@fedify/fedify 2.0.0-dev.1690 → 2.0.0-dev.170

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (317) hide show
  1. package/LICENSE +1 -1
  2. package/README.md +70 -34
  3. package/dist/{assert_rejects-DiIiJbZn.js → assert_rejects-Ce45JcFg.js} +1 -1
  4. package/dist/{assert_is_error-BPGph1Jx.js → assert_throws-BNXdRGWP.js} +31 -1
  5. package/dist/{builder-CYOcDUkj.js → builder-_MVsWtsS.js} +9 -8
  6. package/dist/{client-bgSdkFa2.d.ts → client-CUTUGgvJ.d.ts} +19 -19
  7. package/dist/{client-CnOdwLLN.js → client-Dg7OfUDA.js} +28 -23
  8. package/dist/{client-CegPX0Rn.d.cts → client-by-PEGAJ.d.cts} +19 -19
  9. package/dist/compat/mod.cjs +1 -1
  10. package/dist/compat/mod.d.cts +6 -12
  11. package/dist/compat/mod.d.ts +6 -12
  12. package/dist/compat/mod.js +1 -1
  13. package/dist/compat/transformers.test.js +19 -18
  14. package/dist/context-Bns6uTJq.js +109 -0
  15. package/dist/{context-ByZprN0S.d.ts → context-C7vzWilY.d.ts} +314 -182
  16. package/dist/{context-C5BsZkDr.d.cts → context-CrB9RFy5.d.cts} +314 -182
  17. package/dist/deno-DhWON59o.js +117 -0
  18. package/dist/{testing-BWNCAbL-.js → dist-B5f6a8Tt.js} +90 -111
  19. package/dist/{authdocloader-Brax1A32.js → docloader-Cni79dmb.js} +17 -8
  20. package/dist/{esm-DnIzfEj0.js → esm-DGl7uK1r.js} +32 -17
  21. package/dist/federation/builder.test.js +11 -11
  22. package/dist/federation/collection.test.js +5 -8
  23. package/dist/federation/handler.test.js +111 -24
  24. package/dist/federation/idempotency.test.js +24 -24
  25. package/dist/federation/inbox.test.js +5 -6
  26. package/dist/federation/keycache.test.js +4 -5
  27. package/dist/federation/kv.test.js +60 -9
  28. package/dist/federation/middleware.test.js +102 -101
  29. package/dist/federation/mod.cjs +8 -12
  30. package/dist/federation/mod.d.cts +7 -13
  31. package/dist/federation/mod.d.ts +7 -13
  32. package/dist/federation/mod.js +8 -13
  33. package/dist/federation/mq.test.js +9 -10
  34. package/dist/federation/negotiation.test.js +5 -8
  35. package/dist/federation/retry.test.js +2 -4
  36. package/dist/federation/router.test.js +6 -8
  37. package/dist/federation/send.test.js +55 -15
  38. package/dist/{webfinger/handler.test.js → federation/webfinger.test.js} +25 -24
  39. package/dist/{federation-H2_En3j5.cjs → federation-B431K2gm.cjs} +22 -0
  40. package/dist/{federation-D1U8YY9t.js → federation-BbZwNNWj.js} +28 -6
  41. package/dist/{http-C7vbQwbz.cjs → http-7RQPvAkX.cjs} +410 -14
  42. package/dist/{http-BxbM8sEy.js → http-CZXlv4xU.js} +371 -11
  43. package/dist/{http-D-e6AFwR.d.cts → http-ClB3pLcL.d.cts} +2 -2
  44. package/dist/{http-BNOYnVsU.js → http-CwsBL5_A.js} +3 -2
  45. package/dist/{http-D6Uj2x2y.d.ts → http-DLBDPal9.d.ts} +2 -2
  46. package/dist/{inbox-BRru9pX3.js → inbox-CukSCwad.js} +2 -1
  47. package/dist/{key-1KXru8Ug.js → key-DKkHKzvg.js} +3 -2
  48. package/dist/{keycache-CN61iGVj.js → keycache-DRxpZ5r9.js} +1 -1
  49. package/dist/{keys-BPdFKgiy.js → keys-ZbcByPg9.js} +2 -1
  50. package/dist/{kv-63Cil1MD.d.cts → kv-B4vFhIYL.d.cts} +30 -1
  51. package/dist/{kv-C7sopW2E.d.ts → kv-CYySNrsn.d.ts} +30 -1
  52. package/dist/{kv-CRZrzyXm.js → kv-QzKcOQgP.js} +22 -0
  53. package/dist/kv-cache-BEeqyGER.js +107 -0
  54. package/dist/kv-cache-BVA7CrnS.cjs +134 -0
  55. package/dist/kv-cache-HDuc4ZaJ.js +122 -0
  56. package/dist/{ld-Dv8DNNAT.js → ld-CM6OO5ar.js} +4 -2
  57. package/dist/middleware--i9t8nKh.js +26 -0
  58. package/dist/middleware-C567nJlD.cjs +12 -0
  59. package/dist/middleware-D9oWuacw.js +12 -0
  60. package/dist/{middleware-DY9B2lL8.js → middleware-DXRcwk_y.js} +185 -192
  61. package/dist/{middleware-BmoOlgc1.cjs → middleware-TufpQUzj.cjs} +251 -241
  62. package/dist/{middleware-Bz_A2jeJ.js → middleware-eDeNdyRA.js} +195 -191
  63. package/dist/mod-0p9zUdzg.d.cts +107 -0
  64. package/dist/mod-0qnPv4EC.d.cts +62 -0
  65. package/dist/{mod-Djzcw2ry.d.cts → mod-BrS8tiad.d.cts} +3 -3
  66. package/dist/mod-C3SOvTD1.d.ts +64 -0
  67. package/dist/{mod-8DMWKtQE.d.cts → mod-D6pS5_xJ.d.cts} +4 -4
  68. package/dist/{mod-BhUKmBJD.d.ts → mod-jOa7W503.d.ts} +3 -3
  69. package/dist/{mod-D6hQoxC5.d.ts → mod-waqu-BL_.d.ts} +4 -4
  70. package/dist/mod-xc20HhMD.d.ts +109 -0
  71. package/dist/mod.cjs +17 -112
  72. package/dist/mod.d.cts +11 -17
  73. package/dist/mod.d.ts +11 -17
  74. package/dist/mod.js +11 -17
  75. package/dist/nodeinfo/client.test.js +7 -10
  76. package/dist/nodeinfo/handler.test.js +23 -23
  77. package/dist/nodeinfo/mod.cjs +2 -3
  78. package/dist/nodeinfo/mod.d.cts +2 -4
  79. package/dist/nodeinfo/mod.d.ts +2 -4
  80. package/dist/nodeinfo/mod.js +2 -3
  81. package/dist/nodeinfo/types.test.js +6 -9
  82. package/dist/otel/exporter.test.js +893 -0
