Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

jose-node-esm-runtime

Package Overview
Dependencies
Maintainers
1
Versions
132
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

jose-node-esm-runtime - npm Package Compare versions

Comparing version 4.10.0 to 4.10.1

13

dist/types/jwk/thumbprint.d.ts
import type { JWK } from '../types';
/**
* Calculates a base64url-encoded JSON Web Key (JWK) Thumbprint as per
* [RFC7638](https://www.rfc-editor.org/rfc/rfc7638).
* Calculates a base64url-encoded JSON Web Key (JWK) Thumbprint
*

@@ -21,7 +20,9 @@ * @example Usage

* @param jwk JSON Web Key.
* @param digestAlgorithm Digest Algorithm to use for calculating the thumbprint. Default is "sha256".
* @param digestAlgorithm Digest Algorithm to use for calculating the thumbprint. Default is
* "sha256".
* @see [RFC7638](https://www.rfc-editor.org/rfc/rfc7638)
*/
export declare function calculateJwkThumbprint(jwk: JWK, digestAlgorithm?: 'sha256' | 'sha384' | 'sha512'): Promise<string>;
/**
* Calculates a JSON Web Key (JWK) Thumbprint URI as per [RFC9278](https://www.rfc-editor.org/rfc/rfc9278).
* Calculates a JSON Web Key (JWK) Thumbprint URI
*

@@ -43,4 +44,6 @@ * @example Usage

* @param jwk JSON Web Key.
* @param digestAlgorithm Digest Algorithm to use for calculating the thumbprint. Default is "sha256".
* @param digestAlgorithm Digest Algorithm to use for calculating the thumbprint. Default is
* "sha256".
* @see [RFC9278](https://www.rfc-editor.org/rfc/rfc9278)
*/
export declare function calculateJwkThumbprintUri(jwk: JWK, digestAlgorithm?: 'sha256' | 'sha384' | 'sha512'): Promise<string>;

@@ -14,3 +14,6 @@ import type { JWSHeaderParameters, FlattenedJWSInput, GetKeyFunction } from '../types';

cooldownDuration?: number;
/** Maximum time (in milliseconds) between successful HTTP requests. Default is 600000 (10 minutes). */
/**
* Maximum time (in milliseconds) between successful HTTP requests. Default is 600000 (10
* minutes).
*/
cacheMaxAge?: number | typeof Infinity;

@@ -29,5 +32,2 @@ /**

}
interface URL {
href: string;
}
/**

@@ -37,3 +37,4 @@ * Returns a function that resolves to a key object downloaded from a remote endpoint returning a

* must match the selection process. The JSON Web Key Set is fetched when no key matches the
* selection process but only as frequently as the `cooldownDuration` option allows, to prevent abuse.
* selection process but only as frequently as the `cooldownDuration` option allows, to prevent
* abuse.
*

@@ -57,2 +58,1 @@ * @example Usage

export declare function createRemoteJWKSet(url: URL, options?: RemoteJWKSetOptions): GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput>;
export {};

@@ -50,5 +50,6 @@ import type { JWTPayload } from '../types';

*
* @param input "iat" (Issued At) Claim value to set on the JWT Claims Set. Default is current timestamp.
* @param input "iat" (Issued At) Claim value to set on the JWT Claims Set. Default is current
* timestamp.
*/
setIssuedAt(input?: number): this;
}

@@ -371,3 +371,3 @@ /**

*
* This makes the "Extension Header Parameter "${parameter}" is not recognized" error go away.
* This makes the "Extension Header Parameter "..." is not recognized" error go away.
*

@@ -382,3 +382,4 @@ * Use this when a given JWS/JWT/JWE profile requires the use of proprietary non-registered "crit"

* The JWS extension Header Parameter `b64` is always recognized and processed properly. No other
* registered Header Parameters that need this kind of default built-in treatment are currently available.
* registered Header Parameters that need this kind of default built-in treatment are currently
* available.
*/

@@ -465,3 +466,4 @@ crit?: {

* A list of accepted JWS "alg" (Algorithm) Header Parameter values. By default all "alg"
* (Algorithm) values applicable for the used key/secret are allowed. Note: "none" is never accepted.
* (Algorithm) values applicable for the used key/secret are allowed. Note: "none" is never
* accepted.
*/

@@ -476,6 +478,14 @@ algorithms?: string[]

export interface JWTPayload {
/** JWT Issuer - [RFC7519#section-4.1.1](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.1). */
/**
* JWT Issuer
*
* @see [RFC7519#section-4.1.1](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.1)
*/
iss?: string
/** JWT Subject - [RFC7519#section-4.1.2](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.2). */
/**
* JWT Subject
*
* @see [RFC7519#section-4.1.2](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.2)
*/
sub?: string

@@ -486,12 +496,28 @@

/** JWT ID - [RFC7519#section-4.1.7](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.7). */
/**
* JWT ID
*
* @see [RFC7519#section-4.1.7](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.7)
*/
jti?: string
/** JWT Not Before - [RFC7519#section-4.1.5](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.5). */
/**
* JWT Not Before
*
* @see [RFC7519#section-4.1.5](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.5)
*/
nbf?: number
/** JWT Expiration Time - [RFC7519#section-4.1.4](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.4). */
/**
* JWT Expiration Time
*
* @see [RFC7519#section-4.1.4](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.4)
*/
exp?: number
/** JWT Issued At - [RFC7519#section-4.1.6](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.6). */
/**
* JWT Issued At
*
* @see [RFC7519#section-4.1.6](https://www.rfc-editor.org/rfc/rfc7519#section-4.1.6)
*/
iat?: number

@@ -498,0 +524,0 @@

{
"name": "jose-node-esm-runtime",
"version": "4.10.0",
"version": "4.10.1",
"homepage": "https://github.com/panva/jose",

@@ -5,0 +5,0 @@ "repository": "panva/jose",

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc