@naylence/runtime 0.4.5 → 0.4.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +179 -127
- package/dist/browser/index.mjs +177 -129
- package/dist/cjs/naylence/fame/delivery/delivery-profile-factory.js +5 -9
- package/dist/cjs/naylence/fame/index.js +1 -0
- package/dist/cjs/naylence/fame/node/admission/admission-profile-factory.js +15 -19
- package/dist/cjs/naylence/fame/node/node-identity-policy-profile-factory.js +6 -10
- package/dist/cjs/naylence/fame/profile/index.js +8 -0
- package/dist/cjs/naylence/fame/profile/profile-registry.js +57 -0
- package/dist/cjs/naylence/fame/security/auth/authorization-profile-factory.js +64 -30
- package/dist/cjs/naylence/fame/security/default-security-manager-factory.js +4 -3
- package/dist/cjs/naylence/fame/security/node-security-profile-factory.js +9 -13
- package/dist/cjs/naylence/fame/sentinel/load-balancing/load-balancing-profile-factory.js +10 -13
- package/dist/cjs/naylence/fame/sentinel/routing-profile-factory.js +7 -8
- package/dist/cjs/naylence/fame/storage/storage-profile-factory.js +8 -12
- package/dist/cjs/naylence/fame/telemetry/trace-emitter-profile-factory.js +5 -9
- package/dist/cjs/runtime-isomorphic.js +1 -0
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/delivery/delivery-profile-factory.js +5 -9
- package/dist/esm/naylence/fame/index.js +1 -0
- package/dist/esm/naylence/fame/node/admission/admission-profile-factory.js +15 -19
- package/dist/esm/naylence/fame/node/node-identity-policy-profile-factory.js +6 -10
- package/dist/esm/naylence/fame/profile/index.js +1 -0
- package/dist/esm/naylence/fame/profile/profile-registry.js +51 -0
- package/dist/esm/naylence/fame/security/auth/authorization-profile-factory.js +65 -31
- package/dist/esm/naylence/fame/security/default-security-manager-factory.js +4 -3
- package/dist/esm/naylence/fame/security/node-security-profile-factory.js +9 -13
- package/dist/esm/naylence/fame/sentinel/load-balancing/load-balancing-profile-factory.js +10 -13
- package/dist/esm/naylence/fame/sentinel/routing-profile-factory.js +7 -8
- package/dist/esm/naylence/fame/storage/storage-profile-factory.js +8 -12
- package/dist/esm/naylence/fame/telemetry/trace-emitter-profile-factory.js +5 -9
- package/dist/esm/runtime-isomorphic.js +1 -0
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +179 -127
- package/dist/node/index.mjs +177 -129
- package/dist/node/node.cjs +182 -128
- package/dist/node/node.mjs +180 -130
- package/dist/types/naylence/fame/index.d.ts +1 -0
- package/dist/types/naylence/fame/profile/index.d.ts +2 -0
- package/dist/types/naylence/fame/profile/profile-registry.d.ts +9 -0
- package/dist/types/runtime-isomorphic.d.ts +1 -0
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/index.mjs
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { parseAddressComponents, FlowFlags, FameAddress, DEFAULT_POLLING_TIMEOUT_MS, extractEnvelopeAndContext, createChannelMessage, generateId, createFameEnvelope, parseAddress, formatAddress, formatAddressFromComponents, FameResponseType, localDeliveryContext, Binding, DeliveryOriginType, makeResponse, isFameMessageResponse, parseRequest, makeRequest, DEFAULT_INVOKE_TIMEOUT_MILLIS, parseResponse, ConnectorState, ConnectorStateUtils, FameFabric, isFameMessageService, isFameRPCService, FameServiceProxy, generateIdAsync, snakeToCamelObject, getDefaultFameConfigResolver, setDefaultFameConfigResolver, SigningMaterial, AuthorizationContextSchema, FameDeliveryContextSchema, SecurityContextSchema, withFabric, FameEnvelopeSchema, SINK_CAPABILITY, FameFabricFactory, serializeEnvelope, createAuthorizationContext, deserializeEnvelope, FameChannelMessage } from '@naylence/core';
|
|
2
2
|
export * from '@naylence/core';
|
|
3
3
|
import { z, ZodError } from 'zod';
|
|
4
|
-
import { AbstractResourceFactory, createResource as createResource$1, createDefaultResource, registerFactory, Expressions, ExtensionManager, ExpressionEvaluationPolicy, Registry,
|
|
4
|
+
import { AbstractResourceFactory, createResource as createResource$1, createDefaultResource, registerFactory, Expressions, ExtensionManager, ExpressionEvaluationPolicy, Registry, configValidator } from '@naylence/factory';
|
|
5
5
|
import { sign, hashes, verify } from '@noble/ed25519';
|
|
6
6
|
import { sha256, sha512 } from '@noble/hashes/sha2.js';
|
|
7
7
|
import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
@@ -13,12 +13,12 @@ import fastify from 'fastify';
|
|
|
13
13
|
import websocketPlugin from '@fastify/websocket';
|
|
14
14
|
|
|
15
15
|
// This file is auto-generated during build - do not edit manually
|
|
16
|
-
// Generated from package.json version: 0.4.
|
|
16
|
+
// Generated from package.json version: 0.4.7
|
|
17
17
|
/**
|
|
18
18
|
* The package version, injected at build time.
|
|
19
19
|
* @internal
|
|
20
20
|
*/
|
|
21
|
-
const VERSION = '0.4.
|
|
21
|
+
const VERSION = '0.4.7';
|
|
22
22
|
|
|
23
23
|
/**
|
|
24
24
|
* Fame protocol specific error classes with WebSocket close codes and proper inheritance.
