@ms-cloudpack/remote-cache 0.7.8 → 0.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (28) hide show
  1. package/dist/{AzureRemoteCacheClient-LMRNY2C6.js → AzureRemoteCacheClient-YFWJLZNA.js} +2122 -3714
  2. package/dist/{ReporterDecorator-JLGERQ2U.js → ReporterDecorator-5LUAHYKK.js} +3 -3
  3. package/dist/{chunk-TXSHKS6T.js → chunk-D7DHZQ7L.js} +300 -326
  4. package/dist/{chunk-FUGMINXQ.js → chunk-DSANWO7J.js} +1 -1
  5. package/dist/{chunk-VCWIWY5Y.js → chunk-FW2AO4WO.js} +217 -305
  6. package/dist/{chunk-IVPGYNQL.js → chunk-GFDVXVVH.js} +1 -1
  7. package/dist/{chunk-B4GP6UPK.js → chunk-LRFMBF43.js} +137 -184
  8. package/dist/{getCredential-HXDULEOH.js → getCredential-W6MRP3D2.js} +1381 -808
  9. package/dist/{getListOfBlobs-TYZM4XYI.js → getListOfBlobs-2GKCJGDO.js} +4 -4
  10. package/dist/index.js +9 -9
  11. package/lib/authentication/forks/identity-cache-persistence/cachePersistencePlugin.d.ts +34 -0
  12. package/lib/authentication/forks/identity-cache-persistence/platforms.d.ts +50 -0
  13. package/lib/authentication/forks/identity-cache-persistence/provider.d.ts +17 -0
  14. package/lib/authentication/forks/msal-node-extensions/error/PersistenceError.d.ts +37 -0
  15. package/lib/authentication/forks/msal-node-extensions/lock/CrossPlatformLock.d.ts +25 -0
  16. package/lib/authentication/forks/msal-node-extensions/lock/CrossPlatformLockOptions.d.ts +16 -0
  17. package/lib/authentication/forks/msal-node-extensions/persistence/BasePersistence.d.ts +6 -0
  18. package/lib/authentication/forks/msal-node-extensions/persistence/FilePersistence.d.ts +31 -0
  19. package/lib/authentication/forks/msal-node-extensions/persistence/FilePersistenceWithDataProtection.d.ts +30 -0
  20. package/lib/authentication/forks/msal-node-extensions/persistence/IPersistence.d.ts +17 -0
  21. package/lib/authentication/forks/msal-node-extensions/persistence/IPersistenceConfiguration.d.ts +16 -0
  22. package/lib/authentication/forks/msal-node-extensions/persistence/NapiRsKeyRingPersistence.d.ts +19 -0
  23. package/lib/authentication/forks/msal-node-extensions/persistence/PersistenceCachePlugin.d.ts +35 -0
  24. package/lib/authentication/forks/msal-node-extensions/utils/Constants.d.ts +44 -0
  25. package/lib/authentication/forks/msal-node-extensions/utils/TypeGuards.d.ts +10 -0
  26. package/lib/authentication/getCredential.d.ts +0 -1
  27. package/lib/registerAzureLogger.d.ts +0 -1
  28. package/package.json +7 -5
@@ -6,14 +6,14 @@ const __filename = topLevelUrl.fileURLToPath(import.meta.url);
6
6
  const __dirname = topLevelPath.dirname(__filename);
7
7
  import {
8
8
  require_package
9
- } from "./chunk-FUGMINXQ.js";
9
+ } from "./chunk-DSANWO7J.js";
10
10
  import {
11
11
  require_commonjs as require_commonjs2,
12
12
  require_commonjs2 as require_commonjs3,
13
13
  require_commonjs3 as require_commonjs4,
14
14
  require_commonjs4 as require_commonjs5,
15
15
  require_dist
16
- } from "./chunk-TXSHKS6T.js";
16
+ } from "./chunk-D7DHZQ7L.js";
17
17
  import {
18
18
  __commonJS,
19
19
  __esm,
@@ -22,15 +22,13 @@ import {
22
22
  __require,
23
23
  __toCommonJS,
24
24
  __toESM,
25
- init_tslib_es6,
26
- require_commonjs,
27
- tslib_es6_exports
28
- } from "./chunk-B4GP6UPK.js";
25
+ require_commonjs
26
+ } from "./chunk-LRFMBF43.js";
29
27
 
30
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/serializer/Serializer.mjs
28
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs
31
29
  var _Serializer, Serializer;
32
30
  var init_Serializer = __esm({
33
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/serializer/Serializer.mjs"() {
31
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs"() {
34
32
  "use strict";
35
33
  _Serializer = class _Serializer {
36
34
  /**
@@ -47,7 +45,7 @@ var init_Serializer = __esm({
47
45
  static serializeAccounts(accCache) {
48
46
  const accounts = {};
49
47
  Object.keys(accCache).map(function(key) {
50
- var _a;
48
+ var _a2;
51
49
  const accountEntity = accCache[key];
52
50
  accounts[key] = {
53
51
  home_account_id: accountEntity.homeAccountId,
@@ -60,7 +58,7 @@ var init_Serializer = __esm({
60
58
  client_info: accountEntity.clientInfo,
61
59
  last_modification_time: accountEntity.lastModificationTime,
62
60
  last_modification_app: accountEntity.lastModificationApp,
63
- tenantProfiles: (_a = accountEntity.tenantProfiles) == null ? void 0 : _a.map((tenantProfile) => {
61
+ tenantProfiles: (_a2 = accountEntity.tenantProfiles) == null ? void 0 : _a2.map((tenantProfile) => {
64
62
  return JSON.stringify(tenantProfile);
65
63
  })
66
64
  };
@@ -171,10 +169,10 @@ var init_Serializer = __esm({
171
169
  }
172
170
  });
173
171
 
174
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/Constants.mjs
172
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs
175
173
  var Constants, HttpStatus, OIDC_DEFAULT_SCOPES, OIDC_SCOPES, HeaderNames, AADAuthorityConstants, ClaimsRequestKeys, PromptValue, CodeChallengeMethodValues, ServerResponseType, ResponseMode, GrantType, CacheAccountType, Separators, CredentialType, APP_METADATA, CLIENT_INFO, THE_FAMILY_ID, AUTHORITY_METADATA_CONSTANTS, AuthorityMetadataSource, SERVER_TELEM_CONSTANTS, AuthenticationScheme, ThrottlingConstants, Errors, PasswordGrantConstants, ResponseCodes, RegionDiscoverySources, RegionDiscoveryOutcomes, CacheOutcome, DEFAULT_TOKEN_RENEWAL_OFFSET_SEC;
176
174
  var init_Constants = __esm({
177
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/Constants.mjs"() {
175
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs"() {
178
176
  "use strict";
179
177
  Constants = {
180
178
  LIBRARY_NAME: "MSAL.JS",
@@ -406,7 +404,7 @@ var init_Constants = __esm({
406
404
  }
407
405
  });
408
406
 
409
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/AuthErrorCodes.mjs
407
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs
410
408
  var AuthErrorCodes_exports = {};
411
409
  __export(AuthErrorCodes_exports, {
412
410
  postRequestFailed: () => postRequestFailed,
@@ -414,20 +412,20 @@ __export(AuthErrorCodes_exports, {
414
412
  });
415
413
  var unexpectedError, postRequestFailed;
416
414
  var init_AuthErrorCodes = __esm({
417
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/AuthErrorCodes.mjs"() {
415
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs"() {
418
416
  "use strict";
419
417
  unexpectedError = "unexpected_error";
420
418
  postRequestFailed = "post_request_failed";
421
419
  }
422
420
  });
423
421
 
424
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/AuthError.mjs
422
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs
425
423
  function createAuthError(code, additionalMessage) {
426
424
  return new AuthError(code, additionalMessage ? `${AuthErrorMessages[code]} ${additionalMessage}` : AuthErrorMessages[code]);
427
425
  }
428
426
  var AuthErrorMessages, AuthErrorMessage, _AuthError, AuthError;
429
427
  var init_AuthError = __esm({
430
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/AuthError.mjs"() {
428
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs"() {
431
429
  "use strict";
432
430
  init_Constants();
433
431
  init_AuthErrorCodes();
@@ -465,7 +463,7 @@ var init_AuthError = __esm({
465
463
  }
466
464
  });
467
465
 
468
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientAuthErrorCodes.mjs
466
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs
469
467
  var ClientAuthErrorCodes_exports = {};
470
468
  __export(ClientAuthErrorCodes_exports, {
471
469
  authTimeNotFound: () => authTimeNotFound,
@@ -515,7 +513,7 @@ __export(ClientAuthErrorCodes_exports, {
515
513
  });
516
514
  var clientInfoDecodingError, clientInfoEmptyError, tokenParsingError, nullOrEmptyToken, endpointResolutionError, networkError, openIdConfigError, hashNotDeserialized, invalidState, stateMismatch, stateNotFound, nonceMismatch, authTimeNotFound, maxAgeTranspired, multipleMatchingTokens, multipleMatchingAccounts, multipleMatchingAppMetadata, requestCannotBeMade, cannotRemoveEmptyScope, cannotAppendScopeSet, emptyInputScopeSet, deviceCodePollingCancelled, deviceCodeExpired, deviceCodeUnknownError, noAccountInSilentRequest, invalidCacheRecord, invalidCacheEnvironment, noAccountFound, noCryptoObject, unexpectedCredentialType, invalidAssertion, invalidClientCredential, tokenRefreshRequired, userTimeoutReached, tokenClaimsCnfRequiredForSignedJwt, authorizationCodeMissingFromServerResponse, bindingKeyNotRemoved, endSessionEndpointNotSupported, keyIdMissing, noNetworkConnectivity, userCanceled, missingTenantIdError, methodNotImplemented, nestedAppAuthBridgeDisabled;
517
515
  var init_ClientAuthErrorCodes = __esm({
518
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientAuthErrorCodes.mjs"() {
516
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs"() {
519
517
  "use strict";
520
518
  clientInfoDecodingError = "client_info_decoding_error";
521
519
  clientInfoEmptyError = "client_info_empty_error";
@@ -564,13 +562,13 @@ var init_ClientAuthErrorCodes = __esm({
564
562
  }
565
563
  });
566
564
 
567
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientAuthError.mjs
565
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs
568
566
  function createClientAuthError(errorCode, additionalMessage) {
569
567
  return new ClientAuthError(errorCode, additionalMessage);
570
568
  }
571
569
  var ClientAuthErrorMessages, ClientAuthErrorMessage, _ClientAuthError, ClientAuthError;
572
570
  var init_ClientAuthError = __esm({
573
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientAuthError.mjs"() {
571
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs"() {
574
572
  "use strict";
575
573
  init_AuthError();
576
574
  init_ClientAuthErrorCodes();
@@ -807,7 +805,7 @@ var init_ClientAuthError = __esm({
807
805
  }
808
806
  });
809
807
 
810
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/AuthToken.mjs
808
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs
811
809
  var AuthToken_exports = {};
812
810
  __export(AuthToken_exports, {
813
811
  checkMaxAge: () => checkMaxAge,
@@ -841,7 +839,7 @@ function checkMaxAge(authTime, maxAge) {
841
839
  }
842
840
  }
843
841
  var init_AuthToken = __esm({
844
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/AuthToken.mjs"() {
842
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs"() {
845
843
  "use strict";
846
844
  init_ClientAuthError();
847
845
  init_ClientAuthErrorCodes();
@@ -851,10 +849,10 @@ var init_AuthToken = __esm({
851
849
  }
852
850
  });
853
851
 
854
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityType.mjs
852
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs
855
853
  var AuthorityType;
856
854
  var init_AuthorityType = __esm({
857
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityType.mjs"() {
855
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs"() {
858
856
  "use strict";
859
857
  AuthorityType = {
860
858
  Default: 0,
@@ -865,18 +863,18 @@ var init_AuthorityType = __esm({
865
863
  }
866
864
  });
867
865
 
868
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/OpenIdConfigResponse.mjs
866
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs
869
867
  function isOpenIdConfigResponse(response) {
870
868
  return response.hasOwnProperty("authorization_endpoint") && response.hasOwnProperty("token_endpoint") && response.hasOwnProperty("issuer") && response.hasOwnProperty("jwks_uri");
871
869
  }
872
870
  var init_OpenIdConfigResponse = __esm({
873
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/OpenIdConfigResponse.mjs"() {
871
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs"() {
874
872
  "use strict";
875
873
  __name(isOpenIdConfigResponse, "isOpenIdConfigResponse");
876
874
  }
877
875
  });
878
876
 
879
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientConfigurationErrorCodes.mjs
877
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs
880
878
  var ClientConfigurationErrorCodes_exports = {};
881
879
  __export(ClientConfigurationErrorCodes_exports, {
882
880
  authorityMismatch: () => authorityMismatch,
@@ -904,7 +902,7 @@ __export(ClientConfigurationErrorCodes_exports, {
904
902
  });
905
903
  var redirectUriEmpty, claimsRequestParsingError, authorityUriInsecure, urlParseError, urlEmptyError, emptyInputScopesError, invalidPromptValue, invalidClaims, tokenRequestEmpty, logoutRequestEmpty, invalidCodeChallengeMethod, pkceParamsMissing, invalidCloudDiscoveryMetadata, invalidAuthorityMetadata, untrustedAuthority, missingSshJwk, missingSshKid, missingNonceAuthenticationHeader, invalidAuthenticationHeader, cannotSetOIDCOptions, cannotAllowNativeBroker, authorityMismatch;
906
904
  var init_ClientConfigurationErrorCodes = __esm({
907
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientConfigurationErrorCodes.mjs"() {
905
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs"() {
908
906
  "use strict";
909
907
  redirectUriEmpty = "redirect_uri_empty";
910
908
  claimsRequestParsingError = "claims_request_parsing_error";
@@ -931,13 +929,13 @@ var init_ClientConfigurationErrorCodes = __esm({
931
929
  }
932
930
  });
933
931
 
934
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientConfigurationError.mjs
932
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs
935
933
  function createClientConfigurationError(errorCode) {
936
934
  return new ClientConfigurationError(errorCode);
937
935
  }
938
936
  var ClientConfigurationErrorMessages, ClientConfigurationErrorMessage, _ClientConfigurationError, ClientConfigurationError;
939
937
  var init_ClientConfigurationError = __esm({
940
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientConfigurationError.mjs"() {
938
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs"() {
941
939
  "use strict";
942
940
  init_AuthError();
943
941
  init_ClientConfigurationErrorCodes();
@@ -1068,10 +1066,10 @@ var init_ClientConfigurationError = __esm({
1068
1066
  }
1069
1067
  });
1070
1068
 
1071
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/StringUtils.mjs
1069
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs
1072
1070
  var _StringUtils, StringUtils;
1073
1071
  var init_StringUtils = __esm({
1074
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/StringUtils.mjs"() {
1072
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs"() {
1075
1073
  "use strict";
1076
1074
  _StringUtils = class _StringUtils {
1077
1075
  /**
@@ -1156,7 +1154,7 @@ var init_StringUtils = __esm({
1156
1154
  }
1157
1155
  });
1158
1156
 
1159
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/UrlUtils.mjs
1157
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs
1160
1158
  var UrlUtils_exports = {};
1161
1159
  __export(UrlUtils_exports, {
1162
1160
  getDeserializedResponse: () => getDeserializedResponse,
@@ -1186,7 +1184,7 @@ function getDeserializedResponse(responseString) {
1186
1184
  return null;
1187
1185
  }
1188
1186
  var init_UrlUtils = __esm({
1189
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/UrlUtils.mjs"() {
1187
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs"() {
1190
1188
  "use strict";
1191
1189
  init_ClientAuthError();
1192
1190
  init_ClientAuthErrorCodes();
@@ -1195,10 +1193,10 @@ var init_UrlUtils = __esm({
1195
1193
  }
1196
1194
  });
1197
1195
 
1198
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/url/UrlString.mjs
1196
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs
1199
1197
  var _UrlString, UrlString;
1200
1198
  var init_UrlString = __esm({
1201
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/url/UrlString.mjs"() {
1199
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs"() {
1202
1200
  "use strict";
1203
1201
  init_ClientConfigurationError();
1204
1202
  init_StringUtils();
@@ -1341,14 +1339,14 @@ var init_UrlString = __esm({
1341
1339
  }
1342
1340
  });
1343
1341
 
1344
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityMetadata.mjs
1342
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs
1345
1343
  function getAliasesFromStaticSources(staticAuthorityOptions, logger) {
1346
- var _a;
1344
+ var _a2;
1347
1345
  let staticAliases;
1348
1346
  const canonicalAuthority = staticAuthorityOptions.canonicalAuthority;
1349
1347
  if (canonicalAuthority) {
1350
1348
  const authorityHost = new UrlString(canonicalAuthority).getUrlComponents().HostNameAndPort;
1351
- staticAliases = getAliasesFromMetadata(authorityHost, (_a = staticAuthorityOptions.cloudDiscoveryMetadata) == null ? void 0 : _a.metadata, AuthorityMetadataSource.CONFIG, logger) || getAliasesFromMetadata(authorityHost, InstanceDiscoveryMetadata.metadata, AuthorityMetadataSource.HARDCODED_VALUES, logger) || staticAuthorityOptions.knownAuthorities;
1349
+ staticAliases = getAliasesFromMetadata(authorityHost, (_a2 = staticAuthorityOptions.cloudDiscoveryMetadata) == null ? void 0 : _a2.metadata, AuthorityMetadataSource.CONFIG, logger) || getAliasesFromMetadata(authorityHost, InstanceDiscoveryMetadata.metadata, AuthorityMetadataSource.HARDCODED_VALUES, logger) || staticAuthorityOptions.knownAuthorities;
1352
1350
  }
1353
1351
  return staticAliases || [];
1354
1352
  }
@@ -1380,7 +1378,7 @@ function getCloudDiscoveryMetadataFromNetworkResponse(response, authorityHost) {
1380
1378
  }
1381
1379
  var rawMetdataJSON, EndpointMetadata, InstanceDiscoveryMetadata, InstanceDiscoveryMetadataAliases;
1382
1380
  var init_AuthorityMetadata = __esm({
1383
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityMetadata.mjs"() {
1381
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs"() {
1384
1382
  "use strict";
1385
1383
  init_UrlString();
1386
1384
  init_Constants();
@@ -1465,10 +1463,10 @@ var init_AuthorityMetadata = __esm({
1465
1463
  }
1466
1464
  });
1467
1465
 
1468
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/ProtocolMode.mjs
1466
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs
1469
1467
  var ProtocolMode;
1470
1468
  var init_ProtocolMode = __esm({
1471
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/ProtocolMode.mjs"() {
1469
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs"() {
1472
1470
  "use strict";
1473
1471
  ProtocolMode = {
1474
1472
  AAD: "AAD",
@@ -1477,10 +1475,10 @@ var init_ProtocolMode = __esm({
1477
1475
  }
1478
1476
  });
1479
1477
 
1480
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityOptions.mjs
1478
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs
1481
1479
  var AzureCloudInstance;
1482
1480
  var init_AuthorityOptions = __esm({
1483
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityOptions.mjs"() {
1481
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs"() {
1484
1482
  "use strict";
1485
1483
  AzureCloudInstance = {
1486
1484
  // AzureCloudInstance is not specified.
@@ -1499,32 +1497,32 @@ var init_AuthorityOptions = __esm({
1499
1497
  }
1500
1498
  });
1501
1499
 
1502
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/CloudInstanceDiscoveryResponse.mjs
1500
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs
1503
1501
  function isCloudInstanceDiscoveryResponse(response) {
1504
1502
  return response.hasOwnProperty("tenant_discovery_endpoint") && response.hasOwnProperty("metadata");
1505
1503
  }
1506
1504
  var init_CloudInstanceDiscoveryResponse = __esm({
1507
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/CloudInstanceDiscoveryResponse.mjs"() {
1505
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs"() {
1508
1506
  "use strict";
1509
1507
  __name(isCloudInstanceDiscoveryResponse, "isCloudInstanceDiscoveryResponse");
1510
1508
  }
1511
1509
  });
1512
1510
 
1513
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs
1511
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs
1514
1512
  function isCloudInstanceDiscoveryErrorResponse(response) {
1515
1513
  return response.hasOwnProperty("error") && response.hasOwnProperty("error_description");
1516
1514
  }
1517
1515
  var init_CloudInstanceDiscoveryErrorResponse = __esm({
1518
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs"() {
1516
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs"() {
1519
1517
  "use strict";
1520
1518
  __name(isCloudInstanceDiscoveryErrorResponse, "isCloudInstanceDiscoveryErrorResponse");
1521
1519
  }
1522
1520
  });
1523
1521
 
1524
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/telemetry/performance/PerformanceEvent.mjs
1522
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs
1525
1523
  var PerformanceEvents, PerformanceEventAbbreviations;
1526
1524
  var init_PerformanceEvent = __esm({
1527
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/telemetry/performance/PerformanceEvent.mjs"() {
1525
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs"() {
1528
1526
  "use strict";
1529
1527
  PerformanceEvents = {
1530
1528
  /**
@@ -1974,10 +1972,10 @@ var init_PerformanceEvent = __esm({
1974
1972
  }
1975
1973
  });
1976
1974
 
1977
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/FunctionWrappers.mjs
1975
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs
1978
1976
  var invoke, invokeAsync;
1979
1977
  var init_FunctionWrappers = __esm({
1980
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/FunctionWrappers.mjs"() {
1978
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs"() {
1981
1979
  "use strict";
1982
1980
  invoke = /* @__PURE__ */ __name((callback, eventName, logger, telemetryClient, correlationId) => {
1983
1981
  return (...args) => {
@@ -2040,10 +2038,10 @@ var init_FunctionWrappers = __esm({
2040
2038
  }
2041
2039
  });
2042
2040
 
2043
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/RegionDiscovery.mjs
2041
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs
2044
2042
  var _RegionDiscovery, RegionDiscovery;
2045
2043
  var init_RegionDiscovery = __esm({
2046
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/RegionDiscovery.mjs"() {
2044
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs"() {
2047
2045
  "use strict";
2048
2046
  init_Constants();
2049
2047
  init_PerformanceEvent();
@@ -2061,8 +2059,8 @@ var init_RegionDiscovery = __esm({
2061
2059
  * @returns Promise<string | null>
2062
2060
  */
2063
2061
  async detectRegion(environmentRegion, regionDiscoveryMetadata) {
2064
- var _a;
2065
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RegionDiscoveryDetectRegion, this.correlationId);
2062
+ var _a2;
2063
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RegionDiscoveryDetectRegion, this.correlationId);
2066
2064
  let autodetectedRegionName = environmentRegion;
2067
2065
  if (!autodetectedRegionName) {
2068
2066
  const options = _RegionDiscovery.IMDS_OPTIONS;
@@ -2103,8 +2101,8 @@ var init_RegionDiscovery = __esm({
2103
2101
  * @returns Promise<NetworkResponse<string>>
2104
2102
  */
2105
2103
  async getRegionFromIMDS(version3, options) {
2106
- var _a;
2107
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RegionDiscoveryGetRegionFromIMDS, this.correlationId);
2104
+ var _a2;
2105
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RegionDiscoveryGetRegionFromIMDS, this.correlationId);
2108
2106
  return this.networkInterface.sendGetRequestAsync(`${Constants.IMDS_ENDPOINT}?api-version=${version3}&format=text`, options, Constants.IMDS_TIMEOUT);
2109
2107
  }
2110
2108
  /**
@@ -2113,8 +2111,8 @@ var init_RegionDiscovery = __esm({
2113
2111
  * @returns Promise<string | null>
2114
2112
  */
2115
2113
  async getCurrentVersion(options) {
2116
- var _a;
2117
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RegionDiscoveryGetCurrentVersion, this.correlationId);
2114
+ var _a2;
2115
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RegionDiscoveryGetCurrentVersion, this.correlationId);
2118
2116
  try {
2119
2117
  const response = await this.networkInterface.sendGetRequestAsync(`${Constants.IMDS_ENDPOINT}?format=json`, options);
2120
2118
  if (response.status === ResponseCodes.httpBadRequest && response.body && response.body["newest-versions"] && response.body["newest-versions"].length > 0) {
@@ -2136,7 +2134,7 @@ var init_RegionDiscovery = __esm({
2136
2134
  }
2137
2135
  });
2138
2136
 
2139
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/TimeUtils.mjs
2137
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs
2140
2138
  var TimeUtils_exports = {};
2141
2139
  __export(TimeUtils_exports, {
2142
2140
  delay: () => delay,
@@ -2160,7 +2158,7 @@ function delay(t, value) {
2160
2158
  return new Promise((resolve) => setTimeout(() => resolve(value), t));
2161
2159
  }
2162
2160
  var init_TimeUtils = __esm({
2163
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/TimeUtils.mjs"() {
2161
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs"() {
2164
2162
  "use strict";
2165
2163
  __name(nowSeconds, "nowSeconds");
2166
2164
  __name(isTokenExpired, "isTokenExpired");
@@ -2169,7 +2167,7 @@ var init_TimeUtils = __esm({
2169
2167
  }
2170
2168
  });
2171
2169
 
2172
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/utils/CacheHelpers.mjs
2170
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs
2173
2171
  var CacheHelpers_exports = {};
2174
2172
  __export(CacheHelpers_exports, {
2175
2173
  createAccessTokenEntity: () => createAccessTokenEntity,
@@ -2212,7 +2210,7 @@ function createIdTokenEntity(homeAccountId, environment, idToken, clientId, tena
2212
2210
  return idTokenEntity;
2213
2211
  }
2214
2212
  function createAccessTokenEntity(homeAccountId, environment, accessToken, clientId, tenantId, scopes, expiresOn, extExpiresOn, base64Decode, refreshOn, tokenType, userAssertionHash, keyId, requestedClaims, requestedClaimsHash) {
2215
- var _a, _b;
2213
+ var _a2, _b2;
2216
2214
  const atEntity = {
2217
2215
  homeAccountId,
2218
2216
  credentialType: CredentialType.ACCESS_TOKEN,
@@ -2236,12 +2234,12 @@ function createAccessTokenEntity(homeAccountId, environment, accessToken, client
2236
2234
  atEntity.requestedClaims = requestedClaims;
2237
2235
  atEntity.requestedClaimsHash = requestedClaimsHash;
2238
2236
  }
2239
- if (((_a = atEntity.tokenType) == null ? void 0 : _a.toLowerCase()) !== AuthenticationScheme.BEARER.toLowerCase()) {
2237
+ if (((_a2 = atEntity.tokenType) == null ? void 0 : _a2.toLowerCase()) !== AuthenticationScheme.BEARER.toLowerCase()) {
2240
2238
  atEntity.credentialType = CredentialType.ACCESS_TOKEN_WITH_AUTH_SCHEME;
2241
2239
  switch (atEntity.tokenType) {
2242
2240
  case AuthenticationScheme.POP:
2243
2241
  const tokenClaims = extractTokenClaims(accessToken, base64Decode);
2244
- if (!((_b = tokenClaims == null ? void 0 : tokenClaims.cnf) == null ? void 0 : _b.kid)) {
2242
+ if (!((_b2 = tokenClaims == null ? void 0 : tokenClaims.cnf) == null ? void 0 : _b2.kid)) {
2245
2243
  throw createClientAuthError(tokenClaimsCnfRequiredForSignedJwt);
2246
2244
  }
2247
2245
  atEntity.keyId = tokenClaims.cnf.kid;
@@ -2377,7 +2375,7 @@ function isAuthorityMetadataExpired(metadata) {
2377
2375
  return metadata.expiresAt <= nowSeconds();
2378
2376
  }
2379
2377
  var init_CacheHelpers = __esm({
2380
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/utils/CacheHelpers.mjs"() {
2378
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs"() {
2381
2379
  "use strict";
2382
2380
  init_AuthToken();
2383
2381
  init_ClientAuthError();
@@ -2409,12 +2407,12 @@ var init_CacheHelpers = __esm({
2409
2407
  }
2410
2408
  });
2411
2409
 
