q.getLogLevel()),
|
|
17216
17301
|
piiLoggingEnabled: (_c = msalClientOptions.loggingOptions) === null || _c === void 0 ? void 0 : _c.enableUnsafeSupportLogging
|
|
17217
17302
|
}
|
|
@@ -17279,7 +17364,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17279
17364
|
}
|
|
17280
17365
|
__name(getTokenSilent, "getTokenSilent");
|
|
17281
17366
|
async function withSilentAuthentication(msalApp, scopes, options, onAuthenticationRequired) {
|
|
17282
|
-
var
|
|
17367
|
+
var _a2;
|
|
17283
17368
|
let response = null;
|
|
17284
17369
|
try {
|
|
17285
17370
|
response = await getTokenSilent(msalApp, scopes, options);
|
|
@@ -17303,7 +17388,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17303
17388
|
}
|
|
17304
17389
|
}
|
|
17305
17390
|
ensureValidMsalToken(scopes, response, options);
|
|
17306
|
-
state.cachedAccount = (
|
|
17391
|
+
state.cachedAccount = (_a2 = response === null || response === void 0 ? void 0 : response.account) !== null && _a2 !== void 0 ? _a2 : null;
|
|
17307
17392
|
msalLogger.getToken.info(formatSuccess(scopes));
|
|
17308
17393
|
return {
|
|
17309
17394
|
token: response.accessToken,
|
|
@@ -17499,7 +17584,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17499
17584
|
* @hidden
|
|
17500
17585
|
*/
|
|
17501
17586
|
constructor(clientIdOrOptions, options) {
|
|
17502
|
-
var
|
|
17587
|
+
var _a2, _b2;
|
|
17503
17588
|
this.isEndpointUnavailable = null;
|
|
17504
17589
|
this.isAppTokenProviderInitialized = false;
|
|
17505
17590
|
this.msiRetryConfig = {
|
|
@@ -17519,7 +17604,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17519
17604
|
if (this.clientId && this.resourceId) {
|
|
17520
17605
|
throw new Error(`${_ManagedIdentityCredential.name} - Client Id and Resource Id can't be provided at the same time.`);
|
|
17521
17606
|
}
|
|
17522
|
-
if (((
|
|
17607
|
+
if (((_a2 = _options === null || _options === void 0 ? void 0 : _options.retryOptions) === null || _a2 === void 0 ? void 0 : _a2.maxRetries) !== void 0) {
|
|
17523
17608
|
this.msiRetryConfig.maxRetries = _options.retryOptions.maxRetries;
|
|
17524
17609
|
}
|
|
17525
17610
|
this.identityClient = new IdentityClient(_options);
|
|
@@ -17529,7 +17614,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17529
17614
|
this.confidentialApp = new msalCommon.ConfidentialClientApplication({
|
|
17530
17615
|
auth: {
|
|
17531
17616
|
authority: "https://login.microsoftonline.com/managed_identity",
|
|
17532
|
-
clientId: (
|
|
17617
|
+
clientId: (_b2 = this.clientId) !== null && _b2 !== void 0 ? _b2 : DeveloperSignOnClientId,
|
|
17533
17618
|
clientSecret: "dummy-secret",
|
|
17534
17619
|
cloudDiscoveryMetadata: '{"tenant_discovery_endpoint":"https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration","api-version":"1.1","metadata":[{"preferred_network":"login.microsoftonline.com","preferred_cache":"login.windows.net","aliases":["login.microsoftonline.com","login.windows.net","login.microsoft.com","sts.windows.net"]},{"preferred_network":"login.partner.microsoftonline.cn","preferred_cache":"login.partner.microsoftonline.cn","aliases":["login.partner.microsoftonline.cn","login.chinacloudapi.cn"]},{"preferred_network":"login.microsoftonline.de","preferred_cache":"login.microsoftonline.de","aliases":["login.microsoftonline.de"]},{"preferred_network":"login.microsoftonline.us","preferred_cache":"login.microsoftonline.us","aliases":["login.microsoftonline.us","login.usgovcloudapi.net"]},{"preferred_network":"login-us.microsoftonline.com","preferred_cache":"login-us.microsoftonline.com","aliases":["login-us.microsoftonline.com"]}]}',
|
|
17535
17620
|
authorityMetadata: '{"token_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/token","token_endpoint_auth_methods_supported":["client_secret_post","private_key_jwt","client_secret_basic"],"jwks_uri":"https://login.microsoftonline.com/common/discovery/v2.0/keys","response_modes_supported":["query","fragment","form_post"],"subject_types_supported":["pairwise"],"id_token_signing_alg_values_supported":["RS256"],"response_types_supported":["code","id_token","code id_token","id_token token"],"scopes_supported":["openid","profile","email","offline_access"],"issuer":"https://login.microsoftonline.com/{tenantid}/v2.0","request_uri_parameter_supported":false,"userinfo_endpoint":"https://graph.microsoft.com/oidc/userinfo","authorization_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/authorize","device_authorization_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/devicecode","http_logout_supported":true,"frontchannel_logout_supported":true,"end_session_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/logout","claims_supported":["sub","iss","cloud_instance_name","cloud_instance_host_name","cloud_graph_host_name","msgraph_host","aud","exp","iat","auth_time","acr","nonce","preferred_username","name","tid","ver","at_hash","c_hash","email"],"kerberos_endpoint":"https://login.microsoftonline.com/common/kerberos","tenant_region_scope":null,"cloud_instance_name":"microsoftonline.com","cloud_graph_host_name":"graph.windows.net","msgraph_host":"graph.microsoft.com","rbac_url":"https://pas.windows.net"}',
|
|
@@ -17827,13 +17912,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17827
17912
|
const scope = typeof scopes === "string" ? scopes : scopes[0];
|
|
17828
17913
|
logger$c.getToken.info(`Using the scope ${scope}`);
|
|
17829
17914
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
|
|
17830
|
-
var
|
|
17915
|
+
var _a2, _b2, _c, _d;
|
|
17831
17916
|
try {
|
|
17832
17917
|
ensureValidScopeForDevTimeCreds(scope, logger$c);
|
|
17833
17918
|
const resource = getScopeResource(scope);
|
|
17834
17919
|
const obj = await cliCredentialInternals.getAzureCliAccessToken(resource, tenantId, this.timeout);
|
|
17835
|
-
const specificScope = (
|
|
17836
|
-
const isLoginError2 = ((
|
|
17920
|
+
const specificScope = (_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("(.*)az login --scope(.*)");
|
|
17921
|
+
const isLoginError2 = ((_b2 = obj.stderr) === null || _b2 === void 0 ? void 0 : _b2.match("(.*)az login(.*)")) && !specificScope;
|
|
17837
17922
|
const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("az:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'az' is not recognized"));
|
|
17838
17923
|
if (isNotInstallError) {
|
|
17839
17924
|
const error = new CredentialUnavailableError("Azure CLI could not be found. Please visit https://aka.ms/azure-cli for installation instructions and then, once installed, authenticate to your Azure account using 'az login'.");
|
|
@@ -17980,13 +18065,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17980
18065
|
}
|
|
17981
18066
|
logger$b.getToken.info(`Using the scopes ${scopes}`);
|
|
17982
18067
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
|
|
17983
|
-
var
|
|
18068
|
+
var _a2, _b2, _c, _d;
|
|
17984
18069
|
try {
|
|
17985
18070
|
scopeList.forEach((scope) => {
|
|
17986
18071
|
ensureValidScopeForDevTimeCreds(scope, logger$b);
|
|
17987
18072
|
});
|
|
17988
18073
|
const obj = await developerCliCredentialInternals.getAzdAccessToken(scopeList, tenantId, this.timeout);
|
|
17989
|
-
const isNotLoggedInError = ((
|
|
18074
|
+
const isNotLoggedInError = ((_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("not logged in, run `azd login` to login")) || ((_b2 = obj.stderr) === null || _b2 === void 0 ? void 0 : _b2.match("not logged in, run `azd auth login` to login"));
|
|
17990
18075
|
const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("azd:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'azd' is not recognized"));
|
|
17991
18076
|
if (isNotInstallError || obj.error && obj.error.code === "ENOENT") {
|
|
17992
18077
|
const error = new CredentialUnavailableError("Azure Developer CLI couldn't be found. To mitigate this issue, see the troubleshooting guidelines at https://aka.ms/azsdk/js/identity/azdevclicredential/troubleshoot.");
|
|
@@ -18382,19 +18467,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18382
18467
|
var ClientSecretCredential = _ClientSecretCredential;
|
|
18383
18468
|
var _MsalNode = class _MsalNode {
|
|
18384
18469
|
constructor(options) {
|
|
18385
|
-
var
|
|
18470
|
+
var _a2, _b2, _c, _d, _e, _f;
|
|
18386
18471
|
this.app = {};
|
|
18387
18472
|
this.caeApp = {};
|
|
18388
18473
|
this.requiresConfidential = false;
|
|
18389
18474
|
this.logger = options.logger;
|
|
18390
18475
|
this.msalConfig = this.defaultNodeMsalConfig(options);
|
|
18391
18476
|
this.tenantId = resolveTenantId(options.logger, options.tenantId, options.clientId);
|
|
18392
|
-
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds((
|
|
18477
|
+
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds((_a2 = options === null || options === void 0 ? void 0 : options.tokenCredentialOptions) === null || _a2 === void 0 ? void 0 : _a2.additionallyAllowedTenants);
|
|
18393
18478
|
this.clientId = this.msalConfig.auth.clientId;
|
|
18394
18479
|
if (options === null || options === void 0 ? void 0 : options.getAssertion) {
|
|
18395
18480
|
this.getAssertion = options.getAssertion;
|
|
18396
18481
|
}
|
|
18397
|
-
this.enableBroker = (
|
|
18482
|
+
this.enableBroker = (_b2 = options === null || options === void 0 ? void 0 : options.brokerOptions) === null || _b2 === void 0 ? void 0 : _b2.enabled;
|
|
18398
18483
|
this.enableMsaPassthrough = (_c = options === null || options === void 0 ? void 0 : options.brokerOptions) === null || _c === void 0 ? void 0 : _c.legacyEnableMsaPassthrough;
|
|
18399
18484
|
this.parentWindowHandle = (_d = options.brokerOptions) === null || _d === void 0 ? void 0 : _d.parentWindowHandle;
|
|
18400
18485
|
if (persistenceProvider !== void 0 && ((_e = options.tokenCachePersistenceOptions) === null || _e === void 0 ? void 0 : _e.enabled)) {
|
|
@@ -18425,7 +18510,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18425
18510
|
* Generates a MSAL configuration that generally works for Node.js
|
|
18426
18511
|
*/
|
|
18427
18512
|
defaultNodeMsalConfig(options) {
|
|
18428
|
-
var
|
|
18513
|
+
var _a2;
|
|
18429
18514
|
const clientId = options.clientId || DeveloperSignOnClientId;
|
|
18430
18515
|
const tenantId = resolveTenantId(options.logger, options.tenantId, options.clientId);
|
|
18431
18516
|
this.authorityHost = options.authorityHost || process.env.AZURE_AUTHORITY_HOST;
|
|
@@ -18445,7 +18530,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18445
18530
|
loggerOptions: {
|
|
18446
18531
|
loggerCallback: defaultLoggerCallback(options.logger),
|
|
18447
18532
|
logLevel: getMSALLogLevel(logger$q.getLogLevel()),
|
|
18448
|
-
piiLoggingEnabled: (
|
|
18533
|
+
piiLoggingEnabled: (_a2 = options.loggingOptions) === null || _a2 === void 0 ? void 0 : _a2.enableUnsafeSupportLogging
|
|
18449
18534
|
}
|
|
18450
18535
|
}
|
|
18451
18536
|
};
|
|
@@ -18559,7 +18644,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18559
18644
|
* Attempts to retrieve a token from cache.
|
|
18560
18645
|
*/
|
|
18561
18646
|
async getTokenSilent(scopes, options) {
|
|
18562
|
-
var
|
|
18647
|
+
var _a2, _b2, _c;
|
|
18563
18648
|
await this.getActiveAccount(options === null || options === void 0 ? void 0 : options.enableCae);
|
|
18564
18649
|
if (!this.account) {
|
|
18565
18650
|
throw new AuthenticationRequiredError({
|
|
@@ -18589,8 +18674,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18589
18674
|
}
|
|
18590
18675
|
try {
|
|
18591
18676
|
this.logger.info("Attempting to acquire token silently");
|
|
18592
|
-
await ((
|
|
18593
|
-
const response = (_c = await ((
|
|
18677
|
+
await ((_a2 = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a2 === void 0 ? void 0 : _a2.getTokenCache().getAllAccounts());
|
|
18678
|
+
const response = (_c = await ((_b2 = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b2 === void 0 ? void 0 : _b2.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
|
|
18594
18679
|
return this.handleResult(scopes, response || void 0);
|
|
18595
18680
|
} catch (err) {
|
|
18596
18681
|
throw handleMsalError(scopes, err, options);
|
|
@@ -18734,8 +18819,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18734
18819
|
"AZURE_ADDITIONALLY_ALLOWED_TENANTS"
|
|
18735
18820
|
];
|
|
18736
18821
|
function getAdditionallyAllowedTenants() {
|
|
18737
|
-
var
|
|
18738
|
-
const additionallyAllowedValues = (
|
|
18822
|
+
var _a2;
|
|
18823
|
+
const additionallyAllowedValues = (_a2 = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a2 !== void 0 ? _a2 : "";
|
|
18739
18824
|
return additionallyAllowedValues.split(";");
|
|
18740
18825
|
}
|
|
18741
18826
|
__name(getAdditionallyAllowedTenants, "getAdditionallyAllowedTenants");
|
|
@@ -18825,12 +18910,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18825
18910
|
var EnvironmentCredential = _EnvironmentCredential;
|
|
18826
18911
|
var logger$4 = credentialLogger("DefaultAzureCredential");
|
|
18827
18912
|
function createDefaultManagedIdentityCredential(options = {}) {
|
|
18828
|
-
var
|
|
18829
|
-
(
|
|
18913
|
+
var _a2, _b2, _c, _d;
|
|
18914
|
+
(_a2 = options.retryOptions) !== null && _a2 !== void 0 ? _a2 : options.retryOptions = {
|
|
18830
18915
|
maxRetries: 5,
|
|
18831
18916
|
retryDelayInMs: 800
|
|
18832
18917
|
};
|
|
18833
|
-
const managedIdentityClientId = (
|
|
18918
|
+
const managedIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_CLIENT_ID;
|
|
18834
18919
|
const workloadIdentityClientId = (_c = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _c !== void 0 ? _c : managedIdentityClientId;
|
|
18835
18920
|
const managedResourceId = options === null || options === void 0 ? void 0 : options.managedIdentityResourceId;
|
|
18836
18921
|
const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
@@ -18851,9 +18936,9 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18851
18936
|
}
|
|
18852
18937
|
__name(createDefaultManagedIdentityCredential, "createDefaultManagedIdentityCredential");
|
|
18853
18938
|
function createDefaultWorkloadIdentityCredential(options) {
|
|
18854
|
-
var
|
|
18855
|
-
const managedIdentityClientId = (
|
|
18856
|
-
const workloadIdentityClientId = (
|
|
18939
|
+
var _a2, _b2, _c;
|
|
18940
|
+
const managedIdentityClientId = (_a2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_CLIENT_ID;
|
|
18941
|
+
const workloadIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b2 !== void 0 ? _b2 : managedIdentityClientId;
|
|
18857
18942
|
const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
18858
18943
|
const tenantId = (_c = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _c !== void 0 ? _c : process.env.AZURE_TENANT_ID;
|
|
18859
18944
|
if (workloadFile && workloadIdentityClientId) {
|
|
@@ -18926,21 +19011,21 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18926
19011
|
};
|
|
18927
19012
|
var _MsalOpenBrowser = class _MsalOpenBrowser extends MsalNode {
|
|
18928
19013
|
constructor(options) {
|
|
18929
|
-
var
|
|
19014
|
+
var _a2, _b2, _c, _d;
|
|
18930
19015
|
super(options);
|
|
18931
19016
|
this.loginHint = options.loginHint;
|
|
18932
|
-
this.errorTemplate = (
|
|
18933
|
-
this.successTemplate = (
|
|
19017
|
+
this.errorTemplate = (_a2 = options.browserCustomizationOptions) === null || _a2 === void 0 ? void 0 : _a2.errorMessage;
|
|
19018
|
+
this.successTemplate = (_b2 = options.browserCustomizationOptions) === null || _b2 === void 0 ? void 0 : _b2.successMessage;
|
|
18934
19019
|
this.logger = credentialLogger("Node.js MSAL Open Browser");
|
|
18935
19020
|
this.useDefaultBrokerAccount = ((_c = options.brokerOptions) === null || _c === void 0 ? void 0 : _c.enabled) && ((_d = options.brokerOptions) === null || _d === void 0 ? void 0 : _d.useDefaultBrokerAccount);
|
|
18936
19021
|
}
|
|
18937
19022
|
async doGetToken(scopes, options = {}) {
|
|
18938
19023
|
try {
|
|
18939
19024
|
const interactiveRequest = {
|
|
18940
|
-
openBrowser: async (url) => {
|
|
19025
|
+
openBrowser: /* @__PURE__ */ __name(async (url) => {
|
|
18941
19026
|
this.logger.verbose(`Opening browser to ${url}`);
|
|
18942
19027
|
await interactiveBrowserMockable.open(url, { wait: true, newInstance: true });
|
|
18943
|
-
},
|
|
19028
|
+
}, "openBrowser"),
|
|
18944
19029
|
scopes,
|
|
18945
19030
|
authority: options === null || options === void 0 ? void 0 : options.authority,
|
|
18946
19031
|
claims: options === null || options === void 0 ? void 0 : options.claims,
|
|
@@ -18971,7 +19056,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18971
19056
|
* If the default broker account is not available, the method will fall back to interactive authentication.
|
|
18972
19057
|
*/
|
|
18973
19058
|
async doGetBrokeredToken(scopes, interactiveRequest, options) {
|
|
18974
|
-
var
|
|
19059
|
+
var _a2;
|
|
18975
19060
|
this.logger.verbose("Authentication will resume through the broker");
|
|
18976
19061
|
if (this.parentWindowHandle) {
|
|
18977
19062
|
interactiveRequest.windowHandle = Buffer.from(this.parentWindowHandle);
|
|
@@ -18979,7 +19064,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18979
19064
|
this.logger.warning("Parent window handle is not specified for the broker. This may cause unexpected behavior. Please provide the parentWindowHandle.");
|
|
18980
19065
|
}
|
|
18981
19066
|
if (this.enableMsaPassthrough) {
|
|
18982
|
-
((
|
|
19067
|
+
((_a2 = interactiveRequest.tokenQueryParameters) !== null && _a2 !== void 0 ? _a2 : interactiveRequest.tokenQueryParameters = {})["msal_request_type"] = "consumer_passthrough";
|
|
18983
19068
|
}
|
|
18984
19069
|
if (options.useDefaultBrokerAccount) {
|
|
18985
19070
|
interactiveRequest.prompt = "none";
|
|
@@ -19024,13 +19109,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19024
19109
|
* @param options - Options for configuring the client which makes the authentication requests.
|
|
19025
19110
|
*/
|
|
19026
19111
|
constructor(options) {
|
|
19027
|
-
var
|
|
19112
|
+
var _a2, _b2, _c, _d;
|
|
19028
19113
|
const redirectUri = typeof options.redirectUri === "function" ? options.redirectUri() : options.redirectUri || "http://localhost";
|
|
19029
19114
|
this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
|
|
19030
19115
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
19031
19116
|
const ibcNodeOptions = options;
|
|
19032
|
-
if ((
|
|
19033
|
-
if (!((
|
|
19117
|
+
if ((_a2 = ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.brokerOptions) === null || _a2 === void 0 ? void 0 : _a2.enabled) {
|
|
19118
|
+
if (!((_b2 = ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.brokerOptions) === null || _b2 === void 0 ? void 0 : _b2.parentWindowHandle)) {
|
|
19034
19119
|
throw new Error("In order to do WAM authentication, `parentWindowHandle` under `brokerOptions` is a required parameter");
|
|
19035
19120
|
} else {
|
|
19036
19121
|
this.msalFlow = new MsalOpenBrowser(Object.assign(Object.assign({}, options), {
|
|
@@ -19280,7 +19365,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19280
19365
|
};
|
|
19281
19366
|
__name(_AuthorizationCodeCredential, "AuthorizationCodeCredential");
|
|
19282
19367
|
var AuthorizationCodeCredential = _AuthorizationCodeCredential;
|
|
19283
|
-
var readFileAsync = util.promisify(
|
|
19368
|
+
var readFileAsync = util.promisify(fs3.readFile);
|
|
19284
19369
|
async function parseCertificate(configuration, sendCertificateChain) {
|
|
19285
19370
|
const certificateParts = {};
|
|
19286
19371
|
const certificate = configuration.certificate;
|
|
@@ -19388,19 +19473,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19388
19473
|
const pipeline = coreRestPipeline.createEmptyPipeline();
|
|
19389
19474
|
pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({ credential, scopes }));
|
|
19390
19475
|
async function getRefreshedToken() {
|
|
19391
|
-
var
|
|
19476
|
+
var _a2;
|
|
19392
19477
|
const res = await pipeline.sendRequest({
|
|
19393
|
-
sendRequest: (request) => Promise.resolve({
|
|
19478
|
+
sendRequest: /* @__PURE__ */ __name((request) => Promise.resolve({
|
|
19394
19479
|
request,
|
|
19395
19480
|
status: 200,
|
|
19396
19481
|
headers: request.headers
|
|
19397
|
-
})
|
|
19482
|
+
}), "sendRequest")
|
|
19398
19483
|
}, coreRestPipeline.createPipelineRequest({
|
|
19399
19484
|
url: "https://example.com",
|
|
19400
19485
|
abortSignal,
|
|
19401
19486
|
tracingOptions
|
|
19402
19487
|
}));
|
|
19403
|
-
const accessToken = (
|
|
19488
|
+
const accessToken = (_a2 = res.headers.get("authorization")) === null || _a2 === void 0 ? void 0 : _a2.split(" ")[1];
|
|
19404
19489
|
if (!accessToken) {
|
|
19405
19490
|
throw new Error("Failed to get access token");
|
|
19406
19491
|
}
|
|
@@ -19447,141 +19532,629 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19447
19532
|
}
|
|
19448
19533
|
});
|
|
19449
19534
|
|
|
19450
|
-
//
|
|
19451
|
-
var
|
|
19452
|
-
|
|
19453
|
-
|
|
19454
|
-
|
|
19455
|
-
|
|
19456
|
-
|
|
19457
|
-
|
|
19458
|
-
|
|
19459
|
-
|
|
19460
|
-
|
|
19461
|
-
|
|
19462
|
-
|
|
19463
|
-
|
|
19464
|
-
|
|
19465
|
-
|
|
19466
|
-
|
|
19467
|
-
|
|
19468
|
-
|
|
19469
|
-
|
|
19470
|
-
|
|
19471
|
-
|
|
19535
|
+
// src/authentication/getCredential.ts
|
|
19536
|
+
var import_identity3 = __toESM(require_dist2(), 1);
|
|
19537
|
+
|
|
19538
|
+
// src/authentication/forks/identity-cache-persistence/platforms.ts
|
|
19539
|
+
import * as path2 from "path";
|
|
19540
|
+
|
|
19541
|
+
// src/authentication/forks/msal-node-extensions/persistence/NapiRsKeyRingPersistence.ts
|
|
19542
|
+
import { Entry } from "@napi-rs/keyring";
|
|
19543
|
+
import { dirname as dirname2 } from "path";
|
|
19544
|
+
|
|
19545
|
+
// src/authentication/forks/msal-node-extensions/utils/TypeGuards.ts
|
|
19546
|
+
var isNodeError = /* @__PURE__ */ __name((error) => {
|
|
19547
|
+
return !!error && typeof error === "object" && "code" in error;
|
|
19548
|
+
}, "isNodeError");
|
|
19549
|
+
|
|
19550
|
+
// src/authentication/forks/msal-node-extensions/error/PersistenceError.ts
|
|
19551
|
+
var _PersistenceError = class _PersistenceError extends Error {
|
|
19552
|
+
constructor(errorCode, errorMessage) {
|
|
19553
|
+
const errorString = errorMessage ? `${errorCode}: ${errorMessage}` : errorCode;
|
|
19554
|
+
super(errorString);
|
|
19555
|
+
Object.setPrototypeOf(this, _PersistenceError.prototype);
|
|
19556
|
+
this.errorCode = errorCode;
|
|
19557
|
+
this.errorMessage = errorMessage;
|
|
19558
|
+
this.name = "PersistenceError";
|
|
19559
|
+
}
|
|
19560
|
+
/**
|
|
19561
|
+
* Error thrown when trying to access the file system.
|
|
19562
|
+
*/
|
|
19563
|
+
static createFileSystemError(errorCode, errorMessage) {
|
|
19564
|
+
return new _PersistenceError(errorCode, errorMessage);
|
|
19565
|
+
}
|
|
19566
|
+
/**
|
|
19567
|
+
* Error thrown when trying to encrypt or decrypt data using DPAPI on Windows.
|
|
19568
|
+
*/
|
|
19569
|
+
static createFilePersistenceWithDPAPIError(errorMessage) {
|
|
19570
|
+
return new _PersistenceError("DPAPIEncryptedFileError", errorMessage);
|
|
19571
|
+
}
|
|
19572
|
+
/**
|
|
19573
|
+
* Error thrown when using the cross platform lock.
|
|
19574
|
+
*/
|
|
19575
|
+
static createCrossPlatformLockError(errorMessage) {
|
|
19576
|
+
return new _PersistenceError("CrossPlatformLockError", errorMessage);
|
|
19577
|
+
}
|
|
19578
|
+
/**
|
|
19579
|
+
* Error thrown when trying to write, load, or delete data from NapiRsKeyRingPersistence.
|
|
19580
|
+
*/
|
|
19581
|
+
static createNapiRsKeyRingPersistenceError(errorMessage) {
|
|
19582
|
+
return new _PersistenceError("NapiRsKeyRingError", errorMessage);
|
|
19583
|
+
}
|
|
19584
|
+
/**
|
|
19585
|
+
* Throw cache persistence error
|
|
19586
|
+
*
|
|
19587
|
+
* @param errorMessage string
|
|
19588
|
+
* @returns PersistenceError
|
|
19589
|
+
*/
|
|
19590
|
+
static createCachePersistenceError(errorMessage) {
|
|
19591
|
+
return new _PersistenceError("CachePersistenceError", errorMessage);
|
|
19592
|
+
}
|
|
19593
|
+
};
|
|
19594
|
+
__name(_PersistenceError, "PersistenceError");
|
|
19595
|
+
var PersistenceError = _PersistenceError;
|
|
19596
|
+
|
|
19597
|
+
// src/authentication/forks/msal-node-extensions/utils/Constants.ts
|
|
19598
|
+
var Constants3 = {
|
|
19599
|
+
/**
|
|
19600
|
+
* An existing file was the target of an operation that required that the target not exist
|
|
19601
|
+
*/
|
|
19602
|
+
EEXIST_ERROR: "EEXIST",
|
|
19603
|
+
/**
|
|
19604
|
+
* No such file or directory: Commonly raised by fs operations to indicate that a component
|
|
19605
|
+
* of the specified pathname does not exist. No entity (file or directory) could be found
|
|
19606
|
+
* by the given path
|
|
19607
|
+
*/
|
|
19608
|
+
ENOENT_ERROR: "ENOENT",
|
|
19609
|
+
/**
|
|
19610
|
+
* Operation not permitted. An attempt was made to perform an operation that requires
|
|
19611
|
+
* elevated privileges.
|
|
19612
|
+
*/
|
|
19613
|
+
EPERM_ERROR: "EPERM",
|
|
19614
|
+
/**
|
|
19615
|
+
* Default service name for using MSAL Keytar
|
|
19616
|
+
*/
|
|
19617
|
+
DEFAULT_SERVICE_NAME: "msal-node-extensions",
|
|
19618
|
+
/**
|
|
19619
|
+
* Test data used to verify underlying persistence mechanism
|
|
19620
|
+
*/
|
|
19621
|
+
PERSISTENCE_TEST_DATA: "Dummy data to verify underlying persistence mechanism",
|
|
19622
|
+
// Name of the default cache file
|
|
19623
|
+
DEFAULT_CACHE_FILE_NAME: "cache.json"
|
|
19624
|
+
};
|
|
19625
|
+
var ErrorCodes = {
|
|
19626
|
+
INTERATION_REQUIRED_ERROR_CODE: "interaction_required",
|
|
19627
|
+
SERVER_UNAVAILABLE: "server_unavailable",
|
|
19628
|
+
UNKNOWN: "unknown_error"
|
|
19629
|
+
};
|
|
19630
|
+
|
|
19631
|
+
// src/authentication/forks/msal-node-extensions/persistence/BasePersistence.ts
|
|
19632
|
+
var _BasePersistence = class _BasePersistence {
|
|
19633
|
+
async verifyPersistence() {
|
|
19634
|
+
const persistenceValidator = await this.createForPersistenceValidation();
|
|
19635
|
+
try {
|
|
19636
|
+
await persistenceValidator.save(Constants3.PERSISTENCE_TEST_DATA);
|
|
19637
|
+
const retrievedDummyData = await persistenceValidator.load();
|
|
19638
|
+
if (!retrievedDummyData) {
|
|
19639
|
+
throw PersistenceError.createCachePersistenceError(
|
|
19640
|
+
"Persistence check failed. Data was written but it could not be read. Possible cause: on Linux, LibSecret is installed but D-Bus isn't running because it cannot be started over SSH."
|
|
19641
|
+
);
|
|
19472
19642
|
}
|
|
19473
|
-
|
|
19474
|
-
|
|
19643
|
+
if (retrievedDummyData !== Constants3.PERSISTENCE_TEST_DATA) {
|
|
19644
|
+
throw PersistenceError.createCachePersistenceError(
|
|
19645
|
+
`Persistence check failed. Data written ${Constants3.PERSISTENCE_TEST_DATA} is different from data read ${retrievedDummyData}`
|
|
19646
|
+
);
|
|
19647
|
+
}
|
|
19648
|
+
await persistenceValidator.delete();
|
|
19649
|
+
return true;
|
|
19650
|
+
} catch (e) {
|
|
19651
|
+
throw PersistenceError.createCachePersistenceError(`Verifing persistence failed with the error: ${e}`);
|
|
19475
19652
|
}
|
|
19476
|
-
|
|
19477
|
-
|
|
19478
|
-
|
|
19479
|
-
|
|
19480
|
-
|
|
19481
|
-
|
|
19482
|
-
|
|
19483
|
-
|
|
19484
|
-
|
|
19485
|
-
|
|
19486
|
-
|
|
19487
|
-
|
|
19488
|
-
|
|
19489
|
-
|
|
19490
|
-
|
|
19491
|
-
|
|
19492
|
-
|
|
19493
|
-
|
|
19494
|
-
|
|
19495
|
-
|
|
19496
|
-
|
|
19497
|
-
|
|
19498
|
-
|
|
19499
|
-
|
|
19500
|
-
|
|
19501
|
-
|
|
19502
|
-
|
|
19503
|
-
|
|
19504
|
-
|
|
19653
|
+
}
|
|
19654
|
+
};
|
|
19655
|
+
__name(_BasePersistence, "BasePersistence");
|
|
19656
|
+
var BasePersistence = _BasePersistence;
|
|
19657
|
+
|
|
19658
|
+
// src/authentication/forks/msal-node-extensions/persistence/FilePersistence.ts
|
|
19659
|
+
import { promises as fs } from "fs";
|
|
19660
|
+
import { dirname } from "path";
|
|
19661
|
+
init_dist();
|
|
19662
|
+
var _FilePersistence = class _FilePersistence extends BasePersistence {
|
|
19663
|
+
constructor(fileLocation, loggerOptions) {
|
|
19664
|
+
super();
|
|
19665
|
+
this.logger = new Logger(loggerOptions || _FilePersistence.createDefaultLoggerOptions());
|
|
19666
|
+
this.filePath = fileLocation;
|
|
19667
|
+
}
|
|
19668
|
+
static async create(fileLocation, loggerOptions) {
|
|
19669
|
+
const filePersistence = new _FilePersistence(fileLocation, loggerOptions);
|
|
19670
|
+
await filePersistence.createCacheFile();
|
|
19671
|
+
return filePersistence;
|
|
19672
|
+
}
|
|
19673
|
+
async save(contents) {
|
|
19674
|
+
try {
|
|
19675
|
+
await fs.writeFile(this.getFilePath(), contents, "utf-8");
|
|
19676
|
+
} catch (err) {
|
|
19677
|
+
if (isNodeError(err)) {
|
|
19678
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19679
|
+
} else {
|
|
19680
|
+
throw err;
|
|
19681
|
+
}
|
|
19682
|
+
}
|
|
19683
|
+
}
|
|
19684
|
+
async saveBuffer(contents) {
|
|
19685
|
+
try {
|
|
19686
|
+
await fs.writeFile(this.getFilePath(), contents);
|
|
19687
|
+
} catch (err) {
|
|
19688
|
+
if (isNodeError(err)) {
|
|
19689
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19690
|
+
} else {
|
|
19691
|
+
throw err;
|
|
19692
|
+
}
|
|
19693
|
+
}
|
|
19694
|
+
}
|
|
19695
|
+
async load() {
|
|
19696
|
+
try {
|
|
19697
|
+
return await fs.readFile(this.getFilePath(), "utf-8");
|
|
19698
|
+
} catch (err) {
|
|
19699
|
+
if (isNodeError(err)) {
|
|
19700
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19701
|
+
} else {
|
|
19702
|
+
throw err;
|
|
19505
19703
|
}
|
|
19704
|
+
}
|
|
19705
|
+
}
|
|
19706
|
+
async loadBuffer() {
|
|
19707
|
+
try {
|
|
19708
|
+
return await fs.readFile(this.getFilePath());
|
|
19709
|
+
} catch (err) {
|
|
19710
|
+
if (isNodeError(err)) {
|
|
19711
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19712
|
+
} else {
|
|
19713
|
+
throw err;
|
|
19714
|
+
}
|
|
19715
|
+
}
|
|
19716
|
+
}
|
|
19717
|
+
async delete() {
|
|
19718
|
+
try {
|
|
19719
|
+
await fs.unlink(this.getFilePath());
|
|
19720
|
+
return true;
|
|
19721
|
+
} catch (err) {
|
|
19722
|
+
if (isNodeError(err)) {
|
|
19723
|
+
if (err.code === Constants3.ENOENT_ERROR) {
|
|
19724
|
+
this.logger.warning("Cache file does not exist, so it could not be deleted");
|
|
19725
|
+
return false;
|
|
19726
|
+
}
|
|
19727
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19728
|
+
} else {
|
|
19729
|
+
throw err;
|
|
19730
|
+
}
|
|
19731
|
+
}
|
|
19732
|
+
}
|
|
19733
|
+
getFilePath() {
|
|
19734
|
+
return this.filePath;
|
|
19735
|
+
}
|
|
19736
|
+
async reloadNecessary(lastSync) {
|
|
19737
|
+
return lastSync < await this.timeLastModified();
|
