@ms-cloudpack/remote-cache 0.8.1 → 0.8.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,14 +6,14 @@ const __filename = topLevelUrl.fileURLToPath(import.meta.url);
6
6
  const __dirname = topLevelPath.dirname(__filename);
7
7
  import {
8
8
  require_package
9
- } from "./chunk-DSANWO7J.js";
9
+ } from "./chunk-BT2CALS2.js";
10
10
  import {
11
11
  require_commonjs as require_commonjs2,
12
12
  require_commonjs2 as require_commonjs3,
13
13
  require_commonjs3 as require_commonjs4,
14
14
  require_commonjs4 as require_commonjs5,
15
15
  require_dist
16
- } from "./chunk-D7DHZQ7L.js";
16
+ } from "./chunk-PFJSWZPM.js";
17
17
  import {
18
18
  __commonJS,
19
19
  __esm,
@@ -23,12 +23,12 @@ import {
23
23
  __toCommonJS,
24
24
  __toESM,
25
25
  require_commonjs
26
- } from "./chunk-LRFMBF43.js";
26
+ } from "./chunk-WIA37P2F.js";
27
27
 
28
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs
28
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Serializer.mjs
29
29
  var _Serializer, Serializer;
30
30
  var init_Serializer = __esm({
31
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs"() {
31
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Serializer.mjs"() {
32
32
  "use strict";
33
33
  _Serializer = class _Serializer {
34
34
  /**
@@ -169,10 +169,10 @@ var init_Serializer = __esm({
169
169
  }
170
170
  });
171
171
 
172
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs
172
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/Constants.mjs
173
173
  var Constants, HttpStatus, OIDC_DEFAULT_SCOPES, OIDC_SCOPES, HeaderNames, AADAuthorityConstants, ClaimsRequestKeys, PromptValue, CodeChallengeMethodValues, ServerResponseType, ResponseMode, GrantType, CacheAccountType, Separators, CredentialType, APP_METADATA, CLIENT_INFO, THE_FAMILY_ID, AUTHORITY_METADATA_CONSTANTS, AuthorityMetadataSource, SERVER_TELEM_CONSTANTS, AuthenticationScheme, ThrottlingConstants, Errors, PasswordGrantConstants, ResponseCodes, RegionDiscoverySources, RegionDiscoveryOutcomes, CacheOutcome, DEFAULT_TOKEN_RENEWAL_OFFSET_SEC;
174
174
  var init_Constants = __esm({
175
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs"() {
175
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/Constants.mjs"() {
176
176
  "use strict";
177
177
  Constants = {
178
178
  LIBRARY_NAME: "MSAL.JS",
@@ -215,6 +215,7 @@ var init_Constants = __esm({
215
215
  NOT_DEFINED: "not_defined",
216
216
  EMPTY_STRING: "",
217
217
  NOT_APPLICABLE: "N/A",
218
+ NOT_AVAILABLE: "Not Available",
218
219
  FORWARD_SLASH: "/",
219
220
  IMDS_ENDPOINT: "http://169.254.169.254/metadata/instance/compute/location",
220
221
  IMDS_VERSION: "2020-06-01",
@@ -404,7 +405,7 @@ var init_Constants = __esm({
404
405
  }
405
406
  });
406
407
 
407
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs
408
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthErrorCodes.mjs
408
409
  var AuthErrorCodes_exports = {};
409
410
  __export(AuthErrorCodes_exports, {
410
411
  postRequestFailed: () => postRequestFailed,
@@ -412,20 +413,20 @@ __export(AuthErrorCodes_exports, {
412
413
  });
413
414
  var unexpectedError, postRequestFailed;
414
415
  var init_AuthErrorCodes = __esm({
415
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs"() {
416
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthErrorCodes.mjs"() {
416
417
  "use strict";
417
418
  unexpectedError = "unexpected_error";
418
419
  postRequestFailed = "post_request_failed";
419
420
  }
420
421
  });
421
422
 
422
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs
423
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthError.mjs
423
424
  function createAuthError(code, additionalMessage) {
424
425
  return new AuthError(code, additionalMessage ? `${AuthErrorMessages[code]} ${additionalMessage}` : AuthErrorMessages[code]);
425
426
  }
426
427
  var AuthErrorMessages, AuthErrorMessage, _AuthError, AuthError;
427
428
  var init_AuthError = __esm({
428
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs"() {
429
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthError.mjs"() {
429
430
  "use strict";
430
431
  init_Constants();
431
432
  init_AuthErrorCodes();
@@ -463,7 +464,7 @@ var init_AuthError = __esm({
463
464
  }
464
465
  });
465
466
 
466
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs
467
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthErrorCodes.mjs
467
468
  var ClientAuthErrorCodes_exports = {};
468
469
  __export(ClientAuthErrorCodes_exports, {
469
470
  authTimeNotFound: () => authTimeNotFound,
@@ -513,7 +514,7 @@ __export(ClientAuthErrorCodes_exports, {
513
514
  });
514
515
  var clientInfoDecodingError, clientInfoEmptyError, tokenParsingError, nullOrEmptyToken, endpointResolutionError, networkError, openIdConfigError, hashNotDeserialized, invalidState, stateMismatch, stateNotFound, nonceMismatch, authTimeNotFound, maxAgeTranspired, multipleMatchingTokens, multipleMatchingAccounts, multipleMatchingAppMetadata, requestCannotBeMade, cannotRemoveEmptyScope, cannotAppendScopeSet, emptyInputScopeSet, deviceCodePollingCancelled, deviceCodeExpired, deviceCodeUnknownError, noAccountInSilentRequest, invalidCacheRecord, invalidCacheEnvironment, noAccountFound, noCryptoObject, unexpectedCredentialType, invalidAssertion, invalidClientCredential, tokenRefreshRequired, userTimeoutReached, tokenClaimsCnfRequiredForSignedJwt, authorizationCodeMissingFromServerResponse, bindingKeyNotRemoved, endSessionEndpointNotSupported, keyIdMissing, noNetworkConnectivity, userCanceled, missingTenantIdError, methodNotImplemented, nestedAppAuthBridgeDisabled;
515
516
  var init_ClientAuthErrorCodes = __esm({
516
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs"() {
517
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthErrorCodes.mjs"() {
517
518
  "use strict";
518
519
  clientInfoDecodingError = "client_info_decoding_error";
519
520
  clientInfoEmptyError = "client_info_empty_error";
@@ -562,13 +563,13 @@ var init_ClientAuthErrorCodes = __esm({
562
563
  }
563
564
  });
564
565
 
565
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs
566
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthError.mjs
566
567
  function createClientAuthError(errorCode, additionalMessage) {
567
568
  return new ClientAuthError(errorCode, additionalMessage);
568
569
  }
569
570
  var ClientAuthErrorMessages, ClientAuthErrorMessage, _ClientAuthError, ClientAuthError;
570
571
  var init_ClientAuthError = __esm({
571
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs"() {
572
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthError.mjs"() {
572
573
  "use strict";
573
574
  init_AuthError();
574
575
  init_ClientAuthErrorCodes();
@@ -805,7 +806,7 @@ var init_ClientAuthError = __esm({
805
806
  }
806
807
  });
807
808
 
808
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs
809
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AuthToken.mjs
809
810
  var AuthToken_exports = {};
810
811
  __export(AuthToken_exports, {
811
812
  checkMaxAge: () => checkMaxAge,
@@ -839,7 +840,7 @@ function checkMaxAge(authTime, maxAge) {
839
840
  }
840
841
  }
841
842
  var init_AuthToken = __esm({
842
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs"() {
843
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AuthToken.mjs"() {
843
844
  "use strict";
844
845
  init_ClientAuthError();
845
846
  init_ClientAuthErrorCodes();
@@ -849,10 +850,10 @@ var init_AuthToken = __esm({
849
850
  }
850
851
  });
851
852
 
852
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs
853
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityType.mjs
853
854
  var AuthorityType;
854
855
  var init_AuthorityType = __esm({
855
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs"() {
856
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityType.mjs"() {
856
857
  "use strict";
857
858
  AuthorityType = {
858
859
  Default: 0,
@@ -863,18 +864,18 @@ var init_AuthorityType = __esm({
863
864
  }
864
865
  });
865
866
 
866
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs
867
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/OpenIdConfigResponse.mjs
867
868
  function isOpenIdConfigResponse(response) {
868
869
  return response.hasOwnProperty("authorization_endpoint") && response.hasOwnProperty("token_endpoint") && response.hasOwnProperty("issuer") && response.hasOwnProperty("jwks_uri");
869
870
  }
870
871
  var init_OpenIdConfigResponse = __esm({
871
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs"() {
872
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/OpenIdConfigResponse.mjs"() {
872
873
  "use strict";
873
874
  __name(isOpenIdConfigResponse, "isOpenIdConfigResponse");
874
875
  }
875
876
  });
876
877
 
877
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs
878
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationErrorCodes.mjs
878
879
  var ClientConfigurationErrorCodes_exports = {};
879
880
  __export(ClientConfigurationErrorCodes_exports, {
880
881
  authorityMismatch: () => authorityMismatch,
@@ -902,7 +903,7 @@ __export(ClientConfigurationErrorCodes_exports, {
902
903
  });
903
904
  var redirectUriEmpty, claimsRequestParsingError, authorityUriInsecure, urlParseError, urlEmptyError, emptyInputScopesError, invalidPromptValue, invalidClaims, tokenRequestEmpty, logoutRequestEmpty, invalidCodeChallengeMethod, pkceParamsMissing, invalidCloudDiscoveryMetadata, invalidAuthorityMetadata, untrustedAuthority, missingSshJwk, missingSshKid, missingNonceAuthenticationHeader, invalidAuthenticationHeader, cannotSetOIDCOptions, cannotAllowNativeBroker, authorityMismatch;
904
905
  var init_ClientConfigurationErrorCodes = __esm({
905
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs"() {
906
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationErrorCodes.mjs"() {
906
907
  "use strict";
907
908
  redirectUriEmpty = "redirect_uri_empty";
908
909
  claimsRequestParsingError = "claims_request_parsing_error";
@@ -929,13 +930,13 @@ var init_ClientConfigurationErrorCodes = __esm({
929
930
  }
930
931
  });
931
932
 
932
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs
933
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationError.mjs
933
934
  function createClientConfigurationError(errorCode) {
934
935
  return new ClientConfigurationError(errorCode);
935
936
  }
936
937
  var ClientConfigurationErrorMessages, ClientConfigurationErrorMessage, _ClientConfigurationError, ClientConfigurationError;
937
938
  var init_ClientConfigurationError = __esm({
938
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs"() {
939
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationError.mjs"() {
939
940
  "use strict";
940
941
  init_AuthError();
941
942
  init_ClientConfigurationErrorCodes();
@@ -1066,10 +1067,10 @@ var init_ClientConfigurationError = __esm({
1066
1067
  }
1067
1068
  });
1068
1069
 
1069
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs
1070
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/StringUtils.mjs
1070
1071
  var _StringUtils, StringUtils;
1071
1072
  var init_StringUtils = __esm({
1072
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs"() {
1073
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/StringUtils.mjs"() {
1073
1074
  "use strict";
1074
1075
  _StringUtils = class _StringUtils {
1075
1076
  /**
@@ -1154,7 +1155,7 @@ var init_StringUtils = __esm({
1154
1155
  }
1155
1156
  });
1156
1157
 
1157
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs
1158
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/UrlUtils.mjs
1158
1159
  var UrlUtils_exports = {};
1159
1160
  __export(UrlUtils_exports, {
1160
1161
  getDeserializedResponse: () => getDeserializedResponse,
@@ -1184,7 +1185,7 @@ function getDeserializedResponse(responseString) {
1184
1185
  return null;
1185
1186
  }
1186
1187
  var init_UrlUtils = __esm({
1187
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs"() {
1188
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/UrlUtils.mjs"() {
1188
1189
  "use strict";
1189
1190
  init_ClientAuthError();
1190
1191
  init_ClientAuthErrorCodes();
@@ -1193,10 +1194,10 @@ var init_UrlUtils = __esm({
1193
1194
  }
1194
1195
  });
1195
1196
 
1196
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs
1197
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/url/UrlString.mjs
1197
1198
  var _UrlString, UrlString;
1198
1199
  var init_UrlString = __esm({
1199
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs"() {
1200
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/url/UrlString.mjs"() {
1200
1201
  "use strict";
1201
1202
  init_ClientConfigurationError();
1202
1203
  init_StringUtils();
@@ -1339,7 +1340,7 @@ var init_UrlString = __esm({
1339
1340
  }
1340
1341
  });
1341
1342
 
1342
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs
1343
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityMetadata.mjs
1343
1344
  function getAliasesFromStaticSources(staticAuthorityOptions, logger) {
1344
1345
  var _a2;
1345
1346
  let staticAliases;
@@ -1378,7 +1379,7 @@ function getCloudDiscoveryMetadataFromNetworkResponse(response, authorityHost) {
1378
1379
  }
1379
1380
  var rawMetdataJSON, EndpointMetadata, InstanceDiscoveryMetadata, InstanceDiscoveryMetadataAliases;
1380
1381
  var init_AuthorityMetadata = __esm({
1381
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs"() {
1382
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityMetadata.mjs"() {
1382
1383
  "use strict";
1383
1384
  init_UrlString();
1384
1385
  init_Constants();
@@ -1463,10 +1464,10 @@ var init_AuthorityMetadata = __esm({
1463
1464
  }
1464
1465
  });
1465
1466
 
1466
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs
1467
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/ProtocolMode.mjs
1467
1468
  var ProtocolMode;
1468
1469
  var init_ProtocolMode = __esm({
1469
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs"() {
1470
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/ProtocolMode.mjs"() {
1470
1471
  "use strict";
1471
1472
  ProtocolMode = {
1472
1473
  AAD: "AAD",
@@ -1475,10 +1476,10 @@ var init_ProtocolMode = __esm({
1475
1476
  }
1476
1477
  });
1477
1478
 
1478
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs
1479
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityOptions.mjs
1479
1480
  var AzureCloudInstance;
1480
1481
  var init_AuthorityOptions = __esm({
1481
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs"() {
1482
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityOptions.mjs"() {
1482
1483
  "use strict";
1483
1484
  AzureCloudInstance = {
1484
1485
  // AzureCloudInstance is not specified.
@@ -1497,32 +1498,32 @@ var init_AuthorityOptions = __esm({
1497
1498
  }
1498
1499
  });
1499
1500
 
1500
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs
1501
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryResponse.mjs
1501
1502
  function isCloudInstanceDiscoveryResponse(response) {
1502
1503
  return response.hasOwnProperty("tenant_discovery_endpoint") && response.hasOwnProperty("metadata");
1503
1504
  }
1504
1505
  var init_CloudInstanceDiscoveryResponse = __esm({
1505
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs"() {
1506
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryResponse.mjs"() {
1506
1507
  "use strict";
1507
1508
  __name(isCloudInstanceDiscoveryResponse, "isCloudInstanceDiscoveryResponse");
1508
1509
  }
1509
1510
  });
1510
1511
 
1511
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs
1512
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs
1512
1513
  function isCloudInstanceDiscoveryErrorResponse(response) {
1513
1514
  return response.hasOwnProperty("error") && response.hasOwnProperty("error_description");
1514
1515
  }
1515
1516
  var init_CloudInstanceDiscoveryErrorResponse = __esm({
1516
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs"() {
1517
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs"() {
1517
1518
  "use strict";
1518
1519
  __name(isCloudInstanceDiscoveryErrorResponse, "isCloudInstanceDiscoveryErrorResponse");
1519
1520
  }
1520
1521
  });
1521
1522
 
1522
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs
1523
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/performance/PerformanceEvent.mjs
1523
1524
  var PerformanceEvents, PerformanceEventAbbreviations;
1524
1525
  var init_PerformanceEvent = __esm({
1525
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs"() {
1526
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/performance/PerformanceEvent.mjs"() {
1526
1527
  "use strict";
1527
1528
  PerformanceEvents = {
1528
1529
  /**
@@ -1972,10 +1973,10 @@ var init_PerformanceEvent = __esm({
1972
1973
  }
1973
1974
  });
1974
1975
 
1975
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs
1976
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/FunctionWrappers.mjs
1976
1977
  var invoke, invokeAsync;
1977
1978
  var init_FunctionWrappers = __esm({
1978
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs"() {
1979
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/FunctionWrappers.mjs"() {
1979
1980
  "use strict";
1980
1981
  invoke = /* @__PURE__ */ __name((callback, eventName, logger, telemetryClient, correlationId) => {
1981
1982
  return (...args) => {
@@ -2038,10 +2039,10 @@ var init_FunctionWrappers = __esm({
2038
2039
  }
2039
2040
  });
2040
2041
 
2041
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs
2042
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/RegionDiscovery.mjs
2042
2043
  var _RegionDiscovery, RegionDiscovery;
2043
2044
  var init_RegionDiscovery = __esm({
2044
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs"() {
2045
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/RegionDiscovery.mjs"() {
2045
2046
  "use strict";
2046
2047
  init_Constants();
2047
2048
  init_PerformanceEvent();
@@ -2134,7 +2135,7 @@ var init_RegionDiscovery = __esm({
2134
2135
  }
2135
2136
  });
2136
2137
 
2137
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs
2138
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/TimeUtils.mjs
2138
2139
  var TimeUtils_exports = {};
2139
2140
  __export(TimeUtils_exports, {
2140
2141
  delay: () => delay,
@@ -2158,7 +2159,7 @@ function delay(t, value) {
2158
2159
  return new Promise((resolve) => setTimeout(() => resolve(value), t));
2159
2160
  }
2160
2161
  var init_TimeUtils = __esm({
2161
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs"() {
2162
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/TimeUtils.mjs"() {
2162
2163
  "use strict";
2163
2164
  __name(nowSeconds, "nowSeconds");
2164
2165
  __name(isTokenExpired, "isTokenExpired");
@@ -2167,7 +2168,7 @@ var init_TimeUtils = __esm({
2167
2168
  }
2168
2169
  });
2169
2170
 
2170
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs
2171
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/utils/CacheHelpers.mjs
2171
2172
  var CacheHelpers_exports = {};
2172
2173
  __export(CacheHelpers_exports, {
2173
2174
  createAccessTokenEntity: () => createAccessTokenEntity,
@@ -2375,7 +2376,7 @@ function isAuthorityMetadataExpired(metadata) {
2375
2376
  return metadata.expiresAt <= nowSeconds();
2376
2377
  }
2377
2378
  var init_CacheHelpers = __esm({
2378
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs"() {
2379
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/utils/CacheHelpers.mjs"() {
2379
2380
  "use strict";
2380
2381
  init_AuthToken();
2381
2382
  init_ClientAuthError();
@@ -2407,7 +2408,7 @@ var init_CacheHelpers = __esm({
2407
2408
  }
2408
2409
  });
2409
2410
 
2410
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs
2411
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/Authority.mjs
2411
2412
  function getTenantFromAuthorityString(authority) {
2412
2413
  var _a2;
2413
2414
  const authorityUrl = new UrlString(authority);
@@ -2443,7 +2444,7 @@ function buildStaticAuthorityOptions(authOptions) {
2443
2444
  }
2444
2445
  var _Authority, Authority;
2445
2446
  var init_Authority = __esm({
2446
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs"() {
2447
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/Authority.mjs"() {
2447
2448
  "use strict";
2448
2449
  init_AuthorityType();
2449
2450
  init_OpenIdConfigResponse();
@@ -3161,7 +3162,7 @@ Error Description: ${typedError.message}`);
3161
3162
  }
3162
3163
  });
3163
3164
 
3164
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs
3165
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityFactory.mjs
3165
3166
  var AuthorityFactory_exports = {};
3166
3167
  __export(AuthorityFactory_exports, {
3167
3168
  createDiscoveredInstance: () => createDiscoveredInstance
@@ -3178,7 +3179,7 @@ async function createDiscoveredInstance(authorityUri, networkClient, cacheManage
3178
3179
  }
3179
3180
  }
3180
3181
  var init_AuthorityFactory = __esm({
3181
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs"() {
3182
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityFactory.mjs"() {
3182
3183
  "use strict";
3183
3184
  init_Authority();
3184
3185
  init_ClientAuthError();
@@ -3189,7 +3190,7 @@ var init_AuthorityFactory = __esm({
3189
3190
  }
3190
3191
  });
3191
3192
 
3192
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs
3193
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ClientAssertionUtils.mjs
3193
3194
  async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
3194
3195
  if (typeof clientAssertion === "string") {
3195
3196
  return clientAssertion;
@@ -3202,13 +3203,13 @@ async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
3202
3203
  }
3203
3204
  }
3204
3205
  var init_ClientAssertionUtils = __esm({
3205
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs"() {
3206
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ClientAssertionUtils.mjs"() {
3206
3207
  "use strict";
3207
3208
  __name(getClientAssertion, "getClientAssertion");
3208
3209
  }
3209
3210
  });
3210
3211
 
3211
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs
3212
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/constants/AADServerParamKeys.mjs
3212
3213
  var AADServerParamKeys_exports = {};
3213
3214
  __export(AADServerParamKeys_exports, {
3214
3215
  ACCESS_TOKEN: () => ACCESS_TOKEN,
@@ -3266,7 +3267,7 @@ __export(AADServerParamKeys_exports, {
3266
3267
  });
3267
3268
  var CLIENT_ID, REDIRECT_URI, RESPONSE_TYPE, RESPONSE_MODE, GRANT_TYPE, CLAIMS, SCOPE, ERROR, ERROR_DESCRIPTION, ACCESS_TOKEN, ID_TOKEN, REFRESH_TOKEN, EXPIRES_IN, REFRESH_TOKEN_EXPIRES_IN, STATE, NONCE, PROMPT, SESSION_STATE, CLIENT_INFO2, CODE, CODE_CHALLENGE, CODE_CHALLENGE_METHOD, CODE_VERIFIER, CLIENT_REQUEST_ID, X_CLIENT_SKU, X_CLIENT_VER, X_CLIENT_OS, X_CLIENT_CPU, X_CLIENT_CURR_TELEM, X_CLIENT_LAST_TELEM, X_MS_LIB_CAPABILITY, X_APP_NAME, X_APP_VER, POST_LOGOUT_URI, ID_TOKEN_HINT, DEVICE_CODE, CLIENT_SECRET, CLIENT_ASSERTION, CLIENT_ASSERTION_TYPE, TOKEN_TYPE, REQ_CNF, OBO_ASSERTION, REQUESTED_TOKEN_USE, ON_BEHALF_OF, FOCI, CCS_HEADER, RETURN_SPA_CODE, NATIVE_BROKER, LOGOUT_HINT, SID, LOGIN_HINT, DOMAIN_HINT;
3268
3269
  var init_AADServerParamKeys = __esm({
3269
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs"() {
3270
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/constants/AADServerParamKeys.mjs"() {
3270
3271
  "use strict";
3271
3272
  CLIENT_ID = "client_id";
3272
3273
  REDIRECT_URI = "redirect_uri";
@@ -3323,10 +3324,10 @@ var init_AADServerParamKeys = __esm({
3323
3324
  }
3324
3325
  });
3325
3326
 
3326
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs
3327
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/ICrypto.mjs
3327
3328
  var DEFAULT_CRYPTO_IMPLEMENTATION;
3328
3329
  var init_ICrypto = __esm({
3329
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs"() {
3330
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/ICrypto.mjs"() {
3330
3331
  "use strict";
3331
3332
  init_ClientAuthError();
3332
3333
  init_ClientAuthErrorCodes();
@@ -3365,10 +3366,10 @@ var init_ICrypto = __esm({
3365
3366
  }
3366
3367
  });
3367
3368
 
3368
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs
3369
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/logger/Logger.mjs
3369
3370
  var LogLevel, _Logger, Logger;
3370
3371
  var init_Logger = __esm({
3371
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs"() {
3372
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/logger/Logger.mjs"() {
3372
3373
  "use strict";
3373
3374
  init_Constants();
3374
3375
  (function(LogLevel2) {
@@ -3543,20 +3544,20 @@ var init_Logger = __esm({
3543
3544
  }
3544
3545
  });
3545
3546
 
3546
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs
3547
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/packageMetadata.mjs
3547
3548
  var name, version;
3548
3549
  var init_packageMetadata = __esm({
3549
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs"() {
3550
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/packageMetadata.mjs"() {
3550
3551
  "use strict";
3551
3552
  name = "@azure/msal-common";
3552
- version = "14.12.0";
3553
+ version = "14.13.0";
3553
3554
  }
3554
3555
  });
3555
3556
 
3556
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs
3557
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/ScopeSet.mjs
3557
3558
  var _ScopeSet, ScopeSet;
3558
3559
  var init_ScopeSet = __esm({
3559
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs"() {
3560
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/ScopeSet.mjs"() {
3560
3561
  "use strict";
3561
3562
  init_ClientConfigurationError();
3562
3563
  init_StringUtils();
@@ -3743,7 +3744,7 @@ var init_ScopeSet = __esm({
3743
3744
  }
3744
3745
  });
3745
3746
 
3746
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs
3747
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/ClientInfo.mjs
3747
3748
  function buildClientInfo(rawClientInfo, base64Decode) {
3748
3749
  if (!rawClientInfo) {
3749
3750
  throw createClientAuthError(clientInfoEmptyError);
@@ -3766,7 +3767,7 @@ function buildClientInfoFromHomeAccountId(homeAccountId) {
3766
3767
  };
3767
3768
  }
3768
3769
  var init_ClientInfo = __esm({
3769
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs"() {
3770
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/ClientInfo.mjs"() {
3770
3771
  "use strict";
3771
3772
  init_ClientAuthError();
3772
3773
  init_Constants();
@@ -3776,7 +3777,7 @@ var init_ClientInfo = __esm({
3776
3777
  }
3777
3778
  });
3778
3779
 
3779
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs
3780
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AccountInfo.mjs
3780
3781
  function tenantIdMatchesHomeTenant(tenantId, homeAccountId) {
3781
3782
  return !!tenantId && !!homeAccountId && tenantId === homeAccountId.split(".")[1];
3782
3783
  }
@@ -3809,7 +3810,7 @@ function updateAccountTenantProfileData(baseAccountInfo, tenantProfile, idTokenC
3809
3810
  return updatedAccountInfo;
3810
3811
  }
3811
3812
  var init_AccountInfo = __esm({
3812
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs"() {
3813
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AccountInfo.mjs"() {
3813
3814
  "use strict";
3814
3815
  __name(tenantIdMatchesHomeTenant, "tenantIdMatchesHomeTenant");
3815
3816
  __name(buildTenantProfileFromIdTokenClaims, "buildTenantProfileFromIdTokenClaims");
@@ -3817,7 +3818,7 @@ var init_AccountInfo = __esm({
3817
3818
  }
3818
3819
  });
3819
3820
 
3820
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs
3821
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/TokenClaims.mjs
3821
3822
  function getTenantIdFromIdTokenClaims(idTokenClaims) {
3822
3823
  if (idTokenClaims) {
3823
3824
  const tenantId = idTokenClaims.tid || idTokenClaims.tfp || idTokenClaims.acr;
@@ -3826,16 +3827,16 @@ function getTenantIdFromIdTokenClaims(idTokenClaims) {
3826
3827
  return null;
3827
3828
  }
3828
3829
  var init_TokenClaims = __esm({
3829
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs"() {
3830
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/TokenClaims.mjs"() {
3830
3831
  "use strict";
3831
3832
  __name(getTenantIdFromIdTokenClaims, "getTenantIdFromIdTokenClaims");
3832
3833
  }
3833
3834
  });
3834
3835
 
3835
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs
3836
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/entities/AccountEntity.mjs
3836
3837
  var _AccountEntity, AccountEntity;
3837
3838
  var init_AccountEntity = __esm({
3838
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs"() {
3839
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/entities/AccountEntity.mjs"() {
3839
3840
  "use strict";
3840
3841
  init_Constants();
3841
3842
  init_ClientInfo();
@@ -3908,6 +3909,7 @@ var init_AccountEntity = __esm({
3908
3909
  * @param accountDetails
3909
3910
  */
3910
3911
  static createAccount(accountDetails, authority, base64Decode) {
3912
+ var _a2, _b2, _c, _d, _e, _f;
3911
3913
  const account = new _AccountEntity();
3912
3914
  if (authority.authorityType === AuthorityType.Adfs) {
3913
3915
  account.authorityType = CacheAccountType.ADFS_ACCOUNT_TYPE;
@@ -3929,11 +3931,11 @@ var init_AccountEntity = __esm({
3929
3931
  }
3930
3932
  account.environment = env;
3931
3933
  account.realm = (clientInfo == null ? void 0 : clientInfo.utid) || getTenantIdFromIdTokenClaims(accountDetails.idTokenClaims) || "";
3932
- account.localAccountId = (clientInfo == null ? void 0 : clientInfo.uid) || accountDetails.idTokenClaims.oid || accountDetails.idTokenClaims.sub || "";
3933
- const preferredUsername = accountDetails.idTokenClaims.preferred_username || accountDetails.idTokenClaims.upn;
3934
- const email = accountDetails.idTokenClaims.emails ? accountDetails.idTokenClaims.emails[0] : null;
3934
+ account.localAccountId = (clientInfo == null ? void 0 : clientInfo.uid) || ((_a2 = accountDetails.idTokenClaims) == null ? void 0 : _a2.oid) || ((_b2 = accountDetails.idTokenClaims) == null ? void 0 : _b2.sub) || "";
3935
+ const preferredUsername = ((_c = accountDetails.idTokenClaims) == null ? void 0 : _c.preferred_username) || ((_d = accountDetails.idTokenClaims) == null ? void 0 : _d.upn);
3936
+ const email = ((_e = accountDetails.idTokenClaims) == null ? void 0 : _e.emails) ? accountDetails.idTokenClaims.emails[0] : null;
3935
3937
  account.username = preferredUsername || email || "";
3936
- account.name = accountDetails.idTokenClaims.name;
3938
+ account.name = ((_f = accountDetails.idTokenClaims) == null ? void 0 : _f.name) || "";
3937
3939
  account.cloudGraphHostName = accountDetails.cloudGraphHostName;
3938
3940
  account.msGraphHost = accountDetails.msGraphHost;
3939
3941
  if (accountDetails.tenantProfiles) {
@@ -4025,20 +4027,20 @@ var init_AccountEntity = __esm({
4025
4027
  }
4026
4028
  });
4027
4029
 