2412
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/Authority.mjs
2410
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs
2413
2411
  function getTenantFromAuthorityString(authority) {
2414
- var _a;
2412
+ var _a2;
2415
2413
  const authorityUrl = new UrlString(authority);
2416
2414
  const authorityUrlComponents = authorityUrl.getUrlComponents();
2417
- const tenantId = (_a = authorityUrlComponents.PathSegments.slice(-1)[0]) == null ? void 0 : _a.toLowerCase();
2415
+ const tenantId = (_a2 = authorityUrlComponents.PathSegments.slice(-1)[0]) == null ? void 0 : _a2.toLowerCase();
2418
2416
  switch (tenantId) {
2419
2417
  case AADAuthorityConstants.COMMON:
2420
2418
  case AADAuthorityConstants.ORGANIZATIONS:
@@ -2445,7 +2443,7 @@ function buildStaticAuthorityOptions(authOptions) {
2445
2443
  }
2446
2444
  var _Authority, Authority;
2447
2445
  var init_Authority = __esm({
2448
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/Authority.mjs"() {
2446
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs"() {
2449
2447
  "use strict";
2450
2448
  init_AuthorityType();
2451
2449
  init_OpenIdConfigResponse();
@@ -2675,8 +2673,8 @@ var init_Authority = __esm({
2675
2673
  * and the /authorize, /token and logout endpoints.
2676
2674
  */
2677
2675
  async resolveEndpointsAsync() {
2678
- var _a, _b;
2679
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthorityResolveEndpointsAsync, this.correlationId);
2676
+ var _a2, _b2;
2677
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityResolveEndpointsAsync, this.correlationId);
2680
2678
  const metadataEntity = this.getCurrentMetadataEntity();
2681
2679
  const cloudDiscoverySource = await invokeAsync(this.updateCloudDiscoveryMetadata.bind(this), PerformanceEvents.AuthorityUpdateCloudDiscoveryMetadata, this.logger, this.performanceClient, this.correlationId)(metadataEntity);
2682
2680
  this.canonicalAuthority = this.canonicalAuthority.replace(this.hostnameAndPort, metadataEntity.preferred_network);
@@ -2684,7 +2682,7 @@ var init_Authority = __esm({
2684
2682
  this.updateCachedMetadata(metadataEntity, cloudDiscoverySource, {
2685
2683
  source: endpointSource
2686
2684
  });
2687
- (_b = this.performanceClient) == null ? void 0 : _b.addFields({
2685
+ (_b2 = this.performanceClient) == null ? void 0 : _b2.addFields({
2688
2686
  cloudDiscoverySource,
2689
2687
  authorityEndpointSource: endpointSource
2690
2688
  }, this.correlationId);
@@ -2735,12 +2733,12 @@ var init_Authority = __esm({
2735
2733
  * @param metadataEntity
2736
2734
  */
2737
2735
  async updateEndpointMetadata(metadataEntity) {
2738
- var _a, _b, _c;
2739
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthorityUpdateEndpointMetadata, this.correlationId);
2736
+ var _a2, _b2, _c;
2737
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityUpdateEndpointMetadata, this.correlationId);
2740
2738
  const localMetadata = this.updateEndpointMetadataFromLocalSources(metadataEntity);
2741
2739
  if (localMetadata) {
2742
2740
  if (localMetadata.source === AuthorityMetadataSource.HARDCODED_VALUES) {
2743
- if ((_b = this.authorityOptions.azureRegionConfiguration) == null ? void 0 : _b.azureRegion) {
2741
+ if ((_b2 = this.authorityOptions.azureRegionConfiguration) == null ? void 0 : _b2.azureRegion) {
2744
2742
  if (localMetadata.metadata) {
2745
2743
  const hardcodedMetadata = await invokeAsync(this.updateMetadataWithRegionalInformation.bind(this), PerformanceEvents.AuthorityUpdateMetadataWithRegionalInformation, this.logger, this.performanceClient, this.correlationId)(localMetadata.metadata);
2746
2744
  updateAuthorityEndpointMetadata(metadataEntity, hardcodedMetadata, false);
@@ -2831,8 +2829,8 @@ var init_Authority = __esm({
2831
2829
  * @param hasHardcodedMetadata boolean
2832
2830
  */
2833
2831
  async getEndpointMetadataFromNetwork() {
2834
- var _a;
2835
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthorityGetEndpointMetadataFromNetwork, this.correlationId);
2832
+ var _a2;
2833
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityGetEndpointMetadataFromNetwork, this.correlationId);
2836
2834
  const options = {};
2837
2835
  const openIdConfigurationEndpoint = this.defaultOpenIdConfigurationEndpoint;
2838
2836
  this.logger.verbose(`Authority.getEndpointMetadataFromNetwork: attempting to retrieve OAuth endpoints from ${openIdConfigurationEndpoint}`);
@@ -2864,9 +2862,9 @@ var init_Authority = __esm({
2864
2862
  * User selected Azure region will be used if configured.
2865
2863
  */
2866
2864
  async updateMetadataWithRegionalInformation(metadata) {
2867
- var _a, _b, _c;
2868
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthorityUpdateMetadataWithRegionalInformation, this.correlationId);
2869
- const userConfiguredAzureRegion = (_b = this.authorityOptions.azureRegionConfiguration) == null ? void 0 : _b.azureRegion;
2865
+ var _a2, _b2, _c;
2866
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityUpdateMetadataWithRegionalInformation, this.correlationId);
2867
+ const userConfiguredAzureRegion = (_b2 = this.authorityOptions.azureRegionConfiguration) == null ? void 0 : _b2.azureRegion;
2870
2868
  if (userConfiguredAzureRegion) {
2871
2869
  if (userConfiguredAzureRegion !== Constants.AZURE_REGION_AUTO_DISCOVER_FLAG) {
2872
2870
  this.regionDiscoveryMetadata.region_outcome = RegionDiscoveryOutcomes.CONFIGURED_NO_AUTO_DETECTION;
@@ -2890,8 +2888,8 @@ var init_Authority = __esm({
2890
2888
  * @returns AuthorityMetadataSource
2891
2889
  */
2892
2890
  async updateCloudDiscoveryMetadata(metadataEntity) {
2893
- var _a;
2894
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthorityUpdateCloudDiscoveryMetadata, this.correlationId);
2891
+ var _a2;
2892
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityUpdateCloudDiscoveryMetadata, this.correlationId);
2895
2893
  const localMetadataSource = this.updateCloudDiscoveryMetadataFromLocalSources(metadataEntity);
2896
2894
  if (localMetadataSource) {
2897
2895
  return localMetadataSource;
@@ -2973,8 +2971,8 @@ var init_Authority = __esm({
2973
2971
  * @param hasHardcodedMetadata boolean
2974
2972
  */
2975
2973
  async getCloudDiscoveryMetadataFromNetwork() {
2976
- var _a;
2977
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthorityGetCloudDiscoveryMetadataFromNetwork, this.correlationId);
2974
+ var _a2;
2975
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthorityGetCloudDiscoveryMetadataFromNetwork, this.correlationId);
2978
2976
  const instanceDiscoveryEndpoint = `${Constants.AAD_INSTANCE_DISCOVERY_ENDPT}${this.canonicalAuthority}oauth2/v2.0/authorize`;
2979
2977
  const options = {};
2980
2978
  let match = null;
@@ -3163,7 +3161,7 @@ Error Description: ${typedError.message}`);
3163
3161
  }
3164
3162
  });
3165
3163
 
3166
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityFactory.mjs
3164
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs
3167
3165
  var AuthorityFactory_exports = {};
3168
3166
  __export(AuthorityFactory_exports, {
3169
3167
  createDiscoveredInstance: () => createDiscoveredInstance
@@ -3180,7 +3178,7 @@ async function createDiscoveredInstance(authorityUri, networkClient, cacheManage
3180
3178
  }
3181
3179
  }
3182
3180
  var init_AuthorityFactory = __esm({
3183
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityFactory.mjs"() {
3181
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs"() {
3184
3182
  "use strict";
3185
3183
  init_Authority();
3186
3184
  init_ClientAuthError();
@@ -3191,7 +3189,7 @@ var init_AuthorityFactory = __esm({
3191
3189
  }
3192
3190
  });
3193
3191
 
3194
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/ClientAssertionUtils.mjs
3192
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs
3195
3193
  async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
3196
3194
  if (typeof clientAssertion === "string") {
3197
3195
  return clientAssertion;
@@ -3204,13 +3202,13 @@ async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
3204
3202
  }
3205
3203
  }
3206
3204
  var init_ClientAssertionUtils = __esm({
3207
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/ClientAssertionUtils.mjs"() {
3205
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs"() {
3208
3206
  "use strict";
3209
3207
  __name(getClientAssertion, "getClientAssertion");
3210
3208
  }
3211
3209
  });
3212
3210
 
3213
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/constants/AADServerParamKeys.mjs
3211
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs
3214
3212
  var AADServerParamKeys_exports = {};
3215
3213
  __export(AADServerParamKeys_exports, {
3216
3214
  ACCESS_TOKEN: () => ACCESS_TOKEN,
@@ -3268,7 +3266,7 @@ __export(AADServerParamKeys_exports, {
3268
3266
  });
3269
3267
  var CLIENT_ID, REDIRECT_URI, RESPONSE_TYPE, RESPONSE_MODE, GRANT_TYPE, CLAIMS, SCOPE, ERROR, ERROR_DESCRIPTION, ACCESS_TOKEN, ID_TOKEN, REFRESH_TOKEN, EXPIRES_IN, REFRESH_TOKEN_EXPIRES_IN, STATE, NONCE, PROMPT, SESSION_STATE, CLIENT_INFO2, CODE, CODE_CHALLENGE, CODE_CHALLENGE_METHOD, CODE_VERIFIER, CLIENT_REQUEST_ID, X_CLIENT_SKU, X_CLIENT_VER, X_CLIENT_OS, X_CLIENT_CPU, X_CLIENT_CURR_TELEM, X_CLIENT_LAST_TELEM, X_MS_LIB_CAPABILITY, X_APP_NAME, X_APP_VER, POST_LOGOUT_URI, ID_TOKEN_HINT, DEVICE_CODE, CLIENT_SECRET, CLIENT_ASSERTION, CLIENT_ASSERTION_TYPE, TOKEN_TYPE, REQ_CNF, OBO_ASSERTION, REQUESTED_TOKEN_USE, ON_BEHALF_OF, FOCI, CCS_HEADER, RETURN_SPA_CODE, NATIVE_BROKER, LOGOUT_HINT, SID, LOGIN_HINT, DOMAIN_HINT;
3270
3268
  var init_AADServerParamKeys = __esm({
3271
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/constants/AADServerParamKeys.mjs"() {
3269
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs"() {
3272
3270
  "use strict";
3273
3271
  CLIENT_ID = "client_id";
3274
3272
  REDIRECT_URI = "redirect_uri";
@@ -3325,23 +3323,29 @@ var init_AADServerParamKeys = __esm({
3325
3323
  }
3326
3324
  });
3327
3325
 
3328
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/crypto/ICrypto.mjs
3326
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs
3329
3327
  var DEFAULT_CRYPTO_IMPLEMENTATION;
3330
3328
  var init_ICrypto = __esm({
3331
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/crypto/ICrypto.mjs"() {
3329
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs"() {
3332
3330
  "use strict";
3333
3331
  init_ClientAuthError();
3334
3332
  init_ClientAuthErrorCodes();
3335
3333
  DEFAULT_CRYPTO_IMPLEMENTATION = {
3336
- createNewGuid: () => {
3334
+ createNewGuid: /* @__PURE__ */ __name(() => {
3337
3335
  throw createClientAuthError(methodNotImplemented);
3338
- },
3339
- base64Decode: () => {
3336
+ }, "createNewGuid"),
3337
+ base64Decode: /* @__PURE__ */ __name(() => {
3340
3338
  throw createClientAuthError(methodNotImplemented);
3341
- },
3342
- base64Encode: () => {
3339
+ }, "base64Decode"),
3340
+ base64Encode: /* @__PURE__ */ __name(() => {
3343
3341
  throw createClientAuthError(methodNotImplemented);
3344
- },
3342
+ }, "base64Encode"),
3343
+ base64UrlEncode: /* @__PURE__ */ __name(() => {
3344
+ throw createClientAuthError(methodNotImplemented);
3345
+ }, "base64UrlEncode"),
3346
+ encodeKid: /* @__PURE__ */ __name(() => {
3347
+ throw createClientAuthError(methodNotImplemented);
3348
+ }, "encodeKid"),
3345
3349
  async getPublicKeyThumbprint() {
3346
3350
  throw createClientAuthError(methodNotImplemented);
3347
3351
  },
@@ -3361,10 +3365,10 @@ var init_ICrypto = __esm({
3361
3365
  }
3362
3366
  });
3363
3367
 
3364
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/logger/Logger.mjs
3368
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs
3365
3369
  var LogLevel, _Logger, Logger;
3366
3370
  var init_Logger = __esm({
3367
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/logger/Logger.mjs"() {
3371
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs"() {
3368
3372
  "use strict";
3369
3373
  init_Constants();
3370
3374
  (function(LogLevel2) {
@@ -3390,8 +3394,8 @@ var init_Logger = __esm({
3390
3394
  }
3391
3395
  static createDefaultLoggerOptions() {
3392
3396
  return {
3393
- loggerCallback: () => {
3394
- },
3397
+ loggerCallback: /* @__PURE__ */ __name(() => {
3398
+ }, "loggerCallback"),
3395
3399
  piiLoggingEnabled: false,
3396
3400
  logLevel: LogLevel.Info
3397
3401
  };
@@ -3539,20 +3543,20 @@ var init_Logger = __esm({
3539
3543
  }
3540
3544
  });
3541
3545
 
3542
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/packageMetadata.mjs
3546
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs
3543
3547
  var name, version;
3544
3548
  var init_packageMetadata = __esm({
3545
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/packageMetadata.mjs"() {
3549
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs"() {
3546
3550
  "use strict";
3547
3551
  name = "@azure/msal-common";
3548
- version = "14.11.0";
3552
+ version = "14.12.0";
3549
3553
  }
3550
3554
  });
3551
3555
 
3552
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/ScopeSet.mjs
3556
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs
3553
3557
  var _ScopeSet, ScopeSet;
3554
3558
  var init_ScopeSet = __esm({
3555
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/ScopeSet.mjs"() {
3559
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs"() {
3556
3560
  "use strict";
3557
3561
  init_ClientConfigurationError();
3558
3562
  init_StringUtils();
@@ -3739,7 +3743,7 @@ var init_ScopeSet = __esm({
3739
3743
  }
3740
3744
  });
3741
3745
 
3742
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/ClientInfo.mjs
3746
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs
3743
3747
  function buildClientInfo(rawClientInfo, base64Decode) {
3744
3748
  if (!rawClientInfo) {
3745
3749
  throw createClientAuthError(clientInfoEmptyError);
@@ -3762,7 +3766,7 @@ function buildClientInfoFromHomeAccountId(homeAccountId) {
3762
3766
  };
3763
3767
  }
3764
3768
  var init_ClientInfo = __esm({
3765
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/ClientInfo.mjs"() {
3769
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs"() {
3766
3770
  "use strict";
3767
3771
  init_ClientAuthError();
3768
3772
  init_Constants();
@@ -3772,7 +3776,7 @@ var init_ClientInfo = __esm({
3772
3776
  }
3773
3777
  });
3774
3778
 
3775
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/AccountInfo.mjs
3779
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs
3776
3780
  function tenantIdMatchesHomeTenant(tenantId, homeAccountId) {
3777
3781
  return !!tenantId && !!homeAccountId && tenantId === homeAccountId.split(".")[1];
3778
3782
  }
@@ -3805,7 +3809,7 @@ function updateAccountTenantProfileData(baseAccountInfo, tenantProfile, idTokenC
3805
3809
  return updatedAccountInfo;
3806
3810
  }
3807
3811
  var init_AccountInfo = __esm({
3808
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/AccountInfo.mjs"() {
3812
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs"() {
3809
3813
  "use strict";
3810
3814
  __name(tenantIdMatchesHomeTenant, "tenantIdMatchesHomeTenant");
3811
3815
  __name(buildTenantProfileFromIdTokenClaims, "buildTenantProfileFromIdTokenClaims");
@@ -3813,7 +3817,7 @@ var init_AccountInfo = __esm({
3813
3817
  }
3814
3818
  });
3815
3819
 
3816
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/TokenClaims.mjs
3820
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs
3817
3821
  function getTenantIdFromIdTokenClaims(idTokenClaims) {
3818
3822
  if (idTokenClaims) {
3819
3823
  const tenantId = idTokenClaims.tid || idTokenClaims.tfp || idTokenClaims.acr;
@@ -3822,16 +3826,16 @@ function getTenantIdFromIdTokenClaims(idTokenClaims) {
3822
3826
  return null;
3823
3827
  }
3824
3828
  var init_TokenClaims = __esm({
3825
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/TokenClaims.mjs"() {
3829
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs"() {
3826
3830
  "use strict";
3827
3831
  __name(getTenantIdFromIdTokenClaims, "getTenantIdFromIdTokenClaims");
3828
3832
  }
3829
3833
  });
3830
3834
 
3831
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/entities/AccountEntity.mjs
3835
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs
3832
3836
  var _AccountEntity, AccountEntity;
3833
3837
  var init_AccountEntity = __esm({
3834
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/entities/AccountEntity.mjs"() {
3838
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs"() {
3835
3839
  "use strict";
3836
3840
  init_Constants();
3837
3841
  init_ClientInfo();
@@ -3952,7 +3956,7 @@ var init_AccountEntity = __esm({
3952
3956
  * @returns
3953
3957
  */
3954
3958
  static createFromAccountInfo(accountInfo, cloudGraphHostName, msGraphHost) {
3955
- var _a;
3959
+ var _a2;
3956
3960
  const account = new _AccountEntity();
3957
3961
  account.authorityType = accountInfo.authorityType || CacheAccountType.GENERIC_ACCOUNT_TYPE;
3958
3962
  account.homeAccountId = accountInfo.homeAccountId;
@@ -3964,7 +3968,7 @@ var init_AccountEntity = __esm({
3964
3968
  account.name = accountInfo.name;
3965
3969
  account.cloudGraphHostName = cloudGraphHostName;
3966
3970
  account.msGraphHost = msGraphHost;
3967
- account.tenantProfiles = Array.from(((_a = accountInfo.tenantProfiles) == null ? void 0 : _a.values()) || []);
3971
+ account.tenantProfiles = Array.from(((_a2 = accountInfo.tenantProfiles) == null ? void 0 : _a2.values()) || []);
3968
3972
  return account;
3969
3973
  }
3970
3974
  /**
@@ -4021,20 +4025,20 @@ var init_AccountEntity = __esm({
4021
4025
  }
4022
4026
  });
4023
4027
 
4024
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/CacheErrorCodes.mjs
4028
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs
4025
4029
  var cacheQuotaExceededErrorCode, cacheUnknownErrorCode;
4026
4030
  var init_CacheErrorCodes = __esm({
4027
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/CacheErrorCodes.mjs"() {
4031
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs"() {
4028
4032
  "use strict";
4029
4033
  cacheQuotaExceededErrorCode = "cache_quota_exceeded";
4030
4034
  cacheUnknownErrorCode = "cache_error_unknown";
4031
4035
  }
4032
4036
  });
4033
4037
 
4034
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/CacheError.mjs
4038
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs
4035
4039
  var CacheErrorMessages, _CacheError, CacheError;
4036
4040
  var init_CacheError = __esm({
4037
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/CacheError.mjs"() {
4041
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs"() {
4038
4042
  "use strict";
4039
4043
  init_CacheErrorCodes();
4040
4044
  CacheErrorMessages = {
@@ -4056,10 +4060,10 @@ var init_CacheError = __esm({
4056
4060
  }
4057
4061
  });
4058
4062
 
4059
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/CacheManager.mjs
4063
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs
4060
4064
  var _CacheManager, CacheManager, _DefaultStorageClass, DefaultStorageClass;
4061
4065
  var init_CacheManager = __esm({
4062
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/CacheManager.mjs"() {
4066
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs"() {
4063
4067
  "use strict";
4064
4068
  init_Constants();
4065
4069
  init_CacheHelpers();
@@ -4212,7 +4216,7 @@ var init_CacheManager = __esm({
4212
4216
  * @param correlationId {?string} correlation id
4213
4217
  */
4214
4218
  async saveCacheRecord(cacheRecord, storeInCache, correlationId) {
4215
- var _a, _b, _c, _d;
4219
+ var _a2, _b2, _c, _d;
4216
4220
  if (!cacheRecord) {
4217
4221
  throw createClientAuthError(invalidCacheRecord);
4218
4222
  }
@@ -4233,9 +4237,9 @@ var init_CacheManager = __esm({
4233
4237
  this.setAppMetadata(cacheRecord.appMetadata);
4234
4238
  }
4235
4239
  } catch (e) {
4236
- (_a = this.commonLogger) == null ? void 0 : _a.error(`CacheManager.saveCacheRecord: failed`);
4240
+ (_a2 = this.commonLogger) == null ? void 0 : _a2.error(`CacheManager.saveCacheRecord: failed`);
4237
4241
  if (e instanceof Error) {
4238
- (_b = this.commonLogger) == null ? void 0 : _b.errorPii(`CacheManager.saveCacheRecord: ${e.message}`, correlationId);
4242
+ (_b2 = this.commonLogger) == null ? void 0 : _b2.errorPii(`CacheManager.saveCacheRecord: ${e.message}`, correlationId);
4239
4243
  if (e.name === "QuotaExceededError" || e.name === "NS_ERROR_DOM_QUOTA_REACHED" || e.message.includes("exceeded the quota")) {
4240
4244
  (_c = this.commonLogger) == null ? void 0 : _c.error(`CacheManager.saveCacheRecord: exceeded storage quota`, correlationId);
4241
4245
  throw new CacheError(cacheQuotaExceededErrorCode);
@@ -4289,7 +4293,7 @@ var init_CacheManager = __esm({
4289
4293
  const allAccountKeys = this.getAccountKeys();
4290
4294
  const matchingAccounts = [];
4291
4295
  allAccountKeys.forEach((cacheKey) => {
4292
- var _a;
4296
+ var _a2;
4293
4297
  if (!this.isAccountKey(cacheKey, accountFilter.homeAccountId)) {
4294
4298
  return;
4295
4299
  }
@@ -4319,7 +4323,7 @@ var init_CacheManager = __esm({
4319
4323
  localAccountId: accountFilter == null ? void 0 : accountFilter.localAccountId,
4320
4324
  name: accountFilter == null ? void 0 : accountFilter.name
4321
4325
  };
4322
- const matchingTenantProfiles = (_a = entity.tenantProfiles) == null ? void 0 : _a.filter((tenantProfile) => {
4326
+ const matchingTenantProfiles = (_a2 = entity.tenantProfiles) == null ? void 0 : _a2.filter((tenantProfile) => {
4323
4327
  return this.tenantProfileMatchesFilter(tenantProfile, tenantProfileFilter);
4324
4328
  });
4325
4329
  if (matchingTenantProfiles && matchingTenantProfiles.length === 0) {
@@ -4523,9 +4527,9 @@ var init_CacheManager = __esm({
4523
4527
  * @returns
4524
4528
  */
4525
4529
  updateOutdatedCachedAccount(accountKey, accountEntity, logger) {
4526
- var _a;
4530
+ var _a2;
4527
4531
  if (accountEntity && accountEntity.isSingleTenant()) {
4528
- (_a = this.commonLogger) == null ? void 0 : _a.verbose("updateOutdatedCachedAccount: Found a single-tenant (outdated) account entity in the cache, migrating to multi-tenant account entity");
4532
+ (_a2 = this.commonLogger) == null ? void 0 : _a2.verbose("updateOutdatedCachedAccount: Found a single-tenant (outdated) account entity in the cache, migrating to multi-tenant account entity");
4529
4533
  const matchingAccountKeys = this.getAccountKeys().filter((key) => {
4530
4534
  return key.startsWith(accountEntity.homeAccountId);
4531
4535
  });
@@ -4927,8 +4931,8 @@ var init_CacheManager = __esm({
4927
4931
  * @returns true if the downcased name properties are present and match in the filter and the entity
4928
4932
  */
4929
4933
  matchName(claims, name3) {
4930
- var _a;
4931
- return !!(name3.toLowerCase() === ((_a = claims.name) == null ? void 0 : _a.toLowerCase()));
4934
+ var _a2;
4935
+ return !!(name3.toLowerCase() === ((_a2 = claims.name) == null ? void 0 : _a2.toLowerCase()));
4932
4936
  }
4933
4937
  /**
4934
4938
  * helper to match usernames
@@ -4995,8 +4999,8 @@ var init_CacheManager = __esm({
4995
4999
  * @param realm
4996
5000
  */
4997
5001
  matchRealm(entity, realm) {
4998
- var _a;
4999
- return !!(((_a = entity.realm) == null ? void 0 : _a.toLowerCase()) === realm.toLowerCase());
5002
+ var _a2;
5003
+ return !!(((_a2 = entity.realm) == null ? void 0 : _a2.toLowerCase()) === realm.toLowerCase());
5000
5004
  }
5001
5005
  /**
5002
5006
  * helper to match nativeAccountId
@@ -5064,7 +5068,7 @@ var init_CacheManager = __esm({
5064
5068
  /**
5065
5069
  * Returns true if the credential's keyId matches the one in the request, false otherwise
5066
5070
  * @param entity
5067
- * @param tokenType
5071
+ * @param keyId
5068
5072
  */
5069
5073
  matchKeyId(entity, keyId) {
5070
5074
  return !!(entity.keyId && entity.keyId === keyId);
@@ -5185,7 +5189,7 @@ var init_CacheManager = __esm({
5185
5189
  }
5186
5190
  });
5187
5191
 
5188
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/config/ClientConfiguration.mjs
5192
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs
5189
5193
  function buildClientConfiguration({ authOptions: userAuthOptions, systemOptions: userSystemOptions, loggerOptions: userLoggerOption, cacheOptions: userCacheOptions, storageInterface: storageImplementation, networkInterface: networkImplementation, cryptoInterface: cryptoImplementation, clientCredentials, libraryInfo, telemetry, serverTelemetryManager, persistencePlugin, serializableCache }) {
5190
5194
  const loggerOptions = {
5191
5195
  ...DEFAULT_LOGGER_IMPLEMENTATION,
@@ -5220,7 +5224,7 @@ function isOidcProtocolMode(config) {
5220
5224
  }
5221
5225
  var DEFAULT_SYSTEM_OPTIONS, DEFAULT_LOGGER_IMPLEMENTATION, DEFAULT_CACHE_OPTIONS, DEFAULT_NETWORK_IMPLEMENTATION, DEFAULT_LIBRARY_INFO, DEFAULT_CLIENT_CREDENTIALS, DEFAULT_AZURE_CLOUD_OPTIONS, DEFAULT_TELEMETRY_OPTIONS;
5222
5226
  var init_ClientConfiguration = __esm({
5223
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/config/ClientConfiguration.mjs"() {
5227
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs"() {
5224
5228
  "use strict";
5225
5229
  init_ICrypto();
5226
5230
  init_Logger();
@@ -5236,8 +5240,8 @@ var init_ClientConfiguration = __esm({
5236
5240
  preventCorsPreflight: false
5237
5241
  };
5238
5242
  DEFAULT_LOGGER_IMPLEMENTATION = {
5239
- loggerCallback: () => {
5240
- },
5243
+ loggerCallback: /* @__PURE__ */ __name(() => {
5244
+ }, "loggerCallback"),
5241
5245
  piiLoggingEnabled: false,
5242
5246
  logLevel: LogLevel.Info,
5243
5247
  correlationId: Constants.EMPTY_STRING
@@ -5279,10 +5283,10 @@ var init_ClientConfiguration = __esm({
5279
5283
  }
5280
5284
  });
5281
5285
 
5282
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ServerError.mjs
5286
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs
5283
5287
  var _ServerError, ServerError;
5284
5288
  var init_ServerError = __esm({
5285
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ServerError.mjs"() {
5289
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs"() {
5286
5290
  "use strict";
5287
5291
  init_AuthError();
5288
5292
  _ServerError = class _ServerError extends AuthError {
@@ -5298,10 +5302,10 @@ var init_ServerError = __esm({
5298
5302
  }
5299
5303
  });
5300
5304
 
5301
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/network/ThrottlingUtils.mjs
5305
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs
5302
5306
  var _ThrottlingUtils, ThrottlingUtils;
5303
5307
  var init_ThrottlingUtils = __esm({
5304
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/network/ThrottlingUtils.mjs"() {
5308
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs"() {
5305
5309
  "use strict";
5306
5310
  init_Constants();
5307
5311
  init_ServerError();
@@ -5319,7 +5323,7 @@ var init_ThrottlingUtils = __esm({
5319
5323
  * @param thumbprint
5320
5324
  */
5321
5325
  static preProcess(cacheManager, thumbprint) {
5322
- var _a;
5326
+ var _a2;
5323
5327
  const key = _ThrottlingUtils.generateThrottlingStorageKey(thumbprint);
5324
5328
  const value = cacheManager.getThrottlingCache(key);
5325
5329
  if (value) {
@@ -5327,7 +5331,7 @@ var init_ThrottlingUtils = __esm({
5327
5331
  cacheManager.removeItem(key);
5328
5332
  return;
5329
5333
  }
5330
- throw new ServerError(((_a = value.errorCodes) == null ? void 0 : _a.join(" ")) || Constants.EMPTY_STRING, value.errorMessage, value.subError);
5334
+ throw new ServerError(((_a2 = value.errorCodes) == null ? void 0 : _a2.join(" ")) || Constants.EMPTY_STRING, value.errorMessage, value.subError);
5331
5335
  }
5332
5336
  }
5333
5337
  /**
@@ -5396,10 +5400,10 @@ var init_ThrottlingUtils = __esm({
5396
5400
  }
5397
5401
  });
5398
5402
 
5399
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/network/NetworkManager.mjs
5403
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs
5400
5404
  var _NetworkManager, NetworkManager;
5401
5405
  var init_NetworkManager = __esm({
5402
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/network/NetworkManager.mjs"() {
5406
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs"() {
5403
5407
  "use strict";
5404
5408
  init_ThrottlingUtils();
5405
5409
  init_AuthError();
@@ -5437,10 +5441,10 @@ var init_NetworkManager = __esm({
5437
5441
  }
5438
5442
  });
5439
5443
 
5440
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/CcsCredential.mjs
5444
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs
5441
5445
  var CcsCredentialType;
5442
5446
  var init_CcsCredential = __esm({
5443
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/CcsCredential.mjs"() {
5447
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs"() {
5444
5448
  "use strict";
5445
5449
  CcsCredentialType = {
5446
5450
  HOME_ACCOUNT_ID: "home_account_id",
@@ -5449,10 +5453,10 @@ var init_CcsCredential = __esm({
5449
5453
  }
5450
5454
  });
5451
5455
 
5452
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/RequestValidator.mjs
5456
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs
5453
5457
  var _RequestValidator, RequestValidator;
5454
5458
  var init_RequestValidator = __esm({
5455
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/RequestValidator.mjs"() {
5459
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs"() {
5456
5460
  "use strict";
5457
5461
  init_ClientConfigurationError();
5458
5462
  init_Constants();
@@ -5532,10 +5536,10 @@ var init_RequestValidator = __esm({
5532
5536
  }
5533
5537
  });
5534
5538
 
5535
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/RequestParameterBuilder.mjs
5539
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs
5536
5540
  var _RequestParameterBuilder, RequestParameterBuilder;
5537
5541
  var init_RequestParameterBuilder = __esm({
5538
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/RequestParameterBuilder.mjs"() {
5542
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs"() {
5539
5543
  "use strict";
5540
5544
  init_Constants();
5541
5545
  init_AADServerParamKeys();
@@ -5912,10 +5916,10 @@ var init_RequestParameterBuilder = __esm({
5912
5916
  }
5913
5917
  });
5914
5918
 
