@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. package/dist/browser/index.cjs +355 -278
  2. package/dist/browser/index.mjs +346 -273
  3. package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
  4. package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
  5. package/dist/cjs/naylence/fame/security/index.js +8 -1
  6. package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
  7. package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
  8. package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
  9. package/dist/cjs/version.js +2 -2
  10. package/dist/esm/naylence/fame/factory-manifest.js +2 -0
  11. package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
  12. package/dist/esm/naylence/fame/security/index.js +3 -0
  13. package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
  14. package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
  15. package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
  16. package/dist/esm/version.js +2 -2
  17. package/dist/node/index.cjs +351 -274
  18. package/dist/node/index.mjs +346 -273
  19. package/dist/node/node.cjs +350 -273
  20. package/dist/node/node.mjs +345 -272
  21. package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
  22. package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
  23. package/dist/types/naylence/fame/security/index.d.ts +4 -0
  24. package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
  25. package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
  26. package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
  27. package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
  28. package/dist/types/version.d.ts +1 -1
  29. package/package.json +1 -1
@@ -2,15 +2,15 @@ import { parseAddressComponents, FlowFlags, FameAddress, DEFAULT_POLLING_TIMEOUT
2
2
  export * from '@naylence/core';
3
3
  import { z, ZodError } from 'zod';
4
4
  import { AbstractResourceFactory, createResource as createResource$1, createDefaultResource, registerFactory, Expressions, ExtensionManager, ExpressionEvaluationPolicy, Registry, configValidator } from '@naylence/factory';
5
+ import { sign, hashes, verify } from '@noble/ed25519';
6
+ import { sha256, sha512 } from '@noble/hashes/sha2.js';
5
7
  import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
6
8
  import { x25519 } from '@noble/curves/ed25519.js';
7
9
  import { hkdf } from '@noble/hashes/hkdf.js';
8
- import { sha256, sha512 } from '@noble/hashes/sha2.js';
9
10
  import { utf8ToBytes, bytesToHex, randomBytes, concatBytes } from '@noble/hashes/utils.js';
10
11
  import { parse } from 'yaml';
11
12
  import fastify from 'fastify';
12
13
  import websocketPlugin from '@fastify/websocket';
13
- import { sign, hashes, verify } from '@noble/ed25519';
14
14
 
15
15
  // --- ENV SHIM (runs once in browser) ---
16
16
  function installProcessEnvShim() {
@@ -96,12 +96,12 @@ installProcessEnvShim();
96
96
  // --- END ENV SHIM ---
97
97
 
98
98
  // This file is auto-generated during build - do not edit manually
99
- // Generated from package.json version: 0.3.5-test.922
99
+ // Generated from package.json version: 0.3.5-test.924
100
100
  /**
101
101
  * The package version, injected at build time.
102
102
  * @internal
103
103
  */
104
- const VERSION = '0.3.5-test.922';
104
+ const VERSION = '0.3.5-test.924';
105
105
 
106
106
  /**
107
107
  * Fame protocol specific error classes with WebSocket close codes and proper inheritance.
@@ -3167,7 +3167,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
3167
3167
  return new EnvCredentialProvider(resolved.varName);
3168
3168
  }
3169
3169
  }
3170
- const FACTORY_META$17 = {
3170
+ const FACTORY_META$18 = {
3171
3171
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3172
3172
  key: 'EnvCredentialProvider',
3173
3173
  };
@@ -3175,7 +3175,7 @@ const FACTORY_META$17 = {
3175
3175
  var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3176
3176
  __proto__: null,
3177
3177
  EnvCredentialProviderFactory: EnvCredentialProviderFactory,
3178
- FACTORY_META: FACTORY_META$17,
3178
+ FACTORY_META: FACTORY_META$18,
3179
3179
  default: EnvCredentialProviderFactory,
3180
3180
  normalizeEnvConfig: normalizeEnvConfig
3181
3181
  });
@@ -3273,14 +3273,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
3273
3273
  return new PromptCredentialProvider(resolved.credentialName);
3274
3274
  }
3275
3275
  }
3276
- const FACTORY_META$16 = {
3276
+ const FACTORY_META$17 = {
3277
3277
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3278
3278
  key: 'PromptCredentialProvider',
3279
3279
  };
3280
3280
 
3281
3281
  var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3282
3282
  __proto__: null,
3283
- FACTORY_META: FACTORY_META$16,
3283
+ FACTORY_META: FACTORY_META$17,
3284
3284
  PromptCredentialProviderFactory: PromptCredentialProviderFactory,
3285
3285
  default: PromptCredentialProviderFactory,
3286
3286
  normalizePromptConfig: normalizePromptConfig
@@ -3334,14 +3334,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
3334
3334
  return new SecretStoreCredentialProvider(resolved.secretName);
3335
3335
  }
3336
3336
  }
3337
- const FACTORY_META$15 = {
3337
+ const FACTORY_META$16 = {
3338
3338
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3339
3339
  key: 'SecretStoreCredentialProvider',
3340
3340
  };
3341
3341
 
3342
3342
  var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3343
3343
  __proto__: null,
3344
- FACTORY_META: FACTORY_META$15,
3344
+ FACTORY_META: FACTORY_META$16,
3345
3345
  SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
3346
3346
  default: SecretStoreCredentialProviderFactory,
3347
3347
  normalizeSecretStoreConfig: normalizeSecretStoreConfig
@@ -3390,14 +3390,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
3390
3390
  return new StaticCredentialProvider(resolved.credentialValue);
3391
3391
  }
3392
3392
  }
3393
- const FACTORY_META$14 = {
3393
+ const FACTORY_META$15 = {
3394
3394
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3395
3395
  key: 'StaticCredentialProvider',
3396
3396
  };
3397
3397
 
3398
3398
  var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3399
3399
  __proto__: null,
3400
- FACTORY_META: FACTORY_META$14,
3400
+ FACTORY_META: FACTORY_META$15,
3401
3401
  StaticCredentialProviderFactory: StaticCredentialProviderFactory,
3402
3402
  default: StaticCredentialProviderFactory,
3403
3403
  normalizeStaticConfig: normalizeStaticConfig
@@ -13503,6 +13503,7 @@ const MODULES = [
13503
13503
  "./security/policy/no-security-policy-factory.js",
13504
13504
  "./security/signing/eddsa-envelope-signer-factory.js",
13505
13505
  "./security/signing/eddsa-envelope-verifier-factory.js",
13506
+ "./security/trust-store/noop-trust-store-provider-factory.js",
13506
13507
  "./sentinel/capability-aware-routing-policy-factory.js",
13507
13508
  "./sentinel/composite-routing-policy-factory.js",
13508
13509
  "./sentinel/hybrid-path-routing-policy-factory.js",
@@ -13577,6 +13578,7 @@ const MODULE_LOADERS = {
13577
13578
  "./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
13578
13579
  "./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
13579
13580
  "./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
13581
+ "./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
13580
13582
  "./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
13581
13583
  "./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
13582
13584
  "./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
@@ -13881,7 +13883,7 @@ class NodeLikeFactory extends AbstractResourceFactory {
13881
13883
  // registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
13882
13884
  // }
13883
13885
 
13884
- const FACTORY_META$13 = {
13886
+ const FACTORY_META$14 = {
13885
13887
  base: NODE_LIKE_FACTORY_BASE_TYPE,
13886
13888
  key: 'Node',
13887
13889
  };
@@ -13922,7 +13924,7 @@ class NodeFactory extends NodeLikeFactory {
13922
13924
 
13923
13925
  var nodeFactory = /*#__PURE__*/Object.freeze({
13924
13926
  __proto__: null,
13925
- FACTORY_META: FACTORY_META$13,
13927
+ FACTORY_META: FACTORY_META$14,
13926
13928
  NodeFactory: NodeFactory,
13927
13929
  default: NodeFactory
13928
13930
  });
@@ -15363,7 +15365,7 @@ class RouteStoreFactory extends AbstractResourceFactory {
15363
15365
  return store ?? null;
15364
15366
  }
15365
15367
  }
15366
- const FACTORY_META$12 = {
15368
+ const FACTORY_META$13 = {
15367
15369
  base: ROUTE_STORE_FACTORY_BASE_TYPE,
15368
15370
  key: 'InMemoryRouteStore',
15369
15371
  };
@@ -15381,7 +15383,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
15381
15383
 
