Skip to main content
Module

x/jose/types.d.ts

"JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes.
Extremely Popular
Go to Latest
File
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597
/** * KeyLike are runtime-specific classes representing asymmetric keys or symmetric secrets. These are * instances of {@link https://developer.mozilla.org/en-US/docs/Web/API/CryptoKey CryptoKey} and * additionally {@link https://nodejs.org/api/crypto.html#class-keyobject KeyObject} in Node.js * runtime. * {@link https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Uint8Array Uint8Array} * instances are also accepted as symmetric secret representation only. * * [Key Import Functions](../modules/key_import.md) can be used to import PEM, or JWK formatted * asymmetric keys and certificates to these runtime-specific representations. * * In Node.js the {@link https://nodejs.org/api/buffer.html#buffer Buffer} class is a subclass of * Uint8Array and so Buffer can be provided for symmetric secrets as well. * * {@link https://nodejs.org/api/crypto.html#class-keyobject KeyObject} is a representation of a * key/secret available in the Node.js runtime. In addition to the import functions of this library * you may use the runtime APIs * {@link https://nodejs.org/api/crypto.html#cryptocreatepublickeykey crypto.createPublicKey}, * {@link https://nodejs.org/api/crypto.html#cryptocreateprivatekeykey crypto.createPrivateKey}, and * {@link https://nodejs.org/api/crypto.html#cryptocreatesecretkeykey-encoding crypto.createSecretKey} * to obtain a `KeyObject` from your existing key material. * * {@link https://developer.mozilla.org/en-US/docs/Web/API/CryptoKey CryptoKey} is a representation * of a key/secret available in the Browser and Web-interoperable runtimes. In addition to the * import functions of this library you may use the * {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/importKey SubtleCrypto.importKey} * API to obtain a CryptoKey from your existing key material. * */export type KeyLike = { type: string }
/** * JSON Web Key ({@link https://www.rfc-editor.org/rfc/rfc7517 JWK}). "RSA", "EC", "OKP", and "oct" * key types are supported. */export interface JWK { /** JWK "alg" (Algorithm) Parameter. */ alg?: string crv?: string d?: string dp?: string dq?: string e?: string /** JWK "ext" (Extractable) Parameter. */ ext?: boolean k?: string /** JWK "key_ops" (Key Operations) Parameter. */ key_ops?: string[] /** JWK "kid" (Key ID) Parameter. */ kid?: string /** JWK "kty" (Key Type) Parameter. */ kty?: string n?: string oth?: Array<{ d?: string r?: string t?: string }> p?: string q?: string qi?: string /** JWK "use" (Public Key Use) Parameter. */ use?: string x?: string y?: string /** JWK "x5c" (X.509 Certificate Chain) Parameter. */ x5c?: string[] /** JWK "x5t" (X.509 Certificate SHA-1 Thumbprint) Parameter. */ x5t?: string /** "x5t#S256" (X.509 Certificate SHA-256 Thumbprint) Parameter. */ 'x5t#S256'?: string /** JWK "x5u" (X.509 URL) Parameter. */ x5u?: string
[propName: string]: unknown}
/** * Generic Interface for consuming operations dynamic key resolution. No token components have been * verified at the time of this function call. * * If you cannot match a key suitable for the token, throw an error instead. * * @param protectedHeader JWE or JWS Protected Header. * @param token The consumed JWE or JWS token. */export interface GetKeyFunction<T, T2> { (protectedHeader: T, token: T2): Promise<KeyLike | Uint8Array> | KeyLike | Uint8Array}
/** * Flattened JWS definition for verify function inputs, allows payload as Uint8Array for detached * signature validation. */export interface FlattenedJWSInput { /** * The "header" member MUST be present and contain the value JWS Unprotected Header when the JWS * Unprotected Header value is non- empty; otherwise, it MUST be absent. This value is represented * as an unencoded JSON object, rather than as a string. These Header Parameter values are not * integrity protected. */ header?: JWSHeaderParameters
/** * The "payload" member MUST be present and contain the value BASE64URL(JWS Payload). When RFC7797 * "b64": false is used the value passed may also be a Uint8Array. */ payload: string | Uint8Array
/** * The "protected" member MUST be present and contain the value BASE64URL(UTF8(JWS Protected * Header)) when the JWS Protected Header value is non-empty; otherwise, it MUST be absent. These * Header Parameter values are integrity protected. */ protected?: string
/** The "signature" member MUST be present and contain the value BASE64URL(JWS Signature). */ signature: string}
/** * General JWS definition for verify function inputs, allows payload as Uint8Array for detached * signature validation. */export interface GeneralJWSInput { /** * The "payload" member MUST be present and contain the value BASE64URL(JWS Payload). When when * JWS Unencoded Payload ({@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}) "b64": false is * used the value passed may also be a Uint8Array. */ payload: string | Uint8Array
/** * The "signatures" member value MUST be an array of JSON objects. Each object represents a * signature or MAC over the JWS Payload and the JWS Protected Header. */ signatures: Omit<FlattenedJWSInput, 'payload'>[]}
/** * Flattened JWS definition. Payload is returned as an empty string when JWS Unencoded Payload * ({@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}) is used. */export interface FlattenedJWS extends Partial<FlattenedJWSInput> { payload: string signature: string}
/** * General JWS definition. Payload is returned as an empty string when JWS Unencoded Payload * ({@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}) is used. */export interface GeneralJWS { payload: string signatures: Omit<FlattenedJWSInput, 'payload'>[]}
export interface JoseHeaderParameters { /** "kid" (Key ID) Header Parameter. */ kid?: string
/** "x5t" (X.509 Certificate SHA-1 Thumbprint) Header Parameter. */ x5t?: string
/** "x5c" (X.509 Certificate Chain) Header Parameter. */ x5c?: string[]
/** "x5u" (X.509 URL) Header Parameter. */ x5u?: string
/** "jku" (JWK Set URL) Header Parameter. */ jku?: string
/** "jwk" (JSON Web Key) Header Parameter. */ jwk?: Pick<JWK, 'kty' | 'crv' | 'x' | 'y' | 'e' | 'n'>
/** "typ" (Type) Header Parameter. */ typ?: string
/** "cty" (Content Type) Header Parameter. */ cty?: string}
/** Recognized JWS Header Parameters, any other Header Members may also be present. */export interface JWSHeaderParameters extends JoseHeaderParameters { /** JWS "alg" (Algorithm) Header Parameter. */ alg?: string
/** * This JWS Extension Header Parameter modifies the JWS Payload representation and the JWS Signing * Input computation as per {@link https://www.rfc-editor.org/rfc/rfc7797 RFC7797}. */ b64?: boolean
/** JWS "crit" (Critical) Header Parameter. */ crit?: string[]
/** Any other JWS Header member. */ [propName: string]: unknown}
/** Recognized JWE Key Management-related Header Parameters. */export interface JWEKeyManagementHeaderParameters { apu?: Uint8Array apv?: Uint8Array /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ p2c?: number /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ p2s?: Uint8Array /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ iv?: Uint8Array /** * @deprecated You should not use this parameter. It is only really intended for test and vector * validation purposes. */ epk?: KeyLike}
/** Flattened JWE definition. */export interface FlattenedJWE { /** * The "aad" member MUST be present and contain the value BASE64URL(JWE AAD)) when the JWE AAD * value is non-empty; otherwise, it MUST be absent. A JWE AAD value can be included to supply a * base64url-encoded value to be integrity protected but not encrypted. */ aad?: string
/** The "ciphertext" member MUST be present and contain the value BASE64URL(JWE Ciphertext). */ ciphertext: string
/** * The "encrypted_key" member MUST be present and contain the value BASE64URL(JWE Encrypted Key) * when the JWE Encrypted Key value is non-empty; otherwise, it MUST be absent. */ encrypted_key?: string
/** * The "header" member MUST be present and contain the value JWE Per- Recipient Unprotected Header * when the JWE Per-Recipient Unprotected Header value is non-empty; otherwise, it MUST be absent. * This value is represented as an unencoded JSON object, rather than as a string. These Header * Parameter values are not integrity protected. */ header?: JWEHeaderParameters
/** * The "iv" member MUST be present and contain the value BASE64URL(JWE Initialization Vector) when * the JWE Initialization Vector value is non-empty; otherwise, it MUST be absent. */ iv: string
/** * The "protected" member MUST be present and contain the value BASE64URL(UTF8(JWE Protected * Header)) when the JWE Protected Header value is non-empty; otherwise, it MUST be absent. These * Header Parameter values are integrity protected. */ protected?: string
/** * The "tag" member MUST be present and contain the value BASE64URL(JWE Authentication Tag) when * the JWE Authentication Tag value is non-empty; otherwise, it MUST be absent. */ tag: string
/** * The "unprotected" member MUST be present and contain the value JWE Shared Unprotected Header * when the JWE Shared Unprotected Header value is non-empty; otherwise, it MUST be absent. This * value is represented as an unencoded JSON object, rather than as a string. These Header * Parameter values are not integrity protected. */ unprotected?: JWEHeaderParameters}
export interface GeneralJWE extends Omit<FlattenedJWE, 'encrypted_key' | 'header'> { recipients: Pick<FlattenedJWE, 'encrypted_key' | 'header'>[]}
/** Recognized JWE Header Parameters, any other Header members may also be present. */export interface JWEHeaderParameters extends JoseHeaderParameters { /** JWE "alg" (Algorithm) Header Parameter. */ alg?: string
/** JWE "enc" (Encryption Algorithm) Header Parameter. */ enc?: string
/** JWE "crit" (Critical) Header Parameter. */ crit?: string[]
/** * JWE "zip" (Compression Algorithm) Header Parameter. * * @deprecated Compression of data SHOULD NOT be done before encryption, because such compressed * data often reveals information about the plaintext. * @see {@link https://www.rfc-editor.org/rfc/rfc8725#name-avoid-compression-of-encryp Avoid Compression of Encryption Inputs} */ zip?: string
/** Any other JWE Header member. */ [propName: string]: unknown}
/** Shared Interface with a "crit" property for all sign, verify, encrypt and decrypt operations. */export interface CritOption { /** * An object with keys representing recognized "crit" (Critical) Header Parameter names. The value * for those is either `true` or `false`. `true` when the Header Parameter MUST be integrity * protected, `false` when it's irrelevant. * * This makes the "Extension Header Parameter "..." is not recognized" error go away. * * Use this when a given JWS/JWT/JWE profile requires the use of proprietary non-registered "crit" * (Critical) Header Parameters. This will only make sure the Header Parameter is syntactically * correct when provided and that it is optionally integrity protected. It will not process the * Header Parameter in any way or reject the operation if it is missing. You MUST still verify the * Header Parameter was present and process it according to the profile's validation steps after * the operation succeeds. * * The JWS extension Header Parameter `b64` is always recognized and processed properly. No other * registered Header Parameters that need this kind of default built-in treatment are currently * available. */ crit?: { [propName: string]: boolean }}
/** JWE Decryption options. */export interface DecryptOptions extends CritOption { /** A list of accepted JWE "alg" (Algorithm) Header Parameter values. */ keyManagementAlgorithms?: string[]
/** * A list of accepted JWE "enc" (Encryption Algorithm) Header Parameter values. By default all * "enc" (Encryption Algorithm) values applicable for the used key/secret are allowed. */ contentEncryptionAlgorithms?: string[]
/** * In a browser runtime you have to provide an implementation for Inflate Raw when you expect JWEs * with compressed plaintext. */ inflateRaw?: InflateFunction
/** * (PBES2 Key Management Algorithms only) Maximum allowed "p2c" (PBES2 Count) Header Parameter * value. The PBKDF2 iteration count defines the algorithm's computational expense. By default * this value is set to 10000. */ maxPBES2Count?: number}
/** JWE Deflate option. */export interface DeflateOption { /** * In a browser runtime you have to provide an implementation for Deflate Raw when you will be * producing JWEs with compressed plaintext. */ deflateRaw?: DeflateFunction}
/** JWE Encryption options. */export interface EncryptOptions extends CritOption, DeflateOption {}
/** JWT Claims Set verification options. */export interface JWTClaimVerificationOptions { /** Expected JWT "aud" (Audience) Claim value(s). */ audience?: string | string[]
/** * Expected clock tolerance * * - In seconds when number (e.g. 5) * - Parsed as seconds when a string (e.g. "5 seconds", "10 minutes", "2 hours"). */ clockTolerance?: string | number
/** Expected JWT "iss" (Issuer) Claim value(s). */ issuer?: string | string[]
/** * Maximum time elapsed (in seconds) from the JWT "iat" (Issued At) Claim value. * * - In seconds when number (e.g. 5) * - Parsed as seconds when a string (e.g. "5 seconds", "10 minutes", "2 hours"). */ maxTokenAge?: string | number
/** Expected JWT "sub" (Subject) Claim value. */ subject?: string
/** Expected JWT "typ" (Type) Header Parameter value. */ typ?: string
/** Date to use when comparing NumericDate claims, defaults to `new Date()`. */ currentDate?: Date
/** * Array of required Claim Names that must be present in the JWT Claims Set. Default is that: if * the {@link JWTClaimVerificationOptions.issuer issuer option} is set, then "iss" must be present; * if the {@link JWTClaimVerificationOptions.audience audience option} is set, then "aud" must be * present; if the {@link JWTClaimVerificationOptions.subject subject option} is set, then "sub" * must be present; if the {@link JWTClaimVerificationOptions.maxTokenAge maxTokenAge option} is * set, then "iat" must be present. */ requiredClaims?: string[]}
/** JWS Verification options. */export interface VerifyOptions extends CritOption { /** * A list of accepted JWS "alg" (Algorithm) Header Parameter values. By default all "alg" * (Algorithm) values applicable for the used key/secret are allowed. Note: "none" is never * accepted. */ algorithms?: string[]}
/** JWS Signing options. */export interface SignOptions extends CritOption {}
/** Recognized JWT Claims Set members, any other members may also be present. */export interface JWTPayload { /** * JWT Issuer * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.1 RFC7519#section-4.1.1} */ iss?: string
/** * JWT Subject * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.2 RFC7519#section-4.1.2} */ sub?: string
/** * JWT Audience * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.3 RFC7519#section-4.1.3} */ aud?: string | string[]
/** * JWT ID * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.7 RFC7519#section-4.1.7} */ jti?: string
/** * JWT Not Before * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.5 RFC7519#section-4.1.5} */ nbf?: number
/** * JWT Expiration Time * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.4 RFC7519#section-4.1.4} */ exp?: number
/** * JWT Issued At * * @see {@link https://www.rfc-editor.org/rfc/rfc7519#section-4.1.6 RFC7519#section-4.1.6} */ iat?: number
/** Any other JWT Claim Set member. */ [propName: string]: unknown}
/** * Deflate Raw implementation, e.g. promisified * {@link https://nodejs.org/api/zlib.html#zlibdeflaterawbuffer-options-callback zlib.deflateRaw}. * * @deprecated Compression of data SHOULD NOT be done before encryption, because such compressed * data often reveals information about the plaintext. * @see {@link https://www.rfc-editor.org/rfc/rfc8725#name-avoid-compression-of-encryp Avoid Compression of Encryption Inputs} */export interface DeflateFunction { (input: Uint8Array): Promise<Uint8Array>}
/** * Inflate Raw implementation, e.g. promisified * {@link https://nodejs.org/api/zlib.html#zlibinflaterawbuffer-options-callback zlib.inflateRaw}. * * @deprecated Compression of data SHOULD NOT be done before encryption, because such compressed * data often reveals information about the plaintext. * @see {@link https://www.rfc-editor.org/rfc/rfc8725#name-avoid-compression-of-encryp Avoid Compression of Encryption Inputs} */export interface InflateFunction { (input: Uint8Array): Promise<Uint8Array>}
export interface FlattenedDecryptResult { /** JWE AAD. */ additionalAuthenticatedData?: Uint8Array
/** Plaintext. */ plaintext: Uint8Array
/** JWE Protected Header. */ protectedHeader?: JWEHeaderParameters
/** JWE Shared Unprotected Header. */ sharedUnprotectedHeader?: JWEHeaderParameters
/** JWE Per-Recipient Unprotected Header. */ unprotectedHeader?: JWEHeaderParameters}
export interface GeneralDecryptResult extends FlattenedDecryptResult {}
export interface CompactDecryptResult { /** Plaintext. */ plaintext: Uint8Array
/** JWE Protected Header. */ protectedHeader: CompactJWEHeaderParameters}
export interface FlattenedVerifyResult { /** JWS Payload. */ payload: Uint8Array
/** JWS Protected Header. */ protectedHeader?: JWSHeaderParameters
/** JWS Unprotected Header. */ unprotectedHeader?: JWSHeaderParameters}
export interface GeneralVerifyResult extends FlattenedVerifyResult {}
export interface CompactVerifyResult { /** JWS Payload. */ payload: Uint8Array
/** JWS Protected Header. */ protectedHeader: CompactJWSHeaderParameters}
export interface JWTVerifyResult { /** JWT Claims Set. */ payload: JWTPayload
/** JWS Protected Header. */ protectedHeader: JWTHeaderParameters}
export interface JWTDecryptResult { /** JWT Claims Set. */ payload: JWTPayload
/** JWE Protected Header. */ protectedHeader: CompactJWEHeaderParameters}
export interface ResolvedKey<T extends KeyLike = KeyLike> { /** Key resolved from the key resolver function. */ key: T | Uint8Array}
/** Recognized Compact JWS Header Parameters, any other Header Members may also be present. */export interface CompactJWSHeaderParameters extends JWSHeaderParameters { alg: string}
/** Recognized Signed JWT Header Parameters, any other Header Members may also be present. */export interface JWTHeaderParameters extends CompactJWSHeaderParameters { b64?: true}
/** Recognized Compact JWE Header Parameters, any other Header Members may also be present. */export interface CompactJWEHeaderParameters extends JWEHeaderParameters { alg: string enc: string}
/** JSON Web Key Set */export interface JSONWebKeySet { keys: JWK[]}