4028
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs
4030
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheErrorCodes.mjs
4029
4031
  var cacheQuotaExceededErrorCode, cacheUnknownErrorCode;
4030
4032
  var init_CacheErrorCodes = __esm({
4031
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs"() {
4033
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheErrorCodes.mjs"() {
4032
4034
  "use strict";
4033
4035
  cacheQuotaExceededErrorCode = "cache_quota_exceeded";
4034
4036
  cacheUnknownErrorCode = "cache_error_unknown";
4035
4037
  }
4036
4038
  });
4037
4039
 
4038
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs
4040
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheError.mjs
4039
4041
  var CacheErrorMessages, _CacheError, CacheError;
4040
4042
  var init_CacheError = __esm({
4041
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs"() {
4043
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheError.mjs"() {
4042
4044
  "use strict";
4043
4045
  init_CacheErrorCodes();
4044
4046
  CacheErrorMessages = {
@@ -4060,10 +4062,10 @@ var init_CacheError = __esm({
4060
4062
  }
4061
4063
  });
4062
4064
 
4063
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs
4065
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/CacheManager.mjs
4064
4066
  var _CacheManager, CacheManager, _DefaultStorageClass, DefaultStorageClass;
4065
4067
  var init_CacheManager = __esm({
4066
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs"() {
4068
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/CacheManager.mjs"() {
4067
4069
  "use strict";
4068
4070
  init_Constants();
4069
4071
  init_CacheHelpers();
@@ -5189,7 +5191,7 @@ var init_CacheManager = __esm({
5189
5191
  }
5190
5192
  });
5191
5193
 
5192
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs
5194
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/config/ClientConfiguration.mjs
5193
5195
  function buildClientConfiguration({ authOptions: userAuthOptions, systemOptions: userSystemOptions, loggerOptions: userLoggerOption, cacheOptions: userCacheOptions, storageInterface: storageImplementation, networkInterface: networkImplementation, cryptoInterface: cryptoImplementation, clientCredentials, libraryInfo, telemetry, serverTelemetryManager, persistencePlugin, serializableCache }) {
5194
5196
  const loggerOptions = {
5195
5197
  ...DEFAULT_LOGGER_IMPLEMENTATION,
@@ -5224,7 +5226,7 @@ function isOidcProtocolMode(config) {
5224
5226
  }
5225
5227
  var DEFAULT_SYSTEM_OPTIONS, DEFAULT_LOGGER_IMPLEMENTATION, DEFAULT_CACHE_OPTIONS, DEFAULT_NETWORK_IMPLEMENTATION, DEFAULT_LIBRARY_INFO, DEFAULT_CLIENT_CREDENTIALS, DEFAULT_AZURE_CLOUD_OPTIONS, DEFAULT_TELEMETRY_OPTIONS;
5226
5228
  var init_ClientConfiguration = __esm({
5227
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs"() {
5229
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/config/ClientConfiguration.mjs"() {
5228
5230
  "use strict";
5229
5231
  init_ICrypto();
5230
5232
  init_Logger();
@@ -5283,17 +5285,18 @@ var init_ClientConfiguration = __esm({
5283
5285
  }
5284
5286
  });
5285
5287
 
5286
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs
5288
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ServerError.mjs
5287
5289
  var _ServerError, ServerError;
5288
5290
  var init_ServerError = __esm({
5289
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs"() {
5291
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ServerError.mjs"() {
5290
5292
  "use strict";
5291
5293
  init_AuthError();
5292
5294
  _ServerError = class _ServerError extends AuthError {
5293
- constructor(errorCode, errorMessage, subError, errorNo) {
5295
+ constructor(errorCode, errorMessage, subError, errorNo, status) {
5294
5296
  super(errorCode, errorMessage, subError);
5295
5297
  this.name = "ServerError";
5296
5298
  this.errorNo = errorNo;
5299
+ this.status = status;
5297
5300
  Object.setPrototypeOf(this, _ServerError.prototype);
5298
5301
  }
5299
5302
  };
@@ -5302,10 +5305,10 @@ var init_ServerError = __esm({
5302
5305
  }
5303
5306
  });
5304
5307
 
5305
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs
5308
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/ThrottlingUtils.mjs
5306
5309
  var _ThrottlingUtils, ThrottlingUtils;
5307
5310
  var init_ThrottlingUtils = __esm({
5308
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs"() {
5311
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/ThrottlingUtils.mjs"() {
5309
5312
  "use strict";
5310
5313
  init_Constants();
5311
5314
  init_ServerError();
@@ -5400,10 +5403,10 @@ var init_ThrottlingUtils = __esm({
5400
5403
  }
5401
5404
  });
5402
5405
 
5403
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs
5406
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/NetworkManager.mjs
5404
5407
  var _NetworkManager, NetworkManager;
5405
5408
  var init_NetworkManager = __esm({
5406
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs"() {
5409
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/NetworkManager.mjs"() {
5407
5410
  "use strict";
5408
5411
  init_ThrottlingUtils();
5409
5412
  init_AuthError();
@@ -5441,10 +5444,10 @@ var init_NetworkManager = __esm({
5441
5444
  }
5442
5445
  });
5443
5446
 
5444
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs
5447
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/CcsCredential.mjs
5445
5448
  var CcsCredentialType;
5446
5449
  var init_CcsCredential = __esm({
5447
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs"() {
5450
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/CcsCredential.mjs"() {
5448
5451
  "use strict";
5449
5452
  CcsCredentialType = {
5450
5453
  HOME_ACCOUNT_ID: "home_account_id",
@@ -5453,10 +5456,10 @@ var init_CcsCredential = __esm({
5453
5456
  }
5454
5457
  });
5455
5458
 
5456
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs
5459
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestValidator.mjs
5457
5460
  var _RequestValidator, RequestValidator;
5458
5461
  var init_RequestValidator = __esm({
5459
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs"() {
5462
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestValidator.mjs"() {
5460
5463
  "use strict";
5461
5464
  init_ClientConfigurationError();
5462
5465
  init_Constants();
@@ -5515,31 +5518,16 @@ var init_RequestValidator = __esm({
5515
5518
  throw createClientConfigurationError(invalidCodeChallengeMethod);
5516
5519
  }
5517
5520
  }
5518
- /**
5519
- * Removes unnecessary, duplicate, and empty string query parameters from extraQueryParameters
5520
- * @param request
5521
- */
5522
- static sanitizeEQParams(eQParams, queryParams) {
5523
- if (!eQParams) {
5524
- return {};
5525
- }
5526
- queryParams.forEach((_value, key) => {
5527
- if (eQParams[key]) {
5528
- delete eQParams[key];
5529
- }
5530
- });
5531
- return Object.fromEntries(Object.entries(eQParams).filter((kv) => kv[1] !== ""));
5532
- }
5533
5521
  };
5534
5522
  __name(_RequestValidator, "RequestValidator");
5535
5523
  RequestValidator = _RequestValidator;
5536
5524
  }
5537
5525
  });
5538
5526
 
5539
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs
5527
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestParameterBuilder.mjs
5540
5528
  var _RequestParameterBuilder, RequestParameterBuilder;
5541
5529
  var init_RequestParameterBuilder = __esm({
5542
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs"() {
5530
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestParameterBuilder.mjs"() {
5543
5531
  "use strict";
5544
5532
  init_Constants();
5545
5533
  init_AADServerParamKeys();
@@ -5821,9 +5809,10 @@ var init_RequestParameterBuilder = __esm({
5821
5809
  * @param eQParams
5822
5810
  */
5823
5811
  addExtraQueryParameters(eQParams) {
5824
- const sanitizedEQParams = RequestValidator.sanitizeEQParams(eQParams, this.parameters);
5825
- Object.keys(sanitizedEQParams).forEach((key) => {
5826
- this.parameters.set(key, eQParams[key]);
5812
+ Object.entries(eQParams).forEach(([key, value]) => {
5813
+ if (!this.parameters.has(key) && value) {
5814
+ this.parameters.set(key, value);
5815
+ }
5827
5816
  });
5828
5817
  }
5829
5818
  addClientCapabilitiesToClaims(claims, clientCapabilities) {
@@ -5916,10 +5905,10 @@ var init_RequestParameterBuilder = __esm({
5916
5905
  }
5917
5906
  });
5918
5907
 
5919
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs
5908
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/BaseClient.mjs
5920
5909
  var _BaseClient, BaseClient;
5921
5910
  var init_BaseClient = __esm({
5922
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs"() {
5911
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/BaseClient.mjs"() {
5923
5912
  "use strict";
5924
5913
  init_ClientConfiguration();
5925
5914
  init_NetworkManager();
@@ -6016,7 +6005,7 @@ var init_BaseClient = __esm({
6016
6005
  }
6017
6006
  });
6018
6007
 
6019
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs
6008
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthErrorCodes.mjs
6020
6009
  var InteractionRequiredAuthErrorCodes_exports = {};
6021
6010
  __export(InteractionRequiredAuthErrorCodes_exports, {
6022
6011
  badToken: () => badToken,
@@ -6029,7 +6018,7 @@ __export(InteractionRequiredAuthErrorCodes_exports, {
6029
6018
  });
6030
6019
  var noTokensFound, nativeAccountUnavailable, refreshTokenExpired, interactionRequired, consentRequired, loginRequired, badToken;
6031
6020
  var init_InteractionRequiredAuthErrorCodes = __esm({
6032
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs"() {
6021
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthErrorCodes.mjs"() {
6033
6022
  "use strict";
6034
6023
  noTokensFound = "no_tokens_found";
6035
6024
  nativeAccountUnavailable = "native_account_unavailable";
@@ -6041,7 +6030,7 @@ var init_InteractionRequiredAuthErrorCodes = __esm({
6041
6030
  }
6042
6031
  });
6043
6032
 
6044
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs
6033
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthError.mjs
6045
6034
  function isInteractionRequiredError(errorCode, errorString, subError) {
6046
6035
  const isInteractionRequiredErrorCode = !!errorCode && InteractionRequiredServerErrorMessage.indexOf(errorCode) > -1;
6047
6036
  const isInteractionRequiredSubError = !!subError && InteractionRequiredAuthSubErrorMessage.indexOf(subError) > -1;
@@ -6055,7 +6044,7 @@ function createInteractionRequiredAuthError(errorCode) {
6055
6044
  }
6056
6045
  var InteractionRequiredServerErrorMessage, InteractionRequiredAuthSubErrorMessage, InteractionRequiredAuthErrorMessages, InteractionRequiredAuthErrorMessage, _InteractionRequiredAuthError, InteractionRequiredAuthError;
6057
6046
  var init_InteractionRequiredAuthError = __esm({
6058
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs"() {
6047
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthError.mjs"() {
6059
6048
  "use strict";
6060
6049
  init_Constants();
6061
6050
  init_AuthError();
@@ -6113,29 +6102,10 @@ var init_InteractionRequiredAuthError = __esm({
6113
6102
  }
6114
6103
  });
6115
6104
 
6116
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs
6117
- var _CacheRecord, CacheRecord;
6118
- var init_CacheRecord = __esm({
6119
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs"() {
6120
- "use strict";
6121
- _CacheRecord = class _CacheRecord {
6122
- constructor(accountEntity, idTokenEntity, accessTokenEntity, refreshTokenEntity, appMetadataEntity) {
6123
- this.account = accountEntity || null;
6124
- this.idToken = idTokenEntity || null;
6125
- this.accessToken = accessTokenEntity || null;
6126
- this.refreshToken = refreshTokenEntity || null;
6127
- this.appMetadata = appMetadataEntity || null;
6128
- }
6129
- };
6130
- __name(_CacheRecord, "CacheRecord");
6131
- CacheRecord = _CacheRecord;
6132
- }
6133
- });
6134
-
6135
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs
6105
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ProtocolUtils.mjs
6136
6106
  var _ProtocolUtils, ProtocolUtils;
6137
6107
  var init_ProtocolUtils = __esm({
6138
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs"() {
6108
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ProtocolUtils.mjs"() {
6139
6109
  "use strict";
6140
6110
  init_Constants();
6141
6111
  init_ClientAuthError();
@@ -6200,10 +6170,10 @@ var init_ProtocolUtils = __esm({
6200
6170
  }
6201
6171
  });
6202
6172
 
6203
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs
6173
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/PopTokenGenerator.mjs
6204
6174
  var KeyLocation, _PopTokenGenerator, PopTokenGenerator;
6205
6175
  var init_PopTokenGenerator = __esm({
6206
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs"() {
6176
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/PopTokenGenerator.mjs"() {
6207
6177
  "use strict";
6208
6178
  init_TimeUtils();
6209
6179
  init_UrlString();
@@ -6287,10 +6257,10 @@ var init_PopTokenGenerator = __esm({
6287
6257
  }
6288
6258
  });
6289
6259
 
6290
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs
6260
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/persistence/TokenCacheContext.mjs
6291
6261
  var _TokenCacheContext, TokenCacheContext;
6292
6262
  var init_TokenCacheContext = __esm({
6293
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs"() {
6263
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/persistence/TokenCacheContext.mjs"() {
6294
6264
  "use strict";
6295
6265
  _TokenCacheContext = class _TokenCacheContext {
6296
6266
  constructor(tokenCache, hasChanged) {
@@ -6315,14 +6285,14 @@ var init_TokenCacheContext = __esm({
6315
6285
  }
6316
6286
  });
6317
6287
 
6318
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs
6288
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/response/ResponseHandler.mjs
6319
6289
  function parseServerErrorNo(serverResponse) {
6320
6290
  var _a2, _b2;
6321
6291
  const errorCodePrefix = "code=";
6322
6292
  const errorCodePrefixIndex = (_a2 = serverResponse.error_uri) == null ? void 0 : _a2.lastIndexOf(errorCodePrefix);
6323
6293
  return errorCodePrefixIndex && errorCodePrefixIndex >= 0 ? (_b2 = serverResponse.error_uri) == null ? void 0 : _b2.substring(errorCodePrefixIndex + errorCodePrefix.length) : void 0;
6324
6294
  }
6325
- function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClaims, base64Decode, clientInfo, environment, claimsTenantId, authCodePayload, nativeAccountId, logger) {
6295
+ function buildAccountToCache(cacheStorage, authority, homeAccountId, base64Decode, idTokenClaims, clientInfo, environment, claimsTenantId, authCodePayload, nativeAccountId, logger) {
6326
6296
  logger == null ? void 0 : logger.verbose("setCachedAccount called");
6327
6297
  const accountKeys = cacheStorage.getAccountKeys();
6328
6298
  const baseAccountKey = accountKeys.find((accountKey) => {
@@ -6342,7 +6312,7 @@ function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClai
6342
6312
  nativeAccountId
6343
6313
  }, authority, base64Decode);
6344
6314
  const tenantProfiles = baseAccount.tenantProfiles || [];
6345
- if (claimsTenantId && !tenantProfiles.find((tenantProfile) => {
6315
+ if (claimsTenantId && idTokenClaims && !tenantProfiles.find((tenantProfile) => {
6346
6316
  return tenantProfile.tenantId === claimsTenantId;
6347
6317
  })) {
6348
6318
  const newTenantProfile = buildTenantProfileFromIdTokenClaims(homeAccountId, idTokenClaims);
@@ -6353,14 +6323,13 @@ function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClai
6353
6323
  }
6354
6324
  var _ResponseHandler, ResponseHandler;
6355
6325
  var init_ResponseHandler = __esm({
6356
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs"() {
6326
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/response/ResponseHandler.mjs"() {
6357
6327
  "use strict";
6358
6328
  init_ClientAuthError();
6359
6329
  init_ServerError();
6360
6330
  init_ScopeSet();
6361
6331
  init_AccountEntity();
6362
6332
  init_InteractionRequiredAuthError();
6363
- init_CacheRecord();
6364
6333
  init_ProtocolUtils();
6365
6334
  init_Constants();
6366
6335
  init_PopTokenGenerator();
@@ -6423,9 +6392,9 @@ var init_ResponseHandler = __esm({
6423
6392
  validateTokenResponse(serverResponse, refreshAccessToken) {
6424
6393
  var _a2;
6425
6394
  if (serverResponse.error || serverResponse.error_description || serverResponse.suberror) {
6426
- const errString = `${serverResponse.error_codes} - [${serverResponse.timestamp}]: ${serverResponse.error_description} - Correlation ID: ${serverResponse.correlation_id} - Trace ID: ${serverResponse.trace_id}`;
6395
+ const errString = `Error(s): ${serverResponse.error_codes || Constants.NOT_AVAILABLE} - Timestamp: ${serverResponse.timestamp || Constants.NOT_AVAILABLE} - Description: ${serverResponse.error_description || Constants.NOT_AVAILABLE} - Correlation ID: ${serverResponse.correlation_id || Constants.NOT_AVAILABLE} - Trace ID: ${serverResponse.trace_id || Constants.NOT_AVAILABLE}`;
6427
6396
  const serverErrorNo = ((_a2 = serverResponse.error_codes) == null ? void 0 : _a2.length) ? serverResponse.error_codes[0] : void 0;
6428
- const serverError = new ServerError(serverResponse.error, errString, serverResponse.suberror, serverErrorNo);
6397
+ const serverError = new ServerError(serverResponse.error, errString, serverResponse.suberror, serverErrorNo, serverResponse.status);
6429
6398
  if (refreshAccessToken && serverResponse.status && serverResponse.status >= HttpStatus.SERVER_ERROR_RANGE_START && serverResponse.status <= HttpStatus.SERVER_ERROR_RANGE_END) {
6430
6399
  this.logger.warning(`executeTokenRequest:validateTokenResponse - AAD is currently unavailable and the access token is unable to be refreshed.
6431
6400
  ${serverError}`);
@@ -6516,8 +6485,8 @@ ${serverError}`);
6516
6485
  this.cacheStorage,
6517
6486
  authority,
6518
6487
  this.homeAccountIdentifier,
6519
- idTokenClaims,
6520
6488
  this.cryptoObj.base64Decode,
6489
+ idTokenClaims,
6521
6490
  serverTokenResponse.client_info,
6522
6491
  env,
6523
6492
  claimsTenantId,
@@ -6555,7 +6524,13 @@ ${serverError}`);
6555
6524
  familyId: serverTokenResponse.foci
6556
6525
  };
6557
6526
  }
6558
- return new CacheRecord(cachedAccount, cachedIdToken, cachedAccessToken, cachedRefreshToken, cachedAppMetadata);
6527
+ return {
6528
+ account: cachedAccount,
6529
+ idToken: cachedIdToken,
6530
+ accessToken: cachedAccessToken,
6531
+ refreshToken: cachedRefreshToken,
6532
+ appMetadata: cachedAppMetadata
6533
+ };
6559
6534
  }
6560
6535
  /**
6561
6536
  * Creates an @AuthenticationResult from @CacheRecord , @IdToken , and a boolean that states whether or not the result is from cache.
@@ -6639,10 +6614,10 @@ ${serverError}`);
6639
6614
  }
6640
6615
  });
6641
6616
 
6642
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs
6617
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/AuthorizationCodeClient.mjs
6643
6618
  var _AuthorizationCodeClient, AuthorizationCodeClient;
6644
6619
  var init_AuthorizationCodeClient = __esm({
6645
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs"() {
6620
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/AuthorizationCodeClient.mjs"() {
6646
6621
  "use strict";
6647
6622
  init_BaseClient();
6648
6623
  init_RequestParameterBuilder();
@@ -7019,10 +6994,10 @@ var init_AuthorizationCodeClient = __esm({
7019
6994
  }
7020
6995
  });
7021
6996
 
7022
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs
6997
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/RefreshTokenClient.mjs
7023
6998
  var DEFAULT_REFRESH_TOKEN_EXPIRATION_OFFSET_SECONDS, _RefreshTokenClient, RefreshTokenClient;
7024
6999
  var init_RefreshTokenClient = __esm({
7025
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs"() {
7000
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/RefreshTokenClient.mjs"() {
7026
7001
  "use strict";
7027
7002
  init_ClientConfiguration();
7028
7003
  init_BaseClient();
@@ -7228,10 +7203,10 @@ var init_RefreshTokenClient = __esm({
7228
7203
  }
7229
7204
  });
7230
7205
 
7231
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs
7206
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/SilentFlowClient.mjs
7232
7207
  var _SilentFlowClient, SilentFlowClient;
7233
7208
  var init_SilentFlowClient = __esm({
7234
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs"() {
7209
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/SilentFlowClient.mjs"() {
7235
7210
  "use strict";
7236
7211
  init_BaseClient();
7237
7212
  init_TimeUtils();
@@ -7357,10 +7332,10 @@ var init_SilentFlowClient = __esm({
7357
7332
  }
7358
7333
  });
7359
7334
 
7360
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs
7335
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/server/ServerTelemetryManager.mjs
7361
7336
  var _ServerTelemetryManager, ServerTelemetryManager;
7362
7337
  var init_ServerTelemetryManager = __esm({
7363
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs"() {
7338
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/server/ServerTelemetryManager.mjs"() {
7364
7339
  "use strict";
7365
7340
  init_Constants();
7366
7341
  init_AuthError();
@@ -7536,9 +7511,9 @@ var init_ServerTelemetryManager = __esm({
7536
7511
  }
7537
7512
  });
7538
7513
 
7539
- // ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs
7514
+ // ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/index.mjs
7540
7515
  var init_dist = __esm({
7541
- "../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs"() {
7516
+ "../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/index.mjs"() {
7542
7517
  "use strict";
7543
7518
  init_AuthToken();
7544
7519
  init_AuthorityFactory();
@@ -7579,10 +7554,10 @@ var init_dist = __esm({
7579
7554
  }
7580
7555
  });
7581
7556
 
7582
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs
7557
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Deserializer.mjs
7583
7558
  var _Deserializer, Deserializer;
7584
7559
  var init_Deserializer = __esm({
7585
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs"() {
7560
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Deserializer.mjs"() {
7586
7561
  "use strict";
7587
7562
  init_dist();
7588
7563
  _Deserializer = class _Deserializer {
@@ -7741,24 +7716,24 @@ var init_Deserializer = __esm({
7741
7716
  }
7742
7717
  });
7743
7718
 
7744
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs
7719
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/internals.mjs
7745
7720
  var internals_exports = {};
7746
7721
  __export(internals_exports, {
7747
7722
  Deserializer: () => Deserializer,
7748
7723
  Serializer: () => Serializer
7749
7724
  });
7750
7725
  var init_internals = __esm({
7751
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs"() {
7726
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/internals.mjs"() {
7752
7727
  "use strict";
7753
7728
  init_Serializer();
7754
7729
  init_Deserializer();
7755
7730
  }
7756
7731
  });
7757
7732
 
7758
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs
7733
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/Constants.mjs
7759
7734
  var AUTHORIZATION_HEADER_NAME, METADATA_HEADER_NAME, APP_SERVICE_SECRET_HEADER_NAME, SERVICE_FABRIC_SECRET_HEADER_NAME, API_VERSION_QUERY_PARAMETER_NAME, RESOURCE_BODY_OR_QUERY_PARAMETER_NAME, DEFAULT_MANAGED_IDENTITY_ID, MANAGED_IDENTITY_DEFAULT_TENANT, DEFAULT_AUTHORITY_FOR_MANAGED_IDENTITY, ManagedIdentityEnvironmentVariableNames, ManagedIdentitySourceNames, ManagedIdentityIdType, HttpMethod, ProxyStatus, REGION_ENVIRONMENT_VARIABLE, RANDOM_OCTET_SIZE, Hash, CharSet, Constants2, ApiId, JwtConstants, LOOPBACK_SERVER_CONSTANTS, AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES, MANAGED_IDENTITY_MAX_RETRIES, MANAGED_IDENTITY_RETRY_DELAY, MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON;
7760
7735
  var init_Constants2 = __esm({
7761
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs"() {
7736
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/Constants.mjs"() {
7762
7737
  "use strict";
7763
7738
  init_dist();
7764
7739
  AUTHORIZATION_HEADER_NAME = "Authorization";
@@ -7828,6 +7803,7 @@ var init_Constants2 = __esm({
7828
7803
  JwtConstants = {
7829
7804
  ALGORITHM: "alg",
7830
7805
  RSA_256: "RS256",
7806
+ X5T_256: "x5t#S256",
7831
7807
  X5T: "x5t",
7832
7808
  X5C: "x5c",
7833
7809
  AUDIENCE: "aud",
@@ -7855,10 +7831,10 @@ var init_Constants2 = __esm({
7855
7831
  }
7856
7832
  });
7857
7833
 
7858
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs
7834
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/NetworkUtils.mjs
7859
7835
  var _NetworkUtils, NetworkUtils;
7860
7836
  var init_NetworkUtils = __esm({
7861
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs"() {
7837
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/NetworkUtils.mjs"() {
7862
7838
  "use strict";
7863
7839
  _NetworkUtils = class _NetworkUtils {
7864
7840
  static getNetworkResponse(headers, body, statusCode) {
@@ -7897,12 +7873,12 @@ var init_NetworkUtils = __esm({
7897
7873
  }
7898
7874
  });
7899
7875
 
7900
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs
7876
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClient.mjs
7901
7877
  import http from "http";
7902
7878
  import https from "https";
7903
7879
  var _HttpClient, HttpClient, networkRequestViaProxy, networkRequestViaHttps, parseBody;
7904
7880
  var init_HttpClient = __esm({
7905
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs"() {
7881
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClient.mjs"() {
7906
7882
  "use strict";
7907
7883
  init_dist();
7908
7884
  init_Constants2();
@@ -8127,10 +8103,10 @@ Headers: ${JSON.stringify(headers)}`
8127
8103
  }
8128
8104
  });
8129
8105
 
8130
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs
8106
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityErrorCodes.mjs
8131
8107
  var invalidFileExtension, invalidFilePath, invalidManagedIdentityIdType, invalidSecret, missingId, networkUnavailable, platformNotSupported, unableToCreateAzureArc, unableToCreateCloudShell, unableToCreateSource, unableToReadSecretFile, userAssignedNotAvailableAtRuntime, wwwAuthenticateHeaderMissing, wwwAuthenticateHeaderUnsupportedFormat, MsiEnvironmentVariableUrlMalformedErrorCodes;
8132
8108
  var init_ManagedIdentityErrorCodes = __esm({
8133
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs"() {
8109
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityErrorCodes.mjs"() {
8134
8110
  "use strict";
8135
8111
  init_Constants2();
8136
8112
  invalidFileExtension = "invalid_file_extension";
@@ -8156,13 +8132,13 @@ var init_ManagedIdentityErrorCodes = __esm({
8156
8132
  }
8157
8133
  });
8158
8134
 
8159
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs
8135
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityError.mjs
8160
8136
  function createManagedIdentityError(errorCode) {
8161
8137
  return new ManagedIdentityError(errorCode);
8162
8138
  }
8163
8139
  var ManagedIdentityErrorMessages, _ManagedIdentityError, ManagedIdentityError;
8164
8140
  var init_ManagedIdentityError = __esm({
8165
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs"() {
8141
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityError.mjs"() {
8166
8142
  "use strict";
8167
8143
  init_dist();
8168
8144
  init_ManagedIdentityErrorCodes();
@@ -8200,10 +8176,10 @@ var init_ManagedIdentityError = __esm({
8200
8176
  }
8201
8177
  });
8202
8178
 
8203
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs
8179
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityId.mjs
8204
8180
  var _ManagedIdentityId, ManagedIdentityId;
8205
8181
  var init_ManagedIdentityId = __esm({
8206
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs"() {
8182
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityId.mjs"() {
8207
8183
  "use strict";
8208
8184
  init_ManagedIdentityError();
8209
8185
  init_Constants2();
@@ -8254,10 +8230,10 @@ var init_ManagedIdentityId = __esm({
8254
8230
  }
8255
8231
  });
8256
8232
 
8257
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs
8233
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/retry/LinearRetryPolicy.mjs
8258
8234
  var _LinearRetryPolicy, LinearRetryPolicy;
8259
8235
  var init_LinearRetryPolicy = __esm({
8260
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs"() {
8236
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/retry/LinearRetryPolicy.mjs"() {
8261
8237
  "use strict";
8262
8238
  _LinearRetryPolicy = class _LinearRetryPolicy {
8263
8239
  constructor(maxRetries, retryDelay, httpStatusCodesToRetryOn) {
@@ -8295,10 +8271,10 @@ var init_LinearRetryPolicy = __esm({
8295
8271
  }
8296
8272
  });
8297
8273
 
8298
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs
8274
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClientWithRetries.mjs
8299
8275
  var _HttpClientWithRetries, HttpClientWithRetries;
8300
8276
  var init_HttpClientWithRetries = __esm({
8301
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs"() {
8277
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClientWithRetries.mjs"() {
8302
8278
  "use strict";
8303
8279
  init_dist();
8304
8280
  init_Constants2();
@@ -8335,7 +8311,106 @@ var init_HttpClientWithRetries = __esm({
8335
8311
  }
8336
8312
  });
8337
8313
 
8338
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs
8314
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/NodeAuthError.mjs
8315
+ var NodeAuthErrorMessage, _NodeAuthError, NodeAuthError;
8316
+ var init_NodeAuthError = __esm({
8317
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/NodeAuthError.mjs"() {
8318
+ "use strict";
8319
+ init_dist();
8320
+ NodeAuthErrorMessage = {
8321
+ invalidLoopbackAddressType: {
8322
+ code: "invalid_loopback_server_address_type",
8323
+ desc: "Loopback server address is not type string. This is unexpected."
8324
+ },
8325
+ unableToLoadRedirectUri: {
8326
+ code: "unable_to_load_redirectUrl",
8327
+ desc: "Loopback server callback was invoked without a url. This is unexpected."
8328
+ },
8329
+ noAuthCodeInResponse: {
8330
+ code: "no_auth_code_in_response",
8331
+ desc: "No auth code found in the server response. Please check your network trace to determine what happened."
8332
+ },
8333
+ noLoopbackServerExists: {
8334
+ code: "no_loopback_server_exists",
8335
+ desc: "No loopback server exists yet."
8336
+ },
8337
+ loopbackServerAlreadyExists: {
8338
+ code: "loopback_server_already_exists",
8339
+ desc: "Loopback server already exists. Cannot create another."
8340
+ },
8341
+ loopbackServerTimeout: {
8342
+ code: "loopback_server_timeout",
8343
+ desc: "Timed out waiting for auth code listener to be registered."
8344
+ },
8345
+ stateNotFoundError: {
8346
+ code: "state_not_found",
8347
+ desc: "State not found. Please verify that the request originated from msal."
8348
+ },
8349
+ thumbprintMissing: {
8350
+ code: "thumbprint_missing_from_client_certificate",
8351
+ desc: "Client certificate does not contain a SHA-1 or SHA-256 thumbprint."
8352
+ }
8353
+ };
8354
+ _NodeAuthError = class _NodeAuthError extends AuthError {
8355
+ constructor(errorCode, errorMessage) {
8356
+ super(errorCode, errorMessage);
8357
+ this.name = "NodeAuthError";
8358
+ }
8359
+ /**
8360
+ * Creates an error thrown if loopback server address is of type string.
8361
+ */
8362
+ static createInvalidLoopbackAddressTypeError() {
8363
+ return new _NodeAuthError(NodeAuthErrorMessage.invalidLoopbackAddressType.code, `${NodeAuthErrorMessage.invalidLoopbackAddressType.desc}`);
8364
+ }
8365
+ /**
8366
+ * Creates an error thrown if the loopback server is unable to get a url.
8367
+ */
8368
+ static createUnableToLoadRedirectUrlError() {
8369
+ return new _NodeAuthError(NodeAuthErrorMessage.unableToLoadRedirectUri.code, `${NodeAuthErrorMessage.unableToLoadRedirectUri.desc}`);
8370
+ }
8371
+ /**
8372
+ * Creates an error thrown if the server response does not contain an auth code.
8373
+ */
8374
+ static createNoAuthCodeInResponseError() {
8375
+ return new _NodeAuthError(NodeAuthErrorMessage.noAuthCodeInResponse.code, `${NodeAuthErrorMessage.noAuthCodeInResponse.desc}`);
8376
+ }
8377
+ /**
8378
+ * Creates an error thrown if the loopback server has not been spun up yet.
8379
+ */
8380
+ static createNoLoopbackServerExistsError() {
8381
+ return new _NodeAuthError(NodeAuthErrorMessage.noLoopbackServerExists.code, `${NodeAuthErrorMessage.noLoopbackServerExists.desc}`);
8382
+ }
8383
+ /**
8384
+ * Creates an error thrown if a loopback server already exists when attempting to create another one.
8385
+ */
8386
+ static createLoopbackServerAlreadyExistsError() {
8387
+ return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerAlreadyExists.code, `${NodeAuthErrorMessage.loopbackServerAlreadyExists.desc}`);
8388
+ }
8389
+ /**
8390
+ * Creates an error thrown if the loopback server times out registering the auth code listener.
8391
+ */
8392
+ static createLoopbackServerTimeoutError() {
8393
+ return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerTimeout.code, `${NodeAuthErrorMessage.loopbackServerTimeout.desc}`);
8394
+ }
8395
+ /**
8396
+ * Creates an error thrown when the state is not present.
8397
+ */
8398
+ static createStateNotFoundError() {
8399
+ return new _NodeAuthError(NodeAuthErrorMessage.stateNotFoundError.code, NodeAuthErrorMessage.stateNotFoundError.desc);
8400
+ }
8401
+ /**
8402
+ * Creates an error thrown when client certificate was provided, but neither the SHA-1 or SHA-256 thumbprints were provided
8403
+ */
8404
+ static createThumbprintMissingError() {
8405
+ return new _NodeAuthError(NodeAuthErrorMessage.thumbprintMissing.code, NodeAuthErrorMessage.thumbprintMissing.desc);
8406
+ }
8407
+ };
8408
+ __name(_NodeAuthError, "NodeAuthError");
8409
+ NodeAuthError = _NodeAuthError;
8410
+ }
8411
+ });
8412
+
8413
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/Configuration.mjs
8339
8414
  function buildAppConfiguration({ auth, broker, cache, system, telemetry }) {
8340
8415
  const systemOptions = {
8341
8416
  ...DEFAULT_SYSTEM_OPTIONS2,
@@ -8343,6 +8418,9 @@ function buildAppConfiguration({ auth, broker, cache, system, telemetry }) {
8343
8418
  loggerOptions: (system == null ? void 0 : system.loggerOptions) || DEFAULT_LOGGER_OPTIONS,
8344
8419
  disableInternalRetries: (system == null ? void 0 : system.disableInternalRetries) || false
8345
8420
  };
8421
+ if (!!auth.clientCertificate && !!!auth.clientCertificate.thumbprint && !!!auth.clientCertificate.thumbprintSha256) {
8422
+ throw NodeAuthError.createStateNotFoundError();
8423
+ }
8346
8424
  return {
8347
8425
  auth: { ...DEFAULT_AUTH_OPTIONS, ...auth },
8348
8426
  broker: { ...broker },
@@ -8374,7 +8452,7 @@ function buildManagedIdentityConfiguration({ managedIdentityIdParams, system })
8374
8452
  }
8375
8453
  var DEFAULT_AUTH_OPTIONS, DEFAULT_CACHE_OPTIONS2, DEFAULT_LOGGER_OPTIONS, DEFAULT_SYSTEM_OPTIONS2, DEFAULT_TELEMETRY_OPTIONS2;
8376
8454
  var init_Configuration = __esm({
8377
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs"() {
8455
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/Configuration.mjs"() {
8378
8456
  "use strict";
8379
8457
  init_dist();
8380
8458
  init_HttpClient();
@@ -8382,6 +8460,7 @@ var init_Configuration = __esm({
8382
8460
  init_Constants2();
8383
8461
  init_LinearRetryPolicy();
8384
8462
  init_HttpClientWithRetries();
8463
+ init_NodeAuthError();
8385
8464
  DEFAULT_AUTH_OPTIONS = {
8386
8465
  clientId: Constants.EMPTY_STRING,
8387
8466
  authority: Constants.DEFAULT_AUTHORITY,
@@ -8389,6 +8468,7 @@ var init_Configuration = __esm({
8389
8468
  clientAssertion: Constants.EMPTY_STRING,
8390
8469
  clientCertificate: {
8391
8470
  thumbprint: Constants.EMPTY_STRING,
8471
+ thumbprintSha256: Constants.EMPTY_STRING,
8392
8472
  privateKey: Constants.EMPTY_STRING,
8393
8473
  x5c: Constants.EMPTY_STRING
8394
8474
  },
@@ -8522,10 +8602,10 @@ var init_esm_node = __esm({
8522
8602
  }
8523
8603
  });
8524
8604
 
8525
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs
8605
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/GuidGenerator.mjs
8526
8606
  var _GuidGenerator, GuidGenerator;
8527
8607
  var init_GuidGenerator = __esm({
8528
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs"() {
8608
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/GuidGenerator.mjs"() {
8529
8609
  "use strict";
8530
8610
  init_esm_node();
8531
8611
  _GuidGenerator = class _GuidGenerator {
@@ -8551,10 +8631,10 @@ var init_GuidGenerator = __esm({
8551
8631
  }
8552
8632
  });
8553
8633
 
8554
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs
8634
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/EncodingUtils.mjs
8555
8635
  var _EncodingUtils, EncodingUtils;
8556
8636
  var init_EncodingUtils = __esm({
8557
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs"() {
8637
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/EncodingUtils.mjs"() {
8558
8638
  "use strict";
8559
8639
  init_dist();
8560
8640
  _EncodingUtils = class _EncodingUtils {
@@ -8599,11 +8679,11 @@ var init_EncodingUtils = __esm({
8599
8679
  }
8600
8680
  });
8601
8681
 
8602
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs
8682
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/HashUtils.mjs
8603
8683
  import crypto2 from "crypto";
8604
8684
  var _HashUtils, HashUtils;
8605
8685
  var init_HashUtils = __esm({
8606
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs"() {
8686
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/HashUtils.mjs"() {
8607
8687
  "use strict";
8608
8688
  init_Constants2();
8609
8689
  _HashUtils = class _HashUtils {
@@ -8620,11 +8700,11 @@ var init_HashUtils = __esm({
8620
8700
  }
8621
8701
  });
8622
8702
 
8623
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs
8703
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/PkceGenerator.mjs
8624
8704
  import crypto3 from "crypto";
8625
8705
  var _PkceGenerator, PkceGenerator;
8626
8706
  var init_PkceGenerator = __esm({
8627
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs"() {
8707
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/PkceGenerator.mjs"() {
8628
8708
  "use strict";
8629
8709
  init_dist();
8630
8710
  init_Constants2();
@@ -8673,10 +8753,10 @@ var init_PkceGenerator = __esm({
8673
8753
  }
8674
8754
  });
8675
8755
 
8676
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs
8756
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/CryptoProvider.mjs
8677
8757
  var _CryptoProvider, CryptoProvider;
8678
8758
  var init_CryptoProvider = __esm({
8679
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs"() {
8759
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/CryptoProvider.mjs"() {
8680
8760
  "use strict";
8681
8761
  init_GuidGenerator();
8682
8762
  init_EncodingUtils();
@@ -8766,10 +8846,10 @@ var init_CryptoProvider = __esm({
8766
8846
  }
8767
8847
  });
8768
8848
 
8769
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs
8849
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/NodeStorage.mjs
8770
8850
  var _NodeStorage, NodeStorage;
8771
8851
  var init_NodeStorage = __esm({
8772
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs"() {
8852
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/NodeStorage.mjs"() {
8773
8853
  "use strict";
8774
8854
  init_dist();
8775
8855
  init_Deserializer();
@@ -9170,10 +9250,10 @@ var init_NodeStorage = __esm({
9170
9250
  }
9171
9251
  });
9172
9252
 
9173
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs
9253
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/TokenCache.mjs
9174
9254
  var defaultSerializedCache, _TokenCache, TokenCache;
9175
9255
  var init_TokenCache = __esm({
9176
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs"() {
9256
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/TokenCache.mjs"() {
9177
9257
  "use strict";
9178
9258
  init_dist();
9179
9259
  init_Deserializer();
@@ -13203,10 +13283,10 @@ var require_package14 = __commonJS({
13203
13283
  }
13204
13284
  });
13205
13285
 
13206
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs
13286
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientAssertion.mjs
13207
13287
  var import_jsonwebtoken, _ClientAssertion, ClientAssertion;
13208
13288
  var init_ClientAssertion = __esm({
13209
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs"() {
13289
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientAssertion.mjs"() {
13210
13290
  "use strict";
13211
13291
  import_jsonwebtoken = __toESM(require_package14(), 1);
13212
13292
  init_dist();
@@ -13223,6 +13303,7 @@ var init_ClientAssertion = __esm({
13223
13303
  return clientAssertion;
13224
13304
  }
13225
13305
  /**
13306
+ * @deprecated Use fromCertificateWithSha256Thumbprint instead, with a SHA-256 thumprint
13226
13307
  * Initialize the ClientAssertion class from the certificate passed by the user
13227
13308
  * @param thumbprint - identifier of a certificate
13228
13309
  * @param privateKey - secret key
@@ -13232,6 +13313,23 @@ var init_ClientAssertion = __esm({
13232
13313
  const clientAssertion = new _ClientAssertion();
13233
13314
  clientAssertion.privateKey = privateKey;
13234
13315
  clientAssertion.thumbprint = thumbprint;
13316
+ clientAssertion.useSha256 = false;
13317
+ if (publicCertificate) {
13318
+ clientAssertion.publicCertificate = this.parseCertificate(publicCertificate);
13319
+ }
13320
+ return clientAssertion;
13321
+ }
13322
+ /**
13323
+ * Initialize the ClientAssertion class from the certificate passed by the user
13324
+ * @param thumbprint - identifier of a certificate
13325
+ * @param privateKey - secret key
13326
+ * @param publicCertificate - electronic document provided to prove the ownership of the public key
13327
+ */
13328
+ static fromCertificateWithSha256Thumbprint(thumbprint, privateKey, publicCertificate) {
13329
+ const clientAssertion = new _ClientAssertion();
13330
+ clientAssertion.privateKey = privateKey;
13331
+ clientAssertion.thumbprint = thumbprint;
13332
+ clientAssertion.useSha256 = true;
13235
13333
  if (publicCertificate) {
13236
13334
  clientAssertion.publicCertificate = this.parseCertificate(publicCertificate);
13237
13335
  }
@@ -13264,12 +13362,15 @@ var init_ClientAssertion = __esm({
13264
13362
  const issuedAt = TimeUtils_exports.nowSeconds();
13265
13363
  this.expirationTime = issuedAt + 600;
13266
13364
  const header = {
13267
- alg: JwtConstants.RSA_256,
13268
- x5t: EncodingUtils.base64EncodeUrl(this.thumbprint, "hex")
13365
+ alg: JwtConstants.RSA_256
13269
13366
  };
13367
+ const thumbprintHeader = this.useSha256 ? JwtConstants.X5T_256 : JwtConstants.X5T;
13368
+ Object.assign(header, {
13369
+ [thumbprintHeader]: EncodingUtils.base64EncodeUrl(this.thumbprint, "hex")
13370
+ });
13270
13371
  if (this.publicCertificate) {
13271
13372
  Object.assign(header, {
13272
- x5c: this.publicCertificate
13373
+ [JwtConstants.X5C]: this.publicCertificate
13273
13374
  });
13274
13375
  }
13275
13376
  const payload = {
@@ -13308,109 +13409,20 @@ var init_ClientAssertion = __esm({
13308
13409
  }
13309
13410
  });
13310
13411
 
13311
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs
13412
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/packageMetadata.mjs
13312
13413
  var name2, version2;
13313
13414
  var init_packageMetadata2 = __esm({
13314
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs"() {
13415
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/packageMetadata.mjs"() {
13315
13416
  "use strict";
13316
13417
  name2 = "@azure/msal-node";
13317
- version2 = "2.9.2";
13318
- }
13319
- });
13320
-
13321
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs
13322
- var NodeAuthErrorMessage, _NodeAuthError, NodeAuthError;
13323
- var init_NodeAuthError = __esm({
13324
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs"() {
13325
- "use strict";
13326
- init_dist();
13327
- NodeAuthErrorMessage = {
13328
- invalidLoopbackAddressType: {
13329
- code: "invalid_loopback_server_address_type",
13330
- desc: "Loopback server address is not type string. This is unexpected."
13331
- },
13332
- unableToLoadRedirectUri: {
13333
- code: "unable_to_load_redirectUrl",
13334
- desc: "Loopback server callback was invoked without a url. This is unexpected."
13335
- },
13336
- noAuthCodeInResponse: {
13337
- code: "no_auth_code_in_response",
13338
- desc: "No auth code found in the server response. Please check your network trace to determine what happened."
13339
- },
13340
- noLoopbackServerExists: {
13341
- code: "no_loopback_server_exists",
13342
- desc: "No loopback server exists yet."
13343
- },
13344
- loopbackServerAlreadyExists: {
13345
- code: "loopback_server_already_exists",
13346
- desc: "Loopback server already exists. Cannot create another."
13347
- },
13348
- loopbackServerTimeout: {
13349
- code: "loopback_server_timeout",
13350
- desc: "Timed out waiting for auth code listener to be registered."
13351
- },
13352
- stateNotFoundError: {
13353
- code: "state_not_found",
13354
- desc: "State not found. Please verify that the request originated from msal."
13355
- }
13356
- };
13357
- _NodeAuthError = class _NodeAuthError extends AuthError {
13358
- constructor(errorCode, errorMessage) {
13359
- super(errorCode, errorMessage);
13360
- this.name = "NodeAuthError";
13361
- }
13362
- /**
13363
- * Creates an error thrown if loopback server address is of type string.
13364
- */
13365
- static createInvalidLoopbackAddressTypeError() {
13366
- return new _NodeAuthError(NodeAuthErrorMessage.invalidLoopbackAddressType.code, `${NodeAuthErrorMessage.invalidLoopbackAddressType.desc}`);
13367
- }
13368
- /**
13369
- * Creates an error thrown if the loopback server is unable to get a url.
13370
- */
13371
- static createUnableToLoadRedirectUrlError() {
13372
- return new _NodeAuthError(NodeAuthErrorMessage.unableToLoadRedirectUri.code, `${NodeAuthErrorMessage.unableToLoadRedirectUri.desc}`);
13373
- }
13374
- /**
13375
- * Creates an error thrown if the server response does not contain an auth code.
13376
- */
13377
- static createNoAuthCodeInResponseError() {
13378
- return new _NodeAuthError(NodeAuthErrorMessage.noAuthCodeInResponse.code, `${NodeAuthErrorMessage.noAuthCodeInResponse.desc}`);
13379
- }
13380
- /**
13381
- * Creates an error thrown if the loopback server has not been spun up yet.
13382
- */
13383
- static createNoLoopbackServerExistsError() {
13384
- return new _NodeAuthError(NodeAuthErrorMessage.noLoopbackServerExists.code, `${NodeAuthErrorMessage.noLoopbackServerExists.desc}`);
13385
- }
13386
- /**
13387
- * Creates an error thrown if a loopback server already exists when attempting to create another one.
13388
- */
13389
- static createLoopbackServerAlreadyExistsError() {
13390
- return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerAlreadyExists.code, `${NodeAuthErrorMessage.loopbackServerAlreadyExists.desc}`);
13391
- }
13392
- /**
13393
- * Creates an error thrown if the loopback server times out registering the auth code listener.
13394
- */
13395
- static createLoopbackServerTimeoutError() {
13396
- return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerTimeout.code, `${NodeAuthErrorMessage.loopbackServerTimeout.desc}`);
13397
- }
13398
- /**
13399
- * Creates an error thrown when the state is not present.
13400
- */
13401
- static createStateNotFoundError() {
13402
- return new _NodeAuthError(NodeAuthErrorMessage.stateNotFoundError.code, NodeAuthErrorMessage.stateNotFoundError.desc);
13403
- }
13404
- };
13405
- __name(_NodeAuthError, "NodeAuthError");
13406
- NodeAuthError = _NodeAuthError;
13418
+ version2 = "2.11.0";
13407
13419
  }
13408
13420
  });
13409
13421
 
13410
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs
13422
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/UsernamePasswordClient.mjs
13411
13423
  var _UsernamePasswordClient, UsernamePasswordClient;
13412
13424
  var init_UsernamePasswordClient = __esm({
13413
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs"() {
13425
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/UsernamePasswordClient.mjs"() {
13414
13426
  "use strict";
13415
13427
  init_dist();
13416
13428
  _UsernamePasswordClient = class _UsernamePasswordClient extends BaseClient {
@@ -13500,10 +13512,10 @@ var init_UsernamePasswordClient = __esm({
13500
13512
  }
13501
13513
  });
13502
13514
 
13503
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs
13515
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientApplication.mjs
13504
13516
  var _ClientApplication, ClientApplication;
13505
13517
  var init_ClientApplication = __esm({
13506
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs"() {
13518
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientApplication.mjs"() {
13507
13519
  "use strict";
13508
13520
  init_dist();
13509
13521
  init_Configuration();
@@ -13829,11 +13841,11 @@ var init_ClientApplication = __esm({
13829
13841
  }
13830
13842
  });
13831
13843
 
13832
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs
13844
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/LoopbackClient.mjs
13833
13845
  import http2 from "http";
13834
13846
  var _LoopbackClient, LoopbackClient;
13835
13847
  var init_LoopbackClient = __esm({
13836
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs"() {
13848
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/LoopbackClient.mjs"() {
13837
13849
  "use strict";
13838
13850
  init_dist();
13839
13851
  init_NodeAuthError();
@@ -13909,10 +13921,10 @@ var init_LoopbackClient = __esm({
13909
13921
  }
13910
13922
  });
13911
13923
 
13912
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs
13924
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/DeviceCodeClient.mjs
13913
13925
  var _DeviceCodeClient, DeviceCodeClient;
13914
13926
  var init_DeviceCodeClient = __esm({
13915
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs"() {
13927
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/DeviceCodeClient.mjs"() {
13916
13928
  "use strict";
13917
13929
  init_dist();
13918
13930
  _DeviceCodeClient = class _DeviceCodeClient extends BaseClient {
@@ -14096,10 +14108,10 @@ var init_DeviceCodeClient = __esm({
14096
14108
  }
14097
14109
  });
14098
14110
 
14099
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs
14111
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/PublicClientApplication.mjs
14100
14112
  var _PublicClientApplication, PublicClientApplication;
14101
14113
  var init_PublicClientApplication = __esm({
14102
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs"() {
14114
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/PublicClientApplication.mjs"() {
14103
14115
  "use strict";
14104
14116
  init_Constants2();
14105
14117
  init_dist();
@@ -14317,10 +14329,10 @@ var init_PublicClientApplication = __esm({
14317
14329
  }
14318
14330
  });
14319
14331
 
14320
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs
14332
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientCredentialClient.mjs
14321
14333
  var _ClientCredentialClient, ClientCredentialClient;
14322
14334
  var init_ClientCredentialClient = __esm({
14323
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs"() {
14335
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientCredentialClient.mjs"() {
14324
14336
  "use strict";
14325
14337
  init_dist();
14326
14338
  _ClientCredentialClient = class _ClientCredentialClient extends BaseClient {
@@ -14495,10 +14507,10 @@ var init_ClientCredentialClient = __esm({
14495
14507
  }
14496
14508
  });
14497
14509
 
14498
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs
14510
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/OnBehalfOfClient.mjs
14499
14511
  var _OnBehalfOfClient, OnBehalfOfClient;
14500
14512
  var init_OnBehalfOfClient = __esm({
14501
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs"() {
14513
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/OnBehalfOfClient.mjs"() {
14502
14514
  "use strict";
14503
14515
  init_dist();
14504
14516
  init_EncodingUtils();
@@ -14681,10 +14693,10 @@ var init_OnBehalfOfClient = __esm({
14681
14693
  }
14682
14694
  });
14683
14695
 
14684
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs
14696
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ConfidentialClientApplication.mjs
14685
14697
  var _ConfidentialClientApplication, ConfidentialClientApplication;
14686
14698
  var init_ConfidentialClientApplication = __esm({
14687
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs"() {
14699
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ConfidentialClientApplication.mjs"() {
14688
14700
  "use strict";
14689
14701
  init_ClientApplication();
14690
14702
  init_ClientAssertion();
@@ -14714,7 +14726,7 @@ var init_ConfidentialClientApplication = __esm({
14714
14726
  */
14715
14727
  constructor(configuration) {
14716
14728
  super(configuration);
14717
- this.setClientCredential(this.config);
14729
+ this.setClientCredential();
14718
14730
  this.appTokenProvider = void 0;
14719
14731
  }
14720
14732
  /**
@@ -14804,33 +14816,33 @@ var init_ConfidentialClientApplication = __esm({
14804
14816
  throw e;
14805
14817
  }
14806
14818
  }
14807
- setClientCredential(configuration) {
14808
- var _a2;
14809
- const clientSecretNotEmpty = !!configuration.auth.clientSecret;
14810
- const clientAssertionNotEmpty = !!configuration.auth.clientAssertion;
14811
- const certificate = configuration.auth.clientCertificate || {
14812
- thumbprint: Constants.EMPTY_STRING,
14813
- privateKey: Constants.EMPTY_STRING
14814
- };
14815
- const certificateNotEmpty = !!certificate.thumbprint || !!certificate.privateKey;
14819
+ setClientCredential() {
14820
+ const clientSecretNotEmpty = !!this.config.auth.clientSecret;
14821
+ const clientAssertionNotEmpty = !!this.config.auth.clientAssertion;
14822
+ const certificateNotEmpty = (!!this.config.auth.clientCertificate.thumbprint || !!this.config.auth.clientCertificate.thumbprintSha256) && !!this.config.auth.clientCertificate.privateKey;
14816
14823
  if (this.appTokenProvider) {
14817
14824
  return;
14818
14825
  }
14819
14826
  if (clientSecretNotEmpty && clientAssertionNotEmpty || clientAssertionNotEmpty && certificateNotEmpty || clientSecretNotEmpty && certificateNotEmpty) {
14820
14827
  throw createClientAuthError(ClientAuthErrorCodes_exports.invalidClientCredential);
14821
14828
  }
14822
- if (configuration.auth.clientSecret) {
14823
- this.clientSecret = configuration.auth.clientSecret;
14829
+ if (this.config.auth.clientSecret) {
14830
+ this.clientSecret = this.config.auth.clientSecret;
14824
14831
  return;
14825
14832
  }
14826
- if (configuration.auth.clientAssertion) {
14827
- this.developerProvidedClientAssertion = configuration.auth.clientAssertion;
14833
+ if (this.config.auth.clientAssertion) {
14834
+ this.developerProvidedClientAssertion = this.config.auth.clientAssertion;
14828
14835
  return;
14829
14836
  }
14830
14837
  if (!certificateNotEmpty) {
14831
14838
  throw createClientAuthError(ClientAuthErrorCodes_exports.invalidClientCredential);
14832
14839
  } else {
14833
- this.clientAssertion = ClientAssertion.fromCertificate(certificate.thumbprint, certificate.privateKey, (_a2 = configuration.auth.clientCertificate) == null ? void 0 : _a2.x5c);
14840
+ this.clientAssertion = !!this.config.auth.clientCertificate.thumbprintSha256 ? ClientAssertion.fromCertificateWithSha256Thumbprint(this.config.auth.clientCertificate.thumbprintSha256, this.config.auth.clientCertificate.privateKey, this.config.auth.clientCertificate.x5c) : ClientAssertion.fromCertificate(
14841
+ // guaranteed to be a string, due to prior error checking in this function
14842
+ this.config.auth.clientCertificate.thumbprint,
14843
+ this.config.auth.clientCertificate.privateKey,
14844
+ this.config.auth.clientCertificate.x5c
14845
+ );
14834
14846
  }
14835
14847
  }
14836
14848
  };
@@ -14839,10 +14851,10 @@ var init_ConfidentialClientApplication = __esm({
14839
14851
  }
14840
14852
  });
14841
14853
 
14842
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs
14854
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs
14843
14855
  var ManagedIdentityUserAssignedIdQueryParameterNames, _BaseManagedIdentitySource, BaseManagedIdentitySource;
14844
14856
  var init_BaseManagedIdentitySource = __esm({
14845
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs"() {
14857
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs"() {
14846
14858
  "use strict";
14847
14859
  init_dist();
14848
14860
  init_Constants2();
@@ -14864,6 +14876,7 @@ var init_BaseManagedIdentitySource = __esm({
14864
14876
  return this.getServerTokenResponse(response);
14865
14877
  }
14866
14878
  getServerTokenResponse(response) {
14879
+ var _a2, _b2;
14867
14880
  let refreshIn, expiresIn;
14868
14881
  if (response.body.expires_on) {
14869
14882
  expiresIn = response.body.expires_on - TimeUtils_exports.nowSeconds();
@@ -14880,8 +14893,12 @@ var init_BaseManagedIdentitySource = __esm({
14880
14893
  token_type: response.body.token_type,
14881
14894
  refresh_in: refreshIn,
14882
14895
  // error
14883
- error: response.body.message,
14884
- correlation_id: response.body.correlationId
14896
+ correlation_id: response.body.correlation_id || response.body.correlationId,
14897
+ error: typeof response.body.error === "string" ? response.body.error : (_a2 = response.body.error) == null ? void 0 : _a2.code,
14898
+ error_description: response.body.message || (typeof response.body.error === "string" ? response.body.error_description : (_b2 = response.body.error) == null ? void 0 : _b2.message),
14899
+ error_codes: response.body.error_codes,
14900
+ timestamp: response.body.timestamp,
14901
+ trace_id: response.body.trace_id
14885
14902
  };
14886
14903
  return serverTokenResponse;
14887
14904
  }
@@ -14942,10 +14959,10 @@ var init_BaseManagedIdentitySource = __esm({
14942
14959
  }
14943
14960
  });
14944
14961
 
14945
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs
14962
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityRequestParameters.mjs
14946
14963
  var _ManagedIdentityRequestParameters, ManagedIdentityRequestParameters;
14947
14964
  var init_ManagedIdentityRequestParameters = __esm({
14948
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs"() {
14965
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityRequestParameters.mjs"() {
14949
14966
  "use strict";
14950
14967
  init_dist();
14951
14968
  _ManagedIdentityRequestParameters = class _ManagedIdentityRequestParameters {
@@ -14977,10 +14994,10 @@ var init_ManagedIdentityRequestParameters = __esm({
14977
14994
  }
14978
14995
  });
14979
14996
 
14980
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs
14997
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AppService.mjs
14981
14998
  var APP_SERVICE_MSI_API_VERSION, _AppService, AppService;
14982
14999
  var init_AppService = __esm({
14983
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs"() {
15000
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AppService.mjs"() {
14984
15001
  "use strict";
14985
15002
  init_BaseManagedIdentitySource();
14986
15003
  init_Constants2();
@@ -15023,12 +15040,12 @@ var init_AppService = __esm({
15023
15040
  }
15024
15041
  });
15025
15042
 
15026
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs
15043
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AzureArc.mjs
15027
15044
  import { statSync, readFileSync } from "fs";
15028
15045
  import path from "path";
15029
15046
  var ARC_API_VERSION, SUPPORTED_AZURE_ARC_PLATFORMS, _AzureArc, AzureArc;
15030
15047
  var init_AzureArc = __esm({
15031
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs"() {
15048
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AzureArc.mjs"() {
15032
15049
  "use strict";
15033
15050
  init_dist();
15034
15051
  init_ManagedIdentityRequestParameters();
@@ -15131,10 +15148,10 @@ var init_AzureArc = __esm({
15131
15148
  }
15132
15149
  });
15133
15150
 
15134
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs
15151
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/CloudShell.mjs
15135
15152
  var _CloudShell, CloudShell;
15136
15153
  var init_CloudShell = __esm({
15137
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs"() {
15154
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/CloudShell.mjs"() {
15138
15155
  "use strict";
15139
15156
  init_ManagedIdentityRequestParameters();
15140
15157
  init_BaseManagedIdentitySource();
@@ -15175,10 +15192,10 @@ var init_CloudShell = __esm({
15175
15192
  }
15176
15193
  });
15177
15194
 
15178
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs
15195
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/Imds.mjs
15179
15196
  var IMDS_TOKEN_PATH, DEFAULT_IMDS_ENDPOINT, IMDS_API_VERSION, _Imds, Imds;
15180
15197
  var init_Imds = __esm({
15181
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs"() {
15198
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/Imds.mjs"() {
15182
15199
  "use strict";
15183
15200
  init_ManagedIdentityRequestParameters();
15184
15201
  init_BaseManagedIdentitySource();
@@ -15218,10 +15235,10 @@ var init_Imds = __esm({
15218
15235
  }
15219
15236
  });
15220
15237
 
15221
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs
15238
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs
15222
15239
  var SERVICE_FABRIC_MSI_API_VERSION, _ServiceFabric, ServiceFabric;
15223
15240
  var init_ServiceFabric = __esm({
15224
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs"() {
15241
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs"() {
15225
15242
  "use strict";
15226
15243
  init_ManagedIdentityRequestParameters();
15227
15244
  init_BaseManagedIdentitySource();
@@ -15268,10 +15285,10 @@ var init_ServiceFabric = __esm({
15268
15285
  }
15269
15286
  });
15270
15287
 
15271
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs
15288
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityClient.mjs
15272
15289
  var _ManagedIdentityClient, ManagedIdentityClient;
15273
15290
  var init_ManagedIdentityClient = __esm({
15274
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs"() {
15291
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityClient.mjs"() {
15275
15292
  "use strict";
15276
15293
  init_AppService();
15277
15294
  init_AzureArc();
@@ -15324,10 +15341,10 @@ var init_ManagedIdentityClient = __esm({
15324
15341
  }
15325
15342
  });
15326
15343
 
15327
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs
15344
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityApplication.mjs
15328
15345
  var _ManagedIdentityApplication, ManagedIdentityApplication;
15329
15346
  var init_ManagedIdentityApplication = __esm({
15330
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs"() {
15347
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityApplication.mjs"() {
15331
15348
  "use strict";
15332
15349
  init_dist();
15333
15350
  init_Configuration();
@@ -15420,10 +15437,10 @@ var init_ManagedIdentityApplication = __esm({
15420
15437
  }
15421
15438
  });
15422
15439
 
15423
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs
15440
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/distributed/DistributedCachePlugin.mjs
15424
15441
  var _DistributedCachePlugin, DistributedCachePlugin;
15425
15442
  var init_DistributedCachePlugin = __esm({
15426
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs"() {
15443
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/distributed/DistributedCachePlugin.mjs"() {
15427
15444
  "use strict";
15428
15445
  init_dist();
15429
15446
  _DistributedCachePlugin = class _DistributedCachePlugin {
@@ -15453,7 +15470,7 @@ var init_DistributedCachePlugin = __esm({
15453
15470
  }
15454
15471
  });
15455
15472
 
15456
- // ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs
15473
+ // ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/index.mjs
15457
15474
  var dist_exports = {};
15458
15475
  __export(dist_exports, {
15459
15476
  AuthError: () => AuthError,
@@ -15495,7 +15512,7 @@ __export(dist_exports, {
15495
15512
  version: () => version2
15496
15513
  });
15497
15514
  var init_dist2 = __esm({
15498
- "../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs"() {
15515
+ "../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/index.mjs"() {
15499
15516
  "use strict";
15500
15517
  init_internals();
15501
15518
  init_PublicClientApplication();
@@ -15862,12 +15879,12 @@ var require_package18 = __commonJS({
15862
15879
  }
15863
15880
  });
15864
15881
 