15382
15384
  var routeStoreFactory = /*#__PURE__*/Object.freeze({
15383
15385
  __proto__: null,
15384
- FACTORY_META: FACTORY_META$12,
15386
+ FACTORY_META: FACTORY_META$13,
15385
15387
  InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
15386
15388
  ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
15387
15389
  RouteStoreFactory: RouteStoreFactory,
@@ -19197,7 +19199,7 @@ function isPlainRecord(value) {
19197
19199
  return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
19198
19200
  }
19199
19201
 
19200
- const FACTORY_META$11 = {
19202
+ const FACTORY_META$12 = {
19201
19203
  base: NODE_LIKE_FACTORY_BASE_TYPE,
19202
19204
  key: 'Sentinel',
19203
19205
  };
@@ -19381,7 +19383,7 @@ class SentinelFactory extends NodeLikeFactory {
19381
19383
 
19382
19384
  var sentinelFactory = /*#__PURE__*/Object.freeze({
19383
19385
  __proto__: null,
19384
- FACTORY_META: FACTORY_META$11,
19386
+ FACTORY_META: FACTORY_META$12,
19385
19387
  SentinelFactory: SentinelFactory,
19386
19388
  default: SentinelFactory
19387
19389
  });
@@ -20532,6 +20534,45 @@ class CertificateManagerFactory extends AbstractResourceFactory {
20532
20534
  }
20533
20535
  }
20534
20536
 
20537
+ const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
20538
+ const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
20539
+ class TrustStoreProviderFactory extends AbstractResourceFactory {
20540
+ createUnconfiguredProvider(reason) {
20541
+ return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
20542
+ }
20543
+ static async createTrustStoreProvider(config, options = {}) {
20544
+ const { dependencies, factoryArgs, ...restOptions } = options;
20545
+ const mergedFactoryArgs = [
20546
+ ...(dependencies ? [dependencies] : []),
20547
+ ...(factoryArgs ?? []),
20548
+ ];
20549
+ const creationOptions = {
20550
+ ...restOptions,
20551
+ factoryArgs: mergedFactoryArgs,
20552
+ };
20553
+ if (config) {
20554
+ const instance = await createResource$1(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
20555
+ return instance ?? new NoopTrustStoreProvider();
20556
+ }
20557
+ const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
20558
+ return instance ?? new NoopTrustStoreProvider();
20559
+ }
20560
+ }
20561
+ class NoopTrustStoreProvider {
20562
+ constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
20563
+ this.reason = reason;
20564
+ }
20565
+ async getTrustStorePem() {
20566
+ throw new Error(this.reason);
20567
+ }
20568
+ async getRoots() {
20569
+ return [];
20570
+ }
20571
+ async initialize() {
20572
+ // No-op for the placeholder provider.
20573
+ }
20574
+ }
20575
+
20535
20576
  const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
20536
20577
  class EncryptionManagerFactory extends AbstractResourceFactory {
20537
20578
  getPriority() {
@@ -25348,6 +25389,146 @@ function encodeUtf8(value) {
25348
25389
  throw new Error('No UTF-8 encoder available in this environment');
25349
25390
  }
25350
25391
 
25392
+ if (!hashes.sha512) {
25393
+ hashes.sha512 = (message) => sha512(message);
25394
+ }
25395
+ function normalizeSignerOptions(options) {
25396
+ if (!options || typeof options !== 'object') {
25397
+ return {};
25398
+ }
25399
+ const candidate = options;
25400
+ const result = {
25401
+ ...options,
25402
+ };
25403
+ const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
25404
+ if (cryptoProvider !== undefined) {
25405
+ result.cryptoProvider = cryptoProvider ?? null;
25406
+ }
25407
+ const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
25408
+ if (signingConfig !== undefined) {
25409
+ result.signingConfig = signingConfig;
25410
+ }
25411
+ const privateKeyPem = resolveAlias(candidate, [
25412
+ 'privateKeyPem',
25413
+ 'private_key_pem',
25414
+ ]);
25415
+ if (privateKeyPem !== undefined) {
25416
+ result.privateKeyPem = privateKeyPem;
25417
+ }
25418
+ const keyId = resolveAlias(candidate, [
25419
+ 'keyId',
25420
+ 'key_id',
25421
+ ]);
25422
+ if (keyId !== undefined) {
25423
+ result.keyId = keyId;
25424
+ }
25425
+ return result;
25426
+ }
25427
+ class EdDSAEnvelopeSigner {
25428
+ constructor(options = {}) {
25429
+ const normalized = normalizeSignerOptions(options);
25430
+ const provider = normalized.cryptoProvider ?? null;
25431
+ if (!provider) {
25432
+ throw new Error('No crypto provider is configured for signing');
25433
+ }
25434
+ this.crypto = provider;
25435
+ const signingConfigOption = normalized.signingConfig;
25436
+ if (signingConfigOption instanceof SigningConfig) {
25437
+ this.signingConfig = signingConfigOption;
25438
+ }
25439
+ else if (signingConfigOption) {
25440
+ this.signingConfig = new SigningConfig(signingConfigOption);
25441
+ }
25442
+ else {
25443
+ this.signingConfig = new SigningConfig();
25444
+ }
25445
+ this.explicitPrivateKey = normalized.privateKeyPem;
25446
+ this.explicitKeyId = normalized.keyId;
25447
+ }
25448
+ signEnvelope(envelope, { physicalPath }) {
25449
+ if (!envelope.sid) {
25450
+ throw new Error('Envelope missing sid');
25451
+ }
25452
+ const frame = envelope.frame;
25453
+ if (frame.type === 'Data') {
25454
+ const dataFrame = frame;
25455
+ if (!dataFrame.pd) {
25456
+ const payload = dataFrame.payload ?? '';
25457
+ const payloadString = payload === '' ? '' : canonicalJson(payload);
25458
+ dataFrame.pd = secureDigest(payloadString);
25459
+ }
25460
+ }
25461
+ const digest = frameDigest(frame);
25462
+ const immutable = canonicalJson(immutableHeaders(envelope));
25463
+ const sidDigest = secureDigest(physicalPath);
25464
+ const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
25465
+ 1 +
25466
+ encodeUtf8(immutable).length +
25467
+ 1 +
25468
+ encodeUtf8(digest).length);
25469
+ const sidBytes = encodeUtf8(sidDigest);
25470
+ const immBytes = encodeUtf8(immutable);
25471
+ const digBytes = encodeUtf8(digest);
25472
+ let offset = 0;
25473
+ tbs.set(sidBytes, offset);
25474
+ offset += sidBytes.length;
25475
+ tbs[offset] = 0x1f;
25476
+ offset += 1;
25477
+ tbs.set(immBytes, offset);
25478
+ offset += immBytes.length;
25479
+ tbs[offset] = 0x1f;
25480
+ offset += 1;
25481
+ tbs.set(digBytes, offset);
25482
+ const privateKey = this.loadPrivateKey();
25483
+ const signatureBytes = sign(tbs, privateKey);
25484
+ const signature = urlsafeBase64Encode(signatureBytes);
25485
+ const kid = this.determineKeyId();
25486
+ const signatureHeader = {
25487
+ kid,
25488
+ val: signature,
25489
+ alg: 'EdDSA',
25490
+ };
25491
+ const secHeader = envelope.sec ?? {};
25492
+ secHeader.sig = signatureHeader;
25493
+ envelope.sec = secHeader;
25494
+ return envelope;
25495
+ }
25496
+ loadPrivateKey() {
25497
+ const pem = this.explicitPrivateKey ??
25498
+ readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
25499
+ if (!pem) {
25500
+ throw new Error('Crypto provider does not expose a signing private key');
25501
+ }
25502
+ return parseEd25519PrivateKey(pem);
25503
+ }
25504
+ determineKeyId() {
25505
+ if (this.explicitKeyId) {
25506
+ return this.explicitKeyId;
25507
+ }
25508
+ if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
25509
+ const certificateProvider = this
25510
+ .crypto;
25511
+ const jwk = certificateProvider.nodeJwk?.();
25512
+ if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
25513
+ const kid = jwk.kid;
25514
+ if (typeof kid === 'string' && kid.length > 0) {
25515
+ return kid;
25516
+ }
25517
+ }
25518
+ }
25519
+ const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
25520
+ if (!fallback) {
25521
+ throw new Error('Crypto provider does not expose a signature key id');
25522
+ }
25523
+ return fallback;
25524
+ }
25525
+ }
25526
+
25527
+ var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
25528
+ __proto__: null,
25529
+ EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
25530
+ });
25531
+
25351
25532
  const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
25352
25533
  let joseModulePromise = null;
25353
25534
  async function requireJose() {
@@ -26951,7 +27132,7 @@ const PROFILE_MAP$4 = {
26951
27132
  [PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
26952
27133
  [PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
26953
27134
  };
26954
- const FACTORY_META$10 = {
27135
+ const FACTORY_META$11 = {
26955
27136
  base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
26956
27137
  key: 'SecurityProfile',
26957
27138
  };
@@ -27077,7 +27258,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
27077
27258
  ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
27078
27259
  ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
27079
27260
  ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
27080
- FACTORY_META: FACTORY_META$10,
27261
+ FACTORY_META: FACTORY_META$11,
27081
27262
  NodeSecurityProfileFactory: NodeSecurityProfileFactory,
27082
27263
  PROFILE_NAME_GATED: PROFILE_NAME_GATED,
27083
27264
  PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
@@ -27206,7 +27387,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
27206
27387
  }
27207
27388
  }
27208
27389
 
