@firestartr/cli 1.31.0 → 1.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/build/index.js CHANGED
@@ -116214,7 +116214,7 @@ exports.KubernetesObjectApi = KubernetesObjectApi;
116214
116214
  Object.defineProperty(exports, "__esModule", ({ value: true }));
116215
116215
  exports.OpenIDConnectAuth = void 0;
116216
116216
  const tslib_1 = __nccwpck_require__(33714);
116217
- const oidc = tslib_1.__importStar(__nccwpck_require__(2));
116217
+ const oidc = tslib_1.__importStar(__nccwpck_require__(91188));
116218
116218
  const rfc4648_1 = __nccwpck_require__(53367);
116219
116219
  const util_1 = __nccwpck_require__(73837);
116220
116220
  class OidcClient {
@@ -119169,7 +119169,7 @@ module.exports = __toCommonJS(dist_src_exports);
119169
119169
  var import_universal_user_agent = __nccwpck_require__(65212);
119170
119170
 
119171
119171
  // pkg/dist-src/version.js
119172
- var VERSION = "9.0.5";
119172
+ var VERSION = "9.0.6";
119173
119173
 
119174
119174
  // pkg/dist-src/defaults.js
119175
119175
  var userAgent = `octokit-endpoint.js/${VERSION} ${(0, import_universal_user_agent.getUserAgent)()}`;
@@ -119274,9 +119274,9 @@ function addQueryParameters(url, parameters) {
119274
119274
  }
119275
119275
 
119276
119276
  // pkg/dist-src/util/extract-url-variable-names.js
119277
- var urlVariableRegex = /\{[^}]+\}/g;
119277
+ var urlVariableRegex = /\{[^{}}]+\}/g;
119278
119278
  function removeNonChars(variableName) {
119279
- return variableName.replace(/^\W+|\W+$/g, "").split(/,/);
119279
+ return variableName.replace(/(?:^\W+)|(?:(?<!\W)\W+$)/g, "").split(/,/);
119280
119280
  }
119281
119281
  function extractUrlVariableNames(url) {
119282
119282
  const matches = url.match(urlVariableRegex);
@@ -119462,7 +119462,7 @@ function parse(options) {
119462
119462
  }
119463
119463
  if (url.endsWith("/graphql")) {
119464
119464
  if (options.mediaType.previews?.length) {
119465
- const previewsFromAcceptHeader = headers.accept.match(/[\w-]+(?=-preview)/g) || [];
119465
+ const previewsFromAcceptHeader = headers.accept.match(/(?<![\w-])[\w-]+(?=-preview)/g) || [];
119466
119466
  headers.accept = previewsFromAcceptHeader.concat(options.mediaType.previews).map((preview) => {
119467
119467
  const format = options.mediaType.format ? `.${options.mediaType.format}` : "+json";
119468
119468
  return `application/vnd.github.${preview}-preview${format}`;
@@ -122302,7 +122302,7 @@ var RequestError = class extends Error {
122302
122302
  if (options.request.headers.authorization) {
122303
122303
  requestCopy.headers = Object.assign({}, options.request.headers, {
122304
122304
  authorization: options.request.headers.authorization.replace(
122305
- / .*$/,
122305
+ /(?<! ) .*$/,
122306
122306
  " [REDACTED]"
122307
122307
  )
122308
122308
  });
@@ -122370,7 +122370,7 @@ var import_endpoint = __nccwpck_require__(68773);
122370
122370
  var import_universal_user_agent = __nccwpck_require__(65212);
122371
122371
 
122372
122372
  // pkg/dist-src/version.js
122373
- var VERSION = "8.4.0";
122373
+ var VERSION = "8.4.1";
122374
122374
 
122375
122375
  // pkg/dist-src/is-plain-object.js
122376
122376
  function isPlainObject(value) {
@@ -122429,7 +122429,7 @@ function fetchWrapper(requestOptions) {
122429
122429
  headers[keyAndValue[0]] = keyAndValue[1];
122430
122430
  }
122431
122431
  if ("deprecation" in headers) {
122432
- const matches = headers.link && headers.link.match(/<([^>]+)>; rel="deprecation"/);
122432
+ const matches = headers.link && headers.link.match(/<([^<>]+)>; rel="deprecation"/);
122433
122433
  const deprecationLink = matches && matches.pop();
122434
122434
  log.warn(
122435
122435
  `[@octokit/request] "${requestOptions.method} ${requestOptions.url}" is deprecated. It is scheduled to be removed on ${headers.sunset}${deprecationLink ? `. See ${deprecationLink}` : ""}`
@@ -148344,7 +148344,7 @@ class ApiObject extends constructs_1.Construct {
148344
148344
  }
148345
148345
  }
148346
148346
  exports.ApiObject = ApiObject;
148347
- ApiObject[_a] = { fqn: "cdk8s.ApiObject", version: "2.69.39" };
148347
+ ApiObject[_a] = { fqn: "cdk8s.ApiObject", version: "2.69.57" };
148348
148348
  function parseApiGroup(apiVersion) {
148349
148349
  const v = apiVersion.split('/');
148350
148350
  // no group means "core"
@@ -148559,7 +148559,7 @@ class App extends constructs_1.Construct {
148559
148559
  }
148560
148560
  exports.App = App;
148561
148561
  _a = JSII_RTTI_SYMBOL_1;
148562
- App[_a] = { fqn: "cdk8s.App", version: "2.69.39" };
148562
+ App[_a] = { fqn: "cdk8s.App", version: "2.69.57" };
148563
148563
  function validate(app, cache) {
148564
148564
  const errors = [];
148565
148565
  for (const child of cache.findAll(app.node)) {
@@ -148773,7 +148773,7 @@ class Chart extends constructs_1.Construct {
148773
148773
  }
148774
148774
  }
148775
148775
  exports.Chart = Chart;
148776
- Chart[_a] = { fqn: "cdk8s.Chart", version: "2.69.39" };
148776
+ Chart[_a] = { fqn: "cdk8s.Chart", version: "2.69.57" };
148777
148777
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"chart.js","sourceRoot":"","sources":["../src/chart.ts"],"names":[],"mappings":";;;;;AAAA,2CAAmD;AACnD,6CAAyC;AACzC,+BAA4B;AAC5B,mCAAgC;AAEhC,MAAM,YAAY,GAAG,MAAM,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;AAC/C,MAAM,OAAO,GAAG,SAAS,CAAC;AA6B1B,MAAa,KAAM,SAAQ,sBAAS;IAClC;;;;OAIG;IACI,MAAM,CAAC,OAAO,CAAC,CAAM;QAC1B,OAAO,CAAC,KAAK,IAAI,IAAI,OAAM,CAAC,CAAC,CAAC,KAAK,QAAQ,IAAI,YAAY,IAAI,CAAC,CAAC;IACnE,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,2BAAC,MAAM,CAAC,WAAW,EAAC,CAAC,CAAU;QACpC,OAAO,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,EAAE,CAAC,CAAa;QAC5B,IAAI,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;YACrB,OAAO,CAAC,CAAC;QACX,CAAC;QAED,MAAM,MAAM,GAAG,CAAC,CAAC,IAAI,CAAC,KAAkB,CAAC;QACzC,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACzE,CAAC;QAED,OAAO,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAiBD,YAAY,KAAgB,EAAE,EAAU,EAAE,QAAoB,EAAG;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC;QACjC,IAAI,CAAC,OAAO,GAAG,KAAK,CAAC,MAAM,IAAI,EAAE,CAAC;QAClC,IAAI,CAAC,0BAA0B,GAAG,KAAK,CAAC,yBAAyB,IAAI,KAAK,CAAC;QAE3E,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;IAC7D,CAAC;IAED;;;;OAIG;IACH,IAAW,MAAM;QACf,OAAO,EAAE,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,kBAAkB,CAAC,SAAoB;QAC5C,OAAO,aAAK,CAAC,UAAU,CAAC,SAAS,EAAE;YACjC,WAAW,EAAE,CAAC,IAAI,CAAC,0BAA0B;YAC7C,MAAM,EAAE,SAAS,CAAC,IAAI,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS;SACnD,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,GAAG,YAA0B;QAChD,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,YAAY,CAAC,CAAC;IAC3C,CAAC;IAED;;;OAGG;IACI,MAAM;QACX,OAAO,SAAG,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAkB,EAAE,CAAC,CAAC,YAAY,sBAAS,CAAC,CAAC;IAClF,CAAC;;AAxHH,sBAyHC","sourcesContent":["import { Construct, IConstruct } from 'constructs';\nimport { ApiObject } from './api-object';\nimport { App } from './app';\nimport { Names } from './names';\n\nconst CHART_SYMBOL = Symbol.for('cdk8s.Chart');\nconst CRONJOB = 'CronJob';\n\nexport interface ChartProps {\n  /**\n   * The default namespace for all objects defined in this chart (directly or\n   * indirectly). This namespace will only apply to objects that don't have a\n   * `namespace` explicitly defined for them.\n   *\n   * @default - no namespace is synthesized (usually this implies \"default\")\n   */\n  readonly namespace?: string;\n\n  /**\n   * Labels to apply to all resources in this chart.\n   *\n   * @default - no common labels\n   */\n  readonly labels?: { [name: string]: string };\n\n  /**\n   * The autogenerated resource name by default is suffixed with a stable hash\n   * of the construct path. Setting this property to true drops the hash suffix.\n   *\n   * @default false\n   */\n  readonly disableResourceNameHashes?: boolean;\n\n}\n\nexport class Chart extends Construct {\n  /**\n   * Return whether the given object is a Chart.\n   *\n   * We do attribute detection since we can't reliably use 'instanceof'.\n   */\n  public static isChart(x: any): x is Chart {\n    return x !== null && typeof(x) === 'object' && CHART_SYMBOL in x;\n  }\n\n  /**\n   * Implements `instanceof Chart` using the more reliable `Chart.isChart` static method\n   *\n   * @param o The object to check\n   * @internal\n   */\n  static [Symbol.hasInstance](o: unknown) {\n    return Chart.isChart(o);\n  }\n\n  /**\n   * Finds the chart in which a node is defined.\n   * @param c a construct node\n   */\n  public static of(c: IConstruct): Chart {\n    if (Chart.isChart(c)) {\n      return c;\n    }\n\n    const parent = c.node.scope as Construct;\n    if (!parent) {\n      throw new Error('cannot find a parent chart (directly or indirectly)');\n    }\n\n    return Chart.of(parent);\n  }\n\n  /**\n   * The default namespace for all objects in this chart.\n   */\n  public readonly namespace?: string;\n\n  /**\n   * Chart-level labels.\n   */\n  private readonly _labels?: { [name: string]: string };\n\n  /**\n   * Determines if resource names in the chart have the suffixed hash.\n   */\n  private readonly _disableResourceNameHashes?: boolean;\n\n  constructor(scope: Construct, id: string, props: ChartProps = { }) {\n    super(scope, id);\n    this.namespace = props.namespace;\n    this._labels = props.labels ?? {};\n    this._disableResourceNameHashes = props.disableResourceNameHashes ?? false;\n\n    Object.defineProperty(this, CHART_SYMBOL, { value: true });\n  }\n\n  /**\n   * Labels applied to all resources in this chart.\n   *\n   * This is an immutable copy.\n   */\n  public get labels(): { [name: string]: string } {\n    return { ...this._labels };\n  }\n\n  /**\n   * Generates a app-unique name for an object given it's construct node path.\n   *\n   * Different resource types may have different constraints on names\n   * (`metadata.name`). The previous version of the name generator was\n   * compatible with DNS_SUBDOMAIN but not with DNS_LABEL.\n   *\n   * For example, `Deployment` names must comply with DNS_SUBDOMAIN while\n   * `Service` names must comply with DNS_LABEL.\n   *\n   * Since there is no formal specification for this, the default name\n   * generation scheme for kubernetes objects in cdk8s was changed to DNS_LABEL,\n   * since it’s the common denominator for all kubernetes resources\n   * (supposedly).\n   *\n   * You can override this method if you wish to customize object names at the\n   * chart level.\n   *\n   * @param apiObject The API object to generate a name for.\n   */\n  public generateObjectName(apiObject: ApiObject) {\n    return Names.toDnsLabel(apiObject, {\n      includeHash: !this._disableResourceNameHashes,\n      maxLen: apiObject.kind == CRONJOB ? 52 : undefined,\n    });\n  }\n\n  /**\n   * Create a dependency between this Chart and other constructs.\n   * These can be other ApiObjects, Charts, or custom.\n   *\n   * @param dependencies the dependencies to add.\n   */\n  public addDependency(...dependencies: IConstruct[]) {\n    this.node.addDependency(...dependencies);\n  }\n\n  /**\n   * Renders this chart to a set of Kubernetes JSON resources.\n   * @returns array of resource manifests\n   */\n  public toJson(): any[] {\n    return App._synthChart(this);\n  }\n\n  /**\n   * Returns all the included API objects.\n   */\n  get apiObjects(): ApiObject[] {\n    return this.node.children.filter((o): o is ApiObject => o instanceof ApiObject);\n  }\n}\n"]}
148778
148778
 
148779
148779
  /***/ }),
@@ -148845,7 +148845,7 @@ class Cron {
148845
148845
  }
148846
148846
  exports.Cron = Cron;
148847
148847
  _a = JSII_RTTI_SYMBOL_1;
148848
- Cron[_a] = { fqn: "cdk8s.Cron", version: "2.69.39" };
148848
+ Cron[_a] = { fqn: "cdk8s.Cron", version: "2.69.57" };
148849
148849
  function fallback(x, def) {
148850
148850
  return x ?? def;
148851
148851
  }
@@ -148934,7 +148934,7 @@ class DependencyGraph {
148934
148934
  }
148935
148935
  exports.DependencyGraph = DependencyGraph;
148936
148936
  _a = JSII_RTTI_SYMBOL_1;
148937
- DependencyGraph[_a] = { fqn: "cdk8s.DependencyGraph", version: "2.69.39" };
148937
+ DependencyGraph[_a] = { fqn: "cdk8s.DependencyGraph", version: "2.69.57" };
148938
148938
  /**
148939
148939
  * Represents a vertex in the graph.
148940
148940
  *
@@ -149027,7 +149027,7 @@ class DependencyVertex {
149027
149027
  }
149028
149028
  exports.DependencyVertex = DependencyVertex;
149029
149029
  _b = JSII_RTTI_SYMBOL_1;
149030
- DependencyVertex[_b] = { fqn: "cdk8s.DependencyVertex", version: "2.69.39" };
149030
+ DependencyVertex[_b] = { fqn: "cdk8s.DependencyVertex", version: "2.69.57" };
149031
149031
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dependency.js","sourceRoot":"","sources":["../src/dependency.ts"],"names":[],"mappings":";;;;;AAGA;;;;;;;;;;;;GAYG;AACH,MAAa,eAAe;IAI1B,YAAY,IAAU;QAEpB,IAAI,CAAC,aAAa,GAAG,IAAI,gBAAgB,EAAE,CAAC;QAE5C,MAAM,KAAK,GAAqC,EAAE,CAAC;QAEnD,SAAS,SAAS,CAAC,SAAqB;YACtC,KAAK,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,gBAAgB,CAAC,SAAS,CAAC,CAAC;QAC/D,CAAC;QAED,SAAS,SAAS,CAAC,SAAqB;YACtC,OAAO,KAAK,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACpC,CAAC;QAED,oCAAoC;QACpC,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/B,SAAS,CAAC,CAAC,CAAC,CAAC;QACf,CAAC;QAED,MAAM,IAAI,GAAG,EAAE,CAAC;QAChB,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YACnC,KAAK,MAAM,GAAG,IAAI,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;gBAC1C,IAAI,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC,CAAC;YAC5C,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YAEvB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3B,+BAA+B;gBAC/B,6DAA6D;gBAC7D,2FAA2F;gBAC3F,sCAAsC;gBACtC,SAAS;YACX,CAAC;YAED,MAAM,aAAa,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAC5C,MAAM,aAAa,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAE5C,aAAa,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAExC,CAAC;QAED,mBAAmB;QACnB,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC3B,iDAAiD;gBACjD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;IAEH,CAAC;IAED;;;;;OAKG;IACH,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,OAAO,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;IACvC,CAAC;;AAzEH,0CA0EC;;;AAED;;;;GAIG;AACH,MAAa,gBAAgB;IAM3B,YAAY,QAAgC,SAAS;QAHpC,cAAS,GAA0B,IAAI,GAAG,EAAoB,CAAC;QAC/D,aAAQ,GAA0B,IAAI,GAAG,EAAoB,CAAC;QAG7E,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACtB,CAAC;IAED;;;;OAIG;IACH,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAW,QAAQ;QACjB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IACpC,CAAC;IAED;;OAEG;IACH,IAAW,OAAO;QAChB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IACnC,CAAC;IAED;;OAEG;IACI,QAAQ;QAEb,MAAM,KAAK,GAAG,IAAI,GAAG,EAAoB,CAAC;QAC1C,MAAM,QAAQ,GAAuB,EAAE,CAAC;QAExC,SAAS,KAAK,CAAC,CAAmB;YAChC,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3B,KAAK,CAAC,CAAC,CAAC,CAAC;YACX,CAAC;YACD,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;gBAClB,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;gBACjB,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;YACf,CAAC;QACH,CAAC;QAED,KAAK,CAAC,IAAI,CAAC,CAAC;QAEZ,OAAO,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAM,CAAC,CAAC;IAE1D,CAAC;IAED;;;;;;;OAOG;IACI,QAAQ,CAAC,GAAqB;QAEnC,MAAM,KAAK,GAAuB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QACtD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,8BAA8B,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACxH,CAAC;QAED,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACxB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;IACtB,CAAC;IAEO,SAAS,CAAC,GAAqB;QACrC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;IAEO,SAAS,CAAC,GAAqB;QAErC,MAAM,KAAK,GAAuB,EAAE,CAAC;QACrC,KAAK,CAAC,IAAI,CAAC,CAAC;QACZ,OAAO,KAAK,CAAC;QAEb,SAAS,KAAK,CAAC,CAAmB;YAChC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACd,IAAI,KAAK,GAAG,KAAK,CAAC;YAClB,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3B,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;oBACd,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;oBACd,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,KAAK,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;YACnB,CAAC;YACD,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,KAAK,CAAC,GAAG,EAAE,CAAC;YACd,CAAC;YACD,OAAO,KAAK,CAAC;QAEf,CAAC;IAEH,CAAC;;AAxGH,4CAyGC","sourcesContent":["import { Node, IConstruct } from 'constructs';\n\n\n/**\n * Represents the dependency graph for a given Node.\n *\n * This graph includes the dependency relationships between all nodes in the\n * node (construct) sub-tree who's root is this Node.\n *\n * Note that this means that lonely nodes (no dependencies and no dependants) are also included in this graph as\n * childless children of the root node of the graph.\n *\n * The graph does not include cross-scope dependencies. That is, if a child on the current scope depends on a node\n * from a different scope, that relationship is not represented in this graph.\n *\n */\nexport class DependencyGraph {\n\n  private readonly _fosterParent: DependencyVertex;\n\n  constructor(node: Node) {\n\n    this._fosterParent = new DependencyVertex();\n\n    const nodes: Record<string, DependencyVertex> = {};\n\n    function putVertex(construct: IConstruct) {\n      nodes[construct.node.path] = new DependencyVertex(construct);\n    }\n\n    function getVertex(construct: IConstruct): DependencyVertex {\n      return nodes[construct.node.path];\n    }\n\n    // create all vertices of the graph.\n    for (const n of node.findAll()) {\n      putVertex(n);\n    }\n\n    const deps = [];\n    for (const child of node.findAll()) {\n      for (const dep of child.node.dependencies) {\n        deps.push({ source: child, target: dep });\n      }\n    }\n\n    // create all the edges of the graph.\n    for (const dep of deps) {\n\n      if (!getVertex(dep.target)) {\n        // dont cross scope boundaries.\n        // since charts only renders its own children, this is ok and\n        // has the benefit of simplifying the graph. we should reconsider this behavior when moving\n        // to a more general purpose use-case.\n        continue;\n      }\n\n      const sourceDepNode = getVertex(dep.source);\n      const targetDepNode = getVertex(dep.target);\n\n      sourceDepNode.addChild(targetDepNode);\n\n    }\n\n    // create the root.\n    for (const n of Object.values(nodes)) {\n      if (n.inbound.length === 0) {\n        // orphans are dependency roots. lets adopt them!\n        this._fosterParent.addChild(n);\n      }\n    }\n\n  }\n\n  /**\n   * Returns the root of the graph.\n   *\n   * Note that this vertex will always have `null` as its `.value` since it is an artifical root\n   * that binds all the connected spaces of the graph.\n   */\n  public get root(): DependencyVertex {\n    return this._fosterParent;\n  }\n\n  /**\n   * @see Vertex.topology()\n   */\n  public topology(): IConstruct[] {\n    return this._fosterParent.topology();\n  }\n}\n\n/**\n * Represents a vertex in the graph.\n *\n * The value of each vertex is an `IConstruct` that is accessible via the `.value` getter.\n */\nexport class DependencyVertex {\n\n  private readonly _value: IConstruct | undefined;\n  private readonly _children: Set<DependencyVertex> = new Set<DependencyVertex>();\n  private readonly _parents: Set<DependencyVertex> = new Set<DependencyVertex>();\n\n  constructor(value: IConstruct | undefined = undefined) {\n    this._value = value;\n  }\n\n  /**\n   * Returns the IConstruct this graph vertex represents.\n   *\n   * `null` in case this is the root of the graph.\n   */\n  public get value(): IConstruct | undefined {\n    return this._value;\n  }\n\n  /**\n   * Returns the children of the vertex (i.e dependencies)\n   */\n  public get outbound(): Array<DependencyVertex> {\n    return Array.from(this._children);\n  }\n\n  /**\n   * Returns the parents of the vertex (i.e dependants)\n   */\n  public get inbound(): Array<DependencyVertex> {\n    return Array.from(this._parents);\n  }\n\n  /**\n   * Returns a topologically sorted array of the constructs in the sub-graph.\n   */\n  public topology(): IConstruct[] {\n\n    const found = new Set<DependencyVertex>();\n    const topology: DependencyVertex[] = [];\n\n    function visit(n: DependencyVertex) {\n      for (const c of n.outbound) {\n        visit(c);\n      }\n      if (!found.has(n)) {\n        topology.push(n);\n        found.add(n);\n      }\n    }\n\n    visit(this);\n\n    return topology.filter(d => d.value).map(d => d.value!);\n\n  }\n\n  /**\n   * Adds a vertex as a dependency of the current node.\n   * Also updates the parents of `dep`, so that it contains this node as a parent.\n   *\n   * This operation will fail in case it creates a cycle in the graph.\n   *\n   * @param dep The dependency\n   */\n  public addChild(dep: DependencyVertex) {\n\n    const cycle: DependencyVertex[] = dep.findRoute(this);\n    if (cycle.length !== 0) {\n      cycle.push(dep);\n      throw new Error(`Dependency cycle detected: ${cycle.filter(d => d.value).map(d => d.value!.node.path).join(' => ')}`);\n    }\n\n    this._children.add(dep);\n    dep.addParent(this);\n  }\n\n  private addParent(dep: DependencyVertex) {\n    this._parents.add(dep);\n  }\n\n  private findRoute(dst: DependencyVertex): DependencyVertex[] {\n\n    const route: DependencyVertex[] = [];\n    visit(this);\n    return route;\n\n    function visit(n: DependencyVertex): boolean {\n      route.push(n);\n      let found = false;\n      for (const c of n.outbound) {\n        if (c === dst) {\n          route.push(c);\n          return true;\n        }\n        found = visit(c);\n      }\n      if (!found) {\n        route.pop();\n      }\n      return found;\n\n    }\n\n  }\n}\n"]}
149032
149032
 
149033
149033
  /***/ }),
@@ -149236,7 +149236,7 @@ class Duration {
149236
149236
  }
149237
149237
  exports.Duration = Duration;
149238
149238
  _a = JSII_RTTI_SYMBOL_1;
149239
- Duration[_a] = { fqn: "cdk8s.Duration", version: "2.69.39" };
149239
+ Duration[_a] = { fqn: "cdk8s.Duration", version: "2.69.57" };
149240
149240
  class TimeUnit {
149241
149241
  constructor(label, inMillis) {
149242
149242
  this.label = label;
@@ -149332,7 +149332,7 @@ class Helm extends include_1.Include {
149332
149332
  }
149333
149333
  exports.Helm = Helm;
149334
149334
  _a = JSII_RTTI_SYMBOL_1;
149335
- Helm[_a] = { fqn: "cdk8s.Helm", version: "2.69.39" };
149335
+ Helm[_a] = { fqn: "cdk8s.Helm", version: "2.69.57" };
149336
149336
  function renderTemplate(workdir, prog, args) {
149337
149337
  const helm = _child_process_1._child_process.spawnSync(prog, args, {
149338
149338
  maxBuffer: MAX_HELM_BUFFER,
@@ -149396,7 +149396,7 @@ class Include extends constructs_1.Construct {
149396
149396
  }
149397
149397
  exports.Include = Include;
149398
149398
  _a = JSII_RTTI_SYMBOL_1;
149399
- Include[_a] = { fqn: "cdk8s.Include", version: "2.69.39" };
149399
+ Include[_a] = { fqn: "cdk8s.Include", version: "2.69.57" };
149400
149400
  //# sourceMappingURL=data:application/json;base64,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
149401
149401
 
149402
149402
  /***/ }),
@@ -149534,7 +149534,7 @@ class JsonPatch {
149534
149534
  }
149535
149535
  exports.JsonPatch = JsonPatch;
149536
149536
  _a = JSII_RTTI_SYMBOL_1;
149537
- JsonPatch[_a] = { fqn: "cdk8s.JsonPatch", version: "2.69.39" };
149537
+ JsonPatch[_a] = { fqn: "cdk8s.JsonPatch", version: "2.69.57" };
149538
149538
  //# sourceMappingURL=data:application/json;base64,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
149539
149539
 
149540
149540
  /***/ }),
@@ -149561,7 +149561,7 @@ class Lazy {
149561
149561
  }
149562
149562
  exports.Lazy = Lazy;
149563
149563
  _a = JSII_RTTI_SYMBOL_1;
149564
- Lazy[_a] = { fqn: "cdk8s.Lazy", version: "2.69.39" };
149564
+ Lazy[_a] = { fqn: "cdk8s.Lazy", version: "2.69.57" };
149565
149565
  //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibGF6eS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy9sYXp5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBQUEsTUFBYSxJQUFJO0lBQ1IsTUFBTSxDQUFDLEdBQUcsQ0FBQyxRQUFzQjtRQUN0QyxPQUFPLElBQUksSUFBSSxDQUFDLFFBQVEsQ0FBbUIsQ0FBQztJQUM5QyxDQUFDO0lBRUQsWUFBcUMsUUFBc0I7UUFBdEIsYUFBUSxHQUFSLFFBQVEsQ0FBYztJQUFHLENBQUM7SUFFeEQsT0FBTztRQUNaLE9BQU8sSUFBSSxDQUFDLFFBQVEsQ0FBQyxPQUFPLEVBQUUsQ0FBQztJQUNqQyxDQUFDOztBQVRILG9CQVVDIiwic291cmNlc0NvbnRlbnQiOlsiZXhwb3J0IGNsYXNzIExhenkge1xuICBwdWJsaWMgc3RhdGljIGFueShwcm9kdWNlcjogSUFueVByb2R1Y2VyKTogYW55IHtcbiAgICByZXR1cm4gbmV3IExhenkocHJvZHVjZXIpIGFzIHVua25vd24gYXMgYW55O1xuICB9XG5cbiAgcHJpdmF0ZSBjb25zdHJ1Y3Rvcihwcml2YXRlIHJlYWRvbmx5IHByb2R1Y2VyOiBJQW55UHJvZHVjZXIpIHt9XG5cbiAgcHVibGljIHByb2R1Y2UoKTogYW55IHtcbiAgICByZXR1cm4gdGhpcy5wcm9kdWNlci5wcm9kdWNlKCk7XG4gIH1cbn1cblxuZXhwb3J0IGludGVyZmFjZSBJQW55UHJvZHVjZXIge1xuICBwcm9kdWNlKCk6IGFueTtcbn1cblxuXG4iXX0=
149566
149566
 
149567
149567
  /***/ }),
@@ -149660,7 +149660,7 @@ class ApiObjectMetadataDefinition {
149660
149660
  }
149661
149661
  exports.ApiObjectMetadataDefinition = ApiObjectMetadataDefinition;
149662
149662
  _a = JSII_RTTI_SYMBOL_1;
149663
- ApiObjectMetadataDefinition[_a] = { fqn: "cdk8s.ApiObjectMetadataDefinition", version: "2.69.39" };
149663
+ ApiObjectMetadataDefinition[_a] = { fqn: "cdk8s.ApiObjectMetadataDefinition", version: "2.69.57" };
149664
149664
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"metadata.js","sourceRoot":"","sources":["../src/metadata.ts"],"names":[],"mappings":";;;;;AAAA,mCAAwC;AAExC,uCAAoC;AAmHpC;;GAEG;AACH,MAAa,2BAA2B;IA8CtC,YAAY,OAA2C;QACrD,IAAI,CAAC,IAAI,GAAG,OAAO,CAAC,IAAI,CAAC;QACzB,IAAI,CAAC,MAAM,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,EAAE,CAAC;QAC5C,IAAI,CAAC,WAAW,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,WAAW,IAAI,EAAE,CAAC,EAAE,CAAC;QACtD,IAAI,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACpE,IAAI,CAAC,eAAe,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACnF,IAAI,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,qBAAqB,GAAG,OAAO,CAAC;QAErC,+EAA+E;QAC/E,OAAO,IAAI,CAAC,qBAAqB,CAAC,SAAS,CAAC;IAC9C,CAAC;IAED;;;;;OAKG;IACI,QAAQ,CAAC,GAAW,EAAE,KAAa;QACxC,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,GAAW;QACzB,OAAO,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,GAAW,EAAE,KAAa;QAC7C,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAChC,CAAC;IAED;;;;OAIG;IACI,aAAa,CAAC,GAAG,UAAoB;QAC1C,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,UAAU,CAAC,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,KAAqB;QAC5C,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACnC,CAAC;IAED;;;;OAIG;IACI,GAAG,CAAC,GAAW,EAAE,KAAU;QAChC,IAAI,CAAC,qBAAqB,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC1C,CAAC;IAED;;OAEG;IACI,MAAM;QACX,MAAM,QAAQ,GAAG,CAAC,CAAM,EAAE,EAAE,CAAC,IAAA,qBAAa,EAAC,CAAC,EAAE,EAAE,iBAAiB,EAAE,IAAI,EAAE,kBAAkB,EAAE,IAAI,EAAE,CAAC,CAAC;QACrG,OAAO,QAAQ,CAAC,IAAA,iBAAO,EAAC,EAAE,EAAE;YAC1B,GAAG,IAAI,CAAC,qBAAqB;YAC7B,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,MAAM,EAAE,IAAI,CAAC,MAAM;SACpB,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IACtB,CAAC;;AAjIH,kEAkIC","sourcesContent":["import { sanitizeValue } from './_util';\nimport { ApiObject } from './api-object';\nimport { resolve } from './resolve';\n\n/**\n * Metadata associated with this object.\n */\nexport interface ApiObjectMetadata {\n  /**\n   * The unique, namespace-global, name of this object inside the Kubernetes\n   * cluster.\n   *\n   * Normally, you shouldn't specify names for objects and let the CDK generate\n   * a name for you that is application-unique. The names CDK generates are\n   * composed from the construct path components, separated by dots and a suffix\n   * that is based on a hash of the entire path, to ensure uniqueness.\n   *\n   * You can supply custom name allocation logic by overriding the\n   * `chart.generateObjectName` method.\n   *\n   * If you use an explicit name here, bear in mind that this reduces the\n   * composability of your construct because it won't be possible to include\n   * more than one instance in any app. Therefore it is highly recommended to\n   * leave this unspecified.\n   *\n   * @default - an app-unique name generated by the chart\n   */\n  readonly name?: string;\n\n  /**\n   * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be\n   * preserved when modifying objects.\n   *\n   * @see http://kubernetes.io/docs/user-guide/annotations\n   * @default - No annotations.\n   */\n  readonly annotations?: { [key: string]: string };\n\n  /**\n   * Map of string keys and values that can be used to organize and categorize (scope and select) objects.\n   * May match selectors of replication controllers and services.\n   *\n   * @see http://kubernetes.io/docs/user-guide/labels\n   * @default - No labels.\n   */\n  readonly labels?: { [key: string]: string };\n\n  /**\n   * Namespace defines the space within each name must be unique. An empty namespace is equivalent to the \"default\" namespace, but \"default\" is the canonical representation.\n   * Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty. Must be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces\n   *\n   * @default undefined (will be assigned to the 'default' namespace)\n   */\n  readonly namespace?: string;\n\n  /**\n   * Namespaced keys that tell Kubernetes to wait until specific conditions are\n   * met before it fully deletes resources marked for deletion.\n   *\n   * Must be empty before the object is deleted from the registry. Each entry is\n   * an identifier for the responsible component that will remove the entry from\n   * the list. If the deletionTimestamp of the object is non-nil, entries in\n   * this list can only be removed. Finalizers may be processed and removed in\n   * any order.  Order is NOT enforced because it introduces significant risk of\n   * stuck finalizers. finalizers is a shared field, any actor with permission\n   * can reorder it. If the finalizer list is processed in order, then this can\n   * lead to a situation in which the component responsible for the first\n   * finalizer in the list is waiting for a signal (field value, external\n   * system, or other) produced by a component responsible for a finalizer later\n   * in the list, resulting in a deadlock. Without enforced ordering finalizers\n   * are free to order amongst themselves and are not vulnerable to ordering\n   * changes in the list.\n   *\n   * @see https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/\n   * @default - No finalizers.\n   */\n  readonly finalizers?: string[];\n\n  /**\n   * List of objects depended by this object. If ALL objects in the list have\n   * been deleted, this object will be garbage collected. If this object is\n   * managed by a controller, then an entry in this list will point to this\n   * controller, with the controller field set to true. There cannot be more\n   * than one managing controller.\n   *\n   * Kubernetes sets the value of this field automatically for objects that are\n   * dependents of other objects like ReplicaSets, DaemonSets, Deployments, Jobs\n   * and CronJobs, and ReplicationControllers. You can also configure these\n   * relationships manually by changing the value of this field. However, you\n   * usually don't need to and can allow Kubernetes to automatically manage the\n   * relationships.\n   *\n   * @see https://kubernetes.io/docs/concepts/overview/working-with-objects/owners-dependents/\n   * @default - automatically set by Kubernetes\n   */\n  readonly ownerReferences?: OwnerReference[];\n\n  /**\n   * Additional metadata attributes.\n   * @jsii ignore\n   * @see https://github.com/cdk8s-team/cdk8s-core/issues/1297\n   */\n  readonly [key: string]: any;\n}\n\n/**\n * Options for `ApiObjectMetadataDefinition`.\n */\nexport interface ApiObjectMetadataDefinitionOptions extends ApiObjectMetadata {\n\n  /**\n   * Which ApiObject instance is the metadata attached to.\n   */\n  readonly apiObject: ApiObject;\n\n}\n\n/**\n * Object metadata.\n */\nexport class ApiObjectMetadataDefinition {\n  /**\n   * The name of the API object.\n   *\n   * If a name is specified in `metadata.name` this will be the name returned.\n   * Otherwise, a name will be generated by calling\n   * `Chart.of(this).generatedObjectName(this)`, which by default uses the\n   * construct path to generate a DNS-compatible name for the resource.\n   */\n  public readonly name?: string;\n\n  /**\n   * The object's namespace.\n   */\n  public readonly namespace?: string;\n\n  /**\n   * Labels associated with this object.\n   */\n  private readonly labels: { [key: string]: string };\n\n  /**\n   * Annotations associated with this object.\n   */\n  private readonly annotations: { [key: string]: string };\n\n  /**\n   * Finalizers associated with this object.\n   */\n  private readonly finalizers: string[];\n\n  /**\n   * Owner references set for this object.\n   */\n  private readonly ownerReferences: OwnerReference[];\n\n  /**\n   * The ApiObject this metadata is attached to.\n   */\n  private readonly apiObject: ApiObject;\n\n  /**\n   * Additional metadata attributes passed through `options`.\n   */\n  private readonly _additionalAttributes: { [key: string]: any };\n\n  constructor(options: ApiObjectMetadataDefinitionOptions) {\n    this.name = options.name;\n    this.labels = { ...(options.labels ?? {}) };\n    this.annotations = { ...(options.annotations ?? {}) };\n    this.namespace = options.namespace;\n    this.finalizers = options.finalizers ? [...options.finalizers] : [];\n    this.ownerReferences = options.ownerReferences ? [...options.ownerReferences] : [];\n    this.apiObject = options.apiObject;\n    this._additionalAttributes = options;\n\n    // otherwise apiObject is passed to the resolving logic, which expectadly fails\n    delete this._additionalAttributes.apiObject;\n  }\n\n  /**\n   * Add a label.\n   *\n   * @param key - The key.\n   * @param value - The value.\n   */\n  public addLabel(key: string, value: string) {\n    this.labels[key] = value;\n  }\n\n  /**\n   * @returns a value of a label or undefined\n   * @param key the label\n   */\n  public getLabel(key: string): string | undefined {\n    return this.labels[key];\n  }\n\n  /**\n   * Add an annotation.\n   *\n   * @param key - The key.\n   * @param value - The value.\n   */\n  public addAnnotation(key: string, value: string) {\n    this.annotations[key] = value;\n  }\n\n  /**\n   * Add one or more finalizers.\n   *\n   * @param finalizers the finalizers\n   */\n  public addFinalizers(...finalizers: string[]) {\n    this.finalizers.push(...finalizers);\n  }\n\n  /**\n   * Add an owner.\n   *\n   * @param owner the owner\n   */\n  public addOwnerReference(owner: OwnerReference) {\n    this.ownerReferences.push(owner);\n  }\n\n  /**\n   * Adds an arbitrary key/value to the object metadata.\n   * @param key Metadata key\n   * @param value Metadata value\n   */\n  public add(key: string, value: any) {\n    this._additionalAttributes[key] = value;\n  }\n\n  /**\n   * Synthesizes a k8s ObjectMeta for this metadata set.\n   */\n  public toJson() {\n    const sanitize = (x: any) => sanitizeValue(x, { filterEmptyArrays: true, filterEmptyObjects: true });\n    return sanitize(resolve([], {\n      ...this._additionalAttributes,\n      name: this.name,\n      namespace: this.namespace,\n      annotations: this.annotations,\n      finalizers: this.finalizers,\n      ownerReferences: this.ownerReferences,\n      labels: this.labels,\n    }, this.apiObject));\n  }\n}\n\n/**\n * OwnerReference contains enough information to let you identify an owning\n * object. An owning object must be in the same namespace as the dependent, or\n * be cluster-scoped, so there is no namespace field.\n */\nexport interface OwnerReference {\n  /**\n   * API version of the referent.\n   */\n  readonly apiVersion: string;\n\n  /**\n   * If true, AND if the owner has the \"foregroundDeletion\" finalizer, then the\n   * owner cannot be deleted from the key-value store until this reference is\n   * removed. Defaults to false. To set this field, a user needs \"delete\"\n   * permission of the owner, otherwise 422 (Unprocessable Entity) will be\n   * returned.\n   *\n   * @default false. To set this field, a user needs \"delete\" permission of the\n   * owner, otherwise 422 (Unprocessable Entity) will be returned.\n   */\n  readonly blockOwnerDeletion?: boolean;\n\n  /**\n   * If true, this reference points to the managing controller.\n   */\n  readonly controller?: boolean;\n\n  /**\n   * Kind of the referent.\n   *\n   * @see https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds\n   */\n  readonly kind: string;\n\n  /**\n   * Name of the referent.\n   *\n   * @see http://kubernetes.io/docs/user-guide/identifiers#names\n   */\n  readonly name: string;\n\n  /**\n   * UID of the referent.\n   *\n   * @see http://kubernetes.io/docs/user-guide/identifiers#uids\n   */\n  readonly uid: string;\n\n}\n"]}
149665
149665
 
149666
149666
  /***/ }),
@@ -149791,7 +149791,7 @@ class Names {
149791
149791
  }
149792
149792
  exports.Names = Names;
149793
149793
  _a = JSII_RTTI_SYMBOL_1;
149794
- Names[_a] = { fqn: "cdk8s.Names", version: "2.69.39" };
149794
+ Names[_a] = { fqn: "cdk8s.Names", version: "2.69.57" };
149795
149795
  function omitDuplicates(value, index, components) {
149796
149796
  return value !== components[index - 1];
149797
149797
  }
@@ -149883,7 +149883,7 @@ class ResolutionContext {
149883
149883
  }
149884
149884
  exports.ResolutionContext = ResolutionContext;
149885
149885
  _a = JSII_RTTI_SYMBOL_1;
149886
- ResolutionContext[_a] = { fqn: "cdk8s.ResolutionContext", version: "2.69.39" };
149886
+ ResolutionContext[_a] = { fqn: "cdk8s.ResolutionContext", version: "2.69.57" };
149887
149887
  /**
149888
149888
  * Resolvers instanecs of `Lazy`.
149889
149889
  */
@@ -149897,7 +149897,7 @@ class LazyResolver {
149897
149897
  }
149898
149898
  exports.LazyResolver = LazyResolver;
149899
149899
  _b = JSII_RTTI_SYMBOL_1;
149900
- LazyResolver[_b] = { fqn: "cdk8s.LazyResolver", version: "2.69.39" };
149900
+ LazyResolver[_b] = { fqn: "cdk8s.LazyResolver", version: "2.69.57" };
149901
149901
  /**
149902
149902
  * Resolves implicit tokens.
149903
149903
  */
@@ -149911,7 +149911,7 @@ class ImplicitTokenResolver {
149911
149911
  }
149912
149912
  exports.ImplicitTokenResolver = ImplicitTokenResolver;
149913
149913
  _c = JSII_RTTI_SYMBOL_1;
149914
- ImplicitTokenResolver[_c] = { fqn: "cdk8s.ImplicitTokenResolver", version: "2.69.39" };
149914
+ ImplicitTokenResolver[_c] = { fqn: "cdk8s.ImplicitTokenResolver", version: "2.69.57" };
149915
149915
  /**
149916
149916
  * Resolves union types that allow using either number or string (as generated by the CLI).
149917
149917
  *
@@ -149932,7 +149932,7 @@ class NumberStringUnionResolver {
149932
149932
  }
149933
149933
  exports.NumberStringUnionResolver = NumberStringUnionResolver;
149934
149934
  _d = JSII_RTTI_SYMBOL_1;
149935
- NumberStringUnionResolver[_d] = { fqn: "cdk8s.NumberStringUnionResolver", version: "2.69.39" };
149935
+ NumberStringUnionResolver[_d] = { fqn: "cdk8s.NumberStringUnionResolver", version: "2.69.57" };
149936
149936
  NumberStringUnionResolver.TYPES = ['number', 'string'];
149937
149937
  /**
149938
149938
  * Resolves any value attached to a specific ApiObject.
@@ -150068,7 +150068,7 @@ class Size {
150068
150068
  }
150069
150069
  exports.Size = Size;
150070
150070
  _a = JSII_RTTI_SYMBOL_1;
150071
- Size[_a] = { fqn: "cdk8s.Size", version: "2.69.39" };
150071
+ Size[_a] = { fqn: "cdk8s.Size", version: "2.69.57" };
150072
150072
  /**
150073
150073
  * Rounding behaviour when converting between units of `Size`.
150074
150074
  */
@@ -150173,7 +150173,7 @@ class Testing {
150173
150173
  }
150174
150174
  exports.Testing = Testing;
150175
150175
  _a = JSII_RTTI_SYMBOL_1;
150176
- Testing[_a] = { fqn: "cdk8s.Testing", version: "2.69.39" };
150176
+ Testing[_a] = { fqn: "cdk8s.Testing", version: "2.69.57" };
150177
150177
  //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidGVzdGluZy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy90ZXN0aW5nLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBQUEseUJBQXlCO0FBQ3pCLHlCQUF5QjtBQUN6Qiw2QkFBNkI7QUFDN0IsK0JBQXNDO0FBQ3RDLG1DQUFnQztBQUVoQzs7R0FFRztBQUNILE1BQWEsT0FBTztJQUNsQjs7O09BR0c7SUFDSSxNQUFNLENBQUMsR0FBRyxDQUFDLEtBQWdCO1FBQ2hDLElBQUksTUFBYyxDQUFDO1FBQ25CLElBQUksS0FBSyxFQUFFLENBQUM7WUFDVixNQUFNLEdBQUcsS0FBSyxDQUFDLE1BQU0sSUFBSSxFQUFFLENBQUMsV0FBVyxDQUFDLElBQUksQ0FBQyxJQUFJLENBQUMsRUFBRSxDQUFDLE1BQU0sRUFBRSxFQUFFLGVBQWUsQ0FBQyxDQUFDLENBQUM7UUFDbkYsQ0FBQzthQUFNLENBQUM7WUFDTixNQUFNLEdBQUcsRUFBRSxDQUFDLFdBQVcsQ0FBQyxJQUFJLENBQUMsSUFBSSxDQUFDLEVBQUUsQ0FBQyxNQUFNLEVBQUUsRUFBRSxlQUFlLENBQUMsQ0FBQyxDQUFDO1FBQ25FLENBQUM7UUFDRCxPQUFPLElBQUksU0FBRyxDQUFDLEVBQUUsTUFBTSxFQUFFLEdBQUcsS0FBSyxFQUFFLENBQUMsQ0FBQztJQUN2QyxDQUFDO0lBRUQ7O09BRUc7SUFDSSxNQUFNLENBQUMsS0FBSztRQUNqQixPQUFPLElBQUksYUFBSyxDQUFDLElBQUksQ0FBQyxHQUFHLEVBQUUsRUFBRSxNQUFNLENBQUMsQ0FBQztJQUN2QyxDQUFDO0lBRUQ7O09BRUc7SUFDSSxNQUFNLENBQUMsS0FBSyxDQUFDLEtBQVk7UUFDOUIsT0FBTyxLQUFLLENBQUMsTUFBTSxFQUFFLENBQUM7SUFDeEIsQ0FBQztJQUVELDBCQUEwQjtJQUMxQjtRQUNFLE9BQU87SUFDVCxDQUFDOztBQWhDSCwwQkFpQ0MiLCJzb3VyY2VzQ29udGVudCI6WyJpbXBvcnQgKiBhcyBmcyBmcm9tICdmcyc7XG5pbXBvcnQgKiBhcyBvcyBmcm9tICdvcyc7XG5pbXBvcnQgKiBhcyBwYXRoIGZyb20gJ3BhdGgnO1xuaW1wb3J0IHsgQXBwLCBBcHBQcm9wcyB9IGZyb20gJy4vYXBwJztcbmltcG9ydCB7IENoYXJ0IH0gZnJvbSAnLi9jaGFydCc7XG5cbi8qKlxuICogVGVzdGluZyB1dGlsaXRpZXMgZm9yIGNkazhzIGFwcGxpY2F0aW9ucy5cbiAqL1xuZXhwb3J0IGNsYXNzIFRlc3Rpbmcge1xuICAvKipcbiAgICogUmV0dXJucyBhbiBhcHAgZm9yIHRlc3Rpbmcgd2l0aCB0aGUgZm9sbG93aW5nIHByb3BlcnRpZXM6XG4gICAqIC0gT3V0cHV0IGRpcmVjdG9yeSBpcyBhIHRlbXAgZGlyLlxuICAgKi9cbiAgcHVibGljIHN0YXRpYyBhcHAocHJvcHM/OiBBcHBQcm9wcykge1xuICAgIGxldCBvdXRkaXI6IHN0cmluZztcbiAgICBpZiAocHJvcHMpIHtcbiAgICAgIG91dGRpciA9IHByb3BzLm91dGRpciA/PyBmcy5ta2R0ZW1wU3luYyhwYXRoLmpvaW4ob3MudG1wZGlyKCksICdjZGs4cy5vdXRkaXIuJykpO1xuICAgIH0gZWxzZSB7XG4gICAgICBvdXRkaXIgPSBmcy5ta2R0ZW1wU3luYyhwYXRoLmpvaW4ob3MudG1wZGlyKCksICdjZGs4cy5vdXRkaXIuJykpO1xuICAgIH1cbiAgICByZXR1cm4gbmV3IEFwcCh7IG91dGRpciwgLi4ucHJvcHMgfSk7XG4gIH1cblxuICAvKipcbiAgICogQHJldHVybnMgYSBDaGFydCB0aGF0IGNhbiBiZSB1c2VkIGZvciB0ZXN0c1xuICAgKi9cbiAgcHVibGljIHN0YXRpYyBjaGFydCgpIHtcbiAgICByZXR1cm4gbmV3IENoYXJ0KHRoaXMuYXBwKCksICd0ZXN0Jyk7XG4gIH1cblxuICAvKipcbiAgICogUmV0dXJucyB0aGUgS3ViZXJuZXRlcyBtYW5pZmVzdCBzeW50aGVzaXplZCBmcm9tIHRoaXMgY2hhcnQuXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIHN5bnRoKGNoYXJ0OiBDaGFydCk6IGFueVtdIHtcbiAgICByZXR1cm4gY2hhcnQudG9Kc29uKCk7XG4gIH1cblxuICAvKiBpc3RhbmJ1bCBpZ25vcmUgbmV4dCAqL1xuICBwcml2YXRlIGNvbnN0cnVjdG9yKCkge1xuICAgIHJldHVybjtcbiAgfVxufVxuIl19
150178
150178
 
150179
150179
  /***/ }),
@@ -150282,19 +150282,19 @@ class Yaml {
150282
150282
  }
150283
150283
  exports.Yaml = Yaml;
150284
150284
  _a = JSII_RTTI_SYMBOL_1;
150285
- Yaml[_a] = { fqn: "cdk8s.Yaml", version: "2.69.39" };
150285
+ Yaml[_a] = { fqn: "cdk8s.Yaml", version: "2.69.57" };
150286
150286
  /**
150287
150287
  * Loads a url (or file) and returns the contents.
150288
150288
  * This method spawns a child process in order to perform an http call synchronously.
150289
150289
  */
150290
150290
  function loadurl(url) {
150291
- const script = __nccwpck_require__.ab + "_loadurl.js";
150292
- return (0, child_process_1.execFileSync)(process.execPath, [__nccwpck_require__.ab + "_loadurl.js", url], {
150291
+ const script = __nccwpck_require__.ab + "_loadurl.mjs";
150292
+ return (0, child_process_1.execFileSync)(process.execPath, [__nccwpck_require__.ab + "_loadurl.mjs", url], {
150293
150293
  encoding: 'utf-8',
150294
150294
  maxBuffer: MAX_DOWNLOAD_BUFFER,
150295
150295
  }).toString();
150296
150296
  }
150297
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoieWFtbC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy95YW1sLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBQUEsaURBQTZDO0FBQzdDLHlCQUF5QjtBQUN6Qix5QkFBeUI7QUFDekIsNkJBQTZCO0FBQzdCLDZCQUE2QjtBQUU3QixNQUFNLG1CQUFtQixHQUFHLEVBQUUsR0FBRyxJQUFJLEdBQUcsSUFBSSxDQUFDO0FBRTdDLG9IQUFvSDtBQUNwSCx1RUFBdUU7QUFDdkUsMEVBQTBFO0FBQzFFLE1BQU0saUJBQWlCLEdBQUcsS0FBSyxDQUFDO0FBRWhDOztHQUVHO0FBQ0gsTUFBYSxJQUFJO0lBQ2Y7O09BRUc7SUFDSSxNQUFNLENBQUMsYUFBYSxDQUFDLElBQVc7UUFDckMsT0FBTyxJQUFJLENBQUMsU0FBUyxDQUFDLEdBQUcsSUFBSSxDQUFDLENBQUM7SUFDakMsQ0FBQztJQUVEOzs7O09BSUc7SUFDSSxNQUFNLENBQUMsSUFBSSxDQUFDLFFBQWdCLEVBQUUsSUFBVztRQUM5QyxNQUFNLElBQUksR0FBRyxJQUFJLENBQUMsU0FBUyxDQUFDLEdBQUcsSUFBSSxDQUFDLENBQUM7UUFDckMsRUFBRSxDQUFDLGFBQWEsQ0FBQyxRQUFRLEVBQUUsSUFBSSxFQUFFLEVBQUUsUUFBUSxFQUFFLE1BQU0sRUFBRSxDQUFDLENBQUM7SUFDekQsQ0FBQztJQUVEOzs7Ozs7OztPQVFHO0lBQ0ksTUFBTSxDQUFDLFNBQVMsQ0FBQyxHQUFHLElBQVc7UUFDcEMsT0FBTyxJQUFJLENBQUMsR0FBRyxDQUNiLENBQUMsQ0FBQyxFQUFFLENBQUMsQ0FBQyxLQUFLLFNBQVMsQ0FBQyxDQUFDLENBQUMsSUFBSSxDQUFDLENBQUMsQ0FBQyxJQUFJLENBQUMsU0FBUyxDQUFDLENBQUMsRUFBRSxFQUFFLGFBQWEsRUFBRSxJQUFJLEVBQUUsU0FBUyxFQUFFLENBQUMsRUFBRSxPQUFPLEVBQUUsaUJBQWlCLEVBQUUsQ0FBQyxDQUNuSCxDQUFDLElBQUksQ0FBQyxPQUFPLENBQUMsQ0FBQztJQUNsQixDQUFDO0lBRUQ7Ozs7O09BS0c7SUFDSSxNQUFNLENBQUMsR0FBRyxDQUFDLElBQVc7UUFDM0IsTUFBTSxNQUFNLEdBQUcsRUFBRSxDQUFDLFdBQVcsQ0FBQyxJQUFJLENBQUMsSUFBSSxDQUFDLEVBQUUsQ0FBQyxNQUFNLEVBQUUsRUFBRSxRQUFRLENBQUMsQ0FBQyxDQUFDO1FBQ2hFLE1BQU0sUUFBUSxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsTUFBTSxFQUFFLFdBQVcsQ0FBQyxDQUFDO1FBQ2hELElBQUksQ0FBQyxJQUFJLENBQUMsUUFBUSxFQUFFLElBQUksQ0FBQyxDQUFDO1FBQzFCLE9BQU8sUUFBUSxDQUFDO0lBQ2xCLENBQUM7SUFFRDs7Ozs7Ozs7T0FRRztJQUNJLE1BQU0sQ0FBQyxJQUFJLENBQUMsU0FBaUI7UUFDbEMsTUFBTSxJQUFJLEdBQUcsT0FBTyxDQUFDLFNBQVMsQ0FBQyxDQUFDO1FBRWhDLE1BQU0sT0FBTyxHQUFHLElBQUksQ0FBQyxpQkFBaUIsQ0FBQyxJQUFJLEVBQUU7WUFDM0MsT0FBTyxFQUFFLGlCQUFpQjtTQUMzQixDQUFDLENBQUM7UUFDSCxNQUFNLE1BQU0sR0FBRyxJQUFJLEtBQUssRUFBTyxDQUFDO1FBRWhDLEtBQUssTUFBTSxHQUFHLElBQUksT0FBTyxDQUFDLEdBQUcsQ0FBQyxDQUFDLENBQUMsRUFBRSxDQUFDLENBQUMsQ0FBQyxNQUFNLEVBQUUsQ0FBQyxFQUFFLENBQUM7WUFDL0MsdUJBQXVCO1lBQ3ZCLElBQUksR0FBRyxLQUFLLFNBQVMsRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQ3BDLElBQUksR0FBRyxLQUFLLElBQUksRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQy9CLElBQUksS0FBSyxDQUFDLE9BQU8sQ0FBQyxHQUFHLENBQUMsSUFBSSxHQUFHLENBQUMsTUFBTSxLQUFLLENBQUMsRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQ3pELElBQUksT0FBTSxDQUFDLEdBQUcsQ0FBQyxLQUFLLFFBQVEsSUFBSSxNQUFNLENBQUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDLE1BQU0sS0FBSyxDQUFDLEVBQUUsQ0FBQztnQkFBQyxTQUFTO1lBQUMsQ0FBQztZQUU1RSxNQUFNLENBQUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDO1FBQ25CLENBQUM7UUFFRCxPQUFPLE1BQU0sQ0FBQztJQUNoQixDQUFDO0lBRUQ7O09BRUc7SUFDSDtRQUNFLE9BQU87SUFDVCxDQUFDOztBQWpGSCxvQkFrRkM7OztBQUVEOzs7R0FHRztBQUNILFNBQVMsT0FBTyxDQUFDLEdBQVc7SUFDMUIsTUFBTSxNQUFNLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxTQUFTLEVBQUUsYUFBYSxDQUFDLENBQUM7SUFDbkQsT0FBTyxJQUFBLDRCQUFZLEVBQUMsT0FBTyxDQUFDLFFBQVEsRUFBRSxDQUFDLE1BQU0sRUFBRSxHQUFHLENBQUMsRUFBRTtRQUNuRCxRQUFRLEVBQUUsT0FBTztRQUNqQixTQUFTLEVBQUUsbUJBQW1CO0tBQy9CLENBQUMsQ0FBQyxRQUFRLEVBQUUsQ0FBQztBQUNoQixDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgZXhlY0ZpbGVTeW5jIH0gZnJvbSAnY2hpbGRfcHJvY2Vzcyc7XG5pbXBvcnQgKiBhcyBmcyBmcm9tICdmcyc7XG5pbXBvcnQgKiBhcyBvcyBmcm9tICdvcyc7XG5pbXBvcnQgKiBhcyBwYXRoIGZyb20gJ3BhdGgnO1xuaW1wb3J0ICogYXMgWUFNTCBmcm9tICd5YW1sJztcblxuY29uc3QgTUFYX0RPV05MT0FEX0JVRkZFUiA9IDEwICogMTAyNCAqIDEwMjQ7XG5cbi8vIFNldCBkZWZhdWx0IFlBTUwgc2NoZW1hIHRvIDEuMS4gVGhpcyBlbnN1cmVzIHNhdmVkIFlBTUwgaXMgYmFja3dhcmQgY29tcGF0aWJsZSB3aXRoIG90aGVyIHBhcnNlcnMsIHN1Y2ggYXMgUHlZQU1MXG4vLyBJdCBhbHNvIGVuc3VyZXMgdGhhdCBvY3RhbCBudW1iZXJzIGluIHRoZSBmb3JtIGAwNzc1YCB3aWxsIGJlIHBhcnNlZFxuLy8gY29ycmVjdGx5IG9uIFlBTUwgbG9hZC4gKHNlZSBodHRwczovL2dpdGh1Yi5jb20vZWVtZWxpL3lhbWwvaXNzdWVzLzIwNSlcbmNvbnN0IHlhbWxTY2hlbWFWZXJzaW9uID0gJzEuMSc7XG5cbi8qKlxuICogWUFNTCB1dGlsaXRpZXMuXG4gKi9cbmV4cG9ydCBjbGFzcyBZYW1sIHtcbiAgLyoqXG4gICAqIEBkZXByZWNhdGVkIHVzZSBgc3RyaW5naWZ5KGRvY1ssIGRvYywgLi4uXSlgXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIGZvcm1hdE9iamVjdHMoZG9jczogYW55W10pOiBzdHJpbmcge1xuICAgIHJldHVybiB0aGlzLnN0cmluZ2lmeSguLi5kb2NzKTtcbiAgfVxuXG4gIC8qKlxuICAgKiBTYXZlcyBhIHNldCBvZiBvYmplY3RzIGFzIGEgbXVsdGktZG9jdW1lbnQgWUFNTCBmaWxlLlxuICAgKiBAcGFyYW0gZmlsZVBhdGggVGhlIG91dHB1dCBwYXRoXG4gICAqIEBwYXJhbSBkb2NzIFRoZSBzZXQgb2Ygb2JqZWN0c1xuICAgKi9cbiAgcHVibGljIHN0YXRpYyBzYXZlKGZpbGVQYXRoOiBzdHJpbmcsIGRvY3M6IGFueVtdKSB7XG4gICAgY29uc3QgZGF0YSA9IHRoaXMuc3RyaW5naWZ5KC4uLmRvY3MpO1xuICAgIGZzLndyaXRlRmlsZVN5bmMoZmlsZVBhdGgsIGRhdGEsIHsgZW5jb2Rpbmc6ICd1dGY4JyB9KTtcbiAgfVxuXG4gIC8qKlxuICAgKiBTdHJpbmdpZnkgYSBkb2N1bWVudCAob3IgbXVsdGlwbGUgZG9jdW1lbnRzKSBpbnRvIFlBTUxcbiAgICpcbiAgICogV2UgY29udmVydCB1bmRlZmluZWQgdmFsdWVzIHRvIG51bGwsIGJ1dCBpZ25vcmUgYW55IGRvY3VtZW50cyB0aGF0IGFyZVxuICAgKiB1bmRlZmluZWQuXG4gICAqXG4gICAqIEBwYXJhbSBkb2NzIEEgc2V0IG9mIG9iamVjdHMgdG8gY29udmVydCB0byBZQU1MXG4gICAqIEByZXR1cm5zIGEgWUFNTCBzdHJpbmcuIE11bHRpcGxlIGRvY3MgYXJlIHNlcGFyYXRlZCBieSBgLS0tYC5cbiAgICovXG4gIHB1YmxpYyBzdGF0aWMgc3RyaW5naWZ5KC4uLmRvY3M6IGFueVtdKSB7XG4gICAgcmV0dXJuIGRvY3MubWFwKFxuICAgICAgciA9PiByID09PSB1bmRlZmluZWQgPyAnXFxuJyA6IFlBTUwuc3RyaW5naWZ5KHIsIHsga2VlcFVuZGVmaW5lZDogdHJ1ZSwgbGluZVdpZHRoOiAwLCB2ZXJzaW9uOiB5YW1sU2NoZW1hVmVyc2lvbiB9KSxcbiAgICApLmpvaW4oJy0tLVxcbicpO1xuICB9XG5cbiAgLyoqXG4gICAqIFNhdmVzIGEgc2V0IG9mIFlBTUwgZG9jdW1lbnRzIGludG8gYSB0ZW1wIGZpbGUgKGluIC90bXApXG4gICAqXG4gICAqIEByZXR1cm5zIHRoZSBwYXRoIHRvIHRoZSB0ZW1wb3JhcnkgZmlsZVxuICAgKiBAcGFyYW0gZG9jcyB0aGUgc2V0IG9mIGRvY3VtZW50cyB0byBzYXZlXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIHRtcChkb2NzOiBhbnlbXSk6IHN0cmluZyB7XG4gICAgY29uc3QgdG1wZGlyID0gZnMubWtkdGVtcFN5bmMocGF0aC5qb2luKG9zLnRtcGRpcigpLCAnY2RrOHMtJykpO1xuICAgIGNvbnN0IGZpbGVQYXRoID0gcGF0aC5qb2luKHRtcGRpciwgJ3RlbXAueWFtbCcpO1xuICAgIFlhbWwuc2F2ZShmaWxlUGF0aCwgZG9jcyk7XG4gICAgcmV0dXJuIGZpbGVQYXRoO1xuICB9XG5cbiAgLyoqXG4gICAqIERvd25sb2FkcyBhIHNldCBvZiBZQU1MIGRvY3VtZW50cyAoazhzIG1hbmlmZXN0IGZvciBleGFtcGxlKSBmcm9tIGEgVVJMIG9yXG4gICAqIGEgZmlsZSBhbmQgcmV0dXJucyB0aGVtIGFzIGphdmFzY3JpcHQgb2JqZWN0cy5cbiAgICpcbiAgICogRW1wdHkgZG9jdW1lbnRzIGFyZSBmaWx0ZXJlZCBvdXQuXG4gICAqXG4gICAqIEBwYXJhbSB1cmxPckZpbGUgYSBVUkwgb2YgYSBmaWxlIHBhdGggdG8gbG9hZCBmcm9tXG4gICAqIEByZXR1cm5zIGFuIGFycmF5IG9mIG9iamVjdHMsIGVhY2ggcmVwcmVzZW50cyBhIGRvY3VtZW50IGluc2lkZSB0aGUgWUFNTFxuICAgKi9cbiAgcHVibGljIHN0YXRpYyBsb2FkKHVybE9yRmlsZTogc3RyaW5nKTogYW55W10ge1xuICAgIGNvbnN0IGJvZHkgPSBsb2FkdXJsKHVybE9yRmlsZSk7XG5cbiAgICBjb25zdCBvYmplY3RzID0gWUFNTC5wYXJzZUFsbERvY3VtZW50cyhib2R5LCB7XG4gICAgICB2ZXJzaW9uOiB5YW1sU2NoZW1hVmVyc2lvbixcbiAgICB9KTtcbiAgICBjb25zdCByZXN1bHQgPSBuZXcgQXJyYXk8YW55PigpO1xuXG4gICAgZm9yIChjb25zdCBvYmogb2Ygb2JqZWN0cy5tYXAoeCA9PiB4LnRvSlNPTigpKSkge1xuICAgICAgLy8gc2tpcCBlbXB0eSBkb2N1bWVudHNcbiAgICAgIGlmIChvYmogPT09IHVuZGVmaW5lZCkgeyBjb250aW51ZTsgfVxuICAgICAgaWYgKG9iaiA9PT0gbnVsbCkgeyBjb250aW51ZTsgfVxuICAgICAgaWYgKEFycmF5LmlzQXJyYXkob2JqKSAmJiBvYmoubGVuZ3RoID09PSAwKSB7IGNvbnRpbnVlOyB9XG4gICAgICBpZiAodHlwZW9mKG9iaikgPT09ICdvYmplY3QnICYmIE9iamVjdC5rZXlzKG9iaikubGVuZ3RoID09PSAwKSB7IGNvbnRpbnVlOyB9XG5cbiAgICAgIHJlc3VsdC5wdXNoKG9iaik7XG4gICAgfVxuXG4gICAgcmV0dXJuIHJlc3VsdDtcbiAgfVxuXG4gIC8qKlxuICAgKiBVdGlsaXR5IGNsYXNzLlxuICAgKi9cbiAgcHJpdmF0ZSBjb25zdHJ1Y3RvcigpIHtcbiAgICByZXR1cm47XG4gIH1cbn1cblxuLyoqXG4gKiBMb2FkcyBhIHVybCAob3IgZmlsZSkgYW5kIHJldHVybnMgdGhlIGNvbnRlbnRzLlxuICogVGhpcyBtZXRob2Qgc3Bhd25zIGEgY2hpbGQgcHJvY2VzcyBpbiBvcmRlciB0byBwZXJmb3JtIGFuIGh0dHAgY2FsbCBzeW5jaHJvbm91c2x5LlxuICovXG5mdW5jdGlvbiBsb2FkdXJsKHVybDogc3RyaW5nKTogc3RyaW5nIHtcbiAgY29uc3Qgc2NyaXB0ID0gcGF0aC5qb2luKF9fZGlybmFtZSwgJ19sb2FkdXJsLmpzJyk7XG4gIHJldHVybiBleGVjRmlsZVN5bmMocHJvY2Vzcy5leGVjUGF0aCwgW3NjcmlwdCwgdXJsXSwge1xuICAgIGVuY29kaW5nOiAndXRmLTgnLFxuICAgIG1heEJ1ZmZlcjogTUFYX0RPV05MT0FEX0JVRkZFUixcbiAgfSkudG9TdHJpbmcoKTtcbn1cbiJdfQ==
150297
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoieWFtbC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy95YW1sLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBQUEsaURBQTZDO0FBQzdDLHlCQUF5QjtBQUN6Qix5QkFBeUI7QUFDekIsNkJBQTZCO0FBQzdCLDZCQUE2QjtBQUU3QixNQUFNLG1CQUFtQixHQUFHLEVBQUUsR0FBRyxJQUFJLEdBQUcsSUFBSSxDQUFDO0FBRTdDLG9IQUFvSDtBQUNwSCx1RUFBdUU7QUFDdkUsMEVBQTBFO0FBQzFFLE1BQU0saUJBQWlCLEdBQUcsS0FBSyxDQUFDO0FBRWhDOztHQUVHO0FBQ0gsTUFBYSxJQUFJO0lBQ2Y7O09BRUc7SUFDSSxNQUFNLENBQUMsYUFBYSxDQUFDLElBQVc7UUFDckMsT0FBTyxJQUFJLENBQUMsU0FBUyxDQUFDLEdBQUcsSUFBSSxDQUFDLENBQUM7SUFDakMsQ0FBQztJQUVEOzs7O09BSUc7SUFDSSxNQUFNLENBQUMsSUFBSSxDQUFDLFFBQWdCLEVBQUUsSUFBVztRQUM5QyxNQUFNLElBQUksR0FBRyxJQUFJLENBQUMsU0FBUyxDQUFDLEdBQUcsSUFBSSxDQUFDLENBQUM7UUFDckMsRUFBRSxDQUFDLGFBQWEsQ0FBQyxRQUFRLEVBQUUsSUFBSSxFQUFFLEVBQUUsUUFBUSxFQUFFLE1BQU0sRUFBRSxDQUFDLENBQUM7SUFDekQsQ0FBQztJQUVEOzs7Ozs7OztPQVFHO0lBQ0ksTUFBTSxDQUFDLFNBQVMsQ0FBQyxHQUFHLElBQVc7UUFDcEMsT0FBTyxJQUFJLENBQUMsR0FBRyxDQUNiLENBQUMsQ0FBQyxFQUFFLENBQUMsQ0FBQyxLQUFLLFNBQVMsQ0FBQyxDQUFDLENBQUMsSUFBSSxDQUFDLENBQUMsQ0FBQyxJQUFJLENBQUMsU0FBUyxDQUFDLENBQUMsRUFBRSxFQUFFLGFBQWEsRUFBRSxJQUFJLEVBQUUsU0FBUyxFQUFFLENBQUMsRUFBRSxPQUFPLEVBQUUsaUJBQWlCLEVBQUUsQ0FBQyxDQUNuSCxDQUFDLElBQUksQ0FBQyxPQUFPLENBQUMsQ0FBQztJQUNsQixDQUFDO0lBRUQ7Ozs7O09BS0c7SUFDSSxNQUFNLENBQUMsR0FBRyxDQUFDLElBQVc7UUFDM0IsTUFBTSxNQUFNLEdBQUcsRUFBRSxDQUFDLFdBQVcsQ0FBQyxJQUFJLENBQUMsSUFBSSxDQUFDLEVBQUUsQ0FBQyxNQUFNLEVBQUUsRUFBRSxRQUFRLENBQUMsQ0FBQyxDQUFDO1FBQ2hFLE1BQU0sUUFBUSxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsTUFBTSxFQUFFLFdBQVcsQ0FBQyxDQUFDO1FBQ2hELElBQUksQ0FBQyxJQUFJLENBQUMsUUFBUSxFQUFFLElBQUksQ0FBQyxDQUFDO1FBQzFCLE9BQU8sUUFBUSxDQUFDO0lBQ2xCLENBQUM7SUFFRDs7Ozs7Ozs7T0FRRztJQUNJLE1BQU0sQ0FBQyxJQUFJLENBQUMsU0FBaUI7UUFDbEMsTUFBTSxJQUFJLEdBQUcsT0FBTyxDQUFDLFNBQVMsQ0FBQyxDQUFDO1FBRWhDLE1BQU0sT0FBTyxHQUFHLElBQUksQ0FBQyxpQkFBaUIsQ0FBQyxJQUFJLEVBQUU7WUFDM0MsT0FBTyxFQUFFLGlCQUFpQjtTQUMzQixDQUFDLENBQUM7UUFDSCxNQUFNLE1BQU0sR0FBRyxJQUFJLEtBQUssRUFBTyxDQUFDO1FBRWhDLEtBQUssTUFBTSxHQUFHLElBQUksT0FBTyxDQUFDLEdBQUcsQ0FBQyxDQUFDLENBQUMsRUFBRSxDQUFDLENBQUMsQ0FBQyxNQUFNLEVBQUUsQ0FBQyxFQUFFLENBQUM7WUFDL0MsdUJBQXVCO1lBQ3ZCLElBQUksR0FBRyxLQUFLLFNBQVMsRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQ3BDLElBQUksR0FBRyxLQUFLLElBQUksRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQy9CLElBQUksS0FBSyxDQUFDLE9BQU8sQ0FBQyxHQUFHLENBQUMsSUFBSSxHQUFHLENBQUMsTUFBTSxLQUFLLENBQUMsRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQ3pELElBQUksT0FBTyxDQUFDLEdBQUcsQ0FBQyxLQUFLLFFBQVEsSUFBSSxNQUFNLENBQUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDLE1BQU0sS0FBSyxDQUFDLEVBQUUsQ0FBQztnQkFBQyxTQUFTO1lBQUMsQ0FBQztZQUU3RSxNQUFNLENBQUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDO1FBQ25CLENBQUM7UUFFRCxPQUFPLE1BQU0sQ0FBQztJQUNoQixDQUFDO0lBRUQ7O09BRUc7SUFDSDtRQUNFLE9BQU87SUFDVCxDQUFDOztBQWpGSCxvQkFrRkM7OztBQUVEOzs7R0FHRztBQUNILFNBQVMsT0FBTyxDQUFDLEdBQVc7SUFDMUIsTUFBTSxNQUFNLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxTQUFTLEVBQUUsY0FBYyxDQUFDLENBQUM7SUFDcEQsT0FBTyxJQUFBLDRCQUFZLEVBQUMsT0FBTyxDQUFDLFFBQVEsRUFBRSxDQUFDLE1BQU0sRUFBRSxHQUFHLENBQUMsRUFBRTtRQUNuRCxRQUFRLEVBQUUsT0FBTztRQUNqQixTQUFTLEVBQUUsbUJBQW1CO0tBQy9CLENBQUMsQ0FBQyxRQUFRLEVBQUUsQ0FBQztBQUNoQixDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgZXhlY0ZpbGVTeW5jIH0gZnJvbSAnY2hpbGRfcHJvY2Vzcyc7XG5pbXBvcnQgKiBhcyBmcyBmcm9tICdmcyc7XG5pbXBvcnQgKiBhcyBvcyBmcm9tICdvcyc7XG5pbXBvcnQgKiBhcyBwYXRoIGZyb20gJ3BhdGgnO1xuaW1wb3J0ICogYXMgWUFNTCBmcm9tICd5YW1sJztcblxuY29uc3QgTUFYX0RPV05MT0FEX0JVRkZFUiA9IDEwICogMTAyNCAqIDEwMjQ7XG5cbi8vIFNldCBkZWZhdWx0IFlBTUwgc2NoZW1hIHRvIDEuMS4gVGhpcyBlbnN1cmVzIHNhdmVkIFlBTUwgaXMgYmFja3dhcmQgY29tcGF0aWJsZSB3aXRoIG90aGVyIHBhcnNlcnMsIHN1Y2ggYXMgUHlZQU1MXG4vLyBJdCBhbHNvIGVuc3VyZXMgdGhhdCBvY3RhbCBudW1iZXJzIGluIHRoZSBmb3JtIGAwNzc1YCB3aWxsIGJlIHBhcnNlZFxuLy8gY29ycmVjdGx5IG9uIFlBTUwgbG9hZC4gKHNlZSBodHRwczovL2dpdGh1Yi5jb20vZWVtZWxpL3lhbWwvaXNzdWVzLzIwNSlcbmNvbnN0IHlhbWxTY2hlbWFWZXJzaW9uID0gJzEuMSc7XG5cbi8qKlxuICogWUFNTCB1dGlsaXRpZXMuXG4gKi9cbmV4cG9ydCBjbGFzcyBZYW1sIHtcbiAgLyoqXG4gICAqIEBkZXByZWNhdGVkIHVzZSBgc3RyaW5naWZ5KGRvY1ssIGRvYywgLi4uXSlgXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIGZvcm1hdE9iamVjdHMoZG9jczogYW55W10pOiBzdHJpbmcge1xuICAgIHJldHVybiB0aGlzLnN0cmluZ2lmeSguLi5kb2NzKTtcbiAgfVxuXG4gIC8qKlxuICAgKiBTYXZlcyBhIHNldCBvZiBvYmplY3RzIGFzIGEgbXVsdGktZG9jdW1lbnQgWUFNTCBmaWxlLlxuICAgKiBAcGFyYW0gZmlsZVBhdGggVGhlIG91dHB1dCBwYXRoXG4gICAqIEBwYXJhbSBkb2NzIFRoZSBzZXQgb2Ygb2JqZWN0c1xuICAgKi9cbiAgcHVibGljIHN0YXRpYyBzYXZlKGZpbGVQYXRoOiBzdHJpbmcsIGRvY3M6IGFueVtdKSB7XG4gICAgY29uc3QgZGF0YSA9IHRoaXMuc3RyaW5naWZ5KC4uLmRvY3MpO1xuICAgIGZzLndyaXRlRmlsZVN5bmMoZmlsZVBhdGgsIGRhdGEsIHsgZW5jb2Rpbmc6ICd1dGY4JyB9KTtcbiAgfVxuXG4gIC8qKlxuICAgKiBTdHJpbmdpZnkgYSBkb2N1bWVudCAob3IgbXVsdGlwbGUgZG9jdW1lbnRzKSBpbnRvIFlBTUxcbiAgICpcbiAgICogV2UgY29udmVydCB1bmRlZmluZWQgdmFsdWVzIHRvIG51bGwsIGJ1dCBpZ25vcmUgYW55IGRvY3VtZW50cyB0aGF0IGFyZVxuICAgKiB1bmRlZmluZWQuXG4gICAqXG4gICAqIEBwYXJhbSBkb2NzIEEgc2V0IG9mIG9iamVjdHMgdG8gY29udmVydCB0byBZQU1MXG4gICAqIEByZXR1cm5zIGEgWUFNTCBzdHJpbmcuIE11bHRpcGxlIGRvY3MgYXJlIHNlcGFyYXRlZCBieSBgLS0tYC5cbiAgICovXG4gIHB1YmxpYyBzdGF0aWMgc3RyaW5naWZ5KC4uLmRvY3M6IGFueVtdKSB7XG4gICAgcmV0dXJuIGRvY3MubWFwKFxuICAgICAgciA9PiByID09PSB1bmRlZmluZWQgPyAnXFxuJyA6IFlBTUwuc3RyaW5naWZ5KHIsIHsga2VlcFVuZGVmaW5lZDogdHJ1ZSwgbGluZVdpZHRoOiAwLCB2ZXJzaW9uOiB5YW1sU2NoZW1hVmVyc2lvbiB9KSxcbiAgICApLmpvaW4oJy0tLVxcbicpO1xuICB9XG5cbiAgLyoqXG4gICAqIFNhdmVzIGEgc2V0IG9mIFlBTUwgZG9jdW1lbnRzIGludG8gYSB0ZW1wIGZpbGUgKGluIC90bXApXG4gICAqXG4gICAqIEByZXR1cm5zIHRoZSBwYXRoIHRvIHRoZSB0ZW1wb3JhcnkgZmlsZVxuICAgKiBAcGFyYW0gZG9jcyB0aGUgc2V0IG9mIGRvY3VtZW50cyB0byBzYXZlXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIHRtcChkb2NzOiBhbnlbXSk6IHN0cmluZyB7XG4gICAgY29uc3QgdG1wZGlyID0gZnMubWtkdGVtcFN5bmMocGF0aC5qb2luKG9zLnRtcGRpcigpLCAnY2RrOHMtJykpO1xuICAgIGNvbnN0IGZpbGVQYXRoID0gcGF0aC5qb2luKHRtcGRpciwgJ3RlbXAueWFtbCcpO1xuICAgIFlhbWwuc2F2ZShmaWxlUGF0aCwgZG9jcyk7XG4gICAgcmV0dXJuIGZpbGVQYXRoO1xuICB9XG5cbiAgLyoqXG4gICAqIERvd25sb2FkcyBhIHNldCBvZiBZQU1MIGRvY3VtZW50cyAoazhzIG1hbmlmZXN0IGZvciBleGFtcGxlKSBmcm9tIGEgVVJMIG9yXG4gICAqIGEgZmlsZSBhbmQgcmV0dXJucyB0aGVtIGFzIGphdmFzY3JpcHQgb2JqZWN0cy5cbiAgICpcbiAgICogRW1wdHkgZG9jdW1lbnRzIGFyZSBmaWx0ZXJlZCBvdXQuXG4gICAqXG4gICAqIEBwYXJhbSB1cmxPckZpbGUgYSBVUkwgb2YgYSBmaWxlIHBhdGggdG8gbG9hZCBmcm9tXG4gICAqIEByZXR1cm5zIGFuIGFycmF5IG9mIG9iamVjdHMsIGVhY2ggcmVwcmVzZW50cyBhIGRvY3VtZW50IGluc2lkZSB0aGUgWUFNTFxuICAgKi9cbiAgcHVibGljIHN0YXRpYyBsb2FkKHVybE9yRmlsZTogc3RyaW5nKTogYW55W10ge1xuICAgIGNvbnN0IGJvZHkgPSBsb2FkdXJsKHVybE9yRmlsZSk7XG5cbiAgICBjb25zdCBvYmplY3RzID0gWUFNTC5wYXJzZUFsbERvY3VtZW50cyhib2R5LCB7XG4gICAgICB2ZXJzaW9uOiB5YW1sU2NoZW1hVmVyc2lvbixcbiAgICB9KTtcbiAgICBjb25zdCByZXN1bHQgPSBuZXcgQXJyYXk8YW55PigpO1xuXG4gICAgZm9yIChjb25zdCBvYmogb2Ygb2JqZWN0cy5tYXAoeCA9PiB4LnRvSlNPTigpKSkge1xuICAgICAgLy8gc2tpcCBlbXB0eSBkb2N1bWVudHNcbiAgICAgIGlmIChvYmogPT09IHVuZGVmaW5lZCkgeyBjb250aW51ZTsgfVxuICAgICAgaWYgKG9iaiA9PT0gbnVsbCkgeyBjb250aW51ZTsgfVxuICAgICAgaWYgKEFycmF5LmlzQXJyYXkob2JqKSAmJiBvYmoubGVuZ3RoID09PSAwKSB7IGNvbnRpbnVlOyB9XG4gICAgICBpZiAodHlwZW9mIChvYmopID09PSAnb2JqZWN0JyAmJiBPYmplY3Qua2V5cyhvYmopLmxlbmd0aCA9PT0gMCkgeyBjb250aW51ZTsgfVxuXG4gICAgICByZXN1bHQucHVzaChvYmopO1xuICAgIH1cblxuICAgIHJldHVybiByZXN1bHQ7XG4gIH1cblxuICAvKipcbiAgICogVXRpbGl0eSBjbGFzcy5cbiAgICovXG4gIHByaXZhdGUgY29uc3RydWN0b3IoKSB7XG4gICAgcmV0dXJuO1xuICB9XG59XG5cbi8qKlxuICogTG9hZHMgYSB1cmwgKG9yIGZpbGUpIGFuZCByZXR1cm5zIHRoZSBjb250ZW50cy5cbiAqIFRoaXMgbWV0aG9kIHNwYXducyBhIGNoaWxkIHByb2Nlc3MgaW4gb3JkZXIgdG8gcGVyZm9ybSBhbiBodHRwIGNhbGwgc3luY2hyb25vdXNseS5cbiAqL1xuZnVuY3Rpb24gbG9hZHVybCh1cmw6IHN0cmluZyk6IHN0cmluZyB7XG4gIGNvbnN0IHNjcmlwdCA9IHBhdGguam9pbihfX2Rpcm5hbWUsICdfbG9hZHVybC5tanMnKTtcbiAgcmV0dXJuIGV4ZWNGaWxlU3luYyhwcm9jZXNzLmV4ZWNQYXRoLCBbc2NyaXB0LCB1cmxdLCB7XG4gICAgZW5jb2Rpbmc6ICd1dGYtOCcsXG4gICAgbWF4QnVmZmVyOiBNQVhfRE9XTkxPQURfQlVGRkVSLFxuICB9KS50b1N0cmluZygpO1xufVxuIl19
150298
150298
 
150299
150299
  /***/ }),
150300
150300
 
@@ -224043,7 +224043,7 @@ class Sender {
224043
224043
  /**
224044
224044
  * Sends a frame.
224045
224045
  *
224046
- * @param {Buffer[]} list The frame to send
224046
+ * @param {(Buffer | String)[]} list The frame to send
224047
224047
  * @param {Function} [cb] Callback
224048
224048
  * @private
224049
224049
  */
@@ -224100,8 +224100,10 @@ function onError(sender, err, cb) {
224100
224100
  /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => {
224101
224101
 
224102
224102
  "use strict";
224103
+ /* eslint no-unused-vars: ["error", { "varsIgnorePattern": "^WebSocket$" }] */
224103
224104
 
224104
224105
 
224106
+ const WebSocket = __nccwpck_require__(69427);
224105
224107
  const { Duplex } = __nccwpck_require__(12781);
224106
224108
 
224107
224109
  /**
@@ -284107,8 +284109,13 @@ const SafeEval = {
284107
284109
  return ast.value;
284108
284110
  },
284109
284111
  evalMemberExpression(ast, subs) {
284110
- const prop = ast.computed ? SafeEval.evalAst(ast.property) // `object[property]`
284111
- : ast.property.name; // `object.property` property is Identifier
284112
+ const prop = String(
284113
+ // NOTE: `String(value)` throws error when
284114
+ // value has overwritten the toString method to return non-string
284115
+ // i.e. `value = {toString: () => []}`
284116
+ ast.computed ? SafeEval.evalAst(ast.property) // `object[property]`
284117
+ : ast.property.name // `object.property` property is Identifier
284118
+ );
284112
284119
  const obj = SafeEval.evalAst(ast.object, subs);
284113
284120
  if (obj === undefined || obj === null) {
284114
284121
  throw TypeError(`Cannot read properties of ${obj} (reading '${prop}')`);
@@ -284885,7 +284892,7 @@ Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{val
284885
284892
 
284886
284893
  /***/ }),
284887
284894
 
284888
- /***/ 2:
284895
+ /***/ 91188:
284889
284896
  /***/ ((__unused_webpack___webpack_module__, __webpack_exports__, __nccwpck_require__) => {
284890
284897
 
284891
284898
  "use strict";
@@ -284925,8 +284932,10 @@ __nccwpck_require__.d(__webpack_exports__, {
284925
284932
  "genericGrantRequest": () => (/* binding */ genericGrantRequest),
284926
284933
  "getDPoPHandle": () => (/* binding */ getDPoPHandle),
284927
284934
  "getJwksCache": () => (/* binding */ getJwksCache),
284935
+ "initiateBackchannelAuthentication": () => (/* binding */ initiateBackchannelAuthentication),
284928
284936
  "initiateDeviceAuthorization": () => (/* binding */ initiateDeviceAuthorization),
284929
284937
  "modifyAssertion": () => (/* binding */ build_modifyAssertion),
284938
+ "pollBackchannelAuthenticationGrant": () => (/* binding */ pollBackchannelAuthenticationGrant),
284930
284939
  "pollDeviceAuthorizationGrant": () => (/* binding */ pollDeviceAuthorizationGrant),
284931
284940
  "randomDPoPKeyPair": () => (/* binding */ randomDPoPKeyPair),
284932
284941
  "randomNonce": () => (/* binding */ randomNonce),
@@ -284946,7 +284955,7 @@ __nccwpck_require__.d(__webpack_exports__, {
284946
284955
  let USER_AGENT;
284947
284956
  if (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {
284948
284957
  const NAME = 'oauth4webapi';
284949
- const VERSION = 'v3.1.4';
284958
+ const VERSION = 'v3.3.1';
284950
284959
  USER_AGENT = `${NAME}/${VERSION}`;
284951
284960
  }
284952
284961
  function looseInstanceOf(input, expected) {
@@ -284975,11 +284984,11 @@ const customFetch = Symbol();
284975
284984
  const modifyAssertion = Symbol();
284976
284985
  const jweDecrypt = Symbol();
284977
284986
  const build_jwksCache = Symbol();
284978
- const encoder = new TextEncoder();
284987
+ const build_encoder = new TextEncoder();
284979
284988
  const decoder = new TextDecoder();
284980
284989
  function buf(input) {
284981
284990
  if (typeof input === 'string') {
284982
- return encoder.encode(input);
284991
+ return build_encoder.encode(input);
284983
284992
  }
284984
284993
  return decoder.decode(input);
284985
284994
  }
@@ -285007,7 +285016,7 @@ function decodeBase64Url(input) {
285007
285016
  throw CodedTypeError('The input to be decoded is not correctly encoded.', ERR_INVALID_ARG_VALUE, cause);
285008
285017
  }
285009
285018
  }
285010
- function b64u(input) {
285019
+ function build_b64u(input) {
285011
285020
  if (typeof input === 'string') {
285012
285021
  return decodeBase64Url(input);
285013
285022
  }
@@ -285166,12 +285175,12 @@ async function processDiscoveryResponse(expectedIssuerIdentifier, response) {
285166
285175
  throw OPE('"response" is not a conform Authorization Server Metadata response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
285167
285176
  }
285168
285177
  assertReadableResponse(response);
285169
- assertApplicationJson(response);
285170
285178
  let json;
285171
285179
  try {
285172
285180
  json = await response.json();
285173
285181
  }
285174
285182
  catch (cause) {
285183
+ assertApplicationJson(response);
285175
285184
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
285176
285185
  }
285177
285186
  if (!isJsonObject(json)) {
@@ -285212,7 +285221,7 @@ function assertContentType(response, contentType) {
285212
285221
  }
285213
285222
  }
285214
285223
  function randomBytes() {
285215
- return b64u(crypto.getRandomValues(new Uint8Array(32)));
285224
+ return build_b64u(crypto.getRandomValues(new Uint8Array(32)));
285216
285225
  }
285217
285226
  function generateRandomCodeVerifier() {
285218
285227
  return randomBytes();
@@ -285225,7 +285234,7 @@ function generateRandomNonce() {
285225
285234
  }
285226
285235
  async function calculatePKCECodeChallenge(codeVerifier) {
285227
285236
  assertString(codeVerifier, 'codeVerifier');
285228
- return b64u(await crypto.subtle.digest('SHA-256', buf(codeVerifier)));
285237
+ return build_b64u(await crypto.subtle.digest('SHA-256', buf(codeVerifier)));
285229
285238
  }
285230
285239
  function getKeyAndKid(input) {
285231
285240
  if (input instanceof CryptoKey) {
@@ -285391,11 +285400,11 @@ function ClientSecretJwt(clientSecret, options) {
285391
285400
  const header = { alg: 'HS256' };
285392
285401
  const payload = clientAssertionPayload(as, client);
285393
285402
  modify?.(header, payload);
285394
- const data = `${b64u(buf(JSON.stringify(header)))}.${b64u(buf(JSON.stringify(payload)))}`;
285403
+ const data = `${build_b64u(buf(JSON.stringify(header)))}.${build_b64u(buf(JSON.stringify(payload)))}`;
285395
285404
  const hmac = await crypto.subtle.sign(key.algorithm, key, buf(data));
285396
285405
  body.set('client_id', client.client_id);
285397
285406
  body.set('client_assertion_type', 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer');
285398
- body.set('client_assertion', `${data}.${b64u(new Uint8Array(hmac))}`);
285407
+ body.set('client_assertion', `${data}.${build_b64u(new Uint8Array(hmac))}`);
285399
285408
  };
285400
285409
  }
285401
285410
  function None() {
@@ -285410,8 +285419,8 @@ async function signJwt(header, payload, key) {
285410
285419
  if (!key.usages.includes('sign')) {
285411
285420
  throw CodedTypeError('CryptoKey instances used for signing assertions must include "sign" in their "usages"', ERR_INVALID_ARG_VALUE);
285412
285421
  }
285413
- const input = `${b64u(buf(JSON.stringify(header)))}.${b64u(buf(JSON.stringify(payload)))}`;
285414
- const signature = b64u(await crypto.subtle.sign(keyToSubtle(key), key, buf(input)));
285422
+ const input = `${build_b64u(buf(JSON.stringify(header)))}.${build_b64u(buf(JSON.stringify(payload)))}`;
285423
+ const signature = build_b64u(await crypto.subtle.sign(keyToSubtle(key), key, buf(input)));
285415
285424
  return `${input}.${signature}`;
285416
285425
  }
285417
285426
  async function issueRequestObject(as, client, parameters, privateKey, options) {
@@ -285547,6 +285556,7 @@ class DPoPHandler {
285547
285556
  #clockSkew;
285548
285557
  #modifyAssertion;
285549
285558
  #map;
285559
+ #jkt;
285550
285560
  constructor(client, keyPair, options) {
285551
285561
  assertPrivateKey(keyPair?.privateKey, '"DPoP.privateKey"');
285552
285562
  assertPublicKey(keyPair?.publicKey, '"DPoP.publicKey"');
@@ -285576,6 +285586,27 @@ class DPoPHandler {
285576
285586
  }
285577
285587
  this.#map.set(key, val);
285578
285588
  }
285589
+ async calculateThumbprint() {
285590
+ if (!this.#jkt) {
285591
+ const jwk = await crypto.subtle.exportKey('jwk', this.#publicKey);
285592
+ let components;
285593
+ switch (jwk.kty) {
285594
+ case 'EC':
285595
+ components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x, y: jwk.y };
285596
+ break;
285597
+ case 'OKP':
285598
+ components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x };
285599
+ break;
285600
+ case 'RSA':
285601
+ components = { e: jwk.e, kty: jwk.kty, n: jwk.n };
285602
+ break;
285603
+ default:
285604
+ throw new UnsupportedOperationError('unsupported JWK', { cause: { jwk } });
285605
+ }
285606
+ this.#jkt ||= build_b64u(await crypto.subtle.digest({ name: 'SHA-256' }, buf(JSON.stringify(components))));
285607
+ }
285608
+ return this.#jkt;
285609
+ }
285579
285610
  async addProof(url, headers, htm, accessToken) {
285580
285611
  this.#header ||= {
285581
285612
  alg: keyToJws(this.#privateKey),
@@ -285590,7 +285621,7 @@ class DPoPHandler {
285590
285621
  htm,
285591
285622
  nonce,
285592
285623
  htu: `${url.origin}${url.pathname}`,
285593
- ath: accessToken ? b64u(await crypto.subtle.digest('SHA-256', buf(accessToken))) : undefined,
285624
+ ath: accessToken ? build_b64u(await crypto.subtle.digest('SHA-256', buf(accessToken))) : undefined,
285594
285625
  };
285595
285626
  this.#modifyAssertion?.(this.#header, payload);
285596
285627
  headers.set('dpop', await signJwt(this.#header, payload, this.#privateKey));
@@ -285732,28 +285763,15 @@ async function processPushedAuthorizationResponse(as, client, response) {
285732
285763
  if (!looseInstanceOf(response, Response)) {
285733
285764
  throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
285734
285765
  }
285735
- let challenges;
285736
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
285737
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
285738
- }
285739
- if (response.status !== 201) {
285740
- let err;
285741
- if ((err = await handleOAuthBodyError(response))) {
285742
- await response.body?.cancel();
285743
- throw new ResponseBodyError('server responded with an error in the response body', {
285744
- cause: err,
285745
- response,
285746
- });
285747
- }
285748
- throw OPE('"response" is not a conform Pushed Authorization Request Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
285749
- }
285766
+ checkAuthenticationChallenges(response);
285767
+ await checkOAuthBodyError(response, 201, 'Pushed Authorization Request Endpoint');
285750
285768
  assertReadableResponse(response);
285751
- assertApplicationJson(response);
285752
285769
  let json;
285753
285770
  try {
285754
285771
  json = await response.json();
285755
285772
  }
285756
285773
  catch (cause) {
285774
+ assertApplicationJson(response);
285757
285775
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
285758
285776
  }
285759
285777
  if (!isJsonObject(json)) {
@@ -285769,6 +285787,33 @@ async function processPushedAuthorizationResponse(as, client, response) {
285769
285787
  json.expires_in = expiresIn;
285770
285788
  return json;
285771
285789
  }
285790
+ async function parseOAuthResponseErrorBody(response) {
285791
+ if (response.status > 399 && response.status < 500) {
285792
+ assertReadableResponse(response);
285793
+ assertApplicationJson(response);
285794
+ try {
285795
+ const json = await response.clone().json();
285796
+ if (isJsonObject(json) && typeof json.error === 'string' && json.error.length) {
285797
+ return json;
285798
+ }
285799
+ }
285800
+ catch { }
285801
+ }
285802
+ return undefined;
285803
+ }
285804
+ async function checkOAuthBodyError(response, expected, label) {
285805
+ if (response.status !== expected) {
285806
+ let err;
285807
+ if ((err = await parseOAuthResponseErrorBody(response))) {
285808
+ await response.body?.cancel();
285809
+ throw new ResponseBodyError('server responded with an error in the response body', {
285810
+ cause: err,
285811
+ response,
285812
+ });
285813
+ }
285814
+ throw OPE(`"response" is not a conform ${label} response (unexpected HTTP status code)`, RESPONSE_IS_NOT_CONFORM, response);
285815
+ }
285816
+ }
285772
285817
  function assertDPoP(option) {
285773
285818
  if (!branded.has(option)) {
285774
285819
  throw CodedTypeError('"options.DPoP" is not a valid DPoPHandle', ERR_INVALID_ARG_VALUE);
@@ -285800,13 +285845,9 @@ async function resourceRequest(accessToken, method, url, headers, body, options)
285800
285845
  return response;
285801
285846
  }
285802
285847
  async function protectedResourceRequest(accessToken, method, url, headers, body, options) {
285803
- return resourceRequest(accessToken, method, url, headers, body, options).then((response) => {
285804
- let challenges;
285805
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
285806
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
285807
- }
285808
- return response;
285809
- });
285848
+ const response = await resourceRequest(accessToken, method, url, headers, body, options);
285849
+ checkAuthenticationChallenges(response);
285850
+ return response;
285810
285851
  }
285811
285852
  async function userInfoRequest(as, client, accessToken, options) {
285812
285853
  assertAs(as);
@@ -285944,10 +285985,7 @@ async function processUserInfoResponse(as, client, expectedSubject, response, op
285944
285985
  if (!looseInstanceOf(response, Response)) {
285945
285986
  throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
285946
285987
  }
285947
- let challenges;
285948
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
285949
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
285950
- }
285988
+ checkAuthenticationChallenges(response);
285951
285989
  if (response.status !== 200) {
285952
285990
  throw OPE('"response" is not a conform UserInfo Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
285953
285991
  }
@@ -285964,11 +286002,11 @@ async function processUserInfoResponse(as, client, expectedSubject, response, op
285964
286002
  if (client.userinfo_signed_response_alg) {
285965
286003
  throw OPE('JWT UserInfo Response expected', JWT_USERINFO_EXPECTED, response);
285966
286004
  }
285967
- assertApplicationJson(response);
285968
286005
  try {
285969
286006
  json = await response.json();
285970
286007
  }
285971
286008
  catch (cause) {
286009
+ assertApplicationJson(response);
285972
286010
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
285973
286011
  }
285974
286012
  }
@@ -286041,13 +286079,13 @@ async function validateApplicationLevelSignature(as, ref, options) {
286041
286079
  throw CodedTypeError('"ref" does not contain a processed JWT Response to verify the signature of', ERR_INVALID_ARG_VALUE);
286042
286080
  }
286043
286081
  const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwtRefs.get(ref).split('.');
286044
- const header = JSON.parse(buf(b64u(protectedHeader)));
286082
+ const header = JSON.parse(buf(build_b64u(protectedHeader)));
286045
286083
  if (header.alg.startsWith('HS')) {
286046
286084
  throw new UnsupportedOperationError('unsupported JWS algorithm', { cause: { alg: header.alg } });
286047
286085
  }
286048
286086
  let key;
286049
286087
  key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
286050
- await validateJwsSignature(protectedHeader, payload, key, b64u(encodedSignature));
286088
+ await validateJwsSignature(protectedHeader, payload, key, build_b64u(encodedSignature));
286051
286089
  }
286052
286090
  async function processGenericAccessTokenResponse(as, client, response, additionalRequiredIdTokenClaims, options) {
286053
286091
  assertAs(as);
@@ -286055,28 +286093,15 @@ async function processGenericAccessTokenResponse(as, client, response, additiona
286055
286093
  if (!looseInstanceOf(response, Response)) {
286056
286094
  throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
286057
286095
  }
286058
- let challenges;
286059
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
286060
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
286061
- }
286062
- if (response.status !== 200) {
286063
- let err;
286064
- if ((err = await handleOAuthBodyError(response))) {
286065
- await response.body?.cancel();
286066
- throw new ResponseBodyError('server responded with an error in the response body', {
286067
- cause: err,
286068
- response,
286069
- });
286070
- }
286071
- throw OPE('"response" is not a conform Token Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
286072
- }
286096
+ checkAuthenticationChallenges(response);
286097
+ await checkOAuthBodyError(response, 200, 'Token Endpoint');
286073
286098
  assertReadableResponse(response);
286074
- assertApplicationJson(response);
286075
286099
  let json;
286076
286100
  try {
286077
286101
  json = await response.json();
286078
286102
  }
286079
286103
  catch (cause) {
286104
+ assertApplicationJson(response);
286080
286105
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
286081
286106
  }
286082
286107
  if (!isJsonObject(json)) {
@@ -286142,6 +286167,12 @@ async function processGenericAccessTokenResponse(as, client, response, additiona
286142
286167
  }
286143
286168
  return json;
286144
286169
  }
286170
+ function checkAuthenticationChallenges(response) {
286171
+ let challenges;
286172
+ if ((challenges = parseWwwAuthenticateChallenges(response))) {
286173
+ throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
286174
+ }
286175
+ }
286145
286176
  async function processRefreshTokenResponse(as, client, response, options) {
286146
286177
  return processGenericAccessTokenResponse(as, client, response, undefined, options);
286147
286178
  }
@@ -286384,21 +286415,8 @@ async function processRevocationResponse(response) {
286384
286415
  if (!looseInstanceOf(response, Response)) {
286385
286416
  throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
286386
286417
  }
286387
- let challenges;
286388
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
286389
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
286390
- }
286391
- if (response.status !== 200) {
286392
- let err;
286393
- if ((err = await handleOAuthBodyError(response))) {
286394
- await response.body?.cancel();
286395
- throw new ResponseBodyError('server responded with an error in the response body', {
286396
- cause: err,
286397
- response,
286398
- });
286399
- }
286400
- throw OPE('"response" is not a conform Revocation Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
286401
- }
286418
+ checkAuthenticationChallenges(response);
286419
+ await checkOAuthBodyError(response, 200, 'Revocation Endpoint');
286402
286420
  return undefined;
286403
286421
  }
286404
286422
  function assertReadableResponse(response) {
@@ -286428,21 +286446,8 @@ async function processIntrospectionResponse(as, client, response, options) {
286428
286446
  if (!looseInstanceOf(response, Response)) {
286429
286447
  throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
286430
286448
  }
286431
- let challenges;
286432
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
286433
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
286434
- }
286435
- if (response.status !== 200) {
286436
- let err;
286437
- if ((err = await handleOAuthBodyError(response))) {
286438
- await response.body?.cancel();
286439
- throw new ResponseBodyError('server responded with an error in the response body', {
286440
- cause: err,
286441
- response,
286442
- });
286443
- }
286444
- throw OPE('"response" is not a conform Introspection Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
286445
- }
286449
+ checkAuthenticationChallenges(response);
286450
+ await checkOAuthBodyError(response, 200, 'Introspection Endpoint');
286446
286451
  let json;
286447
286452
  if (getContentType(response) === 'application/token-introspection+jwt') {
286448
286453
  assertReadableResponse(response);
@@ -286461,11 +286466,11 @@ async function processIntrospectionResponse(as, client, response, options) {
286461
286466
  }
286462
286467
  else {
286463
286468
  assertReadableResponse(response);
286464
- assertApplicationJson(response);
286465
286469
  try {
286466
286470
  json = await response.json();
286467
286471
  }
286468
286472
  catch (cause) {
286473
+ assertApplicationJson(response);
286469
286474
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
286470
286475
  }
286471
286476
  if (!isJsonObject(json)) {
@@ -286501,12 +286506,12 @@ async function processJwksResponse(response) {
286501
286506
  throw OPE('"response" is not a conform JSON Web Key Set response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
286502
286507
  }
286503
286508
  assertReadableResponse(response);
286504
- assertContentTypes(response, 'application/json', 'application/jwk-set+json');
286505
286509
  let json;
286506
286510
  try {
286507
286511
  json = await response.json();
286508
286512
  }
286509
286513
  catch (cause) {
286514
+ assertContentTypes(response, 'application/json', 'application/jwk-set+json');
286510
286515
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
286511
286516
  }
286512
286517
  if (!isJsonObject(json)) {
@@ -286520,21 +286525,7 @@ async function processJwksResponse(response) {
286520
286525
  }
286521
286526
  return json;
286522
286527
  }
286523
- async function handleOAuthBodyError(response) {
286524
- if (response.status > 399 && response.status < 500) {
286525
- assertReadableResponse(response);
286526
- assertApplicationJson(response);
286527
- try {
286528
- const json = await response.clone().json();
286529
- if (isJsonObject(json) && typeof json.error === 'string' && json.error.length) {
286530
- return json;
286531
- }
286532
- }
286533
- catch { }
286534
- }
286535
- return undefined;
286536
- }
286537
- function build_supported(alg) {
286528
+ function supported(alg) {
286538
286529
  switch (alg) {
286539
286530
  case 'PS256':
286540
286531
  case 'ES256':
@@ -286553,7 +286544,7 @@ function build_supported(alg) {
286553
286544
  }
286554
286545
  }
286555
286546
  function checkSupportedJwsAlg(header) {
286556
- if (!build_supported(header.alg)) {
286547
+ if (!supported(header.alg)) {
286557
286548
  throw new UnsupportedOperationError('unsupported JWS "alg" identifier', {
286558
286549
  cause: { alg: header.alg },
286559
286550
  });
@@ -286639,7 +286630,7 @@ async function validateJwt(jws, checkAlg, clockSkew, clockTolerance, decryptJwt)
286639
286630
  }
286640
286631
  let header;
286641
286632
  try {
286642
- header = JSON.parse(buf(b64u(protectedHeader)));
286633
+ header = JSON.parse(buf(build_b64u(protectedHeader)));
286643
286634
  }
286644
286635
  catch (cause) {
286645
286636
  throw OPE('failed to parse JWT Header body as base64url encoded JSON', PARSE_ERROR, cause);
@@ -286655,7 +286646,7 @@ async function validateJwt(jws, checkAlg, clockSkew, clockTolerance, decryptJwt)
286655
286646
  }
286656
286647
  let claims;
286657
286648
  try {
286658
- claims = JSON.parse(buf(b64u(payload)));
286649
+ claims = JSON.parse(buf(build_b64u(payload)));
286659
286650
  }
286660
286651
  catch (cause) {
286661
286652
  throw OPE('failed to parse JWT Payload body as base64url encoded JSON', PARSE_ERROR, cause);
@@ -286720,7 +286711,7 @@ async function validateJwtAuthResponse(as, client, parameters, expectedState, op
286720
286711
  .then(validateIssuer.bind(undefined, as))
286721
286712
  .then(validateAudience.bind(undefined, client.client_id));
286722
286713
  const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwt.split('.');
286723
- const signature = b64u(encodedSignature);
286714
+ const signature = build_b64u(encodedSignature);
286724
286715
  const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
286725
286716
  await validateJwsSignature(protectedHeader, payload, key, signature);
286726
286717
  const result = new URLSearchParams();
@@ -286755,7 +286746,7 @@ async function idTokenHash(data, header, claimName) {
286755
286746
  throw new UnsupportedOperationError(`unsupported JWS algorithm for ${claimName} calculation`, { cause: { alg: header.alg } });
286756
286747
  }
286757
286748
  const digest = await crypto.subtle.digest(algorithm, buf(data));
286758
- return b64u(digest.slice(0, digest.byteLength / 2));
286749
+ return build_b64u(digest.slice(0, digest.byteLength / 2));
286759
286750
  }
286760
286751
  async function idTokenHashMatches(data, actual, header, claimName) {
286761
286752
  const expected = await idTokenHash(data, header, claimName);
@@ -286886,7 +286877,7 @@ async function validateHybridResponse(as, client, parameters, expectedNonce, exp
286886
286877
  }
286887
286878
  }
286888
286879
  const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwt.split('.');
286889
- const signature = b64u(encodedSignature);
286880
+ const signature = build_b64u(encodedSignature);
286890
286881
  const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
286891
286882
  await validateJwsSignature(protectedHeader, payload, key, signature);
286892
286883
  if ((await idTokenHashMatches(code, claims.c_hash, header, 'c_hash')) !== true) {
@@ -287057,28 +287048,15 @@ async function processDeviceAuthorizationResponse(as, client, response) {
287057
287048
  if (!looseInstanceOf(response, Response)) {
287058
287049
  throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
287059
287050
  }
287060
- let challenges;
287061
- if ((challenges = parseWwwAuthenticateChallenges(response))) {
287062
- throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
287063
- }
287064
- if (response.status !== 200) {
287065
- let err;
287066
- if ((err = await handleOAuthBodyError(response))) {
287067
- await response.body?.cancel();
287068
- throw new ResponseBodyError('server responded with an error in the response body', {
287069
- cause: err,
287070
- response,
287071
- });
287072
- }
287073
- throw OPE('"response" is not a conform Device Authorization Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
287074
- }
287051
+ checkAuthenticationChallenges(response);
287052
+ await checkOAuthBodyError(response, 200, 'Device Authorization Endpoint');
287075
287053
  assertReadableResponse(response);
287076
- assertApplicationJson(response);
287077
287054
  let json;
287078
287055
  try {
287079
287056
  json = await response.json();
287080
287057
  }
287081
287058
  catch (cause) {
287059
+ assertApplicationJson(response);
287082
287060
  throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
287083
287061
  }
287084
287062
  if (!isJsonObject(json)) {
@@ -287149,7 +287127,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
287149
287127
  throw OPE('operation indicated DPoP use but the JWT Access Token has no jkt confirmation claim', INVALID_REQUEST, { claims: accessTokenClaims });
287150
287128
  }
287151
287129
  const clockSkew = getClockSkew(options);
287152
- const proof = await validateJwt(headerValue, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, build_supported), clockSkew, getClockTolerance(options), undefined)
287130
+ const proof = await validateJwt(headerValue, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, supported), clockSkew, getClockTolerance(options), undefined)
287153
287131
  .then(checkJwtType.bind(undefined, 'dpop+jwt'))
287154
287132
  .then(validatePresence.bind(undefined, ['iat', 'jti', 'ath', 'htm', 'htu']));
287155
287133
  const now = epochTime() + clockSkew;
@@ -287177,7 +287155,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
287177
287155
  });
287178
287156
  }
287179
287157
  {
287180
- const expected = b64u(await crypto.subtle.digest('SHA-256', buf(accessToken)));
287158
+ const expected = build_b64u(await crypto.subtle.digest('SHA-256', buf(accessToken)));
287181
287159
  if (proof.claims.ath !== expected) {
287182
287160
  throw OPE('DPoP Proof ath mismatch', JWT_CLAIM_COMPARISON, {
287183
287161
  expected,
@@ -287214,7 +287192,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
287214
287192
  default:
287215
287193
  throw new UnsupportedOperationError('unsupported JWK key type', { cause: proof.header.jwk });
287216
287194
  }
287217
- const expected = b64u(await crypto.subtle.digest('SHA-256', buf(JSON.stringify(components))));
287195
+ const expected = build_b64u(await crypto.subtle.digest('SHA-256', buf(JSON.stringify(components))));
287218
287196
  if (accessTokenClaims.cnf.jkt !== expected) {
287219
287197
  throw OPE('JWT Access Token confirmation mismatch', JWT_CLAIM_COMPARISON, {
287220
287198
  expected,
@@ -287224,7 +287202,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
287224
287202
  }
287225
287203
  }
287226
287204
  const { 0: protectedHeader, 1: payload, 2: encodedSignature } = headerValue.split('.');
287227
- const signature = b64u(encodedSignature);
287205
+ const signature = build_b64u(encodedSignature);
287228
287206
  const { jwk, alg } = proof.header;
287229
287207
  if (!jwk) {
287230
287208
  throw OPE('DPoP Proof is missing the jwk header parameter', INVALID_REQUEST, {
@@ -287279,7 +287257,7 @@ async function validateJwtAccessToken(as, request, expectedAudience, options) {
287279
287257
  if (options?.requireDPoP || scheme === 'dpop' || request.headers.has('dpop')) {
287280
287258
  requiredClaims.push('cnf');
287281
287259
  }
287282
- const { claims, header } = await validateJwt(accessToken, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, build_supported), getClockSkew(options), getClockTolerance(options), undefined)
287260
+ const { claims, header } = await validateJwt(accessToken, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, supported), getClockSkew(options), getClockTolerance(options), undefined)
287283
287261
  .then(checkJwtType.bind(undefined, 'at+jwt'))
287284
287262
  .then(validatePresence.bind(undefined, requiredClaims))
287285
287263
  .then(validateIssuer.bind(undefined, as))
@@ -287309,7 +287287,7 @@ async function validateJwtAccessToken(as, request, expectedAudience, options) {
287309
287287
  }
287310
287288
  }
287311
287289
  const { 0: protectedHeader, 1: payload, 2: encodedSignature } = accessToken.split('.');
287312
- const signature = b64u(encodedSignature);
287290
+ const signature = build_b64u(encodedSignature);
287313
287291
  const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
287314
287292
  await validateJwsSignature(protectedHeader, payload, key, signature);
287315
287293
  if (options?.requireDPoP ||
@@ -287326,25 +287304,71 @@ function reassignRSCode(err) {
287326
287304
  }
287327
287305
  throw err;
287328
287306
  }
287307
+ async function backchannelAuthenticationRequest(as, client, clientAuthentication, parameters, options) {
287308
+ assertAs(as);
287309
+ assertClient(client);
287310
+ const url = resolveEndpoint(as, 'backchannel_authentication_endpoint', client.use_mtls_endpoint_aliases, options?.[allowInsecureRequests] !== true);
287311
+ const body = new URLSearchParams(parameters);
287312
+ body.set('client_id', client.client_id);
287313
+ const headers = prepareHeaders(options?.headers);
287314
+ headers.set('accept', 'application/json');
287315
+ return authenticatedRequest(as, client, clientAuthentication, url, body, headers, options);
287316
+ }
287317
+ async function processBackchannelAuthenticationResponse(as, client, response) {
287318
+ assertAs(as);
287319
+ assertClient(client);
287320
+ if (!looseInstanceOf(response, Response)) {
287321
+ throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
287322
+ }
287323
+ checkAuthenticationChallenges(response);
287324
+ await checkOAuthBodyError(response, 200, 'Backchannel Authentication Endpoint');
287325
+ assertReadableResponse(response);
287326
+ let json;
287327
+ try {
287328
+ json = await response.json();
287329
+ }
287330
+ catch (cause) {
287331
+ assertApplicationJson(response);
287332
+ throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
287333
+ }
287334
+ if (!isJsonObject(json)) {
287335
+ throw OPE('"response" body must be a top level object', INVALID_RESPONSE, { body: json });
287336
+ }
287337
+ assertString(json.auth_req_id, '"response" body "auth_req_id" property', INVALID_RESPONSE, {
287338
+ body: json,
287339
+ });
287340
+ let expiresIn = typeof json.expires_in !== 'number' ? parseFloat(json.expires_in) : json.expires_in;
287341
+ assertNumber(expiresIn, false, '"response" body "expires_in" property', INVALID_RESPONSE, {
287342
+ body: json,
287343
+ });
287344
+ json.expires_in = expiresIn;
287345
+ if (json.interval !== undefined) {
287346
+ assertNumber(json.interval, false, '"response" body "interval" property', INVALID_RESPONSE, {
287347
+ body: json,
287348
+ });
287349
+ }
287350
+ return json;
287351
+ }
287352
+ async function backchannelAuthenticationGrantRequest(as, client, clientAuthentication, authReqId, options) {
287353
+ assertAs(as);
287354
+ assertClient(client);
287355
+ assertString(authReqId, '"authReqId"');
287356
+ const parameters = new URLSearchParams(options?.additionalParameters);
287357
+ parameters.set('auth_req_id', authReqId);
287358
+ return tokenEndpointRequest(as, client, clientAuthentication, 'urn:openid:params:grant-type:ciba', parameters, options);
287359
+ }
287360
+ async function processBackchannelAuthenticationGrantResponse(as, client, response, options) {
287361
+ return processGenericAccessTokenResponse(as, client, response, undefined, options);
287362
+ }
287329
287363
  const _nopkce = Symbol();
287330
287364
  const _nodiscoverycheck = Symbol();
287331
287365
  const _expectedIssuer = Symbol();
287332
287366
  //# sourceMappingURL=index.js.map
287333
- // EXTERNAL MODULE: external "node:buffer"
287334
- var external_node_buffer_ = __nccwpck_require__(72254);
287335
- // EXTERNAL MODULE: external "node:crypto"
287336
- var external_node_crypto_ = __nccwpck_require__(6005);
287337
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/digest.js
287338
-
287339
- const digest = (algorithm, data) => (0,external_node_crypto_.createHash)(algorithm).update(data).digest();
287340
- /* harmony default export */ const runtime_digest = (digest);
287341
-
287342
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/buffer_utils.js
287343
-
287367
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/buffer_utils.js
287344
287368
  const buffer_utils_encoder = new TextEncoder();
287345
287369
  const buffer_utils_decoder = new TextDecoder();
287346
287370
  const MAX_INT32 = 2 ** 32;
287347
- function buffer_utils_concat(...buffers) {
287371
+ function concat(...buffers) {
287348
287372
  const size = buffers.reduce((acc, { length }) => acc + length, 0);
287349
287373
  const buf = new Uint8Array(size);
287350
287374
  let i = 0;
@@ -287354,9 +287378,6 @@ function buffer_utils_concat(...buffers) {
287354
287378
  }
287355
287379
  return buf;
287356
287380
  }
287357
- function buffer_utils_p2s(alg, p2sInput) {
287358
- return buffer_utils_concat(buffer_utils_encoder.encode(alg), new Uint8Array([0]), p2sInput);
287359
- }
287360
287381
  function writeUInt32BE(buf, value, offset) {
287361
287382
  if (value < 0 || value >= MAX_INT32) {
287362
287383
  throw new RangeError(`value must be >= 0 and <= ${MAX_INT32 - 1}. Received ${value}`);
@@ -287376,39 +287397,64 @@ function uint32be(value) {
287376
287397
  writeUInt32BE(buf, value);
287377
287398
  return buf;
287378
287399
  }
287379
- function lengthAndInput(input) {
287380
- return buffer_utils_concat(uint32be(input.length), input);
287400
+
287401
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/base64.js
287402
+ function base64_encodeBase64(input) {
287403
+ if (Uint8Array.prototype.toBase64) {
287404
+ return input.toBase64();
287405
+ }
287406
+ const CHUNK_SIZE = 0x8000;
287407
+ const arr = [];
287408
+ for (let i = 0; i < input.length; i += CHUNK_SIZE) {
287409
+ arr.push(String.fromCharCode.apply(null, input.subarray(i, i + CHUNK_SIZE)));
287410
+ }
287411
+ return btoa(arr.join(''));
287381
287412
  }
287382
- async function concatKdf(secret, bits, value) {
287383
- const iterations = Math.ceil((bits >> 3) / 32);
287384
- const res = new Uint8Array(iterations * 32);
287385
- for (let iter = 0; iter < iterations; iter++) {
287386
- const buf = new Uint8Array(4 + secret.length + value.length);
287387
- buf.set(uint32be(iter + 1));
287388
- buf.set(secret, 4);
287389
- buf.set(value, 4 + secret.length);
287390
- res.set(await runtime_digest('sha256', buf), iter * 32);
287413
+ function decodeBase64(encoded) {
287414
+ if (Uint8Array.fromBase64) {
287415
+ return Uint8Array.fromBase64(encoded);
287391
287416
  }
287392
- return res.slice(0, bits >> 3);
287417
+ const binary = atob(encoded);
287418
+ const bytes = new Uint8Array(binary.length);
287419
+ for (let i = 0; i < binary.length; i++) {
287420
+ bytes[i] = binary.charCodeAt(i);
287421
+ }
287422
+ return bytes;
287393
287423
  }
287394
287424
 
287395
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/base64url.js
287425
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/util/base64url.js
287396
287426
 
287397
287427
 
287398
- function normalize(input) {
287428
+ function decode(input) {
287429
+ if (Uint8Array.fromBase64) {
287430
+ return Uint8Array.fromBase64(typeof input === 'string' ? input : buffer_utils_decoder.decode(input), {
287431
+ alphabet: 'base64url',
287432
+ });
287433
+ }
287399
287434
  let encoded = input;
287400
287435
  if (encoded instanceof Uint8Array) {
287401
287436
  encoded = buffer_utils_decoder.decode(encoded);
287402
287437
  }
287403
- return encoded;
287438
+ encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\s/g, '');
287439
+ try {
287440
+ return decodeBase64(encoded);
287441
+ }
287442
+ catch {
287443
+ throw new TypeError('The input to be decoded is not correctly encoded.');
287444
+ }
287445
+ }
287446
+ function encode(input) {
287447
+ let unencoded = input;
287448
+ if (typeof unencoded === 'string') {
287449
+ unencoded = encoder.encode(unencoded);
287450
+ }
287451
+ if (Uint8Array.prototype.toBase64) {
287452
+ return unencoded.toBase64({ alphabet: 'base64url', omitPadding: true });
287453
+ }
287454
+ return encodeBase64(unencoded).replace(/=/g, '').replace(/\+/g, '-').replace(/\//g, '_');
287404
287455
  }
287405
- const encode = (input) => Buffer.from(input).toString('base64url');
287406
- const decodeBase64 = (input) => new Uint8Array(Buffer.from(input, 'base64'));
287407
- const encodeBase64 = (input) => Buffer.from(input).toString('base64');
287408
-
287409
- const decode = (input) => new Uint8Array(external_node_buffer_.Buffer.from(normalize(input), 'base64url'));
287410
287456
 
287411
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/util/errors.js
287457
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/util/errors.js
287412
287458
  class JOSEError extends Error {
287413
287459
  static code = 'ERR_JOSE_GENERIC';
287414
287460
  code = 'ERR_JOSE_GENERIC';
@@ -287448,7 +287494,7 @@ class JOSEAlgNotAllowed extends JOSEError {
287448
287494
  static code = 'ERR_JOSE_ALG_NOT_ALLOWED';
287449
287495
  code = 'ERR_JOSE_ALG_NOT_ALLOWED';
287450
287496
  }
287451
- class errors_JOSENotSupported extends JOSEError {
287497
+ class JOSENotSupported extends JOSEError {
287452
287498
  static code = 'ERR_JOSE_NOT_SUPPORTED';
287453
287499
  code = 'ERR_JOSE_NOT_SUPPORTED';
287454
287500
  }
@@ -287509,8 +287555,7 @@ class JWSSignatureVerificationFailed extends (/* unused pure expression or super
287509
287555
  }
287510
287556
  }
287511
287557
 
287512
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/iv.js
287513
-
287558
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/iv.js
287514
287559
 
287515
287560
  function bitLength(alg) {
287516
287561
  switch (alg) {
@@ -287526,87 +287571,30 @@ function bitLength(alg) {
287526
287571
  case 'A256CBC-HS512':
287527
287572
  return 128;
287528
287573
  default:
287529
- throw new errors_JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
287574
+ throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
287530
287575
  }
287531
287576
  }
287532
- /* harmony default export */ const iv = ((alg) => random(new Uint8Array(bitLength(alg) >> 3)));
287577
+ /* harmony default export */ const iv = ((alg) => crypto.getRandomValues(new Uint8Array(bitLength(alg) >> 3)));
287533
287578
 
287534
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/check_iv_length.js
287579
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_iv_length.js
287535
287580
 
287536
287581
 
287537
- const checkIvLength = (enc, iv) => {
287582
+ /* harmony default export */ const check_iv_length = ((enc, iv) => {
287538
287583
  if (iv.length << 3 !== bitLength(enc)) {
287539
287584
  throw new JWEInvalid('Invalid Initialization Vector length');
287540
287585
  }
287541
- };
287542
- /* harmony default export */ const check_iv_length = (checkIvLength);
287543
-
287544
- ;// CONCATENATED MODULE: external "node:util"
287545
- const external_node_util_namespaceObject = require("node:util");
287546
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/is_key_object.js
287547
-
287548
- /* harmony default export */ const is_key_object = ((obj) => external_node_util_namespaceObject.types.isKeyObject(obj));
287549
-
287550
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/check_cek_length.js
287586
+ });
287551
287587
 
287588
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_cek_length.js
287552
287589
 
287553
- const checkCekLength = (enc, cek) => {
287554
- let expected;
287555
- switch (enc) {
287556
- case 'A128CBC-HS256':
287557
- case 'A192CBC-HS384':
287558
- case 'A256CBC-HS512':
287559
- expected = parseInt(enc.slice(-3), 10);
287560
- break;
287561
- case 'A128GCM':
287562
- case 'A192GCM':
287563
- case 'A256GCM':
287564
- expected = parseInt(enc.slice(1, 4), 10);
287565
- break;
287566
- default:
287567
- throw new errors_JOSENotSupported(`Content Encryption Algorithm ${enc} is not supported either by JOSE or your javascript runtime`);
287568
- }
287569
- if (cek instanceof Uint8Array) {
287570
- const actual = cek.byteLength << 3;
287571
- if (actual !== expected) {
287572
- throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
287573
- }
287574
- return;
287575
- }
287576
- if (is_key_object(cek) && cek.type === 'secret') {
287577
- const actual = cek.symmetricKeySize << 3;
287578
- if (actual !== expected) {
287579
- throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
287580
- }
287581
- return;
287590
+ /* harmony default export */ const check_cek_length = ((cek, expected) => {
287591
+ const actual = cek.byteLength << 3;
287592
+ if (actual !== expected) {
287593
+ throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
287582
287594
  }
287583
- throw new TypeError('Invalid Content Encryption Key type');
287584
- };
287585
- /* harmony default export */ const check_cek_length = (checkCekLength);
287586
-
287587
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/timing_safe_equal.js
287588
-
287589
- const timingSafeEqual = external_node_crypto_.timingSafeEqual;
287590
- /* harmony default export */ const timing_safe_equal = (timingSafeEqual);
287591
-
287592
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/cbc_tag.js
287593
-
287594
-
287595
- function cbcTag(aad, iv, ciphertext, macSize, macKey, keySize) {
287596
- const macData = buffer_utils_concat(aad, iv, ciphertext, uint64be(aad.length << 3));
287597
- const hmac = (0,external_node_crypto_.createHmac)(`sha${macSize}`, macKey);
287598
- hmac.update(macData);
287599
- return hmac.digest().slice(0, keySize >> 3);
287600
- }
287601
-
287602
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/webcrypto.js
287603
-
287604
-
287605
- const webcrypto = external_node_crypto_.webcrypto;
287606
- /* harmony default export */ const runtime_webcrypto = (webcrypto);
287607
- const webcrypto_isCryptoKey = (key) => external_node_util_namespaceObject.types.isCryptoKey(key);
287595
+ });
287608
287596
 
287609
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/crypto_key.js
287597
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/crypto_key.js
287610
287598
  function unusable(name, prop = 'algorithm.name') {
287611
287599
  return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
287612
287600
  }
@@ -287616,7 +287604,7 @@ function isAlgorithm(algorithm, name) {
287616
287604
  function getHashLength(hash) {
287617
287605
  return parseInt(hash.name.slice(4), 10);
287618
287606
  }
287619
- function crypto_key_getNamedCurve(alg) {
287607
+ function getNamedCurve(alg) {
287620
287608
  switch (alg) {
287621
287609
  case 'ES256':
287622
287610
  return 'P-256';
@@ -287628,23 +287616,12 @@ function crypto_key_getNamedCurve(alg) {
287628
287616
  throw new Error('unreachable');
287629
287617
  }
287630
287618
  }
287631
- function checkUsage(key, usages) {
287632
- if (usages.length && !usages.some((expected) => key.usages.includes(expected))) {
287633
- let msg = 'CryptoKey does not support this operation, its usages must include ';
287634
- if (usages.length > 2) {
287635
- const last = usages.pop();
287636
- msg += `one of ${usages.join(', ')}, or ${last}.`;
287637
- }
287638
- else if (usages.length === 2) {
287639
- msg += `one of ${usages[0]} or ${usages[1]}.`;
287640
- }
287641
- else {
287642
- msg += `${usages[0]}.`;
287643
- }
287644
- throw new TypeError(msg);
287619
+ function checkUsage(key, usage) {
287620
+ if (usage && !key.usages.includes(usage)) {
287621
+ throw new TypeError(`CryptoKey does not support this operation, its usages must include ${usage}.`);
287645
287622
  }
287646
287623
  }
287647
- function checkSigCryptoKey(key, alg, ...usages) {
287624
+ function checkSigCryptoKey(key, alg, usage) {
287648
287625
  switch (alg) {
287649
287626
  case 'HS256':
287650
287627
  case 'HS384':
@@ -287679,10 +287656,10 @@ function checkSigCryptoKey(key, alg, ...usages) {
287679
287656
  throw unusable(`SHA-${expected}`, 'algorithm.hash');
287680
287657
  break;
287681
287658
  }
287659
+ case 'Ed25519':
287682
287660
  case 'EdDSA': {
287683
- if (key.algorithm.name !== 'Ed25519' && key.algorithm.name !== 'Ed448') {
287684
- throw unusable('Ed25519 or Ed448');
287685
- }
287661
+ if (!isAlgorithm(key.algorithm, 'Ed25519'))
287662
+ throw unusable('Ed25519');
287686
287663
  break;
287687
287664
  }
287688
287665
  case 'ES256':
@@ -287690,7 +287667,7 @@ function checkSigCryptoKey(key, alg, ...usages) {
287690
287667
  case 'ES512': {
287691
287668
  if (!isAlgorithm(key.algorithm, 'ECDSA'))
287692
287669
  throw unusable('ECDSA');
287693
- const expected = crypto_key_getNamedCurve(alg);
287670
+ const expected = getNamedCurve(alg);
287694
287671
  const actual = key.algorithm.namedCurve;
287695
287672
  if (actual !== expected)
287696
287673
  throw unusable(expected, 'algorithm.namedCurve');
@@ -287699,9 +287676,9 @@ function checkSigCryptoKey(key, alg, ...usages) {
287699
287676
  default:
287700
287677
  throw new TypeError('CryptoKey does not support this operation');
287701
287678
  }
287702
- checkUsage(key, usages);
287679
+ checkUsage(key, usage);
287703
287680
  }
287704
- function checkEncCryptoKey(key, alg, ...usages) {
287681
+ function crypto_key_checkEncCryptoKey(key, alg, usage) {
287705
287682
  switch (alg) {
287706
287683
  case 'A128GCM':
287707
287684
  case 'A192GCM':
@@ -287729,10 +287706,9 @@ function checkEncCryptoKey(key, alg, ...usages) {
287729
287706
  switch (key.algorithm.name) {
287730
287707
  case 'ECDH':
287731
287708
  case 'X25519':
287732
- case 'X448':
287733
287709
  break;
287734
287710
  default:
287735
- throw unusable('ECDH, X25519, or X448');
287711
+ throw unusable('ECDH or X25519');
287736
287712
  }
287737
287713
  break;
287738
287714
  }
@@ -287757,10 +287733,10 @@ function checkEncCryptoKey(key, alg, ...usages) {
287757
287733
  default:
287758
287734
  throw new TypeError('CryptoKey does not support this operation');
287759
287735
  }
287760
- checkUsage(key, usages);
287736
+ checkUsage(key, usage);
287761
287737
  }
287762
287738
 
287763
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/invalid_key_input.js
287739
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/invalid_key_input.js
287764
287740
  function message(msg, actual, ...types) {
287765
287741
  types = types.filter(Boolean);
287766
287742
  if (types.length > 2) {
@@ -287793,31 +287769,23 @@ function withAlg(alg, actual, ...types) {
287793
287769
  return message(`Key for the ${alg} algorithm must be `, actual, ...types);
287794
287770
  }
287795
287771
 
287796
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/ciphers.js
287797
-
287798
- let ciphers;
287799
- /* harmony default export */ const runtime_ciphers = ((algorithm) => {
287800
- ciphers ||= new Set((0,external_node_crypto_.getCiphers)());
287801
- return ciphers.has(algorithm);
287802
- });
287803
-
287804
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/is_key_like.js
287805
-
287806
-
287807
- /* harmony default export */ const is_key_like = ((key) => is_key_object(key) || webcrypto_isCryptoKey(key));
287808
- const is_key_like_types = ['KeyObject'];
287809
- if (globalThis.CryptoKey || runtime_webcrypto?.CryptoKey) {
287810
- is_key_like_types.push('CryptoKey');
287772
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_key_like.js
287773
+ function is_key_like_assertCryptoKey(key) {
287774
+ if (!isCryptoKey(key)) {
287775
+ throw new Error('CryptoKey instance expected');
287776
+ }
287811
287777
  }
287778
+ function isCryptoKey(key) {
287779
+ return key?.[Symbol.toStringTag] === 'CryptoKey';
287780
+ }
287781
+ function isKeyObject(key) {
287782
+ return key?.[Symbol.toStringTag] === 'KeyObject';
287783
+ }
287784
+ /* harmony default export */ const is_key_like = ((key) => {
287785
+ return isCryptoKey(key) || isKeyObject(key);
287786
+ });
287812
287787
 
287813
-
287814
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/decrypt.js
287815
-
287816
-
287817
-
287818
-
287819
-
287820
-
287788
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/decrypt.js
287821
287789
 
287822
287790
 
287823
287791
 
@@ -287825,22 +287793,39 @@ if (globalThis.CryptoKey || runtime_webcrypto?.CryptoKey) {
287825
287793
 
287826
287794
 
287827
287795
 
287828
- function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
287829
- const keySize = parseInt(enc.slice(1, 4), 10);
287830
- if (is_key_object(cek)) {
287831
- cek = cek.export();
287796
+ async function timingSafeEqual(a, b) {
287797
+ if (!(a instanceof Uint8Array)) {
287798
+ throw new TypeError('First argument must be a buffer');
287799
+ }
287800
+ if (!(b instanceof Uint8Array)) {
287801
+ throw new TypeError('Second argument must be a buffer');
287802
+ }
287803
+ const algorithm = { name: 'HMAC', hash: 'SHA-256' };
287804
+ const key = (await crypto.subtle.generateKey(algorithm, false, ['sign']));
287805
+ const aHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, a));
287806
+ const bHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, b));
287807
+ let out = 0;
287808
+ let i = -1;
287809
+ while (++i < 32) {
287810
+ out |= aHmac[i] ^ bHmac[i];
287832
287811
  }
287833
- const encKey = cek.subarray(keySize >> 3);
287834
- const macKey = cek.subarray(0, keySize >> 3);
287835
- const macSize = parseInt(enc.slice(-3), 10);
287836
- const algorithm = `aes-${keySize}-cbc`;
287837
- if (!runtime_ciphers(algorithm)) {
287838
- throw new errors_JOSENotSupported(`alg ${enc} is not supported by your javascript runtime`);
287812
+ return out === 0;
287813
+ }
287814
+ async function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
287815
+ if (!(cek instanceof Uint8Array)) {
287816
+ throw new TypeError(invalid_key_input(cek, 'Uint8Array'));
287839
287817
  }
287840
- const expectedTag = cbcTag(aad, iv, ciphertext, macSize, macKey, keySize);
287818
+ const keySize = parseInt(enc.slice(1, 4), 10);
287819
+ const encKey = await crypto.subtle.importKey('raw', cek.subarray(keySize >> 3), 'AES-CBC', false, ['decrypt']);
287820
+ const macKey = await crypto.subtle.importKey('raw', cek.subarray(0, keySize >> 3), {
287821
+ hash: `SHA-${keySize << 1}`,
287822
+ name: 'HMAC',
287823
+ }, false, ['sign']);
287824
+ const macData = concat(aad, iv, ciphertext, uint64be(aad.length << 3));
287825
+ const expectedTag = new Uint8Array((await crypto.subtle.sign('HMAC', macKey, macData)).slice(0, keySize >> 3));
287841
287826
  let macCheckPassed;
287842
287827
  try {
287843
- macCheckPassed = timing_safe_equal(tag, expectedTag);
287828
+ macCheckPassed = await timingSafeEqual(tag, expectedTag);
287844
287829
  }
287845
287830
  catch {
287846
287831
  }
@@ -287849,8 +287834,7 @@ function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
287849
287834
  }
287850
287835
  let plaintext;
287851
287836
  try {
287852
- const decipher = (0,external_node_crypto_.createDecipheriv)(algorithm, encKey, iv);
287853
- plaintext = buffer_utils_concat(decipher.update(ciphertext), decipher.final());
287837
+ plaintext = new Uint8Array(await crypto.subtle.decrypt({ iv, name: 'AES-CBC' }, encKey, ciphertext));
287854
287838
  }
287855
287839
  catch {
287856
287840
  }
@@ -287859,37 +287843,30 @@ function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
287859
287843
  }
287860
287844
  return plaintext;
287861
287845
  }
287862
- function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {
287863
- const keySize = parseInt(enc.slice(1, 4), 10);
287864
- const algorithm = `aes-${keySize}-gcm`;
287865
- if (!runtime_ciphers(algorithm)) {
287866
- throw new errors_JOSENotSupported(`alg ${enc} is not supported by your javascript runtime`);
287846
+ async function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {
287847
+ let encKey;
287848
+ if (cek instanceof Uint8Array) {
287849
+ encKey = await crypto.subtle.importKey('raw', cek, 'AES-GCM', false, ['decrypt']);
287850
+ }
287851
+ else {
287852
+ crypto_key_checkEncCryptoKey(cek, enc, 'decrypt');
287853
+ encKey = cek;
287867
287854
  }
287868
287855
  try {
287869
- const decipher = (0,external_node_crypto_.createDecipheriv)(algorithm, cek, iv, { authTagLength: 16 });
287870
- decipher.setAuthTag(tag);
287871
- if (aad.byteLength) {
287872
- decipher.setAAD(aad, { plaintextLength: ciphertext.length });
287873
- }
287874
- const plaintext = decipher.update(ciphertext);
287875
- decipher.final();
287876
- return plaintext;
287856
+ return new Uint8Array(await crypto.subtle.decrypt({
287857
+ additionalData: aad,
287858
+ iv,
287859
+ name: 'AES-GCM',
287860
+ tagLength: 128,
287861
+ }, encKey, concat(ciphertext, tag)));
287877
287862
  }
287878
287863
  catch {
287879
287864
  throw new JWEDecryptionFailed();
287880
287865
  }
287881
287866
  }
287882
- const decrypt = (enc, cek, ciphertext, iv, tag, aad) => {
287883
- let key;
287884
- if (webcrypto_isCryptoKey(cek)) {
287885
- checkEncCryptoKey(cek, enc, 'decrypt');
287886
- key = external_node_crypto_.KeyObject.from(cek);
287887
- }
287888
- else if (cek instanceof Uint8Array || is_key_object(cek)) {
287889
- key = cek;
287890
- }
287891
- else {
287892
- throw new TypeError(invalid_key_input(cek, ...is_key_like_types, 'Uint8Array'));
287867
+ /* harmony default export */ const decrypt = (async (enc, cek, ciphertext, iv, tag, aad) => {
287868
+ if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {
287869
+ throw new TypeError(invalid_key_input(cek, 'CryptoKey', 'KeyObject', 'Uint8Array', 'JSON Web Key'));
287893
287870
  }
287894
287871
  if (!iv) {
287895
287872
  throw new JWEInvalid('JWE Initialization Vector missing');
@@ -287897,25 +287874,27 @@ const decrypt = (enc, cek, ciphertext, iv, tag, aad) => {
287897
287874
  if (!tag) {
287898
287875
  throw new JWEInvalid('JWE Authentication Tag missing');
287899
287876
  }
287900
- check_cek_length(enc, key);
287901
287877
  check_iv_length(enc, iv);
287902
287878
  switch (enc) {
287903
287879
  case 'A128CBC-HS256':
287904
287880
  case 'A192CBC-HS384':
287905
287881
  case 'A256CBC-HS512':
287906
- return cbcDecrypt(enc, key, ciphertext, iv, tag, aad);
287882
+ if (cek instanceof Uint8Array)
287883
+ check_cek_length(cek, parseInt(enc.slice(-3), 10));
287884
+ return cbcDecrypt(enc, cek, ciphertext, iv, tag, aad);
287907
287885
  case 'A128GCM':
287908
287886
  case 'A192GCM':
287909
287887
  case 'A256GCM':
287910
- return gcmDecrypt(enc, key, ciphertext, iv, tag, aad);
287888
+ if (cek instanceof Uint8Array)
287889
+ check_cek_length(cek, parseInt(enc.slice(1, 4), 10));
287890
+ return gcmDecrypt(enc, cek, ciphertext, iv, tag, aad);
287911
287891
  default:
287912
- throw new errors_JOSENotSupported('Unsupported JWE Content Encryption Algorithm');
287892
+ throw new JOSENotSupported('Unsupported JWE Content Encryption Algorithm');
287913
287893
  }
287914
- };
287915
- /* harmony default export */ const runtime_decrypt = (decrypt);
287894
+ });
287916
287895
 
287917
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/is_disjoint.js
287918
- const isDisjoint = (...headers) => {
287896
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_disjoint.js
287897
+ /* harmony default export */ const is_disjoint = ((...headers) => {
287919
287898
  const sources = headers.filter(Boolean);
287920
287899
  if (sources.length === 0 || sources.length === 1) {
287921
287900
  return true;
@@ -287935,14 +287914,13 @@ const isDisjoint = (...headers) => {
287935
287914
  }
287936
287915
  }
287937
287916
  return true;
287938
- };
287939
- /* harmony default export */ const is_disjoint = (isDisjoint);
287917
+ });
287940
287918
 
287941
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/is_object.js
287919
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_object.js
287942
287920
  function isObjectLike(value) {
287943
287921
  return typeof value === 'object' && value !== null;
287944
287922
  }
287945
- function isObject(input) {
287923
+ /* harmony default export */ const is_object = ((input) => {
287946
287924
  if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {
287947
287925
  return false;
287948
287926
  }
@@ -287954,345 +287932,165 @@ function isObject(input) {
287954
287932
  proto = Object.getPrototypeOf(proto);
287955
287933
  }
287956
287934
  return Object.getPrototypeOf(input) === proto;
287957
- }
287958
-
287959
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/aeskw.js
287960
-
287961
-
287962
-
287963
-
287964
-
287965
-
287966
-
287967
-
287935
+ });
287968
287936
 
287937
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/aeskw.js
287969
287938
 
287970
287939
  function checkKeySize(key, alg) {
287971
- if (key.symmetricKeySize << 3 !== parseInt(alg.slice(1, 4), 10)) {
287940
+ if (key.algorithm.length !== parseInt(alg.slice(1, 4), 10)) {
287972
287941
  throw new TypeError(`Invalid key size for alg: ${alg}`);
287973
287942
  }
287974
287943
  }
287975
- function ensureKeyObject(key, alg, usage) {
287976
- if (is_key_object(key)) {
287977
- return key;
287978
- }
287944
+ function getCryptoKey(key, alg, usage) {
287979
287945
  if (key instanceof Uint8Array) {
287980
- return (0,external_node_crypto_.createSecretKey)(key);
287981
- }
287982
- if (webcrypto_isCryptoKey(key)) {
287983
- checkEncCryptoKey(key, alg, usage);
287984
- return external_node_crypto_.KeyObject.from(key);
287985
- }
287986
- throw new TypeError(invalid_key_input(key, ...is_key_like_types, 'Uint8Array'));
287987
- }
287988
- const aeskw_wrap = (alg, key, cek) => {
287989
- const size = parseInt(alg.slice(1, 4), 10);
287990
- const algorithm = `aes${size}-wrap`;
287991
- if (!supported(algorithm)) {
287992
- throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
287946
+ return crypto.subtle.importKey('raw', key, 'AES-KW', true, [usage]);
287993
287947
  }
287994
- const keyObject = ensureKeyObject(key, alg, 'wrapKey');
287995
- checkKeySize(keyObject, alg);
287996
- const cipher = createCipheriv(algorithm, keyObject, Buffer.alloc(8, 0xa6));
287997
- return concat(cipher.update(cek), cipher.final());
287998
- };
287999
- const unwrap = (alg, key, encryptedKey) => {
288000
- const size = parseInt(alg.slice(1, 4), 10);
288001
- const algorithm = `aes${size}-wrap`;
288002
- if (!runtime_ciphers(algorithm)) {
288003
- throw new errors_JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
288004
- }
288005
- const keyObject = ensureKeyObject(key, alg, 'unwrapKey');
288006
- checkKeySize(keyObject, alg);
288007
- const cipher = (0,external_node_crypto_.createDecipheriv)(algorithm, keyObject, external_node_buffer_.Buffer.alloc(8, 0xa6));
288008
- return buffer_utils_concat(cipher.update(encryptedKey), cipher.final());
288009
- };
288010
-
288011
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/is_jwk.js
288012
-
288013
- function isJWK(key) {
288014
- return isObject(key) && typeof key.kty === 'string';
288015
- }
288016
- function isPrivateJWK(key) {
288017
- return key.kty !== 'oct' && typeof key.d === 'string';
287948
+ crypto_key_checkEncCryptoKey(key, alg, usage);
287949
+ return key;
288018
287950
  }
288019
- function isPublicJWK(key) {
288020
- return key.kty !== 'oct' && typeof key.d === 'undefined';
287951
+ async function wrap(alg, key, cek) {
287952
+ const cryptoKey = await getCryptoKey(key, alg, 'wrapKey');
287953
+ checkKeySize(cryptoKey, alg);
287954
+ const cryptoKeyCek = await crypto.subtle.importKey('raw', cek, { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);
287955
+ return new Uint8Array(await crypto.subtle.wrapKey('raw', cryptoKeyCek, cryptoKey, 'AES-KW'));
288021
287956
  }
288022
- function isSecretJWK(key) {
288023
- return isJWK(key) && key.kty === 'oct' && typeof key.k === 'string';
287957
+ async function unwrap(alg, key, encryptedKey) {
287958
+ const cryptoKey = await getCryptoKey(key, alg, 'unwrapKey');
287959
+ checkKeySize(cryptoKey, alg);
287960
+ const cryptoKeyCek = await crypto.subtle.unwrapKey('raw', encryptedKey, cryptoKey, 'AES-KW', { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);
287961
+ return new Uint8Array(await crypto.subtle.exportKey('raw', cryptoKeyCek));
288024
287962
  }
288025
287963
 
288026
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/get_named_curve.js
288027
-
288028
-
288029
-
288030
-
288031
-
288032
-
288033
-
288034
- const weakMap = new WeakMap();
288035
- const namedCurveToJOSE = (namedCurve) => {
288036
- switch (namedCurve) {
288037
- case 'prime256v1':
288038
- return 'P-256';
288039
- case 'secp384r1':
288040
- return 'P-384';
288041
- case 'secp521r1':
288042
- return 'P-521';
288043
- case 'secp256k1':
288044
- return 'secp256k1';
288045
- default:
288046
- throw new errors_JOSENotSupported('Unsupported key curve for this operation');
288047
- }
288048
- };
288049
- const get_named_curve_getNamedCurve = (kee, raw) => {
288050
- let key;
288051
- if (webcrypto_isCryptoKey(kee)) {
288052
- key = external_node_crypto_.KeyObject.from(kee);
288053
- }
288054
- else if (is_key_object(kee)) {
288055
- key = kee;
288056
- }
288057
- else if (isJWK(kee)) {
288058
- return kee.crv;
288059
- }
288060
- else {
288061
- throw new TypeError(invalid_key_input(kee, ...is_key_like_types));
288062
- }
288063
- if (key.type === 'secret') {
288064
- throw new TypeError('only "private" or "public" type keys can be used for this operation');
288065
- }
288066
- switch (key.asymmetricKeyType) {
288067
- case 'ed25519':
288068
- case 'ed448':
288069
- return `Ed${key.asymmetricKeyType.slice(2)}`;
288070
- case 'x25519':
288071
- case 'x448':
288072
- return `X${key.asymmetricKeyType.slice(1)}`;
288073
- case 'ec': {
288074
- const namedCurve = key.asymmetricKeyDetails.namedCurve;
288075
- if (raw) {
288076
- return namedCurve;
288077
- }
288078
- return namedCurveToJOSE(namedCurve);
288079
- }
288080
- default:
288081
- throw new TypeError('Invalid asymmetric key type for this operation');
288082
- }
288083
- };
288084
- /* harmony default export */ const get_named_curve = (get_named_curve_getNamedCurve);
288085
-
288086
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/ecdhes.js
288087
-
288088
-
288089
-
288090
-
288091
-
288092
-
287964
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/digest.js
287965
+ /* harmony default export */ const digest = (async (algorithm, data) => {
287966
+ const subtleDigest = `SHA-${algorithm.slice(-3)}`;
287967
+ return new Uint8Array(await crypto.subtle.digest(subtleDigest, data));
287968
+ });
288093
287969
 
287970
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/ecdhes.js
288094
287971
 
288095
287972
 
288096
287973
 
288097
- const ecdhes_generateKeyPair = (0,external_node_util_namespaceObject.promisify)(external_node_crypto_.generateKeyPair);
288098
- async function deriveKey(publicKee, privateKee, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) {
288099
- let publicKey;
288100
- if (webcrypto_isCryptoKey(publicKee)) {
288101
- checkEncCryptoKey(publicKee, 'ECDH');
288102
- publicKey = external_node_crypto_.KeyObject.from(publicKee);
288103
- }
288104
- else if (is_key_object(publicKee)) {
288105
- publicKey = publicKee;
288106
- }
288107
- else {
288108
- throw new TypeError(invalid_key_input(publicKee, ...is_key_like_types));
288109
- }
288110
- let privateKey;
288111
- if (webcrypto_isCryptoKey(privateKee)) {
288112
- checkEncCryptoKey(privateKee, 'ECDH', 'deriveBits');
288113
- privateKey = external_node_crypto_.KeyObject.from(privateKee);
287974
+ function lengthAndInput(input) {
287975
+ return concat(uint32be(input.length), input);
287976
+ }
287977
+ async function concatKdf(secret, bits, value) {
287978
+ const iterations = Math.ceil((bits >> 3) / 32);
287979
+ const res = new Uint8Array(iterations * 32);
287980
+ for (let iter = 0; iter < iterations; iter++) {
287981
+ const buf = new Uint8Array(4 + secret.length + value.length);
287982
+ buf.set(uint32be(iter + 1));
287983
+ buf.set(secret, 4);
287984
+ buf.set(value, 4 + secret.length);
287985
+ res.set(await digest('sha256', buf), iter * 32);
288114
287986
  }
288115
- else if (is_key_object(privateKee)) {
288116
- privateKey = privateKee;
287987
+ return res.slice(0, bits >> 3);
287988
+ }
287989
+ async function deriveKey(publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) {
287990
+ crypto_key_checkEncCryptoKey(publicKey, 'ECDH');
287991
+ crypto_key_checkEncCryptoKey(privateKey, 'ECDH', 'deriveBits');
287992
+ const value = concat(lengthAndInput(buffer_utils_encoder.encode(algorithm)), lengthAndInput(apu), lengthAndInput(apv), uint32be(keyLength));
287993
+ let length;
287994
+ if (publicKey.algorithm.name === 'X25519') {
287995
+ length = 256;
288117
287996
  }
288118
287997
  else {
288119
- throw new TypeError(invalid_key_input(privateKee, ...is_key_like_types));
287998
+ length =
287999
+ Math.ceil(parseInt(publicKey.algorithm.namedCurve.slice(-3), 10) / 8) << 3;
288120
288000
  }
288121
- const value = buffer_utils_concat(lengthAndInput(buffer_utils_encoder.encode(algorithm)), lengthAndInput(apu), lengthAndInput(apv), uint32be(keyLength));
288122
- const sharedSecret = (0,external_node_crypto_.diffieHellman)({ privateKey, publicKey });
288001
+ const sharedSecret = new Uint8Array(await crypto.subtle.deriveBits({
288002
+ name: publicKey.algorithm.name,
288003
+ public: publicKey,
288004
+ }, privateKey, length));
288123
288005
  return concatKdf(sharedSecret, keyLength, value);
288124
288006
  }
288125
- async function generateEpk(kee) {
288126
- let key;
288127
- if (isCryptoKey(kee)) {
288128
- key = KeyObject.from(kee);
288129
- }
288130
- else if (isKeyObject(kee)) {
288131
- key = kee;
288132
- }
288133
- else {
288134
- throw new TypeError(invalidKeyInput(kee, ...types));
288135
- }
288136
- switch (key.asymmetricKeyType) {
288137
- case 'x25519':
288138
- return ecdhes_generateKeyPair('x25519');
288139
- case 'x448': {
288140
- return ecdhes_generateKeyPair('x448');
288141
- }
288142
- case 'ec': {
288143
- const namedCurve = getNamedCurve(key);
288144
- return ecdhes_generateKeyPair('ec', { namedCurve });
288145
- }
288007
+ function allowed(key) {
288008
+ switch (key.algorithm.namedCurve) {
288009
+ case 'P-256':
288010
+ case 'P-384':
288011
+ case 'P-521':
288012
+ return true;
288146
288013
  default:
288147
- throw new JOSENotSupported('Invalid or unsupported EPK');
288014
+ return key.algorithm.name === 'X25519';
288148
288015
  }
288149
288016
  }
288150
- const ecdhAllowed = (key) => ['P-256', 'P-384', 'P-521', 'X25519', 'X448'].includes(get_named_curve(key));
288151
-
288152
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/check_p2s.js
288153
-
288154
- function check_p2s_checkP2s(p2s) {
288155
- if (!(p2s instanceof Uint8Array) || p2s.length < 8) {
288156
- throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');
288157
- }
288158
- }
288159
-
288160
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/pbes2kw.js
288161
-
288162
288017
 
288018
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/pbes2kw.js
288163
288019
 
288164
288020
 
288165
288021
 
288166
288022
 
288167
288023
 
288168
-
288169
-
288170
-
288171
-
288172
-
288173
- const pbkdf2 = (0,external_node_util_namespaceObject.promisify)(external_node_crypto_.pbkdf2);
288174
- function getPassword(key, alg) {
288175
- if (is_key_object(key)) {
288176
- return key.export();
288177
- }
288024
+ function pbes2kw_getCryptoKey(key, alg) {
288178
288025
  if (key instanceof Uint8Array) {
288179
- return key;
288026
+ return crypto.subtle.importKey('raw', key, 'PBKDF2', false, ['deriveBits']);
288180
288027
  }
288181
- if (webcrypto_isCryptoKey(key)) {
288182
- checkEncCryptoKey(key, alg, 'deriveBits', 'deriveKey');
288183
- return external_node_crypto_.KeyObject.from(key).export();
288184
- }
288185
- throw new TypeError(invalid_key_input(key, ...is_key_like_types, 'Uint8Array'));
288028
+ crypto_key_checkEncCryptoKey(key, alg, 'deriveBits');
288029
+ return key;
288186
288030
  }
288187
- const pbes2kw_encrypt = async (alg, key, cek, p2c = 2048, p2s = random(new Uint8Array(16))) => {
288188
- checkP2s(p2s);
288031
+ const concatSalt = (alg, p2sInput) => concat(buffer_utils_encoder.encode(alg), new Uint8Array([0]), p2sInput);
288032
+ async function pbes2kw_deriveKey(p2s, alg, p2c, key) {
288033
+ if (!(p2s instanceof Uint8Array) || p2s.length < 8) {
288034
+ throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');
288035
+ }
288189
288036
  const salt = concatSalt(alg, p2s);
288190
- const keylen = parseInt(alg.slice(13, 16), 10) >> 3;
288191
- const password = getPassword(key, alg);
288192
- const derivedKey = await pbkdf2(password, salt, p2c, keylen, `sha${alg.slice(8, 11)}`);
288193
- const encryptedKey = await wrap(alg.slice(-6), derivedKey, cek);
288194
- return { encryptedKey, p2c, p2s: base64url(p2s) };
288195
- };
288196
- const pbes2kw_decrypt = async (alg, key, encryptedKey, p2c, p2s) => {
288197
- check_p2s_checkP2s(p2s);
288198
- const salt = buffer_utils_p2s(alg, p2s);
288199
- const keylen = parseInt(alg.slice(13, 16), 10) >> 3;
288200
- const password = getPassword(key, alg);
288201
- const derivedKey = await pbkdf2(password, salt, p2c, keylen, `sha${alg.slice(8, 11)}`);
288202
- return unwrap(alg.slice(-6), derivedKey, encryptedKey);
288203
- };
288204
-
288205
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/check_key_length.js
288037
+ const keylen = parseInt(alg.slice(13, 16), 10);
288038
+ const subtleAlg = {
288039
+ hash: `SHA-${alg.slice(8, 11)}`,
288040
+ iterations: p2c,
288041
+ name: 'PBKDF2',
288042
+ salt,
288043
+ };
288044
+ const cryptoKey = await pbes2kw_getCryptoKey(key, alg);
288045
+ return new Uint8Array(await crypto.subtle.deriveBits(subtleAlg, cryptoKey, keylen));
288046
+ }
288047
+ async function pbes2kw_wrap(alg, key, cek, p2c = 2048, p2s = crypto.getRandomValues(new Uint8Array(16))) {
288048
+ const derived = await pbes2kw_deriveKey(p2s, alg, p2c, key);
288049
+ const encryptedKey = await aeskw.wrap(alg.slice(-6), derived, cek);
288050
+ return { encryptedKey, p2c, p2s: b64u(p2s) };
288051
+ }
288052
+ async function pbes2kw_unwrap(alg, key, encryptedKey, p2c, p2s) {
288053
+ const derived = await pbes2kw_deriveKey(p2s, alg, p2c, key);
288054
+ return unwrap(alg.slice(-6), derived, encryptedKey);
288055
+ }
288206
288056
 
288207
- /* harmony default export */ const check_key_length = ((key, alg) => {
288208
- let modulusLength;
288209
- try {
288210
- if (key instanceof external_node_crypto_.KeyObject) {
288211
- modulusLength = key.asymmetricKeyDetails?.modulusLength;
288057
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_key_length.js
288058
+ /* harmony default export */ const check_key_length = ((alg, key) => {
288059
+ if (alg.startsWith('RS') || alg.startsWith('PS')) {
288060
+ const { modulusLength } = key.algorithm;
288061
+ if (typeof modulusLength !== 'number' || modulusLength < 2048) {
288062
+ throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
288212
288063
  }
288213
- else {
288214
- modulusLength = Buffer.from(key.n, 'base64url').byteLength << 3;
288215
- }
288216
- }
288217
- catch { }
288218
- if (typeof modulusLength !== 'number' || modulusLength < 2048) {
288219
- throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
288220
288064
  }
288221
288065
  });
288222
288066
 
288223
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/rsaes.js
288224
-
288225
-
288226
-
288227
-
288228
-
288067
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/rsaes.js
288229
288068
 
288230
288069
 
288231
288070
 
288232
- const checkKey = (key, alg) => {
288233
- if (key.asymmetricKeyType !== 'rsa') {
288234
- throw new TypeError('Invalid key for this operation, its asymmetricKeyType must be rsa');
288235
- }
288236
- check_key_length(key, alg);
288237
- };
288238
- const RSA1_5 = (0,external_node_util_namespaceObject.deprecate)(() => external_node_crypto_.constants.RSA_PKCS1_PADDING, 'The RSA1_5 "alg" (JWE Algorithm) is deprecated and will be removed in the next major revision.');
288239
- const resolvePadding = (alg) => {
288240
- switch (alg) {
288241
- case 'RSA-OAEP':
288242
- case 'RSA-OAEP-256':
288243
- case 'RSA-OAEP-384':
288244
- case 'RSA-OAEP-512':
288245
- return external_node_crypto_.constants.RSA_PKCS1_OAEP_PADDING;
288246
- case 'RSA1_5':
288247
- return RSA1_5();
288248
- default:
288249
- return undefined;
288250
- }
288251
- };
288252
- const resolveOaepHash = (alg) => {
288071
+ const subtleAlgorithm = (alg) => {
288253
288072
  switch (alg) {
288254
288073
  case 'RSA-OAEP':
288255
- return 'sha1';
288256
288074
  case 'RSA-OAEP-256':
288257
- return 'sha256';
288258
288075
  case 'RSA-OAEP-384':
288259
- return 'sha384';
288260
288076
  case 'RSA-OAEP-512':
288261
- return 'sha512';
288077
+ return 'RSA-OAEP';
288262
288078
  default:
288263
- return undefined;
288079
+ throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
288264
288080
  }
288265
288081
  };
288266
- function rsaes_ensureKeyObject(key, alg, ...usages) {
288267
- if (is_key_object(key)) {
288268
- return key;
288269
- }
288270
- if (webcrypto_isCryptoKey(key)) {
288271
- checkEncCryptoKey(key, alg, ...usages);
288272
- return external_node_crypto_.KeyObject.from(key);
288273
- }
288274
- throw new TypeError(invalid_key_input(key, ...is_key_like_types));
288082
+ async function rsaes_encrypt(alg, key, cek) {
288083
+ checkEncCryptoKey(key, alg, 'encrypt');
288084
+ checkKeyLength(alg, key);
288085
+ return new Uint8Array(await crypto.subtle.encrypt(subtleAlgorithm(alg), key, cek));
288086
+ }
288087
+ async function rsaes_decrypt(alg, key, encryptedKey) {
288088
+ crypto_key_checkEncCryptoKey(key, alg, 'decrypt');
288089
+ check_key_length(alg, key);
288090
+ return new Uint8Array(await crypto.subtle.decrypt(subtleAlgorithm(alg), key, encryptedKey));
288275
288091
  }
288276
- const rsaes_encrypt = (alg, key, cek) => {
288277
- const padding = resolvePadding(alg);
288278
- const oaepHash = resolveOaepHash(alg);
288279
- const keyObject = rsaes_ensureKeyObject(key, alg, 'wrapKey', 'encrypt');
288280
- checkKey(keyObject, alg);
288281
- return publicEncrypt({ key: keyObject, oaepHash, padding }, cek);
288282
- };
288283
- const rsaes_decrypt = (alg, key, encryptedKey) => {
288284
- const padding = resolvePadding(alg);
288285
- const oaepHash = resolveOaepHash(alg);
288286
- const keyObject = rsaes_ensureKeyObject(key, alg, 'unwrapKey', 'decrypt');
288287
- checkKey(keyObject, alg);
288288
- return (0,external_node_crypto_.privateDecrypt)({ key: keyObject, oaepHash, padding }, encryptedKey);
288289
- };
288290
-
288291
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/normalize_key.js
288292
- /* harmony default export */ const normalize_key = ({});
288293
-
288294
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/cek.js
288295
288092
 
288093
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/cek.js
288296
288094
 
288297
288095
  function cek_bitLength(alg) {
288298
288096
  switch (alg) {
@@ -288308,22 +288106,108 @@ function cek_bitLength(alg) {
288308
288106
  case 'A256CBC-HS512':
288309
288107
  return 512;
288310
288108
  default:
288311
- throw new errors_JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
288109
+ throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
288312
288110
  }
288313
288111
  }
288314
- /* harmony default export */ const lib_cek = ((alg) => (0,external_node_crypto_.randomFillSync)(new Uint8Array(cek_bitLength(alg) >> 3)));
288112
+ /* harmony default export */ const lib_cek = ((alg) => crypto.getRandomValues(new Uint8Array(cek_bitLength(alg) >> 3)));
288315
288113
 
288316
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/jwk_to_key.js
288114
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/jwk_to_key.js
288317
288115
 
288318
- const parse = (key) => {
288319
- if (key.d) {
288320
- return (0,external_node_crypto_.createPrivateKey)({ format: 'jwk', key });
288116
+ function subtleMapping(jwk) {
288117
+ let algorithm;
288118
+ let keyUsages;
288119
+ switch (jwk.kty) {
288120
+ case 'RSA': {
288121
+ switch (jwk.alg) {
288122
+ case 'PS256':
288123
+ case 'PS384':
288124
+ case 'PS512':
288125
+ algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };
288126
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
288127
+ break;
288128
+ case 'RS256':
288129
+ case 'RS384':
288130
+ case 'RS512':
288131
+ algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };
288132
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
288133
+ break;
288134
+ case 'RSA-OAEP':
288135
+ case 'RSA-OAEP-256':
288136
+ case 'RSA-OAEP-384':
288137
+ case 'RSA-OAEP-512':
288138
+ algorithm = {
288139
+ name: 'RSA-OAEP',
288140
+ hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,
288141
+ };
288142
+ keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];
288143
+ break;
288144
+ default:
288145
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
288146
+ }
288147
+ break;
288148
+ }
288149
+ case 'EC': {
288150
+ switch (jwk.alg) {
288151
+ case 'ES256':
288152
+ algorithm = { name: 'ECDSA', namedCurve: 'P-256' };
288153
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
288154
+ break;
288155
+ case 'ES384':
288156
+ algorithm = { name: 'ECDSA', namedCurve: 'P-384' };
288157
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
288158
+ break;
288159
+ case 'ES512':
288160
+ algorithm = { name: 'ECDSA', namedCurve: 'P-521' };
288161
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
288162
+ break;
288163
+ case 'ECDH-ES':
288164
+ case 'ECDH-ES+A128KW':
288165
+ case 'ECDH-ES+A192KW':
288166
+ case 'ECDH-ES+A256KW':
288167
+ algorithm = { name: 'ECDH', namedCurve: jwk.crv };
288168
+ keyUsages = jwk.d ? ['deriveBits'] : [];
288169
+ break;
288170
+ default:
288171
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
288172
+ }
288173
+ break;
288174
+ }
288175
+ case 'OKP': {
288176
+ switch (jwk.alg) {
288177
+ case 'Ed25519':
288178
+ case 'EdDSA':
288179
+ algorithm = { name: 'Ed25519' };
288180
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
288181
+ break;
288182
+ case 'ECDH-ES':
288183
+ case 'ECDH-ES+A128KW':
288184
+ case 'ECDH-ES+A192KW':
288185
+ case 'ECDH-ES+A256KW':
288186
+ algorithm = { name: jwk.crv };
288187
+ keyUsages = jwk.d ? ['deriveBits'] : [];
288188
+ break;
288189
+ default:
288190
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
288191
+ }
288192
+ break;
288193
+ }
288194
+ default:
288195
+ throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
288321
288196
  }
288322
- return (0,external_node_crypto_.createPublicKey)({ format: 'jwk', key });
288323
- };
288324
- /* harmony default export */ const jwk_to_key = (parse);
288197
+ return { algorithm, keyUsages };
288198
+ }
288199
+ /* harmony default export */ const jwk_to_key = (async (jwk) => {
288200
+ if (!jwk.alg) {
288201
+ throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
288202
+ }
288203
+ const { algorithm, keyUsages } = subtleMapping(jwk);
288204
+ const keyData = { ...jwk };
288205
+ delete keyData.alg;
288206
+ delete keyData.use;
288207
+ return crypto.subtle.importKey('jwk', keyData, algorithm, jwk.ext ?? (jwk.d ? false : true), jwk.key_ops ?? keyUsages);
288208
+ });
288325
288209
 
288326
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/key/import.js
288210
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/key/import.js
288327
288211
 
288328
288212
 
288329
288213
 
@@ -288347,11 +288231,13 @@ async function importPKCS8(pkcs8, alg, options) {
288347
288231
  }
288348
288232
  return fromPKCS8(pkcs8, alg, options);
288349
288233
  }
288350
- async function importJWK(jwk, alg) {
288351
- if (!isObject(jwk)) {
288234
+ async function importJWK(jwk, alg, options) {
288235
+ if (!is_object(jwk)) {
288352
288236
  throw new TypeError('JWK must be an object');
288353
288237
  }
288354
- alg ||= jwk.alg;
288238
+ let ext;
288239
+ alg ??= jwk.alg;
288240
+ ext ??= options?.extractable ?? jwk.ext;
288355
288241
  switch (jwk.kty) {
288356
288242
  case 'oct':
288357
288243
  if (typeof jwk.k !== 'string' || !jwk.k) {
@@ -288359,97 +288245,18 @@ async function importJWK(jwk, alg) {
288359
288245
  }
288360
288246
  return decode(jwk.k);
288361
288247
  case 'RSA':
288362
- if (jwk.oth !== undefined) {
288363
- throw new errors_JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
288248
+ if ('oth' in jwk && jwk.oth !== undefined) {
288249
+ throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
288364
288250
  }
288365
288251
  case 'EC':
288366
288252
  case 'OKP':
288367
- return jwk_to_key({ ...jwk, alg });
288253
+ return jwk_to_key({ ...jwk, alg, ext });
288368
288254
  default:
288369
- throw new errors_JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
288255
+ throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
288370
288256
  }
288371
288257
  }
288372
288258
 
288373
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/check_key_type.js
288374
-
288375
-
288376
-
288377
- const tag = (key) => key?.[Symbol.toStringTag];
288378
- const jwkMatchesOp = (alg, key, usage) => {
288379
- if (key.use !== undefined && key.use !== 'sig') {
288380
- throw new TypeError('Invalid key for this operation, when present its use must be sig');
288381
- }
288382
- if (key.key_ops !== undefined && key.key_ops.includes?.(usage) !== true) {
288383
- throw new TypeError(`Invalid key for this operation, when present its key_ops must include ${usage}`);
288384
- }
288385
- if (key.alg !== undefined && key.alg !== alg) {
288386
- throw new TypeError(`Invalid key for this operation, when present its alg must be ${alg}`);
288387
- }
288388
- return true;
288389
- };
288390
- const symmetricTypeCheck = (alg, key, usage, allowJwk) => {
288391
- if (key instanceof Uint8Array)
288392
- return;
288393
- if (allowJwk && isJWK(key)) {
288394
- if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
288395
- return;
288396
- throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
288397
- }
288398
- if (!is_key_like(key)) {
288399
- throw new TypeError(withAlg(alg, key, ...is_key_like_types, 'Uint8Array', allowJwk ? 'JSON Web Key' : null));
288400
- }
288401
- if (key.type !== 'secret') {
288402
- throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
288403
- }
288404
- };
288405
- const asymmetricTypeCheck = (alg, key, usage, allowJwk) => {
288406
- if (allowJwk && isJWK(key)) {
288407
- switch (usage) {
288408
- case 'sign':
288409
- if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
288410
- return;
288411
- throw new TypeError(`JSON Web Key for this operation be a private JWK`);
288412
- case 'verify':
288413
- if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
288414
- return;
288415
- throw new TypeError(`JSON Web Key for this operation be a public JWK`);
288416
- }
288417
- }
288418
- if (!is_key_like(key)) {
288419
- throw new TypeError(withAlg(alg, key, ...is_key_like_types, allowJwk ? 'JSON Web Key' : null));
288420
- }
288421
- if (key.type === 'secret') {
288422
- throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
288423
- }
288424
- if (usage === 'sign' && key.type === 'public') {
288425
- throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
288426
- }
288427
- if (usage === 'decrypt' && key.type === 'public') {
288428
- throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
288429
- }
288430
- if (key.algorithm && usage === 'verify' && key.type === 'private') {
288431
- throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
288432
- }
288433
- if (key.algorithm && usage === 'encrypt' && key.type === 'private') {
288434
- throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
288435
- }
288436
- };
288437
- function checkKeyType(allowJwk, alg, key, usage) {
288438
- const symmetric = alg.startsWith('HS') ||
288439
- alg === 'dir' ||
288440
- alg.startsWith('PBES2') ||
288441
- /^A\d{3}(?:GCM)?KW$/.test(alg);
288442
- if (symmetric) {
288443
- symmetricTypeCheck(alg, key, usage, allowJwk);
288444
- }
288445
- else {
288446
- asymmetricTypeCheck(alg, key, usage, allowJwk);
288447
- }
288448
- }
288449
- /* harmony default export */ const check_key_type = (checkKeyType.bind(undefined, false));
288450
- const checkKeyTypeWithJwk = checkKeyType.bind(undefined, true);
288451
-
288452
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/aesgcmkw.js
288259
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/aesgcmkw.js
288453
288260
 
288454
288261
 
288455
288262
 
@@ -288458,17 +288265,16 @@ async function aesgcmkw_wrap(alg, key, cek, iv) {
288458
288265
  const wrapped = await encrypt(jweAlgorithm, cek, key, iv, new Uint8Array(0));
288459
288266
  return {
288460
288267
  encryptedKey: wrapped.ciphertext,
288461
- iv: base64url(wrapped.iv),
288462
- tag: base64url(wrapped.tag),
288268
+ iv: b64u(wrapped.iv),
288269
+ tag: b64u(wrapped.tag),
288463
288270
  };
288464
288271
  }
288465
288272
  async function aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag) {
288466
288273
  const jweAlgorithm = alg.slice(0, 7);
288467
- return runtime_decrypt(jweAlgorithm, key, encryptedKey, iv, tag, new Uint8Array(0));
288274
+ return decrypt(jweAlgorithm, key, encryptedKey, iv, tag, new Uint8Array(0));
288468
288275
  }
288469
288276
 
288470
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/decrypt_key_management.js
288471
-
288277
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/decrypt_key_management.js
288472
288278
 
288473
288279
 
288474
288280
 
@@ -288480,9 +288286,7 @@ async function aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag) {
288480
288286
 
288481
288287
 
288482
288288
 
288483
- async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options) {
288484
- check_key_type(alg, key, 'decrypt');
288485
- key = (await normalize_key.normalizePrivateKey?.(key, alg)) || key;
288289
+ /* harmony default export */ const decrypt_key_management = (async (alg, key, encryptedKey, joseHeader, options) => {
288486
288290
  switch (alg) {
288487
288291
  case 'dir': {
288488
288292
  if (encryptedKey !== undefined)
@@ -288495,11 +288299,13 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
288495
288299
  case 'ECDH-ES+A128KW':
288496
288300
  case 'ECDH-ES+A192KW':
288497
288301
  case 'ECDH-ES+A256KW': {
288498
- if (!isObject(joseHeader.epk))
288302
+ if (!is_object(joseHeader.epk))
288499
288303
  throw new JWEInvalid(`JOSE Header "epk" (Ephemeral Public Key) missing or invalid`);
288500
- if (!ecdhAllowed(key))
288501
- throw new errors_JOSENotSupported('ECDH with the provided key is not allowed or not supported by your javascript runtime');
288304
+ is_key_like_assertCryptoKey(key);
288305
+ if (!allowed(key))
288306
+ throw new JOSENotSupported('ECDH with the provided key is not allowed or not supported by your javascript runtime');
288502
288307
  const epk = await importJWK(joseHeader.epk, alg);
288308
+ is_key_like_assertCryptoKey(epk);
288503
288309
  let partyUInfo;
288504
288310
  let partyVInfo;
288505
288311
  if (joseHeader.apu !== undefined) {
@@ -288529,13 +288335,13 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
288529
288335
  throw new JWEInvalid('JWE Encrypted Key missing');
288530
288336
  return unwrap(alg.slice(-6), sharedSecret, encryptedKey);
288531
288337
  }
288532
- case 'RSA1_5':
288533
288338
  case 'RSA-OAEP':
288534
288339
  case 'RSA-OAEP-256':
288535
288340
  case 'RSA-OAEP-384':
288536
288341
  case 'RSA-OAEP-512': {
288537
288342
  if (encryptedKey === undefined)
288538
288343
  throw new JWEInvalid('JWE Encrypted Key missing');
288344
+ is_key_like_assertCryptoKey(key);
288539
288345
  return rsaes_decrypt(alg, key, encryptedKey);
288540
288346
  }
288541
288347
  case 'PBES2-HS256+A128KW':
@@ -288557,7 +288363,7 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
288557
288363
  catch {
288558
288364
  throw new JWEInvalid('Failed to base64url decode the p2s');
288559
288365
  }
288560
- return pbes2kw_decrypt(alg, key, encryptedKey, joseHeader.p2c, p2s);
288366
+ return pbes2kw_unwrap(alg, key, encryptedKey, joseHeader.p2c, p2s);
288561
288367
  }
288562
288368
  case 'A128KW':
288563
288369
  case 'A192KW':
@@ -288592,15 +288398,14 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
288592
288398
  return aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag);
288593
288399
  }
288594
288400
  default: {
288595
- throw new errors_JOSENotSupported('Invalid or unsupported "alg" (JWE Algorithm) header value');
288401
+ throw new JOSENotSupported('Invalid or unsupported "alg" (JWE Algorithm) header value');
288596
288402
  }
288597
288403
  }
288598
- }
288599
- /* harmony default export */ const decrypt_key_management = (decryptKeyManagement);
288404
+ });
288600
288405
 
288601
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/validate_crit.js
288406
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/validate_crit.js
288602
288407
 
288603
- function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
288408
+ /* harmony default export */ const validate_crit = ((Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) => {
288604
288409
  if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {
288605
288410
  throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
288606
288411
  }
@@ -288621,7 +288426,7 @@ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader,
288621
288426
  }
288622
288427
  for (const parameter of protectedHeader.crit) {
288623
288428
  if (!recognized.has(parameter)) {
288624
- throw new errors_JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
288429
+ throw new JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
288625
288430
  }
288626
288431
  if (joseHeader[parameter] === undefined) {
288627
288432
  throw new Err(`Extension Header Parameter "${parameter}" is missing`);
@@ -288631,11 +288436,10 @@ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader,
288631
288436
  }
288632
288437
  }
288633
288438
  return new Set(protectedHeader.crit);
288634
- }
288635
- /* harmony default export */ const validate_crit = (validateCrit);
288439
+ });
288636
288440
 
288637
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/validate_algorithms.js
288638
- const validateAlgorithms = (option, algorithms) => {
288441
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/validate_algorithms.js
288442
+ /* harmony default export */ const validate_algorithms = ((option, algorithms) => {
288639
288443
  if (algorithms !== undefined &&
288640
288444
  (!Array.isArray(algorithms) || algorithms.some((s) => typeof s !== 'string'))) {
288641
288445
  throw new TypeError(`"${option}" option must be an array of strings`);
@@ -288644,10 +288448,320 @@ const validateAlgorithms = (option, algorithms) => {
288644
288448
  return undefined;
288645
288449
  }
288646
288450
  return new Set(algorithms);
288451
+ });
288452
+
288453
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_jwk.js
288454
+
288455
+ function isJWK(key) {
288456
+ return is_object(key) && typeof key.kty === 'string';
288457
+ }
288458
+ function isPrivateJWK(key) {
288459
+ return key.kty !== 'oct' && typeof key.d === 'string';
288460
+ }
288461
+ function isPublicJWK(key) {
288462
+ return key.kty !== 'oct' && typeof key.d === 'undefined';
288463
+ }
288464
+ function isSecretJWK(key) {
288465
+ return key.kty === 'oct' && typeof key.k === 'string';
288466
+ }
288467
+
288468
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/normalize_key.js
288469
+
288470
+
288471
+
288472
+
288473
+ let cache;
288474
+ const handleJWK = async (key, jwk, alg, freeze = false) => {
288475
+ cache ||= new WeakMap();
288476
+ let cached = cache.get(key);
288477
+ if (cached?.[alg]) {
288478
+ return cached[alg];
288479
+ }
288480
+ const cryptoKey = await jwk_to_key({ ...jwk, alg });
288481
+ if (freeze)
288482
+ Object.freeze(key);
288483
+ if (!cached) {
288484
+ cache.set(key, { [alg]: cryptoKey });
288485
+ }
288486
+ else {
288487
+ cached[alg] = cryptoKey;
288488
+ }
288489
+ return cryptoKey;
288490
+ };
288491
+ const handleKeyObject = (keyObject, alg) => {
288492
+ cache ||= new WeakMap();
288493
+ let cached = cache.get(keyObject);
288494
+ if (cached?.[alg]) {
288495
+ return cached[alg];
288496
+ }
288497
+ const isPublic = keyObject.type === 'public';
288498
+ const extractable = isPublic ? true : false;
288499
+ let cryptoKey;
288500
+ if (keyObject.asymmetricKeyType === 'x25519') {
288501
+ switch (alg) {
288502
+ case 'ECDH-ES':
288503
+ case 'ECDH-ES+A128KW':
288504
+ case 'ECDH-ES+A192KW':
288505
+ case 'ECDH-ES+A256KW':
288506
+ break;
288507
+ default:
288508
+ throw new TypeError('given KeyObject instance cannot be used for this algorithm');
288509
+ }
288510
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : ['deriveBits']);
288511
+ }
288512
+ if (keyObject.asymmetricKeyType === 'ed25519') {
288513
+ if (alg !== 'EdDSA' && alg !== 'Ed25519') {
288514
+ throw new TypeError('given KeyObject instance cannot be used for this algorithm');
288515
+ }
288516
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [
288517
+ isPublic ? 'verify' : 'sign',
288518
+ ]);
288519
+ }
288520
+ if (keyObject.asymmetricKeyType === 'rsa') {
288521
+ let hash;
288522
+ switch (alg) {
288523
+ case 'RSA-OAEP':
288524
+ hash = 'SHA-1';
288525
+ break;
288526
+ case 'RS256':
288527
+ case 'PS256':
288528
+ case 'RSA-OAEP-256':
288529
+ hash = 'SHA-256';
288530
+ break;
288531
+ case 'RS384':
288532
+ case 'PS384':
288533
+ case 'RSA-OAEP-384':
288534
+ hash = 'SHA-384';
288535
+ break;
288536
+ case 'RS512':
288537
+ case 'PS512':
288538
+ case 'RSA-OAEP-512':
288539
+ hash = 'SHA-512';
288540
+ break;
288541
+ default:
288542
+ throw new TypeError('given KeyObject instance cannot be used for this algorithm');
288543
+ }
288544
+ if (alg.startsWith('RSA-OAEP')) {
288545
+ return keyObject.toCryptoKey({
288546
+ name: 'RSA-OAEP',
288547
+ hash,
288548
+ }, extractable, isPublic ? ['encrypt'] : ['decrypt']);
288549
+ }
288550
+ cryptoKey = keyObject.toCryptoKey({
288551
+ name: alg.startsWith('PS') ? 'RSA-PSS' : 'RSASSA-PKCS1-v1_5',
288552
+ hash,
288553
+ }, extractable, [isPublic ? 'verify' : 'sign']);
288554
+ }
288555
+ if (keyObject.asymmetricKeyType === 'ec') {
288556
+ const nist = new Map([
288557
+ ['prime256v1', 'P-256'],
288558
+ ['secp384r1', 'P-384'],
288559
+ ['secp521r1', 'P-521'],
288560
+ ]);
288561
+ const namedCurve = nist.get(keyObject.asymmetricKeyDetails?.namedCurve);
288562
+ if (!namedCurve) {
288563
+ throw new TypeError('given KeyObject instance cannot be used for this algorithm');
288564
+ }
288565
+ if (alg === 'ES256' && namedCurve === 'P-256') {
288566
+ cryptoKey = keyObject.toCryptoKey({
288567
+ name: 'ECDSA',
288568
+ namedCurve,
288569
+ }, extractable, [isPublic ? 'verify' : 'sign']);
288570
+ }
288571
+ if (alg === 'ES384' && namedCurve === 'P-384') {
288572
+ cryptoKey = keyObject.toCryptoKey({
288573
+ name: 'ECDSA',
288574
+ namedCurve,
288575
+ }, extractable, [isPublic ? 'verify' : 'sign']);
288576
+ }
288577
+ if (alg === 'ES512' && namedCurve === 'P-521') {
288578
+ cryptoKey = keyObject.toCryptoKey({
288579
+ name: 'ECDSA',
288580
+ namedCurve,
288581
+ }, extractable, [isPublic ? 'verify' : 'sign']);
288582
+ }
288583
+ if (alg.startsWith('ECDH-ES')) {
288584
+ cryptoKey = keyObject.toCryptoKey({
288585
+ name: 'ECDH',
288586
+ namedCurve,
288587
+ }, extractable, isPublic ? [] : ['deriveBits']);
288588
+ }
288589
+ }
288590
+ if (!cryptoKey) {
288591
+ throw new TypeError('given KeyObject instance cannot be used for this algorithm');
288592
+ }
288593
+ if (!cached) {
288594
+ cache.set(keyObject, { [alg]: cryptoKey });
288595
+ }
288596
+ else {
288597
+ cached[alg] = cryptoKey;
288598
+ }
288599
+ return cryptoKey;
288647
288600
  };
288648
- /* harmony default export */ const validate_algorithms = (validateAlgorithms);
288601
+ /* harmony default export */ const normalize_key = (async (key, alg) => {
288602
+ if (key instanceof Uint8Array) {
288603
+ return key;
288604
+ }
288605
+ if (isCryptoKey(key)) {
288606
+ return key;
288607
+ }
288608
+ if (isKeyObject(key)) {
288609
+ if (key.type === 'secret') {
288610
+ return key.export();
288611
+ }
288612
+ if ('toCryptoKey' in key && typeof key.toCryptoKey === 'function') {
288613
+ try {
288614
+ return handleKeyObject(key, alg);
288615
+ }
288616
+ catch (err) {
288617
+ if (err instanceof TypeError) {
288618
+ throw err;
288619
+ }
288620
+ }
288621
+ }
288622
+ let jwk = key.export({ format: 'jwk' });
288623
+ return handleJWK(key, jwk, alg);
288624
+ }
288625
+ if (isJWK(key)) {
288626
+ if (key.k) {
288627
+ return decode(key.k);
288628
+ }
288629
+ return handleJWK(key, key, alg, true);
288630
+ }
288631
+ throw new Error('unreachable');
288632
+ });
288633
+
288634
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_key_type.js
288635
+
288636
+
288637
+
288638
+ const tag = (key) => key?.[Symbol.toStringTag];
288639
+ const jwkMatchesOp = (alg, key, usage) => {
288640
+ if (key.use !== undefined) {
288641
+ let expected;
288642
+ switch (usage) {
288643
+ case 'sign':
288644
+ case 'verify':
288645
+ expected = 'sig';
288646
+ break;
288647
+ case 'encrypt':
288648
+ case 'decrypt':
288649
+ expected = 'enc';
288650
+ break;
288651
+ }
288652
+ if (key.use !== expected) {
288653
+ throw new TypeError(`Invalid key for this operation, its "use" must be "${expected}" when present`);
288654
+ }
288655
+ }
288656
+ if (key.alg !== undefined && key.alg !== alg) {
288657
+ throw new TypeError(`Invalid key for this operation, its "alg" must be "${alg}" when present`);
288658
+ }
288659
+ if (Array.isArray(key.key_ops)) {
288660
+ let expectedKeyOp;
288661
+ switch (true) {
288662
+ case usage === 'sign' || usage === 'verify':
288663
+ case alg === 'dir':
288664
+ case alg.includes('CBC-HS'):
288665
+ expectedKeyOp = usage;
288666
+ break;
288667
+ case alg.startsWith('PBES2'):
288668
+ expectedKeyOp = 'deriveBits';
288669
+ break;
288670
+ case /^A\d{3}(?:GCM)?(?:KW)?$/.test(alg):
288671
+ if (!alg.includes('GCM') && alg.endsWith('KW')) {
288672
+ expectedKeyOp = usage === 'encrypt' ? 'wrapKey' : 'unwrapKey';
288673
+ }
288674
+ else {
288675
+ expectedKeyOp = usage;
288676
+ }
288677
+ break;
288678
+ case usage === 'encrypt' && alg.startsWith('RSA'):
288679
+ expectedKeyOp = 'wrapKey';
288680
+ break;
288681
+ case usage === 'decrypt':
288682
+ expectedKeyOp = alg.startsWith('RSA') ? 'unwrapKey' : 'deriveBits';
288683
+ break;
288684
+ }
288685
+ if (expectedKeyOp && key.key_ops?.includes?.(expectedKeyOp) === false) {
288686
+ throw new TypeError(`Invalid key for this operation, its "key_ops" must include "${expectedKeyOp}" when present`);
288687
+ }
288688
+ }
288689
+ return true;
288690
+ };
288691
+ const symmetricTypeCheck = (alg, key, usage) => {
288692
+ if (key instanceof Uint8Array)
288693
+ return;
288694
+ if (isJWK(key)) {
288695
+ if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
288696
+ return;
288697
+ throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
288698
+ }
288699
+ if (!is_key_like(key)) {
288700
+ throw new TypeError(withAlg(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key', 'Uint8Array'));
288701
+ }
288702
+ if (key.type !== 'secret') {
288703
+ throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
288704
+ }
288705
+ };
288706
+ const asymmetricTypeCheck = (alg, key, usage) => {
288707
+ if (isJWK(key)) {
288708
+ switch (usage) {
288709
+ case 'decrypt':
288710
+ case 'sign':
288711
+ if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
288712
+ return;
288713
+ throw new TypeError(`JSON Web Key for this operation be a private JWK`);
288714
+ case 'encrypt':
288715
+ case 'verify':
288716
+ if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
288717
+ return;
288718
+ throw new TypeError(`JSON Web Key for this operation be a public JWK`);
288719
+ }
288720
+ }
288721
+ if (!is_key_like(key)) {
288722
+ throw new TypeError(withAlg(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key'));
288723
+ }
288724
+ if (key.type === 'secret') {
288725
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
288726
+ }
288727
+ if (key.type === 'public') {
288728
+ switch (usage) {
288729
+ case 'sign':
288730
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
288731
+ case 'decrypt':
288732
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
288733
+ default:
288734
+ break;
288735
+ }
288736
+ }
288737
+ if (key.type === 'private') {
288738
+ switch (usage) {
288739
+ case 'verify':
288740
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
288741
+ case 'encrypt':
288742
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
288743
+ default:
288744
+ break;
288745
+ }
288746
+ }
288747
+ };
288748
+ /* harmony default export */ const check_key_type = ((alg, key, usage) => {
288749
+ const symmetric = alg.startsWith('HS') ||
288750
+ alg === 'dir' ||
288751
+ alg.startsWith('PBES2') ||
288752
+ /^A(?:128|192|256)(?:GCM)?(?:KW)?$/.test(alg) ||
288753
+ /^A(?:128|192|256)CBC-HS(?:256|384|512)$/.test(alg);
288754
+ if (symmetric) {
288755
+ symmetricTypeCheck(alg, key, usage);
288756
+ }
288757
+ else {
288758
+ asymmetricTypeCheck(alg, key, usage);
288759
+ }
288760
+ });
288761
+
288762
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/jwe/flattened/decrypt.js
288763
+
288649
288764
 
288650
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/jwe/flattened/decrypt.js
288651
288765
 
288652
288766
 
288653
288767
 
@@ -288659,7 +288773,7 @@ const validateAlgorithms = (option, algorithms) => {
288659
288773
 
288660
288774
 
288661
288775
  async function flattenedDecrypt(jwe, key, options) {
288662
- if (!isObject(jwe)) {
288776
+ if (!is_object(jwe)) {
288663
288777
  throw new JWEInvalid('Flattened JWE must be an object');
288664
288778
  }
288665
288779
  if (jwe.protected === undefined && jwe.header === undefined && jwe.unprotected === undefined) {
@@ -288683,10 +288797,10 @@ async function flattenedDecrypt(jwe, key, options) {
288683
288797
  if (jwe.aad !== undefined && typeof jwe.aad !== 'string') {
288684
288798
  throw new JWEInvalid('JWE AAD incorrect type');
288685
288799
  }
288686
- if (jwe.header !== undefined && !isObject(jwe.header)) {
288800
+ if (jwe.header !== undefined && !is_object(jwe.header)) {
288687
288801
  throw new JWEInvalid('JWE Shared Unprotected Header incorrect type');
288688
288802
  }
288689
- if (jwe.unprotected !== undefined && !isObject(jwe.unprotected)) {
288803
+ if (jwe.unprotected !== undefined && !is_object(jwe.unprotected)) {
288690
288804
  throw new JWEInvalid('JWE Per-Recipient Unprotected Header incorrect type');
288691
288805
  }
288692
288806
  let parsedProt;
@@ -288709,7 +288823,7 @@ async function flattenedDecrypt(jwe, key, options) {
288709
288823
  };
288710
288824
  validate_crit(JWEInvalid, new Map(), options?.crit, parsedProt, joseHeader);
288711
288825
  if (joseHeader.zip !== undefined) {
288712
- throw new errors_JOSENotSupported('JWE "zip" (Compression Algorithm) Header Parameter is not supported.');
288826
+ throw new JOSENotSupported('JWE "zip" (Compression Algorithm) Header Parameter is not supported.');
288713
288827
  }
288714
288828
  const { alg, enc } = joseHeader;
288715
288829
  if (typeof alg !== 'string' || !alg) {
@@ -288742,12 +288856,14 @@ async function flattenedDecrypt(jwe, key, options) {
288742
288856
  key = await key(parsedProt, jwe);
288743
288857
  resolvedKey = true;
288744
288858
  }
288859
+ check_key_type(alg === 'dir' ? enc : alg, key, 'decrypt');
288860
+ const k = await normalize_key(key, alg);
288745
288861
  let cek;
288746
288862
  try {
288747
- cek = await decrypt_key_management(alg, key, encryptedKey, joseHeader, options);
288863
+ cek = await decrypt_key_management(alg, k, encryptedKey, joseHeader, options);
288748
288864
  }
288749
288865
  catch (err) {
288750
- if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof errors_JOSENotSupported) {
288866
+ if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof JOSENotSupported) {
288751
288867
  throw err;
288752
288868
  }
288753
288869
  cek = lib_cek(enc);
@@ -288773,7 +288889,7 @@ async function flattenedDecrypt(jwe, key, options) {
288773
288889
  const protectedHeader = buffer_utils_encoder.encode(jwe.protected ?? '');
288774
288890
  let additionalData;
288775
288891
  if (jwe.aad !== undefined) {
288776
- additionalData = buffer_utils_concat(protectedHeader, buffer_utils_encoder.encode('.'), buffer_utils_encoder.encode(jwe.aad));
288892
+ additionalData = concat(protectedHeader, buffer_utils_encoder.encode('.'), buffer_utils_encoder.encode(jwe.aad));
288777
288893
  }
288778
288894
  else {
288779
288895
  additionalData = protectedHeader;
@@ -288785,7 +288901,7 @@ async function flattenedDecrypt(jwe, key, options) {
288785
288901
  catch {
288786
288902
  throw new JWEInvalid('Failed to base64url decode the ciphertext');
288787
288903
  }
288788
- const plaintext = await runtime_decrypt(enc, cek, ciphertext, iv, tag, additionalData);
288904
+ const plaintext = await decrypt(enc, cek, ciphertext, iv, tag, additionalData);
288789
288905
  const result = { plaintext };
288790
288906
  if (jwe.protected !== undefined) {
288791
288907
  result.protectedHeader = parsedProt;
@@ -288805,12 +288921,12 @@ async function flattenedDecrypt(jwe, key, options) {
288805
288921
  result.unprotectedHeader = jwe.header;
288806
288922
  }
288807
288923
  if (resolvedKey) {
288808
- return { ...result, key };
288924
+ return { ...result, key: k };
288809
288925
  }
288810
288926
  return result;
288811
288927
  }
288812
288928
 
288813
- ;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/jwe/compact/decrypt.js
288929
+ ;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/jwe/compact/decrypt.js
288814
288930
 
288815
288931
 
288816
288932
 
@@ -288847,7 +288963,7 @@ let headers;
288847
288963
  let build_USER_AGENT;
288848
288964
  if (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {
288849
288965
  const NAME = 'openid-client';
288850
- const VERSION = 'v6.1.7';
288966
+ const VERSION = 'v6.3.4';
288851
288967
  build_USER_AGENT = `${NAME}/${VERSION}`;
288852
288968
  headers = { 'user-agent': build_USER_AGENT };
288853
288969
  }
@@ -289172,11 +289288,10 @@ function selectCryptoKeyForDecryption(keys, alg, kid, epk) {
289172
289288
  return key.key;
289173
289289
  }
289174
289290
  async function build_decrypt(keys, jwe, contentEncryptionAlgorithms, keyManagementAlgorithms) {
289175
- return build_decoder.decode((await compactDecrypt(jwe, async (header) => {
289291
+ return build_decoder.decode((await compactDecrypt(jwe, (header) => {
289176
289292
  const { kid, alg, epk } = header;
289177
289293
  return selectCryptoKeyForDecryption(keys, alg, kid, epk);
289178
- }, { keyManagementAlgorithms, contentEncryptionAlgorithms })
289179
- .catch((err) => {
289294
+ }, { keyManagementAlgorithms, contentEncryptionAlgorithms }).catch((err) => {
289180
289295
  if (err instanceof JOSEError) {
289181
289296
  throw e('decryption failed', err, 'OAUTH_DECRYPTION_FAILED');
289182
289297
  }
@@ -289382,6 +289497,80 @@ async function initiateDeviceAuthorization(config, parameters) {
289382
289497
  .then((response) => processDeviceAuthorizationResponse(as, c, response))
289383
289498
  .catch(errorHandler);
289384
289499
  }
289500
+ async function initiateBackchannelAuthentication(config, parameters) {
289501
+ checkConfig(config);
289502
+ const { as, c, auth, fetch, tlsOnly, timeout } = build_int(config);
289503
+ return backchannelAuthenticationRequest(as, c, auth, parameters, {
289504
+ [customFetch]: fetch,
289505
+ [allowInsecureRequests]: !tlsOnly,
289506
+ headers: new Headers(headers),
289507
+ signal: build_signal(timeout),
289508
+ })
289509
+ .then((response) => processBackchannelAuthenticationResponse(as, c, response))
289510
+ .catch(errorHandler);
289511
+ }
289512
+ async function pollBackchannelAuthenticationGrant(config, backchannelAuthenticationResponse, parameters, options) {
289513
+ checkConfig(config);
289514
+ parameters = new URLSearchParams(parameters);
289515
+ let interval = backchannelAuthenticationResponse.interval ?? 5;
289516
+ const pollingSignal = options?.signal ??
289517
+ AbortSignal.timeout(backchannelAuthenticationResponse.expires_in * 1000);
289518
+ try {
289519
+ pollingSignal.throwIfAborted();
289520
+ }
289521
+ catch (err) {
289522
+ errorHandler(err);
289523
+ }
289524
+ await wait(interval);
289525
+ const { as, c, auth, fetch, tlsOnly, nonRepudiation, timeout, decrypt } = build_int(config);
289526
+ const response = await backchannelAuthenticationGrantRequest(as, c, auth, backchannelAuthenticationResponse.auth_req_id, {
289527
+ [customFetch]: fetch,
289528
+ [allowInsecureRequests]: !tlsOnly,
289529
+ additionalParameters: parameters,
289530
+ DPoP: options?.DPoP,
289531
+ headers: new Headers(headers),
289532
+ signal: pollingSignal.aborted ? pollingSignal : build_signal(timeout),
289533
+ })
289534
+ .catch(errorHandler);
289535
+ const p = processBackchannelAuthenticationGrantResponse(as, c, response, {
289536
+ [jweDecrypt]: decrypt,
289537
+ });
289538
+ let result;
289539
+ try {
289540
+ result = await p;
289541
+ }
289542
+ catch (err) {
289543
+ if (retryable(err, options)) {
289544
+ return pollBackchannelAuthenticationGrant(config, {
289545
+ ...backchannelAuthenticationResponse,
289546
+ interval,
289547
+ }, parameters, {
289548
+ ...options,
289549
+ signal: pollingSignal,
289550
+ flag: retry,
289551
+ });
289552
+ }
289553
+ if (err instanceof ResponseBodyError) {
289554
+ switch (err.error) {
289555
+ case 'slow_down':
289556
+ interval += 5;
289557
+ case 'authorization_pending':
289558
+ return pollBackchannelAuthenticationGrant(config, {
289559
+ ...backchannelAuthenticationResponse,
289560
+ interval,
289561
+ }, parameters, {
289562
+ ...options,
289563
+ signal: pollingSignal,
289564
+ flag: undefined,
289565
+ });
289566
+ }
289567
+ }
289568
+ errorHandler(err);
289569
+ }
289570
+ result.id_token && (await nonRepudiation?.(response));
289571
+ addHelpers(result);
289572
+ return result;
289573
+ }
289385
289574
  function build_allowInsecureRequests(config) {
289386
289575
  build_int(config).tlsOnly = false;
289387
289576
  }