@firestartr/cli 1.31.0 → 1.32.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/build/index.js
CHANGED
|
@@ -116214,7 +116214,7 @@ exports.KubernetesObjectApi = KubernetesObjectApi;
|
|
|
116214
116214
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
116215
116215
|
exports.OpenIDConnectAuth = void 0;
|
|
116216
116216
|
const tslib_1 = __nccwpck_require__(33714);
|
|
116217
|
-
const oidc = tslib_1.__importStar(__nccwpck_require__(
|
|
116217
|
+
const oidc = tslib_1.__importStar(__nccwpck_require__(91188));
|
|
116218
116218
|
const rfc4648_1 = __nccwpck_require__(53367);
|
|
116219
116219
|
const util_1 = __nccwpck_require__(73837);
|
|
116220
116220
|
class OidcClient {
|
|
@@ -119169,7 +119169,7 @@ module.exports = __toCommonJS(dist_src_exports);
|
|
|
119169
119169
|
var import_universal_user_agent = __nccwpck_require__(65212);
|
|
119170
119170
|
|
|
119171
119171
|
// pkg/dist-src/version.js
|
|
119172
|
-
var VERSION = "9.0.
|
|
119172
|
+
var VERSION = "9.0.6";
|
|
119173
119173
|
|
|
119174
119174
|
// pkg/dist-src/defaults.js
|
|
119175
119175
|
var userAgent = `octokit-endpoint.js/${VERSION} ${(0, import_universal_user_agent.getUserAgent)()}`;
|
|
@@ -119274,9 +119274,9 @@ function addQueryParameters(url, parameters) {
|
|
|
119274
119274
|
}
|
|
119275
119275
|
|
|
119276
119276
|
// pkg/dist-src/util/extract-url-variable-names.js
|
|
119277
|
-
var urlVariableRegex = /\{[^}]+\}/g;
|
|
119277
|
+
var urlVariableRegex = /\{[^{}}]+\}/g;
|
|
119278
119278
|
function removeNonChars(variableName) {
|
|
119279
|
-
return variableName.replace(
|
|
119279
|
+
return variableName.replace(/(?:^\W+)|(?:(?<!\W)\W+$)/g, "").split(/,/);
|
|
119280
119280
|
}
|
|
119281
119281
|
function extractUrlVariableNames(url) {
|
|
119282
119282
|
const matches = url.match(urlVariableRegex);
|
|
@@ -119462,7 +119462,7 @@ function parse(options) {
|
|
|
119462
119462
|
}
|
|
119463
119463
|
if (url.endsWith("/graphql")) {
|
|
119464
119464
|
if (options.mediaType.previews?.length) {
|
|
119465
|
-
const previewsFromAcceptHeader = headers.accept.match(/[\w-]+(?=-preview)/g) || [];
|
|
119465
|
+
const previewsFromAcceptHeader = headers.accept.match(/(?<![\w-])[\w-]+(?=-preview)/g) || [];
|
|
119466
119466
|
headers.accept = previewsFromAcceptHeader.concat(options.mediaType.previews).map((preview) => {
|
|
119467
119467
|
const format = options.mediaType.format ? `.${options.mediaType.format}` : "+json";
|
|
119468
119468
|
return `application/vnd.github.${preview}-preview${format}`;
|
|
@@ -122302,7 +122302,7 @@ var RequestError = class extends Error {
|
|
|
122302
122302
|
if (options.request.headers.authorization) {
|
|
122303
122303
|
requestCopy.headers = Object.assign({}, options.request.headers, {
|
|
122304
122304
|
authorization: options.request.headers.authorization.replace(
|
|
122305
|
-
/ .*$/,
|
|
122305
|
+
/(?<! ) .*$/,
|
|
122306
122306
|
" [REDACTED]"
|
|
122307
122307
|
)
|
|
122308
122308
|
});
|
|
@@ -122370,7 +122370,7 @@ var import_endpoint = __nccwpck_require__(68773);
|
|
|
122370
122370
|
var import_universal_user_agent = __nccwpck_require__(65212);
|
|
122371
122371
|
|
|
122372
122372
|
// pkg/dist-src/version.js
|
|
122373
|
-
var VERSION = "8.4.
|
|
122373
|
+
var VERSION = "8.4.1";
|
|
122374
122374
|
|
|
122375
122375
|
// pkg/dist-src/is-plain-object.js
|
|
122376
122376
|
function isPlainObject(value) {
|
|
@@ -122429,7 +122429,7 @@ function fetchWrapper(requestOptions) {
|
|
|
122429
122429
|
headers[keyAndValue[0]] = keyAndValue[1];
|
|
122430
122430
|
}
|
|
122431
122431
|
if ("deprecation" in headers) {
|
|
122432
|
-
const matches = headers.link && headers.link.match(/<([
|
|
122432
|
+
const matches = headers.link && headers.link.match(/<([^<>]+)>; rel="deprecation"/);
|
|
122433
122433
|
const deprecationLink = matches && matches.pop();
|
|
122434
122434
|
log.warn(
|
|
122435
122435
|
`[@octokit/request] "${requestOptions.method} ${requestOptions.url}" is deprecated. It is scheduled to be removed on ${headers.sunset}${deprecationLink ? `. See ${deprecationLink}` : ""}`
|
|
@@ -148344,7 +148344,7 @@ class ApiObject extends constructs_1.Construct {
|
|
|
148344
148344
|
}
|
|
148345
148345
|
}
|
|
148346
148346
|
exports.ApiObject = ApiObject;
|
|
148347
|
-
ApiObject[_a] = { fqn: "cdk8s.ApiObject", version: "2.69.
|
|
148347
|
+
ApiObject[_a] = { fqn: "cdk8s.ApiObject", version: "2.69.57" };
|
|
148348
148348
|
function parseApiGroup(apiVersion) {
|
|
148349
148349
|
const v = apiVersion.split('/');
|
|
148350
148350
|
// no group means "core"
|
|
@@ -148559,7 +148559,7 @@ class App extends constructs_1.Construct {
|
|
|
148559
148559
|
}
|
|
148560
148560
|
exports.App = App;
|
|
148561
148561
|
_a = JSII_RTTI_SYMBOL_1;
|
|
148562
|
-
App[_a] = { fqn: "cdk8s.App", version: "2.69.
|
|
148562
|
+
App[_a] = { fqn: "cdk8s.App", version: "2.69.57" };
|
|
148563
148563
|
function validate(app, cache) {
|
|
148564
148564
|
const errors = [];
|
|
148565
148565
|
for (const child of cache.findAll(app.node)) {
|
|
@@ -148773,7 +148773,7 @@ class Chart extends constructs_1.Construct {
|
|
|
148773
148773
|
}
|
|
148774
148774
|
}
|
|
148775
148775
|
exports.Chart = Chart;
|
|
148776
|
-
Chart[_a] = { fqn: "cdk8s.Chart", version: "2.69.
|
|
148776
|
+
Chart[_a] = { fqn: "cdk8s.Chart", version: "2.69.57" };
|
|
148777
148777
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"chart.js","sourceRoot":"","sources":["../src/chart.ts"],"names":[],"mappings":";;;;;AAAA,2CAAmD;AACnD,6CAAyC;AACzC,+BAA4B;AAC5B,mCAAgC;AAEhC,MAAM,YAAY,GAAG,MAAM,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;AAC/C,MAAM,OAAO,GAAG,SAAS,CAAC;AA6B1B,MAAa,KAAM,SAAQ,sBAAS;IAClC;;;;OAIG;IACI,MAAM,CAAC,OAAO,CAAC,CAAM;QAC1B,OAAO,CAAC,KAAK,IAAI,IAAI,OAAM,CAAC,CAAC,CAAC,KAAK,QAAQ,IAAI,YAAY,IAAI,CAAC,CAAC;IACnE,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,2BAAC,MAAM,CAAC,WAAW,EAAC,CAAC,CAAU;QACpC,OAAO,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,EAAE,CAAC,CAAa;QAC5B,IAAI,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;YACrB,OAAO,CAAC,CAAC;QACX,CAAC;QAED,MAAM,MAAM,GAAG,CAAC,CAAC,IAAI,CAAC,KAAkB,CAAC;QACzC,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACzE,CAAC;QAED,OAAO,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAiBD,YAAY,KAAgB,EAAE,EAAU,EAAE,QAAoB,EAAG;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC;QACjC,IAAI,CAAC,OAAO,GAAG,KAAK,CAAC,MAAM,IAAI,EAAE,CAAC;QAClC,IAAI,CAAC,0BAA0B,GAAG,KAAK,CAAC,yBAAyB,IAAI,KAAK,CAAC;QAE3E,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;IAC7D,CAAC;IAED;;;;OAIG;IACH,IAAW,MAAM;QACf,OAAO,EAAE,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,kBAAkB,CAAC,SAAoB;QAC5C,OAAO,aAAK,CAAC,UAAU,CAAC,SAAS,EAAE;YACjC,WAAW,EAAE,CAAC,IAAI,CAAC,0BAA0B;YAC7C,MAAM,EAAE,SAAS,CAAC,IAAI,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS;SACnD,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,GAAG,YAA0B;QAChD,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,YAAY,CAAC,CAAC;IAC3C,CAAC;IAED;;;OAGG;IACI,MAAM;QACX,OAAO,SAAG,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAkB,EAAE,CAAC,CAAC,YAAY,sBAAS,CAAC,CAAC;IAClF,CAAC;;AAxHH,sBAyHC","sourcesContent":["import { Construct, IConstruct } from 'constructs';\nimport { ApiObject } from './api-object';\nimport { App } from './app';\nimport { Names } from './names';\n\nconst CHART_SYMBOL = Symbol.for('cdk8s.Chart');\nconst CRONJOB = 'CronJob';\n\nexport interface ChartProps {\n  /**\n   * The default namespace for all objects defined in this chart (directly or\n   * indirectly). This namespace will only apply to objects that don't have a\n   * `namespace` explicitly defined for them.\n   *\n   * @default - no namespace is synthesized (usually this implies \"default\")\n   */\n  readonly namespace?: string;\n\n  /**\n   * Labels to apply to all resources in this chart.\n   *\n   * @default - no common labels\n   */\n  readonly labels?: { [name: string]: string };\n\n  /**\n   * The autogenerated resource name by default is suffixed with a stable hash\n   * of the construct path. Setting this property to true drops the hash suffix.\n   *\n   * @default false\n   */\n  readonly disableResourceNameHashes?: boolean;\n\n}\n\nexport class Chart extends Construct {\n  /**\n   * Return whether the given object is a Chart.\n   *\n   * We do attribute detection since we can't reliably use 'instanceof'.\n   */\n  public static isChart(x: any): x is Chart {\n    return x !== null && typeof(x) === 'object' && CHART_SYMBOL in x;\n  }\n\n  /**\n   * Implements `instanceof Chart` using the more reliable `Chart.isChart` static method\n   *\n   * @param o The object to check\n   * @internal\n   */\n  static [Symbol.hasInstance](o: unknown) {\n    return Chart.isChart(o);\n  }\n\n  /**\n   * Finds the chart in which a node is defined.\n   * @param c a construct node\n   */\n  public static of(c: IConstruct): Chart {\n    if (Chart.isChart(c)) {\n      return c;\n    }\n\n    const parent = c.node.scope as Construct;\n    if (!parent) {\n      throw new Error('cannot find a parent chart (directly or indirectly)');\n    }\n\n    return Chart.of(parent);\n  }\n\n  /**\n   * The default namespace for all objects in this chart.\n   */\n  public readonly namespace?: string;\n\n  /**\n   * Chart-level labels.\n   */\n  private readonly _labels?: { [name: string]: string };\n\n  /**\n   * Determines if resource names in the chart have the suffixed hash.\n   */\n  private readonly _disableResourceNameHashes?: boolean;\n\n  constructor(scope: Construct, id: string, props: ChartProps = { }) {\n    super(scope, id);\n    this.namespace = props.namespace;\n    this._labels = props.labels ?? {};\n    this._disableResourceNameHashes = props.disableResourceNameHashes ?? false;\n\n    Object.defineProperty(this, CHART_SYMBOL, { value: true });\n  }\n\n  /**\n   * Labels applied to all resources in this chart.\n   *\n   * This is an immutable copy.\n   */\n  public get labels(): { [name: string]: string } {\n    return { ...this._labels };\n  }\n\n  /**\n   * Generates a app-unique name for an object given it's construct node path.\n   *\n   * Different resource types may have different constraints on names\n   * (`metadata.name`). The previous version of the name generator was\n   * compatible with DNS_SUBDOMAIN but not with DNS_LABEL.\n   *\n   * For example, `Deployment` names must comply with DNS_SUBDOMAIN while\n   * `Service` names must comply with DNS_LABEL.\n   *\n   * Since there is no formal specification for this, the default name\n   * generation scheme for kubernetes objects in cdk8s was changed to DNS_LABEL,\n   * since it’s the common denominator for all kubernetes resources\n   * (supposedly).\n   *\n   * You can override this method if you wish to customize object names at the\n   * chart level.\n   *\n   * @param apiObject The API object to generate a name for.\n   */\n  public generateObjectName(apiObject: ApiObject) {\n    return Names.toDnsLabel(apiObject, {\n      includeHash: !this._disableResourceNameHashes,\n      maxLen: apiObject.kind == CRONJOB ? 52 : undefined,\n    });\n  }\n\n  /**\n   * Create a dependency between this Chart and other constructs.\n   * These can be other ApiObjects, Charts, or custom.\n   *\n   * @param dependencies the dependencies to add.\n   */\n  public addDependency(...dependencies: IConstruct[]) {\n    this.node.addDependency(...dependencies);\n  }\n\n  /**\n   * Renders this chart to a set of Kubernetes JSON resources.\n   * @returns array of resource manifests\n   */\n  public toJson(): any[] {\n    return App._synthChart(this);\n  }\n\n  /**\n   * Returns all the included API objects.\n   */\n  get apiObjects(): ApiObject[] {\n    return this.node.children.filter((o): o is ApiObject => o instanceof ApiObject);\n  }\n}\n"]}
|
|
148778
148778
|
|
|
148779
148779
|
/***/ }),
|
|
@@ -148845,7 +148845,7 @@ class Cron {
|
|
|
148845
148845
|
}
|
|
148846
148846
|
exports.Cron = Cron;
|
|
148847
148847
|
_a = JSII_RTTI_SYMBOL_1;
|
|
148848
|
-
Cron[_a] = { fqn: "cdk8s.Cron", version: "2.69.
|
|
148848
|
+
Cron[_a] = { fqn: "cdk8s.Cron", version: "2.69.57" };
|
|
148849
148849
|
function fallback(x, def) {
|
|
148850
148850
|
return x ?? def;
|
|
148851
148851
|
}
|
|
@@ -148934,7 +148934,7 @@ class DependencyGraph {
|
|
|
148934
148934
|
}
|
|
148935
148935
|
exports.DependencyGraph = DependencyGraph;
|
|
148936
148936
|
_a = JSII_RTTI_SYMBOL_1;
|
|
148937
|
-
DependencyGraph[_a] = { fqn: "cdk8s.DependencyGraph", version: "2.69.
|
|
148937
|
+
DependencyGraph[_a] = { fqn: "cdk8s.DependencyGraph", version: "2.69.57" };
|
|
148938
148938
|
/**
|
|
148939
148939
|
* Represents a vertex in the graph.
|
|
148940
148940
|
*
|
|
@@ -149027,7 +149027,7 @@ class DependencyVertex {
|
|
|
149027
149027
|
}
|
|
149028
149028
|
exports.DependencyVertex = DependencyVertex;
|
|
149029
149029
|
_b = JSII_RTTI_SYMBOL_1;
|
|
149030
|
-
DependencyVertex[_b] = { fqn: "cdk8s.DependencyVertex", version: "2.69.
|
|
149030
|
+
DependencyVertex[_b] = { fqn: "cdk8s.DependencyVertex", version: "2.69.57" };
|
|
149031
149031
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dependency.js","sourceRoot":"","sources":["../src/dependency.ts"],"names":[],"mappings":";;;;;AAGA;;;;;;;;;;;;GAYG;AACH,MAAa,eAAe;IAI1B,YAAY,IAAU;QAEpB,IAAI,CAAC,aAAa,GAAG,IAAI,gBAAgB,EAAE,CAAC;QAE5C,MAAM,KAAK,GAAqC,EAAE,CAAC;QAEnD,SAAS,SAAS,CAAC,SAAqB;YACtC,KAAK,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,gBAAgB,CAAC,SAAS,CAAC,CAAC;QAC/D,CAAC;QAED,SAAS,SAAS,CAAC,SAAqB;YACtC,OAAO,KAAK,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACpC,CAAC;QAED,oCAAoC;QACpC,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/B,SAAS,CAAC,CAAC,CAAC,CAAC;QACf,CAAC;QAED,MAAM,IAAI,GAAG,EAAE,CAAC;QAChB,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YACnC,KAAK,MAAM,GAAG,IAAI,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;gBAC1C,IAAI,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC,CAAC;YAC5C,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YAEvB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3B,+BAA+B;gBAC/B,6DAA6D;gBAC7D,2FAA2F;gBAC3F,sCAAsC;gBACtC,SAAS;YACX,CAAC;YAED,MAAM,aAAa,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAC5C,MAAM,aAAa,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAE5C,aAAa,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAExC,CAAC;QAED,mBAAmB;QACnB,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC3B,iDAAiD;gBACjD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;IAEH,CAAC;IAED;;;;;OAKG;IACH,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,OAAO,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;IACvC,CAAC;;AAzEH,0CA0EC;;;AAED;;;;GAIG;AACH,MAAa,gBAAgB;IAM3B,YAAY,QAAgC,SAAS;QAHpC,cAAS,GAA0B,IAAI,GAAG,EAAoB,CAAC;QAC/D,aAAQ,GAA0B,IAAI,GAAG,EAAoB,CAAC;QAG7E,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACtB,CAAC;IAED;;;;OAIG;IACH,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAW,QAAQ;QACjB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IACpC,CAAC;IAED;;OAEG;IACH,IAAW,OAAO;QAChB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IACnC,CAAC;IAED;;OAEG;IACI,QAAQ;QAEb,MAAM,KAAK,GAAG,IAAI,GAAG,EAAoB,CAAC;QAC1C,MAAM,QAAQ,GAAuB,EAAE,CAAC;QAExC,SAAS,KAAK,CAAC,CAAmB;YAChC,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3B,KAAK,CAAC,CAAC,CAAC,CAAC;YACX,CAAC;YACD,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;gBAClB,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;gBACjB,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;YACf,CAAC;QACH,CAAC;QAED,KAAK,CAAC,IAAI,CAAC,CAAC;QAEZ,OAAO,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAM,CAAC,CAAC;IAE1D,CAAC;IAED;;;;;;;OAOG;IACI,QAAQ,CAAC,GAAqB;QAEnC,MAAM,KAAK,GAAuB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QACtD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,8BAA8B,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACxH,CAAC;QAED,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACxB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;IACtB,CAAC;IAEO,SAAS,CAAC,GAAqB;QACrC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;IAEO,SAAS,CAAC,GAAqB;QAErC,MAAM,KAAK,GAAuB,EAAE,CAAC;QACrC,KAAK,CAAC,IAAI,CAAC,CAAC;QACZ,OAAO,KAAK,CAAC;QAEb,SAAS,KAAK,CAAC,CAAmB;YAChC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACd,IAAI,KAAK,GAAG,KAAK,CAAC;YAClB,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3B,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;oBACd,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;oBACd,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,KAAK,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;YACnB,CAAC;YACD,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,KAAK,CAAC,GAAG,EAAE,CAAC;YACd,CAAC;YACD,OAAO,KAAK,CAAC;QAEf,CAAC;IAEH,CAAC;;AAxGH,4CAyGC","sourcesContent":["import { Node, IConstruct } from 'constructs';\n\n\n/**\n * Represents the dependency graph for a given Node.\n *\n * This graph includes the dependency relationships between all nodes in the\n * node (construct) sub-tree who's root is this Node.\n *\n * Note that this means that lonely nodes (no dependencies and no dependants) are also included in this graph as\n * childless children of the root node of the graph.\n *\n * The graph does not include cross-scope dependencies. That is, if a child on the current scope depends on a node\n * from a different scope, that relationship is not represented in this graph.\n *\n */\nexport class DependencyGraph {\n\n  private readonly _fosterParent: DependencyVertex;\n\n  constructor(node: Node) {\n\n    this._fosterParent = new DependencyVertex();\n\n    const nodes: Record<string, DependencyVertex> = {};\n\n    function putVertex(construct: IConstruct) {\n      nodes[construct.node.path] = new DependencyVertex(construct);\n    }\n\n    function getVertex(construct: IConstruct): DependencyVertex {\n      return nodes[construct.node.path];\n    }\n\n    // create all vertices of the graph.\n    for (const n of node.findAll()) {\n      putVertex(n);\n    }\n\n    const deps = [];\n    for (const child of node.findAll()) {\n      for (const dep of child.node.dependencies) {\n        deps.push({ source: child, target: dep });\n      }\n    }\n\n    // create all the edges of the graph.\n    for (const dep of deps) {\n\n      if (!getVertex(dep.target)) {\n        // dont cross scope boundaries.\n        // since charts only renders its own children, this is ok and\n        // has the benefit of simplifying the graph. we should reconsider this behavior when moving\n        // to a more general purpose use-case.\n        continue;\n      }\n\n      const sourceDepNode = getVertex(dep.source);\n      const targetDepNode = getVertex(dep.target);\n\n      sourceDepNode.addChild(targetDepNode);\n\n    }\n\n    // create the root.\n    for (const n of Object.values(nodes)) {\n      if (n.inbound.length === 0) {\n        // orphans are dependency roots. lets adopt them!\n        this._fosterParent.addChild(n);\n      }\n    }\n\n  }\n\n  /**\n   * Returns the root of the graph.\n   *\n   * Note that this vertex will always have `null` as its `.value` since it is an artifical root\n   * that binds all the connected spaces of the graph.\n   */\n  public get root(): DependencyVertex {\n    return this._fosterParent;\n  }\n\n  /**\n   * @see Vertex.topology()\n   */\n  public topology(): IConstruct[] {\n    return this._fosterParent.topology();\n  }\n}\n\n/**\n * Represents a vertex in the graph.\n *\n * The value of each vertex is an `IConstruct` that is accessible via the `.value` getter.\n */\nexport class DependencyVertex {\n\n  private readonly _value: IConstruct | undefined;\n  private readonly _children: Set<DependencyVertex> = new Set<DependencyVertex>();\n  private readonly _parents: Set<DependencyVertex> = new Set<DependencyVertex>();\n\n  constructor(value: IConstruct | undefined = undefined) {\n    this._value = value;\n  }\n\n  /**\n   * Returns the IConstruct this graph vertex represents.\n   *\n   * `null` in case this is the root of the graph.\n   */\n  public get value(): IConstruct | undefined {\n    return this._value;\n  }\n\n  /**\n   * Returns the children of the vertex (i.e dependencies)\n   */\n  public get outbound(): Array<DependencyVertex> {\n    return Array.from(this._children);\n  }\n\n  /**\n   * Returns the parents of the vertex (i.e dependants)\n   */\n  public get inbound(): Array<DependencyVertex> {\n    return Array.from(this._parents);\n  }\n\n  /**\n   * Returns a topologically sorted array of the constructs in the sub-graph.\n   */\n  public topology(): IConstruct[] {\n\n    const found = new Set<DependencyVertex>();\n    const topology: DependencyVertex[] = [];\n\n    function visit(n: DependencyVertex) {\n      for (const c of n.outbound) {\n        visit(c);\n      }\n      if (!found.has(n)) {\n        topology.push(n);\n        found.add(n);\n      }\n    }\n\n    visit(this);\n\n    return topology.filter(d => d.value).map(d => d.value!);\n\n  }\n\n  /**\n   * Adds a vertex as a dependency of the current node.\n   * Also updates the parents of `dep`, so that it contains this node as a parent.\n   *\n   * This operation will fail in case it creates a cycle in the graph.\n   *\n   * @param dep The dependency\n   */\n  public addChild(dep: DependencyVertex) {\n\n    const cycle: DependencyVertex[] = dep.findRoute(this);\n    if (cycle.length !== 0) {\n      cycle.push(dep);\n      throw new Error(`Dependency cycle detected: ${cycle.filter(d => d.value).map(d => d.value!.node.path).join(' => ')}`);\n    }\n\n    this._children.add(dep);\n    dep.addParent(this);\n  }\n\n  private addParent(dep: DependencyVertex) {\n    this._parents.add(dep);\n  }\n\n  private findRoute(dst: DependencyVertex): DependencyVertex[] {\n\n    const route: DependencyVertex[] = [];\n    visit(this);\n    return route;\n\n    function visit(n: DependencyVertex): boolean {\n      route.push(n);\n      let found = false;\n      for (const c of n.outbound) {\n        if (c === dst) {\n          route.push(c);\n          return true;\n        }\n        found = visit(c);\n      }\n      if (!found) {\n        route.pop();\n      }\n      return found;\n\n    }\n\n  }\n}\n"]}
|
|
149032
149032
|
|
|
149033
149033
|
/***/ }),
|
|
@@ -149236,7 +149236,7 @@ class Duration {
|
|
|
149236
149236
|
}
|
|
149237
149237
|
exports.Duration = Duration;
|
|
149238
149238
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149239
|
-
Duration[_a] = { fqn: "cdk8s.Duration", version: "2.69.
