@pod-os/core 0.12.1-facecbd.0 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +56 -69
- package/lib/index.js +56 -69
- package/package.json +11 -11
- package/types/thing/labelFromUri.d.ts +4 -0
package/dist/index.js
CHANGED
|
@@ -10177,125 +10177,118 @@ var decode = (input2) => {
|
|
|
10177
10177
|
|
|
10178
10178
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/jose/dist/browser/util/errors.js
|
|
10179
10179
|
var JOSEError = class extends Error {
|
|
10180
|
-
|
|
10181
|
-
|
|
10182
|
-
}
|
|
10183
|
-
constructor(message4) {
|
|
10184
|
-
super(message4);
|
|
10180
|
+
constructor(message4, options) {
|
|
10181
|
+
super(message4, options);
|
|
10185
10182
|
this.code = "ERR_JOSE_GENERIC";
|
|
10186
10183
|
this.name = this.constructor.name;
|
|
10187
10184
|
Error.captureStackTrace?.(this, this.constructor);
|
|
10188
10185
|
}
|
|
10189
10186
|
};
|
|
10187
|
+
JOSEError.code = "ERR_JOSE_GENERIC";
|
|
10190
10188
|
var JWTClaimValidationFailed = class extends JOSEError {
|
|
10191
|
-
static get code() {
|
|
10192
|
-
return "ERR_JWT_CLAIM_VALIDATION_FAILED";
|
|
10193
|
-
}
|
|
10194
10189
|
constructor(message4, payload4, claim2 = "unspecified", reason2 = "unspecified") {
|
|
10195
|
-
super(message4);
|
|
10190
|
+
super(message4, { cause: { claim: claim2, reason: reason2, payload: payload4 } });
|
|
10196
10191
|
this.code = "ERR_JWT_CLAIM_VALIDATION_FAILED";
|
|
10197
10192
|
this.claim = claim2;
|
|
10198
10193
|
this.reason = reason2;
|
|
10199
10194
|
this.payload = payload4;
|
|
10200
10195
|
}
|
|
10201
10196
|
};
|
|
10197
|
+
JWTClaimValidationFailed.code = "ERR_JWT_CLAIM_VALIDATION_FAILED";
|
|
10202
10198
|
var JWTExpired = class extends JOSEError {
|
|
10203
|
-
static get code() {
|
|
10204
|
-
return "ERR_JWT_EXPIRED";
|
|
10205
|
-
}
|
|
10206
10199
|
constructor(message4, payload4, claim2 = "unspecified", reason2 = "unspecified") {
|
|
10207
|
-
super(message4);
|
|
10200
|
+
super(message4, { cause: { claim: claim2, reason: reason2, payload: payload4 } });
|
|
10208
10201
|
this.code = "ERR_JWT_EXPIRED";
|
|
10209
10202
|
this.claim = claim2;
|
|
10210
10203
|
this.reason = reason2;
|
|
10211
10204
|
this.payload = payload4;
|
|
10212
10205
|
}
|
|
10213
10206
|
};
|
|
10207
|
+
JWTExpired.code = "ERR_JWT_EXPIRED";
|
|
10214
10208
|
var JOSEAlgNotAllowed = class extends JOSEError {
|
|
10215
10209
|
constructor() {
|
|
10216
10210
|
super(...arguments);
|
|
10217
10211
|
this.code = "ERR_JOSE_ALG_NOT_ALLOWED";
|
|
10218
10212
|
}
|
|
10219
|
-
static get code() {
|
|
10220
|
-
return "ERR_JOSE_ALG_NOT_ALLOWED";
|
|
10221
|
-
}
|
|
10222
10213
|
};
|
|
10214
|
+
JOSEAlgNotAllowed.code = "ERR_JOSE_ALG_NOT_ALLOWED";
|
|
10223
10215
|
var JOSENotSupported = class extends JOSEError {
|
|
10224
10216
|
constructor() {
|
|
10225
10217
|
super(...arguments);
|
|
10226
10218
|
this.code = "ERR_JOSE_NOT_SUPPORTED";
|
|
10227
10219
|
}
|
|
10228
|
-
|
|
10229
|
-
|
|
10220
|
+
};
|
|
10221
|
+
JOSENotSupported.code = "ERR_JOSE_NOT_SUPPORTED";
|
|
10222
|
+
var JWEDecryptionFailed = class extends JOSEError {
|
|
10223
|
+
constructor(message4 = "decryption operation failed", options) {
|
|
10224
|
+
super(message4, options);
|
|
10225
|
+
this.code = "ERR_JWE_DECRYPTION_FAILED";
|
|
10226
|
+
}
|
|
10227
|
+
};
|
|
10228
|
+
JWEDecryptionFailed.code = "ERR_JWE_DECRYPTION_FAILED";
|
|
10229
|
+
var JWEInvalid = class extends JOSEError {
|
|
10230
|
+
constructor() {
|
|
10231
|
+
super(...arguments);
|
|
10232
|
+
this.code = "ERR_JWE_INVALID";
|
|
10230
10233
|
}
|
|
10231
10234
|
};
|
|
10235
|
+
JWEInvalid.code = "ERR_JWE_INVALID";
|
|
10232
10236
|
var JWSInvalid = class extends JOSEError {
|
|
10233
10237
|
constructor() {
|
|
10234
10238
|
super(...arguments);
|
|
10235
10239
|
this.code = "ERR_JWS_INVALID";
|
|
10236
10240
|
}
|
|
10237
|
-
static get code() {
|
|
10238
|
-
return "ERR_JWS_INVALID";
