@fedify/fedify 1.10.3 → 1.10.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{actor-jvzet8bO.js → actor-CQdxP8N-.js} +187 -187
- package/dist/{actor-BdLqN1gg.js → actor-Ch9BTg3N.js} +1 -1
- package/dist/{actor-DOYpLAOc.cjs → actor-CjkHF7Cj.cjs} +187 -187
- package/dist/{authdocloader-CLAhEwIS.js → authdocloader-COFZT9Wh.js} +3 -3
- package/dist/{authdocloader-Ddqc8DWD.js → authdocloader-fR-Fqcpa.js} +3 -3
- package/dist/{authdocloader-B1zJPoS6.cjs → authdocloader-zc5ibOmU.cjs} +3 -3
- package/dist/{builder-4kTkpLYJ.js → builder-YD0q32nG.js} +4 -4
- package/dist/{client-BTEYHgMp.js → client-BgCucCG7.js} +1 -1
- package/dist/compat/transformers.test.js +16 -16
- package/dist/{docloader-BRNFZnTb.js → docloader-BETPdM09.js} +109 -13
- package/dist/{docloader-CNsCwkxG.cjs → docloader-irBWMSOZ.cjs} +109 -13
- package/dist/{esm-gCncx4Xn.js → esm-iGH0sRsE.js} +1 -1
- package/dist/federation/builder.test.js +5 -5
- package/dist/federation/collection.test.js +3 -3
- package/dist/federation/handler.test.js +17 -17
- package/dist/federation/idempotency.test.js +17 -17
- package/dist/federation/inbox.test.js +4 -4
- package/dist/federation/keycache.test.js +8 -4
- package/dist/federation/kv.test.js +3 -3
- package/dist/federation/middleware.test.js +18 -18
- package/dist/federation/mod.cjs +10 -10
- package/dist/federation/mod.js +10 -10
- package/dist/federation/mq.test.js +3 -3
- package/dist/federation/retry.test.js +3 -3
- package/dist/federation/router.test.js +3 -3
- package/dist/federation/send.test.js +10 -10
- package/dist/{http-CcPpEG46.cjs → http-CQAqR_vx.cjs} +18 -7
- package/dist/{http-DplZ1SHu.js → http-CxiIW4rD.js} +17 -6
- package/dist/{http-C3_5amY1.js → http-PgdBoDIj.js} +18 -7
- package/dist/{inbox-BxnmUryw.js → inbox-DcDIqTbR.js} +1 -1
- package/dist/{key-MUjY4i2E.js → key-Bnod5wJl.js} +4 -4
- package/dist/{key-Kt3kKq85.js → key-C6swTX71.js} +3 -3
- package/dist/{key-DrXt0cYP.js → key-Cg0kO4dA.js} +2 -2
- package/dist/{key-gldrk_5Z.js → key-I-ibyaZH.js} +2 -2
- package/dist/key-_Uq8gkmM.cjs +10 -0
- package/dist/{key-Cdysd1b9.cjs → key-dNFkodH5.cjs} +2 -2
- package/dist/{keycache-Cm9Ke5JM.js → keycache-hSs_XFSb.js} +11 -2
- package/dist/{keys-C6gRMT25.js → keys-CElJez9H.js} +1 -1
- package/dist/{ld-DzleVPgo.js → ld-b16r91YS.js} +2 -2
- package/dist/{lookup-4na242fe.cjs → lookup-Bfq9Jpm0.cjs} +1 -1
- package/dist/{lookup-CKEj5FWO.js → lookup-CiSAeWJl.js} +1 -1
- package/dist/{lookup-CyI7sF0p.js → lookup-CySNcNcC.js} +1 -1
- package/dist/middleware-BWsOtDIF.cjs +17 -0
- package/dist/middleware-Bm4bJzjg.js +26 -0
- package/dist/{middleware-BXUQTcBK.js → middleware-Bs4xDuXR.js} +20 -11
- package/dist/middleware-BvODpE_U.js +17 -0
- package/dist/{middleware-CmaZY01E.js → middleware-C5emnCh-.js} +13 -13
- package/dist/{middleware-xSPzx3UI.cjs → middleware-Dxo56yae.cjs} +20 -11
- package/dist/mod.cjs +10 -10
- package/dist/mod.js +10 -10
- package/dist/nodeinfo/client.test.js +5 -5
- package/dist/nodeinfo/handler.test.js +16 -16
- package/dist/nodeinfo/mod.cjs +2 -2
- package/dist/nodeinfo/mod.js +2 -2
- package/dist/nodeinfo/semver.test.js +3 -3
- package/dist/nodeinfo/types.test.js +3 -3
- package/dist/otel/exporter.test.js +3 -3
- package/dist/{owner-n8GJaHF9.js → owner-Bs-sPbHX.js} +2 -2
- package/dist/{proof-tEhbsByx.cjs → proof-BvQS195q.cjs} +3 -3
- package/dist/{proof-D7qegtQm.js → proof-SgRikE_Y.js} +2 -2
- package/dist/{proof-Bx8lj3_m.js → proof-flD2DeA-.js} +3 -3
- package/dist/runtime/authdocloader.test.js +9 -9
- package/dist/runtime/docloader.test.js +51 -4
- package/dist/runtime/key.test.js +5 -5
- package/dist/runtime/langstr.test.js +3 -3
- package/dist/runtime/link.test.js +3 -3
- package/dist/runtime/mod.cjs +6 -6
- package/dist/runtime/mod.js +6 -6
- package/dist/runtime/multibase/multibase.test.js +3 -3
- package/dist/runtime/url.test.js +3 -3
- package/dist/{send-CcNf5O--.js → send-C0gFHa2i.js} +2 -2
- package/dist/sig/http.test.js +51 -8
- package/dist/sig/key.test.js +6 -6
- package/dist/sig/ld.test.js +7 -7
- package/dist/sig/mod.cjs +6 -6
- package/dist/sig/mod.js +6 -6
- package/dist/sig/owner.test.js +7 -7
- package/dist/sig/proof.test.js +7 -7
- package/dist/testing/docloader.test.js +3 -3
- package/dist/testing/mod.js +3 -3
- package/dist/{testing-DoQEBY_a.js → testing-C1GIraJh.js} +2 -2
- package/dist/{type-BVpqRkFR.js → type-DUhon7qK.js} +294 -198
- package/dist/{types-oz5uR2vt.cjs → types-BgUCCngg.cjs} +1 -1
- package/dist/{types-BsFw6XaG.js → types-Bu-epI-z.js} +1 -1
- package/dist/vocab/actor.test.js +5 -5
- package/dist/vocab/lookup.test.js +4 -4
- package/dist/vocab/mod.cjs +4 -4
- package/dist/vocab/mod.js +4 -4
- package/dist/vocab/type.test.js +3 -3
- package/dist/vocab/vocab.test.js +4 -4
- package/dist/{vocab-i1kbdwbr.cjs → vocab-5i6DEIi6.cjs} +3 -3
- package/dist/{vocab-qsTMTRUj.js → vocab-CBavAdew.js} +3 -3
- package/dist/webfinger/handler.test.js +16 -16
- package/dist/webfinger/lookup.test.js +4 -4
- package/dist/webfinger/mod.cjs +2 -2
- package/dist/webfinger/mod.js +2 -2
- package/dist/x/cfworkers.test.js +3 -3
- package/package.json +1 -1
- package/dist/key-DLbxU2E5.cjs +0 -10
- package/dist/middleware-BNRSbI5u.js +0 -26
- package/dist/middleware-BSSmSsSS.cjs +0 -17
- package/dist/middleware-CiCT_xe3.js +0 -17
|
@@ -3,14 +3,14 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey } from "../type-
|
|
6
|
+
import { CryptographicKey, Multikey } from "../type-DUhon7qK.js";
|
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
|
9
9
|
import { assertInstanceOf } from "../assert_instance_of-DHz7EHNU.js";
|
|
10
10
|
import { MemoryKvStore } from "../kv-QzKcOQgP.js";
|
|
11
|
-
import "../lookup-
|
|
12
|
-
import { KvKeyCache } from "../keycache-
|
|
13
|
-
import { test } from "../testing-
|
|
11
|
+
import "../lookup-CySNcNcC.js";
|
|
12
|
+
import { KvKeyCache } from "../keycache-hSs_XFSb.js";
|
|
13
|
+
import { test } from "../testing-C1GIraJh.js";
|
|
14
14
|
|
|
15
15
|
//#region src/federation/keycache.test.ts
|
|
16
16
|
test("KvKeyCache.set()", async () => {
|
|
@@ -30,6 +30,7 @@ test("KvKeyCache.set()", async () => {
|
|
|
30
30
|
});
|
|
31
31
|
await cache.set(new URL("https://example.com/null"), null);
|
|
32
32
|
assert(cache.nullKeys.has("https://example.com/null"));
|
|
33
|
+
assertEquals(await kv.get(["pk", "https://example.com/null"]), { _fedify: "key-unavailable" });
|
|
33
34
|
});
|
|
34
35
|
test("KvKeyCache.get()", async () => {
|
|
35
36
|
const kv = new MemoryKvStore();
|
|
@@ -52,6 +53,9 @@ test("KvKeyCache.get()", async () => {
|
|
|
52
53
|
assertEquals(multikey?.id?.href, "https://example.com/key2");
|
|
53
54
|
cache.nullKeys.add("https://example.com/null");
|
|
54
55
|
assertEquals(await cache.get(new URL("https://example.com/null")), null);
|
|
56
|
+
await kv.set(["pk", "https://example.com/null2"], { _fedify: "key-unavailable" });
|
|
57
|
+
const cache2 = new KvKeyCache(kv, ["pk"]);
|
|
58
|
+
assertEquals(await cache2.get(new URL("https://example.com/null2")), null);
|
|
55
59
|
});
|
|
56
60
|
|
|
57
61
|
//#endregion
|
|
@@ -3,13 +3,13 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "../type-
|
|
6
|
+
import "../type-DUhon7qK.js";
|
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
8
|
import "../assert-MZs1qjMx.js";
|
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
|
10
10
|
import { MemoryKvStore } from "../kv-QzKcOQgP.js";
|
|
11
|
-
import "../lookup-
|
|
12
|
-
import { test } from "../testing-
|
|
11
|
+
import "../lookup-CySNcNcC.js";
|
|
12
|
+
import { test } from "../testing-C1GIraJh.js";
|
|
13
13
|
import "../std__assert-X-_kMxKM.js";
|
|
14
14
|
import "../assert_rejects-DiIiJbZn.js";
|
|
15
15
|
import "../assert_is_error-BPGph1Jx.js";
|
|
@@ -3,37 +3,37 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { Activity, Announce, Create, FetchError, Invite, Multikey, Note, Object as Object$1, Offer, Person, fetchDocumentLoader, getTypeId } from "../type-
|
|
6
|
+
import { Activity, Announce, Create, FetchError, Invite, Multikey, Note, Object as Object$1, Offer, Person, fetchDocumentLoader, getTypeId } from "../type-DUhon7qK.js";
|
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
|
9
9
|
import { assertInstanceOf } from "../assert_instance_of-DHz7EHNU.js";
|
|
10
10
|
import { MemoryKvStore } from "../kv-QzKcOQgP.js";
|
|
11
|
-
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-
|
|
11
|
+
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-C5emnCh-.js";
|
|
12
12
|
import "../semver-dArNLkR9.js";
|
|
13
|
-
import "../client-
|
|
14
|
-
import { RouterError, lookupObject } from "../lookup-
|
|
13
|
+
import "../client-BgCucCG7.js";
|
|
14
|
+
import { RouterError, lookupObject } from "../lookup-CySNcNcC.js";
|
|
15
15
|
import "../types-BIgY6c-l.js";
|
|
16
|
-
import "../actor-
|
|
17
|
-
import "../key-
|
|
18
|
-
import { signRequest, verifyRequest } from "../http-
|
|
19
|
-
import { getAuthenticatedDocumentLoader } from "../authdocloader-
|
|
20
|
-
import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-
|
|
21
|
-
import { doesActorOwnKey } from "../owner-
|
|
22
|
-
import { signObject, verifyObject } from "../proof-
|
|
23
|
-
import "../inbox-
|
|
24
|
-
import "../builder-
|
|
16
|
+
import "../actor-Ch9BTg3N.js";
|
|
17
|
+
import "../key-Cg0kO4dA.js";
|
|
18
|
+
import { signRequest, verifyRequest } from "../http-CxiIW4rD.js";
|
|
19
|
+
import { getAuthenticatedDocumentLoader } from "../authdocloader-COFZT9Wh.js";
|
|
20
|
+
import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-b16r91YS.js";
|
|
21
|
+
import { doesActorOwnKey } from "../owner-Bs-sPbHX.js";
|
|
22
|
+
import { signObject, verifyObject } from "../proof-SgRikE_Y.js";
|
|
23
|
+
import "../inbox-DcDIqTbR.js";
|
|
24
|
+
import "../builder-YD0q32nG.js";
|
|
25
25
|
import "../collection-CSzG2j1P.js";
|
|
26
|
-
import "../keycache-
|
|
26
|
+
import "../keycache-hSs_XFSb.js";
|
|
27
27
|
import "../retry-D4GJ670a.js";
|
|
28
|
-
import "../send-
|
|
29
|
-
import { mockDocumentLoader, test } from "../testing-
|
|
28
|
+
import "../send-C0gFHa2i.js";
|
|
29
|
+
import { mockDocumentLoader, test } from "../testing-C1GIraJh.js";
|
|
30
30
|
import { assertStrictEquals } from "../std__assert-X-_kMxKM.js";
|
|
31
31
|
import { assertFalse, assertRejects } from "../assert_rejects-DiIiJbZn.js";
|
|
32
32
|
import "../assert_is_error-BPGph1Jx.js";
|
|
33
33
|
import { assertNotEquals } from "../assert_not_equals-f3m3epl3.js";
|
|
34
34
|
import { assertThrows } from "../assert_throws-BOO88avQ.js";
|
|
35
|
-
import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-
|
|
36
|
-
import { esm_default } from "../esm-
|
|
35
|
+
import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-CElJez9H.js";
|
|
36
|
+
import { esm_default } from "../esm-iGH0sRsE.js";
|
|
37
37
|
|
|
38
38
|
//#region src/testing/fixtures/example.com/person.json
|
|
39
39
|
var __context$1 = ["https://www.w3.org/ns/activitystreams", "https://w3id.org/security/v1"];
|
package/dist/federation/mod.cjs
CHANGED
|
@@ -3,17 +3,17 @@
|
|
|
3
3
|
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
4
|
|
|
5
5
|
require('../transformers-CoBS-oFG.cjs');
|
|
6
|
-
require('../docloader-
|
|
7
|
-
require('../actor-
|
|
8
|
-
const require_middleware = require('../middleware-
|
|
9
|
-
require('../lookup-
|
|
10
|
-
require('../key-
|
|
11
|
-
require('../http-
|
|
12
|
-
require('../proof-
|
|
6
|
+
require('../docloader-irBWMSOZ.cjs');
|
|
7
|
+
require('../actor-CjkHF7Cj.cjs');
|
|
8
|
+
const require_middleware = require('../middleware-Dxo56yae.cjs');
|
|
9
|
+
require('../lookup-Bfq9Jpm0.cjs');
|
|
10
|
+
require('../key-dNFkodH5.cjs');
|
|
11
|
+
require('../http-CQAqR_vx.cjs');
|
|
12
|
+
require('../proof-BvQS195q.cjs');
|
|
13
13
|
const require_federation = require('../federation-C15gGOh1.cjs');
|
|
14
|
-
require('../types-
|
|
15
|
-
require('../authdocloader-
|
|
16
|
-
require('../vocab-
|
|
14
|
+
require('../types-BgUCCngg.cjs');
|
|
15
|
+
require('../authdocloader-zc5ibOmU.cjs');
|
|
16
|
+
require('../vocab-5i6DEIi6.cjs');
|
|
17
17
|
|
|
18
18
|
exports.InProcessMessageQueue = require_federation.InProcessMessageQueue;
|
|
19
19
|
exports.MemoryKvStore = require_federation.MemoryKvStore;
|
package/dist/federation/mod.js
CHANGED
|
@@ -3,16 +3,16 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
5
|
import "../transformers-BFT6d7J5.js";
|
|
6
|
-
import "../docloader-
|
|
7
|
-
import "../actor-
|
|
8
|
-
import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-
|
|
9
|
-
import "../lookup-
|
|
10
|
-
import "../key-
|
|
11
|
-
import "../http-
|
|
12
|
-
import "../proof-
|
|
6
|
+
