@fedify/fedify 1.7.5 → 1.7.7-pr.335.1200
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{actor-D-zfQLAH.js → actor-C2Mfj4Qb.js} +3 -3
- package/dist/{actor-CKXuhyRT.js → actor-DeD8Ssmc.js} +179 -179
- package/dist/{assert-0DSnLFa8.js → assert-DmFG7ppO.js} +1 -1
- package/dist/{assert_equals-XhPMqqO2.js → assert_equals-CTYbeopb.js} +29 -11
- package/dist/{assert_instance_of-v5adm_-K.js → assert_instance_of-CF09JHYM.js} +1 -1
- package/dist/{assert_is_error-Drwb_yQp.js → assert_is_error-nrwA1GeT.js} +1 -1
- package/dist/{assert_not_equals-BRPdeJ9D.js → assert_not_equals-Dc7y-V5Q.js} +1 -1
- package/dist/{assert_rejects-D_nYI1gs.js → assert_rejects-C-sxEMM5.js} +2 -2
- package/dist/{assert_throws-DNuPhPNp.js → assert_throws-Cn9C6Jur.js} +2 -2
- package/dist/{authdocloader-CFk80WJv.js → authdocloader-CI3H7pXi.js} +3 -3
- package/dist/{authdocloader-81r40Meg.js → authdocloader-CJnvh79G.js} +3 -3
- package/dist/{builder-Cmn0cpiZ.js → builder-CSktHhko.js} +3 -3
- package/dist/{client-CuYHcL1K.js → client-Ca3crT54.js} +1 -1
- package/dist/compat/mod.d.ts +3 -3
- package/dist/compat/transformers.test.js +20 -20
- package/dist/{context-CFiKyaR_.js → context-DiibppcK.js} +2 -2
- package/dist/{context-DPggmpB4.d.ts → context-OBWjptjU.d.ts} +1 -1
- package/dist/{docloader-BLY7GyoJ.js → docloader-B4d21jdR.js} +1 -1
- package/dist/{docloader-Ck2GBnC3.js → docloader-DcpH5qdc.js} +1 -1
- package/dist/federation/builder.test.js +12 -12
- package/dist/federation/collection.test.js +8 -8
- package/dist/federation/handler.test.js +27 -27
- package/dist/federation/inbox.test.js +6 -6
- package/dist/federation/keycache.test.js +6 -6
- package/dist/federation/kv.test.js +8 -8
- package/dist/federation/middleware.test.js +26 -26
- package/dist/federation/mod.d.ts +2 -2
- package/dist/federation/mod.js +10 -10
- package/dist/federation/mq.test.js +8 -8
- package/dist/federation/retry.test.js +2 -2
- package/dist/federation/router.test.js +8 -8
- package/dist/federation/send.test.js +17 -17
- package/dist/{http-B6yJ2mAf.js → http-Ci4FgdSu.js} +25 -17
- package/dist/{http-Cmpdwx_X.js → http-DM-ZrUGQ.js} +25 -17
- package/dist/{http-B8EiSgi2.d.ts → http-DMTrO3Ye.d.ts} +5 -0
- package/dist/{inbox-CcAueP-r.js → inbox-CxhB9_EB.js} +2 -2
- package/dist/{key-BAckFVRH.js → key--MHORsOK.js} +3 -3
- package/dist/{key-Cj0F3jFv.js → key-B6feD_h3.js} +4 -4
- package/dist/{key-rZ_Yr0Yr.js → key-CNu5TLEL.js} +5 -5
- package/dist/{key-D1uKqeD5.js → key-E19_5jHF.js} +2 -2
- package/dist/{keycache-Ce9ou6p4.js → keycache-qwrVvJSf.js} +1 -1
- package/dist/{keys-DcrALCdq.js → keys-BoATr8-t.js} +1 -1
- package/dist/{ld-S8bkC8Cg.js → ld-DgQMpAqt.js} +3 -3
- package/dist/{lookup-DNZf9_oN.js → lookup-BKdjC9iv.js} +1 -1
- package/dist/{lookup-DW0leLqq.js → lookup-BOXeOCAs.js} +3 -3
- package/dist/{lookup-CQ5H1v6m.js → lookup-CQ7kGOlJ.js} +1 -1
- package/dist/{middleware-CrCDov2d.js → middleware-1g7K0k5I.js} +16 -16
- package/dist/middleware-B8ihf8Xl.js +17 -0
- package/dist/middleware-B9adkiGz.js +33 -0
- package/dist/{middleware-Ba2-qvzk.js → middleware-BNxCJDxz.js} +11 -11
- package/dist/{mod-sEI6_uZ2.d.ts → mod-CCL2cvnI.d.ts} +2 -2
- package/dist/{mod-CbjCOiVh.d.ts → mod-DFncUgcE.d.ts} +1 -1
- package/dist/{mod-C2drFqH8.d.ts → mod-qFMzZ3iF.d.ts} +1 -1
- package/dist/mod.d.ts +6 -6
- package/dist/mod.js +10 -10
- package/dist/nodeinfo/client.test.js +10 -10
- package/dist/nodeinfo/handler.test.js +26 -26
- package/dist/nodeinfo/mod.js +2 -2
- package/dist/nodeinfo/semver.test.js +8 -8
- package/dist/nodeinfo/types.test.js +8 -8
- package/dist/{owner-B5IFvDCy.js → owner-Bmyaijjl.js} +3 -3
- package/dist/{proof-C6nF-oYD.js → proof-DNoyFe-l.js} +3 -3
- package/dist/{proof-CnQWIl9G.js → proof-Jt13veui.js} +3 -3
- package/dist/runtime/authdocloader.test.js +16 -16
- package/dist/runtime/docloader.test.js +9 -9
- package/dist/runtime/key.test.js +13 -13
- package/dist/runtime/langstr.test.js +8 -8
- package/dist/runtime/mod.d.ts +2 -2
- package/dist/runtime/mod.js +6 -6
- package/dist/runtime/multibase/multibase.test.js +8 -8
- package/dist/runtime/url.test.js +4 -4
- package/dist/{send-IlYZ_CVt.js → send-JhSmt6iS.js} +2 -2
- package/dist/sig/http.test.js +38 -15
- package/dist/sig/key.test.js +14 -14
- package/dist/sig/ld.test.js +12 -12
- package/dist/sig/mod.d.ts +2 -2
- package/dist/sig/mod.js +6 -6
- package/dist/sig/owner.test.js +16 -16
- package/dist/sig/proof.test.js +15 -15
- package/dist/{std__assert-CmyZxqPw.js → std__assert-vp0TKMS1.js} +1 -1
- package/dist/testing/docloader.test.js +8 -8
- package/dist/{types-BAIE7lzA.js → types-B2aUNSNz.js} +1 -1
- package/dist/vocab/actor.test.js +12 -12
- package/dist/vocab/lookup.test.js +12 -12
- package/dist/vocab/mod.js +4 -4
- package/dist/vocab/type.test.js +3 -3
- package/dist/vocab/vocab.test.js +48 -46
- package/dist/{vocab-Cs1Xg69m.js → vocab-6hEwnJ9V.js} +178 -178
- package/dist/{vocab-BdvvrpJb.js → vocab-B19EfPCZ.js} +3 -3
- package/dist/webfinger/handler.test.js +26 -26
- package/dist/webfinger/lookup.test.js +10 -10
- package/dist/webfinger/mod.js +2 -2
- package/dist/x/cfworkers.test.js +8 -8
- package/dist/x/hono.d.ts +2 -2
- package/dist/x/sveltekit.d.ts +2 -2
- package/package.json +1 -1
- package/dist/middleware-BBLmcWi8.js +0 -33
- package/dist/middleware-OQqgTYLn.js +0 -17
|
@@ -3,44 +3,44 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import { assertInstanceOf } from "../assert_instance_of-
|
|
6
|
+
import { assertEquals } from "../assert_equals-CTYbeopb.js";
|
|
7
|
+
import { assert } from "../assert-DmFG7ppO.js";
|
|
8
|
+
import { assertInstanceOf } from "../assert_instance_of-CF09JHYM.js";
|
|
9
9
|
import { MemoryKvStore } from "../kv-BMY6Qf_A.js";
|
|
10
|
-
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-
|
|
11
|
-
import { FetchError, fetchDocumentLoader } from "../docloader-
|
|
10
|
+
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-1g7K0k5I.js";
|
|
11
|
+
import { FetchError, fetchDocumentLoader } from "../docloader-B4d21jdR.js";
|
|
12
12
|
import "../url-kTAI6_KP.js";
|
|
13
13
|
import "../semver-DWClQt_5.js";
|
|
14
|
-
import "../client-
|
|
14
|
+
import "../client-Ca3crT54.js";
|
|
15
15
|
import { RouterError } from "../router-D_aVZZUc.js";
|
|
16
16
|
import "../types-C7C_l-jz.js";
|
|
17
17
|
import "../multibase-DeCHcK8L.js";
|
|
18
|
-
import { Activity, Announce, Create, Invite, Multikey, Note, Object as Object$1, Offer, Person } from "../vocab-
|
|
18
|
+
import { Activity, Announce, Create, Invite, Multikey, Note, Object as Object$1, Offer, Person } from "../vocab-6hEwnJ9V.js";
|
|
19
19
|
import "../langstr-DbWheeIS.js";
|
|
20
|
-
import "../lookup-
|
|
20
|
+
import "../lookup-BKdjC9iv.js";
|
|
21
21
|
import { getTypeId } from "../type-D2s5lmbZ.js";
|
|
22
|
-
import "../actor-
|
|
23
|
-
import "../key
|
|
24
|
-
import { signRequest, verifyRequest } from "../http-
|
|
25
|
-
import { getAuthenticatedDocumentLoader } from "../authdocloader-
|
|
26
|
-
import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-
|
|
27
|
-
import { doesActorOwnKey } from "../owner-
|
|
28
|
-
import { signObject, verifyObject } from "../proof-
|
|
29
|
-
import { lookupObject } from "../lookup-
|
|
30
|
-
import "../inbox-
|
|
31
|
-
import "../builder-
|
|
22
|
+
import "../actor-C2Mfj4Qb.js";
|
|
23
|
+
import "../key--MHORsOK.js";
|
|
24
|
+
import { signRequest, verifyRequest } from "../http-DM-ZrUGQ.js";
|
|
25
|
+
import { getAuthenticatedDocumentLoader } from "../authdocloader-CJnvh79G.js";
|
|
26
|
+
import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-DgQMpAqt.js";
|
|
27
|
+
import { doesActorOwnKey } from "../owner-Bmyaijjl.js";
|
|
28
|
+
import { signObject, verifyObject } from "../proof-Jt13veui.js";
|
|
29
|
+
import { lookupObject } from "../lookup-BOXeOCAs.js";
|
|
30
|
+
import "../inbox-CxhB9_EB.js";
|
|
31
|
+
import "../builder-CSktHhko.js";
|
|
32
32
|
import "../collection-Dfb0TPno.js";
|
|
33
|
-
