@naylence/runtime 0.3.5-test.923 → 0.3.5-test.924
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +212 -136
- package/dist/browser/index.mjs +204 -131
- package/dist/cjs/naylence/fame/factory-manifest.js +2 -0
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/cjs/naylence/fame/security/index.js +6 -1
- package/dist/cjs/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +23 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider-factory.js +44 -0
- package/dist/cjs/naylence/fame/security/trust-store/trust-store-provider.js +2 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/factory-manifest.js +2 -0
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +12 -4
- package/dist/esm/naylence/fame/security/index.js +2 -0
- package/dist/esm/naylence/fame/security/trust-store/noop-trust-store-provider-factory.js +19 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider-factory.js +39 -0
- package/dist/esm/naylence/fame/security/trust-store/trust-store-provider.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +208 -132
- package/dist/node/index.mjs +204 -131
- package/dist/node/node.cjs +208 -132
- package/dist/node/node.mjs +204 -131
- package/dist/types/naylence/fame/factory-manifest.d.ts +1 -1
- package/dist/types/naylence/fame/security/default-security-manager-factory.d.ts +3 -0
- package/dist/types/naylence/fame/security/index.d.ts +3 -0
- package/dist/types/naylence/fame/security/security-manager-factory.d.ts +2 -0
- package/dist/types/naylence/fame/security/trust-store/noop-trust-store-provider-factory.d.ts +18 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider-factory.d.ts +27 -0
- package/dist/types/naylence/fame/security/trust-store/trust-store-provider.d.ts +42 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/node.mjs
CHANGED
|
@@ -3391,7 +3391,7 @@ class WebSocketConnectionGrantImpl {
|
|
|
3391
3391
|
this.purpose = 'connection';
|
|
3392
3392
|
}
|
|
3393
3393
|
}
|
|
3394
|
-
const FACTORY_META$
|
|
3394
|
+
const FACTORY_META$18 = {
|
|
3395
3395
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
3396
3396
|
key: 'WebSocketConnector',
|
|
3397
3397
|
};
|
|
@@ -3762,7 +3762,7 @@ class WebSocketConnectorFactory extends ConnectorFactory {
|
|
|
3762
3762
|
|
|
3763
3763
|
var websocketConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
3764
3764
|
__proto__: null,
|
|
3765
|
-
FACTORY_META: FACTORY_META$
|
|
3765
|
+
FACTORY_META: FACTORY_META$18,
|
|
3766
3766
|
WebSocketConnectorFactory: WebSocketConnectorFactory,
|
|
3767
3767
|
default: WebSocketConnectorFactory,
|
|
3768
3768
|
setWebSocketConnectorSslLoader: setWebSocketConnectorSslLoader
|
|
@@ -3895,7 +3895,7 @@ class EnvCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
3895
3895
|
return new EnvCredentialProvider(resolved.varName);
|
|
3896
3896
|
}
|
|
3897
3897
|
}
|
|
3898
|
-
const FACTORY_META$
|
|
3898
|
+
const FACTORY_META$17 = {
|
|
3899
3899
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
3900
3900
|
key: 'EnvCredentialProvider',
|
|
3901
3901
|
};
|
|
@@ -3903,7 +3903,7 @@ const FACTORY_META$16 = {
|
|
|
3903
3903
|
var envCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
3904
3904
|
__proto__: null,
|
|
3905
3905
|
EnvCredentialProviderFactory: EnvCredentialProviderFactory,
|
|
3906
|
-
FACTORY_META: FACTORY_META$
|
|
3906
|
+
FACTORY_META: FACTORY_META$17,
|
|
3907
3907
|
default: EnvCredentialProviderFactory,
|
|
3908
3908
|
normalizeEnvConfig: normalizeEnvConfig
|
|
3909
3909
|
});
|
|
@@ -4001,14 +4001,14 @@ class PromptCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
4001
4001
|
return new PromptCredentialProvider(resolved.credentialName);
|
|
4002
4002
|
}
|
|
4003
4003
|
}
|
|
4004
|
-
const FACTORY_META$
|
|
4004
|
+
const FACTORY_META$16 = {
|
|
4005
4005
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
4006
4006
|
key: 'PromptCredentialProvider',
|
|
4007
4007
|
};
|
|
4008
4008
|
|
|
4009
4009
|
var promptCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
4010
4010
|
__proto__: null,
|
|
4011
|
-
FACTORY_META: FACTORY_META$
|
|
4011
|
+
FACTORY_META: FACTORY_META$16,
|
|
4012
4012
|
PromptCredentialProviderFactory: PromptCredentialProviderFactory,
|
|
4013
4013
|
default: PromptCredentialProviderFactory,
|
|
4014
4014
|
normalizePromptConfig: normalizePromptConfig
|
|
@@ -4062,14 +4062,14 @@ class SecretStoreCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
4062
4062
|
return new SecretStoreCredentialProvider(resolved.secretName);
|
|
4063
4063
|
}
|
|
4064
4064
|
}
|
|
4065
|
-
const FACTORY_META$
|
|
4065
|
+
const FACTORY_META$15 = {
|
|
4066
4066
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
4067
4067
|
key: 'SecretStoreCredentialProvider',
|
|
4068
4068
|
};
|
|
4069
4069
|
|
|
4070
4070
|
var secretStoreCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
4071
4071
|
__proto__: null,
|
|
4072
|
-
FACTORY_META: FACTORY_META$
|
|
4072
|
+
FACTORY_META: FACTORY_META$15,
|
|
4073
4073
|
SecretStoreCredentialProviderFactory: SecretStoreCredentialProviderFactory,
|
|
4074
4074
|
default: SecretStoreCredentialProviderFactory,
|
|
4075
4075
|
normalizeSecretStoreConfig: normalizeSecretStoreConfig
|
|
@@ -4118,14 +4118,14 @@ class StaticCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
4118
4118
|
return new StaticCredentialProvider(resolved.credentialValue);
|
|
4119
4119
|
}
|
|
4120
4120
|
}
|
|
4121
|
-
const FACTORY_META$
|
|
4121
|
+
const FACTORY_META$14 = {
|
|
4122
4122
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
4123
4123
|
key: 'StaticCredentialProvider',
|
|
4124
4124
|
};
|
|
4125
4125
|
|
|
4126
4126
|
var staticCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
4127
4127
|
__proto__: null,
|
|
4128
|
-
FACTORY_META: FACTORY_META$
|
|
4128
|
+
FACTORY_META: FACTORY_META$14,
|
|
4129
4129
|
StaticCredentialProviderFactory: StaticCredentialProviderFactory,
|
|
4130
4130
|
default: StaticCredentialProviderFactory,
|
|
4131
4131
|
normalizeStaticConfig: normalizeStaticConfig
|
|
@@ -5371,12 +5371,12 @@ for (const [name, config] of Object.entries(SQLITE_PROFILES)) {
|
|
|
5371
5371
|
}
|
|
5372
5372
|
|
|
5373
5373
|
// This file is auto-generated during build - do not edit manually
|
|
5374
|
-
// Generated from package.json version: 0.3.5-test.
|
|
5374
|
+
// Generated from package.json version: 0.3.5-test.924
|
|
5375
5375
|
/**
|
|
5376
5376
|
* The package version, injected at build time.
|
|
5377
5377
|
* @internal
|
|
5378
5378
|
*/
|
|
5379
|
-
const VERSION = '0.3.5-test.
|
|
5379
|
+
const VERSION = '0.3.5-test.924';
|
|
5380
5380
|
|
|
5381
5381
|
/**
|
|
5382
5382
|
* Fame errors module - Fame protocol specific error classes
|
|
@@ -15117,6 +15117,7 @@ const MODULES = [
|
|
|
15117
15117
|
"./security/policy/no-security-policy-factory.js",
|
|
15118
15118
|
"./security/signing/eddsa-envelope-signer-factory.js",
|
|
15119
15119
|
"./security/signing/eddsa-envelope-verifier-factory.js",
|
|
15120
|
+
"./security/trust-store/noop-trust-store-provider-factory.js",
|
|
15120
15121
|
"./sentinel/capability-aware-routing-policy-factory.js",
|
|
15121
15122
|
"./sentinel/composite-routing-policy-factory.js",
|
|
15122
15123
|
"./sentinel/hybrid-path-routing-policy-factory.js",
|
|
@@ -15191,6 +15192,7 @@ const MODULE_LOADERS = {
|
|
|
15191
15192
|
"./security/policy/no-security-policy-factory.js": () => Promise.resolve().then(function () { return noSecurityPolicyFactory; }),
|
|
15192
15193
|
"./security/signing/eddsa-envelope-signer-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeSignerFactory; }),
|
|
15193
15194
|
"./security/signing/eddsa-envelope-verifier-factory.js": () => Promise.resolve().then(function () { return eddsaEnvelopeVerifierFactory; }),
|
|
15195
|
+
"./security/trust-store/noop-trust-store-provider-factory.js": () => Promise.resolve().then(function () { return noopTrustStoreProviderFactory; }),
|
|
15194
15196
|
"./sentinel/capability-aware-routing-policy-factory.js": () => Promise.resolve().then(function () { return capabilityAwareRoutingPolicyFactory; }),
|
|
15195
15197
|
"./sentinel/composite-routing-policy-factory.js": () => Promise.resolve().then(function () { return compositeRoutingPolicyFactory; }),
|
|
15196
15198
|
"./sentinel/hybrid-path-routing-policy-factory.js": () => Promise.resolve().then(function () { return hybridPathRoutingPolicyFactory; }),
|
|
@@ -15495,7 +15497,7 @@ class NodeLikeFactory extends AbstractResourceFactory {
|
|
|
15495
15497
|
// registerFactory(NODE_LIKE_FACTORY_BASE_TYPE, type, factory);
|
|
15496
15498
|
// }
|
|
15497
15499
|
|
|
15498
|
-
const FACTORY_META$
|
|
15500
|
+
const FACTORY_META$13 = {
|
|
15499
15501
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
15500
15502
|
key: 'Node',
|
|
15501
15503
|
};
|
|
@@ -15536,7 +15538,7 @@ class NodeFactory extends NodeLikeFactory {
|
|
|
15536
15538
|
|
|
15537
15539
|
var nodeFactory = /*#__PURE__*/Object.freeze({
|
|
15538
15540
|
__proto__: null,
|
|
15539
|
-
FACTORY_META: FACTORY_META$
|
|
15541
|
+
FACTORY_META: FACTORY_META$13,
|
|
15540
15542
|
NodeFactory: NodeFactory,
|
|
15541
15543
|
default: NodeFactory
|
|
15542
15544
|
});
|
|
@@ -16977,7 +16979,7 @@ class RouteStoreFactory extends AbstractResourceFactory {
|
|
|
16977
16979
|
return store ?? null;
|
|
16978
16980
|
}
|
|
16979
16981
|
}
|
|
16980
|
-
const FACTORY_META$
|
|
16982
|
+
const FACTORY_META$12 = {
|
|
16981
16983
|
base: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
16982
16984
|
key: 'InMemoryRouteStore',
|
|
16983
16985
|
};
|
|
@@ -16995,7 +16997,7 @@ class InMemoryRouteStoreFactory extends RouteStoreFactory {
|
|
|
16995
16997
|
|
|
16996
16998
|
var routeStoreFactory = /*#__PURE__*/Object.freeze({
|
|
16997
16999
|
__proto__: null,
|
|
16998
|
-
FACTORY_META: FACTORY_META$
|
|
17000
|
+
FACTORY_META: FACTORY_META$12,
|
|
16999
17001
|
InMemoryRouteStoreFactory: InMemoryRouteStoreFactory,
|
|
17000
17002
|
ROUTE_STORE_FACTORY_BASE_TYPE: ROUTE_STORE_FACTORY_BASE_TYPE,
|
|
17001
17003
|
RouteStoreFactory: RouteStoreFactory,
|
|
@@ -20811,7 +20813,7 @@ function isPlainRecord(value) {
|
|
|
20811
20813
|
return Boolean(value) && typeof value === 'object' && !Array.isArray(value);
|
|
20812
20814
|
}
|
|
20813
20815
|
|
|
20814
|
-
const FACTORY_META$
|
|
20816
|
+
const FACTORY_META$11 = {
|
|
20815
20817
|
base: NODE_LIKE_FACTORY_BASE_TYPE,
|
|
20816
20818
|
key: 'Sentinel',
|
|
20817
20819
|
};
|
|
@@ -20995,7 +20997,7 @@ class SentinelFactory extends NodeLikeFactory {
|
|
|
20995
20997
|
|
|
20996
20998
|
var sentinelFactory = /*#__PURE__*/Object.freeze({
|
|
20997
20999
|
__proto__: null,
|
|
20998
|
-
FACTORY_META: FACTORY_META$
|
|
21000
|
+
FACTORY_META: FACTORY_META$11,
|
|
20999
21001
|
SentinelFactory: SentinelFactory,
|
|
21000
21002
|
default: SentinelFactory
|
|
21001
21003
|
});
|
|
@@ -21609,6 +21611,45 @@ class CertificateManagerFactory extends AbstractResourceFactory {
|
|
|
21609
21611
|
}
|
|
21610
21612
|
}
|
|
21611
21613
|
|
|
21614
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
21615
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
21616
|
+
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
21617
|
+
createUnconfiguredProvider(reason) {
|
|
21618
|
+
return new NoopTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
21619
|
+
}
|
|
21620
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
21621
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
21622
|
+
const mergedFactoryArgs = [
|
|
21623
|
+
...(dependencies ? [dependencies] : []),
|
|
21624
|
+
...(factoryArgs ?? []),
|
|
21625
|
+
];
|
|
21626
|
+
const creationOptions = {
|
|
21627
|
+
...restOptions,
|
|
21628
|
+
factoryArgs: mergedFactoryArgs,
|
|
21629
|
+
};
|
|
21630
|
+
if (config) {
|
|
21631
|
+
const instance = await createResource$1(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
21632
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
21633
|
+
}
|
|
21634
|
+
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
21635
|
+
return instance ?? new NoopTrustStoreProvider();
|
|
21636
|
+
}
|
|
21637
|
+
}
|
|
21638
|
+
class NoopTrustStoreProvider {
|
|
21639
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
21640
|
+
this.reason = reason;
|
|
21641
|
+
}
|
|
21642
|
+
async getTrustStorePem() {
|
|
21643
|
+
throw new Error(this.reason);
|
|
21644
|
+
}
|
|
21645
|
+
async getRoots() {
|
|
21646
|
+
return [];
|
|
21647
|
+
}
|
|
21648
|
+
async initialize() {
|
|
21649
|
+
// No-op for the placeholder provider.
|
|
21650
|
+
}
|
|
21651
|
+
}
|
|
21652
|
+
|
|
21612
21653
|
const ENCRYPTION_MANAGER_FACTORY_BASE_TYPE = 'EncryptionManagerFactory';
|
|
21613
21654
|
class EncryptionManagerFactory extends AbstractResourceFactory {
|
|
21614
21655
|
getPriority() {
|
|
@@ -28185,7 +28226,7 @@ const PROFILE_MAP$4 = {
|
|
|
28185
28226
|
[PROFILE_NAME_GATED_CALLBACK]: GATED_CALLBACK_PROFILE,
|
|
28186
28227
|
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
28187
28228
|
};
|
|
28188
|
-
const FACTORY_META
|
|
28229
|
+
const FACTORY_META$10 = {
|
|
28189
28230
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
28190
28231
|
key: 'SecurityProfile',
|
|
28191
28232
|
};
|
|
@@ -28311,7 +28352,7 @@ var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
|
28311
28352
|
ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE: ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE,
|
|
28312
28353
|
ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER: ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER,
|
|
28313
28354
|
ENV_VAR_JWT_TRUSTED_ISSUER: ENV_VAR_JWT_TRUSTED_ISSUER,
|
|
28314
|
-
FACTORY_META: FACTORY_META
|
|
28355
|
+
FACTORY_META: FACTORY_META$10,
|
|
28315
28356
|
NodeSecurityProfileFactory: NodeSecurityProfileFactory,
|
|
28316
28357
|
PROFILE_NAME_GATED: PROFILE_NAME_GATED,
|
|
28317
28358
|
PROFILE_NAME_GATED_CALLBACK: PROFILE_NAME_GATED_CALLBACK,
|
|
@@ -28440,7 +28481,7 @@ class SimpleLoadBalancerStickinessManager extends BaseNodeEventListener {
|
|
|
28440
28481
|
}
|
|
28441
28482
|
}
|
|
28442
28483
|
|
|
28443
|
-
const FACTORY_META
|
|
28484
|
+
const FACTORY_META$$ = {
|
|
28444
28485
|
base: LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE,
|
|
28445
28486
|
key: 'SimpleLoadBalancerStickinessManager',
|
|
28446
28487
|
};
|
|
@@ -28464,7 +28505,7 @@ class SimpleLoadBalancerStickinessManagerFactory extends LoadBalancerStickinessM
|
|
|
28464
28505
|
|
|
28465
28506
|
var simpleLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
28466
28507
|
__proto__: null,
|
|
28467
|
-
FACTORY_META: FACTORY_META
|
|
28508
|
+
FACTORY_META: FACTORY_META$$,
|
|
28468
28509
|
SimpleLoadBalancerStickinessManagerFactory: SimpleLoadBalancerStickinessManagerFactory,
|
|
28469
28510
|
default: SimpleLoadBalancerStickinessManagerFactory
|
|
28470
28511
