@kya-os/mcp-i-core 1.3.10-canary.clientinfo.20251126124133 → 1.3.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/settings.local.json +9 -0
- package/.turbo/turbo-build.log +1 -1
- package/.turbo/turbo-test$colon$coverage.log +3419 -3072
- package/.turbo/turbo-test.log +1805 -1680
- package/coverage/coverage-final.json +59 -56
- package/dist/config/remote-config.d.ts +51 -0
- package/dist/config/remote-config.d.ts.map +1 -1
- package/dist/config/remote-config.js +74 -0
- package/dist/config/remote-config.js.map +1 -1
- package/dist/config.d.ts +1 -1
- package/dist/config.d.ts.map +1 -1
- package/dist/config.js +4 -1
- package/dist/config.js.map +1 -1
- package/dist/delegation/did-key-resolver.d.ts +64 -0
- package/dist/delegation/did-key-resolver.d.ts.map +1 -0
- package/dist/delegation/did-key-resolver.js +159 -0
- package/dist/delegation/did-key-resolver.js.map +1 -0
- package/dist/delegation/utils.d.ts +76 -0
- package/dist/delegation/utils.d.ts.map +1 -1
- package/dist/delegation/utils.js +117 -0
- package/dist/delegation/utils.js.map +1 -1
- package/dist/identity/idp-token-resolver.d.ts +17 -1
- package/dist/identity/idp-token-resolver.d.ts.map +1 -1
- package/dist/identity/idp-token-resolver.js +34 -6
- package/dist/identity/idp-token-resolver.js.map +1 -1
- package/dist/identity/idp-token-storage.interface.d.ts +38 -7
- package/dist/identity/idp-token-storage.interface.d.ts.map +1 -1
- package/dist/identity/idp-token-storage.interface.js +2 -0
- package/dist/identity/idp-token-storage.interface.js.map +1 -1
- package/dist/identity/user-did-manager.d.ts +95 -12
- package/dist/identity/user-did-manager.d.ts.map +1 -1
- package/dist/identity/user-did-manager.js +107 -25
- package/dist/identity/user-did-manager.js.map +1 -1
- package/dist/index.d.ts +6 -3
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +24 -2
- package/dist/index.js.map +1 -1
- package/dist/runtime/base.d.ts +25 -8
- package/dist/runtime/base.d.ts.map +1 -1
- package/dist/runtime/base.js +74 -21
- package/dist/runtime/base.js.map +1 -1
- package/dist/services/session-registration.service.d.ts.map +1 -1
- package/dist/services/session-registration.service.js +10 -90
- package/dist/services/session-registration.service.js.map +1 -1
- package/dist/services/tool-context-builder.d.ts +18 -1
- package/dist/services/tool-context-builder.d.ts.map +1 -1
- package/dist/services/tool-context-builder.js +63 -10
- package/dist/services/tool-context-builder.js.map +1 -1
- package/dist/services/tool-protection.service.d.ts +6 -3
- package/dist/services/tool-protection.service.d.ts.map +1 -1
- package/dist/services/tool-protection.service.js +89 -34
- package/dist/services/tool-protection.service.js.map +1 -1
- package/dist/utils/base58.d.ts +31 -0
- package/dist/utils/base58.d.ts.map +1 -0
- package/dist/utils/base58.js +103 -0
- package/dist/utils/base58.js.map +1 -0
- package/dist/utils/did-helpers.d.ts +33 -0
- package/dist/utils/did-helpers.d.ts.map +1 -1
- package/dist/utils/did-helpers.js +53 -0
- package/dist/utils/did-helpers.js.map +1 -1
- package/package.json +3 -3
- package/src/__tests__/identity/user-did-manager.test.ts +64 -45
- package/src/__tests__/integration/full-flow.test.ts +23 -10
- package/src/__tests__/runtime/base-extensions.test.ts +23 -21
- package/src/__tests__/runtime/proof-client-did.test.ts +19 -18
- package/src/__tests__/services/agentshield-integration.test.ts +10 -3
- package/src/__tests__/services/tool-protection-merged-config.test.ts +485 -0
- package/src/__tests__/services/tool-protection.service.test.ts +18 -11
- package/src/config/__tests__/merged-config.spec.ts +445 -0
- package/src/config/remote-config.ts +90 -0
- package/src/config.ts +3 -0
- package/src/delegation/__tests__/did-key-resolver.test.ts +265 -0
- package/src/delegation/__tests__/vc-issuer.test.ts +1 -1
- package/src/delegation/did-key-resolver.ts +179 -0
- package/src/delegation/utils.ts +179 -0
- package/src/identity/idp-token-resolver.ts +41 -7
- package/src/identity/idp-token-storage.interface.ts +42 -7
- package/src/identity/user-did-manager.ts +185 -29
- package/src/index.ts +42 -3
- package/src/runtime/base.ts +84 -21
- package/src/services/session-registration.service.ts +26 -121
- package/src/services/tool-context-builder.ts +75 -10
- package/src/services/tool-protection.service.ts +176 -88
- package/src/utils/__tests__/did-helpers.test.ts +55 -0
- package/src/utils/base58.ts +109 -0
- package/src/utils/did-helpers.ts +60 -0
- package/dist/__tests__/utils/mock-providers.d.ts +0 -103
- package/dist/__tests__/utils/mock-providers.d.ts.map +0 -1
- package/dist/__tests__/utils/mock-providers.js +0 -293
- package/dist/__tests__/utils/mock-providers.js.map +0 -1
|
@@ -2,11 +2,17 @@
|
|
|
2
2
|
/**
|
|
3
3
|
* User DID Manager
|
|
4
4
|
*
|
|
5
|
-
*
|
|
6
|
-
* Generates did:key DIDs for users when they join a chat session.
|
|
5
|
+
* Manages user DIDs for MCP-I sessions.
|
|
7
6
|
*
|
|
8
|
-
*
|
|
9
|
-
*
|
|
7
|
+
* Phase 5: Anonymous Sessions Until OAuth
|
|
8
|
+
* - Sessions start anonymous (no userDid) until OAuth completes
|
|
9
|
+
* - User DIDs are resolved via AgentShield identity/resolve after OAuth
|
|
10
|
+
* - Eliminates DID fragmentation (same user = same DID across sessions)
|
|
11
|
+
*
|
|
12
|
+
* DID Resolution Priority:
|
|
13
|
+
* 1. OAuth mapping lookup (persistent)
|
|
14
|
+
* 2. Session storage lookup
|
|
15
|
+
* 3. Return null (session stays anonymous)
|
|
10
16
|
*/
|
|
11
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
18
|
exports.UserDidManager = void 0;
|
|
@@ -19,24 +25,70 @@ exports.UserDidManager = void 0;
|
|
|
19
25
|
class UserDidManager {
|
|
20
26
|
config;
|
|
21
27
|
sessionDidCache = new Map();
|
|
28
|
+
sessionKeyPairCache = new Map();
|
|
22
29
|
constructor(config) {
|
|
23
30
|
this.config = config;
|
|
24
31
|
}
|
|
25
32
|
/**
|
|
26
|
-
*
|
|
33
|
+
* Get key pair for a session (for VC signing)
|
|
34
|
+
*
|
|
35
|
+
* Returns the key pair if available, null otherwise.
|
|
36
|
+
* Key pairs are stored when DIDs are generated.
