@auth0/auth0-spa-js 2.16.0 → 2.17.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,7 @@
1
1
  (function(global, factory) {
2
2
  typeof exports === "object" && typeof module !== "undefined" ? factory(exports) : typeof define === "function" && define.amd ? define([ "exports" ], factory) : (global = typeof globalThis !== "undefined" ? globalThis : global || self,
3
3
  factory(global.auth0 = {}));
4
- })(this, (function(exports) {
4
+ })(this, function(exports) {
5
5
  "use strict";
6
6
  function __rest(s, e) {
7
7
  var t = {};
@@ -15,7 +15,7 @@
15
15
  var e = new Error(message);
16
16
  return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
17
17
  };
18
- var version = "2.16.0";
18
+ var version = "2.17.1";
19
19
  const DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS = 60;
20
20
  const DEFAULT_POPUP_CONFIG_OPTIONS = {
21
21
  timeoutInSeconds: DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS
@@ -27,6 +27,7 @@
27
27
  const MISSING_REFRESH_TOKEN_ERROR_MESSAGE = "Missing Refresh Token";
28
28
  const INVALID_REFRESH_TOKEN_ERROR_MESSAGE = "invalid refresh token";
29
29
  const USER_BLOCKED_ERROR_MESSAGE = "user is blocked";
30
+ const MFA_STEP_UP_ERROR_DESCRIPTION = "Multifactor authentication required";
30
31
  const DEFAULT_SCOPE = "openid profile email";
31
32
  const DEFAULT_SESSION_CHECK_EXPIRY_DAYS = 1;
32
33
  const DEFAULT_AUTH0_CLIENT = {
@@ -142,7 +143,7 @@
142
143
  };
143
144
  const runIframe = function runIframe(authorizeUrl, eventOrigin) {
144
145
  let timeoutInSeconds = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS;
145
- return new Promise(((res, rej) => {
146
+ return new Promise((res, rej) => {
146
147
  const iframe = window.document.createElement("iframe");
147
148
  iframe.setAttribute("width", "0");
148
149
  iframe.setAttribute("height", "0");
@@ -154,10 +155,10 @@
154
155
  }
155
156
  };
156
157
  let _iframeEventHandler;
157
- const timeoutSetTimeoutId = setTimeout((() => {
158
+ const timeoutSetTimeoutId = setTimeout(() => {
158
159
  rej(new TimeoutError);
159
160
  removeIframe();
160
- }), timeoutInSeconds * 1e3);
161
+ }, timeoutInSeconds * 1e3);
161
162
  _iframeEventHandler = function iframeEventHandler(e) {
162
163
  if (e.origin != eventOrigin) return;
163
164
  if (!e.data || e.data.type !== "authorization_response") return;
@@ -173,7 +174,7 @@
173
174
  window.addEventListener("message", _iframeEventHandler, false);
174
175
  window.document.body.appendChild(iframe);
175
176
  iframe.setAttribute("src", authorizeUrl);
176
- }));
177
+ });
177
178
  };
178
179
  const openPopup = url => {
179
180
  const width = 400;
@@ -182,21 +183,21 @@
182
183
  const top = window.screenY + (window.innerHeight - height) / 2;
183
184
  return window.open(url, "auth0:authorize:popup", "left=".concat(left, ",top=").concat(top, ",width=").concat(width, ",height=").concat(height, ",resizable,scrollbars=yes,status=1"));
184
185
  };
185
- const runPopup = config => new Promise(((resolve, reject) => {
186
+ const runPopup = config => new Promise((resolve, reject) => {
186
187
  let _popupEventListener;
187
- const popupTimer = setInterval((() => {
188
+ const popupTimer = setInterval(() => {
188
189
  if (config.popup && config.popup.closed) {
189
190
  clearInterval(popupTimer);
190
191
  clearTimeout(timeoutId);
191
192
  window.removeEventListener("message", _popupEventListener, false);
192
193
  reject(new PopupCancelledError(config.popup));
193
194
  }
194
- }), 1e3);
195
- const timeoutId = setTimeout((() => {
195
+ }, 1e3);
196
+ const timeoutId = setTimeout(() => {
196
197
  clearInterval(popupTimer);
197
198
  reject(new PopupTimeoutError(config.popup));
198
199
  window.removeEventListener("message", _popupEventListener, false);
199
- }), (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
200
+ }, (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
200
201
  _popupEventListener = function popupEventListener(e) {
201
202
  if (!e.data || e.data.type !== "authorization_response") {
202
203
  return;
@@ -213,19 +214,19 @@
213
214
  resolve(e.data.response);
214
215
  };
215
216
  window.addEventListener("message", _popupEventListener);
216
- }));
217
+ });
217
218
  const getCrypto = () => window.crypto;
218
219
  const createRandomString = () => {
219
220
  const charset = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-_~.";
220
221
  let random = "";
221
222
  const randomValues = Array.from(getCrypto().getRandomValues(new Uint8Array(43)));
222
- randomValues.forEach((v => random += charset[v % charset.length]));
223
+ randomValues.forEach(v => random += charset[v % charset.length]);
223
224
  return random;
224
225
  };
225
226
  const encode$2 = value => btoa(value);
226
- const stripUndefined = params => Object.keys(params).filter((k => typeof params[k] !== "undefined")).reduce(((acc, key) => Object.assign(Object.assign({}, acc), {
227
+ const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
227
228
  [key]: params[key]
228
- })), {});
229
+ }), {});
229
230
  const ALLOWED_AUTH0CLIENT_PROPERTIES = [ {
230
231
  key: "name",
231
232
  type: [ "string" ]
@@ -238,16 +239,16 @@
238
239
  } ];
239
240
  const stripAuth0Client = function stripAuth0Client(auth0Client) {
240
241
  let excludeEnv = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : false;
241
- return Object.keys(auth0Client).reduce(((acc, key) => {
242
+ return Object.keys(auth0Client).reduce((acc, key) => {
242
243
  if (excludeEnv && key === "env") {
243
244
  return acc;
244
245
  }
245
- const allowedProperty = ALLOWED_AUTH0CLIENT_PROPERTIES.find((p => p.key === key));
246
+ const allowedProperty = ALLOWED_AUTH0CLIENT_PROPERTIES.find(p => p.key === key);
246
247
  if (allowedProperty && allowedProperty.type.includes(typeof auth0Client[key])) {
247
248
  acc[key] = auth0Client[key];
248
249
  }
249
250
  return acc;
250
- }), {});
251
+ }, {});
251
252
  };
252
253
  const createQueryParams = _a => {
253
254
  var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
@@ -267,9 +268,9 @@
267
268
  "/": "_",
268
269
  "=": ""
269
270
  };
270
- return input.replace(/[+/=]/g, (m => b64Chars[m]));
271
+ return input.replace(/[+/=]/g, m => b64Chars[m]);
271
272
  };
272
- const decodeB64 = input => decodeURIComponent(atob(input).split("").map((c => "%" + ("00" + c.charCodeAt(0).toString(16)).slice(-2))).join(""));
273
+ const decodeB64 = input => decodeURIComponent(atob(input).split("").map(c => "%" + ("00" + c.charCodeAt(0).toString(16)).slice(-2)).join(""));
273
274
  const urlDecodeB64 = input => decodeB64(input.replace(/_/g, "/").replace(/-/g, "+"));
274
275
  const bufferToBase64UrlEncoded = input => {
275
276
  const ie11SafeInput = new Uint8Array(input);
@@ -301,11 +302,11 @@
301
302
  }
302
303
  return parseInt(value, 10) || undefined;
303
304
  };
304
- const fromEntries = iterable => [ ...iterable ].reduce(((obj, _ref) => {
305
+ const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
305
306
  let [key, val] = _ref;
306
307
  obj[key] = val;
307
308
  return obj;
308
- }), {});
309
+ }, {});
309
310
  var commonjsGlobal = typeof globalThis !== "undefined" ? globalThis : typeof window !== "undefined" ? window : typeof global !== "undefined" ? global : typeof self !== "undefined" ? self : {};
310
311
  var browserTabsLock = {};
311
312
  var processLock = {};
@@ -335,14 +336,14 @@
335
336
  return _this.locked.has(key);
336
337
  };
337
338
  this.lock = function(key) {
338
- return new Promise((function(resolve, reject) {
339
+ return new Promise(function(resolve, reject) {
339
340
  if (_this.isLocked(key)) {
340
341
  _this.addToLocked(key, resolve);
341
342
  } else {
342
343
  _this.addToLocked(key);
343
344
  resolve();
344
345
  }
345
- }));
346
+ });
346
347
  };
347
348
  this.unlock = function(key) {
348
349
  var callbacks = _this.locked.get(key);
@@ -370,7 +371,7 @@
370
371
  }
371
372
  processLock.default = getLock;
372
373
  var __awaiter = commonjsGlobal && commonjsGlobal.__awaiter || function(thisArg, _arguments, P, generator) {
373
- return new (P || (P = Promise))((function(resolve, reject) {
374
+ return new (P || (P = Promise))(function(resolve, reject) {
374
375
  function fulfilled(value) {
375
376
  try {
376
377
  step(generator.next(value));
@@ -386,12 +387,12 @@
386
387
  }
387
388
  }
388
389
  function step(result) {
389
- result.done ? resolve(result.value) : new P((function(resolve) {
390
+ result.done ? resolve(result.value) : new P(function(resolve) {
390
391
  resolve(result.value);
391
- })).then(fulfilled, rejected);
392
+ }).then(fulfilled, rejected);
392
393
  }
393
394
  step((generator = generator.apply(thisArg, _arguments || [])).next());
394
- }));
395
+ });
395
396
  };
396
397
  var __generator = commonjsGlobal && commonjsGlobal.__generator || function(thisArg, body) {
397
398
  var _ = {
@@ -490,39 +491,39 @@
490
491
  var LOCK_STORAGE_KEY = "browser-tabs-lock-key";
491
492
  var DEFAULT_STORAGE_HANDLER = {
492
493
  key: function(index) {
493
- return __awaiter(_this, void 0, void 0, (function() {
494
- return __generator(this, (function(_a) {
494
+ return __awaiter(_this, void 0, void 0, function() {
495
+ return __generator(this, function(_a) {
495
496
  throw new Error("Unsupported");
496
- }));
497
- }));
497
+ });
498
+ });
498
499
  },
499
500
  getItem: function(key) {
500
- return __awaiter(_this, void 0, void 0, (function() {
501
- return __generator(this, (function(_a) {
501
+ return __awaiter(_this, void 0, void 0, function() {
502
+ return __generator(this, function(_a) {
502
503
  throw new Error("Unsupported");
503
- }));
504
- }));
504
+ });
505
+ });
505
506
  },
506
507
  clear: function() {
507
- return __awaiter(_this, void 0, void 0, (function() {
508
- return __generator(this, (function(_a) {
508
+ return __awaiter(_this, void 0, void 0, function() {
509
+ return __generator(this, function(_a) {
509
510
  return [ 2, window.localStorage.clear() ];
510
- }));
511
- }));
511
+ });
512
+ });
512
513
  },
513
514
  removeItem: function(key) {
514
- return __awaiter(_this, void 0, void 0, (function() {
515
- return __generator(this, (function(_a) {
515
+ return __awaiter(_this, void 0, void 0, function() {
516
+ return __generator(this, function(_a) {
516
517
  throw new Error("Unsupported");
517
- }));
518
- }));
518
+ });
519
+ });
519
520
  },
520
521
  setItem: function(key, value) {
521
- return __awaiter(_this, void 0, void 0, (function() {
522
- return __generator(this, (function(_a) {
522
+ return __awaiter(_this, void 0, void 0, function() {
523
+ return __generator(this, function(_a) {
523
524
  throw new Error("Unsupported");
524
- }));
525
- }));
525
+ });
526
+ });
526
527
  },
527
528
  keySync: function(index) {
528
529
  return window.localStorage.key(index);
@@ -541,9 +542,9 @@
541
542
  }
542
543
  };
543
544
  function delay(milliseconds) {
544
- return new Promise((function(resolve) {
545
+ return new Promise(function(resolve) {
545
546
  return setTimeout(resolve, milliseconds);
546
- }));
547
+ });
547
548
  }
548
549
  function generateRandomString(length) {
549
550
  var CHARS = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXTZabcdefghiklmnopqrstuvwxyz";
@@ -576,9 +577,9 @@
576
577
  if (timeout === void 0) {
577
578
  timeout = 5e3;
578
579
  }
579
- return __awaiter(this, void 0, void 0, (function() {
580
+ return __awaiter(this, void 0, void 0, function() {
580
581
  var iat, MAX_TIME, STORAGE_KEY, STORAGE, lockObj, TIMEOUT_KEY, lockObjPostDelay, parsedLockObjPostDelay;
581
- return __generator(this, (function(_a) {
582
+ return __generator(this, function(_a) {
582
583
  switch (_a.label) {
583
584
  case 0:
584
585
  iat = Date.now() + generateRandomString(4);
@@ -637,17 +638,17 @@
637
638
  case 8:
638
639
  return [ 2, false ];
639
640
  }
640
- }));
641
- }));
641
+ });
642
+ });
642
643
  };
643
644
  SuperTokensLock.prototype.refreshLockWhileAcquired = function(storageKey, iat) {
644
- return __awaiter(this, void 0, void 0, (function() {
645
+ return __awaiter(this, void 0, void 0, function() {
645
646
  var _this = this;
646
- return __generator(this, (function(_a) {
647
- setTimeout((function() {
648
- return __awaiter(_this, void 0, void 0, (function() {
647
+ return __generator(this, function(_a) {
648
+ setTimeout(function() {
649
+ return __awaiter(_this, void 0, void 0, function() {
649
650
  var STORAGE, lockObj, parsedLockObj;
650
- return __generator(this, (function(_a) {
651
+ return __generator(this, function(_a) {
651
652
  switch (_a.label) {
652
653
  case 0:
653
654
  return [ 4, processLock_1.default().lock(iat) ];
@@ -672,19 +673,19 @@
672
673
  this.refreshLockWhileAcquired(storageKey, iat);
673
674
  return [ 2 ];
674
675
  }
675
- }));
676
- }));
677
- }), 1e3);
676
+ });
677
+ });
678
+ }, 1e3);
678
679
  return [ 2 ];
679
- }));
680
- }));
680
+ });
681
+ });
681
682
  };
682
683
  SuperTokensLock.prototype.waitForSomethingToChange = function(MAX_TIME) {
683
- return __awaiter(this, void 0, void 0, (function() {
684
- return __generator(this, (function(_a) {
684
+ return __awaiter(this, void 0, void 0, function() {
685
+ return __generator(this, function(_a) {
685
686
  switch (_a.label) {
686
687
  case 0:
687
- return [ 4, new Promise((function(resolve) {
688
+ return [ 4, new Promise(function(resolve) {
688
689
  var resolvedCalled = false;
689
690
  var startedAt = Date.now();
690
691
  var MIN_TIME_TO_WAIT = 50;
@@ -709,14 +710,14 @@
709
710
  window.addEventListener("storage", stopWaiting);
710
711
  SuperTokensLock.addToWaiting(stopWaiting);
711
712
  var timeOutId = setTimeout(stopWaiting, Math.max(0, MAX_TIME - Date.now()));
712
- })) ];
713
+ }) ];
713
714
 
714
715
  case 1:
715
716
  _a.sent();
716
717
  return [ 2 ];
717
718
  }
718
- }));
719
- }));
719
+ });
720
+ });
720
721
  };
721
722
  SuperTokensLock.addToWaiting = function(func) {
722
723
  this.removeFromWaiting(func);
@@ -729,22 +730,22 @@
729
730
  if (SuperTokensLock.waiters === undefined) {
730
731
  return;
731
732
  }
732
- SuperTokensLock.waiters = SuperTokensLock.waiters.filter((function(i) {
733
+ SuperTokensLock.waiters = SuperTokensLock.waiters.filter(function(i) {
733
734
  return i !== func;
734
- }));
735
+ });
735
736
  };
736
737
  SuperTokensLock.notifyWaiters = function() {
737
738
  if (SuperTokensLock.waiters === undefined) {
738
739
  return;
739
740
  }
740
741
  var waiters = SuperTokensLock.waiters.slice();
741
- waiters.forEach((function(i) {
742
+ waiters.forEach(function(i) {
742
743
  return i();
743
- }));
744
+ });
744
745
  };
745
746
  SuperTokensLock.prototype.releaseLock = function(lockKey) {
746
- return __awaiter(this, void 0, void 0, (function() {
747
- return __generator(this, (function(_a) {
747
+ return __awaiter(this, void 0, void 0, function() {
748
+ return __generator(this, function(_a) {
748
749
  switch (_a.label) {
749
750
  case 0:
750
751
  return [ 4, this.releaseLock__private__(lockKey) ];
@@ -752,13 +753,13 @@
752
753
  case 1:
753
754
  return [ 2, _a.sent() ];
754
755
  }
755
- }));
756
- }));
756
+ });
757
+ });
757
758
  };
758
759
  SuperTokensLock.prototype.releaseLock__private__ = function(lockKey) {
759
- return __awaiter(this, void 0, void 0, (function() {
760
+ return __awaiter(this, void 0, void 0, function() {
760
761
  var STORAGE, STORAGE_KEY, lockObj, parsedlockObj;
761
- return __generator(this, (function(_a) {
762
+ return __generator(this, function(_a) {
762
763
  switch (_a.label) {
763
764
  case 0:
764
765
  STORAGE = this.storageHandler === undefined ? DEFAULT_STORAGE_HANDLER : this.storageHandler;
@@ -782,8 +783,8 @@
782
783
  case 2:
783
784
  return [ 2 ];
784
785
  }
785
- }));
786
- }));
786
+ });
787
+ });
787
788
  };
788
789
  SuperTokensLock.lockCorrector = function(storageHandler) {
789
790
  var MIN_ALLOWED_TIME = Date.now() - 5e3;
@@ -823,16 +824,16 @@
823
824
  class WebLocksApiManager {
824
825
  async runWithLock(key, timeout, callback) {
825
826
  const controller = new AbortController;
826
- const timeoutId = setTimeout((() => controller.abort()), timeout);
827
+ const timeoutId = setTimeout(() => controller.abort(), timeout);
827
828
  try {
828
829
  return await navigator.locks.request(key, {
829
830
  mode: "exclusive",
830
831
  signal: controller.signal
831
- }, (async lock => {
832
+ }, async lock => {
832
833
  clearTimeout(timeoutId);
833
834
  if (!lock) throw new Error("Lock not available");
834
835
  return await callback();
835
- }));
836
+ });
836
837
  } catch (error) {
837
838
  clearTimeout(timeoutId);
838
839
  if ((error === null || error === void 0 ? void 0 : error.name) === "AbortError") throw new TimeoutError;
@@ -845,7 +846,7 @@
845
846
  this.activeLocks = new Set;
846
847
  this.lock = new _default;
847
848
  this.pagehideHandler = () => {
848
- this.activeLocks.forEach((key => this.lock.releaseLock(key)));
849
+ this.activeLocks.forEach(key => this.lock.releaseLock(key));
849
850
  this.activeLocks.clear();
850
851
  };
851
852
  }
@@ -1197,7 +1198,7 @@
1197
1198
  function isGrantTypeSupported(grantType) {
1198
1199
  return SUPPORTED_GRANT_TYPES.includes(grantType);
1199
1200
  }
1200
- const sendMessage = (message, to) => new Promise((function(resolve, reject) {
1201
+ const sendMessage = (message, to) => new Promise(function(resolve, reject) {
1201
1202
  const messageChannel = new MessageChannel;
1202
1203
  messageChannel.port1.onmessage = function(event) {
1203
1204
  if (event.data.error) {
@@ -1208,7 +1209,7 @@
1208
1209
  messageChannel.port1.close();
1209
1210
  };
1210
1211
  to.postMessage(message, [ messageChannel.port2 ]);
1211
- }));
1212
+ });
1212
1213
  const createAbortController = () => new AbortController;
1213
1214
  const dofetch = async (fetchUrl, fetchOptions) => {
1214
1215
  const response = await fetch(fetchUrl, fetchOptions);
@@ -1222,14 +1223,14 @@
1222
1223
  const controller = createAbortController();
1223
1224
  fetchOptions.signal = controller.signal;
1224
1225
  let timeoutId;
1225
- return Promise.race([ dofetch(fetchUrl, fetchOptions), new Promise(((_, reject) => {
1226
- timeoutId = setTimeout((() => {
1226
+ return Promise.race([ dofetch(fetchUrl, fetchOptions), new Promise((_, reject) => {
1227
+ timeoutId = setTimeout(() => {
1227
1228
  controller.abort();
1228
1229
  reject(new Error("Timeout when executing 'fetch'"));
1229
- }), timeout);
1230
- })) ]).finally((() => {
1230
+ }, timeout);
1231
+ }) ]).finally(() => {
1231
1232
  clearTimeout(timeoutId);
1232
- }));
1233
+ });
1233
1234
  };
1234
1235
  const fetchWithWorker = async (fetchUrl, audience, scope, fetchOptions, timeout, worker, useFormData, useMrrt) => sendMessage({
1235
1236
  auth: {
@@ -1344,10 +1345,10 @@
1344
1345
  let requestedScopes = {
1345
1346
  [DEFAULT_AUDIENCE]: getUniqueScopes(openIdScope, ...extraScopes)
1346
1347
  };
1347
- Object.keys(authScopes).forEach((key => {
1348
+ Object.keys(authScopes).forEach(key => {
1348
1349
  const audienceScopes = authScopes[key];
1349
1350
  requestedScopes[key] = getUniqueScopes(openIdScope, audienceScopes, ...extraScopes);
1350
- }));
1351
+ });
1351
1352
  return requestedScopes;
1352
1353
  };
1353
1354
  const scopesToRequest = (authScopes, methodScopes, audience) => {
@@ -1410,7 +1411,7 @@
1410
1411
  localStorage.removeItem(key);
1411
1412
  }
1412
1413
  allKeys() {
1413
- return Object.keys(window.localStorage).filter((key => key.startsWith(CACHE_KEY_PREFIX)));
1414
+ return Object.keys(window.localStorage).filter(key => key.startsWith(CACHE_KEY_PREFIX));
1414
1415
  }
1415
1416
  }
1416
1417
  class InMemoryCache {
@@ -1545,10 +1546,10 @@
1545
1546
  var _a;
1546
1547
  const keys = await this.getCacheKeys();
1547
1548
  if (!keys) return;
1548
- await keys.filter((key => clientId ? key.includes(clientId) : true)).reduce((async (memo, key) => {
1549
+ await keys.filter(key => clientId ? key.includes(clientId) : true).reduce(async (memo, key) => {
1549
1550
  await memo;
1550
1551
  await this.cache.remove(key);
1551
- }), Promise.resolve());
1552
+ }, Promise.resolve());
1552
1553
  await ((_a = this.keyManifest) === null || _a === void 0 ? void 0 : _a.clear());
1553
1554
  }
1554
1555
  async wrapCacheEntry(entry) {
@@ -1573,14 +1574,14 @@
1573
1574
  }, CACHE_KEY_PREFIX, CACHE_KEY_ID_TOKEN_SUFFIX).toKey();
1574
1575
  }
1575
1576
  matchExistingCacheKey(keyToMatch, allKeys) {
1576
- return allKeys.filter((key => {
1577
+ return allKeys.filter(key => {
1577
1578
  var _a;
1578
1579
  const cacheKey = CacheKey.fromKey(key);
1579
1580
  const scopeSet = new Set(cacheKey.scope && cacheKey.scope.split(" "));
1580
1581
  const scopesToMatch = ((_a = keyToMatch.scope) === null || _a === void 0 ? void 0 : _a.split(" ")) || [];
1581
- const hasAllScopes = cacheKey.scope && scopesToMatch.reduce(((acc, current) => acc && scopeSet.has(current)), true);
1582
+ const hasAllScopes = cacheKey.scope && scopesToMatch.reduce((acc, current) => acc && scopeSet.has(current), true);
1582
1583
  return cacheKey.prefix === CACHE_KEY_PREFIX && cacheKey.clientId === keyToMatch.clientId && cacheKey.audience === keyToMatch.audience && hasAllScopes;
1583
- }))[0];
1584
+ })[0];
1584
1585
  }
1585
1586
  async getEntryWithRefreshToken(keyToMatch, allKeys) {
1586
1587
  var _a;
@@ -1644,12 +1645,12 @@
1644
1645
  __raw: token
1645
1646
  };
1646
1647
  const user = {};
1647
- Object.keys(payloadJSON).forEach((k => {
1648
+ Object.keys(payloadJSON).forEach(k => {
1648
1649
  claims[k] = payloadJSON[k];
1649
1650
  if (!idTokendecoded.includes(k)) {
1650
1651
  user[k] = payloadJSON[k];
1651
1652
  }
1652
- }));
1653
+ });
1653
1654
  return {
1654
1655
  encoded: {
1655
1656
  header: header,
@@ -1941,15 +1942,15 @@
1941
1942
  return new Worker(url, options);
1942
1943
  };
1943
1944
  }
1944
- var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter((k => typeof params[k] !== "undefined")).reduce(((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    })), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce(((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }), {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise((resolve => setTimeout(resolve, time)));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach(((val, key) => {
            parsedQuery[key] = val;
        }));
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach((_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        }));
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find((key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every((key => scopesKey.includes(key)));
                return isSameAudience && scopesAreIncluded;
            }
        }));
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
1945
+ var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    }), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }, {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise(resolve => setTimeout(resolve, time));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach((val, key) => {
            parsedQuery[key] = val;
        });
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach(_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        });
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find(key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every(key => scopesKey.includes(key));
                return isSameAudience && scopesAreIncluded;
            }
        });
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
1945
1946
  const singlePromiseMap = {};
1946
1947
  const singlePromise = (cb, key) => {
1947
1948
  let promise = singlePromiseMap[key];
1948
1949
  if (!promise) {
1949
- promise = cb().finally((() => {
1950
+ promise = cb().finally(() => {
1950
1951
  delete singlePromiseMap[key];
1951
1952
  promise = null;
1952
- }));
1953
+ });
1953
1954
  singlePromiseMap[key] = promise;
1954
1955
  }
1955
1956
  return promise;
@@ -2026,12 +2027,12 @@
2026
2027
  const allScopesAreIncluded = (scopeToInclude, scopes) => {
2027
2028
  const scopeGroup = (scopes === null || scopes === void 0 ? void 0 : scopes.split(" ")) || [];
2028
2029
  const scopesToInclude = (scopeToInclude === null || scopeToInclude === void 0 ? void 0 : scopeToInclude.split(" ")) || [];
2029
- return scopesToInclude.every((key => scopeGroup.includes(key)));
2030
+ return scopesToInclude.every(key => scopeGroup.includes(key));
2030
2031
  };
2031
2032
  const getMissingScopes = (requestedScope, respondedScope) => {
2032
2033
  const requestedScopes = (requestedScope === null || requestedScope === void 0 ? void 0 : requestedScope.split(" ")) || [];
2033
2034
  const respondedScopes = (respondedScope === null || respondedScope === void 0 ? void 0 : respondedScope.split(" ")) || [];
2034
- const missingScopes = requestedScopes.filter((scope => respondedScopes.indexOf(scope) == -1));
2035
+ const missingScopes = requestedScopes.filter(scope => respondedScopes.indexOf(scope) == -1);
2035
2036
  return missingScopes.join(",");
2036
2037
  };
2037
2038
  const getScopeToRequest = (useMrrt, authorizationParams, cachedAudience, cachedScope) => {
@@ -2042,7 +2043,7 @@
2042
2043
  }
2043
2044
  const cachedScopes = cachedScope.split(" ");
2044
2045
  const newScopes = ((_a = authorizationParams.scope) === null || _a === void 0 ? void 0 : _a.split(" ")) || [];
2045
- const newScopesAreIncluded = newScopes.every((scope => cachedScopes.includes(scope)));
2046
+ const newScopesAreIncluded = newScopes.every(scope => cachedScopes.includes(scope));
2046
2047
  return cachedScopes.length >= newScopes.length && newScopesAreIncluded ? cachedScope : authorizationParams.scope;
2047
2048
  }
2048
2049
  return authorizationParams.scope;
@@ -2069,11 +2070,11 @@
2069
2070
  }
2070
2071
  createDbHandle() {
2071
2072
  const req = window.indexedDB.open(NAME, this.getVersion());
2072
- return new Promise(((resolve, reject) => {
2073
- req.onupgradeneeded = () => Object.values(TABLES).forEach((t => req.result.createObjectStore(t)));
2073
+ return new Promise((resolve, reject) => {
2074
+ req.onupgradeneeded = () => Object.values(TABLES).forEach(t => req.result.createObjectStore(t));
2074
2075
  req.onerror = () => reject(req.error);
2075
2076
  req.onsuccess = () => resolve(req.result);
2076
- }));
2077
+ });
2077
2078
  }
2078
2079
  async getDbHandle() {
2079
2080
  if (!this.dbHandle) {
@@ -2086,10 +2087,10 @@
2086
2087
  const txn = db.transaction(table, mode);
2087
2088
  const store = txn.objectStore(table);
2088
2089
  const request = requestFactory(store);
2089
- return new Promise(((resolve, reject) => {
2090
+ return new Promise((resolve, reject) => {
2090
2091
  request.onsuccess = () => resolve(request.result);
2091
2092
  request.onerror = () => reject(request.error);
2092
- }));
2093
+ });
2093
2094
  }
2094
2095
  buildKey(id) {
2095
2096
  const finalId = id ? "_".concat(id) : AUTH0_NONCE_ID;
@@ -2102,7 +2103,7 @@
2102
2103
  return this.save(TABLES.KEYPAIR, this.buildKey(), keyPair);
2103
2104
  }
2104
2105
  async save(table, key, obj) {
2105
- return void await this.executeDbRequest(table, "readwrite", (table => table.put(obj, key)));
2106
+ return void await this.executeDbRequest(table, "readwrite", table => table.put(obj, key));
2106
2107
  }
2107
2108
  findNonce(id) {
2108
2109
  return this.find(TABLES.NONCE, this.buildKey(id));
@@ -2111,14 +2112,14 @@
2111
2112
  return this.find(TABLES.KEYPAIR, this.buildKey());
2112
2113
  }
2113
2114
  find(table, key) {
2114
- return this.executeDbRequest(table, "readonly", (table => table.get(key)));
2115
+ return this.executeDbRequest(table, "readonly", table => table.get(key));
2115
2116
  }
2116
2117
  async deleteBy(table, predicate) {
2117
- const allKeys = await this.executeDbRequest(table, "readonly", (table => table.getAllKeys()));
2118
- allKeys === null || allKeys === void 0 ? void 0 : allKeys.filter(predicate).map((k => this.executeDbRequest(table, "readwrite", (table => table.delete(k)))));
2118
+ const allKeys = await this.executeDbRequest(table, "readonly", table => table.getAllKeys());
2119
+ allKeys === null || allKeys === void 0 ? void 0 : allKeys.filter(predicate).map(k => this.executeDbRequest(table, "readwrite", table => table.delete(k)));
2119
2120
  }
2120
2121
  deleteByClientId(table, clientId) {
2121
- return this.deleteBy(table, (k => typeof k === "string" && k.startsWith("".concat(clientId, "::"))));
2122
+ return this.deleteBy(table, k => typeof k === "string" && k.startsWith("".concat(clientId, "::")));
2122
2123
  }
2123
2124
  clearNonces() {
2124
2125
  return this.deleteByClientId(TABLES.NONCE, this.clientId);
@@ -2428,20 +2429,20 @@
2428
2429
  var t = Object.keys(e);
2429
2430
  if (Object.getOwnPropertySymbols) {
2430
2431
  var o = Object.getOwnPropertySymbols(e);
2431
- r && (o = o.filter((function(r) {
2432
+ r && (o = o.filter(function(r) {
2432
2433
  return Object.getOwnPropertyDescriptor(e, r).enumerable;
2433
- }))), t.push.apply(t, o);
2434
+ })), t.push.apply(t, o);
2434
2435
  }
2435
2436
  return t;
2436
2437
  }
2437
2438
  function _objectSpread2(e) {
2438
2439
  for (var r = 1; r < arguments.length; r++) {
2439
2440
  var t = null != arguments[r] ? arguments[r] : {};
2440
- r % 2 ? ownKeys(Object(t), !0).forEach((function(r) {
2441
+ r % 2 ? ownKeys(Object(t), !0).forEach(function(r) {
2441
2442
  _defineProperty(e, r, t[r]);
2442
- })) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach((function(r) {
2443
+ }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function(r) {
2443
2444
  Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r));
2444
- }));
2445
+ });
2445
2446
  }
2446
2447
  return e;
2447
2448
  }
@@ -2487,16 +2488,16 @@
2487
2488
  function resume(r, t) {
2488
2489
  try {
2489
2490
  var n = e[r](t), o = n.value, u = o instanceof _OverloadYield;
2490
- Promise.resolve(u ? o.v : o).then((function(t) {
2491
+ Promise.resolve(u ? o.v : o).then(function(t) {
2491
2492
  if (u) {
2492
2493
  var i = "return" === r ? "return" : "next";
2493
2494
  if (!o.k || t.done) return resume(i, t);
2494
2495
  t = e[i](t).value;
2495
2496
  }
2496
2497
  settle(n.done ? "return" : "normal", t);
2497
- }), (function(e) {
2498
+ }, function(e) {
2498
2499
  resume("throw", e);
2499
- }));
2500
+ });
2500
2501
  } catch (e) {
2501
2502
  settle("throw", e);
2502
2503
  }
@@ -2523,7 +2524,7 @@
2523
2524
  (r = r.next) ? resume(r.key, r.arg) : t = null;
2524
2525
  }
2525
2526
  this._invoke = function(e, n) {
2526
- return new Promise((function(o, u) {
2527
+ return new Promise(function(o, u) {
2527
2528
  var i = {
2528
2529
  key: e,
2529
2530
  arg: n,
@@ -2532,7 +2533,7 @@
2532
2533
  next: null
2533
2534
  };
2534
2535
  t ? t = t.next = i : (r = t = i, resume(e, n));
2535
- }));
2536
+ });
2536
2537
  }, "function" != typeof e.return && (this.return = void 0);
2537
2538
  }
2538
2539
  AsyncGenerator.prototype["function" == typeof Symbol && Symbol.asyncIterator || "@@asyncIterator"] = function() {
@@ -2548,7 +2549,7 @@
2548
2549
  let USER_AGENT$2;
2549
2550
  if (typeof navigator === "undefined" || !((_navigator$userAgent$2 = navigator.userAgent) !== null && _navigator$userAgent$2 !== void 0 && (_navigator$userAgent$$2 = _navigator$userAgent$2.startsWith) !== null && _navigator$userAgent$$2 !== void 0 && _navigator$userAgent$$2.call(_navigator$userAgent$2, "Mozilla/5.0 "))) {
2550
2551
  const NAME = "oauth4webapi";
2551
- const VERSION = "v3.8.3";
2552
+ const VERSION = "v3.8.5";
2552
2553
  USER_AGENT$2 = "".concat(NAME, "/").concat(VERSION);
2553
2554
  }
2554
2555
  function looseInstanceOf(input, expected) {
@@ -2747,7 +2748,7 @@
2747
2748
  });
2748
2749
  }
2749
2750
  async function discoveryRequest(issuerIdentifier, options) {
2750
- return performDiscovery$1(issuerIdentifier, "issuerIdentifier", (url => {
2751
+ return performDiscovery$1(issuerIdentifier, "issuerIdentifier", url => {
2751
2752
  switch (options === null || options === void 0 ? void 0 : options.algorithm) {
2752
2753
  case undefined:
2753
2754
  case "oidc":
@@ -2762,7 +2763,7 @@
2762
2763
  throw CodedTypeError$1('"options.algorithm" must be "oidc" (default), or "oauth2"', ERR_INVALID_ARG_VALUE$1);
2763
2764
  }
2764
2765
  return url;
2765
- }), options);
2766
+ }, options);
2766
2767
  }
2767
2768
  function assertNumber(input, allow0, it, code, cause) {
2768
2769
  try {
@@ -3998,10 +3999,10 @@
3998
3999
  for (var _len = arguments.length, buffers = new Array(_len), _key = 0; _key < _len; _key++) {
3999
4000
  buffers[_key] = arguments[_key];
4000
4001
  }
4001
- const size = buffers.reduce(((acc, _ref) => {
4002
+ const size = buffers.reduce((acc, _ref) => {
4002
4003
  let {length: length} = _ref;
4003
4004
  return acc + length;
4004
- }), 0);
4005
+ }, 0);
4005
4006
  const buf = new Uint8Array(size);
4006
4007
  let i = 0;
4007
4008
  for (const buffer of buffers) {
@@ -4049,6 +4050,135 @@
4049
4050
  throw new TypeError("The input to be decoded is not correctly encoded.");
4050
4051
  }
4051
4052
  }
4053
+ const unusable = function unusable(name) {
4054
+ let prop = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "algorithm.name";
4055
+ return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
4056
+ };
4057
+ const isAlgorithm = (algorithm, name) => algorithm.name === name;
4058
+ function getHashLength(hash) {
4059
+ return parseInt(hash.name.slice(4), 10);
4060
+ }
4061
+ function checkHashLength(algorithm, expected) {
4062
+ const actual = getHashLength(algorithm.hash);
4063
+ if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4064
+ }
4065
+ function getNamedCurve(alg) {
4066
+ switch (alg) {
4067
+ case "ES256":
4068
+ return "P-256";
4069
+
4070
+ case "ES384":
4071
+ return "P-384";
4072
+
4073
+ case "ES512":
4074
+ return "P-521";
4075
+
4076
+ default:
4077
+ throw new Error("unreachable");
4078
+ }
4079
+ }
4080
+ function checkUsage(key, usage) {
4081
+ if (usage && !key.usages.includes(usage)) {
4082
+ throw new TypeError("CryptoKey does not support this operation, its usages must include ".concat(usage, "."));
4083
+ }
4084
+ }
4085
+ function checkSigCryptoKey(key, alg, usage) {
4086
+ switch (alg) {
4087
+ case "HS256":
4088
+ case "HS384":
4089
+ case "HS512":
4090
+ {
4091
+ if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
4092
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4093
+ break;
4094
+ }
4095
+
4096
+ case "RS256":
4097
+ case "RS384":
4098
+ case "RS512":
4099
+ {
4100
+ if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
4101
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4102
+ break;
4103
+ }
4104
+
4105
+ case "PS256":
4106
+ case "PS384":
4107
+ case "PS512":
4108
+ {
4109
+ if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
4110
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4111
+ break;
4112
+ }
4113
+
4114
+ case "Ed25519":
4115
+ case "EdDSA":
4116
+ {
4117
+ if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
4118
+ break;
4119
+ }
4120
+
4121
+ case "ML-DSA-44":
4122
+ case "ML-DSA-65":
4123
+ case "ML-DSA-87":
4124
+ {
4125
+ if (!isAlgorithm(key.algorithm, alg)) throw unusable(alg);
4126
+ break;
4127
+ }
4128
+
4129
+ case "ES256":
4130
+ case "ES384":
4131
+ case "ES512":
4132
+ {
4133
+ if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
4134
+ const expected = getNamedCurve(alg);
4135
+ const actual = key.algorithm.namedCurve;
4136
+ if (actual !== expected) throw unusable(expected, "algorithm.namedCurve");
4137
+ break;
4138
+ }
4139
+
4140
+ default:
4141
+ throw new TypeError("CryptoKey does not support this operation");
4142
+ }
4143
+ checkUsage(key, usage);
4144
+ }
4145
+ function message(msg, actual) {
4146
+ for (var _len = arguments.length, types = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++) {
4147
+ types[_key - 2] = arguments[_key];
4148
+ }
4149
+ types = types.filter(Boolean);
4150
+ if (types.length > 2) {
4151
+ const last = types.pop();
4152
+ msg += "one of type ".concat(types.join(", "), ", or ").concat(last, ".");
4153
+ } else if (types.length === 2) {
4154
+ msg += "one of type ".concat(types[0], " or ").concat(types[1], ".");
4155
+ } else {
4156
+ msg += "of type ".concat(types[0], ".");
4157
+ }
4158
+ if (actual == null) {
4159
+ msg += " Received ".concat(actual);
4160
+ } else if (typeof actual === "function" && actual.name) {
4161
+ msg += " Received function ".concat(actual.name);
4162
+ } else if (typeof actual === "object" && actual != null) {
4163
+ var _actual$constructor;
4164
+ if ((_actual$constructor = actual.constructor) !== null && _actual$constructor !== void 0 && _actual$constructor.name) {
4165
+ msg += " Received an instance of ".concat(actual.constructor.name);
4166
+ }
4167
+ }
4168
+ return msg;
4169
+ }
4170
+ const invalidKeyInput = function invalidKeyInput(actual) {
4171
+ for (var _len2 = arguments.length, types = new Array(_len2 > 1 ? _len2 - 1 : 0), _key2 = 1; _key2 < _len2; _key2++) {
4172
+ types[_key2 - 1] = arguments[_key2];
4173
+ }
4174
+ return message("Key must be ", actual, ...types);
4175
+ };
4176
+ const withAlg = function withAlg(alg, actual) {
4177
+ for (var _len3 = arguments.length, types = new Array(_len3 > 2 ? _len3 - 2 : 0), _key3 = 2; _key3 < _len3; _key3++) {
4178
+ types[_key3 - 2] = arguments[_key3];
4179
+ }
4180
+ return message("Key for the ".concat(alg, " algorithm must be "), actual, ...types);
4181
+ };
4052
4182
  class JOSEError extends Error {
4053
4183
  constructor(message, options) {
4054
4184
  var _Error$captureStackTr;
@@ -4196,147 +4326,37 @@
4196
4326
  }
4197
4327
  }
4198
4328
  _defineProperty(JWSSignatureVerificationFailed, "code", "ERR_JWS_SIGNATURE_VERIFICATION_FAILED");
4199
- const unusable = function unusable(name) {
4200
- let prop = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "algorithm.name";
4201
- return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
4329
+ const isCryptoKey = key => {
4330
+ if ((key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "CryptoKey") return true;
4331
+ try {
4332
+ return key instanceof CryptoKey;
4333
+ } catch (_unused) {
4334
+ return false;
4335
+ }
4202
4336
  };
4203
- const isAlgorithm = (algorithm, name) => algorithm.name === name;
4204
- function getHashLength(hash) {
4205
- return parseInt(hash.name.slice(4), 10);
4206
- }
4207
- function getNamedCurve(alg) {
4208
- switch (alg) {
4209
- case "ES256":
4210
- return "P-256";
4211
-
4212
- case "ES384":
4213
- return "P-384";
4214
-
4215
- case "ES512":
4216
- return "P-521";
4217
-
4218
- default:
4219
- throw new Error("unreachable");
4337
+ const isKeyObject = key => (key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "KeyObject";
4338
+ const isKeyLike = key => isCryptoKey(key) || isKeyObject(key);
4339
+ function decodeBase64url(value, label, ErrorClass) {
4340
+ try {
4341
+ return decode(value);
4342
+ } catch (_unused) {
4343
+ throw new ErrorClass("Failed to base64url decode the ".concat(label));
4220
4344
  }
4221
4345
  }
4222
- function checkUsage(key, usage) {
4223
- if (usage && !key.usages.includes(usage)) {
4224
- throw new TypeError("CryptoKey does not support this operation, its usages must include ".concat(usage, "."));
4346
+ const isObjectLike = value => typeof value === "object" && value !== null;
4347
+ function isObject(input) {
4348
+ if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
4349
+ return false;
4225
4350
  }
4351
+ if (Object.getPrototypeOf(input) === null) {
4352
+ return true;
4353
+ }
4354
+ let proto = input;
4355
+ while (Object.getPrototypeOf(proto) !== null) {
4356
+ proto = Object.getPrototypeOf(proto);
4357
+ }
4358
+ return Object.getPrototypeOf(input) === proto;
4226
4359
  }
4227
- function checkSigCryptoKey(key, alg, usage) {
4228
- switch (alg) {
4229
- case "HS256":
4230
- case "HS384":
4231
- case "HS512":
4232
- {
4233
- if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
4234
- const expected = parseInt(alg.slice(2), 10);
4235
- const actual = getHashLength(key.algorithm.hash);
4236
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4237
- break;
4238
- }
4239
-
4240
- case "RS256":
4241
- case "RS384":
4242
- case "RS512":
4243
- {
4244
- if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
4245
- const expected = parseInt(alg.slice(2), 10);
4246
- const actual = getHashLength(key.algorithm.hash);
4247
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4248
- break;
4249
- }
4250
-
4251
- case "PS256":
4252
- case "PS384":
4253
- case "PS512":
4254
- {
4255
- if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
4256
- const expected = parseInt(alg.slice(2), 10);
4257
- const actual = getHashLength(key.algorithm.hash);
4258
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4259
- break;
4260
- }
4261
-
4262
- case "Ed25519":
4263
- case "EdDSA":
4264
- {
4265
- if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
4266
- break;
4267
- }
4268
-
4269
- case "ML-DSA-44":
4270
- case "ML-DSA-65":
4271
- case "ML-DSA-87":
4272
- {
4273
- if (!isAlgorithm(key.algorithm, alg)) throw unusable(alg);
4274
- break;
4275
- }
4276
-
4277
- case "ES256":
4278
- case "ES384":
4279
- case "ES512":
4280
- {
4281
- if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
4282
- const expected = getNamedCurve(alg);
4283
- const actual = key.algorithm.namedCurve;
4284
- if (actual !== expected) throw unusable(expected, "algorithm.namedCurve");
4285
- break;
4286
- }
4287
-
4288
- default:
4289
- throw new TypeError("CryptoKey does not support this operation");
4290
- }
4291
- checkUsage(key, usage);
4292
- }
4293
- function message(msg, actual) {
4294
- for (var _len = arguments.length, types = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++) {
4295
- types[_key - 2] = arguments[_key];
4296
- }
4297
- types = types.filter(Boolean);
4298
- if (types.length > 2) {
4299
- const last = types.pop();
4300
- msg += "one of type ".concat(types.join(", "), ", or ").concat(last, ".");
4301
- } else if (types.length === 2) {
4302
- msg += "one of type ".concat(types[0], " or ").concat(types[1], ".");
4303
- } else {
4304
- msg += "of type ".concat(types[0], ".");
4305
- }
4306
- if (actual == null) {
4307
- msg += " Received ".concat(actual);
4308
- } else if (typeof actual === "function" && actual.name) {
4309
- msg += " Received function ".concat(actual.name);
4310
- } else if (typeof actual === "object" && actual != null) {
4311
- var _actual$constructor;
4312
- if ((_actual$constructor = actual.constructor) !== null && _actual$constructor !== void 0 && _actual$constructor.name) {
4313
- msg += " Received an instance of ".concat(actual.constructor.name);
4314
- }
4315
- }
4316
- return msg;
4317
- }
4318
- const invalidKeyInput = function invalidKeyInput(actual) {
4319
- for (var _len2 = arguments.length, types = new Array(_len2 > 1 ? _len2 - 1 : 0), _key2 = 1; _key2 < _len2; _key2++) {
4320
- types[_key2 - 1] = arguments[_key2];
4321
- }
4322
- return message("Key must be ", actual, ...types);
4323
- };
4324
- const withAlg = function withAlg(alg, actual) {
4325
- for (var _len3 = arguments.length, types = new Array(_len3 > 2 ? _len3 - 2 : 0), _key3 = 2; _key3 < _len3; _key3++) {
4326
- types[_key3 - 2] = arguments[_key3];
4327
- }
4328
- return message("Key for the ".concat(alg, " algorithm must be "), actual, ...types);
4329
- };
4330
- const isCryptoKey = key => {
4331
- if ((key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "CryptoKey") return true;
4332
- try {
4333
- return key instanceof CryptoKey;
4334
- } catch (_unused) {
4335
- return false;
4336
- }
4337
- };
4338
- const isKeyObject = key => (key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "KeyObject";
4339
- const isKeyLike = key => isCryptoKey(key) || isKeyObject(key);
4340
4360
  function isDisjoint() {
4341
4361
  for (var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++) {
4342
4362
  headers[_key] = arguments[_key];
@@ -4361,20 +4381,10 @@
4361
4381
  }
4362
4382
  return true;
4363
4383
  }
4364
- const isObjectLike = value => typeof value === "object" && value !== null;
4365
- function isObject(input) {
4366
- if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
4367
- return false;
4368
- }
4369
- if (Object.getPrototypeOf(input) === null) {
4370
- return true;
4371
- }
4372
- let proto = input;
4373
- while (Object.getPrototypeOf(proto) !== null) {
4374
- proto = Object.getPrototypeOf(proto);
4375
- }
4376
- return Object.getPrototypeOf(input) === proto;
4377
- }
4384
+ const isJWK = key => isObject(key) && typeof key.kty === "string";
4385
+ const isPrivateJWK = key => key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
4386
+ const isPublicJWK = key => key.kty !== "oct" && key.d === undefined && key.priv === undefined;
4387
+ const isSecretJWK = key => key.kty === "oct" && typeof key.k === "string";
4378
4388
  function checkKeyLength(alg, key) {
4379
4389
  if (alg.startsWith("RS") || alg.startsWith("PS")) {
4380
4390
  const {modulusLength: modulusLength} = key.algorithm;
@@ -4383,198 +4393,84 @@
4383
4393
  }
4384
4394
  }
4385
4395
  }
4386
- const bytesEqual = (a, b) => {
4387
- if (a.byteLength !== b.length) return false;
4388
- for (let i = 0; i < a.byteLength; i++) {
4389
- if (a[i] !== b[i]) return false;
4390
- }
4391
- return true;
4392
- };
4393
- const createASN1State = data => ({
4394
- data: data,
4395
- pos: 0
4396
- });
4397
- const parseLength = state => {
4398
- const first = state.data[state.pos++];
4399
- if (first & 128) {
4400
- const lengthOfLen = first & 127;
4401
- let length = 0;
4402
- for (let i = 0; i < lengthOfLen; i++) {
4403
- length = length << 8 | state.data[state.pos++];
4404
- }
4405
- return length;
4406
- }
4407
- return first;
4408
- };
4409
- const expectTag = (state, expectedTag, errorMessage) => {
4410
- if (state.data[state.pos++] !== expectedTag) {
4411
- throw new Error(errorMessage);
4412
- }
4413
- };
4414
- const getSubarray = (state, length) => {
4415
- const result = state.data.subarray(state.pos, state.pos + length);
4416
- state.pos += length;
4417
- return result;
4418
- };
4419
- const parseAlgorithmOID = state => {
4420
- expectTag(state, 6, "Expected algorithm OID");
4421
- const oidLen = parseLength(state);
4422
- return getSubarray(state, oidLen);
4423
- };
4424
- function parsePKCS8Header(state) {
4425
- expectTag(state, 48, "Invalid PKCS#8 structure");
4426
- parseLength(state);
4427
- expectTag(state, 2, "Expected version field");
4428
- const verLen = parseLength(state);
4429
- state.pos += verLen;
4430
- expectTag(state, 48, "Expected algorithm identifier");
4431
- const algIdLen = parseLength(state);
4432
- const algIdStart = state.pos;
4433
- return {
4434
- algIdStart: algIdStart,
4435
- algIdLength: algIdLen
4436
- };
4437
- }
4438
- const parseECAlgorithmIdentifier = state => {
4439
- const algOid = parseAlgorithmOID(state);
4440
- if (bytesEqual(algOid, [ 43, 101, 110 ])) {
4441
- return "X25519";
4442
- }
4443
- if (!bytesEqual(algOid, [ 42, 134, 72, 206, 61, 2, 1 ])) {
4444
- throw new Error("Unsupported key algorithm");
4445
- }
4446
- expectTag(state, 6, "Expected curve OID");
4447
- const curveOidLen = parseLength(state);
4448
- const curveOid = getSubarray(state, curveOidLen);
4449
- for (const {name: name, oid: oid} of [ {
4450
- name: "P-256",
4451
- oid: [ 42, 134, 72, 206, 61, 3, 1, 7 ]
4452
- }, {
4453
- name: "P-384",
4454
- oid: [ 43, 129, 4, 0, 34 ]
4455
- }, {
4456
- name: "P-521",
4457
- oid: [ 43, 129, 4, 0, 35 ]
4458
- } ]) {
4459
- if (bytesEqual(curveOid, oid)) {
4460
- return name;
4461
- }
4462
- }
4463
- throw new Error("Unsupported named curve");
4464
- };
4465
- const genericImport = async (keyFormat, keyData, alg, options) => {
4466
- var _options$extractable;
4467
- let algorithm;
4468
- let keyUsages;
4469
- const isPublic = keyFormat === "spki";
4470
- const getSigUsages = () => isPublic ? [ "verify" ] : [ "sign" ];
4471
- const getEncUsages = () => isPublic ? [ "encrypt", "wrapKey" ] : [ "decrypt", "unwrapKey" ];
4396
+ function subtleAlgorithm(alg, algorithm) {
4397
+ const hash = "SHA-".concat(alg.slice(-3));
4472
4398
  switch (alg) {
4399
+ case "HS256":
4400
+ case "HS384":
4401
+ case "HS512":
4402
+ return {
4403
+ hash: hash,
4404
+ name: "HMAC"
4405
+ };
4406
+
4473
4407
  case "PS256":
4474
4408
  case "PS384":
4475
4409
  case "PS512":
4476
- algorithm = {
4410
+ return {
4411
+ hash: hash,
4477
4412
  name: "RSA-PSS",
4478
- hash: "SHA-".concat(alg.slice(-3))
4413
+ saltLength: parseInt(alg.slice(-3), 10) >> 3
4479
4414
  };
4480
- keyUsages = getSigUsages();
4481
- break;
4482
4415
 
4483
4416
  case "RS256":
4484
4417
  case "RS384":
4485
4418
  case "RS512":
4486
- algorithm = {
4487
- name: "RSASSA-PKCS1-v1_5",
4488
- hash: "SHA-".concat(alg.slice(-3))
4489
- };
4490
- keyUsages = getSigUsages();
4491
- break;
4492
-
4493
- case "RSA-OAEP":
4494
- case "RSA-OAEP-256":
4495
- case "RSA-OAEP-384":
4496
- case "RSA-OAEP-512":
4497
- algorithm = {
4498
- name: "RSA-OAEP",
4499
- hash: "SHA-".concat(parseInt(alg.slice(-3), 10) || 1)
4419
+ return {
4420
+ hash: hash,
4421
+ name: "RSASSA-PKCS1-v1_5"
4500
4422
  };
4501
- keyUsages = getEncUsages();
4502
- break;
4503
4423
 
4504
4424
  case "ES256":
4505
4425
  case "ES384":
4506
4426
  case "ES512":
4507
- {
4508
- const curveMap = {
4509
- ES256: "P-256",
4510
- ES384: "P-384",
4511
- ES512: "P-521"
4512
- };
4513
- algorithm = {
4514
- name: "ECDSA",
4515
- namedCurve: curveMap[alg]
4516
- };
4517
- keyUsages = getSigUsages();
4518
- break;
4519
- }
4520
-
4521
- case "ECDH-ES":
4522
- case "ECDH-ES+A128KW":
4523
- case "ECDH-ES+A192KW":
4524
- case "ECDH-ES+A256KW":
4525
- {
4526
- try {
4527
- const namedCurve = options.getNamedCurve(keyData);
4528
- algorithm = namedCurve === "X25519" ? {
4529
- name: "X25519"
4530
- } : {
4531
- name: "ECDH",
4532
- namedCurve: namedCurve
4533
- };
4534
- } catch (cause) {
4535
- throw new JOSENotSupported("Invalid or unsupported key format");
4536
- }
4537
- keyUsages = isPublic ? [] : [ "deriveBits" ];
4538
- break;
4539
- }
4427
+ return {
4428
+ hash: hash,
4429
+ name: "ECDSA",
4430
+ namedCurve: algorithm.namedCurve
4431
+ };
4540
4432
 
4541
4433
  case "Ed25519":
4542
4434
  case "EdDSA":
4543
- algorithm = {
4435
+ return {
4544
4436
  name: "Ed25519"
4545
4437
  };
4546
- keyUsages = getSigUsages();
4547
- break;
4548
4438
 
4549
4439
  case "ML-DSA-44":
4550
4440
  case "ML-DSA-65":
4551
4441
  case "ML-DSA-87":
4552
- algorithm = {
4442
+ return {
4553
4443
  name: alg
4554
4444
  };
4555
- keyUsages = getSigUsages();
4556
- break;
4557
4445
 
4558
4446
  default:
4559
- throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
4447
+ throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
4560
4448
  }
4561
- return crypto.subtle.importKey(keyFormat, keyData, algorithm, (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : isPublic ? true : false, keyUsages);
4562
- };
4563
- const processPEMData = (pem, pattern) => decodeBase64(pem.replace(pattern, ""));
4564
- const fromPKCS8 = (pem, alg, options) => {
4565
- var _alg$startsWith;
4566
- const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g);
4567
- let opts = options;
4568
- if (alg !== null && alg !== void 0 && (_alg$startsWith = alg.startsWith) !== null && _alg$startsWith !== void 0 && _alg$startsWith.call(alg, "ECDH-ES")) {
4569
- opts || (opts = {});
4570
- opts.getNamedCurve = keyData => {
4571
- const state = createASN1State(keyData);
4572
- parsePKCS8Header(state);
4573
- return parseECAlgorithmIdentifier(state);
4574
- };
4449
+ }
4450
+ async function getSigKey(alg, key, usage) {
4451
+ if (key instanceof Uint8Array) {
4452
+ if (!alg.startsWith("HS")) {
4453
+ throw new TypeError(invalidKeyInput(key, "CryptoKey", "KeyObject", "JSON Web Key"));
4454
+ }
4455
+ return crypto.subtle.importKey("raw", key, {
4456
+ hash: "SHA-".concat(alg.slice(-3)),
4457
+ name: "HMAC"
4458
+ }, false, [ usage ]);
4575
4459
  }
4576
- return genericImport("pkcs8", keyData, alg, opts);
4577
- };
4460
+ checkSigCryptoKey(key, alg, usage);
4461
+ return key;
4462
+ }
4463
+ async function verify(alg, key, signature, data) {
4464
+ const cryptoKey = await getSigKey(alg, key, "verify");
4465
+ checkKeyLength(alg, cryptoKey);
4466
+ const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);
4467
+ try {
4468
+ return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);
4469
+ } catch (_unused) {
4470
+ return false;
4471
+ }
4472
+ }
4473
+ const unsupportedAlg = 'Invalid or unsupported JWK "alg" (Algorithm) Parameter value';
4578
4474
  function subtleMapping(jwk) {
4579
4475
  let algorithm;
4580
4476
  let keyUsages;
@@ -4592,7 +4488,7 @@
4592
4488
  break;
4593
4489
 
4594
4490
  default:
4595
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4491
+ throw new JOSENotSupported(unsupportedAlg);
4596
4492
  }
4597
4493
  break;
4598
4494
  }
@@ -4632,7 +4528,7 @@
4632
4528
  break;
4633
4529
 
4634
4530
  default:
4635
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4531
+ throw new JOSENotSupported(unsupportedAlg);
4636
4532
  }
4637
4533
  break;
4638
4534
  }
@@ -4641,25 +4537,15 @@
4641
4537
  {
4642
4538
  switch (jwk.alg) {
4643
4539
  case "ES256":
4644
- algorithm = {
4645
- name: "ECDSA",
4646
- namedCurve: "P-256"
4647
- };
4648
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4649
- break;
4650
-
4651
4540
  case "ES384":
4652
- algorithm = {
4653
- name: "ECDSA",
4654
- namedCurve: "P-384"
4655
- };
4656
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4657
- break;
4658
-
4659
4541
  case "ES512":
4660
4542
  algorithm = {
4661
4543
  name: "ECDSA",
4662
- namedCurve: "P-521"
4544
+ namedCurve: {
4545
+ ES256: "P-256",
4546
+ ES384: "P-384",
4547
+ ES512: "P-521"
4548
+ }[jwk.alg]
4663
4549
  };
4664
4550
  keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4665
4551
  break;
@@ -4676,7 +4562,7 @@
4676
4562
  break;
4677
4563
 
4678
4564
  default:
4679
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4565
+ throw new JOSENotSupported(unsupportedAlg);
4680
4566
  }
4681
4567
  break;
4682
4568
  }
@@ -4703,7 +4589,7 @@
4703
4589
  break;
4704
4590
 
4705
4591
  default:
4706
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4592
+ throw new JOSENotSupported(unsupportedAlg);
4707
4593
  }
4708
4594
  break;
4709
4595
  }
@@ -4729,102 +4615,7 @@
4729
4615
  delete keyData.use;
4730
4616
  return crypto.subtle.importKey("jwk", keyData, algorithm, (_jwk$ext = jwk.ext) !== null && _jwk$ext !== void 0 ? _jwk$ext : jwk.d || jwk.priv ? false : true, (_jwk$key_ops = jwk.key_ops) !== null && _jwk$key_ops !== void 0 ? _jwk$key_ops : keyUsages);
4731
4617
  }
4732
- async function importPKCS8(pkcs8, alg, options) {
4733
- if (typeof pkcs8 !== "string" || pkcs8.indexOf("-----BEGIN PRIVATE KEY-----") !== 0) {
4734
- throw new TypeError('"pkcs8" must be PKCS#8 formatted string');
4735
- }
4736
- return fromPKCS8(pkcs8, alg, options);
4737
- }
4738
- async function importJWK(jwk, alg, options) {
4739
- var _options$extractable;
4740
- if (!isObject(jwk)) {
4741
- throw new TypeError("JWK must be an object");
4742
- }
4743
- let ext;
4744
- alg !== null && alg !== void 0 ? alg : alg = jwk.alg;
4745
- ext !== null && ext !== void 0 ? ext : ext = (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : jwk.ext;
4746
- switch (jwk.kty) {
4747
- case "oct":
4748
- if (typeof jwk.k !== "string" || !jwk.k) {
4749
- throw new TypeError('missing "k" (Key Value) Parameter value');
4750
- }
4751
- return decode(jwk.k);
4752
-
4753
- case "RSA":
4754
- if ("oth" in jwk && jwk.oth !== undefined) {
4755
- throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
4756
- }
4757
- return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
4758
- alg: alg,
4759
- ext: ext
4760
- }));
4761
-
4762
- case "AKP":
4763
- {
4764
- if (typeof jwk.alg !== "string" || !jwk.alg) {
4765
- throw new TypeError('missing "alg" (Algorithm) Parameter value');
4766
- }
4767
- if (alg !== undefined && alg !== jwk.alg) {
4768
- throw new TypeError("JWK alg and alg option value mismatch");
4769
- }
4770
- return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
4771
- ext: ext
4772
- }));
4773
- }
4774
-
4775
- case "EC":
4776
- case "OKP":
4777
- return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
4778
- alg: alg,
4779
- ext: ext
4780
- }));
4781
-
4782
- default:
4783
- throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
4784
- }
4785
- }
4786
- function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
4787
- if (joseHeader.crit !== undefined && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === undefined) {
4788
- throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
4789
- }
4790
- if (!protectedHeader || protectedHeader.crit === undefined) {
4791
- return new Set;
4792
- }
4793
- if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some((input => typeof input !== "string" || input.length === 0))) {
4794
- throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
4795
- }
4796
- let recognized;
4797
- if (recognizedOption !== undefined) {
4798
- recognized = new Map([ ...Object.entries(recognizedOption), ...recognizedDefault.entries() ]);
4799
- } else {
4800
- recognized = recognizedDefault;
4801
- }
4802
- for (const parameter of protectedHeader.crit) {
4803
- if (!recognized.has(parameter)) {
4804
- throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
4805
- }
4806
- if (joseHeader[parameter] === undefined) {
4807
- throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
4808
- }
4809
- if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
4810
- throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
4811
- }
4812
- }
4813
- return new Set(protectedHeader.crit);
4814
- }
4815
- function validateAlgorithms(option, algorithms) {
4816
- if (algorithms !== undefined && (!Array.isArray(algorithms) || algorithms.some((s => typeof s !== "string")))) {
4817
- throw new TypeError('"'.concat(option, '" option must be an array of strings'));
4818
- }
4819
- if (!algorithms) {
4820
- return undefined;
4821
- }
4822
- return new Set(algorithms);
4823
- }
4824
- const isJWK = key => isObject(key) && typeof key.kty === "string";
4825
- const isPrivateJWK = key => key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
4826
- const isPublicJWK = key => key.kty !== "oct" && key.d === undefined && key.priv === undefined;
4827
- const isSecretJWK = key => key.kty === "oct" && typeof key.k === "string";
4618
+ const unusableForAlg = "given KeyObject instance cannot be used for this algorithm";
4828
4619
  let cache;
4829
4620
  const handleJWK = async function handleJWK(key, jwk, alg) {
4830
4621
  let freeze = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : false;
@@ -4864,13 +4655,13 @@
4864
4655
  break;
4865
4656
 
4866
4657
  default:
4867
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4658
+ throw new TypeError(unusableForAlg);
4868
4659
  }
4869
4660
  cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : [ "deriveBits" ]);
4870
4661
  }
4871
4662
  if (keyObject.asymmetricKeyType === "ed25519") {
4872
4663
  if (alg !== "EdDSA" && alg !== "Ed25519") {
4873
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4664
+ throw new TypeError(unusableForAlg);
4874
4665
  }
4875
4666
  cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
4876
4667
  }
@@ -4880,7 +4671,7 @@
4880
4671
  case "ml-dsa-87":
4881
4672
  {
4882
4673
  if (alg !== keyObject.asymmetricKeyType.toUpperCase()) {
4883
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4674
+ throw new TypeError(unusableForAlg);
4884
4675
  }
4885
4676
  cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
4886
4677
  }
@@ -4911,7 +4702,7 @@
4911
4702
  break;
4912
4703
 
4913
4704
  default:
4914
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4705
+ throw new TypeError(unusableForAlg);
4915
4706
  }
4916
4707
  if (alg.startsWith("RSA-OAEP")) {
4917
4708
  return keyObject.toCryptoKey({
@@ -4929,21 +4720,14 @@
4929
4720
  const nist = new Map([ [ "prime256v1", "P-256" ], [ "secp384r1", "P-384" ], [ "secp521r1", "P-521" ] ]);
4930
4721
  const namedCurve = nist.get((_keyObject$asymmetric = keyObject.asymmetricKeyDetails) === null || _keyObject$asymmetric === void 0 ? void 0 : _keyObject$asymmetric.namedCurve);
4931
4722
  if (!namedCurve) {
4932
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4933
- }
4934
- if (alg === "ES256" && namedCurve === "P-256") {
4935
- cryptoKey = keyObject.toCryptoKey({
4936
- name: "ECDSA",
4937
- namedCurve: namedCurve
4938
- }, extractable, [ isPublic ? "verify" : "sign" ]);
4723
+ throw new TypeError(unusableForAlg);
4939
4724
  }
4940
- if (alg === "ES384" && namedCurve === "P-384") {
4941
- cryptoKey = keyObject.toCryptoKey({
4942
- name: "ECDSA",
4943
- namedCurve: namedCurve
4944
- }, extractable, [ isPublic ? "verify" : "sign" ]);
4945
- }
4946
- if (alg === "ES512" && namedCurve === "P-521") {
4725
+ const expectedCurve = {
4726
+ ES256: "P-256",
4727
+ ES384: "P-384",
4728
+ ES512: "P-521"
4729
+ };
4730
+ if (expectedCurve[alg] && namedCurve === expectedCurve[alg]) {
4947
4731
  cryptoKey = keyObject.toCryptoKey({
4948
4732
  name: "ECDSA",
4949
4733
  namedCurve: namedCurve
@@ -4956,50 +4740,334 @@
4956
4740
  }, extractable, isPublic ? [] : [ "deriveBits" ]);
4957
4741
  }
4958
4742
  }
4959
- if (!cryptoKey) {
4960
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4743
+ if (!cryptoKey) {
4744
+ throw new TypeError(unusableForAlg);
4745
+ }
4746
+ if (!cached) {
4747
+ cache.set(keyObject, {
4748
+ [alg]: cryptoKey
4749
+ });
4750
+ } else {
4751
+ cached[alg] = cryptoKey;
4752
+ }
4753
+ return cryptoKey;
4754
+ };
4755
+ async function normalizeKey(key, alg) {
4756
+ if (key instanceof Uint8Array) {
4757
+ return key;
4758
+ }
4759
+ if (isCryptoKey(key)) {
4760
+ return key;
4761
+ }
4762
+ if (isKeyObject(key)) {
4763
+ if (key.type === "secret") {
4764
+ return key.export();
4765
+ }
4766
+ if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
4767
+ try {
4768
+ return handleKeyObject(key, alg);
4769
+ } catch (err) {
4770
+ if (err instanceof TypeError) {
4771
+ throw err;
4772
+ }
4773
+ }
4774
+ }
4775
+ let jwk = key.export({
4776
+ format: "jwk"
4777
+ });
4778
+ return handleJWK(key, jwk, alg);
4779
+ }
4780
+ if (isJWK(key)) {
4781
+ if (key.k) {
4782
+ return decode(key.k);
4783
+ }
4784
+ return handleJWK(key, key, alg, true);
4785
+ }
4786
+ throw new Error("unreachable");
4787
+ }
4788
+ const bytesEqual = (a, b) => {
4789
+ if (a.byteLength !== b.length) return false;
4790
+ for (let i = 0; i < a.byteLength; i++) {
4791
+ if (a[i] !== b[i]) return false;
4792
+ }
4793
+ return true;
4794
+ };
4795
+ const createASN1State = data => ({
4796
+ data: data,
4797
+ pos: 0
4798
+ });
4799
+ const parseLength = state => {
4800
+ const first = state.data[state.pos++];
4801
+ if (first & 128) {
4802
+ const lengthOfLen = first & 127;
4803
+ let length = 0;
4804
+ for (let i = 0; i < lengthOfLen; i++) {
4805
+ length = length << 8 | state.data[state.pos++];
4806
+ }
4807
+ return length;
4808
+ }
4809
+ return first;
4810
+ };
4811
+ const expectTag = (state, expectedTag, errorMessage) => {
4812
+ if (state.data[state.pos++] !== expectedTag) {
4813
+ throw new Error(errorMessage);
4814
+ }
4815
+ };
4816
+ const getSubarray = (state, length) => {
4817
+ const result = state.data.subarray(state.pos, state.pos + length);
4818
+ state.pos += length;
4819
+ return result;
4820
+ };
4821
+ const parseAlgorithmOID = state => {
4822
+ expectTag(state, 6, "Expected algorithm OID");
4823
+ const oidLen = parseLength(state);
4824
+ return getSubarray(state, oidLen);
4825
+ };
4826
+ function parsePKCS8Header(state) {
4827
+ expectTag(state, 48, "Invalid PKCS#8 structure");
4828
+ parseLength(state);
4829
+ expectTag(state, 2, "Expected version field");
4830
+ const verLen = parseLength(state);
4831
+ state.pos += verLen;
4832
+ expectTag(state, 48, "Expected algorithm identifier");
4833
+ const algIdLen = parseLength(state);
4834
+ const algIdStart = state.pos;
4835
+ return {
4836
+ algIdStart: algIdStart,
4837
+ algIdLength: algIdLen
4838
+ };
4839
+ }
4840
+ const parseECAlgorithmIdentifier = state => {
4841
+ const algOid = parseAlgorithmOID(state);
4842
+ if (bytesEqual(algOid, [ 43, 101, 110 ])) {
4843
+ return "X25519";
4844
+ }
4845
+ if (!bytesEqual(algOid, [ 42, 134, 72, 206, 61, 2, 1 ])) {
4846
+ throw new Error("Unsupported key algorithm");
4847
+ }
4848
+ expectTag(state, 6, "Expected curve OID");
4849
+ const curveOidLen = parseLength(state);
4850
+ const curveOid = getSubarray(state, curveOidLen);
4851
+ for (const {name: name, oid: oid} of [ {
4852
+ name: "P-256",
4853
+ oid: [ 42, 134, 72, 206, 61, 3, 1, 7 ]
4854
+ }, {
4855
+ name: "P-384",
4856
+ oid: [ 43, 129, 4, 0, 34 ]
4857
+ }, {
4858
+ name: "P-521",
4859
+ oid: [ 43, 129, 4, 0, 35 ]
4860
+ } ]) {
4861
+ if (bytesEqual(curveOid, oid)) {
4862
+ return name;
4863
+ }
4864
+ }
4865
+ throw new Error("Unsupported named curve");
4866
+ };
4867
+ const genericImport = async (keyFormat, keyData, alg, options) => {
4868
+ var _options$extractable;
4869
+ let algorithm;
4870
+ let keyUsages;
4871
+ const isPublic = keyFormat === "spki";
4872
+ const getSigUsages = () => isPublic ? [ "verify" ] : [ "sign" ];
4873
+ const getEncUsages = () => isPublic ? [ "encrypt", "wrapKey" ] : [ "decrypt", "unwrapKey" ];
4874
+ switch (alg) {
4875
+ case "PS256":
4876
+ case "PS384":
4877
+ case "PS512":
4878
+ algorithm = {
4879
+ name: "RSA-PSS",
4880
+ hash: "SHA-".concat(alg.slice(-3))
4881
+ };
4882
+ keyUsages = getSigUsages();
4883
+ break;
4884
+
4885
+ case "RS256":
4886
+ case "RS384":
4887
+ case "RS512":
4888
+ algorithm = {
4889
+ name: "RSASSA-PKCS1-v1_5",
4890
+ hash: "SHA-".concat(alg.slice(-3))
4891
+ };
4892
+ keyUsages = getSigUsages();
4893
+ break;
4894
+
4895
+ case "RSA-OAEP":
4896
+ case "RSA-OAEP-256":
4897
+ case "RSA-OAEP-384":
4898
+ case "RSA-OAEP-512":
4899
+ algorithm = {
4900
+ name: "RSA-OAEP",
4901
+ hash: "SHA-".concat(parseInt(alg.slice(-3), 10) || 1)
4902
+ };
4903
+ keyUsages = getEncUsages();
4904
+ break;
4905
+
4906
+ case "ES256":
4907
+ case "ES384":
4908
+ case "ES512":
4909
+ {
4910
+ const curveMap = {
4911
+ ES256: "P-256",
4912
+ ES384: "P-384",
4913
+ ES512: "P-521"
4914
+ };
4915
+ algorithm = {
4916
+ name: "ECDSA",
4917
+ namedCurve: curveMap[alg]
4918
+ };
4919
+ keyUsages = getSigUsages();
4920
+ break;
4921
+ }
4922
+
4923
+ case "ECDH-ES":
4924
+ case "ECDH-ES+A128KW":
4925
+ case "ECDH-ES+A192KW":
4926
+ case "ECDH-ES+A256KW":
4927
+ {
4928
+ try {
4929
+ const namedCurve = options.getNamedCurve(keyData);
4930
+ algorithm = namedCurve === "X25519" ? {
4931
+ name: "X25519"
4932
+ } : {
4933
+ name: "ECDH",
4934
+ namedCurve: namedCurve
4935
+ };
4936
+ } catch (cause) {
4937
+ throw new JOSENotSupported("Invalid or unsupported key format");
4938
+ }
4939
+ keyUsages = isPublic ? [] : [ "deriveBits" ];
4940
+ break;
4941
+ }
4942
+
4943
+ case "Ed25519":
4944
+ case "EdDSA":
4945
+ algorithm = {
4946
+ name: "Ed25519"
4947
+ };
4948
+ keyUsages = getSigUsages();
4949
+ break;
4950
+
4951
+ case "ML-DSA-44":
4952
+ case "ML-DSA-65":
4953
+ case "ML-DSA-87":
4954
+ algorithm = {
4955
+ name: alg
4956
+ };
4957
+ keyUsages = getSigUsages();
4958
+ break;
4959
+
4960
+ default:
4961
+ throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
4962
+ }
4963
+ return crypto.subtle.importKey(keyFormat, keyData, algorithm, (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : isPublic ? true : false, keyUsages);
4964
+ };
4965
+ const processPEMData = (pem, pattern) => decodeBase64(pem.replace(pattern, ""));
4966
+ const fromPKCS8 = (pem, alg, options) => {
4967
+ var _alg$startsWith;
4968
+ const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g);
4969
+ let opts = options;
4970
+ if (alg !== null && alg !== void 0 && (_alg$startsWith = alg.startsWith) !== null && _alg$startsWith !== void 0 && _alg$startsWith.call(alg, "ECDH-ES")) {
4971
+ opts || (opts = {});
4972
+ opts.getNamedCurve = keyData => {
4973
+ const state = createASN1State(keyData);
4974
+ parsePKCS8Header(state);
4975
+ return parseECAlgorithmIdentifier(state);
4976
+ };
4977
+ }
4978
+ return genericImport("pkcs8", keyData, alg, opts);
4979
+ };
4980
+ async function importPKCS8(pkcs8, alg, options) {
4981
+ if (typeof pkcs8 !== "string" || pkcs8.indexOf("-----BEGIN PRIVATE KEY-----") !== 0) {
4982
+ throw new TypeError('"pkcs8" must be PKCS#8 formatted string');
4983
+ }
4984
+ return fromPKCS8(pkcs8, alg, options);
4985
+ }
4986
+ async function importJWK(jwk, alg, options) {
4987
+ var _options$extractable;
4988
+ if (!isObject(jwk)) {
4989
+ throw new TypeError("JWK must be an object");
4990
+ }
4991
+ let ext;
4992
+ alg !== null && alg !== void 0 ? alg : alg = jwk.alg;
4993
+ ext !== null && ext !== void 0 ? ext : ext = (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : jwk.ext;
4994
+ switch (jwk.kty) {
4995
+ case "oct":
4996
+ if (typeof jwk.k !== "string" || !jwk.k) {
4997
+ throw new TypeError('missing "k" (Key Value) Parameter value');
4998
+ }
4999
+ return decode(jwk.k);
5000
+
5001
+ case "RSA":
5002
+ if ("oth" in jwk && jwk.oth !== undefined) {
5003
+ throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
5004
+ }
5005
+ return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5006
+ alg: alg,
5007
+ ext: ext
5008
+ }));
5009
+
5010
+ case "AKP":
5011
+ {
5012
+ if (typeof jwk.alg !== "string" || !jwk.alg) {
5013
+ throw new TypeError('missing "alg" (Algorithm) Parameter value');
5014
+ }
5015
+ if (alg !== undefined && alg !== jwk.alg) {
5016
+ throw new TypeError("JWK alg and alg option value mismatch");
5017
+ }
5018
+ return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5019
+ ext: ext
5020
+ }));
5021
+ }
5022
+
5023
+ case "EC":
5024
+ case "OKP":
5025
+ return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5026
+ alg: alg,
5027
+ ext: ext
5028
+ }));
5029
+
5030
+ default:
5031
+ throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
5032
+ }
5033
+ }
5034
+ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
5035
+ if (joseHeader.crit !== undefined && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === undefined) {
5036
+ throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
4961
5037
  }
4962
- if (!cached) {
4963
- cache.set(keyObject, {
4964
- [alg]: cryptoKey
4965
- });
4966
- } else {
4967
- cached[alg] = cryptoKey;
5038
+ if (!protectedHeader || protectedHeader.crit === undefined) {
5039
+ return new Set;
4968
5040
  }
4969
- return cryptoKey;
4970
- };
4971
- async function normalizeKey(key, alg) {
4972
- if (key instanceof Uint8Array) {
4973
- return key;
5041
+ if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some(input => typeof input !== "string" || input.length === 0)) {
5042
+ throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
4974
5043
  }
4975
- if (isCryptoKey(key)) {
4976
- return key;
5044
+ let recognized;
5045
+ if (recognizedOption !== undefined) {
5046
+ recognized = new Map([ ...Object.entries(recognizedOption), ...recognizedDefault.entries() ]);
5047
+ } else {
5048
+ recognized = recognizedDefault;
4977
5049
  }
4978
- if (isKeyObject(key)) {
4979
- if (key.type === "secret") {
4980
- return key.export();
5050
+ for (const parameter of protectedHeader.crit) {
5051
+ if (!recognized.has(parameter)) {
5052
+ throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
4981
5053
  }
4982
- if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
4983
- try {
4984
- return handleKeyObject(key, alg);
4985
- } catch (err) {
4986
- if (err instanceof TypeError) {
4987
- throw err;
4988
- }
4989
- }
5054
+ if (joseHeader[parameter] === undefined) {
5055
+ throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
4990
5056
  }
4991
- let jwk = key.export({
4992
- format: "jwk"
4993
- });
4994
- return handleJWK(key, jwk, alg);
4995
- }
4996
- if (isJWK(key)) {
4997
- if (key.k) {
4998
- return decode(key.k);
5057
+ if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
5058
+ throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
4999
5059
  }
5000
- return handleJWK(key, key, alg, true);
5001
5060
  }
5002
- throw new Error("unreachable");
5061
+ return new Set(protectedHeader.crit);
5062
+ }
5063
+ function validateAlgorithms(option, algorithms) {
5064
+ if (algorithms !== undefined && (!Array.isArray(algorithms) || algorithms.some(s => typeof s !== "string"))) {
5065
+ throw new TypeError('"'.concat(option, '" option must be an array of strings'));
5066
+ }
5067
+ if (!algorithms) {
5068
+ return undefined;
5069
+ }
5070
+ return new Set(algorithms);
5003
5071
  }
5004
5072
  const tag = key => key === null || key === void 0 ? void 0 : key[Symbol.toStringTag];
5005
5073
  const jwkMatchesOp = (alg, key, usage) => {
@@ -5130,7 +5198,7 @@
5130
5198
  let USER_AGENT$1;
5131
5199
  if (typeof navigator === "undefined" || !((_navigator$userAgent$1 = navigator.userAgent) !== null && _navigator$userAgent$1 !== void 0 && (_navigator$userAgent$$1 = _navigator$userAgent$1.startsWith) !== null && _navigator$userAgent$$1 !== void 0 && _navigator$userAgent$$1.call(_navigator$userAgent$1, "Mozilla/5.0 "))) {
5132
5200
  const NAME = "openid-client";
5133
- const VERSION = "v6.8.1";
5201
+ const VERSION = "v6.8.2";
5134
5202
  USER_AGENT$1 = "".concat(NAME, "/").concat(VERSION);
5135
5203
  headers = {
5136
5204
  "user-agent": USER_AGENT$1
@@ -5320,7 +5388,7 @@
5320
5388
  method: "GET",
5321
5389
  redirect: "manual",
5322
5390
  signal: signal
5323
- })).then((response => processDiscoveryResponse(_nodiscoverycheck, response))).catch(errorHandler);
5391
+ })).then(response => processDiscoveryResponse(_nodiscoverycheck, response)).catch(errorHandler);
5324
5392
  if (resolve && new URL(as.issuer).href !== server.href) {
5325
5393
  handleEntraId(server, as, options) || handleB2Clogin(server, options) || (() => {
5326
5394
  throw new ClientError("discovered metadata issuer does not match the expected issuer", {
@@ -5486,7 +5554,7 @@
5486
5554
  }
5487
5555
  }
5488
5556
  function wait(duration, signal) {
5489
- return new Promise(((resolve, reject) => {
5557
+ return new Promise((resolve, reject) => {
5490
5558
  const waitStep = remaining => {
5491
5559
  try {
5492
5560
  signal.throwIfAborted();
@@ -5499,10 +5567,10 @@
5499
5567
  return;
5500
5568
  }
5501
5569
  const currentWait = Math.min(remaining, 5);
5502
- setTimeout((() => waitStep(remaining - currentWait)), currentWait * 1e3);
5570
+ setTimeout(() => waitStep(remaining - currentWait), currentWait * 1e3);
5503
5571
  };
5504
5572
  waitStep(duration);
5505
- }));
5573
+ });
5506
5574
  }
5507
5575
  async function initiateBackchannelAuthentication(config, parameters) {
5508
5576
  checkConfig(config);
@@ -5512,7 +5580,7 @@
5512
5580
  [allowInsecureRequests$1]: !tlsOnly,
5513
5581
  headers: new Headers(headers),
5514
5582
  signal: signal(timeout)
5515
- }).then((response => processBackchannelAuthenticationResponse(as, c, response))).catch(errorHandler);
5583
+ }).then(response => processBackchannelAuthenticationResponse(as, c, response)).catch(errorHandler);
5516
5584
  }
5517
5585
  async function pollBackchannelAuthenticationGrant(config, backchannelAuthenticationResponse, parameters, options) {
5518
5586
  var _backchannelAuthentic, _options$signal2;
@@ -5824,7 +5892,7 @@
5824
5892
  DPoP: options === null || options === void 0 ? void 0 : options.DPoP,
5825
5893
  headers: new Headers(headers),
5826
5894
  signal: signal(timeout)
5827
- }).then((response => {
5895
+ }).then(response => {
5828
5896
  let recognizedTokenTypes;
5829
5897
  if (grantType === "urn:ietf:params:oauth:grant-type:token-exchange") {
5830
5898
  recognizedTokenTypes = {
@@ -5835,87 +5903,10 @@
5835
5903
  [jweDecrypt]: decrypt,
5836
5904
  recognizedTokenTypes: recognizedTokenTypes
5837
5905
  });
5838
- })).catch(errorHandler);
5906
+ }).catch(errorHandler);
5839
5907
  addHelpers(result);
5840
5908
  return result;
5841
5909
  }
5842
- function subtleAlgorithm(alg, algorithm) {
5843
- const hash = "SHA-".concat(alg.slice(-3));
5844
- switch (alg) {
5845
- case "HS256":
5846
- case "HS384":
5847
- case "HS512":
5848
- return {
5849
- hash: hash,
5850
- name: "HMAC"
5851
- };
5852
-
5853
- case "PS256":
5854
- case "PS384":
5855
- case "PS512":
5856
- return {
5857
- hash: hash,
5858
- name: "RSA-PSS",
5859
- saltLength: parseInt(alg.slice(-3), 10) >> 3
5860
- };
5861
-
5862
- case "RS256":
5863
- case "RS384":
5864
- case "RS512":
5865
- return {
5866
- hash: hash,
5867
- name: "RSASSA-PKCS1-v1_5"
5868
- };
5869
-
5870
- case "ES256":
5871
- case "ES384":
5872
- case "ES512":
5873
- return {
5874
- hash: hash,
5875
- name: "ECDSA",
5876
- namedCurve: algorithm.namedCurve
5877
- };
5878
-
5879
- case "Ed25519":
5880
- case "EdDSA":
5881
- return {
5882
- name: "Ed25519"
5883
- };
5884
-
5885
- case "ML-DSA-44":
5886
- case "ML-DSA-65":
5887
- case "ML-DSA-87":
5888
- return {
5889
- name: alg
5890
- };
5891
-
5892
- default:
5893
- throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
5894
- }
5895
- }
5896
- async function getSigKey(alg, key, usage) {
5897
- if (key instanceof Uint8Array) {
5898
- if (!alg.startsWith("HS")) {
5899
- throw new TypeError(invalidKeyInput(key, "CryptoKey", "KeyObject", "JSON Web Key"));
5900
- }
5901
- return crypto.subtle.importKey("raw", key, {
5902
- hash: "SHA-".concat(alg.slice(-3)),
5903
- name: "HMAC"
5904
- }, false, [ usage ]);
5905
- }
5906
- checkSigCryptoKey(key, alg, usage);
5907
- return key;
5908
- }
5909
- async function verify(alg, key, signature, data) {
5910
- const cryptoKey = await getSigKey(alg, key, "verify");
5911
- checkKeyLength(alg, cryptoKey);
5912
- const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);
5913
- try {
5914
- return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);
5915
- } catch (_unused) {
5916
- return false;
5917
- }
5918
- }
5919
5910
  async function flattenedVerify(jws, key, options) {
5920
5911
  if (!isObject(jws)) {
5921
5912
  throw new JWSInvalid("Flattened JWS must be an object");
@@ -5978,12 +5969,7 @@
5978
5969
  }
5979
5970
  checkKeyType(alg, key, "verify");
5980
5971
  const data = concat(jws.protected !== undefined ? encode(jws.protected) : new Uint8Array, encode("."), typeof jws.payload === "string" ? b64 ? encode(jws.payload) : encoder.encode(jws.payload) : jws.payload);
5981
- let signature;
5982
- try {
5983
- signature = decode(jws.signature);
5984
- } catch (_unused2) {
5985
- throw new JWSInvalid("Failed to base64url decode the signature");
5986
- }
5972
+ const signature = decodeBase64url(jws.signature, "signature", JWSInvalid);
5987
5973
  const k = await normalizeKey(key, alg);
5988
5974
  const verified = await verify(alg, k, signature, data);
5989
5975
  if (!verified) {
@@ -5991,11 +5977,7 @@
5991
5977
  }
5992
5978
  let payload;
5993
5979
  if (b64) {
5994
- try {
5995
- payload = decode(jws.payload);
5996
- } catch (_unused3) {
5997
- throw new JWSInvalid("Failed to base64url decode the payload");
5998
- }
5980
+ payload = decodeBase64url(jws.payload, "payload", JWSInvalid);
5999
5981
  } else if (typeof jws.payload === "string") {
6000
5982
  payload = encoder.encode(jws.payload);
6001
5983
  } else {
@@ -6263,7 +6245,7 @@
6263
6245
  async getKey(protectedHeader, token) {
6264
6246
  const {alg: alg, kid: kid} = _objectSpread2(_objectSpread2({}, protectedHeader), token === null || token === void 0 ? void 0 : token.header);
6265
6247
  const kty = getKtyFromAlg(alg);
6266
- const candidates = _classPrivateFieldGet2(_jwks$1, this).keys.filter((jwk => {
6248
+ const candidates = _classPrivateFieldGet2(_jwks$1, this).keys.filter(jwk => {
6267
6249
  let candidate = kty === jwk.kty;
6268
6250
  if (candidate && typeof kid === "string") {
6269
6251
  candidate = kid === jwk.kid;
@@ -6298,7 +6280,7 @@
6298
6280
  }
6299
6281
  }
6300
6282
  return candidate;
6301
- }));
6283
+ });
6302
6284
  const {0: jwk, length: length} = candidates;
6303
6285
  if (length === 0) {
6304
6286
  throw new JWKSNoMatchingKey;
@@ -6306,13 +6288,13 @@
6306
6288
  if (length !== 1) {
6307
6289
  const error = new JWKSMultipleMatchingKeys;
6308
6290
  const _cached = _classPrivateFieldGet2(_cached2, this);
6309
- error[Symbol.asyncIterator] = _wrapAsyncGenerator((function*() {
6291
+ error[Symbol.asyncIterator] = _wrapAsyncGenerator(function*() {
6310
6292
  for (const jwk of candidates) {
6311
6293
  try {
6312
6294
  yield yield _awaitAsyncGenerator(importWithAlgCache(_cached, jwk, alg));
6313
6295
  } catch (_unused) {}
6314
6296
  }
6315
- }));
6297
+ });
6316
6298
  throw error;
6317
6299
  }
6318
6300
  return importWithAlgCache(_classPrivateFieldGet2(_cached2, this), jwk, alg);
@@ -6351,7 +6333,7 @@
6351
6333
  let USER_AGENT;
6352
6334
  if (typeof navigator === "undefined" || !((_navigator$userAgent = navigator.userAgent) !== null && _navigator$userAgent !== void 0 && (_navigator$userAgent$ = _navigator$userAgent.startsWith) !== null && _navigator$userAgent$ !== void 0 && _navigator$userAgent$.call(_navigator$userAgent, "Mozilla/5.0 "))) {
6353
6335
  const NAME = "jose";
6354
- const VERSION = "v6.1.3";
6336
+ const VERSION = "v6.2.1";
6355
6337
  USER_AGENT = "".concat(NAME, "/").concat(VERSION);
6356
6338
  }
6357
6339
  const customFetch = Symbol();
@@ -6362,12 +6344,12 @@
6362
6344
  signal: signal,
6363
6345
  redirect: "manual",
6364
6346
  headers: headers
6365
- }).catch((err => {
6347
+ }).catch(err => {
6366
6348
  if (err.name === "TimeoutError") {
6367
6349
  throw new JWKSTimeout;
6368
6350
  }
6369
6351
  throw err;
6370
- }));
6352
+ });
6371
6353
  if (response.status !== 200) {
6372
6354
  throw new JOSEError("Expected 200 OK from the JSON Web Key Set HTTP response");
6373
6355
  }
@@ -6469,7 +6451,7 @@
6469
6451
  if (_classPrivateFieldGet2(_pendingFetch, this) && isCloudflareWorkers()) {
6470
6452
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6471
6453
  }
6472
- _classPrivateFieldGet2(_pendingFetch, this) || _classPrivateFieldSet2(_pendingFetch, this, fetchJwks(_classPrivateFieldGet2(_url, this).href, _classPrivateFieldGet2(_headers, this), AbortSignal.timeout(_classPrivateFieldGet2(_timeoutDuration, this)), _classPrivateFieldGet2(_customFetch$1, this)).then((json => {
6454
+ _classPrivateFieldGet2(_pendingFetch, this) || _classPrivateFieldSet2(_pendingFetch, this, fetchJwks(_classPrivateFieldGet2(_url, this).href, _classPrivateFieldGet2(_headers, this), AbortSignal.timeout(_classPrivateFieldGet2(_timeoutDuration, this)), _classPrivateFieldGet2(_customFetch$1, this)).then(json => {
6473
6455
  _classPrivateFieldSet2(_local, this, createLocalJWKSet(json));
6474
6456
  if (_classPrivateFieldGet2(_cache, this)) {
6475
6457
  _classPrivateFieldGet2(_cache, this).uat = Date.now();
@@ -6477,10 +6459,10 @@
6477
6459
  }
6478
6460
  _classPrivateFieldSet2(_jwksTimestamp, this, Date.now());
6479
6461
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6480
- })).catch((err => {
6462
+ }).catch(err => {
6481
6463
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6482
6464
  throw err;
6483
- })));
6465
+ }));
6484
6466
  await _classPrivateFieldGet2(_pendingFetch, this);
6485
6467
  }
6486
6468
  }
@@ -6519,7 +6501,7 @@
6519
6501
  return remoteJWKSet;
6520
6502
  }
6521
6503
  const _excluded = [ "mfaToken" ], _excluded2 = [ "mfaToken" ];
6522
- var _baseUrl, _clientId, _customFetch, _configuration, _serverMetadata, _options, _jwks, _Class8_brand;
6504
+ var _baseUrl, _clientId, _customFetch, _entries, _ttlMs, _maxEntries, _configuration, _serverMetadata, _clientAuthPromise, _options, _customFetch2, _jwks, _discoveryCache, _inFlightDiscovery, _jwksCache, _Class9_brand;
6523
6505
  var NotSupportedError = class NotSupportedError extends Error {
6524
6506
  constructor(code, message) {
6525
6507
  super(message);
@@ -6611,12 +6593,12 @@
6611
6593
  }
6612
6594
  };
6613
6595
  function stripUndefinedProperties(value) {
6614
- return Object.entries(value).filter((_ref => {
6596
+ return Object.entries(value).filter(_ref => {
6615
6597
  let [, value2] = _ref;
6616
6598
  return typeof value2 !== "undefined";
6617
- })).reduce(((acc, curr) => _objectSpread2(_objectSpread2({}, acc), {}, {
6599
+ }).reduce((acc, curr) => _objectSpread2(_objectSpread2({}, acc), {}, {
6618
6600
  [curr[0]]: curr[1]
6619
- })), {});
6601
+ }), {});
6620
6602
  }
6621
6603
  var MfaError$1 = class MfaError extends Error {
6622
6604
  constructor(code, message, cause) {
@@ -6681,7 +6663,9 @@
6681
6663
  oobChannel: api.oob_channel,
6682
6664
  oobCode: api.oob_code,
6683
6665
  bindingMethod: api.binding_method,
6684
- id: api.id
6666
+ id: api.id,
6667
+ barcodeUri: api.barcode_uri,
6668
+ recoveryCodes: api.recovery_codes
6685
6669
  };
6686
6670
  }
6687
6671
  throw new Error("Unexpected authenticator type: ".concat(api.authenticator_type));
@@ -6799,6 +6783,40 @@
6799
6783
  return transformChallengeResponse(apiResponse);
6800
6784
  }
6801
6785
  });
6786
+ function createTelemetryFetch(baseFetch, config) {
6787
+ if (config.enabled === false) {
6788
+ return baseFetch;
6789
+ }
6790
+ const telemetryData = {
6791
+ name: config.name,
6792
+ version: config.version
6793
+ };
6794
+ const headerValue = btoa(JSON.stringify(telemetryData));
6795
+ return async (input, init) => {
6796
+ const headers = input instanceof Request ? new Headers(input.headers) : new Headers;
6797
+ if (init !== null && init !== void 0 && init.headers) {
6798
+ const initHeaders = new Headers(init.headers);
6799
+ initHeaders.forEach((value, key) => {
6800
+ headers.set(key, value);
6801
+ });
6802
+ }
6803
+ headers.set("Auth0-Client", headerValue);
6804
+ return baseFetch(input, _objectSpread2(_objectSpread2({}, init), {}, {
6805
+ headers: headers
6806
+ }));
6807
+ };
6808
+ }
6809
+ function getTelemetryConfig(config) {
6810
+ var _config$name, _config$version;
6811
+ if ((config === null || config === void 0 ? void 0 : config.enabled) === false) {
6812
+ return config;
6813
+ }
6814
+ return {
6815
+ enabled: true,
6816
+ name: (_config$name = config === null || config === void 0 ? void 0 : config.name) !== null && _config$name !== void 0 ? _config$name : "@auth0/auth0-auth-js",
6817
+ version: (_config$version = config === null || config === void 0 ? void 0 : config.version) !== null && _config$version !== void 0 ? _config$version : "1.5.0"
6818
+ };
6819
+ }
6802
6820
  var TokenResponse = class _TokenResponse {
6803
6821
  constructor(accessToken, expiresAt, idToken, refreshToken, scope, claims, authorizationDetails) {
6804
6822
  _defineProperty(this, "accessToken", void 0);
@@ -6826,6 +6844,75 @@
6826
6844
  return tokenResponse;
6827
6845
  }
6828
6846
  };
6847
+ var LruCache = (_entries = new WeakMap, _ttlMs = new WeakMap, _maxEntries = new WeakMap,
6848
+ class LruCache {
6849
+ constructor(maxEntries, ttlMs) {
6850
+ _classPrivateFieldInitSpec(this, _entries, new Map);
6851
+ _classPrivateFieldInitSpec(this, _ttlMs, void 0);
6852
+ _classPrivateFieldInitSpec(this, _maxEntries, void 0);
6853
+ _classPrivateFieldSet2(_maxEntries, this, Math.max(1, Math.floor(maxEntries)));
6854
+ _classPrivateFieldSet2(_ttlMs, this, Math.max(0, Math.floor(ttlMs)));
6855
+ }
6856
+ get(key) {
6857
+ const entry = _classPrivateFieldGet2(_entries, this).get(key);
6858
+ if (!entry) {
6859
+ return;
6860
+ }
6861
+ if (Date.now() >= entry.expiresAt) {
6862
+ _classPrivateFieldGet2(_entries, this).delete(key);
6863
+ return;
6864
+ }
6865
+ _classPrivateFieldGet2(_entries, this).delete(key);
6866
+ _classPrivateFieldGet2(_entries, this).set(key, entry);
6867
+ return entry.value;
6868
+ }
6869
+ set(key, value) {
6870
+ if (_classPrivateFieldGet2(_entries, this).has(key)) {
6871
+ _classPrivateFieldGet2(_entries, this).delete(key);
6872
+ }
6873
+ _classPrivateFieldGet2(_entries, this).set(key, {
6874
+ value: value,
6875
+ expiresAt: Date.now() + _classPrivateFieldGet2(_ttlMs, this)
6876
+ });
6877
+ while (_classPrivateFieldGet2(_entries, this).size > _classPrivateFieldGet2(_maxEntries, this)) {
6878
+ const oldestKey = _classPrivateFieldGet2(_entries, this).keys().next().value;
6879
+ if (oldestKey === void 0) {
6880
+ break;
6881
+ }
6882
+ _classPrivateFieldGet2(_entries, this).delete(oldestKey);
6883
+ }
6884
+ }
6885
+ });
6886
+ var globalCaches = new Map;
6887
+ function getGlobalCache(key) {
6888
+ return globalCaches.get(key);
6889
+ }
6890
+ function getGlobalCacheKey(maxEntries, ttlMs) {
6891
+ return "".concat(maxEntries, ":").concat(ttlMs);
6892
+ }
6893
+ function resolveCacheConfig(options) {
6894
+ const ttlSeconds = typeof (options === null || options === void 0 ? void 0 : options.ttl) === "number" ? options.ttl : 600;
6895
+ const maxEntries = typeof (options === null || options === void 0 ? void 0 : options.maxEntries) === "number" && options.maxEntries > 0 ? options.maxEntries : 100;
6896
+ const ttlMs = ttlSeconds * 1e3;
6897
+ return {
6898
+ ttlMs: ttlMs,
6899
+ maxEntries: maxEntries
6900
+ };
6901
+ }
6902
+ var DiscoveryCacheFactory = class {
6903
+ static createDiscoveryCache(config) {
6904
+ const cacheKey = getGlobalCacheKey(config.maxEntries, config.ttlMs);
6905
+ let cache = getGlobalCache(cacheKey);
6906
+ if (!cache) {
6907
+ cache = new LruCache(config.maxEntries, config.ttlMs);
6908
+ globalCaches.set(cacheKey, cache);
6909
+ }
6910
+ return cache;
6911
+ }
6912
+ static createJwksCache() {
6913
+ return {};
6914
+ }
6915
+ };
6829
6916
  var DEFAULT_SCOPES = "openid profile email offline_access";
6830
6917
  var MAX_ARRAY_VALUES_PER_KEY = 20;
6831
6918
  var PARAM_DENYLIST = Object.freeze(new Set([ "grant_type", "client_id", "client_secret", "client_assertion", "client_assertion_type", "subject_token", "subject_token_type", "requested_token_type", "actor_token", "actor_token_type", "audience", "aud", "resource", "resources", "resource_indicator", "scope", "connection", "login_hint", "organization", "assertion" ]));
@@ -6854,9 +6941,9 @@
6854
6941
  if (parameterValue.length > MAX_ARRAY_VALUES_PER_KEY) {
6855
6942
  throw new TokenExchangeError("Parameter '".concat(parameterKey, "' exceeds maximum array size of ").concat(MAX_ARRAY_VALUES_PER_KEY));
6856
6943
  }
6857
- parameterValue.forEach((arrayItem => {
6944
+ parameterValue.forEach(arrayItem => {
6858
6945
  params.append(parameterKey, arrayItem);
6859
- }));
6946
+ });
6860
6947
  } else {
6861
6948
  params.append(parameterKey, parameterValue);
6862
6949
  }
@@ -6867,39 +6954,58 @@
6867
6954
  var SUBJECT_TYPE_REFRESH_TOKEN = "urn:ietf:params:oauth:token-type:refresh_token";
6868
6955
  var SUBJECT_TYPE_ACCESS_TOKEN = "urn:ietf:params:oauth:token-type:access_token";
6869
6956
  var REQUESTED_TOKEN_TYPE_FEDERATED_CONNECTION_ACCESS_TOKEN = "http://auth0.com/oauth/token-type/federated-connection-access-token";
6870
- var AuthClient = (_configuration = new WeakMap, _serverMetadata = new WeakMap, _options = new WeakMap,
6871
- _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
6957
+ var AuthClient = (_configuration = new WeakMap, _serverMetadata = new WeakMap, _clientAuthPromise = new WeakMap,
6958
+ _options = new WeakMap, _customFetch2 = new WeakMap, _jwks = new WeakMap, _discoveryCache = new WeakMap,
6959
+ _inFlightDiscovery = new WeakMap, _jwksCache = new WeakMap, _Class9_brand = new WeakSet,
6960
+ class AuthClient {
6872
6961
  constructor(_options2) {
6873
- _classPrivateMethodInitSpec(this, _Class8_brand);
6962
+ var _options2$customFetch;
6963
+ _classPrivateMethodInitSpec(this, _Class9_brand);
6874
6964
  _classPrivateFieldInitSpec(this, _configuration, void 0);
6875
6965
  _classPrivateFieldInitSpec(this, _serverMetadata, void 0);
6966
+ _classPrivateFieldInitSpec(this, _clientAuthPromise, void 0);
6876
6967
  _classPrivateFieldInitSpec(this, _options, void 0);
6968
+ _classPrivateFieldInitSpec(this, _customFetch2, void 0);
6877
6969
  _classPrivateFieldInitSpec(this, _jwks, void 0);
6970
+ _classPrivateFieldInitSpec(this, _discoveryCache, void 0);
6971
+ _classPrivateFieldInitSpec(this, _inFlightDiscovery, void 0);
6972
+ _classPrivateFieldInitSpec(this, _jwksCache, void 0);
6878
6973
  _defineProperty(this, "mfa", void 0);
6879
6974
  _classPrivateFieldSet2(_options, this, _options2);
6880
6975
  if (_options2.useMtls && !_options2.customFetch) {
6881
6976
  throw new NotSupportedError("mtls_without_custom_fetch_not_supported", "Using mTLS without a custom fetch implementation is not supported");
6882
6977
  }
6978
+ _classPrivateFieldSet2(_customFetch2, this, createTelemetryFetch((_options2$customFetch = _options2.customFetch) !== null && _options2$customFetch !== void 0 ? _options2$customFetch : function() {
6979
+ return fetch(...arguments);
6980
+ }, getTelemetryConfig(_options2.telemetry)));
6981
+ const cacheConfig = resolveCacheConfig(_options2.discoveryCache);
6982
+ _classPrivateFieldSet2(_discoveryCache, this, DiscoveryCacheFactory.createDiscoveryCache(cacheConfig));
6983
+ _classPrivateFieldSet2(_inFlightDiscovery, this, new Map);
6984
+ _classPrivateFieldSet2(_jwksCache, this, DiscoveryCacheFactory.createJwksCache());
6883
6985
  this.mfa = new MfaClient({
6884
6986
  domain: _classPrivateFieldGet2(_options, this).domain,
6885
6987
  clientId: _classPrivateFieldGet2(_options, this).clientId,
6886
- customFetch: _classPrivateFieldGet2(_options, this).customFetch
6988
+ customFetch: _classPrivateFieldGet2(_customFetch2, this)
6887
6989
  });
6888
6990
  }
6991
+ async getServerMetadata() {
6992
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6993
+ return serverMetadata;
6994
+ }
6889
6995
  async buildAuthorizationUrl(options) {
6890
- const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
6996
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6891
6997
  if (options !== null && options !== void 0 && options.pushedAuthorizationRequests && !serverMetadata.pushed_authorization_request_endpoint) {
6892
6998
  throw new NotSupportedError("par_not_supported_error", "The Auth0 tenant does not have pushed authorization requests enabled. Learn how to enable it here: https://auth0.com/docs/get-started/applications/configure-par");
6893
6999
  }
6894
7000
  try {
6895
- return await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, options);
7001
+ return await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, options);
6896
7002
  } catch (e) {
6897
7003
  throw new BuildAuthorizationUrlError(e);
6898
7004
  }
6899
7005
  }
6900
7006
  async buildLinkUserUrl(options) {
6901
7007
  try {
6902
- const result = await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, {
7008
+ const result = await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, {
6903
7009
  authorizationParams: _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
6904
7010
  requested_connection: options.connection,
6905
7011
  requested_connection_scope: options.connectionScope,
@@ -6917,7 +7023,7 @@
6917
7023
  }
6918
7024
  async buildUnlinkUserUrl(options) {
6919
7025
  try {
6920
- const result = await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, {
7026
+ const result = await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, {
6921
7027
  authorizationParams: _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
6922
7028
  requested_connection: options.connection,
6923
7029
  scope: "openid unlink_account",
@@ -6933,7 +7039,7 @@
6933
7039
  }
6934
7040
  }
6935
7041
  async backchannelAuthentication(options) {
6936
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7042
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6937
7043
  const additionalParams = stripUndefinedProperties(_objectSpread2(_objectSpread2({}, _classPrivateFieldGet2(_options, this).authorizationParams), options === null || options === void 0 ? void 0 : options.authorizationParams));
6938
7044
  const params = new URLSearchParams(_objectSpread2(_objectSpread2({
6939
7045
  scope: DEFAULT_SCOPES
@@ -6961,7 +7067,7 @@
6961
7067
  }
6962
7068
  }
6963
7069
  async initiateBackchannelAuthentication(options) {
6964
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7070
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6965
7071
  const additionalParams = stripUndefinedProperties(_objectSpread2(_objectSpread2({}, _classPrivateFieldGet2(_options, this).authorizationParams), options === null || options === void 0 ? void 0 : options.authorizationParams));
6966
7072
  const params = new URLSearchParams(_objectSpread2(_objectSpread2({
6967
7073
  scope: DEFAULT_SCOPES
@@ -6993,7 +7099,7 @@
6993
7099
  }
6994
7100
  async backchannelAuthenticationGrant(_ref2) {
6995
7101
  let {authReqId: authReqId} = _ref2;
6996
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7102
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6997
7103
  const params = new URLSearchParams({
6998
7104
  auth_req_id: authReqId
6999
7105
  });
@@ -7028,10 +7134,10 @@
7028
7134
  }
7029
7135
  }
7030
7136
  async exchangeToken(options) {
7031
- return "connection" in options ? _assertClassBrand(_Class8_brand, this, _exchangeTokenVaultToken).call(this, options) : _assertClassBrand(_Class8_brand, this, _exchangeProfileToken).call(this, options);
7137
+ return "connection" in options ? _assertClassBrand(_Class9_brand, this, _exchangeTokenVaultToken).call(this, options) : _assertClassBrand(_Class9_brand, this, _exchangeProfileToken).call(this, options);
7032
7138
  }
7033
7139
  async getTokenByCode(url, options) {
7034
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7140
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7035
7141
  try {
7036
7142
  const tokenEndpointResponse = await authorizationCodeGrant(configuration, url, {
7037
7143
  pkceCodeVerifier: options.codeVerifier
@@ -7042,16 +7148,23 @@
7042
7148
  }
7043
7149
  }
7044
7150
  async getTokenByRefreshToken(options) {
7045
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7151
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7152
+ const additionalParameters = new URLSearchParams;
7153
+ if (options.audience) {
7154
+ additionalParameters.append("audience", options.audience);
7155
+ }
7156
+ if (options.scope) {
7157
+ additionalParameters.append("scope", options.scope);
7158
+ }
7046
7159
  try {
7047
- const tokenEndpointResponse = await refreshTokenGrant(configuration, options.refreshToken);
7160
+ const tokenEndpointResponse = await refreshTokenGrant(configuration, options.refreshToken, additionalParameters);
7048
7161
  return TokenResponse.fromTokenEndpointResponse(tokenEndpointResponse);
7049
7162
  } catch (e) {
7050
7163
  throw new TokenByRefreshTokenError("The access token has expired and there was an error while trying to refresh it.", e);
7051
7164
  }
7052
7165
  }
7053
7166
  async getTokenByClientCredentials(options) {
7054
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7167
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7055
7168
  try {
7056
7169
  const params = new URLSearchParams({
7057
7170
  audience: options.audience
@@ -7066,7 +7179,7 @@
7066
7179
  }
7067
7180
  }
7068
7181
  async buildLogoutUrl(options) {
7069
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7182
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7070
7183
  if (!serverMetadata.end_session_endpoint) {
7071
7184
  const url = new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain, "/v2/logout"));
7072
7185
  url.searchParams.set("returnTo", options.returnTo);
@@ -7078,9 +7191,13 @@
7078
7191
  });
7079
7192
  }
7080
7193
  async verifyLogoutToken(options) {
7081
- const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7082
- _classPrivateFieldGet2(_jwks, this) || _classPrivateFieldSet2(_jwks, this, createRemoteJWKSet(new URL(serverMetadata.jwks_uri), {
7083
- [customFetch]: _classPrivateFieldGet2(_options, this).customFetch
7194
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7195
+ const cacheConfig = resolveCacheConfig(_classPrivateFieldGet2(_options, this).discoveryCache);
7196
+ const jwksUri = serverMetadata.jwks_uri;
7197
+ _classPrivateFieldGet2(_jwks, this) || _classPrivateFieldSet2(_jwks, this, createRemoteJWKSet(new URL(jwksUri), {
7198
+ cacheMaxAge: cacheConfig.ttlMs,
7199
+ [customFetch]: _classPrivateFieldGet2(_customFetch2, this),
7200
+ [jwksCache]: _classPrivateFieldGet2(_jwksCache, this)
7084
7201
  }));
7085
7202
  const {payload: payload} = await jwtVerify(options.logoutToken, _classPrivateFieldGet2(_jwks, this), {
7086
7203
  issuer: serverMetadata.issuer,
@@ -7118,6 +7235,16 @@
7118
7235
  };
7119
7236
  }
7120
7237
  });
7238
+ function _getDiscoveryCacheKey() {
7239
+ const domain = _classPrivateFieldGet2(_options, this).domain.toLowerCase();
7240
+ return "".concat(domain, "|mtls:").concat(_classPrivateFieldGet2(_options, this).useMtls ? "1" : "0");
7241
+ }
7242
+ async function _createConfiguration(serverMetadata) {
7243
+ const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
7244
+ const configuration = new Configuration(serverMetadata, _classPrivateFieldGet2(_options, this).clientId, _classPrivateFieldGet2(_options, this).clientSecret, clientAuth);
7245
+ configuration[customFetch$1] = _classPrivateFieldGet2(_customFetch2, this);
7246
+ return configuration;
7247
+ }
7121
7248
  async function _discover() {
7122
7249
  if (_classPrivateFieldGet2(_configuration, this) && _classPrivateFieldGet2(_serverMetadata, this)) {
7123
7250
  return {
@@ -7125,14 +7252,58 @@
7125
7252
  serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7126
7253
  };
7127
7254
  }
7128
- const clientAuth = await _assertClassBrand(_Class8_brand, this, _getClientAuth).call(this);
7129
- _classPrivateFieldSet2(_configuration, this, await discovery(new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain)), _classPrivateFieldGet2(_options, this).clientId, {
7130
- use_mtls_endpoint_aliases: _classPrivateFieldGet2(_options, this).useMtls
7131
- }, clientAuth, {
7132
- [customFetch$1]: _classPrivateFieldGet2(_options, this).customFetch
7133
- }));
7134
- _classPrivateFieldSet2(_serverMetadata, this, _classPrivateFieldGet2(_configuration, this).serverMetadata());
7135
- _classPrivateFieldGet2(_configuration, this)[customFetch$1] = _classPrivateFieldGet2(_options, this).customFetch || fetch;
7255
+ const cacheKey = _assertClassBrand(_Class9_brand, this, _getDiscoveryCacheKey).call(this);
7256
+ const cached = _classPrivateFieldGet2(_discoveryCache, this).get(cacheKey);
7257
+ if (cached) {
7258
+ _classPrivateFieldSet2(_serverMetadata, this, cached.serverMetadata);
7259
+ _classPrivateFieldSet2(_configuration, this, await _assertClassBrand(_Class9_brand, this, _createConfiguration).call(this, cached.serverMetadata));
7260
+ return {
7261
+ configuration: _classPrivateFieldGet2(_configuration, this),
7262
+ serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7263
+ };
7264
+ }
7265
+ const inFlight = _classPrivateFieldGet2(_inFlightDiscovery, this).get(cacheKey);
7266
+ if (inFlight) {
7267
+ const entry = await inFlight;
7268
+ _classPrivateFieldSet2(_serverMetadata, this, entry.serverMetadata);
7269
+ _classPrivateFieldSet2(_configuration, this, await _assertClassBrand(_Class9_brand, this, _createConfiguration).call(this, entry.serverMetadata));
7270
+ return {
7271
+ configuration: _classPrivateFieldGet2(_configuration, this),
7272
+ serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7273
+ };
7274
+ }
7275
+ const discoveryPromise = (async () => {
7276
+ const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
7277
+ const configuration = await discovery(new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain)), _classPrivateFieldGet2(_options, this).clientId, {
7278
+ use_mtls_endpoint_aliases: _classPrivateFieldGet2(_options, this).useMtls
7279
+ }, clientAuth, {
7280
+ [customFetch$1]: _classPrivateFieldGet2(_customFetch2, this)
7281
+ });
7282
+ const serverMetadata = configuration.serverMetadata();
7283
+ _classPrivateFieldGet2(_discoveryCache, this).set(cacheKey, {
7284
+ serverMetadata: serverMetadata
7285
+ });
7286
+ return {
7287
+ configuration: configuration,
7288
+ serverMetadata: serverMetadata
7289
+ };
7290
+ })();
7291
+ const inFlightEntry = discoveryPromise.then(_ref3 => {
7292
+ let {serverMetadata: serverMetadata} = _ref3;
7293
+ return {
7294
+ serverMetadata: serverMetadata
7295
+ };
7296
+ });
7297
+ void inFlightEntry.catch(() => void 0);
7298
+ _classPrivateFieldGet2(_inFlightDiscovery, this).set(cacheKey, inFlightEntry);
7299
+ try {
7300
+ const {configuration: configuration, serverMetadata: serverMetadata} = await discoveryPromise;
7301
+ _classPrivateFieldSet2(_configuration, this, configuration);
7302
+ _classPrivateFieldSet2(_serverMetadata, this, serverMetadata);
7303
+ _classPrivateFieldGet2(_configuration, this)[customFetch$1] = _classPrivateFieldGet2(_customFetch2, this);
7304
+ } finally {
7305
+ _classPrivateFieldGet2(_inFlightDiscovery, this).delete(cacheKey);
7306
+ }
7136
7307
  return {
7137
7308
  configuration: _classPrivateFieldGet2(_configuration, this),
7138
7309
  serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
@@ -7140,7 +7311,7 @@
7140
7311
  }
7141
7312
  async function _exchangeTokenVaultToken(options) {
7142
7313
  var _options$subjectToken, _options$requestedTok;
7143
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7314
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7144
7315
  if ("audience" in options || "resource" in options) {
7145
7316
  throw new TokenExchangeError("audience and resource parameters are not supported for Token Vault exchanges");
7146
7317
  }
@@ -7166,7 +7337,7 @@
7166
7337
  }
7167
7338
  }
7168
7339
  async function _exchangeProfileToken(options) {
7169
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7340
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7170
7341
  validateSubjectToken(options.subjectToken);
7171
7342
  const tokenRequestParams = new URLSearchParams({
7172
7343
  subject_token_type: options.subjectTokenType,
@@ -7193,20 +7364,28 @@
7193
7364
  }
7194
7365
  }
7195
7366
  async function _getClientAuth() {
7196
- if (!_classPrivateFieldGet2(_options, this).clientSecret && !_classPrivateFieldGet2(_options, this).clientAssertionSigningKey && !_classPrivateFieldGet2(_options, this).useMtls) {
7197
- throw new MissingClientAuthError;
7198
- }
7199
- if (_classPrivateFieldGet2(_options, this).useMtls) {
7200
- return TlsClientAuth();
7201
- }
7202
- let clientPrivateKey = _classPrivateFieldGet2(_options, this).clientAssertionSigningKey;
7203
- if (clientPrivateKey && !(clientPrivateKey instanceof CryptoKey)) {
7204
- clientPrivateKey = await importPKCS8(clientPrivateKey, _classPrivateFieldGet2(_options, this).clientAssertionSigningAlg || "RS256");
7367
+ if (!_classPrivateFieldGet2(_clientAuthPromise, this)) {
7368
+ _classPrivateFieldSet2(_clientAuthPromise, this, (async () => {
7369
+ if (!_classPrivateFieldGet2(_options, this).clientSecret && !_classPrivateFieldGet2(_options, this).clientAssertionSigningKey && !_classPrivateFieldGet2(_options, this).useMtls) {
7370
+ throw new MissingClientAuthError;
7371
+ }
7372
+ if (_classPrivateFieldGet2(_options, this).useMtls) {
7373
+ return TlsClientAuth();
7374
+ }
7375
+ let clientPrivateKey = _classPrivateFieldGet2(_options, this).clientAssertionSigningKey;
7376
+ if (clientPrivateKey && !(clientPrivateKey instanceof CryptoKey)) {
7377
+ clientPrivateKey = await importPKCS8(clientPrivateKey, _classPrivateFieldGet2(_options, this).clientAssertionSigningAlg || "RS256");
7378
+ }
7379
+ return clientPrivateKey ? PrivateKeyJwt(clientPrivateKey) : ClientSecretPost(_classPrivateFieldGet2(_options, this).clientSecret);
7380
+ })().catch(error => {
7381
+ _classPrivateFieldSet2(_clientAuthPromise, this, void 0);
7382
+ throw error;
7383
+ }));
7205
7384
  }
7206
- return clientPrivateKey ? PrivateKeyJwt(clientPrivateKey) : ClientSecretPost(_classPrivateFieldGet2(_options, this).clientSecret);
7385
+ return _classPrivateFieldGet2(_clientAuthPromise, this);
7207
7386
  }
7208
7387
  async function _buildAuthorizationUrl(options) {
7209
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7388
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7210
7389
  const codeChallengeMethod = "S256";
7211
7390
  const codeVerifier = randomPKCECodeVerifier();
7212
7391
  const codeChallenge = await calculatePKCECodeChallenge(codeVerifier);
@@ -7322,15 +7501,15 @@
7322
7501
  if (!((_a = context === null || context === void 0 ? void 0 : context.mfaRequirements) === null || _a === void 0 ? void 0 : _a.challenge) || context.mfaRequirements.challenge.length === 0) {
7323
7502
  throw new MfaListAuthenticatorsError("invalid_request", "challengeType is required and must contain at least one challenge type, please check mfa_required error payload");
7324
7503
  }
7325
- const challengeTypes = context.mfaRequirements.challenge.map((c => c.type));
7504
+ const challengeTypes = context.mfaRequirements.challenge.map(c => c.type);
7326
7505
  try {
7327
7506
  const allAuthenticators = await this.authJsMfaClient.listAuthenticators({
7328
7507
  mfaToken: mfaToken
7329
7508
  });
7330
- return allAuthenticators.filter((auth => {
7509
+ return allAuthenticators.filter(auth => {
7331
7510
  if (!auth.type) return false;
7332
7511
  return challengeTypes.includes(auth.type);
7333
- }));
7512
+ });
7334
7513
  } catch (error) {
7335
7514
  if (error instanceof MfaListAuthenticatorsError$1) {
7336
7515
  throw new MfaListAuthenticatorsError((_b = error.cause) === null || _b === void 0 ? void 0 : _b.error, error.message);
@@ -7695,7 +7874,7 @@
7695
7874
  scope: scopesToRequest(this.scope, (_a = options.authorizationParams) === null || _a === void 0 ? void 0 : _a.scope, ((_b = options.authorizationParams) === null || _b === void 0 ? void 0 : _b.audience) || this.options.authorizationParams.audience)
7696
7875
  })
7697
7876
  });
7698
- const result = await singlePromise((() => this._getTokenSilently(localOptions)), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
7877
+ const result = await singlePromise(() => this._getTokenSilently(localOptions), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
7699
7878
  return options.detailedResponse ? result : result === null || result === void 0 ? void 0 : result.access_token;
7700
7879
  }
7701
7880
  async _getTokenSilently(options) {
@@ -7716,7 +7895,7 @@
7716
7895
  }
7717
7896
  const lockKey = buildGetTokenSilentlyLockKey(this.options.clientId, getTokenOptions.authorizationParams.audience || "default");
7718
7897
  try {
7719
- return await this.lockManager.runWithLock(lockKey, 5e3, (async () => {
7898
+ return await this.lockManager.runWithLock(lockKey, 5e3, async () => {
7720
7899
  if (cacheMode !== "off") {
7721
7900
  const entry = await this._getEntryFromCache({
7722
7901
  scope: getTokenOptions.authorizationParams.scope,
@@ -7738,7 +7917,7 @@
7738
7917
  } : null), {
7739
7918
  expires_in: expires_in
7740
7919
  });
7741
- }));
7920
+ });
7742
7921
  } catch (error) {
7743
7922
  if (this._isInteractiveError(error) && this.options.interactiveErrorHandler === "popup") {
7744
7923
  return await this._handleInteractiveErrorWithPopup(getTokenOptions);
@@ -7747,7 +7926,10 @@
7747
7926
  }
7748
7927
  }
7749
7928
  _isInteractiveError(error) {
7750
- return error instanceof MfaRequiredError;
7929
+ return error instanceof MfaRequiredError || error instanceof GenericError && this._isIframeMfaError(error);
7930
+ }
7931
+ _isIframeMfaError(error) {
7932
+ return error.error === "login_required" && error.error_description === MFA_STEP_UP_ERROR_DESCRIPTION;
7751
7933
  }
7752
7934
  async _handleInteractiveErrorWithPopup(options) {
7753
7935
  try {
@@ -7829,7 +8011,7 @@
7829
8011
  async _getTokenFromIFrame(options) {
7830
8012
  const iframeLockKey = buildIframeLockKey(this.options.clientId);
7831
8013
  try {
7832
- return await this.lockManager.runWithLock(iframeLockKey, 5e3, (async () => {
8014
+ return await this.lockManager.runWithLock(iframeLockKey, 5e3, async () => {
7833
8015
  const params = Object.assign(Object.assign({}, options.authorizationParams), {
7834
8016
  prompt: "none"
7835
8017
  });
@@ -7869,12 +8051,15 @@
7869
8051
  oauthTokenScope: tokenResult.scope,
7870
8052
  audience: audience
7871
8053
  });
7872
- }));
8054
+ });
7873
8055
  } catch (e) {
7874
8056
  if (e.error === "login_required") {
7875
- this.logout({
7876
- openUrl: false
7877
- });
8057
+ const shouldSkipLogoutForMfaStepUp = e instanceof GenericError && this._isIframeMfaError(e) && this.options.interactiveErrorHandler === "popup";
8058
+ if (!shouldSkipLogoutForMfaStepUp) {
8059
+ this.logout({
8060
+ openUrl: false
8061
+ });
8062
+ }
7878
8063
  }
7879
8064
  throw e;
7880
8065
  }
@@ -8153,5 +8338,5 @@
8153
8338
  Object.defineProperty(exports, "__esModule", {
8154
8339
  value: true
8155
8340
  });
8156
- }));
8341
+ });
8157
8342
  //# sourceMappingURL=auth0-spa-js.development.js.map