@helia/verified-fetch 0.0.0-f58d467 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +285 -25
- package/dist/index.min.js +7 -4
- package/dist/src/index.d.ts +285 -25
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +267 -25
- package/dist/src/index.js.map +1 -1
- package/dist/src/types.d.ts +2 -0
- package/dist/src/types.d.ts.map +1 -0
- package/dist/src/types.js +2 -0
- package/dist/src/types.js.map +1 -0
- package/dist/src/utils/dag-cbor-to-safe-json.d.ts +7 -0
- package/dist/src/utils/dag-cbor-to-safe-json.d.ts.map +1 -0
- package/dist/src/utils/dag-cbor-to-safe-json.js +37 -0
- package/dist/src/utils/dag-cbor-to-safe-json.js.map +1 -0
- package/dist/src/utils/get-content-disposition-filename.d.ts +6 -0
- package/dist/src/utils/get-content-disposition-filename.d.ts.map +1 -0
- package/dist/src/utils/get-content-disposition-filename.js +16 -0
- package/dist/src/utils/get-content-disposition-filename.js.map +1 -0
- package/dist/src/utils/get-e-tag.d.ts +28 -0
- package/dist/src/utils/get-e-tag.d.ts.map +1 -0
- package/dist/src/utils/get-e-tag.js +18 -0
- package/dist/src/utils/get-e-tag.js.map +1 -0
- package/dist/src/utils/get-tar-stream.d.ts +4 -0
- package/dist/src/utils/get-tar-stream.d.ts.map +1 -0
- package/dist/src/utils/get-tar-stream.js +46 -0
- package/dist/src/utils/get-tar-stream.js.map +1 -0
- package/dist/src/utils/parse-url-string.d.ts +7 -1
- package/dist/src/utils/parse-url-string.d.ts.map +1 -1
- package/dist/src/utils/parse-url-string.js +6 -0
- package/dist/src/utils/parse-url-string.js.map +1 -1
- package/dist/src/utils/responses.d.ts +5 -0
- package/dist/src/utils/responses.d.ts.map +1 -0
- package/dist/src/utils/responses.js +27 -0
- package/dist/src/utils/responses.js.map +1 -0
- package/dist/src/utils/select-output-type.d.ts +12 -0
- package/dist/src/utils/select-output-type.d.ts.map +1 -0
- package/dist/src/utils/select-output-type.js +148 -0
- package/dist/src/utils/select-output-type.js.map +1 -0
- package/dist/src/verified-fetch.d.ts +19 -26
- package/dist/src/verified-fetch.d.ts.map +1 -1
- package/dist/src/verified-fetch.js +261 -142
- package/dist/src/verified-fetch.js.map +1 -1
- package/dist/typedoc-urls.json +27 -0
- package/package.json +49 -112
- package/src/index.ts +290 -29
- package/src/types.ts +1 -0
- package/src/utils/dag-cbor-to-safe-json.ts +44 -0
- package/src/utils/get-content-disposition-filename.ts +18 -0
- package/src/utils/get-e-tag.ts +36 -0
- package/src/utils/get-tar-stream.ts +68 -0
- package/src/utils/parse-url-string.ts +17 -2
- package/src/utils/responses.ts +29 -0
- package/src/utils/select-output-type.ts +167 -0
- package/src/verified-fetch.ts +310 -154
package/package.json
CHANGED
|
@@ -1,15 +1,15 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@helia/verified-fetch",
|
|
3
|
-
"version": "
|
|
4
|
-
"description": "A fetch-like API for obtaining verified & trustless IPFS content on the web
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "A fetch-like API for obtaining verified & trustless IPFS content on the web",
|
|
5
5
|
"license": "Apache-2.0 OR MIT",
|
|
6
|
-
"homepage": "https://github.com/ipfs/helia/tree/main/packages/verified-fetch#readme",
|
|
6
|
+
"homepage": "https://github.com/ipfs/helia-verified-fetch/tree/main/packages/verified-fetch#readme",
|
|
7
7
|
"repository": {
|
|
8
8
|
"type": "git",
|
|
9
|
-
"url": "git+https://github.com/ipfs/helia.git"
|
|
9
|
+
"url": "git+https://github.com/ipfs/helia-verified-fetch.git"
|
|
10
10
|
},
|
|
11
11
|
"bugs": {
|
|
12
|
-
"url": "https://github.com/ipfs/helia/issues"
|
|
12
|
+
"url": "https://github.com/ipfs/helia-verified-fetch/issues"
|
|
13
13
|
},
|
|
14
14
|
"publishConfig": {
|
|
15
15
|
"access": "public",
|
|
@@ -41,95 +41,11 @@
|
|
|
41
41
|
"sourceType": "module"
|
|
42
42
|
}
|
|
43
43
|
},
|
|
44
|
-
"release": {
|
|
45
|
-
"branches": [
|
|
46
|
-
"main"
|
|
47
|
-
],
|
|
48
|
-
"plugins": [
|
|
49
|
-
[
|
|
50
|
-
"@semantic-release/commit-analyzer",
|
|
51
|