  83. package/dist/otel/mod.cjs +256 -0
  84. package/dist/otel/mod.d.cts +230 -0
  85. package/dist/otel/mod.d.ts +232 -0
  86. package/dist/otel/mod.js +255 -0
  87. package/dist/{owner-e3FYDhsk.js → owner-BOEfZQv2.js} +45 -8
  88. package/dist/{owner-hd9lvQcP.d.ts → owner-BgI8C-VY.d.ts} +2 -3
  89. package/dist/{owner-BN_tO3cY.d.cts → owner-C-zfmVAD.d.cts} +2 -3
  90. package/dist/{proof-B-eqv0Ug.cjs → proof-CaDQpGJD.cjs} +69 -33
  91. package/dist/{proof-DfgvA3al.js → proof-iYIDiv8I.js} +47 -11
  92. package/dist/{proof-6gFMwMNJ.js → proof-iw6KtIyj.js} +3 -2
  93. package/dist/router-D9eI0s4b.js +118 -0
  94. package/dist/{send-Tl9NOnmO.js → send-Bn8o0mjW.js} +9 -4
  95. package/dist/sig/http.test.js +11 -13
  96. package/dist/sig/key.test.js +9 -11
  97. package/dist/sig/ld.test.js +8 -10
  98. package/dist/sig/mod.cjs +7 -11
  99. package/dist/sig/mod.d.cts +3 -7
  100. package/dist/sig/mod.d.ts +3 -7
  101. package/dist/sig/mod.js +3 -7
  102. package/dist/sig/owner.test.js +33 -12
  103. package/dist/sig/proof.test.js +13 -14
  104. package/dist/testing/mod.d.ts +183 -7194
  105. package/dist/testing/mod.js +4 -4
  106. package/dist/{transformers-CoBS-oFG.cjs → transformers-BjBg6Lag.cjs} +2 -2
  107. package/dist/{transformers-BFT6d7J5.js → transformers-N_ip_y4P.js} +2 -2
  108. package/dist/{types-DqxyTxOf.js → types-8l28uC8o.js} +31 -26
  109. package/dist/{types-zqdWZh4O.cjs → types-B6z6CqIz.cjs} +33 -28
  110. package/dist/{types-BSuWJsOm.js → types-CPz01LGH.js} +3 -3
  111. package/dist/{runtime/authdocloader.test.js → utils/docloader.test.js} +13 -15
  112. package/dist/utils/kv-cache.test.js +211 -0
  113. package/dist/utils/mod.cjs +10 -0
  114. package/dist/utils/mod.d.cts +4 -0
  115. package/dist/utils/mod.d.ts +6 -0
  116. package/dist/utils/mod.js +9 -0
  117. package/package.json +34 -75
  118. package/dist/actor-Be0ThtXy.cjs +0 -42609
  119. package/dist/actor-ChbPLm6n.js +0 -42135
  120. package/dist/actor-D6K058Tb.d.cts +0 -128
  121. package/dist/actor-DuCeRiNh.js +0 -146
  122. package/dist/actor-T6RyhRgk.d.ts +0 -130
  123. package/dist/assert_throws-BOO88avQ.js +0 -39
  124. package/dist/authdocloader-CrxhFL8e.js +0 -52
  125. package/dist/authdocloader-OSn_teLV.cjs +0 -58
  126. package/dist/denokv-Bv33Xxea.js +0 -57
  127. package/dist/docloader-CCqXeagZ.cjs +0 -4861
  128. package/dist/docloader-CxWcuWqQ.d.ts +0 -221
  129. package/dist/docloader-D-MrRyHl.d.cts +0 -219
  130. package/dist/docloader-XK3y2jn5.js +0 -4795
  131. package/dist/fixtures/activitypub.academy/users/brauca_darradiul.json +0 -83
  132. package/dist/fixtures/example.com/announce.json +0 -6
  133. package/dist/fixtures/example.com/collection.json +0 -19
  134. package/dist/fixtures/example.com/create.json +0 -6
  135. package/dist/fixtures/example.com/cross-origin-actor.json +0 -6
  136. package/dist/fixtures/example.com/hong-gildong.json +0 -11
  137. package/dist/fixtures/example.com/invite.json +0 -7
  138. package/dist/fixtures/example.com/key.json +0 -7
  139. package/dist/fixtures/example.com/key2.json +0 -6
  140. package/dist/fixtures/example.com/object.json +0 -6
  141. package/dist/fixtures/example.com/orderedcollectionpage.json +0 -24
  142. package/dist/fixtures/example.com/paged/a.json +0 -13
  143. package/dist/fixtures/example.com/paged/b.json +0 -16
  144. package/dist/fixtures/example.com/paged-collection.json +0 -6
  145. package/dist/fixtures/example.com/person.json +0 -22
  146. package/dist/fixtures/example.com/person2.json +0 -40
  147. package/dist/fixtures/example.com/test.json +0 -5
  148. package/dist/fixtures/example.com/users/handle.json +0 -16
  149. package/dist/fixtures/example.com/wrong-type.json +0 -3
  150. package/dist/fixtures/media.example.com/avatars/test-avatar.jpg.json +0 -6
  151. package/dist/fixtures/oeee.cafe/ap/users/3609fd4e-d51d-4db8-9f04-4189815864dd.json +0 -24
  152. package/dist/fixtures/remote.domain/users/bob.json +0 -20
  153. package/dist/fixtures/server.example/users/alice.json +0 -20
  154. package/dist/fixtures/w3id.org/identity/v1.json +0 -152
  155. package/dist/fixtures/w3id.org/security/data-integrity/v1.json +0 -74
  156. package/dist/fixtures/w3id.org/security/multikey/v1.json +0 -35
  157. package/dist/fixtures/w3id.org/security/v1.json +0 -50
  158. package/dist/fixtures/wizard.casa/users/hongminhee.json +0 -69
  159. package/dist/fixtures/www.w3.org/ns/activitystreams.json +0 -379
  160. package/dist/fixtures/www.w3.org/ns/did/v1.json +0 -58
  161. package/dist/key-B3uag-rz.js +0 -10
  162. package/dist/key-BiBmb1Yy.cjs +0 -10
  163. package/dist/key-DK_nfU4I.js +0 -10
  164. package/dist/key-Z6ceKnZC.cjs +0 -290
  165. package/dist/key-jyNTxCvK.js +0 -260
  166. package/dist/lookup-BPviO8ij.js +0 -131
  167. package/dist/lookup-hnMAAU5r.cjs +0 -137
  168. package/dist/lookup-pV0JOsuV.js +0 -331
  169. package/dist/middleware-CI0-zw4U.js +0 -26
  170. package/dist/middleware-QNK-W-jE.cjs +0 -17
  171. package/dist/middleware-_vjt6FWU.js +0 -17
  172. package/dist/mod-CerN_Sza.d.ts +0 -104
  173. package/dist/mod-Cj1tHXBR.d.cts +0 -102
  174. package/dist/mod-CxkWO3Mg.d.cts +0 -307
  175. package/dist/mod-DBzN0aCM.d.ts +0 -115
  176. package/dist/mod-DlU8ISoa.d.ts +0 -309
  177. package/dist/mod-FZd39qVq.d.cts +0 -1
  178. package/dist/mod-g0xFzAP9.d.ts +0 -2
  179. package/dist/mod-jQ4OODsl.d.cts +0 -113
  180. package/dist/mq-B7R1Q-M5.d.cts +0 -140
  181. package/dist/mq-CRGm1e_F.d.ts +0 -143
  182. package/dist/runtime/docloader.test.js +0 -522
  183. package/dist/runtime/key.test.js +0 -103
  184. package/dist/runtime/langstr.test.d.ts +0 -3
  185. package/dist/runtime/langstr.test.js +0 -39
  186. package/dist/runtime/link.test.d.ts +0 -3
  187. package/dist/runtime/link.test.js +0 -61
  188. package/dist/runtime/mod.cjs +0 -25
  189. package/dist/runtime/mod.d.cts +0 -6
  190. package/dist/runtime/mod.d.ts +0 -8
  191. package/dist/runtime/mod.js +0 -13
  192. package/dist/runtime/multibase/multibase.test.d.ts +0 -3
  193. package/dist/runtime/multibase/multibase.test.js +0 -358
  194. package/dist/runtime/url.test.d.ts +0 -3
  195. package/dist/runtime/url.test.js +0 -45
  196. package/dist/src/vocab/accept.yaml +0 -15
  197. package/dist/src/vocab/activity.yaml +0 -98
  198. package/dist/src/vocab/add.yaml +0 -16
  199. package/dist/src/vocab/announce.yaml +0 -30
  200. package/dist/src/vocab/application.yaml +0 -324
  201. package/dist/src/vocab/arrive.yaml +0 -15
  202. package/dist/src/vocab/article.yaml +0 -46
  203. package/dist/src/vocab/audio.yaml +0 -11
  204. package/dist/src/vocab/block.yaml +0 -16
  205. package/dist/src/vocab/chatmessage.yaml +0 -50
  206. package/dist/src/vocab/collection.yaml +0 -154
  207. package/dist/src/vocab/collectionpage.yaml +0 -55
  208. package/dist/src/vocab/create.yaml +0 -28
  209. package/dist/src/vocab/dataintegrityproof.yaml +0 -56
  210. package/dist/src/vocab/delete.yaml +0 -27
  211. package/dist/src/vocab/didservice.yaml +0 -22
  212. package/dist/src/vocab/dislike.yaml +0 -14
  213. package/dist/src/vocab/document.yaml +0 -31
  214. package/dist/src/vocab/emoji.yaml +0 -12
  215. package/dist/src/vocab/emojireact.yaml +0 -17
  216. package/dist/src/vocab/endpoints.yaml +0 -85
  217. package/dist/src/vocab/event.yaml +0 -11
  218. package/dist/src/vocab/export.yaml +0 -9
  219. package/dist/src/vocab/flag.yaml +0 -15
  220. package/dist/src/vocab/follow.yaml +0 -19
  221. package/dist/src/vocab/group.yaml +0 -324
  222. package/dist/src/vocab/hashtag.yaml +0 -14
  223. package/dist/src/vocab/ignore.yaml +0 -14
  224. package/dist/src/vocab/image.yaml +0 -9
  225. package/dist/src/vocab/intransitiveactivity.yaml +0 -15
  226. package/dist/src/vocab/invite.yaml +0 -14
  227. package/dist/src/vocab/join.yaml +0 -14
  228. package/dist/src/vocab/key.yaml +0 -28
  229. package/dist/src/vocab/leave.yaml +0 -14
  230. package/dist/src/vocab/like.yaml +0 -16
  231. package/dist/src/vocab/link.yaml +0 -101
  232. package/dist/src/vocab/listen.yaml +0 -12
  233. package/dist/src/vocab/mention.yaml +0 -9
  234. package/dist/src/vocab/move.yaml +0 -15
  235. package/dist/src/vocab/multikey.yaml +0 -36
  236. package/dist/src/vocab/note.yaml +0 -48
  237. package/dist/src/vocab/object.yaml +0 -404
  238. package/dist/src/vocab/offer.yaml +0 -15
  239. package/dist/src/vocab/orderedcollection.yaml +0 -39
  240. package/dist/src/vocab/orderedcollectionpage.yaml +0 -50
  241. package/dist/src/vocab/organization.yaml +0 -324
  242. package/dist/src/vocab/page.yaml +0 -11
  243. package/dist/src/vocab/person.yaml +0 -324
  244. package/dist/src/vocab/place.yaml +0 -75
  245. package/dist/src/vocab/profile.yaml +0 -26
  246. package/dist/src/vocab/propertyvalue.yaml +0 -32
  247. package/dist/src/vocab/question.yaml +0 -103
  248. package/dist/src/vocab/read.yaml +0 -13
  249. package/dist/src/vocab/reject.yaml +0 -14
  250. package/dist/src/vocab/relationship.yaml +0 -52
  251. package/dist/src/vocab/remove.yaml +0 -14
  252. package/dist/src/vocab/service.yaml +0 -324
  253. package/dist/src/vocab/source.yaml +0 -26
  254. package/dist/src/vocab/tentativeaccept.yaml +0 -14
  255. package/dist/src/vocab/tentativereject.yaml +0 -14
  256. package/dist/src/vocab/tombstone.yaml +0 -24
  257. package/dist/src/vocab/travel.yaml +0 -16
  258. package/dist/src/vocab/undo.yaml +0 -26
  259. package/dist/src/vocab/update.yaml +0 -58
