Skip to content

Commit c4dc24d

Browse files
committed
refactor: use as Type for type assertions instead of <Type>
1 parent e932007 commit c4dc24d

34 files changed

+78
-70
lines changed

src/jwe/compact/decrypt.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ export async function compactDecrypt(
9090
tag: tag || undefined,
9191
encrypted_key: encryptedKey || undefined,
9292
},
93-
<Parameters<typeof flattenedDecrypt>[1]>key,
93+
key as Parameters<typeof flattenedDecrypt>[1],
9494
options,
9595
)
9696

src/jwe/general/decrypt.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ export async function generalDecrypt(
101101
tag: jwe.tag,
102102
unprotected: jwe.unprotected,
103103
},
104-
<Parameters<typeof flattenedDecrypt>[1]>key,
104+
key as Parameters<typeof flattenedDecrypt>[1],
105105
options,
106106
)
107107
} catch {

src/jwe/general/encrypt.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,6 @@ export class GeneralEncrypt {
291291
target.header = { ...recipient.unprotectedHeader, ...parameters }
292292
}
293293

294-
return <GeneralJWE>jwe
294+
return jwe as GeneralJWE
295295
}
296296
}

src/jwks/remote.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -240,10 +240,10 @@ class RemoteJWKSet<KeyLikeType extends KeyLike = KeyLike> {
240240

241241
this._pendingFetch ||= fetchJwks(this._url, this._timeoutDuration, this._options)
242242
.then((json) => {
243-
this._local = createLocalJWKSet(<JSONWebKeySet>(<unknown>json))
243+
this._local = createLocalJWKSet(json as unknown as JSONWebKeySet)
244244
if (this._cache) {
245245
this._cache.uat = Date.now()
246-
this._cache.jwks = <JSONWebKeySet>(<unknown>json)
246+
this._cache.jwks = json as unknown as JSONWebKeySet
247247
}
248248
this._jwksTimestamp = Date.now()
249249
this._pendingFetch = undefined

src/jws/compact/verify.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ export async function compactVerify(
8484

8585
const verified = await flattenedVerify(
8686
{ payload, protected: protectedHeader, signature },
87-
<Parameters<typeof flattenedVerify>[1]>key,
87+
key as Parameters<typeof flattenedVerify>[1],
8888
options,
8989
)
9090

src/jws/general/verify.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ export async function generalVerify(
9595
protected: signature.protected,
9696
signature: signature.signature,
9797
},
98-
<Parameters<typeof flattenedVerify>[1]>key,
98+
key as Parameters<typeof flattenedVerify>[1],
9999
options,
100100
)
101101
} catch {

src/jwt/decrypt.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ export async function jwtDecrypt(
7272
key: KeyLike | Uint8Array | JWTDecryptGetKey,
7373
options?: JWTDecryptOptions,
7474
) {
75-
const decrypted = await compactDecrypt(jwt, <Parameters<typeof compactDecrypt>[1]>key, options)
75+
const decrypted = await compactDecrypt(jwt, key as Parameters<typeof compactDecrypt>[1], options)
7676
const payload = jwtPayload(decrypted.protectedHeader, decrypted.plaintext, options)
7777

7878
const { protectedHeader } = decrypted

src/jwt/verify.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ export async function jwtVerify(
152152
key: KeyLike | Uint8Array | JWK | JWTVerifyGetKey,
153153
options?: JWTVerifyOptions,
154154
) {
155-
const verified = await compactVerify(jwt, <Parameters<typeof compactVerify>[1]>key, options)
155+
const verified = await compactVerify(jwt, key as Parameters<typeof compactVerify>[1], options)
156156
if (verified.protectedHeader.crit?.includes('b64') && verified.protectedHeader.b64 === false) {
157157
throw new JWTInvalid('JWTs MUST NOT use unencoded payload')
158158
}

src/lib/check_key_type.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,14 +80,14 @@ const asymmetricTypeCheck = (alg: string, key: unknown, usage: Usage, allowJwk:
8080
}
8181

8282
// KeyObject allows this but CryptoKey does not.
83-
if ((<CryptoKey>key).algorithm && usage === 'verify' && key.type === 'private') {
83+
if ((key as CryptoKey).algorithm && usage === 'verify' && key.type === 'private') {
8484
throw new TypeError(
8585
`${tag(key)} instances for asymmetric algorithm verifying must be of type "public"`,
8686
)
8787
}
8888

8989
// KeyObject allows this but CryptoKey does not.
90-
if ((<CryptoKey>key).algorithm && usage === 'encrypt' && key.type === 'private') {
90+
if ((key as CryptoKey).algorithm && usage === 'encrypt' && key.type === 'private') {
9191
throw new TypeError(
9292
`${tag(key)} instances for asymmetric algorithm encryption must be of type "public"`,
9393
)

src/lib/is_disjoint.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
const isDisjoint = (...headers: Array<object | undefined>) => {
2-
const sources = <object[]>headers.filter(Boolean)
2+
const sources = headers.filter(Boolean) as object[]
33

44
if (sources.length === 0 || sources.length === 1) {
55
return true

0 commit comments

Comments
 (0)