@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. package/dist/browser/index.cjs +355 -278
  2. package/dist/browser/index.mjs +346 -273
  3. package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
  4. package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
  5. package/dist/cjs/naylence/fame/security/index.js +8 -1
  6. package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
  7. package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
  8. package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
  9. package/dist/cjs/version.js +2 -2
  10. package/dist/esm/naylence/fame/factory-manifest.js +2 -0
  11. package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
  12. package/dist/esm/naylence/fame/security/index.js +3 -0
  13. package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
  14. package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
  15. package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
  16. package/dist/esm/version.js +2 -2
  17. package/dist/node/index.cjs +351 -274
  18. package/dist/node/index.mjs +346 -273
  19. package/dist/node/node.cjs +350 -273
  20. package/dist/node/node.mjs +345 -272
  21. package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
  22. package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
  23. package/dist/types/naylence/fame/security/index.d.ts +4 -0
  24. package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
  25. package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
  26. package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
  27. package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
  28. package/dist/types/version.d.ts +1 -1
  29. package/package.json +1 -1
@@ -2,23 +2,23 @@ import { parseAddressComponents, FlowFlags, FameAddress, DEFAULT_POLLING_TIMEOUT
2
2
  export * from '@naylence/core';
3
3
  import { z, ZodError } from 'zod';
4
4
  import { AbstractResourceFactory, createResource as createResource$1, createDefaultResource, registerFactory, Expressions, ExtensionManager, ExpressionEvaluationPolicy, Registry, configValidator } from '@naylence/factory';
5
+ import { sign, hashes, verify } from '@noble/ed25519';
6
+ import { sha256, sha512 } from '@noble/hashes/sha2.js';
5
7
  import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
6
8
  import { x25519 } from '@noble/curves/ed25519.js';
7
9
  import { hkdf } from '@noble/hashes/hkdf.js';
8
- import { sha256, sha512 } from '@noble/hashes/sha2.js';
9
10
  import { utf8ToBytes, bytesToHex, randomBytes, concatBytes } from '@noble/hashes/utils.js';
10
11
  import { parse } from 'yaml';
11
12
  import fastify from 'fastify';
12
13
  import websocketPlugin from '@fastify/websocket';
13
- import { sign, hashes, verify } from '@noble/ed25519';
14
14
 
15
15
  // This file is auto-generated during build - do not edit manually
16
- // Generated from package.json version: 0.3.5-test.922
16
+ // Generated from package.json version: 0.3.5-test.924
17
17
  /**
18
18
  * The package version, injected at build time.
19
19
  * @internal
20
20
  */
21
- const VERSION = '0.3.5-test.922';
21
+ const VERSION = '0.3.5-test.924';
22
22
 
23
23
  /**
24
24
  * Fame protocol specific error classes with WebSocket close codes and proper inheritance.
@@ -3084,7 +3084,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
3084
3084
  return new EnvCredentialProvider(resolved.varName);
3085
3085
  }
3086
3086
  }
3087
- const FACTORY_META$17 = {
3087
+ const FACTORY_META$18 = {
3088
3088
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3089
3089
  key: 'EnvCredentialProvider',
3090
3090
  };
@@ -3092,7 +3092,7 @@ const FACTORY_META$17 = {
3092
3092
  var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3093
3093
  __proto__: null,
3094
3094
  EnvCredentialProviderFactory: EnvCredentialProviderFactory,
3095
- FACTORY_META: FACTORY_META$17,
3095
+ FACTORY_META: FACTORY_META$18,
3096
3096
  default: EnvCredentialProviderFactory,
3097
3097
  normalizeEnvConfig: normalizeEnvConfig
3098
3098
  });
@@ -3190,14 +3190,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
3190
3190
  return new PromptCredentialProvider(resolved.credentialName);
3191
3191
  }
3192
3192
  }
3193
- const FACTORY_META$16 = {
3193
+ const FACTORY_META$17 = {
3194
3194
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3195
3195
  key: 'PromptCredentialProvider',
3196
3196
  };
3197
3197
 
3198
3198
  var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3199
3199
  __proto__: null,
3200
- FACTORY_META: FACTORY_META$16,
3200
+ FACTORY_META: FACTORY_META$17,
3201
3201
  PromptCredentialProviderFactory: PromptCredentialProviderFactory,
3202
3202
  default: PromptCredentialProviderFactory,
3203
3203
  normalizePromptConfig: normalizePromptConfig
@@ -3251,14 +3251,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
3251
3251
  return new SecretStoreCredentialProvider(resolved.secretName);
3252
3252
  }
3253
3253
  }
3254
- const FACTORY_META$15 = {
3254
+ const FACTORY_META$16 = {
3255
3255
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3256
3256
  key: 'SecretStoreCredentialProvider',
3257
3257
  };
3258
3258
 
3259
3259
  var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3260
3260
  __proto__: null,
3261
- FACTORY_META: FACTORY_META$15,
3261
+ FACTORY_META: FACTORY_META$16,
3262
3262
  SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
3263
3263
  default: SecretStoreCredentialProviderFactory,
3264
3264
  normalizeSecretStoreConfig: normalizeSecretStoreConfig
@@ -3307,14 +3307,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
3307
3307
  return new StaticCredentialProvider(resolved.credentialValue);
3308
3308
  }
3309
3309
  }
3310
- const FACTORY_META$14 = {
3310
+ const FACTORY_META$15 = {
3311
3311
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
3312
3312
  key: 'StaticCredentialProvider',
3313
3313
  };
3314
3314
 
3315
3315
  var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
3316
3316
  __proto__: null,
3317
- FACTORY_META: FACTORY_META$14,
3317
+ FACTORY_META: FACTORY_META$15,
3318
3318
  StaticCredentialProviderFactory: StaticCredentialProviderFactory,
3319
3319
  default: StaticCredentialProviderFactory,
3320
3320
  normalizeStaticConfig: normalizeStaticConfig
@@ -13420,6 +13420,7 @@ const MODULES = [
13420
13420
  "./security/policy/no-security-policy-factory.js",
13421
13421
  "./security/signing/eddsa-envelope-signer-factory.js",
13422
13422
  "./security/signing/eddsa-envelope-verifier-factory.js",
13423
+ "./security/trust-store/noop-trust-store-provider-factory.js",
13423
13424
  "./sentinel/capability-aware-routing-policy-factory.js",
13424
13425
  "./sentinel/composite-routing-policy-factory.js",
13425
13426
  "./sentinel/hybrid-path-routing-policy-factory.js",
@@ -13494,6 +13495,7 @@ const MODULE_LOADERS = {
13494
13495
  "./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
13495
13496
  "./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
13496
13497
  "./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
13498
+ "./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
13497
13499
  "./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
13498
13500
  "./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
13499
13501
  "./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
@@ -13798,7 +13800,7 @@ class NodeLikeFactory extends AbstractResourceFactory {
13798
13800
  // registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
13799
13801
  // }
13800
13802
 
13801
- const FACTORY_META$13 = {
13803
+ const FACTORY_META$14 = {
13802
13804
  base: NODE_LIKE_FACTORY_BASE_TYPE,
13803
13805
  key: 'Node',
13804
13806
  };
@@ -13839,7 +13841,7 @@ class NodeFactory extends NodeLikeFactory {
13839
13841
 
13840
13842
  var nodeFactory = /*#__PURE__*/Object.freeze({
13841
13843
  __proto__: null,
13842
- FACTORY_META: FACTORY_META$13,
13844
+ FACTORY_META: FACTORY_META$14,
13843
13845
  NodeFactory: NodeFactory,
13844
13846
  default: NodeFactory
13845
13847
  });
@@ -15280,7 +15282,7 @@ class RouteStoreFactory extends AbstractResourceFactory {
15280
15282
  return store ?? null;
15281
15283
  }
15282
15284
  }
15283
- const FACTORY_META$12 = {
15285
+ const FACTORY_META$13 = {
15284
15286
  base: ROUTE_STORE_FACTORY_BASE_TYPE,
15285
15287
  key: 'InMemoryRouteStore',
15286
15288
  };
@@ -15298,7 +15300,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
15298
15300
 
15299
15301
  var routeStoreFactory = /*#__PURE__*/Object.freeze({
15300
15302
  __proto__: null,
15301
- FACTORY_META: FACTORY_META$12,
15303
+ FACTORY_META: FACTORY_META$13,
15302
15304
  InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
15303
15305
  ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
15304
15306
  RouteStoreFactory: RouteStoreFactory,
@@ -19114,7 +19116,7 @@ function isPlainRecord(value) {
19114
19116
  return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
19115
19117
  }
19116
19118
 
