@auth0/auth0-spa-js 2.17.0 → 2.17.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -18,7 +18,7 @@ typeof SuppressedError === "function" ? SuppressedError : function(error, suppre
18
18
  return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
19
19
  };
20
20
 
21
- var version = "2.17.0";
21
+ var version = "2.17.1";
22
22
 
23
23
  const DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS = 60;
24
24
 
@@ -175,7 +175,7 @@ const parseAuthenticationResult = queryString => {
175
175
 
176
176
  const runIframe = function runIframe(authorizeUrl, eventOrigin) {
177
177
  let timeoutInSeconds = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS;
178
- return new Promise(((res, rej) => {
178
+ return new Promise((res, rej) => {
179
179
  const iframe = window.document.createElement("iframe");
180
180
  iframe.setAttribute("width", "0");
181
181
  iframe.setAttribute("height", "0");
@@ -187,10 +187,10 @@ const runIframe = function runIframe(authorizeUrl, eventOrigin) {
187
187
  }
188
188
  };
189
189
  let _iframeEventHandler;
190
- const timeoutSetTimeoutId = setTimeout((() => {
190
+ const timeoutSetTimeoutId = setTimeout(() => {
191
191
  rej(new TimeoutError);
192
192
  removeIframe();
193
- }), timeoutInSeconds * 1e3);
193
+ }, timeoutInSeconds * 1e3);
194
194
  _iframeEventHandler = function iframeEventHandler(e) {
195
195
  if (e.origin != eventOrigin) return;
196
196
  if (!e.data || e.data.type !== "authorization_response") return;
@@ -206,7 +206,7 @@ const runIframe = function runIframe(authorizeUrl, eventOrigin) {
206
206
  window.addEventListener("message", _iframeEventHandler, false);
207
207
  window.document.body.appendChild(iframe);
208
208
  iframe.setAttribute("src", authorizeUrl);
209
- }));
209
+ });
210
210
  };
211
211
 
212
212
  const openPopup = url => {
@@ -217,21 +217,21 @@ const openPopup = url => {
217
217
  return window.open(url, "auth0:authorize:popup", "left=".concat(left, ",top=").concat(top, ",width=").concat(width, ",height=").concat(height, ",resizable,scrollbars=yes,status=1"));
218
218
  };
219
219
 
220
- const runPopup = config => new Promise(((resolve, reject) => {
220
+ const runPopup = config => new Promise((resolve, reject) => {
221
221
  let _popupEventListener;
222
- const popupTimer = setInterval((() => {
222
+ const popupTimer = setInterval(() => {
223
223
  if (config.popup && config.popup.closed) {
224
224
  clearInterval(popupTimer);
225
225
  clearTimeout(timeoutId);
226
226
  window.removeEventListener("message", _popupEventListener, false);
227
227
  reject(new PopupCancelledError(config.popup));
228
228
  }
229
- }), 1e3);
230
- const timeoutId = setTimeout((() => {
229
+ }, 1e3);
230
+ const timeoutId = setTimeout(() => {
231
231
  clearInterval(popupTimer);
232
232
  reject(new PopupTimeoutError(config.popup));
233
233
  window.removeEventListener("message", _popupEventListener, false);
234
- }), (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
234
+ }, (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
235
235
  _popupEventListener = function popupEventListener(e) {
236
236
  if (!e.data || e.data.type !== "authorization_response") {
237
237
  return;
@@ -248,7 +248,7 @@ const runPopup = config => new Promise(((resolve, reject) => {
248
248
  resolve(e.data.response);
249
249
  };
250
250
  window.addEventListener("message", _popupEventListener);
251
- }));
251
+ });
252
252
 
253
253
  const getCrypto = () => window.crypto;
254
254
 
@@ -256,15 +256,15 @@ const createRandomString = () => {
256
256
  const charset = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-_~.";
257
257
  let random = "";
258
258
  const randomValues = Array.from(getCrypto().getRandomValues(new Uint8Array(43)));
259
- randomValues.forEach((v => random += charset[v % charset.length]));
259
+ randomValues.forEach(v => random += charset[v % charset.length]);
260
260
  return random;
261
261
  };
262
262
 
263
263
  const encode$2 = value => btoa(value);
264
264
 
265
- const stripUndefined = params => Object.keys(params).filter((k => typeof params[k] !== "undefined")).reduce(((acc, key) => Object.assign(Object.assign({}, acc), {
265
+ const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
266
266
  [key]: params[key]
267
- })), {});
267
+ }), {});
268
268
 
269
269
  const ALLOWED_AUTH0CLIENT_PROPERTIES = [ {
270
270
  key: "name",
@@ -279,16 +279,16 @@ const ALLOWED_AUTH0CLIENT_PROPERTIES = [ {
279
279
 
280
280
  const stripAuth0Client = function stripAuth0Client(auth0Client) {
281
281
  let excludeEnv = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : false;
282
- return Object.keys(auth0Client).reduce(((acc, key) => {
282
+ return Object.keys(auth0Client).reduce((acc, key) => {
283
283
  if (excludeEnv && key === "env") {
284
284
  return acc;
285
285
  }
286
- const allowedProperty = ALLOWED_AUTH0CLIENT_PROPERTIES.find((p => p.key === key));
286
+ const allowedProperty = ALLOWED_AUTH0CLIENT_PROPERTIES.find(p => p.key === key);
287
287
  if (allowedProperty && allowedProperty.type.includes(typeof auth0Client[key])) {
288
288
  acc[key] = auth0Client[key];
289
289
  }
290
290
  return acc;
291
- }), {});
291
+ }, {});
292
292
  };
293
293
 
294
294
  const createQueryParams = _a => {
@@ -311,10 +311,10 @@ const urlEncodeB64 = input => {
311
311
  "/": "_",
312
312
  "=": ""
313
313
  };
314
- return input.replace(/[+/=]/g, (m => b64Chars[m]));
314
+ return input.replace(/[+/=]/g, m => b64Chars[m]);
315
315
  };
316
316
 
317
- const decodeB64 = input => decodeURIComponent(atob(input).split("").map((c => "%" + ("00" + c.charCodeAt(0).toString(16)).slice(-2))).join(""));
317
+ const decodeB64 = input => decodeURIComponent(atob(input).split("").map(c => "%" + ("00" + c.charCodeAt(0).toString(16)).slice(-2)).join(""));
318
318
 
319
319
  const urlDecodeB64 = input => decodeB64(input.replace(/_/g, "/").replace(/-/g, "+"));
320
320
 
@@ -353,11 +353,11 @@ const parseNumber = value => {
353
353
  return parseInt(value, 10) || undefined;
354
354
  };
355
355
 
356
- const fromEntries = iterable => [ ...iterable ].reduce(((obj, _ref) => {
356
+ const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
357
357
  let [key, val] = _ref;
358
358
  obj[key] = val;
359
359
  return obj;
360
- }), {});
360
+ }, {});
361
361
 
362
362
  var commonjsGlobal = typeof globalThis !== "undefined" ? globalThis : typeof window !== "undefined" ? window : typeof global !== "undefined" ? global : typeof self !== "undefined" ? self : {};
363
363
 
@@ -392,14 +392,14 @@ var ProcessLocking = function() {
392
392
  return _this.locked.has(key);
393
393
  };
394
394
  this.lock = function(key) {
395
- return new Promise((function(resolve, reject) {
395
+ return new Promise(function(resolve, reject) {
396
396
  if (_this.isLocked(key)) {
397
397
  _this.addToLocked(key, resolve);
398
398
  } else {
399
399
  _this.addToLocked(key);
400
400
  resolve();
401
401
  }
402
- }));
402
+ });
403
403
  };
404
404
  this.unlock = function(key) {
405
405
  var callbacks = _this.locked.get(key);
@@ -430,7 +430,7 @@ function getLock() {
430
430
  processLock.default = getLock;
431
431
 
432
432
  var __awaiter = commonjsGlobal && commonjsGlobal.__awaiter || function(thisArg, _arguments, P, generator) {
433
- return new (P || (P = Promise))((function(resolve, reject) {
433
+ return new (P || (P = Promise))(function(resolve, reject) {
434
434
  function fulfilled(value) {
435
435
  try {
436
436
  step(generator.next(value));
@@ -446,12 +446,12 @@ var __awaiter = commonjsGlobal && commonjsGlobal.__awaiter || function(thisArg,
446
446
  }
447
447
  }
448
448
  function step(result) {
449
- result.done ? resolve(result.value) : new P((function(resolve) {
449
+ result.done ? resolve(result.value) : new P(function(resolve) {
450
450
  resolve(result.value);
451
- })).then(fulfilled, rejected);
451
+ }).then(fulfilled, rejected);
452
452
  }
453
453
  step((generator = generator.apply(thisArg, _arguments || [])).next());
454
- }));
454
+ });
455
455
  };
456
456
 
457
457
  var __generator = commonjsGlobal && commonjsGlobal.__generator || function(thisArg, body) {
@@ -556,39 +556,39 @@ var LOCK_STORAGE_KEY = "browser-tabs-lock-key";
556
556
 
557
557
  var DEFAULT_STORAGE_HANDLER = {
558
558
  key: function(index) {
559
- return __awaiter(_this, void 0, void 0, (function() {
560
- return __generator(this, (function(_a) {
559
+ return __awaiter(_this, void 0, void 0, function() {
560
+ return __generator(this, function(_a) {
561
561
  throw new Error("Unsupported");
562
- }));
563
- }));
562
+ });
563
+ });
564
564
  },
565
565
  getItem: function(key) {
566
- return __awaiter(_this, void 0, void 0, (function() {
567
- return __generator(this, (function(_a) {
566
+ return __awaiter(_this, void 0, void 0, function() {
567
+ return __generator(this, function(_a) {
568
568
  throw new Error("Unsupported");
569
- }));
570
- }));
569
+ });
570
+ });
571
571
  },
572
572
  clear: function() {
573
- return __awaiter(_this, void 0, void 0, (function() {
574
- return __generator(this, (function(_a) {
573
+ return __awaiter(_this, void 0, void 0, function() {
574
+ return __generator(this, function(_a) {
575
575
  return [ 2, window.localStorage.clear() ];
576
- }));
577
- }));
576
+ });
577
+ });
578
578
  },
579
579
  removeItem: function(key) {
580
- return __awaiter(_this, void 0, void 0, (function() {
581
- return __generator(this, (function(_a) {
580
+ return __awaiter(_this, void 0, void 0, function() {
581
+ return __generator(this, function(_a) {
582
582
  throw new Error("Unsupported");
583
- }));
584
- }));
583
+ });
584
+ });
585
585
  },
586
586
  setItem: function(key, value) {
587
- return __awaiter(_this, void 0, void 0, (function() {
588
- return __generator(this, (function(_a) {
587
+ return __awaiter(_this, void 0, void 0, function() {
588
+ return __generator(this, function(_a) {
589
589
  throw new Error("Unsupported");
590
- }));
591
- }));
590
+ });
591
+ });
592
592
  },
593
593
  keySync: function(index) {
594
594
  return window.localStorage.key(index);
@@ -608,9 +608,9 @@ var DEFAULT_STORAGE_HANDLER = {
608
608
  };
609
609
 
610
610
  function delay(milliseconds) {
611
- return new Promise((function(resolve) {
611
+ return new Promise(function(resolve) {
612
612
  return setTimeout(resolve, milliseconds);
613
- }));
613
+ });
614
614
  }
615
615
 
616
616
  function generateRandomString(length) {
@@ -646,9 +646,9 @@ var SuperTokensLock = function() {
646
646
  if (timeout === void 0) {
647
647
  timeout = 5e3;
648
648
  }
649
- return __awaiter(this, void 0, void 0, (function() {
649
+ return __awaiter(this, void 0, void 0, function() {
650
650
  var iat, MAX_TIME, STORAGE_KEY, STORAGE, lockObj, TIMEOUT_KEY, lockObjPostDelay, parsedLockObjPostDelay;
651
- return __generator(this, (function(_a) {
651
+ return __generator(this, function(_a) {
652
652
  switch (_a.label) {
653
653
  case 0:
654
654
  iat = Date.now() + generateRandomString(4);
@@ -707,17 +707,17 @@ var SuperTokensLock = function() {
707
707
  case 8:
708
708
  return [ 2, false ];
709
709
  }
710
- }));
711
- }));
710
+ });
711
+ });
712
712
  };
713
713
  SuperTokensLock.prototype.refreshLockWhileAcquired = function(storageKey, iat) {
714
- return __awaiter(this, void 0, void 0, (function() {
714
+ return __awaiter(this, void 0, void 0, function() {
715
715
  var _this = this;
716
- return __generator(this, (function(_a) {
717
- setTimeout((function() {
718
- return __awaiter(_this, void 0, void 0, (function() {
716
+ return __generator(this, function(_a) {
717
+ setTimeout(function() {
718
+ return __awaiter(_this, void 0, void 0, function() {
719
719
  var STORAGE, lockObj, parsedLockObj;
720
- return __generator(this, (function(_a) {
720
+ return __generator(this, function(_a) {
721
721
  switch (_a.label) {
722
722
  case 0:
723
723
  return [ 4, processLock_1.default().lock(iat) ];
@@ -742,19 +742,19 @@ var SuperTokensLock = function() {
742
742
  this.refreshLockWhileAcquired(storageKey, iat);
743
743
  return [ 2 ];
744
744
  }
745
- }));
746
- }));
747
- }), 1e3);
745
+ });
746
+ });
747
+ }, 1e3);
748
748
  return [ 2 ];
749
- }));
750
- }));
749
+ });
750
+ });
751
751
  };
752
752
  SuperTokensLock.prototype.waitForSomethingToChange = function(MAX_TIME) {
753
- return __awaiter(this, void 0, void 0, (function() {
754
- return __generator(this, (function(_a) {
753
+ return __awaiter(this, void 0, void 0, function() {
754
+ return __generator(this, function(_a) {
755
755
  switch (_a.label) {
756
756
  case 0:
757
- return [ 4, new Promise((function(resolve) {
757
+ return [ 4, new Promise(function(resolve) {
758
758
  var resolvedCalled = false;
759
759
  var startedAt = Date.now();
760
760
  var MIN_TIME_TO_WAIT = 50;
@@ -779,14 +779,14 @@ var SuperTokensLock = function() {
779
779
  window.addEventListener("storage", stopWaiting);
780
780
  SuperTokensLock.addToWaiting(stopWaiting);
781
781
  var timeOutId = setTimeout(stopWaiting, Math.max(0, MAX_TIME - Date.now()));
782
- })) ];
782
+ }) ];
783
783
 
784
784
  case 1:
785
785
  _a.sent();
786
786
  return [ 2 ];
787
787
  }
788
- }));
789
- }));
788
+ });
789
+ });
790
790
  };
791
791
  SuperTokensLock.addToWaiting = function(func) {
792
792
  this.removeFromWaiting(func);
@@ -799,22 +799,22 @@ var SuperTokensLock = function() {
799
799
  if (SuperTokensLock.waiters === undefined) {
800
800
  return;
801
801
  }
802
- SuperTokensLock.waiters = SuperTokensLock.waiters.filter((function(i) {
802
+ SuperTokensLock.waiters = SuperTokensLock.waiters.filter(function(i) {
803
803
  return i !== func;
804
- }));
804
+ });
805
805
  };
806
806
  SuperTokensLock.notifyWaiters = function() {
807
807
  if (SuperTokensLock.waiters === undefined) {
808
808
  return;
809
809
  }
810
810
  var waiters = SuperTokensLock.waiters.slice();
811
- waiters.forEach((function(i) {
811
+ waiters.forEach(function(i) {
812
812
  return i();
813
- }));
813
+ });
814
814
  };
815
815
  SuperTokensLock.prototype.releaseLock = function(lockKey) {
816
- return __awaiter(this, void 0, void 0, (function() {
817
- return __generator(this, (function(_a) {
816
+ return __awaiter(this, void 0, void 0, function() {
817
+ return __generator(this, function(_a) {
818
818
  switch (_a.label) {
819
819
  case 0:
820
820
  return [ 4, this.releaseLock__private__(lockKey) ];
@@ -822,13 +822,13 @@ var SuperTokensLock = function() {
822
822
  case 1:
823
823
  return [ 2, _a.sent() ];
824
824
  }
825
- }));
826
- }));
825
+ });
826
+ });
827
827
  };
828
828
  SuperTokensLock.prototype.releaseLock__private__ = function(lockKey) {
829
- return __awaiter(this, void 0, void 0, (function() {
829
+ return __awaiter(this, void 0, void 0, function() {
830
830
  var STORAGE, STORAGE_KEY, lockObj, parsedlockObj;
831
- return __generator(this, (function(_a) {
831
+ return __generator(this, function(_a) {
832
832
  switch (_a.label) {
833
833
  case 0:
834
834
  STORAGE = this.storageHandler === undefined ? DEFAULT_STORAGE_HANDLER : this.storageHandler;
@@ -852,8 +852,8 @@ var SuperTokensLock = function() {
852
852
  case 2:
853
853
  return [ 2 ];
854
854
  }
855
- }));
856
- }));
855
+ });
856
+ });
857
857
  };
858
858
  SuperTokensLock.lockCorrector = function(storageHandler) {
859
859
  var MIN_ALLOWED_TIME = Date.now() - 5e3;
@@ -895,16 +895,16 @@ var _default = browserTabsLock.default = SuperTokensLock;
895
895
  class WebLocksApiManager {
896
896
  async runWithLock(key, timeout, callback) {
897
897
  const controller = new AbortController;
898
- const timeoutId = setTimeout((() => controller.abort()), timeout);
898
+ const timeoutId = setTimeout(() => controller.abort(), timeout);
899
899
  try {
900
900
  return await navigator.locks.request(key, {
901
901
  mode: "exclusive",
902
902
  signal: controller.signal
903
- }, (async lock => {
903
+ }, async lock => {
904
904
  clearTimeout(timeoutId);
905
905
  if (!lock) throw new Error("Lock not available");
906
906
  return await callback();
907
- }));
907
+ });
908
908
  } catch (error) {
909
909
  clearTimeout(timeoutId);
910
910
  if ((error === null || error === void 0 ? void 0 : error.name) === "AbortError") throw new TimeoutError;
@@ -918,7 +918,7 @@ class LegacyLockManager {
918
918
  this.activeLocks = new Set;
919
919
  this.lock = new _default;
920
920
  this.pagehideHandler = () => {
921
- this.activeLocks.forEach((key => this.lock.releaseLock(key)));
921
+ this.activeLocks.forEach(key => this.lock.releaseLock(key));
922
922
  this.activeLocks.clear();
923
923
  };
924
924
  }
@@ -1306,7 +1306,7 @@ function isGrantTypeSupported(grantType) {
1306
1306
  return SUPPORTED_GRANT_TYPES.includes(grantType);
1307
1307
  }
1308
1308
 
1309
- const sendMessage = (message, to) => new Promise((function(resolve, reject) {
1309
+ const sendMessage = (message, to) => new Promise(function(resolve, reject) {
1310
1310
  const messageChannel = new MessageChannel;
1311
1311
  messageChannel.port1.onmessage = function(event) {
1312
1312
  if (event.data.error) {
@@ -1317,7 +1317,7 @@ const sendMessage = (message, to) => new Promise((function(resolve, reject) {
1317
1317
  messageChannel.port1.close();
1318
1318
  };
1319
1319
  to.postMessage(message, [ messageChannel.port2 ]);
1320
- }));
1320
+ });
1321
1321
 
1322
1322
  const createAbortController = () => new AbortController;
1323
1323
 
@@ -1334,14 +1334,14 @@ const fetchWithoutWorker = async (fetchUrl, fetchOptions, timeout) => {
1334
1334
  const controller = createAbortController();
1335
1335
  fetchOptions.signal = controller.signal;
1336
1336
  let timeoutId;
1337
- return Promise.race([ dofetch(fetchUrl, fetchOptions), new Promise(((_, reject) => {
1338
- timeoutId = setTimeout((() => {
1337
+ return Promise.race([ dofetch(fetchUrl, fetchOptions), new Promise((_, reject) => {
1338
+ timeoutId = setTimeout(() => {
1339
1339
  controller.abort();
1340
1340
  reject(new Error("Timeout when executing 'fetch'"));
1341
- }), timeout);
1342
- })) ]).finally((() => {
1341
+ }, timeout);
1342
+ }) ]).finally(() => {
1343
1343
  clearTimeout(timeoutId);
1344
- }));
1344
+ });
1345
1345
  };
1346
1346
 
1347
1347
  const fetchWithWorker = async (fetchUrl, audience, scope, fetchOptions, timeout, worker, useFormData, useMrrt) => sendMessage({
@@ -1463,10 +1463,10 @@ const injectDefaultScopes = function injectDefaultScopes(authScopes, openIdScope
1463
1463
  let requestedScopes = {
1464
1464
  [DEFAULT_AUDIENCE]: getUniqueScopes(openIdScope, ...extraScopes)
1465
1465
  };
1466
- Object.keys(authScopes).forEach((key => {
1466
+ Object.keys(authScopes).forEach(key => {
1467
1467
  const audienceScopes = authScopes[key];
1468
1468
  requestedScopes[key] = getUniqueScopes(openIdScope, audienceScopes, ...extraScopes);
1469
- }));
1469
+ });
1470
1470
  return requestedScopes;
1471
1471
  };
1472
1472
 
@@ -1534,7 +1534,7 @@ class LocalStorageCache {
1534
1534
  localStorage.removeItem(key);
1535
1535
  }
1536
1536
  allKeys() {
1537
- return Object.keys(window.localStorage).filter((key => key.startsWith(CACHE_KEY_PREFIX)));
1537
+ return Object.keys(window.localStorage).filter(key => key.startsWith(CACHE_KEY_PREFIX));
1538
1538
  }
1539
1539
  }
1540
1540
 
@@ -1672,10 +1672,10 @@ class CacheManager {
1672
1672
  var _a;
1673
1673
  const keys = await this.getCacheKeys();
1674
1674
  if (!keys) return;
1675
- await keys.filter((key => clientId ? key.includes(clientId) : true)).reduce((async (memo, key) => {
1675
+ await keys.filter(key => clientId ? key.includes(clientId) : true).reduce(async (memo, key) => {
1676
1676
  await memo;
1677
1677
  await this.cache.remove(key);
1678
- }), Promise.resolve());
1678
+ }, Promise.resolve());
1679
1679
  await ((_a = this.keyManifest) === null || _a === void 0 ? void 0 : _a.clear());
1680
1680
  }
1681
1681
  async wrapCacheEntry(entry) {
@@ -1700,14 +1700,14 @@ class CacheManager {
1700
1700
  }, CACHE_KEY_PREFIX, CACHE_KEY_ID_TOKEN_SUFFIX).toKey();
1701
1701
  }
1702
1702
  matchExistingCacheKey(keyToMatch, allKeys) {
1703
- return allKeys.filter((key => {
1703
+ return allKeys.filter(key => {
1704
1704
  var _a;
1705
1705
  const cacheKey = CacheKey.fromKey(key);
1706
1706
  const scopeSet = new Set(cacheKey.scope && cacheKey.scope.split(" "));
1707
1707
  const scopesToMatch = ((_a = keyToMatch.scope) === null || _a === void 0 ? void 0 : _a.split(" ")) || [];
1708
- const hasAllScopes = cacheKey.scope && scopesToMatch.reduce(((acc, current) => acc && scopeSet.has(current)), true);
1708
+ const hasAllScopes = cacheKey.scope && scopesToMatch.reduce((acc, current) => acc && scopeSet.has(current), true);
1709
1709
  return cacheKey.prefix === CACHE_KEY_PREFIX && cacheKey.clientId === keyToMatch.clientId && cacheKey.audience === keyToMatch.audience && hasAllScopes;
1710
- }))[0];
1710
+ })[0];
1711
1711
  }
1712
1712
  async getEntryWithRefreshToken(keyToMatch, allKeys) {
1713
1713
  var _a;
@@ -1776,12 +1776,12 @@ const decode$1 = token => {
1776
1776
  __raw: token
1777
1777
  };
1778
1778
  const user = {};
1779
- Object.keys(payloadJSON).forEach((k => {
1779
+ Object.keys(payloadJSON).forEach(k => {
1780
1780
  claims[k] = payloadJSON[k];
1781
1781
  if (!idTokendecoded.includes(k)) {
1782
1782
  user[k] = payloadJSON[k];
1783
1783
  }
1784
- }));
1784
+ });
1785
1785
  return {
1786
1786
  encoded: {
1787
1787
  header: header,
@@ -2097,17 +2097,17 @@ function createBase64WorkerFactory(base64, sourcemapArg, enableUnicodeArg) {
2097
2097
  };
2098
2098
  }
2099
2099
 
2100
- var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter((k => typeof params[k] !== "undefined")).reduce(((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    })), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce(((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }), {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise((resolve => setTimeout(resolve, time)));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach(((val, key) => {
            parsedQuery[key] = val;
        }));
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach((_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        }));
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find((key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every((key => scopesKey.includes(key)));
                return isSameAudience && scopesAreIncluded;
            }
        }));
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
2100
+ var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    }), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }, {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise(resolve => setTimeout(resolve, time));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach((val, key) => {
            parsedQuery[key] = val;
        });
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach(_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        });
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find(key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every(key => scopesKey.includes(key));
                return isSameAudience && scopesAreIncluded;
            }
        });
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
2101
2101
 
2102
2102
  const singlePromiseMap = {};
2103
2103
 
2104
2104
  const singlePromise = (cb, key) => {
2105
2105
  let promise = singlePromiseMap[key];
2106
2106
  if (!promise) {
2107
- promise = cb().finally((() => {
2107
+ promise = cb().finally(() => {
2108
2108
  delete singlePromiseMap[key];
2109
2109
  promise = null;
2110
- }));
2110
+ });
2111
2111
  singlePromiseMap[key] = promise;
2112
2112
  }
2113
2113
  return promise;
@@ -2197,13 +2197,13 @@ const patchOpenUrlWithOnRedirect = options => {
2197
2197
  const allScopesAreIncluded = (scopeToInclude, scopes) => {
2198
2198
  const scopeGroup = (scopes === null || scopes === void 0 ? void 0 : scopes.split(" ")) || [];
2199
2199
  const scopesToInclude = (scopeToInclude === null || scopeToInclude === void 0 ? void 0 : scopeToInclude.split(" ")) || [];
2200
- return scopesToInclude.every((key => scopeGroup.includes(key)));
2200
+ return scopesToInclude.every(key => scopeGroup.includes(key));
2201
2201
  };
2202
2202
 
2203
2203
  const getMissingScopes = (requestedScope, respondedScope) => {
2204
2204
  const requestedScopes = (requestedScope === null || requestedScope === void 0 ? void 0 : requestedScope.split(" ")) || [];
2205
2205
  const respondedScopes = (respondedScope === null || respondedScope === void 0 ? void 0 : respondedScope.split(" ")) || [];
2206
- const missingScopes = requestedScopes.filter((scope => respondedScopes.indexOf(scope) == -1));
2206
+ const missingScopes = requestedScopes.filter(scope => respondedScopes.indexOf(scope) == -1);
2207
2207
  return missingScopes.join(",");
2208
2208
  };
2209
2209
 
@@ -2215,7 +2215,7 @@ const getScopeToRequest = (useMrrt, authorizationParams, cachedAudience, cachedS
2215
2215
  }
2216
2216
  const cachedScopes = cachedScope.split(" ");
2217
2217
  const newScopes = ((_a = authorizationParams.scope) === null || _a === void 0 ? void 0 : _a.split(" ")) || [];
2218
- const newScopesAreIncluded = newScopes.every((scope => cachedScopes.includes(scope)));
2218
+ const newScopesAreIncluded = newScopes.every(scope => cachedScopes.includes(scope));
2219
2219
  return cachedScopes.length >= newScopes.length && newScopesAreIncluded ? cachedScope : authorizationParams.scope;
2220
2220
  }
2221
2221
  return authorizationParams.scope;
@@ -2248,11 +2248,11 @@ class DpopStorage {
2248
2248
  }
2249
2249
  createDbHandle() {
2250
2250
  const req = window.indexedDB.open(NAME, this.getVersion());
2251
- return new Promise(((resolve, reject) => {
2252
- req.onupgradeneeded = () => Object.values(TABLES).forEach((t => req.result.createObjectStore(t)));
2251
+ return new Promise((resolve, reject) => {
2252
+ req.onupgradeneeded = () => Object.values(TABLES).forEach(t => req.result.createObjectStore(t));
2253
2253
  req.onerror = () => reject(req.error);
2254
2254
  req.onsuccess = () => resolve(req.result);
2255
- }));
2255
+ });
2256
2256
  }
2257
2257
  async getDbHandle() {
2258
2258
  if (!this.dbHandle) {
@@ -2265,10 +2265,10 @@ class DpopStorage {
2265
2265
  const txn = db.transaction(table, mode);
2266
2266
  const store = txn.objectStore(table);
2267
2267
  const request = requestFactory(store);
2268
- return new Promise(((resolve, reject) => {
2268
+ return new Promise((resolve, reject) => {
2269
2269
  request.onsuccess = () => resolve(request.result);
2270
2270
  request.onerror = () => reject(request.error);
2271
- }));
2271
+ });
2272
2272
  }
2273
2273
  buildKey(id) {
2274
2274
  const finalId = id ? "_".concat(id) : AUTH0_NONCE_ID;
@@ -2281,7 +2281,7 @@ class DpopStorage {
2281
2281
  return this.save(TABLES.KEYPAIR, this.buildKey(), keyPair);
2282
2282
  }
2283
2283
  async save(table, key, obj) {
2284
- return void await this.executeDbRequest(table, "readwrite", (table => table.put(obj, key)));
2284
+ return void await this.executeDbRequest(table, "readwrite", table => table.put(obj, key));
2285
2285
  }
2286
2286
  findNonce(id) {
2287
2287
  return this.find(TABLES.NONCE, this.buildKey(id));
@@ -2290,14 +2290,14 @@ class DpopStorage {
2290
2290
  return this.find(TABLES.KEYPAIR, this.buildKey());
2291
2291
  }
2292
2292
  find(table, key) {
2293
- return this.executeDbRequest(table, "readonly", (table => table.get(key)));
2293
+ return this.executeDbRequest(table, "readonly", table => table.get(key));
2294
2294
  }
2295
2295
  async deleteBy(table, predicate) {
2296
- const allKeys = await this.executeDbRequest(table, "readonly", (table => table.getAllKeys()));
2297
- allKeys === null || allKeys === void 0 ? void 0 : allKeys.filter(predicate).map((k => this.executeDbRequest(table, "readwrite", (table => table.delete(k)))));
2296
+ const allKeys = await this.executeDbRequest(table, "readonly", table => table.getAllKeys());
2297
+ allKeys === null || allKeys === void 0 ? void 0 : allKeys.filter(predicate).map(k => this.executeDbRequest(table, "readwrite", table => table.delete(k)));
2298
2298
  }
2299
2299
  deleteByClientId(table, clientId) {
2300
- return this.deleteBy(table, (k => typeof k === "string" && k.startsWith("".concat(clientId, "::"))));
2300
+ return this.deleteBy(table, k => typeof k === "string" && k.startsWith("".concat(clientId, "::")));
2301
2301
  }
2302
2302
  clearNonces() {
2303
2303
  return this.deleteByClientId(TABLES.NONCE, this.clientId);
@@ -2627,9 +2627,9 @@ function ownKeys(e, r) {
2627
2627
  var t = Object.keys(e);
2628
2628
  if (Object.getOwnPropertySymbols) {
2629
2629
  var o = Object.getOwnPropertySymbols(e);
2630
- r && (o = o.filter((function(r) {
2630
+ r && (o = o.filter(function(r) {
2631
2631
  return Object.getOwnPropertyDescriptor(e, r).enumerable;
2632
- }))), t.push.apply(t, o);
2632
+ })), t.push.apply(t, o);
2633
2633
  }
2634
2634
  return t;
2635
2635
  }
@@ -2637,11 +2637,11 @@ function ownKeys(e, r) {
2637
2637
  function _objectSpread2(e) {
2638
2638
  for (var r = 1; r < arguments.length; r++) {
2639
2639
  var t = null != arguments[r] ? arguments[r] : {};
2640
- r % 2 ? ownKeys(Object(t), !0).forEach((function(r) {
2640
+ r % 2 ? ownKeys(Object(t), !0).forEach(function(r) {
2641
2641
  _defineProperty(e, r, t[r]);
2642
- })) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach((function(r) {
2642
+ }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function(r) {
2643
2643
  Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r));
2644
- }));
2644
+ });
2645
2645
  }
2646
2646
  return e;
2647
2647
  }
@@ -2693,16 +2693,16 @@ function AsyncGenerator(e) {
2693
2693
  function resume(r, t) {
2694
2694
  try {
2695
2695
  var n = e[r](t), o = n.value, u = o instanceof _OverloadYield;
2696
- Promise.resolve(u ? o.v : o).then((function(t) {
2696
+ Promise.resolve(u ? o.v : o).then(function(t) {
2697
2697
  if (u) {
2698
2698
  var i = "return" === r ? "return" : "next";
2699
2699
  if (!o.k || t.done) return resume(i, t);
2700
2700
  t = e[i](t).value;
2701
2701
  }
2702
2702
  settle(n.done ? "return" : "normal", t);
2703
- }), (function(e) {
2703
+ }, function(e) {
2704
2704
  resume("throw", e);
2705
- }));
2705
+ });
2706
2706
  } catch (e) {
2707
2707
  settle("throw", e);
2708
2708
  }
@@ -2729,7 +2729,7 @@ function AsyncGenerator(e) {
2729
2729
  (r = r.next) ? resume(r.key, r.arg) : t = null;
2730
2730
  }
2731
2731
  this._invoke = function(e, n) {
2732
- return new Promise((function(o, u) {
2732
+ return new Promise(function(o, u) {
2733
2733
  var i = {
2734
2734
  key: e,
2735
2735
  arg: n,
@@ -2738,7 +2738,7 @@ function AsyncGenerator(e) {
2738
2738
  next: null
2739
2739
  };
2740
2740
  t ? t = t.next = i : (r = t = i, resume(e, n));
2741
- }));
2741
+ });
2742
2742
  }, "function" != typeof e.return && (this.return = void 0);
2743
2743
  }
2744
2744
 
