@fedify/fedify 1.5.7 → 1.5.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGES.md +68 -0
- package/esm/deno.js +1 -1
- package/esm/runtime/key.js +5 -2
- package/esm/sig/ld.js +2 -2
- package/esm/sig/proof.js +1 -1
- package/esm/vocab/vocab.js +206 -186
- package/package.json +1 -1
- package/types/runtime/key.d.ts.map +1 -1
- package/types/vocab/vocab.d.ts.map +1 -1
package/CHANGES.md
CHANGED
|
@@ -3,6 +3,17 @@
|
|
|
3
3
|
Fedify changelog
|
|
4
4
|
================
|
|
5
5
|
|
|
6
|
+
Version 1.5.8
|
|
7
|
+
-------------
|
|
8
|
+
|
|
9
|
+
Released on September 17, 2025.
|
|
10
|
+
|
|
11
|
+
- Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
|
|
12
|
+
URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
|
|
13
|
+
automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
|
|
14
|
+
failures when processing bridged Bluesky content. [[#436]]
|
|
15
|
+
|
|
16
|
+
|
|
6
17
|
Version 1.5.7
|
|
7
18
|
-------------
|
|
8
19
|
|
|
@@ -214,6 +225,17 @@ Released on March 28, 2025.
|
|
|
214
225
|
[multibase]: https://github.com/multiformats/js-multibase
|
|
215
226
|
|
|
216
227
|
|
|
228
|
+
Version 1.4.16
|
|
229
|
+
--------------
|
|
230
|
+
|
|
231
|
+
Released on September 17, 2025.
|
|
232
|
+
|
|
233
|
+
- Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
|
|
234
|
+
URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
|
|
235
|
+
automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
|
|
236
|
+
failures when processing bridged Bluesky content. [[#436]]
|
|
237
|
+
|
|
238
|
+
|
|
217
239
|
Version 1.4.15
|
|
218
240
|
--------------
|
|
219
241
|
|
|
@@ -500,6 +522,17 @@ Released on February 5, 2025.
|
|
|
500
522
|
[#195]: https://github.com/fedify-dev/fedify/issues/195
|
|
501
523
|
|
|
502
524
|
|
|
525
|
+
Version 1.3.23
|
|
526
|
+
--------------
|
|
527
|
+
|
|
528
|
+
Released on September 17, 2025.
|
|
529
|
+
|
|
530
|
+
- Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
|
|
531
|
+
URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
|
|
532
|
+
automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
|
|
533
|
+
failures when processing bridged Bluesky content. [[#436]]
|
|
534
|
+
|
|
535
|
+
|
|
503
536
|
Version 1.3.22
|
|
504
537
|
--------------
|
|
505
538
|
|
|
@@ -904,6 +937,17 @@ Released on November 30, 2024.
|
|
|
904
937
|
[#193]: https://github.com/fedify-dev/fedify/issues/193
|
|
905
938
|
|
|
906
939
|
|
|
940
|
+
Version 1.2.26
|
|
941
|
+
--------------
|
|
942
|
+
|
|
943
|
+
Released on September 17, 2025.
|
|
944
|
+
|
|
945
|
+
- Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
|
|
946
|
+
URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
|
|
947
|
+
automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
|
|
948
|
+
failures when processing bridged Bluesky content. [[#436]]
|
|
949
|
+
|
|
950
|
+
|
|
907
951
|
Version 1.2.25
|
|
908
952
|
--------------
|
|
909
953
|
|
|
@@ -1341,6 +1385,17 @@ Released on October 31, 2024.
|
|
|
1341
1385
|
[#118]: https://github.com/fedify-dev/fedify/issues/118
|
|
1342
1386
|
|
|
1343
1387
|
|
|
1388
|
+
Version 1.1.26
|
|
1389
|
+
--------------
|
|
1390
|
+
|
|
1391
|
+
Released on September 17, 2025.
|
|
1392
|
+
|
|
1393
|
+
- Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
|
|
1394
|
+
URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
|
|
1395
|
+
automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
|
|
1396
|
+
failures when processing bridged Bluesky content. [[#436]]
|
|
1397
|
+
|
|
1398
|
+
|
|
1344
1399
|
Version 1.1.25
|
|
1345
1400
|
--------------
|
|
1346
1401
|
|
|
@@ -1819,6 +1874,19 @@ Released on October 20, 2024.
|
|
|
1819
1874
|
[#150]: https://github.com/fedify-dev/fedify/issues/150
|
|
1820
1875
|
|
|
1821
1876
|
|
|
1877
|
+
Version 1.0.29
|
|
1878
|
+
--------------
|
|
1879
|
+
|
|
1880
|
+
Released on September 17, 2025.
|
|
1881
|
+
|
|
1882
|
+
- Added a temporary workaround for invalid AT Protocol URIs from BridgyFed.
|
|
1883
|
+
URIs like `at://did:plc:...` that violate RFC 3986 URI syntax are now
|
|
1884
|
+
automatically URL-encoded to `at://did%3Aplc%3A...` to prevent parsing
|
|
1885
|
+
failures when processing bridged Bluesky content. [[#436]]
|
|
1886
|
+
|
|
1887
|
+
[#436]: https://github.com/fedify-dev/fedify/issues/436
|
|
1888
|
+
|
|
1889
|
+
|
|
1822
1890
|
Version 1.0.28
|
|
1823
1891
|
--------------
|
|
1824
1892
|
|
package/esm/deno.js
CHANGED
package/esm/runtime/key.js
CHANGED
|
@@ -94,11 +94,14 @@ export async function importMultibaseKey(key) {
|
|
|
94
94
|
format: "der",
|
|
95
95
|
type: "pkcs1",
|
|
96
96
|
});
|
|
97
|
-
const
|
|
97
|
+
const exported = keyObject.export({ type: "spki", format: "der" }).buffer;
|
|
98
|
+
const spki = exported instanceof Uint8Array
|
|
99
|
+
? exported
|
|
100
|
+
: new Uint8Array(exported);
|
|
98
101
|
return await dntShim.crypto.subtle.importKey("spki", new Uint8Array(spki), { name: "RSASSA-PKCS1-v1_5", hash: "SHA-256" }, true, ["verify"]);
|
|
99
102
|
}
|
|
100
103
|
else if (code === 0xed) { // ed25519-pub
|
|
101
|
-
return await dntShim.crypto.subtle.importKey("raw", content, "Ed25519", true, ["verify"]);
|
|
104
|
+
return await dntShim.crypto.subtle.importKey("raw", content.slice(), "Ed25519", true, ["verify"]);
|
|
102
105
|
}
|
|
103
106
|
else {
|
|
104
107
|
throw new TypeError("Unsupported key type: 0x" + code.toString(16));
|
package/esm/sig/ld.js
CHANGED
|
@@ -184,7 +184,7 @@ export async function verifySignature(jsonLd, options = {}) {
|
|
|
184
184
|
const encoder = new TextEncoder();
|
|
185
185
|
const message = sigOptsHash + docHash;
|
|
186
186
|
const messageBytes = encoder.encode(message);
|
|
187
|
-
const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature, messageBytes);
|
|
187
|
+
const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature.slice(), messageBytes);
|
|
188
188
|
if (verified)
|
|
189
189
|
return key;
|
|
190
190
|
if (cached) {
|
|
@@ -200,7 +200,7 @@ export async function verifySignature(jsonLd, options = {}) {
|
|
|
200
200
|
});
|
|
201
201
|
if (key == null)
|
|
202
202
|
return null;
|
|
203
|
-
const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature, messageBytes);
|
|
203
|
+
const verified = await dntShim.crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature.slice(), messageBytes);
|
|
204
204
|
return verified ? key : null;
|
|
205
205
|
}
|
|
206
206
|
logger.debug("Failed to verify with the fetched key {keyId}; " +
|
package/esm/sig/proof.js
CHANGED
|
@@ -209,7 +209,7 @@ async function verifyProofInternal(jsonLd, proof, options) {
|
|
|
209
209
|
"Ed25519 key:\n{keyId}", { proof, keyId: proof.verificationMethodId.href });
|
|
210
210
|
return null;
|
|
211
211
|
}
|
|
212
|
-
const verified = await dntShim.crypto.subtle.verify("Ed25519", publicKey.publicKey, proof.proofValue, digest);
|
|
212
|
+
const verified = await dntShim.crypto.subtle.verify("Ed25519", publicKey.publicKey, proof.proofValue.slice(), digest);
|
|
213
213
|
if (!verified) {
|
|
214
214
|
if (fetchedKey.cached) {
|
|
215
215
|
logger.debug("Failed to verify the proof with the cached key {keyId}; retrying " +
|