@agentcred-ai/sdk 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/dist/index.cjs +262 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +80 -0
- package/dist/index.d.ts +80 -0
- package/dist/index.js +216 -0
- package/dist/index.js.map +1 -0
- package/package.json +54 -0
package/LICENSE
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
MIT License
|
|
2
|
+
|
|
3
|
+
Copyright (c) 2025 AgentCred Contributors
|
|
4
|
+
|
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
|
7
|
+
in the Software without restriction, including without limitation the rights
|
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
|
10
|
+
furnished to do so, subject to the following conditions:
|
|
11
|
+
|
|
12
|
+
The above copyright notice and this permission notice shall be included in all
|
|
13
|
+
copies or substantial portions of the Software.
|
|
14
|
+
|
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
21
|
+
SOFTWARE.
|
package/dist/index.cjs
ADDED
|
@@ -0,0 +1,262 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __create = Object.create;
|
|
3
|
+
var __defProp = Object.defineProperty;
|
|
4
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
+
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
+
var __export = (target, all) => {
|
|
9
|
+
for (var name in all)
|
|
10
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
11
|
+
};
|
|
12
|
+
var __copyProps = (to, from, except, desc) => {
|
|
13
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
14
|
+
for (let key of __getOwnPropNames(from))
|
|
15
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
16
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
17
|
+
}
|
|
18
|
+
return to;
|
|
19
|
+
};
|
|
20
|
+
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
21
|
+
// If the importer is in node compatibility mode or this is not an ESM
|
|
22
|
+
// file that has been converted to a CommonJS file using a Babel-
|
|
23
|
+
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
24
|
+
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
25
|
+
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
26
|
+
mod
|
|
27
|
+
));
|
|
28
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
|
+
|
|
30
|
+
// src/index.ts
|
|
31
|
+
var index_exports = {};
|
|
32
|
+
__export(index_exports, {
|
|
33
|
+
FileSystemKeyStorage: () => FileSystemKeyStorage,
|
|
34
|
+
MemoryKeyStorage: () => MemoryKeyStorage,
|
|
35
|
+
createDefaultStorage: () => createDefaultStorage,
|
|
36
|
+
createIdentity: () => createIdentity,
|
|
37
|
+
loadIdentity: () => loadIdentity,
|
|
38
|
+
resolvePublicKey: () => resolvePublicKey,
|
|
39
|
+
sign: () => sign,
|
|
40
|
+
verify: () => verify,
|
|
41
|
+
verifyOffline: () => verifyOffline,
|
|
42
|
+
version: () => version
|
|
43
|
+
});
|
|
44
|
+
module.exports = __toCommonJS(index_exports);
|
|
45
|
+
|
|
46
|
+
// src/storage.ts
|
|
47
|
+
var fs = __toESM(require("fs/promises"), 1);
|
|
48
|
+
var path = __toESM(require("path"), 1);
|
|
49
|
+
var os = __toESM(require("os"), 1);
|
|
50
|
+
var MemoryKeyStorage = class {
|
|
51
|
+
keys = /* @__PURE__ */ new Map();
|
|
52
|
+
async save(username, privateKey) {
|
|
53
|
+
this.keys.set(username, privateKey);
|
|
54
|
+
}
|
|
55
|
+
async load(username) {
|
|
56
|
+
return this.keys.get(username) ?? null;
|
|
57
|
+
}
|
|
58
|
+
async list() {
|
|
59
|
+
return Array.from(this.keys.keys());
|
|
60
|
+
}
|
|
61
|
+
};
|
|
62
|
+
var FileSystemKeyStorage = class {
|
|
63
|
+
keyDir;
|
|
64
|
+
constructor(keyDir) {
|
|
65
|
+
this.keyDir = keyDir ?? path.join(os.homedir(), ".agentcred", "keys");
|
|
66
|
+
}
|
|
67
|
+
async save(username, privateKey) {
|
|
68
|
+
await fs.mkdir(this.keyDir, { recursive: true });
|
|
69
|
+
const keyPath = path.join(this.keyDir, `${username}.jwk`);
|
|
70
|
+
await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2));
|
|
71
|
+
}
|
|
72
|
+
async load(username) {
|
|
73
|
+
try {
|
|
74
|
+
const keyPath = path.join(this.keyDir, `${username}.jwk`);
|
|
75
|
+
const data = await fs.readFile(keyPath, "utf-8");
|
|
76
|
+
return JSON.parse(data);
|
|
77
|
+
} catch {
|
|
78
|
+
return null;
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
async list() {
|
|
82
|
+
try {
|
|
83
|
+
const files = await fs.readdir(this.keyDir);
|
|
84
|
+
return files.filter((f) => f.endsWith(".jwk")).map((f) => f.replace(".jwk", ""));
|
|
85
|
+
} catch {
|
|
86
|
+
return [];
|
|
87
|
+
}
|
|
88
|
+
}
|
|
89
|
+
};
|
|
90
|
+
function createDefaultStorage() {
|
|
91
|
+
if (typeof window !== "undefined") {
|
|
92
|
+
return new MemoryKeyStorage();
|
|
93
|
+
}
|
|
94
|
+
return new FileSystemKeyStorage();
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
// src/identity.ts
|
|
98
|
+
var import_jose = require("jose");
|
|
99
|
+
var import_crypto = require("crypto");
|
|
100
|
+
async function createIdentity(githubToken, config) {
|
|
101
|
+
const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
|
|
102
|
+
const storage = config?.storage ?? createDefaultStorage();
|
|
103
|
+
const response = await fetch("https://api.github.com/user", {
|
|
104
|
+
headers: { Authorization: `Bearer ${githubToken}` }
|
|
105
|
+
});
|
|
106
|
+
if (!response.ok) throw new Error("GitHub authentication failed");
|
|
107
|
+
const profile = await response.json();
|
|
108
|
+
const { publicKey, privateKey } = await (0, import_jose.generateKeyPair)("EdDSA", { extractable: true });
|
|
109
|
+
const publicJWK = await (0, import_jose.exportJWK)(publicKey);
|
|
110
|
+
const privateJWK = await (0, import_jose.exportJWK)(privateKey);
|
|
111
|
+
const fingerprint = (0, import_crypto.createHash)("sha256").update(JSON.stringify(publicJWK)).digest("hex");
|
|
112
|
+
const registerResponse = await fetch(`${apiUrl}/v1/keys`, {
|
|
113
|
+
method: "POST",
|
|
114
|
+
headers: {
|
|
115
|
+
"Content-Type": "application/json",
|
|
116
|
+
"Authorization": `Bearer ${githubToken}`
|
|
117
|
+
},
|
|
118
|
+
body: JSON.stringify({ public_key: publicJWK })
|
|
119
|
+
});
|
|
120
|
+
if (!registerResponse.ok) throw new Error("Key registration failed");
|
|
121
|
+
const registration = await registerResponse.json();
|
|
122
|
+
await storage.save(profile.login, privateJWK);
|
|
123
|
+
return {
|
|
124
|
+
github: {
|
|
125
|
+
username: profile.login,
|
|
126
|
+
id: profile.id,
|
|
127
|
+
avatarUrl: profile.avatar_url
|
|
128
|
+
},
|
|
129
|
+
publicKey: publicJWK,
|
|
130
|
+
fingerprint,
|
|
131
|
+
registeredAt: registration.registered_at
|
|
132
|
+
};
|
|
133
|
+
}
|
|
134
|
+
async function loadIdentity(githubUsername, config) {
|
|
135
|
+
const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
|
|
136
|
+
const storage = config?.storage ?? createDefaultStorage();
|
|
137
|
+
const privateJWK = await storage.load(githubUsername);
|
|
138
|
+
if (!privateJWK) return null;
|
|
139
|
+
const publicJWK = await resolvePublicKey(githubUsername, config);
|
|
140
|
+
if (!publicJWK) return null;
|
|
141
|
+
const privateKey = await (0, import_jose.importJWK)(privateJWK, "EdDSA");
|
|
142
|
+
const fingerprint = (0, import_crypto.createHash)("sha256").update(JSON.stringify(publicJWK)).digest("hex");
|
|
143
|
+
return {
|
|
144
|
+
identity: {
|
|
145
|
+
github: {
|
|
146
|
+
username: githubUsername,
|
|
147
|
+
id: 0,
|
|
148
|
+
avatarUrl: ""
|
|
149
|
+
},
|
|
150
|
+
publicKey: publicJWK,
|
|
151
|
+
fingerprint,
|
|
152
|
+
registeredAt: (/* @__PURE__ */ new Date()).toISOString()
|
|
153
|
+
},
|
|
154
|
+
privateKey
|
|
155
|
+
};
|
|
156
|
+
}
|
|
157
|
+
async function resolvePublicKey(githubUsername, config) {
|
|
158
|
+
const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
|
|
159
|
+
try {
|
|
160
|
+
const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`);
|
|
161
|
+
if (!response.ok) return null;
|
|
162
|
+
const data = await response.json();
|
|
163
|
+
return data.public_key;
|
|
164
|
+
} catch {
|
|
165
|
+
return null;
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
|
|
169
|
+
// src/sign.ts
|
|
170
|
+
var import_jose2 = require("jose");
|
|
171
|
+
var import_crypto2 = require("crypto");
|
|
172
|
+
async function sign(content, identity, options) {
|
|
173
|
+
const agent = options?.agent ?? "default";
|
|
174
|
+
const contentType = options?.contentType ?? "text/plain";
|
|
175
|
+
const contentHash = (0, import_crypto2.createHash)("sha256").update(content).digest("hex");
|
|
176
|
+
const payload = {
|
|
177
|
+
iss: `${identity.github}@agentcred`,
|
|
178
|
+
sub: agent,
|
|
179
|
+
iat: Math.floor(Date.now() / 1e3),
|
|
180
|
+
content_hash: `sha256:${contentHash}`,
|
|
181
|
+
content_type: contentType,
|
|
182
|
+
nonce: (0, import_crypto2.randomUUID)()
|
|
183
|
+
};
|
|
184
|
+
const jws = await new import_jose2.CompactSign(
|
|
185
|
+
new TextEncoder().encode(JSON.stringify(payload))
|
|
186
|
+
).setProtectedHeader({
|
|
187
|
+
alg: "EdDSA",
|
|
188
|
+
typ: "agentcred+jwt",
|
|
189
|
+
kid: `${identity.github}@agentcred`
|
|
190
|
+
}).sign(identity.privateKey);
|
|
191
|
+
return {
|
|
192
|
+
agentcred: {
|
|
193
|
+
v: "1.0",
|
|
194
|
+
jws,
|
|
195
|
+
github: identity.github,
|
|
196
|
+
agent
|
|
197
|
+
},
|
|
198
|
+
content
|
|
199
|
+
};
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
// src/verify.ts
|
|
203
|
+
var import_jose3 = require("jose");
|
|
204
|
+
var import_crypto3 = require("crypto");
|
|
205
|
+
async function verify(envelope, config) {
|
|
206
|
+
try {
|
|
207
|
+
const { github } = envelope.agentcred;
|
|
208
|
+
const publicJWK = await resolvePublicKey(github, config);
|
|
209
|
+
if (!publicJWK) {
|
|
210
|
+
return { verified: false, error: "Public key not found" };
|
|
211
|
+
}
|
|
212
|
+
const publicKey = await (0, import_jose3.importJWK)(publicJWK, "EdDSA");
|
|
213
|
+
return await verifyOffline(envelope, publicKey);
|
|
214
|
+
} catch (error) {
|
|
215
|
+
return { verified: false, error: String(error) };
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
async function verifyOffline(envelope, publicKey) {
|
|
219
|
+
try {
|
|
220
|
+
const { payload } = await (0, import_jose3.compactVerify)(envelope.agentcred.jws, publicKey);
|
|
221
|
+
const claims = JSON.parse(new TextDecoder().decode(payload));
|
|
222
|
+
const actualHash = (0, import_crypto3.createHash)("sha256").update(envelope.content).digest("hex");
|
|
223
|
+
const expectedHash = claims.content_hash.replace("sha256:", "");
|
|
224
|
+
if (actualHash !== expectedHash) {
|
|
225
|
+
return { verified: false, error: "Content hash mismatch" };
|
|
226
|
+
}
|
|
227
|
+
const now = Math.floor(Date.now() / 1e3);
|
|
228
|
+
const timeDiff = Math.abs(now - claims.iat);
|
|
229
|
+
if (timeDiff > 86400) {
|
|
230
|
+
return { verified: false, error: "Timestamp outside valid window" };
|
|
231
|
+
}
|
|
232
|
+
return {
|
|
233
|
+
verified: true,
|
|
234
|
+
github: {
|
|
235
|
+
username: envelope.agentcred.github,
|
|
236
|
+
id: 0,
|
|
237
|
+
avatarUrl: ""
|
|
238
|
+
},
|
|
239
|
+
agent: claims.sub,
|
|
240
|
+
signedAt: new Date(claims.iat * 1e3).toISOString()
|
|
241
|
+
};
|
|
242
|
+
} catch (error) {
|
|
243
|
+
return { verified: false, error: String(error) };
|
|
244
|
+
}
|
|
245
|
+
}
|
|
246
|
+
|
|
247
|
+
// src/index.ts
|
|
248
|
+
var version = "0.0.1";
|
|
249
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
250
|
+
0 && (module.exports = {
|
|
251
|
+
FileSystemKeyStorage,
|
|
252
|
+
MemoryKeyStorage,
|
|
253
|
+
createDefaultStorage,
|
|
254
|
+
createIdentity,
|
|
255
|
+
loadIdentity,
|
|
256
|
+
resolvePublicKey,
|
|
257
|
+
sign,
|
|
258
|
+
verify,
|
|
259
|
+
verifyOffline,
|
|
260
|
+
version
|
|
261
|
+
});
|
|
262
|
+
//# sourceMappingURL=index.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/index.ts","../src/storage.ts","../src/identity.ts","../src/sign.ts","../src/verify.ts"],"sourcesContent":["export const version = '0.0.1'\n\nexport * from './types.js'\nexport { MemoryKeyStorage, FileSystemKeyStorage, createDefaultStorage } from './storage.js'\nexport { createIdentity, loadIdentity, resolvePublicKey } from './identity.js'\nexport { sign } from './sign.js'\nexport { verify, verifyOffline } from './verify.js'\n","import { KeyStorage } from './types.js'\nimport * as fs from 'fs/promises'\nimport * as path from 'path'\nimport * as os from 'os'\n\nexport class MemoryKeyStorage implements KeyStorage {\n private keys = new Map<string, JsonWebKey>()\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n this.keys.set(username, privateKey)\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n return this.keys.get(username) ?? null\n }\n \n async list(): Promise<string[]> {\n return Array.from(this.keys.keys())\n }\n}\n\nexport class FileSystemKeyStorage implements KeyStorage {\n private keyDir: string\n \n constructor(keyDir?: string) {\n this.keyDir = keyDir ?? path.join(os.homedir(), '.agentcred', 'keys')\n }\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n await fs.mkdir(this.keyDir, { recursive: true })\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2))\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n try {\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n const data = await fs.readFile(keyPath, 'utf-8')\n return JSON.parse(data)\n } catch {\n return null\n }\n }\n \n async list(): Promise<string[]> {\n try {\n const files = await fs.readdir(this.keyDir)\n return files.filter(f => f.endsWith('.jwk')).map(f => f.replace('.jwk', ''))\n } catch {\n return []\n }\n }\n}\n\nexport function createDefaultStorage(): KeyStorage {\n if (typeof window !== 'undefined') {\n return new MemoryKeyStorage()\n }\n return new FileSystemKeyStorage()\n}\n","import { generateKeyPair, exportJWK, importJWK } from 'jose'\nimport { AgentCredIdentity, AgentCredConfig, SignIdentity } from './types.js'\nimport { createDefaultStorage } from './storage.js'\nimport { createHash } from 'crypto'\n\nexport async function createIdentity(\n githubToken: string,\n config?: AgentCredConfig\n): Promise<AgentCredIdentity> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const response = await fetch('https://api.github.com/user', {\n headers: { Authorization: `Bearer ${githubToken}` }\n })\n if (!response.ok) throw new Error('GitHub authentication failed')\n const profile = await response.json()\n \n const { publicKey, privateKey } = await generateKeyPair('EdDSA', { extractable: true })\n const publicJWK = await exportJWK(publicKey)\n const privateJWK = await exportJWK(privateKey)\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n const registerResponse = await fetch(`${apiUrl}/v1/keys`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${githubToken}`\n },\n body: JSON.stringify({ public_key: publicJWK })\n })\n if (!registerResponse.ok) throw new Error('Key registration failed')\n const registration = await registerResponse.json()\n \n await storage.save(profile.login, privateJWK)\n \n return {\n github: {\n username: profile.login,\n id: profile.id,\n avatarUrl: profile.avatar_url\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: registration.registered_at\n }\n}\n\nexport async function loadIdentity(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<{ identity: AgentCredIdentity; privateKey: CryptoKey | Uint8Array } | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const privateJWK = await storage.load(githubUsername)\n if (!privateJWK) return null\n \n const publicJWK = await resolvePublicKey(githubUsername, config)\n if (!publicJWK) return null\n \n const privateKey = await importJWK(privateJWK, 'EdDSA')\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n return {\n identity: {\n github: {\n username: githubUsername,\n id: 0,\n avatarUrl: ''\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: new Date().toISOString()\n },\n privateKey\n }\n}\n\nexport async function resolvePublicKey(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<JsonWebKey | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n \n try {\n const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`)\n if (!response.ok) return null\n const data = await response.json()\n return data.public_key\n } catch {\n return null\n }\n}\n","import { CompactSign } from 'jose'\nimport { createHash, randomUUID } from 'crypto'\nimport { AgentCredEnvelope, SignOptions, SignIdentity } from './types.js'\n\nexport async function sign(\n content: string,\n identity: SignIdentity,\n options?: SignOptions\n): Promise<AgentCredEnvelope> {\n const agent = options?.agent ?? 'default'\n const contentType = options?.contentType ?? 'text/plain'\n \n const contentHash = createHash('sha256').update(content).digest('hex')\n \n const payload = {\n iss: `${identity.github}@agentcred`,\n sub: agent,\n iat: Math.floor(Date.now() / 1000),\n content_hash: `sha256:${contentHash}`,\n content_type: contentType,\n nonce: randomUUID()\n }\n \n const jws = await new CompactSign(\n new TextEncoder().encode(JSON.stringify(payload))\n )\n .setProtectedHeader({\n alg: 'EdDSA',\n typ: 'agentcred+jwt',\n kid: `${identity.github}@agentcred`\n })\n .sign(identity.privateKey)\n \n return {\n agentcred: {\n v: '1.0',\n jws,\n github: identity.github,\n agent\n },\n content\n }\n}\n","import { compactVerify, importJWK } from 'jose'\nimport { createHash } from 'crypto'\nimport { AgentCredEnvelope, VerifyResult, AgentCredConfig } from './types.js'\nimport { resolvePublicKey } from './identity.js'\n\nexport async function verify(\n envelope: AgentCredEnvelope,\n config?: AgentCredConfig\n): Promise<VerifyResult> {\n try {\n const { github } = envelope.agentcred\n \n const publicJWK = await resolvePublicKey(github, config)\n if (!publicJWK) {\n return { verified: false, error: 'Public key not found' }\n }\n \n const publicKey = await importJWK(publicJWK, 'EdDSA')\n return await verifyOffline(envelope, publicKey)\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n\nexport async function verifyOffline(\n envelope: AgentCredEnvelope,\n publicKey: any\n): Promise<VerifyResult> {\n try {\n const { payload } = await compactVerify(envelope.agentcred.jws, publicKey)\n const claims = JSON.parse(new TextDecoder().decode(payload))\n \n const actualHash = createHash('sha256').update(envelope.content).digest('hex')\n const expectedHash = claims.content_hash.replace('sha256:', '')\n if (actualHash !== expectedHash) {\n return { verified: false, error: 'Content hash mismatch' }\n }\n \n const now = Math.floor(Date.now() / 1000)\n const timeDiff = Math.abs(now - claims.iat)\n if (timeDiff > 86400) {\n return { verified: false, error: 'Timestamp outside valid window' }\n }\n \n return {\n verified: true,\n github: {\n username: envelope.agentcred.github,\n id: 0,\n avatarUrl: ''\n },\n agent: claims.sub,\n signedAt: new Date(claims.iat * 1000).toISOString()\n }\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACCA,SAAoB;AACpB,WAAsB;AACtB,SAAoB;AAEb,IAAM,mBAAN,MAA6C;AAAA,EAC1C,OAAO,oBAAI,IAAwB;AAAA,EAE3C,MAAM,KAAK,UAAkB,YAAuC;AAClE,SAAK,KAAK,IAAI,UAAU,UAAU;AAAA,EACpC;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,WAAO,KAAK,KAAK,IAAI,QAAQ,KAAK;AAAA,EACpC;AAAA,EAEA,MAAM,OAA0B;AAC9B,WAAO,MAAM,KAAK,KAAK,KAAK,KAAK,CAAC;AAAA,EACpC;AACF;AAEO,IAAM,uBAAN,MAAiD;AAAA,EAC9C;AAAA,EAER,YAAY,QAAiB;AAC3B,SAAK,SAAS,UAAe,UAAQ,WAAQ,GAAG,cAAc,MAAM;AAAA,EACtE;AAAA,EAEA,MAAM,KAAK,UAAkB,YAAuC;AAClE,UAAS,SAAM,KAAK,QAAQ,EAAE,WAAW,KAAK,CAAC;AAC/C,UAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,UAAS,aAAU,SAAS,KAAK,UAAU,YAAY,MAAM,CAAC,CAAC;AAAA,EACjE;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,QAAI;AACF,YAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,YAAM,OAAO,MAAS,YAAS,SAAS,OAAO;AAC/C,aAAO,KAAK,MAAM,IAAI;AAAA,IACxB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,OAA0B;AAC9B,QAAI;AACF,YAAM,QAAQ,MAAS,WAAQ,KAAK,MAAM;AAC1C,aAAO,MAAM,OAAO,OAAK,EAAE,SAAS,MAAM,CAAC,EAAE,IAAI,OAAK,EAAE,QAAQ,QAAQ,EAAE,CAAC;AAAA,IAC7E,QAAQ;AACN,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AACF;AAEO,SAAS,uBAAmC;AACjD,MAAI,OAAO,WAAW,aAAa;AACjC,WAAO,IAAI,iBAAiB;AAAA,EAC9B;AACA,SAAO,IAAI,qBAAqB;AAClC;;;AC3DA,kBAAsD;AAGtD,oBAA2B;AAE3B,eAAsB,eACpB,aACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,WAAW,MAAM,MAAM,+BAA+B;AAAA,IAC1D,SAAS,EAAE,eAAe,UAAU,WAAW,GAAG;AAAA,EACpD,CAAC;AACD,MAAI,CAAC,SAAS,GAAI,OAAM,IAAI,MAAM,8BAA8B;AAChE,QAAM,UAAU,MAAM,SAAS,KAAK;AAEpC,QAAM,EAAE,WAAW,WAAW,IAAI,UAAM,6BAAgB,SAAS,EAAE,aAAa,KAAK,CAAC;AACtF,QAAM,YAAY,UAAM,uBAAU,SAAS;AAC3C,QAAM,aAAa,UAAM,uBAAU,UAAU;AAE7C,QAAM,kBAAc,0BAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,QAAM,mBAAmB,MAAM,MAAM,GAAG,MAAM,YAAY;AAAA,IACxD,QAAQ;AAAA,IACR,SAAS;AAAA,MACP,gBAAgB;AAAA,MAChB,iBAAiB,UAAU,WAAW;AAAA,IACxC;AAAA,IACA,MAAM,KAAK,UAAU,EAAE,YAAY,UAAU,CAAC;AAAA,EAChD,CAAC;AACD,MAAI,CAAC,iBAAiB,GAAI,OAAM,IAAI,MAAM,yBAAyB;AACnE,QAAM,eAAe,MAAM,iBAAiB,KAAK;AAEjD,QAAM,QAAQ,KAAK,QAAQ,OAAO,UAAU;AAE5C,SAAO;AAAA,IACL,QAAQ;AAAA,MACN,UAAU,QAAQ;AAAA,MAClB,IAAI,QAAQ;AAAA,MACZ,WAAW,QAAQ;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,cAAc,aAAa;AAAA,EAC7B;AACF;AAEA,eAAsB,aACpB,gBACA,QACqF;AACrF,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,aAAa,MAAM,QAAQ,KAAK,cAAc;AACpD,MAAI,CAAC,WAAY,QAAO;AAExB,QAAM,YAAY,MAAM,iBAAiB,gBAAgB,MAAM;AAC/D,MAAI,CAAC,UAAW,QAAO;AAEvB,QAAM,aAAa,UAAM,uBAAU,YAAY,OAAO;AAEtD,QAAM,kBAAc,0BAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,SAAO;AAAA,IACL,UAAU;AAAA,MACR,QAAQ;AAAA,QACN,UAAU;AAAA,QACV,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,WAAW;AAAA,MACX;AAAA,MACA,eAAc,oBAAI,KAAK,GAAE,YAAY;AAAA,IACvC;AAAA,IACA;AAAA,EACF;AACF;AAEA,eAAsB,iBACpB,gBACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAElE,MAAI;AACF,UAAM,WAAW,MAAM,MAAM,GAAG,MAAM,YAAY,cAAc,EAAE;AAClE,QAAI,CAAC,SAAS,GAAI,QAAO;AACzB,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,WAAO,KAAK;AAAA,EACd,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACnGA,IAAAA,eAA4B;AAC5B,IAAAC,iBAAuC;AAGvC,eAAsB,KACpB,SACA,UACA,SAC4B;AAC5B,QAAM,QAAQ,SAAS,SAAS;AAChC,QAAM,cAAc,SAAS,eAAe;AAE5C,QAAM,kBAAc,2BAAW,QAAQ,EAAE,OAAO,OAAO,EAAE,OAAO,KAAK;AAErE,QAAM,UAAU;AAAA,IACd,KAAK,GAAG,SAAS,MAAM;AAAA,IACvB,KAAK;AAAA,IACL,KAAK,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AAAA,IACjC,cAAc,UAAU,WAAW;AAAA,IACnC,cAAc;AAAA,IACd,WAAO,2BAAW;AAAA,EACpB;AAEA,QAAM,MAAM,MAAM,IAAI;AAAA,IACpB,IAAI,YAAY,EAAE,OAAO,KAAK,UAAU,OAAO,CAAC;AAAA,EAClD,EACG,mBAAmB;AAAA,IAClB,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK,GAAG,SAAS,MAAM;AAAA,EACzB,CAAC,EACA,KAAK,SAAS,UAAU;AAE3B,SAAO;AAAA,IACL,WAAW;AAAA,MACT,GAAG;AAAA,MACH;AAAA,MACA,QAAQ,SAAS;AAAA,MACjB;AAAA,IACF;AAAA,IACA;AAAA,EACF;AACF;;;AC1CA,IAAAC,eAAyC;AACzC,IAAAC,iBAA2B;AAI3B,eAAsB,OACpB,UACA,QACuB;AACvB,MAAI;AACF,UAAM,EAAE,OAAO,IAAI,SAAS;AAE5B,UAAM,YAAY,MAAM,iBAAiB,QAAQ,MAAM;AACvD,QAAI,CAAC,WAAW;AACd,aAAO,EAAE,UAAU,OAAO,OAAO,uBAAuB;AAAA,IAC1D;AAEA,UAAM,YAAY,UAAM,wBAAU,WAAW,OAAO;AACpD,WAAO,MAAM,cAAc,UAAU,SAAS;AAAA,EAChD,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;AAEA,eAAsB,cACpB,UACA,WACuB;AACvB,MAAI;AACF,UAAM,EAAE,QAAQ,IAAI,UAAM,4BAAc,SAAS,UAAU,KAAK,SAAS;AACzE,UAAM,SAAS,KAAK,MAAM,IAAI,YAAY,EAAE,OAAO,OAAO,CAAC;AAE3D,UAAM,iBAAa,2BAAW,QAAQ,EAAE,OAAO,SAAS,OAAO,EAAE,OAAO,KAAK;AAC7E,UAAM,eAAe,OAAO,aAAa,QAAQ,WAAW,EAAE;AAC9D,QAAI,eAAe,cAAc;AAC/B,aAAO,EAAE,UAAU,OAAO,OAAO,wBAAwB;AAAA,IAC3D;AAEA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AACxC,UAAM,WAAW,KAAK,IAAI,MAAM,OAAO,GAAG;AAC1C,QAAI,WAAW,OAAO;AACpB,aAAO,EAAE,UAAU,OAAO,OAAO,iCAAiC;AAAA,IACpE;AAEA,WAAO;AAAA,MACL,UAAU;AAAA,MACV,QAAQ;AAAA,QACN,UAAU,SAAS,UAAU;AAAA,QAC7B,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,OAAO,OAAO;AAAA,MACd,UAAU,IAAI,KAAK,OAAO,MAAM,GAAI,EAAE,YAAY;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;;;AJzDO,IAAM,UAAU;","names":["import_jose","import_crypto","import_jose","import_crypto"]}
|
package/dist/index.d.cts
ADDED
|
@@ -0,0 +1,80 @@
|
|
|
1
|
+
import { CryptoKey as CryptoKey$1 } from 'jose';
|
|
2
|
+
|
|
3
|
+
interface AgentCredIdentity {
|
|
4
|
+
github: {
|
|
5
|
+
username: string;
|
|
6
|
+
id: number;
|
|
7
|
+
avatarUrl: string;
|
|
8
|
+
};
|
|
9
|
+
publicKey: JsonWebKey;
|
|
10
|
+
fingerprint: string;
|
|
11
|
+
registeredAt: string;
|
|
12
|
+
}
|
|
13
|
+
interface AgentCredEnvelope {
|
|
14
|
+
agentcred: {
|
|
15
|
+
v: '1.0';
|
|
16
|
+
jws: string;
|
|
17
|
+
github: string;
|
|
18
|
+
agent: string;
|
|
19
|
+
};
|
|
20
|
+
content: string;
|
|
21
|
+
}
|
|
22
|
+
interface SignOptions {
|
|
23
|
+
agent?: string;
|
|
24
|
+
contentType?: string;
|
|
25
|
+
}
|
|
26
|
+
interface VerifyResult {
|
|
27
|
+
verified: boolean;
|
|
28
|
+
github?: {
|
|
29
|
+
username: string;
|
|
30
|
+
id: number;
|
|
31
|
+
avatarUrl: string;
|
|
32
|
+
};
|
|
33
|
+
agent?: string;
|
|
34
|
+
signedAt?: string;
|
|
35
|
+
error?: string;
|
|
36
|
+
}
|
|
37
|
+
interface KeyStorage {
|
|
38
|
+
save(username: string, privateKey: JsonWebKey): Promise<void>;
|
|
39
|
+
load(username: string): Promise<JsonWebKey | null>;
|
|
40
|
+
list(): Promise<string[]>;
|
|
41
|
+
}
|
|
42
|
+
interface AgentCredConfig {
|
|
43
|
+
apiUrl?: string;
|
|
44
|
+
storage?: KeyStorage;
|
|
45
|
+
}
|
|
46
|
+
interface SignIdentity {
|
|
47
|
+
privateKey: CryptoKey$1 | Uint8Array;
|
|
48
|
+
github: string;
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
declare class MemoryKeyStorage implements KeyStorage {
|
|
52
|
+
private keys;
|
|
53
|
+
save(username: string, privateKey: JsonWebKey): Promise<void>;
|
|
54
|
+
load(username: string): Promise<JsonWebKey | null>;
|
|
55
|
+
list(): Promise<string[]>;
|
|
56
|
+
}
|
|
57
|
+
declare class FileSystemKeyStorage implements KeyStorage {
|
|
58
|
+
private keyDir;
|
|
59
|
+
constructor(keyDir?: string);
|
|
60
|
+
save(username: string, privateKey: JsonWebKey): Promise<void>;
|
|
61
|
+
load(username: string): Promise<JsonWebKey | null>;
|
|
62
|
+
list(): Promise<string[]>;
|
|
63
|
+
}
|
|
64
|
+
declare function createDefaultStorage(): KeyStorage;
|
|
65
|
+
|
|
66
|
+
declare function createIdentity(githubToken: string, config?: AgentCredConfig): Promise<AgentCredIdentity>;
|
|
67
|
+
declare function loadIdentity(githubUsername: string, config?: AgentCredConfig): Promise<{
|
|
68
|
+
identity: AgentCredIdentity;
|
|
69
|
+
privateKey: CryptoKey | Uint8Array;
|
|
70
|
+
} | null>;
|
|
71
|
+
declare function resolvePublicKey(githubUsername: string, config?: AgentCredConfig): Promise<JsonWebKey | null>;
|
|
72
|
+
|
|
73
|
+
declare function sign(content: string, identity: SignIdentity, options?: SignOptions): Promise<AgentCredEnvelope>;
|
|
74
|
+
|
|
75
|
+
declare function verify(envelope: AgentCredEnvelope, config?: AgentCredConfig): Promise<VerifyResult>;
|
|
76
|
+
declare function verifyOffline(envelope: AgentCredEnvelope, publicKey: any): Promise<VerifyResult>;
|
|
77
|
+
|
|
78
|
+
declare const version = "0.0.1";
|
|
79
|
+
|
|
80
|
+
export { type AgentCredConfig, type AgentCredEnvelope, type AgentCredIdentity, FileSystemKeyStorage, type KeyStorage, MemoryKeyStorage, type SignIdentity, type SignOptions, type VerifyResult, createDefaultStorage, createIdentity, loadIdentity, resolvePublicKey, sign, verify, verifyOffline, version };
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,80 @@
|
|
|
1
|
+
import { CryptoKey as CryptoKey$1 } from 'jose';
|
|
2
|
+
|
|
3
|
+
interface AgentCredIdentity {
|
|
4
|
+
github: {
|
|
5
|
+
username: string;
|
|
6
|
+
id: number;
|
|
7
|
+
avatarUrl: string;
|
|
8
|
+
};
|
|
9
|
+
publicKey: JsonWebKey;
|
|
10
|
+
fingerprint: string;
|
|
11
|
+
registeredAt: string;
|
|
12
|
+
}
|
|
13
|
+
interface AgentCredEnvelope {
|
|
14
|
+
agentcred: {
|
|
15
|
+
v: '1.0';
|
|
16
|
+
jws: string;
|
|
17
|
+
github: string;
|
|
18
|
+
agent: string;
|
|
19
|
+
};
|
|
20
|
+
content: string;
|
|
21
|
+
}
|
|
22
|
+
interface SignOptions {
|
|
23
|
+
agent?: string;
|
|
24
|
+
contentType?: string;
|
|
25
|
+
}
|
|
26
|
+
interface VerifyResult {
|
|
27
|
+
verified: boolean;
|
|
28
|
+
github?: {
|
|
29
|
+
username: string;
|
|
30
|
+
id: number;
|
|
31
|
+
avatarUrl: string;
|
|
32
|
+
};
|
|
33
|
+
agent?: string;
|
|
34
|
+
signedAt?: string;
|
|
35
|
+
error?: string;
|
|
36
|
+
}
|
|
37
|
+
interface KeyStorage {
|
|
38
|
+
save(username: string, privateKey: JsonWebKey): Promise<void>;
|
|
39
|
+
load(username: string): Promise<JsonWebKey | null>;
|
|
40
|
+
list(): Promise<string[]>;
|
|
41
|
+
}
|
|
42
|
+
interface AgentCredConfig {
|
|
43
|
+
apiUrl?: string;
|
|
44
|
+
storage?: KeyStorage;
|
|
45
|
+
}
|
|
46
|
+
interface SignIdentity {
|
|
47
|
+
privateKey: CryptoKey$1 | Uint8Array;
|
|
48
|
+
github: string;
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
declare class MemoryKeyStorage implements KeyStorage {
|
|
52
|
+
private keys;
|
|
53
|
+
save(username: string, privateKey: JsonWebKey): Promise<void>;
|
|
54
|
+
load(username: string): Promise<JsonWebKey | null>;
|
|
55
|
+
list(): Promise<string[]>;
|
|
56
|
+
}
|
|
57
|
+
declare class FileSystemKeyStorage implements KeyStorage {
|
|
58
|
+
private keyDir;
|
|
59
|
+
constructor(keyDir?: string);
|
|
60
|
+
save(username: string, privateKey: JsonWebKey): Promise<void>;
|
|
61
|
+
load(username: string): Promise<JsonWebKey | null>;
|
|
62
|
+
list(): Promise<string[]>;
|
|
63
|
+
}
|
|
64
|
+
declare function createDefaultStorage(): KeyStorage;
|
|
65
|
+
|
|
66
|
+
declare function createIdentity(githubToken: string, config?: AgentCredConfig): Promise<AgentCredIdentity>;
|
|
67
|
+
declare function loadIdentity(githubUsername: string, config?: AgentCredConfig): Promise<{
|
|
68
|
+
identity: AgentCredIdentity;
|
|
69
|
+
privateKey: CryptoKey | Uint8Array;
|
|
70
|
+
} | null>;
|
|
71
|
+
declare function resolvePublicKey(githubUsername: string, config?: AgentCredConfig): Promise<JsonWebKey | null>;
|
|
72
|
+
|
|
73
|
+
declare function sign(content: string, identity: SignIdentity, options?: SignOptions): Promise<AgentCredEnvelope>;
|
|
74
|
+
|
|
75
|
+
declare function verify(envelope: AgentCredEnvelope, config?: AgentCredConfig): Promise<VerifyResult>;
|
|
76
|
+
declare function verifyOffline(envelope: AgentCredEnvelope, publicKey: any): Promise<VerifyResult>;
|
|
77
|
+
|
|
78
|
+
declare const version = "0.0.1";
|
|
79
|
+
|
|
80
|
+
export { type AgentCredConfig, type AgentCredEnvelope, type AgentCredIdentity, FileSystemKeyStorage, type KeyStorage, MemoryKeyStorage, type SignIdentity, type SignOptions, type VerifyResult, createDefaultStorage, createIdentity, loadIdentity, resolvePublicKey, sign, verify, verifyOffline, version };
|
package/dist/index.js
ADDED
|
@@ -0,0 +1,216 @@
|
|
|
1
|
+
// src/storage.ts
|
|
2
|
+
import * as fs from "fs/promises";
|
|
3
|
+
import * as path from "path";
|
|
4
|
+
import * as os from "os";
|
|
5
|
+
var MemoryKeyStorage = class {
|
|
6
|
+
keys = /* @__PURE__ */ new Map();
|
|
7
|
+
async save(username, privateKey) {
|
|
8
|
+
this.keys.set(username, privateKey);
|
|
9
|
+
}
|
|
10
|
+
async load(username) {
|
|
11
|
+
return this.keys.get(username) ?? null;
|
|
12
|
+
}
|
|
13
|
+
async list() {
|
|
14
|
+
return Array.from(this.keys.keys());
|
|
15
|
+
}
|
|
16
|
+
};
|
|
17
|
+
var FileSystemKeyStorage = class {
|
|
18
|
+
keyDir;
|
|
19
|
+
constructor(keyDir) {
|
|
20
|
+
this.keyDir = keyDir ?? path.join(os.homedir(), ".agentcred", "keys");
|
|
21
|
+
}
|
|
22
|
+
async save(username, privateKey) {
|
|
23
|
+
await fs.mkdir(this.keyDir, { recursive: true });
|
|
24
|
+
const keyPath = path.join(this.keyDir, `${username}.jwk`);
|
|
25
|
+
await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2));
|
|
26
|
+
}
|
|
27
|
+
async load(username) {
|
|
28
|
+
try {
|
|
29
|
+
const keyPath = path.join(this.keyDir, `${username}.jwk`);
|
|
30
|
+
const data = await fs.readFile(keyPath, "utf-8");
|
|
31
|
+
return JSON.parse(data);
|
|
32
|
+
} catch {
|
|
33
|
+
return null;
|
|
34
|
+
}
|
|
35
|
+
}
|
|
36
|
+
async list() {
|
|
37
|
+
try {
|
|
38
|
+
const files = await fs.readdir(this.keyDir);
|
|
39
|
+
return files.filter((f) => f.endsWith(".jwk")).map((f) => f.replace(".jwk", ""));
|
|
40
|
+
} catch {
|
|
41
|
+
return [];
|
|
42
|
+
}
|
|
43
|
+
}
|
|
44
|
+
};
|
|
45
|
+
function createDefaultStorage() {
|
|
46
|
+
if (typeof window !== "undefined") {
|
|
47
|
+
return new MemoryKeyStorage();
|
|
48
|
+
}
|
|
49
|
+
return new FileSystemKeyStorage();
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
// src/identity.ts
|
|
53
|
+
import { generateKeyPair, exportJWK, importJWK } from "jose";
|
|
54
|
+
import { createHash } from "crypto";
|
|
55
|
+
async function createIdentity(githubToken, config) {
|
|
56
|
+
const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
|
|
57
|
+
const storage = config?.storage ?? createDefaultStorage();
|
|
58
|
+
const response = await fetch("https://api.github.com/user", {
|
|
59
|
+
headers: { Authorization: `Bearer ${githubToken}` }
|
|
60
|
+
});
|
|
61
|
+
if (!response.ok) throw new Error("GitHub authentication failed");
|
|
62
|
+
const profile = await response.json();
|
|
63
|
+
const { publicKey, privateKey } = await generateKeyPair("EdDSA", { extractable: true });
|
|
64
|
+
const publicJWK = await exportJWK(publicKey);
|
|
65
|
+
const privateJWK = await exportJWK(privateKey);
|
|
66
|
+
const fingerprint = createHash("sha256").update(JSON.stringify(publicJWK)).digest("hex");
|
|
67
|
+
const registerResponse = await fetch(`${apiUrl}/v1/keys`, {
|
|
68
|
+
method: "POST",
|
|
69
|
+
headers: {
|
|
70
|
+
"Content-Type": "application/json",
|
|
71
|
+
"Authorization": `Bearer ${githubToken}`
|
|
72
|
+
},
|
|
73
|
+
body: JSON.stringify({ public_key: publicJWK })
|
|
74
|
+
});
|
|
75
|
+
if (!registerResponse.ok) throw new Error("Key registration failed");
|
|
76
|
+
const registration = await registerResponse.json();
|
|
77
|
+
await storage.save(profile.login, privateJWK);
|
|
78
|
+
return {
|
|
79
|
+
github: {
|
|
80
|
+
username: profile.login,
|
|
81
|
+
id: profile.id,
|
|
82
|
+
avatarUrl: profile.avatar_url
|
|
83
|
+
},
|
|
84
|
+
publicKey: publicJWK,
|
|
85
|
+
fingerprint,
|
|
86
|
+
registeredAt: registration.registered_at
|
|
87
|
+
};
|
|
88
|
+
}
|
|
89
|
+
async function loadIdentity(githubUsername, config) {
|
|
90
|
+
const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
|
|
91
|
+
const storage = config?.storage ?? createDefaultStorage();
|
|
92
|
+
const privateJWK = await storage.load(githubUsername);
|
|
93
|
+
if (!privateJWK) return null;
|
|
94
|
+
const publicJWK = await resolvePublicKey(githubUsername, config);
|
|
95
|
+
if (!publicJWK) return null;
|
|
96
|
+
const privateKey = await importJWK(privateJWK, "EdDSA");
|
|
97
|
+
const fingerprint = createHash("sha256").update(JSON.stringify(publicJWK)).digest("hex");
|
|
98
|
+
return {
|
|
99
|
+
identity: {
|
|
100
|
+
github: {
|
|
101
|
+
username: githubUsername,
|
|
102
|
+
id: 0,
|
|
103
|
+
avatarUrl: ""
|
|
104
|
+
},
|
|
105
|
+
publicKey: publicJWK,
|
|
106
|
+
fingerprint,
|
|
107
|
+
registeredAt: (/* @__PURE__ */ new Date()).toISOString()
|
|
108
|
+
},
|
|
109
|
+
privateKey
|
|
110
|
+
};
|
|
111
|
+
}
|
|
112
|
+
async function resolvePublicKey(githubUsername, config) {
|
|
113
|
+
const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
|
|
114
|
+
try {
|
|
115
|
+
const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`);
|
|
116
|
+
if (!response.ok) return null;
|
|
117
|
+
const data = await response.json();
|
|
118
|
+
return data.public_key;
|
|
119
|
+
} catch {
|
|
120
|
+
return null;
|
|
121
|
+
}
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
// src/sign.ts
|
|
125
|
+
import { CompactSign } from "jose";
|
|
126
|
+
import { createHash as createHash2, randomUUID } from "crypto";
|
|
127
|
+
async function sign(content, identity, options) {
|
|
128
|
+
const agent = options?.agent ?? "default";
|
|
129
|
+
const contentType = options?.contentType ?? "text/plain";
|
|
130
|
+
const contentHash = createHash2("sha256").update(content).digest("hex");
|
|
131
|
+
const payload = {
|
|
132
|
+
iss: `${identity.github}@agentcred`,
|
|
133
|
+
sub: agent,
|
|
134
|
+
iat: Math.floor(Date.now() / 1e3),
|
|
135
|
+
content_hash: `sha256:${contentHash}`,
|
|
136
|
+
content_type: contentType,
|
|
137
|
+
nonce: randomUUID()
|
|
138
|
+
};
|
|
139
|
+
const jws = await new CompactSign(
|
|
140
|
+
new TextEncoder().encode(JSON.stringify(payload))
|
|
141
|
+
).setProtectedHeader({
|
|
142
|
+
alg: "EdDSA",
|
|
143
|
+
typ: "agentcred+jwt",
|
|
144
|
+
kid: `${identity.github}@agentcred`
|
|
145
|
+
}).sign(identity.privateKey);
|
|
146
|
+
return {
|
|
147
|
+
agentcred: {
|
|
148
|
+
v: "1.0",
|
|
149
|
+
jws,
|
|
150
|
+
github: identity.github,
|
|
151
|
+
agent
|
|
152
|
+
},
|
|
153
|
+
content
|
|
154
|
+
};
|
|
155
|
+
}
|
|
156
|
+
|
|
157
|
+
// src/verify.ts
|
|
158
|
+
import { compactVerify, importJWK as importJWK2 } from "jose";
|
|
159
|
+
import { createHash as createHash3 } from "crypto";
|
|
160
|
+
async function verify(envelope, config) {
|
|
161
|
+
try {
|
|
162
|
+
const { github } = envelope.agentcred;
|
|
163
|
+
const publicJWK = await resolvePublicKey(github, config);
|
|
164
|
+
if (!publicJWK) {
|
|
165
|
+
return { verified: false, error: "Public key not found" };
|
|
166
|
+
}
|
|
167
|
+
const publicKey = await importJWK2(publicJWK, "EdDSA");
|
|
168
|
+
return await verifyOffline(envelope, publicKey);
|
|
169
|
+
} catch (error) {
|
|
170
|
+
return { verified: false, error: String(error) };
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
async function verifyOffline(envelope, publicKey) {
|
|
174
|
+
try {
|
|
175
|
+
const { payload } = await compactVerify(envelope.agentcred.jws, publicKey);
|
|
176
|
+
const claims = JSON.parse(new TextDecoder().decode(payload));
|
|
177
|
+
const actualHash = createHash3("sha256").update(envelope.content).digest("hex");
|
|
178
|
+
const expectedHash = claims.content_hash.replace("sha256:", "");
|
|
179
|
+
if (actualHash !== expectedHash) {
|
|
180
|
+
return { verified: false, error: "Content hash mismatch" };
|
|
181
|
+
}
|
|
182
|
+
const now = Math.floor(Date.now() / 1e3);
|
|
183
|
+
const timeDiff = Math.abs(now - claims.iat);
|
|
184
|
+
if (timeDiff > 86400) {
|
|
185
|
+
return { verified: false, error: "Timestamp outside valid window" };
|
|
186
|
+
}
|
|
187
|
+
return {
|
|
188
|
+
verified: true,
|
|
189
|
+
github: {
|
|
190
|
+
username: envelope.agentcred.github,
|
|
191
|
+
id: 0,
|
|
192
|
+
avatarUrl: ""
|
|
193
|
+
},
|
|
194
|
+
agent: claims.sub,
|
|
195
|
+
signedAt: new Date(claims.iat * 1e3).toISOString()
|
|
196
|
+
};
|
|
197
|
+
} catch (error) {
|
|
198
|
+
return { verified: false, error: String(error) };
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
// src/index.ts
|
|
203
|
+
var version = "0.0.1";
|
|
204
|
+
export {
|
|
205
|
+
FileSystemKeyStorage,
|
|
206
|
+
MemoryKeyStorage,
|
|
207
|
+
createDefaultStorage,
|
|
208
|
+
createIdentity,
|
|
209
|
+
loadIdentity,
|
|
210
|
+
resolvePublicKey,
|
|
211
|
+
sign,
|
|
212
|
+
verify,
|
|
213
|
+
verifyOffline,
|
|
214
|
+
version
|
|
215
|
+
};
|
|
216
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/storage.ts","../src/identity.ts","../src/sign.ts","../src/verify.ts","../src/index.ts"],"sourcesContent":["import { KeyStorage } from './types.js'\nimport * as fs from 'fs/promises'\nimport * as path from 'path'\nimport * as os from 'os'\n\nexport class MemoryKeyStorage implements KeyStorage {\n private keys = new Map<string, JsonWebKey>()\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n this.keys.set(username, privateKey)\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n return this.keys.get(username) ?? null\n }\n \n async list(): Promise<string[]> {\n return Array.from(this.keys.keys())\n }\n}\n\nexport class FileSystemKeyStorage implements KeyStorage {\n private keyDir: string\n \n constructor(keyDir?: string) {\n this.keyDir = keyDir ?? path.join(os.homedir(), '.agentcred', 'keys')\n }\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n await fs.mkdir(this.keyDir, { recursive: true })\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2))\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n try {\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n const data = await fs.readFile(keyPath, 'utf-8')\n return JSON.parse(data)\n } catch {\n return null\n }\n }\n \n async list(): Promise<string[]> {\n try {\n const files = await fs.readdir(this.keyDir)\n return files.filter(f => f.endsWith('.jwk')).map(f => f.replace('.jwk', ''))\n } catch {\n return []\n }\n }\n}\n\nexport function createDefaultStorage(): KeyStorage {\n if (typeof window !== 'undefined') {\n return new MemoryKeyStorage()\n }\n return new FileSystemKeyStorage()\n}\n","import { generateKeyPair, exportJWK, importJWK } from 'jose'\nimport { AgentCredIdentity, AgentCredConfig, SignIdentity } from './types.js'\nimport { createDefaultStorage } from './storage.js'\nimport { createHash } from 'crypto'\n\nexport async function createIdentity(\n githubToken: string,\n config?: AgentCredConfig\n): Promise<AgentCredIdentity> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const response = await fetch('https://api.github.com/user', {\n headers: { Authorization: `Bearer ${githubToken}` }\n })\n if (!response.ok) throw new Error('GitHub authentication failed')\n const profile = await response.json()\n \n const { publicKey, privateKey } = await generateKeyPair('EdDSA', { extractable: true })\n const publicJWK = await exportJWK(publicKey)\n const privateJWK = await exportJWK(privateKey)\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n const registerResponse = await fetch(`${apiUrl}/v1/keys`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${githubToken}`\n },\n body: JSON.stringify({ public_key: publicJWK })\n })\n if (!registerResponse.ok) throw new Error('Key registration failed')\n const registration = await registerResponse.json()\n \n await storage.save(profile.login, privateJWK)\n \n return {\n github: {\n username: profile.login,\n id: profile.id,\n avatarUrl: profile.avatar_url\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: registration.registered_at\n }\n}\n\nexport async function loadIdentity(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<{ identity: AgentCredIdentity; privateKey: CryptoKey | Uint8Array } | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const privateJWK = await storage.load(githubUsername)\n if (!privateJWK) return null\n \n const publicJWK = await resolvePublicKey(githubUsername, config)\n if (!publicJWK) return null\n \n const privateKey = await importJWK(privateJWK, 'EdDSA')\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n return {\n identity: {\n github: {\n username: githubUsername,\n id: 0,\n avatarUrl: ''\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: new Date().toISOString()\n },\n privateKey\n }\n}\n\nexport async function resolvePublicKey(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<JsonWebKey | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n \n try {\n const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`)\n if (!response.ok) return null\n const data = await response.json()\n return data.public_key\n } catch {\n return null\n }\n}\n","import { CompactSign } from 'jose'\nimport { createHash, randomUUID } from 'crypto'\nimport { AgentCredEnvelope, SignOptions, SignIdentity } from './types.js'\n\nexport async function sign(\n content: string,\n identity: SignIdentity,\n options?: SignOptions\n): Promise<AgentCredEnvelope> {\n const agent = options?.agent ?? 'default'\n const contentType = options?.contentType ?? 'text/plain'\n \n const contentHash = createHash('sha256').update(content).digest('hex')\n \n const payload = {\n iss: `${identity.github}@agentcred`,\n sub: agent,\n iat: Math.floor(Date.now() / 1000),\n content_hash: `sha256:${contentHash}`,\n content_type: contentType,\n nonce: randomUUID()\n }\n \n const jws = await new CompactSign(\n new TextEncoder().encode(JSON.stringify(payload))\n )\n .setProtectedHeader({\n alg: 'EdDSA',\n typ: 'agentcred+jwt',\n kid: `${identity.github}@agentcred`\n })\n .sign(identity.privateKey)\n \n return {\n agentcred: {\n v: '1.0',\n jws,\n github: identity.github,\n agent\n },\n content\n }\n}\n","import { compactVerify, importJWK } from 'jose'\nimport { createHash } from 'crypto'\nimport { AgentCredEnvelope, VerifyResult, AgentCredConfig } from './types.js'\nimport { resolvePublicKey } from './identity.js'\n\nexport async function verify(\n envelope: AgentCredEnvelope,\n config?: AgentCredConfig\n): Promise<VerifyResult> {\n try {\n const { github } = envelope.agentcred\n \n const publicJWK = await resolvePublicKey(github, config)\n if (!publicJWK) {\n return { verified: false, error: 'Public key not found' }\n }\n \n const publicKey = await importJWK(publicJWK, 'EdDSA')\n return await verifyOffline(envelope, publicKey)\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n\nexport async function verifyOffline(\n envelope: AgentCredEnvelope,\n publicKey: any\n): Promise<VerifyResult> {\n try {\n const { payload } = await compactVerify(envelope.agentcred.jws, publicKey)\n const claims = JSON.parse(new TextDecoder().decode(payload))\n \n const actualHash = createHash('sha256').update(envelope.content).digest('hex')\n const expectedHash = claims.content_hash.replace('sha256:', '')\n if (actualHash !== expectedHash) {\n return { verified: false, error: 'Content hash mismatch' }\n }\n \n const now = Math.floor(Date.now() / 1000)\n const timeDiff = Math.abs(now - claims.iat)\n if (timeDiff > 86400) {\n return { verified: false, error: 'Timestamp outside valid window' }\n }\n \n return {\n verified: true,\n github: {\n username: envelope.agentcred.github,\n id: 0,\n avatarUrl: ''\n },\n agent: claims.sub,\n signedAt: new Date(claims.iat * 1000).toISOString()\n }\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n","export const version = '0.0.1'\n\nexport * from './types.js'\nexport { MemoryKeyStorage, FileSystemKeyStorage, createDefaultStorage } from './storage.js'\nexport { createIdentity, loadIdentity, resolvePublicKey } from './identity.js'\nexport { sign } from './sign.js'\nexport { verify, verifyOffline } from './verify.js'\n"],"mappings":";AACA,YAAY,QAAQ;AACpB,YAAY,UAAU;AACtB,YAAY,QAAQ;AAEb,IAAM,mBAAN,MAA6C;AAAA,EAC1C,OAAO,oBAAI,IAAwB;AAAA,EAE3C,MAAM,KAAK,UAAkB,YAAuC;AAClE,SAAK,KAAK,IAAI,UAAU,UAAU;AAAA,EACpC;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,WAAO,KAAK,KAAK,IAAI,QAAQ,KAAK;AAAA,EACpC;AAAA,EAEA,MAAM,OAA0B;AAC9B,WAAO,MAAM,KAAK,KAAK,KAAK,KAAK,CAAC;AAAA,EACpC;AACF;AAEO,IAAM,uBAAN,MAAiD;AAAA,EAC9C;AAAA,EAER,YAAY,QAAiB;AAC3B,SAAK,SAAS,UAAe,UAAQ,WAAQ,GAAG,cAAc,MAAM;AAAA,EACtE;AAAA,EAEA,MAAM,KAAK,UAAkB,YAAuC;AAClE,UAAS,SAAM,KAAK,QAAQ,EAAE,WAAW,KAAK,CAAC;AAC/C,UAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,UAAS,aAAU,SAAS,KAAK,UAAU,YAAY,MAAM,CAAC,CAAC;AAAA,EACjE;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,QAAI;AACF,YAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,YAAM,OAAO,MAAS,YAAS,SAAS,OAAO;AAC/C,aAAO,KAAK,MAAM,IAAI;AAAA,IACxB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,OAA0B;AAC9B,QAAI;AACF,YAAM,QAAQ,MAAS,WAAQ,KAAK,MAAM;AAC1C,aAAO,MAAM,OAAO,OAAK,EAAE,SAAS,MAAM,CAAC,EAAE,IAAI,OAAK,EAAE,QAAQ,QAAQ,EAAE,CAAC;AAAA,IAC7E,QAAQ;AACN,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AACF;AAEO,SAAS,uBAAmC;AACjD,MAAI,OAAO,WAAW,aAAa;AACjC,WAAO,IAAI,iBAAiB;AAAA,EAC9B;AACA,SAAO,IAAI,qBAAqB;AAClC;;;AC3DA,SAAS,iBAAiB,WAAW,iBAAiB;AAGtD,SAAS,kBAAkB;AAE3B,eAAsB,eACpB,aACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,WAAW,MAAM,MAAM,+BAA+B;AAAA,IAC1D,SAAS,EAAE,eAAe,UAAU,WAAW,GAAG;AAAA,EACpD,CAAC;AACD,MAAI,CAAC,SAAS,GAAI,OAAM,IAAI,MAAM,8BAA8B;AAChE,QAAM,UAAU,MAAM,SAAS,KAAK;AAEpC,QAAM,EAAE,WAAW,WAAW,IAAI,MAAM,gBAAgB,SAAS,EAAE,aAAa,KAAK,CAAC;AACtF,QAAM,YAAY,MAAM,UAAU,SAAS;AAC3C,QAAM,aAAa,MAAM,UAAU,UAAU;AAE7C,QAAM,cAAc,WAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,QAAM,mBAAmB,MAAM,MAAM,GAAG,MAAM,YAAY;AAAA,IACxD,QAAQ;AAAA,IACR,SAAS;AAAA,MACP,gBAAgB;AAAA,MAChB,iBAAiB,UAAU,WAAW;AAAA,IACxC;AAAA,IACA,MAAM,KAAK,UAAU,EAAE,YAAY,UAAU,CAAC;AAAA,EAChD,CAAC;AACD,MAAI,CAAC,iBAAiB,GAAI,OAAM,IAAI,MAAM,yBAAyB;AACnE,QAAM,eAAe,MAAM,iBAAiB,KAAK;AAEjD,QAAM,QAAQ,KAAK,QAAQ,OAAO,UAAU;AAE5C,SAAO;AAAA,IACL,QAAQ;AAAA,MACN,UAAU,QAAQ;AAAA,MAClB,IAAI,QAAQ;AAAA,MACZ,WAAW,QAAQ;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,cAAc,aAAa;AAAA,EAC7B;AACF;AAEA,eAAsB,aACpB,gBACA,QACqF;AACrF,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,aAAa,MAAM,QAAQ,KAAK,cAAc;AACpD,MAAI,CAAC,WAAY,QAAO;AAExB,QAAM,YAAY,MAAM,iBAAiB,gBAAgB,MAAM;AAC/D,MAAI,CAAC,UAAW,QAAO;AAEvB,QAAM,aAAa,MAAM,UAAU,YAAY,OAAO;AAEtD,QAAM,cAAc,WAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,SAAO;AAAA,IACL,UAAU;AAAA,MACR,QAAQ;AAAA,QACN,UAAU;AAAA,QACV,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,WAAW;AAAA,MACX;AAAA,MACA,eAAc,oBAAI,KAAK,GAAE,YAAY;AAAA,IACvC;AAAA,IACA;AAAA,EACF;AACF;AAEA,eAAsB,iBACpB,gBACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAElE,MAAI;AACF,UAAM,WAAW,MAAM,MAAM,GAAG,MAAM,YAAY,cAAc,EAAE;AAClE,QAAI,CAAC,SAAS,GAAI,QAAO;AACzB,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,WAAO,KAAK;AAAA,EACd,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACnGA,SAAS,mBAAmB;AAC5B,SAAS,cAAAA,aAAY,kBAAkB;AAGvC,eAAsB,KACpB,SACA,UACA,SAC4B;AAC5B,QAAM,QAAQ,SAAS,SAAS;AAChC,QAAM,cAAc,SAAS,eAAe;AAE5C,QAAM,cAAcA,YAAW,QAAQ,EAAE,OAAO,OAAO,EAAE,OAAO,KAAK;AAErE,QAAM,UAAU;AAAA,IACd,KAAK,GAAG,SAAS,MAAM;AAAA,IACvB,KAAK;AAAA,IACL,KAAK,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AAAA,IACjC,cAAc,UAAU,WAAW;AAAA,IACnC,cAAc;AAAA,IACd,OAAO,WAAW;AAAA,EACpB;AAEA,QAAM,MAAM,MAAM,IAAI;AAAA,IACpB,IAAI,YAAY,EAAE,OAAO,KAAK,UAAU,OAAO,CAAC;AAAA,EAClD,EACG,mBAAmB;AAAA,IAClB,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK,GAAG,SAAS,MAAM;AAAA,EACzB,CAAC,EACA,KAAK,SAAS,UAAU;AAE3B,SAAO;AAAA,IACL,WAAW;AAAA,MACT,GAAG;AAAA,MACH;AAAA,MACA,QAAQ,SAAS;AAAA,MACjB;AAAA,IACF;AAAA,IACA;AAAA,EACF;AACF;;;AC1CA,SAAS,eAAe,aAAAC,kBAAiB;AACzC,SAAS,cAAAC,mBAAkB;AAI3B,eAAsB,OACpB,UACA,QACuB;AACvB,MAAI;AACF,UAAM,EAAE,OAAO,IAAI,SAAS;AAE5B,UAAM,YAAY,MAAM,iBAAiB,QAAQ,MAAM;AACvD,QAAI,CAAC,WAAW;AACd,aAAO,EAAE,UAAU,OAAO,OAAO,uBAAuB;AAAA,IAC1D;AAEA,UAAM,YAAY,MAAMC,WAAU,WAAW,OAAO;AACpD,WAAO,MAAM,cAAc,UAAU,SAAS;AAAA,EAChD,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;AAEA,eAAsB,cACpB,UACA,WACuB;AACvB,MAAI;AACF,UAAM,EAAE,QAAQ,IAAI,MAAM,cAAc,SAAS,UAAU,KAAK,SAAS;AACzE,UAAM,SAAS,KAAK,MAAM,IAAI,YAAY,EAAE,OAAO,OAAO,CAAC;AAE3D,UAAM,aAAaC,YAAW,QAAQ,EAAE,OAAO,SAAS,OAAO,EAAE,OAAO,KAAK;AAC7E,UAAM,eAAe,OAAO,aAAa,QAAQ,WAAW,EAAE;AAC9D,QAAI,eAAe,cAAc;AAC/B,aAAO,EAAE,UAAU,OAAO,OAAO,wBAAwB;AAAA,IAC3D;AAEA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AACxC,UAAM,WAAW,KAAK,IAAI,MAAM,OAAO,GAAG;AAC1C,QAAI,WAAW,OAAO;AACpB,aAAO,EAAE,UAAU,OAAO,OAAO,iCAAiC;AAAA,IACpE;AAEA,WAAO;AAAA,MACL,UAAU;AAAA,MACV,QAAQ;AAAA,QACN,UAAU,SAAS,UAAU;AAAA,QAC7B,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,OAAO,OAAO;AAAA,MACd,UAAU,IAAI,KAAK,OAAO,MAAM,GAAI,EAAE,YAAY;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;;;ACzDO,IAAM,UAAU;","names":["createHash","importJWK","createHash","importJWK","createHash"]}
|
package/package.json
ADDED
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "@agentcred-ai/sdk",
|
|
3
|
+
"version": "0.1.0",
|
|
4
|
+
"description": "Core SDK for AgentCred - sign, verify, and manage agent credentials",
|
|
5
|
+
"type": "module",
|
|
6
|
+
"exports": {
|
|
7
|
+
".": {
|
|
8
|
+
"types": "./dist/index.d.ts",
|
|
9
|
+
"import": "./dist/index.js",
|
|
10
|
+
"require": "./dist/index.cjs"
|
|
11
|
+
}
|
|
12
|
+
},
|
|
13
|
+
"main": "./dist/index.cjs",
|
|
14
|
+
"module": "./dist/index.js",
|
|
15
|
+
"types": "./dist/index.d.ts",
|
|
16
|
+
"files": [
|
|
17
|
+
"dist"
|
|
18
|
+
],
|
|
19
|
+
"devDependencies": {
|
|
20
|
+
"@types/node": "^25.1.0",
|
|
21
|
+
"tsup": "^8.0.0",
|
|
22
|
+
"typescript": "^5.8.0",
|
|
23
|
+
"vitest": "^3.0.0"
|
|
24
|
+
},
|
|
25
|
+
"license": "MIT",
|
|
26
|
+
"repository": {
|
|
27
|
+
"type": "git",
|
|
28
|
+
"url": "https://github.com/agentcred-ai/agentcred",
|
|
29
|
+
"directory": "packages/sdk"
|
|
30
|
+
},
|
|
31
|
+
"homepage": "https://agentcred.dev",
|
|
32
|
+
"bugs": {
|
|
33
|
+
"url": "https://github.com/agentcred-ai/agentcred/issues"
|
|
34
|
+
},
|
|
35
|
+
"keywords": [
|
|
36
|
+
"agentcred",
|
|
37
|
+
"ai-agent",
|
|
38
|
+
"mcp",
|
|
39
|
+
"cryptography",
|
|
40
|
+
"ed25519",
|
|
41
|
+
"identity",
|
|
42
|
+
"signature"
|
|
43
|
+
],
|
|
44
|
+
"author": "AgentCred Contributors",
|
|
45
|
+
"dependencies": {
|
|
46
|
+
"jose": "^6.1.3",
|
|
47
|
+
"zod": "^4.3.6"
|
|
48
|
+
},
|
|
49
|
+
"scripts": {
|
|
50
|
+
"build": "tsup",
|
|
51
|
+
"test": "vitest run",
|
|
52
|
+
"typecheck": "tsc --noEmit"
|
|
53
|
+
}
|
|
54
|
+
}
|