@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +355 -278
- package/dist/browser/index.mjs +346 -273
- package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/factory-manifest.js +2 -0
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/esm/naylence/fame/security/index.js +3 -0
- package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +351 -274
- package/dist/node/index.mjs +346 -273
- package/dist/node/node.cjs +350 -273
- package/dist/node/node.mjs +345 -272
- package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
- package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
- package/dist/types/naylence/fame/security/index.d.ts +4 -0
- package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
- package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/browser/index.mjs
CHANGED
|
@@ -2,15 +2,15 @@ import { parseAddressComponents, FlowFlags, FameAddress, DEFAULT_POLLING_TIMEOUT
|
|
|
2
2
|
export * from '@naylence/core';
|
|
3
3
|
import { z, ZodError } from 'zod';
|
|
4
4
|
import { AbstractResourceFactory, createResource as createResource$1, createDefaultResource, registerFactory, Expressions, ExtensionManager, ExpressionEvaluationPolicy, Registry, configValidator } from '@naylence/factory';
|
|
5
|
+
import { sign, hashes, verify } from '@noble/ed25519';
|
|
6
|
+
import { sha256, sha512 } from '@noble/hashes/sha2.js';
|
|
5
7
|
import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
6
8
|
import { x25519 } from '@noble/curves/ed25519.js';
|
|
7
9
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
8
|
-
import { sha256, sha512 } from '@noble/hashes/sha2.js';
|
|
9
10
|
import { utf8ToBytes, bytesToHex, randomBytes, concatBytes } from '@noble/hashes/utils.js';
|
|
10
11
|
import { parse } from 'yaml';
|
|
11
12
|
import fastify from 'fastify';
|
|
12
13
|
import websocketPlugin from '@fastify/websocket';
|
|
13
|
-
import { sign, hashes, verify } from '@noble/ed25519';
|
|
14
14
|
|
|
15
15
|
// --- ENV SHIM (runs once in browser) ---
|
|
16
16
|
function installProcessEnvShim() {
|
|
@@ -96,12 +96,12 @@ installProcessEnvShim();
|
|
|
96
96
|
// --- END ENV SHIM ---
|
|
97
97
|
|
|
98
98
|
// This file is auto-generated during build - do not edit manually
|
|
99
|
-
// Generated from package.json version: 0.3.5-test.
|
|
99
|
+
// Generated from package.json version: 0.3.5-test.924
|
|
100
100
|
/**
|
|
101
101
|
* The package version, injected at build time.
|
|
102
102
|
* @internal
|
|
103
103
|
*/
|
|
104
|
-
const VERSION = '0.3.5-test.
|
|
104
|
+
const VERSION = '0.3.5-test.924';
|
|
105
105
|
|
|
106
106
|
/**
|
|
107
107
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -3167,7 +3167,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3167
3167
|
return new EnvCredentialProvider(resolved.varName);
|
|
3168
3168
|
}
|
|
3169
3169
|
}
|
|
3170
|
-
const FACTORY_META$
|
|
3170
|
+
const FACTORY_META$18 = {
|
|
3171
3171
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3172
3172
|
key: 'EnvCredentialProvider',
|
|
3173
3173
|
};
|
|
@@ -3175,7 +3175,7 @@ const FACTORY_META$17 = {
|
|
|
3175
3175
|
var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3176
3176
|
__proto__: null,
|
|
3177
3177
|
EnvCredentialProviderFactory: EnvCredentialProviderFactory,
|
|
3178
|
-
FACTORY_META: FACTORY_META$
|
|
3178
|
+
FACTORY_META: FACTORY_META$18,
|
|
3179
3179
|
default: EnvCredentialProviderFactory,
|
|
3180
3180
|
normalizeEnvConfig: normalizeEnvConfig
|
|
3181
3181
|
});
|
|
@@ -3273,14 +3273,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3273
3273
|
return new PromptCredentialProvider(resolved.credentialName);
|
|
3274
3274
|
}
|
|
3275
3275
|
}
|
|
3276
|
-
const FACTORY_META$
|
|
3276
|
+
const FACTORY_META$17 = {
|
|
3277
3277
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3278
3278
|
key: 'PromptCredentialProvider',
|
|
3279
3279
|
};
|
|
3280
3280
|
|
|
3281
3281
|
var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3282
3282
|
__proto__: null,
|
|
3283
|
-
FACTORY_META: FACTORY_META$
|
|
3283
|
+
FACTORY_META: FACTORY_META$17,
|
|
3284
3284
|
PromptCredentialProviderFactory: PromptCredentialProviderFactory,
|
|
3285
3285
|
default: PromptCredentialProviderFactory,
|
|
3286
3286
|
normalizePromptConfig: normalizePromptConfig
|
|
@@ -3334,14 +3334,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3334
3334
|
return new SecretStoreCredentialProvider(resolved.secretName);
|
|
3335
3335
|
}
|
|
3336
3336
|
}
|
|
3337
|
-
const FACTORY_META$
|
|
3337
|
+
const FACTORY_META$16 = {
|
|
3338
3338
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3339
3339
|
key: 'SecretStoreCredentialProvider',
|
|
3340
3340
|
};
|
|
3341
3341
|
|
|
3342
3342
|
var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3343
3343
|
__proto__: null,
|
|
3344
|
-
FACTORY_META: FACTORY_META$
|
|
3344
|
+
FACTORY_META: FACTORY_META$16,
|
|
3345
3345
|
SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
|
|
3346
3346
|
default: SecretStoreCredentialProviderFactory,
|
|
3347
3347
|
normalizeSecretStoreConfig: normalizeSecretStoreConfig
|
|
@@ -3390,14 +3390,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3390
3390
|
return new StaticCredentialProvider(resolved.credentialValue);
|
|
3391
3391
|
}
|
|
3392
3392
|
}
|
|
3393
|
-
const FACTORY_META$
|
|
3393
|
+
const FACTORY_META$15 = {
|
|
3394
3394
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3395
3395
|
key: 'StaticCredentialProvider',
|
|
3396
3396
|
};
|
|
3397
3397
|
|
|
3398
3398
|
var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3399
3399
|
__proto__: null,
|
|
3400
|
-
FACTORY_META: FACTORY_META$
|
|
3400
|
+
FACTORY_META: FACTORY_META$15,
|
|
3401
3401
|
StaticCredentialProviderFactory: StaticCredentialProviderFactory,
|
|
3402
3402
|
default: StaticCredentialProviderFactory,
|
|
3403
3403
|
normalizeStaticConfig: normalizeStaticConfig
|
|
@@ -13503,6 +13503,7 @@ const MODULES = [
|
|
|
13503
13503
|
"./security/policy/no-security-policy-factory.js",
|
|
13504
13504
|
"./security/signing/eddsa-envelope-signer-factory.js",
|
|
13505
13505
|
"./security/signing/eddsa-envelope-verifier-factory.js",
|
|
13506
|
+
"./security/trust-store/noop-trust-store-provider-factory.js",
|
|
13506
13507
|
"./sentinel/capability-aware-routing-policy-factory.js",
|
|
13507
13508
|
"./sentinel/composite-routing-policy-factory.js",
|
|
13508
13509
|
"./sentinel/hybrid-path-routing-policy-factory.js",
|
|
@@ -13577,6 +13578,7 @@ const MODULE_LOADERS = {
|
|
|
13577
13578
|
"./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
|
|
13578
13579
|
"./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
|
|
13579
13580
|
"./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
|
|
13581
|
+
"./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
|
|
13580
13582
|
"./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
|
|
13581
13583
|
"./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
|
|
13582
13584
|
"./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
|
|
@@ -13881,7 +13883,7 @@ class NodeLikeFactory extends AbstractResourceFactory {
|
|
|
13881
13883
|
// registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
|
|
13882
13884
|
// }
|
|
13883
13885
|
|
|
13884
|
-
const FACTORY_META$
|
|
13886
|
+
const FACTORY_META$14 = {
|
|
13885
13887
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
13886
13888
|
key: 'Node',
|
|
13887
13889
|
};
|
|
@@ -13922,7 +13924,7 @@ class NodeFactory extends NodeLikeFactory {
|
|
|
13922
13924
|
|
|
13923
13925
|
var nodeFactory = /*#__PURE__*/Object.freeze({
|
|
13924
13926
|
__proto__: null,
|
|
13925
|
-
FACTORY_META: FACTORY_META$
|
|
13927
|
+
FACTORY_META: FACTORY_META$14,
|
|
13926
13928
|
NodeFactory: NodeFactory,
|
|
13927
13929
|
default: NodeFactory
|
|
13928
13930
|
});
|
|
@@ -15363,7 +15365,7 @@ class RouteStoreFactory extends AbstractResourceFactory {
|
|
|
15363
15365
|
return store ?? null;
|
|
15364
15366
|
}
|
|
15365
15367
|
}
|
|
15366
|
-
const FACTORY_META$
|
|
15368
|
+
const FACTORY_META$13 = {
|
|
15367
15369
|
base: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15368
15370
|
key: 'InMemoryRouteStore',
|
|
15369
15371
|
};
|
|
@@ -15381,7 +15383,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
|
|
|
15381
15383
|
|
|
15382
15384
|
var routeStoreFactory = /*#__PURE__*/Object.freeze({
|
|
15383
15385
|
__proto__: null,
|
|
15384
|
-
FACTORY_META: FACTORY_META$
|
|
15386
|
+
FACTORY_META: FACTORY_META$13,
|
|
15385
15387
|
InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
|
|
15386
15388
|
ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15387
15389
|
RouteStoreFactory: RouteStoreFactory,
|
|
@@ -19197,7 +19199,7 @@ function isPlainRecord(value) {
|
|
|
19197
19199
|
return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
|
|
19198
19200
|
}
|
|
19199
19201
|
|
|
19200
|
-
const FACTORY_META$
|
|
19202
|
+
const FACTORY_META$12 = {
|
|
19201
19203
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
19202
19204
|
key: 'Sentinel',
|
|
19203
19205
|
};
|
|
@@ -19381,7 +19383,7 @@ class SentinelFactory extends NodeLikeFactory {
|
|
|
19381
19383
|
|
|
19382
19384
|
var sentinelFactory = /*#__PURE__*/Object.freeze({
|
|
19383
19385
|
__proto__: null,
|
|
19384
|
-
FACTORY_META: FACTORY_META$
|
|
19386
|
+
FACTORY_META: FACTORY_META$12,
|
|
19385
19387
|
SentinelFactory: SentinelFactory,
|
|
19386
19388
|
default: SentinelFactory
|
|
19387
19389
|
});
|
|
@@ -20532,6 +20534,45 @@ class CertificateManagerFactory extends AbstractResourceFactory {
|
|
|
20532
20534
|
}
|
|
20533
20535
|
}
|
|
20534
20536
|
|
|
20537
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
20538
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
20539
|
+
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
20540
|
+
createUnconfiguredProvider(reason) {
|
|
20541
|
+
return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
20542
|
+
}
|
|
20543
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
20544
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
20545
|
+
const mergedFactoryArgs = [
|
|
20546
|
+
...(dependencies ? [dependencies] : []),
|
|
20547
|
+
...(factoryArgs ?? []),
|
|
20548
|
+
];
|
|
20549
|
+
const creationOptions = {
|
|
20550
|
+
...restOptions,
|
|
20551
|
+
factoryArgs: mergedFactoryArgs,
|
|
20552
|
+
};
|
|
20553
|
+
if (config) {
|
|
20554
|
+
const instance = await createResource$1(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
20555
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20556
|
+
}
|
|
20557
|
+
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
20558
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20559
|
+
}
|
|
20560
|
+
}
|
|
20561
|
+
class NoopTrustStoreProvider {
|
|
20562
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
20563
|
+
this.reason = reason;
|
|
20564
|
+
}
|
|
20565
|
+
async getTrustStorePem() {
|
|
20566
|
+
throw new Error(this.reason);
|
|
20567
|
+
}
|
|
20568
|
+
async getRoots() {
|
|
20569
|
+
return [];
|
|
20570
|
+
}
|
|
20571
|
+
async initialize() {
|
|
20572
|
+
// No-op for the placeholder provider.
|
|
20573
|
+
}
|
|
20574
|
+
}
|
|
20575
|
+
|
|
20535
20576
|
const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
|
|
20536
20577
|
class EncryptionManagerFactory extends AbstractResourceFactory {
|
|
20537
20578
|
getPriority() {
|
|
@@ -25348,6 +25389,146 @@ function encodeUtf8(value) {
|
|
|
25348
25389
|
throw new Error('No UTF-8 encoder available in this environment');
|
|
25349
25390
|
}
|
|
25350
25391
|
|
|
25392
|
+
if (!hashes.sha512) {
|
|
25393
|
+
hashes.sha512 = (message) => sha512(message);
|
|
25394
|
+
}
|
|
25395
|
+
function normalizeSignerOptions(options) {
|
|
25396
|
+
if (!options || typeof options !== 'object') {
|
|
25397
|
+
return {};
|
|
25398
|
+
}
|
|
25399
|
+
const candidate = options;
|
|
25400
|
+
const result = {
|
|
25401
|
+
...options,
|
|
25402
|
+
};
|
|
25403
|
+
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
25404
|
+
if (cryptoProvider !== undefined) {
|
|
25405
|
+
result.cryptoProvider = cryptoProvider ?? null;
|
|
25406
|
+
}
|
|
25407
|
+
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
25408
|
+
if (signingConfig !== undefined) {
|
|
25409
|
+
result.signingConfig = signingConfig;
|
|
25410
|
+
}
|
|
25411
|
+
const privateKeyPem = resolveAlias(candidate, [
|
|
25412
|
+
'privateKeyPem',
|
|
25413
|
+
'private_key_pem',
|
|
25414
|
+
]);
|
|
25415
|
+
if (privateKeyPem !== undefined) {
|
|
25416
|
+
result.privateKeyPem = privateKeyPem;
|
|
25417
|
+
}
|
|
25418
|
+
const keyId = resolveAlias(candidate, [
|
|
25419
|
+
'keyId',
|
|
25420
|
+
'key_id',
|
|
25421
|
+
]);
|
|
25422
|
+
if (keyId !== undefined) {
|
|
25423
|
+
result.keyId = keyId;
|
|
25424
|
+
}
|
|
25425
|
+
return result;
|
|
25426
|
+
}
|
|
25427
|
+
class EdDSAEnvelopeSigner {
|
|
25428
|
+
constructor(options = {}) {
|
|
25429
|
+
const normalized = normalizeSignerOptions(options);
|
|
25430
|
+
const provider = normalized.cryptoProvider ?? null;
|
|
25431
|
+
if (!provider) {
|
|
25432
|
+
throw new Error('No crypto provider is configured for signing');
|
|
25433
|
+
}
|
|
25434
|
+
this.crypto = provider;
|
|
25435
|
+
const signingConfigOption = normalized.signingConfig;
|
|
25436
|
+
if (signingConfigOption instanceof SigningConfig) {
|
|
25437
|
+
this.signingConfig = signingConfigOption;
|
|
25438
|
+
}
|
|
25439
|
+
else if (signingConfigOption) {
|
|
25440
|
+
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
25441
|
+
}
|
|
25442
|
+
else {
|
|
25443
|
+
this.signingConfig = new SigningConfig();
|
|
25444
|
+
}
|
|
25445
|
+
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
25446
|
+
this.explicitKeyId = normalized.keyId;
|
|
25447
|
+
}
|
|
25448
|
+
signEnvelope(envelope, { physicalPath }) {
|
|
25449
|
+
if (!envelope.sid) {
|
|
25450
|
+
throw new Error('Envelope missing sid');
|
|
25451
|
+
}
|
|
25452
|
+
const frame = envelope.frame;
|
|
25453
|
+
if (frame.type === 'Data') {
|
|
25454
|
+
const dataFrame = frame;
|
|
25455
|
+
if (!dataFrame.pd) {
|
|
25456
|
+
const payload = dataFrame.payload ?? '';
|
|
25457
|
+
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
25458
|
+
dataFrame.pd = secureDigest(payloadString);
|
|
25459
|
+
}
|
|
25460
|
+
}
|
|
25461
|
+
const digest = frameDigest(frame);
|
|
25462
|
+
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
25463
|
+
const sidDigest = secureDigest(physicalPath);
|
|
25464
|
+
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
25465
|
+
1 +
|
|
25466
|
+
encodeUtf8(immutable).length +
|
|
25467
|
+
1 +
|
|
25468
|
+
encodeUtf8(digest).length);
|
|
25469
|
+
const sidBytes = encodeUtf8(sidDigest);
|
|
25470
|
+
const immBytes = encodeUtf8(immutable);
|
|
25471
|
+
const digBytes = encodeUtf8(digest);
|
|
25472
|
+
let offset = 0;
|
|
25473
|
+
tbs.set(sidBytes, offset);
|
|
25474
|
+
offset += sidBytes.length;
|
|
25475
|
+
tbs[offset] = 0x1f;
|
|
25476
|
+
offset += 1;
|
|
25477
|
+
tbs.set(immBytes, offset);
|
|
25478
|
+
offset += immBytes.length;
|
|
25479
|
+
tbs[offset] = 0x1f;
|
|
25480
|
+
offset += 1;
|
|
25481
|
+
tbs.set(digBytes, offset);
|
|
25482
|
+
const privateKey = this.loadPrivateKey();
|
|
25483
|
+
const signatureBytes = sign(tbs, privateKey);
|
|
25484
|
+
const signature = urlsafeBase64Encode(signatureBytes);
|
|
25485
|
+
const kid = this.determineKeyId();
|
|
25486
|
+
const signatureHeader = {
|
|
25487
|
+
kid,
|
|
25488
|
+
val: signature,
|
|
25489
|
+
alg: 'EdDSA',
|
|
25490
|
+
};
|
|
25491
|
+
const secHeader = envelope.sec ?? {};
|
|
25492
|
+
secHeader.sig = signatureHeader;
|
|
25493
|
+
envelope.sec = secHeader;
|
|
25494
|
+
return envelope;
|
|
25495
|
+
}
|
|
25496
|
+
loadPrivateKey() {
|
|
25497
|
+
const pem = this.explicitPrivateKey ??
