@naylence/runtime 0.3.5-test.922 → 0.3.5-test.924
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +355 -278
- package/dist/browser/index.mjs +346 -273
- package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/cjs/naylence/fame/security/index.js +8 -1
- package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/factory-manifest.js +2 -0
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/esm/naylence/fame/security/index.js +3 -0
- package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +351 -274
- package/dist/node/index.mjs +346 -273
- package/dist/node/node.cjs +350 -273
- package/dist/node/node.mjs +345 -272
- package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
- package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
- package/dist/types/naylence/fame/security/index.d.ts +4 -0
- package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
- package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/node.cjs
CHANGED
|
@@ -12,11 +12,11 @@ var ed25519_js = require('@noble/curves/ed25519.js');
|
|
|
12
12
|
var hkdf_js = require('@noble/hashes/hkdf.js');
|
|
13
13
|
var sha2_js = require('@noble/hashes/sha2.js');
|
|
14
14
|
var utils_js = require('@noble/hashes/utils.js');
|
|
15
|
+
var ed25519 = require('@noble/ed25519');
|
|
15
16
|
var fastify = require('fastify');
|
|
16
17
|
var websocketPlugin = require('@fastify/websocket');
|
|
17
18
|
var formbody = require('@fastify/formbody');
|
|
18
19
|
var node_crypto = require('node:crypto');
|
|
19
|
-
var ed25519 = require('@noble/ed25519');
|
|
20
20
|
|
|
21
21
|
/**
|
|
22
22
|
* Cross-platform logging utilities for Naylence Fame
|
|
@@ -3392,7 +3392,7 @@ class WebSocketConnectionGrantImpl {
|
|
|
3392
3392
|
this.purpose = 'connection';
|
|
3393
3393
|
}
|
|
3394
3394
|
}
|
|
3395
|
-
const FACTORY_META$
|
|
3395
|
+
const FACTORY_META$18 = {
|
|
3396
3396
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
3397
3397
|
key: 'WebSocketConnector',
|
|
3398
3398
|
};
|
|
@@ -3763,7 +3763,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
|
|
|
3763
3763
|
|
|
3764
3764
|
var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
3765
3765
|
__proto__: null,
|
|
3766
|
-
FACTORY_META: FACTORY_META$
|
|
3766
|
+
FACTORY_META: FACTORY_META$18,
|
|
3767
3767
|
WebSocketConnectorFactory: WebSocketConnectorFactory,
|
|
3768
3768
|
default: WebSocketConnectorFactory,
|
|
3769
3769
|
setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
|
|
@@ -3896,7 +3896,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3896
3896
|
return new EnvCredentialProvider(resolved.varName);
|
|
3897
3897
|
}
|
|
3898
3898
|
}
|
|
3899
|
-
const FACTORY_META$
|
|
3899
|
+
const FACTORY_META$17 = {
|
|
3900
3900
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3901
3901
|
key: 'EnvCredentialProvider',
|
|
3902
3902
|
};
|
|
@@ -3904,7 +3904,7 @@ const FACTORY_META$16 = {
|
|
|
3904
3904
|
var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3905
3905
|
__proto__: null,
|
|
3906
3906
|
EnvCredentialProviderFactory: EnvCredentialProviderFactory,
|
|
3907
|
-
FACTORY_META: FACTORY_META$
|
|
3907
|
+
FACTORY_META: FACTORY_META$17,
|
|
3908
3908
|
default: EnvCredentialProviderFactory,
|
|
3909
3909
|
normalizeEnvConfig: normalizeEnvConfig
|
|
3910
3910
|
});
|
|
@@ -4002,14 +4002,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
4002
4002
|
return new PromptCredentialProvider(resolved.credentialName);
|
|
4003
4003
|
}
|
|
4004
4004
|
}
|
|
4005
|
-
const FACTORY_META$
|
|
4005
|
+
const FACTORY_META$16 = {
|
|
4006
4006
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
4007
4007
|
key: 'PromptCredentialProvider',
|
|
4008
4008
|
};
|
|
4009
4009
|
|
|
4010
4010
|
var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
4011
4011
|
__proto__: null,
|
|
4012
|
-
FACTORY_META: FACTORY_META$
|
|
4012
|
+
FACTORY_META: FACTORY_META$16,
|
|
4013
4013
|
PromptCredentialProviderFactory: PromptCredentialProviderFactory,
|
|
4014
4014
|
default: PromptCredentialProviderFactory,
|
|
4015
4015
|
normalizePromptConfig: normalizePromptConfig
|
|
@@ -4063,14 +4063,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
4063
4063
|
return new SecretStoreCredentialProvider(resolved.secretName);
|
|
4064
4064
|
}
|
|
4065
4065
|
}
|
|
4066
|
-
const FACTORY_META$
|
|
4066
|
+
const FACTORY_META$15 = {
|
|
4067
4067
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
4068
4068
|
key: 'SecretStoreCredentialProvider',
|
|
4069
4069
|
};
|
|
4070
4070
|
|
|
4071
4071
|
var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
4072
4072
|
__proto__: null,
|
|
4073
|
-
FACTORY_META: FACTORY_META$
|
|
4073
|
+
FACTORY_META: FACTORY_META$15,
|
|
4074
4074
|
SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
|
|
4075
4075
|
default: SecretStoreCredentialProviderFactory,
|
|
4076
4076
|
normalizeSecretStoreConfig: normalizeSecretStoreConfig
|
|
@@ -4119,14 +4119,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
4119
4119
|
return new StaticCredentialProvider(resolved.credentialValue);
|
|
4120
4120
|
}
|
|
4121
4121
|
}
|
|
4122
|
-
const FACTORY_META$
|
|
4122
|
+
const FACTORY_META$14 = {
|
|
4123
4123
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
4124
4124
|
key: 'StaticCredentialProvider',
|
|
4125
4125
|
};
|
|
4126
4126
|
|
|
4127
4127
|
var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
4128
4128
|
__proto__: null,
|
|
4129
|
-
FACTORY_META: FACTORY_META$
|
|
4129
|
+
FACTORY_META: FACTORY_META$14,
|
|
4130
4130
|
StaticCredentialProviderFactory: StaticCredentialProviderFactory,
|
|
4131
4131
|
default: StaticCredentialProviderFactory,
|
|
4132
4132
|
normalizeStaticConfig: normalizeStaticConfig
|
|
@@ -5372,12 +5372,12 @@ for (const [name, config] of Object.entries(SQLITE_PROFILES)) {
|
|
|
5372
5372
|
}
|
|
5373
5373
|
|
|
5374
5374
|
// This file is auto-generated during build - do not edit manually
|
|
5375
|
-
// Generated from package.json version: 0.3.5-test.
|
|
5375
|
+
// Generated from package.json version: 0.3.5-test.924
|
|
5376
5376
|
/**
|
|
5377
5377
|
* The package version, injected at build time.
|
|
5378
5378
|
* @internal
|
|
5379
5379
|
*/
|
|
5380
|
-
const VERSION = '0.3.5-test.
|
|
5380
|
+
const VERSION = '0.3.5-test.924';
|
|
5381
5381
|
|
|
5382
5382
|
/**
|
|
5383
5383
|
* Fame errors module - Fame protocol specific error classes
|
|
@@ -15118,6 +15118,7 @@ const MODULES = [
|
|
|
15118
15118
|
"./security/policy/no-security-policy-factory.js",
|
|
15119
15119
|
"./security/signing/eddsa-envelope-signer-factory.js",
|
|
15120
15120
|
"./security/signing/eddsa-envelope-verifier-factory.js",
|
|
15121
|
+
"./security/trust-store/noop-trust-store-provider-factory.js",
|
|
15121
15122
|
"./sentinel/capability-aware-routing-policy-factory.js",
|
|
15122
15123
|
"./sentinel/composite-routing-policy-factory.js",
|
|
15123
15124
|
"./sentinel/hybrid-path-routing-policy-factory.js",
|
|
@@ -15192,6 +15193,7 @@ const MODULE_LOADERS = {
|
|
|
15192
15193
|
"./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
|
|
15193
15194
|
"./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
|
|
15194
15195
|
"./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
|
|
15196
|
+
"./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
|
|
15195
15197
|
"./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
|
|
15196
15198
|
"./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
|
|
15197
15199
|
"./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
|
|
@@ -15496,7 +15498,7 @@ class NodeLikeFactory extends factory.AbstractResourceFactory {
|
|
|
15496
15498
|
// registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
|
|
15497
15499
|
// }
|
|
15498
15500
|
|
|
15499
|
-
const FACTORY_META$
|
|
15501
|
+
const FACTORY_META$13 = {
|
|
15500
15502
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
15501
15503
|
key: 'Node',
|
|
15502
15504
|
};
|
|
@@ -15537,7 +15539,7 @@ class NodeFactory extends NodeLikeFactory {
|
|
|
15537
15539
|
|
|
15538
15540
|
var nodeFactory = /*#__PURE__*/Object.freeze({
|
|
15539
15541
|
__proto__: null,
|
|
15540
|
-
FACTORY_META: FACTORY_META$
|
|
15542
|
+
FACTORY_META: FACTORY_META$13,
|
|
15541
15543
|
NodeFactory: NodeFactory,
|
|
15542
15544
|
default: NodeFactory
|
|
15543
15545
|
});
|
|
@@ -16978,7 +16980,7 @@ class RouteStoreFactory extends factory.AbstractResourceFactory {
|
|
|
16978
16980
|
return store ?? null;
|
|
16979
16981
|
}
|
|
16980
16982
|
}
|
|
16981
|
-
const FACTORY_META$
|
|
16983
|
+
const FACTORY_META$12 = {
|
|
16982
16984
|
base: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
16983
16985
|
key: 'InMemoryRouteStore',
|
|
16984
16986
|
};
|
|
@@ -16996,7 +16998,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
|
|
|
16996
16998
|
|
|
16997
16999
|
var routeStoreFactory = /*#__PURE__*/Object.freeze({
|
|
16998
17000
|
__proto__: null,
|
|
16999
|
-
FACTORY_META: FACTORY_META$
|
|
17001
|
+
FACTORY_META: FACTORY_META$12,
|
|
17000
17002
|
InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
|
|
17001
17003
|
ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
17002
17004
|
RouteStoreFactory: RouteStoreFactory,
|
|
@@ -20812,7 +20814,7 @@ function isPlainRecord(value) {
|
|
|
20812
20814
|
return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
|
|
20813
20815
|
}
|
|
20814
20816
|
|
|
20815
|
-
const FACTORY_META$
|
|
20817
|
+
const FACTORY_META$11 = {
|
|
20816
20818
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
20817
20819
|
key: 'Sentinel',
|
|
20818
20820
|
};
|
|
@@ -20996,7 +20998,7 @@ class SentinelFactory extends NodeLikeFactory {
|
|
|
20996
20998
|
|
|
20997
20999
|
var sentinelFactory = /*#__PURE__*/Object.freeze({
|
|
20998
21000
|
__proto__: null,
|
|
20999
|
-
FACTORY_META: FACTORY_META$
|
|
21001
|
+
FACTORY_META: FACTORY_META$11,
|
|
21000
21002
|
SentinelFactory: SentinelFactory,
|
|
21001
21003
|
default: SentinelFactory
|
|
21002
21004
|
});
|
|
@@ -21610,6 +21612,45 @@ class CertificateManagerFactory extends factory.AbstractResourceFactory {
|
|
|
21610
21612
|
}
|
|
21611
21613
|
}
|
|
21612
21614
|
|
|
21615
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
21616
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
21617
|
+
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
21618
|
+
createUnconfiguredProvider(reason) {
|
|
21619
|
+
return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
21620
|
+
}
|
|
21621
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
21622
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
21623
|
+
const mergedFactoryArgs = [
|
|
21624
|
+
...(dependencies ? [dependencies] : []),
|
|
21625
|
+
...(factoryArgs ?? []),
|
|
21626
|
+
];
|
|
21627
|
+
const creationOptions = {
|
|
21628
|
+
...restOptions,
|
|
21629
|
+
factoryArgs: mergedFactoryArgs,
|
|
21630
|
+
};
|
|
21631
|
+
if (config) {
|
|
21632
|
+
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
21633
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
21634
|
+
}
|
|
21635
|
+
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
21636
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
21637
|
+
}
|
|
21638
|
+
}
|
|
21639
|
+
class NoopTrustStoreProvider {
|
|
21640
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
21641
|
+
this.reason = reason;
|
|
21642
|
+
}
|
|
21643
|
+
async getTrustStorePem() {
|
|
21644
|
+
throw new Error(this.reason);
|
|
21645
|
+
}
|
|
21646
|
+
async getRoots() {
|
|
21647
|
+
return [];
|
|
21648
|
+
}
|
|
21649
|
+
async initialize() {
|
|
21650
|
+
// No-op for the placeholder provider.