|
});
|
|
@@ -28890,7 +28931,7 @@ class WelcomeServiceFactory extends AbstractResourceFactory {
|
|
|
28890
28931
|
}
|
|
28891
28932
|
}
|
|
28892
28933
|
|
|
28893
|
-
const FACTORY_META$
|
|
28934
|
+
const FACTORY_META$_ = {
|
|
28894
28935
|
base: WELCOME_SERVICE_FACTORY_BASE_TYPE,
|
|
28895
28936
|
key: 'DefaultWelcomeService',
|
|
28896
28937
|
};
|
|
@@ -28971,7 +29012,7 @@ function resolveConfigEntry(source, keys) {
|
|
|
28971
29012
|
var defaultWelcomeServiceFactory = /*#__PURE__*/Object.freeze({
|
|
28972
29013
|
__proto__: null,
|
|
28973
29014
|
DefaultWelcomeServiceFactory: DefaultWelcomeServiceFactory,
|
|
28974
|
-
FACTORY_META: FACTORY_META$
|
|
29015
|
+
FACTORY_META: FACTORY_META$_,
|
|
28975
29016
|
default: DefaultWelcomeServiceFactory
|
|
28976
29017
|
});
|
|
28977
29018
|
|
|
@@ -29175,7 +29216,7 @@ function normalizeConfig$r(config) {
|
|
|
29175
29216
|
authorizer: authorizerValue,
|
|
29176
29217
|
};
|
|
29177
29218
|
}
|
|
29178
|
-
const FACTORY_META$
|
|
29219
|
+
const FACTORY_META$Z = {
|
|
29179
29220
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29180
29221
|
key: 'HttpListener',
|
|
29181
29222
|
};
|
|
@@ -29222,7 +29263,7 @@ class HttpListenerFactory extends TransportListenerFactory {
|
|
|
29222
29263
|
|
|
29223
29264
|
var httpListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29224
29265
|
__proto__: null,
|
|
29225
|
-
FACTORY_META: FACTORY_META$
|
|
29266
|
+
FACTORY_META: FACTORY_META$Z,
|
|
29226
29267
|
HttpListenerFactory: HttpListenerFactory,
|
|
29227
29268
|
default: HttpListenerFactory
|
|
29228
29269
|
});
|
|
@@ -29291,7 +29332,7 @@ function normalizeConfig$q(config) {
|
|
|
29291
29332
|
authorizer: authorizerValue,
|
|
29292
29333
|
};
|
|
29293
29334
|
}
|
|
29294
|
-
const FACTORY_META$
|
|
29335
|
+
const FACTORY_META$Y = {
|
|
29295
29336
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29296
29337
|
key: 'WebSocketListener',
|
|
29297
29338
|
};
|
|
@@ -29335,7 +29376,7 @@ class WebSocketListenerFactory extends TransportListenerFactory {
|
|
|
29335
29376
|
|
|
29336
29377
|
var websocketListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29337
29378
|
__proto__: null,
|
|
29338
|
-
FACTORY_META: FACTORY_META$
|
|
29379
|
+
FACTORY_META: FACTORY_META$Y,
|
|
29339
29380
|
WebSocketListenerFactory: WebSocketListenerFactory,
|
|
29340
29381
|
default: WebSocketListenerFactory
|
|
29341
29382
|
});
|
|
@@ -29372,7 +29413,7 @@ function normalizeConfig$p(config) {
|
|
|
29372
29413
|
inboxCapacity,
|
|
29373
29414
|
};
|
|
29374
29415
|
}
|
|
29375
|
-
const FACTORY_META$
|
|
29416
|
+
const FACTORY_META$X = {
|
|
29376
29417
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29377
29418
|
key: 'InPageListener',
|
|
29378
29419
|
};
|
|
@@ -29398,7 +29439,7 @@ class InPageListenerFactory extends TransportListenerFactory {
|
|
|
29398
29439
|
|
|
29399
29440
|
var inpageListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29400
29441
|
__proto__: null,
|
|
29401
|
-
FACTORY_META: FACTORY_META$
|
|
29442
|
+
FACTORY_META: FACTORY_META$X,
|
|
29402
29443
|
InPageListenerFactory: InPageListenerFactory,
|
|
29403
29444
|
default: InPageListenerFactory
|
|
29404
29445
|
});
|
|
@@ -29435,7 +29476,7 @@ function normalizeConfig$o(config) {
|
|
|
29435
29476
|
inboxCapacity,
|
|
29436
29477
|
};
|
|
29437
29478
|
}
|
|
29438
|
-
const FACTORY_META$
|
|
29479
|
+
const FACTORY_META$W = {
|
|
29439
29480
|
base: TRANSPORT_LISTENER_FACTORY_BASE_TYPE,
|
|
29440
29481
|
key: 'BroadcastChannelListener',
|
|
29441
29482
|
};
|
|
@@ -29462,7 +29503,7 @@ class BroadcastChannelListenerFactory extends TransportListenerFactory {
|
|
|
29462
29503
|
var broadcastChannelListenerFactory = /*#__PURE__*/Object.freeze({
|
|
29463
29504
|
__proto__: null,
|
|
29464
29505
|
BroadcastChannelListenerFactory: BroadcastChannelListenerFactory,
|
|
29465
|
-
FACTORY_META: FACTORY_META$
|
|
29506
|
+
FACTORY_META: FACTORY_META$W,
|
|
29466
29507
|
default: BroadcastChannelListenerFactory
|
|
29467
29508
|
});
|
|
29468
29509
|
|
|
@@ -29586,7 +29627,7 @@ class HttpConnectionGrantImpl {
|
|
|
29586
29627
|
this.purpose = 'connection';
|
|
29587
29628
|
}
|
|
29588
29629
|
}
|
|
29589
|
-
const FACTORY_META$
|
|
29630
|
+
const FACTORY_META$V = {
|
|
29590
29631
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29591
29632
|
key: HTTP_STATELESS_CONNECTOR_TYPE,
|
|
29592
29633
|
};
|
|
@@ -29755,7 +29796,7 @@ class HttpStatelessConnectorFactory extends ConnectorFactory {
|
|
|
29755
29796
|
|
|
29756
29797
|
var httpStatelessConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29757
29798
|
__proto__: null,
|
|
29758
|
-
FACTORY_META: FACTORY_META$
|
|
29799
|
+
FACTORY_META: FACTORY_META$V,
|
|
29759
29800
|
HttpStatelessConnectorFactory: HttpStatelessConnectorFactory,
|
|
29760
29801
|
default: HttpStatelessConnectorFactory
|
|
29761
29802
|
});
|
|
@@ -29768,7 +29809,7 @@ class InPageConnectionGrantImpl {
|
|
|
29768
29809
|
this.purpose = 'connection';
|
|
29769
29810
|
}
|
|
29770
29811
|
}
|
|
29771
|
-
const FACTORY_META$
|
|
29812
|
+
const FACTORY_META$U = {
|
|
29772
29813
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29773
29814
|
key: INPAGE_CONNECTOR_TYPE,
|
|
29774
29815
|
};
|
|
@@ -29917,7 +29958,7 @@ class InPageConnectorFactory extends ConnectorFactory {
|
|
|
29917
29958
|
|
|
29918
29959
|
var inpageConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
29919
29960
|
__proto__: null,
|
|
29920
|
-
FACTORY_META: FACTORY_META$
|
|
29961
|
+
FACTORY_META: FACTORY_META$U,
|
|
29921
29962
|
InPageConnectorFactory: InPageConnectorFactory,
|
|
29922
29963
|
default: InPageConnectorFactory
|
|
29923
29964
|
});
|
|
@@ -29930,7 +29971,7 @@ class BroadcastChannelConnectionGrantImpl {
|
|
|
29930
29971
|
this.purpose = 'connection';
|
|
29931
29972
|
}
|
|
29932
29973
|
}
|
|
29933
|
-
const FACTORY_META$
|
|
29974
|
+
const FACTORY_META$T = {
|
|
29934
29975
|
base: CONNECTOR_FACTORY_BASE_TYPE,
|
|
29935
29976
|
key: BROADCAST_CHANNEL_CONNECTOR_TYPE$1,
|
|
29936
29977
|
};
|
|
@@ -30078,7 +30119,7 @@ class BroadcastChannelConnectorFactory extends ConnectorFactory {
|
|
|
30078
30119
|
var broadcastChannelConnectorFactory = /*#__PURE__*/Object.freeze({
|
|
30079
30120
|
__proto__: null,
|
|
30080
30121
|
BroadcastChannelConnectorFactory: BroadcastChannelConnectorFactory,
|
|
30081
|
-
FACTORY_META: FACTORY_META$
|
|
30122
|
+
FACTORY_META: FACTORY_META$T,
|
|
30082
30123
|
default: BroadcastChannelConnectorFactory
|
|
30083
30124
|
});
|
|
30084
30125
|
|
|
@@ -32586,7 +32627,7 @@ function normalizeServiceName(value) {
|
|
|
32586
32627
|
|
|
32587
32628
|
// import { registerRuntimeFactories } from "../util/register-runtime-factories.js";
|
|
32588
32629
|
const FAME_FABRIC_FACTORY_BASE_TYPE = 'FameFabricFactory';
|
|
32589
|
-
const FACTORY_META$
|
|
32630
|
+
const FACTORY_META$S = {
|
|
32590
32631
|
base: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
32591
32632
|
key: 'InProcessFameFabric',
|
|
32592
32633
|
};
|
|
@@ -32606,7 +32647,7 @@ class InProcessFameFabricFactory extends FameFabricFactory {
|
|
|
32606
32647
|
|
|
32607
32648
|
var inProcessFameFabricFactory = /*#__PURE__*/Object.freeze({
|
|
32608
32649
|
__proto__: null,
|
|
32609
|
-
FACTORY_META: FACTORY_META$
|
|
32650
|
+
FACTORY_META: FACTORY_META$S,
|
|
32610
32651
|
FAME_FABRIC_FACTORY_BASE_TYPE: FAME_FABRIC_FACTORY_BASE_TYPE,
|
|
32611
32652
|
InProcessFameFabricFactory: InProcessFameFabricFactory,
|
|
32612
32653
|
default: InProcessFameFabricFactory
|
|
@@ -34403,7 +34444,7 @@ class NoopTraceEmitter extends BaseTraceEmitter {
|
|
|
34403
34444
|
}
|
|
34404
34445
|
}
|
|
34405
34446
|
|
|
34406
|
-
const FACTORY_META$
|
|
34447
|
+
const FACTORY_META$R = {
|
|
34407
34448
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
34408
34449
|
key: 'NoopTraceEmitter',
|
|
34409
34450
|
};
|
|
@@ -34421,7 +34462,7 @@ class NoopTraceEmitterFactory extends TraceEmitterFactory {
|
|
|
34421
34462
|
|
|
34422
34463
|
var noopTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
34423
34464
|
__proto__: null,
|
|
34424
|
-
FACTORY_META: FACTORY_META$
|
|
34465
|
+
FACTORY_META: FACTORY_META$R,
|
|
34425
34466
|
NoopTraceEmitterFactory: NoopTraceEmitterFactory,
|
|
34426
34467
|