27209
- const FACTORY_META$$ = {
27390
+ const FACTORY_META$10 = {
27210
27391
  base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
27211
27392
  key: 'SimpleLoadBalancerStickinessManager',
27212
27393
  };
@@ -27230,7 +27411,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
27230
27411
 
27231
27412
  var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
27232
27413
  __proto__: null,
27233
- FACTORY_META: FACTORY_META$$,
27414
+ FACTORY_META: FACTORY_META$10,
27234
27415
  SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
27235
27416
  default: SimpleLoadBalancerStickinessManagerFactory
27236
27417
  });
@@ -27708,7 +27889,7 @@ class WelcomeServiceFactory extends AbstractResourceFactory {
27708
27889
  }
27709
27890
  }
27710
27891
 
27711
- const FACTORY_META$_ = {
27892
+ const FACTORY_META$$ = {
27712
27893
  base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
27713
27894
  key: 'DefaultWelcomeService',
27714
27895
  };
@@ -27789,7 +27970,7 @@ function resolveConfigEntry(source, keys) {
27789
27970
  var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
27790
27971
  __proto__: null,
27791
27972
  DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
27792
- FACTORY_META: FACTORY_META$_,
27973
+ FACTORY_META: FACTORY_META$$,
27793
27974
  default: DefaultWelcomeServiceFactory
27794
27975
  });
27795
27976
 
@@ -27940,7 +28121,7 @@ class InPageConnectionGrantImpl {
27940
28121
  this.purpose = 'connection';
27941
28122
  }
27942
28123
  }
27943
- const FACTORY_META$Z = {
28124
+ const FACTORY_META$_ = {
27944
28125
  base: CONNECTOR_FACTORY_BASE_TYPE,
27945
28126
  key: INPAGE_CONNECTOR_TYPE,
27946
28127
  };
@@ -28089,7 +28270,7 @@ class InPageConnectorFactory extends ConnectorFactory {
28089
28270
 
28090
28271
  var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
28091
28272
  __proto__: null,
28092
- FACTORY_META: FACTORY_META$Z,
28273
+ FACTORY_META: FACTORY_META$_,
28093
28274
  InPageConnectorFactory: InPageConnectorFactory,
28094
28275
  default: InPageConnectorFactory
28095
28276
  });
@@ -28102,7 +28283,7 @@ class BroadcastChannelConnectionGrantImpl {
28102
28283
  this.purpose = 'connection';
28103
28284
  }
28104
28285
  }
28105
- const FACTORY_META$Y = {
28286
+ const FACTORY_META$Z = {
28106
28287
  base: CONNECTOR_FACTORY_BASE_TYPE,
28107
28288
  key: BROADCAST_CHANNEL_CONNECTOR_TYPE,
28108
28289
  };
@@ -28250,7 +28431,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
28250
28431
  var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
28251
28432
  __proto__: null,
28252
28433
  BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
28253
- FACTORY_META: FACTORY_META$Y,
28434
+ FACTORY_META: FACTORY_META$Z,
28254
28435
  default: BroadcastChannelConnectorFactory
28255
28436
  });
28256
28437
 
@@ -29001,7 +29182,7 @@ function normalizeConfig$r(config) {
29001
29182
  inboxCapacity,
29002
29183
  };
29003
29184
  }
29004
- const FACTORY_META$X = {
29185
+ const FACTORY_META$Y = {
29005
29186
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
29006
29187
  key: 'InPageListener',
29007
29188
  };
@@ -29026,7 +29207,7 @@ class InPageListenerFactory extends TransportListenerFactory {
29026
29207
 
29027
29208
  var inpageListenerFactory = /*#__PURE__*/Object.freeze({
29028
29209
  __proto__: null,
29029
- FACTORY_META: FACTORY_META$X,
29210
+ FACTORY_META: FACTORY_META$Y,
29030
29211
  InPageListenerFactory: InPageListenerFactory,
29031
29212
  default: InPageListenerFactory
29032
29213
  });
@@ -29540,7 +29721,7 @@ function normalizeConfig$q(config) {
29540
29721
  inboxCapacity,
29541
29722
  };
29542
29723
  }
29543
- const FACTORY_META$W = {
29724
+ const FACTORY_META$X = {
29544
29725
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
29545
29726
  key: 'BroadcastChannelListener',
29546
29727
  };
@@ -29566,7 +29747,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
29566
29747
  var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
29567
29748
  __proto__: null,
29568
29749
  BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
29569
- FACTORY_META: FACTORY_META$W,
29750
+ FACTORY_META: FACTORY_META$X,
29570
29751
  default: BroadcastChannelListenerFactory
29571
29752
  });
29572
29753
 
@@ -29862,7 +30043,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
29862
30043
  }
29863
30044
  }
29864
30045
 
29865
- const FACTORY_META$V = {
30046
+ const FACTORY_META$W = {
29866
30047
  base: TRACE_EMITTER_FACTORY_BASE_TYPE,
29867
30048
  key: 'NoopTraceEmitter',
29868
30049
  };
@@ -29880,7 +30061,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
29880
30061
 
29881
30062
  var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
29882
30063
  __proto__: null,
29883
- FACTORY_META: FACTORY_META$V,
30064
+ FACTORY_META: FACTORY_META$W,
29884
30065
  NoopTraceEmitterFactory: NoopTraceEmitterFactory,
29885
30066
  default: NoopTraceEmitterFactory
29886
30067
  });
@@ -30135,7 +30316,7 @@ function getOtelApiModule() {
30135
30316
  }
30136
30317
  return otelApiModulePromise;
30137
30318
  }
30138
- const FACTORY_META$U = {
30319
+ const FACTORY_META$V = {
30139
30320
  base: TRACE_EMITTER_FACTORY_BASE_TYPE,
30140
30321
  key: 'OpenTelemetryTraceEmitter',
30141
30322
  };
@@ -30305,7 +30486,7 @@ function extractHeaders(value) {
30305
30486
 
30306
30487
  var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
30307
30488
  __proto__: null,
30308
- FACTORY_META: FACTORY_META$U,
30489
+ FACTORY_META: FACTORY_META$V,
30309
30490
  OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
30310
30491
  default: OpenTelemetryTraceEmitterFactory
30311
30492
  });
@@ -30326,7 +30507,7 @@ const PROFILE_MAP$3 = {
30326
30507
  [PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
30327
30508
  [PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
30328
30509
  };
30329
- const FACTORY_META$T = {
30510
+ const FACTORY_META$U = {
30330
30511
  base: TRACE_EMITTER_FACTORY_BASE_TYPE,
30331
30512
  key: 'TraceEmitterProfile',
30332
30513
  };
@@ -30406,7 +30587,7 @@ function deepClone$2(value) {
30406
30587
 
30407
30588
  var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
30408
30589
  __proto__: null,
30409
- FACTORY_META: FACTORY_META$T,
30590
+ FACTORY_META: FACTORY_META$U,
30410
30591
  PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
30411
30592
  PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
30412
30593
  TraceEmitterProfileFactory: TraceEmitterProfileFactory,
@@ -30474,7 +30655,7 @@ function normalizeConfig$o(config) {
30474
30655
  authorizer: authorizerValue,
30475
30656
  };
30476
30657
  }
30477
- const FACTORY_META$S = {
30658
+ const FACTORY_META$T = {
30478
30659
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
30479
30660
  key: 'HttpListener',
30480
30661
  };
@@ -30521,7 +30702,7 @@ class HttpListenerFactory extends TransportListenerFactory {
30521
30702
 
30522
30703
  var httpListenerFactory = /*#__PURE__*/Object.freeze({
30523
30704
  __proto__: null,
30524
- FACTORY_META: FACTORY_META$S,
30705
+ FACTORY_META: FACTORY_META$T,
30525
30706
  HttpListenerFactory: HttpListenerFactory,
30526
30707
  default: HttpListenerFactory
30527
30708
  });
@@ -30646,7 +30827,7 @@ class HttpConnectionGrantImpl {
30646
30827
  this.purpose = 'connection';
30647
30828
  }
30648
30829
  }
30649
- const FACTORY_META$R = {
30830
+ const FACTORY_META$S = {
30650
30831
  base: CONNECTOR_FACTORY_BASE_TYPE,
30651
30832
  key: HTTP_STATELESS_CONNECTOR_TYPE,
30652
30833
  };
@@ -30815,7 +30996,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
30815
30996
 
30816
30997
  var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
30817
30998
  __proto__: null,
30818
- FACTORY_META: FACTORY_META$R,
30999
+ FACTORY_META: FACTORY_META$S,
30819
31000
  HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
30820
31001
  default: HttpStatelessConnectorFactory
30821
31002
  });
@@ -30831,7 +31012,7 @@ class WebSocketConnectionGrantImpl {
30831
31012
  this.purpose = 'connection';
30832
31013
  }
30833
31014
  }
30834
- const FACTORY_META$Q = {
31015
+ const FACTORY_META$R = {
30835
31016
  base: CONNECTOR_FACTORY_BASE_TYPE,
30836
31017
  key: 'WebSocketConnector',
30837
31018
  };
@@ -31202,7 +31383,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
31202
31383
 
31203
31384
  var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
31204
31385
  __proto__: null,
31205
- FACTORY_META: FACTORY_META$Q,
31386
+ FACTORY_META: FACTORY_META$R,
31206
31387
  WebSocketConnectorFactory: WebSocketConnectorFactory,
31207
31388
  default: WebSocketConnectorFactory,
31208
31389
  setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
@@ -31272,7 +31453,7 @@ function normalizeConfig$n(config) {
31272
31453
  authorizer: authorizerValue,
31273
31454
  };
31274
31455
  }
31275
- const FACTORY_META$P = {
31456
+ const FACTORY_META$Q = {
31276
31457
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
31277
31458
  key: 'WebSocketListener',
31278
31459
  };
@@ -31316,7 +31497,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
31316
31497
 
31317
31498
  var websocketListenerFactory = /*#__PURE__*/Object.freeze({
31318
31499
  __proto__: null,
31319
- FACTORY_META: FACTORY_META$P,
31500
+ FACTORY_META: FACTORY_META$Q,
31320
31501
  WebSocketListenerFactory: WebSocketListenerFactory,
31321
31502
  default: WebSocketListenerFactory
31322
31503
  });
@@ -31484,7 +31665,7 @@ function withOption(source, keys) {
31484
31665
  [camelKey]: value,
31485
31666
  };
31486
31667
  }
31487
- const FACTORY_META$O = {
31668
+ const FACTORY_META$P = {
31488
31669
  base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
31489
31670
  key: 'AtLeastOnceDeliveryPolicy',
31490
31671
  };
@@ -31492,7 +31673,7 @@ const FACTORY_META$O = {
31492
31673
  var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
31493
31674
  __proto__: null,
31494
31675
  AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
31495
- FACTORY_META: FACTORY_META$O,
31676
+ FACTORY_META: FACTORY_META$P,
31496
31677
  default: AtLeastOnceDeliveryPolicyFactory
31497
31678
  });
31498
31679
 
@@ -31519,7 +31700,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
31519
31700
  }
31520
31701
  registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
31521
31702
  registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
31522
- const FACTORY_META$N = {
31703
+ const FACTORY_META$O = {
31523
31704
  base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
31524
31705
  key: 'AtMostOnceDeliveryPolicy',
31525
31706
  };
@@ -31527,7 +31708,7 @@ const FACTORY_META$N = {
31527
31708
  var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
31528
31709
  __proto__: null,
31529
31710
  AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
31530
- FACTORY_META: FACTORY_META$N,
31711
+ FACTORY_META: FACTORY_META$O,
31531
31712
  default: AtMostOnceDeliveryPolicyFactory
31532
31713
  });
31533
31714
 
@@ -31620,7 +31801,7 @@ function resolveProfileConfig$1(profileName) {
31620
31801
  function deepClone$1(value) {
31621
31802
  return JSON.parse(JSON.stringify(value));
31622
31803
  }
31623
- const FACTORY_META$M = {
31804
+ const FACTORY_META$N = {
31624
31805
  base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
31625
31806
  key: 'DeliveryProfile',
31626
31807
  };
@@ -31628,7 +31809,7 @@ const FACTORY_META$M = {
31628
31809
  var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
31629
31810
  __proto__: null,
31630
31811
  DeliveryProfileFactory: DeliveryProfileFactory,
31631
- FACTORY_META: FACTORY_META$M,
31812
+ FACTORY_META: FACTORY_META$N,
31632
31813
  PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
31633
31814
  PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
31634
31815
  default: DeliveryProfileFactory
@@ -31818,7 +31999,7 @@ function normalizeServiceName(value) {
31818
31999
 
31819
32000
  // import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
31820
32001
  const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
31821
- const FACTORY_META$L = {
32002
+ const FACTORY_META$M = {
31822
32003
  base: FAME_FABRIC_FACTORY_BASE_TYPE,
31823
32004
  key: 'InProcessFameFabric',
31824
32005
  };
@@ -31838,7 +32019,7 @@ class InProcessFameFabricFactory extends FameFabricFactory {
31838
32019
 
31839
32020
  var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
31840
32021
  __proto__: null,
31841
- FACTORY_META: FACTORY_META$L,
32022
+ FACTORY_META: FACTORY_META$M,
31842
32023
  FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
31843
32024
  InProcessFameFabricFactory: InProcessFameFabricFactory,
31844
32025
  default: InProcessFameFabricFactory
@@ -32067,7 +32248,7 @@ const PROFILE_MAP$1 = {
32067
32248
  [PROFILE_NAME_NOOP]: NOOP_PROFILE,
32068
32249
  [PROFILE_NAME_NONE]: NOOP_PROFILE,
32069
32250
  };
32070
- const FACTORY_META$K = {
32251
+ const FACTORY_META$L = {
32071
32252
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
32072
32253
  key: 'AdmissionProfile',
32073
32254
  };
@@ -32114,7 +32295,7 @@ function deepClone(value) {
32114
32295
  var admissionProfileFactory = /*#__PURE__*/Object.freeze({
32115
32296
  __proto__: null,
32116
32297
  AdmissionProfileFactory: AdmissionProfileFactory,
32117
- FACTORY_META: FACTORY_META$K,
32298
+ FACTORY_META: FACTORY_META$L,
32118
32299
  default: AdmissionProfileFactory
32119
32300
  });
32120
32301
 
@@ -32196,7 +32377,7 @@ function cloneGrant(grant) {
32196
32377
  return JSON.parse(JSON.stringify(grant));
32197
32378
  }
32198
32379
 
32199
- const FACTORY_META$J = {
32380
+ const FACTORY_META$K = {
32200
32381
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
32201
32382
  key: 'DirectAdmissionClient',
32202
32383
  };
@@ -32248,11 +32429,11 @@ function normalizeConfig$l(config) {
32248
32429
  var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
32249
32430
  __proto__: null,
32250
32431
  DirectAdmissionClientFactory: DirectAdmissionClientFactory,
32251
- FACTORY_META: FACTORY_META$J,
32432
+ FACTORY_META: FACTORY_META$K,
32252
32433
  default: DirectAdmissionClientFactory
32253
32434
  });
32254
32435
 
32255
- const FACTORY_META$I = {
32436
+ const FACTORY_META$J = {
32256
32437
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
32257
32438
  key: 'NoopAdmissionClient',
32258
32439
  };
@@ -32301,7 +32482,7 @@ function normalizeConfig$k(config, factoryArgs) {
32301
32482
 
32302
32483
  var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
32303
32484
  __proto__: null,
32304
- FACTORY_META: FACTORY_META$I,
32485
+ FACTORY_META: FACTORY_META$J,
32305
32486
  NoopAdmissionClientFactory: NoopAdmissionClientFactory,
32306
32487
  default: NoopAdmissionClientFactory
32307
32488
  });
@@ -32316,7 +32497,7 @@ class NoAuthInjectionStrategy {
32316
32497
  }
32317
32498
  }
32318
32499
 
32319
- const FACTORY_META$H = {
32500
+ const FACTORY_META$I = {
32320
32501
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
32321
32502
  key: 'NoAuth',
32322
32503
  };
@@ -32345,7 +32526,7 @@ function normalizeConfig$j(config) {
32345
32526
 
32346
32527
  var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
32347
32528
  __proto__: null,
32348
- FACTORY_META: FACTORY_META$H,
32529
+ FACTORY_META: FACTORY_META$I,
32349
32530
  NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
32350
32531
  default: NoAuthInjectionStrategyFactory
32351
32532
  });
@@ -32494,7 +32675,7 @@ function convertKeysToCamelCase(value) {
32494
32675
  return result;
32495
32676
  }
32496
32677
 
32497
- const FACTORY_META$G = {
32678
+ const FACTORY_META$H = {
32498
32679
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
32499
32680
  key: 'WelcomeServiceClient',
32500
32681
  };
@@ -32564,7 +32745,7 @@ async function createAuthStrategy(config) {
32564
32745
 
32565
32746
  var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
32566
32747
  __proto__: null,
32567
- FACTORY_META: FACTORY_META$G,
32748
+ FACTORY_META: FACTORY_META$H,
32568
32749
  WelcomeServiceClientFactory: WelcomeServiceClientFactory,
32569
32750
  default: WelcomeServiceClientFactory
32570
32751
  });
@@ -32682,7 +32863,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
32682
32863
  });
32683
32864
  }
32684
32865
  }
32685
- const FACTORY_META$F = {
32866
+ const FACTORY_META$G = {
32686
32867
  base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
32687
32868
  key: 'StaticNodePlacementStrategy',
32688
32869
  };
@@ -32692,7 +32873,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
32692
32873
 
32693
32874
  var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
32694
32875
  __proto__: null,
32695
- FACTORY_META: FACTORY_META$F,
32876
+ FACTORY_META: FACTORY_META$G,
32696
32877
  StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
32697
32878
  default: StaticNodePlacementStrategyFactory
32698
32879
  });
@@ -32851,7 +33032,7 @@ function connectorTypeName(connector) {
32851
33032
  return typeof connector;
32852
33033
  }
32853
33034
 
32854
- const FACTORY_META$E = {
33035
+ const FACTORY_META$F = {
32855
33036
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
32856
33037
  key: 'BearerTokenHeaderAuth',
32857
33038
  };
@@ -32892,7 +33073,7 @@ function normalizeConfig$g(config) {
32892
33073
  var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
32893
33074
  __proto__: null,
32894
33075
  BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
32895
- FACTORY_META: FACTORY_META$E,
33076
+ FACTORY_META: FACTORY_META$F,
32896
33077
  default: BearerTokenHeaderAuthInjectionStrategyFactory
32897
33078
  });
32898
33079
 
@@ -32919,7 +33100,7 @@ function normalizeConfig$f(config) {
32919
33100
  function isTokenVerifier(candidate) {
32920
33101
  return Boolean(candidate && typeof candidate.verify === 'function');
32921
33102
  }
32922
- const FACTORY_META$D = {
33103
+ const FACTORY_META$E = {
32923
33104
  base: AUTHORIZER_FACTORY_BASE_TYPE,
32924
33105
  key: 'DefaultAuthorizer',
32925
33106
  };
@@ -32949,7 +33130,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
32949
33130
  var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
32950
33131
  __proto__: null,
32951
33132
  DefaultAuthorizerFactory: DefaultAuthorizerFactory,
32952
- FACTORY_META: FACTORY_META$D,
33133
+ FACTORY_META: FACTORY_META$E,
32953
33134
  default: DefaultAuthorizerFactory
32954
33135
  });
32955
33136
 
@@ -32960,7 +33141,7 @@ function getJwksJwtTokenVerifierModule() {
32960
33141
  }
32961
33142
  return jwksJwtTokenVerifierModulePromise;
32962
33143
  }
32963
- const FACTORY_META$C = {
33144
+ const FACTORY_META$D = {
32964
33145
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
32965
33146
  key: 'JWKSJWTTokenVerifier',
32966
33147
  };
@@ -33022,12 +33203,12 @@ function normalizeConfig$e(config) {
33022
33203
 
33023
33204
  var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
33024
33205
  __proto__: null,
33025
- FACTORY_META: FACTORY_META$C,
33206
+ FACTORY_META: FACTORY_META$D,
33026
33207
  JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
33027
33208
  default: JWKSTokenVerifierFactory
33028
33209
  });
33029
33210
 
33030
- const FACTORY_META$B = {
33211
+ const FACTORY_META$C = {
33031
33212
  base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
33032
33213
  key: 'JWTTokenIssuer',
33033
33214
  };
@@ -33224,12 +33405,12 @@ function getProviderKeyId(provider) {
33224
33405
 
33225
33406
  var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
33226
33407
  __proto__: null,
33227
- FACTORY_META: FACTORY_META$B,
33408
+ FACTORY_META: FACTORY_META$C,
33228
33409
  JWTTokenIssuerFactory: JWTTokenIssuerFactory,
33229
33410
  default: JWTTokenIssuerFactory
33230
33411
  });
33231
33412
 
33232
- const FACTORY_META$A = {
33413
+ const FACTORY_META$B = {
33233
33414
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
33234
33415
  key: 'JWTTokenVerifier',
33235
33416
  };
@@ -33397,7 +33578,7 @@ function getProviderVerificationKey(provider) {
33397
33578
 
33398
33579
  var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
33399
33580
  __proto__: null,
33400
- FACTORY_META: FACTORY_META$A,
33581
+ FACTORY_META: FACTORY_META$B,
33401
33582
  JWTTokenVerifierFactory: JWTTokenVerifierFactory,
33402
33583
  default: JWTTokenVerifierFactory
33403
33584
  });
@@ -33413,7 +33594,7 @@ class NoneTokenProvider {
33413
33594
  }
33414
33595
  }
33415
33596
 
33416
- const FACTORY_META$z = {
33597
+ const FACTORY_META$A = {
33417
33598
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
33418
33599
  key: 'NoneTokenProvider',
33419
33600
  };
@@ -33430,7 +33611,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
33430
33611
 
33431
33612
  var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
33432
33613
  __proto__: null,
33433
- FACTORY_META: FACTORY_META$z,
33614
+ FACTORY_META: FACTORY_META$A,
33434
33615
  NoneTokenProviderFactory: NoneTokenProviderFactory,
33435
33616
  default: NoneTokenProviderFactory
33436
33617
  });
@@ -33482,7 +33663,7 @@ class NoopAuthorizer {
33482
33663
  }
33483
33664
  }
33484
33665
 
33485
- const FACTORY_META$y = {
33666
+ const FACTORY_META$z = {
33486
33667
  base: AUTHORIZER_FACTORY_BASE_TYPE,
33487
33668
  key: 'NoopAuthorizer',
33488
33669
  };
@@ -33498,7 +33679,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
33498
33679
 
33499
33680
  var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
33500
33681
  __proto__: null,
33501
- FACTORY_META: FACTORY_META$y,
33682
+ FACTORY_META: FACTORY_META$z,
33502
33683
  NoopAuthorizerFactory: NoopAuthorizerFactory,
33503
33684
  default: NoopAuthorizerFactory
33504
33685
  });
@@ -33512,7 +33693,7 @@ class NoopTokenIssuer {
33512
33693
  }
33513
33694
  }
33514
33695
 
33515
- const FACTORY_META$x = {
33696
+ const FACTORY_META$y = {
33516
33697
  base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
33517
33698
  key: 'NoopTokenIssuer',
33518
33699
  };
@@ -33528,7 +33709,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
33528
33709
 
33529
33710
  var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
33530
33711
  __proto__: null,
33531
- FACTORY_META: FACTORY_META$x,
33712
+ FACTORY_META: FACTORY_META$y,
33532
33713
  NoopTokenIssuerFactory: NoopTokenIssuerFactory,
33533
33714
  default: NoopTokenIssuerFactory
33534
33715
  });
@@ -33550,7 +33731,7 @@ class NoopTokenVerifier {
33550
33731
  }
33551
33732
  }
33552
33733
 