|
|
149239
|
+
Duration[_a] = { fqn: "cdk8s.Duration", version: "2.69.57" };
|
|
149240
149240
|
class TimeUnit {
|
|
149241
149241
|
constructor(label, inMillis) {
|
|
149242
149242
|
this.label = label;
|
|
@@ -149332,7 +149332,7 @@ class Helm extends include_1.Include {
|
|
|
149332
149332
|
}
|
|
149333
149333
|
exports.Helm = Helm;
|
|
149334
149334
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149335
|
-
Helm[_a] = { fqn: "cdk8s.Helm", version: "2.69.
|
|
149335
|
+
Helm[_a] = { fqn: "cdk8s.Helm", version: "2.69.57" };
|
|
149336
149336
|
function renderTemplate(workdir, prog, args) {
|
|
149337
149337
|
const helm = _child_process_1._child_process.spawnSync(prog, args, {
|
|
149338
149338
|
maxBuffer: MAX_HELM_BUFFER,
|
|
@@ -149396,7 +149396,7 @@ class Include extends constructs_1.Construct {
|
|
|
149396
149396
|
}
|
|
149397
149397
|
exports.Include = Include;
|
|
149398
149398
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149399
|
-
Include[_a] = { fqn: "cdk8s.Include", version: "2.69.
|
|
149399
|
+
Include[_a] = { fqn: "cdk8s.Include", version: "2.69.57" };
|
|
149400
149400
|
//# sourceMappingURL=data:application/json;base64,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
|
|
149401
149401
|
|
|
149402
149402
|
/***/ }),
|
|
@@ -149534,7 +149534,7 @@ class JsonPatch {
|
|
|
149534
149534
|
}
|
|
149535
149535
|
exports.JsonPatch = JsonPatch;
|
|
149536
149536
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149537
|
-
JsonPatch[_a] = { fqn: "cdk8s.JsonPatch", version: "2.69.
|
|
149537
|
+
JsonPatch[_a] = { fqn: "cdk8s.JsonPatch", version: "2.69.57" };
|
|
149538
149538
|
//# sourceMappingURL=data:application/json;base64,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
|
|
149539
149539
|
|
|
149540
149540
|
/***/ }),
|
|
@@ -149561,7 +149561,7 @@ class Lazy {
|
|
|
149561
149561
|
}
|
|
149562
149562
|
exports.Lazy = Lazy;
|
|
149563
149563
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149564
|
-
Lazy[_a] = { fqn: "cdk8s.Lazy", version: "2.69.
|
|
149564
|
+
Lazy[_a] = { fqn: "cdk8s.Lazy", version: "2.69.57" };
|
|
149565
149565
|
//# sourceMappingURL=data:application/json;base64,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
|
|
149566
149566
|
|
|
149567
149567
|
/***/ }),
|
|
@@ -149660,7 +149660,7 @@ class ApiObjectMetadataDefinition {
|
|
|
149660
149660
|
}
|
|
149661
149661
|
exports.ApiObjectMetadataDefinition = ApiObjectMetadataDefinition;
|
|
149662
149662
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149663
|
-
ApiObjectMetadataDefinition[_a] = { fqn: "cdk8s.ApiObjectMetadataDefinition", version: "2.69.
|
|
149663
|
+
ApiObjectMetadataDefinition[_a] = { fqn: "cdk8s.ApiObjectMetadataDefinition", version: "2.69.57" };
|
|
149664
149664
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"metadata.js","sourceRoot":"","sources":["../src/metadata.ts"],"names":[],"mappings":";;;;;AAAA,mCAAwC;AAExC,uCAAoC;AAmHpC;;GAEG;AACH,MAAa,2BAA2B;IA8CtC,YAAY,OAA2C;QACrD,IAAI,CAAC,IAAI,GAAG,OAAO,CAAC,IAAI,CAAC;QACzB,IAAI,CAAC,MAAM,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,EAAE,CAAC;QAC5C,IAAI,CAAC,WAAW,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,WAAW,IAAI,EAAE,CAAC,EAAE,CAAC;QACtD,IAAI,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACpE,IAAI,CAAC,eAAe,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACnF,IAAI,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,qBAAqB,GAAG,OAAO,CAAC;QAErC,+EAA+E;QAC/E,OAAO,IAAI,CAAC,qBAAqB,CAAC,SAAS,CAAC;IAC9C,CAAC;IAED;;;;;OAKG;IACI,QAAQ,CAAC,GAAW,EAAE,KAAa;QACxC,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,GAAW;QACzB,OAAO,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,GAAW,EAAE,KAAa;QAC7C,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAChC,CAAC;IAED;;;;OAIG;IACI,aAAa,CAAC,GAAG,UAAoB;QAC1C,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,UAAU,CAAC,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,KAAqB;QAC5C,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACnC,CAAC;IAED;;;;OAIG;IACI,GAAG,CAAC,GAAW,EAAE,KAAU;QAChC,IAAI,CAAC,qBAAqB,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC1C,CAAC;IAED;;OAEG;IACI,MAAM;QACX,MAAM,QAAQ,GAAG,CAAC,CAAM,EAAE,EAAE,CAAC,IAAA,qBAAa,EAAC,CAAC,EAAE,EAAE,iBAAiB,EAAE,IAAI,EAAE,kBAAkB,EAAE,IAAI,EAAE,CAAC,CAAC;QACrG,OAAO,QAAQ,CAAC,IAAA,iBAAO,EAAC,EAAE,EAAE;YAC1B,GAAG,IAAI,CAAC,qBAAqB;YAC7B,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,MAAM,EAAE,IAAI,CAAC,MAAM;SACpB,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IACtB,CAAC;;AAjIH,kEAkIC","sourcesContent":["import { sanitizeValue } from './_util';\nimport { ApiObject } from './api-object';\nimport { resolve } from './resolve';\n\n/**\n * Metadata associated with this object.\n */\nexport interface ApiObjectMetadata {\n  /**\n   * The unique, namespace-global, name of this object inside the Kubernetes\n   * cluster.\n   *\n   * Normally, you shouldn't specify names for objects and let the CDK generate\n   * a name for you that is application-unique. The names CDK generates are\n   * composed from the construct path components, separated by dots and a suffix\n   * that is based on a hash of the entire path, to ensure uniqueness.\n   *\n   * You can supply custom name allocation logic by overriding the\n   * `chart.generateObjectName` method.\n   *\n   * If you use an explicit name here, bear in mind that this reduces the\n   * composability of your construct because it won't be possible to include\n   * more than one instance in any app. Therefore it is highly recommended to\n   * leave this unspecified.\n   *\n   * @default - an app-unique name generated by the chart\n   */\n  readonly name?: string;\n\n  /**\n   * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be\n   * preserved when modifying objects.\n   *\n   * @see http://kubernetes.io/docs/user-guide/annotations\n   * @default - No annotations.\n   */\n  readonly annotations?: { [key: string]: string };\n\n  /**\n   * Map of string keys and values that can be used to organize and categorize (scope and select) objects.\n   * May match selectors of replication controllers and services.\n   *\n   * @see http://kubernetes.io/docs/user-guide/labels\n   * @default - No labels.\n   */\n  readonly labels?: { [key: string]: string };\n\n  /**\n   * Namespace defines the space within each name must be unique. An empty namespace is equivalent to the \"default\" namespace, but \"default\" is the canonical representation.\n   * Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty. Must be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces\n   *\n   * @default undefined (will be assigned to the 'default' namespace)\n   */\n  readonly namespace?: string;\n\n  /**\n   * Namespaced keys that tell Kubernetes to wait until specific conditions are\n   * met before it fully deletes resources marked for deletion.\n   *\n   * Must be empty before the object is deleted from the registry. Each entry is\n   * an identifier for the responsible component that will remove the entry from\n   * the list. If the deletionTimestamp of the object is non-nil, entries in\n   * this list can only be removed. Finalizers may be processed and removed in\n   * any order.  Order is NOT enforced because it introduces significant risk of\n   * stuck finalizers. finalizers is a shared field, any actor with permission\n   * can reorder it. If the finalizer list is processed in order, then this can\n   * lead to a situation in which the component responsible for the first\n   * finalizer in the list is waiting for a signal (field value, external\n   * system, or other) produced by a component responsible for a finalizer later\n   * in the list, resulting in a deadlock. Without enforced ordering finalizers\n   * are free to order amongst themselves and are not vulnerable to ordering\n   * changes in the list.\n   *\n   * @see https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/\n   * @default - No finalizers.\n   */\n  readonly finalizers?: string[];\n\n  /**\n   * List of objects depended by this object. If ALL objects in the list have\n   * been deleted, this object will be garbage collected. If this object is\n   * managed by a controller, then an entry in this list will point to this\n   * controller, with the controller field set to true. There cannot be more\n   * than one managing controller.\n   *\n   * Kubernetes sets the value of this field automatically for objects that are\n   * dependents of other objects like ReplicaSets, DaemonSets, Deployments, Jobs\n   * and CronJobs, and ReplicationControllers. You can also configure these\n   * relationships manually by changing the value of this field. However, you\n   * usually don't need to and can allow Kubernetes to automatically manage the\n   * relationships.\n   *\n   * @see https://kubernetes.io/docs/concepts/overview/working-with-objects/owners-dependents/\n   * @default - automatically set by Kubernetes\n   */\n  readonly ownerReferences?: OwnerReference[];\n\n  /**\n   * Additional metadata attributes.\n   * @jsii ignore\n   * @see https://github.com/cdk8s-team/cdk8s-core/issues/1297\n   */\n  readonly [key: string]: any;\n}\n\n/**\n * Options for `ApiObjectMetadataDefinition`.\n */\nexport interface ApiObjectMetadataDefinitionOptions extends ApiObjectMetadata {\n\n  /**\n   * Which ApiObject instance is the metadata attached to.\n   */\n  readonly apiObject: ApiObject;\n\n}\n\n/**\n * Object metadata.\n */\nexport class ApiObjectMetadataDefinition {\n  /**\n   * The name of the API object.\n   *\n   * If a name is specified in `metadata.name` this will be the name returned.\n   * Otherwise, a name will be generated by calling\n   * `Chart.of(this).generatedObjectName(this)`, which by default uses the\n   * construct path to generate a DNS-compatible name for the resource.\n   */\n  public readonly name?: string;\n\n  /**\n   * The object's namespace.\n   */\n  public readonly namespace?: string;\n\n  /**\n   * Labels associated with this object.\n   */\n  private readonly labels: { [key: string]: string };\n\n  /**\n   * Annotations associated with this object.\n   */\n  private readonly annotations: { [key: string]: string };\n\n  /**\n   * Finalizers associated with this object.\n   */\n  private readonly finalizers: string[];\n\n  /**\n   * Owner references set for this object.\n   */\n  private readonly ownerReferences: OwnerReference[];\n\n  /**\n   * The ApiObject this metadata is attached to.\n   */\n  private readonly apiObject: ApiObject;\n\n  /**\n   * Additional metadata attributes passed through `options`.\n   */\n  private readonly _additionalAttributes: { [key: string]: any };\n\n  constructor(options: ApiObjectMetadataDefinitionOptions) {\n    this.name = options.name;\n    this.labels = { ...(options.labels ?? {}) };\n    this.annotations = { ...(options.annotations ?? {}) };\n    this.namespace = options.namespace;\n    this.finalizers = options.finalizers ? [...options.finalizers] : [];\n    this.ownerReferences = options.ownerReferences ? [...options.ownerReferences] : [];\n    this.apiObject = options.apiObject;\n    this._additionalAttributes = options;\n\n    // otherwise apiObject is passed to the resolving logic, which expectadly fails\n    delete this._additionalAttributes.apiObject;\n  }\n\n  /**\n   * Add a label.\n   *\n   * @param key - The key.\n   * @param value - The value.\n   */\n  public addLabel(key: string, value: string) {\n    this.labels[key] = value;\n  }\n\n  /**\n   * @returns a value of a label or undefined\n   * @param key the label\n   */\n  public getLabel(key: string): string | undefined {\n    return this.labels[key];\n  }\n\n  /**\n   * Add an annotation.\n   *\n   * @param key - The key.\n   * @param value - The value.\n   */\n  public addAnnotation(key: string, value: string) {\n    this.annotations[key] = value;\n  }\n\n  /**\n   * Add one or more finalizers.\n   *\n   * @param finalizers the finalizers\n   */\n  public addFinalizers(...finalizers: string[]) {\n    this.finalizers.push(...finalizers);\n  }\n\n  /**\n   * Add an owner.\n   *\n   * @param owner the owner\n   */\n  public addOwnerReference(owner: OwnerReference) {\n    this.ownerReferences.push(owner);\n  }\n\n  /**\n   * Adds an arbitrary key/value to the object metadata.\n   * @param key Metadata key\n   * @param value Metadata value\n   */\n  public add(key: string, value: any) {\n    this._additionalAttributes[key] = value;\n  }\n\n  /**\n   * Synthesizes a k8s ObjectMeta for this metadata set.\n   */\n  public toJson() {\n    const sanitize = (x: any) => sanitizeValue(x, { filterEmptyArrays: true, filterEmptyObjects: true });\n    return sanitize(resolve([], {\n      ...this._additionalAttributes,\n      name: this.name,\n      namespace: this.namespace,\n      annotations: this.annotations,\n      finalizers: this.finalizers,\n      ownerReferences: this.ownerReferences,\n      labels: this.labels,\n    }, this.apiObject));\n  }\n}\n\n/**\n * OwnerReference contains enough information to let you identify an owning\n * object. An owning object must be in the same namespace as the dependent, or\n * be cluster-scoped, so there is no namespace field.\n */\nexport interface OwnerReference {\n  /**\n   * API version of the referent.\n   */\n  readonly apiVersion: string;\n\n  /**\n   * If true, AND if the owner has the \"foregroundDeletion\" finalizer, then the\n   * owner cannot be deleted from the key-value store until this reference is\n   * removed. Defaults to false. To set this field, a user needs \"delete\"\n   * permission of the owner, otherwise 422 (Unprocessable Entity) will be\n   * returned.\n   *\n   * @default false. To set this field, a user needs \"delete\" permission of the\n   * owner, otherwise 422 (Unprocessable Entity) will be returned.\n   */\n  readonly blockOwnerDeletion?: boolean;\n\n  /**\n   * If true, this reference points to the managing controller.\n   */\n  readonly controller?: boolean;\n\n  /**\n   * Kind of the referent.\n   *\n   * @see https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds\n   */\n  readonly kind: string;\n\n  /**\n   * Name of the referent.\n   *\n   * @see http://kubernetes.io/docs/user-guide/identifiers#names\n   */\n  readonly name: string;\n\n  /**\n   * UID of the referent.\n   *\n   * @see http://kubernetes.io/docs/user-guide/identifiers#uids\n   */\n  readonly uid: string;\n\n}\n"]}
|
|
149665
149665
|
|
|
149666
149666
|
/***/ }),
|
|
@@ -149791,7 +149791,7 @@ class Names {
|
|
|
149791
149791
|
}
|
|
149792
149792
|
exports.Names = Names;
|
|
149793
149793
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149794
|
-
Names[_a] = { fqn: "cdk8s.Names", version: "2.69.
|
|
149794
|
+
Names[_a] = { fqn: "cdk8s.Names", version: "2.69.57" };
|
|
149795
149795
|
function omitDuplicates(value, index, components) {
|
|
149796
149796
|
return value !== components[index - 1];
|
|
149797
149797
|
}
|
|
@@ -149883,7 +149883,7 @@ class ResolutionContext {
|
|
|
149883
149883
|
}
|
|
149884
149884
|
exports.ResolutionContext = ResolutionContext;
|
|
149885
149885
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149886
|
-
ResolutionContext[_a] = { fqn: "cdk8s.ResolutionContext", version: "2.69.
|
|
149886
|
+
ResolutionContext[_a] = { fqn: "cdk8s.ResolutionContext", version: "2.69.57" };
|
|
149887
149887
|
/**
|
|
149888
149888
|
* Resolvers instanecs of `Lazy`.
|
|
149889
149889
|
*/
|
|
@@ -149897,7 +149897,7 @@ class LazyResolver {
|
|
|
149897
149897
|
}
|
|
149898
149898
|
exports.LazyResolver = LazyResolver;
|
|
149899
149899
|
_b = JSII_RTTI_SYMBOL_1;
|
|
149900
|
-
LazyResolver[_b] = { fqn: "cdk8s.LazyResolver", version: "2.69.
|
|
149900
|
+
LazyResolver[_b] = { fqn: "cdk8s.LazyResolver", version: "2.69.57" };
|
|
149901
149901
|
/**
|
|
149902
149902
|
* Resolves implicit tokens.
|
|
149903
149903
|
*/
|
|
@@ -149911,7 +149911,7 @@ class ImplicitTokenResolver {
|
|
|
149911
149911
|
}
|
|
149912
149912
|
exports.ImplicitTokenResolver = ImplicitTokenResolver;
|
|
149913
149913
|
_c = JSII_RTTI_SYMBOL_1;
|
|
149914
|
-
ImplicitTokenResolver[_c] = { fqn: "cdk8s.ImplicitTokenResolver", version: "2.69.
|
|
149914
|
+
ImplicitTokenResolver[_c] = { fqn: "cdk8s.ImplicitTokenResolver", version: "2.69.57" };
|
|
149915
149915
|
/**
|
|
149916
149916
|
* Resolves union types that allow using either number or string (as generated by the CLI).
|
|
149917
149917
|
*
|
|
@@ -149932,7 +149932,7 @@ class NumberStringUnionResolver {
|
|
|
149932
149932
|
}
|
|
149933
149933
|
exports.NumberStringUnionResolver = NumberStringUnionResolver;
|
|
149934
149934
|
_d = JSII_RTTI_SYMBOL_1;
|
|
149935
|
-
NumberStringUnionResolver[_d] = { fqn: "cdk8s.NumberStringUnionResolver", version: "2.69.
|
|
149935
|
+
NumberStringUnionResolver[_d] = { fqn: "cdk8s.NumberStringUnionResolver", version: "2.69.57" };
|
|
149936
149936
|
NumberStringUnionResolver.TYPES = ['number', 'string'];
|
|
149937
149937
|
/**
|
|
149938
149938
|
* Resolves any value attached to a specific ApiObject.
|
|
@@ -150068,7 +150068,7 @@ class Size {
|
|
|
150068
150068
|
}
|
|
150069
150069
|
exports.Size = Size;
|
|
150070
150070
|
_a = JSII_RTTI_SYMBOL_1;
|
|
150071
|
-
Size[_a] = { fqn: "cdk8s.Size", version: "2.69.
|
|
150071
|
+
Size[_a] = { fqn: "cdk8s.Size", version: "2.69.57" };
|
|
150072
150072
|
/**
|
|
150073
150073
|
* Rounding behaviour when converting between units of `Size`.
|
|
150074
150074
|
*/
|
|
@@ -150173,7 +150173,7 @@ class Testing {
|
|
|
150173
150173
|
}
|
|
150174
150174
|
exports.Testing = Testing;
|
|
150175
150175
|
_a = JSII_RTTI_SYMBOL_1;
|
|
150176
|
-
Testing[_a] = { fqn: "cdk8s.Testing", version: "2.69.
|
|
150176
|
+
Testing[_a] = { fqn: "cdk8s.Testing", version: "2.69.57" };
|
|
150177
150177
|
//# sourceMappingURL=data:application/json;base64,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
|
|
150178
150178
|
|
|
150179
150179
|
/***/ }),
|
|
@@ -150282,19 +150282,19 @@ class Yaml {
|
|
|
150282
150282
|
}
|
|
150283
150283
|
exports.Yaml = Yaml;
|
|
150284
150284
|
_a = JSII_RTTI_SYMBOL_1;
|
|
150285
|
-
Yaml[_a] = { fqn: "cdk8s.Yaml", version: "2.69.
|
|
150285
|
+
Yaml[_a] = { fqn: "cdk8s.Yaml", version: "2.69.57" };
|
|
150286
150286
|
/**
|
|
150287
150287
|
* Loads a url (or file) and returns the contents.
|
|
150288
150288
|
* This method spawns a child process in order to perform an http call synchronously.
|
|
150289
150289
|
*/
|
|
150290
150290
|
function loadurl(url) {
|
|
150291
|
-
const script = __nccwpck_require__.ab + "_loadurl.
|
|
150292
|
-
return (0, child_process_1.execFileSync)(process.execPath, [__nccwpck_require__.ab + "_loadurl.
|
|
150291
|
+
const script = __nccwpck_require__.ab + "_loadurl.mjs";
|
|
150292
|
+
return (0, child_process_1.execFileSync)(process.execPath, [__nccwpck_require__.ab + "_loadurl.mjs", url], {
|
|
150293
150293
|
encoding: 'utf-8',
|
|
150294
150294
|
maxBuffer: MAX_DOWNLOAD_BUFFER,
|
|
150295
150295
|
}).toString();
|
|
150296
150296
|
}
|
|
150297
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
150297
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
150298
150298
|
|
|
150299
150299
|
/***/ }),
|
|
150300
150300
|
|
|
@@ -224043,7 +224043,7 @@ class Sender {
|
|
|
224043
224043
|
/**
|
|
224044
224044
|
* Sends a frame.
