@helia/verified-fetch 0.0.0-f58d467 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/README.md +285 -25
  2. package/dist/index.min.js +7 -4
  3. package/dist/src/index.d.ts +285 -25
  4. package/dist/src/index.d.ts.map +1 -1
  5. package/dist/src/index.js +267 -25
  6. package/dist/src/index.js.map +1 -1
  7. package/dist/src/types.d.ts +2 -0
  8. package/dist/src/types.d.ts.map +1 -0
  9. package/dist/src/types.js +2 -0
  10. package/dist/src/types.js.map +1 -0
  11. package/dist/src/utils/dag-cbor-to-safe-json.d.ts +7 -0
  12. package/dist/src/utils/dag-cbor-to-safe-json.d.ts.map +1 -0
  13. package/dist/src/utils/dag-cbor-to-safe-json.js +37 -0
  14. package/dist/src/utils/dag-cbor-to-safe-json.js.map +1 -0
  15. package/dist/src/utils/get-content-disposition-filename.d.ts +6 -0
  16. package/dist/src/utils/get-content-disposition-filename.d.ts.map +1 -0
  17. package/dist/src/utils/get-content-disposition-filename.js +16 -0
  18. package/dist/src/utils/get-content-disposition-filename.js.map +1 -0
  19. package/dist/src/utils/get-e-tag.d.ts +28 -0
  20. package/dist/src/utils/get-e-tag.d.ts.map +1 -0
  21. package/dist/src/utils/get-e-tag.js +18 -0
  22. package/dist/src/utils/get-e-tag.js.map +1 -0
  23. package/dist/src/utils/get-tar-stream.d.ts +4 -0
  24. package/dist/src/utils/get-tar-stream.d.ts.map +1 -0
  25. package/dist/src/utils/get-tar-stream.js +46 -0
  26. package/dist/src/utils/get-tar-stream.js.map +1 -0
  27. package/dist/src/utils/parse-url-string.d.ts +7 -1
  28. package/dist/src/utils/parse-url-string.d.ts.map +1 -1
  29. package/dist/src/utils/parse-url-string.js +6 -0
  30. package/dist/src/utils/parse-url-string.js.map +1 -1
  31. package/dist/src/utils/responses.d.ts +5 -0
  32. package/dist/src/utils/responses.d.ts.map +1 -0
  33. package/dist/src/utils/responses.js +27 -0
  34. package/dist/src/utils/responses.js.map +1 -0
  35. package/dist/src/utils/select-output-type.d.ts +12 -0
  36. package/dist/src/utils/select-output-type.d.ts.map +1 -0
  37. package/dist/src/utils/select-output-type.js +148 -0
  38. package/dist/src/utils/select-output-type.js.map +1 -0
  39. package/dist/src/verified-fetch.d.ts +19 -26
  40. package/dist/src/verified-fetch.d.ts.map +1 -1
  41. package/dist/src/verified-fetch.js +261 -142
  42. package/dist/src/verified-fetch.js.map +1 -1
  43. package/dist/typedoc-urls.json +27 -0
  44. package/package.json +49 -112
  45. package/src/index.ts +290 -29
  46. package/src/types.ts +1 -0
  47. package/src/utils/dag-cbor-to-safe-json.ts +44 -0
  48. package/src/utils/get-content-disposition-filename.ts +18 -0
  49. package/src/utils/get-e-tag.ts +36 -0
  50. package/src/utils/get-tar-stream.ts +68 -0
  51. package/src/utils/parse-url-string.ts +17 -2
  52. package/src/utils/responses.ts +29 -0
  53. package/src/utils/select-output-type.ts +167 -0
  54. package/src/verified-fetch.ts +310 -154
package/package.json CHANGED
@@ -1,15 +1,15 @@
1
1
  {
2
2
  "name": "@helia/verified-fetch",
3
- "version": "0.0.0-f58d467",
4
- "description": "A fetch-like API for obtaining verified & trustless IPFS content on the web.",
3
+ "version": "1.0.0",
4
+ "description": "A fetch-like API for obtaining verified & trustless IPFS content on the web",
5
5
  "license": "Apache-2.0 OR MIT",
6
- "homepage": "https://github.com/ipfs/helia/tree/main/packages/verified-fetch#readme",
6
+ "homepage": "https://github.com/ipfs/helia-verified-fetch/tree/main/packages/verified-fetch#readme",
7
7
  "repository": {
8
8
  "type": "git",
9
- "url": "git+https://github.com/ipfs/helia.git"
9
+ "url": "git+https://github.com/ipfs/helia-verified-fetch.git"
10
10
  },
11
11
  "bugs": {
12
- "url": "https://github.com/ipfs/helia/issues"
12
+ "url": "https://github.com/ipfs/helia-verified-fetch/issues"
13
13
  },
14
14
  "publishConfig": {
15
15
  "access": "public",
@@ -41,95 +41,11 @@
41
41
  "sourceType": "module"
42
42
  }
43
43
  },
44
- "release": {
45
- "branches": [
46
- "main"
47
- ],
48
- "plugins": [
49
- [
50
- "@semantic-release/commit-analyzer",
51
- {
52
- "preset": "conventionalcommits",
53
- "releaseRules": [
54
- {
55
- "breaking": true,
56
- "release": "major"
57
- },
58
- {
59
- "revert": true,
60
- "release": "patch"
61
- },
62
- {
63
- "type": "feat",
64
- "release": "minor"
65
- },
66
- {
67
- "type": "fix",
68
- "release": "patch"
69
- },
70
- {
71
- "type": "docs",
72
- "release": "patch"
73
- },
74
- {
75
- "type": "test",
76
- "release": "patch"
77
- },
78
- {
79
- "type": "deps",
80
- "release": "patch"
81
- },
82
- {
83
- "scope": "no-release",
84
- "release": false
85
- }
86
- ]
87
- }
88
- ],
89
- [
90
- "@semantic-release/release-notes-generator",
91
- {
92
- "preset": "conventionalcommits",
93
- "presetConfig": {
94
- "types": [
95
- {
96
- "type": "feat",
97
- "section": "Features"
98
- },
99
- {
100
- "type": "fix",
101
- "section": "Bug Fixes"
102
- },
103
- {
104
- "type": "chore",
105
- "section": "Trivial Changes"
106
- },
107
- {
108
- "type": "docs",
109
- "section": "Documentation"
110
- },
111
- {
112
- "type": "deps",
113
- "section": "Dependencies"
114
- },
115
- {
116
- "type": "test",
117
- "section": "Tests"
118
- }
119
- ]
120
- }
121
- }
122
- ],
123
- "@semantic-release/changelog",
124
- "@semantic-release/npm",
125
- "@semantic-release/github",
126
- "@semantic-release/git"
127
- ]
128
- },
129
44
  "scripts": {
130
45
  "clean": "aegir clean",
131
46
  "lint": "aegir lint",
132
47
  "dep-check": "aegir dep-check",
48
+ "doc-check": "aegir doc-check",
133
49
  "build": "aegir build",
134
50
  "test": "aegir test",
135
51
  "test:chrome": "aegir test -t browser --cov",
@@ -141,36 +57,57 @@
141
57
  "release": "aegir release"
142
58
  },
143
59
  "dependencies": {
144
- "@helia/block-brokers": "2.0.1-f58d467",
145
- "@helia/dag-cbor": "3.0.0-f58d467",
146
- "@helia/dag-json": "3.0.0-f58d467",
147
- "@helia/http": "1.0.1-f58d467",
148
- "@helia/interface": "4.0.0-f58d467",
149
- "@helia/ipns": "6.0.0-f58d467",
150
- "@helia/json": "3.0.0-f58d467",
151
- "@helia/routers": "1.0.0-f58d467",
152
- "@helia/unixfs": "3.0.0-f58d467",
153
- "@ipld/dag-cbor": "^9.1.0",
154
- "@ipld/dag-json": "^10.1.7",
155
- "@ipld/dag-pb": "^4.0.8",
156
- "@libp2p/interface": "^1.1.2",
157
- "@libp2p/peer-id": "^4.0.5",
60
+ "@helia/block-brokers": "^2.0.2",
61
+ "@helia/car": "^3.1.0",
62
+ "@helia/http": "^1.0.2",
63
+ "@helia/interface": "^4.0.1",
64
+ "@helia/ipns": "^6.0.1",
65
+ "@helia/routers": "^1.0.1",
66
+ "@helia/unixfs": "^3.0.1",
67
+ "@ipld/dag-cbor": "^9.2.0",
68
+ "@ipld/dag-json": "^10.2.0",
69
+ "@ipld/dag-pb": "^4.1.0",
70
+ "@libp2p/interface": "^1.1.4",
71
+ "@libp2p/kad-dht": "^12.0.8",
72
+ "@libp2p/peer-id": "^4.0.7",
73
+ "cborg": "^4.0.9",
158
74
  "hashlru": "^2.3.0",
75
+ "interface-blockstore": "^5.2.10",
76
+ "interface-datastore": "^8.2.11",
159
77
  "ipfs-unixfs-exporter": "^13.5.0",
160
- "multiformats": "^13.0.1",
161
- "progress-events": "^1.0.0"
78
+ "it-map": "^3.0.5",
79
+ "it-pipe": "^3.0.1",
80
+ "it-tar": "^6.0.5",
81
+ "it-to-browser-readablestream": "^2.0.6",
82
+ "multiformats": "^13.1.0",
83
+ "progress-events": "^1.0.0",
84
+ "uint8arrays": "^5.0.2"
162
85
  },
163
86
  "devDependencies": {
164
- "@libp2p/logger": "^4.0.5",
165
- "@libp2p/peer-id-factory": "^4.0.5",
87
+ "@helia/car": "^3.1.0",
88
+ "@helia/dag-cbor": "^3.0.1",
89
+ "@helia/dag-json": "^3.0.1",
90
+ "@helia/json": "^3.0.1",
91
+ "@helia/utils": "^0.0.2",
92
+ "@ipld/car": "^5.3.0",
93
+ "@libp2p/logger": "^4.0.7",
94
+ "@libp2p/peer-id-factory": "^4.0.7",
166
95
  "@sgtpooki/file-type": "^1.0.1",
167
96
  "@types/sinon": "^17.0.3",
168
- "aegir": "^42.2.2",
169
- "helia": "4.0.1-f58d467",
97
+ "aegir": "^42.2.5",
98
+ "blockstore-core": "^4.4.0",
99
+ "browser-readablestream-to-it": "^2.0.5",
100
+ "datastore-core": "^9.2.9",
101
+ "helia": "^4.0.2",
102
+ "ipfs-unixfs-importer": "^15.2.4",
103
+ "ipns": "^9.0.0",
104
+ "it-all": "^3.0.4",
105
+ "it-last": "^3.0.4",
106
+ "it-to-buffer": "^4.0.5",
170
107
  "magic-bytes.js": "^1.8.0",
108
+ "p-defer": "^4.0.0",
171
109
  "sinon": "^17.0.1",
172
- "sinon-ts": "^2.0.0",
173
- "uint8arrays": "^5.0.1"
110
+ "sinon-ts": "^2.0.0"
174
111
  },
175
112
  "sideEffects": false
176
113
  }
package/src/index.ts CHANGED
@@ -3,7 +3,7 @@
3
3
  *
4
4
  * `@helia/verified-fetch` provides a [fetch](https://developer.mozilla.org/en-US/docs/Web/API/Fetch_API)-like API for retrieving content from the [IPFS](https://ipfs.tech/) network.
5
5
  *
6
- * All content is retrieved in a [trustless manner](https://www.techopedia.com/definition/trustless), and the integrity of all bytes are verified by comparing hashes of the data.
6
+ * All content is retrieved in a [trustless manner](https://www.techopedia.com/definition/trustless), and the integrity of all bytes are verified by comparing hashes of the data. By default, CIDs are retrieved over HTTP from [trustless gateways](https://specs.ipfs.tech/http-gateways/trustless-gateway/).
7
7
  *
8
8
  * This is a marked improvement over `fetch` which offers no such protections and is vulnerable to all sorts of attacks like [Content Spoofing](https://owasp.org/www-community/attacks/Content_Spoofing), [DNS Hijacking](https://en.wikipedia.org/wiki/DNS_hijacking), etc.
9
9
  *
@@ -33,7 +33,7 @@
33
33
  * import { verifiedFetch } from '@helia/verified-fetch'
34
34
  * import { CID } from 'multiformats/cid'
35
35
  *
36
- * const cid = CID.parse('bafyFoo') // some image file
36
+ * const cid = CID.parse('bafyFoo') // some json file
37
37
  * const response = await verifiedFetch(cid)
38
38
  * const json = await response.json()
39
39
  * ```
@@ -56,7 +56,7 @@
56
56
  * import { verifiedFetch } from '@helia/verified-fetch'
57
57
  *
58
58
  * const response = await verifiedFetch('ipns://mydomain.com/path/to/very-long-file.log')
59
- * const bigFileStreamReader = await response.body.getReader()
59
+ * const bigFileStreamReader = await response.body?.getReader()
60
60
  * ```
61
61
  *
62
62
  * ## Configuration
@@ -73,8 +73,8 @@
73
73
  * import { createVerifiedFetch } from '@helia/verified-fetch'
74
74
  *
75
75
  * const fetch = await createVerifiedFetch({
76
- * gateways: ['https://trustless-gateway.link'],
77
- * routers: ['http://delegated-ipfs.dev']
76
+ * gateways: ['https://trustless-gateway.link'],
77
+ * routers: ['http://delegated-ipfs.dev']
78
78
  * })
79
79
  *
80
80
  * const resp = await fetch('ipfs://bafy...')
@@ -98,13 +98,13 @@
98
98
  *
99
99
  * const fetch = await createVerifiedFetch(
100
100
  * await createHeliaHTTP({
101
- * blockBrokers: [
102
- * trustlessGateway({
103
- * gateways: ['https://mygateway.example.net', 'https://trustless-gateway.link']
104
- * })
105
- * ],
106
- * routers: ['http://delegated-ipfs.dev'].map((routerUrl) => delegatedHTTPRouting(routerUrl))
107
- * })
101
+ * blockBrokers: [
102
+ * trustlessGateway({
103
+ * gateways: ['https://mygateway.example.net', 'https://trustless-gateway.link']
104
+ * })
105
+ * ],
106
+ * routers: ['http://delegated-ipfs.dev'].map((routerUrl) => delegatedHTTPRouting(routerUrl))
107
+ * })
108
108
  * )
109
109
  *
110
110
  * const resp = await fetch('ipfs://bafy...')
@@ -114,7 +114,7 @@
114
114
  *
115
115
  * ### Custom content-type parsing
116
116
  *
117
- * By default, `@helia/verified-fetch` sets the `Content-Type` header as `application/octet-stream` - this is because the `.json()`, `.text()`, `.blob()`, and `.arrayBuffer()` methods will usually work as expected without a detailed content type.
117
+ * By default, if the response can be parsed as JSON, `@helia/verified-fetch` sets the `Content-Type` header as `application/json`, otherwise it sets it as `application/octet-stream` - this is because the `.json()`, `.text()`, `.blob()`, and `.arrayBuffer()` methods will usually work as expected without a detailed content type.
118
118
  *
119
119
  * If you require an accurate content-type you can provide a `contentTypeParser` function as an option to `createVerifiedFetch` to handle parsing the content type.
120
120
  *
@@ -127,16 +127,258 @@
127
127
  * import { fileTypeFromBuffer } from '@sgtpooki/file-type'
128
128
  *
129
129
  * const fetch = await createVerifiedFetch({
130
- * gateways: ['https://trustless-gateway.link'],
131
- * routers: ['http://delegated-ipfs.dev'],
132
- * contentTypeParser: async (bytes) => {
133
- * // call to some magic-byte recognition library like magic-bytes, file-type, or your own custom byte recognition
134
- * const result = await fileTypeFromBuffer(bytes)
135
- * return result?.mime
136
- * }
130
+ * gateways: ['https://trustless-gateway.link'],
131
+ * routers: ['http://delegated-ipfs.dev']
132
+ * }, {
133
+ * contentTypeParser: async (bytes) => {
134
+ * // call to some magic-byte recognition library like magic-bytes, file-type, or your own custom byte recognition
135
+ * const result = await fileTypeFromBuffer(bytes)
136
+ * return result?.mime
137
+ * }
137
138
  * })
138
139
  * ```
139
140
  *
141
+ * ### Custom DNS resolvers
142
+ *
143
+ * If you don't want to leak DNS queries to the default resolvers, you can provide your own list of DNS resolvers to `createVerifiedFetch`.
144
+ *
145
+ * Note that you do not need to provide both a DNS-over-HTTPS and a DNS-over-JSON resolver, and you should prefer `dnsJsonOverHttps` resolvers for usage in the browser for a smaller bundle size. See https://github.com/ipfs/helia/tree/main/packages/ipns#example---using-dns-json-over-https for more information.
146
+ *
147
+ * @example Customizing DNS resolvers
148
+ *
149
+ * ```typescript
150
+ * import { createVerifiedFetch } from '@helia/verified-fetch'
151
+ * import { dnsJsonOverHttps, dnsOverHttps } from '@helia/ipns/dns-resolvers'
152
+ *
153
+ * const fetch = await createVerifiedFetch({
154
+ * gateways: ['https://trustless-gateway.link'],
155
+ * routers: ['http://delegated-ipfs.dev'],
156
+ * dnsResolvers: [
157
+ * dnsJsonOverHttps('https://my-dns-resolver.example.com/dns-json'),
158
+ * dnsOverHttps('https://my-dns-resolver.example.com/dns-query')
159
+ * ]
160
+ * })
161
+ * ```
162
+ *
163
+ * ### IPLD codec handling
164
+ *
165
+ * IPFS supports several data formats (typically referred to as codecs) which are included in the CID. `@helia/verified-fetch` attempts to abstract away some of the details for easier consumption.
166
+ *
167
+ * #### DAG-PB
168
+ *
169
+ * [DAG-PB](https://ipld.io/docs/codecs/known/dag-pb/) is the codec we are most likely to encounter, it is what [UnixFS](https://github.com/ipfs/specs/blob/main/UNIXFS.md) uses under the hood.
170
+ *
171
+ * ##### Using the DAG-PB codec as a Blob
172
+ *
173
+ * ```typescript
174
+ * import { verifiedFetch } from '@helia/verified-fetch'
175
+ *
176
+ * const res = await verifiedFetch('ipfs://Qmfoo')
177
+ * const blob = await res.blob()
178
+ *
179
+ * console.info(blob) // Blob { size: x, type: 'application/octet-stream' }
180
+ * ```
181
+ *
182
+ * ##### Using the DAG-PB codec as an ArrayBuffer
183
+ *
184
+ * ```typescript
185
+ * import { verifiedFetch } from '@helia/verified-fetch'
186
+ *
187
+ * const res = await verifiedFetch('ipfs://Qmfoo')
188
+ * const buf = await res.arrayBuffer()
189
+ *
190
+ * console.info(buf) // ArrayBuffer { [Uint8Contents]: < ... >, byteLength: x }
191
+ * ```
192
+ *
193
+ * ##### Using the DAG-PB codec as a stream
194
+ *
195
+ * ```typescript
196
+ * import { verifiedFetch } from '@helia/verified-fetch'
197
+ *
198
+ * const res = await verifiedFetch('ipfs://Qmfoo')
199
+ * const reader = res.body?.getReader()
200
+ *
201
+ * if (reader == null) {
202
+ * throw new Error('Could not create reader from response body')
203
+ * }
204
+ *
205
+ * while (true) {
206
+ * const next = await reader.read()
207
+ *
208
+ * if (next?.done === true) {
209
+ * break
210
+ * }
211
+ *
212
+ * if (next?.value != null) {
213
+ * console.info(next.value) // Uint8Array(x) [ ... ]
214
+ * }
215
+ * }
216
+ * ```
217
+ *
218
+ * ##### Content-Type
219
+ *
220
+ * When fetching `DAG-PB` data, the content type will be set to `application/octet-stream` unless a custom content-type parser is configured.
221
+ *
222
+ * #### JSON
223
+ *
224
+ * The JSON codec is a very simple codec, a block parseable with this codec is a JSON string encoded into a `Uint8Array`.
225
+ *
226
+ * ##### Using the JSON codec
227
+ *
228
+ * ```typescript
229
+ * import * as json from 'multiformats/codecs/json'
230
+ *
231
+ * const block = new TextEncoder().encode('{ "hello": "world" }')
232
+ * const obj = json.decode(block)
233
+ *
234
+ * console.info(obj) // { hello: 'world' }
235
+ * ```
236
+ *
237
+ * ##### Content-Type
238
+ *
239
+ * When the `JSON` codec is encountered, the `Content-Type` header of the response will be set to `application/json`.
240
+ *
241
+ * ### DAG-JSON
242
+ *
243
+ * [DAG-JSON](https://ipld.io/docs/codecs/known/dag-json/) expands on the `JSON` codec, adding the ability to contain [CID](https://docs.ipfs.tech/concepts/content-addressing/)s which act as links to other blocks, and byte arrays.
244
+ *
245
+ * `CID`s and byte arrays are represented using special object structures with a single `"/"` property.
246
+ *
247
+ * Using `DAG-JSON` has two important caveats:
248
+ *
249
+ * 1. Your `JSON` structure cannot contain an object with only a `"/"` property, as it will be interpreted as a special type.
250
+ * 2. Since `JSON` has no technical limit on number sizes, `DAG-JSON` also allows numbers larger than `Number.MAX_SAFE_INTEGER`. JavaScript requires use of `BigInt`s to represent numbers larger than this, and `JSON.parse` does not support them, so precision will be lost.
251
+ *
252
+ * Otherwise this codec follows the same rules as the `JSON` codec.
253
+ *
254
+ * ##### Using the DAG-JSON codec
255
+ *
256
+ * ```typescript
257
+ * import * as dagJson from '@ipld/dag-json'
258
+ *
259
+ * const block = new TextEncoder().encode(`{
260
+ * "hello": "world",
261
+ * "cid": {
262
+ * "/": "baeaaac3imvwgy3zao5xxe3de"
263
+ * },
264
+ * "buf": {
265
+ * "/": {
266
+ * "bytes": "AAECAwQ"
267
+ * }
268
+ * }
269
+ * }`)
270
+ *
271
+ * const obj = dagJson.decode(block)
272
+ *
273
+ * console.info(obj)
274
+ * // {
275
+ * // hello: 'world',
276
+ * // cid: CID(baeaaac3imvwgy3zao5xxe3de),
277
+ * // buf: Uint8Array(5) [ 0, 1, 2, 3, 4 ]
278
+ * // }
279
+ * ```
280
+ *
281
+ * ##### Content-Type
282
+ *
283
+ * When the `DAG-JSON` codec is encountered in the requested CID, the `Content-Type` header of the response will be set to `application/json`.
284
+ *
285
+ * `DAG-JSON` data can be parsed from the response by using the `.json()` function, which will return `CID`s/byte arrays as plain `{ "/": ... }` objects:
286
+ *
287
+ * ```typescript
288
+ * import { verifiedFetch } from '@helia/verified-fetch'
289
+ * import * as dagJson from '@ipld/dag-json'
290
+ *
291
+ * const res = await verifiedFetch('ipfs://bafyDAGJSON')
292
+ *
293
+ * // either:
294
+ * const obj = await res.json()
295
+ * console.info(obj.cid) // { "/": "baeaaac3imvwgy3zao5xxe3de" }
296
+ * console.info(obj.buf) // { "/": { "bytes": "AAECAwQ" } }
297
+ * ```
298
+ *
299
+ * Alternatively, it can be decoded using the `@ipld/dag-json` module and the `.arrayBuffer()` method, in which case you will get `CID` objects and `Uint8Array`s:
300
+ *
301
+ *```typescript
302
+ * import { verifiedFetch } from '@helia/verified-fetch'
303
+ * import * as dagJson from '@ipld/dag-json'
304
+ *
305
+ * const res = await verifiedFetch('ipfs://bafyDAGJSON')
306
+ *
307
+ * // or:
308
+ * const obj = dagJson.decode<any>(await res.arrayBuffer())
309
+ * console.info(obj.cid) // CID(baeaaac3imvwgy3zao5xxe3de)
310
+ * console.info(obj.buf) // Uint8Array(5) [ 0, 1, 2, 3, 4 ]
311
+ * ```
312
+ *
313
+ * #### DAG-CBOR
314
+ *
315
+ * [DAG-CBOR](https://ipld.io/docs/codecs/known/dag-cbor/) uses the [Concise Binary Object Representation](https://cbor.io/) format for serialization instead of JSON.
316
+ *
317
+ * This supports more datatypes in a safer way than JSON and is smaller on the wire to boot so is usually preferable to JSON or DAG-JSON.
318
+ *
319
+ * ##### Content-Type
320
+ *
321
+ * Not all data types supported by `DAG-CBOR` can be successfully turned into JSON and back into the same binary form.
322
+ *
323
+ * When a decoded block can be round-tripped to JSON, the `Content-Type` will be set to `application/json`. In this case the `.json()` method on the `Response` object can be used to obtain an object representation of the response.
324
+ *
325
+ * When it cannot, the `Content-Type` will be `application/octet-stream` - in this case the `@ipld/dag-json` module must be used to deserialize the return value from `.arrayBuffer()`.
326
+ *
327
+ * ##### Detecting JSON-safe DAG-CBOR
328
+ *
329
+ * If the `Content-Type` header of the response is `application/json`, the `.json()` method may be used to access the response body in object form, otherwise the `.arrayBuffer()` method must be used to decode the raw bytes using the `@ipld/dag-cbor` module.
330
+ *
331
+ * ```typescript
332
+ * import { verifiedFetch } from '@helia/verified-fetch'
333
+ * import * as dagCbor from '@ipld/dag-cbor'
334
+ *
335
+ * const res = await verifiedFetch('ipfs://bafyDagCborCID')
336
+ * let obj
337
+ *
338
+ * if (res.headers.get('Content-Type') === 'application/json') {
339
+ * // DAG-CBOR data can be safely decoded as JSON
340
+ * obj = await res.json()
341
+ * } else {
342
+ * // response contains non-JSON friendly data types
343
+ * obj = dagCbor.decode(await res.arrayBuffer())
344
+ * }
345
+ *
346
+ * console.info(obj) // ...
347
+ * ```
348
+ *
349
+ * ## The `Accept` header
350
+ *
351
+ * The `Accept` header can be passed to override certain response processing, or to ensure that the final `Content-Type` of the response is the one that is expected.
352
+ *
353
+ * If the final `Content-Type` does not match the `Accept` header, or if the content cannot be represented in the format dictated by the `Accept` header, or you have configured a custom content type parser, and that parser returns a value that isn't in the accept header, a [406: Not Acceptable](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/406) response will be returned:
354
+ *
355
+ * ```typescript
356
+ * import { verifiedFetch } from '@helia/verified-fetch'
357
+ *
358
+ * const res = await verifiedFetch('ipfs://bafyJPEGImageCID', {
359
+ * headers: {
360
+ * accept: 'image/png'
361
+ * }
362
+ * })
363
+ *
364
+ * console.info(res.status) // 406 - the image was a JPEG but we specified PNG as the accept header
365
+ * ```
366
+ *
367
+ * It can also be used to skip processing the data from some formats such as `DAG-CBOR` if you wish to handle decoding it yourself:
368
+ *
369
+ * ```typescript
370
+ * import { verifiedFetch } from '@helia/verified-fetch'
371
+ *
372
+ * const res = await verifiedFetch('ipfs://bafyDAGCBORCID', {
373
+ * headers: {
374
+ * accept: 'application/octet-stream'
375
+ * }
376
+ * })
377
+ *
378
+ * console.info(res.headers.get('accept')) // application/octet-stream
379
+ * const buf = await res.arrayBuffer() // raw bytes, not processed as JSON
380
+ * ```
381
+ *
140
382
  * ## Comparison to fetch
141
383
  *
142
384
  * This module attempts to act as similarly to the `fetch()` API as possible.
@@ -154,7 +396,7 @@
154
396
  * 2. IPNS protocol: `ipns://<peerId>` & `ipns://<publicKey>` & `ipns://<hostUri_Supporting_DnsLink_TxtRecords>`
155
397
  * 3. CID instances: An actual CID instance `CID.parse('bafy...')`
156
398
  *
157
- * As well as support for pathing & params for item 1 & 2 above according to [IPFS - Path Gateway Specification](https://specs.ipfs.tech/http-gateways/path-gateway) & [IPFS - Trustless Gateway Specification](https://specs.ipfs.tech/http-gateways/trustless-gateway/). Further refinement of those specifications specifically for web-based scenarios can be found in the [Web Pathing Specification IPIP](https://github.com/ipfs/specs/pull/453).
399
+ * As well as support for pathing & params for items 1 & 2 above according to [IPFS - Path Gateway Specification](https://specs.ipfs.tech/http-gateways/path-gateway) & [IPFS - Trustless Gateway Specification](https://specs.ipfs.tech/http-gateways/trustless-gateway/). Further refinement of those specifications specifically for web-based scenarios can be found in the [Web Pathing Specification IPIP](https://github.com/ipfs/specs/pull/453).
158
400
  *
159
401
  * If you pass a CID instance, it assumes you want the content for that specific CID only, and does not support pathing or params for that CID.
160
402
  *
@@ -256,7 +498,7 @@ import { createHeliaHTTP } from '@helia/http'
256
498
  import { delegatedHTTPRouting } from '@helia/routers'
257
499
  import { VerifiedFetch as VerifiedFetchClass } from './verified-fetch.js'
258
500
  import type { Helia } from '@helia/interface'
259
- import type { IPNSRoutingEvents, ResolveDnsLinkProgressEvents, ResolveProgressEvents } from '@helia/ipns'
501
+ import type { DNSResolver, IPNSRoutingEvents, ResolveDnsLinkProgressEvents, ResolveProgressEvents } from '@helia/ipns'
260
502
  import type { GetEvents } from '@helia/unixfs'
261
503
  import type { CID } from 'multiformats/cid'
262
504
  import type { ProgressEvent, ProgressOptions } from 'progress-events'
@@ -266,8 +508,12 @@ import type { ProgressEvent, ProgressOptions } from 'progress-events'
266
508
  */
267
509
  export type Resource = string | CID
268
510
 
511
+ export interface ResourceDetail {
512
+ resource: Resource
513
+ }
514
+
269
515
  export interface CIDDetail {
270
- cid: string
516
+ cid: CID
271
517
  path: string
272
518
  }
273
519
 
@@ -285,15 +531,31 @@ export interface VerifiedFetch {
285
531
  * Instead of passing a Helia instance, you can pass a list of gateways and
286
532
  * routers, and a HeliaHTTP instance will be created for you.
287
533
  */
288
- export interface CreateVerifiedFetchOptions {
534
+ export interface CreateVerifiedFetchInit {
289
535
  gateways: string[]
290
536
  routers?: string[]
291
537
 
538
+ /**
539
+ * In order to parse DNSLink records, we need to resolve DNS queries. You can
540
+ * pass a list of DNS resolvers that we will provide to the @helia/ipns
541
+ * instance for you. You must construct them using the `dnsJsonOverHttps` or
542
+ * `dnsOverHttps` functions exported from `@helia/ipns/dns-resolvers`.