|
19738
|
+
}
|
|
19739
|
+
getLogger() {
|
|
19740
|
+
return this.logger;
|
|
19741
|
+
}
|
|
19742
|
+
createForPersistenceValidation() {
|
|
19743
|
+
const testCacheFileLocation = `${dirname(this.filePath)}/test.cache`;
|
|
19744
|
+
return _FilePersistence.create(testCacheFileLocation);
|
|
19745
|
+
}
|
|
19746
|
+
static createDefaultLoggerOptions() {
|
|
19747
|
+
return {
|
|
19748
|
+
loggerCallback: /* @__PURE__ */ __name(() => {
|
|
19749
|
+
}, "loggerCallback"),
|
|
19750
|
+
piiLoggingEnabled: false,
|
|
19751
|
+
logLevel: LogLevel.Info
|
|
19506
19752
|
};
|
|
19507
|
-
|
|
19508
|
-
|
|
19753
|
+
}
|
|
19754
|
+
async timeLastModified() {
|
|
19755
|
+
try {
|
|
19756
|
+
const stats = await fs.stat(this.filePath);
|
|
19757
|
+
return stats.mtime.getTime();
|
|
19758
|
+
} catch (err) {
|
|
19759
|
+
if (isNodeError(err)) {
|
|
19760
|
+
if (err.code === Constants3.ENOENT_ERROR) {
|
|
19761
|
+
this.logger.verbose("Cache file does not exist");
|
|
19762
|
+
return 0;
|
|
19763
|
+
}
|
|
19764
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19765
|
+
} else {
|
|
19766
|
+
throw err;
|
|
19767
|
+
}
|
|
19509
19768
|
}
|
|
19510
|
-
|
|
19511
|
-
|
|
19512
|
-
|
|
19513
|
-
|
|
19514
|
-
|
|
19515
|
-
|
|
19516
|
-
|
|
19517
|
-
|
|
19518
|
-
|
|
19519
|
-
|
|
19520
|
-
|
|
19521
|
-
|
|
19522
|
-
|
|
19523
|
-
|
|
19524
|
-
|
|
19525
|
-
|
|
19769
|
+
}
|
|
19770
|
+
async createCacheFile() {
|
|
19771
|
+
await this.createFileDirectory();
|
|
19772
|
+
const fileHandle = await fs.open(this.filePath, "a");
|
|
19773
|
+
await fileHandle.close();
|
|
19774
|
+
this.logger.info(`File created at ${this.filePath}`);
|
|
19775
|
+
}
|
|
19776
|
+
async createFileDirectory() {
|
|
19777
|
+
try {
|
|
19778
|
+
await fs.mkdir(dirname(this.filePath), { recursive: true });
|
|
19779
|
+
} catch (err) {
|
|
19780
|
+
if (isNodeError(err)) {
|
|
19781
|
+
if (err.code === Constants3.EEXIST_ERROR) {
|
|
19782
|
+
this.logger.info(`Directory ${dirname(this.filePath)} already exists`);
|
|
19783
|
+
} else {
|
|
19784
|
+
throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
|
|
19526
19785
|
}
|
|
19527
|
-
}
|
|
19528
|
-
|
|
19529
|
-
|
|
19530
|
-
|
|
19531
|
-
|
|
19532
|
-
|
|
19533
|
-
|
|
19534
|
-
|
|
19535
|
-
|
|
19536
|
-
|
|
19537
|
-
|
|
19538
|
-
|
|
19786
|
+
} else {
|
|
19787
|
+
throw err;
|
|
19788
|
+
}
|
|
19789
|
+
}
|
|
19790
|
+
}
|
|
19791
|
+
};
|
|
19792
|
+
__name(_FilePersistence, "FilePersistence");
|
|
19793
|
+
var FilePersistence = _FilePersistence;
|
|
19794
|
+
|
|
19795
|
+
// src/authentication/forks/msal-node-extensions/persistence/NapiRsKeyRingPersistence.ts
|
|
19796
|
+
var _NapiRsKeyRingPersistance = class _NapiRsKeyRingPersistance extends BasePersistence {
|
|
19797
|
+
constructor(filePersistence, service, account) {
|
|
19798
|
+
super();
|
|
19799
|
+
this.service = service;
|
|
19800
|
+
this.account = account;
|
|
19801
|
+
this.entry = new Entry(service, account);
|
|
19802
|
+
this.filePersistence = filePersistence;
|
|
19803
|
+
}
|
|
19804
|
+
static async create(fileLocation, serviceName, accountName, loggerOptions) {
|
|
19805
|
+
const filePersistence = await FilePersistence.create(fileLocation, loggerOptions);
|
|
19806
|
+
return new _NapiRsKeyRingPersistance(filePersistence, serviceName, accountName);
|
|
19807
|
+
}
|
|
19808
|
+
async save(contents) {
|
|
19809
|
+
try {
|
|
19810
|
+
this.entry.setPassword(contents);
|
|
19811
|
+
} catch (e) {
|
|
19812
|
+
if (isNodeError(e)) {
|
|
19813
|
+
throw PersistenceError.createNapiRsKeyRingPersistenceError(e.message);
|
|
19814
|
+
}
|
|
19815
|
+
throw e;
|
|
19816
|
+
}
|
|
19817
|
+
await this.filePersistence.save(contents);
|
|
19818
|
+
}
|
|
19819
|
+
load() {
|
|
19820
|
+
try {
|
|
19821
|
+
return Promise.resolve(this.entry.getPassword());
|
|
19822
|
+
} catch (e) {
|
|
19823
|
+
if (isNodeError(e)) {
|
|
19824
|
+
throw PersistenceError.createNapiRsKeyRingPersistenceError(e.message);
|
|
19825
|
+
}
|
|
19826
|
+
throw e;
|
|
19827
|
+
}
|
|
19828
|
+
}
|
|
19829
|
+
async delete() {
|
|
19830
|
+
try {
|
|
19831
|
+
await this.filePersistence.delete();
|
|
19832
|
+
return this.entry.deletePassword();
|
|
19833
|
+
} catch (e) {
|
|
19834
|
+
if (isNodeError(e)) {
|
|
19835
|
+
throw PersistenceError.createNapiRsKeyRingPersistenceError(e.message);
|
|
19836
|
+
}
|
|
19837
|
+
throw e;
|
|
19838
|
+
}
|
|
19839
|
+
}
|
|
19840
|
+
reloadNecessary(lastSync) {
|
|
19841
|
+
return this.filePersistence.reloadNecessary(lastSync);
|
|
19842
|
+
}
|
|
19843
|
+
getFilePath() {
|
|
19844
|
+
return this.filePersistence.getFilePath();
|
|
19845
|
+
}
|
|
19846
|
+
getLogger() {
|
|
19847
|
+
return this.filePersistence.getLogger();
|
|
19848
|
+
}
|
|
19849
|
+
createForPersistenceValidation() {
|
|
19850
|
+
const testCacheFileLocation = `${dirname2(this.filePersistence.getFilePath())}/test.cache`;
|
|
19851
|
+
return _NapiRsKeyRingPersistance.create(
|
|
19852
|
+
testCacheFileLocation,
|
|
19853
|
+
"persistenceValidationServiceName",
|
|
19854
|
+
"persistencValidationAccountName"
|
|
19855
|
+
);
|
|
19856
|
+
}
|
|
19857
|
+
};
|
|
19858
|
+
__name(_NapiRsKeyRingPersistance, "NapiRsKeyRingPersistance");
|
|
19859
|
+
var NapiRsKeyRingPersistance = _NapiRsKeyRingPersistance;
|
|
19860
|
+
|
|
19861
|
+
// src/authentication/forks/msal-node-extensions/persistence/FilePersistenceWithDataProtection.ts
|
|
19862
|
+
import { protectData, unprotectData } from "node-dpapi-prebuilt";
|
|
19863
|
+
import { dirname as dirname3 } from "path";
|
|
19864
|
+
var _FilePersistenceWithDataProtection = class _FilePersistenceWithDataProtection extends BasePersistence {
|
|
19865
|
+
constructor(filePersistence, scope, optionalEntropy) {
|
|
19866
|
+
super();
|
|
19867
|
+
this.scope = scope;
|
|
19868
|
+
this.optionalEntropy = optionalEntropy ? Buffer.from(optionalEntropy, "utf-8") : null;
|
|
19869
|
+
this.filePersistence = filePersistence;
|
|
19870
|
+
}
|
|
19871
|
+
static async create(fileLocation, scope, optionalEntropy, loggerOptions) {
|
|
19872
|
+
const filePersistence = await FilePersistence.create(fileLocation, loggerOptions);
|
|
19873
|
+
const persistence = new _FilePersistenceWithDataProtection(filePersistence, scope, optionalEntropy);
|
|
19874
|
+
return persistence;
|
|
19875
|
+
}
|
|
19876
|
+
async save(contents) {
|
|
19877
|
+
try {
|
|
19878
|
+
const encryptedContents = protectData(Buffer.from(contents, "utf-8"), this.optionalEntropy, this.scope);
|
|
19879
|
+
await this.filePersistence.saveBuffer(encryptedContents);
|
|
19880
|
+
} catch (err) {
|
|
19881
|
+
if (isNodeError(err)) {
|
|
19882
|
+
throw PersistenceError.createFilePersistenceWithDPAPIError(err.message);
|
|
19883
|
+
} else {
|
|
19884
|
+
throw err;
|
|
19885
|
+
}
|
|
19886
|
+
}
|
|
19887
|
+
}
|
|
19888
|
+
async load() {
|
|
19889
|
+
try {
|
|
19890
|
+
const encryptedContents = await this.filePersistence.loadBuffer();
|
|
19891
|
+
if (typeof encryptedContents === "undefined" || !encryptedContents || 0 === encryptedContents.length) {
|
|
19892
|
+
this.filePersistence.getLogger().info("Encrypted contents loaded from file were null or empty");
|
|
19893
|
+
return null;
|
|
19894
|
+
}
|
|
19895
|
+
return unprotectData(encryptedContents, this.optionalEntropy, this.scope).toString();
|
|
19896
|
+
} catch (err) {
|
|
19897
|
+
if (isNodeError(err)) {
|
|
19898
|
+
throw PersistenceError.createFilePersistenceWithDPAPIError(err.message);
|
|
19899
|
+
} else {
|
|
19900
|
+
throw err;
|
|
19901
|
+
}
|
|
19902
|
+
}
|
|
19903
|
+
}
|
|
19904
|
+
async delete() {
|
|
19905
|
+
return this.filePersistence.delete();
|
|
19906
|
+
}
|
|
19907
|
+
async reloadNecessary(lastSync) {
|
|
19908
|
+
return this.filePersistence.reloadNecessary(lastSync);
|
|
19909
|
+
}
|
|
19910
|
+
getFilePath() {
|
|
19911
|
+
return this.filePersistence.getFilePath();
|
|
19912
|
+
}
|
|
19913
|
+
getLogger() {
|
