@naylence/runtime 0.3.5-test.921 → 0.3.5-test.922
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +112 -107
- package/dist/browser/index.mjs +108 -108
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/security/index.js +2 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +112 -107
- package/dist/node/index.mjs +108 -108
- package/dist/node/node.cjs +112 -107
- package/dist/node/node.mjs +108 -108
- package/dist/types/naylence/fame/security/index.d.ts +2 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/node.cjs
CHANGED
|
@@ -5372,12 +5372,12 @@ for (const [name, config] of Object.entries(SQLITE_PROFILES)) {
|
|
|
5372
5372
|
}
|
|
5373
5373
|
|
|
5374
5374
|
// This file is auto-generated during build - do not edit manually
|
|
5375
|
-
// Generated from package.json version: 0.3.5-test.
|
|
5375
|
+
// Generated from package.json version: 0.3.5-test.922
|
|
5376
5376
|
/**
|
|
5377
5377
|
* The package version, injected at build time.
|
|
5378
5378
|
* @internal
|
|
5379
5379
|
*/
|
|
5380
|
-
const VERSION = '0.3.5-test.
|
|
5380
|
+
const VERSION = '0.3.5-test.922';
|
|
5381
5381
|
|
|
5382
5382
|
/**
|
|
5383
5383
|
* Fame errors module - Fame protocol specific error classes
|
|
@@ -26322,6 +26322,111 @@ class SigningConfig {
|
|
|
26322
26322
|
}
|
|
26323
26323
|
}
|
|
26324
26324
|
|
|
26325
|
+
function hasBuffer() {
|
|
26326
|
+
return typeof Buffer !== 'undefined';
|
|
26327
|
+
}
|
|
26328
|
+
function readStringProperty(source, ...names) {
|
|
26329
|
+
if (!source || typeof source !== 'object') {
|
|
26330
|
+
return undefined;
|
|
26331
|
+
}
|
|
26332
|
+
for (const name of names) {
|
|
26333
|
+
const value = source[name];
|
|
26334
|
+
if (typeof value === 'string' && value.length > 0) {
|
|
26335
|
+
return value;
|
|
26336
|
+
}
|
|
26337
|
+
}
|
|
26338
|
+
return undefined;
|
|
26339
|
+
}
|
|
26340
|
+
function decodePem(pem) {
|
|
26341
|
+
const base64 = pem
|
|
26342
|
+
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
26343
|
+
.replace(/-----END[^-]+-----/g, '')
|
|
26344
|
+
.replace(/\s+/g, '');
|
|
26345
|
+
if (typeof atob === 'function') {
|
|
26346
|
+
const binary = atob(base64);
|
|
26347
|
+
const bytes = new Uint8Array(binary.length);
|
|
26348
|
+
for (let i = 0; i < binary.length; i += 1) {
|
|
26349
|
+
bytes[i] = binary.charCodeAt(i);
|
|
26350
|
+
}
|
|
26351
|
+
return bytes;
|
|
26352
|
+
}
|
|
26353
|
+
if (hasBuffer()) {
|
|
26354
|
+
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
26355
|
+
}
|
|
26356
|
+
throw new Error('Base64 decoding is not available in this environment');
|
|
26357
|
+
}
|
|
26358
|
+
function readLength(data, offset) {
|
|
26359
|
+
const initial = data[offset];
|
|
26360
|
+
if (initial === undefined) {
|
|
26361
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
26362
|
+
}
|
|
26363
|
+
if ((initial & 0x80) === 0) {
|
|
26364
|
+
return { length: initial, nextOffset: offset + 1 };
|
|
26365
|
+
}
|
|
26366
|
+
const lengthOfLength = initial & 0x7f;
