* Move ActivityPub::FetchRemoteAccountService to ActivityPub::FetchRemoteActorService ActivityPub::FetchRemoteAccountService is kept as a wrapper for when the actor is specifically required to be an Account * Refactor SignatureVerification to allow non-Account actors * fixup! Move ActivityPub::FetchRemoteAccountService to ActivityPub::FetchRemoteActorService * Refactor ActivityPub::FetchRemoteKeyService to potentially return non-Account actors * Refactor inbound ActivityPub payload processing to accept non-Account actors * Refactor inbound ActivityPub processing to accept activities relayed through non-Account * Refactor how Account key URIs are built * Refactor Request and drop unused key_id_format parameter * Rename ActivityPub::Dereferencer `signature_account` to `signature_actor`
		
			
				
	
	
		
			20 lines
		
	
	
		
			358 B
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			20 lines
		
	
	
		
			358 B
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| class ActivityPub::PublicKeySerializer < ActivityPub::Serializer
 | |
|   context :security
 | |
| 
 | |
|   attributes :id, :owner, :public_key_pem
 | |
| 
 | |
|   def id
 | |
|     ActivityPub::TagManager.instance.key_uri_for(object)
 | |
|   end
 | |
| 
 | |
|   def owner
 | |
|     ActivityPub::TagManager.instance.uri_for(object)
 | |
|   end
 | |
| 
 | |
|   def public_key_pem
 | |
|     object.public_key
 | |
|   end
 | |
| end
 |