|
|
37
|
+
*
|
|
38
|
+
* @param sessionId - MCP session ID
|
|
39
|
+
* @param oauthIdentity - Optional OAuth identity for persistent lookup
|
|
40
|
+
* @returns UserKeyPair or null if not available
|
|
41
|
+
*/
|
|
42
|
+
async getKeyPairForSession(sessionId, oauthIdentity) {
|
|
43
|
+
// Check in-memory cache first
|
|
44
|
+
if (this.sessionKeyPairCache.has(sessionId)) {
|
|
45
|
+
return this.sessionKeyPairCache.get(sessionId);
|
|
46
|
+
}
|
|
47
|
+
// Check OAuth-based persistent storage if available
|
|
48
|
+
if (oauthIdentity?.provider &&
|
|
49
|
+
oauthIdentity?.subject &&
|
|
50
|
+
this.config.storage?.getKeyPairByOAuth) {
|
|
51
|
+
try {
|
|
52
|
+
const keyPair = await this.config.storage.getKeyPairByOAuth(oauthIdentity.provider, oauthIdentity.subject);
|
|
53
|
+
if (keyPair) {
|
|
54
|
+
this.sessionKeyPairCache.set(sessionId, keyPair);
|
|
55
|
+
return keyPair;
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
catch (error) {
|
|
59
|
+
console.warn('[UserDidManager] OAuth key pair lookup failed:', error);
|
|
60
|
+
}
|
|
61
|
+
}
|
|
62
|
+
// Check session storage if available
|
|
63
|
+
if (this.config.storage?.getKeyPair) {
|
|
64
|
+
try {
|
|
65
|
+
const keyPair = await this.config.storage.getKeyPair(sessionId);
|
|
66
|
+
if (keyPair) {
|
|
67
|
+
this.sessionKeyPairCache.set(sessionId, keyPair);
|
|
68
|
+
return keyPair;
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
catch (error) {
|
|
72
|
+
console.warn('[UserDidManager] Session key pair lookup failed:', error);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
return null;
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Get user DID for a session (Phase 5: No ephemeral generation)
|
|
27
79
|
*
|
|
28
80
|
* If a user DID already exists for the session, it is returned.
|
|
29
|
-
* If OAuth identity is provided, checks for persistent user DID mapping
|
|
30
|
-
*
|
|
81
|
+
* If OAuth identity is provided, checks for persistent user DID mapping.
|
|
82
|
+
* Returns null if no DID found - session stays anonymous until OAuth completes.
|
|
31
83
|
*
|
|
32
84
|
* @param sessionId - MCP session ID
|
|
33
85
|
* @param oauthIdentity - Optional OAuth identity for persistent user DID lookup
|
|
34
|
-
* @returns User DID (did:key format)
|
|
86
|
+
* @returns User DID (did:key format) or null if session is anonymous
|
|
35
87
|
*
|
|
36
88
|
* @remarks
|
|
37
|
-
* -
|
|
38
|
-
* -
|
|
39
|
-
* -
|
|
89
|
+
* - Phase 5: Sessions start anonymous, no ephemeral DID generation
|
|
90
|
+
* - User DIDs are resolved via AgentShield after OAuth completes
|
|
91
|
+
* - Returns null if no existing DID found (instead of generating ephemeral)
|
|
40
92
|
*/
|
|
41
93
|
async getOrCreateUserDid(sessionId, oauthIdentity) {
|
|
42
94
|
// Check cache first
|
|
@@ -97,40 +149,50 @@ class UserDidManager {
|
|
|
97
149
|
}
|
|
98
150
|
}
|
|
99
151
|
catch (error) {
|
|
100
|
-
// Log but continue - will
|
|
101
|
-
console.warn('[UserDidManager] Storage.get failed
|
|
152
|
+
// Log but continue - session will be anonymous
|
|
153
|
+
console.warn('[UserDidManager] Storage.get failed:', error);
|
|
102
154
|
}
|
|
103
155
|
}
|
|
104
|
-
//
|
|
105
|
-
|
|
106
|
-
|
|
156
|
+
// PHASE 5: No ephemeral DID generation - session stays anonymous
|
|
157
|
+
// User DID will be resolved via AgentShield after OAuth completes
|
|
158
|
+
return null;
|
|
159
|
+
}
|
|
160
|
+
/**
|
|
161
|
+
* Set user DID for a session (Phase 5: After OAuth resolution)
|
|
162
|
+
*
|
|
163
|
+
* Called after AgentShield identity/resolve returns a persistent user DID.
|
|
164
|
+
* Caches the DID and optionally stores in session storage.
|
|
165
|
+
*
|
|
166
|
+
* @param sessionId - MCP session ID
|
|
167
|
+
* @param userDid - Persistent user DID from AgentShield
|
|
168
|
+
* @param oauthIdentity - OAuth identity for creating persistent mappings
|
|
169
|
+
*/
|
|
170
|
+
async setUserDidForSession(sessionId, userDid, oauthIdentity) {
|
|
171
|
+
// Cache in memory
|
|
107
172
|
this.sessionDidCache.set(sessionId, userDid);
|
|
108
|
-
// Store
|
|
173
|
+
// Store in session storage if available
|
|
109
174
|
if (this.config.storage) {
|
|
110
175
|
try {
|
|
111
176
|
await this.config.storage.set(sessionId, userDid, 1800); // 30 minutes TTL
|
|
112
177
|
}
|
|
113
178
|
catch (error) {
|
|
114
|
-
|
|
115
|
-
console.warn('[UserDidManager] Storage.set failed, continuing with cached DID:', error);
|
|
179
|
+
console.warn('[UserDidManager] Failed to store user DID in session storage:', error);
|
|
116
180
|
}
|
|
117
181
|
}
|
|
118
|
-
//
|
|
119
|
-
if (oauthIdentity
|
|
182
|
+
// Create OAuth mapping if provided
|
|
183
|
+
if (oauthIdentity?.provider && oauthIdentity?.subject && this.config.storage?.setByOAuth) {
|
|
120
184
|
try {
|
|
121
185
|
await this.config.storage.setByOAuth(oauthIdentity.provider, oauthIdentity.subject, userDid, 90 * 24 * 60 * 60 // 90 days TTL for persistent mapping
|
|
122
186
|
);
|
|
123
|
-
console.log('[UserDidManager] Created
|
|
187
|
+
console.log('[UserDidManager] Created OAuth → DID mapping:', {
|
|
124
188
|
provider: oauthIdentity.provider,
|
|
125
189
|
userDid: userDid.substring(0, 20) + '...',
|
|
126
190
|
});
|
|
127
191
|
}
|
|
128
192
|
catch (error) {
|
|
129
|
-
// Log but continue - mapping creation failed, but DID is still valid
|
|
130
193
|
console.warn('[UserDidManager] Failed to create OAuth mapping:', error);
|
|
131
194
|
}
|
|
132
195
|
}
|
|
133
|
-
return userDid;
|
|
134
196
|
}
|
|
135
197
|
/**
|
|
136
198
|
* Generate a new ephemeral user DID
|
|
@@ -139,6 +201,18 @@ class UserDidManager {
|
|
|
139
201
|
* did:web can be used if configured, but requires additional setup.
|
|
140
202
|
*/
|
|
141
203
|
async generateUserDid() {
|
|
204
|
+
const keyPairData = await this.generateUserDidWithKeyPair();
|
|
205
|
+
return keyPairData.did;
|
|
206
|
+
}
|
|
207
|
+
/**
|
|
208
|
+
* Generate a new ephemeral user DID with full key pair
|
|
209
|
+
*
|
|
210
|
+
* Returns the DID along with the key pair for VC signing.
