@liquidcommercedev/rmn-sdk 1.4.1-beta.2 → 1.4.1-beta.3

Sign up to get free protection for your applications and to get access to all the features.
package/dist/index.cjs CHANGED
@@ -1,7 +1,5 @@
1
1
  'use strict';
2
2
 
3
- var jose = require('jose');
4
-
5
3
  exports.RMN_SPOT_TYPE = void 0;
6
4
  (function (RMN_SPOT_TYPE) {
7
5
  // Reserve Bar Spot Types
@@ -436,7 +434,7 @@ const isNumber = typeOfTest('number');
436
434
  *
437
435
  * @returns {boolean} True if value is an Object, otherwise false
438
436
  */
439
- const isObject = (thing) => thing !== null && typeof thing === 'object';
437
+ const isObject$1 = (thing) => thing !== null && typeof thing === 'object';
440
438
 
441
439
  /**
442
440
  * Determine if a value is a Boolean
@@ -505,7 +503,7 @@ const isFileList = kindOfTest('FileList');
505
503
  *
506
504
  * @returns {boolean} True if value is a Stream, otherwise false
507
505
  */
508
- const isStream = (val) => isObject(val) && isFunction(val.pipe);
506
+ const isStream = (val) => isObject$1(val) && isFunction(val.pipe);
509
507
 
510
508
  /**
511
509
  * Determine if a value is a FormData
@@ -965,7 +963,7 @@ const toJSONObject = (obj) => {
965
963
 
966
964
  const visit = (source, i) => {
967
965
 
968
- if (isObject(source)) {
966
+ if (isObject$1(source)) {
969
967
  if (stack.indexOf(source) >= 0) {
970
968
  return;
971
969
  }
@@ -994,7 +992,7 @@ const toJSONObject = (obj) => {
994
992
  const isAsyncFn = kindOfTest('AsyncFunction');
995
993
 
996
994
  const isThenable = (thing) =>
997
- thing && (isObject(thing) || isFunction(thing)) && isFunction(thing.then) && isFunction(thing.catch);
995
+ thing && (isObject$1(thing) || isFunction(thing)) && isFunction(thing.then) && isFunction(thing.catch);
998
996
 
999
997
  // original code
1000
998
  // https://github.com/DigitalBrainJS/AxiosPromise/blob/16deab13710ec09779922131f3fa5954320f83ab/lib/utils.js#L11-L34
@@ -1035,7 +1033,7 @@ var utils$1 = {
1035
1033
  isString,
1036
1034
  isNumber,
1037
1035
  isBoolean,
1038
- isObject,
1036
+ isObject: isObject$1,
1039
1037
  isPlainObject,
1040
1038
  isReadableStream,
1041
1039
  isRequest,
@@ -3383,7 +3381,7 @@ function toFormData(obj, formData, options) {
3383
3381
  *
3384
3382
  * @returns {string} The encoded string.
3385
3383
  */
3386
- function encode$1(str) {
3384
+ function encode$2(str) {
3387
3385
  const charMap = {
3388
3386
  '!': '%21',
3389
3387
  "'": '%27',
@@ -3420,8 +3418,8 @@ prototype.append = function append(name, value) {
3420
3418
 
3421
3419
  prototype.toString = function toString(encoder) {
3422
3420
  const _encode = encoder ? function(value) {
3423
- return encoder.call(this, value, encode$1);
3424
- } : encode$1;
3421
+ return encoder.call(this, value, encode$2);
3422
+ } : encode$2;
3425
3423
 
3426
3424
  return this._pairs.map(function each(pair) {
3427
3425
  return _encode(pair[0]) + '=' + _encode(pair[1]);
@@ -3436,7 +3434,7 @@ prototype.toString = function toString(encoder) {
3436
3434
  *
3437
3435
  * @returns {string} The encoded value.
3438
3436
  */
3439
- function encode(val) {
3437
+ function encode$1(val) {
3440
3438
  return encodeURIComponent(val).
3441
3439
  replace(/%3A/gi, ':').
3442
3440
  replace(/%24/g, '$').
@@ -3461,7 +3459,7 @@ function buildURL(url, params, options) {
3461
3459
  return url;
3462
3460
  }
3463
3461
 
3464
- const _encode = options && options.encode || encode;
3462
+ const _encode = options && options.encode || encode$1;
3465
3463
 
3466
3464
  const serializeFn = options && options.serialize;
3467
3465
 
@@ -13661,6 +13659,1168 @@ function requireBlowfish () {
13661
13659
 
13662
13660
  var cryptoJsExports = cryptoJs.exports;
13663
13661
 
13662
+ var crypto$1 = crypto;
13663
+ const isCryptoKey = (key) => key instanceof CryptoKey;
13664
+
13665
+ const encoder = new TextEncoder();
13666
+ const decoder = new TextDecoder();
13667
+ function concat(...buffers) {
13668
+ const size = buffers.reduce((acc, { length }) => acc + length, 0);
13669
+ const buf = new Uint8Array(size);
13670
+ let i = 0;
13671
+ for (const buffer of buffers) {
13672
+ buf.set(buffer, i);
13673
+ i += buffer.length;
13674
+ }
13675
+ return buf;
13676
+ }
13677
+
13678
+ const encodeBase64 = (input) => {
13679
+ let unencoded = input;
13680
+ if (typeof unencoded === 'string') {
13681
+ unencoded = encoder.encode(unencoded);
13682
+ }
13683
+ const CHUNK_SIZE = 0x8000;
13684
+ const arr = [];
13685
+ for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {
13686
+ arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));
13687
+ }
13688
+ return btoa(arr.join(''));
13689
+ };
13690
+ const encode = (input) => {
13691
+ return encodeBase64(input).replace(/=/g, '').replace(/\+/g, '-').replace(/\//g, '_');
13692
+ };
13693
+ const decodeBase64 = (encoded) => {
13694
+ const binary = atob(encoded);
13695
+ const bytes = new Uint8Array(binary.length);
13696
+ for (let i = 0; i < binary.length; i++) {
13697
+ bytes[i] = binary.charCodeAt(i);
13698
+ }
13699
+ return bytes;
13700
+ };
13701
+ const decode = (input) => {
13702
+ let encoded = input;
13703
+ if (encoded instanceof Uint8Array) {
13704
+ encoded = decoder.decode(encoded);
13705
+ }
13706
+ encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\s/g, '');
13707
+ try {
13708
+ return decodeBase64(encoded);
13709
+ }
13710
+ catch {
13711
+ throw new TypeError('The input to be decoded is not correctly encoded.');
13712
+ }
13713
+ };
13714
+
13715
+ class JOSEError extends Error {
13716
+ static get code() {
13717
+ return 'ERR_JOSE_GENERIC';
13718
+ }
13719
+ constructor(message) {
13720
+ super(message);
13721
+ this.code = 'ERR_JOSE_GENERIC';
13722
+ this.name = this.constructor.name;
13723
+ Error.captureStackTrace?.(this, this.constructor);
13724
+ }
13725
+ }
13726
+ class JWTClaimValidationFailed extends JOSEError {
13727
+ static get code() {
13728
+ return 'ERR_JWT_CLAIM_VALIDATION_FAILED';
13729
+ }
13730
+ constructor(message, payload, claim = 'unspecified', reason = 'unspecified') {
13731
+ super(message);
13732
+ this.code = 'ERR_JWT_CLAIM_VALIDATION_FAILED';
13733
+ this.claim = claim;
13734
+ this.reason = reason;
13735
+ this.payload = payload;
13736
+ }
13737
+ }
13738
+ class JWTExpired extends JOSEError {
13739
+ static get code() {
13740
+ return 'ERR_JWT_EXPIRED';
13741
+ }
13742
+ constructor(message, payload, claim = 'unspecified', reason = 'unspecified') {
13743
+ super(message);
13744
+ this.code = 'ERR_JWT_EXPIRED';
13745
+ this.claim = claim;
13746
+ this.reason = reason;
13747
+ this.payload = payload;
13748
+ }
13749
+ }
13750
+ class JOSENotSupported extends JOSEError {
13751
+ constructor() {
13752
+ super(...arguments);
13753
+ this.code = 'ERR_JOSE_NOT_SUPPORTED';
13754
+ }
13755
+ static get code() {
13756
+ return 'ERR_JOSE_NOT_SUPPORTED';
13757
+ }
13758
+ }
13759
+ class JWSInvalid extends JOSEError {
13760
+ constructor() {
13761
+ super(...arguments);
13762
+ this.code = 'ERR_JWS_INVALID';
13763
+ }
13764
+ static get code() {
13765
+ return 'ERR_JWS_INVALID';
13766
+ }
13767
+ }
13768
+ class JWTInvalid extends JOSEError {
13769
+ constructor() {
13770
+ super(...arguments);
13771
+ this.code = 'ERR_JWT_INVALID';
13772
+ }
13773
+ static get code() {
13774
+ return 'ERR_JWT_INVALID';
13775
+ }
13776
+ }
13777
+ class JWSSignatureVerificationFailed extends JOSEError {
13778
+ constructor() {
13779
+ super(...arguments);
13780
+ this.code = 'ERR_JWS_SIGNATURE_VERIFICATION_FAILED';
13781
+ this.message = 'signature verification failed';
13782
+ }
13783
+ static get code() {
13784
+ return 'ERR_JWS_SIGNATURE_VERIFICATION_FAILED';
13785
+ }
13786
+ }
13787
+
13788
+ function unusable(name, prop = 'algorithm.name') {
13789
+ return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
13790
+ }
13791
+ function isAlgorithm(algorithm, name) {
13792
+ return algorithm.name === name;
13793
+ }
13794
+ function getHashLength(hash) {
13795
+ return parseInt(hash.name.slice(4), 10);
13796
+ }
13797
+ function getNamedCurve(alg) {
13798
+ switch (alg) {
13799
+ case 'ES256':
13800
+ return 'P-256';
13801
+ case 'ES384':
13802
+ return 'P-384';
13803
+ case 'ES512':
13804
+ return 'P-521';
13805
+ default:
13806
+ throw new Error('unreachable');
13807
+ }
13808
+ }
13809
+ function checkUsage(key, usages) {
13810
+ if (usages.length && !usages.some((expected) => key.usages.includes(expected))) {
13811
+ let msg = 'CryptoKey does not support this operation, its usages must include ';
13812
+ if (usages.length > 2) {
13813
+ const last = usages.pop();
13814
+ msg += `one of ${usages.join(', ')}, or ${last}.`;
13815
+ }
13816
+ else if (usages.length === 2) {
13817
+ msg += `one of ${usages[0]} or ${usages[1]}.`;
13818
+ }
13819
+ else {
13820
+ msg += `${usages[0]}.`;
13821
+ }
13822
+ throw new TypeError(msg);
13823
+ }
13824
+ }
13825
+ function checkSigCryptoKey(key, alg, ...usages) {
13826
+ switch (alg) {
13827
+ case 'HS256':
13828
+ case 'HS384':
13829
+ case 'HS512': {
13830
+ if (!isAlgorithm(key.algorithm, 'HMAC'))
13831
+ throw unusable('HMAC');
13832
+ const expected = parseInt(alg.slice(2), 10);
13833
+ const actual = getHashLength(key.algorithm.hash);
13834
+ if (actual !== expected)
13835
+ throw unusable(`SHA-${expected}`, 'algorithm.hash');
13836
+ break;
13837
+ }
13838
+ case 'RS256':
13839
+ case 'RS384':
13840
+ case 'RS512': {
13841
+ if (!isAlgorithm(key.algorithm, 'RSASSA-PKCS1-v1_5'))
13842
+ throw unusable('RSASSA-PKCS1-v1_5');
13843
+ const expected = parseInt(alg.slice(2), 10);
13844
+ const actual = getHashLength(key.algorithm.hash);
13845
+ if (actual !== expected)
13846
+ throw unusable(`SHA-${expected}`, 'algorithm.hash');
13847
+ break;
13848
+ }
13849
+ case 'PS256':
13850
+ case 'PS384':
13851
+ case 'PS512': {
13852
+ if (!isAlgorithm(key.algorithm, 'RSA-PSS'))
13853
+ throw unusable('RSA-PSS');
13854
+ const expected = parseInt(alg.slice(2), 10);
13855
+ const actual = getHashLength(key.algorithm.hash);
13856
+ if (actual !== expected)
13857
+ throw unusable(`SHA-${expected}`, 'algorithm.hash');
13858
+ break;
13859
+ }
13860
+ case 'EdDSA': {
13861
+ if (key.algorithm.name !== 'Ed25519' && key.algorithm.name !== 'Ed448') {
13862
+ throw unusable('Ed25519 or Ed448');
13863
+ }
13864
+ break;
13865
+ }
13866
+ case 'ES256':
13867
+ case 'ES384':
13868
+ case 'ES512': {
13869
+ if (!isAlgorithm(key.algorithm, 'ECDSA'))
13870
+ throw unusable('ECDSA');
13871
+ const expected = getNamedCurve(alg);
13872
+ const actual = key.algorithm.namedCurve;
13873
+ if (actual !== expected)
13874
+ throw unusable(expected, 'algorithm.namedCurve');
13875
+ break;
13876
+ }
13877
+ default:
13878
+ throw new TypeError('CryptoKey does not support this operation');
13879
+ }
13880
+ checkUsage(key, usages);
13881
+ }
13882
+
13883
+ function message(msg, actual, ...types) {
13884
+ types = types.filter(Boolean);
13885
+ if (types.length > 2) {
13886
+ const last = types.pop();
13887
+ msg += `one of type ${types.join(', ')}, or ${last}.`;
13888
+ }
13889
+ else if (types.length === 2) {
13890
+ msg += `one of type ${types[0]} or ${types[1]}.`;
13891
+ }
13892
+ else {
13893
+ msg += `of type ${types[0]}.`;
13894
+ }
13895
+ if (actual == null) {
13896
+ msg += ` Received ${actual}`;
13897
+ }
13898
+ else if (typeof actual === 'function' && actual.name) {
13899
+ msg += ` Received function ${actual.name}`;
13900
+ }
13901
+ else if (typeof actual === 'object' && actual != null) {
13902
+ if (actual.constructor?.name) {
13903
+ msg += ` Received an instance of ${actual.constructor.name}`;
13904
+ }
13905
+ }
13906
+ return msg;
13907
+ }
13908
+ var invalidKeyInput = (actual, ...types) => {
13909
+ return message('Key must be ', actual, ...types);
13910
+ };
13911
+ function withAlg(alg, actual, ...types) {
13912
+ return message(`Key for the ${alg} algorithm must be `, actual, ...types);
13913
+ }
13914
+
13915
+ var isKeyLike = (key) => {
13916
+ if (isCryptoKey(key)) {
13917
+ return true;
13918
+ }
13919
+ return key?.[Symbol.toStringTag] === 'KeyObject';
13920
+ };
13921
+ const types = ['CryptoKey'];
13922
+
13923
+ const isDisjoint = (...headers) => {
13924
+ const sources = headers.filter(Boolean);
13925
+ if (sources.length === 0 || sources.length === 1) {
13926
+ return true;
13927
+ }
13928
+ let acc;
13929
+ for (const header of sources) {
13930
+ const parameters = Object.keys(header);
13931
+ if (!acc || acc.size === 0) {
13932
+ acc = new Set(parameters);
13933
+ continue;
13934
+ }
13935
+ for (const parameter of parameters) {
13936
+ if (acc.has(parameter)) {
13937
+ return false;
13938
+ }
13939
+ acc.add(parameter);
13940
+ }
13941
+ }
13942
+ return true;
13943
+ };
13944
+
13945
+ function isObjectLike(value) {
13946
+ return typeof value === 'object' && value !== null;
13947
+ }
13948
+ function isObject(input) {
13949
+ if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {
13950
+ return false;
13951
+ }
13952
+ if (Object.getPrototypeOf(input) === null) {
13953
+ return true;
13954
+ }
13955
+ let proto = input;
13956
+ while (Object.getPrototypeOf(proto) !== null) {
13957
+ proto = Object.getPrototypeOf(proto);
13958
+ }
13959
+ return Object.getPrototypeOf(input) === proto;
13960
+ }
13961
+
13962
+ var checkKeyLength = (alg, key) => {
13963
+ if (alg.startsWith('RS') || alg.startsWith('PS')) {
13964
+ const { modulusLength } = key.algorithm;
13965
+ if (typeof modulusLength !== 'number' || modulusLength < 2048) {
13966
+ throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
13967
+ }
13968
+ }
13969
+ };
13970
+
13971
+ function isJWK(key) {
13972
+ return isObject(key) && typeof key.kty === 'string';
13973
+ }
13974
+ function isPrivateJWK(key) {
13975
+ return key.kty !== 'oct' && typeof key.d === 'string';
13976
+ }
13977
+ function isPublicJWK(key) {
13978
+ return key.kty !== 'oct' && typeof key.d === 'undefined';
13979
+ }
13980
+ function isSecretJWK(key) {
13981
+ return isJWK(key) && key.kty === 'oct' && typeof key.k === 'string';
13982
+ }
13983
+
13984
+ function subtleMapping(jwk) {
13985
+ let algorithm;
13986
+ let keyUsages;
13987
+ switch (jwk.kty) {
13988
+ case 'RSA': {
13989
+ switch (jwk.alg) {
13990
+ case 'PS256':
13991
+ case 'PS384':
13992
+ case 'PS512':
13993
+ algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };
13994
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
13995
+ break;
13996
+ case 'RS256':
13997
+ case 'RS384':
13998
+ case 'RS512':
13999
+ algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };
14000
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
14001
+ break;
14002
+ case 'RSA-OAEP':
14003
+ case 'RSA-OAEP-256':
14004
+ case 'RSA-OAEP-384':
14005
+ case 'RSA-OAEP-512':
14006
+ algorithm = {
14007
+ name: 'RSA-OAEP',
14008
+ hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,
14009
+ };
14010
+ keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];
14011
+ break;
14012
+ default:
14013
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
14014
+ }
14015
+ break;
14016
+ }
14017
+ case 'EC': {
14018
+ switch (jwk.alg) {
14019
+ case 'ES256':
14020
+ algorithm = { name: 'ECDSA', namedCurve: 'P-256' };
14021
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
14022
+ break;
14023
+ case 'ES384':
14024
+ algorithm = { name: 'ECDSA', namedCurve: 'P-384' };
14025
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
14026
+ break;
14027
+ case 'ES512':
14028
+ algorithm = { name: 'ECDSA', namedCurve: 'P-521' };
14029
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
14030
+ break;
14031
+ case 'ECDH-ES':
14032
