@@ -137,3 +137,7 @@ import { decode as b64u } from '../../util/base64url.js'; | ||
| } | ||
| result.plaintext = await decompress(plaintext, maxDecompressedLength); | ||
| result.plaintext = await decompress(plaintext, maxDecompressedLength).catch((cause) => { | ||
| if (cause instanceof JWEInvalid) | ||
| throw cause; | ||
| throw new JWEInvalid('Failed to decompress plaintext', { cause }); | ||
| }); | ||
| } | ||
@@ -140,0 +144,0 @@ if (jwe.protected !== undefined) { |
@@ -136,3 +136,5 @@ import { encode as b64u } from '../../util/base64url.js'; | ||
| if (joseHeader.zip === 'DEF') { | ||
| plaintext = await compress(plaintext); | ||
| plaintext = await compress(plaintext).catch((cause) => { | ||
| throw new JWEInvalid('Failed to compress plaintext', { cause }); | ||
| }); | ||
| } | ||
@@ -139,0 +141,0 @@ const { ciphertext, tag, iv } = await encrypt(enc, plaintext, cek, this.#iv, additionalData); |
@@ -12,3 +12,3 @@ import { JOSEError, JWKSNoMatchingKey, JWKSTimeout } from '../util/errors.js'; | ||
| const NAME = 'jose'; | ||
| const VERSION = 'v6.2.1'; | ||
| const VERSION = 'v6.2.2'; | ||
| USER_AGENT = `${NAME}/${VERSION}`; | ||
@@ -15,0 +15,0 @@ } |
@@ -12,4 +12,4 @@ import { JOSENotSupported, JWEInvalid } from '../util/errors.js'; | ||
| const writer = cs.writable.getWriter(); | ||
| writer.write(input); | ||
| writer.close(); | ||
| writer.write(input).catch(() => { }); | ||
| writer.close().catch(() => { }); | ||
| const chunks = []; | ||
@@ -29,4 +29,4 @@ const reader = cs.readable.getReader(); | ||
| const writer = ds.writable.getWriter(); | ||
| writer.write(input); | ||
| writer.close(); | ||
| writer.write(input).catch(() => { }); | ||
| writer.close().catch(() => { }); | ||
| const chunks = []; | ||
@@ -33,0 +33,0 @@ let length = 0; |
+1
-1
| { | ||
| "name": "jose", | ||
| "version": "6.2.1", | ||
| "version": "6.2.2", | ||
| "description": "JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
257590
0.14%6302
0.1%