19117
- const FACTORY_META$11 = {
19119
+ const FACTORY_META$12 = {
19118
19120
  base: NODE_LIKE_FACTORY_BASE_TYPE,
19119
19121
  key: 'Sentinel',
19120
19122
  };
@@ -19298,7 +19300,7 @@ class SentinelFactory extends NodeLikeFactory {
19298
19300
 
19299
19301
  var sentinelFactory = /*#__PURE__*/Object.freeze({
19300
19302
  __proto__: null,
19301
- FACTORY_META: FACTORY_META$11,
19303
+ FACTORY_META: FACTORY_META$12,
19302
19304
  SentinelFactory: SentinelFactory,
19303
19305
  default: SentinelFactory
19304
19306
  });
@@ -20449,6 +20451,45 @@ class CertificateManagerFactory extends AbstractResourceFactory {
20449
20451
  }
20450
20452
  }
20451
20453
 
20454
+ const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
20455
+ const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
20456
+ class TrustStoreProviderFactory extends AbstractResourceFactory {
20457
+ createUnconfiguredProvider(reason) {
20458
+ return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
20459
+ }
20460
+ static async createTrustStoreProvider(config, options = {}) {
20461
+ const { dependencies, factoryArgs, ...restOptions } = options;
20462
+ const mergedFactoryArgs = [
20463
+ ...(dependencies ? [dependencies] : []),
20464
+ ...(factoryArgs ?? []),
20465
+ ];
20466
+ const creationOptions = {
20467
+ ...restOptions,
20468
+ factoryArgs: mergedFactoryArgs,
20469
+ };
20470
+ if (config) {
20471
+ const instance = await createResource$1(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
20472
+ return instance ?? new NoopTrustStoreProvider();
20473
+ }
20474
+ const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
20475
+ return instance ?? new NoopTrustStoreProvider();
20476
+ }
20477
+ }
20478
+ class NoopTrustStoreProvider {
20479
+ constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
20480
+ this.reason = reason;
20481
+ }
20482
+ async getTrustStorePem() {
20483
+ throw new Error(this.reason);
20484
+ }
20485
+ async getRoots() {
20486
+ return [];
20487
+ }
20488
+ async initialize() {
20489
+ // No-op for the placeholder provider.
20490
+ }
20491
+ }
20492
+
20452
20493
  const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
20453
20494
  class EncryptionManagerFactory extends AbstractResourceFactory {
20454
20495
  getPriority() {
@@ -25265,6 +25306,146 @@ function encodeUtf8(value) {
25265
25306
  throw new Error('No UTF-8 encoder available in this environment');
25266
25307
  }
25267
25308
 
25309
+ if (!hashes.sha512) {
25310
+ hashes.sha512 = (message) => sha512(message);
25311
+ }
25312
+ function normalizeSignerOptions(options) {
25313
+ if (!options || typeof options !== 'object') {
25314
+ return {};
25315
+ }
25316
+ const candidate = options;
25317
+ const result = {
25318
+ ...options,
25319
+ };
25320
+ const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
25321
+ if (cryptoProvider !== undefined) {
25322
+ result.cryptoProvider = cryptoProvider ?? null;
25323
+ }
25324
+ const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
25325
+ if (signingConfig !== undefined) {
25326
+ result.signingConfig = signingConfig;
25327
+ }
25328
+ const privateKeyPem = resolveAlias(candidate, [
25329
+ 'privateKeyPem',
25330
+ 'private_key_pem',
25331
+ ]);
25332
+ if (privateKeyPem !== undefined) {
25333
+ result.privateKeyPem = privateKeyPem;
25334
+ }
25335
+ const keyId = resolveAlias(candidate, [
25336
+ 'keyId',
25337
+ 'key_id',
25338
+ ]);
25339
+ if (keyId !== undefined) {
25340
+ result.keyId = keyId;
25341
+ }
25342
+ return result;
25343
+ }
25344
+ class EdDSAEnvelopeSigner {
25345
+ constructor(options = {}) {
25346
+ const normalized = normalizeSignerOptions(options);
25347
+ const provider = normalized.cryptoProvider ?? null;
25348
+ if (!provider) {
25349
+ throw new Error('No crypto provider is configured for signing');
25350
+ }
25351
+ this.crypto = provider;
25352
+ const signingConfigOption = normalized.signingConfig;
25353
+ if (signingConfigOption instanceof SigningConfig) {
25354
+ this.signingConfig = signingConfigOption;
25355
+ }
25356
+ else if (signingConfigOption) {
25357
+ this.signingConfig = new SigningConfig(signingConfigOption);
25358
+ }
25359
+ else {
25360
+ this.signingConfig = new SigningConfig();
25361
+ }
25362
+ this.explicitPrivateKey = normalized.privateKeyPem;
25363
+ this.explicitKeyId = normalized.keyId;
25364
+ }
25365
+ signEnvelope(envelope, { physicalPath }) {
25366
+ if (!envelope.sid) {
25367
+ throw new Error('Envelope missing sid');
25368
+ }
25369
+ const frame = envelope.frame;
25370
+ if (frame.type === 'Data') {
25371
+ const dataFrame = frame;
25372
+ if (!dataFrame.pd) {
25373
+ const payload = dataFrame.payload ?? '';
25374
+ const payloadString = payload === '' ? '' : canonicalJson(payload);
25375
+ dataFrame.pd = secureDigest(payloadString);
25376
+ }
25377
+ }
25378
+ const digest = frameDigest(frame);
25379
+ const immutable = canonicalJson(immutableHeaders(envelope));
25380
+ const sidDigest = secureDigest(physicalPath);
25381
+ const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
25382
+ 1 +
25383
+ encodeUtf8(immutable).length +
25384
+ 1 +
25385
+ encodeUtf8(digest).length);
25386
+ const sidBytes = encodeUtf8(sidDigest);
25387
+ const immBytes = encodeUtf8(immutable);
25388
+ const digBytes = encodeUtf8(digest);
25389
+ let offset = 0;
25390
+ tbs.set(sidBytes, offset);
25391
+ offset += sidBytes.length;
25392
+ tbs[offset] = 0x1f;
25393
+ offset += 1;
25394
+ tbs.set(immBytes, offset);
25395
+ offset += immBytes.length;
25396
+ tbs[offset] = 0x1f;
25397
+ offset += 1;
25398
+ tbs.set(digBytes, offset);
25399
+ const privateKey = this.loadPrivateKey();
25400
+ const signatureBytes = sign(tbs, privateKey);
25401
+ const signature = urlsafeBase64Encode(signatureBytes);
25402
+ const kid = this.determineKeyId();
25403
+ const signatureHeader = {
25404
+ kid,
25405
+ val: signature,
25406
+ alg: 'EdDSA',
25407
+ };
25408
+ const secHeader = envelope.sec ?? {};
25409
+ secHeader.sig = signatureHeader;
25410
+ envelope.sec = secHeader;
25411
+ return envelope;
25412
+ }
25413
+ loadPrivateKey() {
25414
+ const pem = this.explicitPrivateKey ??
25415
+ readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
25416
+ if (!pem) {
25417
+ throw new Error('Crypto provider does not expose a signing private key');
25418
+ }
25419
+ return parseEd25519PrivateKey(pem);
25420
+ }
25421
+ determineKeyId() {
25422
+ if (this.explicitKeyId) {
25423
+ return this.explicitKeyId;
25424
+ }
25425
+ if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
25426
+ const certificateProvider = this
25427
+ .crypto;
25428
+ const jwk = certificateProvider.nodeJwk?.();
25429
+ if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
25430
+ const kid = jwk.kid;
25431
+ if (typeof kid === 'string' && kid.length > 0) {
25432
+ return kid;
25433
+ }
25434
+ }
25435
+ }
25436
+ const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
25437
+ if (!fallback) {
25438
+ throw new Error('Crypto provider does not expose a signature key id');
25439
+ }
25440
+ return fallback;
25441
+ }
25442
+ }
25443
+
25444
+ var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
25445
+ __proto__: null,
25446
+ EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
25447
+ });
25448
+
25268
25449
  const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
25269
25450
  let joseModulePromise = null;
25270
25451
  async function requireJose() {
@@ -26868,7 +27049,7 @@ const PROFILE_MAP$4 = {
26868
27049
  [PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
26869
27050
  [PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
26870
27051
  };
26871
- const FACTORY_META$10 = {
27052
+ const FACTORY_META$11 = {
26872
27053
  base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
26873
27054
  key: 'SecurityProfile',
26874
27055
  };
@@ -26994,7 +27175,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
26994
27175
  ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
26995
27176
  ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
26996
27177
  ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
26997
- FACTORY_META: FACTORY_META$10,
27178
+ FACTORY_META: FACTORY_META$11,
26998
27179
  NodeSecurityProfileFactory: NodeSecurityProfileFactory,
26999
27180
  PROFILE_NAME_GATED: PROFILE_NAME_GATED,
27000
27181
  PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
@@ -27123,7 +27304,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
27123
27304
  }
27124
27305
  }
27125
27306
 
