@fedify/fedify 1.5.7 → 1.5.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGES.md CHANGED
@@ -3,6 +3,17 @@
3
3
  Fedify changelog
4
4
  ================
5
5
 
6
+ Version 1.5.8
7
+ -------------
8
+
9
+ Released on September 17, 2025.
10
+
11
+ - Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
12
+ URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
13
+ automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
14
+ failures when processing bridged Bluesky content. [[#436]]
15
+
16
+
6
17
  Version 1.5.7
7
18
  -------------
8
19
 
@@ -214,6 +225,17 @@ Released on March 28, 2025.
214
225
  [multibase]: https://github.com/multiformats/js-multibase
215
226
 
216
227
 
228
+ Version 1.4.16
229
+ --------------
230
+
231
+ Released on September 17, 2025.
232
+
233
+ - Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
234
+ URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
235
+ automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
236
+ failures when processing bridged Bluesky content. [[#436]]
237
+
238
+
217
239
  Version 1.4.15
218
240
  --------------
219
241
 
@@ -500,6 +522,17 @@ Released on February 5, 2025.
500
522
  [#195]: https://github.com/fedify-dev/fedify/issues/195
501
523
 
502
524
 
525
+ Version 1.3.23
526
+ --------------
527
+
528
+ Released on September 17, 2025.
529
+
530
+ - Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
531
+ URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
532
+ automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
533
+ failures when processing bridged Bluesky content. [[#436]]
534
+
535
+
503
536
  Version 1.3.22
504
537
  --------------
505
538
 
@@ -904,6 +937,17 @@ Released on November 30, 2024.
904
937
  [#193]: https://github.com/fedify-dev/fedify/issues/193
905
938
 
906
939
 
940
+ Version 1.2.26
941
+ --------------
942
+
943
+ Released on September 17, 2025.
944
+
945
+ - Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
946
+ URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
947
+ automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
948
+ failures when processing bridged Bluesky content. [[#436]]
949
+
950
+
907
951
  Version 1.2.25
908
952
  --------------
909
953
 
@@ -1341,6 +1385,17 @@ Released on October 31, 2024.
1341
1385
  [#118]: https://github.com/fedify-dev/fedify/issues/118
1342
1386
 
1343
1387
 
1388
+ Version 1.1.26
1389
+ --------------
1390
+
1391
+ Released on September 17, 2025.
1392
+
1393
+ - Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
1394
+ URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
1395
+ automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
1396
+ failures when processing bridged Bluesky content. [[#436]]
1397
+
1398
+
1344
1399
  Version 1.1.25
1345
1400
  --------------
1346
1401
 
@@ -1819,6 +1874,19 @@ Released on October 20, 2024.
1819
1874
  [#150]: https://github.com/fedify-dev/fedify/issues/150
1820
1875
 
1821
1876
 
1877
+ Version 1.0.29
1878
+ --------------
1879
+
1880
+ Released on September 17, 2025.
1881
+
1882
+ - Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
1883
+ URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
1884
+ automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
1885
+ failures when processing bridged Bluesky content. [[#436]]
1886
+
1887
+ [#436]: https://github.com/fedify-dev/fedify/issues/436
1888
+
1889
+
1822
1890
  Version 1.0.28
1823
1891
  --------------
1824
1892
 
package/esm/deno.js CHANGED
@@ -1,6 +1,6 @@
1
1
  export default {
2
2
  "name": "@fedify/fedify",
3
- "version": "1.5.7",
3
+ "version": "1.5.8",
4
4
  "license": "MIT",
5
5
  "exports": {
6
6
  ".": "./mod.ts",
@@ -94,11 +94,14 @@ export async function importMultibaseKey(key) {
94
94
  format: "der",
95
95
  type: "pkcs1",
96
96
  });
97
- const spki = keyObject.export({ type: "spki", format: "der" }).buffer;
97
+ const exported = keyObject.export({ type: "spki", format: "der" }).buffer;
98
+ const spki = exported instanceof Uint8Array
99
+ ? exported
100
+ : new Uint8Array(exported);
98
101
  return await dntShim.crypto.subtle.importKey("spki", new Uint8Array(spki), { name: "RSASSA-PKCS1-v1_5", hash: "SHA-256" }, true, ["verify"]);
99
102
  }
100
103
  else if (code === 0xed) { // ed25519-pub
101
- return await dntShim.crypto.subtle.importKey("raw", content, "Ed25519", true, ["verify"]);
104
+ return await dntShim.crypto.subtle.importKey("raw", content.slice(), "Ed25519", true, ["verify"]);
102
105
  }
103
106
  else {
104
107
  throw new TypeError("Unsupported key type: 0x" + code.toString(16));
package/esm/sig/ld.js CHANGED
@@ -184,7 +184,7 @@ export async function verifySignature(jsonLd, options = {}) {
184
184
  const encoder = new TextEncoder();
185
185
  const message = sigOptsHash + docHash;
186
186
  const messageBytes = encoder.encode(message);
187
- const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature, messageBytes);
187
+ const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature.slice(), messageBytes);
188
188
  if (verified)
189
189
  return key;
190
190
  if (cached) {
@@ -200,7 +200,7 @@ export async function verifySignature(jsonLd, options = {}) {
200
200
  });
201
201
  if (key == null)
202
202
  return null;
203
- const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature, messageBytes);
203
+ const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature.slice(), messageBytes);
204
204
  return verified ? key : null;
205
205
  }
206
206
  logger.debug("Failed to verify with the fetched key {keyId}; " +
package/esm/sig/proof.js CHANGED
@@ -209,7 +209,7 @@ async function verifyProofInternal(jsonLd, proof, options) {
209
209
  "Ed25519 key:\n{keyId}", { proof, keyId: proof.verificationMethodId.href });
210
210
  return null;
211
211
  }
212
- const verified = await dntShim.crypto.subtle.verify("Ed25519", publicKey.publicKey, proof.proofValue, digest);
212
+ const verified = await dntShim.crypto.subtle.verify("Ed25519", publicKey.publicKey, proof.proofValue.slice(), digest);
213
213
  if (!verified) {
214
214
  if (fetchedKey.cached) {
215
215
  logger.debug("Failed to verify the proof with the cached key {keyId}; retrying " +