|
|
26367
|
+
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
26368
|
+
throw new Error('Unsupported ASN.1 length encoding');
|
|
26369
|
+
}
|
|
26370
|
+
let length = 0;
|
|
26371
|
+
let position = offset + 1;
|
|
26372
|
+
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
26373
|
+
const byte = data[position];
|
|
26374
|
+
if (byte === undefined) {
|
|
26375
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
26376
|
+
}
|
|
26377
|
+
length = (length << 8) | byte;
|
|
26378
|
+
position += 1;
|
|
26379
|
+
}
|
|
26380
|
+
return { length, nextOffset: position };
|
|
26381
|
+
}
|
|
26382
|
+
function readElement(data, offset, tag) {
|
|
26383
|
+
if (data[offset] !== tag) {
|
|
26384
|
+
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
26385
|
+
}
|
|
26386
|
+
const { length, nextOffset } = readLength(data, offset + 1);
|
|
26387
|
+
const contentOffset = nextOffset;
|
|
26388
|
+
return {
|
|
26389
|
+
length,
|
|
26390
|
+
contentOffset,
|
|
26391
|
+
nextOffset: contentOffset + length,
|
|
26392
|
+
};
|
|
26393
|
+
}
|
|
26394
|
+
function parseEd25519PrivateKey(pem) {
|
|
26395
|
+
const raw = decodePem(pem);
|
|
26396
|
+
if (raw.length === 32) {
|
|
26397
|
+
return raw.slice();
|
|
26398
|
+
}
|
|
26399
|
+
// Handle PKCS#8 structure defined in RFC 8410
|
|
26400
|
+
const sequence = readElement(raw, 0, 0x30);
|
|
26401
|
+
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
26402
|
+
let offset = version.nextOffset;
|
|
26403
|
+
const algorithm = readElement(raw, offset, 0x30);
|
|
26404
|
+
offset = algorithm.nextOffset;
|
|
26405
|
+
const privateKey = readElement(raw, offset, 0x04);
|
|
26406
|
+
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
26407
|
+
if (privateContent.length === 32) {
|
|
26408
|
+
return privateContent.slice();
|
|
26409
|
+
}
|
|
26410
|
+
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
26411
|
+
const innerLength = privateContent[1];
|
|
26412
|
+
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
26413
|
+
throw new Error('Unexpected Ed25519 private key length');
|
|
26414
|
+
}
|
|
26415
|
+
return privateContent.subarray(2, 34);
|
|
26416
|
+
}
|
|
26417
|
+
throw new Error('Unsupported Ed25519 private key structure');
|
|
26418
|
+
}
|
|
26419
|
+
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
26420
|
+
function encodeUtf8(value) {
|
|
26421
|
+
if (textEncoder) {
|
|
26422
|
+
return textEncoder.encode(value);
|
|
26423
|
+
}
|
|
26424
|
+
if (hasBuffer()) {
|
|
26425
|
+
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
26426
|
+
}
|
|
26427
|
+
throw new Error('No UTF-8 encoder available in this environment');
|
|
26428
|
+
}
|
|
26429
|
+
|
|
26325
26430
|
// Legacy global crypto provider accessors are intentionally disabled to force
|
|
26326
26431
|
// explicit dependency wiring. If a component still needs a global provider,
|
|
26327
26432
|
// refactor it to accept one via configuration instead of re-enabling this code.