import "../keycache-
|
|
33
|
+
import "../keycache-qwrVvJSf.js";
|
|
34
34
|
import "../retry-BiIhZWgD.js";
|
|
35
|
-
import "../send-
|
|
35
|
+
import "../send-JhSmt6iS.js";
|
|
36
36
|
import { test } from "../testing-BZ0dJ4qn.js";
|
|
37
|
-
import { assertStrictEquals } from "../std__assert-
|
|
38
|
-
import { assertFalse, assertRejects } from "../assert_rejects-
|
|
39
|
-
import "../assert_is_error-
|
|
40
|
-
import { assertNotEquals } from "../assert_not_equals-
|
|
41
|
-
import { assertThrows } from "../assert_throws-
|
|
37
|
+
import { assertStrictEquals } from "../std__assert-vp0TKMS1.js";
|
|
38
|
+
import { assertFalse, assertRejects } from "../assert_rejects-C-sxEMM5.js";
|
|
39
|
+
import "../assert_is_error-nrwA1GeT.js";
|
|
40
|
+
import { assertNotEquals } from "../assert_not_equals-Dc7y-V5Q.js";
|
|
41
|
+
import { assertThrows } from "../assert_throws-Cn9C6Jur.js";
|
|
42
42
|
import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
|
|
43
|
-
import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-
|
|
43
|
+
import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-BoATr8-t.js";
|
|
44
44
|
import { esm_default } from "../esm-CASHO3OR.js";
|
|
45
45
|
|
|
46
46
|
//#region testing/fixtures/example.com/person.json
|
package/dist/federation/mod.d.ts
CHANGED
|
@@ -5,11 +5,11 @@ import "../docloader-Q42SMRIB.js";
|
|
|
5
5
|
import "../client-DvtwXO7t.js";
|
|
6
6
|
import "../vocab-CzEfWQk2.js";
|
|
7
7
|
import "../actor-CPpvuBKU.js";
|
|
8
|
-
import "../http-
|
|
8
|
+
import "../http-DMTrO3Ye.js";
|
|
9
9
|
import "../owner-D0cOz8R5.js";
|
|
10
10
|
import "../mod-CDzlVCUF.js";
|
|
11
11
|
import "../lookup-Bf-K85bV.js";
|
|
12
|
-
import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-
|
|
12
|
+
import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-OBWjptjU.js";
|
|
13
13
|
import { InProcessMessageQueue, InProcessMessageQueueOptions, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, ParallelMessageQueue } from "../mq-DYKDDJmp.js";
|
|
14
14
|
import "../mod-g0xFzAP9.js";
|
|
15
15
|
export { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, KvKey, KvStore, KvStoreSetOptions, MemoryKvStore, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParallelMessageQueue, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
|
package/dist/federation/mod.js
CHANGED
|
@@ -3,16 +3,16 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
5
|
import "../transformers-ghwJuzGY.js";
|
|
6
|
-
import "../docloader-
|
|
7
|
-
import "../actor-
|
|
8
|
-
import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-
|
|
9
|
-
import "../lookup-
|
|
10
|
-
import "../key-
|
|
11
|
-
import "../http-
|
|
12
|
-
import "../proof-
|
|
6
|
+
import "../docloader-DcpH5qdc.js";
|
|
7
|
+
import "../actor-DeD8Ssmc.js";
|
|
8
|
+
import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-BNxCJDxz.js";
|
|
9
|
+
import "../lookup-CQ7kGOlJ.js";
|
|
10
|
+
import "../key-E19_5jHF.js";
|
|
11
|
+
import "../http-Ci4FgdSu.js";
|
|
12
|
+
import "../proof-DNoyFe-l.js";
|
|
13
13
|
import { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue } from "../federation-BRIQn-GV.js";
|
|
14
|
-
import "../types-
|
|
15
|
-
import "../authdocloader-
|
|
16
|
-
import "../vocab-
|
|
14
|
+
import "../types-B2aUNSNz.js";
|
|
15
|
+
import "../authdocloader-CI3H7pXi.js";
|
|
16
|
+
import "../vocab-B19EfPCZ.js";
|
|
17
17
|
|
|
18
18
|
export { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue, Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
|
|
@@ -3,15 +3,15 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
6
|
+
import { assertEquals } from "../assert_equals-CTYbeopb.js";
|
|
7
|
+
import { assert } from "../assert-DmFG7ppO.js";
|
|
8
|
+
import "../assert_instance_of-CF09JHYM.js";
|
|
9
9
|
import { test } from "../testing-BZ0dJ4qn.js";
|
|
10
|
-
import { assertGreater, assertGreaterOrEqual } from "../std__assert-
|
|
11
|
-
import { assertFalse } from "../assert_rejects-
|
|
12
|
-
import "../assert_is_error-
|
|
13
|
-
import "../assert_not_equals-
|
|
14
|
-
import "../assert_throws-
|
|
10
|
+
import { assertGreater, assertGreaterOrEqual } from "../std__assert-vp0TKMS1.js";
|
|
11
|
+
import { assertFalse } from "../assert_rejects-C-sxEMM5.js";
|
|
12
|
+
import "../assert_is_error-nrwA1GeT.js";
|
|
13
|
+
import "../assert_not_equals-Dc7y-V5Q.js";
|
|
14
|
+
import "../assert_throws-Cn9C6Jur.js";
|
|
15
15
|
import { delay } from "@es-toolkit/es-toolkit";
|
|
16
16
|
|
|
17
17
|
//#region federation/mq.ts
|
|
@@ -3,10 +3,10 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { AssertionError, assertEquals } from "../assert_equals-
|
|
6
|
+
import { AssertionError, assertEquals } from "../assert_equals-CTYbeopb.js";
|
|
7
7
|
import { createExponentialBackoffPolicy } from "../retry-BiIhZWgD.js";
|
|
8
8
|
import { test } from "../testing-BZ0dJ4qn.js";
|
|
9
|
-
import { assertNotEquals } from "../assert_not_equals-
|
|
9
|
+
import { assertNotEquals } from "../assert_not_equals-Dc7y-V5Q.js";
|
|
10
10
|
|
|
11
11
|
//#region federation/retry.test.ts
|
|
12
12
|
test("createExponentialBackoffPolicy()", () => {
|
|
@@ -3,16 +3,16 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
6
|
+
import { assertEquals } from "../assert_equals-CTYbeopb.js";
|
|
7
|
+
import { assert } from "../assert-DmFG7ppO.js";
|
|
8
|
+
import "../assert_instance_of-CF09JHYM.js";
|
|
9
9
|
import { Router, RouterError } from "../router-D_aVZZUc.js";
|
|
10
10
|
import { test } from "../testing-BZ0dJ4qn.js";
|
|
11
|
-
import "../std__assert-
|
|
12
|
-
import { assertFalse } from "../assert_rejects-
|
|
13
|
-
import "../assert_is_error-
|
|
14
|
-
import "../assert_not_equals-
|
|
15
|
-
import { assertThrows } from "../assert_throws-
|
|
11
|
+
import "../std__assert-vp0TKMS1.js";
|
|
12
|
+
import { assertFalse } from "../assert_rejects-C-sxEMM5.js";
|
|
13
|
+
import "../assert_is_error-nrwA1GeT.js";
|
|
14
|
+
import "../assert_not_equals-Dc7y-V5Q.js";
|
|
15
|
+
import { assertThrows } from "../assert_throws-Cn9C6Jur.js";
|
|
16
16
|
|
|
17
17
|
//#region federation/router.test.ts
|
|
18
18
|
function setUp(options = {}) {
|
|
@@ -3,29 +3,29 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { assertEquals } from "../assert_equals-
|
|
7
|
-
import { assert } from "../assert-
|
|
8
|
-
import "../assert_instance_of-
|
|
9
|
-
import "../docloader-
|
|
6
|
+
import { assertEquals } from "../assert_equals-CTYbeopb.js";
|
|
7
|
+
import { assert } from "../assert-DmFG7ppO.js";
|
|
8
|
+
import "../assert_instance_of-CF09JHYM.js";
|
|
9
|
+
import "../docloader-B4d21jdR.js";
|
|
10
10
|
import "../url-kTAI6_KP.js";
|
|
11
11
|
import "../multibase-DeCHcK8L.js";
|
|
12
|
-
import { Activity, Application, Endpoints, Group, Person, Service } from "../vocab-
|
|
12
|
+
import { Activity, Application, Endpoints, Group, Person, Service } from "../vocab-6hEwnJ9V.js";
|
|
13
13
|
import "../langstr-DbWheeIS.js";
|
|
14
|
-
import "../lookup-
|
|
14
|
+
import "../lookup-BKdjC9iv.js";
|
|
15
15
|
import "../type-D2s5lmbZ.js";
|
|
16
|
-
import "../actor-
|
|
17
|
-
import "../key
|
|
18
|
-
import { verifyRequest } from "../http-
|
|
19
|
-
import { doesActorOwnKey } from "../owner-
|
|
20
|
-
import { extractInboxes, sendActivity } from "../send-
|
|
16
|
+
import "../actor-C2Mfj4Qb.js";
|
|
17
|
+
import "../key--MHORsOK.js";
|
|
18
|
+
import { verifyRequest } from "../http-DM-ZrUGQ.js";
|
|
19
|
+
import { doesActorOwnKey } from "../owner-Bmyaijjl.js";
|
|
20
|
+
import { extractInboxes, sendActivity } from "../send-JhSmt6iS.js";
|
|
21
21
|
import { test } from "../testing-BZ0dJ4qn.js";
|
|
22
|
-
import "../std__assert-
|
|
23
|
-
import { assertFalse, assertRejects } from "../assert_rejects-
|
|
24
|
-
import "../assert_is_error-
|
|
25
|
-
import { assertNotEquals } from "../assert_not_equals-
|
|
26
|
-
import "../assert_throws-
|
|
22
|
+
import "../std__assert-vp0TKMS1.js";
|
|
23
|
+
import { assertFalse, assertRejects } from "../assert_rejects-C-sxEMM5.js";
|
|
24
|
+
import "../assert_is_error-nrwA1GeT.js";
|
|
25
|
+
import { assertNotEquals } from "../assert_not_equals-Dc7y-V5Q.js";
|
|
26
|
+
import "../assert_throws-Cn9C6Jur.js";
|
|
27
27
|
import { mockDocumentLoader } from "../docloader-09nVWLAZ.js";
|
|
28
|
-
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-
|
|
28
|
+
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-BoATr8-t.js";
|
|
29
29
|
import { esm_default } from "../esm-CASHO3OR.js";
|
|
30
30
|
|
|
31
31
|
//#region federation/send.test.ts
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { deno_default } from "./docloader-
|
|
6
|
-
import { CryptographicKey } from "./actor-
|
|
7
|
-
import { fetchKey, validateCryptoKey } from "./key-
|
|
5
|
+
import { deno_default } from "./docloader-DcpH5qdc.js";
|
|
6
|
+
import { CryptographicKey } from "./actor-DeD8Ssmc.js";
|
|
7
|
+
import { fetchKey, validateCryptoKey } from "./key-E19_5jHF.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
10
|
import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
|
|
@@ -30,8 +30,8 @@ async function signRequest(request, privateKey, keyId, options = {}) {
|
|
|
30
30
|
try {
|
|
31
31
|
const spec = options.spec ?? "draft-cavage-http-signatures-12";
|
|
32
32
|
let signed;
|
|
33
|
-
if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime);
|
|
34
|
-
else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime);
|
|
33
|
+
if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime, options.body);
|
|
34
|
+
else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime, options.body);
|
|
35
35
|
if (span.isRecording()) {
|
|
36
36
|
span.setAttribute(ATTR_HTTP_REQUEST_METHOD, signed.method);
|
|
37
37
|
span.setAttribute(ATTR_URL_FULL, signed.url);
|
|
@@ -50,10 +50,10 @@ async function signRequest(request, privateKey, keyId, options = {}) {
|
|
|
50
50
|
}
|
|
51
51
|
});
|
|
52
52
|
}
|
|
53
|
-
async function signRequestDraft(request, privateKey, keyId, span, currentTime) {
|
|
53
|
+
async function signRequestDraft(request, privateKey, keyId, span, currentTime, bodyBuffer) {
|
|
54
54
|
if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
|
|
55
55
|
const url = new URL(request.url);
|
|
56
|
-
const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
56
|
+
const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
57
57
|
const headers = new Headers(request.headers);
|
|
58
58
|
if (!headers.has("Host")) headers.set("Host", url.host);
|
|
59
59
|
if (!headers.has("Digest") && body != null) {
|
|
@@ -184,10 +184,10 @@ function parseRfc9421Signature(signature) {
|
|
|
184
184
|
for (const [key, value] of Object.entries(dict)) if (value.value instanceof Uint8Array) result[key] = value.value;
|
|
185
185
|
return result;
|
|
186
186
|
}
|
|
187
|
-
async function signRequestRfc9421(request, privateKey, keyId, span, currentTime) {
|
|
187
|
+
async function signRequestRfc9421(request, privateKey, keyId, span, currentTime, bodyBuffer) {
|
|
188
188
|
if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
|
|
189
189
|
const url = new URL(request.url);
|
|
190
|
-
const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
190
|
+
const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
191
191
|
const headers = new Headers(request.headers);
|
|
192
192
|
if (!headers.has("Host")) headers.set("Host", url.host);
|
|
193
193
|
if (!headers.has("Content-Digest") && body != null) {
|
|
@@ -647,11 +647,12 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
|
|
|
647
647
|
* Helper function to create a new Request for redirect handling.
|
|
648
648
|
* @param request The original request.
|
|
649
649
|
* @param location The redirect location.
|
|
650
|
-
* @param body The request body as ArrayBuffer or
|
|
650
|
+
* @param body The request body as ArrayBuffer or null.
|
|
651
651
|
* @returns A new Request object for the redirect.
|
|
652
652
|
*/
|
|
653
653
|
function createRedirectRequest(request, location, body) {
|
|
654
|
-
|
|
654
|
+
const url = new URL(location, request.url);
|
|
655
|
+
return new Request(url, {
|
|
655
656
|
method: request.method,
|
|
656
657
|
headers: request.headers,
|
|
657
658
|
body,
|
|
@@ -680,16 +681,20 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
680
681
|
const { specDeterminer, log, tracerProvider } = options;
|
|
681
682
|
const origin = new URL(request.url).origin;
|
|
682
683
|
const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
|
|
684
|
+
const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
683
685
|
let signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
|
|
684
686
|
spec: firstTrySpec,
|
|
685
|
-
tracerProvider
|
|
687
|
+
tracerProvider,
|
|
688
|
+
body
|
|
686
689
|
});
|
|
687
690
|
log?.(signedRequest);
|
|
688
691
|
let response = await fetch(signedRequest, { redirect: "manual" });
|
|
689
692
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
690
693
|
const location = response.headers.get("Location");
|
|
691
|
-
|
|
692
|
-
|
|
694
|
+
return doubleKnock(createRedirectRequest(request, location, body), identity, {
|
|
695
|
+
...options,
|
|
696
|
+
body
|
|
697
|
+
});
|
|
693
698
|
} else if (response.status === 400 || response.status === 401 || response.status > 401) {
|
|
694
699
|
const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
|
|
695
700
|
getLogger([
|
|
@@ -704,14 +709,17 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
704
709
|
});
|
|
705
710
|
signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
|
|
706
711
|
spec,
|
|
707
|
-
tracerProvider
|
|
712
|
+
tracerProvider,
|
|
713
|
+
body
|
|
708
714
|
});
|
|
709
715
|
log?.(signedRequest);
|
|
710
716
|
response = await fetch(signedRequest, { redirect: "manual" });
|
|
711
717
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
712
718
|
const location = response.headers.get("Location");
|
|
713
|
-
|
|
714
|
-
|
|
719
|
+
return doubleKnock(createRedirectRequest(request, location, body), identity, {
|
|
720
|
+
...options,
|
|
721
|
+
body
|
|
722
|
+
});
|
|
715
723
|
} else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
|
|
716
724
|
} else await specDeterminer?.rememberSpec(origin, firstTrySpec);
|
|
717
725
|
return response;
|
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default } from "./docloader-
|
|
7
|
-
import { CryptographicKey } from "./vocab-
|
|
8
|
-
import { fetchKey, validateCryptoKey } from "./key
|
|
6
|
+
import { deno_default } from "./docloader-B4d21jdR.js";
|
|
7
|
+
import { CryptographicKey } from "./vocab-6hEwnJ9V.js";
|
|
8
|
+
import { fetchKey, validateCryptoKey } from "./key--MHORsOK.js";
|
|
9
9
|
import { getLogger } from "@logtape/logtape";
|
|
10
10
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
11
11
|
import { ATTR_HTTP_REQUEST_HEADER, ATTR_HTTP_REQUEST_METHOD, ATTR_URL_FULL } from "@opentelemetry/semantic-conventions";
|
|
@@ -31,8 +31,8 @@ async function signRequest(request, privateKey, keyId, options = {}) {
|
|
|
31
31
|
try {
|
|
32
32
|
const spec = options.spec ?? "draft-cavage-http-signatures-12";
|
|
33
33
|
let signed;
|
|
34
|
-
if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime);
|
|
35
|
-
else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime);
|
|
34
|
+
if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime, options.body);
|
|
35
|
+
else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime, options.body);
|
|
36
36
|
if (span.isRecording()) {
|
|
37
37
|
span.setAttribute(ATTR_HTTP_REQUEST_METHOD, signed.method);
|
|
38
38
|
span.setAttribute(ATTR_URL_FULL, signed.url);
|
|
@@ -51,10 +51,10 @@ async function signRequest(request, privateKey, keyId, options = {}) {
|
|
|
51
51
|
}
|
|
52
52
|
});
|
|
53
53
|
}
|
|
54
|
-
async function signRequestDraft(request, privateKey, keyId, span, currentTime) {
|
|
54
|
+
async function signRequestDraft(request, privateKey, keyId, span, currentTime, bodyBuffer) {
|
|
55
55
|
if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
|
|
56
56
|
const url = new URL(request.url);
|
|
57
|
-
const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
57
|
+
const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
58
58
|
const headers = new Headers(request.headers);
|
|
59
59
|
if (!headers.has("Host")) headers.set("Host", url.host);
|
|
60
60
|
if (!headers.has("Digest") && body != null) {
|
|
@@ -185,10 +185,10 @@ function parseRfc9421Signature(signature) {
|
|
|
185
185
|
for (const [key, value] of Object.entries(dict)) if (value.value instanceof Uint8Array) result[key] = value.value;
|
|
186
186
|
return result;
|
|
187
187
|
}
|
|
188
|
-
async function signRequestRfc9421(request, privateKey, keyId, span, currentTime) {
|
|
188
|
+
async function signRequestRfc9421(request, privateKey, keyId, span, currentTime, bodyBuffer) {
|
|
189
189
|
if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
|
|
190
190
|
const url = new URL(request.url);
|
|
191
|
-
const body = request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
191
|
+
const body = bodyBuffer !== void 0 ? bodyBuffer : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
192
192
|
const headers = new Headers(request.headers);
|
|
193
193
|
if (!headers.has("Host")) headers.set("Host", url.host);
|
|
194
194
|
if (!headers.has("Content-Digest") && body != null) {
|
|
@@ -648,11 +648,12 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
|
|
|
648
648
|
* Helper function to create a new Request for redirect handling.
|
|
649
649
|
* @param request The original request.
|
|
650
650
|
* @param location The redirect location.
|
|
651
|
-
* @param body The request body as ArrayBuffer or
|
|
651
|
+
* @param body The request body as ArrayBuffer or null.
|
|
652
652
|
* @returns A new Request object for the redirect.
|
|
653
653
|
*/
|
|
654
654
|
function createRedirectRequest(request, location, body) {
|
|
655
|
-
|
|
655
|
+
const url = new URL(location, request.url);
|
|
656
|
+
return new Request(url, {
|
|
656
657
|
method: request.method,
|
|
657
658
|
headers: request.headers,
|
|
658
659
|
body,
|
|
@@ -681,16 +682,20 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
681
682
|
const { specDeterminer, log, tracerProvider } = options;
|
|
682
683
|
const origin = new URL(request.url).origin;
|
|
683
684
|
const firstTrySpec = specDeterminer == null ? "rfc9421" : await specDeterminer.determineSpec(origin);
|
|
685
|
+
const body = options.body !== void 0 ? options.body : request.method !== "GET" && request.method !== "HEAD" ? await request.clone().arrayBuffer() : null;
|
|
684
686
|
let signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
|
|
685
687
|
spec: firstTrySpec,
|
|
686
|
-
tracerProvider
|
|
688
|
+
tracerProvider,
|
|
689
|
+
body
|
|
687
690
|
});
|
|
688
691
|
log?.(signedRequest);
|
|
689
692
|
let response = await fetch(signedRequest, { redirect: "manual" });
|
|
690
693
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
691
694
|
const location = response.headers.get("Location");
|
|
692
|
-
|
|
693
|
-
|
|
695
|
+
return doubleKnock(createRedirectRequest(request, location, body), identity, {
|
|
696
|
+
...options,
|
|
697
|
+
body
|
|
698
|
+
});
|
|
694
699
|
} else if (response.status === 400 || response.status === 401 || response.status > 401) {
|
|
695
700
|
const spec = firstTrySpec === "draft-cavage-http-signatures-12" ? "rfc9421" : "draft-cavage-http-signatures-12";
|
|
696
701
|
getLogger([
|
|
@@ -705,14 +710,17 @@ async function doubleKnock(request, identity, options = {}) {
|
|
|
705
710
|
});
|
|
706
711
|
signedRequest = await signRequest(request, identity.privateKey, identity.keyId, {
|
|
707
712
|
spec,
|
|
708
|
-
tracerProvider
|
|
713
|
+
tracerProvider,
|
|
714
|
+
body
|
|
709
715
|
});
|
|
710
716
|
log?.(signedRequest);
|
|
711
717
|
response = await fetch(signedRequest, { redirect: "manual" });
|
|
712
718
|
if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
|
|
713
719
|
const location = response.headers.get("Location");
|
|
714
|
-
|
|
715
|
-
|
|
720
|
+
return doubleKnock(createRedirectRequest(request, location, body), identity, {
|
|
721
|
+
...options,
|
|
722
|
+
body
|
|
723
|
+
});
|
|
716
724
|
} else if (response.status !== 400 && response.status !== 401) await specDeterminer?.rememberSpec(origin, spec);
|
|
717
725
|
} else await specDeterminer?.rememberSpec(origin, firstTrySpec);
|
|
718
726
|
return response;
|
|
@@ -148,6 +148,11 @@ interface SignRequestOptions {
|
|
|
148
148
|
* @since 1.6.0
|
|
149
149
|
*/
|
|
150
150
|
currentTime?: Temporal.Instant;
|
|
151
|
+
/**
|
|
152
|
+
* The request body as ArrayBuffer. If provided, avoids cloning the request body.
|
|
153
|
+
* @since 1.7.7
|
|
154
|
+
*/
|
|
155
|
+
body?: ArrayBuffer | null;
|
|
151
156
|
/**
|
|
152
157
|
* The OpenTelemetry tracer provider. If omitted, the global tracer provider
|
|
153
158
|
* is used.
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default } from "./docloader-
|
|
7
|
-
import { Activity } from "./vocab-
|
|
6
|
+
import { deno_default } from "./docloader-B4d21jdR.js";
|
|
7
|
+
import { Activity } from "./vocab-6hEwnJ9V.js";
|
|
8
8
|
import { getTypeId } from "./type-D2s5lmbZ.js";
|
|
9
9
|
import { getLogger } from "@logtape/logtape";
|
|
10
10
|
import { SpanKind, SpanStatusCode, context, propagation, trace } from "@opentelemetry/api";
|
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default, getDocumentLoader } from "./docloader-
|
|
7
|
-
import { CryptographicKey, Object as Object$1 } from "./vocab-
|
|
8
|
-
import { isActor } from "./actor-
|
|
6
|
+
import { deno_default, getDocumentLoader } from "./docloader-B4d21jdR.js";
|
|
7
|
+
import { CryptographicKey, Object as Object$1 } from "./vocab-6hEwnJ9V.js";
|
|
8
|
+
import { isActor } from "./actor-C2Mfj4Qb.js";
|
|
9
9
|
import { getLogger } from "@logtape/logtape";
|
|
10
10
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
11
11
|
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import "./docloader-
|
|
6
|
-
import "./actor-
|
|
7
|
-
import "./lookup-
|
|
8
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-
|
|
5
|
+
import "./docloader-DcpH5qdc.js";
|
|
6
|
+
import "./actor-DeD8Ssmc.js";
|
|
7
|
+
import "./lookup-CQ7kGOlJ.js";
|
|
8
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key-E19_5jHF.js";
|
|
9
9
|
|
|
10
10
|
export { validateCryptoKey };
|
|
@@ -3,14 +3,14 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "./docloader-
|
|
6
|
+
import "./docloader-B4d21jdR.js";
|
|
7
7
|
import "./url-kTAI6_KP.js";
|
|
8
8
|
import "./multibase-DeCHcK8L.js";
|
|
9
|
-
import "./vocab-
|
|
9
|
+
import "./vocab-6hEwnJ9V.js";
|
|
10
10
|
import "./langstr-DbWheeIS.js";
|
|
11
|
-
import "./lookup-
|
|
11
|
+
import "./lookup-BKdjC9iv.js";
|
|
12
12
|
import "./type-D2s5lmbZ.js";
|
|
13
|
-
import "./actor-
|
|
14
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key
|
|
13
|
+
import "./actor-C2Mfj4Qb.js";
|
|
14
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey } from "./key--MHORsOK.js";
|
|
15
15
|
|
|
16
16
|
export { validateCryptoKey };
|
|
@@ -2,8 +2,8 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { deno_default, getDocumentLoader } from "./docloader-
|
|
6
|
-
import { CryptographicKey, Object as Object$1, isActor } from "./actor-
|
|
5
|
+
import { deno_default, getDocumentLoader } from "./docloader-DcpH5qdc.js";
|
|
6
|
+
import { CryptographicKey, Object as Object$1, isActor } from "./actor-DeD8Ssmc.js";
|
|
7
7
|
import { getLogger } from "@logtape/logtape";
|
|
8
8
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
9
9
|
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey } from "./vocab-
|
|
6
|
+
import { CryptographicKey, Multikey } from "./vocab-6hEwnJ9V.js";
|
|
7
7
|
|
|
8
8
|
//#region federation/keycache.ts
|
|
9
9
|
var KvKeyCache = class {
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey, importSpki } from "./vocab-
|
|
6
|
+
import { CryptographicKey, Multikey, importSpki } from "./vocab-6hEwnJ9V.js";
|
|
7
7
|
|
|
8
8
|
//#region testing/keys.ts
|
|
9
9
|
const rsaPublicKey1 = new CryptographicKey({
|
|
@@ -3,10 +3,10 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default, getDocumentLoader } from "./docloader-
|
|
7
|
-
import { Activity, CryptographicKey, Object as Object$1 } from "./vocab-
|
|
6
|
+
import { deno_default, getDocumentLoader } from "./docloader-B4d21jdR.js";
|
|
7
|
+
import { Activity, CryptographicKey, Object as Object$1 } from "./vocab-6hEwnJ9V.js";
|
|
8
8
|
import { getTypeId } from "./type-D2s5lmbZ.js";
|
|
9
|
-
import { fetchKey, validateCryptoKey } from "./key
|
|
9
|
+
import { fetchKey, validateCryptoKey } from "./key--MHORsOK.js";
|
|
10
10
|
import { getLogger } from "@logtape/logtape";
|
|
11
11
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
12
12
|
import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default, getUserAgent } from "./docloader-
|
|
6
|
+
import { deno_default, getUserAgent } from "./docloader-B4d21jdR.js";
|
|
7
7
|
import { UrlError, validatePublicUrl } from "./url-kTAI6_KP.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default, getDocumentLoader } from "./docloader-
|
|
7
|
-
import { Object as Object$1 } from "./vocab-
|
|
8
|
-
import { lookupWebFinger } from "./lookup-
|
|
6
|
+
import { deno_default, getDocumentLoader } from "./docloader-B4d21jdR.js";
|
|
7
|
+
import { Object as Object$1 } from "./vocab-6hEwnJ9V.js";
|
|
8
|
+
import { lookupWebFinger } from "./lookup-BKdjC9iv.js";
|
|
9
9
|
import { getTypeId } from "./type-D2s5lmbZ.js";
|
|
10
10
|
import { getLogger } from "@logtape/logtape";
|
|
11
11
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
|
-
import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-
|
|
5
|
+
import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-DcpH5qdc.js";
|
|
6
6
|
import { getLogger } from "@logtape/logtape";
|
|
7
7
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
8
8
|
|