@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +355 -278
- package/dist/browser/index.mjs +346 -273
- package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/factory-manifest.js +2 -0
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/esm/naylence/fame/security/index.js +3 -0
- package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +351 -274
- package/dist/node/index.mjs +346 -273
- package/dist/node/node.cjs +350 -273
- package/dist/node/node.mjs +345 -272
- package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
- package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
- package/dist/types/naylence/fame/security/index.d.ts +4 -0
- package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
- package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/index.mjs
CHANGED
|
@@ -2,23 +2,23 @@ import { parseAddressComponents, FlowFlags, FameAddress, DEFAULT_POLLING_TIMEOUT
|
|
|
2
2
|
export * from '@naylence/core';
|
|
3
3
|
import { z, ZodError } from 'zod';
|
|
4
4
|
import { AbstractResourceFactory, createResource as createResource$1, createDefaultResource, registerFactory, Expressions, ExtensionManager, ExpressionEvaluationPolicy, Registry, configValidator } from '@naylence/factory';
|
|
5
|
+
import { sign, hashes, verify } from '@noble/ed25519';
|
|
6
|
+
import { sha256, sha512 } from '@noble/hashes/sha2.js';
|
|
5
7
|
import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
6
8
|
import { x25519 } from '@noble/curves/ed25519.js';
|
|
7
9
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
8
|
-
import { sha256, sha512 } from '@noble/hashes/sha2.js';
|
|
9
10
|
import { utf8ToBytes, bytesToHex, randomBytes, concatBytes } from '@noble/hashes/utils.js';
|
|
10
11
|
import { parse } from 'yaml';
|
|
11
12
|
import fastify from 'fastify';
|
|
12
13
|
import websocketPlugin from '@fastify/websocket';
|
|
13
|
-
import { sign, hashes, verify } from '@noble/ed25519';
|
|
14
14
|
|
|
15
15
|
// This file is auto-generated during build - do not edit manually
|
|
16
|
-
// Generated from package.json version: 0.3.5-test.
|
|
16
|
+
// Generated from package.json version: 0.3.5-test.924
|
|
17
17
|
/**
|
|
18
18
|
* The package version, injected at build time.
|
|
19
19
|
* @internal
|
|
20
20
|
*/
|
|
21
|
-
const VERSION = '0.3.5-test.
|
|
21
|
+
const VERSION = '0.3.5-test.924';
|
|
22
22
|
|
|
23
23
|
/**
|
|
24
24
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -3084,7 +3084,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3084
3084
|
return new EnvCredentialProvider(resolved.varName);
|
|
3085
3085
|
}
|
|
3086
3086
|
}
|
|
3087
|
-
const FACTORY_META$
|
|
3087
|
+
const FACTORY_META$18 = {
|
|
3088
3088
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3089
3089
|
key: 'EnvCredentialProvider',
|
|
3090
3090
|
};
|
|
@@ -3092,7 +3092,7 @@ const FACTORY_META$17 = {
|
|
|
3092
3092
|
var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3093
3093
|
__proto__: null,
|
|
3094
3094
|
EnvCredentialProviderFactory: EnvCredentialProviderFactory,
|
|
3095
|
-
FACTORY_META: FACTORY_META$
|
|
3095
|
+
FACTORY_META: FACTORY_META$18,
|
|
3096
3096
|
default: EnvCredentialProviderFactory,
|
|
3097
3097
|
normalizeEnvConfig: normalizeEnvConfig
|
|
3098
3098
|
});
|
|
@@ -3190,14 +3190,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3190
3190
|
return new PromptCredentialProvider(resolved.credentialName);
|
|
3191
3191
|
}
|
|
3192
3192
|
}
|
|
3193
|
-
const FACTORY_META$
|
|
3193
|
+
const FACTORY_META$17 = {
|
|
3194
3194
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3195
3195
|
key: 'PromptCredentialProvider',
|
|
3196
3196
|
};
|
|
3197
3197
|
|
|
3198
3198
|
var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3199
3199
|
__proto__: null,
|
|
3200
|
-
FACTORY_META: FACTORY_META$
|
|
3200
|
+
FACTORY_META: FACTORY_META$17,
|
|
3201
3201
|
PromptCredentialProviderFactory: PromptCredentialProviderFactory,
|
|
3202
3202
|
default: PromptCredentialProviderFactory,
|
|
3203
3203
|
normalizePromptConfig: normalizePromptConfig
|
|
@@ -3251,14 +3251,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3251
3251
|
return new SecretStoreCredentialProvider(resolved.secretName);
|
|
3252
3252
|
}
|
|
3253
3253
|
}
|
|
3254
|
-
const FACTORY_META$
|
|
3254
|
+
const FACTORY_META$16 = {
|
|
3255
3255
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3256
3256
|
key: 'SecretStoreCredentialProvider',
|
|
3257
3257
|
};
|
|
3258
3258
|
|
|
3259
3259
|
var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3260
3260
|
__proto__: null,
|
|
3261
|
-
FACTORY_META: FACTORY_META$
|
|
3261
|
+
FACTORY_META: FACTORY_META$16,
|
|
3262
3262
|
SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
|
|
3263
3263
|
default: SecretStoreCredentialProviderFactory,
|
|
3264
3264
|
normalizeSecretStoreConfig: normalizeSecretStoreConfig
|
|
@@ -3307,14 +3307,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3307
3307
|
return new StaticCredentialProvider(resolved.credentialValue);
|
|
3308
3308
|
}
|
|
3309
3309
|
}
|
|
3310
|
-
const FACTORY_META$
|
|
3310
|
+
const FACTORY_META$15 = {
|
|
3311
3311
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3312
3312
|
key: 'StaticCredentialProvider',
|
|
3313
3313
|
};
|
|
3314
3314
|
|
|
3315
3315
|
var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3316
3316
|
__proto__: null,
|
|
3317
|
-
FACTORY_META: FACTORY_META$
|
|
3317
|
+
FACTORY_META: FACTORY_META$15,
|
|
3318
3318
|
StaticCredentialProviderFactory: StaticCredentialProviderFactory,
|
|
3319
3319
|
default: StaticCredentialProviderFactory,
|
|
3320
3320
|
normalizeStaticConfig: normalizeStaticConfig
|
|
@@ -13420,6 +13420,7 @@ const MODULES = [
|
|
|
13420
13420
|
"./security/policy/no-security-policy-factory.js",
|
|
13421
13421
|
"./security/signing/eddsa-envelope-signer-factory.js",
|
|
13422
13422
|
"./security/signing/eddsa-envelope-verifier-factory.js",
|
|
13423
|
+
"./security/trust-store/noop-trust-store-provider-factory.js",
|
|
13423
13424
|
"./sentinel/capability-aware-routing-policy-factory.js",
|
|
13424
13425
|
"./sentinel/composite-routing-policy-factory.js",
|
|
13425
13426
|
"./sentinel/hybrid-path-routing-policy-factory.js",
|
|
@@ -13494,6 +13495,7 @@ const MODULE_LOADERS = {
|
|
|
13494
13495
|
"./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
|
|
13495
13496
|
"./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
|
|
13496
13497
|
"./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
|
|
13498
|
+
"./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
|
|
13497
13499
|
"./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
|
|
13498
13500
|
"./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
|
|
13499
13501
|
"./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
|
|
@@ -13798,7 +13800,7 @@ class NodeLikeFactory extends AbstractResourceFactory {
|
|
|
13798
13800
|
// registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
|
|
13799
13801
|
// }
|
|
13800
13802
|
|
|
13801
|
-
const FACTORY_META$
|
|
13803
|
+
const FACTORY_META$14 = {
|
|
13802
13804
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
13803
13805
|
key: 'Node',
|
|
13804
13806
|
};
|
|
@@ -13839,7 +13841,7 @@ class NodeFactory extends NodeLikeFactory {
|
|
|
13839
13841
|
|
|
13840
13842
|
var nodeFactory = /*#__PURE__*/Object.freeze({
|
|
13841
13843
|
__proto__: null,
|
|
13842
|
-
FACTORY_META: FACTORY_META$
|
|
13844
|
+
FACTORY_META: FACTORY_META$14,
|
|
13843
13845
|
NodeFactory: NodeFactory,
|
|
13844
13846
|
default: NodeFactory
|
|
13845
13847
|
});
|
|
@@ -15280,7 +15282,7 @@ class RouteStoreFactory extends AbstractResourceFactory {
|
|
|
15280
15282
|
return store ?? null;
|
|
15281
15283
|
}
|
|
15282
15284
|
}
|
|
15283
|
-
const FACTORY_META$
|
|
15285
|
+
const FACTORY_META$13 = {
|
|
15284
15286
|
base: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15285
15287
|
key: 'InMemoryRouteStore',
|
|
15286
15288
|
};
|
|
@@ -15298,7 +15300,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
|
|
|
15298
15300
|
|
|
15299
15301
|
var routeStoreFactory = /*#__PURE__*/Object.freeze({
|
|
15300
15302
|
__proto__: null,
|
|
15301
|
-
FACTORY_META: FACTORY_META$
|
|
15303
|
+
FACTORY_META: FACTORY_META$13,
|
|
15302
15304
|
InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
|
|
15303
15305
|
ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
15304
15306
|
RouteStoreFactory: RouteStoreFactory,
|
|
@@ -19114,7 +19116,7 @@ function isPlainRecord(value) {
|
|
|
19114
19116
|
return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
|
|
19115
19117
|
}
|
|
19116
19118
|
|
|
19117
|
-
const FACTORY_META$
|
|
19119
|
+
const FACTORY_META$12 = {
|
|
19118
19120
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
19119
19121
|
key: 'Sentinel',
|
|
19120
19122
|
};
|
|
@@ -19298,7 +19300,7 @@ class SentinelFactory extends NodeLikeFactory {
|
|
|
19298
19300
|
|
|
19299
19301
|
var sentinelFactory = /*#__PURE__*/Object.freeze({
|
|
19300
19302
|
__proto__: null,
|
|
19301
|
-
FACTORY_META: FACTORY_META$
|
|
19303
|
+
FACTORY_META: FACTORY_META$12,
|
|
19302
19304
|
SentinelFactory: SentinelFactory,
|
|
19303
19305
|
default: SentinelFactory
|
|
19304
19306
|
});
|
|
@@ -20449,6 +20451,45 @@ class CertificateManagerFactory extends AbstractResourceFactory {
|
|
|
20449
20451
|
}
|
|
20450
20452
|
}
|
|
20451
20453
|
|
|
20454
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
20455
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
20456
|
+
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
20457
|
+
createUnconfiguredProvider(reason) {
|
|
20458
|
+
return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
20459
|
+
}
|
|
20460
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
20461
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
20462
|
+
const mergedFactoryArgs = [
|
|
20463
|
+
...(dependencies ? [dependencies] : []),
|
|
20464
|
+
...(factoryArgs ?? []),
|
|
20465
|
+
];
|
|
20466
|
+
const creationOptions = {
|
|
20467
|
+
...restOptions,
|
|
20468
|
+
factoryArgs: mergedFactoryArgs,
|
|
20469
|
+
};
|
|
20470
|
+
if (config) {
|
|
20471
|
+
const instance = await createResource$1(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
20472
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20473
|
+
}
|
|
20474
|
+
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
20475
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
20476
|
+
}
|
|
20477
|
+
}
|
|
20478
|
+
class NoopTrustStoreProvider {
|
|
20479
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
20480
|
+
this.reason = reason;
|
|
20481
|
+
}
|
|
20482
|
+
async getTrustStorePem() {
|
|
20483
|
+
throw new Error(this.reason);
|
|
20484
|
+
}
|
|
20485
|
+
async getRoots() {
|
|
20486
|
+
return [];
|
|
20487
|
+
}
|
|
20488
|
+
async initialize() {
|
|
20489
|
+
// No-op for the placeholder provider.
