@fedify/fedify 2.0.0-dev.1566 → 2.0.0-dev.158

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (297) hide show
  1. package/LICENSE +1 -1
  2. package/README.md +40 -18
  3. package/dist/{assert_rejects-DiIiJbZn.js → assert_rejects-Ce45JcFg.js} +1 -1
  4. package/dist/{assert_is_error-BPGph1Jx.js → assert_throws-BNXdRGWP.js} +31 -1
  5. package/dist/{builder-B2I70zuM.js → builder-BnWso6VP.js} +15 -8
  6. package/dist/chunk-DqRYRqnO.cjs +34 -0
  7. package/dist/client-94iWEfQa.d.cts +222 -0
  8. package/dist/{client-DF8anIB5.d.ts → client-BivSNrEg.d.ts} +3 -75
  9. package/dist/{client-BVDUd3WA.js → client-CgMTXmAD.js} +3 -22
  10. package/dist/compat/mod.cjs +10 -0
  11. package/dist/compat/mod.d.cts +7 -0
  12. package/dist/compat/mod.d.ts +6 -12
  13. package/dist/compat/mod.js +5 -5
  14. package/dist/compat/transformers.test.js +21 -20
  15. package/dist/compat-DmDDELst.cjs +4 -0
  16. package/dist/compat-nxUqe4Z-.js +4 -0
  17. package/dist/context-Bns6uTJq.js +109 -0
  18. package/dist/{context-9gCpIkiz.d.ts → context-CYZ2i00R.d.ts} +321 -129
  19. package/dist/context-D2MrtLch.d.cts +2447 -0
  20. package/dist/deno-CQV858ip.js +117 -0
  21. package/dist/{testing-CWE5Nn0S.js → dist-B5f6a8Tt.js} +90 -111
  22. package/dist/{authdocloader-BilVqAPe.js → docloader-Csc8gQux.js} +17 -8
  23. package/dist/{esm-eH43VACi.js → esm-DGl7uK1r.js} +32 -17
  24. package/dist/federation/builder.test.js +12 -13
  25. package/dist/federation/collection.test.js +6 -9
  26. package/dist/federation/handler.test.js +115 -148
  27. package/dist/federation/idempotency.test.js +202 -0
  28. package/dist/federation/inbox.test.js +5 -6
  29. package/dist/federation/keycache.test.js +4 -5
  30. package/dist/federation/kv.test.js +61 -9
  31. package/dist/federation/middleware.test.js +311 -131
  32. package/dist/federation/mod.cjs +25 -0
  33. package/dist/federation/mod.d.cts +7 -0
  34. package/dist/federation/mod.d.ts +7 -13
  35. package/dist/federation/mod.js +11 -16
  36. package/dist/federation/mq.test.js +9 -10
  37. package/dist/federation/negotiation.test.js +25 -0
  38. package/dist/federation/retry.test.js +2 -4
  39. package/dist/federation/router.test.js +6 -8
  40. package/dist/federation/send.test.js +55 -15
  41. package/dist/{webfinger/handler.test.js → federation/webfinger.test.js} +27 -26
  42. package/dist/federation-B431K2gm.cjs +266 -0
  43. package/dist/{federation-CMX7WzeL.js → federation-BbZwNNWj.js} +31 -9
  44. package/dist/{http-Cdjyj7h1.js → http-BizGfAHd.js} +375 -15
  45. package/dist/{http-BE2S7wC2.js → http-CXG5ZFqn.js} +4 -3
  46. package/dist/http-ClB3pLcL.d.cts +253 -0
  47. package/dist/{http-DqSNLFNY.d.ts → http-DLBDPal9.d.ts} +2 -2
  48. package/dist/http-DbACqYyq.cjs +1222 -0
  49. package/dist/{inbox-CtcEN1S1.js → inbox-B7ybw6fk.js} +25 -7
  50. package/dist/{key-q4xxkABj.js → key-C27c_yHR.js} +3 -2
  51. package/dist/{keycache-CtCHz6HR.js → keycache-DRxpZ5r9.js} +1 -1
  52. package/dist/{keys-BiuLoxwK.js → keys-ZbcByPg9.js} +2 -1
  53. package/dist/{kv-C7sopW2E.d.ts → kv-CtOmTRNc.d.ts} +30 -1
  54. package/dist/kv-D8q9fLkA.d.cts +110 -0
  55. package/dist/{kv-CRZrzyXm.js → kv-QzKcOQgP.js} +22 -0
  56. package/dist/kv-cache-B7dwGQFA.js +122 -0
  57. package/dist/kv-cache-BEeqyGER.js +107 -0
  58. package/dist/kv-cache-rPOPQdj9.cjs +134 -0
  59. package/dist/{ld-PkXepnwg.js → ld-D_Jn1aGa.js} +6 -4
  60. package/dist/middleware-BVqYHBWm.cjs +12 -0
  61. package/dist/{middleware-HDts7zkt.js → middleware-BjS6_zkf.js} +272 -271
  62. package/dist/middleware-CAJR7KGo.cjs +4242 -0
  63. package/dist/{middleware-BQHcEUgM.js → middleware-ClkhKNXU.js} +230 -327
  64. package/dist/middleware-DSz6sI16.js +26 -0
  65. package/dist/middleware-OcaFHSk8.js +12 -0
  66. package/dist/mod-BrS8tiad.d.cts +266 -0
  67. package/dist/mod-C81L6_lQ.d.cts +1 -0
  68. package/dist/mod-CJgbdSqb.d.ts +109 -0
  69. package/dist/mod-CNNTHyBC.d.cts +80 -0
  70. package/dist/mod-CS-MS7gZ.d.cts +62 -0
  71. package/dist/{mod-Bqxcp7eN.d.ts → mod-D_cmv2il.d.ts} +4 -4
  72. package/dist/mod-DcPRcifg.d.cts +107 -0
  73. package/dist/mod-DqFSzJA0.d.ts +64 -0
  74. package/dist/{mod-Drmz72EK.d.ts → mod-jOa7W503.d.ts} +3 -3
  75. package/dist/mod.cjs +55 -0
  76. package/dist/mod.d.cts +11 -0
  77. package/dist/mod.d.ts +11 -17
  78. package/dist/mod.js +15 -21
  79. package/dist/negotiation-5NPJL6zp.js +71 -0
  80. package/dist/nodeinfo/client.test.js +29 -111
  81. package/dist/nodeinfo/handler.test.js +26 -26
  82. package/dist/nodeinfo/mod.cjs +10 -0
  83. package/dist/nodeinfo/mod.d.cts +3 -0
  84. package/dist/nodeinfo/mod.d.ts +3 -5
  85. package/dist/nodeinfo/mod.js +6 -7
  86. package/dist/nodeinfo/types.test.js +7 -15
  87. package/dist/nodeinfo-BlLsRSiT.js +4 -0
  88. package/dist/nodeinfo-DuMYTpbZ.cjs +4 -0
  89. package/dist/otel/exporter.test.js +899 -0
  90. package/dist/otel/mod.cjs +262 -0
  91. package/dist/otel/mod.d.cts +230 -0
  92. package/dist/otel/mod.d.ts +232 -0
  93. package/dist/otel/mod.js +261 -0
  94. package/dist/{owner-CQPnQVtf.d.ts → owner-BgI8C-VY.d.ts} +2 -3
  95. package/dist/owner-C-zfmVAD.d.cts +66 -0
  96. package/dist/{owner-DZ5zP8JS.js → owner-Dc8rUE-H.js} +45 -8
