@blockspark/chat-widget 1.0.7 → 1.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (202) hide show
  1. package/README.md +117 -140
  2. package/dist/_virtual/_plugin-vue_export-helper.cjs.js +2 -0
  3. package/dist/_virtual/_plugin-vue_export-helper.cjs.js.map +1 -0
  4. package/dist/_virtual/_plugin-vue_export-helper.esm.js +11 -0
  5. package/dist/_virtual/_plugin-vue_export-helper.esm.js.map +1 -0
  6. package/dist/components/ChatWidget.cjs.js +2 -0
  7. package/dist/components/ChatWidget.cjs.js.map +1 -0
  8. package/dist/components/ChatWidget.d.ts.map +1 -1
  9. package/dist/components/ChatWidget.esm.js +1129 -0
  10. package/dist/components/ChatWidget.esm.js.map +1 -0
  11. package/dist/components/ChatWidget.vue.cjs.js +2 -0
  12. package/dist/components/ChatWidget.vue.cjs.js.map +1 -0
  13. package/dist/components/ChatWidget.vue.cjs2.js +2 -0
  14. package/dist/components/ChatWidget.vue.cjs2.js.map +1 -0
  15. package/dist/components/ChatWidget.vue.esm.js +8 -0
  16. package/dist/components/ChatWidget.vue.esm.js.map +1 -0
  17. package/dist/components/ChatWidget.vue.esm2.js +374 -0
  18. package/dist/components/ChatWidget.vue.esm2.js.map +1 -0
  19. package/dist/composables/useChatWidget.cjs.js +2 -0
  20. package/dist/composables/useChatWidget.cjs.js.map +1 -0
  21. package/dist/composables/useChatWidget.d.ts +35 -0
  22. package/dist/composables/useChatWidget.d.ts.map +1 -0
  23. package/dist/composables/useChatWidget.esm.js +75 -0
  24. package/dist/composables/useChatWidget.esm.js.map +1 -0
  25. package/dist/core/stateManager.cjs.js +2 -0
  26. package/dist/core/stateManager.cjs.js.map +1 -0
  27. package/dist/core/stateManager.esm.js +915 -0
  28. package/dist/core/stateManager.esm.js.map +1 -0
  29. package/dist/entry/nuxt.d.ts +9 -4
  30. package/dist/entry/nuxt.d.ts.map +1 -1
  31. package/dist/entry/vanilla.cjs.js +2 -0
  32. package/dist/entry/vanilla.cjs.js.map +1 -0
  33. package/dist/entry/vanilla.esm.js +50 -0
  34. package/dist/entry/vanilla.esm.js.map +1 -0
  35. package/dist/entry/vue.d.ts +8 -5
  36. package/dist/entry/vue.d.ts.map +1 -1
  37. package/dist/hooks/useChatMode.cjs.js +2 -0
  38. package/dist/hooks/useChatMode.cjs.js.map +1 -0
  39. package/dist/hooks/useChatMode.esm.js +61 -0
  40. package/dist/hooks/useChatMode.esm.js.map +1 -0
  41. package/dist/index.cjs.js +2 -2
  42. package/dist/index.cjs.js.map +1 -0
  43. package/dist/index.esm.js +16 -2
  44. package/dist/index.esm.js.map +1 -0
  45. package/dist/node_modules/jose/dist/browser/jws/compact/sign.cjs.js +2 -0
  46. package/dist/node_modules/jose/dist/browser/jws/compact/sign.cjs.js.map +1 -0
  47. package/dist/node_modules/jose/dist/browser/jws/compact/sign.esm.js +21 -0
  48. package/dist/node_modules/jose/dist/browser/jws/compact/sign.esm.js.map +1 -0
  49. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.cjs.js +2 -0
  50. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.cjs.js.map +1 -0
  51. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.esm.js +84 -0
  52. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.esm.js.map +1 -0
  53. package/dist/node_modules/jose/dist/browser/jwt/produce.cjs.js +2 -0
  54. package/dist/node_modules/jose/dist/browser/jwt/produce.cjs.js.map +1 -0
  55. package/dist/node_modules/jose/dist/browser/jwt/produce.esm.js +72 -0
  56. package/dist/node_modules/jose/dist/browser/jwt/produce.esm.js.map +1 -0
  57. package/dist/node_modules/jose/dist/browser/jwt/sign.cjs.js +2 -0
  58. package/dist/node_modules/jose/dist/browser/jwt/sign.cjs.js.map +1 -0
  59. package/dist/node_modules/jose/dist/browser/jwt/sign.esm.js +22 -0
  60. package/dist/node_modules/jose/dist/browser/jwt/sign.esm.js.map +1 -0
  61. package/dist/node_modules/jose/dist/browser/key/import.cjs.js +2 -0
  62. package/dist/node_modules/jose/dist/browser/key/import.cjs.js.map +1 -0
  63. package/dist/node_modules/jose/dist/browser/key/import.esm.js +11 -0
  64. package/dist/node_modules/jose/dist/browser/key/import.esm.js.map +1 -0
  65. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.cjs.js +2 -0
  66. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.cjs.js.map +1 -0
  67. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.esm.js +18 -0
  68. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.esm.js.map +1 -0
  69. package/dist/node_modules/jose/dist/browser/lib/check_key_type.cjs.js +2 -0
  70. package/dist/node_modules/jose/dist/browser/lib/check_key_type.cjs.js.map +1 -0
  71. package/dist/node_modules/jose/dist/browser/lib/check_key_type.esm.js +77 -0
  72. package/dist/node_modules/jose/dist/browser/lib/check_key_type.esm.js.map +1 -0
  73. package/dist/node_modules/jose/dist/browser/lib/crypto_key.cjs.js +2 -0
  74. package/dist/node_modules/jose/dist/browser/lib/crypto_key.cjs.js.map +1 -0
  75. package/dist/node_modules/jose/dist/browser/lib/crypto_key.esm.js +101 -0
  76. package/dist/node_modules/jose/dist/browser/lib/crypto_key.esm.js.map +1 -0
  77. package/dist/node_modules/jose/dist/browser/lib/epoch.cjs.js +2 -0
  78. package/dist/node_modules/jose/dist/browser/lib/epoch.cjs.js.map +1 -0
  79. package/dist/node_modules/jose/dist/browser/lib/epoch.esm.js +5 -0
  80. package/dist/node_modules/jose/dist/browser/lib/epoch.esm.js.map +1 -0
  81. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.cjs.js +2 -0
  82. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.cjs.js.map +1 -0
  83. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.esm.js +32 -0
  84. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.esm.js.map +1 -0
  85. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.cjs.js +2 -0
  86. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.cjs.js.map +1 -0
  87. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.esm.js +25 -0
  88. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.esm.js.map +1 -0
  89. package/dist/node_modules/jose/dist/browser/lib/is_jwk.cjs.js +2 -0
  90. package/dist/node_modules/jose/dist/browser/lib/is_jwk.cjs.js.map +1 -0
  91. package/dist/node_modules/jose/dist/browser/lib/is_jwk.esm.js +20 -0
  92. package/dist/node_modules/jose/dist/browser/lib/is_jwk.esm.js.map +1 -0
  93. package/dist/node_modules/jose/dist/browser/lib/is_object.cjs.js +2 -0
  94. package/dist/node_modules/jose/dist/browser/lib/is_object.cjs.js.map +1 -0
  95. package/dist/node_modules/jose/dist/browser/lib/is_object.esm.js +20 -0
  96. package/dist/node_modules/jose/dist/browser/lib/is_object.esm.js.map +1 -0
  97. package/dist/node_modules/jose/dist/browser/lib/secs.cjs.js +2 -0
  98. package/dist/node_modules/jose/dist/browser/lib/secs.cjs.js.map +1 -0
  99. package/dist/node_modules/jose/dist/browser/lib/secs.esm.js +59 -0
  100. package/dist/node_modules/jose/dist/browser/lib/secs.esm.js.map +1 -0
  101. package/dist/node_modules/jose/dist/browser/lib/validate_crit.cjs.js +2 -0
  102. package/dist/node_modules/jose/dist/browser/lib/validate_crit.cjs.js.map +1 -0
  103. package/dist/node_modules/jose/dist/browser/lib/validate_crit.esm.js +34 -0
  104. package/dist/node_modules/jose/dist/browser/lib/validate_crit.esm.js.map +1 -0
  105. package/dist/node_modules/jose/dist/browser/runtime/asn1.cjs.js +2 -0
  106. package/dist/node_modules/jose/dist/browser/runtime/asn1.cjs.js.map +1 -0
  107. package/dist/node_modules/jose/dist/browser/runtime/asn1.esm.js +103 -0
  108. package/dist/node_modules/jose/dist/browser/runtime/asn1.esm.js.map +1 -0
  109. package/dist/node_modules/jose/dist/browser/runtime/base64url.cjs.js +2 -0
  110. package/dist/node_modules/jose/dist/browser/runtime/base64url.cjs.js.map +1 -0
  111. package/dist/node_modules/jose/dist/browser/runtime/base64url.esm.js +43 -0
  112. package/dist/node_modules/jose/dist/browser/runtime/base64url.esm.js.map +1 -0
  113. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.cjs.js +2 -0
  114. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.cjs.js.map +1 -0
  115. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.esm.js +12 -0
  116. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.esm.js.map +1 -0
  117. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.cjs.js +2 -0
  118. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.cjs.js.map +1 -0
  119. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.esm.js +25 -0
  120. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.esm.js.map +1 -0
