@fedify/fedify 1.7.5 → 1.7.7-pr.335.1200

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/dist/{actor-D-zfQLAH.js → actor-C2Mfj4Qb.js} +3 -3
  2. package/dist/{actor-CKXuhyRT.js → actor-DeD8Ssmc.js} +179 -179
  3. package/dist/{assert-0DSnLFa8.js → assert-DmFG7ppO.js} +1 -1
  4. package/dist/{assert_equals-XhPMqqO2.js → assert_equals-CTYbeopb.js} +29 -11
  5. package/dist/{assert_instance_of-v5adm_-K.js → assert_instance_of-CF09JHYM.js} +1 -1
  6. package/dist/{assert_is_error-Drwb_yQp.js → assert_is_error-nrwA1GeT.js} +1 -1
  7. package/dist/{assert_not_equals-BRPdeJ9D.js → assert_not_equals-Dc7y-V5Q.js} +1 -1
  8. package/dist/{assert_rejects-D_nYI1gs.js → assert_rejects-C-sxEMM5.js} +2 -2
  9. package/dist/{assert_throws-DNuPhPNp.js → assert_throws-Cn9C6Jur.js} +2 -2
  10. package/dist/{authdocloader-CFk80WJv.js → authdocloader-CI3H7pXi.js} +3 -3
  11. package/dist/{authdocloader-81r40Meg.js → authdocloader-CJnvh79G.js} +3 -3
  12. package/dist/{builder-Cmn0cpiZ.js → builder-CSktHhko.js} +3 -3
  13. package/dist/{client-CuYHcL1K.js → client-Ca3crT54.js} +1 -1
  14. package/dist/compat/mod.d.ts +3 -3
  15. package/dist/compat/transformers.test.js +20 -20
  16. package/dist/{context-CFiKyaR_.js → context-DiibppcK.js} +2 -2
  17. package/dist/{context-DPggmpB4.d.ts → context-OBWjptjU.d.ts} +1 -1
  18. package/dist/{docloader-BLY7GyoJ.js → docloader-B4d21jdR.js} +1 -1
  19. package/dist/{docloader-Ck2GBnC3.js → docloader-DcpH5qdc.js} +1 -1
  20. package/dist/federation/builder.test.js +12 -12
  21. package/dist/federation/collection.test.js +8 -8
  22. package/dist/federation/handler.test.js +27 -27
  23. package/dist/federation/inbox.test.js +6 -6
  24. package/dist/federation/keycache.test.js +6 -6
  25. package/dist/federation/kv.test.js +8 -8
  26. package/dist/federation/middleware.test.js +26 -26
  27. package/dist/federation/mod.d.ts +2 -2
  28. package/dist/federation/mod.js +10 -10
  29. package/dist/federation/mq.test.js +8 -8
  30. package/dist/federation/retry.test.js +2 -2
  31. package/dist/federation/router.test.js +8 -8
  32. package/dist/federation/send.test.js +17 -17
  33. package/dist/{http-B6yJ2mAf.js → http-Ci4FgdSu.js} +25 -17
  34. package/dist/{http-Cmpdwx_X.js → http-DM-ZrUGQ.js} +25 -17
  35. package/dist/{http-B8EiSgi2.d.ts → http-DMTrO3Ye.d.ts} +5 -0
  36. package/dist/{inbox-CcAueP-r.js → inbox-CxhB9_EB.js} +2 -2
  37. package/dist/{key-BAckFVRH.js → key--MHORsOK.js} +3 -3
  38. package/dist/{key-Cj0F3jFv.js → key-B6feD_h3.js} +4 -4
  39. package/dist/{key-rZ_Yr0Yr.js → key-CNu5TLEL.js} +5 -5
  40. package/dist/{key-D1uKqeD5.js → key-E19_5jHF.js} +2 -2
  41. package/dist/{keycache-Ce9ou6p4.js → keycache-qwrVvJSf.js} +1 -1
  42. package/dist/{keys-DcrALCdq.js → keys-BoATr8-t.js} +1 -1
  43. package/dist/{ld-S8bkC8Cg.js → ld-DgQMpAqt.js} +3 -3
  44. package/dist/{lookup-DNZf9_oN.js → lookup-BKdjC9iv.js} +1 -1
  45. package/dist/{lookup-DW0leLqq.js → lookup-BOXeOCAs.js} +3 -3
  46. package/dist/{lookup-CQ5H1v6m.js → lookup-CQ7kGOlJ.js} +1 -1
  47. package/dist/{middleware-CrCDov2d.js → middleware-1g7K0k5I.js} +16 -16
  48. package/dist/middleware-B8ihf8Xl.js +17 -0
  49. package/dist/middleware-B9adkiGz.js +33 -0