|
19914
|
+
return this.filePersistence.getLogger();
|
|
19915
|
+
}
|
|
19916
|
+
createForPersistenceValidation() {
|
|
19917
|
+
const testCacheFileLocation = `${dirname3(this.filePersistence.getFilePath())}/test.cache`;
|
|
19918
|
+
return _FilePersistenceWithDataProtection.create(testCacheFileLocation, "CurrentUser");
|
|
19919
|
+
}
|
|
19920
|
+
};
|
|
19921
|
+
__name(_FilePersistenceWithDataProtection, "FilePersistenceWithDataProtection");
|
|
19922
|
+
var FilePersistenceWithDataProtection = _FilePersistenceWithDataProtection;
|
|
19923
|
+
|
|
19924
|
+
// src/authentication/forks/identity-cache-persistence/platforms.ts
|
|
19925
|
+
var _a, _b;
|
|
19926
|
+
var localApplicationDataFolder = ((_b = (_a = process.env.APPDATA) == null ? void 0 : _a.replace) == null ? void 0 : _b.call(_a, /(.Roaming)*$/, "\\Local")) ?? process.env.HOME;
|
|
19927
|
+
var defaultMsalValues = {
|
|
19928
|
+
tokenCache: {
|
|
19929
|
+
name: "msal.cache",
|
|
19930
|
+
// Expected values:
|
|
19931
|
+
// - Darwin: '/Users/user/.IdentityService'
|
|
19932
|
+
// - Windows 8+: 'C:\Users\user\AppData\Local\.IdentityService'
|
|
19933
|
+
// - Linux: '/home/user/.IdentityService'
|
|
19934
|
+
directory: path2.join(localApplicationDataFolder, ".IdentityService")
|
|
19935
|
+
},
|
|
19936
|
+
keyRing: {
|
|
19937
|
+
label: "MSALCache",
|
|
19938
|
+
schema: "msal.cache",
|
|
19939
|
+
collection: "default",
|
|
19940
|
+
attributes: {
|
|
19941
|
+
MsalClientID: "Microsoft.Developer.IdentityService",
|
|
19942
|
+
"Microsoft.Developer.IdentityService": "1.0.0.0"
|
|
19943
|
+
},
|
|
19944
|
+
service: "Microsoft.Developer.IdentityService",
|
|
19945
|
+
account: "MSALCache"
|
|
19946
|
+
},
|
|
19947
|
+
keyChain: {
|
|
19948
|
+
service: "Microsoft.Developer.IdentityService",
|
|
19949
|
+
account: "MSALCache"
|
|
19950
|
+
}
|
|
19951
|
+
};
|
|
19952
|
+
function getPersistencePath(name3) {
|
|
19953
|
+
return path2.join(defaultMsalValues.tokenCache.directory, name3);
|
|
19954
|
+
}
|
|
19955
|
+
__name(getPersistencePath, "getPersistencePath");
|
|
19956
|
+
async function persistanceFactory(options = {}) {
|
|
19957
|
+
const { name: name3, unsafeAllowUnencryptedStorage } = options;
|
|
19958
|
+
const { service, account } = defaultMsalValues.keyChain;
|
|
19959
|
+
const persistencePath = getPersistencePath(name3 || defaultMsalValues.tokenCache.name);
|
|
19960
|
+
try {
|
|
19961
|
+
const persistence = await NapiRsKeyRingPersistance.create(persistencePath, `${service}.${name3}`, account);
|
|
19962
|
+
await persistence.load();
|
|
19963
|
+
return persistence;
|
|
19964
|
+
} catch (e) {
|
|
19965
|
+
if (!unsafeAllowUnencryptedStorage) {
|
|
19966
|
+
throw new Error("Unable to read from the NAPI keyring.");
|
|
19967
|
+
}
|
|
19968
|
+
return FilePersistence.create(persistencePath);
|
|
19969
|
+
}
|
|
19970
|
+
}
|
|
19971
|
+
__name(persistanceFactory, "persistanceFactory");
|
|
19972
|
+
var msalPersistencePlatforms = {
|
|
19973
|
+
win32: /* @__PURE__ */ __name(({ name: name3 = defaultMsalValues.tokenCache.name } = {}) => FilePersistenceWithDataProtection.create(getPersistencePath(name3), "CurrentUser"), "win32"),
|
|
19974
|
+
darwin: persistanceFactory,
|
|
19975
|
+
linux: persistanceFactory
|
|
19976
|
+
};
|
|
19977
|
+
|
|
19978
|
+
// src/authentication/forks/msal-node-extensions/lock/CrossPlatformLock.ts
|
|
19979
|
+
import { promises as fs2 } from "fs";
|
|
19980
|
+
import { pid } from "process";
|
|
19981
|
+
var _CrossPlatformLock = class _CrossPlatformLock {
|
|
19982
|
+
constructor(lockFilePath, logger, lockOptions) {
|
|
19983
|
+
this.lockFilePath = lockFilePath;
|
|
19984
|
+
this.retryNumber = lockOptions ? lockOptions.retryNumber : 500;
|
|
19985
|
+
this.retryDelay = lockOptions ? lockOptions.retryDelay : 100;
|
|
19986
|
+
this.logger = logger;
|
|
19987
|
+
}
|
|
19988
|
+
/**
|
|
19989
|
+
* Locks cache from read or writes by creating file with same path and name as
|
|
19990
|
+
* cache file but with .lockfile extension. If another process has already created
|
|
19991
|
+
* the lockfile, will back off and retry based on configuration settings set by CrossPlatformLockOptions
|
|
19992
|
+
*/
|
|
19993
|
+
async lock() {
|
|
19994
|
+
for (let tryCount = 0; tryCount < this.retryNumber; tryCount++) {
|
|
19995
|
+
try {
|
|
19996
|
+
this.logger.info(`Pid ${pid} trying to acquire lock`);
|
|
19997
|
+
this.lockFileHandle = await fs2.open(this.lockFilePath, "wx+");
|
|
19998
|
+
this.logger.info(`Pid ${pid} acquired lock`);
|
|
19999
|
+
await this.lockFileHandle.write(pid.toString());
|
|
20000
|
+
return;
|
|
20001
|
+
} catch (err) {
|
|
20002
|
+
if (isNodeError(err)) {
|
|
20003
|
+
if (err.code === Constants3.EEXIST_ERROR || err.code === Constants3.EPERM_ERROR) {
|
|
20004
|
+
this.logger.info(err.message);
|
|
20005
|
+
await this.sleep(this.retryDelay);
|
|
20006
|
+
} else {
|
|
20007
|
+
this.logger.error(`${pid} was not able to acquire lock. Ran into error: ${err.message}`);
|
|
20008
|
+
throw PersistenceError.createCrossPlatformLockError(err.message);
|
|
19539
20009
|
}
|
|
19540
|
-
|
|
20010
|
+
} else {
|
|
20011
|
+
throw err;
|
|
19541
20012
|
}
|
|
19542
|
-
}
|
|
19543
|
-
}
|
|
19544
|
-
|
|
19545
|
-
|
|
19546
|
-
|
|
19547
|
-
|
|
19548
|
-
|
|
19549
|
-
|
|
20013
|
+
}
|
|
20014
|
+
}
|
|
20015
|
+
this.logger.error(`${pid} was not able to acquire lock. Exceeded amount of retries set in the options`);
|
|
20016
|
+
throw PersistenceError.createCrossPlatformLockError(
|
|
20017
|
+
"Not able to acquire lock. Exceeded amount of retries set in options"
|
|
20018
|
+
);
|
|
20019
|
+
}
|
|
20020
|
+
/**
|
|
20021
|
+
* unlocks cache file by deleting .lockfile.
|
|
20022
|
+
*/
|
|
20023
|
+
async unlock() {
|
|
20024
|
+
try {
|
|
20025
|
+
if (this.lockFileHandle) {
|
|
20026
|
+
await fs2.unlink(this.lockFilePath);
|
|
20027
|
+
await this.lockFileHandle.close();
|
|
20028
|
+
this.logger.info("lockfile deleted");
|
|
20029
|
+
} else {
|
|
20030
|
+
this.logger.warning("lockfile handle does not exist, so lockfile could not be deleted");
|
|
20031
|
+
}
|
|
20032
|
+
} catch (err) {
|
|
20033
|
+
if (isNodeError(err)) {
|
|
20034
|
+
if (err.code === Constants3.ENOENT_ERROR) {
|
|
20035
|
+
this.logger.info("Tried to unlock but lockfile does not exist");
|
|
20036
|
+
} else {
|
|
20037
|
+
this.logger.error(`${pid} was not able to release lock. Ran into error: ${err.message}`);
|
|
20038
|
+
throw PersistenceError.createCrossPlatformLockError(err.message);
|
|
19550
20039
|
}
|
|
19551
|
-
|
|
19552
|
-
|
|
20040
|
+
} else {
|
|
20041
|
+
throw err;
|
|
20042
|
+
}
|
|
19553
20043
|
}
|
|
19554
|
-
|
|
19555
|
-
|
|
19556
|
-
|
|
19557
|
-
|
|
19558
|
-
|
|
19559
|
-
|
|
19560
|
-
|
|
19561
|
-
|
|
19562
|
-
|
|
20044
|
+
}
|
|
20045
|
+
sleep(ms) {
|
|
20046
|
+
return new Promise((resolve) => {
|
|
20047
|
+
setTimeout(resolve, ms);
|
|
20048
|
+
});
|
|
20049
|
+
}
|
|
20050
|
+
};
|
|
20051
|
+
__name(_CrossPlatformLock, "CrossPlatformLock");
|
|
20052
|
+
var CrossPlatformLock = _CrossPlatformLock;
|
|
20053
|
+
|
|
20054
|
+
// src/authentication/forks/msal-node-extensions/persistence/PersistenceCachePlugin.ts
|
|
20055
|
+
import { pid as pid2 } from "process";
|
|
20056
|
+
var _PersistenceCachePlugin = class _PersistenceCachePlugin {
|
|
20057
|
+
constructor(persistence, lockOptions) {
|
|
20058
|
+
this.persistence = persistence;
|
|
20059
|
+
this.logger = persistence.getLogger();
|
|
20060
|
+
this.lockFilePath = `${this.persistence.getFilePath()}.lockfile`;
|
|
20061
|
+
this.crossPlatformLock = new CrossPlatformLock(this.lockFilePath, this.logger, lockOptions);
|
|
20062
|
+
this.lastSync = 0;
|
|
20063
|
+
this.currentCache = null;
|
|
20064
|
+
}
|
|
20065
|
+
/**
|
|
20066
|
+
* Reads from storage and saves an in-memory copy. If persistence has not been updated
|
|
20067
|
+
* since last time data was read, in memory copy is used.
|
|
20068
|
+
*
|
|
20069
|
+
* If cacheContext.cacheHasChanged === true, then file lock is created and not deleted until
|
|
20070
|
+
* afterCacheAccess() is called, to prevent the cache file from changing in between
|
|
20071
|
+
* beforeCacheAccess() and afterCacheAccess().
|
|
20072
|
+
*/
|
|
20073
|
+
async beforeCacheAccess(cacheContext) {
|
|
20074
|
+
this.logger.info("Executing before cache access");
|
|
20075
|
+
const reloadNecessary = await this.persistence.reloadNecessary(this.lastSync);
|
|
20076
|
+
if (!reloadNecessary && this.currentCache !== null) {
|
|
20077
|
+
if (cacheContext.cacheHasChanged) {
|
|
20078
|
+
this.logger.verbose("Cache context has changed");
|
|
20079
|
+
await this.crossPlatformLock.lock();
|
|
20080
|
+
}
|
|
20081
|
+
return;
|
|
20082
|
+
}
|
|
20083
|
+
try {
|
|
20084
|
+
this.logger.info(`Reload necessary. Last sync time: ${this.lastSync}`);
|
|
20085
|
+
await this.crossPlatformLock.lock();
|
|
20086
|
+
this.currentCache = await this.persistence.load();
|
|
20087
|
+
this.lastSync = (/* @__PURE__ */ new Date()).getTime();
|
|
20088
|
+
if (this.currentCache) {
|
|
20089
|
+
cacheContext.tokenCache.deserialize(this.currentCache);
|
|
20090
|
+
} else {
|
|
20091
|
+
this.logger.info("Cache empty.");
|
|
20092
|
+
}
|
|
20093
|
+
this.logger.info(`Last sync time updated to: ${this.lastSync}`);
|
|
20094
|
+
} finally {
|
|
20095
|
+
if (!cacheContext.cacheHasChanged) {
|
|
20096
|
+
await this.crossPlatformLock.unlock();
|
|
20097
|
+
this.logger.info(`Pid ${pid2} released lock`);
|
|
20098
|
+
} else {
|
|
20099
|
+
this.logger.info(`Pid ${pid2} beforeCacheAccess did not release lock`);
|
|
20100
|
+
}
|
|
19563
20101
|
}
|
|
19564
|
-
__name(createPersistenceCachePlugin, "createPersistenceCachePlugin");
|
|
19565
|
-
var cachePersistencePlugin2 = /* @__PURE__ */ __name((context) => {
|
|
19566
|
-
const { cachePluginControl } = context;
|
|
19567
|
-
cachePluginControl.setPersistence(createPersistenceCachePlugin);
|
|
19568
|
-
}, "cachePersistencePlugin");
|
|
19569
|
-
exports.cachePersistencePlugin = cachePersistencePlugin2;
|
|
19570
20102
|
}
|
|
19571
|
-
|
|
20103
|
+
/**
|
|
20104
|
+
* Writes to storage if MSAL in memory copy of cache has been changed.
|
|
20105
|
+
*/
|
|
20106
|
+
async afterCacheAccess(cacheContext) {
|
|
20107
|
+
this.logger.info("Executing after cache access");
|
|
20108
|
+
try {
|
|
20109
|
+
if (cacheContext.cacheHasChanged) {
|
|
20110
|
+
this.logger.info("Msal in-memory cache has changed. Writing changes to persistence");
|
|
20111
|
+
this.currentCache = cacheContext.tokenCache.serialize();
|
|
20112
|
+
await this.persistence.save(this.currentCache);
|
|
20113
|
+
} else {
|
|
20114
|
+
this.logger.info("Msal in-memory cache has not changed. Did not write to persistence");
|
|
20115
|
+
}
|
|
20116
|
+
} finally {
|
|
20117
|
+
await this.crossPlatformLock.unlock();
|
|
20118
|
+
this.logger.info(`Pid ${pid2} afterCacheAccess released lock`);
|
|
20119
|
+
}
|
|
20120
|
+
}
|
|
20121
|
+
};
|
|
20122
|
+
__name(_PersistenceCachePlugin, "PersistenceCachePlugin");
|
|
20123
|
+
var PersistenceCachePlugin = _PersistenceCachePlugin;
|
|
20124
|
+
|
|
20125
|
+
// src/authentication/forks/identity-cache-persistence/provider.ts
|
|
20126
|
+
async function createPersistence(options) {
|
|
20127
|
+
var _a2, _b2;
|
|
20128
|
+
const persistence = await ((_b2 = (_a2 = msalPersistencePlatforms)[process.platform]) == null ? void 0 : _b2.call(_a2, options));
|
|
20129
|
+
if (persistence === void 0) {
|
|
20130
|
+
throw new Error("no persistence providers are available on this platform");
|
|
20131
|
+
}
|
|
20132
|
+
return persistence;
|
|
20133
|
+
}
|
|
20134
|
+
__name(createPersistence, "createPersistence");
|
|
20135
|
+
async function createPersistenceCachePlugin(options) {
|
|
20136
|
+
const persistence = await createPersistence(options ?? {});
|
|
20137
|
+
return new PersistenceCachePlugin(persistence, {
|
|
20138
|
+
retryNumber: 100,
|
|
20139
|
+
retryDelay: 50
|
|
20140
|
+
});
|
|
20141
|
+
}
|
|
20142
|
+
__name(createPersistenceCachePlugin, "createPersistenceCachePlugin");
|
|
19572
20143
|
|
|
19573
|
-
// src/authentication/
|
|
19574
|
-
var
|
|
19575
|
-
|
|
20144
|
+
// src/authentication/forks/identity-cache-persistence/cachePersistencePlugin.ts
|
|
20145
|
+
var cachePersistencePlugin = /* @__PURE__ */ __name((context) => {
|
|
20146
|
+
const { cachePluginControl } = context;
|
|
20147
|
+
cachePluginControl.setPersistence(createPersistenceCachePlugin);
|
|
20148
|
+
}, "cachePersistencePlugin");
|
|
19576
20149
|
|
|
19577
20150
|
// src/authentication/getAuthenticationRecord.ts
|
|
19578
20151
|
var import_identity = __toESM(require_dist2(), 1);
|
|
19579
20152
|
import { existsSync, readFileSync as readFileSync2 } from "fs";
|
|
19580
20153
|
|
|
19581
20154
|
// src/authentication/getAuthenticationRecordPath.ts
|
|
19582
|
-
import
|
|
20155
|
+
import path3 from "path";
|
|
19583
20156
|
function getAuthenticationRecordPath(cachePath) {
|
|
19584
|
-
return
|
|
20157
|
+
return path3.join(cachePath, "tokencache.bin");
|
|
19585
20158
|
}
|
|
19586
20159
|
__name(getAuthenticationRecordPath, "getAuthenticationRecordPath");
|
|
19587
20160
|
|
|
@@ -19611,7 +20184,7 @@ __name(saveAuthenticationRecord, "saveAuthenticationRecord");
|
|
|
19611
20184
|
// src/authentication/tokenCachePersistenceOptions.ts
|
|
19612
20185
|
var tokenCachePersistenceOptions = {
|
|
19613
20186
|
enabled: true,
|
|
19614
|
-
name: "
|
|
20187
|
+
name: "Cloudpack"
|
|
19615
20188
|
};
|
|
19616
20189
|
|
|
19617
20190
|
// src/utils/isProcessRunning.ts
|
|
@@ -19619,21 +20192,21 @@ function isErrorWithCode(error) {
|
|
|
19619
20192
|
return error instanceof Error && "code" in error;
|
|
19620
20193
|
}
|
|
19621
20194
|
__name(isErrorWithCode, "isErrorWithCode");
|
|
19622
|
-
function isProcessRunning(
|
|
20195
|
+
function isProcessRunning(pid3) {
|
|
19623
20196
|
try {
|
|
19624
|
-
process.kill(
|
|
20197
|
+
process.kill(pid3, 0);
|
|
19625
20198
|
return true;
|
|
19626
20199
|
} catch (error) {
|
|
19627
20200
|
if (isErrorWithCode(error) && error.code === "ERR_INVALID_ARG_TYPE") {
|
|
19628
|
-
console.log(`Invalid PID: ${
|
|
20201
|
+
console.log(`Invalid PID: ${pid3}`);
|
|
19629
20202
|
return false;
|
|
19630
20203
|
} else if (isErrorWithCode(error) && error.code === "EPERM") {
|
|
19631
20204
|
console.log(
|
|
19632
|
-
`Permission issue indicates that process ${
|
|
20205
|
+
`Permission issue indicates that process ${pid3} exists but user doesn't have permission to signal it.`
|
|
19633
20206
|
);
|
|
19634
20207
|
return true;
|
|
19635
20208
|
} else if (isErrorWithCode(error) && error.code === "ESRCH") {
|
|
19636
|
-
console.log(`Process ${
|
|
20209
|
+
console.log(`Process ${pid3} does not exist.`);
|
|
19637
20210
|
return false;
|
|
19638
20211
|
} else {
|
|
19639
20212
|
throw error;
|
|
@@ -19646,11 +20219,11 @@ __name(isProcessRunning, "isProcessRunning");
|
|
|
19646
20219
|
import { unlinkSync } from "fs";
|
|
19647
20220
|
|
|
19648
20221
|
// src/authentication/lock-file/getAuthenticationLockFilePath.ts
|
|
19649
|
-
import
|
|
20222
|
+
import path4 from "path";
|
|
19650
20223
|
function getAuthenticationLockFilePath() {
|
|
19651
|
-
var
|
|
19652
|
-
const
|
|
19653
|
-
return
|
|
20224
|
+
var _a2, _b2;
|
|
20225
|
+
const localApplicationDataFolder2 = ((_b2 = (_a2 = process.env.APPDATA) == null ? void 0 : _a2.replace) == null ? void 0 : _b2.call(_a2, /(.Roaming)*$/, "\\Local")) ?? (process.env.HOME || "");
|
|
20226
|
+
return path4.join(localApplicationDataFolder2, ".IdentityService", tokenCachePersistenceOptions.name + ".lockfile");
|
|
19654
20227
|
}
|
|
19655
20228
|
__name(getAuthenticationLockFilePath, "getAuthenticationLockFilePath");
|
|
19656
20229
|
|
|
@@ -19703,9 +20276,9 @@ function tryCleaningLockFile() {
|
|
|
19703
20276
|
if (!doesLockFileExist()) {
|
|
19704
20277
|
return true;
|
|
19705
20278
|
}
|
|
19706
|
-
const
|
|
19707
|
-
console.log(`Process ID in the lock file: ${
|
|
19708
|
-
if (!isProcessRunning(
|
|
20279
|
+
const pid3 = readAuthenticationLockFile();
|
|
20280
|
+
console.log(`Process ID in the lock file: ${pid3}`);
|
|
20281
|
+
if (!isProcessRunning(pid3) && deleteAuthenticationLockFile()) {
|
|
19709
20282
|
console.log("Auth lock file is deleted successfully");
|
|
19710
20283
|
return true;
|
|
19711
20284
|
}
|
|
@@ -19736,7 +20309,7 @@ function getCredentialInternal(loginMethod, authenticationRecord, tenantId) {
|
|
|
19736
20309
|
}
|
|
19737
20310
|
__name(getCredentialInternal, "getCredentialInternal");
|
|
19738
20311
|
async function getCredential(options, context) {
|
|
19739
|
-
var
|
|
20312
|
+
var _a2;
|
|
19740
20313
|
const { loginMethod, cachePath, tenantId } = options;
|
|
19741
20314
|
const { reporter, azureLogger, telemetryClient } = context;
|
|
19742
20315
|
if (loginMethod == "azure-cli") {
|
|
@@ -19745,22 +20318,22 @@ async function getCredential(options, context) {
|
|
|
19745
20318
|
const tasks = {};
|
|
19746
20319
|
azureLogger.once("MsalBrowserOpen", (url) => {
|
|
19747
20320
|
tasks.interactiveAuthentication = reporter.addTask(
|
|
19748
|
-
`Prepare to sign in
|
|
20321
|
+
`Prepare to sign in - we are launching a browser page for you. Simply follow the instructions on the login page to seamlessly complete the authentication process. You can manually access the login page by navigating to the folliwing url if you inadvertently close the authentication page or prefer to use a different web browser or a profile. ${url}`
|
|
19749
20322
|
);
|
|
19750
20323
|
});
|
|
19751
|
-
(0, import_identity3.useIdentityPlugin)(import_identity_cache_persistence.cachePersistencePlugin);
|
|
19752
|
-
const credential = getCredentialInternal(loginMethod, getAuthenticationRecord(cachePath), tenantId);
|
|
19753
20324
|
tryCleaningLockFile();
|
|
20325
|
+
(0, import_identity3.useIdentityPlugin)(cachePersistencePlugin);
|
|
20326
|
+
const credential = getCredentialInternal(loginMethod, getAuthenticationRecord(cachePath), tenantId);
|
|
19754
20327
|
const storageScope = "https://storage.azure.com/.default";
|
|
19755
20328
|
const authenticationRecord = await credential.authenticate(storageScope);
|
|
19756
20329
|
const token = await credential.getToken(storageScope);
|
|
19757
20330
|
const storageCustomCredential = {
|
|
19758
|
-
getToken: () => Promise.resolve(token)
|
|
20331
|
+
getToken: /* @__PURE__ */ __name(() => Promise.resolve(token), "getToken")
|
|
19759
20332
|
};
|
|
19760
20333
|
if (authenticationRecord) {
|
|
19761
20334
|
saveAuthenticationRecord(cachePath, authenticationRecord);
|
|
19762
20335
|
}
|
|
19763
|
-
(
|
|
20336
|
+
(_a2 = tasks.interactiveAuthentication) == null ? void 0 : _a2.complete({
|
|
19764
20337
|
message: "You have successfully signed in."
|
|
19765
20338
|
});
|
|
19766
20339
|
telemetryClient.rootSpan.addEvent("SYNC_AUTH", {
|
|
@@ -19775,300 +20348,300 @@ export {
|
|
|
19775
20348
|
};
|
|
19776
20349
|
/*! Bundled license information:
|
|
19777
20350
|
|
|
19778
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19779
|
-
(*! @azure/msal-node v2.9.
|
|
20351
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs:
|
|
20352
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19780
20353
|
|
|
19781
|
-
.store/@azure-msal-common-npm-14.
|
|
19782
|
-
(*! @azure/msal-common v14.
|
|
20354
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs:
|
|
20355
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19783
20356
|
|
|
19784
|
-
.store/@azure-msal-common-npm-14.
|
|
19785
|
-
(*! @azure/msal-common v14.
|
|
20357
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs:
|
|
20358
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19786
20359
|
|
|
19787
|
-
.store/@azure-msal-common-npm-14.
|
|
19788
|
-
(*! @azure/msal-common v14.
|
|
20360
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs:
|
|
20361
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19789
20362
|
|
|
19790
|
-
.store/@azure-msal-common-npm-14.
|
|
19791
|
-
(*! @azure/msal-common v14.
|
|
20363
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs:
|
|
20364
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19792
20365
|
|
|
19793
|
-
.store/@azure-msal-common-npm-14.
|
|
19794
|
-
(*! @azure/msal-common v14.
|
|
20366
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs:
|
|
20367
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19795
20368
|
|
|
19796
|
-
.store/@azure-msal-common-npm-14.
|
|
19797
|
-
(*! @azure/msal-common v14.
|
|
20369
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs:
|
|
20370
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19798
20371
|
|
|
19799
|
-
.store/@azure-msal-common-npm-14.
|
|
19800
|
-
(*! @azure/msal-common v14.
|
|
20372
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs:
|
|
20373
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19801
20374
|
|
|
19802
|
-
.store/@azure-msal-common-npm-14.
|
|
19803
|
-
(*! @azure/msal-common v14.
|
|
20375
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs:
|
|
20376
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19804
20377
|
|
|
19805
|
-
.store/@azure-msal-common-npm-14.
|
|
19806
|
-
(*! @azure/msal-common v14.
|
|
20378
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs:
|
|
20379
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19807
20380
|
|
|
19808
|
-
.store/@azure-msal-common-npm-14.
|
|
19809
|
-
(*! @azure/msal-common v14.
|
|
20381
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs:
|
|
20382
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19810
20383
|
|
|
19811
|
-
.store/@azure-msal-common-npm-14.
|
|
19812
|
-
(*! @azure/msal-common v14.
|
|
20384
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs:
|
|
20385
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19813
20386
|
|
|
19814
|
-
.store/@azure-msal-common-npm-14.
|
|
19815
|
-
(*! @azure/msal-common v14.
|
|
20387
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs:
|
|
20388
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19816
20389
|
|
|
19817
|
-
.store/@azure-msal-common-npm-14.
|
|
19818
|
-
(*! @azure/msal-common v14.
|
|
20390
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs:
|
|
20391
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19819
20392
|
|
|
19820
|
-
.store/@azure-msal-common-npm-14.
|
|
19821
|
-
(*! @azure/msal-common v14.
|
|
20393
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs:
|
|
20394
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19822
20395
|
|
|
19823
|
-
.store/@azure-msal-common-npm-14.
|
|
19824
|
-
(*! @azure/msal-common v14.
|
|
20396
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs:
|
|
20397
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19825
20398
|
|
|
19826
|
-
.store/@azure-msal-common-npm-14.
|
|
19827
|
-
(*! @azure/msal-common v14.
|
|
20399
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs:
|
|
20400
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19828
20401
|
|
|
19829
|
-
.store/@azure-msal-common-npm-14.
|
|
19830
|
-
(*! @azure/msal-common v14.
|
|
20402
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs:
|
|
20403
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19831
20404
|
|
|
19832
|
-
.store/@azure-msal-common-npm-14.
|
|
19833
|
-
(*! @azure/msal-common v14.
|
|
20405
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs:
|
|
20406
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19834
20407
|
|
|
19835
|
-
.store/@azure-msal-common-npm-14.
|
|
19836
|
-
(*! @azure/msal-common v14.
|
|
20408
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs:
|
|
20409
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19837
20410
|
|
|
19838
|
-
.store/@azure-msal-common-npm-14.
|
|
19839
|
-
(*! @azure/msal-common v14.
|
|
20411
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs:
|
|
20412
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19840
20413
|
|
|
19841
|
-
.store/@azure-msal-common-npm-14.
|
|
19842
|
-
(*! @azure/msal-common v14.
|
|
20414
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs:
|
|
20415
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19843
20416
|
|
|
19844
|
-
.store/@azure-msal-common-npm-14.
|
|
19845
|
-
(*! @azure/msal-common v14.
|
|
20417
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs:
|
|
20418
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19846
20419
|
|
|
19847
|
-
.store/@azure-msal-common-npm-14.
|
|
19848
|
-
(*! @azure/msal-common v14.
|
|
20420
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs:
|
|
20421
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19849
20422
|
|
|
19850
|
-
.store/@azure-msal-common-npm-14.
|
|
19851
|
-
(*! @azure/msal-common v14.
|
|
20423
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs:
|
|
20424
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19852
20425
|
|
|
19853
|
-
.store/@azure-msal-common-npm-14.
|
|
19854
|
-
(*! @azure/msal-common v14.
|
|
20426
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs:
|
|
20427
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19855
20428
|
|
|
19856
|
-
.store/@azure-msal-common-npm-14.
|
|
19857
|
-
(*! @azure/msal-common v14.
|
|
20429
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs:
|
|
20430
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19858
20431
|
|
|
19859
|
-
.store/@azure-msal-common-npm-14.
|
|
19860
|
-
(*! @azure/msal-common v14.
|
|
20432
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs:
|
|
20433
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19861
20434
|
|
|
19862
|
-
.store/@azure-msal-common-npm-14.
|
|
19863
|
-
(*! @azure/msal-common v14.
|
|
20435
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs:
|
|
20436
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19864
20437
|
|
|
19865
|
-
.store/@azure-msal-common-npm-14.
|
|
19866
|
-
(*! @azure/msal-common v14.
|
|
20438
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs:
|
|
20439
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19867
20440
|
|
|
19868
|
-
.store/@azure-msal-common-npm-14.
|
|
19869
|
-
(*! @azure/msal-common v14.
|
|
20441
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs:
|
|
20442
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19870
20443
|
|
|
19871
|
-
.store/@azure-msal-common-npm-14.
|
|
19872
|
-
(*! @azure/msal-common v14.
|
|
20444
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs:
|
|
20445
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19873
20446
|
|
|
19874
|
-
.store/@azure-msal-common-npm-14.
|
|
19875
|
-
(*! @azure/msal-common v14.
|
|
20447
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs:
|
|
20448
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19876
20449
|
|
|
19877
|
-
.store/@azure-msal-common-npm-14.
|
|
19878
|
-
(*! @azure/msal-common v14.
|
|
20450
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs:
|
|
20451
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19879
20452
|
|
|
19880
|
-
.store/@azure-msal-common-npm-14.
|
|
19881
|
-
(*! @azure/msal-common v14.
|
|
20453
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs:
|
|
20454
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19882
20455
|
|
|
19883
|
-
.store/@azure-msal-common-npm-14.
|
|
19884
|
-
(*! @azure/msal-common v14.
|
|
20456
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs:
|
|
20457
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19885
20458
|
|
|
19886
|
-
.store/@azure-msal-common-npm-14.
|
|
19887
|
-
(*! @azure/msal-common v14.
|
|
20459
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs:
|
|
20460
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19888
20461
|
|
|
19889
|
-
.store/@azure-msal-common-npm-14.
|
|
19890
|
-
(*! @azure/msal-common v14.
|
|
20462
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs:
|
|
20463
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19891
20464
|
|
|
19892
|
-
.store/@azure-msal-common-npm-14.
|
|
19893
|
-
(*! @azure/msal-common v14.
|
|
20465
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs:
|
|
20466
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19894
20467
|
|
|
19895
|
-
.store/@azure-msal-common-npm-14.
|
|
19896
|
-
(*! @azure/msal-common v14.
|
|
20468
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs:
|
|
20469
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19897
20470
|
|
|
19898
|
-
.store/@azure-msal-common-npm-14.
|
|
19899
|
-
(*! @azure/msal-common v14.
|
|
20471
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs:
|
|
20472
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19900
20473
|
|
|
19901
|
-
.store/@azure-msal-common-npm-14.
|
|
19902
|
-
(*! @azure/msal-common v14.
|
|
20474
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs:
|
|
20475
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19903
20476
|
|
|
19904
|
-
.store/@azure-msal-common-npm-14.
|
|
19905
|
-
(*! @azure/msal-common v14.
|
|
20477
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs:
|
|
20478
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19906
20479
|
|
|
19907
|
-
.store/@azure-msal-common-npm-14.
|
|
19908
|
-
(*! @azure/msal-common v14.
|
|
20480
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs:
|
|
20481
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19909
20482
|
|
|
19910
|
-
.store/@azure-msal-common-npm-14.
|
|
19911
|
-
(*! @azure/msal-common v14.
|
|
20483
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs:
|
|
20484
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19912
20485
|
|
|
19913
|
-
.store/@azure-msal-common-npm-14.
|
|
19914
|
-
(*! @azure/msal-common v14.
|
|
20486
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs:
|
|
20487
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19915
20488
|
|
|
19916
|
-
.store/@azure-msal-common-npm-14.
|
|
19917
|
-
(*! @azure/msal-common v14.
|
|
20489
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs:
|
|
20490
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19918
20491
|
|
|
19919
|
-
.store/@azure-msal-common-npm-14.
|
|
19920
|
-
(*! @azure/msal-common v14.
|
|
20492
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs:
|
|
20493
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19921
20494
|
|
|
19922
|
-
.store/@azure-msal-common-npm-14.
|
|
19923
|
-
(*! @azure/msal-common v14.
|
|
20495
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs:
|
|
20496
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19924
20497
|
|
|
19925
|
-
.store/@azure-msal-common-npm-14.
|
|
19926
|
-
(*! @azure/msal-common v14.
|
|
20498
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs:
|
|
20499
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19927
20500
|
|
|
19928
|
-
.store/@azure-msal-common-npm-14.
|
|
19929
|
-
(*! @azure/msal-common v14.
|
|
20501
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs:
|
|
20502
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19930
20503
|
|
|
19931
|
-
.store/@azure-msal-common-npm-14.
|
|
19932
|
-
(*! @azure/msal-common v14.
|
|
20504
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs:
|
|
20505
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19933
20506
|
|
|
19934
|
-
.store/@azure-msal-common-npm-14.
|
|
19935
|
-
(*! @azure/msal-common v14.
|
|
20507
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs:
|
|
20508
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19936
20509
|
|
|
19937
|
-
.store/@azure-msal-common-npm-14.
|
|
19938
|
-
(*! @azure/msal-common v14.
|
|
20510
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs:
|
|
20511
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19939
20512
|
|
|
19940
|
-
.store/@azure-msal-common-npm-14.
|
|
19941
|
-
(*! @azure/msal-common v14.
|
|
20513
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs:
|
|
20514
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19942
20515
|
|
|
19943
|
-
.store/@azure-msal-common-npm-14.
|
|
19944
|
-
(*! @azure/msal-common v14.
|
|
20516
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs:
|
|
20517
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19945
20518
|
|
|
19946
|
-
.store/@azure-msal-common-npm-14.
|
|
19947
|
-
(*! @azure/msal-common v14.
|
|
20519
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs:
|
|
20520
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19948
20521
|
|
|
19949
|
-
.store/@azure-msal-common-npm-14.
|
|
19950
|
-
(*! @azure/msal-common v14.
|
|
20522
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs:
|
|
20523
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19951
20524
|
|
|
19952
|
-
.store/@azure-msal-common-npm-14.
|
|
19953
|
-
(*! @azure/msal-common v14.
|
|
20525
|
+
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs:
|
|
20526
|
+
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
19954
20527
|
|
|
19955
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19956
|
-
(*! @azure/msal-node v2.9.
|
|
20528
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs:
|
|
20529
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19957
20530
|
|
|
19958
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19959
|
-
(*! @azure/msal-node v2.9.
|
|
20531
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs:
|
|
20532
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19960
20533
|
|
|
19961
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19962
|
-
(*! @azure/msal-node v2.9.
|
|
20534
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs:
|
|
20535
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19963
20536
|
|
|
19964
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19965
|
-
(*! @azure/msal-node v2.9.
|
|
20537
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs:
|
|
20538
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19966
20539
|
|
|
19967
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19968
|
-
(*! @azure/msal-node v2.9.
|
|
20540
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs:
|
|
20541
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19969
20542
|
|
|
19970
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19971
|
-
(*! @azure/msal-node v2.9.
|
|
20543
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs:
|
|
20544
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19972
20545
|
|
|
19973
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19974
|
-
(*! @azure/msal-node v2.9.
|
|
20546
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs:
|
|
20547
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19975
20548
|
|
|
19976
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19977
|
-
(*! @azure/msal-node v2.9.
|
|
20549
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs:
|
|
20550
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19978
20551
|
|
|
19979
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19980
|
-
(*! @azure/msal-node v2.9.
|
|
20552
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs:
|
|
20553
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19981
20554
|
|
|
19982
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19983
|
-
(*! @azure/msal-node v2.9.
|
|
20555
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs:
|
|
20556
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19984
20557
|
|
|
19985
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19986
|
-
(*! @azure/msal-node v2.9.
|
|
20558
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs:
|
|
20559
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19987
20560
|
|
|
19988
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19989
|
-
(*! @azure/msal-node v2.9.
|
|
20561
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs:
|
|
20562
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19990
20563
|
|
|
19991
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19992
|
-
(*! @azure/msal-node v2.9.
|
|
20564
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs:
|
|
20565
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19993
20566
|
|
|
19994
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19995
|
-
(*! @azure/msal-node v2.9.
|
|
20567
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs:
|
|
20568
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19996
20569
|
|
|
19997
|
-
.store/@azure-msal-node-npm-2.9.
|
|
19998
|
-
(*! @azure/msal-node v2.9.
|
|
20570
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs:
|
|
20571
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
19999
20572
|
|
|
20000
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20001
|
-
(*! @azure/msal-node v2.9.
|
|
20573
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs:
|
|
20574
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20002
20575
|
|
|
20003
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20004
|
-
(*! @azure/msal-node v2.9.
|
|
20576
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs:
|
|
20577
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20005
20578
|
|
|
20006
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20007
|
-
(*! @azure/msal-node v2.9.
|
|
20579
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs:
|
|
20580
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20008
20581
|
|
|
20009
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20010
|
-
(*! @azure/msal-node v2.9.
|
|
20582
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs:
|
|
20583
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20011
20584
|
|
|
20012
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20013
|
-
(*! @azure/msal-node v2.9.
|
|
20585
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs:
|
|
20586
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20014
20587
|
|
|
20015
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20016
|
-
(*! @azure/msal-node v2.9.
|
|
20588
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs:
|
|
20589
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20017
20590
|
|
|
20018
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20019
|
-
(*! @azure/msal-node v2.9.
|
|
20591
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs:
|
|
20592
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20020
20593
|
|
|
20021
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20022
|
-
(*! @azure/msal-node v2.9.
|
|
20594
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs:
|
|
20595
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20023
20596
|
|
|
20024
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20025
|
-
(*! @azure/msal-node v2.9.
|
|
20597
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs:
|
|
20598
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20026
20599
|
|
|
20027
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20028
|
-
(*! @azure/msal-node v2.9.
|
|
20600
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs:
|
|
20601
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20029
20602
|
|
|
20030
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20031
|
-
(*! @azure/msal-node v2.9.
|
|
20603
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs:
|
|
20604
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20032
20605
|
|
|
20033
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20034
|
-
(*! @azure/msal-node v2.9.
|
|
20606
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs:
|
|
20607
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20035
20608
|
|
|
20036
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20037
|
-
(*! @azure/msal-node v2.9.
|
|
20609
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs:
|
|
20610
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20038
20611
|
|
|
20039
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20040
|
-
(*! @azure/msal-node v2.9.
|
|
20612
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs:
|
|
20613
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20041
20614
|
|
|
20042
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20043
|
-
(*! @azure/msal-node v2.9.
|
|
20615
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs:
|
|
20616
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20044
20617
|
|
|
20045
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20046
|
-
(*! @azure/msal-node v2.9.
|
|
20618
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs:
|
|
20619
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20047
20620
|
|
|
20048
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20049
|
-
(*! @azure/msal-node v2.9.
|
|
20621
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs:
|
|
20622
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20050
20623
|
|
|
20051
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20052
|
-
(*! @azure/msal-node v2.9.
|
|
20624
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs:
|
|
20625
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20053
20626
|
|
|
20054
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20055
|
-
(*! @azure/msal-node v2.9.
|
|
20627
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs:
|
|
20628
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20056
20629
|
|
|
20057
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20058
|
-
(*! @azure/msal-node v2.9.
|
|
20630
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs:
|
|
20631
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20059
20632
|
|
|
20060
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20061
|
-
(*! @azure/msal-node v2.9.
|
|
20633
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs:
|
|
20634
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20062
20635
|
|
|
20063
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20064
|
-
(*! @azure/msal-node v2.9.
|
|
20636
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs:
|
|
20637
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20065
20638
|
|
|
20066
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20067
|
-
(*! @azure/msal-node v2.9.
|
|
20639
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs:
|
|
20640
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20068
20641
|
|
|
20069
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20070
|
-
(*! @azure/msal-node v2.9.
|
|
20642
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs:
|
|
20643
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20071
20644
|
|
|
20072
|
-
.store/@azure-msal-node-npm-2.9.
|
|
20073
|
-
(*! @azure/msal-node v2.9.
|
|
20645
|
+
.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs:
|
|
20646
|
+
(*! @azure/msal-node v2.9.2 2024-06-10 *)
|
|
20074
20647
|
*/
|