import "../docloader-BETPdM09.js";
|
|
7
|
+
import "../actor-CQdxP8N-.js";
|
|
8
|
+
import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-Bs4xDuXR.js";
|
|
9
|
+
import "../lookup-CiSAeWJl.js";
|
|
10
|
+
import "../key-I-ibyaZH.js";
|
|
11
|
+
import "../http-PgdBoDIj.js";
|
|
12
|
+
import "../proof-flD2DeA-.js";
|
|
13
13
|
import { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue } from "../federation-K-xsO03l.js";
|
|
14
|
-
import "../types-
|
|
15
|
-
import "../authdocloader-
|
|
16
|
-
import "../vocab-
|
|
14
|
+
import "../types-Bu-epI-z.js";
|
|
15
|
+
import "../authdocloader-fR-Fqcpa.js";
|
|
16
|
+
import "../vocab-CBavAdew.js";
|
|
17
17
|
|
|
18
18
|
export { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue, Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
|
|
@@ -3,12 +3,12 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "../type-
|
|
6
|
+
import "../type-DUhon7qK.js";
|
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
|
10
|
-
import "../lookup-
|
|
11
|
-
import { test } from "../testing-
|
|
10
|
+
import "../lookup-CySNcNcC.js";
|
|
11
|
+
import { test } from "../testing-C1GIraJh.js";
|
|
12
12
|
import { assertGreater, assertGreaterOrEqual } from "../std__assert-X-_kMxKM.js";
|
|
13
13
|
import { assertFalse } from "../assert_rejects-DiIiJbZn.js";
|
|
14
14
|
import "../assert_is_error-BPGph1Jx.js";
|
|
@@ -3,11 +3,11 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "../type-
|
|
6
|
+
import "../type-DUhon7qK.js";
|
|
7
7
|
import { AssertionError, assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
|
-
import "../lookup-
|
|
8
|
+
import "../lookup-CySNcNcC.js";
|
|
9
9
|
import { createExponentialBackoffPolicy } from "../retry-D4GJ670a.js";
|
|
10
|
-
import { test } from "../testing-
|
|
10
|
+
import { test } from "../testing-C1GIraJh.js";
|
|
11
11
|
import { assertNotEquals } from "../assert_not_equals-f3m3epl3.js";
|
|
12
12
|
|
|
13
13
|
//#region src/federation/retry.test.ts
|
|
@@ -3,12 +3,12 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "../type-
|
|
6
|
+
import "../type-DUhon7qK.js";
|
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
|
10
|
-
import { Router, RouterError } from "../lookup-
|
|
11
|
-
import { test } from "../testing-
|
|
10
|
+
import { Router, RouterError } from "../lookup-CySNcNcC.js";
|
|
11
|
+
import { test } from "../testing-C1GIraJh.js";
|
|
12
12
|
import "../std__assert-X-_kMxKM.js";
|
|
13
13
|
import { assertFalse } from "../assert_rejects-DiIiJbZn.js";
|
|
14
14
|
import "../assert_is_error-BPGph1Jx.js";
|
|
@@ -3,25 +3,25 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { Activity, Application, Endpoints, Group, Person, Service } from "../type-
|
|
6
|
+
import { Activity, Application, Endpoints, Group, Person, Service } from "../type-DUhon7qK.js";
|
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
|
10
|
-
import "../lookup-
|
|
11
|
-
import "../actor-
|
|
12
|
-
import "../key-
|
|
13
|
-
import { verifyRequest } from "../http-
|
|
14
|
-
import { doesActorOwnKey } from "../owner-
|
|
15
|
-
import { extractInboxes, sendActivity } from "../send-
|
|
16
|
-
import { mockDocumentLoader, test } from "../testing-
|
|
10
|
+
import "../lookup-CySNcNcC.js";
|
|
11
|
+
import "../actor-Ch9BTg3N.js";
|
|
12
|
+
import "../key-Cg0kO4dA.js";
|
|
13
|
+
import { verifyRequest } from "../http-CxiIW4rD.js";
|
|
14
|
+
import { doesActorOwnKey } from "../owner-Bs-sPbHX.js";
|
|
15
|
+
import { extractInboxes, sendActivity } from "../send-C0gFHa2i.js";
|
|
16
|
+
import { mockDocumentLoader, test } from "../testing-C1GIraJh.js";
|
|
17
17
|
import "../std__assert-X-_kMxKM.js";
|
|
18
18
|
import { assertFalse, assertRejects } from "../assert_rejects-DiIiJbZn.js";
|
|
19
19
|
import "../assert_is_error-BPGph1Jx.js";
|
|
20
20
|
import { assertNotEquals } from "../assert_not_equals-f3m3epl3.js";
|
|
21
21
|
import "../assert_throws-BOO88avQ.js";
|
|
22
|
-
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-
|
|
22
|
+
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-CElJez9H.js";
|
|
23
23
|
import { createTestTracerProvider } from "../otel-Chy5T2Xh.js";
|
|
24
|
-
import { esm_default } from "../esm-
|
|
24
|
+
import { esm_default } from "../esm-iGH0sRsE.js";
|
|
25
25
|
|
|
26
26
|
//#region src/federation/send.test.ts
|
|
27
27
|
test("extractInboxes()", () => {
|
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
4
|
|
|
5
5
|
const require_chunk = require('./chunk-DqRYRqnO.cjs');
|
|
6
|
-
const require_docloader = require('./docloader-
|
|
7
|
-
const require_actor = require('./actor-
|
|
8
|
-
const require_key = require('./key-
|
|
6
|
+
const require_docloader = require('./docloader-irBWMSOZ.cjs');
|
|
7
|
+
const require_actor = require('./actor-CjkHF7Cj.cjs');
|
|
8
|
+
const require_key = require('./key-dNFkodH5.cjs');
|
|
9
9
|
const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
|
|
10
10
|
const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
|
|
11
11
|
const byte_encodings_base64 = require_chunk.__toESM(require("byte-encodings/base64"));
|
|
@@ -14,6 +14,7 @@ const __opentelemetry_semantic_conventions = require_chunk.__toESM(require("@ope
|
|
|
14
14
|
const structured_field_values = require_chunk.__toESM(require("structured-field-values"));
|
|
15
15
|
|
|
16
16
|
//#region src/sig/http.ts
|
|
17
|
+
const DEFAULT_MAX_REDIRECTION = 20;
|
|
17
18
|
/**
|
|
18
19
|
* Signs a request using the given private key.
|
|
19
20
|
* @param request The request to sign.
|
|
@@ -725,7 +726,11 @@ function createRedirectRequest(request, location, body) {
|
|
|
725
726
|
* @since 1.6.0
|
|
726
727
|
*/
|
|
727
728
|
async function doubleKnock(request, identity, options = {}) {
|
|
729
|
+
return await doubleKnockInternal(request, identity, options);
|
|
730
|
+
}
|
|
731
|
+
async function doubleKnockInternal(request, identity, options, redirected = 0, visited = /* @__PURE__ */ new Set()) {
|
|
728
732
|
const { specDeterminer, log, tracerProvider, signal } = options;
|
|
733
|
+
visited.add(request.url);
|
|
729
734
|
const origin = new URL(request.url).origin;
|
|
730
735
|
const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
|
|
731
736
|
const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
@@ -740,11 +745,14 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
740
745
|
signal
|
|
741
746
|
});
|
|
742
747
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
748
|
+
if (redirected >= DEFAULT_MAX_REDIRECTION) throw new require_docloader.FetchError(request.url, `Too many redirections (${redirected + 1})`);
|
|
743
749
|
const location = response.headers.get("Location");
|
|
744
|
-
|
|
750
|
+
const redirectRequest = createRedirectRequest(request, location, body);
|
|
751
|
+
if (visited.has(redirectRequest.url)) throw new require_docloader.FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
|
|
752
|
+
return doubleKnockInternal(redirectRequest, identity, {
|
|
745
753
|
...options,
|
|
746
754
|
body
|
|
747
|
-
});
|
|
755
|
+
}, redirected + 1, visited);
|
|
748
756
|
} else if (response.status === 400 || response.status === 401 || response.status > 401) {
|
|
749
757
|
const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
|
|
750
758
|
(0, __logtape_logtape.getLogger)([
|
|
@@ -768,11 +776,14 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
768
776
|
signal
|
|
769
777
|
});
|
|
770
778
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
779
|
+
if (redirected >= DEFAULT_MAX_REDIRECTION) throw new require_docloader.FetchError(request.url, `Too many redirections (${redirected + 1})`);
|
|
771
780
|
const location = response.headers.get("Location");
|
|
772
|
-
|
|
781
|
+
const redirectRequest = createRedirectRequest(request, location, body);
|
|
782
|
+
if (visited.has(redirectRequest.url)) throw new require_docloader.FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
|
|
783
|
+
return doubleKnockInternal(redirectRequest, identity, {
|
|
773
784
|
...options,
|
|
774
785
|
body
|
|
775
|
-
});
|
|
786
|
+
}, redirected + 1, visited);
|
|
776
787
|
} else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
|
|
777
788
|
} else await specDeterminer?.rememberSpec(origin, firstTrySpec);
|
|
778
789
|
return response;
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, deno_default } from "./type-
|
|
7
|
-
import { fetchKey, validateCryptoKey } from "./key-
|
|
6
|
+
import { CryptographicKey, FetchError, deno_default } from "./type-DUhon7qK.js";
|
|
7
|
+
import { fetchKey, validateCryptoKey } from "./key-Cg0kO4dA.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
10
|
import { ATTR_HTTP_REQUEST_HEADER, ATTR_HTTP_REQUEST_METHOD, ATTR_URL_FULL } from "@opentelemetry/semantic-conventions";
|
|
@@ -13,6 +13,7 @@ import { encodeHex } from "byte-encodings/hex";
|
|
|
13
13
|
import { Item, decodeDict, encodeItem } from "structured-field-values";
|
|
14
14
|
|
|
15
15
|
//#region src/sig/http.ts
|
|
16
|
+
const DEFAULT_MAX_REDIRECTION = 20;
|
|
16
17
|
/**
|
|
17
18
|
* Signs a request using the given private key.
|
|
18
19
|
* @param request The request to sign.
|
|
@@ -724,7 +725,11 @@ function createRedirectRequest(request, location, body) {
|
|
|
724
725
|
* @since 1.6.0
|
|
725
726
|
*/
|
|
726
727
|
async function doubleKnock(request, identity, options = {}) {
|
|
728
|
+
return await doubleKnockInternal(request, identity, options);
|
|
729
|
+
}
|
|
730
|
+
async function doubleKnockInternal(request, identity, options, redirected = 0, visited = /* @__PURE__ */ new Set()) {
|
|
727
731
|
const { specDeterminer, log, tracerProvider, signal } = options;
|
|
732
|
+
visited.add(request.url);
|
|
728
733
|
const origin = new URL(request.url).origin;
|
|
729
734
|
const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
|
|
730
735
|
const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
@@ -739,11 +744,14 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
739
744
|
signal
|
|
740
745
|
});
|
|
741
746
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
747
|
+
if (redirected >= DEFAULT_MAX_REDIRECTION) throw new FetchError(request.url, `Too many redirections (${redirected + 1})`);
|
|
742
748
|
const location = response.headers.get("Location");
|
|
743
|
-
|
|
749
|
+
const redirectRequest = createRedirectRequest(request, location, body);
|
|
750
|
+
if (visited.has(redirectRequest.url)) throw new FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
|
|
751
|
+
return doubleKnockInternal(redirectRequest, identity, {
|
|
744
752
|
...options,
|
|
745
753
|
body
|
|
746
|
-
});
|
|
754
|
+
}, redirected + 1, visited);
|
|
747
755
|
} else if (response.status === 400 || response.status === 401 || response.status > 401) {
|
|
748
756
|
const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
|
|
749
757
|
getLogger([
|
|
@@ -767,11 +775,14 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
767
775
|
signal
|
|
768
776
|
});
|
|
769
777
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
778
|
+
if (redirected >= DEFAULT_MAX_REDIRECTION) throw new FetchError(request.url, `Too many redirections (${redirected + 1})`);
|
|
770
779
|
const location = response.headers.get("Location");
|
|
771
|
-
|
|
780
|
+
const redirectRequest = createRedirectRequest(request, location, body);
|
|
781
|
+
if (visited.has(redirectRequest.url)) throw new FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
|
|
782
|
+
return doubleKnockInternal(redirectRequest, identity, {
|
|
772
783
|
...options,
|
|
773
784
|
body
|
|
774
|
-
});
|
|
785
|
+
}, redirected + 1, visited);
|
|
775
786
|
} else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
|
|
776
787
|
} else await specDeterminer?.rememberSpec(origin, firstTrySpec);
|
|
777
788
|
return response;
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { deno_default } from "./docloader-
|
|
6
|
-
import { CryptographicKey } from "./actor-
|
|
7
|
-
import { fetchKey, validateCryptoKey } from "./key-
|
|
5
|
+
import { FetchError, deno_default } from "./docloader-BETPdM09.js";
|
|
6
|
+
import { CryptographicKey } from "./actor-CQdxP8N-.js";
|
|
7
|
+
import { fetchKey, validateCryptoKey } from "./key-I-ibyaZH.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
10
|
import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
|
|
@@ -13,6 +13,7 @@ import { ATTR_HTTP_REQUEST_HEADER, ATTR_HTTP_REQUEST_METHOD, ATTR_URL_FULL } fro
|
|
|
13
13
|
import { Item, decodeDict, encodeItem } from "structured-field-values";
|
|
14
14
|
|
|
15
15
|
//#region src/sig/http.ts
|
|
16
|
+
const DEFAULT_MAX_REDIRECTION = 20;
|
|
16
17
|
/**
|
|
17
18
|
* Signs a request using the given private key.
|
|
18
19
|
* @param request The request to sign.
|
|
@@ -724,7 +725,11 @@ function createRedirectRequest(request, location, body) {
|
|
|
724
725
|
* @since 1.6.0
|
|
725
726
|
*/
|
|
726
727
|
async function doubleKnock(request, identity, options = {}) {
|
|
728
|
+
return await doubleKnockInternal(request, identity, options);
|
|
729
|
+
}
|
|
730
|
+
async function doubleKnockInternal(request, identity, options, redirected = 0, visited = /* @__PURE__ */ new Set()) {
|
|
727
731
|
const { specDeterminer, log, tracerProvider, signal } = options;
|
|
732
|
+
visited.add(request.url);
|
|
728
733
|
const origin = new URL(request.url).origin;
|
|
729
734
|
const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
|
|
730
735
|
const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
@@ -739,11 +744,14 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
739
744
|
signal
|
|
740
745
|
});
|
|
741
746
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
747
|
+
if (redirected >= DEFAULT_MAX_REDIRECTION) throw new FetchError(request.url, `Too many redirections (${redirected + 1})`);
|
|
742
748
|
const location = response.headers.get("Location");
|
|
743
|
-
|
|
749
|
+
const redirectRequest = createRedirectRequest(request, location, body);
|
|
750
|
+
if (visited.has(redirectRequest.url)) throw new FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
|
|
751
|
+
return doubleKnockInternal(redirectRequest, identity, {
|
|
744
752
|
...options,
|
|
745
753
|
body
|
|
746
|
-
});
|
|
754
|
+
}, redirected + 1, visited);
|
|
747
755
|
} else if (response.status === 400 || response.status === 401 || response.status > 401) {
|
|
748
756
|
const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
|
|
749
757
|
getLogger([
|
|
@@ -767,11 +775,14 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
767
775
|
signal
|
|
768
776
|
});
|
|
769
777
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
778
|
+
if (redirected >= DEFAULT_MAX_REDIRECTION) throw new FetchError(request.url, `Too many redirections (${redirected + 1})`);
|
|
770
779
|
const location = response.headers.get("Location");
|
|
771
|
-
|
|
780
|
+
const redirectRequest = createRedirectRequest(request, location, body);
|
|
781
|
+
if (visited.has(redirectRequest.url)) throw new FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
|
|
782
|
+
return doubleKnockInternal(redirectRequest, identity, {
|
|
772
783
|
...options,
|
|
773
784
|
body
|
|
774
|
-
});
|
|
785
|
+
}, redirected + 1, visited);
|
|
775
786
|
} else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
|
|
776
787
|
} else await specDeterminer?.rememberSpec(origin, firstTrySpec);
|
|
777
788
|
return response;
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { Activity, deno_default, getTypeId } from "./type-
|
|
6
|
+
import { Activity, deno_default, getTypeId } from "./type-DUhon7qK.js";
|
|
7
7
|
import { getLogger } from "@logtape/logtape";
|
|
8
8
|
import { SpanKind, SpanStatusCode, context, propagation, trace } from "@opentelemetry/api";
|
|
9
9
|
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import "./docloader-
|
|
6
|
-
import "./actor-
|
|
7
|
-
import "./lookup-
|
|
8
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-
|
|
5
|
+
import "./docloader-BETPdM09.js";
|
|
6
|
+
import "./actor-CQdxP8N-.js";
|
|
7
|
+
import "./lookup-CiSAeWJl.js";
|
|
8
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-I-ibyaZH.js";
|
|
9
9
|
|
|
10
10
|
export { validateCryptoKey };
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "./type-
|
|
7
|
-
import "./actor-
|
|
8
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-
|
|
6
|
+
import "./type-DUhon7qK.js";
|
|
7
|
+
import "./actor-Ch9BTg3N.js";
|
|
8
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-Cg0kO4dA.js";
|
|
9
9
|
|
|
10
10
|
export { validateCryptoKey };
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Object as Object$1, deno_default, getDocumentLoader } from "./type-
|
|
7
|
-
import { isActor } from "./actor-
|
|
6
|
+
import { CryptographicKey, Object as Object$1, deno_default, getDocumentLoader } from "./type-DUhon7qK.js";
|
|
7
|
+
import { isActor } from "./actor-Ch9BTg3N.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
10
|
|
|
@@ -2,8 +2,8 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { deno_default, getDocumentLoader } from "./docloader-
|
|
6
|
-
import { CryptographicKey, Object as Object$1, isActor } from "./actor-
|
|
5
|
+
import { deno_default, getDocumentLoader } from "./docloader-BETPdM09.js";
|
|
6
|
+
import { CryptographicKey, Object as Object$1, isActor } from "./actor-CQdxP8N-.js";
|
|
7
7
|
import { getLogger } from "@logtape/logtape";
|
|
8
8
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
9
9
|
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
|
|
2
|
+
const { Temporal } = require("@js-temporal/polyfill");
|
|
3
|
+
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
|
+
|
|
5
|
+
require('./docloader-irBWMSOZ.cjs');
|
|
6
|
+
require('./actor-CjkHF7Cj.cjs');
|
|
7
|
+
require('./lookup-Bfq9Jpm0.cjs');
|
|
8
|
+
const require_key = require('./key-dNFkodH5.cjs');
|
|
9
|
+
|
|
10
|
+
exports.validateCryptoKey = require_key.validateCryptoKey;
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
4
|
|
|
5
5
|
const require_chunk = require('./chunk-DqRYRqnO.cjs');
|
|
6
|
-
const require_docloader = require('./docloader-
|
|
7
|
-
const require_actor = require('./actor-
|
|
6
|
+
const require_docloader = require('./docloader-irBWMSOZ.cjs');
|
|
7
|
+
const require_actor = require('./actor-CjkHF7Cj.cjs');
|
|
8
8
|
const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
|
|
9
9
|
const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
|
|
10
10
|
|
|
@@ -3,9 +3,14 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey } from "./type-
|
|
6
|
+
import { CryptographicKey, Multikey } from "./type-DUhon7qK.js";
|
|
7
7
|
|
|
8
8
|
//#region src/federation/keycache.ts
|
|
9
|
+
const NULL_KEY_CACHE_VALUE = { _fedify: "key-unavailable" };
|
|
10
|
+
const NULL_KEY_CACHE_TTL = Temporal.Duration.from({ minutes: 5 });
|
|
11
|
+
function isNullKeyCacheValue(value) {
|
|
12
|
+
return typeof value === "object" && value != null && "_fedify" in value && value._fedify === NULL_KEY_CACHE_VALUE._fedify;
|
|
13
|
+
}
|
|
9
14
|
var KvKeyCache = class {
|
|
10
15
|
kv;
|
|
11
16
|
prefix;
|
|
@@ -21,6 +26,10 @@ var KvKeyCache = class {
|
|
|
21
26
|
if (this.nullKeys.has(keyId.href)) return null;
|
|
22
27
|
const serialized = await this.kv.get([...this.prefix, keyId.href]);
|
|
23
28
|
if (serialized == null) return void 0;
|
|
29
|
+
if (isNullKeyCacheValue(serialized)) {
|
|
30
|
+
this.nullKeys.add(keyId.href);
|
|
31
|
+
return null;
|
|
32
|
+
}
|
|
24
33
|
try {
|
|
25
34
|
return await CryptographicKey.fromJsonLd(serialized, this.options);
|
|
26
35
|
} catch {
|
|
@@ -35,7 +44,7 @@ var KvKeyCache = class {
|
|
|
35
44
|
async set(keyId, key) {
|
|
36
45
|
if (key == null) {
|
|
37
46
|
this.nullKeys.add(keyId.href);
|
|
38
|
-
await this.kv.
|
|
47
|
+
await this.kv.set([...this.prefix, keyId.href], NULL_KEY_CACHE_VALUE, { ttl: NULL_KEY_CACHE_TTL });
|
|
39
48
|
return;
|
|
40
49
|
}
|
|
41
50
|
this.nullKeys.delete(keyId.href);
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey, importSpki } from "./type-
|
|
6
|
+
import { CryptographicKey, Multikey, importSpki } from "./type-DUhon7qK.js";
|
|
7
7
|
|
|
8
8
|
//#region src/testing/keys.ts
|
|
9
9
|
const rsaPublicKey1 = new CryptographicKey({
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { Activity, CryptographicKey, Object as Object$1, deno_default, getDocumentLoader, getTypeId } from "./type-
|
|
7
|
-
import { fetchKey, validateCryptoKey } from "./key-
|
|
6
|
+
import { Activity, CryptographicKey, Object as Object$1, deno_default, getDocumentLoader, getTypeId } from "./type-DUhon7qK.js";
|
|
7
|
+
import { fetchKey, validateCryptoKey } from "./key-Cg0kO4dA.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
10
|
import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
4
|
|
|
5
5
|
const require_chunk = require('./chunk-DqRYRqnO.cjs');
|
|
6
|
-
const require_docloader = require('./docloader-
|
|
6
|
+
const require_docloader = require('./docloader-irBWMSOZ.cjs');
|
|
7
7
|
const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
|
|
8
8
|
const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
|
|
9
9
|
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-
|
|
5
|
+
import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-BETPdM09.js";
|
|
6
6
|
import { getLogger } from "@logtape/logtape";
|
|
7
7
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
8
8
|
|