  97. package/dist/{proof-ohtusUSV.js → proof-BdNM3iSl.js} +4 -3
  98. package/dist/proof-Bx2JqJ-D.cjs +709 -0
  99. package/dist/{proof-D8S7qgEZ.js → proof-CTYnbjx5.js} +53 -17
  100. package/dist/router-D9eI0s4b.js +118 -0
  101. package/dist/{send-BBi1tzS8.js → send-DBRRqVMa.js} +9 -4
  102. package/dist/sig/http.test.js +12 -14
  103. package/dist/sig/key.test.js +9 -11
  104. package/dist/sig/ld.test.js +8 -10
  105. package/dist/sig/mod.cjs +26 -0
  106. package/dist/sig/mod.d.cts +4 -0
  107. package/dist/sig/mod.d.ts +3 -7
  108. package/dist/sig/mod.js +6 -10
  109. package/dist/sig/owner.test.js +33 -12
  110. package/dist/sig/proof.test.js +13 -14
  111. package/dist/sig-CwuONEzF.js +4 -0
  112. package/dist/sig-DeXX2xnj.cjs +4 -0
  113. package/dist/testing/mod.d.ts +180 -6946
  114. package/dist/testing/mod.js +4 -4
  115. package/dist/transformers-BjBg6Lag.cjs +116 -0
  116. package/dist/{transformers-Dna8Fg7k.js → transformers-N_ip_y4P.js} +5 -5
  117. package/dist/{types-BIgY6c-l.js → types-BEdCLHqP.js} +1 -3
  118. package/dist/types-Q-qkJXBV.cjs +315 -0
  119. package/dist/{types-CTYFFnQp.js → types-hKTi53FO.js} +8 -169
  120. package/dist/{runtime/authdocloader.test.js → utils/docloader.test.js} +13 -15
  121. package/dist/utils/kv-cache.test.js +211 -0
  122. package/dist/utils/mod.cjs +10 -0
  123. package/dist/utils/mod.d.cts +4 -0
  124. package/dist/utils/mod.d.ts +6 -0
  125. package/dist/utils/mod.js +9 -0
  126. package/dist/utils-Db0ZmjcD.cjs +4 -0
  127. package/dist/utils-Wranxuoe.js +4 -0
  128. package/package.json +69 -55
  129. package/dist/actor-BKxX_F1w.js +0 -37311
  130. package/dist/actor-C22bXuuC.d.ts +0 -130
  131. package/dist/actor-DI_YpFlI.js +0 -146
  132. package/dist/assert_throws-BOO88avQ.js +0 -39
  133. package/dist/authdocloader-UdvnssIx.js +0 -52
  134. package/dist/compat-Bb5myD13.js +0 -4
  135. package/dist/denokv-Bv33Xxea.js +0 -57
  136. package/dist/docloader-4XS4XdXc.js +0 -4615
  137. package/dist/docloader-CxWcuWqQ.d.ts +0 -221
  138. package/dist/fixtures/activitypub.academy/users/brauca_darradiul.json +0 -83
  139. package/dist/fixtures/example.com/announce.json +0 -6
  140. package/dist/fixtures/example.com/collection.json +0 -19
  141. package/dist/fixtures/example.com/create.json +0 -6
  142. package/dist/fixtures/example.com/cross-origin-actor.json +0 -6
  143. package/dist/fixtures/example.com/hong-gildong.json +0 -11
  144. package/dist/fixtures/example.com/invite.json +0 -7
  145. package/dist/fixtures/example.com/key.json +0 -7
  146. package/dist/fixtures/example.com/key2.json +0 -6
  147. package/dist/fixtures/example.com/object.json +0 -6
  148. package/dist/fixtures/example.com/orderedcollectionpage.json +0 -24
  149. package/dist/fixtures/example.com/paged/a.json +0 -13
  150. package/dist/fixtures/example.com/paged/b.json +0 -16
  151. package/dist/fixtures/example.com/paged-collection.json +0 -6
  152. package/dist/fixtures/example.com/person.json +0 -22
  153. package/dist/fixtures/example.com/person2.json +0 -40
  154. package/dist/fixtures/example.com/test.json +0 -5
  155. package/dist/fixtures/example.com/users/handle.json +0 -16
  156. package/dist/fixtures/example.com/wrong-type.json +0 -3
  157. package/dist/fixtures/oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd.json +0 -24
  158. package/dist/fixtures/remote.domain/users/bob.json +0 -20
  159. package/dist/fixtures/server.example/users/alice.json +0 -20
  160. package/dist/fixtures/w3id.org/identity/v1.json +0 -152
  161. package/dist/fixtures/w3id.org/security/data-integrity/v1.json +0 -74
  162. package/dist/fixtures/w3id.org/security/multikey/v1.json +0 -35
  163. package/dist/fixtures/w3id.org/security/v1.json +0 -50
  164. package/dist/fixtures/wizard.casa/users/hongminhee.json +0 -69
  165. package/dist/fixtures/www.w3.org/ns/activitystreams.json +0 -379
  166. package/dist/fixtures/www.w3.org/ns/did/v1.json +0 -58
  167. package/dist/key-C2_QSigr.js +0 -260
  168. package/dist/key-Ck2-lYS5.js +0 -10
  169. package/dist/key-II1NsE_S.js +0 -10
  170. package/dist/lookup-DCIN2EFw.js +0 -322
  171. package/dist/lookup-DVlWgAsd.js +0 -131
  172. package/dist/middleware-CTQfgVW8.js +0 -17
  173. package/dist/middleware-D3rOl6Au.js +0 -26
  174. package/dist/mod-Cxt4Kpf6.d.ts +0 -291
  175. package/dist/mod-DBzN0aCM.d.ts +0 -115
  176. package/dist/mod-TFoH2Ql8.d.ts +0 -104
  177. package/dist/mod-g0xFzAP9.d.ts +0 -2
  178. package/dist/mq-CRGm1e_F.d.ts +0 -143
  179. package/dist/nodeinfo/semver.test.js +0 -143
  180. package/dist/nodeinfo-CyEbLjHs.js +0 -4
  181. package/dist/runtime/docloader.test.js +0 -522
  182. package/dist/runtime/key.test.js +0 -103
  183. package/dist/runtime/langstr.test.js +0 -39
  184. package/dist/runtime/mod.d.ts +0 -8
  185. package/dist/runtime/mod.js +0 -13
  186. package/dist/runtime/multibase/multibase.test.d.ts +0 -3
  187. package/dist/runtime/multibase/multibase.test.js +0 -358
  188. package/dist/runtime/url.test.d.ts +0 -3
  189. package/dist/runtime/url.test.js +0 -45
  190. package/dist/runtime-BSkOVUWM.js +0 -4
  191. package/dist/semver-dArNLkR9.js +0 -149
  192. package/dist/sig-BXJO--F9.js +0 -4
  193. package/dist/src/vocab/accept.yaml +0 -15