27126
- const FACTORY_META$$ = {
27307
+ const FACTORY_META$10 = {
27127
27308
  base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
27128
27309
  key: 'SimpleLoadBalancerStickinessManager',
27129
27310
  };
@@ -27147,7 +27328,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
27147
27328
 
27148
27329
  var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
27149
27330
  __proto__: null,
27150
- FACTORY_META: FACTORY_META$$,
27331
+ FACTORY_META: FACTORY_META$10,
27151
27332
  SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
27152
27333
  default: SimpleLoadBalancerStickinessManagerFactory
27153
27334
  });
@@ -27625,7 +27806,7 @@ class WelcomeServiceFactory extends AbstractResourceFactory {
27625
27806
  }
27626
27807
  }
27627
27808
 
27628
- const FACTORY_META$_ = {
27809
+ const FACTORY_META$$ = {
27629
27810
  base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
27630
27811
  key: 'DefaultWelcomeService',
27631
27812
  };
@@ -27706,7 +27887,7 @@ function resolveConfigEntry(source, keys) {
27706
27887
  var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
27707
27888
  __proto__: null,
27708
27889
  DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
27709
- FACTORY_META: FACTORY_META$_,
27890
+ FACTORY_META: FACTORY_META$$,
27710
27891
  default: DefaultWelcomeServiceFactory
27711
27892
  });
27712
27893
 
@@ -28139,7 +28320,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
28139
28320
  }
28140
28321
  }
28141
28322
 
28142
- const FACTORY_META$Z = {
28323
+ const FACTORY_META$_ = {
28143
28324
  base: TRACE_EMITTER_FACTORY_BASE_TYPE,
28144
28325
  key: 'NoopTraceEmitter',
28145
28326
  };
@@ -28157,7 +28338,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
28157
28338
 
28158
28339
  var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
28159
28340
  __proto__: null,
28160
- FACTORY_META: FACTORY_META$Z,
28341
+ FACTORY_META: FACTORY_META$_,
28161
28342
  NoopTraceEmitterFactory: NoopTraceEmitterFactory,
28162
28343
  default: NoopTraceEmitterFactory
28163
28344
  });
@@ -28412,7 +28593,7 @@ function getOtelApiModule() {
28412
28593
  }
28413
28594
  return otelApiModulePromise;
28414
28595
  }
28415
- const FACTORY_META$Y = {
28596
+ const FACTORY_META$Z = {
28416
28597
  base: TRACE_EMITTER_FACTORY_BASE_TYPE,
28417
28598
  key: 'OpenTelemetryTraceEmitter',
28418
28599
  };
@@ -28582,7 +28763,7 @@ function extractHeaders(value) {
28582
28763
 
28583
28764
  var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
28584
28765
  __proto__: null,
28585
- FACTORY_META: FACTORY_META$Y,
28766
+ FACTORY_META: FACTORY_META$Z,
28586
28767
  OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
28587
28768
  default: OpenTelemetryTraceEmitterFactory
28588
28769
  });
@@ -28603,7 +28784,7 @@ const PROFILE_MAP$3 = {
28603
28784
  [PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
28604
28785
  [PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
28605
28786
  };
28606
- const FACTORY_META$X = {
28787
+ const FACTORY_META$Y = {
28607
28788
  base: TRACE_EMITTER_FACTORY_BASE_TYPE,
28608
28789
  key: 'TraceEmitterProfile',
28609
28790
  };
@@ -28683,7 +28864,7 @@ function deepClone$2(value) {
28683
28864
 
28684
28865
  var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
28685
28866
  __proto__: null,
28686
- FACTORY_META: FACTORY_META$X,
28867
+ FACTORY_META: FACTORY_META$Y,
28687
28868
  PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
28688
28869
  PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
28689
28870
  TraceEmitterProfileFactory: TraceEmitterProfileFactory,
@@ -28698,7 +28879,7 @@ class BroadcastChannelConnectionGrantImpl {
28698
28879
  this.purpose = 'connection';
28699
28880
  }
28700
28881
  }
28701
- const FACTORY_META$W = {
28882
+ const FACTORY_META$X = {
28702
28883
  base: CONNECTOR_FACTORY_BASE_TYPE,
28703
28884
  key: BROADCAST_CHANNEL_CONNECTOR_TYPE,
28704
28885
  };
@@ -28846,7 +29027,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
28846
29027
  var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
28847
29028
  __proto__: null,
28848
29029
  BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
28849
- FACTORY_META: FACTORY_META$W,
29030
+ FACTORY_META: FACTORY_META$X,
28850
29031
  default: BroadcastChannelConnectorFactory
28851
29032
  });
28852
29033
 
@@ -28882,7 +29063,7 @@ function normalizeConfig$q(config) {
28882
29063
  inboxCapacity,
28883
29064
  };
28884
29065
  }
28885
- const FACTORY_META$V = {
29066
+ const FACTORY_META$W = {
28886
29067
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
28887
29068
  key: 'BroadcastChannelListener',
28888
29069
  };
@@ -28908,7 +29089,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
28908
29089
  var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
28909
29090
  __proto__: null,
28910
29091
  BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
28911
- FACTORY_META: FACTORY_META$V,
29092
+ FACTORY_META: FACTORY_META$W,
28912
29093
  default: BroadcastChannelListenerFactory
28913
29094
  });
28914
29095
 
@@ -28973,7 +29154,7 @@ function normalizeConfig$p(config) {
28973
29154
  authorizer: authorizerValue,
28974
29155
  };
28975
29156
  }
28976
- const FACTORY_META$U = {
29157
+ const FACTORY_META$V = {
28977
29158
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
28978
29159
  key: 'HttpListener',
28979
29160
  };
@@ -29020,7 +29201,7 @@ class HttpListenerFactory extends TransportListenerFactory {
29020
29201
 
29021
29202
  var httpListenerFactory = /*#__PURE__*/Object.freeze({
29022
29203
  __proto__: null,
29023
- FACTORY_META: FACTORY_META$U,
29204
+ FACTORY_META: FACTORY_META$V,
29024
29205
  HttpListenerFactory: HttpListenerFactory,
29025
29206
  default: HttpListenerFactory
29026
29207
  });
@@ -29145,7 +29326,7 @@ class HttpConnectionGrantImpl {
29145
29326
  this.purpose = 'connection';
29146
29327
  }
29147
29328
  }
29148
- const FACTORY_META$T = {
29329
+ const FACTORY_META$U = {
29149
29330
  base: CONNECTOR_FACTORY_BASE_TYPE,
29150
29331
  key: HTTP_STATELESS_CONNECTOR_TYPE,
29151
29332
  };
@@ -29314,7 +29495,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
29314
29495
 
29315
29496
  var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
29316
29497
  __proto__: null,
29317
- FACTORY_META: FACTORY_META$T,
29498
+ FACTORY_META: FACTORY_META$U,
29318
29499
  HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
29319
29500
  default: HttpStatelessConnectorFactory
29320
29501
  });
@@ -29327,7 +29508,7 @@ class InPageConnectionGrantImpl {
29327
29508
  this.purpose = 'connection';
29328
29509
  }
29329
29510
  }
29330
- const FACTORY_META$S = {
29511
+ const FACTORY_META$T = {
29331
29512
  base: CONNECTOR_FACTORY_BASE_TYPE,
29332
29513
  key: INPAGE_CONNECTOR_TYPE,
29333
29514
  };
@@ -29476,7 +29657,7 @@ class InPageConnectorFactory extends ConnectorFactory {
29476
29657
 
29477
29658
  var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
29478
29659
  __proto__: null,
29479
- FACTORY_META: FACTORY_META$S,
29660
+ FACTORY_META: FACTORY_META$T,
29480
29661
  InPageConnectorFactory: InPageConnectorFactory,
29481
29662
  default: InPageConnectorFactory
29482
29663
  });
@@ -29513,7 +29694,7 @@ function normalizeConfig$o(config) {
29513
29694
  inboxCapacity,
29514
29695
  };
29515
29696
  }
29516
- const FACTORY_META$R = {
29697
+ const FACTORY_META$S = {
29517
29698
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
29518
29699
  key: 'InPageListener',
29519
29700
  };
@@ -29538,7 +29719,7 @@ class InPageListenerFactory extends TransportListenerFactory {
29538
29719
 
29539
29720
  var inpageListenerFactory = /*#__PURE__*/Object.freeze({
29540
29721
  __proto__: null,
29541
- FACTORY_META: FACTORY_META$R,
29722
+ FACTORY_META: FACTORY_META$S,
29542
29723
  InPageListenerFactory: InPageListenerFactory,
29543
29724
  default: InPageListenerFactory
29544
29725
  });
@@ -29554,7 +29735,7 @@ class WebSocketConnectionGrantImpl {
29554
29735
  this.purpose = 'connection';
29555
29736
  }
29556
29737
  }
29557
- const FACTORY_META$Q = {
29738
+ const FACTORY_META$R = {
29558
29739
  base: CONNECTOR_FACTORY_BASE_TYPE,
29559
29740
  key: 'WebSocketConnector',
29560
29741
  };
@@ -29925,7 +30106,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
29925
30106
 
29926
30107
  var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
29927
30108
  __proto__: null,
29928
- FACTORY_META: FACTORY_META$Q,
30109
+ FACTORY_META: FACTORY_META$R,
29929
30110
  WebSocketConnectorFactory: WebSocketConnectorFactory,
29930
30111
  default: WebSocketConnectorFactory,
29931
30112
  setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
@@ -29995,7 +30176,7 @@ function normalizeConfig$n(config) {
29995
30176
  authorizer: authorizerValue,
29996
30177
  };
29997
30178
  }
29998
- const FACTORY_META$P = {
30179
+ const FACTORY_META$Q = {
29999
30180
  base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
30000
30181
  key: 'WebSocketListener',
30001
30182
  };
@@ -30039,7 +30220,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
30039
30220
 
30040
30221
  var websocketListenerFactory = /*#__PURE__*/Object.freeze({
30041
30222
  __proto__: null,
30042
- FACTORY_META: FACTORY_META$P,
30223
+ FACTORY_META: FACTORY_META$Q,
30043
30224
  WebSocketListenerFactory: WebSocketListenerFactory,
30044
30225
  default: WebSocketListenerFactory
30045
30226
  });
@@ -30207,7 +30388,7 @@ function withOption(source, keys) {
30207
30388
  [camelKey]: value,
30208
30389
  };
30209
30390
  }
30210
- const FACTORY_META$O = {
30391
+ const FACTORY_META$P = {
30211
30392
  base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
30212
30393
  key: 'AtLeastOnceDeliveryPolicy',
30213
30394
  };
@@ -30215,7 +30396,7 @@ const FACTORY_META$O = {
30215
30396
  var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
30216
30397
  __proto__: null,
30217
30398
  AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
30218
- FACTORY_META: FACTORY_META$O,
30399
+ FACTORY_META: FACTORY_META$P,
30219
30400
  default: AtLeastOnceDeliveryPolicyFactory
30220
30401
  });
30221
30402
 
@@ -30242,7 +30423,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
30242
30423
  }
30243
30424
  registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
30244
30425
  registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
30245
- const FACTORY_META$N = {
30426
+ const FACTORY_META$O = {
30246
30427
  base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
30247
30428
  key: 'AtMostOnceDeliveryPolicy',
30248
30429
  };
@@ -30250,7 +30431,7 @@ const FACTORY_META$N = {
30250
30431
  var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
30251
30432
  __proto__: null,
30252
30433
  AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
30253
- FACTORY_META: FACTORY_META$N,
30434
+ FACTORY_META: FACTORY_META$O,
30254
30435
  default: AtMostOnceDeliveryPolicyFactory
30255
30436
  });
30256
30437
 
@@ -30343,7 +30524,7 @@ function resolveProfileConfig$1(profileName) {
30343
30524
  function deepClone$1(value) {
30344
30525
  return JSON.parse(JSON.stringify(value));
30345
30526
  }
30346
- const FACTORY_META$M = {
30527
+ const FACTORY_META$N = {
30347
30528
  base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
30348
30529
  key: 'DeliveryProfile',
30349
30530
  };
@@ -30351,7 +30532,7 @@ const FACTORY_META$M = {
30351
30532
  var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
30352
30533
  __proto__: null,
30353
30534
  DeliveryProfileFactory: DeliveryProfileFactory,
30354
- FACTORY_META: FACTORY_META$M,
30535
+ FACTORY_META: FACTORY_META$N,
30355
30536
  PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
30356
30537
  PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
30357
30538
  default: DeliveryProfileFactory
@@ -30541,7 +30722,7 @@ function normalizeServiceName(value) {
30541
30722
 
30542
30723
  // import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
30543
30724
  const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
30544
- const FACTORY_META$L = {
30725
+ const FACTORY_META$M = {
30545
30726
  base: FAME_FABRIC_FACTORY_BASE_TYPE,
30546
30727
  key: 'InProcessFameFabric',
30547
30728
  };
@@ -30561,7 +30742,7 @@ class InProcessFameFabricFactory extends FameFabricFactory {
30561
30742
 
30562
30743
  var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
30563
30744
  __proto__: null,
30564
- FACTORY_META: FACTORY_META$L,
30745
+ FACTORY_META: FACTORY_META$M,
30565
30746
  FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
30566
30747
  InProcessFameFabricFactory: InProcessFameFabricFactory,
30567
30748
  default: InProcessFameFabricFactory
@@ -30790,7 +30971,7 @@ const PROFILE_MAP$1 = {
30790
30971
  [PROFILE_NAME_NOOP]: NOOP_PROFILE,
30791
30972
  [PROFILE_NAME_NONE]: NOOP_PROFILE,
30792
30973
  };
30793
- const FACTORY_META$K = {
30974
+ const FACTORY_META$L = {
30794
30975
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
30795
30976
  key: 'AdmissionProfile',
30796
30977
  };
@@ -30837,7 +31018,7 @@ function deepClone(value) {
30837
31018
  var admissionProfileFactory = /*#__PURE__*/Object.freeze({
30838
31019
  __proto__: null,
30839
31020
  AdmissionProfileFactory: AdmissionProfileFactory,
30840
- FACTORY_META: FACTORY_META$K,
31021
+ FACTORY_META: FACTORY_META$L,
30841
31022
  default: AdmissionProfileFactory
30842
31023
  });
30843
31024
 
@@ -30919,7 +31100,7 @@ function cloneGrant(grant) {
30919
31100
  return JSON.parse(JSON.stringify(grant));
30920
31101
  }
30921
31102
 
30922
- const FACTORY_META$J = {
31103
+ const FACTORY_META$K = {
30923
31104
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
30924
31105
  key: 'DirectAdmissionClient',
30925
31106
  };
@@ -30971,11 +31152,11 @@ function normalizeConfig$l(config) {
30971
31152
  var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
30972
31153
  __proto__: null,
30973
31154
  DirectAdmissionClientFactory: DirectAdmissionClientFactory,
30974
- FACTORY_META: FACTORY_META$J,
31155
+ FACTORY_META: FACTORY_META$K,
30975
31156
  default: DirectAdmissionClientFactory
30976
31157
  });
30977
31158
 
30978
- const FACTORY_META$I = {
31159
+ const FACTORY_META$J = {
30979
31160
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
30980
31161
  key: 'NoopAdmissionClient',
30981
31162
  };
@@ -31024,7 +31205,7 @@ function normalizeConfig$k(config, factoryArgs) {
31024
31205
 
31025
31206
  var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
31026
31207
  __proto__: null,
31027
- FACTORY_META: FACTORY_META$I,
31208
+ FACTORY_META: FACTORY_META$J,
31028
31209
  NoopAdmissionClientFactory: NoopAdmissionClientFactory,
31029
31210
  default: NoopAdmissionClientFactory
31030
31211
  });
@@ -31039,7 +31220,7 @@ class NoAuthInjectionStrategy {
31039
31220
  }
31040
31221
  }
31041
31222
 