|
|
25498
|
+
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
25499
|
+
if (!pem) {
|
|
25500
|
+
throw new Error('Crypto provider does not expose a signing private key');
|
|
25501
|
+
}
|
|
25502
|
+
return parseEd25519PrivateKey(pem);
|
|
25503
|
+
}
|
|
25504
|
+
determineKeyId() {
|
|
25505
|
+
if (this.explicitKeyId) {
|
|
25506
|
+
return this.explicitKeyId;
|
|
25507
|
+
}
|
|
25508
|
+
if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
|
|
25509
|
+
const certificateProvider = this
|
|
25510
|
+
.crypto;
|
|
25511
|
+
const jwk = certificateProvider.nodeJwk?.();
|
|
25512
|
+
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
25513
|
+
const kid = jwk.kid;
|
|
25514
|
+
if (typeof kid === 'string' && kid.length > 0) {
|
|
25515
|
+
return kid;
|
|
25516
|
+
}
|
|
25517
|
+
}
|
|
25518
|
+
}
|
|
25519
|
+
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
25520
|
+
if (!fallback) {
|
|
25521
|
+
throw new Error('Crypto provider does not expose a signature key id');
|
|
25522
|
+
}
|
|
25523
|
+
return fallback;
|
|
25524
|
+
}
|
|
25525
|
+
}
|
|
25526
|
+
|
|
25527
|
+
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
25528
|
+
__proto__: null,
|
|
25529
|
+
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
25530
|
+
});
|
|
25531
|
+
|
|
25351
25532
|
const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
|
|
25352
25533
|
let joseModulePromise = null;
|
|
25353
25534
|
async function requireJose() {
|
|
@@ -26951,7 +27132,7 @@ const PROFILE_MAP$4 = {
|
|
|
26951
27132
|
[PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
|
|
26952
27133
|
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
26953
27134
|
};
|
|
26954
|
-
const FACTORY_META$
|
|
27135
|
+
const FACTORY_META$11 = {
|
|
26955
27136
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
26956
27137
|
key: 'SecurityProfile',
|
|
26957
27138
|
};
|
|
@@ -27077,7 +27258,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
|
27077
27258
|
ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
|
|
27078
27259
|
ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
|
|
27079
27260
|
ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
|
|
27080
|
-
FACTORY_META: FACTORY_META$
|
|
27261
|
+
FACTORY_META: FACTORY_META$11,
|
|
27081
27262
|
NodeSecurityProfileFactory: NodeSecurityProfileFactory,
|
|
27082
27263
|
PROFILE_NAME_GATED: PROFILE_NAME_GATED,
|
|
27083
27264
|
PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
|
|
@@ -27206,7 +27387,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
|
|
|
27206
27387
|
}
|
|
27207
27388
|
}
|
|
27208
27389
|
|
|
27209
|
-
const FACTORY_META
|
|
27390
|
+
const FACTORY_META$10 = {
|
|
27210
27391
|
base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
|
|
27211
27392
|
key: 'SimpleLoadBalancerStickinessManager',
|
|
27212
27393
|
};
|
|
@@ -27230,7 +27411,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
|
|
|
27230
27411
|
|
|
27231
27412
|
var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
27232
27413
|
__proto__: null,
|
|
27233
|
-
FACTORY_META: FACTORY_META
|
|
27414
|
+
FACTORY_META: FACTORY_META$10,
|
|
27234
27415
|
SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
|
|
27235
27416
|
default: SimpleLoadBalancerStickinessManagerFactory
|
|
27236
27417
|
});
|
|
@@ -27708,7 +27889,7 @@ class WelcomeServiceFactory extends AbstractResourceFactory {
|
|
|
27708
27889
|
}
|
|
27709
27890
|
}
|
|
27710
27891
|
|
|
27711
|
-
const FACTORY_META
|
|
27892
|
+
const FACTORY_META$$ = {
|
|
27712
27893
|
base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
|
|
27713
27894
|
key: 'DefaultWelcomeService',
|
|
27714
27895
|
};
|
|
@@ -27789,7 +27970,7 @@ function resolveConfigEntry(source, keys) {
|
|
|
27789
27970
|
var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
|
|
27790
27971
|
__proto__: null,
|
|
27791
27972
|
DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
|
|
27792
|
-
FACTORY_META: FACTORY_META
|
|
27973
|
+
FACTORY_META: FACTORY_META$$,
|
|
27793
27974
|
default: DefaultWelcomeServiceFactory
|
|
27794
27975
|
});
|
|
27795
27976
|
|
|
@@ -27940,7 +28121,7 @@ class InPageConnectionGrantImpl {
|
|
|
27940
28121
|
this.purpose = 'connection';
|
|
27941
28122
|
}
|
|
27942
28123
|
}
|
|
27943
|
-
const FACTORY_META$
|
|
28124
|
+
const FACTORY_META$_ = {
|
|
27944
28125
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
27945
28126
|
key: INPAGE_CONNECTOR_TYPE,
|
|
27946
28127
|
};
|
|
@@ -28089,7 +28270,7 @@ class InPageConnectorFactory extends ConnectorFactory {
|
|
|
28089
28270
|
|
|
28090
28271
|
var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
28091
28272
|
__proto__: null,
|
|
28092
|
-
FACTORY_META: FACTORY_META$
|
|
28273
|
+
FACTORY_META: FACTORY_META$_,
|
|
28093
28274
|
InPageConnectorFactory: InPageConnectorFactory,
|
|
28094
28275
|
default: InPageConnectorFactory
|
|
28095
28276
|
});
|
|
@@ -28102,7 +28283,7 @@ class BroadcastChannelConnectionGrantImpl {
|
|
|
28102
28283
|
this.purpose = 'connection';
|
|
28103
28284
|
}
|
|
28104
28285
|
}
|
|
28105
|
-
const FACTORY_META$
|
|
28286
|
+
const FACTORY_META$Z = {
|
|
28106
28287
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
28107
28288
|
key: BROADCAST_CHANNEL_CONNECTOR_TYPE,
|
|
28108
28289
|
};
|
|
@@ -28250,7 +28431,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
|
|
|
28250
28431
|
var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
28251
28432
|
__proto__: null,
|
|
28252
28433
|
BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
|
|
28253
|
-
FACTORY_META: FACTORY_META$
|
|
28434
|
+
FACTORY_META: FACTORY_META$Z,
|
|
28254
28435
|
default: BroadcastChannelConnectorFactory
|
|
28255
28436
|
});
|
|
28256
28437
|
|
|
@@ -29001,7 +29182,7 @@ function normalizeConfig$r(config) {
|
|
|
29001
29182
|
inboxCapacity,
|
|
29002
29183
|
};
|
|
29003
29184
|
}
|
|
29004
|
-
const FACTORY_META$
|
|
29185
|
+
const FACTORY_META$Y = {
|
|
29005
29186
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29006
29187
|
key: 'InPageListener',
|
|
29007
29188
|
};
|
|
@@ -29026,7 +29207,7 @@ class InPageListenerFactory extends TransportListenerFactory {
|
|
|
29026
29207
|
|
|
29027
29208
|
var inpageListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29028
29209
|
__proto__: null,
|
|
29029
|
-
FACTORY_META: FACTORY_META$
|
|
29210
|
+
FACTORY_META: FACTORY_META$Y,
|
|
29030
29211
|
InPageListenerFactory: InPageListenerFactory,
|
|
29031
29212
|
default: InPageListenerFactory
|
|
29032
29213
|
});
|
|
@@ -29540,7 +29721,7 @@ function normalizeConfig$q(config) {
|
|
|
29540
29721
|
inboxCapacity,
|
|
29541
29722
|
};
|
|
29542
29723
|
}
|
|
29543
|
-
const FACTORY_META$
|
|
29724
|
+
const FACTORY_META$X = {
|
|
29544
29725
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29545
29726
|
key: 'BroadcastChannelListener',
|
|
29546
29727
|
};
|
|
@@ -29566,7 +29747,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
|
|
|
29566
29747
|
var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29567
29748
|
__proto__: null,
|
|
29568
29749
|
BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
|
|
29569
|
-
FACTORY_META: FACTORY_META$
|
|
29750
|
+
FACTORY_META: FACTORY_META$X,
|
|
29570
29751
|
default: BroadcastChannelListenerFactory
|
|
29571
29752
|
});
|
|
29572
29753
|
|
|
@@ -29862,7 +30043,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
|
|
|
29862
30043
|
}
|
|
29863
30044
|
}
|
|
29864
30045
|
|
|
29865
|
-
const FACTORY_META$
|
|
30046
|
+
const FACTORY_META$W = {
|
|
29866
30047
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
29867
30048
|
key: 'NoopTraceEmitter',
|
|
29868
30049
|
};
|
|
@@ -29880,7 +30061,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
|
|
|
29880
30061
|
|
|
29881
30062
|
var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
29882
30063
|
__proto__: null,
|
|
29883
|
-
FACTORY_META: FACTORY_META$
|
|
30064
|
+
FACTORY_META: FACTORY_META$W,
|
|
29884
30065
|
NoopTraceEmitterFactory: NoopTraceEmitterFactory,
|
|
29885
30066
|
default: NoopTraceEmitterFactory
|
|
29886
30067
|
});
|
|
@@ -30135,7 +30316,7 @@ function getOtelApiModule() {
|
|
|
30135
30316
|
}
|
|
30136
30317
|
return otelApiModulePromise;
|
|
30137
30318
|
}
|
|
30138
|
-
const FACTORY_META$
|
|
30319
|
+
const FACTORY_META$V = {
|
|
30139
30320
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
30140
30321
|
key: 'OpenTelemetryTraceEmitter',
|
|
30141
30322
|
};
|
|
@@ -30305,7 +30486,7 @@ function extractHeaders(value) {
|
|
|
30305
30486
|
|
|
30306
30487
|
var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
30307
30488
|
__proto__: null,
|
|
30308
|
-
FACTORY_META: FACTORY_META$
|
|
30489
|
+
FACTORY_META: FACTORY_META$V,
|
|
30309
30490
|
OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
|
|
30310
30491
|
default: OpenTelemetryTraceEmitterFactory
|
|
30311
30492
|
});
|
|
@@ -30326,7 +30507,7 @@ const PROFILE_MAP$3 = {
|
|
|
30326
30507
|
[PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
|
|
30327
30508
|
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
30328
30509
|
};
|
|
30329
|
-
const FACTORY_META$
|
|
30510
|
+
const FACTORY_META$U = {
|
|
30330
30511
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
30331
30512
|
key: 'TraceEmitterProfile',
|
|
30332
30513
|
};
|
|
@@ -30406,7 +30587,7 @@ function deepClone$2(value) {
|
|
|
30406
30587
|
|
|
30407
30588
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
30408
30589
|
__proto__: null,
|
|
30409
|
-
FACTORY_META: FACTORY_META$
|
|
30590
|
+
FACTORY_META: FACTORY_META$U,
|
|
30410
30591
|
PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
|
|
30411
30592
|
PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
|
|
30412
30593
|
TraceEmitterProfileFactory: TraceEmitterProfileFactory,
|
|
@@ -30474,7 +30655,7 @@ function normalizeConfig$o(config) {
|
|
|
30474
30655
|
authorizer: authorizerValue,
|
|
30475
30656
|
};
|
|
30476
30657
|
}
|
|
30477
|
-
const FACTORY_META$
|
|
30658
|
+
const FACTORY_META$T = {
|
|
30478
30659
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
30479
30660
|
key: 'HttpListener',
|
|
30480
30661
|
};
|
|
@@ -30521,7 +30702,7 @@ class HttpListenerFactory extends TransportListenerFactory {
|
|
|
30521
30702
|
|
|
30522
30703
|
var httpListenerFactory = /*#__PURE__*/Object.freeze({
|
|
30523
30704
|
__proto__: null,
|
|
30524
|
-
FACTORY_META: FACTORY_META$
|
|
30705
|
+
FACTORY_META: FACTORY_META$T,
|
|
30525
30706
|
HttpListenerFactory: HttpListenerFactory,
|
|
30526
30707
|
default: HttpListenerFactory
|
|
30527
30708
|
});
|
|
@@ -30646,7 +30827,7 @@ class HttpConnectionGrantImpl {
|
|
|
30646
30827
|
this.purpose = 'connection';
|
|
30647
30828
|
}
|
|
30648
30829
|
}
|
|
30649
|
-
const FACTORY_META$
|
|
30830
|
+
const FACTORY_META$S = {
|
|
30650
30831
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
30651
30832
|
key: HTTP_STATELESS_CONNECTOR_TYPE,
|
|
30652
30833
|
};
|
|
@@ -30815,7 +30996,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
|
|
|
30815
30996
|
|
|
30816
30997
|
var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
30817
30998
|
__proto__: null,
|
|
30818
|
-
FACTORY_META: FACTORY_META$
|
|
30999
|
+
FACTORY_META: FACTORY_META$S,
|
|
30819
31000
|
HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
|
|
30820
31001
|
default: HttpStatelessConnectorFactory
|
|
30821
31002
|
});
|
|
@@ -30831,7 +31012,7 @@ class WebSocketConnectionGrantImpl {
|
|
|
30831
31012
|
this.purpose = 'connection';
|
|
30832
31013
|
}
|
|
30833
31014
|
}
|
|
30834
|
-
const FACTORY_META$
|
|
31015
|
+
const FACTORY_META$R = {
|
|
30835
31016
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
30836
31017
|
key: 'WebSocketConnector',
|
|
30837
31018
|
};
|
|
@@ -31202,7 +31383,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
|
|
|
31202
31383
|
|
|
31203
31384
|
var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
31204
31385
|
__proto__: null,
|
|
31205
|
-
FACTORY_META: FACTORY_META$
|
|
31386
|
+
FACTORY_META: FACTORY_META$R,
|
|
31206
31387
|
WebSocketConnectorFactory: WebSocketConnectorFactory,
|
|
31207
31388
|
default: WebSocketConnectorFactory,
|
|
31208
31389
|
setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
|
|
@@ -31272,7 +31453,7 @@ function normalizeConfig$n(config) {
|
|
|
31272
31453
|
authorizer: authorizerValue,
|
|
31273
31454
|
};
|
|
31274
31455
|
}
|
|
31275
|
-
const FACTORY_META$
|
|
31456
|
+
const FACTORY_META$Q = {
|
|
31276
31457
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
31277
31458
|
key: 'WebSocketListener',
|
|
31278
31459
|
};
|
|
@@ -31316,7 +31497,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
|
|
|
31316
31497
|
|
|
31317
31498
|
var websocketListenerFactory = /*#__PURE__*/Object.freeze({
|
|
31318
31499
|
__proto__: null,
|
|
31319
|
-
FACTORY_META: FACTORY_META$
|
|
31500
|
+
FACTORY_META: FACTORY_META$Q,
|
|
31320
31501
|
WebSocketListenerFactory: WebSocketListenerFactory,
|
|
31321
31502
|
default: WebSocketListenerFactory
|
|
31322
31503
|
});
|
|
@@ -31484,7 +31665,7 @@ function withOption(source, keys) {
|
|
|
31484
31665
|
[camelKey]: value,
|
|
31485
31666
|
};
|
|
31486
31667
|
}
|
|
31487
|
-
const FACTORY_META$
|
|
31668
|
+
const FACTORY_META$P = {
|
|
31488
31669
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
31489
31670
|
key: 'AtLeastOnceDeliveryPolicy',
|
|
31490
31671
|
};
|
|
@@ -31492,7 +31673,7 @@ const FACTORY_META$O = {
|
|
|
31492
31673
|
var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
31493
31674
|
__proto__: null,
|
|
31494
31675
|
AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
|
|
31495
|
-
FACTORY_META: FACTORY_META$
|
|
31676
|
+
FACTORY_META: FACTORY_META$P,
|
|
31496
31677
|
default: AtLeastOnceDeliveryPolicyFactory
|
|
31497
31678
|
});
|
|
31498
31679
|
|
|
@@ -31519,7 +31700,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
|
|
|
31519
31700
|
}
|
|
31520
31701
|
registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
31521
31702
|
registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
31522
|
-
const FACTORY_META$
|
|
31703
|
+
const FACTORY_META$O = {
|
|
31523
31704
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
31524
31705
|
key: 'AtMostOnceDeliveryPolicy',
|
|
31525
31706
|
};
|
|
@@ -31527,7 +31708,7 @@ const FACTORY_META$N = {
|
|
|
31527
31708
|
var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
31528
31709
|
__proto__: null,
|
|
31529
31710
|
AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
|
|
31530
|
-
FACTORY_META: FACTORY_META$
|
|
31711
|
+
FACTORY_META: FACTORY_META$O,
|
|
31531
31712
|
default: AtMostOnceDeliveryPolicyFactory
|
|
31532
31713
|
});
|
|
31533
31714
|
|
|
@@ -31620,7 +31801,7 @@ function resolveProfileConfig$1(profileName) {
|
|
|
31620
31801
|
function deepClone$1(value) {
|
|
31621
31802
|
return JSON.parse(JSON.stringify(value));
|
|
31622
31803
|
}
|
|
31623
|
-
const FACTORY_META$
|
|
31804
|
+
const FACTORY_META$N = {
|
|
31624
31805
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
31625
31806
|
key: 'DeliveryProfile',
|
|
31626
31807
|
};
|
|
@@ -31628,7 +31809,7 @@ const FACTORY_META$M = {
|
|
|
31628
31809
|
var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
|
|
31629
31810
|
__proto__: null,
|
|
31630
31811
|
DeliveryProfileFactory: DeliveryProfileFactory,
|
|
31631
|
-
FACTORY_META: FACTORY_META$
|
|
31812
|
+
FACTORY_META: FACTORY_META$N,
|
|
31632
31813
|
PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
|
|
31633
31814
|
PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
|
|
31634
31815
|
default: DeliveryProfileFactory
|
|
@@ -31818,7 +31999,7 @@ function normalizeServiceName(value) {
|
|
|
31818
31999
|
|
|
31819
32000
|
// import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
|
|
31820
32001
|
const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
|
|
31821
|
-
const FACTORY_META$
|
|
32002
|
+
const FACTORY_META$M = {
|
|
31822
32003
|
base: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
31823
32004
|
key: 'InProcessFameFabric',
|
|
31824
32005
|
};
|
|
@@ -31838,7 +32019,7 @@ class InProcessFameFabricFactory extends FameFabricFactory {
|
|
|
31838
32019
|
|
|
31839
32020
|
var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
|
|
31840
32021
|
__proto__: null,
|
|
31841
|
-
FACTORY_META: FACTORY_META$
|
|
32022
|
+
FACTORY_META: FACTORY_META$M,
|
|
31842
32023
|
FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
31843
32024
|
InProcessFameFabricFactory: InProcessFameFabricFactory,
|
|
31844
32025
|
default: InProcessFameFabricFactory
|
|
@@ -32067,7 +32248,7 @@ const PROFILE_MAP$1 = {
|
|
|
32067
32248
|
[PROFILE_NAME_NOOP]: NOOP_PROFILE,
|
|
32068
32249
|
[PROFILE_NAME_NONE]: NOOP_PROFILE,
|
|
32069
32250
|
};
|
|
32070
|
-
const FACTORY_META$
|
|
32251
|
+
const FACTORY_META$L = {
|
|
32071
32252
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32072
32253
|
key: 'AdmissionProfile',
|
|
32073
32254
|
};
|
|
@@ -32114,7 +32295,7 @@ function deepClone(value) {
|
|
|
32114
32295
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
32115
32296
|
__proto__: null,
|
|
32116
32297
|
AdmissionProfileFactory: AdmissionProfileFactory,
|
|
32117
|
-
FACTORY_META: FACTORY_META$
|
|
32298
|
+
FACTORY_META: FACTORY_META$L,
|
|
32118
32299
|
default: AdmissionProfileFactory
|
|
32119
32300
|
});
|
|
32120
32301
|
|
|
@@ -32196,7 +32377,7 @@ function cloneGrant(grant) {
|
|
|
32196
32377
|
return JSON.parse(JSON.stringify(grant));
|
|
32197
32378
|
}
|
|
32198
32379
|
|
|
32199
|
-
const FACTORY_META$
|
|
32380
|
+
const FACTORY_META$K = {
|
|
32200
32381
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32201
32382
|
key: 'DirectAdmissionClient',
|
|
32202
32383
|
};
|
|
@@ -32248,11 +32429,11 @@ function normalizeConfig$l(config) {
|
|
|
32248
32429
|
var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
32249
32430
|
__proto__: null,
|
|
32250
32431
|
DirectAdmissionClientFactory: DirectAdmissionClientFactory,
|
|
32251
|
-
FACTORY_META: FACTORY_META$
|
|
32432
|
+
FACTORY_META: FACTORY_META$K,
|
|
32252
32433
|
default: DirectAdmissionClientFactory
|
|
32253
32434
|
});
|
|
32254
32435
|
|
|
32255
|
-
const FACTORY_META$
|
|
32436
|
+
const FACTORY_META$J = {
|
|
32256
32437
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32257
32438
|
key: 'NoopAdmissionClient',
|
|
32258
32439
|
};
|
|
@@ -32301,7 +32482,7 @@ function normalizeConfig$k(config, factoryArgs) {
|
|
|
32301
32482
|
|
|
32302
32483
|
var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
32303
32484
|
__proto__: null,
|
|
32304
|
-
FACTORY_META: FACTORY_META$
|
|
32485
|
+
FACTORY_META: FACTORY_META$J,
|
|
32305
32486
|
NoopAdmissionClientFactory: NoopAdmissionClientFactory,
|
|
32306
32487
|
default: NoopAdmissionClientFactory
|
|
32307
32488
|
});
|
|
@@ -32316,7 +32497,7 @@ class NoAuthInjectionStrategy {
|
|
|
32316
32497
|
}
|
|
32317
32498
|
}
|
|
32318
32499
|
|
|
32319
|
-
const FACTORY_META$
|
|
32500
|
+
const FACTORY_META$I = {
|
|
32320
32501
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
32321
32502
|
key: 'NoAuth',
|
|
32322
32503
|
};
|
|
@@ -32345,7 +32526,7 @@ function normalizeConfig$j(config) {
|
|
|
32345
32526
|
|
|
32346
32527
|
var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32347
32528
|
__proto__: null,
|
|
32348
|
-
