@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +355 -278
- package/dist/browser/index.mjs +346 -273
- package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/factory-manifest.js +2 -0
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/esm/naylence/fame/security/index.js +3 -0
- package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +351 -274
- package/dist/node/index.mjs +346 -273
- package/dist/node/node.cjs +350 -273
- package/dist/node/node.mjs +345 -272
- package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
- package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
- package/dist/types/naylence/fame/security/index.d.ts +4 -0
- package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
- package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/browser/index.cjs
CHANGED
|
@@ -3,15 +3,15 @@
|
|
|
3
3
|
var core = require('@naylence/core');
|
|
4
4
|
var zod = require('zod');
|
|
5
5
|
var factory = require('@naylence/factory');
|
|
6
|
+
var ed25519 = require('@noble/ed25519');
|
|
7
|
+
var sha2_js = require('@noble/hashes/sha2.js');
|
|
6
8
|
var chacha_js = require('@noble/ciphers/chacha.js');
|
|
7
9
|
var ed25519_js = require('@noble/curves/ed25519.js');
|
|
8
10
|
var hkdf_js = require('@noble/hashes/hkdf.js');
|
|
9
|
-
var sha2_js = require('@noble/hashes/sha2.js');
|
|
10
11
|
var utils_js = require('@noble/hashes/utils.js');
|
|
11
12
|
var yaml = require('yaml');
|
|
12
13
|
var fastify = require('fastify');
|
|
13
14
|
var websocketPlugin = require('@fastify/websocket');
|
|
14
|
-
var ed25519 = require('@noble/ed25519');
|
|
15
15
|
|
|
16
16
|
var _documentCurrentScript = typeof document !== 'undefined' ? document.currentScript : null;
|
|
17
17
|
// --- ENV SHIM (runs once in browser) ---
|
|
@@ -98,12 +98,12 @@ installProcessEnvShim();
|
|
|
98
98
|
// --- END ENV SHIM ---
|
|
99
99
|
|
|
100
100
|
// This file is auto-generated during build - do not edit manually
|
|
101
|
-
// Generated from package.json version: 0.3.5-test.
|
|
101
|
+
// Generated from package.json version: 0.3.5-test.924
|
|
102
102
|
/**
|
|
103
103
|
* The package version, injected at build time.
|
|
104
104
|
* @internal
|
|
105
105
|
*/
|
|
106
|
-
const VERSION = '0.3.5-test.
|
|
106
|
+
const VERSION = '0.3.5-test.924';
|
|
107
107
|
|
|
108
108
|
/**
|
|
109
109
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -3169,7 +3169,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3169
3169
|
return new EnvCredentialProvider(resolved.varName);
|
|
3170
3170
|
}
|
|
3171
3171
|
}
|
|
3172
|
-
const FACTORY_META$
|
|
3172
|
+
const FACTORY_META$18 = {
|
|
3173
3173
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3174
3174
|
key: 'EnvCredentialProvider',
|
|
3175
3175
|
};
|
|
@@ -3177,7 +3177,7 @@ const FACTORY_META$17 = {
|
|
|
3177
3177
|
var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3178
3178
|
__proto__: null,
|
|
3179
3179
|
EnvCredentialProviderFactory: EnvCredentialProviderFactory,
|
|
3180
|
-
FACTORY_META: FACTORY_META$
|
|
3180
|
+
FACTORY_META: FACTORY_META$18,
|
|
3181
3181
|
default: EnvCredentialProviderFactory,
|
|
3182
3182
|
normalizeEnvConfig: normalizeEnvConfig
|
|
3183
3183
|
});
|
|
@@ -3275,14 +3275,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3275
3275
|
return new PromptCredentialProvider(resolved.credentialName);
|
|
3276
3276
|
}
|
|
3277
3277
|
}
|
|
3278
|
-
const FACTORY_META$
|
|
3278
|
+
const FACTORY_META$17 = {
|
|
3279
3279
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3280
3280
|
key: 'PromptCredentialProvider',
|
|
3281
3281
|
};
|
|
3282
3282
|
|
|
3283
3283
|
var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3284
3284
|
__proto__: null,
|
|
3285
|
-
FACTORY_META: FACTORY_META$
|
|
3285
|
+
FACTORY_META: FACTORY_META$17,
|
|
3286
3286
|
PromptCredentialProviderFactory: PromptCredentialProviderFactory,
|
|
3287
3287
|
default: PromptCredentialProviderFactory,
|
|
3288
3288
|
normalizePromptConfig: normalizePromptConfig
|
|
@@ -3336,14 +3336,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3336
3336
|
return new SecretStoreCredentialProvider(resolved.secretName);
|
|
3337
3337
|
}
|
|
3338
3338
|
}
|
|
3339
|
-
const FACTORY_META$
|
|
3339
|
+
const FACTORY_META$16 = {
|
|
3340
3340
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3341
3341
|
key: 'SecretStoreCredentialProvider',
|
|
3342
3342
|
};
|
|
3343
3343
|
|
|
3344
3344
|
var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3345
3345
|
__proto__: null,
|
|
3346
|
-
FACTORY_META: FACTORY_META$
|
|
3346
|
+
FACTORY_META: FACTORY_META$16,
|
|
3347
3347
|
SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
|
|
3348
3348
|
default: SecretStoreCredentialProviderFactory,
|
|
3349
3349
|
normalizeSecretStoreConfig: normalizeSecretStoreConfig
|
|
@@ -3392,14 +3392,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3392
3392
|
return new StaticCredentialProvider(resolved.credentialValue);
|
|
3393
3393
|
}
|
|
3394
3394
|
}
|
|
3395
|
-
const FACTORY_META$
|
|
3395
|
+
const FACTORY_META$15 = {
|
|
3396
3396
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3397
3397
|
key: 'StaticCredentialProvider',
|
|
3398
3398
|
};
|
|
3399
3399
|
|
|
3400
3400
|
var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3401
3401
|
__proto__: null,
|
|
3402
|
-
FACTORY_META: FACTORY_META$
|
|
3402
|
+
FACTORY_META: FACTORY_META$15,
|
|
3403
3403
|
StaticCredentialProviderFactory: StaticCredentialProviderFactory,
|
|
3404
3404
|
default: StaticCredentialProviderFactory,
|
|
3405
3405
|
normalizeStaticConfig: normalizeStaticConfig
|
|
@@ -13505,6 +13505,7 @@ const MODULES = [
|
|
|
13505
13505
|
"./security/policy/no-security-policy-factory.js",
|
|
13506
13506
|
"./security/signing/eddsa-envelope-signer-factory.js",
|
|
13507
13507
|
"./security/signing/eddsa-envelope-verifier-factory.js",
|
|
13508
|
+
"./security/trust-store/noop-trust-store-provider-factory.js",
|
|
13508
13509
|
"./sentinel/capability-aware-routing-policy-factory.js",
|
|
13509
13510
|
"./sentinel/composite-routing-policy-factory.js",
|
|
13510
13511
|
"./sentinel/hybrid-path-routing-policy-factory.js",
|
|
@@ -13579,6 +13580,7 @@ const MODULE_LOADERS = {
|
|
|
13579
13580
|
"./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
|
|
13580
13581
|
"./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
|
|
13581
13582
|
"./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
|
|
13583
|
+
"./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
|
|
13582
13584
|
"./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
|
|
13583
13585
|
"./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
|
|
13584
13586
|
"./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
|
|
@@ -13883,7 +13885,7 @@ class NodeLikeFactory extends factory.AbstractResourceFactory {
|
|
|
13883
13885
|
// registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
|
|
13884
13886
|
// }
|
|
13885
13887
|
|
|
13886
|
-
const FACTORY_META$
|
|
13888
|
+
const FACTORY_META$14 = {
|
|
13887
13889
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
13888
13890
|
key: 'Node',
|
|
13889
13891
|
};
|
|
@@ -13924,7 +13926,7 @@ class NodeFactory extends NodeLikeFactory {
|
|
|
13924
13926
|
|
|
13925
13927
|
var nodeFactory = /*#__PURE__*/Object.freeze({
|
|
13926
13928
|
__proto__: null,
|
|
13927
|
-
FACTORY_META: FACTORY_META$
|
|
13929
|
+
FACTORY_META: FACTORY_META$14,
|
|
13928
13930
|
NodeFactory: NodeFactory,
|
|
13929
13931
|
default: NodeFactory
|
|
13930
13932
|
});
|
|
@@ -15365,7 +15367,7 @@ class RouteStoreFactory extends factory.AbstractResourceFactory {
|
|
|
15365
15367
|
return store ?? null;
|
|
15366
15368
|
}
|
|
15367
15369
|
}
|
|
15368
|
-
const FACTORY_META$
|
|
15370
|
+
const FACTORY_META$13 = {
|
|
15369
15371
|
base: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15370
15372
|
key: 'InMemoryRouteStore',
|
|
15371
15373
|
};
|
|
@@ -15383,7 +15385,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
|
|
|
15383
15385
|
|
|
15384
15386
|
var routeStoreFactory = /*#__PURE__*/Object.freeze({
|
|
15385
15387
|
__proto__: null,
|
|
15386
|
-
FACTORY_META: FACTORY_META$
|
|
15388
|
+
FACTORY_META: FACTORY_META$13,
|
|
15387
15389
|
InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
|
|
15388
15390
|
ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15389
15391
|
RouteStoreFactory: RouteStoreFactory,
|
|
@@ -19199,7 +19201,7 @@ function isPlainRecord(value) {
|
|
|
19199
19201
|
return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
|
|
19200
19202
|
}
|
|
19201
19203
|
|
|
19202
|
-
const FACTORY_META$
|
|
19204
|
+
const FACTORY_META$12 = {
|
|
19203
19205
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
19204
19206
|
key: 'Sentinel',
|
|
19205
19207
|
};
|
|
@@ -19383,7 +19385,7 @@ class SentinelFactory extends NodeLikeFactory {
|
|
|
19383
19385
|
|
|
19384
19386
|
var sentinelFactory = /*#__PURE__*/Object.freeze({
|
|
19385
19387
|
__proto__: null,
|
|
19386
|
-
FACTORY_META: FACTORY_META$
|
|
19388
|
+
FACTORY_META: FACTORY_META$12,
|
|
19387
19389
|
SentinelFactory: SentinelFactory,
|
|
19388
19390
|
default: SentinelFactory
|
|
19389
19391
|
});
|
|
@@ -20534,6 +20536,45 @@ class CertificateManagerFactory extends factory.AbstractResourceFactory {
|
|
|
20534
20536
|
}
|
|
20535
20537
|
}
|
|
20536
20538
|
|
|
20539
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
20540
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
20541
|
+
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
20542
|
+
createUnconfiguredProvider(reason) {
|
|
20543
|
+
return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
20544
|
+
}
|
|
20545
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
20546
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
20547
|
+
const mergedFactoryArgs = [
|
|
20548
|
+
...(dependencies ? [dependencies] : []),
|
|
20549
|
+
...(factoryArgs ?? []),
|
|
20550
|
+
];
|
|
20551
|
+
const creationOptions = {
|
|
20552
|
+
...restOptions,
|
|
20553
|
+
factoryArgs: mergedFactoryArgs,
|
|
20554
|
+
};
|
|
20555
|
+
if (config) {
|
|
20556
|
+
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
20557
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20558
|
+
}
|
|
20559
|
+
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
20560
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20561
|
+
}
|
|
20562
|
+
}
|
|
20563
|
+
class NoopTrustStoreProvider {
|
|
20564
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
20565
|
+
this.reason = reason;
|
|
20566
|
+
}
|
|
20567
|
+
async getTrustStorePem() {
|
|
20568
|
+
throw new Error(this.reason);
|
|
20569
|
+
}
|
|
20570
|
+
async getRoots() {
|
|
20571
|
+
return [];
|
|
20572
|
+
}
|
|
20573
|
+
async initialize() {
|
|
20574
|
+
// No-op for the placeholder provider.
