@fedify/fedify 1.6.9 → 1.6.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{actor-DY_ediuQ.js → actor-CxnKxfwH.js} +1059 -2276
- package/dist/{actor-qNVQigMJ.js → actor-KrOvzFz1.js} +6 -9
- package/dist/{assert-DmFG7ppO.js → assert-LOEeCUK5.js} +1 -1
- package/dist/{assert_equals-CTYbeopb.js → assert_equals-B44MxcIj.js} +2 -4
- package/dist/{assert_instance_of-CF09JHYM.js → assert_instance_of-XtuFevV_.js} +1 -1
- package/dist/{assert_is_error-nrwA1GeT.js → assert_is_error-BTlryvT0.js} +1 -1
- package/dist/{assert_not_equals-Dc7y-V5Q.js → assert_not_equals-C685gKx6.js} +1 -1
- package/dist/{assert_rejects-C-sxEMM5.js → assert_rejects-DWQ4jaf9.js} +2 -2
- package/dist/{assert_throws-Cn9C6Jur.js → assert_throws-YetpVSc-.js} +2 -2
- package/dist/{authdocloader-DTpSS6vq.js → authdocloader-CsnXlm3V.js} +4 -4
- package/dist/{authdocloader-ColUu5fh.js → authdocloader-DsULyH5D.js} +3 -3
- package/dist/{builder-CTAic_n3.js → builder-BjJSVOvs.js} +7 -10
- package/dist/{chunk-HsBuZ-b2.js → chunk-Cx8LTkjm.js} +3 -1
- package/dist/{client-Bp-TqQI6.js → client-BlntqhE9.js} +6 -6
- package/dist/compat/transformers.test.js +27 -28
- package/dist/{context-BAx407GT.js → context-CiyuTkCx.js} +2 -2
- package/dist/{docloader-UqcHJRjL.js → docloader-BYgIBZvh.js} +4 -6
- package/dist/{docloader-NmruKwBX.js → docloader-DOrb0fRp.js} +5 -9
- package/dist/{esm-Db4De7AS.js → esm-DO9PrujO.js} +23 -34
- package/dist/federation/builder.test.js +20 -23
- package/dist/federation/collection.test.js +9 -9
- package/dist/federation/handler.test.js +33 -33
- package/dist/federation/inbox.test.js +10 -10
- package/dist/federation/keycache.test.js +9 -9
- package/dist/federation/kv.test.js +10 -9
- package/dist/federation/middleware.test.js +53 -68
- package/dist/federation/mod.js +11 -11
- package/dist/federation/mq.test.js +10 -11
- package/dist/federation/retry.test.js +3 -3
- package/dist/federation/router.test.js +9 -9
- package/dist/federation/send.test.js +22 -22
- package/dist/{federation-3B6BDKCK.js → federation-DyRlaC4X.js} +1 -2
- package/dist/fixtures/oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd.json +24 -0
- package/dist/{http-DjFoawa6.js → http-Dc8RIaDE.js} +56 -17
- package/dist/{http-XWz7prGl.js → http-LsE7i_Zq.js} +56 -17
- package/dist/{inbox-eAHML3xw.js → inbox-BVwejjm8.js} +5 -7
- package/dist/key-BP-Oky5H.js +16 -0
- package/dist/{key-CUEyp_yz.js → key-BTcmhZp7.js} +6 -9
- package/dist/{key-B4UFmNvL.js → key-Bg_PKGpe.js} +5 -8
- package/dist/{key-C1UhN1LT.js → key-DxKqQgGm.js} +4 -4
- package/dist/{keycache-YqFJn7EL.js → keycache-BnCTs9sG.js} +2 -2
- package/dist/{keys-Dd_v3HDs.js → keys-pbGG00jU.js} +1 -1
- package/dist/{ld-D8WCx-VU.js → ld-n_kUCeXG.js} +9 -16
- package/dist/{lookup-DggOHyrB.js → lookup-1pupHJbK.js} +7 -11
- package/dist/{lookup-DEN8lvde.js → lookup-Cutk-FXA.js} +3 -5
- package/dist/{lookup-DHlMvC3Q.js → lookup-DrAS097Q.js} +2 -4
- package/dist/middleware-CDYmpOKW.js +33 -0
- package/dist/{middleware-D_j7IO2V.js → middleware-CMTirIyg.js} +34 -52
- package/dist/middleware-CXZvlTVn.js +17 -0
- package/dist/{middleware-mmR5eUDI.js → middleware-kjrPMCqA.js} +34 -58
- package/dist/mod.js +11 -11
- package/dist/{multibase-DeCHcK8L.js → multibase-CnLHszip.js} +1 -2
- package/dist/nodeinfo/client.test.js +20 -23
- package/dist/nodeinfo/handler.test.js +32 -32
- package/dist/nodeinfo/mod.js +2 -2
- package/dist/nodeinfo/semver.test.js +23 -30
- package/dist/nodeinfo/types.test.js +11 -11
- package/dist/{owner-lYBh2f5Z.js → owner-c-Zzpacz.js} +3 -3
- package/dist/{proof-CPamyAcG.js → proof-BTx3Maj-.js} +12 -25
- package/dist/{proof-BAoGg0DQ.js → proof-CTOU2zFF.js} +8 -14
- package/dist/runtime/authdocloader.test.js +21 -21
- package/dist/runtime/docloader.test.js +16 -18
- package/dist/runtime/key.test.js +17 -17
- package/dist/runtime/langstr.test.js +9 -9
- package/dist/runtime/mod.js +6 -6
- package/dist/runtime/multibase/multibase.test.js +11 -12
- package/dist/runtime/url.test.js +6 -6
- package/dist/{semver-DWClQt_5.js → semver-BNrOOAs9.js} +1 -3
- package/dist/{send-CrbpYrfD.js → send-SniNSIKd.js} +3 -4
- package/dist/sig/http.test.js +55 -53
- package/dist/sig/key.test.js +18 -18
- package/dist/sig/ld.test.js +20 -22
- package/dist/sig/mod.js +6 -6
- package/dist/sig/owner.test.js +20 -20
- package/dist/sig/proof.test.js +19 -19
- package/dist/{std__assert-vp0TKMS1.js → std__assert-o_r9vqm1.js} +1 -1
- package/dist/testing/docloader.test.js +9 -9
- package/dist/testing/mod.js +1 -1
- package/dist/{testing-BZ0dJ4qn.js → testing-DLyvtiiW.js} +3 -5
- package/dist/{type-D2s5lmbZ.js → type-CFuiGLz9.js} +1 -2
- package/dist/{types-C7C_l-jz.js → types-CJHS5pXl.js} +1 -1
- package/dist/{types-Bl1hBU1t.js → types-DG1qZLU9.js} +6 -8
- package/dist/{url-kTAI6_KP.js → url-C2xuoQD1.js} +2 -4
- package/dist/vocab/actor.test.js +104 -156
- package/dist/vocab/lookup.test.js +17 -17
- package/dist/vocab/mod.js +4 -4
- package/dist/vocab/type.test.js +11 -15
- package/dist/vocab/vocab.test.js +45 -49
- package/dist/{vocab-Cs9KbJAx.js → vocab-lzEJg2bH.js} +1057 -2270
- package/dist/{vocab-DSVoOj6P.js → vocab-oKloyO0F.js} +6 -10
- package/dist/webfinger/handler.test.js +33 -34
- package/dist/webfinger/lookup.test.js +13 -13
- package/dist/webfinger/mod.js +2 -2
- package/dist/x/cfworkers.test.js +9 -9
- package/package.json +1 -1
- package/dist/key-ByAyOg3m.js +0 -16
- package/dist/middleware-B-ysz1Gc.js +0 -17
- package/dist/middleware-Bmr-V4-W.js +0 -33
|
@@ -3,20 +3,20 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import "../assert-LOEeCUK5.js";
|
|
8
|
+
import "../assert_instance_of-XtuFevV_.js";
|
|
9
9
|
import { MemoryKvStore } from "../kv-DohFOP2C.js";
|
|
10
|
-
import { FetchError, contexts_default, deno_default, getDocumentLoader, getUserAgent, kvCache } from "../docloader-
|
|
11
|
-
import { UrlError } from "../url-
|
|
12
|
-
import { test } from "../testing-
|
|
13
|
-
import "../std__assert-
|
|
14
|
-
import { assertRejects } from "../assert_rejects-
|
|
15
|
-
import "../assert_is_error-
|
|
16
|
-
import "../assert_not_equals-
|
|
17
|
-
import { assertThrows } from "../assert_throws-
|
|
10
|
+
import { FetchError, contexts_default, deno_default, getDocumentLoader, getUserAgent, kvCache } from "../docloader-BYgIBZvh.js";
|
|
11
|
+
import { UrlError } from "../url-C2xuoQD1.js";
|
|
12
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
13
|
+
import "../std__assert-o_r9vqm1.js";
|
|
14
|
+
import { assertRejects } from "../assert_rejects-DWQ4jaf9.js";
|
|
15
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
16
|
+
import "../assert_not_equals-C685gKx6.js";
|
|
17
|
+
import { assertThrows } from "../assert_throws-YetpVSc-.js";
|
|
18
18
|
import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
|
|
19
|
-
import { esm_default } from "../esm-
|
|
19
|
+
import { esm_default } from "../esm-DO9PrujO.js";
|
|
20
20
|
import process from "node:process";
|
|
21
21
|
|
|
22
22
|
//#region runtime/docloader.test.ts
|
|
@@ -351,13 +351,12 @@ test("kvCache()", async (t) => {
|
|
|
351
351
|
});
|
|
352
352
|
});
|
|
353
353
|
await t.step("not cached", async () => {
|
|
354
|
-
const
|
|
354
|
+
const result = await kvCache({
|
|
355
355
|
kv,
|
|
356
356
|
loader: mockDocumentLoader,
|
|
357
357
|
rules: [],
|
|
358
358
|
prefix: ["_test", "not cached"]
|
|
359
|
-
});
|
|
360
|
-
const result = await loader("https://example.com/object");
|
|
359
|
+
})("https://example.com/object");
|
|
361
360
|
assertEquals(result, {
|
|
362
361
|
contextUrl: null,
|
|
363
362
|
documentUrl: "https://example.com/object",
|
|
@@ -405,7 +404,7 @@ test("kvCache()", async (t) => {
|
|
|
405
404
|
throw new Error("Failed to delete key");
|
|
406
405
|
}
|
|
407
406
|
}
|
|
408
|
-
const
|
|
407
|
+
const result = await kvCache({
|
|
409
408
|
kv: new KvStoreThrowsException(),
|
|
410
409
|
loader: mockDocumentLoader,
|
|
411
410
|
rules: [
|
|
@@ -414,8 +413,7 @@ test("kvCache()", async (t) => {
|
|
|
414
413
|
[new URLPattern("https://example.com/*"), Temporal.Duration.from({ days: 30 })]
|
|
415
414
|
],
|
|
416
415
|
prefix: ["_test", "not cached"]
|
|
417
|
-
});
|
|
418
|
-
const result = await loader("https://example.com/object");
|
|
416
|
+
})("https://example.com/object");
|
|
419
417
|
assertEquals(result, {
|
|
420
418
|
contextUrl: null,
|
|
421
419
|
documentUrl: "https://example.com/object",
|
package/dist/runtime/key.test.js
CHANGED
|
@@ -3,24 +3,24 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
9
|
-
import "../docloader-
|
|
10
|
-
import "../url-
|
|
11
|
-
import "../multibase-
|
|
12
|
-
import { exportMultibaseKey, exportSpki, importMultibaseKey, importPem, importPkcs1, importSpki } from "../vocab-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import "../assert-LOEeCUK5.js";
|
|
8
|
+
import "../assert_instance_of-XtuFevV_.js";
|
|
9
|
+
import "../docloader-BYgIBZvh.js";
|
|
10
|
+
import "../url-C2xuoQD1.js";
|
|
11
|
+
import "../multibase-CnLHszip.js";
|
|
12
|
+
import { exportMultibaseKey, exportSpki, importMultibaseKey, importPem, importPkcs1, importSpki } from "../vocab-lzEJg2bH.js";
|
|
13
13
|
import "../langstr-DbWheeIS.js";
|
|
14
|
-
import "../lookup-
|
|
15
|
-
import "../type-
|
|
16
|
-
import "../actor-
|
|
17
|
-
import { exportJwk, importJwk } from "../key-
|
|
18
|
-
import { test } from "../testing-
|
|
19
|
-
import "../std__assert-
|
|
20
|
-
import "../assert_rejects-
|
|
21
|
-
import "../assert_is_error-
|
|
22
|
-
import "../assert_not_equals-
|
|
23
|
-
import "../assert_throws-
|
|
14
|
+
import "../lookup-Cutk-FXA.js";
|
|
15
|
+
import "../type-CFuiGLz9.js";
|
|
16
|
+
import "../actor-KrOvzFz1.js";
|
|
17
|
+
import { exportJwk, importJwk } from "../key-BTcmhZp7.js";
|
|
18
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
19
|
+
import "../std__assert-o_r9vqm1.js";
|
|
20
|
+
import "../assert_rejects-DWQ4jaf9.js";
|
|
21
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
22
|
+
import "../assert_not_equals-C685gKx6.js";
|
|
23
|
+
import "../assert_throws-YetpVSc-.js";
|
|
24
24
|
|
|
25
25
|
//#region runtime/key.test.ts
|
|
26
26
|
const rsaSpki = "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxsRuvCkgJtflBTl4OVsm\nnt/J1mQfZasfJtN33dcZ3d1lJroxmgmMu69zjGEAwkNbMQaWNLqC4eogkJaeJ4RR\n5MHYXkL9nNilVoTkjX5BVit3puzs7XJ7WQnKQgQMI+ezn24GHsZ/v1JIo77lerX5\nk4HNwTNVt+yaZVQWaOMR3+6FwziQR6kd0VuG9/a9dgAnz2cEoORRC1i4W7IZaB1s\nZnh1WbHbevlGd72HSXll5rocPIHn8gq6xpBgpHwRphlRsgn4KHaJ6brXDIJjrnQh\nIe/YUBOGj/ImSEXhRwlFerKsoAVnZ0Hwbfa46qk44TAt8CyoPMWmpK6pt0ng4pQ2\nuwIDAQAB\n-----END PUBLIC KEY-----\n";
|
|
@@ -3,16 +3,16 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import "../assert-LOEeCUK5.js";
|
|
8
|
+
import "../assert_instance_of-XtuFevV_.js";
|
|
9
9
|
import { LanguageString } from "../langstr-DbWheeIS.js";
|
|
10
|
-
import { test } from "../testing-
|
|
11
|
-
import "../std__assert-
|
|
12
|
-
import "../assert_rejects-
|
|
13
|
-
import "../assert_is_error-
|
|
14
|
-
import "../assert_not_equals-
|
|
15
|
-
import "../assert_throws-
|
|
10
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
11
|
+
import "../std__assert-o_r9vqm1.js";
|
|
12
|
+
import "../assert_rejects-DWQ4jaf9.js";
|
|
13
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
14
|
+
import "../assert_not_equals-C685gKx6.js";
|
|
15
|
+
import "../assert_throws-YetpVSc-.js";
|
|
16
16
|
import { parseLanguageTag } from "@phensley/language-tag";
|
|
17
17
|
import util from "node:util";
|
|
18
18
|
|
package/dist/runtime/mod.js
CHANGED
|
@@ -2,12 +2,12 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { FetchError, fetchDocumentLoader, getDocumentLoader, getUserAgent, kvCache } from "../docloader-
|
|
6
|
-
import { LanguageString, exportMultibaseKey, exportSpki, importMultibaseKey, importPem, importPkcs1, importSpki } from "../actor-
|
|
7
|
-
import "../lookup-
|
|
8
|
-
import "../key-
|
|
9
|
-
import "../http-
|
|
10
|
-
import { getAuthenticatedDocumentLoader } from "../authdocloader-
|
|
5
|
+
import { FetchError, fetchDocumentLoader, getDocumentLoader, getUserAgent, kvCache } from "../docloader-DOrb0fRp.js";
|
|
6
|
+
import { LanguageString, exportMultibaseKey, exportSpki, importMultibaseKey, importPem, importPkcs1, importSpki } from "../actor-CxnKxfwH.js";
|
|
7
|
+
import "../lookup-DrAS097Q.js";
|
|
8
|
+
import "../key-Bg_PKGpe.js";
|
|
9
|
+
import "../http-LsE7i_Zq.js";
|
|
10
|
+
import { getAuthenticatedDocumentLoader } from "../authdocloader-DsULyH5D.js";
|
|
11
11
|
import "../runtime-BSkOVUWM.js";
|
|
12
12
|
|
|
13
13
|
export { FetchError, LanguageString, exportMultibaseKey, exportSpki, fetchDocumentLoader, getAuthenticatedDocumentLoader, getDocumentLoader, getUserAgent, importMultibaseKey, importPem, importPkcs1, importSpki, kvCache };
|
|
@@ -3,16 +3,16 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../../assert_equals-
|
|
7
|
-
import "../../assert-
|
|
8
|
-
import "../../assert_instance_of-
|
|
9
|
-
import { codes, decode, decodeText, encode, encodeText, names } from "../../multibase-
|
|
10
|
-
import { test } from "../../testing-
|
|
11
|
-
import "../../std__assert-
|
|
12
|
-
import "../../assert_rejects-
|
|
13
|
-
import "../../assert_is_error-
|
|
14
|
-
import "../../assert_not_equals-
|
|
15
|
-
import "../../assert_throws-
|
|
6
|
+
import { assertEquals } from "../../assert_equals-B44MxcIj.js";
|
|
7
|
+
import "../../assert-LOEeCUK5.js";
|
|
8
|
+
import "../../assert_instance_of-XtuFevV_.js";
|
|
9
|
+
import { codes, decode, decodeText, encode, encodeText, names } from "../../multibase-CnLHszip.js";
|
|
10
|
+
import { test } from "../../testing-DLyvtiiW.js";
|
|
11
|
+
import "../../std__assert-o_r9vqm1.js";
|
|
12
|
+
import "../../assert_rejects-DWQ4jaf9.js";
|
|
13
|
+
import "../../assert_is_error-BTlryvT0.js";
|
|
14
|
+
import "../../assert_not_equals-C685gKx6.js";
|
|
15
|
+
import "../../assert_throws-YetpVSc-.js";
|
|
16
16
|
|
|
17
17
|
//#region runtime/multibase/multibase.test.ts
|
|
18
18
|
test("multibase.encode and decode", async (t) => {
|
|
@@ -337,8 +337,7 @@ test("multibase.encode and decode", async (t) => {
|
|
|
337
337
|
assertEquals(decodedFromBuffer, encodeText(input), `Decoding buffer of ${name} failed`);
|
|
338
338
|
});
|
|
339
339
|
await t.step("should allow base32pad full alphabet", () => {
|
|
340
|
-
const
|
|
341
|
-
const decoded = decode(encodedStr);
|
|
340
|
+
const decoded = decode("ctimaq4ygg2iegci7");
|
|
342
341
|
const encoded = encode("c", decoded);
|
|
343
342
|
assertEquals(decode(encoded), decoded);
|
|
344
343
|
});
|
package/dist/runtime/url.test.js
CHANGED
|
@@ -3,12 +3,12 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import { UrlError, expandIPv6Address, isValidPublicIPv4Address, isValidPublicIPv6Address, validatePublicUrl } from "../url-
|
|
9
|
-
import { test } from "../testing-
|
|
10
|
-
import { assertFalse, assertRejects } from "../assert_rejects-
|
|
11
|
-
import "../assert_is_error-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import { assert } from "../assert-LOEeCUK5.js";
|
|
8
|
+
import { UrlError, expandIPv6Address, isValidPublicIPv4Address, isValidPublicIPv6Address, validatePublicUrl } from "../url-C2xuoQD1.js";
|
|
9
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
10
|
+
import { assertFalse, assertRejects } from "../assert_rejects-DWQ4jaf9.js";
|
|
11
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
12
12
|
|
|
13
13
|
//#region runtime/url.test.ts
|
|
14
14
|
test("validatePublicUrl()", async () => {
|
|
@@ -140,9 +140,7 @@ function formatSemVer(version) {
|
|
|
140
140
|
const patch = formatNumber(version.patch);
|
|
141
141
|
const pre = version.prerelease?.join(".") ?? "";
|
|
142
142
|
const build = version.build?.join(".") ?? "";
|
|
143
|
-
|
|
144
|
-
const release = [primary, pre].filter((v) => v).join("-");
|
|
145
|
-
return [release, build].filter((v) => v).join("+");
|
|
143
|
+
return [[`${major}.${minor}.${patch}`, pre].filter((v) => v).join("-"), build].filter((v) => v).join("+");
|
|
146
144
|
}
|
|
147
145
|
|
|
148
146
|
//#endregion
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default } from "./docloader-
|
|
7
|
-
import { doubleKnock } from "./http-
|
|
6
|
+
import { deno_default } from "./docloader-BYgIBZvh.js";
|
|
7
|
+
import { doubleKnock } from "./http-Dc8RIaDE.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
10
|
|
|
@@ -44,8 +44,7 @@ function extractInboxes({ recipients, preferSharedInbox, excludeBaseUris }) {
|
|
|
44
44
|
*/
|
|
45
45
|
function sendActivity(options) {
|
|
46
46
|
const tracerProvider = options.tracerProvider ?? trace.getTracerProvider();
|
|
47
|
-
|
|
48
|
-
return tracer.startActiveSpan("activitypub.send_activity", {
|
|
47
|
+
return tracerProvider.getTracer(deno_default.name, deno_default.version).startActiveSpan("activitypub.send_activity", {
|
|
49
48
|
kind: SpanKind.CLIENT,
|
|
50
49
|
attributes: { "activitypub.shared_inbox": options.sharedInbox ?? false }
|
|
51
50
|
}, async (span) => {
|
package/dist/sig/http.test.js
CHANGED
|
@@ -3,28 +3,28 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
9
|
-
import "../docloader-
|
|
10
|
-
import "../url-
|
|
11
|
-
import "../multibase-
|
|
12
|
-
import { exportSpki } from "../vocab-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import { assert } from "../assert-LOEeCUK5.js";
|
|
8
|
+
import "../assert_instance_of-XtuFevV_.js";
|
|
9
|
+
import "../docloader-BYgIBZvh.js";
|
|
10
|
+
import "../url-C2xuoQD1.js";
|
|
11
|
+
import "../multibase-CnLHszip.js";
|
|
12
|
+
import { exportSpki } from "../vocab-lzEJg2bH.js";
|
|
13
13
|
import "../langstr-DbWheeIS.js";
|
|
14
|
-
import "../lookup-
|
|
15
|
-
import "../type-
|
|
16
|
-
import "../actor-
|
|
17
|
-
import { exportJwk } from "../key-
|
|
18
|
-
import { createRfc9421SignatureBase, doubleKnock, formatRfc9421Signature, formatRfc9421SignatureParameters, parseRfc9421Signature, parseRfc9421SignatureInput, signRequest, timingSafeEqual, verifyRequest } from "../http-
|
|
19
|
-
import { test } from "../testing-
|
|
20
|
-
import { assertExists, assertStringIncludes } from "../std__assert-
|
|
21
|
-
import { assertFalse } from "../assert_rejects-
|
|
22
|
-
import "../assert_is_error-
|
|
23
|
-
import "../assert_not_equals-
|
|
24
|
-
import { assertThrows } from "../assert_throws-
|
|
14
|
+
import "../lookup-Cutk-FXA.js";
|
|
15
|
+
import "../type-CFuiGLz9.js";
|
|
16
|
+
import "../actor-KrOvzFz1.js";
|
|
17
|
+
import { exportJwk } from "../key-BTcmhZp7.js";
|
|
18
|
+
import { createRfc9421SignatureBase, doubleKnock, formatRfc9421Signature, formatRfc9421SignatureParameters, parseRfc9421Signature, parseRfc9421SignatureInput, signRequest, timingSafeEqual, verifyRequest } from "../http-Dc8RIaDE.js";
|
|
19
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
20
|
+
import { assertExists, assertStringIncludes } from "../std__assert-o_r9vqm1.js";
|
|
21
|
+
import { assertFalse } from "../assert_rejects-DWQ4jaf9.js";
|
|
22
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
23
|
+
import "../assert_not_equals-C685gKx6.js";
|
|
24
|
+
import { assertThrows } from "../assert_throws-YetpVSc-.js";
|
|
25
25
|
import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
|
|
26
|
-
import { rsaPrivateKey2, rsaPublicKey1, rsaPublicKey2, rsaPublicKey5 } from "../keys-
|
|
27
|
-
import { esm_default } from "../esm-
|
|
26
|
+
import { rsaPrivateKey2, rsaPublicKey1, rsaPublicKey2, rsaPublicKey5 } from "../keys-pbGG00jU.js";
|
|
27
|
+
import { esm_default } from "../esm-DO9PrujO.js";
|
|
28
28
|
import { encodeBase64 } from "byte-encodings/base64";
|
|
29
29
|
|
|
30
30
|
//#region sig/http.test.ts
|
|
@@ -153,6 +153,22 @@ test("verifyRequest() [draft-cavage]", async () => {
|
|
|
153
153
|
currentTime: Temporal.Instant.from("2025-01-01T00:00:00.0000Z"),
|
|
154
154
|
timeWindow: false
|
|
155
155
|
}), rsaPublicKey1);
|
|
156
|
+
const request2 = new Request("https://c27a97f98d5f.ngrok.app/i/inbox", {
|
|
157
|
+
method: "POST",
|
|
158
|
+
body: "{\"@context\":[\"https://www.w3.org/ns/activitystreams\",\"https://w3id.org/security/v1\"],\"actor\":\"https://oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd\",\"object\":{\"actor\":\"https://c27a97f98d5f.ngrok.app/i\",\"object\":\"https://oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd\",\"type\":\"Follow\",\"id\":\"https://c27a97f98d5f.ngrok.app/i#follows/https://oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd\"},\"type\":\"Accept\",\"id\":\"https://oeee.cafe/objects/0fc2608f-5660-4b91-b8c7-63c0c2ac2e20\"}",
|
|
159
|
+
headers: {
|
|
160
|
+
Host: "c27a97f98d5f.ngrok.app",
|
|
161
|
+
"Content-Type": "application/activity+json",
|
|
162
|
+
Date: "Mon, 25 Aug 2025 12:58:14 GMT",
|
|
163
|
+
Digest: "SHA-256=YZyjeVQW5GwliJowASkteBJhFBTq3eQk/AMqRETc//A=",
|
|
164
|
+
Signature: "keyId=\"https://oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd#main-key\",algorithm=\"hs2019\",created=\"1756126694\",expires=\"1756130294\",headers=\"(request-target) (created) (expires) content-type date digest host\",signature=\"XFb0jl2uMhE7RhbneE9sK9Zls2qZec8iy6+9O8UgDQeBGJThORFLjXKlps4QO1WAf1YSVB/i5aV6yF+h73Lm3ZiuAJDx1h+00iLsxoYuIw1CZvF0V2jELoo3sQ2/ZzqeoO6H5TbK7tKnU+ulFAPTuJgjIvPwYl11OMRouVS34NiaHP9Yx9pU813TLv37thG/hUKanyq8kk0IJWtDWteY/zxDvzoe7VOkBXVBHslMyrNAI/5JGulVQAQp/E61dJAhTHHIyGxkc/7iutWFZuqFXIiPJ9KR2OuKDj/B32hEzlsf5xH/CjqOJPIg1qMK8FzDiALCq6zjiKIBEnW8HQc/hQ==\""
|
|
165
|
+
}
|
|
166
|
+
});
|
|
167
|
+
const options2 = {
|
|
168
|
+
...options,
|
|
169
|
+
currentTime: Temporal.Instant.from("2025-08-25T12:58:14Z")
|
|
170
|
+
};
|
|
171
|
+
assert(await verifyRequest(request2, options2) != null);
|
|
156
172
|
});
|
|
157
173
|
test("signRequest() and verifyRequest() [rfc9421] implementation", async () => {
|
|
158
174
|
const currentTimestamp = 1709626184;
|
|
@@ -234,17 +250,15 @@ test("createRfc9421SignatureBase()", () => {
|
|
|
234
250
|
"Content-Type": "text/plain"
|
|
235
251
|
}
|
|
236
252
|
});
|
|
237
|
-
const
|
|
253
|
+
const signatureBase = createRfc9421SignatureBase(request, [
|
|
238
254
|
"@method",
|
|
239
255
|
"@target-uri",
|
|
240
256
|
"host",
|
|
241
257
|
"date"
|
|
242
|
-
]
|
|
243
|
-
const created = 1709626184;
|
|
244
|
-
const signatureBase = createRfc9421SignatureBase(request, components, formatRfc9421SignatureParameters({
|
|
258
|
+
], formatRfc9421SignatureParameters({
|
|
245
259
|
algorithm: "rsa-v1_5-sha256",
|
|
246
260
|
keyId: new URL("https://example.com/key"),
|
|
247
|
-
created
|
|
261
|
+
created: 1709626184
|
|
248
262
|
}));
|
|
249
263
|
const expected = [
|
|
250
264
|
`"@method": POST`,
|
|
@@ -263,24 +277,20 @@ test("formatRfc9421Signature()", () => {
|
|
|
263
277
|
4
|
|
264
278
|
]);
|
|
265
279
|
const keyId = new URL("https://example.com/key");
|
|
266
|
-
const
|
|
267
|
-
const components = [
|
|
280
|
+
const [signatureInput, signatureHeader] = formatRfc9421Signature(signature, [
|
|
268
281
|
"@method",
|
|
269
282
|
"@target-uri",
|
|
270
283
|
"host"
|
|
271
|
-
]
|
|
272
|
-
|
|
273
|
-
const [signatureInput, signatureHeader] = formatRfc9421Signature(signature, components, formatRfc9421SignatureParameters({
|
|
274
|
-
algorithm,
|
|
284
|
+
], formatRfc9421SignatureParameters({
|
|
285
|
+
algorithm: "rsa-v1_5-sha256",
|
|
275
286
|
keyId,
|
|
276
|
-
created
|
|
287
|
+
created: 1709626184
|
|
277
288
|
}));
|
|
278
289
|
assertEquals(signatureInput, `sig1=("@method" "@target-uri" "host");alg="rsa-v1_5-sha256";keyid="https://example.com/key";created=1709626184`);
|
|
279
290
|
assertEquals(signatureHeader, `sig1=:AQIDBA==:`);
|
|
280
291
|
});
|
|
281
292
|
test("parseRfc9421SignatureInput()", () => {
|
|
282
|
-
const
|
|
283
|
-
const parsed = parseRfc9421SignatureInput(signatureInput);
|
|
293
|
+
const parsed = parseRfc9421SignatureInput(`sig1=("@method" "@target-uri" "host" "date");keyid="https://example.com/key";alg="rsa-v1_5-sha256";created=1709626184`);
|
|
284
294
|
assertEquals(parsed.sig1.keyId, "https://example.com/key");
|
|
285
295
|
assertEquals(parsed.sig1.alg, "rsa-v1_5-sha256");
|
|
286
296
|
assertEquals(parsed.sig1.created, 1709626184);
|
|
@@ -293,8 +303,7 @@ test("parseRfc9421SignatureInput()", () => {
|
|
|
293
303
|
assertEquals(parsed.sig1.parameters, "keyid=\"https://example.com/key\";alg=\"rsa-v1_5-sha256\";created=1709626184");
|
|
294
304
|
});
|
|
295
305
|
test("parseRfc9421Signature()", () => {
|
|
296
|
-
const
|
|
297
|
-
const parsed = parseRfc9421Signature(signature);
|
|
306
|
+
const parsed = parseRfc9421Signature(`sig1=:AQIDBA==:,sig2=:Zm9vYmFy:`);
|
|
298
307
|
assertExists(parsed.sig1);
|
|
299
308
|
assertExists(parsed.sig2);
|
|
300
309
|
const sig1Bytes = new Uint8Array(parsed.sig1);
|
|
@@ -547,8 +556,7 @@ test("verifyRequest() [rfc9421] error cases and edge cases", async () => {
|
|
|
547
556
|
const parsedSig = parseRfc9421Signature(signature);
|
|
548
557
|
assertExists(parsedSig.sig1);
|
|
549
558
|
assert(new TextDecoder().decode(parsedSig.sig1).length > 0, "Signature base64 should decode to non-empty string");
|
|
550
|
-
const
|
|
551
|
-
const complexParsedInput = parseRfc9421SignatureInput(complexSignatureInput);
|
|
559
|
+
const complexParsedInput = parseRfc9421SignatureInput("sig1=(\"@method\" \"@target-uri\" \"host\" \"content-type\" \"value with \\\"quotes\\\" and spaces\");keyid=\"https://example.com/key with spaces\";alg=\"rsa-v1_5-sha256\";created=1709626184");
|
|
552
560
|
assertExists(complexParsedInput.sig1);
|
|
553
561
|
assertEquals(complexParsedInput.sig1.keyId, "https://example.com/key with spaces");
|
|
554
562
|
assertEquals(complexParsedInput.sig1.alg, "rsa-v1_5-sha256");
|
|
@@ -567,14 +575,11 @@ test("verifyRequest() [rfc9421] error cases and edge cases", async () => {
|
|
|
567
575
|
assertEquals(multiParsedInput.sig2.alg, "rsa-pss-sha512");
|
|
568
576
|
const multiParsedSig = parseRfc9421Signature(multiSigRequest.headers.get("Signature") || "");
|
|
569
577
|
assertEquals(Object.keys(multiParsedSig).length, 2, "Should parse multiple signature values");
|
|
570
|
-
const
|
|
571
|
-
const parsedInvalidInput = parseRfc9421SignatureInput(invalidInputFormat);
|
|
578
|
+
const parsedInvalidInput = parseRfc9421SignatureInput("this is not a valid signature-input format");
|
|
572
579
|
assertEquals(Object.keys(parsedInvalidInput).length, 0, "Should handle invalid Signature-Input format");
|
|
573
|
-
const
|
|
574
|
-
const parsedInvalidSig = parseRfc9421Signature(invalidSigFormat);
|
|
580
|
+
const parsedInvalidSig = parseRfc9421Signature("this is not a valid signature format");
|
|
575
581
|
assertEquals(Object.keys(parsedInvalidSig).length, 0, "Should handle invalid Signature format");
|
|
576
|
-
const
|
|
577
|
-
const parsedInvalidBase64 = parseRfc9421Signature(invalidBase64Sig);
|
|
582
|
+
const parsedInvalidBase64 = parseRfc9421Signature("sig1=:!@#$%%^&*():");
|
|
578
583
|
assertEquals(Object.keys(parsedInvalidBase64).length, 0, "Should handle invalid base64 in signature");
|
|
579
584
|
const mixedRequest = new Request("https://example.com/api/resource", {
|
|
580
585
|
method: "GET",
|
|
@@ -952,7 +957,7 @@ test("timingSafeEqual()", async (t) => {
|
|
|
952
957
|
assert(timingSafeEqual(arr, arr), "Array should be equal to itself by reference");
|
|
953
958
|
});
|
|
954
959
|
await t.step("should return false for arrays with same length but different content", async (t2) => {
|
|
955
|
-
const
|
|
960
|
+
for (const tc of [
|
|
956
961
|
{
|
|
957
962
|
a: [
|
|
958
963
|
1,
|
|
@@ -1010,13 +1015,12 @@ test("timingSafeEqual()", async (t) => {
|
|
|
1010
1015
|
],
|
|
1011
1016
|
name: "middle byte differs with edge values"
|
|
1012
1017
|
}
|
|
1013
|
-
]
|
|
1014
|
-
for (const tc of testCases) await t2.step(tc.name, () => {
|
|
1018
|
+
]) await t2.step(tc.name, () => {
|
|
1015
1019
|
assertFalse(timingSafeEqual(new Uint8Array(tc.a), new Uint8Array(tc.b)));
|
|
1016
1020
|
});
|
|
1017
1021
|
});
|
|
1018
1022
|
await t.step("should return false for arrays with different lengths", async (t2) => {
|
|
1019
|
-
const
|
|
1023
|
+
for (const tc of [
|
|
1020
1024
|
{
|
|
1021
1025
|
a: [
|
|
1022
1026
|
1,
|
|
@@ -1053,13 +1057,12 @@ test("timingSafeEqual()", async (t) => {
|
|
|
1053
1057
|
b: [],
|
|
1054
1058
|
name: "a non-empty, b empty"
|
|
1055
1059
|
}
|
|
1056
|
-
]
|
|
1057
|
-
for (const tc of testCases) await t2.step(tc.name, () => {
|
|
1060
|
+
]) await t2.step(tc.name, () => {
|
|
1058
1061
|
assertFalse(timingSafeEqual(new Uint8Array(tc.a), new Uint8Array(tc.b)));
|
|
1059
1062
|
});
|
|
1060
1063
|
});
|
|
1061
1064
|
await t.step("should return false where content matches up to shorter length", async (t2) => {
|
|
1062
|
-
const
|
|
1065
|
+
for (const tc of [
|
|
1063
1066
|
{
|
|
1064
1067
|
a: [1, 2],
|
|
1065
1068
|
b: [
|
|
@@ -1088,8 +1091,7 @@ test("timingSafeEqual()", async (t) => {
|
|
|
1088
1091
|
b: [0],
|
|
1089
1092
|
name: "two zeros vs single zero"
|
|
1090
1093
|
}
|
|
1091
|
-
]
|
|
1092
|
-
for (const tc of testCases) await t2.step(tc.name, () => {
|
|
1094
|
+
]) await t2.step(tc.name, () => {
|
|
1093
1095
|
assertFalse(timingSafeEqual(new Uint8Array(tc.a), new Uint8Array(tc.b)));
|
|
1094
1096
|
});
|
|
1095
1097
|
});
|
package/dist/sig/key.test.js
CHANGED
|
@@ -3,26 +3,26 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
9
|
-
import "../docloader-
|
|
10
|
-
import "../url-
|
|
11
|
-
import "../multibase-
|
|
12
|
-
import { CryptographicKey, Multikey } from "../vocab-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import "../assert-LOEeCUK5.js";
|
|
8
|
+
import "../assert_instance_of-XtuFevV_.js";
|
|
9
|
+
import "../docloader-BYgIBZvh.js";
|
|
10
|
+
import "../url-C2xuoQD1.js";
|
|
11
|
+
import "../multibase-CnLHszip.js";
|
|
12
|
+
import { CryptographicKey, Multikey } from "../vocab-lzEJg2bH.js";
|
|
13
13
|
import "../langstr-DbWheeIS.js";
|
|
14
|
-
import "../lookup-
|
|
15
|
-
import "../type-
|
|
16
|
-
import "../actor-
|
|
17
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "../key-
|
|
18
|
-
import { test } from "../testing-
|
|
19
|
-
import "../std__assert-
|
|
20
|
-
import { assertRejects } from "../assert_rejects-
|
|
21
|
-
import "../assert_is_error-
|
|
22
|
-
import "../assert_not_equals-
|
|
23
|
-
import { assertThrows } from "../assert_throws-
|
|
14
|
+
import "../lookup-Cutk-FXA.js";
|
|
15
|
+
import "../type-CFuiGLz9.js";
|
|
16
|
+
import "../actor-KrOvzFz1.js";
|
|
17
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "../key-BTcmhZp7.js";
|
|
18
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
19
|
+
import "../std__assert-o_r9vqm1.js";
|
|
20
|
+
import { assertRejects } from "../assert_rejects-DWQ4jaf9.js";
|
|
21
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
22
|
+
import "../assert_not_equals-C685gKx6.js";
|
|
23
|
+
import { assertThrows } from "../assert_throws-YetpVSc-.js";
|
|
24
24
|
import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
|
|
25
|
-
import { ed25519Multikey, rsaPrivateKey2, rsaPublicKey1, rsaPublicKey2, rsaPublicKey3 } from "../keys-
|
|
25
|
+
import { ed25519Multikey, rsaPrivateKey2, rsaPublicKey1, rsaPublicKey2, rsaPublicKey3 } from "../keys-pbGG00jU.js";
|
|
26
26
|
|
|
27
27
|
//#region sig/key.test.ts
|
|
28
28
|
test("validateCryptoKey()", async () => {
|
package/dist/sig/ld.test.js
CHANGED
|
@@ -3,24 +3,24 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import "../docloader-
|
|
9
|
-
import "../url-
|
|
10
|
-
import "../multibase-
|
|
11
|
-
import { CryptographicKey } from "../vocab-
|
|
6
|
+
import { assertEquals } from "../assert_equals-B44MxcIj.js";
|
|
7
|
+
import { assert } from "../assert-LOEeCUK5.js";
|
|
8
|
+
import "../docloader-BYgIBZvh.js";
|
|
9
|
+
import "../url-C2xuoQD1.js";
|
|
10
|
+
import "../multibase-CnLHszip.js";
|
|
11
|
+
import { CryptographicKey } from "../vocab-lzEJg2bH.js";
|
|
12
12
|
import "../langstr-DbWheeIS.js";
|
|
13
|
-
import "../lookup-
|
|
14
|
-
import "../type-
|
|
15
|
-
import "../actor-
|
|
16
|
-
import { generateCryptoKeyPair } from "../key-
|
|
17
|
-
import { attachSignature, createSignature, detachSignature, signJsonLd, verifyJsonLd, verifySignature } from "../ld-
|
|
18
|
-
import { test } from "../testing-
|
|
19
|
-
import { assertFalse, assertRejects } from "../assert_rejects-
|
|
20
|
-
import "../assert_is_error-
|
|
21
|
-
import { assertThrows } from "../assert_throws-
|
|
13
|
+
import "../lookup-Cutk-FXA.js";
|
|
14
|
+
import "../type-CFuiGLz9.js";
|
|
15
|
+
import "../actor-KrOvzFz1.js";
|
|
16
|
+
import { generateCryptoKeyPair } from "../key-BTcmhZp7.js";
|
|
17
|
+
import { attachSignature, createSignature, detachSignature, signJsonLd, verifyJsonLd, verifySignature } from "../ld-n_kUCeXG.js";
|
|
18
|
+
import { test } from "../testing-DLyvtiiW.js";
|
|
19
|
+
import { assertFalse, assertRejects } from "../assert_rejects-DWQ4jaf9.js";
|
|
20
|
+
import "../assert_is_error-BTlryvT0.js";
|
|
21
|
+
import { assertThrows } from "../assert_throws-YetpVSc-.js";
|
|
22
22
|
import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
|
|
23
|
-
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-
|
|
23
|
+
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-pbGG00jU.js";
|
|
24
24
|
import { encodeBase64 } from "byte-encodings/base64";
|
|
25
25
|
|
|
26
26
|
//#region sig/ld.test.ts
|
|
@@ -59,13 +59,12 @@ test("createSignature()", async () => {
|
|
|
59
59
|
assertRejects(() => createSignature(doc, ed25519PrivateKey, ed25519Multikey.id, { contextLoader: mockDocumentLoader }), TypeError);
|
|
60
60
|
});
|
|
61
61
|
test("signJsonLd()", async () => {
|
|
62
|
-
const
|
|
62
|
+
const signed = await signJsonLd({
|
|
63
63
|
"@context": "https://www.w3.org/ns/activitystreams",
|
|
64
64
|
id: "https://example.com/1",
|
|
65
65
|
type: "Create",
|
|
66
66
|
actor: "https://example.com/person2"
|
|
67
|
-
};
|
|
68
|
-
const signed = await signJsonLd(doc, rsaPrivateKey3, rsaPublicKey3.id, { contextLoader: mockDocumentLoader });
|
|
67
|
+
}, rsaPrivateKey3, rsaPublicKey3.id, { contextLoader: mockDocumentLoader });
|
|
69
68
|
const verified = await verifyJsonLd(signed, {
|
|
70
69
|
documentLoader: mockDocumentLoader,
|
|
71
70
|
contextLoader: mockDocumentLoader
|
|
@@ -215,13 +214,12 @@ test("verifyJsonLd()", async () => {
|
|
|
215
214
|
contextLoader: mockDocumentLoader
|
|
216
215
|
});
|
|
217
216
|
assert(verified);
|
|
218
|
-
const
|
|
217
|
+
const signed = await signJsonLd({
|
|
219
218
|
"@context": "https://www.w3.org/ns/activitystreams",
|
|
220
219
|
id: "https://example.com/1",
|
|
221
220
|
type: "Create",
|
|
222
221
|
actor: "https://example.com/person2"
|
|
223
|
-
};
|
|
224
|
-
const signed = await signJsonLd(doc, rsaPrivateKey2, rsaPublicKey2.id, { contextLoader: mockDocumentLoader });
|
|
222
|
+
}, rsaPrivateKey2, rsaPublicKey2.id, { contextLoader: mockDocumentLoader });
|
|
225
223
|
const verified2 = await verifyJsonLd(signed, {
|
|
226
224
|
documentLoader: mockDocumentLoader,
|
|
227
225
|
contextLoader: mockDocumentLoader
|
package/dist/sig/mod.js
CHANGED
|
@@ -2,12 +2,12 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import "../docloader-
|
|
6
|
-
import "../actor-
|
|
7
|
-
import "../lookup-
|
|
8
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk } from "../key-
|
|
9
|
-
import { signRequest, verifyRequest } from "../http-
|
|
10
|
-
import { attachSignature, createProof, createSignature, detachSignature, doesActorOwnKey, getKeyOwner, signJsonLd, signObject, verifyJsonLd, verifyObject, verifyProof, verifySignature } from "../proof-
|
|
5
|
+
import "../docloader-DOrb0fRp.js";
|
|
6
|
+
import "../actor-CxnKxfwH.js";
|
|
7
|
+
import "../lookup-DrAS097Q.js";
|
|
8
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk } from "../key-Bg_PKGpe.js";
|
|
9
|
+
import { signRequest, verifyRequest } from "../http-LsE7i_Zq.js";
|
|
10
|
+
import { attachSignature, createProof, createSignature, detachSignature, doesActorOwnKey, getKeyOwner, signJsonLd, signObject, verifyJsonLd, verifyObject, verifyProof, verifySignature } from "../proof-BTx3Maj-.js";
|
|
11
11
|
import "../sig-BXJO--F9.js";
|
|
12
12
|
|
|
13
13
|
export { attachSignature, createProof, createSignature, detachSignature, doesActorOwnKey, exportJwk, fetchKey, generateCryptoKeyPair, getKeyOwner, importJwk, signJsonLd, signObject, signRequest, verifyJsonLd, verifyObject, verifyProof, verifyRequest, verifySignature };
|