|
|
10239
|
-
}
|
|
10240
10241
|
};
|
|
10242
|
+
JWSInvalid.code = "ERR_JWS_INVALID";
|
|
10241
10243
|
var JWTInvalid = class extends JOSEError {
|
|
10242
10244
|
constructor() {
|
|
10243
10245
|
super(...arguments);
|
|
10244
10246
|
this.code = "ERR_JWT_INVALID";
|
|
10245
10247
|
}
|
|
10246
|
-
|
|
10247
|
-
|
|
10248
|
+
};
|
|
10249
|
+
JWTInvalid.code = "ERR_JWT_INVALID";
|
|
10250
|
+
var JWKInvalid = class extends JOSEError {
|
|
10251
|
+
constructor() {
|
|
10252
|
+
super(...arguments);
|
|
10253
|
+
this.code = "ERR_JWK_INVALID";
|
|
10248
10254
|
}
|
|
10249
10255
|
};
|
|
10256
|
+
JWKInvalid.code = "ERR_JWK_INVALID";
|
|
10250
10257
|
var JWKSInvalid = class extends JOSEError {
|
|
10251
10258
|
constructor() {
|
|
10252
10259
|
super(...arguments);
|
|
10253
10260
|
this.code = "ERR_JWKS_INVALID";
|
|
10254
10261
|
}
|
|
10255
|
-
static get code() {
|
|
10256
|
-
return "ERR_JWKS_INVALID";
|
|
10257
|
-
}
|
|
10258
10262
|
};
|
|
10263
|
+
JWKSInvalid.code = "ERR_JWKS_INVALID";
|
|
10259
10264
|
var JWKSNoMatchingKey = class extends JOSEError {
|
|
10260
|
-
constructor() {
|
|
10261
|
-
super(
|
|
10265
|
+
constructor(message4 = "no applicable key found in the JSON Web Key Set", options) {
|
|
10266
|
+
super(message4, options);
|
|
10262
10267
|
this.code = "ERR_JWKS_NO_MATCHING_KEY";
|
|
10263
|
-
this.message = "no applicable key found in the JSON Web Key Set";
|
|
10264
|
-
}
|
|
10265
|
-
static get code() {
|
|
10266
|
-
return "ERR_JWKS_NO_MATCHING_KEY";
|
|
10267
10268
|
}
|
|
10268
10269
|
};
|
|
10270
|
+
JWKSNoMatchingKey.code = "ERR_JWKS_NO_MATCHING_KEY";
|
|
10269
10271
|
var JWKSMultipleMatchingKeys = class extends JOSEError {
|
|
10270
|
-
constructor() {
|
|
10271
|
-
super(
|
|
10272
|
+
constructor(message4 = "multiple matching keys found in the JSON Web Key Set", options) {
|
|
10273
|
+
super(message4, options);
|
|
10272
10274
|
this.code = "ERR_JWKS_MULTIPLE_MATCHING_KEYS";
|
|
10273
|
-
this.message = "multiple matching keys found in the JSON Web Key Set";
|
|
10274
|
-
}
|
|
10275
|
-
static get code() {
|
|
10276
|
-
return "ERR_JWKS_MULTIPLE_MATCHING_KEYS";
|
|
10277
10275
|
}
|
|
10278
10276
|
};
|
|
10277
|
+
JWKSMultipleMatchingKeys.code = "ERR_JWKS_MULTIPLE_MATCHING_KEYS";
|
|
10279
10278
|
var JWKSTimeout = class extends JOSEError {
|
|
10280
|
-
constructor() {
|
|
10281
|
-
super(
|
|
10279
|
+
constructor(message4 = "request timed out", options) {
|
|
10280
|
+
super(message4, options);
|
|
10282
10281
|
this.code = "ERR_JWKS_TIMEOUT";
|
|
10283
|
-
this.message = "request timed out";
|
|
10284
|
-
}
|
|
10285
|
-
static get code() {
|
|
10286
|
-
return "ERR_JWKS_TIMEOUT";
|
|
10287
10282
|
}
|
|
10288
10283
|
};
|
|
10284
|
+
JWKSTimeout.code = "ERR_JWKS_TIMEOUT";
|
|
10289
10285
|
var JWSSignatureVerificationFailed = class extends JOSEError {
|
|
10290
|
-
constructor() {
|
|
10291
|
-
super(
|
|
10286
|
+
constructor(message4 = "signature verification failed", options) {
|
|
10287
|
+
super(message4, options);
|
|
10292
10288
|
this.code = "ERR_JWS_SIGNATURE_VERIFICATION_FAILED";
|
|
10293
|
-
this.message = "signature verification failed";
|
|
10294
|
-
}
|
|
10295
|
-
static get code() {
|
|
10296
|
-
return "ERR_JWS_SIGNATURE_VERIFICATION_FAILED";
|
|
10297
10289
|
}
|
|
10298
10290
|
};
|
|
10291
|
+
JWSSignatureVerificationFailed.code = "ERR_JWS_SIGNATURE_VERIFICATION_FAILED";
|
|
10299
10292
|
|
|
10300
10293
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/jose/dist/browser/lib/crypto_key.js
|
|
10301
10294
|
function unusable(name7, prop = "algorithm.name") {
|
|
@@ -11525,7 +11518,7 @@ function isCloudflareWorkers() {
|
|
|
11525
11518
|
var USER_AGENT;
|
|
11526
11519
|
if (typeof navigator === "undefined" || !navigator.userAgent?.startsWith?.("Mozilla/5.0 ")) {
|
|
11527
11520
|
const NAME = "jose";
|
|
11528
|
-
const VERSION = "v5.9.