|
|
20575
|
+
}
|
|
20576
|
+
}
|
|
20577
|
+
|
|
20537
20578
|
const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
|
|
20538
20579
|
class EncryptionManagerFactory extends factory.AbstractResourceFactory {
|
|
20539
20580
|
getPriority() {
|
|
@@ -25350,6 +25391,146 @@ function encodeUtf8(value) {
|
|
|
25350
25391
|
throw new Error('No UTF-8 encoder available in this environment');
|
|
25351
25392
|
}
|
|
25352
25393
|
|
|
25394
|
+
if (!ed25519.hashes.sha512) {
|
|
25395
|
+
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
25396
|
+
}
|
|
25397
|
+
function normalizeSignerOptions(options) {
|
|
25398
|
+
if (!options || typeof options !== 'object') {
|
|
25399
|
+
return {};
|
|
25400
|
+
}
|
|
25401
|
+
const candidate = options;
|
|
25402
|
+
const result = {
|
|
25403
|
+
...options,
|
|
25404
|
+
};
|
|
25405
|
+
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
25406
|
+
if (cryptoProvider !== undefined) {
|
|
25407
|
+
result.cryptoProvider = cryptoProvider ?? null;
|
|
25408
|
+
}
|
|
25409
|
+
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
25410
|
+
if (signingConfig !== undefined) {
|
|
25411
|
+
result.signingConfig = signingConfig;
|
|
25412
|
+
}
|
|
25413
|
+
const privateKeyPem = resolveAlias(candidate, [
|
|
25414
|
+
'privateKeyPem',
|
|
25415
|
+
'private_key_pem',
|
|
25416
|
+
]);
|
|
25417
|
+
if (privateKeyPem !== undefined) {
|
|
25418
|
+
result.privateKeyPem = privateKeyPem;
|
|
25419
|
+
}
|
|
25420
|
+
const keyId = resolveAlias(candidate, [
|
|
25421
|
+
'keyId',
|
|
25422
|
+
'key_id',
|
|
25423
|
+
]);
|
|
25424
|
+
if (keyId !== undefined) {
|
|
25425
|
+
result.keyId = keyId;
|
|
25426
|
+
}
|
|
25427
|
+
return result;
|
|
25428
|
+
}
|
|
25429
|
+
class EdDSAEnvelopeSigner {
|
|
25430
|
+
constructor(options = {}) {
|
|
25431
|
+
const normalized = normalizeSignerOptions(options);
|
|
25432
|
+
const provider = normalized.cryptoProvider ?? null;
|
|
25433
|
+
if (!provider) {
|
|
25434
|
+
throw new Error('No crypto provider is configured for signing');
|
|
25435
|
+
}
|
|
25436
|
+
this.crypto = provider;
|
|
25437
|
+
const signingConfigOption = normalized.signingConfig;
|
|
25438
|
+
if (signingConfigOption instanceof SigningConfig) {
|
|
25439
|
+
this.signingConfig = signingConfigOption;
|
|
25440
|
+
}
|
|
25441
|
+
else if (signingConfigOption) {
|
|
25442
|
+
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
25443
|
+
}
|
|
25444
|
+
else {
|
|
25445
|
+
this.signingConfig = new SigningConfig();
|
|
25446
|
+
}
|
|
25447
|
+
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
25448
|
+
this.explicitKeyId = normalized.keyId;
|
|
25449
|
+
}
|
|
25450
|
+
signEnvelope(envelope, { physicalPath }) {
|
|
25451
|
+
if (!envelope.sid) {
|
|
25452
|
+
throw new Error('Envelope missing sid');
|
|
25453
|
+
}
|
|
25454
|
+
const frame = envelope.frame;
|
|
25455
|
+
if (frame.type === 'Data') {
|
|
25456
|
+
const dataFrame = frame;
|
|
25457
|
+
if (!dataFrame.pd) {
|
|
25458
|
+
const payload = dataFrame.payload ?? '';
|
|
25459
|
+
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
25460
|
+
dataFrame.pd = secureDigest(payloadString);
|
|
25461
|
+
}
|
|
25462
|
+
}
|
|
25463
|
+
const digest = frameDigest(frame);
|
|
25464
|
+
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
25465
|
+
const sidDigest = secureDigest(physicalPath);
|
|
25466
|
+
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
25467
|
+
1 +
|
|
25468
|
+
encodeUtf8(immutable).length +
|
|
25469
|
+
1 +
|
|
25470
|
+
encodeUtf8(digest).length);
|
|
25471
|
+
const sidBytes = encodeUtf8(sidDigest);
|
|
25472
|
+
const immBytes = encodeUtf8(immutable);
|
|
25473
|
+
const digBytes = encodeUtf8(digest);
|
|
25474
|
+
let offset = 0;
|
|
25475
|
+
tbs.set(sidBytes, offset);
|
|
25476
|
+
offset += sidBytes.length;
|
|
25477
|
+
tbs[offset] = 0x1f;
|
|
25478
|
+
offset += 1;
|
|
25479
|
+
tbs.set(immBytes, offset);
|
|
25480
|
+
offset += immBytes.length;
|
|
25481
|
+
tbs[offset] = 0x1f;
|
|
25482
|
+
offset += 1;
|
|
25483
|
+
tbs.set(digBytes, offset);
|
|
25484
|
+
const privateKey = this.loadPrivateKey();
|
|
25485
|
+
const signatureBytes = ed25519.sign(tbs, privateKey);
|
|
25486
|
+
const signature = urlsafeBase64Encode(signatureBytes);
|
|
25487
|
+
const kid = this.determineKeyId();
|
|
25488
|
+
const signatureHeader = {
|
|
25489
|
+
kid,
|
|
25490
|
+
val: signature,
|
|
25491
|
+
alg: 'EdDSA',
|
|
25492
|
+
};
|
|
25493
|
+
const secHeader = envelope.sec ?? {};
|
|
25494
|
+
secHeader.sig = signatureHeader;
|
|
25495
|
+
envelope.sec = secHeader;
|
|
25496
|
+
return envelope;
|
|
25497
|
+
}
|
|
25498
|
+
loadPrivateKey() {
|
|
25499
|
+
const pem = this.explicitPrivateKey ??
|
|
25500
|
+
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
25501
|
+
if (!pem) {
|
|
25502
|
+
throw new Error('Crypto provider does not expose a signing private key');
|
|
25503
|
+
}
|
|
25504
|
+
return parseEd25519PrivateKey(pem);
|
|
25505
|
+
}
|
|
25506
|
+
determineKeyId() {
|
|
25507
|
+
if (this.explicitKeyId) {
|
|
25508
|
+
return this.explicitKeyId;
|
|
25509
|
+
}
|
|
25510
|
+
if (this.signingConfig.signingMaterial === core.SigningMaterial.X509_CHAIN) {
|
|
25511
|
+
const certificateProvider = this
|
|
25512
|
+
.crypto;
|
|
25513
|
+
const jwk = certificateProvider.nodeJwk?.();
|
|
25514
|
+
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
25515
|
+
const kid = jwk.kid;
|
|
25516
|
+
if (typeof kid === 'string' && kid.length > 0) {
|
|
25517
|
+
return kid;
|
|
25518
|
+
}
|
|
25519
|
+
}
|
|
25520
|
+
}
|
|
25521
|
+
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
25522
|
+
if (!fallback) {
|
|
25523
|
+
throw new Error('Crypto provider does not expose a signature key id');
|
|
25524
|
+
}
|
|
25525
|
+
return fallback;
|
|
25526
|
+
}
|
|
25527
|
+
}
|
|
25528
|
+
|
|
25529
|
+
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
25530
|
+
__proto__: null,
|
|
25531
|
+
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
25532
|
+
});
|
|
25533
|
+
|
|
25353
25534
|
const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
|
|
25354
25535
|
let joseModulePromise = null;
|
|
25355
25536
|
async function requireJose() {
|
|
@@ -26953,7 +27134,7 @@ const PROFILE_MAP$4 = {
|
|
|
26953
27134
|
[PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
|
|
26954
27135
|
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
26955
27136
|
};
|
|
26956
|
-
const FACTORY_META$
|
|
27137
|
+
const FACTORY_META$11 = {
|
|
26957
27138
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
26958
27139
|
key: 'SecurityProfile',
|
|
26959
27140
|
};
|
|
@@ -27079,7 +27260,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
|
27079
27260
|
ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
|
|
27080
27261
|
ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
|
|
27081
27262
|
ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
|
|
27082
|
-
FACTORY_META: FACTORY_META$
|
|
27263
|
+
FACTORY_META: FACTORY_META$11,
|
|
27083
27264
|
NodeSecurityProfileFactory: NodeSecurityProfileFactory,
|
|
27084
27265
|
PROFILE_NAME_GATED: PROFILE_NAME_GATED,
|
|
27085
27266
|
PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
|
|
@@ -27208,7 +27389,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
|
|
|
27208
27389
|
}
|
|
27209
27390
|
}
|
|
27210
27391
|
|
|
27211
|
-
const FACTORY_META
|
|
27392
|
+
const FACTORY_META$10 = {
|
|
27212
27393
|
base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
|
|
27213
27394
|
key: 'SimpleLoadBalancerStickinessManager',
|
|
27214
27395
|
};
|
|
@@ -27232,7 +27413,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
|
|
|
27232
27413
|
|
|
27233
27414
|
var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
27234
27415
|
__proto__: null,
|
|
27235
|
-
FACTORY_META: FACTORY_META
|
|
27416
|
+
FACTORY_META: FACTORY_META$10,
|
|
27236
27417
|
SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
|
|
27237
27418
|
default: SimpleLoadBalancerStickinessManagerFactory
|
|
27238
27419
|
});
|
|
@@ -27710,7 +27891,7 @@ class WelcomeServiceFactory extends factory.AbstractResourceFactory {
|
|
|
27710
27891
|
}
|
|
27711
27892
|
}
|
|
27712
27893
|
|
|
27713
|
-
const FACTORY_META
|
|
27894
|
+
const FACTORY_META$$ = {
|
|
27714
27895
|
base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
|
|
27715
27896
|
key: 'DefaultWelcomeService',
|
|
27716
27897
|
};
|
|
@@ -27791,7 +27972,7 @@ function resolveConfigEntry(source, keys) {
|
|
|
27791
27972
|
var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
|
|
27792
27973
|
__proto__: null,
|
|
27793
27974
|
DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
|
|
27794
|
-
FACTORY_META: FACTORY_META
|
|
27975
|
+
FACTORY_META: FACTORY_META$$,
|
|
27795
27976
|
default: DefaultWelcomeServiceFactory
|
|
27796
27977
|
});
|
|
27797
27978
|
|
|
@@ -27942,7 +28123,7 @@ class InPageConnectionGrantImpl {
|
|
|
27942
28123
|
this.purpose = 'connection';
|
|
27943
28124
|
}
|
|
27944
28125
|
}
|
|
27945
|
-
const FACTORY_META$
|
|
28126
|
+
const FACTORY_META$_ = {
|
|
27946
28127
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
27947
28128
|
key: INPAGE_CONNECTOR_TYPE,
|
|
27948
28129
|
};
|
|
@@ -28091,7 +28272,7 @@ class InPageConnectorFactory extends ConnectorFactory {
|
|
|
28091
28272
|
|
|
28092
28273
|
var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
28093
28274
|
__proto__: null,
|
|
28094
|
-
FACTORY_META: FACTORY_META$
|
|
28275
|
+
FACTORY_META: FACTORY_META$_,
|
|
28095
28276
|
InPageConnectorFactory: InPageConnectorFactory,
|
|
28096
28277
|
default: InPageConnectorFactory
|
|
28097
28278
|
});
|
|
@@ -28104,7 +28285,7 @@ class BroadcastChannelConnectionGrantImpl {
|
|
|
28104
28285
|
this.purpose = 'connection';
|
|
28105
28286
|
}
|
|
28106
28287
|
}
|
|
28107
|
-
const FACTORY_META$
|
|
28288
|
+
const FACTORY_META$Z = {
|
|
28108
28289
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
28109
28290
|
key: BROADCAST_CHANNEL_CONNECTOR_TYPE,
|
|
28110
28291
|
};
|
|
@@ -28252,7 +28433,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
|
|
|
28252
28433
|
var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
28253
28434
|
__proto__: null,
|
|
28254
28435
|
BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
|
|
28255
|
-
FACTORY_META: FACTORY_META$
|
|
28436
|
+
FACTORY_META: FACTORY_META$Z,
|
|
28256
28437
|
default: BroadcastChannelConnectorFactory
|
|
28257
28438
|
});
|
|
28258
28439
|
|
|
@@ -29003,7 +29184,7 @@ function normalizeConfig$r(config) {
|
|
|
29003
29184
|
inboxCapacity,
|
|
29004
29185
|
};
|
|
29005
29186
|
}
|
|
29006
|
-
const FACTORY_META$
|
|
29187
|
+
const FACTORY_META$Y = {
|
|
29007
29188
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29008
29189
|
key: 'InPageListener',
|
|
29009
29190
|
};
|
|
@@ -29028,7 +29209,7 @@ class InPageListenerFactory extends TransportListenerFactory {
|
|
|
29028
29209
|
|
|
29029
29210
|
var inpageListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29030
29211
|
__proto__: null,
|
|
29031
|
-
FACTORY_META: FACTORY_META$
|
|
29212
|
+
FACTORY_META: FACTORY_META$Y,
|
|
29032
29213
|
InPageListenerFactory: InPageListenerFactory,
|
|
29033
29214
|
default: InPageListenerFactory
|
|
29034
29215
|
});
|
|
@@ -29542,7 +29723,7 @@ function normalizeConfig$q(config) {
|
|
|
29542
29723
|
inboxCapacity,
|
|
29543
29724
|
};
|
|
29544
29725
|
}
|
|
29545
|
-
const FACTORY_META$
|
|
29726
|
+
const FACTORY_META$X = {
|
|
29546
29727
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29547
29728
|
key: 'BroadcastChannelListener',
|
|
29548
29729
|
};
|
|
@@ -29568,7 +29749,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
|
|
|
29568
29749
|
var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29569
29750
|
__proto__: null,
|
|
29570
29751
|
BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
|
|
29571
|
-
FACTORY_META: FACTORY_META$
|
|
29752
|
+
FACTORY_META: FACTORY_META$X,
|
|
29572
29753
|
default: BroadcastChannelListenerFactory
|
|
29573
29754
|
});
|
|
29574
29755
|
|
|
@@ -29864,7 +30045,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
|
|
|
29864
30045
|
}
|
|
29865
30046
|
}
|
|
29866
30047
|
|
|
29867
|
-
const FACTORY_META$
|
|
30048
|
+
const FACTORY_META$W = {
|
|
29868
30049
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
29869
30050
|
key: 'NoopTraceEmitter',
|
|
29870
30051
|
};
|
|
@@ -29882,7 +30063,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
|
|
|
29882
30063
|
|
|
29883
30064
|
var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
29884
30065
|
__proto__: null,
|
|
29885
|
-
FACTORY_META: FACTORY_META$
|
|
30066
|
+
FACTORY_META: FACTORY_META$W,
|
|
29886
30067
|
NoopTraceEmitterFactory: NoopTraceEmitterFactory,
|
|
29887
30068
|
default: NoopTraceEmitterFactory
|
|
29888
30069
|
});
|
|
@@ -30137,7 +30318,7 @@ function getOtelApiModule() {
|
|
|
30137
30318
|
}
|
|
30138
30319
|
return otelApiModulePromise;
|
|
30139
30320
|
}
|
|
30140
|
-
const FACTORY_META$
|
|
30321
|
+
const FACTORY_META$V = {
|
|
30141
30322
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
30142
30323
|
key: 'OpenTelemetryTraceEmitter',
|
|
30143
30324
|
};
|
|
@@ -30307,7 +30488,7 @@ function extractHeaders(value) {
|
|
|
30307
30488
|
|
|
30308
30489
|
var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
30309
30490
|
__proto__: null,
|
|
30310
|
-
FACTORY_META: FACTORY_META$
|
|
30491
|
+
FACTORY_META: FACTORY_META$V,
|
|
30311
30492
|
OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
|
|
30312
30493
|
default: OpenTelemetryTraceEmitterFactory
|
|
30313
30494
|
});
|
|
@@ -30328,7 +30509,7 @@ const PROFILE_MAP$3 = {
|
|
|
30328
30509
|
[PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
|
|
30329
30510
|
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
30330
30511
|
};
|
|
30331
|
-
const FACTORY_META$
|
|
30512
|
+
const FACTORY_META$U = {
|
|
30332
30513
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
30333
30514
|
key: 'TraceEmitterProfile',
|
|
30334
30515
|
};
|
|
@@ -30408,7 +30589,7 @@ function deepClone$2(value) {
|
|
|
30408
30589
|
|
|
30409
30590
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
30410
30591
|
__proto__: null,
|
|
30411
|
-
FACTORY_META: FACTORY_META$
|
|
30592
|
+
FACTORY_META: FACTORY_META$U,
|
|
30412
30593
|
PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
|
|
30413
30594
|
PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
|
|
30414
30595
|
TraceEmitterProfileFactory: TraceEmitterProfileFactory,
|
|
@@ -30476,7 +30657,7 @@ function normalizeConfig$o(config) {
|
|
|
30476
30657
|
authorizer: authorizerValue,
|
|
30477
30658
|
};
|
|
30478
30659
|
}
|
|
30479
|
-
const FACTORY_META$
|
|
30660
|
+
const FACTORY_META$T = {
|
|
30480
30661
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
30481
30662
|
key: 'HttpListener',
|
|
30482
30663
|
};
|
|
@@ -30523,7 +30704,7 @@ class HttpListenerFactory extends TransportListenerFactory {
|
|
|
30523
30704
|
|
|
30524
30705
|
var httpListenerFactory = /*#__PURE__*/Object.freeze({
|
|
30525
30706
|
__proto__: null,
|
|
30526
|
-
FACTORY_META: FACTORY_META$
|
|
30707
|
+
FACTORY_META: FACTORY_META$T,
|
|
30527
30708
|
HttpListenerFactory: HttpListenerFactory,
|
|
30528
30709
|
default: HttpListenerFactory
|
|
30529
30710
|
});
|
|
@@ -30648,7 +30829,7 @@ class HttpConnectionGrantImpl {
|
|
|
30648
30829
|
this.purpose = 'connection';
|
|
30649
30830
|
}
|
|
30650
30831
|
}
|
|
30651
|
-
const FACTORY_META$
|
|
30832
|
+
const FACTORY_META$S = {
|
|
30652
30833
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
30653
30834
|
key: HTTP_STATELESS_CONNECTOR_TYPE,
|
|
30654
30835
|
};
|
|
@@ -30817,7 +30998,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
|
|
|
30817
30998
|
|
|
30818
30999
|
var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
30819
31000
|
__proto__: null,
|
|
30820
|
-
FACTORY_META: FACTORY_META$
|
|
31001
|
+
FACTORY_META: FACTORY_META$S,
|
|
30821
31002
|
HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
|
|
30822
31003
|
default: HttpStatelessConnectorFactory
|
|
30823
31004
|
});
|
|
@@ -30833,7 +31014,7 @@ class WebSocketConnectionGrantImpl {
|
|
|
30833
31014
|
this.purpose = 'connection';
|
|
30834
31015
|
}
|
|
30835
31016
|
}
|
|
30836
|
-
const FACTORY_META$
|
|
31017
|
+
const FACTORY_META$R = {
|
|
30837
31018
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
30838
31019
|
key: 'WebSocketConnector',
|
|
30839
31020
|
};
|
|
@@ -31204,7 +31385,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
|
|
|
31204
31385
|
|
|
31205
31386
|
var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
31206
31387
|
__proto__: null,
|
|
31207
|
-
FACTORY_META: FACTORY_META$
|
|
31388
|
+
FACTORY_META: FACTORY_META$R,
|
|
31208
31389
|
WebSocketConnectorFactory: WebSocketConnectorFactory,
|
|
31209
31390
|
default: WebSocketConnectorFactory,
|
|
31210
31391
|
setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
|
|
@@ -31274,7 +31455,7 @@ function normalizeConfig$n(config) {
|
|
|
31274
31455
|
authorizer: authorizerValue,
|
|
31275
31456
|
};
|
|
31276
31457
|
}
|
|
31277
|
-
const FACTORY_META$
|
|
31458
|
+
const FACTORY_META$Q = {
|
|
31278
31459
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
31279
31460
|
key: 'WebSocketListener',
|
|
31280
31461
|
};
|
|
@@ -31318,7 +31499,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
|
|
|
31318
31499
|
|
|
31319
31500
|
var websocketListenerFactory = /*#__PURE__*/Object.freeze({
|
|
31320
31501
|
__proto__: null,
|
|
31321
|
-
FACTORY_META: FACTORY_META$
|
|
31502
|
+
FACTORY_META: FACTORY_META$Q,
|
|
31322
31503
|
WebSocketListenerFactory: WebSocketListenerFactory,
|
|
31323
31504
|
default: WebSocketListenerFactory
|
|
31324
31505
|
});
|
|
@@ -31486,7 +31667,7 @@ function withOption(source, keys) {
|
|
|
31486
31667
|
[camelKey]: value,
|
|
31487
31668
|
};
|
|
31488
31669
|
}
|
|
31489
|
-
const FACTORY_META$
|
|
31670
|
+
const FACTORY_META$P = {
|
|
31490
31671
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
31491
31672
|
key: 'AtLeastOnceDeliveryPolicy',
|
|
31492
31673
|
};
|
|
@@ -31494,7 +31675,7 @@ const FACTORY_META$O = {
|
|
|
31494
31675
|
var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
31495
31676
|
__proto__: null,
|
|
31496
31677
|
AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
|
|
31497
|
-
FACTORY_META: FACTORY_META$
|
|
31678
|
+
FACTORY_META: FACTORY_META$P,
|
|
31498
31679
|
default: AtLeastOnceDeliveryPolicyFactory
|
|
31499
31680
|
});
|
|
31500
31681
|
|
|
@@ -31521,7 +31702,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
|
|
|
31521
31702
|
}
|
|
31522
31703
|
registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
31523
31704
|
registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
31524
|
-
const FACTORY_META$
|
|
31705
|
+
const FACTORY_META$O = {
|
|
31525
31706
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
31526
31707
|
key: 'AtMostOnceDeliveryPolicy',
|
|
31527
31708
|
};
|
|
@@ -31529,7 +31710,7 @@ const FACTORY_META$N = {
|
|
|
31529
31710
|
var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
31530
31711
|
__proto__: null,
|
|
31531
31712
|
AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
|
|
31532
|
-
FACTORY_META: FACTORY_META$
|
|
31713
|
+
FACTORY_META: FACTORY_META$O,
|
|
31533
31714
|
default: AtMostOnceDeliveryPolicyFactory
|
|
31534
31715
|
});
|
|
31535
31716
|
|
|
@@ -31622,7 +31803,7 @@ function resolveProfileConfig$1(profileName) {
|
|
|
31622
31803
|
