@sap-cloud-sdk/connectivity 4.3.2-20260129014611.0 → 4.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import { IdentityService } from '@sap/xssec';
|
|
2
2
|
import type { IdentityServiceCredentials } from './environment-accessor-types';
|
|
3
|
+
import type { JwtPayload } from '../jsonwebtoken-type';
|
|
3
4
|
/**
|
|
4
5
|
* @internal
|
|
5
6
|
* A cache for `IdentityService` instances.
|
|
@@ -9,8 +10,8 @@ export declare const identityServicesCache: Map<string, IdentityService>;
|
|
|
9
10
|
/**
|
|
10
11
|
* @internal
|
|
11
12
|
* @param credentials - Identity service credentials extracted from a service binding or re-use service. Required to create the xssec `IdentityService` instance.
|
|
12
|
-
* @param
|
|
13
|
+
* @param jwt - Optional JWT string or payload to extract the issuer URL for bearer assertion flows.
|
|
13
14
|
* @param disableCache - Value to enable or disable JWKS cache in the xssec library. Defaults to false.
|
|
14
15
|
* @returns An instance of {@link @sap/xssec/IdentityService} for the provided credentials.
|
|
15
16
|
*/
|
|
16
|
-
export declare function getIdentityServiceInstanceFromCredentials(credentials: IdentityServiceCredentials,
|
|
17
|
+
export declare function getIdentityServiceInstanceFromCredentials(credentials: IdentityServiceCredentials, jwt?: string | JwtPayload, disableCache?: boolean): IdentityService;
|
|
@@ -15,14 +15,37 @@ const logger = (0, util_1.createLogger)({
|
|
|
15
15
|
* Direct access from outside this module outside tests is discouraged.
|
|
16
16
|
*/
|
|
17
17
|
exports.identityServicesCache = new Map();
|
|
18
|
+
/**
|
|
19
|
+
* Extracts the subdomain from JWT and updates credentials if found.
|
|
20
|
+
* @param credentials - Identity service credentials.
|
|
21
|
+
* @param jwt - JWT string or payload to extract subdomain from.
|
|
22
|
+
* @returns Updated credentials and extracted subdomain (if any).
|
|
23
|
+
*/
|
|
24
|
+
function extractSubdomainFromJwt(credentials, jwt) {
|
|
25
|
+
const decodedJwt = typeof jwt === 'string' ? new xssec_1.IdentityServiceToken(jwt) : { payload: jwt };
|
|
26
|
+
const payload = decodedJwt.payload;
|
|
27
|
+
// For IAS tokens, prefer ias_iss claim over standard iss claim
|
|
28
|
+
const subdomain = (0, subdomain_replacer_1.getIssuerSubdomain)(payload, true);
|
|
29
|
+
if (!subdomain) {
|
|
30
|
+
logger.warn('Could not extract subdomain from JWT assertion issuer. Falling back to service binding URL.');
|
|
31
|
+
return { credentials, subdomain };
|
|
32
|
+
}
|
|
33
|
+
// Replace subdomain in the URL from the service binding
|
|
34
|
+
// Reason: We don't want to blindly trust the URL in the assertion
|
|
35
|
+
const updatedCredentials = {
|
|
36
|
+
...credentials,
|
|
37
|
+
url: (0, subdomain_replacer_1.replaceSubdomain)(credentials.url, subdomain)
|
|
38
|
+
};
|
|
39
|
+
return { credentials: updatedCredentials, subdomain };
|
|
40
|
+
}
|
|
18
41
|
/**
|
|
19
42
|
* @internal
|
|
20
43
|
* @param credentials - Identity service credentials extracted from a service binding or re-use service. Required to create the xssec `IdentityService` instance.
|
|
21
|
-
* @param
|
|
44
|
+
* @param jwt - Optional JWT string or payload to extract the issuer URL for bearer assertion flows.
|
|
22
45
|
* @param disableCache - Value to enable or disable JWKS cache in the xssec library. Defaults to false.
|
|
23
46
|
* @returns An instance of {@link @sap/xssec/IdentityService} for the provided credentials.
|
|
24
47
|
*/
|
|
25
|
-
function getIdentityServiceInstanceFromCredentials(credentials,
|
|
48
|
+
function getIdentityServiceInstanceFromCredentials(credentials, jwt, disableCache = false) {
|
|
26
49
|
const serviceConfig = disableCache
|
|
27
50
|
? {
|
|
28
51
|
validation: {
|
|
@@ -34,23 +57,10 @@ function getIdentityServiceInstanceFromCredentials(credentials, assertion, disab
|
|
|
34
57
|
}
|
|
35
58
|
: undefined;
|
|
36
59
|
let subdomain;
|
|
37
|
-
if (
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
// For IAS tokens, prefer ias_iss claim over standard iss claim
|
|
42
|
-
subdomain = (0, subdomain_replacer_1.getIssuerSubdomain)(payload, true);
|
|
43
|
-
if (subdomain) {
|
|
44
|
-
// Replace subdomain in the URL from the service binding
|
|
45
|
-
// Reason: We don't want to blindly trust the URL in the assertion
|
|
46
|
-
credentials = {
|
|
47
|
-
...credentials,
|
|
48
|
-
url: (0, subdomain_replacer_1.replaceSubdomain)(credentials.url, subdomain)
|
|
49
|
-
};
|
|
50
|
-
}
|
|
51
|
-
else {
|
|
52
|
-
logger.warn('Could not extract subdomain from JWT assertion issuer. Falling back to service binding URL.');
|
|
53
|
-
}
|
|
60
|
+
if (jwt) {
|
|
61
|
+
const result = extractSubdomainFromJwt(credentials, jwt);
|
|
62
|
+
credentials = result.credentials;
|
|
63
|
+
subdomain = result.subdomain;
|
|
54
64
|
}
|
|
55
65
|
subdomain = subdomain ?? (0, subdomain_replacer_1.getIssuerSubdomain)({ iss: credentials.url });
|
|
56
66
|
const cacheKey = `${credentials.clientid}:${subdomain}:${disableCache}`;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ias.js","sourceRoot":"","sources":["../../../src/scp-cf/environment-accessor/ias.ts"],"names":[],"mappings":";;;
|
|
1
|
+
{"version":3,"file":"ias.js","sourceRoot":"","sources":["../../../src/scp-cf/environment-accessor/ias.ts"],"names":[],"mappings":";;;AA2DA,8FAiCC;AA5FD,sCAAmE;AACnE,8CAAmD;AACnD,8DAA6E;AAI7E,MAAM,MAAM,GAAG,IAAA,mBAAY,EAAC;IAC1B,OAAO,EAAE,cAAc;IACvB,cAAc,EAAE,KAAK;CACtB,CAAC,CAAC;AAEH;;;;GAIG;AACU,QAAA,qBAAqB,GAAiC,IAAI,GAAG,EAAE,CAAC;AAE7E;;;;;GAKG;AACH,SAAS,uBAAuB,CAC9B,WAAuC,EACvC,GAAwB;IAExB,MAAM,UAAU,GACd,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,4BAAoB,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC;IAC7E,MAAM,OAAO,GAAG,UAAU,CAAC,OAA4B,CAAC;IAExD,+DAA+D;IAC/D,MAAM,SAAS,GAAG,IAAA,uCAAkB,EAAC,OAAO,EAAE,IAAI,CAAC,CAAC;IAEpD,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,CAAC,IAAI,CACT,6FAA6F,CAC9F,CAAC;QACF,OAAO,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC;IACpC,CAAC;IAED,wDAAwD;IACxD,kEAAkE;IAClE,MAAM,kBAAkB,GAAG;QACzB,GAAG,WAAW;QACd,GAAG,EAAE,IAAA,qCAAgB,EAAC,WAAW,CAAC,GAAG,EAAE,SAAS,CAAC;KAClD,CAAC;IAEF,OAAO,EAAE,WAAW,EAAE,kBAAkB,EAAE,SAAS,EAAE,CAAC;AACxD,CAAC;AAED;;;;;;GAMG;AACH,SAAgB,yCAAyC,CACvD,WAAuC,EACvC,GAAyB,EACzB,eAAwB,KAAK;IAE7B,MAAM,aAAa,GAAG,YAAY;QAChC,CAAC,CAAC;YACE,UAAU,EAAE;gBACV,IAAI,EAAE;oBACJ,cAAc,EAAE,CAAC;oBACjB,aAAa,EAAE,CAAC;iBACjB;aACF;SACF;QACH,CAAC,CAAC,SAAS,CAAC;IAEd,IAAI,SAA6B,CAAC;IAClC,IAAI,GAAG,EAAE,CAAC;QACR,MAAM,MAAM,GAAG,uBAAuB,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC;QACzD,WAAW,GAAG,MAAM,CAAC,WAAW,CAAC;QACjC,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;IAC/B,CAAC;IAED,SAAS,GAAG,SAAS,IAAI,IAAA,uCAAkB,EAAC,EAAE,GAAG,EAAE,WAAW,CAAC,GAAG,EAAE,CAAC,CAAC;IAEtE,MAAM,QAAQ,GAAG,GAAG,WAAW,CAAC,QAAQ,IAAI,SAAS,IAAI,YAAY,EAAE,CAAC;IACxE,+DAA+D;IAC/D,IAAI,eAAe,GAAG,6BAAqB,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;IAC1D,IAAI,eAAe,KAAK,SAAS,EAAE,CAAC;QAClC,eAAe,GAAG,IAAI,uBAAe,CAAC,WAAW,EAAE,aAAa,CAAC,CAAC;QAClE,6BAAqB,CAAC,GAAG,CAAC,QAAQ,EAAE,eAAe,CAAC,CAAC;IACvD,CAAC;IACD,OAAO,eAAe,CAAC;AACzB,CAAC"}
|
|
@@ -121,7 +121,16 @@ function transformIasOptionsToXssecArgs(arg) {
|
|
|
121
121
|
* @internal
|
|
122
122
|
*/
|
|
123
123
|
async function getIasTokenImpl(arg) {
|
|
124
|
-
const
|
|
124
|
+
const jwtForSubdomain =
|
|
125
|
+
// For OAuth2JWTBearer authentication, subdomain will be extracted from the assertion
|
|
126
|
+
arg.authenticationType === 'OAuth2JWTBearer'
|
|
127
|
+
? arg.assertion
|
|
128
|
+
: // For technical user flows, use JWT for subdomain extraction when requesting
|
|
129
|
+
// current-tenant context
|
|
130
|
+
arg.requestAs !== 'provider-tenant'
|
|
131
|
+
? arg.jwt
|
|
132
|
+
: undefined;
|
|
133
|
+
const identityService = (0, environment_accessor_1.getIdentityServiceInstanceFromCredentials)(arg.serviceCredentials, jwtForSubdomain);
|
|
125
134
|
const tokenOptions = transformIasOptionsToXssecArgs(arg);
|
|
126
135
|
const response = arg.authenticationType === 'OAuth2JWTBearer'
|
|
127
136
|
? // JWT bearer grant for business user access
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"identity-service.js","sourceRoot":"","sources":["../../src/scp-cf/identity-service.ts"],"names":[],"mappings":";;;AA+DA,kDAOC;AAeD,kCAuCC;AA5HD,iEAA2E;AAC3E,0DAAuD;AACvD,sCAAwE;AACxE,8CAAqD;AACrD,+BAAgD;AAChD,iEAGgC;AAWhC,+DAA+D;AAAtD,6HAAA,qBAAqB,OAAA;AAsC9B;;;;;GAKG;AACH,SAAgB,mBAAmB,CAAC,OAA2B;IAC7D,6EAA6E;IAC7E,OAAO,CACL,OAAO,CAAC,uBAAuB,KAAK,IAAI;QACxC,CAAC,CAAC,OAAO,CAAC,GAAG;QACb,CAAC,IAAA,kBAAY,EAAC,IAAA,eAAS,EAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CACtC,CAAC;AACJ,CAAC;AAOD;;;;;;;GAOG;AACI,KAAK,UAAU,WAAW,CAC/B,OAAyB,EACzB,UAA6C,EAAE;IAE/C,MAAM,eAAe,GAAG,IAAA,4CAAqB,EAAC,OAAO,CAAC,CAAC;IAEvD,MAAM,UAAU,GAAkB;QAChC,kBAAkB,EAAE,eAAe,CAAC,WAAW;QAC/C,GAAG,OAAO;KACX,CAAC;IAEF,MAAM,KAAK,GAAG,MAAM,IAAA,gCAAqB,EAIvC,IAAA,uBAAU,GAAE,EAAE;QACd,EAAE,EAAE,eAAe;QACnB,UAAU;QACV,OAAO,EAAE;YACP,GAAG,EAAE,UAAU,CAAC,kBAAkB,CAAC,GAAG;YACtC,QAAQ,EAAE,UAAU,CAAC,kBAAkB,CAAC,OAAO;SAChD;KACF,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;QACb,MAAM,WAAW,GACf,OAAO,OAAO,KAAK,QAAQ,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,IAAI,SAAS,CAAC;QACpE,IAAI,OAAO,GAAG,2CAA2C,WAAW,aAAa,eAAe,CAAC,KAAK,EAAE,CAAC;QAEzG,wEAAwE;QACxE,IAAI,GAAG,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE,CAAC;YACjC,OAAO;gBACL,sPAAsP,CAAC;QAC3P,CAAC;QAED,MAAM,IAAI,qBAAc,CACtB,OAAO,GAAG,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,EAClD,GAAG,CACJ,CAAC;IACJ,CAAC,CAAC,CAAC;IACH,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;;;GAKG;AACH,SAAS,oBAAoB,CAAC,QAAqB;IACjD,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;IACpD,CAAC;IAED,IAAI,MAAM,IAAI,QAAQ,EAAE,CAAC;QACvB,OAAO,8CAA8C,QAAQ,CAAC,IAAI,EAAE,CAAC;IACvE,CAAC;IAED,MAAM,QAAQ,GAAG;QACf,kDAAkD,QAAQ,CAAC,gBAAgB,EAAE;KAC9E,CAAC;IACF,IAAI,QAAQ,CAAC,gBAAgB,EAAE,CAAC;QAC9B,QAAQ,CAAC,IAAI,CAAC,UAAU,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;IACvD,CAAC;IACD,OAAO,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC5B,CAAC;AAED;;;;;GAKG;AACH,SAAS,8BAA8B,CACrC,GAAkB;IAGlB,MAAM,YAAY,GAAG;QACnB,YAAY,EAAE,KAAK;QACnB,GAAG,CAAC,GAAG,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,oBAAoB,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;QACrE,GAAG,CAAC,GAAG,CAAC,MAAM,IAAI,EAAE,OAAO,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;QAC1C,GAAG,CAAC,GAAG,CAAC,WAAW,IAAI,EAAE,CAAC;KAEsB,CAAC;IAEnD,IAAI,GAAG,CAAC,kBAAkB,KAAK,iBAAiB,EAAE,CAAC;QACjD,iDAAiD;QACjD,IAAI,CAAC,GAAG,CAAC,SAAS,EAAE,CAAC;YACnB,MAAM,IAAI,KAAK,CACb,iGAAiG,CAClG,CAAC;QACJ,CAAC;QAED,sGAAsG;QACtG,IAAI,GAAG,CAAC,QAAQ,IAAI,YAAY,CAAC,cAAc,KAAK,SAAS,EAAE,CAAC;YAC9D,YAAY,CAAC,cAAc,GAAG,CAAC,CAAC;QAClC,CAAC;QAED,gDAAgD;QAChD,MAAM,KAAK,GAAG,IAAI,4BAAoB,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACtD,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,sFAAsF;YACtF,YAAY,CAAC,OAAO,GAAG,KAAK,EAAE,MAAM,IAAK,IAA6B,CAAC;QACzE,CAAC;QAED,yBAAyB;QACzB,yNAAyN;QACzN,mDAAmD;QACnD,IAAI,YAAY,CAAC,OAAO,EAAE,CAAC;YACzB,YAAY,CAAC,cAAc,GAAG,CAAC,CAAC;QAClC,CAAC;IACH,CAAC;IAED,OAAO,YAAY,CAAC;AACtB,CAAC;AAED;;;;;GAKG;AACH,KAAK,UAAU,eAAe,CAAC,GAAkB;IAC/C,MAAM,eAAe,GAAG,IAAA,gEAAyC,EAC/D,GAAG,CAAC,kBAAkB,EACtB,
|
|
1
|
+
{"version":3,"file":"identity-service.js","sourceRoot":"","sources":["../../src/scp-cf/identity-service.ts"],"names":[],"mappings":";;;AA+DA,kDAOC;AAeD,kCAuCC;AA5HD,iEAA2E;AAC3E,0DAAuD;AACvD,sCAAwE;AACxE,8CAAqD;AACrD,+BAAgD;AAChD,iEAGgC;AAWhC,+DAA+D;AAAtD,6HAAA,qBAAqB,OAAA;AAsC9B;;;;;GAKG;AACH,SAAgB,mBAAmB,CAAC,OAA2B;IAC7D,6EAA6E;IAC7E,OAAO,CACL,OAAO,CAAC,uBAAuB,KAAK,IAAI;QACxC,CAAC,CAAC,OAAO,CAAC,GAAG;QACb,CAAC,IAAA,kBAAY,EAAC,IAAA,eAAS,EAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CACtC,CAAC;AACJ,CAAC;AAOD;;;;;;;GAOG;AACI,KAAK,UAAU,WAAW,CAC/B,OAAyB,EACzB,UAA6C,EAAE;IAE/C,MAAM,eAAe,GAAG,IAAA,4CAAqB,EAAC,OAAO,CAAC,CAAC;IAEvD,MAAM,UAAU,GAAkB;QAChC,kBAAkB,EAAE,eAAe,CAAC,WAAW;QAC/C,GAAG,OAAO;KACX,CAAC;IAEF,MAAM,KAAK,GAAG,MAAM,IAAA,gCAAqB,EAIvC,IAAA,uBAAU,GAAE,EAAE;QACd,EAAE,EAAE,eAAe;QACnB,UAAU;QACV,OAAO,EAAE;YACP,GAAG,EAAE,UAAU,CAAC,kBAAkB,CAAC,GAAG;YACtC,QAAQ,EAAE,UAAU,CAAC,kBAAkB,CAAC,OAAO;SAChD;KACF,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;QACb,MAAM,WAAW,GACf,OAAO,OAAO,KAAK,QAAQ,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,IAAI,SAAS,CAAC;QACpE,IAAI,OAAO,GAAG,2CAA2C,WAAW,aAAa,eAAe,CAAC,KAAK,EAAE,CAAC;QAEzG,wEAAwE;QACxE,IAAI,GAAG,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE,CAAC;YACjC,OAAO;gBACL,sPAAsP,CAAC;QAC3P,CAAC;QAED,MAAM,IAAI,qBAAc,CACtB,OAAO,GAAG,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,EAClD,GAAG,CACJ,CAAC;IACJ,CAAC,CAAC,CAAC;IACH,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;;;GAKG;AACH,SAAS,oBAAoB,CAAC,QAAqB;IACjD,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;IACpD,CAAC;IAED,IAAI,MAAM,IAAI,QAAQ,EAAE,CAAC;QACvB,OAAO,8CAA8C,QAAQ,CAAC,IAAI,EAAE,CAAC;IACvE,CAAC;IAED,MAAM,QAAQ,GAAG;QACf,kDAAkD,QAAQ,CAAC,gBAAgB,EAAE;KAC9E,CAAC;IACF,IAAI,QAAQ,CAAC,gBAAgB,EAAE,CAAC;QAC9B,QAAQ,CAAC,IAAI,CAAC,UAAU,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;IACvD,CAAC;IACD,OAAO,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC5B,CAAC;AAED;;;;;GAKG;AACH,SAAS,8BAA8B,CACrC,GAAkB;IAGlB,MAAM,YAAY,GAAG;QACnB,YAAY,EAAE,KAAK;QACnB,GAAG,CAAC,GAAG,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,oBAAoB,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;QACrE,GAAG,CAAC,GAAG,CAAC,MAAM,IAAI,EAAE,OAAO,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;QAC1C,GAAG,CAAC,GAAG,CAAC,WAAW,IAAI,EAAE,CAAC;KAEsB,CAAC;IAEnD,IAAI,GAAG,CAAC,kBAAkB,KAAK,iBAAiB,EAAE,CAAC;QACjD,iDAAiD;QACjD,IAAI,CAAC,GAAG,CAAC,SAAS,EAAE,CAAC;YACnB,MAAM,IAAI,KAAK,CACb,iGAAiG,CAClG,CAAC;QACJ,CAAC;QAED,sGAAsG;QACtG,IAAI,GAAG,CAAC,QAAQ,IAAI,YAAY,CAAC,cAAc,KAAK,SAAS,EAAE,CAAC;YAC9D,YAAY,CAAC,cAAc,GAAG,CAAC,CAAC;QAClC,CAAC;QAED,gDAAgD;QAChD,MAAM,KAAK,GAAG,IAAI,4BAAoB,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACtD,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,sFAAsF;YACtF,YAAY,CAAC,OAAO,GAAG,KAAK,EAAE,MAAM,IAAK,IAA6B,CAAC;QACzE,CAAC;QAED,yBAAyB;QACzB,yNAAyN;QACzN,mDAAmD;QACnD,IAAI,YAAY,CAAC,OAAO,EAAE,CAAC;YACzB,YAAY,CAAC,cAAc,GAAG,CAAC,CAAC;QAClC,CAAC;IACH,CAAC;IAED,OAAO,YAAY,CAAC;AACtB,CAAC;AAED;;;;;GAKG;AACH,KAAK,UAAU,eAAe,CAAC,GAAkB;IAC/C,MAAM,eAAe;IACnB,qFAAqF;IACrF,GAAG,CAAC,kBAAkB,KAAK,iBAAiB;QAC1C,CAAC,CAAC,GAAG,CAAC,SAAS;QACf,CAAC,CAAC,6EAA6E;YAC7E,yBAAyB;YACzB,GAAG,CAAC,SAAS,KAAK,iBAAiB;gBACnC,CAAC,CAAC,GAAG,CAAC,GAAG;gBACT,CAAC,CAAC,SAAS,CAAC;IAClB,MAAM,eAAe,GAAG,IAAA,gEAAyC,EAC/D,GAAG,CAAC,kBAAkB,EACtB,eAAe,CAChB,CAAC;IAEF,MAAM,YAAY,GAAG,8BAA8B,CAAC,GAAG,CAAC,CAAC;IAEzD,MAAM,QAAQ,GACZ,GAAG,CAAC,kBAAkB,KAAK,iBAAiB;QAC1C,CAAC,CAAC,4CAA4C;YAC5C,MAAM,eAAe,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,EAAE,YAAY,CAAC;QACxE,CAAC,CAAC,0CAA0C;YAC1C,MAAM,eAAe,CAAC,2BAA2B,CAAC,YAAY,CAAC,CAAC;IAEtE,MAAM,UAAU,GAAG,IAAI,4BAAoB,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;IAEnE,OAAO;QACL,YAAY,EAAE,QAAQ,CAAC,YAAY;QACnC,UAAU,EAAE,QAAQ,CAAC,UAAU;QAC/B,UAAU,EAAE,QAAQ,CAAC,UAAU;QAC/B,uCAAuC;QACvC,KAAK,EAAE,EAAE;QACT,GAAG,EAAE,UAAU,CAAC,OAAO,EAAE,GAAG,IAAI,EAAE;QAClC,yEAAyE;QACzE,GAAG,EAAE,UAAU,CAAC,OAAO,EAAE,GAAG,IAAI,EAAE;QAClC,OAAO,EAAE,UAAU,CAAC,MAAM;QAC1B,OAAO,EAAE,UAAU,CAAC,MAAM;QAC1B,4CAA4C;QAC5C,QAAQ,EAAE,UAAU,EAAE,YAAY;QAClC,UAAU,EAAE,UAAU,CAAC,YAAY,IAAI,SAAS;QAChD,iDAAiD;QACjD,aAAa,EACX,QACD,EAAE,aAAa;KACjB,CAAC;AACJ,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sap-cloud-sdk/connectivity",
|
|
3
|
-
"version": "4.
|
|
3
|
+
"version": "4.4.0",
|
|
4
4
|
"description": "SAP Cloud SDK for JavaScript connectivity",
|
|
5
5
|
"homepage": "https://sap.github.io/cloud-sdk/docs/js/overview",
|
|
6
6
|
"license": "Apache-2.0",
|
|
@@ -40,8 +40,8 @@
|
|
|
40
40
|
"readme": "ts-node ../../scripts/replace-common-readme.ts"
|
|
41
41
|
},
|
|
42
42
|
"dependencies": {
|
|
43
|
-
"@sap-cloud-sdk/resilience": "^4.
|
|
44
|
-
"@sap-cloud-sdk/util": "^4.
|
|
43
|
+
"@sap-cloud-sdk/resilience": "^4.4.0",
|
|
44
|
+
"@sap-cloud-sdk/util": "^4.4.0",
|
|
45
45
|
"@sap/xsenv": "^6.0.0",
|
|
46
46
|
"@sap/xssec": "^4.12.1",
|
|
47
47
|
"async-retry": "^1.3.3",
|