|
|
21651
|
+
}
|
|
21652
|
+
}
|
|
21653
|
+
|
|
21613
21654
|
const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
|
|
21614
21655
|
class EncryptionManagerFactory extends factory.AbstractResourceFactory {
|
|
21615
21656
|
getPriority() {
|
|
@@ -26427,6 +26468,146 @@ function encodeUtf8(value) {
|
|
|
26427
26468
|
throw new Error('No UTF-8 encoder available in this environment');
|
|
26428
26469
|
}
|
|
26429
26470
|
|
|
26471
|
+
if (!ed25519.hashes.sha512) {
|
|
26472
|
+
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
26473
|
+
}
|
|
26474
|
+
function normalizeSignerOptions(options) {
|
|
26475
|
+
if (!options || typeof options !== 'object') {
|
|
26476
|
+
return {};
|
|
26477
|
+
}
|
|
26478
|
+
const candidate = options;
|
|
26479
|
+
const result = {
|
|
26480
|
+
...options,
|
|
26481
|
+
};
|
|
26482
|
+
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
26483
|
+
if (cryptoProvider !== undefined) {
|
|
26484
|
+
result.cryptoProvider = cryptoProvider ?? null;
|
|
26485
|
+
}
|
|
26486
|
+
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
26487
|
+
if (signingConfig !== undefined) {
|
|
26488
|
+
result.signingConfig = signingConfig;
|
|
26489
|
+
}
|
|
26490
|
+
const privateKeyPem = resolveAlias(candidate, [
|
|
26491
|
+
'privateKeyPem',
|
|
26492
|
+
'private_key_pem',
|
|
26493
|
+
]);
|
|
26494
|
+
if (privateKeyPem !== undefined) {
|
|
26495
|
+
result.privateKeyPem = privateKeyPem;
|
|
26496
|
+
}
|
|
26497
|
+
const keyId = resolveAlias(candidate, [
|
|
26498
|
+
'keyId',
|
|
26499
|
+
'key_id',
|
|
26500
|
+
]);
|
|
26501
|
+
if (keyId !== undefined) {
|
|
26502
|
+
result.keyId = keyId;
|
|
26503
|
+
}
|
|
26504
|
+
return result;
|
|
26505
|
+
}
|
|
26506
|
+
class EdDSAEnvelopeSigner {
|
|
26507
|
+
constructor(options = {}) {
|
|
26508
|
+
const normalized = normalizeSignerOptions(options);
|
|
26509
|
+
const provider = normalized.cryptoProvider ?? null;
|
|
26510
|
+
if (!provider) {
|
|
26511
|
+
throw new Error('No crypto provider is configured for signing');
|
|
26512
|
+
}
|
|
26513
|
+
this.crypto = provider;
|
|
26514
|
+
const signingConfigOption = normalized.signingConfig;
|
|
26515
|
+
if (signingConfigOption instanceof SigningConfig) {
|
|
26516
|
+
this.signingConfig = signingConfigOption;
|
|
26517
|
+
}
|
|
26518
|
+
else if (signingConfigOption) {
|
|
26519
|
+
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
26520
|
+
}
|
|
26521
|
+
else {
|
|
26522
|
+
this.signingConfig = new SigningConfig();
|
|
26523
|
+
}
|
|
26524
|
+
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
26525
|
+
this.explicitKeyId = normalized.keyId;
|
|
26526
|
+
}
|
|
26527
|
+
signEnvelope(envelope, { physicalPath }) {
|
|
26528
|
+
if (!envelope.sid) {
|
|
26529
|
+
throw new Error('Envelope missing sid');
|
|
26530
|
+
}
|
|
26531
|
+
const frame = envelope.frame;
|
|
26532
|
+
if (frame.type === 'Data') {
|
|
26533
|
+
const dataFrame = frame;
|
|
26534
|
+
if (!dataFrame.pd) {
|
|
26535
|
+
const payload = dataFrame.payload ?? '';
|
|
26536
|
+
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
26537
|
+
dataFrame.pd = secureDigest(payloadString);
|
|
26538
|
+
}
|
|
26539
|
+
}
|
|
26540
|
+
const digest = frameDigest(frame);
|
|
26541
|
+
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
26542
|
+
const sidDigest = secureDigest(physicalPath);
|
|
26543
|
+
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
26544
|
+
1 +
|
|
26545
|
+
encodeUtf8(immutable).length +
|
|
26546
|
+
1 +
|
|
26547
|
+
encodeUtf8(digest).length);
|
|
26548
|
+
const sidBytes = encodeUtf8(sidDigest);
|
|
26549
|
+
const immBytes = encodeUtf8(immutable);
|
|
26550
|
+
const digBytes = encodeUtf8(digest);
|
|
26551
|
+
let offset = 0;
|
|
26552
|
+
tbs.set(sidBytes, offset);
|
|
26553
|
+
offset += sidBytes.length;
|
|
26554
|
+
tbs[offset] = 0x1f;
|
|
26555
|
+
offset += 1;
|
|
26556
|
+
tbs.set(immBytes, offset);
|
|
26557
|
+
offset += immBytes.length;
|
|
26558
|
+
tbs[offset] = 0x1f;
|
|
26559
|
+
offset += 1;
|
|
26560
|
+
tbs.set(digBytes, offset);
|
|
26561
|
+
const privateKey = this.loadPrivateKey();
|
|
26562
|
+
const signatureBytes = ed25519.sign(tbs, privateKey);
|
|
26563
|
+
const signature = urlsafeBase64Encode(signatureBytes);
|
|
26564
|
+
const kid = this.determineKeyId();
|
|
26565
|
+
const signatureHeader = {
|
|
26566
|
+
kid,
|
|
26567
|
+
val: signature,
|
|
26568
|
+
alg: 'EdDSA',
|
|
26569
|
+
};
|
|
26570
|
+
const secHeader = envelope.sec ?? {};
|
|
26571
|
+
secHeader.sig = signatureHeader;
|
|
26572
|
+
envelope.sec = secHeader;
|
|
26573
|
+
return envelope;
|
|
26574
|
+
}
|
|
26575
|
+
loadPrivateKey() {
|
|
26576
|
+
const pem = this.explicitPrivateKey ??
|
|
26577
|
+
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
26578
|
+
if (!pem) {
|
|
26579
|
+
throw new Error('Crypto provider does not expose a signing private key');
|
|
26580
|
+
}
|
|
26581
|
+
return parseEd25519PrivateKey(pem);
|
|
26582
|
+
}
|
|
26583
|
+
determineKeyId() {
|
|
26584
|
+
if (this.explicitKeyId) {
|
|
26585
|
+
return this.explicitKeyId;
|
|
26586
|
+
}
|
|
26587
|
+
if (this.signingConfig.signingMaterial === core.SigningMaterial.X509_CHAIN) {
|
|
26588
|
+
const certificateProvider = this
|
|
26589
|
+
.crypto;
|
|
26590
|
+
const jwk = certificateProvider.nodeJwk?.();
|
|
26591
|
+
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
26592
|
+
const kid = jwk.kid;
|
|
26593
|
+
if (typeof kid === 'string' && kid.length > 0) {
|
|
26594
|
+
return kid;
|
|
26595
|
+
}
|
|
26596
|
+
}
|
|
26597
|
+
}
|
|
26598
|
+
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
26599
|
+
if (!fallback) {
|
|
26600
|
+
throw new Error('Crypto provider does not expose a signature key id');
|
|
26601
|
+
}
|
|
26602
|
+
return fallback;
|
|
26603
|
+
}
|
|
26604
|
+
}
|
|
26605
|
+
|
|
26606
|
+
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
26607
|
+
__proto__: null,
|
|
26608
|
+
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
26609
|
+
});
|
|
26610
|
+
|
|
26430
26611
|
// Legacy global crypto provider accessors are intentionally disabled to force
|
|
26431
26612
|
// explicit dependency wiring. If a component still needs a global provider,
|
|
26432
26613
|
// refactor it to accept one via configuration instead of re-enabling this code.
|
|
@@ -28046,7 +28227,7 @@ const PROFILE_MAP$4 = {
|
|
|
28046
28227
|
[PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
|
|
28047
28228
|
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
28048
28229
|
};
|
|
28049
|
-
const FACTORY_META
|
|
28230
|
+
const FACTORY_META$10 = {
|
|
28050
28231
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
28051
28232
|
key: 'SecurityProfile',
|
|
28052
28233
|
};
|
|
@@ -28172,7 +28353,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
|
28172
28353
|
ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
|
|
28173
28354
|
ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
|
|
28174
28355
|
ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
|
|
28175
|
-
FACTORY_META: FACTORY_META
|
|
28356
|
+
FACTORY_META: FACTORY_META$10,
|
|
28176
28357
|
NodeSecurityProfileFactory: NodeSecurityProfileFactory,
|
|
28177
28358
|
PROFILE_NAME_GATED: PROFILE_NAME_GATED,
|
|
28178
28359
|
PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
|
|
@@ -28301,7 +28482,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
|
|
|
28301
28482
|
}
|
|
28302
28483
|
}
|
|
28303
28484
|
|
|
28304
|
-
const FACTORY_META
|
|
28485
|
+
const FACTORY_META$$ = {
|
|
28305
28486
|
base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
|
|
28306
28487
|
key: 'SimpleLoadBalancerStickinessManager',
|
|
28307
28488
|
};
|
|
@@ -28325,7 +28506,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
|
|
|
28325
28506
|
|
|
28326
28507
|
var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
28327
28508
|
__proto__: null,
|
|
28328
|
-
FACTORY_META: FACTORY_META
|
|
28509
|
+
FACTORY_META: FACTORY_META$$,
|
|
28329
28510
|
SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
|
|
28330
28511
|
default: SimpleLoadBalancerStickinessManagerFactory
|
|
28331
28512
|
});
|
|
@@ -28751,7 +28932,7 @@ class WelcomeServiceFactory extends factory.AbstractResourceFactory {
|
|
|
28751
28932
|
}
|
|
28752
28933
|
}
|
|
28753
28934
|
|
|
28754
|
-
const FACTORY_META$
|
|
28935
|
+
const FACTORY_META$_ = {
|
|
28755
28936
|
base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
|
|
28756
28937
|
key: 'DefaultWelcomeService',
|
|
28757
28938
|
};
|
|
@@ -28832,7 +29013,7 @@ function resolveConfigEntry(source, keys) {
|
|
|
28832
29013
|
var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
|
|
28833
29014
|
__proto__: null,
|
|
28834
29015
|
DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
|
|
28835
|
-
FACTORY_META: FACTORY_META$
|
|
29016
|
+
FACTORY_META: FACTORY_META$_,
|
|
28836
29017
|
default: DefaultWelcomeServiceFactory
|
|
28837
29018
|
});
|
|
28838
29019
|
|
|
@@ -29036,7 +29217,7 @@ function normalizeConfig$r(config) {
|
|
|
29036
29217
|
authorizer: authorizerValue,
|
|
29037
29218
|
};
|
|
29038
29219
|
}
|
|
29039
|
-
const FACTORY_META$
|
|
29220
|
+
const FACTORY_META$Z = {
|
|
29040
29221
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29041
29222
|
key: 'HttpListener',
|
|
29042
29223
|
};
|
|
@@ -29083,7 +29264,7 @@ class HttpListenerFactory extends TransportListenerFactory {
|
|
|
29083
29264
|
|
|
29084
29265
|
var httpListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29085
29266
|
__proto__: null,
|
|
29086
|
-
FACTORY_META: FACTORY_META$
|
|
29267
|
+
FACTORY_META: FACTORY_META$Z,
|
|
29087
29268
|
HttpListenerFactory: HttpListenerFactory,
|
|
29088
29269
|
default: HttpListenerFactory
|
|
29089
29270
|
});
|
|
@@ -29152,7 +29333,7 @@ function normalizeConfig$q(config) {
|
|
|
29152
29333
|
authorizer: authorizerValue,
|
|
29153
29334
|
};
|
|
29154
29335
|
}
|
|
29155
|
-
const FACTORY_META$
|
|
29336
|
+
const FACTORY_META$Y = {
|
|
29156
29337
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29157
29338
|
key: 'WebSocketListener',
|
|
29158
29339
|
};
|
|
@@ -29196,7 +29377,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
|
|
|
29196
29377
|
|
|
29197
29378
|
var websocketListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29198
29379
|
__proto__: null,
|
|
29199
|
-
FACTORY_META: FACTORY_META$
|
|
29380
|
+
FACTORY_META: FACTORY_META$Y,
|
|
29200
29381
|
WebSocketListenerFactory: WebSocketListenerFactory,
|
|
29201
29382
|
default: WebSocketListenerFactory
|
|
29202
29383
|
});
|
|
@@ -29233,7 +29414,7 @@ function normalizeConfig$p(config) {
|
|
|
29233
29414
|
inboxCapacity,
|
|
29234
29415
|
};
|
|
29235
29416
|
}
|
|
29236
|
-
const FACTORY_META$
|
|
29417
|
+
const FACTORY_META$X = {
|
|
29237
29418
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29238
29419
|
key: 'InPageListener',
|
|
29239
29420
|
};
|
|
@@ -29259,7 +29440,7 @@ class InPageListenerFactory extends TransportListenerFactory {
|
|
|
29259
29440
|
|
|
29260
29441
|
var inpageListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29261
29442
|
__proto__: null,
|
|
29262
|
-
FACTORY_META: FACTORY_META$
|
|
29443
|
+
FACTORY_META: FACTORY_META$X,
|
|
29263
29444
|
InPageListenerFactory: InPageListenerFactory,
|
|
29264
29445
|
default: InPageListenerFactory
|
|
29265
29446
|
});
|
|
@@ -29296,7 +29477,7 @@ function normalizeConfig$o(config) {
|
|
|
29296
29477
|
inboxCapacity,
|
|
29297
29478
|
};
|
|
29298
29479
|
}
|
|
29299
|
-
const FACTORY_META$
|
|
29480
|
+
const FACTORY_META$W = {
|
|
29300
29481
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29301
29482
|
key: 'BroadcastChannelListener',
|
|
29302
29483
|
};
|
|
@@ -29323,7 +29504,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
|
|
|
29323
29504
|
var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29324
29505
|
__proto__: null,
|
|
29325
29506
|
BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
|
|
29326
|
-
FACTORY_META: FACTORY_META$
|
|
29507
|
+
FACTORY_META: FACTORY_META$W,
|
|
29327
29508
|
default: BroadcastChannelListenerFactory
|
|
29328
29509
|
});
|
|
29329
29510
|
|
|
@@ -29447,7 +29628,7 @@ class HttpConnectionGrantImpl {
|
|
|
29447
29628
|
this.purpose = 'connection';
|
|
29448
29629
|
}
|
|
29449
29630
|
}
|
|
29450
|
-
const FACTORY_META$
|
|
29631
|
+
const FACTORY_META$V = {
|
|
29451
29632
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29452
29633
|
key: HTTP_STATELESS_CONNECTOR_TYPE,
|
|
29453
29634
|
};
|
|
@@ -29616,7 +29797,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
|
|
|
29616
29797
|
|
|
29617
29798
|
var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29618
29799
|
__proto__: null,
|
|
29619
|
-
FACTORY_META: FACTORY_META$
|
|
29800
|
+
FACTORY_META: FACTORY_META$V,
|
|
29620
29801
|
HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
|
|
29621
29802
|
default: HttpStatelessConnectorFactory
|
|
29622
29803
|
});
|
|
@@ -29629,7 +29810,7 @@ class InPageConnectionGrantImpl {
|
|
|
29629
29810
|
this.purpose = 'connection';
|
|
29630
29811
|
}
|
|
29631
29812
|
}
|
|
29632
|
-
const FACTORY_META$
|
|
29813
|
+
const FACTORY_META$U = {
|
|
29633
29814
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29634
29815
|
key: INPAGE_CONNECTOR_TYPE,
|
|
29635
29816
|
};
|
|
@@ -29778,7 +29959,7 @@ class InPageConnectorFactory extends ConnectorFactory {
|
|
|
29778
29959
|
|
|
29779
29960
|
var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29780
29961
|
__proto__: null,
|
|
29781
|
-
FACTORY_META: FACTORY_META$
|
|
29962
|
+
FACTORY_META: FACTORY_META$U,
|
|
29782
29963
|
InPageConnectorFactory: InPageConnectorFactory,
|
|
29783
29964
|
default: InPageConnectorFactory
|
|
29784
29965
|
});
|
|
@@ -29791,7 +29972,7 @@ class BroadcastChannelConnectionGrantImpl {
|
|
|
29791
29972
|
this.purpose = 'connection';
|
|
29792
29973
|
}
|
|
29793
29974
|
}
|
|
29794
|
-
const FACTORY_META$
|
|
29975
|
+
const FACTORY_META$T = {
|
|
29795
29976
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29796
29977
|
key: BROADCAST_CHANNEL_CONNECTOR_TYPE$1,
|
|
29797
29978
|
};
|
|
@@ -29939,7 +30120,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
|
|
|
29939
30120
|
var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29940
30121
|
__proto__: null,
|
|
29941
30122
|
BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
|
|
29942
|
-
FACTORY_META: FACTORY_META$
|
|
30123
|
+
FACTORY_META: FACTORY_META$T,
|
|
29943
30124
|
default: BroadcastChannelConnectorFactory
|
|
29944
30125
|
});
|
|
29945
30126
|
|
|
@@ -32447,7 +32628,7 @@ function normalizeServiceName(value) {
|
|
|
32447
32628
|
|
|
32448
32629
|
// import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
|
|
32449
32630
|
const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
|
|
32450
|
-
const FACTORY_META$
|
|
32631
|
+
const FACTORY_META$S = {
|
|
32451
32632
|
base: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
32452
32633
|
key: 'InProcessFameFabric',
|
|
32453
32634
|
};
|
|
@@ -32467,7 +32648,7 @@ class InProcessFameFabricFactory extends core.FameFabricFactory {
|
|
|
32467
32648
|
|
|
32468
32649
|
var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
|
|
32469
32650
|
__proto__: null,
|
|
32470
|
-
FACTORY_META: FACTORY_META$
|
|
32651
|
+
FACTORY_META: FACTORY_META$S,
|
|
32471
32652
|
FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
32472
32653
|
InProcessFameFabricFactory: InProcessFameFabricFactory,
|
|
32473
32654
|
default: InProcessFameFabricFactory
|
|
@@ -34264,7 +34445,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
|
|
|
34264
34445
|
}
|
|
34265
34446
|
}
|
|
34266
34447
|
|
|
34267
|
-
const FACTORY_META$
|
|
34448
|
+
const FACTORY_META$R = {
|
|
34268
34449
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
34269
34450
|
key: 'NoopTraceEmitter',
|
|
34270
34451
|
};
|
|
@@ -34282,7 +34463,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
|
|
|
34282
34463
|
|
|
34283
34464
|
var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
34284
34465
|
__proto__: null,
|
|
34285
|
-
FACTORY_META: FACTORY_META$
|
|
34466
|
+
FACTORY_META: FACTORY_META$R,
|
|
34286
34467
|
NoopTraceEmitterFactory: NoopTraceEmitterFactory,
|
|
34287
34468
|
default: NoopTraceEmitterFactory
|
|
34288
34469
|
});
|
|
@@ -34537,7 +34718,7 @@ function getOtelApiModule() {
|
|
|
34537
34718
|
}
|
|
34538
34719
|
return otelApiModulePromise;
|
|
34539
34720
|
}
|
|
34540
|
-
const FACTORY_META$
|
|
34721
|
+
const FACTORY_META$Q = {
|
|
34541
34722
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
34542
34723
|
key: 'OpenTelemetryTraceEmitter',
|
|
34543
34724
|
};
|
|
@@ -34707,7 +34888,7 @@ function extractHeaders(value) {
|
|
|
34707
34888
|
|
|
34708
34889
|
var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
34709
34890
|
__proto__: null,
|
|
34710
|
-
FACTORY_META: FACTORY_META$
|
|
34891
|
+
FACTORY_META: FACTORY_META$Q,
|
|
34711
34892
|
OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
|
|
34712
34893
|
default: OpenTelemetryTraceEmitterFactory
|
|
34713
34894
|
});
|
|
@@ -34728,7 +34909,7 @@ const PROFILE_MAP$3 = {
|
|
|
34728
34909
|
[PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
|
|
34729
34910
|
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
34730
34911
|
};
|
|
34731
|
-
const FACTORY_META$
|
|
34912
|
+
const FACTORY_META$P = {
|
|
34732
34913
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
34733
34914
|
key: 'TraceEmitterProfile',
|
|
34734
34915
|
};
|
|
@@ -34808,7 +34989,7 @@ function deepClone$2(value) {
|
|
|
34808
34989
|
|
|
34809
34990
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
34810
34991
|
__proto__: null,
|
|
34811
|
-
FACTORY_META: FACTORY_META$
|
|
34992
|
+
FACTORY_META: FACTORY_META$P,
|
|
34812
34993
|
PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
|
|
34813
34994
|
PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
|
|
34814
34995
|
TraceEmitterProfileFactory: TraceEmitterProfileFactory,
|
|
@@ -34978,7 +35159,7 @@ function withOption(source, keys) {
|
|
|
34978
35159
|
[camelKey]: value,
|
|
34979
35160
|
};
|
|
34980
35161
|
}
|
|
34981
|
-
const FACTORY_META$
|
|
35162
|
+
const FACTORY_META$O = {
|
|
34982
35163
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
34983
35164
|
key: 'AtLeastOnceDeliveryPolicy',
|
|
34984
35165
|
};
|
|
@@ -34986,7 +35167,7 @@ const FACTORY_META$N = {
|
|
|
34986
35167
|
var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
34987
35168
|
__proto__: null,
|
|
34988
35169
|
AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
|
|
34989
|
-
FACTORY_META: FACTORY_META$
|
|
35170
|
+
FACTORY_META: FACTORY_META$O,
|
|
34990
35171
|
default: AtLeastOnceDeliveryPolicyFactory
|
|
34991
35172
|
});
|
|
34992
35173
|
|
|
@@ -35013,7 +35194,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
|
|
|
35013
35194
|
}
|
|
35014
35195
|
registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
35015
35196
|
registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
35016
|
-
const FACTORY_META$
|
|
35197
|
+
const FACTORY_META$N = {
|
|
35017
35198
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
35018
35199
|
key: 'AtMostOnceDeliveryPolicy',
|
|
35019
35200
|
};
|
|
@@ -35021,7 +35202,7 @@ const FACTORY_META$M = {
|
|
|
35021
35202
|
var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35022
35203
|
__proto__: null,
|
|
35023
35204
|
AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
|
|
35024
|
-
FACTORY_META: FACTORY_META$
|
|
35205
|
+
FACTORY_META: FACTORY_META$N,
|
|
35025
35206
|
default: AtMostOnceDeliveryPolicyFactory
|
|
35026
35207
|
});
|
|
35027
35208
|
|
|
@@ -35114,7 +35295,7 @@ function resolveProfileConfig$1(profileName) {
|
|
|
35114
35295
|
function deepClone$1(value) {
|
|
35115
35296
|
return JSON.parse(JSON.stringify(value));
|
|
35116
35297
|
}
|
|
35117
|
-
const FACTORY_META$
|
|
35298
|
+
const FACTORY_META$M = {
|
|
35118
35299
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
35119
35300
|
key: 'DeliveryProfile',
|
|
35120
35301
|
};
|
|
@@ -35122,7 +35303,7 @@ const FACTORY_META$L = {
|
|
|
35122
35303
|
var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
|
|
35123
35304
|
__proto__: null,
|
|
35124
35305
|
DeliveryProfileFactory: DeliveryProfileFactory,
|
|
35125
|
-
FACTORY_META: FACTORY_META$
|
|
35306
|
+
FACTORY_META: FACTORY_META$M,
|
|
35126
35307
|
PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
|
|
35127
35308
|
PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
|
|
35128
35309
|
default: DeliveryProfileFactory
|
|
@@ -35351,7 +35532,7 @@ const PROFILE_MAP$1 = {
|
|
|
35351
35532
|
[PROFILE_NAME_NOOP]: NOOP_PROFILE,
|
|
35352
35533
|
[PROFILE_NAME_NONE]: NOOP_PROFILE,
|
|
35353
35534
|
};
|
|
35354
|
-
const FACTORY_META$
|
|
35535
|
+
const FACTORY_META$L = {
|
|
35355
35536
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35356
35537
|
key: 'AdmissionProfile',
|
|
35357
35538
|
};
|
|
@@ -35398,7 +35579,7 @@ function deepClone(value) {
|
|
|
35398
35579
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
35399
35580
|
__proto__: null,
|
|
35400
35581
|
AdmissionProfileFactory: AdmissionProfileFactory,
|
|
35401
|
-
FACTORY_META: FACTORY_META$
|
|
35582
|
+
FACTORY_META: FACTORY_META$L,
|
|
35402
35583
|
default: AdmissionProfileFactory
|
|
35403
35584
|
});
|
|
35404
35585
|
|
|
@@ -35480,7 +35661,7 @@ function cloneGrant(grant) {
|
|
|
35480
35661
|
return JSON.parse(JSON.stringify(grant));
|
|
35481
35662
|
}
|
|
35482
35663
|
|
|
35483
|
-
const FACTORY_META$
|
|
35664
|
+
const FACTORY_META$K = {
|
|
35484
35665
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35485
35666
|
key: 'DirectAdmissionClient',
|
|
35486
35667
|
};
|
|
@@ -35532,11 +35713,11 @@ function normalizeConfig$l(config) {
|
|
|
35532
35713
|
var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
35533
35714
|
__proto__: null,
|
|
35534
35715
|
DirectAdmissionClientFactory: DirectAdmissionClientFactory,
|
|
35535
|
-
FACTORY_META: FACTORY_META$
|
|
35716
|
+
FACTORY_META: FACTORY_META$K,
|
|
35536
35717
|
default: DirectAdmissionClientFactory
|
|
35537
35718
|
});
|
|
35538
35719
|
|
|
35539
|
-
const FACTORY_META$
|
|
35720
|
+
const FACTORY_META$J = {
|
|
35540
35721
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35541
35722
|
key: 'NoopAdmissionClient',
|
|
35542
35723
|
};
|
|
@@ -35585,7 +35766,7 @@ function normalizeConfig$k(config, factoryArgs) {
|
|
|
35585
35766
|
|
|
35586
35767
|
var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
35587
35768
|
__proto__: null,
|
|
35588
|
-
FACTORY_META: FACTORY_META$
|
|
35769
|
+
FACTORY_META: FACTORY_META$J,
|
|
35589
35770
|
NoopAdmissionClientFactory: NoopAdmissionClientFactory,
|
|
35590
35771
|
default: NoopAdmissionClientFactory
|
|
35591
35772
|
});
|
|
@@ -35600,7 +35781,7 @@ class NoAuthInjectionStrategy {
|
|
|
35600
35781
|
}
|
|
35601
35782
|
}
|
|
35602
35783
|
|
|
35603
|
-
const FACTORY_META$
|
|
35784
|
+
const FACTORY_META$I = {
|
|
35604
35785
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
35605
35786
|
key: 'NoAuth',
|
|
35606
35787
|
};
|
|
@@ -35629,7 +35810,7 @@ function normalizeConfig$j(config) {
|
|
|
35629
35810
|
|
|
35630
35811
|
var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
35631
35812
|
__proto__: null,
|
|
35632
|
-
FACTORY_META: FACTORY_META$
|
|
35813
|
+
FACTORY_META: FACTORY_META$I,
|
|
35633
35814
|
NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
|
|
35634
35815
|
default: NoAuthInjectionStrategyFactory
|
|
35635
35816
|
});
|
|
@@ -35778,7 +35959,7 @@ function convertKeysToCamelCase(value) {
|
|
|
35778
35959
|
return result;
|
|
35779
35960
|
}
|
|
35780
35961
|
|
|
35781
|
-
const FACTORY_META$
|
|
35962
|
+
const FACTORY_META$H = {
|
|
35782
35963
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35783
35964
|
key: 'WelcomeServiceClient',
|
|
35784
35965
|
};
|
|
@@ -35848,7 +36029,7 @@ async function createAuthStrategy(config) {
|
|
|
35848
36029
|
|
|
35849
36030
|
var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
|
|
35850
36031
|
__proto__: null,
|
|
35851
|
-
FACTORY_META: FACTORY_META$
|
|
36032
|
+
FACTORY_META: FACTORY_META$H,
|
|
35852
36033
|
WelcomeServiceClientFactory: WelcomeServiceClientFactory,
|
|
35853
36034
|
default: WelcomeServiceClientFactory
|
|
35854
36035
|
});
|
|
@@ -35966,7 +36147,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
|
|
|
35966
36147
|
});
|
|
35967
36148
|
}
|
|
35968
36149
|
}
|
|
35969
|
-
const FACTORY_META$
|
|
36150
|
+
const FACTORY_META$G = {
|
|
35970
36151
|
base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
|
|
35971
36152
|
key: 'StaticNodePlacementStrategy',
|
|
35972
36153
|
};
|
|
@@ -35976,7 +36157,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
|
|
|
35976
36157
|
|
|
35977
36158
|
var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
35978
36159
|
__proto__: null,
|
|
35979
|
-
FACTORY_META: FACTORY_META$
|
|
36160
|
+
FACTORY_META: FACTORY_META$G,
|
|
35980
36161
|
StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
|
|
35981
36162
|
default: StaticNodePlacementStrategyFactory
|
|
35982
36163
|
});
|
|
@@ -36135,7 +36316,7 @@ function connectorTypeName(connector) {
|
|
|
36135
36316
|
return typeof connector;
|
|
36136
36317
|
}
|
|
36137
36318
|
|
|
36138
|
-
const FACTORY_META$
|
|
36319
|
+
const FACTORY_META$F = {
|
|
36139
36320
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
36140
36321
|
key: 'BearerTokenHeaderAuth',
|
|
36141
36322
|
};
|
|
@@ -36176,7 +36357,7 @@ function normalizeConfig$g(config) {
|
|
|
36176
36357
|
var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
36177
36358
|
__proto__: null,
|
|
36178
36359
|
BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
|
|
36179
|
-
FACTORY_META: FACTORY_META$
|
|
36360
|
+
FACTORY_META: FACTORY_META$F,
|
|
36180
36361
|
default: BearerTokenHeaderAuthInjectionStrategyFactory
|
|
36181
36362
|
});
|
|
36182
36363
|
|
|
@@ -36203,7 +36384,7 @@ function normalizeConfig$f(config) {
|
|
|
36203
36384
|
function isTokenVerifier(candidate) {
|
|
36204
36385
|
return Boolean(candidate && typeof candidate.verify === 'function');
|
|
36205
36386
|
}
|
|
36206
|
-
const FACTORY_META$
|
|
36387
|
+
const FACTORY_META$E = {
|
|
36207
36388
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
36208
36389
|
key: 'DefaultAuthorizer',
|
|
36209
36390
|
};
|
|
@@ -36233,7 +36414,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
|
|
|
36233
36414
|
var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
36234
36415
|
__proto__: null,
|
|
36235
36416
|
DefaultAuthorizerFactory: DefaultAuthorizerFactory,
|
|
36236
|
-
FACTORY_META: FACTORY_META$
|
|
36417
|
+
FACTORY_META: FACTORY_META$E,
|
|
36237
36418
|
default: DefaultAuthorizerFactory
|
|
36238
36419
|
});
|
|
36239
36420
|
|
|
@@ -36244,7 +36425,7 @@ function getJwksJwtTokenVerifierModule() {
|
|
|
36244
36425
|
}
|
|
36245
36426
|
return jwksJwtTokenVerifierModulePromise;
|
|
36246
36427
|
}
|
|
36247
|
-
const FACTORY_META$
|
|
36428
|
+
const FACTORY_META$D = {
|
|
36248
36429
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
36249
36430
|
key: 'JWKSJWTTokenVerifier',
|
|
36250
36431
|
};
|
|
@@ -36306,12 +36487,12 @@ function normalizeConfig$e(config) {
|
|
|
36306
36487
|
|
|
36307
36488
|
var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
36308
36489
|
__proto__: null,
|
|
36309
|
-
FACTORY_META: FACTORY_META$
|
|
36490
|
+
FACTORY_META: FACTORY_META$D,
|
|
36310
36491
|
JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
|
|
36311
36492
|
default: JWKSTokenVerifierFactory
|
|
36312
36493
|
});
|
|
36313
36494
|
|
|
36314
|
-
const FACTORY_META$
|
|
36495
|
+
const FACTORY_META$C = {
|
|
36315
36496
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
36316
36497
|
key: 'JWTTokenIssuer',
|
|
36317
36498
|
};
|
|
@@ -36508,12 +36689,12 @@ function getProviderKeyId(provider) {
|
|
|
36508
36689
|
|
|
36509
36690
|
var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
36510
36691
|
__proto__: null,
|
|
36511
|
-
FACTORY_META: FACTORY_META$
|
|
36692
|
+
FACTORY_META: FACTORY_META$C,
|
|
36512
36693
|
JWTTokenIssuerFactory: JWTTokenIssuerFactory,
|
|
36513
36694
|
default: JWTTokenIssuerFactory
|
|
36514
36695
|
});
|
|
36515
36696
|
|
|
36516
|
-
const FACTORY_META$
|
|
36697
|
+
const FACTORY_META$B = {
|
|
36517
36698
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
36518
36699
|
key: 'JWTTokenVerifier',
|
|
36519
36700
|
};
|
|
@@ -36681,7 +36862,7 @@ function getProviderVerificationKey(provider) {
|
|
|
36681
36862
|
|
|
36682
36863
|
var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
36683
36864
|
__proto__: null,
|
|
36684
|
-
FACTORY_META: FACTORY_META$
|
|
36865
|
+
FACTORY_META: FACTORY_META$B,
|
|
36685
36866
|
JWTTokenVerifierFactory: JWTTokenVerifierFactory,
|
|
36686
36867
|
default: JWTTokenVerifierFactory
|
|
36687
36868
|
});
|
|
@@ -36697,7 +36878,7 @@ class NoneTokenProvider {
|
|
|
36697
36878
|
}
|
|
36698
36879
|
}
|
|
36699
36880
|
|
|
36700
|
-
const FACTORY_META$
|
|
36881
|
+
const FACTORY_META$A = {
|
|
36701
36882
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
36702
36883
|
key: 'NoneTokenProvider',
|
|
36703
36884
|
};
|
|
@@ -36714,7 +36895,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
|
|
|
36714
36895
|
|
|
36715
36896
|
var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
36716
36897
|
__proto__: null,
|
|
36717
|
-
FACTORY_META: FACTORY_META$
|
|
36898
|
+
FACTORY_META: FACTORY_META$A,
|
|
36718
36899
|
NoneTokenProviderFactory: NoneTokenProviderFactory,
|
|
36719
36900
|
default: NoneTokenProviderFactory
|
|
36720
36901
|
});
|
|
@@ -36766,7 +36947,7 @@ class NoopAuthorizer {
|
|
|
36766
36947
|
}
|
|
36767
36948
|
}
|
|
36768
36949
|
|
|
36769
|
-
const FACTORY_META$
|
|
36950
|
+
const FACTORY_META$z = {
|
|
36770
36951
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
36771
36952
|
key: 'NoopAuthorizer',
|
|
36772
36953
|
};
|
|
@@ -36782,7 +36963,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
|
|
|
36782
36963
|
|
|
36783
36964
|
var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
36784
36965
|
__proto__: null,
|
|
36785
|
-
FACTORY_META: FACTORY_META$
|
|
36966
|
+
FACTORY_META: FACTORY_META$z,
|
|
36786
36967
|
NoopAuthorizerFactory: NoopAuthorizerFactory,
|
|
36787
36968
|
default: NoopAuthorizerFactory
|
|
36788
36969
|
});
|
|
@@ -36796,7 +36977,7 @@ class NoopTokenIssuer {
|
|
|
36796
36977
|
}
|
|
36797
36978
|
}
|
|
36798
36979
|
|
|
36799
|
-
const FACTORY_META$
|
|
36980
|
+
const FACTORY_META$y = {
|
|
36800
36981
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
36801
36982
|
key: 'NoopTokenIssuer',
|
|
36802
36983
|
};
|
|
@@ -36812,7 +36993,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
|
|
|
36812
36993
|
|
|
36813
36994
|
var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
36814
36995
|
__proto__: null,
|
|
36815
|
-
FACTORY_META: FACTORY_META$
|
|
36996
|
+
FACTORY_META: FACTORY_META$y,
|
|
36816
36997
|
NoopTokenIssuerFactory: NoopTokenIssuerFactory,
|
|
36817
36998
|
default: NoopTokenIssuerFactory
|
|
36818
36999
|
});
|
|
@@ -36834,7 +37015,7 @@ class NoopTokenVerifier {
|
|
|
36834
37015
|
}
|
|
36835
37016
|
}
|
|
36836
37017
|
|
|
36837
|
-
const FACTORY_META$
|
|
37018
|
+
const FACTORY_META$x = {
|
|
36838
37019
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
36839
37020
|
key: 'NoopTokenVerifier',
|
|
36840
37021
|
};
|
|
@@ -36850,7 +37031,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
36850
37031
|
|
|
36851
37032
|
var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
36852
37033
|
__proto__: null,
|
|
36853
|
-
FACTORY_META: FACTORY_META$
|
|
37034
|
+
FACTORY_META: FACTORY_META$x,
|
|
36854
37035
|
NoopTokenVerifierFactory: NoopTokenVerifierFactory,
|
|
36855
37036
|
default: NoopTokenVerifierFactory
|
|
36856
37037
|
});
|
|
@@ -36863,7 +37044,7 @@ function getOAuth2AuthorizerModule() {
|
|
|
36863
37044
|
}
|
|
36864
37045
|
return oauth2AuthorizerModulePromise;
|
|
36865
37046
|
}
|
|
36866
|
-
const FACTORY_META$
|
|
37047
|
+
const FACTORY_META$w = {
|
|
36867
37048
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
36868
37049
|
key: 'OAuth2Authorizer',
|
|
36869
37050
|
};
|
|
@@ -37008,7 +37189,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
|
|
|
37008
37189
|
|
|
37009
37190
|
var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
37010
37191
|
__proto__: null,
|
|
37011
|
-
FACTORY_META: FACTORY_META$
|
|
37192
|
+
FACTORY_META: FACTORY_META$w,
|
|
37012
37193
|
OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
|
|
37013
37194
|
default: OAuth2AuthorizerFactory
|
|
37014
37195
|
});
|
|
@@ -37048,7 +37229,7 @@ function normalizeConfig$a(config) {
|
|
|
37048
37229
|
}
|
|
37049
37230
|
return normalized;
|
|
37050
37231
|
}
|
|
37051
|
-
const FACTORY_META$
|
|
37232
|
+
const FACTORY_META$v = {
|
|
37052
37233
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37053
37234
|
key: 'OAuth2ClientCredentialsTokenProvider',
|
|
37054
37235
|
};
|
|
@@ -37079,7 +37260,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
|
|
|
37079
37260
|
|
|
37080
37261
|
var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37081
37262
|
__proto__: null,
|
|
37082
|
-
FACTORY_META: FACTORY_META$
|
|
37263
|
+
FACTORY_META: FACTORY_META$v,
|
|
37083
37264
|
OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
|
|
37084
37265
|
default: OAuth2ClientCredentialsTokenProviderFactory
|
|
37085
37266
|
});
|
|
@@ -37161,7 +37342,7 @@ function normalizeConfig$9(config) {
|
|
|
37161
37342
|
}
|
|
37162
37343
|
return normalized;
|
|
37163
37344
|
}
|
|
37164
|
-
const FACTORY_META$
|
|
37345
|
+
const FACTORY_META$u = {
|
|
37165
37346
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37166
37347
|
key: 'OAuth2PkceTokenProvider',
|
|
37167
37348
|
};
|
|
@@ -37216,7 +37397,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
|
|
|
37216
37397
|
|
|
37217
37398
|
var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37218
37399
|
__proto__: null,
|
|
37219
|
-
FACTORY_META: FACTORY_META$
|
|
37400
|
+
FACTORY_META: FACTORY_META$u,
|
|
37220
37401
|
OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
|
|
37221
37402
|
default: OAuth2PkceTokenProviderFactory
|
|
37222
37403
|
});
|
|
@@ -37266,7 +37447,7 @@ class QueryParamAuthInjectionStrategy {
|
|
|
37266
37447
|
}
|
|
37267
37448
|
}
|
|
37268
37449
|
|
|
37269
|
-
const FACTORY_META$
|
|
37450
|
+
const FACTORY_META$t = {
|
|
37270
37451
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
37271
37452
|
key: 'QueryParamAuth',
|
|
37272
37453
|
};
|
|
@@ -37306,7 +37487,7 @@ function normalizeConfig$8(config) {
|
|
|
37306
37487
|
|
|
37307
37488
|
var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
37308
37489
|
__proto__: null,
|
|
37309
|
-
FACTORY_META: FACTORY_META$
|
|
37490
