@naylence/runtime 0.3.5-test.921 → 0.3.5-test.922

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -98,12 +98,12 @@ installProcessEnvShim();
98
98
  // --- END ENV SHIM ---
99
99
 
100
100
  // This file is auto-generated during build - do not edit manually
101
- // Generated from package.json version: 0.3.5-test.921
101
+ // Generated from package.json version: 0.3.5-test.922
102
102
  /**
103
103
  * The package version, injected at build time.
104
104
  * @internal
105
105
  */
106
- const VERSION = '0.3.5-test.921';
106
+ const VERSION = '0.3.5-test.922';
107
107
 
108
108
  /**
109
109
  * Fame protocol specific error classes with WebSocket close codes and proper inheritance.
@@ -25245,6 +25245,111 @@ class SigningConfig {
25245
25245
  }
25246
25246
  }
25247
25247
 
25248
+ function hasBuffer() {
25249
+ return typeof Buffer !== 'undefined';
25250
+ }
25251
+ function readStringProperty(source, ...names) {
25252
+ if (!source || typeof source !== 'object') {
25253
+ return undefined;
25254
+ }
25255
+ for (const name of names) {
25256
+ const value = source[name];
25257
+ if (typeof value === 'string' && value.length > 0) {
25258
+ return value;
25259
+ }
25260
+ }
25261
+ return undefined;
25262
+ }
25263
+ function decodePem(pem) {
25264
+ const base64 = pem
25265
+ .replace(/-----BEGIN[^-]+-----/g, '')
25266
+ .replace(/-----END[^-]+-----/g, '')
25267
+ .replace(/\s+/g, '');
25268
+ if (typeof atob === 'function') {
25269
+ const binary = atob(base64);
25270
+ const bytes = new Uint8Array(binary.length);
25271
+ for (let i = 0; i < binary.length; i += 1) {
25272
+ bytes[i] = binary.charCodeAt(i);
25273
+ }
25274
+ return bytes;
25275
+ }
25276
+ if (hasBuffer()) {
25277
+ return Uint8Array.from(Buffer.from(base64, 'base64'));
25278
+ }
25279
+ throw new Error('Base64 decoding is not available in this environment');
25280
+ }
25281
+ function readLength(data, offset) {
25282
+ const initial = data[offset];
25283
+ if (initial === undefined) {
25284
+ throw new Error('Unexpected end of ASN.1 data');
25285
+ }
25286
+ if ((initial & 0x80) === 0) {
25287
+ return { length: initial, nextOffset: offset + 1 };
25288
+ }
25289
+ const lengthOfLength = initial & 0x7f;
25290
+ if (lengthOfLength === 0 || lengthOfLength > 4) {
25291
+ throw new Error('Unsupported ASN.1 length encoding');
25292
+ }
25293
+ let length = 0;
25294
+ let position = offset + 1;
25295
+ for (let i = 0; i < lengthOfLength; i += 1) {
25296
+ const byte = data[position];
25297
+ if (byte === undefined) {
25298
+ throw new Error('Unexpected end of ASN.1 data');
25299
+ }
25300
+ length = (length << 8) | byte;
25301
+ position += 1;
25302
+ }
25303
+ return { length, nextOffset: position };
25304
+ }
25305
+ function readElement(data, offset, tag) {
25306
+ if (data[offset] !== tag) {
25307
+ throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
25308
+ }
25309
+ const { length, nextOffset } = readLength(data, offset + 1);
25310
+ const contentOffset = nextOffset;
25311
+ return {
25312
+ length,
25313
+ contentOffset,
25314
+ nextOffset: contentOffset + length,
25315
+ };
25316
+ }
25317
+ function parseEd25519PrivateKey(pem) {
25318
+ const raw = decodePem(pem);
25319
+ if (raw.length === 32) {
25320
+ return raw.slice();
25321
+ }
25322
+ // Handle PKCS#8 structure defined in RFC 8410
25323
+ const sequence = readElement(raw, 0, 0x30);
25324
+ const version = readElement(raw, sequence.contentOffset, 0x02);
25325
+ let offset = version.nextOffset;
25326
+ const algorithm = readElement(raw, offset, 0x30);
25327
+ offset = algorithm.nextOffset;
25328
+ const privateKey = readElement(raw, offset, 0x04);
25329
+ const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
25330
+ if (privateContent.length === 32) {
25331
+ return privateContent.slice();
25332
+ }
25333
+ if (privateContent.length >= 34 && privateContent[0] === 0x04) {
25334
+ const innerLength = privateContent[1];
25335
+ if (innerLength !== 32 || privateContent.length < innerLength + 2) {
25336
+ throw new Error('Unexpected Ed25519 private key length');
25337
+ }
25338
+ return privateContent.subarray(2, 34);
25339
+ }
25340
+ throw new Error('Unsupported Ed25519 private key structure');
25341
+ }
25342
+ const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
25343
+ function encodeUtf8(value) {
25344
+ if (textEncoder) {
25345
+ return textEncoder.encode(value);
25346
+ }
25347
+ if (hasBuffer()) {
25348
+ return Uint8Array.from(Buffer.from(value, 'utf8'));
25349
+ }
25350
+ throw new Error('No UTF-8 encoder available in this environment');
25351
+ }
25352
+
25248
25353
  const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
25249
25354
  let joseModulePromise = null;
25250
25355
  async function requireJose() {
@@ -39352,111 +39457,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
39352
39457
  SharedSecretTokenVerifier: SharedSecretTokenVerifier
39353
39458
  });
39354
39459
 
39355
- function hasBuffer() {
39356
- return typeof Buffer !== 'undefined';
39357
- }
39358
- function readStringProperty(source, ...names) {
39359
- if (!source || typeof source !== 'object') {
39360
- return undefined;
39361
- }
39362
- for (const name of names) {
39363
- const value = source[name];
39364
- if (typeof value === 'string' && value.length > 0) {
39365
- return value;
39366
- }
39367
- }
39368
- return undefined;
39369
- }
39370
- function decodePem(pem) {
39371
- const base64 = pem
39372
- .replace(/-----BEGIN[^-]+-----/g, '')
39373
- .replace(/-----END[^-]+-----/g, '')
39374
- .replace(/\s+/g, '');
39375
- if (typeof atob === 'function') {
39376
- const binary = atob(base64);
39377
- const bytes = new Uint8Array(binary.length);
39378
- for (let i = 0; i < binary.length; i += 1) {
39379
- bytes[i] = binary.charCodeAt(i);
39380
- }
39381
- return bytes;
39382
- }
39383
- if (hasBuffer()) {
39384
- return Uint8Array.from(Buffer.from(base64, 'base64'));
39385
- }
39386
- throw new Error('Base64 decoding is not available in this environment');
39387
- }
39388
- function readLength(data, offset) {
39389
- const initial = data[offset];
39390
- if (initial === undefined) {
39391
- throw new Error('Unexpected end of ASN.1 data');
39392
- }
39393
- if ((initial & 0x80) === 0) {
39394
- return { length: initial, nextOffset: offset + 1 };
39395
- }
39396
- const lengthOfLength = initial & 0x7f;
39397
- if (lengthOfLength === 0 || lengthOfLength > 4) {
39398
- throw new Error('Unsupported ASN.1 length encoding');
39399
- }
39400
- let length = 0;
39401
- let position = offset + 1;
39402
- for (let i = 0; i < lengthOfLength; i += 1) {
39403
- const byte = data[position];
39404
- if (byte === undefined) {
39405
- throw new Error('Unexpected end of ASN.1 data');
39406
- }
39407
- length = (length << 8) | byte;
39408
- position += 1;
39409
- }
39410
- return { length, nextOffset: position };
39411
- }
39412
- function readElement(data, offset, tag) {
39413
- if (data[offset] !== tag) {
39414
- throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
39415
- }
39416
- const { length, nextOffset } = readLength(data, offset + 1);
39417
- const contentOffset = nextOffset;
39418
- return {
39419
- length,
39420
- contentOffset,
39421
- nextOffset: contentOffset + length,
39422
- };
39423
- }
39424
- function parseEd25519PrivateKey(pem) {
39425
- const raw = decodePem(pem);
39426
- if (raw.length === 32) {
39427
- return raw.slice();
39428
- }
39429
- // Handle PKCS#8 structure defined in RFC 8410
39430
- const sequence = readElement(raw, 0, 0x30);
39431
- const version = readElement(raw, sequence.contentOffset, 0x02);
39432
- let offset = version.nextOffset;
39433
- const algorithm = readElement(raw, offset, 0x30);
39434
- offset = algorithm.nextOffset;
39435
- const privateKey = readElement(raw, offset, 0x04);
39436
- const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
39437
- if (privateContent.length === 32) {
39438
- return privateContent.slice();
39439
- }
39440
- if (privateContent.length >= 34 && privateContent[0] === 0x04) {
39441
- const innerLength = privateContent[1];
39442
- if (innerLength !== 32 || privateContent.length < innerLength + 2) {
39443
- throw new Error('Unexpected Ed25519 private key length');
39444
- }
39445
- return privateContent.subarray(2, 34);
39446
- }
39447
- throw new Error('Unsupported Ed25519 private key structure');
39448
- }
39449
- const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
39450
- function encodeUtf8(value) {
39451
- if (textEncoder) {
39452
- return textEncoder.encode(value);
39453
- }
39454
- if (hasBuffer()) {
39455
- return Uint8Array.from(Buffer.from(value, 'utf8'));
39456
- }
39457
- throw new Error('No UTF-8 encoder available in this environment');
39458
- }
39459
-
39460
39460
  if (!ed25519.hashes.sha512) {
39461
39461
  ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
39462
39462
  }
@@ -40017,6 +40017,7 @@ exports.assertGrant = assertGrant;
40017
40017
  exports.basicConfig = basicConfig;
40018
40018
  exports.broadcastChannelGrantToConnectorConfig = broadcastChannelGrantToConnectorConfig;
40019
40019
  exports.camelToSnakeCase = camelToSnakeCase;
40020
+ exports.canonicalJson = canonicalJson;
40020
40021
  exports.capitalizeFirstLetter = capitalizeFirstLetter;
40021
40022
  exports.color = color;
40022
40023
  exports.compareCryptoLevels = compareCryptoLevels;
@@ -40036,12 +40037,14 @@ exports.createX25519Keypair = createX25519Keypair;
40036
40037
  exports.credentialToString = credentialToString;
40037
40038
  exports.currentTraceId = currentTraceId$1;
40038
40039
  exports.debounce = debounce;
40040
+ exports.decodeBase64Url = decodeBase64Url;
40039
40041
  exports.decodeFameDataPayload = decodeFameDataPayload;
40040
40042
  exports.deepMerge = deepMerge;
40041
40043
  exports.defaultJsonEncoder = defaultJsonEncoder;
40042
40044
  exports.delay = delay;
40043
40045
  exports.dropEmpty = dropEmpty;
40044
40046
  exports.enableLogging = enableLogging;
40047
+ exports.encodeUtf8 = encodeUtf8;
40045
40048
  exports.ensureRuntimeFactoriesRegistered = ensureRuntimeFactoriesRegistered;
40046
40049
  exports.extractId = extractId;
40047
40050
  exports.extractPoolAddressBase = extractPoolAddressBase;
@@ -40049,6 +40052,7 @@ exports.extractPoolBase = extractPoolBase;
40049
40052
  exports.filterKeysByUse = filterKeysByUse;
40050
40053
  exports.formatTimestamp = formatTimestamp;
40051
40054
  exports.formatTimestampForConsole = formatTimestampForConsole$1;
40055
+ exports.frameDigest = frameDigest;
40052
40056
  exports.getCurrentEnvelope = getCurrentEnvelope;
40053
40057
  exports.getFameRoot = getFameRoot;
40054
40058
  exports.getKeyProvider = getKeyProvider;
@@ -40058,6 +40062,7 @@ exports.hasCryptoSupport = hasCryptoSupport;
40058
40062
  exports.hostnameToLogical = hostnameToLogical;
40059
40063
  exports.hostnamesToLogicals = hostnamesToLogicals;
40060
40064
  exports.httpGrantToConnectorConfig = httpGrantToConnectorConfig;
40065
+ exports.immutableHeaders = immutableHeaders;
40061
40066
  exports.inPageGrantToConnectorConfig = inPageGrantToConnectorConfig;
40062
40067
  exports.isAuthInjectionStrategy = isAuthInjectionStrategy;
40063
40068
  exports.isBroadcastChannelConnectionGrant = isBroadcastChannelConnectionGrant;
@@ -96,12 +96,12 @@ installProcessEnvShim();
96
96
  // --- END ENV SHIM ---
97
97
 
98
98
  // This file is auto-generated during build - do not edit manually
99
- // Generated from package.json version: 0.3.5-test.921
99
+ // Generated from package.json version: 0.3.5-test.922
100
100
  /**
101
101
  * The package version, injected at build time.
102
102
  * @internal
103
103
  */
104
- const VERSION = '0.3.5-test.921';
104
+ const VERSION = '0.3.5-test.922';
105
105
 
106
106
  /**
107
107
  * Fame protocol specific error classes with WebSocket close codes and proper inheritance.
@@ -25243,6 +25243,111 @@ class SigningConfig {
25243
25243
  }
25244
25244
  }
25245
25245
 
25246
+ function hasBuffer() {
25247
+ return typeof Buffer !== 'undefined';
25248
+ }
25249
+ function readStringProperty(source, ...names) {
25250
+ if (!source || typeof source !== 'object') {
25251
+ return undefined;
25252
+ }
25253
+ for (const name of names) {
25254
+ const value = source[name];
25255
+ if (typeof value === 'string' && value.length > 0) {
25256
+ return value;
25257
+ }
25258
+ }
25259
+ return undefined;
25260
+ }
25261
+ function decodePem(pem) {
25262
+ const base64 = pem
25263
+ .replace(/-----BEGIN[^-]+-----/g, '')
25264
+ .replace(/-----END[^-]+-----/g, '')
25265
+ .replace(/\s+/g, '');
25266
+ if (typeof atob === 'function') {
25267
+ const binary = atob(base64);
25268
+ const bytes = new Uint8Array(binary.length);
25269
+ for (let i = 0; i < binary.length; i += 1) {
25270
+ bytes[i] = binary.charCodeAt(i);
25271
+ }
25272
+ return bytes;
25273
+ }
25274
+ if (hasBuffer()) {
25275
+ return Uint8Array.from(Buffer.from(base64, 'base64'));
25276
+ }
25277
+ throw new Error('Base64 decoding is not available in this environment');
25278
+ }
25279
+ function readLength(data, offset) {
25280
+ const initial = data[offset];
25281
+ if (initial === undefined) {
25282
+ throw new Error('Unexpected end of ASN.1 data');
25283
+ }
25284
+ if ((initial & 0x80) === 0) {
25285
+ return { length: initial, nextOffset: offset + 1 };
25286
+ }
25287
+ const lengthOfLength = initial & 0x7f;
25288
+ if (lengthOfLength === 0 || lengthOfLength > 4) {
25289
+ throw new Error('Unsupported ASN.1 length encoding');
25290
+ }
25291
+ let length = 0;
25292
+ let position = offset + 1;
25293
+ for (let i = 0; i < lengthOfLength; i += 1) {
25294
+ const byte = data[position];
25295
+ if (byte === undefined) {
25296
+ throw new Error('Unexpected end of ASN.1 data');
25297
+ }
25298
+ length = (length << 8) | byte;
25299
+ position += 1;
25300
+ }
25301
+ return { length, nextOffset: position };
25302
+ }
25303
+ function readElement(data, offset, tag) {
25304
+ if (data[offset] !== tag) {
25305
+ throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
25306
+ }
25307
+ const { length, nextOffset } = readLength(data, offset + 1);
25308
+ const contentOffset = nextOffset;
25309
+ return {
25310
+ length,
25311
+ contentOffset,
25312
+ nextOffset: contentOffset + length,
25313
+ };
25314
+ }
25315
+ function parseEd25519PrivateKey(pem) {
25316
+ const raw = decodePem(pem);
25317
+ if (raw.length === 32) {
25318
+ return raw.slice();
25319
+ }
25320
+ // Handle PKCS#8 structure defined in RFC 8410
25321
+ const sequence = readElement(raw, 0, 0x30);
25322
+ const version = readElement(raw, sequence.contentOffset, 0x02);
25323
+ let offset = version.nextOffset;
25324
+ const algorithm = readElement(raw, offset, 0x30);
25325
+ offset = algorithm.nextOffset;
25326
+ const privateKey = readElement(raw, offset, 0x04);
25327
+ const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
25328
+ if (privateContent.length === 32) {
25329
+ return privateContent.slice();
25330
+ }
25331
+ if (privateContent.length >= 34 && privateContent[0] === 0x04) {
25332
+ const innerLength = privateContent[1];
25333
+ if (innerLength !== 32 || privateContent.length < innerLength + 2) {
25334
+ throw new Error('Unexpected Ed25519 private key length');
25335
+ }
25336
+ return privateContent.subarray(2, 34);
25337
+ }
25338
+ throw new Error('Unsupported Ed25519 private key structure');
25339
+ }
25340
+ const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
25341
+ function encodeUtf8(value) {
25342
+ if (textEncoder) {
25343
+ return textEncoder.encode(value);
25344
+ }
25345
+ if (hasBuffer()) {
25346
+ return Uint8Array.from(Buffer.from(value, 'utf8'));
25347
+ }
25348
+ throw new Error('No UTF-8 encoder available in this environment');
25349
+ }
25350
+
25246
25351
  const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
25247
25352
  let joseModulePromise = null;
25248
25353
  async function requireJose() {
@@ -39350,111 +39455,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
39350
39455
  SharedSecretTokenVerifier: SharedSecretTokenVerifier
39351
39456
  });
39352
39457
 
39353
- function hasBuffer() {
39354
- return typeof Buffer !== 'undefined';
39355
- }
39356
- function readStringProperty(source, ...names) {
39357
- if (!source || typeof source !== 'object') {
39358
- return undefined;
39359
- }
39360
- for (const name of names) {
39361
- const value = source[name];
39362
- if (typeof value === 'string' && value.length > 0) {
39363
- return value;
39364
- }
39365
- }
39366
- return undefined;
39367
- }
39368
- function decodePem(pem) {
39369
- const base64 = pem
39370
- .replace(/-----BEGIN[^-]+-----/g, '')
39371
- .replace(/-----END[^-]+-----/g, '')
39372
- .replace(/\s+/g, '');
39373
- if (typeof atob === 'function') {
39374
- const binary = atob(base64);
39375
- const bytes = new Uint8Array(binary.length);
39376
- for (let i = 0; i < binary.length; i += 1) {
39377
- bytes[i] = binary.charCodeAt(i);
39378
- }
39379
- return bytes;
39380
- }
39381
- if (hasBuffer()) {
39382
- return Uint8Array.from(Buffer.from(base64, 'base64'));
39383
- }
39384
- throw new Error('Base64 decoding is not available in this environment');
39385
- }
39386
- function readLength(data, offset) {
39387
- const initial = data[offset];
39388
- if (initial === undefined) {
39389
- throw new Error('Unexpected end of ASN.1 data');
39390
- }
39391
- if ((initial & 0x80) === 0) {
39392
- return { length: initial, nextOffset: offset + 1 };
39393
- }
39394
- const lengthOfLength = initial & 0x7f;
39395
- if (lengthOfLength === 0 || lengthOfLength > 4) {
39396
- throw new Error('Unsupported ASN.1 length encoding');
39397
- }
39398
- let length = 0;
39399
- let position = offset + 1;
39400
- for (let i = 0; i < lengthOfLength; i += 1) {
39401
- const byte = data[position];
39402
- if (byte === undefined) {
39403
- throw new Error('Unexpected end of ASN.1 data');
39404
- }
39405
- length = (length << 8) | byte;
39406
- position += 1;
39407
- }
39408
- return { length, nextOffset: position };
39409
- }
39410
- function readElement(data, offset, tag) {
39411
- if (data[offset] !== tag) {
39412
- throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
39413
- }
39414
- const { length, nextOffset } = readLength(data, offset + 1);
39415
- const contentOffset = nextOffset;
39416
- return {
39417
- length,
39418
- contentOffset,
39419
- nextOffset: contentOffset + length,
39420
- };
39421
- }
39422
- function parseEd25519PrivateKey(pem) {
39423
- const raw = decodePem(pem);
39424
- if (raw.length === 32) {
39425
- return raw.slice();
39426
- }
39427
- // Handle PKCS#8 structure defined in RFC 8410
39428
- const sequence = readElement(raw, 0, 0x30);
39429
- const version = readElement(raw, sequence.contentOffset, 0x02);
39430
- let offset = version.nextOffset;
39431
- const algorithm = readElement(raw, offset, 0x30);
39432
- offset = algorithm.nextOffset;
39433
- const privateKey = readElement(raw, offset, 0x04);
39434
- const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
39435
- if (privateContent.length === 32) {
39436
- return privateContent.slice();
39437
- }
39438
- if (privateContent.length >= 34 && privateContent[0] === 0x04) {
39439
- const innerLength = privateContent[1];
39440
- if (innerLength !== 32 || privateContent.length < innerLength + 2) {
39441
- throw new Error('Unexpected Ed25519 private key length');
39442
- }
39443
- return privateContent.subarray(2, 34);
39444
- }
39445
- throw new Error('Unsupported Ed25519 private key structure');
39446
- }
39447
- const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
39448
- function encodeUtf8(value) {
39449
- if (textEncoder) {
39450
- return textEncoder.encode(value);
39451
- }
39452
- if (hasBuffer()) {
39453
- return Uint8Array.from(Buffer.from(value, 'utf8'));
39454
- }
39455
- throw new Error('No UTF-8 encoder available in this environment');
39456
- }
39457
-
39458
39458
  if (!hashes.sha512) {
39459
39459
  hashes.sha512 = (message) => sha512(message);
39460
39460
  }
@@ -39832,4 +39832,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
39832
39832
  WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
39833
39833
  });
39834
39834
 
39835
- export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Y as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$W as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$Z as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$X as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
39835
+ export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Y as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$W as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$Z as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$X as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.PROFILE_NAME_OPEN = exports.PROFILE_NAME_GATED_CALLBACK = exports.PROFILE_NAME_GATED = exports.PROFILE_NAME_OVERLAY_CALLBACK = exports.PROFILE_NAME_OVERLAY = exports.PROFILE_NAME_STRICT_OVERLAY = exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = exports.ENV_VAR_HMAC_SECRET = exports.ENV_VAR_DEFAULT_ENCRYPTION_LEVEL = exports.ENV_VAR_JWKS_URL = exports.ENV_VAR_JWT_AUDIENCE = exports.ENV_VAR_JWT_ALGORITHM = exports.ENV_VAR_JWT_TRUSTED_ISSUER = exports.CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE = exports.SigningConfigClass = exports.SECURITY_MANAGER_FACTORY_BASE_TYPE = exports.SECURITY_POLICY_FACTORY_BASE_TYPE = exports.KEY_STORE_FACTORY_BASE_TYPE = exports.ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE = exports.KEY_MANAGER_FACTORY_BASE_TYPE = exports.SecureChannelManagerFactory = exports.SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE = exports.ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = exports.CertificateManagerFactory = exports.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE = exports.TokenProviderFactory = exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = exports.TokenVerifierFactory = exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = exports.TokenIssuerFactory = exports.TOKEN_ISSUER_FACTORY_BASE_TYPE = exports.AuthInjectionStrategyFactory = exports.AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE = exports.AuthorizerFactory = exports.AUTHORIZER_FACTORY_BASE_TYPE = void 0;
3
+ exports.PROFILE_NAME_OPEN = exports.PROFILE_NAME_GATED_CALLBACK = exports.PROFILE_NAME_GATED = exports.PROFILE_NAME_OVERLAY_CALLBACK = exports.PROFILE_NAME_OVERLAY = exports.PROFILE_NAME_STRICT_OVERLAY = exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = exports.ENV_VAR_HMAC_SECRET = exports.ENV_VAR_DEFAULT_ENCRYPTION_LEVEL = exports.ENV_VAR_JWKS_URL = exports.ENV_VAR_JWT_AUDIENCE = exports.ENV_VAR_JWT_ALGORITHM = exports.ENV_VAR_JWT_TRUSTED_ISSUER = exports.CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE = exports.encodeUtf8 = exports.immutableHeaders = exports.frameDigest = exports.decodeBase64Url = exports.canonicalJson = exports.SigningConfigClass = exports.SECURITY_MANAGER_FACTORY_BASE_TYPE = exports.SECURITY_POLICY_FACTORY_BASE_TYPE = exports.KEY_STORE_FACTORY_BASE_TYPE = exports.ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE = exports.KEY_MANAGER_FACTORY_BASE_TYPE = exports.SecureChannelManagerFactory = exports.SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE = exports.ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = exports.CertificateManagerFactory = exports.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE = exports.TokenProviderFactory = exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = exports.TokenVerifierFactory = exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = exports.TokenIssuerFactory = exports.TOKEN_ISSUER_FACTORY_BASE_TYPE = exports.AuthInjectionStrategyFactory = exports.AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE = exports.AuthorizerFactory = exports.AUTHORIZER_FACTORY_BASE_TYPE = void 0;
4
4
  const tslib_1 = require("tslib");
5
5
  tslib_1.__exportStar(require("./auth/authorizer.js"), exports);
6
6
  var authorizer_factory_js_1 = require("./auth/authorizer-factory.js");
@@ -69,6 +69,13 @@ tslib_1.__exportStar(require("./signing/envelope-signer.js"), exports);
69
69
  tslib_1.__exportStar(require("./signing/envelope-verifier.js"), exports);
70
70
  var signing_config_js_1 = require("./signing/signing-config.js");
71
71
  Object.defineProperty(exports, "SigningConfigClass", { enumerable: true, get: function () { return signing_config_js_1.SigningConfig; } });
72
+ var eddsa_signer_verifier_js_1 = require("./signing/eddsa-signer-verifier.js");
73
+ Object.defineProperty(exports, "canonicalJson", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.canonicalJson; } });
74
+ Object.defineProperty(exports, "decodeBase64Url", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.decodeBase64Url; } });
75
+ Object.defineProperty(exports, "frameDigest", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.frameDigest; } });
76
+ Object.defineProperty(exports, "immutableHeaders", { enumerable: true, get: function () { return eddsa_signer_verifier_js_1.immutableHeaders; } });
77
+ var eddsa_utils_js_1 = require("./signing/eddsa-utils.js");
78
+ Object.defineProperty(exports, "encodeUtf8", { enumerable: true, get: function () { return eddsa_utils_js_1.encodeUtf8; } });
72
79
  tslib_1.__exportStar(require("./crypto/providers/crypto-provider.js"), exports);
73
80
  tslib_1.__exportStar(require("./crypto/providers/default-crypto-provider.js"), exports);
74
81
  tslib_1.__exportStar(require("./credential/credential-provider.js"), exports);
@@ -1,10 +1,10 @@
1
1
  "use strict";
2
2
  // This file is auto-generated during build - do not edit manually
3
- // Generated from package.json version: 0.3.5-test.921
3
+ // Generated from package.json version: 0.3.5-test.922
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.VERSION = void 0;
6
6
  /**
7
7
  * The package version, injected at build time.
8
8
  * @internal
9
9
  */
10
- exports.VERSION = '0.3.5-test.921';
10
+ exports.VERSION = '0.3.5-test.922';
@@ -44,6 +44,8 @@ export { SECURITY_MANAGER_FACTORY_BASE_TYPE } from './security-manager-factory.j
44
44
  export * from './signing/envelope-signer.js';
45
45
  export * from './signing/envelope-verifier.js';
46
46
  export { SigningConfig as SigningConfigClass, } from './signing/signing-config.js';
47
+ export { canonicalJson, decodeBase64Url, frameDigest, immutableHeaders, } from './signing/eddsa-signer-verifier.js';
48
+ export { encodeUtf8, } from './signing/eddsa-utils.js';
47
49
  export * from './crypto/providers/crypto-provider.js';
48
50
  export * from './crypto/providers/default-crypto-provider.js';
49
51
  export * from './credential/credential-provider.js';
@@ -1,7 +1,7 @@
1
1
  // This file is auto-generated during build - do not edit manually
2
- // Generated from package.json version: 0.3.5-test.921
2
+ // Generated from package.json version: 0.3.5-test.922
3
3
  /**
4
4
  * The package version, injected at build time.
5
5
  * @internal
6
6
  */
7
- export const VERSION = '0.3.5-test.921';
7
+ export const VERSION = '0.3.5-test.922';