  194. package/dist/src/vocab/activity.yaml +0 -98
  195. package/dist/src/vocab/add.yaml +0 -16
  196. package/dist/src/vocab/announce.yaml +0 -30
  197. package/dist/src/vocab/application.yaml +0 -324
  198. package/dist/src/vocab/arrive.yaml +0 -15
  199. package/dist/src/vocab/article.yaml +0 -46
  200. package/dist/src/vocab/audio.yaml +0 -11
  201. package/dist/src/vocab/block.yaml +0 -16
  202. package/dist/src/vocab/chatmessage.yaml +0 -50
  203. package/dist/src/vocab/collection.yaml +0 -154
  204. package/dist/src/vocab/collectionpage.yaml +0 -55
  205. package/dist/src/vocab/create.yaml +0 -28
  206. package/dist/src/vocab/dataintegrityproof.yaml +0 -56
  207. package/dist/src/vocab/delete.yaml +0 -27
  208. package/dist/src/vocab/didservice.yaml +0 -22
  209. package/dist/src/vocab/dislike.yaml +0 -14
  210. package/dist/src/vocab/document.yaml +0 -31
  211. package/dist/src/vocab/emoji.yaml +0 -12
  212. package/dist/src/vocab/emojireact.yaml +0 -17
  213. package/dist/src/vocab/endpoints.yaml +0 -85
  214. package/dist/src/vocab/event.yaml +0 -11
  215. package/dist/src/vocab/export.yaml +0 -9
  216. package/dist/src/vocab/flag.yaml +0 -15
  217. package/dist/src/vocab/follow.yaml +0 -19
  218. package/dist/src/vocab/group.yaml +0 -324
  219. package/dist/src/vocab/hashtag.yaml +0 -14
  220. package/dist/src/vocab/ignore.yaml +0 -14
  221. package/dist/src/vocab/image.yaml +0 -9
  222. package/dist/src/vocab/intransitiveactivity.yaml +0 -15
  223. package/dist/src/vocab/invite.yaml +0 -14
  224. package/dist/src/vocab/join.yaml +0 -14
  225. package/dist/src/vocab/key.yaml +0 -28
  226. package/dist/src/vocab/leave.yaml +0 -14
  227. package/dist/src/vocab/like.yaml +0 -16
  228. package/dist/src/vocab/link.yaml +0 -101
  229. package/dist/src/vocab/listen.yaml +0 -12
  230. package/dist/src/vocab/mention.yaml +0 -9
  231. package/dist/src/vocab/move.yaml +0 -15
  232. package/dist/src/vocab/multikey.yaml +0 -36
  233. package/dist/src/vocab/note.yaml +0 -48
  234. package/dist/src/vocab/object.yaml +0 -404
  235. package/dist/src/vocab/offer.yaml +0 -15
  236. package/dist/src/vocab/orderedcollection.yaml +0 -39
  237. package/dist/src/vocab/orderedcollectionpage.yaml +0 -50
  238. package/dist/src/vocab/organization.yaml +0 -324
  239. package/dist/src/vocab/page.yaml +0 -11
  240. package/dist/src/vocab/person.yaml +0 -324
  241. package/dist/src/vocab/place.yaml +0 -75
  242. package/dist/src/vocab/profile.yaml +0 -26
  243. package/dist/src/vocab/propertyvalue.yaml +0 -32
  244. package/dist/src/vocab/question.yaml +0 -103
  245. package/dist/src/vocab/read.yaml +0 -13
  246. package/dist/src/vocab/reject.yaml +0 -14
  247. package/dist/src/vocab/relationship.yaml +0 -52
  248. package/dist/src/vocab/remove.yaml +0 -14
  249. package/dist/src/vocab/service.yaml +0 -324
  250. package/dist/src/vocab/source.yaml +0 -26
  251. package/dist/src/vocab/tentativeaccept.yaml +0 -14
  252. package/dist/src/vocab/tentativereject.yaml +0 -14
  253. package/dist/src/vocab/tombstone.yaml +0 -24
  254. package/dist/src/vocab/travel.yaml +0 -16
  255. package/dist/src/vocab/undo.yaml +0 -26
  256. package/dist/src/vocab/update.yaml +0 -58
  257. package/dist/src/vocab/video.yaml +0 -11
  258. package/dist/src/vocab/view.yaml +0 -13
  259. package/dist/testing/docloader.test.js +0 -24
  260. package/dist/type-B7_rMIU9.js +0 -42006
  261. package/dist/vocab/actor.test.d.ts +0 -3
  262. package/dist/vocab/actor.test.js +0 -5965
  263. package/dist/vocab/lookup.test.d.ts +0 -3
  264. package/dist/vocab/lookup.test.js +0 -206
  265. package/dist/vocab/mod.d.ts +0 -8
  266. package/dist/vocab/mod.js +0 -10
  267. package/dist/vocab/schema.yaml +0 -247
  268. package/dist/vocab/type.test.d.ts +0 -3
  269. package/dist/vocab/type.test.js +0 -25
  270. package/dist/vocab/vocab.test.d.ts +0 -3
  271. package/dist/vocab/vocab.test.js +0 -3363
  272. package/dist/vocab-3Eie7Ze4.js +0 -246
  273. package/dist/vocab-SOE1ifCr.d.ts +0 -14634
  274. package/dist/webfinger/handler.test.d.ts +0 -3
  275. package/dist/webfinger/lookup.test.d.ts +0 -3
  276. package/dist/webfinger/lookup.test.js +0 -195
  277. package/dist/webfinger/mod.d.ts +0 -6
  278. package/dist/webfinger/mod.js +0 -9
  279. package/dist/webfinger-C3GIyXIg.js +0 -4
  280. package/dist/x/cfworkers.d.ts +0 -61
  281. package/dist/x/cfworkers.js +0 -98
  282. package/dist/x/cfworkers.test.d.ts +0 -3
  283. package/dist/x/cfworkers.test.js +0 -179
  284. package/dist/x/hono.d.ts +0 -56
  285. package/dist/x/hono.js +0 -60
  286. package/dist/x/sveltekit.d.ts +0 -48
  287. package/dist/x/sveltekit.js +0 -68
  288. /package/dist/{assert_not_equals-f3m3epl3.js → assert_not_equals-C80BG-_5.js} +0 -0
  289. /package/dist/{collection-CSzG2j1P.js → collection-CcnIw1qY.js} +0 -0
  290. /package/dist/{nodeinfo/semver.test.d.ts → federation/idempotency.test.d.ts} +0 -0
  291. /package/dist/{runtime/authdocloader.test.d.ts → federation/negotiation.test.d.ts} +0 -0
  292. /package/dist/{runtime/docloader.test.d.ts → federation/webfinger.test.d.ts} +0 -0
  293. /package/dist/{mod-1pDWKvUL.d.ts → mod-1E3W847c.d.ts} +0 -0
  294. /package/dist/{runtime/key.test.d.ts → otel/exporter.test.d.ts} +0 -0
  295. /package/dist/{std__assert-X-_kMxKM.js → std__assert-DWivtrGR.js} +0 -0
  296. /package/dist/{testing → utils}/docloader.test.d.ts +0 -0
  297. /package/dist/{runtime/langstr.test.d.ts → utils/kv-cache.test.d.ts} +0 -0
@@ -0,0 +1,709 @@
1
+
2
+ const { Temporal } = require("@js-temporal/polyfill");
3
+ const { URLPattern } = require("urlpattern-polyfill");
4
+
5
+ const require_chunk = require('./chunk-DqRYRqnO.cjs');
6
+ const require_http = require('./http-DbACqYyq.cjs');
7
+ const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
8
+ const __fedify_vocab = require_chunk.__toESM(require("@fedify/vocab"));
9
+ const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
10
+ const byte_encodings_hex = require_chunk.__toESM(require("byte-encodings/hex"));
11
+ const byte_encodings_base64 = require_chunk.__toESM(require("byte-encodings/base64"));
12
+ const __fedify_vocab_runtime = require_chunk.__toESM(require("@fedify/vocab-runtime"));
13
+ const jsonld = require_chunk.__toESM(require("jsonld"));
14
+ const json_canon = require_chunk.__toESM(require("json-canon"));
15
+
16
+ //#region src/sig/ld.ts
17
+ const logger$1 = (0, __logtape_logtape.getLogger)([
18
+ "fedify",
19
+ "sig",
20
+ "ld"
21
+ ]);
22
+ /**
23
+ * Attaches a LD signature to the given JSON-LD document.
24
+ * @param jsonLd The JSON-LD document to attach the signature to. It is not
25
+ * modified.
26
+ * @param signature The signature to attach.
27
+ * @returns The JSON-LD document with the attached signature.
28
+ * @throws {TypeError} If the input document is not a valid JSON-LD document.
29
+ * @since 1.0.0
30
+ */
31
+ function attachSignature(jsonLd, signature) {
32
+ if (typeof jsonLd !== "object" || jsonLd == null) throw new TypeError("Failed to attach signature; invalid JSON-LD document.");
33
+ return {
34
+ ...jsonLd,
35
+ signature
36
+ };
37
+ }
38
+ /**
39
+ * Creates a LD signature for the given JSON-LD document.
40
+ * @param jsonLd The JSON-LD document to sign.
41
+ * @param privateKey The private key to sign the document.
42
+ * @param keyId The ID of the public key that corresponds to the private key.
43
+ * @param options Additional options for creating the signature.
44
+ * See also {@link CreateSignatureOptions}.
45
+ * @return The created signature.
46
+ * @throws {TypeError} If the private key is invalid or unsupported.
47
+ * @since 1.0.0
48
+ */
49
+ async function createSignature(jsonLd, privateKey, keyId, { contextLoader, created } = {}) {
50
+ require_http.validateCryptoKey(privateKey, "private");
51
+ if (privateKey.algorithm.name !== "RSASSA-PKCS1-v1_5") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
52
+ const options = {
53
+ "@context": "https://w3id.org/identity/v1",
54
+ creator: keyId.href,
55
+ created: created?.toString() ?? (/* @__PURE__ */ new Date()).toISOString()
56
+ };
57
+ const optionsHash = await hashJsonLd(options, contextLoader);
58
+ const docHash = await hashJsonLd(jsonLd, contextLoader);
59
+ const message = optionsHash + docHash;
60
+ const encoder = new TextEncoder();
61
+ const messageBytes = encoder.encode(message);
62
+ const signature = await crypto.subtle.sign("RSASSA-PKCS1-v1_5", privateKey, messageBytes);
63
+ return {
64
+ ...options,
65
+ type: "RsaSignature2017",
66
+ signatureValue: (0, byte_encodings_base64.encodeBase64)(signature)
67
+ };
68
+ }
69
+ /**
70
+ * Signs the given JSON-LD document with the private key and returns the signed
71
+ * JSON-LD document.
72
+ * @param jsonLd The JSON-LD document to sign.
73
+ * @param privateKey The private key to sign the document.
74
+ * @param keyId The key ID to use in the signature. It will be used by the
75
+ * verifier to fetch the corresponding public key.
76
+ * @param options Additional options for signing the document.
77
+ * See also {@link SignJsonLdOptions}.
78
+ * @returns The signed JSON-LD document.
79
+ * @throws {TypeError} If the private key is invalid or unsupported.
80
+ * @since 1.0.0
81
+ */
82
+ async function signJsonLd(jsonLd, privateKey, keyId, options) {
83
+ const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
84
+ const tracer = tracerProvider.getTracer(require_http.deno_default.name, require_http.deno_default.version);
85
+ return await tracer.startActiveSpan("ld_signatures.sign", { attributes: { "ld_signatures.key_id": keyId.href } }, async (span) => {
86
+ try {
87
+ const signature = await createSignature(jsonLd, privateKey, keyId, options);
88
+ if (span.isRecording()) {
89
+ span.setAttribute("ld_signatures.type", signature.type);
90
+ span.setAttribute("ld_signatures.signature", (0, byte_encodings_hex.encodeHex)((0, byte_encodings_base64.decodeBase64)(signature.signatureValue)));
91
+ }
92
+ return attachSignature(jsonLd, signature);
93
+ } catch (error) {
94
+ span.setStatus({
95
+ code: __opentelemetry_api.SpanStatusCode.ERROR,
96
+ message: String(error)
97
+ });
98
+ throw error;
99
+ } finally {
100
+ span.end();
101
+ }
102
+ });
103
+ }
104
+ /**
105
+ * Checks if the given JSON-LD document has a Linked Data Signature.
106
+ * @param jsonLd The JSON-LD document to check.
107
+ * @returns `true` if the document has a signature; `false` otherwise.