|
+
FACTORY_META: FACTORY_META$t,
|
|
37310
37491
|
QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
|
|
37311
37492
|
default: QueryParamAuthInjectionStrategyFactory
|
|
37312
37493
|
});
|
|
@@ -37342,7 +37523,7 @@ function normalizeConfig$7(config) {
|
|
|
37342
37523
|
secretConfig: normalizeSecretSource(secretSource),
|
|
37343
37524
|
};
|
|
37344
37525
|
}
|
|
37345
|
-
const FACTORY_META$
|
|
37526
|
+
const FACTORY_META$s = {
|
|
37346
37527
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
37347
37528
|
key: 'SharedSecretAuthorizer',
|
|
37348
37529
|
};
|
|
@@ -37361,7 +37542,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
|
|
|
37361
37542
|
|
|
37362
37543
|
var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
37363
37544
|
__proto__: null,
|
|
37364
|
-
FACTORY_META: FACTORY_META$
|
|
37545
|
+
FACTORY_META: FACTORY_META$s,
|
|
37365
37546
|
SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
|
|
37366
37547
|
default: SharedSecretAuthorizerFactory
|
|
37367
37548
|
});
|
|
@@ -37397,7 +37578,7 @@ function normalizeConfig$6(config) {
|
|
|
37397
37578
|
secretConfig: normalizeSecretSource(secretSource),
|
|
37398
37579
|
};
|
|
37399
37580
|
}
|
|
37400
|
-
const FACTORY_META$
|
|
37581
|
+
const FACTORY_META$r = {
|
|
37401
37582
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37402
37583
|
key: 'SharedSecretTokenProvider',
|
|
37403
37584
|
};
|
|
@@ -37416,7 +37597,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
|
|
|
37416
37597
|
|
|
37417
37598
|
var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37418
37599
|
__proto__: null,
|
|
37419
|
-
FACTORY_META: FACTORY_META$
|
|
37600
|
+
FACTORY_META: FACTORY_META$r,
|
|
37420
37601
|
SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
|
|
37421
37602
|
default: SharedSecretTokenProviderFactory
|
|
37422
37603
|
});
|
|
@@ -37460,7 +37641,7 @@ function normalizeConfig$5(config) {
|
|
|
37460
37641
|
}
|
|
37461
37642
|
return normalized;
|
|
37462
37643
|
}
|
|
37463
|
-
const FACTORY_META$
|
|
37644
|
+
const FACTORY_META$q = {
|
|
37464
37645
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
37465
37646
|
key: 'SharedSecretTokenVerifier',
|
|
37466
37647
|
};
|
|
@@ -37485,7 +37666,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
37485
37666
|
|
|
37486
37667
|
var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
37487
37668
|
__proto__: null,
|
|
37488
|
-
FACTORY_META: FACTORY_META$
|
|
37669
|
+
FACTORY_META: FACTORY_META$q,
|
|
37489
37670
|
SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
|
|
37490
37671
|
default: SharedSecretTokenVerifierFactory
|
|
37491
37672
|
});
|
|
@@ -37600,7 +37781,7 @@ function normalizeConfig$4(config) {
|
|
|
37600
37781
|
}
|
|
37601
37782
|
return options;
|
|
37602
37783
|
}
|
|
37603
|
-
const FACTORY_META$
|
|
37784
|
+
const FACTORY_META$p = {
|
|
37604
37785
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37605
37786
|
key: 'StaticTokenProvider',
|
|
37606
37787
|
};
|
|
@@ -37617,7 +37798,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
|
|
|
37617
37798
|
|
|
37618
37799
|
var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37619
37800
|
__proto__: null,
|
|
37620
|
-
FACTORY_META: FACTORY_META$
|
|
37801
|
+
FACTORY_META: FACTORY_META$p,
|
|
37621
37802
|
StaticTokenProviderFactory: StaticTokenProviderFactory,
|
|
37622
37803
|
default: StaticTokenProviderFactory
|
|
37623
37804
|
});
|
|
@@ -37668,7 +37849,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
|
|
|
37668
37849
|
}
|
|
37669
37850
|
}
|
|
37670
37851
|
|
|
37671
|
-
const FACTORY_META$
|
|
37852
|
+
const FACTORY_META$o = {
|
|
37672
37853
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
37673
37854
|
key: 'WebSocketSubprotocolAuth',
|
|
37674
37855
|
};
|
|
@@ -37710,7 +37891,7 @@ function normalizeConfig$3(config) {
|
|
|
37710
37891
|
|
|
37711
37892
|
var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
37712
37893
|
__proto__: null,
|
|
37713
|
-
FACTORY_META: FACTORY_META$
|
|
37894
|
+
FACTORY_META: FACTORY_META$o,
|
|
37714
37895
|
WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
|
|
37715
37896
|
default: WebSocketSubprotocolAuthInjectionStrategyFactory
|
|
37716
37897
|
});
|
|
@@ -37758,7 +37939,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
37758
37939
|
throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
|
|
37759
37940
|
}
|
|
37760
37941
|
}
|
|
37761
|
-
const FACTORY_META$
|
|
37942
|
+
const FACTORY_META$n = {
|
|
37762
37943
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
37763
37944
|
key: 'DevFixedKeyCredentialProvider',
|
|
37764
37945
|
};
|
|
@@ -37766,7 +37947,7 @@ const FACTORY_META$m = {
|
|
|
37766
37947
|
var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37767
37948
|
__proto__: null,
|
|
37768
37949
|
DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
|
|
37769
|
-
FACTORY_META: FACTORY_META$
|
|
37950
|
+
FACTORY_META: FACTORY_META$n,
|
|
37770
37951
|
default: DevFixedKeyCredentialProviderFactory,
|
|
37771
37952
|
normalizeDevFixedConfig: normalizeDevFixedConfig
|
|
37772
37953
|
});
|
|
@@ -37782,14 +37963,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
37782
37963
|
return new NoneCredentialProvider();
|
|
37783
37964
|
}
|
|
37784
37965
|
}
|
|
37785
|
-
const FACTORY_META$
|
|
37966
|
+
const FACTORY_META$m = {
|
|
37786
37967
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
37787
37968
|
key: 'NoneCredentialProvider',
|
|
37788
37969
|
};
|
|
37789
37970
|
|
|
37790
37971
|
var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37791
37972
|
__proto__: null,
|
|
37792
|
-
FACTORY_META: FACTORY_META$
|
|
37973
|
+
FACTORY_META: FACTORY_META$m,
|
|
37793
37974
|
NoneCredentialProviderFactory: NoneCredentialProviderFactory,
|
|
37794
37975
|
default: NoneCredentialProviderFactory
|
|
37795
37976
|
});
|
|
@@ -37827,14 +38008,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
37827
38008
|
return new SessionKeyCredentialProvider(resolved.length);
|
|
37828
38009
|
}
|
|
37829
38010
|
}
|
|
37830
|
-
const FACTORY_META$
|
|
38011
|
+
const FACTORY_META$l = {
|
|
37831
38012
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
37832
38013
|
key: 'SessionKeyCredentialProvider',
|
|
37833
38014
|
};
|
|
37834
38015
|
|
|
37835
38016
|
var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37836
38017
|
__proto__: null,
|
|
37837
|
-
FACTORY_META: FACTORY_META$
|
|
38018
|
+
FACTORY_META: FACTORY_META$l,
|
|
37838
38019
|
SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
|
|
37839
38020
|
default: SessionKeyCredentialProviderFactory,
|
|
37840
38021
|
normalizeSessionKeyConfig: normalizeSessionKeyConfig
|
|
@@ -37872,9 +38053,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
|
|
|
37872
38053
|
ensureAlias('keyValidator', 'key_validator');
|
|
37873
38054
|
ensureAlias('eventListeners', 'event_listeners');
|
|
37874
38055
|
ensureAlias('cryptoProvider', 'crypto_provider');
|
|
38056
|
+
ensureAlias('trustStoreProvider', 'trust_store_provider');
|
|
37875
38057
|
return normalized;
|
|
37876
38058
|
}
|
|
37877
|
-
const FACTORY_META$
|
|
38059
|
+
const FACTORY_META$k = {
|
|
37878
38060
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
37879
38061
|
key: 'DefaultSecurityManager',
|
|
37880
38062
|
};
|
|
@@ -37920,6 +38102,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
37920
38102
|
const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
|
|
37921
38103
|
const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
|
|
37922
38104
|
const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
|
|
38105
|
+
const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
|
|
37923
38106
|
const listenersSource = overrides?.eventListeners ??
|
|
37924
38107
|
config.eventListeners ??
|
|
37925
38108
|
config.event_listeners;
|
|
@@ -37939,10 +38122,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
37939
38122
|
secureChannelManager,
|
|
37940
38123
|
eventListeners,
|
|
37941
38124
|
cryptoProvider: cryptoProvider ?? null,
|
|
38125
|
+
trustStoreProvider: trustStoreProvider ?? null,
|
|
37942
38126
|
};
|
|
37943
38127
|
}
|
|
37944
38128
|
static async buildSecurityManager(options) {
|
|
37945
|
-
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
|
|
38129
|
+
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
|
|
37946
38130
|
if (!keyStore) {
|
|
37947
38131
|
keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
|
|
37948
38132
|
}
|
|
@@ -37955,6 +38139,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
37955
38139
|
if (!policy) {
|
|
37956
38140
|
throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
|
|
37957
38141
|
}
|
|
38142
|
+
if (!trustStoreProvider) {
|
|
38143
|
+
trustStoreProvider =
|
|
38144
|
+
await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
38145
|
+
}
|
|
37958
38146
|
if (!keyManager) {
|
|
37959
38147
|
keyManager =
|
|
37960
38148
|
await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
|
|
@@ -37965,7 +38153,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
37965
38153
|
}
|
|
37966
38154
|
if (!envelopeVerifier) {
|
|
37967
38155
|
envelopeVerifier =
|
|
37968
|
-
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
|
|
38156
|
+
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
|
|
37969
38157
|
}
|
|
37970
38158
|
if (!encryptionManager || !secureChannelManager) {
|
|
37971
38159
|
const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
|
|
@@ -38065,7 +38253,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38065
38253
|
throw error instanceof Error ? error : new Error(String(error));
|
|
38066
38254
|
}
|
|
38067
38255
|
}
|
|
38068
|
-
static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
|
|
38256
|
+
static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
|
|
38069
38257
|
const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
|
|
38070
38258
|
if (verifierConfig &&
|
|
38071
38259
|
DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
|
|
@@ -38089,7 +38277,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38089
38277
|
}
|
|
38090
38278
|
const signing = policy.signing ?? null;
|
|
38091
38279
|
return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
|
|
38092
|
-
factoryArgs: [keyManager, signing ?? null],
|
|
38280
|
+
factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
|
|
38093
38281
|
});
|
|
38094
38282
|
}
|
|
38095
38283
|
catch (error) {
|
|
@@ -38330,11 +38518,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38330
38518
|
var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38331
38519
|
__proto__: null,
|
|
38332
38520
|
DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
|
|
38333
|
-
FACTORY_META: FACTORY_META$
|
|
38521
|
+
FACTORY_META: FACTORY_META$k,
|
|
38334
38522
|
default: DefaultSecurityManagerFactory
|
|
38335
38523
|
});
|
|
38336
38524
|
|
|
38337
|
-
const FACTORY_META$
|
|
38525
|
+
const FACTORY_META$j = {
|
|
38338
38526
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
38339
38527
|
key: 'NoopEncryptionManager',
|
|
38340
38528
|
};
|
|
@@ -38391,7 +38579,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
|
|
|
38391
38579
|
|
|
38392
38580
|
var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38393
38581
|
__proto__: null,
|
|
38394
|
-
FACTORY_META: FACTORY_META$
|
|
38582
|
+
FACTORY_META: FACTORY_META$j,
|
|
38395
38583
|
NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
|
|
38396
38584
|
default: NoopEncryptionManagerFactory
|
|
38397
38585
|
});
|
|
@@ -38463,7 +38651,7 @@ class NoopSecureChannelManager {
|
|
|
38463
38651
|
}
|
|
38464
38652
|
}
|
|
38465
38653
|
|
|
38466
|
-
const FACTORY_META$
|
|
38654
|
+
const FACTORY_META$i = {
|
|
38467
38655
|
base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
|
|
38468
38656
|
key: 'NoopSecureChannelManager',
|
|
38469
38657
|
};
|
|
@@ -38480,12 +38668,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
|
|
|
38480
38668
|
|
|
38481
38669
|
var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38482
38670
|
__proto__: null,
|
|
38483
|
-
FACTORY_META: FACTORY_META$
|
|
38671
|
+
FACTORY_META: FACTORY_META$i,
|
|
38484
38672
|
NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
|
|
38485
38673
|
default: NoopSecureChannelManagerFactory
|
|
38486
38674
|
});
|
|
38487
38675
|
|
|
38488
|
-
const FACTORY_META$
|
|
38676
|
+
const FACTORY_META$h = {
|
|
38489
38677
|
base: KEY_MANAGER_FACTORY_BASE_TYPE,
|
|
38490
38678
|
key: 'DefaultKeyManager',
|
|
38491
38679
|
};
|
|
@@ -38514,7 +38702,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
|
|
|
38514
38702
|
var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38515
38703
|
__proto__: null,
|
|
38516
38704
|
DefaultKeyManagerFactory: DefaultKeyManagerFactory,
|
|
38517
|
-
FACTORY_META: FACTORY_META$
|
|
38705
|
+
FACTORY_META: FACTORY_META$h,
|
|
38518
38706
|
default: DefaultKeyManagerFactory
|
|
38519
38707
|
});
|
|
38520
38708
|
|
|
@@ -38699,7 +38887,7 @@ class InMemoryKeyStore extends KeyStore {
|
|
|
38699
38887
|
}
|
|
38700
38888
|
registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
|
|
38701
38889
|
|
|
38702
|
-
const FACTORY_META$
|
|
38890
|
+
const FACTORY_META$g = {
|
|
38703
38891
|
base: KEY_STORE_FACTORY_BASE_TYPE,
|
|
38704
38892
|
key: 'InMemoryKeyStore',
|
|
38705
38893
|
};
|
|
@@ -38734,12 +38922,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
|
|
|
38734
38922
|
|
|
38735
38923
|
var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
|
|
38736
38924
|
__proto__: null,
|
|
38737
|
-
FACTORY_META: FACTORY_META$
|
|
38925
|
+
FACTORY_META: FACTORY_META$g,
|
|
38738
38926
|
InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
|
|
38739
38927
|
default: InMemoryKeyStoreFactory
|
|
38740
38928
|
});
|
|
38741
38929
|
|
|
38742
|
-
const FACTORY_META$
|
|
38930
|
+
const FACTORY_META$f = {
|
|
38743
38931
|
base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
|
|
38744
38932
|
key: 'NoopKeyValidator',
|
|
38745
38933
|
};
|
|
@@ -38757,12 +38945,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
|
|
|
38757
38945
|
|
|
38758
38946
|
var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
|
|
38759
38947
|
__proto__: null,
|
|
38760
|
-
FACTORY_META: FACTORY_META$
|
|
38948
|
+
FACTORY_META: FACTORY_META$f,
|
|
38761
38949
|
NoopKeyValidatorFactory: NoopKeyValidatorFactory,
|
|
38762
38950
|
default: NoopKeyValidatorFactory
|
|
38763
38951
|
});
|
|
38764
38952
|
|
|
38765
|
-
const FACTORY_META$
|
|
38953
|
+
const FACTORY_META$e = {
|
|
38766
38954
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
38767
38955
|
key: 'DefaultSecurityPolicy',
|
|
38768
38956
|
};
|
|
@@ -38823,11 +39011,11 @@ function normalizeConfig$2(config) {
|
|
|
38823
39011
|
var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
38824
39012
|
__proto__: null,
|
|
38825
39013
|
DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
|
|
38826
|
-
FACTORY_META: FACTORY_META$
|
|
39014
|
+
FACTORY_META: FACTORY_META$e,
|
|
38827
39015
|
default: DefaultSecurityPolicyFactory
|
|
38828
39016
|
});
|
|
38829
39017
|
|
|
38830
|
-
const FACTORY_META$
|
|
39018
|
+
const FACTORY_META$d = {
|
|
38831
39019
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
38832
39020
|
key: 'NoSecurityPolicy',
|
|
38833
39021
|
};
|
|
@@ -38855,7 +39043,7 @@ function normalizeConfig$1(config) {
|
|
|
38855
39043
|
|
|
38856
39044
|
var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
38857
39045
|
__proto__: null,
|
|
38858
|
-
FACTORY_META: FACTORY_META$
|
|
39046
|
+
FACTORY_META: FACTORY_META$d,
|
|
38859
39047
|
NoSecurityPolicyFactory: NoSecurityPolicyFactory,
|
|
38860
39048
|
default: NoSecurityPolicyFactory
|
|
38861
39049
|
});
|
|
@@ -38870,7 +39058,7 @@ async function getEdDSAEnvelopeSignerModule() {
|
|
|
38870
39058
|
}
|
|
38871
39059
|
return eddsaEnvelopeSignerModulePromise;
|
|
38872
39060
|
}
|
|
38873
|
-
const FACTORY_META$
|
|
39061
|
+
const FACTORY_META$c = {
|
|
38874
39062
|
base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
|
|
38875
39063
|
key: 'EdDSAEnvelopeSigner',
|
|
38876
39064
|
};
|
|
@@ -38899,7 +39087,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
|
|
|
38899
39087
|
var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
|
|
38900
39088
|
__proto__: null,
|
|
38901
39089
|
EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
|
|
38902
|
-
FACTORY_META: FACTORY_META$
|
|
39090
|
+
FACTORY_META: FACTORY_META$c,
|
|
38903
39091
|
default: EdDSAEnvelopeSignerFactory
|
|
38904
39092
|
});
|
|
38905
39093
|
|
|
@@ -38913,7 +39101,7 @@ async function getEdDSAEnvelopeVerifierModule() {
|
|
|
38913
39101
|
}
|
|
38914
39102
|
return eddsaEnvelopeVerifierModulePromise;
|
|
38915
39103
|
}
|
|
38916
|
-
const FACTORY_META$
|
|
39104
|
+
const FACTORY_META$b = {
|
|
38917
39105
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
38918
39106
|
key: 'EdDSAEnvelopeVerifier',
|
|
38919
39107
|
};
|
|
@@ -38939,10 +39127,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
38939
39127
|
var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
38940
39128
|
__proto__: null,
|
|
38941
39129
|
EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
|
|
38942
|
-
FACTORY_META: FACTORY_META$
|
|
39130
|
+
FACTORY_META: FACTORY_META$b,
|
|
38943
39131
|
default: EdDSAEnvelopeVerifierFactory
|
|
38944
39132
|
});
|
|
38945
39133
|
|
|
39134
|
+
const FACTORY_META$a = {
|
|
39135
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
39136
|
+
key: "NoopTrustStoreProvider",
|
|
39137
|
+
isDefault: true,
|
|
39138
|
+
priority: 10,
|
|
39139
|
+
};
|
|
39140
|
+
class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
39141
|
+
constructor() {
|
|
39142
|
+
super(...arguments);
|
|
39143
|
+
this.type = "NoopTrustStoreProvider";
|
|
39144
|
+
this.isDefault = true;
|
|
39145
|
+
this.priority = 10;
|
|
39146
|
+
}
|
|
39147
|
+
async create(_config, ..._factoryArgs) {
|
|
39148
|
+
return new NoopTrustStoreProvider();
|
|
39149
|
+
}
|
|
39150
|
+
}
|
|
39151
|
+
|
|
39152
|
+
var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
39153
|
+
__proto__: null,
|
|
39154
|
+
FACTORY_META: FACTORY_META$a,
|
|
39155
|
+
NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
|
|
39156
|
+
default: NoopTrustStoreProviderFactory
|
|
39157
|
+
});
|
|
39158
|
+
|
|
38946
39159
|
const FACTORY_META$9 = {
|
|
38947
39160
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
38948
39161
|
key: 'CapabilityAwareRoutingPolicy',
|
|
@@ -41589,146 +41802,6 @@ var sharedSecretTokenVerifier = /*#__PURE__*/Object.freeze({
|
|
|
41589
41802
|
SharedSecretTokenVerifier: SharedSecretTokenVerifier
|
|
41590
41803
|
});
|
|
41591
41804
|
|
|
41592
|
-
if (!ed25519.hashes.sha512) {
|
|
41593
|
-
ed25519.hashes.sha512 = (message) => sha2_js.sha512(message);
|
|
41594
|
-
}
|
|
41595
|
-
function normalizeSignerOptions(options) {
|
|
41596
|
-
if (!options || typeof options !== 'object') {
|
|
41597
|
-
return {};
|
|
41598
|
-
}
|
|
41599
|
-
const candidate = options;
|
|
41600
|
-
const result = {