|
|
@@ -41484,111 +41589,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
41484
41589
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
41485
41590
|
});
|
|
41486
41591
|
|
|
41487
|
-
function hasBuffer() {
|
|
41488
|
-
return typeof Buffer !== 'undefined';
|
|
41489
|
-
}
|
|
41490
|
-
function readStringProperty(source, ...names) {
|
|
41491
|
-
if (!source || typeof source !== 'object') {
|
|
41492
|
-
return undefined;
|
|
41493
|
-
}
|
|
41494
|
-
for (const name of names) {
|
|
41495
|
-
const value = source[name];
|
|
41496
|
-
if (typeof value === 'string' && value.length > 0) {
|
|
41497
|
-
return value;
|
|
41498
|
-
}
|
|
41499
|
-
}
|
|
41500
|
-
return undefined;
|
|
41501
|
-
}
|
|
41502
|
-
function decodePem(pem) {
|
|
41503
|
-
const base64 = pem
|
|
41504
|
-
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
41505
|
-
.replace(/-----END[^-]+-----/g, '')
|
|
41506
|
-
.replace(/\s+/g, '');
|
|
41507
|
-
if (typeof atob === 'function') {
|
|
41508
|
-
const binary = atob(base64);
|
|
41509
|
-
const bytes = new Uint8Array(binary.length);
|
|
41510
|
-
for (let i = 0; i < binary.length; i += 1) {
|
|
41511
|
-
bytes[i] = binary.charCodeAt(i);
|
|
41512
|
-
}
|
|
41513
|
-
return bytes;
|
|
41514
|
-
}
|
|
41515
|
-
if (hasBuffer()) {
|
|
41516
|
-
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
41517
|
-
}
|
|
41518
|
-
throw new Error('Base64 decoding is not available in this environment');
|
|
41519
|
-
}
|
|
41520
|
-
function readLength(data, offset) {
|
|
41521
|
-
const initial = data[offset];
|
|
41522
|
-
if (initial === undefined) {
|
|
41523
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
41524
|
-
}
|
|
41525
|
-
if ((initial & 0x80) === 0) {
|
|
41526
|
-
return { length: initial, nextOffset: offset + 1 };
|
|
41527
|
-
}
|
|
41528
|
-
const lengthOfLength = initial & 0x7f;
|
|
41529
|
-
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
41530
|
-
throw new Error('Unsupported ASN.1 length encoding');
|
|
41531
|
-
}
|
|
41532
|
-
let length = 0;
|
|
41533
|
-
let position = offset + 1;
|
|
41534
|
-
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
41535
|
-
const byte = data[position];
|
|
41536
|
-
if (byte === undefined) {
|
|
41537
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
41538
|
-
}
|
|
41539
|
-
length = (length << 8) | byte;
|
|
41540
|
-
position += 1;
|
|
41541
|
-
}
|
|
41542
|
-
return { length, nextOffset: position };
|
|
41543
|
-
}
|
|
41544
|
-
function readElement(data, offset, tag) {
|
|
41545
|
-
if (data[offset] !== tag) {
|
|
41546
|
-
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
41547
|
-
}
|
|
41548
|
-
const { length, nextOffset } = readLength(data, offset + 1);
|
|
41549
|
-
const contentOffset = nextOffset;
|
|
41550
|
-
return {
|
|
41551
|
-
length,
|
|
41552
|
-
contentOffset,
|
|
41553
|
-
nextOffset: contentOffset + length,
|
|
41554
|
-
};
|
|
41555
|
-
}
|
|
41556
|
-
function parseEd25519PrivateKey(pem) {
|
|
41557
|
-
const raw = decodePem(pem);
|
|
41558
|
-
if (raw.length === 32) {
|
|
41559
|
-
return raw.slice();
|
|
41560
|
-
}
|
|
41561
|
-
// Handle PKCS#8 structure defined in RFC 8410
|
|
41562
|
-
const sequence = readElement(raw, 0, 0x30);
|
|
41563
|
-
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
41564
|
-
let offset = version.nextOffset;
|
|
41565
|
-
const algorithm = readElement(raw, offset, 0x30);
|
|
41566
|
-
offset = algorithm.nextOffset;
|
|
41567
|
-
const privateKey = readElement(raw, offset, 0x04);
|
|
41568
|
-
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
41569
|
-
if (privateContent.length === 32) {
|
|
41570
|
-
return privateContent.slice();
|
|
41571
|
-
}
|
|
41572
|
-
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
41573
|
-
const innerLength = privateContent[1];
|
|
41574
|
-
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
41575
|
-
throw new Error('Unexpected Ed25519 private key length');
|
|
41576
|
-
}
|
|
41577
|
-
return privateContent.subarray(2, 34);
|
|
41578
|
-
}
|
|
41579
|
-
throw new Error('Unsupported Ed25519 private key structure');
|
|
41580
|
-
}
|
|
41581
|
-
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
41582
|
-
function encodeUtf8(value) {
|
|
41583
|
-
if (textEncoder) {
|
|
41584
|
-
return textEncoder.encode(value);
|
|
41585
|
-
}
|
|
41586
|
-
if (hasBuffer()) {
|
|
41587
|
-
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
41588
|
-
}
|
|
41589
|
-
throw new Error('No UTF-8 encoder available in this environment');
|
|
41590
|
-
}
|
|
41591
|
-
|
|
41592
41592
|
if (!ed25519.hashes.sha512) {
|
|
41593
41593
|
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
41594
41594
|
}
|
|
@@ -42150,6 +42150,7 @@ exports.assertGrant = assertGrant;
|
|
|
42150
42150
|
exports.basicConfig = basicConfig;
|
|
42151
42151
|
exports.broadcastChannelGrantToConnectorConfig = broadcastChannelGrantToConnectorConfig;
|
|
42152
42152
|
exports.camelToSnakeCase = camelToSnakeCase;
|
|
42153
|
+
exports.canonicalJson = canonicalJson;
|
|
42153
42154
|
exports.capitalizeFirstLetter = capitalizeFirstLetter;
|
|
42154
42155
|
exports.color = color;
|
|
42155
42156
|
exports.compareCryptoLevels = compareCryptoLevels;
|
|
@@ -42173,12 +42174,14 @@ exports.createX25519Keypair = createX25519Keypair;
|
|
|
42173
42174
|
exports.credentialToString = credentialToString;
|
|
42174
42175
|
exports.currentTraceId = currentTraceId$1;
|
|
42175
42176
|
exports.debounce = debounce;
|
|
42177
|
+
exports.decodeBase64Url = decodeBase64Url;
|
|
42176
42178
|
exports.decodeFameDataPayload = decodeFameDataPayload;
|
|
42177
42179
|
exports.deepMerge = deepMerge;
|
|
42178
42180
|
exports.defaultJsonEncoder = defaultJsonEncoder;
|
|
42179
42181
|
exports.delay = delay;
|
|
42180
42182
|
exports.dropEmpty = dropEmpty;
|
|
42181
42183
|
exports.enableLogging = enableLogging;
|
|
42184
|
+
exports.encodeUtf8 = encodeUtf8;
|
|
42182
42185
|
exports.ensureRuntimeFactoriesRegistered = ensureRuntimeFactoriesRegistered;
|
|
42183
42186
|
exports.extractId = extractId;
|
|
42184
42187
|
exports.extractPoolAddressBase = extractPoolAddressBase;
|
|
@@ -42186,6 +42189,7 @@ exports.extractPoolBase = extractPoolBase;
|
|
|
42186
42189
|
exports.filterKeysByUse = filterKeysByUse;
|
|
42187
42190
|
exports.formatTimestamp = formatTimestamp;
|
|
42188
42191
|
exports.formatTimestampForConsole = formatTimestampForConsole$1;
|
|
42192
|
+
exports.frameDigest = frameDigest;
|
|
42189
42193
|
exports.getCurrentEnvelope = getCurrentEnvelope;
|
|
42190
42194
|
exports.getFameRoot = getFameRoot;
|
|
42191
42195
|
exports.getHttpListenerInstance = getHttpListenerInstance;
|
|
@@ -42198,6 +42202,7 @@ exports.hasCryptoSupport = hasCryptoSupport;
|
|
|
42198
42202
|
exports.hostnameToLogical = hostnameToLogical;
|
|
42199
42203
|
exports.hostnamesToLogicals = hostnamesToLogicals;
|
|
42200
42204
|
exports.httpGrantToConnectorConfig = httpGrantToConnectorConfig;
|
|
42205
|
+
exports.immutableHeaders = immutableHeaders;
|
|
42201
42206
|
exports.inPageGrantToConnectorConfig = inPageGrantToConnectorConfig;
|
|
42202
42207
|
exports.isAuthInjectionStrategy = isAuthInjectionStrategy;
|
|
42203
42208
|
exports.isBroadcastChannelConnectionGrant = isBroadcastChannelConnectionGrant;
|
package/dist/node/node.mjs
CHANGED
|
@@ -5371,12 +5371,12 @@ for (const [name, config] of Object.entries(SQLITE_PROFILES)) {
|
|
|
5371
5371
|
}
|
|
5372
5372
|
|
|
5373
5373
|
// This file is auto-generated during build - do not edit manually
|
|
5374
|
-
// Generated from package.json version: 0.3.5-test.
|
|
5374
|
+
// Generated from package.json version: 0.3.5-test.922
|
|
5375
5375
|
/**
|
|
5376
5376
|
* The package version, injected at build time.
|
|
5377
5377
|
* @internal
|
|
5378
5378
|
*/
|
|
5379
|
-
const VERSION = '0.3.5-test.
|
|
5379
|
+
const VERSION = '0.3.5-test.922';
|
|
5380
5380
|
|
|
5381
5381
|
/**
|
|
5382
5382
|
* Fame errors module - Fame protocol specific error classes
|
|
@@ -26321,6 +26321,111 @@ class SigningConfig {
|
|
|
26321
26321
|
}
|
|
26322
26322
|
}
|
|
26323
26323
|
|
|
26324
|
+
function hasBuffer() {
|
|
26325
|
+
return typeof Buffer !== 'undefined';
|
|
26326
|
+
}
|
|
26327
|
+
function readStringProperty(source, ...names) {
|
|
26328
|
+
if (!source || typeof source !== 'object') {
|
|
26329
|
+
return undefined;
|
|
26330
|
+
}
|
|
26331
|
+
for (const name of names) {
|
|
26332
|
+
const value = source[name];
|
|
26333
|
+
if (typeof value === 'string' && value.length > 0) {
|
|
26334
|
+
return value;
|
|
26335
|
+
}
|
|
26336
|
+
}
|
|
26337
|
+
return undefined;
|
|
26338
|
+
}
|
|
26339
|
+
function decodePem(pem) {
|
|
26340
|
+
const base64 = pem
|
|
26341
|
+
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
26342
|
+
.replace(/-----END[^-]+-----/g, '')
|
|
26343
|
+
.replace(/\s+/g, '');
|
|
26344
|
+
if (typeof atob === 'function') {
|
|
26345
|
+
const binary = atob(base64);
|
|
26346
|
+
const bytes = new Uint8Array(binary.length);
|
|
26347
|
+
for (let i = 0; i < binary.length; i += 1) {
|
|
26348
|
+
bytes[i] = binary.charCodeAt(i);
|
|
26349
|
+
}
|
|
26350
|
+
return bytes;
|
|
26351
|
+
}
|
|
26352
|
+
if (hasBuffer()) {
|
|
26353
|
+
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
26354
|
+
}
|
|
26355
|
+
throw new Error('Base64 decoding is not available in this environment');
|
|
26356
|
+
}
|
|
26357
|
+
function readLength(data, offset) {
|
|
26358
|
+
const initial = data[offset];
|
|
26359
|
+
if (initial === undefined) {
|
|
26360
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
26361
|
+
}
|
|
26362
|
+
if ((initial & 0x80) === 0) {
|
|
26363
|
+
return { length: initial, nextOffset: offset + 1 };
|
|
26364
|
+
}
|
|
26365
|
+
const lengthOfLength = initial & 0x7f;
|
|
26366
|
+
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
26367
|
+
throw new Error('Unsupported ASN.1 length encoding');
|
|
26368
|
+
}
|
|
26369
|
+
let length = 0;
|
|
26370
|
+
let position = offset + 1;
|
|
26371
|
+
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
26372
|
+
const byte = data[position];
|
|
26373
|
+
if (byte === undefined) {
|
|
26374
|
+
throw new Error('Unexpected end of ASN.1 data');
|
|
26375
|
+
}
|
|
26376
|
+
length = (length << 8) | byte;
|
|
26377
|
+
position += 1;
|
|
26378
|
+
}
|
|
26379
|
+
return { length, nextOffset: position };
|
|
26380
|
+
}
|
|
26381
|
+
function readElement(data, offset, tag) {
|
|
26382
|
+
if (data[offset] !== tag) {
|
|
26383
|
+
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
26384
|
+
}
|
|
26385
|
+
const { length, nextOffset } = readLength(data, offset + 1);
|
|
26386
|
+
const contentOffset = nextOffset;
|
|
26387
|
+
return {
|
|
26388
|
+
length,
|
|
26389
|
+
contentOffset,
|
|
26390
|
+
nextOffset: contentOffset + length,
|
|
26391
|
+
};
|
|
26392
|
+
}
|
|
26393
|
+
function parseEd25519PrivateKey(pem) {
|
|
26394
|
+
const raw = decodePem(pem);
|
|
26395
|
+
if (raw.length === 32) {
|
|
26396
|
+
return raw.slice();
|
|
26397
|
+
}
|
|
26398
|
+
// Handle PKCS#8 structure defined in RFC 8410
|
|
26399
|
+
const sequence = readElement(raw, 0, 0x30);
|
|
26400
|
+
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
26401
|
+
let offset = version.nextOffset;
|
|
26402
|
+
const algorithm = readElement(raw, offset, 0x30);
|
|
26403
|
+
offset = algorithm.nextOffset;
|
|
26404
|
+
const privateKey = readElement(raw, offset, 0x04);
|
|
26405
|
+
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
26406
|
+
if (privateContent.length === 32) {
|
|
26407
|
+
return privateContent.slice();
|
|
26408
|
+
}
|
|
26409
|
+
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
26410
|
+
const innerLength = privateContent[1];
|
|
26411
|
+
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
26412
|
+
throw new Error('Unexpected Ed25519 private key length');
|
|
26413
|
+
}
|
|
26414
|
+
return privateContent.subarray(2, 34);
|
|
26415
|
+
}
|
|
26416
|
+
throw new Error('Unsupported Ed25519 private key structure');
|
|
26417
|
+
}
|
|
26418
|
+
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
26419
|
+
function encodeUtf8(value) {
|
|
26420
|
+
if (textEncoder) {
|
|
26421
|
+
return textEncoder.encode(value);
|
|
26422
|
+
}
|
|
26423
|
+
if (hasBuffer()) {
|
|
26424
|
+
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
26425
|
+
}
|
|
26426
|
+
throw new Error('No UTF-8 encoder available in this environment');
|
|
26427
|
+
}
|
|
26428
|
+
|
|
26324
26429
|
// Legacy global crypto provider accessors are intentionally disabled to force
|
|
26325
26430
|
// explicit dependency wiring. If a component still needs a global provider,
|
|
26326
26431
|
// refactor it to accept one via configuration instead of re-enabling this code.
|
|
@@ -41483,111 +41588,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
41483
41588
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
41484
41589
|
});
|
|
41485
41590
|
|
|
41486
|
-
function hasBuffer() {
|
|
41487
|
-
return typeof Buffer !== 'undefined';
|
|
41488
|
-
}
|
|
41489
|
-
function readStringProperty(source, ...names) {
|
|
41490
|
-
if (!source || typeof source !== 'object') {
|
|
41491
|
-
return undefined;
|
|
41492
|
-
}
|
|
41493
|
-
for (const name of names) {
|
|
41494
|
-
const value = source[name];
|
|
41495
|
-
if (typeof value === 'string' && value.length > 0) {
|
|
41496
|
-
return value;
|
|
41497
|
-
}
|
|
41498
|
-
}
|
|
41499
|
-
return undefined;
|
|
41500
|
-
}
|
|
41501
|
-
function decodePem(pem) {
|
|
41502
|
-
const base64 = pem
|
|
41503
|
-
.replace(/-----BEGIN[^-]+-----/g, '')
|
|
41504
|
-
.replace(/-----END[^-]+-----/g, '')
|
|
41505
|
-
.replace(/\s+/g, '');
|
|
41506
|
-
if (typeof atob === 'function') {
|
|
41507
|
-
const binary = atob(base64);
|
|
41508
|
-
const bytes = new Uint8Array(binary.length);
|
|
41509
|
-
for (let i = 0; i < binary.length; i += 1) {
|
|
41510
|
-
bytes[i] = binary.charCodeAt(i);
|
|
41511
|
-
}
|
|
41512
|
-
return bytes;
|
|
41513
|
-
}
|
|
41514
|
-
if (hasBuffer()) {
|
|
41515
|
-
return Uint8Array.from(Buffer.from(base64, 'base64'));
|
|
41516
|
-
}
|
|
41517
|
-
throw new Error('Base64 decoding is not available in this environment');
|
|
41518
|
-
}
|
|
41519
|
-
function readLength(data, offset) {
|
|
41520
|
-
const initial = data[offset];
|
|
41521
|
-
if (initial === undefined) {
|
|
41522
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
41523
|
-
}
|
|
41524
|
-
if ((initial & 0x80) === 0) {
|
|
41525
|
-
return { length: initial, nextOffset: offset + 1 };
|
|
41526
|
-
}
|
|
41527
|
-
const lengthOfLength = initial & 0x7f;
|
|
41528
|
-
if (lengthOfLength === 0 || lengthOfLength > 4) {
|
|
41529
|
-
throw new Error('Unsupported ASN.1 length encoding');
|
|
41530
|
-
}
|
|
41531
|
-
let length = 0;
|
|
41532
|
-
let position = offset + 1;
|
|
41533
|
-
for (let i = 0; i < lengthOfLength; i += 1) {
|
|
41534
|
-
const byte = data[position];
|
|
41535
|
-
if (byte === undefined) {
|
|
41536
|
-
throw new Error('Unexpected end of ASN.1 data');
|
|
41537
|
-
}
|
|
41538
|
-
length = (length << 8) | byte;
|
|
41539
|
-
position += 1;
|
|
41540
|
-
}
|
|
41541
|
-
return { length, nextOffset: position };
|
|
41542
|
-
}
|
|
41543
|
-
function readElement(data, offset, tag) {
|
|
41544
|
-
if (data[offset] !== tag) {
|
|
41545
|
-
throw new Error(`Unexpected ASN.1 tag: expected 0x${tag.toString(16)}, got 0x${(data[offset] ?? 0).toString(16)}`);
|
|
41546
|
-
}
|
|
41547
|
-
const { length, nextOffset } = readLength(data, offset + 1);
|
|
41548
|
-
const contentOffset = nextOffset;
|
|
41549
|
-
return {
|
|
41550
|
-
length,
|
|
41551
|
-
contentOffset,
|
|
41552
|
-
nextOffset: contentOffset + length,
|
|
41553
|
-
};
|
|
41554
|
-
}
|
|
41555
|
-
function parseEd25519PrivateKey(pem) {
|
|
41556
|
-
const raw = decodePem(pem);
|
|
41557
|
-
if (raw.length === 32) {
|
|
41558
|
-
return raw.slice();
|
|
41559
|
-
}
|
|
41560
|
-
// Handle PKCS#8 structure defined in RFC 8410
|
|
41561
|
-
const sequence = readElement(raw, 0, 0x30);
|
|
41562
|
-
const version = readElement(raw, sequence.contentOffset, 0x02);
|
|
41563
|
-
let offset = version.nextOffset;
|
|
41564
|
-
const algorithm = readElement(raw, offset, 0x30);
|
|
41565
|
-
offset = algorithm.nextOffset;
|
|
41566
|
-
const privateKey = readElement(raw, offset, 0x04);
|
|
41567
|
-
const privateContent = raw.subarray(privateKey.contentOffset, privateKey.contentOffset + privateKey.length);
|
|
41568
|
-
if (privateContent.length === 32) {
|
|
41569
|
-
return privateContent.slice();
|
|
41570
|
-
}
|
|
41571
|
-
if (privateContent.length >= 34 && privateContent[0] === 0x04) {
|
|
41572
|
-
const innerLength = privateContent[1];
|
|
41573
|
-
if (innerLength !== 32 || privateContent.length < innerLength + 2) {
|
|
41574
|
-
throw new Error('Unexpected Ed25519 private key length');
|
|
41575
|
-
}
|
|
41576
|
-
return privateContent.subarray(2, 34);
|
|
41577
|
-
}
|
|
41578
|
-
throw new Error('Unsupported Ed25519 private key structure');
|
|
41579
|
-
}
|
|
41580
|
-
const textEncoder = typeof TextEncoder !== 'undefined' ? new TextEncoder() : undefined;
|
|
41581
|
-
function encodeUtf8(value) {
|
|
41582
|
-
if (textEncoder) {
|
|
41583
|
-
return textEncoder.encode(value);
|
|
41584
|
-
}
|
|
41585
|
-
if (hasBuffer()) {
|
|
41586
|
-
return Uint8Array.from(Buffer.from(value, 'utf8'));
|
|
41587
|
-
}
|
|
41588
|
-
throw new Error('No UTF-8 encoder available in this environment');
|
|
41589
|
-
}
|
|
41590
|
-
|
|
41591
41591
|
if (!hashes.sha512) {
|
|
41592
41592
|
hashes.sha512 = (message) => sha512(message);
|
|
41593
41593
|
}
|
|
@@ -41965,4 +41965,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
|
|
|
41965
41965
|
WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
|
|
41966
41966
|
});
|
|
41967
41967
|
|
|
41968
|
-
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$Z as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultHttpServer, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM$2 as ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$2 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$_ as FACTORY_META, FAME_FABRIC_FACTORY_BASE_TYPE, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, HttpListener, HttpStatelessConnector, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageListener, InProcessFameFabric, InProcessFameFabricFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, QueueFullError, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, SQLiteKeyValueStore, SQLiteStorageProvider, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_LISTENER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportListener, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketListener, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createJwksRouter, createLogicalUri, createNodeDeliveryContext, createApp as createOAuth2ServerApp, createOAuth2TokenRouter, createOpenIDConfigurationRouter, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, getCurrentEnvelope, getFameRoot, getHttpListenerInstance, getInPageListenerInstance, getKeyProvider, getKeyStore, getLogger, getWebsocketListenerInstance, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeExtendedFameConfig, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, main as runOAuth2Server, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|
|
41968
|
+
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$Z as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultHttpServer, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM$2 as ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$2 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$_ as FACTORY_META, FAME_FABRIC_FACTORY_BASE_TYPE, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, HttpListener, HttpStatelessConnector, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageListener, InProcessFameFabric, InProcessFameFabricFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, QueueFullError, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, SQLiteKeyValueStore, SQLiteStorageProvider, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_LISTENER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportListener, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketListener, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createJwksRouter, createLogicalUri, createNodeDeliveryContext, createApp as createOAuth2ServerApp, createOAuth2TokenRouter, createOpenIDConfigurationRouter, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getHttpListenerInstance, getInPageListenerInstance, getKeyProvider, getKeyStore, getLogger, getWebsocketListenerInstance, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeExtendedFameConfig, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, main as runOAuth2Server, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|
|
@@ -53,6 +53,8 @@ export type * from './security-manager-factory.js';
|
|
|
53
53
|
export * from './signing/envelope-signer.js';
|
|
54
54
|
export * from './signing/envelope-verifier.js';
|
|
55
55
|
export { SigningConfig as SigningConfigClass, type SigningConfigOptions, } from './signing/signing-config.js';
|
|
56
|
+
export { canonicalJson, decodeBase64Url, frameDigest, immutableHeaders, } from './signing/eddsa-signer-verifier.js';
|
|
57
|
+
export { encodeUtf8, } from './signing/eddsa-utils.js';
|
|
56
58
|
export * from './crypto/providers/crypto-provider.js';
|
|
57
59
|
export * from './crypto/providers/default-crypto-provider.js';
|
|
58
60
|
export * from './credential/credential-provider.js';
|
package/dist/types/version.d.ts
CHANGED