  260. package/dist/src/vocab/video.yaml +0 -11
  261. package/dist/src/vocab/view.yaml +0 -13
  262. package/dist/testing/docloader.test.js +0 -24
  263. package/dist/type-C69ZBu7f.js +0 -47010
  264. package/dist/vocab/actor.test.d.ts +0 -3
  265. package/dist/vocab/actor.test.js +0 -5965
  266. package/dist/vocab/lookup.test.d.ts +0 -3
  267. package/dist/vocab/lookup.test.js +0 -456
  268. package/dist/vocab/mod.cjs +0 -87
  269. package/dist/vocab/mod.d.cts +0 -6
  270. package/dist/vocab/mod.d.ts +0 -8
  271. package/dist/vocab/mod.js +0 -10
  272. package/dist/vocab/schema.yaml +0 -247
  273. package/dist/vocab/type.test.d.ts +0 -3
  274. package/dist/vocab/type.test.js +0 -25
  275. package/dist/vocab/vocab.test.d.ts +0 -3
  276. package/dist/vocab/vocab.test.js +0 -3787
  277. package/dist/vocab-B39-pFl9.cjs +0 -291
  278. package/dist/vocab-BI0Ak5lL.d.ts +0 -14924
  279. package/dist/vocab-BWoeZsME.js +0 -255
  280. package/dist/vocab-Dw1-yVGg.d.cts +0 -14922
  281. package/dist/webfinger/handler.test.d.ts +0 -3
  282. package/dist/webfinger/lookup.test.d.ts +0 -3
  283. package/dist/webfinger/lookup.test.js +0 -195
  284. package/dist/webfinger/mod.cjs +0 -9
  285. package/dist/webfinger/mod.d.cts +0 -4
  286. package/dist/webfinger/mod.d.ts +0 -6
  287. package/dist/webfinger/mod.js +0 -9
  288. package/dist/webfinger-BjOEdFPs.cjs +0 -4
  289. package/dist/webfinger-De_bU0iE.js +0 -4
  290. package/dist/x/cfworkers.cjs +0 -100
  291. package/dist/x/cfworkers.d.cts +0 -59
  292. package/dist/x/cfworkers.d.ts +0 -61
  293. package/dist/x/cfworkers.js +0 -98
  294. package/dist/x/cfworkers.test.d.ts +0 -3
  295. package/dist/x/cfworkers.test.js +0 -179
  296. package/dist/x/hono.cjs +0 -61
  297. package/dist/x/hono.d.cts +0 -54
  298. package/dist/x/hono.d.ts +0 -56
  299. package/dist/x/hono.js +0 -60
  300. package/dist/x/sveltekit.cjs +0 -69
  301. package/dist/x/sveltekit.d.cts +0 -46
  302. package/dist/x/sveltekit.d.ts +0 -48
  303. package/dist/x/sveltekit.js +0 -68
  304. /package/dist/{assert_not_equals-f3m3epl3.js → assert_not_equals-C80BG-_5.js} +0 -0
  305. /package/dist/{runtime/authdocloader.test.d.ts → federation/webfinger.test.d.ts} +0 -0
  306. /package/dist/{mod-1pDWKvUL.d.ts → mod-1E3W847c.d.ts} +0 -0
  307. /package/dist/{mod-C2tOeRkN.d.cts → mod-C81L6_lQ.d.cts} +0 -0
  308. /package/dist/{nodeinfo-DfycQ8Wf.js → nodeinfo-BlLsRSiT.js} +0 -0
  309. /package/dist/{nodeinfo-Co9lJrWl.cjs → nodeinfo-DuMYTpbZ.cjs} +0 -0
  310. /package/dist/{runtime/docloader.test.d.ts → otel/exporter.test.d.ts} +0 -0
  311. /package/dist/{runtime-DPYEDf-o.js → sig-CwuONEzF.js} +0 -0
  312. /package/dist/{runtime-C58AJWSv.cjs → sig-DeXX2xnj.cjs} +0 -0
  313. /package/dist/{std__assert-X-_kMxKM.js → std__assert-DWivtrGR.js} +0 -0
  314. /package/dist/{testing → utils}/docloader.test.d.ts +0 -0
  315. /package/dist/{runtime/key.test.d.ts → utils/kv-cache.test.d.ts} +0 -0
  316. /package/dist/{sig-ByHXzqUi.cjs → utils-Db0ZmjcD.cjs} +0 -0
  317. /package/dist/{sig-Cj3tk-ig.js → utils-Wranxuoe.js} +0 -0
@@ -1,290 +0,0 @@
1
-
2
- const { Temporal } = require("@js-temporal/polyfill");
3
- const { URLPattern } = require("urlpattern-polyfill");
4
-
5
- const require_chunk = require('./chunk-DqRYRqnO.cjs');
6
- const require_docloader = require('./docloader-CCqXeagZ.cjs');
7
- const require_actor = require('./actor-Be0ThtXy.cjs');
8
- const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
9
- const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
10
-
11
- //#region src/sig/key.ts
12
- /**
13
- * Checks if the given key is valid and supported. No-op if the key is valid,
14
- * otherwise throws an error.
15
- * @param key The key to check.
16
- * @param type Which type of key to check. If not specified, the key can be
17
- * either public or private.
18
- * @throws {TypeError} If the key is invalid or unsupported.
19
- */
20
- function validateCryptoKey(key, type) {
21
- if (type != null && key.type !== type) throw new TypeError(`The key is not a ${type} key.`);
22
- if (!key.extractable) throw new TypeError("The key is not extractable.");
23
- if (key.algorithm.name !== "RSASSA-PKCS1-v1_5" && key.algorithm.name !== "Ed25519") throw new TypeError("Currently only RSASSA-PKCS1-v1_5 and Ed25519 keys are supported. More algorithms will be added in the future!");
24
- if (key.algorithm.name === "RSASSA-PKCS1-v1_5") {
25
- const algorithm = key.algorithm;
26
- if (algorithm.hash.name !== "SHA-256") throw new TypeError("For compatibility with the existing Fediverse software (e.g., Mastodon), hash algorithm for RSASSA-PKCS1-v1_5 keys must be SHA-256.");
27
- }
28
- }
29
- /**
30
- * Generates a key pair which is appropriate for Fedify.
31
- * @param algorithm The algorithm to use. Currently only RSASSA-PKCS1-v1_5 and
32
- * Ed25519 are supported.
33
- * @returns The generated key pair.
34
- * @throws {TypeError} If the algorithm is unsupported.
35
- */
36
- function generateCryptoKeyPair(algorithm) {
37
- if (algorithm == null) (0, __logtape_logtape.getLogger)([
38
- "fedify",
39
- "sig",
40
- "key"
41
- ]).warn("No algorithm specified. Using RSASSA-PKCS1-v1_5 by default, but it is recommended to specify the algorithm explicitly as the parameter will be required in the future.");
42
- if (algorithm == null || algorithm === "RSASSA-PKCS1-v1_5") return crypto.subtle.generateKey({
43
- name: "RSASSA-PKCS1-v1_5",
44
- modulusLength: 4096,
45
- publicExponent: new Uint8Array([
46
- 1,
47
- 0,
48
- 1
49
- ]),
50
- hash: "SHA-256"
51
- }, true, ["sign", "verify"]);
52
- else if (algorithm === "Ed25519") return crypto.subtle.generateKey("Ed25519", true, ["sign", "verify"]);
53
- throw new TypeError("Unsupported algorithm: " + algorithm);
54
- }
55
- /**
56
- * Exports a key in JWK format.
57
- * @param key The key to export. Either public or private key.
58
- * @returns The exported key in JWK format. The key is suitable for
59
- * serialization and storage.
60
- * @throws {TypeError} If the key is invalid or unsupported.
61
- */
62
- async function exportJwk(key) {
63
- validateCryptoKey(key);
64
- const jwk = await crypto.subtle.exportKey("jwk", key);
65
- if (jwk.crv === "Ed25519") jwk.alg = "Ed25519";
66
- return jwk;
67
- }
68
- /**
69
- * Imports a key from JWK format.
70
- * @param jwk The key in JWK format.
71
- * @param type Which type of key to import, either `"public"` or `"private"`.
72
- * @returns The imported key.
73
- * @throws {TypeError} If the key is invalid or unsupported.
74
- */
75
- async function importJwk(jwk, type) {
76
- let key;
77
- if (jwk.kty === "RSA" && jwk.alg === "RS256") key = await crypto.subtle.importKey("jwk", jwk, {
78
- name: "RSASSA-PKCS1-v1_5",
79
- hash: "SHA-256"
80
- }, true, type === "public" ? ["verify"] : ["sign"]);
81
- else if (jwk.kty === "OKP" && jwk.crv === "Ed25519") {
82
- if (navigator?.userAgent === "Cloudflare-Workers") {
83
- jwk = { ...jwk };
84
- delete jwk.alg;
85
- }
86
- key = await crypto.subtle.importKey("jwk", jwk, "Ed25519", true, type === "public" ? ["verify"] : ["sign"]);
87
- } else throw new TypeError("Unsupported JWK format.");
88
- validateCryptoKey(key, type);
89
- return key;
90
- }
91
- /**
92
- * Fetches a {@link CryptographicKey} or {@link Multikey} from the given URL.
93
- * If the given URL contains an {@link Actor} object, it tries to find
94
- * the corresponding key in the `publicKey` or `assertionMethod` property.
95
- * @template T The type of the key to fetch. Either {@link CryptographicKey}
96
- * or {@link Multikey}.
97
- * @param keyId The URL of the key.
98
- * @param cls The class of the key to fetch. Either {@link CryptographicKey}
99
- * or {@link Multikey}.
100
- * @param options Options for fetching the key. See {@link FetchKeyOptions}.
101
- * @returns The fetched key or `null` if the key is not found.
102
- * @since 1.3.0
103
- */
104
- function fetchKey(keyId, cls, options = {}) {
105
- const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
106
- const tracer = tracerProvider.getTracer(require_docloader.deno_default.name, require_docloader.deno_default.version);
107
- keyId = typeof keyId === "string" ? new URL(keyId) : keyId;
108
- return tracer.startActiveSpan("activitypub.fetch_key", {
109
- kind: __opentelemetry_api.SpanKind.CLIENT,
110
- attributes: {
111
- "http.method": "GET",
112
- "url.full": keyId.href,
113
- "url.scheme": keyId.protocol.replace(/:$/, ""),
114
- "url.domain": keyId.hostname,
115
- "url.path": keyId.pathname,
116
- "url.query": keyId.search.replace(/^\?/, ""),
117
- "url.fragment": keyId.hash.replace(/^#/, "")
118
- }
119
- }, async (span) => {
120
- try {
121
- const result = await fetchKeyInternal(keyId, cls, options);
122
- span.setAttribute("activitypub.actor.key.cached", result.cached);
123
- return result;
124
- } catch (e) {
125
- span.setStatus({
126
- code: __opentelemetry_api.SpanStatusCode.ERROR,
127
- message: String(e)
128
- });
129
- throw e;
130
- } finally {
131
- span.end();
132
- }
133
- });
134
- }
135
- async function fetchKeyInternal(keyId, cls, { documentLoader, contextLoader, keyCache, tracerProvider } = {}) {
136
- const logger = (0, __logtape_logtape.getLogger)([
137
- "fedify",
138
- "sig",
139
- "key"
140
- ]);
141
- const cacheKey = typeof keyId === "string" ? new URL(keyId) : keyId;
142
- keyId = typeof keyId === "string" ? keyId : keyId.href;
143
- if (keyCache != null) {
144
- const cachedKey = await keyCache.get(cacheKey);
145
- if (cachedKey instanceof cls && cachedKey.publicKey != null) {
146
- logger.debug("Key {keyId} found in cache.", { keyId });
147
- return {
148
- key: cachedKey,
149
- cached: true
150
- };
151
- } else if (cachedKey === null) {
152
- logger.debug("Entry {keyId} found in cache, but it is unavailable.", { keyId });
153
- return {
154
- key: null,
155
- cached: true
156
- };
157
- }
158
- }
159
- logger.debug("Fetching key {keyId} to verify signature...", { keyId });
160
- let document;
161
- try {
162
- const remoteDocument = await (documentLoader ?? require_docloader.getDocumentLoader())(keyId);
163
- document = remoteDocument.document;
164
- } catch (_) {
165
- logger.debug("Failed to fetch key {keyId}.", { keyId });
166
- await keyCache?.set(cacheKey, null);
167
- return {
168
- key: null,
169
- cached: false
170
- };
171
- }
172
- let object;
173
- try {
174
- object = await require_actor.Object.fromJsonLd(document, {