33553
- const FACTORY_META$w = {
33734
+ const FACTORY_META$x = {
33554
33735
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
33555
33736
  key: 'NoopTokenVerifier',
33556
33737
  };
@@ -33566,7 +33747,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
33566
33747
 
33567
33748
  var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
33568
33749
  __proto__: null,
33569
- FACTORY_META: FACTORY_META$w,
33750
+ FACTORY_META: FACTORY_META$x,
33570
33751
  NoopTokenVerifierFactory: NoopTokenVerifierFactory,
33571
33752
  default: NoopTokenVerifierFactory
33572
33753
  });
@@ -33579,7 +33760,7 @@ function getOAuth2AuthorizerModule() {
33579
33760
  }
33580
33761
  return oauth2AuthorizerModulePromise;
33581
33762
  }
33582
- const FACTORY_META$v = {
33763
+ const FACTORY_META$w = {
33583
33764
  base: AUTHORIZER_FACTORY_BASE_TYPE,
33584
33765
  key: 'OAuth2Authorizer',
33585
33766
  };
@@ -33724,7 +33905,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
33724
33905
 
33725
33906
  var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
33726
33907
  __proto__: null,
33727
- FACTORY_META: FACTORY_META$v,
33908
+ FACTORY_META: FACTORY_META$w,
33728
33909
  OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
33729
33910
  default: OAuth2AuthorizerFactory
33730
33911
  });
@@ -33764,7 +33945,7 @@ function normalizeConfig$a(config) {
33764
33945
  }
33765
33946
  return normalized;
33766
33947
  }
33767
- const FACTORY_META$u = {
33948
+ const FACTORY_META$v = {
33768
33949
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
33769
33950
  key: 'OAuth2ClientCredentialsTokenProvider',
33770
33951
  };
@@ -33795,7 +33976,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
33795
33976
 
33796
33977
  var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
33797
33978
  __proto__: null,
33798
- FACTORY_META: FACTORY_META$u,
33979
+ FACTORY_META: FACTORY_META$v,
33799
33980
  OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
33800
33981
  default: OAuth2ClientCredentialsTokenProviderFactory
33801
33982
  });
@@ -33877,7 +34058,7 @@ function normalizeConfig$9(config) {
33877
34058
  }
33878
34059
  return normalized;
33879
34060
  }
33880
- const FACTORY_META$t = {
34061
+ const FACTORY_META$u = {
33881
34062
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
33882
34063
  key: 'OAuth2PkceTokenProvider',
33883
34064
  };
@@ -33932,7 +34113,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
33932
34113
 
33933
34114
  var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
33934
34115
  __proto__: null,
33935
- FACTORY_META: FACTORY_META$t,
34116
+ FACTORY_META: FACTORY_META$u,
33936
34117
  OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
33937
34118
  default: OAuth2PkceTokenProviderFactory
33938
34119
  });
@@ -33982,7 +34163,7 @@ class QueryParamAuthInjectionStrategy {
33982
34163
  }
33983
34164
  }
33984
34165
 
33985
- const FACTORY_META$s = {
34166
+ const FACTORY_META$t = {
33986
34167
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
33987
34168
  key: 'QueryParamAuth',
33988
34169
  };
@@ -34022,7 +34203,7 @@ function normalizeConfig$8(config) {
34022
34203
 
34023
34204
  var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
34024
34205
  __proto__: null,
34025
- FACTORY_META: FACTORY_META$s,
34206
+ FACTORY_META: FACTORY_META$t,
34026
34207
  QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
34027
34208
  default: QueryParamAuthInjectionStrategyFactory
34028
34209
  });
@@ -34058,7 +34239,7 @@ function normalizeConfig$7(config) {
34058
34239
  secretConfig: normalizeSecretSource(secretSource),
34059
34240
  };
34060
34241
  }
34061
- const FACTORY_META$r = {
34242
+ const FACTORY_META$s = {
34062
34243
  base: AUTHORIZER_FACTORY_BASE_TYPE,
34063
34244
  key: 'SharedSecretAuthorizer',
34064
34245
  };
@@ -34077,7 +34258,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
34077
34258
 
34078
34259
  var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
34079
34260
  __proto__: null,
34080
- FACTORY_META: FACTORY_META$r,
34261
+ FACTORY_META: FACTORY_META$s,
34081
34262
  SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
34082
34263
  default: SharedSecretAuthorizerFactory
34083
34264
  });
@@ -34113,7 +34294,7 @@ function normalizeConfig$6(config) {
34113
34294
  secretConfig: normalizeSecretSource(secretSource),
34114
34295
  };
34115
34296
  }
34116
- const FACTORY_META$q = {
34297
+ const FACTORY_META$r = {
34117
34298
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
34118
34299
  key: 'SharedSecretTokenProvider',
34119
34300
  };
@@ -34132,7 +34313,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
34132
34313
 
34133
34314
  var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
34134
34315
  __proto__: null,
34135
- FACTORY_META: FACTORY_META$q,
34316
+ FACTORY_META: FACTORY_META$r,
34136
34317
  SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
34137
34318
  default: SharedSecretTokenProviderFactory
34138
34319
  });
@@ -34176,7 +34357,7 @@ function normalizeConfig$5(config) {
34176
34357
  }
34177
34358
  return normalized;
34178
34359
  }
34179
- const FACTORY_META$p = {
34360
+ const FACTORY_META$q = {
34180
34361
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
34181
34362
  key: 'SharedSecretTokenVerifier',
34182
34363
  };
@@ -34201,7 +34382,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
34201
34382
 
34202
34383
  var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
34203
34384
  __proto__: null,
34204
- FACTORY_META: FACTORY_META$p,
34385
+ FACTORY_META: FACTORY_META$q,
34205
34386
  SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
34206
34387
  default: SharedSecretTokenVerifierFactory
34207
34388
  });
@@ -34316,7 +34497,7 @@ function normalizeConfig$4(config) {
34316
34497
  }
34317
34498
  return options;
34318
34499
  }
34319
- const FACTORY_META$o = {
34500
+ const FACTORY_META$p = {
34320
34501
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
34321
34502
  key: 'StaticTokenProvider',
34322
34503
  };
@@ -34333,7 +34514,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
34333
34514
 
34334
34515
  var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
34335
34516
  __proto__: null,
34336
- FACTORY_META: FACTORY_META$o,
34517
+ FACTORY_META: FACTORY_META$p,
34337
34518
  StaticTokenProviderFactory: StaticTokenProviderFactory,
34338
34519
  default: StaticTokenProviderFactory
34339
34520
  });
@@ -34384,7 +34565,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
34384
34565
  }
34385
34566
  }
34386
34567
 
34387
- const FACTORY_META$n = {
34568
+ const FACTORY_META$o = {
34388
34569
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
34389
34570
  key: 'WebSocketSubprotocolAuth',
34390
34571
  };
@@ -34426,7 +34607,7 @@ function normalizeConfig$3(config) {
34426
34607
 
34427
34608
  var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
34428
34609
  __proto__: null,
34429
- FACTORY_META: FACTORY_META$n,
34610
+ FACTORY_META: FACTORY_META$o,
34430
34611
  WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
34431
34612
  default: WebSocketSubprotocolAuthInjectionStrategyFactory
34432
34613
  });
@@ -34474,7 +34655,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
34474
34655
  throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
34475
34656
  }
34476
34657
  }
34477
- const FACTORY_META$m = {
34658
+ const FACTORY_META$n = {
34478
34659
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
34479
34660
  key: 'DevFixedKeyCredentialProvider',
34480
34661
  };
@@ -34482,7 +34663,7 @@ const FACTORY_META$m = {
34482
34663
  var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
34483
34664
  __proto__: null,
34484
34665
  DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
34485
- FACTORY_META: FACTORY_META$m,
34666
+ FACTORY_META: FACTORY_META$n,
34486
34667
  default: DevFixedKeyCredentialProviderFactory,
34487
34668
  normalizeDevFixedConfig: normalizeDevFixedConfig
34488
34669
  });
@@ -34498,14 +34679,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
34498
34679
  return new NoneCredentialProvider();
34499
34680
  }
34500
34681
  }
34501
- const FACTORY_META$l = {
34682
+ const FACTORY_META$m = {
34502
34683
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
34503
34684
  key: 'NoneCredentialProvider',
34504
34685
  };
34505
34686
 