default: NoopTraceEmitterFactory
|
|
34427
34468
|
});
|
|
@@ -34676,7 +34717,7 @@ function getOtelApiModule() {
|
|
|
34676
34717
|
}
|
|
34677
34718
|
return otelApiModulePromise;
|
|
34678
34719
|
}
|
|
34679
|
-
const FACTORY_META$
|
|
34720
|
+
const FACTORY_META$Q = {
|
|
34680
34721
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
34681
34722
|
key: 'OpenTelemetryTraceEmitter',
|
|
34682
34723
|
};
|
|
@@ -34846,7 +34887,7 @@ function extractHeaders(value) {
|
|
|
34846
34887
|
|
|
34847
34888
|
var openTelemetryTraceEmitterFactory = /*#__PURE__*/Object.freeze({
|
|
34848
34889
|
__proto__: null,
|
|
34849
|
-
FACTORY_META: FACTORY_META$
|
|
34890
|
+
FACTORY_META: FACTORY_META$Q,
|
|
34850
34891
|
OpenTelemetryTraceEmitterFactory: OpenTelemetryTraceEmitterFactory,
|
|
34851
34892
|
default: OpenTelemetryTraceEmitterFactory
|
|
34852
34893
|
});
|
|
@@ -34867,7 +34908,7 @@ const PROFILE_MAP$3 = {
|
|
|
34867
34908
|
[PROFILE_NAME_NOOP$1]: NOOP_PROFILE$1,
|
|
34868
34909
|
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
34869
34910
|
};
|
|
34870
|
-
const FACTORY_META$
|
|
34911
|
+
const FACTORY_META$P = {
|
|
34871
34912
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
34872
34913
|
key: 'TraceEmitterProfile',
|
|
34873
34914
|
};
|
|
@@ -34947,7 +34988,7 @@ function deepClone$2(value) {
|
|
|
34947
34988
|
|
|
34948
34989
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
34949
34990
|
__proto__: null,
|
|
34950
|
-
FACTORY_META: FACTORY_META$
|
|
34991
|
+
FACTORY_META: FACTORY_META$P,
|
|
34951
34992
|
PROFILE_NAME_NOOP: PROFILE_NAME_NOOP$1,
|
|
34952
34993
|
PROFILE_NAME_OPEN_TELEMETRY: PROFILE_NAME_OPEN_TELEMETRY,
|
|
34953
34994
|
TraceEmitterProfileFactory: TraceEmitterProfileFactory,
|
|
@@ -35117,7 +35158,7 @@ function withOption(source, keys) {
|
|
|
35117
35158
|
[camelKey]: value,
|
|
35118
35159
|
};
|
|
35119
35160
|
}
|
|
35120
|
-
const FACTORY_META$
|
|
35161
|
+
const FACTORY_META$O = {
|
|
35121
35162
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
35122
35163
|
key: 'AtLeastOnceDeliveryPolicy',
|
|
35123
35164
|
};
|
|
@@ -35125,7 +35166,7 @@ const FACTORY_META$N = {
|
|
|
35125
35166
|
var atLeastOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35126
35167
|
__proto__: null,
|
|
35127
35168
|
AtLeastOnceDeliveryPolicyFactory: AtLeastOnceDeliveryPolicyFactory,
|
|
35128
|
-
FACTORY_META: FACTORY_META$
|
|
35169
|
+
FACTORY_META: FACTORY_META$O,
|
|
35129
35170
|
default: AtLeastOnceDeliveryPolicyFactory
|
|
35130
35171
|
});
|
|
35131
35172
|
|
|
@@ -35152,7 +35193,7 @@ class AtMostOnceDeliveryPolicyFactory extends DeliveryPolicyFactory {
|
|
|
35152
35193
|
}
|
|
35153
35194
|
registerDeliveryPolicyFactory('AtMostOnceDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
35154
35195
|
registerDeliveryPolicyFactory('AtMostOnceMessageDeliveryPolicy', AtMostOnceDeliveryPolicyFactory);
|
|
35155
|
-
const FACTORY_META$
|
|
35196
|
+
const FACTORY_META$N = {
|
|
35156
35197
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
35157
35198
|
key: 'AtMostOnceDeliveryPolicy',
|
|
35158
35199
|
};
|
|
@@ -35160,7 +35201,7 @@ const FACTORY_META$M = {
|
|
|
35160
35201
|
var atMostOnceDeliveryPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
35161
35202
|
__proto__: null,
|
|
35162
35203
|
AtMostOnceDeliveryPolicyFactory: AtMostOnceDeliveryPolicyFactory,
|
|
35163
|
-
FACTORY_META: FACTORY_META$
|
|
35204
|
+
FACTORY_META: FACTORY_META$N,
|
|
35164
35205
|
default: AtMostOnceDeliveryPolicyFactory
|
|
35165
35206
|
});
|
|
35166
35207
|
|
|
@@ -35253,7 +35294,7 @@ function resolveProfileConfig$1(profileName) {
|
|
|
35253
35294
|
function deepClone$1(value) {
|
|
35254
35295
|
return JSON.parse(JSON.stringify(value));
|
|
35255
35296
|
}
|
|
35256
|
-
const FACTORY_META$
|
|
35297
|
+
const FACTORY_META$M = {
|
|
35257
35298
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
35258
35299
|
key: 'DeliveryProfile',
|
|
35259
35300
|
};
|
|
@@ -35261,7 +35302,7 @@ const FACTORY_META$L = {
|
|
|
35261
35302
|
var deliveryProfileFactory = /*#__PURE__*/Object.freeze({
|
|
35262
35303
|
__proto__: null,
|
|
35263
35304
|
DeliveryProfileFactory: DeliveryProfileFactory,
|
|
35264
|
-
FACTORY_META: FACTORY_META$
|
|
35305
|
+
FACTORY_META: FACTORY_META$M,
|
|
35265
35306
|
PROFILE_NAME_AT_LEAST_ONCE: PROFILE_NAME_AT_LEAST_ONCE,
|
|
35266
35307
|
PROFILE_NAME_AT_MOST_ONCE: PROFILE_NAME_AT_MOST_ONCE,
|
|
35267
35308
|
default: DeliveryProfileFactory
|
|
@@ -35490,7 +35531,7 @@ const PROFILE_MAP$1 = {
|
|
|
35490
35531
|
[PROFILE_NAME_NOOP]: NOOP_PROFILE,
|
|
35491
35532
|
[PROFILE_NAME_NONE]: NOOP_PROFILE,
|
|
35492
35533
|
};
|
|
35493
|
-
const FACTORY_META$
|
|
35534
|
+
const FACTORY_META$L = {
|
|
35494
35535
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35495
35536
|
key: 'AdmissionProfile',
|
|
35496
35537
|
};
|
|
@@ -35537,7 +35578,7 @@ function deepClone(value) {
|
|
|
35537
35578
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
35538
35579
|
__proto__: null,
|
|
35539
35580
|
AdmissionProfileFactory: AdmissionProfileFactory,
|
|
35540
|
-
FACTORY_META: FACTORY_META$
|
|
35581
|
+
FACTORY_META: FACTORY_META$L,
|
|
35541
35582
|
default: AdmissionProfileFactory
|
|
35542
35583
|
});
|
|
35543
35584
|
|
|
@@ -35619,7 +35660,7 @@ function cloneGrant(grant) {
|
|
|
35619
35660
|
return JSON.parse(JSON.stringify(grant));
|
|
35620
35661
|
}
|
|
35621
35662
|
|
|
35622
|
-
const FACTORY_META$
|
|
35663
|
+
const FACTORY_META$K = {
|
|
35623
35664
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35624
35665
|
key: 'DirectAdmissionClient',
|
|
35625
35666
|
};
|
|
@@ -35671,11 +35712,11 @@ function normalizeConfig$l(config) {
|
|
|
35671
35712
|
var directAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
35672
35713
|
__proto__: null,
|
|
35673
35714
|
DirectAdmissionClientFactory: DirectAdmissionClientFactory,
|
|
35674
|
-
FACTORY_META: FACTORY_META$
|
|
35715
|
+
FACTORY_META: FACTORY_META$K,
|
|
35675
35716
|
default: DirectAdmissionClientFactory
|
|
35676
35717
|
});
|
|
35677
35718
|
|
|
35678
|
-
const FACTORY_META$
|
|
35719
|
+
const FACTORY_META$J = {
|
|
35679
35720
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35680
35721
|
key: 'NoopAdmissionClient',
|
|
35681
35722
|
};
|
|
@@ -35724,7 +35765,7 @@ function normalizeConfig$k(config, factoryArgs) {
|
|
|
35724
35765
|
|
|
35725
35766
|
var noopAdmissionClientFactory = /*#__PURE__*/Object.freeze({
|
|
35726
35767
|
__proto__: null,
|
|
35727
|
-
FACTORY_META: FACTORY_META$
|
|
35768
|
+
FACTORY_META: FACTORY_META$J,
|
|
35728
35769
|
NoopAdmissionClientFactory: NoopAdmissionClientFactory,
|
|
35729
35770
|
default: NoopAdmissionClientFactory
|
|
35730
35771
|
});
|
|
@@ -35739,7 +35780,7 @@ class NoAuthInjectionStrategy {
|
|
|
35739
35780
|
}
|
|
35740
35781
|
}
|
|
35741
35782
|
|
|
35742
|
-
const FACTORY_META$
|
|
35783
|
+
const FACTORY_META$I = {
|
|
35743
35784
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
35744
35785
|
key: 'NoAuth',
|
|
35745
35786
|
};
|
|
@@ -35768,7 +35809,7 @@ function normalizeConfig$j(config) {
|
|
|
35768
35809
|
|
|
35769
35810
|
var noAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
35770
35811
|
__proto__: null,
|
|
35771
|
-
FACTORY_META: FACTORY_META$
|
|
35812
|
+
FACTORY_META: FACTORY_META$I,
|
|
35772
35813
|
NoAuthInjectionStrategyFactory: NoAuthInjectionStrategyFactory,
|
|
35773
35814
|
default: NoAuthInjectionStrategyFactory
|
|
35774
35815
|
});
|
|
@@ -35917,7 +35958,7 @@ function convertKeysToCamelCase(value) {
|
|
|
35917
35958
|
return result;
|
|
35918
35959
|
}
|
|
35919
35960
|
|
|
35920
|
-
const FACTORY_META$
|
|
35961
|
+
const FACTORY_META$H = {
|
|
35921
35962
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
35922
35963
|
key: 'WelcomeServiceClient',
|
|
35923
35964
|
};
|
|
@@ -35987,7 +36028,7 @@ async function createAuthStrategy(config) {
|
|
|
35987
36028
|
|
|
35988
36029
|
var welcomeServiceClientFactory = /*#__PURE__*/Object.freeze({
|
|
35989
36030
|
__proto__: null,
|
|
35990
|
-
FACTORY_META: FACTORY_META$
|
|
36031
|
+
FACTORY_META: FACTORY_META$H,
|
|
35991
36032
|
WelcomeServiceClientFactory: WelcomeServiceClientFactory,
|
|
35992
36033
|
default: WelcomeServiceClientFactory
|
|
35993
36034
|
});
|
|