175
- documentLoader,
176
- contextLoader,
177
- tracerProvider
178
- });
179
- } catch (e) {
180
- if (!(e instanceof TypeError)) throw e;
181
- try {
182
- object = await cls.fromJsonLd(document, {
183
- documentLoader,
184
- contextLoader,
185
- tracerProvider
186
- });
187
- } catch (e$1) {
188
- if (e$1 instanceof TypeError) {
189
- logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
190
- await keyCache?.set(cacheKey, null);
191
- return {
192
- key: null,
193
- cached: false
194
- };
195
- }
196
- throw e$1;
197
- }
198
- }
199
- let key = null;
200
- if (object instanceof cls) key = object;
201
- else if (require_actor.isActor(object)) {
202
- const keys = cls === require_actor.CryptographicKey ? object.getPublicKeys({
203
- documentLoader,
204
- contextLoader,
205
- tracerProvider
206
- }) : object.getAssertionMethods({
207
- documentLoader,
208
- contextLoader,
209
- tracerProvider
210
- });
211
- let length = 0;
212
- let lastKey = null;
213
- for await (const k of keys) {
214
- length++;
215
- lastKey = k;
216
- if (k.id?.href === keyId) {
217
- key = k;
218
- break;
219
- }
220
- }
221
- const keyIdUrl = new URL(keyId);
222
- if (key == null && keyIdUrl.hash === "" && length === 1) key = lastKey;
223
- if (key == null) {
224
- logger.debug("Failed to verify; object {keyId} returned an {actorType}, but has no key matching {keyId}.", {
225
- keyId,
226
- actorType: object.constructor.name
227
- });
228
- await keyCache?.set(cacheKey, null);
229
- return {
230
- key: null,
231
- cached: false
232
- };
233
- }
234
- } else {
235
- logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
236
- await keyCache?.set(cacheKey, null);
237
- return {
238
- key: null,
239
- cached: false
240
- };
241
- }
242
- if (key.publicKey == null) {
243
- logger.debug("Failed to verify; key {keyId} has no publicKeyPem field.", { keyId });
244
- await keyCache?.set(cacheKey, null);
245
- return {
246
- key: null,
247
- cached: false
248
- };
249
- }
250
- if (keyCache != null) {
251
- await keyCache.set(cacheKey, key);
252
- logger.debug("Key {keyId} cached.", { keyId });
253
- }
254
- return {
255
- key,
256
- cached: false
257
- };
258
- }
259
-
260
- //#endregion
261
- Object.defineProperty(exports, 'exportJwk', {
262
- enumerable: true,
263
- get: function () {
264
- return exportJwk;
265
- }
266
- });
267
- Object.defineProperty(exports, 'fetchKey', {
268
- enumerable: true,
269
- get: function () {
270
- return fetchKey;
271
- }
272
- });
273
- Object.defineProperty(exports, 'generateCryptoKeyPair', {
274
- enumerable: true,
275
- get: function () {
276
- return generateCryptoKeyPair;
277
- }
278
- });
279
- Object.defineProperty(exports, 'importJwk', {
280
- enumerable: true,
281
- get: function () {
282
- return importJwk;
283
- }
284
- });
285
- Object.defineProperty(exports, 'validateCryptoKey', {
286
- enumerable: true,
287
- get: function () {
288
- return validateCryptoKey;
289
- }
290
- });
@@ -1,260 +0,0 @@
1
-
2
- import { Temporal } from "@js-temporal/polyfill";
3
- import { URLPattern } from "urlpattern-polyfill";
4
-
5
- import { deno_default, getDocumentLoader } from "./docloader-XK3y2jn5.js";
6
- import { CryptographicKey, Object as Object$1, isActor } from "./actor-ChbPLm6n.js";
7
- import { getLogger } from "@logtape/logtape";
8
- import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
9
-
10
- //#region src/sig/key.ts
11
- /**
12
- * Checks if the given key is valid and supported. No-op if the key is valid,
13
- * otherwise throws an error.
14
- * @param key The key to check.
15
- * @param type Which type of key to check. If not specified, the key can be
16
- * either public or private.
17
- * @throws {TypeError} If the key is invalid or unsupported.
18
- */
19
- function validateCryptoKey(key, type) {
20
- if (type != null && key.type !== type) throw new TypeError(`The key is not a ${type} key.`);
21
- if (!key.extractable) throw new TypeError("The key is not extractable.");
22
- if (key.algorithm.name !== "RSASSA-PKCS1-v1_5" && key.algorithm.name !== "Ed25519") throw new TypeError("Currently only RSASSA-PKCS1-v1_5 and Ed25519 keys are supported. More algorithms will be added in the future!");
23
- if (key.algorithm.name === "RSASSA-PKCS1-v1_5") {
24
- const algorithm = key.algorithm;
25
- if (algorithm.hash.name !== "SHA-256") throw new TypeError("For compatibility with the existing Fediverse software (e.g., Mastodon), hash algorithm for RSASSA-PKCS1-v1_5 keys must be SHA-256.");
26
- }
27
- }
28
- /**
29
- * Generates a key pair which is appropriate for Fedify.
30
- * @param algorithm The algorithm to use. Currently only RSASSA-PKCS1-v1_5 and
31
- * Ed25519 are supported.
32
- * @returns The generated key pair.
33
- * @throws {TypeError} If the algorithm is unsupported.
34
- */
35
- function generateCryptoKeyPair(algorithm) {
36
- if (algorithm == null) getLogger([
37
- "fedify",
38
- "sig",
39
- "key"
40
- ]).warn("No algorithm specified. Using RSASSA-PKCS1-v1_5 by default, but it is recommended to specify the algorithm explicitly as the parameter will be required in the future.");
41
- if (algorithm == null || algorithm === "RSASSA-PKCS1-v1_5") return crypto.subtle.generateKey({
42
- name: "RSASSA-PKCS1-v1_5",
43
- modulusLength: 4096,
44
- publicExponent: new Uint8Array([
45
- 1,
46
- 0,
47
- 1
48
- ]),
49
- hash: "SHA-256"
50
- }, true, ["sign", "verify"]);
51
- else if (algorithm === "Ed25519") return crypto.subtle.generateKey("Ed25519", true, ["sign", "verify"]);
52
- throw new TypeError("Unsupported algorithm: " + algorithm);
53
- }
54
- /**
55
- * Exports a key in JWK format.
56
- * @param key The key to export. Either public or private key.
57
- * @returns The exported key in JWK format. The key is suitable for
58
- * serialization and storage.
59
- * @throws {TypeError} If the key is invalid or unsupported.
60
- */
61
- async function exportJwk(key) {
62
- validateCryptoKey(key);
63
- const jwk = await crypto.subtle.exportKey("jwk", key);
64
- if (jwk.crv === "Ed25519") jwk.alg = "Ed25519";
65
- return jwk;
66
- }
67
- /**
68
- * Imports a key from JWK format.
69
- * @param jwk The key in JWK format.
70
- * @param type Which type of key to import, either `"public"` or `"private"`.
71
- * @returns The imported key.
72
- * @throws {TypeError} If the key is invalid or unsupported.
73
- */
74
- async function importJwk(jwk, type) {
75
- let key;
76
- if (jwk.kty === "RSA" && jwk.alg === "RS256") key = await crypto.subtle.importKey("jwk", jwk, {
77
- name: "RSASSA-PKCS1-v1_5",
78
- hash: "SHA-256"
79
- }, true, type === "public" ? ["verify"] : ["sign"]);
80
- else if (jwk.kty === "OKP" && jwk.crv === "Ed25519") {
81
- if (navigator?.userAgent === "Cloudflare-Workers") {
82
- jwk = { ...jwk };
83
- delete jwk.alg;
84
- }
85
- key = await crypto.subtle.importKey("jwk", jwk, "Ed25519", true, type === "public" ? ["verify"] : ["sign"]);
86
- } else throw new TypeError("Unsupported JWK format.");
87
- validateCryptoKey(key, type);
88
- return key;
89
- }
90
- /**
91
- * Fetches a {@link CryptographicKey} or {@link Multikey} from the given URL.
92
- * If the given URL contains an {@link Actor} object, it tries to find
93
- * the corresponding key in the `publicKey` or `assertionMethod` property.
94
- * @template T The type of the key to fetch. Either {@link CryptographicKey}
95
- * or {@link Multikey}.
96
- * @param keyId The URL of the key.
97
- * @param cls The class of the key to fetch. Either {@link CryptographicKey}
98
- * or {@link Multikey}.
99
- * @param options Options for fetching the key. See {@link FetchKeyOptions}.
100
- * @returns The fetched key or `null` if the key is not found.
101
- * @since 1.3.0
102
- */
103
- function fetchKey(keyId, cls, options = {}) {
104
- const tracerProvider = options.tracerProvider ?? trace.getTracerProvider();
105
- const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
106
- keyId = typeof keyId === "string" ? new URL(keyId) : keyId;
107
- return tracer.startActiveSpan("activitypub.fetch_key", {
108
- kind: SpanKind.CLIENT,
109
- attributes: {
110
- "http.method": "GET",
111
- "url.full": keyId.href,
112
- "url.scheme": keyId.protocol.replace(/:$/, ""),
113
- "url.domain": keyId.hostname,
114
- "url.path": keyId.pathname,
115
- "url.query": keyId.search.replace(/^\?/, ""),
116
- "url.fragment": keyId.hash.replace(/^#/, "")
117
- }
118
- }, async (span) => {
119
- try {
120
- const result = await fetchKeyInternal(keyId, cls, options);
121
- span.setAttribute("activitypub.actor.key.cached", result.cached);
122
- return result;
123
- } catch (e) {
124
- span.setStatus({
125
- code: SpanStatusCode.ERROR,
126
- message: String(e)
127
- });
128
- throw e;
129
- } finally {
130
- span.end();
131
- }
132
- });
133
- }
134
- async function fetchKeyInternal(keyId, cls, { documentLoader, contextLoader, keyCache, tracerProvider } = {}) {
135
- const logger = getLogger([
136
- "fedify",
137
- "sig",
138
- "key"
139
- ]);
140
- const cacheKey = typeof keyId === "string" ? new URL(keyId) : keyId;
141
- keyId = typeof keyId === "string" ? keyId : keyId.href;
142
- if (keyCache != null) {
143
- const cachedKey = await keyCache.get(cacheKey);
144
- if (cachedKey instanceof cls && cachedKey.publicKey != null) {
145
- logger.debug("Key {keyId} found in cache.", { keyId });
146
- return {
147
- key: cachedKey,
148
- cached: true
149
- };
150
- } else if (cachedKey === null) {
151
- logger.debug("Entry {keyId} found in cache, but it is unavailable.", { keyId });
152
- return {
153
- key: null,
154
- cached: true
155
- };
156
- }
157
- }
158
- logger.debug("Fetching key {keyId} to verify signature...", { keyId });
159
- let document;
160
- try {
161
- const remoteDocument = await (documentLoader ?? getDocumentLoader())(keyId);
162
- document = remoteDocument.document;
163
- } catch (_) {
164
- logger.debug("Failed to fetch key {keyId}.", { keyId });
165
- await keyCache?.set(cacheKey, null);
166
- return {
167
- key: null,
168
- cached: false
169
- };
170
- }
171
- let object;
172
- try {
173
- object = await Object$1.fromJsonLd(document, {
174
- documentLoader,
175
- contextLoader,
176
- tracerProvider
177
- });
178
- } catch (e) {
179
- if (!(e instanceof TypeError)) throw e;
180
- try {
181
- object = await cls.fromJsonLd(document, {
182
- documentLoader,
183
- contextLoader,
184
- tracerProvider
185
- });
186
- } catch (e$1) {
187
- if (e$1 instanceof TypeError) {
188
- logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
189
- await keyCache?.set(cacheKey, null);
190
- return {
191
- key: null,
192
- cached: false
193
- };
194
- }
195
- throw e$1;
196
- }
197
- }
198
- let key = null;
199
- if (object instanceof cls) key = object;
200
- else if (isActor(object)) {
201
- const keys = cls === CryptographicKey ? object.getPublicKeys({
202
- documentLoader,
203
- contextLoader,
204
- tracerProvider
205
- }) : object.getAssertionMethods({
206
- documentLoader,
207
- contextLoader,
208
- tracerProvider
209
- });
210
- let length = 0;
211
- let lastKey = null;
212
- for await (const k of keys) {
213
- length++;
214
- lastKey = k;
215
- if (k.id?.href === keyId) {
216
- key = k;
217
- break;
218
- }
219
- }
220
- const keyIdUrl = new URL(keyId);
221
- if (key == null && keyIdUrl.hash === "" && length === 1) key = lastKey;
222