34506
34687
  var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
34507
34688
  __proto__: null,
34508
- FACTORY_META: FACTORY_META$l,
34689
+ FACTORY_META: FACTORY_META$m,
34509
34690
  NoneCredentialProviderFactory: NoneCredentialProviderFactory,
34510
34691
  default: NoneCredentialProviderFactory
34511
34692
  });
@@ -34543,14 +34724,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
34543
34724
  return new SessionKeyCredentialProvider(resolved.length);
34544
34725
  }
34545
34726
  }
34546
- const FACTORY_META$k = {
34727
+ const FACTORY_META$l = {
34547
34728
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
34548
34729
  key: 'SessionKeyCredentialProvider',
34549
34730
  };
34550
34731
 
34551
34732
  var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
34552
34733
  __proto__: null,
34553
- FACTORY_META: FACTORY_META$k,
34734
+ FACTORY_META: FACTORY_META$l,
34554
34735
  SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
34555
34736
  default: SessionKeyCredentialProviderFactory,
34556
34737
  normalizeSessionKeyConfig: normalizeSessionKeyConfig
@@ -34588,9 +34769,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
34588
34769
  ensureAlias('keyValidator', 'key_validator');
34589
34770
  ensureAlias('eventListeners', 'event_listeners');
34590
34771
  ensureAlias('cryptoProvider', 'crypto_provider');
34772
+ ensureAlias('trustStoreProvider', 'trust_store_provider');
34591
34773
  return normalized;
34592
34774
  }
34593
- const FACTORY_META$j = {
34775
+ const FACTORY_META$k = {
34594
34776
  base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
34595
34777
  key: 'DefaultSecurityManager',
34596
34778
  };
@@ -34636,6 +34818,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
34636
34818
  const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
34637
34819
  const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
34638
34820
  const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
34821
+ const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
34639
34822
  const listenersSource = overrides?.eventListeners ??
34640
34823
  config.eventListeners ??
34641
34824
  config.event_listeners;
@@ -34655,10 +34838,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
34655
34838
  secureChannelManager,
34656
34839
  eventListeners,
34657
34840
  cryptoProvider: cryptoProvider ?? null,
34841
+ trustStoreProvider: trustStoreProvider ?? null,
34658
34842
  };
34659
34843
  }
34660
34844
  static async buildSecurityManager(options) {
34661
- let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
34845
+ let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
34662
34846
  if (!keyStore) {
34663
34847
  keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
34664
34848
  }
@@ -34671,6 +34855,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
34671
34855
  if (!policy) {
34672
34856
  throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
34673
34857
  }
34858
+ if (!trustStoreProvider) {
34859
+ trustStoreProvider =
34860
+ await TrustStoreProviderFactory.createTrustStoreProvider();
34861
+ }
34674
34862
  if (!keyManager) {
34675
34863
  keyManager =
34676
34864
  await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
@@ -34681,7 +34869,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
34681
34869
  }
34682
34870
  if (!envelopeVerifier) {
34683
34871
  envelopeVerifier =
34684
- await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
34872
+ await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
34685
34873
  }
34686
34874
  if (!encryptionManager || !secureChannelManager) {
34687
34875
  const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
@@ -34781,7 +34969,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
34781
34969
  throw error instanceof Error ? error : new Error(String(error));
34782
34970
  }
34783
34971
  }
34784
- static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
34972
+ static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
34785
34973
  const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
34786
34974
  if (verifierConfig &&
34787
34975
  DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
@@ -34805,7 +34993,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
34805
34993
  }
34806
34994
  const signing = policy.signing ?? null;
34807
34995
  return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
34808
- factoryArgs: [keyManager, signing ?? null],
34996
+ factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
34809
34997
  });
34810
34998
  }
34811
34999
  catch (error) {
@@ -35046,11 +35234,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
35046
35234
  var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
35047
35235
  __proto__: null,
35048
35236
  DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
35049
- FACTORY_META: FACTORY_META$j,
35237
+ FACTORY_META: FACTORY_META$k,
35050
35238
  default: DefaultSecurityManagerFactory
35051
35239
  });
35052
35240
 
35053
- const FACTORY_META$i = {
35241
+ const FACTORY_META$j = {
35054
35242
  base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
35055
35243
  key: 'NoopEncryptionManager',
35056
35244
  };
@@ -35107,7 +35295,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
35107
35295
 
35108
35296
  var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
35109
35297
  __proto__: null,
35110
- FACTORY_META: FACTORY_META$i,
35298
+ FACTORY_META: FACTORY_META$j,
35111
35299
  NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
35112
35300
  default: NoopEncryptionManagerFactory
35113
35301
  });
@@ -35179,7 +35367,7 @@ class NoopSecureChannelManager {
35179
35367
  }
35180
35368
  }
35181
35369
 
35182
- const FACTORY_META$h = {
35370
+ const FACTORY_META$i = {
35183
35371
  base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
35184
35372
  key: 'NoopSecureChannelManager',
35185
35373
  };
@@ -35196,12 +35384,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
35196
35384
 
35197
35385
  var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
35198
35386
  __proto__: null,
35199
- FACTORY_META: FACTORY_META$h,
35387
+ FACTORY_META: FACTORY_META$i,
35200
35388
  NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
35201
35389
  default: NoopSecureChannelManagerFactory
35202
35390
  });
35203
35391
 
35204
- const FACTORY_META$g = {
35392
+ const FACTORY_META$h = {
35205
35393
  base: KEY_MANAGER_FACTORY_BASE_TYPE,
35206
35394
  key: 'DefaultKeyManager',
35207
35395
  };
@@ -35229,7 +35417,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
35229
35417
  var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
35230
35418
  __proto__: null,
35231
35419
  DefaultKeyManagerFactory: DefaultKeyManagerFactory,
35232
- FACTORY_META: FACTORY_META$g,
35420
+ FACTORY_META: FACTORY_META$h,
35233
35421
  default: DefaultKeyManagerFactory
35234
35422
  });
35235
35423
 
@@ -35414,7 +35602,7 @@ class InMemoryKeyStore extends KeyStore {
35414
35602
  }
35415
35603
  registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
35416
35604
 
35417
- const FACTORY_META$f = {
35605
+ const FACTORY_META$g = {
35418
35606
  base: KEY_STORE_FACTORY_BASE_TYPE,
35419
35607
  key: 'InMemoryKeyStore',
35420
35608
  };
@@ -35449,12 +35637,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
35449
35637
 
35450
35638
  var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
35451
35639
  __proto__: null,
35452
- FACTORY_META: FACTORY_META$f,
35640
+ FACTORY_META: FACTORY_META$g,
35453
35641
  InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
35454
35642
  default: InMemoryKeyStoreFactory
35455
35643
  });
35456
35644
 
35457
- const FACTORY_META$e = {
35645
+ const FACTORY_META$f = {
35458
35646
  base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
35459
35647
  key: 'NoopKeyValidator',
35460
35648
  };
@@ -35472,12 +35660,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
35472
35660
 
35473
35661
  var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
35474
35662
  __proto__: null,
35475
- FACTORY_META: FACTORY_META$e,
35663
+ FACTORY_META: FACTORY_META$f,
35476
35664
  NoopKeyValidatorFactory: NoopKeyValidatorFactory,
35477
35665
  default: NoopKeyValidatorFactory
35478
35666
  });
35479
35667
 
35480
- const FACTORY_META$d = {
35668
+ const FACTORY_META$e = {
35481
35669
  base: SECURITY_POLICY_FACTORY_BASE_TYPE,
35482
35670
  key: 'DefaultSecurityPolicy',
35483
35671
  };
@@ -35538,11 +35726,11 @@ function normalizeConfig$2(config) {
35538
35726
  var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
35539
35727
  __proto__: null,
35540
35728
  DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
35541
- FACTORY_META: FACTORY_META$d,
35729
+ FACTORY_META: FACTORY_META$e,
35542
35730
  default: DefaultSecurityPolicyFactory
35543
35731
  });
35544
35732
 
35545
- const FACTORY_META$c = {
35733
+ const FACTORY_META$d = {
35546
35734
  base: SECURITY_POLICY_FACTORY_BASE_TYPE,
35547
35735
  key: 'NoSecurityPolicy',
35548
35736
  };
@@ -35570,7 +35758,7 @@ function normalizeConfig$1(config) {
35570
35758
 
35571
35759
  var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
35572
35760
  __proto__: null,
35573
- FACTORY_META: FACTORY_META$c,
35761
+ FACTORY_META: FACTORY_META$d,
35574
35762
  NoSecurityPolicyFactory: NoSecurityPolicyFactory,
35575
35763
  default: NoSecurityPolicyFactory
35576
35764
  });
@@ -35585,7 +35773,7 @@ async function getEdDSAEnvelopeSignerModule() {
35585
35773
  }
35586
35774
  return eddsaEnvelopeSignerModulePromise;
35587
35775
  }
35588
- const FACTORY_META$b = {
35776
+ const FACTORY_META$c = {
35589
35777
  base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
35590
35778
  key: 'EdDSAEnvelopeSigner',
35591
35779
  };
@@ -35614,7 +35802,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
35614
35802
  var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
35615
35803
  __proto__: null,
35616
35804
  EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
35617
- FACTORY_META: FACTORY_META$b,
35805
+ FACTORY_META: FACTORY_META$c,
35618
35806
  default: EdDSAEnvelopeSignerFactory
35619
35807
  });
35620
35808
 
@@ -35628,7 +35816,7 @@ async function getEdDSAEnvelopeVerifierModule() {
35628
35816
  }
35629
35817
  return eddsaEnvelopeVerifierModulePromise;
35630
35818
  }
35631
- const FACTORY_META$a = {
35819
+ const FACTORY_META$b = {
35632
35820
  base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
35633
35821
  key: 'EdDSAEnvelopeVerifier',
35634
35822
  };
@@ -35654,10 +35842,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
35654
35842
  var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
35655
35843
  __proto__: null,
35656
35844
  EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
35657
- FACTORY_META: FACTORY_META$a,
35845
+ FACTORY_META: FACTORY_META$b,
35658
35846
  default: EdDSAEnvelopeVerifierFactory
35659
35847
  });
35660
35848
 
35849
+ const FACTORY_META$a = {
35850
+ base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
35851
+ key: "NoopTrustStoreProvider",
35852
+ isDefault: true,
35853
+ priority: 10,
35854
+ };
35855
+ class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
35856
+ constructor() {
35857
+ super(...arguments);
35858
+ this.type = "NoopTrustStoreProvider";
35859
+ this.isDefault = true;
35860
+ this.priority = 10;
35861
+ }
35862
+ async create(_config, ..._factoryArgs) {
35863
+ return new NoopTrustStoreProvider();
35864
+ }
35865
+ }
35866
+
35867
+ var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
35868
+ __proto__: null,
35869
+ FACTORY_META: FACTORY_META$a,
35870
+ NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
35871
+ default: NoopTrustStoreProviderFactory
35872
+ });
35873
+
35661
35874
  const FACTORY_META$9 = {
35662
35875
  base: ROUTING_POLICY_FACTORY_BASE,
35663
35876
  key: 'CapabilityAwareRoutingPolicy',
@@ -39455,146 +39668,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
39455
39668
  SharedSecretTokenVerifier: SharedSecretTokenVerifier
39456
39669
  });
39457
39670
 
39458
- if (!hashes.sha512) {
39459
- hashes.sha512 = (message) => sha512(message);
39460
- }
39461
- function normalizeSignerOptions(options) {
39462
- if (!options || typeof options !== 'object') {
39463
- return {};
39464
- }
39465
- const candidate = options;
39466
- const result = {
39467
- ...options,
39468
- };
39469
- const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
39470
- if (cryptoProvider !== undefined) {
39471
- result.cryptoProvider = cryptoProvider ?? null;
39472
- }
39473
- const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
39474
- if (signingConfig !== undefined) {
39475
- result.signingConfig = signingConfig;
39476
- }
39477
- const privateKeyPem = resolveAlias(candidate, [
39478
- 'privateKeyPem',
39479
- 'private_key_pem',
39480
- ]);
39481
- if (privateKeyPem !== undefined) {
39482
- result.privateKeyPem = privateKeyPem;
39483
- }
39484
- const keyId = resolveAlias(candidate, [
39485
- 'keyId',
39486
- 'key_id',
39487
- ]);
39488
- if (keyId !== undefined) {
39489
- result.keyId = keyId;
39490
- }
39491
- return result;
39492
- }
39493
- class EdDSAEnvelopeSigner {
39494
- constructor(options = {}) {
39495
- const normalized = normalizeSignerOptions(options);
39496
- const provider = normalized.cryptoProvider ?? null;
39497
- if (!provider) {
39498
- throw new Error('No crypto provider is configured for signing');
39499
- }
39500
- this.crypto = provider;
39501
- const signingConfigOption = normalized.signingConfig;
39502
- if (signingConfigOption instanceof SigningConfig) {
39503
- this.signingConfig = signingConfigOption;
39504
- }
39505
- else if (signingConfigOption) {
39506
- this.signingConfig = new SigningConfig(signingConfigOption);
39507
- }
39508
- else {
39509
- this.signingConfig = new SigningConfig();
39510
- }
39511
- this.explicitPrivateKey = normalized.privateKeyPem;
39512
- this.explicitKeyId = normalized.keyId;
39513
- }
39514
- signEnvelope(envelope, { physicalPath }) {
39515
- if (!envelope.sid) {
39516
- throw new Error('Envelope missing sid');
39517
- }
39518
- const frame = envelope.frame;
39519
- if (frame.type === 'Data') {
39520
- const dataFrame = frame;
39521
- if (!dataFrame.pd) {
39522
- const payload = dataFrame.payload ?? '';
39523
- const payloadString = payload === '' ? '' : canonicalJson(payload);
39524
- dataFrame.pd = secureDigest(payloadString);
39525
- }
39526
- }
39527
- const digest = frameDigest(frame);
39528
- const immutable = canonicalJson(immutableHeaders(envelope));
39529
- const sidDigest = secureDigest(physicalPath);
39530
- const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
39531
- 1 +
39532
- encodeUtf8(immutable).length +
39533
- 1 +
39534
- encodeUtf8(digest).length);
39535
- const sidBytes = encodeUtf8(sidDigest);
39536
- const immBytes = encodeUtf8(immutable);
39537
- const digBytes = encodeUtf8(digest);
39538
- let offset = 0;
39539
- tbs.set(sidBytes, offset);
39540
- offset += sidBytes.length;
39541
- tbs[offset] = 0x1f;
39542
- offset += 1;
39543
- tbs.set(immBytes, offset);
39544
- offset += immBytes.length;
39545
- tbs[offset] = 0x1f;
39546
- offset += 1;
39547
- tbs.set(digBytes, offset);
39548
- const privateKey = this.loadPrivateKey();
39549
- const signatureBytes = sign(tbs, privateKey);
39550
- const signature = urlsafeBase64Encode(signatureBytes);
39551
- const kid = this.determineKeyId();
39552
- const signatureHeader = {
39553
- kid,
39554
- val: signature,
39555
- alg: 'EdDSA',
39556
- };
39557
- const secHeader = envelope.sec ?? {};
39558
- secHeader.sig = signatureHeader;
39559
- envelope.sec = secHeader;
39560
- return envelope;
39561
- }
39562
- loadPrivateKey() {
39563
- const pem = this.explicitPrivateKey ??
39564
- readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
39565
- if (!pem) {
39566
- throw new Error('Crypto provider does not expose a signing private key');
39567
- }
39568
- return parseEd25519PrivateKey(pem);
39569
- }
39570
- determineKeyId() {
39571
- if (this.explicitKeyId) {
39572
- return this.explicitKeyId;
39573
- }
39574
- if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
39575
- const certificateProvider = this
39576
- .crypto;
39577
- const jwk = certificateProvider.nodeJwk?.();
39578
- if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
39579
- const kid = jwk.kid;
39580
- if (typeof kid === 'string' && kid.length > 0) {
39581
- return kid;
39582
- }
39583
- }
39584
- }
39585
- const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
39586
- if (!fallback) {
39587
- throw new Error('Crypto provider does not expose a signature key id');
39588
- }
39589
- return fallback;
39590
- }
39591
- }
39592
-
39593
- var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
39594
- __proto__: null,
39595
- EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
39596
- });
39597
-
39598
39671
  async function loadPublicKey(jwk, signingConfig) {
39599
39672
  if (jwk.x5c) {
39600
39673
  if (signingConfig.signingMaterial !== SigningMaterial.X509_CHAIN) {
@@ -39832,4 +39905,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
39832
39905
  WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
39833
39906
  });
39834
39907
 
39835
- export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Y as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$W as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$Z as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$X as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
39908
+ export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Z as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$X as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$$ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$10 as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$_ as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$Y as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };