@firestartr/cli 1.31.0 → 1.33.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/build/index.js
CHANGED
|
@@ -116214,7 +116214,7 @@ exports.KubernetesObjectApi = KubernetesObjectApi;
|
|
|
116214
116214
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
116215
116215
|
exports.OpenIDConnectAuth = void 0;
|
|
116216
116216
|
const tslib_1 = __nccwpck_require__(33714);
|
|
116217
|
-
const oidc = tslib_1.__importStar(__nccwpck_require__(
|
|
116217
|
+
const oidc = tslib_1.__importStar(__nccwpck_require__(91188));
|
|
116218
116218
|
const rfc4648_1 = __nccwpck_require__(53367);
|
|
116219
116219
|
const util_1 = __nccwpck_require__(73837);
|
|
116220
116220
|
class OidcClient {
|
|
@@ -119169,7 +119169,7 @@ module.exports = __toCommonJS(dist_src_exports);
|
|
|
119169
119169
|
var import_universal_user_agent = __nccwpck_require__(65212);
|
|
119170
119170
|
|
|
119171
119171
|
// pkg/dist-src/version.js
|
|
119172
|
-
var VERSION = "9.0.
|
|
119172
|
+
var VERSION = "9.0.6";
|
|
119173
119173
|
|
|
119174
119174
|
// pkg/dist-src/defaults.js
|
|
119175
119175
|
var userAgent = `octokit-endpoint.js/${VERSION} ${(0, import_universal_user_agent.getUserAgent)()}`;
|
|
@@ -119274,9 +119274,9 @@ function addQueryParameters(url, parameters) {
|
|
|
119274
119274
|
}
|
|
119275
119275
|
|
|
119276
119276
|
// pkg/dist-src/util/extract-url-variable-names.js
|
|
119277
|
-
var urlVariableRegex = /\{[^}]+\}/g;
|
|
119277
|
+
var urlVariableRegex = /\{[^{}}]+\}/g;
|
|
119278
119278
|
function removeNonChars(variableName) {
|
|
119279
|
-
return variableName.replace(
|
|
119279
|
+
return variableName.replace(/(?:^\W+)|(?:(?<!\W)\W+$)/g, "").split(/,/);
|
|
119280
119280
|
}
|
|
119281
119281
|
function extractUrlVariableNames(url) {
|
|
119282
119282
|
const matches = url.match(urlVariableRegex);
|
|
@@ -119462,7 +119462,7 @@ function parse(options) {
|
|
|
119462
119462
|
}
|
|
119463
119463
|
if (url.endsWith("/graphql")) {
|
|
119464
119464
|
if (options.mediaType.previews?.length) {
|
|
119465
|
-
const previewsFromAcceptHeader = headers.accept.match(/[\w-]+(?=-preview)/g) || [];
|
|
119465
|
+
const previewsFromAcceptHeader = headers.accept.match(/(?<![\w-])[\w-]+(?=-preview)/g) || [];
|
|
119466
119466
|
headers.accept = previewsFromAcceptHeader.concat(options.mediaType.previews).map((preview) => {
|
|
119467
119467
|
const format = options.mediaType.format ? `.${options.mediaType.format}` : "+json";
|
|
119468
119468
|
return `application/vnd.github.${preview}-preview${format}`;
|
|
@@ -122302,7 +122302,7 @@ var RequestError = class extends Error {
|
|
|
122302
122302
|
if (options.request.headers.authorization) {
|
|
122303
122303
|
requestCopy.headers = Object.assign({}, options.request.headers, {
|
|
122304
122304
|
authorization: options.request.headers.authorization.replace(
|
|
122305
|
-
/ .*$/,
|
|
122305
|
+
/(?<! ) .*$/,
|
|
122306
122306
|
" [REDACTED]"
|
|
122307
122307
|
)
|
|
122308
122308
|
});
|
|
@@ -122370,7 +122370,7 @@ var import_endpoint = __nccwpck_require__(68773);
|
|
|
122370
122370
|
var import_universal_user_agent = __nccwpck_require__(65212);
|
|
122371
122371
|
|
|
122372
122372
|
// pkg/dist-src/version.js
|
|
122373
|
-
var VERSION = "8.4.
|
|
122373
|
+
var VERSION = "8.4.1";
|
|
122374
122374
|
|
|
122375
122375
|
// pkg/dist-src/is-plain-object.js
|
|
122376
122376
|
function isPlainObject(value) {
|
|
@@ -122429,7 +122429,7 @@ function fetchWrapper(requestOptions) {
|
|
|
122429
122429
|
headers[keyAndValue[0]] = keyAndValue[1];
|
|
122430
122430
|
}
|
|
122431
122431
|
if ("deprecation" in headers) {
|
|
122432
|
-
const matches = headers.link && headers.link.match(/<([
|
|
122432
|
+
const matches = headers.link && headers.link.match(/<([^<>]+)>; rel="deprecation"/);
|
|
122433
122433
|
const deprecationLink = matches && matches.pop();
|
|
122434
122434
|
log.warn(
|
|
122435
122435
|
`[@octokit/request] "${requestOptions.method} ${requestOptions.url}" is deprecated. It is scheduled to be removed on ${headers.sunset}${deprecationLink ? `. See ${deprecationLink}` : ""}`
|
|
@@ -148344,7 +148344,7 @@ class ApiObject extends constructs_1.Construct {
|
|
|
148344
148344
|
}
|
|
148345
148345
|
}
|
|
148346
148346
|
exports.ApiObject = ApiObject;
|
|
148347
|
-
ApiObject[_a] = { fqn: "cdk8s.ApiObject", version: "2.69.
|
|
148347
|
+
ApiObject[_a] = { fqn: "cdk8s.ApiObject", version: "2.69.57" };
|
|
148348
148348
|
function parseApiGroup(apiVersion) {
|
|
148349
148349
|
const v = apiVersion.split('/');
|
|
148350
148350
|
// no group means "core"
|
|
@@ -148559,7 +148559,7 @@ class App extends constructs_1.Construct {
|
|
|
148559
148559
|
}
|
|
148560
148560
|
exports.App = App;
|
|
148561
148561
|
_a = JSII_RTTI_SYMBOL_1;
|
|
148562
|
-
App[_a] = { fqn: "cdk8s.App", version: "2.69.
|
|
148562
|
+
App[_a] = { fqn: "cdk8s.App", version: "2.69.57" };
|
|
148563
148563
|
function validate(app, cache) {
|
|
148564
148564
|
const errors = [];
|
|
148565
148565
|
for (const child of cache.findAll(app.node)) {
|
|
@@ -148773,7 +148773,7 @@ class Chart extends constructs_1.Construct {
|
|
|
148773
148773
|
}
|
|
148774
148774
|
}
|
|
148775
148775
|
exports.Chart = Chart;
|
|
148776
|
-
Chart[_a] = { fqn: "cdk8s.Chart", version: "2.69.
|
|
148776
|
+
Chart[_a] = { fqn: "cdk8s.Chart", version: "2.69.57" };
|
|
148777
148777
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"chart.js","sourceRoot":"","sources":["../src/chart.ts"],"names":[],"mappings":";;;;;AAAA,2CAAmD;AACnD,6CAAyC;AACzC,+BAA4B;AAC5B,mCAAgC;AAEhC,MAAM,YAAY,GAAG,MAAM,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;AAC/C,MAAM,OAAO,GAAG,SAAS,CAAC;AA6B1B,MAAa,KAAM,SAAQ,sBAAS;IAClC;;;;OAIG;IACI,MAAM,CAAC,OAAO,CAAC,CAAM;QAC1B,OAAO,CAAC,KAAK,IAAI,IAAI,OAAM,CAAC,CAAC,CAAC,KAAK,QAAQ,IAAI,YAAY,IAAI,CAAC,CAAC;IACnE,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,2BAAC,MAAM,CAAC,WAAW,EAAC,CAAC,CAAU;QACpC,OAAO,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,EAAE,CAAC,CAAa;QAC5B,IAAI,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;YACrB,OAAO,CAAC,CAAC;QACX,CAAC;QAED,MAAM,MAAM,GAAG,CAAC,CAAC,IAAI,CAAC,KAAkB,CAAC;QACzC,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACzE,CAAC;QAED,OAAO,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAiBD,YAAY,KAAgB,EAAE,EAAU,EAAE,QAAoB,EAAG;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC;QACjC,IAAI,CAAC,OAAO,GAAG,KAAK,CAAC,MAAM,IAAI,EAAE,CAAC;QAClC,IAAI,CAAC,0BAA0B,GAAG,KAAK,CAAC,yBAAyB,IAAI,KAAK,CAAC;QAE3E,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;IAC7D,CAAC;IAED;;;;OAIG;IACH,IAAW,MAAM;QACf,OAAO,EAAE,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,kBAAkB,CAAC,SAAoB;QAC5C,OAAO,aAAK,CAAC,UAAU,CAAC,SAAS,EAAE;YACjC,WAAW,EAAE,CAAC,IAAI,CAAC,0BAA0B;YAC7C,MAAM,EAAE,SAAS,CAAC,IAAI,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS;SACnD,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,GAAG,YAA0B;QAChD,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,YAAY,CAAC,CAAC;IAC3C,CAAC;IAED;;;OAGG;IACI,MAAM;QACX,OAAO,SAAG,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAkB,EAAE,CAAC,CAAC,YAAY,sBAAS,CAAC,CAAC;IAClF,CAAC;;AAxHH,sBAyHC","sourcesContent":["import { Construct, IConstruct } from 'constructs';\nimport { ApiObject } from './api-object';\nimport { App } from './app';\nimport { Names } from './names';\n\nconst CHART_SYMBOL = Symbol.for('cdk8s.Chart');\nconst CRONJOB = 'CronJob';\n\nexport interface ChartProps {\n  /**\n   * The default namespace for all objects defined in this chart (directly or\n   * indirectly). This namespace will only apply to objects that don't have a\n   * `namespace` explicitly defined for them.\n   *\n   * @default - no namespace is synthesized (usually this implies \"default\")\n   */\n  readonly namespace?: string;\n\n  /**\n   * Labels to apply to all resources in this chart.\n   *\n   * @default - no common labels\n   */\n  readonly labels?: { [name: string]: string };\n\n  /**\n   * The autogenerated resource name by default is suffixed with a stable hash\n   * of the construct path. Setting this property to true drops the hash suffix.\n   *\n   * @default false\n   */\n  readonly disableResourceNameHashes?: boolean;\n\n}\n\nexport class Chart extends Construct {\n  /**\n   * Return whether the given object is a Chart.\n   *\n   * We do attribute detection since we can't reliably use 'instanceof'.\n   */\n  public static isChart(x: any): x is Chart {\n    return x !== null && typeof(x) === 'object' && CHART_SYMBOL in x;\n  }\n\n  /**\n   * Implements `instanceof Chart` using the more reliable `Chart.isChart` static method\n   *\n   * @param o The object to check\n   * @internal\n   */\n  static [Symbol.hasInstance](o: unknown) {\n    return Chart.isChart(o);\n  }\n\n  /**\n   * Finds the chart in which a node is defined.\n   * @param c a construct node\n   */\n  public static of(c: IConstruct): Chart {\n    if (Chart.isChart(c)) {\n      return c;\n    }\n\n    const parent = c.node.scope as Construct;\n    if (!parent) {\n      throw new Error('cannot find a parent chart (directly or indirectly)');\n    }\n\n    return Chart.of(parent);\n  }\n\n  /**\n   * The default namespace for all objects in this chart.\n   */\n  public readonly namespace?: string;\n\n  /**\n   * Chart-level labels.\n   */\n  private readonly _labels?: { [name: string]: string };\n\n  /**\n   * Determines if resource names in the chart have the suffixed hash.\n   */\n  private readonly _disableResourceNameHashes?: boolean;\n\n  constructor(scope: Construct, id: string, props: ChartProps = { }) {\n    super(scope, id);\n    this.namespace = props.namespace;\n    this._labels = props.labels ?? {};\n    this._disableResourceNameHashes = props.disableResourceNameHashes ?? false;\n\n    Object.defineProperty(this, CHART_SYMBOL, { value: true });\n  }\n\n  /**\n   * Labels applied to all resources in this chart.\n   *\n   * This is an immutable copy.\n   */\n  public get labels(): { [name: string]: string } {\n    return { ...this._labels };\n  }\n\n  /**\n   * Generates a app-unique name for an object given it's construct node path.\n   *\n   * Different resource types may have different constraints on names\n   * (`metadata.name`). The previous version of the name generator was\n   * compatible with DNS_SUBDOMAIN but not with DNS_LABEL.\n   *\n   * For example, `Deployment` names must comply with DNS_SUBDOMAIN while\n   * `Service` names must comply with DNS_LABEL.\n   *\n   * Since there is no formal specification for this, the default name\n   * generation scheme for kubernetes objects in cdk8s was changed to DNS_LABEL,\n   * since it’s the common denominator for all kubernetes resources\n   * (supposedly).\n   *\n   * You can override this method if you wish to customize object names at the\n   * chart level.\n   *\n   * @param apiObject The API object to generate a name for.\n   */\n  public generateObjectName(apiObject: ApiObject) {\n    return Names.toDnsLabel(apiObject, {\n      includeHash: !this._disableResourceNameHashes,\n      maxLen: apiObject.kind == CRONJOB ? 52 : undefined,\n    });\n  }\n\n  /**\n   * Create a dependency between this Chart and other constructs.\n   * These can be other ApiObjects, Charts, or custom.\n   *\n   * @param dependencies the dependencies to add.\n   */\n  public addDependency(...dependencies: IConstruct[]) {\n    this.node.addDependency(...dependencies);\n  }\n\n  /**\n   * Renders this chart to a set of Kubernetes JSON resources.\n   * @returns array of resource manifests\n   */\n  public toJson(): any[] {\n    return App._synthChart(this);\n  }\n\n  /**\n   * Returns all the included API objects.\n   */\n  get apiObjects(): ApiObject[] {\n    return this.node.children.filter((o): o is ApiObject => o instanceof ApiObject);\n  }\n}\n"]}
|
|
148778
148778
|
|
|
148779
148779
|
/***/ }),
|
|
@@ -148845,7 +148845,7 @@ class Cron {
|
|
|
148845
148845
|
}
|
|
148846
148846
|
exports.Cron = Cron;
|
|
148847
148847
|
_a = JSII_RTTI_SYMBOL_1;
|
|
148848
|
-
Cron[_a] = { fqn: "cdk8s.Cron", version: "2.69.
|
|
148848
|
+
Cron[_a] = { fqn: "cdk8s.Cron", version: "2.69.57" };
|
|
148849
148849
|
function fallback(x, def) {
|
|
148850
148850
|
return x ?? def;
|
|
148851
148851
|
}
|
|
@@ -148934,7 +148934,7 @@ class DependencyGraph {
|
|
|
148934
148934
|
}
|
|
148935
148935
|
exports.DependencyGraph = DependencyGraph;
|
|
148936
148936
|
_a = JSII_RTTI_SYMBOL_1;
|
|
148937
|
-
DependencyGraph[_a] = { fqn: "cdk8s.DependencyGraph", version: "2.69.
|
|
148937
|
+
DependencyGraph[_a] = { fqn: "cdk8s.DependencyGraph", version: "2.69.57" };
|
|
148938
148938
|
/**
|
|
148939
148939
|
* Represents a vertex in the graph.
|
|
148940
148940
|
*
|
|
@@ -149027,7 +149027,7 @@ class DependencyVertex {
|
|
|
149027
149027
|
}
|
|
149028
149028
|
exports.DependencyVertex = DependencyVertex;
|
|
149029
149029
|
_b = JSII_RTTI_SYMBOL_1;
|
|
149030
|
-
DependencyVertex[_b] = { fqn: "cdk8s.DependencyVertex", version: "2.69.
|
|
149030
|
+
DependencyVertex[_b] = { fqn: "cdk8s.DependencyVertex", version: "2.69.57" };
|
|
149031
149031
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dependency.js","sourceRoot":"","sources":["../src/dependency.ts"],"names":[],"mappings":";;;;;AAGA;;;;;;;;;;;;GAYG;AACH,MAAa,eAAe;IAI1B,YAAY,IAAU;QAEpB,IAAI,CAAC,aAAa,GAAG,IAAI,gBAAgB,EAAE,CAAC;QAE5C,MAAM,KAAK,GAAqC,EAAE,CAAC;QAEnD,SAAS,SAAS,CAAC,SAAqB;YACtC,KAAK,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,gBAAgB,CAAC,SAAS,CAAC,CAAC;QAC/D,CAAC;QAED,SAAS,SAAS,CAAC,SAAqB;YACtC,OAAO,KAAK,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACpC,CAAC;QAED,oCAAoC;QACpC,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/B,SAAS,CAAC,CAAC,CAAC,CAAC;QACf,CAAC;QAED,MAAM,IAAI,GAAG,EAAE,CAAC;QAChB,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YACnC,KAAK,MAAM,GAAG,IAAI,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;gBAC1C,IAAI,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC,CAAC;YAC5C,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YAEvB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3B,+BAA+B;gBAC/B,6DAA6D;gBAC7D,2FAA2F;gBAC3F,sCAAsC;gBACtC,SAAS;YACX,CAAC;YAED,MAAM,aAAa,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAC5C,MAAM,aAAa,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAE5C,aAAa,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAExC,CAAC;QAED,mBAAmB;QACnB,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC3B,iDAAiD;gBACjD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;IAEH,CAAC;IAED;;;;;OAKG;IACH,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,OAAO,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;IACvC,CAAC;;AAzEH,0CA0EC;;;AAED;;;;GAIG;AACH,MAAa,gBAAgB;IAM3B,YAAY,QAAgC,SAAS;QAHpC,cAAS,GAA0B,IAAI,GAAG,EAAoB,CAAC;QAC/D,aAAQ,GAA0B,IAAI,GAAG,EAAoB,CAAC;QAG7E,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACtB,CAAC;IAED;;;;OAIG;IACH,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAW,QAAQ;QACjB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IACpC,CAAC;IAED;;OAEG;IACH,IAAW,OAAO;QAChB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IACnC,CAAC;IAED;;OAEG;IACI,QAAQ;QAEb,MAAM,KAAK,GAAG,IAAI,GAAG,EAAoB,CAAC;QAC1C,MAAM,QAAQ,GAAuB,EAAE,CAAC;QAExC,SAAS,KAAK,CAAC,CAAmB;YAChC,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3B,KAAK,CAAC,CAAC,CAAC,CAAC;YACX,CAAC;YACD,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;gBAClB,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;gBACjB,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;YACf,CAAC;QACH,CAAC;QAED,KAAK,CAAC,IAAI,CAAC,CAAC;QAEZ,OAAO,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAM,CAAC,CAAC;IAE1D,CAAC;IAED;;;;;;;OAOG;IACI,QAAQ,CAAC,GAAqB;QAEnC,MAAM,KAAK,GAAuB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QACtD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,8BAA8B,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACxH,CAAC;QAED,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACxB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;IACtB,CAAC;IAEO,SAAS,CAAC,GAAqB;QACrC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;IAEO,SAAS,CAAC,GAAqB;QAErC,MAAM,KAAK,GAAuB,EAAE,CAAC;QACrC,KAAK,CAAC,IAAI,CAAC,CAAC;QACZ,OAAO,KAAK,CAAC;QAEb,SAAS,KAAK,CAAC,CAAmB;YAChC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACd,IAAI,KAAK,GAAG,KAAK,CAAC;YAClB,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3B,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;oBACd,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;oBACd,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,KAAK,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;YACnB,CAAC;YACD,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,KAAK,CAAC,GAAG,EAAE,CAAC;YACd,CAAC;YACD,OAAO,KAAK,CAAC;QAEf,CAAC;IAEH,CAAC;;AAxGH,4CAyGC","sourcesContent":["import { Node, IConstruct } from 'constructs';\n\n\n/**\n * Represents the dependency graph for a given Node.\n *\n * This graph includes the dependency relationships between all nodes in the\n * node (construct) sub-tree who's root is this Node.\n *\n * Note that this means that lonely nodes (no dependencies and no dependants) are also included in this graph as\n * childless children of the root node of the graph.\n *\n * The graph does not include cross-scope dependencies. That is, if a child on the current scope depends on a node\n * from a different scope, that relationship is not represented in this graph.\n *\n */\nexport class DependencyGraph {\n\n  private readonly _fosterParent: DependencyVertex;\n\n  constructor(node: Node) {\n\n    this._fosterParent = new DependencyVertex();\n\n    const nodes: Record<string, DependencyVertex> = {};\n\n    function putVertex(construct: IConstruct) {\n      nodes[construct.node.path] = new DependencyVertex(construct);\n    }\n\n    function getVertex(construct: IConstruct): DependencyVertex {\n      return nodes[construct.node.path];\n    }\n\n    // create all vertices of the graph.\n    for (const n of node.findAll()) {\n      putVertex(n);\n    }\n\n    const deps = [];\n    for (const child of node.findAll()) {\n      for (const dep of child.node.dependencies) {\n        deps.push({ source: child, target: dep });\n      }\n    }\n\n    // create all the edges of the graph.\n    for (const dep of deps) {\n\n      if (!getVertex(dep.target)) {\n        // dont cross scope boundaries.\n        // since charts only renders its own children, this is ok and\n        // has the benefit of simplifying the graph. we should reconsider this behavior when moving\n        // to a more general purpose use-case.\n        continue;\n      }\n\n      const sourceDepNode = getVertex(dep.source);\n      const targetDepNode = getVertex(dep.target);\n\n      sourceDepNode.addChild(targetDepNode);\n\n    }\n\n    // create the root.\n    for (const n of Object.values(nodes)) {\n      if (n.inbound.length === 0) {\n        // orphans are dependency roots. lets adopt them!\n        this._fosterParent.addChild(n);\n      }\n    }\n\n  }\n\n  /**\n   * Returns the root of the graph.\n   *\n   * Note that this vertex will always have `null` as its `.value` since it is an artifical root\n   * that binds all the connected spaces of the graph.\n   */\n  public get root(): DependencyVertex {\n    return this._fosterParent;\n  }\n\n  /**\n   * @see Vertex.topology()\n   */\n  public topology(): IConstruct[] {\n    return this._fosterParent.topology();\n  }\n}\n\n/**\n * Represents a vertex in the graph.\n *\n * The value of each vertex is an `IConstruct` that is accessible via the `.value` getter.\n */\nexport class DependencyVertex {\n\n  private readonly _value: IConstruct | undefined;\n  private readonly _children: Set<DependencyVertex> = new Set<DependencyVertex>();\n  private readonly _parents: Set<DependencyVertex> = new Set<DependencyVertex>();\n\n  constructor(value: IConstruct | undefined = undefined) {\n    this._value = value;\n  }\n\n  /**\n   * Returns the IConstruct this graph vertex represents.\n   *\n   * `null` in case this is the root of the graph.\n   */\n  public get value(): IConstruct | undefined {\n    return this._value;\n  }\n\n  /**\n   * Returns the children of the vertex (i.e dependencies)\n   */\n  public get outbound(): Array<DependencyVertex> {\n    return Array.from(this._children);\n  }\n\n  /**\n   * Returns the parents of the vertex (i.e dependants)\n   */\n  public get inbound(): Array<DependencyVertex> {\n    return Array.from(this._parents);\n  }\n\n  /**\n   * Returns a topologically sorted array of the constructs in the sub-graph.\n   */\n  public topology(): IConstruct[] {\n\n    const found = new Set<DependencyVertex>();\n    const topology: DependencyVertex[] = [];\n\n    function visit(n: DependencyVertex) {\n      for (const c of n.outbound) {\n        visit(c);\n      }\n      if (!found.has(n)) {\n        topology.push(n);\n        found.add(n);\n      }\n    }\n\n    visit(this);\n\n    return topology.filter(d => d.value).map(d => d.value!);\n\n  }\n\n  /**\n   * Adds a vertex as a dependency of the current node.\n   * Also updates the parents of `dep`, so that it contains this node as a parent.\n   *\n   * This operation will fail in case it creates a cycle in the graph.\n   *\n   * @param dep The dependency\n   */\n  public addChild(dep: DependencyVertex) {\n\n    const cycle: DependencyVertex[] = dep.findRoute(this);\n    if (cycle.length !== 0) {\n      cycle.push(dep);\n      throw new Error(`Dependency cycle detected: ${cycle.filter(d => d.value).map(d => d.value!.node.path).join(' => ')}`);\n    }\n\n    this._children.add(dep);\n    dep.addParent(this);\n  }\n\n  private addParent(dep: DependencyVertex) {\n    this._parents.add(dep);\n  }\n\n  private findRoute(dst: DependencyVertex): DependencyVertex[] {\n\n    const route: DependencyVertex[] = [];\n    visit(this);\n    return route;\n\n    function visit(n: DependencyVertex): boolean {\n      route.push(n);\n      let found = false;\n      for (const c of n.outbound) {\n        if (c === dst) {\n          route.push(c);\n          return true;\n        }\n        found = visit(c);\n      }\n      if (!found) {\n        route.pop();\n      }\n      return found;\n\n    }\n\n  }\n}\n"]}
|
|
149032
149032
|
|
|
149033
149033
|
/***/ }),
|
|
@@ -149236,7 +149236,7 @@ class Duration {
|
|
|
149236
149236
|
}
|
|
149237
149237
|
exports.Duration = Duration;
|
|
149238
149238
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149239
|
-
Duration[_a] = { fqn: "cdk8s.Duration", version: "2.69.
|
|
149239
|
+
Duration[_a] = { fqn: "cdk8s.Duration", version: "2.69.57" };
|
|
149240
149240
|
class TimeUnit {
|
|
149241
149241
|
constructor(label, inMillis) {
|
|
149242
149242
|
this.label = label;
|
|
@@ -149332,7 +149332,7 @@ class Helm extends include_1.Include {
|
|
|
149332
149332
|
}
|
|
149333
149333
|
exports.Helm = Helm;
|
|
149334
149334
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149335
|
-
Helm[_a] = { fqn: "cdk8s.Helm", version: "2.69.
|
|
149335
|
+
Helm[_a] = { fqn: "cdk8s.Helm", version: "2.69.57" };
|
|
149336
149336
|
function renderTemplate(workdir, prog, args) {
|
|
149337
149337
|
const helm = _child_process_1._child_process.spawnSync(prog, args, {
|
|
149338
149338
|
maxBuffer: MAX_HELM_BUFFER,
|
|
@@ -149396,7 +149396,7 @@ class Include extends constructs_1.Construct {
|
|
|
149396
149396
|
}
|
|
149397
149397
|
exports.Include = Include;
|
|
149398
149398
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149399
|
-
Include[_a] = { fqn: "cdk8s.Include", version: "2.69.
|
|
149399
|
+
Include[_a] = { fqn: "cdk8s.Include", version: "2.69.57" };
|
|
149400
149400
|
//# sourceMappingURL=data:application/json;base64,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
|
|
149401
149401
|
|
|
149402
149402
|
/***/ }),
|
|
@@ -149534,7 +149534,7 @@ class JsonPatch {
|
|
|
149534
149534
|
}
|
|
149535
149535
|
exports.JsonPatch = JsonPatch;
|
|
149536
149536
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149537
|
-
JsonPatch[_a] = { fqn: "cdk8s.JsonPatch", version: "2.69.
|
|
149537
|
+
JsonPatch[_a] = { fqn: "cdk8s.JsonPatch", version: "2.69.57" };
|
|
149538
149538
|
//# sourceMappingURL=data:application/json;base64,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
|
|
149539
149539
|
|
|
149540
149540
|
/***/ }),
|
|
@@ -149561,7 +149561,7 @@ class Lazy {
|
|
|
149561
149561
|
}
|
|
149562
149562
|
exports.Lazy = Lazy;
|
|
149563
149563
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149564
|
-
Lazy[_a] = { fqn: "cdk8s.Lazy", version: "2.69.