- if (key == null) {
223
- logger.debug("Failed to verify; object {keyId} returned an {actorType}, but has no key matching {keyId}.", {
224
- keyId,
225
- actorType: object.constructor.name
226
- });
227
- await keyCache?.set(cacheKey, null);
228
- return {
229
- key: null,
230
- cached: false
231
- };
232
- }
233
- } else {
234
- logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
235
- await keyCache?.set(cacheKey, null);
236
- return {
237
- key: null,
238
- cached: false
239
- };
240
- }
241
- if (key.publicKey == null) {
242
- logger.debug("Failed to verify; key {keyId} has no publicKeyPem field.", { keyId });
243
- await keyCache?.set(cacheKey, null);
244
- return {
245
- key: null,
246
- cached: false
247
- };
248
- }
249
- if (keyCache != null) {
250
- await keyCache.set(cacheKey, key);
251
- logger.debug("Key {keyId} cached.", { keyId });
252
- }
253
- return {
254
- key,
255
- cached: false
256
- };
257
- }
258
-
259
- //#endregion
260
- export { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, validateCryptoKey };
@@ -1,131 +0,0 @@
1
-
2
- import { Temporal } from "@js-temporal/polyfill";
3
- import { URLPattern } from "urlpattern-polyfill";
4
-
5
- import { UrlError, deno_default, getUserAgent, validatePublicUrl } from "./docloader-XK3y2jn5.js";
6
- import { getLogger } from "@logtape/logtape";
7
- import { SpanKind, SpanStatusCode, trace } from "@opentelemetry/api";
8
-
9
- //#region src/webfinger/lookup.ts
10
- const logger = getLogger([
11
- "fedify",
12
- "webfinger",
13
- "lookup"
14
- ]);
15
- const DEFAULT_MAX_REDIRECTION = 5;
16
- /**
17
- * Looks up a WebFinger resource.
18
- * @param resource The resource URL to look up.
19
- * @param options Extra options for looking up the resource.
20
- * @returns The resource descriptor, or `null` if not found.
21
- * @since 0.2.0
22
- */
23
- async function lookupWebFinger(resource, options = {}) {
24
- const tracerProvider = options.tracerProvider ?? trace.getTracerProvider();
25
- const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
26
- return await tracer.startActiveSpan("webfinger.lookup", {
27
- kind: SpanKind.CLIENT,
28
- attributes: {
29
- "webfinger.resource": resource.toString(),
30
- "webfinger.resource.scheme": typeof resource === "string" ? resource.replace(/:.*$/, "") : resource.protocol.replace(/:$/, "")
31
- }
32
- }, async (span) => {
33
- try {
34
- const result = await lookupWebFingerInternal(resource, options);
35
- span.setStatus({ code: result === null ? SpanStatusCode.ERROR : SpanStatusCode.OK });
36
- return result;
37
- } catch (error) {
38
- span.setStatus({
39
- code: SpanStatusCode.ERROR,
40
- message: String(error)
41
- });
42
- throw error;
43
- } finally {
44
- span.end();
45
- }
46
- });
47
- }
48
- async function lookupWebFingerInternal(resource, options = {}) {
49
- if (typeof resource === "string") resource = new URL(resource);
50
- let protocol = "https:";
51
- let server;
52
- if (resource.protocol === "acct:") {
53
- const atPos = resource.pathname.lastIndexOf("@");
54
- if (atPos < 0) return null;
55
- server = resource.pathname.substring(atPos + 1);
56
- if (server === "") return null;
57
- } else {
58
- protocol = resource.protocol;
59
- server = resource.host;
60
- }
61
- let url = new URL(`${protocol}//${server}/.well-known/webfinger`);
62
- url.searchParams.set("resource", resource.href);
63
- let redirected = 0;
64
- while (true) {
65
- logger.debug("Fetching WebFinger resource descriptor from {url}...", { url: url.href });
66
- let response;
67
- if (options.allowPrivateAddress !== true) try {
68
- await validatePublicUrl(url.href);
69
- } catch (e) {
70
- if (e instanceof UrlError) {
71
- logger.error("Invalid URL for WebFinger resource descriptor: {error}", { error: e });
72
- return null;
73
- }
74
- throw e;
75
- }
76
- try {
77
- response = await fetch(url, {
78
- headers: {
79
- Accept: "application/jrd+json",
80
- "User-Agent": typeof options.userAgent === "string" ? options.userAgent : getUserAgent(options.userAgent)
81
- },
82
- redirect: "manual",
83
- signal: options.signal
84
- });
85
- } catch (error) {
86
- logger.debug("Failed to fetch WebFinger resource descriptor: {error}", {
87
- url: url.href,
88
- error
89
- });
90
- return null;
91
- }
92
- if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
93
- redirected++;
94
- const maxRedirection = options.maxRedirection ?? DEFAULT_MAX_REDIRECTION;
95
- if (redirected >= maxRedirection) {
96
- logger.error("Too many redirections ({redirections}) while fetching WebFinger resource descriptor.", { redirections: redirected });
97
- return null;
98
- }
99
- const redirectedUrl = new URL(response.headers.get("Location"), response.url == null || response.url === "" ? url : response.url);
100
- if (redirectedUrl.protocol !== url.protocol) {
101
- logger.error("Redirected to a different protocol ({protocol} to {redirectedProtocol}) while fetching WebFinger resource descriptor.", {
102
- protocol: url.protocol,
103
- redirectedProtocol: redirectedUrl.protocol
104
- });
105
- return null;
106
- }
107
- url = redirectedUrl;
108
- continue;
109
- }
110
- if (!response.ok) {
111
- logger.debug("Failed to fetch WebFinger resource descriptor: {status} {statusText}.", {
112
- url: url.href,
113
- status: response.status,
114
- statusText: response.statusText
115
- });
116
- return null;
117
- }
118
- try {
119
- return await response.json();
120
- } catch (e) {
121
- if (e instanceof SyntaxError) {
122
- logger.debug("Failed to parse WebFinger resource descriptor as JSON: {error}", { error: e });
123
- return null;
124
- }
125
- throw e;
126
- }
127
- }
128
- }
129
-
130
- //#endregion
131
- export { lookupWebFinger };