@kya-os/mcp-i-core 1.2.3-canary.6 → 1.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/settings.local.json +9 -0
- package/.turbo/turbo-build.log +4 -0
- package/.turbo/turbo-test$colon$coverage.log +4514 -0
- package/.turbo/turbo-test.log +2973 -0
- package/COMPLIANCE_IMPROVEMENT_REPORT.md +483 -0
- package/Composer 3.md +615 -0
- package/GPT-5.md +1169 -0
- package/OPUS-plan.md +352 -0
- package/PHASE_3_AND_4.1_SUMMARY.md +585 -0
- package/PHASE_3_SUMMARY.md +317 -0
- package/PHASE_4.1.3_SUMMARY.md +428 -0
- package/PHASE_4.1_COMPLETE.md +525 -0
- package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +1240 -0
- package/SCHEMA_COMPLIANCE_REPORT.md +275 -0
- package/TEST_PLAN.md +571 -0
- package/coverage/coverage-final.json +57 -0
- package/dist/__tests__/utils/mock-providers.d.ts +1 -2
- package/dist/__tests__/utils/mock-providers.d.ts.map +1 -1
- package/dist/__tests__/utils/mock-providers.js.map +1 -1
- package/dist/cache/oauth-config-cache.d.ts +69 -0
- package/dist/cache/oauth-config-cache.d.ts.map +1 -0
- package/dist/cache/oauth-config-cache.js +76 -0
- package/dist/cache/oauth-config-cache.js.map +1 -0
- package/dist/identity/idp-token-resolver.d.ts +53 -0
- package/dist/identity/idp-token-resolver.d.ts.map +1 -0
- package/dist/identity/idp-token-resolver.js +108 -0
- package/dist/identity/idp-token-resolver.js.map +1 -0
- package/dist/identity/idp-token-storage.interface.d.ts +42 -0
- package/dist/identity/idp-token-storage.interface.d.ts.map +1 -0
- package/dist/identity/idp-token-storage.interface.js +12 -0
- package/dist/identity/idp-token-storage.interface.js.map +1 -0
- package/dist/identity/user-did-manager.d.ts +39 -1
- package/dist/identity/user-did-manager.d.ts.map +1 -1
- package/dist/identity/user-did-manager.js +69 -3
- package/dist/identity/user-did-manager.js.map +1 -1
- package/dist/index.d.ts +22 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +39 -1
- package/dist/index.js.map +1 -1
- package/dist/runtime/audit-logger.d.ts +37 -0
- package/dist/runtime/audit-logger.d.ts.map +1 -0
- package/dist/runtime/audit-logger.js +9 -0
- package/dist/runtime/audit-logger.js.map +1 -0
- package/dist/runtime/base.d.ts +58 -2
- package/dist/runtime/base.d.ts.map +1 -1
- package/dist/runtime/base.js +266 -11
- package/dist/runtime/base.js.map +1 -1
- package/dist/services/access-control.service.d.ts.map +1 -1
- package/dist/services/access-control.service.js +200 -35
- package/dist/services/access-control.service.js.map +1 -1
- package/dist/services/authorization/authorization-registry.d.ts +29 -0
- package/dist/services/authorization/authorization-registry.d.ts.map +1 -0
- package/dist/services/authorization/authorization-registry.js +57 -0
- package/dist/services/authorization/authorization-registry.js.map +1 -0
- package/dist/services/authorization/types.d.ts +53 -0
- package/dist/services/authorization/types.d.ts.map +1 -0
- package/dist/services/authorization/types.js +10 -0
- package/dist/services/authorization/types.js.map +1 -0
- package/dist/services/batch-delegation.service.d.ts +53 -0
- package/dist/services/batch-delegation.service.d.ts.map +1 -0
- package/dist/services/batch-delegation.service.js +95 -0
- package/dist/services/batch-delegation.service.js.map +1 -0
- package/dist/services/oauth-config.service.d.ts +53 -0
- package/dist/services/oauth-config.service.d.ts.map +1 -0
- package/dist/services/oauth-config.service.js +117 -0
- package/dist/services/oauth-config.service.js.map +1 -0
- package/dist/services/oauth-provider-registry.d.ts +77 -0
- package/dist/services/oauth-provider-registry.d.ts.map +1 -0
- package/dist/services/oauth-provider-registry.js +112 -0
- package/dist/services/oauth-provider-registry.js.map +1 -0
- package/dist/services/oauth-service.d.ts +77 -0
- package/dist/services/oauth-service.d.ts.map +1 -0
- package/dist/services/oauth-service.js +348 -0
- package/dist/services/oauth-service.js.map +1 -0
- package/dist/services/oauth-token-retrieval.service.d.ts +49 -0
- package/dist/services/oauth-token-retrieval.service.d.ts.map +1 -0
- package/dist/services/oauth-token-retrieval.service.js +150 -0
- package/dist/services/oauth-token-retrieval.service.js.map +1 -0
- package/dist/services/provider-resolver.d.ts +48 -0
- package/dist/services/provider-resolver.d.ts.map +1 -0
- package/dist/services/provider-resolver.js +120 -0
- package/dist/services/provider-resolver.js.map +1 -0
- package/dist/services/provider-validator.d.ts +55 -0
- package/dist/services/provider-validator.d.ts.map +1 -0
- package/dist/services/provider-validator.js +135 -0
- package/dist/services/provider-validator.js.map +1 -0
- package/dist/services/tool-context-builder.d.ts +57 -0
- package/dist/services/tool-context-builder.d.ts.map +1 -0
- package/dist/services/tool-context-builder.js +125 -0
- package/dist/services/tool-context-builder.js.map +1 -0
- package/dist/services/tool-protection.service.d.ts +87 -10
- package/dist/services/tool-protection.service.d.ts.map +1 -1
- package/dist/services/tool-protection.service.js +282 -112
- package/dist/services/tool-protection.service.js.map +1 -1
- package/dist/types/oauth-required-error.d.ts +40 -0
- package/dist/types/oauth-required-error.d.ts.map +1 -0
- package/dist/types/oauth-required-error.js +40 -0
- package/dist/types/oauth-required-error.js.map +1 -0
- package/dist/utils/did-helpers.d.ts +33 -0
- package/dist/utils/did-helpers.d.ts.map +1 -1
- package/dist/utils/did-helpers.js +40 -0
- package/dist/utils/did-helpers.js.map +1 -1
- package/dist/utils/index.d.ts +1 -0
- package/dist/utils/index.d.ts.map +1 -1
- package/dist/utils/index.js +1 -0
- package/dist/utils/index.js.map +1 -1
- package/docs/API_REFERENCE.md +1362 -0
- package/docs/COMPLIANCE_MATRIX.md +691 -0
- package/docs/STATUSLIST2021_GUIDE.md +696 -0
- package/docs/W3C_VC_DELEGATION_GUIDE.md +710 -0
- package/package.json +24 -50
- package/scripts/audit-compliance.ts +724 -0
- package/src/__tests__/cache/tool-protection-cache.test.ts +640 -0
- package/src/__tests__/config/provider-runtime-config.test.ts +309 -0
- package/src/__tests__/delegation-e2e.test.ts +690 -0
- package/src/__tests__/identity/user-did-manager.test.ts +213 -0
- package/src/__tests__/index.test.ts +56 -0
- package/src/__tests__/integration/full-flow.test.ts +776 -0
- package/src/__tests__/integration.test.ts +281 -0
- package/src/__tests__/providers/base.test.ts +173 -0
- package/src/__tests__/providers/memory.test.ts +319 -0
- package/src/__tests__/regression/phase2-regression.test.ts +427 -0
- package/src/__tests__/runtime/audit-logger.test.ts +154 -0
- package/src/__tests__/runtime/base-extensions.test.ts +593 -0
- package/src/__tests__/runtime/base.test.ts +869 -0
- package/src/__tests__/runtime/delegation-flow.test.ts +164 -0
- package/src/__tests__/runtime/proof-client-did.test.ts +375 -0
- package/src/__tests__/runtime/route-interception.test.ts +686 -0
- package/src/__tests__/runtime/tool-protection-enforcement.test.ts +908 -0
- package/src/__tests__/services/agentshield-integration.test.ts +784 -0
- package/src/__tests__/services/provider-resolver-edge-cases.test.ts +487 -0
- package/src/__tests__/services/tool-protection-oauth-provider.test.ts +480 -0
- package/src/__tests__/services/tool-protection.service.test.ts +1366 -0
- package/src/__tests__/utils/mock-providers.ts +340 -0
- package/src/cache/oauth-config-cache.d.ts +69 -0
- package/src/cache/oauth-config-cache.d.ts.map +1 -0
- package/src/cache/oauth-config-cache.js +71 -0
- package/src/cache/oauth-config-cache.js.map +1 -0
- package/src/cache/oauth-config-cache.ts +123 -0
- package/src/cache/tool-protection-cache.ts +171 -0
- package/src/compliance/EXAMPLE.md +412 -0
- package/src/compliance/__tests__/schema-verifier.test.ts +797 -0
- package/src/compliance/index.ts +8 -0
- package/src/compliance/schema-registry.ts +460 -0
- package/src/compliance/schema-verifier.ts +708 -0
- package/src/config/__tests__/remote-config.spec.ts +268 -0
- package/src/config/remote-config.ts +174 -0
- package/src/config.ts +309 -0
- package/src/delegation/__tests__/audience-validator.test.ts +112 -0
- package/src/delegation/__tests__/bitstring.test.ts +346 -0
- package/src/delegation/__tests__/cascading-revocation.test.ts +628 -0
- package/src/delegation/__tests__/delegation-graph.test.ts +584 -0
- package/src/delegation/__tests__/utils.test.ts +152 -0
- package/src/delegation/__tests__/vc-issuer.test.ts +442 -0
- package/src/delegation/__tests__/vc-verifier.test.ts +922 -0
- package/src/delegation/audience-validator.ts +52 -0
- package/src/delegation/bitstring.ts +278 -0
- package/src/delegation/cascading-revocation.ts +370 -0
- package/src/delegation/delegation-graph.ts +299 -0
- package/src/delegation/index.ts +14 -0
- package/src/delegation/statuslist-manager.ts +353 -0
- package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +366 -0
- package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +228 -0
- package/src/delegation/storage/index.ts +9 -0
- package/src/delegation/storage/memory-graph-storage.ts +178 -0
- package/src/delegation/storage/memory-statuslist-storage.ts +77 -0
- package/src/delegation/utils.ts +42 -0
- package/src/delegation/vc-issuer.ts +232 -0
- package/src/delegation/vc-verifier.ts +568 -0
- package/src/identity/idp-token-resolver.ts +147 -0
- package/src/identity/idp-token-storage.interface.ts +59 -0
- package/src/identity/user-did-manager.ts +370 -0
- package/src/index.ts +260 -0
- package/src/providers/base.d.ts +91 -0
- package/src/providers/base.d.ts.map +1 -0
- package/src/providers/base.js +38 -0
- package/src/providers/base.js.map +1 -0
- package/src/providers/base.ts +96 -0
- package/src/providers/memory.ts +142 -0
- package/src/runtime/audit-logger.ts +39 -0
- package/src/runtime/base.ts +1329 -0
- package/src/services/__tests__/access-control.integration.test.ts +443 -0
- package/src/services/__tests__/access-control.proof-response-validation.test.ts +578 -0
- package/src/services/__tests__/access-control.service.test.ts +970 -0
- package/src/services/__tests__/batch-delegation.service.test.ts +351 -0
- package/src/services/__tests__/crypto.service.test.ts +531 -0
- package/src/services/__tests__/oauth-provider-registry.test.ts +142 -0
- package/src/services/__tests__/proof-verifier.integration.test.ts +485 -0
- package/src/services/__tests__/proof-verifier.test.ts +489 -0
- package/src/services/__tests__/provider-resolution.integration.test.ts +198 -0
- package/src/services/__tests__/provider-resolver.test.ts +217 -0
- package/src/services/__tests__/storage.service.test.ts +358 -0
- package/src/services/access-control.service.ts +990 -0
- package/src/services/authorization/authorization-registry.ts +66 -0
- package/src/services/authorization/types.ts +71 -0
- package/src/services/batch-delegation.service.ts +137 -0
- package/src/services/crypto.service.ts +302 -0
- package/src/services/errors.ts +76 -0
- package/src/services/index.ts +9 -0
- package/src/services/oauth-config.service.d.ts +53 -0
- package/src/services/oauth-config.service.d.ts.map +1 -0
- package/src/services/oauth-config.service.js +113 -0
- package/src/services/oauth-config.service.js.map +1 -0
- package/src/services/oauth-config.service.ts +166 -0
- package/src/services/oauth-provider-registry.d.ts +57 -0
- package/src/services/oauth-provider-registry.d.ts.map +1 -0
- package/src/services/oauth-provider-registry.js +73 -0
- package/src/services/oauth-provider-registry.js.map +1 -0
- package/src/services/oauth-provider-registry.ts +123 -0
- package/src/services/oauth-service.ts +510 -0
- package/src/services/oauth-token-retrieval.service.ts +245 -0
- package/src/services/proof-verifier.ts +478 -0
- package/src/services/provider-resolver.d.ts +48 -0
- package/src/services/provider-resolver.d.ts.map +1 -0
- package/src/services/provider-resolver.js +106 -0
- package/src/services/provider-resolver.js.map +1 -0
- package/src/services/provider-resolver.ts +144 -0
- package/src/services/provider-validator.ts +170 -0
- package/src/services/storage.service.ts +566 -0
- package/src/services/tool-context-builder.ts +172 -0
- package/src/services/tool-protection.service.ts +958 -0
- package/src/types/oauth-required-error.ts +63 -0
- package/src/types/tool-protection.ts +155 -0
- package/src/utils/__tests__/did-helpers.test.ts +101 -0
- package/src/utils/base64.ts +148 -0
- package/src/utils/cors.ts +83 -0
- package/src/utils/did-helpers.ts +150 -0
- package/src/utils/index.ts +8 -0
- package/src/utils/storage-keys.ts +278 -0
- package/tsconfig.json +21 -0
- package/vitest.config.ts +56 -0
|
@@ -0,0 +1,427 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Phase 2 Regression Tests
|
|
3
|
+
*
|
|
4
|
+
* Ensures Phase 2 (Dynamic Providers) changes don't break existing functionality.
|
|
5
|
+
* Tests backward compatibility and verifies no regressions.
|
|
6
|
+
*
|
|
7
|
+
* @package @kya-os/mcp-i-core
|
|
8
|
+
*/
|
|
9
|
+
|
|
10
|
+
import { describe, it, expect, beforeEach, vi } from "vitest";
|
|
11
|
+
import { ToolProtectionService } from "../../services/tool-protection.service";
|
|
12
|
+
import { ProviderResolver } from "../../services/provider-resolver";
|
|
13
|
+
import { OAuthProviderRegistry } from "../../services/oauth-provider-registry";
|
|
14
|
+
import { OAuthConfigService } from "../../services/oauth-config.service";
|
|
15
|
+
import { BatchDelegationService } from "../../services/batch-delegation.service";
|
|
16
|
+
import {
|
|
17
|
+
InMemoryToolProtectionCache,
|
|
18
|
+
type ToolProtectionCache,
|
|
19
|
+
} from "../../cache/tool-protection-cache";
|
|
20
|
+
import type {
|
|
21
|
+
ToolProtectionServiceConfig,
|
|
22
|
+
ToolProtectionConfig,
|
|
23
|
+
} from "../../types/tool-protection";
|
|
24
|
+
import type { ToolProtection } from "@kya-os/contracts/tool-protection";
|
|
25
|
+
import type { OAuthConfig } from "@kya-os/contracts/config";
|
|
26
|
+
|
|
27
|
+
// Mock global fetch
|
|
28
|
+
global.fetch = vi.fn();
|
|
29
|
+
|
|
30
|
+
describe("Phase 2 Regression Tests", () => {
|
|
31
|
+
let cache: ToolProtectionCache;
|
|
32
|
+
let config: ToolProtectionServiceConfig;
|
|
33
|
+
const mockAgentDid = "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK";
|
|
34
|
+
|
|
35
|
+
beforeEach(() => {
|
|
36
|
+
vi.clearAllMocks();
|
|
37
|
+
cache = new InMemoryToolProtectionCache();
|
|
38
|
+
config = {
|
|
39
|
+
apiUrl: "https://kya.vouched.id",
|
|
40
|
+
apiKey: "test-api-key-12345",
|
|
41
|
+
cacheTtl: 300000,
|
|
42
|
+
debug: false,
|
|
43
|
+
};
|
|
44
|
+
});
|
|
45
|
+
|
|
46
|
+
describe("Backward Compatibility", () => {
|
|
47
|
+
describe("Phase 1 tools (no oauthProvider)", () => {
|
|
48
|
+
it("should work with Phase 1 tools that don't specify oauthProvider", async () => {
|
|
49
|
+
const service = new ToolProtectionService(config, cache);
|
|
50
|
+
|
|
51
|
+
const apiResponse = {
|
|
52
|
+
success: true,
|
|
53
|
+
data: {
|
|
54
|
+
toolProtections: {
|
|
55
|
+
phase1_tool: {
|
|
56
|
+
requiresDelegation: true,
|
|
57
|
+
requiredScopes: ["repo:read"],
|
|
58
|
+
// No oauthProvider field (Phase 1 compatibility)
|
|
59
|
+
},
|
|
60
|
+
},
|
|
61
|
+
},
|
|
62
|
+
metadata: {},
|
|
63
|
+
};
|
|
64
|
+
|
|
65
|
+
(global.fetch as any).mockResolvedValueOnce({
|
|
66
|
+
ok: true,
|
|
67
|
+
json: async () => apiResponse,
|
|
68
|
+
});
|
|
69
|
+
|
|
70
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
71
|
+
|
|
72
|
+
expect(result.toolProtections.phase1_tool.requiresDelegation).toBe(true);
|
|
73
|
+
expect(result.toolProtections.phase1_tool.requiredScopes).toEqual([
|
|
74
|
+
"repo:read",
|
|
75
|
+
]);
|
|
76
|
+
// Should not have oauthProvider field
|
|
77
|
+
expect(result.toolProtections.phase1_tool).not.toHaveProperty(
|
|
78
|
+
"oauthProvider"
|
|
79
|
+
);
|
|
80
|
+
});
|
|
81
|
+
|
|
82
|
+
it("should work with ProviderResolver fallback for Phase 1 tools", async () => {
|
|
83
|
+
const mockConfigService: OAuthConfigService = {
|
|
84
|
+
getOAuthConfig: vi.fn().mockResolvedValue({
|
|
85
|
+
providers: {
|
|
86
|
+
github: {
|
|
87
|
+
clientId: "github_client_id",
|
|
88
|
+
authorizationUrl: "https://github.com/login/oauth/authorize",
|
|
89
|
+
tokenUrl: "https://github.com/login/oauth/access_token",
|
|
90
|
+
supportsPKCE: true,
|
|
91
|
+
requiresClientSecret: false,
|
|
92
|
+
},
|
|
93
|
+
},
|
|
94
|
+
}),
|
|
95
|
+
} as any;
|
|
96
|
+
|
|
97
|
+
const mockRegistry = {
|
|
98
|
+
hasProvider: vi.fn().mockReturnValue(false),
|
|
99
|
+
getAllProviders: vi.fn().mockReturnValue([
|
|
100
|
+
{ clientId: "github_client_id" },
|
|
101
|
+
]),
|
|
102
|
+
getProviderNames: vi.fn().mockReturnValue(["github"]),
|
|
103
|
+
loadFromAgentShield: vi.fn().mockResolvedValue(undefined),
|
|
104
|
+
} as any;
|
|
105
|
+
|
|
106
|
+
const resolver = new ProviderResolver(mockRegistry, mockConfigService);
|
|
107
|
+
|
|
108
|
+
const toolProtection: ToolProtection = {
|
|
109
|
+
requiresDelegation: true,
|
|
110
|
+
requiredScopes: ["custom:scope"],
|
|
111
|
+
// No oauthProvider - should use fallback
|
|
112
|
+
};
|
|
113
|
+
|
|
114
|
+
const consoleSpy = vi
|
|
115
|
+
.spyOn(console, "warn")
|
|
116
|
+
.mockImplementation(() => {});
|
|
117
|
+
|
|
118
|
+
const provider = await resolver.resolveProvider(
|
|
119
|
+
toolProtection,
|
|
120
|
+
"test-project"
|
|
121
|
+
);
|
|
122
|
+
|
|
123
|
+
expect(provider).toBe("github");
|
|
124
|
+
expect(consoleSpy).toHaveBeenCalledWith(
|
|
125
|
+
expect.stringContaining("deprecated")
|
|
126
|
+
);
|
|
127
|
+
|
|
128
|
+
consoleSpy.mockRestore();
|
|
129
|
+
});
|
|
130
|
+
});
|
|
131
|
+
|
|
132
|
+
describe("Old API endpoint format", () => {
|
|
133
|
+
it("should still support old endpoint format (tools array)", async () => {
|
|
134
|
+
const service = new ToolProtectionService(config, cache);
|
|
135
|
+
|
|
136
|
+
const apiResponse = {
|
|
137
|
+
success: true,
|
|
138
|
+
data: {
|
|
139
|
+
tools: [
|
|
140
|
+
{
|
|
141
|
+
name: "old_tool",
|
|
142
|
+
requiresDelegation: true,
|
|
143
|
+
scopes: ["scope1"],
|
|
144
|
+
},
|
|
145
|
+
],
|
|
146
|
+
},
|
|
147
|
+
metadata: {},
|
|
148
|
+
};
|
|
149
|
+
|
|
150
|
+
(global.fetch as any).mockResolvedValueOnce({
|
|
151
|
+
ok: true,
|
|
152
|
+
json: async () => apiResponse,
|
|
153
|
+
});
|
|
154
|
+
|
|
155
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
156
|
+
|
|
157
|
+
expect(result.toolProtections.old_tool).toBeDefined();
|
|
158
|
+
expect(result.toolProtections.old_tool.requiresDelegation).toBe(true);
|
|
159
|
+
});
|
|
160
|
+
|
|
161
|
+
it("should still support old endpoint format (tools object)", async () => {
|
|
162
|
+
const service = new ToolProtectionService(config, cache);
|
|
163
|
+
|
|
164
|
+
const apiResponse = {
|
|
165
|
+
success: true,
|
|
166
|
+
data: {
|
|
167
|
+
tools: {
|
|
168
|
+
old_tool: {
|
|
169
|
+
requiresDelegation: true,
|
|
170
|
+
scopes: ["scope1"],
|
|
171
|
+
},
|
|
172
|
+
},
|
|
173
|
+
},
|
|
174
|
+
metadata: {},
|
|
175
|
+
};
|
|
176
|
+
|
|
177
|
+
(global.fetch as any).mockResolvedValueOnce({
|
|
178
|
+
ok: true,
|
|
179
|
+
json: async () => apiResponse,
|
|
180
|
+
});
|
|
181
|
+
|
|
182
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
183
|
+
|
|
184
|
+
expect(result.toolProtections.old_tool).toBeDefined();
|
|
185
|
+
expect(result.toolProtections.old_tool.requiresDelegation).toBe(true);
|
|
186
|
+
});
|
|
187
|
+
});
|
|
188
|
+
|
|
189
|
+
describe("snake_case field names", () => {
|
|
190
|
+
it("should still support snake_case field names", async () => {
|
|
191
|
+
const projectId = "test-project-123";
|
|
192
|
+
config.projectId = projectId;
|
|
193
|
+
const service = new ToolProtectionService(config, cache);
|
|
194
|
+
|
|
195
|
+
const apiResponse = {
|
|
196
|
+
success: true,
|
|
197
|
+
data: {
|
|
198
|
+
toolProtections: {
|
|
199
|
+
tool_with_snake_case: {
|
|
200
|
+
requires_delegation: true,
|
|
201
|
+
required_scopes: ["scope1"],
|
|
202
|
+
oauth_provider: "github", // snake_case
|
|
203
|
+
},
|
|
204
|
+
},
|
|
205
|
+
},
|
|
206
|
+
metadata: {},
|
|
207
|
+
};
|
|
208
|
+
|
|
209
|
+
(global.fetch as any).mockResolvedValueOnce({
|
|
210
|
+
ok: true,
|
|
211
|
+
json: async () => apiResponse,
|
|
212
|
+
});
|
|
213
|
+
|
|
214
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
215
|
+
|
|
216
|
+
expect(result.toolProtections.tool_with_snake_case.requiresDelegation).toBe(
|
|
217
|
+
true
|
|
218
|
+
);
|
|
219
|
+
expect(result.toolProtections.tool_with_snake_case.requiredScopes).toEqual([
|
|
220
|
+
"scope1",
|
|
221
|
+
]);
|
|
222
|
+
expect(result.toolProtections.tool_with_snake_case.oauthProvider).toBe(
|
|
223
|
+
"github"
|
|
224
|
+
);
|
|
225
|
+
});
|
|
226
|
+
});
|
|
227
|
+
});
|
|
228
|
+
|
|
229
|
+
describe("No Regressions", () => {
|
|
230
|
+
describe("Phase 1 OAuth flow", () => {
|
|
231
|
+
it("should still work with Phase 1 OAuth flow (no oauthProvider)", async () => {
|
|
232
|
+
const mockConfigService: OAuthConfigService = {
|
|
233
|
+
getOAuthConfig: vi.fn().mockResolvedValue({
|
|
234
|
+
providers: {
|
|
235
|
+
github: {
|
|
236
|
+
clientId: "github_client_id",
|
|
237
|
+
authorizationUrl: "https://github.com/login/oauth/authorize",
|
|
238
|
+
tokenUrl: "https://github.com/login/oauth/access_token",
|
|
239
|
+
supportsPKCE: true,
|
|
240
|
+
requiresClientSecret: false,
|
|
241
|
+
},
|
|
242
|
+
},
|
|
243
|
+
}),
|
|
244
|
+
} as any;
|
|
245
|
+
|
|
246
|
+
const mockRegistry = {
|
|
247
|
+
hasProvider: vi.fn().mockReturnValue(false),
|
|
248
|
+
getAllProviders: vi.fn().mockReturnValue([
|
|
249
|
+
{ clientId: "github_client_id" },
|
|
250
|
+
]),
|
|
251
|
+
getProviderNames: vi.fn().mockReturnValue(["github"]),
|
|
252
|
+
loadFromAgentShield: vi.fn().mockResolvedValue(undefined),
|
|
253
|
+
} as any;
|
|
254
|
+
|
|
255
|
+
const resolver = new ProviderResolver(mockRegistry, mockConfigService);
|
|
256
|
+
|
|
257
|
+
const toolProtection: ToolProtection = {
|
|
258
|
+
requiresDelegation: true,
|
|
259
|
+
requiredScopes: ["repo:read"],
|
|
260
|
+
// No oauthProvider - Phase 1 mode
|
|
261
|
+
};
|
|
262
|
+
|
|
263
|
+
const provider = await resolver.resolveProvider(
|
|
264
|
+
toolProtection,
|
|
265
|
+
"test-project"
|
|
266
|
+
);
|
|
267
|
+
|
|
268
|
+
// Should fallback to first configured provider
|
|
269
|
+
expect(provider).toBe("github");
|
|
270
|
+
});
|
|
271
|
+
});
|
|
272
|
+
|
|
273
|
+
describe("Token resolution", () => {
|
|
274
|
+
it("should still work with token resolution (Phase 1 compatibility)", async () => {
|
|
275
|
+
// This test verifies that token resolution infrastructure still works
|
|
276
|
+
// The actual token resolution is tested in Phase 1 E2E tests
|
|
277
|
+
// This is a placeholder to ensure Phase 2 doesn't break the flow
|
|
278
|
+
|
|
279
|
+
const toolProtection: ToolProtection = {
|
|
280
|
+
requiresDelegation: true,
|
|
281
|
+
requiredScopes: ["repo:read"],
|
|
282
|
+
// No oauthProvider - should still work
|
|
283
|
+
};
|
|
284
|
+
|
|
285
|
+
// Verify tool protection structure is valid
|
|
286
|
+
expect(toolProtection.requiresDelegation).toBe(true);
|
|
287
|
+
expect(toolProtection.requiredScopes).toEqual(["repo:read"]);
|
|
288
|
+
// oauthProvider is optional
|
|
289
|
+
expect(toolProtection.oauthProvider).toBeUndefined();
|
|
290
|
+
});
|
|
291
|
+
});
|
|
292
|
+
|
|
293
|
+
describe("Tool context building", () => {
|
|
294
|
+
it("should still work with tool context building (Phase 1 compatibility)", async () => {
|
|
295
|
+
// This test verifies that tool context building infrastructure still works
|
|
296
|
+
// The actual context building is tested in Phase 1 E2E tests
|
|
297
|
+
// This is a placeholder to ensure Phase 2 doesn't break the flow
|
|
298
|
+
|
|
299
|
+
const toolProtection: ToolProtection = {
|
|
300
|
+
requiresDelegation: true,
|
|
301
|
+
requiredScopes: ["repo:read"],
|
|
302
|
+
// No oauthProvider - should still work
|
|
303
|
+
};
|
|
304
|
+
|
|
305
|
+
// Verify tool protection can be used for context building
|
|
306
|
+
expect(toolProtection.requiredScopes).toBeDefined();
|
|
307
|
+
expect(Array.isArray(toolProtection.requiredScopes)).toBe(true);
|
|
308
|
+
});
|
|
309
|
+
});
|
|
310
|
+
|
|
311
|
+
describe("Consent page rendering", () => {
|
|
312
|
+
it("should render consent page without provider badge (Phase 1 mode)", () => {
|
|
313
|
+
// This test verifies that consent page can render without provider badge
|
|
314
|
+
// The actual rendering is tested in E2E tests
|
|
315
|
+
// This is a placeholder to ensure Phase 2 doesn't break Phase 1 rendering
|
|
316
|
+
|
|
317
|
+
const toolProtection: ToolProtection = {
|
|
318
|
+
requiresDelegation: true,
|
|
319
|
+
requiredScopes: ["repo:read"],
|
|
320
|
+
// No oauthProvider - Phase 1 mode
|
|
321
|
+
};
|
|
322
|
+
|
|
323
|
+
// Verify tool protection structure allows consent page rendering
|
|
324
|
+
expect(toolProtection.requiresDelegation).toBe(true);
|
|
325
|
+
expect(toolProtection.requiredScopes.length).toBeGreaterThan(0);
|
|
326
|
+
});
|
|
327
|
+
});
|
|
328
|
+
});
|
|
329
|
+
|
|
330
|
+
describe("Mixed Phase 1 and Phase 2 tools", () => {
|
|
331
|
+
it("should handle mix of Phase 1 and Phase 2 tools in same project", async () => {
|
|
332
|
+
const projectId = "test-project-123";
|
|
333
|
+
config.projectId = projectId;
|
|
334
|
+
const service = new ToolProtectionService(config, cache);
|
|
335
|
+
|
|
336
|
+
const apiResponse = {
|
|
337
|
+
success: true,
|
|
338
|
+
data: {
|
|
339
|
+
toolProtections: {
|
|
340
|
+
phase1_tool: {
|
|
341
|
+
requiresDelegation: true,
|
|
342
|
+
requiredScopes: ["repo:read"],
|
|
343
|
+
// No oauthProvider (Phase 1)
|
|
344
|
+
},
|
|
345
|
+
phase2_tool: {
|
|
346
|
+
requiresDelegation: true,
|
|
347
|
+
requiredScopes: ["gmail:send"],
|
|
348
|
+
oauthProvider: "google", // Phase 2
|
|
349
|
+
},
|
|
350
|
+
},
|
|
351
|
+
},
|
|
352
|
+
metadata: {},
|
|
353
|
+
};
|
|
354
|
+
|
|
355
|
+
(global.fetch as any).mockResolvedValueOnce({
|
|
356
|
+
ok: true,
|
|
357
|
+
json: async () => apiResponse,
|
|
358
|
+
});
|
|
359
|
+
|
|
360
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
361
|
+
|
|
362
|
+
// Phase 1 tool should not have oauthProvider
|
|
363
|
+
expect(result.toolProtections.phase1_tool).not.toHaveProperty(
|
|
364
|
+
"oauthProvider"
|
|
365
|
+
);
|
|
366
|
+
|
|
367
|
+
// Phase 2 tool should have oauthProvider
|
|
368
|
+
expect(result.toolProtections.phase2_tool.oauthProvider).toBe("google");
|
|
369
|
+
});
|
|
370
|
+
});
|
|
371
|
+
|
|
372
|
+
describe("Cache compatibility", () => {
|
|
373
|
+
it("should handle cached Phase 1 configs correctly", async () => {
|
|
374
|
+
const projectId = "test-project-123";
|
|
375
|
+
config.projectId = projectId;
|
|
376
|
+
const service = new ToolProtectionService(config, cache);
|
|
377
|
+
|
|
378
|
+
// Cache Phase 1 config (no oauthProvider)
|
|
379
|
+
const cachedConfig: ToolProtectionConfig = {
|
|
380
|
+
toolProtections: {
|
|
381
|
+
phase1_tool: {
|
|
382
|
+
requiresDelegation: true,
|
|
383
|
+
requiredScopes: ["repo:read"],
|
|
384
|
+
// No oauthProvider
|
|
385
|
+
},
|
|
386
|
+
},
|
|
387
|
+
};
|
|
388
|
+
|
|
389
|
+
const cacheKey = `config:tool-protections:${projectId}`;
|
|
390
|
+
await cache.set(cacheKey, cachedConfig, 300000);
|
|
391
|
+
|
|
392
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
393
|
+
|
|
394
|
+
expect(result.toolProtections.phase1_tool.requiresDelegation).toBe(true);
|
|
395
|
+
expect(result.toolProtections.phase1_tool).not.toHaveProperty(
|
|
396
|
+
"oauthProvider"
|
|
397
|
+
);
|
|
398
|
+
expect(global.fetch).not.toHaveBeenCalled();
|
|
399
|
+
});
|
|
400
|
+
|
|
401
|
+
it("should handle cached Phase 2 configs correctly", async () => {
|
|
402
|
+
const projectId = "test-project-123";
|
|
403
|
+
config.projectId = projectId;
|
|
404
|
+
const service = new ToolProtectionService(config, cache);
|
|
405
|
+
|
|
406
|
+
// Cache Phase 2 config (with oauthProvider)
|
|
407
|
+
const cachedConfig: ToolProtectionConfig = {
|
|
408
|
+
toolProtections: {
|
|
409
|
+
phase2_tool: {
|
|
410
|
+
requiresDelegation: true,
|
|
411
|
+
requiredScopes: ["repo:read"],
|
|
412
|
+
oauthProvider: "github",
|
|
413
|
+
},
|
|
414
|
+
},
|
|
415
|
+
};
|
|
416
|
+
|
|
417
|
+
const cacheKey = `config:tool-protections:${projectId}`;
|
|
418
|
+
await cache.set(cacheKey, cachedConfig, 300000);
|
|
419
|
+
|
|
420
|
+
const result = await service.getToolProtectionConfig(mockAgentDid);
|
|
421
|
+
|
|
422
|
+
expect(result.toolProtections.phase2_tool.oauthProvider).toBe("github");
|
|
423
|
+
expect(global.fetch).not.toHaveBeenCalled();
|
|
424
|
+
});
|
|
425
|
+
});
|
|
426
|
+
});
|
|
427
|
+
|
|
@@ -0,0 +1,154 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* IAuditLogger Interface Tests
|
|
3
|
+
*
|
|
4
|
+
* Tests for the IAuditLogger interface contract validation
|
|
5
|
+
* and type compatibility checks.
|
|
6
|
+
*/
|
|
7
|
+
|
|
8
|
+
import { describe, it, expect } from "vitest";
|
|
9
|
+
import type { IAuditLogger } from "../../runtime/audit-logger.js";
|
|
10
|
+
import type { AuditContext, AuditEventContext } from "@kya-os/contracts/audit";
|
|
11
|
+
|
|
12
|
+
/**
|
|
13
|
+
* Mock implementation of IAuditLogger for testing
|
|
14
|
+
*/
|
|
15
|
+
class MockAuditLogger implements IAuditLogger {
|
|
16
|
+
public logAuditRecordCalls: AuditContext[] = [];
|
|
17
|
+
public logEventCalls: AuditEventContext[] = [];
|
|
18
|
+
|
|
19
|
+
async logAuditRecord(context: AuditContext): Promise<void> {
|
|
20
|
+
this.logAuditRecordCalls.push(context);
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
async logEvent(context: AuditEventContext): Promise<void> {
|
|
24
|
+
this.logEventCalls.push(context);
|
|
25
|
+
}
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
describe("IAuditLogger Interface", () => {
|
|
29
|
+
describe("Interface contract validation", () => {
|
|
30
|
+
it("should require logAuditRecord method", () => {
|
|
31
|
+
const logger: IAuditLogger = new MockAuditLogger();
|
|
32
|
+
expect(typeof logger.logAuditRecord).toBe("function");
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
it("should require logEvent method", () => {
|
|
36
|
+
const logger: IAuditLogger = new MockAuditLogger();
|
|
37
|
+
expect(typeof logger.logEvent).toBe("function");
|
|
38
|
+
});
|
|
39
|
+
|
|
40
|
+
it("should accept AuditContext for logAuditRecord", async () => {
|
|
41
|
+
const logger = new MockAuditLogger();
|
|
42
|
+
const context: AuditContext = {
|
|
43
|
+
identity: {
|
|
44
|
+
did: "did:key:test",
|
|
45
|
+
kid: "key-123",
|
|
46
|
+
} as any,
|
|
47
|
+
session: {
|
|
48
|
+
sessionId: "session-123",
|
|
49
|
+
audience: "example.com",
|
|
50
|
+
} as any,
|
|
51
|
+
requestHash: "sha256:abc",
|
|
52
|
+
responseHash: "sha256:def",
|
|
53
|
+
verified: "yes",
|
|
54
|
+
scopeId: "test:execute",
|
|
55
|
+
};
|
|
56
|
+
|
|
57
|
+
await logger.logAuditRecord(context);
|
|
58
|
+
expect(logger.logAuditRecordCalls).toHaveLength(1);
|
|
59
|
+
expect(logger.logAuditRecordCalls[0]).toEqual(context);
|
|
60
|
+
});
|
|
61
|
+
|
|
62
|
+
it("should accept AuditEventContext for logEvent", async () => {
|
|
63
|
+
const logger = new MockAuditLogger();
|
|
64
|
+
const context: AuditEventContext = {
|
|
65
|
+
eventType: "consent:approved",
|
|
66
|
+
identity: {
|
|
67
|
+
did: "did:key:test",
|
|
68
|
+
kid: "key-123",
|
|
69
|
+
} as any,
|
|
70
|
+
session: {
|
|
71
|
+
sessionId: "session-123",
|
|
72
|
+
audience: "example.com",
|
|
73
|
+
} as any,
|
|
74
|
+
eventData: { tool: "test-tool" },
|
|
75
|
+
};
|
|
76
|
+
|
|
77
|
+
await logger.logEvent(context);
|
|
78
|
+
expect(logger.logEventCalls).toHaveLength(1);
|
|
79
|
+
expect(logger.logEventCalls[0]).toEqual(context);
|
|
80
|
+
});
|
|
81
|
+
});
|
|
82
|
+
|
|
83
|
+
describe("Type compatibility checks", () => {
|
|
84
|
+
it("should be compatible with implementations that return Promise<void>", async () => {
|
|
85
|
+
const logger: IAuditLogger = new MockAuditLogger();
|
|
86
|
+
const context: AuditContext = {
|
|
87
|
+
identity: { did: "did:key:test", kid: "key-123" } as any,
|
|
88
|
+
session: { sessionId: "session-123", audience: "example.com" } as any,
|
|
89
|
+
requestHash: "sha256:abc",
|
|
90
|
+
responseHash: "sha256:def",
|
|
91
|
+
verified: "yes",
|
|
92
|
+
};
|
|
93
|
+
|
|
94
|
+
const result = await logger.logAuditRecord(context);
|
|
95
|
+
expect(result).toBeUndefined(); // Should return void
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
it("should accept optional scopeId in AuditContext", async () => {
|
|
99
|
+
const logger = new MockAuditLogger();
|
|
100
|
+
const contextWithoutScope: AuditContext = {
|
|
101
|
+
identity: { did: "did:key:test", kid: "key-123" } as any,
|
|
102
|
+
session: { sessionId: "session-123", audience: "example.com" } as any,
|
|
103
|
+
requestHash: "sha256:abc",
|
|
104
|
+
responseHash: "sha256:def",
|
|
105
|
+
verified: "yes",
|
|
106
|
+
// scopeId is optional
|
|
107
|
+
};
|
|
108
|
+
|
|
109
|
+
await expect(
|
|
110
|
+
logger.logAuditRecord(contextWithoutScope)
|
|
111
|
+
).resolves.not.toThrow();
|
|
112
|
+
});
|
|
113
|
+
|
|
114
|
+
it("should accept optional eventData in AuditEventContext", async () => {
|
|
115
|
+
const logger = new MockAuditLogger();
|
|
116
|
+
const contextWithoutData: AuditEventContext = {
|
|
117
|
+
eventType: "test:event",
|
|
118
|
+
identity: { did: "did:key:test", kid: "key-123" } as any,
|
|
119
|
+
session: { sessionId: "session-123", audience: "example.com" } as any,
|
|
120
|
+
// eventData is optional
|
|
121
|
+
};
|
|
122
|
+
|
|
123
|
+
await expect(logger.logEvent(contextWithoutData)).resolves.not.toThrow();
|
|
124
|
+
});
|
|
125
|
+
});
|
|
126
|
+
|
|
127
|
+
describe("Verify both methods are required", () => {
|
|
128
|
+
it("should fail type check if logAuditRecord is missing", () => {
|
|
129
|
+
// This test documents that TypeScript will catch missing methods
|
|
130
|
+
// In practice, this would be a compile-time error
|
|
131
|
+
class IncompleteLogger implements Partial<IAuditLogger> {
|
|
132
|
+
async logEvent(_context: AuditEventContext): Promise<void> {
|
|
133
|
+
// Missing logAuditRecord
|
|
134
|
+
}
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
// TypeScript would error: Property 'logAuditRecord' is missing
|
|
138
|
+
// This test verifies the interface contract is enforced
|
|
139
|
+
expect(true).toBe(true); // Placeholder - actual check is compile-time
|
|
140
|
+
});
|
|
141
|
+
|
|
142
|
+
it("should fail type check if logEvent is missing", () => {
|
|
143
|
+
// This test documents that TypeScript will catch missing methods
|
|
144
|
+
class IncompleteLogger implements Partial<IAuditLogger> {
|
|
145
|
+
async logAuditRecord(_context: AuditContext): Promise<void> {
|
|
146
|
+
// Missing logEvent
|
|
147
|
+
}
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
// TypeScript would error: Property 'logEvent' is missing
|
|
151
|
+
expect(true).toBe(true); // Placeholder - actual check is compile-time
|
|
152
|
+
});
|
|
153
|
+
});
|
|
154
|
+
});
|