FACTORY_META: FACTORY_META$
|
|
32529
|
+
FACTORY_META: FACTORY_META$I,
|
|
32349
32530
|
NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
|
|
32350
32531
|
default: NoAuthInjectionStrategyFactory
|
|
32351
32532
|
});
|
|
@@ -32494,7 +32675,7 @@ function convertKeysToCamelCase(value) {
|
|
|
32494
32675
|
return result;
|
|
32495
32676
|
}
|
|
32496
32677
|
|
|
32497
|
-
const FACTORY_META$
|
|
32678
|
+
const FACTORY_META$H = {
|
|
32498
32679
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
32499
32680
|
key: 'WelcomeServiceClient',
|
|
32500
32681
|
};
|
|
@@ -32564,7 +32745,7 @@ async function createAuthStrategy(config) {
|
|
|
32564
32745
|
|
|
32565
32746
|
var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
|
|
32566
32747
|
__proto__: null,
|
|
32567
|
-
FACTORY_META: FACTORY_META$
|
|
32748
|
+
FACTORY_META: FACTORY_META$H,
|
|
32568
32749
|
WelcomeServiceClientFactory: WelcomeServiceClientFactory,
|
|
32569
32750
|
default: WelcomeServiceClientFactory
|
|
32570
32751
|
});
|
|
@@ -32682,7 +32863,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
|
|
|
32682
32863
|
});
|
|
32683
32864
|
}
|
|
32684
32865
|
}
|
|
32685
|
-
const FACTORY_META$
|
|
32866
|
+
const FACTORY_META$G = {
|
|
32686
32867
|
base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
|
|
32687
32868
|
key: 'StaticNodePlacementStrategy',
|
|
32688
32869
|
};
|
|
@@ -32692,7 +32873,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
|
|
|
32692
32873
|
|
|
32693
32874
|
var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32694
32875
|
__proto__: null,
|
|
32695
|
-
FACTORY_META: FACTORY_META$
|
|
32876
|
+
FACTORY_META: FACTORY_META$G,
|
|
32696
32877
|
StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
|
|
32697
32878
|
default: StaticNodePlacementStrategyFactory
|
|
32698
32879
|
});
|
|
@@ -32851,7 +33032,7 @@ function connectorTypeName(connector) {
|
|
|
32851
33032
|
return typeof connector;
|
|
32852
33033
|
}
|
|
32853
33034
|
|
|
32854
|
-
const FACTORY_META$
|
|
33035
|
+
const FACTORY_META$F = {
|
|
32855
33036
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
32856
33037
|
key: 'BearerTokenHeaderAuth',
|
|
32857
33038
|
};
|
|
@@ -32892,7 +33073,7 @@ function normalizeConfig$g(config) {
|
|
|
32892
33073
|
var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32893
33074
|
__proto__: null,
|
|
32894
33075
|
BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
|
|
32895
|
-
FACTORY_META: FACTORY_META$
|
|
33076
|
+
FACTORY_META: FACTORY_META$F,
|
|
32896
33077
|
default: BearerTokenHeaderAuthInjectionStrategyFactory
|
|
32897
33078
|
});
|
|
32898
33079
|
|
|
@@ -32919,7 +33100,7 @@ function normalizeConfig$f(config) {
|
|
|
32919
33100
|
function isTokenVerifier(candidate) {
|
|
32920
33101
|
return Boolean(candidate && typeof candidate.verify === 'function');
|
|
32921
33102
|
}
|
|
32922
|
-
const FACTORY_META$
|
|
33103
|
+
const FACTORY_META$E = {
|
|
32923
33104
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32924
33105
|
key: 'DefaultAuthorizer',
|
|
32925
33106
|
};
|
|
@@ -32949,7 +33130,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
|
|
|
32949
33130
|
var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32950
33131
|
__proto__: null,
|
|
32951
33132
|
DefaultAuthorizerFactory: DefaultAuthorizerFactory,
|
|
32952
|
-
FACTORY_META: FACTORY_META$
|
|
33133
|
+
FACTORY_META: FACTORY_META$E,
|
|
32953
33134
|
default: DefaultAuthorizerFactory
|
|
32954
33135
|
});
|
|
32955
33136
|
|
|
@@ -32960,7 +33141,7 @@ function getJwksJwtTokenVerifierModule() {
|
|
|
32960
33141
|
}
|
|
32961
33142
|
return jwksJwtTokenVerifierModulePromise;
|
|
32962
33143
|
}
|
|
32963
|
-
const FACTORY_META$
|
|
33144
|
+
const FACTORY_META$D = {
|
|
32964
33145
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
32965
33146
|
key: 'JWKSJWTTokenVerifier',
|
|
32966
33147
|
};
|
|
@@ -33022,12 +33203,12 @@ function normalizeConfig$e(config) {
|
|
|
33022
33203
|
|
|
33023
33204
|
var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
33024
33205
|
__proto__: null,
|
|
33025
|
-
FACTORY_META: FACTORY_META$
|
|
33206
|
+
FACTORY_META: FACTORY_META$D,
|
|
33026
33207
|
JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
|
|
33027
33208
|
default: JWKSTokenVerifierFactory
|
|
33028
33209
|
});
|
|
33029
33210
|
|
|
33030
|
-
const FACTORY_META$
|
|
33211
|
+
const FACTORY_META$C = {
|
|
33031
33212
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
33032
33213
|
key: 'JWTTokenIssuer',
|
|
33033
33214
|
};
|
|
@@ -33224,12 +33405,12 @@ function getProviderKeyId(provider) {
|
|
|
33224
33405
|
|
|
33225
33406
|
var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
33226
33407
|
__proto__: null,
|
|
33227
|
-
FACTORY_META: FACTORY_META$
|
|
33408
|
+
FACTORY_META: FACTORY_META$C,
|
|
33228
33409
|
JWTTokenIssuerFactory: JWTTokenIssuerFactory,
|
|
33229
33410
|
default: JWTTokenIssuerFactory
|
|
33230
33411
|
});
|
|
33231
33412
|
|
|
33232
|
-
const FACTORY_META$
|
|
33413
|
+
const FACTORY_META$B = {
|
|
33233
33414
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
33234
33415
|
key: 'JWTTokenVerifier',
|
|
33235
33416
|
};
|
|
@@ -33397,7 +33578,7 @@ function getProviderVerificationKey(provider) {
|
|
|
33397
33578
|
|
|
33398
33579
|
var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
33399
33580
|
__proto__: null,
|
|
33400
|
-
FACTORY_META: FACTORY_META$
|
|
33581
|
+
FACTORY_META: FACTORY_META$B,
|
|
33401
33582
|
JWTTokenVerifierFactory: JWTTokenVerifierFactory,
|
|
33402
33583
|
default: JWTTokenVerifierFactory
|
|
33403
33584
|
});
|
|
@@ -33413,7 +33594,7 @@ class NoneTokenProvider {
|
|
|
33413
33594
|
}
|
|
33414
33595
|
}
|
|
33415
33596
|
|
|
33416
|
-
const FACTORY_META$
|
|
33597
|
+
const FACTORY_META$A = {
|
|
33417
33598
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33418
33599
|
key: 'NoneTokenProvider',
|
|
33419
33600
|
};
|
|
@@ -33430,7 +33611,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
|
|
|
33430
33611
|
|
|
33431
33612
|
var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33432
33613
|
__proto__: null,
|
|
33433
|
-
FACTORY_META: FACTORY_META$
|
|
33614
|
+
FACTORY_META: FACTORY_META$A,
|
|
33434
33615
|
NoneTokenProviderFactory: NoneTokenProviderFactory,
|
|
33435
33616
|
default: NoneTokenProviderFactory
|
|
33436
33617
|
});
|
|
@@ -33482,7 +33663,7 @@ class NoopAuthorizer {
|
|
|
33482
33663
|
}
|
|
33483
33664
|
}
|
|
33484
33665
|
|
|
33485
|
-
const FACTORY_META$
|
|
33666
|
+
const FACTORY_META$z = {
|
|
33486
33667
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
33487
33668
|
key: 'NoopAuthorizer',
|
|
33488
33669
|
};
|
|
@@ -33498,7 +33679,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
|
|
|
33498
33679
|
|
|
33499
33680
|
var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
33500
33681
|
__proto__: null,
|
|
33501
|
-
FACTORY_META: FACTORY_META$
|
|
33682
|
+
FACTORY_META: FACTORY_META$z,
|
|
33502
33683
|
NoopAuthorizerFactory: NoopAuthorizerFactory,
|
|
33503
33684
|
default: NoopAuthorizerFactory
|
|
33504
33685
|
});
|
|
@@ -33512,7 +33693,7 @@ class NoopTokenIssuer {
|
|
|
33512
33693
|
}
|
|
33513
33694
|
}
|
|
33514
33695
|
|
|
33515
|
-
const FACTORY_META$
|
|
33696
|
+
const FACTORY_META$y = {
|
|
33516
33697
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
33517
33698
|
key: 'NoopTokenIssuer',
|
|
33518
33699
|
};
|
|
@@ -33528,7 +33709,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
|
|
|
33528
33709
|
|
|
33529
33710
|
var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
33530
33711
|
__proto__: null,
|
|
33531
|
-
FACTORY_META: FACTORY_META$
|
|
33712
|
+
FACTORY_META: FACTORY_META$y,
|
|
33532
33713
|
NoopTokenIssuerFactory: NoopTokenIssuerFactory,
|
|
33533
33714
|
default: NoopTokenIssuerFactory
|
|
33534
33715
|
});
|
|
@@ -33550,7 +33731,7 @@ class NoopTokenVerifier {
|
|
|
33550
33731
|
}
|
|
33551
33732
|
}
|
|
33552
33733
|
|
|
33553
|
-
const FACTORY_META$
|
|
33734
|
+
const FACTORY_META$x = {
|
|
33554
33735
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
33555
33736
|
key: 'NoopTokenVerifier',
|
|
33556
33737
|
};
|
|
@@ -33566,7 +33747,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
33566
33747
|
|
|
33567
33748
|
var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
33568
33749
|
__proto__: null,
|
|
33569
|
-
FACTORY_META: FACTORY_META$
|
|
33750
|
+
FACTORY_META: FACTORY_META$x,
|
|
33570
33751
|
NoopTokenVerifierFactory: NoopTokenVerifierFactory,
|
|
33571
33752
|
default: NoopTokenVerifierFactory
|
|
33572
33753
|
});
|
|
@@ -33579,7 +33760,7 @@ function getOAuth2AuthorizerModule() {
|
|
|
33579
33760
|
}
|
|
33580
33761
|
return oauth2AuthorizerModulePromise;
|
|
33581
33762
|
}
|
|
33582
|
-
const FACTORY_META$
|
|
33763
|
+
const FACTORY_META$w = {
|
|
33583
33764
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
33584
33765
|
key: 'OAuth2Authorizer',
|
|
33585
33766
|
};
|
|
@@ -33724,7 +33905,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
|
|
|
33724
33905
|
|
|
33725
33906
|
var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
33726
33907
|
__proto__: null,
|
|
33727
|
-
FACTORY_META: FACTORY_META$
|
|
33908
|
+
FACTORY_META: FACTORY_META$w,
|
|
33728
33909
|
OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
|
|
33729
33910
|
default: OAuth2AuthorizerFactory
|
|
33730
33911
|
});
|
|
@@ -33764,7 +33945,7 @@ function normalizeConfig$a(config) {
|
|
|
33764
33945
|
}
|
|
33765
33946
|
return normalized;
|
|
33766
33947
|
}
|
|
33767
|
-
const FACTORY_META$
|
|
33948
|
+
const FACTORY_META$v = {
|
|
33768
33949
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33769
