@naylence/runtime 0.3.5-test.921 → 0.3.5-test.922
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +112 -107
- package/dist/browser/index.mjs +108 -108
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/security/index.js +2 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +112 -107
- package/dist/node/index.mjs +108 -108
- package/dist/node/node.cjs +112 -107
- package/dist/node/node.mjs +108 -108
- package/dist/types/naylence/fame/security/index.d.ts +2 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/browser/index.cjs
CHANGED
|
@@ -98,12 +98,12 @@ installProcessEnvShim();
|
|
|
98
98
|
// --- END ENV SHIM ---
|
|
99
99
|
|
|
100
100
|
// This file is auto-generated during build - do not edit manually
|
|
101
|
-
// Generated from package.json version: 0.3.5-test.
|
|
101
|
+
// Generated from package.json version: 0.3.5-test.922
|
|
102
102
|
/**
|
|
103
103
|
* The package version, injected at build time.
|
|
104
104
|
* @internal
|
|
105
105
|
*/
|
|
106
|
-
const VERSION = '0.3.5-test.
|
|
106
|
+
const VERSION = '0.3.5-test.922';
|
|
107
107
|
|
|
108
108
|
/**
|
|
109
109
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -25245,6 +25245,111 @@ class SigningConfig {
|
|
|
25245
25245
|
}
|
|
25246
25246
|
}
|
|
25247
25247
|
|
|
25248
|
+
function hasBuffer() {
|
|
25249
|
+
return typeof Buffer !== 'undefined';
|
|
25250
|
+
}
|
|
25251
|
+
function readStringProperty(source, ...names) {
|
|
25252
|
+
if (!source || typeof source !== 'object') {
|
|
25253
|
+
return undefined;
|
|
25254
|
+
}
|
|
25255
|
+
for (const name of names) {
|
|
25256
|
+
const value = source[name];
|
|
25257
|
+
if (typeof value === 'string' && value.length > 0) {
|
|
25258
|
+
return value;
|
|
25259
|
+
}
|
|
25260
|
+
}
|
|
25261
|
+
return undefined;
|
|
25262
|
+
}
|
|
25263
|
+
function decodePem(pem) {
|
|
25264
|
+
const base64 = pem
|
|
25265
|
+
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
25266
|
+
.replace(/-----END[^-]+-----/g, '')
|
|
25267
|
+
.replace(/\s+/g, '');
|
|
25268
|
+
if (typeof atob === 'function') {
|
|
25269
|
+
const binary = atob(base64);
|
|
25270
|
+
const bytes = new Uint8Array(binary.length);
|
|
25271
|
+
for (let i = 0; i < binary.length; i += 1) {
|
|
25272
|
+
bytes[i] = binary.charCodeAt(i);
|
|
25273
|
+
}
|
|
25274
|
+
return bytes;
|
|
25275
|
+
}
|
|
25276
|
+
if (hasBuffer()) {
|
|
25277
|
+
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
25278
|
+
}
|
|
25279
|
+
throw new Error('Base64 decoding is not available in this environment');
|
|
25280
|
+
}
|
|
25281
|
+
function readLength(data, offset) {
|
|
25282
|
+
const initial = data[offset];
|
|
25283
|
+
if (initial === undefined) {
|
|
25284
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
25285
|
+
}
|
|
25286
|
+
if ((initial & 0x80) === 0) {
|
|
25287
|
+
return { length: initial, nextOffset: offset + 1 };
|
|
25288
|
+
}
|
|
25289
|
+
const lengthOfLength = initial & 0x7f;
|
|
25290
|
+
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
25291
|
+
throw new Error('Unsupported ASN.1 length encoding');
|
|
25292
|
+
}
|
|
25293
|
+
let length = 0;
|
|
25294
|
+
let position = offset + 1;
|
|
25295
|
+
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
25296
|
+
const byte = data[position];
|
|
25297
|
+
if (byte === undefined) {
|
|
25298
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
25299
|