@@ -36105,7 +36146,7 @@ class StaticNodePlacementStrategyFactory extends NodePlacementStrategyFactory {
|
|
|
36105
36146
|
});
|
|
36106
36147
|
}
|
|
36107
36148
|
}
|
|
36108
|
-
const FACTORY_META$
|
|
36149
|
+
const FACTORY_META$G = {
|
|
36109
36150
|
base: NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE,
|
|
36110
36151
|
key: 'StaticNodePlacementStrategy',
|
|
36111
36152
|
};
|
|
@@ -36115,7 +36156,7 @@ registerNodePlacementStrategyFactory('StaticNodePlacementStrategy', StaticNodePl
|
|
|
36115
36156
|
|
|
36116
36157
|
var staticNodePlacementStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
36117
36158
|
__proto__: null,
|
|
36118
|
-
FACTORY_META: FACTORY_META$
|
|
36159
|
+
FACTORY_META: FACTORY_META$G,
|
|
36119
36160
|
StaticNodePlacementStrategyFactory: StaticNodePlacementStrategyFactory,
|
|
36120
36161
|
default: StaticNodePlacementStrategyFactory
|
|
36121
36162
|
});
|
|
@@ -36274,7 +36315,7 @@ function connectorTypeName(connector) {
|
|
|
36274
36315
|
return typeof connector;
|
|
36275
36316
|
}
|
|
36276
36317
|
|
|
36277
|
-
const FACTORY_META$
|
|
36318
|
+
const FACTORY_META$F = {
|
|
36278
36319
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
36279
36320
|
key: 'BearerTokenHeaderAuth',
|
|
36280
36321
|
};
|
|
@@ -36315,7 +36356,7 @@ function normalizeConfig$g(config) {
|
|
|
36315
36356
|
var bearerTokenHeaderAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
36316
36357
|
__proto__: null,
|
|
36317
36358
|
BearerTokenHeaderAuthInjectionStrategyFactory: BearerTokenHeaderAuthInjectionStrategyFactory,
|
|
36318
|
-
FACTORY_META: FACTORY_META$
|
|
36359
|
+
FACTORY_META: FACTORY_META$F,
|
|
36319
36360
|
default: BearerTokenHeaderAuthInjectionStrategyFactory
|
|
36320
36361
|
});
|
|
36321
36362
|
|
|
@@ -36342,7 +36383,7 @@ function normalizeConfig$f(config) {
|
|
|
36342
36383
|
function isTokenVerifier(candidate) {
|
|
36343
36384
|
return Boolean(candidate && typeof candidate.verify === 'function');
|
|
36344
36385
|
}
|
|
36345
|
-
const FACTORY_META$
|
|
36386
|
+
const FACTORY_META$E = {
|
|
36346
36387
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
36347
36388
|
key: 'DefaultAuthorizer',
|
|
36348
36389
|
};
|
|
@@ -36372,7 +36413,7 @@ class DefaultAuthorizerFactory extends AuthorizerFactory {
|
|
|
36372
36413
|
var defaultAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
36373
36414
|
__proto__: null,
|
|
36374
36415
|
DefaultAuthorizerFactory: DefaultAuthorizerFactory,
|
|
36375
|
-
FACTORY_META: FACTORY_META$
|
|
36416
|
+
FACTORY_META: FACTORY_META$E,
|
|
36376
36417
|
default: DefaultAuthorizerFactory
|
|
36377
36418
|
});
|
|
36378
36419
|
|
|
@@ -36383,7 +36424,7 @@ function getJwksJwtTokenVerifierModule() {
|
|
|
36383
36424
|
}
|
|
36384
36425
|
return jwksJwtTokenVerifierModulePromise;
|
|
36385
36426
|
}
|
|
36386
|
-
const FACTORY_META$
|
|
36427
|
+
const FACTORY_META$D = {
|
|
36387
36428
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
36388
36429
|
key: 'JWKSJWTTokenVerifier',
|
|
36389
36430
|
};
|
|
@@ -36445,12 +36486,12 @@ function normalizeConfig$e(config) {
|
|
|
36445
36486
|
|
|
36446
36487
|
var jwksJwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
36447
36488
|
__proto__: null,
|
|
36448
|
-
FACTORY_META: FACTORY_META$
|
|
36489
|
+
FACTORY_META: FACTORY_META$D,
|
|
36449
36490
|
JWKSTokenVerifierFactory: JWKSTokenVerifierFactory,
|
|
36450
36491
|
default: JWKSTokenVerifierFactory
|
|
36451
36492
|
});
|
|
36452
36493
|
|
|
36453
|
-
const FACTORY_META$
|
|
36494
|
+
const FACTORY_META$C = {
|
|
36454
36495
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
36455
36496
|
key: 'JWTTokenIssuer',
|
|
36456
36497
|
};
|
|
@@ -36647,12 +36688,12 @@ function getProviderKeyId(provider) {
|
|
|
36647
36688
|
|
|
36648
36689
|
var jwtTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
36649
36690
|
__proto__: null,
|
|
36650
|
-
FACTORY_META: FACTORY_META$
|
|
36691
|
+
FACTORY_META: FACTORY_META$C,
|
|
36651
36692
|
JWTTokenIssuerFactory: JWTTokenIssuerFactory,
|
|
36652
36693
|
default: JWTTokenIssuerFactory
|
|
36653
36694
|
});
|
|
36654
36695
|
|
|
36655
|
-
const FACTORY_META$
|
|
36696
|
+
const FACTORY_META$B = {
|
|
36656
36697
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
36657
36698
|
key: 'JWTTokenVerifier',
|
|
36658
36699
|
};
|
|
@@ -36820,7 +36861,7 @@ function getProviderVerificationKey(provider) {
|
|
|
36820
36861
|
|
|
36821
36862
|
var jwtTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
36822
36863
|
__proto__: null,
|
|
36823
|
-
FACTORY_META: FACTORY_META$
|
|
36864
|
+
FACTORY_META: FACTORY_META$B,
|
|
36824
36865
|
JWTTokenVerifierFactory: JWTTokenVerifierFactory,
|
|
36825
36866
|
default: JWTTokenVerifierFactory
|
|
36826
36867
|
});
|
|
@@ -36836,7 +36877,7 @@ class NoneTokenProvider {
|
|
|
36836
36877
|
}
|
|
36837
36878
|
}
|
|
36838
36879
|
|
|
36839
|
-
const FACTORY_META$
|
|
36880
|
+
const FACTORY_META$A = {
|
|
36840
36881
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
36841
36882
|
key: 'NoneTokenProvider',
|
|
36842
36883
|
};
|
|
@@ -36853,7 +36894,7 @@ class NoneTokenProviderFactory extends TokenProviderFactory {
|
|
|
36853
36894
|
|
|
36854
36895
|
var noneTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
36855
36896
|
__proto__: null,
|
|
36856
|
-
FACTORY_META: FACTORY_META$
|
|
36897
|
+
FACTORY_META: FACTORY_META$A,
|
|
36857
36898
|
NoneTokenProviderFactory: NoneTokenProviderFactory,
|
|
36858
36899
|
default: NoneTokenProviderFactory
|
|
36859
36900
|
});
|
|
@@ -36905,7 +36946,7 @@ class NoopAuthorizer {
|
|
|
36905
36946
|
}
|
|
36906
36947
|
}
|
|
36907
36948
|
|
|
36908
|
-
const FACTORY_META$
|
|
36949
|
+
const FACTORY_META$z = {
|
|
36909
36950
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
36910
36951
|
key: 'NoopAuthorizer',
|
|
36911
36952
|
};
|
|
@@ -36921,7 +36962,7 @@ class NoopAuthorizerFactory extends AuthorizerFactory {
|
|
|
36921
36962
|
|
|
36922
36963
|
var noopAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
36923
36964
|
__proto__: null,
|
|
36924
|
-
FACTORY_META: FACTORY_META$
|
|
36965
|
+
FACTORY_META: FACTORY_META$z,
|
|
36925
36966
|
NoopAuthorizerFactory: NoopAuthorizerFactory,
|
|
36926
36967
|
default: NoopAuthorizerFactory
|
|
36927
36968
|
});
|
|
@@ -36935,7 +36976,7 @@ class NoopTokenIssuer {
|
|
|
36935
36976
|
}
|
|
36936
36977
|
}
|
|
36937
36978
|
|
|
36938
|
-
const FACTORY_META$
|
|
36979
|
+
const FACTORY_META$y = {
|
|
36939
36980
|
base: TOKEN_ISSUER_FACTORY_BASE_TYPE,
|
|
36940
36981
|
key: 'NoopTokenIssuer',
|
|
36941
36982
|
};
|
|
@@ -36951,7 +36992,7 @@ class NoopTokenIssuerFactory extends TokenIssuerFactory {
|
|
|
36951
36992
|
|
|
36952
36993
|
var noopTokenIssuerFactory = /*#__PURE__*/Object.freeze({
|
|
36953
36994
|
__proto__: null,
|
|
36954
|
-
FACTORY_META: FACTORY_META$
|
|
36995
|
+
FACTORY_META: FACTORY_META$y,
|
|
36955
36996
|
NoopTokenIssuerFactory: NoopTokenIssuerFactory,
|
|
36956
36997
|
default: NoopTokenIssuerFactory
|
|
36957
36998
|
});
|
|
@@ -36973,7 +37014,7 @@ class NoopTokenVerifier {
|
|
|
36973
37014
|
}
|
|
36974
37015
|
}
|
|
36975
37016
|
|
|
36976
|
-
const FACTORY_META$
|
|
37017
|
+
const FACTORY_META$x = {
|
|
36977
37018
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
36978
37019
|
key: 'NoopTokenVerifier',
|
|
36979
37020
|
};
|
|
@@ -36989,7 +37030,7 @@ class NoopTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
36989
37030
|
|
|
36990
37031
|
var noopTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
36991
37032
|
__proto__: null,
|
|
36992
|
-
FACTORY_META: FACTORY_META$
|
|
37033
|
+
FACTORY_META: FACTORY_META$x,
|
|
36993
37034
|
NoopTokenVerifierFactory: NoopTokenVerifierFactory,
|
|
36994
37035
|
default: NoopTokenVerifierFactory
|
|
36995
37036
|
});
|
|
@@ -37002,7 +37043,7 @@ function getOAuth2AuthorizerModule() {
|
|
|
37002
37043
|
}
|
|
37003
37044
|
return oauth2AuthorizerModulePromise;
|
|
37004
37045
|
}
|
|
37005
|
-
const FACTORY_META$
|
|
37046
|
+
const FACTORY_META$w = {
|
|
37006
37047
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
37007
37048
|
key: 'OAuth2Authorizer',
|
|
37008
37049
|
};
|
|
@@ -37147,7 +37188,7 @@ function normalizeTokenVerifierConfig({ config, issuer, jwksUrl, algorithm, }) {
|
|
|
37147
37188
|
|
|
37148
37189
|
var oauth2AuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
37149
37190
|
__proto__: null,
|
|
37150
|
-
FACTORY_META: FACTORY_META$
|
|
37191
|
+
FACTORY_META: FACTORY_META$w,
|
|
37151
37192
|
OAuth2AuthorizerFactory: OAuth2AuthorizerFactory,
|
|
37152
37193
|
default: OAuth2AuthorizerFactory
|
|
37153
37194
|
});
|
|
@@ -37187,7 +37228,7 @@ function normalizeConfig$a(config) {
|
|
|
37187
37228
|
}
|
|
37188
37229
|
return normalized;
|
|
37189
37230
|
}
|
|
37190
|
-
const FACTORY_META$
|
|
37231
|
+
const FACTORY_META$v = {
|
|
37191
37232
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37192
37233
|
key: 'OAuth2ClientCredentialsTokenProvider',
|
|
37193
37234
|
};
|
|
@@ -37218,7 +37259,7 @@ class OAuth2ClientCredentialsTokenProviderFactory extends TokenProviderFactory {
|
|
|
37218
37259
|
|
|
37219
37260
|
var oauth2ClientCredentialsTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37220
37261
|
__proto__: null,
|
|
37221
|
-
FACTORY_META: FACTORY_META$
|
|
37262
|
+
FACTORY_META: FACTORY_META$v,
|
|
37222
37263
|
OAuth2ClientCredentialsTokenProviderFactory: OAuth2ClientCredentialsTokenProviderFactory,
|
|
37223
37264
|
default: OAuth2ClientCredentialsTokenProviderFactory
|
|
37224
37265
|
});
|
|
@@ -37300,7 +37341,7 @@ function normalizeConfig$9(config) {
|
|
|
37300
37341
|
}
|
|
37301
37342
|
return normalized;
|
|
37302
37343
|
}
|
|
37303
|
-
const FACTORY_META$
|
|
37344
|
+
const FACTORY_META$u = {
|
|
37304
37345
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37305
37346
|
key: 'OAuth2PkceTokenProvider',
|
|
37306
37347
|
};
|
|
@@ -37355,7 +37396,7 @@ class OAuth2PkceTokenProviderFactory extends TokenProviderFactory {
|
|
|
37355
37396
|
|
|
37356
37397
|
var oauth2PkceTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37357
37398
|
__proto__: null,
|
|
37358
|
-
FACTORY_META: FACTORY_META$
|
|
37399
|
+
FACTORY_META: FACTORY_META$u,
|
|
37359
37400
|
OAuth2PkceTokenProviderFactory: OAuth2PkceTokenProviderFactory,
|
|
37360
37401
|
default: OAuth2PkceTokenProviderFactory
|
|
37361
37402
|
});
|
|
@@ -37405,7 +37446,7 @@ class QueryParamAuthInjectionStrategy {
|
|
|
37405
37446
|
}
|
|
37406
37447
|
}
|
|
37407
37448
|
|
|
37408
|
-
const FACTORY_META$
|
|
37449
|
+
const FACTORY_META$t = {
|
|
37409
37450
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
37410
37451
|
key: 'QueryParamAuth',
|
|
37411
37452
|
};
|
|
@@ -37445,7 +37486,7 @@ function normalizeConfig$8(config) {
|
|
|
37445
37486
|
|
|
37446
37487
|
var queryParamAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
37447
37488
|
__proto__: null,
|
|
37448
|
-
FACTORY_META: FACTORY_META$
|
|
37489
|
+
FACTORY_META: FACTORY_META$t,
|
|
37449
37490
|
QueryParamAuthInjectionStrategyFactory: QueryParamAuthInjectionStrategyFactory,
|
|
37450
37491
|
default: QueryParamAuthInjectionStrategyFactory
|
|
37451
37492
|
});
|
|
@@ -37481,7 +37522,7 @@ function normalizeConfig$7(config) {
|
|
|
37481
37522
|
secretConfig: normalizeSecretSource(secretSource),
|
|
37482
37523
|
};
|
|
37483
37524
|
}
|
|
37484
|
-
const FACTORY_META$
|
|
37525
|
+
const FACTORY_META$s = {
|
|
37485
37526
|
base: AUTHORIZER_FACTORY_BASE_TYPE,
|
|
37486
37527
|
key: 'SharedSecretAuthorizer',
|
|
37487
37528
|
};
|
|
@@ -37500,7 +37541,7 @@ class SharedSecretAuthorizerFactory extends AuthorizerFactory {
|
|
|
37500
37541
|
|
|
37501
37542
|
var sharedSecretAuthorizerFactory = /*#__PURE__*/Object.freeze({
|
|
37502
37543
|
__proto__: null,
|
|
37503
|
-
FACTORY_META: FACTORY_META$
|
|
37544
|
+
FACTORY_META: FACTORY_META$s,
|
|
37504
37545
|
SharedSecretAuthorizerFactory: SharedSecretAuthorizerFactory,
|
|
37505
37546
|
default: SharedSecretAuthorizerFactory
|
|
37506
37547
|
});
|
|
@@ -37536,7 +37577,7 @@ function normalizeConfig$6(config) {
|
|
|
37536
37577
|
secretConfig: normalizeSecretSource(secretSource),
|
|
37537
37578
|
};
|
|
37538
37579
|
}
|
|
37539
|
-
const FACTORY_META$
|
|
37580
|
+
const FACTORY_META$r = {
|
|
37540
37581
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37541
37582
|
key: 'SharedSecretTokenProvider',
|
|
37542
37583
|
};
|
|
@@ -37555,7 +37596,7 @@ class SharedSecretTokenProviderFactory extends TokenProviderFactory {
|
|
|
37555
37596
|
|
|
37556
37597
|
var sharedSecretTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37557
37598
|
__proto__: null,
|
|
37558
|
-
FACTORY_META: FACTORY_META$
|
|
37599
|
+
FACTORY_META: FACTORY_META$r,
|
|
37559
37600
|
SharedSecretTokenProviderFactory: SharedSecretTokenProviderFactory,
|
|
37560
37601
|
default: SharedSecretTokenProviderFactory
|
|
37561
37602
|
});
|
|
@@ -37599,7 +37640,7 @@ function normalizeConfig$5(config) {
|
|
|
37599
37640
|
}
|
|
37600
37641
|
return normalized;
|
|
37601
37642
|
}
|
|
37602
|
-
const FACTORY_META$
|
|
37643
|
+
const FACTORY_META$q = {
|
|
37603
37644
|
base: TOKEN_VERIFIER_FACTORY_BASE_TYPE,
|
|
37604
37645
|
key: 'SharedSecretTokenVerifier',
|
|
37605
37646
|
};
|
|
@@ -37624,7 +37665,7 @@ class SharedSecretTokenVerifierFactory extends TokenVerifierFactory {
|
|
|
37624
37665
|
|
|
37625
37666
|
var sharedSecretTokenVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
37626
37667
|
__proto__: null,
|
|
37627
|
-
FACTORY_META: FACTORY_META$
|
|
37668
|
+
FACTORY_META: FACTORY_META$q,
|
|
37628
37669
|
SharedSecretTokenVerifierFactory: SharedSecretTokenVerifierFactory,
|
|
37629
37670
|
default: SharedSecretTokenVerifierFactory
|
|
37630
37671
|
});
|
|
@@ -37739,7 +37780,7 @@ function normalizeConfig$4(config) {
|
|
|
37739
37780
|
}
|
|
37740
37781
|
return options;
|
|
37741
37782
|
}
|
|
37742
|
-
const FACTORY_META$
|
|
37783
|
+
const FACTORY_META$p = {
|
|
37743
37784
|
base: TOKEN_PROVIDER_FACTORY_BASE_TYPE,
|
|
37744
37785
|
key: 'StaticTokenProvider',
|
|
37745
37786
|
};
|
|
@@ -37756,7 +37797,7 @@ class StaticTokenProviderFactory extends TokenProviderFactory {
|
|
|
37756
37797
|
|
|
37757
37798
|
var staticTokenProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37758
37799
|
__proto__: null,
|
|
37759
|
-
FACTORY_META: FACTORY_META$
|
|
37800
|
+
FACTORY_META: FACTORY_META$p,
|
|
37760
37801
|
StaticTokenProviderFactory: StaticTokenProviderFactory,
|
|
37761
37802
|
default: StaticTokenProviderFactory
|
|
37762
37803
|
});
|
|
@@ -37807,7 +37848,7 @@ class WebSocketSubprotocolAuthInjectionStrategy {
|
|
|
37807
37848
|
}
|
|
37808
37849
|
}
|
|
37809
37850
|
|
|
37810
|
-
const FACTORY_META$
|
|
37851
|
+
const FACTORY_META$o = {
|
|
37811
37852
|
base: AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE,
|
|
37812
37853
|
key: 'WebSocketSubprotocolAuth',
|
|
37813
37854
|
};
|
|
@@ -37849,7 +37890,7 @@ function normalizeConfig$3(config) {
|
|
|
37849
37890
|
|
|
37850
37891
|
var websocketSubprotocolAuthInjectionStrategyFactory = /*#__PURE__*/Object.freeze({
|
|
37851
37892
|
__proto__: null,
|
|
37852
|
-
FACTORY_META: FACTORY_META$
|
|
37893
|
+
FACTORY_META: FACTORY_META$o,
|
|
37853
37894
|
WebSocketSubprotocolAuthInjectionStrategyFactory: WebSocketSubprotocolAuthInjectionStrategyFactory,
|
|
37854
37895
|
default: WebSocketSubprotocolAuthInjectionStrategyFactory
|
|
37855
37896
|
});
|
|
@@ -37897,7 +37938,7 @@ class DevFixedKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
37897
37938
|
throw new Error('DevFixedKeyCredentialProvider requires keyHex or keyBase64');
|
|
37898
37939
|
}
|
|
37899
37940
|
}
|
|
37900
|
-
const FACTORY_META$
|
|
37941
|
+
const FACTORY_META$n = {
|
|
37901
37942
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
37902
37943
|
key: 'DevFixedKeyCredentialProvider',
|
|
37903
37944
|
};
|
|
@@ -37905,7 +37946,7 @@ const FACTORY_META$m = {
|
|
|
37905
37946
|
var devFixedKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37906
37947
|
__proto__: null,
|
|
37907
37948
|
DevFixedKeyCredentialProviderFactory: DevFixedKeyCredentialProviderFactory,
|
|
37908
|
-
FACTORY_META: FACTORY_META$
|
|
37949
|
+
FACTORY_META: FACTORY_META$n,
|
|
37909
37950
|
default: DevFixedKeyCredentialProviderFactory,
|
|
37910
37951
|
normalizeDevFixedConfig: normalizeDevFixedConfig
|
|
37911
37952
|
});
|
|
@@ -37921,14 +37962,14 @@ class NoneCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
37921
37962
|
return new NoneCredentialProvider();
|
|
37922
37963
|
}
|
|
