@atproto/pds 0.4.103 → 0.4.104

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (158) hide show
  1. package/CHANGELOG.md +13 -0
  2. package/dist/api/com/atproto/admin/sendEmail.d.ts.map +1 -1
  3. package/dist/api/com/atproto/admin/sendEmail.js +2 -7
  4. package/dist/api/com/atproto/admin/sendEmail.js.map +1 -1
  5. package/dist/api/com/atproto/admin/updateAccountEmail.d.ts.map +1 -1
  6. package/dist/api/com/atproto/admin/updateAccountEmail.js +1 -2
  7. package/dist/api/com/atproto/admin/updateAccountEmail.js.map +1 -1
  8. package/dist/api/com/atproto/admin/updateAccountPassword.d.ts.map +1 -1
  9. package/dist/api/com/atproto/admin/updateAccountPassword.js +1 -2
  10. package/dist/api/com/atproto/admin/updateAccountPassword.js.map +1 -1
  11. package/dist/api/com/atproto/identity/requestPlcOperationSignature.d.ts.map +1 -1
  12. package/dist/api/com/atproto/identity/requestPlcOperationSignature.js +2 -7
  13. package/dist/api/com/atproto/identity/requestPlcOperationSignature.js.map +1 -1
  14. package/dist/api/com/atproto/identity/signPlcOperation.d.ts.map +1 -1
  15. package/dist/api/com/atproto/identity/signPlcOperation.js +2 -7
  16. package/dist/api/com/atproto/identity/signPlcOperation.js.map +1 -1
  17. package/dist/api/com/atproto/identity/updateHandle.d.ts.map +1 -1
  18. package/dist/api/com/atproto/identity/updateHandle.js +2 -7
  19. package/dist/api/com/atproto/identity/updateHandle.js.map +1 -1
  20. package/dist/api/com/atproto/repo/applyWrites.d.ts.map +1 -1
  21. package/dist/api/com/atproto/repo/applyWrites.js +12 -7
  22. package/dist/api/com/atproto/repo/applyWrites.js.map +1 -1
  23. package/dist/api/com/atproto/repo/createRecord.d.ts.map +1 -1
  24. package/dist/api/com/atproto/repo/createRecord.js +12 -8
  25. package/dist/api/com/atproto/repo/createRecord.js.map +1 -1
  26. package/dist/api/com/atproto/repo/deleteRecord.d.ts.map +1 -1
  27. package/dist/api/com/atproto/repo/deleteRecord.js +12 -7
  28. package/dist/api/com/atproto/repo/deleteRecord.js.map +1 -1
  29. package/dist/api/com/atproto/repo/listRecords.d.ts.map +1 -1
  30. package/dist/api/com/atproto/repo/listRecords.js +1 -3
  31. package/dist/api/com/atproto/repo/listRecords.js.map +1 -1
  32. package/dist/api/com/atproto/repo/putRecord.d.ts.map +1 -1
  33. package/dist/api/com/atproto/repo/putRecord.js +11 -8
  34. package/dist/api/com/atproto/repo/putRecord.js.map +1 -1
  35. package/dist/api/com/atproto/server/activateAccount.d.ts.map +1 -1
  36. package/dist/api/com/atproto/server/activateAccount.js +1 -2
  37. package/dist/api/com/atproto/server/activateAccount.js.map +1 -1
  38. package/dist/api/com/atproto/server/confirmEmail.d.ts.map +1 -1
  39. package/dist/api/com/atproto/server/confirmEmail.js +2 -7
  40. package/dist/api/com/atproto/server/confirmEmail.js.map +1 -1
  41. package/dist/api/com/atproto/server/createAppPassword.d.ts.map +1 -1
  42. package/dist/api/com/atproto/server/createAppPassword.js +2 -7
  43. package/dist/api/com/atproto/server/createAppPassword.js.map +1 -1
  44. package/dist/api/com/atproto/server/createSession.js +1 -1
  45. package/dist/api/com/atproto/server/createSession.js.map +1 -1
  46. package/dist/api/com/atproto/server/deactivateAccount.d.ts.map +1 -1
  47. package/dist/api/com/atproto/server/deactivateAccount.js +1 -2
  48. package/dist/api/com/atproto/server/deactivateAccount.js.map +1 -1
  49. package/dist/api/com/atproto/server/deleteAccount.d.ts.map +1 -1
  50. package/dist/api/com/atproto/server/deleteAccount.js +1 -2
  51. package/dist/api/com/atproto/server/deleteAccount.js.map +1 -1
  52. package/dist/api/com/atproto/server/deleteSession.d.ts.map +1 -1
  53. package/dist/api/com/atproto/server/deleteSession.js +2 -3
  54. package/dist/api/com/atproto/server/deleteSession.js.map +1 -1
  55. package/dist/api/com/atproto/server/getAccountInviteCodes.d.ts.map +1 -1
  56. package/dist/api/com/atproto/server/getAccountInviteCodes.js +2 -7
  57. package/dist/api/com/atproto/server/getAccountInviteCodes.js.map +1 -1
  58. package/dist/api/com/atproto/server/getSession.js +1 -1
  59. package/dist/api/com/atproto/server/getSession.js.map +1 -1
  60. package/dist/api/com/atproto/server/listAppPasswords.d.ts.map +1 -1
  61. package/dist/api/com/atproto/server/listAppPasswords.js +2 -7
  62. package/dist/api/com/atproto/server/listAppPasswords.js.map +1 -1
  63. package/dist/api/com/atproto/server/refreshSession.js +1 -1
  64. package/dist/api/com/atproto/server/refreshSession.js.map +1 -1
  65. package/dist/api/com/atproto/server/requestAccountDelete.d.ts.map +1 -1
  66. package/dist/api/com/atproto/server/requestAccountDelete.js +2 -7
  67. package/dist/api/com/atproto/server/requestAccountDelete.js.map +1 -1
  68. package/dist/api/com/atproto/server/requestEmailConfirmation.d.ts.map +1 -1
  69. package/dist/api/com/atproto/server/requestEmailConfirmation.js +2 -7
  70. package/dist/api/com/atproto/server/requestEmailConfirmation.js.map +1 -1
  71. package/dist/api/com/atproto/server/requestEmailUpdate.d.ts.map +1 -1
  72. package/dist/api/com/atproto/server/requestEmailUpdate.js +2 -7
  73. package/dist/api/com/atproto/server/requestEmailUpdate.js.map +1 -1
  74. package/dist/api/com/atproto/server/requestPasswordReset.d.ts.map +1 -1
  75. package/dist/api/com/atproto/server/requestPasswordReset.js +1 -2
  76. package/dist/api/com/atproto/server/requestPasswordReset.js.map +1 -1
  77. package/dist/api/com/atproto/server/resetPassword.d.ts.map +1 -1