|
|
11521
|
+
const VERSION = "v5.9.6";
|
|
11529
11522
|
USER_AGENT = `${NAME}/${VERSION}`;
|
|
11530
11523
|
}
|
|
11531
11524
|
var jwksCache = Symbol();
|
|
@@ -11746,10 +11739,9 @@ async function generateKeyPair2(alg, options) {
|
|
|
11746
11739
|
|
|
11747
11740
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/uuid/dist/esm-browser/stringify.js
|
|
11748
11741
|
var byteToHex = [];
|
|
11749
|
-
for (i = 0; i < 256; ++i) {
|
|
11742
|
+
for (let i = 0; i < 256; ++i) {
|
|
11750
11743
|
byteToHex.push((i + 256).toString(16).slice(1));
|
|
11751
11744
|
}
|
|
11752
|
-
var i;
|
|
11753
11745
|
function unsafeStringify(arr, offset3 = 0) {
|
|
11754
11746
|
return (byteToHex[arr[offset3 + 0]] + byteToHex[arr[offset3 + 1]] + byteToHex[arr[offset3 + 2]] + byteToHex[arr[offset3 + 3]] + "-" + byteToHex[arr[offset3 + 4]] + byteToHex[arr[offset3 + 5]] + "-" + byteToHex[arr[offset3 + 6]] + byteToHex[arr[offset3 + 7]] + "-" + byteToHex[arr[offset3 + 8]] + byteToHex[arr[offset3 + 9]] + "-" + byteToHex[arr[offset3 + 10]] + byteToHex[arr[offset3 + 11]] + byteToHex[arr[offset3 + 12]] + byteToHex[arr[offset3 + 13]] + byteToHex[arr[offset3 + 14]] + byteToHex[arr[offset3 + 15]]).toLowerCase();
|
|
11755
11747
|
}
|
|
@@ -11759,19 +11751,17 @@ var getRandomValues;
|
|
|
11759
11751
|
var rnds8 = new Uint8Array(16);
|
|
11760
11752
|
function rng() {
|
|
11761
11753
|
if (!getRandomValues) {
|
|
11762
|
-
|
|
11763
|
-
if (!getRandomValues) {
|
|
11754
|
+
if (typeof crypto === "undefined" || !crypto.getRandomValues) {
|
|
11764
11755
|
throw new Error("crypto.getRandomValues() not supported. See https://github.com/uuidjs/uuid#getrandomvalues-not-supported");
|
|
11765
11756
|
}
|
|
11757
|
+
getRandomValues = crypto.getRandomValues.bind(crypto);
|
|
11766
11758
|
}
|
|
11767
11759
|
return getRandomValues(rnds8);
|
|
11768
11760
|
}
|
|
11769
11761
|
|
|
11770
11762
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/uuid/dist/esm-browser/native.js
|
|
11771
11763
|
var randomUUID = typeof crypto !== "undefined" && crypto.randomUUID && crypto.randomUUID.bind(crypto);
|
|
11772
|
-
var native_default = {
|
|
11773
|
-
randomUUID
|
|
11774
|
-
};
|
|
11764
|
+
var native_default = { randomUUID };
|
|
11775
11765
|
|
|
11776
11766
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/uuid/dist/esm-browser/v4.js
|
|
11777
11767
|
function v4(options, buf, offset3) {
|
|
@@ -11779,12 +11769,12 @@ function v4(options, buf, offset3) {
|
|
|
11779
11769
|
return native_default.randomUUID();
|
|
11780
11770
|
}
|
|
11781
11771
|
options = options || {};
|
|
11782
|
-
|
|
11772
|
+
const rnds = options.random || (options.rng || rng)();
|
|
11783
11773
|
rnds[6] = rnds[6] & 15 | 64;
|
|
11784
11774
|
rnds[8] = rnds[8] & 63 | 128;
|
|
11785
11775
|
if (buf) {
|
|
11786
11776
|
offset3 = offset3 || 0;
|
|
11787
|
-
for (
|
|
11777
|
+
for (let i = 0; i < 16; ++i) {
|
|
11788
11778
|
buf[offset3 + i] = rnds[i];
|
|
11789
11779
|
}
|
|
11790
11780
|
return buf;
|
|
@@ -12467,10 +12457,9 @@ async function buildAuthenticatedFetch(accessToken, options) {
|
|
|
12467
12457
|
|
|
12468
12458
|
// ../node_modules/@inrupt/solid-client-authn-browser/node_modules/uuid/dist/esm-browser/stringify.js
|
|
12469
12459
|
var byteToHex2 = [];
|
|
12470
|
-
for (i = 0; i < 256; ++i) {
|
|
12460
|
+
for (let i = 0; i < 256; ++i) {
|
|
12471
12461
|