5915
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/BaseClient.mjs
5919
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs
5916
5920
  var _BaseClient, BaseClient;
5917
5921
  var init_BaseClient = __esm({
5918
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/BaseClient.mjs"() {
5922
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs"() {
5919
5923
  "use strict";
5920
5924
  init_ClientConfiguration();
5921
5925
  init_NetworkManager();
@@ -5970,13 +5974,13 @@ var init_BaseClient = __esm({
5970
5974
  * @param thumbprint
5971
5975
  */
5972
5976
  async executePostToTokenEndpoint(tokenEndpoint, queryString, headers, thumbprint, correlationId, queuedEvent) {
5973
- var _a, _b, _c, _d;
5977
+ var _a2, _b2, _c, _d;
5974
5978
  if (queuedEvent) {
5975
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(queuedEvent, correlationId);
5979
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(queuedEvent, correlationId);
5976
5980
  }
5977
5981
  const response = await this.networkManager.sendPostRequest(thumbprint, tokenEndpoint, { body: queryString, headers });
5978
5982
  (_d = this.performanceClient) == null ? void 0 : _d.addFields({
5979
- refreshTokenSize: ((_b = response.body.refresh_token) == null ? void 0 : _b.length) || 0,
5983
+ refreshTokenSize: ((_b2 = response.body.refresh_token) == null ? void 0 : _b2.length) || 0,
5980
5984
  httpVerToken: ((_c = response.headers) == null ? void 0 : _c[HeaderNames.X_MS_HTTP_VERSION]) || ""
5981
5985
  }, correlationId);
5982
5986
  if (this.config.serverTelemetryManager && response.status < 500 && response.status !== 429) {
@@ -5989,8 +5993,8 @@ var init_BaseClient = __esm({
5989
5993
  * @param updatedAuthority
5990
5994
  */
5991
5995
  async updateAuthority(cloudInstanceHostname, correlationId) {
5992
- var _a;
5993
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.UpdateTokenEndpointAuthority, correlationId);
5996
+ var _a2;
5997
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.UpdateTokenEndpointAuthority, correlationId);
5994
5998
  const cloudInstanceAuthorityUri = `https://${cloudInstanceHostname}/${this.authority.tenant}/`;
5995
5999
  const cloudInstanceAuthority = await createDiscoveredInstance(cloudInstanceAuthorityUri, this.networkClient, this.cacheManager, this.authority.options, this.logger, correlationId, this.performanceClient);
5996
6000
  this.authority = cloudInstanceAuthority;
@@ -6012,7 +6016,7 @@ var init_BaseClient = __esm({
6012
6016
  }
6013
6017
  });
6014
6018
 
6015
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/InteractionRequiredAuthErrorCodes.mjs
6019
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs
6016
6020
  var InteractionRequiredAuthErrorCodes_exports = {};
6017
6021
  __export(InteractionRequiredAuthErrorCodes_exports, {
6018
6022
  badToken: () => badToken,
@@ -6025,7 +6029,7 @@ __export(InteractionRequiredAuthErrorCodes_exports, {
6025
6029
  });
6026
6030
  var noTokensFound, nativeAccountUnavailable, refreshTokenExpired, interactionRequired, consentRequired, loginRequired, badToken;
6027
6031
  var init_InteractionRequiredAuthErrorCodes = __esm({
6028
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/InteractionRequiredAuthErrorCodes.mjs"() {
6032
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs"() {
6029
6033
  "use strict";
6030
6034
  noTokensFound = "no_tokens_found";
6031
6035
  nativeAccountUnavailable = "native_account_unavailable";
@@ -6037,7 +6041,7 @@ var init_InteractionRequiredAuthErrorCodes = __esm({
6037
6041
  }
6038
6042
  });
6039
6043
 
6040
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/InteractionRequiredAuthError.mjs
6044
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs
6041
6045
  function isInteractionRequiredError(errorCode, errorString, subError) {
6042
6046
  const isInteractionRequiredErrorCode = !!errorCode && InteractionRequiredServerErrorMessage.indexOf(errorCode) > -1;
6043
6047
  const isInteractionRequiredSubError = !!subError && InteractionRequiredAuthSubErrorMessage.indexOf(subError) > -1;
@@ -6051,7 +6055,7 @@ function createInteractionRequiredAuthError(errorCode) {
6051
6055
  }
6052
6056
  var InteractionRequiredServerErrorMessage, InteractionRequiredAuthSubErrorMessage, InteractionRequiredAuthErrorMessages, InteractionRequiredAuthErrorMessage, _InteractionRequiredAuthError, InteractionRequiredAuthError;
6053
6057
  var init_InteractionRequiredAuthError = __esm({
6054
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/InteractionRequiredAuthError.mjs"() {
6058
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs"() {
6055
6059
  "use strict";
6056
6060
  init_Constants();
6057
6061
  init_AuthError();
@@ -6109,10 +6113,10 @@ var init_InteractionRequiredAuthError = __esm({
6109
6113
  }
6110
6114
  });
6111
6115
 
6112
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/entities/CacheRecord.mjs
6116
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs
6113
6117
  var _CacheRecord, CacheRecord;
6114
6118
  var init_CacheRecord = __esm({
6115
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/entities/CacheRecord.mjs"() {
6119
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs"() {
6116
6120
  "use strict";
6117
6121
  _CacheRecord = class _CacheRecord {
6118
6122
  constructor(accountEntity, idTokenEntity, accessTokenEntity, refreshTokenEntity, appMetadataEntity) {
@@ -6128,10 +6132,10 @@ var init_CacheRecord = __esm({
6128
6132
  }
6129
6133
  });
6130
6134
 
6131
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/ProtocolUtils.mjs
6135
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs
6132
6136
  var _ProtocolUtils, ProtocolUtils;
6133
6137
  var init_ProtocolUtils = __esm({
6134
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/ProtocolUtils.mjs"() {
6138
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs"() {
6135
6139
  "use strict";
6136
6140
  init_Constants();
6137
6141
  init_ClientAuthError();
@@ -6196,10 +6200,10 @@ var init_ProtocolUtils = __esm({
6196
6200
  }
6197
6201
  });
6198
6202
 
6199
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/crypto/PopTokenGenerator.mjs
6203
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs
6200
6204
  var KeyLocation, _PopTokenGenerator, PopTokenGenerator;
6201
6205
  var init_PopTokenGenerator = __esm({
6202
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/crypto/PopTokenGenerator.mjs"() {
6206
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs"() {
6203
6207
  "use strict";
6204
6208
  init_TimeUtils();
6205
6209
  init_UrlString();
@@ -6221,14 +6225,13 @@ var init_PopTokenGenerator = __esm({
6221
6225
  * @returns
6222
6226
  */
6223
6227
  async generateCnf(request, logger) {
6224
- var _a;
6225
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.PopTokenGenerateCnf, request.correlationId);
6228
+ var _a2;
6229
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.PopTokenGenerateCnf, request.correlationId);
6226
6230
  const reqCnf = await invokeAsync(this.generateKid.bind(this), PerformanceEvents.PopTokenGenerateCnf, logger, this.performanceClient, request.correlationId)(request);
6227
- const reqCnfString = this.cryptoUtils.base64Encode(JSON.stringify(reqCnf));
6231
+ const reqCnfString = this.cryptoUtils.base64UrlEncode(JSON.stringify(reqCnf));
6228
6232
  return {
6229
6233
  kid: reqCnf.kid,
6230
- reqCnfString,
6231
- reqCnfHash: await this.cryptoUtils.hashString(reqCnfString)
6234
+ reqCnfString
6232
6235
  };
6233
6236
  }
6234
6237
  /**
@@ -6237,8 +6240,8 @@ var init_PopTokenGenerator = __esm({
6237
6240
  * @returns
6238
6241
  */
6239
6242
  async generateKid(request) {
6240
- var _a;
6241
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.PopTokenGenerateKid, request.correlationId);
6243
+ var _a2;
6244
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.PopTokenGenerateKid, request.correlationId);
6242
6245
  const kidThumbprint = await this.cryptoUtils.getPublicKeyThumbprint(request);
6243
6246
  return {
6244
6247
  kid: kidThumbprint,
@@ -6284,10 +6287,10 @@ var init_PopTokenGenerator = __esm({
6284
6287
  }
6285
6288
  });
6286
6289
 
6287
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/persistence/TokenCacheContext.mjs
6290
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs
6288
6291
  var _TokenCacheContext, TokenCacheContext;
6289
6292
  var init_TokenCacheContext = __esm({
6290
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/persistence/TokenCacheContext.mjs"() {
6293
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs"() {
6291
6294
  "use strict";
6292
6295
  _TokenCacheContext = class _TokenCacheContext {
6293
6296
  constructor(tokenCache, hasChanged) {
@@ -6312,12 +6315,12 @@ var init_TokenCacheContext = __esm({
6312
6315
  }
6313
6316
  });
6314
6317
 
6315
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/response/ResponseHandler.mjs
6318
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs
6316
6319
  function parseServerErrorNo(serverResponse) {
6317
- var _a, _b;
6320
+ var _a2, _b2;
6318
6321
  const errorCodePrefix = "code=";
6319
- const errorCodePrefixIndex = (_a = serverResponse.error_uri) == null ? void 0 : _a.lastIndexOf(errorCodePrefix);
6320
- return errorCodePrefixIndex && errorCodePrefixIndex >= 0 ? (_b = serverResponse.error_uri) == null ? void 0 : _b.substring(errorCodePrefixIndex + errorCodePrefix.length) : void 0;
6322
+ const errorCodePrefixIndex = (_a2 = serverResponse.error_uri) == null ? void 0 : _a2.lastIndexOf(errorCodePrefix);
6323
+ return errorCodePrefixIndex && errorCodePrefixIndex >= 0 ? (_b2 = serverResponse.error_uri) == null ? void 0 : _b2.substring(errorCodePrefixIndex + errorCodePrefix.length) : void 0;
6321
6324
  }
6322
6325
  function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClaims, base64Decode, clientInfo, environment, claimsTenantId, authCodePayload, nativeAccountId, logger) {
6323
6326
  logger == null ? void 0 : logger.verbose("setCachedAccount called");
@@ -6350,7 +6353,7 @@ function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClai
6350
6353
  }
6351
6354
  var _ResponseHandler, ResponseHandler;
6352
6355
  var init_ResponseHandler = __esm({
6353
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/response/ResponseHandler.mjs"() {
6356
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs"() {
6354
6357
  "use strict";
6355
6358
  init_ClientAuthError();
6356
6359
  init_ServerError();
@@ -6418,10 +6421,10 @@ var init_ResponseHandler = __esm({
6418
6421
  * @param refreshAccessToken
6419
6422
  */
6420
6423
  validateTokenResponse(serverResponse, refreshAccessToken) {
6421
- var _a;
6424
+ var _a2;
6422
6425
  if (serverResponse.error || serverResponse.error_description || serverResponse.suberror) {
6423
6426
  const errString = `${serverResponse.error_codes} - [${serverResponse.timestamp}]: ${serverResponse.error_description} - Correlation ID: ${serverResponse.correlation_id} - Trace ID: ${serverResponse.trace_id}`;
6424
- const serverErrorNo = ((_a = serverResponse.error_codes) == null ? void 0 : _a.length) ? serverResponse.error_codes[0] : void 0;
6427
+ const serverErrorNo = ((_a2 = serverResponse.error_codes) == null ? void 0 : _a2.length) ? serverResponse.error_codes[0] : void 0;
6425
6428
  const serverError = new ServerError(serverResponse.error, errString, serverResponse.suberror, serverErrorNo);
6426
6429
  if (refreshAccessToken && serverResponse.status && serverResponse.status >= HttpStatus.SERVER_ERROR_RANGE_START && serverResponse.status <= HttpStatus.SERVER_ERROR_RANGE_END) {
6427
6430
  this.logger.warning(`executeTokenRequest:validateTokenResponse - AAD is currently unavailable and the access token is unable to be refreshed.
@@ -6444,8 +6447,8 @@ ${serverError}`);
6444
6447
  * @param authority
6445
6448
  */
6446
6449
  async handleServerTokenResponse(serverTokenResponse, authority, reqTimestamp, request, authCodePayload, userAssertionHash, handlingRefreshTokenResponse, forceCacheRefreshTokenResponse, serverRequestId) {
6447
- var _a;
6448
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.HandleServerTokenResponse, serverTokenResponse.correlation_id);
6450
+ var _a2;
6451
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.HandleServerTokenResponse, serverTokenResponse.correlation_id);
6449
6452
  let idTokenClaims;
6450
6453
  if (serverTokenResponse.id_token) {
6451
6454
  idTokenClaims = extractTokenClaims(serverTokenResponse.id_token || Constants.EMPTY_STRING, this.cryptoObj.base64Decode);
@@ -6565,7 +6568,7 @@ ${serverError}`);
6565
6568
  * @param stateString
6566
6569
  */
6567
6570
  static async generateAuthenticationResult(cryptoObj, authority, cacheRecord, fromTokenCache, request, idTokenClaims, requestState, serverTokenResponse, requestId) {
6568
- var _a, _b, _c, _d, _e;
6571
+ var _a2, _b2, _c, _d, _e;
6569
6572
  let accessToken = Constants.EMPTY_STRING;
6570
6573
  let responseScopes = [];
6571
6574
  let expiresOn = null;
@@ -6573,7 +6576,7 @@ ${serverError}`);
6573
6576
  let refreshOn;
6574
6577
  let familyId = Constants.EMPTY_STRING;
6575
6578
  if (cacheRecord.accessToken) {
6576
- if (cacheRecord.accessToken.tokenType === AuthenticationScheme.POP) {
6579
+ if (cacheRecord.accessToken.tokenType === AuthenticationScheme.POP && !request.popKid) {
6577
6580
  const popTokenGenerator = new PopTokenGenerator(cryptoObj);
6578
6581
  const { secret, keyId } = cacheRecord.accessToken;
6579
6582
  if (!keyId) {
@@ -6603,7 +6606,7 @@ ${serverError}`);
6603
6606
  void 0,
6604
6607
  // tenantProfile optional
6605
6608
  idTokenClaims,
6606
- (_a = cacheRecord.idToken) == null ? void 0 : _a.secret
6609
+ (_a2 = cacheRecord.idToken) == null ? void 0 : _a2.secret
6607
6610
  ) : null;
6608
6611
  return {
6609
6612
  authority: authority.canonicalAuthority,
@@ -6611,7 +6614,7 @@ ${serverError}`);
6611
6614
  tenantId: tid,
6612
6615
  scopes: responseScopes,
6613
6616
  account: accountInfo,
6614
- idToken: ((_b = cacheRecord == null ? void 0 : cacheRecord.idToken) == null ? void 0 : _b.secret) || "",
6617
+ idToken: ((_b2 = cacheRecord == null ? void 0 : cacheRecord.idToken) == null ? void 0 : _b2.secret) || "",
6615
6618
  idTokenClaims: idTokenClaims || {},
6616
6619
  accessToken,
6617
6620
  fromCache: fromTokenCache,
@@ -6636,10 +6639,10 @@ ${serverError}`);
6636
6639
  }
6637
6640
  });
6638
6641
 
6639
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/AuthorizationCodeClient.mjs
6642
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs
6640
6643
  var _AuthorizationCodeClient, AuthorizationCodeClient;
6641
6644
  var init_AuthorizationCodeClient = __esm({
6642
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/AuthorizationCodeClient.mjs"() {
6645
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs"() {
6643
6646
  "use strict";
6644
6647
  init_BaseClient();
6645
6648
  init_RequestParameterBuilder();
@@ -6663,10 +6666,10 @@ var init_AuthorizationCodeClient = __esm({
6663
6666
  init_ClientConfigurationErrorCodes();
6664
6667
  _AuthorizationCodeClient = class _AuthorizationCodeClient extends BaseClient {
6665
6668
  constructor(configuration, performanceClient) {
6666
- var _a;
6669
+ var _a2;
6667
6670
  super(configuration, performanceClient);
6668
6671
  this.includeRedirectUri = true;
6669
- this.oidcDefaultScopes = (_a = this.config.authOptions.authority.options.OIDCOptions) == null ? void 0 : _a.defaultScopes;
6672
+ this.oidcDefaultScopes = (_a2 = this.config.authOptions.authority.options.OIDCOptions) == null ? void 0 : _a2.defaultScopes;
6670
6673
  }
6671
6674
  /**
6672
6675
  * Creates the URL of the authorization request letting the user input credentials and consent to the
@@ -6679,8 +6682,8 @@ var init_AuthorizationCodeClient = __esm({
6679
6682
  * @param request
6680
6683
  */
6681
6684
  async getAuthCodeUrl(request) {
6682
- var _a;
6683
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.GetAuthCodeUrl, request.correlationId);
6685
+ var _a2;
6686
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.GetAuthCodeUrl, request.correlationId);
6684
6687
  const queryString = await invokeAsync(this.createAuthCodeUrlQueryString.bind(this), PerformanceEvents.AuthClientCreateQueryString, this.logger, this.performanceClient, request.correlationId)(request);
6685
6688
  return UrlString.appendQueryString(this.authority.authorizationEndpoint, queryString);
6686
6689
  }
@@ -6690,14 +6693,14 @@ var init_AuthorizationCodeClient = __esm({
6690
6693
  * @param request
6691
6694
  */
6692
6695
  async acquireToken(request, authCodePayload) {
6693
- var _a, _b;
6694
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthClientAcquireToken, request.correlationId);
6696
+ var _a2, _b2;
6697
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientAcquireToken, request.correlationId);
6695
6698
  if (!request.code) {
6696
6699
  throw createClientAuthError(requestCannotBeMade);
6697
6700
  }
6698
6701
  const reqTimestamp = nowSeconds();
6699
6702
  const response = await invokeAsync(this.executeTokenRequest.bind(this), PerformanceEvents.AuthClientExecuteTokenRequest, this.logger, this.performanceClient, request.correlationId)(this.authority, request);
6700
- const requestId = (_b = response.headers) == null ? void 0 : _b[HeaderNames.X_MS_REQUEST_ID];
6703
+ const requestId = (_b2 = response.headers) == null ? void 0 : _b2[HeaderNames.X_MS_REQUEST_ID];
6701
6704
  const responseHandler = new ResponseHandler(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, this.config.serializableCache, this.config.persistencePlugin, this.performanceClient);
6702
6705
  responseHandler.validateTokenResponse(response.body);
6703
6706
  return invokeAsync(responseHandler.handleServerTokenResponse.bind(responseHandler), PerformanceEvents.HandleServerTokenResponse, this.logger, this.performanceClient, request.correlationId)(response.body, this.authority, reqTimestamp, request, authCodePayload, void 0, void 0, void 0, requestId);
@@ -6733,8 +6736,8 @@ var init_AuthorizationCodeClient = __esm({
6733
6736
  * @param request
6734
6737
  */
6735
6738
  async executeTokenRequest(authority, request) {
6736
- var _a, _b;
6737
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthClientExecuteTokenRequest, request.correlationId);
6739
+ var _a2, _b2;
6740
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientExecuteTokenRequest, request.correlationId);
6738
6741
  const queryParametersString = this.createTokenQueryParameters(request);
6739
6742
  const endpoint = UrlString.appendQueryString(authority.tokenEndpoint, queryParametersString);
6740
6743
  const requestBody = await invokeAsync(this.createTokenRequestBody.bind(this), PerformanceEvents.AuthClientCreateTokenRequestBody, this.logger, this.performanceClient, request.correlationId)(request);
@@ -6752,7 +6755,7 @@ var init_AuthorizationCodeClient = __esm({
6752
6755
  }
6753
6756
  const headers = this.createTokenRequestHeaders(ccsCredential || request.ccsCredential);
6754
6757
  const thumbprint = {
6755
- clientId: ((_b = request.tokenBodyParameters) == null ? void 0 : _b.clientId) || this.config.authOptions.clientId,
6758
+ clientId: ((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2.clientId) || this.config.authOptions.clientId,
6756
6759
  authority: authority.canonicalAuthority,
6757
6760
  scopes: request.scopes,
6758
6761
  claims: request.claims,
@@ -6769,10 +6772,10 @@ var init_AuthorizationCodeClient = __esm({
6769
6772
  * @param request
6770
6773
  */
6771
6774
  async createTokenRequestBody(request) {
6772
- var _a, _b;
6773
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthClientCreateTokenRequestBody, request.correlationId);
6775
+ var _a2, _b2;
6776
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientCreateTokenRequestBody, request.correlationId);
6774
6777
  const parameterBuilder = new RequestParameterBuilder();
6775
- parameterBuilder.addClientId(((_b = request.tokenBodyParameters) == null ? void 0 : _b[CLIENT_ID]) || this.config.authOptions.clientId);
6778
+ parameterBuilder.addClientId(((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2[CLIENT_ID]) || this.config.authOptions.clientId);
6776
6779
  if (!this.includeRedirectUri) {
6777
6780
  RequestValidator.validateRedirectUri(request.redirectUri);
6778
6781
  } else {
@@ -6801,8 +6804,14 @@ var init_AuthorizationCodeClient = __esm({
6801
6804
  parameterBuilder.addClientInfo();
6802
6805
  if (request.authenticationScheme === AuthenticationScheme.POP) {
6803
6806
  const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils, this.performanceClient);
6804
- const reqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
6805
- parameterBuilder.addPopToken(reqCnfData.reqCnfString);
6807
+ let reqCnfData;
6808
+ if (!request.popKid) {
6809
+ const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
6810
+ reqCnfData = generatedReqCnfData.reqCnfString;
6811
+ } else {
6812
+ reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
6813
+ }
6814
+ parameterBuilder.addPopToken(reqCnfData);
6806
6815
  } else if (request.authenticationScheme === AuthenticationScheme.SSH) {
6807
6816
  if (request.sshJwk) {
6808
6817
  parameterBuilder.addSshJwk(request.sshJwk);
@@ -6859,10 +6868,10 @@ var init_AuthorizationCodeClient = __esm({
6859
6868
  * @param request
6860
6869
  */
6861
6870
  async createAuthCodeUrlQueryString(request) {
6862
- var _a, _b;
6863
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.AuthClientCreateQueryString, request.correlationId);
6871
+ var _a2, _b2;
6872
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.AuthClientCreateQueryString, request.correlationId);
6864
6873
  const parameterBuilder = new RequestParameterBuilder();
6865
- parameterBuilder.addClientId(((_b = request.extraQueryParameters) == null ? void 0 : _b[CLIENT_ID]) || this.config.authOptions.clientId);
6874
+ parameterBuilder.addClientId(((_b2 = request.extraQueryParameters) == null ? void 0 : _b2[CLIENT_ID]) || this.config.authOptions.clientId);
6866
6875
  const requestScopes = [
6867
6876
  ...request.scopes || [],
6868
6877
  ...request.extraScopesToConsent || []
@@ -6954,8 +6963,14 @@ var init_AuthorizationCodeClient = __esm({
6954
6963
  parameterBuilder.addNativeBroker();
6955
6964
  if (request.authenticationScheme === AuthenticationScheme.POP) {
6956
6965
  const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils);
6957
- const reqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
6958
- parameterBuilder.addPopToken(reqCnfData.reqCnfHash);
6966
+ let reqCnfData;
6967
+ if (!request.popKid) {
6968
+ const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
6969
+ reqCnfData = generatedReqCnfData.reqCnfString;
6970
+ } else {
6971
+ reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
6972
+ }
6973
+ parameterBuilder.addPopToken(reqCnfData);
6959
6974
  }
6960
6975
  }
6961
6976
  return parameterBuilder.createQueryString();
@@ -6991,12 +7006,12 @@ var init_AuthorizationCodeClient = __esm({
6991
7006
  * @param account
6992
7007
  */
6993
7008
  extractAccountSid(account) {
6994
- var _a;
6995
- return ((_a = account.idTokenClaims) == null ? void 0 : _a.sid) || null;
7009
+ var _a2;
7010
+ return ((_a2 = account.idTokenClaims) == null ? void 0 : _a2.sid) || null;
6996
7011
  }
6997
7012
  extractLoginHint(account) {
6998
- var _a;
6999
- return ((_a = account.idTokenClaims) == null ? void 0 : _a.login_hint) || null;
7013
+ var _a2;
7014
+ return ((_a2 = account.idTokenClaims) == null ? void 0 : _a2.login_hint) || null;
7000
7015
  }
7001
7016
  };
7002
7017
  __name(_AuthorizationCodeClient, "AuthorizationCodeClient");
@@ -7004,10 +7019,10 @@ var init_AuthorizationCodeClient = __esm({
7004
7019
  }
7005
7020
  });
7006
7021
 
7007
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/RefreshTokenClient.mjs
7022
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs
7008
7023
  var DEFAULT_REFRESH_TOKEN_EXPIRATION_OFFSET_SECONDS, _RefreshTokenClient, RefreshTokenClient;
7009
7024
  var init_RefreshTokenClient = __esm({
7010
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/RefreshTokenClient.mjs"() {
7025
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs"() {
7011
7026
  "use strict";
7012
7027
  init_ClientConfiguration();
7013
7028
  init_BaseClient();
@@ -7038,11 +7053,11 @@ var init_RefreshTokenClient = __esm({
7038
7053
  super(configuration, performanceClient);
7039
7054
  }
7040
7055
  async acquireToken(request) {
7041
- var _a, _b;
7042
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireToken, request.correlationId);
7056
+ var _a2, _b2;
7057
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireToken, request.correlationId);
7043
7058
  const reqTimestamp = nowSeconds();
7044
7059
  const response = await invokeAsync(this.executeTokenRequest.bind(this), PerformanceEvents.RefreshTokenClientExecuteTokenRequest, this.logger, this.performanceClient, request.correlationId)(request, this.authority);
7045
- const requestId = (_b = response.headers) == null ? void 0 : _b[HeaderNames.X_MS_REQUEST_ID];
7060
+ const requestId = (_b2 = response.headers) == null ? void 0 : _b2[HeaderNames.X_MS_REQUEST_ID];
7046
7061
  const responseHandler = new ResponseHandler(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, this.config.serializableCache, this.config.persistencePlugin);
7047
7062
  responseHandler.validateTokenResponse(response.body);
7048
7063
  return invokeAsync(responseHandler.handleServerTokenResponse.bind(responseHandler), PerformanceEvents.HandleServerTokenResponse, this.logger, this.performanceClient, request.correlationId)(response.body, this.authority, reqTimestamp, request, void 0, void 0, true, request.forceCache, requestId);
@@ -7052,11 +7067,11 @@ var init_RefreshTokenClient = __esm({
7052
7067
  * @param request
7053
7068
  */
7054
7069
  async acquireTokenByRefreshToken(request) {
7055
- var _a;
7070
+ var _a2;
7056
7071
  if (!request) {
7057
7072
  throw createClientConfigurationError(tokenRequestEmpty);
7058
7073
  }
7059
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenByRefreshToken, request.correlationId);
7074
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenByRefreshToken, request.correlationId);
7060
7075
  if (!request.account) {
7061
7076
  throw createClientAuthError(noAccountInSilentRequest);
7062
7077
  }
@@ -7081,8 +7096,8 @@ var init_RefreshTokenClient = __esm({
7081
7096
  * @param request
7082
7097
  */
7083
7098
  async acquireTokenWithCachedRefreshToken(request, foci) {
7084
- var _a;
7085
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, request.correlationId);
7099
+ var _a2;
7100
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, request.correlationId);
7086
7101
  const refreshToken = invoke(this.cacheManager.getRefreshToken.bind(this.cacheManager), PerformanceEvents.CacheManagerGetRefreshToken, this.logger, this.performanceClient, request.correlationId)(request.account, foci, void 0, this.performanceClient, request.correlationId);
7087
7102
  if (!refreshToken) {
7088
7103
  throw createInteractionRequiredAuthError(noTokensFound);
@@ -7116,14 +7131,14 @@ var init_RefreshTokenClient = __esm({
7116
7131
  * @param authority
7117
7132
  */
7118
7133
  async executeTokenRequest(request, authority) {
7119
- var _a, _b;
7120
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RefreshTokenClientExecuteTokenRequest, request.correlationId);
7134
+ var _a2, _b2;
7135
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientExecuteTokenRequest, request.correlationId);
7121
7136
  const queryParametersString = this.createTokenQueryParameters(request);
7122
7137
  const endpoint = UrlString.appendQueryString(authority.tokenEndpoint, queryParametersString);
7123
7138
  const requestBody = await invokeAsync(this.createTokenRequestBody.bind(this), PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, this.logger, this.performanceClient, request.correlationId)(request);
7124
7139
  const headers = this.createTokenRequestHeaders(request.ccsCredential);
7125
7140
  const thumbprint = {
7126
- clientId: ((_b = request.tokenBodyParameters) == null ? void 0 : _b.clientId) || this.config.authOptions.clientId,
7141
+ clientId: ((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2.clientId) || this.config.authOptions.clientId,
7127
7142
  authority: authority.canonicalAuthority,
7128
7143
  scopes: request.scopes,
7129
7144
  claims: request.claims,
@@ -7140,11 +7155,11 @@ var init_RefreshTokenClient = __esm({
7140
7155
  * @param request
7141
7156
  */
7142
7157
  async createTokenRequestBody(request) {
7143
- var _a, _b, _c;
7144
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, request.correlationId);
7158
+ var _a2, _b2, _c;
7159
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, request.correlationId);
7145
7160
  const correlationId = request.correlationId;
7146
7161
  const parameterBuilder = new RequestParameterBuilder();
7147
- parameterBuilder.addClientId(((_b = request.tokenBodyParameters) == null ? void 0 : _b[CLIENT_ID]) || this.config.authOptions.clientId);
7162
+ parameterBuilder.addClientId(((_b2 = request.tokenBodyParameters) == null ? void 0 : _b2[CLIENT_ID]) || this.config.authOptions.clientId);
7148
7163
  if (request.redirectUri) {
7149
7164
  parameterBuilder.addRedirectUri(request.redirectUri);
7150
7165
  }
@@ -7169,8 +7184,14 @@ var init_RefreshTokenClient = __esm({
7169
7184
  }
7170
7185
  if (request.authenticationScheme === AuthenticationScheme.POP) {
7171
7186
  const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils, this.performanceClient);
7172
- const reqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
7173
- parameterBuilder.addPopToken(reqCnfData.reqCnfString);
7187
+ let reqCnfData;
7188
+ if (!request.popKid) {
7189
+ const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
7190
+ reqCnfData = generatedReqCnfData.reqCnfString;
7191
+ } else {
7192
+ reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
7193
+ }
7194
+ parameterBuilder.addPopToken(reqCnfData);
7174
7195
  } else if (request.authenticationScheme === AuthenticationScheme.SSH) {
7175
7196
  if (request.sshJwk) {
7176
7197
  parameterBuilder.addSshJwk(request.sshJwk);
@@ -7207,10 +7228,10 @@ var init_RefreshTokenClient = __esm({
7207
7228
  }
7208
7229
  });
7209
7230
 