  50. package/dist/{middleware-Ba2-qvzk.js → middleware-BNxCJDxz.js} +11 -11
  51. package/dist/{mod-sEI6_uZ2.d.ts → mod-CCL2cvnI.d.ts} +2 -2
  52. package/dist/{mod-CbjCOiVh.d.ts → mod-DFncUgcE.d.ts} +1 -1
  53. package/dist/{mod-C2drFqH8.d.ts → mod-qFMzZ3iF.d.ts} +1 -1
  54. package/dist/mod.d.ts +6 -6
  55. package/dist/mod.js +10 -10
  56. package/dist/nodeinfo/client.test.js +10 -10
  57. package/dist/nodeinfo/handler.test.js +26 -26
  58. package/dist/nodeinfo/mod.js +2 -2
  59. package/dist/nodeinfo/semver.test.js +8 -8
  60. package/dist/nodeinfo/types.test.js +8 -8
  61. package/dist/{owner-B5IFvDCy.js → owner-Bmyaijjl.js} +3 -3
  62. package/dist/{proof-C6nF-oYD.js → proof-DNoyFe-l.js} +3 -3
  63. package/dist/{proof-CnQWIl9G.js → proof-Jt13veui.js} +3 -3
  64. package/dist/runtime/authdocloader.test.js +16 -16
  65. package/dist/runtime/docloader.test.js +9 -9
  66. package/dist/runtime/key.test.js +13 -13
  67. package/dist/runtime/langstr.test.js +8 -8
  68. package/dist/runtime/mod.d.ts +2 -2
  69. package/dist/runtime/mod.js +6 -6
  70. package/dist/runtime/multibase/multibase.test.js +8 -8
  71. package/dist/runtime/url.test.js +4 -4
  72. package/dist/{send-IlYZ_CVt.js → send-JhSmt6iS.js} +2 -2
  73. package/dist/sig/http.test.js +38 -15
  74. package/dist/sig/key.test.js +14 -14
  75. package/dist/sig/ld.test.js +12 -12
  76. package/dist/sig/mod.d.ts +2 -2
  77. package/dist/sig/mod.js +6 -6
  78. package/dist/sig/owner.test.js +16 -16
  79. package/dist/sig/proof.test.js +15 -15
  80. package/dist/{std__assert-CmyZxqPw.js → std__assert-vp0TKMS1.js} +1 -1
  81. package/dist/testing/docloader.test.js +8 -8
  82. package/dist/{types-BAIE7lzA.js → types-B2aUNSNz.js} +1 -1
  83. package/dist/vocab/actor.test.js +12 -12
  84. package/dist/vocab/lookup.test.js +12 -12
  85. package/dist/vocab/mod.js +4 -4
  86. package/dist/vocab/type.test.js +3 -3
  87. package/dist/vocab/vocab.test.js +48 -46
  88. package/dist/{vocab-Cs1Xg69m.js → vocab-6hEwnJ9V.js} +178 -178
  89. package/dist/{vocab-BdvvrpJb.js → vocab-B19EfPCZ.js} +3 -3
  90. package/dist/webfinger/handler.test.js +26 -26
  91. package/dist/webfinger/lookup.test.js +10 -10
  92. package/dist/webfinger/mod.js +2 -2
  93. package/dist/x/cfworkers.test.js +8 -8
  94. package/dist/x/hono.d.ts +2 -2
  95. package/dist/x/sveltekit.d.ts +2 -2
  96. package/package.json +1 -1
  97. package/dist/middleware-BBLmcWi8.js +0 -33
  98. package/dist/middleware-OQqgTYLn.js +0 -17
@@ -3,44 +3,44 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { assertEquals } from "../assert_equals-XhPMqqO2.js";
7
- import { assert } from "../assert-0DSnLFa8.js";
8
- import { assertInstanceOf } from "../assert_instance_of-v5adm_-K.js";
6
+ import { assertEquals } from "../assert_equals-CTYbeopb.js";
7
+ import { assert } from "../assert-DmFG7ppO.js";
8
+ import { assertInstanceOf } from "../assert_instance_of-CF09JHYM.js";
9
9
  import { MemoryKvStore } from "../kv-BMY6Qf_A.js";
10
- import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-CrCDov2d.js";
11
- import { FetchError, fetchDocumentLoader } from "../docloader-BLY7GyoJ.js";
10
+ import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-1g7K0k5I.js";
11
+ import { FetchError, fetchDocumentLoader } from "../docloader-B4d21jdR.js";
12
12
  import "../url-kTAI6_KP.js";
13
13
  import "../semver-DWClQt_5.js";
14
- import "../client-CuYHcL1K.js";
14
+ import "../client-Ca3crT54.js";
15
15
  import { RouterError } from "../router-D_aVZZUc.js";
16
16
  import "../types-C7C_l-jz.js";
17
17
  import "../multibase-DeCHcK8L.js";
18
- import { Activity, Announce, Create, Invite, Multikey, Note, Object as Object$1, Offer, Person } from "../vocab-Cs1Xg69m.js";
18
+ import { Activity, Announce, Create, Invite, Multikey, Note, Object as Object$1, Offer, Person } from "../vocab-6hEwnJ9V.js";
19
19
  import "../langstr-DbWheeIS.js";
20
- import "../lookup-DNZf9_oN.js";
20
+ import "../lookup-BKdjC9iv.js";
21
21
  import { getTypeId } from "../type-D2s5lmbZ.js";
22
- import "../actor-D-zfQLAH.js";
23
- import "../key-BAckFVRH.js";
24
- import { signRequest, verifyRequest } from "../http-Cmpdwx_X.js";
25
- import { getAuthenticatedDocumentLoader } from "../authdocloader-81r40Meg.js";
26
- import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-S8bkC8Cg.js";
27
- import { doesActorOwnKey } from "../owner-B5IFvDCy.js";
28
- import { signObject, verifyObject } from "../proof-CnQWIl9G.js";
29
- import { lookupObject } from "../lookup-DW0leLqq.js";
30
- import "../inbox-CcAueP-r.js";
31
- import "../builder-Cmn0cpiZ.js";
22
+ import "../actor-C2Mfj4Qb.js";
23
+ import "../key--MHORsOK.js";
24
+ import { signRequest, verifyRequest } from "../http-DM-ZrUGQ.js";
25
+ import { getAuthenticatedDocumentLoader } from "../authdocloader-CJnvh79G.js";
26
+ import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-DgQMpAqt.js";
27
+ import { doesActorOwnKey } from "../owner-Bmyaijjl.js";
28
+ import { signObject, verifyObject } from "../proof-Jt13veui.js";
29
+ import { lookupObject } from "../lookup-BOXeOCAs.js";
30
+ import "../inbox-CxhB9_EB.js";
31
+ import "../builder-CSktHhko.js";
32
32
  import "../collection-Dfb0TPno.js";
33
- import "../keycache-Ce9ou6p4.js";
33
+ import "../keycache-qwrVvJSf.js";
34
34
  import "../retry-BiIhZWgD.js";
35
- import "../send-IlYZ_CVt.js";
35
+ import "../send-JhSmt6iS.js";
36
36
  import { test } from "../testing-BZ0dJ4qn.js";
37
- import { assertStrictEquals } from "../std__assert-CmyZxqPw.js";
38
- import { assertFalse, assertRejects } from "../assert_rejects-D_nYI1gs.js";
39
- import "../assert_is_error-Drwb_yQp.js";
40
- import { assertNotEquals } from "../assert_not_equals-BRPdeJ9D.js";
41
- import { assertThrows } from "../assert_throws-DNuPhPNp.js";
37
+ import { assertStrictEquals } from "../std__assert-vp0TKMS1.js";
38
+ import { assertFalse, assertRejects } from "../assert_rejects-C-sxEMM5.js";
39
+ import "../assert_is_error-nrwA1GeT.js";
40
+ import { assertNotEquals } from "../assert_not_equals-Dc7y-V5Q.js";
41
+ import { assertThrows } from "../assert_throws-Cn9C6Jur.js";
42
42
  import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
43
- import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-DcrALCdq.js";
43
+ import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-BoATr8-t.js";
44
44
  import { esm_default } from "../esm-CASHO3OR.js";
45
45
 
46
46
  //#region testing/fixtures/example.com/person.json
@@ -5,11 +5,11 @@ import "../docloader-Q42SMRIB.js";
5
5
  import "../client-DvtwXO7t.js";
6
6
  import "../vocab-CzEfWQk2.js";
7
7
  import "../actor-CPpvuBKU.js";
8
- import "../http-B8EiSgi2.js";
8
+ import "../http-DMTrO3Ye.js";
9
9
  import "../owner-D0cOz8R5.js";
10
10
  import "../mod-CDzlVCUF.js";
11
11
  import "../lookup-Bf-K85bV.js";
12
- import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-DPggmpB4.js";
12
+ import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-OBWjptjU.js";
13
13
  import { InProcessMessageQueue, InProcessMessageQueueOptions, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, ParallelMessageQueue } from "../mq-DYKDDJmp.js";
14
14
  import "../mod-g0xFzAP9.js";
15
15
  export { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, KvKey, KvStore, KvStoreSetOptions, MemoryKvStore, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParallelMessageQueue, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
@@ -3,16 +3,16 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
 
5
5
  import "../transformers-ghwJuzGY.js";
6
- import "../docloader-Ck2GBnC3.js";
7
- import "../actor-CKXuhyRT.js";
8
- import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-Ba2-qvzk.js";
9
- import "../lookup-CQ5H1v6m.js";
10
- import "../key-D1uKqeD5.js";
11
- import "../http-B6yJ2mAf.js";
12
- import "../proof-C6nF-oYD.js";
6
+ import "../docloader-DcpH5qdc.js";
7
+ import "../actor-DeD8Ssmc.js";
8
+ import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-BNxCJDxz.js";
9
+ import "../lookup-CQ7kGOlJ.js";
10
+ import "../key-E19_5jHF.js";
11
+ import "../http-Ci4FgdSu.js";
12
+ import "../proof-DNoyFe-l.js";
13
13
  import { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue } from "../federation-BRIQn-GV.js";
14
- import "../types-BAIE7lzA.js";
15
- import "../authdocloader-CFk80WJv.js";
16
- import "../vocab-BdvvrpJb.js";
14
+ import "../types-B2aUNSNz.js";
15
+ import "../authdocloader-CI3H7pXi.js";
16
+ import "../vocab-B19EfPCZ.js";
17
17
 
18
18
  export { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue, Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
@@ -3,15 +3,15 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { assertEquals } from "../assert_equals-XhPMqqO2.js";
7
- import { assert } from "../assert-0DSnLFa8.js";
8
- import "../assert_instance_of-v5adm_-K.js";
6
+ import { assertEquals } from "../assert_equals-CTYbeopb.js";
7
+ import { assert } from "../assert-DmFG7ppO.js";
8
+ import "../assert_instance_of-CF09JHYM.js";
9
9
  import { test } from "../testing-BZ0dJ4qn.js";
10
- import { assertGreater, assertGreaterOrEqual } from "../std__assert-CmyZxqPw.js";
11
- import { assertFalse } from "../assert_rejects-D_nYI1gs.js";
12
- import "../assert_is_error-Drwb_yQp.js";
13
- import "../assert_not_equals-BRPdeJ9D.js";
14
- import "../assert_throws-DNuPhPNp.js";
10
+ import { assertGreater, assertGreaterOrEqual } from "../std__assert-vp0TKMS1.js";
11
+ import { assertFalse } from "../assert_rejects-C-sxEMM5.js";
12
+ import "../assert_is_error-nrwA1GeT.js";
13
+ import "../assert_not_equals-Dc7y-V5Q.js";
14
+ import "../assert_throws-Cn9C6Jur.js";
15
15
  import { delay } from "@es-toolkit/es-toolkit";
16
16
 
17
17
  //#region federation/mq.ts
@@ -3,10 +3,10 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { AssertionError, assertEquals } from "../assert_equals-XhPMqqO2.js";
6
+ import { AssertionError, assertEquals } from "../assert_equals-CTYbeopb.js";
7
7
  import { createExponentialBackoffPolicy } from "../retry-BiIhZWgD.js";
8
8
  import { test } from "../testing-BZ0dJ4qn.js";
9
- import { assertNotEquals } from "../assert_not_equals-BRPdeJ9D.js";
9
+ import { assertNotEquals } from "../assert_not_equals-Dc7y-V5Q.js";
10
10
 
11
11
  //#region federation/retry.test.ts
12
12
  test("createExponentialBackoffPolicy()", () => {
@@ -3,16 +3,16 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { assertEquals } from "../assert_equals-XhPMqqO2.js";
7
- import { assert } from "../assert-0DSnLFa8.js";
8
- import "../assert_instance_of-v5adm_-K.js";
6
+ import { assertEquals } from "../assert_equals-CTYbeopb.js";
7
+ import { assert } from "../assert-DmFG7ppO.js";
8
+ import "../assert_instance_of-CF09JHYM.js";
9
9
  import { Router, RouterError } from "../router-D_aVZZUc.js";
10
10
  import { test } from "../testing-BZ0dJ4qn.js";
11
- import "../std__assert-CmyZxqPw.js";
12
- import { assertFalse } from "../assert_rejects-D_nYI1gs.js";
13
- import "../assert_is_error-Drwb_yQp.js";
14
- import "../assert_not_equals-BRPdeJ9D.js";
15
- import { assertThrows } from "../assert_throws-DNuPhPNp.js";
11
+ import "../std__assert-vp0TKMS1.js";
12
+ import { assertFalse } from "../assert_rejects-C-sxEMM5.js";
13
+ import "../assert_is_error-nrwA1GeT.js";
14
+ import "../assert_not_equals-Dc7y-V5Q.js";
15
+ import { assertThrows } from "../assert_throws-Cn9C6Jur.js";
16
16
 
17
17
  //#region federation/router.test.ts
18
18
  function setUp(options = {}) {
@@ -3,29 +3,29 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { assertEquals } from "../assert_equals-XhPMqqO2.js";
7
- import { assert } from "../assert-0DSnLFa8.js";
8
- import "../assert_instance_of-v5adm_-K.js";
9
- import "../docloader-BLY7GyoJ.js";
6
+ import { assertEquals } from "../assert_equals-CTYbeopb.js";
7
+ import { assert } from "../assert-DmFG7ppO.js";
8
+ import "../assert_instance_of-CF09JHYM.js";
9
+ import "../docloader-B4d21jdR.js";
10
10
  import "../url-kTAI6_KP.js";
11
11
  import "../multibase-DeCHcK8L.js";
12
- import { Activity, Application, Endpoints, Group, Person, Service } from "../vocab-Cs1Xg69m.js";
12
+ import { Activity, Application, Endpoints, Group, Person, Service } from "../vocab-6hEwnJ9V.js";
13
13
  import "../langstr-DbWheeIS.js";
14
- import "../lookup-DNZf9_oN.js";
14
+ import "../lookup-BKdjC9iv.js";
15
15
  import "../type-D2s5lmbZ.js";
16
- import "../actor-D-zfQLAH.js";
17
- import "../key-BAckFVRH.js";
18
- import { verifyRequest } from "../http-Cmpdwx_X.js";
19
- import { doesActorOwnKey } from "../owner-B5IFvDCy.js";
20
- import { extractInboxes, sendActivity } from "../send-IlYZ_CVt.js";
16
+ import "../actor-C2Mfj4Qb.js";
17
+ import "../key--MHORsOK.js";
18
+ import { verifyRequest } from "../http-DM-ZrUGQ.js";
19
+ import { doesActorOwnKey } from "../owner-Bmyaijjl.js";
20
+ import { extractInboxes, sendActivity } from "../send-JhSmt6iS.js";
21
21
  import { test } from "../testing-BZ0dJ4qn.js";
22
- import "../std__assert-CmyZxqPw.js";
23
- import { assertFalse, assertRejects } from "../assert_rejects-D_nYI1gs.js";
24
- import "../assert_is_error-Drwb_yQp.js";
25
- import { assertNotEquals } from "../assert_not_equals-BRPdeJ9D.js";
26
- import "../assert_throws-DNuPhPNp.js";
22
+ import "../std__assert-vp0TKMS1.js";
23
+ import { assertFalse, assertRejects } from "../assert_rejects-C-sxEMM5.js";
24
+ import "../assert_is_error-nrwA1GeT.js";
25
+ import { assertNotEquals } from "../assert_not_equals-Dc7y-V5Q.js";
26
+ import "../assert_throws-Cn9C6Jur.js";
27
27
  import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
28
- import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-DcrALCdq.js";
28
+ import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-BoATr8-t.js";
29
29
  import { esm_default } from "../esm-CASHO3OR.js";
30
30
 
31
31
  //#region federation/send.test.ts
@@ -2,9 +2,9 @@
2
2
  import { Temporal } from "@js-temporal/polyfill";
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
 
5
- import { deno_default } from "./docloader-Ck2GBnC3.js";
6
- import { CryptographicKey } from "./actor-CKXuhyRT.js";
7
- import { fetchKey, validateCryptoKey } from "./key-D1uKqeD5.js";
5
+ import { deno_default } from "./docloader-DcpH5qdc.js";
6
+ import { CryptographicKey } from "./actor-DeD8Ssmc.js";
7
+ import { fetchKey, validateCryptoKey } from "./key-E19_5jHF.js";
8
8
  import { getLogger } from "@logtape/logtape";
9
9
  import { SpanStatusCode, trace } from "@opentelemetry/api";
10
10
  import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
@@ -30,8 +30,8 @@ async function signRequest(request, privateKey, keyId, options = {}) {
30
30
  try {
31
31
  const spec = options.spec ?? "draft-cavage-http-signatures-12";
32
32
  let signed;
33
- if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime);
34
- else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime);
33
+ if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime, options.body);
34
+ else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime, options.body);
35
35
  if (span.isRecording()) {
36
36
  span.setAttribute(ATTR_HTTP_REQUEST_METHOD, signed.method);
37
37
  span.setAttribute(ATTR_URL_FULL, signed.url);
@@ -50,10 +50,10 @@ async function signRequest(request, privateKey, keyId, options = {}) {
50
50
  }
51
51
  });
52
52
  }
53
- async function signRequestDraft(request, privateKey, keyId, span, currentTime) {
53
+ async function signRequestDraft(request, privateKey, keyId, span, currentTime, bodyBuffer) {
54
54
  if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
55
55
  const url = new URL(request.url);
56
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
56
+ const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
57
57
  const headers = new Headers(request.headers);
58
58
  if (!headers.has("Host")) headers.set("Host", url.host);
59
59
  if (!headers.has("Digest") && body != null) {
@@ -184,10 +184,10 @@ function parseRfc9421Signature(signature) {
184
184
  for (const [key, value] of Object.entries(dict)) if (value.value instanceof Uint8Array) result[key] = value.value;
185
185
  return result;
186
186
  }
187
- async function signRequestRfc9421(request, privateKey, keyId, span, currentTime) {
187
+ async function signRequestRfc9421(request, privateKey, keyId, span, currentTime, bodyBuffer) {
188
188
  if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
189
189
  const url = new URL(request.url);
190
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
190
+ const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
191
191
  const headers = new Headers(request.headers);
192
192
  if (!headers.has("Host")) headers.set("Host", url.host);
193
193
  if (!headers.has("Content-Digest") && body != null) {
@@ -647,11 +647,12 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
647
647
  * Helper function to create a new Request for redirect handling.
648
648
  * @param request The original request.
649
649
  * @param location The redirect location.
650
- * @param body The request body as ArrayBuffer or undefined.
650
+ * @param body The request body as ArrayBuffer or null.
651
651
  * @returns A new Request object for the redirect.
652
652
  */
653
653
  function createRedirectRequest(request, location, body) {
654
- return new Request(location, {
654
+ const url = new URL(location, request.url);
655
+ return new Request(url, {
655
656
  method: request.method,
656
657
  headers: request.headers,
657
658
  body,
@@ -680,16 +681,20 @@ async function doubleKnock(request, identity, options = {}) {
680
681
  const { specDeterminer, log, tracerProvider } = options;
681
682
  const origin = new URL(request.url).origin;
682
683
  const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
684
+ const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
683
685
  let signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
684
686
  spec: firstTrySpec,
685
- tracerProvider
687
+ tracerProvider,
688
+ body
686
689
  });
687
690
  log?.(signedRequest);
688
691
  let response = await fetch(signedRequest, { redirect: "manual" });
689
692
  if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
690
693
  const location = response.headers.get("Location");
691
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : void 0;
692
- return doubleKnock(createRedirectRequest(request, location, body), identity, options);
694
+ return doubleKnock(createRedirectRequest(request, location, body), identity, {
695
+ ...options,
696
+ body
697
+ });
693
698
  } else if (response.status === 400 || response.status === 401 || response.status > 401) {
694
699
  const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
695
700
  getLogger([
@@ -704,14 +709,17 @@ async function doubleKnock(request, identity, options = {}) {
704
709
  });
705
710
  signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
706
711
  spec,
707
- tracerProvider
712
+ tracerProvider,
713
+ body
708
714
  });
709
715
  log?.(signedRequest);
710
716
  response = await fetch(signedRequest, { redirect: "manual" });
711
717
  if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
712
718
  const location = response.headers.get("Location");
713
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : void 0;
714
- return doubleKnock(createRedirectRequest(request, location, body), identity, options);
719
+ return doubleKnock(createRedirectRequest(request, location, body), identity, {
720
+ ...options,
721
+ body
722
+ });
715
723
  } else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
716
724
  } else await specDeterminer?.rememberSpec(origin, firstTrySpec);
717
725
  return response;
@@ -3,9 +3,9 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { deno_default } from "./docloader-BLY7GyoJ.js";
7
- import { CryptographicKey } from "./vocab-Cs1Xg69m.js";
8
- import { fetchKey, validateCryptoKey } from "./key-BAckFVRH.js";
6
+ import { deno_default } from "./docloader-B4d21jdR.js";
7
+ import { CryptographicKey } from "./vocab-6hEwnJ9V.js";
8
+ import { fetchKey, validateCryptoKey } from "./key--MHORsOK.js";
9
9
  import { getLogger } from "@logtape/logtape";
10
10
  import { SpanStatusCode, trace } from "@opentelemetry/api";
11
11
  import { ATTR_HTTP_REQUEST_HEADER, ATTR_HTTP_REQUEST_METHOD, ATTR_URL_FULL } from "@opentelemetry/semantic-conventions";
@@ -31,8 +31,8 @@ async function signRequest(request, privateKey, keyId, options = {}) {
31
31
  try {
32
32
  const spec = options.spec ?? "draft-cavage-http-signatures-12";
33
33
  let signed;
34
- if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime);
35
- else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime);
34
+ if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime, options.body);
35
+ else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime, options.body);
36
36
  if (span.isRecording()) {
37
37
  span.setAttribute(ATTR_HTTP_REQUEST_METHOD, signed.method);
38
38
  span.setAttribute(ATTR_URL_FULL, signed.url);
@@ -51,10 +51,10 @@ async function signRequest(request, privateKey, keyId, options = {}) {
51
51
  }
52
52
  });
53
53
  }
54
- async function signRequestDraft(request, privateKey, keyId, span, currentTime) {
54
+ async function signRequestDraft(request, privateKey, keyId, span, currentTime, bodyBuffer) {
55
55
  if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
56
56
  const url = new URL(request.url);
57
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
57
+ const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
58
58
  const headers = new Headers(request.headers);
59
59
  if (!headers.has("Host")) headers.set("Host", url.host);
60
60
  if (!headers.has("Digest") && body != null) {
@@ -185,10 +185,10 @@ function parseRfc9421Signature(signature) {
185
185
  for (const [key, value] of Object.entries(dict)) if (value.value instanceof Uint8Array) result[key] = value.value;
186
186
  return result;
187
187
  }
188
- async function signRequestRfc9421(request, privateKey, keyId, span, currentTime) {
188
+ async function signRequestRfc9421(request, privateKey, keyId, span, currentTime, bodyBuffer) {
189
189
  if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
190
190
  const url = new URL(request.url);
191
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
191
+ const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
192
192
  const headers = new Headers(request.headers);
193
193
  if (!headers.has("Host")) headers.set("Host", url.host);
194
194
  if (!headers.has("Content-Digest") && body != null) {
@@ -648,11 +648,12 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
648
648
  * Helper function to create a new Request for redirect handling.
649
649
  * @param request The original request.
650
650
  * @param location The redirect location.
651
- * @param body The request body as ArrayBuffer or undefined.
651
+ * @param body The request body as ArrayBuffer or null.
652
652
  * @returns A new Request object for the redirect.
653
653
  */
654
654
  function createRedirectRequest(request, location, body) {
655
- return new Request(location, {
655
+ const url = new URL(location, request.url);
656
+ return new Request(url, {
656
657
  method: request.method,
657
658
  headers: request.headers,
658
659
  body,
@@ -681,16 +682,20 @@ async function doubleKnock(request, identity, options = {}) {
681
682
  const { specDeterminer, log, tracerProvider } = options;
682
683
  const origin = new URL(request.url).origin;
683
684
  const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
685
+ const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
684
686
  let signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
685
687
  spec: firstTrySpec,
686
- tracerProvider
688
+ tracerProvider,
689
+ body
687
690
  });
688
691
  log?.(signedRequest);
689
692
  let response = await fetch(signedRequest, { redirect: "manual" });
690
693
  if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
691
694
  const location = response.headers.get("Location");
692
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : void 0;
693
- return doubleKnock(createRedirectRequest(request, location, body), identity, options);
695
+ return doubleKnock(createRedirectRequest(request, location, body), identity, {
696
+ ...options,
697
+ body
698
+ });
694
699
  } else if (response.status === 400 || response.status === 401 || response.status > 401) {
695
700
  const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
696
701
  getLogger([
@@ -705,14 +710,17 @@ async function doubleKnock(request, identity, options = {}) {
705
710
  });
706
711
  signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
707
712
  spec,
708
- tracerProvider
713
+ tracerProvider,
714
+ body
709
715
  });
710
716
  log?.(signedRequest);
711
717
  response = await fetch(signedRequest, { redirect: "manual" });
712
718
  if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
713
719
  const location = response.headers.get("Location");
714
- const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : void 0;
715
- return doubleKnock(createRedirectRequest(request, location, body), identity, options);
720
+ return doubleKnock(createRedirectRequest(request, location, body), identity, {
721
+ ...options,
722
+ body
723
+ });
716
724
  } else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
717
725
  } else await specDeterminer?.rememberSpec(origin, firstTrySpec);
718
726
  return response;
@@ -148,6 +148,11 @@ interface SignRequestOptions {
148
148
  * @since 1.6.0
149
149
  */
150
150
  currentTime?: Temporal.Instant;
151
+ /**
152
+ * The request body as ArrayBuffer. If provided, avoids cloning the request body.
153
+ * @since 1.7.7
154
+ */
155
+ body?: ArrayBuffer | null;
151
156
  /**
152
157
  * The OpenTelemetry tracer provider. If omitted, the global tracer provider
153
158
  * is used.
@@ -3,8 +3,8 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { deno_default } from "./docloader-BLY7GyoJ.js";
7
- import { Activity } from "./vocab-Cs1Xg69m.js";
6
+ import { deno_default } from "./docloader-B4d21jdR.js";
7
+ import { Activity } from "./vocab-6hEwnJ9V.js";
8
8
  import { getTypeId } from "./type-D2s5lmbZ.js";
9
9
  import { getLogger } from "@logtape/logtape";
10
10
  import { SpanKind, SpanStatusCode, context, propagation, trace } from "@opentelemetry/api";
@@ -3,9 +3,9 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { deno_default, getDocumentLoader } from "./docloader-BLY7GyoJ.js";
7
- import { CryptographicKey, Object as Object$1 } from "./vocab-Cs1Xg69m.js";
8
- import { isActor } from "./actor-D-zfQLAH.js";
6
+ import { deno_default, getDocumentLoader } from "./docloader-B4d21jdR.js";
7
+ import { CryptographicKey, Object as Object$1 } from "./vocab-6hEwnJ9V.js";
8
+ import { isActor } from "./actor-C2Mfj4Qb.js";
9
9
  import { getLogger } from "@logtape/logtape";
10
10
  import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
11
11
 
@@ -2,9 +2,9 @@
2
2
  import { Temporal } from "@js-temporal/polyfill";
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
 
5
- import "./docloader-Ck2GBnC3.js";
6
- import "./actor-CKXuhyRT.js";
7
- import "./lookup-CQ5H1v6m.js";
8
- import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-D1uKqeD5.js";
5
+ import "./docloader-DcpH5qdc.js";
6
+ import "./actor-DeD8Ssmc.js";
7
+ import "./lookup-CQ7kGOlJ.js";
8
+ import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-E19_5jHF.js";
9
9
 
10
10
  export { validateCryptoKey };
@@ -3,14 +3,14 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import "./docloader-BLY7GyoJ.js";
6
+ import "./docloader-B4d21jdR.js";
7
7
  import "./url-kTAI6_KP.js";
8
8
  import "./multibase-DeCHcK8L.js";
9
- import "./vocab-Cs1Xg69m.js";
9
+ import "./vocab-6hEwnJ9V.js";
10
10
  import "./langstr-DbWheeIS.js";
11
- import "./lookup-DNZf9_oN.js";
11
+ import "./lookup-BKdjC9iv.js";
12
12
  import "./type-D2s5lmbZ.js";
13
- import "./actor-D-zfQLAH.js";
14
- import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-BAckFVRH.js";
13
+ import "./actor-C2Mfj4Qb.js";
14
+ import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key--MHORsOK.js";
15
15
 
16
16
  export { validateCryptoKey };
@@ -2,8 +2,8 @@
2
2
  import { Temporal } from "@js-temporal/polyfill";
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
 
5
- import { deno_default, getDocumentLoader } from "./docloader-Ck2GBnC3.js";
6
- import { CryptographicKey, Object as Object$1, isActor } from "./actor-CKXuhyRT.js";
5
+ import { deno_default, getDocumentLoader } from "./docloader-DcpH5qdc.js";
6
+ import { CryptographicKey, Object as Object$1, isActor } from "./actor-DeD8Ssmc.js";
7
7
  import { getLogger } from "@logtape/logtape";
8
8
  import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
9
9
 
@@ -3,7 +3,7 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { CryptographicKey, Multikey } from "./vocab-Cs1Xg69m.js";
6
+ import { CryptographicKey, Multikey } from "./vocab-6hEwnJ9V.js";
7
7
 
8
8
  //#region federation/keycache.ts
9
9
  var KvKeyCache = class {
@@ -3,7 +3,7 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { CryptographicKey, Multikey, importSpki } from "./vocab-Cs1Xg69m.js";
6
+ import { CryptographicKey, Multikey, importSpki } from "./vocab-6hEwnJ9V.js";
7
7
 
8
8
  //#region testing/keys.ts
9
9
  const rsaPublicKey1 = new CryptographicKey({
@@ -3,10 +3,10 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { deno_default, getDocumentLoader } from "./docloader-BLY7GyoJ.js";
7
- import { Activity, CryptographicKey, Object as Object$1 } from "./vocab-Cs1Xg69m.js";
6
+ import { deno_default, getDocumentLoader } from "./docloader-B4d21jdR.js";
7
+ import { Activity, CryptographicKey, Object as Object$1 } from "./vocab-6hEwnJ9V.js";
8
8
  import { getTypeId } from "./type-D2s5lmbZ.js";
9
- import { fetchKey, validateCryptoKey } from "./key-BAckFVRH.js";
9
+ import { fetchKey, validateCryptoKey } from "./key--MHORsOK.js";
10
10
  import { getLogger } from "@logtape/logtape";
11
11
  import { SpanStatusCode, trace } from "@opentelemetry/api";
12
12
  import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
@@ -3,7 +3,7 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { deno_default, getUserAgent } from "./docloader-BLY7GyoJ.js";
6
+ import { deno_default, getUserAgent } from "./docloader-B4d21jdR.js";
7
7
  import { UrlError, validatePublicUrl } from "./url-kTAI6_KP.js";
8
8
  import { getLogger } from "@logtape/logtape";
9
9
  import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
@@ -3,9 +3,9 @@
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
  globalThis.addEventListener = () => {};
5
5
 
6
- import { deno_default, getDocumentLoader } from "./docloader-BLY7GyoJ.js";
7
- import { Object as Object$1 } from "./vocab-Cs1Xg69m.js";
8
- import { lookupWebFinger } from "./lookup-DNZf9_oN.js";
6
+ import { deno_default, getDocumentLoader } from "./docloader-B4d21jdR.js";
7
+ import { Object as Object$1 } from "./vocab-6hEwnJ9V.js";
8
+ import { lookupWebFinger } from "./lookup-BKdjC9iv.js";
9
9
  import { getTypeId } from "./type-D2s5lmbZ.js";
10
10
  import { getLogger } from "@logtape/logtape";
11
11
  import { SpanStatusCode, trace } from "@opentelemetry/api";
@@ -2,7 +2,7 @@
2
2
  import { Temporal } from "@js-temporal/polyfill";
3
3
  import { URLPattern } from "urlpattern-polyfill";
4
4
 
5
- import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-Ck2GBnC3.js";
5
+ import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-DcpH5qdc.js";
6
6
  import { getLogger } from "@logtape/logtape";
7
7
  import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
8
8