|
|
20490
|
+
}
|
|
20491
|
+
}
|
|
20492
|
+
|
|
20452
20493
|
const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
|
|
20453
20494
|
class EncryptionManagerFactory extends AbstractResourceFactory {
|
|
20454
20495
|
getPriority() {
|
|
@@ -25265,6 +25306,146 @@ function encodeUtf8(value) {
|
|
|
25265
25306
|
throw new Error('No UTF-8 encoder available in this environment');
|
|
25266
25307
|
}
|
|
25267
25308
|
|
|
25309
|
+
if (!hashes.sha512) {
|
|
25310
|
+
hashes.sha512 = (message) => sha512(message);
|
|
25311
|
+
}
|
|
25312
|
+
function normalizeSignerOptions(options) {
|
|
25313
|
+
if (!options || typeof options !== 'object') {
|
|
25314
|
+
return {};
|
|
25315
|
+
}
|
|
25316
|
+
const candidate = options;
|
|
25317
|
+
const result = {
|
|
25318
|
+
...options,
|
|
25319
|
+
};
|
|
25320
|
+
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
25321
|
+
if (cryptoProvider !== undefined) {
|
|
25322
|
+
result.cryptoProvider = cryptoProvider ?? null;
|
|
25323
|
+
}
|
|
25324
|
+
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
25325
|
+
if (signingConfig !== undefined) {
|
|
25326
|
+
result.signingConfig = signingConfig;
|
|
25327
|
+
}
|
|
25328
|
+
const privateKeyPem = resolveAlias(candidate, [
|
|
25329
|
+
'privateKeyPem',
|
|
25330
|
+
'private_key_pem',
|
|
25331
|
+
]);
|
|
25332
|
+
if (privateKeyPem !== undefined) {
|
|
25333
|
+
result.privateKeyPem = privateKeyPem;
|
|
25334
|
+
}
|
|
25335
|
+
const keyId = resolveAlias(candidate, [
|
|
25336
|
+
'keyId',
|
|
25337
|
+
'key_id',
|
|
25338
|
+
]);
|
|
25339
|
+
if (keyId !== undefined) {
|
|
25340
|
+
result.keyId = keyId;
|
|
25341
|
+
}
|
|
25342
|
+
return result;
|
|
25343
|
+
}
|
|
25344
|
+
class EdDSAEnvelopeSigner {
|
|
25345
|
+
constructor(options = {}) {
|
|
25346
|
+
const normalized = normalizeSignerOptions(options);
|
|
25347
|
+
const provider = normalized.cryptoProvider ?? null;
|
|
25348
|
+
if (!provider) {
|
|
25349
|
+
throw new Error('No crypto provider is configured for signing');
|
|
25350
|
+
}
|
|
25351
|
+
this.crypto = provider;
|
|
25352
|
+
const signingConfigOption = normalized.signingConfig;
|
|
25353
|
+
if (signingConfigOption instanceof SigningConfig) {
|
|
25354
|
+
this.signingConfig = signingConfigOption;
|
|
25355
|
+
}
|
|
25356
|
+
else if (signingConfigOption) {
|
|
25357
|
+
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
25358
|
+
}
|
|
25359
|
+
else {
|
|
25360
|
+
this.signingConfig = new SigningConfig();
|
|
25361
|
+
}
|
|
25362
|
+
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
25363
|
+
this.explicitKeyId = normalized.keyId;
|
|
25364
|
+
}
|
|
25365
|
+
signEnvelope(envelope, { physicalPath }) {
|
|
25366
|
+
if (!envelope.sid) {
|
|
25367
|
+
throw new Error('Envelope missing sid');
|
|
25368
|
+
}
|
|
25369
|
+
const frame = envelope.frame;
|
|
25370
|
+
if (frame.type === 'Data') {
|
|
25371
|
+
const dataFrame = frame;
|
|
25372
|
+
if (!dataFrame.pd) {
|
|
25373
|
+
const payload = dataFrame.payload ?? '';
|
|
25374
|
+
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
25375
|
+
dataFrame.pd = secureDigest(payloadString);
|
|
25376
|
+
}
|
|
25377
|
+
}
|
|
25378
|
+
const digest = frameDigest(frame);
|
|
25379
|
+
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
25380
|
+
const sidDigest = secureDigest(physicalPath);
|
|
25381
|
+
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
25382
|
+
1 +
|
|
25383
|
+
encodeUtf8(immutable).length +
|
|
25384
|
+
1 +
|
|
25385
|
+
encodeUtf8(digest).length);
|
|
25386
|
+
const sidBytes = encodeUtf8(sidDigest);
|
|
25387
|
+
const immBytes = encodeUtf8(immutable);
|
|
25388
|
+
const digBytes = encodeUtf8(digest);
|
|
25389
|
+
let offset = 0;
|
|
25390
|
+
tbs.set(sidBytes, offset);
|
|
25391
|
+
offset += sidBytes.length;
|
|
25392
|
+
tbs[offset] = 0x1f;
|
|
25393
|
+
offset += 1;
|
|
25394
|
+
tbs.set(immBytes, offset);
|
|
25395
|
+
offset += immBytes.length;
|
|
25396
|
+
tbs[offset] = 0x1f;
|
|
25397
|
+
offset += 1;
|
|
25398
|
+
tbs.set(digBytes, offset);
|
|
25399
|
+
const privateKey = this.loadPrivateKey();
|
|
25400
|
+
const signatureBytes = sign(tbs, privateKey);
|
|
25401
|
+
const signature = urlsafeBase64Encode(signatureBytes);
|
|
25402
|
+
const kid = this.determineKeyId();
|
|
25403
|
+
const signatureHeader = {
|
|
25404
|
+
kid,
|
|
25405
|
+
val: signature,
|
|
25406
|
+
alg: 'EdDSA',
|
|
25407
|
+
};
|
|
25408
|
+
const secHeader = envelope.sec ?? {};
|
|
25409
|
+
secHeader.sig = signatureHeader;
|
|
25410
|
+
envelope.sec = secHeader;
|
|
25411
|
+
return envelope;
|
|
25412
|
+
}
|
|
25413
|
+
loadPrivateKey() {
|
|
25414
|
+
const pem = this.explicitPrivateKey ??
|
|
25415
|
+
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
25416
|
+
if (!pem) {
|
|
25417
|
+
throw new Error('Crypto provider does not expose a signing private key');
|
|
25418
|
+
}
|
|
25419
|
+
return parseEd25519PrivateKey(pem);
|
|
25420
|
+
}
|
|
25421
|
+
determineKeyId() {
|
|
25422
|
+
if (this.explicitKeyId) {
|
|
25423
|
+
return this.explicitKeyId;
|
|
25424
|
+
}
|
|
25425
|
+
if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
|
|
25426
|
+
const certificateProvider = this
|
|
25427
|
+
.crypto;
|
|
25428
|
+
const jwk = certificateProvider.nodeJwk?.();
|
|
25429
|
+
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
25430
|
+
const kid = jwk.kid;
|
|
25431
|
+
if (typeof kid === 'string' && kid.length > 0) {
|
|
25432
|
+
return kid;
|
|
25433
|
+
}
|
|
25434
|
+
}
|
|
25435
|
+
}
|
|
25436
|
+
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
25437
|
+
if (!fallback) {
|
|
25438
|
+
throw new Error('Crypto provider does not expose a signature key id');
|
|
25439
|
+
}
|
|
25440
|
+
return fallback;
|
|
25441
|
+
}
|
|
25442
|
+
}
|
|
25443
|
+
|
|
25444
|
+
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
25445
|
+
__proto__: null,
|
|
25446
|
+
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
25447
|
+
});
|
|
25448
|
+
|
|
25268
25449
|
const logger$x = getLogger('naylence.fame.security.auth.jwt_token_issuer');
|
|
25269
25450
|
let joseModulePromise = null;
|
|
25270
25451
|
async function requireJose() {
|
|
@@ -26868,7 +27049,7 @@ const PROFILE_MAP$4 = {
|
|
|
26868
27049
|
[PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
|
|
26869
27050
|
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
26870
27051
|
};
|
|
26871
|
-
const FACTORY_META$
|
|
27052
|
+
const FACTORY_META$11 = {
|
|
26872
27053
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
26873
27054
|
key: 'SecurityProfile',
|
|
26874
27055
|
};
|
|
@@ -26994,7 +27175,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
|
26994
27175
|
ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
|
|
26995
27176
|
ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
|
|
26996
27177
|
ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
|
|
26997
|
-
FACTORY_META: FACTORY_META$
|
|
27178
|
+
FACTORY_META: FACTORY_META$11,
|
|
26998
27179
|
NodeSecurityProfileFactory: NodeSecurityProfileFactory,
|
|
26999
27180
|
PROFILE_NAME_GATED: PROFILE_NAME_GATED,
|
|
27000
27181
|
PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
|
|
@@ -27123,7 +27304,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
|
|
|
27123
27304
|
}
|
|
27124
27305
|
}
|
|
27125
27306
|
|
|
27126
|
-
const FACTORY_META
|
|
27307
|
+
const FACTORY_META$10 = {
|
|
27127
27308
|
base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
|
|
27128
27309
|
key: 'SimpleLoadBalancerStickinessManager',
|
|
27129
27310
|
};
|
|
@@ -27147,7 +27328,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
|
|
|
27147
27328
|
|
|
27148
27329
|
var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
27149
27330
|
__proto__: null,
|
|
27150
|
-
FACTORY_META: FACTORY_META
|
|
27331
|
+
FACTORY_META: FACTORY_META$10,
|
|
27151
27332
|
SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
|
|
27152
27333
|
default: SimpleLoadBalancerStickinessManagerFactory
|
|
27153
27334
|
});
|
|
@@ -27625,7 +27806,7 @@ class WelcomeServiceFactory extends AbstractResourceFactory {
|
|
|
27625
27806
|
}
|
|
27626
27807
|
}
|
|
27627
27808
|
|
|
27628
|
-
const FACTORY_META
|
|
27809
|
+
const FACTORY_META$$ = {
|
|
27629
27810
|
base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
|
|
27630
27811
|
key: 'DefaultWelcomeService',
|
|
27631
27812
|
};
|
|
@@ -27706,7 +27887,7 @@ function resolveConfigEntry(source, keys) {
|
|
|
27706
27887
|
var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
|
|
27707
27888
|
__proto__: null,
|
|
27708
27889
|
DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
|
|
27709
|
-
FACTORY_META: FACTORY_META
|
|
27890
|
+
FACTORY_META: FACTORY_META$$,
|
|
27710
27891
|
default: DefaultWelcomeServiceFactory
|
|
27711
27892
|
});
|
|
27712
27893
|
|
|
@@ -28139,7 +28320,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
|
|
|
28139
28320
|
}
|
|
28140
28321
|
}
|
|
28141
28322
|
|
|
28142
|
-
const FACTORY_META$
|
|
28323
|
+
const FACTORY_META$_ = {
|
|
28143
28324
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
28144
28325
|
key: 'NoopTraceEmitter',
|
|
28145
28326
|
};
|
|
@@ -28157,7 +28338,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
|
|
|
28157
28338
|
|
|
28158
28339
|
var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
28159
28340
|
__proto__: null,
|
|
28160
|
-
FACTORY_META: FACTORY_META$
|
|
28341
|
+
FACTORY_META: FACTORY_META$_,
|
|
28161
28342
|
NoopTraceEmitterFactory: NoopTraceEmitterFactory,
|
|
28162
28343
|
default: NoopTraceEmitterFactory
|
|
28163
28344
|
});
|
|
@@ -28412,7 +28593,7 @@ function getOtelApiModule() {
|
|
|
28412
28593
|
}
|
|
28413
28594
|
return otelApiModulePromise;
|
|
28414
28595
|
}
|
|
28415
|
-
const FACTORY_META$
|
|
28596
|
+
const FACTORY_META$Z = {
|
|
28416
28597
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
28417
28598
|
key: 'OpenTelemetryTraceEmitter',
|
|
28418
28599
|
};
|
|
@@ -28582,7 +28763,7 @@ function extractHeaders(value) {
|
|
|
28582
28763
|
|
|
28583
28764
|
var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
28584
28765
|
__proto__: null,
|
|
28585
|
-
FACTORY_META: FACTORY_META$
|
|
28766
|
+
FACTORY_META: FACTORY_META$Z,
|
|
28586
28767
|
OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
|
|
28587
28768
|
default: OpenTelemetryTraceEmitterFactory
|
|
28588
28769
|
});
|
|
@@ -28603,7 +28784,7 @@ const PROFILE_MAP$3 = {
|
|
|
28603
28784
|
[PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
|
|
28604
28785
|
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
28605
28786
|
};
|
|
28606
|
-
const FACTORY_META$
|
|
28787
|
+
const FACTORY_META$Y = {
|
|
28607
28788
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
28608
28789
|
key: 'TraceEmitterProfile',
|
|
28609
28790
|
};
|
|
@@ -28683,7 +28864,7 @@ function deepClone$2(value) {
|
|
|
28683
28864
|
|
|
28684
28865
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
28685
28866
|
__proto__: null,
|
|
28686
|
-
FACTORY_META: FACTORY_META$
|
|
28867
|
+
FACTORY_META: FACTORY_META$Y,
|
|
28687
28868
|
PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
|
|
28688
28869
|
PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
|
|
28689
28870
|
TraceEmitterProfileFactory: TraceEmitterProfileFactory,
|
|
@@ -28698,7 +28879,7 @@ class BroadcastChannelConnectionGrantImpl {
|
|
|
28698
28879
|
this.purpose = 'connection';
|
|
28699
28880
|
}
|
|
28700
28881
|
}
|
|
28701
|
-
const FACTORY_META$
|
|
28882
|
+
const FACTORY_META$X = {
|
|
28702
28883
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
28703
28884
|
key: BROADCAST_CHANNEL_CONNECTOR_TYPE,
|
|
28704
28885
|
};
|
|
@@ -28846,7 +29027,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
|
|
|
28846
29027
|
var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
28847
29028
|
__proto__: null,
|
|
28848
29029
|
BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
|
|
28849
|
-
FACTORY_META: FACTORY_META$
|
|
29030
|
+
FACTORY_META: FACTORY_META$X,
|
|
28850
29031
|
default: BroadcastChannelConnectorFactory
|
|
28851
29032
|
});
|
|
28852
29033
|
|
|
@@ -28882,7 +29063,7 @@ function normalizeConfig$q(config) {
|
|
|
28882
29063
|
inboxCapacity,
|
|
28883
29064
|
};
|
|
28884
29065
|
}
|
|
28885
|
-
const FACTORY_META$
|
|
29066
|
+
const FACTORY_META$W = {
|
|
28886
29067
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
28887
29068
|
key: 'BroadcastChannelListener',
|
|
28888
29069
|
};
|
|
@@ -28908,7 +29089,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
|
|
|
28908
29089
|
var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
|
|
28909
29090
|
__proto__: null,
|
|
28910
29091
|
BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
|
|
28911
|
-
FACTORY_META: FACTORY_META$
|
|
29092
|
+
FACTORY_META: FACTORY_META$W,
|
|
28912
29093
|
default: BroadcastChannelListenerFactory
|
|
28913
29094
|
});
|
|
28914
29095
|
|
|
@@ -28973,7 +29154,7 @@ function normalizeConfig$p(config) {
|
|
|
28973
29154
|
authorizer: authorizerValue,
|
|
28974
29155
|
};
|
|
28975
29156
|
}
|
|
28976
|
-
const FACTORY_META$
|
|
29157
|
+
const FACTORY_META$V = {
|
|
28977
29158
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
28978
29159
|
key: 'HttpListener',
|
|
28979
29160
|
};
|
|
@@ -29020,7 +29201,7 @@ class HttpListenerFactory extends TransportListenerFactory {
|
|
|
29020
29201
|
|
|
29021
29202
|
var httpListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29022
29203
|
__proto__: null,
|
|
29023
|
-
FACTORY_META: FACTORY_META$
|
|
29204
|
+
FACTORY_META: FACTORY_META$V,
|
|
29024
29205
|
HttpListenerFactory: HttpListenerFactory,
|
|
29025
29206
|
default: HttpListenerFactory
|
|
29026
29207
|
});
|
|
@@ -29145,7 +29326,7 @@ class HttpConnectionGrantImpl {
|
|
|
29145
29326
|
this.purpose = 'connection';
|
|
29146
29327
|
}
|
|
29147
29328
|
}
|
|
29148
|
-
const FACTORY_META$
|
|
29329
|
+
const FACTORY_META$U = {
|
|
29149
29330
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29150
29331
|
key: HTTP_STATELESS_CONNECTOR_TYPE,
|
|
29151
29332
|
};
|
|
@@ -29314,7 +29495,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
|
|
|
29314
29495
|
|
|
29315
29496
|
var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29316
29497
|
__proto__: null,
|
|
29317
|
-
FACTORY_META: FACTORY_META$
|
|
29498
|
+
FACTORY_META: FACTORY_META$U,
|
|
29318
29499
|
HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
|
|
29319
29500
|
default: HttpStatelessConnectorFactory
|
|
29320
29501
|
});
|
|
@@ -29327,7 +29508,7 @@ class InPageConnectionGrantImpl {
|
|
|
29327
29508
|
this.purpose = 'connection';
|
|
29328
29509
|
}
|
|
29329
29510
|
}
|
|
29330
|
-
const FACTORY_META$
|
|
29511
|
+
const FACTORY_META$T = {
|
|
29331
29512
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29332
29513
|
key: INPAGE_CONNECTOR_TYPE,
|
|
29333
29514
|
};
|
|
@@ -29476,7 +29657,7 @@ class InPageConnectorFactory extends ConnectorFactory {
|
|
|
29476
29657
|
|
|
29477
29658
|
var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29478
29659
|
__proto__: null,
|
|
29479
|
-
FACTORY_META: FACTORY_META$
|
|
29660
|
+
FACTORY_META: FACTORY_META$T,
|
|
29480
29661
|
InPageConnectorFactory: InPageConnectorFactory,
|
|
29481
29662
|
default: InPageConnectorFactory
|
|
29482
29663
|
});
|
|
@@ -29513,7 +29694,7 @@ function normalizeConfig$o(config) {
|
|
|
29513
29694
|
inboxCapacity,
|
|
29514
29695
|
};
|
|
29515
29696
|
}
|
|
29516
|
-
const FACTORY_META$
|
|
29697
|
+
const FACTORY_META$S = {
|
|
29517
29698
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29518
29699
|
key: 'InPageListener',
|
|
29519
29700
|
};
|
|
@@ -29538,7 +29719,7 @@ class InPageListenerFactory extends TransportListenerFactory {
|
|
|
29538
29719
|
|
|
29539
29720
|
var inpageListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29540
29721
|
__proto__: null,
|
|
29541
|
-
FACTORY_META: FACTORY_META$
|
|
29722
|
+
FACTORY_META: FACTORY_META$S,
|
|
29542
29723
|
InPageListenerFactory: InPageListenerFactory,
|
|
29543
29724
|
default: InPageListenerFactory
|
|
29544
29725
|
});
|
|
@@ -29554,7 +29735,7 @@ class WebSocketConnectionGrantImpl {
|
|
|
29554
29735
|
this.purpose = 'connection';
|
|
29555
29736
|
}
|
|
29556
29737
|
}
|
|
29557
|
-
const FACTORY_META$
|
|
29738
|
+
const FACTORY_META$R = {
|
|
29558
29739
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29559
29740
|
key: 'WebSocketConnector',
|
|
29560
29741
|
};
|
|
@@ -29925,7 +30106,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
|
|
|
29925
30106
|
|
|
29926
30107
|
var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29927
30108
|
__proto__: null,
|
|
29928
|
-
FACTORY_META: FACTORY_META$
|
|
30109
|
+
FACTORY_META: FACTORY_META$R,
|
|
29929
30110
|
WebSocketConnectorFactory: WebSocketConnectorFactory,
|
|
29930
30111
|
default: WebSocketConnectorFactory,
|
|
29931
30112
|
setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
|
|
@@ -29995,7 +30176,7 @@ function normalizeConfig$n(config) {
|
|
|
29995
30176
|
authorizer: authorizerValue,
|
|
29996
30177
|
};
|
|
29997
30178
|
}
|
|
29998
|
-
const FACTORY_META$
|
|
30179
|
+
const FACTORY_META$Q = {
|
|
29999
30180
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
30000
30181
|
key: 'WebSocketListener',
|
|
30001
30182
|
};
|
|
@@ -30039,7 +30220,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
|
|
|
30039
30220
|
|
|
30040
30221
|
var websocketListenerFactory = /*#__PURE__*/Object.freeze({
|
|
30041
30222
|
__proto__: null,
|
|
30042
|
-
FACTORY_META: FACTORY_META$
|
|
30223
|
+
FACTORY_META: FACTORY_META$Q,
|
|
30043
30224
|
WebSocketListenerFactory: WebSocketListenerFactory,
|
|
30044
30225
|
default: WebSocketListenerFactory
|
|
30045
30226
|
});
|
|
@@ -30207,7 +30388,7 @@ function withOption(source, keys) {
|
|
|
30207
30388
|
[camelKey]: value,
|
|
30208
30389
|
};
|
|
30209
30390
|
}
|
|
30210
|
-
const FACTORY_META$
|
|
30391
|
+
const FACTORY_META$P = {
|
|
30211
30392
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
30212
30393
|
key: 'AtLeastOnceDeliveryPolicy',
|
|
30213
30394
|
};
|
|
@@ -30215,7 +30396,7 @@ const FACTORY_META$O = {
|
|
|
30215
30396
|
var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
30216
30397
|
__proto__: null,
|
|
30217
30398
|
AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
|
|
30218
|
-
FACTORY_META: FACTORY_META$
|
|
30399
|
+
FACTORY_META: FACTORY_META$P,
|
|
30219
30400
|
default: AtLeastOnceDeliveryPolicyFactory
|
|
30220
30401
|
});
|
|
30221
30402
|
|
|
@@ -30242,7 +30423,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
|
|
|
30242
30423
|
}
|
|
30243
30424
|
registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
30244
30425
|
registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
30245
|
-
const FACTORY_META$
|
|
30426
|
+
const FACTORY_META$O = {
|
|
30246
30427
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
30247
30428
|
key: 'AtMostOnceDeliveryPolicy',
|
|
30248
30429
|
};
|
|
@@ -30250,7 +30431,7 @@ const FACTORY_META$N = {
|
|
|
30250
30431
|
var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
30251
30432
|
__proto__: null,
|
|
30252
30433
|
AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
|
|
30253
|
-
FACTORY_META: FACTORY_META$
|
|
30434
|
+
FACTORY_META: FACTORY_META$O,
|
|
30254
30435
|
default: AtMostOnceDeliveryPolicyFactory
|
|
30255
30436
|
});
|
|
30256
30437
|
|
|
@@ -30343,7 +30524,7 @@ function resolveProfileConfig$1(profileName) {
|
|
|
30343
30524
|
function deepClone$1(value) {
|
|
30344
30525
|
return JSON.parse(JSON.stringify(value));
|
|
30345
30526
|
}
|
|
30346
|
-
const FACTORY_META$
|
|
30527
|
+
const FACTORY_META$N = {
|
|
30347
30528
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
30348
30529
|
key: 'DeliveryProfile',
|
|
30349
30530
|
};
|
|
@@ -30351,7 +30532,7 @@ const FACTORY_META$M = {
|
|
|
30351
30532
|
var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
|
|
30352
30533
|
__proto__: null,
|
|
30353
30534
|
DeliveryProfileFactory: DeliveryProfileFactory,
|
|
30354
|
-
FACTORY_META: FACTORY_META$
|
|
30535
|
+
FACTORY_META: FACTORY_META$N,
|
|
30355
30536
|
PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
|
|
30356
30537
|
PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
|
|
30357
30538
|
default: DeliveryProfileFactory
|
|
@@ -30541,7 +30722,7 @@ function normalizeServiceName(value) {
|
|
|
30541
30722
|
|
|
30542
30723
|
// import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
|
|
30543
30724
|
const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
|
|
30544
|
-
const FACTORY_META$
|
|
30725
|
+
const FACTORY_META$M = {
|
|
30545
30726
|
base: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
30546
30727
|
key: 'InProcessFameFabric',
|
|
30547
30728
|
};
|
|
@@ -30561,7 +30742,7 @@ class InProcessFameFabricFactory extends FameFabricFactory {
|
|
|
30561
30742
|
|
|
30562
30743
|
var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
|
|
30563
30744
|
__proto__: null,
|
|
30564
|
-
FACTORY_META: FACTORY_META$
|
|
30745
|
+
FACTORY_META: FACTORY_META$M,
|
|
30565
30746
|
FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
30566
30747
|
InProcessFameFabricFactory: InProcessFameFabricFactory,
|
|
30567
30748
|
default: InProcessFameFabricFactory
|
|
@@ -30790,7 +30971,7 @@ const PROFILE_MAP$1 = {
|
|
|
30790
30971
|
[PROFILE_NAME_NOOP]: NOOP_PROFILE,
|
|
30791
30972
|
[PROFILE_NAME_NONE]: NOOP_PROFILE,
|
|
30792
30973
|
};
|
|
30793
|
-
const FACTORY_META$
|
|
30974
|
+
const FACTORY_META$L = {
|
|
30794
30975
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
30795
30976
|
key: 'AdmissionProfile',
|
|
30796
30977
|
};
|
|
@@ -30837,7 +31018,7 @@ function deepClone(value) {
|
|
|
30837
31018
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
30838
31019
|
__proto__: null,
|
|
30839
31020
|
AdmissionProfileFactory: AdmissionProfileFactory,
|
|
30840
|
-
FACTORY_META: FACTORY_META$
|
|
31021
|
+
FACTORY_META: FACTORY_META$L,
|
|
30841
31022
|
default: AdmissionProfileFactory
|
|
30842
31023
|
});
|
|
30843
31024
|
|
|
@@ -30919,7 +31100,7 @@ function cloneGrant(grant) {
|
|
|
30919
31100
|
return JSON.parse(JSON.stringify(grant));
|
|
30920
31101
|
}
|
|
30921
31102
|
|
|
30922
|
-
const FACTORY_META$
|
|
31103
|
+
const FACTORY_META$K = {
|
|
30923
31104
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
30924
31105
|
key: 'DirectAdmissionClient',
|
|
30925
31106
|
};
|
|
@@ -30971,11 +31152,11 @@ function normalizeConfig$l(config) {
|
|
|
30971
31152
|
var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
30972
31153
|
__proto__: null,
|
|
30973
31154
|
DirectAdmissionClientFactory: DirectAdmissionClientFactory,
|
|
30974
|
-
FACTORY_META: FACTORY_META$
|
|
31155
|
+
FACTORY_META: FACTORY_META$K,
|
|
30975
31156
|
default: DirectAdmissionClientFactory
|
|
30976
31157
|
});
|
|
30977
31158
|
|
|
30978
|
-
const FACTORY_META$
|
|
31159
|
+
const FACTORY_META$J = {
|
|
30979
31160
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
30980
31161
|
key: 'NoopAdmissionClient',
|
|
30981
31162
|
};
|
|
@@ -31024,7 +31205,7 @@ function normalizeConfig$k(config, factoryArgs) {
|
|
|
31024
31205
|
|
|
31025
31206
|
var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
31026
31207
|
__proto__: null,
|
|
31027
|
-
FACTORY_META: FACTORY_META$
|
|
31208
|
+
FACTORY_META: FACTORY_META$J,
|
|
31028
31209
|
NoopAdmissionClientFactory: NoopAdmissionClientFactory,
|
|
31029
31210
|
default: NoopAdmissionClientFactory
|
|
31030
31211
|
});
|
|
@@ -31039,7 +31220,7 @@ class NoAuthInjectionStrategy {
|
|
|
31039
31220
|
}
|
|
31040
31221
|
}
|
|
31041
31222
|
|
|
31042
|
-
const FACTORY_META$
|
|
31223
|
+
const FACTORY_META$I = {
|
|
31043
31224
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
31044
31225
|
key: 'NoAuth',
|
|
31045
31226
|
};
|
|
@@ -31068,7 +31249,7 @@ function normalizeConfig$j(config) {
|
|
|
31068
31249
|
|
|
31069
31250
|
var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
31070
31251
|
__proto__: null,
|
|
31071
|
-
FACTORY_META: FACTORY_META$
|
|
31252
|
+
FACTORY_META: FACTORY_META$I,
|
|
31072
31253
|
NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
|
|
31073
31254
|
default: NoAuthInjectionStrategyFactory
|
|
31074
31255
|
});
|
|
@@ -31217,7 +31398,7 @@ function convertKeysToCamelCase(value) {
|
|
|
31217
31398
|
return result;
|
|
31218
31399
|
}
|
|
31219
31400
|
|
|
31220
|
-
const FACTORY_META$
|
|
31401
|
+
const FACTORY_META$H = {
|
|
31221
31402
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
31222
31403
|
key: 'WelcomeServiceClient',
|
|
31223
31404
|
};
|
|
@@ -31287,7 +31468,7 @@ async function createAuthStrategy(config) {
|
|
|
31287
31468
|
|
|
31288
31469
|
var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
|
|
31289
31470
|
__proto__: null,
|
|
31290
|
-
FACTORY_META: FACTORY_META$
|
|
31471
|
+
FACTORY_META: FACTORY_META$H,
|
|
31291
31472
|
WelcomeServiceClientFactory: WelcomeServiceClientFactory,
|
|
31292
31473
|
default: WelcomeServiceClientFactory
|
|
31293
31474
|
});
|
|
@@ -31405,7 +31586,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
|
|
|
31405
31586
|
});
|
|
31406
31587
|
}
|
|
31407
31588
|
}
|
|
31408
|
-
const FACTORY_META$
|
|
31589
|
+
const FACTORY_META$G = {
|
|
31409
31590
|
base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
|
|
31410
31591
|
key: 'StaticNodePlacementStrategy',
|
|
31411
31592
|
};
|
|
@@ -31415,7 +31596,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
|
|
|
31415
31596
|
|
|
31416
31597
|
var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
31417
31598
|
__proto__: null,
|
|
31418
|
-
FACTORY_META: FACTORY_META$
|
|
31599
|
+
FACTORY_META: FACTORY_META$G,
|
|
31419
31600
|
StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
|
|
31420
31601
|
default: StaticNodePlacementStrategyFactory
|
|
31421
31602
|
});
|
|
@@ -31574,7 +31755,7 @@ function connectorTypeName(connector) {
|
|
|
31574
31755
|
return typeof connector;
|
|
31575
31756
|
}
|
|
31576
31757
|
|
|
31577
|
-
const FACTORY_META$
|
|
31758
|
+
const FACTORY_META$F = {
|
|
31578
31759
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
31579
31760
|
key: 'BearerTokenHeaderAuth',
|
|
31580
31761
|
};
|
|
@@ -31615,7 +31796,7 @@ function normalizeConfig$g(config) {
|
|
|
31615
31796
|
var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
31616
31797
|
__proto__: null,
|
|
31617
31798
|
BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
|
|
31618
|
-
FACTORY_META: FACTORY_META$
|
|
31799
|
+
FACTORY_META: FACTORY_META$F,
|
|
31619
31800
|
default: BearerTokenHeaderAuthInjectionStrategyFactory
|
|
31620
31801
|
});
|
|
31621
31802
|
|
|
@@ -31642,7 +31823,7 @@ function normalizeConfig$f(config) {
|
|
|
31642
31823
|
function isTokenVerifier(candidate) {
|
|
31643
31824
|
return Boolean(candidate && typeof candidate.verify === 'function');
|
|
31644
31825
|
}
|
|
31645
|
-
const FACTORY_META$
|
|
31826
|
+
const FACTORY_META$E = {
|
|
31646
31827
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
31647
31828
|
key: 'DefaultAuthorizer',
|
|
31648
31829
|
};
|
|
@@ -31672,7 +31853,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
|
|
|
31672
31853
|
var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
31673
31854
|
__proto__: null,
|
|
31674
31855
|
DefaultAuthorizerFactory: DefaultAuthorizerFactory,
|
|
31675
|
-
FACTORY_META: FACTORY_META$
|
|
31856
|
+
FACTORY_META: FACTORY_META$E,
|
|
31676
31857
|
default: DefaultAuthorizerFactory
|
|
31677
31858
|
});
|
|
31678
31859
|
|
|
@@ -31683,7 +31864,7 @@ function getJwksJwtTokenVerifierModule() {
|
|
|
31683
31864
|
}
|
|
31684
31865
|
return jwksJwtTokenVerifierModulePromise;
|
|
31685
31866
|
}
|
|
31686
|
-
const FACTORY_META$
|
|
31867
|
+
const FACTORY_META$D = {
|
|
31687
31868
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
31688
31869
|
key: 'JWKSJWTTokenVerifier',
|
|
31689
31870
|
};
|
|
@@ -31745,12 +31926,12 @@ function normalizeConfig$e(config) {
|
|
|
31745
31926
|
|
|
31746
31927
|
var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
31747
31928
|
__proto__: null,
|
|
31748
|
-
FACTORY_META: FACTORY_META$
|
|
31929
|
+
FACTORY_META: FACTORY_META$D,
|
|
31749
31930
|
JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
|
|
31750
31931
|
default: JWKSTokenVerifierFactory
|
|
31751
31932
|
});
|
|
31752
31933
|
|
|
31753
|
-
const FACTORY_META$
|
|
31934
|
+
const FACTORY_META$C = {
|
|
31754
31935
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
31755
31936
|
key: 'JWTTokenIssuer',
|
|
31756
31937
|
};
|
|
@@ -31947,12 +32128,12 @@ function getProviderKeyId(provider) {
|
|
|
31947
32128
|
|
|
31948
32129
|
var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
31949
32130
|
__proto__: null,
|
|
31950
|
-
FACTORY_META: FACTORY_META$
|
|
32131
|
+
FACTORY_META: FACTORY_META$C,
|
|
31951
32132
|
JWTTokenIssuerFactory: JWTTokenIssuerFactory,
|
|
31952
32133
|
default: JWTTokenIssuerFactory
|
|
31953
32134
|
});
|
|
31954
32135
|
|
|
31955
|
-
const FACTORY_META$
|
|
32136
|
+
const FACTORY_META$B = {
|
|
31956
32137
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
31957
32138
|
key: 'JWTTokenVerifier',
|
|
31958
32139
|
};
|
|
@@ -32120,7 +32301,7 @@ function getProviderVerificationKey(provider) {
|
|
|
32120
32301
|
|
|
32121
32302
|
var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
32122
32303
|
__proto__: null,
|
|
32123
|
-
FACTORY_META: FACTORY_META$
|
|
32304
|
+
FACTORY_META: FACTORY_META$B,
|
|
32124
32305
|
JWTTokenVerifierFactory: JWTTokenVerifierFactory,
|
|
32125
32306
|
default: JWTTokenVerifierFactory
|
|
32126
32307
|
});
|
|
@@ -32136,7 +32317,7 @@ class NoneTokenProvider {
|
|
|
32136
32317
|
}
|
|
32137
32318
|
}
|
|
32138
32319
|
|
|
32139
|
-
const FACTORY_META$
|
|
32320
|
+
const FACTORY_META$A = {
|
|
32140
32321
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32141
32322
|
key: 'NoneTokenProvider',
|
|
32142
32323
|
};
|
|
@@ -32153,7 +32334,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
|
|
|
32153
32334
|
|
|
32154
32335
|
var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32155
32336
|
__proto__: null,
|
|
32156
|
-
FACTORY_META: FACTORY_META$
|
|
32337
|
+
FACTORY_META: FACTORY_META$A,
|
|
32157
32338
|
NoneTokenProviderFactory: NoneTokenProviderFactory,
|
|
32158
32339
|
default: NoneTokenProviderFactory
|
|
32159
32340
|
});
|
|
@@ -32205,7 +32386,7 @@ class NoopAuthorizer {
|
|
|
32205
32386
|
}
|
|
32206
32387
|
}
|
|
32207
32388
|
|
|
32208
|
-
const FACTORY_META$
|
|
32389
|
+
const FACTORY_META$z = {
|
|
32209
32390
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32210
32391
|
key: 'NoopAuthorizer',
|
|
32211
32392
|
};
|
|
@@ -32221,7 +32402,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
|
|
|
32221
32402
|
|
|
32222
32403
|
var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32223
32404
|
__proto__: null,
|
|
32224
|
-
FACTORY_META: FACTORY_META$
|
|
32405
|
+
FACTORY_META: FACTORY_META$z,
|
|
32225
32406
|
NoopAuthorizerFactory: NoopAuthorizerFactory,
|
|
32226
32407
|
default: NoopAuthorizerFactory
|
|
32227
32408
|
});
|
|
@@ -32235,7 +32416,7 @@ class NoopTokenIssuer {
|
|
|
32235
32416
|
}
|
|
32236
32417
|
}
|
|
32237
32418
|
|
|
32238
|
-
const FACTORY_META$
|
|
32419
|
+
const FACTORY_META$y = {
|
|
32239
32420
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
32240
32421
|
key: 'NoopTokenIssuer',
|
|
32241
32422
|
};
|
|
@@ -32251,7 +32432,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
|
|
|
32251
32432
|
|
|
32252
32433
|
var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
32253
32434
|
__proto__: null,
|
|
32254
|
-
FACTORY_META: FACTORY_META$
|
|
32435
|
+
FACTORY_META: FACTORY_META$y,
|
|
32255
32436
|
NoopTokenIssuerFactory: NoopTokenIssuerFactory,
|
|
32256
32437
|
default: NoopTokenIssuerFactory
|
|
32257
32438
|
});
|
|
@@ -32273,7 +32454,7 @@ class NoopTokenVerifier {
|
|
|
32273
32454
|
}
|
|
32274
32455
|
}
|
|
32275
32456
|
|
|
32276
|
-
const FACTORY_META$
|
|
32457
|
+
const FACTORY_META$x = {
|
|
32277
32458
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
32278
32459
|
key: 'NoopTokenVerifier',
|
|
32279
32460
|
};
|
|
@@ -32289,7 +32470,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
32289
32470
|
|
|
32290
32471
|
var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
32291
32472
|
__proto__: null,
|
|
32292
|
-
FACTORY_META: FACTORY_META$
|
|
32473
|
+
FACTORY_META: FACTORY_META$x,
|
|
32293
32474
|
NoopTokenVerifierFactory: NoopTokenVerifierFactory,
|
|
32294
32475
|
default: NoopTokenVerifierFactory
|
|
32295
32476
|
});
|
|
@@ -32302,7 +32483,7 @@ function getOAuth2AuthorizerModule() {
|
|
|
32302
32483
|
}
|
|
32303
32484
|
return oauth2AuthorizerModulePromise;
|
|
32304
32485
|
}
|
|
32305
|
-
const FACTORY_META$
|
|
32486
|
+
const FACTORY_META$w = {
|
|
32306
32487
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32307
32488
|
key: 'OAuth2Authorizer',
|
|
32308
32489
|
};
|
|
@@ -32447,7 +32628,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
|
|
|
32447
32628
|
|
|
32448
32629
|
var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32449
32630
|
__proto__: null,
|
|
32450
|
-
FACTORY_META: FACTORY_META$
|
|
32631
|
+
FACTORY_META: FACTORY_META$w,
|
|
32451
32632
|
OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
|
|
32452
32633
|
default: OAuth2AuthorizerFactory
|
|
32453
32634
|
});
|
|
@@ -32487,7 +32668,7 @@ function normalizeConfig$a(config) {
|
|
|
32487
32668
|
}
|
|
32488
32669
|
return normalized;
|
|
32489
32670
|
}
|
|
32490
|
-
const FACTORY_META$
|
|
32671
|
+
const FACTORY_META$v = {
|
|
32491
32672
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32492
32673
|
key: 'OAuth2ClientCredentialsTokenProvider',
|
|
32493
32674
|
};
|
|
@@ -32518,7 +32699,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
|
|
|
32518
32699
|
|
|
32519
32700
|
var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32520
32701
|
__proto__: null,
|
|
32521
|
-
FACTORY_META: FACTORY_META$
|
|
32702
|
+
FACTORY_META: FACTORY_META$v,
|
|
32522
32703
|
OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
|
|
32523
32704
|
default: OAuth2ClientCredentialsTokenProviderFactory
|
|
32524
32705
|
});
|
|
@@ -32600,7 +32781,7 @@ function normalizeConfig$9(config) {
|
|
|
32600
32781
|
}
|
|
32601
32782
|
return normalized;
|
|
32602
32783
|
}
|
|
32603
|
-
const FACTORY_META$
|
|
32784
|
+
const FACTORY_META$u = {
|
|
32604
32785
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32605
32786
|
key: 'OAuth2PkceTokenProvider',
|
|
32606
32787
|
};
|
|
@@ -32655,7 +32836,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
|
|
|
32655
32836
|
|
|
32656
32837
|
var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32657
32838
|
__proto__: null,
|
|
32658
|
-
FACTORY_META: FACTORY_META$
|
|
32839
|
+
FACTORY_META: FACTORY_META$u,
|
|
32659
32840
|
OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
|
|
32660
32841
|
default: OAuth2PkceTokenProviderFactory
|
|
32661
32842
|
});
|
|
@@ -32705,7 +32886,7 @@ class QueryParamAuthInjectionStrategy {
|
|
|
32705
32886
|
}
|
|
32706
32887
|
}
|
|
32707
32888
|
|
|
32708
|
-
const FACTORY_META$
|
|
32889
|
+
const FACTORY_META$t = {
|
|
32709
32890
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
32710
32891
|
key: 'QueryParamAuth',
|
|
32711
32892
|
};
|
|
@@ -32745,7 +32926,7 @@ function normalizeConfig$8(config) {
|
|
|
32745
32926
|
|
|
32746
32927
|
var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
32747
32928
|
__proto__: null,
|
|
32748
|
-
FACTORY_META: FACTORY_META$
|
|
32929
|
+
FACTORY_META: FACTORY_META$t,
|
|
32749
32930
|
QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
|
|
32750
32931
|
default: QueryParamAuthInjectionStrategyFactory
|
|
32751
32932
|
});
|
|
@@ -32781,7 +32962,7 @@ function normalizeConfig$7(config) {
|
|
|
32781
32962
|
secretConfig: normalizeSecretSource(secretSource),
|
|
32782
32963
|
};
|
|
32783
32964
|
}
|
|
32784
|
-
const FACTORY_META$
|
|
32965
|
+
const FACTORY_META$s = {
|
|
32785
32966
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
32786
32967
|
key: 'SharedSecretAuthorizer',
|
|
32787
32968
|
};
|
|
@@ -32800,7 +32981,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
|
|
|
32800
32981
|
|
|
32801
32982
|
var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
32802
32983
|
__proto__: null,
|
|
32803
|
-
FACTORY_META: FACTORY_META$
|
|
32984
|
+
FACTORY_META: FACTORY_META$s,
|
|
32804
32985
|
SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
|
|
32805
32986
|
default: SharedSecretAuthorizerFactory
|
|
32806
32987
|
});
|
|
@@ -32836,7 +33017,7 @@ function normalizeConfig$6(config) {
|
|
|
32836
33017
|
secretConfig: normalizeSecretSource(secretSource),
|
|
32837
33018
|
};
|
|
32838
33019
|
}
|
|
32839
|
-
const FACTORY_META$
|
|
33020
|
+
const FACTORY_META$r = {
|
|
32840
33021
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
32841
33022
|
key: 'SharedSecretTokenProvider',
|
|
32842
33023
|
};
|
|
@@ -32855,7 +33036,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
|
|
|
32855
33036
|
|
|
32856
33037
|
var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
32857
33038
|
__proto__: null,
|
|
32858
|
-
FACTORY_META: FACTORY_META$
|
|
33039
|
+
FACTORY_META: FACTORY_META$r,
|
|
32859
33040
|
SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
|
|
32860
33041
|
default: SharedSecretTokenProviderFactory
|
|
32861
33042
|
});
|
|
@@ -32899,7 +33080,7 @@ function normalizeConfig$5(config) {
|
|
|
32899
33080
|
}
|
|
32900
33081
|
return normalized;
|
|
32901
33082
|
}
|
|
32902
|
-
const FACTORY_META$
|
|
33083
|
+
const FACTORY_META$q = {
|
|
32903
33084
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
32904
33085
|
key: 'SharedSecretTokenVerifier',
|
|
32905
33086
|
};
|
|
@@ -32924,7 +33105,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
32924
33105
|
|
|
32925
33106
|
var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
32926
33107
|
__proto__: null,
|
|
32927
|
-
FACTORY_META: FACTORY_META$
|
|
33108
|
+
FACTORY_META: FACTORY_META$q,
|
|
32928
33109
|
SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
|
|
32929
33110
|
default: SharedSecretTokenVerifierFactory
|
|
32930
33111
|
});
|
|
@@ -33039,7 +33220,7 @@ function normalizeConfig$4(config) {
|
|
|
33039
33220
|
}
|
|
33040
33221
|
return options;
|
|
33041
33222
|
}
|
|
33042
|
-
const FACTORY_META$
|
|
33223
|
+
const FACTORY_META$p = {
|
|
33043
33224
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
33044
33225
|
key: 'StaticTokenProvider',
|
|
33045
33226
|
};
|
|
@@ -33056,7 +33237,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
|
|
|
33056
33237
|
|
|
33057
33238
|
var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33058
33239
|
__proto__: null,
|
|
33059
|
-
FACTORY_META: FACTORY_META$
|
|
33240
|
+
FACTORY_META: FACTORY_META$p,
|
|
33060
33241
|
StaticTokenProviderFactory: StaticTokenProviderFactory,
|
|
33061
33242
|
default: StaticTokenProviderFactory
|
|
33062
33243
|
});
|
|
@@ -33107,7 +33288,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
|
|
|
33107
33288
|
}
|
|
33108
33289
|
}
|
|
33109
33290
|
|
|
33110
|
-
const FACTORY_META$
|
|
33291
|
+
const FACTORY_META$o = {
|
|
33111
33292
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
33112
33293
|
key: 'WebSocketSubprotocolAuth',
|
|
33113
33294
|
};
|
|
@@ -33149,7 +33330,7 @@ function normalizeConfig$3(config) {
|
|
|
33149
33330
|
|
|
33150
33331
|
var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
33151
33332
|
__proto__: null,
|
|
33152
|
-
FACTORY_META: FACTORY_META$
|
|
33333
|
+
FACTORY_META: FACTORY_META$o,
|
|
33153
33334
|
WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
|
|
33154
33335
|
default: WebSocketSubprotocolAuthInjectionStrategyFactory
|
|
33155
33336
|
});
|
|
@@ -33197,7 +33378,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
33197
33378
|
throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
|
|
33198
33379
|
}
|
|
33199
33380
|
}
|
|
33200
|
-
const FACTORY_META$
|
|
33381
|
+
const FACTORY_META$n = {
|
|
33201
33382
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
33202
33383
|
key: 'DevFixedKeyCredentialProvider',
|
|
33203
33384
|
};
|
|
@@ -33205,7 +33386,7 @@ const FACTORY_META$m = {
|
|
|
33205
33386
|
var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33206
33387
|
__proto__: null,
|
|
33207
33388
|
DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
|
|
33208
|
-
FACTORY_META: FACTORY_META$
|
|
33389
|
+
FACTORY_META: FACTORY_META$n,
|
|
33209
33390
|
default: DevFixedKeyCredentialProviderFactory,
|
|
33210
33391
|
normalizeDevFixedConfig: normalizeDevFixedConfig
|
|
33211
33392
|
});
|
|
@@ -33221,14 +33402,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
33221
33402
|
return new NoneCredentialProvider();
|
|
33222
33403
|
}
|
|
33223
33404
|
}
|
|
33224
|
-
const FACTORY_META$
|
|
33405
|
+
const FACTORY_META$m = {
|
|
33225
33406
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
33226
33407
|
key: 'NoneCredentialProvider',
|
|
33227
33408
|
};
|
|
33228
33409
|
|
|
33229
33410
|
var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33230
33411
|
__proto__: null,
|
|
33231
|
-
FACTORY_META: FACTORY_META$
|
|
33412
|
+
FACTORY_META: FACTORY_META$m,
|
|
33232
33413
|
NoneCredentialProviderFactory: NoneCredentialProviderFactory,
|
|
33233
33414
|
default: NoneCredentialProviderFactory
|
|
33234
33415
|
});
|
|
@@ -33266,14 +33447,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
33266
33447
|
return new SessionKeyCredentialProvider(resolved.length);
|
|
33267
33448
|
}
|
|
33268
33449
|
}
|
|
33269
|
-
const FACTORY_META$
|
|
33450
|
+
const FACTORY_META$l = {
|
|
33270
33451
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
33271
33452
|
key: 'SessionKeyCredentialProvider',
|
|
33272
33453
|
};
|
|
33273
33454
|
|
|
33274
33455
|
var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
33275
33456
|
__proto__: null,
|
|
33276
|
-
FACTORY_META: FACTORY_META$
|
|
33457
|
+
FACTORY_META: FACTORY_META$l,
|
|
33277
33458
|
SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
|
|
33278
33459
|
default: SessionKeyCredentialProviderFactory,
|
|
33279
33460
|
normalizeSessionKeyConfig: normalizeSessionKeyConfig
|
|
@@ -33311,9 +33492,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
|
|
|
33311
33492
|
ensureAlias('keyValidator', 'key_validator');
|
|
33312
33493
|
ensureAlias('eventListeners', 'event_listeners');
|
|
33313
33494
|
ensureAlias('cryptoProvider', 'crypto_provider');
|
|
33495
|
+
ensureAlias('trustStoreProvider', 'trust_store_provider');
|
|
33314
33496
|
return normalized;
|
|
33315
33497
|
}
|
|
33316
|
-
const FACTORY_META$
|
|
33498
|
+
const FACTORY_META$k = {
|
|
33317
33499
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
33318
33500
|
key: 'DefaultSecurityManager',
|
|
33319
33501
|
};
|
|
@@ -33359,6 +33541,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33359
33541
|
const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
|
|
33360
33542
|
const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
|
|
33361
33543
|
const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
|
|
33544
|
+
const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
|
|
33362
33545
|
const listenersSource = overrides?.eventListeners ??
|
|
33363
33546
|
config.eventListeners ??
|
|
33364
33547
|
config.event_listeners;
|
|
@@ -33378,10 +33561,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33378
33561
|
secureChannelManager,
|
|
33379
33562
|
eventListeners,
|
|
33380
33563
|
cryptoProvider: cryptoProvider ?? null,
|
|
33564
|
+
trustStoreProvider: trustStoreProvider ?? null,
|
|
33381
33565
|
};
|
|
33382
33566
|
}
|
|
33383
33567
|
static async buildSecurityManager(options) {
|
|
33384
|
-
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
|
|
33568
|
+
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
|
|
33385
33569
|
if (!keyStore) {
|
|
33386
33570
|
keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
|
|
33387
33571
|
}
|
|
@@ -33394,6 +33578,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33394
33578
|
if (!policy) {
|
|
33395
33579
|
throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
|
|
33396
33580
|
}
|
|
33581
|
+
if (!trustStoreProvider) {
|
|
33582
|
+
trustStoreProvider =
|
|
33583
|
+
await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
33584
|
+
}
|
|
33397
33585
|
if (!keyManager) {
|
|
33398
33586
|
keyManager =
|
|
33399
33587
|
await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
|
|
@@ -33404,7 +33592,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33404
33592
|
}
|
|
33405
33593
|
if (!envelopeVerifier) {
|
|
33406
33594
|
envelopeVerifier =
|
|
33407
|
-
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
|
|
33595
|
+
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
|
|
33408
33596
|
}
|
|
33409
33597
|
if (!encryptionManager || !secureChannelManager) {
|
|
33410
33598
|
const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
|
|
@@ -33504,7 +33692,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33504
33692
|
throw error instanceof Error ? error : new Error(String(error));
|
|
33505
33693
|
}
|
|
33506
33694
|
}
|
|
33507
|
-
static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
|
|
33695
|
+
static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
|
|
33508
33696
|
const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
|
|
33509
33697
|
if (verifierConfig &&
|
|
33510
33698
|
DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
|
|
@@ -33528,7 +33716,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33528
33716
|
}
|
|
33529
33717
|
const signing = policy.signing ?? null;
|
|
33530
33718
|
return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
|
|
33531
|
-
factoryArgs: [keyManager, signing ?? null],
|
|
33719
|
+
factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
|
|
33532
33720
|
});
|
|
33533
33721
|
}
|
|
33534
33722
|
catch (error) {
|
|
@@ -33769,11 +33957,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
33769
33957
|
var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33770
33958
|
__proto__: null,
|
|
33771
33959
|
DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
|
|
33772
|
-
FACTORY_META: FACTORY_META$
|
|
33960
|
+
FACTORY_META: FACTORY_META$k,
|
|
33773
33961
|
default: DefaultSecurityManagerFactory
|
|
33774
33962
|
});
|
|
33775
33963
|
|
|
33776
|
-
const FACTORY_META$
|
|
33964
|
+
const FACTORY_META$j = {
|
|
33777
33965
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
33778
33966
|
key: 'NoopEncryptionManager',
|
|
33779
33967
|
};
|
|
@@ -33830,7 +34018,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
|
|
|
33830
34018
|
|
|
33831
34019
|
var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33832
34020
|
__proto__: null,
|
|
33833
|
-
FACTORY_META: FACTORY_META$
|
|
34021
|
+
FACTORY_META: FACTORY_META$j,
|
|
33834
34022
|
NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
|
|
33835
34023
|
default: NoopEncryptionManagerFactory
|
|
33836
34024
|
});
|
|
@@ -33902,7 +34090,7 @@ class NoopSecureChannelManager {
|
|
|
33902
34090
|
}
|
|
33903
34091
|
}
|
|
33904
34092
|
|
|
33905
|
-
const FACTORY_META$
|
|
34093
|
+
const FACTORY_META$i = {
|
|
33906
34094
|
base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
|
|
33907
34095
|
key: 'NoopSecureChannelManager',
|
|
33908
34096
|
};
|
|
@@ -33919,12 +34107,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
|
|
|
33919
34107
|
|
|
33920
34108
|
var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33921
34109
|
__proto__: null,
|
|
33922
|
-
FACTORY_META: FACTORY_META$
|
|
34110
|
+
FACTORY_META: FACTORY_META$i,
|
|
33923
34111
|
NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
|
|
33924
34112
|
default: NoopSecureChannelManagerFactory
|
|
33925
34113
|
});
|
|
33926
34114
|
|
|
33927
|
-
const FACTORY_META$
|
|
34115
|
+
const FACTORY_META$h = {
|
|
33928
34116
|
base: KEY_MANAGER_FACTORY_BASE_TYPE,
|
|
33929
34117
|
key: 'DefaultKeyManager',
|
|
33930
34118
|
};
|
|
@@ -33952,7 +34140,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
|
|
|
33952
34140
|
var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
|
|
33953
34141
|
__proto__: null,
|
|
33954
34142
|
DefaultKeyManagerFactory: DefaultKeyManagerFactory,
|
|
33955
|
-
FACTORY_META: FACTORY_META$
|
|
34143
|
+
FACTORY_META: FACTORY_META$h,
|
|
33956
34144
|
default: DefaultKeyManagerFactory
|
|
33957
34145
|
});
|
|
33958
34146
|
|
|
@@ -34137,7 +34325,7 @@ class InMemoryKeyStore extends KeyStore {
|
|
|
34137
34325
|
}
|
|
34138
34326
|
registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
|
|
34139
34327
|
|
|
34140
|
-
const FACTORY_META$
|
|
34328
|
+
const FACTORY_META$g = {
|
|
34141
34329
|
base: KEY_STORE_FACTORY_BASE_TYPE,
|
|
34142
34330
|
key: 'InMemoryKeyStore',
|
|
34143
34331
|
};
|
|
@@ -34172,12 +34360,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
|
|
|
34172
34360
|
|
|
34173
34361
|
var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
|
|
34174
34362
|
__proto__: null,
|
|
34175
|
-
FACTORY_META: FACTORY_META$
|
|
34363
|
+
FACTORY_META: FACTORY_META$g,
|
|
34176
34364
|
InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
|
|
34177
34365
|
default: InMemoryKeyStoreFactory
|
|
34178
34366
|
});
|
|
34179
34367
|
|
|
34180
|
-
const FACTORY_META$
|
|
34368
|
+
const FACTORY_META$f = {
|
|
34181
34369
|
base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
|
|
34182
34370
|
key: 'NoopKeyValidator',
|
|
34183
34371
|
};
|
|
@@ -34195,12 +34383,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
|
|
|
34195
34383
|
|
|
34196
34384
|
var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
|
|
34197
34385
|
__proto__: null,
|
|
34198
|
-
FACTORY_META: FACTORY_META$
|
|
34386
|
+
FACTORY_META: FACTORY_META$f,
|
|
34199
34387
|
NoopKeyValidatorFactory: NoopKeyValidatorFactory,
|
|
34200
34388
|
default: NoopKeyValidatorFactory
|
|
34201
34389
|
});
|
|
34202
34390
|
|
|
34203
|
-
const FACTORY_META$
|
|
34391
|
+
const FACTORY_META$e = {
|
|
34204
34392
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
34205
34393
|
key: 'DefaultSecurityPolicy',
|
|
34206
34394
|
};
|
|
@@ -34261,11 +34449,11 @@ function normalizeConfig$2(config) {
|
|
|
34261
34449
|
var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
34262
34450
|
__proto__: null,
|
|
34263
34451
|
DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
|
|
34264
|
-
FACTORY_META: FACTORY_META$
|
|
34452
|
+
FACTORY_META: FACTORY_META$e,
|
|
34265
34453
|
default: DefaultSecurityPolicyFactory
|
|
34266
34454
|
});
|
|
34267
34455
|
|
|
34268
|
-
const FACTORY_META$
|
|
34456
|
+
const FACTORY_META$d = {
|
|
34269
34457
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
34270
34458
|
key: 'NoSecurityPolicy',
|
|
34271
34459
|
};
|
|
@@ -34293,7 +34481,7 @@ function normalizeConfig$1(config) {
|
|
|
34293
34481
|
|
|
34294
34482
|
var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
34295
34483
|
__proto__: null,
|
|
34296
|
-
FACTORY_META: FACTORY_META$
|
|
34484
|
+
FACTORY_META: FACTORY_META$d,
|
|
34297
34485
|
NoSecurityPolicyFactory: NoSecurityPolicyFactory,
|
|
34298
34486
|
default: NoSecurityPolicyFactory
|
|
34299
34487
|
});
|
|
@@ -34308,7 +34496,7 @@ async function getEdDSAEnvelopeSignerModule() {
|
|
|
34308
34496
|
}
|
|
34309
34497
|
return eddsaEnvelopeSignerModulePromise;
|
|
34310
34498
|
}
|
|
34311
|
-
const FACTORY_META$
|
|
34499
|
+
const FACTORY_META$c = {
|
|
34312
34500
|
base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
|
|
34313
34501
|
key: 'EdDSAEnvelopeSigner',
|
|
34314
34502
|
};
|
|
@@ -34337,7 +34525,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
|
|
|
34337
34525
|
var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
|
|
34338
34526
|
__proto__: null,
|
|
34339
34527
|
EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
|
|
34340
|
-
FACTORY_META: FACTORY_META$
|
|
34528
|
+
FACTORY_META: FACTORY_META$c,
|
|
34341
34529
|
default: EdDSAEnvelopeSignerFactory
|
|
34342
34530
|
});
|
|
34343
34531
|
|
|
@@ -34351,7 +34539,7 @@ async function getEdDSAEnvelopeVerifierModule() {
|
|
|
34351
34539
|
}
|
|
34352
34540
|
return eddsaEnvelopeVerifierModulePromise;
|
|
34353
34541
|
}
|
|
34354
|
-
const FACTORY_META$
|
|
34542
|
+
const FACTORY_META$b = {
|
|
34355
34543
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
34356
34544
|
key: 'EdDSAEnvelopeVerifier',
|
|
34357
34545
|
};
|
|
@@ -34377,10 +34565,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
34377
34565
|
var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
34378
34566
|
__proto__: null,
|
|
34379
34567
|
EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
|
|
34380
|
-
FACTORY_META: FACTORY_META$
|
|
34568
|
+
FACTORY_META: FACTORY_META$b,
|
|
34381
34569
|
default: EdDSAEnvelopeVerifierFactory
|
|
34382
34570
|
});
|
|
34383
34571
|
|
|
34572
|
+
const FACTORY_META$a = {
|
|
34573
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
34574
|
+
key: "NoopTrustStoreProvider",
|
|
34575
|
+
isDefault: true,
|
|
34576
|
+
priority: 10,
|
|
34577
|
+
};
|
|
34578
|
+
class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
34579
|
+
constructor() {
|
|
34580
|
+
super(...arguments);
|
|
34581
|
+
this.type = "NoopTrustStoreProvider";
|
|
34582
|
+
this.isDefault = true;
|
|
34583
|
+
this.priority = 10;
|
|
34584
|
+
}
|
|
34585
|
+
async create(_config, ..._factoryArgs) {
|
|
34586
|
+
return new NoopTrustStoreProvider();
|
|
34587
|
+
}
|
|
34588
|
+
}
|
|
34589
|
+
|
|
34590
|
+
var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
34591
|
+
__proto__: null,
|
|
34592
|
+
FACTORY_META: FACTORY_META$a,
|
|
34593
|
+
NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
|
|
34594
|
+
default: NoopTrustStoreProviderFactory
|
|
34595
|
+
});
|
|
34596
|
+
|
|
34384
34597
|
const FACTORY_META$9 = {
|
|
34385
34598
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
34386
34599
|
key: 'CapabilityAwareRoutingPolicy',
|
|
@@ -39370,146 +39583,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
39370
39583
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
39371
39584
|
});
|
|
39372
39585
|
|
|
39373
|
-
if (!hashes.sha512) {
|
|
39374
|
-
hashes.sha512 = (message) => sha512(message);
|
|
39375
|
-
}
|
|
39376
|
-
function normalizeSignerOptions(options) {
|
|
39377
|
-
if (!options || typeof options !== 'object') {
|
|
39378
|
-
return {};
|
|
39379
|
-
}
|
|
39380
|
-
const candidate = options;
|
|
39381
|
-
const result = {
|
|
39382
|
-
...options,
|
|
39383
|
-
};
|
|
39384
|
-
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
39385
|
-
if (cryptoProvider !== undefined) {
|
|
39386
|
-
result.cryptoProvider = cryptoProvider ?? null;
|
|
39387
|
-
}
|
|
39388
|
-
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
39389
|
-
if (signingConfig !== undefined) {
|
|
39390
|
-
result.signingConfig = signingConfig;
|
|
39391
|
-
}
|
|
39392
|
-
const privateKeyPem = resolveAlias(candidate, [
|
|
39393
|
-
'privateKeyPem',
|
|
39394
|
-
'private_key_pem',
|
|
39395
|
-
]);
|
|
39396
|
-
if (privateKeyPem !== undefined) {
|
|
39397
|
-
result.privateKeyPem = privateKeyPem;
|
|
39398
|
-
}
|
|
39399
|
-
const keyId = resolveAlias(candidate, [
|
|
39400
|
-
'keyId',
|
|
39401
|
-
'key_id',
|
|
39402
|
-
]);
|
|
39403
|
-
if (keyId !== undefined) {
|
|
39404
|
-
result.keyId = keyId;
|
|
39405
|
-
}
|
|
39406
|
-
return result;
|
|
39407
|
-
}
|
|
39408
|
-
class EdDSAEnvelopeSigner {
|
|
39409
|
-
constructor(options = {}) {
|
|
39410
|
-
const normalized = normalizeSignerOptions(options);
|
|
39411
|
-
const provider = normalized.cryptoProvider ?? null;
|
|
39412
|
-
if (!provider) {
|
|
39413
|
-
throw new Error('No crypto provider is configured for signing');
|
|
39414
|
-
}
|
|
39415
|
-
this.crypto = provider;
|
|
39416
|
-
const signingConfigOption = normalized.signingConfig;
|
|
39417
|
-
if (signingConfigOption instanceof SigningConfig) {
|
|
39418
|
-
this.signingConfig = signingConfigOption;
|
|
39419
|
-
}
|
|
39420
|
-
else if (signingConfigOption) {
|
|
39421
|
-
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
39422
|
-
}
|
|
39423
|
-
else {
|
|
39424
|
-
this.signingConfig = new SigningConfig();
|
|
39425
|
-
}
|
|
39426
|
-
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
39427
|
-
this.explicitKeyId = normalized.keyId;
|
|
39428
|
-
}
|
|
39429
|
-
signEnvelope(envelope, { physicalPath }) {
|
|
39430
|
-
if (!envelope.sid) {
|
|
39431
|
-
throw new Error('Envelope missing sid');
|
|
39432
|
-
}
|
|
39433
|
-
const frame = envelope.frame;
|
|
39434
|
-
if (frame.type === 'Data') {
|
|
39435
|
-
const dataFrame = frame;
|
|
39436
|
-
if (!dataFrame.pd) {
|
|
39437
|
-
const payload = dataFrame.payload ?? '';
|
|
39438
|
-
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
39439
|
-
dataFrame.pd = secureDigest(payloadString);
|
|
39440
|
-
}
|
|
39441
|
-
}
|
|
39442
|
-
const digest = frameDigest(frame);
|
|
39443
|
-
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
39444
|
-
const sidDigest = secureDigest(physicalPath);
|
|
39445
|
-
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
39446
|
-
1 +
|
|
39447
|
-
encodeUtf8(immutable).length +
|
|
39448
|
-
1 +
|
|
39449
|
-
encodeUtf8(digest).length);
|
|
39450
|
-
const sidBytes = encodeUtf8(sidDigest);
|
|
39451
|
-
const immBytes = encodeUtf8(immutable);
|
|
39452
|
-
const digBytes = encodeUtf8(digest);
|
|
39453
|
-
let offset = 0;
|
|
39454
|
-
tbs.set(sidBytes, offset);
|
|
39455
|
-
offset += sidBytes.length;
|
|
39456
|
-
tbs[offset] = 0x1f;
|
|
39457
|
-
offset += 1;
|
|
39458
|
-
tbs.set(immBytes, offset);
|
|
39459
|
-
offset += immBytes.length;
|
|
39460
|
-
tbs[offset] = 0x1f;
|
|
39461
|
-
offset += 1;
|
|
39462
|
-
tbs.set(digBytes, offset);
|
|
39463
|
-
const privateKey = this.loadPrivateKey();
|
|
39464
|
-
const signatureBytes = sign(tbs, privateKey);
|
|
39465
|
-
const signature = urlsafeBase64Encode(signatureBytes);
|
|
39466
|
-
const kid = this.determineKeyId();
|
|
39467
|
-
const signatureHeader = {
|
|
39468
|
-
kid,
|
|
39469
|
-
val: signature,
|
|
39470
|
-
alg: 'EdDSA',
|
|
39471
|
-
};
|
|
39472
|
-
const secHeader = envelope.sec ?? {};
|
|
39473
|
-
secHeader.sig = signatureHeader;
|
|
39474
|
-
envelope.sec = secHeader;
|
|
39475
|
-
return envelope;
|
|
39476
|
-
}
|
|
39477
|
-
loadPrivateKey() {
|
|
39478
|
-
const pem = this.explicitPrivateKey ??
|
|
39479
|
-
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
39480
|
-
if (!pem) {
|
|
39481
|
-
throw new Error('Crypto provider does not expose a signing private key');
|
|
39482
|
-
}
|
|
39483
|
-
return parseEd25519PrivateKey(pem);
|
|
39484
|
-
}
|
|
39485
|
-
determineKeyId() {
|
|
39486
|
-
if (this.explicitKeyId) {
|
|
39487
|
-
return this.explicitKeyId;
|
|
39488
|
-
}
|
|
39489
|
-
if (this.signingConfig.signingMaterial === SigningMaterial.X509_CHAIN) {
|
|
39490
|
-
const certificateProvider = this
|
|
39491
|
-
.crypto;
|
|
39492
|
-
const jwk = certificateProvider.nodeJwk?.();
|
|
39493
|
-
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
39494
|
-
const kid = jwk.kid;
|
|
39495
|
-
if (typeof kid === 'string' && kid.length > 0) {
|
|
39496
|
-
return kid;
|
|
39497
|
-
}
|
|
39498
|
-
}
|
|
39499
|
-
}
|
|
39500
|
-
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
39501
|
-
if (!fallback) {
|
|
39502
|
-
throw new Error('Crypto provider does not expose a signature key id');
|
|
39503
|
-
}
|
|
39504
|
-
return fallback;
|
|
39505
|
-
}
|
|
39506
|
-
}
|
|
39507
|
-
|
|
39508
|
-
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
39509
|
-
__proto__: null,
|
|
39510
|
-
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
39511
|
-
});
|
|
39512
|
-
|
|
39513
39586
|
async function loadPublicKey(jwk, signingConfig) {
|
|
39514
39587
|
if (jwk.x5c) {
|
|
39515
39588
|
if (signingConfig.signingMaterial !== SigningMaterial.X509_CHAIN) {
|
|
@@ -39747,4 +39820,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
|
|
|
39747
39820
|
WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
|
|
39748
39821
|
});
|
|
39749
39822
|
|
|
39750
|
-
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META
|
|
39823
|
+
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$$ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$10 as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|