108
+ * @since 1.0.0
109
+ */
110
+ function hasSignature(jsonLd) {
111
+ if (typeof jsonLd !== "object" || jsonLd == null) return false;
112
+ if ("signature" in jsonLd) {
113
+ const signature = jsonLd.signature;
114
+ if (typeof signature !== "object" || signature == null) return false;
115
+ return "type" in signature && signature.type === "RsaSignature2017" && "creator" in signature && typeof signature.creator === "string" && "created" in signature && typeof signature.created === "string" && "signatureValue" in signature && typeof signature.signatureValue === "string";
116
+ }
117
+ return false;
118
+ }
119
+ /**
120
+ * Detaches Linked Data Signatures from the given JSON-LD document.
121
+ * @param jsonLd The JSON-LD document to modify.
122
+ * @returns The modified JSON-LD document. If the input document does not
123
+ * contain a signature, the original document is returned.
124
+ * @since 1.0.0
125
+ */
126
+ function detachSignature(jsonLd) {
127
+ if (typeof jsonLd !== "object" || jsonLd == null) return jsonLd;
128
+ const doc = { ...jsonLd };
129
+ delete doc.signature;
130
+ return doc;
131
+ }
132
+ /**
133
+ * Verifies Linked Data Signatures of the given JSON-LD document.
134
+ * @param jsonLd The JSON-LD document to verify.
135
+ * @param options Options for verifying the signature.
136
+ * @returns The public key that signed the document or `null` if the signature
137
+ * is invalid or the key is not found.
138
+ * @since 1.0.0
139
+ */
140
+ async function verifySignature(jsonLd, options = {}) {
141
+ if (!hasSignature(jsonLd)) return null;
142
+ const sig = jsonLd.signature;
143
+ let signature;
144
+ try {
145
+ signature = (0, byte_encodings_base64.decodeBase64)(sig.signatureValue);
146
+ } catch (error) {
147
+ logger$1.debug("Failed to verify; invalid base64 signatureValue: {signatureValue}", {
148
+ ...sig,
149
+ error
150
+ });
151
+ return null;
152
+ }
153
+ const { key, cached } = await require_http.fetchKey(new URL(sig.creator), __fedify_vocab.CryptographicKey, options);
154
+ if (key == null) return null;
155
+ const sigOpts = {
156
+ ...sig,
157
+ "@context": "https://w3id.org/identity/v1"
158
+ };
159
+ delete sigOpts.type;
160
+ delete sigOpts.id;
161
+ delete sigOpts.signatureValue;
162
+ let sigOptsHash;
163
+ try {
164
+ sigOptsHash = await hashJsonLd(sigOpts, options.contextLoader);
165
+ } catch (error) {
166
+ logger$1.warn("Failed to verify; failed to hash the signature options: {signatureOptions}\n{error}", {
167
+ signatureOptions: sigOpts,
168
+ error
169
+ });
170
+ return null;
171
+ }
172
+ const document = { ...jsonLd };
173
+ delete document.signature;
174
+ let docHash;
175
+ try {
176
+ docHash = await hashJsonLd(document, options.contextLoader);
177
+ } catch (error) {
178
+ logger$1.warn("Failed to verify; failed to hash the document: {document}\n{error}", {
179
+ document,
180
+ error
181
+ });
182
+ return null;
183
+ }
184
+ const encoder = new TextEncoder();
185
+ const message = sigOptsHash + docHash;
186
+ const messageBytes = encoder.encode(message);
187
+ const verified = await crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, signature.slice(), messageBytes);
188
+ if (verified) return key;
189
+ if (cached) {
190
+ logger$1.debug("Failed to verify with the cached key {keyId}; signature {signatureValue} is invalid. Retrying with the freshly fetched key...", {
191
+ keyId: sig.creator,
192
+ ...sig
193
+ });
194
+ const { key: key$1 } = await require_http.fetchKey(new URL(sig.creator), __fedify_vocab.CryptographicKey, {
195
+ ...options,
196
+ keyCache: {
197
+ get: () => Promise.resolve(void 0),
198
+ set: async (keyId, key$2) => await options.keyCache?.set(keyId, key$2)
199
+ }
200
+ });
201
+ if (key$1 == null) return null;
202
+ const verified$1 = await crypto.subtle.verify("RSASSA-PKCS1-v1_5", key$1.publicKey, signature.slice(), messageBytes);
203
+ return verified$1 ? key$1 : null;
204
+ }
205
+ logger$1.debug("Failed to verify with the fetched key {keyId}; signature {signatureValue} is invalid. Check if the key is correct or if the signed message is correct. The message to sign is:\n{message}", {
206
+ keyId: sig.creator,
207
+ ...sig,
208
+ message
209
+ });
210
+ return null;
211
+ }
212
+ /**
213
+ * Verify the authenticity of the given JSON-LD document using Linked Data
214
+ * Signatures. If the document is signed, this function verifies the signature
215
+ * and checks if the document is attributed to the owner of the public key.
216
+ * If the document is not signed, this function returns `false`.
217
+ * @param jsonLd The JSON-LD document to verify.
218
+ * @param options Options for verifying the document.
219
+ * @returns `true` if the document is authentic; `false` otherwise.
220
+ */
221
+ async function verifyJsonLd(jsonLd, options = {}) {
222
+ const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
223
+ const tracer = tracerProvider.getTracer(require_http.deno_default.name, require_http.deno_default.version);
224
+ return await tracer.startActiveSpan("ld_signatures.verify", async (span) => {
225
+ try {
226
+ const object = await __fedify_vocab.Object.fromJsonLd(jsonLd, options);
227
+ if (object.id != null) span.setAttribute("activitypub.object.id", object.id.href);
228
+ span.setAttribute("activitypub.object.type", (0, __fedify_vocab.getTypeId)(object).href);
229
+ if (typeof jsonLd === "object" && jsonLd != null && "signature" in jsonLd && typeof jsonLd.signature === "object" && jsonLd.signature != null) {
230
+ if ("creator" in jsonLd.signature && typeof jsonLd.signature.creator === "string") span.setAttribute("ld_signatures.key_id", jsonLd.signature.creator);
231
+ if ("signatureValue" in jsonLd.signature && typeof jsonLd.signature.signatureValue === "string") span.setAttribute("ld_signatures.signature", jsonLd.signature.signatureValue);
232
+ if ("type" in jsonLd.signature && typeof jsonLd.signature.type === "string") span.setAttribute("ld_signatures.type", jsonLd.signature.type);
233
+ }
234
+ const attributions = new Set(object.attributionIds.map((uri) => uri.href));
235
+ if (object instanceof __fedify_vocab.Activity) for (const uri of object.actorIds) attributions.add(uri.href);
236
+ const key = await verifySignature(jsonLd, options);
237
+ if (key == null) return false;
238
+ if (key.ownerId == null) {
239
+ logger$1.debug("Key {keyId} has no owner.", { keyId: key.id?.href });
240
+ return false;
241
+ }
242
+ attributions.delete(key.ownerId.href);
243
+ if (attributions.size > 0) {
244
+ logger$1.debug("Some attributions are not authenticated by the Linked Data Signatures: {attributions}.", { attributions: [...attributions] });
245
+ return false;
246
+ }
247
+ return true;
248
+ } catch (error) {
249
+ span.setStatus({
250
+ code: __opentelemetry_api.SpanStatusCode.ERROR,
251
+ message: String(error)
252
+ });
253
+ throw error;
254
+ } finally {
255
+ span.end();
256
+ }
257
+ });
258
+ }
259
+ async function hashJsonLd(jsonLd, contextLoader) {
260
+ const canon = await jsonld.default.canonize(jsonLd, {
261
+ format: "application/n-quads",
262
+ documentLoader: contextLoader ?? (0, __fedify_vocab_runtime.getDocumentLoader)()
263
+ });
264
+ const encoder = new TextEncoder();
265
+ const hash = await crypto.subtle.digest("SHA-256", encoder.encode(canon));
266
+ return (0, byte_encodings_hex.encodeHex)(hash);
267
+ }
268
+
269
+ //#endregion
270
+ //#region src/sig/owner.ts
271
+ /**
272
+ * Checks if the actor of the given activity owns the specified key.