15865
- // ../../node_modules/.store/@azure-identity-npm-4.2.1-857ff0b183/package/dist/index.js
15882
+ // ../../node_modules/.store/@azure-identity-npm-4.3.0-e85334d38f/package/dist/index.js
15866
15883
  var require_dist2 = __commonJS({
15867
- "../../node_modules/.store/@azure-identity-npm-4.2.1-857ff0b183/package/dist/index.js"(exports) {
15884
+ "../../node_modules/.store/@azure-identity-npm-4.3.0-e85334d38f/package/dist/index.js"(exports) {
15868
15885
  "use strict";
15869
15886
  Object.defineProperty(exports, "__esModule", { value: true });
15870
- var logger$q = require_commonjs();
15887
+ var logger$r = require_commonjs();
15871
15888
  var coreClient = require_commonjs5();
15872
15889
  var coreUtil = require_commonjs2();
15873
15890
  var coreRestPipeline = require_commonjs4();
@@ -15905,7 +15922,7 @@ var require_dist2 = __commonJS({
15905
15922
  __name(_interopNamespaceDefault, "_interopNamespaceDefault");
15906
15923
  var msalCommon__namespace = /* @__PURE__ */ _interopNamespaceDefault(msalCommon);
15907
15924
  var child_process__namespace = /* @__PURE__ */ _interopNamespaceDefault(child_process);
15908
- var SDK_VERSION = `4.2.1`;
15925
+ var SDK_VERSION = `4.3.0-beta.3`;
15909
15926
  var DeveloperSignOnClientId = "04b07795-8ddb-461a-bbee-02f9e1bf7b46";
15910
15927
  var DefaultTenantId = "common";
15911
15928
  exports.AzureAuthorityHosts = void 0;
@@ -15978,7 +15995,7 @@ var require_dist2 = __commonJS({
15978
15995
  var msalPlugins = {
15979
15996
  generatePluginConfiguration
15980
15997
  };
15981
- var logger$p = logger$q.createClientLogger("identity");
15998
+ var logger$q = logger$r.createClientLogger("identity");
15982
15999
  function processEnvVars(supportedEnvVars) {
15983
16000
  return supportedEnvVars.reduce((acc, envVariable) => {
15984
16001
  if (process.env[envVariable]) {
@@ -16002,7 +16019,7 @@ var require_dist2 = __commonJS({
16002
16019
  return `${message} Error message: ${typeof error === "string" ? error : error.message}.`;
16003
16020
  }
16004
16021
  __name(formatError, "formatError");
16005
- function credentialLoggerInstance(title, parent, log = logger$p) {
16022
+ function credentialLoggerInstance(title, parent, log = logger$q) {
16006
16023
  const fullTitle = parent ? `${parent.fullTitle} ${title}` : title;
16007
16024
  function info(message) {
16008
16025
  log.info(`${fullTitle} =>`, message);
@@ -16016,16 +16033,21 @@ var require_dist2 = __commonJS({
16016
16033
  log.verbose(`${fullTitle} =>`, message);
16017
16034
  }
16018
16035
  __name(verbose, "verbose");
16036
+ function error(message) {
16037
+ log.error(`${fullTitle} =>`, message);
16038
+ }
16039
+ __name(error, "error");
16019
16040
  return {
16020
16041
  title,
16021
16042
  fullTitle,
16022
16043
  info,
16023
16044
  warning,
16024
- verbose
16045
+ verbose,
16046
+ error
16025
16047
  };
16026
16048
  }
16027
16049
  __name(credentialLoggerInstance, "credentialLoggerInstance");
16028
- function credentialLogger(title, log = logger$p) {
16050
+ function credentialLogger(title, log = logger$q) {
16029
16051
  const credLogger = credentialLoggerInstance(title, void 0, log);
16030
16052
  return Object.assign(Object.assign({}, credLogger), { parent: log, getToken: credentialLoggerInstance("=> getToken()", credLogger, log) });
16031
16053
  }
@@ -16259,7 +16281,7 @@ ${errorDetail}`);
16259
16281
  this.tokenCredentialOptions = Object.assign({}, options);
16260
16282
  }
16261
16283
  async sendTokenRequest(request) {
16262
- logger$p.info(`IdentityClient: sending token request to [${request.url}]`);
16284
+ logger$q.info(`IdentityClient: sending token request to [${request.url}]`);
16263
16285
  const response = await this.sendRequest(request);
16264
16286
  if (response.bodyAsText && (response.status === 200 || response.status === 201)) {
16265
16287
  const parsedBody = JSON.parse(response.bodyAsText);
@@ -16274,11 +16296,11 @@ ${errorDetail}`);
16274
16296
  },
16275
16297
  refreshToken: parsedBody.refresh_token
16276
16298
  };
16277
- logger$p.info(`IdentityClient: [${request.url}] token acquired, expires on ${token.accessToken.expiresOnTimestamp}`);
16299
+ logger$q.info(`IdentityClient: [${request.url}] token acquired, expires on ${token.accessToken.expiresOnTimestamp}`);
16278
16300
  return token;
16279
16301
  } else {
16280
16302
  const error = new AuthenticationError(response.status, response.bodyAsText);
16281
- logger$p.warning(`IdentityClient: authentication error. HTTP status: ${response.status}, ${error.errorResponse.errorDescription}`);
16303
+ logger$q.warning(`IdentityClient: authentication error. HTTP status: ${response.status}, ${error.errorResponse.errorDescription}`);
16282
16304
  throw error;
16283
16305
  }
16284
16306
  }
@@ -16286,7 +16308,7 @@ ${errorDetail}`);
16286
16308
  if (refreshToken === void 0) {
16287
16309
  return null;
16288
16310
  }
16289
- logger$p.info(`IdentityClient: refreshing access token with client ID: ${clientId}, scopes: ${scopes} started`);
16311
+ logger$q.info(`IdentityClient: refreshing access token with client ID: ${clientId}, scopes: ${scopes} started`);
16290
16312
  const refreshParams = {
16291
16313
  grant_type: "refresh_token",
16292
16314
  client_id: clientId,
@@ -16312,14 +16334,14 @@ ${errorDetail}`);
16312
16334
  tracingOptions: updatedOptions.tracingOptions
16313
16335
  });
16314
16336
  const response = await this.sendTokenRequest(request);
16315
- logger$p.info(`IdentityClient: refreshed token for client ID: ${clientId}`);
16337
+ logger$q.info(`IdentityClient: refreshed token for client ID: ${clientId}`);
16316
16338
  return response;
16317
16339
  } catch (err) {
16318
16340
  if (err.name === AuthenticationErrorName && err.errorResponse.error === "interaction_required") {
16319
- logger$p.info(`IdentityClient: interaction required for client ID: ${clientId}`);
16341
+ logger$q.info(`IdentityClient: interaction required for client ID: ${clientId}`);
16320
16342
  return null;
16321
16343
  } else {
16322
- logger$p.warning(`IdentityClient: failed refreshing token for client ID: ${clientId}: ${err}`);
16344
+ logger$q.warning(`IdentityClient: failed refreshing token for client ID: ${clientId}: ${err}`);
16323
16345
  throw err;
16324
16346
  }
16325
16347
  }
@@ -16427,9 +16449,9 @@ ${errorDetail}`);
16427
16449
  }
16428
16450
  const base64Metadata = accessToken.split(".")[1];
16429
16451
  const { appid, upn, tid, oid } = JSON.parse(Buffer.from(base64Metadata, "base64").toString("utf8"));
16430
- logger$p.info(`[Authenticated account] Client ID: ${appid}. Tenant ID: ${tid}. User Principal Name: ${upn || unavailableUpn}. Object ID (user): ${oid}`);
16452
+ logger$q.info(`[Authenticated account] Client ID: ${appid}. Tenant ID: ${tid}. User Principal Name: ${upn || unavailableUpn}. Object ID (user): ${oid}`);
16431
16453
  } catch (e) {
16432
- logger$p.warning("allowLoggingAccountIdentifiers was set, but we couldn't log the account information. Error:", e.message);
16454
+ logger$q.warning("allowLoggingAccountIdentifiers was set, but we couldn't log the account information. Error:", e.message);
16433
16455
  }
16434
16456
  }
16435
16457
  };
@@ -16437,7 +16459,7 @@ ${errorDetail}`);
16437
16459
  var IdentityClient = _IdentityClient;
16438
16460
  var CommonTenantId = "common";
16439
16461
  var AzureAccountClientId = "aebc6443-996d-45c2-90f0-388ff96faa56";
16440
- var logger$o = credentialLogger("VisualStudioCodeCredential");
16462
+ var logger$p = credentialLogger("VisualStudioCodeCredential");
16441
16463
  var findCredentials = void 0;
16442
16464
  var vsCodeCredentialControl = {
16443
16465
  setVsCodeCredentialFinder(finder) {
@@ -16484,7 +16506,7 @@ ${errorDetail}`);
16484
16506
  return;
16485
16507
  }
16486
16508
  } catch (e) {
16487
- logger$o.info(`Failed to load the Visual Studio Code configuration file. Error: ${e.message}`);
16509
+ logger$p.info(`Failed to load the Visual Studio Code configuration file. Error: ${e.message}`);
16488
16510
  return;
16489
16511
  }
16490
16512
  }
@@ -16505,7 +16527,7 @@ ${errorDetail}`);
16505
16527
  const authorityHost = mapVSCodeAuthorityHosts[this.cloudName];
16506
16528
  this.identityClient = new IdentityClient(Object.assign({ authorityHost }, options));
16507
16529
  if (options && options.tenantId) {
16508
- checkTenantId(logger$o, options.tenantId);
16530
+ checkTenantId(logger$p, options.tenantId);
16509
16531
  this.tenantId = options.tenantId;
16510
16532
  } else {
16511
16533
  this.tenantId = CommonTenantId;
@@ -16543,7 +16565,7 @@ ${errorDetail}`);
16543
16565
  async getToken(scopes, options) {
16544
16566
  var _a2, _b2;
16545
16567
  await this.prepareOnce();
16546
- const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds, logger$o) || this.tenantId;
16568
+ const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds, logger$p) || this.tenantId;
16547
16569
  if (findCredentials === void 0) {
16548
16570
  throw new CredentialUnavailableError([
16549
16571
  "No implementation of `VisualStudioCodeCredential` is available.",
@@ -16556,7 +16578,7 @@ ${errorDetail}`);
16556
16578
  let scopeString = typeof scopes === "string" ? scopes : scopes.join(" ");
16557
16579
  if (!scopeString.match(/^[0-9a-zA-Z-.:/]+$/)) {
16558
16580
  const error = new Error("Invalid scope was specified by the user or calling client");
16559
- logger$o.getToken.info(formatError(scopes, error));
16581
+ logger$p.getToken.info(formatError(scopes, error));
16560
16582
  throw error;
16561
16583
  }
16562
16584
  if (scopeString.indexOf("offline_access") < 0) {
@@ -16567,16 +16589,16 @@ ${errorDetail}`);
16567
16589
  if (refreshToken) {
16568
16590
  const tokenResponse = await this.identityClient.refreshAccessToken(tenantId, AzureAccountClientId, scopeString, refreshToken, void 0);
16569
16591
  if (tokenResponse) {
16570
- logger$o.getToken.info(formatSuccess(scopes));
16592
+ logger$p.getToken.info(formatSuccess(scopes));
16571
16593
  return tokenResponse.accessToken;
16572
16594
  } else {
16573
16595
  const error = new CredentialUnavailableError("Could not retrieve the token associated with Visual Studio Code. Have you connected using the 'Azure Account' extension recently? To troubleshoot, visit https://aka.ms/azsdk/js/identity/vscodecredential/troubleshoot.");
16574
- logger$o.getToken.info(formatError(scopes, error));
16596
+ logger$p.getToken.info(formatError(scopes, error));
16575
16597
  throw error;
16576
16598
  }
16577
16599
  } else {
16578
16600
  const error = new CredentialUnavailableError("Could not retrieve the token associated with Visual Studio Code. Did you connect using the 'Azure Account' extension? To troubleshoot, visit https://aka.ms/azsdk/js/identity/vscodecredential/troubleshoot.");
16579
- logger$o.getToken.info(formatError(scopes, error));
16601
+ logger$p.getToken.info(formatError(scopes, error));
16580
16602
  throw error;
16581
16603
  }
16582
16604
  }
@@ -16593,7 +16615,7 @@ ${errorDetail}`);
16593
16615
  }
16594
16616
  __name(useIdentityPlugin2, "useIdentityPlugin");
16595
16617
  var msiName$6 = "ManagedIdentityCredential - AppServiceMSI 2017";
16596
- var logger$n = credentialLogger(msiName$6);
16618
+ var logger$o = credentialLogger(msiName$6);
16597
16619
  function prepareRequestOptions$5(scopes, clientId) {
16598
16620
  const resource = mapScopesToResource(scopes);
16599
16621
  if (!resource) {
@@ -16628,22 +16650,22 @@ ${errorDetail}`);
16628
16650
  async isAvailable({ scopes }) {
16629
16651
  const resource = mapScopesToResource(scopes);
16630
16652
  if (!resource) {
16631
- logger$n.info(`${msiName$6}: Unavailable. Multiple scopes are not supported.`);
16653
+ logger$o.info(`${msiName$6}: Unavailable. Multiple scopes are not supported.`);
16632
16654
  return false;
16633
16655
  }
16634
16656
  const env = process.env;
16635
16657
  const result = Boolean(env.MSI_ENDPOINT && env.MSI_SECRET);
16636
16658
  if (!result) {
16637
- logger$n.info(`${msiName$6}: Unavailable. The environment variables needed are: MSI_ENDPOINT and MSI_SECRET.`);
16659
+ logger$o.info(`${msiName$6}: Unavailable. The environment variables needed are: MSI_ENDPOINT and MSI_SECRET.`);
16638
16660
  }
16639
16661
  return result;
16640
16662
  },
16641
16663
  async getToken(configuration, getTokenOptions = {}) {
16642
16664
  const { identityClient, scopes, clientId, resourceId } = configuration;
16643
16665
  if (resourceId) {
16644
- logger$n.warning(`${msiName$6}: managed Identity by resource Id is not supported. Argument resourceId might be ignored by the service.`);
16666
+ logger$o.warning(`${msiName$6}: managed Identity by resource Id is not supported. Argument resourceId might be ignored by the service.`);
16645
16667
  }
16646
- logger$n.info(`${msiName$6}: Using the endpoint and the secret coming form the environment variables: MSI_ENDPOINT=${process.env.MSI_ENDPOINT} and MSI_SECRET=[REDACTED].`);
16668
+ logger$o.info(`${msiName$6}: Using the endpoint and the secret coming form the environment variables: MSI_ENDPOINT=${process.env.MSI_ENDPOINT} and MSI_SECRET=[REDACTED].`);
16647
16669
  const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({ abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$5(scopes, clientId)), {
16648
16670
  // Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
16649
16671
  allowInsecureConnection: true
@@ -16653,7 +16675,7 @@ ${errorDetail}`);
16653
16675
  }
16654
16676
  };
16655
16677
  var msiName$5 = "ManagedIdentityCredential - AppServiceMSI 2019";
16656
- var logger$m = credentialLogger(msiName$5);
16678
+ var logger$n = credentialLogger(msiName$5);
16657
16679
  function prepareRequestOptions$4(scopes, clientId, resourceId) {
16658
16680
  const resource = mapScopesToResource(scopes);
16659
16681
  if (!resource) {
@@ -16691,19 +16713,19 @@ ${errorDetail}`);
16691
16713
  async isAvailable({ scopes }) {
16692
16714
  const resource = mapScopesToResource(scopes);
16693
16715
  if (!resource) {
16694
- logger$m.info(`${msiName$5}: Unavailable. Multiple scopes are not supported.`);
16716
+ logger$n.info(`${msiName$5}: Unavailable. Multiple scopes are not supported.`);
16695
16717
  return false;
16696
16718
  }
16697
16719
  const env = process.env;
16698
16720
  const result = Boolean(env.IDENTITY_ENDPOINT && env.IDENTITY_HEADER);
16699
16721
  if (!result) {
16700
- logger$m.info(`${msiName$5}: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT and IDENTITY_HEADER.`);
16722
+ logger$n.info(`${msiName$5}: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT and IDENTITY_HEADER.`);
16701
16723
  }
16702
16724
  return result;
16703
16725
  },
16704
16726
  async getToken(configuration, getTokenOptions = {}) {
16705
16727
  const { identityClient, scopes, clientId, resourceId } = configuration;
16706
- logger$m.info(`${msiName$5}: Using the endpoint and the secret coming form the environment variables: IDENTITY_ENDPOINT=${process.env.IDENTITY_ENDPOINT} and IDENTITY_HEADER=[REDACTED].`);
16728
+ logger$n.info(`${msiName$5}: Using the endpoint and the secret coming form the environment variables: IDENTITY_ENDPOINT=${process.env.IDENTITY_ENDPOINT} and IDENTITY_HEADER=[REDACTED].`);
16707
16729
  const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({ abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$4(scopes, clientId, resourceId)), {
16708
16730
  // Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
16709
16731
  allowInsecureConnection: true
@@ -16713,7 +16735,7 @@ ${errorDetail}`);
16713
16735
  }
16714
16736
  };
16715
16737
  var msiName$4 = "ManagedIdentityCredential - Azure Arc MSI";
16716
- var logger$l = credentialLogger(msiName$4);
16738
+ var logger$m = credentialLogger(msiName$4);
16717
16739
  function prepareRequestOptions$3(scopes, clientId, resourceId) {
16718
16740
  const resource = mapScopesToResource(scopes);
16719
16741
  if (!resource) {
@@ -16797,12 +16819,12 @@ ${errorDetail}`);
16797
16819
  async isAvailable({ scopes }) {
16798
16820
  const resource = mapScopesToResource(scopes);
16799
16821
  if (!resource) {
16800
- logger$l.info(`${msiName$4}: Unavailable. Multiple scopes are not supported.`);
16822
+ logger$m.info(`${msiName$4}: Unavailable. Multiple scopes are not supported.`);
16801
16823
  return false;
16802
16824
  }
16803
16825
  const result = Boolean(process.env.IMDS_ENDPOINT && process.env.IDENTITY_ENDPOINT);
16804
16826
  if (!result) {
16805
- logger$l.info(`${msiName$4}: The environment variables needed are: IMDS_ENDPOINT and IDENTITY_ENDPOINT`);
16827
+ logger$m.info(`${msiName$4}: The environment variables needed are: IMDS_ENDPOINT and IDENTITY_ENDPOINT`);
16806
16828
  }
16807
16829
  return result;
16808
16830
  },
@@ -16810,12 +16832,12 @@ ${errorDetail}`);
16810
16832
  var _a2;
16811
16833
  const { identityClient, scopes, clientId, resourceId } = configuration;
16812
16834
  if (clientId) {
16813
- logger$l.warning(`${msiName$4}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
16835
+ logger$m.warning(`${msiName$4}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
16814
16836
  }
16815
16837
  if (resourceId) {
16816
- logger$l.warning(`${msiName$4}: user defined managed Identity by resource Id is not supported. Argument resourceId will be ignored.`);
16838
+ logger$m.warning(`${msiName$4}: user defined managed Identity by resource Id is not supported. Argument resourceId will be ignored.`);
16817
16839
  }
16818
- logger$l.info(`${msiName$4}: Authenticating.`);
16840
+ logger$m.info(`${msiName$4}: Authenticating.`);
16819
16841
  const requestOptions = Object.assign(Object.assign({ disableJsonStringifyOnBody: true, deserializationMapper: void 0, abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$3(scopes, clientId, resourceId)), { allowInsecureConnection: true });
16820
16842
  const filePath = await filePathRequest(identityClient, requestOptions);
16821
16843
  validateKeyFile(filePath);
@@ -16830,7 +16852,7 @@ ${errorDetail}`);
16830
16852
  }
16831
16853
  };
16832
16854
  var msiName$3 = "ManagedIdentityCredential - CloudShellMSI";
16833
- var logger$k = credentialLogger(msiName$3);
16855
+ var logger$l = credentialLogger(msiName$3);
16834
16856
  function prepareRequestOptions$2(scopes, clientId, resourceId) {
16835
16857
  const resource = mapScopesToResource(scopes);
16836
16858
  if (!resource) {
@@ -16866,24 +16888,24 @@ ${errorDetail}`);
16866
16888
  async isAvailable({ scopes }) {
16867
16889
  const resource = mapScopesToResource(scopes);
16868
16890
  if (!resource) {
16869
- logger$k.info(`${msiName$3}: Unavailable. Multiple scopes are not supported.`);
16891
+ logger$l.info(`${msiName$3}: Unavailable. Multiple scopes are not supported.`);
16870
16892
  return false;
16871
16893
  }
16872
16894
  const result = Boolean(process.env.MSI_ENDPOINT);
16873
16895
  if (!result) {
16874
- logger$k.info(`${msiName$3}: Unavailable. The environment variable MSI_ENDPOINT is needed.`);
16896
+ logger$l.info(`${msiName$3}: Unavailable. The environment variable MSI_ENDPOINT is needed.`);
16875
16897
  }
16876
16898
  return result;
16877
16899
  },
16878
16900
  async getToken(configuration, getTokenOptions = {}) {
16879
16901
  const { identityClient, scopes, clientId, resourceId } = configuration;
16880
16902
  if (clientId) {
16881
- logger$k.warning(`${msiName$3}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
16903
+ logger$l.warning(`${msiName$3}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
16882
16904
  }
16883
16905
  if (resourceId) {
16884
- logger$k.warning(`${msiName$3}: user defined managed Identity by resource Id not supported. The argument resourceId might be ignored by the service.`);
16906
+ logger$l.warning(`${msiName$3}: user defined managed Identity by resource Id not supported. The argument resourceId might be ignored by the service.`);
16885
16907
  }
16886
- logger$k.info(`${msiName$3}: Using the endpoint coming form the environment variable MSI_ENDPOINT = ${process.env.MSI_ENDPOINT}.`);
16908
+ logger$l.info(`${msiName$3}: Using the endpoint coming form the environment variable MSI_ENDPOINT = ${process.env.MSI_ENDPOINT}.`);
16887
16909
  const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({ abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$2(scopes, clientId, resourceId)), {
16888
16910
  // Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
16889
16911
  allowInsecureConnection: true
@@ -16893,7 +16915,7 @@ ${errorDetail}`);
16893
16915
  }
16894
16916
  };
16895
16917
  var msiName$2 = "ManagedIdentityCredential - Fabric MSI";
16896
- var logger$j = credentialLogger(msiName$2);
16918
+ var logger$k = credentialLogger(msiName$2);
16897
16919
  function prepareRequestOptions$1(scopes, clientId, resourceId) {
16898
16920
  const resource = mapScopesToResource(scopes);
16899
16921
  if (!resource) {
@@ -16931,22 +16953,22 @@ ${errorDetail}`);
16931
16953
  async isAvailable({ scopes }) {
16932
16954
  const resource = mapScopesToResource(scopes);
16933
16955
  if (!resource) {
16934
- logger$j.info(`${msiName$2}: Unavailable. Multiple scopes are not supported.`);
16956
+ logger$k.info(`${msiName$2}: Unavailable. Multiple scopes are not supported.`);
16935
16957
  return false;
16936
16958
  }
16937
16959
  const env = process.env;
16938
16960
  const result = Boolean(env.IDENTITY_ENDPOINT && env.IDENTITY_HEADER && env.IDENTITY_SERVER_THUMBPRINT);
16939
16961
  if (!result) {
16940
- logger$j.info(`${msiName$2}: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT, IDENTITY_HEADER and IDENTITY_SERVER_THUMBPRINT`);
16962
+ logger$k.info(`${msiName$2}: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT, IDENTITY_HEADER and IDENTITY_SERVER_THUMBPRINT`);
16941
16963
  }
16942
16964
  return result;
16943
16965
  },
16944
16966
  async getToken(configuration, getTokenOptions = {}) {
16945
16967
  const { scopes, identityClient, clientId, resourceId } = configuration;
16946
16968
  if (resourceId) {
16947
- logger$j.warning(`${msiName$2}: user defined managed Identity by resource Id is not supported. Argument resourceId might be ignored by the service.`);
16969
+ logger$k.warning(`${msiName$2}: user defined managed Identity by resource Id is not supported. Argument resourceId might be ignored by the service.`);
16948
16970
  }
16949
- logger$j.info([
16971
+ logger$k.info([
16950
16972
  `${msiName$2}:`,
16951
16973
  "Using the endpoint and the secret coming from the environment variables:",
16952
16974
  `IDENTITY_ENDPOINT=${process.env.IDENTITY_ENDPOINT},`,
@@ -16963,11 +16985,11 @@ ${errorDetail}`);
16963
16985
  return tokenResponse && tokenResponse.accessToken || null;
16964
16986
  }
16965
16987
  };
16966
- var logger$i = credentialLogger("IdentityUtils");
16988
+ var logger$j = credentialLogger("IdentityUtils");
16967
16989
  var LatestAuthenticationRecordVersion = "1.0";
16968
16990
  function ensureValidMsalToken(scopes, msalToken, getTokenOptions) {
16969
16991
  const error = /* @__PURE__ */ __name((message) => {
16970
- logger$i.getToken.info(message);
16992
+ logger$j.getToken.info(message);
16971
16993
  return new AuthenticationRequiredError({
16972
16994
  scopes: Array.isArray(scopes) ? scopes : [scopes],
16973
16995
  getTokenOptions,
@@ -17049,17 +17071,17 @@ ${errorDetail}`);
17049
17071
  const msalError = error;
17050
17072
  switch (msalError.errorCode) {
17051
17073
  case "endpoints_resolution_error":
17052
- logger$i.info(formatError(scopes, error.message));
17074
+ logger$j.info(formatError(scopes, error.message));
17053
17075
  return new CredentialUnavailableError(error.message);
17054
17076
  case "device_code_polling_cancelled":
17055
17077
  return new abortController.AbortError("The authentication has been aborted by the caller.");
17056
17078
  case "consent_required":
17057
17079
  case "interaction_required":
17058
17080
  case "login_required":
17059
- logger$i.info(formatError(scopes, `Authentication returned errorCode ${msalError.errorCode}`));
17081
+ logger$j.info(formatError(scopes, `Authentication returned errorCode ${msalError.errorCode}`));
17060
17082
  break;
17061
17083
  default:
17062
- logger$i.info(formatError(scopes, `Failed to acquire token: ${error.message}`));
17084
+ logger$j.info(formatError(scopes, `Failed to acquire token: ${error.message}`));
17063
17085
  break;
17064
17086
  }
17065
17087
  }
@@ -17067,7 +17089,7 @@ ${errorDetail}`);
17067
17089
  return error;
17068
17090
  }
17069
17091
  if (error.name === "NativeAuthError") {
17070
- logger$i.info(formatError(scopes, `Error from the native broker: ${error.message} with status code: ${error.statusCode}`));
17092
+ logger$j.info(formatError(scopes, `Error from the native broker: ${error.message} with status code: ${error.statusCode}`));
17071
17093
  return error;
17072
17094
  }
17073
17095
  return new AuthenticationRequiredError({ scopes, getTokenOptions, message: error.message });
@@ -17103,7 +17125,7 @@ ${errorDetail}`);
17103
17125
  }
17104
17126
  __name(deserializeAuthenticationRecord2, "deserializeAuthenticationRecord");
17105
17127
  var msiName$1 = "ManagedIdentityCredential - IMDS";
17106
- var logger$h = credentialLogger(msiName$1);
17128
+ var logger$i = credentialLogger(msiName$1);
17107
17129
  function prepareRequestOptions(scopes, clientId, resourceId, options) {
17108
17130
  var _a2;
17109
17131
  const resource = mapScopesToResource(scopes);
@@ -17147,7 +17169,7 @@ ${errorDetail}`);
17147
17169
  async isAvailable({ scopes, identityClient, clientId, resourceId, getTokenOptions = {} }) {
17148
17170
  const resource = mapScopesToResource(scopes);
17149
17171
  if (!resource) {
17150
- logger$h.info(`${msiName$1}: Unavailable. Multiple scopes are not supported.`);
17172
+ logger$i.info(`${msiName$1}: Unavailable. Multiple scopes are not supported.`);
17151
17173
  return false;
17152
17174
  }
17153
17175
  if (process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) {
@@ -17168,32 +17190,32 @@ ${errorDetail}`);
17168
17190
  request.allowInsecureConnection = true;
17169
17191
  let response;
17170
17192
  try {
17171
- logger$h.info(`${msiName$1}: Pinging the Azure IMDS endpoint`);
17193
+ logger$i.info(`${msiName$1}: Pinging the Azure IMDS endpoint`);
17172
17194
  response = await identityClient.sendRequest(request);
17173
17195
  } catch (err) {
17174
17196
  if (coreUtil.isError(err)) {
17175
- logger$h.verbose(`${msiName$1}: Caught error ${err.name}: ${err.message}`);
17197
+ logger$i.verbose(`${msiName$1}: Caught error ${err.name}: ${err.message}`);
17176
17198
  }
17177
- logger$h.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
17199
+ logger$i.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
17178
17200
  return false;
17179
17201
  }
17180
17202
  if (response.status === 403) {
17181
17203
  if ((_b2 = response.bodyAsText) === null || _b2 === void 0 ? void 0 : _b2.includes("unreachable")) {
17182
- logger$h.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
17183
- logger$h.info(`${msiName$1}: ${response.bodyAsText}`);
17204
+ logger$i.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
17205
+ logger$i.info(`${msiName$1}: ${response.bodyAsText}`);
17184
17206
  return false;
17185
17207
  }
17186
17208
  }
17187
- logger$h.info(`${msiName$1}: The Azure IMDS endpoint is available`);
17209
+ logger$i.info(`${msiName$1}: The Azure IMDS endpoint is available`);
17188
17210
  return true;
17189
17211
  });
17190
17212
  },
17191
17213
  async getToken(configuration, getTokenOptions = {}) {
17192
17214
  const { identityClient, scopes, clientId, resourceId } = configuration;
17193
17215
  if (process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) {
17194
- logger$h.info(`${msiName$1}: Using the Azure IMDS endpoint coming from the environment variable AZURE_POD_IDENTITY_AUTHORITY_HOST=${process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST}.`);
17216
+ logger$i.info(`${msiName$1}: Using the Azure IMDS endpoint coming from the environment variable AZURE_POD_IDENTITY_AUTHORITY_HOST=${process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST}.`);
17195
17217
  } else {
17196
- logger$h.info(`${msiName$1}: Using the default Azure IMDS endpoint ${imdsHost}.`);
17218
+ logger$i.info(`${msiName$1}: Using the default Azure IMDS endpoint ${imdsHost}.`);
17197
17219
  }
17198
17220
  let nextDelayInMs = configuration.retryConfig.startDelayInMs;
17199
17221
  for (let retries = 0; retries < configuration.retryConfig.maxRetries; retries++) {
@@ -17283,9 +17305,9 @@ ${errorDetail}`);
17283
17305
  __name(calculateRegionalAuthority, "calculateRegionalAuthority");
17284
17306
  var msalLogger = credentialLogger("MsalClient");
17285
17307
  function generateMsalConfiguration(clientId, tenantId, msalClientOptions = {}) {
17286
- var _a2, _b2, _c;
17287
- const resolvedTenant = resolveTenantId(msalLogger, tenantId, clientId);
17288
- const authority = getAuthority(resolvedTenant, (_a2 = msalClientOptions.authorityHost) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_AUTHORITY_HOST);
17308
+ var _a2, _b2, _c, _d;
17309
+ const resolvedTenant = resolveTenantId((_a2 = msalClientOptions.logger) !== null && _a2 !== void 0 ? _a2 : msalLogger, tenantId, clientId);
17310
+ const authority = getAuthority(resolvedTenant, (_b2 = msalClientOptions.authorityHost) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_AUTHORITY_HOST);
17289
17311
  const httpClient = new IdentityClient(Object.assign(Object.assign({}, msalClientOptions.tokenCredentialOptions), { authorityHost: authority, loggingOptions: msalClientOptions.loggingOptions }));
17290
17312
  const msalConfig = {
17291
17313
  auth: {
@@ -17296,9 +17318,9 @@ ${errorDetail}`);
17296
17318
  system: {
17297
17319
  networkClient: httpClient,
17298
17320
  loggerOptions: {
17299
- loggerCallback: defaultLoggerCallback((_b2 = msalClientOptions.logger) !== null && _b2 !== void 0 ? _b2 : msalLogger),
17300
- logLevel: getMSALLogLevel(logger$q.getLogLevel()),
17301
- piiLoggingEnabled: (_c = msalClientOptions.loggingOptions) === null || _c === void 0 ? void 0 : _c.enableUnsafeSupportLogging
17321
+ loggerCallback: defaultLoggerCallback((_c = msalClientOptions.logger) !== null && _c !== void 0 ? _c : msalLogger),
17322
+ logLevel: getMSALLogLevel(logger$r.getLogLevel()),
17323
+ piiLoggingEnabled: (_d = msalClientOptions.loggingOptions) === null || _d === void 0 ? void 0 : _d.enableUnsafeSupportLogging
17302
17324
  }
17303
17325
  }
17304
17326
  };
@@ -17306,20 +17328,38 @@ ${errorDetail}`);
17306
17328
  }
17307
17329
  __name(generateMsalConfiguration, "generateMsalConfiguration");
17308
17330
  function createMsalClient(clientId, tenantId, createMsalClientOptions = {}) {
17331
+ var _a2;
17309
17332
  const state = {
17310
17333
  msalConfig: generateMsalConfiguration(clientId, tenantId, createMsalClientOptions),
17311
17334
  cachedAccount: createMsalClientOptions.authenticationRecord ? publicToMsal(createMsalClientOptions.authenticationRecord) : null,
17312
- pluginConfiguration: msalPlugins.generatePluginConfiguration(createMsalClientOptions)
17335
+ pluginConfiguration: msalPlugins.generatePluginConfiguration(createMsalClientOptions),
17336
+ logger: (_a2 = createMsalClientOptions.logger) !== null && _a2 !== void 0 ? _a2 : msalLogger
17313
17337
  };
17338
+ const publicApps = /* @__PURE__ */ new Map();
17339
+ async function getPublicApp(options = {}) {
17340
+ const appKey = options.enableCae ? "CAE" : "default";
17341
+ let publicClientApp = publicApps.get(appKey);
17342
+ if (publicClientApp) {
17343
+ state.logger.getToken.info("Existing PublicClientApplication found in cache, returning it.");
17344
+ return publicClientApp;
17345
+ }
17346
+ state.logger.getToken.info(`Creating new PublicClientApplication with CAE ${options.enableCae ? "enabled" : "disabled"}.`);
17347
+ const cachePlugin = options.enableCae ? state.pluginConfiguration.cache.cachePluginCae : state.pluginConfiguration.cache.cachePlugin;
17348
+ state.msalConfig.auth.clientCapabilities = options.enableCae ? ["cp1"] : void 0;
17349
+ publicClientApp = new msalCommon__namespace.PublicClientApplication(Object.assign(Object.assign({}, state.msalConfig), { broker: { nativeBrokerPlugin: state.pluginConfiguration.broker.nativeBrokerPlugin }, cache: { cachePlugin: await cachePlugin } }));
17350
+ publicApps.set(appKey, publicClientApp);
17351
+ return publicClientApp;
17352
+ }
17353
+ __name(getPublicApp, "getPublicApp");
17314
17354
  const confidentialApps = /* @__PURE__ */ new Map();
17315
17355
  async function getConfidentialApp(options = {}) {
17316
17356
  const appKey = options.enableCae ? "CAE" : "default";
17317
17357
  let confidentialClientApp = confidentialApps.get(appKey);
17318
17358
  if (confidentialClientApp) {
17319
- msalLogger.getToken.info("Existing ConfidentialClientApplication found in cache, returning it.");
17359
+ state.logger.getToken.info("Existing ConfidentialClientApplication found in cache, returning it.");
17320
17360
  return confidentialClientApp;
17321
17361
  }
17322
- msalLogger.getToken.info(`Creating new ConfidentialClientApplication with CAE ${options.enableCae ? "enabled" : "disabled"}.`);
17362
+ state.logger.getToken.info(`Creating new ConfidentialClientApplication with CAE ${options.enableCae ? "enabled" : "disabled"}.`);
17323
17363
  const cachePlugin = options.enableCae ? state.pluginConfiguration.cache.cachePluginCae : state.pluginConfiguration.cache.cachePlugin;
17324
17364
  state.msalConfig.auth.clientCapabilities = options.enableCae ? ["cp1"] : void 0;
17325
17365
  confidentialClientApp = new msalCommon__namespace.ConfidentialClientApplication(Object.assign(Object.assign({}, state.msalConfig), { broker: { nativeBrokerPlugin: state.pluginConfiguration.broker.nativeBrokerPlugin }, cache: { cachePlugin: await cachePlugin } }));
@@ -17329,14 +17369,14 @@ ${errorDetail}`);
17329
17369
  __name(getConfidentialApp, "getConfidentialApp");
17330
17370
  async function getTokenSilent(app, scopes, options = {}) {
17331
17371
  if (state.cachedAccount === null) {
17332
- msalLogger.getToken.info("No cached account found in local state, attempting to load it from MSAL cache.");
17372
+ state.logger.getToken.info("No cached account found in local state, attempting to load it from MSAL cache.");
17333
17373
  const cache = app.getTokenCache();
17334
17374
  const accounts = await cache.getAllAccounts();
17335
17375
  if (accounts === void 0 || accounts.length === 0) {
17336
17376
  throw new AuthenticationRequiredError({ scopes });
17337
17377
  }
17338
17378
  if (accounts.length > 1) {
17339
- msalLogger.info(`More than one account was found authenticated for this Client ID and Tenant ID.
17379
+ state.logger.info(`More than one account was found authenticated for this Client ID and Tenant ID.
17340
17380
  However, no "authenticationRecord" has been provided for this credential,
17341
17381
  therefore we're unable to pick between these accounts.
17342
17382
  A new login attempt will be requested, to ensure the correct account is picked.
@@ -17359,12 +17399,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17359
17399
  silentRequest.tokenQueryParameters["msal_request_type"] = "consumer_passthrough";
17360
17400
  }
17361
17401
  }
17362
- msalLogger.getToken.info("Attempting to acquire token silently");
17402
+ state.logger.getToken.info("Attempting to acquire token silently");
17363
17403
  return app.acquireTokenSilent(silentRequest);
17364
17404
  }
17365
17405
  __name(getTokenSilent, "getTokenSilent");
17366
17406
  async function withSilentAuthentication(msalApp, scopes, options, onAuthenticationRequired) {
17367
- var _a2;
17407
+ var _a3;
17368
17408
  let response = null;
17369
17409
  try {
17370
17410
  response = await getTokenSilent(msalApp, scopes, options);
@@ -17372,7 +17412,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17372
17412
  if (e.name !== "AuthenticationRequiredError") {
17373
17413
  throw e;
17374
17414
  }
17375
- if (createMsalClientOptions.disableAutomaticAuthentication) {
17415
+ if (options.disableAutomaticAuthentication) {
17376
17416
  throw new AuthenticationRequiredError({
17377
17417
  scopes,
17378
17418
  getTokenOptions: options,
@@ -17388,8 +17428,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17388
17428
  }
17389
17429
  }
17390
17430
  ensureValidMsalToken(scopes, response, options);
17391
- state.cachedAccount = (_a2 = response === null || response === void 0 ? void 0 : response.account) !== null && _a2 !== void 0 ? _a2 : null;
17392
- msalLogger.getToken.info(formatSuccess(scopes));
17431
+ state.cachedAccount = (_a3 = response === null || response === void 0 ? void 0 : response.account) !== null && _a3 !== void 0 ? _a3 : null;
17432
+ state.logger.getToken.info(formatSuccess(scopes));
17393
17433
  return {
17394
17434
  token: response.accessToken,
17395
17435
  expiresOnTimestamp: response.expiresOn.getTime()
@@ -17397,50 +17437,148 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17397
17437
  }
17398
17438
  __name(withSilentAuthentication, "withSilentAuthentication");
17399
17439
  async function getTokenByClientSecret(scopes, clientSecret, options = {}) {
17400
- msalLogger.getToken.info(`Attempting to acquire token using client secret`);
17440
+ state.logger.getToken.info(`Attempting to acquire token using client secret`);
17401
17441
  state.msalConfig.auth.clientSecret = clientSecret;
17402
17442
  const msalApp = await getConfidentialApp(options);
17403
- return withSilentAuthentication(msalApp, scopes, options, () => msalApp.acquireTokenByClientCredential({
17404
- scopes,
17405
- authority: state.msalConfig.auth.authority,
17406
- azureRegion: calculateRegionalAuthority(),
17407
- claims: options === null || options === void 0 ? void 0 : options.claims
17408
- }));
17443
+ try {
17444
+ const response = await msalApp.acquireTokenByClientCredential({
17445
+ scopes,
17446
+ authority: state.msalConfig.auth.authority,
17447
+ azureRegion: calculateRegionalAuthority(),
17448
+ claims: options === null || options === void 0 ? void 0 : options.claims
17449
+ });
17450
+ ensureValidMsalToken(scopes, response, options);
17451
+ state.logger.getToken.info(formatSuccess(scopes));
17452
+ return {
17453
+ token: response.accessToken,
17454
+ expiresOnTimestamp: response.expiresOn.getTime()
17455
+ };
17456
+ } catch (err) {
17457
+ throw handleMsalError(scopes, err, options);
17458
+ }
17409
17459
  }
17410
17460
  __name(getTokenByClientSecret, "getTokenByClientSecret");
17411
17461
  async function getTokenByClientAssertion(scopes, clientAssertion, options = {}) {
17412
- msalLogger.getToken.info(`Attempting to acquire token using client assertion`);
17462
+ state.logger.getToken.info(`Attempting to acquire token using client assertion`);
17413
17463
  state.msalConfig.auth.clientAssertion = clientAssertion;
17414
17464
  const msalApp = await getConfidentialApp(options);
17415
- return withSilentAuthentication(msalApp, scopes, options, () => msalApp.acquireTokenByClientCredential({
17416
- scopes,
17417
- authority: state.msalConfig.auth.authority,
17418
- azureRegion: calculateRegionalAuthority(),
17419
- claims: options === null || options === void 0 ? void 0 : options.claims,
17420
- clientAssertion
17421
- }));
17465
+ try {
17466
+ const response = await msalApp.acquireTokenByClientCredential({
17467
+ scopes,
17468
+ authority: state.msalConfig.auth.authority,
17469
+ azureRegion: calculateRegionalAuthority(),
17470
+ claims: options === null || options === void 0 ? void 0 : options.claims,
17471
+ clientAssertion
17472
+ });
17473
+ ensureValidMsalToken(scopes, response, options);
17474
+ state.logger.getToken.info(formatSuccess(scopes));
17475
+ return {
17476
+ token: response.accessToken,
17477
+ expiresOnTimestamp: response.expiresOn.getTime()
17478
+ };
17479
+ } catch (err) {
17480
+ throw handleMsalError(scopes, err, options);
17481
+ }
17422
17482
  }
17423
17483
  __name(getTokenByClientAssertion, "getTokenByClientAssertion");
17424
17484
  async function getTokenByClientCertificate(scopes, certificate, options = {}) {
17425
- msalLogger.getToken.info(`Attempting to acquire token using client certificate`);
17485
+ state.logger.getToken.info(`Attempting to acquire token using client certificate`);
17426
17486
  state.msalConfig.auth.clientCertificate = certificate;
17427
17487
  const msalApp = await getConfidentialApp(options);
17428
- return withSilentAuthentication(msalApp, scopes, options, () => msalApp.acquireTokenByClientCredential({
17429
- scopes,
17430
- azureRegion: calculateRegionalAuthority(),
17431
- authority: state.msalConfig.auth.authority,
17432
- claims: options === null || options === void 0 ? void 0 : options.claims
17433
- }));
17488
+ try {
17489
+ const response = await msalApp.acquireTokenByClientCredential({
17490
+ scopes,
17491
+ authority: state.msalConfig.auth.authority,
17492
+ azureRegion: calculateRegionalAuthority(),
17493
+ claims: options === null || options === void 0 ? void 0 : options.claims
17494
+ });
17495
+ ensureValidMsalToken(scopes, response, options);
17496
+ state.logger.getToken.info(formatSuccess(scopes));
17497
+ return {
17498
+ token: response.accessToken,
17499
+ expiresOnTimestamp: response.expiresOn.getTime()
17500
+ };
17501
+ } catch (err) {
17502
+ throw handleMsalError(scopes, err, options);
17503
+ }
17434
17504
  }
17435
17505
  __name(getTokenByClientCertificate, "getTokenByClientCertificate");
17506
+ async function getTokenByDeviceCode(scopes, deviceCodeCallback, options = {}) {
17507
+ state.logger.getToken.info(`Attempting to acquire token using device code`);
17508
+ const msalApp = await getPublicApp(options);
17509
+ return withSilentAuthentication(msalApp, scopes, options, () => {
17510
+ var _a3, _b2;
17511
+ const requestOptions = {
17512
+ scopes,
17513
+ cancel: (_b2 = (_a3 = options === null || options === void 0 ? void 0 : options.abortSignal) === null || _a3 === void 0 ? void 0 : _a3.aborted) !== null && _b2 !== void 0 ? _b2 : false,
17514
+ deviceCodeCallback,
17515
+ authority: state.msalConfig.auth.authority,
17516
+ claims: options === null || options === void 0 ? void 0 : options.claims
17517
+ };
17518
+ const deviceCodeRequest = msalApp.acquireTokenByDeviceCode(requestOptions);
17519
+ if (options.abortSignal) {
17520
+ options.abortSignal.addEventListener("abort", () => {
17521
+ requestOptions.cancel = true;
17522
+ });
17523
+ }
17524
+ return deviceCodeRequest;
17525
+ });
17526
+ }
17527
+ __name(getTokenByDeviceCode, "getTokenByDeviceCode");
17528
+ async function getTokenByUsernamePassword(scopes, username, password, options = {}) {
17529
+ state.logger.getToken.info(`Attempting to acquire token using username and password`);
17530
+ const msalApp = await getPublicApp(options);
17531
+ return withSilentAuthentication(msalApp, scopes, options, () => {
17532
+ const requestOptions = {
17533
+ scopes,
17534
+ username,
17535
+ password,
17536
+ authority: state.msalConfig.auth.authority,
17537
+ claims: options === null || options === void 0 ? void 0 : options.claims
17538
+ };
17539
+ return msalApp.acquireTokenByUsernamePassword(requestOptions);
17540
+ });
17541
+ }
17542
+ __name(getTokenByUsernamePassword, "getTokenByUsernamePassword");
17543
+ function getActiveAccount() {
17544
+ if (!state.cachedAccount) {
17545
+ return void 0;
17546
+ }
17547
+ return msalToPublic(clientId, state.cachedAccount);
17548
+ }
17549
+ __name(getActiveAccount, "getActiveAccount");
17550
+ async function getTokenByAuthorizationCode(scopes, redirectUri, authorizationCode, clientSecret, options = {}) {
17551
+ state.logger.getToken.info(`Attempting to acquire token using authorization code`);
17552
+ let msalApp;
17553
+ if (clientSecret) {
17554
+ state.msalConfig.auth.clientSecret = clientSecret;
17555
+ msalApp = await getConfidentialApp(options);
17556
+ } else {
17557
+ msalApp = await getPublicApp(options);
17558
+ }
17559
+ return withSilentAuthentication(msalApp, scopes, options, () => {
17560
+ return msalApp.acquireTokenByCode({
17561
+ scopes,
17562
+ redirectUri,
17563
+ code: authorizationCode,
17564
+ authority: state.msalConfig.auth.authority,
17565
+ claims: options === null || options === void 0 ? void 0 : options.claims
17566
+ });
17567
+ });
17568
+ }
17569
+ __name(getTokenByAuthorizationCode, "getTokenByAuthorizationCode");
17436
17570
  return {
17571
+ getActiveAccount,
17437
17572
  getTokenByClientSecret,
17438
17573
  getTokenByClientAssertion,
17439
- getTokenByClientCertificate
17574
+ getTokenByClientCertificate,
17575
+ getTokenByDeviceCode,
17576
+ getTokenByUsernamePassword,
17577
+ getTokenByAuthorizationCode
17440
17578
  };
17441
17579
  }
17442
17580
  __name(createMsalClient, "createMsalClient");
17443
- var logger$g = credentialLogger("ClientAssertionCredential");
17581
+ var logger$h = credentialLogger("ClientAssertionCredential");
17444
17582
  var _ClientAssertionCredential = class _ClientAssertionCredential {
17445
17583
  /**
17446
17584
  * Creates an instance of the ClientAssertionCredential with the details
@@ -17460,7 +17598,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17460
17598
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
17461
17599
  this.options = options;
17462
17600
  this.getAssertion = getAssertion;
17463
- this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$g, tokenCredentialOptions: this.options }));
17601
+ this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$h, tokenCredentialOptions: this.options }));
17464
17602
  }
17465
17603
  /**
17466
17604
  * Authenticates with Microsoft Entra ID and returns an access token if successful.
@@ -17472,7 +17610,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17472
17610
  */
17473
17611
  async getToken(scopes, options = {}) {
17474
17612
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
17475
- newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$g);
17613
+ newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$h);
17476
17614
  const clientAssertion = await this.getAssertion();
17477
17615
  const arrayScopes = Array.isArray(scopes) ? scopes : [scopes];
17478
17616
  return this.msalClient.getTokenByClientAssertion(arrayScopes, clientAssertion, newOptions);
@@ -17481,13 +17619,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17481
17619
  };
17482
17620
  __name(_ClientAssertionCredential, "ClientAssertionCredential");
17483
17621
  var ClientAssertionCredential = _ClientAssertionCredential;
17484
- var credentialName$3 = "WorkloadIdentityCredential";
17622
+ var credentialName$4 = "WorkloadIdentityCredential";
17485
17623
  var SupportedWorkloadEnvironmentVariables = [
17486
17624
  "AZURE_TENANT_ID",
17487
17625
  "AZURE_CLIENT_ID",
17488
17626
  "AZURE_FEDERATED_TOKEN_FILE"
17489
17627
  ];
17490
- var logger$f = credentialLogger(credentialName$3);
17628
+ var logger$g = credentialLogger(credentialName$4);
17491
17629
  var _WorkloadIdentityCredential = class _WorkloadIdentityCredential {
17492
17630
  /**
17493
17631
  * WorkloadIdentityCredential supports Microsoft Entra Workload ID on Kubernetes.
@@ -17498,16 +17636,16 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17498
17636
  this.azureFederatedTokenFileContent = void 0;
17499
17637
  this.cacheDate = void 0;
17500
17638
  const assignedEnv = processEnvVars(SupportedWorkloadEnvironmentVariables).assigned.join(", ");
17501
- logger$f.info(`Found the following environment variables: ${assignedEnv}`);
17639
+ logger$g.info(`Found the following environment variables: ${assignedEnv}`);
17502
17640
  const workloadIdentityCredentialOptions = options !== null && options !== void 0 ? options : {};
17503
17641
  const tenantId = workloadIdentityCredentialOptions.tenantId || process.env.AZURE_TENANT_ID;
17504
17642
  const clientId = workloadIdentityCredentialOptions.clientId || process.env.AZURE_CLIENT_ID;
17505
17643
  this.federatedTokenFilePath = workloadIdentityCredentialOptions.tokenFilePath || process.env.AZURE_FEDERATED_TOKEN_FILE;
17506
17644
  if (tenantId) {
17507
- checkTenantId(logger$f, tenantId);
17645
+ checkTenantId(logger$g, tenantId);
17508
17646
  }
17509
17647
  if (clientId && tenantId && this.federatedTokenFilePath) {
17510
- logger$f.info(`Invoking ClientAssertionCredential with tenant ID: ${tenantId}, clientId: ${workloadIdentityCredentialOptions.clientId} and federated token path: [REDACTED]`);
17648
+ logger$g.info(`Invoking ClientAssertionCredential with tenant ID: ${tenantId}, clientId: ${workloadIdentityCredentialOptions.clientId} and federated token path: [REDACTED]`);
17511
17649
  this.client = new ClientAssertionCredential(tenantId, clientId, this.readFileContents.bind(this), options);
17512
17650
  }
17513
17651
  }
@@ -17521,15 +17659,15 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17521
17659
  */
17522
17660
  async getToken(scopes, options) {
17523
17661
  if (!this.client) {
17524
- const errorMessage = `${credentialName$3}: is unavailable. tenantId, clientId, and federatedTokenFilePath are required parameters.
17662
+ const errorMessage = `${credentialName$4}: is unavailable. tenantId, clientId, and federatedTokenFilePath are required parameters.
17525
17663
  In DefaultAzureCredential and ManagedIdentityCredential, these can be provided as environment variables -
17526
17664
  "AZURE_TENANT_ID",
17527
17665
  "AZURE_CLIENT_ID",
17528
17666
  "AZURE_FEDERATED_TOKEN_FILE". See the troubleshooting guide for more information: https://aka.ms/azsdk/js/identity/workloadidentitycredential/troubleshoot `;
17529
- logger$f.info(errorMessage);
17667
+ logger$g.info(errorMessage);
17530
17668
  throw new CredentialUnavailableError(errorMessage);
17531
17669
  }
17532
- logger$f.info("Invoking getToken() of Client Assertion Credential");
17670
+ logger$g.info("Invoking getToken() of Client Assertion Credential");
17533
17671
  return this.client.getToken(scopes, options);
17534
17672
  }
17535
17673
  async readFileContents() {
@@ -17537,13 +17675,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17537
17675
  this.azureFederatedTokenFileContent = void 0;
17538
17676
  }
17539
17677
  if (!this.federatedTokenFilePath) {
17540
- throw new CredentialUnavailableError(`${credentialName$3}: is unavailable. Invalid file path provided ${this.federatedTokenFilePath}.`);
17678
+ throw new CredentialUnavailableError(`${credentialName$4}: is unavailable. Invalid file path provided ${this.federatedTokenFilePath}.`);
17541
17679
  }
17542
17680
  if (!this.azureFederatedTokenFileContent) {
17543
17681
  const file = await promises.readFile(this.federatedTokenFilePath, "utf8");
17544
17682
  const value = file.trim();
17545
17683
  if (!value) {
17546
- throw new CredentialUnavailableError(`${credentialName$3}: is unavailable. No content on the file ${this.federatedTokenFilePath}.`);
17684
+ throw new CredentialUnavailableError(`${credentialName$4}: is unavailable. No content on the file ${this.federatedTokenFilePath}.`);
17547
17685
  } else {
17548
17686
  this.azureFederatedTokenFileContent = value;
17549
17687
  this.cacheDate = Date.now();
@@ -17555,7 +17693,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17555
17693
  __name(_WorkloadIdentityCredential, "WorkloadIdentityCredential");
17556
17694
  var WorkloadIdentityCredential = _WorkloadIdentityCredential;
17557
17695
  var msiName = "ManagedIdentityCredential - Token Exchange";
17558
- var logger$e = credentialLogger(msiName);
17696
+ var logger$f = credentialLogger(msiName);
17559
17697
  function tokenExchangeMsi() {
17560
17698
  return {
17561
17699
  name: "tokenExchangeMsi",
@@ -17563,7 +17701,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17563
17701
  const env = process.env;
17564
17702
  const result = Boolean((clientId || env.AZURE_CLIENT_ID) && env.AZURE_TENANT_ID && process.env.AZURE_FEDERATED_TOKEN_FILE);
17565
17703
  if (!result) {
17566
- logger$e.info(`${msiName}: Unavailable. The environment variables needed are: AZURE_CLIENT_ID (or the client ID sent through the parameters), AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE`);
17704
+ logger$f.info(`${msiName}: Unavailable. The environment variables needed are: AZURE_CLIENT_ID (or the client ID sent through the parameters), AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE`);
17567
17705
  }
17568
17706
  return result;
17569
17707
  },
@@ -17577,7 +17715,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17577
17715
  };
17578
17716
  }
17579
17717
  __name(tokenExchangeMsi, "tokenExchangeMsi");
17580
- var logger$d = credentialLogger("ManagedIdentityCredential");
17718
+ var logger$e = credentialLogger("ManagedIdentityCredential");
17581
17719
  var _ManagedIdentityCredential = class _ManagedIdentityCredential {
17582
17720
  /**
17583
17721
  * @internal
@@ -17622,7 +17760,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17622
17760
  },
17623
17761
  system: {
17624
17762
  loggerOptions: {
17625
- logLevel: getMSALLogLevel(logger$q.getLogLevel())
17763
+ logLevel: getMSALLogLevel(logger$r.getLogLevel())
17626
17764
  }
17627
17765
  }
17628
17766
  });
@@ -17706,16 +17844,16 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17706
17844
  if (result === null) {
17707
17845
  this.isEndpointUnavailable = true;
17708
17846
  const error = new CredentialUnavailableError("The managed identity endpoint was reached, yet no tokens were received.");
17709
- logger$d.getToken.info(formatError(scopes, error));
17847
+ logger$e.getToken.info(formatError(scopes, error));
17710
17848
  throw error;
17711
17849
  }
17712
17850
  this.isEndpointUnavailable = false;
17713
17851
  } else {
17714
17852
  const error = new CredentialUnavailableError("The managed identity endpoint is not currently available");
17715
- logger$d.getToken.info(formatError(scopes, error));
17853
+ logger$e.getToken.info(formatError(scopes, error));
17716
17854
  throw error;
17717
17855
  }
17718
- logger$d.getToken.info(formatSuccess(scopes));
17856
+ logger$e.getToken.info(formatSuccess(scopes));
17719
17857
  return result;
17720
17858
  } catch (err) {
17721
17859
  if (err.name === "AuthenticationRequiredError") {
@@ -17727,12 +17865,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17727
17865
  });
17728
17866
  if (err.code === "ENETUNREACH") {
17729
17867
  const error = new CredentialUnavailableError(`${_ManagedIdentityCredential.name}: Unavailable. Network unreachable. Message: ${err.message}`);
17730
- logger$d.getToken.info(formatError(scopes, error));
17868
+ logger$e.getToken.info(formatError(scopes, error));
17731
17869
  throw error;
17732
17870
  }
17733
17871
  if (err.code === "EHOSTUNREACH") {
17734
17872
  const error = new CredentialUnavailableError(`${_ManagedIdentityCredential.name}: Unavailable. No managed identity endpoint found. Message: ${err.message}`);
17735
- logger$d.getToken.info(formatError(scopes, error));
17873
+ logger$e.getToken.info(formatError(scopes, error));
17736
17874
  throw error;
17737
17875
  }
17738
17876
  if (err.statusCode === 400) {
@@ -17741,7 +17879,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17741
17879
  if (err.statusCode === 403 || err.code === 403) {
17742
17880
  if (err.message.includes("unreachable")) {
17743
17881
  const error = new CredentialUnavailableError(`${_ManagedIdentityCredential.name}: Unavailable. Network unreachable. Message: ${err.message}`);
17744
- logger$d.getToken.info(formatError(scopes, error));
17882
+ logger$e.getToken.info(formatError(scopes, error));
17745
17883
  throw error;
17746
17884
  }
17747
17885
  }
@@ -17763,7 +17901,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17763
17901
  */
17764
17902
  handleResult(scopes, result, getTokenOptions) {
17765
17903
  this.ensureValidMsalToken(scopes, result, getTokenOptions);
17766
- logger$d.getToken.info(formatSuccess(scopes));
17904
+ logger$e.getToken.info(formatSuccess(scopes));
17767
17905
  return {
17768
17906
  token: result.accessToken,
17769
17907
  expiresOnTimestamp: result.expiresOn.getTime()
@@ -17774,7 +17912,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17774
17912
  */
17775
17913
  ensureValidMsalToken(scopes, msalToken, getTokenOptions) {
17776
17914
  const error = /* @__PURE__ */ __name((message) => {
17777
- logger$d.getToken.info(message);
17915
+ logger$e.getToken.info(message);
17778
17916
  return new AuthenticationRequiredError({
17779
17917
  scopes: Array.isArray(scopes) ? scopes : [scopes],
17780
17918
  getTokenOptions,
@@ -17794,19 +17932,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17794
17932
  initializeSetAppTokenProvider() {
17795
17933
  if (!this.isAppTokenProviderInitialized) {
17796
17934
  this.confidentialApp.SetAppTokenProvider(async (appTokenProviderParameters) => {
17797
- logger$d.info(`SetAppTokenProvider invoked with parameters- ${JSON.stringify(appTokenProviderParameters)}`);
17935
+ logger$e.info(`SetAppTokenProvider invoked with parameters- ${JSON.stringify(appTokenProviderParameters)}`);
17798
17936
  const getTokenOptions = Object.assign({}, appTokenProviderParameters);
17799
- logger$d.info(`authenticateManagedIdentity invoked with scopes- ${JSON.stringify(appTokenProviderParameters.scopes)} and getTokenOptions - ${JSON.stringify(getTokenOptions)}`);
17937
+ logger$e.info(`authenticateManagedIdentity invoked with scopes- ${JSON.stringify(appTokenProviderParameters.scopes)} and getTokenOptions - ${JSON.stringify(getTokenOptions)}`);
17800
17938
  const resultToken = await this.authenticateManagedIdentity(appTokenProviderParameters.scopes, getTokenOptions);
17801
17939
  if (resultToken) {
17802
- logger$d.info(`SetAppTokenProvider will save the token in cache`);
17940
+ logger$e.info(`SetAppTokenProvider will save the token in cache`);
17803
17941
  const expiresInSeconds = (resultToken === null || resultToken === void 0 ? void 0 : resultToken.expiresOnTimestamp) ? Math.floor((resultToken.expiresOnTimestamp - Date.now()) / 1e3) : 0;
17804
17942
  return {
17805
17943
  accessToken: resultToken === null || resultToken === void 0 ? void 0 : resultToken.token,
17806
17944
  expiresInSeconds
17807
17945
  };
17808
17946
  } else {
17809
- logger$d.info(`SetAppTokenProvider token has "no_access_token_returned" as the saved token`);
17947
+ logger$e.info(`SetAppTokenProvider token has "no_access_token_returned" as the saved token`);
17810
17948
  return {
17811
17949
  accessToken: "no_access_token_returned",
17812
17950
  expiresInSeconds: 0
@@ -17878,7 +18016,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17878
18016
  });
17879
18017
  }
17880
18018
  };
17881
- var logger$c = credentialLogger("AzureCliCredential");
18019
+ var logger$d = credentialLogger("AzureCliCredential");
17882
18020
  var _AzureCliCredential = class _AzureCliCredential {
17883
18021
  /**
17884
18022
  * Creates an instance of the {@link AzureCliCredential}.
@@ -17890,7 +18028,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17890
18028
  */
17891
18029
  constructor(options) {
17892
18030
  if (options === null || options === void 0 ? void 0 : options.tenantId) {
17893
- checkTenantId(logger$c, options === null || options === void 0 ? void 0 : options.tenantId);
18031
+ checkTenantId(logger$d, options === null || options === void 0 ? void 0 : options.tenantId);
17894
18032
  this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
17895
18033
  }
17896
18034
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
@@ -17907,14 +18045,14 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17907
18045
  async getToken(scopes, options = {}) {
17908
18046
  const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds);
17909
18047
  if (tenantId) {
17910
- checkTenantId(logger$c, tenantId);
18048
+ checkTenantId(logger$d, tenantId);
17911
18049
  }
17912
18050
  const scope = typeof scopes === "string" ? scopes : scopes[0];
17913
- logger$c.getToken.info(`Using the scope ${scope}`);
18051
+ logger$d.getToken.info(`Using the scope ${scope}`);
17914
18052
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
17915
18053
  var _a2, _b2, _c, _d;
17916
18054
  try {
17917
- ensureValidScopeForDevTimeCreds(scope, logger$c);
18055
+ ensureValidScopeForDevTimeCreds(scope, logger$d);
17918
18056
  const resource = getScopeResource(scope);
17919
18057
  const obj = await cliCredentialInternals.getAzureCliAccessToken(resource, tenantId, this.timeout);
17920
18058
  const specificScope = (_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("(.*)az login --scope(.*)");
@@ -17922,18 +18060,18 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17922
18060
  const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("az:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'az' is not recognized"));
17923
18061
  if (isNotInstallError) {
17924
18062
  const error = new CredentialUnavailableError("Azure CLI could not be found. Please visit https://aka.ms/azure-cli for installation instructions and then, once installed, authenticate to your Azure account using 'az login'.");
17925
- logger$c.getToken.info(formatError(scopes, error));
18063
+ logger$d.getToken.info(formatError(scopes, error));
17926
18064
  throw error;
17927
18065
  }
17928
18066
  if (isLoginError2) {
17929
18067
  const error = new CredentialUnavailableError("Please run 'az login' from a command prompt to authenticate before using this credential.");
17930
- logger$c.getToken.info(formatError(scopes, error));
18068
+ logger$d.getToken.info(formatError(scopes, error));
17931
18069
  throw error;
17932
18070
  }
17933
18071
  try {
17934
18072
  const responseData = obj.stdout;
17935
18073
  const response = this.parseRawResponse(responseData);
17936
- logger$c.getToken.info(formatSuccess(scopes));
18074
+ logger$d.getToken.info(formatSuccess(scopes));
17937
18075
  return response;
17938
18076
  } catch (e) {
17939
18077
  if (obj.stderr) {
@@ -17943,7 +18081,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17943
18081
  }
17944
18082
  } catch (err) {
17945
18083
  const error = err.name === "CredentialUnavailableError" ? err : new CredentialUnavailableError(err.message || "Unknown error while trying to retrieve the access token");
17946
- logger$c.getToken.info(formatError(scopes, error));
18084
+ logger$d.getToken.info(formatError(scopes, error));
17947
18085
  throw error;
17948
18086
  }
17949
18087
  });
@@ -17963,7 +18101,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
17963
18101
  const token = response.accessToken;
17964
18102
  let expiresOnTimestamp = Number.parseInt(response.expires_on, 10) * 1e3;
17965
18103
  if (!isNaN(expiresOnTimestamp)) {
17966
- logger$c.getToken.info("expires_on is available and is valid, using it");
18104
+ logger$d.getToken.info("expires_on is available and is valid, using it");
17967
18105
  return {
17968
18106
  token,
17969
18107
  expiresOnTimestamp
@@ -18026,7 +18164,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18026
18164
  });
18027
18165
  }
18028
18166
  };
18029
- var logger$b = credentialLogger("AzureDeveloperCliCredential");
18167
+ var logger$c = credentialLogger("AzureDeveloperCliCredential");
18030
18168
  var _AzureDeveloperCliCredential = class _AzureDeveloperCliCredential {
18031
18169
  /**
18032
18170
  * Creates an instance of the {@link AzureDeveloperCliCredential}.
@@ -18038,7 +18176,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18038
18176
  */
18039
18177
  constructor(options) {
18040
18178
  if (options === null || options === void 0 ? void 0 : options.tenantId) {
18041
- checkTenantId(logger$b, options === null || options === void 0 ? void 0 : options.tenantId);
18179
+ checkTenantId(logger$c, options === null || options === void 0 ? void 0 : options.tenantId);
18042
18180
  this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
18043
18181
  }
18044
18182
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
@@ -18055,7 +18193,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18055
18193
  async getToken(scopes, options = {}) {
18056
18194
  const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds);
18057
18195
  if (tenantId) {
18058
- checkTenantId(logger$b, tenantId);
18196
+ checkTenantId(logger$c, tenantId);
18059
18197
  }
18060
18198
  let scopeList;
18061
18199
  if (typeof scopes === "string") {
@@ -18063,29 +18201,29 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18063
18201
  } else {
18064
18202
  scopeList = scopes;
18065
18203
  }
18066
- logger$b.getToken.info(`Using the scopes ${scopes}`);
18204
+ logger$c.getToken.info(`Using the scopes ${scopes}`);
18067
18205
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
18068
18206
  var _a2, _b2, _c, _d;
18069
18207
  try {
18070
18208
  scopeList.forEach((scope) => {
18071
- ensureValidScopeForDevTimeCreds(scope, logger$b);
18209
+ ensureValidScopeForDevTimeCreds(scope, logger$c);
18072
18210
  });
18073
18211
  const obj = await developerCliCredentialInternals.getAzdAccessToken(scopeList, tenantId, this.timeout);
18074
18212
  const isNotLoggedInError = ((_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("not logged in, run `azd login` to login")) || ((_b2 = obj.stderr) === null || _b2 === void 0 ? void 0 : _b2.match("not logged in, run `azd auth login` to login"));
18075
18213
  const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("azd:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'azd' is not recognized"));
18076
18214
  if (isNotInstallError || obj.error && obj.error.code === "ENOENT") {
18077
18215
  const error = new CredentialUnavailableError("Azure Developer CLI couldn't be found. To mitigate this issue, see the troubleshooting guidelines at https://aka.ms/azsdk/js/identity/azdevclicredential/troubleshoot.");
18078
- logger$b.getToken.info(formatError(scopes, error));
18216
+ logger$c.getToken.info(formatError(scopes, error));
18079
18217
  throw error;
18080
18218
  }
18081
18219
  if (isNotLoggedInError) {
18082
18220
  const error = new CredentialUnavailableError("Please run 'azd auth login' from a command prompt to authenticate before using this credential. For more information, see the troubleshooting guidelines at https://aka.ms/azsdk/js/identity/azdevclicredential/troubleshoot.");
18083
- logger$b.getToken.info(formatError(scopes, error));
18221
+ logger$c.getToken.info(formatError(scopes, error));
18084
18222
  throw error;
18085
18223
  }
18086
18224
  try {
18087
18225
  const resp = JSON.parse(obj.stdout);
18088
- logger$b.getToken.info(formatSuccess(scopes));
18226
+ logger$c.getToken.info(formatSuccess(scopes));
18089
18227
  return {
18090
18228
  token: resp.token,
18091
18229
  expiresOnTimestamp: new Date(resp.expiresOn).getTime()
@@ -18098,7 +18236,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18098
18236
  }
18099
18237
  } catch (err) {
18100
18238
  const error = err.name === "CredentialUnavailableError" ? err : new CredentialUnavailableError(err.message || "Unknown error while trying to retrieve the access token");
18101
- logger$b.getToken.info(formatError(scopes, error));
18239
+ logger$c.getToken.info(formatError(scopes, error));
18102
18240
  throw error;
18103
18241
  }
18104
18242
  });
@@ -18129,7 +18267,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18129
18267
  });
18130
18268
  }
18131
18269
  };
18132
- var logger$a = credentialLogger("AzurePowerShellCredential");
18270
+ var logger$b = credentialLogger("AzurePowerShellCredential");
18133
18271
  var isWindows = process.platform === "win32";
18134
18272
  function formatCommand(commandName) {
18135
18273
  if (isWindows) {
@@ -18181,7 +18319,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18181
18319
  */
18182
18320
  constructor(options) {
18183
18321
  if (options === null || options === void 0 ? void 0 : options.tenantId) {
18184
- checkTenantId(logger$a, options === null || options === void 0 ? void 0 : options.tenantId);
18322
+ checkTenantId(logger$b, options === null || options === void 0 ? void 0 : options.tenantId);
18185
18323
  this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
18186
18324
  }
18187
18325
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
@@ -18240,14 +18378,14 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18240
18378
  const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds);
18241
18379
  const scope = typeof scopes === "string" ? scopes : scopes[0];
18242
18380
  if (tenantId) {
18243
- checkTenantId(logger$a, tenantId);
18381
+ checkTenantId(logger$b, tenantId);
18244
18382
  }
18245
18383
  try {
18246
- ensureValidScopeForDevTimeCreds(scope, logger$a);
18247
- logger$a.getToken.info(`Using the scope ${scope}`);
18384
+ ensureValidScopeForDevTimeCreds(scope, logger$b);
18385
+ logger$b.getToken.info(`Using the scope ${scope}`);
18248
18386
  const resource = getScopeResource(scope);
18249
18387
  const response = await this.getAzurePowerShellAccessToken(resource, tenantId, this.timeout);
18250
- logger$a.getToken.info(formatSuccess(scopes));
18388
+ logger$b.getToken.info(formatSuccess(scopes));
18251
18389
  return {
18252
18390
  token: response.Token,
18253
18391
  expiresOnTimestamp: new Date(response.ExpiresOn).getTime()
@@ -18255,15 +18393,15 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18255
18393
  } catch (err) {
18256
18394
  if (isNotInstalledError(err)) {
18257
18395
  const error2 = new CredentialUnavailableError(powerShellPublicErrorMessages.installed);
18258
- logger$a.getToken.info(formatError(scope, error2));
18396
+ logger$b.getToken.info(formatError(scope, error2));
18259
18397
  throw error2;
18260
18398
  } else if (isLoginError(err)) {
18261
18399
  const error2 = new CredentialUnavailableError(powerShellPublicErrorMessages.login);
18262
- logger$a.getToken.info(formatError(scope, error2));
18400
+ logger$b.getToken.info(formatError(scope, error2));
18263
18401
  throw error2;
18264
18402
  }
18265
18403
  const error = new CredentialUnavailableError(`${err}. ${powerShellPublicErrorMessages.troubleshoot}`);
18266
- logger$a.getToken.info(formatError(scope, error));
18404
+ logger$b.getToken.info(formatError(scope, error));
18267
18405
  throw error;
18268
18406
  }
18269
18407
  });
@@ -18271,7 +18409,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18271
18409
  };
18272
18410
  __name(_AzurePowerShellCredential, "AzurePowerShellCredential");
18273
18411
  var AzurePowerShellCredential = _AzurePowerShellCredential;
18274
- var logger$9 = credentialLogger("ChainedTokenCredential");
18412
+ var logger$a = credentialLogger("ChainedTokenCredential");
18275
18413
  var _ChainedTokenCredential = class _ChainedTokenCredential {
18276
18414
  /**
18277
18415
  * Creates an instance of ChainedTokenCredential using the given credentials.
@@ -18319,17 +18457,17 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18319
18457
  if (err.name === "CredentialUnavailableError" || err.name === "AuthenticationRequiredError") {
18320
18458
  errors.push(err);
18321
18459
  } else {
18322
- logger$9.getToken.info(formatError(scopes, err));
18460
+ logger$a.getToken.info(formatError(scopes, err));
18323
18461
  throw err;
18324
18462
  }
18325
18463
  }
18326
18464
  }
18327
18465
  if (!token && errors.length > 0) {
18328
18466
  const err = new AggregateAuthenticationError(errors, "ChainedTokenCredential authentication failed.");
18329
- logger$9.getToken.info(formatError(scopes, err));
18467
+ logger$a.getToken.info(formatError(scopes, err));
18330
18468
  throw err;
18331
18469
  }
18332
- logger$9.getToken.info(`Result for ${successfulCredential.constructor.name}: ${formatSuccess(scopes)}`);
18470
+ logger$a.getToken.info(`Result for ${successfulCredential.constructor.name}: ${formatSuccess(scopes)}`);
18333
18471
  if (token === null) {
18334
18472
  throw new CredentialUnavailableError("Failed to retrieve a valid token");
18335
18473
  }
@@ -18339,12 +18477,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18339
18477
  };
18340
18478
  __name(_ChainedTokenCredential, "ChainedTokenCredential");
18341
18479
  var ChainedTokenCredential = _ChainedTokenCredential;
18342
- var credentialName$2 = "ClientCertificateCredential";
18343
- var logger$8 = credentialLogger(credentialName$2);
18480
+ var credentialName$3 = "ClientCertificateCredential";
18481
+ var logger$9 = credentialLogger(credentialName$3);
18344
18482
  var _ClientCertificateCredential = class _ClientCertificateCredential {
18345
18483
  constructor(tenantId, clientId, certificatePathOrConfiguration, options = {}) {
18346
18484
  if (!tenantId || !clientId) {
18347
- throw new Error(`${credentialName$2}: tenantId and clientId are required parameters.`);
18485
+ throw new Error(`${credentialName$3}: tenantId and clientId are required parameters.`);
18348
18486
  }
18349
18487
  this.tenantId = tenantId;
18350
18488
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
@@ -18355,12 +18493,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18355
18493
  const certificate = this.certificateConfiguration.certificate;
18356
18494
  const certificatePath = this.certificateConfiguration.certificatePath;
18357
18495
  if (!this.certificateConfiguration || !(certificate || certificatePath)) {
18358
- throw new Error(`${credentialName$2}: Provide either a PEM certificate in string form, or the path to that certificate in the filesystem. To troubleshoot, visit https://aka.ms/azsdk/js/identity/serviceprincipalauthentication/troubleshoot.`);
18496
+ throw new Error(`${credentialName$3}: Provide either a PEM certificate in string form, or the path to that certificate in the filesystem. To troubleshoot, visit https://aka.ms/azsdk/js/identity/serviceprincipalauthentication/troubleshoot.`);
18359
18497
  }
18360
18498
  if (certificate && certificatePath) {
18361
- throw new Error(`${credentialName$2}: To avoid unexpected behaviors, providing both the contents of a PEM certificate and the path to a PEM certificate is forbidden. To troubleshoot, visit https://aka.ms/azsdk/js/identity/serviceprincipalauthentication/troubleshoot.`);
18499
+ throw new Error(`${credentialName$3}: To avoid unexpected behaviors, providing both the contents of a PEM certificate and the path to a PEM certificate is forbidden. To troubleshoot, visit https://aka.ms/azsdk/js/identity/serviceprincipalauthentication/troubleshoot.`);
18362
18500
  }
18363
- this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$8, tokenCredentialOptions: options }));
18501
+ this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$9, tokenCredentialOptions: options }));
18364
18502
  }
18365
18503
  /**
18366
18504
  * Authenticates with Microsoft Entra ID and returns an access token if successful.
@@ -18371,8 +18509,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18371
18509
  * TokenCredential implementation might make.
18372
18510
  */
18373
18511
  async getToken(scopes, options = {}) {
18374
- return tracingClient.withSpan(`${credentialName$2}.getToken`, options, async (newOptions) => {
18375
- newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$8);
18512
+ return tracingClient.withSpan(`${credentialName$3}.getToken`, options, async (newOptions) => {
18513
+ newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$9);
18376
18514
  const arrayScopes = Array.isArray(scopes) ? scopes : [scopes];
18377
18515
  const certificate = await this.buildClientCertificate();
18378
18516
  return this.msalClient.getTokenByClientCertificate(arrayScopes, certificate, newOptions);
@@ -18426,7 +18564,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18426
18564
  };
18427
18565
  __name(_ClientCertificateCredential, "ClientCertificateCredential");
18428
18566
  var ClientCertificateCredential = _ClientCertificateCredential;
18429
- var logger$7 = credentialLogger("ClientSecretCredential");
18567
+ var logger$8 = credentialLogger("ClientSecretCredential");
18430
18568
  var _ClientSecretCredential = class _ClientSecretCredential {
18431
18569
  /**
18432
18570
  * Creates an instance of the ClientSecretCredential with the details
@@ -18445,7 +18583,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18445
18583
  this.clientSecret = clientSecret;
18446
18584
  this.tenantId = tenantId;
18447
18585
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
18448
- this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$7, tokenCredentialOptions: options }));
18586
+ this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$8, tokenCredentialOptions: options }));
18449
18587
  }
18450
18588
  /**
18451
18589
  * Authenticates with Microsoft Entra ID and returns an access token if successful.
@@ -18457,7 +18595,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18457
18595
  */
18458
18596
  async getToken(scopes, options = {}) {
18459
18597
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
18460
- newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$7);
18598
+ newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$8);
18461
18599
  const arrayScopes = ensureScopes(scopes);
18462
18600
  return this.msalClient.getTokenByClientSecret(arrayScopes, this.clientSecret, newOptions);
18463
18601
  });
@@ -18465,6 +18603,249 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18465
18603
  };
18466
18604
  __name(_ClientSecretCredential, "ClientSecretCredential");
18467
18605
  var ClientSecretCredential = _ClientSecretCredential;
18606
+ var logger$7 = credentialLogger("UsernamePasswordCredential");
18607
+ var _UsernamePasswordCredential = class _UsernamePasswordCredential {
18608
+ /**
18609
+ * Creates an instance of the UsernamePasswordCredential with the details
18610
+ * needed to authenticate against Microsoft Entra ID with a username
18611
+ * and password.
18612
+ *
18613
+ * @param tenantId - The Microsoft Entra tenant (directory).
18614
+ * @param clientId - The client (application) ID of an App Registration in the tenant.
18615
+ * @param username - The user account's e-mail address (user name).
18616
+ * @param password - The user account's account password
18617
+ * @param options - Options for configuring the client which makes the authentication request.
18618
+ */
18619
+ constructor(tenantId, clientId, username, password, options = {}) {
18620
+ if (!tenantId || !clientId || !username || !password) {
18621
+ throw new Error("UsernamePasswordCredential: tenantId, clientId, username and password are required parameters. To troubleshoot, visit https://aka.ms/azsdk/js/identity/usernamepasswordcredential/troubleshoot.");
18622
+ }
18623
+ this.tenantId = tenantId;
18624
+ this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
18625
+ this.username = username;
18626
+ this.password = password;
18627
+ this.msalClient = createMsalClient(clientId, this.tenantId, Object.assign(Object.assign({}, options), { tokenCredentialOptions: options !== null && options !== void 0 ? options : {} }));
18628
+ }
18629
+ /**
18630
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
18631
+ * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
18632
+ *
18633
+ * If the user provided the option `disableAutomaticAuthentication`,
18634
+ * once the token can't be retrieved silently,
18635
+ * this method won't attempt to request user interaction to retrieve the token.
18636
+ *
18637
+ * @param scopes - The list of scopes for which the token will have access.
18638
+ * @param options - The options used to configure any requests this
18639
+ * TokenCredential implementation might make.
18640
+ */
18641
+ async getToken(scopes, options = {}) {
18642
+ return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
18643
+ newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$7);
18644
+ const arrayScopes = ensureScopes(scopes);
18645
+ return this.msalClient.getTokenByUsernamePassword(arrayScopes, this.username, this.password, newOptions);
18646
+ });
18647
+ }
18648
+ };
18649
+ __name(_UsernamePasswordCredential, "UsernamePasswordCredential");
18650
+ var UsernamePasswordCredential = _UsernamePasswordCredential;
18651
+ var AllSupportedEnvironmentVariables = [
18652
+ "AZURE_TENANT_ID",
18653
+ "AZURE_CLIENT_ID",
18654
+ "AZURE_CLIENT_SECRET",
18655
+ "AZURE_CLIENT_CERTIFICATE_PATH",
18656
+ "AZURE_CLIENT_CERTIFICATE_PASSWORD",
18657
+ "AZURE_USERNAME",
18658
+ "AZURE_PASSWORD",
18659
+ "AZURE_ADDITIONALLY_ALLOWED_TENANTS"
18660
+ ];
18661
+ function getAdditionallyAllowedTenants() {
18662
+ var _a2;
18663
+ const additionallyAllowedValues = (_a2 = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a2 !== void 0 ? _a2 : "";
18664
+ return additionallyAllowedValues.split(";");
18665
+ }
18666
+ __name(getAdditionallyAllowedTenants, "getAdditionallyAllowedTenants");
18667
+ var credentialName$2 = "EnvironmentCredential";
18668
+ var logger$6 = credentialLogger(credentialName$2);
18669
+ var _EnvironmentCredential = class _EnvironmentCredential {
18670
+ /**
18671
+ * Creates an instance of the EnvironmentCredential class and decides what credential to use depending on the available environment variables.
18672
+ *
18673
+ * Required environment variables:
18674
+ * - `AZURE_TENANT_ID`: The Microsoft Entra tenant (directory) ID.
18675
+ * - `AZURE_CLIENT_ID`: The client (application) ID of an App Registration in the tenant.
18676
+ *
18677
+ * If setting the AZURE_TENANT_ID, then you can also set the additionally allowed tenants
18678
+ * - `AZURE_ADDITIONALLY_ALLOWED_TENANTS`: For multi-tenant applications, specifies additional tenants for which the credential may acquire tokens with a single semicolon delimited string. Use * to allow all tenants.
18679
+ *
18680
+ * Environment variables used for client credential authentication:
18681
+ * - `AZURE_CLIENT_SECRET`: A client secret that was generated for the App Registration.
18682
+ * - `AZURE_CLIENT_CERTIFICATE_PATH`: The path to a PEM certificate to use during the authentication, instead of the client secret.
18683
+ * - `AZURE_CLIENT_CERTIFICATE_PASSWORD`: (optional) password for the certificate file.
18684
+ *
18685
+ * Alternatively, users can provide environment variables for username and password authentication:
18686
+ * - `AZURE_USERNAME`: Username to authenticate with.
18687
+ * - `AZURE_PASSWORD`: Password to authenticate with.
18688
+ *
18689
+ * If the environment variables required to perform the authentication are missing, a {@link CredentialUnavailableError} will be thrown.
18690
+ * If the authentication fails, or if there's an unknown error, an {@link AuthenticationError} will be thrown.
18691
+ *
18692
+ * @param options - Options for configuring the client which makes the authentication request.
18693
+ */
18694
+ constructor(options) {
18695
+ this._credential = void 0;
18696
+ const assigned = processEnvVars(AllSupportedEnvironmentVariables).assigned.join(", ");
18697
+ logger$6.info(`Found the following environment variables: ${assigned}`);
18698
+ const tenantId = process.env.AZURE_TENANT_ID, clientId = process.env.AZURE_CLIENT_ID, clientSecret = process.env.AZURE_CLIENT_SECRET;
18699
+ const additionallyAllowedTenantIds = getAdditionallyAllowedTenants();
18700
+ const newOptions = Object.assign(Object.assign({}, options), { additionallyAllowedTenantIds });
18701
+ if (tenantId) {
18702
+ checkTenantId(logger$6, tenantId);
18703
+ }
18704
+ if (tenantId && clientId && clientSecret) {
18705
+ logger$6.info(`Invoking ClientSecretCredential with tenant ID: ${tenantId}, clientId: ${clientId} and clientSecret: [REDACTED]`);
18706
+ this._credential = new ClientSecretCredential(tenantId, clientId, clientSecret, newOptions);
18707
+ return;
18708
+ }
18709
+ const certificatePath = process.env.AZURE_CLIENT_CERTIFICATE_PATH;
18710
+ const certificatePassword = process.env.AZURE_CLIENT_CERTIFICATE_PASSWORD;
18711
+ if (tenantId && clientId && certificatePath) {
18712
+ logger$6.info(`Invoking ClientCertificateCredential with tenant ID: ${tenantId}, clientId: ${clientId} and certificatePath: ${certificatePath}`);
18713
+ this._credential = new ClientCertificateCredential(tenantId, clientId, { certificatePath, certificatePassword }, newOptions);
18714
+ return;
18715
+ }
18716
+ const username = process.env.AZURE_USERNAME;
18717
+ const password = process.env.AZURE_PASSWORD;
18718
+ if (tenantId && clientId && username && password) {
18719
+ logger$6.info(`Invoking UsernamePasswordCredential with tenant ID: ${tenantId}, clientId: ${clientId} and username: ${username}`);
18720
+ this._credential = new UsernamePasswordCredential(tenantId, clientId, username, password, newOptions);
18721
+ }
18722
+ }
18723
+ /**
18724
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
18725
+ *
18726
+ * @param scopes - The list of scopes for which the token will have access.
18727
+ * @param options - Optional parameters. See {@link GetTokenOptions}.
18728
+ */
18729
+ async getToken(scopes, options = {}) {
18730
+ return tracingClient.withSpan(`${credentialName$2}.getToken`, options, async (newOptions) => {
18731
+ if (this._credential) {
18732
+ try {
18733
+ const result = await this._credential.getToken(scopes, newOptions);
18734
+ logger$6.getToken.info(formatSuccess(scopes));
18735
+ return result;
18736
+ } catch (err) {
18737
+ const authenticationError = new AuthenticationError(400, {
18738
+ error: `${credentialName$2} authentication failed. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`,
18739
+ error_description: err.message.toString().split("More details:").join("")
18740
+ });
18741
+ logger$6.getToken.info(formatError(scopes, authenticationError));
18742
+ throw authenticationError;
18743
+ }
18744
+ }
18745
+ throw new CredentialUnavailableError(`${credentialName$2} is unavailable. No underlying credential could be used. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`);
18746
+ });
18747
+ }
18748
+ };
18749
+ __name(_EnvironmentCredential, "EnvironmentCredential");
18750
+ var EnvironmentCredential = _EnvironmentCredential;
18751
+ var logger$5 = credentialLogger("DefaultAzureCredential");
18752
+ function createDefaultManagedIdentityCredential(options = {}) {
18753
+ var _a2, _b2, _c, _d;
18754
+ (_a2 = options.retryOptions) !== null && _a2 !== void 0 ? _a2 : options.retryOptions = {
18755
+ maxRetries: 5,
18756
+ retryDelayInMs: 800
18757
+ };
18758
+ const managedIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_CLIENT_ID;
18759
+ const workloadIdentityClientId = (_c = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _c !== void 0 ? _c : managedIdentityClientId;
18760
+ const managedResourceId = options === null || options === void 0 ? void 0 : options.managedIdentityResourceId;
18761
+ const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
18762
+ const tenantId = (_d = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _d !== void 0 ? _d : process.env.AZURE_TENANT_ID;
18763
+ if (managedResourceId) {
18764
+ const managedIdentityResourceIdOptions = Object.assign(Object.assign({}, options), { resourceId: managedResourceId });
18765
+ return new ManagedIdentityCredential(managedIdentityResourceIdOptions);
18766
+ }
18767
+ if (workloadFile && workloadIdentityClientId) {
18768
+ const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId });
18769
+ return new ManagedIdentityCredential(workloadIdentityClientId, workloadIdentityCredentialOptions);
18770
+ }
18771
+ if (managedIdentityClientId) {
18772
+ const managedIdentityClientOptions = Object.assign(Object.assign({}, options), { clientId: managedIdentityClientId });
18773
+ return new ManagedIdentityCredential(managedIdentityClientOptions);
18774
+ }
18775
+ return new ManagedIdentityCredential(options);
18776
+ }
18777
+ __name(createDefaultManagedIdentityCredential, "createDefaultManagedIdentityCredential");
18778
+ function createDefaultWorkloadIdentityCredential(options) {
18779
+ var _a2, _b2, _c;
18780
+ const managedIdentityClientId = (_a2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_CLIENT_ID;
18781
+ const workloadIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b2 !== void 0 ? _b2 : managedIdentityClientId;
18782
+ const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
18783
+ const tenantId = (_c = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _c !== void 0 ? _c : process.env.AZURE_TENANT_ID;
18784
+ if (workloadFile && workloadIdentityClientId) {
18785
+ const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId, clientId: workloadIdentityClientId, tokenFilePath: workloadFile });
18786
+ return new WorkloadIdentityCredential(workloadIdentityCredentialOptions);
18787
+ }
18788
+ if (tenantId) {
18789
+ const workloadIdentityClientTenantOptions = Object.assign(Object.assign({}, options), { tenantId });
18790
+ return new WorkloadIdentityCredential(workloadIdentityClientTenantOptions);
18791
+ }
18792
+ return new WorkloadIdentityCredential(options);
18793
+ }
18794
+ __name(createDefaultWorkloadIdentityCredential, "createDefaultWorkloadIdentityCredential");
18795
+ function createDefaultAzureDeveloperCliCredential(options = {}) {
18796
+ const processTimeoutInMs = options.processTimeoutInMs;
18797
+ return new AzureDeveloperCliCredential(Object.assign({ processTimeoutInMs }, options));
18798
+ }
18799
+ __name(createDefaultAzureDeveloperCliCredential, "createDefaultAzureDeveloperCliCredential");
18800
+ function createDefaultAzureCliCredential(options = {}) {
18801
+ const processTimeoutInMs = options.processTimeoutInMs;
18802
+ return new AzureCliCredential2(Object.assign({ processTimeoutInMs }, options));
18803
+ }
18804
+ __name(createDefaultAzureCliCredential, "createDefaultAzureCliCredential");
18805
+ function createDefaultAzurePowershellCredential(options = {}) {
18806
+ const processTimeoutInMs = options.processTimeoutInMs;
18807
+ return new AzurePowerShellCredential(Object.assign({ processTimeoutInMs }, options));
18808
+ }
18809
+ __name(createDefaultAzurePowershellCredential, "createDefaultAzurePowershellCredential");
18810
+ function createEnvironmentCredential(options = {}) {
18811
+ return new EnvironmentCredential(options);
18812
+ }
18813
+ __name(createEnvironmentCredential, "createEnvironmentCredential");
18814
+ var _UnavailableDefaultCredential = class _UnavailableDefaultCredential {
18815
+ constructor(credentialName2, message) {
18816
+ this.credentialName = credentialName2;
18817
+ this.credentialUnavailableErrorMessage = message;
18818
+ }
18819
+ getToken() {
18820
+ logger$5.getToken.info(`Skipping ${this.credentialName}, reason: ${this.credentialUnavailableErrorMessage}`);
18821
+ return Promise.resolve(null);
18822
+ }
18823
+ };
18824
+ __name(_UnavailableDefaultCredential, "UnavailableDefaultCredential");
18825
+ var UnavailableDefaultCredential = _UnavailableDefaultCredential;
18826
+ var _DefaultAzureCredential = class _DefaultAzureCredential extends ChainedTokenCredential {
18827
+ constructor(options) {
18828
+ const credentialFunctions = [
18829
+ createEnvironmentCredential,
18830
+ createDefaultWorkloadIdentityCredential,
18831
+ createDefaultManagedIdentityCredential,
18832
+ createDefaultAzureCliCredential,
18833
+ createDefaultAzurePowershellCredential,
18834
+ createDefaultAzureDeveloperCliCredential
18835
+ ];
18836
+ const credentials = credentialFunctions.map((createCredentialFn) => {
18837
+ try {
18838
+ return createCredentialFn(options);
18839
+ } catch (err) {
18840
+ logger$5.warning(`Skipped ${createCredentialFn.name} because of an error creating the credential: ${err}`);
18841
+ return new UnavailableDefaultCredential(createCredentialFn.name, err.message);
18842
+ }
18843
+ });
18844
+ super(...credentials);
18845
+ }
18846
+ };
18847
+ __name(_DefaultAzureCredential, "DefaultAzureCredential");
18848
+ var DefaultAzureCredential = _DefaultAzureCredential;
18468
18849
  var _MsalNode = class _MsalNode {
18469
18850
  constructor(options) {
18470
18851
  var _a2, _b2, _c, _d, _e, _f;
@@ -18529,7 +18910,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18529
18910
  networkClient: this.identityClient,
18530
18911
  loggerOptions: {
18531
18912
  loggerCallback: defaultLoggerCallback(options.logger),
18532
- logLevel: getMSALLogLevel(logger$q.getLogLevel()),
18913
+ logLevel: getMSALLogLevel(logger$r.getLogLevel()),
18533
18914
  piiLoggingEnabled: (_a2 = options.loggingOptions) === null || _a2 === void 0 ? void 0 : _a2.enableUnsafeSupportLogging
18534
18915
  }
18535
18916
  }
@@ -18649,363 +19030,90 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
18649
19030
  if (!this.account) {
18650
19031
  throw new AuthenticationRequiredError({
18651
19032
  scopes,
18652
- getTokenOptions: options,
18653
- message: "Silent authentication failed. We couldn't retrieve an active account from the cache."
18654
- });
18655
- }
18656
- const silentRequest = {
18657
- // To be able to re-use the account, the Token Cache must also have been provided.
18658
- account: publicToMsal(this.account),
18659
- correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
18660
- scopes,
18661
- authority: options === null || options === void 0 ? void 0 : options.authority,
18662
- claims: options === null || options === void 0 ? void 0 : options.claims
18663
- };
18664
- if (hasNativeBroker() && this.enableBroker) {
18665
- if (!silentRequest.tokenQueryParameters) {
18666
- silentRequest.tokenQueryParameters = {};
18667
- }
18668
- if (!this.parentWindowHandle) {
18669
- this.logger.warning("Parent window handle is not specified for the broker. This may cause unexpected behavior. Please provide the parentWindowHandle.");
18670
- }
18671
- if (this.enableMsaPassthrough) {
18672
- silentRequest.tokenQueryParameters["msal_request_type"] = "consumer_passthrough";
18673
- }
18674
- }
18675
- try {
18676
- this.logger.info("Attempting to acquire token silently");
18677
- await ((_a2 = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a2 === void 0 ? void 0 : _a2.getTokenCache().getAllAccounts());
18678
- const response = (_c = await ((_b2 = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b2 === void 0 ? void 0 : _b2.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
18679
- return this.handleResult(scopes, response || void 0);
18680
- } catch (err) {
18681
- throw handleMsalError(scopes, err, options);
18682
- }
18683
- }
18684
- /**
18685
- * Wrapper around each MSAL flow get token operation: doGetToken.
18686
- * If disableAutomaticAuthentication is sent through the constructor, it will prevent MSAL from requesting the user input.
18687
- */
18688
- async getToken(scopes, options = {}) {
18689
- const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds) || this.tenantId;
18690
- options.authority = getAuthority(tenantId, this.authorityHost);
18691
- options.correlationId = (options === null || options === void 0 ? void 0 : options.correlationId) || randomUUID();
18692
- await this.init(options);
18693
- try {
18694
- const optionsClaims = options.claims;
18695
- if (optionsClaims) {
18696
- this.cachedClaims = optionsClaims;
18697
- }
18698
- if (this.cachedClaims && !optionsClaims) {
18699
- options.claims = this.cachedClaims;
18700
- }
18701
- return await this.getTokenSilent(scopes, options);
18702
- } catch (err) {
18703
- if (err.name !== "AuthenticationRequiredError") {
18704
- throw err;
18705
- }
18706
- if (options === null || options === void 0 ? void 0 : options.disableAutomaticAuthentication) {
18707
- throw new AuthenticationRequiredError({
18708
- scopes,
18709
- getTokenOptions: options,
18710
- message: "Automatic authentication has been disabled. You may call the authentication() method."
18711
- });
18712
- }
18713
- this.logger.info(`Silent authentication failed, falling back to interactive method.`);
18714
- return this.doGetToken(scopes, options);
18715
- }
18716
- }
18717
- /**
18718
- * Handles the MSAL authentication result.
18719
- * If the result has an account, we update the local account reference.
18720
- * If the token received is invalid, an error will be thrown depending on what's missing.
18721
- */
18722
- handleResult(scopes, result, getTokenOptions) {
18723
- if (result === null || result === void 0 ? void 0 : result.account) {
18724
- this.account = msalToPublic(this.clientId, result.account);
18725
- }
18726
- ensureValidMsalToken(scopes, result, getTokenOptions);
18727
- this.logger.getToken.info(formatSuccess(scopes));
18728
- return {
18729
- token: result.accessToken,
18730
- expiresOnTimestamp: result.expiresOn.getTime()
18731
- };
18732
- }
18733
- };
18734
- __name(_MsalNode, "MsalNode");
18735
- var MsalNode = _MsalNode;
18736
- var _MsalUsernamePassword = class _MsalUsernamePassword extends MsalNode {
18737
- constructor(options) {
18738
- super(options);
18739
- this.username = options.username;
18740
- this.password = options.password;
18741
- }
18742
- async doGetToken(scopes, options) {
18743
- try {
18744
- const requestOptions = {
18745
- scopes,
18746
- username: this.username,
18747
- password: this.password,
18748
- correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
18749
- authority: options === null || options === void 0 ? void 0 : options.authority,
18750
- claims: options === null || options === void 0 ? void 0 : options.claims
18751
- };
18752
- const result = await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenByUsernamePassword(requestOptions);
18753
- return this.handleResult(scopes, result || void 0);
18754
- } catch (error) {
18755
- throw handleMsalError(scopes, error, options);
18756
- }
18757
- }
18758
- };
18759
- __name(_MsalUsernamePassword, "MsalUsernamePassword");
18760
- var MsalUsernamePassword = _MsalUsernamePassword;
18761
- var logger$6 = credentialLogger("UsernamePasswordCredential");
18762
- var _UsernamePasswordCredential = class _UsernamePasswordCredential {
18763
- /**
18764
- * Creates an instance of the UsernamePasswordCredential with the details
18765
- * needed to authenticate against Microsoft Entra ID with a username
18766
- * and password.
18767
- *
18768
- * @param tenantId - The Microsoft Entra tenant (directory).
18769
- * @param clientId - The client (application) ID of an App Registration in the tenant.
18770
- * @param username - The user account's e-mail address (user name).
18771
- * @param password - The user account's account password
18772
- * @param options - Options for configuring the client which makes the authentication request.
18773
- */
18774
- constructor(tenantId, clientId, username, password, options = {}) {
18775
- if (!tenantId || !clientId || !username || !password) {
18776
- throw new Error("UsernamePasswordCredential: tenantId, clientId, username and password are required parameters. To troubleshoot, visit https://aka.ms/azsdk/js/identity/usernamepasswordcredential/troubleshoot.");
18777
- }
18778
- this.tenantId = tenantId;
18779
- this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
18780
- this.msalFlow = new MsalUsernamePassword(Object.assign(Object.assign({}, options), {
18781
- logger: logger$6,
18782
- clientId,
18783
- tenantId,
18784
- username,
18785
- password,
18786
- tokenCredentialOptions: options || {}
18787
- }));
18788
- }
18789
- /**
18790
- * Authenticates with Microsoft Entra ID and returns an access token if successful.
18791
- * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
18792
- *
18793
- * If the user provided the option `disableAutomaticAuthentication`,
18794
- * once the token can't be retrieved silently,
18795
- * this method won't attempt to request user interaction to retrieve the token.
18796
- *
18797
- * @param scopes - The list of scopes for which the token will have access.
18798
- * @param options - The options used to configure any requests this
18799
- * TokenCredential implementation might make.
18800
- */
18801
- async getToken(scopes, options = {}) {
18802
- return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
18803
- newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$6);
18804
- const arrayScopes = ensureScopes(scopes);
18805
- return this.msalFlow.getToken(arrayScopes, newOptions);
18806
- });
18807
- }
18808
- };
18809
- __name(_UsernamePasswordCredential, "UsernamePasswordCredential");
18810
- var UsernamePasswordCredential = _UsernamePasswordCredential;
18811
- var AllSupportedEnvironmentVariables = [
18812
- "AZURE_TENANT_ID",
18813
- "AZURE_CLIENT_ID",
18814
- "AZURE_CLIENT_SECRET",
18815
- "AZURE_CLIENT_CERTIFICATE_PATH",
18816
- "AZURE_CLIENT_CERTIFICATE_PASSWORD",
18817
- "AZURE_USERNAME",
18818
- "AZURE_PASSWORD",
18819
- "AZURE_ADDITIONALLY_ALLOWED_TENANTS"
18820
- ];
18821
- function getAdditionallyAllowedTenants() {
18822
- var _a2;
18823
- const additionallyAllowedValues = (_a2 = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a2 !== void 0 ? _a2 : "";
18824
- return additionallyAllowedValues.split(";");
18825
- }
18826
- __name(getAdditionallyAllowedTenants, "getAdditionallyAllowedTenants");
18827
- var credentialName$1 = "EnvironmentCredential";
18828
- var logger$5 = credentialLogger(credentialName$1);
18829
- var _EnvironmentCredential = class _EnvironmentCredential {
18830
- /**
18831
- * Creates an instance of the EnvironmentCredential class and decides what credential to use depending on the available environment variables.
18832
- *
18833
- * Required environment variables:
18834
- * - `AZURE_TENANT_ID`: The Microsoft Entra tenant (directory) ID.
18835
- * - `AZURE_CLIENT_ID`: The client (application) ID of an App Registration in the tenant.
18836
- *
18837
- * If setting the AZURE_TENANT_ID, then you can also set the additionally allowed tenants
18838
- * - `AZURE_ADDITIONALLY_ALLOWED_TENANTS`: For multi-tenant applications, specifies additional tenants for which the credential may acquire tokens with a single semicolon delimited string. Use * to allow all tenants.
18839
- *
18840
- * Environment variables used for client credential authentication:
18841
- * - `AZURE_CLIENT_SECRET`: A client secret that was generated for the App Registration.
18842
- * - `AZURE_CLIENT_CERTIFICATE_PATH`: The path to a PEM certificate to use during the authentication, instead of the client secret.
18843
- * - `AZURE_CLIENT_CERTIFICATE_PASSWORD`: (optional) password for the certificate file.
18844
- *
18845
- * Alternatively, users can provide environment variables for username and password authentication:
18846
- * - `AZURE_USERNAME`: Username to authenticate with.
18847
- * - `AZURE_PASSWORD`: Password to authenticate with.
18848
- *
18849
- * If the environment variables required to perform the authentication are missing, a {@link CredentialUnavailableError} will be thrown.
18850
- * If the authentication fails, or if there's an unknown error, an {@link AuthenticationError} will be thrown.
18851
- *
18852
- * @param options - Options for configuring the client which makes the authentication request.
18853
- */
18854
- constructor(options) {
18855
- this._credential = void 0;
18856
- const assigned = processEnvVars(AllSupportedEnvironmentVariables).assigned.join(", ");
18857
- logger$5.info(`Found the following environment variables: ${assigned}`);
18858
- const tenantId = process.env.AZURE_TENANT_ID, clientId = process.env.AZURE_CLIENT_ID, clientSecret = process.env.AZURE_CLIENT_SECRET;
18859
- const additionallyAllowedTenantIds = getAdditionallyAllowedTenants();
18860
- const newOptions = Object.assign(Object.assign({}, options), { additionallyAllowedTenantIds });
18861
- if (tenantId) {
18862
- checkTenantId(logger$5, tenantId);
18863
- }
18864
- if (tenantId && clientId && clientSecret) {
18865
- logger$5.info(`Invoking ClientSecretCredential with tenant ID: ${tenantId}, clientId: ${clientId} and clientSecret: [REDACTED]`);
18866
- this._credential = new ClientSecretCredential(tenantId, clientId, clientSecret, newOptions);
18867
- return;
19033
+ getTokenOptions: options,
19034
+ message: "Silent authentication failed. We couldn't retrieve an active account from the cache."
19035
+ });
18868
19036
  }
18869
- const certificatePath = process.env.AZURE_CLIENT_CERTIFICATE_PATH;
18870
- const certificatePassword = process.env.AZURE_CLIENT_CERTIFICATE_PASSWORD;
18871
- if (tenantId && clientId && certificatePath) {
18872
- logger$5.info(`Invoking ClientCertificateCredential with tenant ID: ${tenantId}, clientId: ${clientId} and certificatePath: ${certificatePath}`);
18873
- this._credential = new ClientCertificateCredential(tenantId, clientId, { certificatePath, certificatePassword }, newOptions);
18874
- return;
19037
+ const silentRequest = {
19038
+ // To be able to re-use the account, the Token Cache must also have been provided.
19039
+ account: publicToMsal(this.account),
19040
+ correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
19041
+ scopes,
19042
+ authority: options === null || options === void 0 ? void 0 : options.authority,
19043
+ claims: options === null || options === void 0 ? void 0 : options.claims
19044
+ };
19045
+ if (hasNativeBroker() && this.enableBroker) {
19046
+ if (!silentRequest.tokenQueryParameters) {
19047
+ silentRequest.tokenQueryParameters = {};
19048
+ }
19049
+ if (!this.parentWindowHandle) {
19050
+ this.logger.warning("Parent window handle is not specified for the broker. This may cause unexpected behavior. Please provide the parentWindowHandle.");
19051
+ }
19052
+ if (this.enableMsaPassthrough) {
19053
+ silentRequest.tokenQueryParameters["msal_request_type"] = "consumer_passthrough";
19054
+ }
18875
19055
  }
18876
- const username = process.env.AZURE_USERNAME;
18877
- const password = process.env.AZURE_PASSWORD;
18878
- if (tenantId && clientId && username && password) {
18879
- logger$5.info(`Invoking UsernamePasswordCredential with tenant ID: ${tenantId}, clientId: ${clientId} and username: ${username}`);
18880
- this._credential = new UsernamePasswordCredential(tenantId, clientId, username, password, newOptions);
19056
+ try {
19057
+ this.logger.info("Attempting to acquire token silently");
19058
+ await ((_a2 = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a2 === void 0 ? void 0 : _a2.getTokenCache().getAllAccounts());
19059
+ const response = (_c = await ((_b2 = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b2 === void 0 ? void 0 : _b2.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
19060
+ return this.handleResult(scopes, response || void 0);
19061
+ } catch (err) {
19062
+ throw handleMsalError(scopes, err, options);
18881
19063
  }
18882
19064
  }
18883
19065
  /**
18884
- * Authenticates with Microsoft Entra ID and returns an access token if successful.
18885
- *
18886
- * @param scopes - The list of scopes for which the token will have access.
18887
- * @param options - Optional parameters. See {@link GetTokenOptions}.
19066
+ * Wrapper around each MSAL flow get token operation: doGetToken.
19067
+ * If disableAutomaticAuthentication is sent through the constructor, it will prevent MSAL from requesting the user input.
18888
19068
  */
18889
19069
  async getToken(scopes, options = {}) {
18890
- return tracingClient.withSpan(`${credentialName$1}.getToken`, options, async (newOptions) => {
18891
- if (this._credential) {
18892
- try {
18893
- const result = await this._credential.getToken(scopes, newOptions);
18894
- logger$5.getToken.info(formatSuccess(scopes));
18895
- return result;
18896
- } catch (err) {
18897
- const authenticationError = new AuthenticationError(400, {
18898
- error: `${credentialName$1} authentication failed. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`,
18899
- error_description: err.message.toString().split("More details:").join("")
18900
- });
18901
- logger$5.getToken.info(formatError(scopes, authenticationError));
18902
- throw authenticationError;
18903
- }
19070
+ const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds) || this.tenantId;
19071
+ options.authority = getAuthority(tenantId, this.authorityHost);
19072
+ options.correlationId = (options === null || options === void 0 ? void 0 : options.correlationId) || randomUUID();
19073
+ await this.init(options);
19074
+ try {
19075
+ const optionsClaims = options.claims;
19076
+ if (optionsClaims) {
19077
+ this.cachedClaims = optionsClaims;
18904
19078
  }
18905
- throw new CredentialUnavailableError(`${credentialName$1} is unavailable. No underlying credential could be used. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`);
18906
- });
18907
- }
18908
- };
18909
- __name(_EnvironmentCredential, "EnvironmentCredential");
18910
- var EnvironmentCredential = _EnvironmentCredential;
18911
- var logger$4 = credentialLogger("DefaultAzureCredential");
18912
- function createDefaultManagedIdentityCredential(options = {}) {
18913
- var _a2, _b2, _c, _d;
18914
- (_a2 = options.retryOptions) !== null && _a2 !== void 0 ? _a2 : options.retryOptions = {
18915
- maxRetries: 5,
18916
- retryDelayInMs: 800
18917
- };
18918
- const managedIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_CLIENT_ID;
18919
- const workloadIdentityClientId = (_c = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _c !== void 0 ? _c : managedIdentityClientId;
18920
- const managedResourceId = options === null || options === void 0 ? void 0 : options.managedIdentityResourceId;
18921
- const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
18922
- const tenantId = (_d = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _d !== void 0 ? _d : process.env.AZURE_TENANT_ID;
18923
- if (managedResourceId) {
18924
- const managedIdentityResourceIdOptions = Object.assign(Object.assign({}, options), { resourceId: managedResourceId });
18925
- return new ManagedIdentityCredential(managedIdentityResourceIdOptions);
18926
- }
18927
- if (workloadFile && workloadIdentityClientId) {
18928
- const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId });
18929
- return new ManagedIdentityCredential(workloadIdentityClientId, workloadIdentityCredentialOptions);
18930
- }
18931
- if (managedIdentityClientId) {
18932
- const managedIdentityClientOptions = Object.assign(Object.assign({}, options), { clientId: managedIdentityClientId });
18933
- return new ManagedIdentityCredential(managedIdentityClientOptions);
18934
- }
18935
- return new ManagedIdentityCredential(options);
18936
- }
18937
- __name(createDefaultManagedIdentityCredential, "createDefaultManagedIdentityCredential");
18938
- function createDefaultWorkloadIdentityCredential(options) {
18939
- var _a2, _b2, _c;
18940
- const managedIdentityClientId = (_a2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_CLIENT_ID;
18941
- const workloadIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b2 !== void 0 ? _b2 : managedIdentityClientId;
18942
- const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
18943
- const tenantId = (_c = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _c !== void 0 ? _c : process.env.AZURE_TENANT_ID;
18944
- if (workloadFile && workloadIdentityClientId) {
18945
- const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId, clientId: workloadIdentityClientId, tokenFilePath: workloadFile });
18946
- return new WorkloadIdentityCredential(workloadIdentityCredentialOptions);
18947
- }
18948
- if (tenantId) {
18949
- const workloadIdentityClientTenantOptions = Object.assign(Object.assign({}, options), { tenantId });
18950
- return new WorkloadIdentityCredential(workloadIdentityClientTenantOptions);
18951
- }
18952
- return new WorkloadIdentityCredential(options);
18953
- }
18954
- __name(createDefaultWorkloadIdentityCredential, "createDefaultWorkloadIdentityCredential");
18955
- function createDefaultAzureDeveloperCliCredential(options = {}) {
18956
- const processTimeoutInMs = options.processTimeoutInMs;
18957
- return new AzureDeveloperCliCredential(Object.assign({ processTimeoutInMs }, options));
18958
- }
18959
- __name(createDefaultAzureDeveloperCliCredential, "createDefaultAzureDeveloperCliCredential");
18960
- function createDefaultAzureCliCredential(options = {}) {
18961
- const processTimeoutInMs = options.processTimeoutInMs;
18962
- return new AzureCliCredential2(Object.assign({ processTimeoutInMs }, options));
18963
- }
18964
- __name(createDefaultAzureCliCredential, "createDefaultAzureCliCredential");
18965
- function createDefaultAzurePowershellCredential(options = {}) {
18966
- const processTimeoutInMs = options.processTimeoutInMs;
18967
- return new AzurePowerShellCredential(Object.assign({ processTimeoutInMs }, options));
18968
- }
18969
- __name(createDefaultAzurePowershellCredential, "createDefaultAzurePowershellCredential");
18970
- function createEnvironmentCredential(options = {}) {
18971
- return new EnvironmentCredential(options);
18972
- }
18973
- __name(createEnvironmentCredential, "createEnvironmentCredential");
18974
- var _UnavailableDefaultCredential = class _UnavailableDefaultCredential {
18975
- constructor(credentialName2, message) {
18976
- this.credentialName = credentialName2;
18977
- this.credentialUnavailableErrorMessage = message;
18978
- }
18979
- getToken() {
18980
- logger$4.getToken.info(`Skipping ${this.credentialName}, reason: ${this.credentialUnavailableErrorMessage}`);
18981
- return Promise.resolve(null);
18982
- }
18983
- };
18984
- __name(_UnavailableDefaultCredential, "UnavailableDefaultCredential");
18985
- var UnavailableDefaultCredential = _UnavailableDefaultCredential;
18986
- var _DefaultAzureCredential = class _DefaultAzureCredential extends ChainedTokenCredential {
18987
- constructor(options) {
18988
- const credentialFunctions = [
18989
- createEnvironmentCredential,
18990
- createDefaultWorkloadIdentityCredential,
18991
- createDefaultManagedIdentityCredential,
18992
- createDefaultAzureCliCredential,
18993
- createDefaultAzurePowershellCredential,
18994
- createDefaultAzureDeveloperCliCredential
18995
- ];
18996
- const credentials = credentialFunctions.map((createCredentialFn) => {
18997
- try {
18998
- return createCredentialFn(options);
18999
- } catch (err) {
19000
- logger$4.warning(`Skipped ${createCredentialFn.name} because of an error creating the credential: ${err}`);
19001
- return new UnavailableDefaultCredential(createCredentialFn.name, err.message);
19079
+ if (this.cachedClaims && !optionsClaims) {
19080
+ options.claims = this.cachedClaims;
19002
19081
  }
19003
- });
19004
- super(...credentials);
19082
+ return await this.getTokenSilent(scopes, options);
19083
+ } catch (err) {
19084
+ if (err.name !== "AuthenticationRequiredError") {
19085
+ throw err;
19086
+ }
19087
+ if (options === null || options === void 0 ? void 0 : options.disableAutomaticAuthentication) {
19088
+ throw new AuthenticationRequiredError({
19089
+ scopes,
19090
+ getTokenOptions: options,
19091
+ message: "Automatic authentication has been disabled. You may call the authentication() method."
19092
+ });
19093
+ }
19094
+ this.logger.info(`Silent authentication failed, falling back to interactive method.`);
19095
+ return this.doGetToken(scopes, options);
19096
+ }
19097
+ }
19098
+ /**
19099
+ * Handles the MSAL authentication result.
19100
+ * If the result has an account, we update the local account reference.
19101
+ * If the token received is invalid, an error will be thrown depending on what's missing.
19102
+ */
19103
+ handleResult(scopes, result, getTokenOptions) {
19104
+ if (result === null || result === void 0 ? void 0 : result.account) {
19105
+ this.account = msalToPublic(this.clientId, result.account);
19106
+ }
19107
+ ensureValidMsalToken(scopes, result, getTokenOptions);
19108
+ this.logger.getToken.info(formatSuccess(scopes));
19109
+ return {
19110
+ token: result.accessToken,
19111
+ expiresOnTimestamp: result.expiresOn.getTime()
19112
+ };
19005
19113
  }
19006
19114
  };
19007
- __name(_DefaultAzureCredential, "DefaultAzureCredential");
19008
- var DefaultAzureCredential = _DefaultAzureCredential;
19115
+ __name(_MsalNode, "MsalNode");
19116
+ var MsalNode = _MsalNode;
19009
19117
  var interactiveBrowserMockable = {
19010
19118
  open
19011
19119
  };
@@ -19094,7 +19202,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19094
19202
  };
19095
19203
  __name(_MsalOpenBrowser, "MsalOpenBrowser");
19096
19204
  var MsalOpenBrowser = _MsalOpenBrowser;
19097
- var logger$3 = credentialLogger("InteractiveBrowserCredential");
19205
+ var logger$4 = credentialLogger("InteractiveBrowserCredential");
19098
19206
  var _InteractiveBrowserCredential = class _InteractiveBrowserCredential {
19099
19207
  /**
19100
19208
  * Creates an instance of InteractiveBrowserCredential with the details needed.
@@ -19120,7 +19228,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19120
19228
  } else {
19121
19229
  this.msalFlow = new MsalOpenBrowser(Object.assign(Object.assign({}, options), {
19122
19230
  tokenCredentialOptions: options,
19123
- logger: logger$3,
19231
+ logger: logger$4,
19124
19232
  redirectUri,
19125
19233
  browserCustomizationOptions: ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.browserCustomizationOptions,
19126
19234
  brokerOptions: {
@@ -19134,7 +19242,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19134
19242
  } else {
19135
19243
  this.msalFlow = new MsalOpenBrowser(Object.assign(Object.assign({}, options), {
19136
19244
  tokenCredentialOptions: options,
19137
- logger: logger$3,
19245
+ logger: logger$4,
19138
19246
  redirectUri,
19139
19247
  browserCustomizationOptions: ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.browserCustomizationOptions
19140
19248
  }));
@@ -19155,7 +19263,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19155
19263
  */
19156
19264
  async getToken(scopes, options = {}) {
19157
19265
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
19158
- newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$3);
19266
+ newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$4);
19159
19267
  const arrayScopes = ensureScopes(scopes);
19160
19268
  return this.msalFlow.getToken(arrayScopes, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
19161
19269
  });
@@ -19183,34 +19291,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19183
19291
  };
19184
19292
  __name(_InteractiveBrowserCredential, "InteractiveBrowserCredential");
19185
19293
  var InteractiveBrowserCredential2 = _InteractiveBrowserCredential;
19186
- var _MsalDeviceCode = class _MsalDeviceCode extends MsalNode {
19187
- constructor(options) {
19188
- super(options);
19189
- this.userPromptCallback = options.userPromptCallback;
19190
- }
19191
- async doGetToken(scopes, options) {
19192
- try {
19193
- const requestOptions = {
19194
- deviceCodeCallback: this.userPromptCallback,
19195
- scopes,
19196
- cancel: false,
19197
- correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
19198
- authority: options === null || options === void 0 ? void 0 : options.authority,
19199
- claims: options === null || options === void 0 ? void 0 : options.claims
19200
- };
19201
- const promise = this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenByDeviceCode(requestOptions);
19202
- const deviceResponse = await this.withCancellation(promise, options === null || options === void 0 ? void 0 : options.abortSignal, () => {
19203
- requestOptions.cancel = true;
19204
- });
19205
- return this.handleResult(scopes, deviceResponse || void 0);
19206
- } catch (error) {
19207
- throw handleMsalError(scopes, error, options);
19208
- }
19209
- }
19210
- };
19211
- __name(_MsalDeviceCode, "MsalDeviceCode");
19212
- var MsalDeviceCode = _MsalDeviceCode;
19213
- var logger$2 = credentialLogger("DeviceCodeCredential");
19294
+ var logger$3 = credentialLogger("DeviceCodeCredential");
19214
19295
  function defaultDeviceCodePromptCallback(deviceCodeInfo) {
19215
19296
  console.log(deviceCodeInfo.message);
19216
19297
  }
@@ -19237,9 +19318,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19237
19318
  * @param options - Options for configuring the client which makes the authentication requests.
19238
19319
  */
19239
19320
  constructor(options) {
19321
+ var _a2, _b2;
19240
19322
  this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
19241
19323
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
19242
- this.msalFlow = new MsalDeviceCode(Object.assign(Object.assign({}, options), { logger: logger$2, userPromptCallback: (options === null || options === void 0 ? void 0 : options.userPromptCallback) || defaultDeviceCodePromptCallback, tokenCredentialOptions: options || {} }));
19324
+ const clientId = (_a2 = options === null || options === void 0 ? void 0 : options.clientId) !== null && _a2 !== void 0 ? _a2 : DeveloperSignOnClientId;
19325
+ const tenantId = resolveTenantId(logger$3, options === null || options === void 0 ? void 0 : options.tenantId, clientId);
19326
+ this.userPromptCallback = (_b2 = options === null || options === void 0 ? void 0 : options.userPromptCallback) !== null && _b2 !== void 0 ? _b2 : defaultDeviceCodePromptCallback;
19327
+ this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$3, tokenCredentialOptions: options || {} }));
19243
19328
  this.disableAutomaticAuthentication = options === null || options === void 0 ? void 0 : options.disableAutomaticAuthentication;
19244
19329
  }
19245
19330
  /**
@@ -19256,9 +19341,9 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19256
19341
  */
19257
19342
  async getToken(scopes, options = {}) {
19258
19343
  return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
19259
- newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$2);
19344
+ newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$3);
19260
19345
  const arrayScopes = ensureScopes(scopes);
19261
- return this.msalFlow.getToken(arrayScopes, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
19346
+ return this.msalClient.getTokenByDeviceCode(arrayScopes, this.userPromptCallback, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
19262
19347
  });
19263
19348
  }
19264
19349
  /**
@@ -19274,48 +19359,106 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19274
19359
  async authenticate(scopes, options = {}) {
19275
19360
  return tracingClient.withSpan(`${this.constructor.name}.authenticate`, options, async (newOptions) => {
19276
19361
  const arrayScopes = Array.isArray(scopes) ? scopes : [scopes];
19277
- await this.msalFlow.getToken(arrayScopes, newOptions);
19278
- return this.msalFlow.getActiveAccount();
19362
+ await this.msalClient.getTokenByDeviceCode(arrayScopes, this.userPromptCallback, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: false }));
19363
+ return this.msalClient.getActiveAccount();
19279
19364
  });
19280
19365
  }
19281
19366
  };
19282
19367
  __name(_DeviceCodeCredential, "DeviceCodeCredential");
19283
19368
  var DeviceCodeCredential2 = _DeviceCodeCredential;
19284
- var _MsalAuthorizationCode = class _MsalAuthorizationCode extends MsalNode {
19285
- constructor(options) {
19286
- super(options);
19287
- this.logger = credentialLogger("Node.js MSAL Authorization Code");
19288
- this.redirectUri = options.redirectUri;
19289
- this.authorizationCode = options.authorizationCode;
19290
- if (options.clientSecret) {
19291
- this.msalConfig.auth.clientSecret = options.clientSecret;
19292
- }
19293
- }
19294
- async getAuthCodeUrl(options) {
19295
- await this.init();
19296
- return this.getApp("confidentialFirst", options.enableCae).getAuthCodeUrl({
19297
- scopes: options.scopes,
19298
- redirectUri: options.redirectUri
19299
- });
19369
+ var credentialName$1 = "AzurePipelinesCredential";
19370
+ var logger$2 = credentialLogger(credentialName$1);
19371
+ var OIDC_API_VERSION = "7.1";
19372
+ var _AzurePipelinesCredential = class _AzurePipelinesCredential {
19373
+ /**
19374
+ * AzurePipelinesCredential supports Federated Identity on Azure Pipelines through Service Connections.
19375
+ * @param tenantId - tenantId associated with the service connection
19376
+ * @param clientId - clientId associated with the service connection
19377
+ * @param serviceConnectionId - Unique ID for the service connection, as found in the querystring's resourceId key
19378
+ * @param systemAccessToken - The pipeline's <see href="https://learn.microsoft.com/azure/devops/pipelines/build/variables?view=azure-devops%26tabs=yaml#systemaccesstoken">System.AccessToken</see> value.
19379
+ * @param options - The identity client options to use for authentication.
19380
+ */
19381
+ constructor(tenantId, clientId, serviceConnectionId, systemAccessToken, options) {
19382
+ if (!clientId || !tenantId || !serviceConnectionId || !systemAccessToken) {
19383
+ throw new CredentialUnavailableError(`${credentialName$1}: is unavailable. tenantId, clientId, serviceConnectionId, and systemAccessToken are required parameters.`);
19384
+ }
19385
+ this.identityClient = new IdentityClient(options);
19386
+ checkTenantId(logger$2, tenantId);
19387
+ logger$2.info(`Invoking AzurePipelinesCredential with tenant ID: ${tenantId}, client ID: ${clientId}, and service connection ID: ${serviceConnectionId}`);
19388
+ if (!process.env.SYSTEM_OIDCREQUESTURI) {
19389
+ throw new CredentialUnavailableError(`${credentialName$1}: is unavailable. Ensure that you're running this task in an Azure Pipeline, so that following missing system variable(s) can be defined- "SYSTEM_OIDCREQUESTURI"`);
19390
+ }
19391
+ const oidcRequestUrl = `${process.env.SYSTEM_OIDCREQUESTURI}?api-version=${OIDC_API_VERSION}&serviceConnectionId=${serviceConnectionId}`;
19392
+ logger$2.info(`Invoking ClientAssertionCredential with tenant ID: ${tenantId}, client ID: ${clientId} and service connection ID: ${serviceConnectionId}`);
19393
+ this.clientAssertionCredential = new ClientAssertionCredential(tenantId, clientId, this.requestOidcToken.bind(this, oidcRequestUrl, systemAccessToken), options);
19394
+ }
19395
+ /**
19396
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
19397
+ * If authentication fails, a {@link CredentialUnavailableError} or {@link AuthenticationError} will be thrown with the details of the failure.
19398
+ *
19399
+ * @param scopes - The list of scopes for which the token will have access.
19400
+ * @param options - The options used to configure any requests this
19401
+ * TokenCredential implementation might make.
19402
+ */
19403
+ async getToken(scopes, options) {
19404
+ if (!this.clientAssertionCredential) {
19405
+ const errorMessage = `${credentialName$1}: is unavailable. To use Federation Identity in Azure Pipelines, the following parameters are required -
19406
+ tenantId,
19407
+ clientId,
19408
+ serviceConnectionId,
19409
+ systemAccessToken,
19410
+ "SYSTEM_OIDCREQUESTURI".
19411
+ See the troubleshooting guide for more information: https://aka.ms/azsdk/js/identity/azurepipelinescredential/troubleshoot`;
19412
+ logger$2.error(errorMessage);
19413
+ throw new CredentialUnavailableError(errorMessage);
19414
+ }
19415
+ logger$2.info("Invoking getToken() of Client Assertion Credential");
19416
+ return this.clientAssertionCredential.getToken(scopes, options);
19300
19417
  }
19301
- async doGetToken(scopes, options) {
19418
+ /**
19419
+ *
19420
+ * @param oidcRequestUrl - oidc request url
19421
+ * @param systemAccessToken - system access token
19422
+ * @returns OIDC token from Azure Pipelines
19423
+ */
19424
+ async requestOidcToken(oidcRequestUrl, systemAccessToken) {
19425
+ logger$2.info("Requesting OIDC token from Azure Pipelines...");
19426
+ logger$2.info(oidcRequestUrl);
19427
+ const request = coreRestPipeline.createPipelineRequest({
19428
+ url: oidcRequestUrl,
19429
+ method: "POST",
19430
+ headers: coreRestPipeline.createHttpHeaders({
19431
+ "Content-Type": "application/json",
19432
+ Authorization: `Bearer ${systemAccessToken}`
19433
+ })
19434
+ });
19435
+ const response = await this.identityClient.sendRequest(request);
19436
+ const text = response.bodyAsText;
19437
+ if (!text) {
19438
+ logger$2.error(`${credentialName$1}: Authenticated Failed. Received null token from OIDC request. Response status- ${response.status}. Complete response - ${JSON.stringify(response)}`);
19439
+ throw new AuthenticationError(response.status, `${credentialName$1}: Authenticated Failed. Received null token from OIDC request. Response status- ${response.status}. Complete response - ${JSON.stringify(response)}`);
19440
+ }
19302
19441
  try {
19303
- const result = await this.getApp("confidentialFirst", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenByCode({
19304
- scopes,
19305
- redirectUri: this.redirectUri,
19306
- code: this.authorizationCode,
19307
- correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
19308
- authority: options === null || options === void 0 ? void 0 : options.authority,
19309
- claims: options === null || options === void 0 ? void 0 : options.claims
19310
- });
19311
- return this.handleResult(scopes, result || void 0);
19312
- } catch (err) {
19313
- throw handleMsalError(scopes, err, options);
19442
+ const result = JSON.parse(text);
19443
+ if (result === null || result === void 0 ? void 0 : result.oidcToken) {
19444
+ return result.oidcToken;
19445
+ } else {
19446
+ let errorMessage = `${credentialName$1}: Authentication Failed. oidcToken field not detected in the response.`;
19447
+ if (response.status !== 200) {
19448
+ errorMessage += `Response = ${JSON.stringify(result)}`;
19449
+ }
19450
+ logger$2.error(errorMessage);
19451
+ throw new AuthenticationError(response.status, errorMessage);
19452
+ }
19453
+ } catch (e) {
19454
+ logger$2.error(e.message);
19455
+ logger$2.error(`${credentialName$1}: Authentication Failed. oidcToken field not detected in the response. Response = ${text}`);
19456
+ throw new AuthenticationError(response.status, `${credentialName$1}: Authentication Failed. oidcToken field not detected in the response. Response = ${text}`);
19314
19457
  }
19315
19458
  }
19316
19459
  };
19317
- __name(_MsalAuthorizationCode, "MsalAuthorizationCode");
19318
- var MsalAuthorizationCode = _MsalAuthorizationCode;
19460
+ __name(_AzurePipelinesCredential, "AzurePipelinesCredential");
19461
+ var AzurePipelinesCredential = _AzurePipelinesCredential;
19319
19462
  var logger$1 = credentialLogger("AuthorizationCodeCredential");
19320
19463
  var _AuthorizationCodeCredential = class _AuthorizationCodeCredential {
19321
19464
  /**
@@ -19324,27 +19467,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19324
19467
  */
19325
19468
  constructor(tenantId, clientId, clientSecretOrAuthorizationCode, authorizationCodeOrRedirectUri, redirectUriOrOptions, options) {
19326
19469
  checkTenantId(logger$1, tenantId);
19327
- let clientSecret = clientSecretOrAuthorizationCode;
19470
+ this.clientSecret = clientSecretOrAuthorizationCode;
19328
19471
  if (typeof redirectUriOrOptions === "string") {
19329
19472
  this.authorizationCode = authorizationCodeOrRedirectUri;
19330
19473
  this.redirectUri = redirectUriOrOptions;
19331
19474
  } else {
19332
19475
  this.authorizationCode = clientSecretOrAuthorizationCode;
19333
19476
  this.redirectUri = authorizationCodeOrRedirectUri;
19334
- clientSecret = void 0;
19477
+ this.clientSecret = void 0;
19335
19478
  options = redirectUriOrOptions;
19336
19479
  }
19337
19480
  this.tenantId = tenantId;
19338
19481
  this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
19339
- this.msalFlow = new MsalAuthorizationCode(Object.assign(Object.assign({}, options), {
19340
- clientSecret,
19341
- clientId,
19342
- tenantId,
19343
- tokenCredentialOptions: options || {},
19344
- logger: logger$1,
19345
- redirectUri: this.redirectUri,
19346
- authorizationCode: this.authorizationCode
19347
- }));
19482
+ this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$1, tokenCredentialOptions: options !== null && options !== void 0 ? options : {} }));
19348
19483
  }
19349
19484
  /**
19350
19485
  * Authenticates with Microsoft Entra ID and returns an access token if successful.
@@ -19359,7 +19494,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19359
19494
  const tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds);
19360
19495
  newOptions.tenantId = tenantId;
19361
19496
  const arrayScopes = ensureScopes(scopes);
19362
- return this.msalFlow.getToken(arrayScopes, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
19497
+ return this.msalClient.getTokenByAuthorizationCode(arrayScopes, this.redirectUri, this.authorizationCode, this.clientSecret, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
19363
19498
  });
19364
19499
  }
19365
19500
  };
@@ -19507,6 +19642,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19507
19642
  exports.AuthorizationCodeCredential = AuthorizationCodeCredential;
19508
19643
  exports.AzureCliCredential = AzureCliCredential2;
19509
19644
  exports.AzureDeveloperCliCredential = AzureDeveloperCliCredential;
19645
+ exports.AzurePipelinesCredential = AzurePipelinesCredential;
19510
19646
  exports.AzurePowerShellCredential = AzurePowerShellCredential;
19511
19647
  exports.ChainedTokenCredential = ChainedTokenCredential;
19512
19648
  exports.ClientAssertionCredential = ClientAssertionCredential;
@@ -19526,7 +19662,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
19526
19662
  exports.deserializeAuthenticationRecord = deserializeAuthenticationRecord2;
19527
19663
  exports.getBearerTokenProvider = getBearerTokenProvider;
19528
19664
  exports.getDefaultAzureCredential = getDefaultAzureCredential;
19529
- exports.logger = logger$p;
19665
+ exports.logger = logger$q;
19530
19666
  exports.serializeAuthenticationRecord = serializeAuthenticationRecord2;
19531
19667
  exports.useIdentityPlugin = useIdentityPlugin2;
19532
19668
  }
@@ -20348,300 +20484,297 @@ export {
20348
20484
  };
20349
20485
  /*! Bundled license information:
20350
20486
 