7210
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/SilentFlowClient.mjs
7231
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs
7211
7232
  var _SilentFlowClient, SilentFlowClient;
7212
7233
  var init_SilentFlowClient = __esm({
7213
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/SilentFlowClient.mjs"() {
7234
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs"() {
7214
7235
  "use strict";
7215
7236
  init_BaseClient();
7216
7237
  init_TimeUtils();
@@ -7234,11 +7255,11 @@ var init_SilentFlowClient = __esm({
7234
7255
  * @param request
7235
7256
  */
7236
7257
  async acquireToken(request) {
7237
- var _a;
7258
+ var _a2;
7238
7259
  try {
7239
7260
  const [authResponse, cacheOutcome] = await this.acquireCachedToken({
7240
7261
  ...request,
7241
- scopes: ((_a = request.scopes) == null ? void 0 : _a.length) ? request.scopes : [...OIDC_DEFAULT_SCOPES]
7262
+ scopes: ((_a2 = request.scopes) == null ? void 0 : _a2.length) ? request.scopes : [...OIDC_DEFAULT_SCOPES]
7242
7263
  });
7243
7264
  if (cacheOutcome === CacheOutcome.PROACTIVELY_REFRESHED) {
7244
7265
  this.logger.info("SilentFlowClient:acquireCachedToken - Cached access token's refreshOn property has been exceeded'. It's not expired, but must be refreshed.");
@@ -7261,8 +7282,8 @@ var init_SilentFlowClient = __esm({
7261
7282
  * @param request
7262
7283
  */
7263
7284
  async acquireCachedToken(request) {
7264
- var _a;
7265
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.SilentFlowClientAcquireCachedToken, request.correlationId);
7285
+ var _a2;
7286
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.SilentFlowClientAcquireCachedToken, request.correlationId);
7266
7287
  let lastCacheOutcome = CacheOutcome.NOT_APPLICABLE;
7267
7288
  if (request.forceRefresh || !this.config.cacheOptions.claimsBasedCachingEnabled && !StringUtils.isEmptyObj(request.claims)) {
7268
7289
  this.setCacheOutcome(CacheOutcome.FORCE_REFRESH_OR_CLAIMS, request.correlationId);
@@ -7301,9 +7322,9 @@ var init_SilentFlowClient = __esm({
7301
7322
  ];
7302
7323
  }
7303
7324
  setCacheOutcome(cacheOutcome, correlationId) {
7304
- var _a, _b;
7305
- (_a = this.serverTelemetryManager) == null ? void 0 : _a.setCacheOutcome(cacheOutcome);
7306
- (_b = this.performanceClient) == null ? void 0 : _b.addFields({
7325
+ var _a2, _b2;
7326
+ (_a2 = this.serverTelemetryManager) == null ? void 0 : _a2.setCacheOutcome(cacheOutcome);
7327
+ (_b2 = this.performanceClient) == null ? void 0 : _b2.addFields({
7307
7328
  cacheOutcome
7308
7329
  }, correlationId);
7309
7330
  if (cacheOutcome !== CacheOutcome.NOT_APPLICABLE) {
@@ -7315,8 +7336,8 @@ var init_SilentFlowClient = __esm({
7315
7336
  * @param cacheRecord
7316
7337
  */
7317
7338
  async generateResultFromCacheRecord(cacheRecord, request) {
7318
- var _a;
7319
- (_a = this.performanceClient) == null ? void 0 : _a.addQueueMeasurement(PerformanceEvents.SilentFlowClientGenerateResultFromCacheRecord, request.correlationId);
7339
+ var _a2;
7340
+ (_a2 = this.performanceClient) == null ? void 0 : _a2.addQueueMeasurement(PerformanceEvents.SilentFlowClientGenerateResultFromCacheRecord, request.correlationId);
7320
7341
  let idTokenClaims;
7321
7342
  if (cacheRecord.idToken) {
7322
7343
  idTokenClaims = extractTokenClaims(cacheRecord.idToken.secret, this.config.cryptoInterface.base64Decode);
@@ -7336,10 +7357,10 @@ var init_SilentFlowClient = __esm({
7336
7357
  }
7337
7358
  });
7338
7359
 
7339
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/telemetry/server/ServerTelemetryManager.mjs
7360
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs
7340
7361
  var _ServerTelemetryManager, ServerTelemetryManager;
7341
7362
  var init_ServerTelemetryManager = __esm({
7342
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/telemetry/server/ServerTelemetryManager.mjs"() {
7363
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs"() {
7343
7364
  "use strict";
7344
7365
  init_Constants();
7345
7366
  init_AuthError();
@@ -7515,9 +7536,9 @@ var init_ServerTelemetryManager = __esm({
7515
7536
  }
7516
7537
  });
7517
7538
 
7518
- // ../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/index.mjs
7539
+ // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs
7519
7540
  var init_dist = __esm({
7520
- "../../node_modules/.store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/index.mjs"() {
7541
+ "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs"() {
7521
7542
  "use strict";
7522
7543
  init_AuthToken();
7523
7544
  init_AuthorityFactory();
@@ -7558,10 +7579,10 @@ var init_dist = __esm({
7558
7579
  }
7559
7580
  });
7560
7581
 
7561
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/serializer/Deserializer.mjs
7582
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs
7562
7583
  var _Deserializer, Deserializer;
7563
7584
  var init_Deserializer = __esm({
7564
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/serializer/Deserializer.mjs"() {
7585
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs"() {
7565
7586
  "use strict";
7566
7587
  init_dist();
7567
7588
  _Deserializer = class _Deserializer {
@@ -7581,7 +7602,7 @@ var init_Deserializer = __esm({
7581
7602
  const accountObjects = {};
7582
7603
  if (accounts) {
7583
7604
  Object.keys(accounts).map(function(key) {
7584
- var _a;
7605
+ var _a2;
7585
7606
  const serializedAcc = accounts[key];
7586
7607
  const mappedAcc = {
7587
7608
  homeAccountId: serializedAcc.home_account_id,
@@ -7594,7 +7615,7 @@ var init_Deserializer = __esm({
7594
7615
  clientInfo: serializedAcc.client_info,
7595
7616
  lastModificationTime: serializedAcc.last_modification_time,
7596
7617
  lastModificationApp: serializedAcc.last_modification_app,
7597
- tenantProfiles: (_a = serializedAcc.tenantProfiles) == null ? void 0 : _a.map((serializedTenantProfile) => {
7618
+ tenantProfiles: (_a2 = serializedAcc.tenantProfiles) == null ? void 0 : _a2.map((serializedTenantProfile) => {
7598
7619
  return JSON.parse(serializedTenantProfile);
7599
7620
  })
7600
7621
  };
@@ -7720,24 +7741,24 @@ var init_Deserializer = __esm({
7720
7741
  }
7721
7742
  });
7722
7743
 
7723
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/internals.mjs
7744
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs
7724
7745
  var internals_exports = {};
7725
7746
  __export(internals_exports, {
7726
7747
  Deserializer: () => Deserializer,
7727
7748
  Serializer: () => Serializer
7728
7749
  });
7729
7750
  var init_internals = __esm({
7730
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/internals.mjs"() {
7751
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs"() {
7731
7752
  "use strict";
7732
7753
  init_Serializer();
7733
7754
  init_Deserializer();
7734
7755
  }
7735
7756
  });
7736
7757
 
7737
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/Constants.mjs
7738
- var AUTHORIZATION_HEADER_NAME, METADATA_HEADER_NAME, APP_SERVICE_SECRET_HEADER_NAME, SERVICE_FABRIC_SECRET_HEADER_NAME, API_VERSION_QUERY_PARAMETER_NAME, RESOURCE_BODY_OR_QUERY_PARAMETER_NAME, DEFAULT_MANAGED_IDENTITY_ID, MANAGED_IDENTITY_DEFAULT_TENANT, DEFAULT_AUTHORITY_FOR_MANAGED_IDENTITY, ManagedIdentityEnvironmentVariableNames, ManagedIdentitySourceNames, ManagedIdentityIdType, HttpMethod, ProxyStatus, REGION_ENVIRONMENT_VARIABLE, RANDOM_OCTET_SIZE, Hash, CharSet, Constants2, ApiId, JwtConstants, LOOPBACK_SERVER_CONSTANTS, MANAGED_IDENTITY_MAX_RETRIES, MANAGED_IDENTITY_RETRY_DELAY, MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON;
7758
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs
7759
+ var AUTHORIZATION_HEADER_NAME, METADATA_HEADER_NAME, APP_SERVICE_SECRET_HEADER_NAME, SERVICE_FABRIC_SECRET_HEADER_NAME, API_VERSION_QUERY_PARAMETER_NAME, RESOURCE_BODY_OR_QUERY_PARAMETER_NAME, DEFAULT_MANAGED_IDENTITY_ID, MANAGED_IDENTITY_DEFAULT_TENANT, DEFAULT_AUTHORITY_FOR_MANAGED_IDENTITY, ManagedIdentityEnvironmentVariableNames, ManagedIdentitySourceNames, ManagedIdentityIdType, HttpMethod, ProxyStatus, REGION_ENVIRONMENT_VARIABLE, RANDOM_OCTET_SIZE, Hash, CharSet, Constants2, ApiId, JwtConstants, LOOPBACK_SERVER_CONSTANTS, AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES, MANAGED_IDENTITY_MAX_RETRIES, MANAGED_IDENTITY_RETRY_DELAY, MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON;
7739
7760
  var init_Constants2 = __esm({
7740
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/Constants.mjs"() {
7761
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs"() {
7741
7762
  "use strict";
7742
7763
  init_dist();
7743
7764
  AUTHORIZATION_HEADER_NAME = "Authorization";
@@ -7820,6 +7841,7 @@ var init_Constants2 = __esm({
7820
7841
  INTERVAL_MS: 100,
7821
7842
  TIMEOUT_MS: 5e3
7822
7843
  };
7844
+ AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES = 4096;
7823
7845
  MANAGED_IDENTITY_MAX_RETRIES = 3;
7824
7846
  MANAGED_IDENTITY_RETRY_DELAY = 1e3;
7825
7847
  MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON = [
@@ -7833,10 +7855,10 @@ var init_Constants2 = __esm({
7833
7855
  }
7834
7856
  });
7835
7857
 
7836
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/NetworkUtils.mjs
7858
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs
7837
7859
  var _NetworkUtils, NetworkUtils;
7838
7860
  var init_NetworkUtils = __esm({
7839
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/NetworkUtils.mjs"() {
7861
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs"() {
7840
7862
  "use strict";
7841
7863
  _NetworkUtils = class _NetworkUtils {
7842
7864
  static getNetworkResponse(headers, body, statusCode) {
@@ -7875,12 +7897,12 @@ var init_NetworkUtils = __esm({
7875
7897
  }
7876
7898
  });
7877
7899
 
7878
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/HttpClient.mjs
7900
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs
7879
7901
  import http from "http";
7880
7902
  import https from "https";
7881
7903
  var _HttpClient, HttpClient, networkRequestViaProxy, networkRequestViaHttps, parseBody;
7882
7904
  var init_HttpClient = __esm({
7883
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/HttpClient.mjs"() {
7905
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs"() {
7884
7906
  "use strict";
7885
7907
  init_dist();
7886
7908
  init_Constants2();
@@ -8105,15 +8127,19 @@ Headers: ${JSON.stringify(headers)}`
8105
8127
  }
8106
8128
  });
8107
8129
 
8108
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/ManagedIdentityErrorCodes.mjs
8109
- var invalidManagedIdentityIdType, missingId, networkUnavailable, unableToCreateAzureArc, unableToCreateCloudShell, unableToCreateSource, unableToReadSecretFile, userAssignedNotAvailableAtRuntime, wwwAuthenticateHeaderMissing, wwwAuthenticateHeaderUnsupportedFormat, MsiEnvironmentVariableUrlMalformedErrorCodes;
8130
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs
8131
+ var invalidFileExtension, invalidFilePath, invalidManagedIdentityIdType, invalidSecret, missingId, networkUnavailable, platformNotSupported, unableToCreateAzureArc, unableToCreateCloudShell, unableToCreateSource, unableToReadSecretFile, userAssignedNotAvailableAtRuntime, wwwAuthenticateHeaderMissing, wwwAuthenticateHeaderUnsupportedFormat, MsiEnvironmentVariableUrlMalformedErrorCodes;
8110
8132
  var init_ManagedIdentityErrorCodes = __esm({
8111
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/ManagedIdentityErrorCodes.mjs"() {
8133
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs"() {
8112
8134
  "use strict";
8113
8135
  init_Constants2();
8136
+ invalidFileExtension = "invalid_file_extension";
8137
+ invalidFilePath = "invalid_file_path";
8114
8138
  invalidManagedIdentityIdType = "invalid_managed_identity_id_type";
8139
+ invalidSecret = "invalid_secret";
8115
8140
  missingId = "missing_client_id";
8116
8141
  networkUnavailable = "network_unavailable";
8142
+ platformNotSupported = "platform_not_supported";
8117
8143
  unableToCreateAzureArc = "unable_to_create_azure_arc";
8118
8144
  unableToCreateCloudShell = "unable_to_create_cloud_shell";
8119
8145
  unableToCreateSource = "unable_to_create_source";
@@ -8130,19 +8156,23 @@ var init_ManagedIdentityErrorCodes = __esm({
8130
8156
  }
8131
8157
  });
8132
8158
 
8133
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/ManagedIdentityError.mjs
8159
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs
8134
8160
  function createManagedIdentityError(errorCode) {
8135
8161
  return new ManagedIdentityError(errorCode);
8136
8162
  }
8137
8163
  var ManagedIdentityErrorMessages, _ManagedIdentityError, ManagedIdentityError;
8138
8164
  var init_ManagedIdentityError = __esm({
8139
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/ManagedIdentityError.mjs"() {
8165
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs"() {
8140
8166
  "use strict";
8141
8167
  init_dist();
8142
8168
  init_ManagedIdentityErrorCodes();
8143
8169
  init_Constants2();
8144
8170
  ManagedIdentityErrorMessages = {
8171
+ [invalidFileExtension]: "The file path in the WWW-Authenticate header does not contain a .key file.",
8172
+ [invalidFilePath]: "The file path in the WWW-Authenticate header is not in a valid Windows or Linux Format.",
8145
8173
  [invalidManagedIdentityIdType]: "More than one ManagedIdentityIdType was provided.",
8174
+ [invalidSecret]: "The secret in the file on the file path in the WWW-Authenticate header is greater than 4096 bytes.",
8175
+ [platformNotSupported]: "The platform is not supported by Azure Arc. Azure Arc only supports Windows and Linux.",
8146
8176
  [missingId]: "A ManagedIdentityId id was not provided.",
8147
8177
  [MsiEnvironmentVariableUrlMalformedErrorCodes.AZURE_POD_IDENTITY_AUTHORITY_HOST]: `The Managed Identity's '${ManagedIdentityEnvironmentVariableNames.AZURE_POD_IDENTITY_AUTHORITY_HOST}' environment variable is malformed.`,
8148
8178
  [MsiEnvironmentVariableUrlMalformedErrorCodes.IDENTITY_ENDPOINT]: `The Managed Identity's '${ManagedIdentityEnvironmentVariableNames.IDENTITY_ENDPOINT}' environment variable is malformed.`,
@@ -8170,10 +8200,10 @@ var init_ManagedIdentityError = __esm({
8170
8200
  }
8171
8201
  });
8172
8202
 
8173
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/ManagedIdentityId.mjs
8203
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs
8174
8204
  var _ManagedIdentityId, ManagedIdentityId;
8175
8205
  var init_ManagedIdentityId = __esm({
8176
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/ManagedIdentityId.mjs"() {
8206
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs"() {
8177
8207
  "use strict";
8178
8208
  init_ManagedIdentityError();
8179
8209
  init_Constants2();
@@ -8224,10 +8254,10 @@ var init_ManagedIdentityId = __esm({
8224
8254
  }
8225
8255
  });
8226
8256
 
8227
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/retry/LinearRetryPolicy.mjs
8257
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs
8228
8258
  var _LinearRetryPolicy, LinearRetryPolicy;
8229
8259
  var init_LinearRetryPolicy = __esm({
8230
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/retry/LinearRetryPolicy.mjs"() {
8260
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs"() {
8231
8261
  "use strict";
8232
8262
  _LinearRetryPolicy = class _LinearRetryPolicy {
8233
8263
  constructor(maxRetries, retryDelay, httpStatusCodesToRetryOn) {
@@ -8265,10 +8295,10 @@ var init_LinearRetryPolicy = __esm({
8265
8295
  }
8266
8296
  });
8267
8297
 
8268
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/HttpClientWithRetries.mjs
8298
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs
8269
8299
  var _HttpClientWithRetries, HttpClientWithRetries;
8270
8300
  var init_HttpClientWithRetries = __esm({
8271
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/HttpClientWithRetries.mjs"() {
8301
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs"() {
8272
8302
  "use strict";
8273
8303
  init_dist();
8274
8304
  init_Constants2();
@@ -8305,7 +8335,7 @@ var init_HttpClientWithRetries = __esm({
8305
8335
  }
8306
8336
  });
8307
8337
 
8308
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/Configuration.mjs
8338
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs
8309
8339
  function buildAppConfiguration({ auth, broker, cache, system, telemetry }) {
8310
8340
  const systemOptions = {
8311
8341
  ...DEFAULT_SYSTEM_OPTIONS2,
@@ -8344,7 +8374,7 @@ function buildManagedIdentityConfiguration({ managedIdentityIdParams, system })
8344
8374
  }
8345
8375
  var DEFAULT_AUTH_OPTIONS, DEFAULT_CACHE_OPTIONS2, DEFAULT_LOGGER_OPTIONS, DEFAULT_SYSTEM_OPTIONS2, DEFAULT_TELEMETRY_OPTIONS2;
8346
8376
  var init_Configuration = __esm({
8347
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/Configuration.mjs"() {
8377
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs"() {
8348
8378
  "use strict";
8349
8379
  init_dist();
8350
8380
  init_HttpClient();
@@ -8377,8 +8407,8 @@ var init_Configuration = __esm({
8377
8407
  claimsBasedCachingEnabled: false
8378
8408
  };
8379
8409
  DEFAULT_LOGGER_OPTIONS = {
8380
- loggerCallback: () => {
8381
- },
8410
+ loggerCallback: /* @__PURE__ */ __name(() => {
8411
+ }, "loggerCallback"),
8382
8412
  piiLoggingEnabled: false,
8383
8413
  logLevel: LogLevel.Info
8384
8414
  };
@@ -8492,10 +8522,10 @@ var init_esm_node = __esm({
8492
8522
  }
8493
8523
  });
8494
8524
 
8495
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/GuidGenerator.mjs
8525
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs
8496
8526
  var _GuidGenerator, GuidGenerator;
8497
8527
  var init_GuidGenerator = __esm({
8498
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/GuidGenerator.mjs"() {
8528
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs"() {
8499
8529
  "use strict";
8500
8530
  init_esm_node();
8501
8531
  _GuidGenerator = class _GuidGenerator {
@@ -8521,10 +8551,10 @@ var init_GuidGenerator = __esm({
8521
8551
  }
8522
8552
  });
8523
8553
 
8524
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/EncodingUtils.mjs
8554
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs
8525
8555
  var _EncodingUtils, EncodingUtils;
8526
8556
  var init_EncodingUtils = __esm({
8527
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/EncodingUtils.mjs"() {
8557
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs"() {
8528
8558
  "use strict";
8529
8559
  init_dist();
8530
8560
  _EncodingUtils = class _EncodingUtils {
@@ -8569,11 +8599,11 @@ var init_EncodingUtils = __esm({
8569
8599
  }
8570
8600
  });
8571
8601
 
8572
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/HashUtils.mjs
8602
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs
8573
8603
  import crypto2 from "crypto";
8574
8604
  var _HashUtils, HashUtils;
8575
8605
  var init_HashUtils = __esm({
8576
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/HashUtils.mjs"() {
8606
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs"() {
8577
8607
  "use strict";
8578
8608
  init_Constants2();
8579
8609
  _HashUtils = class _HashUtils {
@@ -8590,11 +8620,11 @@ var init_HashUtils = __esm({
8590
8620
  }
8591
8621
  });
8592
8622
 
8593
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/PkceGenerator.mjs
8623
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs
8594
8624
  import crypto3 from "crypto";
8595
8625
  var _PkceGenerator, PkceGenerator;
8596
8626
  var init_PkceGenerator = __esm({
8597
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/PkceGenerator.mjs"() {
8627
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs"() {
8598
8628
  "use strict";
8599
8629
  init_dist();
8600
8630
  init_Constants2();
@@ -8643,10 +8673,10 @@ var init_PkceGenerator = __esm({
8643
8673
  }
8644
8674
  });
8645
8675
 
8646
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/CryptoProvider.mjs
8676
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs
8647
8677
  var _CryptoProvider, CryptoProvider;
8648
8678
  var init_CryptoProvider = __esm({
8649
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/CryptoProvider.mjs"() {
8679
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs"() {
8650
8680
  "use strict";
8651
8681
  init_GuidGenerator();
8652
8682
  init_EncodingUtils();
@@ -8658,6 +8688,20 @@ var init_CryptoProvider = __esm({
8658
8688
  this.guidGenerator = new GuidGenerator();
8659
8689
  this.hashUtils = new HashUtils();
8660
8690
  }
8691
+ /**
8692
+ * base64 URL safe encoded string
8693
+ */
8694
+ base64UrlEncode() {
8695
+ throw new Error("Method not implemented.");
8696
+ }
8697
+ /**
8698
+ * Stringifies and base64Url encodes input public key
8699
+ * @param inputKid
8700
+ * @returns Base64Url encoded public key
8701
+ */
8702
+ encodeKid() {
8703
+ throw new Error("Method not implemented.");
8704
+ }
8661
8705
  /**
8662
8706
  * Creates a new random GUID - used to populate state and nonce.
8663
8707
  * @returns string (GUID)
@@ -8722,10 +8766,10 @@ var init_CryptoProvider = __esm({
8722
8766
  }
8723
8767
  });
8724
8768
 
8725
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/NodeStorage.mjs
8769
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs
8726
8770
  var _NodeStorage, NodeStorage;
8727
8771
  var init_NodeStorage = __esm({
8728
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/NodeStorage.mjs"() {
8772
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs"() {
8729
8773
  "use strict";
8730
8774
  init_dist();
8731
8775
  init_Deserializer();
@@ -9126,10 +9170,10 @@ var init_NodeStorage = __esm({
9126
9170
  }
9127
9171
  });
9128
9172
 
9129
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/TokenCache.mjs
9173
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs
9130
9174
  var defaultSerializedCache, _TokenCache, TokenCache;
9131
9175
  var init_TokenCache = __esm({
9132
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/TokenCache.mjs"() {
9176
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs"() {
9133
9177
  "use strict";
9134
9178
  init_dist();
9135
9179
  init_Deserializer();
@@ -10140,8 +10184,7 @@ var require_JsonWebTokenError = __commonJS({
10140
10184
  }
10141
10185
  this.name = "JsonWebTokenError";
10142
10186
  this.message = message;
10143
- if (error)
10144
- this.inner = error;
10187
+ if (error) this.inner = error;
10145
10188
  }, "JsonWebTokenError");
10146
10189
  JsonWebTokenError.prototype = Object.create(Error.prototype);
10147
10190
  JsonWebTokenError.prototype.constructor = JsonWebTokenError;
@@ -11912,19 +11955,18 @@ var require_subset = __commonJS({
11912
11955
  sub = new Range(sub, options);
11913
11956
  dom = new Range(dom, options);
11914
11957
  let sawNonNull = false;
11915
- OUTER:
11916
- for (const simpleSub of sub.set) {
11917
- for (const simpleDom of dom.set) {
11918
- const isSub = simpleSubset(simpleSub, simpleDom, options);
11919
- sawNonNull = sawNonNull || isSub !== null;
11920
- if (isSub) {
11921
- continue OUTER;
11922
- }
11923
- }
11924
- if (sawNonNull) {
11925
- return false;
11958
+ OUTER: for (const simpleSub of sub.set) {
11959
+ for (const simpleDom of dom.set) {
11960
+ const isSub = simpleSubset(simpleSub, simpleDom, options);
11961
+ sawNonNull = sawNonNull || isSub !== null;
11962
+ if (isSub) {
11963
+ continue OUTER;
11926
11964
  }
11927
11965
  }
11966
+ if (sawNonNull) {
11967
+ return false;
11968
+ }
11969
+ }
11928
11970
  return true;
11929
11971
  }, "subset");
11930
11972
  var minimumVersionWithPreRelease = [new Comparator(">=0.0.0-0")];
@@ -12185,11 +12227,9 @@ var require_validateAsymmetricKey = __commonJS({
12185
12227
  ES512: "secp521r1"
12186
12228
  };
12187
12229
  module.exports = function(algorithm, key) {
12188
- if (!algorithm || !key)
12189
- return;
12230
+ if (!algorithm || !key) return;
12190
12231
  const keyType = key.asymmetricKeyType;
12191
- if (!keyType)
12192
- return;
12232
+ if (!keyType) return;
12193
12233
  const allowedAlgorithms = allowedAlgorithmsForKeys[keyType];
12194
12234
  if (!allowedAlgorithms) {
12195
12235
  throw new Error(`Unknown key type "${keyType}".`);
@@ -12266,8 +12306,7 @@ var require_verify = __commonJS({
12266
12306
  done = callback;
12267
12307
  } else {
12268
12308
  done = /* @__PURE__ */ __name(function(err, data) {
12269
- if (err)
12270
- throw err;
12309
+ if (err) throw err;
12271
12310
  return data;
12272
12311
  }, "done");
12273
12312
  }
@@ -12941,15 +12980,15 @@ var require_sign = __commonJS({
12941
12980
  SUPPORTED_ALGS.splice(3, 0, "PS256", "PS384", "PS512");
12942
12981
  }
12943
12982
  var sign_options_schema = {
12944
- expiresIn: { isValid: function(value) {
12983
+ expiresIn: { isValid: /* @__PURE__ */ __name(function(value) {
12945
12984
  return isInteger(value) || isString(value) && value;
12946
- }, message: '"expiresIn" should be a number of seconds or string representing a timespan' },
12947
- notBefore: { isValid: function(value) {
12985
+ }, "isValid"), message: '"expiresIn" should be a number of seconds or string representing a timespan' },
12986
+ notBefore: { isValid: /* @__PURE__ */ __name(function(value) {
12948
12987
  return isInteger(value) || isString(value) && value;
12949
- }, message: '"notBefore" should be a number of seconds or string representing a timespan' },
12950
- audience: { isValid: function(value) {
12988
+ }, "isValid"), message: '"notBefore" should be a number of seconds or string representing a timespan' },
12989
+ audience: { isValid: /* @__PURE__ */ __name(function(value) {
12951
12990
  return isString(value) || Array.isArray(value);
12952
- }, message: '"audience" must be a string or array' },
12991
+ }, "isValid"), message: '"audience" must be a string or array' },
12953
12992
  algorithm: { isValid: includes.bind(null, SUPPORTED_ALGS), message: '"algorithm" must be a valid string enum value' },
12954
12993
  header: { isValid: isPlainObject, message: '"header" must be an object' },
12955
12994
  encoding: { isValid: isString, message: '"encoding" must be a string' },
@@ -13164,10 +13203,10 @@ var require_package14 = __commonJS({
13164
13203
  }
13165
13204
  });
13166
13205
 
13167
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientAssertion.mjs
13206
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs
13168
13207
  var import_jsonwebtoken, _ClientAssertion, ClientAssertion;
13169
13208
  var init_ClientAssertion = __esm({
13170
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientAssertion.mjs"() {
13209
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs"() {
13171
13210
  "use strict";
13172
13211
  import_jsonwebtoken = __toESM(require_package14(), 1);
13173
13212
  init_dist();
@@ -13269,20 +13308,20 @@ var init_ClientAssertion = __esm({
13269
13308
  }
13270
13309
  });
13271
13310
 
13272
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/packageMetadata.mjs
13311
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs
13273
13312
  var name2, version2;
13274
13313
  var init_packageMetadata2 = __esm({
13275
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/packageMetadata.mjs"() {
13314
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs"() {
13276
13315
  "use strict";
13277
13316
  name2 = "@azure/msal-node";
13278
- version2 = "2.9.1";
13317
+ version2 = "2.9.2";
13279
13318
  }
13280
13319
  });
13281
13320
 