+ case 'ECDH-ES+A128KW':
14033
+ case 'ECDH-ES+A192KW':
14034
+ case 'ECDH-ES+A256KW':
14035
+ algorithm = { name: 'ECDH', namedCurve: jwk.crv };
14036
+ keyUsages = jwk.d ? ['deriveBits'] : [];
14037
+ break;
14038
+ default:
14039
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
14040
+ }
14041
+ break;
14042
+ }
14043
+ case 'OKP': {
14044
+ switch (jwk.alg) {
14045
+ case 'EdDSA':
14046
+ algorithm = { name: jwk.crv };
14047
+ keyUsages = jwk.d ? ['sign'] : ['verify'];
14048
+ break;
14049
+ case 'ECDH-ES':
14050
+ case 'ECDH-ES+A128KW':
14051
+ case 'ECDH-ES+A192KW':
14052
+ case 'ECDH-ES+A256KW':
14053
+ algorithm = { name: jwk.crv };
14054
+ keyUsages = jwk.d ? ['deriveBits'] : [];
14055
+ break;
14056
+ default:
14057
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
14058
+ }
14059
+ break;
14060
+ }
14061
+ default:
14062
+ throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
14063
+ }
14064
+ return { algorithm, keyUsages };
14065
+ }
14066
+ const parse = async (jwk) => {
14067
+ if (!jwk.alg) {
14068
+ throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
14069
+ }
14070
+ const { algorithm, keyUsages } = subtleMapping(jwk);
14071
+ const rest = [
14072
+ algorithm,
14073
+ jwk.ext ?? false,
14074
+ jwk.key_ops ?? keyUsages,
14075
+ ];
14076
+ const keyData = { ...jwk };
14077
+ delete keyData.alg;
14078
+ delete keyData.use;
14079
+ return crypto$1.subtle.importKey('jwk', keyData, ...rest);
14080
+ };
14081
+
14082
+ const exportKeyValue = (k) => decode(k);
14083
+ let privCache;
14084
+ let pubCache;
14085
+ const isKeyObject = (key) => {
14086
+ return key?.[Symbol.toStringTag] === 'KeyObject';
14087
+ };
14088
+ const importAndCache = async (cache, key, jwk, alg, freeze = false) => {
14089
+ let cached = cache.get(key);
14090
+ if (cached?.[alg]) {
14091
+ return cached[alg];
14092
+ }
14093
+ const cryptoKey = await parse({ ...jwk, alg });
14094
+ if (freeze)
14095
+ Object.freeze(key);
14096
+ if (!cached) {
14097
+ cache.set(key, { [alg]: cryptoKey });
14098
+ }
14099
+ else {
14100
+ cached[alg] = cryptoKey;
14101
+ }
14102
+ return cryptoKey;
14103
+ };
14104
+ const normalizePublicKey = (key, alg) => {
14105
+ if (isKeyObject(key)) {
14106
+ let jwk = key.export({ format: 'jwk' });
14107
+ delete jwk.d;
14108
+ delete jwk.dp;
14109
+ delete jwk.dq;
14110
+ delete jwk.p;
14111
+ delete jwk.q;
14112
+ delete jwk.qi;
14113
+ if (jwk.k) {
14114
+ return exportKeyValue(jwk.k);
14115
+ }
14116
+ pubCache || (pubCache = new WeakMap());
14117
+ return importAndCache(pubCache, key, jwk, alg);
14118
+ }
14119
+ if (isJWK(key)) {
14120
+ if (key.k)
14121
+ return decode(key.k);
14122
+ pubCache || (pubCache = new WeakMap());
14123
+ const cryptoKey = importAndCache(pubCache, key, key, alg, true);
14124
+ return cryptoKey;
14125
+ }
14126
+ return key;
14127
+ };
14128
+ const normalizePrivateKey = (key, alg) => {
14129
+ if (isKeyObject(key)) {
14130
+ let jwk = key.export({ format: 'jwk' });
14131
+ if (jwk.k) {
14132
+ return exportKeyValue(jwk.k);
14133
+ }
14134
+ privCache || (privCache = new WeakMap());
14135
+ return importAndCache(privCache, key, jwk, alg);
14136
+ }
14137
+ if (isJWK(key)) {
14138
+ if (key.k)
14139
+ return decode(key.k);
14140
+ privCache || (privCache = new WeakMap());
14141
+ const cryptoKey = importAndCache(privCache, key, key, alg, true);
14142
+ return cryptoKey;
14143
+ }
14144
+ return key;
14145
+ };
14146
+ var normalize = { normalizePublicKey, normalizePrivateKey };
14147
+
14148
+ async function importJWK(jwk, alg) {
14149
+ if (!isObject(jwk)) {
14150
+ throw new TypeError('JWK must be an object');
14151
+ }
14152
+ alg || (alg = jwk.alg);
14153
+ switch (jwk.kty) {
14154
+ case 'oct':
14155
+ if (typeof jwk.k !== 'string' || !jwk.k) {
14156
+ throw new TypeError('missing "k" (Key Value) Parameter value');
14157
+ }
14158
+ return decode(jwk.k);
14159
+ case 'RSA':
14160
+ if (jwk.oth !== undefined) {
14161
+ throw new JOSENotSupported('RSA JWK "oth" (Other Primes Info) Parameter value is not supported');
14162
+ }
14163
+ case 'EC':
14164
+ case 'OKP':
14165
+ return parse({ ...jwk, alg });
14166
+ default:
14167
+ throw new JOSENotSupported('Unsupported "kty" (Key Type) Parameter value');
14168
+ }
14169
+ }
14170
+
14171
+ const tag = (key) => key?.[Symbol.toStringTag];
14172
+ const jwkMatchesOp = (alg, key, usage) => {
14173
+ if (key.use !== undefined && key.use !== 'sig') {
14174
+ throw new TypeError('Invalid key for this operation, when present its use must be sig');
14175
+ }
14176
+ if (key.key_ops !== undefined && key.key_ops.includes?.(usage) !== true) {
14177
+ throw new TypeError(`Invalid key for this operation, when present its key_ops must include ${usage}`);
14178
+ }
14179
+ if (key.alg !== undefined && key.alg !== alg) {
14180
+ throw new TypeError(`Invalid key for this operation, when present its alg must be ${alg}`);
14181
+ }
14182
+ return true;
14183
+ };
14184
+ const symmetricTypeCheck = (alg, key, usage, allowJwk) => {
14185
+ if (key instanceof Uint8Array)
14186
+ return;
14187
+ if (allowJwk && isJWK(key)) {
14188
+ if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
14189
+ return;
14190
+ throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
14191
+ }
14192
+ if (!isKeyLike(key)) {
14193
+ throw new TypeError(withAlg(alg, key, ...types, 'Uint8Array', allowJwk ? 'JSON Web Key' : null));
14194
+ }
14195
+ if (key.type !== 'secret') {
14196
+ throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type "secret"`);
14197
+ }
14198
+ };
14199
+ const asymmetricTypeCheck = (alg, key, usage, allowJwk) => {
14200
+ if (allowJwk && isJWK(key)) {
14201
+ switch (usage) {
14202
+ case 'sign':
14203
+ if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
14204
+ return;
14205
+ throw new TypeError(`JSON Web Key for this operation be a private JWK`);
14206
+ case 'verify':
14207
+ if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
14208
+ return;
14209
+ throw new TypeError(`JSON Web Key for this operation be a public JWK`);
14210
+ }
14211
+ }
14212
+ if (!isKeyLike(key)) {
14213
+ throw new TypeError(withAlg(alg, key, ...types, allowJwk ? 'JSON Web Key' : null));
14214
+ }
14215
+ if (key.type === 'secret') {
14216
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type "secret"`);
14217
+ }
14218
+ if (usage === 'sign' && key.type === 'public') {
14219
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type "private"`);
14220
+ }
14221
+ if (usage === 'decrypt' && key.type === 'public') {
14222
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type "private"`);
14223
+ }
14224
+ if (key.algorithm && usage === 'verify' && key.type === 'private') {
14225
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`);
14226
+ }
14227
+ if (key.algorithm && usage === 'encrypt' && key.type === 'private') {
14228
+ throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`);
14229
+ }
14230
+ };
14231
+ function checkKeyType(allowJwk, alg, key, usage) {
14232
+ const symmetric = alg.startsWith('HS') ||
14233
+ alg === 'dir' ||
14234
+ alg.startsWith('PBES2') ||
14235
+ /^A\d{3}(?:GCM)?KW$/.test(alg);
14236
+ if (symmetric) {
14237
+ symmetricTypeCheck(alg, key, usage, allowJwk);
14238
+ }
14239
+ else {
14240
+ asymmetricTypeCheck(alg, key, usage, allowJwk);
14241
+ }
14242
+ }
14243
+ checkKeyType.bind(undefined, false);
14244
+ const checkKeyTypeWithJwk = checkKeyType.bind(undefined, true);
14245
+
14246
+ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
14247
+ if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {
14248
+ throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
14249
+ }
14250
+ if (!protectedHeader || protectedHeader.crit === undefined) {
14251
+ return new Set();
14252
+ }
14253
+ if (!Array.isArray(protectedHeader.crit) ||
14254
+ protectedHeader.crit.length === 0 ||
14255
+ protectedHeader.crit.some((input) => typeof input !== 'string' || input.length === 0)) {
14256
+ throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
14257
+ }
14258
+ let recognized;
14259
+ if (recognizedOption !== undefined) {
14260
+ recognized = new Map([...Object.entries(recognizedOption), ...recognizedDefault.entries()]);
14261
+ }
14262
+ else {
14263
+ recognized = recognizedDefault;
14264
+ }
14265
+ for (const parameter of protectedHeader.crit) {
14266
+ if (!recognized.has(parameter)) {
14267
+ throw new JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
14268
+ }
14269
+ if (joseHeader[parameter] === undefined) {
14270
+ throw new Err(`Extension Header Parameter "${parameter}" is missing`);
14271
+ }
14272
+ if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
14273
+ throw new Err(`Extension Header Parameter "${parameter}" MUST be integrity protected`);
14274
+ }
14275
+ }
14276
+ return new Set(protectedHeader.crit);
14277
+ }
14278
+
14279
+ function subtleDsa(alg, algorithm) {
14280
+ const hash = `SHA-${alg.slice(-3)}`;
14281
+ switch (alg) {
14282
+ case 'HS256':
14283
+ case 'HS384':
14284
+ case 'HS512':
14285
+ return { hash, name: 'HMAC' };
14286
+ case 'PS256':
14287
+ case 'PS384':
14288
+ case 'PS512':
14289
+ return { hash, name: 'RSA-PSS', saltLength: alg.slice(-3) >> 3 };
14290
+ case 'RS256':
14291
+ case 'RS384':
14292
+ case 'RS512':
14293
+ return { hash, name: 'RSASSA-PKCS1-v1_5' };
14294
+ case 'ES256':
14295
+ case 'ES384':
14296
+ case 'ES512':
14297
+ return { hash, name: 'ECDSA', namedCurve: algorithm.namedCurve };
14298
+ case 'EdDSA':
14299
+ return { name: algorithm.name };
14300
+ default:
14301
+ throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
14302
+ }
14303
+ }
14304
+
14305
+ async function getCryptoKey(alg, key, usage) {
14306
+ if (usage === 'sign') {
14307
+ key = await normalize.normalizePrivateKey(key, alg);
14308
+ }
14309
+ if (usage === 'verify') {
14310
+ key = await normalize.normalizePublicKey(key, alg);
14311
+ }
14312
+ if (isCryptoKey(key)) {
14313
+ checkSigCryptoKey(key, alg, usage);
14314
+ return key;
14315
+ }
14316
+ if (key instanceof Uint8Array) {
14317
+ if (!alg.startsWith('HS')) {
14318
+ throw new TypeError(invalidKeyInput(key, ...types));
14319
+ }
14320
+ return crypto$1.subtle.importKey('raw', key, { hash: `SHA-${alg.slice(-3)}`, name: 'HMAC' }, false, [usage]);
14321
+ }
14322
+ throw new TypeError(invalidKeyInput(key, ...types, 'Uint8Array', 'JSON Web Key'));
14323
+ }
14324
+
14325
+ const verify = async (alg, key, signature, data) => {
14326
+ const cryptoKey = await getCryptoKey(alg, key, 'verify');
14327
+ checkKeyLength(alg, cryptoKey);
14328
+ const algorithm = subtleDsa(alg, cryptoKey.algorithm);
14329
+ try {
14330
+ return await crypto$1.subtle.verify(algorithm, cryptoKey, signature, data);
14331
+ }
14332
+ catch {
14333
+ return false;
14334
+ }
14335
+ };
14336
+
14337
+ async function flattenedVerify(jws, key, options) {
14338
+ if (!isObject(jws)) {
14339
+ throw new JWSInvalid('Flattened JWS must be an object');
14340
+ }
14341
+ if (jws.protected === undefined && jws.header === undefined) {
14342
+ throw new JWSInvalid('Flattened JWS must have either of the "protected" or "header" members');
14343
+ }
14344
+ if (jws.protected !== undefined && typeof jws.protected !== 'string') {
14345
+ throw new JWSInvalid('JWS Protected Header incorrect type');
14346
+ }
14347
+ if (jws.payload === undefined) {
14348
+ throw new JWSInvalid('JWS Payload missing');
14349
+ }
14350
+ if (typeof jws.signature !== 'string') {
14351
+ throw new JWSInvalid('JWS Signature missing or incorrect type');
14352
+ }
14353
+ if (jws.header !== undefined && !isObject(jws.header)) {
14354
+ throw new JWSInvalid('JWS Unprotected Header incorrect type');
14355
+ }
14356
+ let parsedProt = {};
14357
+ if (jws.protected) {
14358
+ try {
14359
+ const protectedHeader = decode(jws.protected);
14360
+ parsedProt = JSON.parse(decoder.decode(protectedHeader));
14361
+ }
14362
+ catch {
14363
+ throw new JWSInvalid('JWS Protected Header is invalid');
14364
+ }
14365
+ }
14366
+ if (!isDisjoint(parsedProt, jws.header)) {
14367
+ throw new JWSInvalid('JWS Protected and JWS Unprotected Header Parameter names must be disjoint');
14368
+ }
14369
+ const joseHeader = {
14370
+ ...parsedProt,
14371
+ ...jws.header,
14372
+ };
14373
+ const extensions = validateCrit(JWSInvalid, new Map([['b64', true]]), options?.crit, parsedProt, joseHeader);
14374
+ let b64 = true;
14375
+ if (extensions.has('b64')) {
14376
+ b64 = parsedProt.b64;
14377
+ if (typeof b64 !== 'boolean') {
14378
+ throw new JWSInvalid('The "b64" (base64url-encode payload) Header Parameter must be a boolean');
14379
+ }
14380
+ }
14381
+ const { alg } = joseHeader;
14382
+ if (typeof alg !== 'string' || !alg) {
14383
+ throw new JWSInvalid('JWS "alg" (Algorithm) Header Parameter missing or invalid');
14384
+ }
14385
+ if (b64) {
14386
+ if (typeof jws.payload !== 'string') {
14387
+ throw new JWSInvalid('JWS Payload must be a string');
14388
+ }
14389
+ }
14390
+ else if (typeof jws.payload !== 'string' && !(jws.payload instanceof Uint8Array)) {
14391
+ throw new JWSInvalid('JWS Payload must be a string or an Uint8Array instance');
14392
+ }
14393
+ let resolvedKey = false;
14394
+ if (typeof key === 'function') {
14395
+ key = await key(parsedProt, jws);
14396
+ resolvedKey = true;
14397
+ checkKeyTypeWithJwk(alg, key, 'verify');
14398
+ if (isJWK(key)) {
14399
+ key = await importJWK(key, alg);
14400
+ }
14401
+ }
14402
+ else {
14403
+ checkKeyTypeWithJwk(alg, key, 'verify');
14404
+ }
14405
+ const data = concat(encoder.encode(jws.protected ?? ''), encoder.encode('.'), typeof jws.payload === 'string' ? encoder.encode(jws.payload) : jws.payload);
14406
+ let signature;
14407
+ try {
14408
+ signature = decode(jws.signature);
14409
+ }
14410
+ catch {
14411
+ throw new JWSInvalid('Failed to base64url decode the signature');
14412
+ }
14413
+ const verified = await verify(alg, key, signature, data);
14414
+ if (!verified) {
14415
+ throw new JWSSignatureVerificationFailed();
14416
+ }
14417
+ let payload;
14418
+ if (b64) {
14419
+ try {
14420
+ payload = decode(jws.payload);
14421
+ }
14422
+ catch {
14423
+ throw new JWSInvalid('Failed to base64url decode the payload');
14424
+ }
14425
+ }
14426
+ else if (typeof jws.payload === 'string') {
14427
+ payload = encoder.encode(jws.payload);
14428
+ }
14429
+ else {
14430
+ payload = jws.payload;
14431
+ }
14432
+ const result = { payload };
14433
+ if (jws.protected !== undefined) {
14434
+ result.protectedHeader = parsedProt;
14435
+ }
14436
+ if (jws.header !== undefined) {
14437
+ result.unprotectedHeader = jws.header;
14438
+ }
14439
+ if (resolvedKey) {
14440
+ return { ...result, key };
14441
+ }
14442
+ return result;
14443
+ }
14444
+
14445
+ async function compactVerify(jws, key, options) {
14446
+ if (jws instanceof Uint8Array) {
14447
+ jws = decoder.decode(jws);
14448
+ }
14449
+ if (typeof jws !== 'string') {
14450
+ throw new JWSInvalid('Compact JWS must be a string or Uint8Array');
14451
+ }
14452
+ const { 0: protectedHeader, 1: payload, 2: signature, length } = jws.split('.');
14453
+ if (length !== 3) {
14454
+ throw new JWSInvalid('Invalid Compact JWS');
14455
+ }
14456
+ const verified = await flattenedVerify({ payload, protected: protectedHeader, signature }, key, options);
14457
+ const result = { payload: verified.payload, protectedHeader: verified.protectedHeader };
14458
+ if (typeof key === 'function') {
14459
+ return { ...result, key: verified.key };
14460
+ }
14461
+ return result;
14462
+ }
14463
+
14464
+ var epoch = (date) => Math.floor(date.getTime() / 1000);
14465
+
14466
+ const minute = 60;
14467
+ const hour = minute * 60;
14468
+ const day = hour * 24;
14469
+ const week = day * 7;
14470
+ const year = day * 365.25;
14471
+ const REGEX = /^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;
14472
+ var secs = (str) => {
14473
+ const matched = REGEX.exec(str);
14474
+ if (!matched || (matched[4] && matched[1])) {
14475
+ throw new TypeError('Invalid time period format');
14476
+ }
14477
+ const value = parseFloat(matched[2]);
14478
+ const unit = matched[3].toLowerCase();
14479
+ let numericDate;
14480
+ switch (unit) {
14481
+ case 'sec':
14482
+ case 'secs':
14483
+ case 'second':
14484
+ case 'seconds':
14485
+ case 's':
14486
+ numericDate = Math.round(value);
14487
+ break;
14488
+ case 'minute':
14489
+ case 'minutes':
14490
+ case 'min':
14491
+ case 'mins':
14492
+ case 'm':
14493
+ numericDate = Math.round(value * minute);
14494
+ break;
14495
+ case 'hour':
14496
+ case 'hours':
14497
+ case 'hr':
14498
+ case 'hrs':
14499
+ case 'h':
14500
+ numericDate = Math.round(value * hour);
14501
+ break;
14502
+ case 'day':
14503
+ case 'days':
14504
+ case 'd':
14505
+ numericDate = Math.round(value * day);
14506
+ break;
14507
+ case 'week':
14508
+ case 'weeks':
14509
+ case 'w':
14510
+ numericDate = Math.round(value * week);
14511
+ break;
14512
+ default:
14513
+ numericDate = Math.round(value * year);
14514
+ break;
14515
+ }
14516
+ if (matched[1] === '-' || matched[4] === 'ago') {
14517
+ return -numericDate;
14518
+ }
14519
+ return numericDate;
14520
+ };
14521
+
14522
+ const normalizeTyp = (value) => value.toLowerCase().replace(/^application\//, '');
14523
+ const checkAudiencePresence = (audPayload, audOption) => {
14524
+ if (typeof audPayload === 'string') {
14525
+ return audOption.includes(audPayload);
14526
+ }
14527
+ if (Array.isArray(audPayload)) {
14528
+ return audOption.some(Set.prototype.has.bind(new Set(audPayload)));
14529
+ }
14530
+ return false;
14531
+ };
14532
+ var jwtPayload = (protectedHeader, encodedPayload, options = {}) => {
14533
+ let payload;
14534
+ try {
14535
+ payload = JSON.parse(decoder.decode(encodedPayload));
14536
+ }
14537
+ catch {
14538
+ }
14539
+ if (!isObject(payload)) {
14540
+ throw new JWTInvalid('JWT Claims Set must be a top-level JSON object');
14541
+ }
14542
+ const { typ } = options;
14543
+ if (typ &&
14544
+ (typeof protectedHeader.typ !== 'string' ||
14545
+ normalizeTyp(protectedHeader.typ) !== normalizeTyp(typ))) {
14546
+ throw new JWTClaimValidationFailed('unexpected "typ" JWT header value', payload, 'typ', 'check_failed');
14547
+ }
14548
+ const { requiredClaims = [], issuer, subject, audience, maxTokenAge } = options;
14549
+ const presenceCheck = [...requiredClaims];
14550
+ if (maxTokenAge !== undefined)
14551
+ presenceCheck.push('iat');
14552
+ if (audience !== undefined)
14553
+ presenceCheck.push('aud');
14554
+ if (subject !== undefined)
14555
+ presenceCheck.push('sub');
14556
+ if (issuer !== undefined)
14557
+ presenceCheck.push('iss');
14558
+ for (const claim of new Set(presenceCheck.reverse())) {
14559
+ if (!(claim in payload)) {
14560
+ throw new JWTClaimValidationFailed(`missing required "${claim}" claim`, payload, claim, 'missing');
14561
+ }
14562
+ }
14563
+ if (issuer &&
14564
+ !(Array.isArray(issuer) ? issuer : [issuer]).includes(payload.iss)) {
14565
+ throw new JWTClaimValidationFailed('unexpected "iss" claim value', payload, 'iss', 'check_failed');
14566
+ }
14567
+ if (subject && payload.sub !== subject) {
14568
+ throw new JWTClaimValidationFailed('unexpected "sub" claim value', payload, 'sub', 'check_failed');
14569
+ }
14570
+ if (audience &&
14571
+ !checkAudiencePresence(payload.aud, typeof audience === 'string' ? [audience] : audience)) {
14572
+ throw new JWTClaimValidationFailed('unexpected "aud" claim value', payload, 'aud', 'check_failed');
14573
+ }
14574
+ let tolerance;
14575
+ switch (typeof options.clockTolerance) {
14576
+ case 'string':
14577
+ tolerance = secs(options.clockTolerance);
14578
+ break;
14579
+ case 'number':
14580
+ tolerance = options.clockTolerance;
14581
+ break;
14582
+ case 'undefined':
14583
+ tolerance = 0;
14584
+ break;
14585
+ default:
14586
+ throw new TypeError('Invalid clockTolerance option type');
14587
+ }
14588
+ const { currentDate } = options;
14589
+ const now = epoch(currentDate || new Date());
14590
+ if ((payload.iat !== undefined || maxTokenAge) && typeof payload.iat !== 'number') {
14591
+ throw new JWTClaimValidationFailed('"iat" claim must be a number', payload, 'iat', 'invalid');
14592
+ }
14593
+ if (payload.nbf !== undefined) {
14594
+ if (typeof payload.nbf !== 'number') {
14595
+ throw new JWTClaimValidationFailed('"nbf" claim must be a number', payload, 'nbf', 'invalid');
14596
+ }
14597
+ if (payload.nbf > now + tolerance) {
14598
+ throw new JWTClaimValidationFailed('"nbf" claim timestamp check failed', payload, 'nbf', 'check_failed');
14599
+ }
14600
+ }
14601
+ if (payload.exp !== undefined) {
14602
+ if (typeof payload.exp !== 'number') {
14603
+ throw new JWTClaimValidationFailed('"exp" claim must be a number', payload, 'exp', 'invalid');
14604
+ }
14605
+ if (payload.exp <= now - tolerance) {
14606
+ throw new JWTExpired('"exp" claim timestamp check failed', payload, 'exp', 'check_failed');
14607
+ }
14608
+ }
14609
+ if (maxTokenAge) {
14610
+ const age = now - payload.iat;
14611
+ const max = typeof maxTokenAge === 'number' ? maxTokenAge : secs(maxTokenAge);
14612
+ if (age - tolerance > max) {
14613
+ throw new JWTExpired('"iat" claim timestamp check failed (too far in the past)', payload, 'iat', 'check_failed');
14614
+ }
14615
+ if (age < 0 - tolerance) {
14616
+ throw new JWTClaimValidationFailed('"iat" claim timestamp check failed (it should be in the past)', payload, 'iat', 'check_failed');
14617
+ }
14618
+ }
14619
+ return payload;
14620
+ };
14621
+
14622
+ async function jwtVerify(jwt, key, options) {
14623
+ const verified = await compactVerify(jwt, key, options);
14624
+ if (verified.protectedHeader.crit?.includes('b64') && verified.protectedHeader.b64 === false) {
14625
+ throw new JWTInvalid('JWTs MUST NOT use unencoded payload');
14626
+ }
14627
+ const payload = jwtPayload(verified.protectedHeader, verified.payload, options);
14628
+ const result = { payload, protectedHeader: verified.protectedHeader };
14629
+ if (typeof key === 'function') {
14630
+ return { ...result, key: verified.key };
14631
+ }
14632
+ return result;
14633
+ }
14634
+
14635
+ const sign = async (alg, key, data) => {
14636
+ const cryptoKey = await getCryptoKey(alg, key, 'sign');
14637
+ checkKeyLength(alg, cryptoKey);
14638
+ const signature = await crypto$1.subtle.sign(subtleDsa(alg, cryptoKey.algorithm), cryptoKey, data);
14639
+ return new Uint8Array(signature);
14640
+ };
14641
+
14642
+ class FlattenedSign {
14643
+ constructor(payload) {
14644
+ if (!(payload instanceof Uint8Array)) {
14645
+ throw new TypeError('payload must be an instance of Uint8Array');
14646
+ }
14647
+ this._payload = payload;
14648
+ }
14649
+ setProtectedHeader(protectedHeader) {
14650
+ if (this._protectedHeader) {
14651
+ throw new TypeError('setProtectedHeader can only be called once');
14652
+ }
14653
+ this._protectedHeader = protectedHeader;
14654
+ return this;
14655
+ }
14656
+ setUnprotectedHeader(unprotectedHeader) {
14657
+ if (this._unprotectedHeader) {
14658
+ throw new TypeError('setUnprotectedHeader can only be called once');
14659
+ }
14660
+ this._unprotectedHeader = unprotectedHeader;
14661
+ return this;
14662
+ }
14663
+ async sign(key, options) {
14664
+ if (!this._protectedHeader && !this._unprotectedHeader) {
14665
+ throw new JWSInvalid('either setProtectedHeader or setUnprotectedHeader must be called before #sign()');
14666
+ }
14667
+ if (!isDisjoint(this._protectedHeader, this._unprotectedHeader)) {
14668
+ throw new JWSInvalid('JWS Protected and JWS Unprotected Header Parameter names must be disjoint');
14669
+ }
14670
+ const joseHeader = {
14671
+ ...this._protectedHeader,
14672
+ ...this._unprotectedHeader,
14673
+ };
14674
+ const extensions = validateCrit(JWSInvalid, new Map([['b64', true]]), options?.crit, this._protectedHeader, joseHeader);
14675
+ let b64 = true;
14676
+ if (extensions.has('b64')) {
14677
+ b64 = this._protectedHeader.b64;
14678
+ if (typeof b64 !== 'boolean') {
14679
+ throw new JWSInvalid('The "b64" (base64url-encode payload) Header Parameter must be a boolean');
14680
+ }
14681
+ }
14682
+ const { alg } = joseHeader;
14683
+ if (typeof alg !== 'string' || !alg) {
14684