543
+ *
544
+ * We use cloudflare and google's dnsJsonOverHttps resolvers by default.
545
+ *
546
+ * @default [dnsJsonOverHttps('https://mozilla.cloudflare-dns.com/dns-query'),dnsJsonOverHttps('https://dns.google/resolve')]
547
+ */
548
+ dnsResolvers?: DNSResolver[]
549
+ }
550
+
551
+ export interface CreateVerifiedFetchOptions {
292
552
  /**
293
553
  * A function to handle parsing content type from bytes. The function you
294
554
  * provide will be passed the first set of bytes we receive from the network,
295
555
  * and should return a string that will be used as the value for the
296
556
  * `Content-Type` header in the response.
557
+ *
558
+ * @default undefined
297
559
  */
298
560
  contentTypeParser?: ContentTypeParser
299
561
  }
@@ -338,11 +600,10 @@ export interface VerifiedFetchInit extends RequestInit, ProgressOptions<BubbledP
338
600
  /**
339
601
  * Create and return a Helia node
340
602
  */
341
- export async function createVerifiedFetch (init?: Helia | CreateVerifiedFetchOptions): Promise<VerifiedFetch> {
342
- let contentTypeParser: ContentTypeParser | undefined
343
-
603
+ export async function createVerifiedFetch (init?: Helia | CreateVerifiedFetchInit, options?: CreateVerifiedFetchOptions): Promise<VerifiedFetch> {
604
+ let dnsResolvers: DNSResolver[] | undefined
344
605
  if (!isHelia(init)) {
345
- contentTypeParser = init?.contentTypeParser
606
+ dnsResolvers = init?.dnsResolvers
346
607
  init = await createHeliaHTTP({
347
608
  blockBrokers: [
348
609
  trustlessGateway({
@@ -353,7 +614,7 @@ export async function createVerifiedFetch (init?: Helia | CreateVerifiedFetchOpt
353
614
  })
354
615
  }
355
616
 
356
- const verifiedFetchInstance = new VerifiedFetchClass({ helia: init }, { contentTypeParser })
617
+ const verifiedFetchInstance = new VerifiedFetchClass({ helia: init }, { dnsResolvers, ...options })
357
618
  async function verifiedFetch (resource: Resource, options?: VerifiedFetchInit): Promise<Response> {
358
619
  return verifiedFetchInstance.fetch(resource, options)
359
620
  }
package/src/types.ts ADDED
@@ -0,0 +1 @@
1
+ export type RequestFormatShorthand = 'raw' | 'car' | 'tar' | 'ipns-record' | 'dag-json' | 'dag-cbor' | 'json' | 'cbor'
@@ -0,0 +1,44 @@
1
+ import { decode } from 'cborg'
2
+ import { encode } from 'cborg/json'
3
+ import { CID } from 'multiformats/cid'
4
+ import type { TagDecoder } from 'cborg'
5
+
6
+ // https://github.com/ipfs/go-ipfs/issues/3570#issuecomment-273931692
7
+ const CID_CBOR_TAG = 0x2A
8
+
9
+ function cidDecoder (bytes: Uint8Array): CID {
10
+ if (bytes[0] !== 0) {
11
+ throw new Error('Invalid CID for CBOR tag 42; expected leading 0x00')
12
+ }
13
+
14
+ return CID.decode(bytes.subarray(1)) // ignore leading 0x00
15
+ }
16
+
17
+ /**
18
+ * Take a `DAG-CBOR` encoded `Uint8Array`, deserialize it as an object and
19
+ * re-serialize it in a form that can be passed to `JSON.serialize` and then
20
+ * `JSON.parse` without losing any data.
21
+ */
22
+ export function dagCborToSafeJSON (buf: Uint8Array): string {
23
+ const tags: TagDecoder[] = []
24
+ tags[CID_CBOR_TAG] = cidDecoder
25
+
26
+ const obj = decode(buf, {
27
+ allowIndefinite: false,
28
+ coerceUndefinedToNull: true,
29
+ allowNaN: false,
30
+ allowInfinity: false,
31
+ strict: true,
32
+ useMaps: false,
33
+ rejectDuplicateMapKeys: true,
34
+ tags,
35
+
36
+ // this is different to `DAG-CBOR` - the reason we disallow BigInts is
37
+ // because we are about to re-encode to `JSON` which does not support
38
+ // BigInts. Blocks containing large numbers should be deserialized using a
39
+ // cbor decoder instead
40
+ allowBigInt: false
41
+ })
42
+
43
+ return new TextDecoder().decode(encode(obj))
44
+ }