|
|
149564
|
+
Lazy[_a] = { fqn: "cdk8s.Lazy", version: "2.69.57" };
|
|
149565
149565
|
//# sourceMappingURL=data:application/json;base64,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
|
|
149566
149566
|
|
|
149567
149567
|
/***/ }),
|
|
@@ -149660,7 +149660,7 @@ class ApiObjectMetadataDefinition {
|
|
|
149660
149660
|
}
|
|
149661
149661
|
exports.ApiObjectMetadataDefinition = ApiObjectMetadataDefinition;
|
|
149662
149662
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149663
|
-
ApiObjectMetadataDefinition[_a] = { fqn: "cdk8s.ApiObjectMetadataDefinition", version: "2.69.
|
|
149663
|
+
ApiObjectMetadataDefinition[_a] = { fqn: "cdk8s.ApiObjectMetadataDefinition", version: "2.69.57" };
|
|
149664
149664
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"metadata.js","sourceRoot":"","sources":["../src/metadata.ts"],"names":[],"mappings":";;;;;AAAA,mCAAwC;AAExC,uCAAoC;AAmHpC;;GAEG;AACH,MAAa,2BAA2B;IA8CtC,YAAY,OAA2C;QACrD,IAAI,CAAC,IAAI,GAAG,OAAO,CAAC,IAAI,CAAC;QACzB,IAAI,CAAC,MAAM,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,EAAE,CAAC;QAC5C,IAAI,CAAC,WAAW,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,WAAW,IAAI,EAAE,CAAC,EAAE,CAAC;QACtD,IAAI,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACpE,IAAI,CAAC,eAAe,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACnF,IAAI,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,qBAAqB,GAAG,OAAO,CAAC;QAErC,+EAA+E;QAC/E,OAAO,IAAI,CAAC,qBAAqB,CAAC,SAAS,CAAC;IAC9C,CAAC;IAED;;;;;OAKG;IACI,QAAQ,CAAC,GAAW,EAAE,KAAa;QACxC,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,GAAW;QACzB,OAAO,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,GAAW,EAAE,KAAa;QAC7C,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAChC,CAAC;IAED;;;;OAIG;IACI,aAAa,CAAC,GAAG,UAAoB;QAC1C,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,UAAU,CAAC,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,KAAqB;QAC5C,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACnC,CAAC;IAED;;;;OAIG;IACI,GAAG,CAAC,GAAW,EAAE,KAAU;QAChC,IAAI,CAAC,qBAAqB,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC1C,CAAC;IAED;;OAEG;IACI,MAAM;QACX,MAAM,QAAQ,GAAG,CAAC,CAAM,EAAE,EAAE,CAAC,IAAA,qBAAa,EAAC,CAAC,EAAE,EAAE,iBAAiB,EAAE,IAAI,EAAE,kBAAkB,EAAE,IAAI,EAAE,CAAC,CAAC;QACrG,OAAO,QAAQ,CAAC,IAAA,iBAAO,EAAC,EAAE,EAAE;YAC1B,GAAG,IAAI,CAAC,qBAAqB;YAC7B,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,MAAM,EAAE,IAAI,CAAC,MAAM;SACpB,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IACtB,CAAC;;AAjIH,kEAkIC","sourcesContent":["import { sanitizeValue } from './_util';\nimport { ApiObject } from './api-object';\nimport { resolve } from './resolve';\n\n/**\n * Metadata associated with this object.\n */\nexport interface ApiObjectMetadata {\n  /**\n   * The unique, namespace-global, name of this object inside the Kubernetes\n   * cluster.\n   *\n   * Normally, you shouldn't specify names for objects and let the CDK generate\n   * a name for you that is application-unique. The names CDK generates are\n   * composed from the construct path components, separated by dots and a suffix\n   * that is based on a hash of the entire path, to ensure uniqueness.\n   *\n   * You can supply custom name allocation logic by overriding the\n   * `chart.generateObjectName` method.\n   *\n   * If you use an explicit name here, bear in mind that this reduces the\n   * composability of your construct because it won't be possible to include\n   * more than one instance in any app. Therefore it is highly recommended to\n   * leave this unspecified.\n   *\n   * @default - an app-unique name generated by the chart\n   */\n  readonly name?: string;\n\n  /**\n   * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be\n   * preserved when modifying objects.\n   *\n   * @see http://kubernetes.io/docs/user-guide/annotations\n   * @default - No annotations.\n   */\n  readonly annotations?: { [key: string]: string };\n\n  /**\n   * Map of string keys and values that can be used to organize and categorize (scope and select) objects.\n   * May match selectors of replication controllers and services.\n   *\n   * @see http://kubernetes.io/docs/user-guide/labels\n   * @default - No labels.\n   */\n  readonly labels?: { [key: string]: string };\n\n  /**\n   * Namespace defines the space within each name must be unique. An empty namespace is equivalent to the \"default\" namespace, but \"default\" is the canonical representation.\n   * Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty. Must be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces\n   *\n   * @default undefined (will be assigned to the 'default' namespace)\n   */\n  readonly namespace?: string;\n\n  /**\n   * Namespaced keys that tell Kubernetes to wait until specific conditions are\n   * met before it fully deletes resources marked for deletion.\n   *\n   * Must be empty before the object is deleted from the registry. Each entry is\n   * an identifier for the responsible component that will remove the entry from\n   * the list. If the deletionTimestamp of the object is non-nil, entries in\n   * this list can only be removed. Finalizers may be processed and removed in\n   * any order.  Order is NOT enforced because it introduces significant risk of\n   * stuck finalizers. finalizers is a shared field, any actor with permission\n   * can reorder it. If the finalizer list is processed in order, then this can\n   * lead to a situation in which the component responsible for the first\n   * finalizer in the list is waiting for a signal (field value, external\n   * system, or other) produced by a component responsible for a finalizer later\n   * in the list, resulting in a deadlock. Without enforced ordering finalizers\n   * are free to order amongst themselves and are not vulnerable to ordering\n   * changes in the list.\n   *\n   * @see https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/\n   * @default - No finalizers.\n   */\n  readonly finalizers?: string[];\n\n  /**\n   * List of objects depended by this object. If ALL objects in the list have\n   * been deleted, this object will be garbage collected. If this object is\n   * managed by a controller, then an entry in this list will point to this\n   * controller, with the controller field set to true. There cannot be more\n   * than one managing controller.\n   *\n   * Kubernetes sets the value of this field automatically for objects that are\n   * dependents of other objects like ReplicaSets, DaemonSets, Deployments, Jobs\n   * and CronJobs, and ReplicationControllers. You can also configure these\n   * relationships manually by changing the value of this field. However, you\n   * usually don't need to and can allow Kubernetes to automatically manage the\n   * relationships.\n   *\n   * @see https://kubernetes.io/docs/concepts/overview/working-with-objects/owners-dependents/\n   * @default - automatically set by Kubernetes\n   */\n  readonly ownerReferences?: OwnerReference[];\n\n  /**\n   * Additional metadata attributes.\n   * @jsii ignore\n   * @see https://github.com/cdk8s-team/cdk8s-core/issues/1297\n   */\n  readonly [key: string]: any;\n}\n\n/**\n * Options for `ApiObjectMetadataDefinition`.\n */\nexport interface ApiObjectMetadataDefinitionOptions extends ApiObjectMetadata {\n\n  /**\n   * Which ApiObject instance is the metadata attached to.\n   */\n  readonly apiObject: ApiObject;\n\n}\n\n/**\n * Object metadata.\n */\nexport class ApiObjectMetadataDefinition {\n  /**\n   * The name of the API object.\n   *\n   * If a name is specified in `metadata.name` this will be the name returned.\n   * Otherwise, a name will be generated by calling\n   * `Chart.of(this).generatedObjectName(this)`, which by default uses the\n   * construct path to generate a DNS-compatible name for the resource.\n   */\n  public readonly name?: string;\n\n  /**\n   * The object's namespace.\n   */\n  public readonly namespace?: string;\n\n  /**\n   * Labels associated with this object.\n   */\n  private readonly labels: { [key: string]: string };\n\n  /**\n   * Annotations associated with this object.\n   */\n  private readonly annotations: { [key: string]: string };\n\n  /**\n   * Finalizers associated with this object.\n   */\n  private readonly finalizers: string[];\n\n  /**\n   * Owner references set for this object.\n   */\n  private readonly ownerReferences: OwnerReference[];\n\n  /**\n   * The ApiObject this metadata is attached to.\n   */\n  private readonly apiObject: ApiObject;\n\n  /**\n   * Additional metadata attributes passed through `options`.\n   */\n  private readonly _additionalAttributes: { [key: string]: any };\n\n  constructor(options: ApiObjectMetadataDefinitionOptions) {\n    this.name = options.name;\n    this.labels = { ...(options.labels ?? {}) };\n    this.annotations = { ...(options.annotations ?? {}) };\n    this.namespace = options.namespace;\n    this.finalizers = options.finalizers ? [...options.finalizers] : [];\n    this.ownerReferences = options.ownerReferences ? [...options.ownerReferences] : [];\n    this.apiObject = options.apiObject;\n    this._additionalAttributes = options;\n\n    // otherwise apiObject is passed to the resolving logic, which expectadly fails\n    delete this._additionalAttributes.apiObject;\n  }\n\n  /**\n   * Add a label.\n   *\n   * @param key - The key.\n   * @param value - The value.\n   */\n  public addLabel(key: string, value: string) {\n    this.labels[key] = value;\n  }\n\n  /**\n   * @returns a value of a label or undefined\n   * @param key the label\n   */\n  public getLabel(key: string): string | undefined {\n    return this.labels[key];\n  }\n\n  /**\n   * Add an annotation.\n   *\n   * @param key - The key.\n   * @param value - The value.\n   */\n  public addAnnotation(key: string, value: string) {\n    this.annotations[key] = value;\n  }\n\n  /**\n   * Add one or more finalizers.\n   *\n   * @param finalizers the finalizers\n   */\n  public addFinalizers(...finalizers: string[]) {\n    this.finalizers.push(...finalizers);\n  }\n\n  /**\n   * Add an owner.\n   *\n   * @param owner the owner\n   */\n  public addOwnerReference(owner: OwnerReference) {\n    this.ownerReferences.push(owner);\n  }\n\n  /**\n   * Adds an arbitrary key/value to the object metadata.\n   * @param key Metadata key\n   * @param value Metadata value\n   */\n  public add(key: string, value: any) {\n    this._additionalAttributes[key] = value;\n  }\n\n  /**\n   * Synthesizes a k8s ObjectMeta for this metadata set.\n   */\n  public toJson() {\n    const sanitize = (x: any) => sanitizeValue(x, { filterEmptyArrays: true, filterEmptyObjects: true });\n    return sanitize(resolve([], {\n      ...this._additionalAttributes,\n      name: this.name,\n      namespace: this.namespace,\n      annotations: this.annotations,\n      finalizers: this.finalizers,\n      ownerReferences: this.ownerReferences,\n      labels: this.labels,\n    }, this.apiObject));\n  }\n}\n\n/**\n * OwnerReference contains enough information to let you identify an owning\n * object. An owning object must be in the same namespace as the dependent, or\n * be cluster-scoped, so there is no namespace field.\n */\nexport interface OwnerReference {\n  /**\n   * API version of the referent.\n   */\n  readonly apiVersion: string;\n\n  /**\n   * If true, AND if the owner has the \"foregroundDeletion\" finalizer, then the\n   * owner cannot be deleted from the key-value store until this reference is\n   * removed. Defaults to false. To set this field, a user needs \"delete\"\n   * permission of the owner, otherwise 422 (Unprocessable Entity) will be\n   * returned.\n   *\n   * @default false. To set this field, a user needs \"delete\" permission of the\n   * owner, otherwise 422 (Unprocessable Entity) will be returned.\n   */\n  readonly blockOwnerDeletion?: boolean;\n\n  /**\n   * If true, this reference points to the managing controller.\n   */\n  readonly controller?: boolean;\n\n  /**\n   * Kind of the referent.\n   *\n   * @see https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds\n   */\n  readonly kind: string;\n\n  /**\n   * Name of the referent.\n   *\n   * @see http://kubernetes.io/docs/user-guide/identifiers#names\n   */\n  readonly name: string;\n\n  /**\n   * UID of the referent.\n   *\n   * @see http://kubernetes.io/docs/user-guide/identifiers#uids\n   */\n  readonly uid: string;\n\n}\n"]}
|
|
149665
149665
|
|
|
149666
149666
|
/***/ }),
|
|
@@ -149791,7 +149791,7 @@ class Names {
|
|
|
149791
149791
|
}
|
|
149792
149792
|
exports.Names = Names;
|
|
149793
149793
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149794
|
-
Names[_a] = { fqn: "cdk8s.Names", version: "2.69.
|
|
149794
|
+
Names[_a] = { fqn: "cdk8s.Names", version: "2.69.57" };
|
|
149795
149795
|
function omitDuplicates(value, index, components) {
|
|
149796
149796
|
return value !== components[index - 1];
|
|
149797
149797
|
}
|
|
@@ -149883,7 +149883,7 @@ class ResolutionContext {
|
|
|
149883
149883
|
}
|
|
149884
149884
|
exports.ResolutionContext = ResolutionContext;
|
|
149885
149885
|
_a = JSII_RTTI_SYMBOL_1;
|
|
149886
|
-
ResolutionContext[_a] = { fqn: "cdk8s.ResolutionContext", version: "2.69.
|
|
149886
|
+
ResolutionContext[_a] = { fqn: "cdk8s.ResolutionContext", version: "2.69.57" };
|
|
149887
149887
|
/**
|
|
149888
149888
|
* Resolvers instanecs of `Lazy`.
|
|
149889
149889
|
*/
|
|
@@ -149897,7 +149897,7 @@ class LazyResolver {
|
|
|
149897
149897
|
}
|
|
149898
149898
|
exports.LazyResolver = LazyResolver;
|
|
149899
149899
|
_b = JSII_RTTI_SYMBOL_1;
|
|
149900
|
-
LazyResolver[_b] = { fqn: "cdk8s.LazyResolver", version: "2.69.
|
|
149900
|
+
LazyResolver[_b] = { fqn: "cdk8s.LazyResolver", version: "2.69.57" };
|
|
149901
149901
|
/**
|
|
149902
149902
|
* Resolves implicit tokens.
|
|
149903
149903
|
*/
|
|
@@ -149911,7 +149911,7 @@ class ImplicitTokenResolver {
|
|
|
149911
149911
|
}
|
|
149912
149912
|
exports.ImplicitTokenResolver = ImplicitTokenResolver;
|
|
149913
149913
|
_c = JSII_RTTI_SYMBOL_1;
|
|
149914
|
-
ImplicitTokenResolver[_c] = { fqn: "cdk8s.ImplicitTokenResolver", version: "2.69.
|
|
149914
|
+
ImplicitTokenResolver[_c] = { fqn: "cdk8s.ImplicitTokenResolver", version: "2.69.57" };
|
|
149915
149915
|
/**
|
|
149916
149916
|
* Resolves union types that allow using either number or string (as generated by the CLI).
|
|
149917
149917
|
*
|
|
@@ -149932,7 +149932,7 @@ class NumberStringUnionResolver {
|
|
|
149932
149932
|
}
|
|
149933
149933
|
exports.NumberStringUnionResolver = NumberStringUnionResolver;
|
|
149934
149934
|
_d = JSII_RTTI_SYMBOL_1;
|
|
149935
|
-
NumberStringUnionResolver[_d] = { fqn: "cdk8s.NumberStringUnionResolver", version: "2.69.
|
|
149935
|
+
NumberStringUnionResolver[_d] = { fqn: "cdk8s.NumberStringUnionResolver", version: "2.69.57" };
|
|
149936
149936
|
NumberStringUnionResolver.TYPES = ['number', 'string'];
|
|
149937
149937
|
/**
|
|
149938
149938
|
* Resolves any value attached to a specific ApiObject.
|
|
@@ -150068,7 +150068,7 @@ class Size {
|
|
|
150068
150068
|
}
|
|
150069
150069
|
exports.Size = Size;
|
|
150070
150070
|
_a = JSII_RTTI_SYMBOL_1;
|
|
150071
|
-
Size[_a] = { fqn: "cdk8s.Size", version: "2.69.
|
|
150071
|
+
Size[_a] = { fqn: "cdk8s.Size", version: "2.69.57" };
|
|
150072
150072
|
/**
|
|
150073
150073
|
* Rounding behaviour when converting between units of `Size`.
|
|
150074
150074
|
*/
|
|
@@ -150173,7 +150173,7 @@ class Testing {
|
|
|
150173
150173
|
}
|
|
150174
150174
|
exports.Testing = Testing;
|
|
150175
150175
|
_a = JSII_RTTI_SYMBOL_1;
|
|
150176
|
-
Testing[_a] = { fqn: "cdk8s.Testing", version: "2.69.
|
|
150176
|
+
Testing[_a] = { fqn: "cdk8s.Testing", version: "2.69.57" };
|
|
150177
150177
|
//# sourceMappingURL=data:application/json;base64,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
|
|
150178
150178
|
|
|
150179
150179
|
/***/ }),
|
|
@@ -150282,19 +150282,19 @@ class Yaml {
|
|
|
150282
150282
|
}
|
|
150283
150283
|
exports.Yaml = Yaml;
|
|
150284
150284
|
_a = JSII_RTTI_SYMBOL_1;
|
|
150285
|
-
Yaml[_a] = { fqn: "cdk8s.Yaml", version: "2.69.
|
|
150285
|
+
Yaml[_a] = { fqn: "cdk8s.Yaml", version: "2.69.57" };
|
|
150286
150286
|
/**
|
|
150287
150287
|
* Loads a url (or file) and returns the contents.
|
|
150288
150288
|
* This method spawns a child process in order to perform an http call synchronously.
|
|
150289
150289
|
*/
|
|
150290
150290
|
function loadurl(url) {
|
|
150291
|
-
const script = __nccwpck_require__.ab + "_loadurl.
|
|
150292
|
-
return (0, child_process_1.execFileSync)(process.execPath, [__nccwpck_require__.ab + "_loadurl.
|
|
150291
|
+
const script = __nccwpck_require__.ab + "_loadurl.mjs";
|
|
150292
|
+
return (0, child_process_1.execFileSync)(process.execPath, [__nccwpck_require__.ab + "_loadurl.mjs", url], {
|
|
150293
150293
|
encoding: 'utf-8',
|
|
150294
150294
|
maxBuffer: MAX_DOWNLOAD_BUFFER,
|
|
150295
150295
|
}).toString();
|
|
150296
150296
|
}
|
|
150297
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
150297
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoieWFtbC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy95YW1sLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBQUEsaURBQTZDO0FBQzdDLHlCQUF5QjtBQUN6Qix5QkFBeUI7QUFDekIsNkJBQTZCO0FBQzdCLDZCQUE2QjtBQUU3QixNQUFNLG1CQUFtQixHQUFHLEVBQUUsR0FBRyxJQUFJLEdBQUcsSUFBSSxDQUFDO0FBRTdDLG9IQUFvSDtBQUNwSCx1RUFBdUU7QUFDdkUsMEVBQTBFO0FBQzFFLE1BQU0saUJBQWlCLEdBQUcsS0FBSyxDQUFDO0FBRWhDOztHQUVHO0FBQ0gsTUFBYSxJQUFJO0lBQ2Y7O09BRUc7SUFDSSxNQUFNLENBQUMsYUFBYSxDQUFDLElBQVc7UUFDckMsT0FBTyxJQUFJLENBQUMsU0FBUyxDQUFDLEdBQUcsSUFBSSxDQUFDLENBQUM7SUFDakMsQ0FBQztJQUVEOzs7O09BSUc7SUFDSSxNQUFNLENBQUMsSUFBSSxDQUFDLFFBQWdCLEVBQUUsSUFBVztRQUM5QyxNQUFNLElBQUksR0FBRyxJQUFJLENBQUMsU0FBUyxDQUFDLEdBQUcsSUFBSSxDQUFDLENBQUM7UUFDckMsRUFBRSxDQUFDLGFBQWEsQ0FBQyxRQUFRLEVBQUUsSUFBSSxFQUFFLEVBQUUsUUFBUSxFQUFFLE1BQU0sRUFBRSxDQUFDLENBQUM7SUFDekQsQ0FBQztJQUVEOzs7Ozs7OztPQVFHO0lBQ0ksTUFBTSxDQUFDLFNBQVMsQ0FBQyxHQUFHLElBQVc7UUFDcEMsT0FBTyxJQUFJLENBQUMsR0FBRyxDQUNiLENBQUMsQ0FBQyxFQUFFLENBQUMsQ0FBQyxLQUFLLFNBQVMsQ0FBQyxDQUFDLENBQUMsSUFBSSxDQUFDLENBQUMsQ0FBQyxJQUFJLENBQUMsU0FBUyxDQUFDLENBQUMsRUFBRSxFQUFFLGFBQWEsRUFBRSxJQUFJLEVBQUUsU0FBUyxFQUFFLENBQUMsRUFBRSxPQUFPLEVBQUUsaUJBQWlCLEVBQUUsQ0FBQyxDQUNuSCxDQUFDLElBQUksQ0FBQyxPQUFPLENBQUMsQ0FBQztJQUNsQixDQUFDO0lBRUQ7Ozs7O09BS0c7SUFDSSxNQUFNLENBQUMsR0FBRyxDQUFDLElBQVc7UUFDM0IsTUFBTSxNQUFNLEdBQUcsRUFBRSxDQUFDLFdBQVcsQ0FBQyxJQUFJLENBQUMsSUFBSSxDQUFDLEVBQUUsQ0FBQyxNQUFNLEVBQUUsRUFBRSxRQUFRLENBQUMsQ0FBQyxDQUFDO1FBQ2hFLE1BQU0sUUFBUSxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsTUFBTSxFQUFFLFdBQVcsQ0FBQyxDQUFDO1FBQ2hELElBQUksQ0FBQyxJQUFJLENBQUMsUUFBUSxFQUFFLElBQUksQ0FBQyxDQUFDO1FBQzFCLE9BQU8sUUFBUSxDQUFDO0lBQ2xCLENBQUM7SUFFRDs7Ozs7Ozs7T0FRRztJQUNJLE1BQU0sQ0FBQyxJQUFJLENBQUMsU0FBaUI7UUFDbEMsTUFBTSxJQUFJLEdBQUcsT0FBTyxDQUFDLFNBQVMsQ0FBQyxDQUFDO1FBRWhDLE1BQU0sT0FBTyxHQUFHLElBQUksQ0FBQyxpQkFBaUIsQ0FBQyxJQUFJLEVBQUU7WUFDM0MsT0FBTyxFQUFFLGlCQUFpQjtTQUMzQixDQUFDLENBQUM7UUFDSCxNQUFNLE1BQU0sR0FBRyxJQUFJLEtBQUssRUFBTyxDQUFDO1FBRWhDLEtBQUssTUFBTSxHQUFHLElBQUksT0FBTyxDQUFDLEdBQUcsQ0FBQyxDQUFDLENBQUMsRUFBRSxDQUFDLENBQUMsQ0FBQyxNQUFNLEVBQUUsQ0FBQyxFQUFFLENBQUM7WUFDL0MsdUJBQXVCO1lBQ3ZCLElBQUksR0FBRyxLQUFLLFNBQVMsRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQ3BDLElBQUksR0FBRyxLQUFLLElBQUksRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQy9CLElBQUksS0FBSyxDQUFDLE9BQU8sQ0FBQyxHQUFHLENBQUMsSUFBSSxHQUFHLENBQUMsTUFBTSxLQUFLLENBQUMsRUFBRSxDQUFDO2dCQUFDLFNBQVM7WUFBQyxDQUFDO1lBQ3pELElBQUksT0FBTyxDQUFDLEdBQUcsQ0FBQyxLQUFLLFFBQVEsSUFBSSxNQUFNLENBQUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDLE1BQU0sS0FBSyxDQUFDLEVBQUUsQ0FBQztnQkFBQyxTQUFTO1lBQUMsQ0FBQztZQUU3RSxNQUFNLENBQUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDO1FBQ25CLENBQUM7UUFFRCxPQUFPLE1BQU0sQ0FBQztJQUNoQixDQUFDO0lBRUQ7O09BRUc7SUFDSDtRQUNFLE9BQU87SUFDVCxDQUFDOztBQWpGSCxvQkFrRkM7OztBQUVEOzs7R0FHRztBQUNILFNBQVMsT0FBTyxDQUFDLEdBQVc7SUFDMUIsTUFBTSxNQUFNLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxTQUFTLEVBQUUsY0FBYyxDQUFDLENBQUM7SUFDcEQsT0FBTyxJQUFBLDRCQUFZLEVBQUMsT0FBTyxDQUFDLFFBQVEsRUFBRSxDQUFDLE1BQU0sRUFBRSxHQUFHLENBQUMsRUFBRTtRQUNuRCxRQUFRLEVBQUUsT0FBTztRQUNqQixTQUFTLEVBQUUsbUJBQW1CO0tBQy9CLENBQUMsQ0FBQyxRQUFRLEVBQUUsQ0FBQztBQUNoQixDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgZXhlY0ZpbGVTeW5jIH0gZnJvbSAnY2hpbGRfcHJvY2Vzcyc7XG5pbXBvcnQgKiBhcyBmcyBmcm9tICdmcyc7XG5pbXBvcnQgKiBhcyBvcyBmcm9tICdvcyc7XG5pbXBvcnQgKiBhcyBwYXRoIGZyb20gJ3BhdGgnO1xuaW1wb3J0ICogYXMgWUFNTCBmcm9tICd5YW1sJztcblxuY29uc3QgTUFYX0RPV05MT0FEX0JVRkZFUiA9IDEwICogMTAyNCAqIDEwMjQ7XG5cbi8vIFNldCBkZWZhdWx0IFlBTUwgc2NoZW1hIHRvIDEuMS4gVGhpcyBlbnN1cmVzIHNhdmVkIFlBTUwgaXMgYmFja3dhcmQgY29tcGF0aWJsZSB3aXRoIG90aGVyIHBhcnNlcnMsIHN1Y2ggYXMgUHlZQU1MXG4vLyBJdCBhbHNvIGVuc3VyZXMgdGhhdCBvY3RhbCBudW1iZXJzIGluIHRoZSBmb3JtIGAwNzc1YCB3aWxsIGJlIHBhcnNlZFxuLy8gY29ycmVjdGx5IG9uIFlBTUwgbG9hZC4gKHNlZSBodHRwczovL2dpdGh1Yi5jb20vZWVtZWxpL3lhbWwvaXNzdWVzLzIwNSlcbmNvbnN0IHlhbWxTY2hlbWFWZXJzaW9uID0gJzEuMSc7XG5cbi8qKlxuICogWUFNTCB1dGlsaXRpZXMuXG4gKi9cbmV4cG9ydCBjbGFzcyBZYW1sIHtcbiAgLyoqXG4gICAqIEBkZXByZWNhdGVkIHVzZSBgc3RyaW5naWZ5KGRvY1ssIGRvYywgLi4uXSlgXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIGZvcm1hdE9iamVjdHMoZG9jczogYW55W10pOiBzdHJpbmcge1xuICAgIHJldHVybiB0aGlzLnN0cmluZ2lmeSguLi5kb2NzKTtcbiAgfVxuXG4gIC8qKlxuICAgKiBTYXZlcyBhIHNldCBvZiBvYmplY3RzIGFzIGEgbXVsdGktZG9jdW1lbnQgWUFNTCBmaWxlLlxuICAgKiBAcGFyYW0gZmlsZVBhdGggVGhlIG91dHB1dCBwYXRoXG4gICAqIEBwYXJhbSBkb2NzIFRoZSBzZXQgb2Ygb2JqZWN0c1xuICAgKi9cbiAgcHVibGljIHN0YXRpYyBzYXZlKGZpbGVQYXRoOiBzdHJpbmcsIGRvY3M6IGFueVtdKSB7XG4gICAgY29uc3QgZGF0YSA9IHRoaXMuc3RyaW5naWZ5KC4uLmRvY3MpO1xuICAgIGZzLndyaXRlRmlsZVN5bmMoZmlsZVBhdGgsIGRhdGEsIHsgZW5jb2Rpbmc6ICd1dGY4JyB9KTtcbiAgfVxuXG4gIC8qKlxuICAgKiBTdHJpbmdpZnkgYSBkb2N1bWVudCAob3IgbXVsdGlwbGUgZG9jdW1lbnRzKSBpbnRvIFlBTUxcbiAgICpcbiAgICogV2UgY29udmVydCB1bmRlZmluZWQgdmFsdWVzIHRvIG51bGwsIGJ1dCBpZ25vcmUgYW55IGRvY3VtZW50cyB0aGF0IGFyZVxuICAgKiB1bmRlZmluZWQuXG4gICAqXG4gICAqIEBwYXJhbSBkb2NzIEEgc2V0IG9mIG9iamVjdHMgdG8gY29udmVydCB0byBZQU1MXG4gICAqIEByZXR1cm5zIGEgWUFNTCBzdHJpbmcuIE11bHRpcGxlIGRvY3MgYXJlIHNlcGFyYXRlZCBieSBgLS0tYC5cbiAgICovXG4gIHB1YmxpYyBzdGF0aWMgc3RyaW5naWZ5KC4uLmRvY3M6IGFueVtdKSB7XG4gICAgcmV0dXJuIGRvY3MubWFwKFxuICAgICAgciA9PiByID09PSB1bmRlZmluZWQgPyAnXFxuJyA6IFlBTUwuc3RyaW5naWZ5KHIsIHsga2VlcFVuZGVmaW5lZDogdHJ1ZSwgbGluZVdpZHRoOiAwLCB2ZXJzaW9uOiB5YW1sU2NoZW1hVmVyc2lvbiB9KSxcbiAgICApLmpvaW4oJy0tLVxcbicpO1xuICB9XG5cbiAgLyoqXG4gICAqIFNhdmVzIGEgc2V0IG9mIFlBTUwgZG9jdW1lbnRzIGludG8gYSB0ZW1wIGZpbGUgKGluIC90bXApXG4gICAqXG4gICAqIEByZXR1cm5zIHRoZSBwYXRoIHRvIHRoZSB0ZW1wb3JhcnkgZmlsZVxuICAgKiBAcGFyYW0gZG9jcyB0aGUgc2V0IG9mIGRvY3VtZW50cyB0byBzYXZlXG4gICAqL1xuICBwdWJsaWMgc3RhdGljIHRtcChkb2NzOiBhbnlbXSk6IHN0cmluZyB7XG4gICAgY29uc3QgdG1wZGlyID0gZnMubWtkdGVtcFN5bmMocGF0aC5qb2luKG9zLnRtcGRpcigpLCAnY2RrOHMtJykpO1xuICAgIGNvbnN0IGZpbGVQYXRoID0gcGF0aC5qb2luKHRtcGRpciwgJ3RlbXAueWFtbCcpO1xuICAgIFlhbWwuc2F2ZShmaWxlUGF0aCwgZG9jcyk7XG4gICAgcmV0dXJuIGZpbGVQYXRoO1xuICB9XG5cbiAgLyoqXG4gICAqIERvd25sb2FkcyBhIHNldCBvZiBZQU1MIGRvY3VtZW50cyAoazhzIG1hbmlmZXN0IGZvciBleGFtcGxlKSBmcm9tIGEgVVJMIG9yXG4gICAqIGEgZmlsZSBhbmQgcmV0dXJucyB0aGVtIGFzIGphdmFzY3JpcHQgb2JqZWN0cy5cbiAgICpcbiAgICogRW1wdHkgZG9jdW1lbnRzIGFyZSBmaWx0ZXJlZCBvdXQuXG4gICAqXG4gICAqIEBwYXJhbSB1cmxPckZpbGUgYSBVUkwgb2YgYSBmaWxlIHBhdGggdG8gbG9hZCBmcm9tXG4gICAqIEByZXR1cm5zIGFuIGFycmF5IG9mIG9iamVjdHMsIGVhY2ggcmVwcmVzZW50cyBhIGRvY3VtZW50IGluc2lkZSB0aGUgWUFNTFxuICAgKi9cbiAgcHVibGljIHN0YXRpYyBsb2FkKHVybE9yRmlsZTogc3RyaW5nKTogYW55W10ge1xuICAgIGNvbnN0IGJvZHkgPSBsb2FkdXJsKHVybE9yRmlsZSk7XG5cbiAgICBjb25zdCBvYmplY3RzID0gWUFNTC5wYXJzZUFsbERvY3VtZW50cyhib2R5LCB7XG4gICAgICB2ZXJzaW9uOiB5YW1sU2NoZW1hVmVyc2lvbixcbiAgICB9KTtcbiAgICBjb25zdCByZXN1bHQgPSBuZXcgQXJyYXk8YW55PigpO1xuXG4gICAgZm9yIChjb25zdCBvYmogb2Ygb2JqZWN0cy5tYXAoeCA9PiB4LnRvSlNPTigpKSkge1xuICAgICAgLy8gc2tpcCBlbXB0eSBkb2N1bWVudHNcbiAgICAgIGlmIChvYmogPT09IHVuZGVmaW5lZCkgeyBjb250aW51ZTsgfVxuICAgICAgaWYgKG9iaiA9PT0gbnVsbCkgeyBjb250aW51ZTsgfVxuICAgICAgaWYgKEFycmF5LmlzQXJyYXkob2JqKSAmJiBvYmoubGVuZ3RoID09PSAwKSB7IGNvbnRpbnVlOyB9XG4gICAgICBpZiAodHlwZW9mIChvYmopID09PSAnb2JqZWN0JyAmJiBPYmplY3Qua2V5cyhvYmopLmxlbmd0aCA9PT0gMCkgeyBjb250aW51ZTsgfVxuXG4gICAgICByZXN1bHQucHVzaChvYmopO1xuICAgIH1cblxuICAgIHJldHVybiByZXN1bHQ7XG4gIH1cblxuICAvKipcbiAgICogVXRpbGl0eSBjbGFzcy5cbiAgICovXG4gIHByaXZhdGUgY29uc3RydWN0b3IoKSB7XG4gICAgcmV0dXJuO1xuICB9XG59XG5cbi8qKlxuICogTG9hZHMgYSB1cmwgKG9yIGZpbGUpIGFuZCByZXR1cm5zIHRoZSBjb250ZW50cy5cbiAqIFRoaXMgbWV0aG9kIHNwYXducyBhIGNoaWxkIHByb2Nlc3MgaW4gb3JkZXIgdG8gcGVyZm9ybSBhbiBodHRwIGNhbGwgc3luY2hyb25vdXNseS5cbiAqL1xuZnVuY3Rpb24gbG9hZHVybCh1cmw6IHN0cmluZyk6IHN0cmluZyB7XG4gIGNvbnN0IHNjcmlwdCA9IHBhdGguam9pbihfX2Rpcm5hbWUsICdfbG9hZHVybC5tanMnKTtcbiAgcmV0dXJuIGV4ZWNGaWxlU3luYyhwcm9jZXNzLmV4ZWNQYXRoLCBbc2NyaXB0LCB1cmxdLCB7XG4gICAgZW5jb2Rpbmc6ICd1dGYtOCcsXG4gICAgbWF4QnVmZmVyOiBNQVhfRE9XTkxPQURfQlVGRkVSLFxuICB9KS50b1N0cmluZygpO1xufVxuIl19
|
|
150298
150298
|
|
|
150299
150299
|
/***/ }),
|
|
150300
150300
|
|
|
@@ -224043,7 +224043,7 @@ class Sender {
|
|
|
224043
224043
|
/**
|
|
224044
224044
|
* Sends a frame.
|
|
224045
224045
|
*
|
|
224046
|
-
* @param {Buffer[]} list The frame to send
|
|
224046
|
+
* @param {(Buffer | String)[]} list The frame to send
|
|
224047
224047
|
* @param {Function} [cb] Callback
|
|
224048
224048
|
* @private
|
|
224049
224049
|
*/
|
|
@@ -224100,8 +224100,10 @@ function onError(sender, err, cb) {
|
|
|
224100
224100
|
/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => {
|
|
224101
224101
|
|
|
224102
224102
|
"use strict";
|
|
224103
|
+
/* eslint no-unused-vars: ["error", { "varsIgnorePattern": "^WebSocket$" }] */
|
|
224103
224104
|
|
|
224104
224105
|
|
|
224106
|
+
const WebSocket = __nccwpck_require__(69427);
|
|
224105
224107
|
const { Duplex } = __nccwpck_require__(12781);
|
|
224106
224108
|
|
|
224107
224109
|
/**
|
|
@@ -237677,6 +237679,11 @@ exports.operatorSubcommands = {
|
|
|
237677
237679
|
{ name: 'apply', type: Boolean },
|
|
237678
237680
|
{ name: 'claim', alias: 'c', type: String },
|
|
237679
237681
|
{ name: 'namespace', alias: 'n', type: String },
|
|
237682
|
+
{ name: 'pull-request-plan', type: Boolean, defaultValue: false },
|
|
237683
|
+
{ name: 'repo', type: String },
|
|
237684
|
+
{ name: 'owner', type: String },
|
|
237685
|
+
{ name: 'ref', type: String },
|
|
237686
|
+
{ name: 'prNumber', type: String },
|
|
237680
237687
|
],
|
|
237681
237688
|
run: async (options) => {
|
|
237682
237689
|
// This will show the command line options passed to the command
|
|
@@ -237708,6 +237715,15 @@ exports.operatorSubcommands = {
|
|
|
237708
237715
|
...options,
|
|
237709
237716
|
});
|
|
237710
237717
|
}
|
|
237718
|
+
if (options['pull-request-plan']) {
|
|
237719
|
+
await (0, operator_1.tfWorkspacePlan)({
|
|
237720
|
+
prNumber: parseInt(options['prNumber']),
|
|
237721
|
+
repo: options['repo'],
|
|
237722
|
+
owner: options['owner'],
|
|
237723
|
+
namespace: options['namespace'] || 'default',
|
|
237724
|
+
ref: options['ref'],
|
|
237725
|
+
});
|
|
237726
|
+
}
|
|
237711
237727
|
},
|
|
237712
237728
|
};
|
|
237713
237729
|
|
|
@@ -244719,14 +244735,18 @@ async function getFileFromGithub(path, repo, owner = 'prefapp') {
|
|
|
244719
244735
|
const octokit = await (0, auth_1.getOctokitForOrg)(owner);
|
|
244720
244736
|
return await octokit.rest.repos.getContent({ owner, repo, path });
|
|
244721
244737
|
}
|
|
244722
|
-
async function getContent(path, repo, owner = 'prefapp') {
|
|
244738
|
+
async function getContent(path, repo, owner = 'prefapp', ref = '') {
|
|
244723
244739
|
messageLog(`Getting content for ${owner}/${repo}/${path}`);
|
|
244724
244740
|
const octokit = await (0, auth_1.getOctokitForOrg)(owner);
|
|
244725
|
-
const
|
|
244741
|
+
const opts = {
|
|
244726
244742
|
owner,
|
|
244727
244743
|
repo,
|
|
244728
244744
|
path,
|
|
244729
|
-
}
|
|
244745
|
+
};
|
|
244746
|
+
if (ref) {
|
|
244747
|
+
opts.ref = ref;
|
|
244748
|
+
}
|
|
244749
|
+
const content = await octokit.rest.repos.getContent(opts);
|
|
244730
244750
|
return Buffer.from(content.data.content, 'base64').toString('utf8');
|
|
244731
244751
|
}
|
|
244732
244752
|
exports.getContent = getContent;
|
|
@@ -246858,7 +246878,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
246858
246878
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
246859
246879
|
};
|
|
246860
246880
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
246861
|
-
exports.runOperator = exports.isObserveModeActive = exports.isImportModeSkipPlan = exports.isImportMode = exports.cmd = exports.execTfCommand = void 0;
|
|
246881
|
+
exports.runOperator = exports.isObserveModeActive = exports.isImportModeSkipPlan = exports.isImportMode = exports.cmd = exports.tfWorkspacePlan = exports.execTfCommand = void 0;
|
|
246862
246882
|
const informer_1 = __nccwpck_require__(41151);
|
|
246863
246883
|
const dummy_1 = __nccwpck_require__(73490);
|
|
246864
246884
|
const processItem_1 = __nccwpck_require__(84766);
|
|
@@ -246869,6 +246889,8 @@ const catalog_common_1 = __importDefault(__nccwpck_require__(74100));
|
|
|
246869
246889
|
const processOperationPlan_1 = __nccwpck_require__(79980);
|
|
246870
246890
|
var execTfCmd_1 = __nccwpck_require__(5959);
|
|
246871
246891
|
Object.defineProperty(exports, "execTfCommand", ({ enumerable: true, get: function () { return execTfCmd_1.execTfCommand; } }));
|
|
246892
|
+
var tfworkspaceplans_1 = __nccwpck_require__(49262);
|
|
246893
|
+
Object.defineProperty(exports, "tfWorkspacePlan", ({ enumerable: true, get: function () { return tfworkspaceplans_1.tfWorkspacePlan; } }));
|
|
246872
246894
|
const metricsServer_1 = __importDefault(__nccwpck_require__(7883));
|
|
246873
246895
|
let importModeActive = false;
|
|
246874
246896
|
let withMetricsMode = false;
|
|
@@ -247222,20 +247244,26 @@ async function getItem(kind, namespace, item) {
|
|
|
247222
247244
|
}
|
|
247223
247245
|
exports.getItem = getItem;
|
|
247224
247246
|
async function getItemByItemPath(itemPath, apiGroup = catalog_common_1.default.types.controller.FirestartrApiGroup, apiVersion = 'v1') {
|
|
247225
|
-
|
|
247226
|
-
|
|
247227
|
-
|
|
247228
|
-
|
|
247229
|
-
|
|
247230
|
-
|
|
247231
|
-
|
|
247232
|
-
|
|
247233
|
-
|
|
247234
|
-
|
|
247235
|
-
|
|
247236
|
-
|
|
247247
|
+
try {
|
|
247248
|
+
fDebug(`Getting ${itemPath}`);
|
|
247249
|
+
const { kc, opts } = await getConnection();
|
|
247250
|
+
opts.headers['Content-Type'] = 'application/json';
|
|
247251
|
+
opts.headers['Accept'] = 'application/json';
|
|
247252
|
+
const url = apiGroup === catalog_common_1.default.types.controller.KubernetesApiGroup
|
|
247253
|
+
? `${kc.getCurrentCluster().server}/api/v1/namespaces/${itemPath}`
|
|
247254
|
+
: `${kc.getCurrentCluster().server}/apis/${apiGroup}/${apiVersion}/namespaces/${itemPath}`;
|
|
247255
|
+
const r = await fetch(url, { method: 'get', headers: opts.headers });
|
|
247256
|
+
if (!r.ok) {
|
|
247257
|
+
const err = new Error(`Error on getItemByItemPath: ${itemPath}: ${r.statusText}`);
|
|
247258
|
+
console.log(err.stack);
|
|
247259
|
+
throw err;
|
|
247260
|
+
}
|
|
247261
|
+
return r.json();
|
|
247262
|
+
}
|
|
247263
|
+
catch (e) {
|
|
247264
|
+
console.dir(e, { depth: null });
|
|
247265
|
+
throw e;
|
|
247237
247266
|
}
|
|
247238
|
-
return r.json();
|
|
247239
247267
|
}
|
|
247240
247268
|
exports.getItemByItemPath = getItemByItemPath;
|
|
247241
247269
|
async function writeManifest(kind, namespace, item, apiSlug) {
|
|
@@ -249286,6 +249314,101 @@ function fWait(segs = 1) {
|
|
|
249286
249314
|
}
|
|
249287
249315
|
|
|
249288
249316
|
|
|
249317
|
+
/***/ }),
|
|
249318
|
+
|
|
249319
|
+
/***/ 49262:
|
|
249320
|
+
/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) {
|
|
249321
|
+
|
|
249322
|
+
"use strict";
|
|
249323
|
+
|
|
249324
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
249325
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
249326
|
+
};
|
|
249327
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
249328
|
+
exports.tfWorkspacePlan = void 0;
|
|
249329
|
+
const github_1 = __importDefault(__nccwpck_require__(39759));
|
|
249330
|
+
const catalog_common_1 = __importDefault(__nccwpck_require__(74100));
|
|
249331
|
+
const resolver_1 = __nccwpck_require__(31022);
|
|
249332
|
+
const ctl_1 = __nccwpck_require__(46679);
|
|
249333
|
+
const terraform_provisioner_1 = __nccwpck_require__(6777);
|
|
249334
|
+
const process_operation_1 = __nccwpck_require__(3937);
|
|
249335
|
+
const user_feedback_ops_1 = __nccwpck_require__(704);
|
|
249336
|
+
var FileStatus;
|
|
249337
|
+
(function (FileStatus) {
|
|
249338
|
+
FileStatus["DELETED"] = "removed";
|
|
249339
|
+
FileStatus["ADDED"] = "added";
|
|
249340
|
+
FileStatus["MODIFIED"] = "modified";
|
|
249341
|
+
})(FileStatus || (FileStatus = {}));
|
|
249342
|
+
function fDebug(message, level = 'info') {
|
|
249343
|
+
console.log(JSON.stringify({ message, level }));
|
|
249344
|
+
}
|
|
249345
|
+
async function tfWorkspacePlan(opts) {
|
|
249346
|
+
const { repo, owner, prNumber, namespace, ref } = opts;
|
|
249347
|
+
const pull = `${owner}/${repo}#${prNumber}`;
|
|
249348
|
+
let cr = null;
|
|
249349
|
+
try {
|
|
249350
|
+
fDebug(`Starting plan for ${pull}`, 'info');
|
|
249351
|
+
await (0, ctl_1.addPlanStatusCheck)(pull, 'Terraform plan in progress...');
|
|
249352
|
+
fDebug(`Getting PR ${prNumber} in ${repo}`, 'info');
|
|
249353
|
+
const resp = await github_1.default.pulls.getPrFiles(prNumber, repo, owner);
|
|
249354
|
+
const { data } = resp;
|
|
249355
|
+
if (data.length !== 1) {
|
|
249356
|
+
throw new Error(`One file expected in PR ${opts.prNumber} in ${opts.repo}, but found ${data.length}`);
|
|
249357
|
+
}
|
|
249358
|
+
const [file] = data;
|
|
249359
|
+
if (!file) {
|
|
249360
|
+
throw new Error(`No data found for PR ${opts.prNumber} in ${opts.repo}`);
|
|
249361
|
+
}
|
|
249362
|
+
const { filename, status } = file;
|
|
249363
|
+
let content = '';
|
|
249364
|
+
fDebug(`Getting content for ${filename} in ${repo}`);
|
|
249365
|
+
if (status === FileStatus.DELETED) {
|
|
249366
|
+
content = await github_1.default.repo.getContent(filename, repo, owner);
|
|
249367
|
+
}
|
|
249368
|
+
else if (status === FileStatus.ADDED || status === FileStatus.MODIFIED) {
|
|
249369
|
+
content = await github_1.default.repo.getContent(filename, repo, owner, ref);
|
|
249370
|
+
}
|
|
249371
|
+
else {
|
|
249372
|
+
throw new Error(`Unknown status ${status} for file ${filename} in PR ${opts.prNumber} in ${opts.repo}`);
|
|
249373
|
+
}
|
|
249374
|
+
cr = catalog_common_1.default.io.fromYaml(content);
|
|
249375
|
+
if (cr.kind !== 'FirestartrTerraformWorkspace') {
|
|
249376
|
+
throw new Error(`No FirestartrTerraformWorkspace found in PR ${opts.prNumber} in ${opts.repo}`);
|
|
249377
|
+
}
|
|
249378
|
+
fDebug('Resolving references');
|
|
249379
|
+
const deps = await (0, resolver_1.resolve)(cr, ctl_1.getItemByItemPath, ctl_1.getSecret, namespace);
|
|
249380
|
+
fDebug('Building context');
|
|
249381
|
+
const ctx = await (0, process_operation_1.buildProvisionerContext)(cr, deps);
|
|
249382
|
+
fDebug('Context built');
|
|
249383
|
+
const command = getCommandByStatus(status);
|
|
249384
|
+
fDebug('Running terraform provisioner');
|
|
249385
|
+
const tfOutput = await (0, terraform_provisioner_1.runTerraformProvisioner)(ctx, command);
|
|
249386
|
+
fDebug('Terraform provisioner finished');
|
|
249387
|
+
fDebug('Publishing plan');
|
|
249388
|
+
await (0, user_feedback_ops_1.publishPlan)(cr, tfOutput, prNumber, repo, owner);
|
|
249389
|
+
await (0, ctl_1.addPlanStatusCheck)(pull, tfOutput, 'completed');
|
|
249390
|
+
}
|
|
249391
|
+
catch (e) {
|
|
249392
|
+
fDebug(`Error: ${e}`, 'error');
|
|
249393
|
+
await (0, ctl_1.addPlanStatusCheck)(pull, e, 'completed', true);
|
|
249394
|
+
fDebug('Publishing plan');
|
|
249395
|
+
await (0, user_feedback_ops_1.publishPlan)(cr, e, prNumber, repo, owner);
|
|
249396
|
+
}
|
|
249397
|
+
}
|
|
249398
|
+
exports.tfWorkspacePlan = tfWorkspacePlan;
|
|
249399
|
+
function getCommandByStatus(status) {
|
|
249400
|
+
switch (status) {
|
|
249401
|
+
case FileStatus.MODIFIED:
|
|
249402
|
+
case FileStatus.ADDED:
|
|
249403
|
+
return 'plan';
|
|
249404
|
+
case FileStatus.DELETED:
|
|
249405
|
+
return 'plan-destroy';
|
|
249406
|
+
default:
|
|
249407
|
+
throw new Error(`Unknown status: ${status}`);
|
|
249408
|
+
}
|
|
249409
|
+
}
|
|
249410
|
+
|
|
249411
|
+
|
|
249289
249412
|
/***/ }),
|
|
249290
249413
|
|
|
249291
249414
|
/***/ 79980:
|
|
@@ -250877,7 +251000,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
250877
251000
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
250878
251001
|
};
|
|
250879
251002
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
250880
|
-
exports.publishError = exports.tryPublishError = exports.tryCreateErrorSummary = exports.publishApply = exports.tryPublishDestroy = exports.tryPublishApply = void 0;
|
|
251003
|
+
exports.publishPlan = exports.publishError = exports.tryPublishError = exports.tryCreateErrorSummary = exports.publishApply = exports.tryPublishDestroy = exports.tryPublishApply = void 0;
|
|
250881
251004
|
const github_1 = __importDefault(__nccwpck_require__(39759));
|
|
250882
251005
|
const debug_1 = __importDefault(__nccwpck_require__(67984));
|
|
250883
251006
|
const log = (0, debug_1.default)('firestartr:operator:terraform');
|
|
@@ -251009,6 +251132,32 @@ ${message}
|
|
|
251009
251132
|
await github_1.default.pulls.commentInPR(comment, parseInt(prNumber), repo, org);
|
|
251010
251133
|
}
|
|
251011
251134
|
exports.publishError = publishError;
|
|
251135
|
+
async function publishPlan(item, planOutput, prNumber, repo, org) {
|
|
251136
|
+
try {
|
|
251137
|
+
const dividedOutput = github_1.default.pulls.divideCommentIntoChunks(planOutput, 250);
|
|
251138
|
+
let currentCommentNo = 1;
|
|
251139
|
+
dividedOutput.forEach(async (commentContent) => {
|
|
251140
|
+
const comment = `<h1>
|
|
251141
|
+
<img width="25" src="https://static-00.iconduck.com/assets.00/file-type-terraform-icon-1821x2048-mbxeegff.png"> Terraform plan
|
|
251142
|
+
</h1>
|
|
251143
|
+
<p><b>TFWorkspace: </b>${item.metadata.name}</p>
|
|
251144
|
+
|
|
251145
|
+
<details id=github>
|
|
251146
|
+
<summary>PLAN LOGS ${dividedOutput.length > 1 ? '(Part ' + currentCommentNo + ')' : ''}</summary>
|
|
251147
|
+
|
|
251148
|
+
\`\`\`shell
|
|
251149
|
+
${commentContent}
|
|
251150
|
+
\`\`\`
|
|
251151
|
+
</details>`;
|
|
251152
|
+
await github_1.default.pulls.commentInPR(comment, prNumber, repo, org);
|
|
251153
|
+
currentCommentNo += 1;
|
|
251154
|
+
});
|
|
251155
|
+
}
|
|
251156
|
+
catch (e) {
|
|
251157
|
+
console.error(e);
|
|
251158
|
+
}
|
|
251159
|
+
}
|
|
251160
|
+
exports.publishPlan = publishPlan;
|
|
251012
251161
|
|
|
251013
251162
|
|
|
251014
251163
|
/***/ }),
|
|
@@ -284107,8 +284256,13 @@ const SafeEval = {
|
|
|
284107
284256
|
return ast.value;
|
|
284108
284257
|
},
|
|
284109
284258
|
evalMemberExpression(ast, subs) {
|
|
284110
|
-
const prop =
|
|
284111
|
-
:
|
|
284259
|
+
const prop = String(
|
|
284260
|
+
// NOTE: `String(value)` throws error when
|
|
284261
|
+
// value has overwritten the toString method to return non-string
|
|
284262
|
+
// i.e. `value = {toString: () => []}`
|
|
284263
|
+
ast.computed ? SafeEval.evalAst(ast.property) // `object[property]`
|
|
284264
|
+
: ast.property.name // `object.property` property is Identifier
|
|
284265
|
+
);
|
|
284112
284266
|
const obj = SafeEval.evalAst(ast.object, subs);
|
|
284113
284267
|
if (obj === undefined || obj === null) {
|
|
284114
284268
|
throw TypeError(`Cannot read properties of ${obj} (reading '${prop}')`);
|
|
@@ -284885,7 +285039,7 @@ Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{val
|
|
|
284885
285039
|
|
|
284886
285040
|
/***/ }),
|
|
284887
285041
|
|
|
284888
|
-
/***/
|
|
285042
|
+
/***/ 91188:
|
|
284889
285043
|
/***/ ((__unused_webpack___webpack_module__, __webpack_exports__, __nccwpck_require__) => {
|
|
284890
285044
|
|
|
284891
285045
|
"use strict";
|
|
@@ -284925,8 +285079,10 @@ __nccwpck_require__.d(__webpack_exports__, {
|
|
|
284925
285079
|
"genericGrantRequest": () => (/* binding */ genericGrantRequest),
|
|
284926
285080
|
"getDPoPHandle": () => (/* binding */ getDPoPHandle),
|
|
284927
285081
|
"getJwksCache": () => (/* binding */ getJwksCache),
|
|
285082
|
+
"initiateBackchannelAuthentication": () => (/* binding */ initiateBackchannelAuthentication),
|
|
284928
285083
|
"initiateDeviceAuthorization": () => (/* binding */ initiateDeviceAuthorization),
|
|
284929
285084
|
"modifyAssertion": () => (/* binding */ build_modifyAssertion),
|
|
285085
|
+
"pollBackchannelAuthenticationGrant": () => (/* binding */ pollBackchannelAuthenticationGrant),
|
|
284930
285086
|
"pollDeviceAuthorizationGrant": () => (/* binding */ pollDeviceAuthorizationGrant),
|
|
284931
285087
|
"randomDPoPKeyPair": () => (/* binding */ randomDPoPKeyPair),
|
|
284932
285088
|
"randomNonce": () => (/* binding */ randomNonce),
|
|
@@ -284946,7 +285102,7 @@ __nccwpck_require__.d(__webpack_exports__, {
|
|
|
284946
285102
|
let USER_AGENT;
|
|
284947
285103
|
if (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {
|
|
284948
285104
|
const NAME = 'oauth4webapi';
|
|
284949
|
-
const VERSION = 'v3.1
|
|
285105
|
+
const VERSION = 'v3.3.1';
|
|
284950
285106
|
USER_AGENT = `${NAME}/${VERSION}`;
|
|
284951
285107
|
}
|
|
284952
285108
|
function looseInstanceOf(input, expected) {
|
|
@@ -284975,11 +285131,11 @@ const customFetch = Symbol();
|
|
|
284975
285131
|
const modifyAssertion = Symbol();
|
|
284976
285132
|
const jweDecrypt = Symbol();
|
|
284977
285133
|
const build_jwksCache = Symbol();
|
|
284978
|
-
const
|
|
285134
|
+
const build_encoder = new TextEncoder();
|
|
284979
285135
|
const decoder = new TextDecoder();
|
|
284980
285136
|
function buf(input) {
|
|
284981
285137
|
if (typeof input === 'string') {
|
|
284982
|
-
return
|
|
285138
|
+
return build_encoder.encode(input);
|
|
284983
285139
|
}
|
|
284984
285140
|
return decoder.decode(input);
|
|
284985
285141
|
}
|
|
@@ -285007,7 +285163,7 @@ function decodeBase64Url(input) {
|
|
|
285007
285163
|
throw CodedTypeError('The input to be decoded is not correctly encoded.', ERR_INVALID_ARG_VALUE, cause);
|
|
285008
285164
|
}
|
|
285009
285165
|
}
|
|
285010
|
-
function
|
|
285166
|
+
function build_b64u(input) {
|
|
285011
285167
|
if (typeof input === 'string') {
|
|
285012
285168
|
return decodeBase64Url(input);
|
|
285013
285169
|
}
|
|
@@ -285166,12 +285322,12 @@ async function processDiscoveryResponse(expectedIssuerIdentifier, response) {
|
|
|
285166
285322
|
throw OPE('"response" is not a conform Authorization Server Metadata response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
285167
285323
|
}
|
|
285168
285324
|
assertReadableResponse(response);
|
|
285169
|
-
assertApplicationJson(response);
|
|
285170
285325
|
let json;
|
|
285171
285326
|
try {
|
|
285172
285327
|
json = await response.json();
|
|
285173
285328
|
}
|
|
285174
285329
|
catch (cause) {
|
|
285330
|
+
assertApplicationJson(response);
|
|
285175
285331
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
285176
285332
|
}
|
|
285177
285333
|
if (!isJsonObject(json)) {
|
|
@@ -285212,7 +285368,7 @@ function assertContentType(response, contentType) {
|
|
|
285212
285368
|
}
|
|
285213
285369
|
}
|
|
285214
285370
|
function randomBytes() {
|
|
285215
|
-
return
|
|
285371
|
+
return build_b64u(crypto.getRandomValues(new Uint8Array(32)));
|
|
285216
285372
|
}
|
|
285217
285373
|
function generateRandomCodeVerifier() {
|
|
285218
285374
|
return randomBytes();
|
|
@@ -285225,7 +285381,7 @@ function generateRandomNonce() {
|
|
|
285225
285381
|
}
|
|
285226
285382
|
async function calculatePKCECodeChallenge(codeVerifier) {
|
|
285227
285383
|
assertString(codeVerifier, 'codeVerifier');
|
|
285228
|
-
return
|
|
285384
|
+
return build_b64u(await crypto.subtle.digest('SHA-256', buf(codeVerifier)));
|
|
285229
285385
|
}
|
|
285230
285386
|
function getKeyAndKid(input) {
|
|
285231
285387
|
if (input instanceof CryptoKey) {
|
|
@@ -285391,11 +285547,11 @@ function ClientSecretJwt(clientSecret, options) {
|
|
|
285391
285547
|
const header = { alg: 'HS256' };
|
|
285392
285548
|
const payload = clientAssertionPayload(as, client);
|
|
285393
285549
|
modify?.(header, payload);
|
|
285394
|
-
const data = `${
|
|
285550
|
+
const data = `${build_b64u(buf(JSON.stringify(header)))}.${build_b64u(buf(JSON.stringify(payload)))}`;
|
|
285395
285551
|
const hmac = await crypto.subtle.sign(key.algorithm, key, buf(data));
|
|
285396
285552
|
body.set('client_id', client.client_id);
|
|
285397
285553
|
body.set('client_assertion_type', 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer');
|
|
285398
|
-
body.set('client_assertion', `${data}.${
|
|
285554
|
+
body.set('client_assertion', `${data}.${build_b64u(new Uint8Array(hmac))}`);
|
|
285399
285555
|
};
|
|
285400
285556
|
}
|
|
285401
285557
|
function None() {
|
|
@@ -285410,8 +285566,8 @@ async function signJwt(header, payload, key) {
|
|
|
285410
285566
|
if (!key.usages.includes('sign')) {
|
|
285411
285567
|
throw CodedTypeError('CryptoKey instances used for signing assertions must include "sign" in their "usages"', ERR_INVALID_ARG_VALUE);
|
|
285412
285568
|
}
|
|
285413
|
-
const input = `${
|
|
285414
|
-
const signature =
|
|
285569
|
+
const input = `${build_b64u(buf(JSON.stringify(header)))}.${build_b64u(buf(JSON.stringify(payload)))}`;
|
|
285570
|
+
const signature = build_b64u(await crypto.subtle.sign(keyToSubtle(key), key, buf(input)));
|
|
285415
285571
|
return `${input}.${signature}`;
|
|
285416
285572
|
}
|
|
285417
285573
|
async function issueRequestObject(as, client, parameters, privateKey, options) {
|
|
@@ -285547,6 +285703,7 @@ class DPoPHandler {
|
|
|
285547
285703
|
#clockSkew;
|
|
285548
285704
|
#modifyAssertion;
|
|
285549
285705
|
#map;
|
|
285706
|
+
#jkt;
|
|
285550
285707
|
constructor(client, keyPair, options) {
|
|
285551
285708
|
assertPrivateKey(keyPair?.privateKey, '"DPoP.privateKey"');
|
|
285552
285709
|
assertPublicKey(keyPair?.publicKey, '"DPoP.publicKey"');
|
|
@@ -285576,6 +285733,27 @@ class DPoPHandler {
|
|
|
285576
285733
|
}
|
|
285577
285734
|
this.#map.set(key, val);
|
|
285578
285735
|
}
|
|
285736
|
+
async calculateThumbprint() {
|
|
285737
|
+
if (!this.#jkt) {
|
|
285738
|
+
const jwk = await crypto.subtle.exportKey('jwk', this.#publicKey);
|
|
285739
|
+
let components;
|
|
285740
|
+
switch (jwk.kty) {
|
|
285741
|
+
case 'EC':
|
|
285742
|
+
components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x, y: jwk.y };
|
|
285743
|
+
break;
|
|
285744
|
+
case 'OKP':
|
|
285745
|
+
components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x };
|
|
285746
|
+
break;
|
|
285747
|
+
case 'RSA':
|
|
285748
|
+
components = { e: jwk.e, kty: jwk.kty, n: jwk.n };
|
|
285749
|
+
break;
|
|
285750
|
+
default:
|
|
285751
|
+
throw new UnsupportedOperationError('unsupported JWK', { cause: { jwk } });
|
|
285752
|
+
}
|
|
285753
|
+
this.#jkt ||= build_b64u(await crypto.subtle.digest({ name: 'SHA-256' }, buf(JSON.stringify(components))));
|
|
285754
|
+
}
|
|
285755
|
+
return this.#jkt;
|
|
285756
|
+
}
|
|
285579
285757
|
async addProof(url, headers, htm, accessToken) {
|
|
285580
285758
|
this.#header ||= {
|
|
285581
285759
|
alg: keyToJws(this.#privateKey),
|
|
@@ -285590,7 +285768,7 @@ class DPoPHandler {
|
|
|
285590
285768
|
htm,
|
|
285591
285769
|
nonce,
|
|
285592
285770
|
htu: `${url.origin}${url.pathname}`,
|
|
285593
|
-
ath: accessToken ?
|
|
285771
|
+
ath: accessToken ? build_b64u(await crypto.subtle.digest('SHA-256', buf(accessToken))) : undefined,
|
|
285594
285772
|
};
|
|
285595
285773
|
this.#modifyAssertion?.(this.#header, payload);
|
|
285596
285774
|
headers.set('dpop', await signJwt(this.#header, payload, this.#privateKey));
|
|
@@ -285732,28 +285910,15 @@ async function processPushedAuthorizationResponse(as, client, response) {
|
|
|
285732
285910
|
if (!looseInstanceOf(response, Response)) {
|
|
285733
285911
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
285734
285912
|
}
|
|
285735
|
-
|
|
285736
|
-
|
|
285737
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
285738
|
-
}
|
|
285739
|
-
if (response.status !== 201) {
|
|
285740
|
-
let err;
|
|
285741
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
285742
|
-
await response.body?.cancel();
|
|
285743
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
285744
|
-
cause: err,
|
|
285745
|
-
response,
|
|
285746
|
-
});
|
|
285747
|
-
}
|
|
285748
|
-
throw OPE('"response" is not a conform Pushed Authorization Request Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
285749
|
-
}
|
|
285913
|
+
checkAuthenticationChallenges(response);
|
|
285914
|
+
await checkOAuthBodyError(response, 201, 'Pushed Authorization Request Endpoint');
|
|
285750
285915
|
assertReadableResponse(response);
|
|
285751
|
-
assertApplicationJson(response);
|
|
285752
285916
|
let json;
|
|
285753
285917
|
try {
|
|
285754
285918
|
json = await response.json();
|
|
285755
285919
|
}
|
|
285756
285920
|
catch (cause) {
|
|
285921
|
+
assertApplicationJson(response);
|
|
285757
285922
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
285758
285923
|
}
|
|
285759
285924
|
if (!isJsonObject(json)) {
|
|
@@ -285769,6 +285934,33 @@ async function processPushedAuthorizationResponse(as, client, response) {
|
|
|
285769
285934
|
json.expires_in = expiresIn;
|
|
285770
285935
|
return json;
|
|
285771
285936
|
}
|
|
285937
|
+
async function parseOAuthResponseErrorBody(response) {
|
|
285938
|
+
if (response.status > 399 && response.status < 500) {
|
|
285939
|
+
assertReadableResponse(response);
|
|
285940
|
+
assertApplicationJson(response);
|
|
285941
|
+
try {
|
|
285942
|
+
const json = await response.clone().json();
|
|
285943
|
+
if (isJsonObject(json) && typeof json.error === 'string' && json.error.length) {
|
|
285944
|
+
return json;
|
|
285945
|
+
}
|
|
285946
|
+
}
|
|
285947
|
+
catch { }
|
|
285948
|
+
}
|
|
285949
|
+
return undefined;
|
|
285950
|
+
}
|
|
285951
|
+
async function checkOAuthBodyError(response, expected, label) {
|
|
285952
|
+
if (response.status !== expected) {
|
|
285953
|
+
let err;
|
|
285954
|
+
if ((err = await parseOAuthResponseErrorBody(response))) {
|
|
285955
|
+
await response.body?.cancel();
|
|
285956
|
+
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
285957
|
+
cause: err,
|
|
285958
|
+
response,
|
|
285959
|
+
});
|
|
285960
|
+
}
|
|
285961
|
+
throw OPE(`"response" is not a conform ${label} response (unexpected HTTP status code)`, RESPONSE_IS_NOT_CONFORM, response);
|
|
285962
|
+
}
|
|
285963
|
+
}
|
|
285772
285964
|
function assertDPoP(option) {
|
|
285773
285965
|
if (!branded.has(option)) {
|
|
285774
285966
|
throw CodedTypeError('"options.DPoP" is not a valid DPoPHandle', ERR_INVALID_ARG_VALUE);
|
|
@@ -285800,13 +285992,9 @@ async function resourceRequest(accessToken, method, url, headers, body, options)
|
|
|
285800
285992
|
return response;
|
|
285801
285993
|
}
|
|
285802
285994
|
async function protectedResourceRequest(accessToken, method, url, headers, body, options) {
|
|
285803
|
-
|
|
285804
|
-
|
|
285805
|
-
|
|
285806
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
285807
|
-
}
|
|
285808
|
-
return response;
|
|
285809
|
-
});
|
|
285995
|
+
const response = await resourceRequest(accessToken, method, url, headers, body, options);
|
|
285996
|
+
checkAuthenticationChallenges(response);
|
|
285997
|
+
return response;
|
|
285810
285998
|
}
|
|
285811
285999
|
async function userInfoRequest(as, client, accessToken, options) {
|
|
285812
286000
|
assertAs(as);
|
|
@@ -285944,10 +286132,7 @@ async function processUserInfoResponse(as, client, expectedSubject, response, op
|
|
|
285944
286132
|
if (!looseInstanceOf(response, Response)) {
|
|
285945
286133
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
285946
286134
|
}
|
|
285947
|
-
|
|
285948
|
-
if ((challenges = parseWwwAuthenticateChallenges(response))) {
|
|
285949
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
285950
|
-
}
|
|
286135
|
+
checkAuthenticationChallenges(response);
|
|
285951
286136
|
if (response.status !== 200) {
|
|
285952
286137
|
throw OPE('"response" is not a conform UserInfo Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
285953
286138
|
}
|
|
@@ -285964,11 +286149,11 @@ async function processUserInfoResponse(as, client, expectedSubject, response, op
|
|
|
285964
286149
|
if (client.userinfo_signed_response_alg) {
|
|
285965
286150
|
throw OPE('JWT UserInfo Response expected', JWT_USERINFO_EXPECTED, response);
|
|
285966
286151
|
}
|
|
285967
|
-
assertApplicationJson(response);
|
|
285968
286152
|
try {
|
|
285969
286153
|
json = await response.json();
|
|
285970
286154
|
}
|
|
285971
286155
|
catch (cause) {
|
|
286156
|
+
assertApplicationJson(response);
|
|
285972
286157
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
285973
286158
|
}
|
|
285974
286159
|
}
|
|
@@ -286041,13 +286226,13 @@ async function validateApplicationLevelSignature(as, ref, options) {
|
|
|
286041
286226
|
throw CodedTypeError('"ref" does not contain a processed JWT Response to verify the signature of', ERR_INVALID_ARG_VALUE);
|
|
286042
286227
|
}
|
|
286043
286228
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwtRefs.get(ref).split('.');
|
|
286044
|
-
const header = JSON.parse(buf(
|
|
286229
|
+
const header = JSON.parse(buf(build_b64u(protectedHeader)));
|
|
286045
286230
|
if (header.alg.startsWith('HS')) {
|
|
286046
286231
|
throw new UnsupportedOperationError('unsupported JWS algorithm', { cause: { alg: header.alg } });
|
|
286047
286232
|
}
|
|
286048
286233
|
let key;
|
|
286049
286234
|
key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
286050
|
-
await validateJwsSignature(protectedHeader, payload, key,
|
|
286235
|
+
await validateJwsSignature(protectedHeader, payload, key, build_b64u(encodedSignature));
|
|
286051
286236
|
}
|
|
286052
286237
|
async function processGenericAccessTokenResponse(as, client, response, additionalRequiredIdTokenClaims, options) {
|
|
286053
286238
|
assertAs(as);
|
|
@@ -286055,28 +286240,15 @@ async function processGenericAccessTokenResponse(as, client, response, additiona
|
|
|
286055
286240
|
if (!looseInstanceOf(response, Response)) {
|
|
286056
286241
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
286057
286242
|
}
|
|
286058
|
-
|
|
286059
|
-
|
|
286060
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286061
|
-
}
|
|
286062
|
-
if (response.status !== 200) {
|
|
286063
|
-
let err;
|
|
286064
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
286065
|
-
await response.body?.cancel();
|
|
286066
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
286067
|
-
cause: err,
|
|
286068
|
-
response,
|
|
286069
|
-
});
|
|
286070
|
-
}
|
|
286071
|
-
throw OPE('"response" is not a conform Token Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286072
|
-
}
|
|
286243
|
+
checkAuthenticationChallenges(response);
|
|
286244
|
+
await checkOAuthBodyError(response, 200, 'Token Endpoint');
|
|
286073
286245
|
assertReadableResponse(response);
|
|
286074
|
-
assertApplicationJson(response);
|
|
286075
286246
|
let json;
|
|
286076
286247
|
try {
|
|
286077
286248
|
json = await response.json();
|
|
286078
286249
|
}
|
|
286079
286250
|
catch (cause) {
|
|
286251
|
+
assertApplicationJson(response);
|
|
286080
286252
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
286081
286253
|
}
|
|
286082
286254
|
if (!isJsonObject(json)) {
|
|
@@ -286142,6 +286314,12 @@ async function processGenericAccessTokenResponse(as, client, response, additiona
|
|
|
286142
286314
|
}
|
|
286143
286315
|
return json;
|
|
286144
286316
|
}
|
|
286317
|
+
function checkAuthenticationChallenges(response) {
|
|
286318
|
+
let challenges;
|
|
286319
|
+
if ((challenges = parseWwwAuthenticateChallenges(response))) {
|
|
286320
|
+
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286321
|
+
}
|
|
286322
|
+
}
|
|
286145
286323
|
async function processRefreshTokenResponse(as, client, response, options) {
|
|
286146
286324
|
return processGenericAccessTokenResponse(as, client, response, undefined, options);
|
|
286147
286325
|
}
|
|
@@ -286384,21 +286562,8 @@ async function processRevocationResponse(response) {
|
|
|
286384
286562
|
if (!looseInstanceOf(response, Response)) {
|
|
286385
286563
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
286386
286564
|
}
|
|
286387
|
-
|
|
286388
|
-
|
|
286389
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286390
|
-
}
|
|
286391
|
-
if (response.status !== 200) {
|
|
286392
|
-
let err;
|
|
286393
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
286394
|
-
await response.body?.cancel();
|
|
286395
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
286396
|
-
cause: err,
|
|
286397
|
-
response,
|
|
286398
|
-
});
|
|
286399
|
-
}
|
|
286400
|
-
throw OPE('"response" is not a conform Revocation Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286401
|
-
}
|
|
286565
|
+
checkAuthenticationChallenges(response);
|
|
286566
|
+
await checkOAuthBodyError(response, 200, 'Revocation Endpoint');
|
|
286402
286567
|
return undefined;
|
|
286403
286568
|
}
|
|
286404
286569
|
function assertReadableResponse(response) {
|
|
@@ -286428,21 +286593,8 @@ async function processIntrospectionResponse(as, client, response, options) {
|
|
|
286428
286593
|
if (!looseInstanceOf(response, Response)) {
|
|
286429
286594
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
286430
286595
|
}
|
|
286431
|
-
|
|
286432
|
-
|
|
286433
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
286434
|
-
}
|
|
286435
|
-
if (response.status !== 200) {
|
|
286436
|
-
let err;
|
|
286437
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
286438
|
-
await response.body?.cancel();
|
|
286439
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
286440
|
-
cause: err,
|
|
286441
|
-
response,
|
|
286442
|
-
});
|
|
286443
|
-
}
|
|
286444
|
-
throw OPE('"response" is not a conform Introspection Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286445
|
-
}
|
|
286596
|
+
checkAuthenticationChallenges(response);
|
|
286597
|
+
await checkOAuthBodyError(response, 200, 'Introspection Endpoint');
|
|
286446
286598
|
let json;
|
|
286447
286599
|
if (getContentType(response) === 'application/token-introspection+jwt') {
|
|
286448
286600
|
assertReadableResponse(response);
|
|
@@ -286461,11 +286613,11 @@ async function processIntrospectionResponse(as, client, response, options) {
|
|
|
286461
286613
|
}
|
|
286462
286614
|
else {
|
|
286463
286615
|
assertReadableResponse(response);
|
|
286464
|
-
assertApplicationJson(response);
|
|
286465
286616
|
try {
|
|
286466
286617
|
json = await response.json();
|
|
286467
286618
|
}
|
|
286468
286619
|
catch (cause) {
|
|
286620
|
+
assertApplicationJson(response);
|
|
286469
286621
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
286470
286622
|
}
|
|
286471
286623
|
if (!isJsonObject(json)) {
|
|
@@ -286501,12 +286653,12 @@ async function processJwksResponse(response) {
|
|
|
286501
286653
|
throw OPE('"response" is not a conform JSON Web Key Set response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
286502
286654
|
}
|
|
286503
286655
|
assertReadableResponse(response);
|
|
286504
|
-
assertContentTypes(response, 'application/json', 'application/jwk-set+json');
|
|
286505
286656
|
let json;
|
|
286506
286657
|
try {
|
|
286507
286658
|
json = await response.json();
|
|
286508
286659
|
}
|
|
286509
286660
|
catch (cause) {
|
|
286661
|
+
assertContentTypes(response, 'application/json', 'application/jwk-set+json');
|
|
286510
286662
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
286511
286663
|
}
|
|
286512
286664
|
if (!isJsonObject(json)) {
|
|
@@ -286520,21 +286672,7 @@ async function processJwksResponse(response) {
|
|
|
286520
286672
|
}
|
|
286521
286673
|
return json;
|
|
286522
286674
|
}
|
|
286523
|
-
|
|
286524
|
-
if (response.status > 399 && response.status < 500) {
|
|
286525
|
-
assertReadableResponse(response);
|
|
286526
|
-
assertApplicationJson(response);
|
|
286527
|
-
try {
|
|
286528
|
-
const json = await response.clone().json();
|
|
286529
|
-
if (isJsonObject(json) && typeof json.error === 'string' && json.error.length) {
|
|
286530
|
-
return json;
|
|
286531
|
-
}
|
|
286532
|
-
}
|
|
286533
|
-
catch { }
|
|
286534
|
-
}
|
|
286535
|
-
return undefined;
|
|
286536
|
-
}
|
|
286537
|
-
function build_supported(alg) {
|
|
286675
|
+
function supported(alg) {
|
|
286538
286676
|
switch (alg) {
|
|
286539
286677
|
case 'PS256':
|
|
286540
286678
|
case 'ES256':
|
|
@@ -286553,7 +286691,7 @@ function build_supported(alg) {
|
|
|
286553
286691
|
}
|
|
286554
286692
|
}
|
|
286555
286693
|
function checkSupportedJwsAlg(header) {
|
|
286556
|
-
if (!
|
|
286694
|
+
if (!supported(header.alg)) {
|
|
286557
286695
|
throw new UnsupportedOperationError('unsupported JWS "alg" identifier', {
|
|
286558
286696
|
cause: { alg: header.alg },
|
|
286559
286697
|
});
|
|
@@ -286639,7 +286777,7 @@ async function validateJwt(jws, checkAlg, clockSkew, clockTolerance, decryptJwt)
|
|
|
286639
286777
|
}
|
|
286640
286778
|
let header;
|
|
286641
286779
|
try {
|
|
286642
|
-
header = JSON.parse(buf(
|
|
286780
|
+
header = JSON.parse(buf(build_b64u(protectedHeader)));
|
|
286643
286781
|
}
|
|
286644
286782
|
catch (cause) {
|
|
286645
286783
|
throw OPE('failed to parse JWT Header body as base64url encoded JSON', PARSE_ERROR, cause);
|
|
@@ -286655,7 +286793,7 @@ async function validateJwt(jws, checkAlg, clockSkew, clockTolerance, decryptJwt)
|
|
|
286655
286793
|
}
|
|
286656
286794
|
let claims;
|
|
286657
286795
|
try {
|
|
286658
|
-
claims = JSON.parse(buf(
|
|
286796
|
+
claims = JSON.parse(buf(build_b64u(payload)));
|
|
286659
286797
|
}
|
|
286660
286798
|
catch (cause) {
|
|
286661
286799
|
throw OPE('failed to parse JWT Payload body as base64url encoded JSON', PARSE_ERROR, cause);
|
|
@@ -286720,7 +286858,7 @@ async function validateJwtAuthResponse(as, client, parameters, expectedState, op
|
|
|
286720
286858
|
.then(validateIssuer.bind(undefined, as))
|
|
286721
286859
|
.then(validateAudience.bind(undefined, client.client_id));
|
|
286722
286860
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwt.split('.');
|
|
286723
|
-
const signature =
|
|
286861
|
+
const signature = build_b64u(encodedSignature);
|
|
286724
286862
|
const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
286725
286863
|
await validateJwsSignature(protectedHeader, payload, key, signature);
|
|
286726
286864
|
const result = new URLSearchParams();
|
|
@@ -286755,7 +286893,7 @@ async function idTokenHash(data, header, claimName) {
|
|
|
286755
286893
|
throw new UnsupportedOperationError(`unsupported JWS algorithm for ${claimName} calculation`, { cause: { alg: header.alg } });
|
|
286756
286894
|
}
|
|
286757
286895
|
const digest = await crypto.subtle.digest(algorithm, buf(data));
|
|
286758
|
-
return
|
|
286896
|
+
return build_b64u(digest.slice(0, digest.byteLength / 2));
|
|
286759
286897
|
}
|
|
286760
286898
|
async function idTokenHashMatches(data, actual, header, claimName) {
|
|
286761
286899
|
const expected = await idTokenHash(data, header, claimName);
|
|
@@ -286886,7 +287024,7 @@ async function validateHybridResponse(as, client, parameters, expectedNonce, exp
|
|
|
286886
287024
|
}
|
|
286887
287025
|
}
|
|
286888
287026
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = jwt.split('.');
|
|
286889
|
-
const signature =
|
|
287027
|
+
const signature = build_b64u(encodedSignature);
|
|
286890
287028
|
const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
286891
287029
|
await validateJwsSignature(protectedHeader, payload, key, signature);
|
|
286892
287030
|
if ((await idTokenHashMatches(code, claims.c_hash, header, 'c_hash')) !== true) {
|
|
@@ -287057,28 +287195,15 @@ async function processDeviceAuthorizationResponse(as, client, response) {
|
|
|
287057
287195
|
if (!looseInstanceOf(response, Response)) {
|
|
287058
287196
|
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
287059
287197
|
}
|
|
287060
|
-
|
|
287061
|
-
|
|
287062
|
-
throw new WWWAuthenticateChallengeError('server responded with a challenge in the WWW-Authenticate HTTP Header', { cause: challenges, response });
|
|
287063
|
-
}
|
|
287064
|
-
if (response.status !== 200) {
|
|
287065
|
-
let err;
|
|
287066
|
-
if ((err = await handleOAuthBodyError(response))) {
|
|
287067
|
-
await response.body?.cancel();
|
|
287068
|
-
throw new ResponseBodyError('server responded with an error in the response body', {
|
|
287069
|
-
cause: err,
|
|
287070
|
-
response,
|
|
287071
|
-
});
|
|
287072
|
-
}
|
|
287073
|
-
throw OPE('"response" is not a conform Device Authorization Endpoint response (unexpected HTTP status code)', RESPONSE_IS_NOT_CONFORM, response);
|
|
287074
|
-
}
|
|
287198
|
+
checkAuthenticationChallenges(response);
|
|
287199
|
+
await checkOAuthBodyError(response, 200, 'Device Authorization Endpoint');
|
|
287075
287200
|
assertReadableResponse(response);
|
|
287076
|
-
assertApplicationJson(response);
|
|
287077
287201
|
let json;
|
|
287078
287202
|
try {
|
|
287079
287203
|
json = await response.json();
|
|
287080
287204
|
}
|
|
287081
287205
|
catch (cause) {
|
|
287206
|
+
assertApplicationJson(response);
|
|
287082
287207
|
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
287083
287208
|
}
|
|
287084
287209
|
if (!isJsonObject(json)) {
|
|
@@ -287149,7 +287274,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287149
287274
|
throw OPE('operation indicated DPoP use but the JWT Access Token has no jkt confirmation claim', INVALID_REQUEST, { claims: accessTokenClaims });
|
|
287150
287275
|
}
|
|
287151
287276
|
const clockSkew = getClockSkew(options);
|
|
287152
|
-
const proof = await validateJwt(headerValue, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined,
|
|
287277
|
+
const proof = await validateJwt(headerValue, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, supported), clockSkew, getClockTolerance(options), undefined)
|
|
287153
287278
|
.then(checkJwtType.bind(undefined, 'dpop+jwt'))
|
|
287154
287279
|
.then(validatePresence.bind(undefined, ['iat', 'jti', 'ath', 'htm', 'htu']));
|
|
287155
287280
|
const now = epochTime() + clockSkew;
|
|
@@ -287177,7 +287302,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287177
287302
|
});
|
|
287178
287303
|
}
|
|
287179
287304
|
{
|
|
287180
|
-
const expected =
|
|
287305
|
+
const expected = build_b64u(await crypto.subtle.digest('SHA-256', buf(accessToken)));
|
|
287181
287306
|
if (proof.claims.ath !== expected) {
|
|
287182
287307
|
throw OPE('DPoP Proof ath mismatch', JWT_CLAIM_COMPARISON, {
|
|
287183
287308
|
expected,
|
|
@@ -287214,7 +287339,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287214
287339
|
default:
|
|
287215
287340
|
throw new UnsupportedOperationError('unsupported JWK key type', { cause: proof.header.jwk });
|
|
287216
287341
|
}
|
|
287217
|
-
const expected =
|
|
287342
|
+
const expected = build_b64u(await crypto.subtle.digest('SHA-256', buf(JSON.stringify(components))));
|
|
287218
287343
|
if (accessTokenClaims.cnf.jkt !== expected) {
|
|
287219
287344
|
throw OPE('JWT Access Token confirmation mismatch', JWT_CLAIM_COMPARISON, {
|
|
287220
287345
|
expected,
|
|
@@ -287224,7 +287349,7 @@ async function validateDPoP(request, accessToken, accessTokenClaims, options) {
|
|
|
287224
287349
|
}
|
|
287225
287350
|
}
|
|
287226
287351
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = headerValue.split('.');
|
|
287227
|
-
const signature =
|
|
287352
|
+
const signature = build_b64u(encodedSignature);
|
|
287228
287353
|
const { jwk, alg } = proof.header;
|
|
287229
287354
|
if (!jwk) {
|
|
287230
287355
|
throw OPE('DPoP Proof is missing the jwk header parameter', INVALID_REQUEST, {
|
|
@@ -287279,7 +287404,7 @@ async function validateJwtAccessToken(as, request, expectedAudience, options) {
|
|
|
287279
287404
|
if (options?.requireDPoP || scheme === 'dpop' || request.headers.has('dpop')) {
|
|
287280
287405
|
requiredClaims.push('cnf');
|
|
287281
287406
|
}
|
|
287282
|
-
const { claims, header } = await validateJwt(accessToken, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined,
|
|
287407
|
+
const { claims, header } = await validateJwt(accessToken, checkSigningAlgorithm.bind(undefined, options?.signingAlgorithms, undefined, supported), getClockSkew(options), getClockTolerance(options), undefined)
|
|
287283
287408
|
.then(checkJwtType.bind(undefined, 'at+jwt'))
|
|
287284
287409
|
.then(validatePresence.bind(undefined, requiredClaims))
|
|
287285
287410
|
.then(validateIssuer.bind(undefined, as))
|
|
@@ -287309,7 +287434,7 @@ async function validateJwtAccessToken(as, request, expectedAudience, options) {
|
|
|
287309
287434
|
}
|
|
287310
287435
|
}
|
|
287311
287436
|
const { 0: protectedHeader, 1: payload, 2: encodedSignature } = accessToken.split('.');
|
|
287312
|
-
const signature =
|
|
287437
|
+
const signature = build_b64u(encodedSignature);
|
|
287313
287438
|
const key = await getPublicSigKeyFromIssuerJwksUri(as, options, header);
|
|
287314
287439
|
await validateJwsSignature(protectedHeader, payload, key, signature);
|
|
287315
287440
|
if (options?.requireDPoP ||
|
|
@@ -287326,25 +287451,71 @@ function reassignRSCode(err) {
|
|
|
287326
287451
|
}
|
|
287327
287452
|
throw err;
|
|
287328
287453
|
}
|
|
287454
|
+
async function backchannelAuthenticationRequest(as, client, clientAuthentication, parameters, options) {
|
|
287455
|
+
assertAs(as);
|
|
287456
|
+
assertClient(client);
|
|
287457
|
+
const url = resolveEndpoint(as, 'backchannel_authentication_endpoint', client.use_mtls_endpoint_aliases, options?.[allowInsecureRequests] !== true);
|
|
287458
|
+
const body = new URLSearchParams(parameters);
|
|
287459
|
+
body.set('client_id', client.client_id);
|
|
287460
|
+
const headers = prepareHeaders(options?.headers);
|
|
287461
|
+
headers.set('accept', 'application/json');
|
|
287462
|
+
return authenticatedRequest(as, client, clientAuthentication, url, body, headers, options);
|
|
287463
|
+
}
|
|
287464
|
+
async function processBackchannelAuthenticationResponse(as, client, response) {
|
|
287465
|
+
assertAs(as);
|
|
287466
|
+
assertClient(client);
|
|
287467
|
+
if (!looseInstanceOf(response, Response)) {
|
|
287468
|
+
throw CodedTypeError('"response" must be an instance of Response', ERR_INVALID_ARG_TYPE);
|
|
287469
|
+
}
|
|
287470
|
+
checkAuthenticationChallenges(response);
|
|
287471
|
+
await checkOAuthBodyError(response, 200, 'Backchannel Authentication Endpoint');
|
|
287472
|
+
assertReadableResponse(response);
|
|
287473
|
+
let json;
|
|
287474
|
+
try {
|
|
287475
|
+
json = await response.json();
|
|
287476
|
+
}
|
|
287477
|
+
catch (cause) {
|
|
287478
|
+
assertApplicationJson(response);
|
|
287479
|
+
throw OPE('failed to parse "response" body as JSON', PARSE_ERROR, cause);
|
|
287480
|
+
}
|
|
287481
|
+
if (!isJsonObject(json)) {
|
|
287482
|
+
throw OPE('"response" body must be a top level object', INVALID_RESPONSE, { body: json });
|
|
287483
|
+
}
|
|
287484
|
+
assertString(json.auth_req_id, '"response" body "auth_req_id" property', INVALID_RESPONSE, {
|
|
287485
|
+
body: json,
|
|
287486
|
+
});
|
|
287487
|
+
let expiresIn = typeof json.expires_in !== 'number' ? parseFloat(json.expires_in) : json.expires_in;
|
|
287488
|
+
assertNumber(expiresIn, false, '"response" body "expires_in" property', INVALID_RESPONSE, {
|
|
287489
|
+
body: json,
|
|
287490
|
+
});
|
|
287491
|
+
json.expires_in = expiresIn;
|
|
287492
|
+
if (json.interval !== undefined) {
|
|
287493
|
+
assertNumber(json.interval, false, '"response" body "interval" property', INVALID_RESPONSE, {
|
|
287494
|
+
body: json,
|
|
287495
|
+
});
|
|
287496
|
+
}
|
|
287497
|
+
return json;
|
|
287498
|
+
}
|
|
287499
|
+
async function backchannelAuthenticationGrantRequest(as, client, clientAuthentication, authReqId, options) {
|
|
287500
|
+
assertAs(as);
|
|
287501
|
+
assertClient(client);
|
|
287502
|
+
assertString(authReqId, '"authReqId"');
|
|
287503
|
+
const parameters = new URLSearchParams(options?.additionalParameters);
|
|
287504
|
+
parameters.set('auth_req_id', authReqId);
|
|
287505
|
+
return tokenEndpointRequest(as, client, clientAuthentication, 'urn:openid:params:grant-type:ciba', parameters, options);
|
|
287506
|
+
}
|
|
287507
|
+
async function processBackchannelAuthenticationGrantResponse(as, client, response, options) {
|
|
287508
|
+
return processGenericAccessTokenResponse(as, client, response, undefined, options);
|
|
287509
|
+
}
|
|
287329
287510
|
const _nopkce = Symbol();
|
|
287330
287511
|
const _nodiscoverycheck = Symbol();
|
|
287331
287512
|
const _expectedIssuer = Symbol();
|
|
287332
287513
|
//# sourceMappingURL=index.js.map
|
|
287333
|
-
|
|
287334
|
-
var external_node_buffer_ = __nccwpck_require__(72254);
|
|
287335
|
-
// EXTERNAL MODULE: external "node:crypto"
|
|
287336
|
-
var external_node_crypto_ = __nccwpck_require__(6005);
|
|
287337
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/digest.js
|
|
287338
|
-
|
|
287339
|
-
const digest = (algorithm, data) => (0,external_node_crypto_.createHash)(algorithm).update(data).digest();
|
|
287340
|
-
/* harmony default export */ const runtime_digest = (digest);
|
|
287341
|
-
|
|
287342
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/buffer_utils.js
|
|
287343
|
-
|
|
287514
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/buffer_utils.js
|
|
287344
287515
|
const buffer_utils_encoder = new TextEncoder();
|
|
287345
287516
|
const buffer_utils_decoder = new TextDecoder();
|
|
287346
287517
|
const MAX_INT32 = 2 ** 32;
|
|
287347
|
-
function
|
|
287518
|
+
function concat(...buffers) {
|
|
287348
287519
|
const size = buffers.reduce((acc, { length }) => acc + length, 0);
|
|
287349
287520
|
const buf = new Uint8Array(size);
|
|
287350
287521
|
let i = 0;
|
|
@@ -287354,9 +287525,6 @@ function buffer_utils_concat(...buffers) {
|
|
|
287354
287525
|
}
|
|
287355
287526
|
return buf;
|
|
287356
287527
|
}
|
|
287357
|
-
function buffer_utils_p2s(alg, p2sInput) {
|
|
287358
|
-
return buffer_utils_concat(buffer_utils_encoder.encode(alg), new Uint8Array([0]), p2sInput);
|
|
287359
|
-
}
|
|
287360
287528
|
function writeUInt32BE(buf, value, offset) {
|
|
287361
287529
|
if (value < 0 || value >= MAX_INT32) {
|
|
287362
287530
|
throw new RangeError(`value must be >= 0 and <= ${MAX_INT32 - 1}. Received ${value}`);
|
|
@@ -287376,39 +287544,64 @@ function uint32be(value) {
|
|
|
287376
287544
|
writeUInt32BE(buf, value);
|
|
287377
287545
|
return buf;
|
|
287378
287546
|
}
|
|
287379
|
-
|
|
287380
|
-
|
|
287547
|
+
|
|
287548
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/base64.js
|
|
287549
|
+
function base64_encodeBase64(input) {
|
|
287550
|
+
if (Uint8Array.prototype.toBase64) {
|
|
287551
|
+
return input.toBase64();
|
|
287552
|
+
}
|
|
287553
|
+
const CHUNK_SIZE = 0x8000;
|
|
287554
|
+
const arr = [];
|
|
287555
|
+
for (let i = 0; i < input.length; i += CHUNK_SIZE) {
|
|
287556
|
+
arr.push(String.fromCharCode.apply(null, input.subarray(i, i + CHUNK_SIZE)));
|
|
287557
|
+
}
|
|
287558
|
+
return btoa(arr.join(''));
|
|
287381
287559
|
}
|
|
287382
|
-
|
|
287383
|
-
|
|
287384
|
-
|
|
287385
|
-
for (let iter = 0; iter < iterations; iter++) {
|
|
287386
|
-
const buf = new Uint8Array(4 + secret.length + value.length);
|
|
287387
|
-
buf.set(uint32be(iter + 1));
|
|
287388
|
-
buf.set(secret, 4);
|
|
287389
|
-
buf.set(value, 4 + secret.length);
|
|
287390
|
-
res.set(await runtime_digest('sha256', buf), iter * 32);
|
|
287560
|
+
function decodeBase64(encoded) {
|
|
287561
|
+
if (Uint8Array.fromBase64) {
|
|
287562
|
+
return Uint8Array.fromBase64(encoded);
|
|
287391
287563
|
}
|
|
287392
|
-
|
|
287564
|
+
const binary = atob(encoded);
|
|
287565
|
+
const bytes = new Uint8Array(binary.length);
|
|
287566
|
+
for (let i = 0; i < binary.length; i++) {
|
|
287567
|
+
bytes[i] = binary.charCodeAt(i);
|
|
287568
|
+
}
|
|
287569
|
+
return bytes;
|
|
287393
287570
|
}
|
|
287394
287571
|
|
|
287395
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287572
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/util/base64url.js
|
|
287396
287573
|
|
|
287397
287574
|
|
|
287398
|
-
function
|
|
287575
|
+
function decode(input) {
|
|
287576
|
+
if (Uint8Array.fromBase64) {
|
|
287577
|
+
return Uint8Array.fromBase64(typeof input === 'string' ? input : buffer_utils_decoder.decode(input), {
|
|
287578
|
+
alphabet: 'base64url',
|
|
287579
|
+
});
|
|
287580
|
+
}
|
|
287399
287581
|
let encoded = input;
|
|
287400
287582
|
if (encoded instanceof Uint8Array) {
|
|
287401
287583
|
encoded = buffer_utils_decoder.decode(encoded);
|
|
287402
287584
|
}
|
|
287403
|
-
|
|
287585
|
+
encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\s/g, '');
|
|
287586
|
+
try {
|
|
287587
|
+
return decodeBase64(encoded);
|
|
287588
|
+
}
|
|
287589
|
+
catch {
|
|
287590
|
+
throw new TypeError('The input to be decoded is not correctly encoded.');
|
|
287591
|
+
}
|
|
287592
|
+
}
|
|
287593
|
+
function encode(input) {
|
|
287594
|
+
let unencoded = input;
|
|
287595
|
+
if (typeof unencoded === 'string') {
|
|
287596
|
+
unencoded = encoder.encode(unencoded);
|
|
287597
|
+
}
|
|
287598
|
+
if (Uint8Array.prototype.toBase64) {
|
|
287599
|
+
return unencoded.toBase64({ alphabet: 'base64url', omitPadding: true });
|
|
287600
|
+
}
|
|
287601
|
+
return encodeBase64(unencoded).replace(/=/g, '').replace(/\+/g, '-').replace(/\//g, '_');
|
|
287404
287602
|
}
|
|
287405
|
-
const encode = (input) => Buffer.from(input).toString('base64url');
|
|
287406
|
-
const decodeBase64 = (input) => new Uint8Array(Buffer.from(input, 'base64'));
|
|
287407
|
-
const encodeBase64 = (input) => Buffer.from(input).toString('base64');
|
|
287408
|
-
|
|
287409
|
-
const decode = (input) => new Uint8Array(external_node_buffer_.Buffer.from(normalize(input), 'base64url'));
|
|
287410
287603
|
|
|
287411
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287604
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/util/errors.js
|
|
287412
287605
|
class JOSEError extends Error {
|
|
287413
287606
|
static code = 'ERR_JOSE_GENERIC';
|
|
287414
287607
|
code = 'ERR_JOSE_GENERIC';
|
|
@@ -287448,7 +287641,7 @@ class JOSEAlgNotAllowed extends JOSEError {
|
|
|
287448
287641
|
static code = 'ERR_JOSE_ALG_NOT_ALLOWED';
|
|
287449
287642
|
code = 'ERR_JOSE_ALG_NOT_ALLOWED';
|
|
287450
287643
|
}
|
|
287451
|
-
class
|
|
287644
|
+
class JOSENotSupported extends JOSEError {
|
|
287452
287645
|
static code = 'ERR_JOSE_NOT_SUPPORTED';
|
|
287453
287646
|
code = 'ERR_JOSE_NOT_SUPPORTED';
|
|
287454
287647
|
}
|
|
@@ -287509,8 +287702,7 @@ class JWSSignatureVerificationFailed extends (/* unused pure expression or super
|
|
|
287509
287702
|
}
|
|
287510
287703
|
}
|
|
287511
287704
|
|
|
287512
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287513
|
-
|
|
287705
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/iv.js
|
|
287514
287706
|
|
|
287515
287707
|
function bitLength(alg) {
|
|
287516
287708
|
switch (alg) {
|
|
@@ -287526,87 +287718,30 @@ function bitLength(alg) {
|
|
|
287526
287718
|
case 'A256CBC-HS512':
|
|
287527
287719
|
return 128;
|
|
287528
287720
|
default:
|
|
287529
|
-
throw new
|
|
287721
|
+
throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
|
|
287530
287722
|
}
|
|
287531
287723
|
}
|
|
287532
|
-
/* harmony default export */ const iv = ((alg) =>
|
|
287724
|
+
/* harmony default export */ const iv = ((alg) => crypto.getRandomValues(new Uint8Array(bitLength(alg) >> 3)));
|
|
287533
287725
|
|
|
287534
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287726
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_iv_length.js
|
|
287535
287727
|
|
|
287536
287728
|
|
|
287537
|
-
const
|
|
287729
|
+
/* harmony default export */ const check_iv_length = ((enc, iv) => {
|
|
287538
287730
|
if (iv.length << 3 !== bitLength(enc)) {
|
|
287539
287731
|
throw new JWEInvalid('Invalid Initialization Vector length');
|
|
287540
287732
|
}
|
|
287541
|
-
};
|
|
287542
|
-
/* harmony default export */ const check_iv_length = (checkIvLength);
|
|
287543
|
-
|
|
287544
|
-
;// CONCATENATED MODULE: external "node:util"
|
|
287545
|
-
const external_node_util_namespaceObject = require("node:util");
|
|
287546
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/is_key_object.js
|
|
287547
|
-
|
|
287548
|
-
/* harmony default export */ const is_key_object = ((obj) => external_node_util_namespaceObject.types.isKeyObject(obj));
|
|
287549
|
-
|
|
287550
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/check_cek_length.js
|
|
287733
|
+
});
|
|
287551
287734
|
|
|
287735
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_cek_length.js
|
|
287552
287736
|
|
|
287553
|
-
const
|
|
287554
|
-
|
|
287555
|
-
|
|
287556
|
-
|
|
287557
|
-
case 'A192CBC-HS384':
|
|
287558
|
-
case 'A256CBC-HS512':
|
|
287559
|
-
expected = parseInt(enc.slice(-3), 10);
|
|
287560
|
-
break;
|
|
287561
|
-
case 'A128GCM':
|
|
287562
|
-
case 'A192GCM':
|
|
287563
|
-
case 'A256GCM':
|
|
287564
|
-
expected = parseInt(enc.slice(1, 4), 10);
|
|
287565
|
-
break;
|
|
287566
|
-
default:
|
|
287567
|
-
throw new errors_JOSENotSupported(`Content Encryption Algorithm ${enc} is not supported either by JOSE or your javascript runtime`);
|
|
287568
|
-
}
|
|
287569
|
-
if (cek instanceof Uint8Array) {
|
|
287570
|
-
const actual = cek.byteLength << 3;
|
|
287571
|
-
if (actual !== expected) {
|
|
287572
|
-
throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
|
|
287573
|
-
}
|
|
287574
|
-
return;
|
|
287737
|
+
/* harmony default export */ const check_cek_length = ((cek, expected) => {
|
|
287738
|
+
const actual = cek.byteLength << 3;
|
|
287739
|
+
if (actual !== expected) {
|
|
287740
|
+
throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
|
|
287575
287741
|
}
|
|
287576
|
-
|
|
287577
|
-
const actual = cek.symmetricKeySize << 3;
|
|
287578
|
-
if (actual !== expected) {
|
|
287579
|
-
throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);
|
|
287580
|
-
}
|
|
287581
|
-
return;
|
|
287582
|
-
}
|
|
287583
|
-
throw new TypeError('Invalid Content Encryption Key type');
|
|
287584
|
-
};
|
|
287585
|
-
/* harmony default export */ const check_cek_length = (checkCekLength);
|
|
287586
|
-
|
|
287587
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/timing_safe_equal.js
|
|
287588
|
-
|
|
287589
|
-
const timingSafeEqual = external_node_crypto_.timingSafeEqual;
|
|
287590
|
-
/* harmony default export */ const timing_safe_equal = (timingSafeEqual);
|
|
287591
|
-
|
|
287592
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/cbc_tag.js
|
|
287593
|
-
|
|
287594
|
-
|
|
287595
|
-
function cbcTag(aad, iv, ciphertext, macSize, macKey, keySize) {
|
|
287596
|
-
const macData = buffer_utils_concat(aad, iv, ciphertext, uint64be(aad.length << 3));
|
|
287597
|
-
const hmac = (0,external_node_crypto_.createHmac)(`sha${macSize}`, macKey);
|
|
287598
|
-
hmac.update(macData);
|
|
287599
|
-
return hmac.digest().slice(0, keySize >> 3);
|
|
287600
|
-
}
|
|
287601
|
-
|
|
287602
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/webcrypto.js
|
|
287603
|
-
|
|
287604
|
-
|
|
287605
|
-
const webcrypto = external_node_crypto_.webcrypto;
|
|
287606
|
-
/* harmony default export */ const runtime_webcrypto = (webcrypto);
|
|
287607
|
-
const webcrypto_isCryptoKey = (key) => external_node_util_namespaceObject.types.isCryptoKey(key);
|
|
287742
|
+
});
|
|
287608
287743
|
|
|
287609
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287744
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/crypto_key.js
|
|
287610
287745
|
function unusable(name, prop = 'algorithm.name') {
|
|
287611
287746
|
return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
|
|
287612
287747
|
}
|
|
@@ -287616,7 +287751,7 @@ function isAlgorithm(algorithm, name) {
|
|
|
287616
287751
|
function getHashLength(hash) {
|
|
287617
287752
|
return parseInt(hash.name.slice(4), 10);
|
|
287618
287753
|
}
|
|
287619
|
-
function
|
|
287754
|
+
function getNamedCurve(alg) {
|
|
287620
287755
|
switch (alg) {
|
|
287621
287756
|
case 'ES256':
|
|
287622
287757
|
return 'P-256';
|
|
@@ -287628,23 +287763,12 @@ function crypto_key_getNamedCurve(alg) {
|
|
|
287628
287763
|
throw new Error('unreachable');
|
|
287629
287764
|
}
|
|
287630
287765
|
}
|
|
287631
|
-
function checkUsage(key,
|
|
287632
|
-
if (
|
|
287633
|
-
|
|
287634
|
-
if (usages.length > 2) {
|
|
287635
|
-
const last = usages.pop();
|
|
287636
|
-
msg += `one of ${usages.join(', ')}, or ${last}.`;
|
|
287637
|
-
}
|
|
287638
|
-
else if (usages.length === 2) {
|
|
287639
|
-
msg += `one of ${usages[0]} or ${usages[1]}.`;
|
|
287640
|
-
}
|
|
287641
|
-
else {
|
|
287642
|
-
msg += `${usages[0]}.`;
|
|
287643
|
-
}
|
|
287644
|
-
throw new TypeError(msg);
|
|
287766
|
+
function checkUsage(key, usage) {
|
|
287767
|
+
if (usage && !key.usages.includes(usage)) {
|
|
287768
|
+
throw new TypeError(`CryptoKey does not support this operation, its usages must include ${usage}.`);
|
|
287645
287769
|
}
|
|
287646
287770
|
}
|
|
287647
|
-
function checkSigCryptoKey(key, alg,
|
|
287771
|
+
function checkSigCryptoKey(key, alg, usage) {
|
|
287648
287772
|
switch (alg) {
|
|
287649
287773
|
case 'HS256':
|
|
287650
287774
|
case 'HS384':
|
|
@@ -287679,10 +287803,10 @@ function checkSigCryptoKey(key, alg, ...usages) {
|
|
|
287679
287803
|
throw unusable(`SHA-${expected}`, 'algorithm.hash');
|
|
287680
287804
|
break;
|
|
287681
287805
|
}
|
|
287806
|
+
case 'Ed25519':
|
|
287682
287807
|
case 'EdDSA': {
|
|
287683
|
-
if (key.algorithm
|
|
287684
|
-
throw unusable('Ed25519
|
|
287685
|
-
}
|
|
287808
|
+
if (!isAlgorithm(key.algorithm, 'Ed25519'))
|
|
287809
|
+
throw unusable('Ed25519');
|
|
287686
287810
|
break;
|
|
287687
287811
|
}
|
|
287688
287812
|
case 'ES256':
|
|
@@ -287690,7 +287814,7 @@ function checkSigCryptoKey(key, alg, ...usages) {
|
|
|
287690
287814
|
case 'ES512': {
|
|
287691
287815
|
if (!isAlgorithm(key.algorithm, 'ECDSA'))
|
|
287692
287816
|
throw unusable('ECDSA');
|
|
287693
|
-
const expected =
|
|
287817
|
+
const expected = getNamedCurve(alg);
|
|
287694
287818
|
const actual = key.algorithm.namedCurve;
|
|
287695
287819
|
if (actual !== expected)
|
|
287696
287820
|
throw unusable(expected, 'algorithm.namedCurve');
|
|
@@ -287699,9 +287823,9 @@ function checkSigCryptoKey(key, alg, ...usages) {
|
|
|
287699
287823
|
default:
|
|
287700
287824
|
throw new TypeError('CryptoKey does not support this operation');
|
|
287701
287825
|
}
|
|
287702
|
-
checkUsage(key,
|
|
287826
|
+
checkUsage(key, usage);
|
|
287703
287827
|
}
|
|
287704
|
-
function
|
|
287828
|
+
function crypto_key_checkEncCryptoKey(key, alg, usage) {
|
|
287705
287829
|
switch (alg) {
|
|
287706
287830
|
case 'A128GCM':
|
|
287707
287831
|
case 'A192GCM':
|
|
@@ -287729,10 +287853,9 @@ function checkEncCryptoKey(key, alg, ...usages) {
|
|
|
287729
287853
|
switch (key.algorithm.name) {
|
|
287730
287854
|
case 'ECDH':
|
|
287731
287855
|
case 'X25519':
|
|
287732
|
-
case 'X448':
|
|
287733
287856
|
break;
|
|
287734
287857
|
default:
|
|
287735
|
-
throw unusable('ECDH
|
|
287858
|
+
throw unusable('ECDH or X25519');
|
|
287736
287859
|
}
|
|
287737
287860
|
break;
|
|
287738
287861
|
}
|
|
@@ -287757,10 +287880,10 @@ function checkEncCryptoKey(key, alg, ...usages) {
|
|
|
287757
287880
|
default:
|
|
287758
287881
|
throw new TypeError('CryptoKey does not support this operation');
|
|
287759
287882
|
}
|
|
287760
|
-
checkUsage(key,
|
|
287883
|
+
checkUsage(key, usage);
|
|
287761
287884
|
}
|
|
287762
287885
|
|
|
287763
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287886
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/invalid_key_input.js
|
|
287764
287887
|
function message(msg, actual, ...types) {
|
|
287765
287888
|
types = types.filter(Boolean);
|
|
287766
287889
|
if (types.length > 2) {
|
|
@@ -287793,31 +287916,23 @@ function withAlg(alg, actual, ...types) {
|
|
|
287793
287916
|
return message(`Key for the ${alg} algorithm must be `, actual, ...types);
|
|
287794
287917
|
}
|
|
287795
287918
|
|
|
287796
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287797
|
-
|
|
287798
|
-
|
|
287799
|
-
|
|
287800
|
-
|
|
287801
|
-
return ciphers.has(algorithm);
|
|
287802
|
-
});
|
|
287803
|
-
|
|
287804
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/is_key_like.js
|
|
287805
|
-
|
|
287806
|
-
|
|
287807
|
-
/* harmony default export */ const is_key_like = ((key) => is_key_object(key) || webcrypto_isCryptoKey(key));
|
|
287808
|
-
const is_key_like_types = ['KeyObject'];
|
|
287809
|
-
if (globalThis.CryptoKey || runtime_webcrypto?.CryptoKey) {
|
|
287810
|
-
is_key_like_types.push('CryptoKey');
|
|
287919
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_key_like.js
|
|
287920
|
+
function is_key_like_assertCryptoKey(key) {
|
|
287921
|
+
if (!isCryptoKey(key)) {
|
|
287922
|
+
throw new Error('CryptoKey instance expected');
|
|
287923
|
+
}
|
|
287811
287924
|
}
|
|
287925
|
+
function isCryptoKey(key) {
|
|
287926
|
+
return key?.[Symbol.toStringTag] === 'CryptoKey';
|
|
287927
|
+
}
|
|
287928
|
+
function isKeyObject(key) {
|
|
287929
|
+
return key?.[Symbol.toStringTag] === 'KeyObject';
|
|
287930
|
+
}
|
|
287931
|
+
/* harmony default export */ const is_key_like = ((key) => {
|
|
287932
|
+
return isCryptoKey(key) || isKeyObject(key);
|
|
287933
|
+
});
|
|
287812
287934
|
|
|
287813
|
-
|
|
287814
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/decrypt.js
|
|
287815
|
-
|
|
287816
|
-
|
|
287817
|
-
|
|
287818
|
-
|
|
287819
|
-
|
|
287820
|
-
|
|
287935
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/decrypt.js
|
|
287821
287936
|
|
|
287822
287937
|
|
|
287823
287938
|
|
|
@@ -287825,22 +287940,39 @@ if (globalThis.CryptoKey || runtime_webcrypto?.CryptoKey) {
|
|
|
287825
287940
|
|
|
287826
287941
|
|
|
287827
287942
|
|
|
287828
|
-
function
|
|
287829
|
-
|
|
287830
|
-
|
|
287831
|
-
cek = cek.export();
|
|
287943
|
+
async function timingSafeEqual(a, b) {
|
|
287944
|
+
if (!(a instanceof Uint8Array)) {
|
|
287945
|
+
throw new TypeError('First argument must be a buffer');
|
|
287832
287946
|
}
|
|
287833
|
-
|
|
287834
|
-
|
|
287835
|
-
|
|
287836
|
-
const algorithm =
|
|
287837
|
-
|
|
287838
|
-
|
|
287947
|
+
if (!(b instanceof Uint8Array)) {
|
|
287948
|
+
throw new TypeError('Second argument must be a buffer');
|
|
287949
|
+
}
|
|
287950
|
+
const algorithm = { name: 'HMAC', hash: 'SHA-256' };
|
|
287951
|
+
const key = (await crypto.subtle.generateKey(algorithm, false, ['sign']));
|
|
287952
|
+
const aHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, a));
|
|
287953
|
+
const bHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, b));
|
|
287954
|
+
let out = 0;
|
|
287955
|
+
let i = -1;
|
|
287956
|
+
while (++i < 32) {
|
|
287957
|
+
out |= aHmac[i] ^ bHmac[i];
|
|
287958
|
+
}
|
|
287959
|
+
return out === 0;
|
|
287960
|
+
}
|
|
287961
|
+
async function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
287962
|
+
if (!(cek instanceof Uint8Array)) {
|
|
287963
|
+
throw new TypeError(invalid_key_input(cek, 'Uint8Array'));
|
|
287839
287964
|
}
|
|
287840
|
-
const
|
|
287965
|
+
const keySize = parseInt(enc.slice(1, 4), 10);
|
|
287966
|
+
const encKey = await crypto.subtle.importKey('raw', cek.subarray(keySize >> 3), 'AES-CBC', false, ['decrypt']);
|
|
287967
|
+
const macKey = await crypto.subtle.importKey('raw', cek.subarray(0, keySize >> 3), {
|
|
287968
|
+
hash: `SHA-${keySize << 1}`,
|
|
287969
|
+
name: 'HMAC',
|
|
287970
|
+
}, false, ['sign']);
|
|
287971
|
+
const macData = concat(aad, iv, ciphertext, uint64be(aad.length << 3));
|
|
287972
|
+
const expectedTag = new Uint8Array((await crypto.subtle.sign('HMAC', macKey, macData)).slice(0, keySize >> 3));
|
|
287841
287973
|
let macCheckPassed;
|
|
287842
287974
|
try {
|
|
287843
|
-
macCheckPassed =
|
|
287975
|
+
macCheckPassed = await timingSafeEqual(tag, expectedTag);
|
|
287844
287976
|
}
|
|
287845
287977
|
catch {
|
|
287846
287978
|
}
|
|
@@ -287849,8 +287981,7 @@ function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
|
287849
287981
|
}
|
|
287850
287982
|
let plaintext;
|
|
287851
287983
|
try {
|
|
287852
|
-
|
|
287853
|
-
plaintext = buffer_utils_concat(decipher.update(ciphertext), decipher.final());
|
|
287984
|
+
plaintext = new Uint8Array(await crypto.subtle.decrypt({ iv, name: 'AES-CBC' }, encKey, ciphertext));
|
|
287854
287985
|
}
|
|
287855
287986
|
catch {
|
|
287856
287987
|
}
|
|
@@ -287859,37 +287990,30 @@ function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
|
287859
287990
|
}
|
|
287860
287991
|
return plaintext;
|
|
287861
287992
|
}
|
|
287862
|
-
function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
287863
|
-
|
|
287864
|
-
|
|
287865
|
-
|
|
287866
|
-
|
|
287993
|
+
async function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
287994
|
+
let encKey;
|
|
287995
|
+
if (cek instanceof Uint8Array) {
|
|
287996
|
+
encKey = await crypto.subtle.importKey('raw', cek, 'AES-GCM', false, ['decrypt']);
|
|
287997
|
+
}
|
|
287998
|
+
else {
|
|
287999
|
+
crypto_key_checkEncCryptoKey(cek, enc, 'decrypt');
|
|
288000
|
+
encKey = cek;
|
|
287867
288001
|
}
|
|
287868
288002
|
try {
|
|
287869
|
-
|
|
287870
|
-
|
|
287871
|
-
|
|
287872
|
-
|
|
287873
|
-
|
|
287874
|
-
|
|
287875
|
-
decipher.final();
|
|
287876
|
-
return plaintext;
|
|
288003
|
+
return new Uint8Array(await crypto.subtle.decrypt({
|
|
288004
|
+
additionalData: aad,
|
|
288005
|
+
iv,
|
|
288006
|
+
name: 'AES-GCM',
|
|
288007
|
+
tagLength: 128,
|
|
288008
|
+
}, encKey, concat(ciphertext, tag)));
|
|
287877
288009
|
}
|
|
287878
288010
|
catch {
|
|
287879
288011
|
throw new JWEDecryptionFailed();
|
|
287880
288012
|
}
|
|
287881
288013
|
}
|
|
287882
|
-
const decrypt = (enc, cek, ciphertext, iv, tag, aad) => {
|
|
287883
|
-
|
|
287884
|
-
|
|
287885
|
-
checkEncCryptoKey(cek, enc, 'decrypt');
|
|
287886
|
-
key = external_node_crypto_.KeyObject.from(cek);
|
|
287887
|
-
}
|
|
287888
|
-
else if (cek instanceof Uint8Array || is_key_object(cek)) {
|
|
287889
|
-
key = cek;
|
|
287890
|
-
}
|
|
287891
|
-
else {
|
|
287892
|
-
throw new TypeError(invalid_key_input(cek, ...is_key_like_types, 'Uint8Array'));
|
|
288014
|
+
/* harmony default export */ const decrypt = (async (enc, cek, ciphertext, iv, tag, aad) => {
|
|
288015
|
+
if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {
|
|
288016
|
+
throw new TypeError(invalid_key_input(cek, 'CryptoKey', 'KeyObject', 'Uint8Array', 'JSON Web Key'));
|
|
287893
288017
|
}
|
|
287894
288018
|
if (!iv) {
|
|
287895
288019
|
throw new JWEInvalid('JWE Initialization Vector missing');
|
|
@@ -287897,25 +288021,27 @@ const decrypt = (enc, cek, ciphertext, iv, tag, aad) => {
|
|
|
287897
288021
|
if (!tag) {
|
|
287898
288022
|
throw new JWEInvalid('JWE Authentication Tag missing');
|
|
287899
288023
|
}
|
|
287900
|
-
check_cek_length(enc, key);
|
|
287901
288024
|
check_iv_length(enc, iv);
|
|
287902
288025
|
switch (enc) {
|
|
287903
288026
|
case 'A128CBC-HS256':
|
|
287904
288027
|
case 'A192CBC-HS384':
|
|
287905
288028
|
case 'A256CBC-HS512':
|
|
287906
|
-
|
|
288029
|
+
if (cek instanceof Uint8Array)
|
|
288030
|
+
check_cek_length(cek, parseInt(enc.slice(-3), 10));
|
|
288031
|
+
return cbcDecrypt(enc, cek, ciphertext, iv, tag, aad);
|
|
287907
288032
|
case 'A128GCM':
|
|
287908
288033
|
case 'A192GCM':
|
|
287909
288034
|
case 'A256GCM':
|
|
287910
|
-
|
|
288035
|
+
if (cek instanceof Uint8Array)
|
|
288036
|
+
check_cek_length(cek, parseInt(enc.slice(1, 4), 10));
|
|
288037
|
+
return gcmDecrypt(enc, cek, ciphertext, iv, tag, aad);
|
|
287911
288038
|
default:
|
|
287912
|
-
throw new
|
|
288039
|
+
throw new JOSENotSupported('Unsupported JWE Content Encryption Algorithm');
|
|
287913
288040
|
}
|
|
287914
|
-
};
|
|
287915
|
-
/* harmony default export */ const runtime_decrypt = (decrypt);
|
|
288041
|
+
});
|
|
287916
288042
|
|
|
287917
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
287918
|
-
const
|
|
288043
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_disjoint.js
|
|
288044
|
+
/* harmony default export */ const is_disjoint = ((...headers) => {
|
|
287919
288045
|
const sources = headers.filter(Boolean);
|
|
287920
288046
|
if (sources.length === 0 || sources.length === 1) {
|
|
287921
288047
|
return true;
|
|
@@ -287935,14 +288061,13 @@ const isDisjoint = (...headers) => {
|
|
|
287935
288061
|
}
|
|
287936
288062
|
}
|
|
287937
288063
|
return true;
|
|
287938
|
-
};
|
|
287939
|
-
/* harmony default export */ const is_disjoint = (isDisjoint);
|
|
288064
|
+
});
|
|
287940
288065
|
|
|
287941
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288066
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_object.js
|
|
287942
288067
|
function isObjectLike(value) {
|
|
287943
288068
|
return typeof value === 'object' && value !== null;
|
|
287944
288069
|
}
|
|
287945
|
-
|
|
288070
|
+
/* harmony default export */ const is_object = ((input) => {
|
|
287946
288071
|
if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {
|
|
287947
288072
|
return false;
|
|
287948
288073
|
}
|
|
@@ -287954,345 +288079,165 @@ function isObject(input) {
|
|
|
287954
288079
|
proto = Object.getPrototypeOf(proto);
|
|
287955
288080
|
}
|
|
287956
288081
|
return Object.getPrototypeOf(input) === proto;
|
|
287957
|
-
}
|
|
287958
|
-
|
|
287959
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/aeskw.js
|
|
287960
|
-
|
|
287961
|
-
|
|
287962
|
-
|
|
287963
|
-
|
|
287964
|
-
|
|
287965
|
-
|
|
287966
|
-
|
|
287967
|
-
|
|
288082
|
+
});
|
|
287968
288083
|
|
|
288084
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/aeskw.js
|
|
287969
288085
|
|
|
287970
288086
|
function checkKeySize(key, alg) {
|
|
287971
|
-
if (key.
|
|
288087
|
+
if (key.algorithm.length !== parseInt(alg.slice(1, 4), 10)) {
|
|
287972
288088
|
throw new TypeError(`Invalid key size for alg: ${alg}`);
|
|
287973
288089
|
}
|
|
287974
288090
|
}
|
|
287975
|
-
function
|
|
287976
|
-
if (is_key_object(key)) {
|
|
287977
|
-
return key;
|
|
287978
|
-
}
|
|
288091
|
+
function getCryptoKey(key, alg, usage) {
|
|
287979
288092
|
if (key instanceof Uint8Array) {
|
|
287980
|
-
return (
|
|
288093
|
+
return crypto.subtle.importKey('raw', key, 'AES-KW', true, [usage]);
|
|
287981
288094
|
}
|
|
287982
|
-
|
|
287983
|
-
|
|
287984
|
-
return external_node_crypto_.KeyObject.from(key);
|
|
287985
|
-
}
|
|
287986
|
-
throw new TypeError(invalid_key_input(key, ...is_key_like_types, 'Uint8Array'));
|
|
287987
|
-
}
|
|
287988
|
-
const aeskw_wrap = (alg, key, cek) => {
|
|
287989
|
-
const size = parseInt(alg.slice(1, 4), 10);
|
|
287990
|
-
const algorithm = `aes${size}-wrap`;
|
|
287991
|
-
if (!supported(algorithm)) {
|
|
287992
|
-
throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
|
|
287993
|
-
}
|
|
287994
|
-
const keyObject = ensureKeyObject(key, alg, 'wrapKey');
|
|
287995
|
-
checkKeySize(keyObject, alg);
|
|
287996
|
-
const cipher = createCipheriv(algorithm, keyObject, Buffer.alloc(8, 0xa6));
|
|
287997
|
-
return concat(cipher.update(cek), cipher.final());
|
|
287998
|
-
};
|
|
287999
|
-
const unwrap = (alg, key, encryptedKey) => {
|
|
288000
|
-
const size = parseInt(alg.slice(1, 4), 10);
|
|
288001
|
-
const algorithm = `aes${size}-wrap`;
|
|
288002
|
-
if (!runtime_ciphers(algorithm)) {
|
|
288003
|
-
throw new errors_JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
|
|
288004
|
-
}
|
|
288005
|
-
const keyObject = ensureKeyObject(key, alg, 'unwrapKey');
|
|
288006
|
-
checkKeySize(keyObject, alg);
|
|
288007
|
-
const cipher = (0,external_node_crypto_.createDecipheriv)(algorithm, keyObject, external_node_buffer_.Buffer.alloc(8, 0xa6));
|
|
288008
|
-
return buffer_utils_concat(cipher.update(encryptedKey), cipher.final());
|
|
288009
|
-
};
|
|
288010
|
-
|
|
288011
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/is_jwk.js
|
|
288012
|
-
|
|
288013
|
-
function isJWK(key) {
|
|
288014
|
-
return isObject(key) && typeof key.kty === 'string';
|
|
288095
|
+
crypto_key_checkEncCryptoKey(key, alg, usage);
|
|
288096
|
+
return key;
|
|
288015
288097
|
}
|
|
288016
|
-
function
|
|
288017
|
-
|
|
288098
|
+
async function wrap(alg, key, cek) {
|
|
288099
|
+
const cryptoKey = await getCryptoKey(key, alg, 'wrapKey');
|
|
288100
|
+
checkKeySize(cryptoKey, alg);
|
|
288101
|
+
const cryptoKeyCek = await crypto.subtle.importKey('raw', cek, { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);
|
|
288102
|
+
return new Uint8Array(await crypto.subtle.wrapKey('raw', cryptoKeyCek, cryptoKey, 'AES-KW'));
|
|
288018
288103
|
}
|
|
288019
|
-
function
|
|
288020
|
-
|
|
288104
|
+
async function unwrap(alg, key, encryptedKey) {
|
|
288105
|
+
const cryptoKey = await getCryptoKey(key, alg, 'unwrapKey');
|
|
288106
|
+
checkKeySize(cryptoKey, alg);
|
|
288107
|
+
const cryptoKeyCek = await crypto.subtle.unwrapKey('raw', encryptedKey, cryptoKey, 'AES-KW', { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);
|
|
288108
|
+
return new Uint8Array(await crypto.subtle.exportKey('raw', cryptoKeyCek));
|
|
288021
288109
|
}
|
|
288022
|
-
function isSecretJWK(key) {
|
|
288023
|
-
return isJWK(key) && key.kty === 'oct' && typeof key.k === 'string';
|
|
288024
|
-
}
|
|
288025
|
-
|
|
288026
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/get_named_curve.js
|
|
288027
|
-
|
|
288028
|
-
|
|
288029
|
-
|
|
288030
|
-
|
|
288031
|
-
|
|
288032
|
-
|
|
288033
|
-
|
|
288034
|
-
const weakMap = new WeakMap();
|
|
288035
|
-
const namedCurveToJOSE = (namedCurve) => {
|
|
288036
|
-
switch (namedCurve) {
|
|
288037
|
-
case 'prime256v1':
|
|
288038
|
-
return 'P-256';
|
|
288039
|
-
case 'secp384r1':
|
|
288040
|
-
return 'P-384';
|
|
288041
|
-
case 'secp521r1':
|
|
288042
|
-
return 'P-521';
|
|
288043
|
-
case 'secp256k1':
|
|
288044
|
-
return 'secp256k1';
|
|
288045
|
-
default:
|
|
288046
|
-
throw new errors_JOSENotSupported('Unsupported key curve for this operation');
|
|
288047
|
-
}
|
|
288048
|
-
};
|
|
288049
|
-
const get_named_curve_getNamedCurve = (kee, raw) => {
|
|
288050
|
-
let key;
|
|
288051
|
-
if (webcrypto_isCryptoKey(kee)) {
|
|
288052
|
-
key = external_node_crypto_.KeyObject.from(kee);
|
|
288053
|
-
}
|
|
288054
|
-
else if (is_key_object(kee)) {
|
|
288055
|
-
key = kee;
|
|
288056
|
-
}
|
|
288057
|
-
else if (isJWK(kee)) {
|
|
288058
|
-
return kee.crv;
|
|
288059
|
-
}
|
|
288060
|
-
else {
|
|
288061
|
-
throw new TypeError(invalid_key_input(kee, ...is_key_like_types));
|
|
288062
|
-
}
|
|
288063
|
-
if (key.type === 'secret') {
|
|
288064
|
-
throw new TypeError('only "private" or "public" type keys can be used for this operation');
|
|
288065
|
-
}
|
|
288066
|
-
switch (key.asymmetricKeyType) {
|
|
288067
|
-
case 'ed25519':
|
|
288068
|
-
case 'ed448':
|
|
288069
|
-
return `Ed${key.asymmetricKeyType.slice(2)}`;
|
|
288070
|
-
case 'x25519':
|
|
288071
|
-
case 'x448':
|
|
288072
|
-
return `X${key.asymmetricKeyType.slice(1)}`;
|
|
288073
|
-
case 'ec': {
|
|
288074
|
-
const namedCurve = key.asymmetricKeyDetails.namedCurve;
|
|
288075
|
-
if (raw) {
|
|
288076
|
-
return namedCurve;
|
|
288077
|
-
}
|
|
288078
|
-
return namedCurveToJOSE(namedCurve);
|
|
288079
|
-
}
|
|
288080
|
-
default:
|
|
288081
|
-
throw new TypeError('Invalid asymmetric key type for this operation');
|
|
288082
|
-
}
|
|
288083
|
-
};
|
|
288084
|
-
/* harmony default export */ const get_named_curve = (get_named_curve_getNamedCurve);
|
|
288085
|
-
|
|
288086
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/ecdhes.js
|
|
288087
|
-
|
|
288088
|
-
|
|
288089
|
-
|
|
288090
|
-
|
|
288091
|
-
|
|
288092
288110
|
|
|
288111
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/digest.js
|
|
288112
|
+
/* harmony default export */ const digest = (async (algorithm, data) => {
|
|
288113
|
+
const subtleDigest = `SHA-${algorithm.slice(-3)}`;
|
|
288114
|
+
return new Uint8Array(await crypto.subtle.digest(subtleDigest, data));
|
|
288115
|
+
});
|
|
288093
288116
|
|
|
288117
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/ecdhes.js
|
|
288094
288118
|
|
|
288095
288119
|
|
|
288096
288120
|
|
|
288097
|
-
|
|
288098
|
-
|
|
288099
|
-
|
|
288100
|
-
|
|
288101
|
-
|
|
288102
|
-
|
|
288103
|
-
|
|
288104
|
-
|
|
288105
|
-
|
|
288106
|
-
|
|
288107
|
-
|
|
288108
|
-
|
|
288109
|
-
}
|
|
288110
|
-
let privateKey;
|
|
288111
|
-
if (webcrypto_isCryptoKey(privateKee)) {
|
|
288112
|
-
checkEncCryptoKey(privateKee, 'ECDH', 'deriveBits');
|
|
288113
|
-
privateKey = external_node_crypto_.KeyObject.from(privateKee);
|
|
288121
|
+
function lengthAndInput(input) {
|
|
288122
|
+
return concat(uint32be(input.length), input);
|
|
288123
|
+
}
|
|
288124
|
+
async function concatKdf(secret, bits, value) {
|
|
288125
|
+
const iterations = Math.ceil((bits >> 3) / 32);
|
|
288126
|
+
const res = new Uint8Array(iterations * 32);
|
|
288127
|
+
for (let iter = 0; iter < iterations; iter++) {
|
|
288128
|
+
const buf = new Uint8Array(4 + secret.length + value.length);
|
|
288129
|
+
buf.set(uint32be(iter + 1));
|
|
288130
|
+
buf.set(secret, 4);
|
|
288131
|
+
buf.set(value, 4 + secret.length);
|
|
288132
|
+
res.set(await digest('sha256', buf), iter * 32);
|
|
288114
288133
|
}
|
|
288115
|
-
|
|
288116
|
-
|
|
288134
|
+
return res.slice(0, bits >> 3);
|
|
288135
|
+
}
|
|
288136
|
+
async function deriveKey(publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) {
|
|
288137
|
+
crypto_key_checkEncCryptoKey(publicKey, 'ECDH');
|
|
288138
|
+
crypto_key_checkEncCryptoKey(privateKey, 'ECDH', 'deriveBits');
|
|
288139
|
+
const value = concat(lengthAndInput(buffer_utils_encoder.encode(algorithm)), lengthAndInput(apu), lengthAndInput(apv), uint32be(keyLength));
|
|
288140
|
+
let length;
|
|
288141
|
+
if (publicKey.algorithm.name === 'X25519') {
|
|
288142
|
+
length = 256;
|
|
288117
288143
|
}
|
|
288118
288144
|
else {
|
|
288119
|
-
|
|
288145
|
+
length =
|
|
288146
|
+
Math.ceil(parseInt(publicKey.algorithm.namedCurve.slice(-3), 10) / 8) << 3;
|
|
288120
288147
|
}
|
|
288121
|
-
const
|
|
288122
|
-
|
|
288148
|
+
const sharedSecret = new Uint8Array(await crypto.subtle.deriveBits({
|
|
288149
|
+
name: publicKey.algorithm.name,
|
|
288150
|
+
public: publicKey,
|
|
288151
|
+
}, privateKey, length));
|
|
288123
288152
|
return concatKdf(sharedSecret, keyLength, value);
|
|
288124
288153
|
}
|
|
288125
|
-
|
|
288126
|
-
|
|
288127
|
-
|
|
288128
|
-
|
|
288129
|
-
|
|
288130
|
-
|
|
288131
|
-
key = kee;
|
|
288132
|
-
}
|
|
288133
|
-
else {
|
|
288134
|
-
throw new TypeError(invalidKeyInput(kee, ...types));
|
|
288135
|
-
}
|
|
288136
|
-
switch (key.asymmetricKeyType) {
|
|
288137
|
-
case 'x25519':
|
|
288138
|
-
return ecdhes_generateKeyPair('x25519');
|
|
288139
|
-
case 'x448': {
|
|
288140
|
-
return ecdhes_generateKeyPair('x448');
|
|
288141
|
-
}
|
|
288142
|
-
case 'ec': {
|
|
288143
|
-
const namedCurve = getNamedCurve(key);
|
|
288144
|
-
return ecdhes_generateKeyPair('ec', { namedCurve });
|
|
288145
|
-
}
|
|
288154
|
+
function allowed(key) {
|
|
288155
|
+
switch (key.algorithm.namedCurve) {
|
|
288156
|
+
case 'P-256':
|
|
288157
|
+
case 'P-384':
|
|
288158
|
+
case 'P-521':
|
|
288159
|
+
return true;
|
|
288146
288160
|
default:
|
|
288147
|
-
|
|
288161
|
+
return key.algorithm.name === 'X25519';
|
|
288148
288162
|
}
|
|
288149
288163
|
}
|
|
288150
|
-
const ecdhAllowed = (key) => ['P-256', 'P-384', 'P-521', 'X25519', 'X448'].includes(get_named_curve(key));
|
|
288151
288164
|
|
|
288152
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288165
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/pbes2kw.js
|
|
288153
288166
|
|
|
288154
|
-
function check_p2s_checkP2s(p2s) {
|
|
288155
|
-
if (!(p2s instanceof Uint8Array) || p2s.length < 8) {
|
|
288156
|
-
throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');
|
|
288157
|
-
}
|
|
288158
|
-
}
|
|
288159
288167
|
|
|
288160
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/pbes2kw.js
|
|
288161
288168
|
|
|
288162
288169
|
|
|
288163
288170
|
|
|
288164
|
-
|
|
288165
|
-
|
|
288166
|
-
|
|
288167
|
-
|
|
288168
|
-
|
|
288169
|
-
|
|
288170
|
-
|
|
288171
|
-
|
|
288172
|
-
|
|
288173
|
-
const pbkdf2 = (0,external_node_util_namespaceObject.promisify)(external_node_crypto_.pbkdf2);
|
|
288174
|
-
function getPassword(key, alg) {
|
|
288175
|
-
if (is_key_object(key)) {
|
|
288176
|
-
return key.export();
|
|
288177
|
-
}
|
|
288171
|
+
function pbes2kw_getCryptoKey(key, alg) {
|
|
288178
288172
|
if (key instanceof Uint8Array) {
|
|
288179
|
-
return key;
|
|
288180
|
-
}
|
|
288181
|
-
if (webcrypto_isCryptoKey(key)) {
|
|
288182
|
-
checkEncCryptoKey(key, alg, 'deriveBits', 'deriveKey');
|
|
288183
|
-
return external_node_crypto_.KeyObject.from(key).export();
|
|
288173
|
+
return crypto.subtle.importKey('raw', key, 'PBKDF2', false, ['deriveBits']);
|
|
288184
288174
|
}
|
|
288185
|
-
|
|
288175
|
+
crypto_key_checkEncCryptoKey(key, alg, 'deriveBits');
|
|
288176
|
+
return key;
|
|
288186
288177
|
}
|
|
288187
|
-
const
|
|
288188
|
-
|
|
288178
|
+
const concatSalt = (alg, p2sInput) => concat(buffer_utils_encoder.encode(alg), new Uint8Array([0]), p2sInput);
|
|
288179
|
+
async function pbes2kw_deriveKey(p2s, alg, p2c, key) {
|
|
288180
|
+
if (!(p2s instanceof Uint8Array) || p2s.length < 8) {
|
|
288181
|
+
throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');
|
|
288182
|
+
}
|
|
288189
288183
|
const salt = concatSalt(alg, p2s);
|
|
288190
|
-
const keylen = parseInt(alg.slice(13, 16), 10)
|
|
288191
|
-
const
|
|
288192
|
-
|
|
288193
|
-
|
|
288194
|
-
|
|
288195
|
-
|
|
288196
|
-
|
|
288197
|
-
|
|
288198
|
-
|
|
288199
|
-
|
|
288200
|
-
|
|
288201
|
-
const
|
|
288202
|
-
|
|
288203
|
-
};
|
|
288204
|
-
|
|
288205
|
-
|
|
288184
|
+
const keylen = parseInt(alg.slice(13, 16), 10);
|
|
288185
|
+
const subtleAlg = {
|
|
288186
|
+
hash: `SHA-${alg.slice(8, 11)}`,
|
|
288187
|
+
iterations: p2c,
|
|
288188
|
+
name: 'PBKDF2',
|
|
288189
|
+
salt,
|
|
288190
|
+
};
|
|
288191
|
+
const cryptoKey = await pbes2kw_getCryptoKey(key, alg);
|
|
288192
|
+
return new Uint8Array(await crypto.subtle.deriveBits(subtleAlg, cryptoKey, keylen));
|
|
288193
|
+
}
|
|
288194
|
+
async function pbes2kw_wrap(alg, key, cek, p2c = 2048, p2s = crypto.getRandomValues(new Uint8Array(16))) {
|
|
288195
|
+
const derived = await pbes2kw_deriveKey(p2s, alg, p2c, key);
|
|
288196
|
+
const encryptedKey = await aeskw.wrap(alg.slice(-6), derived, cek);
|
|
288197
|
+
return { encryptedKey, p2c, p2s: b64u(p2s) };
|
|
288198
|
+
}
|
|
288199
|
+
async function pbes2kw_unwrap(alg, key, encryptedKey, p2c, p2s) {
|
|
288200
|
+
const derived = await pbes2kw_deriveKey(p2s, alg, p2c, key);
|
|
288201
|
+
return unwrap(alg.slice(-6), derived, encryptedKey);
|
|
288202
|
+
}
|
|
288206
288203
|
|
|
288207
|
-
|
|
288208
|
-
|
|
288209
|
-
|
|
288210
|
-
|
|
288211
|
-
|
|
288204
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_key_length.js
|
|
288205
|
+
/* harmony default export */ const check_key_length = ((alg, key) => {
|
|
288206
|
+
if (alg.startsWith('RS') || alg.startsWith('PS')) {
|
|
288207
|
+
const { modulusLength } = key.algorithm;
|
|
288208
|
+
if (typeof modulusLength !== 'number' || modulusLength < 2048) {
|
|
288209
|
+
throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
|
|
288212
288210
|
}
|
|
288213
|
-
else {
|
|
288214
|
-
modulusLength = Buffer.from(key.n, 'base64url').byteLength << 3;
|
|
288215
|
-
}
|
|
288216
|
-
}
|
|
288217
|
-
catch { }
|
|
288218
|
-
if (typeof modulusLength !== 'number' || modulusLength < 2048) {
|
|
288219
|
-
throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
|
|
288220
288211
|
}
|
|
288221
288212
|
});
|
|
288222
288213
|
|
|
288223
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288224
|
-
|
|
288225
|
-
|
|
288214
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/rsaes.js
|
|
288226
288215
|
|
|
288227
288216
|
|
|
288228
288217
|
|
|
288229
|
-
|
|
288230
|
-
|
|
288231
|
-
|
|
288232
|
-
const checkKey = (key, alg) => {
|
|
288233
|
-
if (key.asymmetricKeyType !== 'rsa') {
|
|
288234
|
-
throw new TypeError('Invalid key for this operation, its asymmetricKeyType must be rsa');
|
|
288235
|
-
}
|
|
288236
|
-
check_key_length(key, alg);
|
|
288237
|
-
};
|
|
288238
|
-
const RSA1_5 = (0,external_node_util_namespaceObject.deprecate)(() => external_node_crypto_.constants.RSA_PKCS1_PADDING, 'The RSA1_5 "alg" (JWE Algorithm) is deprecated and will be removed in the next major revision.');
|
|
288239
|
-
const resolvePadding = (alg) => {
|
|
288240
|
-
switch (alg) {
|
|
288241
|
-
case 'RSA-OAEP':
|
|
288242
|
-
case 'RSA-OAEP-256':
|
|
288243
|
-
case 'RSA-OAEP-384':
|
|
288244
|
-
case 'RSA-OAEP-512':
|
|
288245
|
-
return external_node_crypto_.constants.RSA_PKCS1_OAEP_PADDING;
|
|
288246
|
-
case 'RSA1_5':
|
|
288247
|
-
return RSA1_5();
|
|
288248
|
-
default:
|
|
288249
|
-
return undefined;
|
|
288250
|
-
}
|
|
288251
|
-
};
|
|
288252
|
-
const resolveOaepHash = (alg) => {
|
|
288218
|
+
const subtleAlgorithm = (alg) => {
|
|
288253
288219
|
switch (alg) {
|
|
288254
288220
|
case 'RSA-OAEP':
|
|
288255
|
-
return 'sha1';
|
|
288256
288221
|
case 'RSA-OAEP-256':
|
|
288257
|
-
return 'sha256';
|
|
288258
288222
|
case 'RSA-OAEP-384':
|
|
288259
|
-
return 'sha384';
|
|
288260
288223
|
case 'RSA-OAEP-512':
|
|
288261
|
-
return '
|
|
288224
|
+
return 'RSA-OAEP';
|
|
288262
288225
|
default:
|
|
288263
|
-
|
|
288226
|
+
throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
|
|
288264
288227
|
}
|
|
288265
288228
|
};
|
|
288266
|
-
function
|
|
288267
|
-
|
|
288268
|
-
|
|
288269
|
-
|
|
288270
|
-
|
|
288271
|
-
|
|
288272
|
-
|
|
288273
|
-
|
|
288274
|
-
|
|
288229
|
+
async function rsaes_encrypt(alg, key, cek) {
|
|
288230
|
+
checkEncCryptoKey(key, alg, 'encrypt');
|
|
288231
|
+
checkKeyLength(alg, key);
|
|
288232
|
+
return new Uint8Array(await crypto.subtle.encrypt(subtleAlgorithm(alg), key, cek));
|
|
288233
|
+
}
|
|
288234
|
+
async function rsaes_decrypt(alg, key, encryptedKey) {
|
|
288235
|
+
crypto_key_checkEncCryptoKey(key, alg, 'decrypt');
|
|
288236
|
+
check_key_length(alg, key);
|
|
288237
|
+
return new Uint8Array(await crypto.subtle.decrypt(subtleAlgorithm(alg), key, encryptedKey));
|
|
288275
288238
|
}
|
|
288276
|
-
const rsaes_encrypt = (alg, key, cek) => {
|
|
288277
|
-
const padding = resolvePadding(alg);
|
|
288278
|
-
const oaepHash = resolveOaepHash(alg);
|
|
288279
|
-
const keyObject = rsaes_ensureKeyObject(key, alg, 'wrapKey', 'encrypt');
|
|
288280
|
-
checkKey(keyObject, alg);
|
|
288281
|
-
return publicEncrypt({ key: keyObject, oaepHash, padding }, cek);
|
|
288282
|
-
};
|
|
288283
|
-
const rsaes_decrypt = (alg, key, encryptedKey) => {
|
|
288284
|
-
const padding = resolvePadding(alg);
|
|
288285
|
-
const oaepHash = resolveOaepHash(alg);
|
|
288286
|
-
const keyObject = rsaes_ensureKeyObject(key, alg, 'unwrapKey', 'decrypt');
|
|
288287
|
-
checkKey(keyObject, alg);
|
|
288288
|
-
return (0,external_node_crypto_.privateDecrypt)({ key: keyObject, oaepHash, padding }, encryptedKey);
|
|
288289
|
-
};
|
|
288290
|
-
|
|
288291
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/runtime/normalize_key.js
|
|
288292
|
-
/* harmony default export */ const normalize_key = ({});
|
|
288293
|
-
|
|
288294
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/cek.js
|
|
288295
288239
|
|
|
288240
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/cek.js
|
|
288296
288241
|
|
|
288297
288242
|
function cek_bitLength(alg) {
|
|
288298
288243
|
switch (alg) {
|
|
@@ -288308,22 +288253,108 @@ function cek_bitLength(alg) {
|
|
|
288308
288253
|
case 'A256CBC-HS512':
|
|
288309
288254
|
return 512;
|
|
288310
288255
|
default:
|
|
288311
|
-
throw new
|
|
288256
|
+
throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);
|
|
288312
288257
|
}
|
|
288313
288258
|
}
|
|
288314
|
-
/* harmony default export */ const lib_cek = ((alg) =>
|
|
288259
|
+
/* harmony default export */ const lib_cek = ((alg) => crypto.getRandomValues(new Uint8Array(cek_bitLength(alg) >> 3)));
|
|
288315
288260
|
|
|
288316
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288261
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/jwk_to_key.js
|
|
288317
288262
|
|
|
288318
|
-
|
|
288319
|
-
|
|
288320
|
-
|
|
288263
|
+
function subtleMapping(jwk) {
|
|
288264
|
+
let algorithm;
|
|
288265
|
+
let keyUsages;
|
|
288266
|
+
switch (jwk.kty) {
|
|
288267
|
+
case 'RSA': {
|
|
288268
|
+
switch (jwk.alg) {
|
|
288269
|
+
case 'PS256':
|
|
288270
|
+
case 'PS384':
|
|
288271
|
+
case 'PS512':
|
|
288272
|
+
algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };
|
|
288273
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288274
|
+
break;
|
|
288275
|
+
case 'RS256':
|
|
288276
|
+
case 'RS384':
|
|
288277
|
+
case 'RS512':
|
|
288278
|
+
algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };
|
|
288279
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288280
|
+
break;
|
|
288281
|
+
case 'RSA-OAEP':
|
|
288282
|
+
case 'RSA-OAEP-256':
|
|
288283
|
+
case 'RSA-OAEP-384':
|
|
288284
|
+
case 'RSA-OAEP-512':
|
|
288285
|
+
algorithm = {
|
|
288286
|
+
name: 'RSA-OAEP',
|
|
288287
|
+
hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,
|
|
288288
|
+
};
|
|
288289
|
+
keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];
|
|
288290
|
+
break;
|
|
288291
|
+
default:
|
|
288292
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
288293
|
+
}
|
|
288294
|
+
break;
|
|
288295
|
+
}
|
|
288296
|
+
case 'EC': {
|
|
288297
|
+
switch (jwk.alg) {
|
|
288298
|
+
case 'ES256':
|
|
288299
|
+
algorithm = { name: 'ECDSA', namedCurve: 'P-256' };
|
|
288300
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288301
|
+
break;
|
|
288302
|
+
case 'ES384':
|
|
288303
|
+
algorithm = { name: 'ECDSA', namedCurve: 'P-384' };
|
|
288304
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288305
|
+
break;
|
|
288306
|
+
case 'ES512':
|
|
288307
|
+
algorithm = { name: 'ECDSA', namedCurve: 'P-521' };
|
|
288308
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288309
|
+
break;
|
|
288310
|
+
case 'ECDH-ES':
|
|
288311
|
+
case 'ECDH-ES+A128KW':
|
|
288312
|
+
case 'ECDH-ES+A192KW':
|
|
288313
|
+
case 'ECDH-ES+A256KW':
|
|
288314
|
+
algorithm = { name: 'ECDH', namedCurve: jwk.crv };
|
|
288315
|
+
keyUsages = jwk.d ? ['deriveBits'] : [];
|
|
288316
|
+
break;
|
|
288317
|
+
default:
|
|
288318
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
288319
|
+
}
|
|
288320
|
+
break;
|
|
288321
|
+
}
|
|
288322
|
+
case 'OKP': {
|
|
288323
|
+
switch (jwk.alg) {
|
|
288324
|
+
case 'Ed25519':
|
|
288325
|
+
case 'EdDSA':
|
|
288326
|
+
algorithm = { name: 'Ed25519' };
|
|
288327
|
+
keyUsages = jwk.d ? ['sign'] : ['verify'];
|
|
288328
|
+
break;
|
|
288329
|
+
case 'ECDH-ES':
|
|
288330
|
+
case 'ECDH-ES+A128KW':
|
|
288331
|
+
case 'ECDH-ES+A192KW':
|
|
288332
|
+
case 'ECDH-ES+A256KW':
|
|
288333
|
+
algorithm = { name: jwk.crv };
|
|
288334
|
+
keyUsages = jwk.d ? ['deriveBits'] : [];
|
|
288335
|
+
break;
|
|
288336
|
+
default:
|
|
288337
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
|
|
288338
|
+
}
|
|
288339
|
+
break;
|
|
288340
|
+
}
|
|
288341
|
+
default:
|
|
288342
|
+
throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
|
|
288321
288343
|
}
|
|
288322
|
-
return
|
|
288323
|
-
}
|
|
288324
|
-
/* harmony default export */ const jwk_to_key = (
|
|
288344
|
+
return { algorithm, keyUsages };
|
|
288345
|
+
}
|
|
288346
|
+
/* harmony default export */ const jwk_to_key = (async (jwk) => {
|
|
288347
|
+
if (!jwk.alg) {
|
|
288348
|
+
throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
|
|
288349
|
+
}
|
|
288350
|
+
const { algorithm, keyUsages } = subtleMapping(jwk);
|
|
288351
|
+
const keyData = { ...jwk };
|
|
288352
|
+
delete keyData.alg;
|
|
288353
|
+
delete keyData.use;
|
|
288354
|
+
return crypto.subtle.importKey('jwk', keyData, algorithm, jwk.ext ?? (jwk.d ? false : true), jwk.key_ops ?? keyUsages);
|
|
288355
|
+
});
|
|
288325
288356
|
|
|
288326
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288357
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/key/import.js
|
|
288327
288358
|
|
|
288328
288359
|
|
|
288329
288360
|
|
|
@@ -288347,11 +288378,13 @@ async function importPKCS8(pkcs8, alg, options) {
|
|
|
288347
288378
|
}
|
|
288348
288379
|
return fromPKCS8(pkcs8, alg, options);
|
|
288349
288380
|
}
|
|
288350
|
-
async function importJWK(jwk, alg) {
|
|
288351
|
-
if (!
|
|
288381
|
+
async function importJWK(jwk, alg, options) {
|
|
288382
|
+
if (!is_object(jwk)) {
|
|
288352
288383
|
throw new TypeError('JWK must be an object');
|
|
288353
288384
|
}
|
|
288354
|
-
|
|
288385
|
+
let ext;
|
|
288386
|
+
alg ??= jwk.alg;
|
|
288387
|
+
ext ??= options?.extractable ?? jwk.ext;
|
|
288355
288388
|
switch (jwk.kty) {
|
|
288356
288389
|
case 'oct':
|
|
288357
288390
|
if (typeof jwk.k !== 'string' || !jwk.k) {
|
|
@@ -288359,97 +288392,18 @@ async function importJWK(jwk, alg) {
|
|
|
288359
288392
|
}
|
|
288360
288393
|
return decode(jwk.k);
|
|
288361
288394
|
case 'RSA':
|
|
288362
|
-
if (jwk.oth !== undefined) {
|
|
288363
|
-
throw new
|
|
288395
|
+
if ('oth' in jwk && jwk.oth !== undefined) {
|
|
288396
|
+
throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
|
|
288364
288397
|
}
|
|
288365
288398
|
case 'EC':
|
|
288366
288399
|
case 'OKP':
|
|
288367
|
-
return jwk_to_key({ ...jwk, alg });
|
|
288400
|
+
return jwk_to_key({ ...jwk, alg, ext });
|
|
288368
288401
|
default:
|
|
288369
|
-
throw new
|
|
288402
|
+
throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
|
|
288370
288403
|
}
|
|
288371
288404
|
}
|
|
288372
288405
|
|
|
288373
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288374
|
-
|
|
288375
|
-
|
|
288376
|
-
|
|
288377
|
-
const tag = (key) => key?.[Symbol.toStringTag];
|
|
288378
|
-
const jwkMatchesOp = (alg, key, usage) => {
|
|
288379
|
-
if (key.use !== undefined && key.use !== 'sig') {
|
|
288380
|
-
throw new TypeError('Invalid key for this operation, when present its use must be sig');
|
|
288381
|
-
}
|
|
288382
|
-
if (key.key_ops !== undefined && key.key_ops.includes?.(usage) !== true) {
|
|
288383
|
-
throw new TypeError(`Invalid key for this operation, when present its key_ops must include ${usage}`);
|
|
288384
|
-
}
|
|
288385
|
-
if (key.alg !== undefined && key.alg !== alg) {
|
|
288386
|
-
throw new TypeError(`Invalid key for this operation, when present its alg must be ${alg}`);
|
|
288387
|
-
}
|
|
288388
|
-
return true;
|
|
288389
|
-
};
|
|
288390
|
-
const symmetricTypeCheck = (alg, key, usage, allowJwk) => {
|
|
288391
|
-
if (key instanceof Uint8Array)
|
|
288392
|
-
return;
|
|
288393
|
-
if (allowJwk && isJWK(key)) {
|
|
288394
|
-
if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288395
|
-
return;
|
|
288396
|
-
throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
|
|
288397
|
-
}
|
|
288398
|
-
if (!is_key_like(key)) {
|
|
288399
|
-
throw new TypeError(withAlg(alg, key, ...is_key_like_types, 'Uint8Array', allowJwk ? 'JSON Web Key' : null));
|
|
288400
|
-
}
|
|
288401
|
-
if (key.type !== 'secret') {
|
|
288402
|
-
throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
|
|
288403
|
-
}
|
|
288404
|
-
};
|
|
288405
|
-
const asymmetricTypeCheck = (alg, key, usage, allowJwk) => {
|
|
288406
|
-
if (allowJwk && isJWK(key)) {
|
|
288407
|
-
switch (usage) {
|
|
288408
|
-
case 'sign':
|
|
288409
|
-
if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288410
|
-
return;
|
|
288411
|
-
throw new TypeError(`JSON Web Key for this operation be a private JWK`);
|
|
288412
|
-
case 'verify':
|
|
288413
|
-
if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288414
|
-
return;
|
|
288415
|
-
throw new TypeError(`JSON Web Key for this operation be a public JWK`);
|
|
288416
|
-
}
|
|
288417
|
-
}
|
|
288418
|
-
if (!is_key_like(key)) {
|
|
288419
|
-
throw new TypeError(withAlg(alg, key, ...is_key_like_types, allowJwk ? 'JSON Web Key' : null));
|
|
288420
|
-
}
|
|
288421
|
-
if (key.type === 'secret') {
|
|
288422
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
|
|
288423
|
-
}
|
|
288424
|
-
if (usage === 'sign' && key.type === 'public') {
|
|
288425
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
|
|
288426
|
-
}
|
|
288427
|
-
if (usage === 'decrypt' && key.type === 'public') {
|
|
288428
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
|
|
288429
|
-
}
|
|
288430
|
-
if (key.algorithm && usage === 'verify' && key.type === 'private') {
|
|
288431
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
|
|
288432
|
-
}
|
|
288433
|
-
if (key.algorithm && usage === 'encrypt' && key.type === 'private') {
|
|
288434
|
-
throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
|
|
288435
|
-
}
|
|
288436
|
-
};
|
|
288437
|
-
function checkKeyType(allowJwk, alg, key, usage) {
|
|
288438
|
-
const symmetric = alg.startsWith('HS') ||
|
|
288439
|
-
alg === 'dir' ||
|
|
288440
|
-
alg.startsWith('PBES2') ||
|
|
288441
|
-
/^A\d{3}(?:GCM)?KW$/.test(alg);
|
|
288442
|
-
if (symmetric) {
|
|
288443
|
-
symmetricTypeCheck(alg, key, usage, allowJwk);
|
|
288444
|
-
}
|
|
288445
|
-
else {
|
|
288446
|
-
asymmetricTypeCheck(alg, key, usage, allowJwk);
|
|
288447
|
-
}
|
|
288448
|
-
}
|
|
288449
|
-
/* harmony default export */ const check_key_type = (checkKeyType.bind(undefined, false));
|
|
288450
|
-
const checkKeyTypeWithJwk = checkKeyType.bind(undefined, true);
|
|
288451
|
-
|
|
288452
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/lib/aesgcmkw.js
|
|
288406
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/aesgcmkw.js
|
|
288453
288407
|
|
|
288454
288408
|
|
|
288455
288409
|
|
|
@@ -288458,17 +288412,16 @@ async function aesgcmkw_wrap(alg, key, cek, iv) {
|
|
|
288458
288412
|
const wrapped = await encrypt(jweAlgorithm, cek, key, iv, new Uint8Array(0));
|
|
288459
288413
|
return {
|
|
288460
288414
|
encryptedKey: wrapped.ciphertext,
|
|
288461
|
-
iv:
|
|
288462
|
-
tag:
|
|
288415
|
+
iv: b64u(wrapped.iv),
|
|
288416
|
+
tag: b64u(wrapped.tag),
|
|
288463
288417
|
};
|
|
288464
288418
|
}
|
|
288465
288419
|
async function aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag) {
|
|
288466
288420
|
const jweAlgorithm = alg.slice(0, 7);
|
|
288467
|
-
return
|
|
288421
|
+
return decrypt(jweAlgorithm, key, encryptedKey, iv, tag, new Uint8Array(0));
|
|
288468
288422
|
}
|
|
288469
288423
|
|
|
288470
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288471
|
-
|
|
288424
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/decrypt_key_management.js
|
|
288472
288425
|
|
|
288473
288426
|
|
|
288474
288427
|
|
|
@@ -288480,9 +288433,7 @@ async function aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag) {
|
|
|
288480
288433
|
|
|
288481
288434
|
|
|
288482
288435
|
|
|
288483
|
-
|
|
288484
|
-
check_key_type(alg, key, 'decrypt');
|
|
288485
|
-
key = (await normalize_key.normalizePrivateKey?.(key, alg)) || key;
|
|
288436
|
+
/* harmony default export */ const decrypt_key_management = (async (alg, key, encryptedKey, joseHeader, options) => {
|
|
288486
288437
|
switch (alg) {
|
|
288487
288438
|
case 'dir': {
|
|
288488
288439
|
if (encryptedKey !== undefined)
|
|
@@ -288495,11 +288446,13 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288495
288446
|
case 'ECDH-ES+A128KW':
|
|
288496
288447
|
case 'ECDH-ES+A192KW':
|
|
288497
288448
|
case 'ECDH-ES+A256KW': {
|
|
288498
|
-
if (!
|
|
288449
|
+
if (!is_object(joseHeader.epk))
|
|
288499
288450
|
throw new JWEInvalid(`JOSE Header "epk" (Ephemeral Public Key) missing or invalid`);
|
|
288500
|
-
|
|
288501
|
-
|
|
288451
|
+
is_key_like_assertCryptoKey(key);
|
|
288452
|
+
if (!allowed(key))
|
|
288453
|
+
throw new JOSENotSupported('ECDH with the provided key is not allowed or not supported by your javascript runtime');
|
|
288502
288454
|
const epk = await importJWK(joseHeader.epk, alg);
|
|
288455
|
+
is_key_like_assertCryptoKey(epk);
|
|
288503
288456
|
let partyUInfo;
|
|
288504
288457
|
let partyVInfo;
|
|
288505
288458
|
if (joseHeader.apu !== undefined) {
|
|
@@ -288529,13 +288482,13 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288529
288482
|
throw new JWEInvalid('JWE Encrypted Key missing');
|
|
288530
288483
|
return unwrap(alg.slice(-6), sharedSecret, encryptedKey);
|
|
288531
288484
|
}
|
|
288532
|
-
case 'RSA1_5':
|
|
288533
288485
|
case 'RSA-OAEP':
|
|
288534
288486
|
case 'RSA-OAEP-256':
|
|
288535
288487
|
case 'RSA-OAEP-384':
|
|
288536
288488
|
case 'RSA-OAEP-512': {
|
|
288537
288489
|
if (encryptedKey === undefined)
|
|
288538
288490
|
throw new JWEInvalid('JWE Encrypted Key missing');
|
|
288491
|
+
is_key_like_assertCryptoKey(key);
|
|
288539
288492
|
return rsaes_decrypt(alg, key, encryptedKey);
|
|
288540
288493
|
}
|
|
288541
288494
|
case 'PBES2-HS256+A128KW':
|
|
@@ -288557,7 +288510,7 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288557
288510
|
catch {
|
|
288558
288511
|
throw new JWEInvalid('Failed to base64url decode the p2s');
|
|
288559
288512
|
}
|
|
288560
|
-
return
|
|
288513
|
+
return pbes2kw_unwrap(alg, key, encryptedKey, joseHeader.p2c, p2s);
|
|
288561
288514
|
}
|
|
288562
288515
|
case 'A128KW':
|
|
288563
288516
|
case 'A192KW':
|
|
@@ -288592,15 +288545,14 @@ async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options)
|
|
|
288592
288545
|
return aesgcmkw_unwrap(alg, key, encryptedKey, iv, tag);
|
|
288593
288546
|
}
|
|
288594
288547
|
default: {
|
|
288595
|
-
throw new
|
|
288548
|
+
throw new JOSENotSupported('Invalid or unsupported "alg" (JWE Algorithm) header value');
|
|
288596
288549
|
}
|
|
288597
288550
|
}
|
|
288598
|
-
}
|
|
288599
|
-
/* harmony default export */ const decrypt_key_management = (decryptKeyManagement);
|
|
288551
|
+
});
|
|
288600
288552
|
|
|
288601
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288553
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/validate_crit.js
|
|
288602
288554
|
|
|
288603
|
-
|
|
288555
|
+
/* harmony default export */ const validate_crit = ((Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) => {
|
|
288604
288556
|
if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {
|
|
288605
288557
|
throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
|
|
288606
288558
|
}
|
|
@@ -288621,7 +288573,7 @@ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader,
|
|
|
288621
288573
|
}
|
|
288622
288574
|
for (const parameter of protectedHeader.crit) {
|
|
288623
288575
|
if (!recognized.has(parameter)) {
|
|
288624
|
-
throw new
|
|
288576
|
+
throw new JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
|
|
288625
288577
|
}
|
|
288626
288578
|
if (joseHeader[parameter] === undefined) {
|
|
288627
288579
|
throw new Err(`Extension Header Parameter "${parameter}" is missing`);
|
|
@@ -288631,11 +288583,10 @@ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader,
|
|
|
288631
288583
|
}
|
|
288632
288584
|
}
|
|
288633
288585
|
return new Set(protectedHeader.crit);
|
|
288634
|
-
}
|
|
288635
|
-
/* harmony default export */ const validate_crit = (validateCrit);
|
|
288586
|
+
});
|
|
288636
288587
|
|
|
288637
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
288638
|
-
const
|
|
288588
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/validate_algorithms.js
|
|
288589
|
+
/* harmony default export */ const validate_algorithms = ((option, algorithms) => {
|
|
288639
288590
|
if (algorithms !== undefined &&
|
|
288640
288591
|
(!Array.isArray(algorithms) || algorithms.some((s) => typeof s !== 'string'))) {
|
|
288641
288592
|
throw new TypeError(`"${option}" option must be an array of strings`);
|
|
@@ -288644,10 +288595,320 @@ const validateAlgorithms = (option, algorithms) => {
|
|
|
288644
288595
|
return undefined;
|
|
288645
288596
|
}
|
|
288646
288597
|
return new Set(algorithms);
|
|
288598
|
+
});
|
|
288599
|
+
|
|
288600
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/is_jwk.js
|
|
288601
|
+
|
|
288602
|
+
function isJWK(key) {
|
|
288603
|
+
return is_object(key) && typeof key.kty === 'string';
|
|
288604
|
+
}
|
|
288605
|
+
function isPrivateJWK(key) {
|
|
288606
|
+
return key.kty !== 'oct' && typeof key.d === 'string';
|
|
288607
|
+
}
|
|
288608
|
+
function isPublicJWK(key) {
|
|
288609
|
+
return key.kty !== 'oct' && typeof key.d === 'undefined';
|
|
288610
|
+
}
|
|
288611
|
+
function isSecretJWK(key) {
|
|
288612
|
+
return key.kty === 'oct' && typeof key.k === 'string';
|
|
288613
|
+
}
|
|
288614
|
+
|
|
288615
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/normalize_key.js
|
|
288616
|
+
|
|
288617
|
+
|
|
288618
|
+
|
|
288619
|
+
|
|
288620
|
+
let cache;
|
|
288621
|
+
const handleJWK = async (key, jwk, alg, freeze = false) => {
|
|
288622
|
+
cache ||= new WeakMap();
|
|
288623
|
+
let cached = cache.get(key);
|
|
288624
|
+
if (cached?.[alg]) {
|
|
288625
|
+
return cached[alg];
|
|
288626
|
+
}
|
|
288627
|
+
const cryptoKey = await jwk_to_key({ ...jwk, alg });
|
|
288628
|
+
if (freeze)
|
|
288629
|
+
Object.freeze(key);
|
|
288630
|
+
if (!cached) {
|
|
288631
|
+
cache.set(key, { [alg]: cryptoKey });
|
|
288632
|
+
}
|
|
288633
|
+
else {
|
|
288634
|
+
cached[alg] = cryptoKey;
|
|
288635
|
+
}
|
|
288636
|
+
return cryptoKey;
|
|
288637
|
+
};
|
|
288638
|
+
const handleKeyObject = (keyObject, alg) => {
|
|
288639
|
+
cache ||= new WeakMap();
|
|
288640
|
+
let cached = cache.get(keyObject);
|
|
288641
|
+
if (cached?.[alg]) {
|
|
288642
|
+
return cached[alg];
|
|
288643
|
+
}
|
|
288644
|
+
const isPublic = keyObject.type === 'public';
|
|
288645
|
+
const extractable = isPublic ? true : false;
|
|
288646
|
+
let cryptoKey;
|
|
288647
|
+
if (keyObject.asymmetricKeyType === 'x25519') {
|
|
288648
|
+
switch (alg) {
|
|
288649
|
+
case 'ECDH-ES':
|
|
288650
|
+
case 'ECDH-ES+A128KW':
|
|
288651
|
+
case 'ECDH-ES+A192KW':
|
|
288652
|
+
case 'ECDH-ES+A256KW':
|
|
288653
|
+
break;
|
|
288654
|
+
default:
|
|
288655
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288656
|
+
}
|
|
288657
|
+
cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : ['deriveBits']);
|
|
288658
|
+
}
|
|
288659
|
+
if (keyObject.asymmetricKeyType === 'ed25519') {
|
|
288660
|
+
if (alg !== 'EdDSA' && alg !== 'Ed25519') {
|
|
288661
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288662
|
+
}
|
|
288663
|
+
cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [
|
|
288664
|
+
isPublic ? 'verify' : 'sign',
|
|
288665
|
+
]);
|
|
288666
|
+
}
|
|
288667
|
+
if (keyObject.asymmetricKeyType === 'rsa') {
|
|
288668
|
+
let hash;
|
|
288669
|
+
switch (alg) {
|
|
288670
|
+
case 'RSA-OAEP':
|
|
288671
|
+
hash = 'SHA-1';
|
|
288672
|
+
break;
|
|
288673
|
+
case 'RS256':
|
|
288674
|
+
case 'PS256':
|
|
288675
|
+
case 'RSA-OAEP-256':
|
|
288676
|
+
hash = 'SHA-256';
|
|
288677
|
+
break;
|
|
288678
|
+
case 'RS384':
|
|
288679
|
+
case 'PS384':
|
|
288680
|
+
case 'RSA-OAEP-384':
|
|
288681
|
+
hash = 'SHA-384';
|
|
288682
|
+
break;
|
|
288683
|
+
case 'RS512':
|
|
288684
|
+
case 'PS512':
|
|
288685
|
+
case 'RSA-OAEP-512':
|
|
288686
|
+
hash = 'SHA-512';
|
|
288687
|
+
break;
|
|
288688
|
+
default:
|
|
288689
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288690
|
+
}
|
|
288691
|
+
if (alg.startsWith('RSA-OAEP')) {
|
|
288692
|
+
return keyObject.toCryptoKey({
|
|
288693
|
+
name: 'RSA-OAEP',
|
|
288694
|
+
hash,
|
|
288695
|
+
}, extractable, isPublic ? ['encrypt'] : ['decrypt']);
|
|
288696
|
+
}
|
|
288697
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288698
|
+
name: alg.startsWith('PS') ? 'RSA-PSS' : 'RSASSA-PKCS1-v1_5',
|
|
288699
|
+
hash,
|
|
288700
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288701
|
+
}
|
|
288702
|
+
if (keyObject.asymmetricKeyType === 'ec') {
|
|
288703
|
+
const nist = new Map([
|
|
288704
|
+
['prime256v1', 'P-256'],
|
|
288705
|
+
['secp384r1', 'P-384'],
|
|
288706
|
+
['secp521r1', 'P-521'],
|
|
288707
|
+
]);
|
|
288708
|
+
const namedCurve = nist.get(keyObject.asymmetricKeyDetails?.namedCurve);
|
|
288709
|
+
if (!namedCurve) {
|
|
288710
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288711
|
+
}
|
|
288712
|
+
if (alg === 'ES256' && namedCurve === 'P-256') {
|
|
288713
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288714
|
+
name: 'ECDSA',
|
|
288715
|
+
namedCurve,
|
|
288716
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288717
|
+
}
|
|
288718
|
+
if (alg === 'ES384' && namedCurve === 'P-384') {
|
|
288719
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288720
|
+
name: 'ECDSA',
|
|
288721
|
+
namedCurve,
|
|
288722
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288723
|
+
}
|
|
288724
|
+
if (alg === 'ES512' && namedCurve === 'P-521') {
|
|
288725
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288726
|
+
name: 'ECDSA',
|
|
288727
|
+
namedCurve,
|
|
288728
|
+
}, extractable, [isPublic ? 'verify' : 'sign']);
|
|
288729
|
+
}
|
|
288730
|
+
if (alg.startsWith('ECDH-ES')) {
|
|
288731
|
+
cryptoKey = keyObject.toCryptoKey({
|
|
288732
|
+
name: 'ECDH',
|
|
288733
|
+
namedCurve,
|
|
288734
|
+
}, extractable, isPublic ? [] : ['deriveBits']);
|
|
288735
|
+
}
|
|
288736
|
+
}
|
|
288737
|
+
if (!cryptoKey) {
|
|
288738
|
+
throw new TypeError('given KeyObject instance cannot be used for this algorithm');
|
|
288739
|
+
}
|
|
288740
|
+
if (!cached) {
|
|
288741
|
+
cache.set(keyObject, { [alg]: cryptoKey });
|
|
288742
|
+
}
|
|
288743
|
+
else {
|
|
288744
|
+
cached[alg] = cryptoKey;
|
|
288745
|
+
}
|
|
288746
|
+
return cryptoKey;
|
|
288647
288747
|
};
|
|
288648
|
-
/* harmony default export */ const
|
|
288748
|
+
/* harmony default export */ const normalize_key = (async (key, alg) => {
|
|
288749
|
+
if (key instanceof Uint8Array) {
|
|
288750
|
+
return key;
|
|
288751
|
+
}
|
|
288752
|
+
if (isCryptoKey(key)) {
|
|
288753
|
+
return key;
|
|
288754
|
+
}
|
|
288755
|
+
if (isKeyObject(key)) {
|
|
288756
|
+
if (key.type === 'secret') {
|
|
288757
|
+
return key.export();
|
|
288758
|
+
}
|
|
288759
|
+
if ('toCryptoKey' in key && typeof key.toCryptoKey === 'function') {
|
|
288760
|
+
try {
|
|
288761
|
+
return handleKeyObject(key, alg);
|
|
288762
|
+
}
|
|
288763
|
+
catch (err) {
|
|
288764
|
+
if (err instanceof TypeError) {
|
|
288765
|
+
throw err;
|
|
288766
|
+
}
|
|
288767
|
+
}
|
|
288768
|
+
}
|
|
288769
|
+
let jwk = key.export({ format: 'jwk' });
|
|
288770
|
+
return handleJWK(key, jwk, alg);
|
|
288771
|
+
}
|
|
288772
|
+
if (isJWK(key)) {
|
|
288773
|
+
if (key.k) {
|
|
288774
|
+
return decode(key.k);
|
|
288775
|
+
}
|
|
288776
|
+
return handleJWK(key, key, alg, true);
|
|
288777
|
+
}
|
|
288778
|
+
throw new Error('unreachable');
|
|
288779
|
+
});
|
|
288780
|
+
|
|
288781
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/lib/check_key_type.js
|
|
288782
|
+
|
|
288783
|
+
|
|
288784
|
+
|
|
288785
|
+
const tag = (key) => key?.[Symbol.toStringTag];
|
|
288786
|
+
const jwkMatchesOp = (alg, key, usage) => {
|
|
288787
|
+
if (key.use !== undefined) {
|
|
288788
|
+
let expected;
|
|
288789
|
+
switch (usage) {
|
|
288790
|
+
case 'sign':
|
|
288791
|
+
case 'verify':
|
|
288792
|
+
expected = 'sig';
|
|
288793
|
+
break;
|
|
288794
|
+
case 'encrypt':
|
|
288795
|
+
case 'decrypt':
|
|
288796
|
+
expected = 'enc';
|
|
288797
|
+
break;
|
|
288798
|
+
}
|
|
288799
|
+
if (key.use !== expected) {
|
|
288800
|
+
throw new TypeError(`Invalid key for this operation, its "use" must be "${expected}" when present`);
|
|
288801
|
+
}
|
|
288802
|
+
}
|
|
288803
|
+
if (key.alg !== undefined && key.alg !== alg) {
|
|
288804
|
+
throw new TypeError(`Invalid key for this operation, its "alg" must be "${alg}" when present`);
|
|
288805
|
+
}
|
|
288806
|
+
if (Array.isArray(key.key_ops)) {
|
|
288807
|
+
let expectedKeyOp;
|
|
288808
|
+
switch (true) {
|
|
288809
|
+
case usage === 'sign' || usage === 'verify':
|
|
288810
|
+
case alg === 'dir':
|
|
288811
|
+
case alg.includes('CBC-HS'):
|
|
288812
|
+
expectedKeyOp = usage;
|
|
288813
|
+
break;
|
|
288814
|
+
case alg.startsWith('PBES2'):
|
|
288815
|
+
expectedKeyOp = 'deriveBits';
|
|
288816
|
+
break;
|
|
288817
|
+
case /^A\d{3}(?:GCM)?(?:KW)?$/.test(alg):
|
|
288818
|
+
if (!alg.includes('GCM') && alg.endsWith('KW')) {
|
|
288819
|
+
expectedKeyOp = usage === 'encrypt' ? 'wrapKey' : 'unwrapKey';
|
|
288820
|
+
}
|
|
288821
|
+
else {
|
|
288822
|
+
expectedKeyOp = usage;
|
|
288823
|
+
}
|
|
288824
|
+
break;
|
|
288825
|
+
case usage === 'encrypt' && alg.startsWith('RSA'):
|
|
288826
|
+
expectedKeyOp = 'wrapKey';
|
|
288827
|
+
break;
|
|
288828
|
+
case usage === 'decrypt':
|
|
288829
|
+
expectedKeyOp = alg.startsWith('RSA') ? 'unwrapKey' : 'deriveBits';
|
|
288830
|
+
break;
|
|
288831
|
+
}
|
|
288832
|
+
if (expectedKeyOp && key.key_ops?.includes?.(expectedKeyOp) === false) {
|
|
288833
|
+
throw new TypeError(`Invalid key for this operation, its "key_ops" must include "${expectedKeyOp}" when present`);
|
|
288834
|
+
}
|
|
288835
|
+
}
|
|
288836
|
+
return true;
|
|
288837
|
+
};
|
|
288838
|
+
const symmetricTypeCheck = (alg, key, usage) => {
|
|
288839
|
+
if (key instanceof Uint8Array)
|
|
288840
|
+
return;
|
|
288841
|
+
if (isJWK(key)) {
|
|
288842
|
+
if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288843
|
+
return;
|
|
288844
|
+
throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
|
|
288845
|
+
}
|
|
288846
|
+
if (!is_key_like(key)) {
|
|
288847
|
+
throw new TypeError(withAlg(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key', 'Uint8Array'));
|
|
288848
|
+
}
|
|
288849
|
+
if (key.type !== 'secret') {
|
|
288850
|
+
throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
|
|
288851
|
+
}
|
|
288852
|
+
};
|
|
288853
|
+
const asymmetricTypeCheck = (alg, key, usage) => {
|
|
288854
|
+
if (isJWK(key)) {
|
|
288855
|
+
switch (usage) {
|
|
288856
|
+
case 'decrypt':
|
|
288857
|
+
case 'sign':
|
|
288858
|
+
if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288859
|
+
return;
|
|
288860
|
+
throw new TypeError(`JSON Web Key for this operation be a private JWK`);
|
|
288861
|
+
case 'encrypt':
|
|
288862
|
+
case 'verify':
|
|
288863
|
+
if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
|
|
288864
|
+
return;
|
|
288865
|
+
throw new TypeError(`JSON Web Key for this operation be a public JWK`);
|
|
288866
|
+
}
|
|
288867
|
+
}
|
|
288868
|
+
if (!is_key_like(key)) {
|
|
288869
|
+
throw new TypeError(withAlg(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key'));
|
|
288870
|
+
}
|
|
288871
|
+
if (key.type === 'secret') {
|
|
288872
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
|
|
288873
|
+
}
|
|
288874
|
+
if (key.type === 'public') {
|
|
288875
|
+
switch (usage) {
|
|
288876
|
+
case 'sign':
|
|
288877
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
|
|
288878
|
+
case 'decrypt':
|
|
288879
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
|
|
288880
|
+
default:
|
|
288881
|
+
break;
|
|
288882
|
+
}
|
|
288883
|
+
}
|
|
288884
|
+
if (key.type === 'private') {
|
|
288885
|
+
switch (usage) {
|
|
288886
|
+
case 'verify':
|
|
288887
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
|
|
288888
|
+
case 'encrypt':
|
|
288889
|
+
throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
|
|
288890
|
+
default:
|
|
288891
|
+
break;
|
|
288892
|
+
}
|
|
288893
|
+
}
|
|
288894
|
+
};
|
|
288895
|
+
/* harmony default export */ const check_key_type = ((alg, key, usage) => {
|
|
288896
|
+
const symmetric = alg.startsWith('HS') ||
|
|
288897
|
+
alg === 'dir' ||
|
|
288898
|
+
alg.startsWith('PBES2') ||
|
|
288899
|
+
/^A(?:128|192|256)(?:GCM)?(?:KW)?$/.test(alg) ||
|
|
288900
|
+
/^A(?:128|192|256)CBC-HS(?:256|384|512)$/.test(alg);
|
|
288901
|
+
if (symmetric) {
|
|
288902
|
+
symmetricTypeCheck(alg, key, usage);
|
|
288903
|
+
}
|
|
288904
|
+
else {
|
|
288905
|
+
asymmetricTypeCheck(alg, key, usage);
|
|
288906
|
+
}
|
|
288907
|
+
});
|
|
288908
|
+
|
|
288909
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/jwe/flattened/decrypt.js
|
|
288910
|
+
|
|
288649
288911
|
|
|
288650
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/node/esm/jwe/flattened/decrypt.js
|
|
288651
288912
|
|
|
288652
288913
|
|
|
288653
288914
|
|
|
@@ -288659,7 +288920,7 @@ const validateAlgorithms = (option, algorithms) => {
|
|
|
288659
288920
|
|
|
288660
288921
|
|
|
288661
288922
|
async function flattenedDecrypt(jwe, key, options) {
|
|
288662
|
-
if (!
|
|
288923
|
+
if (!is_object(jwe)) {
|
|
288663
288924
|
throw new JWEInvalid('Flattened JWE must be an object');
|
|
288664
288925
|
}
|
|
288665
288926
|
if (jwe.protected === undefined && jwe.header === undefined && jwe.unprotected === undefined) {
|
|
@@ -288683,10 +288944,10 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288683
288944
|
if (jwe.aad !== undefined && typeof jwe.aad !== 'string') {
|
|
288684
288945
|
throw new JWEInvalid('JWE AAD incorrect type');
|
|
288685
288946
|
}
|
|
288686
|
-
if (jwe.header !== undefined && !
|
|
288947
|
+
if (jwe.header !== undefined && !is_object(jwe.header)) {
|
|
288687
288948
|
throw new JWEInvalid('JWE Shared Unprotected Header incorrect type');
|
|
288688
288949
|
}
|
|
288689
|
-
if (jwe.unprotected !== undefined && !
|
|
288950
|
+
if (jwe.unprotected !== undefined && !is_object(jwe.unprotected)) {
|
|
288690
288951
|
throw new JWEInvalid('JWE Per-Recipient Unprotected Header incorrect type');
|
|
288691
288952
|
}
|
|
288692
288953
|
let parsedProt;
|
|
@@ -288709,7 +288970,7 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288709
288970
|
};
|
|
288710
288971
|
validate_crit(JWEInvalid, new Map(), options?.crit, parsedProt, joseHeader);
|
|
288711
288972
|
if (joseHeader.zip !== undefined) {
|
|
288712
|
-
throw new
|
|
288973
|
+
throw new JOSENotSupported('JWE "zip" (Compression Algorithm) Header Parameter is not supported.');
|
|
288713
288974
|
}
|
|
288714
288975
|
const { alg, enc } = joseHeader;
|
|
288715
288976
|
if (typeof alg !== 'string' || !alg) {
|
|
@@ -288742,12 +289003,14 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288742
289003
|
key = await key(parsedProt, jwe);
|
|
288743
289004
|
resolvedKey = true;
|
|
288744
289005
|
}
|
|
289006
|
+
check_key_type(alg === 'dir' ? enc : alg, key, 'decrypt');
|
|
289007
|
+
const k = await normalize_key(key, alg);
|
|
288745
289008
|
let cek;
|
|
288746
289009
|
try {
|
|
288747
|
-
cek = await decrypt_key_management(alg,
|
|
289010
|
+
cek = await decrypt_key_management(alg, k, encryptedKey, joseHeader, options);
|
|
288748
289011
|
}
|
|
288749
289012
|
catch (err) {
|
|
288750
|
-
if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof
|
|
289013
|
+
if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof JOSENotSupported) {
|
|
288751
289014
|
throw err;
|
|
288752
289015
|
}
|
|
288753
289016
|
cek = lib_cek(enc);
|
|
@@ -288773,7 +289036,7 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288773
289036
|
const protectedHeader = buffer_utils_encoder.encode(jwe.protected ?? '');
|
|
288774
289037
|
let additionalData;
|
|
288775
289038
|
if (jwe.aad !== undefined) {
|
|
288776
|
-
additionalData =
|
|
289039
|
+
additionalData = concat(protectedHeader, buffer_utils_encoder.encode('.'), buffer_utils_encoder.encode(jwe.aad));
|
|
288777
289040
|
}
|
|
288778
289041
|
else {
|
|
288779
289042
|
additionalData = protectedHeader;
|
|
@@ -288785,7 +289048,7 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288785
289048
|
catch {
|
|
288786
289049
|
throw new JWEInvalid('Failed to base64url decode the ciphertext');
|
|
288787
289050
|
}
|
|
288788
|
-
const plaintext = await
|
|
289051
|
+
const plaintext = await decrypt(enc, cek, ciphertext, iv, tag, additionalData);
|
|
288789
289052
|
const result = { plaintext };
|
|
288790
289053
|
if (jwe.protected !== undefined) {
|
|
288791
289054
|
result.protectedHeader = parsedProt;
|
|
@@ -288805,12 +289068,12 @@ async function flattenedDecrypt(jwe, key, options) {
|
|
|
288805
289068
|
result.unprotectedHeader = jwe.header;
|
|
288806
289069
|
}
|
|
288807
289070
|
if (resolvedKey) {
|
|
288808
|
-
return { ...result, key };
|
|
289071
|
+
return { ...result, key: k };
|
|
288809
289072
|
}
|
|
288810
289073
|
return result;
|
|
288811
289074
|
}
|
|
288812
289075
|
|
|
288813
|
-
;// CONCATENATED MODULE: ../../node_modules/jose/dist/
|
|
289076
|
+
;// CONCATENATED MODULE: ../../node_modules/jose/dist/webapi/jwe/compact/decrypt.js
|
|
288814
289077
|
|
|
288815
289078
|
|
|
288816
289079
|
|
|
@@ -288847,7 +289110,7 @@ let headers;
|
|
|
288847
289110
|
let build_USER_AGENT;
|
|
288848
289111
|
if (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {
|
|
288849
289112
|
const NAME = 'openid-client';
|
|
288850
|
-
const VERSION = 'v6.
|
|
289113
|
+
const VERSION = 'v6.3.4';
|
|
288851
289114
|
build_USER_AGENT = `${NAME}/${VERSION}`;
|
|
288852
289115
|
headers = { 'user-agent': build_USER_AGENT };
|
|
288853
289116
|
}
|
|
@@ -289172,11 +289435,10 @@ function selectCryptoKeyForDecryption(keys, alg, kid, epk) {
|
|
|
289172
289435
|
return key.key;
|
|
289173
289436
|
}
|
|
289174
289437
|
async function build_decrypt(keys, jwe, contentEncryptionAlgorithms, keyManagementAlgorithms) {
|
|
289175
|
-
return build_decoder.decode((await compactDecrypt(jwe,
|
|
289438
|
+
return build_decoder.decode((await compactDecrypt(jwe, (header) => {
|
|
289176
289439
|
const { kid, alg, epk } = header;
|
|
289177
289440
|
return selectCryptoKeyForDecryption(keys, alg, kid, epk);
|
|
289178
|
-
}, { keyManagementAlgorithms, contentEncryptionAlgorithms })
|
|
289179
|
-
.catch((err) => {
|
|
289441
|
+
}, { keyManagementAlgorithms, contentEncryptionAlgorithms }).catch((err) => {
|
|
289180
289442
|
if (err instanceof JOSEError) {
|
|
289181
289443
|
throw e('decryption failed', err, 'OAUTH_DECRYPTION_FAILED');
|
|
289182
289444
|
}
|
|
@@ -289382,6 +289644,80 @@ async function initiateDeviceAuthorization(config, parameters) {
|
|
|
289382
289644
|
.then((response) => processDeviceAuthorizationResponse(as, c, response))
|
|
289383
289645
|
.catch(errorHandler);
|
|
289384
289646
|
}
|
|
289647
|
+
async function initiateBackchannelAuthentication(config, parameters) {
|
|
289648
|
+
checkConfig(config);
|
|
289649
|
+
const { as, c, auth, fetch, tlsOnly, timeout } = build_int(config);
|
|
289650
|
+
return backchannelAuthenticationRequest(as, c, auth, parameters, {
|
|
289651
|
+
[customFetch]: fetch,
|
|
289652
|
+
[allowInsecureRequests]: !tlsOnly,
|
|
289653
|
+
headers: new Headers(headers),
|
|
289654
|
+
signal: build_signal(timeout),
|
|
289655
|
+
})
|
|
289656
|
+
.then((response) => processBackchannelAuthenticationResponse(as, c, response))
|
|
289657
|
+
.catch(errorHandler);
|
|
289658
|
+
}
|
|
289659
|
+
async function pollBackchannelAuthenticationGrant(config, backchannelAuthenticationResponse, parameters, options) {
|
|
289660
|
+
checkConfig(config);
|
|
289661
|
+
parameters = new URLSearchParams(parameters);
|
|
289662
|
+
let interval = backchannelAuthenticationResponse.interval ?? 5;
|
|
289663
|
+
const pollingSignal = options?.signal ??
|
|
289664
|
+
AbortSignal.timeout(backchannelAuthenticationResponse.expires_in * 1000);
|
|
289665
|
+
try {
|
|
289666
|
+
pollingSignal.throwIfAborted();
|
|
289667
|
+
}
|
|
289668
|
+
catch (err) {
|
|
289669
|
+
errorHandler(err);
|
|
289670
|
+
}
|
|
289671
|
+
await wait(interval);
|
|
289672
|
+
const { as, c, auth, fetch, tlsOnly, nonRepudiation, timeout, decrypt } = build_int(config);
|
|
289673
|
+
const response = await backchannelAuthenticationGrantRequest(as, c, auth, backchannelAuthenticationResponse.auth_req_id, {
|
|
289674
|
+
[customFetch]: fetch,
|
|
289675
|
+
[allowInsecureRequests]: !tlsOnly,
|
|
289676
|
+
additionalParameters: parameters,
|
|
289677
|
+
DPoP: options?.DPoP,
|
|
289678
|
+
headers: new Headers(headers),
|
|
289679
|
+
signal: pollingSignal.aborted ? pollingSignal : build_signal(timeout),
|
|
289680
|
+
})
|
|
289681
|
+
.catch(errorHandler);
|
|
289682
|
+
const p = processBackchannelAuthenticationGrantResponse(as, c, response, {
|
|
289683
|
+
[jweDecrypt]: decrypt,
|
|
289684
|
+
});
|
|
289685
|
+
let result;
|
|
289686
|
+
try {
|
|
289687
|
+
result = await p;
|
|
289688
|
+
}
|
|
289689
|
+
catch (err) {
|
|
289690
|
+
if (retryable(err, options)) {
|
|
289691
|
+
return pollBackchannelAuthenticationGrant(config, {
|
|
289692
|
+
...backchannelAuthenticationResponse,
|
|
289693
|
+
interval,
|
|
289694
|
+
}, parameters, {
|
|
289695
|
+
...options,
|
|
289696
|
+
signal: pollingSignal,
|
|
289697
|
+
flag: retry,
|
|
289698
|
+
});
|
|
289699
|
+
}
|
|
289700
|
+
if (err instanceof ResponseBodyError) {
|
|
289701
|
+
switch (err.error) {
|
|
289702
|
+
case 'slow_down':
|
|
289703
|
+
interval += 5;
|
|
289704
|
+
case 'authorization_pending':
|
|
289705
|
+
return pollBackchannelAuthenticationGrant(config, {
|
|
289706
|
+
...backchannelAuthenticationResponse,
|
|
289707
|
+
interval,
|
|
289708
|
+
}, parameters, {
|
|
289709
|
+
...options,
|
|
289710
|
+
signal: pollingSignal,
|
|
289711
|
+
flag: undefined,
|
|
289712
|
+
});
|
|
289713
|
+
}
|
|
289714
|
+
}
|
|
289715
|
+
errorHandler(err);
|
|
289716
|
+
}
|
|
289717
|
+
result.id_token && (await nonRepudiation?.(response));
|
|
289718
|
+
addHelpers(result);
|
|
289719
|
+
return result;
|
|
289720
|
+
}
|
|
289385
289721
|
function build_allowInsecureRequests(config) {
|
|
289386
289722
|
build_int(config).tlsOnly = false;
|
|
289387
289723
|
}
|