function deepClone$1(value) {
|
|
31623
31804
|
return JSON.parse(JSON.stringify(value));
|
|
31624
31805
|
}
|
|
31625
|
-
const FACTORY_META$
|
|
31806
|
+
const FACTORY_META$N = {
|
|
31626
31807
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
31627
31808
|
key: 'DeliveryProfile',
|
|
31628
31809
|
};
|
|
@@ -31630,7 +31811,7 @@ const FACTORY_META$M = {
|
|
|
31630
31811
|
var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
|
|
31631
31812
|
__proto__: null,
|
|
31632
31813
|
DeliveryProfileFactory: DeliveryProfileFactory,
|
|
31633
|
-
FACTORY_META: FACTORY_META$
|
|
31814
|
+
FACTORY_META: FACTORY_META$N,
|
|
31634
31815
|
PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
|
|
31635
31816
|
PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
|
|
31636
31817
|
default: DeliveryProfileFactory
|
|
@@ -31820,7 +32001,7 @@ function normalizeServiceName(value) {
|
|
|
31820
32001
|
|
|
31821
32002
|
// import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
|
|
31822
32003
|
const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
|
|
31823
|
-
const FACTORY_META$
|
|
32004
|
+
const FACTORY_META$M = {
|
|
31824
32005
|
base: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
31825
32006
|
key: 'InProcessFameFabric',
|
|
31826
32007
|
};
|
|
@@ -31840,7 +32021,7 @@ class InProcessFameFabricFactory extends core.FameFabricFactory {
|
|
|
31840
32021
|
|
|
31841
32022
|
var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
|
|
31842
32023
|
__proto__: null,
|
|
31843
|
-
FACTORY_META: FACTORY_META$
|
|
32024
|
+
FACTORY_META: FACTORY_META$M,
|
|
31844
32025
|
FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
31845
32026
|
InProcessFameFabricFactory: InProcessFameFabricFactory,
|
|
31846
32027
|
default: InProcessFameFabricFactory
|
|
@@ -32069,7 +32250,7 @@ const PROFILE_MAP$1 = {
|
|
|
32069
32250
|
[PROFILE_NAME_NOOP]: NOOP_PROFILE,
|
|
32070
32251
|
[PROFILE_NAME_NONE]: NOOP_PROFILE,
|
|
32071
32252
|
};
|
|
32072
|
-
const FACTORY_META$
|
|
32253
|
+
const FACTORY_META$L = {
|
|
32073
32254
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32074
32255
|
key: 'AdmissionProfile',
|
|
32075
32256
|
};
|
|
@@ -32116,7 +32297,7 @@ function deepClone(value) {
|
|
|
32116
32297
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
32117
32298
|
__proto__: null,
|
|
32118
32299
|
AdmissionProfileFactory: AdmissionProfileFactory,
|
|
32119
|
-
FACTORY_META: FACTORY_META$
|
|
32300
|
+
FACTORY_META: FACTORY_META$L,
|
|
32120
32301
|
default: AdmissionProfileFactory
|
|
32121
32302
|
});
|
|
32122
32303
|
|
|
@@ -32198,7 +32379,7 @@ function cloneGrant(grant) {
|
|
|
32198
32379
|
return JSON.parse(JSON.stringify(grant));
|
|
32199
32380
|
}
|
|
32200
32381
|
|
|
32201
|
-
const FACTORY_META$
|
|
32382
|
+
const FACTORY_META$K = {
|
|
32202
32383
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32203
32384
|
key: 'DirectAdmissionClient',
|
|
32204
32385
|
};
|
|
@@ -32250,11 +32431,11 @@ function normalizeConfig$l(config) {
|
|
|
32250
32431
|
var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
32251
32432
|
__proto__: null,
|
|
32252
32433
|
DirectAdmissionClientFactory: DirectAdmissionClientFactory,
|
|
32253
|
-
FACTORY_META: FACTORY_META$
|
|
32434
|
+
FACTORY_META: FACTORY_META$K,
|
|
32254
32435
|
default: DirectAdmissionClientFactory
|
|
32255
32436
|
});
|
|
32256
32437
|
|
|
32257
|
-
const FACTORY_META$
|
|
32438
|
+
const FACTORY_META$J = {
|
|
32258
32439
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32259
32440
|
key: 'NoopAdmissionClient',
|
|
32260
32441
|
};
|
|
@@ -32303,7 +32484,7 @@ function normalizeConfig$k(config, factoryArgs) {
|
|
|
32303
32484
|
|
|
32304
32485
|
var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
32305
32486
|
__proto__: null,
|
|
32306
|
-
FACTORY_META: FACTORY_META$
|
|
32487
|
+
FACTORY_META: FACTORY_META$J,
|
|
32307
32488
|
NoopAdmissionClientFactory: NoopAdmissionClientFactory,
|
|
32308
32489
|
default: NoopAdmissionClientFactory
|
|
32309
32490
|
});
|
|
@@ -32318,7 +32499,7 @@ class NoAuthInjectionStrategy {
|
|
|
32318
32499
|
}
|
|
32319
32500
|
}
|
|
32320
32501
|
|
|
32321
|
-
const FACTORY_META$
|
|
32502
|
+
const FACTORY_META$I = {
|
|
32322
32503
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
32323
32504
|
key: 'NoAuth',
|
|
32324
32505
|
};
|
|
@@ -32347,7 +32528,7 @@ function normalizeConfig$j(config) {
|
|
|
32347
32528
|
|
|
32348
32529
|
var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32349
32530
|
__proto__: null,
|
|
32350
|
-
FACTORY_META: FACTORY_META$
|
|
32531
|
+
FACTORY_META: FACTORY_META$I,
|
|
32351
32532
|
NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
|
|
32352
32533
|
default: NoAuthInjectionStrategyFactory
|
|
32353
32534
|
});
|
|
@@ -32496,7 +32677,7 @@ function convertKeysToCamelCase(value) {
|
|
|
32496
32677
|
return result;
|
|
32497
32678
|
}
|
|
32498
32679
|
|
|
32499
|
-
const FACTORY_META$
|
|
32680
|
+
const FACTORY_META$H = {
|
|
32500
32681
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32501
32682
|
key: 'WelcomeServiceClient',
|
|
32502
32683
|
};
|
|
@@ -32566,7 +32747,7 @@ async function createAuthStrategy(config) {
|
|
|
32566
32747
|
|
|
32567
32748
|
var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
|
|
32568
32749
|
__proto__: null,
|
|
32569
|
-
FACTORY_META: FACTORY_META$
|
|
32750
|
+
FACTORY_META: FACTORY_META$H,
|
|
32570
32751
|
WelcomeServiceClientFactory: WelcomeServiceClientFactory,
|
|
32571
32752
|
default: WelcomeServiceClientFactory
|
|
32572
32753
|
});
|
|
@@ -32684,7 +32865,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
|
|
|
32684
32865
|
});
|
|
32685
32866
|
}
|
|
32686
32867
|
}
|
|
32687
|
-
const FACTORY_META$
|
|
32868
|
+
const FACTORY_META$G = {
|
|
32688
32869
|
base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
|
|
32689
32870
|
key: 'StaticNodePlacementStrategy',
|
|
32690
32871
|
};
|
|
@@ -32694,7 +32875,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
|
|
|
32694
32875
|
|
|
32695
32876
|
var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32696
32877
|
__proto__: null,
|
|
32697
|
-
FACTORY_META: FACTORY_META$
|
|
32878
|
+
FACTORY_META: FACTORY_META$G,
|
|
32698
32879
|
StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
|
|
32699
32880
|
default: StaticNodePlacementStrategyFactory
|
|
32700
32881
|
});
|
|
@@ -32853,7 +33034,7 @@ function connectorTypeName(connector) {
|
|
|
32853
33034
|
return typeof connector;
|
|
32854
33035
|
}
|
|
32855
33036
|
|
|
32856
|
-
const FACTORY_META$
|
|
33037
|
+
const FACTORY_META$F = {
|
|
32857
33038
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
32858
33039
|
key: 'BearerTokenHeaderAuth',
|
|
32859
33040
|
};
|
|
@@ -32894,7 +33075,7 @@ function normalizeConfig$g(config) {
|
|
|
32894
33075
|
var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32895
33076
|
__proto__: null,
|
|
32896
33077
|
BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
|
|
32897
|
-
FACTORY_META: FACTORY_META$
|
|
33078
|
+
FACTORY_META: FACTORY_META$F,
|
|
32898
33079
|
default: BearerTokenHeaderAuthInjectionStrategyFactory
|
|
32899
33080
|
});
|
|
32900
33081
|
|
|
@@ -32921,7 +33102,7 @@ function normalizeConfig$f(config) {
|
|
|
32921
33102
|
function isTokenVerifier(candidate) {
|
|
32922
33103
|
return Boolean(candidate && typeof candidate.verify === 'function');
|
|
32923
33104
|
}
|
|
32924
|
-
const FACTORY_META$
|
|
33105
|
+
const FACTORY_META$E = {
|
|
32925
33106
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32926
33107
|
key: 'DefaultAuthorizer',
|
|
32927
33108
|
};
|
|
@@ -32951,7 +33132,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
|
|
|
32951
33132
|
var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32952
33133
|
__proto__: null,
|
|
32953
33134
|
DefaultAuthorizerFactory: DefaultAuthorizerFactory,
|
|
32954
|
-
FACTORY_META: FACTORY_META$
|
|
33135
|
+
FACTORY_META: FACTORY_META$E,
|
|
32955
33136
|
default: DefaultAuthorizerFactory
|
|
32956
33137
|
});
|
|
32957
33138
|
|
|
@@ -32962,7 +33143,7 @@ function getJwksJwtTokenVerifierModule() {
|
|
|
32962
33143
|
}
|
|
32963
33144
|
return jwksJwtTokenVerifierModulePromise;
|
|
32964
33145
|
}
|
|
32965
|
-
const FACTORY_META$
|
|
33146
|
+
const FACTORY_META$D = {
|
|
32966
33147
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
32967
33148
|
key: 'JWKSJWTTokenVerifier',
|
|
32968
33149
|
};
|
|
@@ -33024,12 +33205,12 @@ function normalizeConfig$e(config) {
|
|
|
33024
33205
|
|
|
33025
33206
|
var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
33026
33207
|
__proto__: null,
|
|
33027
|
-
FACTORY_META: FACTORY_META$
|
|
33208
|
+
FACTORY_META: FACTORY_META$D,
|
|
33028
33209
|
JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
|
|
33029
33210
|
default: JWKSTokenVerifierFactory
|
|
33030
33211
|
});
|
|
33031
33212
|
|
|
33032
|
-
const FACTORY_META$
|
|
33213
|
+
const FACTORY_META$C = {
|
|
33033
33214
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
33034
33215
|
key: 'JWTTokenIssuer',
|
|
33035
33216
|
};
|
|
@@ -33226,12 +33407,12 @@ function getProviderKeyId(provider) {
|
|
|
33226
33407
|
|
|
33227
33408
|
var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
33228
33409
|
__proto__: null,
|
|
33229
|
-
FACTORY_META: FACTORY_META$
|
|
33410
|
+
FACTORY_META: FACTORY_META$C,
|
|
33230
33411
|
JWTTokenIssuerFactory: JWTTokenIssuerFactory,
|
|
33231
33412
|
default: JWTTokenIssuerFactory
|
|
33232
33413
|
});
|
|
33233
33414
|
|
|
33234
|
-
const FACTORY_META$
|
|
33415
|
+
const FACTORY_META$B = {
|
|
33235
33416
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
33236
33417
|
key: 'JWTTokenVerifier',
|
|
33237
33418
|
};
|
|
@@ -33399,7 +33580,7 @@ function getProviderVerificationKey(provider) {
|
|
|
33399
33580
|
|
|
33400
33581
|
var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
33401
33582
|
__proto__: null,
|
|
33402
|
-
FACTORY_META: FACTORY_META$
|
|
33583
|
+
FACTORY_META: FACTORY_META$B,
|
|
33403
33584
|
JWTTokenVerifierFactory: JWTTokenVerifierFactory,
|
|
33404
33585
|
default: JWTTokenVerifierFactory
|
|
33405
33586
|
});
|
|
@@ -33415,7 +33596,7 @@ class NoneTokenProvider {
|
|
|
33415
33596
|
}
|
|
33416
33597
|
}
|
|
33417
33598
|
|
|
33418
|
-
const FACTORY_META$
|
|
33599
|
+
const FACTORY_META$A = {
|
|
33419
33600
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33420
33601
|
key: 'NoneTokenProvider',
|
|
33421
33602
|
};
|
|
@@ -33432,7 +33613,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
|
|
|
33432
33613
|
|
|
33433
33614
|
var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33434
33615
|
__proto__: null,
|
|
33435
|
-
FACTORY_META: FACTORY_META$
|
|
33616
|
+
FACTORY_META: FACTORY_META$A,
|
|
33436
33617
|
NoneTokenProviderFactory: NoneTokenProviderFactory,
|
|
33437
33618
|
default: NoneTokenProviderFactory
|
|
33438
33619
|
});
|
|
@@ -33484,7 +33665,7 @@ class NoopAuthorizer {
|
|
|
33484
33665
|
}
|
|
33485
33666
|
}
|
|
33486
33667
|
|
|
33487
|
-
const FACTORY_META$
|
|
33668
|
+
const FACTORY_META$z = {
|
|
33488
33669
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
33489
33670
|
key: 'NoopAuthorizer',
|
|
33490
33671
|
};
|
|
@@ -33500,7 +33681,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
|
|
|
33500
33681
|
|
|
33501
33682
|
var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
33502
33683
|
__proto__: null,
|
|
33503
|
-
FACTORY_META: FACTORY_META$
|
|
33684
|
+
FACTORY_META: FACTORY_META$z,
|
|
33504
33685
|
NoopAuthorizerFactory: NoopAuthorizerFactory,
|
|
33505
33686
|
default: NoopAuthorizerFactory
|
|
33506
33687
|
});
|
|
@@ -33514,7 +33695,7 @@ class NoopTokenIssuer {
|
|
|
33514
33695
|
}
|
|
33515
33696
|
}
|
|
33516
33697
|
|
|
33517
|
-
const FACTORY_META$
|
|
33698
|
+
const FACTORY_META$y = {
|
|
33518
33699
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
33519
33700
|
key: 'NoopTokenIssuer',
|
|
33520
33701
|
};
|
|
@@ -33530,7 +33711,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
|
|
|
33530
33711
|
|
|
33531
33712
|
var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
33532
33713
|
__proto__: null,
|
|
33533
|
-
FACTORY_META: FACTORY_META$
|
|
33714
|
+
FACTORY_META: FACTORY_META$y,
|
|
33534
33715
|
NoopTokenIssuerFactory: NoopTokenIssuerFactory,
|
|
33535
33716
|
default: NoopTokenIssuerFactory
|
|
33536
33717
|
});
|
|
@@ -33552,7 +33733,7 @@ class NoopTokenVerifier {
|
|
|
33552
33733
|
}
|
|
33553
33734
|
}
|
|
33554
33735
|
|
|
33555
|
-
const FACTORY_META$
|
|
33736
|
+
const FACTORY_META$x = {
|
|
33556
33737
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
33557
33738
|
key: 'NoopTokenVerifier',
|
|
33558
33739
|
};
|
|
@@ -33568,7 +33749,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
33568
33749
|
|
|
33569
33750
|
var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
33570
33751
|
__proto__: null,
|
|
33571
|
-
FACTORY_META: FACTORY_META$
|
|
33752
|
+
FACTORY_META: FACTORY_META$x,
|
|
33572
33753
|
NoopTokenVerifierFactory: NoopTokenVerifierFactory,
|
|
33573
33754
|
default: NoopTokenVerifierFactory
|
|
33574
33755
|
});
|
|
@@ -33581,7 +33762,7 @@ function getOAuth2AuthorizerModule() {
|
|
|
33581
33762
|
}
|
|
33582
33763
|
return oauth2AuthorizerModulePromise;
|
|
33583
33764
|
}
|
|
33584
|
-
const FACTORY_META$
|
|
33765
|
+
const FACTORY_META$w = {
|
|
33585
33766
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
33586
33767
|
key: 'OAuth2Authorizer',
|
|
33587
33768
|
};
|
|
@@ -33726,7 +33907,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
|
|
|
33726
33907
|
|
|
33727
33908
|
var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
33728
33909
|
__proto__: null,
|
|
33729
|
-
FACTORY_META: FACTORY_META$
|
|
33910
|
+
FACTORY_META: FACTORY_META$w,
|
|
33730
33911
|
OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
|
|
33731
33912
|
default: OAuth2AuthorizerFactory
|
|
33732
33913
|
});
|
|
@@ -33766,7 +33947,7 @@ function normalizeConfig$a(config) {
|
|
|
33766
33947
|
}
|
|
33767
33948
|
return normalized;
|
|
33768
33949
|
}
|
|
33769
|
-
const FACTORY_META$
|
|
33950
|
+
const FACTORY_META$v = {
|
|
33770
33951
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33771
33952
|
key: 'OAuth2ClientCredentialsTokenProvider',
|
|
33772
33953
|
};
|
|
@@ -33797,7 +33978,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
|
|
|
33797
33978
|
|
|
33798
33979
|
var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33799
33980
|
__proto__: null,
|
|
33800
|
-
FACTORY_META: FACTORY_META$
|
|
33981
|
+
FACTORY_META: FACTORY_META$v,
|
|
33801
33982
|
OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
|
|
33802
33983
|
default: OAuth2ClientCredentialsTokenProviderFactory
|
|
33803
33984
|
});
|
|
@@ -33879,7 +34060,7 @@ function normalizeConfig$9(config) {
|
|
|
33879
34060
|
}
|
|
33880
34061
|
return normalized;
|
|
33881
34062
|
}
|
|
33882
|
-
const FACTORY_META$
|
|
34063
|
+
const FACTORY_META$u = {
|
|
33883
34064
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33884
34065
|
key: 'OAuth2PkceTokenProvider',
|
|
33885
34066
|
};
|
|
@@ -33934,7 +34115,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
|
|
|
33934
34115
|
|
|
33935
34116
|
var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33936
34117
|
__proto__: null,
|
|
33937
|
-
FACTORY_META: FACTORY_META$
|
|
34118
|
+
FACTORY_META: FACTORY_META$u,
|
|
33938
34119
|
OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
|
|
33939
34120
|
default: OAuth2PkceTokenProviderFactory
|
|
33940
34121
|
});
|
|
@@ -33984,7 +34165,7 @@ class QueryParamAuthInjectionStrategy {
|
|
|
33984
34165
|
}
|
|
33985
34166
|
}
|
|
33986
34167
|
|
|
33987
|
-
const FACTORY_META$
|
|
34168
|
+
const FACTORY_META$t = {
|
|
33988
34169
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
33989
34170
|
key: 'QueryParamAuth',
|
|
33990
34171
|
};
|
|
@@ -34024,7 +34205,7 @@ function normalizeConfig$8(config) {
|
|
|
34024
34205
|
|
|
34025
34206
|
var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
34026
34207
|
__proto__: null,
|
|
34027
|
-
FACTORY_META: FACTORY_META$
|
|
34208
|
+
FACTORY_META: FACTORY_META$t,
|
|
34028
34209
|
QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
|
|
34029
34210
|
default: QueryParamAuthInjectionStrategyFactory
|
|
34030
34211
|
});
|
|
@@ -34060,7 +34241,7 @@ function normalizeConfig$7(config) {
|
|
|
34060
34241
|
secretConfig: normalizeSecretSource(secretSource),
|
|
34061
34242
|
};
|
|
34062
34243
|
}
|
|
34063
|
-
const FACTORY_META$
|
|
34244
|
+
const FACTORY_META$s = {
|
|
34064
34245
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
34065
34246
|
key: 'SharedSecretAuthorizer',
|
|
34066
34247
|
};
|
|
@@ -34079,7 +34260,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
|
|
|
34079
34260
|
|
|
34080
34261
|
var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
34081
34262
|
__proto__: null,
|
|
34082
|
-
FACTORY_META: FACTORY_META$
|
|
34263
|
+
FACTORY_META: FACTORY_META$s,
|
|
34083
34264
|
SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
|
|
34084
34265
|
default: SharedSecretAuthorizerFactory
|
|
34085
34266
|
});
|
|
@@ -34115,7 +34296,7 @@ function normalizeConfig$6(config) {
|
|
|
34115
34296
|
secretConfig: normalizeSecretSource(secretSource),
|
|
34116
34297
|
};
|
|
34117
34298
|
}
|
|
34118
|
-
const FACTORY_META$
|
|
34299
|
+
const FACTORY_META$r = {
|
|
34119
34300
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
34120
34301
|
key: 'SharedSecretTokenProvider',
|
|
34121
34302
|
};
|
|
@@ -34134,7 +34315,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
|
|
|
34134
34315
|
|
|
34135
34316
|
var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34136
34317
|
__proto__: null,
|
|
34137
|
-
FACTORY_META: FACTORY_META$
|
|
34318
|
+
FACTORY_META: FACTORY_META$r,
|
|
34138
34319
|
SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
|
|
34139
34320
|
default: SharedSecretTokenProviderFactory
|
|
34140
34321
|
});
|
|
@@ -34178,7 +34359,7 @@ function normalizeConfig$5(config) {
|
|
|
34178
34359
|
}
|
|
34179
34360
|
return normalized;
|
|
34180
34361
|
}
|
|
34181
|
-
const FACTORY_META$
|
|
34362
|
+
const FACTORY_META$q = {
|
|
34182
34363
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
34183
34364
|
key: 'SharedSecretTokenVerifier',
|
|
34184
34365
|
};
|
|
@@ -34203,7 +34384,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
34203
34384
|
|
|
34204
34385
|
var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
34205
34386
|
__proto__: null,
|
|
34206
|
-
FACTORY_META: FACTORY_META$
|
|
34387
|
+
FACTORY_META: FACTORY_META$q,
|
|
34207
34388
|
SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
|
|
34208
34389
|
default: SharedSecretTokenVerifierFactory
|
|
34209
34390
|
});
|
|
@@ -34318,7 +34499,7 @@ function normalizeConfig$4(config) {
|
|
|
34318
34499
|
}
|
|
34319
34500
|
return options;
|
|
34320
34501
|
}
|
|
34321
|
-
const FACTORY_META$
|
|
34502
|
+
const FACTORY_META$p = {
|
|
34322
34503
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
34323
34504
|
key: 'StaticTokenProvider',
|
|
34324
34505
|
};
|
|
@@ -34335,7 +34516,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
|
|
|
34335
34516
|
|
|
34336
34517
|
var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34337
34518
|
__proto__: null,
|
|
34338
|
-
FACTORY_META: FACTORY_META$
|
|
34519
|
+
FACTORY_META: FACTORY_META$p,
|
|
34339
34520
|
StaticTokenProviderFactory: StaticTokenProviderFactory,
|
|
34340
34521
|
default: StaticTokenProviderFactory
|
|
34341
34522
|
});
|
|
@@ -34386,7 +34567,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
|
|
|
34386
34567
|
}
|
|
34387
34568
|
}
|
|
34388
34569
|
|
|
34389
|
-
const FACTORY_META$
|
|
34570
|
+
const FACTORY_META$o = {
|
|
34390
34571
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
34391
34572
|
key: 'WebSocketSubprotocolAuth',
|
|
34392
34573
|
};
|
|
@@ -34428,7 +34609,7 @@ function normalizeConfig$3(config) {
|
|
|
34428
34609
|
|
|
34429
34610
|
var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
34430
34611
|
__proto__: null,
|
|
34431
|
-
FACTORY_META: FACTORY_META$
|
|
34612
|
+
FACTORY_META: FACTORY_META$o,
|
|
34432
34613
|
WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
|
|
34433
34614
|
default: WebSocketSubprotocolAuthInjectionStrategyFactory
|
|
34434
34615
|
});
|
|
@@ -34476,7 +34657,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
34476
34657
|
throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
|
|
34477
34658
|
}
|
|
34478
34659
|
}
|
|
34479
|
-
const FACTORY_META$
|
|
34660
|
+
const FACTORY_META$n = {
|
|
34480
34661
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
34481
34662
|
key: 'DevFixedKeyCredentialProvider',
|
|
34482
34663
|
};
|
|
@@ -34484,7 +34665,7 @@ const FACTORY_META$m = {
|
|
|
34484
34665
|
var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34485
34666
|
__proto__: null,
|
|
34486
34667
|
DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
|
|
34487
|
-
FACTORY_META: FACTORY_META$
|
|
34668
|
+
FACTORY_META: FACTORY_META$n,
|
|
34488
34669
|
default: DevFixedKeyCredentialProviderFactory,
|
|
34489
34670
|
normalizeDevFixedConfig: normalizeDevFixedConfig
|
|
34490
34671
|
});
|
|
@@ -34500,14 +34681,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
34500
34681
|
return new NoneCredentialProvider();
|
|
34501
34682
|
}
|
|
34502
34683
|
}
|
|
34503
|
-
const FACTORY_META$
|
|
34684
|
+
const FACTORY_META$m = {
|
|
34504
34685
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
34505
34686
|
key: 'NoneCredentialProvider',
|
|
34506
34687
|
};
|
|
34507
34688
|
|
|
34508
34689
|
var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34509
34690
|
__proto__: null,
|
|
34510
|
-
FACTORY_META: FACTORY_META$
|
|
34691
|
+
FACTORY_META: FACTORY_META$m,
|
|
34511
34692
|
NoneCredentialProviderFactory: NoneCredentialProviderFactory,
|
|
34512
34693
|
default: NoneCredentialProviderFactory
|
|
34513
34694
|
});
|
|
@@ -34545,14 +34726,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
34545
34726
|
return new SessionKeyCredentialProvider(resolved.length);
|
|
34546
34727
|
}
|
|
34547
34728
|
}
|
|
34548
|
-
const FACTORY_META$
|
|
34729
|
+
const FACTORY_META$l = {
|
|
34549
34730
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
34550
34731
|
key: 'SessionKeyCredentialProvider',
|
|
34551
34732
|
};
|
|
34552
34733
|
|
|
34553
34734
|
var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34554
34735
|
__proto__: null,
|
|
34555
|
-
FACTORY_META: FACTORY_META$
|
|
34736
|
+
FACTORY_META: FACTORY_META$l,
|
|
34556
34737
|
SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
|
|
34557
34738
|
default: SessionKeyCredentialProviderFactory,
|
|
34558
34739
|
normalizeSessionKeyConfig: normalizeSessionKeyConfig
|
|
@@ -34590,9 +34771,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
|
|
|
34590
34771
|
ensureAlias('keyValidator', 'key_validator');
|
|
34591
34772
|
ensureAlias('eventListeners', 'event_listeners');
|
|
34592
34773
|
ensureAlias('cryptoProvider', 'crypto_provider');
|
|
34774
|
+
ensureAlias('trustStoreProvider', 'trust_store_provider');
|
|
34593
34775
|
return normalized;
|
|
34594
34776
|
}
|
|
34595
|
-
const FACTORY_META$
|
|
34777
|
+
const FACTORY_META$k = {
|
|
34596
34778
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
34597
34779
|
key: 'DefaultSecurityManager',
|
|
34598
34780
|
};
|
|
@@ -34638,6 +34820,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34638
34820
|
const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
|
|
34639
34821
|
const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
|
|
34640
34822
|
const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
|
|
34823
|
+
const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
|
|
34641
34824
|
const listenersSource = overrides?.eventListeners ??
|
|
34642
34825
|
config.eventListeners ??
|
|
34643
34826
|
config.event_listeners;
|
|
@@ -34657,10 +34840,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34657
34840
|
secureChannelManager,
|
|
34658
34841
|
eventListeners,
|
|
34659
34842
|
cryptoProvider: cryptoProvider ?? null,
|
|
34843
|
+
trustStoreProvider: trustStoreProvider ?? null,
|
|
34660
34844
|
};
|
|
34661
34845
|
}
|
|
34662
34846
|
static async buildSecurityManager(options) {
|
|
34663
|
-
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
|
|
34847
|
+
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
|
|
34664
34848
|
if (!keyStore) {
|
|
34665
34849
|
keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
|
|
34666
34850
|
}
|
|
@@ -34673,6 +34857,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34673
34857
|
if (!policy) {
|
|
34674
34858
|
throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
|
|
34675
34859
|
}
|
|
34860
|
+
if (!trustStoreProvider) {
|
|
34861
|
+
trustStoreProvider =
|
|
34862
|
+
await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
34863
|
+
}
|
|
34676
34864
|
if (!keyManager) {
|
|
34677
34865
|
keyManager =
|
|
34678
34866
|
await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
|
|
@@ -34683,7 +34871,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34683
34871
|
}
|
|
34684
34872
|
if (!envelopeVerifier) {
|
|
34685
34873
|
envelopeVerifier =
|
|
34686
|
-
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
|
|
34874
|
+
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
|
|
34687
34875
|
}
|
|
34688
34876
|
if (!encryptionManager || !secureChannelManager) {
|
|
34689
34877
|
const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
|
|
@@ -34783,7 +34971,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34783
34971
|
throw error instanceof Error ? error : new Error(String(error));
|
|
34784
34972
|
}
|
|
34785
34973
|
}
|
|
34786
|
-
static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
|
|
34974
|
+
static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
|
|
34787
34975
|
const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
|
|
34788
34976
|
if (verifierConfig &&
|
|
34789
34977
|
DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
|
|
@@ -34807,7 +34995,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34807
34995
|
}
|
|
34808
34996
|
const signing = policy.signing ?? null;
|
|
34809
34997
|
return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
|
|
34810
|
-
factoryArgs: [keyManager, signing ?? null],
|
|
34998
|
+
factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
|
|
34811
34999
|
});
|
|
34812
35000
|
}
|
|
34813
35001
|
catch (error) {
|
|
@@ -35048,11 +35236,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
35048
35236
|
var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35049
35237
|
__proto__: null,
|
|
35050
35238
|
DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
|
|
35051
|
-
FACTORY_META: FACTORY_META$
|
|
35239
|
+
FACTORY_META: FACTORY_META$k,
|
|
35052
35240
|
default: DefaultSecurityManagerFactory
|
|
35053
35241
|
});
|
|
35054
35242
|
|
|
35055
|
-
const FACTORY_META$
|
|
35243
|
+
const FACTORY_META$j = {
|
|
35056
35244
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
35057
35245
|
key: 'NoopEncryptionManager',
|
|
35058
35246
|
};
|
|
@@ -35109,7 +35297,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
|
|
|
35109
35297
|
|
|
35110
35298
|
var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35111
35299
|
__proto__: null,
|
|
35112
|
-
FACTORY_META: FACTORY_META$
|
|
35300
|
+
FACTORY_META: FACTORY_META$j,
|
|
35113
35301
|
NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
|
|
35114
35302
|
default: NoopEncryptionManagerFactory
|
|
35115
35303
|
});
|
|
@@ -35181,7 +35369,7 @@ class NoopSecureChannelManager {
|
|
|
35181
35369
|
}
|
|
35182
35370
|
}
|
|
35183
35371
|
|
|
35184
|
-
const FACTORY_META$
|
|
35372
|
+
const FACTORY_META$i = {
|
|
35185
35373
|
base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
|
|
35186
35374
|
key: 'NoopSecureChannelManager',
|
|
35187
35375
|
};
|
|
@@ -35198,12 +35386,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
|
|
|
35198
35386
|
|
|
35199
35387
|
var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35200
35388
|
__proto__: null,
|
|
35201
|
-
FACTORY_META: FACTORY_META$
|
|
35389
|
+
FACTORY_META: FACTORY_META$i,
|
|
35202
35390
|
NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
|
|
35203
35391
|
default: NoopSecureChannelManagerFactory
|
|
35204
35392
|
});
|
|
35205
35393
|
|
|
35206
|
-
const FACTORY_META$
|
|
35394
|
+
const FACTORY_META$h = {
|
|
35207
35395
|
base: KEY_MANAGER_FACTORY_BASE_TYPE,
|
|
35208
35396
|
key: 'DefaultKeyManager',
|
|
35209
35397
|
};
|
|
@@ -35231,7 +35419,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
|
|
|
35231
35419
|
var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35232
35420
|
__proto__: null,
|
|
35233
35421
|
DefaultKeyManagerFactory: DefaultKeyManagerFactory,
|
|
35234
|
-
FACTORY_META: FACTORY_META$
|
|
35422
|
+
FACTORY_META: FACTORY_META$h,
|
|
35235
35423
|
default: DefaultKeyManagerFactory
|
|
35236
35424
|
});
|
|
35237
35425
|
|
|
@@ -35416,7 +35604,7 @@ class InMemoryKeyStore extends KeyStore {
|
|
|
35416
35604
|
}
|
|
35417
35605
|
registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
|
|
35418
35606
|
|
|
35419
|
-
const FACTORY_META$
|
|
35607
|
+
const FACTORY_META$g = {
|
|
35420
35608
|
base: KEY_STORE_FACTORY_BASE_TYPE,
|
|
35421
35609
|
key: 'InMemoryKeyStore',
|
|
35422
35610
|
};
|
|
@@ -35451,12 +35639,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
|
|
|
35451
35639
|
|
|
35452
35640
|
var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
|
|
35453
35641
|
__proto__: null,
|
|
35454
|
-
FACTORY_META: FACTORY_META$
|
|
35642
|
+
FACTORY_META: FACTORY_META$g,
|
|
35455
35643
|
InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
|
|
35456
35644
|
default: InMemoryKeyStoreFactory
|
|
35457
35645
|
});
|
|
35458
35646
|
|
|
35459
|
-
const FACTORY_META$
|
|
35647
|
+
const FACTORY_META$f = {
|
|
35460
35648
|
base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
|
|
35461
35649
|
key: 'NoopKeyValidator',
|
|
35462
35650
|
};
|
|
@@ -35474,12 +35662,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
|
|
|
35474
35662
|
|
|
35475
35663
|
var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
|
|
35476
35664
|
__proto__: null,
|
|
35477
|
-
FACTORY_META: FACTORY_META$
|
|
35665
|
+
FACTORY_META: FACTORY_META$f,
|
|
35478
35666
|
NoopKeyValidatorFactory: NoopKeyValidatorFactory,
|
|
35479
35667
|
default: NoopKeyValidatorFactory
|
|
35480
35668
|
});
|
|
35481
35669
|
|
|
35482
|
-
const FACTORY_META$
|
|
35670
|
+
const FACTORY_META$e = {
|
|
35483
35671
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
35484
35672
|
key: 'DefaultSecurityPolicy',
|
|
35485
35673
|
};
|
|
@@ -35540,11 +35728,11 @@ function normalizeConfig$2(config) {
|
|
|
35540
35728
|
var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35541
35729
|
__proto__: null,
|
|
35542
35730
|
DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
|
|
35543
|
-
FACTORY_META: FACTORY_META$
|
|
35731
|
+
FACTORY_META: FACTORY_META$e,
|
|
35544
35732
|
default: DefaultSecurityPolicyFactory
|
|
35545
35733
|
});
|
|
35546
35734
|
|
|
35547
|
-
const FACTORY_META$
|
|
35735
|
+
const FACTORY_META$d = {
|
|
35548
35736
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
35549
35737
|
key: 'NoSecurityPolicy',
|
|
35550
35738
|
};
|
|
@@ -35572,7 +35760,7 @@ function normalizeConfig$1(config) {
|
|
|
35572
35760
|
|
|
35573
35761
|
var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35574
35762
|
__proto__: null,
|
|
35575
|
-
FACTORY_META: FACTORY_META$
|
|
35763
|
+
FACTORY_META: FACTORY_META$d,
|
|
35576
35764
|
NoSecurityPolicyFactory: NoSecurityPolicyFactory,
|
|
35577
35765
|
default: NoSecurityPolicyFactory
|
|
35578
35766
|
});
|
|
@@ -35587,7 +35775,7 @@ async function getEdDSAEnvelopeSignerModule() {
|
|
|
35587
35775
|
}
|
|
35588
35776
|
return eddsaEnvelopeSignerModulePromise;
|
|
35589
35777
|
}
|
|
35590
|
-
const FACTORY_META$
|
|
35778
|
+
const FACTORY_META$c = {
|
|
35591
35779
|
base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
|
|
35592
35780
|
key: 'EdDSAEnvelopeSigner',
|
|
35593
35781
|
};
|
|
@@ -35616,7 +35804,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
|
|
|
35616
35804
|
var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
|
|
35617
35805
|
__proto__: null,
|
|
35618
35806
|
EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
|
|
35619
|
-
FACTORY_META: FACTORY_META$
|
|
35807
|
+
FACTORY_META: FACTORY_META$c,
|
|
35620
35808
|
default: EdDSAEnvelopeSignerFactory
|
|
35621
35809
|
});
|
|
35622
35810
|
|
|
@@ -35630,7 +35818,7 @@ async function getEdDSAEnvelopeVerifierModule() {
|
|
|
35630
35818
|
}
|
|
35631
35819
|
return eddsaEnvelopeVerifierModulePromise;
|
|
35632
35820
|
}
|
|
35633
|
-
const FACTORY_META$
|
|
35821
|
+
const FACTORY_META$b = {
|
|
35634
35822
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
35635
35823
|
key: 'EdDSAEnvelopeVerifier',
|
|
35636
35824
|
};
|
|
@@ -35656,10 +35844,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
35656
35844
|
var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
35657
35845
|
__proto__: null,
|
|
35658
35846
|
EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
|
|
35659
|
-
FACTORY_META: FACTORY_META$
|
|
35847
|
+
FACTORY_META: FACTORY_META$b,
|
|
35660
35848
|
default: EdDSAEnvelopeVerifierFactory
|
|
35661
35849
|
});
|
|
35662
35850
|
|
|
35851
|
+
const FACTORY_META$a = {
|
|
35852
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
35853
|
+
key: "NoopTrustStoreProvider",
|
|
35854
|
+
isDefault: true,
|
|
35855
|
+
priority: 10,
|
|
35856
|
+
};
|
|
35857
|
+
class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
35858
|
+
constructor() {
|
|
35859
|
+
super(...arguments);
|
|
35860
|
+
this.type = "NoopTrustStoreProvider";
|
|
35861
|
+
this.isDefault = true;
|
|
35862
|
+
this.priority = 10;
|
|
35863
|
+
}
|
|
35864
|
+
async create(_config, ..._factoryArgs) {
|
|
35865
|
+
return new NoopTrustStoreProvider();
|
|
35866
|
+
}
|
|
35867
|
+
}
|
|
35868
|
+
|
|
35869
|
+
var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
35870
|
+
__proto__: null,
|
|
35871
|
+
FACTORY_META: FACTORY_META$a,
|
|
35872
|
+
NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
|
|
35873
|
+
default: NoopTrustStoreProviderFactory
|
|
35874
|
+
});
|
|
35875
|
+
|
|
35663
35876
|
const FACTORY_META$9 = {
|
|
35664
35877
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
35665
35878
|
key: 'CapabilityAwareRoutingPolicy',
|
|
@@ -39457,146 +39670,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
39457
39670
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
39458
39671
|
});
|
|
39459
39672
|
|
|
39460
|
-
if (!ed25519.hashes.sha512) {
|
|
39461
|
-
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
39462
|
-
}
|
|
39463
|
-
function normalizeSignerOptions(options) {
|
|
39464
|
-
if (!options || typeof options !== 'object') {
|
|
39465
|
-
return {};
|
|
39466
|
-
}
|
|
39467
|
-
const candidate = options;
|
|
39468
|
-
const result = {
|
|
39469
|
-
...options,
|
|
39470
|
-
};
|
|
39471
|
-
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
39472
|
-
if (cryptoProvider !== undefined) {
|
|
39473
|
-
result.cryptoProvider = cryptoProvider ?? null;
|
|
39474
|
-
}
|
|
39475
|
-
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
39476
|
-
if (signingConfig !== undefined) {
|
|
39477
|
-
result.signingConfig = signingConfig;
|
|
39478
|
-
}
|
|
39479
|
-
const privateKeyPem = resolveAlias(candidate, [
|
|
39480
|
-
'privateKeyPem',
|
|
39481
|
-
'private_key_pem',
|
|
39482
|
-
]);
|
|
39483
|
-
if (privateKeyPem !== undefined) {
|
|
39484
|
-
result.privateKeyPem = privateKeyPem;
|
|
39485
|
-
}
|
|
39486
|
-
const keyId = resolveAlias(candidate, [
|
|
39487
|
-
'keyId',
|
|
39488
|
-
'key_id',
|
|
39489
|
-
]);
|
|
39490
|
-
if (keyId !== undefined) {
|
|
39491
|
-
result.keyId = keyId;
|
|
39492
|
-
}
|
|
39493
|
-
return result;
|
|
39494
|
-
}
|
|
39495
|
-
class EdDSAEnvelopeSigner {
|
|
39496
|
-
constructor(options = {}) {
|
|
39497
|
-
const normalized = normalizeSignerOptions(options);
|
|
39498
|
-
const provider = normalized.cryptoProvider ?? null;
|
|
39499
|
-
if (!provider) {
|
|
39500
|
-
throw new Error('No crypto provider is configured for signing');
|
|
39501
|
-
}
|
|
39502
|
-
this.crypto = provider;
|
|
39503
|
-
const signingConfigOption = normalized.signingConfig;
|
|
39504
|
-
if (signingConfigOption instanceof SigningConfig) {
|
|
39505
|
-
this.signingConfig = signingConfigOption;
|
|
39506
|
-
}
|
|
39507
|
-
else if (signingConfigOption) {
|
|
39508
|
-
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
39509
|
-
}
|
|
39510
|
-
else {
|
|
39511
|
-
this.signingConfig = new SigningConfig();
|
|
39512
|
-
}
|
|
39513
|
-
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
39514
|
-
this.explicitKeyId = normalized.keyId;
|
|
39515
|
-
}
|
|
39516
|
-
signEnvelope(envelope, { physicalPath }) {
|
|
39517
|
-
if (!envelope.sid) {
|
|
39518
|
-
throw new Error('Envelope missing sid');
|
|
39519
|
-
}
|
|
39520
|
-
const frame = envelope.frame;
|
|
39521
|
-
if (frame.type === 'Data') {
|
|
39522
|
-
const dataFrame = frame;
|
|
39523
|
-
if (!dataFrame.pd) {
|
|
39524
|
-
const payload = dataFrame.payload ?? '';
|
|
39525
|
-
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
39526
|
-
dataFrame.pd = secureDigest(payloadString);
|
|
39527
|
-
}
|
|
39528
|
-
}
|
|
39529
|
-
const digest = frameDigest(frame);
|
|
39530
|
-
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
39531
|
-
const sidDigest = secureDigest(physicalPath);
|
|
39532
|
-
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
39533
|
-
1 +
|
|
39534
|
-
encodeUtf8(immutable).length +
|
|
39535
|
-
1 +
|
|
39536
|
-
encodeUtf8(digest).length);
|
|
39537
|
-
const sidBytes = encodeUtf8(sidDigest);
|
|
39538
|
-
const immBytes = encodeUtf8(immutable);
|
|
39539
|
-
const digBytes = encodeUtf8(digest);
|
|
39540
|
-
let offset = 0;
|
|
39541
|
-
tbs.set(sidBytes, offset);
|
|
39542
|
-
offset += sidBytes.length;
|
|
39543
|
-
tbs[offset] = 0x1f;
|
|
39544
|
-
offset += 1;
|
|
39545
|
-
tbs.set(immBytes, offset);
|
|
39546
|
-
offset += immBytes.length;
|
|
39547
|
-
tbs[offset] = 0x1f;
|
|
39548
|
-
offset += 1;
|
|
39549
|
-
tbs.set(digBytes, offset);
|
|
39550
|
-
const privateKey = this.loadPrivateKey();
|
|
39551
|
-
const signatureBytes = ed25519.sign(tbs, privateKey);
|
|
39552
|
-
const signature = urlsafeBase64Encode(signatureBytes);
|
|
39553
|
-
const kid = this.determineKeyId();
|
|
39554
|
-
const signatureHeader = {
|
|
39555
|
-
kid,
|
|
39556
|
-
val: signature,
|
|
39557
|
-
alg: 'EdDSA',
|
|
39558
|
-
};
|
|
39559
|
-
const secHeader = envelope.sec ?? {};
|
|
39560
|
-
secHeader.sig = signatureHeader;
|
|
39561
|
-
envelope.sec = secHeader;
|
|
39562
|
-
return envelope;
|
|
39563
|
-
}
|
|
39564
|
-
loadPrivateKey() {
|
|
39565
|
-
const pem = this.explicitPrivateKey ??
