@auth0/auth0-spa-js 2.17.0 → 2.17.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,7 @@
1
1
  (function(global, factory) {
2
2
  typeof exports === "object" && typeof module !== "undefined" ? factory(exports) : typeof define === "function" && define.amd ? define([ "exports" ], factory) : (global = typeof globalThis !== "undefined" ? globalThis : global || self,
3
3
  factory(global.auth0 = {}));
4
- })(this, (function(exports) {
4
+ })(this, function(exports) {
5
5
  "use strict";
6
6
  function __rest(s, e) {
7
7
  var t = {};
@@ -15,7 +15,7 @@
15
15
  var e = new Error(message);
16
16
  return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
17
17
  };
18
- var version = "2.17.0";
18
+ var version = "2.17.1";
19
19
  const DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS = 60;
20
20
  const DEFAULT_POPUP_CONFIG_OPTIONS = {
21
21
  timeoutInSeconds: DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS
@@ -143,7 +143,7 @@
143
143
  };
144
144
  const runIframe = function runIframe(authorizeUrl, eventOrigin) {
145
145
  let timeoutInSeconds = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS;
146
- return new Promise(((res, rej) => {
146
+ return new Promise((res, rej) => {
147
147
  const iframe = window.document.createElement("iframe");
148
148
  iframe.setAttribute("width", "0");
149
149
  iframe.setAttribute("height", "0");
@@ -155,10 +155,10 @@
155
155
  }
156
156
  };
157
157
  let _iframeEventHandler;
158
- const timeoutSetTimeoutId = setTimeout((() => {
158
+ const timeoutSetTimeoutId = setTimeout(() => {
159
159
  rej(new TimeoutError);
160
160
  removeIframe();
161
- }), timeoutInSeconds * 1e3);
161
+ }, timeoutInSeconds * 1e3);
162
162
  _iframeEventHandler = function iframeEventHandler(e) {
163
163
  if (e.origin != eventOrigin) return;
164
164
  if (!e.data || e.data.type !== "authorization_response") return;
@@ -174,7 +174,7 @@
174
174
  window.addEventListener("message", _iframeEventHandler, false);
175
175
  window.document.body.appendChild(iframe);
176
176
  iframe.setAttribute("src", authorizeUrl);
177
- }));
177
+ });
178
178
  };
179
179
  const openPopup = url => {
180
180
  const width = 400;
@@ -183,21 +183,21 @@
183
183
  const top = window.screenY + (window.innerHeight - height) / 2;
184
184
  return window.open(url, "auth0:authorize:popup", "left=".concat(left, ",top=").concat(top, ",width=").concat(width, ",height=").concat(height, ",resizable,scrollbars=yes,status=1"));
185
185
  };
186
- const runPopup = config => new Promise(((resolve, reject) => {
186
+ const runPopup = config => new Promise((resolve, reject) => {
187
187
  let _popupEventListener;
188
- const popupTimer = setInterval((() => {
188
+ const popupTimer = setInterval(() => {
189
189
  if (config.popup && config.popup.closed) {
190
190
  clearInterval(popupTimer);
191
191
  clearTimeout(timeoutId);
192
192
  window.removeEventListener("message", _popupEventListener, false);
193
193
  reject(new PopupCancelledError(config.popup));
194
194
  }
195
- }), 1e3);
196
- const timeoutId = setTimeout((() => {
195
+ }, 1e3);
196
+ const timeoutId = setTimeout(() => {
197
197
  clearInterval(popupTimer);
198
198
  reject(new PopupTimeoutError(config.popup));
199
199
  window.removeEventListener("message", _popupEventListener, false);
200
- }), (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
200
+ }, (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
201
201
  _popupEventListener = function popupEventListener(e) {
202
202
  if (!e.data || e.data.type !== "authorization_response") {
203
203
  return;
@@ -214,19 +214,19 @@
214
214
  resolve(e.data.response);
215
215
  };
216
216
  window.addEventListener("message", _popupEventListener);
217
- }));
217
+ });
218
218
  const getCrypto = () => window.crypto;
219
219
  const createRandomString = () => {
220
220
  const charset = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-_~.";
221
221
  let random = "";
222
222
  const randomValues = Array.from(getCrypto().getRandomValues(new Uint8Array(43)));
223
- randomValues.forEach((v => random += charset[v % charset.length]));
223
+ randomValues.forEach(v => random += charset[v % charset.length]);
224
224
  return random;
225
225
  };
226
226
  const encode$2 = value => btoa(value);
227
- const stripUndefined = params => Object.keys(params).filter((k => typeof params[k] !== "undefined")).reduce(((acc, key) => Object.assign(Object.assign({}, acc), {
227
+ const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
228
228
  [key]: params[key]
229
- })), {});
229
+ }), {});
230
230
  const ALLOWED_AUTH0CLIENT_PROPERTIES = [ {
231
231
  key: "name",
232
232
  type: [ "string" ]
@@ -239,16 +239,16 @@
239
239
  } ];
240
240
  const stripAuth0Client = function stripAuth0Client(auth0Client) {
241
241
  let excludeEnv = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : false;
242
- return Object.keys(auth0Client).reduce(((acc, key) => {
242
+ return Object.keys(auth0Client).reduce((acc, key) => {
243
243
  if (excludeEnv && key === "env") {
244
244
  return acc;
245
245
  }
246
- const allowedProperty = ALLOWED_AUTH0CLIENT_PROPERTIES.find((p => p.key === key));
246
+ const allowedProperty = ALLOWED_AUTH0CLIENT_PROPERTIES.find(p => p.key === key);
247
247
  if (allowedProperty && allowedProperty.type.includes(typeof auth0Client[key])) {
248
248
  acc[key] = auth0Client[key];
249
249
  }
250
250
  return acc;
251
- }), {});
251
+ }, {});
252
252
  };
253
253
  const createQueryParams = _a => {
254
254
  var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
@@ -268,9 +268,9 @@
268
268
  "/": "_",
269
269
  "=": ""
270
270
  };
271
- return input.replace(/[+/=]/g, (m => b64Chars[m]));
271
+ return input.replace(/[+/=]/g, m => b64Chars[m]);
272
272
  };
273
- const decodeB64 = input => decodeURIComponent(atob(input).split("").map((c => "%" + ("00" + c.charCodeAt(0).toString(16)).slice(-2))).join(""));
273
+ const decodeB64 = input => decodeURIComponent(atob(input).split("").map(c => "%" + ("00" + c.charCodeAt(0).toString(16)).slice(-2)).join(""));
274
274
  const urlDecodeB64 = input => decodeB64(input.replace(/_/g, "/").replace(/-/g, "+"));
275
275
  const bufferToBase64UrlEncoded = input => {
276
276
  const ie11SafeInput = new Uint8Array(input);
@@ -302,11 +302,11 @@
302
302
  }
303
303
  return parseInt(value, 10) || undefined;
304
304
  };
305
- const fromEntries = iterable => [ ...iterable ].reduce(((obj, _ref) => {
305
+ const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
306
306
  let [key, val] = _ref;
307
307
  obj[key] = val;
308
308
  return obj;
309
- }), {});
309
+ }, {});
310
310
  var commonjsGlobal = typeof globalThis !== "undefined" ? globalThis : typeof window !== "undefined" ? window : typeof global !== "undefined" ? global : typeof self !== "undefined" ? self : {};
311
311
  var browserTabsLock = {};
312
312
  var processLock = {};
@@ -336,14 +336,14 @@
336
336
  return _this.locked.has(key);
337
337
  };
338
338
  this.lock = function(key) {
339
- return new Promise((function(resolve, reject) {
339
+ return new Promise(function(resolve, reject) {
340
340
  if (_this.isLocked(key)) {
341
341
  _this.addToLocked(key, resolve);
342
342
  } else {
343
343
  _this.addToLocked(key);
344
344
  resolve();
345
345
  }
346
- }));
346
+ });
347
347
  };
348
348
  this.unlock = function(key) {
349
349
  var callbacks = _this.locked.get(key);
@@ -371,7 +371,7 @@
371
371
  }
372
372
  processLock.default = getLock;
373
373
  var __awaiter = commonjsGlobal && commonjsGlobal.__awaiter || function(thisArg, _arguments, P, generator) {
374
- return new (P || (P = Promise))((function(resolve, reject) {
374
+ return new (P || (P = Promise))(function(resolve, reject) {
375
375
  function fulfilled(value) {
376
376
  try {
377
377
  step(generator.next(value));
@@ -387,12 +387,12 @@
387
387
  }
388
388
  }
389
389
  function step(result) {
390
- result.done ? resolve(result.value) : new P((function(resolve) {
390
+ result.done ? resolve(result.value) : new P(function(resolve) {
391
391
  resolve(result.value);
392
- })).then(fulfilled, rejected);
392
+ }).then(fulfilled, rejected);
393
393
  }
394
394
  step((generator = generator.apply(thisArg, _arguments || [])).next());
395
- }));
395
+ });
396
396
  };
397
397
  var __generator = commonjsGlobal && commonjsGlobal.__generator || function(thisArg, body) {
398
398
  var _ = {
@@ -491,39 +491,39 @@
491
491
  var LOCK_STORAGE_KEY = "browser-tabs-lock-key";
492
492
  var DEFAULT_STORAGE_HANDLER = {
493
493
  key: function(index) {
494
- return __awaiter(_this, void 0, void 0, (function() {
495
- return __generator(this, (function(_a) {
494
+ return __awaiter(_this, void 0, void 0, function() {
495
+ return __generator(this, function(_a) {
496
496
  throw new Error("Unsupported");
497
- }));
498
- }));
497
+ });
498
+ });
499
499
  },
500
500
  getItem: function(key) {
501
- return __awaiter(_this, void 0, void 0, (function() {
502
- return __generator(this, (function(_a) {
501
+ return __awaiter(_this, void 0, void 0, function() {
502
+ return __generator(this, function(_a) {
503
503
  throw new Error("Unsupported");
504
- }));
505
- }));
504
+ });
505
+ });
506
506
  },
507
507
  clear: function() {
508
- return __awaiter(_this, void 0, void 0, (function() {
509
- return __generator(this, (function(_a) {
508
+ return __awaiter(_this, void 0, void 0, function() {
509
+ return __generator(this, function(_a) {
510
510
  return [ 2, window.localStorage.clear() ];
511
- }));
512
- }));
511
+ });
512
+ });
513
513
  },
514
514
  removeItem: function(key) {
515
- return __awaiter(_this, void 0, void 0, (function() {
516
- return __generator(this, (function(_a) {
515
+ return __awaiter(_this, void 0, void 0, function() {
516
+ return __generator(this, function(_a) {
517
517
  throw new Error("Unsupported");
518
- }));
519
- }));
518
+ });
519
+ });
520
520
  },
521
521
  setItem: function(key, value) {
522
- return __awaiter(_this, void 0, void 0, (function() {
523
- return __generator(this, (function(_a) {
522
+ return __awaiter(_this, void 0, void 0, function() {
523
+ return __generator(this, function(_a) {
524
524
  throw new Error("Unsupported");
525
- }));
526
- }));
525
+ });
526
+ });
527
527
  },
528
528
  keySync: function(index) {
529
529
  return window.localStorage.key(index);
@@ -542,9 +542,9 @@
542
542
  }
543
543
  };
544
544
  function delay(milliseconds) {
545
- return new Promise((function(resolve) {
545
+ return new Promise(function(resolve) {
546
546
  return setTimeout(resolve, milliseconds);
547
- }));
547
+ });
548
548
  }
549
549
  function generateRandomString(length) {
550
550
  var CHARS = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXTZabcdefghiklmnopqrstuvwxyz";
@@ -577,9 +577,9 @@
577
577
  if (timeout === void 0) {
578
578
  timeout = 5e3;
579
579
  }
580
- return __awaiter(this, void 0, void 0, (function() {
580
+ return __awaiter(this, void 0, void 0, function() {
581
581
  var iat, MAX_TIME, STORAGE_KEY, STORAGE, lockObj, TIMEOUT_KEY, lockObjPostDelay, parsedLockObjPostDelay;
582
- return __generator(this, (function(_a) {
582
+ return __generator(this, function(_a) {
583
583
  switch (_a.label) {
584
584
  case 0:
585
585
  iat = Date.now() + generateRandomString(4);
@@ -638,17 +638,17 @@
638
638
  case 8:
639
639
  return [ 2, false ];
640
640
  }
641
- }));
642
- }));
641
+ });
642
+ });
643
643
  };
644
644
  SuperTokensLock.prototype.refreshLockWhileAcquired = function(storageKey, iat) {
645
- return __awaiter(this, void 0, void 0, (function() {
645
+ return __awaiter(this, void 0, void 0, function() {
646
646
  var _this = this;
647
- return __generator(this, (function(_a) {
648
- setTimeout((function() {
649
- return __awaiter(_this, void 0, void 0, (function() {
647
+ return __generator(this, function(_a) {
648
+ setTimeout(function() {
649
+ return __awaiter(_this, void 0, void 0, function() {
650
650
  var STORAGE, lockObj, parsedLockObj;
651
- return __generator(this, (function(_a) {
651
+ return __generator(this, function(_a) {
652
652
  switch (_a.label) {
653
653
  case 0:
654
654
  return [ 4, processLock_1.default().lock(iat) ];
@@ -673,19 +673,19 @@
673
673
  this.refreshLockWhileAcquired(storageKey, iat);
674
674
  return [ 2 ];
675
675
  }
676
- }));
677
- }));
678
- }), 1e3);
676
+ });
677
+ });
678
+ }, 1e3);
679
679
  return [ 2 ];
680
- }));
681
- }));
680
+ });
681
+ });
682
682
  };
683
683
  SuperTokensLock.prototype.waitForSomethingToChange = function(MAX_TIME) {
684
- return __awaiter(this, void 0, void 0, (function() {
685
- return __generator(this, (function(_a) {
684
+ return __awaiter(this, void 0, void 0, function() {
685
+ return __generator(this, function(_a) {
686
686
  switch (_a.label) {
687
687
  case 0:
688
- return [ 4, new Promise((function(resolve) {
688
+ return [ 4, new Promise(function(resolve) {
689
689
  var resolvedCalled = false;
690
690
  var startedAt = Date.now();
691
691
  var MIN_TIME_TO_WAIT = 50;
@@ -710,14 +710,14 @@
710
710
  window.addEventListener("storage", stopWaiting);
711
711
  SuperTokensLock.addToWaiting(stopWaiting);
712
712
  var timeOutId = setTimeout(stopWaiting, Math.max(0, MAX_TIME - Date.now()));
713
- })) ];
713
+ }) ];
714
714
 
715
715
  case 1:
716
716
  _a.sent();
717
717
  return [ 2 ];
718
718
  }
719
- }));
720
- }));
719
+ });
720
+ });
721
721
  };
722
722
  SuperTokensLock.addToWaiting = function(func) {
723
723
  this.removeFromWaiting(func);
@@ -730,22 +730,22 @@
730
730
  if (SuperTokensLock.waiters === undefined) {
731
731
  return;
732
732
  }
733
- SuperTokensLock.waiters = SuperTokensLock.waiters.filter((function(i) {
733
+ SuperTokensLock.waiters = SuperTokensLock.waiters.filter(function(i) {
734
734
  return i !== func;
735
- }));
735
+ });
736
736
  };
737
737
  SuperTokensLock.notifyWaiters = function() {
738
738
  if (SuperTokensLock.waiters === undefined) {
739
739
  return;
740
740
  }
741
741
  var waiters = SuperTokensLock.waiters.slice();
742
- waiters.forEach((function(i) {
742
+ waiters.forEach(function(i) {
743
743
  return i();
744
- }));
744
+ });
745
745
  };
746
746
  SuperTokensLock.prototype.releaseLock = function(lockKey) {
747
- return __awaiter(this, void 0, void 0, (function() {
748
- return __generator(this, (function(_a) {
747
+ return __awaiter(this, void 0, void 0, function() {
748
+ return __generator(this, function(_a) {
749
749
  switch (_a.label) {
750
750
  case 0:
751
751
  return [ 4, this.releaseLock__private__(lockKey) ];
@@ -753,13 +753,13 @@
753
753
  case 1:
754
754
  return [ 2, _a.sent() ];
755
755
  }
756
- }));
757
- }));
756
+ });
757
+ });
758
758
  };
759
759
  SuperTokensLock.prototype.releaseLock__private__ = function(lockKey) {
760
- return __awaiter(this, void 0, void 0, (function() {
760
+ return __awaiter(this, void 0, void 0, function() {
761
761
  var STORAGE, STORAGE_KEY, lockObj, parsedlockObj;
762
- return __generator(this, (function(_a) {
762
+ return __generator(this, function(_a) {
763
763
  switch (_a.label) {
764
764
  case 0:
765
765
  STORAGE = this.storageHandler === undefined ? DEFAULT_STORAGE_HANDLER : this.storageHandler;
@@ -783,8 +783,8 @@
783
783
  case 2:
784
784
  return [ 2 ];
785
785
  }
786
- }));
787
- }));
786
+ });
787
+ });
788
788
  };
789
789
  SuperTokensLock.lockCorrector = function(storageHandler) {
790
790
  var MIN_ALLOWED_TIME = Date.now() - 5e3;
@@ -824,16 +824,16 @@
824
824
  class WebLocksApiManager {
825
825
  async runWithLock(key, timeout, callback) {
826
826
  const controller = new AbortController;
827
- const timeoutId = setTimeout((() => controller.abort()), timeout);
827
+ const timeoutId = setTimeout(() => controller.abort(), timeout);
828
828
  try {
829
829
  return await navigator.locks.request(key, {
830
830
  mode: "exclusive",
831
831
  signal: controller.signal
832
- }, (async lock => {
832
+ }, async lock => {
833
833
  clearTimeout(timeoutId);
834
834
  if (!lock) throw new Error("Lock not available");
835
835
  return await callback();
836
- }));
836
+ });
837
837
  } catch (error) {
838
838
  clearTimeout(timeoutId);
839
839
  if ((error === null || error === void 0 ? void 0 : error.name) === "AbortError") throw new TimeoutError;
@@ -846,7 +846,7 @@
846
846
  this.activeLocks = new Set;
847
847
  this.lock = new _default;
848
848
  this.pagehideHandler = () => {
849
- this.activeLocks.forEach((key => this.lock.releaseLock(key)));
849
+ this.activeLocks.forEach(key => this.lock.releaseLock(key));
850
850
  this.activeLocks.clear();
851
851
  };
852
852
  }
@@ -1198,7 +1198,7 @@
1198
1198
  function isGrantTypeSupported(grantType) {
1199
1199
  return SUPPORTED_GRANT_TYPES.includes(grantType);
1200
1200
  }
1201
- const sendMessage = (message, to) => new Promise((function(resolve, reject) {
1201
+ const sendMessage = (message, to) => new Promise(function(resolve, reject) {
1202
1202
  const messageChannel = new MessageChannel;
1203
1203
  messageChannel.port1.onmessage = function(event) {
1204
1204
  if (event.data.error) {
@@ -1209,7 +1209,7 @@
1209
1209
  messageChannel.port1.close();
1210
1210
  };
1211
1211
  to.postMessage(message, [ messageChannel.port2 ]);
1212
- }));
1212
+ });
1213
1213
  const createAbortController = () => new AbortController;
1214
1214
  const dofetch = async (fetchUrl, fetchOptions) => {
1215
1215
  const response = await fetch(fetchUrl, fetchOptions);
@@ -1223,14 +1223,14 @@
1223
1223
  const controller = createAbortController();
1224
1224
  fetchOptions.signal = controller.signal;
1225
1225
  let timeoutId;
1226
- return Promise.race([ dofetch(fetchUrl, fetchOptions), new Promise(((_, reject) => {
1227
- timeoutId = setTimeout((() => {
1226
+ return Promise.race([ dofetch(fetchUrl, fetchOptions), new Promise((_, reject) => {
1227
+ timeoutId = setTimeout(() => {
1228
1228
  controller.abort();
1229
1229
  reject(new Error("Timeout when executing 'fetch'"));
1230
- }), timeout);
1231
- })) ]).finally((() => {
1230
+ }, timeout);
1231
+ }) ]).finally(() => {
1232
1232
  clearTimeout(timeoutId);
1233
- }));
1233
+ });
1234
1234
  };
1235
1235
  const fetchWithWorker = async (fetchUrl, audience, scope, fetchOptions, timeout, worker, useFormData, useMrrt) => sendMessage({
1236
1236
  auth: {
@@ -1345,10 +1345,10 @@
1345
1345
  let requestedScopes = {
1346
1346
  [DEFAULT_AUDIENCE]: getUniqueScopes(openIdScope, ...extraScopes)
1347
1347
  };
1348
- Object.keys(authScopes).forEach((key => {
1348
+ Object.keys(authScopes).forEach(key => {
1349
1349
  const audienceScopes = authScopes[key];
1350
1350
  requestedScopes[key] = getUniqueScopes(openIdScope, audienceScopes, ...extraScopes);
1351
- }));
1351
+ });
1352
1352
  return requestedScopes;
1353
1353
  };
1354
1354
  const scopesToRequest = (authScopes, methodScopes, audience) => {
@@ -1411,7 +1411,7 @@
1411
1411
  localStorage.removeItem(key);
1412
1412
  }
1413
1413
  allKeys() {
1414
- return Object.keys(window.localStorage).filter((key => key.startsWith(CACHE_KEY_PREFIX)));
1414
+ return Object.keys(window.localStorage).filter(key => key.startsWith(CACHE_KEY_PREFIX));
1415
1415
  }
1416
1416
  }
1417
1417
  class InMemoryCache {
@@ -1546,10 +1546,10 @@
1546
1546
  var _a;
1547
1547
  const keys = await this.getCacheKeys();
1548
1548
  if (!keys) return;
1549
- await keys.filter((key => clientId ? key.includes(clientId) : true)).reduce((async (memo, key) => {
1549
+ await keys.filter(key => clientId ? key.includes(clientId) : true).reduce(async (memo, key) => {
1550
1550
  await memo;
1551
1551
  await this.cache.remove(key);
1552
- }), Promise.resolve());
1552
+ }, Promise.resolve());
1553
1553
  await ((_a = this.keyManifest) === null || _a === void 0 ? void 0 : _a.clear());
1554
1554
  }
1555
1555
  async wrapCacheEntry(entry) {
@@ -1574,14 +1574,14 @@
1574
1574
  }, CACHE_KEY_PREFIX, CACHE_KEY_ID_TOKEN_SUFFIX).toKey();
1575
1575
  }
1576
1576
  matchExistingCacheKey(keyToMatch, allKeys) {
1577
- return allKeys.filter((key => {
1577
+ return allKeys.filter(key => {
1578
1578
  var _a;
1579
1579
  const cacheKey = CacheKey.fromKey(key);
1580
1580
  const scopeSet = new Set(cacheKey.scope && cacheKey.scope.split(" "));
1581
1581
  const scopesToMatch = ((_a = keyToMatch.scope) === null || _a === void 0 ? void 0 : _a.split(" ")) || [];
1582
- const hasAllScopes = cacheKey.scope && scopesToMatch.reduce(((acc, current) => acc && scopeSet.has(current)), true);
1582
+ const hasAllScopes = cacheKey.scope && scopesToMatch.reduce((acc, current) => acc && scopeSet.has(current), true);
1583
1583
  return cacheKey.prefix === CACHE_KEY_PREFIX && cacheKey.clientId === keyToMatch.clientId && cacheKey.audience === keyToMatch.audience && hasAllScopes;
1584
- }))[0];
1584
+ })[0];
1585
1585
  }
1586
1586
  async getEntryWithRefreshToken(keyToMatch, allKeys) {
1587
1587
  var _a;
@@ -1645,12 +1645,12 @@
1645
1645
  __raw: token
1646
1646
  };
1647
1647
  const user = {};
1648
- Object.keys(payloadJSON).forEach((k => {
1648
+ Object.keys(payloadJSON).forEach(k => {
1649
1649
  claims[k] = payloadJSON[k];
1650
1650
  if (!idTokendecoded.includes(k)) {
1651
1651
  user[k] = payloadJSON[k];
1652
1652
  }
1653
- }));
1653
+ });
1654
1654
  return {
1655
1655
  encoded: {
1656
1656
  header: header,
@@ -1942,15 +1942,15 @@
1942
1942
  return new Worker(url, options);
1943
1943
  };
1944
1944
  }
1945
- var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter((k => typeof params[k] !== "undefined")).reduce(((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    })), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce(((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }), {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise((resolve => setTimeout(resolve, time)));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach(((val, key) => {
            parsedQuery[key] = val;
        }));
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach((_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        }));
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find((key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every((key => scopesKey.includes(key)));
                return isSameAudience && scopesAreIncluded;
            }
        }));
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
1945
+ var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    }), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }, {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise(resolve => setTimeout(resolve, time));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach((val, key) => {
            parsedQuery[key] = val;
        });
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach(_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        });
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find(key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every(key => scopesKey.includes(key));
                return isSameAudience && scopesAreIncluded;
            }
        });
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
1946
1946
  const singlePromiseMap = {};
1947
1947
  const singlePromise = (cb, key) => {
1948
1948
  let promise = singlePromiseMap[key];
1949
1949
  if (!promise) {
1950
- promise = cb().finally((() => {
1950
+ promise = cb().finally(() => {
1951
1951
  delete singlePromiseMap[key];
1952
1952
  promise = null;
1953
- }));
1953
+ });
1954
1954
  singlePromiseMap[key] = promise;
1955
1955
  }
1956
1956
  return promise;
@@ -2027,12 +2027,12 @@
2027
2027
  const allScopesAreIncluded = (scopeToInclude, scopes) => {
2028
2028
  const scopeGroup = (scopes === null || scopes === void 0 ? void 0 : scopes.split(" ")) || [];
2029
2029
  const scopesToInclude = (scopeToInclude === null || scopeToInclude === void 0 ? void 0 : scopeToInclude.split(" ")) || [];
2030
- return scopesToInclude.every((key => scopeGroup.includes(key)));
2030
+ return scopesToInclude.every(key => scopeGroup.includes(key));
2031
2031
  };
2032
2032
  const getMissingScopes = (requestedScope, respondedScope) => {
2033
2033
  const requestedScopes = (requestedScope === null || requestedScope === void 0 ? void 0 : requestedScope.split(" ")) || [];
2034
2034
  const respondedScopes = (respondedScope === null || respondedScope === void 0 ? void 0 : respondedScope.split(" ")) || [];
2035
- const missingScopes = requestedScopes.filter((scope => respondedScopes.indexOf(scope) == -1));
2035
+ const missingScopes = requestedScopes.filter(scope => respondedScopes.indexOf(scope) == -1);
2036
2036
  return missingScopes.join(",");
2037
2037
  };
2038
2038
  const getScopeToRequest = (useMrrt, authorizationParams, cachedAudience, cachedScope) => {
@@ -2043,7 +2043,7 @@
2043
2043
  }
2044
2044
  const cachedScopes = cachedScope.split(" ");
2045
2045
  const newScopes = ((_a = authorizationParams.scope) === null || _a === void 0 ? void 0 : _a.split(" ")) || [];
2046
- const newScopesAreIncluded = newScopes.every((scope => cachedScopes.includes(scope)));
2046
+ const newScopesAreIncluded = newScopes.every(scope => cachedScopes.includes(scope));
2047
2047
  return cachedScopes.length >= newScopes.length && newScopesAreIncluded ? cachedScope : authorizationParams.scope;
2048
2048
  }
2049
2049
  return authorizationParams.scope;
@@ -2070,11 +2070,11 @@
2070
2070
  }
2071
2071
  createDbHandle() {
2072
2072
  const req = window.indexedDB.open(NAME, this.getVersion());
2073
- return new Promise(((resolve, reject) => {
2074
- req.onupgradeneeded = () => Object.values(TABLES).forEach((t => req.result.createObjectStore(t)));
2073
+ return new Promise((resolve, reject) => {
2074
+ req.onupgradeneeded = () => Object.values(TABLES).forEach(t => req.result.createObjectStore(t));
2075
2075
  req.onerror = () => reject(req.error);
2076
2076
  req.onsuccess = () => resolve(req.result);
2077
- }));
2077
+ });
2078
2078
  }
2079
2079
  async getDbHandle() {
2080
2080
  if (!this.dbHandle) {
@@ -2087,10 +2087,10 @@
2087
2087
  const txn = db.transaction(table, mode);
2088
2088
  const store = txn.objectStore(table);
2089
2089
  const request = requestFactory(store);
2090
- return new Promise(((resolve, reject) => {
2090
+ return new Promise((resolve, reject) => {
2091
2091
  request.onsuccess = () => resolve(request.result);
2092
2092
  request.onerror = () => reject(request.error);
2093
- }));
2093
+ });
2094
2094
  }
2095
2095
  buildKey(id) {
2096
2096
  const finalId = id ? "_".concat(id) : AUTH0_NONCE_ID;
@@ -2103,7 +2103,7 @@
2103
2103
  return this.save(TABLES.KEYPAIR, this.buildKey(), keyPair);
2104
2104
  }
2105
2105
  async save(table, key, obj) {
2106
- return void await this.executeDbRequest(table, "readwrite", (table => table.put(obj, key)));
2106
+ return void await this.executeDbRequest(table, "readwrite", table => table.put(obj, key));
2107
2107
  }
2108
2108
  findNonce(id) {
2109
2109
  return this.find(TABLES.NONCE, this.buildKey(id));
@@ -2112,14 +2112,14 @@
2112
2112
  return this.find(TABLES.KEYPAIR, this.buildKey());
2113
2113
  }
2114
2114
  find(table, key) {
2115
- return this.executeDbRequest(table, "readonly", (table => table.get(key)));
2115
+ return this.executeDbRequest(table, "readonly", table => table.get(key));
2116
2116
  }
2117
2117
  async deleteBy(table, predicate) {
2118
- const allKeys = await this.executeDbRequest(table, "readonly", (table => table.getAllKeys()));
2119
- allKeys === null || allKeys === void 0 ? void 0 : allKeys.filter(predicate).map((k => this.executeDbRequest(table, "readwrite", (table => table.delete(k)))));
2118
+ const allKeys = await this.executeDbRequest(table, "readonly", table => table.getAllKeys());
2119
+ allKeys === null || allKeys === void 0 ? void 0 : allKeys.filter(predicate).map(k => this.executeDbRequest(table, "readwrite", table => table.delete(k)));
2120
2120
  }
2121
2121
  deleteByClientId(table, clientId) {
2122
- return this.deleteBy(table, (k => typeof k === "string" && k.startsWith("".concat(clientId, "::"))));
2122
+ return this.deleteBy(table, k => typeof k === "string" && k.startsWith("".concat(clientId, "::")));
2123
2123
  }
2124
2124
  clearNonces() {
2125
2125
  return this.deleteByClientId(TABLES.NONCE, this.clientId);
@@ -2429,20 +2429,20 @@
2429
2429
  var t = Object.keys(e);
2430
2430
  if (Object.getOwnPropertySymbols) {
2431
2431
  var o = Object.getOwnPropertySymbols(e);
2432
- r && (o = o.filter((function(r) {
2432
+ r && (o = o.filter(function(r) {
2433
2433
  return Object.getOwnPropertyDescriptor(e, r).enumerable;
2434
- }))), t.push.apply(t, o);
2434
+ })), t.push.apply(t, o);
2435
2435
  }
2436
2436
  return t;
2437
2437
  }
2438
2438
  function _objectSpread2(e) {
2439
2439
  for (var r = 1; r < arguments.length; r++) {
2440
2440
  var t = null != arguments[r] ? arguments[r] : {};
2441
- r % 2 ? ownKeys(Object(t), !0).forEach((function(r) {
2441
+ r % 2 ? ownKeys(Object(t), !0).forEach(function(r) {
2442
2442
  _defineProperty(e, r, t[r]);
2443
- })) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach((function(r) {
2443
+ }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function(r) {
2444
2444
  Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r));
2445
- }));
2445
+ });
2446
2446
  }
2447
2447
  return e;
2448
2448
  }
@@ -2488,16 +2488,16 @@
2488
2488
  function resume(r, t) {
2489
2489
  try {
2490
2490
  var n = e[r](t), o = n.value, u = o instanceof _OverloadYield;
2491
- Promise.resolve(u ? o.v : o).then((function(t) {
2491
+ Promise.resolve(u ? o.v : o).then(function(t) {
2492
2492
  if (u) {
2493
2493
  var i = "return" === r ? "return" : "next";
2494
2494
  if (!o.k || t.done) return resume(i, t);
2495
2495
  t = e[i](t).value;
2496
2496
  }
2497
2497
  settle(n.done ? "return" : "normal", t);
2498
- }), (function(e) {
2498
+ }, function(e) {
2499
2499
  resume("throw", e);
2500
- }));
2500
+ });
2501
2501
  } catch (e) {
2502
2502
  settle("throw", e);
2503
2503
  }
@@ -2524,7 +2524,7 @@
2524
2524
  (r = r.next) ? resume(r.key, r.arg) : t = null;
2525
2525
  }
2526
2526
  this._invoke = function(e, n) {
2527
- return new Promise((function(o, u) {
2527
+ return new Promise(function(o, u) {
2528
2528
  var i = {
2529
2529
  key: e,
2530
2530
  arg: n,
@@ -2533,7 +2533,7 @@
2533
2533
  next: null
2534
2534
  };
2535
2535
  t ? t = t.next = i : (r = t = i, resume(e, n));
2536
- }));
2536
+ });
2537
2537
  }, "function" != typeof e.return && (this.return = void 0);
2538
2538
  }
2539
2539
  AsyncGenerator.prototype["function" == typeof Symbol && Symbol.asyncIterator || "@@asyncIterator"] = function() {
@@ -2549,7 +2549,7 @@
2549
2549
  let USER_AGENT$2;
2550
2550
  if (typeof navigator === "undefined" || !((_navigator$userAgent$2 = navigator.userAgent) !== null && _navigator$userAgent$2 !== void 0 && (_navigator$userAgent$$2 = _navigator$userAgent$2.startsWith) !== null && _navigator$userAgent$$2 !== void 0 && _navigator$userAgent$$2.call(_navigator$userAgent$2, "Mozilla/5.0 "))) {
2551
2551
  const NAME = "oauth4webapi";
2552
- const VERSION = "v3.8.3";
2552
+ const VERSION = "v3.8.5";
2553
2553
  USER_AGENT$2 = "".concat(NAME, "/").concat(VERSION);
2554
2554
  }
2555
2555
  function looseInstanceOf(input, expected) {
@@ -2748,7 +2748,7 @@
2748
2748
  });
2749
2749
  }
2750
2750
  async function discoveryRequest(issuerIdentifier, options) {
2751
- return performDiscovery$1(issuerIdentifier, "issuerIdentifier", (url => {
2751
+ return performDiscovery$1(issuerIdentifier, "issuerIdentifier", url => {
2752
2752
  switch (options === null || options === void 0 ? void 0 : options.algorithm) {
2753
2753
  case undefined:
2754
2754
  case "oidc":
@@ -2763,7 +2763,7 @@
2763
2763
  throw CodedTypeError$1('"options.algorithm" must be "oidc" (default), or "oauth2"', ERR_INVALID_ARG_VALUE$1);
2764
2764
  }
2765
2765
  return url;
2766
- }), options);
2766
+ }, options);
2767
2767
  }
2768
2768
  function assertNumber(input, allow0, it, code, cause) {
2769
2769
  try {
@@ -3999,10 +3999,10 @@
3999
3999
  for (var _len = arguments.length, buffers = new Array(_len), _key = 0; _key < _len; _key++) {
4000
4000
  buffers[_key] = arguments[_key];
4001
4001
  }
4002
- const size = buffers.reduce(((acc, _ref) => {
4002
+ const size = buffers.reduce((acc, _ref) => {
4003
4003
  let {length: length} = _ref;
4004
4004
  return acc + length;
4005
- }), 0);
4005
+ }, 0);
4006
4006
  const buf = new Uint8Array(size);
4007
4007
  let i = 0;
4008
4008
  for (const buffer of buffers) {
@@ -4050,6 +4050,135 @@
4050
4050
  throw new TypeError("The input to be decoded is not correctly encoded.");
4051
4051
  }
4052
4052
  }
4053
+ const unusable = function unusable(name) {
4054
+ let prop = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "algorithm.name";
4055
+ return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
4056
+ };
4057
+ const isAlgorithm = (algorithm, name) => algorithm.name === name;
4058
+ function getHashLength(hash) {
4059
+ return parseInt(hash.name.slice(4), 10);
4060
+ }
4061
+ function checkHashLength(algorithm, expected) {
4062
+ const actual = getHashLength(algorithm.hash);
4063
+ if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4064
+ }
4065
+ function getNamedCurve(alg) {
4066
+ switch (alg) {
4067
+ case "ES256":
4068
+ return "P-256";
4069
+
4070
+ case "ES384":
4071
+ return "P-384";
4072
+
4073
+ case "ES512":
4074
+ return "P-521";
4075
+
4076
+ default:
4077
+ throw new Error("unreachable");
4078
+ }
4079
+ }
4080
+ function checkUsage(key, usage) {
4081
+ if (usage && !key.usages.includes(usage)) {
4082
+ throw new TypeError("CryptoKey does not support this operation, its usages must include ".concat(usage, "."));
4083
+ }
4084
+ }
4085
+ function checkSigCryptoKey(key, alg, usage) {
4086
+ switch (alg) {
4087
+ case "HS256":
4088
+ case "HS384":
4089
+ case "HS512":
4090
+ {
4091
+ if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
4092
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4093
+ break;
4094
+ }
4095
+
4096
+ case "RS256":
4097
+ case "RS384":
4098
+ case "RS512":
4099
+ {
4100
+ if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
4101
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4102
+ break;
4103
+ }
4104
+
4105
+ case "PS256":
4106
+ case "PS384":
4107
+ case "PS512":
4108
+ {
4109
+ if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
4110
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4111
+ break;
4112
+ }
4113
+
4114
+ case "Ed25519":
4115
+ case "EdDSA":
4116
+ {
4117
+ if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
4118
+ break;
4119
+ }
4120
+
4121
+ case "ML-DSA-44":
4122
+ case "ML-DSA-65":
4123
+ case "ML-DSA-87":
4124
+ {
4125
+ if (!isAlgorithm(key.algorithm, alg)) throw unusable(alg);
4126
+ break;
4127
+ }
4128
+
4129
+ case "ES256":
4130
+ case "ES384":
4131
+ case "ES512":
4132
+ {
4133
+ if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
4134
+ const expected = getNamedCurve(alg);
4135
+ const actual = key.algorithm.namedCurve;
4136
+ if (actual !== expected) throw unusable(expected, "algorithm.namedCurve");
4137
+ break;
4138
+ }
4139
+
4140
+ default:
4141
+ throw new TypeError("CryptoKey does not support this operation");
4142
+ }
4143
+ checkUsage(key, usage);
4144
+ }
4145
+ function message(msg, actual) {
4146
+ for (var _len = arguments.length, types = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++) {
4147
+ types[_key - 2] = arguments[_key];
4148
+ }
4149
+ types = types.filter(Boolean);
4150
+ if (types.length > 2) {
4151
+ const last = types.pop();
4152
+ msg += "one of type ".concat(types.join(", "), ", or ").concat(last, ".");
4153
+ } else if (types.length === 2) {
4154
+ msg += "one of type ".concat(types[0], " or ").concat(types[1], ".");
4155
+ } else {
4156
+ msg += "of type ".concat(types[0], ".");
4157
+ }
4158
+ if (actual == null) {
4159
+ msg += " Received ".concat(actual);
4160
+ } else if (typeof actual === "function" && actual.name) {
4161
+ msg += " Received function ".concat(actual.name);
4162
+ } else if (typeof actual === "object" && actual != null) {
4163
+ var _actual$constructor;
4164
+ if ((_actual$constructor = actual.constructor) !== null && _actual$constructor !== void 0 && _actual$constructor.name) {
4165
+ msg += " Received an instance of ".concat(actual.constructor.name);
4166
+ }
4167
+ }
4168
+ return msg;
4169
+ }
4170
+ const invalidKeyInput = function invalidKeyInput(actual) {
4171
+ for (var _len2 = arguments.length, types = new Array(_len2 > 1 ? _len2 - 1 : 0), _key2 = 1; _key2 < _len2; _key2++) {
4172
+ types[_key2 - 1] = arguments[_key2];
4173
+ }
4174
+ return message("Key must be ", actual, ...types);
4175
+ };
4176
+ const withAlg = function withAlg(alg, actual) {
4177
+ for (var _len3 = arguments.length, types = new Array(_len3 > 2 ? _len3 - 2 : 0), _key3 = 2; _key3 < _len3; _key3++) {
4178
+ types[_key3 - 2] = arguments[_key3];
4179
+ }
4180
+ return message("Key for the ".concat(alg, " algorithm must be "), actual, ...types);
4181
+ };
4053
4182
  class JOSEError extends Error {
4054
4183
  constructor(message, options) {
4055
4184
  var _Error$captureStackTr;
@@ -4197,147 +4326,37 @@
4197
4326
  }
4198
4327
  }
4199
4328
  _defineProperty(JWSSignatureVerificationFailed, "code", "ERR_JWS_SIGNATURE_VERIFICATION_FAILED");
4200
- const unusable = function unusable(name) {
4201
- let prop = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "algorithm.name";
4202
- return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
4329
+ const isCryptoKey = key => {
4330
+ if ((key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "CryptoKey") return true;
4331
+ try {
4332
+ return key instanceof CryptoKey;
4333
+ } catch (_unused) {
4334
+ return false;
4335
+ }
4203
4336
  };
4204
- const isAlgorithm = (algorithm, name) => algorithm.name === name;
4205
- function getHashLength(hash) {
4206
- return parseInt(hash.name.slice(4), 10);
4207
- }
4208
- function getNamedCurve(alg) {
4209
- switch (alg) {
4210
- case "ES256":
4211
- return "P-256";
4212
-
4213
- case "ES384":
4214
- return "P-384";
4215
-
4216
- case "ES512":
4217
- return "P-521";
4218
-
4219
- default:
4220
- throw new Error("unreachable");
4337
+ const isKeyObject = key => (key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "KeyObject";
4338
+ const isKeyLike = key => isCryptoKey(key) || isKeyObject(key);
4339
+ function decodeBase64url(value, label, ErrorClass) {
4340
+ try {
4341
+ return decode(value);
4342
+ } catch (_unused) {
4343
+ throw new ErrorClass("Failed to base64url decode the ".concat(label));
4221
4344
  }
4222
4345
  }
4223
- function checkUsage(key, usage) {
4224
- if (usage && !key.usages.includes(usage)) {
4225
- throw new TypeError("CryptoKey does not support this operation, its usages must include ".concat(usage, "."));
4346
+ const isObjectLike = value => typeof value === "object" && value !== null;
4347
+ function isObject(input) {
4348
+ if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
4349
+ return false;
4226
4350
  }
4351
+ if (Object.getPrototypeOf(input) === null) {
4352
+ return true;
4353
+ }
4354
+ let proto = input;
4355
+ while (Object.getPrototypeOf(proto) !== null) {
4356
+ proto = Object.getPrototypeOf(proto);
4357
+ }
4358
+ return Object.getPrototypeOf(input) === proto;
4227
4359
  }
4228
- function checkSigCryptoKey(key, alg, usage) {
4229
- switch (alg) {
4230
- case "HS256":
4231
- case "HS384":
4232
- case "HS512":
4233
- {
4234
- if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
4235
- const expected = parseInt(alg.slice(2), 10);
4236
- const actual = getHashLength(key.algorithm.hash);
4237
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4238
- break;
4239
- }
4240
-
4241
- case "RS256":
4242
- case "RS384":
4243
- case "RS512":
4244
- {
4245
- if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
4246
- const expected = parseInt(alg.slice(2), 10);
4247
- const actual = getHashLength(key.algorithm.hash);
4248
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4249
- break;
4250
- }
4251
-
4252
- case "PS256":
4253
- case "PS384":
4254
- case "PS512":
4255
- {
4256
- if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
4257
- const expected = parseInt(alg.slice(2), 10);
4258
- const actual = getHashLength(key.algorithm.hash);
4259
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4260
- break;
4261
- }
4262
-
4263
- case "Ed25519":
4264
- case "EdDSA":
4265
- {
4266
- if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
4267
- break;
4268
- }
4269
-
4270
- case "ML-DSA-44":
4271
- case "ML-DSA-65":
4272
- case "ML-DSA-87":
4273
- {
4274
- if (!isAlgorithm(key.algorithm, alg)) throw unusable(alg);
4275
- break;
4276
- }
4277
-
4278
- case "ES256":
4279
- case "ES384":
4280
- case "ES512":
4281
- {
4282
- if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
4283
- const expected = getNamedCurve(alg);
4284
- const actual = key.algorithm.namedCurve;
4285
- if (actual !== expected) throw unusable(expected, "algorithm.namedCurve");
4286
- break;
4287
- }
4288
-
4289
- default:
4290
- throw new TypeError("CryptoKey does not support this operation");
4291
- }
4292
- checkUsage(key, usage);
4293
- }
4294
- function message(msg, actual) {
4295
- for (var _len = arguments.length, types = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++) {
4296
- types[_key - 2] = arguments[_key];
4297
- }
4298
- types = types.filter(Boolean);
4299
- if (types.length > 2) {
4300
- const last = types.pop();
4301
- msg += "one of type ".concat(types.join(", "), ", or ").concat(last, ".");
4302
- } else if (types.length === 2) {
4303
- msg += "one of type ".concat(types[0], " or ").concat(types[1], ".");
4304
- } else {
4305
- msg += "of type ".concat(types[0], ".");
4306
- }
4307
- if (actual == null) {
4308
- msg += " Received ".concat(actual);
4309
- } else if (typeof actual === "function" && actual.name) {
4310
- msg += " Received function ".concat(actual.name);
4311
- } else if (typeof actual === "object" && actual != null) {
4312
- var _actual$constructor;
4313
- if ((_actual$constructor = actual.constructor) !== null && _actual$constructor !== void 0 && _actual$constructor.name) {
4314
- msg += " Received an instance of ".concat(actual.constructor.name);
4315
- }
4316
- }
4317
- return msg;
4318
- }
4319
- const invalidKeyInput = function invalidKeyInput(actual) {
4320
- for (var _len2 = arguments.length, types = new Array(_len2 > 1 ? _len2 - 1 : 0), _key2 = 1; _key2 < _len2; _key2++) {
4321
- types[_key2 - 1] = arguments[_key2];
4322
- }
4323
- return message("Key must be ", actual, ...types);
4324
- };
4325
- const withAlg = function withAlg(alg, actual) {
4326
- for (var _len3 = arguments.length, types = new Array(_len3 > 2 ? _len3 - 2 : 0), _key3 = 2; _key3 < _len3; _key3++) {
4327
- types[_key3 - 2] = arguments[_key3];
4328
- }
4329
- return message("Key for the ".concat(alg, " algorithm must be "), actual, ...types);
4330
- };
4331
- const isCryptoKey = key => {
4332
- if ((key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "CryptoKey") return true;
4333
- try {
4334
- return key instanceof CryptoKey;
4335
- } catch (_unused) {
4336
- return false;
4337
- }
4338
- };
4339
- const isKeyObject = key => (key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "KeyObject";
4340
- const isKeyLike = key => isCryptoKey(key) || isKeyObject(key);
4341
4360
  function isDisjoint() {
4342
4361
  for (var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++) {
4343
4362
  headers[_key] = arguments[_key];
@@ -4362,20 +4381,10 @@
4362
4381
  }
4363
4382
  return true;
4364
4383
  }
4365
- const isObjectLike = value => typeof value === "object" && value !== null;
4366
- function isObject(input) {
4367
- if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
4368
- return false;
4369
- }
4370
- if (Object.getPrototypeOf(input) === null) {
4371
- return true;
4372
- }
4373
- let proto = input;
4374
- while (Object.getPrototypeOf(proto) !== null) {
4375
- proto = Object.getPrototypeOf(proto);
4376
- }
4377
- return Object.getPrototypeOf(input) === proto;
4378
- }
4384
+ const isJWK = key => isObject(key) && typeof key.kty === "string";
4385
+ const isPrivateJWK = key => key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
4386
+ const isPublicJWK = key => key.kty !== "oct" && key.d === undefined && key.priv === undefined;
4387
+ const isSecretJWK = key => key.kty === "oct" && typeof key.k === "string";
4379
4388
  function checkKeyLength(alg, key) {
4380
4389
  if (alg.startsWith("RS") || alg.startsWith("PS")) {
4381
4390
  const {modulusLength: modulusLength} = key.algorithm;
@@ -4384,198 +4393,84 @@
4384
4393
  }
4385
4394
  }
4386
4395
  }
4387
- const bytesEqual = (a, b) => {
4388
- if (a.byteLength !== b.length) return false;
4389
- for (let i = 0; i < a.byteLength; i++) {
4390
- if (a[i] !== b[i]) return false;
4391
- }
4392
- return true;
4393
- };
4394
- const createASN1State = data => ({
4395
- data: data,
4396
- pos: 0
4397
- });
4398
- const parseLength = state => {
4399
- const first = state.data[state.pos++];
4400
- if (first & 128) {
4401
- const lengthOfLen = first & 127;
4402
- let length = 0;
4403
- for (let i = 0; i < lengthOfLen; i++) {
4404
- length = length << 8 | state.data[state.pos++];
4405
- }
4406
- return length;
4407
- }
4408
- return first;
4409
- };
4410
- const expectTag = (state, expectedTag, errorMessage) => {
4411
- if (state.data[state.pos++] !== expectedTag) {
4412
- throw new Error(errorMessage);
4413
- }
4414
- };
4415
- const getSubarray = (state, length) => {
4416
- const result = state.data.subarray(state.pos, state.pos + length);
4417
- state.pos += length;
4418
- return result;
4419
- };
4420
- const parseAlgorithmOID = state => {
4421
- expectTag(state, 6, "Expected algorithm OID");
4422
- const oidLen = parseLength(state);
4423
- return getSubarray(state, oidLen);
4424
- };
4425
- function parsePKCS8Header(state) {
4426
- expectTag(state, 48, "Invalid PKCS#8 structure");
4427
- parseLength(state);
4428
- expectTag(state, 2, "Expected version field");
4429
- const verLen = parseLength(state);
4430
- state.pos += verLen;
4431
- expectTag(state, 48, "Expected algorithm identifier");
4432
- const algIdLen = parseLength(state);
4433
- const algIdStart = state.pos;
4434
- return {
4435
- algIdStart: algIdStart,
4436
- algIdLength: algIdLen
4437
- };
4438
- }
4439
- const parseECAlgorithmIdentifier = state => {
4440
- const algOid = parseAlgorithmOID(state);
4441
- if (bytesEqual(algOid, [ 43, 101, 110 ])) {
4442
- return "X25519";
4443
- }
4444
- if (!bytesEqual(algOid, [ 42, 134, 72, 206, 61, 2, 1 ])) {
4445
- throw new Error("Unsupported key algorithm");
4446
- }
4447
- expectTag(state, 6, "Expected curve OID");
4448
- const curveOidLen = parseLength(state);
4449
- const curveOid = getSubarray(state, curveOidLen);
4450
- for (const {name: name, oid: oid} of [ {
4451
- name: "P-256",
4452
- oid: [ 42, 134, 72, 206, 61, 3, 1, 7 ]
4453
- }, {
4454
- name: "P-384",
4455
- oid: [ 43, 129, 4, 0, 34 ]
4456
- }, {
4457
- name: "P-521",
4458
- oid: [ 43, 129, 4, 0, 35 ]
4459
- } ]) {
4460
- if (bytesEqual(curveOid, oid)) {
4461
- return name;
4462
- }
4463
- }
4464
- throw new Error("Unsupported named curve");
4465
- };
4466
- const genericImport = async (keyFormat, keyData, alg, options) => {
4467
- var _options$extractable;
4468
- let algorithm;
4469
- let keyUsages;
4470
- const isPublic = keyFormat === "spki";
4471
- const getSigUsages = () => isPublic ? [ "verify" ] : [ "sign" ];
4472
- const getEncUsages = () => isPublic ? [ "encrypt", "wrapKey" ] : [ "decrypt", "unwrapKey" ];
4396
+ function subtleAlgorithm(alg, algorithm) {
4397
+ const hash = "SHA-".concat(alg.slice(-3));
4473
4398
  switch (alg) {
4399
+ case "HS256":
4400
+ case "HS384":
4401
+ case "HS512":
4402
+ return {
4403
+ hash: hash,
4404
+ name: "HMAC"
4405
+ };
4406
+
4474
4407
  case "PS256":
4475
4408
  case "PS384":
4476
4409
  case "PS512":
4477
- algorithm = {
4410
+ return {
4411
+ hash: hash,
4478
4412
  name: "RSA-PSS",
4479
- hash: "SHA-".concat(alg.slice(-3))
4413
+ saltLength: parseInt(alg.slice(-3), 10) >> 3
4480
4414
  };
4481
- keyUsages = getSigUsages();
4482
- break;
4483
4415
 
4484
4416
  case "RS256":
4485
4417
  case "RS384":
4486
4418
  case "RS512":
4487
- algorithm = {
4488
- name: "RSASSA-PKCS1-v1_5",
4489
- hash: "SHA-".concat(alg.slice(-3))
4490
- };
4491
- keyUsages = getSigUsages();
4492
- break;
4493
-
4494
- case "RSA-OAEP":
4495
- case "RSA-OAEP-256":
4496
- case "RSA-OAEP-384":
4497
- case "RSA-OAEP-512":
4498
- algorithm = {
4499
- name: "RSA-OAEP",
4500
- hash: "SHA-".concat(parseInt(alg.slice(-3), 10) || 1)
4419
+ return {
4420
+ hash: hash,
4421
+ name: "RSASSA-PKCS1-v1_5"
4501
4422
  };
4502
- keyUsages = getEncUsages();
4503
- break;
4504
4423
 
4505
4424
  case "ES256":
4506
4425
  case "ES384":
4507
4426
  case "ES512":
4508
- {
4509
- const curveMap = {
4510
- ES256: "P-256",
4511
- ES384: "P-384",
4512
- ES512: "P-521"
4513
- };
4514
- algorithm = {
4515
- name: "ECDSA",
4516
- namedCurve: curveMap[alg]
4517
- };
4518
- keyUsages = getSigUsages();
4519
- break;
4520
- }
4521
-
4522
- case "ECDH-ES":
4523
- case "ECDH-ES+A128KW":
4524
- case "ECDH-ES+A192KW":
4525
- case "ECDH-ES+A256KW":
4526
- {
4527
- try {
4528
- const namedCurve = options.getNamedCurve(keyData);
4529
- algorithm = namedCurve === "X25519" ? {
4530
- name: "X25519"
4531
- } : {
4532
- name: "ECDH",
4533
- namedCurve: namedCurve
4534
- };
4535
- } catch (cause) {
4536
- throw new JOSENotSupported("Invalid or unsupported key format");
4537
- }
4538
- keyUsages = isPublic ? [] : [ "deriveBits" ];
4539
- break;
4540
- }
4427
+ return {
4428
+ hash: hash,
4429
+ name: "ECDSA",
4430
+ namedCurve: algorithm.namedCurve
4431
+ };
4541
4432
 
4542
4433
  case "Ed25519":
4543
4434
  case "EdDSA":
4544
- algorithm = {
4435
+ return {
4545
4436
  name: "Ed25519"
4546
4437
  };
4547
- keyUsages = getSigUsages();
4548
- break;
4549
4438
 
4550
4439
  case "ML-DSA-44":
4551
4440
  case "ML-DSA-65":
4552
4441
  case "ML-DSA-87":
4553
- algorithm = {
4442
+ return {
4554
4443
  name: alg
4555
4444
  };
4556
- keyUsages = getSigUsages();
4557
- break;
4558
4445
 
4559
4446
  default:
4560
- throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
4447
+ throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
4561
4448
  }
4562
- return crypto.subtle.importKey(keyFormat, keyData, algorithm, (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : isPublic ? true : false, keyUsages);
4563
- };
4564
- const processPEMData = (pem, pattern) => decodeBase64(pem.replace(pattern, ""));
4565
- const fromPKCS8 = (pem, alg, options) => {
4566
- var _alg$startsWith;
4567
- const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g);
4568
- let opts = options;
4569
- if (alg !== null && alg !== void 0 && (_alg$startsWith = alg.startsWith) !== null && _alg$startsWith !== void 0 && _alg$startsWith.call(alg, "ECDH-ES")) {
4570
- opts || (opts = {});
4571
- opts.getNamedCurve = keyData => {
4572
- const state = createASN1State(keyData);
4573
- parsePKCS8Header(state);
4574
- return parseECAlgorithmIdentifier(state);
4575
- };
4449
+ }
4450
+ async function getSigKey(alg, key, usage) {
4451
+ if (key instanceof Uint8Array) {
4452
+ if (!alg.startsWith("HS")) {
4453
+ throw new TypeError(invalidKeyInput(key, "CryptoKey", "KeyObject", "JSON Web Key"));
4454
+ }
4455
+ return crypto.subtle.importKey("raw", key, {
4456
+ hash: "SHA-".concat(alg.slice(-3)),
4457
+ name: "HMAC"
4458
+ }, false, [ usage ]);
4576
4459
  }
4577
- return genericImport("pkcs8", keyData, alg, opts);
4578
- };
4460
+ checkSigCryptoKey(key, alg, usage);
4461
+ return key;
4462
+ }
4463
+ async function verify(alg, key, signature, data) {
4464
+ const cryptoKey = await getSigKey(alg, key, "verify");
4465
+ checkKeyLength(alg, cryptoKey);
4466
+ const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);
4467
+ try {
4468
+ return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);
4469
+ } catch (_unused) {
4470
+ return false;
4471
+ }
4472
+ }
4473
+ const unsupportedAlg = 'Invalid or unsupported JWK "alg" (Algorithm) Parameter value';
4579
4474
  function subtleMapping(jwk) {
4580
4475
  let algorithm;
4581
4476
  let keyUsages;
@@ -4593,7 +4488,7 @@
4593
4488
  break;
4594
4489
 
4595
4490
  default:
4596
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4491
+ throw new JOSENotSupported(unsupportedAlg);
4597
4492
  }
4598
4493
  break;
4599
4494
  }
@@ -4633,7 +4528,7 @@
4633
4528
  break;
4634
4529
 
4635
4530
  default:
4636
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4531
+ throw new JOSENotSupported(unsupportedAlg);
4637
4532
  }
4638
4533
  break;
4639
4534
  }
@@ -4642,25 +4537,15 @@
4642
4537
  {
4643
4538
  switch (jwk.alg) {
4644
4539
  case "ES256":
4645
- algorithm = {
4646
- name: "ECDSA",
4647
- namedCurve: "P-256"
4648
- };
4649
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4650
- break;
4651
-
4652
4540
  case "ES384":
4653
- algorithm = {
4654
- name: "ECDSA",
4655
- namedCurve: "P-384"
4656
- };
4657
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4658
- break;
4659
-
4660
4541
  case "ES512":
4661
4542
  algorithm = {
4662
4543
  name: "ECDSA",
4663
- namedCurve: "P-521"
4544
+ namedCurve: {
4545
+ ES256: "P-256",
4546
+ ES384: "P-384",
4547
+ ES512: "P-521"
4548
+ }[jwk.alg]
4664
4549
  };
4665
4550
  keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4666
4551
  break;
@@ -4677,7 +4562,7 @@
4677
4562
  break;
4678
4563
 
4679
4564
  default:
4680
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4565
+ throw new JOSENotSupported(unsupportedAlg);
4681
4566
  }
4682
4567
  break;
4683
4568
  }
@@ -4704,7 +4589,7 @@
4704
4589
  break;
4705
4590
 
4706
4591
  default:
4707
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
4592
+ throw new JOSENotSupported(unsupportedAlg);
4708
4593
  }
4709
4594
  break;
4710
4595
  }
@@ -4730,102 +4615,7 @@
4730
4615
  delete keyData.use;
4731
4616
  return crypto.subtle.importKey("jwk", keyData, algorithm, (_jwk$ext = jwk.ext) !== null && _jwk$ext !== void 0 ? _jwk$ext : jwk.d || jwk.priv ? false : true, (_jwk$key_ops = jwk.key_ops) !== null && _jwk$key_ops !== void 0 ? _jwk$key_ops : keyUsages);
4732
4617
  }
4733
- async function importPKCS8(pkcs8, alg, options) {
4734
- if (typeof pkcs8 !== "string" || pkcs8.indexOf("-----BEGIN PRIVATE KEY-----") !== 0) {
4735
- throw new TypeError('"pkcs8" must be PKCS#8 formatted string');
4736
- }
4737
- return fromPKCS8(pkcs8, alg, options);
4738
- }
4739
- async function importJWK(jwk, alg, options) {
4740
- var _options$extractable;
4741
- if (!isObject(jwk)) {
4742
- throw new TypeError("JWK must be an object");
4743
- }
4744
- let ext;
4745
- alg !== null && alg !== void 0 ? alg : alg = jwk.alg;
4746
- ext !== null && ext !== void 0 ? ext : ext = (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : jwk.ext;
4747
- switch (jwk.kty) {
4748
- case "oct":
4749
- if (typeof jwk.k !== "string" || !jwk.k) {
4750
- throw new TypeError('missing "k" (Key Value) Parameter value');
4751
- }
4752
- return decode(jwk.k);
4753
-
4754
- case "RSA":
4755
- if ("oth" in jwk && jwk.oth !== undefined) {
4756
- throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
4757
- }
4758
- return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
4759
- alg: alg,
4760
- ext: ext
4761
- }));
4762
-
4763
- case "AKP":
4764
- {
4765
- if (typeof jwk.alg !== "string" || !jwk.alg) {
4766
- throw new TypeError('missing "alg" (Algorithm) Parameter value');
4767
- }
4768
- if (alg !== undefined && alg !== jwk.alg) {
4769
- throw new TypeError("JWK alg and alg option value mismatch");
4770
- }
4771
- return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
4772
- ext: ext
4773
- }));
4774
- }
4775
-
4776
- case "EC":
4777
- case "OKP":
4778
- return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
4779
- alg: alg,
4780
- ext: ext
4781
- }));
4782
-
4783
- default:
4784
- throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
4785
- }
4786
- }
4787
- function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
4788
- if (joseHeader.crit !== undefined && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === undefined) {
4789
- throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
4790
- }
4791
- if (!protectedHeader || protectedHeader.crit === undefined) {
4792
- return new Set;
4793
- }
4794
- if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some((input => typeof input !== "string" || input.length === 0))) {
4795
- throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
4796
- }
4797
- let recognized;
4798
- if (recognizedOption !== undefined) {
4799
- recognized = new Map([ ...Object.entries(recognizedOption), ...recognizedDefault.entries() ]);
4800
- } else {
4801
- recognized = recognizedDefault;
4802
- }
4803
- for (const parameter of protectedHeader.crit) {
4804
- if (!recognized.has(parameter)) {
4805
- throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
4806
- }
4807
- if (joseHeader[parameter] === undefined) {
4808
- throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
4809
- }
4810
- if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
4811
- throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
4812
- }
4813
- }
4814
- return new Set(protectedHeader.crit);
4815
- }
4816
- function validateAlgorithms(option, algorithms) {
4817
- if (algorithms !== undefined && (!Array.isArray(algorithms) || algorithms.some((s => typeof s !== "string")))) {
4818
- throw new TypeError('"'.concat(option, '" option must be an array of strings'));
4819
- }
4820
- if (!algorithms) {
4821
- return undefined;
4822
- }
4823
- return new Set(algorithms);
4824
- }
4825
- const isJWK = key => isObject(key) && typeof key.kty === "string";
4826
- const isPrivateJWK = key => key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
4827
- const isPublicJWK = key => key.kty !== "oct" && key.d === undefined && key.priv === undefined;
4828
- const isSecretJWK = key => key.kty === "oct" && typeof key.k === "string";
4618
+ const unusableForAlg = "given KeyObject instance cannot be used for this algorithm";
4829
4619
  let cache;
4830
4620
  const handleJWK = async function handleJWK(key, jwk, alg) {
4831
4621
  let freeze = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : false;
@@ -4865,13 +4655,13 @@
4865
4655
  break;
4866
4656
 
4867
4657
  default:
4868
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4658
+ throw new TypeError(unusableForAlg);
4869
4659
  }
4870
4660
  cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : [ "deriveBits" ]);
4871
4661
  }
4872
4662
  if (keyObject.asymmetricKeyType === "ed25519") {
4873
4663
  if (alg !== "EdDSA" && alg !== "Ed25519") {
4874
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4664
+ throw new TypeError(unusableForAlg);
4875
4665
  }
4876
4666
  cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
4877
4667
  }
@@ -4881,7 +4671,7 @@
4881
4671
  case "ml-dsa-87":
4882
4672
  {
4883
4673
  if (alg !== keyObject.asymmetricKeyType.toUpperCase()) {
4884
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4674
+ throw new TypeError(unusableForAlg);
4885
4675
  }
4886
4676
  cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
4887
4677
  }
@@ -4912,7 +4702,7 @@
4912
4702
  break;
4913
4703
 
4914
4704
  default:
4915
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4705
+ throw new TypeError(unusableForAlg);
4916
4706
  }
4917
4707
  if (alg.startsWith("RSA-OAEP")) {
4918
4708
  return keyObject.toCryptoKey({
@@ -4930,21 +4720,14 @@
4930
4720
  const nist = new Map([ [ "prime256v1", "P-256" ], [ "secp384r1", "P-384" ], [ "secp521r1", "P-521" ] ]);
4931
4721
  const namedCurve = nist.get((_keyObject$asymmetric = keyObject.asymmetricKeyDetails) === null || _keyObject$asymmetric === void 0 ? void 0 : _keyObject$asymmetric.namedCurve);
4932
4722
  if (!namedCurve) {
4933
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4934
- }
4935
- if (alg === "ES256" && namedCurve === "P-256") {
4936
- cryptoKey = keyObject.toCryptoKey({
4937
- name: "ECDSA",
4938
- namedCurve: namedCurve
4939
- }, extractable, [ isPublic ? "verify" : "sign" ]);
4723
+ throw new TypeError(unusableForAlg);
4940
4724
  }
4941
- if (alg === "ES384" && namedCurve === "P-384") {
4942
- cryptoKey = keyObject.toCryptoKey({
4943
- name: "ECDSA",
4944
- namedCurve: namedCurve
4945
- }, extractable, [ isPublic ? "verify" : "sign" ]);
4946
- }
4947
- if (alg === "ES512" && namedCurve === "P-521") {
4725
+ const expectedCurve = {
4726
+ ES256: "P-256",
4727
+ ES384: "P-384",
4728
+ ES512: "P-521"
4729
+ };
4730
+ if (expectedCurve[alg] && namedCurve === expectedCurve[alg]) {
4948
4731
  cryptoKey = keyObject.toCryptoKey({
4949
4732
  name: "ECDSA",
4950
4733
  namedCurve: namedCurve
@@ -4957,50 +4740,334 @@
4957
4740
  }, extractable, isPublic ? [] : [ "deriveBits" ]);
4958
4741
  }
4959
4742
  }
4960
- if (!cryptoKey) {
4961
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
4743
+ if (!cryptoKey) {
4744
+ throw new TypeError(unusableForAlg);
4745
+ }
4746
+ if (!cached) {
4747
+ cache.set(keyObject, {
4748
+ [alg]: cryptoKey
4749
+ });
4750
+ } else {
4751
+ cached[alg] = cryptoKey;
4752
+ }
4753
+ return cryptoKey;
4754
+ };
4755
+ async function normalizeKey(key, alg) {
4756
+ if (key instanceof Uint8Array) {
4757
+ return key;
4758
+ }
4759
+ if (isCryptoKey(key)) {
4760
+ return key;
4761
+ }
4762
+ if (isKeyObject(key)) {
4763
+ if (key.type === "secret") {
4764
+ return key.export();
4765
+ }
4766
+ if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
4767
+ try {
4768
+ return handleKeyObject(key, alg);
4769
+ } catch (err) {
4770
+ if (err instanceof TypeError) {
4771
+ throw err;
4772
+ }
4773
+ }
4774
+ }
4775
+ let jwk = key.export({
4776
+ format: "jwk"
4777
+ });
4778
+ return handleJWK(key, jwk, alg);
4779
+ }
4780
+ if (isJWK(key)) {
4781
+ if (key.k) {
4782
+ return decode(key.k);
4783
+ }
4784
+ return handleJWK(key, key, alg, true);
4785
+ }
4786
+ throw new Error("unreachable");
4787
+ }
4788
+ const bytesEqual = (a, b) => {
4789
+ if (a.byteLength !== b.length) return false;
4790
+ for (let i = 0; i < a.byteLength; i++) {
4791
+ if (a[i] !== b[i]) return false;
4792
+ }
4793
+ return true;
4794
+ };
4795
+ const createASN1State = data => ({
4796
+ data: data,
4797
+ pos: 0
4798
+ });
4799
+ const parseLength = state => {
4800
+ const first = state.data[state.pos++];
4801
+ if (first & 128) {
4802
+ const lengthOfLen = first & 127;
4803
+ let length = 0;
4804
+ for (let i = 0; i < lengthOfLen; i++) {
4805
+ length = length << 8 | state.data[state.pos++];
4806
+ }
4807
+ return length;
4808
+ }
4809
+ return first;
4810
+ };
4811
+ const expectTag = (state, expectedTag, errorMessage) => {
4812
+ if (state.data[state.pos++] !== expectedTag) {
4813
+ throw new Error(errorMessage);
4814
+ }
4815
+ };
4816
+ const getSubarray = (state, length) => {
4817
+ const result = state.data.subarray(state.pos, state.pos + length);
4818
+ state.pos += length;
4819
+ return result;
4820
+ };
4821
+ const parseAlgorithmOID = state => {
4822
+ expectTag(state, 6, "Expected algorithm OID");
4823
+ const oidLen = parseLength(state);
4824
+ return getSubarray(state, oidLen);
4825
+ };
4826
+ function parsePKCS8Header(state) {
4827
+ expectTag(state, 48, "Invalid PKCS#8 structure");
4828
+ parseLength(state);
4829
+ expectTag(state, 2, "Expected version field");
4830
+ const verLen = parseLength(state);
4831
+ state.pos += verLen;
4832
+ expectTag(state, 48, "Expected algorithm identifier");
4833
+ const algIdLen = parseLength(state);
4834
+ const algIdStart = state.pos;
4835
+ return {
4836
+ algIdStart: algIdStart,
4837
+ algIdLength: algIdLen
4838
+ };
4839
+ }
4840
+ const parseECAlgorithmIdentifier = state => {
4841
+ const algOid = parseAlgorithmOID(state);
4842
+ if (bytesEqual(algOid, [ 43, 101, 110 ])) {
4843
+ return "X25519";
4844
+ }
4845
+ if (!bytesEqual(algOid, [ 42, 134, 72, 206, 61, 2, 1 ])) {
4846
+ throw new Error("Unsupported key algorithm");
4847
+ }
4848
+ expectTag(state, 6, "Expected curve OID");
4849
+ const curveOidLen = parseLength(state);
4850
+ const curveOid = getSubarray(state, curveOidLen);
4851
+ for (const {name: name, oid: oid} of [ {
4852
+ name: "P-256",
4853
+ oid: [ 42, 134, 72, 206, 61, 3, 1, 7 ]
4854
+ }, {
4855
+ name: "P-384",
4856
+ oid: [ 43, 129, 4, 0, 34 ]
4857
+ }, {
4858
+ name: "P-521",
4859
+ oid: [ 43, 129, 4, 0, 35 ]
4860
+ } ]) {
4861
+ if (bytesEqual(curveOid, oid)) {
4862
+ return name;
4863
+ }
4864
+ }
4865
+ throw new Error("Unsupported named curve");
4866
+ };
4867
+ const genericImport = async (keyFormat, keyData, alg, options) => {
4868
+ var _options$extractable;
4869
+ let algorithm;
4870
+ let keyUsages;
4871
+ const isPublic = keyFormat === "spki";
4872
+ const getSigUsages = () => isPublic ? [ "verify" ] : [ "sign" ];
4873
+ const getEncUsages = () => isPublic ? [ "encrypt", "wrapKey" ] : [ "decrypt", "unwrapKey" ];
4874
+ switch (alg) {
4875
+ case "PS256":
4876
+ case "PS384":
4877
+ case "PS512":
4878
+ algorithm = {
4879
+ name: "RSA-PSS",
4880
+ hash: "SHA-".concat(alg.slice(-3))
4881
+ };
4882
+ keyUsages = getSigUsages();
4883
+ break;
4884
+
4885
+ case "RS256":
4886
+ case "RS384":
4887
+ case "RS512":
4888
+ algorithm = {
4889
+ name: "RSASSA-PKCS1-v1_5",
4890
+ hash: "SHA-".concat(alg.slice(-3))
4891
+ };
4892
+ keyUsages = getSigUsages();
4893
+ break;
4894
+
4895
+ case "RSA-OAEP":
4896
+ case "RSA-OAEP-256":
4897
+ case "RSA-OAEP-384":
4898
+ case "RSA-OAEP-512":
4899
+ algorithm = {
4900
+ name: "RSA-OAEP",
4901
+ hash: "SHA-".concat(parseInt(alg.slice(-3), 10) || 1)
4902
+ };
4903
+ keyUsages = getEncUsages();
4904
+ break;
4905
+
4906
+ case "ES256":
4907
+ case "ES384":
4908
+ case "ES512":
4909
+ {
4910
+ const curveMap = {
4911
+ ES256: "P-256",
4912
+ ES384: "P-384",
4913
+ ES512: "P-521"
4914
+ };
4915
+ algorithm = {
4916
+ name: "ECDSA",
4917
+ namedCurve: curveMap[alg]
4918
+ };
4919
+ keyUsages = getSigUsages();
4920
+ break;
4921
+ }
4922
+
4923
+ case "ECDH-ES":
4924
+ case "ECDH-ES+A128KW":
4925
+ case "ECDH-ES+A192KW":
4926
+ case "ECDH-ES+A256KW":
4927
+ {
4928
+ try {
4929
+ const namedCurve = options.getNamedCurve(keyData);
4930
+ algorithm = namedCurve === "X25519" ? {
4931
+ name: "X25519"
4932
+ } : {
4933
+ name: "ECDH",
4934
+ namedCurve: namedCurve
4935
+ };
4936
+ } catch (cause) {
4937
+ throw new JOSENotSupported("Invalid or unsupported key format");
4938
+ }
4939
+ keyUsages = isPublic ? [] : [ "deriveBits" ];
4940
+ break;
4941
+ }
4942
+
4943
+ case "Ed25519":
4944
+ case "EdDSA":
4945
+ algorithm = {
4946
+ name: "Ed25519"
4947
+ };
4948
+ keyUsages = getSigUsages();
4949
+ break;
4950
+
4951
+ case "ML-DSA-44":
4952
+ case "ML-DSA-65":
4953
+ case "ML-DSA-87":
4954
+ algorithm = {
4955
+ name: alg
4956
+ };
4957
+ keyUsages = getSigUsages();
4958
+ break;
4959
+
4960
+ default:
4961
+ throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
4962
+ }
4963
+ return crypto.subtle.importKey(keyFormat, keyData, algorithm, (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : isPublic ? true : false, keyUsages);
4964
+ };
4965
+ const processPEMData = (pem, pattern) => decodeBase64(pem.replace(pattern, ""));
4966
+ const fromPKCS8 = (pem, alg, options) => {
4967
+ var _alg$startsWith;
4968
+ const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g);
4969
+ let opts = options;
4970
+ if (alg !== null && alg !== void 0 && (_alg$startsWith = alg.startsWith) !== null && _alg$startsWith !== void 0 && _alg$startsWith.call(alg, "ECDH-ES")) {
4971
+ opts || (opts = {});
4972
+ opts.getNamedCurve = keyData => {
4973
+ const state = createASN1State(keyData);
4974
+ parsePKCS8Header(state);
4975
+ return parseECAlgorithmIdentifier(state);
4976
+ };
4977
+ }
4978
+ return genericImport("pkcs8", keyData, alg, opts);
4979
+ };
4980
+ async function importPKCS8(pkcs8, alg, options) {
4981
+ if (typeof pkcs8 !== "string" || pkcs8.indexOf("-----BEGIN PRIVATE KEY-----") !== 0) {
4982
+ throw new TypeError('"pkcs8" must be PKCS#8 formatted string');
4983
+ }
4984
+ return fromPKCS8(pkcs8, alg, options);
4985
+ }
4986
+ async function importJWK(jwk, alg, options) {
4987
+ var _options$extractable;
4988
+ if (!isObject(jwk)) {
4989
+ throw new TypeError("JWK must be an object");
4990
+ }
4991
+ let ext;
4992
+ alg !== null && alg !== void 0 ? alg : alg = jwk.alg;
4993
+ ext !== null && ext !== void 0 ? ext : ext = (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : jwk.ext;
4994
+ switch (jwk.kty) {
4995
+ case "oct":
4996
+ if (typeof jwk.k !== "string" || !jwk.k) {
4997
+ throw new TypeError('missing "k" (Key Value) Parameter value');
4998
+ }
4999
+ return decode(jwk.k);
5000
+
5001
+ case "RSA":
5002
+ if ("oth" in jwk && jwk.oth !== undefined) {
5003
+ throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
5004
+ }
5005
+ return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5006
+ alg: alg,
5007
+ ext: ext
5008
+ }));
5009
+
5010
+ case "AKP":
5011
+ {
5012
+ if (typeof jwk.alg !== "string" || !jwk.alg) {
5013
+ throw new TypeError('missing "alg" (Algorithm) Parameter value');
5014
+ }
5015
+ if (alg !== undefined && alg !== jwk.alg) {
5016
+ throw new TypeError("JWK alg and alg option value mismatch");
5017
+ }
5018
+ return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5019
+ ext: ext
5020
+ }));
5021
+ }
5022
+
5023
+ case "EC":
5024
+ case "OKP":
5025
+ return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5026
+ alg: alg,
5027
+ ext: ext
5028
+ }));
5029
+
5030
+ default:
5031
+ throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
5032
+ }
5033
+ }
5034
+ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
5035
+ if (joseHeader.crit !== undefined && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === undefined) {
5036
+ throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
4962
5037
  }
4963
- if (!cached) {
4964
- cache.set(keyObject, {
4965
- [alg]: cryptoKey
4966
- });
4967
- } else {
4968
- cached[alg] = cryptoKey;
5038
+ if (!protectedHeader || protectedHeader.crit === undefined) {
5039
+ return new Set;
4969
5040
  }
4970
- return cryptoKey;
4971
- };
4972
- async function normalizeKey(key, alg) {
4973
- if (key instanceof Uint8Array) {
4974
- return key;
5041
+ if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some(input => typeof input !== "string" || input.length === 0)) {
5042
+ throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
4975
5043
  }
4976
- if (isCryptoKey(key)) {
4977
- return key;
5044
+ let recognized;
5045
+ if (recognizedOption !== undefined) {
5046
+ recognized = new Map([ ...Object.entries(recognizedOption), ...recognizedDefault.entries() ]);
5047
+ } else {
5048
+ recognized = recognizedDefault;
4978
5049
  }
4979
- if (isKeyObject(key)) {
4980
- if (key.type === "secret") {
4981
- return key.export();
5050
+ for (const parameter of protectedHeader.crit) {
5051
+ if (!recognized.has(parameter)) {
5052
+ throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
4982
5053
  }
4983
- if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
4984
- try {
4985
- return handleKeyObject(key, alg);
4986
- } catch (err) {
4987
- if (err instanceof TypeError) {
4988
- throw err;
4989
- }
4990
- }
5054
+ if (joseHeader[parameter] === undefined) {
5055
+ throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
4991
5056
  }
4992
- let jwk = key.export({
4993
- format: "jwk"
4994
- });
4995
- return handleJWK(key, jwk, alg);
4996
- }
4997
- if (isJWK(key)) {
4998
- if (key.k) {
4999
- return decode(key.k);
5057
+ if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
5058
+ throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
5000
5059
  }
5001
- return handleJWK(key, key, alg, true);
5002
5060
  }
5003
- throw new Error("unreachable");
5061
+ return new Set(protectedHeader.crit);
5062
+ }
5063
+ function validateAlgorithms(option, algorithms) {
5064
+ if (algorithms !== undefined && (!Array.isArray(algorithms) || algorithms.some(s => typeof s !== "string"))) {
5065
+ throw new TypeError('"'.concat(option, '" option must be an array of strings'));
5066
+ }
5067
+ if (!algorithms) {
5068
+ return undefined;
5069
+ }
5070
+ return new Set(algorithms);
5004
5071
  }
5005
5072
  const tag = key => key === null || key === void 0 ? void 0 : key[Symbol.toStringTag];
5006
5073
  const jwkMatchesOp = (alg, key, usage) => {
@@ -5131,7 +5198,7 @@
5131
5198
  let USER_AGENT$1;
5132
5199
  if (typeof navigator === "undefined" || !((_navigator$userAgent$1 = navigator.userAgent) !== null && _navigator$userAgent$1 !== void 0 && (_navigator$userAgent$$1 = _navigator$userAgent$1.startsWith) !== null && _navigator$userAgent$$1 !== void 0 && _navigator$userAgent$$1.call(_navigator$userAgent$1, "Mozilla/5.0 "))) {
5133
5200
  const NAME = "openid-client";
5134
- const VERSION = "v6.8.1";
5201
+ const VERSION = "v6.8.2";
5135
5202
  USER_AGENT$1 = "".concat(NAME, "/").concat(VERSION);
5136
5203
  headers = {
5137
5204
  "user-agent": USER_AGENT$1
@@ -5321,7 +5388,7 @@
5321
5388
  method: "GET",
5322
5389
  redirect: "manual",
5323
5390
  signal: signal
5324
- })).then((response => processDiscoveryResponse(_nodiscoverycheck, response))).catch(errorHandler);
5391
+ })).then(response => processDiscoveryResponse(_nodiscoverycheck, response)).catch(errorHandler);
5325
5392
  if (resolve && new URL(as.issuer).href !== server.href) {
5326
5393
  handleEntraId(server, as, options) || handleB2Clogin(server, options) || (() => {
5327
5394
  throw new ClientError("discovered metadata issuer does not match the expected issuer", {
@@ -5487,7 +5554,7 @@
5487
5554
  }
5488
5555
  }
5489
5556
  function wait(duration, signal) {
5490
- return new Promise(((resolve, reject) => {
5557
+ return new Promise((resolve, reject) => {
5491
5558
  const waitStep = remaining => {
5492
5559
  try {
5493
5560
  signal.throwIfAborted();
@@ -5500,10 +5567,10 @@
5500
5567
  return;
5501
5568
  }
5502
5569
  const currentWait = Math.min(remaining, 5);
5503
- setTimeout((() => waitStep(remaining - currentWait)), currentWait * 1e3);
5570
+ setTimeout(() => waitStep(remaining - currentWait), currentWait * 1e3);
5504
5571
  };
5505
5572
  waitStep(duration);
5506
- }));
5573
+ });
5507
5574
  }
5508
5575
  async function initiateBackchannelAuthentication(config, parameters) {
5509
5576
  checkConfig(config);
@@ -5513,7 +5580,7 @@
5513
5580
  [allowInsecureRequests$1]: !tlsOnly,
5514
5581
  headers: new Headers(headers),
5515
5582
  signal: signal(timeout)
5516
- }).then((response => processBackchannelAuthenticationResponse(as, c, response))).catch(errorHandler);
5583
+ }).then(response => processBackchannelAuthenticationResponse(as, c, response)).catch(errorHandler);
5517
5584
  }
5518
5585
  async function pollBackchannelAuthenticationGrant(config, backchannelAuthenticationResponse, parameters, options) {
5519
5586
  var _backchannelAuthentic, _options$signal2;
@@ -5825,7 +5892,7 @@
5825
5892
  DPoP: options === null || options === void 0 ? void 0 : options.DPoP,
5826
5893
  headers: new Headers(headers),
5827
5894
  signal: signal(timeout)
5828
- }).then((response => {
5895
+ }).then(response => {
5829
5896
  let recognizedTokenTypes;
5830
5897
  if (grantType === "urn:ietf:params:oauth:grant-type:token-exchange") {
5831
5898
  recognizedTokenTypes = {
@@ -5836,87 +5903,10 @@
5836
5903
  [jweDecrypt]: decrypt,
5837
5904
  recognizedTokenTypes: recognizedTokenTypes
5838
5905
  });
5839
- })).catch(errorHandler);
5906
+ }).catch(errorHandler);
5840
5907
  addHelpers(result);
5841
5908
  return result;
5842
5909
  }
5843
- function subtleAlgorithm(alg, algorithm) {
5844
- const hash = "SHA-".concat(alg.slice(-3));
5845
- switch (alg) {
5846
- case "HS256":
5847
- case "HS384":
5848
- case "HS512":
5849
- return {
5850
- hash: hash,
5851
- name: "HMAC"
5852
- };
5853
-
5854
- case "PS256":
5855
- case "PS384":
5856
- case "PS512":
5857
- return {
5858
- hash: hash,
5859
- name: "RSA-PSS",
5860
- saltLength: parseInt(alg.slice(-3), 10) >> 3
5861
- };
5862
-
5863
- case "RS256":
5864
- case "RS384":
5865
- case "RS512":
5866
- return {
5867
- hash: hash,
5868
- name: "RSASSA-PKCS1-v1_5"
5869
- };
5870
-
5871
- case "ES256":
5872
- case "ES384":
5873
- case "ES512":
5874
- return {
5875
- hash: hash,
5876
- name: "ECDSA",
5877
- namedCurve: algorithm.namedCurve
5878
- };
5879
-
5880
- case "Ed25519":
5881
- case "EdDSA":
5882
- return {
5883
- name: "Ed25519"
5884
- };
5885
-
5886
- case "ML-DSA-44":
5887
- case "ML-DSA-65":
5888
- case "ML-DSA-87":
5889
- return {
5890
- name: alg
5891
- };
5892
-
5893
- default:
5894
- throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
5895
- }
5896
- }
5897
- async function getSigKey(alg, key, usage) {
5898
- if (key instanceof Uint8Array) {
5899
- if (!alg.startsWith("HS")) {
5900
- throw new TypeError(invalidKeyInput(key, "CryptoKey", "KeyObject", "JSON Web Key"));
5901
- }
5902
- return crypto.subtle.importKey("raw", key, {
5903
- hash: "SHA-".concat(alg.slice(-3)),
5904
- name: "HMAC"
5905
- }, false, [ usage ]);
5906
- }
5907
- checkSigCryptoKey(key, alg, usage);
5908
- return key;
5909
- }
5910
- async function verify(alg, key, signature, data) {
5911
- const cryptoKey = await getSigKey(alg, key, "verify");
5912
- checkKeyLength(alg, cryptoKey);
5913
- const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);
5914
- try {
5915
- return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);
5916
- } catch (_unused) {
5917
- return false;
5918
- }
5919
- }
5920
5910
  async function flattenedVerify(jws, key, options) {
5921
5911
  if (!isObject(jws)) {
5922
5912
  throw new JWSInvalid("Flattened JWS must be an object");
@@ -5979,12 +5969,7 @@
5979
5969
  }
5980
5970
  checkKeyType(alg, key, "verify");
5981
5971
  const data = concat(jws.protected !== undefined ? encode(jws.protected) : new Uint8Array, encode("."), typeof jws.payload === "string" ? b64 ? encode(jws.payload) : encoder.encode(jws.payload) : jws.payload);
5982
- let signature;
5983
- try {
5984
- signature = decode(jws.signature);
5985
- } catch (_unused2) {
5986
- throw new JWSInvalid("Failed to base64url decode the signature");
5987
- }
5972
+ const signature = decodeBase64url(jws.signature, "signature", JWSInvalid);
5988
5973
  const k = await normalizeKey(key, alg);
5989
5974
  const verified = await verify(alg, k, signature, data);
5990
5975
  if (!verified) {
@@ -5992,11 +5977,7 @@
5992
5977
  }
5993
5978
  let payload;
5994
5979
  if (b64) {
5995
- try {
5996
- payload = decode(jws.payload);
5997
- } catch (_unused3) {
5998
- throw new JWSInvalid("Failed to base64url decode the payload");
5999
- }
5980
+ payload = decodeBase64url(jws.payload, "payload", JWSInvalid);
6000
5981
  } else if (typeof jws.payload === "string") {
6001
5982
  payload = encoder.encode(jws.payload);
6002
5983
  } else {
@@ -6264,7 +6245,7 @@
6264
6245
  async getKey(protectedHeader, token) {
6265
6246
  const {alg: alg, kid: kid} = _objectSpread2(_objectSpread2({}, protectedHeader), token === null || token === void 0 ? void 0 : token.header);
6266
6247
  const kty = getKtyFromAlg(alg);
6267
- const candidates = _classPrivateFieldGet2(_jwks$1, this).keys.filter((jwk => {
6248
+ const candidates = _classPrivateFieldGet2(_jwks$1, this).keys.filter(jwk => {
6268
6249
  let candidate = kty === jwk.kty;
6269
6250
  if (candidate && typeof kid === "string") {
6270
6251
  candidate = kid === jwk.kid;
@@ -6299,7 +6280,7 @@
6299
6280
  }
6300
6281
  }
6301
6282
  return candidate;
6302
- }));
6283
+ });
6303
6284
  const {0: jwk, length: length} = candidates;
6304
6285
  if (length === 0) {
6305
6286
  throw new JWKSNoMatchingKey;
@@ -6307,13 +6288,13 @@
6307
6288
  if (length !== 1) {
6308
6289
  const error = new JWKSMultipleMatchingKeys;
6309
6290
  const _cached = _classPrivateFieldGet2(_cached2, this);
6310
- error[Symbol.asyncIterator] = _wrapAsyncGenerator((function*() {
6291
+ error[Symbol.asyncIterator] = _wrapAsyncGenerator(function*() {
6311
6292
  for (const jwk of candidates) {
6312
6293
  try {
6313
6294
  yield yield _awaitAsyncGenerator(importWithAlgCache(_cached, jwk, alg));
6314
6295
  } catch (_unused) {}
6315
6296
  }
6316
- }));
6297
+ });
6317
6298
  throw error;
6318
6299
  }
6319
6300
  return importWithAlgCache(_classPrivateFieldGet2(_cached2, this), jwk, alg);
@@ -6352,7 +6333,7 @@
6352
6333
  let USER_AGENT;
6353
6334
  if (typeof navigator === "undefined" || !((_navigator$userAgent = navigator.userAgent) !== null && _navigator$userAgent !== void 0 && (_navigator$userAgent$ = _navigator$userAgent.startsWith) !== null && _navigator$userAgent$ !== void 0 && _navigator$userAgent$.call(_navigator$userAgent, "Mozilla/5.0 "))) {
6354
6335
  const NAME = "jose";
6355
- const VERSION = "v6.1.3";
6336
+ const VERSION = "v6.2.1";
6356
6337
  USER_AGENT = "".concat(NAME, "/").concat(VERSION);
6357
6338
  }
6358
6339
  const customFetch = Symbol();
@@ -6363,12 +6344,12 @@
6363
6344
  signal: signal,
6364
6345
  redirect: "manual",
6365
6346
  headers: headers
6366
- }).catch((err => {
6347
+ }).catch(err => {
6367
6348
  if (err.name === "TimeoutError") {
6368
6349
  throw new JWKSTimeout;
6369
6350
  }
6370
6351
  throw err;
6371
- }));
6352
+ });
6372
6353
  if (response.status !== 200) {
6373
6354
  throw new JOSEError("Expected 200 OK from the JSON Web Key Set HTTP response");
6374
6355
  }
@@ -6470,7 +6451,7 @@
6470
6451
  if (_classPrivateFieldGet2(_pendingFetch, this) && isCloudflareWorkers()) {
6471
6452
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6472
6453
  }
6473
- _classPrivateFieldGet2(_pendingFetch, this) || _classPrivateFieldSet2(_pendingFetch, this, fetchJwks(_classPrivateFieldGet2(_url, this).href, _classPrivateFieldGet2(_headers, this), AbortSignal.timeout(_classPrivateFieldGet2(_timeoutDuration, this)), _classPrivateFieldGet2(_customFetch$1, this)).then((json => {
6454
+ _classPrivateFieldGet2(_pendingFetch, this) || _classPrivateFieldSet2(_pendingFetch, this, fetchJwks(_classPrivateFieldGet2(_url, this).href, _classPrivateFieldGet2(_headers, this), AbortSignal.timeout(_classPrivateFieldGet2(_timeoutDuration, this)), _classPrivateFieldGet2(_customFetch$1, this)).then(json => {
6474
6455
  _classPrivateFieldSet2(_local, this, createLocalJWKSet(json));
6475
6456
  if (_classPrivateFieldGet2(_cache, this)) {
6476
6457
  _classPrivateFieldGet2(_cache, this).uat = Date.now();
@@ -6478,10 +6459,10 @@
6478
6459
  }
6479
6460
  _classPrivateFieldSet2(_jwksTimestamp, this, Date.now());
6480
6461
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6481
- })).catch((err => {
6462
+ }).catch(err => {
6482
6463
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6483
6464
  throw err;
6484
- })));
6465
+ }));
6485
6466
  await _classPrivateFieldGet2(_pendingFetch, this);
6486
6467
  }
6487
6468
  }
@@ -6520,7 +6501,7 @@
6520
6501
  return remoteJWKSet;
6521
6502
  }
6522
6503
  const _excluded = [ "mfaToken" ], _excluded2 = [ "mfaToken" ];
6523
- var _baseUrl, _clientId, _customFetch, _configuration, _serverMetadata, _options, _jwks, _Class8_brand;
6504
+ var _baseUrl, _clientId, _customFetch, _entries, _ttlMs, _maxEntries, _configuration, _serverMetadata, _clientAuthPromise, _options, _customFetch2, _jwks, _discoveryCache, _inFlightDiscovery, _jwksCache, _Class9_brand;
6524
6505
  var NotSupportedError = class NotSupportedError extends Error {
6525
6506
  constructor(code, message) {
6526
6507
  super(message);
@@ -6612,12 +6593,12 @@
6612
6593
  }
6613
6594
  };
6614
6595
  function stripUndefinedProperties(value) {
6615
- return Object.entries(value).filter((_ref => {
6596
+ return Object.entries(value).filter(_ref => {
6616
6597
  let [, value2] = _ref;
6617
6598
  return typeof value2 !== "undefined";
6618
- })).reduce(((acc, curr) => _objectSpread2(_objectSpread2({}, acc), {}, {
6599
+ }).reduce((acc, curr) => _objectSpread2(_objectSpread2({}, acc), {}, {
6619
6600
  [curr[0]]: curr[1]
6620
- })), {});
6601
+ }), {});
6621
6602
  }
6622
6603
  var MfaError$1 = class MfaError extends Error {
6623
6604
  constructor(code, message, cause) {
@@ -6682,7 +6663,9 @@
6682
6663
  oobChannel: api.oob_channel,
6683
6664
  oobCode: api.oob_code,
6684
6665
  bindingMethod: api.binding_method,
6685
- id: api.id
6666
+ id: api.id,
6667
+ barcodeUri: api.barcode_uri,
6668
+ recoveryCodes: api.recovery_codes
6686
6669
  };
6687
6670
  }
6688
6671
  throw new Error("Unexpected authenticator type: ".concat(api.authenticator_type));
@@ -6800,6 +6783,40 @@
6800
6783
  return transformChallengeResponse(apiResponse);
6801
6784
  }
6802
6785
  });
6786
+ function createTelemetryFetch(baseFetch, config) {
6787
+ if (config.enabled === false) {
6788
+ return baseFetch;
6789
+ }
6790
+ const telemetryData = {
6791
+ name: config.name,
6792
+ version: config.version
6793
+ };
6794
+ const headerValue = btoa(JSON.stringify(telemetryData));
6795
+ return async (input, init) => {
6796
+ const headers = input instanceof Request ? new Headers(input.headers) : new Headers;
6797
+ if (init !== null && init !== void 0 && init.headers) {
6798
+ const initHeaders = new Headers(init.headers);
6799
+ initHeaders.forEach((value, key) => {
6800
+ headers.set(key, value);
6801
+ });
6802
+ }
6803
+ headers.set("Auth0-Client", headerValue);
6804
+ return baseFetch(input, _objectSpread2(_objectSpread2({}, init), {}, {
6805
+ headers: headers
6806
+ }));
6807
+ };
6808
+ }
6809
+ function getTelemetryConfig(config) {
6810
+ var _config$name, _config$version;
6811
+ if ((config === null || config === void 0 ? void 0 : config.enabled) === false) {
6812
+ return config;
6813
+ }
6814
+ return {
6815
+ enabled: true,
6816
+ name: (_config$name = config === null || config === void 0 ? void 0 : config.name) !== null && _config$name !== void 0 ? _config$name : "@auth0/auth0-auth-js",
6817
+ version: (_config$version = config === null || config === void 0 ? void 0 : config.version) !== null && _config$version !== void 0 ? _config$version : "1.5.0"
6818
+ };
6819
+ }
6803
6820
  var TokenResponse = class _TokenResponse {
6804
6821
  constructor(accessToken, expiresAt, idToken, refreshToken, scope, claims, authorizationDetails) {
6805
6822
  _defineProperty(this, "accessToken", void 0);
@@ -6827,6 +6844,75 @@
6827
6844
  return tokenResponse;
6828
6845
  }
6829
6846
  };
6847
+ var LruCache = (_entries = new WeakMap, _ttlMs = new WeakMap, _maxEntries = new WeakMap,
6848
+ class LruCache {
6849
+ constructor(maxEntries, ttlMs) {
6850
+ _classPrivateFieldInitSpec(this, _entries, new Map);
6851
+ _classPrivateFieldInitSpec(this, _ttlMs, void 0);
6852
+ _classPrivateFieldInitSpec(this, _maxEntries, void 0);
6853
+ _classPrivateFieldSet2(_maxEntries, this, Math.max(1, Math.floor(maxEntries)));
6854
+ _classPrivateFieldSet2(_ttlMs, this, Math.max(0, Math.floor(ttlMs)));
6855
+ }
6856
+ get(key) {
6857
+ const entry = _classPrivateFieldGet2(_entries, this).get(key);
6858
+ if (!entry) {
6859
+ return;
6860
+ }
6861
+ if (Date.now() >= entry.expiresAt) {
6862
+ _classPrivateFieldGet2(_entries, this).delete(key);
6863
+ return;
6864
+ }
6865
+ _classPrivateFieldGet2(_entries, this).delete(key);
6866
+ _classPrivateFieldGet2(_entries, this).set(key, entry);
6867
+ return entry.value;
6868
+ }
6869
+ set(key, value) {
6870
+ if (_classPrivateFieldGet2(_entries, this).has(key)) {
6871
+ _classPrivateFieldGet2(_entries, this).delete(key);
6872
+ }
6873
+ _classPrivateFieldGet2(_entries, this).set(key, {
6874
+ value: value,
6875
+ expiresAt: Date.now() + _classPrivateFieldGet2(_ttlMs, this)
6876
+ });
6877
+ while (_classPrivateFieldGet2(_entries, this).size > _classPrivateFieldGet2(_maxEntries, this)) {
6878
+ const oldestKey = _classPrivateFieldGet2(_entries, this).keys().next().value;
6879
+ if (oldestKey === void 0) {
6880
+ break;
6881
+ }
6882
+ _classPrivateFieldGet2(_entries, this).delete(oldestKey);
6883
+ }
6884
+ }
6885
+ });
6886
+ var globalCaches = new Map;
6887
+ function getGlobalCache(key) {
6888
+ return globalCaches.get(key);
6889
+ }
6890
+ function getGlobalCacheKey(maxEntries, ttlMs) {
6891
+ return "".concat(maxEntries, ":").concat(ttlMs);
6892
+ }
6893
+ function resolveCacheConfig(options) {
6894
+ const ttlSeconds = typeof (options === null || options === void 0 ? void 0 : options.ttl) === "number" ? options.ttl : 600;
6895
+ const maxEntries = typeof (options === null || options === void 0 ? void 0 : options.maxEntries) === "number" && options.maxEntries > 0 ? options.maxEntries : 100;
6896
+ const ttlMs = ttlSeconds * 1e3;
6897
+ return {
6898
+ ttlMs: ttlMs,
6899
+ maxEntries: maxEntries
6900
+ };
6901
+ }
6902
+ var DiscoveryCacheFactory = class {
6903
+ static createDiscoveryCache(config) {
6904
+ const cacheKey = getGlobalCacheKey(config.maxEntries, config.ttlMs);
6905
+ let cache = getGlobalCache(cacheKey);
6906
+ if (!cache) {
6907
+ cache = new LruCache(config.maxEntries, config.ttlMs);
6908
+ globalCaches.set(cacheKey, cache);
6909
+ }
6910
+ return cache;
6911
+ }
6912
+ static createJwksCache() {
6913
+ return {};
6914
+ }
6915
+ };
6830
6916
  var DEFAULT_SCOPES = "openid profile email offline_access";
6831
6917
  var MAX_ARRAY_VALUES_PER_KEY = 20;
6832
6918
  var PARAM_DENYLIST = Object.freeze(new Set([ "grant_type", "client_id", "client_secret", "client_assertion", "client_assertion_type", "subject_token", "subject_token_type", "requested_token_type", "actor_token", "actor_token_type", "audience", "aud", "resource", "resources", "resource_indicator", "scope", "connection", "login_hint", "organization", "assertion" ]));
@@ -6855,9 +6941,9 @@
6855
6941
  if (parameterValue.length > MAX_ARRAY_VALUES_PER_KEY) {
6856
6942
  throw new TokenExchangeError("Parameter '".concat(parameterKey, "' exceeds maximum array size of ").concat(MAX_ARRAY_VALUES_PER_KEY));
6857
6943
  }
6858
- parameterValue.forEach((arrayItem => {
6944
+ parameterValue.forEach(arrayItem => {
6859
6945
  params.append(parameterKey, arrayItem);
6860
- }));
6946
+ });
6861
6947
  } else {
6862
6948
  params.append(parameterKey, parameterValue);
6863
6949
  }
@@ -6868,39 +6954,58 @@
6868
6954
  var SUBJECT_TYPE_REFRESH_TOKEN = "urn:ietf:params:oauth:token-type:refresh_token";
6869
6955
  var SUBJECT_TYPE_ACCESS_TOKEN = "urn:ietf:params:oauth:token-type:access_token";
6870
6956
  var REQUESTED_TOKEN_TYPE_FEDERATED_CONNECTION_ACCESS_TOKEN = "http://auth0.com/oauth/token-type/federated-connection-access-token";
6871
- var AuthClient = (_configuration = new WeakMap, _serverMetadata = new WeakMap, _options = new WeakMap,
6872
- _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
6957
+ var AuthClient = (_configuration = new WeakMap, _serverMetadata = new WeakMap, _clientAuthPromise = new WeakMap,
6958
+ _options = new WeakMap, _customFetch2 = new WeakMap, _jwks = new WeakMap, _discoveryCache = new WeakMap,
6959
+ _inFlightDiscovery = new WeakMap, _jwksCache = new WeakMap, _Class9_brand = new WeakSet,
6960
+ class AuthClient {
6873
6961
  constructor(_options2) {
6874
- _classPrivateMethodInitSpec(this, _Class8_brand);
6962
+ var _options2$customFetch;
6963
+ _classPrivateMethodInitSpec(this, _Class9_brand);
6875
6964
  _classPrivateFieldInitSpec(this, _configuration, void 0);
6876
6965
  _classPrivateFieldInitSpec(this, _serverMetadata, void 0);
6966
+ _classPrivateFieldInitSpec(this, _clientAuthPromise, void 0);
6877
6967
  _classPrivateFieldInitSpec(this, _options, void 0);
6968
+ _classPrivateFieldInitSpec(this, _customFetch2, void 0);
6878
6969
  _classPrivateFieldInitSpec(this, _jwks, void 0);
6970
+ _classPrivateFieldInitSpec(this, _discoveryCache, void 0);
6971
+ _classPrivateFieldInitSpec(this, _inFlightDiscovery, void 0);
6972
+ _classPrivateFieldInitSpec(this, _jwksCache, void 0);
6879
6973
  _defineProperty(this, "mfa", void 0);
6880
6974
  _classPrivateFieldSet2(_options, this, _options2);
6881
6975
  if (_options2.useMtls && !_options2.customFetch) {
6882
6976
  throw new NotSupportedError("mtls_without_custom_fetch_not_supported", "Using mTLS without a custom fetch implementation is not supported");
6883
6977
  }
6978
+ _classPrivateFieldSet2(_customFetch2, this, createTelemetryFetch((_options2$customFetch = _options2.customFetch) !== null && _options2$customFetch !== void 0 ? _options2$customFetch : function() {
6979
+ return fetch(...arguments);
6980
+ }, getTelemetryConfig(_options2.telemetry)));
6981
+ const cacheConfig = resolveCacheConfig(_options2.discoveryCache);
6982
+ _classPrivateFieldSet2(_discoveryCache, this, DiscoveryCacheFactory.createDiscoveryCache(cacheConfig));
6983
+ _classPrivateFieldSet2(_inFlightDiscovery, this, new Map);
6984
+ _classPrivateFieldSet2(_jwksCache, this, DiscoveryCacheFactory.createJwksCache());
6884
6985
  this.mfa = new MfaClient({
6885
6986
  domain: _classPrivateFieldGet2(_options, this).domain,
6886
6987
  clientId: _classPrivateFieldGet2(_options, this).clientId,
6887
- customFetch: _classPrivateFieldGet2(_options, this).customFetch
6988
+ customFetch: _classPrivateFieldGet2(_customFetch2, this)
6888
6989
  });
6889
6990
  }
6991
+ async getServerMetadata() {
6992
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6993
+ return serverMetadata;
6994
+ }
6890
6995
  async buildAuthorizationUrl(options) {
6891
- const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
6996
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6892
6997
  if (options !== null && options !== void 0 && options.pushedAuthorizationRequests && !serverMetadata.pushed_authorization_request_endpoint) {
6893
6998
  throw new NotSupportedError("par_not_supported_error", "The Auth0 tenant does not have pushed authorization requests enabled. Learn how to enable it here: https://auth0.com/docs/get-started/applications/configure-par");
6894
6999
  }
6895
7000
  try {
6896
- return await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, options);
7001
+ return await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, options);
6897
7002
  } catch (e) {
6898
7003
  throw new BuildAuthorizationUrlError(e);
6899
7004
  }
6900
7005
  }
6901
7006
  async buildLinkUserUrl(options) {
6902
7007
  try {
6903
- const result = await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, {
7008
+ const result = await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, {
6904
7009
  authorizationParams: _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
6905
7010
  requested_connection: options.connection,
6906
7011
  requested_connection_scope: options.connectionScope,
@@ -6918,7 +7023,7 @@
6918
7023
  }
6919
7024
  async buildUnlinkUserUrl(options) {
6920
7025
  try {
6921
- const result = await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, {
7026
+ const result = await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, {
6922
7027
  authorizationParams: _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
6923
7028
  requested_connection: options.connection,
6924
7029
  scope: "openid unlink_account",
@@ -6934,7 +7039,7 @@
6934
7039
  }
6935
7040
  }
6936
7041
  async backchannelAuthentication(options) {
6937
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7042
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6938
7043
  const additionalParams = stripUndefinedProperties(_objectSpread2(_objectSpread2({}, _classPrivateFieldGet2(_options, this).authorizationParams), options === null || options === void 0 ? void 0 : options.authorizationParams));
6939
7044
  const params = new URLSearchParams(_objectSpread2(_objectSpread2({
6940
7045
  scope: DEFAULT_SCOPES
@@ -6962,7 +7067,7 @@
6962
7067
  }
6963
7068
  }
6964
7069
  async initiateBackchannelAuthentication(options) {
6965
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7070
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6966
7071
  const additionalParams = stripUndefinedProperties(_objectSpread2(_objectSpread2({}, _classPrivateFieldGet2(_options, this).authorizationParams), options === null || options === void 0 ? void 0 : options.authorizationParams));
6967
7072
  const params = new URLSearchParams(_objectSpread2(_objectSpread2({
6968
7073
  scope: DEFAULT_SCOPES
@@ -6994,7 +7099,7 @@
6994
7099
  }
6995
7100
  async backchannelAuthenticationGrant(_ref2) {
6996
7101
  let {authReqId: authReqId} = _ref2;
6997
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7102
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
6998
7103
  const params = new URLSearchParams({
6999
7104
  auth_req_id: authReqId
7000
7105
  });
@@ -7029,10 +7134,10 @@
7029
7134
  }
7030
7135
  }
7031
7136
  async exchangeToken(options) {
7032
- return "connection" in options ? _assertClassBrand(_Class8_brand, this, _exchangeTokenVaultToken).call(this, options) : _assertClassBrand(_Class8_brand, this, _exchangeProfileToken).call(this, options);
7137
+ return "connection" in options ? _assertClassBrand(_Class9_brand, this, _exchangeTokenVaultToken).call(this, options) : _assertClassBrand(_Class9_brand, this, _exchangeProfileToken).call(this, options);
7033
7138
  }
7034
7139
  async getTokenByCode(url, options) {
7035
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7140
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7036
7141
  try {
7037
7142
  const tokenEndpointResponse = await authorizationCodeGrant(configuration, url, {
7038
7143
  pkceCodeVerifier: options.codeVerifier
@@ -7043,16 +7148,23 @@
7043
7148
  }
7044
7149
  }
7045
7150
  async getTokenByRefreshToken(options) {
7046
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7151
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7152
+ const additionalParameters = new URLSearchParams;
7153
+ if (options.audience) {
7154
+ additionalParameters.append("audience", options.audience);
7155
+ }
7156
+ if (options.scope) {
7157
+ additionalParameters.append("scope", options.scope);
7158
+ }
7047
7159
  try {
7048
- const tokenEndpointResponse = await refreshTokenGrant(configuration, options.refreshToken);
7160
+ const tokenEndpointResponse = await refreshTokenGrant(configuration, options.refreshToken, additionalParameters);
7049
7161
  return TokenResponse.fromTokenEndpointResponse(tokenEndpointResponse);
7050
7162
  } catch (e) {
7051
7163
  throw new TokenByRefreshTokenError("The access token has expired and there was an error while trying to refresh it.", e);
7052
7164
  }
7053
7165
  }
7054
7166
  async getTokenByClientCredentials(options) {
7055
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7167
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7056
7168
  try {
7057
7169
  const params = new URLSearchParams({
7058
7170
  audience: options.audience
@@ -7067,7 +7179,7 @@
7067
7179
  }
7068
7180
  }
7069
7181
  async buildLogoutUrl(options) {
7070
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7182
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7071
7183
  if (!serverMetadata.end_session_endpoint) {
7072
7184
  const url = new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain, "/v2/logout"));
7073
7185
  url.searchParams.set("returnTo", options.returnTo);
@@ -7079,9 +7191,13 @@
7079
7191
  });
7080
7192
  }
7081
7193
  async verifyLogoutToken(options) {
7082
- const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7083
- _classPrivateFieldGet2(_jwks, this) || _classPrivateFieldSet2(_jwks, this, createRemoteJWKSet(new URL(serverMetadata.jwks_uri), {
7084
- [customFetch]: _classPrivateFieldGet2(_options, this).customFetch
7194
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7195
+ const cacheConfig = resolveCacheConfig(_classPrivateFieldGet2(_options, this).discoveryCache);
7196
+ const jwksUri = serverMetadata.jwks_uri;
7197
+ _classPrivateFieldGet2(_jwks, this) || _classPrivateFieldSet2(_jwks, this, createRemoteJWKSet(new URL(jwksUri), {
7198
+ cacheMaxAge: cacheConfig.ttlMs,
7199
+ [customFetch]: _classPrivateFieldGet2(_customFetch2, this),
7200
+ [jwksCache]: _classPrivateFieldGet2(_jwksCache, this)
7085
7201
  }));
7086
7202
  const {payload: payload} = await jwtVerify(options.logoutToken, _classPrivateFieldGet2(_jwks, this), {
7087
7203
  issuer: serverMetadata.issuer,
@@ -7119,6 +7235,16 @@
7119
7235
  };
7120
7236
  }
7121
7237
  });
7238
+ function _getDiscoveryCacheKey() {
7239
+ const domain = _classPrivateFieldGet2(_options, this).domain.toLowerCase();
7240
+ return "".concat(domain, "|mtls:").concat(_classPrivateFieldGet2(_options, this).useMtls ? "1" : "0");
7241
+ }
7242
+ async function _createConfiguration(serverMetadata) {
7243
+ const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
7244
+ const configuration = new Configuration(serverMetadata, _classPrivateFieldGet2(_options, this).clientId, _classPrivateFieldGet2(_options, this).clientSecret, clientAuth);
7245
+ configuration[customFetch$1] = _classPrivateFieldGet2(_customFetch2, this);
7246
+ return configuration;
7247
+ }
7122
7248
  async function _discover() {
7123
7249
  if (_classPrivateFieldGet2(_configuration, this) && _classPrivateFieldGet2(_serverMetadata, this)) {
7124
7250
  return {
@@ -7126,14 +7252,58 @@
7126
7252
  serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7127
7253
  };
7128
7254
  }
7129
- const clientAuth = await _assertClassBrand(_Class8_brand, this, _getClientAuth).call(this);
7130
- _classPrivateFieldSet2(_configuration, this, await discovery(new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain)), _classPrivateFieldGet2(_options, this).clientId, {
7131
- use_mtls_endpoint_aliases: _classPrivateFieldGet2(_options, this).useMtls
7132
- }, clientAuth, {
7133
- [customFetch$1]: _classPrivateFieldGet2(_options, this).customFetch
7134
- }));
7135
- _classPrivateFieldSet2(_serverMetadata, this, _classPrivateFieldGet2(_configuration, this).serverMetadata());
7136
- _classPrivateFieldGet2(_configuration, this)[customFetch$1] = _classPrivateFieldGet2(_options, this).customFetch || fetch;
7255
+ const cacheKey = _assertClassBrand(_Class9_brand, this, _getDiscoveryCacheKey).call(this);
7256
+ const cached = _classPrivateFieldGet2(_discoveryCache, this).get(cacheKey);
7257
+ if (cached) {
7258
+ _classPrivateFieldSet2(_serverMetadata, this, cached.serverMetadata);
7259
+ _classPrivateFieldSet2(_configuration, this, await _assertClassBrand(_Class9_brand, this, _createConfiguration).call(this, cached.serverMetadata));
7260
+ return {
7261
+ configuration: _classPrivateFieldGet2(_configuration, this),
7262
+ serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7263
+ };
7264
+ }
7265
+ const inFlight = _classPrivateFieldGet2(_inFlightDiscovery, this).get(cacheKey);
7266
+ if (inFlight) {
7267
+ const entry = await inFlight;
7268
+ _classPrivateFieldSet2(_serverMetadata, this, entry.serverMetadata);
7269
+ _classPrivateFieldSet2(_configuration, this, await _assertClassBrand(_Class9_brand, this, _createConfiguration).call(this, entry.serverMetadata));
7270
+ return {
7271
+ configuration: _classPrivateFieldGet2(_configuration, this),
7272
+ serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7273
+ };
7274
+ }
7275
+ const discoveryPromise = (async () => {
7276
+ const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
7277
+ const configuration = await discovery(new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain)), _classPrivateFieldGet2(_options, this).clientId, {
7278
+ use_mtls_endpoint_aliases: _classPrivateFieldGet2(_options, this).useMtls
7279
+ }, clientAuth, {
7280
+ [customFetch$1]: _classPrivateFieldGet2(_customFetch2, this)
7281
+ });
7282
+ const serverMetadata = configuration.serverMetadata();
7283
+ _classPrivateFieldGet2(_discoveryCache, this).set(cacheKey, {
7284
+ serverMetadata: serverMetadata
7285
+ });
7286
+ return {
7287
+ configuration: configuration,
7288
+ serverMetadata: serverMetadata
7289
+ };
7290
+ })();
7291
+ const inFlightEntry = discoveryPromise.then(_ref3 => {
7292
+ let {serverMetadata: serverMetadata} = _ref3;
7293
+ return {
7294
+ serverMetadata: serverMetadata
7295
+ };
7296
+ });
7297
+ void inFlightEntry.catch(() => void 0);
7298
+ _classPrivateFieldGet2(_inFlightDiscovery, this).set(cacheKey, inFlightEntry);
7299
+ try {
7300
+ const {configuration: configuration, serverMetadata: serverMetadata} = await discoveryPromise;
7301
+ _classPrivateFieldSet2(_configuration, this, configuration);
7302
+ _classPrivateFieldSet2(_serverMetadata, this, serverMetadata);
7303
+ _classPrivateFieldGet2(_configuration, this)[customFetch$1] = _classPrivateFieldGet2(_customFetch2, this);
7304
+ } finally {
7305
+ _classPrivateFieldGet2(_inFlightDiscovery, this).delete(cacheKey);
7306
+ }
7137
7307
  return {
7138
7308
  configuration: _classPrivateFieldGet2(_configuration, this),
7139
7309
  serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
@@ -7141,7 +7311,7 @@
7141
7311
  }
7142
7312
  async function _exchangeTokenVaultToken(options) {
7143
7313
  var _options$subjectToken, _options$requestedTok;
7144
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7314
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7145
7315
  if ("audience" in options || "resource" in options) {
7146
7316
  throw new TokenExchangeError("audience and resource parameters are not supported for Token Vault exchanges");
7147
7317
  }
@@ -7167,7 +7337,7 @@
7167
7337
  }
7168
7338
  }
7169
7339
  async function _exchangeProfileToken(options) {
7170
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7340
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7171
7341
  validateSubjectToken(options.subjectToken);
7172
7342
  const tokenRequestParams = new URLSearchParams({
7173
7343
  subject_token_type: options.subjectTokenType,
@@ -7194,20 +7364,28 @@
7194
7364
  }
7195
7365
  }
7196
7366
  async function _getClientAuth() {
7197
- if (!_classPrivateFieldGet2(_options, this).clientSecret && !_classPrivateFieldGet2(_options, this).clientAssertionSigningKey && !_classPrivateFieldGet2(_options, this).useMtls) {
7198
- throw new MissingClientAuthError;
7199
- }
7200
- if (_classPrivateFieldGet2(_options, this).useMtls) {
7201
- return TlsClientAuth();
7202
- }
7203
- let clientPrivateKey = _classPrivateFieldGet2(_options, this).clientAssertionSigningKey;
7204
- if (clientPrivateKey && !(clientPrivateKey instanceof CryptoKey)) {
7205
- clientPrivateKey = await importPKCS8(clientPrivateKey, _classPrivateFieldGet2(_options, this).clientAssertionSigningAlg || "RS256");
7367
+ if (!_classPrivateFieldGet2(_clientAuthPromise, this)) {
7368
+ _classPrivateFieldSet2(_clientAuthPromise, this, (async () => {
7369
+ if (!_classPrivateFieldGet2(_options, this).clientSecret && !_classPrivateFieldGet2(_options, this).clientAssertionSigningKey && !_classPrivateFieldGet2(_options, this).useMtls) {
7370
+ throw new MissingClientAuthError;
7371
+ }
7372
+ if (_classPrivateFieldGet2(_options, this).useMtls) {
7373
+ return TlsClientAuth();
7374
+ }
7375
+ let clientPrivateKey = _classPrivateFieldGet2(_options, this).clientAssertionSigningKey;
7376
+ if (clientPrivateKey && !(clientPrivateKey instanceof CryptoKey)) {
7377
+ clientPrivateKey = await importPKCS8(clientPrivateKey, _classPrivateFieldGet2(_options, this).clientAssertionSigningAlg || "RS256");
7378
+ }
7379
+ return clientPrivateKey ? PrivateKeyJwt(clientPrivateKey) : ClientSecretPost(_classPrivateFieldGet2(_options, this).clientSecret);
7380
+ })().catch(error => {
7381
+ _classPrivateFieldSet2(_clientAuthPromise, this, void 0);
7382
+ throw error;
7383
+ }));
7206
7384
  }
7207
- return clientPrivateKey ? PrivateKeyJwt(clientPrivateKey) : ClientSecretPost(_classPrivateFieldGet2(_options, this).clientSecret);
7385
+ return _classPrivateFieldGet2(_clientAuthPromise, this);
7208
7386
  }
7209
7387
  async function _buildAuthorizationUrl(options) {
7210
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7388
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7211
7389
  const codeChallengeMethod = "S256";
7212
7390
  const codeVerifier = randomPKCECodeVerifier();
7213
7391
  const codeChallenge = await calculatePKCECodeChallenge(codeVerifier);
@@ -7323,15 +7501,15 @@
7323
7501
  if (!((_a = context === null || context === void 0 ? void 0 : context.mfaRequirements) === null || _a === void 0 ? void 0 : _a.challenge) || context.mfaRequirements.challenge.length === 0) {
7324
7502
  throw new MfaListAuthenticatorsError("invalid_request", "challengeType is required and must contain at least one challenge type, please check mfa_required error payload");
7325
7503
  }
7326
- const challengeTypes = context.mfaRequirements.challenge.map((c => c.type));
7504
+ const challengeTypes = context.mfaRequirements.challenge.map(c => c.type);
7327
7505
  try {
7328
7506
  const allAuthenticators = await this.authJsMfaClient.listAuthenticators({
7329
7507
  mfaToken: mfaToken
7330
7508
  });
7331
- return allAuthenticators.filter((auth => {
7509
+ return allAuthenticators.filter(auth => {
7332
7510
  if (!auth.type) return false;
7333
7511
  return challengeTypes.includes(auth.type);
7334
- }));
7512
+ });
7335
7513
  } catch (error) {
7336
7514
  if (error instanceof MfaListAuthenticatorsError$1) {
7337
7515
  throw new MfaListAuthenticatorsError((_b = error.cause) === null || _b === void 0 ? void 0 : _b.error, error.message);
@@ -7696,7 +7874,7 @@
7696
7874
  scope: scopesToRequest(this.scope, (_a = options.authorizationParams) === null || _a === void 0 ? void 0 : _a.scope, ((_b = options.authorizationParams) === null || _b === void 0 ? void 0 : _b.audience) || this.options.authorizationParams.audience)
7697
7875
  })
7698
7876
  });
7699
- const result = await singlePromise((() => this._getTokenSilently(localOptions)), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
7877
+ const result = await singlePromise(() => this._getTokenSilently(localOptions), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
7700
7878
  return options.detailedResponse ? result : result === null || result === void 0 ? void 0 : result.access_token;
7701
7879
  }
7702
7880
  async _getTokenSilently(options) {
@@ -7717,7 +7895,7 @@
7717
7895
  }
7718
7896
  const lockKey = buildGetTokenSilentlyLockKey(this.options.clientId, getTokenOptions.authorizationParams.audience || "default");
7719
7897
  try {
7720
- return await this.lockManager.runWithLock(lockKey, 5e3, (async () => {
7898
+ return await this.lockManager.runWithLock(lockKey, 5e3, async () => {
7721
7899
  if (cacheMode !== "off") {
7722
7900
  const entry = await this._getEntryFromCache({
7723
7901
  scope: getTokenOptions.authorizationParams.scope,
@@ -7739,7 +7917,7 @@
7739
7917
  } : null), {
7740
7918
  expires_in: expires_in
7741
7919
  });
7742
- }));
7920
+ });
7743
7921
  } catch (error) {
7744
7922
  if (this._isInteractiveError(error) && this.options.interactiveErrorHandler === "popup") {
7745
7923
  return await this._handleInteractiveErrorWithPopup(getTokenOptions);
@@ -7833,7 +8011,7 @@
7833
8011
  async _getTokenFromIFrame(options) {
7834
8012
  const iframeLockKey = buildIframeLockKey(this.options.clientId);
7835
8013
  try {
7836
- return await this.lockManager.runWithLock(iframeLockKey, 5e3, (async () => {
8014
+ return await this.lockManager.runWithLock(iframeLockKey, 5e3, async () => {
7837
8015
  const params = Object.assign(Object.assign({}, options.authorizationParams), {
7838
8016
  prompt: "none"
7839
8017
  });
@@ -7873,7 +8051,7 @@
7873
8051
  oauthTokenScope: tokenResult.scope,
7874
8052
  audience: audience
7875
8053
  });
7876
- }));
8054
+ });
7877
8055
  } catch (e) {
7878
8056
  if (e.error === "login_required") {
7879
8057
  const shouldSkipLogoutForMfaStepUp = e instanceof GenericError && this._isIframeMfaError(e) && this.options.interactiveErrorHandler === "popup";
@@ -8160,5 +8338,5 @@
8160
8338
  Object.defineProperty(exports, "__esModule", {
8161
8339
  value: true
8162
8340
  });
8163
- }));
8341
+ });
8164
8342
  //# sourceMappingURL=auth0-spa-js.development.js.map