|
|
@@ -3022,6 +3022,58 @@ class InMemoryFanoutBroker extends TaskSpawner {
|
|
|
3022
3022
|
}
|
|
3023
3023
|
}
|
|
3024
3024
|
|
|
3025
|
+
const registry = new Map();
|
|
3026
|
+
function normalizeKey$1(value, label) {
|
|
3027
|
+
if (typeof value !== 'string') {
|
|
3028
|
+
throw new Error(`${label} must be a non-empty string`);
|
|
3029
|
+
}
|
|
3030
|
+
const trimmed = value.trim();
|
|
3031
|
+
if (!trimmed) {
|
|
3032
|
+
throw new Error(`${label} must be a non-empty string`);
|
|
3033
|
+
}
|
|
3034
|
+
return trimmed;
|
|
3035
|
+
}
|
|
3036
|
+
function cloneConfig(value) {
|
|
3037
|
+
return JSON.parse(JSON.stringify(value));
|
|
3038
|
+
}
|
|
3039
|
+
function registerProfile(baseType, name, config, options) {
|
|
3040
|
+
const normalizedBase = normalizeKey$1(baseType, 'baseType');
|
|
3041
|
+
const normalizedName = normalizeKey$1(name, 'profile name');
|
|
3042
|
+
if (!config || typeof config !== 'object' || Array.isArray(config)) {
|
|
3043
|
+
throw new Error(`Profile '${normalizedName}' config must be an object`);
|
|
3044
|
+
}
|
|
3045
|
+
const profiles = registry.get(normalizedBase) ?? new Map();
|
|
3046
|
+
if (profiles.has(normalizedName) && options?.allowOverride !== true) {
|
|
3047
|
+
const sourceLabel = options?.source ? ` (${options.source})` : '';
|
|
3048
|
+
throw new Error(`Profile '${normalizedName}' already registered for ${normalizedBase}${sourceLabel}`);
|
|
3049
|
+
}
|
|
3050
|
+
profiles.set(normalizedName, config);
|
|
3051
|
+
registry.set(normalizedBase, profiles);
|
|
3052
|
+
}
|
|
3053
|
+
function getProfile(baseType, name) {
|
|
3054
|
+
const normalizedBase = normalizeKey$1(baseType, 'baseType');
|
|
3055
|
+
const normalizedName = normalizeKey$1(name, 'profile name');
|
|
3056
|
+
const profiles = registry.get(normalizedBase);
|
|
3057
|
+
if (!profiles) {
|
|
3058
|
+
return null;
|
|
3059
|
+
}
|
|
3060
|
+
const profile = profiles.get(normalizedName);
|
|
3061
|
+
return profile ? cloneConfig(profile) : null;
|
|
3062
|
+
}
|
|
3063
|
+
function listProfiles(baseType) {
|
|
3064
|
+
const normalizedBase = normalizeKey$1(baseType, 'baseType');
|
|
3065
|
+
const profiles = registry.get(normalizedBase);
|
|
3066
|
+
return profiles ? Array.from(profiles.keys()) : [];
|
|
3067
|
+
}
|
|
3068
|
+
function clearProfiles(baseType) {
|
|
3069
|
+
if (!baseType) {
|
|
3070
|
+
registry.clear();
|
|
3071
|
+
return;
|
|
3072
|
+
}
|
|
3073
|
+
const normalizedBase = normalizeKey$1(baseType, 'baseType');
|
|
3074
|
+
registry.delete(normalizedBase);
|
|
3075
|
+
}
|
|
3076
|
+
|
|
3025
3077
|
class InMemoryKeyValueStore {
|
|
3026
3078
|
constructor() {
|
|
3027
3079
|
this.store = new Map();
|
|
@@ -3663,15 +3715,8 @@ const INDEXEDDB_PROFILE_CONFIG = {
|
|
|
3663
3715
|
({
|
|
3664
3716
|
dbDirectory: Expressions.env(ENV_VAR_STORAGE_DB_DIRECTORY, './data/sqlite'),
|
|
3665
3717
|
masterKey: Expressions.env(ENV_VAR_STORAGE_MASTER_KEY)});
|
|
3666
|
-
|
|
3667
|
-
|
|
3668
|
-
[PROFILE_NAME_MEMORY]: MEMORY_PROFILE_CONFIG,
|
|
3669
|
-
[PROFILE_NAME_INDEXEDDB]: INDEXEDDB_PROFILE_CONFIG,
|
|
3670
|
-
};
|
|
3671
|
-
// Extended profile map - can be augmented by Node.js environment
|
|
3672
|
-
const PROFILE_MAP$7 = {
|
|
3673
|
-
...BASE_PROFILE_MAP,
|
|
3674
|
-
};
|
|
3718
|
+
registerProfile(STORAGE_PROVIDER_FACTORY_BASE_TYPE, PROFILE_NAME_MEMORY, MEMORY_PROFILE_CONFIG, { source: 'storage-profile-factory' });
|
|
3719
|
+
registerProfile(STORAGE_PROVIDER_FACTORY_BASE_TYPE, PROFILE_NAME_INDEXEDDB, INDEXEDDB_PROFILE_CONFIG, { source: 'storage-profile-factory' });
|
|
3675
3720
|
class StorageProfileFactory extends StorageProviderFactory {
|
|
3676
3721
|
constructor() {
|
|
3677
3722
|
super(...arguments);
|
|
@@ -3684,9 +3729,9 @@ class StorageProfileFactory extends StorageProviderFactory {
|
|
|
3684
3729
|
type: 'StorageProfile',
|
|
3685
3730
|
});
|
|
3686
3731
|
const profileName = (parsed.profile ?? PROFILE_NAME_MEMORY).toLowerCase();
|
|
3687
|
-
const profileConfig =
|
|
3732
|
+
const profileConfig = getProfile(STORAGE_PROVIDER_FACTORY_BASE_TYPE, profileName);
|
|
3688
3733
|
if (!profileConfig) {
|
|
3689
|
-
throw new Error(`Unknown storage profile '${profileName}'. Supported profiles: ${
|
|
3734
|
+
throw new Error(`Unknown storage profile '${profileName}'. Supported profiles: ${listProfiles(STORAGE_PROVIDER_FACTORY_BASE_TYPE).join(', ')}`);
|
|
3690
3735
|
}
|
|
3691
3736
|
const createOptions = {
|
|
3692
3737
|
...options,
|
|
@@ -16079,11 +16124,9 @@ const DEFAULT_PROFILE$1 = {
|
|
|
16079
16124
|
const TOKEN_SUBJECT_PROFILE = {
|
|
16080
16125
|
type: 'TokenSubjectNodeIdentityPolicy',
|
|
16081
16126
|
};
|
|
16082
|
-
|
|
16083
|
-
|
|
16084
|
-
|
|
16085
|
-
[PROFILE_NAME_TOKEN_SUBJECT_ALIAS]: TOKEN_SUBJECT_PROFILE,
|
|
16086
|
-
};
|
|
16127
|
+
registerProfile(NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE, PROFILE_NAME_DEFAULT$1, DEFAULT_PROFILE$1, { source: 'node-identity-policy-profile-factory' });
|
|
16128
|
+
registerProfile(NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE, PROFILE_NAME_TOKEN_SUBJECT, TOKEN_SUBJECT_PROFILE, { source: 'node-identity-policy-profile-factory' });
|
|
16129
|
+
registerProfile(NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE, PROFILE_NAME_TOKEN_SUBJECT_ALIAS, TOKEN_SUBJECT_PROFILE, { source: 'node-identity-policy-profile-factory' });
|
|
16087
16130
|
const FACTORY_META$19 = {
|
|
16088
16131
|
base: NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE,
|
|
16089
16132
|
key: 'NodeIdentityPolicyProfile',
|
|
@@ -16120,14 +16163,11 @@ function normalizeConfig$x(config) {
|
|
|
16120
16163
|
return { profile: normalizedProfile };
|
|
16121
16164
|
}
|
|
16122
16165
|
function resolveProfileConfig$5(profileName) {
|
|
16123
|
-
const profile =
|
|
16166
|
+