273
+ * @param activity The activity to check.
274
+ * @param key The public key to check.
275
+ * @param options Options for checking the key ownership.
276
+ * @returns Whether the actor is the owner of the key.
277
+ */
278
+ async function doesActorOwnKey(activity, key, options) {
279
+ const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
280
+ const tracer = tracerProvider.getTracer(require_http.deno_default.name, require_http.deno_default.version);
281
+ return await tracer.startActiveSpan("activitypub.verify_key_ownership", {
282
+ kind: __opentelemetry_api.SpanKind.INTERNAL,
283
+ attributes: {
284
+ "activitypub.actor.id": activity.actorId?.href ?? "",
285
+ "activitypub.key.id": key.id?.href ?? ""
286
+ }
287
+ }, async (span) => {
288
+ try {
289
+ if (key.ownerId != null) {
290
+ const owns = key.ownerId.href === activity.actorId?.href;
291
+ span.setAttribute("activitypub.key_ownership.verified", owns);
292
+ span.setAttribute("activitypub.key_ownership.method", "owner_id");
293
+ return owns;
294
+ }
295
+ const actor = await activity.getActor(options);
296
+ if (actor == null || !(0, __fedify_vocab.isActor)(actor)) {
297
+ span.setAttribute("activitypub.key_ownership.verified", false);
298
+ span.setAttribute("activitypub.key_ownership.method", "actor_fetch");
299
+ return false;
300
+ }
301
+ for (const publicKeyId of actor.publicKeyIds) if (key.id != null && publicKeyId.href === key.id.href) {
302
+ span.setAttribute("activitypub.key_ownership.verified", true);
303
+ span.setAttribute("activitypub.key_ownership.method", "actor_fetch");
304
+ return true;
305
+ }
306
+ span.setAttribute("activitypub.key_ownership.verified", false);
307
+ span.setAttribute("activitypub.key_ownership.method", "actor_fetch");
308
+ return false;
309
+ } catch (error) {
310
+ span.recordException(error);
311
+ span.setStatus({
312
+ code: __opentelemetry_api.SpanStatusCode.ERROR,
313
+ message: String(error)
314
+ });
315
+ throw error;
316
+ } finally {
317
+ span.end();
318
+ }
319
+ });
320
+ }
321
+ /**
322
+ * Gets the actor that owns the specified key. Returns `null` if the key has no
323
+ * known owner.
324
+ *
325
+ * @param keyId The ID of the key to check, or the key itself.
326
+ * @param options Options for getting the key owner.
327
+ * @returns The actor that owns the key, or `null` if the key has no known
328
+ * owner.
329
+ * @since 0.7.0
330
+ */
331
+ async function getKeyOwner(keyId, options) {
332
+ const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
333
+ const documentLoader = options.documentLoader ?? (0, __fedify_vocab_runtime.getDocumentLoader)();
334
+ const contextLoader = options.contextLoader ?? (0, __fedify_vocab_runtime.getDocumentLoader)();
335
+ let object;
336
+ if (keyId instanceof __fedify_vocab.CryptographicKey) {
337
+ object = keyId;
338
+ if (object.id == null) return null;
339
+ keyId = object.id;
340
+ } else {
341
+ let keyDoc;
342
+ try {
343
+ const { document } = await documentLoader(keyId.href);
344
+ keyDoc = document;
345
+ } catch (_) {
346
+ return null;
347
+ }
348
+ try {
349
+ object = await __fedify_vocab.Object.fromJsonLd(keyDoc, {
350
+ documentLoader,
351
+ contextLoader,
352
+ tracerProvider
353
+ });
354
+ } catch (e) {
355
+ if (!(e instanceof TypeError)) throw e;
356
+ try {
357
+ object = await __fedify_vocab.CryptographicKey.fromJsonLd(keyDoc, {
358
+ documentLoader,
359
+ contextLoader,
360
+ tracerProvider
361
+ });
362
+ } catch (e$1) {
363
+ if (e$1 instanceof TypeError) return null;
364
+ throw e$1;
365
+ }
366
+ }
367
+ }
368
+ let owner = null;
369
+ if (object instanceof __fedify_vocab.CryptographicKey) {
370
+ if (object.ownerId == null) return null;
371
+ owner = await object.getOwner({
372
+ documentLoader,
373
+ contextLoader,
374
+ tracerProvider
375
+ });
376
+ } else if ((0, __fedify_vocab.isActor)(object)) owner = object;
377
+ else return null;
378
+ if (owner == null) return null;
379
+ for (const kid of owner.publicKeyIds) if (kid.href === keyId.href) return owner;
380
+ return null;
381
+ }
382
+
383
+ //#endregion
384
+ //#region src/sig/proof.ts
385
+ const logger = (0, __logtape_logtape.getLogger)([
386
+ "fedify",
387
+ "sig",
388
+ "proof"
389
+ ]);
390
+ /**
391
+ * Creates a proof for the given object.
392
+ * @param object The object to create a proof for.
393
+ * @param privateKey The private key to sign the proof with.
394
+ * @param keyId The key ID to use in the proof. It will be used by the verifier.
395
+ * @param options Additional options. See also {@link CreateProofOptions}.
396
+ * @returns The created proof.
397
+ * @throws {TypeError} If the private key is invalid or unsupported.
398
+ * @since 0.10.0
399
+ */
400
+ async function createProof(object, privateKey, keyId, { contextLoader, context, created } = {}) {
401
+ require_http.validateCryptoKey(privateKey, "private");
402
+ if (privateKey.algorithm.name !== "Ed25519") throw new TypeError("Unsupported algorithm: " + privateKey.algorithm.name);
403
+ const objectWithoutProofs = object.clone({ proofs: [] });
404
+ const compactMsg = await objectWithoutProofs.toJsonLd({
405
+ format: "compact",
406
+ contextLoader,
407
+ context
408
+ });
409
+ const msgCanon = (0, json_canon.default)(compactMsg);
410
+ const encoder = new TextEncoder();
411
+ const msgBytes = encoder.encode(msgCanon);
412
+ const msgDigest = await crypto.subtle.digest("SHA-256", msgBytes);
413
+ created ??= Temporal.Now.instant();
414
+ const proofConfig = {
415
+ "@context": compactMsg["@context"],
416
+ type: "DataIntegrityProof",
417
+ cryptosuite: "eddsa-jcs-2022",
418
+ verificationMethod: keyId.href,
419
+ proofPurpose: "assertionMethod",
420
+ created: created.toString()
421
+ };
422
+ const proofCanon = (0, json_canon.default)(proofConfig);
423
+ const proofBytes = encoder.encode(proofCanon);
424
+ const proofDigest = await crypto.subtle.digest("SHA-256", proofBytes);
425
+ const digest = new Uint8Array(proofDigest.byteLength + msgDigest.byteLength);
426
+ digest.set(new Uint8Array(proofDigest), 0);
427
+ digest.set(new Uint8Array(msgDigest), proofDigest.byteLength);
428
+ const sig = await crypto.subtle.sign("Ed25519", privateKey, digest);
429
+ return new __fedify_vocab.DataIntegrityProof({
430
+ cryptosuite: "eddsa-jcs-2022",
431
+ verificationMethod: keyId,
432
+ proofPurpose: "assertionMethod",
433
+ created: created ?? Temporal.Now.instant(),
434
+ proofValue: new Uint8Array(sig)
435
+ });
436
+ }
437
+ /**
438
+ * Signs the given object with the private key and returns the signed object.
439
+ * @param object The object to create a proof for.
440
+ * @param privateKey The private key to sign the proof with.
441
+ * @param keyId The key ID to use in the proof. It will be used by the verifier.
442
+ * @param options Additional options. See also {@link SignObjectOptions}.
443
+ * @returns The signed object.
444
+ * @throws {TypeError} If the private key is invalid or unsupported.
445
+ * @since 0.10.0
446
+ */
447
+ async function signObject(object, privateKey, keyId, options = {}) {
448
+ const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
449
+ const tracer = tracerProvider.getTracer(require_http.deno_default.name, require_http.deno_default.version);
450
+ return await tracer.startActiveSpan("object_integrity_proofs.sign", { attributes: { "activitypub.object.type": (0, __fedify_vocab.getTypeId)(object).href } }, async (span) => {
451
+ try {
452
+ if (object.id != null) span.setAttribute("activitypub.object.id", object.id.href);
453
+ const existingProofs = [];
454
+ for await (const proof$1 of object.getProofs(options)) existingProofs.push(proof$1);
455
+ const proof = await createProof(object, privateKey, keyId, options);
456
+ if (span.isRecording()) {
457
+ if (proof.cryptosuite != null) span.setAttribute("object_integrity_proofs.cryptosuite", proof.cryptosuite);
458
+ if (proof.verificationMethodId != null) span.setAttribute("object_integrity_proofs.key_id", proof.verificationMethodId.href);
459
+ if (proof.proofValue != null) span.setAttribute("object_integrity_proofs.signature", (0, byte_encodings_hex.encodeHex)(proof.proofValue));
460
+ }
461
+ return object.clone({ proofs: [...existingProofs, proof] });
462
+ } catch (error) {
463
+ span.setStatus({
464
+ code: __opentelemetry_api.SpanStatusCode.ERROR,
465
+ message: String(error)
466
+ });
467
+ throw error;
468
+ } finally {
469
+ span.end();
470
+ }
471
+ });
472
+ }
473
+ /**
474
+ * Verifies the given proof for the object.
475
+ * @param jsonLd The JSON-LD object to verify the proof for. If it contains
476
+ * any proofs, they will be ignored.
477
+ * @param proof The proof to verify.
478
+ * @param options Additional options. See also {@link VerifyProofOptions}.
479
+ * @returns The public key that was used to sign the proof, or `null` if the
480
+ * proof is invalid.
481
+ * @since 0.10.0
482
+ */
483
+ async function verifyProof(jsonLd, proof, options = {}) {
484
+ const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
485
+ const tracer = tracerProvider.getTracer(require_http.deno_default.name, require_http.deno_default.version);
486
+ return await tracer.startActiveSpan("object_integrity_proofs.verify", async (span) => {
487
+ if (span.isRecording()) {
488
+ if (proof.cryptosuite != null) span.setAttribute("object_integrity_proofs.cryptosuite", proof.cryptosuite);
489
+ if (proof.verificationMethodId != null) span.setAttribute("object_integrity_proofs.key_id", proof.verificationMethodId.href);
490
+ if (proof.proofValue != null) span.setAttribute("object_integrity_proofs.signature", (0, byte_encodings_hex.encodeHex)(proof.proofValue));
491
+ }
492
+ try {
493
+ const key = await verifyProofInternal(jsonLd, proof, options);
494
+ if (key == null) span.setStatus({ code: __opentelemetry_api.SpanStatusCode.ERROR });
495
+ return key;
496
+ } catch (error) {
497
+ span.setStatus({
498
+ code: __opentelemetry_api.SpanStatusCode.ERROR,
499
+ message: String(error)
500
+ });
501
+ throw error;
502
+ } finally {
503
+ span.end();
504
+ }
505
+ });
506
+ }
507
+ async function verifyProofInternal(jsonLd, proof, options) {
508
+ if (typeof jsonLd !== "object" || proof.cryptosuite !== "eddsa-jcs-2022" || proof.verificationMethodId == null || proof.proofPurpose !== "assertionMethod" || proof.proofValue == null || proof.created == null) return null;
509
+ const publicKeyPromise = require_http.fetchKey(proof.verificationMethodId, __fedify_vocab.Multikey, options);
510
+ const proofConfig = {
511
+ "@context": jsonLd["@context"],
512
+ type: "DataIntegrityProof",
513
+ cryptosuite: proof.cryptosuite,
514
+ verificationMethod: proof.verificationMethodId.href,
515
+ proofPurpose: proof.proofPurpose,
516
+ created: proof.created.toString()
517
+ };
518
+ const proofCanon = (0, json_canon.default)(proofConfig);
519
+ const encoder = new TextEncoder();
520
+ const proofBytes = encoder.encode(proofCanon);
521
+ const proofDigest = await crypto.subtle.digest("SHA-256", proofBytes);
522
