@naylence/runtime 0.3.5-test.921 → 0.3.5-test.922

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -14,12 +14,12 @@ var websocketPlugin = require('@fastify/websocket');
14
14
  var ed25519 = require('@noble/ed25519');
15
15
 
16
16
  // This file is auto-generated during build - do not edit manually
17
- // Generated from package.json version: 0.3.5-test.921
17
+ // Generated from package.json version: 0.3.5-test.922
18
18
  /**
19
19
  * The package version, injected at build time.
20
20
  * @internal
21
21
  */
22
- const VERSION = '0.3.5-test.921';
22
+ const VERSION = '0.3.5-test.922';
23
23
 
24
24
  /**
25
25
  * Fame protocol specific error classes with WebSocket close codes and proper inheritance.
@@ -25161,6 +25161,111 @@ class SigningConfig {
25161
25161
  }
25162
25162
  }
25163
25163
 
25164
+ function hasBuffer() {
25165
+ return typeof Buffer !== 'undefined';
25166
+ }
25167
+ function readStringProperty(source, ...names) {
25168
+ if (!source || typeof source !== 'object') {
25169
+ return undefined;
25170
+ }
25171
+ for (const name of names) {
25172
+ const value = source[name];
25173
+ if (typeof value === 'string' && value.length > 0) {
25174
+ return value;
25175
+ }
25176
+ }
25177
+ return undefined;
25178
+ }
25179
+ function decodePem(pem) {
25180
+ const base64 = pem
25181
+ .replace(/-----BEGIN[^-]+-----/g, '')
25182
+ .replace(/-----END[^-]+-----/g, '')
25183
+ .replace(/\s+/g, '');
25184
+ if (typeof atob === 'function') {
25185
+ const binary = atob(base64);
25186
+ const bytes = new Uint8Array(binary.length);
25187
+ for (let i = 0; i < binary.length; i += 1) {
25188
+ bytes[i] = binary.charCodeAt(i);
25189
+ }
25190
+ return bytes;
25191
+ }
25192
+ if (hasBuffer()) {
25193
+ return Uint8Array.from(Buffer.from(base64, 'base64'));
25194
+ }
25195
+ throw new Error('Base64 decoding is not available in this environment');
25196
+ }
25197
+ function readLength(data, offset) {
25198
+ const initial = data[offset];
25199
+ if (initial === undefined) {
25200
+ throw new Error('Unexpected end of ASN.1 data');
25201
+ }
25202
+ if ((initial & 0x80) === 0) {
25203
+ return { length: initial, nextOffset: offset + 1 };
25204
+ }
25205
+ const lengthOfLength = initial & 0x7f;
25206
+ if (lengthOfLength === 0 || lengthOfLength > 4) {
25207
+ throw new Error('Unsupported ASN.1 length encoding');
25208
+ }
25209
+ let length = 0;
25210
+ let position = offset + 1;
25211
+ for (let i = 0; i < lengthOfLength; i += 1) {
25212
+ const byte = data[position];
25213
+ if (byte === undefined) {
25214
+ throw new Error('Unexpected end of ASN.1 data');
25215
+ }
25216
+ length = (length << 8) | byte;
25217
+ position += 1;
25218
+ }
25219
+ return { length, nextOffset: position };
25220
+ }
25221
+ function readElement(data, offset, tag) {
25222
+ if (data[offset] !== tag) {
25223
+ throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
25224
+ }
25225
+ const { length, nextOffset } = readLength(data, offset + 1);
25226
+ const contentOffset = nextOffset;
25227
+ return {
25228
+ length,
25229
+ contentOffset,
25230
+ nextOffset: contentOffset + length,
25231
+ };
25232
+ }
25233
+ function parseEd25519PrivateKey(pem) {
25234
+ const raw = decodePem(pem);
25235
+ if (raw.length === 32) {
25236
+ return raw.slice();
25237
+ }
25238
+ // Handle PKCS#8 structure defined in RFC 8410
25239
+ const sequence = readElement(raw, 0, 0x30);
25240
+ const version = readElement(raw, sequence.contentOffset, 0x02);
25241
+ let offset = version.nextOffset;
25242
+ const algorithm = readElement(raw, offset, 0x30);
25243
+ offset = algorithm.nextOffset;
25244
+ const privateKey = readElement(raw, offset, 0x04);
25245
+ const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
25246
+ if (privateContent.length === 32) {
25247
+ return privateContent.slice();
25248
+ }
25249
+ if (privateContent.length >= 34 && privateContent[0] === 0x04) {
25250
+ const innerLength = privateContent[1];
25251
+ if (innerLength !== 32 || privateContent.length < innerLength + 2) {
25252
+ throw new Error('Unexpected Ed25519 private key length');
25253
+ }
25254
+ return privateContent.subarray(2, 34);
25255
+ }
25256
+ throw new Error('Unsupported Ed25519 private key structure');
25257
+ }
25258
+ const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
25259
+ function encodeUtf8(value) {
25260
+ if (textEncoder) {
25261
+ return textEncoder.encode(value);
25262
+ }
25263
+ if (hasBuffer()) {
25264
+ return Uint8Array.from(Buffer.from(value, 'utf8'));
25265
+ }
25266
+ throw new Error('No UTF-8 encoder available in this environment');
25267
+ }
25268
+
25164
25269
  const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
25165
25270
  let joseModulePromise = null;
25166
25271
  async function requireJose() {
@@ -39266,111 +39371,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
39266
39371
  SharedSecretTokenVerifier: SharedSecretTokenVerifier
39267
39372
  });
39268
39373
 
39269
- function hasBuffer() {
39270
- return typeof Buffer !== 'undefined';
39271
- }
39272
- function readStringProperty(source, ...names) {
39273
- if (!source || typeof source !== 'object') {
39274
- return undefined;
39275
- }
39276
- for (const name of names) {
39277
- const value = source[name];
39278
- if (typeof value === 'string' && value.length > 0) {
39279
- return value;
39280
- }
39281
- }
39282
- return undefined;
39283
- }
39284
- function decodePem(pem) {
39285
- const base64 = pem
39286
- .replace(/-----BEGIN[^-]+-----/g, '')
39287
- .replace(/-----END[^-]+-----/g, '')
39288
- .replace(/\s+/g, '');
39289
- if (typeof atob === 'function') {
39290
- const binary = atob(base64);
39291
- const bytes = new Uint8Array(binary.length);
39292
- for (let i = 0; i < binary.length; i += 1) {
39293
- bytes[i] = binary.charCodeAt(i);
39294
- }
39295
- return bytes;
39296
- }
39297
- if (hasBuffer()) {
39298
- return Uint8Array.from(Buffer.from(base64, 'base64'));
39299
- }
39300
- throw new Error('Base64 decoding is not available in this environment');
39301
- }
39302
- function readLength(data, offset) {
39303
- const initial = data[offset];
39304
- if (initial === undefined) {
39305
- throw new Error('Unexpected end of ASN.1 data');
39306
- }
39307
- if ((initial & 0x80) === 0) {
39308
- return { length: initial, nextOffset: offset + 1 };
39309
- }
39310
- const lengthOfLength = initial & 0x7f;
39311
- if (lengthOfLength === 0 || lengthOfLength > 4) {
39312
- throw new Error('Unsupported ASN.1 length encoding');
39313
- }
39314
- let length = 0;
39315
- let position = offset + 1;
39316
- for (let i = 0; i < lengthOfLength; i += 1) {
39317
- const byte = data[position];
39318
- if (byte === undefined) {
39319
- throw new Error('Unexpected end of ASN.1 data');
39320
- }
39321
- length = (length << 8) | byte;
39322
- position += 1;
39323
- }
39324
- return { length, nextOffset: position };
39325
- }
39326
- function readElement(data, offset, tag) {
39327
- if (data[offset] !== tag) {
39328
- throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
39329
- }
39330
- const { length, nextOffset } = readLength(data, offset + 1);
39331
- const contentOffset = nextOffset;
39332
- return {
39333
- length,
39334
- contentOffset,
39335
- nextOffset: contentOffset + length,
39336
- };
39337
- }
39338
- function parseEd25519PrivateKey(pem) {
39339
- const raw = decodePem(pem);
39340
- if (raw.length === 32) {
39341
- return raw.slice();
39342
- }
39343
- // Handle PKCS#8 structure defined in RFC 8410
39344
- const sequence = readElement(raw, 0, 0x30);
39345
- const version = readElement(raw, sequence.contentOffset, 0x02);
39346
- let offset = version.nextOffset;
39347
- const algorithm = readElement(raw, offset, 0x30);
39348
- offset = algorithm.nextOffset;
39349
- const privateKey = readElement(raw, offset, 0x04);
39350
- const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
39351
- if (privateContent.length === 32) {
39352
- return privateContent.slice();
39353
- }
39354
- if (privateContent.length >= 34 && privateContent[0] === 0x04) {
39355
- const innerLength = privateContent[1];
39356
- if (innerLength !== 32 || privateContent.length < innerLength + 2) {
39357
