@om_patel_26/chat-widget 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (203) hide show
  1. package/README.md +276 -0
  2. package/dist/_virtual/_plugin-vue_export-helper.cjs.js +2 -0
  3. package/dist/_virtual/_plugin-vue_export-helper.cjs.js.map +1 -0
  4. package/dist/_virtual/_plugin-vue_export-helper.esm.js +11 -0
  5. package/dist/_virtual/_plugin-vue_export-helper.esm.js.map +1 -0
  6. package/dist/adapters/vue/index.d.ts +7 -0
  7. package/dist/adapters/vue/index.d.ts.map +1 -0
  8. package/dist/adapters/vue/useChatMode.d.ts +21 -0
  9. package/dist/adapters/vue/useChatMode.d.ts.map +1 -0
  10. package/dist/components/ChatWidget.d.ts +43 -0
  11. package/dist/components/ChatWidget.d.ts.map +1 -0
  12. package/dist/components/ChatWidget.vue.cjs.js +2 -0
  13. package/dist/components/ChatWidget.vue.cjs.js.map +1 -0
  14. package/dist/components/ChatWidget.vue.cjs2.js +2 -0
  15. package/dist/components/ChatWidget.vue.cjs2.js.map +1 -0
  16. package/dist/components/ChatWidget.vue.esm.js +8 -0
  17. package/dist/components/ChatWidget.vue.esm.js.map +1 -0
  18. package/dist/components/ChatWidget.vue.esm2.js +331 -0
  19. package/dist/components/ChatWidget.vue.esm2.js.map +1 -0
  20. package/dist/composables/useChatWidget.cjs.js +2 -0
  21. package/dist/composables/useChatWidget.cjs.js.map +1 -0
  22. package/dist/composables/useChatWidget.d.ts +34 -0
  23. package/dist/composables/useChatWidget.d.ts.map +1 -0
  24. package/dist/composables/useChatWidget.esm.js +72 -0
  25. package/dist/composables/useChatWidget.esm.js.map +1 -0
  26. package/dist/core/stateManager.cjs.js +2 -0
  27. package/dist/core/stateManager.cjs.js.map +1 -0
  28. package/dist/core/stateManager.d.ts +136 -0
  29. package/dist/core/stateManager.d.ts.map +1 -0
  30. package/dist/core/stateManager.esm.js +907 -0
  31. package/dist/core/stateManager.esm.js.map +1 -0
  32. package/dist/core/types.d.ts +66 -0
  33. package/dist/core/types.d.ts.map +1 -0
  34. package/dist/entry/next.d.ts +9 -0
  35. package/dist/entry/next.d.ts.map +1 -0
  36. package/dist/entry/nuxt.d.ts +10 -0
  37. package/dist/entry/nuxt.d.ts.map +1 -0
  38. package/dist/entry/react.d.ts +10 -0
  39. package/dist/entry/react.d.ts.map +1 -0
  40. package/dist/entry/vanilla.d.ts +33 -0
  41. package/dist/entry/vanilla.d.ts.map +1 -0
  42. package/dist/entry/vite.d.ts +11 -0
  43. package/dist/entry/vite.d.ts.map +1 -0
  44. package/dist/entry/vue.d.ts +11 -0
  45. package/dist/entry/vue.d.ts.map +1 -0
  46. package/dist/hooks/useChatMode.d.ts +17 -0
  47. package/dist/hooks/useChatMode.d.ts.map +1 -0
  48. package/dist/index.cjs.js +2 -0
  49. package/dist/index.cjs.js.map +1 -0
  50. package/dist/index.d.ts +14 -0
  51. package/dist/index.d.ts.map +1 -0
  52. package/dist/index.esm.js +25 -0
  53. package/dist/index.esm.js.map +1 -0
  54. package/dist/node_modules/jose/dist/browser/jws/compact/sign.cjs.js +2 -0
  55. package/dist/node_modules/jose/dist/browser/jws/compact/sign.cjs.js.map +1 -0
  56. package/dist/node_modules/jose/dist/browser/jws/compact/sign.esm.js +21 -0
  57. package/dist/node_modules/jose/dist/browser/jws/compact/sign.esm.js.map +1 -0
  58. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.cjs.js +2 -0
  59. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.cjs.js.map +1 -0
  60. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.esm.js +84 -0
  61. package/dist/node_modules/jose/dist/browser/jws/flattened/sign.esm.js.map +1 -0
  62. package/dist/node_modules/jose/dist/browser/jwt/produce.cjs.js +2 -0
  63. package/dist/node_modules/jose/dist/browser/jwt/produce.cjs.js.map +1 -0
  64. package/dist/node_modules/jose/dist/browser/jwt/produce.esm.js +72 -0
  65. package/dist/node_modules/jose/dist/browser/jwt/produce.esm.js.map +1 -0
  66. package/dist/node_modules/jose/dist/browser/jwt/sign.cjs.js +2 -0
  67. package/dist/node_modules/jose/dist/browser/jwt/sign.cjs.js.map +1 -0
  68. package/dist/node_modules/jose/dist/browser/jwt/sign.esm.js +22 -0
  69. package/dist/node_modules/jose/dist/browser/jwt/sign.esm.js.map +1 -0
  70. package/dist/node_modules/jose/dist/browser/key/import.cjs.js +2 -0
  71. package/dist/node_modules/jose/dist/browser/key/import.cjs.js.map +1 -0
  72. package/dist/node_modules/jose/dist/browser/key/import.esm.js +11 -0
  73. package/dist/node_modules/jose/dist/browser/key/import.esm.js.map +1 -0
  74. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.cjs.js +2 -0
  75. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.cjs.js.map +1 -0
  76. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.esm.js +18 -0
  77. package/dist/node_modules/jose/dist/browser/lib/buffer_utils.esm.js.map +1 -0
  78. package/dist/node_modules/jose/dist/browser/lib/check_key_type.cjs.js +2 -0
  79. package/dist/node_modules/jose/dist/browser/lib/check_key_type.cjs.js.map +1 -0
  80. package/dist/node_modules/jose/dist/browser/lib/check_key_type.esm.js +77 -0
  81. package/dist/node_modules/jose/dist/browser/lib/check_key_type.esm.js.map +1 -0
  82. package/dist/node_modules/jose/dist/browser/lib/crypto_key.cjs.js +2 -0
  83. package/dist/node_modules/jose/dist/browser/lib/crypto_key.cjs.js.map +1 -0
  84. package/dist/node_modules/jose/dist/browser/lib/crypto_key.esm.js +101 -0
  85. package/dist/node_modules/jose/dist/browser/lib/crypto_key.esm.js.map +1 -0
  86. package/dist/node_modules/jose/dist/browser/lib/epoch.cjs.js +2 -0
  87. package/dist/node_modules/jose/dist/browser/lib/epoch.cjs.js.map +1 -0
  88. package/dist/node_modules/jose/dist/browser/lib/epoch.esm.js +5 -0
  89. package/dist/node_modules/jose/dist/browser/lib/epoch.esm.js.map +1 -0
  90. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.cjs.js +2 -0
  91. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.cjs.js.map +1 -0
  92. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.esm.js +32 -0
  93. package/dist/node_modules/jose/dist/browser/lib/invalid_key_input.esm.js.map +1 -0
  94. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.cjs.js +2 -0
  95. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.cjs.js.map +1 -0
  96. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.esm.js +25 -0
  97. package/dist/node_modules/jose/dist/browser/lib/is_disjoint.esm.js.map +1 -0
  98. package/dist/node_modules/jose/dist/browser/lib/is_jwk.cjs.js +2 -0
  99. package/dist/node_modules/jose/dist/browser/lib/is_jwk.cjs.js.map +1 -0
  100. package/dist/node_modules/jose/dist/browser/lib/is_jwk.esm.js +20 -0
  101. package/dist/node_modules/jose/dist/browser/lib/is_jwk.esm.js.map +1 -0
  102. package/dist/node_modules/jose/dist/browser/lib/is_object.cjs.js +2 -0
  103. package/dist/node_modules/jose/dist/browser/lib/is_object.cjs.js.map +1 -0
  104. package/dist/node_modules/jose/dist/browser/lib/is_object.esm.js +20 -0
  105. package/dist/node_modules/jose/dist/browser/lib/is_object.esm.js.map +1 -0
  106. package/dist/node_modules/jose/dist/browser/lib/secs.cjs.js +2 -0
  107. package/dist/node_modules/jose/dist/browser/lib/secs.cjs.js.map +1 -0
  108. package/dist/node_modules/jose/dist/browser/lib/secs.esm.js +59 -0
  109. package/dist/node_modules/jose/dist/browser/lib/secs.esm.js.map +1 -0
  110. package/dist/node_modules/jose/dist/browser/lib/validate_crit.cjs.js +2 -0
  111. package/dist/node_modules/jose/dist/browser/lib/validate_crit.cjs.js.map +1 -0
  112. package/dist/node_modules/jose/dist/browser/lib/validate_crit.esm.js +34 -0
  113. package/dist/node_modules/jose/dist/browser/lib/validate_crit.esm.js.map +1 -0
  114. package/dist/node_modules/jose/dist/browser/runtime/asn1.cjs.js +2 -0
  115. package/dist/node_modules/jose/dist/browser/runtime/asn1.cjs.js.map +1 -0
  116. package/dist/node_modules/jose/dist/browser/runtime/asn1.esm.js +103 -0
  117. package/dist/node_modules/jose/dist/browser/runtime/asn1.esm.js.map +1 -0
  118. package/dist/node_modules/jose/dist/browser/runtime/base64url.cjs.js +2 -0
  119. package/dist/node_modules/jose/dist/browser/runtime/base64url.cjs.js.map +1 -0
  120. package/dist/node_modules/jose/dist/browser/runtime/base64url.esm.js +43 -0
  121. package/dist/node_modules/jose/dist/browser/runtime/base64url.esm.js.map +1 -0
  122. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.cjs.js +2 -0
  123. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.cjs.js.map +1 -0
  124. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.esm.js +12 -0
  125. package/dist/node_modules/jose/dist/browser/runtime/check_key_length.esm.js.map +1 -0
  126. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.cjs.js +2 -0
  127. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.cjs.js.map +1 -0
  128. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.esm.js +25 -0
  129. package/dist/node_modules/jose/dist/browser/runtime/get_sign_verify_key.esm.js.map +1 -0
  130. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.cjs.js +2 -0
  131. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.cjs.js.map +1 -0
  132. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.esm.js +13 -0
  133. package/dist/node_modules/jose/dist/browser/runtime/is_key_like.esm.js.map +1 -0
  134. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.cjs.js +2 -0
  135. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.cjs.js.map +1 -0
  136. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.esm.js +107 -0
  137. package/dist/node_modules/jose/dist/browser/runtime/jwk_to_key.esm.js.map +1 -0
  138. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.cjs.js +2 -0
  139. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.cjs.js.map +1 -0
  140. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.esm.js +71 -0
  141. package/dist/node_modules/jose/dist/browser/runtime/normalize_key.esm.js.map +1 -0
  142. package/dist/node_modules/jose/dist/browser/runtime/sign.cjs.js +2 -0
  143. package/dist/node_modules/jose/dist/browser/runtime/sign.cjs.js.map +1 -0
  144. package/dist/node_modules/jose/dist/browser/runtime/sign.esm.js +14 -0
  145. package/dist/node_modules/jose/dist/browser/runtime/sign.esm.js.map +1 -0
  146. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.cjs.js +2 -0
  147. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.cjs.js.map +1 -0
  148. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.esm.js +32 -0
  149. package/dist/node_modules/jose/dist/browser/runtime/subtle_dsa.esm.js.map +1 -0
  150. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.cjs.js +2 -0
  151. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.cjs.js.map +1 -0
  152. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.esm.js +7 -0
  153. package/dist/node_modules/jose/dist/browser/runtime/webcrypto.esm.js.map +1 -0
  154. package/dist/node_modules/jose/dist/browser/util/errors.cjs.js +2 -0
  155. package/dist/node_modules/jose/dist/browser/util/errors.cjs.js.map +1 -0
  156. package/dist/node_modules/jose/dist/browser/util/errors.esm.js +131 -0
  157. package/dist/node_modules/jose/dist/browser/util/errors.esm.js.map +1 -0
  158. package/dist/nuxt.cjs.js +2 -0
  159. package/dist/nuxt.cjs.js.map +1 -0
  160. package/dist/nuxt.esm.js +8 -0
  161. package/dist/nuxt.esm.js.map +1 -0
  162. package/dist/services/chatService.cjs.js +2 -0
  163. package/dist/services/chatService.cjs.js.map +1 -0
  164. package/dist/services/chatService.d.ts +144 -0
  165. package/dist/services/chatService.d.ts.map +1 -0
  166. package/dist/services/chatService.esm.js +482 -0
  167. package/dist/services/chatService.esm.js.map +1 -0
  168. package/dist/services/dialogflowClient.cjs.js +2 -0
  169. package/dist/services/dialogflowClient.cjs.js.map +1 -0
  170. package/dist/services/dialogflowClient.d.ts +36 -0
  171. package/dist/services/dialogflowClient.d.ts.map +1 -0
  172. package/dist/services/dialogflowClient.esm.js +282 -0
  173. package/dist/services/dialogflowClient.esm.js.map +1 -0
  174. package/dist/services/sessionManager.cjs.js +2 -0
  175. package/dist/services/sessionManager.cjs.js.map +1 -0
  176. package/dist/services/sessionManager.d.ts +13 -0
  177. package/dist/services/sessionManager.d.ts.map +1 -0
  178. package/dist/services/sessionManager.esm.js +48 -0
  179. package/dist/services/sessionManager.esm.js.map +1 -0
  180. package/dist/styles.css +0 -0
  181. package/dist/types.d.ts +5 -0
  182. package/dist/types.d.ts.map +1 -0
  183. package/dist/utils/dialogflowHandler.d.ts +31 -0
  184. package/dist/utils/dialogflowHandler.d.ts.map +1 -0
  185. package/dist/utils/frameworkDetector.d.ts +17 -0
  186. package/dist/utils/frameworkDetector.d.ts.map +1 -0
  187. package/dist/utils/sanitize.cjs.js +2 -0
  188. package/dist/utils/sanitize.cjs.js.map +1 -0
  189. package/dist/utils/sanitize.d.ts +25 -0
  190. package/dist/utils/sanitize.d.ts.map +1 -0
  191. package/dist/utils/sanitize.esm.js +57 -0
  192. package/dist/utils/sanitize.esm.js.map +1 -0
  193. package/dist/utils/ssr.cjs.js +2 -0
  194. package/dist/utils/ssr.cjs.js.map +1 -0
  195. package/dist/utils/ssr.d.ts +35 -0
  196. package/dist/utils/ssr.d.ts.map +1 -0
  197. package/dist/utils/ssr.esm.js +48 -0
  198. package/dist/utils/ssr.esm.js.map +1 -0
  199. package/dist/vue.cjs.js +2 -0
  200. package/dist/vue.cjs.js.map +1 -0
  201. package/dist/vue.esm.js +10 -0
  202. package/dist/vue.esm.js.map +1 -0
  203. package/package.json +145 -0
@@ -0,0 +1,20 @@
1
+ import isObject from "./is_object.esm.js";
2
+ function isJWK(key) {
3
+ return isObject(key) && typeof key.kty === "string";
4
+ }
5
+ function isPrivateJWK(key) {
6
+ return key.kty !== "oct" && typeof key.d === "string";
7
+ }
8
+ function isPublicJWK(key) {
9
+ return key.kty !== "oct" && typeof key.d === "undefined";
10
+ }
11
+ function isSecretJWK(key) {
12
+ return isJWK(key) && key.kty === "oct" && typeof key.k === "string";
13
+ }
14
+ export {
15
+ isJWK,
16
+ isPrivateJWK,
17
+ isPublicJWK,
18
+ isSecretJWK
19
+ };
20
+ //# sourceMappingURL=is_jwk.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_jwk.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/is_jwk.js"],"sourcesContent":["import isObject from './is_object.js';\nexport function isJWK(key) {\n return isObject(key) && typeof key.kty === 'string';\n}\nexport function isPrivateJWK(key) {\n return key.kty !== 'oct' && typeof key.d === 'string';\n}\nexport function isPublicJWK(key) {\n return key.kty !== 'oct' && typeof key.d === 'undefined';\n}\nexport function isSecretJWK(key) {\n return isJWK(key) && key.kty === 'oct' && typeof key.k === 'string';\n}\n"],"names":[],"mappings":";AACO,SAAS,MAAM,KAAK;AACvB,SAAO,SAAS,GAAG,KAAK,OAAO,IAAI,QAAQ;AAC/C;AACO,SAAS,aAAa,KAAK;AAC9B,SAAO,IAAI,QAAQ,SAAS,OAAO,IAAI,MAAM;AACjD;AACO,SAAS,YAAY,KAAK;AAC7B,SAAO,IAAI,QAAQ,SAAS,OAAO,IAAI,MAAM;AACjD;AACO,SAAS,YAAY,KAAK;AAC7B,SAAO,MAAM,GAAG,KAAK,IAAI,QAAQ,SAAS,OAAO,IAAI,MAAM;AAC/D;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}}),exports.default=function(t){if("object"!=typeof(e=t)||null===e||"[object Object]"!==Object.prototype.toString.call(t))return!1;var e;if(null===Object.getPrototypeOf(t))return!0;let o=t;for(;null!==Object.getPrototypeOf(o);)o=Object.getPrototypeOf(o);return Object.getPrototypeOf(t)===o};
2
+ //# sourceMappingURL=is_object.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_object.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/is_object.js"],"sourcesContent":["function isObjectLike(value) {\n return typeof value === 'object' && value !== null;\n}\nexport default function isObject(input) {\n if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {\n return false;\n }\n if (Object.getPrototypeOf(input) === null) {\n return true;\n }\n let proto = input;\n while (Object.getPrototypeOf(proto) !== null) {\n proto = Object.getPrototypeOf(proto);\n }\n return Object.getPrototypeOf(input) === proto;\n}\n"],"names":["input","value","Object","prototype","toString","call","getPrototypeOf","proto"],"mappings":"4HAGe,SAAkBA,GAC7B,GAHwB,iBADNC,EAIAD,IAH4B,OAAVC,GAGkC,oBAA1CC,OAAOC,UAAUC,SAASC,KAAKL,GACvD,OAAO,EALf,IAAsBC,EAOlB,GAAqC,OAAjCC,OAAOI,eAAeN,GACtB,OAAO,EAEX,IAAIO,EAAQP,EACZ,KAAwC,OAAjCE,OAAOI,eAAeC,IACzBA,EAAQL,OAAOI,eAAeC,GAElC,OAAOL,OAAOI,eAAeN,KAAWO,CAC5C","x_google_ignoreList":[0]}
@@ -0,0 +1,20 @@
1
+ function isObjectLike(value) {
2
+ return typeof value === "object" && value !== null;
3
+ }
4
+ function isObject(input) {
5
+ if (!isObjectLike(input) || Object.prototype.toString.call(input) !== "[object Object]") {
6
+ return false;
7
+ }
8
+ if (Object.getPrototypeOf(input) === null) {
9
+ return true;
10
+ }
11
+ let proto = input;
12
+ while (Object.getPrototypeOf(proto) !== null) {
13
+ proto = Object.getPrototypeOf(proto);
14
+ }
15
+ return Object.getPrototypeOf(input) === proto;
16
+ }
17
+ export {
18
+ isObject as default
19
+ };
20
+ //# sourceMappingURL=is_object.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_object.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/is_object.js"],"sourcesContent":["function isObjectLike(value) {\n return typeof value === 'object' && value !== null;\n}\nexport default function isObject(input) {\n if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {\n return false;\n }\n if (Object.getPrototypeOf(input) === null) {\n return true;\n }\n let proto = input;\n while (Object.getPrototypeOf(proto) !== null) {\n proto = Object.getPrototypeOf(proto);\n }\n return Object.getPrototypeOf(input) === proto;\n}\n"],"names":[],"mappings":"AAAA,SAAS,aAAa,OAAO;AACzB,SAAO,OAAO,UAAU,YAAY,UAAU;AAClD;AACe,SAAS,SAAS,OAAO;AACpC,MAAI,CAAC,aAAa,KAAK,KAAK,OAAO,UAAU,SAAS,KAAK,KAAK,MAAM,mBAAmB;AACrF,WAAO;AAAA,EACX;AACA,MAAI,OAAO,eAAe,KAAK,MAAM,MAAM;AACvC,WAAO;AAAA,EACX;AACA,MAAI,QAAQ;AACZ,SAAO,OAAO,eAAe,KAAK,MAAM,MAAM;AAC1C,YAAQ,OAAO,eAAe,KAAK;AAAA,EACvC;AACA,SAAO,OAAO,eAAe,KAAK,MAAM;AAC5C;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=86400,s=/^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;exports.default=a=>{const r=s.exec(a);if(!r||r[4]&&r[1])throw new TypeError("Invalid time period format");const c=parseFloat(r[2]);let o;switch(r[3].toLowerCase()){case"sec":case"secs":case"second":case"seconds":case"s":o=Math.round(c);break;case"minute":case"minutes":case"min":case"mins":case"m":o=Math.round(60*c);break;case"hour":case"hours":case"hr":case"hrs":case"h":o=Math.round(3600*c);break;case"day":case"days":case"d":o=Math.round(c*e);break;case"week":case"weeks":case"w":o=Math.round(604800*c);break;default:o=Math.round(31557600*c)}return"-"===r[1]||"ago"===r[4]?-o:o};
2
+ //# sourceMappingURL=secs.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secs.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/secs.js"],"sourcesContent":["const minute = 60;\nconst hour = minute * 60;\nconst day = hour * 24;\nconst week = day * 7;\nconst year = day * 365.25;\nconst REGEX = /^(\\+|\\-)? ?(\\d+|\\d+\\.\\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;\nexport default (str) => {\n const matched = REGEX.exec(str);\n if (!matched || (matched[4] && matched[1])) {\n throw new TypeError('Invalid time period format');\n }\n const value = parseFloat(matched[2]);\n const unit = matched[3].toLowerCase();\n let numericDate;\n switch (unit) {\n case 'sec':\n case 'secs':\n case 'second':\n case 'seconds':\n case 's':\n numericDate = Math.round(value);\n break;\n case 'minute':\n case 'minutes':\n case 'min':\n case 'mins':\n case 'm':\n numericDate = Math.round(value * minute);\n break;\n case 'hour':\n case 'hours':\n case 'hr':\n case 'hrs':\n case 'h':\n numericDate = Math.round(value * hour);\n break;\n case 'day':\n case 'days':\n case 'd':\n numericDate = Math.round(value * day);\n break;\n case 'week':\n case 'weeks':\n case 'w':\n numericDate = Math.round(value * week);\n break;\n default:\n numericDate = Math.round(value * year);\n break;\n }\n if (matched[1] === '-' || matched[4] === 'ago') {\n return -numericDate;\n }\n return numericDate;\n};\n"],"names":["day","hour","REGEX","str","matched","exec","TypeError","value","parseFloat","numericDate","toLowerCase","Math","round","minute"],"mappings":"4GAAA,MAEMA,EAAMC,MAGNC,EAAQ,oJACEC,IACZ,MAAMC,EAAUF,EAAMG,KAAKF,GAC3B,IAAKC,GAAYA,EAAQ,IAAMA,EAAQ,GACnC,MAAM,IAAIE,UAAU,8BAExB,MAAMC,EAAQC,WAAWJ,EAAQ,IAEjC,IAAIK,EACJ,OAFaL,EAAQ,GAAGM,eAGpB,IAAK,MACL,IAAK,OACL,IAAK,SACL,IAAK,UACL,IAAK,IACDD,EAAcE,KAAKC,MAAML,GACzB,MACJ,IAAK,SACL,IAAK,UACL,IAAK,MACL,IAAK,OACL,IAAK,IACDE,EAAcE,KAAKC,MA3BhB,GA2BsBL,GACzB,MACJ,IAAK,OACL,IAAK,QACL,IAAK,KACL,IAAK,MACL,IAAK,IACDE,EAAcE,KAAKC,MAjClBC,KAiCwBN,GACzB,MACJ,IAAK,MACL,IAAK,OACL,IAAK,IACDE,EAAcE,KAAKC,MAAML,EAAQP,GACjC,MACJ,IAAK,OACL,IAAK,QACL,IAAK,IACDS,EAAcE,KAAKC,MAzClBZ,OAyCwBO,GACzB,MACJ,QACIE,EAAcE,KAAKC,MA3ClBZ,SA2CwBO,GAGjC,MAAmB,MAAfH,EAAQ,IAA6B,QAAfA,EAAQ,IACtBK,EAELA","x_google_ignoreList":[0]}
@@ -0,0 +1,59 @@
1
+ const minute = 60;
2
+ const hour = minute * 60;
3
+ const day = hour * 24;
4
+ const week = day * 7;
5
+ const year = day * 365.25;
6
+ const REGEX = /^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;
7
+ const secs = (str) => {
8
+ const matched = REGEX.exec(str);
9
+ if (!matched || matched[4] && matched[1]) {
10
+ throw new TypeError("Invalid time period format");
11
+ }
12
+ const value = parseFloat(matched[2]);
13
+ const unit = matched[3].toLowerCase();
14
+ let numericDate;
15
+ switch (unit) {
16
+ case "sec":
17
+ case "secs":
18
+ case "second":
19
+ case "seconds":
20
+ case "s":
21
+ numericDate = Math.round(value);
22
+ break;
23
+ case "minute":
24
+ case "minutes":
25
+ case "min":
26
+ case "mins":
27
+ case "m":
28
+ numericDate = Math.round(value * minute);
29
+ break;
30
+ case "hour":
31
+ case "hours":
32
+ case "hr":
33
+ case "hrs":
34
+ case "h":
35
+ numericDate = Math.round(value * hour);
36
+ break;
37
+ case "day":
38
+ case "days":
39
+ case "d":
40
+ numericDate = Math.round(value * day);
41
+ break;
42
+ case "week":
43
+ case "weeks":
44
+ case "w":
45
+ numericDate = Math.round(value * week);
46
+ break;
47
+ default:
48
+ numericDate = Math.round(value * year);
49
+ break;
50
+ }
51
+ if (matched[1] === "-" || matched[4] === "ago") {
52
+ return -numericDate;
53
+ }
54
+ return numericDate;
55
+ };
56
+ export {
57
+ secs as default
58
+ };
59
+ //# sourceMappingURL=secs.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secs.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/secs.js"],"sourcesContent":["const minute = 60;\nconst hour = minute * 60;\nconst day = hour * 24;\nconst week = day * 7;\nconst year = day * 365.25;\nconst REGEX = /^(\\+|\\-)? ?(\\d+|\\d+\\.\\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;\nexport default (str) => {\n const matched = REGEX.exec(str);\n if (!matched || (matched[4] && matched[1])) {\n throw new TypeError('Invalid time period format');\n }\n const value = parseFloat(matched[2]);\n const unit = matched[3].toLowerCase();\n let numericDate;\n switch (unit) {\n case 'sec':\n case 'secs':\n case 'second':\n case 'seconds':\n case 's':\n numericDate = Math.round(value);\n break;\n case 'minute':\n case 'minutes':\n case 'min':\n case 'mins':\n case 'm':\n numericDate = Math.round(value * minute);\n break;\n case 'hour':\n case 'hours':\n case 'hr':\n case 'hrs':\n case 'h':\n numericDate = Math.round(value * hour);\n break;\n case 'day':\n case 'days':\n case 'd':\n numericDate = Math.round(value * day);\n break;\n case 'week':\n case 'weeks':\n case 'w':\n numericDate = Math.round(value * week);\n break;\n default:\n numericDate = Math.round(value * year);\n break;\n }\n if (matched[1] === '-' || matched[4] === 'ago') {\n return -numericDate;\n }\n return numericDate;\n};\n"],"names":[],"mappings":"AAAA,MAAM,SAAS;AACf,MAAM,OAAO,SAAS;AACtB,MAAM,MAAM,OAAO;AACnB,MAAM,OAAO,MAAM;AACnB,MAAM,OAAO,MAAM;AACnB,MAAM,QAAQ;AACd,MAAA,OAAe,CAAC,QAAQ;AACpB,QAAM,UAAU,MAAM,KAAK,GAAG;AAC9B,MAAI,CAAC,WAAY,QAAQ,CAAC,KAAK,QAAQ,CAAC,GAAI;AACxC,UAAM,IAAI,UAAU,4BAA4B;AAAA,EACpD;AACA,QAAM,QAAQ,WAAW,QAAQ,CAAC,CAAC;AACnC,QAAM,OAAO,QAAQ,CAAC,EAAE,YAAW;AACnC,MAAI;AACJ,UAAQ,MAAI;AAAA,IACR,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,oBAAc,KAAK,MAAM,KAAK;AAC9B;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,oBAAc,KAAK,MAAM,QAAQ,MAAM;AACvC;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,oBAAc,KAAK,MAAM,QAAQ,IAAI;AACrC;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,oBAAc,KAAK,MAAM,QAAQ,GAAG;AACpC;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,oBAAc,KAAK,MAAM,QAAQ,IAAI;AACrC;AAAA,IACJ;AACI,oBAAc,KAAK,MAAM,QAAQ,IAAI;AACrC;AAAA,EACZ;AACI,MAAI,QAAQ,CAAC,MAAM,OAAO,QAAQ,CAAC,MAAM,OAAO;AAC5C,WAAO,CAAC;AAAA,EACZ;AACA,SAAO;AACX;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("../util/errors.cjs.js");exports.default=function(r,t,i,n,o){if(void 0!==o.crit&&void 0===n?.crit)throw new r('"crit" (Critical) Header Parameter MUST be integrity protected');if(!n||void 0===n.crit)return new Set;if(!Array.isArray(n.crit)||0===n.crit.length||n.crit.some(e=>"string"!=typeof e||0===e.length))throw new r('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');let a;a=void 0!==i?new Map([...Object.entries(i),...t.entries()]):t;for(const s of n.crit){if(!a.has(s))throw new e.JOSENotSupported(`Extension Header Parameter "${s}" is not recognized`);if(void 0===o[s])throw new r(`Extension Header Parameter "${s}" is missing`);if(a.get(s)&&void 0===n[s])throw new r(`Extension Header Parameter "${s}" MUST be integrity protected`)}return new Set(n.crit)};
2
+ //# sourceMappingURL=validate_crit.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"validate_crit.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/validate_crit.js"],"sourcesContent":["import { JOSENotSupported } from '../util/errors.js';\nfunction validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {\n if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {\n throw new Err('\"crit\" (Critical) Header Parameter MUST be integrity protected');\n }\n if (!protectedHeader || protectedHeader.crit === undefined) {\n return new Set();\n }\n if (!Array.isArray(protectedHeader.crit) ||\n protectedHeader.crit.length === 0 ||\n protectedHeader.crit.some((input) => typeof input !== 'string' || input.length === 0)) {\n throw new Err('\"crit\" (Critical) Header Parameter MUST be an array of non-empty strings when present');\n }\n let recognized;\n if (recognizedOption !== undefined) {\n recognized = new Map([...Object.entries(recognizedOption), ...recognizedDefault.entries()]);\n }\n else {\n recognized = recognizedDefault;\n }\n for (const parameter of protectedHeader.crit) {\n if (!recognized.has(parameter)) {\n throw new JOSENotSupported(`Extension Header Parameter \"${parameter}\" is not recognized`);\n }\n if (joseHeader[parameter] === undefined) {\n throw new Err(`Extension Header Parameter \"${parameter}\" is missing`);\n }\n if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {\n throw new Err(`Extension Header Parameter \"${parameter}\" MUST be integrity protected`);\n }\n }\n return new Set(protectedHeader.crit);\n}\nexport default validateCrit;\n"],"names":["Err","recognizedDefault","recognizedOption","protectedHeader","joseHeader","crit","Set","Array","isArray","length","some","input","recognized","Map","Object","entries","parameter","has","JOSENotSupported","get"],"mappings":"qKACA,SAAsBA,EAAKC,EAAmBC,EAAkBC,EAAiBC,GAC7E,QAAwB,IAApBA,EAAWC,WAAgD,IAA1BF,GAAiBE,KAClD,MAAM,IAAIL,EAAI,kEAElB,IAAKG,QAA4C,IAAzBA,EAAgBE,KACpC,WAAWC,IAEf,IAAKC,MAAMC,QAAQL,EAAgBE,OACC,IAAhCF,EAAgBE,KAAKI,QACrBN,EAAgBE,KAAKK,KAAMC,GAA2B,iBAAVA,GAAuC,IAAjBA,EAAMF,QACxE,MAAM,IAAIT,EAAI,yFAElB,IAAIY,EAEAA,OADqB,IAArBV,EACa,IAAIW,IAAI,IAAIC,OAAOC,QAAQb,MAAsBD,EAAkBc,YAGnEd,EAEjB,IAAA,MAAWe,KAAab,EAAgBE,KAAM,CAC1C,IAAKO,EAAWK,IAAID,GAChB,MAAM,IAAIE,EAAAA,iBAAiB,+BAA+BF,wBAE9D,QAA8B,IAA1BZ,EAAWY,GACX,MAAM,IAAIhB,EAAI,+BAA+BgB,iBAEjD,GAAIJ,EAAWO,IAAIH,SAA6C,IAA/Bb,EAAgBa,GAC7C,MAAM,IAAIhB,EAAI,+BAA+BgB,iCAErD,CACA,OAAO,IAAIV,IAAIH,EAAgBE,KACnC","x_google_ignoreList":[0]}