31042
- const FACTORY_META$H = {
31223
+ const FACTORY_META$I = {
31043
31224
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
31044
31225
  key: 'NoAuth',
31045
31226
  };
@@ -31068,7 +31249,7 @@ function normalizeConfig$j(config) {
31068
31249
 
31069
31250
  var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
31070
31251
  __proto__: null,
31071
- FACTORY_META: FACTORY_META$H,
31252
+ FACTORY_META: FACTORY_META$I,
31072
31253
  NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
31073
31254
  default: NoAuthInjectionStrategyFactory
31074
31255
  });
@@ -31217,7 +31398,7 @@ function convertKeysToCamelCase(value) {
31217
31398
  return result;
31218
31399
  }
31219
31400
 
31220
- const FACTORY_META$G = {
31401
+ const FACTORY_META$H = {
31221
31402
  base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
31222
31403
  key: 'WelcomeServiceClient',
31223
31404
  };
@@ -31287,7 +31468,7 @@ async function createAuthStrategy(config) {
31287
31468
 
31288
31469
  var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
31289
31470
  __proto__: null,
31290
- FACTORY_META: FACTORY_META$G,
31471
+ FACTORY_META: FACTORY_META$H,
31291
31472
  WelcomeServiceClientFactory: WelcomeServiceClientFactory,
31292
31473
  default: WelcomeServiceClientFactory
31293
31474
  });
@@ -31405,7 +31586,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
31405
31586
  });
31406
31587
  }
31407
31588
  }
31408
- const FACTORY_META$F = {
31589
+ const FACTORY_META$G = {
31409
31590
  base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
31410
31591
  key: 'StaticNodePlacementStrategy',
31411
31592
  };
@@ -31415,7 +31596,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
31415
31596
 
31416
31597
  var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
31417
31598
  __proto__: null,
31418
- FACTORY_META: FACTORY_META$F,
31599
+ FACTORY_META: FACTORY_META$G,
31419
31600
  StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
31420
31601
  default: StaticNodePlacementStrategyFactory
31421
31602
  });
@@ -31574,7 +31755,7 @@ function connectorTypeName(connector) {
31574
31755
  return typeof connector;
31575
31756
  }
31576
31757
 
31577
- const FACTORY_META$E = {
31758
+ const FACTORY_META$F = {
31578
31759
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
31579
31760
  key: 'BearerTokenHeaderAuth',
31580
31761
  };
@@ -31615,7 +31796,7 @@ function normalizeConfig$g(config) {
31615
31796
  var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
31616
31797
  __proto__: null,
31617
31798
  BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
31618
- FACTORY_META: FACTORY_META$E,
31799
+ FACTORY_META: FACTORY_META$F,
31619
31800
  default: BearerTokenHeaderAuthInjectionStrategyFactory
31620
31801
  });
31621
31802
 
@@ -31642,7 +31823,7 @@ function normalizeConfig$f(config) {
31642
31823
  function isTokenVerifier(candidate) {
31643
31824
  return Boolean(candidate && typeof candidate.verify === 'function');
31644
31825
  }
31645
- const FACTORY_META$D = {
31826
+ const FACTORY_META$E = {
31646
31827
  base: AUTHORIZER_FACTORY_BASE_TYPE,
31647
31828
  key: 'DefaultAuthorizer',
31648
31829
  };
@@ -31672,7 +31853,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
31672
31853
  var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
31673
31854
  __proto__: null,
31674
31855
  DefaultAuthorizerFactory: DefaultAuthorizerFactory,
31675
- FACTORY_META: FACTORY_META$D,
31856
+ FACTORY_META: FACTORY_META$E,
31676
31857
  default: DefaultAuthorizerFactory
31677
31858
  });
31678
31859
 
@@ -31683,7 +31864,7 @@ function getJwksJwtTokenVerifierModule() {
31683
31864
  }
31684
31865
  return jwksJwtTokenVerifierModulePromise;
31685
31866
  }
31686
- const FACTORY_META$C = {
31867
+ const FACTORY_META$D = {
31687
31868
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
31688
31869
  key: 'JWKSJWTTokenVerifier',
31689
31870
  };
@@ -31745,12 +31926,12 @@ function normalizeConfig$e(config) {
31745
31926
 
31746
31927
  var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
31747
31928
  __proto__: null,
31748
- FACTORY_META: FACTORY_META$C,
31929
+ FACTORY_META: FACTORY_META$D,
31749
31930
  JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
31750
31931
  default: JWKSTokenVerifierFactory
31751
31932
  });
31752
31933
 
31753
- const FACTORY_META$B = {
31934
+ const FACTORY_META$C = {
31754
31935
  base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
31755
31936
  key: 'JWTTokenIssuer',
31756
31937
  };
@@ -31947,12 +32128,12 @@ function getProviderKeyId(provider) {
31947
32128
 
31948
32129
  var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
31949
32130
  __proto__: null,
31950
- FACTORY_META: FACTORY_META$B,
32131
+ FACTORY_META: FACTORY_META$C,
31951
32132
  JWTTokenIssuerFactory: JWTTokenIssuerFactory,
31952
32133
  default: JWTTokenIssuerFactory
31953
32134
  });
31954
32135
 
31955
- const FACTORY_META$A = {
32136
+ const FACTORY_META$B = {
31956
32137
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
31957
32138
  key: 'JWTTokenVerifier',
31958
32139
  };
@@ -32120,7 +32301,7 @@ function getProviderVerificationKey(provider) {
32120
32301
 
32121
32302
  var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
32122
32303
  __proto__: null,
32123
- FACTORY_META: FACTORY_META$A,
32304
+ FACTORY_META: FACTORY_META$B,
32124
32305
  JWTTokenVerifierFactory: JWTTokenVerifierFactory,
32125
32306
  default: JWTTokenVerifierFactory
32126
32307
  });
@@ -32136,7 +32317,7 @@ class NoneTokenProvider {
32136
32317
  }
32137
32318
  }
32138
32319
 
32139
- const FACTORY_META$z = {
32320
+ const FACTORY_META$A = {
32140
32321
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
32141
32322
  key: 'NoneTokenProvider',
32142
32323
  };
@@ -32153,7 +32334,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
32153
32334
 
32154
32335
  var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
32155
32336
  __proto__: null,
32156
- FACTORY_META: FACTORY_META$z,
32337
+ FACTORY_META: FACTORY_META$A,
32157
32338
  NoneTokenProviderFactory: NoneTokenProviderFactory,
32158
32339
  default: NoneTokenProviderFactory
32159
32340
  });
@@ -32205,7 +32386,7 @@ class NoopAuthorizer {
32205
32386
  }
32206
32387
  }
32207
32388
 
32208
- const FACTORY_META$y = {
32389
+ const FACTORY_META$z = {
32209
32390
  base: AUTHORIZER_FACTORY_BASE_TYPE,
32210
32391
  key: 'NoopAuthorizer',
32211
32392
  };
@@ -32221,7 +32402,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
32221
32402
 
32222
32403
  var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
32223
32404
  __proto__: null,
32224
- FACTORY_META: FACTORY_META$y,
32405
+ FACTORY_META: FACTORY_META$z,
32225
32406
  NoopAuthorizerFactory: NoopAuthorizerFactory,
32226
32407
  default: NoopAuthorizerFactory
32227
32408
  });
@@ -32235,7 +32416,7 @@ class NoopTokenIssuer {
32235
32416
  }
32236
32417
  }
32237
32418
 
32238
- const FACTORY_META$x = {
32419
+ const FACTORY_META$y = {
32239
32420
  base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
32240
32421
  key: 'NoopTokenIssuer',
32241
32422
  };
@@ -32251,7 +32432,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
32251
32432
 
32252
32433
  var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
32253
32434
  __proto__: null,
32254
- FACTORY_META: FACTORY_META$x,
32435
+ FACTORY_META: FACTORY_META$y,
32255
32436
  NoopTokenIssuerFactory: NoopTokenIssuerFactory,
32256
32437
  default: NoopTokenIssuerFactory
32257
32438
  });
@@ -32273,7 +32454,7 @@ class NoopTokenVerifier {
32273
32454
  }
32274
32455
  }
32275
32456
 
32276
- const FACTORY_META$w = {
32457
+ const FACTORY_META$x = {
32277
32458
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
32278
32459
  key: 'NoopTokenVerifier',
32279
32460
  };
@@ -32289,7 +32470,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
32289
32470
 
32290
32471
  var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
32291
32472
  __proto__: null,
32292
- FACTORY_META: FACTORY_META$w,
32473
+ FACTORY_META: FACTORY_META$x,
32293
32474
  NoopTokenVerifierFactory: NoopTokenVerifierFactory,
32294
32475
  default: NoopTokenVerifierFactory
32295
32476
  });
@@ -32302,7 +32483,7 @@ function getOAuth2AuthorizerModule() {
32302
32483
  }
32303
32484
  return oauth2AuthorizerModulePromise;
32304
32485
  }
32305
- const FACTORY_META$v = {
32486
+ const FACTORY_META$w = {
32306
32487
  base: AUTHORIZER_FACTORY_BASE_TYPE,
32307
32488
  key: 'OAuth2Authorizer',
32308
32489
  };
@@ -32447,7 +32628,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
32447
32628
 
32448
32629
  var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
32449
32630
  __proto__: null,
32450
- FACTORY_META: FACTORY_META$v,
32631
+ FACTORY_META: FACTORY_META$w,
32451
32632
  OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
32452
32633
  default: OAuth2AuthorizerFactory
32453
32634
  });
@@ -32487,7 +32668,7 @@ function normalizeConfig$a(config) {
32487
32668
  }
32488
32669
  return normalized;
32489
32670
  }
32490
- const FACTORY_META$u = {
32671
+ const FACTORY_META$v = {
32491
32672
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
32492
32673
  key: 'OAuth2ClientCredentialsTokenProvider',
32493
32674
  };
@@ -32518,7 +32699,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
32518
32699
 
32519
32700
  var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
32520
32701
  __proto__: null,
32521
- FACTORY_META: FACTORY_META$u,
32702
+ FACTORY_META: FACTORY_META$v,
32522
32703
  OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
32523
32704
  default: OAuth2ClientCredentialsTokenProviderFactory
32524
32705
  });
@@ -32600,7 +32781,7 @@ function normalizeConfig$9(config) {
32600
32781
  }
32601
32782
  return normalized;
32602
32783
  }
32603
- const FACTORY_META$t = {
32784
+ const FACTORY_META$u = {
32604
32785
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
32605
32786
  key: 'OAuth2PkceTokenProvider',
32606
32787
  };
@@ -32655,7 +32836,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
32655
32836
 
32656
32837
  var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
32657
32838
  __proto__: null,
32658
- FACTORY_META: FACTORY_META$t,
32839
+ FACTORY_META: FACTORY_META$u,
32659
32840
  OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
32660
32841
  default: OAuth2PkceTokenProviderFactory
32661
32842
  });
@@ -32705,7 +32886,7 @@ class QueryParamAuthInjectionStrategy {
32705
32886
  }
32706
32887
  }
32707
32888
 
32708
- const FACTORY_META$s = {
32889
+ const FACTORY_META$t = {
32709
32890
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
32710
32891
  key: 'QueryParamAuth',
32711
32892
  };
@@ -32745,7 +32926,7 @@ function normalizeConfig$8(config) {
32745
32926
 
32746
32927
  var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
32747
32928
  __proto__: null,
32748
- FACTORY_META: FACTORY_META$s,
32929
+ FACTORY_META: FACTORY_META$t,
32749
32930
  QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
32750
32931
  default: QueryParamAuthInjectionStrategyFactory
32751
32932
  });
@@ -32781,7 +32962,7 @@ function normalizeConfig$7(config) {
32781
32962
  secretConfig: normalizeSecretSource(secretSource),
32782
32963
  };
32783
32964
  }
32784
- const FACTORY_META$r = {
32965
+ const FACTORY_META$s = {
32785
32966
  base: AUTHORIZER_FACTORY_BASE_TYPE,
32786
32967
  key: 'SharedSecretAuthorizer',
32787
32968
  };
@@ -32800,7 +32981,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
32800
32981
 
32801
32982
  var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
32802
32983
  __proto__: null,
32803
- FACTORY_META: FACTORY_META$r,
32984
+ FACTORY_META: FACTORY_META$s,
32804
32985
  SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
32805
32986
  default: SharedSecretAuthorizerFactory
32806
32987
  });
@@ -32836,7 +33017,7 @@ function normalizeConfig$6(config) {
32836
33017
  secretConfig: normalizeSecretSource(secretSource),
32837
33018
  };
32838
33019
  }
32839
- const FACTORY_META$q = {
33020
+ const FACTORY_META$r = {
32840
33021
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
32841
33022
  key: 'SharedSecretTokenProvider',
32842
33023
  };
@@ -32855,7 +33036,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
32855
33036
 
32856
33037
  var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
32857
33038
  __proto__: null,
32858
- FACTORY_META: FACTORY_META$q,
33039
+ FACTORY_META: FACTORY_META$r,
32859
33040
  SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
32860
33041
  default: SharedSecretTokenProviderFactory
32861
33042
  });
@@ -32899,7 +33080,7 @@ function normalizeConfig$5(config) {
32899
33080
  }
32900
33081
  return normalized;
32901
33082
  }
32902
- const FACTORY_META$p = {
33083
+ const FACTORY_META$q = {
32903
33084
  base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
32904
33085
  key: 'SharedSecretTokenVerifier',
32905
33086
  };
@@ -32924,7 +33105,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
32924
33105
 
32925
33106
  var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
32926
33107
  __proto__: null,
32927
- FACTORY_META: FACTORY_META$p,
33108
+ FACTORY_META: FACTORY_META$q,
32928
33109
  SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
32929
33110
  default: SharedSecretTokenVerifierFactory
32930
33111
  });
@@ -33039,7 +33220,7 @@ function normalizeConfig$4(config) {
33039
33220
  }
33040
33221
  return options;
33041
33222
  }
33042
- const FACTORY_META$o = {
33223
+ const FACTORY_META$p = {
33043
33224
  base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
33044
33225
  key: 'StaticTokenProvider',
33045
33226
  };
@@ -33056,7 +33237,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
33056
33237
 
33057
33238
  var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
33058
33239
  __proto__: null,
33059
- FACTORY_META: FACTORY_META$o,
33240
+ FACTORY_META: FACTORY_META$p,
33060
33241
  StaticTokenProviderFactory: StaticTokenProviderFactory,
33061
33242
  default: StaticTokenProviderFactory
33062
33243
  });
@@ -33107,7 +33288,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
33107
33288
  }
33108
33289
  }
33109
33290
 
33110
- const FACTORY_META$n = {
33291
+ const FACTORY_META$o = {
33111
33292
  base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
33112
33293
  key: 'WebSocketSubprotocolAuth',
33113
33294
  };
@@ -33149,7 +33330,7 @@ function normalizeConfig$3(config) {
33149
33330
 
33150
33331
  var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
33151
33332
  __proto__: null,
33152
- FACTORY_META: FACTORY_META$n,
33333
+ FACTORY_META: FACTORY_META$o,
33153
33334
  WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
33154
33335
  default: WebSocketSubprotocolAuthInjectionStrategyFactory
33155
33336
  });
@@ -33197,7 +33378,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
33197
33378
  throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
33198
33379
  }
33199
33380
  }
33200
- const FACTORY_META$m = {
33381
+ const FACTORY_META$n = {
33201
33382
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
33202
33383
  key: 'DevFixedKeyCredentialProvider',
33203
33384
  };
@@ -33205,7 +33386,7 @@ const FACTORY_META$m = {
33205
33386
  var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
33206
33387
  __proto__: null,
33207
33388
  DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
33208
- FACTORY_META: FACTORY_META$m,
33389
+ FACTORY_META: FACTORY_META$n,
33209
33390
  default: DevFixedKeyCredentialProviderFactory,
33210
33391
  normalizeDevFixedConfig: normalizeDevFixedConfig
33211
33392
  });
@@ -33221,14 +33402,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
33221
33402
  return new NoneCredentialProvider();
33222
33403
  }
33223
33404
  }
33224
- const FACTORY_META$l = {
33405
+ const FACTORY_META$m = {
33225
33406
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
33226
33407
  key: 'NoneCredentialProvider',
33227
33408
  };
33228
33409
 
33229
33410
  var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
33230
33411
  __proto__: null,
33231
- FACTORY_META: FACTORY_META$l,
33412
+ FACTORY_META: FACTORY_META$m,
33232
33413
  NoneCredentialProviderFactory: NoneCredentialProviderFactory,
33233
33414
  default: NoneCredentialProviderFactory
33234
33415
  });
@@ -33266,14 +33447,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
33266
33447
  return new SessionKeyCredentialProvider(resolved.length);
33267
33448
  }
33268
33449
  }
33269
- const FACTORY_META$k = {
33450
+ const FACTORY_META$l = {
33270
33451
  base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
33271
33452
  key: 'SessionKeyCredentialProvider',
33272
33453
  };
33273
33454
 
33274
33455
  var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
33275
33456
  __proto__: null,
33276
- FACTORY_META: FACTORY_META$k,
33457
+ FACTORY_META: FACTORY_META$l,
33277
33458
  SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
33278
33459
  default: SessionKeyCredentialProviderFactory,
33279
33460
  normalizeSessionKeyConfig: normalizeSessionKeyConfig
@@ -33311,9 +33492,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
33311
33492
  ensureAlias('keyValidator', 'key_validator');
33312
33493
  ensureAlias('eventListeners', 'event_listeners');
33313
33494
  ensureAlias('cryptoProvider', 'crypto_provider');
33495
+ ensureAlias('trustStoreProvider', 'trust_store_provider');
33314
33496
  return normalized;
33315
33497
  }
33316
- const FACTORY_META$j = {
33498
+ const FACTORY_META$k = {
33317
33499
  base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
33318
33500
  key: 'DefaultSecurityManager',
33319
33501
  };
@@ -33359,6 +33541,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33359
33541
  const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
33360
33542
  const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
33361
33543
  const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
33544
+ const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
33362
33545
  const listenersSource = overrides?.eventListeners ??
33363
33546
  config.eventListeners ??
33364
33547
  config.event_listeners;
@@ -33378,10 +33561,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33378
33561
  secureChannelManager,
33379
33562
  eventListeners,
33380
33563
  cryptoProvider: cryptoProvider ?? null,
33564
+ trustStoreProvider: trustStoreProvider ?? null,
33381
33565
  };
33382
33566
  }
33383
33567
  static async buildSecurityManager(options) {
33384
- let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
33568
+ let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
33385
33569
  if (!keyStore) {
33386
33570
  keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
33387
33571
  }
@@ -33394,6 +33578,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33394
33578
  if (!policy) {
33395
33579
  throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
33396
33580
  }
33581
+ if (!trustStoreProvider) {
33582
+ trustStoreProvider =
33583
+ await TrustStoreProviderFactory.createTrustStoreProvider();
33584
+ }
33397
33585
  if (!keyManager) {
33398
33586
  keyManager =
33399
33587
  await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
@@ -33404,7 +33592,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33404
33592
  }
33405
33593
  if (!envelopeVerifier) {
33406
33594
  envelopeVerifier =
33407
- await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
33595
+ await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
33408
33596
  }
33409
33597
  if (!encryptionManager || !secureChannelManager) {
33410
33598
  const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
@@ -33504,7 +33692,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33504
33692
  throw error instanceof Error ? error : new Error(String(error));
33505
33693
  }
33506
33694
  }
33507
- static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
33695
+ static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
33508
33696
  const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
33509
33697
  if (verifierConfig &&
33510
33698
  DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
@@ -33528,7 +33716,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33528
33716
  }
33529
33717
  const signing = policy.signing ?? null;
33530
33718
  return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
33531
- factoryArgs: [keyManager, signing ?? null],
33719
+ factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
33532
33720
  });
33533
33721
  }
33534
33722
  catch (error) {
@@ -33769,11 +33957,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
33769
33957
  var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
33770
33958
  __proto__: null,
33771
33959
  DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
33772
- FACTORY_META: FACTORY_META$j,
33960
+ FACTORY_META: FACTORY_META$k,
33773
33961
  default: DefaultSecurityManagerFactory
33774
33962
  });
33775
33963
 
33776
- const FACTORY_META$i = {
33964
+ const FACTORY_META$j = {
33777
33965
  base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
33778
33966
  key: 'NoopEncryptionManager',
33779
33967
  };
@@ -33830,7 +34018,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
33830
34018
 
33831
34019
  var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
33832
34020
  __proto__: null,
33833
- FACTORY_META: FACTORY_META$i,
34021
+ FACTORY_META: FACTORY_META$j,
33834
34022
  NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
33835
34023
  default: NoopEncryptionManagerFactory
33836
34024
  });
@@ -33902,7 +34090,7 @@ class NoopSecureChannelManager {
33902
34090
  }
33903
34091
  }
33904
34092
 
33905
- const FACTORY_META$h = {
34093
+ const FACTORY_META$i = {
33906
34094
  base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
33907
34095
  key: 'NoopSecureChannelManager',
33908
34096
  };
@@ -33919,12 +34107,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
33919
34107
 
33920
34108
  var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
33921
34109
  __proto__: null,
33922
- FACTORY_META: FACTORY_META$h,
34110
+ FACTORY_META: FACTORY_META$i,
33923
34111
  NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
33924
34112
  default: NoopSecureChannelManagerFactory
33925
34113
  });
33926
34114
 
33927
- const FACTORY_META$g = {
34115
+ const FACTORY_META$h = {
33928
34116
  base: KEY_MANAGER_FACTORY_BASE_TYPE,
33929
34117
  key: 'DefaultKeyManager',
33930
34118
  };
@@ -33952,7 +34140,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
33952
34140
  var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
33953
34141
  __proto__: null,
33954
34142
  DefaultKeyManagerFactory: DefaultKeyManagerFactory,
33955
- FACTORY_META: FACTORY_META$g,
34143
+ FACTORY_META: FACTORY_META$h,
33956
34144
  default: DefaultKeyManagerFactory
33957
34145
  });
33958
34146
 
@@ -34137,7 +34325,7 @@ class InMemoryKeyStore extends KeyStore {
34137
34325
  }
34138
34326
  registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
34139
34327
 
34140
- const FACTORY_META$f = {
34328
+ const FACTORY_META$g = {
34141
34329
  base: KEY_STORE_FACTORY_BASE_TYPE,
34142
34330
  key: 'InMemoryKeyStore',
34143
34331
  };
@@ -34172,12 +34360,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
34172
34360
 
34173
34361
  var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
34174
34362
  __proto__: null,
34175
- FACTORY_META: FACTORY_META$f,
34363
+ FACTORY_META: FACTORY_META$g,
34176
34364
  InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
34177
34365
  default: InMemoryKeyStoreFactory
34178
34366
  });
34179
34367
 
34180
- const FACTORY_META$e = {
34368
+ const FACTORY_META$f = {
34181
34369
  base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
34182
34370
  key: 'NoopKeyValidator',
34183
34371
  };
@@ -34195,12 +34383,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
34195
34383
 
34196
34384
  var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
34197
34385
  __proto__: null,
34198
- FACTORY_META: FACTORY_META$e,
34386
+ FACTORY_META: FACTORY_META$f,
34199
34387
  NoopKeyValidatorFactory: NoopKeyValidatorFactory,
34200
34388
  default: NoopKeyValidatorFactory
34201
34389
  });
34202
34390
 
34203
- const FACTORY_META$d = {
34391
+ const FACTORY_META$e = {
34204
34392
  base: SECURITY_POLICY_FACTORY_BASE_TYPE,
34205
34393
  key: 'DefaultSecurityPolicy',
34206
34394
  };
@@ -34261,11 +34449,11 @@ function normalizeConfig$2(config) {
34261
34449
  var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
34262
34450
  __proto__: null,
34263
34451
  DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
34264
- FACTORY_META: FACTORY_META$d,
34452
+ FACTORY_META: FACTORY_META$e,
34265
34453
  default: DefaultSecurityPolicyFactory
34266
34454
  });
34267
34455
 
34268
- const FACTORY_META$c = {
34456
+ const FACTORY_META$d = {
34269
34457
  base: SECURITY_POLICY_FACTORY_BASE_TYPE,
34270
34458
  key: 'NoSecurityPolicy',
34271
34459
  };
@@ -34293,7 +34481,7 @@ function normalizeConfig$1(config) {
34293
34481
 
34294
34482
  var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
34295
34483
  __proto__: null,
34296
- FACTORY_META: FACTORY_META$c,
34484
+ FACTORY_META: FACTORY_META$d,
34297
34485
  NoSecurityPolicyFactory: NoSecurityPolicyFactory,
34298
34486
  default: NoSecurityPolicyFactory
34299
34487
  });
@@ -34308,7 +34496,7 @@ async function getEdDSAEnvelopeSignerModule() {
34308
34496
  }
34309
34497
  return eddsaEnvelopeSignerModulePromise;
34310
34498
  }
34311
- const FACTORY_META$b = {
34499
+ const FACTORY_META$c = {
34312
34500
  base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
34313
34501
  key: 'EdDSAEnvelopeSigner',
34314
34502
  };
@@ -34337,7 +34525,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
34337
34525
  var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
34338
34526
  __proto__: null,
34339
34527
  EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
34340
- FACTORY_META: FACTORY_META$b,
34528
+ FACTORY_META: FACTORY_META$c,
34341
34529
  default: EdDSAEnvelopeSignerFactory
34342
34530
  });
34343
34531
 
@@ -34351,7 +34539,7 @@ async function getEdDSAEnvelopeVerifierModule() {
34351
34539
  }
34352
34540
  return eddsaEnvelopeVerifierModulePromise;
34353
34541
  }
34354
- const FACTORY_META$a = {
34542
+ const FACTORY_META$b = {
34355
34543
  base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
34356
34544
  key: 'EdDSAEnvelopeVerifier',
34357
34545
  };
@@ -34377,10 +34565,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
34377
34565
  var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
34378
34566
  __proto__: null,
34379
34567
  EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
34380
- FACTORY_META: FACTORY_META$a,
34568
+ FACTORY_META: FACTORY_META$b,
34381
34569
  default: EdDSAEnvelopeVerifierFactory
34382
34570
  });
34383
34571
 
34572
+ const FACTORY_META$a = {
34573
+ base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
34574
+ key: "NoopTrustStoreProvider",
34575
+ isDefault: true,
34576
+ priority: 10,
34577
+ };
34578
+ class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
34579
+ constructor() {
34580
+ super(...arguments);
34581
+ this.type = "NoopTrustStoreProvider";
34582
+ this.isDefault = true;
34583
+ this.priority = 10;
34584
+ }
34585
+ async create(_config, ..._factoryArgs) {
34586
+ return new NoopTrustStoreProvider();
34587
+ }
34588
+ }
34589
+
34590
+ var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
34591
+ __proto__: null,
34592
+ FACTORY_META: FACTORY_META$a,
34593
+ NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
34594
+ default: NoopTrustStoreProviderFactory
34595
+ });
34596
+
34384
34597
  const FACTORY_META$9 = {
34385
34598
  base: ROUTING_POLICY_FACTORY_BASE,
34386
34599
  key: 'CapabilityAwareRoutingPolicy',
@@ -39370,146 +39583,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
39370
39583
  SharedSecretTokenVerifier: SharedSecretTokenVerifier
39371
39584
  });
39372
39585
 
39373
- if (!hashes.sha512) {
39374
- hashes.sha512 = (message) => sha512(message);
39375
- }
39376
- function normalizeSignerOptions(options) {
39377
- if (!options || typeof options !== 'object') {
39378
- return {};
39379
- }
39380
- const candidate = options;
39381
- const result = {
39382
- ...options,
39383
- };
39384
- const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
39385
- if (cryptoProvider !== undefined) {
39386
- result.cryptoProvider = cryptoProvider ?? null;
39387
- }
39388
- const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
39389
- if (signingConfig !== undefined) {
39390
- result.signingConfig = signingConfig;
39391
- }
39392
- const privateKeyPem = resolveAlias(candidate, [
39393
- 'privateKeyPem',
39394
- 'private_key_pem',
39395
- ]);
39396
- if (privateKeyPem !== undefined) {
39397
- result.privateKeyPem = privateKeyPem;
39398
- }
39399
- const keyId = resolveAlias(candidate, [
39400
- 'keyId',
39401
- 'key_id',
39402
- ]);
39403
- if (keyId !== undefined) {
39404
- result.keyId = keyId;
39405
- }
39406
- return result;
39407
- }
39408
- class EdDSAEnvelopeSigner {
39409
- constructor(options = {}) {
39410
- const normalized = normalizeSignerOptions(options);
39411
- const provider = normalized.cryptoProvider ?? null;
39412
- if (!provider) {
39413
- throw new Error('No crypto provider is configured for signing');
39414
- }
39415
- this.crypto = provider;
39416
- const signingConfigOption = normalized.signingConfig;
39417
- if (signingConfigOption instanceof SigningConfig) {
39418
- this.signingConfig = signingConfigOption;
39419
- }
39420
- else if (signingConfigOption) {
39421
- this.signingConfig = new SigningConfig(signingConfigOption);
39422
- }
39423
- else {
39424
- this.signingConfig = new SigningConfig();
39425
- }
39426
- this.explicitPrivateKey = normalized.privateKeyPem;
39427
- this.explicitKeyId = normalized.keyId;
39428
- }
39429
- signEnvelope(envelope, { physicalPath }) {
39430
- if (!envelope.sid) {
39431
- throw new Error('Envelope missing sid');
39432
- }
39433
- const frame = envelope.frame;
39434
- if (frame.type === 'Data') {
39435
- const dataFrame = frame;
39436
- if (!dataFrame.pd) {
39437
- const payload = dataFrame.payload ?? '';
39438
- const payloadString = payload === '' ? '' : canonicalJson(payload);
39439
- dataFrame.pd = secureDigest(payloadString);
39440
- }
39441
- }
39442
- const digest = frameDigest(frame);
39443
- const immutable = canonicalJson(immutableHeaders(envelope));
39444
- const sidDigest = secureDigest(physicalPath);
39445
- const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
39446
- 1 +
39447
- encodeUtf8(immutable).length +
39448
- 1 +
39449
- encodeUtf8(digest).length);
39450
- const sidBytes = encodeUtf8(sidDigest);
39451
- const immBytes = encodeUtf8(immutable);
39452
- const digBytes = encodeUtf8(digest);
39453
- let offset = 0;
39454
- tbs.set(sidBytes, offset);
39455
- offset += sidBytes.length;
39456
- tbs[offset] = 0x1f;
39457
- offset += 1;
39458
- tbs.set(immBytes, offset);
39459
- offset += immBytes.length;
39460
- tbs[offset] = 0x1f;
39461
- offset += 1;
39462
- tbs.set(digBytes, offset);
39463
- const privateKey = this.loadPrivateKey();
39464
- const signatureBytes = sign(tbs, privateKey);
39465
- const signature = urlsafeBase64Encode(signatureBytes);
39466
- const kid = this.determineKeyId();
39467
- const signatureHeader = {
39468
- kid,
39469
- val: signature,
39470
- alg: 'EdDSA',
39471
- };
39472
- const secHeader = envelope.sec ?? {};
39473
- secHeader.sig = signatureHeader;
39474
- envelope.sec = secHeader;
39475
- return envelope;
39476
- }
39477
- loadPrivateKey() {
39478
- const pem = this.explicitPrivateKey ??
39479
- readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
39480
- if (!pem) {
39481
- throw new Error('Crypto provider does not expose a signing private key');
39482
- }
39483
- return parseEd25519PrivateKey(pem);
39484
- }
39485
- determineKeyId() {
39486
- if (this.explicitKeyId) {
39487
- return this.explicitKeyId;
39488
- }
39489
- if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
39490
- const certificateProvider = this
39491
- .crypto;
39492
- const jwk = certificateProvider.nodeJwk?.();
39493
- if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
39494
- const kid = jwk.kid;
39495
- if (typeof kid === 'string' && kid.length > 0) {
39496
- return kid;
39497
- }
39498
- }
39499
- }
39500
- const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
39501
- if (!fallback) {
39502
- throw new Error('Crypto provider does not expose a signature key id');
39503
- }
39504
- return fallback;
39505
- }
39506
- }
39507
-
39508
- var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
39509
- __proto__: null,
39510
- EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
39511
- });
39512
-
39513
39586
  async function loadPublicKey(jwk, signingConfig) {
39514
39587
  if (jwk.x5c) {
39515
39588
  if (signingConfig.signingMaterial !== SigningMaterial.X509_CHAIN) {
@@ -39747,4 +39820,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
39747
39820
  WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
39748
39821
  });
39749
39822
 
39750
- export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
39823
+ export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$$ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$10 as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };