siarashield_workspace 0.0.33 → 0.0.35

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,49 +1,31 @@
1
- ## `siarashield_workspace`
1
+ # `siarashield_workspace`
2
2
 
3
3
  Angular integration for CyberSiara **SiaraShield** captcha.
4
4
 
5
5
  ## Angular compatibility
6
6
 
7
- - Minimum supported Angular version: `16`
8
- - Supported Angular range: `16.x` to `21.x`
9
- - Peer dependency in package is set to:
7
+ - Minimum supported Angular: `16`
8
+ - Supported range: `16.x` to `21.x`
9
+ - Peer dependencies:
10
10
  - `@angular/core >=16.0.0 <22.0.0`
11
11
  - `@angular/common >=16.0.0 <22.0.0`
12
12
 
13
- ## Install
13
+ ## Quick start (recommended, easiest path)
14
+
15
+ Use this flow first. Most users need only these steps.
16
+
17
+ 1. Install package:
14
18
 
15
19
  ```bash
16
20
  npm i siarashield_workspace
17
21
  ```
18
22
 
19
- ## Quick setup (clear path)
20
-
21
- Choose one integration style only:
22
-
23
- - **Recommended:** Angular component (`<siara-shield ...>`).
24
- - **Alternative:** function API (`initSiaraShield(...)` + `checkSiaraShieldCaptcha...`).
25
-
26
- Do not mix both styles on the same page.
27
-
28
- 1. Install package: `npm i siarashield_workspace`.
29
- 2. Put only the **public key** in Angular environment.
30
- 3. Keep the **private key** on backend only (`.env` or secret store).
31
- 4. Render captcha container (component tag or `<div class="SiaraShield"></div>` for function API).
32
- 5. Keep submit button class: `class="CaptchaSubmit"`.
33
- 6. Initialize captcha once per page load.
34
- 7. On submit, run captcha check before API call.
35
- 8. Call API only when captcha returns success (`result.ok === true` or `ok === true`).
36
-
37
- ## Get your keys
38
-
39
- Get your public and private keys from <a href="https://mycybersiara.com" target="_blank" rel="noopener noreferrer">mycybersiara.com</a>.
40
-
41
- ## Put keys in the right place
23
+ 2. Ensure Angular environment files exist.
24
+ - If your project does not have `src/environments`, create:
25
+ - `src/environments/environment.ts`
26
+ - `src/environments/environment.prod.ts`
42
27
 
43
- - **Frontend (Angular):** public key only
44
- - **Backend (.env):** private key only
45
-
46
- Angular `environment` example:
28
+ 3. Put only your **public key** in Angular environment:
47
29
 
48
30
  ```ts
49
31
  export const environment = {
@@ -51,17 +33,7 @@ export const environment = {
51
33
  };
52
34
  ```
53
35
 
54
- Backend `.env` example:
55
-
56
- ```dotenv
57
- SIARASHIELD_PRIVATE_KEY=YOUR-PRIVATE-KEY
58
- ```
59
-
60
- Never place the private key in Angular environment files, templates, or browser code.
61
-
62
- ## Recommended: use the Angular component (easiest)
63
-
64
- ### 1) Add the component to your template
36
+ 4. Render component + submit button in template:
65
37
 
66
38
  ```html
67
39
  <siara-shield
@@ -73,7 +45,7 @@ Never place the private key in Angular environment files, templates, or browser
73
45
  <button type="submit" class="CaptchaSubmit" (click)="onSubmit()">Submit</button>
74
46
  ```
75
47
 
76
- ### 2) Copy-paste TypeScript
48
+ 5. Check captcha before API submit:
77
49
 
78
50
  ```ts
79
51
  import { Component, ViewChild } from '@angular/core';
@@ -88,63 +60,76 @@ import { SiaraShieldComponent } from 'siarashield_workspace';
88
60
  })
89
61
  export class FormComponent {
90
62
  protected readonly environment = environment;
91
-
92
- // Recommended: set from server (see CSP section)
93
63
  protected readonly cspNonce = (window as any).__cspNonce as string | undefined;
94
- private isSubmitting = false;
95
64
 
65
+ private isSubmitting = false;
96
66
  @ViewChild(SiaraShieldComponent) private readonly captcha?: SiaraShieldComponent;
97
67
 
98
68
  onCaptchaToken(token: string) {
99
- // Optional: use token immediately if needed
100
69
  console.log('SiaraShield token:', token);
101
70
  }
102
71
 
103
72
  async onSubmit() {
104
73
  if (this.isSubmitting) return;
105
74
  this.isSubmitting = true;
106
-
107
75
  try {
108
76
  const ok = await this.captcha?.checkCaptchaAsync();
109
- if (!ok) {
110
- console.log('Captcha not completed yet');
111
- return;
112
- }
77
+ if (!ok) return;
113
78
 
114
- // When ok=true, token is available in global state and from (token) output.
79
+ // Call your backend API only after captcha success.
115
80
  alert('Form submitted successfully');
116
81
  } finally {
117
- // Allow next user attempt if captcha or API flow was not completed.
118
82
  this.isSubmitting = false;
119
83
  }
120
84
  }
121
85
  }
122
86
  ```
123
87
 
124
- Notes:
88
+ 6. Keep your submit API logic only in the success branch (`ok === true`).
89
+
90
+ ## Key handling (required)
91
+
92
+ - **Frontend (Angular): public key only**
93
+ - **Backend (.env or secret store): private key only**
125
94
 
126
- - If you already load jQuery in your app, set `[loadJQuery]="false"` on the component.
127
- - Keep `class="CaptchaSubmit"` on your submit button (required by vendor flow).
128
- - The component renders the required captcha container (`<div class="SiaraShield"></div>`) internally at that position in the template.
129
- - Vendor debug logs are suppressed by default. Set `[allowVendorConsoleLogs]="true"` only while debugging.
95
+ Backend example:
96
+
97
+ ```dotenv
98
+ SIARASHIELD_PRIVATE_KEY=YOUR-PRIVATE-KEY
99
+ ```
130
100
 
131
- ## Alternative: function API (when you cannot use the component)
101
+ Never place the private key in Angular code or browser-accessible files.
132
102
 
133
- Template for function API:
103
+ Get keys from [mycybersiara.com](https://mycybersiara.com).
104
+
105
+ ## Integration rules (important)
106
+
107
+ - Choose one style per page:
108
+ - **Recommended:** `<siara-shield ...>`
109
+ - **Alternative:** function API
110
+ - Do not mix both styles on the same page.
111
+ - Keep submit button class: `CaptchaSubmit`.
112
+ - Initialize captcha once per page load.
113
+
114
+ ## Function API (alternative)
115
+
116
+ Use this only when component integration is not possible.
117
+
118
+ Template:
134
119
 
135
120
  ```html
136
121
  <div class="SiaraShield"></div>
137
122
  <button type="submit" class="CaptchaSubmit" (click)="onSubmit()">Submit</button>
138
123
  ```
139
124
 
125
+ TypeScript:
126
+
140
127
  ```ts
141
128
  import { environment } from '../environments/environment';
142
129
  import { initSiaraShield, checkSiaraShieldCaptcha } from 'siarashield_workspace';
143
130
 
144
131
  export class FormComponent {
145
132
  ngOnInit() {
146
- // Angular does not wait for async lifecycle hooks.
147
- // Use void to run async init without blocking render.
148
133
  void this.initializeCaptcha();
149
134
  }
150
135
 
@@ -152,68 +137,47 @@ export class FormComponent {
152
137
  await initSiaraShield({
153
138
  publicKey: environment.siaraShieldPublicKey,
154
139
  cspNonce: (window as any).__cspNonce || undefined,
155
- // Optional: set true only while debugging vendor/runtime internals.
156
- allowVendorConsoleLogs: false,
157
140
  });
158
141
  }
159
142
 
160
143
  onSubmit() {
161
144
  const result = checkSiaraShieldCaptcha();
162
- if (!result.ok) {
163
- console.log('Captcha not completed yet');
164
- return;
165
- }
145
+ if (!result.ok) return;
166
146
 
167
147
  console.log(result.token);
168
148
  // API call here
169
- alert('Form submitted successfully');
170
149
  }
171
150
  }
172
151
  ```
173
152
 
174
- Keep submit API logic inside the successful captcha branch.
175
-
176
- If your frontend reads nonce from the DOM instead of `window`, reuse nonce from an existing script tag:
177
-
178
- ```ts
179
- const nonce = document.querySelector('script[nonce]')?.getAttribute('nonce') || undefined;
180
- ```
181
-
182
- The nonce must be generated on the server for each request. The package NEVER generates a nonce in the browser.
183
-
184
- ## CSP Compliance (Important)
153
+ ## CSP guide
185
154
 
186
- Inline scripts are blocked by CSP unless you allow them with a nonce or a hash. This package does not execute inline JavaScript and does not use `eval()`, `new Function()`, `setTimeout(string)`, `setInterval(string)`, or any other string-based execution path. All scripts are loaded as external resources. Any dynamically created `<script>` elements are assigned the provided CSP nonce when `cspNonce` is passed.
155
+ If your app has no strict CSP, default integration works without extra setup.
187
156
 
188
- For strict CSP deployments:
157
+ If your app uses strict nonce-based CSP:
189
158
 
190
- - Generate the nonce on the server for each request.
191
- - Use the same nonce in the `Content-Security-Policy` header.
192
- - Use the same nonce on the `<script>` tag that loads your Angular app or any direct SiaraShield resource.
193
- - Use the same nonce in `initSiaraShield({ cspNonce: ... })`.
194
- - The package NEVER generates a nonce in the browser.
195
- - If a valid CSP nonce is required but not provided, browsers will block script execution and the captcha will fail to load.
159
+ - Generate nonce on server for each request.
160
+ - Use same nonce in:
161
+ - `Content-Security-Policy` header
162
+ - script tags loading your Angular app
163
+ - `cspNonce` option/input
164
+ - Do not generate nonce in browser.
196
165
 
197
- ### Production copy-paste policy (recommended for easiest client integration)
166
+ ### Strict policy example (recommended for security)
198
167
 
199
- Use this when you want a client-safe setup that avoids popup close issues with current vendor runtime.
200
-
201
- ```html
202
- <meta http-equiv="Content-Security-Policy" content="
203
- default-src 'self';
204
- script-src 'self' 'unsafe-inline' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
205
- script-src-elem 'self' 'unsafe-inline' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
206
- connect-src 'self' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
207
- style-src 'self' https://embed.mycybersiara.com https://mycybersiara.com https://fonts.googleapis.com https://cdnjs.cloudflare.com 'unsafe-inline';
208
- font-src 'self' https://fonts.gstatic.com https://mycybersiara.com https://cdnjs.cloudflare.com data:;
209
- img-src 'self' data: https://embed.mycybersiara.com https://embedcdn.mycybersiara.com https://mycybersiara.com;
210
- ">
211
-
212
- <script nonce="SIARASHIELD_NONCE" src="https://embedcdn.mycybersiara.com/capcha-temple/js/jquery.min.js"></script>
213
- <script nonce="SIARASHIELD_NONCE" src="https://embedcdn.mycybersiara.com/CaptchaFormate/CaptchaResources.js"></script>
168
+ ```http
169
+ default-src 'self';
170
+ script-src 'self' 'nonce-<dynamic>' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
171
+ script-src-elem 'self' 'nonce-<dynamic>' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
172
+ connect-src 'self' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
173
+ style-src 'self' https://embed.mycybersiara.com https://mycybersiara.com https://fonts.googleapis.com https://cdnjs.cloudflare.com;
174
+ font-src 'self' https://fonts.gstatic.com https://mycybersiara.com https://cdnjs.cloudflare.com data:;
175
+ img-src 'self' data: https://embed.mycybersiara.com https://embedcdn.mycybersiara.com https://mycybersiara.com;
214
176
  ```
215
177
 
216
- If your backend uses helper functions, generate compatibility policy like this:
178
+ ### Compatibility policy (easier integration, weaker security)
179
+
180
+ Use only when customer policy allows `'unsafe-inline'`:
217
181
 
218
182
  ```ts
219
183
  import { getSiaraShieldCspPolicy } from 'siarashield_workspace';
@@ -224,107 +188,53 @@ const csp = getSiaraShieldCspPolicy({
224
188
  });
225
189
  ```
226
190
 
227
- ### Strict copy-paste quick test (advanced, static nonce for local verification only)
191
+ ## Script loading behavior
228
192
 
229
- Use this only for local or staging validation. In production, replace `siarashield-example-nonce` with a server-generated nonce per request.
230
-
231
- ```html
232
- <script nonce="siarashield-example-nonce">
233
- window.__cspNonce = "siarashield-example-nonce";
234
- </script>
235
- <script nonce="siarashield-example-nonce" src="https://embedcdn.mycybersiara.com/capcha-temple/js/jquery.min.js"></script>
236
- <script nonce="siarashield-example-nonce" src="https://embedcdn.mycybersiara.com/CaptchaFormate/CaptchaResources.js"></script>
237
-
238
- <meta http-equiv="Content-Security-Policy" content="
239
- default-src 'self';
240
- script-src 'self' 'nonce-siarashield-example-nonce' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
241
- script-src-elem 'self' 'nonce-siarashield-example-nonce' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
242
- connect-src 'self' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
243
- style-src 'self' https://embed.mycybersiara.com https://mycybersiara.com https://fonts.googleapis.com https://cdnjs.cloudflare.com 'unsafe-inline';
244
- font-src 'self' https://fonts.gstatic.com https://mycybersiara.com https://cdnjs.cloudflare.com data:;
245
- img-src 'self' data: https://embed.mycybersiara.com https://embedcdn.mycybersiara.com https://mycybersiara.com;
246
- ">
247
- ```
248
-
249
- ### Strict production CSP policy (advanced)
250
-
251
- In production, send CSP as an HTTP response header and inject the same nonce value into script tags and `initSiaraShield({ cspNonce })`.
252
-
253
- ```http
254
- default-src 'self';
255
- script-src 'self' 'nonce-<dynamic>' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
256
- script-src-elem 'self' 'nonce-<dynamic>' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
257
- connect-src 'self' https://embed.mycybersiara.com https://embedcdn.mycybersiara.com;
258
- style-src 'self' https://embed.mycybersiara.com https://mycybersiara.com https://fonts.googleapis.com https://cdnjs.cloudflare.com;
259
- font-src 'self' https://fonts.gstatic.com https://mycybersiara.com https://cdnjs.cloudflare.com data:;
260
- img-src 'self' data: https://embed.mycybersiara.com https://embedcdn.mycybersiara.com https://mycybersiara.com;
261
- ```
262
-
263
- Example with the same server-generated nonce in script tags:
264
-
265
- ```html
266
- <script nonce="SIARASHIELD_NONCE">
267
- window.__cspNonce = "SIARASHIELD_NONCE";
268
- </script>
269
- <script nonce="SIARASHIELD_NONCE" src="https://embedcdn.mycybersiara.com/capcha-temple/js/jquery.min.js"></script>
270
- <script nonce="SIARASHIELD_NONCE" src="https://embedcdn.mycybersiara.com/CaptchaFormate/CaptchaResources.js"></script>
271
- ```
193
+ By default (`loadJQuery: true`) package loads required vendor resources automatically:
272
194
 
273
- If your Angular app initializes SiaraShield from the main application bundle, that bundle `<script>` tag must use the same nonce as the CSP header.
195
+ - `https://embedcdn.mycybersiara.com/capcha-temple/js/jquery.min.js` (fallback when jQuery not already present)
196
+ - `https://embedcdn.mycybersiara.com/CaptchaFormate/CaptchaResources.js`
197
+ - `https://embed.mycybersiara.com/CaptchaFormate/SiaraShield_Validation.js`
274
198
 
275
- `getSiaraShieldCspPolicy()` and `mergeSiaraShieldCspPolicy()` only generate a baseline CSP string. These helpers do not inject a nonce and do not apply headers. The server must inject the nonce and must apply the final `Content-Security-Policy` header.
199
+ Most users should **not** add these script tags manually.
276
200
 
277
- Notes:
201
+ If your app already has jQuery, set `[loadJQuery]="false"` (or `loadJQuery: false` in function API).
278
202
 
279
- - CSP helpers default to strict policy (no `script-src 'unsafe-inline'`).
280
- - For easiest client integration, use the compatibility policy above (`includeUnsafeInlineScript: true`, `includeUnsafeInlineStyle: true`).
281
- - Generating a new nonce in the browser (or per function call) does not help. CSP nonce must match the value from server response headers for that page load.
203
+ ## Advanced validation options
282
204
 
283
- The package still works in environments without CSP or with relaxed policies. If your site uses a strict nonce-based CSP, passing the server-generated nonce is required.
205
+ `checkCaptchaAsync(...)` and `checkSiaraShieldCaptchaAsync(...)` support optional tuning:
284
206
 
285
- ## jQuery loading behavior
207
+ - `timeoutMs`
208
+ - `pollIntervalMs`
209
+ - `beforeCheckDelayMs`
210
+ - `retryOnFalseMs` (default `0`)
211
+ - `falseResultTokenWaitMs` (default `900`)
286
212
 
287
- - Default `loadJQuery` is `true`.
288
- - If jQuery is not already available, the package loads:
289
- - `https://embedcdn.mycybersiara.com/capcha-temple/js/jquery.min.js`
290
- - The package also loads:
291
- - `https://embedcdn.mycybersiara.com/CaptchaFormate/CaptchaResources.js`
292
- - `https://embed.mycybersiara.com/CaptchaFormate/SiaraShield_Validation.js`
293
- - jQuery and the captcha bootstrap process may create script elements dynamically (including via HTML strings / DOM fragments).
294
- - When `cspNonce` is provided, dynamically inserted `<script>` elements are assigned that nonce (including scripts inserted indirectly through DOM manipulation).
295
- - The plugin includes a built-in guard that blocks vendor synthetic clicks on `.CaptchaSubmit` and suppresses rapid duplicate user clicks.
296
- - No application code changes are required for this guard.
297
- - This is required for compatibility with strict nonce-based CSP policies.
298
- - If a valid CSP nonce is required but not passed, browsers will block those script loads and the captcha will fail to initialize.
299
- - If your app already loads jQuery, set `loadJQuery: false`.
300
- - If your app loads jQuery from another CDN, allow that host in `script-src` and `script-src-elem`.
213
+ Default behavior is tuned to avoid requiring a second user click when token arrives slightly after first response.
301
214
 
302
215
  ## Quick troubleshooting
303
216
 
304
217
  - Captcha not visible:
305
- - If you use `<siara-shield ...>`, confirm the component is rendered (no `*ngIf` hiding it) and the page has finished loading scripts.
306
- - If you use the function API, confirm your template contains `<div class="SiaraShield"></div>`.
307
- - Confirm your submit button has `class="CaptchaSubmit"`.
218
+ - Confirm component is rendered and not hidden.
219
+ - Confirm submit button has `class="CaptchaSubmit"`.
220
+ - For function API, confirm `<div class="SiaraShield"></div>` exists.
308
221
  - `CheckCaptcha` not available:
309
- - Ensure initialization completed (for the function API: `await initSiaraShield(...)`).
310
- - Ensure CSP allows the required hosts and the correct nonce is used.
311
- - CSP error in console:
312
- - Confirm the same **server-generated nonce** is present in CSP header, bootstrapping `<script>` tag, and initialization (`cspNonce`).
313
- - A CSP warning/error on captcha popup close can still appear with current upstream vendor runtime on strict policies; if captcha flow still works, this is non-blocking. Use the compatibility policy (`includeUnsafeInlineScript: true`) when customer policy allows it.
314
- - `Identifier 'currentLangCode' has already been declared`:
315
- - This is a known vendor duplicate-inline-script issue during re-entry/navigation.
316
- - The package now blocks duplicate insertion for that vendor snippet; upgrade to the latest build.
317
- - Token empty -> check browser console and network calls after clicking submit.
318
-
319
- ## Final checklist (customer handover)
320
-
321
- - Public key is in frontend; private key stays only on backend.
322
- - Submit button includes `class="CaptchaSubmit"`.
323
- - Captcha container exists (component tag or `<div class="SiaraShield"></div>` for function API).
324
- - Same nonce value is used in CSP header, script tags, and `initSiaraShield({ cspNonce })`.
325
- - Captcha check runs before API call.
326
-
327
- ## Build and pack (library maintainers)
222
+ - Ensure initialization completed.
223
+ - Ensure CSP allows required hosts and nonce.
224
+ - Token not available immediately:
225
+ - Use async check methods (`checkCaptchaAsync` / `checkSiaraShieldCaptchaAsync`).
226
+ - CSP errors:
227
+ - Confirm same server-generated nonce in header, script tags, and `cspNonce`.
228
+
229
+ ## Final checklist
230
+
231
+ - Public key in frontend, private key only in backend.
232
+ - Submit button contains `CaptchaSubmit`.
233
+ - Captcha check runs before submit API call.
234
+ - Only one integration style is used per page.
235
+ - CSP nonce is wired correctly for strict CSP deployments.
236
+
237
+ ## Build and pack (maintainers)
328
238
 
329
239
  ```bash