37923
37964
|
}
|
|
37924
|
-
const FACTORY_META$
|
|
37965
|
+
const FACTORY_META$m = {
|
|
37925
37966
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
37926
37967
|
key: 'NoneCredentialProvider',
|
|
37927
37968
|
};
|
|
37928
37969
|
|
|
37929
37970
|
var noneCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37930
37971
|
__proto__: null,
|
|
37931
|
-
FACTORY_META: FACTORY_META$
|
|
37972
|
+
FACTORY_META: FACTORY_META$m,
|
|
37932
37973
|
NoneCredentialProviderFactory: NoneCredentialProviderFactory,
|
|
37933
37974
|
default: NoneCredentialProviderFactory
|
|
37934
37975
|
});
|
|
@@ -37966,14 +38007,14 @@ class SessionKeyCredentialProviderFactory extends CredentialProviderFactory {
|
|
|
37966
38007
|
return new SessionKeyCredentialProvider(resolved.length);
|
|
37967
38008
|
}
|
|
37968
38009
|
}
|
|
37969
|
-
const FACTORY_META$
|
|
38010
|
+
const FACTORY_META$l = {
|
|
37970
38011
|
base: CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE,
|
|
37971
38012
|
key: 'SessionKeyCredentialProvider',
|
|
37972
38013
|
};
|
|
37973
38014
|
|
|
37974
38015
|
var sessionKeyCredentialProviderFactory = /*#__PURE__*/Object.freeze({
|
|
37975
38016
|
__proto__: null,
|
|
37976
|
-
FACTORY_META: FACTORY_META$
|
|
38017
|
+
FACTORY_META: FACTORY_META$l,
|
|
37977
38018
|
SessionKeyCredentialProviderFactory: SessionKeyCredentialProviderFactory,
|
|
37978
38019
|
default: SessionKeyCredentialProviderFactory,
|
|
37979
38020
|
normalizeSessionKeyConfig: normalizeSessionKeyConfig
|
|
@@ -38011,9 +38052,10 @@ function normalizeDefaultSecurityManagerConfig(config) {
|
|
|
38011
38052
|
ensureAlias('keyValidator', 'key_validator');
|
|
38012
38053
|
ensureAlias('eventListeners', 'event_listeners');
|
|
38013
38054
|
ensureAlias('cryptoProvider', 'crypto_provider');
|
|
38055
|
+
ensureAlias('trustStoreProvider', 'trust_store_provider');
|
|
38014
38056
|
return normalized;
|
|
38015
38057
|
}
|
|
38016
|
-
const FACTORY_META$
|
|
38058
|
+
const FACTORY_META$k = {
|
|
38017
38059
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
38018
38060
|
key: 'DefaultSecurityManager',
|
|
38019
38061
|
};
|
|
@@ -38059,6 +38101,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38059
38101
|
const certificateManager = DefaultSecurityManagerFactory.extractInstance(config, 'certificateManager', 'certificate_manager');
|
|
38060
38102
|
const secureChannelManager = DefaultSecurityManagerFactory.extractInstance(config, 'secureChannelManager', 'secure_channel_manager');
|
|
38061
38103
|
const cryptoProvider = DefaultSecurityManagerFactory.extractInstance(config, 'cryptoProvider', 'crypto_provider');
|
|
38104
|
+
const trustStoreProvider = DefaultSecurityManagerFactory.extractInstance(config, 'trustStoreProvider', 'trust_store_provider');
|
|
38062
38105
|
const listenersSource = overrides?.eventListeners ??
|
|
38063
38106
|
config.eventListeners ??
|
|
38064
38107
|
config.event_listeners;
|
|
@@ -38078,10 +38121,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38078
38121
|
secureChannelManager,
|
|
38079
38122
|
eventListeners,
|
|
38080
38123
|
cryptoProvider: cryptoProvider ?? null,
|
|
38124
|
+
trustStoreProvider: trustStoreProvider ?? null,
|
|
38081
38125
|
};
|
|
38082
38126
|
}
|
|
38083
38127
|
static async buildSecurityManager(options) {
|
|
38084
|
-
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, } = options;
|
|
38128
|
+
let { config, createOptions, policy, envelopeSigner, envelopeVerifier, encryptionManager, keyStore, keyManager, keyValidator, authorizer, certificateManager, secureChannelManager, eventListeners, cryptoProvider, trustStoreProvider, } = options;
|
|
38085
38129
|
if (!keyStore) {
|
|
38086
38130
|
keyStore = await DefaultSecurityManagerFactory.getOrCreateKeyStore(config, createOptions ?? null);
|
|
38087
38131
|
}
|
|
@@ -38094,6 +38138,10 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38094
38138
|
if (!policy) {
|
|
38095
38139
|
throw new Error('DefaultSecurityManagerFactory could not resolve a SecurityPolicy');
|
|
38096
38140
|
}
|
|
38141
|
+
if (!trustStoreProvider) {
|
|
38142
|
+
trustStoreProvider =
|
|
38143
|
+
await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
38144
|
+
}
|
|
38097
38145
|
if (!keyManager) {
|
|
38098
38146
|
keyManager =
|
|
38099
38147
|
await DefaultSecurityManagerFactory.createKeyManagerFromConfig(config, policy, keyStore, createOptions ?? null);
|
|
@@ -38104,7 +38152,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38104
38152
|
}
|
|
38105
38153
|
if (!envelopeVerifier) {
|
|
38106
38154
|
envelopeVerifier =
|
|
38107
|
-
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager);
|
|
38155
|
+
await DefaultSecurityManagerFactory.createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider);
|
|
38108
38156
|
}
|
|
38109
38157
|
if (!encryptionManager || !secureChannelManager) {
|
|
38110
38158
|
const encryptionResult = await DefaultSecurityManagerFactory.createEncryptionManagerFromConfig(config, policy, keyManager, secureChannelManager, cryptoProvider ?? null);
|
|
@@ -38204,7 +38252,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38204
38252
|
throw error instanceof Error ? error : new Error(String(error));
|
|
38205
38253
|
}
|
|
38206
38254
|
}
|
|
38207
|
-
static async createEnvelopeVerifierFromConfig(config, policy, keyManager) {
|
|
38255
|
+
static async createEnvelopeVerifierFromConfig(config, policy, keyManager, trustStoreProvider) {
|
|
38208
38256
|
const verifierConfig = config.envelope_verifier ?? config.envelopeVerifier ?? null;
|
|
38209
38257
|
if (verifierConfig &&
|
|
38210
38258
|
DefaultSecurityManagerFactory.isConfigLike(verifierConfig)) {
|
|
@@ -38228,7 +38276,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38228
38276
|
}
|
|
38229
38277
|
const signing = policy.signing ?? null;
|
|
38230
38278
|
return await EnvelopeVerifierFactory.createEnvelopeVerifier(null, {
|
|
38231
|
-
factoryArgs: [keyManager, signing ?? null],
|
|
38279
|
+
factoryArgs: [keyManager, signing ?? null, { trustStoreProvider }],
|
|
38232
38280
|
});
|
|
38233
38281
|
}
|
|
38234
38282
|
catch (error) {
|
|
@@ -38469,11 +38517,11 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
38469
38517
|
var defaultSecurityManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38470
38518
|
__proto__: null,
|
|
38471
38519
|
DefaultSecurityManagerFactory: DefaultSecurityManagerFactory,
|
|
38472
|
-
FACTORY_META: FACTORY_META$
|
|
38520
|
+
FACTORY_META: FACTORY_META$k,
|
|
38473
38521
|
default: DefaultSecurityManagerFactory
|
|
38474
38522
|
});
|
|
38475
38523
|
|
|
38476
|
-
const FACTORY_META$
|
|
38524
|
+
const FACTORY_META$j = {
|
|
38477
38525
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
38478
38526
|
key: 'NoopEncryptionManager',
|
|
38479
38527
|
};
|
|
@@ -38530,7 +38578,7 @@ class NoopEncryptionManagerFactory extends EncryptionManagerFactory {
|
|
|
38530
38578
|
|
|
38531
38579
|
var noopEncryptionManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38532
38580
|
__proto__: null,
|
|
38533
|
-
FACTORY_META: FACTORY_META$
|
|
38581
|
+
FACTORY_META: FACTORY_META$j,
|
|
38534
38582
|
NoopEncryptionManagerFactory: NoopEncryptionManagerFactory,
|
|
38535
38583
|
default: NoopEncryptionManagerFactory
|
|
38536
38584
|
});
|
|
@@ -38602,7 +38650,7 @@ class NoopSecureChannelManager {
|
|
|
38602
38650
|
}
|
|
38603
38651
|
}
|
|
38604
38652
|
|
|
38605
|
-
const FACTORY_META$
|
|
38653
|
+
const FACTORY_META$i = {
|
|
38606
38654
|
base: SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE,
|
|
38607
38655
|
key: 'NoopSecureChannelManager',
|
|
38608
38656
|
};
|
|
@@ -38619,12 +38667,12 @@ class NoopSecureChannelManagerFactory extends SecureChannelManagerFactory {
|
|
|
38619
38667
|
|
|
38620
38668
|
var noopSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38621
38669
|
__proto__: null,
|
|
38622
|
-
FACTORY_META: FACTORY_META$
|
|
38670
|
+
FACTORY_META: FACTORY_META$i,
|
|
38623
38671
|
NoopSecureChannelManagerFactory: NoopSecureChannelManagerFactory,
|
|
38624
38672
|
default: NoopSecureChannelManagerFactory
|
|
38625
38673
|
});
|
|
38626
38674
|
|
|
38627
|
-
const FACTORY_META$
|
|
38675
|
+
const FACTORY_META$h = {
|
|
38628
38676
|
base: KEY_MANAGER_FACTORY_BASE_TYPE,
|
|
38629
38677
|
key: 'DefaultKeyManager',
|
|
38630
38678
|
};
|
|
@@ -38653,7 +38701,7 @@ class DefaultKeyManagerFactory extends KeyManagerFactory {
|
|
|
38653
38701
|
var defaultKeyManagerFactory = /*#__PURE__*/Object.freeze({
|
|
38654
38702
|
__proto__: null,
|
|
38655
38703
|
DefaultKeyManagerFactory: DefaultKeyManagerFactory,
|
|
38656
|
-
FACTORY_META: FACTORY_META$
|
|
38704
|
+
FACTORY_META: FACTORY_META$h,
|
|
38657
38705
|
default: DefaultKeyManagerFactory
|
|
38658
38706
|
});
|
|
38659
38707
|
|
|
@@ -38838,7 +38886,7 @@ class InMemoryKeyStore extends KeyStore {
|
|
|
38838
38886
|
}
|
|
38839
38887
|
registerDefaultKeyStoreFactory(() => new InMemoryKeyStore());
|
|
38840
38888
|
|
|
38841
|
-
const FACTORY_META$
|
|
38889
|
+
const FACTORY_META$g = {
|
|
38842
38890
|
base: KEY_STORE_FACTORY_BASE_TYPE,
|
|
38843
38891
|
key: 'InMemoryKeyStore',
|
|
38844
38892
|
};
|
|
@@ -38873,12 +38921,12 @@ class InMemoryKeyStoreFactory extends KeyStoreFactory {
|
|
|
38873
38921
|
|
|
38874
38922
|
var inMemoryKeyStoreFactory = /*#__PURE__*/Object.freeze({
|
|
38875
38923
|
__proto__: null,
|
|
38876
|
-
FACTORY_META: FACTORY_META$
|
|
38924
|
+
FACTORY_META: FACTORY_META$g,
|
|
38877
38925
|
InMemoryKeyStoreFactory: InMemoryKeyStoreFactory,
|
|
38878
38926
|
default: InMemoryKeyStoreFactory
|
|
38879
38927
|
});
|
|
38880
38928
|
|
|
38881
|
-
const FACTORY_META$
|
|
38929
|
+
const FACTORY_META$f = {
|
|
38882
38930
|
base: ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE,
|
|
38883
38931
|
key: 'NoopKeyValidator',
|
|
38884
38932
|
};
|
|
@@ -38896,12 +38944,12 @@ class NoopKeyValidatorFactory extends AttachmentKeyValidatorFactory {
|
|
|
38896
38944
|
|
|
38897
38945
|
var noopKeyValidatorFactory = /*#__PURE__*/Object.freeze({
|
|
38898
38946
|
__proto__: null,
|
|
38899
|
-
FACTORY_META: FACTORY_META$
|
|
38947
|
+
FACTORY_META: FACTORY_META$f,
|
|
38900
38948
|
NoopKeyValidatorFactory: NoopKeyValidatorFactory,
|
|
38901
38949
|
default: NoopKeyValidatorFactory
|
|
38902
38950
|
});
|
|
38903
38951
|
|
|
38904
|
-
const FACTORY_META$
|
|
38952
|
+
const FACTORY_META$e = {
|
|
38905
38953
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
38906
38954
|
key: 'DefaultSecurityPolicy',
|
|
38907
38955
|
};
|
|
@@ -38962,11 +39010,11 @@ function normalizeConfig$2(config) {
|
|
|
38962
39010
|
var defaultSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
38963
39011
|
__proto__: null,
|
|
38964
39012
|
DefaultSecurityPolicyFactory: DefaultSecurityPolicyFactory,
|
|
38965
|
-
FACTORY_META: FACTORY_META$
|
|
39013
|
+
FACTORY_META: FACTORY_META$e,
|
|
38966
39014
|
default: DefaultSecurityPolicyFactory
|
|
38967
39015
|
});
|
|
38968
39016
|
|
|
38969
|
-
const FACTORY_META$
|
|
39017
|
+
const FACTORY_META$d = {
|
|
38970
39018
|
base: SECURITY_POLICY_FACTORY_BASE_TYPE,
|
|
38971
39019
|
key: 'NoSecurityPolicy',
|
|
38972
39020
|
};
|
|
@@ -38994,7 +39042,7 @@ function normalizeConfig$1(config) {
|
|
|
38994
39042
|
|
|
38995
39043
|
var noSecurityPolicyFactory = /*#__PURE__*/Object.freeze({
|
|
38996
39044
|
__proto__: null,
|
|
38997
|
-
FACTORY_META: FACTORY_META$
|
|
39045
|
+
FACTORY_META: FACTORY_META$d,
|
|
38998
39046
|
NoSecurityPolicyFactory: NoSecurityPolicyFactory,
|
|
38999
39047
|
default: NoSecurityPolicyFactory
|
|
39000
39048
|
});
|
|
@@ -39009,7 +39057,7 @@ async function getEdDSAEnvelopeSignerModule() {
|
|
|
39009
39057
|
}
|
|
39010
39058
|
return eddsaEnvelopeSignerModulePromise;
|
|
39011
39059
|
}
|
|
39012
|
-
const FACTORY_META$
|
|
39060
|
+
const FACTORY_META$c = {
|
|
39013
39061
|
base: ENVELOPE_SIGNER_FACTORY_BASE_TYPE,
|
|
39014
39062
|
key: 'EdDSAEnvelopeSigner',
|
|
39015
39063
|
};
|
|
@@ -39038,7 +39086,7 @@ class EdDSAEnvelopeSignerFactory extends EnvelopeSignerFactory {
|
|
|
39038
39086
|
var eddsaEnvelopeSignerFactory = /*#__PURE__*/Object.freeze({
|
|
39039
39087
|
__proto__: null,
|
|
39040
39088
|
EdDSAEnvelopeSignerFactory: EdDSAEnvelopeSignerFactory,
|
|
39041
|
-
FACTORY_META: FACTORY_META$
|
|
39089
|
+
FACTORY_META: FACTORY_META$c,
|
|
39042
39090
|
default: EdDSAEnvelopeSignerFactory
|
|
39043
39091
|
});
|
|
39044
39092
|
|
|
@@ -39052,7 +39100,7 @@ async function getEdDSAEnvelopeVerifierModule() {
|
|
|
39052
39100
|
}
|
|
39053
39101
|
return eddsaEnvelopeVerifierModulePromise;
|
|
39054
39102
|
}
|
|
39055
|
-
const FACTORY_META$
|
|
39103
|
+
const FACTORY_META$b = {
|
|
39056
39104
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
39057
39105
|
key: 'EdDSAEnvelopeVerifier',
|
|
39058
39106
|
};
|
|
@@ -39078,10 +39126,35 @@ class EdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
39078
39126
|
var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
39079
39127
|
__proto__: null,
|
|
39080
39128
|
EdDSAEnvelopeVerifierFactory: EdDSAEnvelopeVerifierFactory,
|
|
39081
|
-
FACTORY_META: FACTORY_META$
|
|
39129
|
+
FACTORY_META: FACTORY_META$b,
|
|
39082
39130
|
default: EdDSAEnvelopeVerifierFactory
|
|
39083
39131
|
});
|
|
39084
39132
|
|
|
39133
|
+
const FACTORY_META$a = {
|
|
39134
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
39135
|
+
key: "NoopTrustStoreProvider",
|
|
39136
|
+
isDefault: true,
|
|
39137
|
+
priority: 10,
|
|
39138
|
+
};
|
|
39139
|
+
class NoopTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
39140
|
+
constructor() {
|
|
39141
|
+
super(...arguments);
|
|
39142
|
+
this.type = "NoopTrustStoreProvider";
|
|
39143
|
+
this.isDefault = true;
|
|
39144
|
+
this.priority = 10;
|
|
39145
|
+
}
|
|
39146
|
+
async create(_config, ..._factoryArgs) {
|
|
39147
|
+
return new NoopTrustStoreProvider();
|
|
39148
|
+
}
|
|
39149
|
+
}
|
|
39150
|
+
|
|
39151
|
+
var noopTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
39152
|
+
__proto__: null,
|
|
39153
|
+
FACTORY_META: FACTORY_META$a,
|
|
39154
|
+
NoopTrustStoreProviderFactory: NoopTrustStoreProviderFactory,
|
|
39155
|
+
default: NoopTrustStoreProviderFactory
|
|
39156
|
+
});
|
|
39157
|
+
|
|
39085
39158
|
const FACTORY_META$9 = {
|
|
39086
39159
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
39087
39160
|
key: 'CapabilityAwareRoutingPolicy',
|
|
@@ -41965,4 +42038,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
|
|
|
41965
42038
|
WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
|
|
41966
42039
|
});
|
|
41967
42040
|
|
|
41968
|
-
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$
|
|
42041
|
+
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$_ as DEFAULT_WELCOME_FACTORY_META, DefaultCryptoProvider, DefaultHttpServer, DefaultKeyManager, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM$2 as ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$2 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$$ as FACTORY_META, FAME_FABRIC_FACTORY_BASE_TYPE, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, HttpListener, HttpStatelessConnector, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, InPageListener, InProcessFameFabric, InProcessFameFabricFactory, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MemoryMetricsEmitter, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, QueueFullError, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, SQLiteKeyValueStore, SQLiteStorageProvider, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_LISTENER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenVerifierFactory, TransportListener, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_CURVES_BY_KTY, VALID_KEY_USES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketListener, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createJwksRouter, createLogicalUri, createNodeDeliveryContext, createApp as createOAuth2ServerApp, createOAuth2TokenRouter, createOpenIDConfigurationRouter, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCurrentEnvelope, getFameRoot, getHttpListenerInstance, getInPageListenerInstance, getKeyProvider, getKeyStore, getLogger, getWebsocketListenerInstance, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isInPageConnectionGrant, isNodeLike, isPlainObject$3 as isPlainObject, isPoolAddress, isPoolLogical, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeExtendedFameConfig, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, main as runOAuth2Server, safeColor, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|