@fedify/fedify 2.0.0-pr.434.1662 → 2.0.0-pr.435.1667
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{actor-Dd2E4F9C.cjs → actor-C3gJhZJj.cjs} +187 -187
- package/dist/{actor-Dsla85Uq.js → actor-CnVfp1Hp.js} +187 -187
- package/dist/{actor-By5NMImS.js → actor-Cpal85xW.js} +1 -1
- package/dist/{assert_rejects-DiIiJbZn.js → assert_rejects-7UF4R_Qs.js} +1 -1
- package/dist/{assert_throws-BOO88avQ.js → assert_throws-53_pKeP3.js} +1 -1
- package/dist/{authdocloader-B28UEZlz.cjs → authdocloader-DPCGwidE.cjs} +3 -3
- package/dist/{authdocloader-CpmdBiRe.js → authdocloader-DWnwkjvZ.js} +3 -3
- package/dist/{authdocloader-lhbaj4KA.js → authdocloader-Df2BFefL.js} +3 -3
- package/dist/{builder-B6AupxqD.js → builder-CMxichO9.js} +4 -4
- package/dist/{client-KUXReLjS.js → client-BqyuOGiQ.js} +1 -1
- package/dist/compat/mod.d.cts +2 -2
- package/dist/compat/mod.d.ts +2 -2
- package/dist/compat/transformers.test.js +17 -18
- package/dist/{context-CQsAT7xk.d.ts → context-CDSZdQHD.d.ts} +1 -0
- package/dist/{context-tVOQ76fi.d.cts → context-Dq8aCtMH.d.cts} +1 -0
- package/dist/{docloader-NJZ5ADV3.cjs → docloader-B1O1Z5OK.cjs} +2 -2
- package/dist/{docloader-ZGKS1Zy-.js → docloader-xJVzq9O0.js} +2 -2
- package/dist/{esm-CIFbziGC.js → esm-BBznxjVc.js} +1 -1
- package/dist/federation/builder.test.js +10 -10
- package/dist/federation/collection.test.js +8 -8
- package/dist/federation/handler.test.js +145 -26
- package/dist/federation/inbox.test.js +6 -6
- package/dist/federation/keycache.test.js +4 -4
- package/dist/federation/kv.test.js +8 -8
- package/dist/federation/middleware.test.js +38 -255
- package/dist/federation/mod.cjs +10 -10
- package/dist/federation/mod.d.cts +1 -1
- package/dist/federation/mod.d.ts +1 -1
- package/dist/federation/mod.js +10 -10
- package/dist/federation/mq.test.js +10 -10
- package/dist/federation/retry.test.js +5 -5
- package/dist/federation/router.test.js +8 -8
- package/dist/federation/send.test.js +15 -15
- package/dist/{http-BqSkbrGv.js → http-CovAm6we.js} +3 -3
- package/dist/{http-DH8DQz2-.cjs → http-Hw9HJp9i.cjs} +3 -3
- package/dist/{http-CCydyMoV.js → http-y7khnX5Q.js} +2 -2
- package/dist/{inbox-DH8TXk1f.js → inbox-DpcYOzs8.js} +1 -1
- package/dist/{key-cn3BcQaB.js → key-BRmlopJL.js} +2 -2
- package/dist/key-CV3FT32G.cjs +10 -0
- package/dist/{key-CYrKbGH0.cjs → key-CzF9SAEI.cjs} +2 -2
- package/dist/{key-B057bXm0.js → key-DORX19Bl.js} +2 -2
- package/dist/{key-3cqchRKs.js → key-jf6dIIF-.js} +3 -3
- package/dist/{key-HjvDY-QJ.js → key-lapZwBwG.js} +4 -4
- package/dist/{keycache-CB_VjDe0.js → keycache-AH1uj1j-.js} +1 -1
- package/dist/{keys-Dz9o2VwW.js → keys-B3fzLXBG.js} +1 -1
- package/dist/{ld-CxJe2x7_.js → ld-D3cq9xO1.js} +2 -2
- package/dist/{lookup-BZzUCUat.cjs → lookup-7u217Q3H.cjs} +1 -1
- package/dist/{lookup-q8DeFAjR.js → lookup-BrhURkmj.js} +1 -1
- package/dist/{lookup-Cc-KXO2K.js → lookup-CfU0DgLr.js} +1 -1
- package/dist/{middleware-DxS7Csvz.js → middleware-BDN7YoYJ.js} +130 -35
- package/dist/middleware-CV-OPMlZ.js +17 -0
- package/dist/middleware-DGqnaAbp.cjs +17 -0
- package/dist/{middleware-BvEwDOJ5.js → middleware-DXWUGrBQ.js} +63 -32
- package/dist/{middleware-DGvzxKjo.cjs → middleware-Gsxukxs5.cjs} +63 -32
- package/dist/middleware-cCdfTTMv.js +25 -0
- package/dist/{mod-DBQAI4v9.d.cts → mod-BhMnAkFX.d.cts} +1 -1
- package/dist/{mod-B26zRlH1.d.ts → mod-RI3-KvUI.d.ts} +1 -1
- package/dist/mod.cjs +10 -10
- package/dist/mod.d.cts +2 -2
- package/dist/mod.d.ts +2 -2
- package/dist/mod.js +10 -10
- package/dist/nodeinfo/client.test.js +10 -10
- package/dist/nodeinfo/handler.test.js +22 -23
- package/dist/nodeinfo/mod.cjs +2 -2
- package/dist/nodeinfo/mod.js +2 -2
- package/dist/nodeinfo/types.test.js +8 -8
- package/dist/{owner-jwXilm3L.js → owner-NFlQJyvM.js} +2 -2
- package/dist/{proof-BE1A6Ct1.js → proof-Be1oOYEh.js} +3 -3
- package/dist/{proof-BzKiLsN7.cjs → proof-Gip91fK7.cjs} +3 -3
- package/dist/{proof-CHi36V0T.js → proof-ar9xgPWi.js} +2 -2
- package/dist/runtime/authdocloader.test.js +14 -14
- package/dist/runtime/docloader.test.js +9 -9
- package/dist/runtime/key.test.js +10 -10
- package/dist/runtime/langstr.test.js +8 -8
- package/dist/runtime/link.test.js +3 -3
- package/dist/runtime/mod.cjs +6 -6
- package/dist/runtime/mod.js +6 -6
- package/dist/runtime/multibase/multibase.test.js +8 -8
- package/dist/runtime/url.test.js +5 -5
- package/dist/{send-CwVrwo7j.js → send-DkwkMFjJ.js} +2 -2
- package/dist/sig/http.test.js +13 -13
- package/dist/sig/key.test.js +11 -11
- package/dist/sig/ld.test.js +10 -10
- package/dist/sig/mod.cjs +6 -6
- package/dist/sig/mod.js +6 -6
- package/dist/sig/owner.test.js +12 -12
- package/dist/sig/proof.test.js +12 -12
- package/dist/testing/docloader.test.js +8 -8
- package/dist/testing/mod.js +3 -3
- package/dist/{testing-Cqwzq9nj.js → testing-BMBhkcz9.js} +2 -2
- package/dist/{type-BSR-vRXo.js → type-FCer_9yh.js} +187 -187
- package/dist/{types-XMA_ABYQ.js → types-CNWeAz8v.js} +1 -1
- package/dist/{types-zwVAf9LF.cjs → types-CZ_qo9KW.cjs} +1 -1
- package/dist/vocab/actor.test.js +10 -10
- package/dist/vocab/lookup.test.js +9 -9
- package/dist/vocab/mod.cjs +4 -4
- package/dist/vocab/mod.js +4 -4
- package/dist/vocab/type.test.js +3 -3
- package/dist/vocab/vocab.test.js +9 -9
- package/dist/{vocab-Bj8iyEkG.cjs → vocab-9MjZjuZb.cjs} +3 -3
- package/dist/{vocab-BlOQWNvd.js → vocab-gpwUU9fc.js} +3 -3
- package/dist/webfinger/handler.test.js +22 -23
- package/dist/webfinger/lookup.test.js +9 -9
- package/dist/webfinger/mod.cjs +2 -2
- package/dist/webfinger/mod.js +2 -2
- package/dist/x/cfworkers.test.js +8 -8
- package/dist/x/hono.d.cts +1 -1
- package/dist/x/hono.d.ts +1 -1
- package/dist/x/sveltekit.d.cts +1 -1
- package/dist/x/sveltekit.d.ts +1 -1
- package/package.json +1 -1
- package/dist/federation/negotiation.test.d.ts +0 -3
- package/dist/federation/negotiation.test.js +0 -28
- package/dist/key-Bom4W546.cjs +0 -10
- package/dist/middleware-B7yi4Uls.cjs +0 -17
- package/dist/middleware-DCdrZPxz.js +0 -17
- package/dist/middleware-DTjhpVrj.js +0 -26
- package/dist/negotiation-5NPJL6zp.js +0 -71
- /package/dist/{assert_is_error-BPGph1Jx.js → assert_is_error-B035L3om.js} +0 -0
- /package/dist/{assert_not_equals-f3m3epl3.js → assert_not_equals-C80BG-_5.js} +0 -0
- /package/dist/{denokv-Bv33Xxea.js → denokv-jZ0Z2h0M.js} +0 -0
- /package/dist/{retry-D4GJ670a.js → retry-CfF8Gn4d.js} +0 -0
- /package/dist/{std__assert-X-_kMxKM.js → std__assert-DWivtrGR.js} +0 -0
@@ -3,51 +3,37 @@
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
globalThis.addEventListener = () => {};
|
5
5
|
|
6
|
-
import { Activity, Announce, Create, Invite, Multikey, Note, Object as Object$1, Offer, Person, fetchDocumentLoader, getTypeId } from "../type-
|
6
|
+
import { Activity, Announce, Create, Invite, Multikey, Note, Object as Object$1, Offer, Person, fetchDocumentLoader, getTypeId } from "../type-FCer_9yh.js";
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
9
9
|
import { assertInstanceOf } from "../assert_instance_of-DHz7EHNU.js";
|
10
10
|
import { MemoryKvStore } from "../kv-CRZrzyXm.js";
|
11
|
-
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-
|
12
|
-
import "../client-
|
13
|
-
import { RouterError, lookupObject } from "../lookup-
|
11
|
+
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "../middleware-BDN7YoYJ.js";
|
12
|
+
import "../client-BqyuOGiQ.js";
|
13
|
+
import { RouterError, lookupObject } from "../lookup-BrhURkmj.js";
|
14
14
|
import "../types-BSuWJsOm.js";
|
15
|
-
import "../actor-
|
16
|
-
import "../key-
|
17
|
-
import { signRequest, verifyRequest } from "../http-
|
18
|
-
import { getAuthenticatedDocumentLoader } from "../authdocloader-
|
19
|
-
import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-
|
20
|
-
import { doesActorOwnKey } from "../owner-
|
21
|
-
import { signObject, verifyObject } from "../proof-
|
22
|
-
import "../inbox-
|
23
|
-
import "../builder-
|
15
|
+
import "../actor-Cpal85xW.js";
|
16
|
+
import "../key-DORX19Bl.js";
|
17
|
+
import { signRequest, verifyRequest } from "../http-y7khnX5Q.js";
|
18
|
+
import { getAuthenticatedDocumentLoader } from "../authdocloader-Df2BFefL.js";
|
19
|
+
import { detachSignature, signJsonLd, verifyJsonLd } from "../ld-D3cq9xO1.js";
|
20
|
+
import { doesActorOwnKey } from "../owner-NFlQJyvM.js";
|
21
|
+
import { signObject, verifyObject } from "../proof-ar9xgPWi.js";
|
22
|
+
import "../inbox-DpcYOzs8.js";
|
23
|
+
import "../builder-CMxichO9.js";
|
24
24
|
import "../collection-CcnIw1qY.js";
|
25
|
-
import "../keycache-
|
26
|
-
import "../
|
27
|
-
import "../
|
28
|
-
import "../
|
29
|
-
import {
|
30
|
-
import {
|
31
|
-
import
|
32
|
-
import "../
|
33
|
-
import {
|
34
|
-
import {
|
35
|
-
import {
|
36
|
-
import { esm_default } from "../esm-CIFbziGC.js";
|
25
|
+
import "../keycache-AH1uj1j-.js";
|
26
|
+
import "../retry-CfF8Gn4d.js";
|
27
|
+
import "../send-DkwkMFjJ.js";
|
28
|
+
import { mockDocumentLoader, test } from "../testing-BMBhkcz9.js";
|
29
|
+
import { assertStrictEquals } from "../std__assert-DWivtrGR.js";
|
30
|
+
import { assertFalse, assertRejects } from "../assert_rejects-7UF4R_Qs.js";
|
31
|
+
import "../assert_is_error-B035L3om.js";
|
32
|
+
import { assertNotEquals } from "../assert_not_equals-C80BG-_5.js";
|
33
|
+
import { assertThrows } from "../assert_throws-53_pKeP3.js";
|
34
|
+
import { ed25519Multikey, ed25519PrivateKey, ed25519PublicKey, rsaPrivateKey2, rsaPrivateKey3, rsaPublicKey2, rsaPublicKey3 } from "../keys-B3fzLXBG.js";
|
35
|
+
import { esm_default } from "../esm-BBznxjVc.js";
|
37
36
|
|
38
|
-
//#region src/testing/fixtures/example.com/create.json
|
39
|
-
var __context$2 = "https://www.w3.org/ns/activitystreams";
|
40
|
-
var type$2 = "Create";
|
41
|
-
var id$2 = "https://example.com/create";
|
42
|
-
var actor = "https://example.com/person";
|
43
|
-
var create_default = {
|
44
|
-
"@context": __context$2,
|
45
|
-
type: type$2,
|
46
|
-
id: id$2,
|
47
|
-
actor
|
48
|
-
};
|
49
|
-
|
50
|
-
//#endregion
|
51
37
|
//#region src/testing/fixtures/example.com/person.json
|
52
38
|
var __context$1 = ["https://www.w3.org/ns/activitystreams", "https://w3id.org/security/v1"];
|
53
39
|
var id$1 = "https://example.com/person";
|
@@ -694,7 +680,7 @@ test({
|
|
694
680
|
kv,
|
695
681
|
documentLoaderFactory: () => mockDocumentLoader
|
696
682
|
});
|
697
|
-
const req = new Request("https://example.com/"
|
683
|
+
const req = new Request("https://example.com/");
|
698
684
|
const ctx = federation.createContext(req, 123);
|
699
685
|
assertEquals(ctx.request, req);
|
700
686
|
assertEquals(ctx.url, new URL("https://example.com/"));
|
@@ -712,7 +698,7 @@ test({
|
|
712
698
|
assertEquals(await ctx.getSignedKey(), null);
|
713
699
|
assertEquals(await ctx.getSignedKeyOwner(), null);
|
714
700
|
await assertRejects(() => ctx.getActor("someone"), Error, "No actor dispatcher registered");
|
715
|
-
const signedReq = await signRequest(new Request("https://example.com/"
|
701
|
+
const signedReq = await signRequest(new Request("https://example.com/"), rsaPrivateKey2, rsaPublicKey2.id);
|
716
702
|
const signedCtx = federation.createContext(signedReq, 456);
|
717
703
|
assertEquals(signedCtx.request, signedReq);
|
718
704
|
assertEquals(signedCtx.url, new URL("https://example.com/"));
|
@@ -721,7 +707,7 @@ test({
|
|
721
707
|
assertEquals(await signedCtx.getSignedKeyOwner(), null);
|
722
708
|
assertEquals(await signedCtx.getSignedKey(), rsaPublicKey2);
|
723
709
|
assertEquals(await signedCtx.getSignedKeyOwner(), null);
|
724
|
-
const signedReq2 = await signRequest(new Request("https://example.com/"
|
710
|
+
const signedReq2 = await signRequest(new Request("https://example.com/"), rsaPrivateKey3, rsaPublicKey3.id);
|
725
711
|
const signedCtx2 = federation.createContext(signedReq2, 456);
|
726
712
|
assertEquals(signedCtx2.request, signedReq2);
|
727
713
|
assertEquals(signedCtx2.url, new URL("https://example.com/"));
|
@@ -754,7 +740,7 @@ test({
|
|
754
740
|
});
|
755
741
|
await t.step("RequestContext.clone()", () => {
|
756
742
|
const federation = createFederation({ kv });
|
757
|
-
const req = new Request("https://example.com/"
|
743
|
+
const req = new Request("https://example.com/");
|
758
744
|
const ctx = federation.createContext(req, 123);
|
759
745
|
const clone = ctx.clone(456);
|
760
746
|
assertStrictEquals(clone.request, ctx.request);
|
@@ -770,180 +756,6 @@ test({
|
|
770
756
|
esm_default.hardReset();
|
771
757
|
}
|
772
758
|
});
|
773
|
-
test("Federation.fetch()", async (t) => {
|
774
|
-
esm_default.spyGlobal();
|
775
|
-
esm_default.get("https://example.com/key2", {
|
776
|
-
headers: { "Content-Type": "application/activity+json" },
|
777
|
-
body: await rsaPublicKey2.toJsonLd({ contextLoader: mockDocumentLoader })
|
778
|
-
});
|
779
|
-
esm_default.get("begin:https://example.com/person", {
|
780
|
-
headers: { "Content-Type": "application/activity+json" },
|
781
|
-
body: person_default
|
782
|
-
});
|
783
|
-
const createTestContext = () => {
|
784
|
-
const kv = new MemoryKvStore();
|
785
|
-
const inbox = [];
|
786
|
-
const dispatches = [];
|
787
|
-
const federation = createFederation({
|
788
|
-
kv,
|
789
|
-
documentLoaderFactory: () => mockDocumentLoader,
|
790
|
-
authenticatedDocumentLoaderFactory(identity) {
|
791
|
-
const docLoader = getAuthenticatedDocumentLoader(identity);
|
792
|
-
return (url) => {
|
793
|
-
const urlObj = new URL(url);
|
794
|
-
if (urlObj.host === "example.com") return docLoader(url);
|
795
|
-
return mockDocumentLoader(url);
|
796
|
-
};
|
797
|
-
}
|
798
|
-
});
|
799
|
-
federation.setActorDispatcher("/users/{identifier}", (ctx, identifier) => {
|
800
|
-
dispatches.push(identifier);
|
801
|
-
return new Person({
|
802
|
-
id: ctx.getActorUri(identifier),
|
803
|
-
inbox: ctx.getInboxUri(identifier),
|
804
|
-
preferredUsername: identifier
|
805
|
-
});
|
806
|
-
}).setKeyPairsDispatcher(() => {
|
807
|
-
return [{
|
808
|
-
privateKey: rsaPrivateKey2,
|
809
|
-
publicKey: rsaPublicKey2.publicKey
|
810
|
-
}];
|
811
|
-
});
|
812
|
-
federation.setInboxDispatcher("/users/{identifier}/inbox", () => {
|
813
|
-
return { items: [] };
|
814
|
-
});
|
815
|
-
federation.setInboxListeners("/users/{identifier}/inbox", "/inbox").on(Create, (_ctx, activity) => {
|
816
|
-