-
{
|
|
52
|
-
"preset": "conventionalcommits",
|
|
53
|
-
"releaseRules": [
|
|
54
|
-
{
|
|
55
|
-
"breaking": true,
|
|
56
|
-
"release": "major"
|
|
57
|
-
},
|
|
58
|
-
{
|
|
59
|
-
"revert": true,
|
|
60
|
-
"release": "patch"
|
|
61
|
-
},
|
|
62
|
-
{
|
|
63
|
-
"type": "feat",
|
|
64
|
-
"release": "minor"
|
|
65
|
-
},
|
|
66
|
-
{
|
|
67
|
-
"type": "fix",
|
|
68
|
-
"release": "patch"
|
|
69
|
-
},
|
|
70
|
-
{
|
|
71
|
-
"type": "docs",
|
|
72
|
-
"release": "patch"
|
|
73
|
-
},
|
|
74
|
-
{
|
|
75
|
-
"type": "test",
|
|
76
|
-
"release": "patch"
|
|
77
|
-
},
|
|
78
|
-
{
|
|
79
|
-
"type": "deps",
|
|
80
|
-
"release": "patch"
|
|
81
|
-
},
|
|
82
|
-
{
|
|
83
|
-
"scope": "no-release",
|
|
84
|
-
"release": false
|
|
85
|
-
}
|
|
86
|
-
]
|
|
87
|
-
}
|
|
88
|
-
],
|
|
89
|
-
[
|
|
90
|
-
"@semantic-release/release-notes-generator",
|
|
91
|
-
{
|
|
92
|
-
"preset": "conventionalcommits",
|
|
93
|
-
"presetConfig": {
|
|
94
|
-
"types": [
|
|
95
|
-
{
|
|
96
|
-
"type": "feat",
|
|
97
|
-
"section": "Features"
|
|
98
|
-
},
|
|
99
|
-
{
|
|
100
|
-
"type": "fix",
|
|
101
|
-
"section": "Bug Fixes"
|
|
102
|
-
},
|
|
103
|
-
{
|
|
104
|
-
"type": "chore",
|
|
105
|
-
"section": "Trivial Changes"
|
|
106
|
-
},
|
|
107
|
-
{
|
|
108
|
-
"type": "docs",
|
|
109
|
-
"section": "Documentation"
|
|
110
|
-
},
|
|
111
|
-
{
|
|
112
|
-
"type": "deps",
|
|
113
|
-
"section": "Dependencies"
|
|
114
|
-
},
|
|
115
|
-
{
|
|
116
|
-
"type": "test",
|
|
117
|
-
"section": "Tests"
|
|
118
|
-
}
|
|
119
|
-
]
|
|
120
|
-
}
|
|
121
|
-
}
|
|
122
|
-
],
|
|
123
|
-
"@semantic-release/changelog",
|
|
124
|
-
"@semantic-release/npm",
|
|
125
|
-
"@semantic-release/github",
|
|
126
|
-
"@semantic-release/git"
|
|
127
|
-
]
|
|
128
|
-
},
|
|
129
44
|
"scripts": {
|
|
130
45
|
"clean": "aegir clean",
|
|
131
46
|
"lint": "aegir lint",
|
|
132
47
|
"dep-check": "aegir dep-check",
|
|
48
|
+
"doc-check": "aegir doc-check",
|
|
133
49
|
"build": "aegir build",
|
|
134
50
|
"test": "aegir test",
|
|
135
51
|
"test:chrome": "aegir test -t browser --cov",
|
|
@@ -141,36 +57,57 @@
|
|
|
141
57
|
"release": "aegir release"
|
|
142
58
|
},
|
|
143
59
|
"dependencies": {
|
|
144
|
-
"@helia/block-brokers": "2.0.
|
|
145
|
-
"@helia/
|
|
146
|
-
"@helia/
|
|
147
|
-
"@helia/
|
|
148
|
-
"@helia/
|
|
149
|
-
"@helia/
|
|
150
|
-
"@helia/
|
|
151
|
-
"@
|
|
152
|
-
"@
|
|
153
|
-
"@ipld/dag-
|
|
154
|
-
"@
|
|
155
|
-
"@
|
|
156
|
-
"@libp2p/
|
|
157
|
-
"
|
|
60
|
+
"@helia/block-brokers": "^2.0.2",
|
|
61
|
+
"@helia/car": "^3.1.0",
|
|
62
|
+
"@helia/http": "^1.0.2",
|
|
63
|
+
"@helia/interface": "^4.0.1",
|
|
64
|
+
"@helia/ipns": "^6.0.1",
|
|
65
|
+
"@helia/routers": "^1.0.1",
|
|
66
|
+
"@helia/unixfs": "^3.0.1",
|
|
67
|
+
"@ipld/dag-cbor": "^9.2.0",
|
|
68
|
+
"@ipld/dag-json": "^10.2.0",
|
|
69
|
+
"@ipld/dag-pb": "^4.1.0",
|
|
70
|
+
"@libp2p/interface": "^1.1.4",
|
|
71
|
+
"@libp2p/kad-dht": "^12.0.8",
|
|
72
|
+
"@libp2p/peer-id": "^4.0.7",
|
|
73
|
+
"cborg": "^4.0.9",
|
|
158
74
|
"hashlru": "^2.3.0",
|
|
75
|
+
"interface-blockstore": "^5.2.10",
|
|
76
|
+
"interface-datastore": "^8.2.11",
|
|
159
77
|
"ipfs-unixfs-exporter": "^13.5.0",
|
|
160
|
-
"
|
|
161
|
-
"
|
|
78
|
+
"it-map": "^3.0.5",
|
|
79
|
+
"it-pipe": "^3.0.1",
|
|
80
|
+
"it-tar": "^6.0.5",
|
|
81
|
+
"it-to-browser-readablestream": "^2.0.6",
|
|
82
|
+
"multiformats": "^13.1.0",
|
|
83
|
+
"progress-events": "^1.0.0",
|
|
84
|
+
"uint8arrays": "^5.0.2"
|
|
162
85
|
},
|
|
163
86
|
"devDependencies": {
|
|
164
|
-
"@
|
|
165
|
-
"@
|
|
87
|
+
"@helia/car": "^3.1.0",
|
|
88
|
+
"@helia/dag-cbor": "^3.0.1",
|
|
89
|
+
"@helia/dag-json": "^3.0.1",
|
|
90
|
+
"@helia/json": "^3.0.1",
|
|
91
|
+
"@helia/utils": "^0.0.2",
|
|
92
|
+
"@ipld/car": "^5.3.0",
|
|
93
|
+
"@libp2p/logger": "^4.0.7",
|
|
94
|
+
"@libp2p/peer-id-factory": "^4.0.7",
|
|
166
95
|
"@sgtpooki/file-type": "^1.0.1",
|
|
167
96
|
"@types/sinon": "^17.0.3",
|
|
168
|
-
"aegir": "^42.2.
|
|
169
|
-
"
|
|
97
|
+
"aegir": "^42.2.5",
|
|
98
|
+
"blockstore-core": "^4.4.0",
|
|
99
|
+
"browser-readablestream-to-it": "^2.0.5",
|
|
100
|
+
"datastore-core": "^9.2.9",
|
|
101
|
+
"helia": "^4.0.2",
|
|
102
|
+
"ipfs-unixfs-importer": "^15.2.4",
|
|
103
|
+
"ipns": "^9.0.0",
|
|
104
|
+
"it-all": "^3.0.4",
|
|
105
|
+
"it-last": "^3.0.4",
|
|
106
|
+
"it-to-buffer": "^4.0.5",
|
|
170
107
|
"magic-bytes.js": "^1.8.0",
|
|
108
|
+
"p-defer": "^4.0.0",
|
|
171
109
|
"sinon": "^17.0.1",
|
|
172
|
-
"sinon-ts": "^2.0.0"
|
|
173
|
-
"uint8arrays": "^5.0.1"
|
|
110
|
+
"sinon-ts": "^2.0.0"
|
|
174
111
|
},
|
|
175
112
|
"sideEffects": false
|
|
176
113
|
}
|
package/src/index.ts
CHANGED
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
*
|
|
4
4
|
* `@helia/verified-fetch` provides a [fetch](https://developer.mozilla.org/en-US/docs/Web/API/Fetch_API)-like API for retrieving content from the [IPFS](https://ipfs.tech/) network.
|
|
5
5
|
*
|
|
6
|
-
* All content is retrieved in a [trustless manner](https://www.techopedia.com/definition/trustless), and the integrity of all bytes are verified by comparing hashes of the data.
|
|
6
|
+
* All content is retrieved in a [trustless manner](https://www.techopedia.com/definition/trustless), and the integrity of all bytes are verified by comparing hashes of the data. By default, CIDs are retrieved over HTTP from [trustless gateways](https://specs.ipfs.tech/http-gateways/trustless-gateway/).
|
|
7
7
|
*
|
|
8
8
|
* This is a marked improvement over `fetch` which offers no such protections and is vulnerable to all sorts of attacks like [Content Spoofing](https://owasp.org/www-community/attacks/Content_Spoofing), [DNS Hijacking](https://en.wikipedia.org/wiki/DNS_hijacking), etc.
|
|
9
9
|
*
|
|
@@ -33,7 +33,7 @@
|
|
|
33
33
|
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
34
34
|
* import { CID } from 'multiformats/cid'
|
|
35
35
|
*
|
|
36
|
-
* const cid = CID.parse('bafyFoo') // some
|
|
36
|
+
* const cid = CID.parse('bafyFoo') // some json file
|
|
37
37
|
* const response = await verifiedFetch(cid)
|
|
38
38
|
* const json = await response.json()
|
|
39
39
|
* ```
|
|
@@ -56,7 +56,7 @@
|
|
|
56
56
|
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
57
57
|
*
|
|
58
58
|
* const response = await verifiedFetch('ipns://mydomain.com/path/to/very-long-file.log')
|
|
59
|
-
* const bigFileStreamReader = await response.body
|
|
59
|
+
* const bigFileStreamReader = await response.body?.getReader()
|
|
60
60
|
* ```
|
|
61
61
|
*
|
|
62
62
|
* ## Configuration
|
|
@@ -73,8 +73,8 @@
|
|
|
73
73
|
* import { createVerifiedFetch } from '@helia/verified-fetch'
|
|
74
74
|
*
|
|
75
75
|
* const fetch = await createVerifiedFetch({
|
|
76
|
-
*
|
|
77
|
-
*
|
|
76
|
+
* gateways: ['https://trustless-gateway.link'],
|
|
77
|
+
* routers: ['http://delegated-ipfs.dev']
|
|
78
78
|
* })
|
|
79
79
|
*
|
|
80
80
|
* const resp = await fetch('ipfs://bafy...')
|
|
@@ -98,13 +98,13 @@
|
|
|
98
98
|
*
|
|
99
99
|
* const fetch = await createVerifiedFetch(
|
|
100
100
|
* await createHeliaHTTP({
|
|
101
|
-
*
|
|
102
|
-
*
|
|
103
|
-
*
|
|
104
|
-
*
|
|
105
|
-
*
|
|
106
|
-
*
|
|
107
|
-
*
|
|
101
|
+
* blockBrokers: [
|
|
102
|
+
* trustlessGateway({
|
|
103
|
+
* gateways: ['https://mygateway.example.net', 'https://trustless-gateway.link']
|
|
104
|
+
* })
|
|
105
|
+
* ],
|
|
106
|
+
* routers: ['http://delegated-ipfs.dev'].map((routerUrl) => delegatedHTTPRouting(routerUrl))
|
|
107
|
+
* })
|
|
108
108
|
* )
|
|
109
109
|
*
|
|
110
110
|
* const resp = await fetch('ipfs://bafy...')
|
|
@@ -114,7 +114,7 @@
|
|
|
114
114
|
*
|
|
115
115
|
* ### Custom content-type parsing
|
|
116
116
|
*
|
|
117
|
-
* By default, `@helia/verified-fetch` sets the `Content-Type` header as `application/octet-stream` - this is because the `.json()`, `.text()`, `.blob()`, and `.arrayBuffer()` methods will usually work as expected without a detailed content type.
|
|
117
|
+
* By default, if the response can be parsed as JSON, `@helia/verified-fetch` sets the `Content-Type` header as `application/json`, otherwise it sets it as `application/octet-stream` - this is because the `.json()`, `.text()`, `.blob()`, and `.arrayBuffer()` methods will usually work as expected without a detailed content type.
|
|
118
118
|
*
|
|
119
119
|
* If you require an accurate content-type you can provide a `contentTypeParser` function as an option to `createVerifiedFetch` to handle parsing the content type.
|
|
120
120
|
*
|
|
@@ -127,16 +127,258 @@
|
|
|
127
127
|
* import { fileTypeFromBuffer } from '@sgtpooki/file-type'
|
|
128
128
|
*
|
|
129
129
|
* const fetch = await createVerifiedFetch({
|
|
130
|
-
*
|
|
131
|
-
*
|
|
132
|
-
*
|
|
133
|
-
*
|
|
134
|
-
*
|
|
135
|
-
*
|
|
136
|
-
*
|
|
130
|
+
* gateways: ['https://trustless-gateway.link'],
|
|
131
|
+
* routers: ['http://delegated-ipfs.dev']
|
|
132
|
+
* }, {
|
|
133
|
+
* contentTypeParser: async (bytes) => {
|
|
134
|
+
* // call to some magic-byte recognition library like magic-bytes, file-type, or your own custom byte recognition
|
|
135
|
+
* const result = await fileTypeFromBuffer(bytes)
|
|
136
|
+
* return result?.mime
|
|
137
|
+
* }
|
|
137
138
|
* })
|
|
138
139
|
* ```
|
|
139
140
|
*
|
|
141
|
+
* ### Custom DNS resolvers
|
|
142
|
+
*
|
|
143
|
+
* If you don't want to leak DNS queries to the default resolvers, you can provide your own list of DNS resolvers to `createVerifiedFetch`.
|
|
144
|
+
*
|
|
145
|
+
* Note that you do not need to provide both a DNS-over-HTTPS and a DNS-over-JSON resolver, and you should prefer `dnsJsonOverHttps` resolvers for usage in the browser for a smaller bundle size. See https://github.com/ipfs/helia/tree/main/packages/ipns#example---using-dns-json-over-https for more information.
|
|
146
|
+
*
|
|
147
|
+
* @example Customizing DNS resolvers
|
|
148
|
+
*
|
|
149
|
+
* ```typescript
|
|
150
|
+
* import { createVerifiedFetch } from '@helia/verified-fetch'
|
|
151
|
+
* import { dnsJsonOverHttps, dnsOverHttps } from '@helia/ipns/dns-resolvers'
|
|
152
|
+
*
|
|
153
|
+
* const fetch = await createVerifiedFetch({
|
|
154
|
+
* gateways: ['https://trustless-gateway.link'],
|
|
155
|
+
* routers: ['http://delegated-ipfs.dev'],
|
|
156
|
+
* dnsResolvers: [
|
|
157
|
+
* dnsJsonOverHttps('https://my-dns-resolver.example.com/dns-json'),
|
|
158
|
+
* dnsOverHttps('https://my-dns-resolver.example.com/dns-query')
|
|
159
|
+
* ]
|
|
160
|
+
* })
|
|
161
|
+
* ```
|
|
162
|
+
*
|
|
163
|
+
* ### IPLD codec handling
|
|
164
|
+
*
|
|
165
|
+
* IPFS supports several data formats (typically referred to as codecs) which are included in the CID. `@helia/verified-fetch` attempts to abstract away some of the details for easier consumption.
|
|
166
|
+
*
|
|
167
|
+
* #### DAG-PB
|
|
168
|
+
*
|
|
169
|
+
* [DAG-PB](https://ipld.io/docs/codecs/known/dag-pb/) is the codec we are most likely to encounter, it is what [UnixFS](https://github.com/ipfs/specs/blob/main/UNIXFS.md) uses under the hood.