+
}
|
|
25300
|
+
length = (length << 8) | byte;
|
|
25301
|
+
position += 1;
|
|
25302
|
+
}
|
|
25303
|
+
return { length, nextOffset: position };
|
|
25304
|
+
}
|
|
25305
|
+
function readElement(data, offset, tag) {
|
|
25306
|
+
if (data[offset] !== tag) {
|
|
25307
|
+
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
25308
|
+
}
|
|
25309
|
+
const { length, nextOffset } = readLength(data, offset + 1);
|
|
25310
|
+
const contentOffset = nextOffset;
|
|
25311
|
+
return {
|
|
25312
|
+
length,
|
|
25313
|
+
contentOffset,
|
|
25314
|
+
nextOffset: contentOffset + length,
|
|
25315
|
+
};
|
|
25316
|
+
}
|
|
25317
|
+
function parseEd25519PrivateKey(pem) {
|
|
25318
|
+
const raw = decodePem(pem);
|
|
25319
|
+
if (raw.length === 32) {
|
|
25320
|
+
return raw.slice();
|
|
25321
|
+
}
|
|
25322
|
+
// Handle PKCS#8 structure defined in RFC 8410
|
|
25323
|
+
const sequence = readElement(raw, 0, 0x30);
|
|
25324
|
+
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
25325
|
+
let offset = version.nextOffset;
|
|
25326
|
+
const algorithm = readElement(raw, offset, 0x30);
|
|
25327
|
+
offset = algorithm.nextOffset;
|
|
25328
|
+
const privateKey = readElement(raw, offset, 0x04);
|
|
25329
|
+
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
25330
|
+
if (privateContent.length === 32) {
|
|
25331
|
+
return privateContent.slice();
|
|
25332
|
+
}
|
|
25333
|
+
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
25334
|
+
const innerLength = privateContent[1];
|
|
25335
|
+
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
25336
|
+
throw new Error('Unexpected Ed25519 private key length');
|
|
25337
|
+
}
|
|
25338
|
+
return privateContent.subarray(2, 34);
|
|
25339
|
+
}
|
|
25340
|
+
throw new Error('Unsupported Ed25519 private key structure');
|
|
25341
|
+
}
|
|
25342
|
+
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
25343
|
+
function encodeUtf8(value) {
|
|
25344
|
+
if (textEncoder) {
|
|
25345
|
+
return textEncoder.encode(value);
|
|
25346
|
+
}
|
|
25347
|
+
if (hasBuffer()) {
|
|
25348
|
+
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
25349
|
+
}
|
|
25350
|
+
throw new Error('No UTF-8 encoder available in this environment');
|
|
25351
|
+
}
|
|
25352
|
+
|
|
25248
25353
|
const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
|
|
25249
25354
|
let joseModulePromise = null;
|
|
25250
25355
|
async function requireJose() {
|
|
@@ -39352,111 +39457,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
39352
39457
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
39353
39458
|
});
|
|
39354
39459
|
|
|
39355
|
-
function hasBuffer() {
|
|
39356
|
-
return typeof Buffer !== 'undefined';
|
|
39357
|
-
}
|
|
39358
|
-
function readStringProperty(source, ...names) {
|
|
39359
|
-
if (!source || typeof source !== 'object') {
|
|
39360
|
-
return undefined;
|
|
39361
|
-
}
|
|
39362
|
-
for (const name of names) {
|
|
39363
|
-
const value = source[name];
|
|
39364
|
-
if (typeof value === 'string' && value.length > 0) {
|
|
39365
|
-
return value;
|
|
39366
|
-
}
|
|
39367
|
-
}
|
|
39368
|
-
return undefined;
|
|
39369
|
-
}
|
|
39370
|
-
function decodePem(pem) {
|
|
39371
|
-
const base64 = pem
|
|
39372
|
-
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
39373
|
-
.replace(/-----END[^-]+-----/g, '')
|
|
39374
|
-
.replace(/\s+/g, '');
|
|
39375
|
-
if (typeof atob === 'function') {
|
|
39376
|
-
const binary = atob(base64);
|
|
39377
|
-
const bytes = new Uint8Array(binary.length);
|
|
39378
|
-
for (let i = 0; i < binary.length; i += 1) {
|
|
39379
|
-
bytes[i] = binary.charCodeAt(i);
|
|
39380
|
-
}
|
|
39381
|
-
return bytes;
|
|
39382
|
-
}
|
|
39383
|
-
if (hasBuffer()) {
|
|
39384
|
-
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
39385
|
-
}
|
|
39386
|
-
throw new Error('Base64 decoding is not available in this environment');
|
|
39387
|
-
}
|
|
39388
|
-
function readLength(data, offset) {
|
|
39389
|
-
const initial = data[offset];
|
|
39390
|
-
if (initial === undefined) {
|
|
39391
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
39392
|
-
}
|
|
39393
|
-
if ((initial & 0x80) === 0) {
|
|
39394
|
-
return { length: initial, nextOffset: offset + 1 };
|
|
39395
|
-
}
|
|
39396
|
-
const lengthOfLength = initial & 0x7f;
|
|
39397
|
-
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
39398
|
-
throw new Error('Unsupported ASN.1 length encoding');
|
|
39399
|
-
}
|
|
39400
|
-
let length = 0;
|
|
39401
|
-
let position = offset + 1;
|
|
39402
|
-
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
39403
|
-
const byte = data[position];
|
|
39404
|
-
if (byte === undefined) {
|
|
39405
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
39406
|
-
}
|
|
39407
|
-
length = (length << 8) | byte;
|
|
39408
|
-
position += 1;
|
|
39409
|
-
}
|
|
39410
|
-
return { length, nextOffset: position };
|
|
39411
|
-
}
|
|
39412
|
-
function readElement(data, offset, tag) {
|
|
39413
|
-
if (data[offset] !== tag) {
|
|
39414
|
-
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
39415
|
-
}
|
|
39416
|
-
const { length, nextOffset } = readLength(data, offset + 1);
|
|
39417
|
-
const contentOffset = nextOffset;
|
|
39418
|
-
return {
|
|
39419
|
-
length,
|
|
39420
|
-
contentOffset,
|
|
39421
|
-
nextOffset: contentOffset + length,
|
|
39422
|
-
};
|
|
39423
|
-
}
|
|
39424
|
-
function parseEd25519PrivateKey(pem) {
|
|
39425
|
-
const raw = decodePem(pem);
|
|
39426
|
-
if (raw.length === 32) {
|
|
39427
|
-
return raw.slice();
|
|
39428
|
-
}
|
|
39429
|
-
// Handle PKCS#8 structure defined in RFC 8410
|
|
39430
|
-
const sequence = readElement(raw, 0, 0x30);
|
|
39431
|
-
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
39432
|
-
let offset = version.nextOffset;
|
|
39433
|
-
const algorithm = readElement(raw, offset, 0x30);
|
|
39434
|
-
offset = algorithm.nextOffset;
|
|
39435
|
-
const privateKey = readElement(raw, offset, 0x04);
|
|
39436
|
-
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
39437
|
-
if (privateContent.length === 32) {
|
|
39438
|
-
return privateContent.slice();
|
|
39439
|
-
}
|
|
39440
|
-
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
39441
|
-
const innerLength = privateContent[1];
|
|
39442
|
-
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
39443
|
-
throw new Error('Unexpected Ed25519 private key length');
|
|
39444
|
-
}
|
|
39445
|
-
return privateContent.subarray(2, 34);
|
|
39446
|
-
}
|
|
39447
|
-
throw new Error('Unsupported Ed25519 private key structure');
|
|
39448
|
-
}
|
|
39449
|
-
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
39450
|
-
function encodeUtf8(value) {
|
|
39451
|
-
if (textEncoder) {
|
|
39452
|
-
return textEncoder.encode(value);
|
|
39453
|
-
}
|
|
39454
|
-
if (hasBuffer()) {
|
|
39455
|
-
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
39456
|
-
}
|
|
39457
|
-
throw new Error('No UTF-8 encoder available in this environment');
|
|
39458
|
-
}
|
|
39459
|
-
|
|
39460
39460
|
if (!ed25519.hashes.sha512) {
|
|
39461
39461
|
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
39462
39462
|
}
|
|
@@ -40017,6 +40017,7 @@ exports.assertGrant = assertGrant;
|
|
|
40017
40017
|
exports.basicConfig = basicConfig;
|
|
40018
40018
|
exports.broadcastChannelGrantToConnectorConfig = broadcastChannelGrantToConnectorConfig;
|
|
40019
40019
|
exports.camelToSnakeCase = camelToSnakeCase;
|
|
40020
|
+
exports.canonicalJson = canonicalJson;
|
|
40020
40021
|
exports.capitalizeFirstLetter = capitalizeFirstLetter;
|
|
40021
40022
|
exports.color = color;
|
|
40022
40023
|
exports.compareCryptoLevels = compareCryptoLevels;
|
|
@@ -40036,12 +40037,14 @@ exports.createX25519Keypair = createX25519Keypair;
|
|
|
40036
40037
|
exports.credentialToString = credentialToString;
|
|
40037
40038
|
exports.currentTraceId = currentTraceId$1;
|
|
40038
40039
|
exports.debounce = debounce;
|
|
40040
|
+
exports.decodeBase64Url = decodeBase64Url;
|
|
40039
40041
|
exports.decodeFameDataPayload = decodeFameDataPayload;
|
|
40040
40042
|
exports.deepMerge = deepMerge;
|
|
40041
40043
|
exports.defaultJsonEncoder = defaultJsonEncoder;
|
|
40042
40044
|
exports.delay = delay;
|
|
40043
40045
|
exports.dropEmpty = dropEmpty;
|
|
40044
40046
|
exports.enableLogging = enableLogging;
|
|
40047
|
+
exports.encodeUtf8 = encodeUtf8;
|
|
40045
40048
|
exports.ensureRuntimeFactoriesRegistered = ensureRuntimeFactoriesRegistered;
|
|
40046
40049
|
exports.extractId = extractId;
|
|
40047
40050
|
exports.extractPoolAddressBase = extractPoolAddressBase;
|
|
@@ -40049,6 +40052,7 @@ exports.extractPoolBase = extractPoolBase;
|
|
|
40049
40052
|
exports.filterKeysByUse = filterKeysByUse;
|
|
40050
40053
|
exports.formatTimestamp = formatTimestamp;
|
|
40051
40054
|
exports.formatTimestampForConsole = formatTimestampForConsole$1;
|
|
40055
|
+
exports.frameDigest = frameDigest;
|
|
40052
40056
|
exports.getCurrentEnvelope = getCurrentEnvelope;
|
|
40053
40057
|
exports.getFameRoot = getFameRoot;
|
|
40054
40058
|
exports.getKeyProvider = getKeyProvider;
|
|
@@ -40058,6 +40062,7 @@ exports.hasCryptoSupport = hasCryptoSupport;
|
|
|
40058
40062
|
exports.hostnameToLogical = hostnameToLogical;
|
|
40059
40063
|
exports.hostnamesToLogicals = hostnamesToLogicals;
|
|
40060
40064
|
exports.httpGrantToConnectorConfig = httpGrantToConnectorConfig;
|
|
40065
|
+
exports.immutableHeaders = immutableHeaders;
|
|
40061
40066
|
exports.inPageGrantToConnectorConfig = inPageGrantToConnectorConfig;
|
|
40062
40067
|
exports.isAuthInjectionStrategy = isAuthInjectionStrategy;
|
|
40063
40068
|
exports.isBroadcastChannelConnectionGrant = isBroadcastChannelConnectionGrant;
|
package/dist/browser/index.mjs
CHANGED
|
@@ -96,12 +96,12 @@ installProcessEnvShim();
|
|
|
96
96
|
// --- END ENV SHIM ---
|
|
97
97
|
|
|
98
98
|
// This file is auto-generated during build - do not edit manually
|
|
99
|
-
// Generated from package.json version: 0.3.5-test.
|
|
99
|
+
// Generated from package.json version: 0.3.5-test.922
|
|
100
100
|
/**
|
|
101
101
|
* The package version, injected at build time.
|
|
102
102
|
* @internal
|
|
103
103
|
*/
|
|
104
|
-
const VERSION = '0.3.5-test.
|
|
104
|
+
const VERSION = '0.3.5-test.922';
|
|
105
105
|
|
|
106
106
|
/**
|
|
107
107
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -25243,6 +25243,111 @@ class SigningConfig {
|
|
|
25243
25243
|
}
|
|
25244
25244
|
}
|
|
25245
25245
|
|
|
25246
|
+
function hasBuffer() {
|
|
25247
|
+
return typeof Buffer !== 'undefined';
|
|
25248
|
+
}
|
|
25249
|
+
function readStringProperty(source, ...names) {
|
|
25250
|
+
if (!source || typeof source !== 'object') {
|
|
25251
|
+
return undefined;
|
|
25252
|
+
}
|
|
25253
|
+
for (const name of names) {
|
|
25254
|
+
const value = source[name];
|
|
25255
|
+
if (typeof value === 'string' && value.length > 0) {
|
|
25256
|
+
return value;
|
|
25257
|
+
}
|
|
25258
|
+
}
|
|
25259
|
+
return undefined;
|
|
25260
|
+
}
|
|
25261
|
+
function decodePem(pem) {
|
|
25262
|
+
const base64 = pem
|
|
25263
|
+
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
25264
|
+
.replace(/-----END[^-]+-----/g, '')
|
|
25265
|
+
.replace(/\s+/g, '');
|
|
25266
|
+
if (typeof atob === 'function') {
|
|
25267
|
+
const binary = atob(base64);
|
|
25268
|
+
const bytes = new Uint8Array(binary.length);
|
|
25269
|
+
for (let i = 0; i < binary.length; i += 1) {
|
|
25270
|
+
bytes[i] = binary.charCodeAt(i);
|
|
25271
|
+
}
|
|
25272
|
+
return bytes;
|
|
25273
|
+
}
|
|
25274
|
+
if (hasBuffer()) {
|
|
25275
|
+
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
25276
|
+
}
|
|
25277
|
+
throw new Error('Base64 decoding is not available in this environment');
|
|
25278
|
+
}
|
|
25279
|
+
function readLength(data, offset) {
|
|
25280
|
+
const initial = data[offset];
|
|
25281
|
+
if (initial === undefined) {
|
|
25282
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
25283
|
+
}
|
|
25284
|
+
if ((initial & 0x80) === 0) {
|
|
25285
|
+
return { length: initial, nextOffset: offset + 1 };
|
|
25286
|
+
}
|
|
25287
|
+
const lengthOfLength = initial & 0x7f;
|
|
25288
|
+
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
25289
|
+
throw new Error('Unsupported ASN.1 length encoding');
|
|
25290
|
+
}
|
|
25291
|
+
let length = 0;
|
|
25292
|
+
let position = offset + 1;
|
|
25293
|
+
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
25294
|
+
const byte = data[position];
|
|
25295
|
+
if (byte === undefined) {
|
|
25296
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
25297
|
+
}
|
|
25298
|
+
length = (length << 8) | byte;
|
|
25299
|
+
position += 1;
|
|
25300
|
+
}
|
|
25301
|
+
return { length, nextOffset: position };
|
|
25302
|
+
}
|
|
25303
|
+
function readElement(data, offset, tag) {
|
|
25304
|
+
if (data[offset] !== tag) {
|
|
25305
|
+
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
25306
|
+
}
|
|
25307
|
+
const { length, nextOffset } = readLength(data, offset + 1);
|
|
25308
|
+
const contentOffset = nextOffset;
|
|
25309
|
+
return {
|
|
25310
|
+
length,
|
|
25311
|
+
contentOffset,
|
|
25312
|
+
nextOffset: contentOffset + length,
|
|
25313
|
+
};
|
|
25314
|
+
}
|
|
25315
|
+
function parseEd25519PrivateKey(pem) {
|
|
25316
|
+
const raw = decodePem(pem);
|
|
25317
|
+
if (raw.length === 32) {
|
|
25318
|
+
return raw.slice();
|
|
25319
|
+
}
|
|
25320
|
+
// Handle PKCS#8 structure defined in RFC 8410
|
|
25321
|
+
const sequence = readElement(raw, 0, 0x30);
|
|
25322
|
+
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
25323
|
+
let offset = version.nextOffset;
|
|
25324
|
+
const algorithm = readElement(raw, offset, 0x30);
|
|
25325
|
+
offset = algorithm.nextOffset;
|
|
25326
|
+
const privateKey = readElement(raw, offset, 0x04);
|
|
25327
|
+
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
25328
|
+
if (privateContent.length === 32) {
|
|
25329
|
+
return privateContent.slice();
|
|
25330
|
+
}
|
|
25331
|
+
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
25332
|
+
const innerLength = privateContent[1];
|
|
25333
|
+
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
25334
|
+
throw new Error('Unexpected Ed25519 private key length');
|
|
25335
|
+
}
|
|
25336
|
+
return privateContent.subarray(2, 34);
|
|
25337
|
+
}
|
|
25338
|
+
throw new Error('Unsupported Ed25519 private key structure');
|
|
25339
|
+
}
|
|
25340
|
+
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
25341
|
+
function encodeUtf8(value) {
|
|
25342
|
+
if (textEncoder) {
|
|
25343
|
+
return textEncoder.encode(value);
|
|
25344
|
+
}
|
|
25345
|
+
if (hasBuffer()) {
|
|
25346
|
+
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
25347
|
+
}
|
|
25348
|
+
throw new Error('No UTF-8 encoder available in this environment');
|
|
25349
|
+
}
|
|
25350
|
+
|
|
25246
25351
|
const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
|
|
25247
25352
|
let joseModulePromise = null;
|
|
25248
25353
|
async function requireJose() {
|
|
@@ -39350,111 +39455,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
39350
39455
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
39351
39456
|
});
|
|
39352
39457
|
|
|
39353
|
-
function hasBuffer() {
|
|
39354
|
-
return typeof Buffer !== 'undefined';
|
|
39355
|
-
}
|
|
39356
|
-
function readStringProperty(source, ...names) {
|
|
39357
|
-
if (!source || typeof source !== 'object') {
|
|
39358
|
-
return undefined;
|
|
39359
|
-
}
|
|
39360
|
-
for (const name of names) {
|
|
39361
|
-
const value = source[name];
|
|
39362
|
-
if (typeof value === 'string' && value.length > 0) {
|
|
39363
|
-
return value;
|
|
39364
|
-
}
|
|
39365
|
-
}
|
|
39366
|
-
return undefined;
|
|
39367
|
-
}
|
|
39368
|
-
function decodePem(pem) {
|
|
39369
|
-
const base64 = pem
|
|
39370
|
-
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
39371
|
-
.replace(/-----END[^-]+-----/g, '')
|
|
39372
|
-
.replace(/\s+/g, '');
|
|
39373
|
-
if (typeof atob === 'function') {
|
|
39374
|
-
const binary = atob(base64);
|
|
39375
|
-
const bytes = new Uint8Array(binary.length);
|
|
39376
|
-
for (let i = 0; i < binary.length; i += 1) {
|
|
39377
|
-
bytes[i] = binary.charCodeAt(i);
|
|
39378
|
-
}
|
|
39379
|
-
return bytes;
|
|
39380
|
-
}
|
|
39381
|
-
if (hasBuffer()) {
|
|
39382
|
-
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
39383
|
-
}
|
|
39384
|
-
throw new Error('Base64 decoding is not available in this environment');
|
|
39385
|
-
}
|
|
39386
|
-
function readLength(data, offset) {
|
|
39387
|
-
const initial = data[offset];
|
|
39388
|
-
if (initial === undefined) {
|
|
39389
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
39390
|
-
}
|
|
39391
|
-
if ((initial & 0x80) === 0) {
|
|
39392
|
-
return { length: initial, nextOffset: offset + 1 };
|
|
39393
|
-
}
|
|
39394
|
-
const lengthOfLength = initial & 0x7f;
|
|
39395
|
-
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
39396
|
-
throw new Error('Unsupported ASN.1 length encoding');
|
|
39397
|
-
}
|
|
39398
|
-
let length = 0;
|
|
39399
|
-
let position = offset + 1;
|
|
39400
|
-
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
39401
|
-
const byte = data[position];
|
|
39402
|
-
if (byte === undefined) {
|
|
39403
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
39404
|
-
}
|
|
39405
|
-
length = (length << 8) | byte;
|
|
39406
|
-
position += 1;
|
|
39407
|
-
}
|
|
39408
|
-
return { length, nextOffset: position };
|
|
39409
|
-
}
|
|
39410
|
-
function readElement(data, offset, tag) {
|
|
39411
|
-
if (data[offset] !== tag) {
|
|
39412
|
-
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
39413
|
-
}
|
|
39414
|
-
const { length, nextOffset } = readLength(data, offset + 1);
|
|
39415
|
-
const contentOffset = nextOffset;
|
|
39416
|
-
return {
|
|
39417
|
-
length,
|
|
39418
|
-
contentOffset,
|
|
39419
|
-
nextOffset: contentOffset + length,
|
|
39420
|
-
};
|
|
39421
|
-
}
|
|
39422
|
-
function parseEd25519PrivateKey(pem) {
|
|
39423
|
-
const raw = decodePem(pem);
|
|
39424
|
-
if (raw.length === 32) {
|
|
39425
|
-
return raw.slice();
|
|
39426
|
-
}
|
|
39427
|
-
// Handle PKCS#8 structure defined in RFC 8410
|
|
39428
|
-
const sequence = readElement(raw, 0, 0x30);
|
|
39429
|
-
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
39430
|
-
let offset = version.nextOffset;
|
|
39431
|
-
const algorithm = readElement(raw, offset, 0x30);
|
|
39432
|
-
offset = algorithm.nextOffset;
|
|
39433
|
-
const privateKey = readElement(raw, offset, 0x04);
|
|
39434
|
-
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
39435
|
-
if (privateContent.length === 32) {
|
|
39436
|
-
return privateContent.slice();
|
|
39437
|
-
}
|
|
39438
|
-
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
39439
|
-
const innerLength = privateContent[1];
|
|
39440
|
-
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
39441
|
-
throw new Error('Unexpected Ed25519 private key length');
|
|
39442
|
-
}
|
|
39443
|
-
return privateContent.subarray(2, 34);
|
|
39444
|
-
}
|
|
39445
|
-
throw new Error('Unsupported Ed25519 private key structure');
|
|
39446
|
-
}
|
|
39447
|
-
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
39448
|
-
function encodeUtf8(value) {
|
|
39449
|
-
if (textEncoder) {
|
|
39450
|
-
return textEncoder.encode(value);
|
|
39451
|
-
}
|
|
39452
|
-
if (hasBuffer()) {
|
|
39453
|
-
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
39454
|
-
}
|
|
39455
|
-
throw new Error('No UTF-8 encoder available in this environment');
|
|
39456
|
-
}
|
|
39457
|
-
|
|
39458
39458
|
if (!hashes.sha512) {
|
|
39459
39459
|
hashes.sha512 = (message) => sha512(message);
|
|
39460
39460
|
}
|
|
@@ -39832,4 +39832,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
|
|
|
39832
39832
|
WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
|
|
39833
39833
|
});
|
|
39834
39834
|
|
|
39835
|
-
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Y as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$W as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$Z as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$X as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|
|
39835
|
+
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Y as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$W as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$Z as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$X as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.PROFILE_NAME_OPEN = exports.PROFILE_NAME_GATED_CALLBACK = exports.PROFILE_NAME_GATED = exports.PROFILE_NAME_OVERLAY_CALLBACK = exports.PROFILE_NAME_OVERLAY = exports.PROFILE_NAME_STRICT_OVERLAY = exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = exports.ENV_VAR_HMAC_SECRET = exports.ENV_VAR_DEFAULT_ENCRYPTION_LEVEL = exports.ENV_VAR_JWKS_URL = exports.ENV_VAR_JWT_AUDIENCE = exports.ENV_VAR_JWT_ALGORITHM = exports.ENV_VAR_JWT_TRUSTED_ISSUER = exports.CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE = exports.SigningConfigClass = exports.SECURITY_MANAGER_FACTORY_BASE_TYPE = exports.SECURITY_POLICY_FACTORY_BASE_TYPE = exports.KEY_STORE_FACTORY_BASE_TYPE = exports.ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE = exports.KEY_MANAGER_FACTORY_BASE_TYPE = exports.SecureChannelManagerFactory = exports.SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE = exports.ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = exports.CertificateManagerFactory = exports.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE = exports.TokenProviderFactory = exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = exports.TokenVerifierFactory = exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = exports.TokenIssuerFactory = exports.TOKEN_ISSUER_FACTORY_BASE_TYPE = exports.AuthInjectionStrategyFactory = exports.AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE = exports.AuthorizerFactory = exports.AUTHORIZER_FACTORY_BASE_TYPE = void 0;
|
|
3
|
+
exports.PROFILE_NAME_OPEN = exports.PROFILE_NAME_GATED_CALLBACK = exports.PROFILE_NAME_GATED = exports.PROFILE_NAME_OVERLAY_CALLBACK = exports.PROFILE_NAME_OVERLAY = exports.PROFILE_NAME_STRICT_OVERLAY = exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = exports.ENV_VAR_HMAC_SECRET = exports.ENV_VAR_DEFAULT_ENCRYPTION_LEVEL = exports.ENV_VAR_JWKS_URL = exports.ENV_VAR_JWT_AUDIENCE = exports.ENV_VAR_JWT_ALGORITHM = exports.ENV_VAR_JWT_TRUSTED_ISSUER = exports.CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE = exports.encodeUtf8 = exports.immutableHeaders = exports.frameDigest = exports.decodeBase64Url = exports.canonicalJson = exports.SigningConfigClass = exports.SECURITY_MANAGER_FACTORY_BASE_TYPE = exports.SECURITY_POLICY_FACTORY_BASE_TYPE = exports.KEY_STORE_FACTORY_BASE_TYPE = exports.ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE = exports.KEY_MANAGER_FACTORY_BASE_TYPE = exports.SecureChannelManagerFactory = exports.SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE = exports.ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = exports.CertificateManagerFactory = exports.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE = exports.TokenProviderFactory = exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = exports.TokenVerifierFactory = exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = exports.TokenIssuerFactory = exports.TOKEN_ISSUER_FACTORY_BASE_TYPE = exports.AuthInjectionStrategyFactory = exports.AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE = exports.AuthorizerFactory = exports.AUTHORIZER_FACTORY_BASE_TYPE = void 0;
|
|
4
4
|
const tslib_1 = require("tslib");
|
|
5
5
|
tslib_1.__exportStar(require("./auth/authorizer.js"), exports);
|
|
6
6
|
var authorizer_factory_js_1 = require("./auth/authorizer-factory.js");
|
|
@@ -69,6 +69,13 @@ tslib_1.__exportStar(require("./signing/envelope-signer.js"), exports);
|
|
|
69
69
|
tslib_1.__exportStar(require("./signing/envelope-verifier.js"), exports);
|
|
70
70
|
var signing_config_js_1 = require("./signing/signing-config.js");
|
|
71
71
|
Object.defineProperty(exports, "SigningConfigClass", { enumerable: true, get: function () { return signing_config_js_1.SigningConfig; } });
|
|
72
|
+
var eddsa_signer_verifier_js_1 = require("./signing/eddsa-signer-verifier.js");
|
|
73
|
+
Object.defineProperty(exports, "canonicalJson", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.canonicalJson; } });
|
|
74
|
+
Object.defineProperty(exports, "decodeBase64Url", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.decodeBase64Url; } });
|
|
75
|
+
Object.defineProperty(exports, "frameDigest", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.frameDigest; } });
|
|
76
|
+
Object.defineProperty(exports, "immutableHeaders", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.immutableHeaders; } });
|
|
77
|
+
var eddsa_utils_js_1 = require("./signing/eddsa-utils.js");
|
|
78
|
+
Object.defineProperty(exports, "encodeUtf8", { enumerable: true, get: function () { return eddsa_utils_js_1.encodeUtf8; } });
|
|
72
79
|
tslib_1.__exportStar(require("./crypto/providers/crypto-provider.js"), exports);
|
|
73
80
|
tslib_1.__exportStar(require("./crypto/providers/default-crypto-provider.js"), exports);
|
|
74
81
|
tslib_1.__exportStar(require("./credential/credential-provider.js"), exports);
|
package/dist/cjs/version.js
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// This file is auto-generated during build - do not edit manually
|
|
3
|
-
// Generated from package.json version: 0.3.5-test.
|
|
3
|
+
// Generated from package.json version: 0.3.5-test.922
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
5
|
exports.VERSION = void 0;
|
|
6
6
|
/**
|
|
7
7
|
* The package version, injected at build time.
|
|
8
8
|
* @internal
|
|
9
9
|
*/
|
|
10
|
-
exports.VERSION = '0.3.5-test.
|
|
10
|
+
exports.VERSION = '0.3.5-test.922';
|
|
@@ -44,6 +44,8 @@ export { SECURITY_MANAGER_FACTORY_BASE_TYPE } from './security-manager-factory.j
|
|
|
44
44
|
export * from './signing/envelope-signer.js';
|
|
45
45
|
export * from './signing/envelope-verifier.js';
|
|
46
46
|
export { SigningConfig as SigningConfigClass, } from './signing/signing-config.js';
|
|
47
|
+
export { canonicalJson, decodeBase64Url, frameDigest, immutableHeaders, } from './signing/eddsa-signer-verifier.js';
|
|
48
|
+
export { encodeUtf8, } from './signing/eddsa-utils.js';
|
|
47
49
|
export * from './crypto/providers/crypto-provider.js';
|
|
48
50
|
export * from './crypto/providers/default-crypto-provider.js';
|
|
49
51
|
export * from './credential/credential-provider.js';
|
package/dist/esm/version.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
// This file is auto-generated during build - do not edit manually
|
|
2
|
-
// Generated from package.json version: 0.3.5-test.
|
|
2
|
+
// Generated from package.json version: 0.3.5-test.922
|
|
3
3
|
/**
|
|
4
4
|
* The package version, injected at build time.
|
|
5
5
|
* @internal
|
|
6
6
|
*/
|
|
7
|
-
export const VERSION = '0.3.5-test.
|
|
7
|
+
export const VERSION = '0.3.5-test.922';
|