@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +355 -278
- package/dist/browser/index.mjs +346 -273
- package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/factory-manifest.js +2 -0
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/esm/naylence/fame/security/index.js +3 -0
- package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +351 -274
- package/dist/node/index.mjs +346 -273
- package/dist/node/node.cjs +350 -273
- package/dist/node/node.mjs +345 -272
- package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
- package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
- package/dist/types/naylence/fame/security/index.d.ts +4 -0
- package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
- package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/index.cjs
CHANGED
|
@@ -3,23 +3,23 @@
|
|
|
3
3
|
var core = require('@naylence/core');
|
|
4
4
|
var zod = require('zod');
|
|
5
5
|
var factory = require('@naylence/factory');
|
|
6
|
+
var ed25519 = require('@noble/ed25519');
|
|
7
|
+
var sha2_js = require('@noble/hashes/sha2.js');
|
|
6
8
|
var chacha_js = require('@noble/ciphers/chacha.js');
|
|
7
9
|
var ed25519_js = require('@noble/curves/ed25519.js');
|
|
8
10
|
var hkdf_js = require('@noble/hashes/hkdf.js');
|
|
9
|
-
var sha2_js = require('@noble/hashes/sha2.js');
|
|
10
11
|
var utils_js = require('@noble/hashes/utils.js');
|
|
11
12
|
var yaml = require('yaml');
|
|
12
13
|
var fastify = require('fastify');
|
|
13
14
|
var websocketPlugin = require('@fastify/websocket');
|
|
14
|
-
var ed25519 = require('@noble/ed25519');
|
|
15
15
|
|
|
16
16
|
// This file is auto-generated during build - do not edit manually
|
|
17
|
-
// Generated from package.json version: 0.3.5-test.
|
|
17
|
+
// Generated from package.json version: 0.3.5-test.924
|
|
18
18
|
/**
|
|
19
19
|
* The package version, injected at build time.
|
|
20
20
|
* @internal
|
|
21
21
|
*/
|
|
22
|
-
const VERSION = '0.3.5-test.
|
|
22
|
+
const VERSION = '0.3.5-test.924';
|
|
23
23
|
|
|
24
24
|
/**
|
|
25
25
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -3085,7 +3085,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3085
3085
|
return new EnvCredentialProvider(resolved.varName);
|
|
3086
3086
|
}
|
|
3087
3087
|
}
|
|
3088
|
-
const FACTORY_META$
|
|
3088
|
+
const FACTORY_META$18 = {
|
|
3089
3089
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3090
3090
|
key: 'EnvCredentialProvider',
|
|
3091
3091
|
};
|
|
@@ -3093,7 +3093,7 @@ const FACTORY_META$17 = {
|
|
|
3093
3093
|
var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3094
3094
|
__proto__: null,
|
|
3095
3095
|
EnvCredentialProviderFactory: EnvCredentialProviderFactory,
|
|
3096
|
-
FACTORY_META: FACTORY_META$
|
|
3096
|
+
FACTORY_META: FACTORY_META$18,
|
|
3097
3097
|
default: EnvCredentialProviderFactory,
|
|
3098
3098
|
normalizeEnvConfig: normalizeEnvConfig
|
|
3099
3099
|
});
|
|
@@ -3191,14 +3191,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3191
3191
|
return new PromptCredentialProvider(resolved.credentialName);
|
|
3192
3192
|
}
|
|
3193
3193
|
}
|
|
3194
|
-
const FACTORY_META$
|
|
3194
|
+
const FACTORY_META$17 = {
|
|
3195
3195
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3196
3196
|
key: 'PromptCredentialProvider',
|
|
3197
3197
|
};
|
|
3198
3198
|
|
|
3199
3199
|
var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3200
3200
|
__proto__: null,
|
|
3201
|
-
FACTORY_META: FACTORY_META$
|
|
3201
|
+
FACTORY_META: FACTORY_META$17,
|
|
3202
3202
|
PromptCredentialProviderFactory: PromptCredentialProviderFactory,
|
|
3203
3203
|
default: PromptCredentialProviderFactory,
|
|
3204
3204
|
normalizePromptConfig: normalizePromptConfig
|
|
@@ -3252,14 +3252,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3252
3252
|
return new SecretStoreCredentialProvider(resolved.secretName);
|
|
3253
3253
|
}
|
|
3254
3254
|
}
|
|
3255
|
-
const FACTORY_META$
|
|
3255
|
+
const FACTORY_META$16 = {
|
|
3256
3256
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3257
3257
|
key: 'SecretStoreCredentialProvider',
|
|
3258
3258
|
};
|
|
3259
3259
|
|
|
3260
3260
|
var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3261
3261
|
__proto__: null,
|
|
3262
|
-
FACTORY_META: FACTORY_META$
|
|
3262
|
+
FACTORY_META: FACTORY_META$16,
|
|
3263
3263
|
SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
|
|
3264
3264
|
default: SecretStoreCredentialProviderFactory,
|
|
3265
3265
|
normalizeSecretStoreConfig: normalizeSecretStoreConfig
|
|
@@ -3308,14 +3308,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3308
3308
|
return new StaticCredentialProvider(resolved.credentialValue);
|
|
3309
3309
|
}
|
|
3310
3310
|
}
|
|
3311
|
-
const FACTORY_META$
|
|
3311
|
+
const FACTORY_META$15 = {
|
|
3312
3312
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3313
3313
|
key: 'StaticCredentialProvider',
|
|
3314
3314
|
};
|
|
3315
3315
|
|
|
3316
3316
|
var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3317
3317
|
__proto__: null,
|
|
3318
|
-
FACTORY_META: FACTORY_META$
|
|
3318
|
+
FACTORY_META: FACTORY_META$15,
|
|
3319
3319
|
StaticCredentialProviderFactory: StaticCredentialProviderFactory,
|
|
3320
3320
|
default: StaticCredentialProviderFactory,
|
|
3321
3321
|
normalizeStaticConfig: normalizeStaticConfig
|
|
@@ -13421,6 +13421,7 @@ const MODULES = [
|
|
|
13421
13421
|
"./security/policy/no-security-policy-factory.js",
|
|
13422
13422
|
"./security/signing/eddsa-envelope-signer-factory.js",
|
|
13423
13423
|
"./security/signing/eddsa-envelope-verifier-factory.js",
|
|
13424
|
+
"./security/trust-store/noop-trust-store-provider-factory.js",
|
|
13424
13425
|
"./sentinel/capability-aware-routing-policy-factory.js",
|
|
13425
13426
|
"./sentinel/composite-routing-policy-factory.js",
|
|
13426
13427
|
"./sentinel/hybrid-path-routing-policy-factory.js",
|
|
@@ -13495,6 +13496,7 @@ const MODULE_LOADERS = {
|
|
|
13495
13496
|
"./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
|
|
13496
13497
|
"./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
|
|
13497
13498
|
"./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
|
|
13499
|
+
"./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
|
|
13498
13500
|
"./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
|
|
13499
13501
|
"./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
|
|
13500
13502
|
"./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
|
|
@@ -13799,7 +13801,7 @@ class NodeLikeFactory extends factory.AbstractResourceFactory {
|
|
|
13799
13801
|
// registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
|
|
13800
13802
|
// }
|
|
13801
13803
|
|
|
13802
|
-
const FACTORY_META$
|
|
13804
|
+
const FACTORY_META$14 = {
|
|
13803
13805
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
13804
13806
|
key: 'Node',
|
|
13805
13807
|
};
|
|
@@ -13840,7 +13842,7 @@ class NodeFactory extends NodeLikeFactory {
|
|
|
13840
13842
|
|
|
13841
13843
|
var nodeFactory = /*#__PURE__*/Object.freeze({
|
|
13842
13844
|
__proto__: null,
|
|
13843
|
-
FACTORY_META: FACTORY_META$
|
|
13845
|
+
FACTORY_META: FACTORY_META$14,
|
|
13844
13846
|
NodeFactory: NodeFactory,
|
|
13845
13847
|
default: NodeFactory
|
|
13846
13848
|
});
|
|
@@ -15281,7 +15283,7 @@ class RouteStoreFactory extends factory.AbstractResourceFactory {
|
|
|
15281
15283
|
return store ?? null;
|
|
15282
15284
|
}
|
|
15283
15285
|
}
|
|
15284
|
-
const FACTORY_META$
|
|
15286
|
+
const FACTORY_META$13 = {
|
|
15285
15287
|
base: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15286
15288
|
key: 'InMemoryRouteStore',
|
|
15287
15289
|
};
|
|
@@ -15299,7 +15301,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
|
|
|
15299
15301
|
|
|
15300
15302
|
var routeStoreFactory = /*#__PURE__*/Object.freeze({
|
|
15301
15303
|
__proto__: null,
|
|
15302
|
-
FACTORY_META: FACTORY_META$
|
|
15304
|
+
FACTORY_META: FACTORY_META$13,
|
|
15303
15305
|
InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
|
|
15304
15306
|
ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15305
15307
|
RouteStoreFactory: RouteStoreFactory,
|
|
@@ -19115,7 +19117,7 @@ function isPlainRecord(value) {
|
|
|
19115
19117
|
return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
|
|
19116
19118
|
}
|
|
19117
19119
|
|
|
19118
|
-
const FACTORY_META$
|
|
19120
|
+
const FACTORY_META$12 = {
|
|
19119
19121
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
19120
19122
|
key: 'Sentinel',
|
|
19121
19123
|
};
|
|
@@ -19299,7 +19301,7 @@ class SentinelFactory extends NodeLikeFactory {
|
|
|
19299
19301
|
|
|
19300
19302
|
var sentinelFactory = /*#__PURE__*/Object.freeze({
|
|
19301
19303
|
__proto__: null,
|
|
19302
|
-
FACTORY_META: FACTORY_META$
|
|
19304
|
+
FACTORY_META: FACTORY_META$12,
|
|
19303
19305
|
SentinelFactory: SentinelFactory,
|
|
19304
19306
|
default: SentinelFactory
|
|
19305
19307
|
});
|
|
@@ -20450,6 +20452,45 @@ class CertificateManagerFactory extends factory.AbstractResourceFactory {
|
|
|
20450
20452
|
}
|
|
20451
20453
|
}
|
|
20452
20454
|
|
|
20455
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
20456
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
20457
|
+
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
20458
|
+
createUnconfiguredProvider(reason) {
|
|
20459
|
+
return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
20460
|
+
}
|
|
20461
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
20462
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
20463
|
+
const mergedFactoryArgs = [
|
|
20464
|
+
...(dependencies ? [dependencies] : []),
|
|
20465
|
+
...(factoryArgs ?? []),
|
|
20466
|
+
];
|
|
20467
|
+
const creationOptions = {
|
|
20468
|
+
...restOptions,
|
|
20469
|
+
factoryArgs: mergedFactoryArgs,
|
|
20470
|
+
};
|
|
20471
|
+
if (config) {
|
|
20472
|
+
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
20473
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20474
|
+
}
|
|
20475
|
+
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
20476
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20477
|
+
}
|
|
20478
|
+
}
|
|
20479
|
+
class NoopTrustStoreProvider {
|
|
20480
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
20481
|
+
this.reason = reason;
|
|
20482
|
+
}
|
|
20483
|
+
async getTrustStorePem() {
|
|
20484
|
+
throw new Error(this.reason);
|
|
20485
|
+
}
|
|
20486
|
+
async getRoots() {
|
|
20487
|
+
return [];
|
|
20488
|
+
}
|
|
20489
|
+
async initialize() {
|
|
20490
|
+
// No-op for the placeholder provider.
|
|
20491
|
+
}
|
|
20492
|
+
}
|
|
20493
|
+
|
|
20453
20494
|
const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
|
|
20454
20495
|
class EncryptionManagerFactory extends factory.AbstractResourceFactory {
|
|
20455
20496
|
getPriority() {
|
|
@@ -25266,6 +25307,146 @@ function encodeUtf8(value) {
|
|
|
25266
25307
|
throw new Error('No UTF-8 encoder available in this environment');
|
|
25267
25308
|
}
|
|
25268
25309
|
|
|
25310
|
+
if (!ed25519.hashes.sha512) {
|
|
25311
|
+
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
25312
|
+
}
|
|
25313
|
+
function normalizeSignerOptions(options) {
|
|
25314
|
+
if (!options || typeof options !== 'object') {
|
|
25315
|
+
return {};
|
|
25316
|
+
}
|
|
25317
|
+
const candidate = options;
|
|
25318
|
+
const result = {
|
|
25319
|
+
...options,
|
|
25320
|
+
};
|
|
25321
|
+
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
25322
|
+
if (cryptoProvider !== undefined) {
|
|
25323
|
+
result.cryptoProvider = cryptoProvider ?? null;
|
|
25324
|
+
}
|
|
25325
|
+
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
25326
|
+
if (signingConfig !== undefined) {
|
|
25327
|
+
result.signingConfig = signingConfig;
|
|
25328
|
+
}
|
|
25329
|
+
const privateKeyPem = resolveAlias(candidate, [
|
|
25330
|
+
'privateKeyPem',
|
|
25331
|
+
'private_key_pem',
|
|
25332
|
+
]);
|
|
25333
|
+
if (privateKeyPem !== undefined) {
|
|
25334
|
+
result.privateKeyPem = privateKeyPem;
|
|
25335
|
+
}
|
|
25336
|
+
const keyId = resolveAlias(candidate, [
|
|
25337
|
+
'keyId',
|
|
25338
|
+
'key_id',
|
|
25339
|
+
]);
|
|
25340
|
+
if (keyId !== undefined) {
|
|
25341
|
+
result.keyId = keyId;
|
|
25342
|
+
}
|
|
25343
|
+
return result;
|
|
25344
|
+
}
|
|
25345
|
+
class EdDSAEnvelopeSigner {
|
|
25346
|
+
constructor(options = {}) {
|
|
25347
|
+
const normalized = normalizeSignerOptions(options);
|
|
25348
|
+
const provider = normalized.cryptoProvider ?? null;
|
|
25349
|
+
if (!provider) {
|
|
25350
|
+
throw new Error('No crypto provider is configured for signing');
|
|
25351
|
+
}
|
|
25352
|
+
this.crypto = provider;
|
|
25353
|
+
const signingConfigOption = normalized.signingConfig;
|
|
25354
|
+
if (signingConfigOption instanceof SigningConfig) {
|
|
25355
|
+
this.signingConfig = signingConfigOption;
|
|
25356
|
+
}
|
|
25357
|
+
else if (signingConfigOption) {
|
|
25358
|
+
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
25359
|
+
}
|
|
25360
|
+
else {
|
|
25361
|
+
this.signingConfig = new SigningConfig();
|
|
25362
|
+
}
|
|
25363
|
+
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
25364
|
+
this.explicitKeyId = normalized.keyId;
|
|
25365
|
+
}
|
|
25366
|
+
signEnvelope(envelope, { physicalPath }) {
|
|
25367
|
+
if (!envelope.sid) {
|
|
25368
|
+
throw new Error('Envelope missing sid');
|
|
25369
|
+
}
|
|
25370
|
+
const frame = envelope.frame;
|
|
25371
|
+
if (frame.type === 'Data') {
|
|
25372
|
+
const dataFrame = frame;
|
|
25373
|
+
if (!dataFrame.pd) {
|
|
25374
|
+
const payload = dataFrame.payload ?? '';
|
|
25375
|
+
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
25376
|
+
dataFrame.pd = secureDigest(payloadString);
|
|
25377
|
+
}
|
|
25378
|
+
}
|
|
25379
|
+
const digest = frameDigest(frame);
|
|
25380
|
+
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
25381
|
+
const sidDigest = secureDigest(physicalPath);
|
|
25382
|
+
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
25383
|
+
1 +
|
|
25384
|
+
encodeUtf8(immutable).length +
|
|
25385
|
+
1 +
|
|
25386
|
+
encodeUtf8(digest).length);
|
|
25387
|
+
const sidBytes = encodeUtf8(sidDigest);
|
|
25388
|
+
const immBytes = encodeUtf8(immutable);
|
|
25389
|
+
const digBytes = encodeUtf8(digest);
|
|
25390
|
+
let offset = 0;
|
|
25391
|
+
tbs.set(sidBytes, offset);
|
|
25392
|
+
offset += sidBytes.length;
|
|
25393
|
+
tbs[offset] = 0x1f;
|
|
25394
|
+
offset += 1;
|
|
25395
|
+
tbs.set(immBytes, offset);
|
|
25396
|
+
offset += immBytes.length;
|
|
25397
|
+
tbs[offset] = 0x1f;
|
|
25398
|
+
offset += 1;
|
|
25399
|
+
tbs.set(digBytes, offset);
|
|
25400
|
+
const privateKey = this.loadPrivateKey();
|
|
25401
|
+
const signatureBytes = ed25519.sign(tbs, privateKey);
|
|
25402
|
+
const signature = urlsafeBase64Encode(signatureBytes);
|
|
25403
|
+
const kid = this.determineKeyId();
|
|
25404
|
+
const signatureHeader = {
|
|
25405
|
+
kid,
|
|
25406
|
+
val: signature,
|
|
25407
|
+
alg: 'EdDSA',
|
|
25408
|
+
};
|
|
25409
|
+
const secHeader = envelope.sec ?? {};
|
|
25410
|
+
secHeader.sig = signatureHeader;
|
|
25411
|
+
envelope.sec = secHeader;
|
|
25412
|
+
return envelope;
|
|
25413
|
+
}
|
|
25414
|
+
loadPrivateKey() {
|
|
25415
|
+
const pem = this.explicitPrivateKey ??
|
|
25416
|
+
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
25417
|
+
if (!pem) {
|
|
25418
|
+
throw new Error('Crypto provider does not expose a signing private key');
|
|
25419
|
+
}
|
|
25420
|
+
return parseEd25519PrivateKey(pem);
|
|
25421
|
+
}
|
|
25422
|
+
determineKeyId() {
|
|
25423
|
+
if (this.explicitKeyId) {
|
|
25424
|
+
return this.explicitKeyId;
|
|
25425
|
+
}
|
|
25426
|
+
if (this.signingConfig.signingMaterial === core.SigningMaterial.X509_CHAIN) {
|
|
25427
|
+
const certificateProvider = this
|
|
25428
|
+
.crypto;
|
|
25429
|
+
const jwk = certificateProvider.nodeJwk?.();
|
|
25430
|
+
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
25431
|
+
const kid = jwk.kid;
|
|
25432
|
+
if (typeof kid === 'string' && kid.length > 0) {
|
|
25433
|
+
return kid;
|
|
25434
|
+
}
|
|
25435
|
+
}
|
|
25436
|
+
}
|
|
25437
|
+
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
25438
|
+
if (!fallback) {
|
|
25439
|
+
throw new Error('Crypto provider does not expose a signature key id');
|
|
25440
|
+
}
|
|
25441
|
+
return fallback;
|
|
25442
|
+
}
|
|
25443
|
+
}
|
|
25444
|
+
|
|
25445
|
+
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
25446
|
+
__proto__: null,
|
|
25447
|
+
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
25448
|
+
});
|
|
25449
|
+
|
|
25269
25450
|
const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
|
|
25270
25451
|
let joseModulePromise = null;
|
|
25271
25452
|
async function requireJose() {
|
|
@@ -26869,7 +27050,7 @@ const PROFILE_MAP$4 = {
|
|
|
26869
27050
|
[PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
|
|
26870
27051
|
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
26871
27052
|
};
|
|
26872
|
-
const FACTORY_META$
|
|
27053
|
+
const FACTORY_META$11 = {
|
|
26873
27054
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
26874
27055
|
key: 'SecurityProfile',
|
|
26875
27056
|
};
|
|
@@ -26995,7 +27176,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
|
26995
27176
|
ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
|
|
26996
27177
|
ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
|
|
26997
27178
|
ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
|
|
26998
|
-
FACTORY_META: FACTORY_META$
|
|
27179
|
+
FACTORY_META: FACTORY_META$11,
|
|
26999
27180
|
NodeSecurityProfileFactory: NodeSecurityProfileFactory,
|
|
27000
27181
|
PROFILE_NAME_GATED: PROFILE_NAME_GATED,
|
|
27001
27182
|
PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
|
|
@@ -27124,7 +27305,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
|
|
|
27124
27305
|
}
|
|
27125
27306
|
}
|
|
27126
27307
|
|
|
27127
|
-
const FACTORY_META
|
|
27308
|
+
const FACTORY_META$10 = {
|
|
27128
27309
|
base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
|
|
27129
27310
|
key: 'SimpleLoadBalancerStickinessManager',
|
|
27130
27311
|
};
|
|
@@ -27148,7 +27329,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
|
|
|
27148
27329
|
|
|
27149
27330
|
var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
27150
27331
|
__proto__: null,
|
|
27151
|
-
FACTORY_META: FACTORY_META
|
|
27332
|
+
FACTORY_META: FACTORY_META$10,
|
|
27152
27333
|
SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
|
|
27153
27334
|
default: SimpleLoadBalancerStickinessManagerFactory
|
|
27154
27335
|
});
|
|
@@ -27626,7 +27807,7 @@ class WelcomeServiceFactory extends factory.AbstractResourceFactory {
|
|
|
27626
27807
|
}
|
|
27627
27808
|
}
|
|
27628
27809
|
|
|
27629
|
-
const FACTORY_META
|
|
27810
|
+
const FACTORY_META$$ = {
|
|
27630
27811
|
base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
|
|
27631
27812
|
key: 'DefaultWelcomeService',
|
|
27632
27813
|
};
|
|
@@ -27707,7 +27888,7 @@ function resolveConfigEntry(source, keys) {
|
|
|
27707
27888
|
var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
|
|
27708
27889
|
__proto__: null,
|
|
27709
27890
|
DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
|
|
27710
|
-
FACTORY_META: FACTORY_META
|
|
27891
|
+
FACTORY_META: FACTORY_META$$,
|
|
27711
27892
|
default: DefaultWelcomeServiceFactory
|
|
27712
27893
|
});
|
|
27713
27894
|
|
|
@@ -28140,7 +28321,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
|
|
|
28140
28321
|
}
|
|
28141
28322
|
}
|
|
28142
28323
|
|
|
28143
|
-
const FACTORY_META$
|
|
28324
|
+
const FACTORY_META$_ = {
|
|
28144
28325
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
28145
28326
|
key: 'NoopTraceEmitter',
|
|
28146
28327
|
};
|
|
@@ -28158,7 +28339,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
|
|
|
28158
28339
|
|
|
28159
28340
|
var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
28160
28341
|
__proto__: null,
|
|
28161
|
-
FACTORY_META: FACTORY_META$
|
|
28342
|
+
FACTORY_META: FACTORY_META$_,
|
|
28162
28343
|
NoopTraceEmitterFactory: NoopTraceEmitterFactory,
|
|
28163
28344
|
default: NoopTraceEmitterFactory
|
|
28164
28345
|
});
|
|
@@ -28413,7 +28594,7 @@ function getOtelApiModule() {
|
|
|
28413
28594
|
}
|
|
28414
28595
|
return otelApiModulePromise;
|
|
28415
28596
|
}
|
|
28416
|
-
const FACTORY_META$
|
|
28597
|
+
const FACTORY_META$Z = {
|
|
28417
28598
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
28418
28599
|
key: 'OpenTelemetryTraceEmitter',
|
|
28419
28600
|
};
|
|
@@ -28583,7 +28764,7 @@ function extractHeaders(value) {
|
|
|
28583
28764
|
|
|
28584
28765
|
var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
28585
28766
|
__proto__: null,
|
|
28586
|
-
FACTORY_META: FACTORY_META$
|
|
28767
|
+
FACTORY_META: FACTORY_META$Z,
|
|
28587
28768
|
OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
|
|
28588
28769
|
default: OpenTelemetryTraceEmitterFactory
|
|
28589
28770
|
});
|
|
@@ -28604,7 +28785,7 @@ const PROFILE_MAP$3 = {
|
|
|
28604
28785
|
[PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
|
|
28605
28786
|
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
28606
28787
|
};
|
|
28607
|
-
const FACTORY_META$
|
|
28788
|
+
const FACTORY_META$Y = {
|
|
28608
28789
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
28609
28790
|
key: 'TraceEmitterProfile',
|
|
28610
28791
|
};
|
|
@@ -28684,7 +28865,7 @@ function deepClone$2(value) {
|
|
|
28684
28865
|
|
|
28685
28866
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
28686
28867
|
__proto__: null,
|
|
28687
|
-
FACTORY_META: FACTORY_META$
|
|
28868
|
+
FACTORY_META: FACTORY_META$Y,
|
|
28688
28869
|
PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
|
|
28689
28870
|
PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
|
|
28690
28871
|
TraceEmitterProfileFactory: TraceEmitterProfileFactory,
|
|
@@ -28699,7 +28880,7 @@ class BroadcastChannelConnectionGrantImpl {
|
|
|
28699
28880
|
this.purpose = 'connection';
|
|
28700
28881
|
}
|
|
28701
28882
|
}
|
|
28702
|
-
const FACTORY_META$
|
|
28883
|
+
const FACTORY_META$X = {
|
|
28703
28884
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
28704
28885
|
key: BROADCAST_CHANNEL_CONNECTOR_TYPE,
|
|
28705
28886
|
};
|
|
@@ -28847,7 +29028,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
|
|
|
28847
29028
|
var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
28848
29029
|
__proto__: null,
|
|
28849
29030
|
BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
|
|
28850
|
-
FACTORY_META: FACTORY_META$
|
|
29031
|
+
FACTORY_META: FACTORY_META$X,
|
|
28851
29032
|
default: BroadcastChannelConnectorFactory
|
|
28852
29033
|
});
|
|
28853
29034
|
|
|
@@ -28883,7 +29064,7 @@ function normalizeConfig$q(config) {
|
|
|
28883
29064
|
inboxCapacity,
|
|
28884
29065
|
};
|
|
28885
29066
|
}
|
|
28886
|
-
const FACTORY_META$
|
|
29067
|
+
const FACTORY_META$W = {
|
|
28887
29068
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
28888
29069
|
key: 'BroadcastChannelListener',
|
|
28889
29070
|
};
|
|
@@ -28909,7 +29090,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
|
|
|
28909
29090
|
var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
|
|
28910
29091
|
__proto__: null,
|
|
28911
29092
|
BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
|
|
28912
|
-
FACTORY_META: FACTORY_META$
|
|
29093
|
+
FACTORY_META: FACTORY_META$W,
|
|
28913
29094
|
default: BroadcastChannelListenerFactory
|
|
28914
29095
|
});
|
|
28915
29096
|
|
|
@@ -28974,7 +29155,7 @@ function normalizeConfig$p(config) {
|
|
|
28974
29155
|
authorizer: authorizerValue,
|
|
28975
29156
|
};
|
|
28976
29157
|
}
|
|
28977
|
-
const FACTORY_META$
|
|
29158
|
+
const FACTORY_META$V = {
|
|
28978
29159
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
28979
29160
|
key: 'HttpListener',
|
|
28980
29161
|
};
|
|
@@ -29021,7 +29202,7 @@ class HttpListenerFactory extends TransportListenerFactory {
|
|
|
29021
29202
|
|
|
29022
29203
|
var httpListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29023
29204
|
__proto__: null,
|
|
29024
|
-
FACTORY_META: FACTORY_META$
|
|
29205
|
+
FACTORY_META: FACTORY_META$V,
|
|
29025
29206
|
HttpListenerFactory: HttpListenerFactory,
|
|
29026
29207
|
default: HttpListenerFactory
|
|
29027
29208
|
});
|
|
@@ -29146,7 +29327,7 @@ class HttpConnectionGrantImpl {
|
|
|
29146
29327
|
this.purpose = 'connection';
|
|
29147
29328
|
}
|
|
29148
29329
|
}
|
|
29149
|
-
const FACTORY_META$
|
|
29330
|
+
const FACTORY_META$U = {
|
|
29150
29331
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29151
29332
|
key: HTTP_STATELESS_CONNECTOR_TYPE,
|
|
29152
29333
|
};
|
|
@@ -29315,7 +29496,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
|
|
|
29315
29496
|
|
|
29316
29497
|
var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29317
29498
|
__proto__: null,
|
|
29318
|
-
FACTORY_META: FACTORY_META$
|
|
29499
|
+
FACTORY_META: FACTORY_META$U,
|
|
29319
29500
|
HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
|
|
29320
29501
|
default: HttpStatelessConnectorFactory
|
|
29321
29502
|
});
|
|
@@ -29328,7 +29509,7 @@ class InPageConnectionGrantImpl {
|
|
|
29328
29509
|
this.purpose = 'connection';
|
|
29329
29510
|
}
|
|
29330
29511
|
}
|
|
29331
|
-
const FACTORY_META$
|
|
29512
|
+
const FACTORY_META$T = {
|
|
29332
29513
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29333
29514
|
key: INPAGE_CONNECTOR_TYPE,
|
|
29334
29515
|
};
|
|
@@ -29477,7 +29658,7 @@ class InPageConnectorFactory extends ConnectorFactory {
|
|
|
29477
29658
|
|
|
29478
29659
|
var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29479
29660
|
__proto__: null,
|
|
29480
|
-
FACTORY_META: FACTORY_META$
|
|
29661
|
+
FACTORY_META: FACTORY_META$T,
|
|
29481
29662
|
InPageConnectorFactory: InPageConnectorFactory,
|
|
29482
29663
|
default: InPageConnectorFactory
|
|
29483
29664
|
});
|
|
@@ -29514,7 +29695,7 @@ function normalizeConfig$o(config) {
|
|
|
29514
29695
|
inboxCapacity,
|
|
29515
29696
|
};
|
|
29516
29697
|
}
|
|
29517
|
-
const FACTORY_META$
|
|
29698
|
+
const FACTORY_META$S = {
|
|
29518
29699
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29519
29700
|
key: 'InPageListener',
|
|
29520
29701
|
};
|
|
@@ -29539,7 +29720,7 @@ class InPageListenerFactory extends TransportListenerFactory {
|
|
|
29539
29720
|
|
|
29540
29721
|
var inpageListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29541
29722
|
__proto__: null,
|
|
29542
|
-
FACTORY_META: FACTORY_META$
|
|
29723
|
+
FACTORY_META: FACTORY_META$S,
|
|
29543
29724
|
InPageListenerFactory: InPageListenerFactory,
|
|
29544
29725
|
default: InPageListenerFactory
|
|
29545
29726
|
});
|
|
@@ -29555,7 +29736,7 @@ class WebSocketConnectionGrantImpl {
|
|
|
29555
29736
|
this.purpose = 'connection';
|
|
29556
29737
|
}
|
|
29557
29738
|
}
|
|
29558
|
-
const FACTORY_META$
|
|
29739
|
+
const FACTORY_META$R = {
|
|
29559
29740
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29560
29741
|
key: 'WebSocketConnector',
|
|
29561
29742
|
};
|
|
@@ -29926,7 +30107,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
|
|
|
29926
30107
|
|
|
29927
30108
|
var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29928
30109
|
__proto__: null,
|
|
29929
|
-
FACTORY_META: FACTORY_META$
|
|
30110
|
+
FACTORY_META: FACTORY_META$R,
|
|
29930
30111
|
WebSocketConnectorFactory: WebSocketConnectorFactory,
|
|
29931
30112
|
default: WebSocketConnectorFactory,
|
|
29932
30113
|
setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
|
|
@@ -29996,7 +30177,7 @@ function normalizeConfig$n(config) {
|
|
|
29996
30177
|
authorizer: authorizerValue,
|
|
29997
30178
|
};
|
|
29998
30179
|
}
|
|
29999
|
-
const FACTORY_META$
|
|
30180
|
+
const FACTORY_META$Q = {
|
|
30000
30181
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
30001
30182
|
key: 'WebSocketListener',
|
|
30002
30183
|
};
|
|
@@ -30040,7 +30221,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
|
|
|
30040
30221
|
|
|
30041
30222
|
var websocketListenerFactory = /*#__PURE__*/Object.freeze({
|
|
30042
30223
|
__proto__: null,
|
|
30043
|
-
FACTORY_META: FACTORY_META$
|
|
30224
|
+
FACTORY_META: FACTORY_META$Q,
|
|
30044
30225
|
WebSocketListenerFactory: WebSocketListenerFactory,
|
|
30045
30226
|
default: WebSocketListenerFactory
|
|
30046
30227
|
});
|
|
@@ -30208,7 +30389,7 @@ function withOption(source, keys) {
|
|
|
30208
30389
|
[camelKey]: value,
|
|
30209
30390
|
};
|
|
30210
30391
|
}
|
|
30211
|
-
const FACTORY_META$
|
|
30392
|
+
const FACTORY_META$P = {
|
|
30212
30393
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
30213
30394
|
key: 'AtLeastOnceDeliveryPolicy',
|
|
30214
30395
|
};
|
|
@@ -30216,7 +30397,7 @@ const FACTORY_META$O = {
|
|
|
30216
30397
|
var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
30217
30398
|
__proto__: null,
|
|
30218
30399
|
AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
|
|
30219
|
-
FACTORY_META: FACTORY_META$
|
|
30400
|
+
FACTORY_META: FACTORY_META$P,
|
|
30220
30401
|
default: AtLeastOnceDeliveryPolicyFactory
|
|
30221
30402
|
});
|
|
30222
30403
|
|
|
@@ -30243,7 +30424,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
|
|
|
30243
30424
|
}
|
|
30244
30425
|
registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
30245
30426
|
registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
30246
|
-
const FACTORY_META$
|
|
30427
|
+
const FACTORY_META$O = {
|
|
30247
30428
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
30248
30429
|
key: 'AtMostOnceDeliveryPolicy',
|
|
30249
30430
|
};
|
|
@@ -30251,7 +30432,7 @@ const FACTORY_META$N = {
|
|
|
30251
30432
|
var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
30252
30433
|
__proto__: null,
|
|
30253
30434
|
AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
|
|
30254
|
-
FACTORY_META: FACTORY_META$
|
|
30435
|
+
FACTORY_META: FACTORY_META$O,
|
|
30255
30436
|
default: AtMostOnceDeliveryPolicyFactory
|
|
30256
30437
|
});
|
|
30257
30438
|
|
|
@@ -30344,7 +30525,7 @@ function resolveProfileConfig$1(profileName) {
|
|
|
30344
30525
|
function deepClone$1(value) {
|
|
30345
30526
|
return JSON.parse(JSON.stringify(value));
|
|
30346
30527
|
}
|
|
30347
|
-
const FACTORY_META$
|
|
30528
|
+
const FACTORY_META$N = {
|
|
30348
30529
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
30349
30530
|
key: 'DeliveryProfile',
|
|
30350
30531
|
};
|
|
@@ -30352,7 +30533,7 @@ const FACTORY_META$M = {
|
|
|
30352
30533
|
var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
|
|
30353
30534
|
__proto__: null,
|
|
30354
30535
|
DeliveryProfileFactory: DeliveryProfileFactory,
|
|
30355
|
-
FACTORY_META: FACTORY_META$
|
|
30536
|
+
FACTORY_META: FACTORY_META$N,
|
|
30356
30537
|
PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
|
|
30357
30538
|
PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
|
|
30358
30539
|
default: DeliveryProfileFactory
|
|
@@ -30542,7 +30723,7 @@ function normalizeServiceName(value) {
|
|
|
30542
30723
|
|
|
30543
30724
|
// import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
|
|
30544
30725
|
const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
|
|
30545
|
-
const FACTORY_META$
|
|
30726
|
+
const FACTORY_META$M = {
|
|
30546
30727
|
base: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
30547
30728
|
key: 'InProcessFameFabric',
|
|
30548
30729
|
};
|
|
@@ -30562,7 +30743,7 @@ class InProcessFameFabricFactory extends core.FameFabricFactory {
|
|
|
30562
30743
|
|
|
30563
30744
|
var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
|
|
30564
30745
|
__proto__: null,
|
|
30565
|
-
FACTORY_META: FACTORY_META$
|
|
30746
|
+
FACTORY_META: FACTORY_META$M,
|
|
30566
30747
|
FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
30567
30748
|
InProcessFameFabricFactory: InProcessFameFabricFactory,
|
|
30568
30749
|
default: InProcessFameFabricFactory
|
|
@@ -30791,7 +30972,7 @@ const PROFILE_MAP$1 = {
|
|
|
30791
30972
|
[PROFILE_NAME_NOOP]: NOOP_PROFILE,
|
|
30792
30973
|
[PROFILE_NAME_NONE]: NOOP_PROFILE,
|
|
30793
30974
|
};
|
|
30794
|
-
const FACTORY_META$
|
|
30975
|
+
const FACTORY_META$L = {
|
|
30795
30976
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
30796
30977
|
key: 'AdmissionProfile',
|
|
30797
30978
|
};
|
|
@@ -30838,7 +31019,7 @@ function deepClone(value) {
|
|
|
30838
31019
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
30839
31020
|
__proto__: null,
|
|
30840
31021
|
AdmissionProfileFactory: AdmissionProfileFactory,
|
|
30841
|
-
FACTORY_META: FACTORY_META$
|
|
31022
|
+
FACTORY_META: FACTORY_META$L,
|
|
30842
31023
|
default: AdmissionProfileFactory
|
|
30843
31024
|
});
|
|
30844
31025
|
|
|
@@ -30920,7 +31101,7 @@ function cloneGrant(grant) {
|
|
|
30920
31101
|
return JSON.parse(JSON.stringify(grant));
|
|
30921
31102
|
}
|
|
30922
31103
|
|
|
30923
|
-
const FACTORY_META$
|
|
31104
|
+
const FACTORY_META$K = {
|
|
30924
31105
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
30925
31106
|
key: 'DirectAdmissionClient',
|
|
30926
31107
|
};
|
|
@@ -30972,11 +31153,11 @@ function normalizeConfig$l(config) {
|
|
|
30972
31153
|
var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
30973
31154
|
__proto__: null,
|
|
30974
31155
|
DirectAdmissionClientFactory: DirectAdmissionClientFactory,
|
|
30975
|
-
FACTORY_META: FACTORY_META$
|
|
31156
|
+
FACTORY_META: FACTORY_META$K,
|
|
30976
31157
|
default: DirectAdmissionClientFactory
|
|
30977
31158
|
});
|
|
30978
31159
|
|
|
30979
|
-
const FACTORY_META$
|
|
31160
|
+
const FACTORY_META$J = {
|
|
30980
31161
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
30981
31162
|
key: 'NoopAdmissionClient',
|
|
30982
31163
|
};
|
|
@@ -31025,7 +31206,7 @@ function normalizeConfig$k(config, factoryArgs) {
|
|
|
31025
31206
|
|
|
31026
31207
|
var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
31027
31208
|
__proto__: null,
|
|
31028
|
-
FACTORY_META: FACTORY_META$
|
|
31209
|
+
FACTORY_META: FACTORY_META$J,
|
|
31029
31210
|
NoopAdmissionClientFactory: NoopAdmissionClientFactory,
|
|
31030
31211
|
default: NoopAdmissionClientFactory
|
|
31031
31212
|
});
|
|
@@ -31040,7 +31221,7 @@ class NoAuthInjectionStrategy {
|
|
|
31040
31221
|
}
|
|
31041
31222
|
}
|
|
31042
31223
|
|
|
31043
|
-
const FACTORY_META$
|
|
31224
|
+
const FACTORY_META$I = {
|
|
31044
31225
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
31045
31226
|
key: 'NoAuth',
|
|
31046
31227
|
};
|
|
@@ -31069,7 +31250,7 @@ function normalizeConfig$j(config) {
|
|
|
31069
31250
|
|
|
31070
31251
|
var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
31071
31252
|
__proto__: null,
|
|
31072
|
-
FACTORY_META: FACTORY_META$
|
|
31253
|
+
FACTORY_META: FACTORY_META$I,
|
|
31073
31254
|
NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
|
|
31074
31255
|
default: NoAuthInjectionStrategyFactory
|
|
31075
31256
|
});
|
|
@@ -31218,7 +31399,7 @@ function convertKeysToCamelCase(value) {
|
|
|
31218
31399
|
return result;
|
|
31219
31400
|
}
|
|
31220
31401
|
|
|
31221
|
-
const FACTORY_META$
|
|
31402
|
+
const FACTORY_META$H = {
|
|
31222
31403
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
31223
31404
|
key: 'WelcomeServiceClient',
|
|
31224
31405
|
};
|
|
@@ -31288,7 +31469,7 @@ async function createAuthStrategy(config) {
|
|
|
31288
31469
|
|
|
31289
31470
|
var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
|
|
31290
31471
|
__proto__: null,
|
|
31291
|
-
FACTORY_META: FACTORY_META$
|
|
31472
|
+
FACTORY_META: FACTORY_META$H,
|
|
31292
31473
|
WelcomeServiceClientFactory: WelcomeServiceClientFactory,
|
|
31293
31474
|
default: WelcomeServiceClientFactory
|
|
31294
31475
|
});
|
|
@@ -31406,7 +31587,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
|
|
|
31406
31587
|
});
|
|
31407
31588
|
}
|
|
31408
31589
|
}
|
|
31409
|
-
const FACTORY_META$
|
|
31590
|
+
const FACTORY_META$G = {
|
|
31410
31591
|
base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
|
|
31411
31592
|
key: 'StaticNodePlacementStrategy',
|
|
31412
31593
|
};
|
|
@@ -31416,7 +31597,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
|
|
|
31416
31597
|
|
|
31417
31598
|
var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
31418
31599
|
__proto__: null,
|
|
31419
|
-
FACTORY_META: FACTORY_META$
|
|
31600
|
+
FACTORY_META: FACTORY_META$G,
|
|
31420
31601
|
StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
|
|
31421
31602
|
default: StaticNodePlacementStrategyFactory
|
|
31422
31603
|
});
|
|
@@ -31575,7 +31756,7 @@ function connectorTypeName(connector) {
|
|
|
31575
31756
|
return typeof connector;
|
|
31576
31757
|
}
|
|
31577
31758
|
|
|
31578
|
-
const FACTORY_META$
|
|
31759
|
+
const FACTORY_META$F = {
|
|
31579
31760
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
31580
31761
|
key: 'BearerTokenHeaderAuth',
|
|
31581
31762
|
};
|
|
@@ -31616,7 +31797,7 @@ function normalizeConfig$g(config) {
|
|
|
31616
31797
|
var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
31617
31798
|
__proto__: null,
|
|
31618
31799
|
BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
|
|
31619
|
-
FACTORY_META: FACTORY_META$
|
|
31800
|
+
FACTORY_META: FACTORY_META$F,
|
|
31620
31801
|
default: BearerTokenHeaderAuthInjectionStrategyFactory
|
|
31621
31802
|
});
|
|
31622
31803
|
|
|
@@ -31643,7 +31824,7 @@ function normalizeConfig$f(config) {
|
|
|
31643
31824
|
function isTokenVerifier(candidate) {
|
|
31644
31825
|
return Boolean(candidate && typeof candidate.verify === 'function');
|
|
31645
31826
|
}
|
|
31646
|
-
const FACTORY_META$
|
|
31827
|
+
const FACTORY_META$E = {
|
|
31647
31828
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
31648
31829
|
key: 'DefaultAuthorizer',
|
|
31649
31830
|
};
|
|
@@ -31673,7 +31854,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
|
|
|
31673
31854
|
var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
31674
31855
|
__proto__: null,
|
|
31675
31856
|
DefaultAuthorizerFactory: DefaultAuthorizerFactory,
|
|
31676
|
-
FACTORY_META: FACTORY_META$
|
|
31857
|
+
FACTORY_META: FACTORY_META$E,
|
|
31677
31858
|
default: DefaultAuthorizerFactory
|
|
31678
31859
|
});
|
|
31679
31860
|
|
|
@@ -31684,7 +31865,7 @@ function getJwksJwtTokenVerifierModule() {
|
|
|
31684
31865
|
}
|
|
31685
31866
|
return jwksJwtTokenVerifierModulePromise;
|
|
31686
31867
|
}
|
|
31687
|
-
const FACTORY_META$
|
|
31868
|
+
const FACTORY_META$D = {
|
|
31688
31869
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
31689
31870
|
key: 'JWKSJWTTokenVerifier',
|
|
31690
31871
|
};
|
|
@@ -31746,12 +31927,12 @@ function normalizeConfig$e(config) {
|
|
|
31746
31927
|
|
|
31747
31928
|
var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
31748
31929
|
__proto__: null,
|
|
31749
|
-
FACTORY_META: FACTORY_META$
|
|
31930
|
+
FACTORY_META: FACTORY_META$D,
|
|
31750
31931
|
JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
|
|
31751
31932
|
default: JWKSTokenVerifierFactory
|
|
31752
31933
|
});
|
|
31753
31934
|
|
|
31754
|
-
const FACTORY_META$
|
|
31935
|
+
const FACTORY_META$C = {
|
|
31755
31936
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
31756
31937
|
key: 'JWTTokenIssuer',
|
|
31757
31938
|
};
|
|
@@ -31948,12 +32129,12 @@ function getProviderKeyId(provider) {
|
|
|
31948
32129
|
|
|
31949
32130
|
var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
31950
32131
|
__proto__: null,
|
|
31951
|
-
FACTORY_META: FACTORY_META$
|
|
32132
|
+
FACTORY_META: FACTORY_META$C,
|
|
31952
32133
|
JWTTokenIssuerFactory: JWTTokenIssuerFactory,
|
|
31953
32134
|
default: JWTTokenIssuerFactory
|
|
31954
32135
|
});
|
|
31955
32136
|
|
|
31956
|
-
const FACTORY_META$
|
|
32137
|
+
const FACTORY_META$B = {
|
|
31957
32138
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
31958
32139
|
key: 'JWTTokenVerifier',
|
|
31959
32140
|
};
|
|
@@ -32121,7 +32302,7 @@ function getProviderVerificationKey(provider) {
|
|
|
32121
32302
|
|
|
32122
32303
|
var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
32123
32304
|
__proto__: null,
|
|
32124
|
-
FACTORY_META: FACTORY_META$
|
|
32305
|
+
FACTORY_META: FACTORY_META$B,
|
|
32125
32306
|
JWTTokenVerifierFactory: JWTTokenVerifierFactory,
|
|
32126
32307
|
default: JWTTokenVerifierFactory
|
|
32127
32308
|
});
|
|
@@ -32137,7 +32318,7 @@ class NoneTokenProvider {
|
|
|
32137
32318
|
}
|
|
32138
32319
|
}
|
|
32139
32320
|
|
|
32140
|
-
const FACTORY_META$
|
|
32321
|
+
const FACTORY_META$A = {
|
|
32141
32322
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32142
32323
|
key: 'NoneTokenProvider',
|
|
32143
32324
|
};
|
|
@@ -32154,7 +32335,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
|
|
|
32154
32335
|
|
|
32155
32336
|
var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32156
32337
|
__proto__: null,
|
|
32157
|
-
FACTORY_META: FACTORY_META$
|
|
32338
|
+
FACTORY_META: FACTORY_META$A,
|
|
32158
32339
|
NoneTokenProviderFactory: NoneTokenProviderFactory,
|
|
32159
32340
|
default: NoneTokenProviderFactory
|
|
32160
32341
|
});
|
|
@@ -32206,7 +32387,7 @@ class NoopAuthorizer {
|
|
|
32206
32387
|
}
|
|
32207
32388
|
}
|
|
32208
32389
|
|
|
32209
|
-
const FACTORY_META$
|
|
32390
|
+
const FACTORY_META$z = {
|
|
32210
32391
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32211
32392
|
key: 'NoopAuthorizer',
|
|
32212
32393
|
};
|
|
@@ -32222,7 +32403,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
|
|
|
32222
32403
|
|
|
32223
32404
|
var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32224
32405
|
__proto__: null,
|
|
32225
|
-
FACTORY_META: FACTORY_META$
|
|
32406
|
+
FACTORY_META: FACTORY_META$z,
|
|
32226
32407
|
NoopAuthorizerFactory: NoopAuthorizerFactory,
|
|
32227
32408
|
default: NoopAuthorizerFactory
|
|
32228
32409
|
});
|
|
@@ -32236,7 +32417,7 @@ class NoopTokenIssuer {
|
|
|
32236
32417
|
}
|
|
32237
32418
|
}
|
|
32238
32419
|
|
|
32239
|
-
const FACTORY_META$
|
|
32420
|
+
const FACTORY_META$y = {
|
|
32240
32421
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
32241
32422
|
key: 'NoopTokenIssuer',
|
|
32242
32423
|
};
|
|
@@ -32252,7 +32433,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
|
|
|
32252
32433
|
|
|
32253
32434
|
var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
32254
32435
|
__proto__: null,
|
|
32255
|
-
FACTORY_META: FACTORY_META$
|
|
32436
|
+
FACTORY_META: FACTORY_META$y,
|
|
32256
32437
|
NoopTokenIssuerFactory: NoopTokenIssuerFactory,
|
|
32257
32438
|
default: NoopTokenIssuerFactory
|
|
32258
32439
|
});
|
|
@@ -32274,7 +32455,7 @@ class NoopTokenVerifier {
|
|
|
32274
32455
|
}
|
|
32275
32456
|
}
|
|
32276
32457
|
|
|
32277
|
-
const FACTORY_META$
|
|
32458
|
+
const FACTORY_META$x = {
|
|
32278
32459
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
32279
32460
|
key: 'NoopTokenVerifier',
|
|
32280
32461
|
};
|
|
@@ -32290,7 +32471,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
32290
32471
|
|
|
32291
32472
|
var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
32292
32473
|
__proto__: null,
|
|
32293
|
-
FACTORY_META: FACTORY_META$
|
|
32474
|
+
FACTORY_META: FACTORY_META$x,
|
|
32294
32475
|
NoopTokenVerifierFactory: NoopTokenVerifierFactory,
|
|
32295
32476
|
default: NoopTokenVerifierFactory
|
|
32296
32477
|
});
|
|
@@ -32303,7 +32484,7 @@ function getOAuth2AuthorizerModule() {
|
|
|
32303
32484
|
}
|
|
32304
32485
|
return oauth2AuthorizerModulePromise;
|
|
32305
32486
|
}
|
|
32306
|
-
const FACTORY_META$
|
|
32487
|
+
const FACTORY_META$w = {
|
|
32307
32488
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32308
32489
|
key: 'OAuth2Authorizer',
|
|
32309
32490
|
};
|
|
@@ -32448,7 +32629,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
|
|
|
32448
32629
|
|
|
32449
32630
|
var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32450
32631
|
__proto__: null,
|
|
32451
|
-
FACTORY_META: FACTORY_META$
|
|
32632
|
+
FACTORY_META: FACTORY_META$w,
|
|
32452
32633
|
OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
|
|
32453
32634
|
default: OAuth2AuthorizerFactory
|
|
32454
32635
|
});
|
|
@@ -32488,7 +32669,7 @@ function normalizeConfig$a(config) {
|
|
|
32488
32669
|
}
|
|
32489
32670
|
return normalized;
|
|
32490
32671
|
}
|
|
32491
|
-
const FACTORY_META$
|
|
32672
|
+
const FACTORY_META$v = {
|
|
32492
32673
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32493
32674
|
key: 'OAuth2ClientCredentialsTokenProvider',
|
|
32494
32675
|
};
|
|
@@ -32519,7 +32700,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
|
|
|
32519
32700
|
|
|
32520
32701
|
var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32521
32702
|
__proto__: null,
|
|
32522
|
-
FACTORY_META: FACTORY_META$
|
|
32703
|
+
FACTORY_META: FACTORY_META$v,
|
|
32523
32704
|
OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
|
|
32524
32705
|
default: OAuth2ClientCredentialsTokenProviderFactory
|
|
32525
32706
|
});
|
|
@@ -32601,7 +32782,7 @@ function normalizeConfig$9(config) {
|
|
|
32601
32782
|
}
|
|
32602
32783
|
return normalized;
|
|
32603
32784
|
}
|
|
32604
|
-
const FACTORY_META$
|
|
32785
|
+
const FACTORY_META$u = {
|
|
32605
32786
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32606
32787
|
key: 'OAuth2PkceTokenProvider',
|
|
32607
32788
|
};
|
|
@@ -32656,7 +32837,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
|
|
|
32656
32837
|
|
|
32657
32838
|
var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32658
32839
|
__proto__: null,
|
|
32659
|
-
FACTORY_META: FACTORY_META$
|
|
32840
|
+
FACTORY_META: FACTORY_META$u,
|
|
32660
32841
|
OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
|
|
32661
32842
|
default: OAuth2PkceTokenProviderFactory
|
|
32662
32843
|
});
|
|
@@ -32706,7 +32887,7 @@ class QueryParamAuthInjectionStrategy {
|
|
|
32706
32887
|
}
|
|
32707
32888
|
}
|
|
32708
32889
|
|
|
32709
|
-
const FACTORY_META$
|
|
32890
|
+
const FACTORY_META$t = {
|
|
32710
32891
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
32711
32892
|
key: 'QueryParamAuth',
|
|
32712
32893
|
};
|
|
@@ -32746,7 +32927,7 @@ function normalizeConfig$8(config) {
|
|
|
32746
32927
|
|
|
32747
32928
|
var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32748
32929
|
__proto__: null,
|
|
32749
|
-
FACTORY_META: FACTORY_META$
|
|
32930
|
+
FACTORY_META: FACTORY_META$t,
|
|
32750
32931
|
QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
|
|
32751
32932
|
default: QueryParamAuthInjectionStrategyFactory
|
|
32752
32933
|
});
|
|
@@ -32782,7 +32963,7 @@ function normalizeConfig$7(config) {
|
|
|
32782
32963
|
secretConfig: normalizeSecretSource(secretSource),
|
|
32783
32964
|
};
|
|
32784
32965
|
}
|
|
32785
|
-
const FACTORY_META$
|
|
32966
|
+
const FACTORY_META$s = {
|
|
32786
32967
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32787
32968
|
key: 'SharedSecretAuthorizer',
|
|
32788
32969
|
};
|
|
@@ -32801,7 +32982,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
|
|
|
32801
32982
|
|
|
32802
32983
|
var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32803
32984
|
__proto__: null,
|
|
32804
|
-
FACTORY_META: FACTORY_META$
|
|
32985
|
+
FACTORY_META: FACTORY_META$s,
|
|
32805
32986
|
SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
|
|
32806
32987
|
default: SharedSecretAuthorizerFactory
|
|
32807
32988
|
});
|
|
@@ -32837,7 +33018,7 @@ function normalizeConfig$6(config) {
|
|
|
32837
33018
|
secretConfig: normalizeSecretSource(secretSource),
|
|
32838
33019
|
};
|
|
32839
33020
|
}
|
|
32840
|
-
const FACTORY_META$
|
|
33021
|
+
const FACTORY_META$r = {
|
|
32841
33022
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32842
33023
|
key: 'SharedSecretTokenProvider',
|
|
32843
33024
|
};
|
|
@@ -32856,7 +33037,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
|
|
|
32856
33037
|
|
|
32857
33038
|
var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32858
33039
|
__proto__: null,
|
|
32859
|
-
FACTORY_META: FACTORY_META$
|
|
33040
|
+
FACTORY_META: FACTORY_META$r,
|
|
32860
33041
|
SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
|
|
32861
33042
|
default: SharedSecretTokenProviderFactory
|
|
32862
33043
|
});
|
|
@@ -32900,7 +33081,7 @@ function normalizeConfig$5(config) {
|
|
|
32900
33081
|
}
|
|
32901
33082
|
return normalized;
|
|
32902
33083
|
}
|
|
32903
|
-
const FACTORY_META$
|
|
33084
|
+
const FACTORY_META$q = {
|
|
32904
33085
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
32905
33086
|
key: 'SharedSecretTokenVerifier',
|
|
32906
33087
|
};
|
|
@@ -32925,7 +33106,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
32925
33106
|
|
|
32926
33107
|
var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
32927
33108
|
__proto__: null,
|
|
32928
|
-
FACTORY_META: FACTORY_META$
|
|
33109
|
+
FACTORY_META: FACTORY_META$q,
|
|
32929
33110
|
SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
|
|
32930
33111
|
default: SharedSecretTokenVerifierFactory
|
|
32931
33112
|
});
|
|
@@ -33040,7 +33221,7 @@ function normalizeConfig$4(config) {
|
|
|
33040
33221
|
}
|
|
33041
33222
|
return options;
|
|
33042
33223
|
}
|
|
33043
|
-
const FACTORY_META$
|
|
33224
|
+
const FACTORY_META$p = {
|
|
33044
33225
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33045
33226
|
key: 'StaticTokenProvider',
|
|
33046
33227
|
};
|
|
@@ -33057,7 +33238,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
|
|
|
33057
33238
|
|
|
33058
33239
|
var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33059
33240
|
__proto__: null,
|
|
33060
|
-
FACTORY_META: FACTORY_META$
|
|
33241
|
+
FACTORY_META: FACTORY_META$p,
|
|
33061
33242
|
StaticTokenProviderFactory: StaticTokenProviderFactory,
|
|
33062
33243
|
default: StaticTokenProviderFactory
|
|
33063
33244
|
});
|
|
@@ -33108,7 +33289,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
|
|
|
33108
33289
|
}
|
|
33109
33290
|
}
|
|
33110
33291
|
|
|
33111
|
-
const FACTORY_META$
|
|
33292
|
+
const FACTORY_META$o = {
|
|
33112
33293
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
33113
33294
|
key: 'WebSocketSubprotocolAuth',
|
|
33114
33295
|
};
|
|
@@ -33150,7 +33331,7 @@ function normalizeConfig$3(config) {
|
|
|
33150
33331
|
|
|
33151
33332
|
var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
33152
33333
|
__proto__: null,
|
|
33153
|
-
FACTORY_META: FACTORY_META$
|
|
33334
|
+
FACTORY_META: FACTORY_META$o,
|
|
33154
33335
|
WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
|
|
33155
33336
|
default: WebSocketSubprotocolAuthInjectionStrategyFactory
|
|
33156
33337
|
});
|
|
@@ -33198,7 +33379,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
33198
33379
|
throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
|
|
33199
33380
|
}
|
|
33200
33381
|
}
|
|
33201
|
-
const FACTORY_META$
|
|
33382
|
+
const FACTORY_META$n = {
|
|
33202
33383
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
33203
33384
|
key: 'DevFixedKeyCredentialProvider',
|
|
33204
33385
|
};
|
|
@@ -33206,7 +33387,7 @@ const FACTORY_META$m = {
|
|
|
33206
33387
|
var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33207
33388
|
__proto__: null,
|
|
33208
33389
|
DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
|
|
33209
|
-
FACTORY_META: FACTORY_META$
|
|
33390
|
+
FACTORY_META: FACTORY_META$n,
|
|
33210
33391
|
default: DevFixedKeyCredentialProviderFactory,
|
|
33211
33392
|
normalizeDevFixedConfig: normalizeDevFixedConfig
|
|
33212
33393
|
});
|
|
@@ -33222,14 +33403,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
33222
33403
|
return new NoneCredentialProvider();
|
|
33223
33404
|
}
|
|
33224
33405
|
}
|
|
33225
|
-
const FACTORY_META$
|
|
33406
|
+
const FACTORY_META$m = {
|
|
33226
33407
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
33227
33408
|
key: 'NoneCredentialProvider',
|
|
33228
33409
|
};
|
|
33229
33410
|
|
|
33230
33411
|
var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33231
33412
|
__proto__: null,
|
|
33232
|
-
FACTORY_META: FACTORY_META$
|
|
33413
|
+
FACTORY_META: FACTORY_META$m,
|
|
33233
33414
|
NoneCredentialProviderFactory: NoneCredentialProviderFactory,
|
|
33234
33415
|
default: NoneCredentialProviderFactory
|
|
33235
33416
|
});
|
|
@@ -33267,14 +33448,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
33267
33448
|
return new SessionKeyCredentialProvider(resolved.length);
|
|
33268
33449
|
}
|
|
33269
33450
|
}
|
|
33270
|
-
const FACTORY_META$
|
|
33451
|
+
const FACTORY_META$l = {
|
|
33271
33452
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
33272
33453
|
key: 'SessionKeyCredentialProvider',
|
|
33273
33454
|
};
|
|
33274
33455
|
|
|
33275
33456
|
var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33276
33457
|
__proto__: null,
|
|
33277
|
-
FACTORY_META: FACTORY_META$
|
|
33458
|
+
FACTORY_META: FACTORY_META$l,
|
|
33278
33459
|
SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
|
|
33279
33460
|
default: SessionKeyCredentialProviderFactory,
|
|
33280
33461
|
normalizeSessionKeyConfig: normalizeSessionKeyConfig
|
|
@@ -33312,9 +33493,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
|
|
|
33312
33493
|
ensureAlias('keyValidator', 'key_validator');
|
|
33313
33494
|
ensureAlias('eventListeners', 'event_listeners');
|
|
33314
33495
|
ensureAlias('cryptoProvider', 'crypto_provider');
|
|
33496
|
+
ensureAlias('trustStoreProvider', 'trust_store_provider');
|
|
33315
33497
|
return normalized;
|
|
33316
33498
|
}
|
|
33317
|
-
const FACTORY_META$
|
|
33499
|
+
const FACTORY_META$k = {
|
|
33318
33500
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
33319
33501
|
key: 'DefaultSecurityManager',
|
|
33320
33502
|
};
|
|
@@ -33360,6 +33542,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33360
33542
|
const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
|
|
33361
33543
|
const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
|
|
33362
33544
|
const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
|
|
33545
|
+
const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
|
|
33363
33546
|
const listenersSource = overrides?.eventListeners ??
|
|
33364
33547
|
config.eventListeners ??
|
|
33365
33548
|
config.event_listeners;
|
|
@@ -33379,10 +33562,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33379
33562
|
secureChannelManager,
|
|
33380
33563
|
eventListeners,
|
|
33381
33564
|
cryptoProvider: cryptoProvider ?? null,
|
|
33565
|
+
trustStoreProvider: trustStoreProvider ?? null,
|
|
33382
33566
|
};
|
|
33383
33567
|
}
|
|
33384
33568
|
static async buildSecurityManager(options) {
|
|
33385
|
-
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
|
|
33569
|
+
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
|
|
33386
33570
|
if (!keyStore) {
|
|
33387
33571
|
keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
|
|
33388
33572
|
}
|
|
@@ -33395,6 +33579,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33395
33579
|
if (!policy) {
|
|
33396
33580
|
throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
|
|
33397
33581
|
}
|
|
33582
|
+
if (!trustStoreProvider) {
|
|
33583
|
+
trustStoreProvider =
|
|
33584
|
+
await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
33585
|
+
}
|
|
33398
33586
|
if (!keyManager) {
|
|
33399
33587
|
keyManager =
|
|
33400
33588
|
await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
|
|
@@ -33405,7 +33593,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33405
33593
|
}
|
|
33406
33594
|
if (!envelopeVerifier) {
|
|
33407
33595
|
envelopeVerifier =
|
|
33408
|
-
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
|
|
33596
|
+
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
|
|
33409
33597
|
}
|
|
33410
33598
|
if (!encryptionManager || !secureChannelManager) {
|
|
33411
33599
|
const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
|
|
@@ -33505,7 +33693,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33505
33693
|
throw error instanceof Error ? error : new Error(String(error));
|
|
33506
33694
|
}
|
|
33507
33695
|
}
|
|
33508
|
-
static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
|
|
33696
|
+
static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
|
|
33509
33697
|
const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
|
|
33510
33698
|
if (verifierConfig &&
|
|
33511
33699
|
DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
|
|
@@ -33529,7 +33717,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33529
33717
|
}
|
|
33530
33718
|
const signing = policy.signing ?? null;
|
|
33531
33719
|
return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
|
|
33532
|
-
factoryArgs: [keyManager, signing ?? null],
|
|
33720
|
+
factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
|
|
33533
33721
|
});
|
|
33534
33722
|
}
|
|
33535
33723
|
catch (error) {
|
|
@@ -33770,11 +33958,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33770
33958
|
var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33771
33959
|
__proto__: null,
|
|
33772
33960
|
DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
|
|
33773
|
-
FACTORY_META: FACTORY_META$
|
|
33961
|
+
FACTORY_META: FACTORY_META$k,
|
|
33774
33962
|
default: DefaultSecurityManagerFactory
|
|
33775
33963
|
});
|
|
33776
33964
|
|
|
33777
|
-
const FACTORY_META$
|
|
33965
|
+
const FACTORY_META$j = {
|
|
33778
33966
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
33779
33967
|
key: 'NoopEncryptionManager',
|
|
33780
33968
|
};
|
|
@@ -33831,7 +34019,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
|
|
|
33831
34019
|
|
|
33832
34020
|
var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33833
34021
|
__proto__: null,
|
|
33834
|
-
FACTORY_META: FACTORY_META$
|
|
34022
|
+
FACTORY_META: FACTORY_META$j,
|
|
33835
34023
|
NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
|
|
33836
34024
|
default: NoopEncryptionManagerFactory
|
|
33837
34025
|
});
|
|
@@ -33903,7 +34091,7 @@ class NoopSecureChannelManager {
|
|
|
33903
34091
|
}
|
|
33904
34092
|
}
|
|
33905
34093
|
|
|
33906
|
-
const FACTORY_META$
|
|
34094
|
+
const FACTORY_META$i = {
|
|
33907
34095
|
base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
|
|
33908
34096
|
key: 'NoopSecureChannelManager',
|
|
33909
34097
|
};
|
|
@@ -33920,12 +34108,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
|
|
|
33920
34108
|
|
|
33921
34109
|
var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33922
34110
|
__proto__: null,
|
|
33923
|
-
FACTORY_META: FACTORY_META$
|
|
34111
|
+
FACTORY_META: FACTORY_META$i,
|
|
33924
34112
|
NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
|
|
33925
34113
|
default: NoopSecureChannelManagerFactory
|
|
33926
34114
|
});
|
|
33927
34115
|
|
|
33928
|
-
const FACTORY_META$
|
|
34116
|
+
const FACTORY_META$h = {
|
|
33929
34117
|
base: KEY_MANAGER_FACTORY_BASE_TYPE,
|
|
33930
34118
|
key: 'DefaultKeyManager',
|
|
33931
34119
|
};
|
|
@@ -33953,7 +34141,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
|
|
|
33953
34141
|
var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33954
34142
|
__proto__: null,
|
|
33955
34143
|
DefaultKeyManagerFactory: DefaultKeyManagerFactory,
|
|
33956
|
-
FACTORY_META: FACTORY_META$
|
|
34144
|
+
FACTORY_META: FACTORY_META$h,
|
|
33957
34145
|
default: DefaultKeyManagerFactory
|
|
33958
34146
|
});
|
|
33959
34147
|
|
|
@@ -34138,7 +34326,7 @@ class InMemoryKeyStore extends KeyStore {
|
|
|
34138
34326
|
}
|
|
34139
34327
|
registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
|
|
34140
34328
|
|
|
34141
|
-
const FACTORY_META$
|
|
34329
|
+
const FACTORY_META$g = {
|
|
34142
34330
|
base: KEY_STORE_FACTORY_BASE_TYPE,
|
|
34143
34331
|
key: 'InMemoryKeyStore',
|
|
34144
34332
|
};
|
|
@@ -34173,12 +34361,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
|
|
|
34173
34361
|
|
|
34174
34362
|
var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
|
|
34175
34363
|
__proto__: null,
|
|
34176
|
-
FACTORY_META: FACTORY_META$
|
|
34364
|
+
FACTORY_META: FACTORY_META$g,
|
|
34177
34365
|
InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
|
|
34178
34366
|
default: InMemoryKeyStoreFactory
|
|
34179
34367
|
});
|
|
34180
34368
|
|
|
34181
|
-
const FACTORY_META$
|
|
34369
|
+
const FACTORY_META$f = {
|
|
34182
34370
|
base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
|
|
34183
34371
|
key: 'NoopKeyValidator',
|
|
34184
34372
|
};
|
|
@@ -34196,12 +34384,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
|
|
|
34196
34384
|
|
|
34197
34385
|
var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
|
|
34198
34386
|
__proto__: null,
|
|
34199
|
-
FACTORY_META: FACTORY_META$
|
|
34387
|
+
FACTORY_META: FACTORY_META$f,
|
|
34200
34388
|
NoopKeyValidatorFactory: NoopKeyValidatorFactory,
|
|
34201
34389
|
default: NoopKeyValidatorFactory
|
|
34202
34390
|
});
|
|
34203
34391
|
|
|
34204
|
-
const FACTORY_META$
|
|
34392
|
+
const FACTORY_META$e = {
|
|
34205
34393
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
34206
34394
|
key: 'DefaultSecurityPolicy',
|
|
34207
34395
|
};
|
|
@@ -34262,11 +34450,11 @@ function normalizeConfig$2(config) {
|
|
|
34262
34450
|
var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
34263
34451
|
__proto__: null,
|
|
34264
34452
|
DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
|
|
34265
|
-
FACTORY_META: FACTORY_META$
|
|
34453
|
+
FACTORY_META: FACTORY_META$e,
|
|
34266
34454
|
default: DefaultSecurityPolicyFactory
|
|
34267
34455
|
});
|
|
34268
34456
|
|
|
34269
|
-
const FACTORY_META$
|
|
34457
|
+
const FACTORY_META$d = {
|
|
34270
34458
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
34271
34459
|
key: 'NoSecurityPolicy',
|
|
34272
34460
|
};
|
|
@@ -34294,7 +34482,7 @@ function normalizeConfig$1(config) {
|
|
|
34294
34482
|
|
|
34295
34483
|
var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
34296
34484
|
__proto__: null,
|
|
34297
|
-
FACTORY_META: FACTORY_META$
|
|
34485
|
+
FACTORY_META: FACTORY_META$d,
|
|
34298
34486
|
NoSecurityPolicyFactory: NoSecurityPolicyFactory,
|
|
34299
34487
|
default: NoSecurityPolicyFactory
|
|
34300
34488
|
});
|
|
@@ -34309,7 +34497,7 @@ async function getEdDSAEnvelopeSignerModule() {
|
|
|
34309
34497
|
}
|
|
34310
34498
|
return eddsaEnvelopeSignerModulePromise;
|
|
34311
34499
|
}
|
|
34312
|
-
const FACTORY_META$
|
|
34500
|
+
const FACTORY_META$c = {
|
|
34313
34501
|
base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
|
|
34314
34502
|
key: 'EdDSAEnvelopeSigner',
|
|
34315
34503
|
};
|
|
@@ -34338,7 +34526,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
|
|
|
34338
34526
|
var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
|
|
34339
34527
|
__proto__: null,
|
|
34340
34528
|
EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
|
|
34341
|
-
FACTORY_META: FACTORY_META$
|
|
34529
|
+
FACTORY_META: FACTORY_META$c,
|
|
34342
34530
|
default: EdDSAEnvelopeSignerFactory
|
|
34343
34531
|
});
|
|
34344
34532
|
|
|
@@ -34352,7 +34540,7 @@ async function getEdDSAEnvelopeVerifierModule() {
|
|
|
34352
34540
|
}
|
|
34353
34541
|
return eddsaEnvelopeVerifierModulePromise;
|
|
34354
34542
|
}
|
|
34355
|
-
const FACTORY_META$
|
|
34543
|
+
const FACTORY_META$b = {
|
|
34356
34544
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
34357
34545
|
key: 'EdDSAEnvelopeVerifier',
|
|
34358
34546
|
};
|
|
@@ -34378,10 +34566,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
34378
34566
|
var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
34379
34567
|
__proto__: null,
|
|
34380
34568
|
EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
|
|
34381
|
-
FACTORY_META: FACTORY_META$
|
|
34569
|
+
FACTORY_META: FACTORY_META$b,
|
|
34382
34570
|
default: EdDSAEnvelopeVerifierFactory
|
|
34383
34571
|
});
|
|
34384
34572
|
|
|
34573
|
+
const FACTORY_META$a = {
|
|
34574
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
34575
|
+
key: "NoopTrustStoreProvider",
|
|
34576
|
+
isDefault: true,
|
|
34577
|
+
priority: 10,
|
|
34578
|
+
};
|
|
34579
|
+
class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
34580
|
+
constructor() {
|
|
34581
|
+
super(...arguments);
|
|
34582
|
+
this.type = "NoopTrustStoreProvider";
|
|
34583
|
+
this.isDefault = true;
|
|
34584
|
+
this.priority = 10;
|
|
34585
|
+
}
|
|
34586
|
+
async create(_config, ..._factoryArgs) {
|
|
34587
|
+
return new NoopTrustStoreProvider();
|
|
34588
|
+
}
|
|
34589
|
+
}
|
|
34590
|
+
|
|
34591
|
+
var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34592
|
+
__proto__: null,
|
|
34593
|
+
FACTORY_META: FACTORY_META$a,
|
|
34594
|
+
NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
|
|
34595
|
+
default: NoopTrustStoreProviderFactory
|
|
34596
|
+
});
|
|
34597
|
+
|
|
34385
34598
|
const FACTORY_META$9 = {
|
|
34386
34599
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
34387
34600
|
key: 'CapabilityAwareRoutingPolicy',
|
|
@@ -39371,146 +39584,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
39371
39584
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
39372
39585
|
});
|
|
39373
39586
|
|
|
39374
|
-
if (!ed25519.hashes.sha512) {
|
|
39375
|
-
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
39376
|
-
}
|
|
39377
|
-
function normalizeSignerOptions(options) {
|
|
39378
|
-
if (!options || typeof options !== 'object') {
|
|
39379
|
-
return {};
|
|
39380
|
-
}
|
|
39381
|
-
const candidate = options;
|
|
39382
|
-
const result = {
|
|
39383
|
-
...options,
|
|
39384
|
-
};
|
|
39385
|
-
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
39386
|
-
if (cryptoProvider !== undefined) {
|
|
39387
|
-
result.cryptoProvider = cryptoProvider ?? null;
|
|
39388
|
-
}
|
|
39389
|
-
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
39390
|
-
if (signingConfig !== undefined) {
|
|
39391
|
-
result.signingConfig = signingConfig;
|
|
39392
|
-
}
|
|
39393
|
-
const privateKeyPem = resolveAlias(candidate, [
|
|
39394
|
-
'privateKeyPem',
|
|
39395
|
-
'private_key_pem',
|
|
39396
|
-
]);
|
|
39397
|
-
if (privateKeyPem !== undefined) {
|
|
39398
|
-
result.privateKeyPem = privateKeyPem;
|
|
39399
|
-
}
|
|
39400
|
-
const keyId = resolveAlias(candidate, [
|
|
39401
|
-
'keyId',
|
|
39402
|
-
'key_id',
|
|
39403
|
-
]);
|
|
39404
|
-
if (keyId !== undefined) {
|
|
39405
|
-
result.keyId = keyId;
|
|
39406
|
-
}
|
|
39407
|
-
return result;
|
|
39408
|
-
}
|
|
39409
|
-
class EdDSAEnvelopeSigner {
|
|
39410
|
-
constructor(options = {}) {
|
|
39411
|
-
const normalized = normalizeSignerOptions(options);
|
|
39412
|
-
const provider = normalized.cryptoProvider ?? null;
|
|
39413
|
-
if (!provider) {
|
|
39414
|
-
throw new Error('No crypto provider is configured for signing');
|
|
39415
|
-
}
|
|
39416
|
-
this.crypto = provider;
|
|
39417
|
-
const signingConfigOption = normalized.signingConfig;
|
|
39418
|
-
if (signingConfigOption instanceof SigningConfig) {
|
|
39419
|
-
this.signingConfig = signingConfigOption;
|
|
39420
|
-
}
|
|
39421
|
-
else if (signingConfigOption) {
|
|
39422
|
-
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
39423
|
-
}
|
|
39424
|
-
else {
|
|
39425
|
-
this.signingConfig = new SigningConfig();
|
|
39426
|
-
}
|
|
39427
|
-
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
39428
|
-
this.explicitKeyId = normalized.keyId;
|
|
39429
|
-
}
|
|
39430
|
-
signEnvelope(envelope, { physicalPath }) {
|
|
39431
|
-
if (!envelope.sid) {
|
|
39432
|
-
throw new Error('Envelope missing sid');
|
|
39433
|
-
}
|
|
39434
|
-
const frame = envelope.frame;
|
|
39435
|
-
if (frame.type === 'Data') {
|
|
39436
|
-
const dataFrame = frame;
|
|
39437
|
-
if (!dataFrame.pd) {
|
|
39438
|
-
const payload = dataFrame.payload ?? '';
|
|
39439
|
-
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
39440
|
-
dataFrame.pd = secureDigest(payloadString);
|
|
39441
|
-
}
|
|
39442
|
-
}
|
|
39443
|
-
const digest = frameDigest(frame);
|
|
39444
|
-
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
39445
|
-
const sidDigest = secureDigest(physicalPath);
|
|
39446
|
-
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
39447
|
-
1 +
|
|
39448
|
-
encodeUtf8(immutable).length +
|
|
39449
|
-
1 +
|
|
39450
|
-
encodeUtf8(digest).length);
|
|
39451
|
-
const sidBytes = encodeUtf8(sidDigest);
|
|
39452
|
-
const immBytes = encodeUtf8(immutable);
|
|
39453
|
-
const digBytes = encodeUtf8(digest);
|
|
39454
|
-
let offset = 0;
|
|
39455
|
-
tbs.set(sidBytes, offset);
|
|
39456
|
-
offset += sidBytes.length;
|
|
39457
|
-
tbs[offset] = 0x1f;
|
|
39458
|
-
offset += 1;
|
|
39459
|
-
tbs.set(immBytes, offset);
|
|
39460
|
-
offset += immBytes.length;
|
|
39461
|
-
tbs[offset] = 0x1f;
|
|
39462
|
-
offset += 1;
|
|
39463
|
-
tbs.set(digBytes, offset);
|
|
39464
|
-
const privateKey = this.loadPrivateKey();
|
|
39465
|
-
const signatureBytes = ed25519.sign(tbs, privateKey);
|
|
39466
|
-
const signature = urlsafeBase64Encode(signatureBytes);
|
|
39467
|
-
const kid = this.determineKeyId();
|
|
39468
|
-
const signatureHeader = {
|
|
39469
|
-
kid,
|
|
39470
|
-
val: signature,
|
|
39471
|
-
alg: 'EdDSA',
|
|
39472
|
-
};
|
|
39473
|
-
const secHeader = envelope.sec ?? {};
|
|
39474
|
-
secHeader.sig = signatureHeader;
|
|
39475
|
-
envelope.sec = secHeader;
|
|
39476
|
-
return envelope;
|
|
39477
|
-
}
|
|
39478
|
-
loadPrivateKey() {
|
|
39479
|
-
const pem = this.explicitPrivateKey ??
|
|
39480
|
-
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
39481
|
-
if (!pem) {
|
|
39482
|
-
throw new Error('Crypto provider does not expose a signing private key');
|
|
39483
|
-
}
|
|
39484
|
-
return parseEd25519PrivateKey(pem);
|
|
39485
|
-
}
|
|
39486
|
-
determineKeyId() {
|
|
39487
|
-
if (this.explicitKeyId) {
|
|
39488
|
-
return this.explicitKeyId;
|
|
39489
|
-
}
|
|
39490
|
-
if (this.signingConfig.signingMaterial === core.SigningMaterial.X509_CHAIN) {
|
|
39491
|
-
const certificateProvider = this
|
|
39492
|
-
.crypto;
|
|
39493
|
-
const jwk = certificateProvider.nodeJwk?.();
|
|
39494
|
-
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
39495
|
-
const kid = jwk.kid;
|
|
39496
|
-
if (typeof kid === 'string' && kid.length > 0) {
|
|
39497
|
-
return kid;
|
|
39498
|
-
}
|
|
39499
|
-
}
|
|
39500
|
-
}
|
|
39501
|
-
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
39502
|
-
if (!fallback) {
|
|
39503
|
-
throw new Error('Crypto provider does not expose a signature key id');
|
|
39504
|
-
}
|
|
39505
|
-
return fallback;
|
|
39506
|
-
}
|
|
39507
|
-
}
|
|
39508
|
-
|
|
39509
|
-
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
39510
|
-
__proto__: null,
|
|
39511
|
-
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
39512
|
-
});
|
|
39513
|
-
|
|
39514
39587
|
async function loadPublicKey(jwk, signingConfig) {
|
|
39515
39588
|
if (jwk.x5c) {
|
|
39516
39589
|
if (signingConfig.signingMaterial !== core.SigningMaterial.X509_CHAIN) {
|
|
@@ -39771,7 +39844,7 @@ exports.CertificateManagerFactory = CertificateManagerFactory;
|
|
|
39771
39844
|
exports.ConnectorConfigDefaults = ConnectorConfigDefaults;
|
|
39772
39845
|
exports.ConnectorFactory = ConnectorFactory;
|
|
39773
39846
|
exports.ConsoleMetricsEmitter = ConsoleMetricsEmitter;
|
|
39774
|
-
exports.DEFAULT_WELCOME_FACTORY_META = FACTORY_META
|
|
39847
|
+
exports.DEFAULT_WELCOME_FACTORY_META = FACTORY_META$$;
|
|
39775
39848
|
exports.DefaultCryptoProvider = DefaultCryptoProvider;
|
|
39776
39849
|
exports.DefaultKeyManager = DefaultKeyManager;
|
|
39777
39850
|
exports.DefaultSecurityManager = DefaultSecurityManager;
|
|
@@ -39791,6 +39864,7 @@ exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE;
|
|
|
39791
39864
|
exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER;
|
|
39792
39865
|
exports.ENV_VAR_JWT_TRUSTED_ISSUER = ENV_VAR_JWT_TRUSTED_ISSUER;
|
|
39793
39866
|
exports.ENV_VAR_SHOW_ENVELOPES = ENV_VAR_SHOW_ENVELOPES$1;
|
|
39867
|
+
exports.EdDSAEnvelopeSigner = EdDSAEnvelopeSigner;
|
|
39794
39868
|
exports.EncryptedKeyValueStore = EncryptedKeyValueStore;
|
|
39795
39869
|
exports.EncryptedStorageProviderBase = EncryptedStorageProviderBase;
|
|
39796
39870
|
exports.EncryptedValue = EncryptedValue;
|
|
@@ -39803,7 +39877,7 @@ exports.EnvelopeListenerManager = EnvelopeListenerManager;
|
|
|
39803
39877
|
exports.EnvelopeSecurityHandler = EnvelopeSecurityHandler;
|
|
39804
39878
|
exports.EnvelopeSignerFactory = EnvelopeSignerFactory;
|
|
39805
39879
|
exports.EnvelopeVerifierFactory = EnvelopeVerifierFactory;
|
|
39806
|
-
exports.FACTORY_META = FACTORY_META
|
|
39880
|
+
exports.FACTORY_META = FACTORY_META$10;
|
|
39807
39881
|
exports.FIXED_PREFIX_LEN = FIXED_PREFIX_LEN;
|
|
39808
39882
|
exports.FameAuthorizedDeliveryContextSchema = FameAuthorizedDeliveryContextSchema;
|
|
39809
39883
|
exports.FameConnectError = FameConnectError;
|
|
@@ -39851,6 +39925,7 @@ exports.NodePlacementStrategyFactory = NodePlacementStrategyFactory;
|
|
|
39851
39925
|
exports.NoneCredentialProvider = NoneCredentialProvider;
|
|
39852
39926
|
exports.NoopEncryptionManager = NoopEncryptionManager;
|
|
39853
39927
|
exports.NoopKeyValidator = NoopKeyValidator;
|
|
39928
|
+
exports.NoopTrustStoreProvider = NoopTrustStoreProvider;
|
|
39854
39929
|
exports.NotAuthorized = NotAuthorized;
|
|
39855
39930
|
exports.PROFILE_NAME_GATED = PROFILE_NAME_GATED;
|
|
39856
39931
|
exports.PROFILE_NAME_GATED_CALLBACK = PROFILE_NAME_GATED_CALLBACK;
|
|
@@ -39893,11 +39968,13 @@ exports.TOKEN_ISSUER_FACTORY_BASE_TYPE = TOKEN_ISSUER_FACTORY_BASE_TYPE;
|
|
|
39893
39968
|
exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = TOKEN_PROVIDER_FACTORY_BASE_TYPE;
|
|
39894
39969
|
exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = TOKEN_VERIFIER_FACTORY_BASE_TYPE;
|
|
39895
39970
|
exports.TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE = TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE;
|
|
39971
|
+
exports.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE;
|
|
39896
39972
|
exports.TaskSpawner = TaskSpawner;
|
|
39897
39973
|
exports.TokenIssuerFactory = TokenIssuerFactory;
|
|
39898
39974
|
exports.TokenProviderFactory = TokenProviderFactory;
|
|
39899
39975
|
exports.TokenVerifierFactory = TokenVerifierFactory;
|
|
39900
39976
|
exports.TransportProvisionerFactory = TransportProvisionerFactory;
|
|
39977
|
+
exports.TrustStoreProviderFactory = TrustStoreProviderFactory;
|
|
39901
39978
|
exports.TtlValidationError = TtlValidationError;
|
|
39902
39979
|
exports.UpstreamSessionManager = UpstreamSessionManager;
|
|
39903
39980
|
exports.VALID_CURVES_BY_KTY = VALID_CURVES_BY_KTY;
|