@truto/truto-jsonata 1.0.39 → 1.0.41

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -22097,8 +22097,8 @@ var require_retry = __commonJS((exports) => {
22097
22097
  });
22098
22098
 
22099
22099
  // node:buffer
22100
- var exports_buffer2 = {};
22101
- __export(exports_buffer2, {
22100
+ var exports_buffer = {};
22101
+ __export(exports_buffer, {
22102
22102
  transcode: () => transcode,
22103
22103
  resolveObjectURL: () => resolveObjectURL,
22104
22104
  kStringMaxLength: () => kStringMaxLength,
@@ -22314,7 +22314,7 @@ function fromObject(obj) {
22314
22314
  return obj.copy(buf, 0, 0, len2), buf;
22315
22315
  }
22316
22316
  if (obj.length !== undefined) {
22317
- if (typeof obj.length !== "number" || numberIsNaN(obj.length))
22317
+ if (typeof obj.length !== "number" || Number.isNaN(obj.length))
22318
22318
  return createBuffer(0);
22319
22319
  return fromArrayLike(obj);
22320
22320
  }
@@ -22501,7 +22501,7 @@ function hexWrite(buf, string, offset2, length) {
22501
22501
  let i2;
22502
22502
  for (i2 = 0;i2 < length; ++i2) {
22503
22503
  let parsed = parseInt(string.substr(i2 * 2, 2), 16);
22504
- if (numberIsNaN(parsed))
22504
+ if (Number.isNaN(parsed))
22505
22505
  return i2;
22506
22506
  buf[offset2 + i2] = parsed;
22507
22507
  }
@@ -22958,7 +22958,7 @@ var init_buffer = __esm(() => {
22958
22958
  return Buffer4.compare(this, b) === 0;
22959
22959
  };
22960
22960
  Buffer4.prototype.inspect = function inspect() {
22961
- let str = "", max = exports_buffer.INSPECT_MAX_BYTES;
22961
+ let str = "", max = INSPECT_MAX_BYTES;
22962
22962
  if (str = this.toString("hex", 0, max).replace(/(.{2})/g, "$1 ").trim(), this.length > max)
22963
22963
  str += " ... ";
22964
22964
  return "<Buffer " + str + ">";
@@ -24466,7 +24466,7 @@ var require_stream = __commonJS((exports, module) => {
24466
24466
  module2.exports.AbortSignal = AbortSignal2;
24467
24467
  });
24468
24468
  var require_util = __commonJS2((exports2, module2) => {
24469
- var bufferModule = (init_buffer(), __toCommonJS(exports_buffer2)), { format, inspect: inspect2 } = require_inspect(), { codes: { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3 } } = require_errors(), { kResistStopPropagation, AggregateError: AggregateError2, SymbolDispose } = require_primordials(), AbortSignal2 = globalThis.AbortSignal || require_abort_controller().AbortSignal, AbortController2 = globalThis.AbortController || require_abort_controller().AbortController, AsyncFunction = Object.getPrototypeOf(async function() {}).constructor, Blob3 = globalThis.Blob || bufferModule.Blob, isBlob = typeof Blob3 !== "undefined" ? function isBlob(b) {
24469
+ var bufferModule = (init_buffer(), __toCommonJS(exports_buffer)), { format, inspect: inspect2 } = require_inspect(), { codes: { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3 } } = require_errors(), { kResistStopPropagation, AggregateError: AggregateError2, SymbolDispose } = require_primordials(), AbortSignal2 = globalThis.AbortSignal || require_abort_controller().AbortSignal, AbortController2 = globalThis.AbortController || require_abort_controller().AbortController, AsyncFunction = Object.getPrototypeOf(async function() {}).constructor, Blob3 = globalThis.Blob || bufferModule.Blob, isBlob = typeof Blob3 !== "undefined" ? function isBlob(b) {
24470
24470
  return b instanceof Blob3;
24471
24471
  } : function isBlob(b) {
24472
24472
  return false;
@@ -25272,7 +25272,7 @@ var require_stream = __commonJS((exports, module) => {
25272
25272
  };
25273
25273
  });
25274
25274
  var require_buffer_list = __commonJS2((exports2, module2) => {
25275
- var { StringPrototypeSlice, SymbolIterator, TypedArrayPrototypeSet, Uint8Array: Uint8Array22 } = require_primordials(), { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer2)), { inspect: inspect2 } = require_util();
25275
+ var { StringPrototypeSlice, SymbolIterator, TypedArrayPrototypeSet, Uint8Array: Uint8Array22 } = require_primordials(), { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer)), { inspect: inspect2 } = require_util();
25276
25276
  module2.exports = class BufferList {
25277
25277
  constructor() {
25278
25278
  this.head = null, this.tail = null, this.length = 0;
@@ -25411,7 +25411,7 @@ var require_stream = __commonJS((exports, module) => {
25411
25411
  });
25412
25412
  var require_safe_buffer = __commonJS2((exports2, module2) => {
25413
25413
  /*! safe-buffer. MIT License. Feross Aboukhadijeh <https://feross.org/opensource> */
25414
- var buffer = (init_buffer(), __toCommonJS(exports_buffer2)), Buffer5 = buffer.Buffer;
25414
+ var buffer = (init_buffer(), __toCommonJS(exports_buffer)), Buffer5 = buffer.Buffer;
25415
25415
  function copyProps(src, dst) {
25416
25416
  for (var key in src)
25417
25417
  dst[key] = src[key];
@@ -25665,7 +25665,7 @@ var require_stream = __commonJS((exports, module) => {
25665
25665
  }
25666
25666
  });
25667
25667
  var require_from = __commonJS2((exports2, module2) => {
25668
- var process3 = require_process(), { PromisePrototypeThen, SymbolAsyncIterator, SymbolIterator } = require_primordials(), { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer2)), { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_STREAM_NULL_VALUES } = require_errors().codes;
25668
+ var process3 = require_process(), { PromisePrototypeThen, SymbolAsyncIterator, SymbolIterator } = require_primordials(), { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer)), { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_STREAM_NULL_VALUES } = require_errors().codes;
25669
25669
  function from2(Readable, iterable, opts) {
25670
25670
  let iterator;
25671
25671
  if (typeof iterable === "string" || iterable instanceof Buffer5)
@@ -25727,7 +25727,7 @@ var require_stream = __commonJS((exports, module) => {
25727
25727
  var process3 = require_process(), { ArrayPrototypeIndexOf, NumberIsInteger, NumberIsNaN, NumberParseInt, ObjectDefineProperties, ObjectKeys, ObjectSetPrototypeOf, Promise: Promise22, SafeSet, SymbolAsyncDispose, SymbolAsyncIterator, Symbol: Symbol22 } = require_primordials();
25728
25728
  module2.exports = Readable;
25729
25729
  Readable.ReadableState = ReadableState;
25730
- var { EventEmitter: EE } = (init_events(), __toCommonJS(exports_events)), { Stream, prependListener: prependListener2 } = require_legacy(), { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer2)), { addAbortSignal } = require_add_abort_signal(), eos = require_end_of_stream(), debug = require_util().debuglog("stream", (fn) => {
25730
+ var { EventEmitter: EE } = (init_events(), __toCommonJS(exports_events)), { Stream, prependListener: prependListener2 } = require_legacy(), { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer)), { addAbortSignal } = require_add_abort_signal(), eos = require_end_of_stream(), debug = require_util().debuglog("stream", (fn) => {
25731
25731
  debug = fn;
25732
25732
  }), BufferList = require_buffer_list(), destroyImpl = require_destroy(), { getHighWaterMark, getDefaultHighWaterMark } = require_state(), { aggregateTwoErrors, codes: { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_METHOD_NOT_IMPLEMENTED, ERR_OUT_OF_RANGE: ERR_OUT_OF_RANGE3, ERR_STREAM_PUSH_AFTER_EOF, ERR_STREAM_UNSHIFT_AFTER_END_EVENT }, AbortError: AbortError3 } = require_errors(), { validateObject } = require_validators(), kPaused = Symbol22("kPaused"), { StringDecoder } = require_string_decoder(), from2 = require_from();
25733
25733
  ObjectSetPrototypeOf(Readable.prototype, Stream.prototype);
@@ -26345,7 +26345,7 @@ var require_stream = __commonJS((exports, module) => {
26345
26345
  var process3 = require_process(), { ArrayPrototypeSlice: ArrayPrototypeSlice2, Error: Error2, FunctionPrototypeSymbolHasInstance, ObjectDefineProperty, ObjectDefineProperties, ObjectSetPrototypeOf, StringPrototypeToLowerCase, Symbol: Symbol22, SymbolHasInstance } = require_primordials();
26346
26346
  module2.exports = Writable;
26347
26347
  Writable.WritableState = WritableState;
26348
- var { EventEmitter: EE } = (init_events(), __toCommonJS(exports_events)), Stream = require_legacy().Stream, { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer2)), destroyImpl = require_destroy(), { addAbortSignal } = require_add_abort_signal(), { getHighWaterMark, getDefaultHighWaterMark } = require_state(), { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_METHOD_NOT_IMPLEMENTED, ERR_MULTIPLE_CALLBACK, ERR_STREAM_CANNOT_PIPE, ERR_STREAM_DESTROYED, ERR_STREAM_ALREADY_FINISHED, ERR_STREAM_NULL_VALUES, ERR_STREAM_WRITE_AFTER_END, ERR_UNKNOWN_ENCODING } = require_errors().codes, { errorOrDestroy } = destroyImpl;
26348
+ var { EventEmitter: EE } = (init_events(), __toCommonJS(exports_events)), Stream = require_legacy().Stream, { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer)), destroyImpl = require_destroy(), { addAbortSignal } = require_add_abort_signal(), { getHighWaterMark, getDefaultHighWaterMark } = require_state(), { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_METHOD_NOT_IMPLEMENTED, ERR_MULTIPLE_CALLBACK, ERR_STREAM_CANNOT_PIPE, ERR_STREAM_DESTROYED, ERR_STREAM_ALREADY_FINISHED, ERR_STREAM_NULL_VALUES, ERR_STREAM_WRITE_AFTER_END, ERR_UNKNOWN_ENCODING } = require_errors().codes, { errorOrDestroy } = destroyImpl;
26349
26349
  ObjectSetPrototypeOf(Writable.prototype, Stream.prototype);
26350
26350
  ObjectSetPrototypeOf(Writable, Stream);
26351
26351
  function nop() {}
@@ -26727,7 +26727,7 @@ var require_stream = __commonJS((exports, module) => {
26727
26727
  };
26728
26728
  });
26729
26729
  var require_duplexify = __commonJS2((exports2, module2) => {
26730
- var process3 = require_process(), bufferModule = (init_buffer(), __toCommonJS(exports_buffer2)), { isReadable, isWritable, isIterable, isNodeStream, isReadableNodeStream, isWritableNodeStream, isDuplexNodeStream, isReadableStream, isWritableStream } = require_utils2(), eos = require_end_of_stream(), { AbortError: AbortError3, codes: { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_INVALID_RETURN_VALUE } } = require_errors(), { destroyer } = require_destroy(), Duplex = require_duplex(), Readable = require_readable(), Writable = require_writable(), { createDeferredPromise } = require_util(), from2 = require_from(), Blob3 = globalThis.Blob || bufferModule.Blob, isBlob = typeof Blob3 !== "undefined" ? function isBlob(b) {
26730
+ var process3 = require_process(), bufferModule = (init_buffer(), __toCommonJS(exports_buffer)), { isReadable, isWritable, isIterable, isNodeStream, isReadableNodeStream, isWritableNodeStream, isDuplexNodeStream, isReadableStream, isWritableStream } = require_utils2(), eos = require_end_of_stream(), { AbortError: AbortError3, codes: { ERR_INVALID_ARG_TYPE: ERR_INVALID_ARG_TYPE3, ERR_INVALID_RETURN_VALUE } } = require_errors(), { destroyer } = require_destroy(), Duplex = require_duplex(), Readable = require_readable(), Writable = require_writable(), { createDeferredPromise } = require_util(), from2 = require_from(), Blob3 = globalThis.Blob || bufferModule.Blob, isBlob = typeof Blob3 !== "undefined" ? function isBlob(b) {
26731
26731
  return b instanceof Blob3;
26732
26732
  } : function isBlob(b) {
26733
26733
  return false;
@@ -27662,7 +27662,7 @@ var require_stream = __commonJS((exports, module) => {
27662
27662
  module2.exports = { finished, pipeline };
27663
27663
  });
27664
27664
  var require_stream2 = __commonJS2((exports2, module2) => {
27665
- var { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer2)), { ObjectDefineProperty, ObjectKeys, ReflectApply } = require_primordials(), { promisify: { custom: customPromisify } } = require_util(), { streamReturningOperators, promiseReturningOperators } = require_operators(), { codes: { ERR_ILLEGAL_CONSTRUCTOR } } = require_errors(), compose = require_compose(), { setDefaultHighWaterMark, getDefaultHighWaterMark } = require_state(), { pipeline } = require_pipeline(), { destroyer } = require_destroy(), eos = require_end_of_stream(), promises = require_promises(), utils = require_utils2(), Stream = module2.exports = require_legacy().Stream;
27665
+ var { Buffer: Buffer5 } = (init_buffer(), __toCommonJS(exports_buffer)), { ObjectDefineProperty, ObjectKeys, ReflectApply } = require_primordials(), { promisify: { custom: customPromisify } } = require_util(), { streamReturningOperators, promiseReturningOperators } = require_operators(), { codes: { ERR_ILLEGAL_CONSTRUCTOR } } = require_errors(), compose = require_compose(), { setDefaultHighWaterMark, getDefaultHighWaterMark } = require_state(), { pipeline } = require_pipeline(), { destroyer } = require_destroy(), eos = require_end_of_stream(), promises = require_promises(), utils = require_utils2(), Stream = module2.exports = require_legacy().Stream;
27666
27666
  Stream.isDestroyed = utils.isDestroyed;
27667
27667
  Stream.isDisturbed = utils.isDisturbed;
27668
27668
  Stream.isErrored = utils.isErrored;
@@ -27905,7 +27905,7 @@ var __commonJS2 = (cb, mod) => () => (mod || cb((mod = { exports: {} }).exports,
27905
27905
  var init_string_decoder = __esm(() => {
27906
27906
  require_safe_buffer = __commonJS2((exports, module) => {
27907
27907
  /*! safe-buffer. MIT License. Feross Aboukhadijeh <https://feross.org/opensource> */
27908
- var buffer = (init_buffer(), __toCommonJS(exports_buffer2)), Buffer5 = buffer.Buffer;
27908
+ var buffer = (init_buffer(), __toCommonJS(exports_buffer)), Buffer5 = buffer.Buffer;
27909
27909
  function copyProps(src, dst) {
27910
27910
  for (var key in src)
27911
27911
  dst[key] = src[key];
@@ -37545,6 +37545,11 @@ function isNil(value) {
37545
37545
  return value == null;
37546
37546
  }
37547
37547
  var isNil_default = isNil;
37548
+ // node_modules/lodash-es/isNull.js
37549
+ function isNull(value) {
37550
+ return value === null;
37551
+ }
37552
+ var isNull_default = isNull;
37548
37553
  // node_modules/lodash-es/join.js
37549
37554
  var arrayProto2 = Array.prototype;
37550
37555
  var nativeJoin = arrayProto2.join;
@@ -67149,6 +67154,1072 @@ function zipSqlResponse(columns, data, key) {
67149
67154
  }
67150
67155
  var zipSqlResponse_default = zipSqlResponse;
67151
67156
 
67157
+ // node_modules/jose/dist/webapi/lib/buffer_utils.js
67158
+ var encoder = new TextEncoder;
67159
+ var decoder = new TextDecoder;
67160
+ var MAX_INT32 = 2 ** 32;
67161
+ function concat4(...buffers) {
67162
+ const size = buffers.reduce((acc, { length }) => acc + length, 0);
67163
+ const buf = new Uint8Array(size);
67164
+ let i3 = 0;
67165
+ for (const buffer of buffers) {
67166
+ buf.set(buffer, i3);
67167
+ i3 += buffer.length;
67168
+ }
67169
+ return buf;
67170
+ }
67171
+
67172
+ // node_modules/jose/dist/webapi/lib/base64.js
67173
+ function encodeBase64(input) {
67174
+ if (Uint8Array.prototype.toBase64) {
67175
+ return input.toBase64();
67176
+ }
67177
+ const CHUNK_SIZE = 32768;
67178
+ const arr2 = [];
67179
+ for (let i3 = 0;i3 < input.length; i3 += CHUNK_SIZE) {
67180
+ arr2.push(String.fromCharCode.apply(null, input.subarray(i3, i3 + CHUNK_SIZE)));
67181
+ }
67182
+ return btoa(arr2.join(""));
67183
+ }
67184
+ function decodeBase64(encoded) {
67185
+ if (Uint8Array.fromBase64) {
67186
+ return Uint8Array.fromBase64(encoded);
67187
+ }
67188
+ const binary = atob(encoded);
67189
+ const bytes = new Uint8Array(binary.length);
67190
+ for (let i3 = 0;i3 < binary.length; i3++) {
67191
+ bytes[i3] = binary.charCodeAt(i3);
67192
+ }
67193
+ return bytes;
67194
+ }
67195
+
67196
+ // node_modules/jose/dist/webapi/util/base64url.js
67197
+ function decode(input) {
67198
+ if (Uint8Array.fromBase64) {
67199
+ return Uint8Array.fromBase64(typeof input === "string" ? input : decoder.decode(input), {
67200
+ alphabet: "base64url"
67201
+ });
67202
+ }
67203
+ let encoded = input;
67204
+ if (encoded instanceof Uint8Array) {
67205
+ encoded = decoder.decode(encoded);
67206
+ }
67207
+ encoded = encoded.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "");
67208
+ try {
67209
+ return decodeBase64(encoded);
67210
+ } catch {
67211
+ throw new TypeError("The input to be decoded is not correctly encoded.");
67212
+ }
67213
+ }
67214
+ function encode(input) {
67215
+ let unencoded = input;
67216
+ if (typeof unencoded === "string") {
67217
+ unencoded = encoder.encode(unencoded);
67218
+ }
67219
+ if (Uint8Array.prototype.toBase64) {
67220
+ return unencoded.toBase64({ alphabet: "base64url", omitPadding: true });
67221
+ }
67222
+ return encodeBase64(unencoded).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
67223
+ }
67224
+
67225
+ // node_modules/jose/dist/webapi/util/errors.js
67226
+ class JOSEError extends Error {
67227
+ static code = "ERR_JOSE_GENERIC";
67228
+ code = "ERR_JOSE_GENERIC";
67229
+ constructor(message, options3) {
67230
+ super(message, options3);
67231
+ this.name = this.constructor.name;
67232
+ Error.captureStackTrace?.(this, this.constructor);
67233
+ }
67234
+ }
67235
+ class JOSENotSupported extends JOSEError {
67236
+ static code = "ERR_JOSE_NOT_SUPPORTED";
67237
+ code = "ERR_JOSE_NOT_SUPPORTED";
67238
+ }
67239
+ class JWSInvalid extends JOSEError {
67240
+ static code = "ERR_JWS_INVALID";
67241
+ code = "ERR_JWS_INVALID";
67242
+ }
67243
+
67244
+ class JWTInvalid extends JOSEError {
67245
+ static code = "ERR_JWT_INVALID";
67246
+ code = "ERR_JWT_INVALID";
67247
+ }
67248
+
67249
+ // node_modules/jose/dist/webapi/lib/crypto_key.js
67250
+ function unusable(name, prop = "algorithm.name") {
67251
+ return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
67252
+ }
67253
+ function isAlgorithm(algorithm, name) {
67254
+ return algorithm.name === name;
67255
+ }
67256
+ function getHashLength(hash) {
67257
+ return parseInt(hash.name.slice(4), 10);
67258
+ }
67259
+ function getNamedCurve(alg) {
67260
+ switch (alg) {
67261
+ case "ES256":
67262
+ return "P-256";
67263
+ case "ES384":
67264
+ return "P-384";
67265
+ case "ES512":
67266
+ return "P-521";
67267
+ default:
67268
+ throw new Error("unreachable");
67269
+ }
67270
+ }
67271
+ function checkUsage(key, usage) {
67272
+ if (usage && !key.usages.includes(usage)) {
67273
+ throw new TypeError(`CryptoKey does not support this operation, its usages must include ${usage}.`);
67274
+ }
67275
+ }
67276
+ function checkSigCryptoKey(key, alg, usage) {
67277
+ switch (alg) {
67278
+ case "HS256":
67279
+ case "HS384":
67280
+ case "HS512": {
67281
+ if (!isAlgorithm(key.algorithm, "HMAC"))
67282
+ throw unusable("HMAC");
67283
+ const expected = parseInt(alg.slice(2), 10);
67284
+ const actual = getHashLength(key.algorithm.hash);
67285
+ if (actual !== expected)
67286
+ throw unusable(`SHA-${expected}`, "algorithm.hash");
67287
+ break;
67288
+ }
67289
+ case "RS256":
67290
+ case "RS384":
67291
+ case "RS512": {
67292
+ if (!isAlgorithm(key.algorithm, "RSASSA-PKCS1-v1_5"))
67293
+ throw unusable("RSASSA-PKCS1-v1_5");
67294
+ const expected = parseInt(alg.slice(2), 10);
67295
+ const actual = getHashLength(key.algorithm.hash);
67296
+ if (actual !== expected)
67297
+ throw unusable(`SHA-${expected}`, "algorithm.hash");
67298
+ break;
67299
+ }
67300
+ case "PS256":
67301
+ case "PS384":
67302
+ case "PS512": {
67303
+ if (!isAlgorithm(key.algorithm, "RSA-PSS"))
67304
+ throw unusable("RSA-PSS");
67305
+ const expected = parseInt(alg.slice(2), 10);
67306
+ const actual = getHashLength(key.algorithm.hash);
67307
+ if (actual !== expected)
67308
+ throw unusable(`SHA-${expected}`, "algorithm.hash");
67309
+ break;
67310
+ }
67311
+ case "Ed25519":
67312
+ case "EdDSA": {
67313
+ if (!isAlgorithm(key.algorithm, "Ed25519"))
67314
+ throw unusable("Ed25519");
67315
+ break;
67316
+ }
67317
+ case "ML-DSA-44":
67318
+ case "ML-DSA-65":
67319
+ case "ML-DSA-87": {
67320
+ if (!isAlgorithm(key.algorithm, alg))
67321
+ throw unusable(alg);
67322
+ break;
67323
+ }
67324
+ case "ES256":
67325
+ case "ES384":
67326
+ case "ES512": {
67327
+ if (!isAlgorithm(key.algorithm, "ECDSA"))
67328
+ throw unusable("ECDSA");
67329
+ const expected = getNamedCurve(alg);
67330
+ const actual = key.algorithm.namedCurve;
67331
+ if (actual !== expected)
67332
+ throw unusable(expected, "algorithm.namedCurve");
67333
+ break;
67334
+ }
67335
+ default:
67336
+ throw new TypeError("CryptoKey does not support this operation");
67337
+ }
67338
+ checkUsage(key, usage);
67339
+ }
67340
+
67341
+ // node_modules/jose/dist/webapi/lib/invalid_key_input.js
67342
+ function message(msg, actual, ...types3) {
67343
+ types3 = types3.filter(Boolean);
67344
+ if (types3.length > 2) {
67345
+ const last2 = types3.pop();
67346
+ msg += `one of type ${types3.join(", ")}, or ${last2}.`;
67347
+ } else if (types3.length === 2) {
67348
+ msg += `one of type ${types3[0]} or ${types3[1]}.`;
67349
+ } else {
67350
+ msg += `of type ${types3[0]}.`;
67351
+ }
67352
+ if (actual == null) {
67353
+ msg += ` Received ${actual}`;
67354
+ } else if (typeof actual === "function" && actual.name) {
67355
+ msg += ` Received function ${actual.name}`;
67356
+ } else if (typeof actual === "object" && actual != null) {
67357
+ if (actual.constructor?.name) {
67358
+ msg += ` Received an instance of ${actual.constructor.name}`;
67359
+ }
67360
+ }
67361
+ return msg;
67362
+ }
67363
+ var invalid_key_input_default = (actual, ...types3) => {
67364
+ return message("Key must be ", actual, ...types3);
67365
+ };
67366
+ function withAlg(alg, actual, ...types3) {
67367
+ return message(`Key for the ${alg} algorithm must be `, actual, ...types3);
67368
+ }
67369
+
67370
+ // node_modules/jose/dist/webapi/lib/is_key_like.js
67371
+ function isCryptoKey(key) {
67372
+ return key?.[Symbol.toStringTag] === "CryptoKey";
67373
+ }
67374
+ function isKeyObject(key) {
67375
+ return key?.[Symbol.toStringTag] === "KeyObject";
67376
+ }
67377
+ var is_key_like_default = (key) => {
67378
+ return isCryptoKey(key) || isKeyObject(key);
67379
+ };
67380
+
67381
+ // node_modules/jose/dist/webapi/lib/is_disjoint.js
67382
+ var is_disjoint_default = (...headers) => {
67383
+ const sources = headers.filter(Boolean);
67384
+ if (sources.length === 0 || sources.length === 1) {
67385
+ return true;
67386
+ }
67387
+ let acc;
67388
+ for (const header of sources) {
67389
+ const parameters = Object.keys(header);
67390
+ if (!acc || acc.size === 0) {
67391
+ acc = new Set(parameters);
67392
+ continue;
67393
+ }
67394
+ for (const parameter of parameters) {
67395
+ if (acc.has(parameter)) {
67396
+ return false;
67397
+ }
67398
+ acc.add(parameter);
67399
+ }
67400
+ }
67401
+ return true;
67402
+ };
67403
+
67404
+ // node_modules/jose/dist/webapi/lib/is_object.js
67405
+ function isObjectLike2(value) {
67406
+ return typeof value === "object" && value !== null;
67407
+ }
67408
+ var is_object_default = (input) => {
67409
+ if (!isObjectLike2(input) || Object.prototype.toString.call(input) !== "[object Object]") {
67410
+ return false;
67411
+ }
67412
+ if (Object.getPrototypeOf(input) === null) {
67413
+ return true;
67414
+ }
67415
+ let proto = input;
67416
+ while (Object.getPrototypeOf(proto) !== null) {
67417
+ proto = Object.getPrototypeOf(proto);
67418
+ }
67419
+ return Object.getPrototypeOf(input) === proto;
67420
+ };
67421
+
67422
+ // node_modules/jose/dist/webapi/lib/check_key_length.js
67423
+ var check_key_length_default = (alg, key) => {
67424
+ if (alg.startsWith("RS") || alg.startsWith("PS")) {
67425
+ const { modulusLength } = key.algorithm;
67426
+ if (typeof modulusLength !== "number" || modulusLength < 2048) {
67427
+ throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);
67428
+ }
67429
+ }
67430
+ };
67431
+
67432
+ // node_modules/jose/dist/webapi/lib/jwk_to_key.js
67433
+ function subtleMapping(jwk) {
67434
+ let algorithm;
67435
+ let keyUsages;
67436
+ switch (jwk.kty) {
67437
+ case "AKP": {
67438
+ switch (jwk.alg) {
67439
+ case "ML-DSA-44":
67440
+ case "ML-DSA-65":
67441
+ case "ML-DSA-87":
67442
+ algorithm = { name: jwk.alg };
67443
+ keyUsages = jwk.priv ? ["sign"] : ["verify"];
67444
+ break;
67445
+ default:
67446
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
67447
+ }
67448
+ break;
67449
+ }
67450
+ case "RSA": {
67451
+ switch (jwk.alg) {
67452
+ case "PS256":
67453
+ case "PS384":
67454
+ case "PS512":
67455
+ algorithm = { name: "RSA-PSS", hash: `SHA-${jwk.alg.slice(-3)}` };
67456
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67457
+ break;
67458
+ case "RS256":
67459
+ case "RS384":
67460
+ case "RS512":
67461
+ algorithm = { name: "RSASSA-PKCS1-v1_5", hash: `SHA-${jwk.alg.slice(-3)}` };
67462
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67463
+ break;
67464
+ case "RSA-OAEP":
67465
+ case "RSA-OAEP-256":
67466
+ case "RSA-OAEP-384":
67467
+ case "RSA-OAEP-512":
67468
+ algorithm = {
67469
+ name: "RSA-OAEP",
67470
+ hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`
67471
+ };
67472
+ keyUsages = jwk.d ? ["decrypt", "unwrapKey"] : ["encrypt", "wrapKey"];
67473
+ break;
67474
+ default:
67475
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
67476
+ }
67477
+ break;
67478
+ }
67479
+ case "EC": {
67480
+ switch (jwk.alg) {
67481
+ case "ES256":
67482
+ algorithm = { name: "ECDSA", namedCurve: "P-256" };
67483
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67484
+ break;
67485
+ case "ES384":
67486
+ algorithm = { name: "ECDSA", namedCurve: "P-384" };
67487
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67488
+ break;
67489
+ case "ES512":
67490
+ algorithm = { name: "ECDSA", namedCurve: "P-521" };
67491
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67492
+ break;
67493
+ case "ECDH-ES":
67494
+ case "ECDH-ES+A128KW":
67495
+ case "ECDH-ES+A192KW":
67496
+ case "ECDH-ES+A256KW":
67497
+ algorithm = { name: "ECDH", namedCurve: jwk.crv };
67498
+ keyUsages = jwk.d ? ["deriveBits"] : [];
67499
+ break;
67500
+ default:
67501
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
67502
+ }
67503
+ break;
67504
+ }
67505
+ case "OKP": {
67506
+ switch (jwk.alg) {
67507
+ case "Ed25519":
67508
+ case "EdDSA":
67509
+ algorithm = { name: "Ed25519" };
67510
+ keyUsages = jwk.d ? ["sign"] : ["verify"];
67511
+ break;
67512
+ case "ECDH-ES":
67513
+ case "ECDH-ES+A128KW":
67514
+ case "ECDH-ES+A192KW":
67515
+ case "ECDH-ES+A256KW":
67516
+ algorithm = { name: jwk.crv };
67517
+ keyUsages = jwk.d ? ["deriveBits"] : [];
67518
+ break;
67519
+ default:
67520
+ throw new JOSENotSupported('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
67521
+ }
67522
+ break;
67523
+ }
67524
+ default:
67525
+ throw new JOSENotSupported('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
67526
+ }
67527
+ return { algorithm, keyUsages };
67528
+ }
67529
+ var jwk_to_key_default = async (jwk) => {
67530
+ if (!jwk.alg) {
67531
+ throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
67532
+ }
67533
+ const { algorithm, keyUsages } = subtleMapping(jwk);
67534
+ const keyData = { ...jwk };
67535
+ if (keyData.kty !== "AKP") {
67536
+ delete keyData.alg;
67537
+ }
67538
+ delete keyData.use;
67539
+ return crypto.subtle.importKey("jwk", keyData, algorithm, jwk.ext ?? (jwk.d || jwk.priv ? false : true), jwk.key_ops ?? keyUsages);
67540
+ };
67541
+
67542
+ // node_modules/jose/dist/webapi/lib/validate_crit.js
67543
+ var validate_crit_default = (Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) => {
67544
+ if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {
67545
+ throw new Err('"crit" (Critical) Header Parameter MUST be integrity protected');
67546
+ }
67547
+ if (!protectedHeader || protectedHeader.crit === undefined) {
67548
+ return new Set;
67549
+ }
67550
+ if (!Array.isArray(protectedHeader.crit) || protectedHeader.crit.length === 0 || protectedHeader.crit.some((input) => typeof input !== "string" || input.length === 0)) {
67551
+ throw new Err('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
67552
+ }
67553
+ let recognized;
67554
+ if (recognizedOption !== undefined) {
67555
+ recognized = new Map([...Object.entries(recognizedOption), ...recognizedDefault.entries()]);
67556
+ } else {
67557
+ recognized = recognizedDefault;
67558
+ }
67559
+ for (const parameter of protectedHeader.crit) {
67560
+ if (!recognized.has(parameter)) {
67561
+ throw new JOSENotSupported(`Extension Header Parameter "${parameter}" is not recognized`);
67562
+ }
67563
+ if (joseHeader[parameter] === undefined) {
67564
+ throw new Err(`Extension Header Parameter "${parameter}" is missing`);
67565
+ }
67566
+ if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {
67567
+ throw new Err(`Extension Header Parameter "${parameter}" MUST be integrity protected`);
67568
+ }
67569
+ }
67570
+ return new Set(protectedHeader.crit);
67571
+ };
67572
+
67573
+ // node_modules/jose/dist/webapi/lib/is_jwk.js
67574
+ function isJWK(key) {
67575
+ return is_object_default(key) && typeof key.kty === "string";
67576
+ }
67577
+ function isPrivateJWK(key) {
67578
+ return key.kty !== "oct" && (key.kty === "AKP" && typeof key.priv === "string" || typeof key.d === "string");
67579
+ }
67580
+ function isPublicJWK(key) {
67581
+ return key.kty !== "oct" && typeof key.d === "undefined" && typeof key.priv === "undefined";
67582
+ }
67583
+ function isSecretJWK(key) {
67584
+ return key.kty === "oct" && typeof key.k === "string";
67585
+ }
67586
+
67587
+ // node_modules/jose/dist/webapi/lib/normalize_key.js
67588
+ var cache;
67589
+ var handleJWK = async (key, jwk, alg, freeze = false) => {
67590
+ cache ||= new WeakMap;
67591
+ let cached = cache.get(key);
67592
+ if (cached?.[alg]) {
67593
+ return cached[alg];
67594
+ }
67595
+ const cryptoKey = await jwk_to_key_default({ ...jwk, alg });
67596
+ if (freeze)
67597
+ Object.freeze(key);
67598
+ if (!cached) {
67599
+ cache.set(key, { [alg]: cryptoKey });
67600
+ } else {
67601
+ cached[alg] = cryptoKey;
67602
+ }
67603
+ return cryptoKey;
67604
+ };
67605
+ var handleKeyObject = (keyObject, alg) => {
67606
+ cache ||= new WeakMap;
67607
+ let cached = cache.get(keyObject);
67608
+ if (cached?.[alg]) {
67609
+ return cached[alg];
67610
+ }
67611
+ const isPublic = keyObject.type === "public";
67612
+ const extractable = isPublic ? true : false;
67613
+ let cryptoKey;
67614
+ if (keyObject.asymmetricKeyType === "x25519") {
67615
+ switch (alg) {
67616
+ case "ECDH-ES":
67617
+ case "ECDH-ES+A128KW":
67618
+ case "ECDH-ES+A192KW":
67619
+ case "ECDH-ES+A256KW":
67620
+ break;
67621
+ default:
67622
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
67623
+ }
67624
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : ["deriveBits"]);
67625
+ }
67626
+ if (keyObject.asymmetricKeyType === "ed25519") {
67627
+ if (alg !== "EdDSA" && alg !== "Ed25519") {
67628
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
67629
+ }
67630
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [
67631
+ isPublic ? "verify" : "sign"
67632
+ ]);
67633
+ }
67634
+ switch (keyObject.asymmetricKeyType) {
67635
+ case "ml-dsa-44":
67636
+ case "ml-dsa-65":
67637
+ case "ml-dsa-87": {
67638
+ if (alg !== keyObject.asymmetricKeyType.toUpperCase()) {
67639
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
67640
+ }
67641
+ cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [
67642
+ isPublic ? "verify" : "sign"
67643
+ ]);
67644
+ }
67645
+ }
67646
+ if (keyObject.asymmetricKeyType === "rsa") {
67647
+ let hash;
67648
+ switch (alg) {
67649
+ case "RSA-OAEP":
67650
+ hash = "SHA-1";
67651
+ break;
67652
+ case "RS256":
67653
+ case "PS256":
67654
+ case "RSA-OAEP-256":
67655
+ hash = "SHA-256";
67656
+ break;
67657
+ case "RS384":
67658
+ case "PS384":
67659
+ case "RSA-OAEP-384":
67660
+ hash = "SHA-384";
67661
+ break;
67662
+ case "RS512":
67663
+ case "PS512":
67664
+ case "RSA-OAEP-512":
67665
+ hash = "SHA-512";
67666
+ break;
67667
+ default:
67668
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
67669
+ }
67670
+ if (alg.startsWith("RSA-OAEP")) {
67671
+ return keyObject.toCryptoKey({
67672
+ name: "RSA-OAEP",
67673
+ hash
67674
+ }, extractable, isPublic ? ["encrypt"] : ["decrypt"]);
67675
+ }
67676
+ cryptoKey = keyObject.toCryptoKey({
67677
+ name: alg.startsWith("PS") ? "RSA-PSS" : "RSASSA-PKCS1-v1_5",
67678
+ hash
67679
+ }, extractable, [isPublic ? "verify" : "sign"]);
67680
+ }
67681
+ if (keyObject.asymmetricKeyType === "ec") {
67682
+ const nist = new Map([
67683
+ ["prime256v1", "P-256"],
67684
+ ["secp384r1", "P-384"],
67685
+ ["secp521r1", "P-521"]
67686
+ ]);
67687
+ const namedCurve = nist.get(keyObject.asymmetricKeyDetails?.namedCurve);
67688
+ if (!namedCurve) {
67689
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
67690
+ }
67691
+ if (alg === "ES256" && namedCurve === "P-256") {
67692
+ cryptoKey = keyObject.toCryptoKey({
67693
+ name: "ECDSA",
67694
+ namedCurve
67695
+ }, extractable, [isPublic ? "verify" : "sign"]);
67696
+ }
67697
+ if (alg === "ES384" && namedCurve === "P-384") {
67698
+ cryptoKey = keyObject.toCryptoKey({
67699
+ name: "ECDSA",
67700
+ namedCurve
67701
+ }, extractable, [isPublic ? "verify" : "sign"]);
67702
+ }
67703
+ if (alg === "ES512" && namedCurve === "P-521") {
67704
+ cryptoKey = keyObject.toCryptoKey({
67705
+ name: "ECDSA",
67706
+ namedCurve
67707
+ }, extractable, [isPublic ? "verify" : "sign"]);
67708
+ }
67709
+ if (alg.startsWith("ECDH-ES")) {
67710
+ cryptoKey = keyObject.toCryptoKey({
67711
+ name: "ECDH",
67712
+ namedCurve
67713
+ }, extractable, isPublic ? [] : ["deriveBits"]);
67714
+ }
67715
+ }
67716
+ if (!cryptoKey) {
67717
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
67718
+ }
67719
+ if (!cached) {
67720
+ cache.set(keyObject, { [alg]: cryptoKey });
67721
+ } else {
67722
+ cached[alg] = cryptoKey;
67723
+ }
67724
+ return cryptoKey;
67725
+ };
67726
+ var normalize_key_default = async (key, alg) => {
67727
+ if (key instanceof Uint8Array) {
67728
+ return key;
67729
+ }
67730
+ if (isCryptoKey(key)) {
67731
+ return key;
67732
+ }
67733
+ if (isKeyObject(key)) {
67734
+ if (key.type === "secret") {
67735
+ return key.export();
67736
+ }
67737
+ if ("toCryptoKey" in key && typeof key.toCryptoKey === "function") {
67738
+ try {
67739
+ return handleKeyObject(key, alg);
67740
+ } catch (err) {
67741
+ if (err instanceof TypeError) {
67742
+ throw err;
67743
+ }
67744
+ }
67745
+ }
67746
+ let jwk = key.export({ format: "jwk" });
67747
+ return handleJWK(key, jwk, alg);
67748
+ }
67749
+ if (isJWK(key)) {
67750
+ if (key.k) {
67751
+ return decode(key.k);
67752
+ }
67753
+ return handleJWK(key, key, alg, true);
67754
+ }
67755
+ throw new Error("unreachable");
67756
+ };
67757
+
67758
+ // node_modules/jose/dist/webapi/lib/check_key_type.js
67759
+ var tag3 = (key) => key?.[Symbol.toStringTag];
67760
+ var jwkMatchesOp = (alg, key, usage) => {
67761
+ if (key.use !== undefined) {
67762
+ let expected;
67763
+ switch (usage) {
67764
+ case "sign":
67765
+ case "verify":
67766
+ expected = "sig";
67767
+ break;
67768
+ case "encrypt":
67769
+ case "decrypt":
67770
+ expected = "enc";
67771
+ break;
67772
+ }
67773
+ if (key.use !== expected) {
67774
+ throw new TypeError(`Invalid key for this operation, its "use" must be "${expected}" when present`);
67775
+ }
67776
+ }
67777
+ if (key.alg !== undefined && key.alg !== alg) {
67778
+ throw new TypeError(`Invalid key for this operation, its "alg" must be "${alg}" when present`);
67779
+ }
67780
+ if (Array.isArray(key.key_ops)) {
67781
+ let expectedKeyOp;
67782
+ switch (true) {
67783
+ case (usage === "sign" || usage === "verify"):
67784
+ case alg === "dir":
67785
+ case alg.includes("CBC-HS"):
67786
+ expectedKeyOp = usage;
67787
+ break;
67788
+ case alg.startsWith("PBES2"):
67789
+ expectedKeyOp = "deriveBits";
67790
+ break;
67791
+ case /^A\d{3}(?:GCM)?(?:KW)?$/.test(alg):
67792
+ if (!alg.includes("GCM") && alg.endsWith("KW")) {
67793
+ expectedKeyOp = usage === "encrypt" ? "wrapKey" : "unwrapKey";
67794
+ } else {
67795
+ expectedKeyOp = usage;
67796
+ }
67797
+ break;
67798
+ case (usage === "encrypt" && alg.startsWith("RSA")):
67799
+ expectedKeyOp = "wrapKey";
67800
+ break;
67801
+ case usage === "decrypt":
67802
+ expectedKeyOp = alg.startsWith("RSA") ? "unwrapKey" : "deriveBits";
67803
+ break;
67804
+ }
67805
+ if (expectedKeyOp && key.key_ops?.includes?.(expectedKeyOp) === false) {
67806
+ throw new TypeError(`Invalid key for this operation, its "key_ops" must include "${expectedKeyOp}" when present`);
67807
+ }
67808
+ }
67809
+ return true;
67810
+ };
67811
+ var symmetricTypeCheck = (alg, key, usage) => {
67812
+ if (key instanceof Uint8Array)
67813
+ return;
67814
+ if (isJWK(key)) {
67815
+ if (isSecretJWK(key) && jwkMatchesOp(alg, key, usage))
67816
+ return;
67817
+ throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present`);
67818
+ }
67819
+ if (!is_key_like_default(key)) {
67820
+ throw new TypeError(withAlg(alg, key, "CryptoKey", "KeyObject", "JSON Web Key", "Uint8Array"));
67821
+ }
67822
+ if (key.type !== "secret") {
67823
+ throw new TypeError(`${tag3(key)} instances for symmetric algorithms must be of type "secret"`);
67824
+ }
67825
+ };
67826
+ var asymmetricTypeCheck = (alg, key, usage) => {
67827
+ if (isJWK(key)) {
67828
+ switch (usage) {
67829
+ case "decrypt":
67830
+ case "sign":
67831
+ if (isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))
67832
+ return;
67833
+ throw new TypeError(`JSON Web Key for this operation be a private JWK`);
67834
+ case "encrypt":
67835
+ case "verify":
67836
+ if (isPublicJWK(key) && jwkMatchesOp(alg, key, usage))
67837
+ return;
67838
+ throw new TypeError(`JSON Web Key for this operation be a public JWK`);
67839
+ }
67840
+ }
67841
+ if (!is_key_like_default(key)) {
67842
+ throw new TypeError(withAlg(alg, key, "CryptoKey", "KeyObject", "JSON Web Key"));
67843
+ }
67844
+ if (key.type === "secret") {
67845
+ throw new TypeError(`${tag3(key)} instances for asymmetric algorithms must not be of type "secret"`);
67846
+ }
67847
+ if (key.type === "public") {
67848
+ switch (usage) {
67849
+ case "sign":
67850
+ throw new TypeError(`${tag3(key)} instances for asymmetric algorithm signing must be of type "private"`);
67851
+ case "decrypt":
67852
+ throw new TypeError(`${tag3(key)} instances for asymmetric algorithm decryption must be of type "private"`);
67853
+ default:
67854
+ break;
67855
+ }
67856
+ }
67857
+ if (key.type === "private") {
67858
+ switch (usage) {
67859
+ case "verify":
67860
+ throw new TypeError(`${tag3(key)} instances for asymmetric algorithm verifying must be of type "public"`);
67861
+ case "encrypt":
67862
+ throw new TypeError(`${tag3(key)} instances for asymmetric algorithm encryption must be of type "public"`);
67863
+ default:
67864
+ break;
67865
+ }
67866
+ }
67867
+ };
67868
+ var check_key_type_default = (alg, key, usage) => {
67869
+ const symmetric = alg.startsWith("HS") || alg === "dir" || alg.startsWith("PBES2") || /^A(?:128|192|256)(?:GCM)?(?:KW)?$/.test(alg) || /^A(?:128|192|256)CBC-HS(?:256|384|512)$/.test(alg);
67870
+ if (symmetric) {
67871
+ symmetricTypeCheck(alg, key, usage);
67872
+ } else {
67873
+ asymmetricTypeCheck(alg, key, usage);
67874
+ }
67875
+ };
67876
+
67877
+ // node_modules/jose/dist/webapi/lib/subtle_dsa.js
67878
+ var subtle_dsa_default = (alg, algorithm) => {
67879
+ const hash = `SHA-${alg.slice(-3)}`;
67880
+ switch (alg) {
67881
+ case "HS256":
67882
+ case "HS384":
67883
+ case "HS512":
67884
+ return { hash, name: "HMAC" };
67885
+ case "PS256":
67886
+ case "PS384":
67887
+ case "PS512":
67888
+ return { hash, name: "RSA-PSS", saltLength: parseInt(alg.slice(-3), 10) >> 3 };
67889
+ case "RS256":
67890
+ case "RS384":
67891
+ case "RS512":
67892
+ return { hash, name: "RSASSA-PKCS1-v1_5" };
67893
+ case "ES256":
67894
+ case "ES384":
67895
+ case "ES512":
67896
+ return { hash, name: "ECDSA", namedCurve: algorithm.namedCurve };
67897
+ case "Ed25519":
67898
+ case "EdDSA":
67899
+ return { name: "Ed25519" };
67900
+ case "ML-DSA-44":
67901
+ case "ML-DSA-65":
67902
+ case "ML-DSA-87":
67903
+ return { name: alg };
67904
+ default:
67905
+ throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);
67906
+ }
67907
+ };
67908
+
67909
+ // node_modules/jose/dist/webapi/lib/get_sign_verify_key.js
67910
+ var get_sign_verify_key_default = async (alg, key, usage) => {
67911
+ if (key instanceof Uint8Array) {
67912
+ if (!alg.startsWith("HS")) {
67913
+ throw new TypeError(invalid_key_input_default(key, "CryptoKey", "KeyObject", "JSON Web Key"));
67914
+ }
67915
+ return crypto.subtle.importKey("raw", key, { hash: `SHA-${alg.slice(-3)}`, name: "HMAC" }, false, [usage]);
67916
+ }
67917
+ checkSigCryptoKey(key, alg, usage);
67918
+ return key;
67919
+ };
67920
+
67921
+ // node_modules/jose/dist/webapi/lib/epoch.js
67922
+ var epoch_default = (date2) => Math.floor(date2.getTime() / 1000);
67923
+
67924
+ // node_modules/jose/dist/webapi/lib/secs.js
67925
+ var minute = 60;
67926
+ var hour = minute * 60;
67927
+ var day = hour * 24;
67928
+ var week = day * 7;
67929
+ var year = day * 365.25;
67930
+ var REGEX = /^(\+|\-)? ?(\d+|\d+\.\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;
67931
+ var secs_default = (str) => {
67932
+ const matched = REGEX.exec(str);
67933
+ if (!matched || matched[4] && matched[1]) {
67934
+ throw new TypeError("Invalid time period format");
67935
+ }
67936
+ const value = parseFloat(matched[2]);
67937
+ const unit = matched[3].toLowerCase();
67938
+ let numericDate;
67939
+ switch (unit) {
67940
+ case "sec":
67941
+ case "secs":
67942
+ case "second":
67943
+ case "seconds":
67944
+ case "s":
67945
+ numericDate = Math.round(value);
67946
+ break;
67947
+ case "minute":
67948
+ case "minutes":
67949
+ case "min":
67950
+ case "mins":
67951
+ case "m":
67952
+ numericDate = Math.round(value * minute);
67953
+ break;
67954
+ case "hour":
67955
+ case "hours":
67956
+ case "hr":
67957
+ case "hrs":
67958
+ case "h":
67959
+ numericDate = Math.round(value * hour);
67960
+ break;
67961
+ case "day":
67962
+ case "days":
67963
+ case "d":
67964
+ numericDate = Math.round(value * day);
67965
+ break;
67966
+ case "week":
67967
+ case "weeks":
67968
+ case "w":
67969
+ numericDate = Math.round(value * week);
67970
+ break;
67971
+ default:
67972
+ numericDate = Math.round(value * year);
67973
+ break;
67974
+ }
67975
+ if (matched[1] === "-" || matched[4] === "ago") {
67976
+ return -numericDate;
67977
+ }
67978
+ return numericDate;
67979
+ };
67980
+
67981
+ // node_modules/jose/dist/webapi/lib/jwt_claims_set.js
67982
+ function validateInput(label, input) {
67983
+ if (!Number.isFinite(input)) {
67984
+ throw new TypeError(`Invalid ${label} input`);
67985
+ }
67986
+ return input;
67987
+ }
67988
+ class JWTClaimsBuilder {
67989
+ #payload;
67990
+ constructor(payload) {
67991
+ if (!is_object_default(payload)) {
67992
+ throw new TypeError("JWT Claims Set MUST be an object");
67993
+ }
67994
+ this.#payload = structuredClone(payload);
67995
+ }
67996
+ data() {
67997
+ return encoder.encode(JSON.stringify(this.#payload));
67998
+ }
67999
+ get iss() {
68000
+ return this.#payload.iss;
68001
+ }
68002
+ set iss(value) {
68003
+ this.#payload.iss = value;
68004
+ }
68005
+ get sub() {
68006
+ return this.#payload.sub;
68007
+ }
68008
+ set sub(value) {
68009
+ this.#payload.sub = value;
68010
+ }
68011
+ get aud() {
68012
+ return this.#payload.aud;
68013
+ }
68014
+ set aud(value) {
68015
+ this.#payload.aud = value;
68016
+ }
68017
+ set jti(value) {
68018
+ this.#payload.jti = value;
68019
+ }
68020
+ set nbf(value) {
68021
+ if (typeof value === "number") {
68022
+ this.#payload.nbf = validateInput("setNotBefore", value);
68023
+ } else if (value instanceof Date) {
68024
+ this.#payload.nbf = validateInput("setNotBefore", epoch_default(value));
68025
+ } else {
68026
+ this.#payload.nbf = epoch_default(new Date) + secs_default(value);
68027
+ }
68028
+ }
68029
+ set exp(value) {
68030
+ if (typeof value === "number") {
68031
+ this.#payload.exp = validateInput("setExpirationTime", value);
68032
+ } else if (value instanceof Date) {
68033
+ this.#payload.exp = validateInput("setExpirationTime", epoch_default(value));
68034
+ } else {
68035
+ this.#payload.exp = epoch_default(new Date) + secs_default(value);
68036
+ }
68037
+ }
68038
+ set iat(value) {
68039
+ if (typeof value === "undefined") {
68040
+ this.#payload.iat = epoch_default(new Date);
68041
+ } else if (value instanceof Date) {
68042
+ this.#payload.iat = validateInput("setIssuedAt", epoch_default(value));
68043
+ } else if (typeof value === "string") {
68044
+ this.#payload.iat = validateInput("setIssuedAt", epoch_default(new Date) + secs_default(value));
68045
+ } else {
68046
+ this.#payload.iat = validateInput("setIssuedAt", value);
68047
+ }
68048
+ }
68049
+ }
68050
+
68051
+ // node_modules/jose/dist/webapi/lib/sign.js
68052
+ var sign_default2 = async (alg, key, data) => {
68053
+ const cryptoKey = await get_sign_verify_key_default(alg, key, "sign");
68054
+ check_key_length_default(alg, cryptoKey);
68055
+ const signature = await crypto.subtle.sign(subtle_dsa_default(alg, cryptoKey.algorithm), cryptoKey, data);
68056
+ return new Uint8Array(signature);
68057
+ };
68058
+
68059
+ // node_modules/jose/dist/webapi/jws/flattened/sign.js
68060
+ class FlattenedSign {
68061
+ #payload;
68062
+ #protectedHeader;
68063
+ #unprotectedHeader;
68064
+ constructor(payload) {
68065
+ if (!(payload instanceof Uint8Array)) {
68066
+ throw new TypeError("payload must be an instance of Uint8Array");
68067
+ }
68068
+ this.#payload = payload;
68069
+ }
68070
+ setProtectedHeader(protectedHeader) {
68071
+ if (this.#protectedHeader) {
68072
+ throw new TypeError("setProtectedHeader can only be called once");
68073
+ }
68074
+ this.#protectedHeader = protectedHeader;
68075
+ return this;
68076
+ }
68077
+ setUnprotectedHeader(unprotectedHeader) {
68078
+ if (this.#unprotectedHeader) {
68079
+ throw new TypeError("setUnprotectedHeader can only be called once");
68080
+ }
68081
+ this.#unprotectedHeader = unprotectedHeader;
68082
+ return this;
68083
+ }
68084
+ async sign(key, options3) {
68085
+ if (!this.#protectedHeader && !this.#unprotectedHeader) {
68086
+ throw new JWSInvalid("either setProtectedHeader or setUnprotectedHeader must be called before #sign()");
68087
+ }
68088
+ if (!is_disjoint_default(this.#protectedHeader, this.#unprotectedHeader)) {
68089
+ throw new JWSInvalid("JWS Protected and JWS Unprotected Header Parameter names must be disjoint");
68090
+ }
68091
+ const joseHeader = {
68092
+ ...this.#protectedHeader,
68093
+ ...this.#unprotectedHeader
68094
+ };
68095
+ const extensions = validate_crit_default(JWSInvalid, new Map([["b64", true]]), options3?.crit, this.#protectedHeader, joseHeader);
68096
+ let b64 = true;
68097
+ if (extensions.has("b64")) {
68098
+ b64 = this.#protectedHeader.b64;
68099
+ if (typeof b64 !== "boolean") {
68100
+ throw new JWSInvalid('The "b64" (base64url-encode payload) Header Parameter must be a boolean');
68101
+ }
68102
+ }
68103
+ const { alg } = joseHeader;
68104
+ if (typeof alg !== "string" || !alg) {
68105
+ throw new JWSInvalid('JWS "alg" (Algorithm) Header Parameter missing or invalid');
68106
+ }
68107
+ check_key_type_default(alg, key, "sign");
68108
+ let payload = this.#payload;
68109
+ if (b64) {
68110
+ payload = encoder.encode(encode(payload));
68111
+ }
68112
+ let protectedHeader;
68113
+ if (this.#protectedHeader) {
68114
+ protectedHeader = encoder.encode(encode(JSON.stringify(this.#protectedHeader)));
68115
+ } else {
68116
+ protectedHeader = encoder.encode("");
68117
+ }
68118
+ const data = concat4(protectedHeader, encoder.encode("."), payload);
68119
+ const k = await normalize_key_default(key, alg);
68120
+ const signature = await sign_default2(alg, k, data);
68121
+ const jws = {
68122
+ signature: encode(signature),
68123
+ payload: ""
68124
+ };
68125
+ if (b64) {
68126
+ jws.payload = decoder.decode(payload);
68127
+ }
68128
+ if (this.#unprotectedHeader) {
68129
+ jws.header = this.#unprotectedHeader;
68130
+ }
68131
+ if (this.#protectedHeader) {
68132
+ jws.protected = decoder.decode(protectedHeader);
68133
+ }
68134
+ return jws;
68135
+ }
68136
+ }
68137
+
68138
+ // node_modules/jose/dist/webapi/jws/compact/sign.js
68139
+ class CompactSign {
68140
+ #flattened;
68141
+ constructor(payload) {
68142
+ this.#flattened = new FlattenedSign(payload);
68143
+ }
68144
+ setProtectedHeader(protectedHeader) {
68145
+ this.#flattened.setProtectedHeader(protectedHeader);
68146
+ return this;
68147
+ }
68148
+ async sign(key, options3) {
68149
+ const jws = await this.#flattened.sign(key, options3);
68150
+ if (jws.payload === undefined) {
68151
+ throw new TypeError("use the flattened module for creating JWS with b64: false");
68152
+ }
68153
+ return `${jws.protected}.${jws.payload}.${jws.signature}`;
68154
+ }
68155
+ }
68156
+
68157
+ // node_modules/jose/dist/webapi/jwt/sign.js
68158
+ class SignJWT {
68159
+ #protectedHeader;
68160
+ #jwt;
68161
+ constructor(payload = {}) {
68162
+ this.#jwt = new JWTClaimsBuilder(payload);
68163
+ }
68164
+ setIssuer(issuer) {
68165
+ this.#jwt.iss = issuer;
68166
+ return this;
68167
+ }
68168
+ setSubject(subject) {
68169
+ this.#jwt.sub = subject;
68170
+ return this;
68171
+ }
68172
+ setAudience(audience) {
68173
+ this.#jwt.aud = audience;
68174
+ return this;
68175
+ }
68176
+ setJti(jwtId) {
68177
+ this.#jwt.jti = jwtId;
68178
+ return this;
68179
+ }
68180
+ setNotBefore(input) {
68181
+ this.#jwt.nbf = input;
68182
+ return this;
68183
+ }
68184
+ setExpirationTime(input) {
68185
+ this.#jwt.exp = input;
68186
+ return this;
68187
+ }
68188
+ setIssuedAt(input) {
68189
+ this.#jwt.iat = input;
68190
+ return this;
68191
+ }
68192
+ setProtectedHeader(protectedHeader) {
68193
+ this.#protectedHeader = protectedHeader;
68194
+ return this;
68195
+ }
68196
+ async sign(key, options3) {
68197
+ const sig = new CompactSign(this.#jwt.data());
68198
+ sig.setProtectedHeader(this.#protectedHeader);
68199
+ if (Array.isArray(this.#protectedHeader?.crit) && this.#protectedHeader.crit.includes("b64") && this.#protectedHeader.b64 === false) {
68200
+ throw new JWTInvalid("JWTs MUST NOT use unencoded payload");
68201
+ }
68202
+ return sig.sign(key, options3);
68203
+ }
68204
+ }
68205
+ // src/functions/signJwt.ts
68206
+ function assertObjectPayload(payload) {
68207
+ if (!isPlainObject_default(payload) || isNull_default(payload)) {
68208
+ throw new Error("Payload must be a non-null object");
68209
+ }
68210
+ }
68211
+ var signJwt = async (payload, key, signOptions, protectHeaders) => {
68212
+ assertObjectPayload(payload);
68213
+ try {
68214
+ const secret = isString_default(key) ? new TextEncoder().encode(key) : key;
68215
+ const jwtBuilder = new SignJWT(payload).setProtectedHeader({ alg: "HS256", typ: "JWT", ...protectHeaders });
68216
+ return await jwtBuilder.sign(secret, signOptions);
68217
+ } catch (error) {
68218
+ throw new Error(`JWT signing failed: ${error?.message || String(error)}`);
68219
+ }
68220
+ };
68221
+ var signJwt_default = signJwt;
68222
+
67152
68223
  // src/registerJsonataExtensions.ts
67153
68224
  function registerJsonataExtensions(expression) {
67154
68225
  expression.registerFunction("dtFromIso", dtFromIso_default);
@@ -67186,6 +68257,7 @@ function registerJsonataExtensions(expression) {
67186
68257
  expression.registerFunction("convertMarkdownToHtml", convertMarkdownToHtml_default);
67187
68258
  expression.registerFunction("digest", digest_default);
67188
68259
  expression.registerFunction("sign", sign_default);
68260
+ expression.registerFunction("signJwt", signJwt_default);
67189
68261
  expression.registerFunction("xmlToJs", xmlToJs);
67190
68262
  expression.registerFunction("jsToXml", jsToXml_default);
67191
68263
  expression.registerFunction("generateEmbeddingsCohere", generateEmbeddingsCohere_default);
@@ -67252,4 +68324,4 @@ export {
67252
68324
  trutoJsonata as default
67253
68325
  };
67254
68326
 
67255
- //# debugId=C33F4138ACD2B83C64756E2164756E21
68327
+ //# debugId=5835659C2F99AEBC64756E2164756E21