const profile = getProfile(NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE, profileName);
|
|
16124
16167
|
if (!profile) {
|
|
16125
16168
|
throw new Error(`Unknown node identity policy profile: ${profileName}`);
|
|
16126
16169
|
}
|
|
16127
|
-
return
|
|
16128
|
-
}
|
|
16129
|
-
function deepClone$5(value) {
|
|
16130
|
-
return JSON.parse(JSON.stringify(value));
|
|
16170
|
+
return profile;
|
|
16131
16171
|
}
|
|
16132
16172
|
|
|
16133
16173
|
var nodeIdentityPolicyProfileFactory = /*#__PURE__*/Object.freeze({
|
|
@@ -21827,14 +21867,13 @@ const ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE$1 = 'FAME_JWT_REVERSE_AUTH_AUDIENCE';
|
|
|
21827
21867
|
const ENV_VAR_HMAC_SECRET$1 = 'FAME_HMAC_SECRET';
|
|
21828
21868
|
const DEFAULT_REVERSE_AUTH_ISSUER = 'reverse-auth.naylence.ai';
|
|
21829
21869
|
const DEFAULT_REVERSE_AUTH_AUDIENCE = 'dev.naylence.ai';
|
|
21830
|
-
const DEFAULT_VERIFIER_CONFIG = {
|
|
21831
|
-
type: 'JWKSJWTTokenVerifier',
|
|
21832
|
-
jwks_url: Expressions.env(ENV_VAR_JWKS_URL$1),
|
|
21833
|
-
issuer: Expressions.env(ENV_VAR_JWT_TRUSTED_ISSUER$1),
|
|
21834
|
-
};
|
|
21835
21870
|
const DEFAULT_PROFILE = {
|
|
21836
21871
|
type: 'DefaultAuthorizer',
|
|
21837
|
-
verifier:
|
|
21872
|
+
verifier: {
|
|
21873
|
+
type: 'JWKSJWTTokenVerifier',
|
|
21874
|
+
jwks_url: Expressions.env(ENV_VAR_JWKS_URL$1),
|
|
21875
|
+
issuer: Expressions.env(ENV_VAR_JWT_TRUSTED_ISSUER$1),
|
|
21876
|
+
},
|
|
21838
21877
|
};
|
|
21839
21878
|
const OAUTH2_PROFILE = {
|
|
21840
21879
|
type: 'OAuth2Authorizer',
|
|
@@ -21879,6 +21918,11 @@ const OAUTH2_CALLBACK_PROFILE = {
|
|
|
21879
21918
|
const NOOP_PROFILE$2 = {
|
|
21880
21919
|
type: 'NoopAuthorizer',
|
|
21881
21920
|
};
|
|
21921
|
+
const DEFAULT_VERIFIER_CONFIG = {
|
|
21922
|
+
type: 'JWKSJWTTokenVerifier',
|
|
21923
|
+
jwks_url: Expressions.env(ENV_VAR_JWKS_URL$1),
|
|
21924
|
+
issuer: Expressions.env(ENV_VAR_JWT_TRUSTED_ISSUER$1),
|
|
21925
|
+
};
|
|
21882
21926
|
const DEFAULT_POLICY_SOURCE = {
|
|
21883
21927
|
type: 'LocalFileAuthorizationPolicySource',
|
|
21884
21928
|
path: Expressions.env(ENV_VAR_AUTH_POLICY_PATH, './auth-policy.yaml'),
|
|
@@ -21889,14 +21933,12 @@ const POLICY_LOCALFILE_PROFILE = {
|
|
|
21889
21933
|
verifier: DEFAULT_VERIFIER_CONFIG,
|
|
21890
21934
|
policySource: DEFAULT_POLICY_SOURCE,
|
|
21891
21935
|
};
|
|
21892
|
-
|
|
21893
|
-
|
|
21894
|
-
|
|
21895
|
-
|
|
21896
|
-
|
|
21897
|
-
|
|
21898
|
-
[PROFILE_NAME_NOOP$2]: NOOP_PROFILE$2,
|
|
21899
|
-
};
|
|
21936
|
+
registerProfile(AUTHORIZER_FACTORY_BASE_TYPE, PROFILE_NAME_DEFAULT, DEFAULT_PROFILE, { source: 'authorization-profile-factory' });
|
|
21937
|
+
registerProfile(AUTHORIZER_FACTORY_BASE_TYPE, PROFILE_NAME_OAUTH2, OAUTH2_PROFILE, { source: 'authorization-profile-factory' });
|
|
21938
|
+
registerProfile(AUTHORIZER_FACTORY_BASE_TYPE, PROFILE_NAME_OAUTH2_GATED, OAUTH2_GATED_PROFILE, { source: 'authorization-profile-factory' });
|
|
21939
|
+
registerProfile(AUTHORIZER_FACTORY_BASE_TYPE, PROFILE_NAME_OAUTH2_CALLBACK, OAUTH2_CALLBACK_PROFILE, { source: 'authorization-profile-factory' });
|
|
21940
|
+
registerProfile(AUTHORIZER_FACTORY_BASE_TYPE, PROFILE_NAME_POLICY_LOCALFILE, POLICY_LOCALFILE_PROFILE, { source: 'authorization-profile-factory' });
|
|
21941
|
+
registerProfile(AUTHORIZER_FACTORY_BASE_TYPE, PROFILE_NAME_NOOP$2, NOOP_PROFILE$2, { source: 'authorization-profile-factory' });
|
|
21900
21942
|
const PROFILE_ALIASES$1 = {
|
|
21901
21943
|
jwt: PROFILE_NAME_DEFAULT,
|
|
21902
21944
|
jwks: PROFILE_NAME_DEFAULT,
|
|
@@ -21930,13 +21972,55 @@ class AuthorizationProfileFactory extends AuthorizerFactory {
|
|
|
21930
21972
|
logger$K.debug('enabling_authorization_profile', {
|
|
21931
21973
|
profile: normalized.profile,
|
|
21932
21974
|
});
|
|
21933
|
-
|
|
21975
|
+
// Extract CreateResourceOptions from factoryArgs - it's typically the last object with env/config/variables
|
|
21976
|
+
const createOptions = extractCreateResourceOptions(factoryArgs);
|
|
21977
|
+
// Only evaluate expressions if we have env/config/variables available
|
|
21978
|
+
let evaluatedConfig = profileConfig;
|
|
21979
|
+
const hasContext = createOptions.env || createOptions.config || createOptions.variables;
|
|
21980
|
+
if (hasContext) {
|
|
21981
|
+
// Build validation context from createOptions to evaluate expressions
|
|
21982
|
+
const validationContext = {
|
|
21983
|
+
env: createOptions.env,
|
|
21984
|
+
config: createOptions.config,
|
|
21985
|
+
variables: createOptions.variables,
|
|
21986
|
+
allowUnknownProperties: true,
|
|
21987
|
+
};
|
|
21988
|
+
// Evaluate expressions in the profile config
|
|
21989
|
+
const validationResult = configValidator.validate(profileConfig, validationContext);
|
|
21990
|
+
if (!validationResult.valid) {
|
|
21991
|
+
const errorMessages = validationResult.errors
|
|
21992
|
+
.map((error) => `${error.path || 'root'}: ${error.message}`)
|
|
21993
|
+
.join('; ');
|
|
21994
|
+
throw new Error(`Failed to evaluate authorization profile configuration: ${errorMessages}`);
|
|
21995
|
+
}
|
|
21996
|
+
evaluatedConfig = validationResult.config ?? profileConfig;
|
|
21997
|
+
}
|
|
21998
|
+
const authorizer = await AuthorizerFactory.createAuthorizer(evaluatedConfig, hasContext ? { validate: false } : { factoryArgs } // Pass factoryArgs if no validation was done
|
|
21999
|
+
);
|
|
21934
22000
|
if (!authorizer) {
|
|
21935
22001
|
throw new Error(`Failed to create authorizer for profile: ${normalized.profile}`);
|
|
21936
22002
|
}
|
|
21937
22003
|
return authorizer;
|
|
21938
22004
|
}
|
|
21939
22005
|
}
|
|
22006
|
+
/**
|
|
22007
|
+
* Extracts CreateResourceOptions from factoryArgs.
|
|
22008
|
+
* The factory system passes CreateResourceOptions as an object in factoryArgs.
|
|
22009
|
+
*/
|
|
22010
|
+
function extractCreateResourceOptions(factoryArgs) {
|
|
22011
|
+
// Find the last object argument that looks like CreateResourceOptions
|
|
22012
|
+
for (let i = factoryArgs.length - 1; i >= 0; i--) {
|
|
22013
|
+
const arg = factoryArgs[i];
|
|
22014
|
+
if (arg && typeof arg === 'object' && !Array.isArray(arg)) {
|
|
22015
|
+
const candidate = arg;
|
|
22016
|
+
// Check if it has typical CreateResourceOptions properties
|
|
22017
|
+
if ('env' in candidate || 'config' in candidate || 'variables' in candidate || 'factoryArgs' in candidate) {
|
|
22018
|
+
return candidate;
|
|
22019
|
+
}
|
|
22020
|
+
}
|
|
22021
|
+
}
|
|
22022
|
+
return {};
|
|
22023
|
+
}
|
|
21940
22024
|
function normalizeConfig$w(config) {
|
|
21941
22025
|
if (!config) {
|
|
21942
22026
|
return { profile: PROFILE_NAME_OAUTH2 };
|
|
@@ -21948,21 +22032,13 @@ function normalizeConfig$w(config) {
|
|
|
21948
22032
|
return { profile: canonicalProfile };
|
|
21949
22033
|
}
|
|
21950
22034
|
function resolveProfileName$2(candidate) {
|
|
21951
|
-
|
|
21952
|
-
if (direct && ExpressionEvaluator.isExpression(direct)) {
|
|
21953
|
-
const evaluated = ExpressionEvaluator.evaluate(direct);
|
|
21954
|
-
direct = coerceProfileString$2(evaluated);
|
|
21955
|
-
}
|
|
22035
|
+
const direct = coerceProfileString$2(candidate.profile);
|
|
21956
22036
|
if (direct) {
|
|
21957
22037
|
return direct;
|
|
21958
22038
|
}
|
|
21959
22039
|
const legacyKeys = ['profile_name', 'profileName'];
|
|
21960
22040
|
for (const legacyKey of legacyKeys) {
|
|
21961
|
-
|
|
21962
|
-
if (legacyValue && ExpressionEvaluator.isExpression(legacyValue)) {
|
|
21963
|
-
const evaluated = ExpressionEvaluator.evaluate(legacyValue);
|
|
21964
|
-
legacyValue = coerceProfileString$2(evaluated);
|
|
21965
|
-
}
|
|
22041
|
+
const legacyValue = coerceProfileString$2(candidate[legacyKey]);
|
|
21966
22042
|
if (legacyValue) {
|
|
21967
22043
|
return legacyValue;
|
|
21968
22044
|
}
|
|
@@ -21981,14 +22057,11 @@ function canonicalizeProfileName$1(value) {
|
|
|
21981
22057
|
return PROFILE_ALIASES$1[normalized] ?? normalized;
|
|
21982
22058
|
}
|
|
21983
22059
|
function resolveProfileConfig$4(profileName) {
|
|
21984
|
-
const profile =
|
|
22060
|
+
const profile = getProfile(AUTHORIZER_FACTORY_BASE_TYPE, profileName);
|
|
21985
22061
|
if (!profile) {
|
|
21986
22062
|
throw new Error(`Unknown authorization profile: ${profileName}`);
|
|
21987
22063
|
}
|
|
21988
|
-
return
|
|
21989
|
-
}
|
|
21990
|
-
function deepClone$4(value) {
|
|
21991
|
-
return JSON.parse(JSON.stringify(value));
|
|
22064
|
+
return profile;
|
|
21992
22065
|
}
|
|
21993
22066
|
|
|
21994
22067
|
var authorizationProfileFactory = /*#__PURE__*/Object.freeze({
|
|
@@ -29792,14 +29865,12 @@ const OPEN_PROFILE$1 = {
|
|
|
29792
29865
|
profile: Expressions.env(ENV_VAR_AUTHORIZATION_PROFILE, 'noop'),
|
|
29793
29866
|
},
|
|
29794
29867
|
};
|
|
29795
|
-
|
|
29796
|
-
|
|
29797
|
-
|
|
29798
|
-
|
|
29799
|
-
|
|
29800
|
-
|
|
29801
|
-
[PROFILE_NAME_OPEN$1]: OPEN_PROFILE$1,
|
|
29802
|
-
};
|
|
29868
|
+
registerProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, PROFILE_NAME_OVERLAY, OVERLAY_PROFILE, { source: 'node-security-profile-factory' });
|
|
29869
|
+
registerProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, PROFILE_NAME_OVERLAY_CALLBACK, OVERLAY_CALLBACK_PROFILE, { source: 'node-security-profile-factory' });
|
|
29870
|
+
registerProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, PROFILE_NAME_STRICT_OVERLAY, STRICT_OVERLAY_PROFILE, { source: 'node-security-profile-factory' });
|
|
29871
|
+
registerProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, PROFILE_NAME_GATED, GATED_PROFILE, { source: 'node-security-profile-factory' });
|
|
29872
|
+
registerProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, PROFILE_NAME_GATED_CALLBACK, GATED_CALLBACK_PROFILE, { source: 'node-security-profile-factory' });
|
|
29873
|
+
registerProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, PROFILE_NAME_OPEN$1, OPEN_PROFILE$1, { source: 'node-security-profile-factory' });
|
|
29803
29874
|
const FACTORY_META$13 = {
|
|
29804
29875
|
base: SECURITY_MANAGER_FACTORY_BASE_TYPE,
|
|
29805
29876
|
key: 'SecurityProfile',
|
|
@@ -29906,14 +29977,11 @@ function normalizeProfile(config) {
|
|
|
29906
29977
|
return value.toLowerCase();
|
|
29907
29978
|
}
|
|
29908
29979
|
function resolveProfileConfig$3(profileName) {
|
|
29909
|
-
const template =
|
|
29980
|
+
const template = getProfile(SECURITY_MANAGER_FACTORY_BASE_TYPE, profileName);
|
|
29910
29981
|
if (!template) {
|
|
29911
29982
|
throw new Error(`Unknown security profile: ${profileName}`);
|
|
29912
29983
|
}
|
|
29913
|
-
return
|
|
29914
|
-
}
|
|
29915
|
-
function deepClone$3(value) {
|
|
29916
|
-
return JSON.parse(JSON.stringify(value));
|
|
29984
|
+
return template;
|
|
29917
29985
|
}
|
|
29918
29986
|
|
|
29919
29987
|
var nodeSecurityProfileFactory = /*#__PURE__*/Object.freeze({
|
|
@@ -32501,10 +32569,8 @@ const AT_LEAST_ONCE_PROFILE = {
|
|
|
32501
32569
|
const AT_MOST_ONCE_PROFILE = {
|
|
32502
32570
|
type: 'AtMostOnceDeliveryPolicy',
|
|
32503
32571
|
};
|
|
32504
|
-
|
|
32505
|
-
|
|
32506
|
-
[PROFILE_NAME_AT_MOST_ONCE]: AT_MOST_ONCE_PROFILE,
|
|
32507
|
-
};
|
|
32572
|
+
registerProfile(DELIVERY_POLICY_FACTORY_BASE_TYPE, PROFILE_NAME_AT_LEAST_ONCE, AT_LEAST_ONCE_PROFILE, { source: 'delivery-profile-factory' });
|
|
32573
|
+
registerProfile(DELIVERY_POLICY_FACTORY_BASE_TYPE, PROFILE_NAME_AT_MOST_ONCE, AT_MOST_ONCE_PROFILE, { source: 'delivery-profile-factory' });
|
|
32508
32574
|
class DeliveryProfileFactory extends DeliveryPolicyFactory {
|
|
32509
32575
|
constructor() {
|
|
32510
32576
|
super(...arguments);
|
|
@@ -32553,14 +32619,11 @@ function coerceProfileString$1(value) {
|
|
|
32553
32619
|
return trimmed.length > 0 ? trimmed : null;
|
|
32554
32620
|
}
|
|
32555
32621
|
function resolveProfileConfig$2(profileName) {
|
|
32556
|
-
const profile =