byteToHex2.push((i + 256).toString(16).slice(1));
|
|
12472
12462
|
}
|
|
12473
|
-
var i;
|
|
12474
12463
|
function unsafeStringify2(arr, offset3 = 0) {
|
|
12475
12464
|
return (byteToHex2[arr[offset3 + 0]] + byteToHex2[arr[offset3 + 1]] + byteToHex2[arr[offset3 + 2]] + byteToHex2[arr[offset3 + 3]] + "-" + byteToHex2[arr[offset3 + 4]] + byteToHex2[arr[offset3 + 5]] + "-" + byteToHex2[arr[offset3 + 6]] + byteToHex2[arr[offset3 + 7]] + "-" + byteToHex2[arr[offset3 + 8]] + byteToHex2[arr[offset3 + 9]] + "-" + byteToHex2[arr[offset3 + 10]] + byteToHex2[arr[offset3 + 11]] + byteToHex2[arr[offset3 + 12]] + byteToHex2[arr[offset3 + 13]] + byteToHex2[arr[offset3 + 14]] + byteToHex2[arr[offset3 + 15]]).toLowerCase();
|
|
12476
12465
|
}
|
|
@@ -12480,19 +12469,17 @@ var getRandomValues2;
|
|
|
12480
12469
|
var rnds82 = new Uint8Array(16);
|
|
12481
12470
|
function rng2() {
|
|
12482
12471
|
if (!getRandomValues2) {
|
|
12483
|
-
|
|
12484
|
-
if (!getRandomValues2) {
|
|
12472
|
+
if (typeof crypto === "undefined" || !crypto.getRandomValues) {
|
|
12485
12473
|
throw new Error("crypto.getRandomValues() not supported. See https://github.com/uuidjs/uuid#getrandomvalues-not-supported");
|
|
12486
12474
|
}
|
|
12475
|
+
getRandomValues2 = crypto.getRandomValues.bind(crypto);
|
|
12487
12476
|
}
|
|
12488
12477
|
return getRandomValues2(rnds82);
|
|
12489
12478
|
}
|
|
12490
12479
|
|
|
12491
12480
|
// ../node_modules/@inrupt/solid-client-authn-browser/node_modules/uuid/dist/esm-browser/native.js
|
|
12492
12481
|
var randomUUID2 = typeof crypto !== "undefined" && crypto.randomUUID && crypto.randomUUID.bind(crypto);
|
|
12493
|
-
var native_default2 = {
|
|
12494
|
-
randomUUID: randomUUID2
|
|
12495
|
-
};
|
|
12482
|
+
var native_default2 = { randomUUID: randomUUID2 };
|
|
12496
12483
|
|
|
12497
12484
|
// ../node_modules/@inrupt/solid-client-authn-browser/node_modules/uuid/dist/esm-browser/v4.js
|
|
12498
12485
|
function v42(options, buf, offset3) {
|
|
@@ -12500,12 +12487,12 @@ function v42(options, buf, offset3) {
|
|
|
12500
12487
|
return native_default2.randomUUID();
|
|
12501
12488
|
}
|
|
12502
12489
|
options = options || {};
|
|
12503
|
-
|
|
12490
|
+
const rnds = options.random || (options.rng || rng2)();
|
|
12504
12491
|
rnds[6] = rnds[6] & 15 | 64;
|
|
12505
12492
|
rnds[8] = rnds[8] & 63 | 128;
|
|
12506
12493
|
if (buf) {
|
|
12507
12494
|
offset3 = offset3 || 0;
|
|
12508
|
-
for (
|
|
12495
|
+
for (let i = 0; i < 16; ++i) {
|
|
12509
12496
|
buf[offset3 + i] = rnds[i];
|
|
12510
12497
|
}
|
|
12511
12498
|
return buf;
|
package/lib/index.js
CHANGED
|
@@ -45976,125 +45976,118 @@ var PodOS = (() => {
|
|
|
45976
45976
|
|
|
45977
45977
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/jose/dist/browser/util/errors.js
|
|
45978
45978
|
var JOSEError = class extends Error {
|
|
45979
|
-
|
|
45980
|
-
|
|
45981
|
-
}
|
|
45982
|
-
constructor(message4) {
|
|
45983
|
-
super(message4);
|
|
45979
|
+
constructor(message4, options) {
|
|
45980
|
+
super(message4, options);
|
|
45984
45981
|
this.code = "ERR_JOSE_GENERIC";
|
|
45985
45982
|
this.name = this.constructor.name;
|
|
45986
45983
|
Error.captureStackTrace?.(this, this.constructor);
|
|
45987
45984
|
}
|
|
45988
45985
|
};
|
|
45986
|
+
JOSEError.code = "ERR_JOSE_GENERIC";
|
|
45989
45987
|
var JWTClaimValidationFailed = class extends JOSEError {
|
|
45990
|
-
static get code() {
|
|
45991
|
-
return "ERR_JWT_CLAIM_VALIDATION_FAILED";
|
|
45992
|
-
}
|
|
45993
45988
|
constructor(message4, payload4, claim2 = "unspecified", reason2 = "unspecified") {
|
|
45994
|
-
super(message4);
|
|
45989
|
+
super(message4, { cause: { claim: claim2, reason: reason2, payload: payload4 } });
|
|
45995
45990
|
this.code = "ERR_JWT_CLAIM_VALIDATION_FAILED";
|
|
45996
45991
|
this.claim = claim2;
|
|
45997
45992
|
this.reason = reason2;
|
|
45998
45993
|
this.payload = payload4;
|
|
45999
45994
|
}
|
|
46000
45995
|
};
|
|
45996
|
+
JWTClaimValidationFailed.code = "ERR_JWT_CLAIM_VALIDATION_FAILED";
|
|
46001
45997
|
var JWTExpired = class extends JOSEError {
|
|
46002
|
-
static get code() {
|
|
46003
|
-
return "ERR_JWT_EXPIRED";
|
|
46004
|
-
}
|
|
46005
45998
|
constructor(message4, payload4, claim2 = "unspecified", reason2 = "unspecified") {
|
|
46006
|
-
super(message4);
|
|
45999
|
+
super(message4, { cause: { claim: claim2, reason: reason2, payload: payload4 } });
|
|
46007
46000
|
this.code = "ERR_JWT_EXPIRED";
|
|
46008
46001
|
this.claim = claim2;
|
|
46009
46002
|
this.reason = reason2;
|
|
46010
46003
|
this.payload = payload4;
|
|
46011
46004
|
}
|
|
46012
46005
|
};
|
|
46006
|
+
JWTExpired.code = "ERR_JWT_EXPIRED";
|
|
46013
46007
|
var JOSEAlgNotAllowed = class extends JOSEError {
|
|
46014
46008
|
constructor() {
|
|
46015
46009
|
super(...arguments);
|
|
46016
46010
|
this.code = "ERR_JOSE_ALG_NOT_ALLOWED";
|
|
46017
46011
|
}
|
|
46018
|
-
static get code() {
|
|
46019
|
-
return "ERR_JOSE_ALG_NOT_ALLOWED";
|
|
46020
|
-
}
|
|
46021
46012
|
};
|
|
46013
|
+
JOSEAlgNotAllowed.code = "ERR_JOSE_ALG_NOT_ALLOWED";
|
|
46022
46014
|
var JOSENotSupported = class extends JOSEError {
|
|
46023
46015
|
constructor() {
|
|
46024
46016
|
super(...arguments);
|
|
46025
46017
|
this.code = "ERR_JOSE_NOT_SUPPORTED";
|
|
46026
46018
|
}
|
|
46027
|
-
|
|
46028
|
-
|
|
46019
|
+
};
|
|
46020
|
+
JOSENotSupported.code = "ERR_JOSE_NOT_SUPPORTED";
|
|
46021
|
+
var JWEDecryptionFailed = class extends JOSEError {
|
|
46022
|
+
constructor(message4 = "decryption operation failed", options) {
|
|
46023
|
+
super(message4, options);
|
|
46024
|
+
this.code = "ERR_JWE_DECRYPTION_FAILED";
|
|
46025
|
+
}
|
|
46026
|
+
};
|
|
46027
|
+
JWEDecryptionFailed.code = "ERR_JWE_DECRYPTION_FAILED";
|
|
46028
|
+
var JWEInvalid = class extends JOSEError {
|
|
46029
|
+
constructor() {
|
|
46030
|
+
super(...arguments);
|
|
46031
|
+
this.code = "ERR_JWE_INVALID";
|
|
46029
46032
|
}
|
|
46030
46033
|
};
|
|
46034
|
+
JWEInvalid.code = "ERR_JWE_INVALID";
|
|
46031
46035
|
var JWSInvalid = class extends JOSEError {
|
|
46032
46036
|
constructor() {
|
|
46033
46037
|
super(...arguments);
|
|
46034
46038
|
this.code = "ERR_JWS_INVALID";
|
|
46035
46039
|
}
|
|
46036
|
-
static get code() {
|
|
46037
|
-
return "ERR_JWS_INVALID";
|
|
46038
|
-
}
|
|
46039
46040
|
};
|
|
46041
|
+
JWSInvalid.code = "ERR_JWS_INVALID";
|
|
46040
46042
|
var JWTInvalid = class extends JOSEError {
|
|
46041
46043
|
constructor() {
|
|
46042
46044
|
super(...arguments);
|
|
46043
46045
|
this.code = "ERR_JWT_INVALID";
|
|
46044
46046
|
}
|
|
46045
|
-
|
|
46046
|
-
|
|
46047
|
+
};
|
|
46048
|
+
JWTInvalid.code = "ERR_JWT_INVALID";
|
|
46049
|
+
var JWKInvalid = class extends JOSEError {
|
|
46050
|
+
constructor() {
|
|
46051
|
+
super(...arguments);
|
|
46052
|
+
this.code = "ERR_JWK_INVALID";
|
|
46047
46053
|
}
|
|
46048
46054
|
};
|
|
46055
|
+
JWKInvalid.code = "ERR_JWK_INVALID";
|
|
46049
46056
|
var JWKSInvalid = class extends JOSEError {
|
|
46050
46057
|
constructor() {
|
|
46051
46058
|
super(...arguments);
|
|
46052
46059
|
this.code = "ERR_JWKS_INVALID";
|
|
46053
46060
|
}
|
|
46054
|
-
static get code() {
|
|
46055
|
-
return "ERR_JWKS_INVALID";
|
|
46056
|
-
}
|
|
46057
46061
|
};
|
|
46062
|
+
JWKSInvalid.code = "ERR_JWKS_INVALID";
|
|
46058
46063
|
var JWKSNoMatchingKey = class extends JOSEError {
|
|
46059
|
-
constructor() {
|
|
46060
|
-
super(
|
|
46064
|
+
constructor(message4 = "no applicable key found in the JSON Web Key Set", options) {
|
|
46065
|
+
super(message4, options);
|
|
46061
46066
|
this.code = "ERR_JWKS_NO_MATCHING_KEY";
|
|
46062
|
-
this.message = "no applicable key found in the JSON Web Key Set";
|
|
46063
|
-
}
|
|
46064
|
-
static get code() {
|
|
46065
|
-
return "ERR_JWKS_NO_MATCHING_KEY";
|
|
46066
46067
|
}
|
|
46067
46068
|
};
|
|
46069
|
+
JWKSNoMatchingKey.code = "ERR_JWKS_NO_MATCHING_KEY";
|
|
46068
46070
|
var JWKSMultipleMatchingKeys = class extends JOSEError {
|
|
46069
|
-
constructor() {
|
|
46070
|
-
super(
|
|
46071
|
+
constructor(message4 = "multiple matching keys found in the JSON Web Key Set", options) {
|
|
46072
|
+
super(message4, options);
|
|
46071
46073
|
this.code = "ERR_JWKS_MULTIPLE_MATCHING_KEYS";
|
|
46072
|
-
this.message = "multiple matching keys found in the JSON Web Key Set";
|
|
46073
|
-
}
|
|
46074
|
-
static get code() {
|
|
46075
|
-
return "ERR_JWKS_MULTIPLE_MATCHING_KEYS";
|
|
46076
46074
|
}
|
|
46077
46075
|
};
|
|
46076
|
+
JWKSMultipleMatchingKeys.code = "ERR_JWKS_MULTIPLE_MATCHING_KEYS";
|
|
46078
46077
|
var JWKSTimeout = class extends JOSEError {
|
|
46079
|
-
constructor() {
|
|
46080
|
-
super(
|
|
46078
|
+
constructor(message4 = "request timed out", options) {
|
|
46079
|
+
super(message4, options);
|
|
46081
46080
|
this.code = "ERR_JWKS_TIMEOUT";
|
|
46082
|
-
this.message = "request timed out";
|
|
46083
|
-
}
|
|
46084
|
-
static get code() {
|
|
46085
|
-
return "ERR_JWKS_TIMEOUT";
|
|
46086
46081
|
}
|
|
46087
46082
|
};
|
|
46083
|
+
JWKSTimeout.code = "ERR_JWKS_TIMEOUT";
|
|
46088
46084
|
var JWSSignatureVerificationFailed = class extends JOSEError {
|
|
46089
|
-
constructor() {
|
|
46090
|
-
super(
|
|
46085
|
+
constructor(message4 = "signature verification failed", options) {
|
|
46086
|
+
super(message4, options);
|
|
46091
46087
|
this.code = "ERR_JWS_SIGNATURE_VERIFICATION_FAILED";
|
|
46092
|
-
this.message = "signature verification failed";
|
|
46093
|
-
}
|
|
46094
|
-
static get code() {
|
|
46095
|
-
return "ERR_JWS_SIGNATURE_VERIFICATION_FAILED";
|
|
46096
46088
|
}
|
|
46097
46089
|
};
|
|
46090
|
+
JWSSignatureVerificationFailed.code = "ERR_JWS_SIGNATURE_VERIFICATION_FAILED";
|
|
46098
46091
|
|
|
46099
46092
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/jose/dist/browser/lib/crypto_key.js
|
|
46100
46093
|
function unusable(name7, prop = "algorithm.name") {
|
|
@@ -47324,7 +47317,7 @@ var PodOS = (() => {
|
|
|
47324
47317
|
var USER_AGENT;
|
|
47325
47318
|
if (typeof navigator === "undefined" || !navigator.userAgent?.startsWith?.("Mozilla/5.0 ")) {
|
|
47326
47319
|
const NAME = "jose";
|
|
47327
|
-
const VERSION = "v5.9.
|
|
47320
|
+
const VERSION = "v5.9.6";
|
|
47328
47321
|
USER_AGENT = `${NAME}/${VERSION}`;
|
|
47329
47322
|
}
|
|
47330
47323
|
var jwksCache = Symbol();
|
|
@@ -47545,10 +47538,9 @@ var PodOS = (() => {
|
|
|
47545
47538
|
|
|
47546
47539
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/uuid/dist/esm-browser/stringify.js
|
|
47547
47540
|
var byteToHex = [];
|
|
47548
|
-
for (i = 0; i < 256; ++i) {
|
|
47541
|
+
for (let i = 0; i < 256; ++i) {
|
|
47549
47542
|
byteToHex.push((i + 256).toString(16).slice(1));
|
|
47550
47543
|
}
|
|
47551
|
-
var i;
|
|
47552
47544
|
function unsafeStringify(arr, offset3 = 0) {
|
|
47553
47545
|
return (byteToHex[arr[offset3 + 0]] + byteToHex[arr[offset3 + 1]] + byteToHex[arr[offset3 + 2]] + byteToHex[arr[offset3 + 3]] + "-" + byteToHex[arr[offset3 + 4]] + byteToHex[arr[offset3 + 5]] + "-" + byteToHex[arr[offset3 + 6]] + byteToHex[arr[offset3 + 7]] + "-" + byteToHex[arr[offset3 + 8]] + byteToHex[arr[offset3 + 9]] + "-" + byteToHex[arr[offset3 + 10]] + byteToHex[arr[offset3 + 11]] + byteToHex[arr[offset3 + 12]] + byteToHex[arr[offset3 + 13]] + byteToHex[arr[offset3 + 14]] + byteToHex[arr[offset3 + 15]]).toLowerCase();
|
|
47554
47546
|
}
|
|
@@ -47558,19 +47550,17 @@ var PodOS = (() => {
|
|
|
47558
47550
|
var rnds8 = new Uint8Array(16);
|
|
47559
47551
|
function rng() {
|
|
47560
47552
|
if (!getRandomValues) {
|
|
47561
|
-
|
|
47562
|
-
if (!getRandomValues) {
|
|
47553
|
+
if (typeof crypto === "undefined" || !crypto.getRandomValues) {
|
|
47563
47554
|
throw new Error("crypto.getRandomValues() not supported. See https://github.com/uuidjs/uuid#getrandomvalues-not-supported");
|
|
47564
47555
|
}
|
|
47556
|
+
getRandomValues = crypto.getRandomValues.bind(crypto);
|
|
47565
47557
|
}
|
|
47566
47558
|
return getRandomValues(rnds8);
|
|
47567
47559
|
}
|
|
47568
47560
|
|
|
47569
47561
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/uuid/dist/esm-browser/native.js
|
|
47570
47562
|
var randomUUID = typeof crypto !== "undefined" && crypto.randomUUID && crypto.randomUUID.bind(crypto);
|
|
47571
|
-
var native_default = {
|
|
47572
|
-
randomUUID
|
|
47573
|
-
};
|
|
47563
|
+
var native_default = { randomUUID };
|
|
47574
47564
|
|
|
47575
47565
|
// ../node_modules/@inrupt/solid-client-authn-core/node_modules/uuid/dist/esm-browser/v4.js
|
|
47576
47566
|
function v4(options, buf, offset3) {
|
|
@@ -47578,12 +47568,12 @@ var PodOS = (() => {
|
|
|
47578
47568
|
return native_default.randomUUID();
|
|
47579
47569
|
}
|
|
47580
47570
|
options = options || {};
|
|
47581
|
-
|
|
47571
|
+
const rnds = options.random || (options.rng || rng)();
|
|
47582
47572
|
rnds[6] = rnds[6] & 15 | 64;
|
|
47583
47573
|
rnds[8] = rnds[8] & 63 | 128;
|
|
47584
47574
|
if (buf) {
|
|
47585
47575
|
offset3 = offset3 || 0;
|
|
47586
|
-
for (
|
|
47576
|
+
for (let i = 0; i < 16; ++i) {
|
|
47587
47577
|
buf[offset3 + i] = rnds[i];
|
|
47588
47578
|
}
|
|
47589
47579
|
return buf;
|
|
@@ -48266,10 +48256,9 @@ var PodOS = (() => {
|
|
|
48266
48256
|
|
|
48267
48257
|
// ../node_modules/@inrupt/solid-client-authn-browser/node_modules/uuid/dist/esm-browser/stringify.js
|
|
48268
48258
|
var byteToHex2 = [];
|
|
48269
|
-
for (i = 0; i < 256; ++i) {
|
|
48259
|
+
for (let i = 0; i < 256; ++i) {
|
|
48270
48260
|
byteToHex2.push((i + 256).toString(16).slice(1));
|
|
48271
48261
|
}
|
|
48272
|
-
var i;
|
|
48273
48262
|
function unsafeStringify2(arr, offset3 = 0) {
|
|
48274
48263
|
return (byteToHex2[arr[offset3 + 0]] + byteToHex2[arr[offset3 + 1]] + byteToHex2[arr[offset3 + 2]] + byteToHex2[arr[offset3 + 3]] + "-" + byteToHex2[arr[offset3 + 4]] + byteToHex2[arr[offset3 + 5]] + "-" + byteToHex2[arr[offset3 + 6]] + byteToHex2[arr[offset3 + 7]] + "-" + byteToHex2[arr[offset3 + 8]] + byteToHex2[arr[offset3 + 9]] + "-" + byteToHex2[arr[offset3 + 10]] + byteToHex2[arr[offset3 + 11]] + byteToHex2[arr[offset3 + 12]] + byteToHex2[arr[offset3 + 13]] + byteToHex2[arr[offset3 + 14]] + byteToHex2[arr[offset3 + 15]]).toLowerCase();
|
|
48275
48264
|
}
|
|
@@ -48279,19 +48268,17 @@ var PodOS = (() => {
|
|
|
48279
48268
|
var rnds82 = new Uint8Array(16);
|
|
48280
48269
|
function rng2() {
|
|
48281
48270
|
if (!getRandomValues2) {
|
|
48282
|
-
|
|
48283
|
-
if (!getRandomValues2) {
|
|
48271
|
+
if (typeof crypto === "undefined" || !crypto.getRandomValues) {
|
|
48284
48272
|
throw new Error("crypto.getRandomValues() not supported. See https://github.com/uuidjs/uuid#getrandomvalues-not-supported");
|
|
48285
48273
|
}
|
|
48274
|
+
getRandomValues2 = crypto.getRandomValues.bind(crypto);
|
|
48286
48275
|
}
|
|
48287
48276
|
return getRandomValues2(rnds82);
|
|
48288
48277
|
}
|
|
48289
48278
|
|
|
48290
48279
|
// ../node_modules/@inrupt/solid-client-authn-browser/node_modules/uuid/dist/esm-browser/native.js
|
|
48291
48280
|
var randomUUID2 = typeof crypto !== "undefined" && crypto.randomUUID && crypto.randomUUID.bind(crypto);
|
|
48292
|
-
var native_default2 = {
|
|
48293
|
-
randomUUID: randomUUID2
|
|
48294
|
-
};
|
|
48281
|
+
var native_default2 = { randomUUID: randomUUID2 };
|
|
48295
48282
|
|
|
48296
48283
|
// ../node_modules/@inrupt/solid-client-authn-browser/node_modules/uuid/dist/esm-browser/v4.js
|
|
48297
48284
|
function v42(options, buf, offset3) {
|
|
@@ -48299,12 +48286,12 @@ var PodOS = (() => {
|
|
|
48299
48286
|
return native_default2.randomUUID();
|
|
48300
48287
|
}
|
|
48301
48288
|
options = options || {};
|
|
48302
|
-
|
|
48289
|
+
const rnds = options.random || (options.rng || rng2)();
|
|
48303
48290
|
rnds[6] = rnds[6] & 15 | 64;
|
|
48304
48291
|
rnds[8] = rnds[8] & 63 | 128;
|
|
48305
48292
|
if (buf) {
|
|
48306
48293
|
offset3 = offset3 || 0;
|
|
48307
|
-
for (
|
|
48294
|
+
for (let i = 0; i < 16; ++i) {
|
|
48308
48295
|
buf[offset3 + i] = rnds[i];
|
|
48309
48296
|
}
|
|
48310
48297
|
return buf;
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pod-os/core",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.13.0",
|
|
4
4
|
"main": "./dist/index.js",
|
|
5
5
|
"types": "./types/index.d.ts",
|
|
6
6
|
"files": [
|
|
@@ -24,25 +24,25 @@
|
|
|
24
24
|
"author": "Angelo Veltens",
|
|
25
25
|
"license": "MIT",
|
|
26
26
|
"devDependencies": {
|
|
27
|
-
"@babel/preset-env": "^7.
|
|
28
|
-
"@babel/preset-typescript": "^7.
|
|
29
|
-
"@eslint/js": "^9.
|
|
30
|
-
"@types/jest": "^29.5.
|
|
27
|
+
"@babel/preset-env": "^7.26.0",
|
|
28
|
+
"@babel/preset-typescript": "^7.26.0",
|
|
29
|
+
"@eslint/js": "^9.17.0",
|
|
30
|
+
"@types/jest": "^29.5.14",
|
|
31
31
|
"@types/jest-when": "^3.5.5",
|
|
32
|
-
"@types/sparqljs": "^3.1.
|
|
32
|
+
"@types/sparqljs": "^3.1.12",
|
|
33
33
|
"esbuild": "^0.24.0",
|
|
34
|
-
"eslint": "^9.
|
|
34
|
+
"eslint": "^9.17.0",
|
|
35
35
|
"jest": "^29.7.0",
|
|
36
|
-
"jest-when": "^3.
|
|
37
|
-
"prettier": "^3.
|
|
36
|
+
"jest-when": "^3.7.0",
|
|
37
|
+
"prettier": "^3.4.2",
|
|
38
38
|
"rdf-namespaces": "^1.12.0",
|
|
39
39
|
"rimraf": "^6.0.1",
|
|
40
40
|
"sparqljs": "^3.7.3",
|
|
41
|
-
"typescript": "5.
|
|
41
|
+
"typescript": "5.7.2",
|
|
42
42
|
"typescript-eslint": "^7.18.0"
|
|
43
43
|
},
|
|
44
44
|
"dependencies": {
|
|
45
|
-
"@inrupt/solid-client-authn-browser": "^2.
|
|
45
|
+
"@inrupt/solid-client-authn-browser": "^2.3.0",
|
|
46
46
|
"@solid-data-modules/contacts-rdflib": "^0.7.0",
|
|
47
47
|
"@types/lunr": "^2.3.7",
|
|
48
48
|
"buffer": "^6.0.3",
|