+ const msg = { ...jsonLd };
523
+ if ("proof" in msg) delete msg.proof;
524
+ const msgCanon = (0, json_canon.default)(msg);
525
+ const msgBytes = encoder.encode(msgCanon);
526
+ const msgDigest = await crypto.subtle.digest("SHA-256", msgBytes);
527
+ const digest = new Uint8Array(proofDigest.byteLength + msgDigest.byteLength);
528
+ digest.set(new Uint8Array(proofDigest), 0);
529
+ digest.set(new Uint8Array(msgDigest), proofDigest.byteLength);
530
+ let fetchedKey;
531
+ try {
532
+ fetchedKey = await publicKeyPromise;
533
+ } catch (error) {
534
+ logger.debug("Failed to get the key (verificationMethod) for the proof:\n{proof}", {
535
+ proof,
536
+ keyId: proof.verificationMethodId.href,
537
+ error
538
+ });
539
+ return null;
540
+ }
541
+ const publicKey = fetchedKey.key;
542
+ if (publicKey == null) {
543
+ logger.debug("Failed to get the key (verificationMethod) for the proof:\n{proof}", {
544
+ proof,
545
+ keyId: proof.verificationMethodId.href
546
+ });
547
+ return null;
548
+ }
549
+ if (publicKey.publicKey.algorithm.name !== "Ed25519") {
550
+ if (fetchedKey.cached) {
551
+ logger.debug("The cached key (verificationMethod) for the proof is not a valid Ed25519 key:\n{keyId}; retrying with the freshly fetched key...", {
552
+ proof,
553
+ keyId: proof.verificationMethodId.href
554
+ });
555
+ return await verifyProof(jsonLd, proof, {
556
+ ...options,
557
+ keyCache: {
558
+ get: () => Promise.resolve(null),
559
+ set: async (keyId, key) => await options.keyCache?.set(keyId, key)
560
+ }
561
+ });
562
+ }
563
+ logger.debug("The fetched key (verificationMethod) for the proof is not a valid Ed25519 key:\n{keyId}", {
564
+ proof,
565
+ keyId: proof.verificationMethodId.href
566
+ });
567
+ return null;
568
+ }
569
+ const verified = await crypto.subtle.verify("Ed25519", publicKey.publicKey, proof.proofValue.slice(), digest);
570
+ if (!verified) {
571
+ if (fetchedKey.cached) {
572
+ logger.debug("Failed to verify the proof with the cached key {keyId}; retrying with the freshly fetched key...", {
573
+ keyId: proof.verificationMethodId.href,
574
+ proof
575
+ });
576
+ return await verifyProof(jsonLd, proof, {
577
+ ...options,
578
+ keyCache: {
579
+ get: () => Promise.resolve(void 0),
580
+ set: async (keyId, key) => await options.keyCache?.set(keyId, key)
581
+ }
582
+ });
583
+ }
584
+ logger.debug("Failed to verify the proof with the fetched key {keyId}:\n{proof}", {
585
+ keyId: proof.verificationMethodId.href,
586
+ proof
587
+ });
588
+ return null;
589
+ }
590
+ return publicKey;
591
+ }
592
+ /**
593
+ * Verifies the given object. It will verify all the proofs in the object,
594
+ * and succeed only if all the proofs are valid and all attributions and
595
+ * actors are authenticated by the proofs.
596
+ * @template T The type of the object to verify.
597
+ * @param cls The class of the object to verify. It must be a subclass of
598
+ * the {@link Object}.
599
+ * @param jsonLd The JSON-LD object to verify. It's assumed that the object
600
+ * is a compacted JSON-LD representation of a `T` with `@context`.
601
+ * @param options Additional options. See also {@link VerifyObjectOptions}.
602
+ * @returns The object if it's verified, or `null` if it's not.
603
+ * @throws {TypeError} If the object is invalid or unsupported.
604
+ * @since 0.10.0
605
+ */
606
+ async function verifyObject(cls, jsonLd, options = {}) {
607
+ const logger$2 = (0, __logtape_logtape.getLogger)([
608
+ "fedify",
609
+ "sig",
610
+ "proof"
611
+ ]);
612
+ const object = await cls.fromJsonLd(jsonLd, options);
613
+ const attributions = new Set(object.attributionIds.map((uri) => uri.href));
614
+ if (object instanceof __fedify_vocab.Activity) for (const uri of object.actorIds) attributions.add(uri.href);
615
+ for await (const proof of object.getProofs(options)) {
616
+ const key = await verifyProof(jsonLd, proof, options);
617
+ if (key === null) return null;
618
+ if (key.controllerId == null) {
619
+ logger$2.debug("Key {keyId} does not have a controller.", { keyId: key.id?.href });
620
+ continue;
621
+ }
622
+ attributions.delete(key.controllerId.href);
623
+ }
624
+ if (attributions.size > 0) {
625
+ logger$2.debug("Some attributions are not authenticated by the proofs: {attributions}.", { attributions: [...attributions] });
626
+ return null;
627
+ }
628
+ return object;
629
+ }
630
+
631
+ //#endregion
632
+ Object.defineProperty(exports, 'attachSignature', {
633
+ enumerable: true,
634
+ get: function () {
635
+ return attachSignature;
636
+ }
637
+ });
638
+ Object.defineProperty(exports, 'createProof', {
639
+ enumerable: true,
640
+ get: function () {
641
+ return createProof;
642
+ }
643
+ });
644
+ Object.defineProperty(exports, 'createSignature', {
645
+ enumerable: true,
646
+ get: function () {
647
+ return createSignature;
648
+ }
649
+ });
650
+ Object.defineProperty(exports, 'detachSignature', {
651
+ enumerable: true,
652
+ get: function () {
653
+ return detachSignature;
654
+ }
655
+ });
656
+ Object.defineProperty(exports, 'doesActorOwnKey', {
657
+ enumerable: true,
658
+ get: function () {
659
+ return doesActorOwnKey;
660
+ }
661
+ });
662
+ Object.defineProperty(exports, 'getKeyOwner', {
663
+ enumerable: true,
664
+ get: function () {
665
+ return getKeyOwner;
666
+ }
667
+ });
668
+ Object.defineProperty(exports, 'hasSignature', {
669
+ enumerable: true,
670
+ get: function () {
671
+ return hasSignature;
672
+ }
673
+ });
674
+ Object.defineProperty(exports, 'signJsonLd', {
675
+ enumerable: true,
676
+ get: function () {
677
+ return signJsonLd;
678
+ }
679
+ });
680
+ Object.defineProperty(exports, 'signObject', {
681
+ enumerable: true,
682
+ get: function () {
683
+ return signObject;
684
+ }
685
+ });
686
+ Object.defineProperty(exports, 'verifyJsonLd', {
687
+ enumerable: true,
688
+ get: function () {
689
+ return verifyJsonLd;
690
+ }
691
+ });
692
+ Object.defineProperty(exports, 'verifyObject', {
693
+ enumerable: true,
694
+ get: function () {
695
+ return verifyObject;
696
+ }
697
+ });
698
+ Object.defineProperty(exports, 'verifyProof', {
699
+ enumerable: true,
700
+ get: function () {
701
+ return verifyProof;
702
+ }
703
+ });
704
+ Object.defineProperty(exports, 'verifySignature', {
705
+ enumerable: true,
706
+ get: function () {
707
+ return verifySignature;
708
+ }
709
+ });