|
|
224045
224045
|
*
|
|
224046
|
-
* @param {Buffer[]} list The frame to send
|
|
224046
|
+
* @param {(Buffer | String)[]} list The frame to send
|
|
224047
224047
|
* @param {Function} [cb] Callback
|
|
224048
224048
|
* @private
|
|
224049
224049
|
*/
|
|
@@ -224100,8 +224100,10 @@ function onError(sender, err, cb) {
|
|
|
224100
224100
|
/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => {
|
|
224101
224101
|
|
|
224102
224102
|
"use strict";
|
|
224103
|
+
/* eslint no-unused-vars: ["error", { "varsIgnorePattern": "^WebSocket$" }] */
|
|
224103
224104
|
|
|
224104
224105
|
|
|
224106
|
+
const WebSocket = __nccwpck_require__(69427);
|
|
224105
224107
|
const { Duplex } = __nccwpck_require__(12781);
|
|
224106
224108
|
|
|
224107
224109
|
/**
|
|
@@ -284107,8 +284109,13 @@ const SafeEval = {
|
|
|
284107
284109
|
return ast.value;
|
|
284108
284110
|
},
|
|
284109
284111
|
evalMemberExpression(ast, subs) {
|
|
284110
|
-
const prop =
|
|
284111
|
-
:
|
|
284112
|
+
const prop = String(
|
|
284113
|
+
// NOTE: `String(value)` throws error when
|
|
284114
|
+
// value has overwritten the toString method to return non-string
|
|
284115
|
+
// i.e. `value = {toString: () => []}`
|
|
284116
|
+
ast.computed ? SafeEval.evalAst(ast.property) // `object[property]`
|
|
284117
|
+
: ast.property.name // `object.property` property is Identifier
|
|
284118
|
+
);
|
|
284112
284119
|
const obj = SafeEval.evalAst(ast.object, subs);
|
|
284113
284120
|
if (obj === undefined || obj === null) {
|
|
284114
284121
|
throw TypeError(`Cannot read properties of ${obj} (reading '${prop}')`);
|
|
@@ -284885,7 +284892,7 @@ Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{val
|
|
|
284885
284892
|
|
|
284886
284893
|
/***/ }),
|
|
284887
284894
|
|
|
284888
|
-
/***/
|
|
284895
|
+
/***/ 91188:
|
|
284889
284896
|
/***/ ((__unused_webpack___webpack_module__, __webpack_exports__, __nccwpck_require__) => {
|
|
284890
284897
|
|
|
284891
284898
|
"use strict";
|
|
@@ -284925,8 +284932,10 @@ __nccwpck_require__.d(__webpack_exports__, {
|
|
|
284925
284932
|
"genericGrantRequest": () => (/* binding */ genericGrantRequest),
|
|
284926
284933
|
"getDPoPHandle": () => (/* binding */ getDPoPHandle),
|
|
284927
284934
|
"getJwksCache": () => (/* binding */ getJwksCache),
|
|
284935
|
+
"initiateBackchannelAuthentication": () => (/* binding */ initiateBackchannelAuthentication),
|
|
284928
284936
|
"initiateDeviceAuthorization": () => (/* binding */ initiateDeviceAuthorization),
|
|
284929
284937
|
"modifyAssertion": () => (/* binding */ build_modifyAssertion),
|
|
284938
|
+
"pollBackchannelAuthenticationGrant": () => (/* binding */ pollBackchannelAuthenticationGrant),
|
|
284930
284939
|
"pollDeviceAuthorizationGrant": () => (/* binding */ pollDeviceAuthorizationGrant),
|
|
284931
284940
|
"randomDPoPKeyPair": () => (/* binding */ randomDPoPKeyPair),
|
|
284932
284941
|
"randomNonce": () => (/* binding */ randomNonce),
|
|
@@ -284946,7 +284955,7 @@ __nccwpck_require__.d(__webpack_exports__, {
|
|
|
284946
284955
|
let USER_AGENT;
|
|
284947
284956
|
if (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {
|
|
284948
284957
|
const NAME = 'oauth4webapi';
|
|
284949
|
-
const VERSION = 'v3.1
|
|
284958
|
+
const VERSION = 'v3.3.1';
|
|
284950
284959
|
USER_AGENT = `${NAME}/${VERSION}`;
|
|
284951
284960
|
}
|
|
284952
284961
|
function looseInstanceOf(input, expected) {
|
|
@@ -284975,11 +284984,11 @@ const customFetch = Symbol();
|
|
|
284975
284984
|
const modifyAssertion = Symbol();
|
|
284976
284985
|
const jweDecrypt = Symbol();
|
|
284977
284986
|
const build_jwksCache = Symbol();
|
|
284978
|
-
const
|
|
284987
|
+
const build_encoder = new TextEncoder();
|
|
284979
284988
|
const decoder = new TextDecoder();
|
|
284980
284989
|
function buf(input) {
|
|
284981
284990
|
if (typeof input === 'string') {
|
|
284982
|
-
return
|
|
284991
|
+
return build_encoder.encode(input);
|
|
284983
284992
|
}
|
|
284984
284993
|
return decoder.decode(input);
|
|
284985
284994
|
}
|
|
@@ -285007,7 +285016,7 @@ function decodeBase64Url(input) {
|
|
|
285007
285016
|
throw CodedTypeError('The input to be decoded is not correctly encoded.', ERR_INVALID_ARG_VALUE, cause);
|
|
285008
285017
|
}
|
|
285009
285018
|
}
|
|
285010
|
-
function
|
|
285019
|
+
function build_b64u(input) {
|
|
285011
285020
|
if (typeof input === 'string') {
|
|
285012
285021
|
return decodeBase64Url(input);
|
|
285013
285022
|
}
|
|
@@ -285166,12 +285175,12 @@ async function processDiscoveryResponse(expectedIssuerIdentifier, response) {
|
|
|
285166
285175
|
throw OPE('"response" is not a conform Authorization Server Metadata response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
285167
285176
|
}
|
|
285168
285177
|
assertReadableResponse(response);
|
|
285169
|
-
assertApplicationJson(response);
|
|
285170
285178
|
let json;
|
|
285171
285179
|
try {
|
|
285172
285180
|
json = await response.json();
|
|
285173
285181
|
}
|
|
285174
285182
|
catch (cause) {
|
|
285183
|
+
assertApplicationJson(response);
|
|
285175
285184
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
285176
285185
|
}
|
|
285177
285186
|
if (!isJsonObject(json)) {
|
|
@@ -285212,7 +285221,7 @@ function assertContentType(response, contentType) {
|
|
|
285212
285221
|
}
|
|
285213
285222
|
}
|
|
285214
285223
|
function randomBytes() {
|
|
285215
|
-
return
|
|
285224
|
+
return build_b64u(crypto.getRandomValues(new Uint8Array(32)));
|
|
285216
285225
|
}
|
|
285217
285226
|
function generateRandomCodeVerifier() {
|
|
285218
285227
|
return randomBytes();
|
|
@@ -285225,7 +285234,7 @@ function generateRandomNonce() {
|
|
|
285225
285234
|
}
|
|
285226
285235
|
async function calculatePKCECodeChallenge(codeVerifier) {
|
|
285227
285236
|
assertString(codeVerifier, 'codeVerifier');
|
|
285228
|
-
return
|
|
285237
|
+
return build_b64u(await crypto.subtle.digest('SHA-256', buf(codeVerifier)));
|
|
285229
285238
|
}
|
|
285230
285239
|
function getKeyAndKid(input) {
|
|
285231
285240
|
if (input instanceof CryptoKey) {
|
|
@@ -285391,11 +285400,11 @@ function ClientSecretJwt(clientSecret, options) {
|
|
|
285391
285400
|
const header = { alg: 'HS256' };
|
|
285392
285401
|
const payload = clientAssertionPayload(as, client);
|
|
285393
285402
|
modify?.(header, payload);
|
|
285394
|
-
const data = `${
|
|
285403
|
+
const data = `${build_b64u(buf(JSON.stringify(header)))}.${build_b64u(buf(JSON.stringify(payload)))}`;
|
|
285395
285404
|
const hmac = await crypto.subtle.sign(key.algorithm, key, buf(data));
|
|
285396
285405
|
body.set('client_id', client.client_id);
|
|
285397
285406
|
body.set('client_assertion_type', 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer');
|
|
285398
|
-
body.set('client_assertion', `${data}.${
|
|
285407
|
+
body.set('client_assertion', `${data}.${build_b64u(new Uint8Array(hmac))}`);
|
|
285399
285408
|
};
|
|
285400
285409
|
}
|
|
285401
285410
|
function None() {
|
|
@@ -285410,8 +285419,8 @@ async function signJwt(header, payload, key) {
|
|
|
285410
285419
|
if (!key.usages.includes('sign')) {
|
|
285411
285420
|
throw CodedTypeError('CryptoKey instances used for signing assertions must include "sign" in their "usages"', ERR_INVALID_ARG_VALUE);
|
|
285412
285421
|
}
|
|
285413
|
-
const input = `${
|
|
285414
|
-
const signature =
|
|
285422
|
+
const input = `${build_b64u(buf(JSON.stringify(header)))}.${build_b64u(buf(JSON.stringify(payload)))}`;
|
|
285423
|
+
const signature = build_b64u(await crypto.subtle.sign(keyToSubtle(key), key, buf(input)));
|
|
285415
285424
|
return `${input}.${signature}`;
|
|
285416
285425
|
}
|
|
285417
285426
|
async function issueRequestObject(as, client, parameters, privateKey, options) {
|
|
@@ -285547,6 +285556,7 @@ class DPoPHandler {
|
|
|
285547
285556
|
#clockSkew;
|
|
285548
285557
|
#modifyAssertion;
|
|
285549
285558
|
#map;
|
|
285559
|
+
#jkt;
|
|
285550
285560
|
constructor(client, keyPair, options) {
|
|
285551
285561
|
assertPrivateKey(keyPair?.privateKey, '"DPoP.privateKey"');
|
|
285552
285562
|
assertPublicKey(keyPair?.publicKey, '"DPoP.publicKey"');
|
|
@@ -285576,6 +285586,27 @@ class DPoPHandler {
|
|
|
285576
285586
|
}
|
|
285577
285587
|
this.#map.set(key, val);
|
|
285578
285588
|
}
|
|
285589
|
+
async calculateThumbprint() {
|
|
285590
|
+
if (!this.#jkt) {
|
|
285591
|
+
const jwk = await crypto.subtle.exportKey('jwk', this.#publicKey);
|
|
285592
|
+
let components;
|
|
285593
|
+
switch (jwk.kty) {
|
|
285594
|
+
case 'EC':
|
|
285595
|
+
components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x, y: jwk.y };
|
|
285596
|
+
break;
|
|
285597
|
+
case 'OKP':
|
|
285598
|
+
components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x };
|
|
285599
|
+
break;
|
|
285600
|
+
case 'RSA':
|
|
285601
|
+
components = { e: jwk.e, kty: jwk.kty, n: jwk.n };
|
|
285602
|
+
break;
|
|
285603
|
+
default:
|
|
285604
|
+
throw new UnsupportedOperationError('unsupported JWK', { cause: { jwk } });
|
|
285605
|
+
}
|
|
285606
|
+
this.#jkt ||= build_b64u(await crypto.subtle.digest({ name: 'SHA-256' }, buf(JSON.stringify(components))));
|
|
285607
|
+
}
|
|
285608
|
+
return this.#jkt;
|
|
285609
|
+
}
|
|
285579
285610
|
async addProof(url, headers, htm, accessToken) {
|
|
285580
285611
|
this.#header ||= {
|
|
285581
285612
|
alg: keyToJws(this.#privateKey),
|
|
@@ -285590,7 +285621,7 @@ class DPoPHandler {
|
|
|
285590
285621
|
htm,
|
|
285591
285622
|
nonce,
|
|
285592
285623
|
htu: `${url.origin}${url.pathname}`,
|
|
285593
|
-
ath: accessToken ?
|
|
285624
|
+
ath: accessToken ? build_b64u(await crypto.subtle.digest('SHA-256', buf(accessToken))) : undefined,
|
|
285594
285625
|
};
|
|
285595
285626
|
this.#modifyAssertion?.(this.#header, payload);
|
|
285596
285627
|
headers.set('dpop', await signJwt(this.#header, payload, this.#privateKey));
|
|
@@ -285732,28 +285763,15 @@ async function processPushedAuthorizationResponse(as, client, response) {
|
|
|
285732
285763
|
if (!looseInstanceOf(response, Response)) {
|
|
285733
285764
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
285734
285765
|
}
|
|
285735
|
-
|
|
285736
|
-
|
|
285737
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
285738
|
-
}
|
|
285739
|
-
if (response.status !== 201) {
|
|
285740
|
-
let err;
|
|
285741
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
285742
|
-
await response.body?.cancel();
|
|
285743
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
285744
|
-
cause: err,
|
|
285745
|
-
response,
|
|
285746
|
-
});
|
|
285747
|
-
}
|
|
285748
|
-
throw OPE('"response" is not a conform Pushed Authorization Request Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
285749
|
-
}
|
|
285766
|
+
checkAuthenticationChallenges(response);
|
|
285767
|
+
await checkOAuthBodyError(response, 201, 'Pushed Authorization Request Endpoint');
|
|
285750
285768
|
assertReadableResponse(response);
|
|
285751
|
-
assertApplicationJson(response);
|
|
285752
285769
|
let json;
|
|
285753
285770
|
try {
|
|
285754
285771
|
json = await response.json();
|
|
285755
285772
|
}
|
|
285756
285773
|
catch (cause) {
|
|
285774
|
+
assertApplicationJson(response);
|
|
285757
285775
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
285758
285776
|
}
|
|
285759
285777
|
if (!isJsonObject(json)) {
|
|
@@ -285769,6 +285787,33 @@ async function processPushedAuthorizationResponse(as, client, response) {
|
|
|
285769
285787
|
json.expires_in = expiresIn;
|
|
285770
285788
|
return json;
|
|
285771
285789
|
}
|
|
285790
|
+
async function parseOAuthResponseErrorBody(response) {
|
|
285791
|
+
if (response.status > 399 && response.status < 500) {
|
|
285792
|
+
assertReadableResponse(response);
|
|
285793
|
+
assertApplicationJson(response);
|
|
285794
|
+
try {
|
|
285795
|
+
const json = await response.clone().json();
|
|
285796
|
+
if (isJsonObject(json) && typeof json.error === 'string' && json.error.length) {
|
|
285797
|
+
return json;
|
|
285798
|
+
}
|
|
285799
|
+
}
|
|
285800
|
+
catch { }
|
|
285801
|
+
}
|
|
285802
|
+
return undefined;
|
|
285803
|
+
}
|
|
285804
|
+
async function checkOAuthBodyError(response, expected, label) {
|
|
285805
|
+
if (response.status !== expected) {
|
|
285806
|
+
let err;
|
|
285807
|
+
if ((err = await parseOAuthResponseErrorBody(response))) {
|
|
285808
|
+
await response.body?.cancel();
|
|
285809
|
+
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
285810
|
+
cause: err,
|
|
285811
|
+
response,
|
|
285812
|
+
});
|
|
285813
|
+
}
|
|
285814
|
+
throw OPE(`"response" is not a conform ${label} response (unexpected HTTP status code)`, RESPONSE_IS_NOT_CONFORM, response);
|
|
285815
|
+
}
|
|
285816
|
+
}
|
|
285772
285817
|
function assertDPoP(option) {
|
|
285773
285818
|
if (!branded.has(option)) {
|
|
285774
285819
|
throw CodedTypeError('"options.DPoP" is not a valid DPoPHandle', ERR_INVALID_ARG_VALUE);
|
|
@@ -285800,13 +285845,9 @@ async function resourceRequest(accessToken, method, url, headers, body, options)
|
|
|
285800
285845
|
return response;
|
|
285801
285846
|
}
|
|
285802
285847
|
async function protectedResourceRequest(accessToken, method, url, headers, body, options) {
|
|
285803
|
-
|
|
285804
|
-
|
|
285805
|
-
|
|
285806
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
285807
|
-
}
|
|
285808
|
-
return response;
|
|
285809
|
-
});
|
|
285848
|
+
const response = await resourceRequest(accessToken, method, url, headers, body, options);
|
|
285849
|
+
checkAuthenticationChallenges(response);
|
|
285850
|
+
return response;
|
|
285810
285851
|
}
|
|
285811
285852
|
async function userInfoRequest(as, client, accessToken, options) {
|
|
285812
285853
|
assertAs(as);
|
|
@@ -285944,10 +285985,7 @@ async function processUserInfoResponse(as, client, expectedSubject, response, op
|
|
|
285944
285985
|
if (!looseInstanceOf(response, Response)) {
|
|
285945
285986
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
285946
285987
|
}
|
|
285947
|
-
|
|
285948
|
-
if ((challenges = parseWwwAuthenticateChallenges(response))) {
|
|
285949
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
285950
|
-
}
|
|
285988
|
+
checkAuthenticationChallenges(response);
|
|
285951
285989
|
if (response.status !== 200) {
|
|
285952
285990
|
throw OPE('"response" is not a conform UserInfo Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
285953
285991
|
}
|
|
@@ -285964,11 +286002,11 @@ async function processUserInfoResponse(as, client, expectedSubject, response, op
|
|
|
285964
286002
|
if (client.userinfo_signed_response_alg) {
|
|
285965
286003
|
throw OPE('JWT UserInfo Response expected', JWT_USERINFO_EXPECTED, response);
|
|
285966
286004
|
}
|
|
285967
|
-
assertApplicationJson(response);
|
|
285968
286005
|
try {
|
|
285969
286006
|
json = await response.json();
|
|
285970
286007
|
}
|
|
285971
286008
|
catch (cause) {
|
|
286009
|
+
assertApplicationJson(response);
|
|
285972
286010
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
285973
286011
|
}
|
|
285974
286012
|
}
|
|
@@ -286041,13 +286079,13 @@ async function validateApplicationLevelSignature(as, ref, options) {
|
|
|
286041
286079
|
throw CodedTypeError('"ref" does not contain a processed JWT Response to verify the signature of', ERR_INVALID_ARG_VALUE);
|
|
286042
286080
|
}
|
|
286043
286081
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwtRefs.get(ref).split('.');
|
|
286044
|
-
const header = JSON.parse(buf(
|
|
286082
|
+
const header = JSON.parse(buf(build_b64u(protectedHeader)));
|
|
286045
286083
|
if (header.alg.startsWith('HS')) {
|
|
286046
286084
|
throw new UnsupportedOperationError('unsupported JWS algorithm', { cause: { alg: header.alg } });
|
|
286047
286085
|
}
|
|
286048
286086
|
let key;
|
|
286049
286087
|
key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
286050
|
-
await validateJwsSignature(protectedHeader, payload, key,
|
|
286088
|
+
await validateJwsSignature(protectedHeader, payload, key, build_b64u(encodedSignature));
|
|
286051
286089
|
}
|
|
286052
286090
|
async function processGenericAccessTokenResponse(as, client, response, additionalRequiredIdTokenClaims, options) {
|
|
286053
286091
|
assertAs(as);
|
|
@@ -286055,28 +286093,15 @@ async function processGenericAccessTokenResponse(as, client, response, additiona
|
|
|
286055
286093
|
if (!looseInstanceOf(response, Response)) {
|
|
286056
286094
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
286057
286095
|
}
|
|
286058
|
-
|
|
286059
|
-
|
|
286060
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286061
|
-
}
|
|
286062
|
-
if (response.status !== 200) {
|
|
286063
|
-
let err;
|
|
286064
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
286065
|
-
await response.body?.cancel();
|
|
286066
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
286067
|
-
cause: err,
|
|
286068
|
-
response,
|
|
286069
|
-
});
|
|
286070
|
-
}
|
|
286071
|
-
throw OPE('"response" is not a conform Token Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286072
|
-
}
|
|
286096
|
+
checkAuthenticationChallenges(response);
|
|
286097
|
+
await checkOAuthBodyError(response, 200, 'Token Endpoint');
|
|
286073
286098
|
assertReadableResponse(response);
|
|
286074
|
-
assertApplicationJson(response);
|
|
286075
286099
|
let json;
|
|
286076
286100
|
try {
|
|
286077
286101
|
json = await response.json();
|
|
286078
286102
|
}
|
|
286079
286103
|
catch (cause) {
|
|
286104
|
+
assertApplicationJson(response);
|
|
286080
286105
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
286081
286106
|
}
|
|
286082
286107
|
if (!isJsonObject(json)) {
|
|
@@ -286142,6 +286167,12 @@ async function processGenericAccessTokenResponse(as, client, response, additiona
|
|
|
286142
286167
|
}
|
|
286143
286168
|
return json;
|
|
286144
286169
|
}
|
|
286170
|
+
function checkAuthenticationChallenges(response) {
|
|
286171
|
+
let challenges;
|
|
286172
|
+
if ((challenges = parseWwwAuthenticateChallenges(response))) {
|
|
286173
|
+
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286174
|
+
}
|
|
286175
|
+
}
|
|
286145
286176
|
async function processRefreshTokenResponse(as, client, response, options) {
|
|
286146
286177
|
return processGenericAccessTokenResponse(as, client, response, undefined, options);
|
|
286147
286178
|
}
|
|
@@ -286384,21 +286415,8 @@ async function processRevocationResponse(response) {
|
|
|
286384
286415
|
if (!looseInstanceOf(response, Response)) {
|
|
286385
286416
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
286386
286417
|
}
|
|
286387
|
-
|
|
286388
|
-
|
|
286389
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286390
|
-
}
|
|
286391
|
-
if (response.status !== 200) {
|
|
286392
|
-
let err;
|
|
286393
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
286394
|
-
await response.body?.cancel();
|
|
286395
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
286396
|
-
cause: err,
|
|
286397
|
-
response,
|
|
286398
|
-
});
|
|
286399
|
-
}
|
|
286400
|
-
throw OPE('"response" is not a conform Revocation Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286401
|
-
}
|
|
286418
|
+
checkAuthenticationChallenges(response);
|
|
286419
|
+
await checkOAuthBodyError(response, 200, 'Revocation Endpoint');
|
|
286402
286420
|
return undefined;
|
|
286403
286421
|
}
|
|
286404
286422
|
function assertReadableResponse(response) {
|
|
@@ -286428,21 +286446,8 @@ async function processIntrospectionResponse(as, client, response, options) {
|
|
|
286428
286446
|
if (!looseInstanceOf(response, Response)) {
|
|
286429
286447
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
286430
286448
|
}
|
|
286431
|
-
|
|
286432
|
-
|
|
286433
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286434
|
-
}
|
|
286435
|
-
if (response.status !== 200) {
|
|
286436
|
-
let err;
|
|
286437
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
286438
|
-
await response.body?.cancel();
|
|
286439
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
286440
|
-
cause: err,
|
|
286441
|
-
response,
|
|
286442
|
-
});
|
|
286443
|
-
}
|
|
286444
|
-
throw OPE('"response" is not a conform Introspection Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286445
|
-
}
|
|
286449
|
+
checkAuthenticationChallenges(response);
|
|
286450
|
+
await checkOAuthBodyError(response, 200, 'Introspection Endpoint');
|
|
286446
286451
|
let json;
|
|
286447
286452
|
if (getContentType(response) === 'application/token-introspection+jwt') {
|
|
286448
286453
|
assertReadableResponse(response);
|
|
@@ -286461,11 +286466,11 @@ async function processIntrospectionResponse(as, client, response, options) {
|
|
|
286461
286466
|
}
|
|
286462
286467
|
else {
|
|
286463
286468
|
assertReadableResponse(response);
|
|
286464
|
-
assertApplicationJson(response);
|
|
286465
286469
|
try {
|
|
286466
286470
|
json = await response.json();
|
|
286467
286471
|
}
|
|
286468
286472
|
catch (cause) {
|
|
286473
|
+
assertApplicationJson(response);
|
|
286469
286474
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
286470
286475
|
}
|
|
286471
286476
|
if (!isJsonObject(json)) {
|
|
@@ -286501,12 +286506,12 @@ async function processJwksResponse(response) {
|
|
|
286501
286506
|
throw OPE('"response" is not a conform JSON Web Key Set response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286502
286507
|
}
|
|
286503
286508
|
assertReadableResponse(response);
|
|
286504
|
-
assertContentTypes(response, 'application/json', 'application/jwk-set+json');
|
|
286505
286509
|
let json;
|
|
286506
286510
|
try {
|
|
286507
286511
|
json = await response.json();
|
|
286508
286512
|
}
|
|
286509
286513
|
catch (cause) {
|
|
286514
|
+
assertContentTypes(response, 'application/json', 'application/jwk-set+json');
|
|
286510
286515
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
286511
286516
|
}
|
|
286512
286517
|
if (!isJsonObject(json)) {
|
|
@@ -286520,21 +286525,7 @@ async function processJwksResponse(response) {
|
|
|
286520
286525
|
}
|
|
286521
286526
|
return json;
|
|
286522
286527
|
}
|
|
286523
|
-
|
|
286524
|
-
if (response.status > 399 && response.status < 500) {
|
|
286525
|
-
assertReadableResponse(response);
|
|
286526
|
-
assertApplicationJson(response);
|
|
286527
|
-
try {
|
|
286528
|
-
const json = await response.clone().json();
|
|
286529
|
-
if (isJsonObject(json) && typeof json.error === 'string' && json.error.length) {
|
|
286530
|
-
return json;
|
|
286531
|
-
}
|
|
286532
|
-
}
|
|
286533
|
-
catch { }
|
|
286534
|
-
}
|
|
286535
|
-
return undefined;
|
|
286536
|
-
}
|
|
286537
|
-
function build_supported(alg) {
|
|
286528
|
+
function supported(alg) {
|
|
286538
286529
|
switch (alg) {
|
|
286539
286530
|
case 'PS256':
|
|
286540
286531
|
case 'ES256':
|
|
@@ -286553,7 +286544,7 @@ function build_supported(alg) {
|
|
|
286553
286544
|
}
|
|
286554
286545
|
}
|
|
286555
286546
|
function checkSupportedJwsAlg(header) {
|
|
286556
|
-
if (!
|
|
286547
|
+
if (!supported(header.alg)) {
|
|
286557
286548
|
throw new UnsupportedOperationError('unsupported JWS "alg" identifier', {
|
|
286558
286549
|
cause: { alg: header.alg },
|
|
286559
286550
|
});
|
|
@@ -286639,7 +286630,7 @@ async function validateJwt(jws, checkAlg, clockSkew, clockTolerance, decryptJwt)
|
|
|
286639
286630
|
}
|
|
286640
286631
|
let header;
|
|
286641
286632
|
try {
|
|
286642
|
-
header = JSON.parse(buf(
|
|
286633
|
+
header = JSON.parse(buf(build_b64u(protectedHeader)));
|
|
286643
286634
|
}
|
|
286644
286635
|
catch (cause) {
|
|
286645
286636
|
throw OPE('failed to parse JWT Header body as base64url encoded JSON', PARSE_ERROR, cause);
|
|
@@ -286655,7 +286646,7 @@ async function validateJwt(jws, checkAlg, clockSkew, clockTolerance, decryptJwt)
|
|
|
286655
286646
|
}
|
|
286656
286647
|
let claims;
|
|
286657
286648
|
try {
|
|
286658
|
-
claims = JSON.parse(buf(
|
|
286649
|
+
claims = JSON.parse(buf(build_b64u(payload)));
|
|
286659
286650
|
}
|
|
286660
286651
|
catch (cause) {
|
|
286661
286652
|
throw OPE('failed to parse JWT Payload body as base64url encoded JSON', PARSE_ERROR, cause);
|
|
@@ -286720,7 +286711,7 @@ async function validateJwtAuthResponse(as, client, parameters, expectedState, op
|
|
|
286720
286711
|
.then(validateIssuer.bind(undefined, as))
|
|
286721
286712
|
.then(validateAudience.bind(undefined, client.client_id));
|
|
286722
286713
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwt.split('.');
|
|
286723
|
-
const signature =
|
|
286714
|
+
const signature = build_b64u(encodedSignature);
|
|
286724
286715
|
const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
286725
286716
|
await validateJwsSignature(protectedHeader, payload, key, signature);
|
|
286726
286717
|
const result = new URLSearchParams();
|
|
@@ -286755,7 +286746,7 @@ async function idTokenHash(data, header, claimName) {
|
|
|
286755
286746
|
throw new UnsupportedOperationError(`unsupported JWS algorithm for ${claimName} calculation`, { cause: { alg: header.alg } });
|
|
286756
286747
|
}
|
|
286757
286748
|
const digest = await crypto.subtle.digest(algorithm, buf(data));
|
|
286758
|
-
return
|
|
286749
|
+
return build_b64u(digest.slice(0, digest.byteLength / 2));
|
|
286759
286750
|
}
|
|
286760
286751
|
async function idTokenHashMatches(data, actual, header, claimName) {
|
|
286761
286752
|
const expected = await idTokenHash(data, header, claimName);
|
|
@@ -286886,7 +286877,7 @@ async function validateHybridResponse(as, client, parameters, expectedNonce, exp
|
|
|
286886
286877
|
}
|
|
286887
286878
|
}
|
|
286888
286879
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwt.split('.');
|
|
286889
|
-
const signature =
|
|
286880
|
+
const signature = build_b64u(encodedSignature);
|
|
286890
286881
|
const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
286891
286882
|
await validateJwsSignature(protectedHeader, payload, key, signature);
|
|
286892
286883
|
if ((await idTokenHashMatches(code, claims.c_hash, header, 'c_hash')) !== true) {
|
|
@@ -287057,28 +287048,15 @@ async function processDeviceAuthorizationResponse(as, client, response) {
|
|
|
287057
287048
|
if (!looseInstanceOf(response, Response)) {
|
|
287058
287049
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
287059
287050
|
}
|
|
287060
|
-
|
|
287061
|
-
|
|
287062
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
287063
|
-
}
|
|
287064
|
-
if (response.status !== 200) {
|
|
287065
|
-
let err;
|
|
287066
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
287067
|
-
await response.body?.cancel();
|
|
287068
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
287069
|
-
cause: err,
|
|
287070
|
-
response,
|
|
287071
|
-
});
|
|
287072
|
-
}
|
|
287073
|
-
throw OPE('"response" is not a conform Device Authorization Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
287074
|
-
}
|
|
287051
|
+
checkAuthenticationChallenges(response);
|
|
287052
|
+
await checkOAuthBodyError(response, 200, 'Device Authorization Endpoint');
|
|
287075
287053
|
assertReadableResponse(response);
|
|
287076
|
-
assertApplicationJson(response);
|
|
287077
287054
|
let json;
|
|
287078
287055
|
try {
|
|
287079
287056
|
json = await response.json();
|
|
287080
287057
|
}
|
|
287081
287058
|
catch (cause) {
|
|
287059
|
+
assertApplicationJson(response);
|
|
287082
287060
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
287083
287061
|
}
|
|
287084
287062
|
if (!isJsonObject(json)) {
|
|
@@ -287149,7 +287127,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287149
287127
|
throw OPE('operation indicated DPoP use but the JWT Access Token has no jkt confirmation claim', INVALID_REQUEST, { claims: accessTokenClaims });
|
|
287150
287128
|
}
|
|
287151
287129
|
const clockSkew = getClockSkew(options);
|
|
287152
|
-
const proof = await validateJwt(headerValue, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined,
|
|
287130
|
+
const proof = await validateJwt(headerValue, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, supported), clockSkew, getClockTolerance(options), undefined)
|
|
287153
287131
|
.then(checkJwtType.bind(undefined, 'dpop+jwt'))
|
|
287154
287132
|
.then(validatePresence.bind(undefined, ['iat', 'jti', 'ath', 'htm', 'htu']));
|
|
287155
287133
|
const now = epochTime() + clockSkew;
|
|
@@ -287177,7 +287155,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287177
287155
|
});
|
|
287178
287156
|
}
|
|
287179
287157
|
{
|
|
287180
|
-
const expected =
|
|
287158
|
+
const expected = build_b64u(await crypto.subtle.digest('SHA-256', buf(accessToken)));
|
|
287181
287159
|
if (proof.claims.ath !== expected) {
|
|
287182
287160
|
throw OPE('DPoP Proof ath mismatch', JWT_CLAIM_COMPARISON, {
|
|
287183
287161
|
expected,
|
|
@@ -287214,7 +287192,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287214
287192
|
default:
|
|
287215
287193
|
throw new UnsupportedOperationError('unsupported JWK key type', { cause: proof.header.jwk });
|
|
287216
287194
|
}
|
|
287217
|
-
const expected =
|
|
287195
|
+
const expected = build_b64u(await crypto.subtle.digest('SHA-256', buf(JSON.stringify(components))));
|
|
287218
287196
|
if (accessTokenClaims.cnf.jkt !== expected) {
|
|
287219
287197
|
throw OPE('JWT Access Token confirmation mismatch', JWT_CLAIM_COMPARISON, {
|
|
287220
287198
|
expected,
|
|
@@ -287224,7 +287202,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287224
287202
|
}
|
|
287225
287203
|
}
|
|
287226
287204
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = headerValue.split('.');
|
|
287227
|
-
const signature =
|
|
287205
|
+
const signature = build_b64u(encodedSignature);
|
|
287228
287206
|
const { jwk, alg } = proof.header;
|
|
287229
287207
|
if (!jwk) {
|
|
287230
287208
|
throw OPE('DPoP Proof is missing the jwk header parameter', INVALID_REQUEST, {
|
|
@@ -287279,7 +287257,7 @@ async function validateJwtAccessToken(as, request, expectedAudience, options) {
|
|
|
287279
287257
|
if (options?.requireDPoP || scheme === 'dpop' || request.headers.has('dpop')) {
|
|
287280
287258
|
requiredClaims.push('cnf');
|
|
287281
287259
|
}
|
|
287282
|
-
const { claims, header } = await validateJwt(accessToken, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined,
|
|
287260
|
+
const { claims, header } = await validateJwt(accessToken, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, supported), getClockSkew(options), getClockTolerance(options), undefined)
|
|
287283
287261
|
.then(checkJwtType.bind(undefined, 'at+jwt'))
|
|
287284
287262
|
.then(validatePresence.bind(undefined, requiredClaims))
|
|
287285
287263
|
.then(validateIssuer.bind(undefined, as))
|
|
@@ -287309,7 +287287,7 @@ async function validateJwtAccessToken(as, request, expectedAudience, options) {
|
|
|
287309
287287
|
}
|
|
287310
287288
|
}
|
|
287311
287289
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = accessToken.split('.');
|
|
287312
|
-
const signature =
|
|
287290
|
+
const signature = build_b64u(encodedSignature);
|
|
287313
287291
|
const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
287314
287292
|
await validateJwsSignature(protectedHeader, payload, key, signature);
|
|
287315
287293
|
if (options?.requireDPoP ||
|
|
@@ -287326,25 +287304,71 @@ function reassignRSCode(err) {
|
|
|
287326
287304
|
}
|
|
287327
287305
|
throw err;
|
|
287328
287306
|
}
|
|
287307
|
+
async function backchannelAuthenticationRequest(as, client, clientAuthentication, parameters, options) {
|
|
287308
|
+
assertAs(as);
|
|
287309
|
+
assertClient(client);
|
|
287310
|
+
const url = resolveEndpoint(as, 'backchannel_authentication_endpoint', client.use_mtls_endpoint_aliases, options?.[allowInsecureRequests] !== true);
|
|
287311
|
+
const body = new URLSearchParams(parameters);
|
|
287312
|
+
body.set('client_id', client.client_id);
|
|
287313
|
+
const headers = prepareHeaders(options?.headers);
|
|
287314
|
+
headers.set('accept', 'application/json');
|
|
287315
|
+
return authenticatedRequest(as, client, clientAuthentication, url, body, headers, options);
|
|
287316
|
+
}
|
|
287317
|
+
async function processBackchannelAuthenticationResponse(as, client, response) {
|
|
287318
|
+
assertAs(as);
|
|
287319
|
+
assertClient(client);
|
|
287320
|
+
if (!looseInstanceOf(response, Response)) {
|
|
287321
|
+
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
287322
|
+
}
|
|
287323
|
+
checkAuthenticationChallenges(response);
|
|
287324
|
+
await checkOAuthBodyError(response, 200, 'Backchannel Authentication Endpoint');
|
|
287325
|
+
assertReadableResponse(response);
|
|
287326
|
+
let json;
|
|
287327
|
+
try {
|
|
287328
|
+
json = await response.json();
|
|
287329
|
+
}
|
|
287330
|
+
catch (cause) {
|
|
287331
|
+
assertApplicationJson(response);
|
|
287332
|
+
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
287333
|
+
}
|
|
287334
|
+
if (!isJsonObject(json)) {
|
|
287335
|
+
throw OPE('"response" body must be a top level object', INVALID_RESPONSE, { body: json });
|
|
287336
|
+
}
|
|
287337
|
+
assertString(json.auth_req_id, '"response" body "auth_req_id" property', INVALID_RESPONSE, {
|
|
287338
|
+
body: json,
|
|
287339
|
+
});
|
|
287340
|
+
let expiresIn = typeof json.expires_in !== 'number' ? parseFloat(json.expires_in) : json.expires_in;
|
|
287341
|
+
assertNumber(expiresIn, false, '"response" body "expires_in" property', INVALID_RESPONSE, {
|
|
287342
|
+
body: json,
|
|
287343
|
+
});
|
|
287344
|
+
json.expires_in = expiresIn;
|
|
287345
|
+
if (json.interval !== undefined) {
|
|
287346
|
+
assertNumber(json.interval, false, '"response" body "interval" property', INVALID_RESPONSE, {
|
|
287347
|
+
body: json,
|
|
287348
|
+
});
|
|
287349
|
+
}
|
|
287350
|
+
return json;
|
|
287351
|
+
}
|
|
287352
|
+
async function backchannelAuthenticationGrantRequest(as, client, clientAuthentication, authReqId, options) {
|
|
287353
|
+
assertAs(as);
|
|
287354
|
+
assertClient(client);
|
|
287355
|
+
assertString(authReqId, '"authReqId"');
|
|
287356
|
+
const parameters = new URLSearchParams(options?.additionalParameters);
|
|
287357
|
+
parameters.set('auth_req_id', authReqId);
|
|
287358
|
+
return tokenEndpointRequest(as, client, clientAuthentication, 'urn:openid:params:grant-type:ciba', parameters, options);
|
|
287359
|
+
}
|
|
287360
|
+
async function processBackchannelAuthenticationGrantResponse(as, client, response, options) {
|
|
287361
|
+
return processGenericAccessTokenResponse(as, client, response, undefined, options);
|
|
287362
|
+
}
|
|
287329
287363
|
const _nopkce = Symbol();
|
|
287330
287364
|
const _nodiscoverycheck = Symbol();
|
|
287331
287365
|
const _expectedIssuer = Symbol();
|
|
287332
287366
|
//# sourceMappingURL=index.js.map
|
|
287333
|
-
|
|
287334
|
-
var external_node_buffer_ = __nccwpck_require__(72254);
|
|
287335
|
-
// EXTERNAL MODULE: external "node:crypto"
|
|
287336
|
-
var external_node_crypto_ = __nccwpck_require__(6005);
|
|
287337
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/digest.js
|
|
287338
|
-
|
|
287339
|
-
const digest = (algorithm, data) => (0,external_node_crypto_.createHash)(algorithm).update(data).digest();
|
|
287340
|
-
/* harmony default export */ const runtime_digest = (digest);
|
|
287341
|
-
|
|
287342
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/buffer_utils.js
|
|
287343
|
-
|
|
287367
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/buffer_utils.js
|
|
287344
287368
|
const buffer_utils_encoder = new TextEncoder();
|
|
287345
287369
|
const buffer_utils_decoder = new TextDecoder();
|
|
287346
287370
|
const MAX_INT32 = 2 ** 32;
|
|
287347
|
-
function
|
|
287371
|
+
function concat(...buffers) {
|
|
287348
287372
|
const size = buffers.reduce((acc, { length }) => acc + length, 0);
|
|
287349
287373
|
const buf = new Uint8Array(size);
|
|
287350
287374
|
let i = 0;
|
|
@@ -287354,9 +287378,6 @@ function buffer_utils_concat(...buffers) {
|
|
|
287354
287378
|
}
|
|
287355
287379
|
return buf;
|
|
287356
287380
|
}
|
|
287357
|
-
function buffer_utils_p2s(alg, p2sInput) {
|
|
287358
|
-
return buffer_utils_concat(buffer_utils_encoder.encode(alg), new Uint8Array([0]), p2sInput);
|
|
287359
|
-
}
|
|
287360
287381
|
function writeUInt32BE(buf, value, offset) {
|
|
287361
287382
|
if (value < 0 || value >= MAX_INT32) {
|
|
287362
287383
|
throw new RangeError(`value must be >= 0 and <= ${MAX_INT32 - 1}. Received ${value}`);
|
|
@@ -287376,39 +287397,64 @@ function uint32be(value) {
|
|
|
287376
287397
|
writeUInt32BE(buf, value);
|
|
287377
287398
|
return buf;
|
|
287378
287399
|
}
|
|
287379
|
-
|
|
287380
|
-
|
|
287400
|
+
|
|
287401
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/base64.js
|
|
287402
|
+
function base64_encodeBase64(input) {
|
|
287403
|
+
if (Uint8Array.prototype.toBase64) {
|
|
287404
|
+
return input.toBase64();
|
|
287405
|
+
}
|
|
287406
|
+
const CHUNK_SIZE = 0x8000;
|
|
287407
|
+
const arr = [];
|
|
287408
|
+
for (let i = 0; i < input.length; i += CHUNK_SIZE) {
|
|
287409
|
+
arr.push(String.fromCharCode.apply(null, input.subarray(i, i + CHUNK_SIZE)));
|
|
287410
|
+
}
|
|
287411
|
+
return btoa(arr.join(''));
|
|
287381
287412
|
}
|
|
287382
|
-
|
|
287383
|
-
|
|
287384
|
-
|
|
287385
|
-
for (let iter = 0; iter < iterations; iter++) {
|
|
287386
|
-
const buf = new Uint8Array(4 + secret.length + value.length);
|
|
287387
|
-
buf.set(uint32be(iter + 1));
|
|
287388
|
-
buf.set(secret, 4);
|
|
287389
|
-
buf.set(value, 4 + secret.length);
|
|
287390
|
-
res.set(await runtime_digest('sha256', buf), iter * 32);
|
|
287413
|
+
function decodeBase64(encoded) {
|
|
287414
|
+
if (Uint8Array.fromBase64) {
|
|
287415
|
+
return Uint8Array.fromBase64(encoded);
|
|
287391
287416
|
}
|
|
287392
|
-
|
|
287417
|
+
const binary = atob(encoded);
|
|
287418
|
+
const bytes = new Uint8Array(binary.length);
|
|
287419
|
+
for (let i = 0; i < binary.length; i++) {
|
|
287420
|
+
bytes[i] = binary.charCodeAt(i);
|
|
287421
|
+
}
|
|
287422
|
+
return bytes;
|
|
287393
287423
|
}
|
|
287394
287424
|
|
|
287395
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287425
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/util/base64url.js
|
|
287396
287426
|
|
|
287397
287427
|
|
|
287398
|
-
function
|
|
287428
|
+
function decode(input) {
|
|
287429
|
+
if (Uint8Array.fromBase64) {
|
|
287430
|
+
return Uint8Array.fromBase64(typeof input === 'string' ? input : buffer_utils_decoder.decode(input), {
|
|
287431
|
+
alphabet: 'base64url',
|
|
287432
|
+
});
|
|
287433
|
+
}
|
|
287399
287434
|
let encoded = input;
|
|
287400
287435
|
if (encoded instanceof Uint8Array) {
|
|
287401
287436
|
encoded = buffer_utils_decoder.decode(encoded);
|
|
287402
287437
|
}
|
|
287403
|
-
|
|
287438
|
+
encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\s/g, '');
|
|
287439
|
+
try {
|
|
287440
|
+
return decodeBase64(encoded);
|
|
287441
|
+
}
|
|
287442
|
+
catch {
|
|
287443
|
+
throw new TypeError('The input to be decoded is not correctly encoded.');
|
|
287444
|
+
}
|
|
287445
|
+
}
|
|
287446
|
+
function encode(input) {
|
|
287447
|
+
let unencoded = input;
|
|
287448
|
+
if (typeof unencoded === 'string') {
|
|
287449
|
+
unencoded = encoder.encode(unencoded);
|
|
287450
|
+
}
|
|
287451
|
+
if (Uint8Array.prototype.toBase64) {
|
|
287452
|
+
return unencoded.toBase64({ alphabet: 'base64url', omitPadding: true });
|
|
287453
|
+
}
|
|
287454
|
+
return encodeBase64(unencoded).replace(/=/g, '').replace(/\+/g, '-').replace(/\//g, '_');
|
|
287404
287455
|
}
|
|
287405
|
-
const encode = (input) => Buffer.from(input).toString('base64url');
|
|
287406
|
-
const decodeBase64 = (input) => new Uint8Array(Buffer.from(input, 'base64'));
|
|
287407
|
-
const encodeBase64 = (input) => Buffer.from(input).toString('base64');
|
|
287408
|
-
|
|
287409
|
-
const decode = (input) => new Uint8Array(external_node_buffer_.Buffer.from(normalize(input), 'base64url'));
|
|
287410
287456
|
|
|
287411
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287457
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/util/errors.js
|
|
287412
287458
|
class JOSEError extends Error {
|
|
287413
287459
|
static code = 'ERR_JOSE_GENERIC';
|
|
287414
287460
|
code = 'ERR_JOSE_GENERIC';
|
|
@@ -287448,7 +287494,7 @@ class JOSEAlgNotAllowed extends JOSEError {
|
|
|
287448
287494
|
static code = 'ERR_JOSE_ALG_NOT_ALLOWED';
|
|
287449
287495
|
code = 'ERR_JOSE_ALG_NOT_ALLOWED';
|
|
287450
287496
|
}
|
|
287451
|
-
class
|
|
287497
|
+
class JOSENotSupported extends JOSEError {
|
|
287452
287498
|
static code = 'ERR_JOSE_NOT_SUPPORTED';
|
|
287453
287499
|
code = 'ERR_JOSE_NOT_SUPPORTED';
|
|
287454
287500
|
}
|
|
@@ -287509,8 +287555,7 @@ class JWSSignatureVerificationFailed extends (/* unused pure expression or super
|
|
|
287509
287555
|
}
|
|
287510
287556
|
}
|
|
287511
287557
|
|
|
287512
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287513
|
-
|
|
287558
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/iv.js
|
|
287514
287559
|
|
|
287515
287560
|
function bitLength(alg) {
|
|
287516
287561
|
switch (alg) {
|
|
@@ -287526,87 +287571,30 @@ function bitLength(alg) {
|
|
|
287526
287571
|
case 'A256CBC-HS512':
|
|
287527
287572
|
return 128;
|
|
287528
287573
|
default:
|
|
287529
|
-
throw new
|
|
287574
|
+
throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
|
|
287530
287575
|
}
|
|
287531
287576
|
}
|
|
287532
|
-
/* harmony default export */ const iv = ((alg) =>
|
|
287577
|
+
/* harmony default export */ const iv = ((alg) => crypto.getRandomValues(new Uint8Array(bitLength(alg) >> 3)));
|
|
287533
287578
|
|
|
287534
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287579
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_iv_length.js
|
|
287535
287580
|
|
|
287536
287581
|
|
|
287537
|
-
const
|
|
287582
|
+
/* harmony default export */ const check_iv_length = ((enc, iv) => {
|
|
287538
287583
|
if (iv.length << 3 !== bitLength(enc)) {
|
|
287539
287584
|
throw new JWEInvalid('Invalid Initialization Vector length');
|
|
287540
287585
|
}
|
|
287541
|
-
};
|
|
287542
|
-
/* harmony default export */ const check_iv_length = (checkIvLength);
|
|
287543
|
-
|
|
287544
|
-
;// CONCATENATED MODULE: external "node:util"
|
|
287545
|
-
const external_node_util_namespaceObject = require("node:util");
|
|
287546
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/is_key_object.js
|
|
287547
|
-
|
|
287548
|
-
/* harmony default export */ const is_key_object = ((obj) => external_node_util_namespaceObject.types.isKeyObject(obj));
|
|
287549
|
-
|
|
287550
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/check_cek_length.js
|
|
287586
|
+
});
|
|
287551
287587
|
|
|
287588
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_cek_length.js
|
|
287552
287589
|
|
|
287553
|
-
const
|
|
287554
|
-
|
|
287555
|
-
|
|
287556
|
-
|
|
287557
|
-
case 'A192CBC-HS384':
|
|
287558
|
-
case 'A256CBC-HS512':
|
|
287559
|
-
expected = parseInt(enc.slice(-3), 10);
|
|
287560
|
-
break;
|
|
287561
|
-
case 'A128GCM':
|
|
287562
|
-
case 'A192GCM':
|
|
287563
|
-
case 'A256GCM':
|
|
287564
|
-
expected = parseInt(enc.slice(1, 4), 10);
|
|
287565
|
-
break;
|
|
287566
|
-
default:
|
|
287567
|
-
throw new errors_JOSENotSupported(`Content Encryption Algorithm ${enc} is not supported either by JOSE or your javascript runtime`);
|
|
287568
|
-
}
|
|
287569
|
-
if (cek instanceof Uint8Array) {
|
|
287570
|
-
const actual = cek.byteLength << 3;
|
|
287571
|
-
if (actual !== expected) {
|
|
287572
|
-
throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
|
|
287573
|
-
}
|
|
287574
|
-
return;
|
|
287575
|
-
}
|
|
287576
|
-
if (is_key_object(cek) && cek.type === 'secret') {
|
|
287577
|
-
const actual = cek.symmetricKeySize << 3;
|
|
287578
|
-
if (actual !== expected) {
|
|
287579
|
-
throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
|
|
287580
|
-
}
|
|
287581
|
-
return;
|
|
287590
|
+
/* harmony default export */ const check_cek_length = ((cek, expected) => {
|
|
287591
|
+
const actual = cek.byteLength << 3;
|
|
287592
|
+
if (actual !== expected) {
|
|
287593
|
+
throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
|
|
287582
287594
|
}
|
|
287583
|
-
|
|
287584
|
-
};
|
|
287585
|
-
/* harmony default export */ const check_cek_length = (checkCekLength);
|
|
287586
|
-
|
|
287587
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/timing_safe_equal.js
|
|
287588
|
-
|
|
287589
|
-
const timingSafeEqual = external_node_crypto_.timingSafeEqual;
|
|
287590
|
-
/* harmony default export */ const timing_safe_equal = (timingSafeEqual);
|
|
287591
|
-
|
|
287592
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/cbc_tag.js
|
|
287593
|
-
|
|
287594
|
-
|
|
287595
|
-
function cbcTag(aad, iv, ciphertext, macSize, macKey, keySize) {
|
|
287596
|
-
const macData = buffer_utils_concat(aad, iv, ciphertext, uint64be(aad.length << 3));
|
|
287597
|
-
const hmac = (0,external_node_crypto_.createHmac)(`sha${macSize}`, macKey);
|
|
287598
|
-
hmac.update(macData);
|
|
287599
|
-
return hmac.digest().slice(0, keySize >> 3);
|
|
287600
|
-
}
|
|
287601
|
-
|
|
287602
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/webcrypto.js
|
|
287603
|
-
|
|
287604
|
-
|
|
287605
|
-
const webcrypto = external_node_crypto_.webcrypto;
|
|
287606
|
-
/* harmony default export */ const runtime_webcrypto = (webcrypto);
|
|
287607
|
-
const webcrypto_isCryptoKey = (key) => external_node_util_namespaceObject.types.isCryptoKey(key);
|
|
287595
|
+
});
|
|
287608
287596
|
|
|
287609
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287597
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/crypto_key.js
|
|
287610
287598
|
function unusable(name, prop = 'algorithm.name') {
|
|
287611
287599
|
return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
|
|
287612
287600
|
}
|
|
@@ -287616,7 +287604,7 @@ function isAlgorithm(algorithm, name) {
|
|
|
287616
287604
|
function getHashLength(hash) {
|
|
287617
287605
|
return parseInt(hash.name.slice(4), 10);
|
|
287618
287606
|
}
|
|
287619
|
-
function
|
|
287607
|
+
function getNamedCurve(alg) {
|
|
287620
287608
|
switch (alg) {
|
|
287621
287609
|
case 'ES256':
|
|
287622
287610
|
return 'P-256';
|
|
@@ -287628,23 +287616,12 @@ function crypto_key_getNamedCurve(alg) {
|
|
|
287628
287616
|
throw new Error('unreachable');
|
|
287629
287617
|
}
|
|
287630
287618
|
}
|
|
287631
|
-
function checkUsage(key,
|
|
287632
|
-
if (
|
|
287633
|
-
|
|
287634
|
-
if (usages.length > 2) {
|
|
287635
|
-
const last = usages.pop();
|
|
287636
|
-
msg += `one of ${usages.join(', ')}, or ${last}.`;
|
|
287637
|
-
}
|
|
287638
|
-
else if (usages.length === 2) {
|
|
287639
|
-
msg += `one of ${usages[0]} or ${usages[1]}.`;
|
|
287640
|
-
}
|
|
287641
|
-
else {
|
|
287642
|
-
msg += `${usages[0]}.`;
|
|
287643
|
-
}
|
|
287644
|
-
throw new TypeError(msg);
|
|
287619
|
+
function checkUsage(key, usage) {
|
|
287620
|
+
if (usage && !key.usages.includes(usage)) {
|
|
287621
|
+
throw new TypeError(`CryptoKey does not support this operation, its usages must include ${usage}.`);
|
|
287645
287622
|
}
|
|
287646
287623
|
}
|
|
287647
|
-
function checkSigCryptoKey(key, alg,
|
|
287624
|
+
function checkSigCryptoKey(key, alg, usage) {
|
|
287648
287625
|
switch (alg) {
|
|
287649
287626
|
case 'HS256':
|
|
287650
287627
|
case 'HS384':
|
|
@@ -287679,10 +287656,10 @@ function checkSigCryptoKey(key, alg, ...usages) {
|
|
|
287679
287656
|
throw unusable(`SHA-${expected}`, 'algorithm.hash');
|
|
287680
287657
|
break;
|
|
287681
287658
|
}
|
|
287659
|
+
case 'Ed25519':
|
|
287682
287660
|
case 'EdDSA': {
|
|
287683
|
-
if (key.algorithm
|
|
287684
|
-
throw unusable('Ed25519
|
|
287685
|
-
}
|
|
287661
|
+
if (!isAlgorithm(key.algorithm, 'Ed25519'))
|
|
287662
|
+
throw unusable('Ed25519');
|
|
287686
287663
|
break;
|
|
287687
287664
|
}
|
|
287688
287665
|
case 'ES256':
|
|
@@ -287690,7 +287667,7 @@ function checkSigCryptoKey(key, alg, ...usages) {
|
|
|
287690
287667
|
case 'ES512': {
|
|
287691
287668
|
if (!isAlgorithm(key.algorithm, 'ECDSA'))
|
|
287692
287669
|
throw unusable('ECDSA');
|
|
287693
|
-
const expected =
|
|
287670
|
+
const expected = getNamedCurve(alg);
|
|
287694
287671
|
const actual = key.algorithm.namedCurve;
|
|
287695
287672
|
if (actual !== expected)
|
|
287696
287673
|
throw unusable(expected, 'algorithm.namedCurve');
|
|
@@ -287699,9 +287676,9 @@ function checkSigCryptoKey(key, alg, ...usages) {
|
|
|
287699
287676
|
default:
|
|
287700
287677
|
throw new TypeError('CryptoKey does not support this operation');
|
|
287701
287678
|
}
|
|
287702
|
-
checkUsage(key,
|
|
287679
|
+
checkUsage(key, usage);
|
|
287703
287680
|
}
|
|
287704
|
-
function
|
|
287681
|
+
function crypto_key_checkEncCryptoKey(key, alg, usage) {
|
|
287705
287682
|
switch (alg) {
|
|
287706
287683
|
case 'A128GCM':
|
|
287707
287684
|
case 'A192GCM':
|
|
@@ -287729,10 +287706,9 @@ function checkEncCryptoKey(key, alg, ...usages) {
|
|
|
287729
287706
|
switch (key.algorithm.name) {
|
|
287730
287707
|
case 'ECDH':
|
|
287731
287708
|
case 'X25519':
|
|
287732
|
-
case 'X448':
|
|
287733
287709
|
break;
|
|
287734
287710
|
default:
|
|
287735
|
-
throw unusable('ECDH
|
|
287711
|
+
throw unusable('ECDH or X25519');
|
|
287736
287712
|
}
|
|
287737
287713
|
break;
|
|
287738
287714
|
}
|
|
@@ -287757,10 +287733,10 @@ function checkEncCryptoKey(key, alg, ...usages) {
|
|
|
287757
287733
|
default:
|
|
287758
287734
|
throw new TypeError('CryptoKey does not support this operation');
|
|
287759
287735
|
}
|
|
287760
|
-
checkUsage(key,
|
|
287736
|
+
checkUsage(key, usage);
|
|
287761
287737
|
}
|
|
287762
287738
|
|
|
287763
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287739
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/invalid_key_input.js
|
|
287764
287740
|
function message(msg, actual, ...types) {
|
|
287765
287741
|
types = types.filter(Boolean);
|
|
287766
287742
|
if (types.length > 2) {
|
|
@@ -287793,31 +287769,23 @@ function withAlg(alg, actual, ...types) {
|
|
|
287793
287769
|
return message(`Key for the ${alg} algorithm must be `, actual, ...types);
|
|
287794
287770
|
}
|
|
287795
287771
|
|
|
287796
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287797
|
-
|
|
287798
|
-
|
|
287799
|
-
|
|
287800
|
-
|
|
287801
|
-
return ciphers.has(algorithm);
|
|
287802
|
-
});
|
|
287803
|
-
|
|
287804
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/is_key_like.js
|
|
287805
|
-
|
|
287806
|
-
|
|
287807
|
-
/* harmony default export */ const is_key_like = ((key) => is_key_object(key) || webcrypto_isCryptoKey(key));
|
|
287808
|
-
const is_key_like_types = ['KeyObject'];
|
|
287809
|
-
if (globalThis.CryptoKey || runtime_webcrypto?.CryptoKey) {
|
|
287810
|
-
is_key_like_types.push('CryptoKey');
|
|
287772
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_key_like.js
|
|
287773
|
+
function is_key_like_assertCryptoKey(key) {
|
|
287774
|
+
if (!isCryptoKey(key)) {
|
|
287775
|
+
throw new Error('CryptoKey instance expected');
|
|
287776
|
+
}
|
|
287811
287777
|
}
|
|
287778
|
+
function isCryptoKey(key) {
|
|
287779
|
+
return key?.[Symbol.toStringTag] === 'CryptoKey';
|
|
287780
|
+
}
|
|
287781
|
+
function isKeyObject(key) {
|
|
287782
|
+
return key?.[Symbol.toStringTag] === 'KeyObject';
|
|
287783
|
+
}
|
|
287784
|
+
/* harmony default export */ const is_key_like = ((key) => {
|
|
287785
|
+
return isCryptoKey(key) || isKeyObject(key);
|
|
287786
|
+
});
|
|
287812
287787
|
|
|
287813
|
-
|
|
287814
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/decrypt.js
|
|
287815
|
-
|
|
287816
|
-
|
|
287817
|
-
|
|
287818
|
-
|
|
287819
|
-
|
|
287820
|
-
|
|
287788
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/decrypt.js
|
|
287821
287789
|
|
|
287822
287790
|
|
|
287823
287791
|
|
|
@@ -287825,22 +287793,39 @@ if (globalThis.CryptoKey || runtime_webcrypto?.CryptoKey) {
|
|
|
287825
287793
|
|
|
287826
287794
|
|
|
287827
287795
|
|
|
287828
|
-
function
|
|
287829
|
-
|
|
287830
|
-
|
|
287831
|
-
|
|
287796
|
+
async function timingSafeEqual(a, b) {
|
|
287797
|
+
if (!(a instanceof Uint8Array)) {
|
|
287798
|
+
throw new TypeError('First argument must be a buffer');
|
|
287799
|
+
}
|
|
287800
|
+
if (!(b instanceof Uint8Array)) {
|
|
287801
|
+
throw new TypeError('Second argument must be a buffer');
|
|
287802
|
+
}
|
|
287803
|
+
const algorithm = { name: 'HMAC', hash: 'SHA-256' };
|
|
287804
|
+
const key = (await crypto.subtle.generateKey(algorithm, false, ['sign']));
|
|
287805
|
+
const aHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, a));
|
|
287806
|
+
const bHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, b));
|
|
287807
|
+
let out = 0;
|
|
287808
|
+
let i = -1;
|
|
287809
|
+
while (++i < 32) {
|
|
287810
|
+
out |= aHmac[i] ^ bHmac[i];
|
|
287832
287811
|
}
|
|
287833
|
-
|
|
287834
|
-
|
|
287835
|
-
|
|
287836
|
-
|
|
287837
|
-
|
|
287838
|
-
throw new errors_JOSENotSupported(`alg ${enc} is not supported by your javascript runtime`);
|
|
287812
|
+
return out === 0;
|
|
287813
|
+
}
|
|
287814
|
+
async function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
287815
|
+
if (!(cek instanceof Uint8Array)) {
|
|
287816
|
+
throw new TypeError(invalid_key_input(cek, 'Uint8Array'));
|
|
287839
287817
|
}
|
|
287840
|
-
const
|
|
287818
|
+
const keySize = parseInt(enc.slice(1, 4), 10);
|
|
287819
|
+
const encKey = await crypto.subtle.importKey('raw', cek.subarray(keySize >> 3), 'AES-CBC', false, ['decrypt']);
|
|
287820
|
+
const macKey = await crypto.subtle.importKey('raw', cek.subarray(0, keySize >> 3), {
|
|
287821
|
+
hash: `SHA-${keySize << 1}`,
|
|
287822
|
+
name: 'HMAC',
|
|
287823
|
+
}, false, ['sign']);
|
|
287824
|
+
const macData = concat(aad, iv, ciphertext, uint64be(aad.length << 3));
|
|
287825
|
+
const expectedTag = new Uint8Array((await crypto.subtle.sign('HMAC', macKey, macData)).slice(0, keySize >> 3));
|
|
287841
287826
|
let macCheckPassed;
|
|
287842
287827
|
try {
|
|
287843
|
-
macCheckPassed =
|
|
287828
|
+
macCheckPassed = await timingSafeEqual(tag, expectedTag);
|
|
287844
287829
|
}
|
|
287845
287830
|
catch {
|
|
287846
287831
|
}
|
|
@@ -287849,8 +287834,7 @@ function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
|
287849
287834
|
}
|
|
287850
287835
|
let plaintext;
|
|
287851
287836
|
try {
|
|
287852
|
-
|
|
287853
|
-
plaintext = buffer_utils_concat(decipher.update(ciphertext), decipher.final());
|
|
287837
|
+
plaintext = new Uint8Array(await crypto.subtle.decrypt({ iv, name: 'AES-CBC' }, encKey, ciphertext));
|
|
287854
287838
|
}
|
|
287855
287839
|
catch {
|
|
287856
287840
|
}
|
|
@@ -287859,37 +287843,30 @@ function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
|
287859
287843
|
}
|
|
287860
287844
|
return plaintext;
|
|
287861
287845
|
}
|
|
287862
|
-
function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
287863
|
-
|
|
287864
|
-
|
|
287865
|
-
|
|
287866
|
-
|
|
287846
|
+
async function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
287847
|
+
let encKey;
|
|
287848
|
+
if (cek instanceof Uint8Array) {
|
|
287849
|
+
encKey = await crypto.subtle.importKey('raw', cek, 'AES-GCM', false, ['decrypt']);
|
|
287850
|
+
}
|
|
287851
|
+
else {
|
|
287852
|
+
crypto_key_checkEncCryptoKey(cek, enc, 'decrypt');
|
|
287853
|
+
encKey = cek;
|
|
287867
287854
|
}
|
|
287868
287855
|
try {
|
|
287869
|
-
|
|
287870
|
-
|
|
287871
|
-
|
|
287872
|
-
|
|
287873
|
-
|
|
287874
|
-
|
|
287875
|
-
decipher.final();
|
|
287876
|
-
return plaintext;
|
|
287856
|
+
return new Uint8Array(await crypto.subtle.decrypt({
|
|
287857
|
+
additionalData: aad,
|
|
287858
|
+
iv,
|
|
287859
|
+
name: 'AES-GCM',
|
|
287860
|
+
tagLength: 128,
|
|
287861
|
+
}, encKey, concat(ciphertext, tag)));
|
|
287877
287862
|
}
|
|
287878
287863
|
catch {
|
|
287879
287864
|
throw new JWEDecryptionFailed();
|
|
287880
287865
|
}
|
|
287881
287866
|
}
|
|
287882
|
-
const decrypt = (enc, cek, ciphertext, iv, tag, aad) => {
|
|
287883
|
-
|
|
287884
|
-
|
|
287885
|
-
checkEncCryptoKey(cek, enc, 'decrypt');
|
|
287886
|
-
key = external_node_crypto_.KeyObject.from(cek);
|
|
287887
|
-
}
|
|
287888
|
-
else if (cek instanceof Uint8Array || is_key_object(cek)) {
|
|
287889
|
-
key = cek;
|
|
287890
|
-
}
|
|
287891
|
-
else {
|
|
287892
|
-
throw new TypeError(invalid_key_input(cek, ...is_key_like_types, 'Uint8Array'));
|
|
287867
|
+
/* harmony default export */ const decrypt = (async (enc, cek, ciphertext, iv, tag, aad) => {
|
|
287868
|
+
if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {
|
|
287869
|
+
throw new TypeError(invalid_key_input(cek, 'CryptoKey', 'KeyObject', 'Uint8Array', 'JSON Web Key'));
|
|
287893
287870
|
}
|
|
287894
287871
|
if (!iv) {
|
|
287895
287872
|
throw new JWEInvalid('JWE Initialization Vector missing');
|
|
@@ -287897,25 +287874,27 @@ const decrypt = (enc, cek, ciphertext, iv, tag, aad) => {
|
|
|
287897
287874
|
if (!tag) {
|
|
287898
287875
|
throw new JWEInvalid('JWE Authentication Tag missing');
|
|
287899
287876
|
}
|
|
287900
|
-
check_cek_length(enc, key);
|
|
287901
287877
|
check_iv_length(enc, iv);
|
|
287902
287878
|
switch (enc) {
|
|
287903
287879
|
case 'A128CBC-HS256':
|
|
287904
287880
|
case 'A192CBC-HS384':
|
|
287905
287881
|
case 'A256CBC-HS512':
|
|
287906
|
-
|
|
287882
|
+
if (cek instanceof Uint8Array)
|
|
287883
|
+
check_cek_length(cek, parseInt(enc.slice(-3), 10));
|
|
287884
|
+
return cbcDecrypt(enc, cek, ciphertext, iv, tag, aad);
|
|
287907
287885
|
case 'A128GCM':
|
|
287908
287886
|
case 'A192GCM':
|
|
287909
287887
|
case 'A256GCM':
|
|
287910
|
-
|
|
287888
|
+
if (cek instanceof Uint8Array)
|
|
287889
|
+
check_cek_length(cek, parseInt(enc.slice(1, 4), 10));
|
|
287890
|
+
return gcmDecrypt(enc, cek, ciphertext, iv, tag, aad);
|
|
287911
287891
|
default:
|
|
287912
|
-
throw new
|
|
287892
|
+
throw new JOSENotSupported('Unsupported JWE Content Encryption Algorithm');
|
|
287913
287893
|
}
|
|
287914
|
-
};
|
|
287915
|
-
/* harmony default export */ const runtime_decrypt = (decrypt);
|
|
287894
|
+
});
|
|
287916
287895
|
|
|
287917
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287918
|
-
const
|
|
287896
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_disjoint.js
|
|
287897
|
+
/* harmony default export */ const is_disjoint = ((...headers) => {
|
|
287919
287898
|
const sources = headers.filter(Boolean);
|
|
287920
287899
|
if (sources.length === 0 || sources.length === 1) {
|
|
287921
287900
|
return true;
|
|
@@ -287935,14 +287914,13 @@ const isDisjoint = (...headers) => {
|
|
|
287935
287914
|
}
|
|
287936
287915
|
}
|
|
287937
287916
|
return true;
|
|
287938
|
-
};
|
|
287939
|
-
/* harmony default export */ const is_disjoint = (isDisjoint);
|
|
287917
|
+
});
|
|
287940
287918
|
|
|
287941
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287919
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_object.js
|
|
287942
287920
|
function isObjectLike(value) {
|
|
287943
287921
|
return typeof value === 'object' && value !== null;
|
|
287944
287922
|
}
|
|
287945
|
-
|
|
287923
|
+
/* harmony default export */ const is_object = ((input) => {
|
|
287946
287924
|
if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {
|
|
287947
287925
|
return false;
|
|
287948
287926
|
}
|
|
@@ -287954,345 +287932,165 @@ function isObject(input) {
|
|
|
287954
287932
|
proto = Object.getPrototypeOf(proto);
|
|
287955
287933
|
}
|
|
287956
287934
|
return Object.getPrototypeOf(input) === proto;
|
|
287957
|
-
}
|
|
287958
|
-
|
|
287959
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/aeskw.js
|
|
287960
|
-
|
|
287961
|
-
|
|
287962
|
-
|
|
287963
|
-
|
|
287964
|
-
|
|
287965
|
-
|
|
287966
|
-
|
|
287967
|
-
|
|
287935
|
+
});
|
|
287968
287936
|
|
|
287937
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/aeskw.js
|
|
287969
287938
|
|
|
287970
287939
|
function checkKeySize(key, alg) {
|
|
287971
|
-
if (key.
|
|
287940
|
+
if (key.algorithm.length !== parseInt(alg.slice(1, 4), 10)) {
|
|
287972
287941
|
throw new TypeError(`Invalid key size for alg: ${alg}`);
|
|
287973
287942
|
}
|
|
287974
287943
|
}
|
|
287975
|
-
function
|
|
287976
|
-
if (is_key_object(key)) {
|
|
287977
|
-
return key;
|
|
287978
|
-
}
|
|
287944
|
+
function getCryptoKey(key, alg, usage) {
|
|
287979
287945
|
if (key instanceof Uint8Array) {
|
|
287980
|
-
return (
|
|
287981
|
-
}
|
|
287982
|
-
if (webcrypto_isCryptoKey(key)) {
|
|
287983
|
-
checkEncCryptoKey(key, alg, usage);
|
|
287984
|
-
return external_node_crypto_.KeyObject.from(key);
|
|
287985
|
-
}
|
|
287986
|
-
throw new TypeError(invalid_key_input(key, ...is_key_like_types, 'Uint8Array'));
|
|
287987
|
-
}
|
|
287988
|
-
const aeskw_wrap = (alg, key, cek) => {
|
|
287989
|
-
const size = parseInt(alg.slice(1, 4), 10);
|
|
287990
|
-
const algorithm = `aes${size}-wrap`;
|
|
287991
|
-
if (!supported(algorithm)) {
|
|
287992
|
-
throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
|
|
287946
|
+
return crypto.subtle.importKey('raw', key, 'AES-KW', true, [usage]);
|
|
287993
287947
|
}
|
|
287994
|
-
|
|
287995
|
-
|
|
287996
|
-
const cipher = createCipheriv(algorithm, keyObject, Buffer.alloc(8, 0xa6));
|
|
287997
|
-
return concat(cipher.update(cek), cipher.final());
|
|
287998
|
-
};
|
|
287999
|
-
const unwrap = (alg, key, encryptedKey) => {
|
|
288000
|
-
const size = parseInt(alg.slice(1, 4), 10);
|
|
288001
|
-
const algorithm = `aes${size}-wrap`;
|
|
288002
|
-
if (!runtime_ciphers(algorithm)) {
|
|
288003
|
-
throw new errors_JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
|
|
288004
|
-
}
|
|
288005
|
-
const keyObject = ensureKeyObject(key, alg, 'unwrapKey');
|
|
288006
|
-
checkKeySize(keyObject, alg);
|
|
288007
|
-
const cipher = (0,external_node_crypto_.createDecipheriv)(algorithm, keyObject, external_node_buffer_.Buffer.alloc(8, 0xa6));
|
|
288008
|
-
return buffer_utils_concat(cipher.update(encryptedKey), cipher.final());
|
|
288009
|
-
};
|
|
288010
|
-
|
|
288011
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/is_jwk.js
|
|
288012
|
-
|
|
288013
|
-
function isJWK(key) {
|
|
288014
|
-
return isObject(key) && typeof key.kty === 'string';
|
|
288015
|
-
}
|
|
288016
|
-
function isPrivateJWK(key) {
|
|
288017
|
-
return key.kty !== 'oct' && typeof key.d === 'string';
|
|
287948
|
+
crypto_key_checkEncCryptoKey(key, alg, usage);
|
|
287949
|
+
return key;
|
|
288018
287950
|
}
|
|
288019
|
-
function
|
|
288020
|
-
|
|
287951
|
+
async function wrap(alg, key, cek) {
|
|
287952
|
+
const cryptoKey = await getCryptoKey(key, alg, 'wrapKey');
|
|
287953
|
+
checkKeySize(cryptoKey, alg);
|
|
287954
|
+
const cryptoKeyCek = await crypto.subtle.importKey('raw', cek, { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);
|
|
287955
|
+
return new Uint8Array(await crypto.subtle.wrapKey('raw', cryptoKeyCek, cryptoKey, 'AES-KW'));
|
|
288021
287956
|
}
|
|
288022
|
-
function
|
|
288023
|
-
|
|
287957
|
+
async function unwrap(alg, key, encryptedKey) {
|
|
287958
|
+
const cryptoKey = await getCryptoKey(key, alg, 'unwrapKey');
|
|
287959
|
+
checkKeySize(cryptoKey, alg);
|
|
287960
|
+
const cryptoKeyCek = await crypto.subtle.unwrapKey('raw', encryptedKey, cryptoKey, 'AES-KW', { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);
|
|
287961
|
+
return new Uint8Array(await crypto.subtle.exportKey('raw', cryptoKeyCek));
|
|
288024
287962
|
}
|
|
288025
287963
|
|
|
288026
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288027
|
-
|
|
288028
|
-
|
|
288029
|
-
|
|
288030
|
-
|
|
288031
|
-
|
|
288032
|
-
|
|
288033
|
-
|
|
288034
|
-
const weakMap = new WeakMap();
|
|
288035
|
-
const namedCurveToJOSE = (namedCurve) => {
|
|
288036
|
-
switch (namedCurve) {
|
|
288037
|
-
case 'prime256v1':
|
|
288038
|
-
return 'P-256';
|
|
288039
|
-
case 'secp384r1':
|
|
288040
|
-
return 'P-384';
|
|
288041
|
-
case 'secp521r1':
|
|
288042
|
-
return 'P-521';
|
|
288043
|
-
case 'secp256k1':
|
|
288044
|
-
return 'secp256k1';
|
|
288045
|
-
default:
|
|
288046
|
-
throw new errors_JOSENotSupported('Unsupported key curve for this operation');
|
|
288047
|
-
}
|
|
288048
|
-
};
|
|
288049
|
-
const get_named_curve_getNamedCurve = (kee, raw) => {
|
|
288050
|
-
let key;
|
|
288051
|
-
if (webcrypto_isCryptoKey(kee)) {
|
|
288052
|
-
key = external_node_crypto_.KeyObject.from(kee);
|
|
288053
|
-
}
|
|
288054
|
-
else if (is_key_object(kee)) {
|
|
288055
|
-
key = kee;
|
|
288056
|
-
}
|
|
288057
|
-
else if (isJWK(kee)) {
|
|
288058
|
-
return kee.crv;
|
|
288059
|
-
}
|
|
288060
|
-
else {
|
|
288061
|
-
throw new TypeError(invalid_key_input(kee, ...is_key_like_types));
|
|
288062
|
-
}
|
|
288063
|
-
if (key.type === 'secret') {
|
|
288064
|
-
throw new TypeError('only "private" or "public" type keys can be used for this operation');
|
|
288065
|
-
}
|
|
288066
|
-
switch (key.asymmetricKeyType) {
|
|
288067
|
-
case 'ed25519':
|
|
288068
|
-
case 'ed448':
|
|
288069
|
-
return `Ed${key.asymmetricKeyType.slice(2)}`;
|
|
288070
|
-
case 'x25519':
|
|
288071
|
-
case 'x448':
|
|
288072
|
-
return `X${key.asymmetricKeyType.slice(1)}`;
|
|
288073
|
-
case 'ec': {
|
|
288074
|
-
const namedCurve = key.asymmetricKeyDetails.namedCurve;
|
|
288075
|
-
if (raw) {
|
|
288076
|
-
return namedCurve;
|
|
288077
|
-
}
|
|
288078
|
-
return namedCurveToJOSE(namedCurve);
|
|
288079
|
-
}
|
|
288080
|
-
default:
|
|
288081
|
-
throw new TypeError('Invalid asymmetric key type for this operation');
|
|
288082
|
-
}
|
|
288083
|
-
};
|
|
288084
|
-
/* harmony default export */ const get_named_curve = (get_named_curve_getNamedCurve);
|
|
288085
|
-
|
|
288086
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/ecdhes.js
|
|
288087
|
-
|
|
288088
|
-
|
|
288089
|
-
|
|
288090
|
-
|
|
288091
|
-
|
|
288092
|
-
|
|
287964
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/digest.js
|
|
287965
|
+
/* harmony default export */ const digest = (async (algorithm, data) => {
|
|
287966
|
+
const subtleDigest = `SHA-${algorithm.slice(-3)}`;
|
|
287967
|
+
return new Uint8Array(await crypto.subtle.digest(subtleDigest, data));
|
|
287968
|
+
});
|
|
288093
287969
|
|
|
287970
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/ecdhes.js
|
|
288094
287971
|
|
|
288095
287972
|
|
|
288096
287973
|
|
|
288097
|
-
|
|
288098
|
-
|
|
288099
|
-
|
|
288100
|
-
|
|
288101
|
-
|
|
288102
|
-
|
|
288103
|
-
|
|
288104
|
-
|
|
288105
|
-
|
|
288106
|
-
|
|
288107
|
-
|
|
288108
|
-
|
|
288109
|
-
}
|
|
288110
|
-
let privateKey;
|
|
288111
|
-
if (webcrypto_isCryptoKey(privateKee)) {
|
|
288112
|
-
checkEncCryptoKey(privateKee, 'ECDH', 'deriveBits');
|
|
288113
|
-
privateKey = external_node_crypto_.KeyObject.from(privateKee);
|
|
287974
|
+
function lengthAndInput(input) {
|
|
287975
|
+
return concat(uint32be(input.length), input);
|
|
287976
|
+
}
|
|
287977
|
+
async function concatKdf(secret, bits, value) {
|
|
287978
|
+
const iterations = Math.ceil((bits >> 3) / 32);
|
|
287979
|
+
const res = new Uint8Array(iterations * 32);
|
|
287980
|
+
for (let iter = 0; iter < iterations; iter++) {
|
|
287981
|
+
const buf = new Uint8Array(4 + secret.length + value.length);
|
|
287982
|
+
buf.set(uint32be(iter + 1));
|
|
287983
|
+
buf.set(secret, 4);
|
|
287984
|
+
buf.set(value, 4 + secret.length);
|
|
287985
|
+
res.set(await digest('sha256', buf), iter * 32);
|
|
288114
287986
|
}
|
|
288115
|
-
|
|
288116
|
-
|
|
287987
|
+
return res.slice(0, bits >> 3);
|
|
287988
|
+
}
|
|
287989
|
+
async function deriveKey(publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) {
|
|
287990
|
+
crypto_key_checkEncCryptoKey(publicKey, 'ECDH');
|
|
287991
|
+
crypto_key_checkEncCryptoKey(privateKey, 'ECDH', 'deriveBits');
|
|
287992
|
+
const value = concat(lengthAndInput(buffer_utils_encoder.encode(algorithm)), lengthAndInput(apu), lengthAndInput(apv), uint32be(keyLength));
|
|
287993
|
+
let length;
|
|
287994
|
+
if (publicKey.algorithm.name === 'X25519') {
|
|
287995
|
+
length = 256;
|
|
288117
287996
|
}
|
|
288118
287997
|
else {
|
|
288119
|
-
|
|
287998
|
+
length =
|
|
287999
|
+
Math.ceil(parseInt(publicKey.algorithm.namedCurve.slice(-3), 10) / 8) << 3;
|
|
288120
288000
|
}
|
|
288121
|
-
const
|
|
288122
|
-
|
|
288001
|
+
const sharedSecret = new Uint8Array(await crypto.subtle.deriveBits({
|
|
288002
|
+
name: publicKey.algorithm.name,
|
|
288003
|
+
public: publicKey,
|
|
288004
|
+
}, privateKey, length));
|
|
288123
288005
|
return concatKdf(sharedSecret, keyLength, value);
|
|
288124
288006
|
}
|
|
288125
|
-
|
|
288126
|
-
|
|
288127
|
-
|
|
288128
|
-
|
|
288129
|
-
|
|
288130
|
-
|
|
288131
|
-
key = kee;
|
|
288132
|
-
}
|
|
288133
|
-
else {
|
|
288134
|
-
throw new TypeError(invalidKeyInput(kee, ...types));
|
|
288135
|
-
}
|
|
288136
|
-
switch (key.asymmetricKeyType) {
|
|
288137
|
-
case 'x25519':
|
|
288138
|
-
return ecdhes_generateKeyPair('x25519');
|
|
288139
|
-
case 'x448': {
|
|
288140
|
-
return ecdhes_generateKeyPair('x448');
|
|
288141
|
-
}
|
|
288142
|
-
case 'ec': {
|
|
288143
|
-
const namedCurve = getNamedCurve(key);
|
|
288144
|
-
return ecdhes_generateKeyPair('ec', { namedCurve });
|
|
288145
|
-
}
|
|
288007
|
+
function allowed(key) {
|
|
288008
|
+
switch (key.algorithm.namedCurve) {
|
|
288009
|
+
case 'P-256':
|
|
288010
|
+
case 'P-384':
|
|
288011
|
+
case 'P-521':
|
|
288012
|
+
return true;
|
|
288146
288013
|
default:
|
|
288147
|
-
|
|
288014
|
+
return key.algorithm.name === 'X25519';
|
|
288148
288015
|
}
|
|
288149
288016
|
}
|
|
288150
|
-
const ecdhAllowed = (key) => ['P-256', 'P-384', 'P-521', 'X25519', 'X448'].includes(get_named_curve(key));
|
|
288151
|
-
|
|
288152
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/check_p2s.js
|
|
288153
|
-
|
|
288154
|
-
function check_p2s_checkP2s(p2s) {
|
|
288155
|
-
if (!(p2s instanceof Uint8Array) || p2s.length < 8) {
|
|
288156
|
-
throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');
|
|
288157
|
-
}
|
|
288158
|
-
}
|
|
288159
|
-
|
|
288160
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/pbes2kw.js
|
|
288161
|
-
|
|
288162
288017
|
|
|
288018
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/pbes2kw.js
|
|
288163
288019
|
|
|
288164
288020
|
|
|
288165
288021
|
|
|
288166
288022
|
|
|
288167
288023
|
|
|
288168
|
-
|
|
288169
|
-
|
|
288170
|
-
|
|
288171
|
-
|
|
288172
|
-
|
|
288173
|
-
const pbkdf2 = (0,external_node_util_namespaceObject.promisify)(external_node_crypto_.pbkdf2);
|
|
288174
|
-
function getPassword(key, alg) {
|
|
288175
|
-
if (is_key_object(key)) {
|
|
288176
|
-
return key.export();
|
|
288177
|
-
}
|
|
288024
|
+
function pbes2kw_getCryptoKey(key, alg) {
|
|
288178
288025
|
if (key instanceof Uint8Array) {
|
|
288179
|
-
return key;
|
|
288026
|
+
return crypto.subtle.importKey('raw', key, 'PBKDF2', false, ['deriveBits']);
|
|
288180
288027
|
}
|
|
288181
|
-
|
|
288182
|
-
|
|
288183
|
-
return external_node_crypto_.KeyObject.from(key).export();
|
|
288184
|
-
}
|
|
288185
|
-
throw new TypeError(invalid_key_input(key, ...is_key_like_types, 'Uint8Array'));
|
|
288028
|
+
crypto_key_checkEncCryptoKey(key, alg, 'deriveBits');
|
|
288029
|
+
return key;
|
|
288186
288030
|
}
|
|
288187
|
-
const
|
|
288188
|
-
|
|
288031
|
+
const concatSalt = (alg, p2sInput) => concat(buffer_utils_encoder.encode(alg), new Uint8Array([0]), p2sInput);
|
|
288032
|
+
async function pbes2kw_deriveKey(p2s, alg, p2c, key) {
|
|
288033
|
+
if (!(p2s instanceof Uint8Array) || p2s.length < 8) {
|
|
288034
|
+
throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');
|
|
288035
|
+
}
|
|
288189
288036
|
const salt = concatSalt(alg, p2s);
|
|
288190
|
-
const keylen = parseInt(alg.slice(13, 16), 10)
|
|
288191
|
-
const
|
|
288192
|
-
|
|
288193
|
-
|
|
288194
|
-
|
|
288195
|
-
|
|
288196
|
-
|
|
288197
|
-
|
|
288198
|
-
|
|
288199
|
-
|
|
288200
|
-
|
|
288201
|
-
const
|
|
288202
|
-
|
|
288203
|
-
};
|
|
288204
|
-
|
|
288205
|
-
|
|
288037
|
+
const keylen = parseInt(alg.slice(13, 16), 10);
|
|
288038
|
+
const subtleAlg = {
|
|
288039
|
+
hash: `SHA-${alg.slice(8, 11)}`,
|
|
288040
|
+
iterations: p2c,
|
|
288041
|
+
name: 'PBKDF2',
|
|
288042
|
+
salt,
|
|
288043
|
+
};
|
|
288044
|
+
const cryptoKey = await pbes2kw_getCryptoKey(key, alg);
|
|
288045
|
+
return new Uint8Array(await crypto.subtle.deriveBits(subtleAlg, cryptoKey, keylen));
|
|
288046
|
+
}
|
|
288047
|
+
async function pbes2kw_wrap(alg, key, cek, p2c = 2048, p2s = crypto.getRandomValues(new Uint8Array(16))) {
|
|
288048
|
+
const derived = await pbes2kw_deriveKey(p2s, alg, p2c, key);
|
|
288049
|
+
const encryptedKey = await aeskw.wrap(alg.slice(-6), derived, cek);
|
|
288050
|
+
return { encryptedKey, p2c, p2s: b64u(p2s) };
|
|
288051
|
+
}
|
|
288052
|
+
async function pbes2kw_unwrap(alg, key, encryptedKey, p2c, p2s) {
|
|
288053
|
+
const derived = await pbes2kw_deriveKey(p2s, alg, p2c, key);
|
|
288054
|
+
return unwrap(alg.slice(-6), derived, encryptedKey);
|
|
288055
|
+
}
|
|
288206
288056
|
|
|
288207
|
-
|
|
288208
|
-
|
|
288209
|
-
|
|
288210
|
-
|
|
288211
|
-
|
|
288057
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_key_length.js
|
|
288058
|
+
/* harmony default export */ const check_key_length = ((alg, key) => {
|
|
288059
|
+
if (alg.startsWith('RS') || alg.startsWith('PS')) {
|
|
288060
|
+
const { modulusLength } = key.algorithm;
|
|
288061
|
+
if (typeof modulusLength !== 'number' || modulusLength < 2048) {
|
|
288062
|
+
throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
|
|
288212
288063
|
}
|
|
288213
|
-
else {
|
|
288214
|
-
modulusLength = Buffer.from(key.n, 'base64url').byteLength << 3;
|
|
288215
|
-
}
|
|
288216
|
-
}
|
|
288217
|
-
catch { }
|
|
288218
|
-
if (typeof modulusLength !== 'number' || modulusLength < 2048) {
|
|
288219
|
-
throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
|
|
288220
288064
|
}
|
|
288221
288065
|
});
|
|
288222
288066
|
|
|
288223
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288224
|
-
|
|
288225
|
-
|
|
288226
|
-
|
|
288227
|
-
|
|
288228
|
-
|
|
288067
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/rsaes.js
|
|
288229
288068
|
|
|
288230
288069
|
|
|
288231
288070
|
|
|
288232
|
-
const
|
|
288233
|
-
if (key.asymmetricKeyType !== 'rsa') {
|
|
288234
|
-
throw new TypeError('Invalid key for this operation, its asymmetricKeyType must be rsa');
|
|
288235
|
-
}
|
|
288236
|
-
check_key_length(key, alg);
|
|
288237
|
-
};
|
|
288238
|
-
const RSA1_5 = (0,external_node_util_namespaceObject.deprecate)(() => external_node_crypto_.constants.RSA_PKCS1_PADDING, 'The RSA1_5 "alg" (JWE Algorithm) is deprecated and will be removed in the next major revision.');
|
|
288239
|
-
const resolvePadding = (alg) => {
|
|
288240
|
-
switch (alg) {
|
|
288241
|
-
case 'RSA-OAEP':
|
|
288242
|
-
case 'RSA-OAEP-256':
|
|
288243
|
-
case 'RSA-OAEP-384':
|
|
288244
|
-
case 'RSA-OAEP-512':
|
|
288245
|
-
return external_node_crypto_.constants.RSA_PKCS1_OAEP_PADDING;
|
|
288246
|
-
case 'RSA1_5':
|
|
288247
|
-
return RSA1_5();
|
|
288248
|
-
default:
|
|
288249
|
-
return undefined;
|
|
288250
|
-
}
|
|
288251
|
-
};
|
|
288252
|
-
const resolveOaepHash = (alg) => {
|
|
288071
|
+
const subtleAlgorithm = (alg) => {
|
|
288253
288072
|
switch (alg) {
|
|
288254
288073
|
case 'RSA-OAEP':
|
|
288255
|
-
return 'sha1';
|
|
288256
288074
|
case 'RSA-OAEP-256':
|
|
288257
|
-
return 'sha256';
|
|
288258
288075
|
case 'RSA-OAEP-384':
|
|
288259
|
-
return 'sha384';
|
|
288260
288076
|
case 'RSA-OAEP-512':
|
|
288261
|
-
return '
|
|
288077
|
+
return 'RSA-OAEP';
|
|
288262
288078
|
default:
|
|
288263
|
-
|
|
288079
|
+
throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
|
|
288264
288080
|
}
|
|
288265
288081
|
};
|
|
288266
|
-
function
|
|
288267
|
-
|
|
288268
|
-
|
|
288269
|
-
|
|
288270
|
-
|
|
288271
|
-
|
|
288272
|
-
|
|
288273
|
-
|
|
288274
|
-
|
|
288082
|
+
async function rsaes_encrypt(alg, key, cek) {
|
|
288083
|
+
checkEncCryptoKey(key, alg, 'encrypt');
|
|
288084
|
+
checkKeyLength(alg, key);
|
|
288085
|
+
return new Uint8Array(await crypto.subtle.encrypt(subtleAlgorithm(alg), key, cek));
|
|
288086
|
+
}
|
|
288087
|
+
async function rsaes_decrypt(alg, key, encryptedKey) {
|
|
288088
|
+
crypto_key_checkEncCryptoKey(key, alg, 'decrypt');
|
|
288089
|
+
check_key_length(alg, key);
|
|
288090
|
+
return new Uint8Array(await crypto.subtle.decrypt(subtleAlgorithm(alg), key, encryptedKey));
|
|
288275
288091
|
}
|
|
288276
|
-
const rsaes_encrypt = (alg, key, cek) => {
|
|
288277
|
-
const padding = resolvePadding(alg);
|
|
288278
|
-
const oaepHash = resolveOaepHash(alg);
|
|
288279
|
-
const keyObject = rsaes_ensureKeyObject(key, alg, 'wrapKey', 'encrypt');
|
|
288280
|
-
checkKey(keyObject, alg);
|
|
288281
|
-
return publicEncrypt({ key: keyObject, oaepHash, padding }, cek);
|
|
288282
|
-
};
|
|
288283
|
-
const rsaes_decrypt = (alg, key, encryptedKey) => {
|
|
288284
|
-
const padding = resolvePadding(alg);
|
|
288285
|
-
const oaepHash = resolveOaepHash(alg);
|
|
288286
|
-
const keyObject = rsaes_ensureKeyObject(key, alg, 'unwrapKey', 'decrypt');
|
|
288287
|
-
checkKey(keyObject, alg);
|
|
288288
|
-
return (0,external_node_crypto_.privateDecrypt)({ key: keyObject, oaepHash, padding }, encryptedKey);
|
|
288289
|
-
};
|
|
288290
|
-
|
|
288291
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/normalize_key.js
|
|
288292
|
-
/* harmony default export */ const normalize_key = ({});
|
|
288293
|
-
|
|
288294
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/cek.js
|
|
288295
288092
|
|
|
288093
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/cek.js
|
|
288296
288094
|
|
|
288297
288095
|
function cek_bitLength(alg) {
|
|
288298
288096
|
switch (alg) {
|
|
@@ -288308,22 +288106,108 @@ function cek_bitLength(alg) {
|
|
|
288308
288106
|
case 'A256CBC-HS512':
|
|
288309
288107
|
return 512;
|
|
288310
288108
|
default:
|
|
288311
|
-
throw new
|
|
288109
|
+
throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
|
|
288312
288110
|
}
|
|
288313
288111
|
}
|
|
288314
|
-
/* harmony default export */ const lib_cek = ((alg) =>
|
|
288112
|
+
/* harmony default export */ const lib_cek = ((alg) => crypto.getRandomValues(new Uint8Array(cek_bitLength(alg) >> 3)));
|
|
288315
288113
|
|
|
288316
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288114
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/jwk_to_key.js
|
|
288317
288115
|
|
|
288318
|
-
|
|
288319
|
-
|
|
288320
|
-
|
|
288116
|
+
function subtleMapping(jwk) {
|
|
288117
|
+
let algorithm;
|
|
288118
|
+
let keyUsages;
|
|
288119
|
+
switch (jwk.kty) {
|
|
288120
|
+
case 'RSA': {
|
|
288121
|
+
switch (jwk.alg) {
|
|
288122
|
+
case 'PS256':
|
|
288123
|
+
case 'PS384':
|
|
288124
|
+
case 'PS512':
|
|
288125
|
+
algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };
|
|
288126
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288127
|
+
break;
|
|
288128
|
+
case 'RS256':
|
|
288129
|
+
case 'RS384':
|
|
288130
|
+
case 'RS512':
|
|
288131
|
+
algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };
|
|
288132
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288133
|
+
break;
|
|
288134
|
+
case 'RSA-OAEP':
|
|
288135
|
+
case 'RSA-OAEP-256':
|
|
288136
|
+
case 'RSA-OAEP-384':
|
|
288137
|
+
case 'RSA-OAEP-512':
|
|
288138
|
+
algorithm = {
|
|
288139
|
+
name: 'RSA-OAEP',
|
|
288140
|
+
hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,
|
|
288141
|
+
};
|
|
288142
|
+
keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];
|
|
288143
|
+
break;
|
|
288144
|
+
default:
|
|
288145
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
288146
|
+
}
|
|
288147
|
+
break;
|
|
288148
|
+
}
|
|
288149
|
+
case 'EC': {
|
|
288150
|
+
switch (jwk.alg) {
|
|
288151
|
+
case 'ES256':
|
|
288152
|
+
algorithm = { name: 'ECDSA', namedCurve: 'P-256' };
|
|
288153
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288154
|
+
break;
|
|
288155
|
+
case 'ES384':
|
|
288156
|
+
algorithm = { name: 'ECDSA', namedCurve: 'P-384' };
|
|
288157
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288158
|
+
break;
|
|
288159
|
+
case 'ES512':
|
|
288160
|
+
algorithm = { name: 'ECDSA', namedCurve: 'P-521' };
|
|
288161
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288162
|
+
break;
|
|
288163
|
+
case 'ECDH-ES':
|
|
288164
|
+
case 'ECDH-ES+A128KW':
|
|
288165
|
+
case 'ECDH-ES+A192KW':
|
|
288166
|
+
case 'ECDH-ES+A256KW':
|
|
288167
|
+
algorithm = { name: 'ECDH', namedCurve: jwk.crv };
|
|
288168
|
+
keyUsages = jwk.d ? ['deriveBits'] : [];
|
|
288169
|
+
break;
|
|
288170
|
+
default:
|
|
288171
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
288172
|
+
}
|
|
288173
|
+
break;
|
|
288174
|
+
}
|
|
288175
|
+
case 'OKP': {
|
|
288176
|
+
switch (jwk.alg) {
|
|
288177
|
+
case 'Ed25519':
|
|
288178
|
+
case 'EdDSA':
|
|
288179
|
+
algorithm = { name: 'Ed25519' };
|
|
288180
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288181
|
+
break;
|
|
288182
|
+
case 'ECDH-ES':
|
|
288183
|
+
case 'ECDH-ES+A128KW':
|
|
288184
|
+
case 'ECDH-ES+A192KW':
|
|
288185
|
+
case 'ECDH-ES+A256KW':
|
|
288186
|
+
algorithm = { name: jwk.crv };
|
|
288187
|
+
keyUsages = jwk.d ? ['deriveBits'] : [];
|
|
288188
|
+
break;
|
|
288189
|
+
default:
|
|
288190
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
288191
|
+
}
|
|
288192
|
+
break;
|
|
288193
|
+
}
|
|
288194
|
+
default:
|
|
288195
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
|
|
288321
288196
|
}
|
|
288322
|
-
return
|
|
288323
|
-
}
|
|
288324
|
-
/* harmony default export */ const jwk_to_key = (
|
|
288197
|
+
return { algorithm, keyUsages };
|
|
288198
|
+
}
|
|
288199
|
+
/* harmony default export */ const jwk_to_key = (async (jwk) => {
|
|
288200
|
+
if (!jwk.alg) {
|
|
288201
|
+
throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
|
|
288202
|
+
}
|
|
288203
|
+
const { algorithm, keyUsages } = subtleMapping(jwk);
|
|
288204
|
+
const keyData = { ...jwk };
|
|
288205
|
+
delete keyData.alg;
|
|
288206
|
+
delete keyData.use;
|
|
288207
|
+
return crypto.subtle.importKey('jwk', keyData, algorithm, jwk.ext ?? (jwk.d ? false : true), jwk.key_ops ?? keyUsages);
|
|
288208
|
+
});
|
|
288325
288209
|
|
|
288326
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288210
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/key/import.js
|
|
288327
288211
|
|
|
288328
288212
|
|
|
288329
288213
|
|
|
@@ -288347,11 +288231,13 @@ async function importPKCS8(pkcs8, alg, options) {
|
|
|
288347
288231
|
}
|
|
288348
288232
|
return fromPKCS8(pkcs8, alg, options);
|
|
288349
288233
|
}
|
|
288350
|
-
async function importJWK(jwk, alg) {
|
|
288351
|
-
if (!
|
|
288234
|
+
async function importJWK(jwk, alg, options) {
|
|
288235
|
+
if (!is_object(jwk)) {
|
|
288352
288236
|
throw new TypeError('JWK must be an object');
|
|
288353
288237
|
}
|
|
288354
|
-
|
|
288238
|
+
let ext;
|
|
288239
|
+
alg ??= jwk.alg;
|
|
288240
|
+
ext ??= options?.extractable ?? jwk.ext;
|
|
288355
288241
|
switch (jwk.kty) {
|
|
288356
288242
|
case 'oct':
|
|
288357
288243
|
if (typeof jwk.k !== 'string' || !jwk.k) {
|
|
@@ -288359,97 +288245,18 @@ async function importJWK(jwk, alg) {
|
|
|
288359
288245
|
}
|
|
288360
288246
|
return decode(jwk.k);
|
|
288361
288247
|
case 'RSA':
|
|
288362
|
-
if (jwk.oth !== undefined) {
|
|
288363
|
-
throw new
|
|
288248
|
+
if ('oth' in jwk && jwk.oth !== undefined) {
|
|
288249
|
+
throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
|
|
288364
288250
|
}
|
|
288365
288251
|
case 'EC':
|
|
288366
288252
|
case 'OKP':
|
|
288367
|
-
return jwk_to_key({ ...jwk, alg });
|
|
288253
|
+
return jwk_to_key({ ...jwk, alg, ext });
|
|
288368
288254
|
default:
|
|
288369
|
-
throw new
|
|
288255
|
+
throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
|
|
288370
288256
|
}
|
|
288371
288257
|
}
|
|
288372
288258
|
|
|
288373
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288374
|
-
|
|
288375
|
-
|
|
288376
|
-
|
|
288377
|
-
const tag = (key) => key?.[Symbol.toStringTag];
|
|
288378
|
-
const jwkMatchesOp = (alg, key, usage) => {
|
|
288379
|
-
if (key.use !== undefined && key.use !== 'sig') {
|
|
288380
|
-
throw new TypeError('Invalid key for this operation, when present its use must be sig');
|
|
288381
|
-
}
|
|
288382
|
-
if (key.key_ops !== undefined && key.key_ops.includes?.(usage) !== true) {
|
|
288383
|
-
throw new TypeError(`Invalid key for this operation, when present its key_ops must include ${usage}`);
|
|
288384
|
-
}
|
|
288385
|
-
if (key.alg !== undefined && key.alg !== alg) {
|
|
288386
|
-
throw new TypeError(`Invalid key for this operation, when present its alg must be ${alg}`);
|
|
288387
|
-
}
|
|
288388
|
-
return true;
|
|
288389
|
-
};
|
|
288390
|
-
const symmetricTypeCheck = (alg, key, usage, allowJwk) => {
|
|
288391
|
-
if (key instanceof Uint8Array)
|
|
288392
|
-
return;
|
|
288393
|
-
if (allowJwk && isJWK(key)) {
|
|
288394
|
-
if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288395
|
-
return;
|
|
288396
|
-
throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
|
|
288397
|
-
}
|
|
288398
|
-
if (!is_key_like(key)) {
|
|
288399
|
-
throw new TypeError(withAlg(alg, key, ...is_key_like_types, 'Uint8Array', allowJwk ? 'JSON Web Key' : null));
|
|
288400
|
-
}
|
|
288401
|
-
if (key.type !== 'secret') {
|
|
288402
|
-
throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
|
|
288403
|
-
}
|
|
288404
|
-
};
|
|
288405
|
-
const asymmetricTypeCheck = (alg, key, usage, allowJwk) => {
|
|
288406
|
-
if (allowJwk && isJWK(key)) {
|
|
288407
|
-
switch (usage) {
|
|
288408
|
-
case 'sign':
|
|
288409
|
-
if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288410
|
-
return;
|
|
288411
|
-
throw new TypeError(`JSON Web Key for this operation be a private JWK`);
|
|
288412
|
-
case 'verify':
|
|
288413
|
-
if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288414
|
-
return;
|
|
288415
|
-
throw new TypeError(`JSON Web Key for this operation be a public JWK`);
|
|
288416
|
-
}
|
|
288417
|
-
}
|
|
288418
|
-
if (!is_key_like(key)) {
|
|
288419
|
-
throw new TypeError(withAlg(alg, key, ...is_key_like_types, allowJwk ? 'JSON Web Key' : null));
|
|
288420
|
-
}
|
|
288421
|
-
if (key.type === 'secret') {
|
|
288422
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
|
|
288423
|
-
}
|
|
288424
|
-
if (usage === 'sign' && key.type === 'public') {
|
|
288425
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
|
|
288426
|
-
}
|
|
288427
|
-
if (usage === 'decrypt' && key.type === 'public') {
|
|
288428
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
|
|
288429
|
-
}
|
|
288430
|
-
if (key.algorithm && usage === 'verify' && key.type === 'private') {
|
|
288431
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
|
|
288432
|
-
}
|
|
288433
|
-
if (key.algorithm && usage === 'encrypt' && key.type === 'private') {
|
|
288434
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
|
|
288435
|
-
}
|
|
288436
|
-
};
|
|
288437
|
-
function checkKeyType(allowJwk, alg, key, usage) {
|
|
288438
|
-
const symmetric = alg.startsWith('HS') ||
|
|
288439
|
-
alg === 'dir' ||
|
|
288440
|
-
alg.startsWith('PBES2') ||
|
|
288441
|
-
/^A\d{3}(?:GCM)?KW$/.test(alg);
|
|
288442
|
-
if (symmetric) {
|
|
288443
|
-
symmetricTypeCheck(alg, key, usage, allowJwk);
|
|
288444
|
-
}
|
|
288445
|
-
else {
|
|
288446
|
-
asymmetricTypeCheck(alg, key, usage, allowJwk);
|
|
288447
|
-
}
|
|
288448
|
-
}
|
|
288449
|
-
/* harmony default export */ const check_key_type = (checkKeyType.bind(undefined, false));
|
|
288450
|
-
const checkKeyTypeWithJwk = checkKeyType.bind(undefined, true);
|
|
288451
|
-
|
|
288452
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/aesgcmkw.js
|
|
288259
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/aesgcmkw.js
|
|
288453
288260
|
|
|
288454
288261
|
|
|
288455
288262
|
|
|
@@ -288458,17 +288265,16 @@ async function aesgcmkw_wrap(alg, key, cek, iv) {
|
|
|
288458
288265
|
const wrapped = await encrypt(jweAlgorithm, cek, key, iv, new Uint8Array(0));
|
|
288459
288266
|
return {
|
|
288460
288267
|
encryptedKey: wrapped.ciphertext,
|
|
288461
|
-
iv:
|
|
288462
|
-
tag:
|
|
288268
|
+
iv: b64u(wrapped.iv),
|
|
288269
|
+
tag: b64u(wrapped.tag),
|
|
288463
288270
|
};
|
|
288464
288271
|
}
|
|
288465
288272
|
async function aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag) {
|
|
288466
288273
|
const jweAlgorithm = alg.slice(0, 7);
|
|
288467
|
-
return
|
|
288274
|
+
return decrypt(jweAlgorithm, key, encryptedKey, iv, tag, new Uint8Array(0));
|
|
288468
288275
|
}
|
|
288469
288276
|
|
|
288470
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288471
|
-
|
|
288277
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/decrypt_key_management.js
|
|
288472
288278
|
|
|
288473
288279
|
|
|
288474
288280
|
|
|
@@ -288480,9 +288286,7 @@ async function aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag) {
|
|
|
288480
288286
|
|
|
288481
288287
|
|
|
288482
288288
|
|
|
288483
|
-
|
|
288484
|
-
check_key_type(alg, key, 'decrypt');
|
|
288485
|
-
key = (await normalize_key.normalizePrivateKey?.(key, alg)) || key;
|
|
288289
|
+
/* harmony default export */ const decrypt_key_management = (async (alg, key, encryptedKey, joseHeader, options) => {
|
|
288486
288290
|
switch (alg) {
|
|
288487
288291
|
case 'dir': {
|
|
288488
288292
|
if (encryptedKey !== undefined)
|
|
@@ -288495,11 +288299,13 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288495
288299
|
case 'ECDH-ES+A128KW':
|
|
288496
288300
|
case 'ECDH-ES+A192KW':
|
|
288497
288301
|
case 'ECDH-ES+A256KW': {
|
|
288498
|
-
if (!
|
|
288302
|
+
if (!is_object(joseHeader.epk))
|
|
288499
288303
|
throw new JWEInvalid(`JOSE Header "epk" (Ephemeral Public Key) missing or invalid`);
|
|
288500
|
-
|
|
288501
|
-
|
|
288304
|
+
is_key_like_assertCryptoKey(key);
|
|
288305
|
+
if (!allowed(key))
|
|
288306
|
+
throw new JOSENotSupported('ECDH with the provided key is not allowed or not supported by your javascript runtime');
|
|
288502
288307
|
const epk = await importJWK(joseHeader.epk, alg);
|
|
288308
|
+
is_key_like_assertCryptoKey(epk);
|
|
288503
288309
|
let partyUInfo;
|
|
288504
288310
|
let partyVInfo;
|
|
288505
288311
|
if (joseHeader.apu !== undefined) {
|
|
@@ -288529,13 +288335,13 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288529
288335
|
throw new JWEInvalid('JWE Encrypted Key missing');
|
|
288530
288336
|
return unwrap(alg.slice(-6), sharedSecret, encryptedKey);
|
|
288531
288337
|
}
|
|
288532
|
-
case 'RSA1_5':
|
|
288533
288338
|
case 'RSA-OAEP':
|
|
288534
288339
|
case 'RSA-OAEP-256':
|
|
288535
288340
|
case 'RSA-OAEP-384':
|
|
288536
288341
|
case 'RSA-OAEP-512': {
|
|
288537
288342
|
if (encryptedKey === undefined)
|
|
288538
288343
|
throw new JWEInvalid('JWE Encrypted Key missing');
|
|
288344
|
+
is_key_like_assertCryptoKey(key);
|
|
288539
288345
|
return rsaes_decrypt(alg, key, encryptedKey);
|
|
288540
288346
|
}
|
|
288541
288347
|
case 'PBES2-HS256+A128KW':
|
|
@@ -288557,7 +288363,7 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288557
288363
|
catch {
|
|
288558
288364
|
throw new JWEInvalid('Failed to base64url decode the p2s');
|
|
288559
288365
|
}
|
|
288560
|
-
return
|
|
288366
|
+
return pbes2kw_unwrap(alg, key, encryptedKey, joseHeader.p2c, p2s);
|
|
288561
288367
|
}
|
|
288562
288368
|
case 'A128KW':
|
|
288563
288369
|
case 'A192KW':
|
|
@@ -288592,15 +288398,14 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288592
288398
|
return aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag);
|
|
288593
288399
|
}
|
|
288594
288400
|
default: {
|
|
288595
|
-
throw new
|
|
288401
|
+
throw new JOSENotSupported('Invalid or unsupported "alg" (JWE Algorithm) header value');
|
|
288596
288402
|
}
|
|
288597
288403
|
}
|
|
288598
|
-
}
|
|
288599
|
-
/* harmony default export */ const decrypt_key_management = (decryptKeyManagement);
|
|
288404
|
+
});
|
|
288600
288405
|
|
|
288601
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288406
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/validate_crit.js
|
|
288602
288407
|
|
|
288603
|
-
|
|
288408
|
+
/* harmony default export */ const validate_crit = ((Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) => {
|
|
288604
288409
|
if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {
|
|
288605
288410
|
throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
|
|
288606
288411
|
}
|
|
@@ -288621,7 +288426,7 @@ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader,
|
|
|
288621
288426
|
}
|
|
288622
288427
|
for (const parameter of protectedHeader.crit) {
|
|
288623
288428
|
if (!recognized.has(parameter)) {
|
|
288624
|
-
throw new
|
|
288429
|
+
throw new JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
|
|
288625
288430
|
}
|
|
288626
288431
|
if (joseHeader[parameter] === undefined) {
|
|
288627
288432
|
throw new Err(`Extension Header Parameter "${parameter}" is missing`);
|
|
@@ -288631,11 +288436,10 @@ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader,
|
|
|
288631
288436
|
}
|
|
288632
288437
|
}
|
|
288633
288438
|
return new Set(protectedHeader.crit);
|
|
288634
|
-
}
|
|
288635
|
-
/* harmony default export */ const validate_crit = (validateCrit);
|
|
288439
|
+
});
|
|
288636
288440
|
|
|
288637
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288638
|
-
const
|
|
288441
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/validate_algorithms.js
|
|
288442
|
+
/* harmony default export */ const validate_algorithms = ((option, algorithms) => {
|
|
288639
288443
|
if (algorithms !== undefined &&
|
|
288640
288444
|
(!Array.isArray(algorithms) || algorithms.some((s) => typeof s !== 'string'))) {
|
|
288641
288445
|
throw new TypeError(`"${option}" option must be an array of strings`);
|
|
@@ -288644,10 +288448,320 @@ const validateAlgorithms = (option, algorithms) => {
|
|
|
288644
288448
|
return undefined;
|
|
288645
288449
|
}
|
|
288646
288450
|
return new Set(algorithms);
|
|
288451
|
+
});
|
|
288452
|
+
|
|
288453
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_jwk.js
|
|
288454
|
+
|
|
288455
|
+
function isJWK(key) {
|
|
288456
|
+
return is_object(key) && typeof key.kty === 'string';
|
|
288457
|
+
}
|
|
288458
|
+
function isPrivateJWK(key) {
|
|
288459
|
+
return key.kty !== 'oct' && typeof key.d === 'string';
|
|
288460
|
+
}
|
|
288461
|
+
function isPublicJWK(key) {
|
|
288462
|
+
return key.kty !== 'oct' && typeof key.d === 'undefined';
|
|
288463
|
+
}
|
|
288464
|
+
function isSecretJWK(key) {
|
|
288465
|
+
return key.kty === 'oct' && typeof key.k === 'string';
|
|
288466
|
+
}
|
|
288467
|
+
|
|
288468
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/normalize_key.js
|
|
288469
|
+
|
|
288470
|
+
|
|
288471
|
+
|
|
288472
|
+
|
|
288473
|
+
let cache;
|
|
288474
|
+
const handleJWK = async (key, jwk, alg, freeze = false) => {
|
|
288475
|
+
cache ||= new WeakMap();
|
|
288476
|
+
let cached = cache.get(key);
|
|
288477
|
+
if (cached?.[alg]) {
|
|
288478
|
+
return cached[alg];
|
|
288479
|
+
}
|
|
288480
|
+
const cryptoKey = await jwk_to_key({ ...jwk, alg });
|
|
288481
|
+
if (freeze)
|
|
288482
|
+
Object.freeze(key);
|
|
288483
|
+
if (!cached) {
|
|
288484
|
+
cache.set(key, { [alg]: cryptoKey });
|
|
288485
|
+
}
|
|
288486
|
+
else {
|
|
288487
|
+
cached[alg] = cryptoKey;
|
|
288488
|
+
}
|
|
288489
|
+
return cryptoKey;
|
|
288490
|
+
};
|
|
288491
|
+
const handleKeyObject = (keyObject, alg) => {
|
|
288492
|
+
cache ||= new WeakMap();
|
|
288493
|
+
let cached = cache.get(keyObject);
|
|
288494
|
+
if (cached?.[alg]) {
|
|
288495
|
+
return cached[alg];
|
|
288496
|
+
}
|
|
288497
|
+
const isPublic = keyObject.type === 'public';
|
|
288498
|
+
const extractable = isPublic ? true : false;
|
|
288499
|
+
let cryptoKey;
|
|
288500
|
+
if (keyObject.asymmetricKeyType === 'x25519') {
|
|
288501
|
+
switch (alg) {
|
|
288502
|
+
case 'ECDH-ES':
|
|
288503
|
+
case 'ECDH-ES+A128KW':
|
|
288504
|
+
case 'ECDH-ES+A192KW':
|
|
288505
|
+
case 'ECDH-ES+A256KW':
|
|
288506
|
+
break;
|
|
288507
|
+
default:
|
|
288508
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288509
|
+
}
|
|
288510
|
+
cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : ['deriveBits']);
|
|
288511
|
+
}
|
|
288512
|
+
if (keyObject.asymmetricKeyType === 'ed25519') {
|
|
288513
|
+
if (alg !== 'EdDSA' && alg !== 'Ed25519') {
|
|
288514
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288515
|
+
}
|
|
288516
|
+
cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [
|
|
288517
|
+
isPublic ? 'verify' : 'sign',
|
|
288518
|
+
]);
|
|
288519
|
+
}
|
|
288520
|
+
if (keyObject.asymmetricKeyType === 'rsa') {
|
|
288521
|
+
let hash;
|
|
288522
|
+
switch (alg) {
|
|
288523
|
+
case 'RSA-OAEP':
|
|
288524
|
+
hash = 'SHA-1';
|
|
288525
|
+
break;
|
|
288526
|
+
case 'RS256':
|
|
288527
|
+
case 'PS256':
|
|
288528
|
+
case 'RSA-OAEP-256':
|
|
288529
|
+
hash = 'SHA-256';
|
|
288530
|
+
break;
|
|
288531
|
+
case 'RS384':
|
|
288532
|
+
case 'PS384':
|
|
288533
|
+
case 'RSA-OAEP-384':
|
|
288534
|
+
hash = 'SHA-384';
|
|
288535
|
+
break;
|
|
288536
|
+
case 'RS512':
|
|
288537
|
+
case 'PS512':
|
|
288538
|
+
case 'RSA-OAEP-512':
|
|
288539
|
+
hash = 'SHA-512';
|
|
288540
|
+
break;
|
|
288541
|
+
default:
|
|
288542
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288543
|
+
}
|
|
288544
|
+
if (alg.startsWith('RSA-OAEP')) {
|
|
288545
|
+
return keyObject.toCryptoKey({
|
|
288546
|
+
name: 'RSA-OAEP',
|
|
288547
|
+
hash,
|
|
288548
|
+
}, extractable, isPublic ? ['encrypt'] : ['decrypt']);
|
|
288549
|
+
}
|
|
288550
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288551
|
+
name: alg.startsWith('PS') ? 'RSA-PSS' : 'RSASSA-PKCS1-v1_5',
|
|
288552
|
+
hash,
|
|
288553
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288554
|
+
}
|
|
288555
|
+
if (keyObject.asymmetricKeyType === 'ec') {
|
|
288556
|
+
const nist = new Map([
|
|
288557
|
+
['prime256v1', 'P-256'],
|
|
288558
|
+
['secp384r1', 'P-384'],
|
|
288559
|
+
['secp521r1', 'P-521'],
|
|
288560
|
+
]);
|
|
288561
|
+
const namedCurve = nist.get(keyObject.asymmetricKeyDetails?.namedCurve);
|
|
288562
|
+
if (!namedCurve) {
|
|
288563
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288564
|
+
}
|
|
288565
|
+
if (alg === 'ES256' && namedCurve === 'P-256') {
|
|
288566
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288567
|
+
name: 'ECDSA',
|
|
288568
|
+
namedCurve,
|
|
288569
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288570
|
+
}
|
|
288571
|
+
if (alg === 'ES384' && namedCurve === 'P-384') {
|
|
288572
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288573
|
+
name: 'ECDSA',
|
|
288574
|
+
namedCurve,
|
|
288575
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288576
|
+
}
|
|
288577
|
+
if (alg === 'ES512' && namedCurve === 'P-521') {
|
|
288578
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288579
|
+
name: 'ECDSA',
|
|
288580
|
+
namedCurve,
|
|
288581
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288582
|
+
}
|
|
288583
|
+
if (alg.startsWith('ECDH-ES')) {
|
|
288584
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288585
|
+
name: 'ECDH',
|
|
288586
|
+
namedCurve,
|
|
288587
|
+
}, extractable, isPublic ? [] : ['deriveBits']);
|
|
288588
|
+
}
|
|
288589
|
+
}
|
|
288590
|
+
if (!cryptoKey) {
|
|
288591
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288592
|
+
}
|
|
288593
|
+
if (!cached) {
|
|
288594
|
+
cache.set(keyObject, { [alg]: cryptoKey });
|
|
288595
|
+
}
|
|
288596
|
+
else {
|
|
288597
|
+
cached[alg] = cryptoKey;
|
|
288598
|
+
}
|
|
288599
|
+
return cryptoKey;
|
|
288647
288600
|
};
|
|
288648
|
-
/* harmony default export */ const
|
|
288601
|
+
/* harmony default export */ const normalize_key = (async (key, alg) => {
|
|
288602
|
+
if (key instanceof Uint8Array) {
|
|
288603
|
+
return key;
|
|
288604
|
+
}
|
|
288605
|
+
if (isCryptoKey(key)) {
|
|
288606
|
+
return key;
|
|
288607
|
+
}
|
|
288608
|
+
if (isKeyObject(key)) {
|
|
288609
|
+
if (key.type === 'secret') {
|
|
288610
|
+
return key.export();
|
|
288611
|
+
}
|
|
288612
|
+
if ('toCryptoKey' in key && typeof key.toCryptoKey === 'function') {
|
|
288613
|
+
try {
|
|
288614
|
+
return handleKeyObject(key, alg);
|
|
288615
|
+
}
|
|
288616
|
+
catch (err) {
|
|
288617
|
+
if (err instanceof TypeError) {
|
|
288618
|
+
throw err;
|
|
288619
|
+
}
|
|
288620
|
+
}
|
|
288621
|
+
}
|
|
288622
|
+
let jwk = key.export({ format: 'jwk' });
|
|
288623
|
+
return handleJWK(key, jwk, alg);
|
|
288624
|
+
}
|
|
288625
|
+
if (isJWK(key)) {
|
|
288626
|
+
if (key.k) {
|
|
288627
|
+
return decode(key.k);
|
|
288628
|
+
}
|
|
288629
|
+
return handleJWK(key, key, alg, true);
|
|
288630
|
+
}
|
|
288631
|
+
throw new Error('unreachable');
|
|
288632
|
+
});
|
|
288633
|
+
|
|
288634
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_key_type.js
|
|
288635
|
+
|
|
288636
|
+
|
|
288637
|
+
|
|
288638
|
+
const tag = (key) => key?.[Symbol.toStringTag];
|
|
288639
|
+
const jwkMatchesOp = (alg, key, usage) => {
|
|
288640
|
+
if (key.use !== undefined) {
|
|
288641
|
+
let expected;
|
|
288642
|
+
switch (usage) {
|
|
288643
|
+
case 'sign':
|
|
288644
|
+
case 'verify':
|
|
288645
|
+
expected = 'sig';
|
|
288646
|
+
break;
|
|
288647
|
+
case 'encrypt':
|
|
288648
|
+
case 'decrypt':
|
|
288649
|
+
expected = 'enc';
|
|
288650
|
+
break;
|
|
288651
|
+
}
|
|
288652
|
+
if (key.use !== expected) {
|
|
288653
|
+
throw new TypeError(`Invalid key for this operation, its "use" must be "${expected}" when present`);
|
|
288654
|
+
}
|
|
288655
|
+
}
|
|
288656
|
+
if (key.alg !== undefined && key.alg !== alg) {
|
|
288657
|
+
throw new TypeError(`Invalid key for this operation, its "alg" must be "${alg}" when present`);
|
|
288658
|
+
}
|
|
288659
|
+
if (Array.isArray(key.key_ops)) {
|
|
288660
|
+
let expectedKeyOp;
|
|
288661
|
+
switch (true) {
|
|
288662
|
+
case usage === 'sign' || usage === 'verify':
|
|
288663
|
+
case alg === 'dir':
|
|
288664
|
+
case alg.includes('CBC-HS'):
|
|
288665
|
+
expectedKeyOp = usage;
|
|
288666
|
+
break;
|
|
288667
|
+
case alg.startsWith('PBES2'):
|
|
288668
|
+
expectedKeyOp = 'deriveBits';
|
|
288669
|
+
break;
|
|
288670
|
+
case /^A\d{3}(?:GCM)?(?:KW)?$/.test(alg):
|
|
288671
|
+
if (!alg.includes('GCM') && alg.endsWith('KW')) {
|
|
288672
|
+
expectedKeyOp = usage === 'encrypt' ? 'wrapKey' : 'unwrapKey';
|
|
288673
|
+
}
|
|
288674
|
+
else {
|
|
288675
|
+
expectedKeyOp = usage;
|
|
288676
|
+
}
|
|
288677
|
+
break;
|
|
288678
|
+
case usage === 'encrypt' && alg.startsWith('RSA'):
|
|
288679
|
+
expectedKeyOp = 'wrapKey';
|
|
288680
|
+
break;
|
|
288681
|
+
case usage === 'decrypt':
|
|
288682
|
+
expectedKeyOp = alg.startsWith('RSA') ? 'unwrapKey' : 'deriveBits';
|
|
288683
|
+
break;
|
|
288684
|
+
}
|
|
288685
|
+
if (expectedKeyOp && key.key_ops?.includes?.(expectedKeyOp) === false) {
|
|
288686
|
+
throw new TypeError(`Invalid key for this operation, its "key_ops" must include "${expectedKeyOp}" when present`);
|
|
288687
|
+
}
|
|
288688
|
+
}
|
|
288689
|
+
return true;
|
|
288690
|
+
};
|
|
288691
|
+
const symmetricTypeCheck = (alg, key, usage) => {
|
|
288692
|
+
if (key instanceof Uint8Array)
|
|
288693
|
+
return;
|
|
288694
|
+
if (isJWK(key)) {
|
|
288695
|
+
if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288696
|
+
return;
|
|
288697
|
+
throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
|
|
288698
|
+
}
|
|
288699
|
+
if (!is_key_like(key)) {
|
|
288700
|
+
throw new TypeError(withAlg(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key', 'Uint8Array'));
|
|
288701
|
+
}
|
|
288702
|
+
if (key.type !== 'secret') {
|
|
288703
|
+
throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
|
|
288704
|
+
}
|
|
288705
|
+
};
|
|
288706
|
+
const asymmetricTypeCheck = (alg, key, usage) => {
|
|
288707
|
+
if (isJWK(key)) {
|
|
288708
|
+
switch (usage) {
|
|
288709
|
+
case 'decrypt':
|
|
288710
|
+
case 'sign':
|
|
288711
|
+
if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288712
|
+
return;
|
|
288713
|
+
throw new TypeError(`JSON Web Key for this operation be a private JWK`);
|
|
288714
|
+
case 'encrypt':
|
|
288715
|
+
case 'verify':
|
|
288716
|
+
if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288717
|
+
return;
|
|
288718
|
+
throw new TypeError(`JSON Web Key for this operation be a public JWK`);
|
|
288719
|
+
}
|
|
288720
|
+
}
|
|
288721
|
+
if (!is_key_like(key)) {
|
|
288722
|
+
throw new TypeError(withAlg(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key'));
|
|
288723
|
+
}
|
|
288724
|
+
if (key.type === 'secret') {
|
|
288725
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
|
|
288726
|
+
}
|
|
288727
|
+
if (key.type === 'public') {
|
|
288728
|
+
switch (usage) {
|
|
288729
|
+
case 'sign':
|
|
288730
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
|
|
288731
|
+
case 'decrypt':
|
|
288732
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
|
|
288733
|
+
default:
|
|
288734
|
+
break;
|
|
288735
|
+
}
|
|
288736
|
+
}
|
|
288737
|
+
if (key.type === 'private') {
|
|
288738
|
+
switch (usage) {
|
|
288739
|
+
case 'verify':
|
|
288740
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
|
|
288741
|
+
case 'encrypt':
|
|
288742
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
|
|
288743
|
+
default:
|
|
288744
|
+
break;
|
|
288745
|
+
}
|
|
288746
|
+
}
|
|
288747
|
+
};
|
|
288748
|
+
/* harmony default export */ const check_key_type = ((alg, key, usage) => {
|
|
288749
|
+
const symmetric = alg.startsWith('HS') ||
|
|
288750
|
+
alg === 'dir' ||
|
|
288751
|
+
alg.startsWith('PBES2') ||
|
|
288752
|
+
/^A(?:128|192|256)(?:GCM)?(?:KW)?$/.test(alg) ||
|
|
288753
|
+
/^A(?:128|192|256)CBC-HS(?:256|384|512)$/.test(alg);
|
|
288754
|
+
if (symmetric) {
|
|
288755
|
+
symmetricTypeCheck(alg, key, usage);
|
|
288756
|
+
}
|
|
288757
|
+
else {
|
|
288758
|
+
asymmetricTypeCheck(alg, key, usage);
|
|
288759
|
+
}
|
|
288760
|
+
});
|
|
288761
|
+
|
|
288762
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/jwe/flattened/decrypt.js
|
|
288763
|
+
|
|
288649
288764
|
|
|
288650
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/jwe/flattened/decrypt.js
|
|
288651
288765
|
|
|
288652
288766
|
|
|
288653
288767
|
|
|
@@ -288659,7 +288773,7 @@ const validateAlgorithms = (option, algorithms) => {
|
|
|
288659
288773
|
|
|
288660
288774
|
|
|
288661
288775
|
async function flattenedDecrypt(jwe, key, options) {
|
|
288662
|
-
if (!
|
|
288776
|
+
if (!is_object(jwe)) {
|
|
288663
288777
|
throw new JWEInvalid('Flattened JWE must be an object');
|
|
288664
288778
|
}
|
|
288665
288779
|
if (jwe.protected === undefined && jwe.header === undefined && jwe.unprotected === undefined) {
|
|
@@ -288683,10 +288797,10 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288683
288797
|
if (jwe.aad !== undefined && typeof jwe.aad !== 'string') {
|
|
288684
288798
|
throw new JWEInvalid('JWE AAD incorrect type');
|
|
288685
288799
|
}
|
|
288686
|
-
if (jwe.header !== undefined && !
|
|
288800
|
+
if (jwe.header !== undefined && !is_object(jwe.header)) {
|
|
288687
288801
|
throw new JWEInvalid('JWE Shared Unprotected Header incorrect type');
|
|
288688
288802
|
}
|
|
288689
|
-
if (jwe.unprotected !== undefined && !
|
|
288803
|
+
if (jwe.unprotected !== undefined && !is_object(jwe.unprotected)) {
|
|
288690
288804
|
throw new JWEInvalid('JWE Per-Recipient Unprotected Header incorrect type');
|
|
288691
288805
|
}
|
|
288692
288806
|
let parsedProt;
|
|
@@ -288709,7 +288823,7 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288709
288823
|
};
|
|
288710
288824
|
validate_crit(JWEInvalid, new Map(), options?.crit, parsedProt, joseHeader);
|
|
288711
288825
|
if (joseHeader.zip !== undefined) {
|
|
288712
|
-
throw new
|
|
288826
|
+
throw new JOSENotSupported('JWE "zip" (Compression Algorithm) Header Parameter is not supported.');
|
|
288713
288827
|
}
|
|
288714
288828
|
const { alg, enc } = joseHeader;
|
|
288715
288829
|
if (typeof alg !== 'string' || !alg) {
|
|
@@ -288742,12 +288856,14 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288742
288856
|
key = await key(parsedProt, jwe);
|
|
288743
288857
|
resolvedKey = true;
|
|
288744
288858
|
}
|
|
288859
|
+
check_key_type(alg === 'dir' ? enc : alg, key, 'decrypt');
|
|
288860
|
+
const k = await normalize_key(key, alg);
|
|
288745
288861
|
let cek;
|
|
288746
288862
|
try {
|
|
288747
|
-
cek = await decrypt_key_management(alg,
|
|
288863
|
+
cek = await decrypt_key_management(alg, k, encryptedKey, joseHeader, options);
|
|
288748
288864
|
}
|
|
288749
288865
|
catch (err) {
|
|
288750
|
-
if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof
|
|
288866
|
+
if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof JOSENotSupported) {
|
|
288751
288867
|
throw err;
|
|
288752
288868
|
}
|
|
288753
288869
|
cek = lib_cek(enc);
|
|
@@ -288773,7 +288889,7 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288773
288889
|
const protectedHeader = buffer_utils_encoder.encode(jwe.protected ?? '');
|
|
288774
288890
|
let additionalData;
|
|
288775
288891
|
if (jwe.aad !== undefined) {
|
|
288776
|
-
additionalData =
|
|
288892
|
+
additionalData = concat(protectedHeader, buffer_utils_encoder.encode('.'), buffer_utils_encoder.encode(jwe.aad));
|
|
288777
288893
|
}
|
|
288778
288894
|
else {
|
|
288779
288895
|
additionalData = protectedHeader;
|
|
@@ -288785,7 +288901,7 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288785
288901
|
catch {
|
|
288786
288902
|
throw new JWEInvalid('Failed to base64url decode the ciphertext');
|
|
288787
288903
|
}
|
|
288788
|
-
const plaintext = await
|
|
288904
|
+
const plaintext = await decrypt(enc, cek, ciphertext, iv, tag, additionalData);
|
|
288789
288905
|
const result = { plaintext };
|
|
288790
288906
|
if (jwe.protected !== undefined) {
|
|
288791
288907
|
result.protectedHeader = parsedProt;
|
|
@@ -288805,12 +288921,12 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288805
288921
|
result.unprotectedHeader = jwe.header;
|
|
288806
288922
|
}
|
|
288807
288923
|
if (resolvedKey) {
|
|
288808
|
-
return { ...result, key };
|
|
288924
|
+
return { ...result, key: k };
|
|
288809
288925
|
}
|
|
288810
288926
|
return result;
|
|
288811
288927
|
}
|
|
288812
288928
|
|
|
288813
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288929
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/jwe/compact/decrypt.js
|
|
288814
288930
|
|
|
288815
288931
|
|
|
288816
288932
|
|
|
@@ -288847,7 +288963,7 @@ let headers;
|
|
|
288847
288963
|
let build_USER_AGENT;
|
|
288848
288964
|
if (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {
|
|
288849
288965
|
const NAME = 'openid-client';
|
|
288850
|
-
const VERSION = 'v6.
|
|
288966
|
+
const VERSION = 'v6.3.4';
|
|
288851
288967
|
build_USER_AGENT = `${NAME}/${VERSION}`;
|
|
288852
288968
|
headers = { 'user-agent': build_USER_AGENT };
|
|
288853
288969
|
}
|
|
@@ -289172,11 +289288,10 @@ function selectCryptoKeyForDecryption(keys, alg, kid, epk) {
|
|
|
289172
289288
|
return key.key;
|
|
289173
289289
|
}
|
|
289174
289290
|
async function build_decrypt(keys, jwe, contentEncryptionAlgorithms, keyManagementAlgorithms) {
|
|
289175
|
-
return build_decoder.decode((await compactDecrypt(jwe,
|
|
289291
|
+
return build_decoder.decode((await compactDecrypt(jwe, (header) => {
|
|
289176
289292
|
const { kid, alg, epk } = header;
|
|
289177
289293
|
return selectCryptoKeyForDecryption(keys, alg, kid, epk);
|
|
289178
|
-
}, { keyManagementAlgorithms, contentEncryptionAlgorithms })
|
|
289179
|
-
.catch((err) => {
|
|
289294
|
+
}, { keyManagementAlgorithms, contentEncryptionAlgorithms }).catch((err) => {
|
|
289180
289295
|
if (err instanceof JOSEError) {
|
|
289181
289296
|
throw e('decryption failed', err, 'OAUTH_DECRYPTION_FAILED');
|
|
289182
289297
|
}
|
|
@@ -289382,6 +289497,80 @@ async function initiateDeviceAuthorization(config, parameters) {
|
|
|
289382
289497
|
.then((response) => processDeviceAuthorizationResponse(as, c, response))
|
|
289383
289498
|
.catch(errorHandler);
|
|
289384
289499
|
}
|
|
289500
|
+
async function initiateBackchannelAuthentication(config, parameters) {
|
|
289501
|
+
checkConfig(config);
|
|
289502
|
+
const { as, c, auth, fetch, tlsOnly, timeout } = build_int(config);
|
|
289503
|
+
return backchannelAuthenticationRequest(as, c, auth, parameters, {
|
|
289504
|
+
[customFetch]: fetch,
|
|
289505
|
+
[allowInsecureRequests]: !tlsOnly,
|
|
289506
|
+
headers: new Headers(headers),
|
|
289507
|
+
signal: build_signal(timeout),
|
|
289508
|
+
})
|
|
289509
|
+
.then((response) => processBackchannelAuthenticationResponse(as, c, response))
|
|
289510
|
+
.catch(errorHandler);
|
|
289511
|
+
}
|
|
289512
|
+
async function pollBackchannelAuthenticationGrant(config, backchannelAuthenticationResponse, parameters, options) {
|
|
289513
|
+
checkConfig(config);
|
|
289514
|
+
parameters = new URLSearchParams(parameters);
|
|
289515
|
+
let interval = backchannelAuthenticationResponse.interval ?? 5;
|
|
289516
|
+
const pollingSignal = options?.signal ??
|
|
289517
|
+
AbortSignal.timeout(backchannelAuthenticationResponse.expires_in * 1000);
|
|
289518
|
+
try {
|
|
289519
|
+
pollingSignal.throwIfAborted();
|
|
289520
|
+
}
|
|
289521
|
+
catch (err) {
|
|
289522
|
+
errorHandler(err);
|
|
289523
|
+
}
|
|
289524
|
+
await wait(interval);
|
|
289525
|
+
const { as, c, auth, fetch, tlsOnly, nonRepudiation, timeout, decrypt } = build_int(config);
|
|
289526
|
+
const response = await backchannelAuthenticationGrantRequest(as, c, auth, backchannelAuthenticationResponse.auth_req_id, {
|
|
289527
|
+
[customFetch]: fetch,
|
|
289528
|
+
[allowInsecureRequests]: !tlsOnly,
|
|
289529
|
+
additionalParameters: parameters,
|
|
289530
|
+
DPoP: options?.DPoP,
|
|
289531
|
+
headers: new Headers(headers),
|
|
289532
|
+
signal: pollingSignal.aborted ? pollingSignal : build_signal(timeout),
|
|
289533
|
+
})
|
|
289534
|
+
.catch(errorHandler);
|
|
289535
|
+
const p = processBackchannelAuthenticationGrantResponse(as, c, response, {
|
|
289536
|
+
[jweDecrypt]: decrypt,
|
|
289537
|
+
});
|
|
289538
|
+
let result;
|
|
289539
|
+
try {
|
|
289540
|
+
result = await p;
|
|
289541
|
+
}
|
|
289542
|
+
catch (err) {
|
|
289543
|
+
if (retryable(err, options)) {
|
|
289544
|
+
return pollBackchannelAuthenticationGrant(config, {
|
|
289545
|
+
...backchannelAuthenticationResponse,
|
|
289546
|
+
interval,
|
|
289547
|
+
}, parameters, {
|
|
289548
|
+
...options,
|
|
289549
|
+
signal: pollingSignal,
|
|
289550
|
+
flag: retry,
|
|
289551
|
+
});
|
|
289552
|
+
}
|
|
289553
|
+
if (err instanceof ResponseBodyError) {
|
|
289554
|
+
switch (err.error) {
|
|
289555
|
+
case 'slow_down':
|
|
289556
|
+
interval += 5;
|
|
289557
|
+
case 'authorization_pending':
|
|
289558
|
+
return pollBackchannelAuthenticationGrant(config, {
|
|
289559
|
+
...backchannelAuthenticationResponse,
|
|
289560
|
+
interval,
|
|
289561
|
+
}, parameters, {
|
|
289562
|
+
...options,
|
|
289563
|
+
signal: pollingSignal,
|
|
289564
|
+
flag: undefined,
|
|
289565
|
+
});
|
|
289566
|
+
}
|
|
289567
|
+
}
|
|
289568
|
+
errorHandler(err);
|
|
289569
|
+
}
|
|
289570
|
+
result.id_token && (await nonRepudiation?.(response));
|
|
289571
|
+
addHelpers(result);
|
|
289572
|
+
return result;
|
|
289573
|
+
}
|
|
289385
289574
|
function build_allowInsecureRequests(config) {
|
|
289386
289575
|
build_int(config).tlsOnly = false;
|
|
289387
289576
|
}
|