  78. package/dist/api/com/atproto/server/resetPassword.js +1 -2
  79. package/dist/api/com/atproto/server/resetPassword.js.map +1 -1
  80. package/dist/api/com/atproto/server/revokeAppPassword.d.ts.map +1 -1
  81. package/dist/api/com/atproto/server/revokeAppPassword.js +2 -7
  82. package/dist/api/com/atproto/server/revokeAppPassword.js.map +1 -1
  83. package/dist/api/com/atproto/server/updateEmail.d.ts.map +1 -1
  84. package/dist/api/com/atproto/server/updateEmail.js +2 -7
  85. package/dist/api/com/atproto/server/updateEmail.js.map +1 -1
  86. package/dist/api/com/atproto/sync/getRecord.d.ts.map +1 -1
  87. package/dist/api/com/atproto/sync/getRecord.js +1 -4
  88. package/dist/api/com/atproto/sync/getRecord.js.map +1 -1
  89. package/dist/api/com/atproto/temp/checkSignupQueue.js +1 -1
  90. package/dist/api/com/atproto/temp/checkSignupQueue.js.map +1 -1
  91. package/dist/api/proxy.d.ts +7 -8
  92. package/dist/api/proxy.d.ts.map +1 -1
  93. package/dist/api/proxy.js +14 -6
  94. package/dist/api/proxy.js.map +1 -1
  95. package/dist/context.d.ts +7 -0
  96. package/dist/context.d.ts.map +1 -1
  97. package/dist/context.js +9 -0
  98. package/dist/context.js.map +1 -1
  99. package/dist/index.js +1 -1
  100. package/dist/index.js.map +1 -1
  101. package/dist/lexicon/lexicons.d.ts +108 -28
  102. package/dist/lexicon/lexicons.d.ts.map +1 -1
  103. package/dist/lexicon/lexicons.js +54 -14
  104. package/dist/lexicon/lexicons.js.map +1 -1
  105. package/dist/lexicon/types/app/bsky/labeler/defs.d.ts +7 -0
  106. package/dist/lexicon/types/app/bsky/labeler/defs.d.ts.map +1 -1
  107. package/dist/lexicon/types/app/bsky/labeler/defs.js.map +1 -1
  108. package/dist/lexicon/types/app/bsky/labeler/service.d.ts +7 -0
  109. package/dist/lexicon/types/app/bsky/labeler/service.d.ts.map +1 -1
  110. package/dist/lexicon/types/app/bsky/labeler/service.js.map +1 -1
  111. package/dist/lexicon/types/com/atproto/moderation/defs.d.ts +2 -0
  112. package/dist/lexicon/types/com/atproto/moderation/defs.d.ts.map +1 -1
  113. package/dist/lexicon/types/com/atproto/repo/listRecords.d.ts +0 -4
  114. package/dist/lexicon/types/com/atproto/repo/listRecords.d.ts.map +1 -1
  115. package/dist/lexicon/types/com/atproto/repo/listRecords.js.map +1 -1
  116. package/dist/lexicon/types/com/atproto/sync/getRecord.d.ts +0 -2
  117. package/dist/lexicon/types/com/atproto/sync/getRecord.d.ts.map +1 -1
  118. package/package.json +4 -4
  119. package/src/api/com/atproto/admin/sendEmail.ts +3 -5
  120. package/src/api/com/atproto/admin/updateAccountEmail.ts +1 -2
  121. package/src/api/com/atproto/admin/updateAccountPassword.ts +1 -2
  122. package/src/api/com/atproto/identity/requestPlcOperationSignature.ts +3 -5
  123. package/src/api/com/atproto/identity/signPlcOperation.ts +3 -5
  124. package/src/api/com/atproto/identity/updateHandle.ts +3 -6
  125. package/src/api/com/atproto/repo/applyWrites.ts +21 -11
  126. package/src/api/com/atproto/repo/createRecord.ts +19 -14
  127. package/src/api/com/atproto/repo/deleteRecord.ts +26 -14
  128. package/src/api/com/atproto/repo/listRecords.ts +1 -11
  129. package/src/api/com/atproto/repo/putRecord.ts +24 -16
  130. package/src/api/com/atproto/server/activateAccount.ts +1 -2
  131. package/src/api/com/atproto/server/confirmEmail.ts +3 -5
  132. package/src/api/com/atproto/server/createAppPassword.ts +3 -6
  133. package/src/api/com/atproto/server/createSession.ts +2 -2
  134. package/src/api/com/atproto/server/deactivateAccount.ts +1 -2
  135. package/src/api/com/atproto/server/deleteAccount.ts +1 -2
  136. package/src/api/com/atproto/server/deleteSession.ts +2 -3
  137. package/src/api/com/atproto/server/getAccountInviteCodes.ts +3 -5
  138. package/src/api/com/atproto/server/getSession.ts +2 -2
  139. package/src/api/com/atproto/server/listAppPasswords.ts +3 -5
  140. package/src/api/com/atproto/server/refreshSession.ts +2 -2
  141. package/src/api/com/atproto/server/requestAccountDelete.ts +3 -5
  142. package/src/api/com/atproto/server/requestEmailConfirmation.ts +3 -5
  143. package/src/api/com/atproto/server/requestEmailUpdate.ts +3 -5
  144. package/src/api/com/atproto/server/requestPasswordReset.ts +1 -2
  145. package/src/api/com/atproto/server/resetPassword.ts +1 -2
  146. package/src/api/com/atproto/server/revokeAppPassword.ts +3 -5
  147. package/src/api/com/atproto/server/updateEmail.ts +3 -5
  148. package/src/api/com/atproto/sync/getRecord.ts +1 -3
  149. package/src/api/com/atproto/temp/checkSignupQueue.ts +2 -2
  150. package/src/api/proxy.ts +19 -19
  151. package/src/context.ts +16 -0
  152. package/src/index.ts +1 -1
  153. package/src/lexicon/lexicons.ts +60 -17
  154. package/src/lexicon/types/app/bsky/labeler/defs.ts +7 -0
  155. package/src/lexicon/types/app/bsky/labeler/service.ts +7 -0
  156. package/src/lexicon/types/com/atproto/moderation/defs.ts +3 -0
  157. package/src/lexicon/types/com/atproto/repo/listRecords.ts +0 -4
  158. package/src/lexicon/types/com/atproto/sync/getRecord.ts +0 -2
@@ -4,7 +4,7 @@ import { AuthRequiredError } from '@atproto/xrpc-server'
4
4
  import { formatAccountStatus } from '../../../../account-manager'
5
5
  import { AppContext } from '../../../../context'
6
6
  import { Server } from '../../../../lexicon'
7
- import { authPassthru, resultPassthru } from '../../../proxy'
7
+ import { resultPassthru } from '../../../proxy'
8
8
  import { didDocForSession } from './util'
9
9
 
10
10
  export default function (server: Server, ctx: AppContext) {
@@ -26,7 +26,7 @@ export default function (server: Server, ctx: AppContext) {
26
26
  return resultPassthru(
27
27
  await ctx.entrywayAgent.com.atproto.server.createSession(
28
28
  input.body,
29
- authPassthru(req, true),
29
+ ctx.entrywayPassthruHeaders(req),
30
30
  ),
31
31
  )
32
32
  }
@@ -1,7 +1,6 @@
1
1
  import { AuthScope } from '../../../../auth-verifier'
2
2
  import { AppContext } from '../../../../context'
3
3
  import { Server } from '../../../../lexicon'
4
- import { authPassthru } from '../../../proxy'
5
4
 
6
5
  export default function (server: Server, ctx: AppContext) {
7
6
  server.com.atproto.server.deactivateAccount({
@@ -11,7 +10,7 @@ export default function (server: Server, ctx: AppContext) {
11
10
  if (ctx.entrywayAgent) {
12
11
  await ctx.entrywayAgent.com.atproto.server.deactivateAccount(
13
12
  input.body,
14
- authPassthru(req),
13
+ ctx.entrywayPassthruHeaders(req),
15
14
  )
16
15
  return
17
16
  }
@@ -3,7 +3,6 @@ import { AuthRequiredError, InvalidRequestError } from '@atproto/xrpc-server'
3
3
  import { AccountStatus } from '../../../../account-manager'
4
4
  import { AppContext } from '../../../../context'
5
5
  import { Server } from '../../../../lexicon'
6
- import { authPassthru } from '../../../proxy'
7
6
 
8
7
  export default function (server: Server, ctx: AppContext) {
9
8
  server.com.atproto.server.deleteAccount({
@@ -25,7 +24,7 @@ export default function (server: Server, ctx: AppContext) {
25
24
  if (ctx.entrywayAgent) {
26
25
  await ctx.entrywayAgent.com.atproto.server.deleteAccount(
27
26
  input.body,
28
- authPassthru(req, true),
27
+ ctx.entrywayPassthruHeaders(req),
29
28
  )
30
29
  return
31
30
  }
@@ -1,14 +1,13 @@
1
1
  import { AppContext } from '../../../../context'
2
2
  import { Server } from '../../../../lexicon'
3
- import { authPassthru } from '../../../proxy'
4
3
 
5
4
  export default function (server: Server, ctx: AppContext) {
6
5
  const { entrywayAgent } = ctx
7
6
  if (entrywayAgent) {
8
- server.com.atproto.server.deleteSession(async (reqCtx) => {
7
+ server.com.atproto.server.deleteSession(async ({ req }) => {
9
8
  await entrywayAgent.com.atproto.server.deleteSession(
10
9
  undefined,
11
- authPassthru(reqCtx.req),
10
+ ctx.entrywayPassthruHeaders(req),
12
11
  )
13
12
  })
14
13
  } else {
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { InvalidRequestError } from '@atproto/xrpc-server'
3
2
  import { CodeDetail } from '../../../../account-manager/helpers/invite'
4
3
  import { AppContext } from '../../../../context'
@@ -10,15 +9,14 @@ import { genInvCodes } from './util'
10
9
  export default function (server: Server, ctx: AppContext) {
11
10
  server.com.atproto.server.getAccountInviteCodes({
12
11
  auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
13
- handler: async ({ params, auth }) => {
12
+ handler: async ({ params, auth, req }) => {
14
13
  if (ctx.entrywayAgent) {
15
- assert(ctx.cfg.entryway)
16
14
  return resultPassthru(
17
15
  await ctx.entrywayAgent.com.atproto.server.getAccountInviteCodes(
18
16
  params,
19
- await ctx.serviceAuthHeaders(
17
+ await ctx.entrywayAuthHeaders(
18
+ req,
20
19
  auth.credentials.did,
21
- ctx.cfg.entryway.did,
22
20
  ids.ComAtprotoServerGetAccountInviteCodes,
23
21
  ),
24
22
  ),
@@ -4,7 +4,7 @@ import { formatAccountStatus } from '../../../../account-manager'
4
4
  import { AuthScope } from '../../../../auth-verifier'
5
5
  import { AppContext } from '../../../../context'
6
6
  import { Server } from '../../../../lexicon'
7
- import { authPassthru, resultPassthru } from '../../../proxy'
7
+ import { resultPassthru } from '../../../proxy'
8
8
  import { didDocForSession } from './util'
9
9
 
10
10
  export default function (server: Server, ctx: AppContext) {
@@ -17,7 +17,7 @@ export default function (server: Server, ctx: AppContext) {
17
17
  return resultPassthru(
18
18
  await ctx.entrywayAgent.com.atproto.server.getSession(
19
19
  undefined,
20
- authPassthru(req),
20
+ ctx.entrywayPassthruHeaders(req),
21
21
  ),
22
22
  )
23
23
  }
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { AppContext } from '../../../../context'
3
2
  import { Server } from '../../../../lexicon'
4
3
  import { ids } from '../../../../lexicon/lexicons'
@@ -7,15 +6,14 @@ import { resultPassthru } from '../../../proxy'
7
6
  export default function (server: Server, ctx: AppContext) {
8
7
  server.com.atproto.server.listAppPasswords({
9
8
  auth: ctx.authVerifier.accessStandard(),
10
- handler: async ({ auth }) => {
9
+ handler: async ({ auth, req }) => {
11
10
  if (ctx.entrywayAgent) {
12
- assert(ctx.cfg.entryway)
13
11
  return resultPassthru(
14
12
  await ctx.entrywayAgent.com.atproto.server.listAppPasswords(
15
13
  undefined,
16
- await ctx.serviceAuthHeaders(
14
+ await ctx.entrywayAuthHeaders(
15
+ req,
17
16
  auth.credentials.did,
18
- ctx.cfg.entryway.did,
19
17
  ids.ComAtprotoServerListAppPasswords,
20
18
  ),
21
19
  ),
@@ -4,7 +4,7 @@ import { formatAccountStatus } from '../../../../account-manager'
4
4
  import { AppContext } from '../../../../context'
5
5
  import { softDeleted } from '../../../../db/util'
6
6
  import { Server } from '../../../../lexicon'
7
- import { authPassthru, resultPassthru } from '../../../proxy'
7
+ import { resultPassthru } from '../../../proxy'
8
8
  import { didDocForSession } from './util'
9
9
 
10
10
  export default function (server: Server, ctx: AppContext) {
@@ -32,7 +32,7 @@ export default function (server: Server, ctx: AppContext) {
32
32
  return resultPassthru(
33
33
  await ctx.entrywayAgent.com.atproto.server.refreshSession(
34
34
  undefined,
35
- authPassthru(req),
35
+ ctx.entrywayPassthruHeaders(req),
36
36
  ),
37
37
  )
38
38
  }
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { DAY, HOUR } from '@atproto/common'
3
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
3
  import { AppContext } from '../../../../context'
@@ -20,7 +19,7 @@ export default function (server: Server, ctx: AppContext) {
20
19
  },
21
20
  ],
22
21
  auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
23
- handler: async ({ auth }) => {
22
+ handler: async ({ auth, req }) => {
24
23
  const did = auth.credentials.did
25
24
  const account = await ctx.accountManager.getAccount(did, {
26
25
  includeDeactivated: true,
@@ -31,12 +30,11 @@ export default function (server: Server, ctx: AppContext) {
31
30
  }
32
31
 
33
32
  if (ctx.entrywayAgent) {
34
- assert(ctx.cfg.entryway)
35
33
  await ctx.entrywayAgent.com.atproto.server.requestAccountDelete(
36
34
  undefined,
37
- await ctx.serviceAuthHeaders(
35
+ await ctx.entrywayAuthHeaders(
36
+ req,
38
37
  auth.credentials.did,
39
- ctx.cfg.entryway.did,
40
38
  ids.ComAtprotoServerRequestAccountDelete,
41
39
  ),
42
40
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { DAY, HOUR } from '@atproto/common'
3
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
3
  import { AppContext } from '../../../../context'
@@ -20,7 +19,7 @@ export default function (server: Server, ctx: AppContext) {
20
19
  },
21
20
  ],
22
21
  auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
23
- handler: async ({ auth }) => {
22
+ handler: async ({ auth, req }) => {
24
23
  const did = auth.credentials.did
25
24
  const account = await ctx.accountManager.getAccount(did, {
26
25
  includeDeactivated: true,
@@ -31,12 +30,11 @@ export default function (server: Server, ctx: AppContext) {
31
30
  }
32
31
 
33
32
  if (ctx.entrywayAgent) {
34
- assert(ctx.cfg.entryway)
35
33
  await ctx.entrywayAgent.com.atproto.server.requestEmailConfirmation(
36
34
  undefined,
37
- await ctx.serviceAuthHeaders(
35
+ await ctx.entrywayAuthHeaders(
36
+ req,
38
37
  auth.credentials.did,
39
- ctx.cfg.entryway.did,
40
38
  ids.ComAtprotoServerRequestEmailConfirmation,
41
39
  ),
42
40
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { DAY, HOUR } from '@atproto/common'
3
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
3
  import { AppContext } from '../../../../context'
@@ -21,7 +20,7 @@ export default function (server: Server, ctx: AppContext) {
21
20
  },
22
21
  ],
23
22
  auth: ctx.authVerifier.accessStandard({ checkTakedown: true }),
24
- handler: async ({ auth }) => {
23
+ handler: async ({ auth, req }) => {
25
24
  const did = auth.credentials.did
26
25
  const account = await ctx.accountManager.getAccount(did, {
27
26
  includeDeactivated: true,
@@ -32,13 +31,12 @@ export default function (server: Server, ctx: AppContext) {
32
31
  }
33
32
 
34
33
  if (ctx.entrywayAgent) {
35
- assert(ctx.cfg.entryway)
36
34
  return resultPassthru(
37
35
  await ctx.entrywayAgent.com.atproto.server.requestEmailUpdate(
38
36
  undefined,
39
- await ctx.serviceAuthHeaders(
37
+ await ctx.entrywayAuthHeaders(
38
+ req,
40
39
  auth.credentials.did,
41
- ctx.cfg.entryway.did,
42
40
  ids.ComAtprotoServerRequestEmailUpdate,
43
41
  ),
44
42
  ),
@@ -2,7 +2,6 @@ import { DAY, HOUR } from '@atproto/common'
2
2
  import { InvalidRequestError } from '@atproto/xrpc-server'
3
3
  import { AppContext } from '../../../../context'
4
4
  import { Server } from '../../../../lexicon'
5
- import { authPassthru } from '../../../proxy'
6
5
 
7
6
  export default function (server: Server, ctx: AppContext) {
8
7
  server.com.atproto.server.requestPasswordReset({
@@ -28,7 +27,7 @@ export default function (server: Server, ctx: AppContext) {
28
27
  if (ctx.entrywayAgent) {
29
28
  await ctx.entrywayAgent.com.atproto.server.requestPasswordReset(
30
29
  input.body,
31
- authPassthru(req, true),
30
+ ctx.entrywayPassthruHeaders(req),
32
31
  )
33
32
  return
34
33
  }
@@ -1,7 +1,6 @@
1
1
  import { MINUTE } from '@atproto/common'
2
2
  import { AppContext } from '../../../../context'
3
3
  import { Server } from '../../../../lexicon'
4
- import { authPassthru } from '../../../proxy'
5
4
 
6
5
  export default function (server: Server, ctx: AppContext) {
7
6
  server.com.atproto.server.resetPassword({
@@ -15,7 +14,7 @@ export default function (server: Server, ctx: AppContext) {
15
14
  if (ctx.entrywayAgent) {
16
15
  await ctx.entrywayAgent.com.atproto.server.resetPassword(
17
16
  input.body,
18
- authPassthru(req, true),
17
+ ctx.entrywayPassthruHeaders(req),
19
18
  )
20
19
  return
21
20
  }
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { AppContext } from '../../../../context'
3
2
  import { Server } from '../../../../lexicon'
4
3
  import { ids } from '../../../../lexicon/lexicons'
@@ -6,14 +5,13 @@ import { ids } from '../../../../lexicon/lexicons'
6
5
  export default function (server: Server, ctx: AppContext) {
7
6
  server.com.atproto.server.revokeAppPassword({
8
7
  auth: ctx.authVerifier.accessStandard(),
9
- handler: async ({ auth, input }) => {
8
+ handler: async ({ auth, input, req }) => {
10
9
  if (ctx.entrywayAgent) {
11
- assert(ctx.cfg.entryway)
12
10
  await ctx.entrywayAgent.com.atproto.server.revokeAppPassword(
13
11
  input.body,
14
- await ctx.serviceAuthHeaders(
12
+ await ctx.entrywayAuthHeaders(
13
+ req,
15
14
  auth.credentials.did,
16
- ctx.cfg.entryway.did,
17
15
  ids.ComAtprotoServerRevokeAppPassword,
18
16
  ),
19
17
  )
@@ -1,4 +1,3 @@
1
- import assert from 'node:assert'
2
1
  import { isEmailValid } from '@hapi/address'
3
2
  import { isDisposableEmail } from 'disposable-email-domains-js'
4
3
  import { InvalidRequestError } from '@atproto/xrpc-server'
@@ -10,7 +9,7 @@ import { ids } from '../../../../lexicon/lexicons'
10
9
  export default function (server: Server, ctx: AppContext) {
11
10
  server.com.atproto.server.updateEmail({
12
11
  auth: ctx.authVerifier.accessFull({ checkTakedown: true }),
13
- handler: async ({ auth, input }) => {
12
+ handler: async ({ auth, input, req }) => {
14
13
  const did = auth.credentials.did
15
14
  const { token, email } = input.body
16
15
  if (!isEmailValid(email) || isDisposableEmail(email)) {
@@ -26,12 +25,11 @@ export default function (server: Server, ctx: AppContext) {
26
25
  }
27
26
 
28
27
  if (ctx.entrywayAgent) {
29
- assert(ctx.cfg.entryway)
30
28
  await ctx.entrywayAgent.com.atproto.server.updateEmail(
31
29
  input.body,
32
- await ctx.serviceAuthHeaders(
30
+ await ctx.entrywayAuthHeaders(
31
+ req,
33
32
  auth.credentials.did,
34
- ctx.cfg.entryway.did,
35
33
  ids.ComAtprotoServerUpdateEmail,
36
34
  ),
37
35
  )
@@ -25,9 +25,7 @@ export default function (server: Server, ctx: AppContext) {
25
25
  let carStream: stream.Readable
26
26
  try {
27
27
  const storage = new SqlRepoReader(actorDb)
28
- const commit = params.commit
29
- ? CID.parse(params.commit)
30
- : await storage.getRoot()
28
+ const commit = await storage.getRoot()
31
29
 
32
30
  if (!commit) {
33
31
  throw new InvalidRequestError(`Could not find repo for DID: ${did}`)
@@ -1,7 +1,7 @@
1
1
  import { AuthScope } from '../../../../auth-verifier'
2
2
  import { AppContext } from '../../../../context'
3
3
  import { Server } from '../../../../lexicon'
4
- import { authPassthru, resultPassthru } from '../../../proxy'
4
+ import { resultPassthru } from '../../../proxy'
5
5
 
6
6
  // THIS IS A TEMPORARY UNSPECCED ROUTE
7
7
  export default function (server: Server, ctx: AppContext) {
@@ -21,7 +21,7 @@ export default function (server: Server, ctx: AppContext) {
21
21
  return resultPassthru(
22
22
  await ctx.entrywayAgent.com.atproto.temp.checkSignupQueue(
23
23
  undefined,
24
- authPassthru(req),
24
+ ctx.entrywayPassthruHeaders(req),
25
25
  ),
26
26
  )
27
27
  },
package/src/api/proxy.ts CHANGED
@@ -1,4 +1,5 @@
1
1
  import { IncomingMessage } from 'node:http'
2
+ import express from 'express'
2
3
  import { Headers } from '@atproto/xrpc'
3
4
  import { InvalidRequestError } from '@atproto/xrpc-server'
4
5
 
@@ -10,21 +11,7 @@ export const resultPassthru = <T>(result: { headers: Headers; data: T }) => {
10
11
  }
11
12
  }
12
13
 
13
- // Output designed to passed as second arg to AtpAgent methods.
14
- // The encoding field here is a quirk of the AtpAgent.
15
- export function authPassthru(
16
- req: IncomingMessage,
17
- withEncoding?: false,
18
- ): { headers: { authorization: string }; encoding: undefined } | undefined
19
-
20
- export function authPassthru(
21
- req: IncomingMessage,
22
- withEncoding: true,
23
- ):
24
- | { headers: { authorization: string }; encoding: 'application/json' }
25
- | undefined
26
-
27
- export function authPassthru(req: IncomingMessage, withEncoding?: boolean) {
14
+ export function authPassthru(req: IncomingMessage) {
28
15
  const { authorization } = req.headers
29
16
 
30
17
  if (authorization) {
@@ -45,9 +32,22 @@ export function authPassthru(req: IncomingMessage, withEncoding?: boolean) {
45
32
  throw new InvalidRequestError('DPoP requests cannot be proxied')
46
33
  }
47
34
 
48
- return {
49
- headers: { authorization },
50
- encoding: withEncoding ? 'application/json' : undefined,
51
- }
35
+ return { headers: { authorization } }
52
36
  }
53
37
  }
38
+
39
+ // @NOTE this function may mutate its params input
40
+ // future improvement here would be to forward along all untrusted ips rather than just the first (req.ip)
41
+ export const forwardedFor = (
42
+ req: express.Request,
43
+ params: HeadersParam | undefined,
44
+ ) => {
45
+ const result: HeadersParam = params ?? { headers: {} }
46
+ const ip = req.ip
47
+ if (ip) {
48
+ result.headers['x-forwarded-for'] = ip
49
+ }
50
+ return result
51
+ }
52
+
53
+ type HeadersParam = { headers: Record<string, string> }
package/src/context.ts CHANGED
@@ -1,5 +1,6 @@
1
1
  import assert from 'node:assert'
2
2
  import * as plc from '@did-plc/lib'
3
+ import express from 'express'
3
4
  import { Redis } from 'ioredis'
4
5
  import * as nodemailer from 'nodemailer'
5
6
  import * as undici from 'undici'
@@ -25,6 +26,7 @@ import {
25
26
  } from '@atproto-labs/fetch-node'
26
27
  import { AccountManager } from './account-manager'
27
28
  import { ActorStore } from './actor-store/actor-store'
29
+ import { authPassthru, forwardedFor } from './api/proxy'
28
30
  import {
29
31
  AuthVerifier,
30
32
  createPublicKeyObject,
@@ -398,6 +400,20 @@ export class AppContext {
398
400
  return this.serviceAuthHeaders(did, this.bskyAppView.did, lxm)
399
401
  }
400
402
 
403
+ async entrywayAuthHeaders(req: express.Request, did: string, lxm: string) {
404
+ assert(this.cfg.entryway)
405
+ const headers = await this.serviceAuthHeaders(
406
+ did,
407
+ this.cfg.entryway.did,
408
+ lxm,
409
+ )
410
+ return forwardedFor(req, headers)
411
+ }
412
+
413
+ entrywayPassthruHeaders(req: express.Request) {
414
+ return forwardedFor(req, authPassthru(req))
415
+ }
416
+
401
417
  async serviceAuthHeaders(did: string, aud: string, lxm: string) {
402
418
  const keypair = await this.actorStore.keypair(did)
403
419
  return createServiceAuthHeaders({
package/src/index.ts CHANGED
@@ -122,7 +122,7 @@ export class PDS {
122
122
  server = API(server, ctx)
123
123
 
124
124
  const app = express()
125
- app.set('trust proxy', true)
125
+ app.set('trust proxy', ['loopback', 'linklocal', 'uniquelocal'])
126
126
  app.use(loggerMiddleware)
127
127
  app.use(compression())
128
128
  app.use(authRoutes.createRouter(ctx)) // Before CORS
@@ -1278,6 +1278,11 @@ export const schemaDict = {
1278
1278
  type: 'token',
1279
1279
  description: 'Appeal: appeal a previously taken moderation action',
1280
1280
  },
1281
+ subjectType: {
1282
+ type: 'string',
1283
+ description: 'Tag describing a type of subject that might be reported.',
1284
+ knownValues: ['account', 'record', 'chat'],
1285
+ },
1281
1286
  },
1282
1287
  },
1283
1288
  ComAtprotoRepoApplyWrites: {
@@ -1855,16 +1860,6 @@ export const schemaDict = {
1855
1860
  cursor: {
1856
1861
  type: 'string',
1857
1862
  },
1858
- rkeyStart: {
1859
- type: 'string',
1860
- description:
1861
- 'DEPRECATED: The lowest sort-ordered rkey to start from (exclusive)',
1862
- },
1863
- rkeyEnd: {
1864
- type: 'string',
1865
- description:
1866
- 'DEPRECATED: The highest sort-ordered rkey to stop at (exclusive)',
1867
- },
1868
1863
  reverse: {
1869
1864
  type: 'boolean',
1870
1865
  description: 'Flag to reverse the order of the returned records.',
@@ -3405,12 +3400,6 @@ export const schemaDict = {
3405
3400
  description: 'Record Key',
3406
3401
  format: 'record-key',
3407
3402
  },
3408
- commit: {
3409
- type: 'string',
3410
- format: 'cid',
3411
- description:
3412
- 'DEPRECATED: referenced a repo commit by CID, and retrieved record as of that commit',
3413
- },
3414
3403
  },
3415
3404
  },
3416
3405
  output: {
@@ -3759,7 +3748,7 @@ export const schemaDict = {
3759
3748
  main: {
3760
3749
  type: 'procedure',
3761
3750
  description:
3762
- 'Notify a crawling service of a recent update, and that crawling should resume. Intended use is after a gap between repo stream events caused the crawling service to disconnect. Does not require auth; implemented by Relay.',
3751
+ 'Notify a crawling service of a recent update, and that crawling should resume. Intended use is after a gap between repo stream events caused the crawling service to disconnect. Does not require auth; implemented by Relay. DEPRECATED: just use com.atproto.sync.requestCrawl',
3763
3752
  input: {
3764
3753
  encoding: 'application/json',
3765
3754
  schema: {
@@ -9055,6 +9044,33 @@ export const schemaDict = {
9055
9044
  ref: 'lex:com.atproto.label.defs#label',
9056
9045
  },
9057
9046
  },
9047
+ reasonTypes: {
9048
+ description:
9049
+ "The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed.",
9050
+ type: 'array',
9051
+ items: {
9052
+ type: 'ref',
9053
+ ref: 'lex:com.atproto.moderation.defs#reasonType',
9054
+ },
9055
+ },
9056
+ subjectTypes: {
9057
+ description:
9058
+ 'The set of subject types (account, record, etc) this service accepts reports on.',
9059
+ type: 'array',
9060
+ items: {
9061
+ type: 'ref',
9062
+ ref: 'lex:com.atproto.moderation.defs#subjectType',
9063
+ },
9064
+ },
9065
+ subjectCollections: {
9066
+ type: 'array',
9067
+ description:
9068
+ 'Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type.',
9069
+ items: {
9070
+ type: 'string',
9071
+ format: 'nsid',
9072
+ },
9073
+ },
9058
9074
  },
9059
9075
  },
9060
9076
  labelerViewerState: {
@@ -9162,6 +9178,33 @@ export const schemaDict = {
9162
9178
  type: 'string',
9163
9179
  format: 'datetime',
9164
9180
  },
9181
+ reasonTypes: {
9182
+ description:
9183
+ "The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed.",
9184
+ type: 'array',
9185
+ items: {
9186
+ type: 'ref',
9187
+ ref: 'lex:com.atproto.moderation.defs#reasonType',
9188
+ },
9189
+ },
9190
+ subjectTypes: {
9191
+ description:
9192
+ 'The set of subject types (account, record, etc) this service accepts reports on.',
9193
+ type: 'array',
9194
+ items: {
9195
+ type: 'ref',
9196
+ ref: 'lex:com.atproto.moderation.defs#subjectType',
9197
+ },
9198
+ },
9199
+ subjectCollections: {
9200
+ type: 'array',
9201
+ description:
9202
+ 'Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type.',
9203
+ items: {
9204
+ type: 'string',
9205
+ format: 'nsid',
9206
+ },
9207
+ },
9165
9208
  },
9166
9209
  },
9167
9210
  },
@@ -7,6 +7,7 @@ import { validate as _validate } from '../../../../lexicons'
7
7
  import { $Typed, is$typed as _is$typed, OmitKey } from '../../../../util'
8
8
  import type * as AppBskyActorDefs from '../actor/defs.js'
9
9
  import type * as ComAtprotoLabelDefs from '../../../com/atproto/label/defs.js'
10
+ import type * as ComAtprotoModerationDefs from '../../../com/atproto/moderation/defs.js'
10
11
 
11
12
  const is$typed = _is$typed,
12
13
  validate = _validate
@@ -43,6 +44,12 @@ export interface LabelerViewDetailed {
43
44
  viewer?: LabelerViewerState
44
45
  indexedAt: string
45
46
  labels?: ComAtprotoLabelDefs.Label[]
47
+ /** The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed. */
48
+ reasonTypes?: ComAtprotoModerationDefs.ReasonType[]
49
+ /** The set of subject types (account, record, etc) this service accepts reports on. */
50
+ subjectTypes?: ComAtprotoModerationDefs.SubjectType[]
51
+ /** Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type. */
52
+ subjectCollections?: string[]
46
53
  }
47
54
 
48
55
  const hashLabelerViewDetailed = 'labelerViewDetailed'
@@ -7,6 +7,7 @@ import { validate as _validate } from '../../../../lexicons'
7
7
  import { $Typed, is$typed as _is$typed, OmitKey } from '../../../../util'
8
8
  import type * as AppBskyLabelerDefs from './defs.js'
9
9
  import type * as ComAtprotoLabelDefs from '../../../com/atproto/label/defs.js'
10
+ import type * as ComAtprotoModerationDefs from '../../../com/atproto/moderation/defs.js'
10
11
 
11
12
  const is$typed = _is$typed,
12
13
  validate = _validate
@@ -17,6 +18,12 @@ export interface Record {
17
18
  policies: AppBskyLabelerDefs.LabelerPolicies
18
19
  labels?: $Typed<ComAtprotoLabelDefs.SelfLabels> | { $type: string }
19
20
  createdAt: string
21
+ /** The set of report reason 'codes' which are in-scope for this service to review and action. These usually align to policy categories. If not defined (distinct from empty array), all reason types are allowed. */
22
+ reasonTypes?: ComAtprotoModerationDefs.ReasonType[]
23
+ /** The set of subject types (account, record, etc) this service accepts reports on. */
24
+ subjectTypes?: ComAtprotoModerationDefs.SubjectType[]
25
+ /** Set of record types (collection NSIDs) which can be reported to this service. If not defined (distinct from empty array), default is any record type. */
26
+ subjectCollections?: string[]
20
27
  [k: string]: unknown
21
28
  }
22
29
 
@@ -34,3 +34,6 @@ export const REASONRUDE = `${id}#reasonRude`
34
34
  export const REASONOTHER = `${id}#reasonOther`
35
35
  /** Appeal: appeal a previously taken moderation action */
36
36
  export const REASONAPPEAL = `${id}#reasonAppeal`
37
+
38
+ /** Tag describing a type of subject that might be reported. */
39
+ export type SubjectType = 'account' | 'record' | 'chat' | (string & {})
@@ -20,10 +20,6 @@ export interface QueryParams {
20
20
  /** The number of records to return. */
21
21
  limit: number
22
22
  cursor?: string
23
- /** DEPRECATED: The lowest sort-ordered rkey to start from (exclusive) */
24
- rkeyStart?: string
25
- /** DEPRECATED: The highest sort-ordered rkey to stop at (exclusive) */
26
- rkeyEnd?: string
27
23
  /** Flag to reverse the order of the returned records. */
28
24
  reverse?: boolean
29
25
  }
@@ -19,8 +19,6 @@ export interface QueryParams {
19
19
  collection: string
20
20
  /** Record Key */
21
21
  rkey: string
22
- /** DEPRECATED: referenced a repo commit by CID, and retrieved record as of that commit */
23
- commit?: string
24
22
  }
25
23
 
26
24
  export type InputSchema = undefined