@fedify/fedify 2.0.0-dev.1641 → 2.0.0-dev.167
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +1 -1
- package/README.md +66 -30
- package/dist/{assert_rejects-7UF4R_Qs.js → assert_rejects-Ce45JcFg.js} +1 -1
- package/dist/{assert_is_error-B035L3om.js → assert_throws-BNXdRGWP.js} +31 -1
- package/dist/{builder-E2Icrl_a.js → builder-CRQGVq_N.js} +15 -8
- package/dist/{client-bgSdkFa2.d.ts → client-CUTUGgvJ.d.ts} +19 -19
- package/dist/{client-BW4V0OJx.js → client-Dg7OfUDA.js} +28 -23
- package/dist/{client-CegPX0Rn.d.cts → client-by-PEGAJ.d.cts} +19 -19
- package/dist/compat/mod.cjs +1 -1
- package/dist/compat/mod.d.cts +6 -12
- package/dist/compat/mod.d.ts +6 -12
- package/dist/compat/mod.js +1 -1
- package/dist/compat/transformers.test.js +21 -19
- package/dist/context-Bns6uTJq.js +109 -0
- package/dist/{context-CDSZdQHD.d.ts → context-C7vzWilY.d.ts} +374 -182
- package/dist/{context-Dq8aCtMH.d.cts → context-CrB9RFy5.d.cts} +374 -182
- package/dist/deno-Bvf4AA-X.js +117 -0
- package/dist/{testing-ByQmUvf-.js → dist-B5f6a8Tt.js} +90 -111
- package/dist/{authdocloader-BkIZCKQv.js → docloader-2gNKaklf.js} +17 -8
- package/dist/{esm-mtx3XJAD.js → esm-DGl7uK1r.js} +32 -17
- package/dist/federation/builder.test.js +9 -9
- package/dist/federation/collection.test.js +3 -6
- package/dist/federation/handler.test.js +113 -145
- package/dist/federation/idempotency.test.js +202 -0
- package/dist/federation/inbox.test.js +5 -6
- package/dist/federation/keycache.test.js +4 -5
- package/dist/federation/kv.test.js +58 -7
- package/dist/federation/middleware.test.js +306 -111
- package/dist/federation/mod.cjs +8 -12
- package/dist/federation/mod.d.cts +7 -13
- package/dist/federation/mod.d.ts +7 -13
- package/dist/federation/mod.js +8 -13
- package/dist/federation/mq.test.js +7 -8
- package/dist/federation/negotiation.test.js +25 -0
- package/dist/federation/retry.test.js +2 -4
- package/dist/federation/router.test.js +4 -6
- package/dist/federation/send.test.js +53 -13
- package/dist/{webfinger/handler.test.js → federation/webfinger.test.js} +25 -23
- package/dist/{federation-H2_En3j5.cjs → federation-B431K2gm.cjs} +22 -0
- package/dist/{federation-D1U8YY9t.js → federation-BbZwNNWj.js} +28 -6
- package/dist/{http-C7uYFcBo.js → http-0lpbWrFT.js} +371 -11
- package/dist/{http-BS6766zs.d.cts → http-ClB3pLcL.d.cts} +2 -2
- package/dist/{http-DqSNLFNY.d.ts → http-DLBDPal9.d.ts} +2 -2
- package/dist/{http-Cox5GsED.js → http-DP374h--.js} +3 -2
- package/dist/{http-ZhcoaYEa.cjs → http-d_vxukl7.cjs} +410 -14
- package/dist/{inbox-BDdRbWNI.js → inbox-Dv3k4z7l.js} +25 -7
- package/dist/{key-CfiBDu3o.js → key-t0uDOx8t.js} +3 -2
- package/dist/{keycache-CVBjz3xi.js → keycache-DRxpZ5r9.js} +1 -1
- package/dist/{keys-CBKbYaJA.js → keys-ZbcByPg9.js} +2 -1
- package/dist/{kv-63Cil1MD.d.cts → kv-B4vFhIYL.d.cts} +30 -1
- package/dist/{kv-C7sopW2E.d.ts → kv-CYySNrsn.d.ts} +30 -1
- package/dist/{kv-CRZrzyXm.js → kv-QzKcOQgP.js} +22 -0
- package/dist/kv-cache-BEeqyGER.js +107 -0
- package/dist/kv-cache-KFREoRaI.cjs +134 -0
- package/dist/kv-cache-aVS_ypNU.js +122 -0
- package/dist/{ld-CxgmnSO3.js → ld-CpXPfqRW.js} +4 -2
- package/dist/middleware-6Nb3n763.js +12 -0
- package/dist/{middleware-LyCG_YVM.cjs → middleware-Clcecst5.cjs} +309 -303
- package/dist/{middleware-DXidHY4N.js → middleware-DEy7WEOy.js} +254 -254
- package/dist/{middleware-ByPnvMMS.js → middleware-DLaPtWGX.js} +215 -313
- package/dist/middleware-DRg9fmN1.js +26 -0
- package/dist/middleware-lkdHuEk5.cjs +12 -0
- package/dist/mod-0p9zUdzg.d.cts +107 -0
- package/dist/mod-0qnPv4EC.d.cts +62 -0
- package/dist/{mod-BClfg3ej.d.cts → mod-BrS8tiad.d.cts} +3 -3
- package/dist/mod-C3SOvTD1.d.ts +64 -0
- package/dist/{mod-BhMnAkFX.d.cts → mod-D6pS5_xJ.d.cts} +4 -4
- package/dist/{mod-Drmz72EK.d.ts → mod-jOa7W503.d.ts} +3 -3
- package/dist/{mod-RI3-KvUI.d.ts → mod-waqu-BL_.d.ts} +4 -4
- package/dist/mod-xc20HhMD.d.ts +109 -0
- package/dist/mod.cjs +17 -112
- package/dist/mod.d.cts +11 -17
- package/dist/mod.d.ts +11 -17
- package/dist/mod.js +11 -17
- package/dist/negotiation-5NPJL6zp.js +71 -0
- package/dist/nodeinfo/client.test.js +5 -8
- package/dist/nodeinfo/handler.test.js +23 -22
- package/dist/nodeinfo/mod.cjs +2 -3
- package/dist/nodeinfo/mod.d.cts +2 -4
- package/dist/nodeinfo/mod.d.ts +2 -4
- package/dist/nodeinfo/mod.js +2 -3
- package/dist/nodeinfo/types.test.js +4 -7
- package/dist/otel/exporter.test.js +893 -0
- package/dist/otel/mod.cjs +256 -0
- package/dist/otel/mod.d.cts +230 -0
- package/dist/otel/mod.d.ts +232 -0
- package/dist/otel/mod.js +255 -0
- package/dist/{owner-Cxob5_PK.js → owner-BaG2jUgZ.js} +45 -8
- package/dist/{owner-CQPnQVtf.d.ts → owner-BgI8C-VY.d.ts} +2 -3
- package/dist/{owner-B-7Ptt_m.d.cts → owner-C-zfmVAD.d.cts} +2 -3
- package/dist/{proof-DkxwMaWE.js → proof-ClXweyp2.js} +47 -11
- package/dist/{proof-2Gcor0_N.cjs → proof-Cy-QcHCv.cjs} +69 -33
- package/dist/{proof-BiSQNUmQ.js → proof-D8bfMlig.js} +3 -2
- package/dist/router-D9eI0s4b.js +118 -0
- package/dist/{send-DSEhWIYD.js → send-BLogwy3G.js} +9 -4
- package/dist/sig/http.test.js +9 -11
- package/dist/sig/key.test.js +7 -9
- package/dist/sig/ld.test.js +8 -10
- package/dist/sig/mod.cjs +7 -11
- package/dist/sig/mod.d.cts +3 -7
- package/dist/sig/mod.d.ts +3 -7
- package/dist/sig/mod.js +3 -7
- package/dist/sig/owner.test.js +31 -10
- package/dist/sig/proof.test.js +11 -12