|
|
39566
|
-
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
39567
|
-
if (!pem) {
|
|
39568
|
-
throw new Error('Crypto provider does not expose a signing private key');
|
|
39569
|
-
}
|
|
39570
|
-
return parseEd25519PrivateKey(pem);
|
|
39571
|
-
}
|
|
39572
|
-
determineKeyId() {
|
|
39573
|
-
if (this.explicitKeyId) {
|
|
39574
|
-
return this.explicitKeyId;
|
|
39575
|
-
}
|
|
39576
|
-
if (this.signingConfig.signingMaterial === core.SigningMaterial.X509_CHAIN) {
|
|
39577
|
-
const certificateProvider = this
|
|
39578
|
-
.crypto;
|
|
39579
|
-
const jwk = certificateProvider.nodeJwk?.();
|
|
39580
|
-
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
39581
|
-
const kid = jwk.kid;
|
|
39582
|
-
if (typeof kid === 'string' && kid.length > 0) {
|
|
39583
|
-
return kid;
|
|
39584
|
-
}
|
|
39585
|
-
}
|
|
39586
|
-
}
|
|
39587
|
-
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
39588
|
-
if (!fallback) {
|
|
39589
|
-
throw new Error('Crypto provider does not expose a signature key id');
|
|
39590
|
-
}
|
|
39591
|
-
return fallback;
|
|
39592
|
-
}
|
|
39593
|
-
}
|
|
39594
|
-
|
|
39595
|
-
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
39596
|
-
__proto__: null,
|
|
39597
|
-
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
39598
|
-
});
|
|
39599
|
-
|
|
39600
39673
|
async function loadPublicKey(jwk, signingConfig) {
|
|
39601
39674
|
if (jwk.x5c) {
|
|
39602
39675
|
if (signingConfig.signingMaterial !== core.SigningMaterial.X509_CHAIN) {
|
|
@@ -39843,9 +39916,9 @@ exports.AttachmentKeyValidator = AttachmentKeyValidator;
|
|
|
39843
39916
|
exports.AuthInjectionStrategyFactory = AuthInjectionStrategyFactory;
|
|
39844
39917
|
exports.AuthorizerFactory = AuthorizerFactory;
|
|
39845
39918
|
exports.BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE = BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE;
|
|
39846
|
-
exports.BROADCAST_CHANNEL_CONNECTOR_FACTORY_META = FACTORY_META$
|
|
39919
|
+
exports.BROADCAST_CHANNEL_CONNECTOR_FACTORY_META = FACTORY_META$Z;
|
|
39847
39920
|
exports.BROADCAST_CHANNEL_CONNECTOR_TYPE = BROADCAST_CHANNEL_CONNECTOR_TYPE;
|
|
39848
|
-
exports.BROADCAST_CHANNEL_LISTENER_FACTORY_META = FACTORY_META$
|
|
39921
|
+
exports.BROADCAST_CHANNEL_LISTENER_FACTORY_META = FACTORY_META$X;
|
|
39849
39922
|
exports.BackPressureFull = BackPressureFull;
|
|
39850
39923
|
exports.BaseAsyncConnector = BaseAsyncConnector;
|
|
39851
39924
|
exports.BaseNodeEventListener = BaseNodeEventListener;
|
|
@@ -39864,7 +39937,7 @@ exports.CertificateManagerFactory = CertificateManagerFactory;
|
|
|
39864
39937
|
exports.ConnectorConfigDefaults = ConnectorConfigDefaults;
|
|
39865
39938
|
exports.ConnectorFactory = ConnectorFactory;
|
|
39866
39939
|
exports.ConsoleMetricsEmitter = ConsoleMetricsEmitter;
|
|
39867
|
-
exports.DEFAULT_WELCOME_FACTORY_META = FACTORY_META
|
|
39940
|
+
exports.DEFAULT_WELCOME_FACTORY_META = FACTORY_META$$;
|
|
39868
39941
|
exports.DefaultCryptoProvider = DefaultCryptoProvider;
|
|
39869
39942
|
exports.DefaultKeyManager = DefaultKeyManager;
|
|
39870
39943
|
exports.DefaultSecurityManager = DefaultSecurityManager;
|
|
@@ -39884,6 +39957,7 @@ exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE;
|
|
|
39884
39957
|
exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER;
|
|
39885
39958
|
exports.ENV_VAR_JWT_TRUSTED_ISSUER = ENV_VAR_JWT_TRUSTED_ISSUER;
|
|
39886
39959
|
exports.ENV_VAR_SHOW_ENVELOPES = ENV_VAR_SHOW_ENVELOPES$1;
|
|
39960
|
+
exports.EdDSAEnvelopeSigner = EdDSAEnvelopeSigner;
|
|
39887
39961
|
exports.EncryptedKeyValueStore = EncryptedKeyValueStore;
|
|
39888
39962
|
exports.EncryptedStorageProviderBase = EncryptedStorageProviderBase;
|
|
39889
39963
|
exports.EncryptedValue = EncryptedValue;
|
|
@@ -39896,7 +39970,7 @@ exports.EnvelopeListenerManager = EnvelopeListenerManager;
|
|
|
39896
39970
|
exports.EnvelopeSecurityHandler = EnvelopeSecurityHandler;
|
|
39897
39971
|
exports.EnvelopeSignerFactory = EnvelopeSignerFactory;
|
|
39898
39972
|
exports.EnvelopeVerifierFactory = EnvelopeVerifierFactory;
|
|
39899
|
-
exports.FACTORY_META = FACTORY_META
|
|
39973
|
+
exports.FACTORY_META = FACTORY_META$10;
|
|
39900
39974
|
exports.FIXED_PREFIX_LEN = FIXED_PREFIX_LEN;
|
|
39901
39975
|
exports.FameAuthorizedDeliveryContextSchema = FameAuthorizedDeliveryContextSchema;
|
|
39902
39976
|
exports.FameConnectError = FameConnectError;
|
|
@@ -39912,9 +39986,9 @@ exports.GRANT_PURPOSE_NODE_ATTACH = GRANT_PURPOSE_NODE_ATTACH;
|
|
|
39912
39986
|
exports.HTTP_CONNECTION_GRANT_TYPE = HTTP_CONNECTION_GRANT_TYPE;
|
|
39913
39987
|
exports.HTTP_STATELESS_CONNECTOR_TYPE = HTTP_STATELESS_CONNECTOR_TYPE;
|
|
39914
39988
|
exports.INPAGE_CONNECTION_GRANT_TYPE = INPAGE_CONNECTION_GRANT_TYPE;
|
|
39915
|
-
exports.INPAGE_CONNECTOR_FACTORY_META = FACTORY_META$
|
|
39989
|
+
exports.INPAGE_CONNECTOR_FACTORY_META = FACTORY_META$_;
|
|
39916
39990
|
exports.INPAGE_CONNECTOR_TYPE = INPAGE_CONNECTOR_TYPE;
|
|
39917
|
-
exports.INPAGE_LISTENER_FACTORY_META = FACTORY_META$
|
|
39991
|
+
exports.INPAGE_LISTENER_FACTORY_META = FACTORY_META$Y;
|
|
39918
39992
|
exports.InMemoryBinding = InMemoryBinding;
|
|
39919
39993
|
exports.InMemoryFanoutBroker = InMemoryFanoutBroker;
|
|
39920
39994
|
exports.InMemoryKeyValueStore = InMemoryKeyValueStore;
|
|
@@ -39949,6 +40023,7 @@ exports.NodePlacementStrategyFactory = NodePlacementStrategyFactory;
|
|
|
39949
40023
|
exports.NoneCredentialProvider = NoneCredentialProvider;
|
|
39950
40024
|
exports.NoopEncryptionManager = NoopEncryptionManager;
|
|
39951
40025
|
exports.NoopKeyValidator = NoopKeyValidator;
|
|
40026
|
+
exports.NoopTrustStoreProvider = NoopTrustStoreProvider;
|
|
39952
40027
|
exports.NotAuthorized = NotAuthorized;
|
|
39953
40028
|
exports.PROFILE_NAME_GATED = PROFILE_NAME_GATED;
|
|
39954
40029
|
exports.PROFILE_NAME_GATED_CALLBACK = PROFILE_NAME_GATED_CALLBACK;
|
|
@@ -39991,11 +40066,13 @@ exports.TOKEN_ISSUER_FACTORY_BASE_TYPE = TOKEN_ISSUER_FACTORY_BASE_TYPE;
|
|
|
39991
40066
|
exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = TOKEN_PROVIDER_FACTORY_BASE_TYPE;
|
|
39992
40067
|
exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = TOKEN_VERIFIER_FACTORY_BASE_TYPE;
|
|
39993
40068
|
exports.TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE = TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE;
|
|
40069
|
+
exports.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE;
|
|
39994
40070
|
exports.TaskSpawner = TaskSpawner;
|
|
39995
40071
|
exports.TokenIssuerFactory = TokenIssuerFactory;
|
|
39996
40072
|
exports.TokenProviderFactory = TokenProviderFactory;
|
|
39997
40073
|
exports.TokenVerifierFactory = TokenVerifierFactory;
|
|
39998
40074
|
exports.TransportProvisionerFactory = TransportProvisionerFactory;
|
|
40075
|
+
exports.TrustStoreProviderFactory = TrustStoreProviderFactory;
|
|
39999
40076
|
exports.TtlValidationError = TtlValidationError;
|
|
40000
40077
|
exports.UpstreamSessionManager = UpstreamSessionManager;
|
|
40001
40078
|
exports.VALID_CURVES_BY_KTY = VALID_CURVES_BY_KTY;
|