|
|
32622
|
+
const profile = getProfile(DELIVERY_POLICY_FACTORY_BASE_TYPE, profileName);
|
|
32557
32623
|
if (!profile) {
|
|
32558
32624
|
throw new Error(`Unknown delivery profile: ${profileName}`);
|
|
32559
32625
|
}
|
|
32560
|
-
return
|
|
32561
|
-
}
|
|
32562
|
-
function deepClone$2(value) {
|
|
32563
|
-
return JSON.parse(JSON.stringify(value));
|
|
32626
|
+
return profile;
|
|
32564
32627
|
}
|
|
32565
32628
|
const FACTORY_META$S = {
|
|
32566
32629
|
base: DELIVERY_POLICY_FACTORY_BASE_TYPE,
|
|
@@ -32997,20 +33060,18 @@ const NOOP_PROFILE$1 = {
|
|
|
32997
33060
|
auto_accept_logicals: true,
|
|
32998
33061
|
autoAcceptLogicals: true,
|
|
32999
33062
|
};
|
|
33000
|
-
|
|
33001
|
-
|
|
33002
|
-
|
|
33003
|
-
|
|
33004
|
-
|
|
33005
|
-
|
|
33006
|
-
|
|
33007
|
-
|
|
33008
|
-
|
|
33009
|
-
|
|
33010
|
-
|
|
33011
|
-
|
|
33012
|
-
[PROFILE_NAME_NONE]: NOOP_PROFILE$1,
|
|
33013
|
-
};
|
|
33063
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_WELCOME, WELCOME_SERVICE_PROFILE, { source: 'admission-profile-factory' });
|
|
33064
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_WELCOME_PKCE, WELCOME_SERVICE_PKCE_PROFILE, { source: 'admission-profile-factory' });
|
|
33065
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_WELCOME_PKCE_ALIAS, WELCOME_SERVICE_PKCE_PROFILE, { source: 'admission-profile-factory' });
|
|
33066
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_DIRECT, DIRECT_PROFILE, { source: 'admission-profile-factory' });
|
|
33067
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_DIRECT_PKCE, DIRECT_PKCE_PROFILE, { source: 'admission-profile-factory' });
|
|
33068
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_DIRECT_PKCE_ALIAS, DIRECT_PKCE_PROFILE, { source: 'admission-profile-factory' });
|
|
33069
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_DIRECT_HTTP, DIRECT_HTTP_PROFILE, { source: 'admission-profile-factory' });
|
|
33070
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_DIRECT_INPAGE, DIRECT_INPAGE_PROFILE, { source: 'admission-profile-factory' });
|
|
33071
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_DIRECT_INPAGE_ALIAS, DIRECT_INPAGE_PROFILE, { source: 'admission-profile-factory' });
|
|
33072
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_OPEN, OPEN_PROFILE, { source: 'admission-profile-factory' });
|
|
33073
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_NOOP$1, NOOP_PROFILE$1, { source: 'admission-profile-factory' });
|
|
33074
|
+
registerProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, PROFILE_NAME_NONE, NOOP_PROFILE$1, { source: 'admission-profile-factory' });
|
|
33014
33075
|
const FACTORY_META$Q = {
|
|
33015
33076
|
base: ADMISSION_CLIENT_FACTORY_BASE_TYPE,
|
|
33016
33077
|
key: 'AdmissionProfile',
|
|
@@ -33047,14 +33108,11 @@ function normalizeConfig$p(config) {
|
|
|
33047
33108
|
return { profile: normalizedProfile };
|
|
33048
33109
|
}
|
|
33049
33110
|
function resolveProfileConfig$1(profileName) {
|
|
33050
|
-
const profile =
|
|
33111
|
+
const profile = getProfile(ADMISSION_CLIENT_FACTORY_BASE_TYPE, profileName);
|
|
33051
33112
|
if (!profile) {
|
|
33052
33113
|
throw new Error(`Unknown admission profile: ${profileName}`);
|
|
33053
33114
|
}
|
|
33054
|
-
return
|
|
33055
|
-
}
|
|
33056
|
-
function deepClone$1(value) {
|
|
33057
|
-
return JSON.parse(JSON.stringify(value));
|
|
33115
|
+
return profile;
|
|
33058
33116
|
}
|
|
33059
33117
|
|
|
33060
33118
|
var admissionProfileFactory = /*#__PURE__*/Object.freeze({
|
|
@@ -35964,7 +36022,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
35964
36022
|
}
|
|
35965
36023
|
if (!authorizer) {
|
|
35966
36024
|
authorizer =
|
|
35967
|
-
await DefaultSecurityManagerFactory.createAuthorizerFromConfig(config, policy);
|
|
36025
|
+
await DefaultSecurityManagerFactory.createAuthorizerFromConfig(config, policy, createOptions);
|
|
35968
36026
|
}
|
|
35969
36027
|
if (authorizer &&
|
|
35970
36028
|
eventListeners &&
|
|
@@ -36195,14 +36253,14 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
36195
36253
|
}
|
|
36196
36254
|
return null;
|
|
36197
36255
|
}
|
|
36198
|
-
static async createAuthorizerFromConfig(config, policy) {
|
|
36256
|
+
static async createAuthorizerFromConfig(config, policy, createOptions) {
|
|
36199
36257
|
let authorizerConfig = config.authorizer ?? null;
|
|
36200
36258
|
if (!authorizerConfig) {
|
|
36201
36259
|
authorizerConfig = config.authorizer_config ?? null;
|
|
36202
36260
|
}
|
|
36203
36261
|
if (authorizerConfig &&
|
|
36204
36262
|
DefaultSecurityManagerFactory.isConfigLike(authorizerConfig)) {
|
|
36205
|
-
return ((await AuthorizerFactory.createAuthorizer(authorizerConfig)) ?? null);
|
|
36263
|
+
return ((await AuthorizerFactory.createAuthorizer(authorizerConfig, createOptions ?? undefined)) ?? null);
|
|
36206
36264
|
}
|
|
36207
36265
|
try {
|
|
36208
36266
|
const requirements = policy.requirements?.();
|
|
@@ -36218,6 +36276,7 @@ class DefaultSecurityManagerFactory extends SecurityManagerFactory {
|
|
|
36218
36276
|
}
|
|
36219
36277
|
const tokenVerifier = new NoopTokenVerifier();
|
|
36220
36278
|
return ((await AuthorizerFactory.createAuthorizer(null, {
|
|
36279
|
+
...createOptions,
|
|
36221
36280
|
factoryArgs: [tokenVerifier],
|
|
36222
36281
|
})) ?? null);
|
|
36223
36282
|
}
|
|
@@ -37379,6 +37438,11 @@ const STICKY_HRW_PROFILE = {
|
|
|
37379
37438
|
const DEVELOPMENT_PROFILE$1 = {
|
|
37380
37439
|
type: 'RoundRobinLoadBalancingStrategy',
|
|
37381
37440
|
};
|
|
37441
|
+
registerProfile(LOAD_BALANCING_STRATEGY_FACTORY_BASE, PROFILE_NAME_RANDOM, RANDOM_PROFILE, { source: 'load-balancing-profile-factory' });
|
|
37442
|
+
registerProfile(LOAD_BALANCING_STRATEGY_FACTORY_BASE, PROFILE_NAME_ROUND_ROBIN, ROUND_ROBIN_PROFILE, { source: 'load-balancing-profile-factory' });
|
|
37443
|
+
registerProfile(LOAD_BALANCING_STRATEGY_FACTORY_BASE, PROFILE_NAME_HRW, HRW_PROFILE, { source: 'load-balancing-profile-factory' });
|
|
37444
|
+