20351
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Serializer.mjs:
20352
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20353
-
20354
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs:
20355
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20487
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Serializer.mjs:
20488
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20356
20489
 
20357
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthErrorCodes.mjs:
20358
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20490
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/Constants.mjs:
20491
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20359
20492
 
20360
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/AuthError.mjs:
20361
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20493
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthErrorCodes.mjs:
20494
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20362
20495
 
20363
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthErrorCodes.mjs:
20364
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20496
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthError.mjs:
20497
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20365
20498
 
20366
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientAuthError.mjs:
20367
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20499
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthErrorCodes.mjs:
20500
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20368
20501
 
20369
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AuthToken.mjs:
20370
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20502
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthError.mjs:
20503
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20371
20504
 
20372
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityType.mjs:
20373
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20505
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AuthToken.mjs:
20506
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20374
20507
 
20375
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/OpenIdConfigResponse.mjs:
20376
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20508
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityType.mjs:
20509
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20377
20510
 
20378
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationErrorCodes.mjs:
20379
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20511
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/OpenIdConfigResponse.mjs:
20512
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20380
20513
 
20381
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ClientConfigurationError.mjs:
20382
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20514
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationErrorCodes.mjs:
20515
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20383
20516
 
20384
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/StringUtils.mjs:
20385
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20517
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationError.mjs:
20518
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20386
20519
 
20387
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/UrlUtils.mjs:
20388
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20520
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/StringUtils.mjs:
20521
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20389
20522
 
20390
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/url/UrlString.mjs:
20391
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20523
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/UrlUtils.mjs:
20524
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20392
20525
 
20393
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityMetadata.mjs:
20394
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20526
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/url/UrlString.mjs:
20527
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20395
20528
 
20396
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/ProtocolMode.mjs:
20397
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20529
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityMetadata.mjs:
20530
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20398
20531
 
20399
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityOptions.mjs:
20400
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20532
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/ProtocolMode.mjs:
20533
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20401
20534
 
20402
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryResponse.mjs:
20403
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20535
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityOptions.mjs:
20536
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20404
20537
 
20405
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs:
20406
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20538
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryResponse.mjs:
20539
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20407
20540
 
20408
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/performance/PerformanceEvent.mjs:
20409
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20541
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs:
20542
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20410
20543
 
20411
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/FunctionWrappers.mjs:
20412
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20544
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/performance/PerformanceEvent.mjs:
20545
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20413
20546
 
20414
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/RegionDiscovery.mjs:
20415
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20547
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/FunctionWrappers.mjs:
20548
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20416
20549
 
20417
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/TimeUtils.mjs:
20418
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20550
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/RegionDiscovery.mjs:
20551
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20419
20552
 
20420
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/utils/CacheHelpers.mjs:
20421
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20553
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/TimeUtils.mjs:
20554
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20422
20555
 
20423
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/Authority.mjs:
20424
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20556
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/utils/CacheHelpers.mjs:
20557
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20425
20558
 
20426
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/authority/AuthorityFactory.mjs:
20427
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20559
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/Authority.mjs:
20560
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20428
20561
 
20429
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ClientAssertionUtils.mjs:
20430
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20562
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityFactory.mjs:
20563
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20431
20564
 
20432
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/constants/AADServerParamKeys.mjs:
20433
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20565
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ClientAssertionUtils.mjs:
20566
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20434
20567
 
20435
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/ICrypto.mjs:
20436
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20568
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/constants/AADServerParamKeys.mjs:
20569
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20437
20570
 
20438
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/logger/Logger.mjs:
20439
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20571
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/ICrypto.mjs:
20572
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20440
20573
 
20441
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/packageMetadata.mjs:
20442
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20574
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/logger/Logger.mjs:
20575
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20443
20576
 
20444
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/ScopeSet.mjs:
20445
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20577
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/packageMetadata.mjs:
20578
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20446
20579
 
20447
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/ClientInfo.mjs:
20448
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20580
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/ScopeSet.mjs:
20581
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20449
20582
 
20450
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/AccountInfo.mjs:
20451
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20583
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/ClientInfo.mjs:
20584
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20452
20585
 
20453
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/TokenClaims.mjs:
20454
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20586
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AccountInfo.mjs:
20587
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20455
20588
 
20456
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/AccountEntity.mjs:
20457
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20589
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/TokenClaims.mjs:
20590
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20458
20591
 
20459
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheErrorCodes.mjs:
20460
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20592
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/entities/AccountEntity.mjs:
20593
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20461
20594
 
20462
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/CacheError.mjs:
20463
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20595
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheErrorCodes.mjs:
20596
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20464
20597
 
20465
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/CacheManager.mjs:
20466
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20598
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheError.mjs:
20599
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20467
20600
 
20468
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/config/ClientConfiguration.mjs:
20469
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20601
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/CacheManager.mjs:
20602
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20470
20603
 
20471
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/ServerError.mjs:
20472
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20604
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/config/ClientConfiguration.mjs:
20605
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20473
20606
 
20474
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/ThrottlingUtils.mjs:
20475
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20607
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ServerError.mjs:
20608
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20476
20609
 
20477
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/network/NetworkManager.mjs:
20478
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20610
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/ThrottlingUtils.mjs:
20611
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20479
20612
 
20480
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/account/CcsCredential.mjs:
20481
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20613
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/NetworkManager.mjs:
20614
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20482
20615
 
20483
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestValidator.mjs:
20484
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20616
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/CcsCredential.mjs:
20617
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20485
20618
 
20486
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/request/RequestParameterBuilder.mjs:
20487
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20619
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestValidator.mjs:
20620
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20488
20621
 
20489
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/BaseClient.mjs:
20490
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20622
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestParameterBuilder.mjs:
20623
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20491
20624
 
20492
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthErrorCodes.mjs:
20493
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20625
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/BaseClient.mjs:
20626
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20494
20627
 
20495
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/error/InteractionRequiredAuthError.mjs:
20496
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20628
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthErrorCodes.mjs:
20629
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20497
20630
 
20498
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs:
20499
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20631
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthError.mjs:
20632
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20500
20633
 
20501
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs:
20502
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20634
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ProtocolUtils.mjs:
20635
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20503
20636
 
20504
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/crypto/PopTokenGenerator.mjs:
20505
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20637
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/PopTokenGenerator.mjs:
20638
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20506
20639
 
20507
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/persistence/TokenCacheContext.mjs:
20508
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20640
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/persistence/TokenCacheContext.mjs:
20641
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20509
20642
 
20510
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/response/ResponseHandler.mjs:
20511
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20643
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/response/ResponseHandler.mjs:
20644
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20512
20645
 
20513
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/AuthorizationCodeClient.mjs:
20514
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20646
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/AuthorizationCodeClient.mjs:
20647
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20515
20648
 
20516
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/RefreshTokenClient.mjs:
20517
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20649
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/RefreshTokenClient.mjs:
20650
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20518
20651
 
20519
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/client/SilentFlowClient.mjs:
20520
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20652
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/SilentFlowClient.mjs:
20653
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20521
20654
 
20522
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/telemetry/server/ServerTelemetryManager.mjs:
20523
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20655
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/server/ServerTelemetryManager.mjs:
20656
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20524
20657
 
20525
- .store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/index.mjs:
20526
- (*! @azure/msal-common v14.12.0 2024-06-10 *)
20658
+ .store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/index.mjs:
20659
+ (*! @azure/msal-common v14.13.0 2024-07-01 *)
20527
20660
 
20528
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/serializer/Deserializer.mjs:
20529
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20661
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Deserializer.mjs:
20662
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20530
20663
 
20531
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/internals.mjs:
20532
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20664
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/internals.mjs:
20665
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20533
20666
 
20534
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/Constants.mjs:
20535
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20667
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/Constants.mjs:
20668
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20536
20669
 
20537
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/NetworkUtils.mjs:
20538
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20670
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/NetworkUtils.mjs:
20671
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20539
20672
 
20540
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClient.mjs:
20541
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20673
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClient.mjs:
20674
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20542
20675
 
20543
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityErrorCodes.mjs:
20544
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20676
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityErrorCodes.mjs:
20677
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20545
20678
 
20546
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/ManagedIdentityError.mjs:
20547
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20679
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityError.mjs:
20680
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20548
20681
 
20549
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityId.mjs:
20550
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20682
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityId.mjs:
20683
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20551
20684
 
20552
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/retry/LinearRetryPolicy.mjs:
20553
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20685
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/retry/LinearRetryPolicy.mjs:
20686
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20554
20687
 
20555
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/HttpClientWithRetries.mjs:
20556
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20688
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClientWithRetries.mjs:
20689
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20557
20690
 
20558
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/Configuration.mjs:
20559
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20691
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/NodeAuthError.mjs:
20692
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20560
20693
 
20561
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/GuidGenerator.mjs:
20562
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20694
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/Configuration.mjs:
20695
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20563
20696
 
20564
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/utils/EncodingUtils.mjs:
20565
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20697
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/GuidGenerator.mjs:
20698
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20566
20699
 
20567
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/HashUtils.mjs:
20568
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20700
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/EncodingUtils.mjs:
20701
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20569
20702
 
20570
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/PkceGenerator.mjs:
20571
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20703
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/HashUtils.mjs:
20704
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20572
20705
 
20573
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/crypto/CryptoProvider.mjs:
20574
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20706
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/PkceGenerator.mjs:
20707
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20575
20708
 
20576
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/NodeStorage.mjs:
20577
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20709
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/CryptoProvider.mjs:
20710
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20578
20711
 
20579
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/TokenCache.mjs:
20580
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20712
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/NodeStorage.mjs:
20713
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20581
20714
 
20582
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientAssertion.mjs:
20583
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20715
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/TokenCache.mjs:
20716
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20584
20717
 
20585
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/packageMetadata.mjs:
20586
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20718
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientAssertion.mjs:
20719
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20587
20720
 
20588
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs:
20589
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20721
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/packageMetadata.mjs:
20722
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20590
20723
 
20591
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/UsernamePasswordClient.mjs:
20592
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20724
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/UsernamePasswordClient.mjs:
20725
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20593
20726
 
20594
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientApplication.mjs:
20595
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20727
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientApplication.mjs:
20728
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20596
20729
 
20597
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/network/LoopbackClient.mjs:
20598
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20730
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/LoopbackClient.mjs:
20731
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20599
20732
 
20600
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/DeviceCodeClient.mjs:
20601
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20733
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/DeviceCodeClient.mjs:
20734
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20602
20735
 
20603
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/PublicClientApplication.mjs:
20604
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20736
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/PublicClientApplication.mjs:
20737
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20605
20738
 
20606
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ClientCredentialClient.mjs:
20607
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20739
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientCredentialClient.mjs:
20740
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20608
20741
 
20609
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/OnBehalfOfClient.mjs:
20610
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20742
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/OnBehalfOfClient.mjs:
20743
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20611
20744
 
20612
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ConfidentialClientApplication.mjs:
20613
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20745
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ConfidentialClientApplication.mjs:
20746
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20614
20747
 
20615
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs:
20616
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20748
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs:
20749
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20617
20750
 
20618
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/config/ManagedIdentityRequestParameters.mjs:
20619
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20751
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityRequestParameters.mjs:
20752
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20620
20753
 
20621
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AppService.mjs:
20622
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20754
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AppService.mjs:
20755
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20623
20756
 
20624
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/AzureArc.mjs:
20625
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20757
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AzureArc.mjs:
20758
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20626
20759
 
20627
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/CloudShell.mjs:
20628
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20760
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/CloudShell.mjs:
20761
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20629
20762
 
20630
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/Imds.mjs:
20631
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20763
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/Imds.mjs:
20764
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20632
20765
 
20633
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs:
20634
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20766
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs:
20767
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20635
20768
 
20636
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityClient.mjs:
20637
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20769
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityClient.mjs:
20770
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20638
20771
 
20639
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/client/ManagedIdentityApplication.mjs:
20640
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20772
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityApplication.mjs:
20773
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20641
20774
 
20642
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/cache/distributed/DistributedCachePlugin.mjs:
20643
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20775
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/distributed/DistributedCachePlugin.mjs:
20776
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20644
20777
 
20645
- .store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/index.mjs:
20646
- (*! @azure/msal-node v2.9.2 2024-06-10 *)
20778
+ .store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/index.mjs:
20779
+ (*! @azure/msal-node v2.11.0 2024-07-12 *)
20647
20780
  */