@fedify/fedify 2.0.2-dev.407 → 2.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{builder-CmXCvILP.js → builder-D_bMg0Oj.js} +3 -3
- package/dist/compat/mod.d.cts +2 -2
- package/dist/compat/mod.d.ts +2 -2
- package/dist/compat/transformers.test.js +11 -11
- package/dist/{context-o4OhjMHe.d.cts → context-D3QkEtZd.d.cts} +4 -23
- package/dist/{context-Dy5ro7zD.d.ts → context-DZJhUmzF.d.ts} +4 -23
- package/dist/{deno-r4zOZb6i.js → deno-B0q1E8NY.js} +1 -1
- package/dist/{docloader-B3FBDYHA.js → docloader-DVHzcwep.js} +2 -2
- package/dist/federation/builder.test.js +3 -3
- package/dist/federation/handler.test.js +19 -19
- package/dist/federation/idempotency.test.js +11 -11
- package/dist/federation/inbox.test.js +2 -2
- package/dist/federation/middleware.test.js +11 -11
- package/dist/federation/mod.cjs +4 -4
- package/dist/federation/mod.d.cts +2 -2
- package/dist/federation/mod.d.ts +2 -2
- package/dist/federation/mod.js +4 -4
- package/dist/federation/send.test.js +5 -5
- package/dist/federation/webfinger.test.js +11 -11
- package/dist/{http-BeDhqNdl.cjs → http-BlP362Gm.cjs} +1 -1
- package/dist/{http-B2qDw-ld.js → http-Bo0uEDb_.js} +2 -2
- package/dist/{http-Cu7-n4zt.js → http-By_H0O72.js} +1 -1
- package/dist/{inbox-COVt7NM_.js → inbox-ehLNpqRT.js} +1 -1
- package/dist/{key-D3c7zdQ4.js → key-BMhU3DNQ.js} +1 -1
- package/dist/{kv-cache-CtV4175p.js → kv-cache-D52g2dca.js} +1 -1
- package/dist/{kv-cache-BXA2Q9DI.cjs → kv-cache-Dtlo5CfX.cjs} +1 -1
- package/dist/{ld-B5-SoHWy.js → ld-CNISEmdm.js} +2 -2
- package/dist/{middleware-BjvalmrW.cjs → middleware-B4QI-EQh.cjs} +8 -83
- package/dist/{middleware-D1v2KqML.js → middleware-BGyIdScH.js} +8 -83
- package/dist/{middleware-DsPC0qJ_.js → middleware-BU9ozxfS.js} +11 -11
- package/dist/{middleware-CyrPv2j3.js → middleware-CdcgI6bS.js} +4 -4
- package/dist/{middleware-Dp0_BtQF.js → middleware-DJStGRlU.js} +14 -89
- package/dist/middleware-LXhF1qcp.cjs +12 -0
- package/dist/{mod-Bm_GwNTL.d.cts → mod-DVwHUI_x.d.cts} +1 -1
- package/dist/{mod-DwqZ5l67.d.cts → mod-Di3W5OdP.d.cts} +1 -1
- package/dist/{mod-CIR7gJW8.d.ts → mod-DnSsduJF.d.ts} +1 -1
- package/dist/{mod-DQWhp0xs.d.ts → mod-DosD6NsG.d.ts} +1 -1
- package/dist/mod.cjs +4 -4
- package/dist/mod.d.cts +3 -3
- package/dist/mod.d.ts +3 -3
- package/dist/mod.js +4 -4
- package/dist/nodeinfo/handler.test.js +11 -11
- package/dist/{owner-KwXXBWZ3.js → owner-EXyCs7TD.js} +1 -1
- package/dist/{proof-DqYaOkxv.js → proof-BjkALaaN.js} +1 -1
- package/dist/{proof-BcQ-0Eck.cjs → proof-CPfoUu8V.cjs} +1 -1
- package/dist/{proof-S-df7nOa.js → proof-McW2QsQF.js} +2 -2
- package/dist/{send-BFqsdYMW.js → send-DCuNY29F.js} +2 -2
- package/dist/sig/http.test.js +3 -3
- package/dist/sig/key.test.js +2 -2
- package/dist/sig/ld.test.js +3 -3
- package/dist/sig/mod.cjs +2 -2
- package/dist/sig/mod.js +2 -2
- package/dist/sig/owner.test.js +3 -3
- package/dist/sig/proof.test.js +3 -3
- package/dist/testing/mod.d.ts +4 -23
- package/dist/utils/docloader.test.js +4 -4
- package/dist/utils/mod.cjs +2 -2
- package/dist/utils/mod.js +2 -2
- package/package.json +5 -5
- package/dist/middleware-BDtfAFen.cjs +0 -12
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default } from "./deno-
|
|
7
|
-
import { fetchKey, validateCryptoKey } from "./key-
|
|
6
|
+
import { deno_default } from "./deno-B0q1E8NY.js";
|
|
7
|
+
import { fetchKey, validateCryptoKey } from "./key-BMhU3DNQ.js";
|
|
8
8
|
import { getLogger } from "@logtape/logtape";
|
|
9
9
|
import { Activity, CryptographicKey, Object as Object$1, getTypeId } from "@fedify/vocab";
|
|
10
10
|
import { getDocumentLoader } from "@fedify/vocab-runtime";
|
|
@@ -4,10 +4,10 @@
|
|
|
4
4
|
|
|
5
5
|
const require_chunk = require('./chunk-CGaQZ11T.cjs');
|
|
6
6
|
const require_transformers = require('./transformers-3g8GZwkZ.cjs');
|
|
7
|
-
const require_http = require('./http-
|
|
8
|
-
const require_proof = require('./proof-
|
|
7
|
+
const require_http = require('./http-BlP362Gm.cjs');
|
|
8
|
+
const require_proof = require('./proof-CPfoUu8V.cjs');
|
|
9
9
|
const require_types = require('./types-Cd_hszr_.cjs');
|
|
10
|
-
const require_kv_cache = require('./kv-cache-
|
|
10
|
+
const require_kv_cache = require('./kv-cache-Dtlo5CfX.cjs');
|
|
11
11
|
const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
|
|
12
12
|
const __fedify_vocab = require_chunk.__toESM(require("@fedify/vocab"));
|
|
13
13
|
const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
|
|
@@ -339,7 +339,7 @@ var FederationBuilderImpl = class {
|
|
|
339
339
|
this.collectionTypeIds = {};
|
|
340
340
|
}
|
|
341
341
|
async build(options) {
|
|
342
|
-
const { FederationImpl: FederationImpl$1 } = await Promise.resolve().then(() => require("./middleware-
|
|
342
|
+
const { FederationImpl: FederationImpl$1 } = await Promise.resolve().then(() => require("./middleware-LXhF1qcp.cjs"));
|
|
343
343
|
const f = new FederationImpl$1(options);
|
|
344
344
|
const trailingSlashInsensitiveValue = f.router.trailingSlashInsensitive;
|
|
345
345
|
f.router = this.router.clone();
|
|
@@ -994,25 +994,7 @@ async function handleActor(request, { identifier, context: context$2, actorDispa
|
|
|
994
994
|
return await onNotFound(request);
|
|
995
995
|
}
|
|
996
996
|
if (authorizePredicate != null) {
|
|
997
|
-
|
|
998
|
-
key = key?.clone({}, { $warning: {
|
|
999
|
-
category: [
|
|
1000
|
-
"fedify",
|
|
1001
|
-
"federation",
|
|
1002
|
-
"actor"
|
|
1003
|
-
],
|
|
1004
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1005
|
-
} }) ?? null;
|
|
1006
|
-
let keyOwner = await context$2.getSignedKeyOwner();
|
|
1007
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
1008
|
-
category: [
|
|
1009
|
-
"fedify",
|
|
1010
|
-
"federation",
|
|
1011
|
-
"actor"
|
|
1012
|
-
],
|
|
1013
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1014
|
-
} }) ?? null;
|
|
1015
|
-
if (!await authorizePredicate(context$2, identifier, key, keyOwner)) return await onUnauthorized(request);
|
|
997
|
+
if (!await authorizePredicate(context$2, identifier)) return await onUnauthorized(request);
|
|
1016
998
|
}
|
|
1017
999
|
const jsonLd = await actor.toJsonLd(context$2);
|
|
1018
1000
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1032,25 +1014,7 @@ async function handleObject(request, { values, context: context$2, objectDispatc
|
|
|
1032
1014
|
const object = await objectDispatcher(context$2, values);
|
|
1033
1015
|
if (object == null) return await onNotFound(request);
|
|
1034
1016
|
if (authorizePredicate != null) {
|
|
1035
|
-
|
|
1036
|
-
key = key?.clone({}, { $warning: {
|
|
1037
|
-
category: [
|
|
1038
|
-
"fedify",
|
|
1039
|
-
"federation",
|
|
1040
|
-
"object"
|
|
1041
|
-
],
|
|
1042
|
-
message: "The third parameter of ObjectAuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1043
|
-
} }) ?? null;
|
|
1044
|
-
let keyOwner = await context$2.getSignedKeyOwner();
|
|
1045
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
1046
|
-
category: [
|
|
1047
|
-
"fedify",
|
|
1048
|
-
"federation",
|
|
1049
|
-
"object"
|
|
1050
|
-
],
|
|
1051
|
-
message: "The fourth parameter of ObjectAuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1052
|
-
} }) ?? null;
|
|
1053
|
-
if (!await authorizePredicate(context$2, values, key, keyOwner)) return await onUnauthorized(request);
|
|
1017
|
+
if (!await authorizePredicate(context$2, values)) return await onUnauthorized(request);
|
|
1054
1018
|
}
|
|
1055
1019
|
const jsonLd = await object.toJsonLd(context$2);
|
|
1056
1020
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1182,25 +1146,7 @@ async function handleCollection(request, { name, identifier, uriGetter, filter,
|
|
|
1182
1146
|
});
|
|
1183
1147
|
}
|
|
1184
1148
|
if (collectionCallbacks.authorizePredicate != null) {
|
|
1185
|
-
|
|
1186
|
-
key = key?.clone({}, { $warning: {
|
|
1187
|
-
category: [
|
|
1188
|
-
"fedify",
|
|
1189
|
-
"federation",
|
|
1190
|
-
"collection"
|
|
1191
|
-
],
|
|
1192
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1193
|
-
} }) ?? null;
|
|
1194
|
-
let keyOwner = await context$2.getSignedKeyOwner();
|
|
1195
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
1196
|
-
category: [
|
|
1197
|
-
"fedify",
|
|
1198
|
-
"federation",
|
|
1199
|
-
"collection"
|
|
1200
|
-
],
|
|
1201
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1202
|
-
} }) ?? null;
|
|
1203
|
-
if (!await collectionCallbacks.authorizePredicate(context$2, identifier, key, keyOwner)) return await onUnauthorized(request);
|
|
1149
|
+
if (!await collectionCallbacks.authorizePredicate(context$2, identifier)) return await onUnauthorized(request);
|
|
1204
1150
|
}
|
|
1205
1151
|
const jsonLd = await collection.toJsonLd(context$2);
|
|
1206
1152
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1851,28 +1797,7 @@ const verifyDefined = (callbacks) => {
|
|
|
1851
1797
|
*/
|
|
1852
1798
|
const authIfNeeded = async (context$2, values, { authorizePredicate: authorize = void 0 }) => {
|
|
1853
1799
|
if (authorize === void 0) return;
|
|
1854
|
-
|
|
1855
|
-
const keyOwner = (await context$2.getSignedKeyOwner())?.clone({}, warning.keyOwner) ?? null;
|
|
1856
|
-
if (!await authorize(context$2, values, key, keyOwner)) throw new UnauthorizedError();
|
|
1857
|
-
};
|
|
1858
|
-
/** Warning messages for `authIfNeeded`. */
|
|
1859
|
-
const warning = {
|
|
1860
|
-
key: { $warning: {
|
|
1861
|
-
category: [
|
|
1862
|
-
"fedify",
|
|
1863
|
-
"federation",
|
|
1864
|
-
"collection"
|
|
1865
|
-
],
|
|
1866
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1867
|
-
} },
|
|
1868
|
-
keyOwner: { $warning: {
|
|
1869
|
-
category: [
|
|
1870
|
-
"fedify",
|
|
1871
|
-
"federation",
|
|
1872
|
-
"collection"
|
|
1873
|
-
],
|
|
1874
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1875
|
-
} }
|
|
1800
|
+
if (!await authorize(context$2, values)) throw new UnauthorizedError();
|
|
1876
1801
|
};
|
|
1877
1802
|
/**
|
|
1878
1803
|
* Appends a cursor parameter to a URL if the cursor exists.
|
|
@@ -3,10 +3,10 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
5
|
import { getDefaultActivityTransformers } from "./transformers-C3FLHUd6.js";
|
|
6
|
-
import { deno_default, doubleKnock, exportJwk, importJwk, validateCryptoKey, verifyRequest } from "./http-
|
|
7
|
-
import { detachSignature, doesActorOwnKey, getKeyOwner, hasSignature, signJsonLd, signObject, verifyJsonLd, verifyObject } from "./proof-
|
|
6
|
+
import { deno_default, doubleKnock, exportJwk, importJwk, validateCryptoKey, verifyRequest } from "./http-By_H0O72.js";
|
|
7
|
+
import { detachSignature, doesActorOwnKey, getKeyOwner, hasSignature, signJsonLd, signObject, verifyJsonLd, verifyObject } from "./proof-BjkALaaN.js";
|
|
8
8
|
import { getNodeInfo, nodeInfoToJson } from "./types-C93Ob9cU.js";
|
|
9
|
-
import { getAuthenticatedDocumentLoader, kvCache } from "./kv-cache-
|
|
9
|
+
import { getAuthenticatedDocumentLoader, kvCache } from "./kv-cache-D52g2dca.js";
|
|
10
10
|
import { getLogger, withContext } from "@logtape/logtape";
|
|
11
11
|
import { Activity, Collection, CollectionPage, CryptographicKey, Link, Multikey, Object as Object$1, OrderedCollection, OrderedCollectionPage, getTypeId, lookupObject, traverseCollection } from "@fedify/vocab";
|
|
12
12
|
import { SpanKind, SpanStatusCode, context, propagation, trace } from "@opentelemetry/api";
|
|
@@ -338,7 +338,7 @@ var FederationBuilderImpl = class {
|
|
|
338
338
|
this.collectionTypeIds = {};
|
|
339
339
|
}
|
|
340
340
|
async build(options) {
|
|
341
|
-
const { FederationImpl: FederationImpl$1 } = await import("./middleware-
|
|
341
|
+
const { FederationImpl: FederationImpl$1 } = await import("./middleware-CdcgI6bS.js");
|
|
342
342
|
const f = new FederationImpl$1(options);
|
|
343
343
|
const trailingSlashInsensitiveValue = f.router.trailingSlashInsensitive;
|
|
344
344
|
f.router = this.router.clone();
|
|
@@ -993,25 +993,7 @@ async function handleActor(request, { identifier, context: context$1, actorDispa
|
|
|
993
993
|
return await onNotFound(request);
|
|
994
994
|
}
|
|
995
995
|
if (authorizePredicate != null) {
|
|
996
|
-
|
|
997
|
-
key = key?.clone({}, { $warning: {
|
|
998
|
-
category: [
|
|
999
|
-
"fedify",
|
|
1000
|
-
"federation",
|
|
1001
|
-
"actor"
|
|
1002
|
-
],
|
|
1003
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1004
|
-
} }) ?? null;
|
|
1005
|
-
let keyOwner = await context$1.getSignedKeyOwner();
|
|
1006
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
1007
|
-
category: [
|
|
1008
|
-
"fedify",
|
|
1009
|
-
"federation",
|
|
1010
|
-
"actor"
|
|
1011
|
-
],
|
|
1012
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1013
|
-
} }) ?? null;
|
|
1014
|
-
if (!await authorizePredicate(context$1, identifier, key, keyOwner)) return await onUnauthorized(request);
|
|
996
|
+
if (!await authorizePredicate(context$1, identifier)) return await onUnauthorized(request);
|
|
1015
997
|
}
|
|
1016
998
|
const jsonLd = await actor.toJsonLd(context$1);
|
|
1017
999
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1031,25 +1013,7 @@ async function handleObject(request, { values, context: context$1, objectDispatc
|
|
|
1031
1013
|
const object = await objectDispatcher(context$1, values);
|
|
1032
1014
|
if (object == null) return await onNotFound(request);
|
|
1033
1015
|
if (authorizePredicate != null) {
|
|
1034
|
-
|
|
1035
|
-
key = key?.clone({}, { $warning: {
|
|
1036
|
-
category: [
|
|
1037
|
-
"fedify",
|
|
1038
|
-
"federation",
|
|
1039
|
-
"object"
|
|
1040
|
-
],
|
|
1041
|
-
message: "The third parameter of ObjectAuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1042
|
-
} }) ?? null;
|
|
1043
|
-
let keyOwner = await context$1.getSignedKeyOwner();
|
|
1044
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
1045
|
-
category: [
|
|
1046
|
-
"fedify",
|
|
1047
|
-
"federation",
|
|
1048
|
-
"object"
|
|
1049
|
-
],
|
|
1050
|
-
message: "The fourth parameter of ObjectAuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1051
|
-
} }) ?? null;
|
|
1052
|
-
if (!await authorizePredicate(context$1, values, key, keyOwner)) return await onUnauthorized(request);
|
|
1016
|
+
if (!await authorizePredicate(context$1, values)) return await onUnauthorized(request);
|
|
1053
1017
|
}
|
|
1054
1018
|
const jsonLd = await object.toJsonLd(context$1);
|
|
1055
1019
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1181,25 +1145,7 @@ async function handleCollection(request, { name, identifier, uriGetter, filter,
|
|
|
1181
1145
|
});
|
|
1182
1146
|
}
|
|
1183
1147
|
if (collectionCallbacks.authorizePredicate != null) {
|
|
1184
|
-
|
|
1185
|
-
key = key?.clone({}, { $warning: {
|
|
1186
|
-
category: [
|
|
1187
|
-
"fedify",
|
|
1188
|
-
"federation",
|
|
1189
|
-
"collection"
|
|
1190
|
-
],
|
|
1191
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1192
|
-
} }) ?? null;
|
|
1193
|
-
let keyOwner = await context$1.getSignedKeyOwner();
|
|
1194
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
1195
|
-
category: [
|
|
1196
|
-
"fedify",
|
|
1197
|
-
"federation",
|
|
1198
|
-
"collection"
|
|
1199
|
-
],
|
|
1200
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1201
|
-
} }) ?? null;
|
|
1202
|
-
if (!await collectionCallbacks.authorizePredicate(context$1, identifier, key, keyOwner)) return await onUnauthorized(request);
|
|
1148
|
+
if (!await collectionCallbacks.authorizePredicate(context$1, identifier)) return await onUnauthorized(request);
|
|
1203
1149
|
}
|
|
1204
1150
|
const jsonLd = await collection.toJsonLd(context$1);
|
|
1205
1151
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1850,28 +1796,7 @@ const verifyDefined = (callbacks) => {
|
|
|
1850
1796
|
*/
|
|
1851
1797
|
const authIfNeeded = async (context$1, values, { authorizePredicate: authorize = void 0 }) => {
|
|
1852
1798
|
if (authorize === void 0) return;
|
|
1853
|
-
|
|
1854
|
-
const keyOwner = (await context$1.getSignedKeyOwner())?.clone({}, warning.keyOwner) ?? null;
|
|
1855
|
-
if (!await authorize(context$1, values, key, keyOwner)) throw new UnauthorizedError();
|
|
1856
|
-
};
|
|
1857
|
-
/** Warning messages for `authIfNeeded`. */
|
|
1858
|
-
const warning = {
|
|
1859
|
-
key: { $warning: {
|
|
1860
|
-
category: [
|
|
1861
|
-
"fedify",
|
|
1862
|
-
"federation",
|
|
1863
|
-
"collection"
|
|
1864
|
-
],
|
|
1865
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1866
|
-
} },
|
|
1867
|
-
keyOwner: { $warning: {
|
|
1868
|
-
category: [
|
|
1869
|
-
"fedify",
|
|
1870
|
-
"federation",
|
|
1871
|
-
"collection"
|
|
1872
|
-
],
|
|
1873
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1874
|
-
} }
|
|
1799
|
+
if (!await authorize(context$1, values)) throw new UnauthorizedError();
|
|
1875
1800
|
};
|
|
1876
1801
|
/**
|
|
1877
1802
|
* Appends a cursor parameter to a URL if the cursor exists.
|
|
@@ -3,24 +3,24 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import "./deno-
|
|
7
|
-
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "./middleware-
|
|
6
|
+
import "./deno-B0q1E8NY.js";
|
|
7
|
+
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "./middleware-DJStGRlU.js";
|
|
8
8
|
import "./client-Dg7OfUDA.js";
|
|
9
9
|
import "./router-D9eI0s4b.js";
|
|
10
10
|
import "./types-CPz01LGH.js";
|
|
11
|
-
import "./key-
|
|
12
|
-
import "./http-
|
|
13
|
-
import "./ld-
|
|
14
|
-
import "./owner-
|
|
15
|
-
import "./proof-
|
|
16
|
-
import "./docloader-
|
|
11
|
+
import "./key-BMhU3DNQ.js";
|
|
12
|
+
import "./http-Bo0uEDb_.js";
|
|
13
|
+
import "./ld-CNISEmdm.js";
|
|
14
|
+
import "./owner-EXyCs7TD.js";
|
|
15
|
+
import "./proof-McW2QsQF.js";
|
|
16
|
+
import "./docloader-DVHzcwep.js";
|
|
17
17
|
import "./kv-cache-B__dHl7g.js";
|
|
18
|
-
import "./inbox-
|
|
19
|
-
import "./builder-
|
|
18
|
+
import "./inbox-ehLNpqRT.js";
|
|
19
|
+
import "./builder-D_bMg0Oj.js";
|
|
20
20
|
import "./collection-CcnIw1qY.js";
|
|
21
21
|
import "./keycache-DRxpZ5r9.js";
|
|
22
22
|
import "./negotiation-5NPJL6zp.js";
|
|
23
23
|
import "./retry-D4GJ670a.js";
|
|
24
|
-
import "./send-
|
|
24
|
+
import "./send-DCuNY29F.js";
|
|
25
25
|
|
|
26
26
|
export { FederationImpl };
|
|
@@ -3,10 +3,10 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
|
|
5
5
|
import "./transformers-C3FLHUd6.js";
|
|
6
|
-
import "./http-
|
|
7
|
-
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "./middleware-
|
|
8
|
-
import "./proof-
|
|
6
|
+
import "./http-By_H0O72.js";
|
|
7
|
+
import { ContextImpl, FederationImpl, InboxContextImpl, KvSpecDeterminer, createFederation } from "./middleware-BGyIdScH.js";
|
|
8
|
+
import "./proof-BjkALaaN.js";
|
|
9
9
|
import "./types-C93Ob9cU.js";
|
|
10
|
-
import "./kv-cache-
|
|
10
|
+
import "./kv-cache-D52g2dca.js";
|
|
11
11
|
|
|
12
12
|
export { FederationImpl };
|
|
@@ -3,24 +3,24 @@
|
|
|
3
3
|
import { URLPattern } from "urlpattern-polyfill";
|
|
4
4
|
globalThis.addEventListener = () => {};
|
|
5
5
|
|
|
6
|
-
import { deno_default } from "./deno-
|
|
6
|
+
import { deno_default } from "./deno-B0q1E8NY.js";
|
|
7
7
|
import { getNodeInfo } from "./client-Dg7OfUDA.js";
|
|
8
8
|
import { RouterError } from "./router-D9eI0s4b.js";
|
|
9
9
|
import { nodeInfoToJson } from "./types-CPz01LGH.js";
|
|
10
|
-
import { exportJwk, importJwk, validateCryptoKey } from "./key-
|
|
11
|
-
import { verifyRequest } from "./http-
|
|
12
|
-
import { detachSignature, hasSignature, signJsonLd, verifyJsonLd } from "./ld-
|
|
13
|
-
import { doesActorOwnKey, getKeyOwner } from "./owner-
|
|
14
|
-
import { signObject, verifyObject } from "./proof-
|
|
15
|
-
import { getAuthenticatedDocumentLoader } from "./docloader-
|
|
10
|
+
import { exportJwk, importJwk, validateCryptoKey } from "./key-BMhU3DNQ.js";
|
|
11
|
+
import { verifyRequest } from "./http-Bo0uEDb_.js";
|
|
12
|
+
import { detachSignature, hasSignature, signJsonLd, verifyJsonLd } from "./ld-CNISEmdm.js";
|
|
13
|
+
import { doesActorOwnKey, getKeyOwner } from "./owner-EXyCs7TD.js";
|
|
14
|
+
import { signObject, verifyObject } from "./proof-McW2QsQF.js";
|
|
15
|
+
import { getAuthenticatedDocumentLoader } from "./docloader-DVHzcwep.js";
|
|
16
16
|
import { kvCache } from "./kv-cache-B__dHl7g.js";
|
|
17
|
-
import { routeActivity } from "./inbox-
|
|
18
|
-
import { FederationBuilderImpl } from "./builder-
|
|
17
|
+
import { routeActivity } from "./inbox-ehLNpqRT.js";
|
|
18
|
+
import { FederationBuilderImpl } from "./builder-D_bMg0Oj.js";
|
|
19
19
|
import { buildCollectionSynchronizationHeader } from "./collection-CcnIw1qY.js";
|
|
20
20
|
import { KvKeyCache } from "./keycache-DRxpZ5r9.js";
|
|
21
21
|
import { acceptsJsonLd } from "./negotiation-5NPJL6zp.js";
|
|
22
22
|
import { createExponentialBackoffPolicy } from "./retry-D4GJ670a.js";
|
|
23
|
-
import { SendActivityError, extractInboxes, sendActivity } from "./send-
|
|
23
|
+
import { SendActivityError, extractInboxes, sendActivity } from "./send-DCuNY29F.js";
|
|
24
24
|
import { getLogger, withContext } from "@logtape/logtape";
|
|
25
25
|
import { Activity, Collection, CollectionPage, CryptographicKey, Link, Multikey, Object as Object$1, OrderedCollection, OrderedCollectionPage, getTypeId, lookupObject, traverseCollection } from "@fedify/vocab";
|
|
26
26
|
import { getDocumentLoader } from "@fedify/vocab-runtime";
|
|
@@ -182,25 +182,7 @@ async function handleActor(request, { identifier, context: context$1, actorDispa
|
|
|
182
182
|
return await onNotFound(request);
|
|
183
183
|
}
|
|
184
184
|
if (authorizePredicate != null) {
|
|
185
|
-
|
|
186
|
-
key = key?.clone({}, { $warning: {
|
|
187
|
-
category: [
|
|
188
|
-
"fedify",
|
|
189
|
-
"federation",
|
|
190
|
-
"actor"
|
|
191
|
-
],
|
|
192
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
193
|
-
} }) ?? null;
|
|
194
|
-
let keyOwner = await context$1.getSignedKeyOwner();
|
|
195
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
196
|
-
category: [
|
|
197
|
-
"fedify",
|
|
198
|
-
"federation",
|
|
199
|
-
"actor"
|
|
200
|
-
],
|
|
201
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
202
|
-
} }) ?? null;
|
|
203
|
-
if (!await authorizePredicate(context$1, identifier, key, keyOwner)) return await onUnauthorized(request);
|
|
185
|
+
if (!await authorizePredicate(context$1, identifier)) return await onUnauthorized(request);
|
|
204
186
|
}
|
|
205
187
|
const jsonLd = await actor.toJsonLd(context$1);
|
|
206
188
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -220,25 +202,7 @@ async function handleObject(request, { values, context: context$1, objectDispatc
|
|
|
220
202
|
const object = await objectDispatcher(context$1, values);
|
|
221
203
|
if (object == null) return await onNotFound(request);
|
|
222
204
|
if (authorizePredicate != null) {
|
|
223
|
-
|
|
224
|
-
key = key?.clone({}, { $warning: {
|
|
225
|
-
category: [
|
|
226
|
-
"fedify",
|
|
227
|
-
"federation",
|
|
228
|
-
"object"
|
|
229
|
-
],
|
|
230
|
-
message: "The third parameter of ObjectAuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
231
|
-
} }) ?? null;
|
|
232
|
-
let keyOwner = await context$1.getSignedKeyOwner();
|
|
233
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
234
|
-
category: [
|
|
235
|
-
"fedify",
|
|
236
|
-
"federation",
|
|
237
|
-
"object"
|
|
238
|
-
],
|
|
239
|
-
message: "The fourth parameter of ObjectAuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
240
|
-
} }) ?? null;
|
|
241
|
-
if (!await authorizePredicate(context$1, values, key, keyOwner)) return await onUnauthorized(request);
|
|
205
|
+
if (!await authorizePredicate(context$1, values)) return await onUnauthorized(request);
|
|
242
206
|
}
|
|
243
207
|
const jsonLd = await object.toJsonLd(context$1);
|
|
244
208
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -370,25 +334,7 @@ async function handleCollection(request, { name, identifier, uriGetter, filter,
|
|
|
370
334
|
});
|
|
371
335
|
}
|
|
372
336
|
if (collectionCallbacks.authorizePredicate != null) {
|
|
373
|
-
|
|
374
|
-
key = key?.clone({}, { $warning: {
|
|
375
|
-
category: [
|
|
376
|
-
"fedify",
|
|
377
|
-
"federation",
|
|
378
|
-
"collection"
|
|
379
|
-
],
|
|
380
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
381
|
-
} }) ?? null;
|
|
382
|
-
let keyOwner = await context$1.getSignedKeyOwner();
|
|
383
|
-
keyOwner = keyOwner?.clone({}, { $warning: {
|
|
384
|
-
category: [
|
|
385
|
-
"fedify",
|
|
386
|
-
"federation",
|
|
387
|
-
"collection"
|
|
388
|
-
],
|
|
389
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
390
|
-
} }) ?? null;
|
|
391
|
-
if (!await collectionCallbacks.authorizePredicate(context$1, identifier, key, keyOwner)) return await onUnauthorized(request);
|
|
337
|
+
if (!await collectionCallbacks.authorizePredicate(context$1, identifier)) return await onUnauthorized(request);
|
|
392
338
|
}
|
|
393
339
|
const jsonLd = await collection.toJsonLd(context$1);
|
|
394
340
|
return new Response(JSON.stringify(jsonLd), { headers: {
|
|
@@ -1039,28 +985,7 @@ const verifyDefined = (callbacks) => {
|
|
|
1039
985
|
*/
|
|
1040
986
|
const authIfNeeded = async (context$1, values, { authorizePredicate: authorize = void 0 }) => {
|
|
1041
987
|
if (authorize === void 0) return;
|
|
1042
|
-
|
|
1043
|
-
const keyOwner = (await context$1.getSignedKeyOwner())?.clone({}, warning.keyOwner) ?? null;
|
|
1044
|
-
if (!await authorize(context$1, values, key, keyOwner)) throw new UnauthorizedError();
|
|
1045
|
-
};
|
|
1046
|
-
/** Warning messages for `authIfNeeded`. */
|
|
1047
|
-
const warning = {
|
|
1048
|
-
key: { $warning: {
|
|
1049
|
-
category: [
|
|
1050
|
-
"fedify",
|
|
1051
|
-
"federation",
|
|
1052
|
-
"collection"
|
|
1053
|
-
],
|
|
1054
|
-
message: "The third parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKey() method. The third parameter will be removed in a future release."
|
|
1055
|
-
} },
|
|
1056
|
-
keyOwner: { $warning: {
|
|
1057
|
-
category: [
|
|
1058
|
-
"fedify",
|
|
1059
|
-
"federation",
|
|
1060
|
-
"collection"
|
|
1061
|
-
],
|
|
1062
|
-
message: "The fourth parameter of AuthorizePredicate is deprecated in favor of RequestContext.getSignedKeyOwner() method. The fourth parameter will be removed in a future release."
|
|
1063
|
-
} }
|
|
988
|
+
if (!await authorize(context$1, values)) throw new UnauthorizedError();
|
|
1064
989
|
};
|
|
1065
990
|
/**
|
|
1066
991
|
* Appends a cursor parameter to a URL if the cursor exists.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
|
|
2
|
+
const { Temporal } = require("@js-temporal/polyfill");
|
|
3
|
+
const { URLPattern } = require("urlpattern-polyfill");
|
|
4
|
+
|
|
5
|
+
require('./transformers-3g8GZwkZ.cjs');
|
|
6
|
+
require('./http-BlP362Gm.cjs');
|
|
7
|
+
const require_middleware = require('./middleware-B4QI-EQh.cjs');
|
|
8
|
+
require('./proof-CPfoUu8V.cjs');
|
|
9
|
+
require('./types-Cd_hszr_.cjs');
|
|
10
|
+
require('./kv-cache-Dtlo5CfX.cjs');
|
|
11
|
+
|
|
12
|
+
exports.FederationImpl = require_middleware.FederationImpl;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { ActorAliasMapper, ActorDispatcher, ActorHandleMapper, RequestContext, WebFingerLinksDispatcher } from "./context-
|
|
1
|
+
import { ActorAliasMapper, ActorDispatcher, ActorHandleMapper, RequestContext, WebFingerLinksDispatcher } from "./context-D3QkEtZd.cjs";
|
|
2
2
|
import { Span, Tracer } from "@opentelemetry/api";
|
|
3
3
|
|
|
4
4
|
//#region src/federation/webfinger.d.ts
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { Temporal } from "@js-temporal/polyfill";
|
|
2
2
|
import { URLPattern } from "urlpattern-polyfill";
|
|
3
|
-
import { ActorAliasMapper, ActorDispatcher, ActorHandleMapper, RequestContext, WebFingerLinksDispatcher } from "./context-
|
|
3
|
+
import { ActorAliasMapper, ActorDispatcher, ActorHandleMapper, RequestContext, WebFingerLinksDispatcher } from "./context-DZJhUmzF.js";
|
|
4
4
|
import { Span, Tracer } from "@opentelemetry/api";
|
|
5
5
|
|
|
6
6
|
//#region src/federation/webfinger.d.ts
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { Temporal } from "@js-temporal/polyfill";
|
|
2
2
|
import { URLPattern } from "urlpattern-polyfill";
|
|
3
|
-
import { ActivityTransformer, Context } from "./context-
|
|
3
|
+
import { ActivityTransformer, Context } from "./context-DZJhUmzF.js";
|
|
4
4
|
import { Activity } from "@fedify/vocab";
|
|
5
5
|
|
|
6
6
|
//#region src/compat/transformers.d.ts
|
package/dist/mod.cjs
CHANGED
|
@@ -5,12 +5,12 @@
|
|
|
5
5
|
const require_chunk = require('./chunk-CGaQZ11T.cjs');
|
|
6
6
|
const require_transformers = require('./transformers-3g8GZwkZ.cjs');
|
|
7
7
|
require('./compat-DmDDELst.cjs');
|
|
8
|
-
const require_http = require('./http-
|
|
9
|
-
const require_middleware = require('./middleware-
|
|
10
|
-
const require_proof = require('./proof-
|
|
8
|
+
const require_http = require('./http-BlP362Gm.cjs');
|
|
9
|
+
const require_middleware = require('./middleware-B4QI-EQh.cjs');
|
|
10
|
+
const require_proof = require('./proof-CPfoUu8V.cjs');
|
|
11
11
|
const require_federation = require('./federation-Bp3HI26G.cjs');
|
|
12
12
|
const require_types = require('./types-Cd_hszr_.cjs');
|
|
13
|
-
const require_kv_cache = require('./kv-cache-
|
|
13
|
+
const require_kv_cache = require('./kv-cache-Dtlo5CfX.cjs');
|
|
14
14
|
require('./nodeinfo-DuMYTpbZ.cjs');
|
|
15
15
|
const require_runtime = require('./runtime-c2Njxsry.cjs');
|
|
16
16
|
require('./sig-vX39WyWI.cjs');
|
package/dist/mod.d.cts
CHANGED
|
@@ -2,10 +2,10 @@ import { __export, __reExport, mod_d_exports } from "./mod-Bh8mqlYw.cjs";
|
|
|
2
2
|
import { GetNodeInfoOptions, InboundService, JsonValue, NodeInfo, OutboundService, ParseNodeInfoOptions, Protocol, Services, Software, Usage, getNodeInfo, nodeInfoToJson, parseNodeInfo } from "./client-C97KOq3x.cjs";
|
|
3
3
|
import { FetchKeyOptions, FetchKeyResult, HttpMessageSignaturesSpec, HttpMessageSignaturesSpecDeterminer, KeyCache, SignRequestOptions, VerifyRequestOptions, exportJwk, fetchKey, generateCryptoKeyPair, importJwk, signRequest, verifyRequest } from "./http-Cz3MlXAZ.cjs";
|
|
4
4
|
import { DoesActorOwnKeyOptions, GetKeyOwnerOptions, doesActorOwnKey, getKeyOwner } from "./owner-1AbPBOOZ.cjs";
|
|
5
|
-
import { ActivityTransformer, ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, IdempotencyKeyCallback, IdempotencyStrategy, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, OutboxPermanentFailureHandler, PageItems, ParallelMessageQueue, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, Rfc6570Expression, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityError, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "./context-
|
|
5
|
+
import { ActivityTransformer, ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, IdempotencyKeyCallback, IdempotencyStrategy, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, OutboxPermanentFailureHandler, PageItems, ParallelMessageQueue, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, Rfc6570Expression, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityError, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "./context-D3QkEtZd.cjs";
|
|
6
6
|
import { KvKey, KvStore, KvStoreListEntry, KvStoreSetOptions, MemoryKvStore } from "./kv-BL4nlICN.cjs";
|
|
7
|
-
import { actorDehydrator, autoIdAssigner, getDefaultActivityTransformers } from "./mod-
|
|
8
|
-
import { WebFingerHandlerParameters, handleWebFinger } from "./mod-
|
|
7
|
+
import { actorDehydrator, autoIdAssigner, getDefaultActivityTransformers } from "./mod-DVwHUI_x.cjs";
|
|
8
|
+
import { WebFingerHandlerParameters, handleWebFinger } from "./mod-Di3W5OdP.cjs";
|
|
9
9
|
import "./mod-gq_Xfdz8.cjs";
|
|
10
10
|
import { CreateProofOptions, CreateSignatureOptions, SignJsonLdOptions, SignObjectOptions, VerifyJsonLdOptions, VerifyObjectOptions, VerifyProofOptions, VerifySignatureOptions, attachSignature, createProof, createSignature, detachSignature, signJsonLd, signObject, verifyJsonLd, verifyObject, verifyProof, verifySignature } from "./mod-DPkRU3EK.cjs";
|
|
11
11
|
import { getAuthenticatedDocumentLoader, kvCache } from "./mod-DXsQakeS.cjs";
|
package/dist/mod.d.ts
CHANGED
|
@@ -4,10 +4,10 @@ import { __export, __reExport } from "./chunk-DJNbSFdH.js";
|
|
|
4
4
|
import { GetNodeInfoOptions, InboundService, JsonValue, NodeInfo, OutboundService, ParseNodeInfoOptions, Protocol, Services, Software, Usage, getNodeInfo, nodeInfoToJson, parseNodeInfo } from "./client-BxMZiQaD.js";
|
|
5
5
|
import { FetchKeyOptions, FetchKeyResult, HttpMessageSignaturesSpec, HttpMessageSignaturesSpecDeterminer, KeyCache, SignRequestOptions, VerifyRequestOptions, exportJwk, fetchKey, generateCryptoKeyPair, importJwk, signRequest, verifyRequest } from "./http-DkHdFfrc.js";
|
|
6
6
|
import { DoesActorOwnKeyOptions, GetKeyOwnerOptions, doesActorOwnKey, getKeyOwner } from "./owner-gd0Q9FuU.js";
|
|
7
|
-
import { ActivityTransformer, ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, IdempotencyKeyCallback, IdempotencyStrategy, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, OutboxPermanentFailureHandler, PageItems, ParallelMessageQueue, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, Rfc6570Expression, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityError, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "./context-
|
|
7
|
+
import { ActivityTransformer, ActorAliasMapper, ActorCallbackSetters, ActorDispatcher, ActorHandleMapper, ActorKeyPair, ActorKeyPairsDispatcher, AuthorizePredicate, CollectionCallbackSetters, CollectionCounter, CollectionCursor, CollectionDispatcher, ConstructorWithTypeId, Context, CreateExponentialBackoffPolicyOptions, CustomCollectionCallbackSetters, CustomCollectionCounter, CustomCollectionCursor, CustomCollectionDispatcher, Federatable, Federation, FederationBuilder, FederationFetchOptions, FederationKvPrefixes, FederationOptions, FederationOrigin, FederationQueueOptions, FederationStartQueueOptions, ForwardActivityOptions, GetSignedKeyOptions, IdempotencyKeyCallback, IdempotencyStrategy, InProcessMessageQueue, InProcessMessageQueueOptions, InboxContext, InboxErrorHandler, InboxListener, InboxListenerSetters, Message, MessageQueue, MessageQueueEnqueueOptions, MessageQueueListenOptions, NodeInfoDispatcher, ObjectAuthorizePredicate, ObjectCallbackSetters, ObjectDispatcher, OutboxErrorHandler, OutboxPermanentFailureHandler, PageItems, ParallelMessageQueue, ParseUriResult, RequestContext, RespondWithObjectOptions, RetryContext, RetryPolicy, Rfc6570Expression, RouteActivityOptions, Router, RouterError, RouterOptions, RouterRouteResult, SendActivityError, SendActivityOptions, SendActivityOptionsForCollection, SenderKeyPair, SharedInboxKeyDispatcher, WebFingerLinksDispatcher, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, respondWithObject, respondWithObjectIfAcceptable } from "./context-DZJhUmzF.js";
|
|
8
8
|
import { KvKey, KvStore, KvStoreListEntry, KvStoreSetOptions, MemoryKvStore } from "./kv-DXEUEP6z.js";
|
|
9
|
-
import { actorDehydrator, autoIdAssigner, getDefaultActivityTransformers } from "./mod-
|
|
10
|
-
import { WebFingerHandlerParameters, handleWebFinger } from "./mod-
|
|
9
|
+
import { actorDehydrator, autoIdAssigner, getDefaultActivityTransformers } from "./mod-DosD6NsG.js";
|
|
10
|
+
import { WebFingerHandlerParameters, handleWebFinger } from "./mod-DnSsduJF.js";
|
|
11
11
|
import "./mod-AGjRfPjT.js";
|
|
12
12
|
import { mod_d_exports } from "./mod-D6HodEq7.js";
|
|
13
13
|
import { CreateProofOptions, CreateSignatureOptions, SignJsonLdOptions, SignObjectOptions, VerifyJsonLdOptions, VerifyObjectOptions, VerifyProofOptions, VerifySignatureOptions, attachSignature, createProof, createSignature, detachSignature, signJsonLd, signObject, verifyJsonLd, verifyObject, verifyProof, verifySignature } from "./mod-DUWcVv49.js";
|
package/dist/mod.js
CHANGED
|
@@ -5,12 +5,12 @@
|
|
|
5
5
|
import { __export, __reExport } from "./chunk-DJNbSFdH.js";
|
|
6
6
|
import { actorDehydrator, autoIdAssigner, getDefaultActivityTransformers } from "./transformers-C3FLHUd6.js";
|
|
7
7
|
import "./compat-Bb4NuTUO.js";
|
|
8
|
-
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, signRequest, verifyRequest } from "./http-
|
|
9
|
-
import { Router, RouterError, SendActivityError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, handleWebFinger, respondWithObject, respondWithObjectIfAcceptable } from "./middleware-
|
|
10
|
-
import { attachSignature, createProof, createSignature, detachSignature, doesActorOwnKey, getKeyOwner, signJsonLd, signObject, verifyJsonLd, verifyObject, verifyProof, verifySignature } from "./proof-
|
|
8
|
+
import { exportJwk, fetchKey, generateCryptoKeyPair, importJwk, signRequest, verifyRequest } from "./http-By_H0O72.js";
|
|
9
|
+
import { Router, RouterError, SendActivityError, buildCollectionSynchronizationHeader, createExponentialBackoffPolicy, createFederation, createFederationBuilder, digest, handleWebFinger, respondWithObject, respondWithObjectIfAcceptable } from "./middleware-BGyIdScH.js";
|
|
10
|
+
import { attachSignature, createProof, createSignature, detachSignature, doesActorOwnKey, getKeyOwner, signJsonLd, signObject, verifyJsonLd, verifyObject, verifyProof, verifySignature } from "./proof-BjkALaaN.js";
|
|
11
11
|
import { InProcessMessageQueue, MemoryKvStore, ParallelMessageQueue } from "./federation-DaMfqRm4.js";
|
|
12
12
|
import { getNodeInfo, nodeInfoToJson, parseNodeInfo } from "./types-C93Ob9cU.js";
|
|
13
|
-
import { getAuthenticatedDocumentLoader, kvCache } from "./kv-cache-
|
|
13
|
+
import { getAuthenticatedDocumentLoader, kvCache } from "./kv-cache-D52g2dca.js";
|
|
14
14
|
import "./nodeinfo-DoESQxq5.js";
|
|
15
15
|
import { runtime_exports } from "./runtime-poamPCMb.js";
|
|
16
16
|
import "./sig-BNhspNOf.js";
|