inbox.push(activity.id.toString());
|
817
|
-
return;
|
818
|
-
});
|
819
|
-
return {
|
820
|
-
federation,
|
821
|
-
inbox,
|
822
|
-
dispatches
|
823
|
-
};
|
824
|
-
};
|
825
|
-
await t.step("POST without accepts header", async () => {
|
826
|
-
const { federation, inbox } = createTestContext();
|
827
|
-
const response = await federation.fetch(new Request("https://example.com/inbox", { method: "POST" }), { contextData: void 0 });
|
828
|
-
assertEquals(inbox, []);
|
829
|
-
assertEquals(response.status, 406);
|
830
|
-
});
|
831
|
-
await t.step("GET without accepts header", async () => {
|
832
|
-
const { federation, dispatches } = createTestContext();
|
833
|
-
const response = await federation.fetch(new Request("https://example.com/users/actor", { method: "GET" }), { contextData: void 0 });
|
834
|
-
assertEquals(dispatches, []);
|
835
|
-
assertEquals(response.status, 406);
|
836
|
-
});
|
837
|
-
await t.step("POST with application/json", async () => {
|
838
|
-
const { federation, inbox } = createTestContext();
|
839
|
-
const request = await signRequest(new Request("https://example.com/users/json/inbox", {
|
840
|
-
method: "POST",
|
841
|
-
headers: {
|
842
|
-
"Accept": "application/json",
|
843
|
-
"Content-Type": "application/json"
|
844
|
-
},
|
845
|
-
body: JSON.stringify(create_default)
|
846
|
-
}), rsaPrivateKey2, rsaPublicKey2.id);
|
847
|
-
const response = await federation.fetch(request, { contextData: void 0 });
|
848
|
-
assertEquals(response.status, 202);
|
849
|
-
assertEquals(inbox.length, 1, "Expected one item in the inbox, json");
|
850
|
-
assertEquals(inbox[0], create_default.id);
|
851
|
-
});
|
852
|
-
await t.step("GET with application/json", async () => {
|
853
|
-
const { federation, dispatches } = createTestContext();
|
854
|
-
const response = await federation.fetch(new Request("https://example.com/users/json", {
|
855
|
-
method: "GET",
|
856
|
-
headers: { "Accept": "application/json" }
|
857
|
-
}), { contextData: void 0 });
|
858
|
-
assertEquals(dispatches, ["json"]);
|
859
|
-
assertEquals(response.status, 200);
|
860
|
-
});
|
861
|
-
await t.step("POST with application/ld+json", async () => {
|
862
|
-
const { federation, inbox } = createTestContext();
|
863
|
-
const request = await signRequest(new Request("https://example.com/users/ld/inbox", {
|
864
|
-
method: "POST",
|
865
|
-
headers: {
|
866
|
-
"Accept": "application/ld+json",
|
867
|
-
"Content-Type": "application/activity+json"
|
868
|
-
},
|
869
|
-
body: JSON.stringify(create_default)
|
870
|
-
}), rsaPrivateKey2, rsaPublicKey2.id);
|
871
|
-
const response = await federation.fetch(request, { contextData: void 0 });
|
872
|
-
assertEquals(response.status, 202);
|
873
|
-
assertEquals(inbox.length, 1, "Expected one inbox activity, ld+json");
|
874
|
-
assertEquals(inbox[0], create_default.id);
|
875
|
-
});
|
876
|
-
await t.step("GET with application/ld+json", async () => {
|
877
|
-
const { federation, dispatches } = createTestContext();
|
878
|
-
const request = new Request("https://example.com/users/ld", {
|
879
|
-
method: "GET",
|
880
|
-
headers: { "Accept": "application/ld+json" }
|
881
|
-
});
|
882
|
-
const response = await federation.fetch(request, { contextData: void 0 });
|
883
|
-
assertEquals(dispatches, ["ld"]);
|
884
|
-
assertEquals(response.status, 200);
|
885
|
-
});
|
886
|
-
await t.step("POST with application/activity+json", async () => {
|
887
|
-
const { federation, inbox } = createTestContext();
|
888
|
-
const request = await signRequest(new Request("https://example.com/users/activity/inbox", {
|
889
|
-
method: "POST",
|
890
|
-
headers: {
|
891
|
-
"Accept": "application/activity+json",
|
892
|
-
"Content-Type": "application/activity+json"
|
893
|
-
},
|
894
|
-
body: JSON.stringify(create_default)
|
895
|
-
}), rsaPrivateKey2, rsaPublicKey2.id);
|
896
|
-
const response = await federation.fetch(request, { contextData: void 0 });
|
897
|
-
assertEquals(response.status, 202);
|
898
|
-
assertEquals(inbox.length, 1);
|
899
|
-
assertEquals(inbox[0], create_default.id);
|
900
|
-
});
|
901
|
-
await t.step("GET with application/activity+json", async () => {
|
902
|
-
const { federation, dispatches } = createTestContext();
|
903
|
-
const request = new Request("https://example.com/users/activity", {
|
904
|
-
method: "GET",
|
905
|
-
headers: { "Accept": "application/ld+json" }
|
906
|
-
});
|
907
|
-
const response = await federation.fetch(request, { contextData: void 0 });
|
908
|
-
assertEquals(dispatches, ["activity"]);
|
909
|
-
assertEquals(response.status, 200);
|
910
|
-
});
|
911
|
-
await t.step("onNotAcceptable with POST", async () => {
|
912
|
-
const { federation } = createTestContext();
|
913
|
-
let notAcceptableCalled = false;
|
914
|
-