  121. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.cjs.js +2 -0
  122. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.cjs.js.map +1 -0
  123. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.esm.js +13 -0
  124. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.esm.js.map +1 -0
  125. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.cjs.js +2 -0
  126. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.cjs.js.map +1 -0
  127. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.esm.js +107 -0
  128. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.esm.js.map +1 -0
  129. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.cjs.js +2 -0
  130. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.cjs.js.map +1 -0
  131. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.esm.js +71 -0
  132. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.esm.js.map +1 -0
  133. package/dist/node_modules/jose/dist/browser/runtime/sign.cjs.js +2 -0
  134. package/dist/node_modules/jose/dist/browser/runtime/sign.cjs.js.map +1 -0
  135. package/dist/node_modules/jose/dist/browser/runtime/sign.esm.js +14 -0
  136. package/dist/node_modules/jose/dist/browser/runtime/sign.esm.js.map +1 -0
  137. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.cjs.js +2 -0
  138. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.cjs.js.map +1 -0
  139. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.esm.js +32 -0
  140. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.esm.js.map +1 -0
  141. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.cjs.js +2 -0
  142. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.cjs.js.map +1 -0
  143. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.esm.js +7 -0
  144. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.esm.js.map +1 -0
  145. package/dist/node_modules/jose/dist/browser/util/errors.cjs.js +2 -0
  146. package/dist/node_modules/jose/dist/browser/util/errors.cjs.js.map +1 -0
  147. package/dist/node_modules/jose/dist/browser/util/errors.esm.js +131 -0
  148. package/dist/node_modules/jose/dist/browser/util/errors.esm.js.map +1 -0
  149. package/dist/node_modules/react-dom/client.cjs.js +2 -0
  150. package/dist/node_modules/react-dom/client.cjs.js.map +1 -0
  151. package/dist/node_modules/react-dom/client.esm.js +21 -0
  152. package/dist/node_modules/react-dom/client.esm.js.map +1 -0
  153. package/dist/nuxt.cjs.js +2 -0
  154. package/dist/nuxt.cjs.js.map +1 -0
  155. package/dist/nuxt.esm.js +10 -0
  156. package/dist/nuxt.esm.js.map +1 -0
  157. package/dist/services/chatService.cjs.js +2 -0
  158. package/dist/services/chatService.cjs.js.map +1 -0
  159. package/dist/services/chatService.esm.js +482 -0
  160. package/dist/services/chatService.esm.js.map +1 -0
  161. package/dist/services/dialogflowClient.cjs.js +2 -0
  162. package/dist/services/dialogflowClient.cjs.js.map +1 -0
  163. package/dist/services/dialogflowClient.esm.js +282 -0
  164. package/dist/services/dialogflowClient.esm.js.map +1 -0
  165. package/dist/services/sessionManager.cjs.js +2 -0
  166. package/dist/services/sessionManager.cjs.js.map +1 -0
  167. package/dist/services/sessionManager.esm.js +48 -0
  168. package/dist/services/sessionManager.esm.js.map +1 -0
  169. package/dist/styles.css +1 -596
  170. package/dist/utils/frameworkDetector.cjs.js +2 -0
  171. package/dist/utils/frameworkDetector.cjs.js.map +1 -0
  172. package/dist/utils/frameworkDetector.esm.js +125 -0
  173. package/dist/utils/frameworkDetector.esm.js.map +1 -0
  174. package/dist/utils/sanitize.cjs.js +2 -0
  175. package/dist/utils/sanitize.cjs.js.map +1 -0
  176. package/dist/utils/sanitize.d.ts +25 -0
  177. package/dist/utils/sanitize.d.ts.map +1 -0
  178. package/dist/utils/sanitize.esm.js +52 -0
  179. package/dist/utils/sanitize.esm.js.map +1 -0
  180. package/dist/utils/ssr.d.ts +35 -0
  181. package/dist/utils/ssr.d.ts.map +1 -0
  182. package/dist/vue.cjs.js +2 -1
  183. package/dist/vue.cjs.js.map +1 -0
  184. package/dist/vue.esm.js +10 -1
  185. package/dist/vue.esm.js.map +1 -0
  186. package/package.json +30 -23
  187. package/dist/index.cjs.js.LICENSE.txt +0 -27
  188. package/dist/index.esm.js.LICENSE.txt +0 -27
  189. package/dist/index.js +0 -2
  190. package/dist/index.js.LICENSE.txt +0 -9
  191. package/dist/index.umd.js +0 -2
  192. package/dist/index.umd.js.LICENSE.txt +0 -27
  193. package/dist/react.cjs.js +0 -2
  194. package/dist/react.cjs.js.LICENSE.txt +0 -9
  195. package/dist/react.esm.js +0 -2
  196. package/dist/react.esm.js.LICENSE.txt +0 -9
  197. package/dist/vue/ChatWidgetWrapper.d.ts +0 -182
  198. package/dist/vue/ChatWidgetWrapper.d.ts.map +0 -1
  199. package/dist/vue/index.d.ts +0 -191
  200. package/dist/vue/index.d.ts.map +0 -1
  201. package/dist/vue.js +0 -2
  202. package/dist/vue.js.LICENSE.txt +0 -39
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("../lib/buffer_utils.cjs.js"),r=r=>{let t=r;"string"==typeof t&&(t=e.encoder.encode(t));const o=[];for(let e=0;e<t.length;e+=32768)o.push(String.fromCharCode.apply(null,t.subarray(e,e+32768)));return btoa(o.join(""))},t=e=>{const r=atob(e),t=new Uint8Array(r.length);for(let o=0;o<r.length;o++)t[o]=r.charCodeAt(o);return t};exports.decode=r=>{let o=r;o instanceof Uint8Array&&(o=e.decoder.decode(o)),o=o.replace(/-/g,"+").replace(/_/g,"/").replace(/\s/g,"");try{return t(o)}catch{throw new TypeError("The input to be decoded is not correctly encoded.")}},exports.decodeBase64=t,exports.encode=e=>r(e).replace(/=/g,"").replace(/\+/g,"-").replace(/\//g,"_"),exports.encodeBase64=r;
2
+ //# sourceMappingURL=base64url.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"base64url.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/base64url.js"],"sourcesContent":["import { encoder, decoder } from '../lib/buffer_utils.js';\nexport const encodeBase64 = (input) => {\n let unencoded = input;\n if (typeof unencoded === 'string') {\n unencoded = encoder.encode(unencoded);\n }\n const CHUNK_SIZE = 0x8000;\n const arr = [];\n for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {\n arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(arr.join(''));\n};\nexport const encode = (input) => {\n return encodeBase64(input).replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n};\nexport const decodeBase64 = (encoded) => {\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n};\nexport const decode = (input) => {\n let encoded = input;\n if (encoded instanceof Uint8Array) {\n encoded = decoder.decode(encoded);\n }\n encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\\s/g, '');\n try {\n return decodeBase64(encoded);\n }\n catch {\n throw new TypeError('The input to be decoded is not correctly encoded.');\n }\n};\n"],"names":["encodeBase64","input","unencoded","encoder","encode","arr","i","length","push","String","fromCharCode","apply","subarray","btoa","join","decodeBase64","encoded","binary","atob","bytes","Uint8Array","charCodeAt","decoder","decode","replace","TypeError"],"mappings":"8HACaA,EAAgBC,IACzB,IAAIC,EAAYD,EACS,iBAAdC,IACPA,EAAYC,EAAAA,QAAQC,OAAOF,IAE/B,MACMG,EAAM,GACZ,IAAA,IAASC,EAAI,EAAGA,EAAIJ,EAAUK,OAAQD,GAFnB,MAGfD,EAAIG,KAAKC,OAAOC,aAAaC,MAAM,KAAMT,EAAUU,SAASN,EAAGA,EAHhD,SAKnB,OAAOO,KAAKR,EAAIS,KAAK,MAKZC,EAAgBC,IACzB,MAAMC,EAASC,KAAKF,GACdG,EAAQ,IAAIC,WAAWH,EAAOV,QACpC,IAAA,IAASD,EAAI,EAAGA,EAAIW,EAAOV,OAAQD,IAC/Ba,EAAMb,GAAKW,EAAOI,WAAWf,GAEjC,OAAOa,kBAEYlB,IACnB,IAAIe,EAAUf,EACVe,aAAmBI,aACnBJ,EAAUM,EAAAA,QAAQC,OAAOP,IAE7BA,EAAUA,EAAQQ,QAAQ,KAAM,KAAKA,QAAQ,KAAM,KAAKA,QAAQ,MAAO,IACvE,IACI,OAAOT,EAAaC,EACxB,CAAA,MAEI,MAAM,IAAIS,UAAU,oDACxB,yCAtBmBxB,GACZD,EAAaC,GAAOuB,QAAQ,KAAM,IAAIA,QAAQ,MAAO,KAAKA,QAAQ,MAAO","x_google_ignoreList":[0]}
@@ -0,0 +1,43 @@
1
+ import { encoder, decoder } from "../lib/buffer_utils.esm.js";
2
+ const encodeBase64 = (input) => {
3
+ let unencoded = input;
4
+ if (typeof unencoded === "string") {
5
+ unencoded = encoder.encode(unencoded);
6
+ }
7
+ const CHUNK_SIZE = 32768;
8
+ const arr = [];
9
+ for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {
10
+ arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));
11
+ }
12
+ return btoa(arr.join(""));
13
+ };
14
+ const encode = (input) => {
15
+ return encodeBase64(input).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
16
+ };
17
+ const decodeBase64 = (encoded) => {
18
+ const binary = atob(encoded);
19
+ const bytes = new Uint8Array(binary.length);
20
+ for (let i = 0; i < binary.length; i++) {
21
+ bytes[i] = binary.charCodeAt(i);
22
+ }
23
+ return bytes;
24
+ };
25
+ const decode = (input) => {
26
+ let encoded = input;
27
+ if (encoded instanceof Uint8Array) {
28
+ encoded = decoder.decode(encoded);
29
+ }
30
+ encoded = encoded.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "");
31
+ try {
32
+ return decodeBase64(encoded);
33
+ } catch {
34
+ throw new TypeError("The input to be decoded is not correctly encoded.");
35
+ }
36
+ };
37
+ export {
38
+ decode,
39
+ decodeBase64,
40
+ encode,
41
+ encodeBase64
42
+ };
43
+ //# sourceMappingURL=base64url.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"base64url.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/base64url.js"],"sourcesContent":["import { encoder, decoder } from '../lib/buffer_utils.js';\nexport const encodeBase64 = (input) => {\n let unencoded = input;\n if (typeof unencoded === 'string') {\n unencoded = encoder.encode(unencoded);\n }\n const CHUNK_SIZE = 0x8000;\n const arr = [];\n for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {\n arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(arr.join(''));\n};\nexport const encode = (input) => {\n return encodeBase64(input).replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n};\nexport const decodeBase64 = (encoded) => {\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n};\nexport const decode = (input) => {\n let encoded = input;\n if (encoded instanceof Uint8Array) {\n encoded = decoder.decode(encoded);\n }\n encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\\s/g, '');\n try {\n return decodeBase64(encoded);\n }\n catch {\n throw new TypeError('The input to be decoded is not correctly encoded.');\n }\n};\n"],"names":[],"mappings":";AACY,MAAC,eAAe,CAAC,UAAU;AACnC,MAAI,YAAY;AAChB,MAAI,OAAO,cAAc,UAAU;AAC/B,gBAAY,QAAQ,OAAO,SAAS;AAAA,EACxC;AACA,QAAM,aAAa;AACnB,QAAM,MAAM,CAAA;AACZ,WAAS,IAAI,GAAG,IAAI,UAAU,QAAQ,KAAK,YAAY;AACnD,QAAI,KAAK,OAAO,aAAa,MAAM,MAAM,UAAU,SAAS,GAAG,IAAI,UAAU,CAAC,CAAC;AAAA,EACnF;AACA,SAAO,KAAK,IAAI,KAAK,EAAE,CAAC;AAC5B;AACY,MAAC,SAAS,CAAC,UAAU;AAC7B,SAAO,aAAa,KAAK,EAAE,QAAQ,MAAM,EAAE,EAAE,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,GAAG;AACvF;AACY,MAAC,eAAe,CAAC,YAAY;AACrC,QAAM,SAAS,KAAK,OAAO;AAC3B,QAAM,QAAQ,IAAI,WAAW,OAAO,MAAM;AAC1C,WAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACpC,UAAM,CAAC,IAAI,OAAO,WAAW,CAAC;AAAA,EAClC;AACA,SAAO;AACX;AACY,MAAC,SAAS,CAAC,UAAU;AAC7B,MAAI,UAAU;AACd,MAAI,mBAAmB,YAAY;AAC/B,cAAU,QAAQ,OAAO,OAAO;AAAA,EACpC;AACA,YAAU,QAAQ,QAAQ,MAAM,GAAG,EAAE,QAAQ,MAAM,GAAG,EAAE,QAAQ,OAAO,EAAE;AACzE,MAAI;AACA,WAAO,aAAa,OAAO;AAAA,EAC/B,QACM;AACF,UAAM,IAAI,UAAU,mDAAmD;AAAA,EAC3E;AACJ;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});exports.default=(e,t)=>{if(e.startsWith("RS")||e.startsWith("PS")){const{modulusLength:r}=t.algorithm;if("number"!=typeof r||r<2048)throw new TypeError(`${e} requires key modulusLength to be 2048 bits or larger`)}};
2
+ //# sourceMappingURL=check_key_length.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"check_key_length.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/check_key_length.js"],"sourcesContent":["export default (alg, key) => {\n if (alg.startsWith('RS') || alg.startsWith('PS')) {\n const { modulusLength } = key.algorithm;\n if (typeof modulusLength !== 'number' || modulusLength < 2048) {\n throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);\n }\n }\n};\n"],"names":["alg","key","startsWith","modulusLength","algorithm","TypeError"],"mappings":"4HAAe,CAACA,EAAKC,KACjB,GAAID,EAAIE,WAAW,OAASF,EAAIE,WAAW,MAAO,CAC9C,MAAMC,cAAEA,GAAkBF,EAAIG,UAC9B,GAA6B,iBAAlBD,GAA8BA,EAAgB,KACrD,MAAM,IAAIE,UAAU,GAAGL,yDAE/B","x_google_ignoreList":[0]}
@@ -0,0 +1,12 @@
1
+ const checkKeyLength = (alg, key) => {
2
+ if (alg.startsWith("RS") || alg.startsWith("PS")) {
3
+ const { modulusLength } = key.algorithm;
4
+ if (typeof modulusLength !== "number" || modulusLength < 2048) {
5
+ throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
6
+ }
7
+ }
8
+ };
9
+ export {
10
+ checkKeyLength as default
11
+ };
12
+ //# sourceMappingURL=check_key_length.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"check_key_length.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/check_key_length.js"],"sourcesContent":["export default (alg, key) => {\n if (alg.startsWith('RS') || alg.startsWith('PS')) {\n const { modulusLength } = key.algorithm;\n if (typeof modulusLength !== 'number' || modulusLength < 2048) {\n throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);\n }\n }\n};\n"],"names":[],"mappings":"AAAA,MAAA,iBAAe,CAAC,KAAK,QAAQ;AACzB,MAAI,IAAI,WAAW,IAAI,KAAK,IAAI,WAAW,IAAI,GAAG;AAC9C,UAAM,EAAE,kBAAkB,IAAI;AAC9B,QAAI,OAAO,kBAAkB,YAAY,gBAAgB,MAAM;AAC3D,YAAM,IAAI,UAAU,GAAG,GAAG,uDAAuD;AAAA,IACrF;AAAA,EACJ;AACJ;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./webcrypto.cjs.js"),r=require("../lib/crypto_key.cjs.js"),t=require("../lib/invalid_key_input.cjs.js"),i=require("./is_key_like.cjs.js"),s=require("./normalize_key.cjs.js");exports.default=async function(a,o,y){if(o=await s.default.normalizePrivateKey(o,a),e.isCryptoKey(o))return r.checkSigCryptoKey(o,a,y),o;if(o instanceof Uint8Array){if(!a.startsWith("HS"))throw new TypeError(t.default(o,...i.types));return e.default.subtle.importKey("raw",o,{hash:`SHA-${a.slice(-3)}`,name:"HMAC"},!1,[y])}throw new TypeError(t.default(o,...i.types,"Uint8Array","JSON Web Key"))};
2
+ //# sourceMappingURL=get_sign_verify_key.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"get_sign_verify_key.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/get_sign_verify_key.js"],"sourcesContent":["import crypto, { isCryptoKey } from './webcrypto.js';\nimport { checkSigCryptoKey } from '../lib/crypto_key.js';\nimport invalidKeyInput from '../lib/invalid_key_input.js';\nimport { types } from './is_key_like.js';\nimport normalize from './normalize_key.js';\nexport default async function getCryptoKey(alg, key, usage) {\n if (usage === 'sign') {\n key = await normalize.normalizePrivateKey(key, alg);\n }\n if (usage === 'verify') {\n key = await normalize.normalizePublicKey(key, alg);\n }\n if (isCryptoKey(key)) {\n checkSigCryptoKey(key, alg, usage);\n return key;\n }\n if (key instanceof Uint8Array) {\n if (!alg.startsWith('HS')) {\n throw new TypeError(invalidKeyInput(key, ...types));\n }\n return crypto.subtle.importKey('raw', key, { hash: `SHA-${alg.slice(-3)}`, name: 'HMAC' }, false, [usage]);\n }\n throw new TypeError(invalidKeyInput(key, ...types, 'Uint8Array', 'JSON Web Key'));\n}\n"],"names":["async","alg","key","usage","normalize","normalizePrivateKey","isCryptoKey","checkSigCryptoKey","Uint8Array","startsWith","TypeError","invalidKeyInput","types","crypto","subtle","importKey","hash","slice","name"],"mappings":"2TAKeA,eAA4BC,EAAKC,EAAKC,GAOjD,GALID,QAAYE,EAAAA,QAAUC,oBAAoBH,EAAKD,GAK/CK,EAAAA,YAAYJ,GAEZ,OADAK,oBAAkBL,EAAKD,EAAKE,GACrBD,EAEX,GAAIA,aAAeM,WAAY,CAC3B,IAAKP,EAAIQ,WAAW,MAChB,MAAM,IAAIC,UAAUC,EAAAA,QAAgBT,KAAQU,EAAAA,QAEhD,OAAOC,EAAAA,QAAOC,OAAOC,UAAU,MAAOb,EAAK,CAAEc,KAAM,OAAOf,EAAIgB,OAAM,KAAOC,KAAM,SAAU,EAAO,CAACf,GACvG,CACA,MAAM,IAAIO,UAAUC,UAAgBT,KAAQU,QAAO,aAAc,gBACrE","x_google_ignoreList":[0]}
@@ -0,0 +1,25 @@
1
+ import crypto, { isCryptoKey } from "./webcrypto.esm.js";
2
+ import { checkSigCryptoKey } from "../lib/crypto_key.esm.js";
3
+ import invalidKeyInput from "../lib/invalid_key_input.esm.js";
4
+ import { types } from "./is_key_like.esm.js";
5
+ import normalize from "./normalize_key.esm.js";
6
+ async function getCryptoKey(alg, key, usage) {
7
+ {
8
+ key = await normalize.normalizePrivateKey(key, alg);
9
+ }
10
+ if (isCryptoKey(key)) {
11
+ checkSigCryptoKey(key, alg, usage);
12
+ return key;
13
+ }
14
+ if (key instanceof Uint8Array) {
15
+ if (!alg.startsWith("HS")) {
16
+ throw new TypeError(invalidKeyInput(key, ...types));
17
+ }
18
+ return crypto.subtle.importKey("raw", key, { hash: `SHA-${alg.slice(-3)}`, name: "HMAC" }, false, [usage]);
19
+ }
20
+ throw new TypeError(invalidKeyInput(key, ...types, "Uint8Array", "JSON Web Key"));
21
+ }
22
+ export {
23
+ getCryptoKey as default
24
+ };
25
+ //# sourceMappingURL=get_sign_verify_key.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"get_sign_verify_key.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/get_sign_verify_key.js"],"sourcesContent":["import crypto, { isCryptoKey } from './webcrypto.js';\nimport { checkSigCryptoKey } from '../lib/crypto_key.js';\nimport invalidKeyInput from '../lib/invalid_key_input.js';\nimport { types } from './is_key_like.js';\nimport normalize from './normalize_key.js';\nexport default async function getCryptoKey(alg, key, usage) {\n if (usage === 'sign') {\n key = await normalize.normalizePrivateKey(key, alg);\n }\n if (usage === 'verify') {\n key = await normalize.normalizePublicKey(key, alg);\n }\n if (isCryptoKey(key)) {\n checkSigCryptoKey(key, alg, usage);\n return key;\n }\n if (key instanceof Uint8Array) {\n if (!alg.startsWith('HS')) {\n throw new TypeError(invalidKeyInput(key, ...types));\n }\n return crypto.subtle.importKey('raw', key, { hash: `SHA-${alg.slice(-3)}`, name: 'HMAC' }, false, [usage]);\n }\n throw new TypeError(invalidKeyInput(key, ...types, 'Uint8Array', 'JSON Web Key'));\n}\n"],"names":[],"mappings":";;;;;AAKe,eAAe,aAAa,KAAK,KAAK,OAAO;AAClC;AAClB,UAAM,MAAM,UAAU,oBAAoB,KAAK,GAAG;AAAA,EACtD;AAIA,MAAI,YAAY,GAAG,GAAG;AAClB,sBAAkB,KAAK,KAAK,KAAK;AACjC,WAAO;AAAA,EACX;AACA,MAAI,eAAe,YAAY;AAC3B,QAAI,CAAC,IAAI,WAAW,IAAI,GAAG;AACvB,YAAM,IAAI,UAAU,gBAAgB,KAAK,GAAG,KAAK,CAAC;AAAA,IACtD;AACA,WAAO,OAAO,OAAO,UAAU,OAAO,KAAK,EAAE,MAAM,OAAO,IAAI,MAAM,EAAE,CAAC,IAAI,MAAM,OAAM,GAAI,OAAO,CAAC,KAAK,CAAC;AAAA,EAC7G;AACA,QAAM,IAAI,UAAU,gBAAgB,KAAK,GAAG,OAAO,cAAc,cAAc,CAAC;AACpF;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./webcrypto.cjs.js");exports.default=t=>!!e.isCryptoKey(t)||"KeyObject"===t?.[Symbol.toStringTag],exports.types=["CryptoKey"];
2
+ //# sourceMappingURL=is_key_like.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_key_like.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/is_key_like.js"],"sourcesContent":["import { isCryptoKey } from './webcrypto.js';\nexport default (key) => {\n if (isCryptoKey(key)) {\n return true;\n }\n return key?.[Symbol.toStringTag] === 'KeyObject';\n};\nexport const types = ['CryptoKey'];\n"],"names":["key","isCryptoKey","Symbol","toStringTag"],"mappings":"kKACgBA,KACRC,EAAAA,YAAYD,IAGqB,cAA9BA,IAAME,OAAOC,2BAEH,CAAC","x_google_ignoreList":[0]}
@@ -0,0 +1,13 @@
1
+ import { isCryptoKey } from "./webcrypto.esm.js";
2
+ const isKeyLike = (key) => {
3
+ if (isCryptoKey(key)) {
4
+ return true;
5
+ }
6
+ return key?.[Symbol.toStringTag] === "KeyObject";
7
+ };
8
+ const types = ["CryptoKey"];
9
+ export {
10
+ isKeyLike as default,
11
+ types
12
+ };
13
+ //# sourceMappingURL=is_key_like.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_key_like.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/is_key_like.js"],"sourcesContent":["import { isCryptoKey } from './webcrypto.js';\nexport default (key) => {\n if (isCryptoKey(key)) {\n return true;\n }\n return key?.[Symbol.toStringTag] === 'KeyObject';\n};\nexport const types = ['CryptoKey'];\n"],"names":[],"mappings":";AACA,MAAA,YAAe,CAAC,QAAQ;AACpB,MAAI,YAAY,GAAG,GAAG;AAClB,WAAO;AAAA,EACX;AACA,SAAO,MAAM,OAAO,WAAW,MAAM;AACzC;AACY,MAAC,QAAQ,CAAC,WAAW;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./webcrypto.cjs.js"),a=require("../util/errors.cjs.js");exports.default=async r=>{if(!r.alg)throw new TypeError('"alg" argument is required when "jwk.alg" is not present');const{algorithm:s,keyUsages:t}=function(e){let r,s;switch(e.kty){case"RSA":switch(e.alg){case"PS256":case"PS384":case"PS512":r={name:"RSA-PSS",hash:`SHA-${e.alg.slice(-3)}`},s=e.d?["sign"]:["verify"];break;case"RS256":case"RS384":case"RS512":r={name:"RSASSA-PKCS1-v1_5",hash:`SHA-${e.alg.slice(-3)}`},s=e.d?["sign"]:["verify"];break;case"RSA-OAEP":case"RSA-OAEP-256":case"RSA-OAEP-384":case"RSA-OAEP-512":r={name:"RSA-OAEP",hash:`SHA-${parseInt(e.alg.slice(-3),10)||1}`},s=e.d?["decrypt","unwrapKey"]:["encrypt","wrapKey"];break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value')}break;case"EC":switch(e.alg){case"ES256":r={name:"ECDSA",namedCurve:"P-256"},s=e.d?["sign"]:["verify"];break;case"ES384":r={name:"ECDSA",namedCurve:"P-384"},s=e.d?["sign"]:["verify"];break;case"ES512":r={name:"ECDSA",namedCurve:"P-521"},s=e.d?["sign"]:["verify"];break;case"ECDH-ES":case"ECDH-ES+A128KW":case"ECDH-ES+A192KW":case"ECDH-ES+A256KW":r={name:"ECDH",namedCurve:e.crv},s=e.d?["deriveBits"]:[];break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value')}break;case"OKP":switch(e.alg){case"Ed25519":r={name:"Ed25519"},s=e.d?["sign"]:["verify"];break;case"EdDSA":r={name:e.crv},s=e.d?["sign"]:["verify"];break;case"ECDH-ES":case"ECDH-ES+A128KW":case"ECDH-ES+A192KW":case"ECDH-ES+A256KW":r={name:e.crv},s=e.d?["deriveBits"]:[];break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value')}break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value')}return{algorithm:r,keyUsages:s}}(r),n=[s,r.ext??!1,r.key_ops??t],c={...r};return delete c.alg,delete c.use,e.default.subtle.importKey("jwk",c,...n)};
2
+ //# sourceMappingURL=jwk_to_key.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"jwk_to_key.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/jwk_to_key.js"],"sourcesContent":["import crypto from './webcrypto.js';\nimport { JOSENotSupported } from '../util/errors.js';\nfunction subtleMapping(jwk) {\n let algorithm;\n let keyUsages;\n switch (jwk.kty) {\n case 'RSA': {\n switch (jwk.alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,\n };\n keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'EC': {\n switch (jwk.alg) {\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: 'ECDH', namedCurve: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'OKP': {\n switch (jwk.alg) {\n case 'Ed25519':\n algorithm = { name: 'Ed25519' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'EdDSA':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"kty\" (Key Type) Parameter value');\n }\n return { algorithm, keyUsages };\n}\nconst parse = async (jwk) => {\n if (!jwk.alg) {\n throw new TypeError('\"alg\" argument is required when \"jwk.alg\" is not present');\n }\n const { algorithm, keyUsages } = subtleMapping(jwk);\n const rest = [\n algorithm,\n jwk.ext ?? false,\n jwk.key_ops ?? keyUsages,\n ];\n const keyData = { ...jwk };\n delete keyData.alg;\n delete keyData.use;\n return crypto.subtle.importKey('jwk', keyData, ...rest);\n};\nexport default parse;\n"],"names":["async","jwk","alg","TypeError","algorithm","keyUsages","kty","name","hash","slice","d","parseInt","JOSENotSupported","namedCurve","crv","subtleMapping","rest","ext","key_ops","keyData","use","crypto","subtle","importKey"],"mappings":"qMAwFcA,MAAOC,IACjB,IAAKA,EAAIC,IACL,MAAM,IAAIC,UAAU,4DAExB,MAAMC,UAAEA,EAAAC,UAAWA,GA1FvB,SAAuBJ,GACnB,IAAIG,EACAC,EACJ,OAAQJ,EAAIK,KACR,IAAK,MACD,OAAQL,EAAIC,KACR,IAAK,QACL,IAAK,QACL,IAAK,QACDE,EAAY,CAAEG,KAAM,UAAWC,KAAM,OAAOP,EAAIC,IAAIO,OAAM,MAC1DJ,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACL,IAAK,QACL,IAAK,QACDN,EAAY,CAAEG,KAAM,oBAAqBC,KAAM,OAAOP,EAAIC,IAAIO,OAAM,MACpEJ,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,WACL,IAAK,eACL,IAAK,eACL,IAAK,eACDN,EAAY,CACRG,KAAM,WACNC,KAAM,OAAOG,SAASV,EAAIC,IAAIO,OAAM,GAAK,KAAO,KAEpDJ,EAAYJ,EAAIS,EAAI,CAAC,UAAW,aAAe,CAAC,UAAW,WAC3D,MACJ,QACI,MAAM,IAAIE,EAAAA,iBAAiB,gEAEnC,MAEJ,IAAK,KACD,OAAQX,EAAIC,KACR,IAAK,QACDE,EAAY,CAAEG,KAAM,QAASM,WAAY,SACzCR,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACDN,EAAY,CAAEG,KAAM,QAASM,WAAY,SACzCR,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACDN,EAAY,CAAEG,KAAM,QAASM,WAAY,SACzCR,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,UACL,IAAK,iBACL,IAAK,iBACL,IAAK,iBACDN,EAAY,CAAEG,KAAM,OAAQM,WAAYZ,EAAIa,KAC5CT,EAAYJ,EAAIS,EAAI,CAAC,cAAgB,GACrC,MACJ,QACI,MAAM,IAAIE,EAAAA,iBAAiB,gEAEnC,MAEJ,IAAK,MACD,OAAQX,EAAIC,KACR,IAAK,UACDE,EAAY,CAAEG,KAAM,WACpBF,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACDN,EAAY,CAAEG,KAAMN,EAAIa,KACxBT,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,UACL,IAAK,iBACL,IAAK,iBACL,IAAK,iBACDN,EAAY,CAAEG,KAAMN,EAAIa,KACxBT,EAAYJ,EAAIS,EAAI,CAAC,cAAgB,GACrC,MACJ,QACI,MAAM,IAAIE,EAAAA,iBAAiB,gEAEnC,MAEJ,QACI,MAAM,IAAIA,EAAAA,iBAAiB,+DAEnC,MAAO,CAAER,YAAWC,YACxB,CAKqCU,CAAcd,GACzCe,EAAO,CACTZ,EACAH,EAAIgB,MAAO,EACXhB,EAAIiB,SAAWb,GAEbc,EAAU,IAAKlB,GAGrB,cAFOkB,EAAQjB,WACRiB,EAAQC,IACRC,EAAAA,QAAOC,OAAOC,UAAU,MAAOJ,KAAYH","x_google_ignoreList":[0]}
@@ -0,0 +1,107 @@
1
+ import crypto from "./webcrypto.esm.js";
2
+ import { JOSENotSupported } from "../util/errors.esm.js";
3
+ function subtleMapping(jwk) {
4
+ let algorithm;
5
+ let keyUsages;
6
+ switch (jwk.kty) {
7
+ case "RSA": {
8
+ switch (jwk.alg) {
9
+ case "PS256":
10
+ case "PS384":
11
+ case "PS512":
12
+ algorithm = { name: "RSA-PSS", hash: `SHA-${jwk.alg.slice(-3)}` };
13
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
14
+ break;
15
+ case "RS256":
16
+ case "RS384":
17
+ case "RS512":
18
+ algorithm = { name: "RSASSA-PKCS1-v1_5", hash: `SHA-${jwk.alg.slice(-3)}` };
19
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
20
+ break;
21
+ case "RSA-OAEP":
22
+ case "RSA-OAEP-256":
23
+ case "RSA-OAEP-384":
24
+ case "RSA-OAEP-512":
25
+ algorithm = {
26
+ name: "RSA-OAEP",
27
+ hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`
28
+ };
29
+ keyUsages = jwk.d ? ["decrypt", "unwrapKey"] : ["encrypt", "wrapKey"];
30
+ break;
31
+ default:
32
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
33
+ }
34
+ break;
35
+ }
36
+ case "EC": {
37
+ switch (jwk.alg) {
38
+ case "ES256":
39
+ algorithm = { name: "ECDSA", namedCurve: "P-256" };
40
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
41
+ break;
42
+ case "ES384":
43
+ algorithm = { name: "ECDSA", namedCurve: "P-384" };
44
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
45
+ break;
46
+ case "ES512":
47
+ algorithm = { name: "ECDSA", namedCurve: "P-521" };
48
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
49
+ break;
50
+ case "ECDH-ES":
51
+ case "ECDH-ES+A128KW":
52
+ case "ECDH-ES+A192KW":
53
+ case "ECDH-ES+A256KW":
54
+ algorithm = { name: "ECDH", namedCurve: jwk.crv };
55
+ keyUsages = jwk.d ? ["deriveBits"] : [];
56
+ break;
57
+ default:
58
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
59
+ }
60
+ break;
61
+ }
62
+ case "OKP": {
63
+ switch (jwk.alg) {
64
+ case "Ed25519":
65
+ algorithm = { name: "Ed25519" };
66
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67
+ break;
68
+ case "EdDSA":
69
+ algorithm = { name: jwk.crv };
70
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
71
+ break;
72
+ case "ECDH-ES":
73
+ case "ECDH-ES+A128KW":
74
+ case "ECDH-ES+A192KW":
75
+ case "ECDH-ES+A256KW":
76
+ algorithm = { name: jwk.crv };
77
+ keyUsages = jwk.d ? ["deriveBits"] : [];
78
+ break;
79
+ default:
80
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
81
+ }
82
+ break;
83
+ }
84
+ default:
85
+ throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
86
+ }
87
+ return { algorithm, keyUsages };
88
+ }
89
+ const parse = async (jwk) => {
90
+ if (!jwk.alg) {
91
+ throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
92
+ }
93
+ const { algorithm, keyUsages } = subtleMapping(jwk);
94
+ const rest = [
95
+ algorithm,
96
+ jwk.ext ?? false,
97
+ jwk.key_ops ?? keyUsages
98
+ ];
99
+ const keyData = { ...jwk };
100
+ delete keyData.alg;
101
+ delete keyData.use;
102
+ return crypto.subtle.importKey("jwk", keyData, ...rest);
103
+ };
104
+ export {
105
+ parse as default
106
+ };
107
+ //# sourceMappingURL=jwk_to_key.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"jwk_to_key.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/jwk_to_key.js"],"sourcesContent":["import crypto from './webcrypto.js';\nimport { JOSENotSupported } from '../util/errors.js';\nfunction subtleMapping(jwk) {\n let algorithm;\n let keyUsages;\n switch (jwk.kty) {\n case 'RSA': {\n switch (jwk.alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,\n };\n keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'EC': {\n switch (jwk.alg) {\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: 'ECDH', namedCurve: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'OKP': {\n switch (jwk.alg) {\n case 'Ed25519':\n algorithm = { name: 'Ed25519' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'EdDSA':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"kty\" (Key Type) Parameter value');\n }\n return { algorithm, keyUsages };\n}\nconst parse = async (jwk) => {\n if (!jwk.alg) {\n throw new TypeError('\"alg\" argument is required when \"jwk.alg\" is not present');\n }\n const { algorithm, keyUsages } = subtleMapping(jwk);\n const rest = [\n algorithm,\n jwk.ext ?? false,\n jwk.key_ops ?? keyUsages,\n ];\n const keyData = { ...jwk };\n delete keyData.alg;\n delete keyData.use;\n return crypto.subtle.importKey('jwk', keyData, ...rest);\n};\nexport default parse;\n"],"names":[],"mappings":";;AAEA,SAAS,cAAc,KAAK;AACxB,MAAI;AACJ,MAAI;AACJ,UAAQ,IAAI,KAAG;AAAA,IACX,KAAK,OAAO;AACR,cAAQ,IAAI,KAAG;AAAA,QACX,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AACD,sBAAY,EAAE,MAAM,WAAW,MAAM,OAAO,IAAI,IAAI,MAAM,EAAE,CAAC,GAAE;AAC/D,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AACD,sBAAY,EAAE,MAAM,qBAAqB,MAAM,OAAO,IAAI,IAAI,MAAM,EAAE,CAAC,GAAE;AACzE,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AACD,sBAAY;AAAA,YACR,MAAM;AAAA,YACN,MAAM,OAAO,SAAS,IAAI,IAAI,MAAM,EAAE,GAAG,EAAE,KAAK,CAAC;AAAA,UACzE;AACoB,sBAAY,IAAI,IAAI,CAAC,WAAW,WAAW,IAAI,CAAC,WAAW,SAAS;AACpE;AAAA,QACJ;AACI,gBAAM,IAAI,iBAAiB,8DAA8D;AAAA,MAC7G;AACY;AAAA,IACJ;AAAA,IACA,KAAK,MAAM;AACP,cAAQ,IAAI,KAAG;AAAA,QACX,KAAK;AACD,sBAAY,EAAE,MAAM,SAAS,YAAY,QAAO;AAChD,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AACD,sBAAY,EAAE,MAAM,SAAS,YAAY,QAAO;AAChD,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AACD,sBAAY,EAAE,MAAM,SAAS,YAAY,QAAO;AAChD,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AACD,sBAAY,EAAE,MAAM,QAAQ,YAAY,IAAI,IAAG;AAC/C,sBAAY,IAAI,IAAI,CAAC,YAAY,IAAI,CAAA;AACrC;AAAA,QACJ;AACI,gBAAM,IAAI,iBAAiB,8DAA8D;AAAA,MAC7G;AACY;AAAA,IACJ;AAAA,IACA,KAAK,OAAO;AACR,cAAQ,IAAI,KAAG;AAAA,QACX,KAAK;AACD,sBAAY,EAAE,MAAM,UAAS;AAC7B,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AACD,sBAAY,EAAE,MAAM,IAAI,IAAG;AAC3B,sBAAY,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ;AACxC;AAAA,QACJ,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK;AACD,sBAAY,EAAE,MAAM,IAAI,IAAG;AAC3B,sBAAY,IAAI,IAAI,CAAC,YAAY,IAAI,CAAA;AACrC;AAAA,QACJ;AACI,gBAAM,IAAI,iBAAiB,8DAA8D;AAAA,MAC7G;AACY;AAAA,IACJ;AAAA,IACA;AACI,YAAM,IAAI,iBAAiB,6DAA6D;AAAA,EACpG;AACI,SAAO,EAAE,WAAW,UAAS;AACjC;AACK,MAAC,QAAQ,OAAO,QAAQ;AACzB,MAAI,CAAC,IAAI,KAAK;AACV,UAAM,IAAI,UAAU,0DAA0D;AAAA,EAClF;AACA,QAAM,EAAE,WAAW,cAAc,cAAc,GAAG;AAClD,QAAM,OAAO;AAAA,IACT;AAAA,IACA,IAAI,OAAO;AAAA,IACX,IAAI,WAAW;AAAA,EACvB;AACI,QAAM,UAAU,EAAE,GAAG,IAAG;AACxB,SAAO,QAAQ;AACf,SAAO,QAAQ;AACf,SAAO,OAAO,OAAO,UAAU,OAAO,SAAS,GAAG,IAAI;AAC1D;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("../lib/is_jwk.cjs.js"),t=require("./base64url.cjs.js"),r=require("./jwk_to_key.cjs.js"),i=e=>t.decode(e);let a,l;const n=e=>"KeyObject"===e?.[Symbol.toStringTag],o=async(e,t,i,a,l=!1)=>{let n=e.get(t);if(n?.[a])return n[a];const o=await r.default({...i,alg:a});return l&&Object.freeze(t),n?n[a]=o:e.set(t,{[a]:o}),o},u={normalizePublicKey:(r,a)=>{if(n(r)){let e=r.export({format:"jwk"});return delete e.d,delete e.dp,delete e.dq,delete e.p,delete e.q,delete e.qi,e.k?i(e.k):(l||(l=new WeakMap),o(l,r,e,a))}if(e.isJWK(r)){if(r.k)return t.decode(r.k);l||(l=new WeakMap);return o(l,r,r,a,!0)}return r},normalizePrivateKey:(r,l)=>{if(n(r)){let e=r.export({format:"jwk"});return e.k?i(e.k):(a||(a=new WeakMap),o(a,r,e,l))}if(e.isJWK(r)){if(r.k)return t.decode(r.k);a||(a=new WeakMap);return o(a,r,r,l,!0)}return r}};exports.default=u;
2
+ //# sourceMappingURL=normalize_key.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"normalize_key.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/normalize_key.js"],"sourcesContent":["import { isJWK } from '../lib/is_jwk.js';\nimport { decode } from './base64url.js';\nimport importJWK from './jwk_to_key.js';\nconst exportKeyValue = (k) => decode(k);\nlet privCache;\nlet pubCache;\nconst isKeyObject = (key) => {\n return key?.[Symbol.toStringTag] === 'KeyObject';\n};\nconst importAndCache = async (cache, key, jwk, alg, freeze = false) => {\n let cached = cache.get(key);\n if (cached?.[alg]) {\n return cached[alg];\n }\n const cryptoKey = await importJWK({ ...jwk, alg });\n if (freeze)\n Object.freeze(key);\n if (!cached) {\n cache.set(key, { [alg]: cryptoKey });\n }\n else {\n cached[alg] = cryptoKey;\n }\n return cryptoKey;\n};\nconst normalizePublicKey = (key, alg) => {\n if (isKeyObject(key)) {\n let jwk = key.export({ format: 'jwk' });\n delete jwk.d;\n delete jwk.dp;\n delete jwk.dq;\n delete jwk.p;\n delete jwk.q;\n delete jwk.qi;\n if (jwk.k) {\n return exportKeyValue(jwk.k);\n }\n pubCache || (pubCache = new WeakMap());\n return importAndCache(pubCache, key, jwk, alg);\n }\n if (isJWK(key)) {\n if (key.k)\n return decode(key.k);\n pubCache || (pubCache = new WeakMap());\n const cryptoKey = importAndCache(pubCache, key, key, alg, true);\n return cryptoKey;\n }\n return key;\n};\nconst normalizePrivateKey = (key, alg) => {\n if (isKeyObject(key)) {\n let jwk = key.export({ format: 'jwk' });\n if (jwk.k) {\n return exportKeyValue(jwk.k);\n }\n privCache || (privCache = new WeakMap());\n return importAndCache(privCache, key, jwk, alg);\n }\n if (isJWK(key)) {\n if (key.k)\n return decode(key.k);\n privCache || (privCache = new WeakMap());\n const cryptoKey = importAndCache(privCache, key, key, alg, true);\n return cryptoKey;\n }\n return key;\n};\nexport default { normalizePublicKey, normalizePrivateKey };\n"],"names":["exportKeyValue","k","decode","privCache","pubCache","isKeyObject","key","Symbol","toStringTag","importAndCache","async","cache","jwk","alg","freeze","cached","get","cryptoKey","importJWK","Object","set","normalize","normalizePublicKey","export","format","d","dp","dq","p","q","qi","WeakMap","isJWK","normalizePrivateKey"],"mappings":"qNAGMA,EAAkBC,GAAMC,EAAAA,OAAOD,GACrC,IAAIE,EACAC,EACJ,MAAMC,EAAeC,GACoB,cAA9BA,IAAMC,OAAOC,aAElBC,EAAiBC,MAAOC,EAAOL,EAAKM,EAAKC,EAAKC,GAAS,KACzD,IAAIC,EAASJ,EAAMK,IAAIV,GACvB,GAAIS,IAASF,GACT,OAAOE,EAAOF,GAElB,MAAMI,QAAkBC,EAAAA,QAAU,IAAKN,EAAKC,QAS5C,OARIC,GACAK,OAAOL,OAAOR,GACbS,EAIDA,EAAOF,GAAOI,EAHdN,EAAMS,IAAId,EAAK,CAAEO,CAACA,GAAMI,IAKrBA,GA4CXI,EAAe,CAAEC,mBA1CU,CAAChB,EAAKO,KAC7B,GAAIR,EAAYC,GAAM,CAClB,IAAIM,EAAMN,EAAIiB,OAAO,CAAEC,OAAQ,QAO/B,cANOZ,EAAIa,SACJb,EAAIc,UACJd,EAAIe,UACJf,EAAIgB,SACJhB,EAAIiB,SACJjB,EAAIkB,GACPlB,EAAIX,EACGD,EAAeY,EAAIX,IAE9BG,IAAaA,MAAe2B,SACrBtB,EAAeL,EAAUE,EAAKM,EAAKC,GAC9C,CACA,GAAImB,EAAAA,MAAM1B,GAAM,CACZ,GAAIA,EAAIL,EACJ,OAAOC,EAAAA,OAAOI,EAAIL,GACtBG,IAAaA,MAAe2B,SAE5B,OADkBtB,EAAeL,EAAUE,EAAKA,EAAKO,GAAK,EAE9D,CACA,OAAOP,GAoB0B2B,oBAlBT,CAAC3B,EAAKO,KAC9B,GAAIR,EAAYC,GAAM,CAClB,IAAIM,EAAMN,EAAIiB,OAAO,CAAEC,OAAQ,QAC/B,OAAIZ,EAAIX,EACGD,EAAeY,EAAIX,IAE9BE,IAAcA,MAAgB4B,SACvBtB,EAAeN,EAAWG,EAAKM,EAAKC,GAC/C,CACA,GAAImB,EAAAA,MAAM1B,GAAM,CACZ,GAAIA,EAAIL,EACJ,OAAOC,EAAAA,OAAOI,EAAIL,GACtBE,IAAcA,MAAgB4B,SAE9B,OADkBtB,EAAeN,EAAWG,EAAKA,EAAKO,GAAK,EAE/D,CACA,OAAOP","x_google_ignoreList":[0]}
@@ -0,0 +1,71 @@
1
+ import { isJWK } from "../lib/is_jwk.esm.js";
2
+ import { decode } from "./base64url.esm.js";
3
+ import parse from "./jwk_to_key.esm.js";
4
+ const exportKeyValue = (k) => decode(k);
5
+ let privCache;
6
+ let pubCache;
7
+ const isKeyObject = (key) => {
8
+ return key?.[Symbol.toStringTag] === "KeyObject";
9
+ };
10
+ const importAndCache = async (cache, key, jwk, alg, freeze = false) => {
11
+ let cached = cache.get(key);
12
+ if (cached?.[alg]) {
13
+ return cached[alg];
14
+ }
15
+ const cryptoKey = await parse({ ...jwk, alg });
16
+ if (freeze)
17
+ Object.freeze(key);
18
+ if (!cached) {
19
+ cache.set(key, { [alg]: cryptoKey });
20
+ } else {
21
+ cached[alg] = cryptoKey;
22
+ }
23
+ return cryptoKey;
24
+ };
25
+ const normalizePublicKey = (key, alg) => {
26
+ if (isKeyObject(key)) {
27
+ let jwk = key.export({ format: "jwk" });
28
+ delete jwk.d;
29
+ delete jwk.dp;
30
+ delete jwk.dq;
31
+ delete jwk.p;
32
+ delete jwk.q;
33
+ delete jwk.qi;
34
+ if (jwk.k) {
35
+ return exportKeyValue(jwk.k);
36
+ }
37
+ pubCache || (pubCache = /* @__PURE__ */ new WeakMap());
38
+ return importAndCache(pubCache, key, jwk, alg);
39
+ }
40
+ if (isJWK(key)) {
41
+ if (key.k)
42
+ return decode(key.k);
43
+ pubCache || (pubCache = /* @__PURE__ */ new WeakMap());
44
+ const cryptoKey = importAndCache(pubCache, key, key, alg, true);
45
+ return cryptoKey;
46
+ }
47
+ return key;
48
+ };
49
+ const normalizePrivateKey = (key, alg) => {
50
+ if (isKeyObject(key)) {
51
+ let jwk = key.export({ format: "jwk" });
52
+ if (jwk.k) {
53
+ return exportKeyValue(jwk.k);
54
+ }
55
+ privCache || (privCache = /* @__PURE__ */ new WeakMap());
56
+ return importAndCache(privCache, key, jwk, alg);
57
+ }
58
+ if (isJWK(key)) {
59
+ if (key.k)
60
+ return decode(key.k);
61
+ privCache || (privCache = /* @__PURE__ */ new WeakMap());
62
+ const cryptoKey = importAndCache(privCache, key, key, alg, true);
63
+ return cryptoKey;
64
+ }
65
+ return key;
66
+ };
67
+ const normalize = { normalizePublicKey, normalizePrivateKey };
68
+ export {
69
+ normalize as default
70
+ };
71
+ //# sourceMappingURL=normalize_key.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"normalize_key.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/normalize_key.js"],"sourcesContent":["import { isJWK } from '../lib/is_jwk.js';\nimport { decode } from './base64url.js';\nimport importJWK from './jwk_to_key.js';\nconst exportKeyValue = (k) => decode(k);\nlet privCache;\nlet pubCache;\nconst isKeyObject = (key) => {\n return key?.[Symbol.toStringTag] === 'KeyObject';\n};\nconst importAndCache = async (cache, key, jwk, alg, freeze = false) => {\n let cached = cache.get(key);\n if (cached?.[alg]) {\n return cached[alg];\n }\n const cryptoKey = await importJWK({ ...jwk, alg });\n if (freeze)\n Object.freeze(key);\n if (!cached) {\n cache.set(key, { [alg]: cryptoKey });\n }\n else {\n cached[alg] = cryptoKey;\n }\n return cryptoKey;\n};\nconst normalizePublicKey = (key, alg) => {\n if (isKeyObject(key)) {\n let jwk = key.export({ format: 'jwk' });\n delete jwk.d;\n delete jwk.dp;\n delete jwk.dq;\n delete jwk.p;\n delete jwk.q;\n delete jwk.qi;\n if (jwk.k) {\n return exportKeyValue(jwk.k);\n }\n pubCache || (pubCache = new WeakMap());\n return importAndCache(pubCache, key, jwk, alg);\n }\n if (isJWK(key)) {\n if (key.k)\n return decode(key.k);\n pubCache || (pubCache = new WeakMap());\n const cryptoKey = importAndCache(pubCache, key, key, alg, true);\n return cryptoKey;\n }\n return key;\n};\nconst normalizePrivateKey = (key, alg) => {\n if (isKeyObject(key)) {\n let jwk = key.export({ format: 'jwk' });\n if (jwk.k) {\n return exportKeyValue(jwk.k);\n }\n privCache || (privCache = new WeakMap());\n return importAndCache(privCache, key, jwk, alg);\n }\n if (isJWK(key)) {\n if (key.k)\n return decode(key.k);\n privCache || (privCache = new WeakMap());\n const cryptoKey = importAndCache(privCache, key, key, alg, true);\n return cryptoKey;\n }\n return key;\n};\nexport default { normalizePublicKey, normalizePrivateKey };\n"],"names":["importJWK"],"mappings":";;;AAGA,MAAM,iBAAiB,CAAC,MAAM,OAAO,CAAC;AACtC,IAAI;AACJ,IAAI;AACJ,MAAM,cAAc,CAAC,QAAQ;AACzB,SAAO,MAAM,OAAO,WAAW,MAAM;AACzC;AACA,MAAM,iBAAiB,OAAO,OAAO,KAAK,KAAK,KAAK,SAAS,UAAU;AACnE,MAAI,SAAS,MAAM,IAAI,GAAG;AAC1B,MAAI,SAAS,GAAG,GAAG;AACf,WAAO,OAAO,GAAG;AAAA,EACrB;AACA,QAAM,YAAY,MAAMA,MAAU,EAAE,GAAG,KAAK,IAAG,CAAE;AACjD,MAAI;AACA,WAAO,OAAO,GAAG;AACrB,MAAI,CAAC,QAAQ;AACT,UAAM,IAAI,KAAK,EAAE,CAAC,GAAG,GAAG,UAAS,CAAE;AAAA,EACvC,OACK;AACD,WAAO,GAAG,IAAI;AAAA,EAClB;AACA,SAAO;AACX;AACA,MAAM,qBAAqB,CAAC,KAAK,QAAQ;AACrC,MAAI,YAAY,GAAG,GAAG;AAClB,QAAI,MAAM,IAAI,OAAO,EAAE,QAAQ,MAAK,CAAE;AACtC,WAAO,IAAI;AACX,WAAO,IAAI;AACX,WAAO,IAAI;AACX,WAAO,IAAI;AACX,WAAO,IAAI;AACX,WAAO,IAAI;AACX,QAAI,IAAI,GAAG;AACP,aAAO,eAAe,IAAI,CAAC;AAAA,IAC/B;AACA,iBAAa,WAAW,oBAAI;AAC5B,WAAO,eAAe,UAAU,KAAK,KAAK,GAAG;AAAA,EACjD;AACA,MAAI,MAAM,GAAG,GAAG;AACZ,QAAI,IAAI;AACJ,aAAO,OAAO,IAAI,CAAC;AACvB,iBAAa,WAAW,oBAAI;AAC5B,UAAM,YAAY,eAAe,UAAU,KAAK,KAAK,KAAK,IAAI;AAC9D,WAAO;AAAA,EACX;AACA,SAAO;AACX;AACA,MAAM,sBAAsB,CAAC,KAAK,QAAQ;AACtC,MAAI,YAAY,GAAG,GAAG;AAClB,QAAI,MAAM,IAAI,OAAO,EAAE,QAAQ,MAAK,CAAE;AACtC,QAAI,IAAI,GAAG;AACP,aAAO,eAAe,IAAI,CAAC;AAAA,IAC/B;AACA,kBAAc,YAAY,oBAAI;AAC9B,WAAO,eAAe,WAAW,KAAK,KAAK,GAAG;AAAA,EAClD;AACA,MAAI,MAAM,GAAG,GAAG;AACZ,QAAI,IAAI;AACJ,aAAO,OAAO,IAAI,CAAC;AACvB,kBAAc,YAAY,oBAAI;AAC9B,UAAM,YAAY,eAAe,WAAW,KAAK,KAAK,KAAK,IAAI;AAC/D,WAAO;AAAA,EACX;AACA,SAAO;AACX;AACA,MAAA,YAAe,EAAE,oBAAoB,oBAAmB;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./subtle_dsa.cjs.js"),t=require("./webcrypto.cjs.js"),s=require("./check_key_length.cjs.js"),r=require("./get_sign_verify_key.cjs.js");exports.default=async(u,a,i)=>{const l=await r.default(u,a,"sign");s.default(u,l);const c=await t.default.subtle.sign(e.default(u,l.algorithm),l,i);return new Uint8Array(c)};
2
+ //# sourceMappingURL=sign.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sign.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/sign.js"],"sourcesContent":["import subtleAlgorithm from './subtle_dsa.js';\nimport crypto from './webcrypto.js';\nimport checkKeyLength from './check_key_length.js';\nimport getSignKey from './get_sign_verify_key.js';\nconst sign = async (alg, key, data) => {\n const cryptoKey = await getSignKey(alg, key, 'sign');\n checkKeyLength(alg, cryptoKey);\n const signature = await crypto.subtle.sign(subtleAlgorithm(alg, cryptoKey.algorithm), cryptoKey, data);\n return new Uint8Array(signature);\n};\nexport default sign;\n"],"names":["async","alg","key","data","cryptoKey","getSignKey","checkKeyLength","signature","crypto","subtle","sign","subtleAlgorithm","algorithm","Uint8Array"],"mappings":"oRAIaA,MAAOC,EAAKC,EAAKC,KAC1B,MAAMC,QAAkBC,EAAAA,QAAWJ,EAAKC,EAAK,QAC7CI,EAAAA,QAAeL,EAAKG,GACpB,MAAMG,QAAkBC,UAAOC,OAAOC,KAAKC,EAAAA,QAAgBV,EAAKG,EAAUQ,WAAYR,EAAWD,GACjG,OAAO,IAAIU,WAAWN","x_google_ignoreList":[0]}
@@ -0,0 +1,14 @@
1
+ import subtleDsa from "./subtle_dsa.esm.js";
2
+ import crypto from "./webcrypto.esm.js";
3
+ import checkKeyLength from "./check_key_length.esm.js";
4
+ import getCryptoKey from "./get_sign_verify_key.esm.js";
5
+ const sign = async (alg, key, data) => {
6
+ const cryptoKey = await getCryptoKey(alg, key, "sign");
7
+ checkKeyLength(alg, cryptoKey);
8
+ const signature = await crypto.subtle.sign(subtleDsa(alg, cryptoKey.algorithm), cryptoKey, data);
9
+ return new Uint8Array(signature);
10
+ };
11
+ export {
12
+ sign as default
13
+ };
14
+ //# sourceMappingURL=sign.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sign.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/sign.js"],"sourcesContent":["import subtleAlgorithm from './subtle_dsa.js';\nimport crypto from './webcrypto.js';\nimport checkKeyLength from './check_key_length.js';\nimport getSignKey from './get_sign_verify_key.js';\nconst sign = async (alg, key, data) => {\n const cryptoKey = await getSignKey(alg, key, 'sign');\n checkKeyLength(alg, cryptoKey);\n const signature = await crypto.subtle.sign(subtleAlgorithm(alg, cryptoKey.algorithm), cryptoKey, data);\n return new Uint8Array(signature);\n};\nexport default sign;\n"],"names":["getSignKey","subtleAlgorithm"],"mappings":";;;;AAIK,MAAC,OAAO,OAAO,KAAK,KAAK,SAAS;AACnC,QAAM,YAAY,MAAMA,aAAW,KAAK,KAAK,MAAM;AACnD,iBAAe,KAAK,SAAS;AAC7B,QAAM,YAAY,MAAM,OAAO,OAAO,KAAKC,UAAgB,KAAK,UAAU,SAAS,GAAG,WAAW,IAAI;AACrG,SAAO,IAAI,WAAW,SAAS;AACnC;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("../util/errors.cjs.js");exports.default=function(a,s){const r=`SHA-${a.slice(-3)}`;switch(a){case"HS256":case"HS384":case"HS512":return{hash:r,name:"HMAC"};case"PS256":case"PS384":case"PS512":return{hash:r,name:"RSA-PSS",saltLength:a.slice(-3)>>3};case"RS256":case"RS384":case"RS512":return{hash:r,name:"RSASSA-PKCS1-v1_5"};case"ES256":case"ES384":case"ES512":return{hash:r,name:"ECDSA",namedCurve:s.namedCurve};case"Ed25519":return{name:"Ed25519"};case"EdDSA":return{name:s.name};default:throw new e.JOSENotSupported(`alg ${a} is not supported either by JOSE or your javascript runtime`)}};
2
+ //# sourceMappingURL=subtle_dsa.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"subtle_dsa.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/subtle_dsa.js"],"sourcesContent":["import { JOSENotSupported } from '../util/errors.js';\nexport default function subtleDsa(alg, algorithm) {\n const hash = `SHA-${alg.slice(-3)}`;\n switch (alg) {\n case 'HS256':\n case 'HS384':\n case 'HS512':\n return { hash, name: 'HMAC' };\n case 'PS256':\n case 'PS384':\n case 'PS512':\n return { hash, name: 'RSA-PSS', saltLength: alg.slice(-3) >> 3 };\n case 'RS256':\n case 'RS384':\n case 'RS512':\n return { hash, name: 'RSASSA-PKCS1-v1_5' };\n case 'ES256':\n case 'ES384':\n case 'ES512':\n return { hash, name: 'ECDSA', namedCurve: algorithm.namedCurve };\n case 'Ed25519':\n return { name: 'Ed25519' };\n case 'EdDSA':\n return { name: algorithm.name };\n default:\n throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);\n }\n}\n"],"names":["alg","algorithm","hash","slice","name","saltLength","namedCurve","JOSENotSupported"],"mappings":"qKACe,SAAmBA,EAAKC,GACnC,MAAMC,EAAO,OAAOF,EAAIG,YACxB,OAAQH,GACJ,IAAK,QACL,IAAK,QACL,IAAK,QACD,MAAO,CAAEE,OAAME,KAAM,QACzB,IAAK,QACL,IAAK,QACL,IAAK,QACD,MAAO,CAAEF,OAAME,KAAM,UAAWC,WAAYL,EAAIG,OAAM,IAAO,GACjE,IAAK,QACL,IAAK,QACL,IAAK,QACD,MAAO,CAAED,OAAME,KAAM,qBACzB,IAAK,QACL,IAAK,QACL,IAAK,QACD,MAAO,CAAEF,OAAME,KAAM,QAASE,WAAYL,EAAUK,YACxD,IAAK,UACD,MAAO,CAAEF,KAAM,WACnB,IAAK,QACD,MAAO,CAAEA,KAAMH,EAAUG,MAC7B,QACI,MAAM,IAAIG,EAAAA,iBAAiB,OAAOP,gEAE9C","x_google_ignoreList":[0]}
@@ -0,0 +1,32 @@
1
+ import { JOSENotSupported } from "../util/errors.esm.js";
2
+ function subtleDsa(alg, algorithm) {
3
+ const hash = `SHA-${alg.slice(-3)}`;
4
+ switch (alg) {
5
+ case "HS256":
6
+ case "HS384":
7
+ case "HS512":
8
+ return { hash, name: "HMAC" };
9
+ case "PS256":
10
+ case "PS384":
11
+ case "PS512":
12
+ return { hash, name: "RSA-PSS", saltLength: alg.slice(-3) >> 3 };
13
+ case "RS256":
14
+ case "RS384":
15
+ case "RS512":
16
+ return { hash, name: "RSASSA-PKCS1-v1_5" };
17
+ case "ES256":
18
+ case "ES384":
19
+ case "ES512":
20
+ return { hash, name: "ECDSA", namedCurve: algorithm.namedCurve };
21
+ case "Ed25519":
22
+ return { name: "Ed25519" };
23
+ case "EdDSA":
24
+ return { name: algorithm.name };
25
+ default:
26
+ throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
27
+ }
28
+ }
29
+ export {
30
+ subtleDsa as default
31
+ };
32
+ //# sourceMappingURL=subtle_dsa.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"subtle_dsa.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/subtle_dsa.js"],"sourcesContent":["import { JOSENotSupported } from '../util/errors.js';\nexport default function subtleDsa(alg, algorithm) {\n const hash = `SHA-${alg.slice(-3)}`;\n switch (alg) {\n case 'HS256':\n case 'HS384':\n case 'HS512':\n return { hash, name: 'HMAC' };\n case 'PS256':\n case 'PS384':\n case 'PS512':\n return { hash, name: 'RSA-PSS', saltLength: alg.slice(-3) >> 3 };\n case 'RS256':\n case 'RS384':\n case 'RS512':\n return { hash, name: 'RSASSA-PKCS1-v1_5' };\n case 'ES256':\n case 'ES384':\n case 'ES512':\n return { hash, name: 'ECDSA', namedCurve: algorithm.namedCurve };\n case 'Ed25519':\n return { name: 'Ed25519' };\n case 'EdDSA':\n return { name: algorithm.name };\n default:\n throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);\n }\n}\n"],"names":[],"mappings":";AACe,SAAS,UAAU,KAAK,WAAW;AAC9C,QAAM,OAAO,OAAO,IAAI,MAAM,EAAE,CAAC;AACjC,UAAQ,KAAG;AAAA,IACP,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,aAAO,EAAE,MAAM,MAAM,OAAM;AAAA,IAC/B,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,aAAO,EAAE,MAAM,MAAM,WAAW,YAAY,IAAI,MAAM,EAAE,KAAK,EAAC;AAAA,IAClE,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,aAAO,EAAE,MAAM,MAAM,oBAAmB;AAAA,IAC5C,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,aAAO,EAAE,MAAM,MAAM,SAAS,YAAY,UAAU,WAAU;AAAA,IAClE,KAAK;AACD,aAAO,EAAE,MAAM,UAAS;AAAA,IAC5B,KAAK;AACD,aAAO,EAAE,MAAM,UAAU,KAAI;AAAA,IACjC;AACI,YAAM,IAAI,iBAAiB,OAAO,GAAG,6DAA6D;AAAA,EAC9G;AACA;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=crypto;exports.default=e,exports.isCryptoKey=e=>e instanceof CryptoKey;
2
+ //# sourceMappingURL=webcrypto.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"webcrypto.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/webcrypto.js"],"sourcesContent":["export default crypto;\nexport const isCryptoKey = (key) => key instanceof CryptoKey;\n"],"names":["crypto$1","crypto","key","CryptoKey"],"mappings":"4GAAA,MAAAA,EAAeC,6CACaC,GAAQA,aAAeC","x_google_ignoreList":[0]}
@@ -0,0 +1,7 @@
1
+ const crypto$1 = crypto;
2
+ const isCryptoKey = (key) => key instanceof CryptoKey;
3
+ export {
4
+ crypto$1 as default,
5
+ isCryptoKey
6
+ };
7
+ //# sourceMappingURL=webcrypto.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"webcrypto.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/webcrypto.js"],"sourcesContent":["export default crypto;\nexport const isCryptoKey = (key) => key instanceof CryptoKey;\n"],"names":[],"mappings":"AAAA,MAAA,WAAe;AACH,MAAC,cAAc,CAAC,QAAQ,eAAe;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});class e extends Error{constructor(e,s){super(e,s),this.code="ERR_JOSE_GENERIC",this.name=this.constructor.name,Error.captureStackTrace?.(this,this.constructor)}}e.code="ERR_JOSE_GENERIC";class s extends e{constructor(e,s,t="unspecified",o="unspecified"){super(e,{cause:{claim:t,reason:o,payload:s}}),this.code="ERR_JWT_CLAIM_VALIDATION_FAILED",this.claim=t,this.reason=o,this.payload=s}}s.code="ERR_JWT_CLAIM_VALIDATION_FAILED";class t extends e{constructor(e,s,t="unspecified",o="unspecified"){super(e,{cause:{claim:t,reason:o,payload:s}}),this.code="ERR_JWT_EXPIRED",this.claim=t,this.reason=o,this.payload=s}}t.code="ERR_JWT_EXPIRED";class o extends e{constructor(){super(...arguments),this.code="ERR_JOSE_ALG_NOT_ALLOWED"}}o.code="ERR_JOSE_ALG_NOT_ALLOWED";class c extends e{constructor(){super(...arguments),this.code="ERR_JOSE_NOT_SUPPORTED"}}c.code="ERR_JOSE_NOT_SUPPORTED";class r extends e{constructor(e="decryption operation failed",s){super(e,s),this.code="ERR_JWE_DECRYPTION_FAILED"}}r.code="ERR_JWE_DECRYPTION_FAILED";class _ extends e{constructor(){super(...arguments),this.code="ERR_JWE_INVALID"}}_.code="ERR_JWE_INVALID";class E extends e{constructor(){super(...arguments),this.code="ERR_JWS_INVALID"}}E.code="ERR_JWS_INVALID";class i extends e{constructor(){super(...arguments),this.code="ERR_JWT_INVALID"}}i.code="ERR_JWT_INVALID";class d extends e{constructor(){super(...arguments),this.code="ERR_JWK_INVALID"}}d.code="ERR_JWK_INVALID";class R extends e{constructor(){super(...arguments),this.code="ERR_JWKS_INVALID"}}R.code="ERR_JWKS_INVALID";class n extends e{constructor(e="no applicable key found in the JSON Web Key Set",s){super(e,s),this.code="ERR_JWKS_NO_MATCHING_KEY"}}n.code="ERR_JWKS_NO_MATCHING_KEY";class a extends e{constructor(e="multiple matching keys found in the JSON Web Key Set",s){super(e,s),this.code="ERR_JWKS_MULTIPLE_MATCHING_KEYS"}}a.code="ERR_JWKS_MULTIPLE_MATCHING_KEYS";class I extends e{constructor(e="request timed out",s){super(e,s),this.code="ERR_JWKS_TIMEOUT"}}I.code="ERR_JWKS_TIMEOUT";class u extends e{constructor(e="signature verification failed",s){super(e,s),this.code="ERR_JWS_SIGNATURE_VERIFICATION_FAILED"}}u.code="ERR_JWS_SIGNATURE_VERIFICATION_FAILED",exports.JOSEAlgNotAllowed=o,exports.JOSEError=e,exports.JOSENotSupported=c,exports.JWEDecryptionFailed=r,exports.JWEInvalid=_,exports.JWKInvalid=d,exports.JWKSInvalid=R,exports.JWKSMultipleMatchingKeys=a,exports.JWKSNoMatchingKey=n,exports.JWKSTimeout=I,exports.JWSInvalid=E,exports.JWSSignatureVerificationFailed=u,exports.JWTClaimValidationFailed=s,exports.JWTExpired=t,exports.JWTInvalid=i;
2
+ //# sourceMappingURL=errors.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"errors.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/util/errors.js"],"sourcesContent":["export class JOSEError extends Error {\n constructor(message, options) {\n super(message, options);\n this.code = 'ERR_JOSE_GENERIC';\n this.name = this.constructor.name;\n Error.captureStackTrace?.(this, this.constructor);\n }\n}\nJOSEError.code = 'ERR_JOSE_GENERIC';\nexport class JWTClaimValidationFailed extends JOSEError {\n constructor(message, payload, claim = 'unspecified', reason = 'unspecified') {\n super(message, { cause: { claim, reason, payload } });\n this.code = 'ERR_JWT_CLAIM_VALIDATION_FAILED';\n this.claim = claim;\n this.reason = reason;\n this.payload = payload;\n }\n}\nJWTClaimValidationFailed.code = 'ERR_JWT_CLAIM_VALIDATION_FAILED';\nexport class JWTExpired extends JOSEError {\n constructor(message, payload, claim = 'unspecified', reason = 'unspecified') {\n super(message, { cause: { claim, reason, payload } });\n this.code = 'ERR_JWT_EXPIRED';\n this.claim = claim;\n this.reason = reason;\n this.payload = payload;\n }\n}\nJWTExpired.code = 'ERR_JWT_EXPIRED';\nexport class JOSEAlgNotAllowed extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JOSE_ALG_NOT_ALLOWED';\n }\n}\nJOSEAlgNotAllowed.code = 'ERR_JOSE_ALG_NOT_ALLOWED';\nexport class JOSENotSupported extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JOSE_NOT_SUPPORTED';\n }\n}\nJOSENotSupported.code = 'ERR_JOSE_NOT_SUPPORTED';\nexport class JWEDecryptionFailed extends JOSEError {\n constructor(message = 'decryption operation failed', options) {\n super(message, options);\n this.code = 'ERR_JWE_DECRYPTION_FAILED';\n }\n}\nJWEDecryptionFailed.code = 'ERR_JWE_DECRYPTION_FAILED';\nexport class JWEInvalid extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JWE_INVALID';\n }\n}\nJWEInvalid.code = 'ERR_JWE_INVALID';\nexport class JWSInvalid extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JWS_INVALID';\n }\n}\nJWSInvalid.code = 'ERR_JWS_INVALID';\nexport class JWTInvalid extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JWT_INVALID';\n }\n}\nJWTInvalid.code = 'ERR_JWT_INVALID';\nexport class JWKInvalid extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JWK_INVALID';\n }\n}\nJWKInvalid.code = 'ERR_JWK_INVALID';\nexport class JWKSInvalid extends JOSEError {\n constructor() {\n super(...arguments);\n this.code = 'ERR_JWKS_INVALID';\n }\n}\nJWKSInvalid.code = 'ERR_JWKS_INVALID';\nexport class JWKSNoMatchingKey extends JOSEError {\n constructor(message = 'no applicable key found in the JSON Web Key Set', options) {\n super(message, options);\n this.code = 'ERR_JWKS_NO_MATCHING_KEY';\n }\n}\nJWKSNoMatchingKey.code = 'ERR_JWKS_NO_MATCHING_KEY';\nexport class JWKSMultipleMatchingKeys extends JOSEError {\n constructor(message = 'multiple matching keys found in the JSON Web Key Set', options) {\n super(message, options);\n this.code = 'ERR_JWKS_MULTIPLE_MATCHING_KEYS';\n }\n}\nSymbol.asyncIterator;\nJWKSMultipleMatchingKeys.code = 'ERR_JWKS_MULTIPLE_MATCHING_KEYS';\nexport class JWKSTimeout extends JOSEError {\n constructor(message = 'request timed out', options) {\n super(message, options);\n this.code = 'ERR_JWKS_TIMEOUT';\n }\n}\nJWKSTimeout.code = 'ERR_JWKS_TIMEOUT';\nexport class JWSSignatureVerificationFailed extends JOSEError {\n constructor(message = 'signature verification failed', options) {\n super(message, options);\n this.code = 'ERR_JWS_SIGNATURE_VERIFICATION_FAILED';\n }\n}\nJWSSignatureVerificationFailed.code = 'ERR_JWS_SIGNATURE_VERIFICATION_FAILED';\n"],"names":["JOSEError","Error","constructor","message","options","super","this","code","name","captureStackTrace","JWTClaimValidationFailed","payload","claim","reason","cause","JWTExpired","JOSEAlgNotAllowed","arguments","JOSENotSupported","JWEDecryptionFailed","JWEInvalid","JWSInvalid","JWTInvalid","JWKInvalid","JWKSInvalid","JWKSNoMatchingKey","JWKSMultipleMatchingKeys","JWKSTimeout","JWSSignatureVerificationFailed"],"mappings":"gFAAO,MAAMA,UAAkBC,MAC3B,WAAAC,CAAYC,EAASC,GACjBC,MAAMF,EAASC,GACfE,KAAKC,KAAO,mBACZD,KAAKE,KAAOF,KAAKJ,YAAYM,KAC7BP,MAAMQ,oBAAoBH,KAAMA,KAAKJ,YACzC,EAEJF,EAAUO,KAAO,mBACV,MAAMG,UAAiCV,EAC1C,WAAAE,CAAYC,EAASQ,EAASC,EAAQ,cAAeC,EAAS,eAC1DR,MAAMF,EAAS,CAAEW,MAAO,CAAEF,QAAOC,SAAQF,aACzCL,KAAKC,KAAO,kCACZD,KAAKM,MAAQA,EACbN,KAAKO,OAASA,EACdP,KAAKK,QAAUA,CACnB,EAEJD,EAAyBH,KAAO,kCACzB,MAAMQ,UAAmBf,EAC5B,WAAAE,CAAYC,EAASQ,EAASC,EAAQ,cAAeC,EAAS,eAC1DR,MAAMF,EAAS,CAAEW,MAAO,CAAEF,QAAOC,SAAQF,aACzCL,KAAKC,KAAO,kBACZD,KAAKM,MAAQA,EACbN,KAAKO,OAASA,EACdP,KAAKK,QAAUA,CACnB,EAEJI,EAAWR,KAAO,kBACX,MAAMS,UAA0BhB,EACnC,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,0BAChB,EAEJS,EAAkBT,KAAO,2BAClB,MAAMW,UAAyBlB,EAClC,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,wBAChB,EAEJW,EAAiBX,KAAO,yBACjB,MAAMY,UAA4BnB,EACrC,WAAAE,CAAYC,EAAU,8BAA+BC,GACjDC,MAAMF,EAASC,GACfE,KAAKC,KAAO,2BAChB,EAEJY,EAAoBZ,KAAO,4BACpB,MAAMa,UAAmBpB,EAC5B,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,iBAChB,EAEJa,EAAWb,KAAO,kBACX,MAAMc,UAAmBrB,EAC5B,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,iBAChB,EAEJc,EAAWd,KAAO,kBACX,MAAMe,UAAmBtB,EAC5B,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,iBAChB,EAEJe,EAAWf,KAAO,kBACX,MAAMgB,UAAmBvB,EAC5B,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,iBAChB,EAEJgB,EAAWhB,KAAO,kBACX,MAAMiB,UAAoBxB,EAC7B,WAAAE,GACIG,SAASY,WACTX,KAAKC,KAAO,kBAChB,EAEJiB,EAAYjB,KAAO,mBACZ,MAAMkB,UAA0BzB,EACnC,WAAAE,CAAYC,EAAU,kDAAmDC,GACrEC,MAAMF,EAASC,GACfE,KAAKC,KAAO,0BAChB,EAEJkB,EAAkBlB,KAAO,2BAClB,MAAMmB,UAAiC1B,EAC1C,WAAAE,CAAYC,EAAU,uDAAwDC,GAC1EC,MAAMF,EAASC,GACfE,KAAKC,KAAO,iCAChB,EAGJmB,EAAyBnB,KAAO,kCACzB,MAAMoB,UAAoB3B,EAC7B,WAAAE,CAAYC,EAAU,oBAAqBC,GACvCC,MAAMF,EAASC,GACfE,KAAKC,KAAO,kBAChB,EAEJoB,EAAYpB,KAAO,mBACZ,MAAMqB,UAAuC5B,EAChD,WAAAE,CAAYC,EAAU,gCAAiCC,GACnDC,MAAMF,EAASC,GACfE,KAAKC,KAAO,uCAChB,EAEJqB,EAA+BrB,KAAO","x_google_ignoreList":[0]}