- throw new Error('Unexpected Ed25519 private key length');
39358
- }
39359
- return privateContent.subarray(2, 34);
39360
- }
39361
- throw new Error('Unsupported Ed25519 private key structure');
39362
- }
39363
- const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
39364
- function encodeUtf8(value) {
39365
- if (textEncoder) {
39366
- return textEncoder.encode(value);
39367
- }
39368
- if (hasBuffer()) {
39369
- return Uint8Array.from(Buffer.from(value, 'utf8'));
39370
- }
39371
- throw new Error('No UTF-8 encoder available in this environment');
39372
- }
39373
-
39374
39374
  if (!ed25519.hashes.sha512) {
39375
39375
  ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
39376
39376
  }
@@ -39919,6 +39919,7 @@ exports.assertGrant = assertGrant;
39919
39919
  exports.basicConfig = basicConfig;
39920
39920
  exports.broadcastChannelGrantToConnectorConfig = broadcastChannelGrantToConnectorConfig;
39921
39921
  exports.camelToSnakeCase = camelToSnakeCase;
39922
+ exports.canonicalJson = canonicalJson;
39922
39923
  exports.capitalizeFirstLetter = capitalizeFirstLetter;
39923
39924
  exports.color = color;
39924
39925
  exports.compareCryptoLevels = compareCryptoLevels;
@@ -39938,12 +39939,14 @@ exports.createX25519Keypair = createX25519Keypair;
39938
39939
  exports.credentialToString = credentialToString;
39939
39940
  exports.currentTraceId = currentTraceId$1;
39940
39941
  exports.debounce = debounce;
39942
+ exports.decodeBase64Url = decodeBase64Url;
39941
39943
  exports.decodeFameDataPayload = decodeFameDataPayload;
39942
39944
  exports.deepMerge = deepMerge;
39943
39945
  exports.defaultJsonEncoder = defaultJsonEncoder;
39944
39946
  exports.delay = delay;
39945
39947
  exports.dropEmpty = dropEmpty;
39946
39948
  exports.enableLogging = enableLogging;
39949
+ exports.encodeUtf8 = encodeUtf8;
39947
39950
  exports.ensureRuntimeFactoriesRegistered = ensureRuntimeFactoriesRegistered;
39948
39951
  exports.extractId = extractId;
39949
39952
  exports.extractPoolAddressBase = extractPoolAddressBase;
@@ -39951,6 +39954,7 @@ exports.extractPoolBase = extractPoolBase;
39951
39954
  exports.filterKeysByUse = filterKeysByUse;
39952
39955
  exports.formatTimestamp = formatTimestamp;
39953
39956
  exports.formatTimestampForConsole = formatTimestampForConsole$1;
39957
+ exports.frameDigest = frameDigest;
39954
39958
  exports.getCurrentEnvelope = getCurrentEnvelope;
39955
39959
  exports.getFameRoot = getFameRoot;
39956
39960
  exports.getKeyProvider = getKeyProvider;
@@ -39960,6 +39964,7 @@ exports.hasCryptoSupport = hasCryptoSupport;
39960
39964
  exports.hostnameToLogical = hostnameToLogical;
39961
39965
  exports.hostnamesToLogicals = hostnamesToLogicals;
39962
39966
  exports.httpGrantToConnectorConfig = httpGrantToConnectorConfig;
39967
+ exports.immutableHeaders = immutableHeaders;
39963
39968
  exports.inPageGrantToConnectorConfig = inPageGrantToConnectorConfig;
39964
39969
  exports.isAuthInjectionStrategy = isAuthInjectionStrategy;
39965
39970
  exports.isBroadcastChannelConnectionGrant = isBroadcastChannelConnectionGrant;
@@ -13,12 +13,12 @@ import websocketPlugin from '@fastify/websocket';
13
13
  import { sign, hashes, verify } from '@noble/ed25519';
14
14
 
