aboutsummaryrefslogtreecommitdiffstats
path: root/backend/node_modules/jsonwebtoken/lib
diff options
context:
space:
mode:
Diffstat (limited to 'backend/node_modules/jsonwebtoken/lib')
-rw-r--r--backend/node_modules/jsonwebtoken/lib/JsonWebTokenError.js14
-rw-r--r--backend/node_modules/jsonwebtoken/lib/NotBeforeError.js13
-rw-r--r--backend/node_modules/jsonwebtoken/lib/TokenExpiredError.js13
-rw-r--r--backend/node_modules/jsonwebtoken/lib/asymmetricKeyDetailsSupported.js3
-rw-r--r--backend/node_modules/jsonwebtoken/lib/psSupported.js3
-rw-r--r--backend/node_modules/jsonwebtoken/lib/rsaPssKeyDetailsSupported.js3
-rw-r--r--backend/node_modules/jsonwebtoken/lib/timespan.js18
-rw-r--r--backend/node_modules/jsonwebtoken/lib/validateAsymmetricKey.js66
8 files changed, 0 insertions, 133 deletions
diff --git a/backend/node_modules/jsonwebtoken/lib/JsonWebTokenError.js b/backend/node_modules/jsonwebtoken/lib/JsonWebTokenError.js
deleted file mode 100644
index e068222..0000000
--- a/backend/node_modules/jsonwebtoken/lib/JsonWebTokenError.js
+++ /dev/null
@@ -1,14 +0,0 @@
-var JsonWebTokenError = function (message, error) {
- Error.call(this, message);
- if(Error.captureStackTrace) {
- Error.captureStackTrace(this, this.constructor);
- }
- this.name = 'JsonWebTokenError';
- this.message = message;
- if (error) this.inner = error;
-};
-
-JsonWebTokenError.prototype = Object.create(Error.prototype);
-JsonWebTokenError.prototype.constructor = JsonWebTokenError;
-
-module.exports = JsonWebTokenError;
diff --git a/backend/node_modules/jsonwebtoken/lib/NotBeforeError.js b/backend/node_modules/jsonwebtoken/lib/NotBeforeError.js
deleted file mode 100644
index 7b30084..0000000
--- a/backend/node_modules/jsonwebtoken/lib/NotBeforeError.js
+++ /dev/null
@@ -1,13 +0,0 @@
-var JsonWebTokenError = require('./JsonWebTokenError');
-
-var NotBeforeError = function (message, date) {
- JsonWebTokenError.call(this, message);
- this.name = 'NotBeforeError';
- this.date = date;
-};
-
-NotBeforeError.prototype = Object.create(JsonWebTokenError.prototype);
-
-NotBeforeError.prototype.constructor = NotBeforeError;
-
-module.exports = NotBeforeError; \ No newline at end of file
diff --git a/backend/node_modules/jsonwebtoken/lib/TokenExpiredError.js b/backend/node_modules/jsonwebtoken/lib/TokenExpiredError.js
deleted file mode 100644
index abb704f..0000000
--- a/backend/node_modules/jsonwebtoken/lib/TokenExpiredError.js
+++ /dev/null
@@ -1,13 +0,0 @@
-var JsonWebTokenError = require('./JsonWebTokenError');
-
-var TokenExpiredError = function (message, expiredAt) {
- JsonWebTokenError.call(this, message);
- this.name = 'TokenExpiredError';
- this.expiredAt = expiredAt;
-};
-
-TokenExpiredError.prototype = Object.create(JsonWebTokenError.prototype);
-
-TokenExpiredError.prototype.constructor = TokenExpiredError;
-
-module.exports = TokenExpiredError; \ No newline at end of file
diff --git a/backend/node_modules/jsonwebtoken/lib/asymmetricKeyDetailsSupported.js b/backend/node_modules/jsonwebtoken/lib/asymmetricKeyDetailsSupported.js
deleted file mode 100644
index a6ede56..0000000
--- a/backend/node_modules/jsonwebtoken/lib/asymmetricKeyDetailsSupported.js
+++ /dev/null
@@ -1,3 +0,0 @@
-const semver = require('semver');
-
-module.exports = semver.satisfies(process.version, '>=15.7.0');
diff --git a/backend/node_modules/jsonwebtoken/lib/psSupported.js b/backend/node_modules/jsonwebtoken/lib/psSupported.js
deleted file mode 100644
index 8c04144..0000000
--- a/backend/node_modules/jsonwebtoken/lib/psSupported.js
+++ /dev/null
@@ -1,3 +0,0 @@
-var semver = require('semver');
-
-module.exports = semver.satisfies(process.version, '^6.12.0 || >=8.0.0');
diff --git a/backend/node_modules/jsonwebtoken/lib/rsaPssKeyDetailsSupported.js b/backend/node_modules/jsonwebtoken/lib/rsaPssKeyDetailsSupported.js
deleted file mode 100644
index 7fcf368..0000000
--- a/backend/node_modules/jsonwebtoken/lib/rsaPssKeyDetailsSupported.js
+++ /dev/null
@@ -1,3 +0,0 @@
-const semver = require('semver');
-
-module.exports = semver.satisfies(process.version, '>=16.9.0');
diff --git a/backend/node_modules/jsonwebtoken/lib/timespan.js b/backend/node_modules/jsonwebtoken/lib/timespan.js
deleted file mode 100644
index e509869..0000000
--- a/backend/node_modules/jsonwebtoken/lib/timespan.js
+++ /dev/null
@@ -1,18 +0,0 @@
-var ms = require('ms');
-
-module.exports = function (time, iat) {
- var timestamp = iat || Math.floor(Date.now() / 1000);
-
- if (typeof time === 'string') {
- var milliseconds = ms(time);
- if (typeof milliseconds === 'undefined') {
- return;
- }
- return Math.floor(timestamp + milliseconds / 1000);
- } else if (typeof time === 'number') {
- return timestamp + time;
- } else {
- return;
- }
-
-}; \ No newline at end of file
diff --git a/backend/node_modules/jsonwebtoken/lib/validateAsymmetricKey.js b/backend/node_modules/jsonwebtoken/lib/validateAsymmetricKey.js
deleted file mode 100644
index c10340b..0000000
--- a/backend/node_modules/jsonwebtoken/lib/validateAsymmetricKey.js
+++ /dev/null
@@ -1,66 +0,0 @@
-const ASYMMETRIC_KEY_DETAILS_SUPPORTED = require('./asymmetricKeyDetailsSupported');
-const RSA_PSS_KEY_DETAILS_SUPPORTED = require('./rsaPssKeyDetailsSupported');
-
-const allowedAlgorithmsForKeys = {
- 'ec': ['ES256', 'ES384', 'ES512'],
- 'rsa': ['RS256', 'PS256', 'RS384', 'PS384', 'RS512', 'PS512'],
- 'rsa-pss': ['PS256', 'PS384', 'PS512']
-};
-
-const allowedCurves = {
- ES256: 'prime256v1',
- ES384: 'secp384r1',
- ES512: 'secp521r1',
-};
-
-module.exports = function(algorithm, key) {
- if (!algorithm || !key) return;
-
- const keyType = key.asymmetricKeyType;
- if (!keyType) return;
-
- const allowedAlgorithms = allowedAlgorithmsForKeys[keyType];
-
- if (!allowedAlgorithms) {
- throw new Error(`Unknown key type "${keyType}".`);
- }
-
- if (!allowedAlgorithms.includes(algorithm)) {
- throw new Error(`"alg" parameter for "${keyType}" key type must be one of: ${allowedAlgorithms.join(', ')}.`)
- }
-
- /*
- * Ignore the next block from test coverage because it gets executed
- * conditionally depending on the Node version. Not ignoring it would
- * prevent us from reaching the target % of coverage for versions of
- * Node under 15.7.0.
- */
- /* istanbul ignore next */
- if (ASYMMETRIC_KEY_DETAILS_SUPPORTED) {
- switch (keyType) {
- case 'ec':
- const keyCurve = key.asymmetricKeyDetails.namedCurve;
- const allowedCurve = allowedCurves[algorithm];
-
- if (keyCurve !== allowedCurve) {
- throw new Error(`"alg" parameter "${algorithm}" requires curve "${allowedCurve}".`);
- }
- break;
-
- case 'rsa-pss':
- if (RSA_PSS_KEY_DETAILS_SUPPORTED) {
- const length = parseInt(algorithm.slice(-3), 10);
- const { hashAlgorithm, mgf1HashAlgorithm, saltLength } = key.asymmetricKeyDetails;
-
- if (hashAlgorithm !== `sha${length}` || mgf1HashAlgorithm !== hashAlgorithm) {
- throw new Error(`Invalid key for this operation, its RSA-PSS parameters do not meet the requirements of "alg" ${algorithm}.`);
- }
-
- if (saltLength !== undefined && saltLength > length >> 3) {
- throw new Error(`Invalid key for this operation, its RSA-PSS parameter saltLength does not meet the requirements of "alg" ${algorithm}.`)
- }
- }
- break;
- }
- }
-}