@@ -2758,7 +2758,7 @@ let USER_AGENT$2;
2758
2758
 
2759
2759
  if (typeof navigator === "undefined" || !((_navigator$userAgent$2 = navigator.userAgent) !== null && _navigator$userAgent$2 !== void 0 && (_navigator$userAgent$$2 = _navigator$userAgent$2.startsWith) !== null && _navigator$userAgent$$2 !== void 0 && _navigator$userAgent$$2.call(_navigator$userAgent$2, "Mozilla/5.0 "))) {
2760
2760
  const NAME = "oauth4webapi";
2761
- const VERSION = "v3.8.3";
2761
+ const VERSION = "v3.8.5";
2762
2762
  USER_AGENT$2 = "".concat(NAME, "/").concat(VERSION);
2763
2763
  }
2764
2764
 
@@ -2988,7 +2988,7 @@ async function performDiscovery$1(input, urlName, transform, options) {
2988
2988
  }
2989
2989
 
2990
2990
  async function discoveryRequest(issuerIdentifier, options) {
2991
- return performDiscovery$1(issuerIdentifier, "issuerIdentifier", (url => {
2991
+ return performDiscovery$1(issuerIdentifier, "issuerIdentifier", url => {
2992
2992
  switch (options === null || options === void 0 ? void 0 : options.algorithm) {
2993
2993
  case undefined:
2994
2994
  case "oidc":
@@ -3003,7 +3003,7 @@ async function discoveryRequest(issuerIdentifier, options) {
3003
3003
  throw CodedTypeError$1('"options.algorithm" must be "oidc" (default), or "oauth2"', ERR_INVALID_ARG_VALUE$1);
3004
3004
  }
3005
3005
  return url;
3006
- }), options);
3006
+ }, options);
3007
3007
  }
3008
3008
 
3009
3009
  function assertNumber(input, allow0, it, code, cause) {
@@ -4351,10 +4351,10 @@ function concat() {
4351
4351
  for (var _len = arguments.length, buffers = new Array(_len), _key = 0; _key < _len; _key++) {
4352
4352
  buffers[_key] = arguments[_key];
4353
4353
  }
4354
- const size = buffers.reduce(((acc, _ref) => {
4354
+ const size = buffers.reduce((acc, _ref) => {
4355
4355
  let {length: length} = _ref;
4356
4356
  return acc + length;
4357
- }), 0);
4357
+ }, 0);
4358
4358
  const buf = new Uint8Array(size);
4359
4359
  let i = 0;
4360
4360
  for (const buffer of buffers) {
@@ -4406,6 +4406,145 @@ function decode(input) {
4406
4406
  }
4407
4407
  }
4408
4408
 
4409
+ const unusable = function unusable(name) {
4410
+ let prop = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "algorithm.name";
4411
+ return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
4412
+ };
4413
+
4414
+ const isAlgorithm = (algorithm, name) => algorithm.name === name;
4415
+
4416
+ function getHashLength(hash) {
4417
+ return parseInt(hash.name.slice(4), 10);
4418
+ }
4419
+
4420
+ function checkHashLength(algorithm, expected) {
4421
+ const actual = getHashLength(algorithm.hash);
4422
+ if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4423
+ }
4424
+
4425
+ function getNamedCurve(alg) {
4426
+ switch (alg) {
4427
+ case "ES256":
4428
+ return "P-256";
4429
+
4430
+ case "ES384":
4431
+ return "P-384";
4432
+
4433
+ case "ES512":
4434
+ return "P-521";
4435
+
4436
+ default:
4437
+ throw new Error("unreachable");
4438
+ }
4439
+ }
4440
+
4441
+ function checkUsage(key, usage) {
4442
+ if (usage && !key.usages.includes(usage)) {
4443
+ throw new TypeError("CryptoKey does not support this operation, its usages must include ".concat(usage, "."));
4444
+ }
4445
+ }
4446
+
4447
+ function checkSigCryptoKey(key, alg, usage) {
4448
+ switch (alg) {
4449
+ case "HS256":
4450
+ case "HS384":
4451
+ case "HS512":
4452
+ {
4453
+ if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
4454
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4455
+ break;
4456
+ }
4457
+
4458
+ case "RS256":
4459
+ case "RS384":
4460
+ case "RS512":
4461
+ {
4462
+ if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
4463
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4464
+ break;
4465
+ }
4466
+
4467
+ case "PS256":
4468
+ case "PS384":
4469
+ case "PS512":
4470
+ {
4471
+ if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
4472
+ checkHashLength(key.algorithm, parseInt(alg.slice(2), 10));
4473
+ break;
4474
+ }
4475
+
4476
+ case "Ed25519":
4477
+ case "EdDSA":
4478
+ {
4479
+ if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
4480
+ break;
4481
+ }
4482
+
4483
+ case "ML-DSA-44":
4484
+ case "ML-DSA-65":
4485
+ case "ML-DSA-87":
4486
+ {
4487
+ if (!isAlgorithm(key.algorithm, alg)) throw unusable(alg);
4488
+ break;
4489
+ }
4490
+
4491
+ case "ES256":
4492
+ case "ES384":
4493
+ case "ES512":
4494
+ {
4495
+ if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
4496
+ const expected = getNamedCurve(alg);
4497
+ const actual = key.algorithm.namedCurve;
4498
+ if (actual !== expected) throw unusable(expected, "algorithm.namedCurve");
4499
+ break;
4500
+ }
4501
+
4502
+ default:
4503
+ throw new TypeError("CryptoKey does not support this operation");
4504
+ }
4505
+ checkUsage(key, usage);
4506
+ }
4507
+
4508
+ function message(msg, actual) {
4509
+ for (var _len = arguments.length, types = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++) {
4510
+ types[_key - 2] = arguments[_key];
4511
+ }
4512
+ types = types.filter(Boolean);
4513
+ if (types.length > 2) {
4514
+ const last = types.pop();
4515
+ msg += "one of type ".concat(types.join(", "), ", or ").concat(last, ".");
4516
+ } else if (types.length === 2) {
4517
+ msg += "one of type ".concat(types[0], " or ").concat(types[1], ".");
4518
+ } else {
4519
+ msg += "of type ".concat(types[0], ".");
4520
+ }
4521
+ if (actual == null) {
4522
+ msg += " Received ".concat(actual);
4523
+ } else if (typeof actual === "function" && actual.name) {
4524
+ msg += " Received function ".concat(actual.name);
4525
+ } else if (typeof actual === "object" && actual != null) {
4526
+ var _actual$constructor;
4527
+ if ((_actual$constructor = actual.constructor) !== null && _actual$constructor !== void 0 && _actual$constructor.name) {
4528
+ msg += " Received an instance of ".concat(actual.constructor.name);
4529
+ }
4530
+ }
4531
+ return msg;
4532
+ }
4533
+
4534
+ const invalidKeyInput = function invalidKeyInput(actual) {
4535
+ for (var _len2 = arguments.length, types = new Array(_len2 > 1 ? _len2 - 1 : 0), _key2 = 1; _key2 < _len2; _key2++) {
4536
+ types[_key2 - 1] = arguments[_key2];
4537
+ }
4538
+ return message("Key must be ", actual, ...types);
4539
+ };
4540
+
4541
+ const withAlg = function withAlg(alg, actual) {
4542
+ for (var _len3 = arguments.length, types = new Array(_len3 > 2 ? _len3 - 2 : 0), _key3 = 2; _key3 < _len3; _key3++) {
4543
+ types[_key3 - 2] = arguments[_key3];
4544
+ }
4545
+ return message("Key for the ".concat(alg, " algorithm must be "), actual, ...types);
4546
+ };
4547
+
4409
4548
  class JOSEError extends Error {
4410
4549
  constructor(message, options) {
4411
4550
  var _Error$captureStackTr;
@@ -4583,207 +4722,486 @@ class JWSSignatureVerificationFailed extends JOSEError {
4583
4722
 
4584
4723
  _defineProperty(JWSSignatureVerificationFailed, "code", "ERR_JWS_SIGNATURE_VERIFICATION_FAILED");
4585
4724
 
4586
- const unusable = function unusable(name) {
4587
- let prop = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "algorithm.name";
4588
- return new TypeError("CryptoKey does not support this operation, its ".concat(prop, " must be ").concat(name));
4725
+ const isCryptoKey = key => {
4726
+ if ((key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "CryptoKey") return true;
4727
+ try {
4728
+ return key instanceof CryptoKey;
4729
+ } catch (_unused) {
4730
+ return false;
4731
+ }
4589
4732
  };
4590
4733
 
4591
- const isAlgorithm = (algorithm, name) => algorithm.name === name;
4592
-
4593
- function getHashLength(hash) {
4594
- return parseInt(hash.name.slice(4), 10);
4595
- }
4734
+ const isKeyObject = key => (key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "KeyObject";
4596
4735
 
4597
- function getNamedCurve(alg) {
4598
- switch (alg) {
4599
- case "ES256":
4600
- return "P-256";
4736
+ const isKeyLike = key => isCryptoKey(key) || isKeyObject(key);
4601
4737
 
4602
- case "ES384":
4603
- return "P-384";
4738
+ function decodeBase64url(value, label, ErrorClass) {
4739
+ try {
4740
+ return decode(value);
4741
+ } catch (_unused) {
4742
+ throw new ErrorClass("Failed to base64url decode the ".concat(label));
4743
+ }
4744
+ }
4604
4745
 
4605
- case "ES512":
4606
- return "P-521";
4746
+ const isObjectLike = value => typeof value === "object" && value !== null;
4607
4747
 
4608
- default:
4609
- throw new Error("unreachable");
4748
+ function isObject(input) {
4749
+ if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
4750
+ return false;
4751
+ }
4752
+ if (Object.getPrototypeOf(input) === null) {
4753
+ return true;
4754
+ }
4755
+ let proto = input;
4756
+ while (Object.getPrototypeOf(proto) !== null) {
4757
+ proto = Object.getPrototypeOf(proto);
4610
4758
  }
4759
+ return Object.getPrototypeOf(input) === proto;
4611
4760
  }
4612
4761
 
4613
- function checkUsage(key, usage) {
4614
- if (usage && !key.usages.includes(usage)) {
4615
- throw new TypeError("CryptoKey does not support this operation, its usages must include ".concat(usage, "."));
4762
+ function isDisjoint() {
4763
+ for (var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++) {
4764
+ headers[_key] = arguments[_key];
4616
4765
  }
4766
+ const sources = headers.filter(Boolean);
4767
+ if (sources.length === 0 || sources.length === 1) {
4768
+ return true;
4769
+ }
4770
+ let acc;
4771
+ for (const header of sources) {
4772
+ const parameters = Object.keys(header);
4773
+ if (!acc || acc.size === 0) {
4774
+ acc = new Set(parameters);
4775
+ continue;
4776
+ }
4777
+ for (const parameter of parameters) {
4778
+ if (acc.has(parameter)) {
4779
+ return false;
4780
+ }
4781
+ acc.add(parameter);
4782
+ }
4783
+ }
4784
+ return true;
4617
4785
  }
4618
4786
 
4619
- function checkSigCryptoKey(key, alg, usage) {
4787
+ const isJWK = key => isObject(key) && typeof key.kty === "string";
4788
+
4789
+ const isPrivateJWK = key => key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
4790
+
4791
+ const isPublicJWK = key => key.kty !== "oct" && key.d === undefined && key.priv === undefined;
4792
+
4793
+ const isSecretJWK = key => key.kty === "oct" && typeof key.k === "string";
4794
+
4795
+ function checkKeyLength(alg, key) {
4796
+ if (alg.startsWith("RS") || alg.startsWith("PS")) {
4797
+ const {modulusLength: modulusLength} = key.algorithm;
4798
+ if (typeof modulusLength !== "number" || modulusLength < 2048) {
4799
+ throw new TypeError("".concat(alg, " requires key modulusLength to be 2048 bits or larger"));
4800
+ }
4801
+ }
4802
+ }
4803
+
4804
+ function subtleAlgorithm(alg, algorithm) {
4805
+ const hash = "SHA-".concat(alg.slice(-3));
4620
4806
  switch (alg) {
4621
4807
  case "HS256":
4622
4808
  case "HS384":
4623
4809
  case "HS512":
4624
- {
4625
- if (!isAlgorithm(key.algorithm, "HMAC")) throw unusable("HMAC");
4626
- const expected = parseInt(alg.slice(2), 10);
4627
- const actual = getHashLength(key.algorithm.hash);
4628
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4629
- break;
4630
- }
4810
+ return {
4811
+ hash: hash,
4812
+ name: "HMAC"
4813
+ };
4814
+
4815
+ case "PS256":
4816
+ case "PS384":
4817
+ case "PS512":
4818
+ return {
4819
+ hash: hash,
4820
+ name: "RSA-PSS",
4821
+ saltLength: parseInt(alg.slice(-3), 10) >> 3
4822
+ };
4631
4823
 
4632
4824
  case "RS256":
4633
4825
  case "RS384":
4634
4826
  case "RS512":
4635
- {
4636
- if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5")) throw unusable("RSASSA-PKCS1-v1_5");
4637
- const expected = parseInt(alg.slice(2), 10);
4638
- const actual = getHashLength(key.algorithm.hash);
4639
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4640
- break;
4827
+ return {
4828
+ hash: hash,
4829
+ name: "RSASSA-PKCS1-v1_5"
4830
+ };
4831
+
4832
+ case "ES256":
4833
+ case "ES384":
4834
+ case "ES512":
4835
+ return {
4836
+ hash: hash,
4837
+ name: "ECDSA",
4838
+ namedCurve: algorithm.namedCurve
4839
+ };
4840
+
4841
+ case "Ed25519":
4842
+ case "EdDSA":
4843
+ return {
4844
+ name: "Ed25519"
4845
+ };
4846
+
4847
+ case "ML-DSA-44":
4848
+ case "ML-DSA-65":
4849
+ case "ML-DSA-87":
4850
+ return {
4851
+ name: alg
4852
+ };
4853
+
4854
+ default:
4855
+ throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
4856
+ }
4857
+ }
4858
+
4859
+ async function getSigKey(alg, key, usage) {
4860
+ if (key instanceof Uint8Array) {
4861
+ if (!alg.startsWith("HS")) {
4862
+ throw new TypeError(invalidKeyInput(key, "CryptoKey", "KeyObject", "JSON Web Key"));
4641
4863
  }
4864
+ return crypto.subtle.importKey("raw", key, {
4865
+ hash: "SHA-".concat(alg.slice(-3)),
4866
+ name: "HMAC"
4867
+ }, false, [ usage ]);
4868
+ }
4869
+ checkSigCryptoKey(key, alg, usage);
4870
+ return key;
4871
+ }
4642
4872
 
4643
- case "PS256":
4644
- case "PS384":
4645
- case "PS512":
4873
+ async function verify(alg, key, signature, data) {
4874
+ const cryptoKey = await getSigKey(alg, key, "verify");
4875
+ checkKeyLength(alg, cryptoKey);
4876
+ const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);
4877
+ try {
4878
+ return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);
4879
+ } catch (_unused) {
4880
+ return false;
4881
+ }
4882
+ }
4883
+
4884
+ const unsupportedAlg = 'Invalid or unsupported JWK "alg" (Algorithm) Parameter value';
4885
+
4886
+ function subtleMapping(jwk) {
4887
+ let algorithm;
4888
+ let keyUsages;
4889
+ switch (jwk.kty) {
4890
+ case "AKP":
4646
4891
  {
4647
- if (!isAlgorithm(key.algorithm, "RSA-PSS")) throw unusable("RSA-PSS");
4648
- const expected = parseInt(alg.slice(2), 10);
4649
- const actual = getHashLength(key.algorithm.hash);
4650
- if (actual !== expected) throw unusable("SHA-".concat(expected), "algorithm.hash");
4892
+ switch (jwk.alg) {
4893
+ case "ML-DSA-44":
4894
+ case "ML-DSA-65":
4895
+ case "ML-DSA-87":
4896
+ algorithm = {
4897
+ name: jwk.alg
4898
+ };
4899
+ keyUsages = jwk.priv ? [ "sign" ] : [ "verify" ];
4900
+ break;
4901
+
4902
+ default:
4903
+ throw new JOSENotSupported(unsupportedAlg);
4904
+ }
4651
4905
  break;
4652
4906
  }
4653
4907
 
4654
- case "Ed25519":
4655
- case "EdDSA":
4908
+ case "RSA":
4656
4909
  {
4657
- if (!isAlgorithm(key.algorithm, "Ed25519")) throw unusable("Ed25519");
4910
+ switch (jwk.alg) {
4911
+ case "PS256":
4912
+ case "PS384":
4913
+ case "PS512":
4914
+ algorithm = {
4915
+ name: "RSA-PSS",
4916
+ hash: "SHA-".concat(jwk.alg.slice(-3))
4917
+ };
4918
+ keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4919
+ break;
4920
+
4921
+ case "RS256":
4922
+ case "RS384":
4923
+ case "RS512":
4924
+ algorithm = {
4925
+ name: "RSASSA-PKCS1-v1_5",
4926
+ hash: "SHA-".concat(jwk.alg.slice(-3))
4927
+ };
4928
+ keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4929
+ break;
4930
+
4931
+ case "RSA-OAEP":
4932
+ case "RSA-OAEP-256":
4933
+ case "RSA-OAEP-384":
4934
+ case "RSA-OAEP-512":
4935
+ algorithm = {
4936
+ name: "RSA-OAEP",
4937
+ hash: "SHA-".concat(parseInt(jwk.alg.slice(-3), 10) || 1)
4938
+ };
4939
+ keyUsages = jwk.d ? [ "decrypt", "unwrapKey" ] : [ "encrypt", "wrapKey" ];
4940
+ break;
4941
+
4942
+ default:
4943
+ throw new JOSENotSupported(unsupportedAlg);
4944
+ }
4658
4945
  break;
4659
4946
  }
4660
4947
 
4661
- case "ML-DSA-44":
4662
- case "ML-DSA-65":
4663
- case "ML-DSA-87":
4948
+ case "EC":
4664
4949
  {
4665
- if (!isAlgorithm(key.algorithm, alg)) throw unusable(alg);
4950
+ switch (jwk.alg) {
4951
+ case "ES256":
4952
+ case "ES384":
4953
+ case "ES512":
4954
+ algorithm = {
4955
+ name: "ECDSA",
4956
+ namedCurve: {
4957
+ ES256: "P-256",
4958
+ ES384: "P-384",
4959
+ ES512: "P-521"
4960
+ }[jwk.alg]
4961
+ };
4962
+ keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4963
+ break;
4964
+
4965
+ case "ECDH-ES":
4966
+ case "ECDH-ES+A128KW":
4967
+ case "ECDH-ES+A192KW":
4968
+ case "ECDH-ES+A256KW":
4969
+ algorithm = {
4970
+ name: "ECDH",
4971
+ namedCurve: jwk.crv
4972
+ };
4973
+ keyUsages = jwk.d ? [ "deriveBits" ] : [];
4974
+ break;
4975
+
4976
+ default:
4977
+ throw new JOSENotSupported(unsupportedAlg);
4978
+ }
4666
4979
  break;
4667
4980
  }
4668
4981
 
4669
- case "ES256":
4670
- case "ES384":
4671
- case "ES512":
4982
+ case "OKP":
4672
4983
  {
4673
- if (!isAlgorithm(key.algorithm, "ECDSA")) throw unusable("ECDSA");
4674
- const expected = getNamedCurve(alg);
4675
- const actual = key.algorithm.namedCurve;
4676
- if (actual !== expected) throw unusable(expected, "algorithm.namedCurve");
4984
+ switch (jwk.alg) {
4985
+ case "Ed25519":
4986
+ case "EdDSA":
4987
+ algorithm = {
4988
+ name: "Ed25519"
4989
+ };
4990
+ keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
4991
+ break;
4992
+
4993
+ case "ECDH-ES":
4994
+ case "ECDH-ES+A128KW":
4995
+ case "ECDH-ES+A192KW":
4996
+ case "ECDH-ES+A256KW":
4997
+ algorithm = {
4998
+ name: jwk.crv
4999
+ };
5000
+ keyUsages = jwk.d ? [ "deriveBits" ] : [];
5001
+ break;
5002
+
5003
+ default:
5004
+ throw new JOSENotSupported(unsupportedAlg);
5005
+ }
4677
5006
  break;
4678
5007
  }
4679
5008
 
4680
5009
  default:
4681
- throw new TypeError("CryptoKey does not support this operation");
5010
+ throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
4682
5011
  }
4683
- checkUsage(key, usage);
5012
+ return {
5013
+ algorithm: algorithm,
5014
+ keyUsages: keyUsages
5015
+ };
4684
5016
  }
4685
5017
 
4686
- function message(msg, actual) {
4687
- for (var _len = arguments.length, types = new Array(_len > 2 ? _len - 2 : 0), _key = 2; _key < _len; _key++) {
4688
- types[_key - 2] = arguments[_key];
4689
- }
4690
- types = types.filter(Boolean);
4691
- if (types.length > 2) {
4692
- const last = types.pop();
4693
- msg += "one of type ".concat(types.join(", "), ", or ").concat(last, ".");
4694
- } else if (types.length === 2) {
4695
- msg += "one of type ".concat(types[0], " or ").concat(types[1], ".");
4696
- } else {
4697
- msg += "of type ".concat(types[0], ".");
5018
+ async function jwkToKey(jwk) {
5019
+ var _jwk$ext, _jwk$key_ops;
5020
+ if (!jwk.alg) {
5021
+ throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
4698
5022
  }
4699
- if (actual == null) {
4700
- msg += " Received ".concat(actual);
4701
- } else if (typeof actual === "function" && actual.name) {
4702
- msg += " Received function ".concat(actual.name);
4703
- } else if (typeof actual === "object" && actual != null) {
4704
- var _actual$constructor;
4705
- if ((_actual$constructor = actual.constructor) !== null && _actual$constructor !== void 0 && _actual$constructor.name) {
4706
- msg += " Received an instance of ".concat(actual.constructor.name);
4707
- }
5023
+ const {algorithm: algorithm, keyUsages: keyUsages} = subtleMapping(jwk);
5024
+ const keyData = _objectSpread2({}, jwk);
5025
+ if (keyData.kty !== "AKP") {
5026
+ delete keyData.alg;
4708
5027
  }
4709
- return msg;
5028
+ delete keyData.use;
5029
+ return crypto.subtle.importKey("jwk", keyData, algorithm, (_jwk$ext = jwk.ext) !== null && _jwk$ext !== void 0 ? _jwk$ext : jwk.d || jwk.priv ? false : true, (_jwk$key_ops = jwk.key_ops) !== null && _jwk$key_ops !== void 0 ? _jwk$key_ops : keyUsages);
4710
5030
  }
4711
5031
 
4712
- const invalidKeyInput = function invalidKeyInput(actual) {
4713
- for (var _len2 = arguments.length, types = new Array(_len2 > 1 ? _len2 - 1 : 0), _key2 = 1; _key2 < _len2; _key2++) {
4714
- types[_key2 - 1] = arguments[_key2];
5032
+ const unusableForAlg = "given KeyObject instance cannot be used for this algorithm";
5033
+
5034
+ let cache;
5035
+
5036
+ const handleJWK = async function handleJWK(key, jwk, alg) {
5037
+ let freeze = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : false;
5038
+ cache || (cache = new WeakMap);
5039
+ let cached = cache.get(key);
5040
+ if (cached !== null && cached !== void 0 && cached[alg]) {
5041
+ return cached[alg];
4715
5042
  }
4716
- return message("Key must be ", actual, ...types);
5043
+ const cryptoKey = await jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5044
+ alg: alg
5045
+ }));
5046
+ if (freeze) Object.freeze(key);
5047
+ if (!cached) {
5048
+ cache.set(key, {
5049
+ [alg]: cryptoKey
5050
+ });
5051
+ } else {
5052
+ cached[alg] = cryptoKey;
5053
+ }
5054
+ return cryptoKey;
4717
5055
  };
4718
5056
 
4719
- const withAlg = function withAlg(alg, actual) {
4720
- for (var _len3 = arguments.length, types = new Array(_len3 > 2 ? _len3 - 2 : 0), _key3 = 2; _key3 < _len3; _key3++) {
4721
- types[_key3 - 2] = arguments[_key3];
5057
+ const handleKeyObject = (keyObject, alg) => {
5058
+ cache || (cache = new WeakMap);
5059
+ let cached = cache.get(keyObject);
5060
+ if (cached !== null && cached !== void 0 && cached[alg]) {
5061
+ return cached[alg];
5062
+ }
5063
+ const isPublic = keyObject.type === "public";
5064
+ const extractable = isPublic ? true : false;
5065
+ let cryptoKey;
5066
+ if (keyObject.asymmetricKeyType === "x25519") {
5067
+ switch (alg) {
5068
+ case "ECDH-ES":
5069
+ case "ECDH-ES+A128KW":
5070
+ case "ECDH-ES+A192KW":
5071
+ case "ECDH-ES+A256KW":
5072
+ break;
5073
+
5074
+ default:
5075
+ throw new TypeError(unusableForAlg);
5076
+ }
5077
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : [ "deriveBits" ]);
5078
+ }
5079
+ if (keyObject.asymmetricKeyType === "ed25519") {
5080
+ if (alg !== "EdDSA" && alg !== "Ed25519") {
5081
+ throw new TypeError(unusableForAlg);
5082
+ }
5083
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
5084
+ }
5085
+ switch (keyObject.asymmetricKeyType) {
5086
+ case "ml-dsa-44":
5087
+ case "ml-dsa-65":
5088
+ case "ml-dsa-87":
5089
+ {
5090
+ if (alg !== keyObject.asymmetricKeyType.toUpperCase()) {
5091
+ throw new TypeError(unusableForAlg);
5092
+ }
5093
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
5094
+ }
5095
+ }
5096
+ if (keyObject.asymmetricKeyType === "rsa") {
5097
+ let hash;
5098
+ switch (alg) {
5099
+ case "RSA-OAEP":
5100
+ hash = "SHA-1";
5101
+ break;
5102
+
5103
+ case "RS256":
5104
+ case "PS256":
5105
+ case "RSA-OAEP-256":
5106
+ hash = "SHA-256";
5107
+ break;
5108
+
5109
+ case "RS384":
5110
+ case "PS384":
5111
+ case "RSA-OAEP-384":
5112
+ hash = "SHA-384";
5113
+ break;
5114
+
5115
+ case "RS512":
5116
+ case "PS512":
5117
+ case "RSA-OAEP-512":
5118
+ hash = "SHA-512";
5119
+ break;
5120
+
5121
+ default:
5122
+ throw new TypeError(unusableForAlg);
5123
+ }
5124
+ if (alg.startsWith("RSA-OAEP")) {
5125
+ return keyObject.toCryptoKey({
5126
+ name: "RSA-OAEP",
5127
+ hash: hash
5128
+ }, extractable, isPublic ? [ "encrypt" ] : [ "decrypt" ]);
5129
+ }
5130
+ cryptoKey = keyObject.toCryptoKey({
5131
+ name: alg.startsWith("PS") ? "RSA-PSS" : "RSASSA-PKCS1-v1_5",
5132
+ hash: hash
5133
+ }, extractable, [ isPublic ? "verify" : "sign" ]);
5134
+ }
5135
+ if (keyObject.asymmetricKeyType === "ec") {
5136
+ var _keyObject$asymmetric;
5137
+ const nist = new Map([ [ "prime256v1", "P-256" ], [ "secp384r1", "P-384" ], [ "secp521r1", "P-521" ] ]);
5138
+ const namedCurve = nist.get((_keyObject$asymmetric = keyObject.asymmetricKeyDetails) === null || _keyObject$asymmetric === void 0 ? void 0 : _keyObject$asymmetric.namedCurve);
5139
+ if (!namedCurve) {
5140
+ throw new TypeError(unusableForAlg);
5141
+ }
5142
+ const expectedCurve = {
5143
+ ES256: "P-256",
5144
+ ES384: "P-384",
5145
+ ES512: "P-521"
5146
+ };
5147
+ if (expectedCurve[alg] && namedCurve === expectedCurve[alg]) {
5148
+ cryptoKey = keyObject.toCryptoKey({
5149
+ name: "ECDSA",
5150
+ namedCurve: namedCurve
5151
+ }, extractable, [ isPublic ? "verify" : "sign" ]);
5152
+ }
5153
+ if (alg.startsWith("ECDH-ES")) {
5154
+ cryptoKey = keyObject.toCryptoKey({
5155
+ name: "ECDH",
5156
+ namedCurve: namedCurve
5157
+ }, extractable, isPublic ? [] : [ "deriveBits" ]);
5158
+ }
5159
+ }
5160
+ if (!cryptoKey) {
5161
+ throw new TypeError(unusableForAlg);
4722
5162
  }
4723
- return message("Key for the ".concat(alg, " algorithm must be "), actual, ...types);
4724
- };
4725
-
4726
- const isCryptoKey = key => {
4727
- if ((key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "CryptoKey") return true;
4728
- try {
4729
- return key instanceof CryptoKey;
4730
- } catch (_unused) {
4731
- return false;
5163
+ if (!cached) {
5164
+ cache.set(keyObject, {
5165
+ [alg]: cryptoKey
5166
+ });
5167
+ } else {
5168
+ cached[alg] = cryptoKey;
4732
5169
  }
5170
+ return cryptoKey;
4733
5171
  };
4734
5172
 
4735
- const isKeyObject = key => (key === null || key === void 0 ? void 0 : key[Symbol.toStringTag]) === "KeyObject";
4736
-
4737
- const isKeyLike = key => isCryptoKey(key) || isKeyObject(key);
4738
-
4739
- function isDisjoint() {
4740
- for (var _len = arguments.length, headers = new Array(_len), _key = 0; _key < _len; _key++) {
4741
- headers[_key] = arguments[_key];
5173
+ async function normalizeKey(key, alg) {
5174
+ if (key instanceof Uint8Array) {
5175
+ return key;
4742
5176
  }
4743
- const sources = headers.filter(Boolean);
4744
- if (sources.length === 0 || sources.length === 1) {
4745
- return true;
5177
+ if (isCryptoKey(key)) {
5178
+ return key;
4746
5179
  }
4747
- let acc;
4748
- for (const header of sources) {
4749
- const parameters = Object.keys(header);
4750
- if (!acc || acc.size === 0) {
4751
- acc = new Set(parameters);
4752
- continue;
5180
+ if (isKeyObject(key)) {
5181
+ if (key.type === "secret") {
5182
+ return key.export();
4753
5183
  }
4754
- for (const parameter of parameters) {
4755
- if (acc.has(parameter)) {
4756
- return false;
5184
+ if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
5185
+ try {
5186
+ return handleKeyObject(key, alg);
5187
+ } catch (err) {
5188
+ if (err instanceof TypeError) {
5189
+ throw err;
5190
+ }
4757
5191
  }
4758
- acc.add(parameter);
4759
5192
  }
5193
+ let jwk = key.export({
5194
+ format: "jwk"
5195
+ });
5196
+ return handleJWK(key, jwk, alg);
4760
5197
  }
4761
- return true;
4762
- }
4763
-
4764
- const isObjectLike = value => typeof value === "object" && value !== null;
4765
-
4766
- function isObject(input) {
4767
- if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
4768
- return false;
4769
- }
4770
- if (Object.getPrototypeOf(input) === null) {
4771
- return true;
4772
- }
4773
- let proto = input;
4774
- while (Object.getPrototypeOf(proto) !== null) {
4775
- proto = Object.getPrototypeOf(proto);
4776
- }
4777
- return Object.getPrototypeOf(input) === proto;
4778
- }
4779
-
4780
- function checkKeyLength(alg, key) {
4781
- if (alg.startsWith("RS") || alg.startsWith("PS")) {
4782
- const {modulusLength: modulusLength} = key.algorithm;
4783
- if (typeof modulusLength !== "number" || modulusLength < 2048) {
4784
- throw new TypeError("".concat(alg, " requires key modulusLength to be 2048 bits or larger"));
5198
+ if (isJWK(key)) {
5199
+ if (key.k) {
5200
+ return decode(key.k);
4785
5201
  }
5202
+ return handleJWK(key, key, alg, true);
4786
5203
  }
5204
+ throw new Error("unreachable");
4787
5205
  }
4788
5206
 
4789
5207
  const bytesEqual = (a, b) => {
@@ -4927,223 +5345,67 @@ const genericImport = async (keyFormat, keyData, alg, options) => {
4927
5345
  };
4928
5346
  keyUsages = getSigUsages();
4929
5347
  break;
4930
- }
4931
-
4932
- case "ECDH-ES":
4933
- case "ECDH-ES+A128KW":
4934
- case "ECDH-ES+A192KW":
4935
- case "ECDH-ES+A256KW":
4936
- {
4937
- try {
4938
- const namedCurve = options.getNamedCurve(keyData);
4939
- algorithm = namedCurve === "X25519" ? {
4940
- name: "X25519"
4941
- } : {
4942
- name: "ECDH",
4943
- namedCurve: namedCurve
4944
- };
4945
- } catch (cause) {
4946
- throw new JOSENotSupported("Invalid or unsupported key format");
4947
- }
4948
- keyUsages = isPublic ? [] : [ "deriveBits" ];
4949
- break;
4950
- }
4951
-
4952
- case "Ed25519":
4953
- case "EdDSA":
4954
- algorithm = {
4955
- name: "Ed25519"
4956
- };
4957
- keyUsages = getSigUsages();
4958
- break;
4959
-
4960
- case "ML-DSA-44":
4961
- case "ML-DSA-65":
4962
- case "ML-DSA-87":
4963
- algorithm = {
4964
- name: alg
4965
- };
4966
- keyUsages = getSigUsages();
4967
- break;
4968
-
4969
- default:
4970
- throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
4971
- }
4972
- return crypto.subtle.importKey(keyFormat, keyData, algorithm, (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : isPublic ? true : false, keyUsages);
4973
- };
4974
-
4975
- const processPEMData = (pem, pattern) => decodeBase64(pem.replace(pattern, ""));
4976
-
4977
- const fromPKCS8 = (pem, alg, options) => {
4978
- var _alg$startsWith;
4979
- const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g);
4980
- let opts = options;
4981
- if (alg !== null && alg !== void 0 && (_alg$startsWith = alg.startsWith) !== null && _alg$startsWith !== void 0 && _alg$startsWith.call(alg, "ECDH-ES")) {
4982
- opts || (opts = {});
4983
- opts.getNamedCurve = keyData => {
4984
- const state = createASN1State(keyData);
4985
- parsePKCS8Header(state);
4986
- return parseECAlgorithmIdentifier(state);
4987
- };
4988
- }
4989
- return genericImport("pkcs8", keyData, alg, opts);
4990
- };
4991
-
4992
- function subtleMapping(jwk) {
4993
- let algorithm;
4994
- let keyUsages;
4995
- switch (jwk.kty) {
4996
- case "AKP":
4997
- {
4998
- switch (jwk.alg) {
4999
- case "ML-DSA-44":
5000
- case "ML-DSA-65":
5001
- case "ML-DSA-87":
5002
- algorithm = {
5003
- name: jwk.alg
5004
- };
5005
- keyUsages = jwk.priv ? [ "sign" ] : [ "verify" ];
5006
- break;
5007
-
5008
- default:
5009
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
5010
- }
5011
- break;
5012
- }
5013
-
5014
- case "RSA":
5015
- {
5016
- switch (jwk.alg) {
5017
- case "PS256":
5018
- case "PS384":
5019
- case "PS512":
5020
- algorithm = {
5021
- name: "RSA-PSS",
5022
- hash: "SHA-".concat(jwk.alg.slice(-3))
5023
- };
5024
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
5025
- break;
5026
-
5027
- case "RS256":
5028
- case "RS384":
5029
- case "RS512":
5030
- algorithm = {
5031
- name: "RSASSA-PKCS1-v1_5",
5032
- hash: "SHA-".concat(jwk.alg.slice(-3))
5033
- };
5034
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
5035
- break;
5036
-
5037
- case "RSA-OAEP":
5038
- case "RSA-OAEP-256":
5039
- case "RSA-OAEP-384":
5040
- case "RSA-OAEP-512":
5041
- algorithm = {
5042
- name: "RSA-OAEP",
5043
- hash: "SHA-".concat(parseInt(jwk.alg.slice(-3), 10) || 1)
5044
- };
5045
- keyUsages = jwk.d ? [ "decrypt", "unwrapKey" ] : [ "encrypt", "wrapKey" ];
5046
- break;
5047
-
5048
- default:
5049
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
5050
- }
5051
- break;
5052
- }
5053
-
5054
- case "EC":
5055
- {
5056
- switch (jwk.alg) {
5057
- case "ES256":
5058
- algorithm = {
5059
- name: "ECDSA",
5060
- namedCurve: "P-256"
5061
- };
5062
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
5063
- break;
5064
-
5065
- case "ES384":
5066
- algorithm = {
5067
- name: "ECDSA",
5068
- namedCurve: "P-384"
5069
- };
5070
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
5071
- break;
5072
-
5073
- case "ES512":
5074
- algorithm = {
5075
- name: "ECDSA",
5076
- namedCurve: "P-521"
5077
- };
5078
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
5079
- break;
5080
-
5081
- case "ECDH-ES":
5082
- case "ECDH-ES+A128KW":
5083
- case "ECDH-ES+A192KW":
5084
- case "ECDH-ES+A256KW":
5085
- algorithm = {
5086
- name: "ECDH",
5087
- namedCurve: jwk.crv
5088
- };
5089
- keyUsages = jwk.d ? [ "deriveBits" ] : [];
5090
- break;
5091
-
5092
- default:
5093
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
5094
- }
5095
- break;
5096
- }
5097
-
5098
- case "OKP":
5099
- {
5100
- switch (jwk.alg) {
5101
- case "Ed25519":
5102
- case "EdDSA":
5103
- algorithm = {
5104
- name: "Ed25519"
5105
- };
5106
- keyUsages = jwk.d ? [ "sign" ] : [ "verify" ];
5107
- break;
5348
+ }
5108
5349
 
5109
- case "ECDH-ES":
5110
- case "ECDH-ES+A128KW":
5111
- case "ECDH-ES+A192KW":
5112
- case "ECDH-ES+A256KW":
5113
- algorithm = {
5114
- name: jwk.crv
5350
+ case "ECDH-ES":
5351
+ case "ECDH-ES+A128KW":
5352
+ case "ECDH-ES+A192KW":
5353
+ case "ECDH-ES+A256KW":
5354
+ {
5355
+ try {
5356
+ const namedCurve = options.getNamedCurve(keyData);
5357
+ algorithm = namedCurve === "X25519" ? {
5358
+ name: "X25519"
5359
+ } : {
5360
+ name: "ECDH",
5361
+ namedCurve: namedCurve
5115
5362
  };
5116
- keyUsages = jwk.d ? [ "deriveBits" ] : [];
5117
- break;
5118
-
5119
- default:
5120
- throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
5363
+ } catch (cause) {
5364
+ throw new JOSENotSupported("Invalid or unsupported key format");
5121
5365
  }
5366
+ keyUsages = isPublic ? [] : [ "deriveBits" ];
5122
5367
  break;
5123
5368
  }
5124
5369
 
5370
+ case "Ed25519":
5371
+ case "EdDSA":
5372
+ algorithm = {
5373
+ name: "Ed25519"
5374
+ };
5375
+ keyUsages = getSigUsages();
5376
+ break;
5377
+
5378
+ case "ML-DSA-44":
5379
+ case "ML-DSA-65":
5380
+ case "ML-DSA-87":
5381
+ algorithm = {
5382
+ name: alg
5383
+ };
5384
+ keyUsages = getSigUsages();
5385
+ break;
5386
+
5125
5387
  default:
5126
- throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
5388
+ throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
5127
5389
  }
5128
- return {
5129
- algorithm: algorithm,
5130
- keyUsages: keyUsages
5131
- };
5132
- }
5390
+ return crypto.subtle.importKey(keyFormat, keyData, algorithm, (_options$extractable = options === null || options === void 0 ? void 0 : options.extractable) !== null && _options$extractable !== void 0 ? _options$extractable : isPublic ? true : false, keyUsages);
5391
+ };
5133
5392
 
5134
- async function jwkToKey(jwk) {
5135
- var _jwk$ext, _jwk$key_ops;
5136
- if (!jwk.alg) {
5137
- throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
5138
- }
5139
- const {algorithm: algorithm, keyUsages: keyUsages} = subtleMapping(jwk);
5140
- const keyData = _objectSpread2({}, jwk);
5141
- if (keyData.kty !== "AKP") {
5142
- delete keyData.alg;
5393
+ const processPEMData = (pem, pattern) => decodeBase64(pem.replace(pattern, ""));
5394
+
5395
+ const fromPKCS8 = (pem, alg, options) => {
5396
+ var _alg$startsWith;
5397
+ const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g);
5398
+ let opts = options;
5399
+ if (alg !== null && alg !== void 0 && (_alg$startsWith = alg.startsWith) !== null && _alg$startsWith !== void 0 && _alg$startsWith.call(alg, "ECDH-ES")) {
5400
+ opts || (opts = {});
5401
+ opts.getNamedCurve = keyData => {
5402
+ const state = createASN1State(keyData);
5403
+ parsePKCS8Header(state);
5404
+ return parseECAlgorithmIdentifier(state);
5405
+ };
5143
5406
  }
5144
- delete keyData.use;
5145
- return crypto.subtle.importKey("jwk", keyData, algorithm, (_jwk$ext = jwk.ext) !== null && _jwk$ext !== void 0 ? _jwk$ext : jwk.d || jwk.priv ? false : true, (_jwk$key_ops = jwk.key_ops) !== null && _jwk$key_ops !== void 0 ? _jwk$key_ops : keyUsages);
5146
- }
5407
+ return genericImport("pkcs8", keyData, alg, opts);
5408
+ };
5147
5409
 
5148
5410
  async function importPKCS8(pkcs8, alg, options) {
5149
5411
  if (typeof pkcs8 !== "string" || pkcs8.indexOf("-----BEGIN PRIVATE KEY-----") !== 0) {
@@ -5194,239 +5456,51 @@ async function importJWK(jwk, alg, options) {
5194
5456
  return jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5195
5457
  alg: alg,
5196
5458
  ext: ext
5197
- }));
5198
-
5199
- default:
5200
- throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
5201
- }
5202
- }
5203
-
5204
- function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
5205
- if (joseHeader.crit !== undefined && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === undefined) {
5206
- throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
5207
- }
5208
- if (!protectedHeader || protectedHeader.crit === undefined) {
5209
- return new Set;
5210
- }
5211
- if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some((input => typeof input !== "string" || input.length === 0))) {
5212
- throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
5213
- }
5214
- let recognized;
5215
- if (recognizedOption !== undefined) {
5216
- recognized = new Map([ ...Object.entries(recognizedOption), ...recognizedDefault.entries() ]);
5217
- } else {
5218
- recognized = recognizedDefault;
5219
- }
5220
- for (const parameter of protectedHeader.crit) {
5221
- if (!recognized.has(parameter)) {
5222
- throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
5223
- }
5224
- if (joseHeader[parameter] === undefined) {
5225
- throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
5226
- }
5227
- if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
5228
- throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
5229
- }
5230
- }
5231
- return new Set(protectedHeader.crit);
5232
- }
5233
-
5234
- function validateAlgorithms(option, algorithms) {
5235
- if (algorithms !== undefined && (!Array.isArray(algorithms) || algorithms.some((s => typeof s !== "string")))) {
5236
- throw new TypeError('"'.concat(option, '" option must be an array of strings'));
5237
- }
5238
- if (!algorithms) {
5239
- return undefined;
5240
- }
5241
- return new Set(algorithms);
5242
- }
5243
-
5244
- const isJWK = key => isObject(key) && typeof key.kty === "string";
5245
-
5246
- const isPrivateJWK = key => key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
5247
-
5248
- const isPublicJWK = key => key.kty !== "oct" && key.d === undefined && key.priv === undefined;
5249
-
5250
- const isSecretJWK = key => key.kty === "oct" && typeof key.k === "string";
5251
-
5252
- let cache;
5253
-
5254
- const handleJWK = async function handleJWK(key, jwk, alg) {
5255
- let freeze = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : false;
5256
- cache || (cache = new WeakMap);
5257
- let cached = cache.get(key);
5258
- if (cached !== null && cached !== void 0 && cached[alg]) {
5259
- return cached[alg];
5260
- }
5261
- const cryptoKey = await jwkToKey(_objectSpread2(_objectSpread2({}, jwk), {}, {
5262
- alg: alg
5263
- }));
5264
- if (freeze) Object.freeze(key);
5265
- if (!cached) {
5266
- cache.set(key, {
5267
- [alg]: cryptoKey
5268
- });
5269
- } else {
5270
- cached[alg] = cryptoKey;
5271
- }
5272
- return cryptoKey;
5273
- };
5274
-
5275
- const handleKeyObject = (keyObject, alg) => {
5276
- cache || (cache = new WeakMap);
5277
- let cached = cache.get(keyObject);
5278
- if (cached !== null && cached !== void 0 && cached[alg]) {
5279
- return cached[alg];
5280
- }
5281
- const isPublic = keyObject.type === "public";
5282
- const extractable = isPublic ? true : false;
5283
- let cryptoKey;
5284
- if (keyObject.asymmetricKeyType === "x25519") {
5285
- switch (alg) {
5286
- case "ECDH-ES":
5287
- case "ECDH-ES+A128KW":
5288
- case "ECDH-ES+A192KW":
5289
- case "ECDH-ES+A256KW":
5290
- break;
5291
-
5292
- default:
5293
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
5294
- }
5295
- cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : [ "deriveBits" ]);
5296
- }
5297
- if (keyObject.asymmetricKeyType === "ed25519") {
5298
- if (alg !== "EdDSA" && alg !== "Ed25519") {
5299
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
5300
- }
5301
- cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
5302
- }
5303
- switch (keyObject.asymmetricKeyType) {
5304
- case "ml-dsa-44":
5305
- case "ml-dsa-65":
5306
- case "ml-dsa-87":
5307
- {
5308
- if (alg !== keyObject.asymmetricKeyType.toUpperCase()) {
5309
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
5310
- }
5311
- cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [ isPublic ? "verify" : "sign" ]);
5312
- }
5313
- }
5314
- if (keyObject.asymmetricKeyType === "rsa") {
5315
- let hash;
5316
- switch (alg) {
5317
- case "RSA-OAEP":
5318
- hash = "SHA-1";
5319
- break;
5320
-
5321
- case "RS256":
5322
- case "PS256":
5323
- case "RSA-OAEP-256":
5324
- hash = "SHA-256";
5325
- break;
5326
-
5327
- case "RS384":
5328
- case "PS384":
5329
- case "RSA-OAEP-384":
5330
- hash = "SHA-384";
5331
- break;
5332
-
5333
- case "RS512":
5334
- case "PS512":
5335
- case "RSA-OAEP-512":
5336
- hash = "SHA-512";
5337
- break;
5338
-
5339
- default:
5340
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
5341
- }
5342
- if (alg.startsWith("RSA-OAEP")) {
5343
- return keyObject.toCryptoKey({
5344
- name: "RSA-OAEP",
5345
- hash: hash
5346
- }, extractable, isPublic ? [ "encrypt" ] : [ "decrypt" ]);
5347
- }
5348
- cryptoKey = keyObject.toCryptoKey({
5349
- name: alg.startsWith("PS") ? "RSA-PSS" : "RSASSA-PKCS1-v1_5",
5350
- hash: hash
5351
- }, extractable, [ isPublic ? "verify" : "sign" ]);
5352
- }
5353
- if (keyObject.asymmetricKeyType === "ec") {
5354
- var _keyObject$asymmetric;
5355
- const nist = new Map([ [ "prime256v1", "P-256" ], [ "secp384r1", "P-384" ], [ "secp521r1", "P-521" ] ]);
5356
- const namedCurve = nist.get((_keyObject$asymmetric = keyObject.asymmetricKeyDetails) === null || _keyObject$asymmetric === void 0 ? void 0 : _keyObject$asymmetric.namedCurve);
5357
- if (!namedCurve) {
5358
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
5359
- }
5360
- if (alg === "ES256" && namedCurve === "P-256") {
5361
- cryptoKey = keyObject.toCryptoKey({
5362
- name: "ECDSA",
5363
- namedCurve: namedCurve
5364
- }, extractable, [ isPublic ? "verify" : "sign" ]);
5365
- }
5366
- if (alg === "ES384" && namedCurve === "P-384") {
5367
- cryptoKey = keyObject.toCryptoKey({
5368
- name: "ECDSA",
5369
- namedCurve: namedCurve
5370
- }, extractable, [ isPublic ? "verify" : "sign" ]);
5371
- }
5372
- if (alg === "ES512" && namedCurve === "P-521") {
5373
- cryptoKey = keyObject.toCryptoKey({
5374
- name: "ECDSA",
5375
- namedCurve: namedCurve
5376
- }, extractable, [ isPublic ? "verify" : "sign" ]);
5377
- }
5378
- if (alg.startsWith("ECDH-ES")) {
5379
- cryptoKey = keyObject.toCryptoKey({
5380
- name: "ECDH",
5381
- namedCurve: namedCurve
5382
- }, extractable, isPublic ? [] : [ "deriveBits" ]);
5383
- }
5459
+ }));
5460
+
5461
+ default:
5462
+ throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
5384
5463
  }
5385
- if (!cryptoKey) {
5386
- throw new TypeError("given KeyObject instance cannot be used for this algorithm");
5464
+ }
5465
+
5466
+ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
5467
+ if (joseHeader.crit !== undefined && (protectedHeader === null || protectedHeader === void 0 ? void 0 : protectedHeader.crit) === undefined) {
5468
+ throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
5387
5469
  }
5388
- if (!cached) {
5389
- cache.set(keyObject, {
5390
- [alg]: cryptoKey
5391
- });
5392
- } else {
5393
- cached[alg] = cryptoKey;
5470
+ if (!protectedHeader || protectedHeader.crit === undefined) {
5471
+ return new Set;
5394
5472
  }
5395
- return cryptoKey;
5396
- };
5397
-
5398
- async function normalizeKey(key, alg) {
5399
- if (key instanceof Uint8Array) {
5400
- return key;
5473
+ if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some(input => typeof input !== "string" || input.length === 0)) {
5474
+ throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
5401
5475
  }
5402
- if (isCryptoKey(key)) {
5403
- return key;
5476
+ let recognized;
5477
+ if (recognizedOption !== undefined) {
5478
+ recognized = new Map([ ...Object.entries(recognizedOption), ...recognizedDefault.entries() ]);
5479
+ } else {
5480
+ recognized = recognizedDefault;
5404
5481
  }
5405
- if (isKeyObject(key)) {
5406
- if (key.type === "secret") {
5407
- return key.export();
5482
+ for (const parameter of protectedHeader.crit) {
5483
+ if (!recognized.has(parameter)) {
5484
+ throw new JOSENotSupported('Extension Header Parameter "'.concat(parameter, '" is not recognized'));
5408
5485
  }
5409
- if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
5410
- try {
5411
- return handleKeyObject(key, alg);
5412
- } catch (err) {
5413
- if (err instanceof TypeError) {
5414
- throw err;
5415
- }
5416
- }
5486
+ if (joseHeader[parameter] === undefined) {
5487
+ throw new Err('Extension Header Parameter "'.concat(parameter, '" is missing'));
5417
5488
  }
5418
- let jwk = key.export({
5419
- format: "jwk"
5420
- });
5421
- return handleJWK(key, jwk, alg);
5422
- }
5423
- if (isJWK(key)) {
5424
- if (key.k) {
5425
- return decode(key.k);
5489
+ if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
5490
+ throw new Err('Extension Header Parameter "'.concat(parameter, '" MUST be integrity protected'));
5426
5491
  }
5427
- return handleJWK(key, key, alg, true);
5428
5492
  }
5429
- throw new Error("unreachable");
5493
+ return new Set(protectedHeader.crit);
5494
+ }
5495
+
5496
+ function validateAlgorithms(option, algorithms) {
5497
+ if (algorithms !== undefined && (!Array.isArray(algorithms) || algorithms.some(s => typeof s !== "string"))) {
5498
+ throw new TypeError('"'.concat(option, '" option must be an array of strings'));
5499
+ }
5500
+ if (!algorithms) {
5501
+ return undefined;
5502
+ }
5503
+ return new Set(algorithms);
5430
5504
  }
5431
5505
 
5432
5506
  const tag = key => key === null || key === void 0 ? void 0 : key[Symbol.toStringTag];
@@ -5566,7 +5640,7 @@ let USER_AGENT$1;
5566
5640
 
5567
5641
  if (typeof navigator === "undefined" || !((_navigator$userAgent$1 = navigator.userAgent) !== null && _navigator$userAgent$1 !== void 0 && (_navigator$userAgent$$1 = _navigator$userAgent$1.startsWith) !== null && _navigator$userAgent$$1 !== void 0 && _navigator$userAgent$$1.call(_navigator$userAgent$1, "Mozilla/5.0 "))) {
5568
5642
  const NAME = "openid-client";
5569
- const VERSION = "v6.8.1";
5643
+ const VERSION = "v6.8.2";
5570
5644
  USER_AGENT$1 = "".concat(NAME, "/").concat(VERSION);
5571
5645
  headers = {
5572
5646
  "user-agent": USER_AGENT$1
@@ -5778,7 +5852,7 @@ async function performDiscovery(server, options) {
5778
5852
  method: "GET",
5779
5853
  redirect: "manual",
5780
5854
  signal: signal
5781
- })).then((response => processDiscoveryResponse(_nodiscoverycheck, response))).catch(errorHandler);
5855
+ })).then(response => processDiscoveryResponse(_nodiscoverycheck, response)).catch(errorHandler);
5782
5856
  if (resolve && new URL(as.issuer).href !== server.href) {
5783
5857
  handleEntraId(server, as, options) || handleB2Clogin(server, options) || (() => {
5784
5858
  throw new ClientError("discovered metadata issuer does not match the expected issuer", {
@@ -5953,7 +6027,7 @@ async function handleRetryAfter(response, currentInterval, signal) {
5953
6027
  }
5954
6028
 
5955
6029
  function wait(duration, signal) {
5956
- return new Promise(((resolve, reject) => {
6030
+ return new Promise((resolve, reject) => {
5957
6031
  const waitStep = remaining => {
5958
6032
  try {
5959
6033
  signal.throwIfAborted();
@@ -5966,10 +6040,10 @@ function wait(duration, signal) {
5966
6040
  return;
5967
6041
  }
5968
6042
  const currentWait = Math.min(remaining, 5);
5969
- setTimeout((() => waitStep(remaining - currentWait)), currentWait * 1e3);
6043
+ setTimeout(() => waitStep(remaining - currentWait), currentWait * 1e3);
5970
6044
  };
5971
6045
  waitStep(duration);
5972
- }));
6046
+ });
5973
6047
  }
5974
6048
 
5975
6049
  async function initiateBackchannelAuthentication(config, parameters) {
@@ -5980,7 +6054,7 @@ async function initiateBackchannelAuthentication(config, parameters) {
5980
6054
  [allowInsecureRequests$1]: !tlsOnly,
5981
6055
  headers: new Headers(headers),
5982
6056
  signal: signal(timeout)
5983
- }).then((response => processBackchannelAuthenticationResponse(as, c, response))).catch(errorHandler);
6057
+ }).then(response => processBackchannelAuthenticationResponse(as, c, response)).catch(errorHandler);
5984
6058
  }
5985
6059
 
5986
6060
  async function pollBackchannelAuthenticationGrant(config, backchannelAuthenticationResponse, parameters, options) {
@@ -6307,7 +6381,7 @@ async function genericGrantRequest(config, grantType, parameters, options) {
6307
6381
  DPoP: options === null || options === void 0 ? void 0 : options.DPoP,
6308
6382
  headers: new Headers(headers),
6309
6383
  signal: signal(timeout)
6310
- }).then((response => {
6384
+ }).then(response => {
6311
6385
  let recognizedTokenTypes;
6312
6386
  if (grantType === "urn:ietf:params:oauth:grant-type:token-exchange") {
6313
6387
  recognizedTokenTypes = {
@@ -6318,91 +6392,11 @@ async function genericGrantRequest(config, grantType, parameters, options) {
6318
6392
  [jweDecrypt]: decrypt,
6319
6393
  recognizedTokenTypes: recognizedTokenTypes
6320
6394
  });
6321
- })).catch(errorHandler);
6395
+ }).catch(errorHandler);
6322
6396
  addHelpers(result);
6323
6397
  return result;
6324
6398
  }
6325
6399
 
6326
- function subtleAlgorithm(alg, algorithm) {
6327
- const hash = "SHA-".concat(alg.slice(-3));
6328
- switch (alg) {
6329
- case "HS256":
6330
- case "HS384":
6331
- case "HS512":
6332
- return {
6333
- hash: hash,
6334
- name: "HMAC"
6335
- };
6336
-
6337
- case "PS256":
6338
- case "PS384":
6339
- case "PS512":
6340
- return {
6341
- hash: hash,
6342
- name: "RSA-PSS",
6343
- saltLength: parseInt(alg.slice(-3), 10) >> 3
6344
- };
6345
-
6346
- case "RS256":
6347
- case "RS384":
6348
- case "RS512":
6349
- return {
6350
- hash: hash,
6351
- name: "RSASSA-PKCS1-v1_5"
6352
- };
6353
-
6354
- case "ES256":
6355
- case "ES384":
6356
- case "ES512":
6357
- return {
6358
- hash: hash,
6359
- name: "ECDSA",
6360
- namedCurve: algorithm.namedCurve
6361
- };
6362
-
6363
- case "Ed25519":
6364
- case "EdDSA":
6365
- return {
6366
- name: "Ed25519"
6367
- };
6368
-
6369
- case "ML-DSA-44":
6370
- case "ML-DSA-65":
6371
- case "ML-DSA-87":
6372
- return {
6373
- name: alg
6374
- };
6375
-
6376
- default:
6377
- throw new JOSENotSupported("alg ".concat(alg, " is not supported either by JOSE or your javascript runtime"));
6378
- }
6379
- }
6380
-
6381
- async function getSigKey(alg, key, usage) {
6382
- if (key instanceof Uint8Array) {
6383
- if (!alg.startsWith("HS")) {
6384
- throw new TypeError(invalidKeyInput(key, "CryptoKey", "KeyObject", "JSON Web Key"));
6385
- }
6386
- return crypto.subtle.importKey("raw", key, {
6387
- hash: "SHA-".concat(alg.slice(-3)),
6388
- name: "HMAC"
6389
- }, false, [ usage ]);
6390
- }
6391
- checkSigCryptoKey(key, alg, usage);
6392
- return key;
6393
- }
6394
-
6395
- async function verify(alg, key, signature, data) {
6396
- const cryptoKey = await getSigKey(alg, key, "verify");
6397
- checkKeyLength(alg, cryptoKey);
6398
- const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);
6399
- try {
6400
- return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);
6401
- } catch (_unused) {
6402
- return false;
6403
- }
6404
- }
6405
-
6406
6400
  async function flattenedVerify(jws, key, options) {
6407
6401
  if (!isObject(jws)) {
6408
6402
  throw new JWSInvalid("Flattened JWS must be an object");
@@ -6465,12 +6459,7 @@ async function flattenedVerify(jws, key, options) {
6465
6459
  }
6466
6460
  checkKeyType(alg, key, "verify");
6467
6461
  const data = concat(jws.protected !== undefined ? encode(jws.protected) : new Uint8Array, encode("."), typeof jws.payload === "string" ? b64 ? encode(jws.payload) : encoder.encode(jws.payload) : jws.payload);
6468
- let signature;
6469
- try {
6470
- signature = decode(jws.signature);
6471
- } catch (_unused2) {
6472
- throw new JWSInvalid("Failed to base64url decode the signature");
6473
- }
6462
+ const signature = decodeBase64url(jws.signature, "signature", JWSInvalid);
6474
6463
  const k = await normalizeKey(key, alg);
6475
6464
  const verified = await verify(alg, k, signature, data);
6476
6465
  if (!verified) {
@@ -6478,11 +6467,7 @@ async function flattenedVerify(jws, key, options) {
6478
6467
  }
6479
6468
  let payload;
6480
6469
  if (b64) {
6481
- try {
6482
- payload = decode(jws.payload);
6483
- } catch (_unused3) {
6484
- throw new JWSInvalid("Failed to base64url decode the payload");
6485
- }
6470
+ payload = decodeBase64url(jws.payload, "payload", JWSInvalid);
6486
6471
  } else if (typeof jws.payload === "string") {
6487
6472
  payload = encoder.encode(jws.payload);
6488
6473
  } else {
@@ -6769,7 +6754,7 @@ class LocalJWKSet {
6769
6754
  async getKey(protectedHeader, token) {
6770
6755
  const {alg: alg, kid: kid} = _objectSpread2(_objectSpread2({}, protectedHeader), token === null || token === void 0 ? void 0 : token.header);
6771
6756
  const kty = getKtyFromAlg(alg);
6772
- const candidates = _classPrivateFieldGet2(_jwks$1, this).keys.filter((jwk => {
6757
+ const candidates = _classPrivateFieldGet2(_jwks$1, this).keys.filter(jwk => {
6773
6758
  let candidate = kty === jwk.kty;
6774
6759
  if (candidate && typeof kid === "string") {
6775
6760
  candidate = kid === jwk.kid;
@@ -6804,7 +6789,7 @@ class LocalJWKSet {
6804
6789
  }
6805
6790
  }
6806
6791
  return candidate;
6807
- }));
6792
+ });
6808
6793
  const {0: jwk, length: length} = candidates;
6809
6794
  if (length === 0) {
6810
6795
  throw new JWKSNoMatchingKey;
@@ -6812,13 +6797,13 @@ class LocalJWKSet {
6812
6797
  if (length !== 1) {
6813
6798
  const error = new JWKSMultipleMatchingKeys;
6814
6799
  const _cached = _classPrivateFieldGet2(_cached2, this);
6815
- error[Symbol.asyncIterator] = _wrapAsyncGenerator((function*() {
6800
+ error[Symbol.asyncIterator] = _wrapAsyncGenerator(function*() {
6816
6801
  for (const jwk of candidates) {
6817
6802
  try {
6818
6803
  yield yield _awaitAsyncGenerator(importWithAlgCache(_cached, jwk, alg));
6819
6804
  } catch (_unused) {}
6820
6805
  }
6821
- }));
6806
+ });
6822
6807
  throw error;
6823
6808
  }
6824
6809
  return importWithAlgCache(_classPrivateFieldGet2(_cached2, this), jwk, alg);
@@ -6863,7 +6848,7 @@ let USER_AGENT;
6863
6848
 
6864
6849
  if (typeof navigator === "undefined" || !((_navigator$userAgent = navigator.userAgent) !== null && _navigator$userAgent !== void 0 && (_navigator$userAgent$ = _navigator$userAgent.startsWith) !== null && _navigator$userAgent$ !== void 0 && _navigator$userAgent$.call(_navigator$userAgent, "Mozilla/5.0 "))) {
6865
6850
  const NAME = "jose";
6866
- const VERSION = "v6.1.3";
6851
+ const VERSION = "v6.2.1";
6867
6852
  USER_AGENT = "".concat(NAME, "/").concat(VERSION);
6868
6853
  }
6869
6854
 
@@ -6876,12 +6861,12 @@ async function fetchJwks(url, headers, signal) {
6876
6861
  signal: signal,
6877
6862
  redirect: "manual",
6878
6863
  headers: headers
6879
- }).catch((err => {
6864
+ }).catch(err => {
6880
6865
  if (err.name === "TimeoutError") {
6881
6866
  throw new JWKSTimeout;
6882
6867
  }
6883
6868
  throw err;
6884
- }));
6869
+ });
6885
6870
  if (response.status !== 200) {
6886
6871
  throw new JOSEError("Expected 200 OK from the JSON Web Key Set HTTP response");
6887
6872
  }
@@ -6996,7 +6981,7 @@ class RemoteJWKSet {
6996
6981
  if (_classPrivateFieldGet2(_pendingFetch, this) && isCloudflareWorkers()) {
6997
6982
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
6998
6983
  }
6999
- _classPrivateFieldGet2(_pendingFetch, this) || _classPrivateFieldSet2(_pendingFetch, this, fetchJwks(_classPrivateFieldGet2(_url, this).href, _classPrivateFieldGet2(_headers, this), AbortSignal.timeout(_classPrivateFieldGet2(_timeoutDuration, this)), _classPrivateFieldGet2(_customFetch$1, this)).then((json => {
6984
+ _classPrivateFieldGet2(_pendingFetch, this) || _classPrivateFieldSet2(_pendingFetch, this, fetchJwks(_classPrivateFieldGet2(_url, this).href, _classPrivateFieldGet2(_headers, this), AbortSignal.timeout(_classPrivateFieldGet2(_timeoutDuration, this)), _classPrivateFieldGet2(_customFetch$1, this)).then(json => {
7000
6985
  _classPrivateFieldSet2(_local, this, createLocalJWKSet(json));
7001
6986
  if (_classPrivateFieldGet2(_cache, this)) {
7002
6987
  _classPrivateFieldGet2(_cache, this).uat = Date.now();
@@ -7004,10 +6989,10 @@ class RemoteJWKSet {
7004
6989
  }
7005
6990
  _classPrivateFieldSet2(_jwksTimestamp, this, Date.now());
7006
6991
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
7007
- })).catch((err => {
6992
+ }).catch(err => {
7008
6993
  _classPrivateFieldSet2(_pendingFetch, this, undefined);
7009
6994
  throw err;
7010
- })));
6995
+ }));
7011
6996
  await _classPrivateFieldGet2(_pendingFetch, this);
7012
6997
  }
7013
6998
  }
@@ -7049,7 +7034,7 @@ function createRemoteJWKSet(url, options) {
7049
7034
 
7050
7035
  const _excluded = [ "mfaToken" ], _excluded2 = [ "mfaToken" ];
7051
7036
 
7052
- var _baseUrl, _clientId, _customFetch, _configuration, _serverMetadata, _options, _jwks, _Class8_brand;
7037
+ var _baseUrl, _clientId, _customFetch, _entries, _ttlMs, _maxEntries, _configuration, _serverMetadata, _clientAuthPromise, _options, _customFetch2, _jwks, _discoveryCache, _inFlightDiscovery, _jwksCache, _Class9_brand;
7053
7038
 
7054
7039
  var NotSupportedError = class NotSupportedError extends Error {
7055
7040
  constructor(code, message) {
@@ -7155,12 +7140,12 @@ var MissingClientAuthError = class MissingClientAuthError extends Error {
7155
7140
  };
7156
7141
 
7157
7142
  function stripUndefinedProperties(value) {
7158
- return Object.entries(value).filter((_ref => {
7143
+ return Object.entries(value).filter(_ref => {
7159
7144
  let [, value2] = _ref;
7160
7145
  return typeof value2 !== "undefined";
7161
- })).reduce(((acc, curr) => _objectSpread2(_objectSpread2({}, acc), {}, {
7146
+ }).reduce((acc, curr) => _objectSpread2(_objectSpread2({}, acc), {}, {
7162
7147
  [curr[0]]: curr[1]
7163
- })), {});
7148
+ }), {});
7164
7149
  }
7165
7150
 
7166
7151
  var MfaError$1 = class MfaError extends Error {
@@ -7232,7 +7217,9 @@ function transformEnrollmentResponse(api) {
7232
7217
  oobChannel: api.oob_channel,
7233
7218
  oobCode: api.oob_code,
7234
7219
  bindingMethod: api.binding_method,
7235
- id: api.id
7220
+ id: api.id,
7221
+ barcodeUri: api.barcode_uri,
7222
+ recoveryCodes: api.recovery_codes
7236
7223
  };
7237
7224
  }
7238
7225
  throw new Error("Unexpected authenticator type: ".concat(api.authenticator_type));
@@ -7353,6 +7340,42 @@ class MfaClient {
7353
7340
  }
7354
7341
  });
7355
7342
 
7343
+ function createTelemetryFetch(baseFetch, config) {
7344
+ if (config.enabled === false) {
7345
+ return baseFetch;
7346
+ }
7347
+ const telemetryData = {
7348
+ name: config.name,
7349
+ version: config.version
7350
+ };
7351
+ const headerValue = btoa(JSON.stringify(telemetryData));
7352
+ return async (input, init) => {
7353
+ const headers = input instanceof Request ? new Headers(input.headers) : new Headers;
7354
+ if (init !== null && init !== void 0 && init.headers) {
7355
+ const initHeaders = new Headers(init.headers);
7356
+ initHeaders.forEach((value, key) => {
7357
+ headers.set(key, value);
7358
+ });
7359
+ }
7360
+ headers.set("Auth0-Client", headerValue);
7361
+ return baseFetch(input, _objectSpread2(_objectSpread2({}, init), {}, {
7362
+ headers: headers
7363
+ }));
7364
+ };
7365
+ }
7366
+
7367
+ function getTelemetryConfig(config) {
7368
+ var _config$name, _config$version;
7369
+ if ((config === null || config === void 0 ? void 0 : config.enabled) === false) {
7370
+ return config;
7371
+ }
7372
+ return {
7373
+ enabled: true,
7374
+ name: (_config$name = config === null || config === void 0 ? void 0 : config.name) !== null && _config$name !== void 0 ? _config$name : "@auth0/auth0-auth-js",
7375
+ version: (_config$version = config === null || config === void 0 ? void 0 : config.version) !== null && _config$version !== void 0 ? _config$version : "1.5.0"
7376
+ };
7377
+ }
7378
+
7356
7379
  var TokenResponse = class _TokenResponse {
7357
7380
  constructor(accessToken, expiresAt, idToken, refreshToken, scope, claims, authorizationDetails) {
7358
7381
  _defineProperty(this, "accessToken", void 0);
@@ -7381,6 +7404,81 @@ var TokenResponse = class _TokenResponse {
7381
7404
  }
7382
7405
  };
7383
7406
 
7407
+ var LruCache = (_entries = new WeakMap, _ttlMs = new WeakMap, _maxEntries = new WeakMap,
7408
+ class LruCache {
7409
+ constructor(maxEntries, ttlMs) {
7410
+ _classPrivateFieldInitSpec(this, _entries, new Map);
7411
+ _classPrivateFieldInitSpec(this, _ttlMs, void 0);
7412
+ _classPrivateFieldInitSpec(this, _maxEntries, void 0);
7413
+ _classPrivateFieldSet2(_maxEntries, this, Math.max(1, Math.floor(maxEntries)));
7414
+ _classPrivateFieldSet2(_ttlMs, this, Math.max(0, Math.floor(ttlMs)));
7415
+ }
7416
+ get(key) {
7417
+ const entry = _classPrivateFieldGet2(_entries, this).get(key);
7418
+ if (!entry) {
7419
+ return;
7420
+ }
7421
+ if (Date.now() >= entry.expiresAt) {
7422
+ _classPrivateFieldGet2(_entries, this).delete(key);
7423
+ return;
7424
+ }
7425
+ _classPrivateFieldGet2(_entries, this).delete(key);
7426
+ _classPrivateFieldGet2(_entries, this).set(key, entry);
7427
+ return entry.value;
7428
+ }
7429
+ set(key, value) {
7430
+ if (_classPrivateFieldGet2(_entries, this).has(key)) {
7431
+ _classPrivateFieldGet2(_entries, this).delete(key);
7432
+ }
7433
+ _classPrivateFieldGet2(_entries, this).set(key, {
7434
+ value: value,
7435
+ expiresAt: Date.now() + _classPrivateFieldGet2(_ttlMs, this)
7436
+ });
7437
+ while (_classPrivateFieldGet2(_entries, this).size > _classPrivateFieldGet2(_maxEntries, this)) {
7438
+ const oldestKey = _classPrivateFieldGet2(_entries, this).keys().next().value;
7439
+ if (oldestKey === void 0) {
7440
+ break;
7441
+ }
7442
+ _classPrivateFieldGet2(_entries, this).delete(oldestKey);
7443
+ }
7444
+ }
7445
+ });
7446
+
7447
+ var globalCaches = new Map;
7448
+
7449
+ function getGlobalCache(key) {
7450
+ return globalCaches.get(key);
7451
+ }
7452
+
7453
+ function getGlobalCacheKey(maxEntries, ttlMs) {
7454
+ return "".concat(maxEntries, ":").concat(ttlMs);
7455
+ }
7456
+
7457
+ function resolveCacheConfig(options) {
7458
+ const ttlSeconds = typeof (options === null || options === void 0 ? void 0 : options.ttl) === "number" ? options.ttl : 600;
7459
+ const maxEntries = typeof (options === null || options === void 0 ? void 0 : options.maxEntries) === "number" && options.maxEntries > 0 ? options.maxEntries : 100;
7460
+ const ttlMs = ttlSeconds * 1e3;
7461
+ return {
7462
+ ttlMs: ttlMs,
7463
+ maxEntries: maxEntries
7464
+ };
7465
+ }
7466
+
7467
+ var DiscoveryCacheFactory = class {
7468
+ static createDiscoveryCache(config) {
7469
+ const cacheKey = getGlobalCacheKey(config.maxEntries, config.ttlMs);
7470
+ let cache = getGlobalCache(cacheKey);
7471
+ if (!cache) {
7472
+ cache = new LruCache(config.maxEntries, config.ttlMs);
7473
+ globalCaches.set(cacheKey, cache);
7474
+ }
7475
+ return cache;
7476
+ }
7477
+ static createJwksCache() {
7478
+ return {};
7479
+ }
7480
+ };
7481
+
7384
7482
  var DEFAULT_SCOPES = "openid profile email offline_access";
7385
7483
 
7386
7484
  var MAX_ARRAY_VALUES_PER_KEY = 20;
@@ -7413,9 +7511,9 @@ function appendExtraParams(params, extra) {
7413
7511
  if (parameterValue.length > MAX_ARRAY_VALUES_PER_KEY) {
7414
7512
  throw new TokenExchangeError("Parameter '".concat(parameterKey, "' exceeds maximum array size of ").concat(MAX_ARRAY_VALUES_PER_KEY));
7415
7513
  }
7416
- parameterValue.forEach((arrayItem => {
7514
+ parameterValue.forEach(arrayItem => {
7417
7515
  params.append(parameterKey, arrayItem);
7418
- }));
7516
+ });
7419
7517
  } else {
7420
7518
  params.append(parameterKey, parameterValue);
7421
7519
  }
@@ -7432,39 +7530,58 @@ var SUBJECT_TYPE_ACCESS_TOKEN = "urn:ietf:params:oauth:token-type:access_token";
7432
7530
 
7433
7531
  var REQUESTED_TOKEN_TYPE_FEDERATED_CONNECTION_ACCESS_TOKEN = "http://auth0.com/oauth/token-type/federated-connection-access-token";
7434
7532
 
7435
- var AuthClient = (_configuration = new WeakMap, _serverMetadata = new WeakMap, _options = new WeakMap,
7436
- _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7533
+ var AuthClient = (_configuration = new WeakMap, _serverMetadata = new WeakMap, _clientAuthPromise = new WeakMap,
7534
+ _options = new WeakMap, _customFetch2 = new WeakMap, _jwks = new WeakMap, _discoveryCache = new WeakMap,
7535
+ _inFlightDiscovery = new WeakMap, _jwksCache = new WeakMap, _Class9_brand = new WeakSet,
7536
+ class AuthClient {
7437
7537
  constructor(_options2) {
7438
- _classPrivateMethodInitSpec(this, _Class8_brand);
7538
+ var _options2$customFetch;
7539
+ _classPrivateMethodInitSpec(this, _Class9_brand);
7439
7540
  _classPrivateFieldInitSpec(this, _configuration, void 0);
7440
7541
  _classPrivateFieldInitSpec(this, _serverMetadata, void 0);
7542
+ _classPrivateFieldInitSpec(this, _clientAuthPromise, void 0);
7441
7543
  _classPrivateFieldInitSpec(this, _options, void 0);
7544
+ _classPrivateFieldInitSpec(this, _customFetch2, void 0);
7442
7545
  _classPrivateFieldInitSpec(this, _jwks, void 0);
7546
+ _classPrivateFieldInitSpec(this, _discoveryCache, void 0);
7547
+ _classPrivateFieldInitSpec(this, _inFlightDiscovery, void 0);
7548
+ _classPrivateFieldInitSpec(this, _jwksCache, void 0);
7443
7549
  _defineProperty(this, "mfa", void 0);
7444
7550
  _classPrivateFieldSet2(_options, this, _options2);
7445
7551
  if (_options2.useMtls && !_options2.customFetch) {
7446
7552
  throw new NotSupportedError("mtls_without_custom_fetch_not_supported", "Using mTLS without a custom fetch implementation is not supported");
7447
7553
  }
7554
+ _classPrivateFieldSet2(_customFetch2, this, createTelemetryFetch((_options2$customFetch = _options2.customFetch) !== null && _options2$customFetch !== void 0 ? _options2$customFetch : function() {
7555
+ return fetch(...arguments);
7556
+ }, getTelemetryConfig(_options2.telemetry)));
7557
+ const cacheConfig = resolveCacheConfig(_options2.discoveryCache);
7558
+ _classPrivateFieldSet2(_discoveryCache, this, DiscoveryCacheFactory.createDiscoveryCache(cacheConfig));
7559
+ _classPrivateFieldSet2(_inFlightDiscovery, this, new Map);
7560
+ _classPrivateFieldSet2(_jwksCache, this, DiscoveryCacheFactory.createJwksCache());
7448
7561
  this.mfa = new MfaClient({
7449
7562
  domain: _classPrivateFieldGet2(_options, this).domain,
7450
7563
  clientId: _classPrivateFieldGet2(_options, this).clientId,
7451
- customFetch: _classPrivateFieldGet2(_options, this).customFetch
7564
+ customFetch: _classPrivateFieldGet2(_customFetch2, this)
7452
7565
  });
7453
7566
  }
7567
+ async getServerMetadata() {
7568
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7569
+ return serverMetadata;
7570
+ }
7454
7571
  async buildAuthorizationUrl(options) {
7455
- const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7572
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7456
7573
  if (options !== null && options !== void 0 && options.pushedAuthorizationRequests && !serverMetadata.pushed_authorization_request_endpoint) {
7457
7574
  throw new NotSupportedError("par_not_supported_error", "The Auth0 tenant does not have pushed authorization requests enabled. Learn how to enable it here: https://auth0.com/docs/get-started/applications/configure-par");
7458
7575
  }
7459
7576
  try {
7460
- return await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, options);
7577
+ return await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, options);
7461
7578
  } catch (e) {
7462
7579
  throw new BuildAuthorizationUrlError(e);
7463
7580
  }
7464
7581
  }
7465
7582
  async buildLinkUserUrl(options) {
7466
7583
  try {
7467
- const result = await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, {
7584
+ const result = await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, {
7468
7585
  authorizationParams: _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
7469
7586
  requested_connection: options.connection,
7470
7587
  requested_connection_scope: options.connectionScope,
@@ -7482,7 +7599,7 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7482
7599
  }
7483
7600
  async buildUnlinkUserUrl(options) {
7484
7601
  try {
7485
- const result = await _assertClassBrand(_Class8_brand, this, _buildAuthorizationUrl).call(this, {
7602
+ const result = await _assertClassBrand(_Class9_brand, this, _buildAuthorizationUrl).call(this, {
7486
7603
  authorizationParams: _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
7487
7604
  requested_connection: options.connection,
7488
7605
  scope: "openid unlink_account",
@@ -7498,7 +7615,7 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7498
7615
  }
7499
7616
  }
7500
7617
  async backchannelAuthentication(options) {
7501
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7618
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7502
7619
  const additionalParams = stripUndefinedProperties(_objectSpread2(_objectSpread2({}, _classPrivateFieldGet2(_options, this).authorizationParams), options === null || options === void 0 ? void 0 : options.authorizationParams));
7503
7620
  const params = new URLSearchParams(_objectSpread2(_objectSpread2({
7504
7621
  scope: DEFAULT_SCOPES
@@ -7526,7 +7643,7 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7526
7643
  }
7527
7644
  }
7528
7645
  async initiateBackchannelAuthentication(options) {
7529
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7646
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7530
7647
  const additionalParams = stripUndefinedProperties(_objectSpread2(_objectSpread2({}, _classPrivateFieldGet2(_options, this).authorizationParams), options === null || options === void 0 ? void 0 : options.authorizationParams));
7531
7648
  const params = new URLSearchParams(_objectSpread2(_objectSpread2({
7532
7649
  scope: DEFAULT_SCOPES
@@ -7558,7 +7675,7 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7558
7675
  }
7559
7676
  async backchannelAuthenticationGrant(_ref2) {
7560
7677
  let {authReqId: authReqId} = _ref2;
7561
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7678
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7562
7679
  const params = new URLSearchParams({
7563
7680
  auth_req_id: authReqId
7564
7681
  });
@@ -7593,10 +7710,10 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7593
7710
  }
7594
7711
  }
7595
7712
  async exchangeToken(options) {
7596
- return "connection" in options ? _assertClassBrand(_Class8_brand, this, _exchangeTokenVaultToken).call(this, options) : _assertClassBrand(_Class8_brand, this, _exchangeProfileToken).call(this, options);
7713
+ return "connection" in options ? _assertClassBrand(_Class9_brand, this, _exchangeTokenVaultToken).call(this, options) : _assertClassBrand(_Class9_brand, this, _exchangeProfileToken).call(this, options);
7597
7714
  }
7598
7715
  async getTokenByCode(url, options) {
7599
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7716
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7600
7717
  try {
7601
7718
  const tokenEndpointResponse = await authorizationCodeGrant(configuration, url, {
7602
7719
  pkceCodeVerifier: options.codeVerifier
@@ -7607,16 +7724,23 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7607
7724
  }
7608
7725
  }
7609
7726
  async getTokenByRefreshToken(options) {
7610
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7727
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7728
+ const additionalParameters = new URLSearchParams;
7729
+ if (options.audience) {
7730
+ additionalParameters.append("audience", options.audience);
7731
+ }
7732
+ if (options.scope) {
7733
+ additionalParameters.append("scope", options.scope);
7734
+ }
7611
7735
  try {
7612
- const tokenEndpointResponse = await refreshTokenGrant(configuration, options.refreshToken);
7736
+ const tokenEndpointResponse = await refreshTokenGrant(configuration, options.refreshToken, additionalParameters);
7613
7737
  return TokenResponse.fromTokenEndpointResponse(tokenEndpointResponse);
7614
7738
  } catch (e) {
7615
7739
  throw new TokenByRefreshTokenError("The access token has expired and there was an error while trying to refresh it.", e);
7616
7740
  }
7617
7741
  }
7618
7742
  async getTokenByClientCredentials(options) {
7619
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7743
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7620
7744
  try {
7621
7745
  const params = new URLSearchParams({
7622
7746
  audience: options.audience
@@ -7631,7 +7755,7 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7631
7755
  }
7632
7756
  }
7633
7757
  async buildLogoutUrl(options) {
7634
- const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7758
+ const {configuration: configuration, serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7635
7759
  if (!serverMetadata.end_session_endpoint) {
7636
7760
  const url = new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain, "/v2/logout"));
7637
7761
  url.searchParams.set("returnTo", options.returnTo);
@@ -7643,9 +7767,13 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7643
7767
  });
7644
7768
  }
7645
7769
  async verifyLogoutToken(options) {
7646
- const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7647
- _classPrivateFieldGet2(_jwks, this) || _classPrivateFieldSet2(_jwks, this, createRemoteJWKSet(new URL(serverMetadata.jwks_uri), {
7648
- [customFetch]: _classPrivateFieldGet2(_options, this).customFetch
7770
+ const {serverMetadata: serverMetadata} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7771
+ const cacheConfig = resolveCacheConfig(_classPrivateFieldGet2(_options, this).discoveryCache);
7772
+ const jwksUri = serverMetadata.jwks_uri;
7773
+ _classPrivateFieldGet2(_jwks, this) || _classPrivateFieldSet2(_jwks, this, createRemoteJWKSet(new URL(jwksUri), {
7774
+ cacheMaxAge: cacheConfig.ttlMs,
7775
+ [customFetch]: _classPrivateFieldGet2(_customFetch2, this),
7776
+ [jwksCache]: _classPrivateFieldGet2(_jwksCache, this)
7649
7777
  }));
7650
7778
  const {payload: payload} = await jwtVerify(options.logoutToken, _classPrivateFieldGet2(_jwks, this), {
7651
7779
  issuer: serverMetadata.issuer,
@@ -7684,6 +7812,18 @@ _jwks = new WeakMap, _Class8_brand = new WeakSet, class AuthClient {
7684
7812
  }
7685
7813
  });
7686
7814
 
7815
+ function _getDiscoveryCacheKey() {
7816
+ const domain = _classPrivateFieldGet2(_options, this).domain.toLowerCase();
7817
+ return "".concat(domain, "|mtls:").concat(_classPrivateFieldGet2(_options, this).useMtls ? "1" : "0");
7818
+ }
7819
+
7820
+ async function _createConfiguration(serverMetadata) {
7821
+ const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
7822
+ const configuration = new Configuration(serverMetadata, _classPrivateFieldGet2(_options, this).clientId, _classPrivateFieldGet2(_options, this).clientSecret, clientAuth);
7823
+ configuration[customFetch$1] = _classPrivateFieldGet2(_customFetch2, this);
7824
+ return configuration;
7825
+ }
7826
+
7687
7827
  async function _discover() {
7688
7828
  if (_classPrivateFieldGet2(_configuration, this) && _classPrivateFieldGet2(_serverMetadata, this)) {
7689
7829
  return {
@@ -7691,14 +7831,58 @@ async function _discover() {
7691
7831
  serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7692
7832
  };
7693
7833
  }
7694
- const clientAuth = await _assertClassBrand(_Class8_brand, this, _getClientAuth).call(this);
7695
- _classPrivateFieldSet2(_configuration, this, await discovery(new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain)), _classPrivateFieldGet2(_options, this).clientId, {
7696
- use_mtls_endpoint_aliases: _classPrivateFieldGet2(_options, this).useMtls
7697
- }, clientAuth, {
7698
- [customFetch$1]: _classPrivateFieldGet2(_options, this).customFetch
7699
- }));
7700
- _classPrivateFieldSet2(_serverMetadata, this, _classPrivateFieldGet2(_configuration, this).serverMetadata());
7701
- _classPrivateFieldGet2(_configuration, this)[customFetch$1] = _classPrivateFieldGet2(_options, this).customFetch || fetch;
7834
+ const cacheKey = _assertClassBrand(_Class9_brand, this, _getDiscoveryCacheKey).call(this);
7835
+ const cached = _classPrivateFieldGet2(_discoveryCache, this).get(cacheKey);
7836
+ if (cached) {
7837
+ _classPrivateFieldSet2(_serverMetadata, this, cached.serverMetadata);
7838
+ _classPrivateFieldSet2(_configuration, this, await _assertClassBrand(_Class9_brand, this, _createConfiguration).call(this, cached.serverMetadata));
7839
+ return {
7840
+ configuration: _classPrivateFieldGet2(_configuration, this),
7841
+ serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7842
+ };
7843
+ }
7844
+ const inFlight = _classPrivateFieldGet2(_inFlightDiscovery, this).get(cacheKey);
7845
+ if (inFlight) {
7846
+ const entry = await inFlight;
7847
+ _classPrivateFieldSet2(_serverMetadata, this, entry.serverMetadata);
7848
+ _classPrivateFieldSet2(_configuration, this, await _assertClassBrand(_Class9_brand, this, _createConfiguration).call(this, entry.serverMetadata));
7849
+ return {
7850
+ configuration: _classPrivateFieldGet2(_configuration, this),
7851
+ serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
7852
+ };
7853
+ }
7854
+ const discoveryPromise = (async () => {
7855
+ const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
7856
+ const configuration = await discovery(new URL("https://".concat(_classPrivateFieldGet2(_options, this).domain)), _classPrivateFieldGet2(_options, this).clientId, {
7857
+ use_mtls_endpoint_aliases: _classPrivateFieldGet2(_options, this).useMtls
7858
+ }, clientAuth, {
7859
+ [customFetch$1]: _classPrivateFieldGet2(_customFetch2, this)
7860
+ });
7861
+ const serverMetadata = configuration.serverMetadata();
7862
+ _classPrivateFieldGet2(_discoveryCache, this).set(cacheKey, {
7863
+ serverMetadata: serverMetadata
7864
+ });
7865
+ return {
7866
+ configuration: configuration,
7867
+ serverMetadata: serverMetadata
7868
+ };
7869
+ })();
7870
+ const inFlightEntry = discoveryPromise.then(_ref3 => {
7871
+ let {serverMetadata: serverMetadata} = _ref3;
7872
+ return {
7873
+ serverMetadata: serverMetadata
7874
+ };
7875
+ });
7876
+ void inFlightEntry.catch(() => void 0);
7877
+ _classPrivateFieldGet2(_inFlightDiscovery, this).set(cacheKey, inFlightEntry);
7878
+ try {
7879
+ const {configuration: configuration, serverMetadata: serverMetadata} = await discoveryPromise;
7880
+ _classPrivateFieldSet2(_configuration, this, configuration);
7881
+ _classPrivateFieldSet2(_serverMetadata, this, serverMetadata);
7882
+ _classPrivateFieldGet2(_configuration, this)[customFetch$1] = _classPrivateFieldGet2(_customFetch2, this);
7883
+ } finally {
7884
+ _classPrivateFieldGet2(_inFlightDiscovery, this).delete(cacheKey);
7885
+ }
7702
7886
  return {
7703
7887
  configuration: _classPrivateFieldGet2(_configuration, this),
7704
7888
  serverMetadata: _classPrivateFieldGet2(_serverMetadata, this)
@@ -7707,7 +7891,7 @@ async function _discover() {
7707
7891
 
7708
7892
  async function _exchangeTokenVaultToken(options) {
7709
7893
  var _options$subjectToken, _options$requestedTok;
7710
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7894
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7711
7895
  if ("audience" in options || "resource" in options) {
7712
7896
  throw new TokenExchangeError("audience and resource parameters are not supported for Token Vault exchanges");
7713
7897
  }
@@ -7734,7 +7918,7 @@ async function _exchangeTokenVaultToken(options) {
7734
7918
  }
7735
7919
 
7736
7920
  async function _exchangeProfileToken(options) {
7737
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7921
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7738
7922
  validateSubjectToken(options.subjectToken);
7739
7923
  const tokenRequestParams = new URLSearchParams({
7740
7924
  subject_token_type: options.subjectTokenType,
@@ -7762,21 +7946,29 @@ async function _exchangeProfileToken(options) {
7762
7946
  }
7763
7947
 
7764
7948
  async function _getClientAuth() {
7765
- if (!_classPrivateFieldGet2(_options, this).clientSecret && !_classPrivateFieldGet2(_options, this).clientAssertionSigningKey && !_classPrivateFieldGet2(_options, this).useMtls) {
7766
- throw new MissingClientAuthError;
7767
- }
7768
- if (_classPrivateFieldGet2(_options, this).useMtls) {
7769
- return TlsClientAuth();
7770
- }
7771
- let clientPrivateKey = _classPrivateFieldGet2(_options, this).clientAssertionSigningKey;
7772
- if (clientPrivateKey && !(clientPrivateKey instanceof CryptoKey)) {
7773
- clientPrivateKey = await importPKCS8(clientPrivateKey, _classPrivateFieldGet2(_options, this).clientAssertionSigningAlg || "RS256");
7949
+ if (!_classPrivateFieldGet2(_clientAuthPromise, this)) {
7950
+ _classPrivateFieldSet2(_clientAuthPromise, this, (async () => {
7951
+ if (!_classPrivateFieldGet2(_options, this).clientSecret && !_classPrivateFieldGet2(_options, this).clientAssertionSigningKey && !_classPrivateFieldGet2(_options, this).useMtls) {
7952
+ throw new MissingClientAuthError;
7953
+ }
7954
+ if (_classPrivateFieldGet2(_options, this).useMtls) {
7955
+ return TlsClientAuth();
7956
+ }
7957
+ let clientPrivateKey = _classPrivateFieldGet2(_options, this).clientAssertionSigningKey;
7958
+ if (clientPrivateKey && !(clientPrivateKey instanceof CryptoKey)) {
7959
+ clientPrivateKey = await importPKCS8(clientPrivateKey, _classPrivateFieldGet2(_options, this).clientAssertionSigningAlg || "RS256");
7960
+ }
7961
+ return clientPrivateKey ? PrivateKeyJwt(clientPrivateKey) : ClientSecretPost(_classPrivateFieldGet2(_options, this).clientSecret);
7962
+ })().catch(error => {
7963
+ _classPrivateFieldSet2(_clientAuthPromise, this, void 0);
7964
+ throw error;
7965
+ }));
7774
7966
  }
7775
- return clientPrivateKey ? PrivateKeyJwt(clientPrivateKey) : ClientSecretPost(_classPrivateFieldGet2(_options, this).clientSecret);
7967
+ return _classPrivateFieldGet2(_clientAuthPromise, this);
7776
7968
  }
7777
7969
 
7778
7970
  async function _buildAuthorizationUrl(options) {
7779
- const {configuration: configuration} = await _assertClassBrand(_Class8_brand, this, _discover).call(this);
7971
+ const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
7780
7972
  const codeChallengeMethod = "S256";
7781
7973
  const codeVerifier = randomPKCECodeVerifier();
7782
7974
  const codeChallenge = await calculatePKCECodeChallenge(codeVerifier);
@@ -7901,15 +8093,15 @@ class MfaApiClient {
7901
8093
  if (!((_a = context === null || context === void 0 ? void 0 : context.mfaRequirements) === null || _a === void 0 ? void 0 : _a.challenge) || context.mfaRequirements.challenge.length === 0) {
7902
8094
  throw new MfaListAuthenticatorsError("invalid_request", "challengeType is required and must contain at least one challenge type, please check mfa_required error payload");
7903
8095
  }
7904
- const challengeTypes = context.mfaRequirements.challenge.map((c => c.type));
8096
+ const challengeTypes = context.mfaRequirements.challenge.map(c => c.type);
7905
8097
  try {
7906
8098
  const allAuthenticators = await this.authJsMfaClient.listAuthenticators({
7907
8099
  mfaToken: mfaToken
7908
8100
  });
7909
- return allAuthenticators.filter((auth => {
8101
+ return allAuthenticators.filter(auth => {
7910
8102
  if (!auth.type) return false;
7911
8103
  return challengeTypes.includes(auth.type);
7912
- }));
8104
+ });
7913
8105
  } catch (error) {
7914
8106
  if (error instanceof MfaListAuthenticatorsError$1) {
7915
8107
  throw new MfaListAuthenticatorsError((_b = error.cause) === null || _b === void 0 ? void 0 : _b.error, error.message);
@@ -8275,7 +8467,7 @@ class Auth0Client {
8275
8467
  scope: scopesToRequest(this.scope, (_a = options.authorizationParams) === null || _a === void 0 ? void 0 : _a.scope, ((_b = options.authorizationParams) === null || _b === void 0 ? void 0 : _b.audience) || this.options.authorizationParams.audience)
8276
8468
  })
8277
8469
  });
8278
- const result = await singlePromise((() => this._getTokenSilently(localOptions)), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
8470
+ const result = await singlePromise(() => this._getTokenSilently(localOptions), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
8279
8471
  return options.detailedResponse ? result : result === null || result === void 0 ? void 0 : result.access_token;
8280
8472
  }
8281
8473
  async _getTokenSilently(options) {
@@ -8296,7 +8488,7 @@ class Auth0Client {
8296
8488
  }
8297
8489
  const lockKey = buildGetTokenSilentlyLockKey(this.options.clientId, getTokenOptions.authorizationParams.audience || "default");
8298
8490
  try {
8299
- return await this.lockManager.runWithLock(lockKey, 5e3, (async () => {
8491
+ return await this.lockManager.runWithLock(lockKey, 5e3, async () => {
8300
8492
  if (cacheMode !== "off") {
8301
8493
  const entry = await this._getEntryFromCache({
8302
8494
  scope: getTokenOptions.authorizationParams.scope,
@@ -8318,7 +8510,7 @@ class Auth0Client {
8318
8510
  } : null), {
8319
8511
  expires_in: expires_in
8320
8512
  });
8321
- }));
8513
+ });
8322
8514
  } catch (error) {
8323
8515
  if (this._isInteractiveError(error) && this.options.interactiveErrorHandler === "popup") {
8324
8516
  return await this._handleInteractiveErrorWithPopup(getTokenOptions);
@@ -8412,7 +8604,7 @@ class Auth0Client {
8412
8604
  async _getTokenFromIFrame(options) {
8413
8605
  const iframeLockKey = buildIframeLockKey(this.options.clientId);
8414
8606
  try {
8415
- return await this.lockManager.runWithLock(iframeLockKey, 5e3, (async () => {
8607
+ return await this.lockManager.runWithLock(iframeLockKey, 5e3, async () => {
8416
8608
  const params = Object.assign(Object.assign({}, options.authorizationParams), {
8417
8609
  prompt: "none"
8418
8610
  });
@@ -8452,7 +8644,7 @@ class Auth0Client {
8452
8644
  oauthTokenScope: tokenResult.scope,
8453
8645
  audience: audience
8454
8646
  });
8455
- }));
8647
+ });
8456
8648
  } catch (e) {
8457
8649
  if (e.error === "login_required") {
8458
8650
  const shouldSkipLogoutForMfaStepUp = e instanceof GenericError && this._isIframeMfaError(e) && this.options.interactiveErrorHandler === "popup";