- package/dist/testing/mod.d.ts +243 -6982
- package/dist/testing/mod.js +4 -4
- package/dist/{transformers-CoBS-oFG.cjs → transformers-BjBg6Lag.cjs} +2 -2
- package/dist/{transformers-BFT6d7J5.js → transformers-N_ip_y4P.js} +2 -2
- package/dist/{types-l2uh_ZhP.js → types-8l28uC8o.js} +31 -26
- package/dist/{types-Bqt2EgP0.cjs → types-B6z6CqIz.cjs} +33 -28
- package/dist/{types-BSuWJsOm.js → types-CPz01LGH.js} +3 -3
- package/dist/{runtime/authdocloader.test.js → utils/docloader.test.js} +11 -13
- package/dist/utils/kv-cache.test.js +211 -0
- package/dist/utils/mod.cjs +10 -0
- package/dist/utils/mod.d.cts +4 -0
- package/dist/utils/mod.d.ts +6 -0
- package/dist/utils/mod.js +9 -0
- package/package.json +34 -75
- package/dist/actor-C22bXuuC.d.ts +0 -130
- package/dist/actor-CP03csrm.cjs +0 -37786
- package/dist/actor-DMgu-ZjT.d.cts +0 -128
- package/dist/actor-DU511yTk.js +0 -37312
- package/dist/actor-DVpsNXhn.js +0 -146
- package/dist/assert_throws-53_pKeP3.js +0 -39
- package/dist/authdocloader-BnsFSERg.cjs +0 -58
- package/dist/authdocloader-DCgMyo82.js +0 -52
- package/dist/denokv-jZ0Z2h0M.js +0 -57
- package/dist/docloader-BtqIh1OE.js +0 -4795
- package/dist/docloader-CxWcuWqQ.d.ts +0 -221
- package/dist/docloader-D-MrRyHl.d.cts +0 -219
- package/dist/docloader-kae6M-GI.cjs +0 -4861
- package/dist/fixtures/activitypub.academy/users/brauca_darradiul.json +0 -83
- package/dist/fixtures/example.com/announce.json +0 -6
- package/dist/fixtures/example.com/collection.json +0 -19
- package/dist/fixtures/example.com/create.json +0 -6
- package/dist/fixtures/example.com/cross-origin-actor.json +0 -6
- package/dist/fixtures/example.com/hong-gildong.json +0 -11
- package/dist/fixtures/example.com/invite.json +0 -7
- package/dist/fixtures/example.com/key.json +0 -7
- package/dist/fixtures/example.com/key2.json +0 -6
- package/dist/fixtures/example.com/object.json +0 -6
- package/dist/fixtures/example.com/orderedcollectionpage.json +0 -24
- package/dist/fixtures/example.com/paged/a.json +0 -13
- package/dist/fixtures/example.com/paged/b.json +0 -16
- package/dist/fixtures/example.com/paged-collection.json +0 -6
- package/dist/fixtures/example.com/person.json +0 -22
- package/dist/fixtures/example.com/person2.json +0 -40
- package/dist/fixtures/example.com/test.json +0 -5
- package/dist/fixtures/example.com/users/handle.json +0 -16
- package/dist/fixtures/example.com/wrong-type.json +0 -3
- package/dist/fixtures/oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd.json +0 -24
- package/dist/fixtures/remote.domain/users/bob.json +0 -20
- package/dist/fixtures/server.example/users/alice.json +0 -20
- package/dist/fixtures/w3id.org/identity/v1.json +0 -152
- package/dist/fixtures/w3id.org/security/data-integrity/v1.json +0 -74
- package/dist/fixtures/w3id.org/security/multikey/v1.json +0 -35
- package/dist/fixtures/w3id.org/security/v1.json +0 -50
- package/dist/fixtures/wizard.casa/users/hongminhee.json +0 -69
- package/dist/fixtures/www.w3.org/ns/activitystreams.json +0 -379
- package/dist/fixtures/www.w3.org/ns/did/v1.json +0 -58
- package/dist/key-B9Z5ZuX9.js +0 -10
- package/dist/key-Cc0JlcKe.js +0 -260
- package/dist/key-CgwCzDC4.js +0 -10
- package/dist/key-D-7DPHNl.cjs +0 -10
- package/dist/key-HqzOCwDc.cjs +0 -290
- package/dist/lookup-CiU3QxQz.js +0 -322
- package/dist/lookup-NuT9cCSl.js +0 -131
- package/dist/lookup-QHjmy4Og.cjs +0 -137
- package/dist/middleware-BHboQ4BE.js +0 -25
- package/dist/middleware-Bp3I9z8r.js +0 -17
- package/dist/middleware-oYqSU5ky.cjs +0 -17
- package/dist/mod-Cxt4Kpf6.d.ts +0 -291
- package/dist/mod-DBzN0aCM.d.ts +0 -115
- package/dist/mod-Dc_-mf8s.d.cts +0 -102
- package/dist/mod-FZd39qVq.d.cts +0 -1
- package/dist/mod-TFoH2Ql8.d.ts +0 -104
- package/dist/mod-evzlRVZq.d.cts +0 -289
- package/dist/mod-g0xFzAP9.d.ts +0 -2
- package/dist/mod-jQ4OODsl.d.cts +0 -113
- package/dist/mq-B7R1Q-M5.d.cts +0 -140
- package/dist/mq-CRGm1e_F.d.ts +0 -143
- package/dist/runtime/docloader.test.js +0 -522
- package/dist/runtime/key.test.js +0 -103
- package/dist/runtime/langstr.test.js +0 -39
- package/dist/runtime/link.test.js +0 -61
- package/dist/runtime/mod.cjs +0 -25
- package/dist/runtime/mod.d.cts +0 -6
- package/dist/runtime/mod.d.ts +0 -8
- package/dist/runtime/mod.js +0 -13
- package/dist/runtime/multibase/multibase.test.d.ts +0 -3
- package/dist/runtime/multibase/multibase.test.js +0 -358
- package/dist/runtime/url.test.d.ts +0 -3
- package/dist/runtime/url.test.js +0 -45
- package/dist/src/vocab/accept.yaml +0 -15
- package/dist/src/vocab/activity.yaml +0 -98
- package/dist/src/vocab/add.yaml +0 -16
- package/dist/src/vocab/announce.yaml +0 -30
- package/dist/src/vocab/application.yaml +0 -324
- package/dist/src/vocab/arrive.yaml +0 -15
- package/dist/src/vocab/article.yaml +0 -46
- package/dist/src/vocab/audio.yaml +0 -11
- package/dist/src/vocab/block.yaml +0 -16
- package/dist/src/vocab/chatmessage.yaml +0 -50
- package/dist/src/vocab/collection.yaml +0 -154
- package/dist/src/vocab/collectionpage.yaml +0 -55
- package/dist/src/vocab/create.yaml +0 -28
- package/dist/src/vocab/dataintegrityproof.yaml +0 -56
- package/dist/src/vocab/delete.yaml +0 -27
- package/dist/src/vocab/didservice.yaml +0 -22
- package/dist/src/vocab/dislike.yaml +0 -14
- package/dist/src/vocab/document.yaml +0 -31
- package/dist/src/vocab/emoji.yaml +0 -12
- package/dist/src/vocab/emojireact.yaml +0 -17