33950
|
key: 'OAuth2ClientCredentialsTokenProvider',
|
|
33770
33951
|
};
|
|
@@ -33795,7 +33976,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
|
|
|
33795
33976
|
|
|
33796
33977
|
var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33797
33978
|
__proto__: null,
|
|
33798
|
-
FACTORY_META: FACTORY_META$
|
|
33979
|
+
FACTORY_META: FACTORY_META$v,
|
|
33799
33980
|
OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
|
|
33800
33981
|
default: OAuth2ClientCredentialsTokenProviderFactory
|
|
33801
33982
|
});
|
|
@@ -33877,7 +34058,7 @@ function normalizeConfig$9(config) {
|
|
|
33877
34058
|
}
|
|
33878
34059
|
return normalized;
|
|
33879
34060
|
}
|
|
33880
|
-
const FACTORY_META$
|
|
34061
|
+
const FACTORY_META$u = {
|
|
33881
34062
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33882
34063
|
key: 'OAuth2PkceTokenProvider',
|
|
33883
34064
|
};
|
|
@@ -33932,7 +34113,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
|
|
|
33932
34113
|
|
|
33933
34114
|
var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33934
34115
|
__proto__: null,
|
|
33935
|
-
FACTORY_META: FACTORY_META$
|
|
34116
|
+
FACTORY_META: FACTORY_META$u,
|
|
33936
34117
|
OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
|
|
33937
34118
|
default: OAuth2PkceTokenProviderFactory
|
|
33938
34119
|
});
|
|
@@ -33982,7 +34163,7 @@ class QueryParamAuthInjectionStrategy {
|
|
|
33982
34163
|
}
|
|
33983
34164
|
}
|
|
33984
34165
|
|
|
33985
|
-
const FACTORY_META$
|
|
34166
|
+
const FACTORY_META$t = {
|
|
33986
34167
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
33987
34168
|
key: 'QueryParamAuth',
|
|
33988
34169
|
};
|
|
@@ -34022,7 +34203,7 @@ function normalizeConfig$8(config) {
|
|
|
34022
34203
|
|
|
34023
34204
|
var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
34024
34205
|
__proto__: null,
|
|
34025
|
-
FACTORY_META: FACTORY_META$
|
|
34206
|
+
FACTORY_META: FACTORY_META$t,
|
|
34026
34207
|
QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
|
|
34027
34208
|
default: QueryParamAuthInjectionStrategyFactory
|
|
34028
34209
|
});
|
|
@@ -34058,7 +34239,7 @@ function normalizeConfig$7(config) {
|
|
|
34058
34239
|
secretConfig: normalizeSecretSource(secretSource),
|
|
34059
34240
|
};
|
|
34060
34241
|
}
|
|
34061
|
-
const FACTORY_META$
|
|
34242
|
+
const FACTORY_META$s = {
|
|
34062
34243
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
34063
34244
|
key: 'SharedSecretAuthorizer',
|
|
34064
34245
|
};
|
|
@@ -34077,7 +34258,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
|
|
|
34077
34258
|
|
|
34078
34259
|
var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
34079
34260
|
__proto__: null,
|
|
34080
|
-
FACTORY_META: FACTORY_META$
|
|
34261
|
+
FACTORY_META: FACTORY_META$s,
|
|
34081
34262
|
SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
|
|
34082
34263
|
default: SharedSecretAuthorizerFactory
|
|
34083
34264
|
});
|
|
@@ -34113,7 +34294,7 @@ function normalizeConfig$6(config) {
|
|
|
34113
34294
|
secretConfig: normalizeSecretSource(secretSource),
|
|
34114
34295
|
};
|
|
34115
34296
|
}
|
|
34116
|
-
const FACTORY_META$
|
|
34297
|
+
const FACTORY_META$r = {
|
|
34117
34298
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
34118
34299
|
key: 'SharedSecretTokenProvider',
|
|
34119
34300
|
};
|
|
@@ -34132,7 +34313,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
|
|
|
34132
34313
|
|
|
34133
34314
|
var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34134
34315
|
__proto__: null,
|
|
34135
|
-
FACTORY_META: FACTORY_META$
|
|
34316
|
+
FACTORY_META: FACTORY_META$r,
|
|
34136
34317
|
SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
|
|
34137
34318
|
default: SharedSecretTokenProviderFactory
|
|
34138
34319
|
});
|
|
@@ -34176,7 +34357,7 @@ function normalizeConfig$5(config) {
|
|
|
34176
34357
|
}
|
|
34177
34358
|
return normalized;
|
|
34178
34359
|
}
|
|
34179
|
-
const FACTORY_META$
|
|
34360
|
+
const FACTORY_META$q = {
|
|
34180
34361
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
34181
34362
|
key: 'SharedSecretTokenVerifier',
|
|
34182
34363
|
};
|
|
@@ -34201,7 +34382,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
34201
34382
|
|
|
34202
34383
|
var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
34203
34384
|
__proto__: null,
|
|
34204
|
-
FACTORY_META: FACTORY_META$
|
|
34385
|
+
FACTORY_META: FACTORY_META$q,
|
|
34205
34386
|
SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
|
|
34206
34387
|
default: SharedSecretTokenVerifierFactory
|
|
34207
34388
|
});
|
|
@@ -34316,7 +34497,7 @@ function normalizeConfig$4(config) {
|
|
|
34316
34497
|
}
|
|
34317
34498
|
return options;
|
|
34318
34499
|
}
|
|
34319
|
-
const FACTORY_META$
|
|
34500
|
+
const FACTORY_META$p = {
|
|
34320
34501
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
34321
34502
|
key: 'StaticTokenProvider',
|
|
34322
34503
|
};
|
|
@@ -34333,7 +34514,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
|
|
|
34333
34514
|
|
|
34334
34515
|
var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34335
34516
|
__proto__: null,
|
|
34336
|
-
FACTORY_META: FACTORY_META$
|
|
34517
|
+
FACTORY_META: FACTORY_META$p,
|
|
34337
34518
|
StaticTokenProviderFactory: StaticTokenProviderFactory,
|
|
34338
34519
|
default: StaticTokenProviderFactory
|
|
34339
34520
|
});
|
|
@@ -34384,7 +34565,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
|
|
|
34384
34565
|
}
|
|
34385
34566
|
}
|
|
34386
34567
|
|
|
34387
|
-
const FACTORY_META$
|
|
34568
|
+
const FACTORY_META$o = {
|
|
34388
34569
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
34389
34570
|
key: 'WebSocketSubprotocolAuth',
|
|
34390
34571
|
};
|
|
@@ -34426,7 +34607,7 @@ function normalizeConfig$3(config) {
|
|
|
34426
34607
|
|
|
34427
34608
|
var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
34428
34609
|
__proto__: null,
|
|
34429
|
-
FACTORY_META: FACTORY_META$
|
|
34610
|
+
FACTORY_META: FACTORY_META$o,
|
|
34430
34611
|
WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
|
|
34431
34612
|
default: WebSocketSubprotocolAuthInjectionStrategyFactory
|
|
34432
34613
|
});
|
|
@@ -34474,7 +34655,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
34474
34655
|
throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
|
|
34475
34656
|
}
|
|
34476
34657
|
}
|
|
34477
|
-
const FACTORY_META$
|
|
34658
|
+
const FACTORY_META$n = {
|
|
34478
34659
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
34479
34660
|
key: 'DevFixedKeyCredentialProvider',
|
|
34480
34661
|
};
|
|
@@ -34482,7 +34663,7 @@ const FACTORY_META$m = {
|
|
|
34482
34663
|
var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34483
34664
|
__proto__: null,
|
|
34484
34665
|
DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
|
|
34485
|
-
FACTORY_META: FACTORY_META$
|
|
34666
|
+
FACTORY_META: FACTORY_META$n,
|
|
34486
34667
|
default: DevFixedKeyCredentialProviderFactory,
|
|
34487
34668
|
normalizeDevFixedConfig: normalizeDevFixedConfig
|
|
34488
34669
|
});
|
|
@@ -34498,14 +34679,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
34498
34679
|
return new NoneCredentialProvider();
|
|
34499
34680
|
}
|
|
34500
34681
|
}
|
|
34501
|
-
const FACTORY_META$
|
|
34682
|
+
const FACTORY_META$m = {
|
|
34502
34683
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
34503
34684
|
key: 'NoneCredentialProvider',
|
|
34504
34685
|
};
|
|
34505
34686
|
|
|
34506
34687
|
var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34507
34688
|
__proto__: null,
|
|
34508
|
-
FACTORY_META: FACTORY_META$
|
|
34689
|
+
FACTORY_META: FACTORY_META$m,
|
|
34509
34690
|
NoneCredentialProviderFactory: NoneCredentialProviderFactory,
|
|
34510
34691
|
default: NoneCredentialProviderFactory
|
|
34511
34692
|
});
|
|
@@ -34543,14 +34724,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
34543
34724
|
return new SessionKeyCredentialProvider(resolved.length);
|
|
34544
34725
|
}
|
|
34545
34726
|
}
|
|
34546
|
-
const FACTORY_META$
|
|
34727
|
+
const FACTORY_META$l = {
|
|
34547
34728
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
34548
34729
|
key: 'SessionKeyCredentialProvider',
|
|
34549
34730
|
};
|
|
34550
34731
|
|
|
34551
34732
|
var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34552
34733
|
__proto__: null,
|
|
34553
|
-
FACTORY_META: FACTORY_META$
|
|
34734
|
+
FACTORY_META: FACTORY_META$l,
|
|
34554
34735
|
SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
|
|
34555
34736
|
default: SessionKeyCredentialProviderFactory,
|
|
34556
34737
|
normalizeSessionKeyConfig: normalizeSessionKeyConfig
|
|
@@ -34588,9 +34769,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
|
|
|
34588
34769
|
ensureAlias('keyValidator', 'key_validator');
|
|
34589
34770
|
ensureAlias('eventListeners', 'event_listeners');
|
|
34590
34771
|
ensureAlias('cryptoProvider', 'crypto_provider');
|
|
34772
|
+
ensureAlias('trustStoreProvider', 'trust_store_provider');
|
|
34591
34773
|
return normalized;
|
|
34592
34774
|
}
|
|
34593
|
-
const FACTORY_META$
|
|
34775
|
+
const FACTORY_META$k = {
|
|
34594
34776
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
34595
34777
|
key: 'DefaultSecurityManager',
|
|
34596
34778
|
};
|
|
@@ -34636,6 +34818,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34636
34818
|
const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
|
|
34637
34819
|
const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
|
|
34638
34820
|
const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
|
|
34821
|
+
const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
|
|
34639
34822
|
const listenersSource = overrides?.eventListeners ??
|
|
34640
34823
|
config.eventListeners ??
|
|
34641
34824
|
config.event_listeners;
|
|
@@ -34655,10 +34838,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34655
34838
|
secureChannelManager,
|
|
34656
34839
|
eventListeners,
|
|
34657
34840
|
cryptoProvider: cryptoProvider ?? null,
|
|
34841
|
+
trustStoreProvider: trustStoreProvider ?? null,
|
|
34658
34842
|
};
|
|
34659
34843
|
}
|
|
34660
34844
|
static async buildSecurityManager(options) {
|
|
34661
|
-
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
|
|
34845
|
+
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
|
|
34662
34846
|
if (!keyStore) {
|
|
34663
34847
|
keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
|
|
34664
34848
|
}
|
|
@@ -34671,6 +34855,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34671
34855
|
if (!policy) {
|
|
34672
34856
|
throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
|
|
34673
34857
|
}
|
|
34858
|
+
if (!trustStoreProvider) {
|
|
34859
|
+
trustStoreProvider =
|
|
34860
|
+
await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
34861
|
+
}
|
|
34674
34862
|
if (!keyManager) {
|
|
34675
34863
|
keyManager =
|
|
34676
34864
|
await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
|
|
@@ -34681,7 +34869,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34681
34869
|
}
|
|
34682
34870
|
if (!envelopeVerifier) {
|
|
34683
34871
|
envelopeVerifier =
|
|
34684
|
-
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
|
|
34872
|
+
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
|
|
34685
34873
|
}
|
|
34686
34874
|
if (!encryptionManager || !secureChannelManager) {
|
|
34687
34875
|
const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
|
|
@@ -34781,7 +34969,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34781
34969
|
throw error instanceof Error ? error : new Error(String(error));
|
|
34782
34970
|
}
|
|
34783
34971
|
}
|
|
34784
|
-
static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
|
|
34972
|
+
static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
|
|
34785
34973
|
const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
|
|
34786
34974
|
if (verifierConfig &&
|
|
34787
34975
|
DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
|
|
@@ -34805,7 +34993,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
34805
34993
|
}
|
|
34806
34994
|
const signing = policy.signing ?? null;
|
|
34807
34995
|
return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
|
|
34808
|
-
factoryArgs: [keyManager, signing ?? null],
|
|
34996
|
+
factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
|
|
34809
34997
|
});
|
|
34810
34998
|
}
|
|
34811
34999
|
catch (error) {
|
|
@@ -35046,11 +35234,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
35046
35234
|
var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35047
35235
|
__proto__: null,
|
|
35048
35236
|
DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
|
|
35049
|
-
FACTORY_META: FACTORY_META$
|
|
35237
|
+
FACTORY_META: FACTORY_META$k,
|
|
35050
35238
|
default: DefaultSecurityManagerFactory
|
|
35051
35239
|
});
|
|
35052
35240
|
|
|
35053
|
-
const FACTORY_META$
|
|
35241
|
+
const FACTORY_META$j = {
|
|
35054
35242
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
35055
35243
|
key: 'NoopEncryptionManager',
|
|
35056
35244
|
};
|
|
@@ -35107,7 +35295,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
|
|
|
35107
35295
|
|
|
35108
35296
|
var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35109
35297
|
__proto__: null,
|
|
35110
|
-
FACTORY_META: FACTORY_META$
|
|
35298
|
+
FACTORY_META: FACTORY_META$j,
|
|
35111
35299
|
NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
|
|
35112
35300
|
default: NoopEncryptionManagerFactory
|
|
35113
35301
|
});
|
|
@@ -35179,7 +35367,7 @@ class NoopSecureChannelManager {
|
|
|
35179
35367
|
}
|
|
35180
35368
|
}
|
|
35181
35369
|
|
|
35182
|
-
const FACTORY_META$
|
|
35370
|
+
const FACTORY_META$i = {
|
|
35183
35371
|
base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
|
|
35184
35372
|
key: 'NoopSecureChannelManager',
|
|
35185
35373
|
};
|
|
@@ -35196,12 +35384,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
|
|
|
35196
35384
|
|
|
35197
35385
|
var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35198
35386
|
__proto__: null,
|
|
35199
|
-
FACTORY_META: FACTORY_META$
|
|
35387
|
+
FACTORY_META: FACTORY_META$i,
|
|
35200
35388
|
NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
|
|
35201
35389
|
default: NoopSecureChannelManagerFactory
|
|
35202
35390
|
});
|
|
35203
35391
|
|
|
35204
|
-
const FACTORY_META$
|
|
35392
|
+
const FACTORY_META$h = {
|
|
35205
35393
|
base: KEY_MANAGER_FACTORY_BASE_TYPE,
|
|
35206
35394
|
key: 'DefaultKeyManager',
|
|
35207
35395
|
};
|
|
@@ -35229,7 +35417,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
|
|
|
35229
35417
|
var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
|
|
35230
35418
|
__proto__: null,
|
|
35231
35419
|
DefaultKeyManagerFactory: DefaultKeyManagerFactory,
|
|
35232
|
-
FACTORY_META: FACTORY_META$
|
|
35420
|
+
FACTORY_META: FACTORY_META$h,
|
|
35233
35421
|
default: DefaultKeyManagerFactory
|
|
35234
35422
|
});
|
|
35235
35423
|
|
|
@@ -35414,7 +35602,7 @@ class InMemoryKeyStore extends KeyStore {
|
|
|
35414
35602
|
}
|
|
35415
35603
|
registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
|
|
35416
35604
|
|
|
35417
|
-
const FACTORY_META$
|
|
35605
|
+
const FACTORY_META$g = {
|
|
35418
35606
|
base: KEY_STORE_FACTORY_BASE_TYPE,
|
|
35419
35607
|
key: 'InMemoryKeyStore',
|
|
35420
35608
|
};
|
|
@@ -35449,12 +35637,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
|
|
|
35449
35637
|
|
|
35450
35638
|
var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
|
|
35451
35639
|
__proto__: null,
|
|
35452
|
-
FACTORY_META: FACTORY_META$
|
|
35640
|
+
FACTORY_META: FACTORY_META$g,
|
|
35453
35641
|
InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
|
|
35454
35642
|
default: InMemoryKeyStoreFactory
|
|
35455
35643
|
});
|
|
35456
35644
|
|
|
35457
|
-
const FACTORY_META$
|
|
35645
|
+
const FACTORY_META$f = {
|
|
35458
35646
|
base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
|
|
35459
35647
|
key: 'NoopKeyValidator',
|
|
35460
35648
|
};
|
|
@@ -35472,12 +35660,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
|
|
|
35472
35660
|
|
|
35473
35661
|
var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
|
|
35474
35662
|
__proto__: null,
|
|
35475
|
-
FACTORY_META: FACTORY_META$
|
|
35663
|
+
FACTORY_META: FACTORY_META$f,
|
|
35476
35664
|
NoopKeyValidatorFactory: NoopKeyValidatorFactory,
|
|
35477
35665
|
default: NoopKeyValidatorFactory
|
|
35478
35666
|
});
|
|
35479
35667
|
|
|
35480
|
-
const FACTORY_META$
|
|
35668
|
+
const FACTORY_META$e = {
|
|
35481
35669
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
35482
35670
|
key: 'DefaultSecurityPolicy',
|
|
35483
35671
|
};
|
|
@@ -35538,11 +35726,11 @@ function normalizeConfig$2(config) {
|
|
|
35538
35726
|
var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35539
35727
|
__proto__: null,
|
|
35540
35728
|
DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
|
|
35541
|
-
FACTORY_META: FACTORY_META$
|
|
35729
|
+
FACTORY_META: FACTORY_META$e,
|
|
35542
35730
|
default: DefaultSecurityPolicyFactory
|
|
35543
35731
|
});
|
|
35544
35732
|
|
|
35545
|
-
const FACTORY_META$
|
|
35733
|
+
const FACTORY_META$d = {
|
|
35546
35734
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
35547
35735
|
key: 'NoSecurityPolicy',
|
|
35548
35736
|
};
|
|
@@ -35570,7 +35758,7 @@ function normalizeConfig$1(config) {
|
|
|
35570
35758
|
|
|
35571
35759
|
var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35572
35760
|
__proto__: null,
|
|
35573
|
-
FACTORY_META: FACTORY_META$
|
|
35761
|
+
FACTORY_META: FACTORY_META$d,
|
|
35574
35762
|
NoSecurityPolicyFactory: NoSecurityPolicyFactory,
|
|
35575
35763
|
default: NoSecurityPolicyFactory
|
|
35576
35764
|
});
|
|
@@ -35585,7 +35773,7 @@ async function getEdDSAEnvelopeSignerModule() {
|
|
|
35585
35773
|
}
|
|
35586
35774
|
return eddsaEnvelopeSignerModulePromise;
|
|
35587
35775
|
}
|
|
35588
|
-
const FACTORY_META$
|
|
35776
|
+
const FACTORY_META$c = {
|
|
35589
35777
|
base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
|
|
35590
35778
|
key: 'EdDSAEnvelopeSigner',
|
|
35591
35779
|
};
|
|
@@ -35614,7 +35802,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
|
|
|
35614
35802
|
var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
|
|
35615
35803
|
__proto__: null,
|
|
35616
35804
|
EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
|
|
35617
|
-
FACTORY_META: FACTORY_META$
|
|
35805
|
+
FACTORY_META: FACTORY_META$c,
|
|
35618
35806
|
default: EdDSAEnvelopeSignerFactory
|
|
35619
35807
|
});
|
|
35620
35808
|
|
|
@@ -35628,7 +35816,7 @@ async function getEdDSAEnvelopeVerifierModule() {
|
|
|
35628
35816
|
}
|
|
35629
35817
|
return eddsaEnvelopeVerifierModulePromise;
|
|
35630
35818
|
}
|
|
35631
|
-
const FACTORY_META$
|
|
35819
|
+
const FACTORY_META$b = {
|
|
35632
35820
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
35633
35821
|
key: 'EdDSAEnvelopeVerifier',
|
|
35634
35822
|
};
|
|
@@ -35654,10 +35842,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
35654
35842
|
var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
35655
35843
|
__proto__: null,
|
|
35656
35844
|
EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
|
|
35657
|
-
FACTORY_META: FACTORY_META$
|
|
35845
|
+
FACTORY_META: FACTORY_META$b,
|
|
35658
35846
|
default: EdDSAEnvelopeVerifierFactory
|
|
35659
35847
|
});
|
|
35660
35848
|
|
|
35849
|
+
const FACTORY_META$a = {
|
|
35850
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
35851
|
+
key: "NoopTrustStoreProvider",
|
|
35852
|
+
isDefault: true,
|
|
35853
|
+
priority: 10,
|
|
35854
|
+
};
|
|
35855
|
+
class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
35856
|
+
constructor() {
|
|
35857
|
+
super(...arguments);
|
|
35858
|
+
this.type = "NoopTrustStoreProvider";
|
|
35859
|
+
this.isDefault = true;
|
|
35860
|
+
this.priority = 10;
|
|
35861
|
+
}
|
|
35862
|
+
async create(_config, ..._factoryArgs) {
|
|
35863
|
+
return new NoopTrustStoreProvider();
|
|
35864
|
+
}
|
|
35865
|
+
}
|
|
35866
|
+
|
|
35867
|
+
var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
35868
|
+
__proto__: null,
|
|
35869
|
+
FACTORY_META: FACTORY_META$a,
|
|
35870
|
+
NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
|
|
35871
|
+
default: NoopTrustStoreProviderFactory
|
|
35872
|
+
});
|
|
35873
|
+
|
|
35661
35874
|
const FACTORY_META$9 = {
|
|
35662
35875
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
35663
35876
|
key: 'CapabilityAwareRoutingPolicy',
|
|
@@ -39455,146 +39668,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
39455
39668
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
39456
39669
|
});
|
|
39457
39670
|
|
|
39458
|
-
if (!hashes.sha512) {
|
|
39459
|
-
hashes.sha512 = (message) => sha512(message);
|
|
39460
|
-
}
|
|
39461
|
-
function normalizeSignerOptions(options) {
|
|
39462
|
-
if (!options || typeof options !== 'object') {
|
|
39463
|
-
return {};
|
|
39464
|
-
}
|
|
39465
|
-
const candidate = options;
|
|
39466
|
-
const result = {
|
|
39467
|
-
...options,
|
|
39468
|
-
};
|
|
39469
|
-
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
39470
|
-
if (cryptoProvider !== undefined) {
|
|
39471
|
-
result.cryptoProvider = cryptoProvider ?? null;
|
|
39472
|
-
}
|
|
39473
|
-
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
39474
|
-
if (signingConfig !== undefined) {
|
|
39475
|
-
result.signingConfig = signingConfig;
|
|
39476
|
-
}
|
|
39477
|
-
const privateKeyPem = resolveAlias(candidate, [
|
|
39478
|
-
'privateKeyPem',
|
|
39479
|
-
'private_key_pem',
|
|
39480
|
-
]);
|
|
39481
|
-
if (privateKeyPem !== undefined) {
|
|
39482
|
-
result.privateKeyPem = privateKeyPem;
|
|
39483
|
-
}
|
|
39484
|
-
const keyId = resolveAlias(candidate, [
|
|
39485
|
-
'keyId',
|
|
39486
|
-
'key_id',
|
|
39487
|
-
]);
|
|
39488
|
-
if (keyId !== undefined) {
|
|
39489
|
-
result.keyId = keyId;
|
|
39490
|
-
}
|
|
39491
|
-
return result;
|
|
39492
|
-
}
|
|
39493
|
-
class EdDSAEnvelopeSigner {
|
|
39494
|
-
constructor(options = {}) {
|
|
39495
|
-
const normalized = normalizeSignerOptions(options);
|
|
39496
|
-
const provider = normalized.cryptoProvider ?? null;
|
|
39497
|
-
if (!provider) {
|
|
39498
|
-
throw new Error('No crypto provider is configured for signing');
|
|
39499
|
-
}
|
|
39500
|
-
this.crypto = provider;
|
|
39501
|
-
const signingConfigOption = normalized.signingConfig;
|
|
39502
|
-
if (signingConfigOption instanceof SigningConfig) {
|
|
39503
|
-
this.signingConfig = signingConfigOption;
|
|
39504
|
-
}
|
|
39505
|
-
else if (signingConfigOption) {
|
|
39506
|
-
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
39507
|
-
}
|
|
39508
|
-
else {
|
|
39509
|
-
this.signingConfig = new SigningConfig();
|
|
39510
|
-
}
|
|
39511
|
-
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
39512
|
-
this.explicitKeyId = normalized.keyId;
|
|
39513
|
-
}
|
|
39514
|
-
signEnvelope(envelope, { physicalPath }) {
|
|
39515
|
-
if (!envelope.sid) {
|
|
39516
|
-
throw new Error('Envelope missing sid');
|
|
39517
|
-
}
|
|
39518
|
-
const frame = envelope.frame;
|
|
39519
|
-
if (frame.type === 'Data') {
|
|
39520
|
-
const dataFrame = frame;
|
|
39521
|
-
if (!dataFrame.pd) {
|
|
39522
|
-
const payload = dataFrame.payload ?? '';
|
|
39523
|
-
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
39524
|
-
dataFrame.pd = secureDigest(payloadString);
|
|
39525
|
-
}
|
|
39526
|
-
}
|
|
39527
|
-
const digest = frameDigest(frame);
|
|
39528
|
-
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
39529
|
-
const sidDigest = secureDigest(physicalPath);
|
|
39530
|
-
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
39531
|
-
1 +
|
|
39532
|
-
encodeUtf8(immutable).length +
|
|
39533
|
-
1 +
|
|
39534
|
-
encodeUtf8(digest).length);
|
|
39535
|
-
const sidBytes = encodeUtf8(sidDigest);
|
|
39536
|
-
const immBytes = encodeUtf8(immutable);
|
|
39537
|
-
const digBytes = encodeUtf8(digest);
|
|
39538
|
-
let offset = 0;
|
|
39539
|
-
tbs.set(sidBytes, offset);
|
|
39540
|
-
offset += sidBytes.length;
|
|
39541
|
-
tbs[offset] = 0x1f;
|
|
39542
|
-
offset += 1;
|
|
39543
|
-
tbs.set(immBytes, offset);
|
|
39544
|
-
offset += immBytes.length;
|
|
39545
|
-
tbs[offset] = 0x1f;
|
|
39546
|
-
offset += 1;
|
|
39547
|
-
tbs.set(digBytes, offset);
|
|
39548
|
-
const privateKey = this.loadPrivateKey();
|
|
39549
|
-
const signatureBytes = sign(tbs, privateKey);
|
|
39550
|
-
const signature = urlsafeBase64Encode(signatureBytes);
|
|
39551
|
-
const kid = this.determineKeyId();
|
|
39552
|
-
const signatureHeader = {
|
|
39553
|
-
kid,
|
|
39554
|
-
val: signature,
|
|
39555
|
-
alg: 'EdDSA',
|
|
39556
|
-
};
|
|
39557
|
-
const secHeader = envelope.sec ?? {};
|
|
39558
|
-
secHeader.sig = signatureHeader;
|
|
39559
|
-
envelope.sec = secHeader;
|
|
39560
|
-
return envelope;
|
|
39561
|
-
}
|
|
39562
|
-
loadPrivateKey() {
|
|
39563
|
-
const pem = this.explicitPrivateKey ??
|
|
39564
|
-
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
39565
|
-
if (!pem) {
|
|
39566
|
-
throw new Error('Crypto provider does not expose a signing private key');
|
|
39567
|
-
}
|
|
39568
|
-
return parseEd25519PrivateKey(pem);
|
|
39569
|
-
}
|
|
39570
|
-
determineKeyId() {
|
|
39571
|
-
if (this.explicitKeyId) {
|
|
39572
|
-
return this.explicitKeyId;
|
|
39573
|
-
}
|
|
39574
|
-
if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
|
|
39575
|
-
const certificateProvider = this
|
|
39576
|
-
.crypto;
|
|
39577
|
-
const jwk = certificateProvider.nodeJwk?.();
|
|
39578
|
-
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
39579
|
-
const kid = jwk.kid;
|
|
39580
|
-
if (typeof kid === 'string' && kid.length > 0) {
|
|
39581
|
-
return kid;
|
|
39582
|
-
}
|
|
39583
|
-
}
|
|
39584
|
-
}
|
|
39585
|
-
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
39586
|
-
if (!fallback) {
|
|
39587
|
-
throw new Error('Crypto provider does not expose a signature key id');
|
|
39588
|
-
}
|
|
39589
|
-
return fallback;
|
|
39590
|
-
}
|
|
39591
|
-
}
|
|
39592
|
-
|
|
39593
|
-
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
39594
|
-
__proto__: null,
|
|
39595
|
-
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
39596
|
-
});
|
|
39597
|
-
|
|
39598
39671
|
async function loadPublicKey(jwk, signingConfig) {
|
|
39599
39672
|
if (jwk.x5c) {
|
|
39600
39673
|
if (signingConfig.signingMaterial !== SigningMaterial.X509_CHAIN) {
|
|
@@ -39832,4 +39905,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
|
|
|
39832
39905
|
WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
|
|
39833
39906
|
});
|
|
39834
39907
|
|
|
39835
|
-
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$
|
|
39908
|
+
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, FACTORY_META$Z as BROADCAST_CHANNEL_CONNECTOR_FACTORY_META, BROADCAST_CHANNEL_CONNECTOR_TYPE, FACTORY_META$X as BROADCAST_CHANNEL_LISTENER_FACTORY_META, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BroadcastChannelConnector, BroadcastChannelConnectorFactory, BroadcastChannelListener, BroadcastChannelListenerFactory, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$$ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$10 as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, FACTORY_META$_ as INPAGE_CONNECTOR_FACTORY_META, INPAGE_CONNECTOR_TYPE, FACTORY_META$Y as INPAGE_LISTENER_FACTORY_META, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageConnectorFactory, InPageListener, InPageListenerFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|