15
15
  // This file is auto-generated during build - do not edit manually
16
- // Generated from package.json version: 0.3.5-test.921
16
+ // Generated from package.json version: 0.3.5-test.922
17
17
  /**
18
18
  * The package version, injected at build time.
19
19
  * @internal
20
20
  */
21
- const VERSION = '0.3.5-test.921';
21
+ const VERSION = '0.3.5-test.922';
22
22
 
23
23
  /**
24
24
  * Fame protocol specific error classes with WebSocket close codes and proper inheritance.
@@ -25160,6 +25160,111 @@ class SigningConfig {
25160
25160
  }
25161
25161
  }
25162
25162
 
25163
+ function hasBuffer() {
25164
+ return typeof Buffer !== 'undefined';
25165
+ }
25166
+ function readStringProperty(source, ...names) {
25167
+ if (!source || typeof source !== 'object') {
25168
+ return undefined;
25169
+ }
25170
+ for (const name of names) {
25171
+ const value = source[name];
25172
+ if (typeof value === 'string' && value.length > 0) {
25173
+ return value;
25174
+ }
25175
+ }
25176
+ return undefined;
25177
+ }
25178
+ function decodePem(pem) {
25179
+ const base64 = pem
25180
+ .replace(/-----BEGIN[^-]+-----/g, '')
25181
+ .replace(/-----END[^-]+-----/g, '')
25182
+ .replace(/\s+/g, '');
25183
+ if (typeof atob === 'function') {
25184
+ const binary = atob(base64);
25185
+ const bytes = new Uint8Array(binary.length);
25186
+ for (let i = 0; i < binary.length; i += 1) {
25187
+ bytes[i] = binary.charCodeAt(i);
25188
+ }
25189
+ return bytes;
25190
+ }
25191
+ if (hasBuffer()) {
25192
+ return Uint8Array.from(Buffer.from(base64, 'base64'));
25193
+ }
25194
+ throw new Error('Base64 decoding is not available in this environment');
25195
+ }
25196
+ function readLength(data, offset) {
25197
+ const initial = data[offset];
25198
+ if (initial === undefined) {
25199
+ throw new Error('Unexpected end of ASN.1 data');
25200
+ }
25201
+ if ((initial & 0x80) === 0) {
25202
+ return { length: initial, nextOffset: offset + 1 };
25203
+ }
25204
+ const lengthOfLength = initial & 0x7f;
25205
+ if (lengthOfLength === 0 || lengthOfLength > 4) {
25206
+ throw new Error('Unsupported ASN.1 length encoding');
25207
+ }
25208
+ let length = 0;
25209
+ let position = offset + 1;
25210
+ for (let i = 0; i < lengthOfLength; i += 1) {
25211
+ const byte = data[position];
25212
+ if (byte === undefined) {
25213
+ throw new Error('Unexpected end of ASN.1 data');
25214
+ }
25215
+ length = (length << 8) | byte;
25216
+ position += 1;
25217
+ }
25218
+ return { length, nextOffset: position };
25219
+ }
25220
+ function readElement(data, offset, tag) {
25221
+ if (data[offset] !== tag) {
25222
+ throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
25223
+ }
25224
+ const { length, nextOffset } = readLength(data, offset + 1);
25225
+ const contentOffset = nextOffset;
25226
+ return {
25227
+ length,
25228
+ contentOffset,
25229
+ nextOffset: contentOffset + length,
25230
+ };
25231
+ }
25232
+ function parseEd25519PrivateKey(pem) {
25233
+ const raw = decodePem(pem);
25234
+ if (raw.length === 32) {
25235
+ return raw.slice();
25236
+ }
25237
+ // Handle PKCS#8 structure defined in RFC 8410
25238
+ const sequence = readElement(raw, 0, 0x30);
25239
+ const version = readElement(raw, sequence.contentOffset, 0x02);
25240
+ let offset = version.nextOffset;
25241
+ const algorithm = readElement(raw, offset, 0x30);
25242
+ offset = algorithm.nextOffset;
25243
+ const privateKey = readElement(raw, offset, 0x04);
25244
+ const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
25245
+ if (privateContent.length === 32) {
25246
+ return privateContent.slice();
25247
+ }
25248
+ if (privateContent.length >= 34 && privateContent[0] === 0x04) {
25249
+ const innerLength = privateContent[1];
25250
+ if (innerLength !== 32 || privateContent.length < innerLength + 2) {
25251
+ throw new Error('Unexpected Ed25519 private key length');
25252
+ }
25253
+ return privateContent.subarray(2, 34);
25254
+ }
25255
+ throw new Error('Unsupported Ed25519 private key structure');
25256
+ }
25257
+ const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
25258
+ function encodeUtf8(value) {
25259
+ if (textEncoder) {
25260
+ return textEncoder.encode(value);
25261
+ }
25262
+ if (hasBuffer()) {
25263
+ return Uint8Array.from(Buffer.from(value, 'utf8'));
25264
+ }
25265
+ throw new Error('No UTF-8 encoder available in this environment');
25266
+ }
25267
+
25163
25268
  const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
25164
25269
  let joseModulePromise = null;
25165
25270
  async function requireJose() {
@@ -39265,111 +39370,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
39265
39370
  SharedSecretTokenVerifier: SharedSecretTokenVerifier
39266
39371
  });
39267
39372
 
39268
- function hasBuffer() {
39269
- return typeof Buffer !== 'undefined';
39270
- }
39271
- function readStringProperty(source, ...names) {
39272
- if (!source || typeof source !== 'object') {
39273
- return undefined;
39274
- }
39275
- for (const name of names) {
39276
- const value = source[name];
39277
- if (typeof value === 'string' && value.length > 0) {
39278
- return value;
39279
- }
39280
- }
39281
- return undefined;
39282
- }
39283
- function decodePem(pem) {
39284
- const base64 = pem
39285
- .replace(/-----BEGIN[^-]+-----/g, '')
39286
- .replace(/-----END[^-]+-----/g, '')
39287
- .replace(/\s+/g, '');
39288
- if (typeof atob === 'function') {
39289
- const binary = atob(base64);
39290
- const bytes = new Uint8Array(binary.length);
39291
- for (let i = 0; i < binary.length; i += 1) {
39292
- bytes[i] = binary.charCodeAt(i);
39293
- }
39294
- return bytes;
39295
- }
39296
- if (hasBuffer()) {
39297
- return Uint8Array.from(Buffer.from(base64, 'base64'));
39298
- }
39299
- throw new Error('Base64 decoding is not available in this environment');
39300
- }
39301
- function readLength(data, offset) {
39302
- const initial = data[offset];
39303
- if (initial === undefined) {
39304
- throw new Error('Unexpected end of ASN.1 data');
39305
- }
39306
- if ((initial & 0x80) === 0) {
39307
- return { length: initial, nextOffset: offset + 1 };
39308
- }
39309
- const lengthOfLength = initial & 0x7f;
39310
- if (lengthOfLength === 0 || lengthOfLength > 4) {
39311
- throw new Error('Unsupported ASN.1 length encoding');
39312
- }
39313
- let length = 0;
39314
- let position = offset + 1;
39315
- for (let i = 0; i < lengthOfLength; i += 1) {
39316
- const byte = data[position];
39317
- if (byte === undefined) {
39318
- throw new Error('Unexpected end of ASN.1 data');
39319
- }
39320
- length = (length << 8) | byte;
39321
- position += 1;
39322
- }
39323
- return { length, nextOffset: position };
39324
- }
39325
- function readElement(data, offset, tag) {
39326
- if (data[offset] !== tag) {
39327
- throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
39328
- }
39329
- const { length, nextOffset } = readLength(data, offset + 1);
39330
- const contentOffset = nextOffset;
39331
- return {
39332
- length,
39333
- contentOffset,
39334
- nextOffset: contentOffset + length,
39335
- };
39336
- }
39337
- function parseEd25519PrivateKey(pem) {
39338
- const raw = decodePem(pem);
39339
- if (raw.length === 32) {
39340
- return raw.slice();
39341
- }
39342
- // Handle PKCS#8 structure defined in RFC 8410
39343
- const sequence = readElement(raw, 0, 0x30);
39344
- const version = readElement(raw, sequence.contentOffset, 0x02);
39345
- let offset = version.nextOffset;
39346
- const algorithm = readElement(raw, offset, 0x30);
39347
- offset = algorithm.nextOffset;
39348
- const privateKey = readElement(raw, offset, 0x04);
39349
- const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
39350
- if (privateContent.length === 32) {
39351
- return privateContent.slice();
39352
- }
39353
- if (privateContent.length >= 34 && privateContent[0] === 0x04) {
39354
- const innerLength = privateContent[1];
39355
- if (innerLength !== 32 || privateContent.length < innerLength + 2) {
39356
- throw new Error('Unexpected Ed25519 private key length');
39357
- }
39358
- return privateContent.subarray(2, 34);
39359
- }
39360
- throw new Error('Unsupported Ed25519 private key structure');
39361
- }
39362
- const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
39363
- function encodeUtf8(value) {
39364
- if (textEncoder) {
39365
- return textEncoder.encode(value);
39366
- }
39367
- if (hasBuffer()) {
39368
- return Uint8Array.from(Buffer.from(value, 'utf8'));
39369
- }
39370
- throw new Error('No UTF-8 encoder available in this environment');
39371
- }
39372
-
39373
39373
  if (!hashes.sha512) {
39374
39374
  hashes.sha512 = (message) => sha512(message);
39375
39375
  }
@@ -39747,4 +39747,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
39747
39747
  WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
39748
39748
  });
39749
39749
 
39750
- export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
39750
+ export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };