UNPKG

jose

Version:

JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes

697 lines (603 loc) 22.7 kB
/** * KeyLike are runtime-specific classes representing asymmetric keys or symmetric secrets. These are * instances of {@link !CryptoKey} and additionally {@link !KeyObject} in Node.js runtime. * {@link !Uint8Array} instances are also accepted as symmetric secret representation only. * * {@link key/import Key Import Functions} can be used to import PEM, or JWK formatted asymmetric * keys and certificates to these runtime-specific representations. * * In Node.js the {@link !Buffer} class is a subclass of {@link !Uint8Array} and so {@link !Buffer} can * be provided for symmetric secrets as well. * * {@link !KeyObject} is a representation of a key/secret available in the Node.js runtime. In * addition to the {@link key/import Key Import Functions} you may use the runtime APIs * {@link !createPublicKey}, {@link !createPrivateKey}, and {@link !createSecretKey} to obtain a * {@link !KeyObject} from your existing key material. * * {@link !CryptoKey} is a representation of a key/secret available in the Browser and * Web-interoperable runtimes. In addition to the {@link key/import Key Import Functions} you may use * the {@link !SubtleCrypto.importKey} API to obtain a {@link !CryptoKey} from your existing key * material. * */ export type KeyLike = { type: string } /** Generic JSON Web Key Parameters. */ export interface JWKParameters { /** JWK "kty" (Key Type) Parameter */ kty: string /** * JWK "alg" (Algorithm) Parameter * * @see {@link https://github.com/panva/jose/issues/210 Algorithm Key Requirements} */ alg?: string /** JWK "key_ops" (Key Operations) Parameter */ key_ops?: string[] /** JWK "ext" (Extractable) Parameter */ ext?: boolean /** JWK "use" (Public Key Use) Parameter */ use?: string /** JWK "x5c" (X.509 Certificate Chain) Parameter */ x5c?: string[] /** JWK "x5t" (X.509 Certificate SHA-1 Thumbprint) Parameter */ x5t?: string /** JWK "x5t#S256" (X.509 Certificate SHA-256 Thumbprint) Parameter */ 'x5t#S256'?: string /** JWK "x5u" (X.509 URL) Parameter */ x5u?: string /** JWK "kid" (Key ID) Parameter */ kid?: string } /** Convenience interface for Public OKP JSON Web Keys */ export interface JWK_OKP_Public extends JWKParameters { /** OKP JWK "crv" (The Subtype of Key Pair) Parameter */ crv: string /** OKP JWK "x" (The public key) Parameter */ x: string } /** Convenience interface for Private OKP JSON Web Keys */ export interface JWK_OKP_Private extends JWK_OKP_Public, JWKParameters { /** OKP JWK "d" (The Private Key) Parameter */ d: string } /** Convenience interface for Public EC JSON Web Keys */ export interface JWK_EC_Public extends JWKParameters { /** EC JWK "crv" (Curve) Parameter */ crv: string /** EC JWK "x" (X Coordinate) Parameter */ x: string /** EC JWK "y" (Y Coordinate) Parameter */ y: string } /** Convenience interface for Private EC JSON Web Keys */ export interface JWK_EC_Private extends JWK_EC_Public, JWKParameters { /** EC JWK "d" (ECC Private Key) Parameter */ d: string } /** Convenience interface for Public RSA JSON Web Keys */ export interface JWK_RSA_Public extends JWKParameters { /** RSA JWK "e" (Exponent) Parameter */ e: string /** RSA JWK "n" (Modulus) Parameter */ n: string } /** Convenience interface for Private RSA JSON Web Keys */ export interface JWK_RSA_Private extends JWK_RSA_Public, JWKParameters { /** RSA JWK "d" (Private Exponent) Parameter */ d: string /** RSA JWK "dp" (First Factor CRT Exponent) Parameter */ dp: string /** RSA JWK "dq" (Second Factor CRT Exponent) Parameter */ dq: string /** RSA JWK "p" (First Prime Factor) Parameter */ p: string /** RSA JWK "q" (Second Prime Factor) Parameter */ q: string /** RSA JWK "qi" (First CRT Coefficient) Parameter */ qi: string } /** Convenience interface for oct JSON Web Keys */ export interface JWK_oct extends JWKParameters { /** Oct JWK "k" (Key Value) Parameter */ k: string } /** * JSON Web Key ({@link https://www.rfc-editor.org/rfc/rfc7517 JWK}). "RSA", "EC", "OKP", and "oct" * key types are supported. * * @see {@link JWK_OKP_Public} * @see {@link JWK_OKP_Private} * @see {@link JWK_EC_Public} * @see {@link JWK_EC_Private} * @see {@link JWK_RSA_Public} * @see {@link JWK_RSA_Private} * @see {@link JWK_oct} */ export interface JWK extends JWKParameters { /** * - EC JWK "crv" (Curve) Parameter * - OKP JWK "crv" (The Subtype of Key Pair) Parameter */ crv?: string /** * - Private RSA JWK "d" (Private Exponent) Parameter * - Private EC JWK "d" (ECC Private Key) Parameter * - Private OKP JWK "d" (The Private Key) Parameter */ d?: string /** Private RSA JWK "dp" (First Factor CRT Exponent) Parameter */ dp?: string /** Private RSA JWK "dq" (Second Factor CRT Exponent) Parameter */ dq?: string /** RSA JWK "e" (Exponent) Parameter */ e?: string /** Oct JWK "k" (Key Value) Parameter */ k?: string /** RSA JWK "n" (Modulus) Parameter */ n?: string /** Private RSA JWK "p" (First Prime Factor) Parameter */ p?: string /** Private RSA JWK "q" (Second Prime Factor) Parameter */ q?: string /** Private RSA JWK "qi" (First CRT Coefficient) Parameter */ qi?: string /** * - EC JWK "x" (X Coordinate) Parameter * - OKP JWK "x" (The public key) Parameter */ x?: string /** EC JWK "y" (Y Coordinate) Parameter */ y?: string } /** * @private * * @internal */ export interface GenericGetKeyFunction<IProtectedHeader, IToken, ReturnKeyTypes> { /** * Dynamic key resolution function. No token components have been verified at the time of this * function call. * * If you cannot match a key suitable for the token, throw an error instead. * * @param protectedHeader JWE or JWS Protected Header. * @param token The consumed JWE or JWS token. */ (protectedHeader: IProtectedHeader, token: IToken): Promise<ReturnKeyTypes> | ReturnKeyTypes } /** * Generic Interface for consuming operations dynamic key resolution. * * @param IProtectedHeader Type definition of the JWE or JWS Protected Header. * @param IToken Type definition of the consumed JWE or JWS token. */ export interface GetKeyFunction<IProtectedHeader, IToken> extends GenericGetKeyFunction<IProtectedHeader, IToken, KeyLike | Uint8Array> {} /** * Flattened JWS definition for verify function inputs, allows payload as {@link !Uint8Array} for * detached signature validation. */ export interface FlattenedJWSInput { /** * The "header" member MUST be present and contain the value JWS Unprotected Header when the JWS * Unprotected Header value is non- empty; otherwise, it MUST be absent. This value is represented * as an unencoded JSON object, rather than as a string. These Header Parameter values are not * integrity protected. */ header?: JWSHeaderParameters /** * The "payload" member MUST be present and contain the value BASE64URL(JWS Payload). When RFC7797 * "b64": false is used the value passed may also be a {@link !Uint8Array}. */ payload: string | Uint8Array /** * The "protected" member MUST be present and contain the value BASE64URL(UTF8(JWS Protected * Header)) when the JWS Protected Header value is non-empty; otherwise, it MUST be absent. These * Header Parameter values are integrity protected. */ protected?: string /** The "signature" member MUST be present and contain the value BASE64URL(JWS Signature). */ signature: string } /** * General JWS definition for verify function inputs, allows payload as {@link !Uint8Array} for * detached signature validation. */ export interface GeneralJWSInput { /** * The "payload" member MUST be present and contain the value BASE64URL(JWS Payload). When when * JWS Unencoded Payload ({@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}) "b64": false is * used the value passed may also be a {@link !Uint8Array}. */ payload: string | Uint8Array /** * The "signatures" member value MUST be an array of JSON objects. Each object represents a * signature or MAC over the JWS Payload and the JWS Protected Header. */ signatures: Omit<FlattenedJWSInput, 'payload'>[] } /** * Flattened JWS definition. Payload is returned as an empty string when JWS Unencoded Payload * ({@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}) is used. */ export interface FlattenedJWS extends Partial<FlattenedJWSInput> { payload: string signature: string } /** * General JWS definition. Payload is returned as an empty string when JWS Unencoded Payload * ({@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}) is used. */ export interface GeneralJWS { payload: string signatures: Omit<FlattenedJWSInput, 'payload'>[] } export interface JoseHeaderParameters { /** "kid" (Key ID) Header Parameter */ kid?: string /** "x5t" (X.509 Certificate SHA-1 Thumbprint) Header Parameter */ x5t?: string /** "x5c" (X.509 Certificate Chain) Header Parameter */ x5c?: string[] /** "x5u" (X.509 URL) Header Parameter */ x5u?: string /** "jku" (JWK Set URL) Header Parameter */ jku?: string /** "jwk" (JSON Web Key) Header Parameter */ jwk?: Pick<JWK, 'kty' | 'crv' | 'x' | 'y' | 'e' | 'n'> /** "typ" (Type) Header Parameter */ typ?: string /** "cty" (Content Type) Header Parameter */ cty?: string } /** Recognized JWS Header Parameters, any other Header Members may also be present. */ export interface JWSHeaderParameters extends JoseHeaderParameters { /** * JWS "alg" (Algorithm) Header Parameter * * @see {@link https://github.com/panva/jose/issues/210#jws-alg Algorithm Key Requirements} */ alg?: string /** * This JWS Extension Header Parameter modifies the JWS Payload representation and the JWS Signing * Input computation as per {@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}. */ b64?: boolean /** JWS "crit" (Critical) Header Parameter */ crit?: string[] /** Any other JWS Header member. */ [propName: string]: unknown } /** Recognized JWE Key Management-related Header Parameters. */ export interface JWEKeyManagementHeaderParameters { apu?: Uint8Array apv?: Uint8Array /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ p2c?: number /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ p2s?: Uint8Array /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ iv?: Uint8Array /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ epk?: KeyLike } /** Flattened JWE definition. */ export interface FlattenedJWE { /** * The "aad" member MUST be present and contain the value BASE64URL(JWE AAD)) when the JWE AAD * value is non-empty; otherwise, it MUST be absent. A JWE AAD value can be included to supply a * base64url-encoded value to be integrity protected but not encrypted. */ aad?: string /** The "ciphertext" member MUST be present and contain the value BASE64URL(JWE Ciphertext). */ ciphertext: string /** * The "encrypted_key" member MUST be present and contain the value BASE64URL(JWE Encrypted Key) * when the JWE Encrypted Key value is non-empty; otherwise, it MUST be absent. */ encrypted_key?: string /** * The "header" member MUST be present and contain the value JWE Per- Recipient Unprotected Header * when the JWE Per-Recipient Unprotected Header value is non-empty; otherwise, it MUST be absent. * This value is represented as an unencoded JSON object, rather than as a string. These Header * Parameter values are not integrity protected. */ header?: JWEHeaderParameters /** * The "iv" member MUST be present and contain the value BASE64URL(JWE Initialization Vector) when * the JWE Initialization Vector value is non-empty; otherwise, it MUST be absent. */ iv?: string /** * The "protected" member MUST be present and contain the value BASE64URL(UTF8(JWE Protected * Header)) when the JWE Protected Header value is non-empty; otherwise, it MUST be absent. These * Header Parameter values are integrity protected. */ protected?: string /** * The "tag" member MUST be present and contain the value BASE64URL(JWE Authentication Tag) when * the JWE Authentication Tag value is non-empty; otherwise, it MUST be absent. */ tag?: string /** * The "unprotected" member MUST be present and contain the value JWE Shared Unprotected Header * when the JWE Shared Unprotected Header value is non-empty; otherwise, it MUST be absent. This * value is represented as an unencoded JSON object, rather than as a string. These Header * Parameter values are not integrity protected. */ unprotected?: JWEHeaderParameters } export interface GeneralJWE extends Omit<FlattenedJWE, 'encrypted_key' | 'header'> { recipients: Pick<FlattenedJWE, 'encrypted_key' | 'header'>[] } /** Recognized JWE Header Parameters, any other Header members may also be present. */ export interface JWEHeaderParameters extends JoseHeaderParameters { /** * JWE "alg" (Algorithm) Header Parameter * * @see {@link https://github.com/panva/jose/issues/210#jwe-alg Algorithm Key Requirements} */ alg?: string /** * JWE "enc" (Encryption Algorithm) Header Parameter * * @see {@link https://github.com/panva/jose/issues/210#jwe-alg Algorithm Key Requirements} */ enc?: string /** JWE "crit" (Critical) Header Parameter */ crit?: string[] /** * JWE "zip" (Compression Algorithm) Header Parameter. This parameter is not supported anymore. * * @deprecated Compression of data SHOULD NOT be done before encryption, because such compressed * data often reveals information about the plaintext. * * @see {@link https://www.rfc-editor.org/rfc/rfc8725#name-avoid-compression-of-encryp Avoid Compression of Encryption Inputs} */ zip?: string /** Any other JWE Header member. */ [propName: string]: unknown } /** Shared Interface with a "crit" property for all sign, verify, encrypt and decrypt operations. */ export interface CritOption { /** * An object with keys representing recognized "crit" (Critical) Header Parameter names. The value * for those is either `true` or `false`. `true` when the Header Parameter MUST be integrity * protected, `false` when it's irrelevant. * * This makes the "Extension Header Parameter "..." is not recognized" error go away. * * Use this when a given JWS/JWT/JWE profile requires the use of proprietary non-registered "crit" * (Critical) Header Parameters. This will only make sure the Header Parameter is syntactically * correct when provided and that it is optionally integrity protected. It will not process the * Header Parameter in any way or reject the operation if it is missing. You MUST still verify the * Header Parameter was present and process it according to the profile's validation steps after * the operation succeeds. * * The JWS extension Header Parameter `b64` is always recognized and processed properly. No other * registered Header Parameters that need this kind of default built-in treatment are currently * available. */ crit?: { [propName: string]: boolean } } /** JWE Decryption options. */ export interface DecryptOptions extends CritOption { /** * A list of accepted JWE "alg" (Algorithm) Header Parameter values. By default all "alg" * (Algorithm) Header Parameter values applicable for the used key/secret are allowed except for * all PBES2 Key Management Algorithms, these need to be explicitly allowed using this option. */ keyManagementAlgorithms?: string[] /** * A list of accepted JWE "enc" (Encryption Algorithm) Header Parameter values. By default all * "enc" (Encryption Algorithm) values applicable for the used key/secret are allowed. */ contentEncryptionAlgorithms?: string[] /** * (PBES2 Key Management Algorithms only) Maximum allowed "p2c" (PBES2 Count) Header Parameter * value. The PBKDF2 iteration count defines the algorithm's computational expense. By default * this value is set to 10000. */ maxPBES2Count?: number } /** JWE Encryption options. */ export interface EncryptOptions extends CritOption {} /** JWT Claims Set verification options. */ export interface JWTClaimVerificationOptions { /** * Expected JWT "aud" (Audience) Claim value(s). * * This option makes the JWT "aud" (Audience) Claim presence required. */ audience?: string | string[] /** * Clock skew tolerance * * - In seconds when number (e.g. 5) * - Resolved into a number of seconds when a string (e.g. "5 seconds", "10 minutes", "2 hours"). * * Used when validating the JWT "nbf" (Not Before) and "exp" (Expiration Time) claims, and when * validating the "iat" (Issued At) claim if the {@link maxTokenAge `maxTokenAge` option} is set. */ clockTolerance?: string | number /** * Expected JWT "iss" (Issuer) Claim value(s). * * This option makes the JWT "iss" (Issuer) Claim presence required. */ issuer?: string | string[] /** * Maximum time elapsed (in seconds) from the JWT "iat" (Issued At) Claim value. * * - In seconds when number (e.g. 5) * - Resolved into a number of seconds when a string (e.g. "5 seconds", "10 minutes", "2 hours"). * * This option makes the JWT "iat" (Issued At) Claim presence required. */ maxTokenAge?: string | number /** * Expected JWT "sub" (Subject) Claim value. * * This option makes the JWT "sub" (Subject) Claim presence required. */ subject?: string /** * Expected JWT "typ" (Type) Header Parameter value. * * This option makes the JWT "typ" (Type) Header Parameter presence required. */ typ?: string /** Date to use when comparing NumericDate claims, defaults to `new Date()`. */ currentDate?: Date /** * Array of required Claim Names that must be present in the JWT Claims Set. Default is that: if * the {@link issuer `issuer` option} is set, then JWT "iss" (Issuer) Claim must be present; if the * {@link audience `audience` option} is set, then JWT "aud" (Audience) Claim must be present; if * the {@link subject `subject` option} is set, then JWT "sub" (Subject) Claim must be present; if * the {@link maxTokenAge `maxTokenAge` option} is set, then JWT "iat" (Issued At) Claim must be * present. */ requiredClaims?: string[] } /** JWS Verification options. */ export interface VerifyOptions extends CritOption { /** * A list of accepted JWS "alg" (Algorithm) Header Parameter values. By default all "alg" * (Algorithm) values applicable for the used key/secret are allowed. * * Note: Unsecured JWTs (`{ "alg": "none" }`) are never accepted by this API. */ algorithms?: string[] } /** JWS Signing options. */ export interface SignOptions extends CritOption {} /** Recognized JWT Claims Set members, any other members may also be present. */ export interface JWTPayload { /** * JWT Issuer * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.1 RFC7519#section-4.1.1} */ iss?: string /** * JWT Subject * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.2 RFC7519#section-4.1.2} */ sub?: string /** * JWT Audience * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.3 RFC7519#section-4.1.3} */ aud?: string | string[] /** * JWT ID * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.7 RFC7519#section-4.1.7} */ jti?: string /** * JWT Not Before * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.5 RFC7519#section-4.1.5} */ nbf?: number /** * JWT Expiration Time * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.4 RFC7519#section-4.1.4} */ exp?: number /** * JWT Issued At * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.6 RFC7519#section-4.1.6} */ iat?: number /** Any other JWT Claim Set member. */ [propName: string]: unknown } export interface FlattenedDecryptResult { /** JWE AAD. */ additionalAuthenticatedData?: Uint8Array /** Plaintext. */ plaintext: Uint8Array /** JWE Protected Header. */ protectedHeader?: JWEHeaderParameters /** JWE Shared Unprotected Header. */ sharedUnprotectedHeader?: JWEHeaderParameters /** JWE Per-Recipient Unprotected Header. */ unprotectedHeader?: JWEHeaderParameters } export interface GeneralDecryptResult extends FlattenedDecryptResult {} export interface CompactDecryptResult { /** Plaintext. */ plaintext: Uint8Array /** JWE Protected Header. */ protectedHeader: CompactJWEHeaderParameters } export interface FlattenedVerifyResult { /** JWS Payload. */ payload: Uint8Array /** JWS Protected Header. */ protectedHeader?: JWSHeaderParameters /** JWS Unprotected Header. */ unprotectedHeader?: JWSHeaderParameters } export interface GeneralVerifyResult extends FlattenedVerifyResult {} export interface CompactVerifyResult { /** JWS Payload. */ payload: Uint8Array /** JWS Protected Header. */ protectedHeader: CompactJWSHeaderParameters } export interface JWTVerifyResult<PayloadType = JWTPayload> { /** JWT Claims Set. */ payload: PayloadType & JWTPayload /** JWS Protected Header. */ protectedHeader: JWTHeaderParameters } export interface JWTDecryptResult<PayloadType = JWTPayload> { /** JWT Claims Set. */ payload: PayloadType & JWTPayload /** JWE Protected Header. */ protectedHeader: CompactJWEHeaderParameters } export interface ResolvedKey<KeyLikeType extends KeyLike = KeyLike> { /** Key resolved from the key resolver function. */ key: KeyLikeType | Uint8Array } /** Recognized Compact JWS Header Parameters, any other Header Members may also be present. */ export interface CompactJWSHeaderParameters extends JWSHeaderParameters { alg: string } /** Recognized Signed JWT Header Parameters, any other Header Members may also be present. */ export interface JWTHeaderParameters extends CompactJWSHeaderParameters { b64?: true } /** Recognized Compact JWE Header Parameters, any other Header Members may also be present. */ export interface CompactJWEHeaderParameters extends JWEHeaderParameters { alg: string enc: string } /** JSON Web Key Set */ export interface JSONWebKeySet { keys: JWK[] } export type CryptoRuntime = 'WebCryptoAPI' | 'node:crypto'