@atproto/pds 0.4.102 → 0.4.104

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. package/CHANGELOG.md +22 -0
  2. package/dist/api/com/atproto/admin/sendEmail.d.ts.map +1 -1
  3. package/dist/api/com/atproto/admin/sendEmail.js +2 -7
  4. package/dist/api/com/atproto/admin/sendEmail.js.map +1 -1
  5. package/dist/api/com/atproto/admin/updateAccountEmail.d.ts.map +1 -1
  6. package/dist/api/com/atproto/admin/updateAccountEmail.js +1 -2
  7. package/dist/api/com/atproto/admin/updateAccountEmail.js.map +1 -1
  8. package/dist/api/com/atproto/admin/updateAccountPassword.d.ts.map +1 -1
  9. package/dist/api/com/atproto/admin/updateAccountPassword.js +1 -2
  10. package/dist/api/com/atproto/admin/updateAccountPassword.js.map +1 -1
  11. package/dist/api/com/atproto/identity/requestPlcOperationSignature.d.ts.map +1 -1
  12. package/dist/api/com/atproto/identity/requestPlcOperationSignature.js +2 -7
  13. package/dist/api/com/atproto/identity/requestPlcOperationSignature.js.map +1 -1
  14. package/dist/api/com/atproto/identity/signPlcOperation.d.ts.map +1 -1
  15. package/dist/api/com/atproto/identity/signPlcOperation.js +2 -7
  16. package/dist/api/com/atproto/identity/signPlcOperation.js.map +1 -1
  17. package/dist/api/com/atproto/identity/updateHandle.d.ts.map +1 -1
  18. package/dist/api/com/atproto/identity/updateHandle.js +2 -7
  19. package/dist/api/com/atproto/identity/updateHandle.js.map +1 -1
  20. package/dist/api/com/atproto/repo/applyWrites.d.ts.map +1 -1
  21. package/dist/api/com/atproto/repo/applyWrites.js +12 -7
  22. package/dist/api/com/atproto/repo/applyWrites.js.map +1 -1
  23. package/dist/api/com/atproto/repo/createRecord.d.ts.map +1 -1
  24. package/dist/api/com/atproto/repo/createRecord.js +12 -8
  25. package/dist/api/com/atproto/repo/createRecord.js.map +1 -1
  26. package/dist/api/com/atproto/repo/deleteRecord.d.ts.map +1 -1
  27. package/dist/api/com/atproto/repo/deleteRecord.js +12 -7
  28. package/dist/api/com/atproto/repo/deleteRecord.js.map +1 -1
  29. package/dist/api/com/atproto/repo/listRecords.d.ts.map +1 -1
  30. package/dist/api/com/atproto/repo/listRecords.js +1 -3
  31. package/dist/api/com/atproto/repo/listRecords.js.map +1 -1
  32. package/dist/api/com/atproto/repo/putRecord.d.ts.map +1 -1
  33. package/dist/api/com/atproto/repo/putRecord.js +11 -8
  34. package/dist/api/com/atproto/repo/putRecord.js.map +1 -1
  35. package/dist/api/com/atproto/server/activateAccount.d.ts.map +1 -1
  36. package/dist/api/com/atproto/server/activateAccount.js +1 -2
  37. package/dist/api/com/atproto/server/activateAccount.js.map +1 -1
  38. package/dist/api/com/atproto/server/confirmEmail.d.ts.map +1 -1
  39. package/dist/api/com/atproto/server/confirmEmail.js +2 -7
  40. package/dist/api/com/atproto/server/confirmEmail.js.map +1 -1
  41. package/dist/api/com/atproto/server/createAppPassword.d.ts.map +1 -1
  42. package/dist/api/com/atproto/server/createAppPassword.js +2 -7
  43. package/dist/api/com/atproto/server/createAppPassword.js.map +1 -1
  44. package/dist/api/com/atproto/server/createSession.js +1 -1
  45. package/dist/api/com/atproto/server/createSession.js.map +1 -1
  46. package/dist/api/com/atproto/server/deactivateAccount.d.ts.map +1 -1
  47. package/dist/api/com/atproto/server/deactivateAccount.js +1 -2
  48. package/dist/api/com/atproto/server/deactivateAccount.js.map +1 -1
  49. package/dist/api/com/atproto/server/deleteAccount.d.ts.map +1 -1
  50. package/dist/api/com/atproto/server/deleteAccount.js +1 -2
  51. package/dist/api/com/atproto/server/deleteAccount.js.map +1 -1
  52. package/dist/api/com/atproto/server/deleteSession.d.ts.map +1 -1
  53. package/dist/api/com/atproto/server/deleteSession.js +2 -3
  54. package/dist/api/com/atproto/server/deleteSession.js.map +1 -1
  55. package/dist/api/com/atproto/server/getAccountInviteCodes.d.ts.map +1 -1
  56. package/dist/api/com/atproto/server/getAccountInviteCodes.js +2 -7
  57. package/dist/api/com/atproto/server/getAccountInviteCodes.js.map +1 -1
  58. package/dist/api/com/atproto/server/getSession.js +1 -1
  59. package/dist/api/com/atproto/server/getSession.js.map +1 -1
  60. package/dist/api/com/atproto/server/listAppPasswords.d.ts.map +1 -1
  61. package/dist/api/com/atproto/server/listAppPasswords.js +2 -7
  62. package/dist/api/com/atproto/server/listAppPasswords.js.map +1 -1
  63. package/dist/api/com/atproto/server/refreshSession.js +1 -1
  64. package/dist/api/com/atproto/server/refreshSession.js.map +1 -1
  65. package/dist/api/com/atproto/server/requestAccountDelete.d.ts.map +1 -1
  66. package/dist/api/com/atproto/server/requestAccountDelete.js +2 -7
  67. package/dist/api/com/atproto/server/requestAccountDelete.js.map +1 -1
  68. package/dist/api/com/atproto/server/requestEmailConfirmation.d.ts.map +1 -1
  69. package/dist/api/com/atproto/server/requestEmailConfirmation.js +2 -7
  70. package/dist/api/com/atproto/server/requestEmailConfirmation.js.map +1 -1
  71. package/dist/api/com/atproto/server/requestEmailUpdate.d.ts.map +1 -1
  72. package/dist/api/com/atproto/server/requestEmailUpdate.js +2 -7
  73. package/dist/api/com/atproto/server/requestEmailUpdate.js.map +1 -1
  74. package/dist/api/com/atproto/server/requestPasswordReset.d.ts.map +1 -1
  75. package/dist/api/com/atproto/server/requestPasswordReset.js +1 -2
  76. package/dist/api/com/atproto/server/requestPasswordReset.js.map +1 -1
  77. package/dist/api/com/atproto/server/resetPassword.d.ts.map +1 -1
  78. package/dist/api/com/atproto/server/resetPassword.js +1 -2
  79. package/dist/api/com/atproto/server/resetPassword.js.map +1 -1
  80. package/dist/api/com/atproto/server/revokeAppPassword.d.ts.map +1 -1
  81. package/dist/api/com/atproto/server/revokeAppPassword.js +2 -7
  82. package/dist/api/com/atproto/server/revokeAppPassword.js.map +1 -1
  83. package/dist/api/com/atproto/server/updateEmail.d.ts.map +1 -1
  84. package/dist/api/com/atproto/server/updateEmail.js +2 -7
  85. package/dist/api/com/atproto/server/updateEmail.js.map +1 -1
  86. package/dist/api/com/atproto/sync/getRecord.d.ts.map +1 -1
  87. package/dist/api/com/atproto/sync/getRecord.js +1 -4
  88. package/dist/api/com/atproto/sync/getRecord.js.map +1 -1
  89. package/dist/api/com/atproto/temp/checkSignupQueue.js +1 -1
  90. package/dist/api/com/atproto/temp/checkSignupQueue.js.map +1 -1
  91. package/dist/api/proxy.d.ts +7 -8
  92. package/dist/api/proxy.d.ts.map +1 -1
  93. package/dist/api/proxy.js +14 -6
  94. package/dist/api/proxy.js.map +1 -1
  95. package/dist/context.d.ts +7 -0
  96. package/dist/context.d.ts.map +1 -1
  97. package/dist/context.js +12 -0
  98. package/dist/context.js.map +1 -1
  99. package/dist/index.js +1 -1
  100. package/dist/index.js.map +1 -1
  101. package/dist/lexicon/lexicons.d.ts +108 -28
  102. package/dist/lexicon/lexicons.d.ts.map +1 -1
  103. package/dist/lexicon/lexicons.js +54 -14
  104. package/dist/lexicon/lexicons.js.map +1 -1
  105. package/dist/lexicon/types/app/bsky/labeler/defs.d.ts +7 -0
  106. package/dist/lexicon/types/app/bsky/labeler/defs.d.ts.map +1 -1
  107. package/dist/lexicon/types/app/bsky/labeler/defs.js.map +1 -1
  108. package/dist/lexicon/types/app/bsky/labeler/service.d.ts +7 -0
  109. package/dist/lexicon/types/app/bsky/labeler/service.d.ts.map +1 -1
  110. package/dist/lexicon/types/app/bsky/labeler/service.js.map +1 -1
  111. package/dist/lexicon/types/com/atproto/moderation/defs.d.ts +2 -0
  112. package/dist/lexicon/types/com/atproto/moderation/defs.d.ts.map +1 -1
  113. package/dist/lexicon/types/com/atproto/repo/listRecords.d.ts +0 -4
  114. package/dist/lexicon/types/com/atproto/repo/listRecords.d.ts.map +1 -1
  115. package/dist/lexicon/types/com/atproto/repo/listRecords.js.map +1 -1
  116. package/dist/lexicon/types/com/atproto/sync/getRecord.d.ts +0 -2
  117. package/dist/lexicon/types/com/atproto/sync/getRecord.d.ts.map +1 -1
  118. package/dist/oauth/provider.d.ts +2 -2
  119. package/dist/oauth/provider.d.ts.map +1 -1
  120. package/dist/oauth/provider.js +2 -1
  121. package/dist/oauth/provider.js.map +1 -1
  122. package/package.json +5 -5
  123. package/src/api/com/atproto/admin/sendEmail.ts +3 -5
  124. package/src/api/com/atproto/admin/updateAccountEmail.ts +1 -2
  125. package/src/api/com/atproto/admin/updateAccountPassword.ts +1 -2
  126. package/src/api/com/atproto/identity/requestPlcOperationSignature.ts +3 -5
  127. package/src/api/com/atproto/identity/signPlcOperation.ts +3 -5
  128. package/src/api/com/atproto/identity/updateHandle.ts +3 -6
  129. package/src/api/com/atproto/repo/applyWrites.ts +21 -11
  130. package/src/api/com/atproto/repo/createRecord.ts +19 -14
  131. package/src/api/com/atproto/repo/deleteRecord.ts +26 -14
  132. package/src/api/com/atproto/repo/listRecords.ts +1 -11
  133. package/src/api/com/atproto/repo/putRecord.ts +24 -16
  134. package/src/api/com/atproto/server/activateAccount.ts +1 -2
  135. package/src/api/com/atproto/server/confirmEmail.ts +3 -5
  136. package/src/api/com/atproto/server/createAppPassword.ts +3 -6
  137. package/src/api/com/atproto/server/createSession.ts +2 -2
  138. package/src/api/com/atproto/server/deactivateAccount.ts +1 -2
  139. package/src/api/com/atproto/server/deleteAccount.ts +1 -2
  140. package/src/api/com/atproto/server/deleteSession.ts +2 -3
  141. package/src/api/com/atproto/server/getAccountInviteCodes.ts +3 -5
  142. package/src/api/com/atproto/server/getSession.ts +2 -2
  143. package/src/api/com/atproto/server/listAppPasswords.ts +3 -5
  144. package/src/api/com/atproto/server/refreshSession.ts +2 -2
  145. package/src/api/com/atproto/server/requestAccountDelete.ts +3 -5
  146. package/src/api/com/atproto/server/requestEmailConfirmation.ts +3 -5
  147. package/src/api/com/atproto/server/requestEmailUpdate.ts +3 -5
  148. package/src/api/com/atproto/server/requestPasswordReset.ts +1 -2
  149. package/src/api/com/atproto/server/resetPassword.ts +1 -2
  150. package/src/api/com/atproto/server/revokeAppPassword.ts +3 -5
  151. package/src/api/com/atproto/server/updateEmail.ts +3 -5
  152. package/src/api/com/atproto/sync/getRecord.ts +1 -3
  153. package/src/api/com/atproto/temp/checkSignupQueue.ts +2 -2
  154. package/src/api/proxy.ts +19 -19
  155. package/src/context.ts +19 -0
  156. package/src/index.ts +1 -1
  157. package/src/lexicon/lexicons.ts +60 -17
  158. package/src/lexicon/types/app/bsky/labeler/defs.ts +7 -0
  159. package/src/lexicon/types/app/bsky/labeler/service.ts +7 -0
  160. package/src/lexicon/types/com/atproto/moderation/defs.ts +3 -0
  161. package/src/lexicon/types/com/atproto/repo/listRecords.ts +0 -4
  162. package/src/lexicon/types/com/atproto/sync/getRecord.ts +0 -2
  163. package/src/oauth/provider.ts +3 -1
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { InvalidRequestError } from '@atproto/xrpc-server'
3
2
  import { AppContext } from '../../../../context'
4
3
  import { Server } from '../../../../lexicon'
@@ -7,7 +6,7 @@ import { ids } from '../../../../lexicon/lexicons'
7
6
  export default function (server: Server, ctx: AppContext) {
8
7
  server.com.atproto.server.confirmEmail({
9
8
  auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
10
- handler: async ({ auth, input }) => {
9
+ handler: async ({ auth, input, req }) => {
11
10
  const did = auth.credentials.did
12
11
 
13
12
  const user = await ctx.accountManager.getAccount(did, {
@@ -18,12 +17,11 @@ export default function (server: Server, ctx: AppContext) {
18
17
  }
19
18
 
20
19
  if (ctx.entrywayAgent) {
21
- assert(ctx.cfg.entryway)
22
20
  await ctx.entrywayAgent.com.atproto.server.confirmEmail(
23
21
  input.body,
24
- await ctx.serviceAuthHeaders(
22
+ await ctx.entrywayAuthHeaders(
23
+ req,
25
24
  auth.credentials.did,
26
- ctx.cfg.entryway.did,
27
25
  ids.ComAtprotoServerConfirmEmail,
28
26
  ),
29
27
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { AppContext } from '../../../../context'
3
2
  import { Server } from '../../../../lexicon'
4
3
  import { ids } from '../../../../lexicon/lexicons'
@@ -9,16 +8,14 @@ export default function (server: Server, ctx: AppContext) {
9
8
  auth: ctx.authVerifier.accessFull({
10
9
  checkTakedown: true,
11
10
  }),
12
- handler: async ({ auth, input }) => {
11
+ handler: async ({ auth, input, req }) => {
13
12
  if (ctx.entrywayAgent) {
14
- assert(ctx.cfg.entryway)
15
-
16
13
  return resultPassthru(
17
14
  await ctx.entrywayAgent.com.atproto.server.createAppPassword(
18
15
  input.body,
19
- await ctx.serviceAuthHeaders(
16
+ await ctx.entrywayAuthHeaders(
17
+ req,
20
18
  auth.credentials.did,
21
- ctx.cfg.entryway.did,
22
19
  ids.ComAtprotoServerCreateAppPassword,
23
20
  ),
24
21
  ),
@@ -4,7 +4,7 @@ import { AuthRequiredError } from '@atproto/xrpc-server'
4
4
  import { formatAccountStatus } from '../../../../account-manager'
5
5
  import { AppContext } from '../../../../context'
6
6
  import { Server } from '../../../../lexicon'
7
- import { authPassthru, resultPassthru } from '../../../proxy'
7
+ import { resultPassthru } from '../../../proxy'
8
8
  import { didDocForSession } from './util'
9
9
 
10
10
  export default function (server: Server, ctx: AppContext) {
@@ -26,7 +26,7 @@ export default function (server: Server, ctx: AppContext) {
26
26
  return resultPassthru(
27
27
  await ctx.entrywayAgent.com.atproto.server.createSession(
28
28
  input.body,
29
- authPassthru(req, true),
29
+ ctx.entrywayPassthruHeaders(req),
30
30
  ),
31
31
  )
32
32
  }
@@ -1,7 +1,6 @@
1
1
  import { AuthScope } from '../../../../auth-verifier'
2
2
  import { AppContext } from '../../../../context'
3
3
  import { Server } from '../../../../lexicon'
4
- import { authPassthru } from '../../../proxy'
5
4
 
6
5
  export default function (server: Server, ctx: AppContext) {
7
6
  server.com.atproto.server.deactivateAccount({
@@ -11,7 +10,7 @@ export default function (server: Server, ctx: AppContext) {
11
10
  if (ctx.entrywayAgent) {
12
11
  await ctx.entrywayAgent.com.atproto.server.deactivateAccount(
13
12
  input.body,
14
- authPassthru(req),
13
+ ctx.entrywayPassthruHeaders(req),
15
14
  )
16
15
  return
17
16
  }
@@ -3,7 +3,6 @@ import { AuthRequiredError, InvalidRequestError } from '@atproto/xrpc-server'
3
3
  import { AccountStatus } from '../../../../account-manager'
4
4
  import { AppContext } from '../../../../context'
5
5
  import { Server } from '../../../../lexicon'
6
- import { authPassthru } from '../../../proxy'
7
6
 
8
7
  export default function (server: Server, ctx: AppContext) {
9
8
  server.com.atproto.server.deleteAccount({
@@ -25,7 +24,7 @@ export default function (server: Server, ctx: AppContext) {
25
24
  if (ctx.entrywayAgent) {
26
25
  await ctx.entrywayAgent.com.atproto.server.deleteAccount(
27
26
  input.body,
28
- authPassthru(req, true),
27
+ ctx.entrywayPassthruHeaders(req),
29
28
  )
30
29
  return
31
30
  }
@@ -1,14 +1,13 @@
1
1
  import { AppContext } from '../../../../context'
2
2
  import { Server } from '../../../../lexicon'
3
- import { authPassthru } from '../../../proxy'
4
3
 
5
4
  export default function (server: Server, ctx: AppContext) {
6
5
  const { entrywayAgent } = ctx
7
6
  if (entrywayAgent) {
8
- server.com.atproto.server.deleteSession(async (reqCtx) => {
7
+ server.com.atproto.server.deleteSession(async ({ req }) => {
9
8
  await entrywayAgent.com.atproto.server.deleteSession(
10
9
  undefined,
11
- authPassthru(reqCtx.req),
10
+ ctx.entrywayPassthruHeaders(req),
12
11
  )
13
12
  })
14
13
  } else {
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { InvalidRequestError } from '@atproto/xrpc-server'
3
2
  import { CodeDetail } from '../../../../account-manager/helpers/invite'
4
3
  import { AppContext } from '../../../../context'
@@ -10,15 +9,14 @@ import { genInvCodes } from './util'
10
9
  export default function (server: Server, ctx: AppContext) {
11
10
  server.com.atproto.server.getAccountInviteCodes({
12
11
  auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
13
- handler: async ({ params, auth }) => {
12
+ handler: async ({ params, auth, req }) => {
14
13
  if (ctx.entrywayAgent) {
15
- assert(ctx.cfg.entryway)
16
14
  return resultPassthru(
17
15
  await ctx.entrywayAgent.com.atproto.server.getAccountInviteCodes(
18
16
  params,
19
- await ctx.serviceAuthHeaders(
17
+ await ctx.entrywayAuthHeaders(
18
+ req,
20
19
  auth.credentials.did,
21
- ctx.cfg.entryway.did,
22
20
  ids.ComAtprotoServerGetAccountInviteCodes,
23
21
  ),
24
22
  ),
@@ -4,7 +4,7 @@ import { formatAccountStatus } from '../../../../account-manager'
4
4
  import { AuthScope } from '../../../../auth-verifier'
5
5
  import { AppContext } from '../../../../context'
6
6
  import { Server } from '../../../../lexicon'
7
- import { authPassthru, resultPassthru } from '../../../proxy'
7
+ import { resultPassthru } from '../../../proxy'
8
8
  import { didDocForSession } from './util'
9
9
 
10
10
  export default function (server: Server, ctx: AppContext) {
@@ -17,7 +17,7 @@ export default function (server: Server, ctx: AppContext) {
17
17
  return resultPassthru(
18
18
  await ctx.entrywayAgent.com.atproto.server.getSession(
19
19
  undefined,
20
- authPassthru(req),
20
+ ctx.entrywayPassthruHeaders(req),
21
21
  ),
22
22
  )
23
23
  }
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { AppContext } from '../../../../context'
3
2
  import { Server } from '../../../../lexicon'
4
3
  import { ids } from '../../../../lexicon/lexicons'
@@ -7,15 +6,14 @@ import { resultPassthru } from '../../../proxy'
7
6
  export default function (server: Server, ctx: AppContext) {
8
7
  server.com.atproto.server.listAppPasswords({
9
8
  auth: ctx.authVerifier.accessStandard(),
10
- handler: async ({ auth }) => {
9
+ handler: async ({ auth, req }) => {
11
10
  if (ctx.entrywayAgent) {
12
- assert(ctx.cfg.entryway)
13
11
  return resultPassthru(
14
12
  await ctx.entrywayAgent.com.atproto.server.listAppPasswords(
15
13
  undefined,
16
- await ctx.serviceAuthHeaders(
14
+ await ctx.entrywayAuthHeaders(
15
+ req,
17
16
  auth.credentials.did,
18
- ctx.cfg.entryway.did,
19
17
  ids.ComAtprotoServerListAppPasswords,
20
18
  ),
21
19
  ),
@@ -4,7 +4,7 @@ import { formatAccountStatus } from '../../../../account-manager'
4
4
  import { AppContext } from '../../../../context'
5
5
  import { softDeleted } from '../../../../db/util'
6
6
  import { Server } from '../../../../lexicon'
7
- import { authPassthru, resultPassthru } from '../../../proxy'
7
+ import { resultPassthru } from '../../../proxy'
8
8
  import { didDocForSession } from './util'
9
9
 
10
10
  export default function (server: Server, ctx: AppContext) {
@@ -32,7 +32,7 @@ export default function (server: Server, ctx: AppContext) {
32
32
  return resultPassthru(
33
33
  await ctx.entrywayAgent.com.atproto.server.refreshSession(
34
34
  undefined,
35
- authPassthru(req),
35
+ ctx.entrywayPassthruHeaders(req),
36
36
  ),
37
37
  )
38
38
  }
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { DAY, HOUR } from '@atproto/common'
3
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
3
  import { AppContext } from '../../../../context'
@@ -20,7 +19,7 @@ export default function (server: Server, ctx: AppContext) {
20
19
  },
21
20
  ],
22
21
  auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
23
- handler: async ({ auth }) => {
22
+ handler: async ({ auth, req }) => {
24
23
  const did = auth.credentials.did
25
24
  const account = await ctx.accountManager.getAccount(did, {
26
25
  includeDeactivated: true,
@@ -31,12 +30,11 @@ export default function (server: Server, ctx: AppContext) {
31
30
  }
32
31
 
33
32
  if (ctx.entrywayAgent) {
34
- assert(ctx.cfg.entryway)
35
33
  await ctx.entrywayAgent.com.atproto.server.requestAccountDelete(
36
34
  undefined,
37
- await ctx.serviceAuthHeaders(
35
+ await ctx.entrywayAuthHeaders(
36
+ req,
38
37
  auth.credentials.did,
39
- ctx.cfg.entryway.did,
40
38
  ids.ComAtprotoServerRequestAccountDelete,
41
39
  ),
42
40
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { DAY, HOUR } from '@atproto/common'
3
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
3
  import { AppContext } from '../../../../context'
@@ -20,7 +19,7 @@ export default function (server: Server, ctx: AppContext) {
20
19
  },
21
20
  ],
22
21
  auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
23
- handler: async ({ auth }) => {
22
+ handler: async ({ auth, req }) => {
24
23
  const did = auth.credentials.did
25
24
  const account = await ctx.accountManager.getAccount(did, {
26
25
  includeDeactivated: true,
@@ -31,12 +30,11 @@ export default function (server: Server, ctx: AppContext) {
31
30
  }
32
31
 
33
32
  if (ctx.entrywayAgent) {
34
- assert(ctx.cfg.entryway)
35
33
  await ctx.entrywayAgent.com.atproto.server.requestEmailConfirmation(
36
34
  undefined,
37
- await ctx.serviceAuthHeaders(
35
+ await ctx.entrywayAuthHeaders(
36
+ req,
38
37
  auth.credentials.did,
39
- ctx.cfg.entryway.did,
40
38
  ids.ComAtprotoServerRequestEmailConfirmation,
41
39
  ),
42
40
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { DAY, HOUR } from '@atproto/common'
3
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
3
  import { AppContext } from '../../../../context'
@@ -21,7 +20,7 @@ export default function (server: Server, ctx: AppContext) {
21
20
  },
22
21
  ],
23
22
  auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
24
- handler: async ({ auth }) => {
23
+ handler: async ({ auth, req }) => {
25
24
  const did = auth.credentials.did
26
25
  const account = await ctx.accountManager.getAccount(did, {
27
26
  includeDeactivated: true,
@@ -32,13 +31,12 @@ export default function (server: Server, ctx: AppContext) {
32
31
  }
33
32
 
34
33
  if (ctx.entrywayAgent) {
35
- assert(ctx.cfg.entryway)
36
34
  return resultPassthru(
37
35
  await ctx.entrywayAgent.com.atproto.server.requestEmailUpdate(
38
36
  undefined,
39
- await ctx.serviceAuthHeaders(
37
+ await ctx.entrywayAuthHeaders(
38
+ req,
40
39
  auth.credentials.did,
41
- ctx.cfg.entryway.did,
42
40
  ids.ComAtprotoServerRequestEmailUpdate,
43
41
  ),
44
42
  ),
@@ -2,7 +2,6 @@ import { DAY, HOUR } from '@atproto/common'
2
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
3
3
  import { AppContext } from '../../../../context'
4
4
  import { Server } from '../../../../lexicon'
5
- import { authPassthru } from '../../../proxy'
6
5
 
7
6
  export default function (server: Server, ctx: AppContext) {
8
7
  server.com.atproto.server.requestPasswordReset({
@@ -28,7 +27,7 @@ export default function (server: Server, ctx: AppContext) {
28
27
  if (ctx.entrywayAgent) {
29
28
  await ctx.entrywayAgent.com.atproto.server.requestPasswordReset(
30
29
  input.body,
31
- authPassthru(req, true),
30
+ ctx.entrywayPassthruHeaders(req),
32
31
  )
33
32
  return
34
33
  }
@@ -1,7 +1,6 @@
1
1
  import { MINUTE } from '@atproto/common'
2
2
  import { AppContext } from '../../../../context'
3
3
  import { Server } from '../../../../lexicon'
4
- import { authPassthru } from '../../../proxy'
5
4
 
6
5
  export default function (server: Server, ctx: AppContext) {
7
6
  server.com.atproto.server.resetPassword({
@@ -15,7 +14,7 @@ export default function (server: Server, ctx: AppContext) {
15
14
  if (ctx.entrywayAgent) {
16
15
  await ctx.entrywayAgent.com.atproto.server.resetPassword(
17
16
  input.body,
18
- authPassthru(req, true),
17
+ ctx.entrywayPassthruHeaders(req),
19
18
  )
20
19
  return
21
20
  }
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { AppContext } from '../../../../context'
3
2
  import { Server } from '../../../../lexicon'
4
3
  import { ids } from '../../../../lexicon/lexicons'
@@ -6,14 +5,13 @@ import { ids } from '../../../../lexicon/lexicons'
6
5
  export default function (server: Server, ctx: AppContext) {
7
6
  server.com.atproto.server.revokeAppPassword({
8
7
  auth: ctx.authVerifier.accessStandard(),
9
- handler: async ({ auth, input }) => {
8
+ handler: async ({ auth, input, req }) => {
10
9
  if (ctx.entrywayAgent) {
11
- assert(ctx.cfg.entryway)
12
10
  await ctx.entrywayAgent.com.atproto.server.revokeAppPassword(
13
11
  input.body,
14
- await ctx.serviceAuthHeaders(
12
+ await ctx.entrywayAuthHeaders(
13
+ req,
15
14
  auth.credentials.did,
16
- ctx.cfg.entryway.did,
17
15
  ids.ComAtprotoServerRevokeAppPassword,
18
16
  ),
19
17
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { isEmailValid } from '@hapi/address'
3
2
  import { isDisposableEmail } from 'disposable-email-domains-js'
4
3
  import { InvalidRequestError } from '@atproto/xrpc-server'
@@ -10,7 +9,7 @@ import { ids } from '../../../../lexicon/lexicons'
10
9
  export default function (server: Server, ctx: AppContext) {
11
10
  server.com.atproto.server.updateEmail({
12
11
  auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
13
- handler: async ({ auth, input }) => {
12
+ handler: async ({ auth, input, req }) => {
14
13
  const did = auth.credentials.did
15
14
  const { token, email } = input.body
16
15
  if (!isEmailValid(email) || isDisposableEmail(email)) {
@@ -26,12 +25,11 @@ export default function (server: Server, ctx: AppContext) {
26
25
  }
27
26
 
28
27
  if (ctx.entrywayAgent) {
29
- assert(ctx.cfg.entryway)
30
28
  await ctx.entrywayAgent.com.atproto.server.updateEmail(
31
29
  input.body,
32
- await ctx.serviceAuthHeaders(
30
+ await ctx.entrywayAuthHeaders(
31
+ req,
33
32
  auth.credentials.did,
34
- ctx.cfg.entryway.did,
35
33
  ids.ComAtprotoServerUpdateEmail,
36
34
  ),
37
35
  )
@@ -25,9 +25,7 @@ export default function (server: Server, ctx: AppContext) {
25
25
  let carStream: stream.Readable
26
26
  try {
27
27
  const storage = new SqlRepoReader(actorDb)
28
- const commit = params.commit
29
- ? CID.parse(params.commit)
30
- : await storage.getRoot()
28
+ const commit = await storage.getRoot()
31
29
 
32
30
  if (!commit) {
33
31
  throw new InvalidRequestError(`Could not find repo for DID: ${did}`)
@@ -1,7 +1,7 @@
1
1
  import { AuthScope } from '../../../../auth-verifier'
2
2
  import { AppContext } from '../../../../context'
3
3
  import { Server } from '../../../../lexicon'
4
- import { authPassthru, resultPassthru } from '../../../proxy'
4
+ import { resultPassthru } from '../../../proxy'
5
5
 
6
6
  // THIS IS A TEMPORARY UNSPECCED ROUTE
7
7
  export default function (server: Server, ctx: AppContext) {
@@ -21,7 +21,7 @@ export default function (server: Server, ctx: AppContext) {
21
21
  return resultPassthru(
22
22
  await ctx.entrywayAgent.com.atproto.temp.checkSignupQueue(
23
23
  undefined,
24
- authPassthru(req),
24
+ ctx.entrywayPassthruHeaders(req),
25
25
  ),
26
26
  )
27
27
  },
package/src/api/proxy.ts CHANGED
@@ -1,4 +1,5 @@
1
1
  import { IncomingMessage } from 'node:http'
2
+ import express from 'express'
2
3
  import { Headers } from '@atproto/xrpc'
3
4
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
5
 
@@ -10,21 +11,7 @@ export const resultPassthru = <T>(result: { headers: Headers; data: T }) => {
10
11
  }
11
12
  }
12
13
 
13
- // Output designed to passed as second arg to AtpAgent methods.
14
- // The encoding field here is a quirk of the AtpAgent.
15
- export function authPassthru(
16
- req: IncomingMessage,
17
- withEncoding?: false,
18
- ): { headers: { authorization: string }; encoding: undefined } | undefined
19
-
20
- export function authPassthru(
21
- req: IncomingMessage,
22
- withEncoding: true,
23
- ):
24
- | { headers: { authorization: string }; encoding: 'application/json' }
25
- | undefined
26
-
27
- export function authPassthru(req: IncomingMessage, withEncoding?: boolean) {
14
+ export function authPassthru(req: IncomingMessage) {
28
15
  const { authorization } = req.headers
29
16
 
30
17
  if (authorization) {
@@ -45,9 +32,22 @@ export function authPassthru(req: IncomingMessage, withEncoding?: boolean) {
45
32
  throw new InvalidRequestError('DPoP requests cannot be proxied')
46
33
  }
47
34
 
48
- return {
49
- headers: { authorization },
50
- encoding: withEncoding ? 'application/json' : undefined,
51
- }
35
+ return { headers: { authorization } }
52
36
  }
53
37
  }
38
+
39
+ // @NOTE this function may mutate its params input
40
+ // future improvement here would be to forward along all untrusted ips rather than just the first (req.ip)
41
+ export const forwardedFor = (
42
+ req: express.Request,
43
+ params: HeadersParam | undefined,
44
+ ) => {
45
+ const result: HeadersParam = params ?? { headers: {} }
46
+ const ip = req.ip
47
+ if (ip) {
48
+ result.headers['x-forwarded-for'] = ip
49
+ }
50
+ return result
51
+ }
52
+
53
+ type HeadersParam = { headers: Record<string, string> }
package/src/context.ts CHANGED
@@ -1,5 +1,6 @@
1
1
  import assert from 'node:assert'
2
2
  import * as plc from '@did-plc/lib'
3
+ import express from 'express'
3
4
  import { Redis } from 'ioredis'
4
5
  import * as nodemailer from 'nodemailer'
5
6
  import * as undici from 'undici'
@@ -25,6 +26,7 @@ import {
25
26
  } from '@atproto-labs/fetch-node'
26
27
  import { AccountManager } from './account-manager'
27
28
  import { ActorStore } from './actor-store/actor-store'
29
+ import { authPassthru, forwardedFor } from './api/proxy'
28
30
  import {
29
31
  AuthVerifier,
30
32
  createPublicKeyObject,
@@ -333,6 +335,9 @@ export class AppContext {
333
335
  dpopSecret: secrets.dpopSecret,
334
336
  customization: cfg.oauth.provider.customization,
335
337
  safeFetch,
338
+ // @TODO: Make this configurable. The legacy implementation used to
339
+ // blindly trust the X-Forwarded-For header.
340
+ trustProxy: (_addr: string, _i: number) => true,
336
341
  })
337
342
  : undefined
338
343
 
@@ -395,6 +400,20 @@ export class AppContext {
395
400
  return this.serviceAuthHeaders(did, this.bskyAppView.did, lxm)
396
401
  }
397
402
 
403
+ async entrywayAuthHeaders(req: express.Request, did: string, lxm: string) {
404
+ assert(this.cfg.entryway)
405
+ const headers = await this.serviceAuthHeaders(
406
+ did,
407
+ this.cfg.entryway.did,
408
+ lxm,
409
+ )
410
+ return forwardedFor(req, headers)
411
+ }
412
+
413
+ entrywayPassthruHeaders(req: express.Request) {
414
+ return forwardedFor(req, authPassthru(req))
415
+ }
416
+
398
417
  async serviceAuthHeaders(did: string, aud: string, lxm: string) {
399
418
  const keypair = await this.actorStore.keypair(did)
400
419
  return createServiceAuthHeaders({
package/src/index.ts CHANGED
@@ -122,7 +122,7 @@ export class PDS {
122
122
  server = API(server, ctx)
123
123
 
124
124
  const app = express()
125
- app.set('trust proxy', true)
125
+ app.set('trust proxy', ['loopback', 'linklocal', 'uniquelocal'])
126
126
  app.use(loggerMiddleware)
127
127
  app.use(compression())
128
128
  app.use(authRoutes.createRouter(ctx)) // Before CORS
@@ -1278,6 +1278,11 @@ export const schemaDict = {
1278
1278
  type: 'token',
1279
1279
  description: 'Appeal: appeal a previously taken moderation action',
1280
1280
  },
1281
+ subjectType: {
1282
+ type: 'string',
1283
+ description: 'Tag describing a type of subject that might be reported.',
1284
+ knownValues: ['account', 'record', 'chat'],
1285
+ },
1281
1286
  },
1282
1287
  },
1283
1288
  ComAtprotoRepoApplyWrites: {
@@ -1855,16 +1860,6 @@ export const schemaDict = {
1855
1860
  cursor: {
1856
1861
  type: 'string',
1857
1862
  },
1858
- rkeyStart: {
1859
- type: 'string',
1860
- description:
1861
- 'DEPRECATED: The lowest sort-ordered rkey to start from (exclusive)',
1862
- },
1863
- rkeyEnd: {
1864
- type: 'string',
1865
- description:
1866
- 'DEPRECATED: The highest sort-ordered rkey to stop at (exclusive)',
1867
- },
1868
1863
  reverse: {
1869
1864
  type: 'boolean',
1870
1865
  description: 'Flag to reverse the order of the returned records.',
@@ -3405,12 +3400,6 @@ export const schemaDict = {
3405
3400
  description: 'Record Key',
3406
3401
  format: 'record-key',
3407
3402
  },
3408
- commit: {
3409
- type: 'string',
3410
- format: 'cid',
3411
- description:
3412
- 'DEPRECATED: referenced a repo commit by CID, and retrieved record as of that commit',
3413
- },
3414
3403
  },
3415
3404
  },
3416
3405
  output: {
@@ -3759,7 +3748,7 @@ export const schemaDict = {
3759
3748
  main: {
3760
3749
  type: 'procedure',
3761
3750
  description:
3762
- 'Notify a crawling service of a recent update, and that crawling should resume. Intended use is after a gap between repo stream events caused the crawling service to disconnect. Does not require auth; implemented by Relay.',
3751
+ 'Notify a crawling service of a recent update, and that crawling should resume. Intended use is after a gap between repo stream events caused the crawling service to disconnect. Does not require auth; implemented by Relay. DEPRECATED: just use com.atproto.sync.requestCrawl',
3763
3752
  input: {
3764
3753
  encoding: 'application/json',
3765
3754
  schema: {
@@ -9055,6 +9044,33 @@ export const schemaDict = {
9055
9044
  ref: 'lex:com.atproto.label.defs#label',
9056
9045
  },
9057
9046
  },
9047
+ reasonTypes: {
9048
+ description:
9049
+ "The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed.",
9050
+ type: 'array',
9051
+ items: {
9052
+ type: 'ref',
9053
+ ref: 'lex:com.atproto.moderation.defs#reasonType',
9054
+ },
9055
+ },
9056
+ subjectTypes: {
9057
+ description:
9058
+ 'The set of subject types (account, record, etc) this service accepts reports on.',
9059
+ type: 'array',
9060
+ items: {
9061
+ type: 'ref',
9062
+ ref: 'lex:com.atproto.moderation.defs#subjectType',
9063
+ },
9064
+ },
9065
+ subjectCollections: {
9066
+ type: 'array',
9067
+ description:
9068
+ 'Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type.',
9069
+ items: {
9070
+ type: 'string',
9071
+ format: 'nsid',
9072
+ },
9073
+ },
9058
9074
  },
9059
9075
  },
9060
9076
  labelerViewerState: {
@@ -9162,6 +9178,33 @@ export const schemaDict = {
9162
9178
  type: 'string',
9163
9179
  format: 'datetime',
9164
9180
  },
9181
+ reasonTypes: {
9182
+ description:
9183
+ "The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed.",
9184
+ type: 'array',
9185
+ items: {
9186
+ type: 'ref',
9187
+ ref: 'lex:com.atproto.moderation.defs#reasonType',
9188
+ },
9189
+ },
9190
+ subjectTypes: {
9191
+ description:
9192
+ 'The set of subject types (account, record, etc) this service accepts reports on.',
9193
+ type: 'array',
9194
+ items: {
9195
+ type: 'ref',
9196
+ ref: 'lex:com.atproto.moderation.defs#subjectType',
9197
+ },
9198
+ },
9199
+ subjectCollections: {
9200
+ type: 'array',
9201
+ description:
9202
+ 'Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type.',
9203
+ items: {
9204
+ type: 'string',
9205
+ format: 'nsid',
9206
+ },
9207
+ },
9165
9208
  },
9166
9209
  },
9167
9210
  },