registerProfile(LOAD_BALANCING_STRATEGY_FACTORY_BASE, PROFILE_NAME_STICKY_HRW, STICKY_HRW_PROFILE, { source: 'load-balancing-profile-factory' });
|
|
37445
|
+
registerProfile(LOAD_BALANCING_STRATEGY_FACTORY_BASE, PROFILE_NAME_DEVELOPMENT$1, DEVELOPMENT_PROFILE$1, { source: 'load-balancing-profile-factory' });
|
|
37382
37446
|
const FACTORY_META$7 = {
|
|
37383
37447
|
base: LOAD_BALANCING_STRATEGY_FACTORY_BASE,
|
|
37384
37448
|
key: 'LoadBalancingProfile',
|
|
@@ -37433,20 +37497,11 @@ class LoadBalancingProfileFactory extends LoadBalancingStrategyFactory {
|
|
|
37433
37497
|
return undefined;
|
|
37434
37498
|
}
|
|
37435
37499
|
resolveProfile(profile) {
|
|
37436
|
-
|
|
37437
|
-
|
|
37438
|
-
|
|
37439
|
-
case PROFILE_NAME_ROUND_ROBIN:
|
|
37440
|
-
return ROUND_ROBIN_PROFILE;
|
|
37441
|
-
case PROFILE_NAME_HRW:
|
|
37442
|
-
return HRW_PROFILE;
|
|
37443
|
-
case PROFILE_NAME_STICKY_HRW:
|
|
37444
|
-
return STICKY_HRW_PROFILE;
|
|
37445
|
-
case PROFILE_NAME_DEVELOPMENT$1:
|
|
37446
|
-
return DEVELOPMENT_PROFILE$1;
|
|
37447
|
-
default:
|
|
37448
|
-
throw new Error(`Unknown load balancing profile: ${profile}`);
|
|
37500
|
+
const strategyConfig = getProfile(LOAD_BALANCING_STRATEGY_FACTORY_BASE, profile);
|
|
37501
|
+
if (!strategyConfig) {
|
|
37502
|
+
throw new Error(`Unknown load balancing profile: ${profile}`);
|
|
37449
37503
|
}
|
|
37504
|
+
return strategyConfig;
|
|
37450
37505
|
}
|
|
37451
37506
|
}
|
|
37452
37507
|
|
|
@@ -37615,13 +37670,11 @@ const HYBRID_ONLY_PROFILE = {
|
|
|
37615
37670
|
type: 'HybridPathRoutingPolicy',
|
|
37616
37671
|
loadBalancingStrategy: { type: 'HRWLoadBalancingStrategy' },
|
|
37617
37672
|
};
|
|
37618
|
-
|
|
37619
|
-
|
|
37620
|
-
|
|
37621
|
-
|
|
37622
|
-
|
|
37623
|
-
[PROFILE_NAME_HYBRID_ONLY]: HYBRID_ONLY_PROFILE,
|
|
37624
|
-
};
|
|
37673
|
+
registerProfile(ROUTING_POLICY_FACTORY_BASE, PROFILE_NAME_DEVELOPMENT, DEVELOPMENT_PROFILE, { source: 'routing-profile-factory' });
|
|
37674
|
+
registerProfile(ROUTING_POLICY_FACTORY_BASE, PROFILE_NAME_PRODUCTION, PRODUCTION_PROFILE, { source: 'routing-profile-factory' });
|
|
37675
|
+
registerProfile(ROUTING_POLICY_FACTORY_BASE, PROFILE_NAME_BASIC, BASIC_PROFILE, { source: 'routing-profile-factory' });
|
|
37676
|
+
registerProfile(ROUTING_POLICY_FACTORY_BASE, PROFILE_NAME_CAPABILITY_AWARE, CAPABILITY_AWARE_PROFILE, { source: 'routing-profile-factory' });
|
|
37677
|
+
registerProfile(ROUTING_POLICY_FACTORY_BASE, PROFILE_NAME_HYBRID_ONLY, HYBRID_ONLY_PROFILE, { source: 'routing-profile-factory' });
|
|
37625
37678
|
const FACTORY_META$3 = {
|
|
37626
37679
|
base: ROUTING_POLICY_FACTORY_BASE,
|
|
37627
37680
|
key: 'RoutingProfile',
|
|
@@ -37676,7 +37729,7 @@ class RoutingProfileFactory extends RoutingPolicyFactory {
|
|
|
37676
37729
|
return undefined;
|
|
37677
37730
|
}
|
|
37678
37731
|
getProfileConfig(profile) {
|
|
37679
|
-
const routingConfig =
|
|
37732
|
+
const routingConfig = getProfile(ROUTING_POLICY_FACTORY_BASE, profile);
|
|
37680
37733
|
if (!routingConfig) {
|
|
37681
37734
|
throw new Error('Unknown routing profile');
|
|
37682
37735
|
}
|
|
@@ -38226,10 +38279,8 @@ const OPEN_TELEMETRY_PROFILE = {
|
|
|
38226
38279
|
serviceName: Expressions.env(ENV_VAR_TELEMETRY_SERVICE_NAME, 'naylence-service'),
|
|
38227
38280
|
headers: {},
|
|
38228
38281
|
};
|
|
38229
|
-
|
|
38230
|
-
|
|
38231
|
-
[PROFILE_NAME_OPEN_TELEMETRY]: OPEN_TELEMETRY_PROFILE,
|
|
38232
|
-
};
|
|
38282
|
+
registerProfile(TRACE_EMITTER_FACTORY_BASE_TYPE, PROFILE_NAME_NOOP, NOOP_PROFILE, { source: 'trace-emitter-profile-factory' });
|
|
38283
|
+
registerProfile(TRACE_EMITTER_FACTORY_BASE_TYPE, PROFILE_NAME_OPEN_TELEMETRY, OPEN_TELEMETRY_PROFILE, { source: 'trace-emitter-profile-factory' });
|
|
38233
38284
|
const FACTORY_META = {
|
|
38234
38285
|
base: TRACE_EMITTER_FACTORY_BASE_TYPE,
|
|
38235
38286
|
key: 'TraceEmitterProfile',
|
|
@@ -38298,14 +38349,11 @@ function canonicalizeProfileName(value) {
|
|
|
38298
38349
|
return PROFILE_ALIASES[normalized] ?? normalized;
|
|
38299
38350
|
}
|
|
38300
38351
|
function resolveProfileConfig(profileName) {
|
|
38301
|
-
const profile =
|
|
38352
|
+
const profile = getProfile(TRACE_EMITTER_FACTORY_BASE_TYPE, profileName);
|
|
38302
38353
|
if (!profile) {
|
|
38303
38354
|
throw new Error(`Unknown trace emitter profile: ${profileName}`);
|
|
38304
38355
|
}
|
|
38305
|
-
return
|
|
38306
|
-
}
|
|
38307
|
-
function deepClone(value) {
|
|
38308
|
-
return JSON.parse(JSON.stringify(value));
|
|
38356
|
+
return profile;
|
|
38309
38357
|
}
|
|
38310
38358
|
|
|
38311
38359
|
var traceEmitterProfileFactory = /*#__PURE__*/Object.freeze({
|
|
@@ -43691,4 +43739,4 @@ var websocketTransportProvisioner = /*#__PURE__*/Object.freeze({
|
|
|
43691
43739
|
WebSocketTransportProvisionerFactory: WebSocketTransportProvisionerFactory
|
|
43692
43740
|
});
|
|
43693
43741
|
|
|
43694
|
-
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZATION_POLICY_FACTORY_BASE_TYPE, AUTHORIZATION_POLICY_SOURCE_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, ENV_VAR_ENFORCE_TOKEN_SUBJECT_NODE_IDENTITY$1 as AUTH_PROFILE_ENV_VAR_ENFORCE_TOKEN_SUBJECT_NODE_IDENTITY, ENV_VAR_HMAC_SECRET$1 as AUTH_PROFILE_ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL$1 as AUTH_PROFILE_ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM$1 as AUTH_PROFILE_ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$2 as AUTH_PROFILE_ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE$1 as AUTH_PROFILE_ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER$1 as AUTH_PROFILE_ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER$1 as AUTH_PROFILE_ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_TRUSTED_CLIENT_SCOPE$1 as AUTH_PROFILE_ENV_VAR_TRUSTED_CLIENT_SCOPE, PROFILE_NAME_DEFAULT as AUTH_PROFILE_NAME_DEFAULT, PROFILE_NAME_NOOP$2 as AUTH_PROFILE_NAME_NOOP, PROFILE_NAME_OAUTH2 as AUTH_PROFILE_NAME_OAUTH2, PROFILE_NAME_OAUTH2_CALLBACK as AUTH_PROFILE_NAME_OAUTH2_CALLBACK, PROFILE_NAME_OAUTH2_GATED as AUTH_PROFILE_NAME_OAUTH2_GATED, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizationPolicyFactory, AuthorizationPolicySourceFactory, AuthorizationProfileFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BasicAuthorizationPolicy, BasicAuthorizationPolicyFactory, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CONNECTION_RETRY_POLICY_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectionRetryPolicyFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$11 as DEFAULT_WELCOME_FACTORY_META, DefaultConnectionRetryPolicy, DefaultConnectionRetryPolicyFactory, DefaultCryptoProvider, DefaultKeyManager, DefaultNodeIdentityPolicy, DefaultNodeIdentityPolicyFactory, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_AUTHORIZATION_PROFILE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SESSION_MAX_INITIAL_ATTEMPTS, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$12 as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KNOWN_POLICY_FIELDS, KNOWN_RULE_FIELDS, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MAX_SCOPE_NESTING_DEPTH, MemoryMetricsEmitter, NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodeIdentityPolicyFactory, NodeIdentityPolicyProfileFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenSubjectNodeIdentityPolicy, TokenSubjectNodeIdentityPolicyFactory, TokenVerifierFactory, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_ACTIONS, VALID_CURVES_BY_KTY, VALID_EFFECTS, VALID_KEY_USES, VALID_ORIGIN_TYPES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, assertNotRegexPattern, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, color, compareCryptoLevels, compileGlobOnlyScopeRequirement, compileGlobPattern, compilePattern, compileScopeRequirement, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, evaluateScopeRequirement, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCompiledGlobPattern, getCurrentEnvelope, getFabricForNode, getFameRoot, getKeyProvider, getKeyStore, getLogger, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isIdentityExposingTokenProvider, isInPageConnectionGrant, isNodeLike, isPlainObject$4 as isPlainObject, isPoolAddress, isPoolLogical, isRegexPattern, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchPattern, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeScopeRequirement, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, safeImport, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|
|
43742
|
+
export { ADMISSION_CLIENT_FACTORY_BASE_TYPE, ATTACHMENT_KEY_VALIDATOR_FACTORY_BASE_TYPE, AUTHORIZATION_POLICY_FACTORY_BASE_TYPE, AUTHORIZATION_POLICY_SOURCE_FACTORY_BASE_TYPE, AUTHORIZER_FACTORY_BASE_TYPE, AUTH_INJECTION_STRATEGY_FACTORY_BASE_TYPE, ENV_VAR_ENFORCE_TOKEN_SUBJECT_NODE_IDENTITY$1 as AUTH_PROFILE_ENV_VAR_ENFORCE_TOKEN_SUBJECT_NODE_IDENTITY, ENV_VAR_HMAC_SECRET$1 as AUTH_PROFILE_ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL$1 as AUTH_PROFILE_ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM$1 as AUTH_PROFILE_ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$2 as AUTH_PROFILE_ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE$1 as AUTH_PROFILE_ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER$1 as AUTH_PROFILE_ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER$1 as AUTH_PROFILE_ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_TRUSTED_CLIENT_SCOPE$1 as AUTH_PROFILE_ENV_VAR_TRUSTED_CLIENT_SCOPE, PROFILE_NAME_DEFAULT as AUTH_PROFILE_NAME_DEFAULT, PROFILE_NAME_NOOP$2 as AUTH_PROFILE_NAME_NOOP, PROFILE_NAME_OAUTH2 as AUTH_PROFILE_NAME_OAUTH2, PROFILE_NAME_OAUTH2_CALLBACK as AUTH_PROFILE_NAME_OAUTH2_CALLBACK, PROFILE_NAME_OAUTH2_GATED as AUTH_PROFILE_NAME_OAUTH2_GATED, AnsiColor, AsyncLock, AttachmentKeyValidator, AuthInjectionStrategyFactory, AuthorizationPolicyFactory, AuthorizationPolicySourceFactory, AuthorizationProfileFactory, AuthorizerFactory, BROADCAST_CHANNEL_CONNECTION_GRANT_TYPE, BackPressureFull, BaseAsyncConnector, BaseNodeEventListener, BasicAuthorizationPolicy, BasicAuthorizationPolicyFactory, BindingManager, BindingStoreEntryRecord, BrowserAutoKeyCredentialProvider, BrowserWrappedKeyCredentialProvider, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CONNECTION_RETRY_POLICY_FACTORY_BASE_TYPE, CREDENTIAL_PROVIDER_FACTORY_BASE_TYPE, CRYPTO_LEVEL_SECURITY_ORDER, CertificateManagerFactory, ConnectionRetryPolicyFactory, ConnectorConfigDefaults, ConnectorFactory, ConsoleMetricsEmitter, CryptoLevel, FACTORY_META$11 as DEFAULT_WELCOME_FACTORY_META, DefaultConnectionRetryPolicy, DefaultConnectionRetryPolicyFactory, DefaultCryptoProvider, DefaultKeyManager, DefaultNodeIdentityPolicy, DefaultNodeIdentityPolicyFactory, DefaultSecurityManager, DefaultSecurityPolicy, DefaultWelcomeService, DefaultWelcomeServiceFactory, DevFixedKeyCredentialProvider, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, ENV_VAR_AUTHORIZATION_PROFILE, ENV_VAR_DEFAULT_ENCRYPTION_LEVEL, ENV_VAR_HMAC_SECRET, ENV_VAR_JWKS_URL, ENV_VAR_JWT_ALGORITHM, ENV_VAR_JWT_AUDIENCE$1 as ENV_VAR_JWT_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_AUDIENCE, ENV_VAR_JWT_REVERSE_AUTH_TRUSTED_ISSUER, ENV_VAR_JWT_TRUSTED_ISSUER, ENV_VAR_SESSION_MAX_INITIAL_ATTEMPTS, ENV_VAR_SHOW_ENVELOPES$1 as ENV_VAR_SHOW_ENVELOPES, EdDSAEnvelopeSigner, EncryptedKeyValueStore, EncryptedStorageProviderBase, EncryptedValue, EncryptionConfiguration, EncryptionManagerFactory, EncryptionResult, EncryptionStatus, EnvCredentialProvider, EnvelopeContext, EnvelopeListenerManager, EnvelopeSecurityHandler, EnvelopeSignerFactory, EnvelopeVerifierFactory, FACTORY_META$12 as