|
|
170
|
+
*
|
|
171
|
+
* ##### Using the DAG-PB codec as a Blob
|
|
172
|
+
*
|
|
173
|
+
* ```typescript
|
|
174
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
175
|
+
*
|
|
176
|
+
* const res = await verifiedFetch('ipfs://Qmfoo')
|
|
177
|
+
* const blob = await res.blob()
|
|
178
|
+
*
|
|
179
|
+
* console.info(blob) // Blob { size: x, type: 'application/octet-stream' }
|
|
180
|
+
* ```
|
|
181
|
+
*
|
|
182
|
+
* ##### Using the DAG-PB codec as an ArrayBuffer
|
|
183
|
+
*
|
|
184
|
+
* ```typescript
|
|
185
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
186
|
+
*
|
|
187
|
+
* const res = await verifiedFetch('ipfs://Qmfoo')
|
|
188
|
+
* const buf = await res.arrayBuffer()
|
|
189
|
+
*
|
|
190
|
+
* console.info(buf) // ArrayBuffer { [Uint8Contents]: < ... >, byteLength: x }
|
|
191
|
+
* ```
|
|
192
|
+
*
|
|
193
|
+
* ##### Using the DAG-PB codec as a stream
|
|
194
|
+
*
|
|
195
|
+
* ```typescript
|
|
196
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
197
|
+
*
|
|
198
|
+
* const res = await verifiedFetch('ipfs://Qmfoo')
|
|
199
|
+
* const reader = res.body?.getReader()
|
|
200
|
+
*
|
|
201
|
+
* if (reader == null) {
|
|
202
|
+
* throw new Error('Could not create reader from response body')
|
|
203
|
+
* }
|
|
204
|
+
*
|
|
205
|
+
* while (true) {
|
|
206
|
+
* const next = await reader.read()
|
|
207
|
+
*
|
|
208
|
+
* if (next?.done === true) {
|
|
209
|
+
* break
|
|
210
|
+
* }
|
|
211
|
+
*
|
|
212
|
+
* if (next?.value != null) {
|
|
213
|
+
* console.info(next.value) // Uint8Array(x) [ ... ]
|
|
214
|
+
* }
|
|
215
|
+
* }
|
|
216
|
+
* ```
|
|
217
|
+
*
|
|
218
|
+
* ##### Content-Type
|
|
219
|
+
*
|
|
220
|
+
* When fetching `DAG-PB` data, the content type will be set to `application/octet-stream` unless a custom content-type parser is configured.
|
|
221
|
+
*
|
|
222
|
+
* #### JSON
|
|
223
|
+
*
|
|
224
|
+
* The JSON codec is a very simple codec, a block parseable with this codec is a JSON string encoded into a `Uint8Array`.
|
|
225
|
+
*
|
|
226
|
+
* ##### Using the JSON codec
|
|
227
|
+
*
|
|
228
|
+
* ```typescript
|
|
229
|
+
* import * as json from 'multiformats/codecs/json'
|
|
230
|
+
*
|
|
231
|
+
* const block = new TextEncoder().encode('{ "hello": "world" }')
|
|
232
|
+
* const obj = json.decode(block)
|
|
233
|
+
*
|
|
234
|
+
* console.info(obj) // { hello: 'world' }
|
|
235
|
+
* ```
|
|
236
|
+
*
|
|
237
|
+
* ##### Content-Type
|
|
238
|
+
*
|
|
239
|
+
* When the `JSON` codec is encountered, the `Content-Type` header of the response will be set to `application/json`.
|
|
240
|
+
*
|
|
241
|
+
* ### DAG-JSON
|
|
242
|
+
*
|
|
243
|
+
* [DAG-JSON](https://ipld.io/docs/codecs/known/dag-json/) expands on the `JSON` codec, adding the ability to contain [CID](https://docs.ipfs.tech/concepts/content-addressing/)s which act as links to other blocks, and byte arrays.
|
|
244
|
+
*
|
|
245
|
+
* `CID`s and byte arrays are represented using special object structures with a single `"/"` property.
|
|
246
|
+
*
|
|
247
|
+
* Using `DAG-JSON` has two important caveats:
|
|
248
|
+
*
|
|
249
|
+
* 1. Your `JSON` structure cannot contain an object with only a `"/"` property, as it will be interpreted as a special type.
|
|
250
|
+
* 2. Since `JSON` has no technical limit on number sizes, `DAG-JSON` also allows numbers larger than `Number.MAX_SAFE_INTEGER`. JavaScript requires use of `BigInt`s to represent numbers larger than this, and `JSON.parse` does not support them, so precision will be lost.
|
|
251
|
+
*
|
|
252
|
+
* Otherwise this codec follows the same rules as the `JSON` codec.
|
|
253
|
+
*
|
|
254
|
+
* ##### Using the DAG-JSON codec
|
|
255
|
+
*
|
|
256
|
+
* ```typescript
|
|
257
|
+
* import * as dagJson from '@ipld/dag-json'
|
|
258
|
+
*
|
|
259
|
+
* const block = new TextEncoder().encode(`{
|
|
260
|
+
* "hello": "world",
|
|
261
|
+
* "cid": {
|
|
262
|
+
* "/": "baeaaac3imvwgy3zao5xxe3de"
|
|
263
|
+
* },
|
|
264
|
+
* "buf": {
|
|
265
|
+
* "/": {
|
|
266
|
+
* "bytes": "AAECAwQ"
|
|
267
|
+
* }
|
|
268
|
+
* }
|
|
269
|
+
* }`)
|
|
270
|
+
*
|
|
271
|
+
* const obj = dagJson.decode(block)
|
|
272
|
+
*
|
|
273
|
+
* console.info(obj)
|
|
274
|
+
* // {
|
|
275
|
+
* // hello: 'world',
|
|
276
|
+
* // cid: CID(baeaaac3imvwgy3zao5xxe3de),
|
|
277
|
+
* // buf: Uint8Array(5) [ 0, 1, 2, 3, 4 ]
|
|
278
|
+
* // }
|
|
279
|
+
* ```
|
|
280
|
+
*
|
|
281
|
+
* ##### Content-Type
|
|
282
|
+
*
|
|
283
|
+
* When the `DAG-JSON` codec is encountered in the requested CID, the `Content-Type` header of the response will be set to `application/json`.
|
|
284
|
+
*
|
|
285
|
+
* `DAG-JSON` data can be parsed from the response by using the `.json()` function, which will return `CID`s/byte arrays as plain `{ "/": ... }` objects:
|
|
286
|
+
*
|
|
287
|
+
* ```typescript
|
|
288
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
289
|
+
* import * as dagJson from '@ipld/dag-json'
|
|
290
|
+
*
|
|
291
|
+
* const res = await verifiedFetch('ipfs://bafyDAGJSON')
|
|
292
|
+
*
|
|
293
|
+
* // either:
|
|
294
|
+
* const obj = await res.json()
|
|
295
|
+
* console.info(obj.cid) // { "/": "baeaaac3imvwgy3zao5xxe3de" }
|
|
296
|
+
* console.info(obj.buf) // { "/": { "bytes": "AAECAwQ" } }
|
|
297
|
+
* ```
|
|
298
|
+
*
|
|
299
|
+
* Alternatively, it can be decoded using the `@ipld/dag-json` module and the `.arrayBuffer()` method, in which case you will get `CID` objects and `Uint8Array`s:
|
|
300
|
+
*
|
|
301
|
+
*```typescript
|
|
302
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
303
|
+
* import * as dagJson from '@ipld/dag-json'
|
|
304
|
+
*
|
|
305
|
+
* const res = await verifiedFetch('ipfs://bafyDAGJSON')
|
|
306
|
+
*
|
|
307
|
+
* // or:
|
|
308
|
+
* const obj = dagJson.decode<any>(await res.arrayBuffer())
|
|
309
|
+
* console.info(obj.cid) // CID(baeaaac3imvwgy3zao5xxe3de)
|
|
310
|
+
* console.info(obj.buf) // Uint8Array(5) [ 0, 1, 2, 3, 4 ]
|
|
311
|
+
* ```
|
|
312
|
+
*
|
|
313
|
+
* #### DAG-CBOR
|
|
314
|
+
*
|
|
315
|
+
* [DAG-CBOR](https://ipld.io/docs/codecs/known/dag-cbor/) uses the [Concise Binary Object Representation](https://cbor.io/) format for serialization instead of JSON.
|
|
316
|
+
*
|
|
317
|
+
* This supports more datatypes in a safer way than JSON and is smaller on the wire to boot so is usually preferable to JSON or DAG-JSON.
|
|
318
|
+
*
|
|
319
|
+
* ##### Content-Type
|
|
320
|
+
*
|
|
321
|
+
* Not all data types supported by `DAG-CBOR` can be successfully turned into JSON and back into the same binary form.
|
|
322
|
+
*
|
|
323
|
+
* When a decoded block can be round-tripped to JSON, the `Content-Type` will be set to `application/json`. In this case the `.json()` method on the `Response` object can be used to obtain an object representation of the response.
|
|
324
|
+
*
|
|
325
|
+
* When it cannot, the `Content-Type` will be `application/octet-stream` - in this case the `@ipld/dag-json` module must be used to deserialize the return value from `.arrayBuffer()`.
|
|
326
|
+
*
|
|
327
|
+
* ##### Detecting JSON-safe DAG-CBOR
|
|
328
|
+
*
|
|
329
|
+
* If the `Content-Type` header of the response is `application/json`, the `.json()` method may be used to access the response body in object form, otherwise the `.arrayBuffer()` method must be used to decode the raw bytes using the `@ipld/dag-cbor` module.
|
|
330
|
+
*
|
|
331
|
+
* ```typescript
|
|
332
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
333
|
+
* import * as dagCbor from '@ipld/dag-cbor'
|
|
334
|
+
*
|
|
335
|
+
* const res = await verifiedFetch('ipfs://bafyDagCborCID')
|
|
336
|
+
* let obj
|
|
337
|
+
*
|
|
338
|
+
* if (res.headers.get('Content-Type') === 'application/json') {
|
|
339
|
+
* // DAG-CBOR data can be safely decoded as JSON
|
|
340
|
+
* obj = await res.json()
|
|
341
|
+
* } else {
|
|
342
|
+
* // response contains non-JSON friendly data types
|
|
343
|
+
* obj = dagCbor.decode(await res.arrayBuffer())
|
|
344
|
+
* }
|
|
345
|
+
*
|
|
346
|
+
* console.info(obj) // ...
|
|
347
|
+
* ```
|
|
348
|
+
*
|
|
349
|
+
* ## The `Accept` header
|
|
350
|
+
*
|
|
351
|
+
* The `Accept` header can be passed to override certain response processing, or to ensure that the final `Content-Type` of the response is the one that is expected.
|
|
352
|
+
*
|
|
353
|
+
* If the final `Content-Type` does not match the `Accept` header, or if the content cannot be represented in the format dictated by the `Accept` header, or you have configured a custom content type parser, and that parser returns a value that isn't in the accept header, a [406: Not Acceptable](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/406) response will be returned:
|
|
354
|
+
*
|
|
355
|
+
* ```typescript
|
|
356
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
357
|
+
*
|
|
358
|
+
* const res = await verifiedFetch('ipfs://bafyJPEGImageCID', {
|
|
359
|
+
* headers: {
|
|
360
|
+
* accept: 'image/png'
|
|
361
|
+
* }
|
|
362
|
+
* })
|
|
363
|
+
*
|
|
364
|
+
* console.info(res.status) // 406 - the image was a JPEG but we specified PNG as the accept header
|
|
365
|
+
* ```
|
|
366
|
+
*
|
|
367
|
+
* It can also be used to skip processing the data from some formats such as `DAG-CBOR` if you wish to handle decoding it yourself:
|
|
368
|
+
*
|
|
369
|
+
* ```typescript
|
|
370
|
+
* import { verifiedFetch } from '@helia/verified-fetch'
|
|
371
|
+
*
|
|
372
|
+
* const res = await verifiedFetch('ipfs://bafyDAGCBORCID', {
|
|
373
|
+
* headers: {
|
|
374
|
+
* accept: 'application/octet-stream'
|
|
375
|
+
* }
|
|
376
|
+
* })
|
|
377
|
+
*
|
|
378
|
+
* console.info(res.headers.get('accept')) // application/octet-stream
|
|
379
|
+
* const buf = await res.arrayBuffer() // raw bytes, not processed as JSON
|
|
380
|
+
* ```
|
|
381
|
+
*
|
|
140
382
|
* ## Comparison to fetch
|
|
141
383
|
*
|
|
142
384
|
* This module attempts to act as similarly to the `fetch()` API as possible.
|
|
@@ -154,7 +396,7 @@
|
|
|
154
396
|
* 2. IPNS protocol: `ipns://<peerId>` & `ipns://<publicKey>` & `ipns://<hostUri_Supporting_DnsLink_TxtRecords>`
|
|
155
397
|
* 3. CID instances: An actual CID instance `CID.parse('bafy...')`
|
|
156
398
|
*
|
|
157
|
-
* As well as support for pathing & params for
|
|
399
|
+
* As well as support for pathing & params for items 1 & 2 above according to [IPFS - Path Gateway Specification](https://specs.ipfs.tech/http-gateways/path-gateway) & [IPFS - Trustless Gateway Specification](https://specs.ipfs.tech/http-gateways/trustless-gateway/). Further refinement of those specifications specifically for web-based scenarios can be found in the [Web Pathing Specification IPIP](https://github.com/ipfs/specs/pull/453).
|
|
158
400
|
*
|
|
159
401
|
* If you pass a CID instance, it assumes you want the content for that specific CID only, and does not support pathing or params for that CID.
|
|
160
402
|
*
|
|
@@ -256,7 +498,7 @@ import { createHeliaHTTP } from '@helia/http'
|
|
|
256
498
|
import { delegatedHTTPRouting } from '@helia/routers'
|
|
257
499
|
import { VerifiedFetch as VerifiedFetchClass } from './verified-fetch.js'
|
|
258
500
|
import type { Helia } from '@helia/interface'
|
|
259
|
-
import type { IPNSRoutingEvents, ResolveDnsLinkProgressEvents, ResolveProgressEvents } from '@helia/ipns'
|
|
501
|
+
import type { DNSResolver, IPNSRoutingEvents, ResolveDnsLinkProgressEvents, ResolveProgressEvents } from '@helia/ipns'
|
|
260
502
|
import type { GetEvents } from '@helia/unixfs'
|
|
261
503
|
import type { CID } from 'multiformats/cid'
|
|
262
504
|
import type { ProgressEvent, ProgressOptions } from 'progress-events'
|
|
@@ -266,8 +508,12 @@ import type { ProgressEvent, ProgressOptions } from 'progress-events'
|
|
|
266
508
|
*/
|
|
267
509
|
export type Resource = string | CID
|
|
268
510
|
|
|
511
|
+
export interface ResourceDetail {
|
|
512
|
+
resource: Resource
|
|
513
|
+
}
|
|
514
|
+
|
|
269
515
|
export interface CIDDetail {
|
|
270
|
-
cid:
|
|
516
|
+
cid: CID
|
|
271
517
|
path: string
|
|
272
518
|
}
|
|
273
519
|
|
|
@@ -285,15 +531,31 @@ export interface VerifiedFetch {
|
|
|
285
531
|
* Instead of passing a Helia instance, you can pass a list of gateways and
|
|
286
532
|
* routers, and a HeliaHTTP instance will be created for you.
|
|
287
533
|
*/
|
|
288
|
-
export interface
|
|
534
|
+
export interface CreateVerifiedFetchInit {
|
|
289
535
|
gateways: string[]
|
|
290
536
|
routers?: string[]
|
|
291
537
|
|
|
538
|
+
/**
|
|
539
|
+
* In order to parse DNSLink records, we need to resolve DNS queries. You can
|
|
540
|
+
* pass a list of DNS resolvers that we will provide to the @helia/ipns
|
|
541
|
+
* instance for you. You must construct them using the `dnsJsonOverHttps` or
|
|
542
|
+
* `dnsOverHttps` functions exported from `@helia/ipns/dns-resolvers`.
|
|
543
|
+
*
|
|
544
|
+
* We use cloudflare and google's dnsJsonOverHttps resolvers by default.
|
|
545
|
+
*
|
|
546
|
+
* @default [dnsJsonOverHttps('https://mozilla.cloudflare-dns.com/dns-query'),dnsJsonOverHttps('https://dns.google/resolve')]
|
|
547
|
+
*/
|
|
548
|
+
dnsResolvers?: DNSResolver[]
|
|
549
|
+
}
|
|
550
|
+
|
|
551
|
+
export interface CreateVerifiedFetchOptions {
|
|
292
552
|
/**
|
|
293
553
|
* A function to handle parsing content type from bytes. The function you
|
|
294
554
|
* provide will be passed the first set of bytes we receive from the network,
|
|
295
555
|
* and should return a string that will be used as the value for the
|
|
296
556
|
* `Content-Type` header in the response.
|
|
557
|
+
*
|
|
558
|
+
* @default undefined
|
|
297
559
|
*/
|
|
298
560
|
contentTypeParser?: ContentTypeParser
|
|
299
561
|
}
|
|
@@ -338,11 +600,10 @@ export interface VerifiedFetchInit extends RequestInit, ProgressOptions<BubbledP
|
|
|
338
600
|
/**
|
|
339
601
|
* Create and return a Helia node
|
|
340
602
|
*/
|
|
341
|
-
export async function createVerifiedFetch (init?: Helia | CreateVerifiedFetchOptions): Promise<VerifiedFetch> {
|
|
342
|
-
let
|
|
343
|
-
|
|
603
|
+
export async function createVerifiedFetch (init?: Helia | CreateVerifiedFetchInit, options?: CreateVerifiedFetchOptions): Promise<VerifiedFetch> {
|
|
604
|
+
let dnsResolvers: DNSResolver[] | undefined
|
|
344
605
|
if (!isHelia(init)) {
|
|
345
|
-
|
|
606
|
+
dnsResolvers = init?.dnsResolvers
|
|
346
607
|
init = await createHeliaHTTP({
|
|
347
608
|
blockBrokers: [
|
|
348
609
|
trustlessGateway({
|
|
@@ -353,7 +614,7 @@ export async function createVerifiedFetch (init?: Helia | CreateVerifiedFetchOpt
|
|
|
353
614
|
})
|
|
354
615
|
}
|
|
355
616
|
|
|
356
|
-
const verifiedFetchInstance = new VerifiedFetchClass({ helia: init }, {
|
|
617
|
+
const verifiedFetchInstance = new VerifiedFetchClass({ helia: init }, { dnsResolvers, ...options })
|
|
357
618
|
async function verifiedFetch (resource: Resource, options?: VerifiedFetchInit): Promise<Response> {
|
|
358
619
|
return verifiedFetchInstance.fetch(resource, options)
|
|
359
620
|
}
|
package/src/types.ts
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export type RequestFormatShorthand = 'raw' | 'car' | 'tar' | 'ipns-record' | 'dag-json' | 'dag-cbor' | 'json' | 'cbor'
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
import { decode } from 'cborg'
|
|
2
|
+
import { encode } from 'cborg/json'
|
|
3
|
+
import { CID } from 'multiformats/cid'
|
|
4
|
+
import type { TagDecoder } from 'cborg'
|
|
5
|
+
|
|
6
|
+
// https://github.com/ipfs/go-ipfs/issues/3570#issuecomment-273931692
|
|
7
|
+
const CID_CBOR_TAG = 0x2A
|
|
8
|
+
|
|
9
|
+
function cidDecoder (bytes: Uint8Array): CID {
|
|
10
|
+
if (bytes[0] !== 0) {
|
|
11
|
+
throw new Error('Invalid CID for CBOR tag 42; expected leading 0x00')
|
|
12
|
+
}
|
|
13
|
+
|
|
14
|
+
return CID.decode(bytes.subarray(1)) // ignore leading 0x00
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
/**
|
|
18
|
+
* Take a `DAG-CBOR` encoded `Uint8Array`, deserialize it as an object and
|
|
19
|
+
* re-serialize it in a form that can be passed to `JSON.serialize` and then
|
|
20
|
+
* `JSON.parse` without losing any data.
|
|
21
|
+
*/
|
|
22
|
+
export function dagCborToSafeJSON (buf: Uint8Array): string {
|
|
23
|
+
const tags: TagDecoder[] = []
|
|
24
|
+
tags[CID_CBOR_TAG] = cidDecoder
|
|
25
|
+
|
|
26
|
+
const obj = decode(buf, {
|
|
27
|
+
allowIndefinite: false,
|
|
28
|
+
coerceUndefinedToNull: true,
|
|
29
|
+
allowNaN: false,
|
|
30
|
+
allowInfinity: false,
|
|
31
|
+
strict: true,
|
|
32
|
+
useMaps: false,
|
|
33
|
+
rejectDuplicateMapKeys: true,
|
|
34
|
+
tags,
|
|
35
|
+
|
|
36
|
+
// this is different to `DAG-CBOR` - the reason we disallow BigInts is
|
|
37
|
+
// because we are about to re-encode to `JSON` which does not support
|
|
38
|
+
// BigInts. Blocks containing large numbers should be deserialized using a
|
|
39
|
+
// cbor decoder instead
|
|
40
|
+
allowBigInt: false
|
|
41
|
+
})
|
|
42
|
+
|
|
43
|
+
return new TextDecoder().decode(encode(obj))
|
|
44
|
+
}
|