@ms-cloudpack/remote-cache 0.8.1 → 0.8.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{AzureRemoteCacheClient-YFWJLZNA.js → AzureRemoteCacheClient-RMQPZIAB.js} +5 -5
- package/dist/{ReporterDecorator-5LUAHYKK.js → ReporterDecorator-6UITFJNM.js} +3 -3
- package/dist/{chunk-FW2AO4WO.js → chunk-5T25O66R.js} +2 -2
- package/dist/{chunk-DSANWO7J.js → chunk-BT2CALS2.js} +1 -1
- package/dist/{chunk-GFDVXVVH.js → chunk-FCW2XE62.js} +1 -1
- package/dist/{chunk-D7DHZQ7L.js → chunk-PFJSWZPM.js} +251 -259
- package/dist/{chunk-LRFMBF43.js → chunk-WIA37P2F.js} +11 -12
- package/dist/{getCredential-W6MRP3D2.js → getCredential-PELYKL3R.js} +1294 -1161
- package/dist/{getListOfBlobs-2GKCJGDO.js → getListOfBlobs-VBMYMM3Y.js} +4 -4
- package/dist/index.js +5 -5
- package/package.json +3 -3
|
@@ -6,14 +6,14 @@ const __filename = topLevelUrl.fileURLToPath(import.meta.url);
|
|
|
6
6
|
const __dirname = topLevelPath.dirname(__filename);
|
|
7
7
|
import {
|
|
8
8
|
require_package
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-BT2CALS2.js";
|
|
10
10
|
import {
|
|
11
11
|
require_commonjs as require_commonjs2,
|
|
12
12
|
require_commonjs2 as require_commonjs3,
|
|
13
13
|
require_commonjs3 as require_commonjs4,
|
|
14
14
|
require_commonjs4 as require_commonjs5,
|
|
15
15
|
require_dist
|
|
16
|
-
} from "./chunk-
|
|
16
|
+
} from "./chunk-PFJSWZPM.js";
|
|
17
17
|
import {
|
|
18
18
|
__commonJS,
|
|
19
19
|
__esm,
|
|
@@ -23,12 +23,12 @@ import {
|
|
|
23
23
|
__toCommonJS,
|
|
24
24
|
__toESM,
|
|
25
25
|
require_commonjs
|
|
26
|
-
} from "./chunk-
|
|
26
|
+
} from "./chunk-WIA37P2F.js";
|
|
27
27
|
|
|
28
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
28
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Serializer.mjs
|
|
29
29
|
var _Serializer, Serializer;
|
|
30
30
|
var init_Serializer = __esm({
|
|
31
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
31
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Serializer.mjs"() {
|
|
32
32
|
"use strict";
|
|
33
33
|
_Serializer = class _Serializer {
|
|
34
34
|
/**
|
|
@@ -169,10 +169,10 @@ var init_Serializer = __esm({
|
|
|
169
169
|
}
|
|
170
170
|
});
|
|
171
171
|
|
|
172
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
172
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/Constants.mjs
|
|
173
173
|
var Constants, HttpStatus, OIDC_DEFAULT_SCOPES, OIDC_SCOPES, HeaderNames, AADAuthorityConstants, ClaimsRequestKeys, PromptValue, CodeChallengeMethodValues, ServerResponseType, ResponseMode, GrantType, CacheAccountType, Separators, CredentialType, APP_METADATA, CLIENT_INFO, THE_FAMILY_ID, AUTHORITY_METADATA_CONSTANTS, AuthorityMetadataSource, SERVER_TELEM_CONSTANTS, AuthenticationScheme, ThrottlingConstants, Errors, PasswordGrantConstants, ResponseCodes, RegionDiscoverySources, RegionDiscoveryOutcomes, CacheOutcome, DEFAULT_TOKEN_RENEWAL_OFFSET_SEC;
|
|
174
174
|
var init_Constants = __esm({
|
|
175
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
175
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/Constants.mjs"() {
|
|
176
176
|
"use strict";
|
|
177
177
|
Constants = {
|
|
178
178
|
LIBRARY_NAME: "MSAL.JS",
|
|
@@ -215,6 +215,7 @@ var init_Constants = __esm({
|
|
|
215
215
|
NOT_DEFINED: "not_defined",
|
|
216
216
|
EMPTY_STRING: "",
|
|
217
217
|
NOT_APPLICABLE: "N/A",
|
|
218
|
+
NOT_AVAILABLE: "Not Available",
|
|
218
219
|
FORWARD_SLASH: "/",
|
|
219
220
|
IMDS_ENDPOINT: "http://169.254.169.254/metadata/instance/compute/location",
|
|
220
221
|
IMDS_VERSION: "2020-06-01",
|
|
@@ -404,7 +405,7 @@ var init_Constants = __esm({
|
|
|
404
405
|
}
|
|
405
406
|
});
|
|
406
407
|
|
|
407
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
408
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthErrorCodes.mjs
|
|
408
409
|
var AuthErrorCodes_exports = {};
|
|
409
410
|
__export(AuthErrorCodes_exports, {
|
|
410
411
|
postRequestFailed: () => postRequestFailed,
|
|
@@ -412,20 +413,20 @@ __export(AuthErrorCodes_exports, {
|
|
|
412
413
|
});
|
|
413
414
|
var unexpectedError, postRequestFailed;
|
|
414
415
|
var init_AuthErrorCodes = __esm({
|
|
415
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
416
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthErrorCodes.mjs"() {
|
|
416
417
|
"use strict";
|
|
417
418
|
unexpectedError = "unexpected_error";
|
|
418
419
|
postRequestFailed = "post_request_failed";
|
|
419
420
|
}
|
|
420
421
|
});
|
|
421
422
|
|
|
422
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
423
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthError.mjs
|
|
423
424
|
function createAuthError(code, additionalMessage) {
|
|
424
425
|
return new AuthError(code, additionalMessage ? `${AuthErrorMessages[code]} ${additionalMessage}` : AuthErrorMessages[code]);
|
|
425
426
|
}
|
|
426
427
|
var AuthErrorMessages, AuthErrorMessage, _AuthError, AuthError;
|
|
427
428
|
var init_AuthError = __esm({
|
|
428
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
429
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthError.mjs"() {
|
|
429
430
|
"use strict";
|
|
430
431
|
init_Constants();
|
|
431
432
|
init_AuthErrorCodes();
|
|
@@ -463,7 +464,7 @@ var init_AuthError = __esm({
|
|
|
463
464
|
}
|
|
464
465
|
});
|
|
465
466
|
|
|
466
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
467
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthErrorCodes.mjs
|
|
467
468
|
var ClientAuthErrorCodes_exports = {};
|
|
468
469
|
__export(ClientAuthErrorCodes_exports, {
|
|
469
470
|
authTimeNotFound: () => authTimeNotFound,
|
|
@@ -513,7 +514,7 @@ __export(ClientAuthErrorCodes_exports, {
|
|
|
513
514
|
});
|
|
514
515
|
var clientInfoDecodingError, clientInfoEmptyError, tokenParsingError, nullOrEmptyToken, endpointResolutionError, networkError, openIdConfigError, hashNotDeserialized, invalidState, stateMismatch, stateNotFound, nonceMismatch, authTimeNotFound, maxAgeTranspired, multipleMatchingTokens, multipleMatchingAccounts, multipleMatchingAppMetadata, requestCannotBeMade, cannotRemoveEmptyScope, cannotAppendScopeSet, emptyInputScopeSet, deviceCodePollingCancelled, deviceCodeExpired, deviceCodeUnknownError, noAccountInSilentRequest, invalidCacheRecord, invalidCacheEnvironment, noAccountFound, noCryptoObject, unexpectedCredentialType, invalidAssertion, invalidClientCredential, tokenRefreshRequired, userTimeoutReached, tokenClaimsCnfRequiredForSignedJwt, authorizationCodeMissingFromServerResponse, bindingKeyNotRemoved, endSessionEndpointNotSupported, keyIdMissing, noNetworkConnectivity, userCanceled, missingTenantIdError, methodNotImplemented, nestedAppAuthBridgeDisabled;
|
|
515
516
|
var init_ClientAuthErrorCodes = __esm({
|
|
516
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
517
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthErrorCodes.mjs"() {
|
|
517
518
|
"use strict";
|
|
518
519
|
clientInfoDecodingError = "client_info_decoding_error";
|
|
519
520
|
clientInfoEmptyError = "client_info_empty_error";
|
|
@@ -562,13 +563,13 @@ var init_ClientAuthErrorCodes = __esm({
|
|
|
562
563
|
}
|
|
563
564
|
});
|
|
564
565
|
|
|
565
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
566
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthError.mjs
|
|
566
567
|
function createClientAuthError(errorCode, additionalMessage) {
|
|
567
568
|
return new ClientAuthError(errorCode, additionalMessage);
|
|
568
569
|
}
|
|
569
570
|
var ClientAuthErrorMessages, ClientAuthErrorMessage, _ClientAuthError, ClientAuthError;
|
|
570
571
|
var init_ClientAuthError = __esm({
|
|
571
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
572
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthError.mjs"() {
|
|
572
573
|
"use strict";
|
|
573
574
|
init_AuthError();
|
|
574
575
|
init_ClientAuthErrorCodes();
|
|
@@ -805,7 +806,7 @@ var init_ClientAuthError = __esm({
|
|
|
805
806
|
}
|
|
806
807
|
});
|
|
807
808
|
|
|
808
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
809
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AuthToken.mjs
|
|
809
810
|
var AuthToken_exports = {};
|
|
810
811
|
__export(AuthToken_exports, {
|
|
811
812
|
checkMaxAge: () => checkMaxAge,
|
|
@@ -839,7 +840,7 @@ function checkMaxAge(authTime, maxAge) {
|
|
|
839
840
|
}
|
|
840
841
|
}
|
|
841
842
|
var init_AuthToken = __esm({
|
|
842
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
843
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AuthToken.mjs"() {
|
|
843
844
|
"use strict";
|
|
844
845
|
init_ClientAuthError();
|
|
845
846
|
init_ClientAuthErrorCodes();
|
|
@@ -849,10 +850,10 @@ var init_AuthToken = __esm({
|
|
|
849
850
|
}
|
|
850
851
|
});
|
|
851
852
|
|
|
852
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
853
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityType.mjs
|
|
853
854
|
var AuthorityType;
|
|
854
855
|
var init_AuthorityType = __esm({
|
|
855
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
856
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityType.mjs"() {
|
|
856
857
|
"use strict";
|
|
857
858
|
AuthorityType = {
|
|
858
859
|
Default: 0,
|
|
@@ -863,18 +864,18 @@ var init_AuthorityType = __esm({
|
|
|
863
864
|
}
|
|
864
865
|
});
|
|
865
866
|
|
|
866
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
867
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/OpenIdConfigResponse.mjs
|
|
867
868
|
function isOpenIdConfigResponse(response) {
|
|
868
869
|
return response.hasOwnProperty("authorization_endpoint") && response.hasOwnProperty("token_endpoint") && response.hasOwnProperty("issuer") && response.hasOwnProperty("jwks_uri");
|
|
869
870
|
}
|
|
870
871
|
var init_OpenIdConfigResponse = __esm({
|
|
871
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
872
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/OpenIdConfigResponse.mjs"() {
|
|
872
873
|
"use strict";
|
|
873
874
|
__name(isOpenIdConfigResponse, "isOpenIdConfigResponse");
|
|
874
875
|
}
|
|
875
876
|
});
|
|
876
877
|
|
|
877
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
878
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationErrorCodes.mjs
|
|
878
879
|
var ClientConfigurationErrorCodes_exports = {};
|
|
879
880
|
__export(ClientConfigurationErrorCodes_exports, {
|
|
880
881
|
authorityMismatch: () => authorityMismatch,
|
|
@@ -902,7 +903,7 @@ __export(ClientConfigurationErrorCodes_exports, {
|
|
|
902
903
|
});
|
|
903
904
|
var redirectUriEmpty, claimsRequestParsingError, authorityUriInsecure, urlParseError, urlEmptyError, emptyInputScopesError, invalidPromptValue, invalidClaims, tokenRequestEmpty, logoutRequestEmpty, invalidCodeChallengeMethod, pkceParamsMissing, invalidCloudDiscoveryMetadata, invalidAuthorityMetadata, untrustedAuthority, missingSshJwk, missingSshKid, missingNonceAuthenticationHeader, invalidAuthenticationHeader, cannotSetOIDCOptions, cannotAllowNativeBroker, authorityMismatch;
|
|
904
905
|
var init_ClientConfigurationErrorCodes = __esm({
|
|
905
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
906
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationErrorCodes.mjs"() {
|
|
906
907
|
"use strict";
|
|
907
908
|
redirectUriEmpty = "redirect_uri_empty";
|
|
908
909
|
claimsRequestParsingError = "claims_request_parsing_error";
|
|
@@ -929,13 +930,13 @@ var init_ClientConfigurationErrorCodes = __esm({
|
|
|
929
930
|
}
|
|
930
931
|
});
|
|
931
932
|
|
|
932
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
933
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationError.mjs
|
|
933
934
|
function createClientConfigurationError(errorCode) {
|
|
934
935
|
return new ClientConfigurationError(errorCode);
|
|
935
936
|
}
|
|
936
937
|
var ClientConfigurationErrorMessages, ClientConfigurationErrorMessage, _ClientConfigurationError, ClientConfigurationError;
|
|
937
938
|
var init_ClientConfigurationError = __esm({
|
|
938
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
939
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationError.mjs"() {
|
|
939
940
|
"use strict";
|
|
940
941
|
init_AuthError();
|
|
941
942
|
init_ClientConfigurationErrorCodes();
|
|
@@ -1066,10 +1067,10 @@ var init_ClientConfigurationError = __esm({
|
|
|
1066
1067
|
}
|
|
1067
1068
|
});
|
|
1068
1069
|
|
|
1069
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1070
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/StringUtils.mjs
|
|
1070
1071
|
var _StringUtils, StringUtils;
|
|
1071
1072
|
var init_StringUtils = __esm({
|
|
1072
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1073
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/StringUtils.mjs"() {
|
|
1073
1074
|
"use strict";
|
|
1074
1075
|
_StringUtils = class _StringUtils {
|
|
1075
1076
|
/**
|
|
@@ -1154,7 +1155,7 @@ var init_StringUtils = __esm({
|
|
|
1154
1155
|
}
|
|
1155
1156
|
});
|
|
1156
1157
|
|
|
1157
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1158
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/UrlUtils.mjs
|
|
1158
1159
|
var UrlUtils_exports = {};
|
|
1159
1160
|
__export(UrlUtils_exports, {
|
|
1160
1161
|
getDeserializedResponse: () => getDeserializedResponse,
|
|
@@ -1184,7 +1185,7 @@ function getDeserializedResponse(responseString) {
|
|
|
1184
1185
|
return null;
|
|
1185
1186
|
}
|
|
1186
1187
|
var init_UrlUtils = __esm({
|
|
1187
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1188
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/UrlUtils.mjs"() {
|
|
1188
1189
|
"use strict";
|
|
1189
1190
|
init_ClientAuthError();
|
|
1190
1191
|
init_ClientAuthErrorCodes();
|
|
@@ -1193,10 +1194,10 @@ var init_UrlUtils = __esm({
|
|
|
1193
1194
|
}
|
|
1194
1195
|
});
|
|
1195
1196
|
|
|
1196
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1197
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/url/UrlString.mjs
|
|
1197
1198
|
var _UrlString, UrlString;
|
|
1198
1199
|
var init_UrlString = __esm({
|
|
1199
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1200
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/url/UrlString.mjs"() {
|
|
1200
1201
|
"use strict";
|
|
1201
1202
|
init_ClientConfigurationError();
|
|
1202
1203
|
init_StringUtils();
|
|
@@ -1339,7 +1340,7 @@ var init_UrlString = __esm({
|
|
|
1339
1340
|
}
|
|
1340
1341
|
});
|
|
1341
1342
|
|
|
1342
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1343
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityMetadata.mjs
|
|
1343
1344
|
function getAliasesFromStaticSources(staticAuthorityOptions, logger) {
|
|
1344
1345
|
var _a2;
|
|
1345
1346
|
let staticAliases;
|
|
@@ -1378,7 +1379,7 @@ function getCloudDiscoveryMetadataFromNetworkResponse(response, authorityHost) {
|
|
|
1378
1379
|
}
|
|
1379
1380
|
var rawMetdataJSON, EndpointMetadata, InstanceDiscoveryMetadata, InstanceDiscoveryMetadataAliases;
|
|
1380
1381
|
var init_AuthorityMetadata = __esm({
|
|
1381
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1382
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityMetadata.mjs"() {
|
|
1382
1383
|
"use strict";
|
|
1383
1384
|
init_UrlString();
|
|
1384
1385
|
init_Constants();
|
|
@@ -1463,10 +1464,10 @@ var init_AuthorityMetadata = __esm({
|
|
|
1463
1464
|
}
|
|
1464
1465
|
});
|
|
1465
1466
|
|
|
1466
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1467
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/ProtocolMode.mjs
|
|
1467
1468
|
var ProtocolMode;
|
|
1468
1469
|
var init_ProtocolMode = __esm({
|
|
1469
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1470
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/ProtocolMode.mjs"() {
|
|
1470
1471
|
"use strict";
|
|
1471
1472
|
ProtocolMode = {
|
|
1472
1473
|
AAD: "AAD",
|
|
@@ -1475,10 +1476,10 @@ var init_ProtocolMode = __esm({
|
|
|
1475
1476
|
}
|
|
1476
1477
|
});
|
|
1477
1478
|
|
|
1478
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1479
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityOptions.mjs
|
|
1479
1480
|
var AzureCloudInstance;
|
|
1480
1481
|
var init_AuthorityOptions = __esm({
|
|
1481
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1482
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityOptions.mjs"() {
|
|
1482
1483
|
"use strict";
|
|
1483
1484
|
AzureCloudInstance = {
|
|
1484
1485
|
// AzureCloudInstance is not specified.
|
|
@@ -1497,32 +1498,32 @@ var init_AuthorityOptions = __esm({
|
|
|
1497
1498
|
}
|
|
1498
1499
|
});
|
|
1499
1500
|
|
|
1500
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1501
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryResponse.mjs
|
|
1501
1502
|
function isCloudInstanceDiscoveryResponse(response) {
|
|
1502
1503
|
return response.hasOwnProperty("tenant_discovery_endpoint") && response.hasOwnProperty("metadata");
|
|
1503
1504
|
}
|
|
1504
1505
|
var init_CloudInstanceDiscoveryResponse = __esm({
|
|
1505
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1506
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryResponse.mjs"() {
|
|
1506
1507
|
"use strict";
|
|
1507
1508
|
__name(isCloudInstanceDiscoveryResponse, "isCloudInstanceDiscoveryResponse");
|
|
1508
1509
|
}
|
|
1509
1510
|
});
|
|
1510
1511
|
|
|
1511
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1512
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs
|
|
1512
1513
|
function isCloudInstanceDiscoveryErrorResponse(response) {
|
|
1513
1514
|
return response.hasOwnProperty("error") && response.hasOwnProperty("error_description");
|
|
1514
1515
|
}
|
|
1515
1516
|
var init_CloudInstanceDiscoveryErrorResponse = __esm({
|
|
1516
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1517
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs"() {
|
|
1517
1518
|
"use strict";
|
|
1518
1519
|
__name(isCloudInstanceDiscoveryErrorResponse, "isCloudInstanceDiscoveryErrorResponse");
|
|
1519
1520
|
}
|
|
1520
1521
|
});
|
|
1521
1522
|
|
|
1522
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1523
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/performance/PerformanceEvent.mjs
|
|
1523
1524
|
var PerformanceEvents, PerformanceEventAbbreviations;
|
|
1524
1525
|
var init_PerformanceEvent = __esm({
|
|
1525
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1526
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/performance/PerformanceEvent.mjs"() {
|
|
1526
1527
|
"use strict";
|
|
1527
1528
|
PerformanceEvents = {
|
|
1528
1529
|
/**
|
|
@@ -1972,10 +1973,10 @@ var init_PerformanceEvent = __esm({
|
|
|
1972
1973
|
}
|
|
1973
1974
|
});
|
|
1974
1975
|
|
|
1975
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1976
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/FunctionWrappers.mjs
|
|
1976
1977
|
var invoke, invokeAsync;
|
|
1977
1978
|
var init_FunctionWrappers = __esm({
|
|
1978
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
1979
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/FunctionWrappers.mjs"() {
|
|
1979
1980
|
"use strict";
|
|
1980
1981
|
invoke = /* @__PURE__ */ __name((callback, eventName, logger, telemetryClient, correlationId) => {
|
|
1981
1982
|
return (...args) => {
|
|
@@ -2038,10 +2039,10 @@ var init_FunctionWrappers = __esm({
|
|
|
2038
2039
|
}
|
|
2039
2040
|
});
|
|
2040
2041
|
|
|
2041
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2042
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/RegionDiscovery.mjs
|
|
2042
2043
|
var _RegionDiscovery, RegionDiscovery;
|
|
2043
2044
|
var init_RegionDiscovery = __esm({
|
|
2044
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2045
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/RegionDiscovery.mjs"() {
|
|
2045
2046
|
"use strict";
|
|
2046
2047
|
init_Constants();
|
|
2047
2048
|
init_PerformanceEvent();
|
|
@@ -2134,7 +2135,7 @@ var init_RegionDiscovery = __esm({
|
|
|
2134
2135
|
}
|
|
2135
2136
|
});
|
|
2136
2137
|
|
|
2137
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2138
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/TimeUtils.mjs
|
|
2138
2139
|
var TimeUtils_exports = {};
|
|
2139
2140
|
__export(TimeUtils_exports, {
|
|
2140
2141
|
delay: () => delay,
|
|
@@ -2158,7 +2159,7 @@ function delay(t, value) {
|
|
|
2158
2159
|
return new Promise((resolve) => setTimeout(() => resolve(value), t));
|
|
2159
2160
|
}
|
|
2160
2161
|
var init_TimeUtils = __esm({
|
|
2161
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2162
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/TimeUtils.mjs"() {
|
|
2162
2163
|
"use strict";
|
|
2163
2164
|
__name(nowSeconds, "nowSeconds");
|
|
2164
2165
|
__name(isTokenExpired, "isTokenExpired");
|
|
@@ -2167,7 +2168,7 @@ var init_TimeUtils = __esm({
|
|
|
2167
2168
|
}
|
|
2168
2169
|
});
|
|
2169
2170
|
|
|
2170
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2171
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/utils/CacheHelpers.mjs
|
|
2171
2172
|
var CacheHelpers_exports = {};
|
|
2172
2173
|
__export(CacheHelpers_exports, {
|
|
2173
2174
|
createAccessTokenEntity: () => createAccessTokenEntity,
|
|
@@ -2375,7 +2376,7 @@ function isAuthorityMetadataExpired(metadata) {
|
|
|
2375
2376
|
return metadata.expiresAt <= nowSeconds();
|
|
2376
2377
|
}
|
|
2377
2378
|
var init_CacheHelpers = __esm({
|
|
2378
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2379
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/utils/CacheHelpers.mjs"() {
|
|
2379
2380
|
"use strict";
|
|
2380
2381
|
init_AuthToken();
|
|
2381
2382
|
init_ClientAuthError();
|
|
@@ -2407,7 +2408,7 @@ var init_CacheHelpers = __esm({
|
|
|
2407
2408
|
}
|
|
2408
2409
|
});
|
|
2409
2410
|
|
|
2410
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2411
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/Authority.mjs
|
|
2411
2412
|
function getTenantFromAuthorityString(authority) {
|
|
2412
2413
|
var _a2;
|
|
2413
2414
|
const authorityUrl = new UrlString(authority);
|
|
@@ -2443,7 +2444,7 @@ function buildStaticAuthorityOptions(authOptions) {
|
|
|
2443
2444
|
}
|
|
2444
2445
|
var _Authority, Authority;
|
|
2445
2446
|
var init_Authority = __esm({
|
|
2446
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
2447
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/Authority.mjs"() {
|
|
2447
2448
|
"use strict";
|
|
2448
2449
|
init_AuthorityType();
|
|
2449
2450
|
init_OpenIdConfigResponse();
|
|
@@ -3161,7 +3162,7 @@ Error Description: ${typedError.message}`);
|
|
|
3161
3162
|
}
|
|
3162
3163
|
});
|
|
3163
3164
|
|
|
3164
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3165
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityFactory.mjs
|
|
3165
3166
|
var AuthorityFactory_exports = {};
|
|
3166
3167
|
__export(AuthorityFactory_exports, {
|
|
3167
3168
|
createDiscoveredInstance: () => createDiscoveredInstance
|
|
@@ -3178,7 +3179,7 @@ async function createDiscoveredInstance(authorityUri, networkClient, cacheManage
|
|
|
3178
3179
|
}
|
|
3179
3180
|
}
|
|
3180
3181
|
var init_AuthorityFactory = __esm({
|
|
3181
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3182
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityFactory.mjs"() {
|
|
3182
3183
|
"use strict";
|
|
3183
3184
|
init_Authority();
|
|
3184
3185
|
init_ClientAuthError();
|
|
@@ -3189,7 +3190,7 @@ var init_AuthorityFactory = __esm({
|
|
|
3189
3190
|
}
|
|
3190
3191
|
});
|
|
3191
3192
|
|
|
3192
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3193
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ClientAssertionUtils.mjs
|
|
3193
3194
|
async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
|
|
3194
3195
|
if (typeof clientAssertion === "string") {
|
|
3195
3196
|
return clientAssertion;
|
|
@@ -3202,13 +3203,13 @@ async function getClientAssertion(clientAssertion, clientId, tokenEndpoint) {
|
|
|
3202
3203
|
}
|
|
3203
3204
|
}
|
|
3204
3205
|
var init_ClientAssertionUtils = __esm({
|
|
3205
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3206
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ClientAssertionUtils.mjs"() {
|
|
3206
3207
|
"use strict";
|
|
3207
3208
|
__name(getClientAssertion, "getClientAssertion");
|
|
3208
3209
|
}
|
|
3209
3210
|
});
|
|
3210
3211
|
|
|
3211
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3212
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/constants/AADServerParamKeys.mjs
|
|
3212
3213
|
var AADServerParamKeys_exports = {};
|
|
3213
3214
|
__export(AADServerParamKeys_exports, {
|
|
3214
3215
|
ACCESS_TOKEN: () => ACCESS_TOKEN,
|
|
@@ -3266,7 +3267,7 @@ __export(AADServerParamKeys_exports, {
|
|
|
3266
3267
|
});
|
|
3267
3268
|
var CLIENT_ID, REDIRECT_URI, RESPONSE_TYPE, RESPONSE_MODE, GRANT_TYPE, CLAIMS, SCOPE, ERROR, ERROR_DESCRIPTION, ACCESS_TOKEN, ID_TOKEN, REFRESH_TOKEN, EXPIRES_IN, REFRESH_TOKEN_EXPIRES_IN, STATE, NONCE, PROMPT, SESSION_STATE, CLIENT_INFO2, CODE, CODE_CHALLENGE, CODE_CHALLENGE_METHOD, CODE_VERIFIER, CLIENT_REQUEST_ID, X_CLIENT_SKU, X_CLIENT_VER, X_CLIENT_OS, X_CLIENT_CPU, X_CLIENT_CURR_TELEM, X_CLIENT_LAST_TELEM, X_MS_LIB_CAPABILITY, X_APP_NAME, X_APP_VER, POST_LOGOUT_URI, ID_TOKEN_HINT, DEVICE_CODE, CLIENT_SECRET, CLIENT_ASSERTION, CLIENT_ASSERTION_TYPE, TOKEN_TYPE, REQ_CNF, OBO_ASSERTION, REQUESTED_TOKEN_USE, ON_BEHALF_OF, FOCI, CCS_HEADER, RETURN_SPA_CODE, NATIVE_BROKER, LOGOUT_HINT, SID, LOGIN_HINT, DOMAIN_HINT;
|
|
3268
3269
|
var init_AADServerParamKeys = __esm({
|
|
3269
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3270
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/constants/AADServerParamKeys.mjs"() {
|
|
3270
3271
|
"use strict";
|
|
3271
3272
|
CLIENT_ID = "client_id";
|
|
3272
3273
|
REDIRECT_URI = "redirect_uri";
|
|
@@ -3323,10 +3324,10 @@ var init_AADServerParamKeys = __esm({
|
|
|
3323
3324
|
}
|
|
3324
3325
|
});
|
|
3325
3326
|
|
|
3326
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3327
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/ICrypto.mjs
|
|
3327
3328
|
var DEFAULT_CRYPTO_IMPLEMENTATION;
|
|
3328
3329
|
var init_ICrypto = __esm({
|
|
3329
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3330
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/ICrypto.mjs"() {
|
|
3330
3331
|
"use strict";
|
|
3331
3332
|
init_ClientAuthError();
|
|
3332
3333
|
init_ClientAuthErrorCodes();
|
|
@@ -3365,10 +3366,10 @@ var init_ICrypto = __esm({
|
|
|
3365
3366
|
}
|
|
3366
3367
|
});
|
|
3367
3368
|
|
|
3368
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3369
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/logger/Logger.mjs
|
|
3369
3370
|
var LogLevel, _Logger, Logger;
|
|
3370
3371
|
var init_Logger = __esm({
|
|
3371
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3372
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/logger/Logger.mjs"() {
|
|
3372
3373
|
"use strict";
|
|
3373
3374
|
init_Constants();
|
|
3374
3375
|
(function(LogLevel2) {
|
|
@@ -3543,20 +3544,20 @@ var init_Logger = __esm({
|
|
|
3543
3544
|
}
|
|
3544
3545
|
});
|
|
3545
3546
|
|
|
3546
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3547
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/packageMetadata.mjs
|
|
3547
3548
|
var name, version;
|
|
3548
3549
|
var init_packageMetadata = __esm({
|
|
3549
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3550
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/packageMetadata.mjs"() {
|
|
3550
3551
|
"use strict";
|
|
3551
3552
|
name = "@azure/msal-common";
|
|
3552
|
-
version = "14.
|
|
3553
|
+
version = "14.13.0";
|
|
3553
3554
|
}
|
|
3554
3555
|
});
|
|
3555
3556
|
|
|
3556
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3557
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/ScopeSet.mjs
|
|
3557
3558
|
var _ScopeSet, ScopeSet;
|
|
3558
3559
|
var init_ScopeSet = __esm({
|
|
3559
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3560
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/ScopeSet.mjs"() {
|
|
3560
3561
|
"use strict";
|
|
3561
3562
|
init_ClientConfigurationError();
|
|
3562
3563
|
init_StringUtils();
|
|
@@ -3743,7 +3744,7 @@ var init_ScopeSet = __esm({
|
|
|
3743
3744
|
}
|
|
3744
3745
|
});
|
|
3745
3746
|
|
|
3746
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3747
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/ClientInfo.mjs
|
|
3747
3748
|
function buildClientInfo(rawClientInfo, base64Decode) {
|
|
3748
3749
|
if (!rawClientInfo) {
|
|
3749
3750
|
throw createClientAuthError(clientInfoEmptyError);
|
|
@@ -3766,7 +3767,7 @@ function buildClientInfoFromHomeAccountId(homeAccountId) {
|
|
|
3766
3767
|
};
|
|
3767
3768
|
}
|
|
3768
3769
|
var init_ClientInfo = __esm({
|
|
3769
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3770
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/ClientInfo.mjs"() {
|
|
3770
3771
|
"use strict";
|
|
3771
3772
|
init_ClientAuthError();
|
|
3772
3773
|
init_Constants();
|
|
@@ -3776,7 +3777,7 @@ var init_ClientInfo = __esm({
|
|
|
3776
3777
|
}
|
|
3777
3778
|
});
|
|
3778
3779
|
|
|
3779
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3780
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AccountInfo.mjs
|
|
3780
3781
|
function tenantIdMatchesHomeTenant(tenantId, homeAccountId) {
|
|
3781
3782
|
return !!tenantId && !!homeAccountId && tenantId === homeAccountId.split(".")[1];
|
|
3782
3783
|
}
|
|
@@ -3809,7 +3810,7 @@ function updateAccountTenantProfileData(baseAccountInfo, tenantProfile, idTokenC
|
|
|
3809
3810
|
return updatedAccountInfo;
|
|
3810
3811
|
}
|
|
3811
3812
|
var init_AccountInfo = __esm({
|
|
3812
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3813
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AccountInfo.mjs"() {
|
|
3813
3814
|
"use strict";
|
|
3814
3815
|
__name(tenantIdMatchesHomeTenant, "tenantIdMatchesHomeTenant");
|
|
3815
3816
|
__name(buildTenantProfileFromIdTokenClaims, "buildTenantProfileFromIdTokenClaims");
|
|
@@ -3817,7 +3818,7 @@ var init_AccountInfo = __esm({
|
|
|
3817
3818
|
}
|
|
3818
3819
|
});
|
|
3819
3820
|
|
|
3820
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3821
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/TokenClaims.mjs
|
|
3821
3822
|
function getTenantIdFromIdTokenClaims(idTokenClaims) {
|
|
3822
3823
|
if (idTokenClaims) {
|
|
3823
3824
|
const tenantId = idTokenClaims.tid || idTokenClaims.tfp || idTokenClaims.acr;
|
|
@@ -3826,16 +3827,16 @@ function getTenantIdFromIdTokenClaims(idTokenClaims) {
|
|
|
3826
3827
|
return null;
|
|
3827
3828
|
}
|
|
3828
3829
|
var init_TokenClaims = __esm({
|
|
3829
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3830
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/TokenClaims.mjs"() {
|
|
3830
3831
|
"use strict";
|
|
3831
3832
|
__name(getTenantIdFromIdTokenClaims, "getTenantIdFromIdTokenClaims");
|
|
3832
3833
|
}
|
|
3833
3834
|
});
|
|
3834
3835
|
|
|
3835
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3836
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/entities/AccountEntity.mjs
|
|
3836
3837
|
var _AccountEntity, AccountEntity;
|
|
3837
3838
|
var init_AccountEntity = __esm({
|
|
3838
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
3839
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/entities/AccountEntity.mjs"() {
|
|
3839
3840
|
"use strict";
|
|
3840
3841
|
init_Constants();
|
|
3841
3842
|
init_ClientInfo();
|
|
@@ -3908,6 +3909,7 @@ var init_AccountEntity = __esm({
|
|
|
3908
3909
|
* @param accountDetails
|
|
3909
3910
|
*/
|
|
3910
3911
|
static createAccount(accountDetails, authority, base64Decode) {
|
|
3912
|
+
var _a2, _b2, _c, _d, _e, _f;
|
|
3911
3913
|
const account = new _AccountEntity();
|
|
3912
3914
|
if (authority.authorityType === AuthorityType.Adfs) {
|
|
3913
3915
|
account.authorityType = CacheAccountType.ADFS_ACCOUNT_TYPE;
|
|
@@ -3929,11 +3931,11 @@ var init_AccountEntity = __esm({
|
|
|
3929
3931
|
}
|
|
3930
3932
|
account.environment = env;
|
|
3931
3933
|
account.realm = (clientInfo == null ? void 0 : clientInfo.utid) || getTenantIdFromIdTokenClaims(accountDetails.idTokenClaims) || "";
|
|
3932
|
-
account.localAccountId = (clientInfo == null ? void 0 : clientInfo.uid) || accountDetails.idTokenClaims.oid || accountDetails.idTokenClaims.sub || "";
|
|
3933
|
-
const preferredUsername = accountDetails.idTokenClaims.preferred_username || accountDetails.idTokenClaims.upn;
|
|
3934
|
-
const email = accountDetails.idTokenClaims.emails ? accountDetails.idTokenClaims.emails[0] : null;
|
|
3934
|
+
account.localAccountId = (clientInfo == null ? void 0 : clientInfo.uid) || ((_a2 = accountDetails.idTokenClaims) == null ? void 0 : _a2.oid) || ((_b2 = accountDetails.idTokenClaims) == null ? void 0 : _b2.sub) || "";
|
|
3935
|
+
const preferredUsername = ((_c = accountDetails.idTokenClaims) == null ? void 0 : _c.preferred_username) || ((_d = accountDetails.idTokenClaims) == null ? void 0 : _d.upn);
|
|
3936
|
+
const email = ((_e = accountDetails.idTokenClaims) == null ? void 0 : _e.emails) ? accountDetails.idTokenClaims.emails[0] : null;
|
|
3935
3937
|
account.username = preferredUsername || email || "";
|
|
3936
|
-
account.name = accountDetails.idTokenClaims.name;
|
|
3938
|
+
account.name = ((_f = accountDetails.idTokenClaims) == null ? void 0 : _f.name) || "";
|
|
3937
3939
|
account.cloudGraphHostName = accountDetails.cloudGraphHostName;
|
|
3938
3940
|
account.msGraphHost = accountDetails.msGraphHost;
|
|
3939
3941
|
if (accountDetails.tenantProfiles) {
|
|
@@ -4025,20 +4027,20 @@ var init_AccountEntity = __esm({
|
|
|
4025
4027
|
}
|
|
4026
4028
|
});
|
|
4027
4029
|
|
|
4028
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4030
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheErrorCodes.mjs
|
|
4029
4031
|
var cacheQuotaExceededErrorCode, cacheUnknownErrorCode;
|
|
4030
4032
|
var init_CacheErrorCodes = __esm({
|
|
4031
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4033
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheErrorCodes.mjs"() {
|
|
4032
4034
|
"use strict";
|
|
4033
4035
|
cacheQuotaExceededErrorCode = "cache_quota_exceeded";
|
|
4034
4036
|
cacheUnknownErrorCode = "cache_error_unknown";
|
|
4035
4037
|
}
|
|
4036
4038
|
});
|
|
4037
4039
|
|
|
4038
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4040
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheError.mjs
|
|
4039
4041
|
var CacheErrorMessages, _CacheError, CacheError;
|
|
4040
4042
|
var init_CacheError = __esm({
|
|
4041
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4043
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheError.mjs"() {
|
|
4042
4044
|
"use strict";
|
|
4043
4045
|
init_CacheErrorCodes();
|
|
4044
4046
|
CacheErrorMessages = {
|
|
@@ -4060,10 +4062,10 @@ var init_CacheError = __esm({
|
|
|
4060
4062
|
}
|
|
4061
4063
|
});
|
|
4062
4064
|
|
|
4063
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4065
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/CacheManager.mjs
|
|
4064
4066
|
var _CacheManager, CacheManager, _DefaultStorageClass, DefaultStorageClass;
|
|
4065
4067
|
var init_CacheManager = __esm({
|
|
4066
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
4068
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/CacheManager.mjs"() {
|
|
4067
4069
|
"use strict";
|
|
4068
4070
|
init_Constants();
|
|
4069
4071
|
init_CacheHelpers();
|
|
@@ -5189,7 +5191,7 @@ var init_CacheManager = __esm({
|
|
|
5189
5191
|
}
|
|
5190
5192
|
});
|
|
5191
5193
|
|
|
5192
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5194
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/config/ClientConfiguration.mjs
|
|
5193
5195
|
function buildClientConfiguration({ authOptions: userAuthOptions, systemOptions: userSystemOptions, loggerOptions: userLoggerOption, cacheOptions: userCacheOptions, storageInterface: storageImplementation, networkInterface: networkImplementation, cryptoInterface: cryptoImplementation, clientCredentials, libraryInfo, telemetry, serverTelemetryManager, persistencePlugin, serializableCache }) {
|
|
5194
5196
|
const loggerOptions = {
|
|
5195
5197
|
...DEFAULT_LOGGER_IMPLEMENTATION,
|
|
@@ -5224,7 +5226,7 @@ function isOidcProtocolMode(config) {
|
|
|
5224
5226
|
}
|
|
5225
5227
|
var DEFAULT_SYSTEM_OPTIONS, DEFAULT_LOGGER_IMPLEMENTATION, DEFAULT_CACHE_OPTIONS, DEFAULT_NETWORK_IMPLEMENTATION, DEFAULT_LIBRARY_INFO, DEFAULT_CLIENT_CREDENTIALS, DEFAULT_AZURE_CLOUD_OPTIONS, DEFAULT_TELEMETRY_OPTIONS;
|
|
5226
5228
|
var init_ClientConfiguration = __esm({
|
|
5227
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5229
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/config/ClientConfiguration.mjs"() {
|
|
5228
5230
|
"use strict";
|
|
5229
5231
|
init_ICrypto();
|
|
5230
5232
|
init_Logger();
|
|
@@ -5283,17 +5285,18 @@ var init_ClientConfiguration = __esm({
|
|
|
5283
5285
|
}
|
|
5284
5286
|
});
|
|
5285
5287
|
|
|
5286
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5288
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ServerError.mjs
|
|
5287
5289
|
var _ServerError, ServerError;
|
|
5288
5290
|
var init_ServerError = __esm({
|
|
5289
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5291
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ServerError.mjs"() {
|
|
5290
5292
|
"use strict";
|
|
5291
5293
|
init_AuthError();
|
|
5292
5294
|
_ServerError = class _ServerError extends AuthError {
|
|
5293
|
-
constructor(errorCode, errorMessage, subError, errorNo) {
|
|
5295
|
+
constructor(errorCode, errorMessage, subError, errorNo, status) {
|
|
5294
5296
|
super(errorCode, errorMessage, subError);
|
|
5295
5297
|
this.name = "ServerError";
|
|
5296
5298
|
this.errorNo = errorNo;
|
|
5299
|
+
this.status = status;
|
|
5297
5300
|
Object.setPrototypeOf(this, _ServerError.prototype);
|
|
5298
5301
|
}
|
|
5299
5302
|
};
|
|
@@ -5302,10 +5305,10 @@ var init_ServerError = __esm({
|
|
|
5302
5305
|
}
|
|
5303
5306
|
});
|
|
5304
5307
|
|
|
5305
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5308
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/ThrottlingUtils.mjs
|
|
5306
5309
|
var _ThrottlingUtils, ThrottlingUtils;
|
|
5307
5310
|
var init_ThrottlingUtils = __esm({
|
|
5308
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5311
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/ThrottlingUtils.mjs"() {
|
|
5309
5312
|
"use strict";
|
|
5310
5313
|
init_Constants();
|
|
5311
5314
|
init_ServerError();
|
|
@@ -5400,10 +5403,10 @@ var init_ThrottlingUtils = __esm({
|
|
|
5400
5403
|
}
|
|
5401
5404
|
});
|
|
5402
5405
|
|
|
5403
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5406
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/NetworkManager.mjs
|
|
5404
5407
|
var _NetworkManager, NetworkManager;
|
|
5405
5408
|
var init_NetworkManager = __esm({
|
|
5406
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5409
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/NetworkManager.mjs"() {
|
|
5407
5410
|
"use strict";
|
|
5408
5411
|
init_ThrottlingUtils();
|
|
5409
5412
|
init_AuthError();
|
|
@@ -5441,10 +5444,10 @@ var init_NetworkManager = __esm({
|
|
|
5441
5444
|
}
|
|
5442
5445
|
});
|
|
5443
5446
|
|
|
5444
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5447
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/CcsCredential.mjs
|
|
5445
5448
|
var CcsCredentialType;
|
|
5446
5449
|
var init_CcsCredential = __esm({
|
|
5447
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5450
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/CcsCredential.mjs"() {
|
|
5448
5451
|
"use strict";
|
|
5449
5452
|
CcsCredentialType = {
|
|
5450
5453
|
HOME_ACCOUNT_ID: "home_account_id",
|
|
@@ -5453,10 +5456,10 @@ var init_CcsCredential = __esm({
|
|
|
5453
5456
|
}
|
|
5454
5457
|
});
|
|
5455
5458
|
|
|
5456
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5459
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestValidator.mjs
|
|
5457
5460
|
var _RequestValidator, RequestValidator;
|
|
5458
5461
|
var init_RequestValidator = __esm({
|
|
5459
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5462
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestValidator.mjs"() {
|
|
5460
5463
|
"use strict";
|
|
5461
5464
|
init_ClientConfigurationError();
|
|
5462
5465
|
init_Constants();
|
|
@@ -5515,31 +5518,16 @@ var init_RequestValidator = __esm({
|
|
|
5515
5518
|
throw createClientConfigurationError(invalidCodeChallengeMethod);
|
|
5516
5519
|
}
|
|
5517
5520
|
}
|
|
5518
|
-
/**
|
|
5519
|
-
* Removes unnecessary, duplicate, and empty string query parameters from extraQueryParameters
|
|
5520
|
-
* @param request
|
|
5521
|
-
*/
|
|
5522
|
-
static sanitizeEQParams(eQParams, queryParams) {
|
|
5523
|
-
if (!eQParams) {
|
|
5524
|
-
return {};
|
|
5525
|
-
}
|
|
5526
|
-
queryParams.forEach((_value, key) => {
|
|
5527
|
-
if (eQParams[key]) {
|
|
5528
|
-
delete eQParams[key];
|
|
5529
|
-
}
|
|
5530
|
-
});
|
|
5531
|
-
return Object.fromEntries(Object.entries(eQParams).filter((kv) => kv[1] !== ""));
|
|
5532
|
-
}
|
|
5533
5521
|
};
|
|
5534
5522
|
__name(_RequestValidator, "RequestValidator");
|
|
5535
5523
|
RequestValidator = _RequestValidator;
|
|
5536
5524
|
}
|
|
5537
5525
|
});
|
|
5538
5526
|
|
|
5539
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5527
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestParameterBuilder.mjs
|
|
5540
5528
|
var _RequestParameterBuilder, RequestParameterBuilder;
|
|
5541
5529
|
var init_RequestParameterBuilder = __esm({
|
|
5542
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5530
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestParameterBuilder.mjs"() {
|
|
5543
5531
|
"use strict";
|
|
5544
5532
|
init_Constants();
|
|
5545
5533
|
init_AADServerParamKeys();
|
|
@@ -5821,9 +5809,10 @@ var init_RequestParameterBuilder = __esm({
|
|
|
5821
5809
|
* @param eQParams
|
|
5822
5810
|
*/
|
|
5823
5811
|
addExtraQueryParameters(eQParams) {
|
|
5824
|
-
|
|
5825
|
-
|
|
5826
|
-
|
|
5812
|
+
Object.entries(eQParams).forEach(([key, value]) => {
|
|
5813
|
+
if (!this.parameters.has(key) && value) {
|
|
5814
|
+
this.parameters.set(key, value);
|
|
5815
|
+
}
|
|
5827
5816
|
});
|
|
5828
5817
|
}
|
|
5829
5818
|
addClientCapabilitiesToClaims(claims, clientCapabilities) {
|
|
@@ -5916,10 +5905,10 @@ var init_RequestParameterBuilder = __esm({
|
|
|
5916
5905
|
}
|
|
5917
5906
|
});
|
|
5918
5907
|
|
|
5919
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5908
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/BaseClient.mjs
|
|
5920
5909
|
var _BaseClient, BaseClient;
|
|
5921
5910
|
var init_BaseClient = __esm({
|
|
5922
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
5911
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/BaseClient.mjs"() {
|
|
5923
5912
|
"use strict";
|
|
5924
5913
|
init_ClientConfiguration();
|
|
5925
5914
|
init_NetworkManager();
|
|
@@ -6016,7 +6005,7 @@ var init_BaseClient = __esm({
|
|
|
6016
6005
|
}
|
|
6017
6006
|
});
|
|
6018
6007
|
|
|
6019
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6008
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthErrorCodes.mjs
|
|
6020
6009
|
var InteractionRequiredAuthErrorCodes_exports = {};
|
|
6021
6010
|
__export(InteractionRequiredAuthErrorCodes_exports, {
|
|
6022
6011
|
badToken: () => badToken,
|
|
@@ -6029,7 +6018,7 @@ __export(InteractionRequiredAuthErrorCodes_exports, {
|
|
|
6029
6018
|
});
|
|
6030
6019
|
var noTokensFound, nativeAccountUnavailable, refreshTokenExpired, interactionRequired, consentRequired, loginRequired, badToken;
|
|
6031
6020
|
var init_InteractionRequiredAuthErrorCodes = __esm({
|
|
6032
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6021
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthErrorCodes.mjs"() {
|
|
6033
6022
|
"use strict";
|
|
6034
6023
|
noTokensFound = "no_tokens_found";
|
|
6035
6024
|
nativeAccountUnavailable = "native_account_unavailable";
|
|
@@ -6041,7 +6030,7 @@ var init_InteractionRequiredAuthErrorCodes = __esm({
|
|
|
6041
6030
|
}
|
|
6042
6031
|
});
|
|
6043
6032
|
|
|
6044
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6033
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthError.mjs
|
|
6045
6034
|
function isInteractionRequiredError(errorCode, errorString, subError) {
|
|
6046
6035
|
const isInteractionRequiredErrorCode = !!errorCode && InteractionRequiredServerErrorMessage.indexOf(errorCode) > -1;
|
|
6047
6036
|
const isInteractionRequiredSubError = !!subError && InteractionRequiredAuthSubErrorMessage.indexOf(subError) > -1;
|
|
@@ -6055,7 +6044,7 @@ function createInteractionRequiredAuthError(errorCode) {
|
|
|
6055
6044
|
}
|
|
6056
6045
|
var InteractionRequiredServerErrorMessage, InteractionRequiredAuthSubErrorMessage, InteractionRequiredAuthErrorMessages, InteractionRequiredAuthErrorMessage, _InteractionRequiredAuthError, InteractionRequiredAuthError;
|
|
6057
6046
|
var init_InteractionRequiredAuthError = __esm({
|
|
6058
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6047
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthError.mjs"() {
|
|
6059
6048
|
"use strict";
|
|
6060
6049
|
init_Constants();
|
|
6061
6050
|
init_AuthError();
|
|
@@ -6113,29 +6102,10 @@ var init_InteractionRequiredAuthError = __esm({
|
|
|
6113
6102
|
}
|
|
6114
6103
|
});
|
|
6115
6104
|
|
|
6116
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6117
|
-
var _CacheRecord, CacheRecord;
|
|
6118
|
-
var init_CacheRecord = __esm({
|
|
6119
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/cache/entities/CacheRecord.mjs"() {
|
|
6120
|
-
"use strict";
|
|
6121
|
-
_CacheRecord = class _CacheRecord {
|
|
6122
|
-
constructor(accountEntity, idTokenEntity, accessTokenEntity, refreshTokenEntity, appMetadataEntity) {
|
|
6123
|
-
this.account = accountEntity || null;
|
|
6124
|
-
this.idToken = idTokenEntity || null;
|
|
6125
|
-
this.accessToken = accessTokenEntity || null;
|
|
6126
|
-
this.refreshToken = refreshTokenEntity || null;
|
|
6127
|
-
this.appMetadata = appMetadataEntity || null;
|
|
6128
|
-
}
|
|
6129
|
-
};
|
|
6130
|
-
__name(_CacheRecord, "CacheRecord");
|
|
6131
|
-
CacheRecord = _CacheRecord;
|
|
6132
|
-
}
|
|
6133
|
-
});
|
|
6134
|
-
|
|
6135
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/ProtocolUtils.mjs
|
|
6105
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ProtocolUtils.mjs
|
|
6136
6106
|
var _ProtocolUtils, ProtocolUtils;
|
|
6137
6107
|
var init_ProtocolUtils = __esm({
|
|
6138
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6108
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ProtocolUtils.mjs"() {
|
|
6139
6109
|
"use strict";
|
|
6140
6110
|
init_Constants();
|
|
6141
6111
|
init_ClientAuthError();
|
|
@@ -6200,10 +6170,10 @@ var init_ProtocolUtils = __esm({
|
|
|
6200
6170
|
}
|
|
6201
6171
|
});
|
|
6202
6172
|
|
|
6203
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6173
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/PopTokenGenerator.mjs
|
|
6204
6174
|
var KeyLocation, _PopTokenGenerator, PopTokenGenerator;
|
|
6205
6175
|
var init_PopTokenGenerator = __esm({
|
|
6206
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6176
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/PopTokenGenerator.mjs"() {
|
|
6207
6177
|
"use strict";
|
|
6208
6178
|
init_TimeUtils();
|
|
6209
6179
|
init_UrlString();
|
|
@@ -6287,10 +6257,10 @@ var init_PopTokenGenerator = __esm({
|
|
|
6287
6257
|
}
|
|
6288
6258
|
});
|
|
6289
6259
|
|
|
6290
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6260
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/persistence/TokenCacheContext.mjs
|
|
6291
6261
|
var _TokenCacheContext, TokenCacheContext;
|
|
6292
6262
|
var init_TokenCacheContext = __esm({
|
|
6293
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6263
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/persistence/TokenCacheContext.mjs"() {
|
|
6294
6264
|
"use strict";
|
|
6295
6265
|
_TokenCacheContext = class _TokenCacheContext {
|
|
6296
6266
|
constructor(tokenCache, hasChanged) {
|
|
@@ -6315,14 +6285,14 @@ var init_TokenCacheContext = __esm({
|
|
|
6315
6285
|
}
|
|
6316
6286
|
});
|
|
6317
6287
|
|
|
6318
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6288
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/response/ResponseHandler.mjs
|
|
6319
6289
|
function parseServerErrorNo(serverResponse) {
|
|
6320
6290
|
var _a2, _b2;
|
|
6321
6291
|
const errorCodePrefix = "code=";
|
|
6322
6292
|
const errorCodePrefixIndex = (_a2 = serverResponse.error_uri) == null ? void 0 : _a2.lastIndexOf(errorCodePrefix);
|
|
6323
6293
|
return errorCodePrefixIndex && errorCodePrefixIndex >= 0 ? (_b2 = serverResponse.error_uri) == null ? void 0 : _b2.substring(errorCodePrefixIndex + errorCodePrefix.length) : void 0;
|
|
6324
6294
|
}
|
|
6325
|
-
function buildAccountToCache(cacheStorage, authority, homeAccountId,
|
|
6295
|
+
function buildAccountToCache(cacheStorage, authority, homeAccountId, base64Decode, idTokenClaims, clientInfo, environment, claimsTenantId, authCodePayload, nativeAccountId, logger) {
|
|
6326
6296
|
logger == null ? void 0 : logger.verbose("setCachedAccount called");
|
|
6327
6297
|
const accountKeys = cacheStorage.getAccountKeys();
|
|
6328
6298
|
const baseAccountKey = accountKeys.find((accountKey) => {
|
|
@@ -6342,7 +6312,7 @@ function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClai
|
|
|
6342
6312
|
nativeAccountId
|
|
6343
6313
|
}, authority, base64Decode);
|
|
6344
6314
|
const tenantProfiles = baseAccount.tenantProfiles || [];
|
|
6345
|
-
if (claimsTenantId && !tenantProfiles.find((tenantProfile) => {
|
|
6315
|
+
if (claimsTenantId && idTokenClaims && !tenantProfiles.find((tenantProfile) => {
|
|
6346
6316
|
return tenantProfile.tenantId === claimsTenantId;
|
|
6347
6317
|
})) {
|
|
6348
6318
|
const newTenantProfile = buildTenantProfileFromIdTokenClaims(homeAccountId, idTokenClaims);
|
|
@@ -6353,14 +6323,13 @@ function buildAccountToCache(cacheStorage, authority, homeAccountId, idTokenClai
|
|
|
6353
6323
|
}
|
|
6354
6324
|
var _ResponseHandler, ResponseHandler;
|
|
6355
6325
|
var init_ResponseHandler = __esm({
|
|
6356
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6326
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/response/ResponseHandler.mjs"() {
|
|
6357
6327
|
"use strict";
|
|
6358
6328
|
init_ClientAuthError();
|
|
6359
6329
|
init_ServerError();
|
|
6360
6330
|
init_ScopeSet();
|
|
6361
6331
|
init_AccountEntity();
|
|
6362
6332
|
init_InteractionRequiredAuthError();
|
|
6363
|
-
init_CacheRecord();
|
|
6364
6333
|
init_ProtocolUtils();
|
|
6365
6334
|
init_Constants();
|
|
6366
6335
|
init_PopTokenGenerator();
|
|
@@ -6423,9 +6392,9 @@ var init_ResponseHandler = __esm({
|
|
|
6423
6392
|
validateTokenResponse(serverResponse, refreshAccessToken) {
|
|
6424
6393
|
var _a2;
|
|
6425
6394
|
if (serverResponse.error || serverResponse.error_description || serverResponse.suberror) {
|
|
6426
|
-
const errString =
|
|
6395
|
+
const errString = `Error(s): ${serverResponse.error_codes || Constants.NOT_AVAILABLE} - Timestamp: ${serverResponse.timestamp || Constants.NOT_AVAILABLE} - Description: ${serverResponse.error_description || Constants.NOT_AVAILABLE} - Correlation ID: ${serverResponse.correlation_id || Constants.NOT_AVAILABLE} - Trace ID: ${serverResponse.trace_id || Constants.NOT_AVAILABLE}`;
|
|
6427
6396
|
const serverErrorNo = ((_a2 = serverResponse.error_codes) == null ? void 0 : _a2.length) ? serverResponse.error_codes[0] : void 0;
|
|
6428
|
-
const serverError = new ServerError(serverResponse.error, errString, serverResponse.suberror, serverErrorNo);
|
|
6397
|
+
const serverError = new ServerError(serverResponse.error, errString, serverResponse.suberror, serverErrorNo, serverResponse.status);
|
|
6429
6398
|
if (refreshAccessToken && serverResponse.status && serverResponse.status >= HttpStatus.SERVER_ERROR_RANGE_START && serverResponse.status <= HttpStatus.SERVER_ERROR_RANGE_END) {
|
|
6430
6399
|
this.logger.warning(`executeTokenRequest:validateTokenResponse - AAD is currently unavailable and the access token is unable to be refreshed.
|
|
6431
6400
|
${serverError}`);
|
|
@@ -6516,8 +6485,8 @@ ${serverError}`);
|
|
|
6516
6485
|
this.cacheStorage,
|
|
6517
6486
|
authority,
|
|
6518
6487
|
this.homeAccountIdentifier,
|
|
6519
|
-
idTokenClaims,
|
|
6520
6488
|
this.cryptoObj.base64Decode,
|
|
6489
|
+
idTokenClaims,
|
|
6521
6490
|
serverTokenResponse.client_info,
|
|
6522
6491
|
env,
|
|
6523
6492
|
claimsTenantId,
|
|
@@ -6555,7 +6524,13 @@ ${serverError}`);
|
|
|
6555
6524
|
familyId: serverTokenResponse.foci
|
|
6556
6525
|
};
|
|
6557
6526
|
}
|
|
6558
|
-
return
|
|
6527
|
+
return {
|
|
6528
|
+
account: cachedAccount,
|
|
6529
|
+
idToken: cachedIdToken,
|
|
6530
|
+
accessToken: cachedAccessToken,
|
|
6531
|
+
refreshToken: cachedRefreshToken,
|
|
6532
|
+
appMetadata: cachedAppMetadata
|
|
6533
|
+
};
|
|
6559
6534
|
}
|
|
6560
6535
|
/**
|
|
6561
6536
|
* Creates an @AuthenticationResult from @CacheRecord , @IdToken , and a boolean that states whether or not the result is from cache.
|
|
@@ -6639,10 +6614,10 @@ ${serverError}`);
|
|
|
6639
6614
|
}
|
|
6640
6615
|
});
|
|
6641
6616
|
|
|
6642
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6617
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/AuthorizationCodeClient.mjs
|
|
6643
6618
|
var _AuthorizationCodeClient, AuthorizationCodeClient;
|
|
6644
6619
|
var init_AuthorizationCodeClient = __esm({
|
|
6645
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6620
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/AuthorizationCodeClient.mjs"() {
|
|
6646
6621
|
"use strict";
|
|
6647
6622
|
init_BaseClient();
|
|
6648
6623
|
init_RequestParameterBuilder();
|
|
@@ -7019,10 +6994,10 @@ var init_AuthorizationCodeClient = __esm({
|
|
|
7019
6994
|
}
|
|
7020
6995
|
});
|
|
7021
6996
|
|
|
7022
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
6997
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/RefreshTokenClient.mjs
|
|
7023
6998
|
var DEFAULT_REFRESH_TOKEN_EXPIRATION_OFFSET_SECONDS, _RefreshTokenClient, RefreshTokenClient;
|
|
7024
6999
|
var init_RefreshTokenClient = __esm({
|
|
7025
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7000
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/RefreshTokenClient.mjs"() {
|
|
7026
7001
|
"use strict";
|
|
7027
7002
|
init_ClientConfiguration();
|
|
7028
7003
|
init_BaseClient();
|
|
@@ -7228,10 +7203,10 @@ var init_RefreshTokenClient = __esm({
|
|
|
7228
7203
|
}
|
|
7229
7204
|
});
|
|
7230
7205
|
|
|
7231
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7206
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/SilentFlowClient.mjs
|
|
7232
7207
|
var _SilentFlowClient, SilentFlowClient;
|
|
7233
7208
|
var init_SilentFlowClient = __esm({
|
|
7234
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7209
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/SilentFlowClient.mjs"() {
|
|
7235
7210
|
"use strict";
|
|
7236
7211
|
init_BaseClient();
|
|
7237
7212
|
init_TimeUtils();
|
|
@@ -7357,10 +7332,10 @@ var init_SilentFlowClient = __esm({
|
|
|
7357
7332
|
}
|
|
7358
7333
|
});
|
|
7359
7334
|
|
|
7360
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7335
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/server/ServerTelemetryManager.mjs
|
|
7361
7336
|
var _ServerTelemetryManager, ServerTelemetryManager;
|
|
7362
7337
|
var init_ServerTelemetryManager = __esm({
|
|
7363
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7338
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/server/ServerTelemetryManager.mjs"() {
|
|
7364
7339
|
"use strict";
|
|
7365
7340
|
init_Constants();
|
|
7366
7341
|
init_AuthError();
|
|
@@ -7536,9 +7511,9 @@ var init_ServerTelemetryManager = __esm({
|
|
|
7536
7511
|
}
|
|
7537
7512
|
});
|
|
7538
7513
|
|
|
7539
|
-
// ../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7514
|
+
// ../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/index.mjs
|
|
7540
7515
|
var init_dist = __esm({
|
|
7541
|
-
"../../node_modules/.store/@azure-msal-common-npm-14.
|
|
7516
|
+
"../../node_modules/.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/index.mjs"() {
|
|
7542
7517
|
"use strict";
|
|
7543
7518
|
init_AuthToken();
|
|
7544
7519
|
init_AuthorityFactory();
|
|
@@ -7579,10 +7554,10 @@ var init_dist = __esm({
|
|
|
7579
7554
|
}
|
|
7580
7555
|
});
|
|
7581
7556
|
|
|
7582
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7557
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Deserializer.mjs
|
|
7583
7558
|
var _Deserializer, Deserializer;
|
|
7584
7559
|
var init_Deserializer = __esm({
|
|
7585
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7560
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Deserializer.mjs"() {
|
|
7586
7561
|
"use strict";
|
|
7587
7562
|
init_dist();
|
|
7588
7563
|
_Deserializer = class _Deserializer {
|
|
@@ -7741,24 +7716,24 @@ var init_Deserializer = __esm({
|
|
|
7741
7716
|
}
|
|
7742
7717
|
});
|
|
7743
7718
|
|
|
7744
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7719
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/internals.mjs
|
|
7745
7720
|
var internals_exports = {};
|
|
7746
7721
|
__export(internals_exports, {
|
|
7747
7722
|
Deserializer: () => Deserializer,
|
|
7748
7723
|
Serializer: () => Serializer
|
|
7749
7724
|
});
|
|
7750
7725
|
var init_internals = __esm({
|
|
7751
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7726
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/internals.mjs"() {
|
|
7752
7727
|
"use strict";
|
|
7753
7728
|
init_Serializer();
|
|
7754
7729
|
init_Deserializer();
|
|
7755
7730
|
}
|
|
7756
7731
|
});
|
|
7757
7732
|
|
|
7758
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7733
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/Constants.mjs
|
|
7759
7734
|
var AUTHORIZATION_HEADER_NAME, METADATA_HEADER_NAME, APP_SERVICE_SECRET_HEADER_NAME, SERVICE_FABRIC_SECRET_HEADER_NAME, API_VERSION_QUERY_PARAMETER_NAME, RESOURCE_BODY_OR_QUERY_PARAMETER_NAME, DEFAULT_MANAGED_IDENTITY_ID, MANAGED_IDENTITY_DEFAULT_TENANT, DEFAULT_AUTHORITY_FOR_MANAGED_IDENTITY, ManagedIdentityEnvironmentVariableNames, ManagedIdentitySourceNames, ManagedIdentityIdType, HttpMethod, ProxyStatus, REGION_ENVIRONMENT_VARIABLE, RANDOM_OCTET_SIZE, Hash, CharSet, Constants2, ApiId, JwtConstants, LOOPBACK_SERVER_CONSTANTS, AZURE_ARC_SECRET_FILE_MAX_SIZE_BYTES, MANAGED_IDENTITY_MAX_RETRIES, MANAGED_IDENTITY_RETRY_DELAY, MANAGED_IDENTITY_HTTP_STATUS_CODES_TO_RETRY_ON;
|
|
7760
7735
|
var init_Constants2 = __esm({
|
|
7761
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7736
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/Constants.mjs"() {
|
|
7762
7737
|
"use strict";
|
|
7763
7738
|
init_dist();
|
|
7764
7739
|
AUTHORIZATION_HEADER_NAME = "Authorization";
|
|
@@ -7828,6 +7803,7 @@ var init_Constants2 = __esm({
|
|
|
7828
7803
|
JwtConstants = {
|
|
7829
7804
|
ALGORITHM: "alg",
|
|
7830
7805
|
RSA_256: "RS256",
|
|
7806
|
+
X5T_256: "x5t#S256",
|
|
7831
7807
|
X5T: "x5t",
|
|
7832
7808
|
X5C: "x5c",
|
|
7833
7809
|
AUDIENCE: "aud",
|
|
@@ -7855,10 +7831,10 @@ var init_Constants2 = __esm({
|
|
|
7855
7831
|
}
|
|
7856
7832
|
});
|
|
7857
7833
|
|
|
7858
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7834
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/NetworkUtils.mjs
|
|
7859
7835
|
var _NetworkUtils, NetworkUtils;
|
|
7860
7836
|
var init_NetworkUtils = __esm({
|
|
7861
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7837
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/NetworkUtils.mjs"() {
|
|
7862
7838
|
"use strict";
|
|
7863
7839
|
_NetworkUtils = class _NetworkUtils {
|
|
7864
7840
|
static getNetworkResponse(headers, body, statusCode) {
|
|
@@ -7897,12 +7873,12 @@ var init_NetworkUtils = __esm({
|
|
|
7897
7873
|
}
|
|
7898
7874
|
});
|
|
7899
7875
|
|
|
7900
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7876
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClient.mjs
|
|
7901
7877
|
import http from "http";
|
|
7902
7878
|
import https from "https";
|
|
7903
7879
|
var _HttpClient, HttpClient, networkRequestViaProxy, networkRequestViaHttps, parseBody;
|
|
7904
7880
|
var init_HttpClient = __esm({
|
|
7905
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
7881
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClient.mjs"() {
|
|
7906
7882
|
"use strict";
|
|
7907
7883
|
init_dist();
|
|
7908
7884
|
init_Constants2();
|
|
@@ -8127,10 +8103,10 @@ Headers: ${JSON.stringify(headers)}`
|
|
|
8127
8103
|
}
|
|
8128
8104
|
});
|
|
8129
8105
|
|
|
8130
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8106
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityErrorCodes.mjs
|
|
8131
8107
|
var invalidFileExtension, invalidFilePath, invalidManagedIdentityIdType, invalidSecret, missingId, networkUnavailable, platformNotSupported, unableToCreateAzureArc, unableToCreateCloudShell, unableToCreateSource, unableToReadSecretFile, userAssignedNotAvailableAtRuntime, wwwAuthenticateHeaderMissing, wwwAuthenticateHeaderUnsupportedFormat, MsiEnvironmentVariableUrlMalformedErrorCodes;
|
|
8132
8108
|
var init_ManagedIdentityErrorCodes = __esm({
|
|
8133
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8109
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityErrorCodes.mjs"() {
|
|
8134
8110
|
"use strict";
|
|
8135
8111
|
init_Constants2();
|
|
8136
8112
|
invalidFileExtension = "invalid_file_extension";
|
|
@@ -8156,13 +8132,13 @@ var init_ManagedIdentityErrorCodes = __esm({
|
|
|
8156
8132
|
}
|
|
8157
8133
|
});
|
|
8158
8134
|
|
|
8159
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8135
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityError.mjs
|
|
8160
8136
|
function createManagedIdentityError(errorCode) {
|
|
8161
8137
|
return new ManagedIdentityError(errorCode);
|
|
8162
8138
|
}
|
|
8163
8139
|
var ManagedIdentityErrorMessages, _ManagedIdentityError, ManagedIdentityError;
|
|
8164
8140
|
var init_ManagedIdentityError = __esm({
|
|
8165
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8141
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityError.mjs"() {
|
|
8166
8142
|
"use strict";
|
|
8167
8143
|
init_dist();
|
|
8168
8144
|
init_ManagedIdentityErrorCodes();
|
|
@@ -8200,10 +8176,10 @@ var init_ManagedIdentityError = __esm({
|
|
|
8200
8176
|
}
|
|
8201
8177
|
});
|
|
8202
8178
|
|
|
8203
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8179
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityId.mjs
|
|
8204
8180
|
var _ManagedIdentityId, ManagedIdentityId;
|
|
8205
8181
|
var init_ManagedIdentityId = __esm({
|
|
8206
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8182
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityId.mjs"() {
|
|
8207
8183
|
"use strict";
|
|
8208
8184
|
init_ManagedIdentityError();
|
|
8209
8185
|
init_Constants2();
|
|
@@ -8254,10 +8230,10 @@ var init_ManagedIdentityId = __esm({
|
|
|
8254
8230
|
}
|
|
8255
8231
|
});
|
|
8256
8232
|
|
|
8257
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8233
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/retry/LinearRetryPolicy.mjs
|
|
8258
8234
|
var _LinearRetryPolicy, LinearRetryPolicy;
|
|
8259
8235
|
var init_LinearRetryPolicy = __esm({
|
|
8260
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8236
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/retry/LinearRetryPolicy.mjs"() {
|
|
8261
8237
|
"use strict";
|
|
8262
8238
|
_LinearRetryPolicy = class _LinearRetryPolicy {
|
|
8263
8239
|
constructor(maxRetries, retryDelay, httpStatusCodesToRetryOn) {
|
|
@@ -8295,10 +8271,10 @@ var init_LinearRetryPolicy = __esm({
|
|
|
8295
8271
|
}
|
|
8296
8272
|
});
|
|
8297
8273
|
|
|
8298
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8274
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClientWithRetries.mjs
|
|
8299
8275
|
var _HttpClientWithRetries, HttpClientWithRetries;
|
|
8300
8276
|
var init_HttpClientWithRetries = __esm({
|
|
8301
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8277
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClientWithRetries.mjs"() {
|
|
8302
8278
|
"use strict";
|
|
8303
8279
|
init_dist();
|
|
8304
8280
|
init_Constants2();
|
|
@@ -8335,7 +8311,106 @@ var init_HttpClientWithRetries = __esm({
|
|
|
8335
8311
|
}
|
|
8336
8312
|
});
|
|
8337
8313
|
|
|
8338
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8314
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/NodeAuthError.mjs
|
|
8315
|
+
var NodeAuthErrorMessage, _NodeAuthError, NodeAuthError;
|
|
8316
|
+
var init_NodeAuthError = __esm({
|
|
8317
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/NodeAuthError.mjs"() {
|
|
8318
|
+
"use strict";
|
|
8319
|
+
init_dist();
|
|
8320
|
+
NodeAuthErrorMessage = {
|
|
8321
|
+
invalidLoopbackAddressType: {
|
|
8322
|
+
code: "invalid_loopback_server_address_type",
|
|
8323
|
+
desc: "Loopback server address is not type string. This is unexpected."
|
|
8324
|
+
},
|
|
8325
|
+
unableToLoadRedirectUri: {
|
|
8326
|
+
code: "unable_to_load_redirectUrl",
|
|
8327
|
+
desc: "Loopback server callback was invoked without a url. This is unexpected."
|
|
8328
|
+
},
|
|
8329
|
+
noAuthCodeInResponse: {
|
|
8330
|
+
code: "no_auth_code_in_response",
|
|
8331
|
+
desc: "No auth code found in the server response. Please check your network trace to determine what happened."
|
|
8332
|
+
},
|
|
8333
|
+
noLoopbackServerExists: {
|
|
8334
|
+
code: "no_loopback_server_exists",
|
|
8335
|
+
desc: "No loopback server exists yet."
|
|
8336
|
+
},
|
|
8337
|
+
loopbackServerAlreadyExists: {
|
|
8338
|
+
code: "loopback_server_already_exists",
|
|
8339
|
+
desc: "Loopback server already exists. Cannot create another."
|
|
8340
|
+
},
|
|
8341
|
+
loopbackServerTimeout: {
|
|
8342
|
+
code: "loopback_server_timeout",
|
|
8343
|
+
desc: "Timed out waiting for auth code listener to be registered."
|
|
8344
|
+
},
|
|
8345
|
+
stateNotFoundError: {
|
|
8346
|
+
code: "state_not_found",
|
|
8347
|
+
desc: "State not found. Please verify that the request originated from msal."
|
|
8348
|
+
},
|
|
8349
|
+
thumbprintMissing: {
|
|
8350
|
+
code: "thumbprint_missing_from_client_certificate",
|
|
8351
|
+
desc: "Client certificate does not contain a SHA-1 or SHA-256 thumbprint."
|
|
8352
|
+
}
|
|
8353
|
+
};
|
|
8354
|
+
_NodeAuthError = class _NodeAuthError extends AuthError {
|
|
8355
|
+
constructor(errorCode, errorMessage) {
|
|
8356
|
+
super(errorCode, errorMessage);
|
|
8357
|
+
this.name = "NodeAuthError";
|
|
8358
|
+
}
|
|
8359
|
+
/**
|
|
8360
|
+
* Creates an error thrown if loopback server address is of type string.
|
|
8361
|
+
*/
|
|
8362
|
+
static createInvalidLoopbackAddressTypeError() {
|
|
8363
|
+
return new _NodeAuthError(NodeAuthErrorMessage.invalidLoopbackAddressType.code, `${NodeAuthErrorMessage.invalidLoopbackAddressType.desc}`);
|
|
8364
|
+
}
|
|
8365
|
+
/**
|
|
8366
|
+
* Creates an error thrown if the loopback server is unable to get a url.
|
|
8367
|
+
*/
|
|
8368
|
+
static createUnableToLoadRedirectUrlError() {
|
|
8369
|
+
return new _NodeAuthError(NodeAuthErrorMessage.unableToLoadRedirectUri.code, `${NodeAuthErrorMessage.unableToLoadRedirectUri.desc}`);
|
|
8370
|
+
}
|
|
8371
|
+
/**
|
|
8372
|
+
* Creates an error thrown if the server response does not contain an auth code.
|
|
8373
|
+
*/
|
|
8374
|
+
static createNoAuthCodeInResponseError() {
|
|
8375
|
+
return new _NodeAuthError(NodeAuthErrorMessage.noAuthCodeInResponse.code, `${NodeAuthErrorMessage.noAuthCodeInResponse.desc}`);
|
|
8376
|
+
}
|
|
8377
|
+
/**
|
|
8378
|
+
* Creates an error thrown if the loopback server has not been spun up yet.
|
|
8379
|
+
*/
|
|
8380
|
+
static createNoLoopbackServerExistsError() {
|
|
8381
|
+
return new _NodeAuthError(NodeAuthErrorMessage.noLoopbackServerExists.code, `${NodeAuthErrorMessage.noLoopbackServerExists.desc}`);
|
|
8382
|
+
}
|
|
8383
|
+
/**
|
|
8384
|
+
* Creates an error thrown if a loopback server already exists when attempting to create another one.
|
|
8385
|
+
*/
|
|
8386
|
+
static createLoopbackServerAlreadyExistsError() {
|
|
8387
|
+
return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerAlreadyExists.code, `${NodeAuthErrorMessage.loopbackServerAlreadyExists.desc}`);
|
|
8388
|
+
}
|
|
8389
|
+
/**
|
|
8390
|
+
* Creates an error thrown if the loopback server times out registering the auth code listener.
|
|
8391
|
+
*/
|
|
8392
|
+
static createLoopbackServerTimeoutError() {
|
|
8393
|
+
return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerTimeout.code, `${NodeAuthErrorMessage.loopbackServerTimeout.desc}`);
|
|
8394
|
+
}
|
|
8395
|
+
/**
|
|
8396
|
+
* Creates an error thrown when the state is not present.
|
|
8397
|
+
*/
|
|
8398
|
+
static createStateNotFoundError() {
|
|
8399
|
+
return new _NodeAuthError(NodeAuthErrorMessage.stateNotFoundError.code, NodeAuthErrorMessage.stateNotFoundError.desc);
|
|
8400
|
+
}
|
|
8401
|
+
/**
|
|
8402
|
+
* Creates an error thrown when client certificate was provided, but neither the SHA-1 or SHA-256 thumbprints were provided
|
|
8403
|
+
*/
|
|
8404
|
+
static createThumbprintMissingError() {
|
|
8405
|
+
return new _NodeAuthError(NodeAuthErrorMessage.thumbprintMissing.code, NodeAuthErrorMessage.thumbprintMissing.desc);
|
|
8406
|
+
}
|
|
8407
|
+
};
|
|
8408
|
+
__name(_NodeAuthError, "NodeAuthError");
|
|
8409
|
+
NodeAuthError = _NodeAuthError;
|
|
8410
|
+
}
|
|
8411
|
+
});
|
|
8412
|
+
|
|
8413
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/Configuration.mjs
|
|
8339
8414
|
function buildAppConfiguration({ auth, broker, cache, system, telemetry }) {
|
|
8340
8415
|
const systemOptions = {
|
|
8341
8416
|
...DEFAULT_SYSTEM_OPTIONS2,
|
|
@@ -8343,6 +8418,9 @@ function buildAppConfiguration({ auth, broker, cache, system, telemetry }) {
|
|
|
8343
8418
|
loggerOptions: (system == null ? void 0 : system.loggerOptions) || DEFAULT_LOGGER_OPTIONS,
|
|
8344
8419
|
disableInternalRetries: (system == null ? void 0 : system.disableInternalRetries) || false
|
|
8345
8420
|
};
|
|
8421
|
+
if (!!auth.clientCertificate && !!!auth.clientCertificate.thumbprint && !!!auth.clientCertificate.thumbprintSha256) {
|
|
8422
|
+
throw NodeAuthError.createStateNotFoundError();
|
|
8423
|
+
}
|
|
8346
8424
|
return {
|
|
8347
8425
|
auth: { ...DEFAULT_AUTH_OPTIONS, ...auth },
|
|
8348
8426
|
broker: { ...broker },
|
|
@@ -8374,7 +8452,7 @@ function buildManagedIdentityConfiguration({ managedIdentityIdParams, system })
|
|
|
8374
8452
|
}
|
|
8375
8453
|
var DEFAULT_AUTH_OPTIONS, DEFAULT_CACHE_OPTIONS2, DEFAULT_LOGGER_OPTIONS, DEFAULT_SYSTEM_OPTIONS2, DEFAULT_TELEMETRY_OPTIONS2;
|
|
8376
8454
|
var init_Configuration = __esm({
|
|
8377
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8455
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/Configuration.mjs"() {
|
|
8378
8456
|
"use strict";
|
|
8379
8457
|
init_dist();
|
|
8380
8458
|
init_HttpClient();
|
|
@@ -8382,6 +8460,7 @@ var init_Configuration = __esm({
|
|
|
8382
8460
|
init_Constants2();
|
|
8383
8461
|
init_LinearRetryPolicy();
|
|
8384
8462
|
init_HttpClientWithRetries();
|
|
8463
|
+
init_NodeAuthError();
|
|
8385
8464
|
DEFAULT_AUTH_OPTIONS = {
|
|
8386
8465
|
clientId: Constants.EMPTY_STRING,
|
|
8387
8466
|
authority: Constants.DEFAULT_AUTHORITY,
|
|
@@ -8389,6 +8468,7 @@ var init_Configuration = __esm({
|
|
|
8389
8468
|
clientAssertion: Constants.EMPTY_STRING,
|
|
8390
8469
|
clientCertificate: {
|
|
8391
8470
|
thumbprint: Constants.EMPTY_STRING,
|
|
8471
|
+
thumbprintSha256: Constants.EMPTY_STRING,
|
|
8392
8472
|
privateKey: Constants.EMPTY_STRING,
|
|
8393
8473
|
x5c: Constants.EMPTY_STRING
|
|
8394
8474
|
},
|
|
@@ -8522,10 +8602,10 @@ var init_esm_node = __esm({
|
|
|
8522
8602
|
}
|
|
8523
8603
|
});
|
|
8524
8604
|
|
|
8525
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8605
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/GuidGenerator.mjs
|
|
8526
8606
|
var _GuidGenerator, GuidGenerator;
|
|
8527
8607
|
var init_GuidGenerator = __esm({
|
|
8528
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8608
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/GuidGenerator.mjs"() {
|
|
8529
8609
|
"use strict";
|
|
8530
8610
|
init_esm_node();
|
|
8531
8611
|
_GuidGenerator = class _GuidGenerator {
|
|
@@ -8551,10 +8631,10 @@ var init_GuidGenerator = __esm({
|
|
|
8551
8631
|
}
|
|
8552
8632
|
});
|
|
8553
8633
|
|
|
8554
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8634
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/EncodingUtils.mjs
|
|
8555
8635
|
var _EncodingUtils, EncodingUtils;
|
|
8556
8636
|
var init_EncodingUtils = __esm({
|
|
8557
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8637
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/EncodingUtils.mjs"() {
|
|
8558
8638
|
"use strict";
|
|
8559
8639
|
init_dist();
|
|
8560
8640
|
_EncodingUtils = class _EncodingUtils {
|
|
@@ -8599,11 +8679,11 @@ var init_EncodingUtils = __esm({
|
|
|
8599
8679
|
}
|
|
8600
8680
|
});
|
|
8601
8681
|
|
|
8602
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8682
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/HashUtils.mjs
|
|
8603
8683
|
import crypto2 from "crypto";
|
|
8604
8684
|
var _HashUtils, HashUtils;
|
|
8605
8685
|
var init_HashUtils = __esm({
|
|
8606
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8686
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/HashUtils.mjs"() {
|
|
8607
8687
|
"use strict";
|
|
8608
8688
|
init_Constants2();
|
|
8609
8689
|
_HashUtils = class _HashUtils {
|
|
@@ -8620,11 +8700,11 @@ var init_HashUtils = __esm({
|
|
|
8620
8700
|
}
|
|
8621
8701
|
});
|
|
8622
8702
|
|
|
8623
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8703
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/PkceGenerator.mjs
|
|
8624
8704
|
import crypto3 from "crypto";
|
|
8625
8705
|
var _PkceGenerator, PkceGenerator;
|
|
8626
8706
|
var init_PkceGenerator = __esm({
|
|
8627
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8707
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/PkceGenerator.mjs"() {
|
|
8628
8708
|
"use strict";
|
|
8629
8709
|
init_dist();
|
|
8630
8710
|
init_Constants2();
|
|
@@ -8673,10 +8753,10 @@ var init_PkceGenerator = __esm({
|
|
|
8673
8753
|
}
|
|
8674
8754
|
});
|
|
8675
8755
|
|
|
8676
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8756
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/CryptoProvider.mjs
|
|
8677
8757
|
var _CryptoProvider, CryptoProvider;
|
|
8678
8758
|
var init_CryptoProvider = __esm({
|
|
8679
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8759
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/CryptoProvider.mjs"() {
|
|
8680
8760
|
"use strict";
|
|
8681
8761
|
init_GuidGenerator();
|
|
8682
8762
|
init_EncodingUtils();
|
|
@@ -8766,10 +8846,10 @@ var init_CryptoProvider = __esm({
|
|
|
8766
8846
|
}
|
|
8767
8847
|
});
|
|
8768
8848
|
|
|
8769
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8849
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/NodeStorage.mjs
|
|
8770
8850
|
var _NodeStorage, NodeStorage;
|
|
8771
8851
|
var init_NodeStorage = __esm({
|
|
8772
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
8852
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/NodeStorage.mjs"() {
|
|
8773
8853
|
"use strict";
|
|
8774
8854
|
init_dist();
|
|
8775
8855
|
init_Deserializer();
|
|
@@ -9170,10 +9250,10 @@ var init_NodeStorage = __esm({
|
|
|
9170
9250
|
}
|
|
9171
9251
|
});
|
|
9172
9252
|
|
|
9173
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
9253
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/TokenCache.mjs
|
|
9174
9254
|
var defaultSerializedCache, _TokenCache, TokenCache;
|
|
9175
9255
|
var init_TokenCache = __esm({
|
|
9176
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
9256
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/TokenCache.mjs"() {
|
|
9177
9257
|
"use strict";
|
|
9178
9258
|
init_dist();
|
|
9179
9259
|
init_Deserializer();
|
|
@@ -13203,10 +13283,10 @@ var require_package14 = __commonJS({
|
|
|
13203
13283
|
}
|
|
13204
13284
|
});
|
|
13205
13285
|
|
|
13206
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13286
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientAssertion.mjs
|
|
13207
13287
|
var import_jsonwebtoken, _ClientAssertion, ClientAssertion;
|
|
13208
13288
|
var init_ClientAssertion = __esm({
|
|
13209
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13289
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientAssertion.mjs"() {
|
|
13210
13290
|
"use strict";
|
|
13211
13291
|
import_jsonwebtoken = __toESM(require_package14(), 1);
|
|
13212
13292
|
init_dist();
|
|
@@ -13223,6 +13303,7 @@ var init_ClientAssertion = __esm({
|
|
|
13223
13303
|
return clientAssertion;
|
|
13224
13304
|
}
|
|
13225
13305
|
/**
|
|
13306
|
+
* @deprecated Use fromCertificateWithSha256Thumbprint instead, with a SHA-256 thumprint
|
|
13226
13307
|
* Initialize the ClientAssertion class from the certificate passed by the user
|
|
13227
13308
|
* @param thumbprint - identifier of a certificate
|
|
13228
13309
|
* @param privateKey - secret key
|
|
@@ -13232,6 +13313,23 @@ var init_ClientAssertion = __esm({
|
|
|
13232
13313
|
const clientAssertion = new _ClientAssertion();
|
|
13233
13314
|
clientAssertion.privateKey = privateKey;
|
|
13234
13315
|
clientAssertion.thumbprint = thumbprint;
|
|
13316
|
+
clientAssertion.useSha256 = false;
|
|
13317
|
+
if (publicCertificate) {
|
|
13318
|
+
clientAssertion.publicCertificate = this.parseCertificate(publicCertificate);
|
|
13319
|
+
}
|
|
13320
|
+
return clientAssertion;
|
|
13321
|
+
}
|
|
13322
|
+
/**
|
|
13323
|
+
* Initialize the ClientAssertion class from the certificate passed by the user
|
|
13324
|
+
* @param thumbprint - identifier of a certificate
|
|
13325
|
+
* @param privateKey - secret key
|
|
13326
|
+
* @param publicCertificate - electronic document provided to prove the ownership of the public key
|
|
13327
|
+
*/
|
|
13328
|
+
static fromCertificateWithSha256Thumbprint(thumbprint, privateKey, publicCertificate) {
|
|
13329
|
+
const clientAssertion = new _ClientAssertion();
|
|
13330
|
+
clientAssertion.privateKey = privateKey;
|
|
13331
|
+
clientAssertion.thumbprint = thumbprint;
|
|
13332
|
+
clientAssertion.useSha256 = true;
|
|
13235
13333
|
if (publicCertificate) {
|
|
13236
13334
|
clientAssertion.publicCertificate = this.parseCertificate(publicCertificate);
|
|
13237
13335
|
}
|
|
@@ -13264,12 +13362,15 @@ var init_ClientAssertion = __esm({
|
|
|
13264
13362
|
const issuedAt = TimeUtils_exports.nowSeconds();
|
|
13265
13363
|
this.expirationTime = issuedAt + 600;
|
|
13266
13364
|
const header = {
|
|
13267
|
-
alg: JwtConstants.RSA_256
|
|
13268
|
-
x5t: EncodingUtils.base64EncodeUrl(this.thumbprint, "hex")
|
|
13365
|
+
alg: JwtConstants.RSA_256
|
|
13269
13366
|
};
|
|
13367
|
+
const thumbprintHeader = this.useSha256 ? JwtConstants.X5T_256 : JwtConstants.X5T;
|
|
13368
|
+
Object.assign(header, {
|
|
13369
|
+
[thumbprintHeader]: EncodingUtils.base64EncodeUrl(this.thumbprint, "hex")
|
|
13370
|
+
});
|
|
13270
13371
|
if (this.publicCertificate) {
|
|
13271
13372
|
Object.assign(header, {
|
|
13272
|
-
|
|
13373
|
+
[JwtConstants.X5C]: this.publicCertificate
|
|
13273
13374
|
});
|
|
13274
13375
|
}
|
|
13275
13376
|
const payload = {
|
|
@@ -13308,109 +13409,20 @@ var init_ClientAssertion = __esm({
|
|
|
13308
13409
|
}
|
|
13309
13410
|
});
|
|
13310
13411
|
|
|
13311
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13412
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/packageMetadata.mjs
|
|
13312
13413
|
var name2, version2;
|
|
13313
13414
|
var init_packageMetadata2 = __esm({
|
|
13314
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13415
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/packageMetadata.mjs"() {
|
|
13315
13416
|
"use strict";
|
|
13316
13417
|
name2 = "@azure/msal-node";
|
|
13317
|
-
version2 = "2.
|
|
13318
|
-
}
|
|
13319
|
-
});
|
|
13320
|
-
|
|
13321
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs
|
|
13322
|
-
var NodeAuthErrorMessage, _NodeAuthError, NodeAuthError;
|
|
13323
|
-
var init_NodeAuthError = __esm({
|
|
13324
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.9.2-ad4f2bdff1/package/dist/error/NodeAuthError.mjs"() {
|
|
13325
|
-
"use strict";
|
|
13326
|
-
init_dist();
|
|
13327
|
-
NodeAuthErrorMessage = {
|
|
13328
|
-
invalidLoopbackAddressType: {
|
|
13329
|
-
code: "invalid_loopback_server_address_type",
|
|
13330
|
-
desc: "Loopback server address is not type string. This is unexpected."
|
|
13331
|
-
},
|
|
13332
|
-
unableToLoadRedirectUri: {
|
|
13333
|
-
code: "unable_to_load_redirectUrl",
|
|
13334
|
-
desc: "Loopback server callback was invoked without a url. This is unexpected."
|
|
13335
|
-
},
|
|
13336
|
-
noAuthCodeInResponse: {
|
|
13337
|
-
code: "no_auth_code_in_response",
|
|
13338
|
-
desc: "No auth code found in the server response. Please check your network trace to determine what happened."
|
|
13339
|
-
},
|
|
13340
|
-
noLoopbackServerExists: {
|
|
13341
|
-
code: "no_loopback_server_exists",
|
|
13342
|
-
desc: "No loopback server exists yet."
|
|
13343
|
-
},
|
|
13344
|
-
loopbackServerAlreadyExists: {
|
|
13345
|
-
code: "loopback_server_already_exists",
|
|
13346
|
-
desc: "Loopback server already exists. Cannot create another."
|
|
13347
|
-
},
|
|
13348
|
-
loopbackServerTimeout: {
|
|
13349
|
-
code: "loopback_server_timeout",
|
|
13350
|
-
desc: "Timed out waiting for auth code listener to be registered."
|
|
13351
|
-
},
|
|
13352
|
-
stateNotFoundError: {
|
|
13353
|
-
code: "state_not_found",
|
|
13354
|
-
desc: "State not found. Please verify that the request originated from msal."
|
|
13355
|
-
}
|
|
13356
|
-
};
|
|
13357
|
-
_NodeAuthError = class _NodeAuthError extends AuthError {
|
|
13358
|
-
constructor(errorCode, errorMessage) {
|
|
13359
|
-
super(errorCode, errorMessage);
|
|
13360
|
-
this.name = "NodeAuthError";
|
|
13361
|
-
}
|
|
13362
|
-
/**
|
|
13363
|
-
* Creates an error thrown if loopback server address is of type string.
|
|
13364
|
-
*/
|
|
13365
|
-
static createInvalidLoopbackAddressTypeError() {
|
|
13366
|
-
return new _NodeAuthError(NodeAuthErrorMessage.invalidLoopbackAddressType.code, `${NodeAuthErrorMessage.invalidLoopbackAddressType.desc}`);
|
|
13367
|
-
}
|
|
13368
|
-
/**
|
|
13369
|
-
* Creates an error thrown if the loopback server is unable to get a url.
|
|
13370
|
-
*/
|
|
13371
|
-
static createUnableToLoadRedirectUrlError() {
|
|
13372
|
-
return new _NodeAuthError(NodeAuthErrorMessage.unableToLoadRedirectUri.code, `${NodeAuthErrorMessage.unableToLoadRedirectUri.desc}`);
|
|
13373
|
-
}
|
|
13374
|
-
/**
|
|
13375
|
-
* Creates an error thrown if the server response does not contain an auth code.
|
|
13376
|
-
*/
|
|
13377
|
-
static createNoAuthCodeInResponseError() {
|
|
13378
|
-
return new _NodeAuthError(NodeAuthErrorMessage.noAuthCodeInResponse.code, `${NodeAuthErrorMessage.noAuthCodeInResponse.desc}`);
|
|
13379
|
-
}
|
|
13380
|
-
/**
|
|
13381
|
-
* Creates an error thrown if the loopback server has not been spun up yet.
|
|
13382
|
-
*/
|
|
13383
|
-
static createNoLoopbackServerExistsError() {
|
|
13384
|
-
return new _NodeAuthError(NodeAuthErrorMessage.noLoopbackServerExists.code, `${NodeAuthErrorMessage.noLoopbackServerExists.desc}`);
|
|
13385
|
-
}
|
|
13386
|
-
/**
|
|
13387
|
-
* Creates an error thrown if a loopback server already exists when attempting to create another one.
|
|
13388
|
-
*/
|
|
13389
|
-
static createLoopbackServerAlreadyExistsError() {
|
|
13390
|
-
return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerAlreadyExists.code, `${NodeAuthErrorMessage.loopbackServerAlreadyExists.desc}`);
|
|
13391
|
-
}
|
|
13392
|
-
/**
|
|
13393
|
-
* Creates an error thrown if the loopback server times out registering the auth code listener.
|
|
13394
|
-
*/
|
|
13395
|
-
static createLoopbackServerTimeoutError() {
|
|
13396
|
-
return new _NodeAuthError(NodeAuthErrorMessage.loopbackServerTimeout.code, `${NodeAuthErrorMessage.loopbackServerTimeout.desc}`);
|
|
13397
|
-
}
|
|
13398
|
-
/**
|
|
13399
|
-
* Creates an error thrown when the state is not present.
|
|
13400
|
-
*/
|
|
13401
|
-
static createStateNotFoundError() {
|
|
13402
|
-
return new _NodeAuthError(NodeAuthErrorMessage.stateNotFoundError.code, NodeAuthErrorMessage.stateNotFoundError.desc);
|
|
13403
|
-
}
|
|
13404
|
-
};
|
|
13405
|
-
__name(_NodeAuthError, "NodeAuthError");
|
|
13406
|
-
NodeAuthError = _NodeAuthError;
|
|
13418
|
+
version2 = "2.11.0";
|
|
13407
13419
|
}
|
|
13408
13420
|
});
|
|
13409
13421
|
|
|
13410
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13422
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/UsernamePasswordClient.mjs
|
|
13411
13423
|
var _UsernamePasswordClient, UsernamePasswordClient;
|
|
13412
13424
|
var init_UsernamePasswordClient = __esm({
|
|
13413
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13425
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/UsernamePasswordClient.mjs"() {
|
|
13414
13426
|
"use strict";
|
|
13415
13427
|
init_dist();
|
|
13416
13428
|
_UsernamePasswordClient = class _UsernamePasswordClient extends BaseClient {
|
|
@@ -13500,10 +13512,10 @@ var init_UsernamePasswordClient = __esm({
|
|
|
13500
13512
|
}
|
|
13501
13513
|
});
|
|
13502
13514
|
|
|
13503
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13515
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientApplication.mjs
|
|
13504
13516
|
var _ClientApplication, ClientApplication;
|
|
13505
13517
|
var init_ClientApplication = __esm({
|
|
13506
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13518
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientApplication.mjs"() {
|
|
13507
13519
|
"use strict";
|
|
13508
13520
|
init_dist();
|
|
13509
13521
|
init_Configuration();
|
|
@@ -13829,11 +13841,11 @@ var init_ClientApplication = __esm({
|
|
|
13829
13841
|
}
|
|
13830
13842
|
});
|
|
13831
13843
|
|
|
13832
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13844
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/LoopbackClient.mjs
|
|
13833
13845
|
import http2 from "http";
|
|
13834
13846
|
var _LoopbackClient, LoopbackClient;
|
|
13835
13847
|
var init_LoopbackClient = __esm({
|
|
13836
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13848
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/LoopbackClient.mjs"() {
|
|
13837
13849
|
"use strict";
|
|
13838
13850
|
init_dist();
|
|
13839
13851
|
init_NodeAuthError();
|
|
@@ -13909,10 +13921,10 @@ var init_LoopbackClient = __esm({
|
|
|
13909
13921
|
}
|
|
13910
13922
|
});
|
|
13911
13923
|
|
|
13912
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13924
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/DeviceCodeClient.mjs
|
|
13913
13925
|
var _DeviceCodeClient, DeviceCodeClient;
|
|
13914
13926
|
var init_DeviceCodeClient = __esm({
|
|
13915
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
13927
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/DeviceCodeClient.mjs"() {
|
|
13916
13928
|
"use strict";
|
|
13917
13929
|
init_dist();
|
|
13918
13930
|
_DeviceCodeClient = class _DeviceCodeClient extends BaseClient {
|
|
@@ -14096,10 +14108,10 @@ var init_DeviceCodeClient = __esm({
|
|
|
14096
14108
|
}
|
|
14097
14109
|
});
|
|
14098
14110
|
|
|
14099
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14111
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/PublicClientApplication.mjs
|
|
14100
14112
|
var _PublicClientApplication, PublicClientApplication;
|
|
14101
14113
|
var init_PublicClientApplication = __esm({
|
|
14102
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14114
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/PublicClientApplication.mjs"() {
|
|
14103
14115
|
"use strict";
|
|
14104
14116
|
init_Constants2();
|
|
14105
14117
|
init_dist();
|
|
@@ -14317,10 +14329,10 @@ var init_PublicClientApplication = __esm({
|
|
|
14317
14329
|
}
|
|
14318
14330
|
});
|
|
14319
14331
|
|
|
14320
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14332
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientCredentialClient.mjs
|
|
14321
14333
|
var _ClientCredentialClient, ClientCredentialClient;
|
|
14322
14334
|
var init_ClientCredentialClient = __esm({
|
|
14323
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14335
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientCredentialClient.mjs"() {
|
|
14324
14336
|
"use strict";
|
|
14325
14337
|
init_dist();
|
|
14326
14338
|
_ClientCredentialClient = class _ClientCredentialClient extends BaseClient {
|
|
@@ -14495,10 +14507,10 @@ var init_ClientCredentialClient = __esm({
|
|
|
14495
14507
|
}
|
|
14496
14508
|
});
|
|
14497
14509
|
|
|
14498
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14510
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/OnBehalfOfClient.mjs
|
|
14499
14511
|
var _OnBehalfOfClient, OnBehalfOfClient;
|
|
14500
14512
|
var init_OnBehalfOfClient = __esm({
|
|
14501
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14513
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/OnBehalfOfClient.mjs"() {
|
|
14502
14514
|
"use strict";
|
|
14503
14515
|
init_dist();
|
|
14504
14516
|
init_EncodingUtils();
|
|
@@ -14681,10 +14693,10 @@ var init_OnBehalfOfClient = __esm({
|
|
|
14681
14693
|
}
|
|
14682
14694
|
});
|
|
14683
14695
|
|
|
14684
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14696
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ConfidentialClientApplication.mjs
|
|
14685
14697
|
var _ConfidentialClientApplication, ConfidentialClientApplication;
|
|
14686
14698
|
var init_ConfidentialClientApplication = __esm({
|
|
14687
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14699
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ConfidentialClientApplication.mjs"() {
|
|
14688
14700
|
"use strict";
|
|
14689
14701
|
init_ClientApplication();
|
|
14690
14702
|
init_ClientAssertion();
|
|
@@ -14714,7 +14726,7 @@ var init_ConfidentialClientApplication = __esm({
|
|
|
14714
14726
|
*/
|
|
14715
14727
|
constructor(configuration) {
|
|
14716
14728
|
super(configuration);
|
|
14717
|
-
this.setClientCredential(
|
|
14729
|
+
this.setClientCredential();
|
|
14718
14730
|
this.appTokenProvider = void 0;
|
|
14719
14731
|
}
|
|
14720
14732
|
/**
|
|
@@ -14804,33 +14816,33 @@ var init_ConfidentialClientApplication = __esm({
|
|
|
14804
14816
|
throw e;
|
|
14805
14817
|
}
|
|
14806
14818
|
}
|
|
14807
|
-
setClientCredential(
|
|
14808
|
-
|
|
14809
|
-
const
|
|
14810
|
-
const
|
|
14811
|
-
const certificate = configuration.auth.clientCertificate || {
|
|
14812
|
-
thumbprint: Constants.EMPTY_STRING,
|
|
14813
|
-
privateKey: Constants.EMPTY_STRING
|
|
14814
|
-
};
|
|
14815
|
-
const certificateNotEmpty = !!certificate.thumbprint || !!certificate.privateKey;
|
|
14819
|
+
setClientCredential() {
|
|
14820
|
+
const clientSecretNotEmpty = !!this.config.auth.clientSecret;
|
|
14821
|
+
const clientAssertionNotEmpty = !!this.config.auth.clientAssertion;
|
|
14822
|
+
const certificateNotEmpty = (!!this.config.auth.clientCertificate.thumbprint || !!this.config.auth.clientCertificate.thumbprintSha256) && !!this.config.auth.clientCertificate.privateKey;
|
|
14816
14823
|
if (this.appTokenProvider) {
|
|
14817
14824
|
return;
|
|
14818
14825
|
}
|
|
14819
14826
|
if (clientSecretNotEmpty && clientAssertionNotEmpty || clientAssertionNotEmpty && certificateNotEmpty || clientSecretNotEmpty && certificateNotEmpty) {
|
|
14820
14827
|
throw createClientAuthError(ClientAuthErrorCodes_exports.invalidClientCredential);
|
|
14821
14828
|
}
|
|
14822
|
-
if (
|
|
14823
|
-
this.clientSecret =
|
|
14829
|
+
if (this.config.auth.clientSecret) {
|
|
14830
|
+
this.clientSecret = this.config.auth.clientSecret;
|
|
14824
14831
|
return;
|
|
14825
14832
|
}
|
|
14826
|
-
if (
|
|
14827
|
-
this.developerProvidedClientAssertion =
|
|
14833
|
+
if (this.config.auth.clientAssertion) {
|
|
14834
|
+
this.developerProvidedClientAssertion = this.config.auth.clientAssertion;
|
|
14828
14835
|
return;
|
|
14829
14836
|
}
|
|
14830
14837
|
if (!certificateNotEmpty) {
|
|
14831
14838
|
throw createClientAuthError(ClientAuthErrorCodes_exports.invalidClientCredential);
|
|
14832
14839
|
} else {
|
|
14833
|
-
this.clientAssertion = ClientAssertion.
|
|
14840
|
+
this.clientAssertion = !!this.config.auth.clientCertificate.thumbprintSha256 ? ClientAssertion.fromCertificateWithSha256Thumbprint(this.config.auth.clientCertificate.thumbprintSha256, this.config.auth.clientCertificate.privateKey, this.config.auth.clientCertificate.x5c) : ClientAssertion.fromCertificate(
|
|
14841
|
+
// guaranteed to be a string, due to prior error checking in this function
|
|
14842
|
+
this.config.auth.clientCertificate.thumbprint,
|
|
14843
|
+
this.config.auth.clientCertificate.privateKey,
|
|
14844
|
+
this.config.auth.clientCertificate.x5c
|
|
14845
|
+
);
|
|
14834
14846
|
}
|
|
14835
14847
|
}
|
|
14836
14848
|
};
|
|
@@ -14839,10 +14851,10 @@ var init_ConfidentialClientApplication = __esm({
|
|
|
14839
14851
|
}
|
|
14840
14852
|
});
|
|
14841
14853
|
|
|
14842
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14854
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs
|
|
14843
14855
|
var ManagedIdentityUserAssignedIdQueryParameterNames, _BaseManagedIdentitySource, BaseManagedIdentitySource;
|
|
14844
14856
|
var init_BaseManagedIdentitySource = __esm({
|
|
14845
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14857
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs"() {
|
|
14846
14858
|
"use strict";
|
|
14847
14859
|
init_dist();
|
|
14848
14860
|
init_Constants2();
|
|
@@ -14864,6 +14876,7 @@ var init_BaseManagedIdentitySource = __esm({
|
|
|
14864
14876
|
return this.getServerTokenResponse(response);
|
|
14865
14877
|
}
|
|
14866
14878
|
getServerTokenResponse(response) {
|
|
14879
|
+
var _a2, _b2;
|
|
14867
14880
|
let refreshIn, expiresIn;
|
|
14868
14881
|
if (response.body.expires_on) {
|
|
14869
14882
|
expiresIn = response.body.expires_on - TimeUtils_exports.nowSeconds();
|
|
@@ -14880,8 +14893,12 @@ var init_BaseManagedIdentitySource = __esm({
|
|
|
14880
14893
|
token_type: response.body.token_type,
|
|
14881
14894
|
refresh_in: refreshIn,
|
|
14882
14895
|
// error
|
|
14883
|
-
|
|
14884
|
-
|
|
14896
|
+
correlation_id: response.body.correlation_id || response.body.correlationId,
|
|
14897
|
+
error: typeof response.body.error === "string" ? response.body.error : (_a2 = response.body.error) == null ? void 0 : _a2.code,
|
|
14898
|
+
error_description: response.body.message || (typeof response.body.error === "string" ? response.body.error_description : (_b2 = response.body.error) == null ? void 0 : _b2.message),
|
|
14899
|
+
error_codes: response.body.error_codes,
|
|
14900
|
+
timestamp: response.body.timestamp,
|
|
14901
|
+
trace_id: response.body.trace_id
|
|
14885
14902
|
};
|
|
14886
14903
|
return serverTokenResponse;
|
|
14887
14904
|
}
|
|
@@ -14942,10 +14959,10 @@ var init_BaseManagedIdentitySource = __esm({
|
|
|
14942
14959
|
}
|
|
14943
14960
|
});
|
|
14944
14961
|
|
|
14945
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14962
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityRequestParameters.mjs
|
|
14946
14963
|
var _ManagedIdentityRequestParameters, ManagedIdentityRequestParameters;
|
|
14947
14964
|
var init_ManagedIdentityRequestParameters = __esm({
|
|
14948
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14965
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityRequestParameters.mjs"() {
|
|
14949
14966
|
"use strict";
|
|
14950
14967
|
init_dist();
|
|
14951
14968
|
_ManagedIdentityRequestParameters = class _ManagedIdentityRequestParameters {
|
|
@@ -14977,10 +14994,10 @@ var init_ManagedIdentityRequestParameters = __esm({
|
|
|
14977
14994
|
}
|
|
14978
14995
|
});
|
|
14979
14996
|
|
|
14980
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
14997
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AppService.mjs
|
|
14981
14998
|
var APP_SERVICE_MSI_API_VERSION, _AppService, AppService;
|
|
14982
14999
|
var init_AppService = __esm({
|
|
14983
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15000
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AppService.mjs"() {
|
|
14984
15001
|
"use strict";
|
|
14985
15002
|
init_BaseManagedIdentitySource();
|
|
14986
15003
|
init_Constants2();
|
|
@@ -15023,12 +15040,12 @@ var init_AppService = __esm({
|
|
|
15023
15040
|
}
|
|
15024
15041
|
});
|
|
15025
15042
|
|
|
15026
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15043
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AzureArc.mjs
|
|
15027
15044
|
import { statSync, readFileSync } from "fs";
|
|
15028
15045
|
import path from "path";
|
|
15029
15046
|
var ARC_API_VERSION, SUPPORTED_AZURE_ARC_PLATFORMS, _AzureArc, AzureArc;
|
|
15030
15047
|
var init_AzureArc = __esm({
|
|
15031
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15048
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AzureArc.mjs"() {
|
|
15032
15049
|
"use strict";
|
|
15033
15050
|
init_dist();
|
|
15034
15051
|
init_ManagedIdentityRequestParameters();
|
|
@@ -15131,10 +15148,10 @@ var init_AzureArc = __esm({
|
|
|
15131
15148
|
}
|
|
15132
15149
|
});
|
|
15133
15150
|
|
|
15134
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15151
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/CloudShell.mjs
|
|
15135
15152
|
var _CloudShell, CloudShell;
|
|
15136
15153
|
var init_CloudShell = __esm({
|
|
15137
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15154
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/CloudShell.mjs"() {
|
|
15138
15155
|
"use strict";
|
|
15139
15156
|
init_ManagedIdentityRequestParameters();
|
|
15140
15157
|
init_BaseManagedIdentitySource();
|
|
@@ -15175,10 +15192,10 @@ var init_CloudShell = __esm({
|
|
|
15175
15192
|
}
|
|
15176
15193
|
});
|
|
15177
15194
|
|
|
15178
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15195
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/Imds.mjs
|
|
15179
15196
|
var IMDS_TOKEN_PATH, DEFAULT_IMDS_ENDPOINT, IMDS_API_VERSION, _Imds, Imds;
|
|
15180
15197
|
var init_Imds = __esm({
|
|
15181
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15198
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/Imds.mjs"() {
|
|
15182
15199
|
"use strict";
|
|
15183
15200
|
init_ManagedIdentityRequestParameters();
|
|
15184
15201
|
init_BaseManagedIdentitySource();
|
|
@@ -15218,10 +15235,10 @@ var init_Imds = __esm({
|
|
|
15218
15235
|
}
|
|
15219
15236
|
});
|
|
15220
15237
|
|
|
15221
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15238
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs
|
|
15222
15239
|
var SERVICE_FABRIC_MSI_API_VERSION, _ServiceFabric, ServiceFabric;
|
|
15223
15240
|
var init_ServiceFabric = __esm({
|
|
15224
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15241
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs"() {
|
|
15225
15242
|
"use strict";
|
|
15226
15243
|
init_ManagedIdentityRequestParameters();
|
|
15227
15244
|
init_BaseManagedIdentitySource();
|
|
@@ -15268,10 +15285,10 @@ var init_ServiceFabric = __esm({
|
|
|
15268
15285
|
}
|
|
15269
15286
|
});
|
|
15270
15287
|
|
|
15271
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15288
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityClient.mjs
|
|
15272
15289
|
var _ManagedIdentityClient, ManagedIdentityClient;
|
|
15273
15290
|
var init_ManagedIdentityClient = __esm({
|
|
15274
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15291
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityClient.mjs"() {
|
|
15275
15292
|
"use strict";
|
|
15276
15293
|
init_AppService();
|
|
15277
15294
|
init_AzureArc();
|
|
@@ -15324,10 +15341,10 @@ var init_ManagedIdentityClient = __esm({
|
|
|
15324
15341
|
}
|
|
15325
15342
|
});
|
|
15326
15343
|
|
|
15327
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15344
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityApplication.mjs
|
|
15328
15345
|
var _ManagedIdentityApplication, ManagedIdentityApplication;
|
|
15329
15346
|
var init_ManagedIdentityApplication = __esm({
|
|
15330
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15347
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityApplication.mjs"() {
|
|
15331
15348
|
"use strict";
|
|
15332
15349
|
init_dist();
|
|
15333
15350
|
init_Configuration();
|
|
@@ -15420,10 +15437,10 @@ var init_ManagedIdentityApplication = __esm({
|
|
|
15420
15437
|
}
|
|
15421
15438
|
});
|
|
15422
15439
|
|
|
15423
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15440
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/distributed/DistributedCachePlugin.mjs
|
|
15424
15441
|
var _DistributedCachePlugin, DistributedCachePlugin;
|
|
15425
15442
|
var init_DistributedCachePlugin = __esm({
|
|
15426
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15443
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/distributed/DistributedCachePlugin.mjs"() {
|
|
15427
15444
|
"use strict";
|
|
15428
15445
|
init_dist();
|
|
15429
15446
|
_DistributedCachePlugin = class _DistributedCachePlugin {
|
|
@@ -15453,7 +15470,7 @@ var init_DistributedCachePlugin = __esm({
|
|
|
15453
15470
|
}
|
|
15454
15471
|
});
|
|
15455
15472
|
|
|
15456
|
-
// ../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15473
|
+
// ../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/index.mjs
|
|
15457
15474
|
var dist_exports = {};
|
|
15458
15475
|
__export(dist_exports, {
|
|
15459
15476
|
AuthError: () => AuthError,
|
|
@@ -15495,7 +15512,7 @@ __export(dist_exports, {
|
|
|
15495
15512
|
version: () => version2
|
|
15496
15513
|
});
|
|
15497
15514
|
var init_dist2 = __esm({
|
|
15498
|
-
"../../node_modules/.store/@azure-msal-node-npm-2.
|
|
15515
|
+
"../../node_modules/.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/index.mjs"() {
|
|
15499
15516
|
"use strict";
|
|
15500
15517
|
init_internals();
|
|
15501
15518
|
init_PublicClientApplication();
|
|
@@ -15862,12 +15879,12 @@ var require_package18 = __commonJS({
|
|
|
15862
15879
|
}
|
|
15863
15880
|
});
|
|
15864
15881
|
|
|
15865
|
-
// ../../node_modules/.store/@azure-identity-npm-4.
|
|
15882
|
+
// ../../node_modules/.store/@azure-identity-npm-4.3.0-e85334d38f/package/dist/index.js
|
|
15866
15883
|
var require_dist2 = __commonJS({
|
|
15867
|
-
"../../node_modules/.store/@azure-identity-npm-4.
|
|
15884
|
+
"../../node_modules/.store/@azure-identity-npm-4.3.0-e85334d38f/package/dist/index.js"(exports) {
|
|
15868
15885
|
"use strict";
|
|
15869
15886
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15870
|
-
var logger$
|
|
15887
|
+
var logger$r = require_commonjs();
|
|
15871
15888
|
var coreClient = require_commonjs5();
|
|
15872
15889
|
var coreUtil = require_commonjs2();
|
|
15873
15890
|
var coreRestPipeline = require_commonjs4();
|
|
@@ -15905,7 +15922,7 @@ var require_dist2 = __commonJS({
|
|
|
15905
15922
|
__name(_interopNamespaceDefault, "_interopNamespaceDefault");
|
|
15906
15923
|
var msalCommon__namespace = /* @__PURE__ */ _interopNamespaceDefault(msalCommon);
|
|
15907
15924
|
var child_process__namespace = /* @__PURE__ */ _interopNamespaceDefault(child_process);
|
|
15908
|
-
var SDK_VERSION = `4.
|
|
15925
|
+
var SDK_VERSION = `4.3.0-beta.3`;
|
|
15909
15926
|
var DeveloperSignOnClientId = "04b07795-8ddb-461a-bbee-02f9e1bf7b46";
|
|
15910
15927
|
var DefaultTenantId = "common";
|
|
15911
15928
|
exports.AzureAuthorityHosts = void 0;
|
|
@@ -15978,7 +15995,7 @@ var require_dist2 = __commonJS({
|
|
|
15978
15995
|
var msalPlugins = {
|
|
15979
15996
|
generatePluginConfiguration
|
|
15980
15997
|
};
|
|
15981
|
-
var logger$
|
|
15998
|
+
var logger$q = logger$r.createClientLogger("identity");
|
|
15982
15999
|
function processEnvVars(supportedEnvVars) {
|
|
15983
16000
|
return supportedEnvVars.reduce((acc, envVariable) => {
|
|
15984
16001
|
if (process.env[envVariable]) {
|
|
@@ -16002,7 +16019,7 @@ var require_dist2 = __commonJS({
|
|
|
16002
16019
|
return `${message} Error message: ${typeof error === "string" ? error : error.message}.`;
|
|
16003
16020
|
}
|
|
16004
16021
|
__name(formatError, "formatError");
|
|
16005
|
-
function credentialLoggerInstance(title, parent, log = logger$
|
|
16022
|
+
function credentialLoggerInstance(title, parent, log = logger$q) {
|
|
16006
16023
|
const fullTitle = parent ? `${parent.fullTitle} ${title}` : title;
|
|
16007
16024
|
function info(message) {
|
|
16008
16025
|
log.info(`${fullTitle} =>`, message);
|
|
@@ -16016,16 +16033,21 @@ var require_dist2 = __commonJS({
|
|
|
16016
16033
|
log.verbose(`${fullTitle} =>`, message);
|
|
16017
16034
|
}
|
|
16018
16035
|
__name(verbose, "verbose");
|
|
16036
|
+
function error(message) {
|
|
16037
|
+
log.error(`${fullTitle} =>`, message);
|
|
16038
|
+
}
|
|
16039
|
+
__name(error, "error");
|
|
16019
16040
|
return {
|
|
16020
16041
|
title,
|
|
16021
16042
|
fullTitle,
|
|
16022
16043
|
info,
|
|
16023
16044
|
warning,
|
|
16024
|
-
verbose
|
|
16045
|
+
verbose,
|
|
16046
|
+
error
|
|
16025
16047
|
};
|
|
16026
16048
|
}
|
|
16027
16049
|
__name(credentialLoggerInstance, "credentialLoggerInstance");
|
|
16028
|
-
function credentialLogger(title, log = logger$
|
|
16050
|
+
function credentialLogger(title, log = logger$q) {
|
|
16029
16051
|
const credLogger = credentialLoggerInstance(title, void 0, log);
|
|
16030
16052
|
return Object.assign(Object.assign({}, credLogger), { parent: log, getToken: credentialLoggerInstance("=> getToken()", credLogger, log) });
|
|
16031
16053
|
}
|
|
@@ -16259,7 +16281,7 @@ ${errorDetail}`);
|
|
|
16259
16281
|
this.tokenCredentialOptions = Object.assign({}, options);
|
|
16260
16282
|
}
|
|
16261
16283
|
async sendTokenRequest(request) {
|
|
16262
|
-
logger$
|
|
16284
|
+
logger$q.info(`IdentityClient: sending token request to [${request.url}]`);
|
|
16263
16285
|
const response = await this.sendRequest(request);
|
|
16264
16286
|
if (response.bodyAsText && (response.status === 200 || response.status === 201)) {
|
|
16265
16287
|
const parsedBody = JSON.parse(response.bodyAsText);
|
|
@@ -16274,11 +16296,11 @@ ${errorDetail}`);
|
|
|
16274
16296
|
},
|
|
16275
16297
|
refreshToken: parsedBody.refresh_token
|
|
16276
16298
|
};
|
|
16277
|
-
logger$
|
|
16299
|
+
logger$q.info(`IdentityClient: [${request.url}] token acquired, expires on ${token.accessToken.expiresOnTimestamp}`);
|
|
16278
16300
|
return token;
|
|
16279
16301
|
} else {
|
|
16280
16302
|
const error = new AuthenticationError(response.status, response.bodyAsText);
|
|
16281
|
-
logger$
|
|
16303
|
+
logger$q.warning(`IdentityClient: authentication error. HTTP status: ${response.status}, ${error.errorResponse.errorDescription}`);
|
|
16282
16304
|
throw error;
|
|
16283
16305
|
}
|
|
16284
16306
|
}
|
|
@@ -16286,7 +16308,7 @@ ${errorDetail}`);
|
|
|
16286
16308
|
if (refreshToken === void 0) {
|
|
16287
16309
|
return null;
|
|
16288
16310
|
}
|
|
16289
|
-
logger$
|
|
16311
|
+
logger$q.info(`IdentityClient: refreshing access token with client ID: ${clientId}, scopes: ${scopes} started`);
|
|
16290
16312
|
const refreshParams = {
|
|
16291
16313
|
grant_type: "refresh_token",
|
|
16292
16314
|
client_id: clientId,
|
|
@@ -16312,14 +16334,14 @@ ${errorDetail}`);
|
|
|
16312
16334
|
tracingOptions: updatedOptions.tracingOptions
|
|
16313
16335
|
});
|
|
16314
16336
|
const response = await this.sendTokenRequest(request);
|
|
16315
|
-
logger$
|
|
16337
|
+
logger$q.info(`IdentityClient: refreshed token for client ID: ${clientId}`);
|
|
16316
16338
|
return response;
|
|
16317
16339
|
} catch (err) {
|
|
16318
16340
|
if (err.name === AuthenticationErrorName && err.errorResponse.error === "interaction_required") {
|
|
16319
|
-
logger$
|
|
16341
|
+
logger$q.info(`IdentityClient: interaction required for client ID: ${clientId}`);
|
|
16320
16342
|
return null;
|
|
16321
16343
|
} else {
|
|
16322
|
-
logger$
|
|
16344
|
+
logger$q.warning(`IdentityClient: failed refreshing token for client ID: ${clientId}: ${err}`);
|
|
16323
16345
|
throw err;
|
|
16324
16346
|
}
|
|
16325
16347
|
}
|
|
@@ -16427,9 +16449,9 @@ ${errorDetail}`);
|
|
|
16427
16449
|
}
|
|
16428
16450
|
const base64Metadata = accessToken.split(".")[1];
|
|
16429
16451
|
const { appid, upn, tid, oid } = JSON.parse(Buffer.from(base64Metadata, "base64").toString("utf8"));
|
|
16430
|
-
logger$
|
|
16452
|
+
logger$q.info(`[Authenticated account] Client ID: ${appid}. Tenant ID: ${tid}. User Principal Name: ${upn || unavailableUpn}. Object ID (user): ${oid}`);
|
|
16431
16453
|
} catch (e) {
|
|
16432
|
-
logger$
|
|
16454
|
+
logger$q.warning("allowLoggingAccountIdentifiers was set, but we couldn't log the account information. Error:", e.message);
|
|
16433
16455
|
}
|
|
16434
16456
|
}
|
|
16435
16457
|
};
|
|
@@ -16437,7 +16459,7 @@ ${errorDetail}`);
|
|
|
16437
16459
|
var IdentityClient = _IdentityClient;
|
|
16438
16460
|
var CommonTenantId = "common";
|
|
16439
16461
|
var AzureAccountClientId = "aebc6443-996d-45c2-90f0-388ff96faa56";
|
|
16440
|
-
var logger$
|
|
16462
|
+
var logger$p = credentialLogger("VisualStudioCodeCredential");
|
|
16441
16463
|
var findCredentials = void 0;
|
|
16442
16464
|
var vsCodeCredentialControl = {
|
|
16443
16465
|
setVsCodeCredentialFinder(finder) {
|
|
@@ -16484,7 +16506,7 @@ ${errorDetail}`);
|
|
|
16484
16506
|
return;
|
|
16485
16507
|
}
|
|
16486
16508
|
} catch (e) {
|
|
16487
|
-
logger$
|
|
16509
|
+
logger$p.info(`Failed to load the Visual Studio Code configuration file. Error: ${e.message}`);
|
|
16488
16510
|
return;
|
|
16489
16511
|
}
|
|
16490
16512
|
}
|
|
@@ -16505,7 +16527,7 @@ ${errorDetail}`);
|
|
|
16505
16527
|
const authorityHost = mapVSCodeAuthorityHosts[this.cloudName];
|
|
16506
16528
|
this.identityClient = new IdentityClient(Object.assign({ authorityHost }, options));
|
|
16507
16529
|
if (options && options.tenantId) {
|
|
16508
|
-
checkTenantId(logger$
|
|
16530
|
+
checkTenantId(logger$p, options.tenantId);
|
|
16509
16531
|
this.tenantId = options.tenantId;
|
|
16510
16532
|
} else {
|
|
16511
16533
|
this.tenantId = CommonTenantId;
|
|
@@ -16543,7 +16565,7 @@ ${errorDetail}`);
|
|
|
16543
16565
|
async getToken(scopes, options) {
|
|
16544
16566
|
var _a2, _b2;
|
|
16545
16567
|
await this.prepareOnce();
|
|
16546
|
-
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds, logger$
|
|
16568
|
+
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds, logger$p) || this.tenantId;
|
|
16547
16569
|
if (findCredentials === void 0) {
|
|
16548
16570
|
throw new CredentialUnavailableError([
|
|
16549
16571
|
"No implementation of `VisualStudioCodeCredential` is available.",
|
|
@@ -16556,7 +16578,7 @@ ${errorDetail}`);
|
|
|
16556
16578
|
let scopeString = typeof scopes === "string" ? scopes : scopes.join(" ");
|
|
16557
16579
|
if (!scopeString.match(/^[0-9a-zA-Z-.:/]+$/)) {
|
|
16558
16580
|
const error = new Error("Invalid scope was specified by the user or calling client");
|
|
16559
|
-
logger$
|
|
16581
|
+
logger$p.getToken.info(formatError(scopes, error));
|
|
16560
16582
|
throw error;
|
|
16561
16583
|
}
|
|
16562
16584
|
if (scopeString.indexOf("offline_access") < 0) {
|
|
@@ -16567,16 +16589,16 @@ ${errorDetail}`);
|
|
|
16567
16589
|
if (refreshToken) {
|
|
16568
16590
|
const tokenResponse = await this.identityClient.refreshAccessToken(tenantId, AzureAccountClientId, scopeString, refreshToken, void 0);
|
|
16569
16591
|
if (tokenResponse) {
|
|
16570
|
-
logger$
|
|
16592
|
+
logger$p.getToken.info(formatSuccess(scopes));
|
|
16571
16593
|
return tokenResponse.accessToken;
|
|
16572
16594
|
} else {
|
|
16573
16595
|
const error = new CredentialUnavailableError("Could not retrieve the token associated with Visual Studio Code. Have you connected using the 'Azure Account' extension recently? To troubleshoot, visit https://aka.ms/azsdk/js/identity/vscodecredential/troubleshoot.");
|
|
16574
|
-
logger$
|
|
16596
|
+
logger$p.getToken.info(formatError(scopes, error));
|
|
16575
16597
|
throw error;
|
|
16576
16598
|
}
|
|
16577
16599
|
} else {
|
|
16578
16600
|
const error = new CredentialUnavailableError("Could not retrieve the token associated with Visual Studio Code. Did you connect using the 'Azure Account' extension? To troubleshoot, visit https://aka.ms/azsdk/js/identity/vscodecredential/troubleshoot.");
|
|
16579
|
-
logger$
|
|
16601
|
+
logger$p.getToken.info(formatError(scopes, error));
|
|
16580
16602
|
throw error;
|
|
16581
16603
|
}
|
|
16582
16604
|
}
|
|
@@ -16593,7 +16615,7 @@ ${errorDetail}`);
|
|
|
16593
16615
|
}
|
|
16594
16616
|
__name(useIdentityPlugin2, "useIdentityPlugin");
|
|
16595
16617
|
var msiName$6 = "ManagedIdentityCredential - AppServiceMSI 2017";
|
|
16596
|
-
var logger$
|
|
16618
|
+
var logger$o = credentialLogger(msiName$6);
|
|
16597
16619
|
function prepareRequestOptions$5(scopes, clientId) {
|
|
16598
16620
|
const resource = mapScopesToResource(scopes);
|
|
16599
16621
|
if (!resource) {
|
|
@@ -16628,22 +16650,22 @@ ${errorDetail}`);
|
|
|
16628
16650
|
async isAvailable({ scopes }) {
|
|
16629
16651
|
const resource = mapScopesToResource(scopes);
|
|
16630
16652
|
if (!resource) {
|
|
16631
|
-
logger$
|
|
16653
|
+
logger$o.info(`${msiName$6}: Unavailable. Multiple scopes are not supported.`);
|
|
16632
16654
|
return false;
|
|
16633
16655
|
}
|
|
16634
16656
|
const env = process.env;
|
|
16635
16657
|
const result = Boolean(env.MSI_ENDPOINT && env.MSI_SECRET);
|
|
16636
16658
|
if (!result) {
|
|
16637
|
-
logger$
|
|
16659
|
+
logger$o.info(`${msiName$6}: Unavailable. The environment variables needed are: MSI_ENDPOINT and MSI_SECRET.`);
|
|
16638
16660
|
}
|
|
16639
16661
|
return result;
|
|
16640
16662
|
},
|
|
16641
16663
|
async getToken(configuration, getTokenOptions = {}) {
|
|
16642
16664
|
const { identityClient, scopes, clientId, resourceId } = configuration;
|
|
16643
16665
|
if (resourceId) {
|
|
16644
|
-
logger$
|
|
16666
|
+
logger$o.warning(`${msiName$6}: managed Identity by resource Id is not supported. Argument resourceId might be ignored by the service.`);
|
|
16645
16667
|
}
|
|
16646
|
-
logger$
|
|
16668
|
+
logger$o.info(`${msiName$6}: Using the endpoint and the secret coming form the environment variables: MSI_ENDPOINT=${process.env.MSI_ENDPOINT} and MSI_SECRET=[REDACTED].`);
|
|
16647
16669
|
const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({ abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$5(scopes, clientId)), {
|
|
16648
16670
|
// Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
|
|
16649
16671
|
allowInsecureConnection: true
|
|
@@ -16653,7 +16675,7 @@ ${errorDetail}`);
|
|
|
16653
16675
|
}
|
|
16654
16676
|
};
|
|
16655
16677
|
var msiName$5 = "ManagedIdentityCredential - AppServiceMSI 2019";
|
|
16656
|
-
var logger$
|
|
16678
|
+
var logger$n = credentialLogger(msiName$5);
|
|
16657
16679
|
function prepareRequestOptions$4(scopes, clientId, resourceId) {
|
|
16658
16680
|
const resource = mapScopesToResource(scopes);
|
|
16659
16681
|
if (!resource) {
|
|
@@ -16691,19 +16713,19 @@ ${errorDetail}`);
|
|
|
16691
16713
|
async isAvailable({ scopes }) {
|
|
16692
16714
|
const resource = mapScopesToResource(scopes);
|
|
16693
16715
|
if (!resource) {
|
|
16694
|
-
logger$
|
|
16716
|
+
logger$n.info(`${msiName$5}: Unavailable. Multiple scopes are not supported.`);
|
|
16695
16717
|
return false;
|
|
16696
16718
|
}
|
|
16697
16719
|
const env = process.env;
|
|
16698
16720
|
const result = Boolean(env.IDENTITY_ENDPOINT && env.IDENTITY_HEADER);
|
|
16699
16721
|
if (!result) {
|
|
16700
|
-
logger$
|
|
16722
|
+
logger$n.info(`${msiName$5}: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT and IDENTITY_HEADER.`);
|
|
16701
16723
|
}
|
|
16702
16724
|
return result;
|
|
16703
16725
|
},
|
|
16704
16726
|
async getToken(configuration, getTokenOptions = {}) {
|
|
16705
16727
|
const { identityClient, scopes, clientId, resourceId } = configuration;
|
|
16706
|
-
logger$
|
|
16728
|
+
logger$n.info(`${msiName$5}: Using the endpoint and the secret coming form the environment variables: IDENTITY_ENDPOINT=${process.env.IDENTITY_ENDPOINT} and IDENTITY_HEADER=[REDACTED].`);
|
|
16707
16729
|
const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({ abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$4(scopes, clientId, resourceId)), {
|
|
16708
16730
|
// Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
|
|
16709
16731
|
allowInsecureConnection: true
|
|
@@ -16713,7 +16735,7 @@ ${errorDetail}`);
|
|
|
16713
16735
|
}
|
|
16714
16736
|
};
|
|
16715
16737
|
var msiName$4 = "ManagedIdentityCredential - Azure Arc MSI";
|
|
16716
|
-
var logger$
|
|
16738
|
+
var logger$m = credentialLogger(msiName$4);
|
|
16717
16739
|
function prepareRequestOptions$3(scopes, clientId, resourceId) {
|
|
16718
16740
|
const resource = mapScopesToResource(scopes);
|
|
16719
16741
|
if (!resource) {
|
|
@@ -16797,12 +16819,12 @@ ${errorDetail}`);
|
|
|
16797
16819
|
async isAvailable({ scopes }) {
|
|
16798
16820
|
const resource = mapScopesToResource(scopes);
|
|
16799
16821
|
if (!resource) {
|
|
16800
|
-
logger$
|
|
16822
|
+
logger$m.info(`${msiName$4}: Unavailable. Multiple scopes are not supported.`);
|
|
16801
16823
|
return false;
|
|
16802
16824
|
}
|
|
16803
16825
|
const result = Boolean(process.env.IMDS_ENDPOINT && process.env.IDENTITY_ENDPOINT);
|
|
16804
16826
|
if (!result) {
|
|
16805
|
-
logger$
|
|
16827
|
+
logger$m.info(`${msiName$4}: The environment variables needed are: IMDS_ENDPOINT and IDENTITY_ENDPOINT`);
|
|
16806
16828
|
}
|
|
16807
16829
|
return result;
|
|
16808
16830
|
},
|
|
@@ -16810,12 +16832,12 @@ ${errorDetail}`);
|
|
|
16810
16832
|
var _a2;
|
|
16811
16833
|
const { identityClient, scopes, clientId, resourceId } = configuration;
|
|
16812
16834
|
if (clientId) {
|
|
16813
|
-
logger$
|
|
16835
|
+
logger$m.warning(`${msiName$4}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
|
|
16814
16836
|
}
|
|
16815
16837
|
if (resourceId) {
|
|
16816
|
-
logger$
|
|
16838
|
+
logger$m.warning(`${msiName$4}: user defined managed Identity by resource Id is not supported. Argument resourceId will be ignored.`);
|
|
16817
16839
|
}
|
|
16818
|
-
logger$
|
|
16840
|
+
logger$m.info(`${msiName$4}: Authenticating.`);
|
|
16819
16841
|
const requestOptions = Object.assign(Object.assign({ disableJsonStringifyOnBody: true, deserializationMapper: void 0, abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$3(scopes, clientId, resourceId)), { allowInsecureConnection: true });
|
|
16820
16842
|
const filePath = await filePathRequest(identityClient, requestOptions);
|
|
16821
16843
|
validateKeyFile(filePath);
|
|
@@ -16830,7 +16852,7 @@ ${errorDetail}`);
|
|
|
16830
16852
|
}
|
|
16831
16853
|
};
|
|
16832
16854
|
var msiName$3 = "ManagedIdentityCredential - CloudShellMSI";
|
|
16833
|
-
var logger$
|
|
16855
|
+
var logger$l = credentialLogger(msiName$3);
|
|
16834
16856
|
function prepareRequestOptions$2(scopes, clientId, resourceId) {
|
|
16835
16857
|
const resource = mapScopesToResource(scopes);
|
|
16836
16858
|
if (!resource) {
|
|
@@ -16866,24 +16888,24 @@ ${errorDetail}`);
|
|
|
16866
16888
|
async isAvailable({ scopes }) {
|
|
16867
16889
|
const resource = mapScopesToResource(scopes);
|
|
16868
16890
|
if (!resource) {
|
|
16869
|
-
logger$
|
|
16891
|
+
logger$l.info(`${msiName$3}: Unavailable. Multiple scopes are not supported.`);
|
|
16870
16892
|
return false;
|
|
16871
16893
|
}
|
|
16872
16894
|
const result = Boolean(process.env.MSI_ENDPOINT);
|
|
16873
16895
|
if (!result) {
|
|
16874
|
-
logger$
|
|
16896
|
+
logger$l.info(`${msiName$3}: Unavailable. The environment variable MSI_ENDPOINT is needed.`);
|
|
16875
16897
|
}
|
|
16876
16898
|
return result;
|
|
16877
16899
|
},
|
|
16878
16900
|
async getToken(configuration, getTokenOptions = {}) {
|
|
16879
16901
|
const { identityClient, scopes, clientId, resourceId } = configuration;
|
|
16880
16902
|
if (clientId) {
|
|
16881
|
-
logger$
|
|
16903
|
+
logger$l.warning(`${msiName$3}: user-assigned identities not supported. The argument clientId might be ignored by the service.`);
|
|
16882
16904
|
}
|
|
16883
16905
|
if (resourceId) {
|
|
16884
|
-
logger$
|
|
16906
|
+
logger$l.warning(`${msiName$3}: user defined managed Identity by resource Id not supported. The argument resourceId might be ignored by the service.`);
|
|
16885
16907
|
}
|
|
16886
|
-
logger$
|
|
16908
|
+
logger$l.info(`${msiName$3}: Using the endpoint coming form the environment variable MSI_ENDPOINT = ${process.env.MSI_ENDPOINT}.`);
|
|
16887
16909
|
const request = coreRestPipeline.createPipelineRequest(Object.assign(Object.assign({ abortSignal: getTokenOptions.abortSignal }, prepareRequestOptions$2(scopes, clientId, resourceId)), {
|
|
16888
16910
|
// Generally, MSI endpoints use the HTTP protocol, without transport layer security (TLS).
|
|
16889
16911
|
allowInsecureConnection: true
|
|
@@ -16893,7 +16915,7 @@ ${errorDetail}`);
|
|
|
16893
16915
|
}
|
|
16894
16916
|
};
|
|
16895
16917
|
var msiName$2 = "ManagedIdentityCredential - Fabric MSI";
|
|
16896
|
-
var logger$
|
|
16918
|
+
var logger$k = credentialLogger(msiName$2);
|
|
16897
16919
|
function prepareRequestOptions$1(scopes, clientId, resourceId) {
|
|
16898
16920
|
const resource = mapScopesToResource(scopes);
|
|
16899
16921
|
if (!resource) {
|
|
@@ -16931,22 +16953,22 @@ ${errorDetail}`);
|
|
|
16931
16953
|
async isAvailable({ scopes }) {
|
|
16932
16954
|
const resource = mapScopesToResource(scopes);
|
|
16933
16955
|
if (!resource) {
|
|
16934
|
-
logger$
|
|
16956
|
+
logger$k.info(`${msiName$2}: Unavailable. Multiple scopes are not supported.`);
|
|
16935
16957
|
return false;
|
|
16936
16958
|
}
|
|
16937
16959
|
const env = process.env;
|
|
16938
16960
|
const result = Boolean(env.IDENTITY_ENDPOINT && env.IDENTITY_HEADER && env.IDENTITY_SERVER_THUMBPRINT);
|
|
16939
16961
|
if (!result) {
|
|
16940
|
-
logger$
|
|
16962
|
+
logger$k.info(`${msiName$2}: Unavailable. The environment variables needed are: IDENTITY_ENDPOINT, IDENTITY_HEADER and IDENTITY_SERVER_THUMBPRINT`);
|
|
16941
16963
|
}
|
|
16942
16964
|
return result;
|
|
16943
16965
|
},
|
|
16944
16966
|
async getToken(configuration, getTokenOptions = {}) {
|
|
16945
16967
|
const { scopes, identityClient, clientId, resourceId } = configuration;
|
|
16946
16968
|
if (resourceId) {
|
|
16947
|
-
logger$
|
|
16969
|
+
logger$k.warning(`${msiName$2}: user defined managed Identity by resource Id is not supported. Argument resourceId might be ignored by the service.`);
|
|
16948
16970
|
}
|
|
16949
|
-
logger$
|
|
16971
|
+
logger$k.info([
|
|
16950
16972
|
`${msiName$2}:`,
|
|
16951
16973
|
"Using the endpoint and the secret coming from the environment variables:",
|
|
16952
16974
|
`IDENTITY_ENDPOINT=${process.env.IDENTITY_ENDPOINT},`,
|
|
@@ -16963,11 +16985,11 @@ ${errorDetail}`);
|
|
|
16963
16985
|
return tokenResponse && tokenResponse.accessToken || null;
|
|
16964
16986
|
}
|
|
16965
16987
|
};
|
|
16966
|
-
var logger$
|
|
16988
|
+
var logger$j = credentialLogger("IdentityUtils");
|
|
16967
16989
|
var LatestAuthenticationRecordVersion = "1.0";
|
|
16968
16990
|
function ensureValidMsalToken(scopes, msalToken, getTokenOptions) {
|
|
16969
16991
|
const error = /* @__PURE__ */ __name((message) => {
|
|
16970
|
-
logger$
|
|
16992
|
+
logger$j.getToken.info(message);
|
|
16971
16993
|
return new AuthenticationRequiredError({
|
|
16972
16994
|
scopes: Array.isArray(scopes) ? scopes : [scopes],
|
|
16973
16995
|
getTokenOptions,
|
|
@@ -17049,17 +17071,17 @@ ${errorDetail}`);
|
|
|
17049
17071
|
const msalError = error;
|
|
17050
17072
|
switch (msalError.errorCode) {
|
|
17051
17073
|
case "endpoints_resolution_error":
|
|
17052
|
-
logger$
|
|
17074
|
+
logger$j.info(formatError(scopes, error.message));
|
|
17053
17075
|
return new CredentialUnavailableError(error.message);
|
|
17054
17076
|
case "device_code_polling_cancelled":
|
|
17055
17077
|
return new abortController.AbortError("The authentication has been aborted by the caller.");
|
|
17056
17078
|
case "consent_required":
|
|
17057
17079
|
case "interaction_required":
|
|
17058
17080
|
case "login_required":
|
|
17059
|
-
logger$
|
|
17081
|
+
logger$j.info(formatError(scopes, `Authentication returned errorCode ${msalError.errorCode}`));
|
|
17060
17082
|
break;
|
|
17061
17083
|
default:
|
|
17062
|
-
logger$
|
|
17084
|
+
logger$j.info(formatError(scopes, `Failed to acquire token: ${error.message}`));
|
|
17063
17085
|
break;
|
|
17064
17086
|
}
|
|
17065
17087
|
}
|
|
@@ -17067,7 +17089,7 @@ ${errorDetail}`);
|
|
|
17067
17089
|
return error;
|
|
17068
17090
|
}
|
|
17069
17091
|
if (error.name === "NativeAuthError") {
|
|
17070
|
-
logger$
|
|
17092
|
+
logger$j.info(formatError(scopes, `Error from the native broker: ${error.message} with status code: ${error.statusCode}`));
|
|
17071
17093
|
return error;
|
|
17072
17094
|
}
|
|
17073
17095
|
return new AuthenticationRequiredError({ scopes, getTokenOptions, message: error.message });
|
|
@@ -17103,7 +17125,7 @@ ${errorDetail}`);
|
|
|
17103
17125
|
}
|
|
17104
17126
|
__name(deserializeAuthenticationRecord2, "deserializeAuthenticationRecord");
|
|
17105
17127
|
var msiName$1 = "ManagedIdentityCredential - IMDS";
|
|
17106
|
-
var logger$
|
|
17128
|
+
var logger$i = credentialLogger(msiName$1);
|
|
17107
17129
|
function prepareRequestOptions(scopes, clientId, resourceId, options) {
|
|
17108
17130
|
var _a2;
|
|
17109
17131
|
const resource = mapScopesToResource(scopes);
|
|
@@ -17147,7 +17169,7 @@ ${errorDetail}`);
|
|
|
17147
17169
|
async isAvailable({ scopes, identityClient, clientId, resourceId, getTokenOptions = {} }) {
|
|
17148
17170
|
const resource = mapScopesToResource(scopes);
|
|
17149
17171
|
if (!resource) {
|
|
17150
|
-
logger$
|
|
17172
|
+
logger$i.info(`${msiName$1}: Unavailable. Multiple scopes are not supported.`);
|
|
17151
17173
|
return false;
|
|
17152
17174
|
}
|
|
17153
17175
|
if (process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) {
|
|
@@ -17168,32 +17190,32 @@ ${errorDetail}`);
|
|
|
17168
17190
|
request.allowInsecureConnection = true;
|
|
17169
17191
|
let response;
|
|
17170
17192
|
try {
|
|
17171
|
-
logger$
|
|
17193
|
+
logger$i.info(`${msiName$1}: Pinging the Azure IMDS endpoint`);
|
|
17172
17194
|
response = await identityClient.sendRequest(request);
|
|
17173
17195
|
} catch (err) {
|
|
17174
17196
|
if (coreUtil.isError(err)) {
|
|
17175
|
-
logger$
|
|
17197
|
+
logger$i.verbose(`${msiName$1}: Caught error ${err.name}: ${err.message}`);
|
|
17176
17198
|
}
|
|
17177
|
-
logger$
|
|
17199
|
+
logger$i.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
|
|
17178
17200
|
return false;
|
|
17179
17201
|
}
|
|
17180
17202
|
if (response.status === 403) {
|
|
17181
17203
|
if ((_b2 = response.bodyAsText) === null || _b2 === void 0 ? void 0 : _b2.includes("unreachable")) {
|
|
17182
|
-
logger$
|
|
17183
|
-
logger$
|
|
17204
|
+
logger$i.info(`${msiName$1}: The Azure IMDS endpoint is unavailable`);
|
|
17205
|
+
logger$i.info(`${msiName$1}: ${response.bodyAsText}`);
|
|
17184
17206
|
return false;
|
|
17185
17207
|
}
|
|
17186
17208
|
}
|
|
17187
|
-
logger$
|
|
17209
|
+
logger$i.info(`${msiName$1}: The Azure IMDS endpoint is available`);
|
|
17188
17210
|
return true;
|
|
17189
17211
|
});
|
|
17190
17212
|
},
|
|
17191
17213
|
async getToken(configuration, getTokenOptions = {}) {
|
|
17192
17214
|
const { identityClient, scopes, clientId, resourceId } = configuration;
|
|
17193
17215
|
if (process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST) {
|
|
17194
|
-
logger$
|
|
17216
|
+
logger$i.info(`${msiName$1}: Using the Azure IMDS endpoint coming from the environment variable AZURE_POD_IDENTITY_AUTHORITY_HOST=${process.env.AZURE_POD_IDENTITY_AUTHORITY_HOST}.`);
|
|
17195
17217
|
} else {
|
|
17196
|
-
logger$
|
|
17218
|
+
logger$i.info(`${msiName$1}: Using the default Azure IMDS endpoint ${imdsHost}.`);
|
|
17197
17219
|
}
|
|
17198
17220
|
let nextDelayInMs = configuration.retryConfig.startDelayInMs;
|
|
17199
17221
|
for (let retries = 0; retries < configuration.retryConfig.maxRetries; retries++) {
|
|
@@ -17283,9 +17305,9 @@ ${errorDetail}`);
|
|
|
17283
17305
|
__name(calculateRegionalAuthority, "calculateRegionalAuthority");
|
|
17284
17306
|
var msalLogger = credentialLogger("MsalClient");
|
|
17285
17307
|
function generateMsalConfiguration(clientId, tenantId, msalClientOptions = {}) {
|
|
17286
|
-
var _a2, _b2, _c;
|
|
17287
|
-
const resolvedTenant = resolveTenantId(msalLogger, tenantId, clientId);
|
|
17288
|
-
const authority = getAuthority(resolvedTenant, (
|
|
17308
|
+
var _a2, _b2, _c, _d;
|
|
17309
|
+
const resolvedTenant = resolveTenantId((_a2 = msalClientOptions.logger) !== null && _a2 !== void 0 ? _a2 : msalLogger, tenantId, clientId);
|
|
17310
|
+
const authority = getAuthority(resolvedTenant, (_b2 = msalClientOptions.authorityHost) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_AUTHORITY_HOST);
|
|
17289
17311
|
const httpClient = new IdentityClient(Object.assign(Object.assign({}, msalClientOptions.tokenCredentialOptions), { authorityHost: authority, loggingOptions: msalClientOptions.loggingOptions }));
|
|
17290
17312
|
const msalConfig = {
|
|
17291
17313
|
auth: {
|
|
@@ -17296,9 +17318,9 @@ ${errorDetail}`);
|
|
|
17296
17318
|
system: {
|
|
17297
17319
|
networkClient: httpClient,
|
|
17298
17320
|
loggerOptions: {
|
|
17299
|
-
loggerCallback: defaultLoggerCallback((
|
|
17300
|
-
logLevel: getMSALLogLevel(logger$
|
|
17301
|
-
piiLoggingEnabled: (
|
|
17321
|
+
loggerCallback: defaultLoggerCallback((_c = msalClientOptions.logger) !== null && _c !== void 0 ? _c : msalLogger),
|
|
17322
|
+
logLevel: getMSALLogLevel(logger$r.getLogLevel()),
|
|
17323
|
+
piiLoggingEnabled: (_d = msalClientOptions.loggingOptions) === null || _d === void 0 ? void 0 : _d.enableUnsafeSupportLogging
|
|
17302
17324
|
}
|
|
17303
17325
|
}
|
|
17304
17326
|
};
|
|
@@ -17306,20 +17328,38 @@ ${errorDetail}`);
|
|
|
17306
17328
|
}
|
|
17307
17329
|
__name(generateMsalConfiguration, "generateMsalConfiguration");
|
|
17308
17330
|
function createMsalClient(clientId, tenantId, createMsalClientOptions = {}) {
|
|
17331
|
+
var _a2;
|
|
17309
17332
|
const state = {
|
|
17310
17333
|
msalConfig: generateMsalConfiguration(clientId, tenantId, createMsalClientOptions),
|
|
17311
17334
|
cachedAccount: createMsalClientOptions.authenticationRecord ? publicToMsal(createMsalClientOptions.authenticationRecord) : null,
|
|
17312
|
-
pluginConfiguration: msalPlugins.generatePluginConfiguration(createMsalClientOptions)
|
|
17335
|
+
pluginConfiguration: msalPlugins.generatePluginConfiguration(createMsalClientOptions),
|
|
17336
|
+
logger: (_a2 = createMsalClientOptions.logger) !== null && _a2 !== void 0 ? _a2 : msalLogger
|
|
17313
17337
|
};
|
|
17338
|
+
const publicApps = /* @__PURE__ */ new Map();
|
|
17339
|
+
async function getPublicApp(options = {}) {
|
|
17340
|
+
const appKey = options.enableCae ? "CAE" : "default";
|
|
17341
|
+
let publicClientApp = publicApps.get(appKey);
|
|
17342
|
+
if (publicClientApp) {
|
|
17343
|
+
state.logger.getToken.info("Existing PublicClientApplication found in cache, returning it.");
|
|
17344
|
+
return publicClientApp;
|
|
17345
|
+
}
|
|
17346
|
+
state.logger.getToken.info(`Creating new PublicClientApplication with CAE ${options.enableCae ? "enabled" : "disabled"}.`);
|
|
17347
|
+
const cachePlugin = options.enableCae ? state.pluginConfiguration.cache.cachePluginCae : state.pluginConfiguration.cache.cachePlugin;
|
|
17348
|
+
state.msalConfig.auth.clientCapabilities = options.enableCae ? ["cp1"] : void 0;
|
|
17349
|
+
publicClientApp = new msalCommon__namespace.PublicClientApplication(Object.assign(Object.assign({}, state.msalConfig), { broker: { nativeBrokerPlugin: state.pluginConfiguration.broker.nativeBrokerPlugin }, cache: { cachePlugin: await cachePlugin } }));
|
|
17350
|
+
publicApps.set(appKey, publicClientApp);
|
|
17351
|
+
return publicClientApp;
|
|
17352
|
+
}
|
|
17353
|
+
__name(getPublicApp, "getPublicApp");
|
|
17314
17354
|
const confidentialApps = /* @__PURE__ */ new Map();
|
|
17315
17355
|
async function getConfidentialApp(options = {}) {
|
|
17316
17356
|
const appKey = options.enableCae ? "CAE" : "default";
|
|
17317
17357
|
let confidentialClientApp = confidentialApps.get(appKey);
|
|
17318
17358
|
if (confidentialClientApp) {
|
|
17319
|
-
|
|
17359
|
+
state.logger.getToken.info("Existing ConfidentialClientApplication found in cache, returning it.");
|
|
17320
17360
|
return confidentialClientApp;
|
|
17321
17361
|
}
|
|
17322
|
-
|
|
17362
|
+
state.logger.getToken.info(`Creating new ConfidentialClientApplication with CAE ${options.enableCae ? "enabled" : "disabled"}.`);
|
|
17323
17363
|
const cachePlugin = options.enableCae ? state.pluginConfiguration.cache.cachePluginCae : state.pluginConfiguration.cache.cachePlugin;
|
|
17324
17364
|
state.msalConfig.auth.clientCapabilities = options.enableCae ? ["cp1"] : void 0;
|
|
17325
17365
|
confidentialClientApp = new msalCommon__namespace.ConfidentialClientApplication(Object.assign(Object.assign({}, state.msalConfig), { broker: { nativeBrokerPlugin: state.pluginConfiguration.broker.nativeBrokerPlugin }, cache: { cachePlugin: await cachePlugin } }));
|
|
@@ -17329,14 +17369,14 @@ ${errorDetail}`);
|
|
|
17329
17369
|
__name(getConfidentialApp, "getConfidentialApp");
|
|
17330
17370
|
async function getTokenSilent(app, scopes, options = {}) {
|
|
17331
17371
|
if (state.cachedAccount === null) {
|
|
17332
|
-
|
|
17372
|
+
state.logger.getToken.info("No cached account found in local state, attempting to load it from MSAL cache.");
|
|
17333
17373
|
const cache = app.getTokenCache();
|
|
17334
17374
|
const accounts = await cache.getAllAccounts();
|
|
17335
17375
|
if (accounts === void 0 || accounts.length === 0) {
|
|
17336
17376
|
throw new AuthenticationRequiredError({ scopes });
|
|
17337
17377
|
}
|
|
17338
17378
|
if (accounts.length > 1) {
|
|
17339
|
-
|
|
17379
|
+
state.logger.info(`More than one account was found authenticated for this Client ID and Tenant ID.
|
|
17340
17380
|
However, no "authenticationRecord" has been provided for this credential,
|
|
17341
17381
|
therefore we're unable to pick between these accounts.
|
|
17342
17382
|
A new login attempt will be requested, to ensure the correct account is picked.
|
|
@@ -17359,12 +17399,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17359
17399
|
silentRequest.tokenQueryParameters["msal_request_type"] = "consumer_passthrough";
|
|
17360
17400
|
}
|
|
17361
17401
|
}
|
|
17362
|
-
|
|
17402
|
+
state.logger.getToken.info("Attempting to acquire token silently");
|
|
17363
17403
|
return app.acquireTokenSilent(silentRequest);
|
|
17364
17404
|
}
|
|
17365
17405
|
__name(getTokenSilent, "getTokenSilent");
|
|
17366
17406
|
async function withSilentAuthentication(msalApp, scopes, options, onAuthenticationRequired) {
|
|
17367
|
-
var
|
|
17407
|
+
var _a3;
|
|
17368
17408
|
let response = null;
|
|
17369
17409
|
try {
|
|
17370
17410
|
response = await getTokenSilent(msalApp, scopes, options);
|
|
@@ -17372,7 +17412,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17372
17412
|
if (e.name !== "AuthenticationRequiredError") {
|
|
17373
17413
|
throw e;
|
|
17374
17414
|
}
|
|
17375
|
-
if (
|
|
17415
|
+
if (options.disableAutomaticAuthentication) {
|
|
17376
17416
|
throw new AuthenticationRequiredError({
|
|
17377
17417
|
scopes,
|
|
17378
17418
|
getTokenOptions: options,
|
|
@@ -17388,8 +17428,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17388
17428
|
}
|
|
17389
17429
|
}
|
|
17390
17430
|
ensureValidMsalToken(scopes, response, options);
|
|
17391
|
-
state.cachedAccount = (
|
|
17392
|
-
|
|
17431
|
+
state.cachedAccount = (_a3 = response === null || response === void 0 ? void 0 : response.account) !== null && _a3 !== void 0 ? _a3 : null;
|
|
17432
|
+
state.logger.getToken.info(formatSuccess(scopes));
|
|
17393
17433
|
return {
|
|
17394
17434
|
token: response.accessToken,
|
|
17395
17435
|
expiresOnTimestamp: response.expiresOn.getTime()
|
|
@@ -17397,50 +17437,148 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17397
17437
|
}
|
|
17398
17438
|
__name(withSilentAuthentication, "withSilentAuthentication");
|
|
17399
17439
|
async function getTokenByClientSecret(scopes, clientSecret, options = {}) {
|
|
17400
|
-
|
|
17440
|
+
state.logger.getToken.info(`Attempting to acquire token using client secret`);
|
|
17401
17441
|
state.msalConfig.auth.clientSecret = clientSecret;
|
|
17402
17442
|
const msalApp = await getConfidentialApp(options);
|
|
17403
|
-
|
|
17404
|
-
|
|
17405
|
-
|
|
17406
|
-
|
|
17407
|
-
|
|
17408
|
-
|
|
17443
|
+
try {
|
|
17444
|
+
const response = await msalApp.acquireTokenByClientCredential({
|
|
17445
|
+
scopes,
|
|
17446
|
+
authority: state.msalConfig.auth.authority,
|
|
17447
|
+
azureRegion: calculateRegionalAuthority(),
|
|
17448
|
+
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
17449
|
+
});
|
|
17450
|
+
ensureValidMsalToken(scopes, response, options);
|
|
17451
|
+
state.logger.getToken.info(formatSuccess(scopes));
|
|
17452
|
+
return {
|
|
17453
|
+
token: response.accessToken,
|
|
17454
|
+
expiresOnTimestamp: response.expiresOn.getTime()
|
|
17455
|
+
};
|
|
17456
|
+
} catch (err) {
|
|
17457
|
+
throw handleMsalError(scopes, err, options);
|
|
17458
|
+
}
|
|
17409
17459
|
}
|
|
17410
17460
|
__name(getTokenByClientSecret, "getTokenByClientSecret");
|
|
17411
17461
|
async function getTokenByClientAssertion(scopes, clientAssertion, options = {}) {
|
|
17412
|
-
|
|
17462
|
+
state.logger.getToken.info(`Attempting to acquire token using client assertion`);
|
|
17413
17463
|
state.msalConfig.auth.clientAssertion = clientAssertion;
|
|
17414
17464
|
const msalApp = await getConfidentialApp(options);
|
|
17415
|
-
|
|
17416
|
-
|
|
17417
|
-
|
|
17418
|
-
|
|
17419
|
-
|
|
17420
|
-
|
|
17421
|
-
|
|
17465
|
+
try {
|
|
17466
|
+
const response = await msalApp.acquireTokenByClientCredential({
|
|
17467
|
+
scopes,
|
|
17468
|
+
authority: state.msalConfig.auth.authority,
|
|
17469
|
+
azureRegion: calculateRegionalAuthority(),
|
|
17470
|
+
claims: options === null || options === void 0 ? void 0 : options.claims,
|
|
17471
|
+
clientAssertion
|
|
17472
|
+
});
|
|
17473
|
+
ensureValidMsalToken(scopes, response, options);
|
|
17474
|
+
state.logger.getToken.info(formatSuccess(scopes));
|
|
17475
|
+
return {
|
|
17476
|
+
token: response.accessToken,
|
|
17477
|
+
expiresOnTimestamp: response.expiresOn.getTime()
|
|
17478
|
+
};
|
|
17479
|
+
} catch (err) {
|
|
17480
|
+
throw handleMsalError(scopes, err, options);
|
|
17481
|
+
}
|
|
17422
17482
|
}
|
|
17423
17483
|
__name(getTokenByClientAssertion, "getTokenByClientAssertion");
|
|
17424
17484
|
async function getTokenByClientCertificate(scopes, certificate, options = {}) {
|
|
17425
|
-
|
|
17485
|
+
state.logger.getToken.info(`Attempting to acquire token using client certificate`);
|
|
17426
17486
|
state.msalConfig.auth.clientCertificate = certificate;
|
|
17427
17487
|
const msalApp = await getConfidentialApp(options);
|
|
17428
|
-
|
|
17429
|
-
|
|
17430
|
-
|
|
17431
|
-
|
|
17432
|
-
|
|
17433
|
-
|
|
17488
|
+
try {
|
|
17489
|
+
const response = await msalApp.acquireTokenByClientCredential({
|
|
17490
|
+
scopes,
|
|
17491
|
+
authority: state.msalConfig.auth.authority,
|
|
17492
|
+
azureRegion: calculateRegionalAuthority(),
|
|
17493
|
+
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
17494
|
+
});
|
|
17495
|
+
ensureValidMsalToken(scopes, response, options);
|
|
17496
|
+
state.logger.getToken.info(formatSuccess(scopes));
|
|
17497
|
+
return {
|
|
17498
|
+
token: response.accessToken,
|
|
17499
|
+
expiresOnTimestamp: response.expiresOn.getTime()
|
|
17500
|
+
};
|
|
17501
|
+
} catch (err) {
|
|
17502
|
+
throw handleMsalError(scopes, err, options);
|
|
17503
|
+
}
|
|
17434
17504
|
}
|
|
17435
17505
|
__name(getTokenByClientCertificate, "getTokenByClientCertificate");
|
|
17506
|
+
async function getTokenByDeviceCode(scopes, deviceCodeCallback, options = {}) {
|
|
17507
|
+
state.logger.getToken.info(`Attempting to acquire token using device code`);
|
|
17508
|
+
const msalApp = await getPublicApp(options);
|
|
17509
|
+
return withSilentAuthentication(msalApp, scopes, options, () => {
|
|
17510
|
+
var _a3, _b2;
|
|
17511
|
+
const requestOptions = {
|
|
17512
|
+
scopes,
|
|
17513
|
+
cancel: (_b2 = (_a3 = options === null || options === void 0 ? void 0 : options.abortSignal) === null || _a3 === void 0 ? void 0 : _a3.aborted) !== null && _b2 !== void 0 ? _b2 : false,
|
|
17514
|
+
deviceCodeCallback,
|
|
17515
|
+
authority: state.msalConfig.auth.authority,
|
|
17516
|
+
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
17517
|
+
};
|
|
17518
|
+
const deviceCodeRequest = msalApp.acquireTokenByDeviceCode(requestOptions);
|
|
17519
|
+
if (options.abortSignal) {
|
|
17520
|
+
options.abortSignal.addEventListener("abort", () => {
|
|
17521
|
+
requestOptions.cancel = true;
|
|
17522
|
+
});
|
|
17523
|
+
}
|
|
17524
|
+
return deviceCodeRequest;
|
|
17525
|
+
});
|
|
17526
|
+
}
|
|
17527
|
+
__name(getTokenByDeviceCode, "getTokenByDeviceCode");
|
|
17528
|
+
async function getTokenByUsernamePassword(scopes, username, password, options = {}) {
|
|
17529
|
+
state.logger.getToken.info(`Attempting to acquire token using username and password`);
|
|
17530
|
+
const msalApp = await getPublicApp(options);
|
|
17531
|
+
return withSilentAuthentication(msalApp, scopes, options, () => {
|
|
17532
|
+
const requestOptions = {
|
|
17533
|
+
scopes,
|
|
17534
|
+
username,
|
|
17535
|
+
password,
|
|
17536
|
+
authority: state.msalConfig.auth.authority,
|
|
17537
|
+
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
17538
|
+
};
|
|
17539
|
+
return msalApp.acquireTokenByUsernamePassword(requestOptions);
|
|
17540
|
+
});
|
|
17541
|
+
}
|
|
17542
|
+
__name(getTokenByUsernamePassword, "getTokenByUsernamePassword");
|
|
17543
|
+
function getActiveAccount() {
|
|
17544
|
+
if (!state.cachedAccount) {
|
|
17545
|
+
return void 0;
|
|
17546
|
+
}
|
|
17547
|
+
return msalToPublic(clientId, state.cachedAccount);
|
|
17548
|
+
}
|
|
17549
|
+
__name(getActiveAccount, "getActiveAccount");
|
|
17550
|
+
async function getTokenByAuthorizationCode(scopes, redirectUri, authorizationCode, clientSecret, options = {}) {
|
|
17551
|
+
state.logger.getToken.info(`Attempting to acquire token using authorization code`);
|
|
17552
|
+
let msalApp;
|
|
17553
|
+
if (clientSecret) {
|
|
17554
|
+
state.msalConfig.auth.clientSecret = clientSecret;
|
|
17555
|
+
msalApp = await getConfidentialApp(options);
|
|
17556
|
+
} else {
|
|
17557
|
+
msalApp = await getPublicApp(options);
|
|
17558
|
+
}
|
|
17559
|
+
return withSilentAuthentication(msalApp, scopes, options, () => {
|
|
17560
|
+
return msalApp.acquireTokenByCode({
|
|
17561
|
+
scopes,
|
|
17562
|
+
redirectUri,
|
|
17563
|
+
code: authorizationCode,
|
|
17564
|
+
authority: state.msalConfig.auth.authority,
|
|
17565
|
+
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
17566
|
+
});
|
|
17567
|
+
});
|
|
17568
|
+
}
|
|
17569
|
+
__name(getTokenByAuthorizationCode, "getTokenByAuthorizationCode");
|
|
17436
17570
|
return {
|
|
17571
|
+
getActiveAccount,
|
|
17437
17572
|
getTokenByClientSecret,
|
|
17438
17573
|
getTokenByClientAssertion,
|
|
17439
|
-
getTokenByClientCertificate
|
|
17574
|
+
getTokenByClientCertificate,
|
|
17575
|
+
getTokenByDeviceCode,
|
|
17576
|
+
getTokenByUsernamePassword,
|
|
17577
|
+
getTokenByAuthorizationCode
|
|
17440
17578
|
};
|
|
17441
17579
|
}
|
|
17442
17580
|
__name(createMsalClient, "createMsalClient");
|
|
17443
|
-
var logger$
|
|
17581
|
+
var logger$h = credentialLogger("ClientAssertionCredential");
|
|
17444
17582
|
var _ClientAssertionCredential = class _ClientAssertionCredential {
|
|
17445
17583
|
/**
|
|
17446
17584
|
* Creates an instance of the ClientAssertionCredential with the details
|
|
@@ -17460,7 +17598,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17460
17598
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
17461
17599
|
this.options = options;
|
|
17462
17600
|
this.getAssertion = getAssertion;
|
|
17463
|
-
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$
|
|
17601
|
+
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$h, tokenCredentialOptions: this.options }));
|
|
17464
17602
|
}
|
|
17465
17603
|
/**
|
|
17466
17604
|
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
@@ -17472,7 +17610,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17472
17610
|
*/
|
|
17473
17611
|
async getToken(scopes, options = {}) {
|
|
17474
17612
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
|
|
17475
|
-
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$
|
|
17613
|
+
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$h);
|
|
17476
17614
|
const clientAssertion = await this.getAssertion();
|
|
17477
17615
|
const arrayScopes = Array.isArray(scopes) ? scopes : [scopes];
|
|
17478
17616
|
return this.msalClient.getTokenByClientAssertion(arrayScopes, clientAssertion, newOptions);
|
|
@@ -17481,13 +17619,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17481
17619
|
};
|
|
17482
17620
|
__name(_ClientAssertionCredential, "ClientAssertionCredential");
|
|
17483
17621
|
var ClientAssertionCredential = _ClientAssertionCredential;
|
|
17484
|
-
var credentialName$
|
|
17622
|
+
var credentialName$4 = "WorkloadIdentityCredential";
|
|
17485
17623
|
var SupportedWorkloadEnvironmentVariables = [
|
|
17486
17624
|
"AZURE_TENANT_ID",
|
|
17487
17625
|
"AZURE_CLIENT_ID",
|
|
17488
17626
|
"AZURE_FEDERATED_TOKEN_FILE"
|
|
17489
17627
|
];
|
|
17490
|
-
var logger$
|
|
17628
|
+
var logger$g = credentialLogger(credentialName$4);
|
|
17491
17629
|
var _WorkloadIdentityCredential = class _WorkloadIdentityCredential {
|
|
17492
17630
|
/**
|
|
17493
17631
|
* WorkloadIdentityCredential supports Microsoft Entra Workload ID on Kubernetes.
|
|
@@ -17498,16 +17636,16 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17498
17636
|
this.azureFederatedTokenFileContent = void 0;
|
|
17499
17637
|
this.cacheDate = void 0;
|
|
17500
17638
|
const assignedEnv = processEnvVars(SupportedWorkloadEnvironmentVariables).assigned.join(", ");
|
|
17501
|
-
logger$
|
|
17639
|
+
logger$g.info(`Found the following environment variables: ${assignedEnv}`);
|
|
17502
17640
|
const workloadIdentityCredentialOptions = options !== null && options !== void 0 ? options : {};
|
|
17503
17641
|
const tenantId = workloadIdentityCredentialOptions.tenantId || process.env.AZURE_TENANT_ID;
|
|
17504
17642
|
const clientId = workloadIdentityCredentialOptions.clientId || process.env.AZURE_CLIENT_ID;
|
|
17505
17643
|
this.federatedTokenFilePath = workloadIdentityCredentialOptions.tokenFilePath || process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
17506
17644
|
if (tenantId) {
|
|
17507
|
-
checkTenantId(logger$
|
|
17645
|
+
checkTenantId(logger$g, tenantId);
|
|
17508
17646
|
}
|
|
17509
17647
|
if (clientId && tenantId && this.federatedTokenFilePath) {
|
|
17510
|
-
logger$
|
|
17648
|
+
logger$g.info(`Invoking ClientAssertionCredential with tenant ID: ${tenantId}, clientId: ${workloadIdentityCredentialOptions.clientId} and federated token path: [REDACTED]`);
|
|
17511
17649
|
this.client = new ClientAssertionCredential(tenantId, clientId, this.readFileContents.bind(this), options);
|
|
17512
17650
|
}
|
|
17513
17651
|
}
|
|
@@ -17521,15 +17659,15 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17521
17659
|
*/
|
|
17522
17660
|
async getToken(scopes, options) {
|
|
17523
17661
|
if (!this.client) {
|
|
17524
|
-
const errorMessage = `${credentialName$
|
|
17662
|
+
const errorMessage = `${credentialName$4}: is unavailable. tenantId, clientId, and federatedTokenFilePath are required parameters.
|
|
17525
17663
|
In DefaultAzureCredential and ManagedIdentityCredential, these can be provided as environment variables -
|
|
17526
17664
|
"AZURE_TENANT_ID",
|
|
17527
17665
|
"AZURE_CLIENT_ID",
|
|
17528
17666
|
"AZURE_FEDERATED_TOKEN_FILE". See the troubleshooting guide for more information: https://aka.ms/azsdk/js/identity/workloadidentitycredential/troubleshoot `;
|
|
17529
|
-
logger$
|
|
17667
|
+
logger$g.info(errorMessage);
|
|
17530
17668
|
throw new CredentialUnavailableError(errorMessage);
|
|
17531
17669
|
}
|
|
17532
|
-
logger$
|
|
17670
|
+
logger$g.info("Invoking getToken() of Client Assertion Credential");
|
|
17533
17671
|
return this.client.getToken(scopes, options);
|
|
17534
17672
|
}
|
|
17535
17673
|
async readFileContents() {
|
|
@@ -17537,13 +17675,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17537
17675
|
this.azureFederatedTokenFileContent = void 0;
|
|
17538
17676
|
}
|
|
17539
17677
|
if (!this.federatedTokenFilePath) {
|
|
17540
|
-
throw new CredentialUnavailableError(`${credentialName$
|
|
17678
|
+
throw new CredentialUnavailableError(`${credentialName$4}: is unavailable. Invalid file path provided ${this.federatedTokenFilePath}.`);
|
|
17541
17679
|
}
|
|
17542
17680
|
if (!this.azureFederatedTokenFileContent) {
|
|
17543
17681
|
const file = await promises.readFile(this.federatedTokenFilePath, "utf8");
|
|
17544
17682
|
const value = file.trim();
|
|
17545
17683
|
if (!value) {
|
|
17546
|
-
throw new CredentialUnavailableError(`${credentialName$
|
|
17684
|
+
throw new CredentialUnavailableError(`${credentialName$4}: is unavailable. No content on the file ${this.federatedTokenFilePath}.`);
|
|
17547
17685
|
} else {
|
|
17548
17686
|
this.azureFederatedTokenFileContent = value;
|
|
17549
17687
|
this.cacheDate = Date.now();
|
|
@@ -17555,7 +17693,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17555
17693
|
__name(_WorkloadIdentityCredential, "WorkloadIdentityCredential");
|
|
17556
17694
|
var WorkloadIdentityCredential = _WorkloadIdentityCredential;
|
|
17557
17695
|
var msiName = "ManagedIdentityCredential - Token Exchange";
|
|
17558
|
-
var logger$
|
|
17696
|
+
var logger$f = credentialLogger(msiName);
|
|
17559
17697
|
function tokenExchangeMsi() {
|
|
17560
17698
|
return {
|
|
17561
17699
|
name: "tokenExchangeMsi",
|
|
@@ -17563,7 +17701,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17563
17701
|
const env = process.env;
|
|
17564
17702
|
const result = Boolean((clientId || env.AZURE_CLIENT_ID) && env.AZURE_TENANT_ID && process.env.AZURE_FEDERATED_TOKEN_FILE);
|
|
17565
17703
|
if (!result) {
|
|
17566
|
-
logger$
|
|
17704
|
+
logger$f.info(`${msiName}: Unavailable. The environment variables needed are: AZURE_CLIENT_ID (or the client ID sent through the parameters), AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE`);
|
|
17567
17705
|
}
|
|
17568
17706
|
return result;
|
|
17569
17707
|
},
|
|
@@ -17577,7 +17715,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17577
17715
|
};
|
|
17578
17716
|
}
|
|
17579
17717
|
__name(tokenExchangeMsi, "tokenExchangeMsi");
|
|
17580
|
-
var logger$
|
|
17718
|
+
var logger$e = credentialLogger("ManagedIdentityCredential");
|
|
17581
17719
|
var _ManagedIdentityCredential = class _ManagedIdentityCredential {
|
|
17582
17720
|
/**
|
|
17583
17721
|
* @internal
|
|
@@ -17622,7 +17760,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17622
17760
|
},
|
|
17623
17761
|
system: {
|
|
17624
17762
|
loggerOptions: {
|
|
17625
|
-
logLevel: getMSALLogLevel(logger$
|
|
17763
|
+
logLevel: getMSALLogLevel(logger$r.getLogLevel())
|
|
17626
17764
|
}
|
|
17627
17765
|
}
|
|
17628
17766
|
});
|
|
@@ -17706,16 +17844,16 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17706
17844
|
if (result === null) {
|
|
17707
17845
|
this.isEndpointUnavailable = true;
|
|
17708
17846
|
const error = new CredentialUnavailableError("The managed identity endpoint was reached, yet no tokens were received.");
|
|
17709
|
-
logger$
|
|
17847
|
+
logger$e.getToken.info(formatError(scopes, error));
|
|
17710
17848
|
throw error;
|
|
17711
17849
|
}
|
|
17712
17850
|
this.isEndpointUnavailable = false;
|
|
17713
17851
|
} else {
|
|
17714
17852
|
const error = new CredentialUnavailableError("The managed identity endpoint is not currently available");
|
|
17715
|
-
logger$
|
|
17853
|
+
logger$e.getToken.info(formatError(scopes, error));
|
|
17716
17854
|
throw error;
|
|
17717
17855
|
}
|
|
17718
|
-
logger$
|
|
17856
|
+
logger$e.getToken.info(formatSuccess(scopes));
|
|
17719
17857
|
return result;
|
|
17720
17858
|
} catch (err) {
|
|
17721
17859
|
if (err.name === "AuthenticationRequiredError") {
|
|
@@ -17727,12 +17865,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17727
17865
|
});
|
|
17728
17866
|
if (err.code === "ENETUNREACH") {
|
|
17729
17867
|
const error = new CredentialUnavailableError(`${_ManagedIdentityCredential.name}: Unavailable. Network unreachable. Message: ${err.message}`);
|
|
17730
|
-
logger$
|
|
17868
|
+
logger$e.getToken.info(formatError(scopes, error));
|
|
17731
17869
|
throw error;
|
|
17732
17870
|
}
|
|
17733
17871
|
if (err.code === "EHOSTUNREACH") {
|
|
17734
17872
|
const error = new CredentialUnavailableError(`${_ManagedIdentityCredential.name}: Unavailable. No managed identity endpoint found. Message: ${err.message}`);
|
|
17735
|
-
logger$
|
|
17873
|
+
logger$e.getToken.info(formatError(scopes, error));
|
|
17736
17874
|
throw error;
|
|
17737
17875
|
}
|
|
17738
17876
|
if (err.statusCode === 400) {
|
|
@@ -17741,7 +17879,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17741
17879
|
if (err.statusCode === 403 || err.code === 403) {
|
|
17742
17880
|
if (err.message.includes("unreachable")) {
|
|
17743
17881
|
const error = new CredentialUnavailableError(`${_ManagedIdentityCredential.name}: Unavailable. Network unreachable. Message: ${err.message}`);
|
|
17744
|
-
logger$
|
|
17882
|
+
logger$e.getToken.info(formatError(scopes, error));
|
|
17745
17883
|
throw error;
|
|
17746
17884
|
}
|
|
17747
17885
|
}
|
|
@@ -17763,7 +17901,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17763
17901
|
*/
|
|
17764
17902
|
handleResult(scopes, result, getTokenOptions) {
|
|
17765
17903
|
this.ensureValidMsalToken(scopes, result, getTokenOptions);
|
|
17766
|
-
logger$
|
|
17904
|
+
logger$e.getToken.info(formatSuccess(scopes));
|
|
17767
17905
|
return {
|
|
17768
17906
|
token: result.accessToken,
|
|
17769
17907
|
expiresOnTimestamp: result.expiresOn.getTime()
|
|
@@ -17774,7 +17912,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17774
17912
|
*/
|
|
17775
17913
|
ensureValidMsalToken(scopes, msalToken, getTokenOptions) {
|
|
17776
17914
|
const error = /* @__PURE__ */ __name((message) => {
|
|
17777
|
-
logger$
|
|
17915
|
+
logger$e.getToken.info(message);
|
|
17778
17916
|
return new AuthenticationRequiredError({
|
|
17779
17917
|
scopes: Array.isArray(scopes) ? scopes : [scopes],
|
|
17780
17918
|
getTokenOptions,
|
|
@@ -17794,19 +17932,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17794
17932
|
initializeSetAppTokenProvider() {
|
|
17795
17933
|
if (!this.isAppTokenProviderInitialized) {
|
|
17796
17934
|
this.confidentialApp.SetAppTokenProvider(async (appTokenProviderParameters) => {
|
|
17797
|
-
logger$
|
|
17935
|
+
logger$e.info(`SetAppTokenProvider invoked with parameters- ${JSON.stringify(appTokenProviderParameters)}`);
|
|
17798
17936
|
const getTokenOptions = Object.assign({}, appTokenProviderParameters);
|
|
17799
|
-
logger$
|
|
17937
|
+
logger$e.info(`authenticateManagedIdentity invoked with scopes- ${JSON.stringify(appTokenProviderParameters.scopes)} and getTokenOptions - ${JSON.stringify(getTokenOptions)}`);
|
|
17800
17938
|
const resultToken = await this.authenticateManagedIdentity(appTokenProviderParameters.scopes, getTokenOptions);
|
|
17801
17939
|
if (resultToken) {
|
|
17802
|
-
logger$
|
|
17940
|
+
logger$e.info(`SetAppTokenProvider will save the token in cache`);
|
|
17803
17941
|
const expiresInSeconds = (resultToken === null || resultToken === void 0 ? void 0 : resultToken.expiresOnTimestamp) ? Math.floor((resultToken.expiresOnTimestamp - Date.now()) / 1e3) : 0;
|
|
17804
17942
|
return {
|
|
17805
17943
|
accessToken: resultToken === null || resultToken === void 0 ? void 0 : resultToken.token,
|
|
17806
17944
|
expiresInSeconds
|
|
17807
17945
|
};
|
|
17808
17946
|
} else {
|
|
17809
|
-
logger$
|
|
17947
|
+
logger$e.info(`SetAppTokenProvider token has "no_access_token_returned" as the saved token`);
|
|
17810
17948
|
return {
|
|
17811
17949
|
accessToken: "no_access_token_returned",
|
|
17812
17950
|
expiresInSeconds: 0
|
|
@@ -17878,7 +18016,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17878
18016
|
});
|
|
17879
18017
|
}
|
|
17880
18018
|
};
|
|
17881
|
-
var logger$
|
|
18019
|
+
var logger$d = credentialLogger("AzureCliCredential");
|
|
17882
18020
|
var _AzureCliCredential = class _AzureCliCredential {
|
|
17883
18021
|
/**
|
|
17884
18022
|
* Creates an instance of the {@link AzureCliCredential}.
|
|
@@ -17890,7 +18028,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17890
18028
|
*/
|
|
17891
18029
|
constructor(options) {
|
|
17892
18030
|
if (options === null || options === void 0 ? void 0 : options.tenantId) {
|
|
17893
|
-
checkTenantId(logger$
|
|
18031
|
+
checkTenantId(logger$d, options === null || options === void 0 ? void 0 : options.tenantId);
|
|
17894
18032
|
this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
|
|
17895
18033
|
}
|
|
17896
18034
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
@@ -17907,14 +18045,14 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17907
18045
|
async getToken(scopes, options = {}) {
|
|
17908
18046
|
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds);
|
|
17909
18047
|
if (tenantId) {
|
|
17910
|
-
checkTenantId(logger$
|
|
18048
|
+
checkTenantId(logger$d, tenantId);
|
|
17911
18049
|
}
|
|
17912
18050
|
const scope = typeof scopes === "string" ? scopes : scopes[0];
|
|
17913
|
-
logger$
|
|
18051
|
+
logger$d.getToken.info(`Using the scope ${scope}`);
|
|
17914
18052
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
|
|
17915
18053
|
var _a2, _b2, _c, _d;
|
|
17916
18054
|
try {
|
|
17917
|
-
ensureValidScopeForDevTimeCreds(scope, logger$
|
|
18055
|
+
ensureValidScopeForDevTimeCreds(scope, logger$d);
|
|
17918
18056
|
const resource = getScopeResource(scope);
|
|
17919
18057
|
const obj = await cliCredentialInternals.getAzureCliAccessToken(resource, tenantId, this.timeout);
|
|
17920
18058
|
const specificScope = (_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("(.*)az login --scope(.*)");
|
|
@@ -17922,18 +18060,18 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17922
18060
|
const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("az:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'az' is not recognized"));
|
|
17923
18061
|
if (isNotInstallError) {
|
|
17924
18062
|
const error = new CredentialUnavailableError("Azure CLI could not be found. Please visit https://aka.ms/azure-cli for installation instructions and then, once installed, authenticate to your Azure account using 'az login'.");
|
|
17925
|
-
logger$
|
|
18063
|
+
logger$d.getToken.info(formatError(scopes, error));
|
|
17926
18064
|
throw error;
|
|
17927
18065
|
}
|
|
17928
18066
|
if (isLoginError2) {
|
|
17929
18067
|
const error = new CredentialUnavailableError("Please run 'az login' from a command prompt to authenticate before using this credential.");
|
|
17930
|
-
logger$
|
|
18068
|
+
logger$d.getToken.info(formatError(scopes, error));
|
|
17931
18069
|
throw error;
|
|
17932
18070
|
}
|
|
17933
18071
|
try {
|
|
17934
18072
|
const responseData = obj.stdout;
|
|
17935
18073
|
const response = this.parseRawResponse(responseData);
|
|
17936
|
-
logger$
|
|
18074
|
+
logger$d.getToken.info(formatSuccess(scopes));
|
|
17937
18075
|
return response;
|
|
17938
18076
|
} catch (e) {
|
|
17939
18077
|
if (obj.stderr) {
|
|
@@ -17943,7 +18081,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17943
18081
|
}
|
|
17944
18082
|
} catch (err) {
|
|
17945
18083
|
const error = err.name === "CredentialUnavailableError" ? err : new CredentialUnavailableError(err.message || "Unknown error while trying to retrieve the access token");
|
|
17946
|
-
logger$
|
|
18084
|
+
logger$d.getToken.info(formatError(scopes, error));
|
|
17947
18085
|
throw error;
|
|
17948
18086
|
}
|
|
17949
18087
|
});
|
|
@@ -17963,7 +18101,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
17963
18101
|
const token = response.accessToken;
|
|
17964
18102
|
let expiresOnTimestamp = Number.parseInt(response.expires_on, 10) * 1e3;
|
|
17965
18103
|
if (!isNaN(expiresOnTimestamp)) {
|
|
17966
|
-
logger$
|
|
18104
|
+
logger$d.getToken.info("expires_on is available and is valid, using it");
|
|
17967
18105
|
return {
|
|
17968
18106
|
token,
|
|
17969
18107
|
expiresOnTimestamp
|
|
@@ -18026,7 +18164,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18026
18164
|
});
|
|
18027
18165
|
}
|
|
18028
18166
|
};
|
|
18029
|
-
var logger$
|
|
18167
|
+
var logger$c = credentialLogger("AzureDeveloperCliCredential");
|
|
18030
18168
|
var _AzureDeveloperCliCredential = class _AzureDeveloperCliCredential {
|
|
18031
18169
|
/**
|
|
18032
18170
|
* Creates an instance of the {@link AzureDeveloperCliCredential}.
|
|
@@ -18038,7 +18176,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18038
18176
|
*/
|
|
18039
18177
|
constructor(options) {
|
|
18040
18178
|
if (options === null || options === void 0 ? void 0 : options.tenantId) {
|
|
18041
|
-
checkTenantId(logger$
|
|
18179
|
+
checkTenantId(logger$c, options === null || options === void 0 ? void 0 : options.tenantId);
|
|
18042
18180
|
this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
|
|
18043
18181
|
}
|
|
18044
18182
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
@@ -18055,7 +18193,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18055
18193
|
async getToken(scopes, options = {}) {
|
|
18056
18194
|
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds);
|
|
18057
18195
|
if (tenantId) {
|
|
18058
|
-
checkTenantId(logger$
|
|
18196
|
+
checkTenantId(logger$c, tenantId);
|
|
18059
18197
|
}
|
|
18060
18198
|
let scopeList;
|
|
18061
18199
|
if (typeof scopes === "string") {
|
|
@@ -18063,29 +18201,29 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18063
18201
|
} else {
|
|
18064
18202
|
scopeList = scopes;
|
|
18065
18203
|
}
|
|
18066
|
-
logger$
|
|
18204
|
+
logger$c.getToken.info(`Using the scopes ${scopes}`);
|
|
18067
18205
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async () => {
|
|
18068
18206
|
var _a2, _b2, _c, _d;
|
|
18069
18207
|
try {
|
|
18070
18208
|
scopeList.forEach((scope) => {
|
|
18071
|
-
ensureValidScopeForDevTimeCreds(scope, logger$
|
|
18209
|
+
ensureValidScopeForDevTimeCreds(scope, logger$c);
|
|
18072
18210
|
});
|
|
18073
18211
|
const obj = await developerCliCredentialInternals.getAzdAccessToken(scopeList, tenantId, this.timeout);
|
|
18074
18212
|
const isNotLoggedInError = ((_a2 = obj.stderr) === null || _a2 === void 0 ? void 0 : _a2.match("not logged in, run `azd login` to login")) || ((_b2 = obj.stderr) === null || _b2 === void 0 ? void 0 : _b2.match("not logged in, run `azd auth login` to login"));
|
|
18075
18213
|
const isNotInstallError = ((_c = obj.stderr) === null || _c === void 0 ? void 0 : _c.match("azd:(.*)not found")) || ((_d = obj.stderr) === null || _d === void 0 ? void 0 : _d.startsWith("'azd' is not recognized"));
|
|
18076
18214
|
if (isNotInstallError || obj.error && obj.error.code === "ENOENT") {
|
|
18077
18215
|
const error = new CredentialUnavailableError("Azure Developer CLI couldn't be found. To mitigate this issue, see the troubleshooting guidelines at https://aka.ms/azsdk/js/identity/azdevclicredential/troubleshoot.");
|
|
18078
|
-
logger$
|
|
18216
|
+
logger$c.getToken.info(formatError(scopes, error));
|
|
18079
18217
|
throw error;
|
|
18080
18218
|
}
|
|
18081
18219
|
if (isNotLoggedInError) {
|
|
18082
18220
|
const error = new CredentialUnavailableError("Please run 'azd auth login' from a command prompt to authenticate before using this credential. For more information, see the troubleshooting guidelines at https://aka.ms/azsdk/js/identity/azdevclicredential/troubleshoot.");
|
|
18083
|
-
logger$
|
|
18221
|
+
logger$c.getToken.info(formatError(scopes, error));
|
|
18084
18222
|
throw error;
|
|
18085
18223
|
}
|
|
18086
18224
|
try {
|
|
18087
18225
|
const resp = JSON.parse(obj.stdout);
|
|
18088
|
-
logger$
|
|
18226
|
+
logger$c.getToken.info(formatSuccess(scopes));
|
|
18089
18227
|
return {
|
|
18090
18228
|
token: resp.token,
|
|
18091
18229
|
expiresOnTimestamp: new Date(resp.expiresOn).getTime()
|
|
@@ -18098,7 +18236,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18098
18236
|
}
|
|
18099
18237
|
} catch (err) {
|
|
18100
18238
|
const error = err.name === "CredentialUnavailableError" ? err : new CredentialUnavailableError(err.message || "Unknown error while trying to retrieve the access token");
|
|
18101
|
-
logger$
|
|
18239
|
+
logger$c.getToken.info(formatError(scopes, error));
|
|
18102
18240
|
throw error;
|
|
18103
18241
|
}
|
|
18104
18242
|
});
|
|
@@ -18129,7 +18267,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18129
18267
|
});
|
|
18130
18268
|
}
|
|
18131
18269
|
};
|
|
18132
|
-
var logger$
|
|
18270
|
+
var logger$b = credentialLogger("AzurePowerShellCredential");
|
|
18133
18271
|
var isWindows = process.platform === "win32";
|
|
18134
18272
|
function formatCommand(commandName) {
|
|
18135
18273
|
if (isWindows) {
|
|
@@ -18181,7 +18319,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18181
18319
|
*/
|
|
18182
18320
|
constructor(options) {
|
|
18183
18321
|
if (options === null || options === void 0 ? void 0 : options.tenantId) {
|
|
18184
|
-
checkTenantId(logger$
|
|
18322
|
+
checkTenantId(logger$b, options === null || options === void 0 ? void 0 : options.tenantId);
|
|
18185
18323
|
this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
|
|
18186
18324
|
}
|
|
18187
18325
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
@@ -18240,14 +18378,14 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18240
18378
|
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds);
|
|
18241
18379
|
const scope = typeof scopes === "string" ? scopes : scopes[0];
|
|
18242
18380
|
if (tenantId) {
|
|
18243
|
-
checkTenantId(logger$
|
|
18381
|
+
checkTenantId(logger$b, tenantId);
|
|
18244
18382
|
}
|
|
18245
18383
|
try {
|
|
18246
|
-
ensureValidScopeForDevTimeCreds(scope, logger$
|
|
18247
|
-
logger$
|
|
18384
|
+
ensureValidScopeForDevTimeCreds(scope, logger$b);
|
|
18385
|
+
logger$b.getToken.info(`Using the scope ${scope}`);
|
|
18248
18386
|
const resource = getScopeResource(scope);
|
|
18249
18387
|
const response = await this.getAzurePowerShellAccessToken(resource, tenantId, this.timeout);
|
|
18250
|
-
logger$
|
|
18388
|
+
logger$b.getToken.info(formatSuccess(scopes));
|
|
18251
18389
|
return {
|
|
18252
18390
|
token: response.Token,
|
|
18253
18391
|
expiresOnTimestamp: new Date(response.ExpiresOn).getTime()
|
|
@@ -18255,15 +18393,15 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18255
18393
|
} catch (err) {
|
|
18256
18394
|
if (isNotInstalledError(err)) {
|
|
18257
18395
|
const error2 = new CredentialUnavailableError(powerShellPublicErrorMessages.installed);
|
|
18258
|
-
logger$
|
|
18396
|
+
logger$b.getToken.info(formatError(scope, error2));
|
|
18259
18397
|
throw error2;
|
|
18260
18398
|
} else if (isLoginError(err)) {
|
|
18261
18399
|
const error2 = new CredentialUnavailableError(powerShellPublicErrorMessages.login);
|
|
18262
|
-
logger$
|
|
18400
|
+
logger$b.getToken.info(formatError(scope, error2));
|
|
18263
18401
|
throw error2;
|
|
18264
18402
|
}
|
|
18265
18403
|
const error = new CredentialUnavailableError(`${err}. ${powerShellPublicErrorMessages.troubleshoot}`);
|
|
18266
|
-
logger$
|
|
18404
|
+
logger$b.getToken.info(formatError(scope, error));
|
|
18267
18405
|
throw error;
|
|
18268
18406
|
}
|
|
18269
18407
|
});
|
|
@@ -18271,7 +18409,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18271
18409
|
};
|
|
18272
18410
|
__name(_AzurePowerShellCredential, "AzurePowerShellCredential");
|
|
18273
18411
|
var AzurePowerShellCredential = _AzurePowerShellCredential;
|
|
18274
|
-
var logger$
|
|
18412
|
+
var logger$a = credentialLogger("ChainedTokenCredential");
|
|
18275
18413
|
var _ChainedTokenCredential = class _ChainedTokenCredential {
|
|
18276
18414
|
/**
|
|
18277
18415
|
* Creates an instance of ChainedTokenCredential using the given credentials.
|
|
@@ -18319,17 +18457,17 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18319
18457
|
if (err.name === "CredentialUnavailableError" || err.name === "AuthenticationRequiredError") {
|
|
18320
18458
|
errors.push(err);
|
|
18321
18459
|
} else {
|
|
18322
|
-
logger$
|
|
18460
|
+
logger$a.getToken.info(formatError(scopes, err));
|
|
18323
18461
|
throw err;
|
|
18324
18462
|
}
|
|
18325
18463
|
}
|
|
18326
18464
|
}
|
|
18327
18465
|
if (!token && errors.length > 0) {
|
|
18328
18466
|
const err = new AggregateAuthenticationError(errors, "ChainedTokenCredential authentication failed.");
|
|
18329
|
-
logger$
|
|
18467
|
+
logger$a.getToken.info(formatError(scopes, err));
|
|
18330
18468
|
throw err;
|
|
18331
18469
|
}
|
|
18332
|
-
logger$
|
|
18470
|
+
logger$a.getToken.info(`Result for ${successfulCredential.constructor.name}: ${formatSuccess(scopes)}`);
|
|
18333
18471
|
if (token === null) {
|
|
18334
18472
|
throw new CredentialUnavailableError("Failed to retrieve a valid token");
|
|
18335
18473
|
}
|
|
@@ -18339,12 +18477,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18339
18477
|
};
|
|
18340
18478
|
__name(_ChainedTokenCredential, "ChainedTokenCredential");
|
|
18341
18479
|
var ChainedTokenCredential = _ChainedTokenCredential;
|
|
18342
|
-
var credentialName$
|
|
18343
|
-
var logger$
|
|
18480
|
+
var credentialName$3 = "ClientCertificateCredential";
|
|
18481
|
+
var logger$9 = credentialLogger(credentialName$3);
|
|
18344
18482
|
var _ClientCertificateCredential = class _ClientCertificateCredential {
|
|
18345
18483
|
constructor(tenantId, clientId, certificatePathOrConfiguration, options = {}) {
|
|
18346
18484
|
if (!tenantId || !clientId) {
|
|
18347
|
-
throw new Error(`${credentialName$
|
|
18485
|
+
throw new Error(`${credentialName$3}: tenantId and clientId are required parameters.`);
|
|
18348
18486
|
}
|
|
18349
18487
|
this.tenantId = tenantId;
|
|
18350
18488
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
@@ -18355,12 +18493,12 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18355
18493
|
const certificate = this.certificateConfiguration.certificate;
|
|
18356
18494
|
const certificatePath = this.certificateConfiguration.certificatePath;
|
|
18357
18495
|
if (!this.certificateConfiguration || !(certificate || certificatePath)) {
|
|
18358
|
-
throw new Error(`${credentialName$
|
|
18496
|
+
throw new Error(`${credentialName$3}: Provide either a PEM certificate in string form, or the path to that certificate in the filesystem. To troubleshoot, visit https://aka.ms/azsdk/js/identity/serviceprincipalauthentication/troubleshoot.`);
|
|
18359
18497
|
}
|
|
18360
18498
|
if (certificate && certificatePath) {
|
|
18361
|
-
throw new Error(`${credentialName$
|
|
18499
|
+
throw new Error(`${credentialName$3}: To avoid unexpected behaviors, providing both the contents of a PEM certificate and the path to a PEM certificate is forbidden. To troubleshoot, visit https://aka.ms/azsdk/js/identity/serviceprincipalauthentication/troubleshoot.`);
|
|
18362
18500
|
}
|
|
18363
|
-
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$
|
|
18501
|
+
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$9, tokenCredentialOptions: options }));
|
|
18364
18502
|
}
|
|
18365
18503
|
/**
|
|
18366
18504
|
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
@@ -18371,8 +18509,8 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18371
18509
|
* TokenCredential implementation might make.
|
|
18372
18510
|
*/
|
|
18373
18511
|
async getToken(scopes, options = {}) {
|
|
18374
|
-
return tracingClient.withSpan(`${credentialName$
|
|
18375
|
-
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$
|
|
18512
|
+
return tracingClient.withSpan(`${credentialName$3}.getToken`, options, async (newOptions) => {
|
|
18513
|
+
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$9);
|
|
18376
18514
|
const arrayScopes = Array.isArray(scopes) ? scopes : [scopes];
|
|
18377
18515
|
const certificate = await this.buildClientCertificate();
|
|
18378
18516
|
return this.msalClient.getTokenByClientCertificate(arrayScopes, certificate, newOptions);
|
|
@@ -18426,7 +18564,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18426
18564
|
};
|
|
18427
18565
|
__name(_ClientCertificateCredential, "ClientCertificateCredential");
|
|
18428
18566
|
var ClientCertificateCredential = _ClientCertificateCredential;
|
|
18429
|
-
var logger$
|
|
18567
|
+
var logger$8 = credentialLogger("ClientSecretCredential");
|
|
18430
18568
|
var _ClientSecretCredential = class _ClientSecretCredential {
|
|
18431
18569
|
/**
|
|
18432
18570
|
* Creates an instance of the ClientSecretCredential with the details
|
|
@@ -18445,7 +18583,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18445
18583
|
this.clientSecret = clientSecret;
|
|
18446
18584
|
this.tenantId = tenantId;
|
|
18447
18585
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
18448
|
-
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$
|
|
18586
|
+
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$8, tokenCredentialOptions: options }));
|
|
18449
18587
|
}
|
|
18450
18588
|
/**
|
|
18451
18589
|
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
@@ -18457,7 +18595,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18457
18595
|
*/
|
|
18458
18596
|
async getToken(scopes, options = {}) {
|
|
18459
18597
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
|
|
18460
|
-
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$
|
|
18598
|
+
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$8);
|
|
18461
18599
|
const arrayScopes = ensureScopes(scopes);
|
|
18462
18600
|
return this.msalClient.getTokenByClientSecret(arrayScopes, this.clientSecret, newOptions);
|
|
18463
18601
|
});
|
|
@@ -18465,6 +18603,249 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18465
18603
|
};
|
|
18466
18604
|
__name(_ClientSecretCredential, "ClientSecretCredential");
|
|
18467
18605
|
var ClientSecretCredential = _ClientSecretCredential;
|
|
18606
|
+
var logger$7 = credentialLogger("UsernamePasswordCredential");
|
|
18607
|
+
var _UsernamePasswordCredential = class _UsernamePasswordCredential {
|
|
18608
|
+
/**
|
|
18609
|
+
* Creates an instance of the UsernamePasswordCredential with the details
|
|
18610
|
+
* needed to authenticate against Microsoft Entra ID with a username
|
|
18611
|
+
* and password.
|
|
18612
|
+
*
|
|
18613
|
+
* @param tenantId - The Microsoft Entra tenant (directory).
|
|
18614
|
+
* @param clientId - The client (application) ID of an App Registration in the tenant.
|
|
18615
|
+
* @param username - The user account's e-mail address (user name).
|
|
18616
|
+
* @param password - The user account's account password
|
|
18617
|
+
* @param options - Options for configuring the client which makes the authentication request.
|
|
18618
|
+
*/
|
|
18619
|
+
constructor(tenantId, clientId, username, password, options = {}) {
|
|
18620
|
+
if (!tenantId || !clientId || !username || !password) {
|
|
18621
|
+
throw new Error("UsernamePasswordCredential: tenantId, clientId, username and password are required parameters. To troubleshoot, visit https://aka.ms/azsdk/js/identity/usernamepasswordcredential/troubleshoot.");
|
|
18622
|
+
}
|
|
18623
|
+
this.tenantId = tenantId;
|
|
18624
|
+
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
18625
|
+
this.username = username;
|
|
18626
|
+
this.password = password;
|
|
18627
|
+
this.msalClient = createMsalClient(clientId, this.tenantId, Object.assign(Object.assign({}, options), { tokenCredentialOptions: options !== null && options !== void 0 ? options : {} }));
|
|
18628
|
+
}
|
|
18629
|
+
/**
|
|
18630
|
+
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
18631
|
+
* If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
|
|
18632
|
+
*
|
|
18633
|
+
* If the user provided the option `disableAutomaticAuthentication`,
|
|
18634
|
+
* once the token can't be retrieved silently,
|
|
18635
|
+
* this method won't attempt to request user interaction to retrieve the token.
|
|
18636
|
+
*
|
|
18637
|
+
* @param scopes - The list of scopes for which the token will have access.
|
|
18638
|
+
* @param options - The options used to configure any requests this
|
|
18639
|
+
* TokenCredential implementation might make.
|
|
18640
|
+
*/
|
|
18641
|
+
async getToken(scopes, options = {}) {
|
|
18642
|
+
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
|
|
18643
|
+
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$7);
|
|
18644
|
+
const arrayScopes = ensureScopes(scopes);
|
|
18645
|
+
return this.msalClient.getTokenByUsernamePassword(arrayScopes, this.username, this.password, newOptions);
|
|
18646
|
+
});
|
|
18647
|
+
}
|
|
18648
|
+
};
|
|
18649
|
+
__name(_UsernamePasswordCredential, "UsernamePasswordCredential");
|
|
18650
|
+
var UsernamePasswordCredential = _UsernamePasswordCredential;
|
|
18651
|
+
var AllSupportedEnvironmentVariables = [
|
|
18652
|
+
"AZURE_TENANT_ID",
|
|
18653
|
+
"AZURE_CLIENT_ID",
|
|
18654
|
+
"AZURE_CLIENT_SECRET",
|
|
18655
|
+
"AZURE_CLIENT_CERTIFICATE_PATH",
|
|
18656
|
+
"AZURE_CLIENT_CERTIFICATE_PASSWORD",
|
|
18657
|
+
"AZURE_USERNAME",
|
|
18658
|
+
"AZURE_PASSWORD",
|
|
18659
|
+
"AZURE_ADDITIONALLY_ALLOWED_TENANTS"
|
|
18660
|
+
];
|
|
18661
|
+
function getAdditionallyAllowedTenants() {
|
|
18662
|
+
var _a2;
|
|
18663
|
+
const additionallyAllowedValues = (_a2 = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a2 !== void 0 ? _a2 : "";
|
|
18664
|
+
return additionallyAllowedValues.split(";");
|
|
18665
|
+
}
|
|
18666
|
+
__name(getAdditionallyAllowedTenants, "getAdditionallyAllowedTenants");
|
|
18667
|
+
var credentialName$2 = "EnvironmentCredential";
|
|
18668
|
+
var logger$6 = credentialLogger(credentialName$2);
|
|
18669
|
+
var _EnvironmentCredential = class _EnvironmentCredential {
|
|
18670
|
+
/**
|
|
18671
|
+
* Creates an instance of the EnvironmentCredential class and decides what credential to use depending on the available environment variables.
|
|
18672
|
+
*
|
|
18673
|
+
* Required environment variables:
|
|
18674
|
+
* - `AZURE_TENANT_ID`: The Microsoft Entra tenant (directory) ID.
|
|
18675
|
+
* - `AZURE_CLIENT_ID`: The client (application) ID of an App Registration in the tenant.
|
|
18676
|
+
*
|
|
18677
|
+
* If setting the AZURE_TENANT_ID, then you can also set the additionally allowed tenants
|
|
18678
|
+
* - `AZURE_ADDITIONALLY_ALLOWED_TENANTS`: For multi-tenant applications, specifies additional tenants for which the credential may acquire tokens with a single semicolon delimited string. Use * to allow all tenants.
|
|
18679
|
+
*
|
|
18680
|
+
* Environment variables used for client credential authentication:
|
|
18681
|
+
* - `AZURE_CLIENT_SECRET`: A client secret that was generated for the App Registration.
|
|
18682
|
+
* - `AZURE_CLIENT_CERTIFICATE_PATH`: The path to a PEM certificate to use during the authentication, instead of the client secret.
|
|
18683
|
+
* - `AZURE_CLIENT_CERTIFICATE_PASSWORD`: (optional) password for the certificate file.
|
|
18684
|
+
*
|
|
18685
|
+
* Alternatively, users can provide environment variables for username and password authentication:
|
|
18686
|
+
* - `AZURE_USERNAME`: Username to authenticate with.
|
|
18687
|
+
* - `AZURE_PASSWORD`: Password to authenticate with.
|
|
18688
|
+
*
|
|
18689
|
+
* If the environment variables required to perform the authentication are missing, a {@link CredentialUnavailableError} will be thrown.
|
|
18690
|
+
* If the authentication fails, or if there's an unknown error, an {@link AuthenticationError} will be thrown.
|
|
18691
|
+
*
|
|
18692
|
+
* @param options - Options for configuring the client which makes the authentication request.
|
|
18693
|
+
*/
|
|
18694
|
+
constructor(options) {
|
|
18695
|
+
this._credential = void 0;
|
|
18696
|
+
const assigned = processEnvVars(AllSupportedEnvironmentVariables).assigned.join(", ");
|
|
18697
|
+
logger$6.info(`Found the following environment variables: ${assigned}`);
|
|
18698
|
+
const tenantId = process.env.AZURE_TENANT_ID, clientId = process.env.AZURE_CLIENT_ID, clientSecret = process.env.AZURE_CLIENT_SECRET;
|
|
18699
|
+
const additionallyAllowedTenantIds = getAdditionallyAllowedTenants();
|
|
18700
|
+
const newOptions = Object.assign(Object.assign({}, options), { additionallyAllowedTenantIds });
|
|
18701
|
+
if (tenantId) {
|
|
18702
|
+
checkTenantId(logger$6, tenantId);
|
|
18703
|
+
}
|
|
18704
|
+
if (tenantId && clientId && clientSecret) {
|
|
18705
|
+
logger$6.info(`Invoking ClientSecretCredential with tenant ID: ${tenantId}, clientId: ${clientId} and clientSecret: [REDACTED]`);
|
|
18706
|
+
this._credential = new ClientSecretCredential(tenantId, clientId, clientSecret, newOptions);
|
|
18707
|
+
return;
|
|
18708
|
+
}
|
|
18709
|
+
const certificatePath = process.env.AZURE_CLIENT_CERTIFICATE_PATH;
|
|
18710
|
+
const certificatePassword = process.env.AZURE_CLIENT_CERTIFICATE_PASSWORD;
|
|
18711
|
+
if (tenantId && clientId && certificatePath) {
|
|
18712
|
+
logger$6.info(`Invoking ClientCertificateCredential with tenant ID: ${tenantId}, clientId: ${clientId} and certificatePath: ${certificatePath}`);
|
|
18713
|
+
this._credential = new ClientCertificateCredential(tenantId, clientId, { certificatePath, certificatePassword }, newOptions);
|
|
18714
|
+
return;
|
|
18715
|
+
}
|
|
18716
|
+
const username = process.env.AZURE_USERNAME;
|
|
18717
|
+
const password = process.env.AZURE_PASSWORD;
|
|
18718
|
+
if (tenantId && clientId && username && password) {
|
|
18719
|
+
logger$6.info(`Invoking UsernamePasswordCredential with tenant ID: ${tenantId}, clientId: ${clientId} and username: ${username}`);
|
|
18720
|
+
this._credential = new UsernamePasswordCredential(tenantId, clientId, username, password, newOptions);
|
|
18721
|
+
}
|
|
18722
|
+
}
|
|
18723
|
+
/**
|
|
18724
|
+
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
18725
|
+
*
|
|
18726
|
+
* @param scopes - The list of scopes for which the token will have access.
|
|
18727
|
+
* @param options - Optional parameters. See {@link GetTokenOptions}.
|
|
18728
|
+
*/
|
|
18729
|
+
async getToken(scopes, options = {}) {
|
|
18730
|
+
return tracingClient.withSpan(`${credentialName$2}.getToken`, options, async (newOptions) => {
|
|
18731
|
+
if (this._credential) {
|
|
18732
|
+
try {
|
|
18733
|
+
const result = await this._credential.getToken(scopes, newOptions);
|
|
18734
|
+
logger$6.getToken.info(formatSuccess(scopes));
|
|
18735
|
+
return result;
|
|
18736
|
+
} catch (err) {
|
|
18737
|
+
const authenticationError = new AuthenticationError(400, {
|
|
18738
|
+
error: `${credentialName$2} authentication failed. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`,
|
|
18739
|
+
error_description: err.message.toString().split("More details:").join("")
|
|
18740
|
+
});
|
|
18741
|
+
logger$6.getToken.info(formatError(scopes, authenticationError));
|
|
18742
|
+
throw authenticationError;
|
|
18743
|
+
}
|
|
18744
|
+
}
|
|
18745
|
+
throw new CredentialUnavailableError(`${credentialName$2} is unavailable. No underlying credential could be used. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`);
|
|
18746
|
+
});
|
|
18747
|
+
}
|
|
18748
|
+
};
|
|
18749
|
+
__name(_EnvironmentCredential, "EnvironmentCredential");
|
|
18750
|
+
var EnvironmentCredential = _EnvironmentCredential;
|
|
18751
|
+
var logger$5 = credentialLogger("DefaultAzureCredential");
|
|
18752
|
+
function createDefaultManagedIdentityCredential(options = {}) {
|
|
18753
|
+
var _a2, _b2, _c, _d;
|
|
18754
|
+
(_a2 = options.retryOptions) !== null && _a2 !== void 0 ? _a2 : options.retryOptions = {
|
|
18755
|
+
maxRetries: 5,
|
|
18756
|
+
retryDelayInMs: 800
|
|
18757
|
+
};
|
|
18758
|
+
const managedIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_CLIENT_ID;
|
|
18759
|
+
const workloadIdentityClientId = (_c = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _c !== void 0 ? _c : managedIdentityClientId;
|
|
18760
|
+
const managedResourceId = options === null || options === void 0 ? void 0 : options.managedIdentityResourceId;
|
|
18761
|
+
const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
18762
|
+
const tenantId = (_d = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _d !== void 0 ? _d : process.env.AZURE_TENANT_ID;
|
|
18763
|
+
if (managedResourceId) {
|
|
18764
|
+
const managedIdentityResourceIdOptions = Object.assign(Object.assign({}, options), { resourceId: managedResourceId });
|
|
18765
|
+
return new ManagedIdentityCredential(managedIdentityResourceIdOptions);
|
|
18766
|
+
}
|
|
18767
|
+
if (workloadFile && workloadIdentityClientId) {
|
|
18768
|
+
const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId });
|
|
18769
|
+
return new ManagedIdentityCredential(workloadIdentityClientId, workloadIdentityCredentialOptions);
|
|
18770
|
+
}
|
|
18771
|
+
if (managedIdentityClientId) {
|
|
18772
|
+
const managedIdentityClientOptions = Object.assign(Object.assign({}, options), { clientId: managedIdentityClientId });
|
|
18773
|
+
return new ManagedIdentityCredential(managedIdentityClientOptions);
|
|
18774
|
+
}
|
|
18775
|
+
return new ManagedIdentityCredential(options);
|
|
18776
|
+
}
|
|
18777
|
+
__name(createDefaultManagedIdentityCredential, "createDefaultManagedIdentityCredential");
|
|
18778
|
+
function createDefaultWorkloadIdentityCredential(options) {
|
|
18779
|
+
var _a2, _b2, _c;
|
|
18780
|
+
const managedIdentityClientId = (_a2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_CLIENT_ID;
|
|
18781
|
+
const workloadIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b2 !== void 0 ? _b2 : managedIdentityClientId;
|
|
18782
|
+
const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
18783
|
+
const tenantId = (_c = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _c !== void 0 ? _c : process.env.AZURE_TENANT_ID;
|
|
18784
|
+
if (workloadFile && workloadIdentityClientId) {
|
|
18785
|
+
const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId, clientId: workloadIdentityClientId, tokenFilePath: workloadFile });
|
|
18786
|
+
return new WorkloadIdentityCredential(workloadIdentityCredentialOptions);
|
|
18787
|
+
}
|
|
18788
|
+
if (tenantId) {
|
|
18789
|
+
const workloadIdentityClientTenantOptions = Object.assign(Object.assign({}, options), { tenantId });
|
|
18790
|
+
return new WorkloadIdentityCredential(workloadIdentityClientTenantOptions);
|
|
18791
|
+
}
|
|
18792
|
+
return new WorkloadIdentityCredential(options);
|
|
18793
|
+
}
|
|
18794
|
+
__name(createDefaultWorkloadIdentityCredential, "createDefaultWorkloadIdentityCredential");
|
|
18795
|
+
function createDefaultAzureDeveloperCliCredential(options = {}) {
|
|
18796
|
+
const processTimeoutInMs = options.processTimeoutInMs;
|
|
18797
|
+
return new AzureDeveloperCliCredential(Object.assign({ processTimeoutInMs }, options));
|
|
18798
|
+
}
|
|
18799
|
+
__name(createDefaultAzureDeveloperCliCredential, "createDefaultAzureDeveloperCliCredential");
|
|
18800
|
+
function createDefaultAzureCliCredential(options = {}) {
|
|
18801
|
+
const processTimeoutInMs = options.processTimeoutInMs;
|
|
18802
|
+
return new AzureCliCredential2(Object.assign({ processTimeoutInMs }, options));
|
|
18803
|
+
}
|
|
18804
|
+
__name(createDefaultAzureCliCredential, "createDefaultAzureCliCredential");
|
|
18805
|
+
function createDefaultAzurePowershellCredential(options = {}) {
|
|
18806
|
+
const processTimeoutInMs = options.processTimeoutInMs;
|
|
18807
|
+
return new AzurePowerShellCredential(Object.assign({ processTimeoutInMs }, options));
|
|
18808
|
+
}
|
|
18809
|
+
__name(createDefaultAzurePowershellCredential, "createDefaultAzurePowershellCredential");
|
|
18810
|
+
function createEnvironmentCredential(options = {}) {
|
|
18811
|
+
return new EnvironmentCredential(options);
|
|
18812
|
+
}
|
|
18813
|
+
__name(createEnvironmentCredential, "createEnvironmentCredential");
|
|
18814
|
+
var _UnavailableDefaultCredential = class _UnavailableDefaultCredential {
|
|
18815
|
+
constructor(credentialName2, message) {
|
|
18816
|
+
this.credentialName = credentialName2;
|
|
18817
|
+
this.credentialUnavailableErrorMessage = message;
|
|
18818
|
+
}
|
|
18819
|
+
getToken() {
|
|
18820
|
+
logger$5.getToken.info(`Skipping ${this.credentialName}, reason: ${this.credentialUnavailableErrorMessage}`);
|
|
18821
|
+
return Promise.resolve(null);
|
|
18822
|
+
}
|
|
18823
|
+
};
|
|
18824
|
+
__name(_UnavailableDefaultCredential, "UnavailableDefaultCredential");
|
|
18825
|
+
var UnavailableDefaultCredential = _UnavailableDefaultCredential;
|
|
18826
|
+
var _DefaultAzureCredential = class _DefaultAzureCredential extends ChainedTokenCredential {
|
|
18827
|
+
constructor(options) {
|
|
18828
|
+
const credentialFunctions = [
|
|
18829
|
+
createEnvironmentCredential,
|
|
18830
|
+
createDefaultWorkloadIdentityCredential,
|
|
18831
|
+
createDefaultManagedIdentityCredential,
|
|
18832
|
+
createDefaultAzureCliCredential,
|
|
18833
|
+
createDefaultAzurePowershellCredential,
|
|
18834
|
+
createDefaultAzureDeveloperCliCredential
|
|
18835
|
+
];
|
|
18836
|
+
const credentials = credentialFunctions.map((createCredentialFn) => {
|
|
18837
|
+
try {
|
|
18838
|
+
return createCredentialFn(options);
|
|
18839
|
+
} catch (err) {
|
|
18840
|
+
logger$5.warning(`Skipped ${createCredentialFn.name} because of an error creating the credential: ${err}`);
|
|
18841
|
+
return new UnavailableDefaultCredential(createCredentialFn.name, err.message);
|
|
18842
|
+
}
|
|
18843
|
+
});
|
|
18844
|
+
super(...credentials);
|
|
18845
|
+
}
|
|
18846
|
+
};
|
|
18847
|
+
__name(_DefaultAzureCredential, "DefaultAzureCredential");
|
|
18848
|
+
var DefaultAzureCredential = _DefaultAzureCredential;
|
|
18468
18849
|
var _MsalNode = class _MsalNode {
|
|
18469
18850
|
constructor(options) {
|
|
18470
18851
|
var _a2, _b2, _c, _d, _e, _f;
|
|
@@ -18529,7 +18910,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18529
18910
|
networkClient: this.identityClient,
|
|
18530
18911
|
loggerOptions: {
|
|
18531
18912
|
loggerCallback: defaultLoggerCallback(options.logger),
|
|
18532
|
-
logLevel: getMSALLogLevel(logger$
|
|
18913
|
+
logLevel: getMSALLogLevel(logger$r.getLogLevel()),
|
|
18533
18914
|
piiLoggingEnabled: (_a2 = options.loggingOptions) === null || _a2 === void 0 ? void 0 : _a2.enableUnsafeSupportLogging
|
|
18534
18915
|
}
|
|
18535
18916
|
}
|
|
@@ -18649,363 +19030,90 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
18649
19030
|
if (!this.account) {
|
|
18650
19031
|
throw new AuthenticationRequiredError({
|
|
18651
19032
|
scopes,
|
|
18652
|
-
getTokenOptions: options,
|
|
18653
|
-
message: "Silent authentication failed. We couldn't retrieve an active account from the cache."
|
|
18654
|
-
});
|
|
18655
|
-
}
|
|
18656
|
-
const silentRequest = {
|
|
18657
|
-
// To be able to re-use the account, the Token Cache must also have been provided.
|
|
18658
|
-
account: publicToMsal(this.account),
|
|
18659
|
-
correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
|
|
18660
|
-
scopes,
|
|
18661
|
-
authority: options === null || options === void 0 ? void 0 : options.authority,
|
|
18662
|
-
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
18663
|
-
};
|
|
18664
|
-
if (hasNativeBroker() && this.enableBroker) {
|
|
18665
|
-
if (!silentRequest.tokenQueryParameters) {
|
|
18666
|
-
silentRequest.tokenQueryParameters = {};
|
|
18667
|
-
}
|
|
18668
|
-
if (!this.parentWindowHandle) {
|
|
18669
|
-
this.logger.warning("Parent window handle is not specified for the broker. This may cause unexpected behavior. Please provide the parentWindowHandle.");
|
|
18670
|
-
}
|
|
18671
|
-
if (this.enableMsaPassthrough) {
|
|
18672
|
-
silentRequest.tokenQueryParameters["msal_request_type"] = "consumer_passthrough";
|
|
18673
|
-
}
|
|
18674
|
-
}
|
|
18675
|
-
try {
|
|
18676
|
-
this.logger.info("Attempting to acquire token silently");
|
|
18677
|
-
await ((_a2 = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a2 === void 0 ? void 0 : _a2.getTokenCache().getAllAccounts());
|
|
18678
|
-
const response = (_c = await ((_b2 = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b2 === void 0 ? void 0 : _b2.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
|
|
18679
|
-
return this.handleResult(scopes, response || void 0);
|
|
18680
|
-
} catch (err) {
|
|
18681
|
-
throw handleMsalError(scopes, err, options);
|
|
18682
|
-
}
|
|
18683
|
-
}
|
|
18684
|
-
/**
|
|
18685
|
-
* Wrapper around each MSAL flow get token operation: doGetToken.
|
|
18686
|
-
* If disableAutomaticAuthentication is sent through the constructor, it will prevent MSAL from requesting the user input.
|
|
18687
|
-
*/
|
|
18688
|
-
async getToken(scopes, options = {}) {
|
|
18689
|
-
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds) || this.tenantId;
|
|
18690
|
-
options.authority = getAuthority(tenantId, this.authorityHost);
|
|
18691
|
-
options.correlationId = (options === null || options === void 0 ? void 0 : options.correlationId) || randomUUID();
|
|
18692
|
-
await this.init(options);
|
|
18693
|
-
try {
|
|
18694
|
-
const optionsClaims = options.claims;
|
|
18695
|
-
if (optionsClaims) {
|
|
18696
|
-
this.cachedClaims = optionsClaims;
|
|
18697
|
-
}
|
|
18698
|
-
if (this.cachedClaims && !optionsClaims) {
|
|
18699
|
-
options.claims = this.cachedClaims;
|
|
18700
|
-
}
|
|
18701
|
-
return await this.getTokenSilent(scopes, options);
|
|
18702
|
-
} catch (err) {
|
|
18703
|
-
if (err.name !== "AuthenticationRequiredError") {
|
|
18704
|
-
throw err;
|
|
18705
|
-
}
|
|
18706
|
-
if (options === null || options === void 0 ? void 0 : options.disableAutomaticAuthentication) {
|
|
18707
|
-
throw new AuthenticationRequiredError({
|
|
18708
|
-
scopes,
|
|
18709
|
-
getTokenOptions: options,
|
|
18710
|
-
message: "Automatic authentication has been disabled. You may call the authentication() method."
|
|
18711
|
-
});
|
|
18712
|
-
}
|
|
18713
|
-
this.logger.info(`Silent authentication failed, falling back to interactive method.`);
|
|
18714
|
-
return this.doGetToken(scopes, options);
|
|
18715
|
-
}
|
|
18716
|
-
}
|
|
18717
|
-
/**
|
|
18718
|
-
* Handles the MSAL authentication result.
|
|
18719
|
-
* If the result has an account, we update the local account reference.
|
|
18720
|
-
* If the token received is invalid, an error will be thrown depending on what's missing.
|
|
18721
|
-
*/
|
|
18722
|
-
handleResult(scopes, result, getTokenOptions) {
|
|
18723
|
-
if (result === null || result === void 0 ? void 0 : result.account) {
|
|
18724
|
-
this.account = msalToPublic(this.clientId, result.account);
|
|
18725
|
-
}
|
|
18726
|
-
ensureValidMsalToken(scopes, result, getTokenOptions);
|
|
18727
|
-
this.logger.getToken.info(formatSuccess(scopes));
|
|
18728
|
-
return {
|
|
18729
|
-
token: result.accessToken,
|
|
18730
|
-
expiresOnTimestamp: result.expiresOn.getTime()
|
|
18731
|
-
};
|
|
18732
|
-
}
|
|
18733
|
-
};
|
|
18734
|
-
__name(_MsalNode, "MsalNode");
|
|
18735
|
-
var MsalNode = _MsalNode;
|
|
18736
|
-
var _MsalUsernamePassword = class _MsalUsernamePassword extends MsalNode {
|
|
18737
|
-
constructor(options) {
|
|
18738
|
-
super(options);
|
|
18739
|
-
this.username = options.username;
|
|
18740
|
-
this.password = options.password;
|
|
18741
|
-
}
|
|
18742
|
-
async doGetToken(scopes, options) {
|
|
18743
|
-
try {
|
|
18744
|
-
const requestOptions = {
|
|
18745
|
-
scopes,
|
|
18746
|
-
username: this.username,
|
|
18747
|
-
password: this.password,
|
|
18748
|
-
correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
|
|
18749
|
-
authority: options === null || options === void 0 ? void 0 : options.authority,
|
|
18750
|
-
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
18751
|
-
};
|
|
18752
|
-
const result = await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenByUsernamePassword(requestOptions);
|
|
18753
|
-
return this.handleResult(scopes, result || void 0);
|
|
18754
|
-
} catch (error) {
|
|
18755
|
-
throw handleMsalError(scopes, error, options);
|
|
18756
|
-
}
|
|
18757
|
-
}
|
|
18758
|
-
};
|
|
18759
|
-
__name(_MsalUsernamePassword, "MsalUsernamePassword");
|
|
18760
|
-
var MsalUsernamePassword = _MsalUsernamePassword;
|
|
18761
|
-
var logger$6 = credentialLogger("UsernamePasswordCredential");
|
|
18762
|
-
var _UsernamePasswordCredential = class _UsernamePasswordCredential {
|
|
18763
|
-
/**
|
|
18764
|
-
* Creates an instance of the UsernamePasswordCredential with the details
|
|
18765
|
-
* needed to authenticate against Microsoft Entra ID with a username
|
|
18766
|
-
* and password.
|
|
18767
|
-
*
|
|
18768
|
-
* @param tenantId - The Microsoft Entra tenant (directory).
|
|
18769
|
-
* @param clientId - The client (application) ID of an App Registration in the tenant.
|
|
18770
|
-
* @param username - The user account's e-mail address (user name).
|
|
18771
|
-
* @param password - The user account's account password
|
|
18772
|
-
* @param options - Options for configuring the client which makes the authentication request.
|
|
18773
|
-
*/
|
|
18774
|
-
constructor(tenantId, clientId, username, password, options = {}) {
|
|
18775
|
-
if (!tenantId || !clientId || !username || !password) {
|
|
18776
|
-
throw new Error("UsernamePasswordCredential: tenantId, clientId, username and password are required parameters. To troubleshoot, visit https://aka.ms/azsdk/js/identity/usernamepasswordcredential/troubleshoot.");
|
|
18777
|
-
}
|
|
18778
|
-
this.tenantId = tenantId;
|
|
18779
|
-
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
18780
|
-
this.msalFlow = new MsalUsernamePassword(Object.assign(Object.assign({}, options), {
|
|
18781
|
-
logger: logger$6,
|
|
18782
|
-
clientId,
|
|
18783
|
-
tenantId,
|
|
18784
|
-
username,
|
|
18785
|
-
password,
|
|
18786
|
-
tokenCredentialOptions: options || {}
|
|
18787
|
-
}));
|
|
18788
|
-
}
|
|
18789
|
-
/**
|
|
18790
|
-
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
18791
|
-
* If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
|
|
18792
|
-
*
|
|
18793
|
-
* If the user provided the option `disableAutomaticAuthentication`,
|
|
18794
|
-
* once the token can't be retrieved silently,
|
|
18795
|
-
* this method won't attempt to request user interaction to retrieve the token.
|
|
18796
|
-
*
|
|
18797
|
-
* @param scopes - The list of scopes for which the token will have access.
|
|
18798
|
-
* @param options - The options used to configure any requests this
|
|
18799
|
-
* TokenCredential implementation might make.
|
|
18800
|
-
*/
|
|
18801
|
-
async getToken(scopes, options = {}) {
|
|
18802
|
-
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
|
|
18803
|
-
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$6);
|
|
18804
|
-
const arrayScopes = ensureScopes(scopes);
|
|
18805
|
-
return this.msalFlow.getToken(arrayScopes, newOptions);
|
|
18806
|
-
});
|
|
18807
|
-
}
|
|
18808
|
-
};
|
|
18809
|
-
__name(_UsernamePasswordCredential, "UsernamePasswordCredential");
|
|
18810
|
-
var UsernamePasswordCredential = _UsernamePasswordCredential;
|
|
18811
|
-
var AllSupportedEnvironmentVariables = [
|
|
18812
|
-
"AZURE_TENANT_ID",
|
|
18813
|
-
"AZURE_CLIENT_ID",
|
|
18814
|
-
"AZURE_CLIENT_SECRET",
|
|
18815
|
-
"AZURE_CLIENT_CERTIFICATE_PATH",
|
|
18816
|
-
"AZURE_CLIENT_CERTIFICATE_PASSWORD",
|
|
18817
|
-
"AZURE_USERNAME",
|
|
18818
|
-
"AZURE_PASSWORD",
|
|
18819
|
-
"AZURE_ADDITIONALLY_ALLOWED_TENANTS"
|
|
18820
|
-
];
|
|
18821
|
-
function getAdditionallyAllowedTenants() {
|
|
18822
|
-
var _a2;
|
|
18823
|
-
const additionallyAllowedValues = (_a2 = process.env.AZURE_ADDITIONALLY_ALLOWED_TENANTS) !== null && _a2 !== void 0 ? _a2 : "";
|
|
18824
|
-
return additionallyAllowedValues.split(";");
|
|
18825
|
-
}
|
|
18826
|
-
__name(getAdditionallyAllowedTenants, "getAdditionallyAllowedTenants");
|
|
18827
|
-
var credentialName$1 = "EnvironmentCredential";
|
|
18828
|
-
var logger$5 = credentialLogger(credentialName$1);
|
|
18829
|
-
var _EnvironmentCredential = class _EnvironmentCredential {
|
|
18830
|
-
/**
|
|
18831
|
-
* Creates an instance of the EnvironmentCredential class and decides what credential to use depending on the available environment variables.
|
|
18832
|
-
*
|
|
18833
|
-
* Required environment variables:
|
|
18834
|
-
* - `AZURE_TENANT_ID`: The Microsoft Entra tenant (directory) ID.
|
|
18835
|
-
* - `AZURE_CLIENT_ID`: The client (application) ID of an App Registration in the tenant.
|
|
18836
|
-
*
|
|
18837
|
-
* If setting the AZURE_TENANT_ID, then you can also set the additionally allowed tenants
|
|
18838
|
-
* - `AZURE_ADDITIONALLY_ALLOWED_TENANTS`: For multi-tenant applications, specifies additional tenants for which the credential may acquire tokens with a single semicolon delimited string. Use * to allow all tenants.
|
|
18839
|
-
*
|
|
18840
|
-
* Environment variables used for client credential authentication:
|
|
18841
|
-
* - `AZURE_CLIENT_SECRET`: A client secret that was generated for the App Registration.
|
|
18842
|
-
* - `AZURE_CLIENT_CERTIFICATE_PATH`: The path to a PEM certificate to use during the authentication, instead of the client secret.
|
|
18843
|
-
* - `AZURE_CLIENT_CERTIFICATE_PASSWORD`: (optional) password for the certificate file.
|
|
18844
|
-
*
|
|
18845
|
-
* Alternatively, users can provide environment variables for username and password authentication:
|
|
18846
|
-
* - `AZURE_USERNAME`: Username to authenticate with.
|
|
18847
|
-
* - `AZURE_PASSWORD`: Password to authenticate with.
|
|
18848
|
-
*
|
|
18849
|
-
* If the environment variables required to perform the authentication are missing, a {@link CredentialUnavailableError} will be thrown.
|
|
18850
|
-
* If the authentication fails, or if there's an unknown error, an {@link AuthenticationError} will be thrown.
|
|
18851
|
-
*
|
|
18852
|
-
* @param options - Options for configuring the client which makes the authentication request.
|
|
18853
|
-
*/
|
|
18854
|
-
constructor(options) {
|
|
18855
|
-
this._credential = void 0;
|
|
18856
|
-
const assigned = processEnvVars(AllSupportedEnvironmentVariables).assigned.join(", ");
|
|
18857
|
-
logger$5.info(`Found the following environment variables: ${assigned}`);
|
|
18858
|
-
const tenantId = process.env.AZURE_TENANT_ID, clientId = process.env.AZURE_CLIENT_ID, clientSecret = process.env.AZURE_CLIENT_SECRET;
|
|
18859
|
-
const additionallyAllowedTenantIds = getAdditionallyAllowedTenants();
|
|
18860
|
-
const newOptions = Object.assign(Object.assign({}, options), { additionallyAllowedTenantIds });
|
|
18861
|
-
if (tenantId) {
|
|
18862
|
-
checkTenantId(logger$5, tenantId);
|
|
18863
|
-
}
|
|
18864
|
-
if (tenantId && clientId && clientSecret) {
|
|
18865
|
-
logger$5.info(`Invoking ClientSecretCredential with tenant ID: ${tenantId}, clientId: ${clientId} and clientSecret: [REDACTED]`);
|
|
18866
|
-
this._credential = new ClientSecretCredential(tenantId, clientId, clientSecret, newOptions);
|
|
18867
|
-
return;
|
|
19033
|
+
getTokenOptions: options,
|
|
19034
|
+
message: "Silent authentication failed. We couldn't retrieve an active account from the cache."
|
|
19035
|
+
});
|
|
18868
19036
|
}
|
|
18869
|
-
const
|
|
18870
|
-
|
|
18871
|
-
|
|
18872
|
-
|
|
18873
|
-
|
|
18874
|
-
|
|
19037
|
+
const silentRequest = {
|
|
19038
|
+
// To be able to re-use the account, the Token Cache must also have been provided.
|
|
19039
|
+
account: publicToMsal(this.account),
|
|
19040
|
+
correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
|
|
19041
|
+
scopes,
|
|
19042
|
+
authority: options === null || options === void 0 ? void 0 : options.authority,
|
|
19043
|
+
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
19044
|
+
};
|
|
19045
|
+
if (hasNativeBroker() && this.enableBroker) {
|
|
19046
|
+
if (!silentRequest.tokenQueryParameters) {
|
|
19047
|
+
silentRequest.tokenQueryParameters = {};
|
|
19048
|
+
}
|
|
19049
|
+
if (!this.parentWindowHandle) {
|
|
19050
|
+
this.logger.warning("Parent window handle is not specified for the broker. This may cause unexpected behavior. Please provide the parentWindowHandle.");
|
|
19051
|
+
}
|
|
19052
|
+
if (this.enableMsaPassthrough) {
|
|
19053
|
+
silentRequest.tokenQueryParameters["msal_request_type"] = "consumer_passthrough";
|
|
19054
|
+
}
|
|
18875
19055
|
}
|
|
18876
|
-
|
|
18877
|
-
|
|
18878
|
-
|
|
18879
|
-
|
|
18880
|
-
this.
|
|
19056
|
+
try {
|
|
19057
|
+
this.logger.info("Attempting to acquire token silently");
|
|
19058
|
+
await ((_a2 = this.getApp("publicFirst", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _a2 === void 0 ? void 0 : _a2.getTokenCache().getAllAccounts());
|
|
19059
|
+
const response = (_c = await ((_b2 = this.getApp("confidential", options === null || options === void 0 ? void 0 : options.enableCae)) === null || _b2 === void 0 ? void 0 : _b2.acquireTokenSilent(silentRequest))) !== null && _c !== void 0 ? _c : await this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenSilent(silentRequest);
|
|
19060
|
+
return this.handleResult(scopes, response || void 0);
|
|
19061
|
+
} catch (err) {
|
|
19062
|
+
throw handleMsalError(scopes, err, options);
|
|
18881
19063
|
}
|
|
18882
19064
|
}
|
|
18883
19065
|
/**
|
|
18884
|
-
*
|
|
18885
|
-
*
|
|
18886
|
-
* @param scopes - The list of scopes for which the token will have access.
|
|
18887
|
-
* @param options - Optional parameters. See {@link GetTokenOptions}.
|
|
19066
|
+
* Wrapper around each MSAL flow get token operation: doGetToken.
|
|
19067
|
+
* If disableAutomaticAuthentication is sent through the constructor, it will prevent MSAL from requesting the user input.
|
|
18888
19068
|
*/
|
|
18889
19069
|
async getToken(scopes, options = {}) {
|
|
18890
|
-
|
|
18891
|
-
|
|
18892
|
-
|
|
18893
|
-
|
|
18894
|
-
|
|
18895
|
-
|
|
18896
|
-
|
|
18897
|
-
|
|
18898
|
-
error: `${credentialName$1} authentication failed. To troubleshoot, visit https://aka.ms/azsdk/js/identity/environmentcredential/troubleshoot.`,
|
|
18899
|
-
error_description: err.message.toString().split("More details:").join("")
|
|
18900
|
-
});
|
|
18901
|
-
logger$5.getToken.info(formatError(scopes, authenticationError));
|
|
18902
|
-
throw authenticationError;
|
|
18903
|
-
}
|
|
19070
|
+
const tenantId = processMultiTenantRequest(this.tenantId, options, this.additionallyAllowedTenantIds) || this.tenantId;
|
|
19071
|
+
options.authority = getAuthority(tenantId, this.authorityHost);
|
|
19072
|
+
options.correlationId = (options === null || options === void 0 ? void 0 : options.correlationId) || randomUUID();
|
|
19073
|
+
await this.init(options);
|
|
19074
|
+
try {
|
|
19075
|
+
const optionsClaims = options.claims;
|
|
19076
|
+
if (optionsClaims) {
|
|
19077
|
+
this.cachedClaims = optionsClaims;
|
|
18904
19078
|
}
|
|
18905
|
-
|
|
18906
|
-
|
|
18907
|
-
}
|
|
18908
|
-
};
|
|
18909
|
-
__name(_EnvironmentCredential, "EnvironmentCredential");
|
|
18910
|
-
var EnvironmentCredential = _EnvironmentCredential;
|
|
18911
|
-
var logger$4 = credentialLogger("DefaultAzureCredential");
|
|
18912
|
-
function createDefaultManagedIdentityCredential(options = {}) {
|
|
18913
|
-
var _a2, _b2, _c, _d;
|
|
18914
|
-
(_a2 = options.retryOptions) !== null && _a2 !== void 0 ? _a2 : options.retryOptions = {
|
|
18915
|
-
maxRetries: 5,
|
|
18916
|
-
retryDelayInMs: 800
|
|
18917
|
-
};
|
|
18918
|
-
const managedIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _b2 !== void 0 ? _b2 : process.env.AZURE_CLIENT_ID;
|
|
18919
|
-
const workloadIdentityClientId = (_c = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _c !== void 0 ? _c : managedIdentityClientId;
|
|
18920
|
-
const managedResourceId = options === null || options === void 0 ? void 0 : options.managedIdentityResourceId;
|
|
18921
|
-
const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
18922
|
-
const tenantId = (_d = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _d !== void 0 ? _d : process.env.AZURE_TENANT_ID;
|
|
18923
|
-
if (managedResourceId) {
|
|
18924
|
-
const managedIdentityResourceIdOptions = Object.assign(Object.assign({}, options), { resourceId: managedResourceId });
|
|
18925
|
-
return new ManagedIdentityCredential(managedIdentityResourceIdOptions);
|
|
18926
|
-
}
|
|
18927
|
-
if (workloadFile && workloadIdentityClientId) {
|
|
18928
|
-
const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId });
|
|
18929
|
-
return new ManagedIdentityCredential(workloadIdentityClientId, workloadIdentityCredentialOptions);
|
|
18930
|
-
}
|
|
18931
|
-
if (managedIdentityClientId) {
|
|
18932
|
-
const managedIdentityClientOptions = Object.assign(Object.assign({}, options), { clientId: managedIdentityClientId });
|
|
18933
|
-
return new ManagedIdentityCredential(managedIdentityClientOptions);
|
|
18934
|
-
}
|
|
18935
|
-
return new ManagedIdentityCredential(options);
|
|
18936
|
-
}
|
|
18937
|
-
__name(createDefaultManagedIdentityCredential, "createDefaultManagedIdentityCredential");
|
|
18938
|
-
function createDefaultWorkloadIdentityCredential(options) {
|
|
18939
|
-
var _a2, _b2, _c;
|
|
18940
|
-
const managedIdentityClientId = (_a2 = options === null || options === void 0 ? void 0 : options.managedIdentityClientId) !== null && _a2 !== void 0 ? _a2 : process.env.AZURE_CLIENT_ID;
|
|
18941
|
-
const workloadIdentityClientId = (_b2 = options === null || options === void 0 ? void 0 : options.workloadIdentityClientId) !== null && _b2 !== void 0 ? _b2 : managedIdentityClientId;
|
|
18942
|
-
const workloadFile = process.env.AZURE_FEDERATED_TOKEN_FILE;
|
|
18943
|
-
const tenantId = (_c = options === null || options === void 0 ? void 0 : options.tenantId) !== null && _c !== void 0 ? _c : process.env.AZURE_TENANT_ID;
|
|
18944
|
-
if (workloadFile && workloadIdentityClientId) {
|
|
18945
|
-
const workloadIdentityCredentialOptions = Object.assign(Object.assign({}, options), { tenantId, clientId: workloadIdentityClientId, tokenFilePath: workloadFile });
|
|
18946
|
-
return new WorkloadIdentityCredential(workloadIdentityCredentialOptions);
|
|
18947
|
-
}
|
|
18948
|
-
if (tenantId) {
|
|
18949
|
-
const workloadIdentityClientTenantOptions = Object.assign(Object.assign({}, options), { tenantId });
|
|
18950
|
-
return new WorkloadIdentityCredential(workloadIdentityClientTenantOptions);
|
|
18951
|
-
}
|
|
18952
|
-
return new WorkloadIdentityCredential(options);
|
|
18953
|
-
}
|
|
18954
|
-
__name(createDefaultWorkloadIdentityCredential, "createDefaultWorkloadIdentityCredential");
|
|
18955
|
-
function createDefaultAzureDeveloperCliCredential(options = {}) {
|
|
18956
|
-
const processTimeoutInMs = options.processTimeoutInMs;
|
|
18957
|
-
return new AzureDeveloperCliCredential(Object.assign({ processTimeoutInMs }, options));
|
|
18958
|
-
}
|
|
18959
|
-
__name(createDefaultAzureDeveloperCliCredential, "createDefaultAzureDeveloperCliCredential");
|
|
18960
|
-
function createDefaultAzureCliCredential(options = {}) {
|
|
18961
|
-
const processTimeoutInMs = options.processTimeoutInMs;
|
|
18962
|
-
return new AzureCliCredential2(Object.assign({ processTimeoutInMs }, options));
|
|
18963
|
-
}
|
|
18964
|
-
__name(createDefaultAzureCliCredential, "createDefaultAzureCliCredential");
|
|
18965
|
-
function createDefaultAzurePowershellCredential(options = {}) {
|
|
18966
|
-
const processTimeoutInMs = options.processTimeoutInMs;
|
|
18967
|
-
return new AzurePowerShellCredential(Object.assign({ processTimeoutInMs }, options));
|
|
18968
|
-
}
|
|
18969
|
-
__name(createDefaultAzurePowershellCredential, "createDefaultAzurePowershellCredential");
|
|
18970
|
-
function createEnvironmentCredential(options = {}) {
|
|
18971
|
-
return new EnvironmentCredential(options);
|
|
18972
|
-
}
|
|
18973
|
-
__name(createEnvironmentCredential, "createEnvironmentCredential");
|
|
18974
|
-
var _UnavailableDefaultCredential = class _UnavailableDefaultCredential {
|
|
18975
|
-
constructor(credentialName2, message) {
|
|
18976
|
-
this.credentialName = credentialName2;
|
|
18977
|
-
this.credentialUnavailableErrorMessage = message;
|
|
18978
|
-
}
|
|
18979
|
-
getToken() {
|
|
18980
|
-
logger$4.getToken.info(`Skipping ${this.credentialName}, reason: ${this.credentialUnavailableErrorMessage}`);
|
|
18981
|
-
return Promise.resolve(null);
|
|
18982
|
-
}
|
|
18983
|
-
};
|
|
18984
|
-
__name(_UnavailableDefaultCredential, "UnavailableDefaultCredential");
|
|
18985
|
-
var UnavailableDefaultCredential = _UnavailableDefaultCredential;
|
|
18986
|
-
var _DefaultAzureCredential = class _DefaultAzureCredential extends ChainedTokenCredential {
|
|
18987
|
-
constructor(options) {
|
|
18988
|
-
const credentialFunctions = [
|
|
18989
|
-
createEnvironmentCredential,
|
|
18990
|
-
createDefaultWorkloadIdentityCredential,
|
|
18991
|
-
createDefaultManagedIdentityCredential,
|
|
18992
|
-
createDefaultAzureCliCredential,
|
|
18993
|
-
createDefaultAzurePowershellCredential,
|
|
18994
|
-
createDefaultAzureDeveloperCliCredential
|
|
18995
|
-
];
|
|
18996
|
-
const credentials = credentialFunctions.map((createCredentialFn) => {
|
|
18997
|
-
try {
|
|
18998
|
-
return createCredentialFn(options);
|
|
18999
|
-
} catch (err) {
|
|
19000
|
-
logger$4.warning(`Skipped ${createCredentialFn.name} because of an error creating the credential: ${err}`);
|
|
19001
|
-
return new UnavailableDefaultCredential(createCredentialFn.name, err.message);
|
|
19079
|
+
if (this.cachedClaims && !optionsClaims) {
|
|
19080
|
+
options.claims = this.cachedClaims;
|
|
19002
19081
|
}
|
|
19003
|
-
|
|
19004
|
-
|
|
19082
|
+
return await this.getTokenSilent(scopes, options);
|
|
19083
|
+
} catch (err) {
|
|
19084
|
+
if (err.name !== "AuthenticationRequiredError") {
|
|
19085
|
+
throw err;
|
|
19086
|
+
}
|
|
19087
|
+
if (options === null || options === void 0 ? void 0 : options.disableAutomaticAuthentication) {
|
|
19088
|
+
throw new AuthenticationRequiredError({
|
|
19089
|
+
scopes,
|
|
19090
|
+
getTokenOptions: options,
|
|
19091
|
+
message: "Automatic authentication has been disabled. You may call the authentication() method."
|
|
19092
|
+
});
|
|
19093
|
+
}
|
|
19094
|
+
this.logger.info(`Silent authentication failed, falling back to interactive method.`);
|
|
19095
|
+
return this.doGetToken(scopes, options);
|
|
19096
|
+
}
|
|
19097
|
+
}
|
|
19098
|
+
/**
|
|
19099
|
+
* Handles the MSAL authentication result.
|
|
19100
|
+
* If the result has an account, we update the local account reference.
|
|
19101
|
+
* If the token received is invalid, an error will be thrown depending on what's missing.
|
|
19102
|
+
*/
|
|
19103
|
+
handleResult(scopes, result, getTokenOptions) {
|
|
19104
|
+
if (result === null || result === void 0 ? void 0 : result.account) {
|
|
19105
|
+
this.account = msalToPublic(this.clientId, result.account);
|
|
19106
|
+
}
|
|
19107
|
+
ensureValidMsalToken(scopes, result, getTokenOptions);
|
|
19108
|
+
this.logger.getToken.info(formatSuccess(scopes));
|
|
19109
|
+
return {
|
|
19110
|
+
token: result.accessToken,
|
|
19111
|
+
expiresOnTimestamp: result.expiresOn.getTime()
|
|
19112
|
+
};
|
|
19005
19113
|
}
|
|
19006
19114
|
};
|
|
19007
|
-
__name(
|
|
19008
|
-
var
|
|
19115
|
+
__name(_MsalNode, "MsalNode");
|
|
19116
|
+
var MsalNode = _MsalNode;
|
|
19009
19117
|
var interactiveBrowserMockable = {
|
|
19010
19118
|
open
|
|
19011
19119
|
};
|
|
@@ -19094,7 +19202,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19094
19202
|
};
|
|
19095
19203
|
__name(_MsalOpenBrowser, "MsalOpenBrowser");
|
|
19096
19204
|
var MsalOpenBrowser = _MsalOpenBrowser;
|
|
19097
|
-
var logger$
|
|
19205
|
+
var logger$4 = credentialLogger("InteractiveBrowserCredential");
|
|
19098
19206
|
var _InteractiveBrowserCredential = class _InteractiveBrowserCredential {
|
|
19099
19207
|
/**
|
|
19100
19208
|
* Creates an instance of InteractiveBrowserCredential with the details needed.
|
|
@@ -19120,7 +19228,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19120
19228
|
} else {
|
|
19121
19229
|
this.msalFlow = new MsalOpenBrowser(Object.assign(Object.assign({}, options), {
|
|
19122
19230
|
tokenCredentialOptions: options,
|
|
19123
|
-
logger: logger$
|
|
19231
|
+
logger: logger$4,
|
|
19124
19232
|
redirectUri,
|
|
19125
19233
|
browserCustomizationOptions: ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.browserCustomizationOptions,
|
|
19126
19234
|
brokerOptions: {
|
|
@@ -19134,7 +19242,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19134
19242
|
} else {
|
|
19135
19243
|
this.msalFlow = new MsalOpenBrowser(Object.assign(Object.assign({}, options), {
|
|
19136
19244
|
tokenCredentialOptions: options,
|
|
19137
|
-
logger: logger$
|
|
19245
|
+
logger: logger$4,
|
|
19138
19246
|
redirectUri,
|
|
19139
19247
|
browserCustomizationOptions: ibcNodeOptions === null || ibcNodeOptions === void 0 ? void 0 : ibcNodeOptions.browserCustomizationOptions
|
|
19140
19248
|
}));
|
|
@@ -19155,7 +19263,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19155
19263
|
*/
|
|
19156
19264
|
async getToken(scopes, options = {}) {
|
|
19157
19265
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
|
|
19158
|
-
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$
|
|
19266
|
+
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$4);
|
|
19159
19267
|
const arrayScopes = ensureScopes(scopes);
|
|
19160
19268
|
return this.msalFlow.getToken(arrayScopes, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
|
|
19161
19269
|
});
|
|
@@ -19183,34 +19291,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19183
19291
|
};
|
|
19184
19292
|
__name(_InteractiveBrowserCredential, "InteractiveBrowserCredential");
|
|
19185
19293
|
var InteractiveBrowserCredential2 = _InteractiveBrowserCredential;
|
|
19186
|
-
var
|
|
19187
|
-
constructor(options) {
|
|
19188
|
-
super(options);
|
|
19189
|
-
this.userPromptCallback = options.userPromptCallback;
|
|
19190
|
-
}
|
|
19191
|
-
async doGetToken(scopes, options) {
|
|
19192
|
-
try {
|
|
19193
|
-
const requestOptions = {
|
|
19194
|
-
deviceCodeCallback: this.userPromptCallback,
|
|
19195
|
-
scopes,
|
|
19196
|
-
cancel: false,
|
|
19197
|
-
correlationId: options === null || options === void 0 ? void 0 : options.correlationId,
|
|
19198
|
-
authority: options === null || options === void 0 ? void 0 : options.authority,
|
|
19199
|
-
claims: options === null || options === void 0 ? void 0 : options.claims
|
|
19200
|
-
};
|
|
19201
|
-
const promise = this.getApp("public", options === null || options === void 0 ? void 0 : options.enableCae).acquireTokenByDeviceCode(requestOptions);
|
|
19202
|
-
const deviceResponse = await this.withCancellation(promise, options === null || options === void 0 ? void 0 : options.abortSignal, () => {
|
|
19203
|
-
requestOptions.cancel = true;
|
|
19204
|
-
});
|
|
19205
|
-
return this.handleResult(scopes, deviceResponse || void 0);
|
|
19206
|
-
} catch (error) {
|
|
19207
|
-
throw handleMsalError(scopes, error, options);
|
|
19208
|
-
}
|
|
19209
|
-
}
|
|
19210
|
-
};
|
|
19211
|
-
__name(_MsalDeviceCode, "MsalDeviceCode");
|
|
19212
|
-
var MsalDeviceCode = _MsalDeviceCode;
|
|
19213
|
-
var logger$2 = credentialLogger("DeviceCodeCredential");
|
|
19294
|
+
var logger$3 = credentialLogger("DeviceCodeCredential");
|
|
19214
19295
|
function defaultDeviceCodePromptCallback(deviceCodeInfo) {
|
|
19215
19296
|
console.log(deviceCodeInfo.message);
|
|
19216
19297
|
}
|
|
@@ -19237,9 +19318,13 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19237
19318
|
* @param options - Options for configuring the client which makes the authentication requests.
|
|
19238
19319
|
*/
|
|
19239
19320
|
constructor(options) {
|
|
19321
|
+
var _a2, _b2;
|
|
19240
19322
|
this.tenantId = options === null || options === void 0 ? void 0 : options.tenantId;
|
|
19241
19323
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
19242
|
-
|
|
19324
|
+
const clientId = (_a2 = options === null || options === void 0 ? void 0 : options.clientId) !== null && _a2 !== void 0 ? _a2 : DeveloperSignOnClientId;
|
|
19325
|
+
const tenantId = resolveTenantId(logger$3, options === null || options === void 0 ? void 0 : options.tenantId, clientId);
|
|
19326
|
+
this.userPromptCallback = (_b2 = options === null || options === void 0 ? void 0 : options.userPromptCallback) !== null && _b2 !== void 0 ? _b2 : defaultDeviceCodePromptCallback;
|
|
19327
|
+
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$3, tokenCredentialOptions: options || {} }));
|
|
19243
19328
|
this.disableAutomaticAuthentication = options === null || options === void 0 ? void 0 : options.disableAutomaticAuthentication;
|
|
19244
19329
|
}
|
|
19245
19330
|
/**
|
|
@@ -19256,9 +19341,9 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19256
19341
|
*/
|
|
19257
19342
|
async getToken(scopes, options = {}) {
|
|
19258
19343
|
return tracingClient.withSpan(`${this.constructor.name}.getToken`, options, async (newOptions) => {
|
|
19259
|
-
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$
|
|
19344
|
+
newOptions.tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds, logger$3);
|
|
19260
19345
|
const arrayScopes = ensureScopes(scopes);
|
|
19261
|
-
return this.
|
|
19346
|
+
return this.msalClient.getTokenByDeviceCode(arrayScopes, this.userPromptCallback, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
|
|
19262
19347
|
});
|
|
19263
19348
|
}
|
|
19264
19349
|
/**
|
|
@@ -19274,48 +19359,106 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19274
19359
|
async authenticate(scopes, options = {}) {
|
|
19275
19360
|
return tracingClient.withSpan(`${this.constructor.name}.authenticate`, options, async (newOptions) => {
|
|
19276
19361
|
const arrayScopes = Array.isArray(scopes) ? scopes : [scopes];
|
|
19277
|
-
await this.
|
|
19278
|
-
return this.
|
|
19362
|
+
await this.msalClient.getTokenByDeviceCode(arrayScopes, this.userPromptCallback, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: false }));
|
|
19363
|
+
return this.msalClient.getActiveAccount();
|
|
19279
19364
|
});
|
|
19280
19365
|
}
|
|
19281
19366
|
};
|
|
19282
19367
|
__name(_DeviceCodeCredential, "DeviceCodeCredential");
|
|
19283
19368
|
var DeviceCodeCredential2 = _DeviceCodeCredential;
|
|
19284
|
-
var
|
|
19285
|
-
|
|
19286
|
-
|
|
19287
|
-
|
|
19288
|
-
|
|
19289
|
-
|
|
19290
|
-
|
|
19291
|
-
|
|
19292
|
-
|
|
19293
|
-
|
|
19294
|
-
|
|
19295
|
-
|
|
19296
|
-
|
|
19297
|
-
|
|
19298
|
-
|
|
19299
|
-
}
|
|
19369
|
+
var credentialName$1 = "AzurePipelinesCredential";
|
|
19370
|
+
var logger$2 = credentialLogger(credentialName$1);
|
|
19371
|
+
var OIDC_API_VERSION = "7.1";
|
|
19372
|
+
var _AzurePipelinesCredential = class _AzurePipelinesCredential {
|
|
19373
|
+
/**
|
|
19374
|
+
* AzurePipelinesCredential supports Federated Identity on Azure Pipelines through Service Connections.
|
|
19375
|
+
* @param tenantId - tenantId associated with the service connection
|
|
19376
|
+
* @param clientId - clientId associated with the service connection
|
|
19377
|
+
* @param serviceConnectionId - Unique ID for the service connection, as found in the querystring's resourceId key
|
|
19378
|
+
* @param systemAccessToken - The pipeline's <see href="https://learn.microsoft.com/azure/devops/pipelines/build/variables?view=azure-devops%26tabs=yaml#systemaccesstoken">System.AccessToken</see> value.
|
|
19379
|
+
* @param options - The identity client options to use for authentication.
|
|
19380
|
+
*/
|
|
19381
|
+
constructor(tenantId, clientId, serviceConnectionId, systemAccessToken, options) {
|
|
19382
|
+
if (!clientId || !tenantId || !serviceConnectionId || !systemAccessToken) {
|
|
19383
|
+
throw new CredentialUnavailableError(`${credentialName$1}: is unavailable. tenantId, clientId, serviceConnectionId, and systemAccessToken are required parameters.`);
|
|
19384
|
+
}
|
|
19385
|
+
this.identityClient = new IdentityClient(options);
|
|
19386
|
+
checkTenantId(logger$2, tenantId);
|
|
19387
|
+
logger$2.info(`Invoking AzurePipelinesCredential with tenant ID: ${tenantId}, client ID: ${clientId}, and service connection ID: ${serviceConnectionId}`);
|
|
19388
|
+
if (!process.env.SYSTEM_OIDCREQUESTURI) {
|
|
19389
|
+
throw new CredentialUnavailableError(`${credentialName$1}: is unavailable. Ensure that you're running this task in an Azure Pipeline, so that following missing system variable(s) can be defined- "SYSTEM_OIDCREQUESTURI"`);
|
|
19390
|
+
}
|
|
19391
|
+
const oidcRequestUrl = `${process.env.SYSTEM_OIDCREQUESTURI}?api-version=${OIDC_API_VERSION}&serviceConnectionId=${serviceConnectionId}`;
|
|
19392
|
+
logger$2.info(`Invoking ClientAssertionCredential with tenant ID: ${tenantId}, client ID: ${clientId} and service connection ID: ${serviceConnectionId}`);
|
|
19393
|
+
this.clientAssertionCredential = new ClientAssertionCredential(tenantId, clientId, this.requestOidcToken.bind(this, oidcRequestUrl, systemAccessToken), options);
|
|
19394
|
+
}
|
|
19395
|
+
/**
|
|
19396
|
+
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
19397
|
+
* If authentication fails, a {@link CredentialUnavailableError} or {@link AuthenticationError} will be thrown with the details of the failure.
|
|
19398
|
+
*
|
|
19399
|
+
* @param scopes - The list of scopes for which the token will have access.
|
|
19400
|
+
* @param options - The options used to configure any requests this
|
|
19401
|
+
* TokenCredential implementation might make.
|
|
19402
|
+
*/
|
|
19403
|
+
async getToken(scopes, options) {
|
|
19404
|
+
if (!this.clientAssertionCredential) {
|
|
19405
|
+
const errorMessage = `${credentialName$1}: is unavailable. To use Federation Identity in Azure Pipelines, the following parameters are required -
|
|
19406
|
+
tenantId,
|
|
19407
|
+
clientId,
|
|
19408
|
+
serviceConnectionId,
|
|
19409
|
+
systemAccessToken,
|
|
19410
|
+
"SYSTEM_OIDCREQUESTURI".
|
|
19411
|
+
See the troubleshooting guide for more information: https://aka.ms/azsdk/js/identity/azurepipelinescredential/troubleshoot`;
|
|
19412
|
+
logger$2.error(errorMessage);
|
|
19413
|
+
throw new CredentialUnavailableError(errorMessage);
|
|
19414
|
+
}
|
|
19415
|
+
logger$2.info("Invoking getToken() of Client Assertion Credential");
|
|
19416
|
+
return this.clientAssertionCredential.getToken(scopes, options);
|
|
19300
19417
|
}
|
|
19301
|
-
|
|
19418
|
+
/**
|
|
19419
|
+
*
|
|
19420
|
+
* @param oidcRequestUrl - oidc request url
|
|
19421
|
+
* @param systemAccessToken - system access token
|
|
19422
|
+
* @returns OIDC token from Azure Pipelines
|
|
19423
|
+
*/
|
|
19424
|
+
async requestOidcToken(oidcRequestUrl, systemAccessToken) {
|
|
19425
|
+
logger$2.info("Requesting OIDC token from Azure Pipelines...");
|
|
19426
|
+
logger$2.info(oidcRequestUrl);
|
|
19427
|
+
const request = coreRestPipeline.createPipelineRequest({
|
|
19428
|
+
url: oidcRequestUrl,
|
|
19429
|
+
method: "POST",
|
|
19430
|
+
headers: coreRestPipeline.createHttpHeaders({
|
|
19431
|
+
"Content-Type": "application/json",
|
|
19432
|
+
Authorization: `Bearer ${systemAccessToken}`
|
|
19433
|
+
})
|
|
19434
|
+
});
|
|
19435
|
+
const response = await this.identityClient.sendRequest(request);
|
|
19436
|
+
const text = response.bodyAsText;
|
|
19437
|
+
if (!text) {
|
|
19438
|
+
logger$2.error(`${credentialName$1}: Authenticated Failed. Received null token from OIDC request. Response status- ${response.status}. Complete response - ${JSON.stringify(response)}`);
|
|
19439
|
+
throw new AuthenticationError(response.status, `${credentialName$1}: Authenticated Failed. Received null token from OIDC request. Response status- ${response.status}. Complete response - ${JSON.stringify(response)}`);
|
|
19440
|
+
}
|
|
19302
19441
|
try {
|
|
19303
|
-
const result =
|
|
19304
|
-
|
|
19305
|
-
|
|
19306
|
-
|
|
19307
|
-
|
|
19308
|
-
|
|
19309
|
-
|
|
19310
|
-
|
|
19311
|
-
|
|
19312
|
-
|
|
19313
|
-
|
|
19442
|
+
const result = JSON.parse(text);
|
|
19443
|
+
if (result === null || result === void 0 ? void 0 : result.oidcToken) {
|
|
19444
|
+
return result.oidcToken;
|
|
19445
|
+
} else {
|
|
19446
|
+
let errorMessage = `${credentialName$1}: Authentication Failed. oidcToken field not detected in the response.`;
|
|
19447
|
+
if (response.status !== 200) {
|
|
19448
|
+
errorMessage += `Response = ${JSON.stringify(result)}`;
|
|
19449
|
+
}
|
|
19450
|
+
logger$2.error(errorMessage);
|
|
19451
|
+
throw new AuthenticationError(response.status, errorMessage);
|
|
19452
|
+
}
|
|
19453
|
+
} catch (e) {
|
|
19454
|
+
logger$2.error(e.message);
|
|
19455
|
+
logger$2.error(`${credentialName$1}: Authentication Failed. oidcToken field not detected in the response. Response = ${text}`);
|
|
19456
|
+
throw new AuthenticationError(response.status, `${credentialName$1}: Authentication Failed. oidcToken field not detected in the response. Response = ${text}`);
|
|
19314
19457
|
}
|
|
19315
19458
|
}
|
|
19316
19459
|
};
|
|
19317
|
-
__name(
|
|
19318
|
-
var
|
|
19460
|
+
__name(_AzurePipelinesCredential, "AzurePipelinesCredential");
|
|
19461
|
+
var AzurePipelinesCredential = _AzurePipelinesCredential;
|
|
19319
19462
|
var logger$1 = credentialLogger("AuthorizationCodeCredential");
|
|
19320
19463
|
var _AuthorizationCodeCredential = class _AuthorizationCodeCredential {
|
|
19321
19464
|
/**
|
|
@@ -19324,27 +19467,19 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19324
19467
|
*/
|
|
19325
19468
|
constructor(tenantId, clientId, clientSecretOrAuthorizationCode, authorizationCodeOrRedirectUri, redirectUriOrOptions, options) {
|
|
19326
19469
|
checkTenantId(logger$1, tenantId);
|
|
19327
|
-
|
|
19470
|
+
this.clientSecret = clientSecretOrAuthorizationCode;
|
|
19328
19471
|
if (typeof redirectUriOrOptions === "string") {
|
|
19329
19472
|
this.authorizationCode = authorizationCodeOrRedirectUri;
|
|
19330
19473
|
this.redirectUri = redirectUriOrOptions;
|
|
19331
19474
|
} else {
|
|
19332
19475
|
this.authorizationCode = clientSecretOrAuthorizationCode;
|
|
19333
19476
|
this.redirectUri = authorizationCodeOrRedirectUri;
|
|
19334
|
-
clientSecret = void 0;
|
|
19477
|
+
this.clientSecret = void 0;
|
|
19335
19478
|
options = redirectUriOrOptions;
|
|
19336
19479
|
}
|
|
19337
19480
|
this.tenantId = tenantId;
|
|
19338
19481
|
this.additionallyAllowedTenantIds = resolveAdditionallyAllowedTenantIds(options === null || options === void 0 ? void 0 : options.additionallyAllowedTenants);
|
|
19339
|
-
this.
|
|
19340
|
-
clientSecret,
|
|
19341
|
-
clientId,
|
|
19342
|
-
tenantId,
|
|
19343
|
-
tokenCredentialOptions: options || {},
|
|
19344
|
-
logger: logger$1,
|
|
19345
|
-
redirectUri: this.redirectUri,
|
|
19346
|
-
authorizationCode: this.authorizationCode
|
|
19347
|
-
}));
|
|
19482
|
+
this.msalClient = createMsalClient(clientId, tenantId, Object.assign(Object.assign({}, options), { logger: logger$1, tokenCredentialOptions: options !== null && options !== void 0 ? options : {} }));
|
|
19348
19483
|
}
|
|
19349
19484
|
/**
|
|
19350
19485
|
* Authenticates with Microsoft Entra ID and returns an access token if successful.
|
|
@@ -19359,7 +19494,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19359
19494
|
const tenantId = processMultiTenantRequest(this.tenantId, newOptions, this.additionallyAllowedTenantIds);
|
|
19360
19495
|
newOptions.tenantId = tenantId;
|
|
19361
19496
|
const arrayScopes = ensureScopes(scopes);
|
|
19362
|
-
return this.
|
|
19497
|
+
return this.msalClient.getTokenByAuthorizationCode(arrayScopes, this.redirectUri, this.authorizationCode, this.clientSecret, Object.assign(Object.assign({}, newOptions), { disableAutomaticAuthentication: this.disableAutomaticAuthentication }));
|
|
19363
19498
|
});
|
|
19364
19499
|
}
|
|
19365
19500
|
};
|
|
@@ -19507,6 +19642,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19507
19642
|
exports.AuthorizationCodeCredential = AuthorizationCodeCredential;
|
|
19508
19643
|
exports.AzureCliCredential = AzureCliCredential2;
|
|
19509
19644
|
exports.AzureDeveloperCliCredential = AzureDeveloperCliCredential;
|
|
19645
|
+
exports.AzurePipelinesCredential = AzurePipelinesCredential;
|
|
19510
19646
|
exports.AzurePowerShellCredential = AzurePowerShellCredential;
|
|
19511
19647
|
exports.ChainedTokenCredential = ChainedTokenCredential;
|
|
19512
19648
|
exports.ClientAssertionCredential = ClientAssertionCredential;
|
|
@@ -19526,7 +19662,7 @@ To work with multiple accounts for the same Client ID and Tenant ID, please prov
|
|
|
19526
19662
|
exports.deserializeAuthenticationRecord = deserializeAuthenticationRecord2;
|
|
19527
19663
|
exports.getBearerTokenProvider = getBearerTokenProvider;
|
|
19528
19664
|
exports.getDefaultAzureCredential = getDefaultAzureCredential;
|
|
19529
|
-
exports.logger = logger$
|
|
19665
|
+
exports.logger = logger$q;
|
|
19530
19666
|
exports.serializeAuthenticationRecord = serializeAuthenticationRecord2;
|
|
19531
19667
|
exports.useIdentityPlugin = useIdentityPlugin2;
|
|
19532
19668
|
}
|
|
@@ -20348,300 +20484,297 @@ export {
|
|
|
20348
20484
|
};
|
|
20349
20485
|
/*! Bundled license information:
|
|
20350
20486
|
|
|
20351
|
-
.store/@azure-msal-node-npm-2.
|
|
20352
|
-
(*! @azure/msal-node v2.
|
|
20353
|
-
|
|
20354
|
-
.store/@azure-msal-common-npm-14.12.0-b3576c04b2/package/dist/utils/Constants.mjs:
|
|
20355
|
-
(*! @azure/msal-common v14.12.0 2024-06-10 *)
|
|
20487
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Serializer.mjs:
|
|
20488
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20356
20489
|
|
|
20357
|
-
.store/@azure-msal-common-npm-14.
|
|
20358
|
-
(*! @azure/msal-common v14.
|
|
20490
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/Constants.mjs:
|
|
20491
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20359
20492
|
|
|
20360
|
-
.store/@azure-msal-common-npm-14.
|
|
20361
|
-
(*! @azure/msal-common v14.
|
|
20493
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthErrorCodes.mjs:
|
|
20494
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20362
20495
|
|
|
20363
|
-
.store/@azure-msal-common-npm-14.
|
|
20364
|
-
(*! @azure/msal-common v14.
|
|
20496
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/AuthError.mjs:
|
|
20497
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20365
20498
|
|
|
20366
|
-
.store/@azure-msal-common-npm-14.
|
|
20367
|
-
(*! @azure/msal-common v14.
|
|
20499
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthErrorCodes.mjs:
|
|
20500
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20368
20501
|
|
|
20369
|
-
.store/@azure-msal-common-npm-14.
|
|
20370
|
-
(*! @azure/msal-common v14.
|
|
20502
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientAuthError.mjs:
|
|
20503
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20371
20504
|
|
|
20372
|
-
.store/@azure-msal-common-npm-14.
|
|
20373
|
-
(*! @azure/msal-common v14.
|
|
20505
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AuthToken.mjs:
|
|
20506
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20374
20507
|
|
|
20375
|
-
.store/@azure-msal-common-npm-14.
|
|
20376
|
-
(*! @azure/msal-common v14.
|
|
20508
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityType.mjs:
|
|
20509
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20377
20510
|
|
|
20378
|
-
.store/@azure-msal-common-npm-14.
|
|
20379
|
-
(*! @azure/msal-common v14.
|
|
20511
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/OpenIdConfigResponse.mjs:
|
|
20512
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20380
20513
|
|
|
20381
|
-
.store/@azure-msal-common-npm-14.
|
|
20382
|
-
(*! @azure/msal-common v14.
|
|
20514
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationErrorCodes.mjs:
|
|
20515
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20383
20516
|
|
|
20384
|
-
.store/@azure-msal-common-npm-14.
|
|
20385
|
-
(*! @azure/msal-common v14.
|
|
20517
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ClientConfigurationError.mjs:
|
|
20518
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20386
20519
|
|
|
20387
|
-
.store/@azure-msal-common-npm-14.
|
|
20388
|
-
(*! @azure/msal-common v14.
|
|
20520
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/StringUtils.mjs:
|
|
20521
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20389
20522
|
|
|
20390
|
-
.store/@azure-msal-common-npm-14.
|
|
20391
|
-
(*! @azure/msal-common v14.
|
|
20523
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/UrlUtils.mjs:
|
|
20524
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20392
20525
|
|
|
20393
|
-
.store/@azure-msal-common-npm-14.
|
|
20394
|
-
(*! @azure/msal-common v14.
|
|
20526
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/url/UrlString.mjs:
|
|
20527
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20395
20528
|
|
|
20396
|
-
.store/@azure-msal-common-npm-14.
|
|
20397
|
-
(*! @azure/msal-common v14.
|
|
20529
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityMetadata.mjs:
|
|
20530
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20398
20531
|
|
|
20399
|
-
.store/@azure-msal-common-npm-14.
|
|
20400
|
-
(*! @azure/msal-common v14.
|
|
20532
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/ProtocolMode.mjs:
|
|
20533
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20401
20534
|
|
|
20402
|
-
.store/@azure-msal-common-npm-14.
|
|
20403
|
-
(*! @azure/msal-common v14.
|
|
20535
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityOptions.mjs:
|
|
20536
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20404
20537
|
|
|
20405
|
-
.store/@azure-msal-common-npm-14.
|
|
20406
|
-
(*! @azure/msal-common v14.
|
|
20538
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryResponse.mjs:
|
|
20539
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20407
20540
|
|
|
20408
|
-
.store/@azure-msal-common-npm-14.
|
|
20409
|
-
(*! @azure/msal-common v14.
|
|
20541
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/CloudInstanceDiscoveryErrorResponse.mjs:
|
|
20542
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20410
20543
|
|
|
20411
|
-
.store/@azure-msal-common-npm-14.
|
|
20412
|
-
(*! @azure/msal-common v14.
|
|
20544
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/performance/PerformanceEvent.mjs:
|
|
20545
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20413
20546
|
|
|
20414
|
-
.store/@azure-msal-common-npm-14.
|
|
20415
|
-
(*! @azure/msal-common v14.
|
|
20547
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/FunctionWrappers.mjs:
|
|
20548
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20416
20549
|
|
|
20417
|
-
.store/@azure-msal-common-npm-14.
|
|
20418
|
-
(*! @azure/msal-common v14.
|
|
20550
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/RegionDiscovery.mjs:
|
|
20551
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20419
20552
|
|
|
20420
|
-
.store/@azure-msal-common-npm-14.
|
|
20421
|
-
(*! @azure/msal-common v14.
|
|
20553
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/TimeUtils.mjs:
|
|
20554
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20422
20555
|
|
|
20423
|
-
.store/@azure-msal-common-npm-14.
|
|
20424
|
-
(*! @azure/msal-common v14.
|
|
20556
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/utils/CacheHelpers.mjs:
|
|
20557
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20425
20558
|
|
|
20426
|
-
.store/@azure-msal-common-npm-14.
|
|
20427
|
-
(*! @azure/msal-common v14.
|
|
20559
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/Authority.mjs:
|
|
20560
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20428
20561
|
|
|
20429
|
-
.store/@azure-msal-common-npm-14.
|
|
20430
|
-
(*! @azure/msal-common v14.
|
|
20562
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/authority/AuthorityFactory.mjs:
|
|
20563
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20431
20564
|
|
|
20432
|
-
.store/@azure-msal-common-npm-14.
|
|
20433
|
-
(*! @azure/msal-common v14.
|
|
20565
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ClientAssertionUtils.mjs:
|
|
20566
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20434
20567
|
|
|
20435
|
-
.store/@azure-msal-common-npm-14.
|
|
20436
|
-
(*! @azure/msal-common v14.
|
|
20568
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/constants/AADServerParamKeys.mjs:
|
|
20569
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20437
20570
|
|
|
20438
|
-
.store/@azure-msal-common-npm-14.
|
|
20439
|
-
(*! @azure/msal-common v14.
|
|
20571
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/ICrypto.mjs:
|
|
20572
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20440
20573
|
|
|
20441
|
-
.store/@azure-msal-common-npm-14.
|
|
20442
|
-
(*! @azure/msal-common v14.
|
|
20574
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/logger/Logger.mjs:
|
|
20575
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20443
20576
|
|
|
20444
|
-
.store/@azure-msal-common-npm-14.
|
|
20445
|
-
(*! @azure/msal-common v14.
|
|
20577
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/packageMetadata.mjs:
|
|
20578
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20446
20579
|
|
|
20447
|
-
.store/@azure-msal-common-npm-14.
|
|
20448
|
-
(*! @azure/msal-common v14.
|
|
20580
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/ScopeSet.mjs:
|
|
20581
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20449
20582
|
|
|
20450
|
-
.store/@azure-msal-common-npm-14.
|
|
20451
|
-
(*! @azure/msal-common v14.
|
|
20583
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/ClientInfo.mjs:
|
|
20584
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20452
20585
|
|
|
20453
|
-
.store/@azure-msal-common-npm-14.
|
|
20454
|
-
(*! @azure/msal-common v14.
|
|
20586
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/AccountInfo.mjs:
|
|
20587
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20455
20588
|
|
|
20456
|
-
.store/@azure-msal-common-npm-14.
|
|
20457
|
-
(*! @azure/msal-common v14.
|
|
20589
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/TokenClaims.mjs:
|
|
20590
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20458
20591
|
|
|
20459
|
-
.store/@azure-msal-common-npm-14.
|
|
20460
|
-
(*! @azure/msal-common v14.
|
|
20592
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/entities/AccountEntity.mjs:
|
|
20593
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20461
20594
|
|
|
20462
|
-
.store/@azure-msal-common-npm-14.
|
|
20463
|
-
(*! @azure/msal-common v14.
|
|
20595
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheErrorCodes.mjs:
|
|
20596
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20464
20597
|
|
|
20465
|
-
.store/@azure-msal-common-npm-14.
|
|
20466
|
-
(*! @azure/msal-common v14.
|
|
20598
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/CacheError.mjs:
|
|
20599
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20467
20600
|
|
|
20468
|
-
.store/@azure-msal-common-npm-14.
|
|
20469
|
-
(*! @azure/msal-common v14.
|
|
20601
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/CacheManager.mjs:
|
|
20602
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20470
20603
|
|
|
20471
|
-
.store/@azure-msal-common-npm-14.
|
|
20472
|
-
(*! @azure/msal-common v14.
|
|
20604
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/config/ClientConfiguration.mjs:
|
|
20605
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20473
20606
|
|
|
20474
|
-
.store/@azure-msal-common-npm-14.
|
|
20475
|
-
(*! @azure/msal-common v14.
|
|
20607
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/ServerError.mjs:
|
|
20608
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20476
20609
|
|
|
20477
|
-
.store/@azure-msal-common-npm-14.
|
|
20478
|
-
(*! @azure/msal-common v14.
|
|
20610
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/ThrottlingUtils.mjs:
|
|
20611
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20479
20612
|
|
|
20480
|
-
.store/@azure-msal-common-npm-14.
|
|
20481
|
-
(*! @azure/msal-common v14.
|
|
20613
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/network/NetworkManager.mjs:
|
|
20614
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20482
20615
|
|
|
20483
|
-
.store/@azure-msal-common-npm-14.
|
|
20484
|
-
(*! @azure/msal-common v14.
|
|
20616
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/account/CcsCredential.mjs:
|
|
20617
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20485
20618
|
|
|
20486
|
-
.store/@azure-msal-common-npm-14.
|
|
20487
|
-
(*! @azure/msal-common v14.
|
|
20619
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestValidator.mjs:
|
|
20620
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20488
20621
|
|
|
20489
|
-
.store/@azure-msal-common-npm-14.
|
|
20490
|
-
(*! @azure/msal-common v14.
|
|
20622
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/request/RequestParameterBuilder.mjs:
|
|
20623
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20491
20624
|
|
|
20492
|
-
.store/@azure-msal-common-npm-14.
|
|
20493
|
-
(*! @azure/msal-common v14.
|
|
20625
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/BaseClient.mjs:
|
|
20626
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20494
20627
|
|
|
20495
|
-
.store/@azure-msal-common-npm-14.
|
|
20496
|
-
(*! @azure/msal-common v14.
|
|
20628
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthErrorCodes.mjs:
|
|
20629
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20497
20630
|
|
|
20498
|
-
.store/@azure-msal-common-npm-14.
|
|
20499
|
-
(*! @azure/msal-common v14.
|
|
20631
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/error/InteractionRequiredAuthError.mjs:
|
|
20632
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20500
20633
|
|
|
20501
|
-
.store/@azure-msal-common-npm-14.
|
|
20502
|
-
(*! @azure/msal-common v14.
|
|
20634
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/utils/ProtocolUtils.mjs:
|
|
20635
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20503
20636
|
|
|
20504
|
-
.store/@azure-msal-common-npm-14.
|
|
20505
|
-
(*! @azure/msal-common v14.
|
|
20637
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/crypto/PopTokenGenerator.mjs:
|
|
20638
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20506
20639
|
|
|
20507
|
-
.store/@azure-msal-common-npm-14.
|
|
20508
|
-
(*! @azure/msal-common v14.
|
|
20640
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/cache/persistence/TokenCacheContext.mjs:
|
|
20641
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20509
20642
|
|
|
20510
|
-
.store/@azure-msal-common-npm-14.
|
|
20511
|
-
(*! @azure/msal-common v14.
|
|
20643
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/response/ResponseHandler.mjs:
|
|
20644
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20512
20645
|
|
|
20513
|
-
.store/@azure-msal-common-npm-14.
|
|
20514
|
-
(*! @azure/msal-common v14.
|
|
20646
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/AuthorizationCodeClient.mjs:
|
|
20647
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20515
20648
|
|
|
20516
|
-
.store/@azure-msal-common-npm-14.
|
|
20517
|
-
(*! @azure/msal-common v14.
|
|
20649
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/RefreshTokenClient.mjs:
|
|
20650
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20518
20651
|
|
|
20519
|
-
.store/@azure-msal-common-npm-14.
|
|
20520
|
-
(*! @azure/msal-common v14.
|
|
20652
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/client/SilentFlowClient.mjs:
|
|
20653
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20521
20654
|
|
|
20522
|
-
.store/@azure-msal-common-npm-14.
|
|
20523
|
-
(*! @azure/msal-common v14.
|
|
20655
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/telemetry/server/ServerTelemetryManager.mjs:
|
|
20656
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20524
20657
|
|
|
20525
|
-
.store/@azure-msal-common-npm-14.
|
|
20526
|
-
(*! @azure/msal-common v14.
|
|
20658
|
+
.store/@azure-msal-common-npm-14.13.0-f77242c157/package/dist/index.mjs:
|
|
20659
|
+
(*! @azure/msal-common v14.13.0 2024-07-01 *)
|
|
20527
20660
|
|
|
20528
|
-
.store/@azure-msal-node-npm-2.
|
|
20529
|
-
(*! @azure/msal-node v2.
|
|
20661
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/serializer/Deserializer.mjs:
|
|
20662
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20530
20663
|
|
|
20531
|
-
.store/@azure-msal-node-npm-2.
|
|
20532
|
-
(*! @azure/msal-node v2.
|
|
20664
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/internals.mjs:
|
|
20665
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20533
20666
|
|
|
20534
|
-
.store/@azure-msal-node-npm-2.
|
|
20535
|
-
(*! @azure/msal-node v2.
|
|
20667
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/Constants.mjs:
|
|
20668
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20536
20669
|
|
|
20537
|
-
.store/@azure-msal-node-npm-2.
|
|
20538
|
-
(*! @azure/msal-node v2.
|
|
20670
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/NetworkUtils.mjs:
|
|
20671
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20539
20672
|
|
|
20540
|
-
.store/@azure-msal-node-npm-2.
|
|
20541
|
-
(*! @azure/msal-node v2.
|
|
20673
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClient.mjs:
|
|
20674
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20542
20675
|
|
|
20543
|
-
.store/@azure-msal-node-npm-2.
|
|
20544
|
-
(*! @azure/msal-node v2.
|
|
20676
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityErrorCodes.mjs:
|
|
20677
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20545
20678
|
|
|
20546
|
-
.store/@azure-msal-node-npm-2.
|
|
20547
|
-
(*! @azure/msal-node v2.
|
|
20679
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/ManagedIdentityError.mjs:
|
|
20680
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20548
20681
|
|
|
20549
|
-
.store/@azure-msal-node-npm-2.
|
|
20550
|
-
(*! @azure/msal-node v2.
|
|
20682
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityId.mjs:
|
|
20683
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20551
20684
|
|
|
20552
|
-
.store/@azure-msal-node-npm-2.
|
|
20553
|
-
(*! @azure/msal-node v2.
|
|
20685
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/retry/LinearRetryPolicy.mjs:
|
|
20686
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20554
20687
|
|
|
20555
|
-
.store/@azure-msal-node-npm-2.
|
|
20556
|
-
(*! @azure/msal-node v2.
|
|
20688
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/HttpClientWithRetries.mjs:
|
|
20689
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20557
20690
|
|
|
20558
|
-
.store/@azure-msal-node-npm-2.
|
|
20559
|
-
(*! @azure/msal-node v2.
|
|
20691
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/error/NodeAuthError.mjs:
|
|
20692
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20560
20693
|
|
|
20561
|
-
.store/@azure-msal-node-npm-2.
|
|
20562
|
-
(*! @azure/msal-node v2.
|
|
20694
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/Configuration.mjs:
|
|
20695
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20563
20696
|
|
|
20564
|
-
.store/@azure-msal-node-npm-2.
|
|
20565
|
-
(*! @azure/msal-node v2.
|
|
20697
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/GuidGenerator.mjs:
|
|
20698
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20566
20699
|
|
|
20567
|
-
.store/@azure-msal-node-npm-2.
|
|
20568
|
-
(*! @azure/msal-node v2.
|
|
20700
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/utils/EncodingUtils.mjs:
|
|
20701
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20569
20702
|
|
|
20570
|
-
.store/@azure-msal-node-npm-2.
|
|
20571
|
-
(*! @azure/msal-node v2.
|
|
20703
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/HashUtils.mjs:
|
|
20704
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20572
20705
|
|
|
20573
|
-
.store/@azure-msal-node-npm-2.
|
|
20574
|
-
(*! @azure/msal-node v2.
|
|
20706
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/PkceGenerator.mjs:
|
|
20707
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20575
20708
|
|
|
20576
|
-
.store/@azure-msal-node-npm-2.
|
|
20577
|
-
(*! @azure/msal-node v2.
|
|
20709
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/crypto/CryptoProvider.mjs:
|
|
20710
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20578
20711
|
|
|
20579
|
-
.store/@azure-msal-node-npm-2.
|
|
20580
|
-
(*! @azure/msal-node v2.
|
|
20712
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/NodeStorage.mjs:
|
|
20713
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20581
20714
|
|
|
20582
|
-
.store/@azure-msal-node-npm-2.
|
|
20583
|
-
(*! @azure/msal-node v2.
|
|
20715
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/TokenCache.mjs:
|
|
20716
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20584
20717
|
|
|
20585
|
-
.store/@azure-msal-node-npm-2.
|
|
20586
|
-
(*! @azure/msal-node v2.
|
|
20718
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientAssertion.mjs:
|
|
20719
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20587
20720
|
|
|
20588
|
-
.store/@azure-msal-node-npm-2.
|
|
20589
|
-
(*! @azure/msal-node v2.
|
|
20721
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/packageMetadata.mjs:
|
|
20722
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20590
20723
|
|
|
20591
|
-
.store/@azure-msal-node-npm-2.
|
|
20592
|
-
(*! @azure/msal-node v2.
|
|
20724
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/UsernamePasswordClient.mjs:
|
|
20725
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20593
20726
|
|
|
20594
|
-
.store/@azure-msal-node-npm-2.
|
|
20595
|
-
(*! @azure/msal-node v2.
|
|
20727
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientApplication.mjs:
|
|
20728
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20596
20729
|
|
|
20597
|
-
.store/@azure-msal-node-npm-2.
|
|
20598
|
-
(*! @azure/msal-node v2.
|
|
20730
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/network/LoopbackClient.mjs:
|
|
20731
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20599
20732
|
|
|
20600
|
-
.store/@azure-msal-node-npm-2.
|
|
20601
|
-
(*! @azure/msal-node v2.
|
|
20733
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/DeviceCodeClient.mjs:
|
|
20734
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20602
20735
|
|
|
20603
|
-
.store/@azure-msal-node-npm-2.
|
|
20604
|
-
(*! @azure/msal-node v2.
|
|
20736
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/PublicClientApplication.mjs:
|
|
20737
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20605
20738
|
|
|
20606
|
-
.store/@azure-msal-node-npm-2.
|
|
20607
|
-
(*! @azure/msal-node v2.
|
|
20739
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ClientCredentialClient.mjs:
|
|
20740
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20608
20741
|
|
|
20609
|
-
.store/@azure-msal-node-npm-2.
|
|
20610
|
-
(*! @azure/msal-node v2.
|
|
20742
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/OnBehalfOfClient.mjs:
|
|
20743
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20611
20744
|
|
|
20612
|
-
.store/@azure-msal-node-npm-2.
|
|
20613
|
-
(*! @azure/msal-node v2.
|
|
20745
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ConfidentialClientApplication.mjs:
|
|
20746
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20614
20747
|
|
|
20615
|
-
.store/@azure-msal-node-npm-2.
|
|
20616
|
-
(*! @azure/msal-node v2.
|
|
20748
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/BaseManagedIdentitySource.mjs:
|
|
20749
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20617
20750
|
|
|
20618
|
-
.store/@azure-msal-node-npm-2.
|
|
20619
|
-
(*! @azure/msal-node v2.
|
|
20751
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/config/ManagedIdentityRequestParameters.mjs:
|
|
20752
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20620
20753
|
|
|
20621
|
-
.store/@azure-msal-node-npm-2.
|
|
20622
|
-
(*! @azure/msal-node v2.
|
|
20754
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AppService.mjs:
|
|
20755
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20623
20756
|
|
|
20624
|
-
.store/@azure-msal-node-npm-2.
|
|
20625
|
-
(*! @azure/msal-node v2.
|
|
20757
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/AzureArc.mjs:
|
|
20758
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20626
20759
|
|
|
20627
|
-
.store/@azure-msal-node-npm-2.
|
|
20628
|
-
(*! @azure/msal-node v2.
|
|
20760
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/CloudShell.mjs:
|
|
20761
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20629
20762
|
|
|
20630
|
-
.store/@azure-msal-node-npm-2.
|
|
20631
|
-
(*! @azure/msal-node v2.
|
|
20763
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/Imds.mjs:
|
|
20764
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20632
20765
|
|
|
20633
|
-
.store/@azure-msal-node-npm-2.
|
|
20634
|
-
(*! @azure/msal-node v2.
|
|
20766
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentitySources/ServiceFabric.mjs:
|
|
20767
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20635
20768
|
|
|
20636
|
-
.store/@azure-msal-node-npm-2.
|
|
20637
|
-
(*! @azure/msal-node v2.
|
|
20769
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityClient.mjs:
|
|
20770
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20638
20771
|
|
|
20639
|
-
.store/@azure-msal-node-npm-2.
|
|
20640
|
-
(*! @azure/msal-node v2.
|
|
20772
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/client/ManagedIdentityApplication.mjs:
|
|
20773
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20641
20774
|
|
|
20642
|
-
.store/@azure-msal-node-npm-2.
|
|
20643
|
-
(*! @azure/msal-node v2.
|
|
20775
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/cache/distributed/DistributedCachePlugin.mjs:
|
|
20776
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20644
20777
|
|
|
20645
|
-
.store/@azure-msal-node-npm-2.
|
|
20646
|
-
(*! @azure/msal-node v2.
|
|
20778
|
+
.store/@azure-msal-node-npm-2.11.0-da4be621f1/package/dist/index.mjs:
|
|
20779
|
+
(*! @azure/msal-node v2.11.0 2024-07-12 *)
|
|
20647
20780
|
*/
|