FACTORY_META, FIXED_PREFIX_LEN, FameAuthorizedDeliveryContextSchema, FameConnectError, FameEnvironmentContext, FameError, FameMessageTooLarge, FameNode, FameNodeAuthorizationContextSchema, FameProtocolError, FameTransportClose, FlowController, GRANT_PURPOSE_NODE_ATTACH, HTTP_CONNECTION_GRANT_TYPE, HTTP_STATELESS_CONNECTOR_TYPE, INPAGE_CONNECTION_GRANT_TYPE, INPAGE_CONNECTOR_TYPE, InMemoryBinding, InMemoryFanoutBroker, InMemoryKeyValueStore, InMemoryReadWriteChannel, InMemoryStorageProvider, InPageConnector, IndexedDBKeyValueStore, IndexedDBStorageProvider, InvalidPassphraseError, JWKValidationError, KEY_MANAGER_FACTORY_BASE_TYPE, KEY_STORE_FACTORY_BASE_TYPE, KNOWN_POLICY_FIELDS, KNOWN_RULE_FIELDS, KeyInfo, KeyManagementHandler, KeyManagerFactory, KeyStore, KeyStoreFactory, KeyValidationError, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, LogLevel, LogLevelNames, MAX_SCOPE_NESTING_DEPTH, MemoryMetricsEmitter, NODE_IDENTITY_POLICY_FACTORY_BASE_TYPE, NODE_LIKE_FACTORY_BASE_TYPE, NODE_PLACEMENT_STRATEGY_FACTORY_BASE_TYPE, NoOpMetricsEmitter, NoSecurityPolicy, NodeFactory, NodeIdentityPolicyFactory, NodeIdentityPolicyProfileFactory, NodePlacementStrategyFactory, NoneCredentialProvider, NoopEncryptionManager, NoopKeyValidator, NoopTrustStoreProvider, NotAuthorized, PROFILE_NAME_GATED, PROFILE_NAME_GATED_CALLBACK, PROFILE_NAME_OPEN$1 as PROFILE_NAME_OPEN, PROFILE_NAME_OVERLAY, PROFILE_NAME_OVERLAY_CALLBACK, PROFILE_NAME_STRICT_OVERLAY, PromptCredentialProvider, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, REQUIRED_FIELDS_BY_KTY, ReplicaStickinessManagerFactory, RootSessionManager, RouteManager, RpcMixin, RpcProxy, SEALED_ENVELOPE_NONCE_LENGTH, SEALED_ENVELOPE_OVERHEAD, SEALED_ENVELOPE_PRIVATE_KEY_LENGTH, SEALED_ENVELOPE_PUBLIC_KEY_LENGTH, SEALED_ENVELOPE_TAG_LENGTH, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SECURITY_MANAGER_FACTORY_BASE_TYPE, SECURITY_POLICY_FACTORY_BASE_TYPE, STORAGE_PROVIDER_FACTORY_BASE_TYPE, SecretSource, SecretStoreCredentialProvider, SecureChannelFrameHandler, SecureChannelManagerFactory, SecurityAction, SecurityRequirements, Sentinel, SentinelFactory, SessionKeyCredentialProvider, SignaturePolicy, SigningConfig as SigningConfigClass, SigningConfiguration, SimpleLoadBalancerStickinessManager, SimpleLoadBalancerStickinessManagerFactory, StaticCredentialProvider, StorageAESEncryptionManager, TOKEN_ISSUER_FACTORY_BASE_TYPE, TOKEN_PROVIDER_FACTORY_BASE_TYPE, TOKEN_VERIFIER_FACTORY_BASE_TYPE, TRANSPORT_PROVISIONER_FACTORY_BASE_TYPE, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, TaskSpawner, TokenIssuerFactory, TokenProviderFactory, TokenSubjectNodeIdentityPolicy, TokenSubjectNodeIdentityPolicyFactory, TokenVerifierFactory, TransportProvisionerFactory, TrustStoreProviderFactory, TtlValidationError, UpstreamSessionManager, VALID_ACTIONS, VALID_CURVES_BY_KTY, VALID_EFFECTS, VALID_KEY_USES, VALID_ORIGIN_TYPES, VERSION, WEBSOCKET_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WebSocketCloseCode, WebSocketConnector, WebSocketState, WelcomeServiceFactory, _NoopFlowController, __runtimePluginLoader, addEnvelopeFields, addLogLevel, addTimestamp, assertConnectionGrant, assertGrant, assertNotRegexPattern, basicConfig, broadcastChannelGrantToConnectorConfig, camelToSnakeCase, canonicalJson, capitalizeFirstLetter, clearProfiles, color, compareCryptoLevels, compileGlobOnlyScopeRequirement, compileGlobPattern, compilePattern, compileScopeRequirement, compiledPathPattern, consoleTransport, convertWildcardLogicalToDnsConstraint, createConnectorConfig, createEd25519Keypair, createHostLogicalUri, createLogicalUri, createNodeDeliveryContext, createResource, createRpcProxy, createRsaKeypair, createTransportCloseError, createX25519Keypair, credentialToString, currentTraceId$1 as currentTraceId, debounce, decodeBase64Url, decodeFameDataPayload, deepMerge, defaultJsonEncoder, delay, dropEmpty, enableLogging, encodeUtf8, ensureRuntimeFactoriesRegistered, evaluateScopeRequirement, extractId, extractPoolAddressBase, extractPoolBase, filterKeysByUse, formatTimestamp, formatTimestampForConsole$1 as formatTimestampForConsole, frameDigest, getCompiledGlobPattern, getCurrentEnvelope, getFabricForNode, getFameRoot, getKeyProvider, getKeyStore, getLogger, getProfile, hasCryptoSupport, hostnameToLogical, hostnamesToLogicals, httpGrantToConnectorConfig, immutableHeaders, inPageGrantToConnectorConfig, isAuthInjectionStrategy, isBroadcastChannelConnectionGrant, isConnectionGrant, isConnectorConfig, isEnvelopeLoggingEnabled, isFameError, isFameErrorType, isGrant, isHttpConnectionGrant, isIdentityExposingTokenProvider, isInPageConnectionGrant, isNodeLike, isPlainObject$4 as isPlainObject, isPoolAddress, isPoolLogical, isRegexPattern, isRegisterable, isTokenExpired, isTokenProvider, isTokenValid, isWebSocketConnectionGrant, jsonDumps, listProfiles, logicalPatternsToDnsConstraints, logicalToHostname, logicalsToHostnames, matchPattern, matchesPoolAddress, matchesPoolLogical, maybeAwait, nodeWelcomeRouter, nodeWelcomeRouterPlugin, normalizeBroadcastChannelConnectionGrant, normalizeEncryptionConfig, normalizeEnvelopeSnapshot, normalizeHttpConnectionGrant, normalizeInPageConnectionGrant, normalizeInboundCryptoRules, normalizeInboundSigningRules, normalizeOutboundCryptoRules, normalizeOutboundSigningRules, normalizePath, normalizeResponseCryptoRules, normalizeResponseSigningRules, normalizeScopeRequirement, normalizeSecretSource, normalizeSecurityRequirements, normalizeSigningConfig, normalizeWebSocketConnectionGrant, objectToBytes, operation, parseSealedEnvelope, pinoTransport, prettyModel$1 as prettyModel, registerDefaultFactories, registerDefaultKeyStoreFactory, registerNodePlacementStrategyFactory, registerProfile, registerRuntimeFactories, requireCryptoSupport, retryWithBackoff, safeColor, safeImport, sealedDecrypt, sealedEncrypt, secureDigest, setKeyStore, showEnvelopes$1 as showEnvelopes, sleep, snakeToCamelCase, stringifyNonPrimitives, supportsColor, throttle, urlsafeBase64Decode, urlsafeBase64Encode, validateCacheTtlSec, validateEncryptionKey, validateHostLogical, validateHostLogicals, validateJwkComplete, validateJwkStructure, validateJwkUseField, validateJwtTokenTtlSec, validateKeyCorrelationTtlSec, validateLogical, validateLogicalSegment, validateOAuth2TtlSec, validateSigningKey, validateTtlSec, waitForAll, waitForAllSettled, waitForAny, websocketGrantToConnectorConfig, withEnvelopeContext, withEnvelopeContextAsync, withLegacySnakeCaseKeys, withLock, withTimeout };
|