+ throw new JWSInvalid('JWS "alg" (Algorithm) Header Parameter missing or invalid');
14685
+ }
14686
+ checkKeyTypeWithJwk(alg, key, 'sign');
14687
+ let payload = this._payload;
14688
+ if (b64) {
14689
+ payload = encoder.encode(encode(payload));
14690
+ }
14691
+ let protectedHeader;
14692
+ if (this._protectedHeader) {
14693
+ protectedHeader = encoder.encode(encode(JSON.stringify(this._protectedHeader)));
14694
+ }
14695
+ else {
14696
+ protectedHeader = encoder.encode('');
14697
+ }
14698
+ const data = concat(protectedHeader, encoder.encode('.'), payload);
14699
+ const signature = await sign(alg, key, data);
14700
+ const jws = {
14701
+ signature: encode(signature),
14702
+ payload: '',
14703
+ };
14704
+ if (b64) {
14705
+ jws.payload = decoder.decode(payload);
14706
+ }
14707
+ if (this._unprotectedHeader) {
14708
+ jws.header = this._unprotectedHeader;
14709
+ }
14710
+ if (this._protectedHeader) {
14711
+ jws.protected = decoder.decode(protectedHeader);
14712
+ }
14713
+ return jws;
14714
+ }
14715
+ }
14716
+
14717
+ class CompactSign {
14718
+ constructor(payload) {
14719
+ this._flattened = new FlattenedSign(payload);
14720
+ }
14721
+ setProtectedHeader(protectedHeader) {
14722
+ this._flattened.setProtectedHeader(protectedHeader);
14723
+ return this;
14724
+ }
14725
+ async sign(key, options) {
14726
+ const jws = await this._flattened.sign(key, options);
14727
+ if (jws.payload === undefined) {
14728
+ throw new TypeError('use the flattened module for creating JWS with b64: false');
14729
+ }
14730
+ return `${jws.protected}.${jws.payload}.${jws.signature}`;
14731
+ }
14732
+ }
14733
+
14734
+ function validateInput(label, input) {
14735
+ if (!Number.isFinite(input)) {
14736
+ throw new TypeError(`Invalid ${label} input`);
14737
+ }
14738
+ return input;
14739
+ }
14740
+ class ProduceJWT {
14741
+ constructor(payload = {}) {
14742
+ if (!isObject(payload)) {
14743
+ throw new TypeError('JWT Claims Set MUST be an object');
14744
+ }
14745
+ this._payload = payload;
14746
+ }
14747
+ setIssuer(issuer) {
14748
+ this._payload = { ...this._payload, iss: issuer };
14749
+ return this;
14750
+ }
14751
+ setSubject(subject) {
14752
+ this._payload = { ...this._payload, sub: subject };
14753
+ return this;
14754
+ }
14755
+ setAudience(audience) {
14756
+ this._payload = { ...this._payload, aud: audience };
14757
+ return this;
14758
+ }
14759
+ setJti(jwtId) {
14760
+ this._payload = { ...this._payload, jti: jwtId };
14761
+ return this;
14762
+ }
14763
+ setNotBefore(input) {
14764
+ if (typeof input === 'number') {
14765
+ this._payload = { ...this._payload, nbf: validateInput('setNotBefore', input) };
14766
+ }
14767
+ else if (input instanceof Date) {
14768
+ this._payload = { ...this._payload, nbf: validateInput('setNotBefore', epoch(input)) };
14769
+ }
14770
+ else {
14771
+ this._payload = { ...this._payload, nbf: epoch(new Date()) + secs(input) };
14772
+ }
14773
+ return this;
14774
+ }
14775
+ setExpirationTime(input) {
14776
+ if (typeof input === 'number') {
14777
+ this._payload = { ...this._payload, exp: validateInput('setExpirationTime', input) };
14778
+ }
14779
+ else if (input instanceof Date) {
14780
+ this._payload = { ...this._payload, exp: validateInput('setExpirationTime', epoch(input)) };
14781
+ }
14782
+ else {
14783
+ this._payload = { ...this._payload, exp: epoch(new Date()) + secs(input) };
14784
+ }
14785
+ return this;
14786
+ }
14787
+ setIssuedAt(input) {
14788
+ if (typeof input === 'undefined') {
14789
+ this._payload = { ...this._payload, iat: epoch(new Date()) };
14790
+ }
14791
+ else if (input instanceof Date) {
14792
+ this._payload = { ...this._payload, iat: validateInput('setIssuedAt', epoch(input)) };
14793
+ }
14794
+ else if (typeof input === 'string') {
14795
+ this._payload = {
14796
+ ...this._payload,
14797
+ iat: validateInput('setIssuedAt', epoch(new Date()) + secs(input)),
14798
+ };
14799
+ }
14800
+ else {
14801
+ this._payload = { ...this._payload, iat: validateInput('setIssuedAt', input) };
14802
+ }
14803
+ return this;
14804
+ }
14805
+ }
14806
+
14807
+ class SignJWT extends ProduceJWT {
14808
+ setProtectedHeader(protectedHeader) {
14809
+ this._protectedHeader = protectedHeader;
14810
+ return this;
14811
+ }
14812
+ async sign(key, options) {
14813
+ const sig = new CompactSign(encoder.encode(JSON.stringify(this._payload)));
14814
+ sig.setProtectedHeader(this._protectedHeader);
14815
+ if (Array.isArray(this._protectedHeader?.crit) &&
14816
+ this._protectedHeader.crit.includes('b64') &&
14817
+ this._protectedHeader.b64 === false) {
14818
+ throw new JWTInvalid('JWTs MUST NOT use unencoded payload');
14819
+ }
14820
+ return sig.sign(key, options);
14821
+ }
14822
+ }
14823
+
13664
14824
  class ApiError {
13665
14825
  constructor(error) {
13666
14826
  var _a, _b, _c, _d, _e, _f, _g;
@@ -13744,7 +14904,7 @@ class EncryptedApi {
13744
14904
  // Decrypt and format payload back to string
13745
14905
  const decryptedString = cryptoJsExports.AES.decrypt(data, key).toString(cryptoJsExports.enc.Utf8);
13746
14906
  // Allow decoding only if secret is matching
13747
- return jose.jwtVerify(decryptedString, Buffer.from(key));
14907
+ return jwtVerify(decryptedString, Buffer.from(key));
13748
14908
  }
13749
14909
  /**
13750
14910
  * Encrypts and signs the given data using the JOSE encryption standard.
@@ -13756,7 +14916,7 @@ class EncryptedApi {
13756
14916
  async joseEncrypt(data, key, exp) {
13757
14917
  // Encode and sign data
13758
14918
  const currentDate = new Date();
13759
- const token = new jose.SignJWT(data)
14919
+ const token = new SignJWT(data)
13760
14920
  .setProtectedHeader({ alg: 'HS256' })
13761
14921
  .setIssuedAt(currentDate.getTime())
13762
14922
  .setExpirationTime(exp);
@@ -15969,4 +17129,3 @@ function RmnCreateSpotElement(spot, config) {
15969
17129
  exports.LiquidCommerceRmnClient = LiquidCommerceRmnClient;
15970
17130
  exports.RmnClient = RmnClient;
15971
17131
  exports.RmnCreateSpotElement = RmnCreateSpotElement;
15972
- //# sourceMappingURL=index.cjs.map