13282
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/NodeAuthError.mjs
13321
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs
13283
13322
  var NodeAuthErrorMessage, _NodeAuthError, NodeAuthError;
13284
13323
  var init_NodeAuthError = __esm({
13285
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/NodeAuthError.mjs"() {
13324
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs"() {
13286
13325
  "use strict";
13287
13326
  init_dist();
13288
13327
  NodeAuthErrorMessage = {
@@ -13368,10 +13407,10 @@ var init_NodeAuthError = __esm({
13368
13407
  }
13369
13408
  });
13370
13409
 
13371
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/UsernamePasswordClient.mjs
13410
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs
13372
13411
  var _UsernamePasswordClient, UsernamePasswordClient;
13373
13412
  var init_UsernamePasswordClient = __esm({
13374
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/UsernamePasswordClient.mjs"() {
13413
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs"() {
13375
13414
  "use strict";
13376
13415
  init_dist();
13377
13416
  _UsernamePasswordClient = class _UsernamePasswordClient extends BaseClient {
@@ -13461,10 +13500,10 @@ var init_UsernamePasswordClient = __esm({
13461
13500
  }
13462
13501
  });
13463
13502
 
13464
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientApplication.mjs
13503
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs
13465
13504
  var _ClientApplication, ClientApplication;
13466
13505
  var init_ClientApplication = __esm({
13467
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientApplication.mjs"() {
13506
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs"() {
13468
13507
  "use strict";
13469
13508
  init_dist();
13470
13509
  init_Configuration();
@@ -13790,11 +13829,11 @@ var init_ClientApplication = __esm({
13790
13829
  }
13791
13830
  });
13792
13831
 
13793
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/LoopbackClient.mjs
13832
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs
13794
13833
  import http2 from "http";
13795
13834
  var _LoopbackClient, LoopbackClient;
13796
13835
  var init_LoopbackClient = __esm({
13797
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/LoopbackClient.mjs"() {
13836
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs"() {
13798
13837
  "use strict";
13799
13838
  init_dist();
13800
13839
  init_NodeAuthError();
@@ -13870,10 +13909,10 @@ var init_LoopbackClient = __esm({
13870
13909
  }
13871
13910
  });
13872
13911
 
13873
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/DeviceCodeClient.mjs
13912
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs
13874
13913
  var _DeviceCodeClient, DeviceCodeClient;
13875
13914
  var init_DeviceCodeClient = __esm({
13876
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/DeviceCodeClient.mjs"() {
13915
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs"() {
13877
13916
  "use strict";
13878
13917
  init_dist();
13879
13918
  _DeviceCodeClient = class _DeviceCodeClient extends BaseClient {
@@ -14057,10 +14096,10 @@ var init_DeviceCodeClient = __esm({
14057
14096
  }
14058
14097
  });
14059
14098
 
14060
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/PublicClientApplication.mjs
14099
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs
14061
14100
  var _PublicClientApplication, PublicClientApplication;
14062
14101
  var init_PublicClientApplication = __esm({
14063
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/PublicClientApplication.mjs"() {
14102
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs"() {
14064
14103
  "use strict";
14065
14104
  init_Constants2();
14066
14105
  init_dist();
@@ -14127,7 +14166,7 @@ var init_PublicClientApplication = __esm({
14127
14166
  * Acquires a token interactively via the browser by requesting an authorization code then exchanging it for a token.
14128
14167
  */
14129
14168
  async acquireTokenInteractive(request) {
14130
- var _a;
14169
+ var _a2;
14131
14170
  const correlationId = request.correlationId || this.cryptoProvider.createNewGuid();
14132
14171
  this.logger.trace("acquireTokenInteractive called", correlationId);
14133
14172
  const { openBrowser, successTemplate, errorTemplate, windowHandle, loopbackClient: customLoopbackClient, ...remainingProperties } = request;
@@ -14143,7 +14182,7 @@ var init_PublicClientApplication = __esm({
14143
14182
  ...remainingProperties.extraQueryParameters,
14144
14183
  ...remainingProperties.tokenQueryParameters
14145
14184
  },
14146
- accountId: (_a = remainingProperties.account) == null ? void 0 : _a.nativeAccountId
14185
+ accountId: (_a2 = remainingProperties.account) == null ? void 0 : _a2.nativeAccountId
14147
14186
  };
14148
14187
  return this.nativeBrokerPlugin.acquireTokenInteractive(brokerRequest, windowHandle);
14149
14188
  }
@@ -14278,10 +14317,10 @@ var init_PublicClientApplication = __esm({
14278
14317
  }
14279
14318
  });
14280
14319
 
14281
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientCredentialClient.mjs
14320
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs
14282
14321
  var _ClientCredentialClient, ClientCredentialClient;
14283
14322
  var init_ClientCredentialClient = __esm({
14284
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientCredentialClient.mjs"() {
14323
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs"() {
14285
14324
  "use strict";
14286
14325
  init_dist();
14287
14326
  _ClientCredentialClient = class _ClientCredentialClient extends BaseClient {
@@ -14313,7 +14352,7 @@ var init_ClientCredentialClient = __esm({
14313
14352
  * looks up cache if the tokens are cached already
14314
14353
  */
14315
14354
  async getCachedAuthenticationResult(request, config, cryptoUtils, authority, cacheManager, serverTelemetryManager) {
14316
- var _a, _b;
14355
+ var _a2, _b2;
14317
14356
  const clientConfiguration = config;
14318
14357
  const managedIdentityConfiguration = config;
14319
14358
  let lastCacheOutcome = CacheOutcome.NOT_APPLICABLE;
@@ -14322,7 +14361,7 @@ var init_ClientCredentialClient = __esm({
14322
14361
  cacheContext = new TokenCacheContext(clientConfiguration.serializableCache, false);
14323
14362
  await clientConfiguration.persistencePlugin.beforeCacheAccess(cacheContext);
14324
14363
  }
14325
- const cachedAccessToken = this.readAccessTokenFromCache(authority, ((_a = managedIdentityConfiguration.managedIdentityId) == null ? void 0 : _a.id) || clientConfiguration.authOptions.clientId, new ScopeSet(request.scopes || []), cacheManager);
14364
+ const cachedAccessToken = this.readAccessTokenFromCache(authority, ((_a2 = managedIdentityConfiguration.managedIdentityId) == null ? void 0 : _a2.id) || clientConfiguration.authOptions.clientId, new ScopeSet(request.scopes || []), cacheManager);
14326
14365
  if (clientConfiguration.serializableCache && clientConfiguration.persistencePlugin && cacheContext) {
14327
14366
  await clientConfiguration.persistencePlugin.afterCacheAccess(cacheContext);
14328
14367
  }
@@ -14330,7 +14369,7 @@ var init_ClientCredentialClient = __esm({
14330
14369
  serverTelemetryManager == null ? void 0 : serverTelemetryManager.setCacheOutcome(CacheOutcome.NO_CACHED_ACCESS_TOKEN);
14331
14370
  return [null, CacheOutcome.NO_CACHED_ACCESS_TOKEN];
14332
14371
  }
14333
- if (TimeUtils_exports.isTokenExpired(cachedAccessToken.expiresOn, ((_b = clientConfiguration.systemOptions) == null ? void 0 : _b.tokenRenewalOffsetSeconds) || DEFAULT_TOKEN_RENEWAL_OFFSET_SEC)) {
14372
+ if (TimeUtils_exports.isTokenExpired(cachedAccessToken.expiresOn, ((_b2 = clientConfiguration.systemOptions) == null ? void 0 : _b2.tokenRenewalOffsetSeconds) || DEFAULT_TOKEN_RENEWAL_OFFSET_SEC)) {
14334
14373
  serverTelemetryManager == null ? void 0 : serverTelemetryManager.setCacheOutcome(CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED);
14335
14374
  return [null, CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED];
14336
14375
  }
@@ -14456,10 +14495,10 @@ var init_ClientCredentialClient = __esm({
14456
14495
  }
14457
14496
  });
14458
14497
 
14459
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/OnBehalfOfClient.mjs
14498
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs
14460
14499
  var _OnBehalfOfClient, OnBehalfOfClient;
14461
14500
  var init_OnBehalfOfClient = __esm({
14462
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/OnBehalfOfClient.mjs"() {
14501
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs"() {
14463
14502
  "use strict";
14464
14503
  init_dist();
14465
14504
  init_EncodingUtils();
@@ -14492,14 +14531,14 @@ var init_OnBehalfOfClient = __esm({
14492
14531
  * @param request
14493
14532
  */
14494
14533
  async getCachedAuthenticationResult(request) {
14495
- var _a, _b;
14534
+ var _a2, _b2;
14496
14535
  const cachedAccessToken = this.readAccessTokenFromCacheForOBO(this.config.authOptions.clientId, request);
14497
14536
  if (!cachedAccessToken) {
14498
- (_a = this.serverTelemetryManager) == null ? void 0 : _a.setCacheOutcome(CacheOutcome.NO_CACHED_ACCESS_TOKEN);
14537
+ (_a2 = this.serverTelemetryManager) == null ? void 0 : _a2.setCacheOutcome(CacheOutcome.NO_CACHED_ACCESS_TOKEN);
14499
14538
  this.logger.info("SilentFlowClient:acquireCachedToken - No access token found in cache for the given properties.");
14500
14539
  throw createClientAuthError(ClientAuthErrorCodes_exports.tokenRefreshRequired);
14501
14540
  } else if (TimeUtils_exports.isTokenExpired(cachedAccessToken.expiresOn, this.config.systemOptions.tokenRenewalOffsetSeconds)) {
14502
- (_b = this.serverTelemetryManager) == null ? void 0 : _b.setCacheOutcome(CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED);
14541
+ (_b2 = this.serverTelemetryManager) == null ? void 0 : _b2.setCacheOutcome(CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED);
14503
14542
  this.logger.info(`OnbehalfofFlow:getCachedAuthenticationResult - Cached access token is expired or will expire within ${this.config.systemOptions.tokenRenewalOffsetSeconds} seconds.`);
14504
14543
  throw createClientAuthError(ClientAuthErrorCodes_exports.tokenRefreshRequired);
14505
14544
  }
@@ -14642,10 +14681,10 @@ var init_OnBehalfOfClient = __esm({
14642
14681
  }
14643
14682
  });
14644
14683
 
14645
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ConfidentialClientApplication.mjs
14684
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs
14646
14685
  var _ConfidentialClientApplication, ConfidentialClientApplication;
14647
14686
  var init_ConfidentialClientApplication = __esm({
14648
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ConfidentialClientApplication.mjs"() {
14687
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs"() {
14649
14688
  "use strict";
14650
14689
  init_ClientApplication();
14651
14690
  init_ClientAssertion();
@@ -14766,7 +14805,7 @@ var init_ConfidentialClientApplication = __esm({
14766
14805
  }
14767
14806
  }
14768
14807
  setClientCredential(configuration) {
14769
- var _a;
14808
+ var _a2;
14770
14809
  const clientSecretNotEmpty = !!configuration.auth.clientSecret;
14771
14810
  const clientAssertionNotEmpty = !!configuration.auth.clientAssertion;
14772
14811
  const certificate = configuration.auth.clientCertificate || {
@@ -14791,7 +14830,7 @@ var init_ConfidentialClientApplication = __esm({
14791
14830
  if (!certificateNotEmpty) {
14792
14831
  throw createClientAuthError(ClientAuthErrorCodes_exports.invalidClientCredential);
14793
14832
  } else {
14794
- this.clientAssertion = ClientAssertion.fromCertificate(certificate.thumbprint, certificate.privateKey, (_a = configuration.auth.clientCertificate) == null ? void 0 : _a.x5c);
14833
+ this.clientAssertion = ClientAssertion.fromCertificate(certificate.thumbprint, certificate.privateKey, (_a2 = configuration.auth.clientCertificate) == null ? void 0 : _a2.x5c);
14795
14834
  }
14796
14835
  }
14797
14836
  };
@@ -14800,10 +14839,10 @@ var init_ConfidentialClientApplication = __esm({
14800
14839
  }
14801
14840
  });
14802
14841
 
14803
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs
14842
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs
14804
14843
  var ManagedIdentityUserAssignedIdQueryParameterNames, _BaseManagedIdentitySource, BaseManagedIdentitySource;
14805
14844
  var init_BaseManagedIdentitySource = __esm({
14806
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs"() {
14845
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs"() {
14807
14846
  "use strict";
14808
14847
  init_dist();
14809
14848
  init_Constants2();
@@ -14903,10 +14942,10 @@ var init_BaseManagedIdentitySource = __esm({
14903
14942
  }
14904
14943
  });
14905
14944
 
14906
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/ManagedIdentityRequestParameters.mjs
14945
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs
14907
14946
  var _ManagedIdentityRequestParameters, ManagedIdentityRequestParameters;
14908
14947
  var init_ManagedIdentityRequestParameters = __esm({
14909
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/ManagedIdentityRequestParameters.mjs"() {
14948
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs"() {
14910
14949
  "use strict";
14911
14950
  init_dist();
14912
14951
  _ManagedIdentityRequestParameters = class _ManagedIdentityRequestParameters {
@@ -14938,10 +14977,10 @@ var init_ManagedIdentityRequestParameters = __esm({
14938
14977
  }
14939
14978
  });
14940
14979
 
14941
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/AppService.mjs
14980
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs
14942
14981
  var APP_SERVICE_MSI_API_VERSION, _AppService, AppService;
14943
14982
  var init_AppService = __esm({
14944
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/AppService.mjs"() {
14983
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs"() {
14945
14984
  "use strict";
14946
14985
  init_BaseManagedIdentitySource();
14947
14986
  init_Constants2();
@@ -14984,11 +15023,12 @@ var init_AppService = __esm({
14984
15023
  }
14985
15024
  });
14986
15025
 
14987
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/AzureArc.mjs
14988
- import { readFileSync } from "fs";
14989
- var ARC_API_VERSION, _AzureArc, AzureArc;
15026
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs
15027
+ import { statSync, readFileSync } from "fs";
15028
+ import path from "path";
15029
+ var ARC_API_VERSION, SUPPORTED_AZURE_ARC_PLATFORMS, _AzureArc, AzureArc;
14990
15030
  var init_AzureArc = __esm({
14991
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/AzureArc.mjs"() {
15031
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs"() {
14992
15032
  "use strict";
14993
15033
  init_dist();
14994
15034
  init_ManagedIdentityRequestParameters();
@@ -14997,6 +15037,10 @@ var init_AzureArc = __esm({
14997
15037
  init_Constants2();
14998
15038
  init_ManagedIdentityErrorCodes();
14999
15039
  ARC_API_VERSION = "2019-11-01";
15040
+ SUPPORTED_AZURE_ARC_PLATFORMS = {
15041
+ win32: `${process.env["ProgramData"]}\\AzureConnectedMachineAgent\\Tokens\\`,
15042
+ linux: "/var/opt/azcmagent/tokens/"
15043
+ };
15000
15044
  _AzureArc = class _AzureArc extends BaseManagedIdentitySource {
15001
15045
  constructor(logger, nodeStorage, networkClient, cryptoProvider, identityEndpoint) {
15002
15046
  super(logger, nodeStorage, networkClient, cryptoProvider);
@@ -15039,10 +15083,30 @@ var init_AzureArc = __esm({
15039
15083
  if (!wwwAuthHeader.includes("Basic realm=")) {
15040
15084
  throw createManagedIdentityError(wwwAuthenticateHeaderUnsupportedFormat);
15041
15085
  }
15042
- const secretFile = wwwAuthHeader.split("Basic realm=")[1];
15086
+ const secretFilePath = wwwAuthHeader.split("Basic realm=")[1];
15087
+ if (!SUPPORTED_AZURE_ARC_PLATFORMS.hasOwnProperty(process.platform)) {
15088
+ throw createManagedIdentityError(platformNotSupported);
15089
+ }
15090
+ const expectedSecretFilePath = SUPPORTED_AZURE_ARC_PLATFORMS[process.platform];
15091
+ const fileName = path.basename(secretFilePath);
15092
+ if (!fileName.endsWith(".key")) {
15093
+ throw createManagedIdentityError(invalidFileExtension);
15094
+ }
15095
+ if (expectedSecretFilePath + fileName !== secretFilePath) {
15096
+ throw createManagedIdentityError(invalidFilePath);
15097
+ }
15098
+ let secretFileSize;
15099
+ try {
15100
+ secretFileSize = await statSync(secretFilePath).size;
15101
+ } catch (e) {
15102
+ throw createManagedIdentityError(unableToReadSecretFile);
15103
+ }
15104
+ if (secretFileSize > AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES) {
15105
+ throw createManagedIdentityError(invalidSecret);
15106
+ }
15043
15107
  let secret;
15044
15108
  try {
15045
- secret = readFileSync(secretFile, "utf-8");
15109
+ secret = readFileSync(secretFilePath, "utf-8");
15046
15110
  } catch (e) {
15047
15111
  throw createManagedIdentityError(unableToReadSecretFile);
15048
15112
  }
@@ -15067,10 +15131,10 @@ var init_AzureArc = __esm({
15067
15131
  }
15068
15132
  });
15069
15133
 
15070
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/CloudShell.mjs
15134
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs
15071
15135
  var _CloudShell, CloudShell;
15072
15136
  var init_CloudShell = __esm({
15073
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/CloudShell.mjs"() {
15137
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs"() {
15074
15138
  "use strict";
15075
15139
  init_ManagedIdentityRequestParameters();
15076
15140
  init_BaseManagedIdentitySource();
@@ -15111,10 +15175,10 @@ var init_CloudShell = __esm({
15111
15175
  }
15112
15176
  });
15113
15177
 
15114
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/Imds.mjs
15178
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs
15115
15179
  var IMDS_TOKEN_PATH, DEFAULT_IMDS_ENDPOINT, IMDS_API_VERSION, _Imds, Imds;
15116
15180
  var init_Imds = __esm({
15117
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/Imds.mjs"() {
15181
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs"() {
15118
15182
  "use strict";
15119
15183
  init_ManagedIdentityRequestParameters();
15120
15184
  init_BaseManagedIdentitySource();
@@ -15154,10 +15218,10 @@ var init_Imds = __esm({
15154
15218
  }
15155
15219
  });
15156
15220
 
15157
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs
15221
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs
15158
15222
  var SERVICE_FABRIC_MSI_API_VERSION, _ServiceFabric, ServiceFabric;
15159
15223
  var init_ServiceFabric = __esm({
15160
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs"() {
15224
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs"() {
15161
15225
  "use strict";
15162
15226
  init_ManagedIdentityRequestParameters();
15163
15227
  init_BaseManagedIdentitySource();
@@ -15204,10 +15268,10 @@ var init_ServiceFabric = __esm({
15204
15268
  }
15205
15269
  });
15206
15270
 
15207
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentityClient.mjs
15271
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs
15208
15272
  var _ManagedIdentityClient, ManagedIdentityClient;
15209
15273
  var init_ManagedIdentityClient = __esm({
15210
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentityClient.mjs"() {
15274
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs"() {
15211
15275
  "use strict";
15212
15276
  init_AppService();
15213
15277
  init_AzureArc();
@@ -15260,10 +15324,10 @@ var init_ManagedIdentityClient = __esm({
15260
15324
  }
15261
15325
  });
15262
15326
 
15263
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentityApplication.mjs
15327
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs
15264
15328
  var _ManagedIdentityApplication, ManagedIdentityApplication;
15265
15329
  var init_ManagedIdentityApplication = __esm({
15266
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentityApplication.mjs"() {
15330
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs"() {
15267
15331
  "use strict";
15268
15332
  init_dist();
15269
15333
  init_Configuration();
@@ -15356,10 +15420,10 @@ var init_ManagedIdentityApplication = __esm({
15356
15420
  }
15357
15421
  });
15358
15422
 
15359
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/distributed/DistributedCachePlugin.mjs
15423
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs
15360
15424
  var _DistributedCachePlugin, DistributedCachePlugin;
15361
15425
  var init_DistributedCachePlugin = __esm({
15362
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/distributed/DistributedCachePlugin.mjs"() {
15426
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs"() {
15363
15427
  "use strict";
15364
15428
  init_dist();
15365
15429
  _DistributedCachePlugin = class _DistributedCachePlugin {
@@ -15389,7 +15453,7 @@ var init_DistributedCachePlugin = __esm({
15389
15453
  }
15390
15454
  });
15391
15455
 
15392
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/index.mjs
15456
+ // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs
15393
15457
  var dist_exports = {};
15394
15458
  __export(dist_exports, {
15395
15459
  AuthError: () => AuthError,
@@ -15431,7 +15495,7 @@ __export(dist_exports, {
15431
15495
  version: () => version2
15432
15496
  });
15433
15497
  var init_dist2 = __esm({
15434
- "../../node_modules/.store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/index.mjs"() {
15498
+ "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs"() {
15435
15499
  "use strict";
15436
15500
  init_internals();
15437
15501
  init_PublicClientApplication();
@@ -15458,11 +15522,11 @@ var init_dist2 = __esm({
15458
15522
  var require_package15 = __commonJS({
15459
15523
  "../../node_modules/.store/is-docker-npm-2.2.1-3f18a53aff/package/index.js"(exports, module) {
15460
15524
  "use strict";
15461
- var fs = __require("fs");
15525
+ var fs3 = __require("fs");
15462
15526
  var isDocker;
15463
15527
  function hasDockerEnv() {
15464
15528
  try {
15465
- fs.statSync("/.dockerenv");
15529
+ fs3.statSync("/.dockerenv");
15466
15530
  return true;
15467
15531
  } catch (_) {
15468
15532
  return false;
@@ -15471,7 +15535,7 @@ var require_package15 = __commonJS({
15471
15535
  __name(hasDockerEnv, "hasDockerEnv");
15472
15536
  function hasDockerCGroup() {
15473
15537
  try {
15474
- return fs.readFileSync("/proc/self/cgroup", "utf8").includes("docker");
15538
+ return fs3.readFileSync("/proc/self/cgroup", "utf8").includes("docker");
15475
15539
  } catch (_) {
15476
15540
  return false;
15477
15541
  }
@@ -15491,7 +15555,7 @@ var require_package16 = __commonJS({
15491
15555
  "../../node_modules/.store/is-wsl-npm-2.2.0-2ba10d6393/package/index.js"(exports, module) {
15492
15556
  "use strict";
15493
15557
  var os = __require("os");
15494
- var fs = __require("fs");
15558
+ var fs3 = __require("fs");
15495
15559
  var isDocker = require_package15();
15496
15560
  var isWsl = /* @__PURE__ */ __name(() => {
15497
15561
  if (process.platform !== "linux") {
@@ -15504,7 +15568,7 @@ var require_package16 = __commonJS({
15504
15568
  return true;
15505
15569
  }
15506
15570
  try {
15507
- return fs.readFileSync("/proc/version", "utf8").toLowerCase().includes("microsoft") ? !isDocker() : false;
15571
+ return fs3.readFileSync("/proc/version", "utf8").toLowerCase().includes("microsoft") ? !isDocker() : false;
15508
15572
  } catch (_) {
15509
15573
  return false;
15510
15574
  }
@@ -15543,17 +15607,17 @@ var require_package17 = __commonJS({
15543
15607
  // ../../node_modules/.store/open-npm-8.4.2-1f763e8b75/package/index.js
15544
15608
  var require_package18 = __commonJS({
15545
15609
  "../../node_modules/.store/open-npm-8.4.2-1f763e8b75/package/index.js"(exports, module) {
15546
- var path3 = __require("path");
15610
+ var path5 = __require("path");
15547
15611
  var childProcess = __require("child_process");
15548
- var { promises: fs, constants: fsConstants } = __require("fs");
15612
+ var { promises: fs3, constants: fsConstants } = __require("fs");
15549
15613
  var isWsl = require_package16();
15550
15614
  var isDocker = require_package15();
15551
15615
  var defineLazyProperty = require_package17();
15552
- var localXdgOpenPath = path3.join(__dirname, "xdg-open");
15616
+ var localXdgOpenPath = path5.join(__dirname, "xdg-open");
15553
15617
  var { platform, arch } = process;
15554
15618
  var hasContainerEnv = /* @__PURE__ */ __name(() => {
15555
15619
  try {
15556
- fs.statSync("/run/.containerenv");
15620
+ fs3.statSync("/run/.containerenv");
15557
15621
  return true;
15558
15622
  } catch {
15559
15623
  return false;
@@ -15577,14 +15641,14 @@ var require_package18 = __commonJS({
15577
15641
  const configFilePath = "/etc/wsl.conf";
15578
15642
  let isConfigFileExists = false;
15579
15643
  try {
15580
- await fs.access(configFilePath, fsConstants.F_OK);
15644
+ await fs3.access(configFilePath, fsConstants.F_OK);
15581
15645
  isConfigFileExists = true;
15582
15646
  } catch {
15583
15647
  }
15584
15648
  if (!isConfigFileExists) {
15585
15649
  return defaultMountPoint;
15586
15650
  }
15587
- const configContent = await fs.readFile(configFilePath, { encoding: "utf8" });
15651
+ const configContent = await fs3.readFile(configFilePath, { encoding: "utf8" });
15588
15652
  const configMountPoint = /(?<!#.*)root\s*=\s*(?<mountPoint>.*)/g.exec(configContent);
15589
15653
  if (!configMountPoint) {
15590
15654
  return defaultMountPoint;
@@ -15684,7 +15748,7 @@ var require_package18 = __commonJS({
15684
15748
  const isBundled = !__dirname || __dirname === "/";
15685
15749
  let exeLocalXdgOpen = false;
15686
15750
  try {
15687
- await fs.access(localXdgOpenPath, fsConstants.X_OK);
15751
+ await fs3.access(localXdgOpenPath, fsConstants.X_OK);
15688
15752
  exeLocalXdgOpen = true;
15689
15753
  } catch {
15690
15754
  }
@@ -15798,9 +15862,9 @@ var require_package18 = __commonJS({
15798
15862
  }
15799
15863
  });
15800
15864
 