@@ -0,0 +1,34 @@
1
+ import { JOSENotSupported } from "../util/errors.esm.js";
2
+ function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {
3
+ if (joseHeader.crit !== void 0 && protectedHeader?.crit === void 0) {
4
+ throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
5
+ }
6
+ if (!protectedHeader || protectedHeader.crit === void 0) {
7
+ return /* @__PURE__ */ new Set();
8
+ }
9
+ if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some((input) => typeof input !== "string" || input.length === 0)) {
10
+ throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
11
+ }
12
+ let recognized;
13
+ if (recognizedOption !== void 0) {
14
+ recognized = new Map([...Object.entries(recognizedOption), ...recognizedDefault.entries()]);
15
+ } else {
16
+ recognized = recognizedDefault;
17
+ }
18
+ for (const parameter of protectedHeader.crit) {
19
+ if (!recognized.has(parameter)) {
20
+ throw new JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
21
+ }
22
+ if (joseHeader[parameter] === void 0) {
23
+ throw new Err(`Extension Header Parameter "${parameter}" is missing`);
24
+ }
25
+ if (recognized.get(parameter) && protectedHeader[parameter] === void 0) {
26
+ throw new Err(`Extension Header Parameter "${parameter}" MUST be integrity protected`);
27
+ }
28
+ }
29
+ return new Set(protectedHeader.crit);
30
+ }
31
+ export {
32
+ validateCrit as default
33
+ };
34
+ //# sourceMappingURL=validate_crit.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"validate_crit.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/lib/validate_crit.js"],"sourcesContent":["import { JOSENotSupported } from '../util/errors.js';\nfunction validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {\n if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {\n throw new Err('\"crit\" (Critical) Header Parameter MUST be integrity protected');\n }\n if (!protectedHeader || protectedHeader.crit === undefined) {\n return new Set();\n }\n if (!Array.isArray(protectedHeader.crit) ||\n protectedHeader.crit.length === 0 ||\n protectedHeader.crit.some((input) => typeof input !== 'string' || input.length === 0)) {\n throw new Err('\"crit\" (Critical) Header Parameter MUST be an array of non-empty strings when present');\n }\n let recognized;\n if (recognizedOption !== undefined) {\n recognized = new Map([...Object.entries(recognizedOption), ...recognizedDefault.entries()]);\n }\n else {\n recognized = recognizedDefault;\n }\n for (const parameter of protectedHeader.crit) {\n if (!recognized.has(parameter)) {\n throw new JOSENotSupported(`Extension Header Parameter \"${parameter}\" is not recognized`);\n }\n if (joseHeader[parameter] === undefined) {\n throw new Err(`Extension Header Parameter \"${parameter}\" is missing`);\n }\n if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {\n throw new Err(`Extension Header Parameter \"${parameter}\" MUST be integrity protected`);\n }\n }\n return new Set(protectedHeader.crit);\n}\nexport default validateCrit;\n"],"names":[],"mappings":";AACA,SAAS,aAAa,KAAK,mBAAmB,kBAAkB,iBAAiB,YAAY;AACzF,MAAI,WAAW,SAAS,UAAa,iBAAiB,SAAS,QAAW;AACtE,UAAM,IAAI,IAAI,gEAAgE;AAAA,EAClF;AACA,MAAI,CAAC,mBAAmB,gBAAgB,SAAS,QAAW;AACxD,WAAO,oBAAI,IAAG;AAAA,EAClB;AACA,MAAI,CAAC,MAAM,QAAQ,gBAAgB,IAAI,KACnC,gBAAgB,KAAK,WAAW,KAChC,gBAAgB,KAAK,KAAK,CAAC,UAAU,OAAO,UAAU,YAAY,MAAM,WAAW,CAAC,GAAG;AACvF,UAAM,IAAI,IAAI,uFAAuF;AAAA,EACzG;AACA,MAAI;AACJ,MAAI,qBAAqB,QAAW;AAChC,iBAAa,IAAI,IAAI,CAAC,GAAG,OAAO,QAAQ,gBAAgB,GAAG,GAAG,kBAAkB,QAAO,CAAE,CAAC;AAAA,EAC9F,OACK;AACD,iBAAa;AAAA,EACjB;AACA,aAAW,aAAa,gBAAgB,MAAM;AAC1C,QAAI,CAAC,WAAW,IAAI,SAAS,GAAG;AAC5B,YAAM,IAAI,iBAAiB,+BAA+B,SAAS,qBAAqB;AAAA,IAC5F;AACA,QAAI,WAAW,SAAS,MAAM,QAAW;AACrC,YAAM,IAAI,IAAI,+BAA+B,SAAS,cAAc;AAAA,IACxE;AACA,QAAI,WAAW,IAAI,SAAS,KAAK,gBAAgB,SAAS,MAAM,QAAW;AACvE,YAAM,IAAI,IAAI,+BAA+B,SAAS,+BAA+B;AAAA,IACzF;AAAA,EACJ;AACA,SAAO,IAAI,IAAI,gBAAgB,IAAI;AACvC;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./webcrypto.cjs.js"),a=require("../util/errors.cjs.js"),r=(e,a,s=0)=>{0===s&&(a.unshift(a.length),a.unshift(6));const t=e.indexOf(a[0],s);if(-1===t)return!1;const n=e.subarray(t,t+a.length);return n.length===a.length&&(n.every((e,r)=>e===a[r])||r(e,a,t+1))},s=e=>{switch(!0){case r(e,[42,134,72,206,61,3,1,7]):return"P-256";case r(e,[43,129,4,0,34]):return"P-384";case r(e,[43,129,4,0,35]):return"P-521";case r(e,[43,101,110]):return"X25519";case r(e,[43,101,111]):return"X448";case r(e,[43,101,112]):return"Ed25519";case r(e,[43,101,113]):return"Ed448";default:throw new a.JOSENotSupported("Invalid or unsupported EC Key Curve or OKP Key Sub Type")}};exports.fromPKCS8=(r,t,n)=>(async(r,t,n,c)=>{let S,u;const E=new Uint8Array(atob(n.replace(r,"")).split("").map(e=>e.charCodeAt(0)));switch(c){case"PS256":case"PS384":case"PS512":S={name:"RSA-PSS",hash:`SHA-${c.slice(-3)}`},u=["sign"];break;case"RS256":case"RS384":case"RS512":S={name:"RSASSA-PKCS1-v1_5",hash:`SHA-${c.slice(-3)}`},u=["sign"];break;case"RSA-OAEP":case"RSA-OAEP-256":case"RSA-OAEP-384":case"RSA-OAEP-512":S={name:"RSA-OAEP",hash:`SHA-${parseInt(c.slice(-3),10)||1}`},u=["decrypt","unwrapKey"];break;case"ES256":S={name:"ECDSA",namedCurve:"P-256"},u=["sign"];break;case"ES384":S={name:"ECDSA",namedCurve:"P-384"},u=["sign"];break;case"ES512":S={name:"ECDSA",namedCurve:"P-521"},u=["sign"];break;case"ECDH-ES":case"ECDH-ES+A128KW":case"ECDH-ES+A192KW":case"ECDH-ES+A256KW":{const e=s(E);S=e.startsWith("P-")?{name:"ECDH",namedCurve:e}:{name:e},u=["deriveBits"];break}case"Ed25519":S={name:"Ed25519"},u=["sign"];break;case"EdDSA":S={name:s(E)},u=["sign"];break;default:throw new a.JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value')}return e.default.subtle.importKey(t,E,S,!1,u)})(/(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g,"pkcs8",r,t);
2
+ //# sourceMappingURL=asn1.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"asn1.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/asn1.js"],"sourcesContent":["import crypto, { isCryptoKey } from './webcrypto.js';\nimport invalidKeyInput from '../lib/invalid_key_input.js';\nimport { encodeBase64, decodeBase64 } from './base64url.js';\nimport formatPEM from '../lib/format_pem.js';\nimport { JOSENotSupported } from '../util/errors.js';\nimport { types } from './is_key_like.js';\nconst genericExport = async (keyType, keyFormat, key) => {\n if (!isCryptoKey(key)) {\n throw new TypeError(invalidKeyInput(key, ...types));\n }\n if (!key.extractable) {\n throw new TypeError('CryptoKey is not extractable');\n }\n if (key.type !== keyType) {\n throw new TypeError(`key is not a ${keyType} key`);\n }\n return formatPEM(encodeBase64(new Uint8Array(await crypto.subtle.exportKey(keyFormat, key))), `${keyType.toUpperCase()} KEY`);\n};\nexport const toSPKI = (key) => {\n return genericExport('public', 'spki', key);\n};\nexport const toPKCS8 = (key) => {\n return genericExport('private', 'pkcs8', key);\n};\nconst findOid = (keyData, oid, from = 0) => {\n if (from === 0) {\n oid.unshift(oid.length);\n oid.unshift(0x06);\n }\n const i = keyData.indexOf(oid[0], from);\n if (i === -1)\n return false;\n const sub = keyData.subarray(i, i + oid.length);\n if (sub.length !== oid.length)\n return false;\n return sub.every((value, index) => value === oid[index]) || findOid(keyData, oid, i + 1);\n};\nconst getNamedCurve = (keyData) => {\n switch (true) {\n case findOid(keyData, [0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07]):\n return 'P-256';\n case findOid(keyData, [0x2b, 0x81, 0x04, 0x00, 0x22]):\n return 'P-384';\n case findOid(keyData, [0x2b, 0x81, 0x04, 0x00, 0x23]):\n return 'P-521';\n case findOid(keyData, [0x2b, 0x65, 0x6e]):\n return 'X25519';\n case findOid(keyData, [0x2b, 0x65, 0x6f]):\n return 'X448';\n case findOid(keyData, [0x2b, 0x65, 0x70]):\n return 'Ed25519';\n case findOid(keyData, [0x2b, 0x65, 0x71]):\n return 'Ed448';\n default:\n throw new JOSENotSupported('Invalid or unsupported EC Key Curve or OKP Key Sub Type');\n }\n};\nconst genericImport = async (replace, keyFormat, pem, alg, options) => {\n let algorithm;\n let keyUsages;\n const keyData = new Uint8Array(atob(pem.replace(replace, ''))\n .split('')\n .map((c) => c.charCodeAt(0)));\n const isPublic = keyFormat === 'spki';\n switch (alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${alg.slice(-3)}` };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${alg.slice(-3)}` };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(alg.slice(-3), 10) || 1}`,\n };\n keyUsages = isPublic ? ['encrypt', 'wrapKey'] : ['decrypt', 'unwrapKey'];\n break;\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW': {\n const namedCurve = getNamedCurve(keyData);\n algorithm = namedCurve.startsWith('P-') ? { name: 'ECDH', namedCurve } : { name: namedCurve };\n keyUsages = isPublic ? [] : ['deriveBits'];\n break;\n }\n case 'Ed25519':\n algorithm = { name: 'Ed25519' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'EdDSA':\n algorithm = { name: getNamedCurve(keyData) };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported \"alg\" (Algorithm) value');\n }\n return crypto.subtle.importKey(keyFormat, keyData, algorithm, options?.extractable ?? false, keyUsages);\n};\nexport const fromPKCS8 = (pem, alg, options) => {\n return genericImport(/(?:-----(?:BEGIN|END) PRIVATE KEY-----|\\s)/g, 'pkcs8', pem, alg, options);\n};\nexport const fromSPKI = (pem, alg, options) => {\n return genericImport(/(?:-----(?:BEGIN|END) PUBLIC KEY-----|\\s)/g, 'spki', pem, alg, options);\n};\nfunction getElement(seq) {\n const result = [];\n let next = 0;\n while (next < seq.length) {\n const nextPart = parseElement(seq.subarray(next));\n result.push(nextPart);\n next += nextPart.byteLength;\n }\n return result;\n}\nfunction parseElement(bytes) {\n let position = 0;\n let tag = bytes[0] & 0x1f;\n position++;\n if (tag === 0x1f) {\n tag = 0;\n while (bytes[position] >= 0x80) {\n tag = tag * 128 + bytes[position] - 0x80;\n position++;\n }\n tag = tag * 128 + bytes[position] - 0x80;\n position++;\n }\n let length = 0;\n if (bytes[position] < 0x80) {\n length = bytes[position];\n position++;\n }\n else if (length === 0x80) {\n length = 0;\n while (bytes[position + length] !== 0 || bytes[position + length + 1] !== 0) {\n if (length > bytes.byteLength) {\n throw new TypeError('invalid indefinite form length');\n }\n length++;\n }\n const byteLength = position + length + 2;\n return {\n byteLength,\n contents: bytes.subarray(position, position + length),\n raw: bytes.subarray(0, byteLength),\n };\n }\n else {\n const numberOfDigits = bytes[position] & 0x7f;\n position++;\n length = 0;\n for (let i = 0; i < numberOfDigits; i++) {\n length = length * 256 + bytes[position];\n position++;\n }\n }\n const byteLength = position + length;\n return {\n byteLength,\n contents: bytes.subarray(position, byteLength),\n raw: bytes.subarray(0, byteLength),\n };\n}\nfunction spkiFromX509(buf) {\n const tbsCertificate = getElement(getElement(parseElement(buf).contents)[0].contents);\n return encodeBase64(tbsCertificate[tbsCertificate[0].raw[0] === 0xa0 ? 6 : 5].raw);\n}\nfunction getSPKI(x509) {\n const pem = x509.replace(/(?:-----(?:BEGIN|END) CERTIFICATE-----|\\s)/g, '');\n const raw = decodeBase64(pem);\n return formatPEM(spkiFromX509(raw), 'PUBLIC KEY');\n}\nexport const fromX509 = (pem, alg, options) => {\n let spki;\n try {\n spki = getSPKI(pem);\n }\n catch (cause) {\n throw new TypeError('Failed to parse the X.509 certificate', { cause });\n }\n return fromSPKI(spki, alg, options);\n};\n"],"names":["findOid","keyData","oid","from","unshift","length","i","indexOf","sub","subarray","every","value","index","getNamedCurve","JOSENotSupported","pem","alg","options","async","replace","keyFormat","algorithm","keyUsages","Uint8Array","atob","split","map","c","charCodeAt","name","hash","slice","parseInt","namedCurve","startsWith","crypto","subtle","importKey","genericImport"],"mappings":"yJAwBMA,EAAU,CAACC,EAASC,EAAKC,EAAO,KACrB,IAATA,IACAD,EAAIE,QAAQF,EAAIG,QAChBH,EAAIE,QAAQ,IAEhB,MAAME,EAAIL,EAAQM,QAAQL,EAAI,GAAIC,GAClC,IAAU,IAANG,EACA,OAAO,EACX,MAAME,EAAMP,EAAQQ,SAASH,EAAGA,EAAIJ,EAAIG,QACxC,OAAIG,EAAIH,SAAWH,EAAIG,SAEhBG,EAAIE,MAAM,CAACC,EAAOC,IAAUD,IAAUT,EAAIU,KAAWZ,EAAQC,EAASC,EAAKI,EAAI,KAEpFO,EAAiBZ,IACnB,QAAQ,GACJ,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,GAAM,IAAM,GAAM,EAAM,EAAM,IAC7D,MAAO,QACX,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,EAAM,EAAM,KAC3C,MAAO,QACX,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,EAAM,EAAM,KAC3C,MAAO,QACX,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,MAC/B,MAAO,SACX,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,MAC/B,MAAO,OACX,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,MAC/B,MAAO,UACX,KAAKD,EAAQC,EAAS,CAAC,GAAM,IAAM,MAC/B,MAAO,QACX,QACI,MAAM,IAAIa,EAAAA,iBAAiB,+EAmEd,CAACC,EAAKC,EAAKC,IAhEdC,OAAOC,EAASC,EAAWL,EAAKC,KAClD,IAAIK,EACAC,EACJ,MAAMrB,EAAU,IAAIsB,WAAWC,KAAKT,EAAII,QAAQA,EAAS,KACpDM,MAAM,IACNC,IAAKC,GAAMA,EAAEC,WAAW,KAE7B,OAAQZ,GACJ,IAAK,QACL,IAAK,QACL,IAAK,QACDK,EAAY,CAAEQ,KAAM,UAAWC,KAAM,OAAOd,EAAIe,OAAM,MACtDT,EAAoC,CAAC,QACrC,MACJ,IAAK,QACL,IAAK,QACL,IAAK,QACDD,EAAY,CAAEQ,KAAM,oBAAqBC,KAAM,OAAOd,EAAIe,OAAM,MAChET,EAAoC,CAAC,QACrC,MACJ,IAAK,WACL,IAAK,eACL,IAAK,eACL,IAAK,eACDD,EAAY,CACRQ,KAAM,WACNC,KAAM,OAAOE,SAAShB,EAAIe,OAAM,GAAK,KAAO,KAEhDT,EAAgD,CAAC,UAAW,aAC5D,MACJ,IAAK,QACDD,EAAY,CAAEQ,KAAM,QAASI,WAAY,SACzCX,EAAoC,CAAC,QACrC,MACJ,IAAK,QACDD,EAAY,CAAEQ,KAAM,QAASI,WAAY,SACzCX,EAAoC,CAAC,QACrC,MACJ,IAAK,QACDD,EAAY,CAAEQ,KAAM,QAASI,WAAY,SACzCX,EAAoC,CAAC,QACrC,MACJ,IAAK,UACL,IAAK,iBACL,IAAK,iBACL,IAAK,iBAAkB,CACnB,MAAMW,EAAapB,EAAcZ,GACjCoB,EAAYY,EAAWC,WAAW,MAAQ,CAAEL,KAAM,OAAQI,cAAe,CAAEJ,KAAMI,GACjFX,EAA4B,CAAC,cAC7B,KACJ,CACA,IAAK,UACDD,EAAY,CAAEQ,KAAM,WACpBP,EAAoC,CAAC,QACrC,MACJ,IAAK,QACDD,EAAY,CAAEQ,KAAMhB,EAAcZ,IAClCqB,EAAoC,CAAC,QACrC,MACJ,QACI,MAAM,IAAIR,EAAAA,iBAAiB,kDAEnC,OAAOqB,EAAAA,QAAOC,OAAOC,UAAUjB,EAAWnB,EAASoB,GAAmC,EAAOC,IAGtFgB,CAAc,8CAA+C,QAASvB,EAAKC","x_google_ignoreList":[0]}
@@ -0,0 +1,103 @@
1
+ import crypto from "./webcrypto.esm.js";
2
+ import { JOSENotSupported } from "../util/errors.esm.js";
3
+ const findOid = (keyData, oid, from = 0) => {
4
+ if (from === 0) {
5
+ oid.unshift(oid.length);
6
+ oid.unshift(6);
7
+ }
8
+ const i = keyData.indexOf(oid[0], from);
9
+ if (i === -1)
10
+ return false;
11
+ const sub = keyData.subarray(i, i + oid.length);
12
+ if (sub.length !== oid.length)
13
+ return false;
14
+ return sub.every((value, index) => value === oid[index]) || findOid(keyData, oid, i + 1);
15
+ };
16
+ const getNamedCurve = (keyData) => {
17
+ switch (true) {
18
+ case findOid(keyData, [42, 134, 72, 206, 61, 3, 1, 7]):
19
+ return "P-256";
20
+ case findOid(keyData, [43, 129, 4, 0, 34]):
21
+ return "P-384";
22
+ case findOid(keyData, [43, 129, 4, 0, 35]):
23
+ return "P-521";
24
+ case findOid(keyData, [43, 101, 110]):
25
+ return "X25519";
26
+ case findOid(keyData, [43, 101, 111]):
27
+ return "X448";
28
+ case findOid(keyData, [43, 101, 112]):
29
+ return "Ed25519";
30
+ case findOid(keyData, [43, 101, 113]):
31
+ return "Ed448";
32
+ default:
33
+ throw new JOSENotSupported("Invalid or unsupported EC Key Curve or OKP Key Sub Type");
34
+ }
35
+ };
36
+ const genericImport = async (replace, keyFormat, pem, alg, options) => {
37
+ let algorithm;
38
+ let keyUsages;
39
+ const keyData = new Uint8Array(atob(pem.replace(replace, "")).split("").map((c) => c.charCodeAt(0)));
40
+ switch (alg) {
41
+ case "PS256":
42
+ case "PS384":
43
+ case "PS512":
44
+ algorithm = { name: "RSA-PSS", hash: `SHA-${alg.slice(-3)}` };
45
+ keyUsages = ["sign"];
46
+ break;
47
+ case "RS256":
48
+ case "RS384":
49
+ case "RS512":
50
+ algorithm = { name: "RSASSA-PKCS1-v1_5", hash: `SHA-${alg.slice(-3)}` };
51
+ keyUsages = ["sign"];
52
+ break;
53
+ case "RSA-OAEP":
54
+ case "RSA-OAEP-256":
55
+ case "RSA-OAEP-384":
56
+ case "RSA-OAEP-512":
57
+ algorithm = {
58
+ name: "RSA-OAEP",
59
+ hash: `SHA-${parseInt(alg.slice(-3), 10) || 1}`
60
+ };
61
+ keyUsages = ["decrypt", "unwrapKey"];
62
+ break;
63
+ case "ES256":
64
+ algorithm = { name: "ECDSA", namedCurve: "P-256" };
65
+ keyUsages = ["sign"];
66
+ break;
67
+ case "ES384":
68
+ algorithm = { name: "ECDSA", namedCurve: "P-384" };
69
+ keyUsages = ["sign"];
70
+ break;
71
+ case "ES512":
72
+ algorithm = { name: "ECDSA", namedCurve: "P-521" };
73
+ keyUsages = ["sign"];
74
+ break;
75
+ case "ECDH-ES":
76
+ case "ECDH-ES+A128KW":
77
+ case "ECDH-ES+A192KW":
78
+ case "ECDH-ES+A256KW": {
79
+ const namedCurve = getNamedCurve(keyData);
80
+ algorithm = namedCurve.startsWith("P-") ? { name: "ECDH", namedCurve } : { name: namedCurve };
81
+ keyUsages = ["deriveBits"];
82
+ break;
83
+ }
84
+ case "Ed25519":
85
+ algorithm = { name: "Ed25519" };
86
+ keyUsages = ["sign"];
87
+ break;
88
+ case "EdDSA":
89
+ algorithm = { name: getNamedCurve(keyData) };
90
+ keyUsages = ["sign"];
91
+ break;
92
+ default:
93
+ throw new JOSENotSupported('Invalid or unsupported "alg" (Algorithm) value');
94
+ }
95
+ return crypto.subtle.importKey(keyFormat, keyData, algorithm, false, keyUsages);
96
+ };
97
+ const fromPKCS8 = (pem, alg, options) => {
98
+ return genericImport(/(?:-----(?:BEGIN|END) PRIVATE KEY-----|\s)/g, "pkcs8", pem, alg);
99
+ };
100
+ export {
101
+ fromPKCS8
102
+ };
103
+ //# sourceMappingURL=asn1.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"asn1.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/asn1.js"],"sourcesContent":["import crypto, { isCryptoKey } from './webcrypto.js';\nimport invalidKeyInput from '../lib/invalid_key_input.js';\nimport { encodeBase64, decodeBase64 } from './base64url.js';\nimport formatPEM from '../lib/format_pem.js';\nimport { JOSENotSupported } from '../util/errors.js';\nimport { types } from './is_key_like.js';\nconst genericExport = async (keyType, keyFormat, key) => {\n if (!isCryptoKey(key)) {\n throw new TypeError(invalidKeyInput(key, ...types));\n }\n if (!key.extractable) {\n throw new TypeError('CryptoKey is not extractable');\n }\n if (key.type !== keyType) {\n throw new TypeError(`key is not a ${keyType} key`);\n }\n return formatPEM(encodeBase64(new Uint8Array(await crypto.subtle.exportKey(keyFormat, key))), `${keyType.toUpperCase()} KEY`);\n};\nexport const toSPKI = (key) => {\n return genericExport('public', 'spki', key);\n};\nexport const toPKCS8 = (key) => {\n return genericExport('private', 'pkcs8', key);\n};\nconst findOid = (keyData, oid, from = 0) => {\n if (from === 0) {\n oid.unshift(oid.length);\n oid.unshift(0x06);\n }\n const i = keyData.indexOf(oid[0], from);\n if (i === -1)\n return false;\n const sub = keyData.subarray(i, i + oid.length);\n if (sub.length !== oid.length)\n return false;\n return sub.every((value, index) => value === oid[index]) || findOid(keyData, oid, i + 1);\n};\nconst getNamedCurve = (keyData) => {\n switch (true) {\n case findOid(keyData, [0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07]):\n return 'P-256';\n case findOid(keyData, [0x2b, 0x81, 0x04, 0x00, 0x22]):\n return 'P-384';\n case findOid(keyData, [0x2b, 0x81, 0x04, 0x00, 0x23]):\n return 'P-521';\n case findOid(keyData, [0x2b, 0x65, 0x6e]):\n return 'X25519';\n case findOid(keyData, [0x2b, 0x65, 0x6f]):\n return 'X448';\n case findOid(keyData, [0x2b, 0x65, 0x70]):\n return 'Ed25519';\n case findOid(keyData, [0x2b, 0x65, 0x71]):\n return 'Ed448';\n default:\n throw new JOSENotSupported('Invalid or unsupported EC Key Curve or OKP Key Sub Type');\n }\n};\nconst genericImport = async (replace, keyFormat, pem, alg, options) => {\n let algorithm;\n let keyUsages;\n const keyData = new Uint8Array(atob(pem.replace(replace, ''))\n .split('')\n .map((c) => c.charCodeAt(0)));\n const isPublic = keyFormat === 'spki';\n switch (alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${alg.slice(-3)}` };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${alg.slice(-3)}` };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(alg.slice(-3), 10) || 1}`,\n };\n keyUsages = isPublic ? ['encrypt', 'wrapKey'] : ['decrypt', 'unwrapKey'];\n break;\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW': {\n const namedCurve = getNamedCurve(keyData);\n algorithm = namedCurve.startsWith('P-') ? { name: 'ECDH', namedCurve } : { name: namedCurve };\n keyUsages = isPublic ? [] : ['deriveBits'];\n break;\n }\n case 'Ed25519':\n algorithm = { name: 'Ed25519' };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n case 'EdDSA':\n algorithm = { name: getNamedCurve(keyData) };\n keyUsages = isPublic ? ['verify'] : ['sign'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported \"alg\" (Algorithm) value');\n }\n return crypto.subtle.importKey(keyFormat, keyData, algorithm, options?.extractable ?? false, keyUsages);\n};\nexport const fromPKCS8 = (pem, alg, options) => {\n return genericImport(/(?:-----(?:BEGIN|END) PRIVATE KEY-----|\\s)/g, 'pkcs8', pem, alg, options);\n};\nexport const fromSPKI = (pem, alg, options) => {\n return genericImport(/(?:-----(?:BEGIN|END) PUBLIC KEY-----|\\s)/g, 'spki', pem, alg, options);\n};\nfunction getElement(seq) {\n const result = [];\n let next = 0;\n while (next < seq.length) {\n const nextPart = parseElement(seq.subarray(next));\n result.push(nextPart);\n next += nextPart.byteLength;\n }\n return result;\n}\nfunction parseElement(bytes) {\n let position = 0;\n let tag = bytes[0] & 0x1f;\n position++;\n if (tag === 0x1f) {\n tag = 0;\n while (bytes[position] >= 0x80) {\n tag = tag * 128 + bytes[position] - 0x80;\n position++;\n }\n tag = tag * 128 + bytes[position] - 0x80;\n position++;\n }\n let length = 0;\n if (bytes[position] < 0x80) {\n length = bytes[position];\n position++;\n }\n else if (length === 0x80) {\n length = 0;\n while (bytes[position + length] !== 0 || bytes[position + length + 1] !== 0) {\n if (length > bytes.byteLength) {\n throw new TypeError('invalid indefinite form length');\n }\n length++;\n }\n const byteLength = position + length + 2;\n return {\n byteLength,\n contents: bytes.subarray(position, position + length),\n raw: bytes.subarray(0, byteLength),\n };\n }\n else {\n const numberOfDigits = bytes[position] & 0x7f;\n position++;\n length = 0;\n for (let i = 0; i < numberOfDigits; i++) {\n length = length * 256 + bytes[position];\n position++;\n }\n }\n const byteLength = position + length;\n return {\n byteLength,\n contents: bytes.subarray(position, byteLength),\n raw: bytes.subarray(0, byteLength),\n };\n}\nfunction spkiFromX509(buf) {\n const tbsCertificate = getElement(getElement(parseElement(buf).contents)[0].contents);\n return encodeBase64(tbsCertificate[tbsCertificate[0].raw[0] === 0xa0 ? 6 : 5].raw);\n}\nfunction getSPKI(x509) {\n const pem = x509.replace(/(?:-----(?:BEGIN|END) CERTIFICATE-----|\\s)/g, '');\n const raw = decodeBase64(pem);\n return formatPEM(spkiFromX509(raw), 'PUBLIC KEY');\n}\nexport const fromX509 = (pem, alg, options) => {\n let spki;\n try {\n spki = getSPKI(pem);\n }\n catch (cause) {\n throw new TypeError('Failed to parse the X.509 certificate', { cause });\n }\n return fromSPKI(spki, alg, options);\n};\n"],"names":[],"mappings":";;AAwBA,MAAM,UAAU,CAAC,SAAS,KAAK,OAAO,MAAM;AACxC,MAAI,SAAS,GAAG;AACZ,QAAI,QAAQ,IAAI,MAAM;AACtB,QAAI,QAAQ,CAAI;AAAA,EACpB;AACA,QAAM,IAAI,QAAQ,QAAQ,IAAI,CAAC,GAAG,IAAI;AACtC,MAAI,MAAM;AACN,WAAO;AACX,QAAM,MAAM,QAAQ,SAAS,GAAG,IAAI,IAAI,MAAM;AAC9C,MAAI,IAAI,WAAW,IAAI;AACnB,WAAO;AACX,SAAO,IAAI,MAAM,CAAC,OAAO,UAAU,UAAU,IAAI,KAAK,CAAC,KAAK,QAAQ,SAAS,KAAK,IAAI,CAAC;AAC3F;AACA,MAAM,gBAAgB,CAAC,YAAY;AAC/B,UAAQ,MAAI;AAAA,IACR,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,IAAM,KAAM,IAAM,GAAM,GAAM,CAAI,CAAC;AAClE,aAAO;AAAA,IACX,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,GAAM,GAAM,EAAI,CAAC;AAChD,aAAO;AAAA,IACX,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,GAAM,GAAM,EAAI,CAAC;AAChD,aAAO;AAAA,IACX,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,GAAI,CAAC;AACpC,aAAO;AAAA,IACX,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,GAAI,CAAC;AACpC,aAAO;AAAA,IACX,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,GAAI,CAAC;AACpC,aAAO;AAAA,IACX,KAAK,QAAQ,SAAS,CAAC,IAAM,KAAM,GAAI,CAAC;AACpC,aAAO;AAAA,IACX;AACI,YAAM,IAAI,iBAAiB,yDAAyD;AAAA,EAChG;AACA;AACA,MAAM,gBAAgB,OAAO,SAAS,WAAW,KAAK,KAAK,YAAY;AACnE,MAAI;AACJ,MAAI;AACJ,QAAM,UAAU,IAAI,WAAW,KAAK,IAAI,QAAQ,SAAS,EAAE,CAAC,EACvD,MAAM,EAAE,EACR,IAAI,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC,CAAC;AAEhC,UAAQ,KAAG;AAAA,IACP,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,kBAAY,EAAE,MAAM,WAAW,MAAM,OAAO,IAAI,MAAM,EAAE,CAAC,GAAE;AAC3D,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,kBAAY,EAAE,MAAM,qBAAqB,MAAM,OAAO,IAAI,MAAM,EAAE,CAAC,GAAE;AACrE,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AACD,kBAAY;AAAA,QACR,MAAM;AAAA,QACN,MAAM,OAAO,SAAS,IAAI,MAAM,EAAE,GAAG,EAAE,KAAK,CAAC;AAAA,MAC7D;AACY,kBAAgD,CAAC,WAAW,WAAW;AACvE;AAAA,IACJ,KAAK;AACD,kBAAY,EAAE,MAAM,SAAS,YAAY,QAAO;AAChD,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ,KAAK;AACD,kBAAY,EAAE,MAAM,SAAS,YAAY,QAAO;AAChD,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ,KAAK;AACD,kBAAY,EAAE,MAAM,SAAS,YAAY,QAAO;AAChD,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK,kBAAkB;AACnB,YAAM,aAAa,cAAc,OAAO;AACxC,kBAAY,WAAW,WAAW,IAAI,IAAI,EAAE,MAAM,QAAQ,WAAU,IAAK,EAAE,MAAM,WAAU;AAC3F,kBAA4B,CAAC,YAAY;AACzC;AAAA,IACJ;AAAA,IACA,KAAK;AACD,kBAAY,EAAE,MAAM,UAAS;AAC7B,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ,KAAK;AACD,kBAAY,EAAE,MAAM,cAAc,OAAO,EAAC;AAC1C,kBAAoC,CAAC,MAAM;AAC3C;AAAA,IACJ;AACI,YAAM,IAAI,iBAAiB,gDAAgD;AAAA,EACvF;AACI,SAAO,OAAO,OAAO,UAAU,WAAW,SAAS,WAAmC,OAAO,SAAS;AAC1G;AACY,MAAC,YAAY,CAAC,KAAK,KAAK,YAAY;AAC5C,SAAO,cAAc,+CAA+C,SAAS,KAAK,GAAY;AAClG;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("../lib/buffer_utils.cjs.js"),r=r=>{let t=r;"string"==typeof t&&(t=e.encoder.encode(t));const o=[];for(let e=0;e<t.length;e+=32768)o.push(String.fromCharCode.apply(null,t.subarray(e,e+32768)));return btoa(o.join(""))},t=e=>{const r=atob(e),t=new Uint8Array(r.length);for(let o=0;o<r.length;o++)t[o]=r.charCodeAt(o);return t};exports.decode=r=>{let o=r;o instanceof Uint8Array&&(o=e.decoder.decode(o)),o=o.replace(/-/g,"+").replace(/_/g,"/").replace(/\s/g,"");try{return t(o)}catch{throw new TypeError("The input to be decoded is not correctly encoded.")}},exports.decodeBase64=t,exports.encode=e=>r(e).replace(/=/g,"").replace(/\+/g,"-").replace(/\//g,"_"),exports.encodeBase64=r;
2
+ //# sourceMappingURL=base64url.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"base64url.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/base64url.js"],"sourcesContent":["import { encoder, decoder } from '../lib/buffer_utils.js';\nexport const encodeBase64 = (input) => {\n let unencoded = input;\n if (typeof unencoded === 'string') {\n unencoded = encoder.encode(unencoded);\n }\n const CHUNK_SIZE = 0x8000;\n const arr = [];\n for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {\n arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(arr.join(''));\n};\nexport const encode = (input) => {\n return encodeBase64(input).replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n};\nexport const decodeBase64 = (encoded) => {\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n};\nexport const decode = (input) => {\n let encoded = input;\n if (encoded instanceof Uint8Array) {\n encoded = decoder.decode(encoded);\n }\n encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\\s/g, '');\n try {\n return decodeBase64(encoded);\n }\n catch {\n throw new TypeError('The input to be decoded is not correctly encoded.');\n }\n};\n"],"names":["encodeBase64","input","unencoded","encoder","encode","arr","i","length","push","String","fromCharCode","apply","subarray","btoa","join","decodeBase64","encoded","binary","atob","bytes","Uint8Array","charCodeAt","decoder","decode","replace","TypeError"],"mappings":"8HACaA,EAAgBC,IACzB,IAAIC,EAAYD,EACS,iBAAdC,IACPA,EAAYC,EAAAA,QAAQC,OAAOF,IAE/B,MACMG,EAAM,GACZ,IAAA,IAASC,EAAI,EAAGA,EAAIJ,EAAUK,OAAQD,GAFnB,MAGfD,EAAIG,KAAKC,OAAOC,aAAaC,MAAM,KAAMT,EAAUU,SAASN,EAAGA,EAHhD,SAKnB,OAAOO,KAAKR,EAAIS,KAAK,MAKZC,EAAgBC,IACzB,MAAMC,EAASC,KAAKF,GACdG,EAAQ,IAAIC,WAAWH,EAAOV,QACpC,IAAA,IAASD,EAAI,EAAGA,EAAIW,EAAOV,OAAQD,IAC/Ba,EAAMb,GAAKW,EAAOI,WAAWf,GAEjC,OAAOa,kBAEYlB,IACnB,IAAIe,EAAUf,EACVe,aAAmBI,aACnBJ,EAAUM,EAAAA,QAAQC,OAAOP,IAE7BA,EAAUA,EAAQQ,QAAQ,KAAM,KAAKA,QAAQ,KAAM,KAAKA,QAAQ,MAAO,IACvE,IACI,OAAOT,EAAaC,EACxB,CAAA,MAEI,MAAM,IAAIS,UAAU,oDACxB,yCAtBmBxB,GACZD,EAAaC,GAAOuB,QAAQ,KAAM,IAAIA,QAAQ,MAAO,KAAKA,QAAQ,MAAO","x_google_ignoreList":[0]}
@@ -0,0 +1,43 @@
1
+ import { encoder, decoder } from "../lib/buffer_utils.esm.js";
2
+ const encodeBase64 = (input) => {
3
+ let unencoded = input;
4
+ if (typeof unencoded === "string") {
5
+ unencoded = encoder.encode(unencoded);
6
+ }
7
+ const CHUNK_SIZE = 32768;
8
+ const arr = [];
9
+ for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {
10
+ arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));
11
+ }
12
+ return btoa(arr.join(""));
13
+ };
14
+ const encode = (input) => {
15
+ return encodeBase64(input).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
16
+ };
17
+ const decodeBase64 = (encoded) => {
18
+ const binary = atob(encoded);
19
+ const bytes = new Uint8Array(binary.length);
20
+ for (let i = 0; i < binary.length; i++) {
21
+ bytes[i] = binary.charCodeAt(i);
22
+ }
23
+ return bytes;
24
+ };
25
+ const decode = (input) => {
26
+ let encoded = input;
27
+ if (encoded instanceof Uint8Array) {
28
+ encoded = decoder.decode(encoded);
29
+ }
30
+ encoded = encoded.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "");
31
+ try {
32
+ return decodeBase64(encoded);
33
+ } catch {
34
+ throw new TypeError("The input to be decoded is not correctly encoded.");
35
+ }
36
+ };
37
+ export {
38
+ decode,
39
+ decodeBase64,
40
+ encode,
41
+ encodeBase64
42
+ };
43
+ //# sourceMappingURL=base64url.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"base64url.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/base64url.js"],"sourcesContent":["import { encoder, decoder } from '../lib/buffer_utils.js';\nexport const encodeBase64 = (input) => {\n let unencoded = input;\n if (typeof unencoded === 'string') {\n unencoded = encoder.encode(unencoded);\n }\n const CHUNK_SIZE = 0x8000;\n const arr = [];\n for (let i = 0; i < unencoded.length; i += CHUNK_SIZE) {\n arr.push(String.fromCharCode.apply(null, unencoded.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(arr.join(''));\n};\nexport const encode = (input) => {\n return encodeBase64(input).replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n};\nexport const decodeBase64 = (encoded) => {\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n};\nexport const decode = (input) => {\n let encoded = input;\n if (encoded instanceof Uint8Array) {\n encoded = decoder.decode(encoded);\n }\n encoded = encoded.replace(/-/g, '+').replace(/_/g, '/').replace(/\\s/g, '');\n try {\n return decodeBase64(encoded);\n }\n catch {\n throw new TypeError('The input to be decoded is not correctly encoded.');\n }\n};\n"],"names":[],"mappings":";AACY,MAAC,eAAe,CAAC,UAAU;AACnC,MAAI,YAAY;AAChB,MAAI,OAAO,cAAc,UAAU;AAC/B,gBAAY,QAAQ,OAAO,SAAS;AAAA,EACxC;AACA,QAAM,aAAa;AACnB,QAAM,MAAM,CAAA;AACZ,WAAS,IAAI,GAAG,IAAI,UAAU,QAAQ,KAAK,YAAY;AACnD,QAAI,KAAK,OAAO,aAAa,MAAM,MAAM,UAAU,SAAS,GAAG,IAAI,UAAU,CAAC,CAAC;AAAA,EACnF;AACA,SAAO,KAAK,IAAI,KAAK,EAAE,CAAC;AAC5B;AACY,MAAC,SAAS,CAAC,UAAU;AAC7B,SAAO,aAAa,KAAK,EAAE,QAAQ,MAAM,EAAE,EAAE,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,GAAG;AACvF;AACY,MAAC,eAAe,CAAC,YAAY;AACrC,QAAM,SAAS,KAAK,OAAO;AAC3B,QAAM,QAAQ,IAAI,WAAW,OAAO,MAAM;AAC1C,WAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACpC,UAAM,CAAC,IAAI,OAAO,WAAW,CAAC;AAAA,EAClC;AACA,SAAO;AACX;AACY,MAAC,SAAS,CAAC,UAAU;AAC7B,MAAI,UAAU;AACd,MAAI,mBAAmB,YAAY;AAC/B,cAAU,QAAQ,OAAO,OAAO;AAAA,EACpC;AACA,YAAU,QAAQ,QAAQ,MAAM,GAAG,EAAE,QAAQ,MAAM,GAAG,EAAE,QAAQ,OAAO,EAAE;AACzE,MAAI;AACA,WAAO,aAAa,OAAO;AAAA,EAC/B,QACM;AACF,UAAM,IAAI,UAAU,mDAAmD;AAAA,EAC3E;AACJ;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});exports.default=(e,t)=>{if(e.startsWith("RS")||e.startsWith("PS")){const{modulusLength:r}=t.algorithm;if("number"!=typeof r||r<2048)throw new TypeError(`${e} requires key modulusLength to be 2048 bits or larger`)}};
2
+ //# sourceMappingURL=check_key_length.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"check_key_length.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/check_key_length.js"],"sourcesContent":["export default (alg, key) => {\n if (alg.startsWith('RS') || alg.startsWith('PS')) {\n const { modulusLength } = key.algorithm;\n if (typeof modulusLength !== 'number' || modulusLength < 2048) {\n throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);\n }\n }\n};\n"],"names":["alg","key","startsWith","modulusLength","algorithm","TypeError"],"mappings":"4HAAe,CAACA,EAAKC,KACjB,GAAID,EAAIE,WAAW,OAASF,EAAIE,WAAW,MAAO,CAC9C,MAAMC,cAAEA,GAAkBF,EAAIG,UAC9B,GAA6B,iBAAlBD,GAA8BA,EAAgB,KACrD,MAAM,IAAIE,UAAU,GAAGL,yDAE/B","x_google_ignoreList":[0]}
@@ -0,0 +1,12 @@
1
+ const checkKeyLength = (alg, key) => {
2
+ if (alg.startsWith("RS") || alg.startsWith("PS")) {
3
+ const { modulusLength } = key.algorithm;
4
+ if (typeof modulusLength !== "number" || modulusLength < 2048) {
5
+ throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
6
+ }
7
+ }
8
+ };
9
+ export {
10
+ checkKeyLength as default
11
+ };
12
+ //# sourceMappingURL=check_key_length.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"check_key_length.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/check_key_length.js"],"sourcesContent":["export default (alg, key) => {\n if (alg.startsWith('RS') || alg.startsWith('PS')) {\n const { modulusLength } = key.algorithm;\n if (typeof modulusLength !== 'number' || modulusLength < 2048) {\n throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);\n }\n }\n};\n"],"names":[],"mappings":"AAAA,MAAA,iBAAe,CAAC,KAAK,QAAQ;AACzB,MAAI,IAAI,WAAW,IAAI,KAAK,IAAI,WAAW,IAAI,GAAG;AAC9C,UAAM,EAAE,kBAAkB,IAAI;AAC9B,QAAI,OAAO,kBAAkB,YAAY,gBAAgB,MAAM;AAC3D,YAAM,IAAI,UAAU,GAAG,GAAG,uDAAuD;AAAA,IACrF;AAAA,EACJ;AACJ;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./webcrypto.cjs.js"),r=require("../lib/crypto_key.cjs.js"),t=require("../lib/invalid_key_input.cjs.js"),i=require("./is_key_like.cjs.js"),s=require("./normalize_key.cjs.js");exports.default=async function(a,o,y){if(o=await s.default.normalizePrivateKey(o,a),e.isCryptoKey(o))return r.checkSigCryptoKey(o,a,y),o;if(o instanceof Uint8Array){if(!a.startsWith("HS"))throw new TypeError(t.default(o,...i.types));return e.default.subtle.importKey("raw",o,{hash:`SHA-${a.slice(-3)}`,name:"HMAC"},!1,[y])}throw new TypeError(t.default(o,...i.types,"Uint8Array","JSON Web Key"))};
2
+ //# sourceMappingURL=get_sign_verify_key.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"get_sign_verify_key.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/get_sign_verify_key.js"],"sourcesContent":["import crypto, { isCryptoKey } from './webcrypto.js';\nimport { checkSigCryptoKey } from '../lib/crypto_key.js';\nimport invalidKeyInput from '../lib/invalid_key_input.js';\nimport { types } from './is_key_like.js';\nimport normalize from './normalize_key.js';\nexport default async function getCryptoKey(alg, key, usage) {\n if (usage === 'sign') {\n key = await normalize.normalizePrivateKey(key, alg);\n }\n if (usage === 'verify') {\n key = await normalize.normalizePublicKey(key, alg);\n }\n if (isCryptoKey(key)) {\n checkSigCryptoKey(key, alg, usage);\n return key;\n }\n if (key instanceof Uint8Array) {\n if (!alg.startsWith('HS')) {\n throw new TypeError(invalidKeyInput(key, ...types));\n }\n return crypto.subtle.importKey('raw', key, { hash: `SHA-${alg.slice(-3)}`, name: 'HMAC' }, false, [usage]);\n }\n throw new TypeError(invalidKeyInput(key, ...types, 'Uint8Array', 'JSON Web Key'));\n}\n"],"names":["async","alg","key","usage","normalize","normalizePrivateKey","isCryptoKey","checkSigCryptoKey","Uint8Array","startsWith","TypeError","invalidKeyInput","types","crypto","subtle","importKey","hash","slice","name"],"mappings":"2TAKeA,eAA4BC,EAAKC,EAAKC,GAOjD,GALID,QAAYE,EAAAA,QAAUC,oBAAoBH,EAAKD,GAK/CK,EAAAA,YAAYJ,GAEZ,OADAK,oBAAkBL,EAAKD,EAAKE,GACrBD,EAEX,GAAIA,aAAeM,WAAY,CAC3B,IAAKP,EAAIQ,WAAW,MAChB,MAAM,IAAIC,UAAUC,EAAAA,QAAgBT,KAAQU,EAAAA,QAEhD,OAAOC,EAAAA,QAAOC,OAAOC,UAAU,MAAOb,EAAK,CAAEc,KAAM,OAAOf,EAAIgB,OAAM,KAAOC,KAAM,SAAU,EAAO,CAACf,GACvG,CACA,MAAM,IAAIO,UAAUC,UAAgBT,KAAQU,QAAO,aAAc,gBACrE","x_google_ignoreList":[0]}
@@ -0,0 +1,25 @@
1
+ import crypto, { isCryptoKey } from "./webcrypto.esm.js";
2
+ import { checkSigCryptoKey } from "../lib/crypto_key.esm.js";
3
+ import invalidKeyInput from "../lib/invalid_key_input.esm.js";
4
+ import { types } from "./is_key_like.esm.js";
5
+ import normalize from "./normalize_key.esm.js";
6
+ async function getCryptoKey(alg, key, usage) {
7
+ {
8
+ key = await normalize.normalizePrivateKey(key, alg);
9
+ }
10
+ if (isCryptoKey(key)) {
11
+ checkSigCryptoKey(key, alg, usage);
12
+ return key;
13
+ }
14
+ if (key instanceof Uint8Array) {
15
+ if (!alg.startsWith("HS")) {
16
+ throw new TypeError(invalidKeyInput(key, ...types));
17
+ }
18
+ return crypto.subtle.importKey("raw", key, { hash: `SHA-${alg.slice(-3)}`, name: "HMAC" }, false, [usage]);
19
+ }
20
+ throw new TypeError(invalidKeyInput(key, ...types, "Uint8Array", "JSON Web Key"));
21
+ }
22
+ export {
23
+ getCryptoKey as default
24
+ };
25
+ //# sourceMappingURL=get_sign_verify_key.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"get_sign_verify_key.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/get_sign_verify_key.js"],"sourcesContent":["import crypto, { isCryptoKey } from './webcrypto.js';\nimport { checkSigCryptoKey } from '../lib/crypto_key.js';\nimport invalidKeyInput from '../lib/invalid_key_input.js';\nimport { types } from './is_key_like.js';\nimport normalize from './normalize_key.js';\nexport default async function getCryptoKey(alg, key, usage) {\n if (usage === 'sign') {\n key = await normalize.normalizePrivateKey(key, alg);\n }\n if (usage === 'verify') {\n key = await normalize.normalizePublicKey(key, alg);\n }\n if (isCryptoKey(key)) {\n checkSigCryptoKey(key, alg, usage);\n return key;\n }\n if (key instanceof Uint8Array) {\n if (!alg.startsWith('HS')) {\n throw new TypeError(invalidKeyInput(key, ...types));\n }\n return crypto.subtle.importKey('raw', key, { hash: `SHA-${alg.slice(-3)}`, name: 'HMAC' }, false, [usage]);\n }\n throw new TypeError(invalidKeyInput(key, ...types, 'Uint8Array', 'JSON Web Key'));\n}\n"],"names":[],"mappings":";;;;;AAKe,eAAe,aAAa,KAAK,KAAK,OAAO;AAClC;AAClB,UAAM,MAAM,UAAU,oBAAoB,KAAK,GAAG;AAAA,EACtD;AAIA,MAAI,YAAY,GAAG,GAAG;AAClB,sBAAkB,KAAK,KAAK,KAAK;AACjC,WAAO;AAAA,EACX;AACA,MAAI,eAAe,YAAY;AAC3B,QAAI,CAAC,IAAI,WAAW,IAAI,GAAG;AACvB,YAAM,IAAI,UAAU,gBAAgB,KAAK,GAAG,KAAK,CAAC;AAAA,IACtD;AACA,WAAO,OAAO,OAAO,UAAU,OAAO,KAAK,EAAE,MAAM,OAAO,IAAI,MAAM,EAAE,CAAC,IAAI,MAAM,OAAM,GAAI,OAAO,CAAC,KAAK,CAAC;AAAA,EAC7G;AACA,QAAM,IAAI,UAAU,gBAAgB,KAAK,GAAG,OAAO,cAAc,cAAc,CAAC;AACpF;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./webcrypto.cjs.js");exports.default=t=>!!e.isCryptoKey(t)||"KeyObject"===t?.[Symbol.toStringTag],exports.types=["CryptoKey"];
2
+ //# sourceMappingURL=is_key_like.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_key_like.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/is_key_like.js"],"sourcesContent":["import { isCryptoKey } from './webcrypto.js';\nexport default (key) => {\n if (isCryptoKey(key)) {\n return true;\n }\n return key?.[Symbol.toStringTag] === 'KeyObject';\n};\nexport const types = ['CryptoKey'];\n"],"names":["key","isCryptoKey","Symbol","toStringTag"],"mappings":"kKACgBA,KACRC,EAAAA,YAAYD,IAGqB,cAA9BA,IAAME,OAAOC,2BAEH,CAAC","x_google_ignoreList":[0]}
@@ -0,0 +1,13 @@
1
+ import { isCryptoKey } from "./webcrypto.esm.js";
2
+ const isKeyLike = (key) => {
3
+ if (isCryptoKey(key)) {
4
+ return true;
5
+ }
6
+ return key?.[Symbol.toStringTag] === "KeyObject";
7
+ };
8
+ const types = ["CryptoKey"];
9
+ export {
10
+ isKeyLike as default,
11
+ types
12
+ };
13
+ //# sourceMappingURL=is_key_like.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"is_key_like.esm.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/is_key_like.js"],"sourcesContent":["import { isCryptoKey } from './webcrypto.js';\nexport default (key) => {\n if (isCryptoKey(key)) {\n return true;\n }\n return key?.[Symbol.toStringTag] === 'KeyObject';\n};\nexport const types = ['CryptoKey'];\n"],"names":[],"mappings":";AACA,MAAA,YAAe,CAAC,QAAQ;AACpB,MAAI,YAAY,GAAG,GAAG;AAClB,WAAO;AAAA,EACX;AACA,SAAO,MAAM,OAAO,WAAW,MAAM;AACzC;AACY,MAAC,QAAQ,CAAC,WAAW;","x_google_ignoreList":[0]}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperties(exports,{__esModule:{value:!0},[Symbol.toStringTag]:{value:"Module"}});const e=require("./webcrypto.cjs.js"),a=require("../util/errors.cjs.js");exports.default=async r=>{if(!r.alg)throw new TypeError('"alg" argument is required when "jwk.alg" is not present');const{algorithm:s,keyUsages:t}=function(e){let r,s;switch(e.kty){case"RSA":switch(e.alg){case"PS256":case"PS384":case"PS512":r={name:"RSA-PSS",hash:`SHA-${e.alg.slice(-3)}`},s=e.d?["sign"]:["verify"];break;case"RS256":case"RS384":case"RS512":r={name:"RSASSA-PKCS1-v1_5",hash:`SHA-${e.alg.slice(-3)}`},s=e.d?["sign"]:["verify"];break;case"RSA-OAEP":case"RSA-OAEP-256":case"RSA-OAEP-384":case"RSA-OAEP-512":r={name:"RSA-OAEP",hash:`SHA-${parseInt(e.alg.slice(-3),10)||1}`},s=e.d?["decrypt","unwrapKey"]:["encrypt","wrapKey"];break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value')}break;case"EC":switch(e.alg){case"ES256":r={name:"ECDSA",namedCurve:"P-256"},s=e.d?["sign"]:["verify"];break;case"ES384":r={name:"ECDSA",namedCurve:"P-384"},s=e.d?["sign"]:["verify"];break;case"ES512":r={name:"ECDSA",namedCurve:"P-521"},s=e.d?["sign"]:["verify"];break;case"ECDH-ES":case"ECDH-ES+A128KW":case"ECDH-ES+A192KW":case"ECDH-ES+A256KW":r={name:"ECDH",namedCurve:e.crv},s=e.d?["deriveBits"]:[];break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value')}break;case"OKP":switch(e.alg){case"Ed25519":r={name:"Ed25519"},s=e.d?["sign"]:["verify"];break;case"EdDSA":r={name:e.crv},s=e.d?["sign"]:["verify"];break;case"ECDH-ES":case"ECDH-ES+A128KW":case"ECDH-ES+A192KW":case"ECDH-ES+A256KW":r={name:e.crv},s=e.d?["deriveBits"]:[];break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value')}break;default:throw new a.JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value')}return{algorithm:r,keyUsages:s}}(r),n=[s,r.ext??!1,r.key_ops??t],c={...r};return delete c.alg,delete c.use,e.default.subtle.importKey("jwk",c,...n)};
2
+ //# sourceMappingURL=jwk_to_key.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"jwk_to_key.cjs.js","sources":["../../../../../../node_modules/jose/dist/browser/runtime/jwk_to_key.js"],"sourcesContent":["import crypto from './webcrypto.js';\nimport { JOSENotSupported } from '../util/errors.js';\nfunction subtleMapping(jwk) {\n let algorithm;\n let keyUsages;\n switch (jwk.kty) {\n case 'RSA': {\n switch (jwk.alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,\n };\n keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'EC': {\n switch (jwk.alg) {\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: 'ECDH', namedCurve: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'OKP': {\n switch (jwk.alg) {\n case 'Ed25519':\n algorithm = { name: 'Ed25519' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'EdDSA':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"kty\" (Key Type) Parameter value');\n }\n return { algorithm, keyUsages };\n}\nconst parse = async (jwk) => {\n if (!jwk.alg) {\n throw new TypeError('\"alg\" argument is required when \"jwk.alg\" is not present');\n }\n const { algorithm, keyUsages } = subtleMapping(jwk);\n const rest = [\n algorithm,\n jwk.ext ?? false,\n jwk.key_ops ?? keyUsages,\n ];\n const keyData = { ...jwk };\n delete keyData.alg;\n delete keyData.use;\n return crypto.subtle.importKey('jwk', keyData, ...rest);\n};\nexport default parse;\n"],"names":["async","jwk","alg","TypeError","algorithm","keyUsages","kty","name","hash","slice","d","parseInt","JOSENotSupported","namedCurve","crv","subtleMapping","rest","ext","key_ops","keyData","use","crypto","subtle","importKey"],"mappings":"qMAwFcA,MAAOC,IACjB,IAAKA,EAAIC,IACL,MAAM,IAAIC,UAAU,4DAExB,MAAMC,UAAEA,EAAAC,UAAWA,GA1FvB,SAAuBJ,GACnB,IAAIG,EACAC,EACJ,OAAQJ,EAAIK,KACR,IAAK,MACD,OAAQL,EAAIC,KACR,IAAK,QACL,IAAK,QACL,IAAK,QACDE,EAAY,CAAEG,KAAM,UAAWC,KAAM,OAAOP,EAAIC,IAAIO,OAAM,MAC1DJ,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACL,IAAK,QACL,IAAK,QACDN,EAAY,CAAEG,KAAM,oBAAqBC,KAAM,OAAOP,EAAIC,IAAIO,OAAM,MACpEJ,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,WACL,IAAK,eACL,IAAK,eACL,IAAK,eACDN,EAAY,CACRG,KAAM,WACNC,KAAM,OAAOG,SAASV,EAAIC,IAAIO,OAAM,GAAK,KAAO,KAEpDJ,EAAYJ,EAAIS,EAAI,CAAC,UAAW,aAAe,CAAC,UAAW,WAC3D,MACJ,QACI,MAAM,IAAIE,EAAAA,iBAAiB,gEAEnC,MAEJ,IAAK,KACD,OAAQX,EAAIC,KACR,IAAK,QACDE,EAAY,CAAEG,KAAM,QAASM,WAAY,SACzCR,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACDN,EAAY,CAAEG,KAAM,QAASM,WAAY,SACzCR,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACDN,EAAY,CAAEG,KAAM,QAASM,WAAY,SACzCR,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,UACL,IAAK,iBACL,IAAK,iBACL,IAAK,iBACDN,EAAY,CAAEG,KAAM,OAAQM,WAAYZ,EAAIa,KAC5CT,EAAYJ,EAAIS,EAAI,CAAC,cAAgB,GACrC,MACJ,QACI,MAAM,IAAIE,EAAAA,iBAAiB,gEAEnC,MAEJ,IAAK,MACD,OAAQX,EAAIC,KACR,IAAK,UACDE,EAAY,CAAEG,KAAM,WACpBF,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,QACDN,EAAY,CAAEG,KAAMN,EAAIa,KACxBT,EAAYJ,EAAIS,EAAI,CAAC,QAAU,CAAC,UAChC,MACJ,IAAK,UACL,IAAK,iBACL,IAAK,iBACL,IAAK,iBACDN,EAAY,CAAEG,KAAMN,EAAIa,KACxBT,EAAYJ,EAAIS,EAAI,CAAC,cAAgB,GACrC,MACJ,QACI,MAAM,IAAIE,EAAAA,iBAAiB,gEAEnC,MAEJ,QACI,MAAM,IAAIA,EAAAA,iBAAiB,+DAEnC,MAAO,CAAER,YAAWC,YACxB,CAKqCU,CAAcd,GACzCe,EAAO,CACTZ,EACAH,EAAIgB,MAAO,EACXhB,EAAIiB,SAAWb,GAEbc,EAAU,IAAKlB,GAGrB,cAFOkB,EAAQjB,WACRiB,EAAQC,IACRC,EAAAA,QAAOC,OAAOC,UAAU,MAAOJ,KAAYH","x_google_ignoreList":[0]}