|
|
41601
|
-
...options,
|
|
41602
|
-
};
|
|
41603
|
-
const cryptoProvider = resolveAlias(candidate, ['cryptoProvider', 'crypto_provider']);
|
|
41604
|
-
if (cryptoProvider !== undefined) {
|
|
41605
|
-
result.cryptoProvider = cryptoProvider ?? null;
|
|
41606
|
-
}
|
|
41607
|
-
const signingConfig = resolveAlias(candidate, ['signingConfig', 'signing_config']);
|
|
41608
|
-
if (signingConfig !== undefined) {
|
|
41609
|
-
result.signingConfig = signingConfig;
|
|
41610
|
-
}
|
|
41611
|
-
const privateKeyPem = resolveAlias(candidate, [
|
|
41612
|
-
'privateKeyPem',
|
|
41613
|
-
'private_key_pem',
|
|
41614
|
-
]);
|
|
41615
|
-
if (privateKeyPem !== undefined) {
|
|
41616
|
-
result.privateKeyPem = privateKeyPem;
|
|
41617
|
-
}
|
|
41618
|
-
const keyId = resolveAlias(candidate, [
|
|
41619
|
-
'keyId',
|
|
41620
|
-
'key_id',
|
|
41621
|
-
]);
|
|
41622
|
-
if (keyId !== undefined) {
|
|
41623
|
-
result.keyId = keyId;
|
|
41624
|
-
}
|
|
41625
|
-
return result;
|
|
41626
|
-
}
|
|
41627
|
-
class EdDSAEnvelopeSigner {
|
|
41628
|
-
constructor(options = {}) {
|
|
41629
|
-
const normalized = normalizeSignerOptions(options);
|
|
41630
|
-
const provider = normalized.cryptoProvider ?? null;
|
|
41631
|
-
if (!provider) {
|
|
41632
|
-
throw new Error('No crypto provider is configured for signing');
|
|
41633
|
-
}
|
|
41634
|
-
this.crypto = provider;
|
|
41635
|
-
const signingConfigOption = normalized.signingConfig;
|
|
41636
|
-
if (signingConfigOption instanceof SigningConfig) {
|
|
41637
|
-
this.signingConfig = signingConfigOption;
|
|
41638
|
-
}
|
|
41639
|
-
else if (signingConfigOption) {
|
|
41640
|
-
this.signingConfig = new SigningConfig(signingConfigOption);
|
|
41641
|
-
}
|
|
41642
|
-
else {
|
|
41643
|
-
this.signingConfig = new SigningConfig();
|
|
41644
|
-
}
|
|
41645
|
-
this.explicitPrivateKey = normalized.privateKeyPem;
|
|
41646
|
-
this.explicitKeyId = normalized.keyId;
|
|
41647
|
-
}
|
|
41648
|
-
signEnvelope(envelope, { physicalPath }) {
|
|
41649
|
-
if (!envelope.sid) {
|
|
41650
|
-
throw new Error('Envelope missing sid');
|
|
41651
|
-
}
|
|
41652
|
-
const frame = envelope.frame;
|
|
41653
|
-
if (frame.type === 'Data') {
|
|
41654
|
-
const dataFrame = frame;
|
|
41655
|
-
if (!dataFrame.pd) {
|
|
41656
|
-
const payload = dataFrame.payload ?? '';
|
|
41657
|
-
const payloadString = payload === '' ? '' : canonicalJson(payload);
|
|
41658
|
-
dataFrame.pd = secureDigest(payloadString);
|
|
41659
|
-
}
|
|
41660
|
-
}
|
|
41661
|
-
const digest = frameDigest(frame);
|
|
41662
|
-
const immutable = canonicalJson(immutableHeaders(envelope));
|
|
41663
|
-
const sidDigest = secureDigest(physicalPath);
|
|
41664
|
-
const tbs = new Uint8Array(encodeUtf8(sidDigest).length +
|
|
41665
|
-
1 +
|
|
41666
|
-
encodeUtf8(immutable).length +
|
|
41667
|
-
1 +
|
|
41668
|
-
encodeUtf8(digest).length);
|
|
41669
|
-
const sidBytes = encodeUtf8(sidDigest);
|
|
41670
|
-
const immBytes = encodeUtf8(immutable);
|
|
41671
|
-
const digBytes = encodeUtf8(digest);
|
|
41672
|
-
let offset = 0;
|
|
41673
|
-
tbs.set(sidBytes, offset);
|
|
41674
|
-
offset += sidBytes.length;
|
|
41675
|
-
tbs[offset] = 0x1f;
|
|
41676
|
-
offset += 1;
|
|
41677
|
-
tbs.set(immBytes, offset);
|
|
41678
|
-
offset += immBytes.length;
|
|
41679
|
-
tbs[offset] = 0x1f;
|
|
41680
|
-
offset += 1;
|
|
41681
|
-
tbs.set(digBytes, offset);
|
|
41682
|
-
const privateKey = this.loadPrivateKey();
|
|
41683
|
-
const signatureBytes = ed25519.sign(tbs, privateKey);
|
|
41684
|
-
const signature = urlsafeBase64Encode(signatureBytes);
|
|
41685
|
-
const kid = this.determineKeyId();
|
|
41686
|
-
const signatureHeader = {
|
|
41687
|
-
kid,
|
|
41688
|
-
val: signature,
|
|
41689
|
-
alg: 'EdDSA',
|
|
41690
|
-
};
|
|
41691
|
-
const secHeader = envelope.sec ?? {};
|
|
41692
|
-
secHeader.sig = signatureHeader;
|
|
41693
|
-
envelope.sec = secHeader;
|
|
41694
|
-
return envelope;
|
|
41695
|
-
}
|
|
41696
|
-
loadPrivateKey() {
|
|
41697
|
-
const pem = this.explicitPrivateKey ??
|
|
41698
|
-
readStringProperty(this.crypto, 'signingPrivatePem', 'signing_private_pem');
|
|
41699
|
-
if (!pem) {
|
|
41700
|
-
throw new Error('Crypto provider does not expose a signing private key');
|
|
41701
|
-
}
|
|
41702
|
-
return parseEd25519PrivateKey(pem);
|
|
41703
|
-
}
|
|
41704
|
-
determineKeyId() {
|
|
41705
|
-
if (this.explicitKeyId) {
|
|
41706
|
-
return this.explicitKeyId;
|
|
41707
|
-
}
|
|
41708
|
-
if (this.signingConfig.signingMaterial === core.SigningMaterial.X509_CHAIN) {
|
|
41709
|
-
const certificateProvider = this
|
|
41710
|
-
.crypto;
|
|
41711
|
-
const jwk = certificateProvider.nodeJwk?.();
|
|
41712
|
-
if (jwk && typeof jwk === 'object' && 'kid' in jwk && 'x5c' in jwk) {
|
|
41713
|
-
const kid = jwk.kid;
|
|
41714
|
-
if (typeof kid === 'string' && kid.length > 0) {
|
|
41715
|
-
return kid;
|
|
41716
|
-
}
|
|
41717
|
-
}
|
|
41718
|
-
}
|
|
41719
|
-
const fallback = readStringProperty(this.crypto, 'signatureKeyId', 'signature_key_id');
|
|
41720
|
-
if (!fallback) {
|
|
41721
|
-
throw new Error('Crypto provider does not expose a signature key id');
|
|
41722
|
-
}
|
|
41723
|
-
return fallback;
|
|
41724
|
-
}
|
|
41725
|
-
}
|
|
41726
|
-
|
|
41727
|
-
var eddsaEnvelopeSigner = /*#__PURE__*/Object.freeze({
|
|
41728
|
-
__proto__: null,
|
|
41729
|
-
EdDSAEnvelopeSigner: EdDSAEnvelopeSigner
|
|
41730
|
-
});
|
|
41731
|
-
|
|
41732
41805
|
async function loadPublicKey(jwk, signingConfig) {
|
|
41733
41806
|
if (jwk.x5c) {
|
|
41734
41807
|
if (signingConfig.signingMaterial !== core.SigningMaterial.X509_CHAIN) {
|
|
@@ -41989,7 +42062,7 @@ exports.CertificateManagerFactory = CertificateManagerFactory;
|
|
|
41989
42062
|
exports.ConnectorConfigDefaults = ConnectorConfigDefaults;
|
|
41990
42063
|
exports.ConnectorFactory = ConnectorFactory;
|
|
41991
42064
|
exports.ConsoleMetricsEmitter = ConsoleMetricsEmitter;
|
|
41992
|
-
exports.DEFAULT_WELCOME_FACTORY_META = FACTORY_META$
|
|
42065
|
+
exports.DEFAULT_WELCOME_FACTORY_META = FACTORY_META$_;
|
|
41993
42066
|
exports.DefaultCryptoProvider = DefaultCryptoProvider;
|
|
41994
42067
|
exports.DefaultHttpServer = DefaultHttpServer;
|
|
41995
42068
|
exports.DefaultKeyManager = DefaultKeyManager;
|
|
@@ -42010,6 +42083,7 @@ exports.ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE = ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE;
|
|
|
42010
42083
|
exports.ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER = ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER;
|
|
42011
42084
|
exports.ENV_VAR_JWT_TRUSTED_ISSUER = ENV_VAR_JWT_TRUSTED_ISSUER;
|
|
42012
42085
|
exports.ENV_VAR_SHOW_ENVELOPES = ENV_VAR_SHOW_ENVELOPES$1;
|
|
42086
|
+
exports.EdDSAEnvelopeSigner = EdDSAEnvelopeSigner;
|
|
42013
42087
|
exports.EncryptedKeyValueStore = EncryptedKeyValueStore;
|
|
42014
42088
|
exports.EncryptedStorageProviderBase = EncryptedStorageProviderBase;
|
|
42015
42089
|
exports.EncryptedValue = EncryptedValue;
|
|
@@ -42022,7 +42096,7 @@ exports.EnvelopeListenerManager = EnvelopeListenerManager;
|
|
|
42022
42096
|
exports.EnvelopeSecurityHandler = EnvelopeSecurityHandler;
|
|
42023
42097
|
exports.EnvelopeSignerFactory = EnvelopeSignerFactory;
|
|
42024
42098
|
exports.EnvelopeVerifierFactory = EnvelopeVerifierFactory;
|
|
42025
|
-
exports.FACTORY_META = FACTORY_META
|
|
42099
|
+
exports.FACTORY_META = FACTORY_META$$;
|
|
42026
42100
|
exports.FAME_FABRIC_FACTORY_BASE_TYPE = FAME_FABRIC_FACTORY_BASE_TYPE;
|
|
42027
42101
|
exports.FIXED_PREFIX_LEN = FIXED_PREFIX_LEN;
|
|
42028
42102
|
exports.FameAuthorizedDeliveryContextSchema = FameAuthorizedDeliveryContextSchema;
|
|
@@ -42076,6 +42150,7 @@ exports.NodePlacementStrategyFactory = NodePlacementStrategyFactory;
|
|
|
42076
42150
|
exports.NoneCredentialProvider = NoneCredentialProvider;
|
|
42077
42151
|
exports.NoopEncryptionManager = NoopEncryptionManager;
|
|
42078
42152
|
exports.NoopKeyValidator = NoopKeyValidator;
|
|
42153
|
+
exports.NoopTrustStoreProvider = NoopTrustStoreProvider;
|
|
42079
42154
|
exports.NotAuthorized = NotAuthorized;
|
|
42080
42155
|
exports.PROFILE_NAME_GATED = PROFILE_NAME_GATED;
|
|
42081
42156
|
exports.PROFILE_NAME_GATED_CALLBACK = PROFILE_NAME_GATED_CALLBACK;
|
|
@@ -42122,12 +42197,14 @@ exports.TOKEN_PROVIDER_FACTORY_BASE_TYPE = TOKEN_PROVIDER_FACTORY_BASE_TYPE;
|
|
|
42122
42197
|
exports.TOKEN_VERIFIER_FACTORY_BASE_TYPE = TOKEN_VERIFIER_FACTORY_BASE_TYPE;
|
|
42123
42198
|
exports.TRANSPORT_LISTENER_FACTORY_BASE_TYPE = TRANSPORT_LISTENER_FACTORY_BASE_TYPE;
|
|
42124
42199
|
exports.TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE = TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE;
|
|
42200
|
+
exports.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE;
|
|
42125
42201
|
exports.TaskSpawner = TaskSpawner;
|
|
42126
42202
|
exports.TokenIssuerFactory = TokenIssuerFactory;
|
|
42127
42203
|
exports.TokenProviderFactory = TokenProviderFactory;
|
|
42128
42204
|
exports.TokenVerifierFactory = TokenVerifierFactory;
|
|
42129
42205
|
exports.TransportListener = TransportListener;
|
|
42130
42206
|
exports.TransportProvisionerFactory = TransportProvisionerFactory;
|
|
42207
|
+
exports.TrustStoreProviderFactory = TrustStoreProviderFactory;
|
|
42131
42208
|
exports.TtlValidationError = TtlValidationError;
|
|
42132
42209
|
exports.UpstreamSessionManager = UpstreamSessionManager;
|
|
42133
42210
|
exports.VALID_CURVES_BY_KTY = VALID_CURVES_BY_KTY;
|