@kya-os/mcp-i-core 1.2.3-canary.6 → 1.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (231) hide show
  1. package/.claude/settings.local.json +9 -0
  2. package/.turbo/turbo-build.log +4 -0
  3. package/.turbo/turbo-test$colon$coverage.log +4514 -0
  4. package/.turbo/turbo-test.log +2973 -0
  5. package/COMPLIANCE_IMPROVEMENT_REPORT.md +483 -0
  6. package/Composer 3.md +615 -0
  7. package/GPT-5.md +1169 -0
  8. package/OPUS-plan.md +352 -0
  9. package/PHASE_3_AND_4.1_SUMMARY.md +585 -0
  10. package/PHASE_3_SUMMARY.md +317 -0
  11. package/PHASE_4.1.3_SUMMARY.md +428 -0
  12. package/PHASE_4.1_COMPLETE.md +525 -0
  13. package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +1240 -0
  14. package/SCHEMA_COMPLIANCE_REPORT.md +275 -0
  15. package/TEST_PLAN.md +571 -0
  16. package/coverage/coverage-final.json +57 -0
  17. package/dist/__tests__/utils/mock-providers.d.ts +1 -2
  18. package/dist/__tests__/utils/mock-providers.d.ts.map +1 -1
  19. package/dist/__tests__/utils/mock-providers.js.map +1 -1
  20. package/dist/cache/oauth-config-cache.d.ts +69 -0
  21. package/dist/cache/oauth-config-cache.d.ts.map +1 -0
  22. package/dist/cache/oauth-config-cache.js +76 -0
  23. package/dist/cache/oauth-config-cache.js.map +1 -0
  24. package/dist/identity/idp-token-resolver.d.ts +53 -0
  25. package/dist/identity/idp-token-resolver.d.ts.map +1 -0
  26. package/dist/identity/idp-token-resolver.js +108 -0
  27. package/dist/identity/idp-token-resolver.js.map +1 -0
  28. package/dist/identity/idp-token-storage.interface.d.ts +42 -0
  29. package/dist/identity/idp-token-storage.interface.d.ts.map +1 -0
  30. package/dist/identity/idp-token-storage.interface.js +12 -0
  31. package/dist/identity/idp-token-storage.interface.js.map +1 -0
  32. package/dist/identity/user-did-manager.d.ts +39 -1
  33. package/dist/identity/user-did-manager.d.ts.map +1 -1
  34. package/dist/identity/user-did-manager.js +69 -3
  35. package/dist/identity/user-did-manager.js.map +1 -1
  36. package/dist/index.d.ts +22 -0
  37. package/dist/index.d.ts.map +1 -1
  38. package/dist/index.js +39 -1
  39. package/dist/index.js.map +1 -1
  40. package/dist/runtime/audit-logger.d.ts +37 -0
  41. package/dist/runtime/audit-logger.d.ts.map +1 -0
  42. package/dist/runtime/audit-logger.js +9 -0
  43. package/dist/runtime/audit-logger.js.map +1 -0
  44. package/dist/runtime/base.d.ts +58 -2
  45. package/dist/runtime/base.d.ts.map +1 -1
  46. package/dist/runtime/base.js +266 -11
  47. package/dist/runtime/base.js.map +1 -1
  48. package/dist/services/access-control.service.d.ts.map +1 -1
  49. package/dist/services/access-control.service.js +200 -35
  50. package/dist/services/access-control.service.js.map +1 -1
  51. package/dist/services/authorization/authorization-registry.d.ts +29 -0
  52. package/dist/services/authorization/authorization-registry.d.ts.map +1 -0
  53. package/dist/services/authorization/authorization-registry.js +57 -0
  54. package/dist/services/authorization/authorization-registry.js.map +1 -0
  55. package/dist/services/authorization/types.d.ts +53 -0
  56. package/dist/services/authorization/types.d.ts.map +1 -0
  57. package/dist/services/authorization/types.js +10 -0
  58. package/dist/services/authorization/types.js.map +1 -0
  59. package/dist/services/batch-delegation.service.d.ts +53 -0
  60. package/dist/services/batch-delegation.service.d.ts.map +1 -0
  61. package/dist/services/batch-delegation.service.js +95 -0
  62. package/dist/services/batch-delegation.service.js.map +1 -0
  63. package/dist/services/oauth-config.service.d.ts +53 -0
  64. package/dist/services/oauth-config.service.d.ts.map +1 -0
  65. package/dist/services/oauth-config.service.js +117 -0
  66. package/dist/services/oauth-config.service.js.map +1 -0
  67. package/dist/services/oauth-provider-registry.d.ts +77 -0
  68. package/dist/services/oauth-provider-registry.d.ts.map +1 -0
  69. package/dist/services/oauth-provider-registry.js +112 -0
  70. package/dist/services/oauth-provider-registry.js.map +1 -0
  71. package/dist/services/oauth-service.d.ts +77 -0
  72. package/dist/services/oauth-service.d.ts.map +1 -0
  73. package/dist/services/oauth-service.js +348 -0
  74. package/dist/services/oauth-service.js.map +1 -0
  75. package/dist/services/oauth-token-retrieval.service.d.ts +49 -0
  76. package/dist/services/oauth-token-retrieval.service.d.ts.map +1 -0
  77. package/dist/services/oauth-token-retrieval.service.js +150 -0
  78. package/dist/services/oauth-token-retrieval.service.js.map +1 -0
  79. package/dist/services/provider-resolver.d.ts +48 -0
  80. package/dist/services/provider-resolver.d.ts.map +1 -0
  81. package/dist/services/provider-resolver.js +120 -0
  82. package/dist/services/provider-resolver.js.map +1 -0
  83. package/dist/services/provider-validator.d.ts +55 -0
  84. package/dist/services/provider-validator.d.ts.map +1 -0
  85. package/dist/services/provider-validator.js +135 -0
  86. package/dist/services/provider-validator.js.map +1 -0
  87. package/dist/services/tool-context-builder.d.ts +57 -0
  88. package/dist/services/tool-context-builder.d.ts.map +1 -0
  89. package/dist/services/tool-context-builder.js +125 -0
  90. package/dist/services/tool-context-builder.js.map +1 -0
  91. package/dist/services/tool-protection.service.d.ts +87 -10
  92. package/dist/services/tool-protection.service.d.ts.map +1 -1
  93. package/dist/services/tool-protection.service.js +282 -112
  94. package/dist/services/tool-protection.service.js.map +1 -1
  95. package/dist/types/oauth-required-error.d.ts +40 -0
  96. package/dist/types/oauth-required-error.d.ts.map +1 -0
  97. package/dist/types/oauth-required-error.js +40 -0
  98. package/dist/types/oauth-required-error.js.map +1 -0
  99. package/dist/utils/did-helpers.d.ts +33 -0
  100. package/dist/utils/did-helpers.d.ts.map +1 -1
  101. package/dist/utils/did-helpers.js +40 -0
  102. package/dist/utils/did-helpers.js.map +1 -1
  103. package/dist/utils/index.d.ts +1 -0
  104. package/dist/utils/index.d.ts.map +1 -1
  105. package/dist/utils/index.js +1 -0
  106. package/dist/utils/index.js.map +1 -1
  107. package/docs/API_REFERENCE.md +1362 -0
  108. package/docs/COMPLIANCE_MATRIX.md +691 -0
  109. package/docs/STATUSLIST2021_GUIDE.md +696 -0
  110. package/docs/W3C_VC_DELEGATION_GUIDE.md +710 -0
  111. package/package.json +24 -50
  112. package/scripts/audit-compliance.ts +724 -0
  113. package/src/__tests__/cache/tool-protection-cache.test.ts +640 -0
  114. package/src/__tests__/config/provider-runtime-config.test.ts +309 -0
  115. package/src/__tests__/delegation-e2e.test.ts +690 -0
  116. package/src/__tests__/identity/user-did-manager.test.ts +213 -0
  117. package/src/__tests__/index.test.ts +56 -0
  118. package/src/__tests__/integration/full-flow.test.ts +776 -0
  119. package/src/__tests__/integration.test.ts +281 -0
  120. package/src/__tests__/providers/base.test.ts +173 -0
  121. package/src/__tests__/providers/memory.test.ts +319 -0
  122. package/src/__tests__/regression/phase2-regression.test.ts +427 -0
  123. package/src/__tests__/runtime/audit-logger.test.ts +154 -0
  124. package/src/__tests__/runtime/base-extensions.test.ts +593 -0
  125. package/src/__tests__/runtime/base.test.ts +869 -0
  126. package/src/__tests__/runtime/delegation-flow.test.ts +164 -0
  127. package/src/__tests__/runtime/proof-client-did.test.ts +375 -0
  128. package/src/__tests__/runtime/route-interception.test.ts +686 -0
  129. package/src/__tests__/runtime/tool-protection-enforcement.test.ts +908 -0
  130. package/src/__tests__/services/agentshield-integration.test.ts +784 -0
  131. package/src/__tests__/services/provider-resolver-edge-cases.test.ts +487 -0
  132. package/src/__tests__/services/tool-protection-oauth-provider.test.ts +480 -0
  133. package/src/__tests__/services/tool-protection.service.test.ts +1366 -0
  134. package/src/__tests__/utils/mock-providers.ts +340 -0
  135. package/src/cache/oauth-config-cache.d.ts +69 -0
  136. package/src/cache/oauth-config-cache.d.ts.map +1 -0
  137. package/src/cache/oauth-config-cache.js +71 -0
  138. package/src/cache/oauth-config-cache.js.map +1 -0
  139. package/src/cache/oauth-config-cache.ts +123 -0
  140. package/src/cache/tool-protection-cache.ts +171 -0
  141. package/src/compliance/EXAMPLE.md +412 -0
  142. package/src/compliance/__tests__/schema-verifier.test.ts +797 -0
  143. package/src/compliance/index.ts +8 -0
  144. package/src/compliance/schema-registry.ts +460 -0
  145. package/src/compliance/schema-verifier.ts +708 -0
  146. package/src/config/__tests__/remote-config.spec.ts +268 -0
  147. package/src/config/remote-config.ts +174 -0
  148. package/src/config.ts +309 -0
  149. package/src/delegation/__tests__/audience-validator.test.ts +112 -0
  150. package/src/delegation/__tests__/bitstring.test.ts +346 -0
  151. package/src/delegation/__tests__/cascading-revocation.test.ts +628 -0
  152. package/src/delegation/__tests__/delegation-graph.test.ts +584 -0
  153. package/src/delegation/__tests__/utils.test.ts +152 -0
  154. package/src/delegation/__tests__/vc-issuer.test.ts +442 -0
  155. package/src/delegation/__tests__/vc-verifier.test.ts +922 -0
  156. package/src/delegation/audience-validator.ts +52 -0
  157. package/src/delegation/bitstring.ts +278 -0
  158. package/src/delegation/cascading-revocation.ts +370 -0
  159. package/src/delegation/delegation-graph.ts +299 -0
  160. package/src/delegation/index.ts +14 -0
  161. package/src/delegation/statuslist-manager.ts +353 -0
  162. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +366 -0
  163. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +228 -0
  164. package/src/delegation/storage/index.ts +9 -0
  165. package/src/delegation/storage/memory-graph-storage.ts +178 -0
  166. package/src/delegation/storage/memory-statuslist-storage.ts +77 -0
  167. package/src/delegation/utils.ts +42 -0
  168. package/src/delegation/vc-issuer.ts +232 -0
  169. package/src/delegation/vc-verifier.ts +568 -0
  170. package/src/identity/idp-token-resolver.ts +147 -0
  171. package/src/identity/idp-token-storage.interface.ts +59 -0
  172. package/src/identity/user-did-manager.ts +370 -0
  173. package/src/index.ts +260 -0
  174. package/src/providers/base.d.ts +91 -0
  175. package/src/providers/base.d.ts.map +1 -0
  176. package/src/providers/base.js +38 -0
  177. package/src/providers/base.js.map +1 -0
  178. package/src/providers/base.ts +96 -0
  179. package/src/providers/memory.ts +142 -0
  180. package/src/runtime/audit-logger.ts +39 -0
  181. package/src/runtime/base.ts +1329 -0
  182. package/src/services/__tests__/access-control.integration.test.ts +443 -0
  183. package/src/services/__tests__/access-control.proof-response-validation.test.ts +578 -0
  184. package/src/services/__tests__/access-control.service.test.ts +970 -0
  185. package/src/services/__tests__/batch-delegation.service.test.ts +351 -0
  186. package/src/services/__tests__/crypto.service.test.ts +531 -0
  187. package/src/services/__tests__/oauth-provider-registry.test.ts +142 -0
  188. package/src/services/__tests__/proof-verifier.integration.test.ts +485 -0
  189. package/src/services/__tests__/proof-verifier.test.ts +489 -0
  190. package/src/services/__tests__/provider-resolution.integration.test.ts +198 -0
  191. package/src/services/__tests__/provider-resolver.test.ts +217 -0
  192. package/src/services/__tests__/storage.service.test.ts +358 -0
  193. package/src/services/access-control.service.ts +990 -0
  194. package/src/services/authorization/authorization-registry.ts +66 -0
  195. package/src/services/authorization/types.ts +71 -0
  196. package/src/services/batch-delegation.service.ts +137 -0
  197. package/src/services/crypto.service.ts +302 -0
  198. package/src/services/errors.ts +76 -0
  199. package/src/services/index.ts +9 -0
  200. package/src/services/oauth-config.service.d.ts +53 -0
  201. package/src/services/oauth-config.service.d.ts.map +1 -0
  202. package/src/services/oauth-config.service.js +113 -0
  203. package/src/services/oauth-config.service.js.map +1 -0
  204. package/src/services/oauth-config.service.ts +166 -0
  205. package/src/services/oauth-provider-registry.d.ts +57 -0
  206. package/src/services/oauth-provider-registry.d.ts.map +1 -0
  207. package/src/services/oauth-provider-registry.js +73 -0
  208. package/src/services/oauth-provider-registry.js.map +1 -0
  209. package/src/services/oauth-provider-registry.ts +123 -0
  210. package/src/services/oauth-service.ts +510 -0
  211. package/src/services/oauth-token-retrieval.service.ts +245 -0
  212. package/src/services/proof-verifier.ts +478 -0
  213. package/src/services/provider-resolver.d.ts +48 -0
  214. package/src/services/provider-resolver.d.ts.map +1 -0
  215. package/src/services/provider-resolver.js +106 -0
  216. package/src/services/provider-resolver.js.map +1 -0
  217. package/src/services/provider-resolver.ts +144 -0
  218. package/src/services/provider-validator.ts +170 -0
  219. package/src/services/storage.service.ts +566 -0
  220. package/src/services/tool-context-builder.ts +172 -0
  221. package/src/services/tool-protection.service.ts +958 -0
  222. package/src/types/oauth-required-error.ts +63 -0
  223. package/src/types/tool-protection.ts +155 -0
  224. package/src/utils/__tests__/did-helpers.test.ts +101 -0
  225. package/src/utils/base64.ts +148 -0
  226. package/src/utils/cors.ts +83 -0
  227. package/src/utils/did-helpers.ts +150 -0
  228. package/src/utils/index.ts +8 -0
  229. package/src/utils/storage-keys.ts +278 -0
  230. package/tsconfig.json +21 -0
  231. package/vitest.config.ts +56 -0
@@ -0,0 +1,531 @@
1
+ /**
2
+ * Tests for CryptoService
3
+ *
4
+ * Comprehensive test coverage for cryptographic operations service.
5
+ * Tests verifyEd25519() and verifyJWS() with various scenarios.
6
+ *
7
+ * Test Coverage Requirements: 100% - All security-critical code paths
8
+ */
9
+
10
+ import { describe, it, expect, beforeEach, vi } from 'vitest';
11
+ import { CryptoService } from '../crypto.service.js';
12
+ import type { CryptoProvider } from '../../providers/base.js';
13
+ import type { Ed25519JWK } from '../crypto.service.js';
14
+
15
+ describe('CryptoService', () => {
16
+ let cryptoService: CryptoService;
17
+ let mockCryptoProvider: CryptoProvider;
18
+
19
+ beforeEach(() => {
20
+ mockCryptoProvider = {
21
+ sign: vi.fn(),
22
+ verify: vi.fn(),
23
+ generateKeyPair: vi.fn(),
24
+ hash: vi.fn(),
25
+ randomBytes: vi.fn(),
26
+ };
27
+ cryptoService = new CryptoService(mockCryptoProvider);
28
+ });
29
+
30
+ describe('verifyEd25519', () => {
31
+ it('should return true for valid signature', async () => {
32
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
33
+
34
+ const result = await cryptoService.verifyEd25519(
35
+ new Uint8Array([1, 2, 3]),
36
+ new Uint8Array([4, 5, 6]),
37
+ 'base64PublicKey'
38
+ );
39
+
40
+ expect(result).toBe(true);
41
+ expect(mockCryptoProvider.verify).toHaveBeenCalledWith(
42
+ new Uint8Array([1, 2, 3]),
43
+ new Uint8Array([4, 5, 6]),
44
+ 'base64PublicKey'
45
+ );
46
+ });
47
+
48
+ it('should return false for invalid signature', async () => {
49
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
50
+
51
+ const result = await cryptoService.verifyEd25519(
52
+ new Uint8Array([1, 2, 3]),
53
+ new Uint8Array([4, 5, 6]),
54
+ 'base64PublicKey'
55
+ );
56
+
57
+ expect(result).toBe(false);
58
+ });
59
+
60
+ it('should return false on verification error', async () => {
61
+ mockCryptoProvider.verify = vi.fn().mockRejectedValue(
62
+ new Error('Verification failed')
63
+ );
64
+
65
+ const result = await cryptoService.verifyEd25519(
66
+ new Uint8Array([1, 2, 3]),
67
+ new Uint8Array([4, 5, 6]),
68
+ 'base64PublicKey'
69
+ );
70
+
71
+ expect(result).toBe(false);
72
+ });
73
+
74
+ it('should handle empty data', async () => {
75
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
76
+
77
+ const result = await cryptoService.verifyEd25519(
78
+ new Uint8Array(0),
79
+ new Uint8Array([4, 5, 6]),
80
+ 'base64PublicKey'
81
+ );
82
+
83
+ expect(result).toBe(true);
84
+ });
85
+ });
86
+
87
+ describe('parseJWS', () => {
88
+ it('should parse valid full compact JWS', () => {
89
+ const header = { alg: 'EdDSA', typ: 'JWT' };
90
+ const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
91
+ // Properly encode as base64url
92
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
93
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
94
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
95
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
96
+ const signatureB64 = Buffer.from('signature').toString('base64')
97
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
98
+ const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
99
+
100
+ const parsed = cryptoService.parseJWS(jws);
101
+
102
+ expect(parsed.header).toEqual(header);
103
+ expect(parsed.payload).toEqual(payload);
104
+ expect(parsed.signingInput).toBe(`${headerB64}.${payloadB64}`);
105
+ expect(parsed.signatureBytes).toBeInstanceOf(Uint8Array);
106
+ });
107
+
108
+ it('should throw error for invalid JWS format', () => {
109
+ const invalidJws = 'not.a.jws';
110
+
111
+ // This will fail during JSON parsing, not format check
112
+ expect(() => cryptoService.parseJWS(invalidJws)).toThrow();
113
+ });
114
+
115
+ it('should throw error for JWS with wrong number of parts', () => {
116
+ const invalidJws = 'header.payload';
117
+
118
+ expect(() => cryptoService.parseJWS(invalidJws)).toThrow('Invalid JWS format');
119
+ });
120
+
121
+ it('should handle empty payload', () => {
122
+ const header = { alg: 'EdDSA' };
123
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
124
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
125
+ const signatureB64 = Buffer.from('signature').toString('base64')
126
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
127
+ const jws = `${headerB64}..${signatureB64}`;
128
+
129
+ const parsed = cryptoService.parseJWS(jws);
130
+
131
+ expect(parsed.header).toEqual(header);
132
+ expect(parsed.payload).toBeUndefined();
133
+ });
134
+ });
135
+
136
+ describe('verifyJWS', () => {
137
+ const validJwk: Ed25519JWK = {
138
+ kty: 'OKP',
139
+ crv: 'Ed25519',
140
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ', // Example base64url public key (32 bytes when decoded)
141
+ };
142
+
143
+ // Create a valid JWS for testing
144
+ const createValidJWS = (): string => {
145
+ const header = { alg: 'EdDSA', typ: 'JWT' };
146
+ const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
147
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
148
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
149
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
150
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
151
+ const signatureB64 = Buffer.from('signature').toString('base64')
152
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
153
+ return `${headerB64}.${payloadB64}.${signatureB64}`;
154
+ };
155
+
156
+ it('should verify valid full compact JWS', async () => {
157
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
158
+ const validJws = createValidJWS();
159
+
160
+ const result = await cryptoService.verifyJWS(validJws, validJwk);
161
+
162
+ expect(result).toBe(true);
163
+ expect(mockCryptoProvider.verify).toHaveBeenCalled();
164
+ });
165
+
166
+ it('should reject invalid JWK format', async () => {
167
+ const invalidJwk = { kty: 'RSA' } as any;
168
+ const validJws = createValidJWS();
169
+
170
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
171
+
172
+ expect(result).toBe(false);
173
+ expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
174
+ });
175
+
176
+ it('should reject JWK with wrong kty', async () => {
177
+ const invalidJwk = {
178
+ kty: 'RSA',
179
+ crv: 'Ed25519',
180
+ x: 'test',
181
+ } as any;
182
+ const validJws = createValidJWS();
183
+
184
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
185
+
186
+ expect(result).toBe(false);
187
+ });
188
+
189
+ it('should reject JWK with wrong crv', async () => {
190
+ const invalidJwk = {
191
+ kty: 'OKP',
192
+ crv: 'P-256',
193
+ x: 'test',
194
+ } as any;
195
+ const validJws = createValidJWS();
196
+
197
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
198
+
199
+ expect(result).toBe(false);
200
+ });
201
+
202
+ it('should reject JWK with missing x field', async () => {
203
+ const invalidJwk = {
204
+ kty: 'OKP',
205
+ crv: 'Ed25519',
206
+ } as any;
207
+ const validJws = createValidJWS();
208
+
209
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
210
+
211
+ expect(result).toBe(false);
212
+ });
213
+
214
+ it('should reject JWK with empty x field', async () => {
215
+ const invalidJwk = {
216
+ kty: 'OKP',
217
+ crv: 'Ed25519',
218
+ x: '',
219
+ };
220
+ const validJws = createValidJWS();
221
+
222
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
223
+
224
+ expect(result).toBe(false);
225
+ });
226
+
227
+ it('should reject malformed JWS', async () => {
228
+ const malformedJws = 'not.a.jws';
229
+
230
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
231
+
232
+ expect(result).toBe(false);
233
+ });
234
+
235
+ it('should reject non-EdDSA algorithms', async () => {
236
+ const header = { alg: 'RS256', typ: 'JWT' };
237
+ const payload = { sub: 'did:key:z123' };
238
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
239
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
240
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
241
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
242
+ const signatureB64 = Buffer.from('signature').toString('base64')
243
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
244
+ const rsaJws = `${headerB64}.${payloadB64}.${signatureB64}`;
245
+
246
+ const result = await cryptoService.verifyJWS(rsaJws, validJwk);
247
+
248
+ expect(result).toBe(false);
249
+ expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
250
+ });
251
+
252
+ it('should reject HS256 algorithm', async () => {
253
+ const header = { alg: 'HS256', typ: 'JWT' };
254
+ const payload = { sub: 'did:key:z123' };
255
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
256
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
257
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
258
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
259
+ const signatureB64 = Buffer.from('signature').toString('base64')
260
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
261
+ const hs256Jws = `${headerB64}.${payloadB64}.${signatureB64}`;
262
+
263
+ const result = await cryptoService.verifyJWS(hs256Jws, validJwk);
264
+
265
+ expect(result).toBe(false);
266
+ });
267
+
268
+ it('should handle empty JWS components', async () => {
269
+ const emptyJws = '..';
270
+
271
+ const result = await cryptoService.verifyJWS(emptyJws, validJwk);
272
+
273
+ expect(result).toBe(false);
274
+ });
275
+
276
+ it('should handle malformed JWS - single part', async () => {
277
+ const malformedJws = 'singlepart';
278
+
279
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
280
+
281
+ expect(result).toBe(false);
282
+ });
283
+
284
+ it('should handle malformed JWS - two parts', async () => {
285
+ const malformedJws = 'header.payload';
286
+
287
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
288
+
289
+ expect(result).toBe(false);
290
+ });
291
+
292
+ it('should handle malformed JWS - four parts', async () => {
293
+ const header = { alg: 'EdDSA' };
294
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
295
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
296
+ const payloadB64 = Buffer.from('payload').toString('base64')
297
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
298
+ const signatureB64 = Buffer.from('signature').toString('base64')
299
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
300
+ const malformedJws = `${headerB64}.${payloadB64}.${signatureB64}.extra`;
301
+
302
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
303
+
304
+ expect(result).toBe(false);
305
+ });
306
+
307
+ it('should handle malformed JWS - invalid JSON header', async () => {
308
+ const invalidHeaderB64 = Buffer.from('notjson').toString('base64')
309
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
310
+ const payloadB64 = Buffer.from('payload').toString('base64')
311
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
312
+ const signatureB64 = Buffer.from('signature').toString('base64')
313
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
314
+ const malformedJws = `${invalidHeaderB64}.${payloadB64}.${signatureB64}`;
315
+
316
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
317
+
318
+ expect(result).toBe(false);
319
+ });
320
+
321
+ it('should handle malformed JWS - invalid base64', async () => {
322
+ // Don't mock verify - the function should catch the error and return false
323
+ // before it gets to verification
324
+ const header = { alg: 'EdDSA' };
325
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
326
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
327
+ const invalidBase64 = 'notbase64!!!';
328
+ const signatureB64 = Buffer.from('signature').toString('base64')
329
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
330
+ const malformedJws = `${headerB64}.${invalidBase64}.${signatureB64}`;
331
+
332
+ // parseJWS will throw when trying to decode invalid base64 payload
333
+ // This should be caught and return false
334
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
335
+
336
+ expect(result).toBe(false);
337
+ // verify should not be called because parseJWS should throw
338
+ expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
339
+ });
340
+
341
+ it('should validate expectedKid option', async () => {
342
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
343
+ const validJws = createValidJWS();
344
+ const jwkWithKid: Ed25519JWK = {
345
+ kty: 'OKP',
346
+ crv: 'Ed25519',
347
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
348
+ kid: 'key-1',
349
+ };
350
+
351
+ // Should succeed with matching kid
352
+ const result1 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
353
+ expectedKid: 'key-1',
354
+ });
355
+ expect(result1).toBe(true);
356
+
357
+ // Should fail with mismatched kid
358
+ const result2 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
359
+ expectedKid: 'key-2',
360
+ });
361
+ expect(result2).toBe(false);
362
+ });
363
+
364
+ it('should validate alg option', async () => {
365
+ const header = { alg: 'EdDSA', typ: 'JWT' };
366
+ const payload = { sub: 'did:key:z123' };
367
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
368
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
369
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
370
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
371
+ const signatureB64 = Buffer.from('signature').toString('base64')
372
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
373
+ const validJws = `${headerB64}.${payloadB64}.${signatureB64}`;
374
+
375
+ // Should succeed with matching alg
376
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
377
+ const result1 = await cryptoService.verifyJWS(validJws, validJwk, {
378
+ alg: 'EdDSA',
379
+ });
380
+ expect(result1).toBe(true);
381
+
382
+ // Should fail with mismatched alg (even if header says EdDSA)
383
+ const result2 = await cryptoService.verifyJWS(validJws, validJwk, {
384
+ alg: 'RS256' as any,
385
+ });
386
+ expect(result2).toBe(false);
387
+ });
388
+
389
+ it('should validate Ed25519 key length', async () => {
390
+ const invalidLengthJwk = {
391
+ kty: 'OKP' as const,
392
+ crv: 'Ed25519' as const,
393
+ x: 'c2hvcnQ', // "short" in base64 - too short for Ed25519 (only 5 bytes)
394
+ };
395
+
396
+ const validJws = createValidJWS();
397
+
398
+ const result = await cryptoService.verifyJWS(validJws, invalidLengthJwk);
399
+
400
+ expect(result).toBe(false);
401
+ });
402
+
403
+ it('should handle detached payload', async () => {
404
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
405
+ const header = { alg: 'EdDSA' };
406
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
407
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
408
+ const signatureB64 = Buffer.from('signature').toString('base64')
409
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
410
+ const detachedJws = `${headerB64}..${signatureB64}`;
411
+ const detachedPayload = JSON.stringify({ sub: 'did:key:z123' });
412
+
413
+ const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
414
+ detachedPayload,
415
+ });
416
+
417
+ expect(result).toBe(true);
418
+ expect(mockCryptoProvider.verify).toHaveBeenCalled();
419
+ });
420
+
421
+ it('should handle detached payload as Uint8Array', async () => {
422
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
423
+ const header = { alg: 'EdDSA' };
424
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
425
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
426
+ const signatureB64 = Buffer.from('signature').toString('base64')
427
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
428
+ const detachedJws = `${headerB64}..${signatureB64}`;
429
+ const detachedPayloadBytes = new TextEncoder().encode(JSON.stringify({ sub: 'did:key:z123' }));
430
+
431
+ const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
432
+ detachedPayload: detachedPayloadBytes,
433
+ });
434
+
435
+ expect(result).toBe(true);
436
+ expect(mockCryptoProvider.verify).toHaveBeenCalled();
437
+ });
438
+
439
+ it('should handle signature verification failure', async () => {
440
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
441
+ const validJws = createValidJWS();
442
+
443
+ const result = await cryptoService.verifyJWS(validJws, validJwk);
444
+
445
+ expect(result).toBe(false);
446
+ });
447
+
448
+ it('should handle signature verification error', async () => {
449
+ mockCryptoProvider.verify = vi.fn().mockRejectedValue(new Error('Crypto error'));
450
+ const validJws = createValidJWS();
451
+
452
+ const result = await cryptoService.verifyJWS(validJws, validJwk);
453
+
454
+ expect(result).toBe(false);
455
+ });
456
+
457
+ it('should accept JWK with optional kid field', async () => {
458
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
459
+ const jwkWithKid: Ed25519JWK = {
460
+ kty: 'OKP',
461
+ crv: 'Ed25519',
462
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
463
+ kid: 'key-1',
464
+ };
465
+ const validJws = createValidJWS();
466
+
467
+ const result = await cryptoService.verifyJWS(validJws, jwkWithKid);
468
+
469
+ expect(result).toBe(true);
470
+ });
471
+
472
+ it('should accept JWK with optional use field', async () => {
473
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
474
+ const jwkWithUse: Ed25519JWK = {
475
+ kty: 'OKP',
476
+ crv: 'Ed25519',
477
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
478
+ use: 'sig',
479
+ };
480
+ const validJws = createValidJWS();
481
+
482
+ const result = await cryptoService.verifyJWS(validJws, jwkWithUse);
483
+
484
+ expect(result).toBe(true);
485
+ });
486
+ });
487
+
488
+ describe('base64url edge cases', () => {
489
+ const validJwk: Ed25519JWK = {
490
+ kty: 'OKP',
491
+ crv: 'Ed25519',
492
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
493
+ };
494
+
495
+ it('should handle base64url with no padding', async () => {
496
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
497
+ const header = { alg: 'EdDSA' };
498
+ const payload = { test: 'Hello' };
499
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
500
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
501
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
502
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
503
+ const signatureB64 = Buffer.from('signature').toString('base64')
504
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
505
+ const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
506
+
507
+ const result = await cryptoService.verifyJWS(jws, validJwk);
508
+
509
+ // Should not throw, even if padding is missing
510
+ expect(typeof result).toBe('boolean');
511
+ });
512
+
513
+ it('should handle base64url with padding', async () => {
514
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
515
+ const header = { alg: 'EdDSA' };
516
+ const payload = { test: 'Hello World!' };
517
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
518
+ .replace(/\+/g, '-').replace(/\//g, '_');
519
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
520
+ .replace(/\+/g, '-').replace(/\//g, '_');
521
+ const signatureB64 = Buffer.from('signature').toString('base64')
522
+ .replace(/\+/g, '-').replace(/\//g, '_');
523
+ const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
524
+
525
+ const result = await cryptoService.verifyJWS(jws, validJwk);
526
+
527
+ expect(typeof result).toBe('boolean');
528
+ });
529
+ });
530
+ });
531
+
@@ -0,0 +1,142 @@
1
+ /**
2
+ * OAuth Provider Registry Tests
3
+ *
4
+ * @package @kya-os/mcp-i-core
5
+ */
6
+
7
+ import { describe, it, expect, beforeEach, vi } from "vitest";
8
+ import { OAuthProviderRegistry } from "../oauth-provider-registry.js";
9
+ import { OAuthConfigService } from "../oauth-config.service.js";
10
+ import type { OAuthConfig, OAuthProvider } from "@kya-os/contracts/config";
11
+
12
+ describe("OAuthProviderRegistry", () => {
13
+ let mockConfigService: OAuthConfigService;
14
+ let registry: OAuthProviderRegistry;
15
+
16
+ const mockOAuthConfig: OAuthConfig = {
17
+ providers: {
18
+ github: {
19
+ clientId: "github_client_id",
20
+ authorizationUrl: "https://github.com/login/oauth/authorize",
21
+ tokenUrl: "https://github.com/login/oauth/access_token",
22
+ supportsPKCE: true,
23
+ requiresClientSecret: false,
24
+ scopes: ["repo", "read:user"],
25
+ defaultScopes: ["repo"],
26
+ },
27
+ google: {
28
+ clientId: "google_client_id",
29
+ authorizationUrl: "https://accounts.google.com/o/oauth2/v2/auth",
30
+ tokenUrl: "https://oauth2.googleapis.com/token",
31
+ supportsPKCE: true,
32
+ requiresClientSecret: false,
33
+ scopes: ["email", "profile"],
34
+ defaultScopes: ["email"],
35
+ },
36
+ },
37
+ };
38
+
39
+ beforeEach(() => {
40
+ mockConfigService = {
41
+ getOAuthConfig: vi.fn().mockResolvedValue(mockOAuthConfig),
42
+ } as any;
43
+
44
+ registry = new OAuthProviderRegistry(mockConfigService);
45
+ });
46
+
47
+ describe("loadFromAgentShield", () => {
48
+ it("should load providers from AgentShield config", async () => {
49
+ await registry.loadFromAgentShield("test-project");
50
+
51
+ expect(mockConfigService.getOAuthConfig).toHaveBeenCalledWith(
52
+ "test-project"
53
+ );
54
+ expect(registry.hasProvider("github")).toBe(true);
55
+ expect(registry.hasProvider("google")).toBe(true);
56
+ });
57
+
58
+ it("should clear existing providers before loading new ones", async () => {
59
+ await registry.loadFromAgentShield("test-project");
60
+ expect(registry.getAllProviders().length).toBe(2);
61
+
62
+ const newConfig: OAuthConfig = {
63
+ providers: {
64
+ microsoft: {
65
+ clientId: "microsoft_client_id",
66
+ authorizationUrl: "https://login.microsoftonline.com/oauth2/v2.0/authorize",
67
+ tokenUrl: "https://login.microsoftonline.com/oauth2/v2.0/token",
68
+ supportsPKCE: true,
69
+ requiresClientSecret: false,
70
+ },
71
+ },
72
+ };
73
+
74
+ (mockConfigService.getOAuthConfig as any).mockResolvedValueOnce(newConfig);
75
+ await registry.loadFromAgentShield("test-project-2");
76
+
77
+ expect(registry.getAllProviders().length).toBe(1);
78
+ expect(registry.hasProvider("github")).toBe(false);
79
+ expect(registry.hasProvider("microsoft")).toBe(true);
80
+ });
81
+ });
82
+
83
+ describe("getProvider", () => {
84
+ it("should return provider by name", async () => {
85
+ await registry.loadFromAgentShield("test-project");
86
+
87
+ const githubProvider = registry.getProvider("github");
88
+ expect(githubProvider).toBeDefined();
89
+ expect(githubProvider?.clientId).toBe("github_client_id");
90
+ });
91
+
92
+ it("should return null for non-existent provider", async () => {
93
+ await registry.loadFromAgentShield("test-project");
94
+
95
+ const provider = registry.getProvider("nonexistent");
96
+ expect(provider).toBeNull();
97
+ });
98
+ });
99
+
100
+ describe("getAllProviders", () => {
101
+ it("should return all providers", async () => {
102
+ await registry.loadFromAgentShield("test-project");
103
+
104
+ const providers = registry.getAllProviders();
105
+ expect(providers.length).toBe(2);
106
+ expect(providers.map((p) => p.clientId)).toContain("github_client_id");
107
+ expect(providers.map((p) => p.clientId)).toContain("google_client_id");
108
+ });
109
+
110
+ it("should return empty array when no providers loaded", () => {
111
+ const providers = registry.getAllProviders();
112
+ expect(providers).toEqual([]);
113
+ });
114
+ });
115
+
116
+ describe("hasProvider", () => {
117
+ it("should return true for existing provider", async () => {
118
+ await registry.loadFromAgentShield("test-project");
119
+
120
+ expect(registry.hasProvider("github")).toBe(true);
121
+ expect(registry.hasProvider("google")).toBe(true);
122
+ });
123
+
124
+ it("should return false for non-existent provider", async () => {
125
+ await registry.loadFromAgentShield("test-project");
126
+
127
+ expect(registry.hasProvider("nonexistent")).toBe(false);
128
+ });
129
+ });
130
+
131
+ describe("getProviderNames", () => {
132
+ it("should return all provider names", async () => {
133
+ await registry.loadFromAgentShield("test-project");
134
+
135
+ const names = registry.getProviderNames();
136
+ expect(names).toContain("github");
137
+ expect(names).toContain("google");
138
+ expect(names.length).toBe(2);
139
+ });
140
+ });
141
+ });
142
+