330
240
  npm run build:lib
@@ -0,0 +1,98 @@
1
+ import { getSiaraShieldGlobals } from './siara-shield.globals';
2
+ const VENDOR_RUNTIME_PATCH_KEY = '__siaraShieldVendorRuntimePatchInstalled__';
3
+ const VENDOR_TOKEN_BRIDGE_KEY = '__siaraShieldVendorTokenBridgeInstalled__';
4
+ const WRAPPED_FN_PREFIX = '__siaraShieldWrappedVendorFn__';
5
+ function isKnownVendorNullDomError(error) {
6
+ const msg = error instanceof Error ? error.message.toLowerCase() : String(error ?? '').toLowerCase();
7
+ return (msg.includes("cannot read properties of null (reading 'style')") ||
8
+ msg.includes("cannot read properties of null (reading 'queryselector')") ||
9
+ msg.includes("cannot read properties of null (reading 'removechild')"));
10
+ }
11
+ function runFallbackChallengeOpen(excluding) {
12
+ const globals = getSiaraShieldGlobals();
13
+ const candidates = ['OpenCaptchaSlid', 'GetCyberSiara', 'Open_Pluin', 'Open_Plugin', 'Open_Plugin_'];
14
+ for (const name of candidates) {
15
+ if (name === excluding)
16
+ continue;
17
+ const fn = globals[name];
18
+ if (typeof fn !== 'function')
19
+ continue;
20
+ try {
21
+ fn();
22
+ return;
23
+ }
24
+ catch {
25
+ // Try next candidate.
26
+ }
27
+ }
28
+ }
29
+ function wrapVendorOpenFunction(name) {
30
+ const globals = getSiaraShieldGlobals();
31
+ const marker = `${WRAPPED_FN_PREFIX}${name}`;
32
+ if (globals[marker] === true)
33
+ return;
34
+ const candidate = globals[name];
35
+ if (typeof candidate !== 'function')
36
+ return;
37
+ const original = candidate;
38
+ globals[name] = ((...args) => {
39
+ try {
40
+ return original(...args);
41
+ }
42
+ catch (error) {
43
+ if (!isKnownVendorNullDomError(error)) {
44
+ throw error;
45
+ }
46
+ // Vendor challenge opener hit a missing DOM node.
47
+ // Try alternative open functions so challenge can still render.
48
+ runFallbackChallengeOpen(name);
49
+ return undefined;
50
+ }
51
+ });
52
+ globals[marker] = true;
53
+ }
54
+ function installVerifiedSubmitTokenBridge() {
55
+ const globals = getSiaraShieldGlobals();
56
+ if (globals[VENDOR_TOKEN_BRIDGE_KEY])
57
+ return;
58
+ const patchAjaxOwner = (owner) => {
59
+ if (!owner || typeof owner.ajax !== 'function')
60
+ return;
61
+ const originalAjax = owner.ajax.bind(owner);
62
+ owner.ajax = ((...args) => {
63
+ const firstArg = args[0];
64
+ if (!firstArg || typeof firstArg !== 'object') {
65
+ return originalAjax(...args);
66
+ }
67
+ const options = firstArg;
68
+ const url = String(options['url'] ?? '').toLowerCase();
69
+ const originalSuccess = options['success'];
70
+ if (!url.includes('/submitcaptcha/verifiedsubmit') || typeof originalSuccess !== 'function') {
71
+ return originalAjax(options);
72
+ }
73
+ options['success'] = ((response, ...rest) => {
74
+ const payload = response;
75
+ const maybeTokenRaw = payload?.data ?? payload?.Data;
76
+ if (typeof maybeTokenRaw === 'string' && maybeTokenRaw.trim()) {
77
+ globals.CyberSiaraToken = maybeTokenRaw.trim();
78
+ }
79
+ return originalSuccess(response, ...rest);
80
+ });
81
+ return originalAjax(options);
82
+ });
83
+ };
84
+ patchAjaxOwner(globals.$);
85
+ patchAjaxOwner(globals.JQuryName);
86
+ globals[VENDOR_TOKEN_BRIDGE_KEY] = true;
87
+ }
88
+ export function installVendorChallengeRuntimePatch() {
89
+ const globals = getSiaraShieldGlobals();
90
+ if (globals[VENDOR_RUNTIME_PATCH_KEY])
91
+ return;
92
+ wrapVendorOpenFunction('Open_Pluin');
93
+ wrapVendorOpenFunction('Open_Plugin');
94
+ wrapVendorOpenFunction('Open_Plugin_');
95
+ installVerifiedSubmitTokenBridge();
96
+ globals[VENDOR_RUNTIME_PATCH_KEY] = true;
97
+ }
98
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"siara-shield-vendor-runtime.js","sourceRoot":"","sources":["../../../../projects/siarashield-workspace/src/lib/siara-shield-vendor-runtime.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,qBAAqB,EAAE,MAAM,wBAAwB,CAAC;AAE/D,MAAM,wBAAwB,GAAG,4CAA4C,CAAC;AAC9E,MAAM,uBAAuB,GAAG,2CAA2C,CAAC;AAC5E,MAAM,iBAAiB,GAAG,gCAAgC,CAAC;AAM3D,SAAS,yBAAyB,CAAC,KAAc;IAC/C,MAAM,GAAG,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;IACrG,OAAO,CACL,GAAG,CAAC,QAAQ,CAAC,kDAAkD,CAAC;QAChE,GAAG,CAAC,QAAQ,CAAC,0DAA0D,CAAC;QACxE,GAAG,CAAC,QAAQ,CAAC,wDAAwD,CAAC,CACvE,CAAC;AACJ,CAAC;AAED,SAAS,wBAAwB,CAAC,SAA+B;IAC/D,MAAM,OAAO,GAAG,qBAAqB,EAAiD,CAAC;IACvF,MAAM,UAAU,GAA2B,CAAC,iBAAiB,EAAE,eAAe,EAAE,YAAY,EAAE,aAAa,EAAE,cAAc,CAAC,CAAC;IAE7H,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;QAC9B,IAAI,IAAI,KAAK,SAAS;YAAE,SAAS;QACjC,MAAM,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;QACzB,IAAI,OAAO,EAAE,KAAK,UAAU;YAAE,SAAS;QACvC,IAAI,CAAC;YACF,EAAe,EAAE,CAAC;YACnB,OAAO;QACT,CAAC;QAAC,MAAM,CAAC;YACP,sBAAsB;QACxB,CAAC;IACH,CAAC;AACH,CAAC;AAED,SAAS,sBAAsB,CAAC,IAAkB;IAChD,MAAM,OAAO,GAAG,qBAAqB,EAAiD,CAAC;IACvF,MAAM,MAAM,GAAG,GAAG,iBAAiB,GAAG,IAAI,EAAE,CAAC;IAC7C,IAAI,OAAO,CAAC,MAAM,CAAC,KAAK,IAAI;QAAE,OAAO;IAErC,MAAM,SAAS,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IAChC,IAAI,OAAO,SAAS,KAAK,UAAU;QAAE,OAAO;IAE5C,MAAM,QAAQ,GAAG,SAAqB,CAAC;IACvC,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,IAAe,EAAE,EAAE;QACtC,IAAI,CAAC;YACH,OAAO,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC;QAC3B,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,yBAAyB,CAAC,KAAK,CAAC,EAAE,CAAC;gBACtC,MAAM,KAAK,CAAC;YACd,CAAC;YAED,kDAAkD;YAClD,gEAAgE;YAChE,wBAAwB,CAAC,IAAI,CAAC,CAAC;YAC/B,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC,CAAY,CAAC;IACd,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC;AACzB,CAAC;AAED,SAAS,gCAAgC;IACvC,MAAM,OAAO,GAAG,qBAAqB,EAKpC,CAAC;IACF,IAAI,OAAO,CAAC,uBAAuB,CAAC;QAAE,OAAO;IAE7C,MAAM,cAAc,GAAG,CAAC,KAA6D,EAAQ,EAAE;QAC7F,IAAI,CAAC,KAAK,IAAI,OAAO,KAAK,CAAC,IAAI,KAAK,UAAU;YAAE,OAAO;QACvD,MAAM,YAAY,GAAG,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAE5C,KAAK,CAAC,IAAI,GAAG,CAAC,CAAC,GAAG,IAAe,EAAE,EAAE;YACnC,MAAM,QAAQ,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YACzB,IAAI,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;gBAC9C,OAAO,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC;YAC/B,CAAC;YAED,MAAM,OAAO,GAAG,QAAmC,CAAC;YACpD,MAAM,GAAG,GAAG,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;YACvD,MAAM,eAAe,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC;YAC3C,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,+BAA+B,CAAC,IAAI,OAAO,eAAe,KAAK,UAAU,EAAE,CAAC;gBAC5F,OAAO,YAAY,CAAC,OAAO,CAAC,CAAC;YAC/B,CAAC;YAED,OAAO,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,QAAiB,EAAE,GAAG,IAAe,EAAE,EAAE;gBAC9D,MAAM,OAAO,GAAG,QAAqD,CAAC;gBACtE,MAAM,aAAa,GAAG,OAAO,EAAE,IAAI,IAAI,OAAO,EAAE,IAAI,CAAC;gBACrD,IAAI,OAAO,aAAa,KAAK,QAAQ,IAAI,aAAa,CAAC,IAAI,EAAE,EAAE,CAAC;oBAC9D,OAAO,CAAC,eAAe,GAAG,aAAa,CAAC,IAAI,EAAE,CAAC;gBACjD,CAAC;gBAED,OAAQ,eAAqD,CAAC,QAAQ,EAAE,GAAG,IAAI,CAAC,CAAC;YACnF,CAAC,CAAY,CAAC;YAEd,OAAO,YAAY,CAAC,OAAO,CAAC,CAAC;QAC/B,CAAC,CAAsB,CAAC;IAC1B,CAAC,CAAC;IAEF,cAAc,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IAC1B,cAAc,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;IAClC,OAAO,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC;AAC1C,CAAC;AAED,MAAM,UAAU,kCAAkC;IAChD,MAAM,OAAO,GAAG,qBAAqB,EAEpC,CAAC;IACF,IAAI,OAAO,CAAC,wBAAwB,CAAC;QAAE,OAAO;IAE9C,sBAAsB,CAAC,YAAY,CAAC,CAAC;IACrC,sBAAsB,CAAC,aAAa,CAAC,CAAC;IACtC,sBAAsB,CAAC,cAAc,CAAC,CAAC;IACvC,gCAAgC,EAAE,CAAC;IACnC,OAAO,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC;AAC3C,CAAC","sourcesContent":["import { getSiaraShieldGlobals } from './siara-shield.globals';\r\n\r\nconst VENDOR_RUNTIME_PATCH_KEY = '__siaraShieldVendorRuntimePatchInstalled__';\r\nconst VENDOR_TOKEN_BRIDGE_KEY = '__siaraShieldVendorTokenBridgeInstalled__';\r\nconst WRAPPED_FN_PREFIX = '__siaraShieldWrappedVendorFn__';\r\n\r\ntype VendorFnName = 'Open_Pluin' | 'Open_Plugin' | 'Open_Plugin_';\r\ntype OptionalVendorFnName = VendorFnName | 'OpenCaptchaSlid' | 'GetCyberSiara';\r\ntype VendorFn = (...args: unknown[]) => unknown;\r\n\r\nfunction isKnownVendorNullDomError(error: unknown): boolean {\r\n  const msg = error instanceof Error ? error.message.toLowerCase() : String(error ?? '').toLowerCase();\r\n  return (\r\n    