@atproto/pds 0.4.102 → 0.4.104
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +22 -0
- package/dist/api/com/atproto/admin/sendEmail.d.ts.map +1 -1
- package/dist/api/com/atproto/admin/sendEmail.js +2 -7
- package/dist/api/com/atproto/admin/sendEmail.js.map +1 -1
- package/dist/api/com/atproto/admin/updateAccountEmail.d.ts.map +1 -1
- package/dist/api/com/atproto/admin/updateAccountEmail.js +1 -2
- package/dist/api/com/atproto/admin/updateAccountEmail.js.map +1 -1
- package/dist/api/com/atproto/admin/updateAccountPassword.d.ts.map +1 -1
- package/dist/api/com/atproto/admin/updateAccountPassword.js +1 -2
- package/dist/api/com/atproto/admin/updateAccountPassword.js.map +1 -1
- package/dist/api/com/atproto/identity/requestPlcOperationSignature.d.ts.map +1 -1
- package/dist/api/com/atproto/identity/requestPlcOperationSignature.js +2 -7
- package/dist/api/com/atproto/identity/requestPlcOperationSignature.js.map +1 -1
- package/dist/api/com/atproto/identity/signPlcOperation.d.ts.map +1 -1
- package/dist/api/com/atproto/identity/signPlcOperation.js +2 -7
- package/dist/api/com/atproto/identity/signPlcOperation.js.map +1 -1
- package/dist/api/com/atproto/identity/updateHandle.d.ts.map +1 -1
- package/dist/api/com/atproto/identity/updateHandle.js +2 -7
- package/dist/api/com/atproto/identity/updateHandle.js.map +1 -1
- package/dist/api/com/atproto/repo/applyWrites.d.ts.map +1 -1
- package/dist/api/com/atproto/repo/applyWrites.js +12 -7
- package/dist/api/com/atproto/repo/applyWrites.js.map +1 -1
- package/dist/api/com/atproto/repo/createRecord.d.ts.map +1 -1
- package/dist/api/com/atproto/repo/createRecord.js +12 -8
- package/dist/api/com/atproto/repo/createRecord.js.map +1 -1
- package/dist/api/com/atproto/repo/deleteRecord.d.ts.map +1 -1
- package/dist/api/com/atproto/repo/deleteRecord.js +12 -7
- package/dist/api/com/atproto/repo/deleteRecord.js.map +1 -1
- package/dist/api/com/atproto/repo/listRecords.d.ts.map +1 -1
- package/dist/api/com/atproto/repo/listRecords.js +1 -3
- package/dist/api/com/atproto/repo/listRecords.js.map +1 -1
- package/dist/api/com/atproto/repo/putRecord.d.ts.map +1 -1
- package/dist/api/com/atproto/repo/putRecord.js +11 -8
- package/dist/api/com/atproto/repo/putRecord.js.map +1 -1
- package/dist/api/com/atproto/server/activateAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/activateAccount.js +1 -2
- package/dist/api/com/atproto/server/activateAccount.js.map +1 -1
- package/dist/api/com/atproto/server/confirmEmail.d.ts.map +1 -1
- package/dist/api/com/atproto/server/confirmEmail.js +2 -7
- package/dist/api/com/atproto/server/confirmEmail.js.map +1 -1
- package/dist/api/com/atproto/server/createAppPassword.d.ts.map +1 -1
- package/dist/api/com/atproto/server/createAppPassword.js +2 -7
- package/dist/api/com/atproto/server/createAppPassword.js.map +1 -1
- package/dist/api/com/atproto/server/createSession.js +1 -1
- package/dist/api/com/atproto/server/createSession.js.map +1 -1
- package/dist/api/com/atproto/server/deactivateAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/deactivateAccount.js +1 -2
- package/dist/api/com/atproto/server/deactivateAccount.js.map +1 -1
- package/dist/api/com/atproto/server/deleteAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/deleteAccount.js +1 -2
- package/dist/api/com/atproto/server/deleteAccount.js.map +1 -1
- package/dist/api/com/atproto/server/deleteSession.d.ts.map +1 -1
- package/dist/api/com/atproto/server/deleteSession.js +2 -3
- package/dist/api/com/atproto/server/deleteSession.js.map +1 -1
- package/dist/api/com/atproto/server/getAccountInviteCodes.d.ts.map +1 -1
- package/dist/api/com/atproto/server/getAccountInviteCodes.js +2 -7
- package/dist/api/com/atproto/server/getAccountInviteCodes.js.map +1 -1
- package/dist/api/com/atproto/server/getSession.js +1 -1
- package/dist/api/com/atproto/server/getSession.js.map +1 -1
- package/dist/api/com/atproto/server/listAppPasswords.d.ts.map +1 -1
- package/dist/api/com/atproto/server/listAppPasswords.js +2 -7
- package/dist/api/com/atproto/server/listAppPasswords.js.map +1 -1
- package/dist/api/com/atproto/server/refreshSession.js +1 -1
- package/dist/api/com/atproto/server/refreshSession.js.map +1 -1
- package/dist/api/com/atproto/server/requestAccountDelete.d.ts.map +1 -1