- package/dist/src/vocab/endpoints.yaml +0 -85
- package/dist/src/vocab/event.yaml +0 -11
- package/dist/src/vocab/export.yaml +0 -9
- package/dist/src/vocab/flag.yaml +0 -15
- package/dist/src/vocab/follow.yaml +0 -19
- package/dist/src/vocab/group.yaml +0 -324
- package/dist/src/vocab/hashtag.yaml +0 -14
- package/dist/src/vocab/ignore.yaml +0 -14
- package/dist/src/vocab/image.yaml +0 -9
- package/dist/src/vocab/intransitiveactivity.yaml +0 -15
- package/dist/src/vocab/invite.yaml +0 -14
- package/dist/src/vocab/join.yaml +0 -14
- package/dist/src/vocab/key.yaml +0 -28
- package/dist/src/vocab/leave.yaml +0 -14
- package/dist/src/vocab/like.yaml +0 -16
- package/dist/src/vocab/link.yaml +0 -101
- package/dist/src/vocab/listen.yaml +0 -12
- package/dist/src/vocab/mention.yaml +0 -9
- package/dist/src/vocab/move.yaml +0 -15
- package/dist/src/vocab/multikey.yaml +0 -36
- package/dist/src/vocab/note.yaml +0 -48
- package/dist/src/vocab/object.yaml +0 -404
- package/dist/src/vocab/offer.yaml +0 -15
- package/dist/src/vocab/orderedcollection.yaml +0 -39
- package/dist/src/vocab/orderedcollectionpage.yaml +0 -50
- package/dist/src/vocab/organization.yaml +0 -324
- package/dist/src/vocab/page.yaml +0 -11
- package/dist/src/vocab/person.yaml +0 -324
- package/dist/src/vocab/place.yaml +0 -75
- package/dist/src/vocab/profile.yaml +0 -26
- package/dist/src/vocab/propertyvalue.yaml +0 -32
- package/dist/src/vocab/question.yaml +0 -103
- package/dist/src/vocab/read.yaml +0 -13
- package/dist/src/vocab/reject.yaml +0 -14
- package/dist/src/vocab/relationship.yaml +0 -52
- package/dist/src/vocab/remove.yaml +0 -14
- package/dist/src/vocab/service.yaml +0 -324
- package/dist/src/vocab/source.yaml +0 -26
- package/dist/src/vocab/tentativeaccept.yaml +0 -14
- package/dist/src/vocab/tentativereject.yaml +0 -14
- package/dist/src/vocab/tombstone.yaml +0 -24
- package/dist/src/vocab/travel.yaml +0 -16
- package/dist/src/vocab/undo.yaml +0 -26
- package/dist/src/vocab/update.yaml +0 -58
- package/dist/src/vocab/video.yaml +0 -11
- package/dist/src/vocab/view.yaml +0 -13
- package/dist/testing/docloader.test.js +0 -24
- package/dist/type-B4NJkfVg.js +0 -42187
- package/dist/vocab/actor.test.d.ts +0 -3
- package/dist/vocab/actor.test.js +0 -5965
- package/dist/vocab/lookup.test.d.ts +0 -3
- package/dist/vocab/lookup.test.js +0 -206
- package/dist/vocab/mod.cjs +0 -87
- package/dist/vocab/mod.d.cts +0 -6
- package/dist/vocab/mod.d.ts +0 -8
- package/dist/vocab/mod.js +0 -10
- package/dist/vocab/schema.yaml +0 -247
- package/dist/vocab/type.test.d.ts +0 -3
- package/dist/vocab/type.test.js +0 -25
- package/dist/vocab/vocab.test.d.ts +0 -3
- package/dist/vocab/vocab.test.js +0 -3398
- package/dist/vocab-B0-5a8pw.cjs +0 -282
- package/dist/vocab-DJTYMqyU.d.cts +0 -14632
- package/dist/vocab-SOE1ifCr.d.ts +0 -14634
- package/dist/vocab-lBFcVxVF.js +0 -246
- package/dist/webfinger/handler.test.d.ts +0 -3
- package/dist/webfinger/lookup.test.d.ts +0 -3
- package/dist/webfinger/lookup.test.js +0 -195
- package/dist/webfinger/mod.cjs +0 -9
- package/dist/webfinger/mod.d.cts +0 -4
- package/dist/webfinger/mod.d.ts +0 -6
- package/dist/webfinger/mod.js +0 -9
- package/dist/webfinger-BjOEdFPs.cjs +0 -4
- package/dist/webfinger-De_bU0iE.js +0 -4
- package/dist/x/cfworkers.cjs +0 -100
- package/dist/x/cfworkers.d.cts +0 -59
- package/dist/x/cfworkers.d.ts +0 -61
- package/dist/x/cfworkers.js +0 -98
- package/dist/x/cfworkers.test.d.ts +0 -3
- package/dist/x/cfworkers.test.js +0 -179
- package/dist/x/hono.cjs +0 -61
- package/dist/x/hono.d.cts +0 -54
- package/dist/x/hono.d.ts +0 -56
- package/dist/x/hono.js +0 -60
- package/dist/x/sveltekit.cjs +0 -69
- package/dist/x/sveltekit.d.cts +0 -46
- package/dist/x/sveltekit.d.ts +0 -48
- package/dist/x/sveltekit.js +0 -68
- /package/dist/{runtime/authdocloader.test.d.ts → federation/idempotency.test.d.ts} +0 -0
- /package/dist/{runtime/docloader.test.d.ts → federation/negotiation.test.d.ts} +0 -0
- /package/dist/{runtime/key.test.d.ts → federation/webfinger.test.d.ts} +0 -0
- /package/dist/{mod-1pDWKvUL.d.ts → mod-1E3W847c.d.ts} +0 -0
- /package/dist/{mod-C2tOeRkN.d.cts → mod-C81L6_lQ.d.cts} +0 -0
- /package/dist/{nodeinfo-DfycQ8Wf.js → nodeinfo-BlLsRSiT.js} +0 -0
- /package/dist/{nodeinfo-Co9lJrWl.cjs → nodeinfo-DuMYTpbZ.cjs} +0 -0
- /package/dist/{runtime/langstr.test.d.ts → otel/exporter.test.d.ts} +0 -0
- /package/dist/{retry-CfF8Gn4d.js → retry-D4GJ670a.js} +0 -0
- /package/dist/{runtime-DPYEDf-o.js → sig-CwuONEzF.js} +0 -0
- /package/dist/{runtime-C58AJWSv.cjs → sig-DeXX2xnj.cjs} +0 -0
- /package/dist/{testing → utils}/docloader.test.d.ts +0 -0
- /package/dist/{runtime/link.test.d.ts → utils/kv-cache.test.d.ts} +0 -0
- /package/dist/{sig-ByHXzqUi.cjs → utils-Db0ZmjcD.cjs} +0 -0
- /package/dist/{sig-Cj3tk-ig.js → utils-Wranxuoe.js} +0 -0
|
@@ -3,16 +3,376 @@
|
|
|
3
3
|
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
4
|
|
|
5
5
|
const require_chunk = require('./chunk-DqRYRqnO.cjs');
|
|
6
|
-
const require_docloader = require('./docloader-kae6M-GI.cjs');
|
|
7
|
-
const require_actor = require('./actor-CP03csrm.cjs');
|
|
8
|
-
const require_key = require('./key-HqzOCwDc.cjs');
|
|
9
6
|
const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
|
|
7
|
+
const __fedify_vocab = require_chunk.__toESM(require("@fedify/vocab"));
|
|
10
8
|
const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
|
|
11
|
-
const byte_encodings_base64 = require_chunk.__toESM(require("byte-encodings/base64"));
|
|
12
9
|
const byte_encodings_hex = require_chunk.__toESM(require("byte-encodings/hex"));
|
|
13
10
|
const __opentelemetry_semantic_conventions = require_chunk.__toESM(require("@opentelemetry/semantic-conventions"));
|
|
11
|
+
const byte_encodings_base64 = require_chunk.__toESM(require("byte-encodings/base64"));
|
|
14
12
|
const structured_field_values = require_chunk.__toESM(require("structured-field-values"));
|
|
13
|
+
const __fedify_vocab_runtime = require_chunk.__toESM(require("@fedify/vocab-runtime"));
|
|
15
14
|
|
|
15
|
+
//#region deno.json
|
|
16
|
+
var name = "@fedify/fedify";
|
|
17
|
+
var version = "2.0.0-dev.167+2bfe41d4";
|
|
18
|
+
var license = "MIT";
|
|
19
|
+
var exports$1 = {
|
|
20
|
+
".": "./src/mod.ts",
|
|
21
|
+
"./compat": "./src/compat/mod.ts",
|
|
22
|
+
"./federation": "./src/federation/mod.ts",
|
|
23
|
+
"./nodeinfo": "./src/nodeinfo/mod.ts",
|
|
24
|
+
"./otel": "./src/otel/mod.ts",
|
|
25
|
+
"./sig": "./src/sig/mod.ts",
|
|
26
|
+
"./utils": "./src/utils/mod.ts"
|
|
27
|
+
};
|
|
28
|
+
var imports = {
|
|
29
|
+
"@multiformats/base-x": "npm:@multiformats/base-x@^4.0.1",
|
|
30
|
+
"@opentelemetry/core": "npm:@opentelemetry/core@^2.0.0",
|
|
31
|
+
"@opentelemetry/sdk-trace-base": "npm:@opentelemetry/sdk-trace-base@^2.0.0",
|
|
32
|
+
"@opentelemetry/semantic-conventions": "npm:@opentelemetry/semantic-conventions@^1.27.0",
|
|
33
|
+
"@std/assert": "jsr:@std/assert@^0.226.0",
|
|
34
|
+
"@std/url": "jsr:@std/url@^0.225.1",
|
|
35
|
+
"asn1js": "npm:asn1js@^3.0.7",
|
|
36
|
+
"fast-check": "npm:fast-check@^3.22.0",
|
|
37
|
+
"fetch-mock": "npm:fetch-mock@^12.5.2",
|
|
38
|
+
"json-canon": "npm:json-canon@^1.0.1",
|
|
39
|
+
"jsonld": "npm:jsonld@^9.0.0",
|
|
40
|
+
"multicodec": "npm:multicodec@^3.2.1",
|
|
41
|
+
"pkijs": "npm:pkijs@^3.3.3",
|
|
42
|
+
"structured-field-values": "npm:structured-field-values@^2.0.4",
|
|
43
|
+
"uri-template-router": "npm:uri-template-router@^1.0.0",
|
|
44
|
+
"url-template": "npm:url-template@^3.1.1"
|
|
45
|
+
};
|
|
46
|
+
var exclude = [
|
|
47
|
+
".test-report.xml",
|
|
48
|
+
"apidoc/",
|
|
49
|
+
"dist/",
|
|
50
|
+
"node_modules/",
|
|
51
|
+
"npm/",
|
|
52
|
+
"pnpm-lock.yaml",
|
|
53
|
+
"src/cfworkers/dist/",
|
|
54
|
+
"src/cfworkers/fixtures/",
|
|
55
|
+
"src/cfworkers/imports.ts",
|
|
56
|
+
"src/cfworkers/README.md",
|
|
57
|
+
"src/cfworkers/server.ts",
|
|
58
|
+
"src/cfworkers/server.js",
|
|
59
|
+
"src/cfworkers/server.js.map"
|
|
60
|
+
];
|
|
61
|
+
var publish = { "exclude": ["**/*.test.ts", "src/testing/"] };
|
|
62
|
+
var tasks = {
|
|
63
|
+
"codegen": "deno task -f @fedify/vocab compile",
|
|
64
|
+
"cache": {
|
|
65
|
+
"command": "deno cache src/mod.ts",
|
|
66
|
+
"dependencies": ["codegen"]
|
|
67
|
+
},
|
|
68
|
+
"check": {
|
|
69
|
+
"command": "deno fmt --check && deno lint && deno check src/**/*.ts",
|
|
70
|
+
"dependencies": ["codegen"]
|
|
71
|
+
},
|
|
72
|
+
"test": {
|
|
73
|
+
"command": "deno test --check --doc --allow-read --allow-write --allow-env --unstable-kv --trace-leaks --parallel",
|
|
74
|
+
"dependencies": ["codegen"]
|
|
75
|
+
},
|
|
76
|
+
"coverage": "deno task test --clean --coverage && deno coverage --html coverage",
|
|
77
|
+
"bench": {
|
|
78
|
+
"command": "deno bench --allow-read --allow-write --allow-net --allow-env --allow-run --unstable-kv",
|
|
79
|
+
"dependencies": ["codegen"]
|
|
80
|
+
},
|
|
81
|
+
"apidoc": {
|
|
82
|
+
"command": "deno doc --html --name=Fedify --output=apidoc/ src/mod.ts",
|
|
83
|
+
"dependencies": ["codegen"]
|
|
84
|
+
},
|
|
85
|
+
"publish": {
|
|
86
|
+
"command": "deno publish",
|
|
87
|
+
"dependencies": ["codegen"]
|
|
88
|
+
},
|
|
89
|
+
"pnpm:install": "pnpm install --silent",
|
|
90
|
+
"pnpm:build": {
|
|
91
|
+
"command": "pnpm exec tsdown",
|
|
92
|
+
"dependencies": ["pnpm:build-vocab"]
|
|
93
|
+
},
|
|
94
|
+
"test:node": {
|
|
95
|
+
"command": "cd dist/ && node --test",
|
|
96
|
+
"dependencies": ["pnpm:build"]
|
|
97
|
+
},
|
|
98
|
+
"test:bun": {
|
|
99
|
+
"command": "cd dist/ && bun test --timeout 60000",
|
|
100
|
+
"dependencies": ["pnpm:build"]
|
|
101
|
+
},
|
|
102
|
+
"test:cfworkers": {
|
|
103
|
+
"command": "pnpm exec wrangler deploy --dry-run --outdir src/cfworkers && node --import=tsx src/cfworkers/client.ts",
|
|
104
|
+
"dependencies": ["pnpm:build"]
|
|
105
|
+
},
|
|
106
|
+
"test-all": { "dependencies": [
|
|
107
|
+
"check",
|
|
108
|
+
"test",
|
|
109
|
+
"test:node",
|
|
110
|
+
"test:bun",
|
|
111
|
+
"test:cfworkers"
|
|
112
|
+
] }
|
|
113
|
+
};
|
|
114
|
+
var deno_default = {
|
|
115
|
+
name,
|
|
116
|
+
version,
|
|
117
|
+
license,
|
|
118
|
+
exports: exports$1,
|
|
119
|
+
imports,
|
|
120
|
+
exclude,
|
|
121
|
+
publish,
|
|
122
|
+
tasks
|
|
123
|
+
};
|
|
124
|
+
|
|
125
|
+
//#endregion
|
|
126
|
+
//#region src/sig/key.ts
|
|
127
|
+
/**
|
|
128
|
+
* Checks if the given key is valid and supported. No-op if the key is valid,
|
|
129
|
+
* otherwise throws an error.
|
|
130
|
+
* @param key The key to check.
|
|
131
|
+
* @param type Which type of key to check. If not specified, the key can be
|
|
132
|
+
* either public or private.
|
|
133
|
+
* @throws {TypeError} If the key is invalid or unsupported.
|
|
134
|
+
*/
|
|
135
|
+
function validateCryptoKey(key, type) {
|
|
136
|
+
if (type != null && key.type !== type) throw new TypeError(`The key is not a ${type} key.`);
|
|
137
|
+
if (!key.extractable) throw new TypeError("The key is not extractable.");
|
|
138
|
+
if (key.algorithm.name !== "RSASSA-PKCS1-v1_5" && key.algorithm.name !== "Ed25519") throw new TypeError("Currently only RSASSA-PKCS1-v1_5 and Ed25519 keys are supported. More algorithms will be added in the future!");
|
|
139
|
+
if (key.algorithm.name === "RSASSA-PKCS1-v1_5") {
|
|
140
|
+
const algorithm = key.algorithm;
|
|
141
|
+
if (algorithm.hash.name !== "SHA-256") throw new TypeError("For compatibility with the existing Fediverse software (e.g., Mastodon), hash algorithm for RSASSA-PKCS1-v1_5 keys must be SHA-256.");
|
|
142
|
+
}
|
|
143
|
+
}
|
|
144
|
+
/**
|
|
145
|
+
* Generates a key pair which is appropriate for Fedify.
|
|
146
|
+
* @param algorithm The algorithm to use. Currently only RSASSA-PKCS1-v1_5 and
|
|
147
|
+
* Ed25519 are supported.
|
|
148
|
+
* @returns The generated key pair.
|
|
149
|
+
* @throws {TypeError} If the algorithm is unsupported.
|
|
150
|
+
*/
|
|
151
|
+
function generateCryptoKeyPair(algorithm) {
|
|
152
|
+
if (algorithm == null) (0, __logtape_logtape.getLogger)([
|
|
153
|
+
"fedify",
|
|
154
|
+
"sig",
|
|
155
|
+
"key"
|
|
156
|
+
]).warn("No algorithm specified. Using RSASSA-PKCS1-v1_5 by default, but it is recommended to specify the algorithm explicitly as the parameter will be required in the future.");
|
|
157
|
+
if (algorithm == null || algorithm === "RSASSA-PKCS1-v1_5") return crypto.subtle.generateKey({
|
|
158
|
+
name: "RSASSA-PKCS1-v1_5",
|
|
159
|
+
modulusLength: 4096,
|
|
160
|
+
publicExponent: new Uint8Array([
|
|
161
|
+
1,
|
|
162
|
+
0,
|
|
163
|
+
1
|
|
164
|
+
]),
|
|
165
|
+
hash: "SHA-256"
|
|
166
|
+
}, true, ["sign", "verify"]);
|
|
167
|
+
else if (algorithm === "Ed25519") return crypto.subtle.generateKey("Ed25519", true, ["sign", "verify"]);
|
|
168
|
+
throw new TypeError("Unsupported algorithm: " + algorithm);
|
|
169
|
+
}
|
|
170
|
+
/**
|
|
171
|
+
* Exports a key in JWK format.
|
|
172
|
+
* @param key The key to export. Either public or private key.
|
|
173
|
+
* @returns The exported key in JWK format. The key is suitable for
|
|
174
|
+
* serialization and storage.
|
|
175
|
+
* @throws {TypeError} If the key is invalid or unsupported.
|
|
176
|
+
*/
|
|
177
|
+
async function exportJwk(key) {
|
|
178
|
+
validateCryptoKey(key);
|
|
179
|
+
const jwk = await crypto.subtle.exportKey("jwk", key);
|
|
180
|
+
if (jwk.crv === "Ed25519") jwk.alg = "Ed25519";
|
|
181
|
+
return jwk;
|
|
182
|
+
}
|
|
183
|
+
/**
|
|
184
|
+
* Imports a key from JWK format.
|
|
185
|
+
* @param jwk The key in JWK format.
|
|
186
|
+
* @param type Which type of key to import, either `"public"` or `"private"`.
|
|
187
|
+
* @returns The imported key.
|
|
188
|
+
* @throws {TypeError} If the key is invalid or unsupported.
|
|
189
|
+
*/
|
|
190
|
+
async function importJwk(jwk, type) {
|
|
191
|
+
let key;
|
|
192
|
+
if (jwk.kty === "RSA" && jwk.alg === "RS256") key = await crypto.subtle.importKey("jwk", jwk, {
|
|
193
|
+
name: "RSASSA-PKCS1-v1_5",
|
|
194
|
+
hash: "SHA-256"
|
|
195
|
+
}, true, type === "public" ? ["verify"] : ["sign"]);
|
|
196
|
+
else if (jwk.kty === "OKP" && jwk.crv === "Ed25519") {
|
|
197
|
+
if (navigator?.userAgent === "Cloudflare-Workers") {
|
|
198
|
+
jwk = { ...jwk };
|
|
199
|
+
delete jwk.alg;
|
|
200
|
+
}
|
|
201
|
+
key = await crypto.subtle.importKey("jwk", jwk, "Ed25519", true, type === "public" ? ["verify"] : ["sign"]);
|
|
202
|
+
} else throw new TypeError("Unsupported JWK format.");
|
|
203
|
+
validateCryptoKey(key, type);
|
|
204
|
+
return key;
|
|
205
|
+
}
|
|
206
|
+
/**
|
|
207
|
+
* Fetches a {@link CryptographicKey} or {@link Multikey} from the given URL.
|
|
208
|
+
* If the given URL contains an {@link Actor} object, it tries to find
|
|
209
|
+
* the corresponding key in the `publicKey` or `assertionMethod` property.
|
|
210
|
+
* @template T The type of the key to fetch. Either {@link CryptographicKey}
|
|
211
|
+
* or {@link Multikey}.
|
|
212
|
+
* @param keyId The URL of the key.
|
|
213
|
+
* @param cls The class of the key to fetch. Either {@link CryptographicKey}
|
|
214
|
+
* or {@link Multikey}.
|
|
215
|
+
* @param options Options for fetching the key. See {@link FetchKeyOptions}.
|
|
216
|
+
* @returns The fetched key or `null` if the key is not found.
|
|
217
|
+
* @since 1.3.0
|
|
218
|
+
*/
|
|
219
|
+
function fetchKey(keyId, cls, options = {}) {
|
|
220
|
+
const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
|
|
221
|
+
const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
|
|
222
|
+
keyId = typeof keyId === "string" ? new URL(keyId) : keyId;
|
|
223
|
+
return tracer.startActiveSpan("activitypub.fetch_key", {
|
|
224
|
+
kind: __opentelemetry_api.SpanKind.CLIENT,
|
|
225
|
+
attributes: {
|
|
226
|
+
"http.method": "GET",
|
|
227
|
+
"url.full": keyId.href,
|
|
228
|
+
"url.scheme": keyId.protocol.replace(/:$/, ""),
|
|
229
|
+
"url.domain": keyId.hostname,
|
|
230
|
+
"url.path": keyId.pathname,
|
|
231
|
+
"url.query": keyId.search.replace(/^\?/, ""),
|
|
232
|
+
"url.fragment": keyId.hash.replace(/^#/, "")
|
|
233
|
+
}
|
|
234
|
+
}, async (span) => {
|
|
235
|
+
try {
|
|
236
|
+
const result = await fetchKeyInternal(keyId, cls, options);
|
|
237
|
+
span.setAttribute("activitypub.actor.key.cached", result.cached);
|
|
238
|
+
return result;
|
|
239
|
+
} catch (e) {
|
|
240
|
+
span.setStatus({
|
|
241
|
+
code: __opentelemetry_api.SpanStatusCode.ERROR,
|
|
242
|
+
message: String(e)
|
|
243
|
+
});
|
|
244
|
+
throw e;
|
|
245
|
+
} finally {
|
|
246
|
+
span.end();
|
|
247
|
+
}
|
|
248
|
+
});
|
|
249
|
+
}
|
|
250
|
+
async function fetchKeyInternal(keyId, cls, { documentLoader, contextLoader, keyCache, tracerProvider } = {}) {
|
|
251
|
+
const logger = (0, __logtape_logtape.getLogger)([
|
|
252
|
+
"fedify",
|
|
253
|
+
"sig",
|
|
254
|
+
"key"
|
|
255
|
+
]);
|
|
256
|
+
const cacheKey = typeof keyId === "string" ? new URL(keyId) : keyId;
|
|
257
|
+
keyId = typeof keyId === "string" ? keyId : keyId.href;
|
|
258
|
+
if (keyCache != null) {
|
|
259
|
+
const cachedKey = await keyCache.get(cacheKey);
|
|
260
|
+
if (cachedKey instanceof cls && cachedKey.publicKey != null) {
|
|
261
|
+
logger.debug("Key {keyId} found in cache.", { keyId });
|
|
262
|
+
return {
|
|
263
|
+
key: cachedKey,
|
|
264
|
+
cached: true
|
|
265
|
+
};
|
|
266
|
+
} else if (cachedKey === null) {
|
|
267
|
+
logger.debug("Entry {keyId} found in cache, but it is unavailable.", { keyId });
|
|
268
|
+
return {
|
|
269
|
+
key: null,
|
|
270
|
+
cached: true
|
|
271
|
+
};
|
|
272
|
+
}
|
|
273
|
+
}
|
|
274
|
+
logger.debug("Fetching key {keyId} to verify signature...", { keyId });
|
|
275
|
+
let document;
|
|
276
|
+
try {
|
|
277
|
+
const remoteDocument = await (documentLoader ?? (0, __fedify_vocab_runtime.getDocumentLoader)())(keyId);
|
|
278
|
+
document = remoteDocument.document;
|
|
279
|
+
} catch (_) {
|
|
280
|
+
logger.debug("Failed to fetch key {keyId}.", { keyId });
|
|
281
|
+
await keyCache?.set(cacheKey, null);
|
|
282
|
+
return {
|
|
283
|
+
key: null,
|
|
284
|
+
cached: false
|
|
285
|
+
};
|
|
286
|
+
}
|
|
287
|
+
let object;
|
|
288
|
+
try {
|
|
289
|
+
object = await __fedify_vocab.Object.fromJsonLd(document, {
|
|
290
|
+
documentLoader,
|
|
291
|
+
contextLoader,
|
|
292
|
+
tracerProvider
|
|
293
|
+
});
|
|
294
|
+
} catch (e) {
|
|
295
|
+
if (!(e instanceof TypeError)) throw e;
|
|
296
|
+
try {
|
|
297
|
+
object = await cls.fromJsonLd(document, {
|
|
298
|
+
documentLoader,
|
|
299
|
+
contextLoader,
|
|
300
|
+
tracerProvider
|
|
301
|
+
});
|
|
302
|
+
} catch (e$1) {
|
|
303
|
+
if (e$1 instanceof TypeError) {
|
|
304
|
+
logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
|
|
305
|
+
await keyCache?.set(cacheKey, null);
|
|
306
|
+
return {
|
|
307
|
+
key: null,
|
|
308
|
+
cached: false
|
|
309
|
+
};
|
|
310
|
+
}
|
|
311
|
+
throw e$1;
|
|
312
|
+
}
|
|
313
|
+
}
|
|
314
|
+
let key = null;
|
|
315
|
+
if (object instanceof cls) key = object;
|
|
316
|
+
else if ((0, __fedify_vocab.isActor)(object)) {
|
|
317
|
+
const keys = cls === __fedify_vocab.CryptographicKey ? object.getPublicKeys({
|
|
318
|
+
documentLoader,
|
|
319
|
+
contextLoader,
|
|
320
|
+
tracerProvider
|
|
321
|
+
}) : object.getAssertionMethods({
|
|
322
|
+
documentLoader,
|
|
323
|
+
contextLoader,
|
|
324
|
+
tracerProvider
|
|
325
|
+
});
|
|
326
|
+
let length = 0;
|
|
327
|
+
let lastKey = null;
|
|
328
|
+
for await (const k of keys) {
|
|
329
|
+
length++;
|
|
330
|
+
lastKey = k;
|
|
331
|
+
if (k.id?.href === keyId) {
|
|
332
|
+
key = k;
|
|
333
|
+
break;
|
|
334
|
+
}
|
|
335
|
+
}
|
|
336
|
+
const keyIdUrl = new URL(keyId);
|
|
337
|
+
if (key == null && keyIdUrl.hash === "" && length === 1) key = lastKey;
|
|
338
|
+
if (key == null) {
|
|
339
|
+
logger.debug("Failed to verify; object {keyId} returned an {actorType}, but has no key matching {keyId}.", {
|
|
340
|
+
keyId,
|
|
341
|
+
actorType: object.constructor.name
|
|
342
|
+
});
|
|
343
|
+
await keyCache?.set(cacheKey, null);
|
|
344
|
+
return {
|
|
345
|
+
key: null,
|
|
346
|
+
cached: false
|
|
347
|
+
};
|
|
348
|
+
}
|
|
349
|
+
} else {
|
|
350
|
+
logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
|
|
351
|
+
await keyCache?.set(cacheKey, null);
|
|
352
|
+
return {
|
|
353
|
+
key: null,
|
|
354
|
+
cached: false
|
|
355
|
+
};
|
|
356
|
+
}
|
|
357
|
+
if (key.publicKey == null) {
|
|
358
|
+
logger.debug("Failed to verify; key {keyId} has no publicKeyPem field.", { keyId });
|
|
359
|
+
await keyCache?.set(cacheKey, null);
|
|
360
|
+
return {
|
|
361
|
+
key: null,
|
|
362
|
+
cached: false
|
|
363
|
+
};
|
|
364
|
+
}
|
|
365
|
+
if (keyCache != null) {
|
|
366
|
+
await keyCache.set(cacheKey, key);
|
|
367
|
+
logger.debug("Key {keyId} cached.", { keyId });
|
|
368
|
+
}
|
|
369
|
+
return {
|
|
370
|
+
key,
|
|
371
|
+
cached: false
|
|
372
|
+
};
|
|
373
|
+
}
|
|
374
|
+
|
|
375
|
+
//#endregion
|
|
16
376
|
//#region src/sig/http.ts
|
|
17
377
|
/**
|
|
18
378
|
* Signs a request using the given private key.
|
|
@@ -24,9 +384,9 @@ const structured_field_values = require_chunk.__toESM(require("structured-field-
|
|
|
24
384
|
* @throws {TypeError} If the private key is invalid or unsupported.
