Socket
Socket
Sign inDemoInstall

jose

Package Overview
Dependencies
Maintainers
1
Versions
209
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

jose - npm Package Compare versions

Comparing version 5.6.3 to 5.7.0

2

dist/browser/index.js

@@ -20,3 +20,3 @@ export { compactDecrypt } from './jwe/compact/decrypt.js';

export { createLocalJWKSet } from './jwks/local.js';
export { createRemoteJWKSet, experimental_jwksCache } from './jwks/remote.js';
export { createRemoteJWKSet, jwksCache, experimental_jwksCache } from './jwks/remote.js';
export { UnsecuredJWT } from './jwt/unsecured.js';

@@ -23,0 +23,0 @@ export { exportPKCS8, exportSPKI, exportJWK } from './key/export.js';

@@ -13,6 +13,6 @@ import fetchJwks from '../runtime/fetch_jwks.js';

const NAME = 'jose';
const VERSION = 'v5.6.3';
const VERSION = 'v5.7.0';
USER_AGENT = `${NAME}/${VERSION}`;
}
export const experimental_jwksCache = Symbol();
export const jwksCache = Symbol();
function isFreshJwksCache(input, cacheMaxAge) {

@@ -45,5 +45,5 @@ if (typeof input !== 'object' || input === null) {

this._cacheMaxAge = typeof options?.cacheMaxAge === 'number' ? options?.cacheMaxAge : 600000;
if (options?.[experimental_jwksCache] !== undefined) {
this._cache = options?.[experimental_jwksCache];
if (isFreshJwksCache(options?.[experimental_jwksCache], this._cacheMaxAge)) {
if (options?.[jwksCache] !== undefined) {
this._cache = options?.[jwksCache];
if (isFreshJwksCache(options?.[jwksCache], this._cacheMaxAge)) {
this._jwksTimestamp = this._cache.uat;

@@ -141,1 +141,2 @@ this._local = createLocalJWKSet(this._cache.jwks);

}
export const experimental_jwksCache = jwksCache;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.cryptoRuntime = exports.base64url = exports.generateSecret = exports.generateKeyPair = exports.errors = exports.decodeJwt = exports.decodeProtectedHeader = exports.importJWK = exports.importX509 = exports.importPKCS8 = exports.importSPKI = exports.exportJWK = exports.exportSPKI = exports.exportPKCS8 = exports.UnsecuredJWT = exports.experimental_jwksCache = exports.createRemoteJWKSet = exports.createLocalJWKSet = exports.EmbeddedJWK = exports.calculateJwkThumbprintUri = exports.calculateJwkThumbprint = exports.EncryptJWT = exports.SignJWT = exports.GeneralSign = exports.FlattenedSign = exports.CompactSign = exports.FlattenedEncrypt = exports.CompactEncrypt = exports.jwtDecrypt = exports.jwtVerify = exports.generalVerify = exports.flattenedVerify = exports.compactVerify = exports.GeneralEncrypt = exports.generalDecrypt = exports.flattenedDecrypt = exports.compactDecrypt = void 0;
exports.cryptoRuntime = exports.base64url = exports.generateSecret = exports.generateKeyPair = exports.errors = exports.decodeJwt = exports.decodeProtectedHeader = exports.importJWK = exports.importX509 = exports.importPKCS8 = exports.importSPKI = exports.exportJWK = exports.exportSPKI = exports.exportPKCS8 = exports.UnsecuredJWT = exports.experimental_jwksCache = exports.jwksCache = exports.createRemoteJWKSet = exports.createLocalJWKSet = exports.EmbeddedJWK = exports.calculateJwkThumbprintUri = exports.calculateJwkThumbprint = exports.EncryptJWT = exports.SignJWT = exports.GeneralSign = exports.FlattenedSign = exports.CompactSign = exports.FlattenedEncrypt = exports.CompactEncrypt = exports.jwtDecrypt = exports.jwtVerify = exports.generalVerify = exports.flattenedVerify = exports.compactVerify = exports.GeneralEncrypt = exports.generalDecrypt = exports.flattenedDecrypt = exports.compactDecrypt = void 0;
var decrypt_js_1 = require("./jwe/compact/decrypt.js");

@@ -45,2 +45,3 @@ Object.defineProperty(exports, "compactDecrypt", { enumerable: true, get: function () { return decrypt_js_1.compactDecrypt; } });

Object.defineProperty(exports, "createRemoteJWKSet", { enumerable: true, get: function () { return remote_js_1.createRemoteJWKSet; } });
Object.defineProperty(exports, "jwksCache", { enumerable: true, get: function () { return remote_js_1.jwksCache; } });
Object.defineProperty(exports, "experimental_jwksCache", { enumerable: true, get: function () { return remote_js_1.experimental_jwksCache; } });

@@ -47,0 +48,0 @@ var unsecured_js_1 = require("./jwt/unsecured.js");

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.createRemoteJWKSet = exports.experimental_jwksCache = void 0;
exports.experimental_jwksCache = exports.createRemoteJWKSet = exports.jwksCache = void 0;
const fetch_jwks_js_1 = require("../runtime/fetch_jwks.js");

@@ -16,6 +16,6 @@ const errors_js_1 = require("../util/errors.js");

const NAME = 'jose';
const VERSION = 'v5.6.3';
const VERSION = 'v5.7.0';
USER_AGENT = `${NAME}/${VERSION}`;
}
exports.experimental_jwksCache = Symbol();
exports.jwksCache = Symbol();
function isFreshJwksCache(input, cacheMaxAge) {

@@ -57,5 +57,5 @@ if (typeof input !== 'object' || input === null) {

this._cacheMaxAge = typeof options?.cacheMaxAge === 'number' ? options?.cacheMaxAge : 600000;
if (options?.[exports.experimental_jwksCache] !== undefined) {
this._cache = options?.[exports.experimental_jwksCache];
if (isFreshJwksCache(options?.[exports.experimental_jwksCache], this._cacheMaxAge)) {
if (options?.[exports.jwksCache] !== undefined) {
this._cache = options?.[exports.jwksCache];
if (isFreshJwksCache(options?.[exports.jwksCache], this._cacheMaxAge)) {
this._jwksTimestamp = this._cache.uat;

@@ -154,1 +154,2 @@ this._local = (0, local_js_1.createLocalJWKSet)(this._cache.jwks);

exports.createRemoteJWKSet = createRemoteJWKSet;
exports.experimental_jwksCache = exports.jwksCache;

@@ -20,3 +20,3 @@ export { compactDecrypt } from './jwe/compact/decrypt.js';

export { createLocalJWKSet } from './jwks/local.js';
export { createRemoteJWKSet, experimental_jwksCache } from './jwks/remote.js';
export { createRemoteJWKSet, jwksCache, experimental_jwksCache } from './jwks/remote.js';
export { UnsecuredJWT } from './jwt/unsecured.js';

@@ -23,0 +23,0 @@ export { exportPKCS8, exportSPKI, exportJWK } from './key/export.js';

@@ -13,6 +13,6 @@ import fetchJwks from '../runtime/fetch_jwks.js';

const NAME = 'jose';
const VERSION = 'v5.6.3';
const VERSION = 'v5.7.0';
USER_AGENT = `${NAME}/${VERSION}`;
}
export const experimental_jwksCache = Symbol();
export const jwksCache = Symbol();
function isFreshJwksCache(input, cacheMaxAge) {

@@ -54,5 +54,5 @@ if (typeof input !== 'object' || input === null) {

this._cacheMaxAge = typeof options?.cacheMaxAge === 'number' ? options?.cacheMaxAge : 600000;
if (options?.[experimental_jwksCache] !== undefined) {
this._cache = options?.[experimental_jwksCache];
if (isFreshJwksCache(options?.[experimental_jwksCache], this._cacheMaxAge)) {
if (options?.[jwksCache] !== undefined) {
this._cache = options?.[jwksCache];
if (isFreshJwksCache(options?.[jwksCache], this._cacheMaxAge)) {
this._jwksTimestamp = this._cache.uat;

@@ -150,1 +150,2 @@ this._local = createLocalJWKSet(this._cache.jwks);

}
export const experimental_jwksCache = jwksCache;

@@ -31,3 +31,3 @@ export { compactDecrypt } from './jwe/compact/decrypt';

export { createLocalJWKSet } from './jwks/local';
export { createRemoteJWKSet, experimental_jwksCache } from './jwks/remote';
export { createRemoteJWKSet, jwksCache, experimental_jwksCache } from './jwks/remote';
export type { RemoteJWKSetOptions, JWKSCacheInput, ExportedJWKSCache } from './jwks/remote';

@@ -34,0 +34,0 @@ export { UnsecuredJWT } from './jwt/unsecured';

import type { KeyLike, JWSHeaderParameters, FlattenedJWSInput, JSONWebKeySet } from '../types';
/**
* This is an experimental feature, it is not subject to semantic versioning rules. Non-backward
* compatible changes or removal may occur in any future release.
*
* DANGER ZONE - This option has security implications that must be understood, assessed for

@@ -28,3 +25,3 @@ * applicability, and accepted before use. It is critical that the JSON Web Key Set cache only be

* - Default to an empty object `{}` instead when there's no previously cached value;
* - Pass it in as {@link RemoteJWKSetOptions[experimental_jwksCache]};
* - Pass it in as {@link RemoteJWKSetOptions[jwksCache]};
* - Afterwards, update the key-value storage if the {@link ExportedJWKSCache.uat `uat`} property of

@@ -44,3 +41,3 @@ * the object has changed.

* const JWKS = jose.createRemoteJWKSet(url, {
* [jose.experimental_jwksCache]: jwksCache,
* [jose.jwksCache]: jwksCache,
* })

@@ -57,3 +54,3 @@ *

*/
export declare const experimental_jwksCache: unique symbol;
export declare const jwksCache: unique symbol;
/** Options for the remote JSON Web Key Set. */

@@ -91,4 +88,4 @@ export interface RemoteJWKSetOptions {

headers?: Record<string, string>;
/** See {@link experimental_jwksCache}. */
[experimental_jwksCache]?: JWKSCacheInput;
/** See {@link jwksCache}. */
[jwksCache]?: JWKSCacheInput;
}

@@ -134,1 +131,7 @@ export interface ExportedJWKSCache {

};
/**
* @ignore
*
* @deprecated Use {@link jwksCache}.
*/
export declare const experimental_jwksCache: symbol;

@@ -373,3 +373,7 @@ /**

export interface JWTClaimVerificationOptions {
/** Expected JWT "aud" (Audience) Claim value(s). */
/**
* Expected JWT "aud" (Audience) Claim value(s).
*
* This option makes the JWT "aud" (Audience) Claim presence required.
*/
audience?: string | string[]

@@ -385,3 +389,7 @@

/** Expected JWT "iss" (Issuer) Claim value(s). */
/**
* Expected JWT "iss" (Issuer) Claim value(s).
*
* This option makes the JWT "iss" (Issuer) Claim presence required.
*/
issuer?: string | string[]

@@ -394,9 +402,19 @@

* - Parsed as seconds when a string (e.g. "5 seconds", "10 minutes", "2 hours").
*
* This option makes the JWT "iat" (Issued At) Claim presence required.
*/
maxTokenAge?: string | number
/** Expected JWT "sub" (Subject) Claim value. */
/**
* Expected JWT "sub" (Subject) Claim value.
*
* This option makes the JWT "sub" (Subject) Claim presence required.
*/
subject?: string
/** Expected JWT "typ" (Type) Header Parameter value. */
/**
* Expected JWT "typ" (Type) Header Parameter value.
*
* This option makes the JWT "typ" (Type) Header Parameter presence required.
*/
typ?: string

@@ -409,7 +427,9 @@

* Array of required Claim Names that must be present in the JWT Claims Set. Default is that: if
* the {@link JWTClaimVerificationOptions.issuer issuer option} is set, then "iss" must be present;
* if the {@link JWTClaimVerificationOptions.audience audience option} is set, then "aud" must be
* present; if the {@link JWTClaimVerificationOptions.subject subject option} is set, then "sub"
* must be present; if the {@link JWTClaimVerificationOptions.maxTokenAge maxTokenAge option} is
* set, then "iat" must be present.
* the {@link JWTClaimVerificationOptions.issuer `issuer` option} is set, then JWT "iss" (Issuer)
* Claim must be present; if the {@link JWTClaimVerificationOptions.audience `audience` option} is
* set, then JWT "aud" (Audience) Claim must be present; if the
* {@link JWTClaimVerificationOptions.subject `subject` option} is set, then JWT "sub" (Subject)
* Claim must be present; if the
* {@link JWTClaimVerificationOptions.maxTokenAge `maxTokenAge` option} is set, then JWT "iat"
* (Issued At) Claim must be present.
*/

@@ -423,4 +443,5 @@ requiredClaims?: string[]

* A list of accepted JWS "alg" (Algorithm) Header Parameter values. By default all "alg"
* (Algorithm) values applicable for the used key/secret are allowed. Note: "none" is never
* accepted.
* (Algorithm) values applicable for the used key/secret are allowed.
*
* Note: Unsecured JWTs (`{ "alg": "none" }`) are never accepted by this API.
*/

@@ -427,0 +448,0 @@ algorithms?: string[]

{
"name": "jose",
"version": "5.6.3",
"version": "5.7.0",
"description": "JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes",

@@ -5,0 +5,0 @@ "keywords": [

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc