@kya-os/mcp-i-core 1.2.3-canary.7 → 1.3.0-canary.clientinfo.20251126003544
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.turbo/turbo-build.log +4 -0
- package/.turbo/turbo-test$colon$coverage.log +4239 -0
- package/.turbo/turbo-test.log +2973 -0
- package/COMPLIANCE_IMPROVEMENT_REPORT.md +483 -0
- package/Composer 3.md +615 -0
- package/GPT-5.md +1169 -0
- package/OPUS-plan.md +352 -0
- package/PHASE_3_AND_4.1_SUMMARY.md +585 -0
- package/PHASE_3_SUMMARY.md +317 -0
- package/PHASE_4.1.3_SUMMARY.md +428 -0
- package/PHASE_4.1_COMPLETE.md +525 -0
- package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +1240 -0
- package/SCHEMA_COMPLIANCE_REPORT.md +275 -0
- package/TEST_PLAN.md +571 -0
- package/coverage/coverage-final.json +57 -0
- package/dist/__tests__/utils/mock-providers.d.ts +1 -2
- package/dist/__tests__/utils/mock-providers.d.ts.map +1 -1
- package/dist/__tests__/utils/mock-providers.js.map +1 -1
- package/dist/cache/oauth-config-cache.d.ts +69 -0
- package/dist/cache/oauth-config-cache.d.ts.map +1 -0
- package/dist/cache/oauth-config-cache.js +76 -0
- package/dist/cache/oauth-config-cache.js.map +1 -0
- package/dist/identity/idp-token-resolver.d.ts +53 -0
- package/dist/identity/idp-token-resolver.d.ts.map +1 -0
- package/dist/identity/idp-token-resolver.js +108 -0
- package/dist/identity/idp-token-resolver.js.map +1 -0
- package/dist/identity/idp-token-storage.interface.d.ts +42 -0
- package/dist/identity/idp-token-storage.interface.d.ts.map +1 -0
- package/dist/identity/idp-token-storage.interface.js +12 -0
- package/dist/identity/idp-token-storage.interface.js.map +1 -0
- package/dist/identity/user-did-manager.d.ts +39 -1
- package/dist/identity/user-did-manager.d.ts.map +1 -1
- package/dist/identity/user-did-manager.js +69 -3
- package/dist/identity/user-did-manager.js.map +1 -1
- package/dist/index.d.ts +24 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +43 -1
- package/dist/index.js.map +1 -1
- package/dist/runtime/audit-logger.d.ts +37 -0
- package/dist/runtime/audit-logger.d.ts.map +1 -0
- package/dist/runtime/audit-logger.js +9 -0
- package/dist/runtime/audit-logger.js.map +1 -0
- package/dist/runtime/base.d.ts +58 -2
- package/dist/runtime/base.d.ts.map +1 -1
- package/dist/runtime/base.js +266 -11
- package/dist/runtime/base.js.map +1 -1
- package/dist/services/access-control.service.d.ts.map +1 -1
- package/dist/services/access-control.service.js +200 -35
- package/dist/services/access-control.service.js.map +1 -1
- package/dist/services/authorization/authorization-registry.d.ts +29 -0
- package/dist/services/authorization/authorization-registry.d.ts.map +1 -0
- package/dist/services/authorization/authorization-registry.js +57 -0
- package/dist/services/authorization/authorization-registry.js.map +1 -0
- package/dist/services/authorization/types.d.ts +53 -0
- package/dist/services/authorization/types.d.ts.map +1 -0
- package/dist/services/authorization/types.js +10 -0
- package/dist/services/authorization/types.js.map +1 -0
- package/dist/services/batch-delegation.service.d.ts +53 -0
- package/dist/services/batch-delegation.service.d.ts.map +1 -0
- package/dist/services/batch-delegation.service.js +95 -0
- package/dist/services/batch-delegation.service.js.map +1 -0
- package/dist/services/index.d.ts +2 -0
- package/dist/services/index.d.ts.map +1 -1
- package/dist/services/index.js +4 -1
- package/dist/services/index.js.map +1 -1
- package/dist/services/oauth-config.service.d.ts +53 -0
- package/dist/services/oauth-config.service.d.ts.map +1 -0
- package/dist/services/oauth-config.service.js +117 -0
- package/dist/services/oauth-config.service.js.map +1 -0
- package/dist/services/oauth-provider-registry.d.ts +77 -0
- package/dist/services/oauth-provider-registry.d.ts.map +1 -0
- package/dist/services/oauth-provider-registry.js +112 -0
- package/dist/services/oauth-provider-registry.js.map +1 -0
- package/dist/services/oauth-service.d.ts +77 -0
- package/dist/services/oauth-service.d.ts.map +1 -0
- package/dist/services/oauth-service.js +348 -0
- package/dist/services/oauth-service.js.map +1 -0
- package/dist/services/oauth-token-retrieval.service.d.ts +49 -0
- package/dist/services/oauth-token-retrieval.service.d.ts.map +1 -0
- package/dist/services/oauth-token-retrieval.service.js +150 -0
- package/dist/services/oauth-token-retrieval.service.js.map +1 -0
- package/dist/services/provider-resolver.d.ts +48 -0
- package/dist/services/provider-resolver.d.ts.map +1 -0
- package/dist/services/provider-resolver.js +120 -0
- package/dist/services/provider-resolver.js.map +1 -0
- package/dist/services/provider-validator.d.ts +55 -0
- package/dist/services/provider-validator.d.ts.map +1 -0
- package/dist/services/provider-validator.js +135 -0
- package/dist/services/provider-validator.js.map +1 -0
- package/dist/services/session-registration.service.d.ts +80 -0
- package/dist/services/session-registration.service.d.ts.map +1 -0
- package/dist/services/session-registration.service.js +172 -0
- package/dist/services/session-registration.service.js.map +1 -0
- package/dist/services/tool-context-builder.d.ts +57 -0
- package/dist/services/tool-context-builder.d.ts.map +1 -0
- package/dist/services/tool-context-builder.js +125 -0
- package/dist/services/tool-context-builder.js.map +1 -0
- package/dist/services/tool-protection.service.d.ts +87 -10
- package/dist/services/tool-protection.service.d.ts.map +1 -1
- package/dist/services/tool-protection.service.js +282 -112
- package/dist/services/tool-protection.service.js.map +1 -1
- package/dist/types/oauth-required-error.d.ts +40 -0
- package/dist/types/oauth-required-error.d.ts.map +1 -0
- package/dist/types/oauth-required-error.js +40 -0
- package/dist/types/oauth-required-error.js.map +1 -0
- package/dist/utils/did-helpers.d.ts +33 -0
- package/dist/utils/did-helpers.d.ts.map +1 -1
- package/dist/utils/did-helpers.js +40 -0
- package/dist/utils/did-helpers.js.map +1 -1
- package/dist/utils/index.d.ts +1 -0
- package/dist/utils/index.d.ts.map +1 -1
- package/dist/utils/index.js +1 -0
- package/dist/utils/index.js.map +1 -1
- package/docs/API_REFERENCE.md +1362 -0
- package/docs/COMPLIANCE_MATRIX.md +691 -0
- package/docs/STATUSLIST2021_GUIDE.md +696 -0
- package/docs/W3C_VC_DELEGATION_GUIDE.md +710 -0
- package/package.json +24 -50
- package/scripts/audit-compliance.ts +724 -0
- package/src/__tests__/cache/tool-protection-cache.test.ts +640 -0
- package/src/__tests__/config/provider-runtime-config.test.ts +309 -0
- package/src/__tests__/delegation-e2e.test.ts +690 -0
- package/src/__tests__/identity/user-did-manager.test.ts +213 -0
- package/src/__tests__/index.test.ts +56 -0
- package/src/__tests__/integration/full-flow.test.ts +776 -0
- package/src/__tests__/integration.test.ts +281 -0
- package/src/__tests__/providers/base.test.ts +173 -0
- package/src/__tests__/providers/memory.test.ts +319 -0
- package/src/__tests__/regression/phase2-regression.test.ts +427 -0
- package/src/__tests__/runtime/audit-logger.test.ts +154 -0
- package/src/__tests__/runtime/base-extensions.test.ts +593 -0
- package/src/__tests__/runtime/base.test.ts +869 -0
- package/src/__tests__/runtime/delegation-flow.test.ts +164 -0
- package/src/__tests__/runtime/proof-client-did.test.ts +375 -0
- package/src/__tests__/runtime/route-interception.test.ts +686 -0
- package/src/__tests__/runtime/tool-protection-enforcement.test.ts +908 -0
- package/src/__tests__/services/agentshield-integration.test.ts +784 -0
- package/src/__tests__/services/provider-resolver-edge-cases.test.ts +487 -0
- package/src/__tests__/services/tool-protection-oauth-provider.test.ts +480 -0
- package/src/__tests__/services/tool-protection.service.test.ts +1366 -0
- package/src/__tests__/utils/mock-providers.ts +340 -0
- package/src/cache/oauth-config-cache.d.ts +69 -0
- package/src/cache/oauth-config-cache.d.ts.map +1 -0
- package/src/cache/oauth-config-cache.js +71 -0
- package/src/cache/oauth-config-cache.js.map +1 -0
- package/src/cache/oauth-config-cache.ts +123 -0
- package/src/cache/tool-protection-cache.ts +171 -0
- package/src/compliance/EXAMPLE.md +412 -0
- package/src/compliance/__tests__/schema-verifier.test.ts +797 -0
- package/src/compliance/index.ts +8 -0
- package/src/compliance/schema-registry.ts +460 -0
- package/src/compliance/schema-verifier.ts +708 -0
- package/src/config/__tests__/remote-config.spec.ts +268 -0
- package/src/config/remote-config.ts +174 -0
- package/src/config.ts +309 -0
- package/src/delegation/__tests__/audience-validator.test.ts +112 -0
- package/src/delegation/__tests__/bitstring.test.ts +346 -0
- package/src/delegation/__tests__/cascading-revocation.test.ts +628 -0
- package/src/delegation/__tests__/delegation-graph.test.ts +584 -0
- package/src/delegation/__tests__/utils.test.ts +152 -0
- package/src/delegation/__tests__/vc-issuer.test.ts +442 -0
- package/src/delegation/__tests__/vc-verifier.test.ts +922 -0
- package/src/delegation/audience-validator.ts +52 -0
- package/src/delegation/bitstring.ts +278 -0
- package/src/delegation/cascading-revocation.ts +370 -0
- package/src/delegation/delegation-graph.ts +299 -0
- package/src/delegation/index.ts +14 -0
- package/src/delegation/statuslist-manager.ts +353 -0
- package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +366 -0
- package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +228 -0
- package/src/delegation/storage/index.ts +9 -0
- package/src/delegation/storage/memory-graph-storage.ts +178 -0
- package/src/delegation/storage/memory-statuslist-storage.ts +77 -0
- package/src/delegation/utils.ts +42 -0
- package/src/delegation/vc-issuer.ts +232 -0
- package/src/delegation/vc-verifier.ts +568 -0
- package/src/identity/idp-token-resolver.ts +147 -0
- package/src/identity/idp-token-storage.interface.ts +59 -0
- package/src/identity/user-did-manager.ts +370 -0
- package/src/index.ts +271 -0
- package/src/providers/base.d.ts +91 -0
- package/src/providers/base.d.ts.map +1 -0
- package/src/providers/base.js +38 -0
- package/src/providers/base.js.map +1 -0
- package/src/providers/base.ts +96 -0
- package/src/providers/memory.ts +142 -0
- package/src/runtime/audit-logger.ts +39 -0
- package/src/runtime/base.ts +1329 -0
- package/src/services/__tests__/access-control.integration.test.ts +443 -0
- package/src/services/__tests__/access-control.proof-response-validation.test.ts +578 -0
- package/src/services/__tests__/access-control.service.test.ts +970 -0
- package/src/services/__tests__/batch-delegation.service.test.ts +351 -0
- package/src/services/__tests__/crypto.service.test.ts +531 -0
- package/src/services/__tests__/oauth-provider-registry.test.ts +142 -0
- package/src/services/__tests__/proof-verifier.integration.test.ts +485 -0
- package/src/services/__tests__/proof-verifier.test.ts +489 -0
- package/src/services/__tests__/provider-resolution.integration.test.ts +198 -0
- package/src/services/__tests__/provider-resolver.test.ts +217 -0
- package/src/services/__tests__/storage.service.test.ts +358 -0
- package/src/services/access-control.service.ts +990 -0
- package/src/services/authorization/authorization-registry.ts +66 -0
- package/src/services/authorization/types.ts +71 -0
- package/src/services/batch-delegation.service.ts +137 -0
- package/src/services/crypto.service.ts +302 -0
- package/src/services/errors.ts +76 -0
- package/src/services/index.ts +18 -0
- package/src/services/oauth-config.service.d.ts +53 -0
- package/src/services/oauth-config.service.d.ts.map +1 -0
- package/src/services/oauth-config.service.js +113 -0
- package/src/services/oauth-config.service.js.map +1 -0
- package/src/services/oauth-config.service.ts +166 -0
- package/src/services/oauth-provider-registry.d.ts +57 -0
- package/src/services/oauth-provider-registry.d.ts.map +1 -0
- package/src/services/oauth-provider-registry.js +73 -0
- package/src/services/oauth-provider-registry.js.map +1 -0
- package/src/services/oauth-provider-registry.ts +123 -0
- package/src/services/oauth-service.ts +510 -0
- package/src/services/oauth-token-retrieval.service.ts +245 -0
- package/src/services/proof-verifier.ts +478 -0
- package/src/services/provider-resolver.d.ts +48 -0
- package/src/services/provider-resolver.d.ts.map +1 -0
- package/src/services/provider-resolver.js +106 -0
- package/src/services/provider-resolver.js.map +1 -0
- package/src/services/provider-resolver.ts +144 -0
- package/src/services/provider-validator.ts +170 -0