|
|
25
385
|
*/
|
|
26
386
|
async function signRequest(request, privateKey, keyId, options = {}) {
|
|
27
|
-
|
|
387
|
+
validateCryptoKey(privateKey, "private");
|
|
28
388
|
const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
|
|
29
|
-
const tracer = tracerProvider.getTracer(
|
|
389
|
+
const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
|
|
30
390
|
return await tracer.startActiveSpan("http_signatures.sign", async (span) => {
|
|
31
391
|
try {
|
|
32
392
|
const spec = options.spec ?? "draft-cavage-http-signatures-12";
|
|
@@ -36,7 +396,7 @@ async function signRequest(request, privateKey, keyId, options = {}) {
|
|
|
36
396
|
if (span.isRecording()) {
|
|
37
397
|
span.setAttribute(__opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_METHOD, signed.method);
|
|
38
398
|
span.setAttribute(__opentelemetry_semantic_conventions.ATTR_URL_FULL, signed.url);
|
|
39
|
-
for (const [name, value] of signed.headers) span.setAttribute((0, __opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name), value);
|
|
399
|
+
for (const [name$1, value] of signed.headers) span.setAttribute((0, __opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name$1), value);
|
|
40
400
|
span.setAttribute("http_signatures.key_id", keyId.href);
|
|
41
401
|
}
|
|
42
402
|
return signed;
|
|
@@ -64,8 +424,8 @@ async function signRequestDraft(request, privateKey, keyId, span, currentTime, b
|
|
|
64
424
|
}
|
|
65
425
|
if (!headers.has("Date")) headers.set("Date", currentTime == null ? (/* @__PURE__ */ new Date()).toUTCString() : new Date(currentTime.toString()).toUTCString());
|
|
66
426
|
const serialized = [["(request-target)", `${request.method.toLowerCase()} ${url.pathname}`], ...headers];
|
|
67
|
-
const headerNames = serialized.map(([name]) => name);
|
|
68
|
-
const message = serialized.map(([name, value]) => `${name}: ${value.trim()}`).join("\n");
|
|
427
|
+
const headerNames = serialized.map(([name$1]) => name$1);
|
|
428
|
+
const message = serialized.map(([name$1, value]) => `${name$1}: ${value.trim()}`).join("\n");
|
|
69
429
|
const signature = await crypto.subtle.sign("RSASSA-PKCS1-v1_5", privateKey, new TextEncoder().encode(message));
|
|
70
430
|
const sigHeader = `keyId="${keyId.href}",algorithm="rsa-sha256",headers="${headerNames.join(" ")}",signature="${(0, byte_encodings_base64.encodeBase64)(signature)}"`;
|
|
71
431
|
headers.set("Signature", sigHeader);
|
|
@@ -255,12 +615,12 @@ const supportedHashAlgorithms = {
|
|
|
255
615
|
*/
|
|
256
616
|
async function verifyRequest(request, options = {}) {
|
|
257
617
|
const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
|
|
258
|
-
const tracer = tracerProvider.getTracer(
|
|
618
|
+
const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
|
|
259
619
|
return await tracer.startActiveSpan("http_signatures.verify", async (span) => {
|
|
260
620
|
if (span.isRecording()) {
|
|
261
621
|
span.setAttribute(__opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_METHOD, request.method);
|
|
262
622
|
span.setAttribute(__opentelemetry_semantic_conventions.ATTR_URL_FULL, request.url);
|
|
263
|
-
for (const [name, value] of request.headers) span.setAttribute((0, __opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name), value);
|
|
623
|
+
for (const [name$1, value] of request.headers) span.setAttribute((0, __opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name$1), value);
|
|
264
624
|
}
|
|
265
625
|
try {
|
|
266
626
|
let spec = options.spec;
|
|
@@ -427,7 +787,7 @@ async function verifyRequestDraft(request, span, { documentLoader, contextLoader
|
|
|
427
787
|
const { keyId, headers, signature } = sigValues;
|
|
428
788
|
span?.setAttribute("http_signatures.key_id", keyId);
|
|
429
789
|
if ("algorithm" in sigValues) span?.setAttribute("http_signatures.algorithm", sigValues.algorithm);
|
|
430
|
-
const { key, cached } = await
|
|
790
|
+
const { key, cached } = await fetchKey(new URL(keyId), __fedify_vocab.CryptographicKey, {
|
|
431
791
|
documentLoader,
|
|
432
792
|
contextLoader,
|
|
433
793
|
keyCache,
|
|
@@ -443,7 +803,7 @@ async function verifyRequestDraft(request, span, { documentLoader, contextLoader
|
|
|
443
803
|
logger.debug("Failed to verify; required headers missing in the Signature header: {headers}.", { headers });
|
|
444
804
|
return null;
|
|
445
805
|
}
|
|
446
|
-
const message = headerNames.map((name) => `${name}: ` + (name === "(request-target)" ? `${request.method.toLowerCase()} ${new URL(request.url).pathname}` : name === "(created)" ? sigValues.created ?? "" : name === "(expires)" ? sigValues.expires ?? "" : name === "host" ? request.headers.get("host") ?? new URL(request.url).host : request.headers.get(name))).join("\n");
|
|
806
|
+
const message = headerNames.map((name$1) => `${name$1}: ` + (name$1 === "(request-target)" ? `${request.method.toLowerCase()} ${new URL(request.url).pathname}` : name$1 === "(created)" ? sigValues.created ?? "" : name$1 === "(expires)" ? sigValues.expires ?? "" : name$1 === "host" ? request.headers.get("host") ?? new URL(request.url).host : request.headers.get(name$1))).join("\n");
|
|
447
807
|
const sig = (0, byte_encodings_base64.decodeBase64)(signature);
|
|
448
808
|
span?.setAttribute("http_signatures.signature", (0, byte_encodings_hex.encodeHex)(sig));
|
|
449
809
|
const verified = await crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, sig, new TextEncoder().encode(message));
|
|
@@ -620,7 +980,7 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
|
|
|
620
980
|
}
|
|
621
981
|
span?.setAttribute("http_signatures.key_id", sigInput.keyId);
|
|
622
982
|
span?.setAttribute("http_signatures.created", sigInput.created.toString());
|
|
623
|
-
const { key, cached } = await
|
|
983
|
+
const { key, cached } = await fetchKey(new URL(sigInput.keyId), __fedify_vocab.CryptographicKey, {
|
|
624
984
|
documentLoader,
|
|
625
985
|
contextLoader,
|
|
626
986
|
keyCache,
|
|
@@ -806,18 +1166,54 @@ function timingSafeEqual(a, b) {
|
|
|
806
1166
|
}
|
|
807
1167
|
|
|
808
1168
|
//#endregion
|
|
1169
|
+
Object.defineProperty(exports, 'deno_default', {
|
|
1170
|
+
enumerable: true,
|
|
1171
|
+
get: function () {
|
|
1172
|
+
return deno_default;
|
|
1173
|
+
}
|
|
1174
|
+
});
|
|
809
1175
|
Object.defineProperty(exports, 'doubleKnock', {
|
|
810
1176
|
enumerable: true,
|
|
811
1177
|
get: function () {
|
|
812
1178
|
return doubleKnock;
|
|
813
1179
|
}
|
|
814
1180
|
});
|
|
1181
|
+
Object.defineProperty(exports, 'exportJwk', {
|
|
1182
|
+
enumerable: true,
|
|
1183
|
+
get: function () {
|
|
1184
|
+
return exportJwk;
|
|
1185
|
+
}
|
|
1186
|
+
});
|
|
1187
|
+
Object.defineProperty(exports, 'fetchKey', {
|
|
1188
|
+
enumerable: true,
|
|
1189
|
+
get: function () {
|
|
1190
|
+
return fetchKey;
|
|
1191
|
+
}
|
|
1192
|
+
});
|
|
1193
|
+
Object.defineProperty(exports, 'generateCryptoKeyPair', {
|
|
1194
|
+
enumerable: true,
|
|
1195
|
+
get: function () {
|
|
1196
|
+
return generateCryptoKeyPair;
|
|
1197
|
+
}
|
|
1198
|
+
});
|
|
1199
|
+
Object.defineProperty(exports, 'importJwk', {
|
|
1200
|
+
enumerable: true,
|
|
1201
|
+
get: function () {
|
|
1202
|
+
return importJwk;
|
|
1203
|
+
}
|
|
1204
|
+
});
|
|
815
1205
|
Object.defineProperty(exports, 'signRequest', {
|
|
816
1206
|
enumerable: true,
|
|
817
1207
|
get: function () {
|
|
818
1208
|
return signRequest;
|
|
819
1209
|
}
|
|
820
1210
|
});
|
|
1211
|
+
Object.defineProperty(exports, 'validateCryptoKey', {
|
|
1212
|
+
enumerable: true,
|
|
1213
|
+
get: function () {
|
|
1214
|
+
return validateCryptoKey;
|
|
1215
|
+
}
|
|
1216
|
+
});
|
|
821
1217
|
Object.defineProperty(exports, 'verifyRequest', {
|
|
822
1218
|
enumerable: true,
|
|
823
1219
|
get: function () {
|
|
@@ -3,8 +3,9 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import {
|
|
6
|
+
import { deno_default } from "./deno-Bvf4AA-X.js";
|
|
7
7
|
import { getLogger } from "@logtape/logtape";
|
|
8
|
+
import { Activity, getTypeId } from "@fedify/vocab";
|
|
8
9
|
import { SpanKind, SpanStatusCode, context, propagation, trace } from "@opentelemetry/api";
|
|
9
10
|
|
|
10
11
|
//#region src/federation/inbox.ts
|
|
@@ -41,17 +42,34 @@ var InboxListenerSet = class InboxListenerSet {
|
|
|
41
42
|
return this.dispatchWithClass(activity)?.listener ?? null;
|
|
42
43
|
}
|
|
43
44
|
};
|
|
44
|
-
async function routeActivity({ context: ctx, json, activity, recipient, inboxListeners, inboxContextFactory, inboxErrorHandler, kv, kvPrefixes, queue, span, tracerProvider }) {
|
|
45
|
+
async function routeActivity({ context: ctx, json, activity, recipient, inboxListeners, inboxContextFactory, inboxErrorHandler, kv, kvPrefixes, queue, span, tracerProvider, idempotencyStrategy }) {
|
|
45
46
|
const logger = getLogger([
|
|
46
47
|
"fedify",
|
|
47
48
|
"federation",
|
|
48
49
|
"inbox"
|
|
49
50
|
]);
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
51
|
+
let cacheKey = null;
|
|
52
|
+
if (activity.id != null) {
|
|
53
|
+
const inboxContext = inboxContextFactory(recipient, json, activity.id?.href, getTypeId(activity).href);
|
|
54
|
+
const strategy = idempotencyStrategy ?? "per-inbox";
|
|
55
|
+
let keyString;
|
|
56
|
+
if (typeof strategy === "function") {
|
|
57
|
+
const result = await strategy(inboxContext, activity);
|
|
58
|
+
keyString = result;
|
|
59
|
+
} else switch (strategy) {
|
|
60
|
+
case "global":
|
|
61
|
+
keyString = activity.id.href;
|
|
62
|
+
break;
|
|
63
|
+
case "per-origin":
|
|
64
|
+
keyString = `${ctx.origin}\n${activity.id.href}`;
|
|
65
|
+
break;
|
|
66
|
+
case "per-inbox":
|
|
67
|
+
keyString = `${ctx.origin}\n${activity.id.href}\n${recipient == null ? "sharedInbox" : `inbox\n${recipient}`}`;
|
|
68
|
+
break;
|
|
69
|
+
default: keyString = `${ctx.origin}\n${activity.id.href}`;
|
|
70
|
+
}
|
|
71
|
+
if (keyString != null) cacheKey = [...kvPrefixes.activityIdempotence, keyString];
|
|
72
|
+
}
|
|
55
73
|
if (cacheKey != null) {
|
|
56
74
|
const cached = await kv.get(cacheKey);
|
|
57
75
|
if (cached === true) {
|
|
@@ -3,9 +3,10 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import {
|
|
7
|
-
import { isActor } from "./actor-DVpsNXhn.js";
|
|
6
|
+
import { deno_default } from "./deno-Bvf4AA-X.js";
|
|
8
7
|
import { getLogger } from "@logtape/logtape";
|
|
8
|
+
import { CryptographicKey, Object as Object$1, isActor } from "@fedify/vocab";
|
|
9
|
+
import { getDocumentLoader } from "@fedify/vocab-runtime";
|
|
9
10
|
import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
|
|
10
11
|
|
|
11
12
|
//#region src/sig/key.ts
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey } from "
|
|
6
|
+
import { CryptographicKey, Multikey } from "@fedify/vocab";
|
|
7
7
|
|
|
8
8
|
//#region src/federation/keycache.ts
|
|
9
9
|
var KvKeyCache = class {
|
|
@@ -3,7 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { CryptographicKey, Multikey
|
|
6
|
+
import { CryptographicKey, Multikey } from "@fedify/vocab";
|
|
7
|
+
import { importSpki } from "@fedify/vocab-runtime";
|
|
7
8
|
|
|
8
9
|
//#region src/testing/keys.ts
|
|
9
10
|
const rsaPublicKey1 = new CryptographicKey({
|
|
@@ -16,6 +16,21 @@ interface KvStoreSetOptions {
|
|
|
16
16
|
*/
|
|
17
17
|
ttl?: Temporal.Duration;
|
|
18
18
|
}
|
|
19
|
+
/**
|
|
20
|
+
* An entry returned by the {@link KvStore.list} method.
|
|
21
|
+
*
|
|
22
|
+
* @since 1.10.0
|
|
23
|
+
*/
|
|
24
|
+
interface KvStoreListEntry {
|
|
25
|
+
/**
|
|
26
|
+
* The key of the entry.
|
|
27
|
+
*/
|
|
28
|
+
readonly key: KvKey;
|
|
29
|
+
/**
|
|
30
|
+
* The value of the entry.
|
|
31
|
+
*/
|
|
32
|
+
readonly value: unknown;
|
|
33
|
+
}
|
|
19
34
|
/**
|
|
20
35
|
* An abstract interface for a key–value store.
|
|
21
36
|
*
|
|
@@ -51,6 +66,16 @@ interface KvStore {
|
|
|
51
66
|
* @since 1.8.0
|
|
52
67
|
*/
|
|
53
68
|
cas?: (key: KvKey, expectedValue: unknown, newValue: unknown, options?: KvStoreSetOptions) => Promise<boolean>;
|
|
69
|
+
/**
|
|
70
|
+
* Lists all entries in the store that match the given prefix.
|
|
71
|
+
* If no prefix is given, all entries are returned.
|
|
72
|
+
* @param prefix The prefix to filter keys by. If not specified, all entries
|
|
73
|
+
* are returned.
|
|
74
|
+
* @returns An async iterable of entries matching the prefix.
|
|
75
|
+
* @since 1.10.0
|
|
76
|
+
* @since 2.0.0 This method is now required instead of optional.
|
|
77
|
+
*/
|
|
78
|
+
list(prefix?: KvKey): AsyncIterable<KvStoreListEntry>;
|
|
54
79
|
}
|
|
55
80
|
/**
|
|
56
81
|
* A key–value store that stores values in memory.
|
|
@@ -76,6 +101,10 @@ declare class MemoryKvStore implements KvStore {
|
|
|
76
101
|
* {@inheritDoc KvStore.cas}
|
|
77
102
|
*/
|
|
78
103
|
cas(key: KvKey, expectedValue: unknown, newValue: unknown, options?: KvStoreSetOptions): Promise<boolean>;
|
|
104
|
+
/**
|
|
105
|
+
* {@inheritDoc KvStore.list}
|
|
106
|
+
*/
|
|
107
|
+
list(prefix?: KvKey): AsyncIterable<KvStoreListEntry>;
|
|
79
108
|
}
|
|
80
109
|
//#endregion
|
|
81
|
-
export { KvKey, KvStore, KvStoreSetOptions, MemoryKvStore };
|
|
110
|
+
export { KvKey, KvStore, KvStoreListEntry, KvStoreSetOptions, MemoryKvStore };
|