15801
- // ../../node_modules/.store/@azure-identity-npm-4.2.0-ced08c56f3/package/dist/index.js
15865
+ // ../../node_modules/.store/@azure-identity-npm-4.2.1-857ff0b183/package/dist/index.js
15802
15866
  var require_dist2 = __commonJS({
15803
- "../../node_modules/.store/@azure-identity-npm-4.2.0-ced08c56f3/package/dist/index.js"(exports) {
15867
+ "../../node_modules/.store/@azure-identity-npm-4.2.1-857ff0b183/package/dist/index.js"(exports) {
15804
15868
  "use strict";
15805
15869
  Object.defineProperty(exports, "__esModule", { value: true });
15806
15870
  var logger$q = require_commonjs();
@@ -15809,10 +15873,11 @@ var require_dist2 = __commonJS({
15809
15873
  var coreRestPipeline = require_commonjs4();
15810
15874
  var abortController = require_dist();
15811
15875
  var coreTracing = require_commonjs3();
15812
- var fs = __require("fs");
15876
+ var fs3 = __require("fs");
15813
15877
  var os = __require("os");
15814
- var path3 = __require("path");
15878
+ var path5 = __require("path");
15815
15879
  var msalCommon = (init_dist2(), __toCommonJS(dist_exports));
15880
+ var fs$1 = __require("node:fs");
15816
15881
  var https2 = __require("https");
15817
15882
  var promises = __require("fs/promises");
15818
15883
  var child_process = __require("child_process");
@@ -15827,9 +15892,9 @@ var require_dist2 = __commonJS({
15827
15892
  var d = Object.getOwnPropertyDescriptor(e, k);
15828
15893
  Object.defineProperty(n, k, d.get ? d : {
15829
15894
  enumerable: true,
15830
- get: function() {
15895
+ get: /* @__PURE__ */ __name(function() {
15831
15896
  return e[k];
15832
- }
15897
+ }, "get")
15833
15898
  });
15834
15899
  }
15835
15900
  });
@@ -15840,7 +15905,7 @@ var require_dist2 = __commonJS({
15840
15905
  __name(_interopNamespaceDefault, "_interopNamespaceDefault");
15841
15906
  var msalCommon__namespace = /* @__PURE__ */ _interopNamespaceDefault(msalCommon);
15842
15907
  var child_process__namespace = /* @__PURE__ */ _interopNamespaceDefault(child_process);
15843
- var SDK_VERSION = `4.2.0`;
15908
+ var SDK_VERSION = `4.2.1`;
15844
15909
  var DeveloperSignOnClientId = "04b07795-8ddb-461a-bbee-02f9e1bf7b46";
15845
15910
  var DefaultTenantId = "common";
15846
15911
  exports.AzureAuthorityHosts = void 0;
@@ -15874,11 +15939,11 @@ var require_dist2 = __commonJS({
15874
15939
  }
15875
15940
  };
15876
15941
  function generatePluginConfiguration(options) {
15877
- var _a, _b, _c, _d, _e, _f, _g;
15942
+ var _a2, _b2, _c, _d, _e, _f, _g;
15878
15943
  const config = {
15879
15944
  cache: {},
15880
15945
  broker: {
15881
- isEnabled: (_b = (_a = options.brokerOptions) === null || _a === void 0 ? void 0 : _a.enabled) !== null && _b !== void 0 ? _b : false,
15946
+ isEnabled: (_b2 = (_a2 = options.brokerOptions) === null || _a2 === void 0 ? void 0 : _a2.enabled) !== null && _b2 !== void 0 ? _b2 : false,
15882
15947
  enableMsaPassthrough: (_d = (_c = options.brokerOptions) === null || _c === void 0 ? void 0 : _c.legacyEnableMsaPassthrough) !== null && _d !== void 0 ? _d : false,
15883
15948
  parentWindowHandle: (_e = options.brokerOptions) === null || _e === void 0 ? void 0 : _e.parentWindowHandle
15884
15949
  }
@@ -16061,14 +16126,14 @@ ${errorDetail}`);
16061
16126
  }
16062
16127
  __name(createConfigurationErrorMessage, "createConfigurationErrorMessage");
16063
16128
  function processMultiTenantRequest(tenantId, getTokenOptions, additionallyAllowedTenantIds = [], logger2) {
16064
- var _a;
16129
+ var _a2;
16065
16130
  let resolvedTenantId;
16066
16131
  if (process.env.AZURE_IDENTITY_DISABLE_MULTITENANTAUTH) {
16067
16132
  resolvedTenantId = tenantId;
16068
16133
  } else if (tenantId === "adfs") {
16069
16134
  resolvedTenantId = tenantId;
16070
16135
  } else {
16071
- resolvedTenantId = (_a = getTokenOptions === null || getTokenOptions === void 0 ? void 0 : getTokenOptions.tenantId) !== null && _a !== void 0 ? _a : tenantId;
16136
+ resolvedTenantId = (_a2 = getTokenOptions === null || getTokenOptions === void 0 ? void 0 : getTokenOptions.tenantId) !== null && _a2 !== void 0 ? _a2 : tenantId;
16072
16137
  }
16073
16138
  if (tenantId && resolvedTenantId !== tenantId && !additionallyAllowedTenantIds.includes("*") && !additionallyAllowedTenantIds.some((t) => t.localeCompare(resolvedTenantId) === 0)) {
16074
16139
  const message = createConfigurationErrorMessage(tenantId);
@@ -16176,9 +16241,9 @@ ${errorDetail}`);
16176
16241
  __name(getIdentityClientAuthorityHost, "getIdentityClientAuthorityHost");
16177
16242
  var _IdentityClient = class _IdentityClient extends coreClient.ServiceClient {
16178
16243
  constructor(options) {
16179
- var _a, _b;
16244
+ var _a2, _b2;
16180
16245
  const packageDetails = `azsdk-js-identity/${SDK_VERSION}`;
16181
- const userAgentPrefix = ((_a = options === null || options === void 0 ? void 0 : options.userAgentOptions) === null || _a === void 0 ? void 0 : _a.userAgentPrefix) ? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}` : `${packageDetails}`;
16246
+ const userAgentPrefix = ((_a2 = options === null || options === void 0 ? void 0 : options.userAgentOptions) === null || _a2 === void 0 ? void 0 : _a2.userAgentPrefix) ? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}` : `${packageDetails}`;
16182
16247
  const baseUri = getIdentityClientAuthorityHost(options);
16183
16248
  if (!baseUri.startsWith("https:")) {
16184
16249
  throw new Error("The authorityHost address must use the 'https' protocol.");
@@ -16190,7 +16255,7 @@ ${errorDetail}`);
16190
16255
  }, baseUri }));
16191
16256
  this.authorityHost = baseUri;
16192
16257
  this.abortControllers = /* @__PURE__ */ new Map();
16193
- this.allowLoggingAccountIdentifiers = (_b = options === null || options === void 0 ? void 0 : options.loggingOptions) === null || _b === void 0 ? void 0 : _b.allowLoggingAccountIdentifiers;
16258
+ this.allowLoggingAccountIdentifiers = (_b2 = options === null || options === void 0 ? void 0 : options.loggingOptions) === null || _b2 === void 0 ? void 0 : _b2.allowLoggingAccountIdentifiers;
16194
16259
  this.tokenCredentialOptions = Object.assign({}, options);
16195
16260
  }
16196
16261
  async sendTokenRequest(request) {
@@ -16292,8 +16357,8 @@ ${errorDetail}`);
16292
16357
  this.abortControllers.set(key, void 0);
16293
16358
  }
16294
16359
  getCorrelationId(options) {
16295
- var _a;
16296
- const parameter = (_a = options === null || options === void 0 ? void 0 : options.body) === null || _a === void 0 ? void 0 : _a.split("&").map((part) => part.split("=")).find(([key]) => key === "client-request-id");
16360
+ var _a2;
16361
+ const parameter = (_a2 = options === null || options === void 0 ? void 0 : options.body) === null || _a2 === void 0 ? void 0 : _a2.split("&").map((part) => part.split("=")).find(([key]) => key === "client-request-id");
16297
16362
  return parameter && parameter.length ? parameter[1] || noCorrelationId : noCorrelationId;
16298
16363
  }
16299
16364
  // The MSAL network module methods follow
@@ -16400,8 +16465,8 @@ ${errorDetail}`);
16400
16465
  const vsCodeFolder = "Code";
16401
16466
  const homedir = os.homedir();
16402
16467
  function loadProperty(...pathSegments) {
16403
- const fullPath = path3.join(...pathSegments, vsCodeFolder, ...settingsPath);
16404
- const settings = JSON.parse(fs.readFileSync(fullPath, { encoding: "utf8" }));
16468
+ const fullPath = path5.join(...pathSegments, vsCodeFolder, ...settingsPath);
16469
+ const settings = JSON.parse(fs3.readFileSync(fullPath, { encoding: "utf8" }));
16405
16470
  return settings[property];
16406
16471
  }
16407
16472
  __name(loadProperty, "loadProperty");
@@ -16476,7 +16541,7 @@ ${errorDetail}`);
16476
16541
  * `TokenCredential` implementation might make.
16477
16542
  */
16478
16543
  async getToken(scopes, options) {
16479
- var _a, _b;
16544
+ var _a2, _b2;
16480
16545
  await this.prepareOnce();
16481
16546
  const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds, logger$o) || this.tenantId;
16482
16547
  if (findCredentials === void 0) {
@@ -16498,7 +16563,7 @@ ${errorDetail}`);
16498
16563
  scopeString += " offline_access";
16499
16564
  }
16500
16565
  const credentials = await findCredentials();
16501
- const { password: refreshToken } = (_b = (_a = credentials.find(({ account }) => account === this.cloudName)) !== null && _a !== void 0 ? _a : credentials[0]) !== null && _b !== void 0 ? _b : {};
16566
+ const { password: refreshToken } = (_b2 = (_a2 = credentials.find(({ account }) => account === this.cloudName)) !== null && _a2 !== void 0 ? _a2 : credentials[0]) !== null && _b2 !== void 0 ? _b2 : {};
16502
16567
  if (refreshToken) {
16503
16568
  const tokenResponse = await this.identityClient.refreshAccessToken(tenantId, AzureAccountClientId, scopeString, refreshToken, void 0);
16504
16569
  if (tokenResponse) {
@@ -16679,15 +16744,6 @@ ${errorDetail}`);
16679
16744
  });
16680
16745
  }
16681
16746
  __name(prepareRequestOptions$3, "prepareRequestOptions$3");
16682
- function readFileAsync$1(path4, options) {
16683
- return new Promise((resolve, reject) => fs.readFile(path4, options, (err, data) => {
16684
- if (err) {
16685
- reject(err);
16686
- }
16687
- resolve(data);
16688
- }));
16689
- }
16690
- __name(readFileAsync$1, "readFileAsync$1");
16691
16747
  async function filePathRequest(identityClient, requestPrepareOptions) {
16692
16748
  const response = await identityClient.sendRequest(coreRestPipeline.createPipelineRequest(requestPrepareOptions));
16693
16749
  if (response.status !== 401) {
@@ -16705,6 +16761,37 @@ ${errorDetail}`);
16705
16761
  }
16706
16762
  }
16707
16763
  __name(filePathRequest, "filePathRequest");
16764
+ function platformToFilePath() {
16765
+ switch (process.platform) {
16766
+ case "win32":
16767
+ if (!process.env.PROGRAMDATA) {
16768
+ throw new Error(`${msiName$4}: PROGRAMDATA environment variable has no value.`);
16769
+ }
16770
+ return `${process.env.PROGRAMDATA}\\AzureConnectedMachineAgent\\Tokens`;
16771
+ case "linux":
16772
+ return "/var/opt/azcmagent/tokens";
16773
+ default:
16774
+ throw new Error(`${msiName$4}: Unsupported platform ${process.platform}.`);
16775
+ }
16776
+ }
16777
+ __name(platformToFilePath, "platformToFilePath");
16778
+ function validateKeyFile(filePath) {
16779
+ if (!filePath) {
16780
+ throw new Error(`${msiName$4}: Failed to find the token file.`);
16781
+ }
16782
+ if (!filePath.endsWith(".key")) {
16783
+ throw new Error(`${msiName$4}: unexpected file path from HIMDS service: ${filePath}.`);
16784
+ }
16785
+ const expectedPath = platformToFilePath();
16786
+ if (!filePath.startsWith(expectedPath)) {
16787
+ throw new Error(`${msiName$4}: unexpected file path from HIMDS service: ${filePath}.`);
16788
+ }
16789
+ const stats = fs$1.statSync(filePath);
16790
+ if (stats.size > 4096) {
16791
+ throw new Error(`${msiName$4}: The file at ${filePath} is larger than expected at ${stats.size} bytes.`);
16792
+ }
16793
+ }
16794
+ __name(validateKeyFile, "validateKeyFile");
16708
16795
  var arcMsi = {
16709
16796
  name: "arc",
16710
16797
  async isAvailable({ scopes }) {
@@ -16720,7 +16807,7 @@ ${errorDetail}`);
16720
16807
  return result;
16721
16808
  },
16722
16809
  async getToken(configuration, getTokenOptions = {}) {
16723
- var _a;
16810
+ var _a2;
16724
16811
  const { identityClient, scopes, clientId, resourceId } = configuration;
16725
16812
  if (clientId) {
16726
16813
  logger$l.warning(`${msiName$4}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
@@ -16731,11 +16818,9 @@ ${errorDetail}`);
16731
16818
  logger$l.info(`${msiName$4}: Authenticating.`);
16732
16819
  const requestOptions = Object.assign(Object.assign({ disableJsonStringifyOnBody: true, deserializationMapper: void 0, abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$3(scopes, clientId, resourceId)), { allowInsecureConnection: true });
16733
16820
  const filePath = await filePathRequest(identityClient, requestOptions);
16734
- if (!filePath) {
16735
- throw new Error(`${msiName$4}: Failed to find the token file.`);
16736
- }
16737
- const key = await readFileAsync$1(filePath, { encoding: "utf-8" });
16738
- (_a = requestOptions.headers) === null || _a === void 0 ? void 0 : _a.set("Authorization", `Basic ${key}`);
16821
+ validateKeyFile(filePath);
16822
+ const key = await fs$1.promises.readFile(filePath, { encoding: "utf-8" });
16823
+ (_a2 = requestOptions.headers) === null || _a2 === void 0 ? void 0 : _a2.set("Authorization", `Basic ${key}`);
16739
16824
  const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({}, requestOptions), {
16740
16825
  // Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
16741
16826
  allowInsecureConnection: true
@@ -17020,7 +17105,7 @@ ${errorDetail}`);
17020
17105
  var msiName$1 = "ManagedIdentityCredential - IMDS";
17021
17106
  var logger$h = credentialLogger(msiName$1);
17022
17107
  function prepareRequestOptions(scopes, clientId, resourceId, options) {
17023
- var _a;
17108
+ var _a2;
17024
17109
  const resource = mapScopesToResource(scopes);
17025
17110
  if (!resource) {
17026
17111
  throw new Error(`${msiName$1}: Multiple scopes are not supported.`);
@@ -17041,7 +17126,7 @@ ${errorDetail}`);
17041
17126
  const params = new URLSearchParams(queryParameters);
17042
17127
  query = `?${params.toString()}`;
17043
17128
  }
17044
- const url = new URL(imdsEndpointPath, (_a = process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) !== null && _a !== void 0 ? _a : imdsHost);
17129
+ const url = new URL(imdsEndpointPath, (_a2 = process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) !== null && _a2 !== void 0 ? _a2 : imdsHost);
17045
17130
  const rawHeaders = {
17046
17131
  Accept: "application/json",
17047
17132
  Metadata: "true"
@@ -17076,10 +17161,10 @@ ${errorDetail}`);
17076
17161
  skipQuery: true
17077
17162
  });
17078
17163
  return tracingClient.withSpan("ManagedIdentityCredential-pingImdsEndpoint", getTokenOptions, async (options) => {
17079
- var _a, _b;
17164
+ var _a2, _b2;
17080
17165
  requestOptions.tracingOptions = options.tracingOptions;
17081
17166
  const request = coreRestPipeline.createPipelineRequest(requestOptions);
17082
- request.timeout = ((_a = options.requestOptions) === null || _a === void 0 ? void 0 : _a.timeout) || 1e3;
17167
+ request.timeout = ((_a2 = options.requestOptions) === null || _a2 === void 0 ? void 0 : _a2.timeout) || 1e3;
17083
17168
  request.allowInsecureConnection = true;
17084
17169
  let response;
17085
17170
  try {
@@ -17093,7 +17178,7 @@ ${errorDetail}`);
17093
17178
  return false;
17094
17179
  }
17095
17180
  if (response.status === 403) {
17096
- if ((_b = response.bodyAsText) === null || _b === void 0 ? void 0 : _b.includes("unreachable")) {
17181
+ if ((_b2 = response.bodyAsText) === null || _b2 === void 0 ? void 0 : _b2.includes("unreachable")) {
17097
17182
  logger$h.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
17098
17183
  logger$h.info(`${msiName$1}: ${response.bodyAsText}`);
17099
17184
  return false;
@@ -17185,9 +17270,9 @@ ${errorDetail}`);
17185
17270
  RegionalAuthority2["GovernmentUSDodCentral"] = "usdodcentral";
17186
17271
  })(RegionalAuthority || (RegionalAuthority = {}));
17187
17272
  function calculateRegionalAuthority(regionalAuthority) {
17188
- var _a, _b;
17273
+ var _a2, _b2;
17189
17274
  let azureRegion = regionalAuthority;
17190
- if (azureRegion === void 0 && ((_b = (_a = globalThis.process) === null || _a === void 0 ? void 0 : _a.env) === null || _b === void 0 ? void 0 : _b.AZURE_REGIONAL_AUTHORITY_NAME) !== void 0) {
17275
+ if (azureRegion === void 0 && ((_b2 = (_a2 = globalThis.process) === null || _a2 === void 0 ? void 0 : _a2.env) === null || _b2 === void 0 ? void 0 : _b2.AZURE_REGIONAL_AUTHORITY_NAME) !== void 0) {
17191
17276
  azureRegion = process.env.AZURE_REGIONAL_AUTHORITY_NAME;
17192
17277
  }
17193
17278
  if (azureRegion === RegionalAuthority.AutoDiscoverRegion) {
@@ -17198,9 +17283,9 @@ ${errorDetail}`);
17198
17283
  __name(calculateRegionalAuthority, "calculateRegionalAuthority");
17199
17284
  var msalLogger = credentialLogger("MsalClient");
17200
17285
  function generateMsalConfiguration(clientId, tenantId, msalClientOptions = {}) {
17201
- var _a, _b, _c;
17286
+ var _a2, _b2, _c;
17202
17287
  const resolvedTenant = resolveTenantId(msalLogger, tenantId, clientId);
17203
- const authority = getAuthority(resolvedTenant, (_a = msalClientOptions.authorityHost) !== null && _a !== void 0 ? _a : process.env.AZURE_AUTHORITY_HOST);
17288
+ const authority = getAuthority(resolvedTenant, (_a2 = msalClientOptions.authorityHost) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_AUTHORITY_HOST);
17204
17289
  const httpClient = new IdentityClient(Object.assign(Object.assign({}, msalClientOptions.tokenCredentialOptions), { authorityHost: authority, loggingOptions: msalClientOptions.loggingOptions }));
17205
17290
  const msalConfig = {
17206
17291
  auth: {
@@ -17211,7 +17296,7 @@ ${errorDetail}`);
17211
17296
  system: {
17212
17297
  networkClient: httpClient,
17213
17298
  loggerOptions: {
17214
- loggerCallback: defaultLoggerCallback((_b = msalClientOptions.logger) !== null && _b !== void 0 ? _b : msalLogger),
17299
+ loggerCallback: defaultLoggerCallback((_b2 = msalClientOptions.logger) !== null && _b2 !== void 0 ? _b2 : msalLogger),
17215
17300
  logLevel: getMSALLogLevel(logger$q.getLogLevel()),
17216
17301
  piiLoggingEnabled: (_c = msalClientOptions.loggingOptions) === null || _c === void 0 ? void 0 : _c.enableUnsafeSupportLogging
17217
17302
  }
@@ -17279,7 +17364,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17279
17364
  }
17280
17365
  __name(getTokenSilent, "getTokenSilent");
17281
17366
  async function withSilentAuthentication(msalApp, scopes, options, onAuthenticationRequired) {
17282
- var _a;
17367
+ var _a2;
17283
17368
  let response = null;
17284
17369
  try {
17285
17370
  response = await getTokenSilent(msalApp, scopes, options);
@@ -17303,7 +17388,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17303
17388
  }
17304
17389
  }
17305
17390
  ensureValidMsalToken(scopes, response, options);
17306
- state.cachedAccount = (_a = response === null || response === void 0 ? void 0 : response.account) !== null && _a !== void 0 ? _a : null;
17391
+ state.cachedAccount = (_a2 = response === null || response === void 0 ? void 0 : response.account) !== null && _a2 !== void 0 ? _a2 : null;
17307
17392
  msalLogger.getToken.info(formatSuccess(scopes));
17308
17393
  return {
17309
17394
  token: response.accessToken,
@@ -17499,7 +17584,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17499
17584
  * @hidden
17500
17585
  */
17501
17586
  constructor(clientIdOrOptions, options) {
17502
- var _a, _b;
17587
+ var _a2, _b2;
17503
17588
  this.isEndpointUnavailable = null;
17504
17589
  this.isAppTokenProviderInitialized = false;
17505
17590
  this.msiRetryConfig = {
@@ -17519,7 +17604,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17519
17604
  if (this.clientId && this.resourceId) {
17520
17605
  throw new Error(`${_ManagedIdentityCredential.name} - Client Id and Resource Id can't be provided at the same time.`);
17521
17606
  }
17522
- if (((_a = _options === null || _options === void 0 ? void 0 : _options.retryOptions) === null || _a === void 0 ? void 0 : _a.maxRetries) !== void 0) {
17607
+ if (((_a2 = _options === null || _options === void 0 ? void 0 : _options.retryOptions) === null || _a2 === void 0 ? void 0 : _a2.maxRetries) !== void 0) {
17523
17608
  this.msiRetryConfig.maxRetries = _options.retryOptions.maxRetries;
17524
17609
  }
17525
17610
  this.identityClient = new IdentityClient(_options);
@@ -17529,7 +17614,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17529
17614
  this.confidentialApp = new msalCommon.ConfidentialClientApplication({
17530
17615
  auth: {
17531
17616
  authority: "https://login.microsoftonline.com/managed_identity",
17532
- clientId: (_b = this.clientId) !== null && _b !== void 0 ? _b : DeveloperSignOnClientId,
17617
+ clientId: (_b2 = this.clientId) !== null && _b2 !== void 0 ? _b2 : DeveloperSignOnClientId,
17533
17618
  clientSecret: "dummy-secret",
17534
17619
  cloudDiscoveryMetadata: '{"tenant_discovery_endpoint":"https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration","api-version":"1.1","metadata":[{"preferred_network":"login.microsoftonline.com","preferred_cache":"login.windows.net","aliases":["login.microsoftonline.com","login.windows.net","login.microsoft.com","sts.windows.net"]},{"preferred_network":"login.partner.microsoftonline.cn","preferred_cache":"login.partner.microsoftonline.cn","aliases":["login.partner.microsoftonline.cn","login.chinacloudapi.cn"]},{"preferred_network":"login.microsoftonline.de","preferred_cache":"login.microsoftonline.de","aliases":["login.microsoftonline.de"]},{"preferred_network":"login.microsoftonline.us","preferred_cache":"login.microsoftonline.us","aliases":["login.microsoftonline.us","login.usgovcloudapi.net"]},{"preferred_network":"login-us.microsoftonline.com","preferred_cache":"login-us.microsoftonline.com","aliases":["login-us.microsoftonline.com"]}]}',
17535
17620
  authorityMetadata: '{"token_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/token","token_endpoint_auth_methods_supported":["client_secret_post","private_key_jwt","client_secret_basic"],"jwks_uri":"https://login.microsoftonline.com/common/discovery/v2.0/keys","response_modes_supported":["query","fragment","form_post"],"subject_types_supported":["pairwise"],"id_token_signing_alg_values_supported":["RS256"],"response_types_supported":["code","id_token","code id_token","id_token token"],"scopes_supported":["openid","profile","email","offline_access"],"issuer":"https://login.microsoftonline.com/{tenantid}/v2.0","request_uri_parameter_supported":false,"userinfo_endpoint":"https://graph.microsoft.com/oidc/userinfo","authorization_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/authorize","device_authorization_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/devicecode","http_logout_supported":true,"frontchannel_logout_supported":true,"end_session_endpoint":"https://login.microsoftonline.com/common/oauth2/v2.0/logout","claims_supported":["sub","iss","cloud_instance_name","cloud_instance_host_name","cloud_graph_host_name","msgraph_host","aud","exp","iat","auth_time","acr","nonce","preferred_username","name","tid","ver","at_hash","c_hash","email"],"kerberos_endpoint":"https://login.microsoftonline.com/common/kerberos","tenant_region_scope":null,"cloud_instance_name":"microsoftonline.com","cloud_graph_host_name":"graph.windows.net","msgraph_host":"graph.microsoft.com","rbac_url":"https://pas.windows.net"}',
@@ -17827,13 +17912,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17827
17912
  const scope = typeof scopes === "string" ? scopes : scopes[0];
17828
17913
  logger$c.getToken.info(`Using the scope ${scope}`);
17829
17914
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
17830
- var _a, _b, _c, _d;
17915
+ var _a2, _b2, _c, _d;
17831
17916
  try {
17832
17917
  ensureValidScopeForDevTimeCreds(scope, logger$c);
17833
17918
  const resource = getScopeResource(scope);
17834
17919
  const obj = await cliCredentialInternals.getAzureCliAccessToken(resource, tenantId, this.timeout);
17835
- const specificScope = (_a = obj.stderr) === null || _a === void 0 ? void 0 : _a.match("(.*)az login --scope(.*)");
17836
- const isLoginError2 = ((_b = obj.stderr) === null || _b === void 0 ? void 0 : _b.match("(.*)az login(.*)")) && !specificScope;
17920
+ const specificScope = (_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("(.*)az login --scope(.*)");
17921
+ const isLoginError2 = ((_b2 = obj.stderr) === null || _b2 === void 0 ? void 0 : _b2.match("(.*)az login(.*)")) && !specificScope;
17837
17922
  const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("az:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'az' is not recognized"));
17838
17923
  if (isNotInstallError) {
17839
17924
  const error = new CredentialUnavailableError("Azure CLI could not be found. Please visit https://aka.ms/azure-cli for installation instructions and then, once installed, authenticate to your Azure account using 'az login'.");
@@ -17980,13 +18065,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17980
18065
  }
17981
18066
  logger$b.getToken.info(`Using the scopes ${scopes}`);
17982
18067
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
17983
- var _a, _b, _c, _d;
18068
+ var _a2, _b2, _c, _d;
17984
18069
  try {
17985
18070
  scopeList.forEach((scope) => {
17986
18071
  ensureValidScopeForDevTimeCreds(scope, logger$b);
17987
18072
  });
17988
18073
  const obj = await developerCliCredentialInternals.getAzdAccessToken(scopeList, tenantId, this.timeout);
17989
- const isNotLoggedInError = ((_a = obj.stderr) === null || _a === void 0 ? void 0 : _a.match("not logged in, run `azd login` to login")) || ((_b = obj.stderr) === null || _b === void 0 ? void 0 : _b.match("not logged in, run `azd auth login` to login"));
18074
+ const isNotLoggedInError = ((_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("not logged in, run `azd login` to login")) || ((_b2 = obj.stderr) === null || _b2 === void 0 ? void 0 : _b2.match("not logged in, run `azd auth login` to login"));
17990
18075
  const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("azd:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'azd' is not recognized"));
17991
18076
  if (isNotInstallError || obj.error && obj.error.code === "ENOENT") {
17992
18077
  const error = new CredentialUnavailableError("Azure Developer CLI couldn't be found. To mitigate this issue, see the troubleshooting guidelines at https://aka.ms/azsdk/js/identity/azdevclicredential/troubleshoot.");
@@ -18382,19 +18467,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18382
18467
  var ClientSecretCredential = _ClientSecretCredential;
18383
18468
  var _MsalNode = class _MsalNode {
18384
18469
  constructor(options) {
18385
- var _a, _b, _c, _d, _e, _f;
18470
+ var _a2, _b2, _c, _d, _e, _f;
18386
18471
  this.app = {};
18387
18472
  this.caeApp = {};
18388
18473
  this.requiresConfidential = false;
18389
18474
  this.logger = options.logger;
18390
18475
  this.msalConfig = this.defaultNodeMsalConfig(options);
18391
18476
  this.tenantId = resolveTenantId(options.logger, options.tenantId, options.clientId);
18392
- this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds((_a = options === null || options === void 0 ? void 0 : options.tokenCredentialOptions) === null || _a === void 0 ? void 0 : _a.additionallyAllowedTenants);
18477
+ this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds((_a2 = options === null || options === void 0 ? void 0 : options.tokenCredentialOptions) === null || _a2 === void 0 ? void 0 : _a2.additionallyAllowedTenants);
18393
18478
  this.clientId = this.msalConfig.auth.clientId;
18394
18479
  if (options === null || options === void 0 ? void 0 : options.getAssertion) {
18395
18480
  this.getAssertion = options.getAssertion;
18396
18481
  }
18397
- this.enableBroker = (_b = options === null || options === void 0 ? void 0 : options.brokerOptions) === null || _b === void 0 ? void 0 : _b.enabled;
18482
+ this.enableBroker = (_b2 = options === null || options === void 0 ? void 0 : options.brokerOptions) === null || _b2 === void 0 ? void 0 : _b2.enabled;
18398
18483
  this.enableMsaPassthrough = (_c = options === null || options === void 0 ? void 0 : options.brokerOptions) === null || _c === void 0 ? void 0 : _c.legacyEnableMsaPassthrough;
18399
18484
  this.parentWindowHandle = (_d = options.brokerOptions) === null || _d === void 0 ? void 0 : _d.parentWindowHandle;
18400
18485
  if (persistenceProvider !== void 0 && ((_e = options.tokenCachePersistenceOptions) === null || _e === void 0 ? void 0 : _e.enabled)) {
@@ -18425,7 +18510,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18425
18510
  * Generates a MSAL configuration that generally works for Node.js
18426
18511
  */
18427
18512
  defaultNodeMsalConfig(options) {
18428
- var _a;
18513
+ var _a2;
18429
18514
  const clientId = options.clientId || DeveloperSignOnClientId;
18430
18515
  const tenantId = resolveTenantId(options.logger, options.tenantId, options.clientId);
18431
18516
  this.authorityHost = options.authorityHost || process.env.AZURE_AUTHORITY_HOST;
@@ -18445,7 +18530,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18445
18530
  loggerOptions: {
18446
18531
  loggerCallback: defaultLoggerCallback(options.logger),
18447
18532
  logLevel: getMSALLogLevel(logger$q.getLogLevel()),
18448
- piiLoggingEnabled: (_a = options.loggingOptions) === null || _a === void 0 ? void 0 : _a.enableUnsafeSupportLogging
18533
+ piiLoggingEnabled: (_a2 = options.loggingOptions) === null || _a2 === void 0 ? void 0 : _a2.enableUnsafeSupportLogging
18449
18534
  }
18450
18535
  }
18451
18536
  };
@@ -18559,7 +18644,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18559
18644
  * Attempts to retrieve a token from cache.
18560
18645
  */
18561
18646
  async getTokenSilent(scopes, options) {
18562
- var _a, _b, _c;
18647
+ var _a2, _b2, _c;
18563
18648
  await this.getActiveAccount(options === null || options === void 0 ? void 0 : options.enableCae);
18564
18649
  if (!this.account) {
18565
18650
  throw new AuthenticationRequiredError({
@@ -18589,8 +18674,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18589
18674
  }
18590
18675
  try {
18591
18676
  this.logger.info("Attempting to acquire token silently");
18592
- await ((_a = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a === void 0 ? void 0 : _a.getTokenCache().getAllAccounts());
18593
- const response = (_c = await ((_b = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b === void 0 ? void 0 : _b.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
18677
+ await ((_a2 = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a2 === void 0 ? void 0 : _a2.getTokenCache().getAllAccounts());
18678
+ const response = (_c = await ((_b2 = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b2 === void 0 ? void 0 : _b2.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
18594
18679
  return this.handleResult(scopes, response || void 0);
18595
18680
  } catch (err) {
18596
18681
  throw handleMsalError(scopes, err, options);
@@ -18734,8 +18819,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18734
18819
  "AZURE_ADDITIONALLY_ALLOWED_TENANTS"
18735
18820
  ];
18736
18821
  function getAdditionallyAllowedTenants() {
18737
- var _a;
18738
- const additionallyAllowedValues = (_a = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a !== void 0 ? _a : "";
18822
+ var _a2;
18823
+ const additionallyAllowedValues = (_a2 = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a2 !== void 0 ? _a2 : "";
18739
18824
  return additionallyAllowedValues.split(";");
18740
18825
  }
18741
18826
  __name(getAdditionallyAllowedTenants, "getAdditionallyAllowedTenants");
@@ -18825,12 +18910,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18825
18910
  var EnvironmentCredential = _EnvironmentCredential;
18826
18911
  var logger$4 = credentialLogger("DefaultAzureCredential");
18827
18912
  function createDefaultManagedIdentityCredential(options = {}) {
18828
- var _a, _b, _c, _d;
18829
- (_a = options.retryOptions) !== null && _a !== void 0 ? _a : options.retryOptions = {
18913
+ var _a2, _b2, _c, _d;
18914
+ (_a2 = options.retryOptions) !== null && _a2 !== void 0 ? _a2 : options.retryOptions = {
18830
18915
  maxRetries: 5,
18831
18916
  retryDelayInMs: 800
18832
18917
  };
18833
- const managedIdentityClientId = (_b = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b !== void 0 ? _b : process.env.AZURE_CLIENT_ID;
18918
+ const managedIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_CLIENT_ID;
18834
18919
  const workloadIdentityClientId = (_c = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _c !== void 0 ? _c : managedIdentityClientId;
18835
18920
  const managedResourceId = options === null || options === void 0 ? void 0 : options.managedIdentityResourceId;
18836
18921
  const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
@@ -18851,9 +18936,9 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18851
18936
  }
18852
18937
  __name(createDefaultManagedIdentityCredential, "createDefaultManagedIdentityCredential");
18853
18938
  function createDefaultWorkloadIdentityCredential(options) {
18854
- var _a, _b, _c;
18855
- const managedIdentityClientId = (_a = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a !== void 0 ? _a : process.env.AZURE_CLIENT_ID;
18856
- const workloadIdentityClientId = (_b = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b !== void 0 ? _b : managedIdentityClientId;
18939
+ var _a2, _b2, _c;
18940
+ const managedIdentityClientId = (_a2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_CLIENT_ID;
18941
+ const workloadIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b2 !== void 0 ? _b2 : managedIdentityClientId;
18857
18942
  const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
18858
18943
  const tenantId = (_c = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _c !== void 0 ? _c : process.env.AZURE_TENANT_ID;
18859
18944
  if (workloadFile && workloadIdentityClientId) {
@@ -18926,21 +19011,21 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18926
19011
  };
18927
19012
  var _MsalOpenBrowser = class _MsalOpenBrowser extends MsalNode {
18928
19013
  constructor(options) {
18929
- var _a, _b, _c, _d;
19014
+ var _a2, _b2, _c, _d;
18930
19015
  super(options);
18931
19016
  this.loginHint = options.loginHint;
18932
- this.errorTemplate = (_a = options.browserCustomizationOptions) === null || _a === void 0 ? void 0 : _a.errorMessage;
18933
- this.successTemplate = (_b = options.browserCustomizationOptions) === null || _b === void 0 ? void 0 : _b.successMessage;
19017
+ this.errorTemplate = (_a2 = options.browserCustomizationOptions) === null || _a2 === void 0 ? void 0 : _a2.errorMessage;
19018
+ this.successTemplate = (_b2 = options.browserCustomizationOptions) === null || _b2 === void 0 ? void 0 : _b2.successMessage;
18934
19019
  this.logger = credentialLogger("Node.js MSAL Open Browser");
18935
19020
  this.useDefaultBrokerAccount = ((_c = options.brokerOptions) === null || _c === void 0 ? void 0 : _c.enabled) && ((_d = options.brokerOptions) === null || _d === void 0 ? void 0 : _d.useDefaultBrokerAccount);
18936
19021
  }
18937
19022
  async doGetToken(scopes, options = {}) {
18938
19023
  try {
18939
19024
  const interactiveRequest = {
18940
- openBrowser: async (url) => {
19025
+ openBrowser: /* @__PURE__ */ __name(async (url) => {
18941
19026
  this.logger.verbose(`Opening browser to ${url}`);
18942
19027
  await interactiveBrowserMockable.open(url, { wait: true, newInstance: true });
18943
- },
19028
+ }, "openBrowser"),
18944
19029
  scopes,
18945
19030
  authority: options === null || options === void 0 ? void 0 : options.authority,
18946
19031
  claims: options === null || options === void 0 ? void 0 : options.claims,
@@ -18971,7 +19056,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18971
19056
  * If the default broker account is not available, the method will fall back to interactive authentication.
18972
19057
  */
18973
19058
  async doGetBrokeredToken(scopes, interactiveRequest, options) {
18974
- var _a;
19059
+ var _a2;
18975
19060
  this.logger.verbose("Authentication will resume through the broker");
18976
19061
  if (this.parentWindowHandle) {
18977
19062
  interactiveRequest.windowHandle = Buffer.from(this.parentWindowHandle);
@@ -18979,7 +19064,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18979
19064
  this.logger.warning("Parent window handle is not specified for the broker. This may cause unexpected behavior. Please provide the parentWindowHandle.");
18980
19065
  }
18981
19066
  if (this.enableMsaPassthrough) {
18982
- ((_a = interactiveRequest.tokenQueryParameters) !== null && _a !== void 0 ? _a : interactiveRequest.tokenQueryParameters = {})["msal_request_type"] = "consumer_passthrough";
19067
+ ((_a2 = interactiveRequest.tokenQueryParameters) !== null && _a2 !== void 0 ? _a2 : interactiveRequest.tokenQueryParameters = {})["msal_request_type"] = "consumer_passthrough";
18983
19068
  }
18984
19069
  if (options.useDefaultBrokerAccount) {
18985
19070
  interactiveRequest.prompt = "none";
@@ -19024,13 +19109,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19024
19109
  * @param options - Options for configuring the client which makes the authentication requests.
19025
19110
  */
19026
19111
  constructor(options) {
19027
- var _a, _b, _c, _d;
19112
+ var _a2, _b2, _c, _d;
19028
19113
  const redirectUri = typeof options.redirectUri === "function" ? options.redirectUri() : options.redirectUri || "http://localhost";
19029
19114
  this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
19030
19115
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
19031
19116
  const ibcNodeOptions = options;
19032
- if ((_a = ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.brokerOptions) === null || _a === void 0 ? void 0 : _a.enabled) {
19033
- if (!((_b = ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.brokerOptions) === null || _b === void 0 ? void 0 : _b.parentWindowHandle)) {
19117
+ if ((_a2 = ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.brokerOptions) === null || _a2 === void 0 ? void 0 : _a2.enabled) {
19118
+ if (!((_b2 = ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.brokerOptions) === null || _b2 === void 0 ? void 0 : _b2.parentWindowHandle)) {
19034
19119
  throw new Error("In order to do WAM authentication, `parentWindowHandle` under `brokerOptions` is a required parameter");
19035
19120
  } else {
19036
19121
  this.msalFlow = new MsalOpenBrowser(Object.assign(Object.assign({}, options), {
@@ -19280,7 +19365,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19280
19365
  };
19281
19366
  __name(_AuthorizationCodeCredential, "AuthorizationCodeCredential");
19282
19367
  var AuthorizationCodeCredential = _AuthorizationCodeCredential;
19283
- var readFileAsync = util.promisify(fs.readFile);
19368
+ var readFileAsync = util.promisify(fs3.readFile);
19284
19369
  async function parseCertificate(configuration, sendCertificateChain) {
19285
19370
  const certificateParts = {};
19286
19371
  const certificate = configuration.certificate;
@@ -19388,19 +19473,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19388
19473
  const pipeline = coreRestPipeline.createEmptyPipeline();
19389
19474
  pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({ credential, scopes }));
19390
19475
  async function getRefreshedToken() {
19391
- var _a;
19476
+ var _a2;
19392
19477
  const res = await pipeline.sendRequest({
19393
- sendRequest: (request) => Promise.resolve({
19478
+ sendRequest: /* @__PURE__ */ __name((request) => Promise.resolve({
19394
19479
  request,
19395
19480
  status: 200,
19396
19481
  headers: request.headers
19397
- })
19482
+ }), "sendRequest")
19398
19483
  }, coreRestPipeline.createPipelineRequest({
19399
19484
  url: "https://example.com",
19400
19485
  abortSignal,
19401
19486
  tracingOptions
19402
19487
  }));
19403
- const accessToken = (_a = res.headers.get("authorization")) === null || _a === void 0 ? void 0 : _a.split(" ")[1];
19488
+ const accessToken = (_a2 = res.headers.get("authorization")) === null || _a2 === void 0 ? void 0 : _a2.split(" ")[1];
19404
19489
  if (!accessToken) {
19405
19490
  throw new Error("Failed to get access token");
19406
19491
  }
@@ -19447,141 +19532,629 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19447
19532
  }
19448
19533
  });
19449
19534
 
19450
- // ../../node_modules/.store/@azure-identity-cache-persistence-npm-1.1.0-fbed6439ad/package/dist/index.js
19451
- var require_dist3 = __commonJS({
19452
- "../../node_modules/.store/@azure-identity-cache-persistence-npm-1.1.0-fbed6439ad/package/dist/index.js"(exports) {
19453
- "use strict";
19454
- Object.defineProperty(exports, "__esModule", { value: true });
19455
- var tslib = (init_tslib_es6(), __toCommonJS(tslib_es6_exports));
19456
- var path3 = __require("path");
19457
- var msalNodeExtensions = __require("@azure/msal-node-extensions");
19458
- function _interopNamespaceDefault(e) {
19459
- var n = /* @__PURE__ */ Object.create(null);
19460
- if (e) {
19461
- Object.keys(e).forEach(function(k) {
19462
- if (k !== "default") {
19463
- var d = Object.getOwnPropertyDescriptor(e, k);
19464
- Object.defineProperty(n, k, d.get ? d : {
19465
- enumerable: true,
19466
- get: function() {
19467
- return e[k];
19468
- }
19469
- });
19470
- }
19471
- });
19535
+ // src/authentication/getCredential.ts
19536
+ var import_identity3 = __toESM(require_dist2(), 1);
19537
+
19538
+ // src/authentication/forks/identity-cache-persistence/platforms.ts
19539
+ import * as path2 from "path";
19540
+
19541
+ // src/authentication/forks/msal-node-extensions/persistence/NapiRsKeyRingPersistence.ts
19542
+ import { Entry } from "@napi-rs/keyring";
19543
+ import { dirname as dirname2 } from "path";
19544
+
19545
+ // src/authentication/forks/msal-node-extensions/utils/TypeGuards.ts
19546
+ var isNodeError = /* @__PURE__ */ __name((error) => {
19547
+ return !!error && typeof error === "object" && "code" in error;
19548
+ }, "isNodeError");
19549
+
19550
+ // src/authentication/forks/msal-node-extensions/error/PersistenceError.ts
19551
+ var _PersistenceError = class _PersistenceError extends Error {
19552
+ constructor(errorCode, errorMessage) {
19553
+ const errorString = errorMessage ? `${errorCode}: ${errorMessage}` : errorCode;
19554
+ super(errorString);
19555
+ Object.setPrototypeOf(this, _PersistenceError.prototype);
19556
+ this.errorCode = errorCode;
19557
+ this.errorMessage = errorMessage;
19558
+ this.name = "PersistenceError";
19559
+ }
19560
+ /**
19561
+ * Error thrown when trying to access the file system.
19562
+ */
19563
+ static createFileSystemError(errorCode, errorMessage) {
19564
+ return new _PersistenceError(errorCode, errorMessage);
19565
+ }
19566
+ /**
19567
+ * Error thrown when trying to encrypt or decrypt data using DPAPI on Windows.
19568
+ */
19569
+ static createFilePersistenceWithDPAPIError(errorMessage) {
19570
+ return new _PersistenceError("DPAPIEncryptedFileError", errorMessage);
19571
+ }
19572
+ /**
19573
+ * Error thrown when using the cross platform lock.
19574
+ */
19575
+ static createCrossPlatformLockError(errorMessage) {
19576
+ return new _PersistenceError("CrossPlatformLockError", errorMessage);
19577
+ }
19578
+ /**
19579
+ * Error thrown when trying to write, load, or delete data from NapiRsKeyRingPersistence.
19580
+ */
19581
+ static createNapiRsKeyRingPersistenceError(errorMessage) {
19582
+ return new _PersistenceError("NapiRsKeyRingError", errorMessage);
19583
+ }
19584
+ /**
19585
+ * Throw cache persistence error
19586
+ *
19587
+ * @param errorMessage string
19588
+ * @returns PersistenceError
19589
+ */
19590
+ static createCachePersistenceError(errorMessage) {
19591
+ return new _PersistenceError("CachePersistenceError", errorMessage);
19592
+ }
19593
+ };
19594
+ __name(_PersistenceError, "PersistenceError");
19595
+ var PersistenceError = _PersistenceError;
19596
+
19597
+ // src/authentication/forks/msal-node-extensions/utils/Constants.ts
19598
+ var Constants3 = {
19599
+ /**
19600
+ * An existing file was the target of an operation that required that the target not exist
19601
+ */
19602
+ EEXIST_ERROR: "EEXIST",
19603
+ /**
19604
+ * No such file or directory: Commonly raised by fs operations to indicate that a component
19605
+ * of the specified pathname does not exist. No entity (file or directory) could be found
19606
+ * by the given path
19607
+ */
19608
+ ENOENT_ERROR: "ENOENT",
19609
+ /**
19610
+ * Operation not permitted. An attempt was made to perform an operation that requires
19611
+ * elevated privileges.
19612
+ */
19613
+ EPERM_ERROR: "EPERM",
19614
+ /**
19615
+ * Default service name for using MSAL Keytar
19616
+ */
19617
+ DEFAULT_SERVICE_NAME: "msal-node-extensions",
19618
+ /**
19619
+ * Test data used to verify underlying persistence mechanism
19620
+ */
19621
+ PERSISTENCE_TEST_DATA: "Dummy data to verify underlying persistence mechanism",
19622
+ // Name of the default cache file
19623
+ DEFAULT_CACHE_FILE_NAME: "cache.json"
19624
+ };
19625
+ var ErrorCodes = {
19626
+ INTERATION_REQUIRED_ERROR_CODE: "interaction_required",
19627
+ SERVER_UNAVAILABLE: "server_unavailable",
19628
+ UNKNOWN: "unknown_error"
19629
+ };
19630
+
19631
+ // src/authentication/forks/msal-node-extensions/persistence/BasePersistence.ts
19632
+ var _BasePersistence = class _BasePersistence {
19633
+ async verifyPersistence() {
19634
+ const persistenceValidator = await this.createForPersistenceValidation();
19635
+ try {
19636
+ await persistenceValidator.save(Constants3.PERSISTENCE_TEST_DATA);
19637
+ const retrievedDummyData = await persistenceValidator.load();
19638
+ if (!retrievedDummyData) {
19639
+ throw PersistenceError.createCachePersistenceError(
19640
+ "Persistence check failed. Data was written but it could not be read. Possible cause: on Linux, LibSecret is installed but D-Bus isn't running because it cannot be started over SSH."
19641
+ );
19472
19642
  }
19473
- n.default = e;
19474
- return Object.freeze(n);
19643
+ if (retrievedDummyData !== Constants3.PERSISTENCE_TEST_DATA) {
19644
+ throw PersistenceError.createCachePersistenceError(
19645
+ `Persistence check failed. Data written ${Constants3.PERSISTENCE_TEST_DATA} is different from data read ${retrievedDummyData}`
19646
+ );
19647
+ }
19648
+ await persistenceValidator.delete();
19649
+ return true;
19650
+ } catch (e) {
19651
+ throw PersistenceError.createCachePersistenceError(`Verifing persistence failed with the error: ${e}`);
19475
19652
  }
19476
- __name(_interopNamespaceDefault, "_interopNamespaceDefault");
19477
- var path__namespace = /* @__PURE__ */ _interopNamespaceDefault(path3);
19478
- var _a;
19479
- var _b;
19480
- var _c;
19481
- var localApplicationDataFolder = (_c = (_b = (_a = process.env.APPDATA) === null || _a === void 0 ? void 0 : _a.replace) === null || _b === void 0 ? void 0 : _b.call(_a, /(.Roaming)*$/, "\\Local")) !== null && _c !== void 0 ? _c : process.env.HOME;
19482
- var defaultMsalValues = {
19483
- tokenCache: {
19484
- name: "msal.cache",
19485
- // Expected values:
19486
- // - Darwin: '/Users/user/.IdentityService'
19487
- // - Windows 8+: 'C:\Users\user\AppData\Local\.IdentityService'
19488
- // - Linux: '/home/user/.IdentityService'
19489
- directory: path__namespace.join(localApplicationDataFolder, ".IdentityService")
19490
- },
19491
- keyRing: {
19492
- label: "MSALCache",
19493
- schema: "msal.cache",
19494
- collection: "default",
19495
- attributes: {
19496
- MsalClientID: "Microsoft.Developer.IdentityService",
19497
- "Microsoft.Developer.IdentityService": "1.0.0.0"
19498
- },
19499
- service: "Microsoft.Developer.IdentityService",
19500
- account: "MSALCache"
19501
- },
19502
- keyChain: {
19503
- service: "Microsoft.Developer.IdentityService",
19504
- account: "MSALCache"
19653
+ }
19654
+ };
19655
+ __name(_BasePersistence, "BasePersistence");
19656
+ var BasePersistence = _BasePersistence;
19657
+
19658
+ // src/authentication/forks/msal-node-extensions/persistence/FilePersistence.ts
19659
+ import { promises as fs } from "fs";
19660
+ import { dirname } from "path";
19661
+ init_dist();
19662
+ var _FilePersistence = class _FilePersistence extends BasePersistence {
19663
+ constructor(fileLocation, loggerOptions) {
19664
+ super();
19665
+ this.logger = new Logger(loggerOptions || _FilePersistence.createDefaultLoggerOptions());
19666
+ this.filePath = fileLocation;
19667
+ }
19668
+ static async create(fileLocation, loggerOptions) {
19669
+ const filePersistence = new _FilePersistence(fileLocation, loggerOptions);
19670
+ await filePersistence.createCacheFile();
19671
+ return filePersistence;
19672
+ }
19673
+ async save(contents) {
19674
+ try {
19675
+ await fs.writeFile(this.getFilePath(), contents, "utf-8");
19676
+ } catch (err) {
19677
+ if (isNodeError(err)) {
19678
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19679
+ } else {
19680
+ throw err;
19681
+ }
19682
+ }
19683
+ }
19684
+ async saveBuffer(contents) {
19685
+ try {
19686
+ await fs.writeFile(this.getFilePath(), contents);
19687
+ } catch (err) {
19688
+ if (isNodeError(err)) {
19689
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19690
+ } else {
19691
+ throw err;
19692
+ }
19693
+ }
19694
+ }
19695
+ async load() {
19696
+ try {
19697
+ return await fs.readFile(this.getFilePath(), "utf-8");
19698
+ } catch (err) {
19699
+ if (isNodeError(err)) {
19700
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19701
+ } else {
19702
+ throw err;
19505
19703
  }
19704
+ }
19705
+ }
19706
+ async loadBuffer() {
19707
+ try {
19708
+ return await fs.readFile(this.getFilePath());
19709
+ } catch (err) {
19710
+ if (isNodeError(err)) {
19711
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19712
+ } else {
19713
+ throw err;
19714
+ }
19715
+ }
19716
+ }
19717
+ async delete() {
19718
+ try {
19719
+ await fs.unlink(this.getFilePath());
19720
+ return true;
19721
+ } catch (err) {
19722
+ if (isNodeError(err)) {
19723
+ if (err.code === Constants3.ENOENT_ERROR) {
19724
+ this.logger.warning("Cache file does not exist, so it could not be deleted");
19725
+ return false;
19726
+ }
19727
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19728
+ } else {
19729
+ throw err;
19730
+ }
19731
+ }
19732
+ }
19733
+ getFilePath() {
19734
+ return this.filePath;
19735
+ }
19736
+ async reloadNecessary(lastSync) {
19737
+ return lastSync < await this.timeLastModified();
19738
+ }
19739
+ getLogger() {
19740
+ return this.logger;
19741
+ }
19742
+ createForPersistenceValidation() {
19743
+ const testCacheFileLocation = `${dirname(this.filePath)}/test.cache`;
19744
+ return _FilePersistence.create(testCacheFileLocation);
19745
+ }
19746
+ static createDefaultLoggerOptions() {
19747
+ return {
19748
+ loggerCallback: /* @__PURE__ */ __name(() => {
19749
+ }, "loggerCallback"),
19750
+ piiLoggingEnabled: false,
19751
+ logLevel: LogLevel.Info
19506
19752
  };
19507
- function getPersistencePath(name3) {
19508
- return path__namespace.join(defaultMsalValues.tokenCache.directory, name3);
19753
+ }
19754
+ async timeLastModified() {
19755
+ try {
19756
+ const stats = await fs.stat(this.filePath);
19757
+ return stats.mtime.getTime();
19758
+ } catch (err) {
19759
+ if (isNodeError(err)) {
19760
+ if (err.code === Constants3.ENOENT_ERROR) {
19761
+ this.logger.verbose("Cache file does not exist");
19762
+ return 0;
19763
+ }
19764
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19765
+ } else {
19766
+ throw err;
19767
+ }
19509
19768
  }
19510
- __name(getPersistencePath, "getPersistencePath");
19511
- var msalPersistencePlatforms = {
19512
- win32: ({ name: name3 = defaultMsalValues.tokenCache.name } = {}) => msalNodeExtensions.FilePersistenceWithDataProtection.create(getPersistencePath(name3), msalNodeExtensions.DataProtectionScope.CurrentUser),
19513
- darwin: (options = {}) => tslib.__awaiter(void 0, void 0, void 0, function* () {
19514
- const { name: name3, unsafeAllowUnencryptedStorage } = options;
19515
- const { service, account } = defaultMsalValues.keyChain;
19516
- const persistencePath = getPersistencePath(name3 || defaultMsalValues.tokenCache.name);
19517
- try {
19518
- const persistence = yield msalNodeExtensions.KeychainPersistence.create(persistencePath, service, account);
19519
- yield persistence.load();
19520
- return persistence;
19521
- } catch (e) {
19522
- if (!unsafeAllowUnencryptedStorage) {
19523
- throw new Error("Unable to read from the macOS Keychain.");
19524
- }
19525
- return msalNodeExtensions.FilePersistence.create(persistencePath);
19769
+ }
19770
+ async createCacheFile() {
19771
+ await this.createFileDirectory();
19772
+ const fileHandle = await fs.open(this.filePath, "a");
19773
+ await fileHandle.close();
19774
+ this.logger.info(`File created at ${this.filePath}`);
19775
+ }
19776
+ async createFileDirectory() {
19777
+ try {
19778
+ await fs.mkdir(dirname(this.filePath), { recursive: true });
19779
+ } catch (err) {
19780
+ if (isNodeError(err)) {
19781
+ if (err.code === Constants3.EEXIST_ERROR) {
19782
+ this.logger.info(`Directory ${dirname(this.filePath)} already exists`);
19783
+ } else {
19784
+ throw PersistenceError.createFileSystemError(err.code || ErrorCodes.UNKNOWN, err.message);
19526
19785
  }
19527
- }),
19528
- linux: (options = {}) => tslib.__awaiter(void 0, void 0, void 0, function* () {
19529
- const { name: name3, unsafeAllowUnencryptedStorage } = options;
19530
- const { service, account } = defaultMsalValues.keyRing;
19531
- const persistencePath = getPersistencePath(name3 || defaultMsalValues.tokenCache.name);
19532
- try {
19533
- const persistence = yield msalNodeExtensions.LibSecretPersistence.create(persistencePath, service, account);
19534
- yield persistence.load();
19535
- return persistence;
19536
- } catch (e) {
19537
- if (!unsafeAllowUnencryptedStorage) {
19538
- throw new Error("Unable to read from the system keyring (libsecret).");
19786
+ } else {
19787
+ throw err;
19788
+ }
19789
+ }
19790
+ }
19791
+ };
19792
+ __name(_FilePersistence, "FilePersistence");
19793
+ var FilePersistence = _FilePersistence;
19794
+
19795
+ // src/authentication/forks/msal-node-extensions/persistence/NapiRsKeyRingPersistence.ts
19796
+ var _NapiRsKeyRingPersistance = class _NapiRsKeyRingPersistance extends BasePersistence {
19797
+ constructor(filePersistence, service, account) {
19798
+ super();
19799
+ this.service = service;
19800
+ this.account = account;
19801
+ this.entry = new Entry(service, account);
19802
+ this.filePersistence = filePersistence;
19803
+ }
19804
+ static async create(fileLocation, serviceName, accountName, loggerOptions) {
19805
+ const filePersistence = await FilePersistence.create(fileLocation, loggerOptions);
19806
+ return new _NapiRsKeyRingPersistance(filePersistence, serviceName, accountName);
19807
+ }
19808
+ async save(contents) {
19809
+ try {
19810
+ this.entry.setPassword(contents);
19811
+ } catch (e) {
19812
+ if (isNodeError(e)) {
19813
+ throw PersistenceError.createNapiRsKeyRingPersistenceError(e.message);
19814
+ }
19815
+ throw e;
19816
+ }
19817
+ await this.filePersistence.save(contents);
19818
+ }
19819
+ load() {
19820
+ try {
19821
+ return Promise.resolve(this.entry.getPassword());
19822
+ } catch (e) {
19823
+ if (isNodeError(e)) {
19824
+ throw PersistenceError.createNapiRsKeyRingPersistenceError(e.message);
19825
+ }
19826
+ throw e;
19827
+ }
19828
+ }
19829
+ async delete() {
19830
+ try {
19831
+ await this.filePersistence.delete();
19832
+ return this.entry.deletePassword();
19833
+ } catch (e) {
19834
+ if (isNodeError(e)) {
19835
+ throw PersistenceError.createNapiRsKeyRingPersistenceError(e.message);
19836
+ }
19837
+ throw e;
19838
+ }
19839
+ }
19840
+ reloadNecessary(lastSync) {
19841
+ return this.filePersistence.reloadNecessary(lastSync);
19842
+ }
19843
+ getFilePath() {
19844
+ return this.filePersistence.getFilePath();
19845
+ }
19846
+ getLogger() {
19847
+ return this.filePersistence.getLogger();
19848
+ }
19849
+ createForPersistenceValidation() {
19850
+ const testCacheFileLocation = `${dirname2(this.filePersistence.getFilePath())}/test.cache`;
19851
+ return _NapiRsKeyRingPersistance.create(
19852
+ testCacheFileLocation,
19853
+ "persistenceValidationServiceName",
19854
+ "persistencValidationAccountName"
19855
+ );
19856
+ }
19857
+ };
19858
+ __name(_NapiRsKeyRingPersistance, "NapiRsKeyRingPersistance");
19859
+ var NapiRsKeyRingPersistance = _NapiRsKeyRingPersistance;
19860
+
19861
+ // src/authentication/forks/msal-node-extensions/persistence/FilePersistenceWithDataProtection.ts
19862
+ import { protectData, unprotectData } from "node-dpapi-prebuilt";
19863
+ import { dirname as dirname3 } from "path";
19864
+ var _FilePersistenceWithDataProtection = class _FilePersistenceWithDataProtection extends BasePersistence {
19865
+ constructor(filePersistence, scope, optionalEntropy) {
19866
+ super();
19867
+ this.scope = scope;
19868
+ this.optionalEntropy = optionalEntropy ? Buffer.from(optionalEntropy, "utf-8") : null;
19869
+ this.filePersistence = filePersistence;
19870
+ }
19871
+ static async create(fileLocation, scope, optionalEntropy, loggerOptions) {
19872
+ const filePersistence = await FilePersistence.create(fileLocation, loggerOptions);
19873
+ const persistence = new _FilePersistenceWithDataProtection(filePersistence, scope, optionalEntropy);
19874
+ return persistence;
19875
+ }
19876
+ async save(contents) {
19877
+ try {
19878
+ const encryptedContents = protectData(Buffer.from(contents, "utf-8"), this.optionalEntropy, this.scope);
19879
+ await this.filePersistence.saveBuffer(encryptedContents);
19880
+ } catch (err) {
19881
+ if (isNodeError(err)) {
19882
+ throw PersistenceError.createFilePersistenceWithDPAPIError(err.message);
19883
+ } else {
19884
+ throw err;
19885
+ }
19886
+ }
19887
+ }
19888
+ async load() {
19889
+ try {
19890
+ const encryptedContents = await this.filePersistence.loadBuffer();
19891
+ if (typeof encryptedContents === "undefined" || !encryptedContents || 0 === encryptedContents.length) {
19892
+ this.filePersistence.getLogger().info("Encrypted contents loaded from file were null or empty");
19893
+ return null;
19894
+ }
19895
+ return unprotectData(encryptedContents, this.optionalEntropy, this.scope).toString();
19896
+ } catch (err) {
19897
+ if (isNodeError(err)) {
19898
+ throw PersistenceError.createFilePersistenceWithDPAPIError(err.message);
19899
+ } else {
19900
+ throw err;
19901
+ }
19902
+ }
19903
+ }
19904
+ async delete() {
19905
+ return this.filePersistence.delete();
19906
+ }
19907
+ async reloadNecessary(lastSync) {
19908
+ return this.filePersistence.reloadNecessary(lastSync);
19909
+ }
19910
+ getFilePath() {
19911
+ return this.filePersistence.getFilePath();
19912
+ }
19913
+ getLogger() {
19914
+ return this.filePersistence.getLogger();
19915
+ }
19916
+ createForPersistenceValidation() {
19917
+ const testCacheFileLocation = `${dirname3(this.filePersistence.getFilePath())}/test.cache`;
19918
+ return _FilePersistenceWithDataProtection.create(testCacheFileLocation, "CurrentUser");
19919
+ }
19920
+ };
19921
+ __name(_FilePersistenceWithDataProtection, "FilePersistenceWithDataProtection");
19922
+ var FilePersistenceWithDataProtection = _FilePersistenceWithDataProtection;
19923
+
19924
+ // src/authentication/forks/identity-cache-persistence/platforms.ts
19925
+ var _a, _b;
19926
+ var localApplicationDataFolder = ((_b = (_a = process.env.APPDATA) == null ? void 0 : _a.replace) == null ? void 0 : _b.call(_a, /(.Roaming)*$/, "\\Local")) ?? process.env.HOME;
19927
+ var defaultMsalValues = {
19928
+ tokenCache: {
19929
+ name: "msal.cache",
19930
+ // Expected values:
19931
+ // - Darwin: '/Users/user/.IdentityService'
19932
+ // - Windows 8+: 'C:\Users\user\AppData\Local\.IdentityService'
19933
+ // - Linux: '/home/user/.IdentityService'
19934
+ directory: path2.join(localApplicationDataFolder, ".IdentityService")
19935
+ },
19936
+ keyRing: {
19937
+ label: "MSALCache",
19938
+ schema: "msal.cache",
19939
+ collection: "default",
19940
+ attributes: {
19941
+ MsalClientID: "Microsoft.Developer.IdentityService",
19942
+ "Microsoft.Developer.IdentityService": "1.0.0.0"
19943
+ },
19944
+ service: "Microsoft.Developer.IdentityService",
19945
+ account: "MSALCache"
19946
+ },
19947
+ keyChain: {
19948
+ service: "Microsoft.Developer.IdentityService",
19949
+ account: "MSALCache"
19950
+ }
19951
+ };
19952
+ function getPersistencePath(name3) {
19953
+ return path2.join(defaultMsalValues.tokenCache.directory, name3);
19954
+ }
19955
+ __name(getPersistencePath, "getPersistencePath");
19956
+ async function persistanceFactory(options = {}) {
19957
+ const { name: name3, unsafeAllowUnencryptedStorage } = options;
19958
+ const { service, account } = defaultMsalValues.keyChain;
19959
+ const persistencePath = getPersistencePath(name3 || defaultMsalValues.tokenCache.name);
19960
+ try {
19961
+ const persistence = await NapiRsKeyRingPersistance.create(persistencePath, `${service}.${name3}`, account);
19962
+ await persistence.load();
19963
+ return persistence;
19964
+ } catch (e) {
19965
+ if (!unsafeAllowUnencryptedStorage) {
19966
+ throw new Error("Unable to read from the NAPI keyring.");
19967
+ }
19968
+ return FilePersistence.create(persistencePath);
19969
+ }
19970
+ }
19971
+ __name(persistanceFactory, "persistanceFactory");
19972
+ var msalPersistencePlatforms = {
19973
+ win32: /* @__PURE__ */ __name(({ name: name3 = defaultMsalValues.tokenCache.name } = {}) => FilePersistenceWithDataProtection.create(getPersistencePath(name3), "CurrentUser"), "win32"),
19974
+ darwin: persistanceFactory,
19975
+ linux: persistanceFactory
19976
+ };
19977
+
19978
+ // src/authentication/forks/msal-node-extensions/lock/CrossPlatformLock.ts
19979
+ import { promises as fs2 } from "fs";
19980
+ import { pid } from "process";
19981
+ var _CrossPlatformLock = class _CrossPlatformLock {
19982
+ constructor(lockFilePath, logger, lockOptions) {
19983
+ this.lockFilePath = lockFilePath;
19984
+ this.retryNumber = lockOptions ? lockOptions.retryNumber : 500;
19985
+ this.retryDelay = lockOptions ? lockOptions.retryDelay : 100;
19986
+ this.logger = logger;
19987
+ }
19988
+ /**
19989
+ * Locks cache from read or writes by creating file with same path and name as
19990
+ * cache file but with .lockfile extension. If another process has already created
19991
+ * the lockfile, will back off and retry based on configuration settings set by CrossPlatformLockOptions
19992
+ */
19993
+ async lock() {
19994
+ for (let tryCount = 0; tryCount < this.retryNumber; tryCount++) {
19995
+ try {
19996
+ this.logger.info(`Pid ${pid} trying to acquire lock`);
19997
+ this.lockFileHandle = await fs2.open(this.lockFilePath, "wx+");
19998
+ this.logger.info(`Pid ${pid} acquired lock`);
19999
+ await this.lockFileHandle.write(pid.toString());
20000
+ return;
20001
+ } catch (err) {
20002
+ if (isNodeError(err)) {
20003
+ if (err.code === Constants3.EEXIST_ERROR || err.code === Constants3.EPERM_ERROR) {
20004
+ this.logger.info(err.message);
20005
+ await this.sleep(this.retryDelay);
20006
+ } else {
20007
+ this.logger.error(`${pid} was not able to acquire lock. Ran into error: ${err.message}`);
20008
+ throw PersistenceError.createCrossPlatformLockError(err.message);
19539
20009
  }
19540
- return msalNodeExtensions.FilePersistence.create(persistencePath);
20010
+ } else {
20011
+ throw err;
19541
20012
  }
19542
- })
19543
- };
19544
- function createPersistence(options) {
19545
- var _a2;
19546
- return tslib.__awaiter(this, void 0, void 0, function* () {
19547
- const persistence = yield (_a2 = msalPersistencePlatforms[process.platform]) === null || _a2 === void 0 ? void 0 : _a2.call(msalPersistencePlatforms, options);
19548
- if (persistence === void 0) {
19549
- throw new Error("no persistence providers are available on this platform");
20013
+ }
20014
+ }
20015
+ this.logger.error(`${pid} was not able to acquire lock. Exceeded amount of retries set in the options`);
20016
+ throw PersistenceError.createCrossPlatformLockError(
20017
+ "Not able to acquire lock. Exceeded amount of retries set in options"
20018
+ );
20019
+ }
20020
+ /**
20021
+ * unlocks cache file by deleting .lockfile.
20022
+ */
20023
+ async unlock() {
20024
+ try {
20025
+ if (this.lockFileHandle) {
20026
+ await fs2.unlink(this.lockFilePath);
20027
+ await this.lockFileHandle.close();
20028
+ this.logger.info("lockfile deleted");
20029
+ } else {
20030
+ this.logger.warning("lockfile handle does not exist, so lockfile could not be deleted");
20031
+ }
20032
+ } catch (err) {
20033
+ if (isNodeError(err)) {
20034
+ if (err.code === Constants3.ENOENT_ERROR) {
20035
+ this.logger.info("Tried to unlock but lockfile does not exist");
20036
+ } else {
20037
+ this.logger.error(`${pid} was not able to release lock. Ran into error: ${err.message}`);
20038
+ throw PersistenceError.createCrossPlatformLockError(err.message);
19550
20039
  }
19551
- return persistence;
19552
- });
20040
+ } else {
20041
+ throw err;
20042
+ }
19553
20043
  }
19554
- __name(createPersistence, "createPersistence");
19555
- function createPersistenceCachePlugin(options) {
19556
- return tslib.__awaiter(this, void 0, void 0, function* () {
19557
- const persistence = yield createPersistence(options !== null && options !== void 0 ? options : {});
19558
- return new msalNodeExtensions.PersistenceCachePlugin(persistence, {
19559
- retryNumber: 100,
19560
- retryDelay: 50
19561
- });
19562
- });
20044
+ }
20045
+ sleep(ms) {
20046
+ return new Promise((resolve) => {
20047
+ setTimeout(resolve, ms);
20048
+ });
20049
+ }
20050
+ };
20051
+ __name(_CrossPlatformLock, "CrossPlatformLock");
20052
+ var CrossPlatformLock = _CrossPlatformLock;
20053
+
20054
+ // src/authentication/forks/msal-node-extensions/persistence/PersistenceCachePlugin.ts
20055
+ import { pid as pid2 } from "process";
20056
+ var _PersistenceCachePlugin = class _PersistenceCachePlugin {
20057
+ constructor(persistence, lockOptions) {
20058
+ this.persistence = persistence;
20059
+ this.logger = persistence.getLogger();
20060
+ this.lockFilePath = `${this.persistence.getFilePath()}.lockfile`;
20061
+ this.crossPlatformLock = new CrossPlatformLock(this.lockFilePath, this.logger, lockOptions);
20062
+ this.lastSync = 0;
20063
+ this.currentCache = null;
20064
+ }
20065
+ /**
20066
+ * Reads from storage and saves an in-memory copy. If persistence has not been updated
20067
+ * since last time data was read, in memory copy is used.
20068
+ *
20069
+ * If cacheContext.cacheHasChanged === true, then file lock is created and not deleted until
20070
+ * afterCacheAccess() is called, to prevent the cache file from changing in between
20071
+ * beforeCacheAccess() and afterCacheAccess().
20072
+ */
20073
+ async beforeCacheAccess(cacheContext) {
20074
+ this.logger.info("Executing before cache access");
20075
+ const reloadNecessary = await this.persistence.reloadNecessary(this.lastSync);
20076
+ if (!reloadNecessary && this.currentCache !== null) {
20077
+ if (cacheContext.cacheHasChanged) {
20078
+ this.logger.verbose("Cache context has changed");
20079
+ await this.crossPlatformLock.lock();
20080
+ }
20081
+ return;
20082
+ }
20083
+ try {
20084
+ this.logger.info(`Reload necessary. Last sync time: ${this.lastSync}`);
20085
+ await this.crossPlatformLock.lock();
20086
+ this.currentCache = await this.persistence.load();
20087
+ this.lastSync = (/* @__PURE__ */ new Date()).getTime();
20088
+ if (this.currentCache) {
20089
+ cacheContext.tokenCache.deserialize(this.currentCache);
20090
+ } else {
20091
+ this.logger.info("Cache empty.");
20092
+ }
20093
+ this.logger.info(`Last sync time updated to: ${this.lastSync}`);
20094
+ } finally {
20095
+ if (!cacheContext.cacheHasChanged) {
20096
+ await this.crossPlatformLock.unlock();
20097
+ this.logger.info(`Pid ${pid2} released lock`);
20098
+ } else {
20099
+ this.logger.info(`Pid ${pid2} beforeCacheAccess did not release lock`);
20100
+ }
19563
20101
  }
19564
- __name(createPersistenceCachePlugin, "createPersistenceCachePlugin");
19565
- var cachePersistencePlugin2 = /* @__PURE__ */ __name((context) => {
19566
- const { cachePluginControl } = context;
19567
- cachePluginControl.setPersistence(createPersistenceCachePlugin);
19568
- }, "cachePersistencePlugin");
19569
- exports.cachePersistencePlugin = cachePersistencePlugin2;
19570
20102
  }
19571
- });
20103
+ /**
20104
+ * Writes to storage if MSAL in memory copy of cache has been changed.
20105
+ */
20106
+ async afterCacheAccess(cacheContext) {
20107
+ this.logger.info("Executing after cache access");
20108
+ try {
20109
+ if (cacheContext.cacheHasChanged) {
20110
+ this.logger.info("Msal in-memory cache has changed. Writing changes to persistence");
20111
+ this.currentCache = cacheContext.tokenCache.serialize();
20112
+ await this.persistence.save(this.currentCache);
20113
+ } else {
20114
+ this.logger.info("Msal in-memory cache has not changed. Did not write to persistence");
20115
+ }
20116
+ } finally {
20117
+ await this.crossPlatformLock.unlock();
20118
+ this.logger.info(`Pid ${pid2} afterCacheAccess released lock`);
20119
+ }
20120
+ }
20121
+ };
20122
+ __name(_PersistenceCachePlugin, "PersistenceCachePlugin");
20123
+ var PersistenceCachePlugin = _PersistenceCachePlugin;
20124
+
20125
+ // src/authentication/forks/identity-cache-persistence/provider.ts
20126
+ async function createPersistence(options) {
20127
+ var _a2, _b2;
20128
+ const persistence = await ((_b2 = (_a2 = msalPersistencePlatforms)[process.platform]) == null ? void 0 : _b2.call(_a2, options));
20129
+ if (persistence === void 0) {
20130
+ throw new Error("no persistence providers are available on this platform");
20131
+ }
20132
+ return persistence;
20133
+ }
20134
+ __name(createPersistence, "createPersistence");
20135
+ async function createPersistenceCachePlugin(options) {
20136
+ const persistence = await createPersistence(options ?? {});
20137
+ return new PersistenceCachePlugin(persistence, {
20138
+ retryNumber: 100,
20139
+ retryDelay: 50
20140
+ });
20141
+ }
20142
+ __name(createPersistenceCachePlugin, "createPersistenceCachePlugin");
19572
20143
 