msg.includes(\"cannot read properties of null (reading 'style')\") ||\r\n    msg.includes(\"cannot read properties of null (reading 'queryselector')\") ||\r\n    msg.includes(\"cannot read properties of null (reading 'removechild')\")\r\n  );\r\n}\r\n\r\nfunction runFallbackChallengeOpen(excluding: OptionalVendorFnName): void {\r\n  const globals = getSiaraShieldGlobals() as typeof globalThis & Record<string, unknown>;\r\n  const candidates: OptionalVendorFnName[] = ['OpenCaptchaSlid', 'GetCyberSiara', 'Open_Pluin', 'Open_Plugin', 'Open_Plugin_'];\r\n\r\n  for (const name of candidates) {\r\n    if (name === excluding) continue;\r\n    const fn = globals[name];\r\n    if (typeof fn !== 'function') continue;\r\n    try {\r\n      (fn as VendorFn)();\r\n      return;\r\n    } catch {\r\n      // Try next candidate.\r\n    }\r\n  }\r\n}\r\n\r\nfunction wrapVendorOpenFunction(name: VendorFnName): void {\r\n  const globals = getSiaraShieldGlobals() as typeof globalThis & Record<string, unknown>;\r\n  const marker = `${WRAPPED_FN_PREFIX}${name}`;\r\n  if (globals[marker] === true) return;\r\n\r\n  const candidate = globals[name];\r\n  if (typeof candidate !== 'function') return;\r\n\r\n  const original = candidate as VendorFn;\r\n  globals[name] = ((...args: unknown[]) => {\r\n    try {\r\n      return original(...args);\r\n    } catch (error) {\r\n      if (!isKnownVendorNullDomError(error)) {\r\n        throw error;\r\n      }\r\n\r\n      // Vendor challenge opener hit a missing DOM node.\r\n      // Try alternative open functions so challenge can still render.\r\n      runFallbackChallengeOpen(name);\r\n      return undefined;\r\n    }\r\n  }) as unknown;\r\n  globals[marker] = true;\r\n}\r\n\r\nfunction installVerifiedSubmitTokenBridge(): void {\r\n  const globals = getSiaraShieldGlobals() as typeof globalThis & {\r\n    [VENDOR_TOKEN_BRIDGE_KEY]?: boolean;\r\n    JQuryName?: { ajax?: (...args: unknown[]) => unknown };\r\n    $?: { ajax?: (...args: unknown[]) => unknown };\r\n    CyberSiaraToken?: string;\r\n  };\r\n  if (globals[VENDOR_TOKEN_BRIDGE_KEY]) return;\r\n\r\n  const patchAjaxOwner = (owner: { ajax?: (...args: unknown[]) => unknown } | undefined): void => {\r\n    if (!owner || typeof owner.ajax !== 'function') return;\r\n    const originalAjax = owner.ajax.bind(owner);\r\n\r\n    owner.ajax = ((...args: unknown[]) => {\r\n      const firstArg = args[0];\r\n      if (!firstArg || typeof firstArg !== 'object') {\r\n        return originalAjax(...args);\r\n      }\r\n\r\n      const options = firstArg as Record<string, unknown>;\r\n      const url = String(options['url'] ?? '').toLowerCase();\r\n      const originalSuccess = options['success'];\r\n      if (!url.includes('/submitcaptcha/verifiedsubmit') || typeof originalSuccess !== 'function') {\r\n        return originalAjax(options);\r\n      }\r\n\r\n      options['success'] = ((response: unknown, ...rest: unknown[]) => {\r\n        const payload = response as { data?: unknown; Data?: unknown } | null;\r\n        const maybeTokenRaw = payload?.data ?? payload?.Data;\r\n        if (typeof maybeTokenRaw === 'string' && maybeTokenRaw.trim()) {\r\n          globals.CyberSiaraToken = maybeTokenRaw.trim();\r\n        }\r\n\r\n        return (originalSuccess as (...fnArgs: unknown[]) => unknown)(response, ...rest);\r\n      }) as unknown;\r\n\r\n      return originalAjax(options);\r\n    }) as typeof owner.ajax;\r\n  };\r\n\r\n  patchAjaxOwner(globals.$);\r\n  patchAjaxOwner(globals.JQuryName);\r\n  globals[VENDOR_TOKEN_BRIDGE_KEY] = true;\r\n}\r\n\r\nexport function installVendorChallengeRuntimePatch(): void {\r\n  const globals = getSiaraShieldGlobals() as typeof globalThis & {\r\n    [VENDOR_RUNTIME_PATCH_KEY]?: boolean;\r\n  };\r\n  if (globals[VENDOR_RUNTIME_PATCH_KEY]) return;\r\n\r\n  wrapVendorOpenFunction('Open_Pluin');\r\n  wrapVendorOpenFunction('Open_Plugin');\r\n  wrapVendorOpenFunction('Open_Plugin_');\r\n  installVerifiedSubmitTokenBridge();\r\n  globals[VENDOR_RUNTIME_PATCH_KEY] = true;\r\n}\r\n"]}