- package/src/services/session-registration.service.ts +251 -0
- package/src/services/storage.service.ts +566 -0
- package/src/services/tool-context-builder.ts +172 -0
- package/src/services/tool-protection.service.ts +958 -0
- package/src/types/oauth-required-error.ts +63 -0
- package/src/types/tool-protection.ts +155 -0
- package/src/utils/__tests__/did-helpers.test.ts +101 -0
- package/src/utils/base64.ts +148 -0
- package/src/utils/cors.ts +83 -0
- package/src/utils/did-helpers.ts +150 -0
- package/src/utils/index.ts +8 -0
- package/src/utils/storage-keys.ts +278 -0
- package/tsconfig.json +21 -0
- package/vitest.config.ts +56 -0
|
@@ -0,0 +1,281 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Integration tests demonstrating full runtime usage
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
import { describe, it, expect, beforeEach } from 'vitest';
|
|
6
|
+
import { MCPIRuntimeBase } from '../runtime/base';
|
|
7
|
+
import {
|
|
8
|
+
MemoryStorageProvider,
|
|
9
|
+
MemoryNonceCacheProvider,
|
|
10
|
+
MemoryIdentityProvider
|
|
11
|
+
} from '../providers/memory';
|
|
12
|
+
import { MockCryptoProvider, MockClockProvider, MockFetchProvider } from './utils/mock-providers';
|
|
13
|
+
|
|
14
|
+
describe('Integration Tests', () => {
|
|
15
|
+
let runtime: MCPIRuntimeBase;
|
|
16
|
+
let cryptoProvider: MockCryptoProvider;
|
|
17
|
+
let clockProvider: MockClockProvider;
|
|
18
|
+
let fetchProvider: MockFetchProvider;
|
|
19
|
+
|
|
20
|
+
beforeEach(async () => {
|
|
21
|
+
// Set up providers
|
|
22
|
+
cryptoProvider = new MockCryptoProvider();
|
|
23
|
+
clockProvider = new MockClockProvider();
|
|
24
|
+
fetchProvider = new MockFetchProvider();
|
|
25
|
+
|
|
26
|
+
// Create runtime with real memory providers
|
|
27
|
+
runtime = new MCPIRuntimeBase({
|
|
28
|
+
cryptoProvider,
|
|
29
|
+
clockProvider,
|
|
30
|
+
fetchProvider,
|
|
31
|
+
storageProvider: new MemoryStorageProvider(),
|
|
32
|
+
nonceCacheProvider: new MemoryNonceCacheProvider(),
|
|
33
|
+
identityProvider: new MemoryIdentityProvider(cryptoProvider),
|
|
34
|
+
environment: 'development',
|
|
35
|
+
timestampSkewSeconds: 120,
|
|
36
|
+
sessionTtlMinutes: 30,
|
|
37
|
+
audit: {
|
|
38
|
+
enabled: true,
|
|
39
|
+
includePayloads: true
|
|
40
|
+
}
|
|
41
|
+
});
|
|
42
|
+
|
|
43
|
+
await runtime.initialize();
|
|
44
|
+
});
|
|
45
|
+
|
|
46
|
+
describe('Full handshake and tool execution flow', () => {
|
|
47
|
+
it('should complete full authentication and tool execution cycle', async () => {
|
|
48
|
+
// Step 1: Client initiates handshake
|
|
49
|
+
const handshakeRequest = {
|
|
50
|
+
clientDid: 'did:key:zclient789',
|
|
51
|
+
audience: 'https://app.example.com'
|
|
52
|
+
};
|
|
53
|
+
|
|
54
|
+
const handshakeResponse = await runtime.handleHandshake(handshakeRequest);
|
|
55
|
+
|
|
56
|
+
expect(handshakeResponse.sessionId).toBeDefined();
|
|
57
|
+
expect(handshakeResponse.agentDid).toMatch(/^did:key:z/);
|
|
58
|
+
expect(handshakeResponse.signature).toBeDefined();
|
|
59
|
+
expect(handshakeResponse.capabilities).toContain('identity');
|
|
60
|
+
|
|
61
|
+
// Step 2: Get session and issue nonce
|
|
62
|
+
const session = await runtime.getCurrentSession();
|
|
63
|
+
expect(session).toBeDefined();
|
|
64
|
+
|
|
65
|
+
const nonce = await runtime.issueNonce(session!.id);
|
|
66
|
+
session!.nonce = nonce;
|
|
67
|
+
|
|
68
|
+
// Step 3: Execute tool with session
|
|
69
|
+
const toolHandler = async (args: any) => {
|
|
70
|
+
return {
|
|
71
|
+
message: `Hello ${args.name}!`,
|
|
72
|
+
timestamp: Date.now()
|
|
73
|
+
};
|
|
74
|
+
};
|
|
75
|
+
|
|
76
|
+
const result = await runtime.processToolCall(
|
|
77
|
+
'greetingTool',
|
|
78
|
+
{ name: 'Alice' },
|
|
79
|
+
toolHandler,
|
|
80
|
+
session
|
|
81
|
+
);
|
|
82
|
+
|
|
83
|
+
expect(result.message).toBe('Hello Alice!');
|
|
84
|
+
|
|
85
|
+
// Step 4: Verify proof was created
|
|
86
|
+
const proof = runtime.getLastProof();
|
|
87
|
+
expect(proof).toBeDefined();
|
|
88
|
+
expect(proof.nonce).toBe(nonce);
|
|
89
|
+
expect(proof.sessionId).toBe(session!.id);
|
|
90
|
+
expect(proof.audience).toBe('https://app.example.com');
|
|
91
|
+
|
|
92
|
+
// Step 5: Set up DID resolution for verification
|
|
93
|
+
const identity = await runtime.getIdentity();
|
|
94
|
+
fetchProvider.setDIDDocument(identity.did, {
|
|
95
|
+
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
96
|
+
id: identity.did,
|
|
97
|
+
verificationMethod: [{
|
|
98
|
+
id: `${identity.did}#key-1`,
|
|
99
|
+
type: 'Ed25519VerificationKey2020',
|
|
100
|
+
controller: identity.did,
|
|
101
|
+
publicKeyBase64: identity.publicKey
|
|
102
|
+
}]
|
|
103
|
+
});
|
|
104
|
+
|
|
105
|
+
// Step 6: Clear nonce cache to simulate fresh verification
|
|
106
|
+
// In real-world usage, verification would happen on a different system
|
|
107
|
+
const nonceCacheProvider = (runtime as any).nonceCache as MemoryNonceCacheProvider;
|
|
108
|
+
await nonceCacheProvider.destroy();
|
|
109
|
+
|
|
110
|
+
// Step 7: Verify the proof
|
|
111
|
+
const isValid = await runtime.verifyProof(result, proof);
|
|
112
|
+
expect(isValid).toBe(true);
|
|
113
|
+
});
|
|
114
|
+
});
|
|
115
|
+
|
|
116
|
+
describe('Session expiry handling', () => {
|
|
117
|
+
it('should handle expired sessions correctly', async () => {
|
|
118
|
+
// Create session
|
|
119
|
+
await runtime.handleHandshake({
|
|
120
|
+
clientDid: 'did:key:zclient',
|
|
121
|
+
audience: 'https://app.example.com'
|
|
122
|
+
});
|
|
123
|
+
|
|
124
|
+
// Verify session exists
|
|
125
|
+
let session = await runtime.getCurrentSession();
|
|
126
|
+
expect(session).toBeDefined();
|
|
127
|
+
|
|
128
|
+
// Advance time past expiry
|
|
129
|
+
clockProvider.setTime(Date.now() + (31 * 60 * 1000));
|
|
130
|
+
|
|
131
|
+
// Session should now be expired
|
|
132
|
+
session = await runtime.getCurrentSession();
|
|
133
|
+
expect(session).toBeNull();
|
|
134
|
+
});
|
|
135
|
+
});
|
|
136
|
+
|
|
137
|
+
describe('Key rotation flow', () => {
|
|
138
|
+
it('should handle key rotation and maintain functionality', async () => {
|
|
139
|
+
// Get initial identity
|
|
140
|
+
const oldIdentity = await runtime.getIdentity();
|
|
141
|
+
expect(oldIdentity.did).toMatch(/^did:key:z/);
|
|
142
|
+
|
|
143
|
+
// Create session with old identity
|
|
144
|
+
const handshakeResponse = await runtime.handleHandshake({
|
|
145
|
+
clientDid: 'did:key:zclient',
|
|
146
|
+
audience: 'https://app.example.com'
|
|
147
|
+
});
|
|
148
|
+
expect(handshakeResponse.agentDid).toBe(oldIdentity.did);
|
|
149
|
+
|
|
150
|
+
// Rotate keys
|
|
151
|
+
const newIdentity = await runtime.rotateKeys();
|
|
152
|
+
expect(newIdentity.did).not.toBe(oldIdentity.did);
|
|
153
|
+
|
|
154
|
+
// New handshakes should use new identity
|
|
155
|
+
const newHandshakeResponse = await runtime.handleHandshake({
|
|
156
|
+
clientDid: 'did:key:zclient2',
|
|
157
|
+
audience: 'https://app2.example.com'
|
|
158
|
+
});
|
|
159
|
+
expect(newHandshakeResponse.agentDid).toBe(newIdentity.did);
|
|
160
|
+
});
|
|
161
|
+
});
|
|
162
|
+
|
|
163
|
+
describe('Well-known endpoints', () => {
|
|
164
|
+
it('should provide identity discovery endpoints', async () => {
|
|
165
|
+
const handler = runtime.createWellKnownHandler({
|
|
166
|
+
serviceName: 'Test MCP Service',
|
|
167
|
+
serviceEndpoint: 'https://mcp.example.com'
|
|
168
|
+
});
|
|
169
|
+
|
|
170
|
+
// Test DID document endpoint
|
|
171
|
+
const didDocResponse = await handler('/.well-known/did.json');
|
|
172
|
+
expect(didDocResponse).toBeDefined();
|
|
173
|
+
expect(didDocResponse.body).toBeDefined();
|
|
174
|
+
|
|
175
|
+
const didDoc = JSON.parse(didDocResponse.body);
|
|
176
|
+
expect(didDoc.id).toMatch(/^did:key:z/);
|
|
177
|
+
expect(didDoc.verificationMethod).toHaveLength(1);
|
|
178
|
+
expect(didDoc.verificationMethod[0].type).toBe('Ed25519VerificationKey2020');
|
|
179
|
+
|
|
180
|
+
// Test MCP identity endpoint
|
|
181
|
+
const mcpIdentity = await handler('/.well-known/mcp-identity');
|
|
182
|
+
expect(mcpIdentity).toBeDefined();
|
|
183
|
+
expect(mcpIdentity.did).toBe(didDoc.id);
|
|
184
|
+
expect(mcpIdentity.serviceName).toBe('Test MCP Service');
|
|
185
|
+
expect(mcpIdentity.serviceEndpoint).toBe('https://mcp.example.com');
|
|
186
|
+
});
|
|
187
|
+
});
|
|
188
|
+
|
|
189
|
+
describe('Nonce replay protection', () => {
|
|
190
|
+
it('should prevent nonce reuse', async () => {
|
|
191
|
+
// Create a proof with a specific nonce
|
|
192
|
+
const nonce = await runtime.issueNonce('session123');
|
|
193
|
+
const data = { test: 'data' };
|
|
194
|
+
const proof = await runtime.createProof(data, { nonce });
|
|
195
|
+
|
|
196
|
+
// First use of nonce should fail (already in cache from issueNonce)
|
|
197
|
+
const isValid = await runtime.verifyProof(data, proof);
|
|
198
|
+
expect(isValid).toBe(false);
|
|
199
|
+
|
|
200
|
+
// Create proof with fresh nonce
|
|
201
|
+
const freshProof = await runtime.createProof(data);
|
|
202
|
+
|
|
203
|
+
// Set up DID resolution
|
|
204
|
+
const identity = await runtime.getIdentity();
|
|
205
|
+
fetchProvider.setDIDDocument(identity.did, {
|
|
206
|
+
verificationMethod: [{
|
|
207
|
+
publicKeyBase64: identity.publicKey
|
|
208
|
+
}]
|
|
209
|
+
});
|
|
210
|
+
|
|
211
|
+
// Clear nonce cache to simulate fresh verification
|
|
212
|
+
const nonceCacheProvider = (runtime as any).nonceCache as MemoryNonceCacheProvider;
|
|
213
|
+
await nonceCacheProvider.destroy();
|
|
214
|
+
|
|
215
|
+
// Fresh nonce should verify successfully
|
|
216
|
+
const isValidFresh = await runtime.verifyProof(data, freshProof);
|
|
217
|
+
expect(isValidFresh).toBe(true);
|
|
218
|
+
});
|
|
219
|
+
});
|
|
220
|
+
|
|
221
|
+
describe('Error handling', () => {
|
|
222
|
+
it('should handle network errors gracefully', async () => {
|
|
223
|
+
// Set up fetch to fail
|
|
224
|
+
fetchProvider.resolveDID = async () => {
|
|
225
|
+
throw new Error('Network error');
|
|
226
|
+
};
|
|
227
|
+
|
|
228
|
+
const data = { test: 'data' };
|
|
229
|
+
const proof = await runtime.createProof(data);
|
|
230
|
+
|
|
231
|
+
// Verification should fail gracefully
|
|
232
|
+
const isValid = await runtime.verifyProof(data, proof);
|
|
233
|
+
expect(isValid).toBe(false);
|
|
234
|
+
});
|
|
235
|
+
|
|
236
|
+
it('should handle malformed DID documents', async () => {
|
|
237
|
+
const identity = await runtime.getIdentity();
|
|
238
|
+
|
|
239
|
+
// Set up malformed DID document
|
|
240
|
+
fetchProvider.setDIDDocument(identity.did, {
|
|
241
|
+
// Missing verificationMethod
|
|
242
|
+
});
|
|
243
|
+
|
|
244
|
+
const data = { test: 'data' };
|
|
245
|
+
const proof = await runtime.createProof(data);
|
|
246
|
+
|
|
247
|
+
// Should fail verification due to missing public key
|
|
248
|
+
const isValid = await runtime.verifyProof(data, proof);
|
|
249
|
+
expect(isValid).toBe(false);
|
|
250
|
+
});
|
|
251
|
+
});
|
|
252
|
+
|
|
253
|
+
describe('Debug endpoint', () => {
|
|
254
|
+
it('should provide debug information in development', async () => {
|
|
255
|
+
const debugEndpoint = runtime.createDebugEndpoint();
|
|
256
|
+
expect(debugEndpoint).toBeDefined();
|
|
257
|
+
|
|
258
|
+
const debugInfo = await debugEndpoint!();
|
|
259
|
+
expect(debugInfo).toBeDefined();
|
|
260
|
+
expect(debugInfo.identity).toBeDefined();
|
|
261
|
+
expect(debugInfo.identity.did).toMatch(/^did:key:z/);
|
|
262
|
+
expect(debugInfo.config.environment).toBe('development');
|
|
263
|
+
expect(debugInfo.timestamp).toBe(clockProvider.now());
|
|
264
|
+
});
|
|
265
|
+
|
|
266
|
+
it('should be disabled in production', () => {
|
|
267
|
+
const prodRuntime = new MCPIRuntimeBase({
|
|
268
|
+
cryptoProvider,
|
|
269
|
+
clockProvider,
|
|
270
|
+
fetchProvider,
|
|
271
|
+
storageProvider: new MemoryStorageProvider(),
|
|
272
|
+
nonceCacheProvider: new MemoryNonceCacheProvider(),
|
|
273
|
+
identityProvider: new MemoryIdentityProvider(cryptoProvider),
|
|
274
|
+
environment: 'production'
|
|
275
|
+
});
|
|
276
|
+
|
|
277
|
+
const debugEndpoint = prodRuntime.createDebugEndpoint();
|
|
278
|
+
expect(debugEndpoint).toBeNull();
|
|
279
|
+
});
|
|
280
|
+
});
|
|
281
|
+
});
|
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tests for Base Provider Classes
|
|
3
|
+
*
|
|
4
|
+
* These tests verify that the abstract base classes are properly defined
|
|
5
|
+
* and that implementations must provide all required methods.
|
|
6
|
+
*/
|
|
7
|
+
|
|
8
|
+
import { describe, it, expect } from 'vitest';
|
|
9
|
+
import {
|
|
10
|
+
CryptoProvider,
|
|
11
|
+
ClockProvider,
|
|
12
|
+
FetchProvider,
|
|
13
|
+
StorageProvider,
|
|
14
|
+
NonceCacheProvider,
|
|
15
|
+
IdentityProvider
|
|
16
|
+
} from '../../providers/base';
|
|
17
|
+
|
|
18
|
+
describe('Base Provider Classes', () => {
|
|
19
|
+
describe('CryptoProvider', () => {
|
|
20
|
+
it('should be defined as a class', () => {
|
|
21
|
+
expect(CryptoProvider).toBeDefined();
|
|
22
|
+
expect(typeof CryptoProvider).toBe('function');
|
|
23
|
+
});
|
|
24
|
+
|
|
25
|
+
it('should require implementation of abstract methods', () => {
|
|
26
|
+
// TypeScript abstract methods don't exist at runtime
|
|
27
|
+
// They're enforced at compile-time, not runtime
|
|
28
|
+
class TestCrypto extends CryptoProvider {}
|
|
29
|
+
const instance = new TestCrypto();
|
|
30
|
+
|
|
31
|
+
// These methods are undefined because they're abstract
|
|
32
|
+
expect(instance.sign).toBeUndefined();
|
|
33
|
+
expect(instance.verify).toBeUndefined();
|
|
34
|
+
expect(instance.generateKeyPair).toBeUndefined();
|
|
35
|
+
expect(instance.hash).toBeUndefined();
|
|
36
|
+
expect(instance.randomBytes).toBeUndefined();
|
|
37
|
+
});
|
|
38
|
+
|
|
39
|
+
it('should work when properly implemented', async () => {
|
|
40
|
+
class TestCrypto extends CryptoProvider {
|
|
41
|
+
async sign(data: Uint8Array, privateKey: string): Promise<Uint8Array> {
|
|
42
|
+
return new Uint8Array([1, 2, 3]);
|
|
43
|
+
}
|
|
44
|
+
async verify(data: Uint8Array, signature: Uint8Array, publicKey: string): Promise<boolean> {
|
|
45
|
+
return true;
|
|
46
|
+
}
|
|
47
|
+
async generateKeyPair(): Promise<{ privateKey: string; publicKey: string }> {
|
|
48
|
+
return { privateKey: 'test-private', publicKey: 'test-public' };
|
|
49
|
+
}
|
|
50
|
+
async hash(data: Uint8Array): Promise<Uint8Array> {
|
|
51
|
+
return new Uint8Array([4, 5, 6]);
|
|
52
|
+
}
|
|
53
|
+
async randomBytes(length: number): Promise<Uint8Array> {
|
|
54
|
+
return new Uint8Array(length);
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
const instance = new TestCrypto();
|
|
59
|
+
expect(await instance.sign(new Uint8Array(), '')).toEqual(new Uint8Array([1, 2, 3]));
|
|
60
|
+
expect(await instance.verify(new Uint8Array(), new Uint8Array(), '')).toBe(true);
|
|
61
|
+
expect(await instance.generateKeyPair()).toEqual({ privateKey: 'test-private', publicKey: 'test-public' });
|
|
62
|
+
expect(await instance.hash(new Uint8Array())).toEqual(new Uint8Array([4, 5, 6]));
|
|
63
|
+
expect(await instance.randomBytes(5)).toHaveLength(5);
|
|
64
|
+
});
|
|
65
|
+
});
|
|
66
|
+
|
|
67
|
+
describe('ClockProvider', () => {
|
|
68
|
+
it('should be defined as a class', () => {
|
|
69
|
+
expect(ClockProvider).toBeDefined();
|
|
70
|
+
expect(typeof ClockProvider).toBe('function');
|
|
71
|
+
});
|
|
72
|
+
|
|
73
|
+
it('should require implementation of abstract methods', () => {
|
|
74
|
+
class TestClock extends ClockProvider {}
|
|
75
|
+
const instance = new TestClock();
|
|
76
|
+
|
|
77
|
+
expect(instance.now).toBeUndefined();
|
|
78
|
+
expect(instance.isWithinSkew).toBeUndefined();
|
|
79
|
+
expect(instance.hasExpired).toBeUndefined();
|
|
80
|
+
expect(instance.calculateExpiry).toBeUndefined();
|
|
81
|
+
expect(instance.format).toBeUndefined();
|
|
82
|
+
});
|
|
83
|
+
});
|
|
84
|
+
|
|
85
|
+
describe('FetchProvider', () => {
|
|
86
|
+
it('should be defined as a class', () => {
|
|
87
|
+
expect(FetchProvider).toBeDefined();
|
|
88
|
+
expect(typeof FetchProvider).toBe('function');
|
|
89
|
+
});
|
|
90
|
+
|
|
91
|
+
it('should require implementation of abstract methods', () => {
|
|
92
|
+
class TestFetch extends FetchProvider {}
|
|
93
|
+
const instance = new TestFetch();
|
|
94
|
+
|
|
95
|
+
expect(instance.resolveDID).toBeUndefined();
|
|
96
|
+
expect(instance.fetchStatusList).toBeUndefined();
|
|
97
|
+
expect(instance.fetchDelegationChain).toBeUndefined();
|
|
98
|
+
expect(instance.fetch).toBeUndefined();
|
|
99
|
+
});
|
|
100
|
+
});
|
|
101
|
+
|
|
102
|
+
describe('StorageProvider', () => {
|
|
103
|
+
it('should be defined as a class', () => {
|
|
104
|
+
expect(StorageProvider).toBeDefined();
|
|
105
|
+
expect(typeof StorageProvider).toBe('function');
|
|
106
|
+
});
|
|
107
|
+
|
|
108
|
+
it('should require implementation of abstract methods', () => {
|
|
109
|
+
class TestStorage extends StorageProvider {}
|
|
110
|
+
const instance = new TestStorage();
|
|
111
|
+
|
|
112
|
+
expect(instance.get).toBeUndefined();
|
|
113
|
+
expect(instance.set).toBeUndefined();
|
|
114
|
+
expect(instance.delete).toBeUndefined();
|
|
115
|
+
expect(instance.exists).toBeUndefined();
|
|
116
|
+
expect(instance.list).toBeUndefined();
|
|
117
|
+
});
|
|
118
|
+
});
|
|
119
|
+
|
|
120
|
+
describe('NonceCacheProvider', () => {
|
|
121
|
+
it('should be defined as a class', () => {
|
|
122
|
+
expect(NonceCacheProvider).toBeDefined();
|
|
123
|
+
expect(typeof NonceCacheProvider).toBe('function');
|
|
124
|
+
});
|
|
125
|
+
|
|
126
|
+
it('should require implementation of abstract methods', () => {
|
|
127
|
+
class TestNonceCache extends NonceCacheProvider {}
|
|
128
|
+
const instance = new TestNonceCache();
|
|
129
|
+
|
|
130
|
+
expect(instance.has).toBeUndefined();
|
|
131
|
+
expect(instance.add).toBeUndefined();
|
|
132
|
+
expect(instance.cleanup).toBeUndefined();
|
|
133
|
+
expect(instance.destroy).toBeUndefined();
|
|
134
|
+
});
|
|
135
|
+
});
|
|
136
|
+
|
|
137
|
+
describe('IdentityProvider', () => {
|
|
138
|
+
it('should be defined as a class', () => {
|
|
139
|
+
expect(IdentityProvider).toBeDefined();
|
|
140
|
+
expect(typeof IdentityProvider).toBe('function');
|
|
141
|
+
});
|
|
142
|
+
|
|
143
|
+
it('should require implementation of abstract methods', () => {
|
|
144
|
+
class TestIdentity extends IdentityProvider {}
|
|
145
|
+
const instance = new TestIdentity();
|
|
146
|
+
|
|
147
|
+
expect(instance.getIdentity).toBeUndefined();
|
|
148
|
+
expect(instance.saveIdentity).toBeUndefined();
|
|
149
|
+
expect(instance.rotateKeys).toBeUndefined();
|
|
150
|
+
expect(instance.deleteIdentity).toBeUndefined();
|
|
151
|
+
});
|
|
152
|
+
});
|
|
153
|
+
|
|
154
|
+
describe('AgentIdentity interface', () => {
|
|
155
|
+
it('should have proper type structure', () => {
|
|
156
|
+
const validIdentity = {
|
|
157
|
+
did: 'did:key:z123',
|
|
158
|
+
kid: 'did:key:z123#key-1',
|
|
159
|
+
privateKey: 'private-key',
|
|
160
|
+
publicKey: 'public-key',
|
|
161
|
+
createdAt: new Date().toISOString(),
|
|
162
|
+
type: 'development' as const,
|
|
163
|
+
metadata: { foo: 'bar' }
|
|
164
|
+
};
|
|
165
|
+
|
|
166
|
+
// Type checking is done at compile time
|
|
167
|
+
// This test just verifies the shape is correct
|
|
168
|
+
expect(validIdentity.did).toBe('did:key:z123');
|
|
169
|
+
expect(validIdentity.type).toBe('development');
|
|
170
|
+
expect(validIdentity.metadata).toEqual({ foo: 'bar' });
|
|
171
|
+
});
|
|
172
|
+
});
|
|
173
|
+
});
|