19573
- // src/authentication/getCredential.ts
19574
- var import_identity3 = __toESM(require_dist2(), 1);
19575
- var import_identity_cache_persistence = __toESM(require_dist3(), 1);
20144
+ // src/authentication/forks/identity-cache-persistence/cachePersistencePlugin.ts
20145
+ var cachePersistencePlugin = /* @__PURE__ */ __name((context) => {
20146
+ const { cachePluginControl } = context;
20147
+ cachePluginControl.setPersistence(createPersistenceCachePlugin);
20148
+ }, "cachePersistencePlugin");
19576
20149
 
19577
20150
  // src/authentication/getAuthenticationRecord.ts
19578
20151
  var import_identity = __toESM(require_dist2(), 1);
19579
20152
  import { existsSync, readFileSync as readFileSync2 } from "fs";
19580
20153
 
19581
20154
  // src/authentication/getAuthenticationRecordPath.ts
19582
- import path from "path";
20155
+ import path3 from "path";
19583
20156
  function getAuthenticationRecordPath(cachePath) {
19584
- return path.join(cachePath, "tokencache.bin");
20157
+ return path3.join(cachePath, "tokencache.bin");
19585
20158
  }
19586
20159
  __name(getAuthenticationRecordPath, "getAuthenticationRecordPath");
19587
20160
 
@@ -19611,7 +20184,7 @@ __name(saveAuthenticationRecord, "saveAuthenticationRecord");
19611
20184
  // src/authentication/tokenCachePersistenceOptions.ts
19612
20185
  var tokenCachePersistenceOptions = {
19613
20186
  enabled: true,
19614
- name: "cloudpack"
20187
+ name: "Cloudpack"
19615
20188
  };
19616
20189
 
19617
20190
  // src/utils/isProcessRunning.ts
@@ -19619,21 +20192,21 @@ function isErrorWithCode(error) {
19619
20192
  return error instanceof Error && "code" in error;
19620
20193
  }
19621
20194
  __name(isErrorWithCode, "isErrorWithCode");
19622
- function isProcessRunning(pid) {
20195
+ function isProcessRunning(pid3) {
19623
20196
  try {
19624
- process.kill(pid, 0);
20197
+ process.kill(pid3, 0);
19625
20198
  return true;
19626
20199
  } catch (error) {
19627
20200
  if (isErrorWithCode(error) && error.code === "ERR_INVALID_ARG_TYPE") {
19628
- console.log(`Invalid PID: ${pid}`);
20201
+ console.log(`Invalid PID: ${pid3}`);
19629
20202
  return false;
19630
20203
  } else if (isErrorWithCode(error) && error.code === "EPERM") {
19631
20204
  console.log(
19632
- `Permission issue indicates that process ${pid} exists but user doesn't have permission to signal it.`
20205
+ `Permission issue indicates that process ${pid3} exists but user doesn't have permission to signal it.`
19633
20206
  );
19634
20207
  return true;
19635
20208
  } else if (isErrorWithCode(error) && error.code === "ESRCH") {
19636
- console.log(`Process ${pid} does not exist.`);
20209
+ console.log(`Process ${pid3} does not exist.`);
19637
20210
  return false;
19638
20211
  } else {
19639
20212
  throw error;
@@ -19646,11 +20219,11 @@ __name(isProcessRunning, "isProcessRunning");
19646
20219
  import { unlinkSync } from "fs";
19647
20220
 
19648
20221
  // src/authentication/lock-file/getAuthenticationLockFilePath.ts
19649
- import path2 from "path";
20222
+ import path4 from "path";
19650
20223
  function getAuthenticationLockFilePath() {
19651
- var _a, _b;
19652
- const localApplicationDataFolder = ((_b = (_a = process.env.APPDATA) == null ? void 0 : _a.replace) == null ? void 0 : _b.call(_a, /(.Roaming)*$/, "\\Local")) ?? (process.env.HOME || "");
19653
- return path2.join(localApplicationDataFolder, ".IdentityService", tokenCachePersistenceOptions.name + ".lockfile");
20224
+ var _a2, _b2;
20225
+ const localApplicationDataFolder2 = ((_b2 = (_a2 = process.env.APPDATA) == null ? void 0 : _a2.replace) == null ? void 0 : _b2.call(_a2, /(.Roaming)*$/, "\\Local")) ?? (process.env.HOME || "");
20226
+ return path4.join(localApplicationDataFolder2, ".IdentityService", tokenCachePersistenceOptions.name + ".lockfile");
19654
20227
  }
19655
20228
  __name(getAuthenticationLockFilePath, "getAuthenticationLockFilePath");
19656
20229
 
@@ -19703,9 +20276,9 @@ function tryCleaningLockFile() {
19703
20276
  if (!doesLockFileExist()) {
19704
20277
  return true;
19705
20278
  }
19706
- const pid = readAuthenticationLockFile();
19707
- console.log(`Process ID in the lock file: ${pid}`);
19708
- if (!isProcessRunning(pid) && deleteAuthenticationLockFile()) {
20279
+ const pid3 = readAuthenticationLockFile();
20280
+ console.log(`Process ID in the lock file: ${pid3}`);
20281
+ if (!isProcessRunning(pid3) && deleteAuthenticationLockFile()) {
19709
20282
  console.log("Auth lock file is deleted successfully");
19710
20283
  return true;
19711
20284
  }
@@ -19736,7 +20309,7 @@ function getCredentialInternal(loginMethod, authenticationRecord, tenantId) {
19736
20309
  }
19737
20310
  __name(getCredentialInternal, "getCredentialInternal");
19738
20311
  async function getCredential(options, context) {
19739
- var _a;
20312
+ var _a2;
19740
20313
  const { loginMethod, cachePath, tenantId } = options;
19741
20314
  const { reporter, azureLogger, telemetryClient } = context;
19742
20315
  if (loginMethod == "azure-cli") {
@@ -19745,22 +20318,22 @@ async function getCredential(options, context) {
19745
20318
  const tasks = {};
19746
20319
  azureLogger.once("MsalBrowserOpen", (url) => {
19747
20320
  tasks.interactiveAuthentication = reporter.addTask(
19748
- `Prepare to sign in \u2013 we are launching a browser page for you. Simply follow the instructions on the login page to seamlessly complete the authentication process. You can manually access the login page by navigating to the folliwing url if you inadvertently close the authentication page or prefer to use a different web browser or a profile. ${url}`
20321
+ `Prepare to sign in - we are launching a browser page for you. Simply follow the instructions on the login page to seamlessly complete the authentication process. You can manually access the login page by navigating to the folliwing url if you inadvertently close the authentication page or prefer to use a different web browser or a profile. ${url}`
19749
20322
  );
19750
20323
  });
19751
- (0, import_identity3.useIdentityPlugin)(import_identity_cache_persistence.cachePersistencePlugin);
19752
- const credential = getCredentialInternal(loginMethod, getAuthenticationRecord(cachePath), tenantId);
19753
20324
  tryCleaningLockFile();
20325
+ (0, import_identity3.useIdentityPlugin)(cachePersistencePlugin);
20326
+ const credential = getCredentialInternal(loginMethod, getAuthenticationRecord(cachePath), tenantId);
19754
20327
  const storageScope = "https://storage.azure.com/.default";
19755
20328
  const authenticationRecord = await credential.authenticate(storageScope);
19756
20329
  const token = await credential.getToken(storageScope);
19757
20330
  const storageCustomCredential = {
19758
- getToken: () => Promise.resolve(token)
20331
+ getToken: /* @__PURE__ */ __name(() => Promise.resolve(token), "getToken")
19759
20332
  };
19760
20333
  if (authenticationRecord) {
19761
20334
  saveAuthenticationRecord(cachePath, authenticationRecord);
19762
20335
  }
19763
- (_a = tasks.interactiveAuthentication) == null ? void 0 : _a.complete({
20336
+ (_a2 = tasks.interactiveAuthentication) == null ? void 0 : _a2.complete({
19764
20337
  message: "You have successfully signed in."
19765
20338
  });
19766
20339
  telemetryClient.rootSpan.addEvent("SYNC_AUTH", {
@@ -19775,300 +20348,300 @@ export {
19775
20348
  };
19776
20349
  /*! Bundled license information:
19777
20350
 
19778
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/serializer/Serializer.mjs:
19779
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20351
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs:
20352
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19780
20353
 
19781
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/Constants.mjs:
19782
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20354
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs:
20355
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19783
20356
 
19784
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/AuthErrorCodes.mjs:
19785
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20357
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs:
20358
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19786
20359
 
19787
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/AuthError.mjs:
19788
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20360
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs:
20361
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19789
20362
 
19790
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientAuthErrorCodes.mjs:
19791
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20363
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs:
20364
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19792
20365
 
19793
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientAuthError.mjs:
19794
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20366
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs:
20367
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19795
20368
 
19796
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/AuthToken.mjs:
19797
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20369
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs:
20370
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19798
20371
 
19799
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityType.mjs:
19800
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20372
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs:
20373
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19801
20374
 
19802
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/OpenIdConfigResponse.mjs:
19803
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20375
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs:
20376
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19804
20377
 
19805
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientConfigurationErrorCodes.mjs:
19806
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20378
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs:
20379
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19807
20380
 
19808
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ClientConfigurationError.mjs:
19809
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20381
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs:
20382
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19810
20383
 
19811
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/StringUtils.mjs:
19812
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20384
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs:
20385
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19813
20386
 
19814
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/UrlUtils.mjs:
19815
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20387
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs:
20388
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19816
20389
 
19817
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/url/UrlString.mjs:
19818
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20390
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs:
20391
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19819
20392
 
19820
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityMetadata.mjs:
19821
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20393
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs:
20394
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19822
20395
 
19823
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/ProtocolMode.mjs:
19824
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20396
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs:
20397
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19825
20398
 
19826
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityOptions.mjs:
19827
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20399
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs:
20400
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19828
20401
 
19829
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/CloudInstanceDiscoveryResponse.mjs:
19830
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20402
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs:
20403
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19831
20404
 
19832
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs:
19833
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20405
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs:
20406
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19834
20407
 
19835
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/telemetry/performance/PerformanceEvent.mjs:
19836
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20408
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs:
20409
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19837
20410
 
19838
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/FunctionWrappers.mjs:
19839
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20411
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs:
20412
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19840
20413
 
19841
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/RegionDiscovery.mjs:
19842
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20414
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs:
20415
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19843
20416
 
19844
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/TimeUtils.mjs:
19845
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20417
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs:
20418
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19846
20419
 
19847
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/utils/CacheHelpers.mjs:
19848
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20420
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs:
20421
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19849
20422
 
19850
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/Authority.mjs:
19851
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20423
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs:
20424
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19852
20425
 
19853
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/authority/AuthorityFactory.mjs:
19854
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20426
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs:
20427
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19855
20428
 
19856
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/ClientAssertionUtils.mjs:
19857
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20429
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs:
20430
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19858
20431
 
19859
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/constants/AADServerParamKeys.mjs:
19860
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20432
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs:
20433
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19861
20434
 
19862
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/crypto/ICrypto.mjs:
19863
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20435
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs:
20436
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19864
20437
 
19865
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/logger/Logger.mjs:
19866
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20438
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs:
20439
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19867
20440
 
19868
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/packageMetadata.mjs:
19869
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20441
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs:
20442
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19870
20443
 
19871
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/ScopeSet.mjs:
19872
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20444
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs:
20445
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19873
20446
 
19874
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/ClientInfo.mjs:
19875
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20447
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs:
20448
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19876
20449
 
19877
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/AccountInfo.mjs:
19878
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20450
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs:
20451
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19879
20452
 
19880
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/TokenClaims.mjs:
19881
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20453
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs:
20454
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19882
20455
 
19883
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/entities/AccountEntity.mjs:
19884
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20456
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs:
20457
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19885
20458
 
19886
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/CacheErrorCodes.mjs:
19887
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20459
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs:
20460
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19888
20461
 
19889
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/CacheError.mjs:
19890
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20462
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs:
20463
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19891
20464
 
19892
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/CacheManager.mjs:
19893
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20465
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs:
20466
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19894
20467
 
19895
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/config/ClientConfiguration.mjs:
19896
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20468
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs:
20469
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19897
20470
 
19898
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/ServerError.mjs:
19899
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20471
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs:
20472
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19900
20473
 
19901
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/network/ThrottlingUtils.mjs:
19902
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20474
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs:
20475
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19903
20476
 
19904
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/network/NetworkManager.mjs:
19905
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20477
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs:
20478
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19906
20479
 
19907
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/account/CcsCredential.mjs:
19908
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20480
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs:
20481
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19909
20482
 
19910
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/RequestValidator.mjs:
19911
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20483
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs:
20484
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19912
20485
 
19913
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/request/RequestParameterBuilder.mjs:
19914
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20486
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs:
20487
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19915
20488
 
19916
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/BaseClient.mjs:
19917
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20489
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs:
20490
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19918
20491
 
19919
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/InteractionRequiredAuthErrorCodes.mjs:
19920
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20492
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs:
20493
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19921
20494
 
19922
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/error/InteractionRequiredAuthError.mjs:
19923
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20495
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs:
20496
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19924
20497
 
19925
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/entities/CacheRecord.mjs:
19926
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20498
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs:
20499
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19927
20500
 
19928
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/utils/ProtocolUtils.mjs:
19929
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20501
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs:
20502
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19930
20503
 
19931
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/crypto/PopTokenGenerator.mjs:
19932
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20504
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs:
20505
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19933
20506
 
19934
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/cache/persistence/TokenCacheContext.mjs:
19935
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20507
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs:
20508
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19936
20509
 
19937
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/response/ResponseHandler.mjs:
19938
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20510
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs:
20511
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19939
20512
 
19940
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/AuthorizationCodeClient.mjs:
19941
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20513
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs:
20514
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19942
20515
 
19943
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/RefreshTokenClient.mjs:
19944
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20516
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs:
20517
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19945
20518
 
19946
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/client/SilentFlowClient.mjs:
19947
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20519
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs:
20520
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19948
20521
 
19949
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/telemetry/server/ServerTelemetryManager.mjs:
19950
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20522
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs:
20523
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19951
20524
 
19952
- .store/@azure-msal-common-npm-14.11.0-5050b5d49a/package/dist/index.mjs:
19953
- (*! @azure/msal-common v14.11.0 2024-06-04 *)
20525
+ .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs:
20526
+ (*! @azure/msal-common v14.12.0 2024-06-10 *)
19954
20527
 
19955
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/serializer/Deserializer.mjs:
19956
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20528
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs:
20529
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19957
20530
 
19958
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/internals.mjs:
19959
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20531
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs:
20532
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19960
20533
 
19961
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/Constants.mjs:
19962
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20534
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs:
20535
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19963
20536
 
19964
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/NetworkUtils.mjs:
19965
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20537
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs:
20538
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19966
20539
 
19967
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/HttpClient.mjs:
19968
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20540
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs:
20541
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19969
20542
 
19970
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/ManagedIdentityErrorCodes.mjs:
19971
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20543
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs:
20544
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19972
20545
 
19973
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/ManagedIdentityError.mjs:
19974
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20546
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs:
20547
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19975
20548
 
19976
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/ManagedIdentityId.mjs:
19977
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20549
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs:
20550
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19978
20551
 
19979
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/retry/LinearRetryPolicy.mjs:
19980
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20552
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs:
20553
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19981
20554
 
19982
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/HttpClientWithRetries.mjs:
19983
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20555
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs:
20556
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19984
20557
 
19985
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/Configuration.mjs:
19986
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20558
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs:
20559
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19987
20560
 
19988
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/GuidGenerator.mjs:
19989
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20561
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs:
20562
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19990
20563
 
19991
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/utils/EncodingUtils.mjs:
19992
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20564
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs:
20565
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19993
20566
 
19994
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/HashUtils.mjs:
19995
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20567
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs:
20568
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19996
20569
 
19997
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/PkceGenerator.mjs:
19998
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20570
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs:
20571
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
19999
20572
 
20000
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/crypto/CryptoProvider.mjs:
20001
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20573
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs:
20574
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20002
20575
 
20003
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/NodeStorage.mjs:
20004
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20576
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs:
20577
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20005
20578
 
20006
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/TokenCache.mjs:
20007
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20579
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs:
20580
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20008
20581
 
20009
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientAssertion.mjs:
20010
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20582
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs:
20583
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20011
20584
 
20012
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/packageMetadata.mjs:
20013
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20585
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs:
20586
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20014
20587
 
20015
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/error/NodeAuthError.mjs:
20016
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20588
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs:
20589
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20017
20590
 
20018
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/UsernamePasswordClient.mjs:
20019
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20591
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs:
20592
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20020
20593
 
20021
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientApplication.mjs:
20022
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20594
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs:
20595
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20023
20596
 
20024
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/network/LoopbackClient.mjs:
20025
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20597
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs:
20598
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20026
20599
 
20027
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/DeviceCodeClient.mjs:
20028
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20600
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs:
20601
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20029
20602
 
20030
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/PublicClientApplication.mjs:
20031
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20603
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs:
20604
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20032
20605
 
20033
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ClientCredentialClient.mjs:
20034
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20606
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs:
20607
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20035
20608
 
20036
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/OnBehalfOfClient.mjs:
20037
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20609
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs:
20610
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20038
20611
 
20039
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ConfidentialClientApplication.mjs:
20040
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20612
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs:
20613
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20041
20614
 
20042
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs:
20043
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20615
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs:
20616
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20044
20617
 
20045
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/config/ManagedIdentityRequestParameters.mjs:
20046
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20618
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs:
20619
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20047
20620
 
20048
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/AppService.mjs:
20049
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20621
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs:
20622
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20050
20623
 
20051
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/AzureArc.mjs:
20052
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20624
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs:
20625
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20053
20626
 
20054
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/CloudShell.mjs:
20055
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20627
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs:
20628
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20056
20629
 
20057
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/Imds.mjs:
20058
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20630
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs:
20631
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20059
20632
 
20060
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs:
20061
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20633
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs:
20634
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20062
20635
 
20063
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentityClient.mjs:
20064
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20636
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs:
20637
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20065
20638
 
20066
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/client/ManagedIdentityApplication.mjs:
20067
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20639
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs:
20640
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20068
20641
 
20069
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/cache/distributed/DistributedCachePlugin.mjs:
20070
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20642
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs:
20643
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20071
20644
 
20072
- .store/@azure-msal-node-npm-2.9.1-c10db97e77/package/dist/index.mjs:
20073
- (*! @azure/msal-node v2.9.1 2024-06-04 *)
20645
+ .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs:
20646
+ (*! @azure/msal-node v2.9.2 2024-06-10 *)
20074
20647
  */