const response = await federation.fetch(new Request("https://example.com/users/html/inbox", {
|
915
|
-
method: "POST",
|
916
|
-
headers: { "Accept": "text/html" }
|
917
|
-
}), {
|
918
|
-
contextData: void 0,
|
919
|
-
onNotAcceptable: () => {
|
920
|
-
notAcceptableCalled = true;
|
921
|
-
return new Response("handled by onNotAcceptable", { status: 200 });
|
922
|
-
}
|
923
|
-
});
|
924
|
-
assertEquals(notAcceptableCalled, true);
|
925
|
-
assertEquals(response.status, 200);
|
926
|
-
assertEquals(await response.text(), "handled by onNotAcceptable");
|
927
|
-
});
|
928
|
-
await t.step("onNotAcceptable with GET", async () => {
|
929
|
-
const { federation } = createTestContext();
|
930
|
-
let notAcceptableCalled = false;
|
931
|
-
const response = await federation.fetch(new Request("https://example.com/users/html", {
|
932
|
-
method: "GET",
|
933
|
-
headers: { "Accept": "text/html" }
|
934
|
-
}), {
|
935
|
-
contextData: void 0,
|
936
|
-
onNotAcceptable: () => {
|
937
|
-
notAcceptableCalled = true;
|
938
|
-
return new Response("handled by onNotAcceptable", { status: 200 });
|
939
|
-
}
|
940
|
-
});
|
941
|
-
assertEquals(notAcceptableCalled, true);
|
942
|
-
assertEquals(response.status, 200);
|
943
|
-
assertEquals(await response.text(), "handled by onNotAcceptable");
|
944
|
-
});
|
945
|
-
esm_default.hardReset();
|
946
|
-
});
|
947
759
|
test("Federation.setInboxListeners()", async (t) => {
|
948
760
|
const kv = new MemoryKvStore();
|
949
761
|
esm_default.spyGlobal();
|
@@ -996,10 +808,7 @@ test("Federation.setInboxListeners()", async (t) => {
|
|
996
808
|
federation.setInboxListeners("/users/{identifier}/inbox", "/inbox").on(Create, (ctx, create) => {
|
997
809
|
inbox.push([ctx, create]);
|
998
810
|
});
|
999
|
-
let response = await federation.fetch(new Request("https://example.com/inbox", {
|
1000
|
-
method: "POST",
|
1001
|
-
headers: { "accept": "application/ld+json" }
|
1002
|
-
}), { contextData: void 0 });
|
811
|
+
let response = await federation.fetch(new Request("https://example.com/inbox", { method: "POST" }), { contextData: void 0 });
|
1003
812
|
assertEquals(inbox, []);
|
1004
813
|
assertEquals(response.status, 404);
|
1005
814
|
federation.setActorDispatcher("/users/{identifier}", (_, identifier) => identifier === "john" ? new Person({}) : null).setKeyPairsDispatcher(() => [{
|
@@ -1016,37 +825,23 @@ test("Federation.setInboxListeners()", async (t) => {
|
|
1016
825
|
});
|
1017
826
|
response = await federation.fetch(new Request("https://example.com/inbox", {
|
1018
827
|
method: "POST",
|
1019
|
-
body: JSON.stringify(await activity().toJsonLd(options))
|
1020
|
-
headers: {
|
1021
|
-
"accept": "application/ld+json",
|
1022
|
-
"content-type": "application/ld+json"
|
1023
|
-
}
|
828
|
+
body: JSON.stringify(await activity().toJsonLd(options))
|
1024
829
|
}), { contextData: void 0 });
|
1025
830
|
assertEquals(inbox, []);
|
1026
831
|
assertEquals(response.status, 401);
|
1027
|
-
response = await federation.fetch(new Request("https://example.com/users/no-one/inbox", {
|
1028
|
-
method: "POST",
|
1029
|
-
headers: { "accept": "application/ld+json" }
|
1030
|
-
}), { contextData: void 0 });
|
832
|
+
response = await federation.fetch(new Request("https://example.com/users/no-one/inbox", { method: "POST" }), { contextData: void 0 });
|
1031
833
|
assertEquals(inbox, []);
|
1032
834
|
assertEquals(response.status, 404);
|
1033
835
|
response = await federation.fetch(new Request("https://example.com/users/john/inbox", {
|
1034
836
|
method: "POST",
|
1035
|
-
body: JSON.stringify(await activity().toJsonLd(options))
|
1036
|
-
headers: {
|
1037
|
-
"accept": "application/ld+json",
|
1038
|
-
"content-type": "application/ld+json"
|
1039
|
-
}
|
837
|
+
body: JSON.stringify(await activity().toJsonLd(options))
|
1040
838
|
}), { contextData: void 0 });
|
1041
839
|
assertEquals(inbox, []);
|
1042
840
|
assertEquals(response.status, 401);
|
1043
841
|
const activityPayload = await activity().toJsonLd(options);
|
1044
842
|
let request = new Request("https://example.com/users/john/inbox", {
|
1045
843
|
method: "POST",
|
1046
|
-
headers: {
|
1047
|
-
"Content-Type": "application/activity+json",
|
1048
|
-
accept: "application/ld+json"
|
1049
|
-
},
|
844
|
+
headers: { "Content-Type": "application/activity+json" },
|
1050
845
|
body: JSON.stringify(activityPayload)
|
1051
846
|
});
|
1052
847
|
request = await signRequest(request, rsaPrivateKey3, new URL("https://example.com/person2#key3"));
|
@@ -1063,10 +858,7 @@ test("Federation.setInboxListeners()", async (t) => {
|
|
1063
858
|
inbox.shift();
|
1064
859
|
request = new Request("https://another.host/users/john/inbox", {
|
1065
860
|
method: "POST",
|
1066
|
-
headers: {
|
1067
|
-
"Content-Type": "application/activity+json",
|
1068
|
-
"accept": "application/ld+json"
|
1069
|
-
},
|
861
|
+
headers: { "Content-Type": "application/activity+json" },
|
1070
862
|
body: JSON.stringify(activityPayload)
|
1071
863
|
});
|
1072
864
|
request = await signRequest(request, rsaPrivateKey3, new URL("https://example.com/person2#key3"));
|
@@ -1081,10 +873,7 @@ test("Federation.setInboxListeners()", async (t) => {
|
|
1081
873
|
inbox.shift();
|
1082
874
|
request = new Request("https://example.com/inbox", {
|
1083
875
|
method: "POST",
|
1084
|
-
headers: {
|
1085
|
-
"Content-Type": "application/activity+json",
|
1086
|
-
"accept": "application/ld+json"
|
1087
|
-
},
|
876
|
+
headers: { "Content-Type": "application/activity+json" },
|
1088
877
|
body: JSON.stringify(await activity().toJsonLd(options))
|
1089
878
|
});
|
1090
879
|
request = await signRequest(request, rsaPrivateKey3, new URL("https://example.com/person2#key3"));
|
@@ -1099,10 +888,7 @@ test("Federation.setInboxListeners()", async (t) => {
|
|
1099
888
|
inbox.shift();
|
1100
889
|
request = new Request("https://example.com/users/john/inbox", {
|
1101
890
|
method: "POST",
|
1102
|
-
headers: {
|
1103
|
-
"Content-Type": "application/activity+json",
|
1104
|
-
"accept": "application/ld+json"
|
1105
|
-
},
|
891
|
+
headers: { "Content-Type": "application/activity+json" },
|
1106
892
|
body: JSON.stringify(await (await signObject(activity(), ed25519PrivateKey, ed25519Multikey.id, options)).toJsonLd(options))
|
1107
893
|
});
|
1108
894
|
response = await federation.fetch(request, { contextData: void 0 });
|
@@ -1141,10 +927,7 @@ test("Federation.setInboxListeners()", async (t) => {
|
|
1141
927
|
const activity = new Create({ actor: new URL("https://example.com/person") });
|
1142
928
|
let request = new Request("https://example.com/users/john/inbox", {
|
1143
929
|
method: "POST",
|
1144
|
-
headers: {
|
1145
|
-
"Content-Type": "application/activity+json",
|
1146
|
-
"Accept": "application/activity+json"
|
1147
|
-
},
|
930
|
+
headers: { "Content-Type": "application/activity+json" },
|
1148
931
|
body: JSON.stringify(await activity.toJsonLd({ contextLoader: mockDocumentLoader }))
|
1149
932
|
});
|
1150
933
|
request = await signRequest(request, rsaPrivateKey2, new URL("https://example.com/key2"));
|
@@ -1460,7 +1243,7 @@ test("ContextImpl.sendActivity()", async (t) => {
|
|
1460
1243
|
collectionSyncHeader = cl.request.headers.get("Collection-Synchronization");
|
1461
1244
|
const options = {
|
1462
1245
|
async documentLoader(url) {
|
1463
|
-
const response = await federation.fetch(new Request(url
|
1246
|
+
const response = await federation.fetch(new Request(url), { contextData: void 0 });
|
1464
1247
|
if (response.ok) return {
|
1465
1248
|
contextUrl: null,
|
1466
1249
|
document: await response.json(),
|
package/dist/federation/mod.cjs
CHANGED
@@ -3,17 +3,17 @@
|
|
3
3
|
const { URLPattern } = require("urlpattern-polyfill");
|
4
4
|
|
5
5
|
require('../transformers-CoBS-oFG.cjs');
|
6
|
-
require('../docloader-
|
7
|
-
require('../actor-
|
8
|
-
const require_middleware = require('../middleware-
|
9
|
-
require('../lookup-
|
10
|
-
require('../key-
|
11
|
-
require('../http-
|
12
|
-
require('../proof-
|
6
|
+
require('../docloader-B1O1Z5OK.cjs');
|
7
|
+
require('../actor-C3gJhZJj.cjs');
|
8
|
+
const require_middleware = require('../middleware-Gsxukxs5.cjs');
|
9
|
+
require('../lookup-7u217Q3H.cjs');
|
10
|
+
require('../key-CzF9SAEI.cjs');
|
11
|
+
require('../http-Hw9HJp9i.cjs');
|
12
|
+
require('../proof-Gip91fK7.cjs');
|
13
13
|
const require_federation = require('../federation-H2_En3j5.cjs');
|
14
|
-
require('../types-
|
15
|
-
require('../authdocloader-
|
16
|
-
require('../vocab-
|
14
|
+
require('../types-CZ_qo9KW.cjs');
|
15
|
+
require('../authdocloader-DPCGwidE.cjs');
|
16
|
+
require('../vocab-9MjZjuZb.cjs');
|
17
17
|
|
18
18
|
exports.InProcessMessageQueue = require_federation.InProcessMessageQueue;
|
19
19
|
exports.MemoryKvStore = require_federation.MemoryKvStore;
|
@@ -7,7 +7,7 @@ import "../http-BS6766zs.cjs";
|
|
7
7
|
import "../owner-B-7Ptt_m.cjs";
|
8
8
|
import "../mod-evzlRVZq.cjs";
|
9
9
|
import "../mod-jQ4OODsl.cjs";
|
10
|
-
import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParamsKeyPath, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-
|
10
|
+
import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParamsKeyPath, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-Dq8aCtMH.cjs";
|
11
11
|
import { InProcessMessageQueue, InProcessMessageQueueOptions, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, ParallelMessageQueue } from "../mq-B7R1Q-M5.cjs";
|
12
12
|
import "../mod-C2tOeRkN.cjs";
|
13
13
|
export { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, KvKey, KvStore, KvStoreSetOptions, MemoryKvStore, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParallelMessageQueue, ParamsKeyPath, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
|
package/dist/federation/mod.d.ts
CHANGED
@@ -9,7 +9,7 @@ import "../http-DqSNLFNY.js";
|
|
9
9
|
import "../owner-CQPnQVtf.js";
|
10
10
|
import "../mod-Cxt4Kpf6.js";
|
11
11
|
import "../mod-DBzN0aCM.js";
|
12
|
-
import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParamsKeyPath, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-
|
12
|
+
import { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParamsKeyPath, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../context-CDSZdQHD.js";
|
13
13
|
import { InProcessMessageQueue, InProcessMessageQueueOptions, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, ParallelMessageQueue } from "../mq-CRGm1e_F.js";
|
14
14
|
import "../mod-g0xFzAP9.js";
|
15
15
|
export { ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CreateFederationOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, KvKey, KvStore, KvStoreSetOptions, MemoryKvStore, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, PageItems, ParallelMessageQueue, ParamsKeyPath, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
|
package/dist/federation/mod.js
CHANGED
@@ -3,16 +3,16 @@
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
|
5
5
|
import "../transformers-BFT6d7J5.js";
|
6
|
-
import "../docloader-
|
7
|
-
import "../actor-
|
8
|
-
import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-
|
9
|
-
import "../lookup-
|
10
|
-
import "../key-
|
11
|
-
import "../http-
|
12
|
-
import "../proof-
|
6
|
+
import "../docloader-xJVzq9O0.js";
|
7
|
+
import "../actor-CnVfp1Hp.js";
|
8
|
+
import { Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "../middleware-DXWUGrBQ.js";
|
9
|
+
import "../lookup-CfU0DgLr.js";
|
10
|
+
import "../key-BRmlopJL.js";
|
11
|
+
import "../http-CovAm6we.js";
|
12
|
+
import "../proof-Be1oOYEh.js";
|
13
13
|
import { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue } from "../federation-D1U8YY9t.js";
|
14
|
-
import "../types-
|
15
|
-
import "../authdocloader-
|
16
|
-
import "../vocab-
|
14
|
+
import "../types-CNWeAz8v.js";
|
15
|
+
import "../authdocloader-DWnwkjvZ.js";
|
16
|
+
import "../vocab-gpwUU9fc.js";
|
17
17
|
|
18
18
|
export { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue, Router, RouterError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable };
|
@@ -3,17 +3,17 @@
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
globalThis.addEventListener = () => {};
|
5
5
|
|
6
|
-
import "../type-
|
6
|
+
import "../type-FCer_9yh.js";
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
10
|
-
import "../lookup-
|
11
|
-
import { test } from "../testing-
|
12
|
-
import { assertGreater, assertGreaterOrEqual } from "../std__assert-
|
13
|
-
import { assertFalse } from "../assert_rejects-
|
14
|
-
import "../assert_is_error-
|
15
|
-
import "../assert_not_equals-
|
16
|
-
import "../assert_throws-
|
10
|
+
import "../lookup-BrhURkmj.js";
|
11
|
+
import { test } from "../testing-BMBhkcz9.js";
|
12
|
+
import { assertGreater, assertGreaterOrEqual } from "../std__assert-DWivtrGR.js";
|
13
|
+
import { assertFalse } from "../assert_rejects-7UF4R_Qs.js";
|
14
|
+
import "../assert_is_error-B035L3om.js";
|
15
|
+
import "../assert_not_equals-C80BG-_5.js";
|
16
|
+
import "../assert_throws-53_pKeP3.js";
|
17
17
|
import { delay } from "es-toolkit";
|
18
18
|
|
19
19
|
//#region src/federation/mq.ts
|
@@ -227,7 +227,7 @@ test("InProcessMessageQueue", async (t) => {
|
|
227
227
|
});
|
228
228
|
test("MessageQueue.nativeRetrial", async (t) => {
|
229
229
|
if ("Deno" in globalThis && "openKv" in globalThis.Deno && typeof globalThis.Deno.openKv === "function") await t.step("DenoKvMessageQueue", async () => {
|
230
|
-
const { DenoKvMessageQueue } = await import("../denokv-
|
230
|
+
const { DenoKvMessageQueue } = await import("../denokv-jZ0Z2h0M.js");
|
231
231
|
const mq = new DenoKvMessageQueue(await globalThis.Deno.openKv(":memory:"));
|
232
232
|
assert(mq.nativeRetrial);
|
233
233
|
if (Symbol.dispose in mq) {
|
@@ -266,7 +266,7 @@ test("MessageQueue.nativeRetrial", async (t) => {
|
|
266
266
|
});
|
267
267
|
const queues = { InProcessMessageQueue: () => Promise.resolve(new InProcessMessageQueue()) };
|
268
268
|
if ("Deno" in globalThis && "openKv" in globalThis.Deno && typeof globalThis.Deno.openKv === "function") {
|
269
|
-
const { DenoKvMessageQueue } = await import("../denokv-
|
269
|
+
const { DenoKvMessageQueue } = await import("../denokv-jZ0Z2h0M.js");
|
270
270
|
queues.DenoKvMessageQueue = async () => new DenoKvMessageQueue(await globalThis.Deno.openKv(":memory:"));
|
271
271
|
}
|
272
272
|
for (const mqName in queues) test({
|
@@ -3,12 +3,12 @@
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
globalThis.addEventListener = () => {};
|
5
5
|
|
6
|
-
import "../type-
|
6
|
+
import "../type-FCer_9yh.js";
|
7
7
|
import { AssertionError, assertEquals } from "../assert_equals-DSbWqCm3.js";
|
8
|
-
import "../lookup-
|
9
|
-
import { createExponentialBackoffPolicy } from "../retry-
|
10
|
-
import { test } from "../testing-
|
11
|
-
import { assertNotEquals } from "../assert_not_equals-
|
8
|
+
import "../lookup-BrhURkmj.js";
|
9
|
+
import { createExponentialBackoffPolicy } from "../retry-CfF8Gn4d.js";
|
10
|
+
import { test } from "../testing-BMBhkcz9.js";
|
11
|
+
import { assertNotEquals } from "../assert_not_equals-C80BG-_5.js";
|
12
12
|
|
13
13
|
//#region src/federation/retry.test.ts
|
14
14
|
test("createExponentialBackoffPolicy()", () => {
|
@@ -3,17 +3,17 @@
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
globalThis.addEventListener = () => {};
|
5
5
|
|
6
|
-
import "../type-
|
6
|
+
import "../type-FCer_9yh.js";
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
10
|
-
import { Router, RouterError } from "../lookup-
|
11
|
-
import { test } from "../testing-
|
12
|
-
import "../std__assert-
|
13
|
-
import { assertFalse } from "../assert_rejects-
|
14
|
-
import "../assert_is_error-
|
15
|
-
import "../assert_not_equals-
|
16
|
-
import { assertThrows } from "../assert_throws-
|
10
|
+
import { Router, RouterError } from "../lookup-BrhURkmj.js";
|
11
|
+
import { test } from "../testing-BMBhkcz9.js";
|
12
|
+
import "../std__assert-DWivtrGR.js";
|
13
|
+
import { assertFalse } from "../assert_rejects-7UF4R_Qs.js";
|
14
|
+
import "../assert_is_error-B035L3om.js";
|
15
|
+
import "../assert_not_equals-C80BG-_5.js";
|
16
|
+
import { assertThrows } from "../assert_throws-53_pKeP3.js";
|
17
17
|
|
18
18
|
//#region src/federation/router.test.ts
|
19
19
|
function setUp(options = {}) {
|
@@ -3,24 +3,24 @@
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
globalThis.addEventListener = () => {};
|
5
5
|
|
6
|
-
import { Activity, Application, Endpoints, Group, Person, Service } from "../type-
|
6
|
+
import { Activity, Application, Endpoints, Group, Person, Service } from "../type-FCer_9yh.js";
|
7
7
|
import { assertEquals } from "../assert_equals-DSbWqCm3.js";
|
8
8
|
import { assert } from "../assert-MZs1qjMx.js";
|
9
9
|
import "../assert_instance_of-DHz7EHNU.js";
|
10
|
-
import "../lookup-
|
11
|
-
import "../actor-
|
12
|
-
import "../key-
|
13
|
-
import { verifyRequest } from "../http-
|
14
|
-
import { doesActorOwnKey } from "../owner-
|
15
|
-
import { extractInboxes, sendActivity } from "../send-
|
16
|
-
import { mockDocumentLoader, test } from "../testing-
|
17
|
-
import "../std__assert-
|
18
|
-
import { assertFalse, assertRejects } from "../assert_rejects-
|
19
|
-
import "../assert_is_error-
|
20
|
-
import { assertNotEquals } from "../assert_not_equals-
|
21
|
-
import "../assert_throws-
|
22
|
-
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-
|
23
|
-
import { esm_default } from "../esm-
|
10
|
+
import "../lookup-BrhURkmj.js";
|
11
|
+
import "../actor-Cpal85xW.js";
|
12
|
+
import "../key-DORX19Bl.js";
|
13
|
+
import { verifyRequest } from "../http-y7khnX5Q.js";
|
14
|
+
import { doesActorOwnKey } from "../owner-NFlQJyvM.js";
|
15
|
+
import { extractInboxes, sendActivity } from "../send-DkwkMFjJ.js";
|
16
|
+
import { mockDocumentLoader, test } from "../testing-BMBhkcz9.js";
|
17
|
+
import "../std__assert-DWivtrGR.js";
|
18
|
+
import { assertFalse, assertRejects } from "../assert_rejects-7UF4R_Qs.js";
|
19
|
+
import "../assert_is_error-B035L3om.js";
|
20
|
+
import { assertNotEquals } from "../assert_not_equals-C80BG-_5.js";
|
21
|
+
import "../assert_throws-53_pKeP3.js";
|
22
|
+
import { ed25519Multikey, ed25519PrivateKey, rsaPrivateKey2, rsaPublicKey2 } from "../keys-B3fzLXBG.js";
|
23
|
+
import { esm_default } from "../esm-BBznxjVc.js";
|
24
24
|
|
25
25
|
//#region src/federation/send.test.ts
|
26
26
|
test("extractInboxes()", () => {
|
@@ -2,9 +2,9 @@
|
|
2
2
|
import { Temporal } from "@js-temporal/polyfill";
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
4
4
|
|
5
|
-
import { deno_default } from "./docloader-
|
6
|
-
import { CryptographicKey } from "./actor-
|
7
|
-
import { fetchKey, validateCryptoKey } from "./key-
|
5
|
+
import { deno_default } from "./docloader-xJVzq9O0.js";
|
6
|
+
import { CryptographicKey } from "./actor-CnVfp1Hp.js";
|
7
|
+
import { fetchKey, validateCryptoKey } from "./key-BRmlopJL.js";
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
9
9
|
import { SpanStatusCode, trace } from "@opentelemetry/api";
|
10
10
|
import { decodeBase64, encodeBase64 } from "byte-encodings/base64";
|