- package/dist/api/com/atproto/server/requestAccountDelete.js +2 -7
- package/dist/api/com/atproto/server/requestAccountDelete.js.map +1 -1
- package/dist/api/com/atproto/server/requestEmailConfirmation.d.ts.map +1 -1
- package/dist/api/com/atproto/server/requestEmailConfirmation.js +2 -7
- package/dist/api/com/atproto/server/requestEmailConfirmation.js.map +1 -1
- package/dist/api/com/atproto/server/requestEmailUpdate.d.ts.map +1 -1
- package/dist/api/com/atproto/server/requestEmailUpdate.js +2 -7
- package/dist/api/com/atproto/server/requestEmailUpdate.js.map +1 -1
- package/dist/api/com/atproto/server/requestPasswordReset.d.ts.map +1 -1
- package/dist/api/com/atproto/server/requestPasswordReset.js +1 -2
- package/dist/api/com/atproto/server/requestPasswordReset.js.map +1 -1
- package/dist/api/com/atproto/server/resetPassword.d.ts.map +1 -1
- package/dist/api/com/atproto/server/resetPassword.js +1 -2
- package/dist/api/com/atproto/server/resetPassword.js.map +1 -1
- package/dist/api/com/atproto/server/revokeAppPassword.d.ts.map +1 -1
- package/dist/api/com/atproto/server/revokeAppPassword.js +2 -7
- package/dist/api/com/atproto/server/revokeAppPassword.js.map +1 -1
- package/dist/api/com/atproto/server/updateEmail.d.ts.map +1 -1
- package/dist/api/com/atproto/server/updateEmail.js +2 -7
- package/dist/api/com/atproto/server/updateEmail.js.map +1 -1
- package/dist/api/com/atproto/sync/getRecord.d.ts.map +1 -1
- package/dist/api/com/atproto/sync/getRecord.js +1 -4
- package/dist/api/com/atproto/sync/getRecord.js.map +1 -1
- package/dist/api/com/atproto/temp/checkSignupQueue.js +1 -1
- package/dist/api/com/atproto/temp/checkSignupQueue.js.map +1 -1
- package/dist/api/proxy.d.ts +7 -8
- package/dist/api/proxy.d.ts.map +1 -1
- package/dist/api/proxy.js +14 -6
- package/dist/api/proxy.js.map +1 -1
- package/dist/context.d.ts +7 -0
- package/dist/context.d.ts.map +1 -1
- package/dist/context.js +12 -0
- package/dist/context.js.map +1 -1
- package/dist/index.js +1 -1
- package/dist/index.js.map +1 -1
- package/dist/lexicon/lexicons.d.ts +108 -28
- package/dist/lexicon/lexicons.d.ts.map +1 -1
- package/dist/lexicon/lexicons.js +54 -14
- package/dist/lexicon/lexicons.js.map +1 -1
- package/dist/lexicon/types/app/bsky/labeler/defs.d.ts +7 -0
- package/dist/lexicon/types/app/bsky/labeler/defs.d.ts.map +1 -1
- package/dist/lexicon/types/app/bsky/labeler/defs.js.map +1 -1
- package/dist/lexicon/types/app/bsky/labeler/service.d.ts +7 -0
- package/dist/lexicon/types/app/bsky/labeler/service.d.ts.map +1 -1
- package/dist/lexicon/types/app/bsky/labeler/service.js.map +1 -1
- package/dist/lexicon/types/com/atproto/moderation/defs.d.ts +2 -0
- package/dist/lexicon/types/com/atproto/moderation/defs.d.ts.map +1 -1
- package/dist/lexicon/types/com/atproto/repo/listRecords.d.ts +0 -4
- package/dist/lexicon/types/com/atproto/repo/listRecords.d.ts.map +1 -1
- package/dist/lexicon/types/com/atproto/repo/listRecords.js.map +1 -1
- package/dist/lexicon/types/com/atproto/sync/getRecord.d.ts +0 -2
- package/dist/lexicon/types/com/atproto/sync/getRecord.d.ts.map +1 -1
- package/dist/oauth/provider.d.ts +2 -2
- package/dist/oauth/provider.d.ts.map +1 -1
- package/dist/oauth/provider.js +2 -1
- package/dist/oauth/provider.js.map +1 -1
- package/package.json +5 -5
- package/src/api/com/atproto/admin/sendEmail.ts +3 -5
- package/src/api/com/atproto/admin/updateAccountEmail.ts +1 -2
- package/src/api/com/atproto/admin/updateAccountPassword.ts +1 -2
- package/src/api/com/atproto/identity/requestPlcOperationSignature.ts +3 -5
- package/src/api/com/atproto/identity/signPlcOperation.ts +3 -5
- package/src/api/com/atproto/identity/updateHandle.ts +3 -6
- package/src/api/com/atproto/repo/applyWrites.ts +21 -11
- package/src/api/com/atproto/repo/createRecord.ts +19 -14
- package/src/api/com/atproto/repo/deleteRecord.ts +26 -14
- package/src/api/com/atproto/repo/listRecords.ts +1 -11
- package/src/api/com/atproto/repo/putRecord.ts +24 -16
- package/src/api/com/atproto/server/activateAccount.ts +1 -2
- package/src/api/com/atproto/server/confirmEmail.ts +3 -5
- package/src/api/com/atproto/server/createAppPassword.ts +3 -6
- package/src/api/com/atproto/server/createSession.ts +2 -2
- package/src/api/com/atproto/server/deactivateAccount.ts +1 -2
- package/src/api/com/atproto/server/deleteAccount.ts +1 -2
- package/src/api/com/atproto/server/deleteSession.ts +2 -3
- package/src/api/com/atproto/server/getAccountInviteCodes.ts +3 -5
- package/src/api/com/atproto/server/getSession.ts +2 -2
- package/src/api/com/atproto/server/listAppPasswords.ts +3 -5
- package/src/api/com/atproto/server/refreshSession.ts +2 -2
- package/src/api/com/atproto/server/requestAccountDelete.ts +3 -5
- package/src/api/com/atproto/server/requestEmailConfirmation.ts +3 -5
- package/src/api/com/atproto/server/requestEmailUpdate.ts +3 -5
- package/src/api/com/atproto/server/requestPasswordReset.ts +1 -2
- package/src/api/com/atproto/server/resetPassword.ts +1 -2
- package/src/api/com/atproto/server/revokeAppPassword.ts +3 -5
- package/src/api/com/atproto/server/updateEmail.ts +3 -5
- package/src/api/com/atproto/sync/getRecord.ts +1 -3
- package/src/api/com/atproto/temp/checkSignupQueue.ts +2 -2
- package/src/api/proxy.ts +19 -19
- package/src/context.ts +19 -0
- package/src/index.ts +1 -1
- package/src/lexicon/lexicons.ts +60 -17
- package/src/lexicon/types/app/bsky/labeler/defs.ts +7 -0
- package/src/lexicon/types/app/bsky/labeler/service.ts +7 -0
- package/src/lexicon/types/com/atproto/moderation/defs.ts +3 -0
- package/src/lexicon/types/com/atproto/repo/listRecords.ts +0 -4
- package/src/lexicon/types/com/atproto/sync/getRecord.ts +0 -2
- package/src/oauth/provider.ts +3 -1
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
3
2
|
import { AppContext } from '../../../../context'
|
4
3
|
import { Server } from '../../../../lexicon'
|
@@ -7,7 +6,7 @@ import { ids } from '../../../../lexicon/lexicons'
|
|
7
6
|
export default function (server: Server, ctx: AppContext) {
|
8
7
|
server.com.atproto.server.confirmEmail({
|
9
8
|
auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
|
10
|
-
handler: async ({ auth, input }) => {
|
9
|
+
handler: async ({ auth, input, req }) => {
|
11
10
|
const did = auth.credentials.did
|
12
11
|
|
13
12
|
const user = await ctx.accountManager.getAccount(did, {
|
@@ -18,12 +17,11 @@ export default function (server: Server, ctx: AppContext) {
|
|
18
17
|
}
|
19
18
|
|
20
19
|
if (ctx.entrywayAgent) {
|
21
|
-
assert(ctx.cfg.entryway)
|
22
20
|
await ctx.entrywayAgent.com.atproto.server.confirmEmail(
|
23
21
|
input.body,
|
24
|
-
await ctx.
|
22
|
+
await ctx.entrywayAuthHeaders(
|
23
|
+
req,
|
25
24
|
auth.credentials.did,
|
26
|
-
ctx.cfg.entryway.did,
|
27
25
|
ids.ComAtprotoServerConfirmEmail,
|
28
26
|
),
|
29
27
|
)
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { AppContext } from '../../../../context'
|
3
2
|
import { Server } from '../../../../lexicon'
|
4
3
|
import { ids } from '../../../../lexicon/lexicons'
|
@@ -9,16 +8,14 @@ export default function (server: Server, ctx: AppContext) {
|
|
9
8
|
auth: ctx.authVerifier.accessFull({
|
10
9
|
checkTakedown: true,
|
11
10
|
}),
|
12
|
-
handler: async ({ auth, input }) => {
|
11
|
+
handler: async ({ auth, input, req }) => {
|
13
12
|
if (ctx.entrywayAgent) {
|
14
|
-
assert(ctx.cfg.entryway)
|
15
|
-
|
16
13
|
return resultPassthru(
|
17
14
|
await ctx.entrywayAgent.com.atproto.server.createAppPassword(
|
18
15
|
input.body,
|
19
|
-
await ctx.
|
16
|
+
await ctx.entrywayAuthHeaders(
|
17
|
+
req,
|
20
18
|
auth.credentials.did,
|
21
|
-
ctx.cfg.entryway.did,
|
22
19
|
ids.ComAtprotoServerCreateAppPassword,
|
23
20
|
),
|
24
21
|
),
|
@@ -4,7 +4,7 @@ import { AuthRequiredError } from '@atproto/xrpc-server'
|
|
4
4
|
import { formatAccountStatus } from '../../../../account-manager'
|
5
5
|
import { AppContext } from '../../../../context'
|
6
6
|
import { Server } from '../../../../lexicon'
|
7
|
-
import {
|
7
|
+
import { resultPassthru } from '../../../proxy'
|
8
8
|
import { didDocForSession } from './util'
|
9
9
|
|
10
10
|
export default function (server: Server, ctx: AppContext) {
|
@@ -26,7 +26,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
26
26
|
return resultPassthru(
|
27
27
|
await ctx.entrywayAgent.com.atproto.server.createSession(
|
28
28
|
input.body,
|
29
|
-
|
29
|
+
ctx.entrywayPassthruHeaders(req),
|
30
30
|
),
|
31
31
|
)
|
32
32
|
}
|
@@ -1,7 +1,6 @@
|
|
1
1
|
import { AuthScope } from '../../../../auth-verifier'
|
2
2
|
import { AppContext } from '../../../../context'
|
3
3
|
import { Server } from '../../../../lexicon'
|
4
|
-
import { authPassthru } from '../../../proxy'
|
5
4
|
|
6
5
|
export default function (server: Server, ctx: AppContext) {
|
7
6
|
server.com.atproto.server.deactivateAccount({
|
@@ -11,7 +10,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
11
10
|
if (ctx.entrywayAgent) {
|
12
11
|
await ctx.entrywayAgent.com.atproto.server.deactivateAccount(
|
13
12
|
input.body,
|
14
|
-
|
13
|
+
ctx.entrywayPassthruHeaders(req),
|
15
14
|
)
|
16
15
|
return
|
17
16
|
}
|
@@ -3,7 +3,6 @@ import { AuthRequiredError, InvalidRequestError } from '@atproto/xrpc-server'
|
|
3
3
|
import { AccountStatus } from '../../../../account-manager'
|
4
4
|
import { AppContext } from '../../../../context'
|
5
5
|
import { Server } from '../../../../lexicon'
|
6
|
-
import { authPassthru } from '../../../proxy'
|
7
6
|
|
8
7
|
export default function (server: Server, ctx: AppContext) {
|
9
8
|
server.com.atproto.server.deleteAccount({
|
@@ -25,7 +24,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
25
24
|
if (ctx.entrywayAgent) {
|
26
25
|
await ctx.entrywayAgent.com.atproto.server.deleteAccount(
|
27
26
|
input.body,
|
28
|
-
|
27
|
+
ctx.entrywayPassthruHeaders(req),
|
29
28
|
)
|
30
29
|
return
|
31
30
|
}
|
@@ -1,14 +1,13 @@
|
|
1
1
|
import { AppContext } from '../../../../context'
|
2
2
|
import { Server } from '../../../../lexicon'
|
3
|
-
import { authPassthru } from '../../../proxy'
|
4
3
|
|
5
4
|
export default function (server: Server, ctx: AppContext) {
|
6
5
|
const { entrywayAgent } = ctx
|
7
6
|
if (entrywayAgent) {
|
8
|
-
server.com.atproto.server.deleteSession(async (
|
7
|
+
server.com.atproto.server.deleteSession(async ({ req }) => {
|
9
8
|
await entrywayAgent.com.atproto.server.deleteSession(
|
10
9
|
undefined,
|
11
|
-
|
10
|
+
ctx.entrywayPassthruHeaders(req),
|
12
11
|
)
|
13
12
|
})
|
14
13
|
} else {
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
3
2
|
import { CodeDetail } from '../../../../account-manager/helpers/invite'
|
4
3
|
import { AppContext } from '../../../../context'
|
@@ -10,15 +9,14 @@ import { genInvCodes } from './util'
|
|
10
9
|
export default function (server: Server, ctx: AppContext) {
|
11
10
|
server.com.atproto.server.getAccountInviteCodes({
|
12
11
|
auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
|
13
|
-
handler: async ({ params, auth }) => {
|
12
|
+
handler: async ({ params, auth, req }) => {
|
14
13
|
if (ctx.entrywayAgent) {
|
15
|
-
assert(ctx.cfg.entryway)
|
16
14
|
return resultPassthru(
|
17
15
|
await ctx.entrywayAgent.com.atproto.server.getAccountInviteCodes(
|
18
16
|
params,
|
19
|
-
await ctx.
|
17
|
+
await ctx.entrywayAuthHeaders(
|
18
|
+
req,
|
20
19
|
auth.credentials.did,
|
21
|
-
ctx.cfg.entryway.did,
|
22
20
|
ids.ComAtprotoServerGetAccountInviteCodes,
|
23
21
|
),
|
24
22
|
),
|
@@ -4,7 +4,7 @@ import { formatAccountStatus } from '../../../../account-manager'
|
|
4
4
|
import { AuthScope } from '../../../../auth-verifier'
|
5
5
|
import { AppContext } from '../../../../context'
|
6
6
|
import { Server } from '../../../../lexicon'
|
7
|
-
import {
|
7
|
+
import { resultPassthru } from '../../../proxy'
|
8
8
|
import { didDocForSession } from './util'
|
9
9
|
|
10
10
|
export default function (server: Server, ctx: AppContext) {
|
@@ -17,7 +17,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
17
17
|
return resultPassthru(
|
18
18
|
await ctx.entrywayAgent.com.atproto.server.getSession(
|
19
19
|
undefined,
|
20
|
-
|
20
|
+
ctx.entrywayPassthruHeaders(req),
|
21
21
|
),
|
22
22
|
)
|
23
23
|
}
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { AppContext } from '../../../../context'
|
3
2
|
import { Server } from '../../../../lexicon'
|
4
3
|
import { ids } from '../../../../lexicon/lexicons'
|
@@ -7,15 +6,14 @@ import { resultPassthru } from '../../../proxy'
|
|
7
6
|
export default function (server: Server, ctx: AppContext) {
|
8
7
|
server.com.atproto.server.listAppPasswords({
|
9
8
|
auth: ctx.authVerifier.accessStandard(),
|
10
|
-
handler: async ({ auth }) => {
|
9
|
+
handler: async ({ auth, req }) => {
|
11
10
|
if (ctx.entrywayAgent) {
|
12
|
-
assert(ctx.cfg.entryway)
|
13
11
|
return resultPassthru(
|
14
12
|
await ctx.entrywayAgent.com.atproto.server.listAppPasswords(
|
15
13
|
undefined,
|
16
|
-
await ctx.
|
14
|
+
await ctx.entrywayAuthHeaders(
|
15
|
+
req,
|
17
16
|
auth.credentials.did,
|
18
|
-
ctx.cfg.entryway.did,
|
19
17
|
ids.ComAtprotoServerListAppPasswords,
|
20
18
|
),
|
21
19
|
),
|
@@ -4,7 +4,7 @@ import { formatAccountStatus } from '../../../../account-manager'
|
|
4
4
|
import { AppContext } from '../../../../context'
|
5
5
|
import { softDeleted } from '../../../../db/util'
|
6
6
|
import { Server } from '../../../../lexicon'
|
7
|
-
import {
|
7
|
+
import { resultPassthru } from '../../../proxy'
|
8
8
|
import { didDocForSession } from './util'
|
9
9
|
|
10
10
|
export default function (server: Server, ctx: AppContext) {
|
@@ -32,7 +32,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
32
32
|
return resultPassthru(
|
33
33
|
await ctx.entrywayAgent.com.atproto.server.refreshSession(
|
34
34
|
undefined,
|
35
|
-
|
35
|
+
ctx.entrywayPassthruHeaders(req),
|
36
36
|
),
|
37
37
|
)
|
38
38
|
}
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { DAY, HOUR } from '@atproto/common'
|
3
2
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
4
3
|
import { AppContext } from '../../../../context'
|
@@ -20,7 +19,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
20
19
|
},
|
21
20
|
],
|
22
21
|
auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
|
23
|
-
handler: async ({ auth }) => {
|
22
|
+
handler: async ({ auth, req }) => {
|
24
23
|
const did = auth.credentials.did
|
25
24
|
const account = await ctx.accountManager.getAccount(did, {
|
26
25
|
includeDeactivated: true,
|
@@ -31,12 +30,11 @@ export default function (server: Server, ctx: AppContext) {
|
|
31
30
|
}
|
32
31
|
|
33
32
|
if (ctx.entrywayAgent) {
|
34
|
-
assert(ctx.cfg.entryway)
|
35
33
|
await ctx.entrywayAgent.com.atproto.server.requestAccountDelete(
|
36
34
|
undefined,
|
37
|
-
await ctx.
|
35
|
+
await ctx.entrywayAuthHeaders(
|
36
|
+
req,
|
38
37
|
auth.credentials.did,
|
39
|
-
ctx.cfg.entryway.did,
|
40
38
|
ids.ComAtprotoServerRequestAccountDelete,
|
41
39
|
),
|
42
40
|
)
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { DAY, HOUR } from '@atproto/common'
|
3
2
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
4
3
|
import { AppContext } from '../../../../context'
|
@@ -20,7 +19,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
20
19
|
},
|
21
20
|
],
|
22
21
|
auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
|
23
|
-
handler: async ({ auth }) => {
|
22
|
+
handler: async ({ auth, req }) => {
|
24
23
|
const did = auth.credentials.did
|
25
24
|
const account = await ctx.accountManager.getAccount(did, {
|
26
25
|
includeDeactivated: true,
|
@@ -31,12 +30,11 @@ export default function (server: Server, ctx: AppContext) {
|
|
31
30
|
}
|
32
31
|
|
33
32
|
if (ctx.entrywayAgent) {
|
34
|
-
assert(ctx.cfg.entryway)
|
35
33
|
await ctx.entrywayAgent.com.atproto.server.requestEmailConfirmation(
|
36
34
|
undefined,
|
37
|
-
await ctx.
|
35
|
+
await ctx.entrywayAuthHeaders(
|
36
|
+
req,
|
38
37
|
auth.credentials.did,
|
39
|
-
ctx.cfg.entryway.did,
|
40
38
|
ids.ComAtprotoServerRequestEmailConfirmation,
|
41
39
|
),
|
42
40
|
)
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { DAY, HOUR } from '@atproto/common'
|
3
2
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
4
3
|
import { AppContext } from '../../../../context'
|
@@ -21,7 +20,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
21
20
|
},
|
22
21
|
],
|
23
22
|
auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
|
24
|
-
handler: async ({ auth }) => {
|
23
|
+
handler: async ({ auth, req }) => {
|
25
24
|
const did = auth.credentials.did
|
26
25
|
const account = await ctx.accountManager.getAccount(did, {
|
27
26
|
includeDeactivated: true,
|
@@ -32,13 +31,12 @@ export default function (server: Server, ctx: AppContext) {
|
|
32
31
|
}
|
33
32
|
|
34
33
|
if (ctx.entrywayAgent) {
|
35
|
-
assert(ctx.cfg.entryway)
|
36
34
|
return resultPassthru(
|
37
35
|
await ctx.entrywayAgent.com.atproto.server.requestEmailUpdate(
|
38
36
|
undefined,
|
39
|
-
await ctx.
|
37
|
+
await ctx.entrywayAuthHeaders(
|
38
|
+
req,
|
40
39
|
auth.credentials.did,
|
41
|
-
ctx.cfg.entryway.did,
|
42
40
|
ids.ComAtprotoServerRequestEmailUpdate,
|
43
41
|
),
|
44
42
|
),
|
@@ -2,7 +2,6 @@ import { DAY, HOUR } from '@atproto/common'
|
|
2
2
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
3
3
|
import { AppContext } from '../../../../context'
|
4
4
|
import { Server } from '../../../../lexicon'
|
5
|
-
import { authPassthru } from '../../../proxy'
|
6
5
|
|
7
6
|
export default function (server: Server, ctx: AppContext) {
|
8
7
|
server.com.atproto.server.requestPasswordReset({
|
@@ -28,7 +27,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
28
27
|
if (ctx.entrywayAgent) {
|
29
28
|
await ctx.entrywayAgent.com.atproto.server.requestPasswordReset(
|
30
29
|
input.body,
|
31
|
-
|
30
|
+
ctx.entrywayPassthruHeaders(req),
|
32
31
|
)
|
33
32
|
return
|
34
33
|
}
|
@@ -1,7 +1,6 @@
|
|
1
1
|
import { MINUTE } from '@atproto/common'
|
2
2
|
import { AppContext } from '../../../../context'
|
3
3
|
import { Server } from '../../../../lexicon'
|
4
|
-
import { authPassthru } from '../../../proxy'
|
5
4
|
|
6
5
|
export default function (server: Server, ctx: AppContext) {
|
7
6
|
server.com.atproto.server.resetPassword({
|
@@ -15,7 +14,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
15
14
|
if (ctx.entrywayAgent) {
|
16
15
|
await ctx.entrywayAgent.com.atproto.server.resetPassword(
|
17
16
|
input.body,
|
18
|
-
|
17
|
+
ctx.entrywayPassthruHeaders(req),
|
19
18
|
)
|
20
19
|
return
|
21
20
|
}
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { AppContext } from '../../../../context'
|
3
2
|
import { Server } from '../../../../lexicon'
|
4
3
|
import { ids } from '../../../../lexicon/lexicons'
|
@@ -6,14 +5,13 @@ import { ids } from '../../../../lexicon/lexicons'
|
|
6
5
|
export default function (server: Server, ctx: AppContext) {
|
7
6
|
server.com.atproto.server.revokeAppPassword({
|
8
7
|
auth: ctx.authVerifier.accessStandard(),
|
9
|
-
handler: async ({ auth, input }) => {
|
8
|
+
handler: async ({ auth, input, req }) => {
|
10
9
|
if (ctx.entrywayAgent) {
|
11
|
-
assert(ctx.cfg.entryway)
|
12
10
|
await ctx.entrywayAgent.com.atproto.server.revokeAppPassword(
|
13
11
|
input.body,
|
14
|
-
await ctx.
|
12
|
+
await ctx.entrywayAuthHeaders(
|
13
|
+
req,
|
15
14
|
auth.credentials.did,
|
16
|
-
ctx.cfg.entryway.did,
|
17
15
|
ids.ComAtprotoServerRevokeAppPassword,
|
18
16
|
),
|
19
17
|
)
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import assert from 'node:assert'
|
2
1
|
import { isEmailValid } from '@hapi/address'
|
3
2
|
import { isDisposableEmail } from 'disposable-email-domains-js'
|
4
3
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
@@ -10,7 +9,7 @@ import { ids } from '../../../../lexicon/lexicons'
|
|
10
9
|
export default function (server: Server, ctx: AppContext) {
|
11
10
|
server.com.atproto.server.updateEmail({
|
12
11
|
auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
|
13
|
-
handler: async ({ auth, input }) => {
|
12
|
+
handler: async ({ auth, input, req }) => {
|
14
13
|
const did = auth.credentials.did
|
15
14
|
const { token, email } = input.body
|
16
15
|
if (!isEmailValid(email) || isDisposableEmail(email)) {
|
@@ -26,12 +25,11 @@ export default function (server: Server, ctx: AppContext) {
|
|
26
25
|
}
|
27
26
|
|
28
27
|
if (ctx.entrywayAgent) {
|
29
|
-
assert(ctx.cfg.entryway)
|
30
28
|
await ctx.entrywayAgent.com.atproto.server.updateEmail(
|
31
29
|
input.body,
|
32
|
-
await ctx.
|
30
|
+
await ctx.entrywayAuthHeaders(
|
31
|
+
req,
|
33
32
|
auth.credentials.did,
|
34
|
-
ctx.cfg.entryway.did,
|
35
33
|
ids.ComAtprotoServerUpdateEmail,
|
36
34
|
),
|
37
35
|
)
|
@@ -25,9 +25,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
25
25
|
let carStream: stream.Readable
|
26
26
|
try {
|
27
27
|
const storage = new SqlRepoReader(actorDb)
|
28
|
-
const commit =
|
29
|
-
? CID.parse(params.commit)
|
30
|
-
: await storage.getRoot()
|
28
|
+
const commit = await storage.getRoot()
|
31
29
|
|
32
30
|
if (!commit) {
|
33
31
|
throw new InvalidRequestError(`Could not find repo for DID: ${did}`)
|
@@ -1,7 +1,7 @@
|
|
1
1
|
import { AuthScope } from '../../../../auth-verifier'
|
2
2
|
import { AppContext } from '../../../../context'
|
3
3
|
import { Server } from '../../../../lexicon'
|
4
|
-
import {
|
4
|
+
import { resultPassthru } from '../../../proxy'
|
5
5
|
|
6
6
|
// THIS IS A TEMPORARY UNSPECCED ROUTE
|
7
7
|
export default function (server: Server, ctx: AppContext) {
|
@@ -21,7 +21,7 @@ export default function (server: Server, ctx: AppContext) {
|
|
21
21
|
return resultPassthru(
|
22
22
|
await ctx.entrywayAgent.com.atproto.temp.checkSignupQueue(
|
23
23
|
undefined,
|
24
|
-
|
24
|
+
ctx.entrywayPassthruHeaders(req),
|
25
25
|
),
|
26
26
|
)
|
27
27
|
},
|
package/src/api/proxy.ts
CHANGED
@@ -1,4 +1,5 @@
|
|
1
1
|
import { IncomingMessage } from 'node:http'
|
2
|
+
import express from 'express'
|
2
3
|
import { Headers } from '@atproto/xrpc'
|
3
4
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
4
5
|
|
@@ -10,21 +11,7 @@ export const resultPassthru = <T>(result: { headers: Headers; data: T }) => {
|
|
10
11
|
}
|
11
12
|
}
|
12
13
|
|
13
|
-
|
14
|
-
// The encoding field here is a quirk of the AtpAgent.
|
15
|
-
export function authPassthru(
|
16
|
-
req: IncomingMessage,
|
17
|
-
withEncoding?: false,
|
18
|
-
): { headers: { authorization: string }; encoding: undefined } | undefined
|
19
|
-
|
20
|
-
export function authPassthru(
|
21
|
-
req: IncomingMessage,
|
22
|
-
withEncoding: true,
|
23
|
-
):
|
24
|
-
| { headers: { authorization: string }; encoding: 'application/json' }
|
25
|
-
| undefined
|
26
|
-
|
27
|
-
export function authPassthru(req: IncomingMessage, withEncoding?: boolean) {
|
14
|
+
export function authPassthru(req: IncomingMessage) {
|
28
15
|
const { authorization } = req.headers
|
29
16
|
|
30
17
|
if (authorization) {
|
@@ -45,9 +32,22 @@ export function authPassthru(req: IncomingMessage, withEncoding?: boolean) {
|
|
45
32
|
throw new InvalidRequestError('DPoP requests cannot be proxied')
|
46
33
|
}
|
47
34
|
|
48
|
-
return {
|
49
|
-
headers: { authorization },
|
50
|
-
encoding: withEncoding ? 'application/json' : undefined,
|
51
|
-
}
|
35
|
+
return { headers: { authorization } }
|
52
36
|
}
|
53
37
|
}
|
38
|
+
|
39
|
+
// @NOTE this function may mutate its params input
|
40
|
+
// future improvement here would be to forward along all untrusted ips rather than just the first (req.ip)
|
41
|
+
export const forwardedFor = (
|
42
|
+
req: express.Request,
|
43
|
+
params: HeadersParam | undefined,
|
44
|
+
) => {
|
45
|
+
const result: HeadersParam = params ?? { headers: {} }
|
46
|
+
const ip = req.ip
|
47
|
+
if (ip) {
|
48
|
+
result.headers['x-forwarded-for'] = ip
|
49
|
+
}
|
50
|
+
return result
|
51
|
+
}
|
52
|
+
|
53
|
+
type HeadersParam = { headers: Record<string, string> }
|
package/src/context.ts
CHANGED
@@ -1,5 +1,6 @@
|
|
1
1
|
import assert from 'node:assert'
|
2
2
|
import * as plc from '@did-plc/lib'
|
3
|
+
import express from 'express'
|
3
4
|
import { Redis } from 'ioredis'
|
4
5
|
import * as nodemailer from 'nodemailer'
|
5
6
|
import * as undici from 'undici'
|
@@ -25,6 +26,7 @@ import {
|
|
25
26
|
} from '@atproto-labs/fetch-node'
|
26
27
|
import { AccountManager } from './account-manager'
|
27
28
|
import { ActorStore } from './actor-store/actor-store'
|
29
|
+
import { authPassthru, forwardedFor } from './api/proxy'
|
28
30
|
import {
|
29
31
|
AuthVerifier,
|
30
32
|
createPublicKeyObject,
|
@@ -333,6 +335,9 @@ export class AppContext {
|
|
333
335
|
dpopSecret: secrets.dpopSecret,
|
334
336
|
customization: cfg.oauth.provider.customization,
|
335
337
|
safeFetch,
|
338
|
+
// @TODO: Make this configurable. The legacy implementation used to
|
339
|
+
// blindly trust the X-Forwarded-For header.
|
340
|
+
trustProxy: (_addr: string, _i: number) => true,
|
336
341
|
})
|
337
342
|
: undefined
|
338
343
|
|
@@ -395,6 +400,20 @@ export class AppContext {
|
|
395
400
|
return this.serviceAuthHeaders(did, this.bskyAppView.did, lxm)
|
396
401
|
}
|
397
402
|
|
403
|
+
async entrywayAuthHeaders(req: express.Request, did: string, lxm: string) {
|
404
|
+
assert(this.cfg.entryway)
|
405
|
+
const headers = await this.serviceAuthHeaders(
|
406
|
+
did,
|
407
|
+
this.cfg.entryway.did,
|
408
|
+
lxm,
|
409
|
+
)
|
410
|
+
return forwardedFor(req, headers)
|
411
|
+
}
|
412
|
+
|
413
|
+
entrywayPassthruHeaders(req: express.Request) {
|
414
|
+
return forwardedFor(req, authPassthru(req))
|
415
|
+
}
|
416
|
+
|
398
417
|
async serviceAuthHeaders(did: string, aud: string, lxm: string) {
|
399
418
|
const keypair = await this.actorStore.keypair(did)
|
400
419
|
return createServiceAuthHeaders({
|
package/src/index.ts
CHANGED
@@ -122,7 +122,7 @@ export class PDS {
|
|
122
122
|
server = API(server, ctx)
|
123
123
|
|
124
124
|
const app = express()
|
125
|
-
app.set('trust proxy',
|
125
|
+
app.set('trust proxy', ['loopback', 'linklocal', 'uniquelocal'])
|
126
126
|
app.use(loggerMiddleware)
|
127
127
|
app.use(compression())
|
128
128
|
app.use(authRoutes.createRouter(ctx)) // Before CORS
|
package/src/lexicon/lexicons.ts
CHANGED
@@ -1278,6 +1278,11 @@ export const schemaDict = {
|
|
1278
1278
|
type: 'token',
|
1279
1279
|
description: 'Appeal: appeal a previously taken moderation action',
|
1280
1280
|
},
|
1281
|
+
subjectType: {
|
1282
|
+
type: 'string',
|
1283
|
+
description: 'Tag describing a type of subject that might be reported.',
|
1284
|
+
knownValues: ['account', 'record', 'chat'],
|
1285
|
+
},
|
1281
1286
|
},
|
1282
1287
|
},
|
1283
1288
|
ComAtprotoRepoApplyWrites: {
|
@@ -1855,16 +1860,6 @@ export const schemaDict = {
|
|
1855
1860
|
cursor: {
|
1856
1861
|
type: 'string',
|
1857
1862
|
},
|
1858
|
-
rkeyStart: {
|
1859
|
-
type: 'string',
|
1860
|
-
description:
|
1861
|
-
'DEPRECATED: The lowest sort-ordered rkey to start from (exclusive)',
|
1862
|
-
},
|
1863
|
-
rkeyEnd: {
|
1864
|
-
type: 'string',
|
1865
|
-
description:
|
1866
|
-
'DEPRECATED: The highest sort-ordered rkey to stop at (exclusive)',
|
1867
|
-
},
|
1868
1863
|
reverse: {
|
1869
1864
|
type: 'boolean',
|
1870
1865
|
description: 'Flag to reverse the order of the returned records.',
|
@@ -3405,12 +3400,6 @@ export const schemaDict = {
|
|
3405
3400
|
description: 'Record Key',
|
3406
3401
|
format: 'record-key',
|
3407
3402
|
},
|
3408
|
-
commit: {
|
3409
|
-
type: 'string',
|
3410
|
-
format: 'cid',
|
3411
|
-
description:
|
3412
|
-
'DEPRECATED: referenced a repo commit by CID, and retrieved record as of that commit',
|
3413
|
-
},
|
3414
3403
|
},
|
3415
3404
|
},
|
3416
3405
|
output: {
|
@@ -3759,7 +3748,7 @@ export const schemaDict = {
|
|
3759
3748
|
main: {
|
3760
3749
|
type: 'procedure',
|
3761
3750
|
description:
|
3762
|
-
'Notify a crawling service of a recent update, and that crawling should resume. Intended use is after a gap between repo stream events caused the crawling service to disconnect. Does not require auth; implemented by Relay.',
|
3751
|
+
'Notify a crawling service of a recent update, and that crawling should resume. Intended use is after a gap between repo stream events caused the crawling service to disconnect. Does not require auth; implemented by Relay. DEPRECATED: just use com.atproto.sync.requestCrawl',
|
3763
3752
|
input: {
|
3764
3753
|
encoding: 'application/json',
|
3765
3754
|
schema: {
|
@@ -9055,6 +9044,33 @@ export const schemaDict = {
|
|
9055
9044
|
ref: 'lex:com.atproto.label.defs#label',
|
9056
9045
|
},
|
9057
9046
|
},
|
9047
|
+
reasonTypes: {
|
9048
|
+
description:
|
9049
|
+
"The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed.",
|
9050
|
+
type: 'array',
|
9051
|
+
items: {
|
9052
|
+
type: 'ref',
|
9053
|
+
ref: 'lex:com.atproto.moderation.defs#reasonType',
|
9054
|
+
},
|
9055
|
+
},
|
9056
|
+
subjectTypes: {
|
9057
|
+
description:
|
9058
|
+
'The set of subject types (account, record, etc) this service accepts reports on.',
|
9059
|
+
type: 'array',
|
9060
|
+
items: {
|
9061
|
+
type: 'ref',
|
9062
|
+
ref: 'lex:com.atproto.moderation.defs#subjectType',
|
9063
|
+
},
|
9064
|
+
},
|
9065
|
+
subjectCollections: {
|
9066
|
+
type: 'array',
|
9067
|
+
description:
|
9068
|
+
'Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type.',
|
9069
|
+
items: {
|
9070
|
+
type: 'string',
|
9071
|
+
format: 'nsid',
|
9072
|
+
},
|
9073
|
+
},
|
9058
9074
|
},
|
9059
9075
|
},
|
9060
9076
|
labelerViewerState: {
|
@@ -9162,6 +9178,33 @@ export const schemaDict = {
|
|
9162
9178
|
type: 'string',
|
9163
9179
|
format: 'datetime',
|
9164
9180
|
},
|
9181
|
+
reasonTypes: {
|
9182
|
+
description:
|
9183
|
+
"The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed.",
|
9184
|
+
type: 'array',
|
9185
|
+
items: {
|
9186
|
+
type: 'ref',
|
9187
|
+
ref: 'lex:com.atproto.moderation.defs#reasonType',
|
9188
|
+
},
|
9189
|
+
},
|
9190
|
+
subjectTypes: {
|
9191
|
+
description:
|
9192
|
+
'The set of subject types (account, record, etc) this service accepts reports on.',
|
9193
|
+
type: 'array',
|
9194
|
+
items: {
|
9195
|
+
type: 'ref',
|
9196
|
+
ref: 'lex:com.atproto.moderation.defs#subjectType',
|
9197
|
+
},
|
9198
|
+
},
|
9199
|
+
subjectCollections: {
|
9200
|
+
type: 'array',
|
9201
|
+
description:
|
9202
|
+
'Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type.',
|
9203
|
+
items: {
|
9204
|
+
type: 'string',
|
9205
|
+
format: 'nsid',
|
9206
|
+
},
|
9207
|
+
},
|
9165
9208
|
},
|
9166
9209
|
},
|
9167
9210
|
},
|