|
|
211
|
+
* Uses did:key format by default.
|
|
212
|
+
*
|
|
213
|
+
* @returns UserKeyPair containing DID, public key, private key, and key ID
|
|
214
|
+
*/
|
|
215
|
+
async generateUserDidWithKeyPair() {
|
|
142
216
|
if (this.config.useDidWeb && this.config.didWebBaseUrl) {
|
|
143
217
|
// Generate did:web (requires web server setup)
|
|
144
218
|
// For now, fall back to did:key
|
|
@@ -150,7 +224,15 @@ class UserDidManager {
|
|
|
150
224
|
// Extract public key bytes (32 bytes for Ed25519)
|
|
151
225
|
const publicKeyBytes = this.base64ToBytes(keyPair.publicKey);
|
|
152
226
|
// Generate did:key from public key
|
|
153
|
-
|
|
227
|
+
const did = this.generateDidKeyFromPublicKey(publicKeyBytes);
|
|
228
|
+
// Key ID is the DID with #keys-1 fragment (standard for did:key)
|
|
229
|
+
const keyId = `${did}#keys-1`;
|
|
230
|
+
return {
|
|
231
|
+
did,
|
|
232
|
+
publicKey: keyPair.publicKey,
|
|
233
|
+
privateKey: keyPair.privateKey,
|
|
234
|
+
keyId,
|
|
235
|
+
};
|
|
154
236
|
}
|
|
155
237
|
/**
|
|
156
238
|
* Generate did:key from Ed25519 public key bytes
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"user-did-manager.js","sourceRoot":"","sources":["../../src/identity/user-did-manager.ts"],"names":[],"mappings":";AAAA
|
|
1
|
+
{"version":3,"file":"user-did-manager.js","sourceRoot":"","sources":["../../src/identity/user-did-manager.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;;GAcG;;;AAiJH;;;;;GAKG;AACH,MAAa,cAAc;IACjB,MAAM,CAAuB;IAC7B,eAAe,GAAG,IAAI,GAAG,EAAkB,CAAC;IAC5C,mBAAmB,GAAG,IAAI,GAAG,EAAuB,CAAC;IAE7D,YAAY,MAA4B;QACtC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;IACvB,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,oBAAoB,CACxB,SAAiB,EACjB,aAAoC;QAEpC,8BAA8B;QAC9B,IAAI,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,CAAC,EAAE,CAAC;YAC5C,OAAO,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,CAAE,CAAC;QAClD,CAAC;QAED,oDAAoD;QACpD,IACE,aAAa,EAAE,QAAQ;YACvB,aAAa,EAAE,OAAO;YACtB,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,iBAAiB,EACtC,CAAC;YACD,IAAI,CAAC;gBACH,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,iBAAiB,CACzD,aAAa,CAAC,QAAQ,EACtB,aAAa,CAAC,OAAO,CACtB,CAAC;gBACF,IAAI,OAAO,EAAE,CAAC;oBACZ,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;oBACjD,OAAO,OAAO,CAAC;gBACjB,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,gDAAgD,EAAE,KAAK,CAAC,CAAC;YACxE,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,UAAU,EAAE,CAAC;YACpC,IAAI,CAAC;gBACH,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;gBAChE,IAAI,OAAO,EAAE,CAAC;oBACZ,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;oBACjD,OAAO,OAAO,CAAC;gBACjB,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,kDAAkD,EAAE,KAAK,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACH,KAAK,CAAC,kBAAkB,CAAC,SAAiB,EAAE,aAAoC;QAC9E,oBAAoB;QACpB,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,CAAC,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,CAAE,CAAC;QAC9C,CAAC;QAED,gFAAgF;QAChF,IAAI,aAAa,IAAI,aAAa,CAAC,QAAQ,IAAI,aAAa,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,UAAU,EAAE,CAAC;YACxG,IAAI,CAAC;gBACH,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,UAAU,CAC5D,aAAa,CAAC,QAAQ,EACtB,aAAa,CAAC,OAAO,CACtB,CAAC;gBACF,IAAI,iBAAiB,EAAE,CAAC;oBACtB,OAAO,CAAC,GAAG,CAAC,gEAAgE,EAAE;wBAC5E,QAAQ,EAAE,aAAa,CAAC,QAAQ;wBAChC,OAAO,EAAE,iBAAiB,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,KAAK;qBACpD,CAAC,CAAC;oBACH,4BAA4B;oBAC5B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,iBAAiB,CAAC,CAAC;oBACvD,0DAA0D;oBAC1D,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;wBACxB,IAAI,CAAC;4BACH,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,SAAS,EAAE,iBAAiB,EAAE,IAAI,CAAC,CAAC,CAAC,iBAAiB;wBACtF,CAAC;wBAAC,OAAO,KAAK,EAAE,CAAC;4BACf,wDAAwD;4BACxD,OAAO,CAAC,IAAI,CAAC,qEAAqE,EAAE,KAAK,CAAC,CAAC;wBAC7F,CAAC;oBACH,CAAC;oBACD,OAAO,iBAAiB,CAAC;gBAC3B,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,oEAAoE;gBACpE,OAAO,CAAC,IAAI,CAAC,wEAAwE,EAAE,KAAK,CAAC,CAAC;YAChG,CAAC;QACH,CAAC;QAED,iDAAiD;QACjD,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YACxB,IAAI,CAAC;gBACH,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;gBAC3D,IAAI,SAAS,EAAE,CAAC;oBACd,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;oBAC/C,6EAA6E;oBAC7E,IAAI,aAAa,IAAI,aAAa,CAAC,QAAQ,IAAI,aAAa,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,UAAU,EAAE,CAAC;wBACvG,IAAI,CAAC;4BACH,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,UAAU,CAClC,aAAa,CAAC,QAAQ,EACtB,aAAa,CAAC,OAAO,EACrB,SAAS,EACT,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,qCAAqC;6BACxD,CAAC;4BACF,OAAO,CAAC,GAAG,CAAC,0EAA0E,EAAE;gCACtF,QAAQ,EAAE,aAAa,CAAC,QAAQ;gCAChC,OAAO,EAAE,SAAS,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,KAAK;6BAC5C,CAAC,CAAC;wBACL,CAAC;wBAAC,OAAO,KAAK,EAAE,CAAC;4BACf,qEAAqE;4BACrE,OAAO,CAAC,IAAI,CAAC,kDAAkD,EAAE,KAAK,CAAC,CAAC;wBAC1E,CAAC;oBACH,CAAC;oBACD,OAAO,SAAS,CAAC;gBACnB,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,+CAA+C;gBAC/C,OAAO,CAAC,IAAI,CAAC,sCAAsC,EAAE,KAAK,CAAC,CAAC;YAC9D,CAAC;QACH,CAAC;QAED,iEAAiE;QACjE,kEAAkE;QAClE,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,oBAAoB,CACxB,SAAiB,EACjB,OAAe,EACf,aAAoC;QAEpC,kBAAkB;QAClB,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;QAE7C,wCAAwC;QACxC,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YACxB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,SAAS,EAAE,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,iBAAiB;YAC5E,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,+DAA+D,EAAE,KAAK,CAAC,CAAC;YACvF,CAAC;QACH,CAAC;QAED,mCAAmC;QACnC,IAAI,aAAa,EAAE,QAAQ,IAAI,aAAa,EAAE,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,UAAU,EAAE,CAAC;YACzF,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,UAAU,CAClC,aAAa,CAAC,QAAQ,EACtB,aAAa,CAAC,OAAO,EACrB,OAAO,EACP,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,qCAAqC;iBACxD,CAAC;gBACF,OAAO,CAAC,GAAG,CAAC,+CAA+C,EAAE;oBAC3D,QAAQ,EAAE,aAAa,CAAC,QAAQ;oBAChC,OAAO,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,KAAK;iBAC1C,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,kDAAkD,EAAE,KAAK,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,eAAe;QAC3B,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,0BAA0B,EAAE,CAAC;QAC5D,OAAO,WAAW,CAAC,GAAG,CAAC;IACzB,CAAC;IAED;;;;;;;OAOG;IACK,KAAK,CAAC,0BAA0B;QACtC,IAAI,IAAI,CAAC,MAAM,CAAC,SAAS,IAAI,IAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC;YACvD,+CAA+C;YAC/C,gCAAgC;YAChC,+CAA+C;YAC/C,OAAO,CAAC,IAAI,CAAC,6DAA6D,CAAC,CAAC;QAC9E,CAAC;QAED,wCAAwC;QACxC,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,eAAe,EAAE,CAAC;QAE3D,kDAAkD;QAClD,MAAM,cAAc,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;QAE7D,mCAAmC;QACnC,MAAM,GAAG,GAAG,IAAI,CAAC,2BAA2B,CAAC,cAAc,CAAC,CAAC;QAE7D,iEAAiE;QACjE,MAAM,KAAK,GAAG,GAAG,GAAG,SAAS,CAAC;QAE9B,OAAO;YACL,GAAG;YACH,SAAS,EAAE,OAAO,CAAC,SAAS;YAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,KAAK;SACN,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACK,2BAA2B,CAAC,cAA0B;QAC5D,wCAAwC;QACxC,MAAM,gBAAgB,GAAG,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;QAEtD,8BAA8B;QAC9B,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,gBAAgB,CAAC,MAAM,GAAG,cAAc,CAAC,MAAM,CAAC,CAAC;QACtF,aAAa,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;QACpC,aAAa,CAAC,GAAG,CAAC,cAAc,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAE3D,gDAAgD;QAChD,sDAAsD;QACtD,MAAM,aAAa,GAAG,IAAI,CAAC,YAAY,CAAC,aAAa,CAAC,CAAC;QAEvD,0CAA0C;QAC1C,OAAO,YAAY,aAAa,EAAE,CAAC;IACrC,CAAC;IAED;;;OAGG;IACK,YAAY,CAAC,KAAiB;QACpC,MAAM,QAAQ,GAAG,4DAA4D,CAAC;QAC9E,IAAI,GAAG,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QAEpB,+BAA+B;QAC/B,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACtC,GAAG,GAAG,GAAG,GAAG,MAAM,CAAC,GAAG,CAAC,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;QAC7C,CAAC;QAED,oBAAoB;QACpB,IAAI,MAAM,GAAG,EAAE,CAAC;QAChB,OAAO,GAAG,GAAG,CAAC,EAAE,CAAC;YACf,MAAM,GAAG,QAAQ,CAAC,MAAM,CAAC,GAAG,GAAG,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC,GAAG,MAAM,CAAC;YACrD,GAAG,GAAG,GAAG,GAAG,MAAM,CAAC,EAAE,CAAC,CAAC;QACzB,CAAC;QAED,oBAAoB;QACpB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YACxD,MAAM,GAAG,GAAG,GAAG,MAAM,CAAC;QACxB,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,aAAa,CAAC,MAAc;QAClC,IAAI,OAAO,MAAM,KAAK,WAAW,EAAE,CAAC;YAClC,sBAAsB;YACtB,OAAO,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,8BAA8B;YAC9B,MAAM,YAAY,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;YAClC,MAAM,KAAK,GAAG,IAAI,UAAU,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;YAClD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,YAAY,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC7C,KAAK,CAAC,CAAC,CAAC,GAAG,YAAY,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;YACxC,CAAC;YACD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,UAAU,CAAC,SAAiB;QAChC,cAAc;QACd,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,CAAC,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,CAAE,CAAC;QAC9C,CAAC;QAED,gBAAgB;QAChB,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YACxB,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YAC3D,IAAI,SAAS,EAAE,CAAC;gBACd,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;gBAC/C,OAAO,SAAS,CAAC;YACnB,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,YAAY,CAAC,SAAiB;QAClC,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEvC,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YACxB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;YAC9C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,8CAA8C;gBAC9C,OAAO,CAAC,IAAI,CAAC,qDAAqD,EAAE,KAAK,CAAC,CAAC;YAC7E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACH,UAAU;QACR,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;IAC/B,CAAC;CACF;AAvWD,wCAuWC"}
|
package/dist/index.d.ts
CHANGED
|
@@ -51,16 +51,19 @@ export { DelegationGraphManager, createDelegationGraph, type DelegationNode, typ
|
|
|
51
51
|
export { CascadingRevocationManager, createCascadingRevocationManager, type RevocationEvent, type RevocationHook, type CascadingRevocationOptions, } from "./delegation/cascading-revocation";
|
|
52
52
|
export { MemoryStatusListStorage } from "./delegation/storage/memory-statuslist-storage";
|
|
53
53
|
export { MemoryDelegationGraphStorage } from "./delegation/storage/memory-graph-storage";
|
|
54
|
+
export { createDidKeyResolver, isEd25519DidKey, extractPublicKeyFromDidKey, publicKeyToJwk, resolveDidKeySync, } from "./delegation/did-key-resolver";
|
|
55
|
+
export { base58Encode, base58Decode, isValidBase58, } from "./utils/base58";
|
|
54
56
|
export { SchemaVerifier, createSchemaVerifier, type SchemaMetadata, type FieldComplianceResult, type SchemaComplianceReport, type FullComplianceReport, } from "./compliance/schema-verifier";
|
|
55
57
|
export { SCHEMA_REGISTRY, getAllSchemas, getSchemasByCategory, getSchemaById, getCriticalSchemas, getSchemaStats, } from "./compliance/schema-registry";
|
|
56
|
-
export { canonicalizeJSON } from "./delegation/utils";
|
|
58
|
+
export { canonicalizeJSON, createUnsignedVCJWT, completeVCJWT, parseVCJWT, type VCJWTHeader, type VCJWTPayload, type EncodeVCAsJWTOptions, } from "./delegation/utils";
|
|
59
|
+
export { base64urlEncodeFromBytes, base64urlEncodeFromString, base64urlDecodeToBytes, base64urlDecodeToString, bytesToBase64, } from "./utils/base64";
|
|
57
60
|
import type { HandshakeRequest, SessionContext, NonceCache, NonceCacheEntry, NonceCacheConfig, ProofMeta, DetachedProof, CanonicalHashes, AuditRecord } from "@kya-os/contracts";
|
|
58
61
|
export type { HandshakeRequest, SessionContext, NonceCache, NonceCacheEntry, NonceCacheConfig, ProofMeta, DetachedProof, CanonicalHashes, AuditRecord, };
|
|
59
62
|
export * from "./config";
|
|
60
63
|
export { fetchRemoteConfig, type RemoteConfigCache, type RemoteConfigOptions, } from "./config/remote-config";
|
|
61
64
|
export { UserDidManager } from "./identity/user-did-manager";
|
|
62
|
-
export type { UserDidStorage, UserDidManagerConfig, } from "./identity/user-did-manager";
|
|
65
|
+
export type { UserDidStorage, UserDidManagerConfig, UserKeyPair, OAuthIdentity, } from "./identity/user-did-manager";
|
|
63
66
|
export { IdpTokenResolver } from "./identity/idp-token-resolver";
|
|
64
67
|
export type { IdpTokenResolverConfig } from "./identity/idp-token-resolver";
|
|
65
|
-
export type { IIdpTokenStorage } from "./identity/idp-token-storage.interface";
|
|
68
|
+
export type { IIdpTokenStorage, TokenUsageMetadata, IdpTokensWithMetadata, } from "./identity/idp-token-storage.interface";
|
|
66
69
|
//# sourceMappingURL=index.d.ts.map
|
package/dist/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAGH,OAAO,EACL,cAAc,EACd,aAAa,EACb,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,gBAAgB,EAChB,KAAK,aAAa,GACnB,MAAM,kBAAkB,CAAC;AAG1B,OAAO,EACL,qBAAqB,EACrB,wBAAwB,EACxB,sBAAsB,GACvB,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAC;AACjD,YAAY,EAAE,wBAAwB,EAAE,MAAM,gBAAgB,CAAC;AAG/D,YAAY,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AAG3D,cAAc,SAAS,CAAC;AAExB,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAG3E,OAAO,EAAE,aAAa,EAAE,MAAM,2BAA2B,CAAC;AAE1D,YAAY,EAAE,UAAU,EAAE,SAAS,EAAE,MAAM,2BAA2B,CAAC;AAGvE,OAAO,EAAE,aAAa,EAAE,MAAM,2BAA2B,CAAC;AAE1D,YAAY,EACV,uBAAuB,EACvB,mBAAmB,GACpB,MAAM,2BAA2B,CAAC;AAGnC,OAAO,EAAE,uBAAuB,EAAE,MAAM,mCAAmC,CAAC;AAE5E,YAAY,EACV,6BAA6B,EAC7B,8BAA8B,GAC/B,MAAM,mCAAmC,CAAC;AAG3C,OAAO,EACL,0BAA0B,EAC1B,gCAAgC,GACjC,MAAM,yCAAyC,CAAC;AAEjD,YAAY,EACV,gCAAgC,EAChC,yBAAyB,GAC1B,MAAM,yCAAyC,CAAC;AAGjD,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AAErE,YAAY,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAGhF,OAAO,EAAE,YAAY,EAAE,MAAM,0BAA0B,CAAC;AAExD,YAAY,EAAE,kBAAkB,EAAE,MAAM,0BAA0B,CAAC;AAGnE,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AAErE,YAAY,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAGhF,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAG3E,OAAO,EAAE,gBAAgB,EAAE,MAAM,8BAA8B,CAAC;AAGhE,OAAO,EAAE,iBAAiB,EAAE,uBAAuB,EAAE,MAAM,+BAA+B,CAAC;AAG3F,OAAO,EAAE,0BAA0B,EAAE,MAAM,0CAA0C,CAAC;AACtF,YAAY,EAAE,gCAAgC,EAAE,MAAM,0CAA0C,CAAC;AAGjG,OAAO,EAAE,sBAAsB,EAAE,MAAM,qCAAqC,CAAC;AAC7E,YAAY,EAAE,SAAS,EAAE,MAAM,qCAAqC,CAAC;AAGrE,OAAO,EACL,wBAAwB,EACxB,oBAAoB,GACrB,MAAM,4BAA4B,CAAC;AAEpC,YAAY,EAAE,gBAAgB,EAAE,MAAM,4BAA4B,CAAC;AAGnE,OAAO,EACL,sBAAsB,EACtB,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,4BAA4B,CAAC;AAEpC,YAAY,EACV,oBAAoB,EACpB,gBAAgB,GACjB,MAAM,4BAA4B,CAAC;AAGpC,OAAO,EACL,sBAAsB,EACtB,8BAA8B,EAC9B,4BAA4B,GAC7B,MAAM,mBAAmB,CAAC;AAE3B,YAAY,EAAE,0BAA0B,EAAE,MAAM,mBAAmB,CAAC;AAEpE,OAAO,EACL,mBAAmB,EACnB,2BAA2B,EAC3B,uBAAuB,GACxB,MAAM,+BAA+B,CAAC;AAEvC,YAAY,EACV,cAAc,EACd,oBAAoB,EACpB,2BAA2B,GAC5B,MAAM,yBAAyB,CAAC;AAEjC,OAAO,EAAE,uBAAuB,EAAE,MAAM,yBAAyB,CAAC;AAClE,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,YAAY,EAAE,yBAAyB,EAAE,MAAM,8BAA8B,CAAC;AAG9E,OAAO,EACL,0BAA0B,EAC1B,sBAAsB,EACtB,KAAK,sBAAsB,EAC3B,KAAK,iBAAiB,EACtB,KAAK,gBAAgB,IAAI,0BAA0B,GACpD,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,EACxB,KAAK,8BAA8B,EACnC,KAAK,yBAAyB,EAC9B,KAAK,WAAW,EAChB,KAAK,WAAW,EAChB,KAAK,kBAAkB,EACvB,KAAK,kBAAkB,EACvB,KAAK,6BAA6B,GACnC,MAAM,0BAA0B,CAAC;AAGlC,OAAO,EACL,qBAAqB,EACrB,uBAAuB,EACvB,KAAK,yBAAyB,EAC9B,KAAK,0BAA0B,GAChC,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EACL,gBAAgB,EAChB,UAAU,EACV,KAAK,mBAAmB,EACxB,KAAK,qBAAqB,GAC3B,MAAM,wBAAwB,CAAC;AAGhC,OAAO,EACL,sBAAsB,EACtB,qBAAqB,EACrB,KAAK,cAAc,EACnB,KAAK,8BAA8B,GACpC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EACL,0BAA0B,EAC1B,gCAAgC,EAChC,KAAK,eAAe,EACpB,KAAK,cAAc,EACnB,KAAK,0BAA0B,GAChC,MAAM,mCAAmC,CAAC;AAG3C,OAAO,EAAE,uBAAuB,EAAE,MAAM,gDAAgD,CAAC;AAEzF,OAAO,EAAE,4BAA4B,EAAE,MAAM,2CAA2C,CAAC;AAGzF,OAAO,EACL,cAAc,EACd,oBAAoB,EACpB,KAAK,cAAc,EACnB,KAAK,qBAAqB,EAC1B,KAAK,sBAAsB,EAC3B,KAAK,oBAAoB,GAC1B,MAAM,8BAA8B,CAAC;AAEtC,OAAO,EACL,eAAe,EACf,aAAa,EACb,oBAAoB,EACpB,aAAa,EACb,kBAAkB,EAClB,cAAc,GACf,MAAM,8BAA8B,CAAC;AAEtC,OAAO,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAGH,OAAO,EACL,cAAc,EACd,aAAa,EACb,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,gBAAgB,EAChB,KAAK,aAAa,GACnB,MAAM,kBAAkB,CAAC;AAG1B,OAAO,EACL,qBAAqB,EACrB,wBAAwB,EACxB,sBAAsB,GACvB,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAC;AACjD,YAAY,EAAE,wBAAwB,EAAE,MAAM,gBAAgB,CAAC;AAG/D,YAAY,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AAG3D,cAAc,SAAS,CAAC;AAExB,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAG3E,OAAO,EAAE,aAAa,EAAE,MAAM,2BAA2B,CAAC;AAE1D,YAAY,EAAE,UAAU,EAAE,SAAS,EAAE,MAAM,2BAA2B,CAAC;AAGvE,OAAO,EAAE,aAAa,EAAE,MAAM,2BAA2B,CAAC;AAE1D,YAAY,EACV,uBAAuB,EACvB,mBAAmB,GACpB,MAAM,2BAA2B,CAAC;AAGnC,OAAO,EAAE,uBAAuB,EAAE,MAAM,mCAAmC,CAAC;AAE5E,YAAY,EACV,6BAA6B,EAC7B,8BAA8B,GAC/B,MAAM,mCAAmC,CAAC;AAG3C,OAAO,EACL,0BAA0B,EAC1B,gCAAgC,GACjC,MAAM,yCAAyC,CAAC;AAEjD,YAAY,EACV,gCAAgC,EAChC,yBAAyB,GAC1B,MAAM,yCAAyC,CAAC;AAGjD,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AAErE,YAAY,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAGhF,OAAO,EAAE,YAAY,EAAE,MAAM,0BAA0B,CAAC;AAExD,YAAY,EAAE,kBAAkB,EAAE,MAAM,0BAA0B,CAAC;AAGnE,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AAErE,YAAY,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAGhF,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAG3E,OAAO,EAAE,gBAAgB,EAAE,MAAM,8BAA8B,CAAC;AAGhE,OAAO,EAAE,iBAAiB,EAAE,uBAAuB,EAAE,MAAM,+BAA+B,CAAC;AAG3F,OAAO,EAAE,0BAA0B,EAAE,MAAM,0CAA0C,CAAC;AACtF,YAAY,EAAE,gCAAgC,EAAE,MAAM,0CAA0C,CAAC;AAGjG,OAAO,EAAE,sBAAsB,EAAE,MAAM,qCAAqC,CAAC;AAC7E,YAAY,EAAE,SAAS,EAAE,MAAM,qCAAqC,CAAC;AAGrE,OAAO,EACL,wBAAwB,EACxB,oBAAoB,GACrB,MAAM,4BAA4B,CAAC;AAEpC,YAAY,EAAE,gBAAgB,EAAE,MAAM,4BAA4B,CAAC;AAGnE,OAAO,EACL,sBAAsB,EACtB,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,4BAA4B,CAAC;AAEpC,YAAY,EACV,oBAAoB,EACpB,gBAAgB,GACjB,MAAM,4BAA4B,CAAC;AAGpC,OAAO,EACL,sBAAsB,EACtB,8BAA8B,EAC9B,4BAA4B,GAC7B,MAAM,mBAAmB,CAAC;AAE3B,YAAY,EAAE,0BAA0B,EAAE,MAAM,mBAAmB,CAAC;AAEpE,OAAO,EACL,mBAAmB,EACnB,2BAA2B,EAC3B,uBAAuB,GACxB,MAAM,+BAA+B,CAAC;AAEvC,YAAY,EACV,cAAc,EACd,oBAAoB,EACpB,2BAA2B,GAC5B,MAAM,yBAAyB,CAAC;AAEjC,OAAO,EAAE,uBAAuB,EAAE,MAAM,yBAAyB,CAAC;AAClE,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,YAAY,EAAE,yBAAyB,EAAE,MAAM,8BAA8B,CAAC;AAG9E,OAAO,EACL,0BAA0B,EAC1B,sBAAsB,EACtB,KAAK,sBAAsB,EAC3B,KAAK,iBAAiB,EACtB,KAAK,gBAAgB,IAAI,0BAA0B,GACpD,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,EACxB,KAAK,8BAA8B,EACnC,KAAK,yBAAyB,EAC9B,KAAK,WAAW,EAChB,KAAK,WAAW,EAChB,KAAK,kBAAkB,EACvB,KAAK,kBAAkB,EACvB,KAAK,6BAA6B,GACnC,MAAM,0BAA0B,CAAC;AAGlC,OAAO,EACL,qBAAqB,EACrB,uBAAuB,EACvB,KAAK,yBAAyB,EAC9B,KAAK,0BAA0B,GAChC,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EACL,gBAAgB,EAChB,UAAU,EACV,KAAK,mBAAmB,EACxB,KAAK,qBAAqB,GAC3B,MAAM,wBAAwB,CAAC;AAGhC,OAAO,EACL,sBAAsB,EACtB,qBAAqB,EACrB,KAAK,cAAc,EACnB,KAAK,8BAA8B,GACpC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EACL,0BAA0B,EAC1B,gCAAgC,EAChC,KAAK,eAAe,EACpB,KAAK,cAAc,EACnB,KAAK,0BAA0B,GAChC,MAAM,mCAAmC,CAAC;AAG3C,OAAO,EAAE,uBAAuB,EAAE,MAAM,gDAAgD,CAAC;AAEzF,OAAO,EAAE,4BAA4B,EAAE,MAAM,2CAA2C,CAAC;AAGzF,OAAO,EACL,oBAAoB,EACpB,eAAe,EACf,0BAA0B,EAC1B,cAAc,EACd,iBAAiB,GAClB,MAAM,+BAA+B,CAAC;AAGvC,OAAO,EACL,YAAY,EACZ,YAAY,EACZ,aAAa,GACd,MAAM,gBAAgB,CAAC;AAGxB,OAAO,EACL,cAAc,EACd,oBAAoB,EACpB,KAAK,cAAc,EACnB,KAAK,qBAAqB,EAC1B,KAAK,sBAAsB,EAC3B,KAAK,oBAAoB,GAC1B,MAAM,8BAA8B,CAAC;AAEtC,OAAO,EACL,eAAe,EACf,aAAa,EACb,oBAAoB,EACpB,aAAa,EACb,kBAAkB,EAClB,cAAc,GACf,MAAM,8BAA8B,CAAC;AAEtC,OAAO,EACL,gBAAgB,EAChB,mBAAmB,EACnB,aAAa,EACb,UAAU,EACV,KAAK,WAAW,EAChB,KAAK,YAAY,EACjB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EACL,wBAAwB,EACxB,yBAAyB,EACzB,sBAAsB,EACtB,uBAAuB,EACvB,aAAa,GACd,MAAM,gBAAgB,CAAC;AAIxB,OAAO,KAAK,EACV,gBAAgB,EAChB,cAAc,EACd,UAAU,EACV,eAAe,EACf,gBAAgB,EAChB,SAAS,EACT,aAAa,EACb,eAAe,EACf,WAAW,EACZ,MAAM,mBAAmB,CAAC;AAE3B,YAAY,EACV,gBAAgB,EAChB,cAAc,EACd,UAAU,EACV,eAAe,EACf,gBAAgB,EAChB,SAAS,EACT,aAAa,EACb,eAAe,EACf,WAAW,GACZ,CAAC;AAGF,cAAc,UAAU,CAAC;AAGzB,OAAO,EACL,iBAAiB,EACjB,KAAK,iBAAiB,EACtB,KAAK,mBAAmB,GACzB,MAAM,wBAAwB,CAAC;AAGhC,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,YAAY,EACV,cAAc,EACd,oBAAoB,EACpB,WAAW,EACX,aAAa,GACd,MAAM,6BAA6B,CAAC;AAGrC,OAAO,EAAE,gBAAgB,EAAE,MAAM,+BAA+B,CAAC;AACjE,YAAY,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAC5E,YAAY,EACV,gBAAgB,EAChB,kBAAkB,EAClB,qBAAqB,GACtB,MAAM,wCAAwC,CAAC"}
|
package/dist/index.js
CHANGED
|
@@ -21,7 +21,7 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
21
21
|
};
|
|
22
22
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
23
23
|
exports.MemoryStatusListStorage = exports.createCascadingRevocationManager = exports.CascadingRevocationManager = exports.createDelegationGraph = exports.DelegationGraphManager = exports.isIndexSet = exports.BitstringManager = exports.createStatusListManager = exports.StatusList2021Manager = exports.createDelegationVerifier = exports.DelegationCredentialVerifier = exports.createDelegationIssuer = exports.DelegationCredentialIssuer = exports.OAuthRequiredError = exports.DelegationRequiredError = exports.NoOpToolProtectionCache = exports.InMemoryToolProtectionCache = exports.createProofVerificationError = exports.PROOF_VERIFICATION_ERROR_CODES = exports.ProofVerificationError = exports.migrateLegacyKeys = exports.StorageKeyHelpers = exports.createStorageProviders = exports.NoOpOAuthConfigCache = exports.InMemoryOAuthConfigCache = exports.BatchDelegationService = exports.OAuthTokenRetrievalService = exports.ProviderValidationError = exports.ProviderValidator = exports.ProviderResolver = exports.OAuthProviderRegistry = exports.ToolContextBuilder = exports.OAuthService = exports.OAuthConfigService = exports.createSessionRegistrationService = exports.SessionRegistrationService = exports.AccessControlApiService = exports.ProofVerifier = exports.CryptoService = exports.ToolProtectionService = exports.MCPIRuntimeBase = exports.MemoryIdentityProvider = exports.MemoryNonceCacheProvider = exports.MemoryStorageProvider = exports.IdentityProvider = exports.NonceCacheProvider = exports.StorageProvider = exports.FetchProvider = exports.ClockProvider = exports.CryptoProvider = void 0;
|
|
24
|
-
exports.IdpTokenResolver = exports.UserDidManager = exports.fetchRemoteConfig = exports.canonicalizeJSON = exports.getSchemaStats = exports.getCriticalSchemas = exports.getSchemaById = exports.getSchemasByCategory = exports.getAllSchemas = exports.SCHEMA_REGISTRY = exports.createSchemaVerifier = exports.SchemaVerifier = exports.MemoryDelegationGraphStorage = void 0;
|
|
24
|
+
exports.IdpTokenResolver = exports.UserDidManager = exports.fetchRemoteConfig = exports.bytesToBase64 = exports.base64urlDecodeToString = exports.base64urlDecodeToBytes = exports.base64urlEncodeFromString = exports.base64urlEncodeFromBytes = exports.parseVCJWT = exports.completeVCJWT = exports.createUnsignedVCJWT = exports.canonicalizeJSON = exports.getSchemaStats = exports.getCriticalSchemas = exports.getSchemaById = exports.getSchemasByCategory = exports.getAllSchemas = exports.SCHEMA_REGISTRY = exports.createSchemaVerifier = exports.SchemaVerifier = exports.isValidBase58 = exports.base58Decode = exports.base58Encode = exports.resolveDidKeySync = exports.publicKeyToJwk = exports.extractPublicKeyFromDidKey = exports.isEd25519DidKey = exports.createDidKeyResolver = exports.MemoryDelegationGraphStorage = void 0;
|
|
25
25
|
// Base providers
|
|
26
26
|
var base_1 = require("./providers/base");
|
|
27
27
|
Object.defineProperty(exports, "CryptoProvider", { enumerable: true, get: function () { return base_1.CryptoProvider; } });
|
|
@@ -128,6 +128,18 @@ var memory_statuslist_storage_1 = require("./delegation/storage/memory-statuslis
|
|
|
128
128
|
Object.defineProperty(exports, "MemoryStatusListStorage", { enumerable: true, get: function () { return memory_statuslist_storage_1.MemoryStatusListStorage; } });
|
|
129
129
|
var memory_graph_storage_1 = require("./delegation/storage/memory-graph-storage");
|
|
130
130
|
Object.defineProperty(exports, "MemoryDelegationGraphStorage", { enumerable: true, get: function () { return memory_graph_storage_1.MemoryDelegationGraphStorage; } });
|
|
131
|
+
// DID:key Resolver (Phase 3 VC Verification)
|
|
132
|
+
var did_key_resolver_1 = require("./delegation/did-key-resolver");
|
|
133
|
+
Object.defineProperty(exports, "createDidKeyResolver", { enumerable: true, get: function () { return did_key_resolver_1.createDidKeyResolver; } });
|
|
134
|
+
Object.defineProperty(exports, "isEd25519DidKey", { enumerable: true, get: function () { return did_key_resolver_1.isEd25519DidKey; } });
|
|
135
|
+
Object.defineProperty(exports, "extractPublicKeyFromDidKey", { enumerable: true, get: function () { return did_key_resolver_1.extractPublicKeyFromDidKey; } });
|
|
136
|
+
Object.defineProperty(exports, "publicKeyToJwk", { enumerable: true, get: function () { return did_key_resolver_1.publicKeyToJwk; } });
|
|
137
|
+
Object.defineProperty(exports, "resolveDidKeySync", { enumerable: true, get: function () { return did_key_resolver_1.resolveDidKeySync; } });
|
|
138
|
+
// Base58 Utilities (for did:key encoding/decoding)
|
|
139
|
+
var base58_1 = require("./utils/base58");
|
|
140
|
+
Object.defineProperty(exports, "base58Encode", { enumerable: true, get: function () { return base58_1.base58Encode; } });
|
|
141
|
+
Object.defineProperty(exports, "base58Decode", { enumerable: true, get: function () { return base58_1.base58Decode; } });
|
|
142
|
+
Object.defineProperty(exports, "isValidBase58", { enumerable: true, get: function () { return base58_1.isValidBase58; } });
|
|
131
143
|
// Compliance Verification (with JSON Schema draft-07 support)
|
|
132
144
|
var schema_verifier_1 = require("./compliance/schema-verifier");
|
|
133
145
|
Object.defineProperty(exports, "SchemaVerifier", { enumerable: true, get: function () { return schema_verifier_1.SchemaVerifier; } });
|
|
@@ -141,6 +153,16 @@ Object.defineProperty(exports, "getCriticalSchemas", { enumerable: true, get: fu
|
|
|
141
153
|
Object.defineProperty(exports, "getSchemaStats", { enumerable: true, get: function () { return schema_registry_1.getSchemaStats; } });
|
|
142
154
|
var utils_1 = require("./delegation/utils");
|
|
143
155
|
Object.defineProperty(exports, "canonicalizeJSON", { enumerable: true, get: function () { return utils_1.canonicalizeJSON; } });
|
|
156
|
+
Object.defineProperty(exports, "createUnsignedVCJWT", { enumerable: true, get: function () { return utils_1.createUnsignedVCJWT; } });
|
|
157
|
+
Object.defineProperty(exports, "completeVCJWT", { enumerable: true, get: function () { return utils_1.completeVCJWT; } });
|
|
158
|
+
Object.defineProperty(exports, "parseVCJWT", { enumerable: true, get: function () { return utils_1.parseVCJWT; } });
|
|
159
|
+
// Base64 utilities for VC JWT encoding
|
|
160
|
+
var base64_1 = require("./utils/base64");
|
|
161
|
+
Object.defineProperty(exports, "base64urlEncodeFromBytes", { enumerable: true, get: function () { return base64_1.base64urlEncodeFromBytes; } });
|
|
162
|
+
Object.defineProperty(exports, "base64urlEncodeFromString", { enumerable: true, get: function () { return base64_1.base64urlEncodeFromString; } });
|
|
163
|
+
Object.defineProperty(exports, "base64urlDecodeToBytes", { enumerable: true, get: function () { return base64_1.base64urlDecodeToBytes; } });
|
|
164
|
+
Object.defineProperty(exports, "base64urlDecodeToString", { enumerable: true, get: function () { return base64_1.base64urlDecodeToString; } });
|
|
165
|
+
Object.defineProperty(exports, "bytesToBase64", { enumerable: true, get: function () { return base64_1.bytesToBase64; } });
|
|
144
166
|
// Configuration types and utilities
|
|
145
167
|
__exportStar(require("./config"), exports);
|
|
146
168
|
// Remote configuration fetching
|
|
@@ -149,7 +171,7 @@ Object.defineProperty(exports, "fetchRemoteConfig", { enumerable: true, get: fun
|
|
|
149
171
|
// User DID Manager (Phase 4)
|
|
150
172
|
var user_did_manager_1 = require("./identity/user-did-manager");
|
|
151
173
|
Object.defineProperty(exports, "UserDidManager", { enumerable: true, get: function () { return user_did_manager_1.UserDidManager; } });
|
|
152
|
-
// IDP Token Resolver (Phase 1 - MH-7)
|
|
174
|
+
// IDP Token Resolver (Phase 1 - MH-7, updated for CRED-003)
|
|
153
175
|
var idp_token_resolver_1 = require("./identity/idp-token-resolver");
|
|
154
176
|
Object.defineProperty(exports, "IdpTokenResolver", { enumerable: true, get: function () { return idp_token_resolver_1.IdpTokenResolver; } });
|
|
155
177
|
//# sourceMappingURL=index.js.map
|
package/dist/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";AAAA;;;;;GAKG;;;;;;;;;;;;;;;;;;AAEH,iBAAiB;AACjB,yCAQ0B;AAPxB,sGAAA,cAAc,OAAA;AACd,qGAAA,aAAa,OAAA;AACb,qGAAA,aAAa,OAAA;AACb,uGAAA,eAAe,OAAA;AACf,0GAAA,kBAAkB,OAAA;AAClB,wGAAA,gBAAgB,OAAA;AAIlB,mBAAmB;AACnB,6CAI4B;AAH1B,+GAAA,qBAAqB,OAAA;AACrB,kHAAA,wBAAwB,OAAA;AACxB,gHAAA,sBAAsB,OAAA;AAGxB,UAAU;AACV,uCAAiD;AAAxC,uGAAA,eAAe,OAAA;AAMxB,YAAY;AACZ,0CAAwB;AACxB,kBAAkB;AAClB,8EAA2E;AAAlE,gIAAA,qBAAqB,OAAA;AAE9B,iBAAiB;AACjB,4DAA0D;AAAjD,+GAAA,aAAa,OAAA;AAItB,yBAAyB;AACzB,4DAA0D;AAAjD,+GAAA,aAAa,OAAA;AAOtB,gDAAgD;AAChD,4EAA4E;AAAnE,iIAAA,uBAAuB,OAAA;AAOhC,+BAA+B;AAC/B,wFAGiD;AAF/C,0IAAA,0BAA0B,OAAA;AAC1B,gJAAA,gCAAgC,OAAA;AAQlC,iCAAiC;AACjC,wEAAqE;AAA5D,0HAAA,kBAAkB,OAAA;AAI3B,0BAA0B;AAC1B,0DAAwD;AAA/C,6GAAA,YAAY,OAAA;AAIrB,iCAAiC;AACjC,wEAAqE;AAA5D,0HAAA,kBAAkB,OAAA;AAI3B,oCAAoC;AACpC,8EAA2E;AAAlE,gIAAA,qBAAqB,OAAA;AAE9B,8BAA8B;AAC9B,kEAAgE;AAAvD,qHAAA,gBAAgB,OAAA;AAEzB,+BAA+B;AAC/B,oEAA2F;AAAlF,uHAAA,iBAAiB,OAAA;AAAE,6HAAA,uBAAuB,OAAA;AAEnD,0CAA0C;AAC1C,0FAAsF;AAA7E,2IAAA,0BAA0B,OAAA;AAGnC,qCAAqC;AACrC,gFAA6E;AAApE,kIAAA,sBAAsB,OAAA;AAG/B,qBAAqB;AACrB,iEAGoC;AAFlC,8HAAA,wBAAwB,OAAA;AACxB,0HAAA,oBAAoB,OAAA;AAKtB,0BAA0B;AAC1B,8DAIoC;AAHlC,yHAAA,sBAAsB,OAAA;AACtB,oHAAA,iBAAiB,OAAA;AACjB,oHAAA,iBAAiB,OAAA;AAQnB,4BAA4B;AAC5B,4CAI2B;AAHzB,gHAAA,sBAAsB,OAAA;AACtB,wHAAA,8BAA8B,OAAA;AAC9B,sHAAA,4BAA4B,OAAA;AAK9B,uEAIuC;AAFrC,oIAAA,2BAA2B,OAAA;AAC3B,gIAAA,uBAAuB,OAAA;AASzB,2DAAkE;AAAzD,0HAAA,uBAAuB,OAAA;AAChC,qEAAkE;AAAzD,0HAAA,kBAAkB,OAAA;AAG3B,4BAA4B;AAC5B,oDAMgC;AAL9B,uHAAA,0BAA0B,OAAA;AAC1B,mHAAA,sBAAsB,OAAA;AAMxB,wDAUkC;AAThC,2HAAA,4BAA4B,OAAA;AAC5B,uHAAA,wBAAwB,OAAA;AAU1B,iBAAiB;AACjB,sEAKyC;AAJvC,2HAAA,qBAAqB,OAAA;AACrB,6HAAA,uBAAuB,OAAA;AAKzB,oDAKgC;AAJ9B,6GAAA,gBAAgB,OAAA;AAChB,uGAAA,UAAU,OAAA;AAKZ,0CAA0C;AAC1C,kEAKuC;AAJrC,0HAAA,sBAAsB,OAAA;AACtB,yHAAA,qBAAqB,OAAA;AAKvB,0EAM2C;AALzC,kIAAA,0BAA0B,OAAA;AAC1B,wIAAA,gCAAgC,OAAA;AAMlC,qDAAqD;AACrD,4FAAyF;AAAhF,oIAAA,uBAAuB,OAAA;AAEhC,kFAAyF;AAAhF,oIAAA,4BAA4B,OAAA;AAErC,8DAA8D;AAC9D,gEAOsC;AANpC,iHAAA,cAAc,OAAA;AACd,uHAAA,oBAAoB,OAAA;AAOtB,gEAOsC;AANpC,kHAAA,eAAe,OAAA;AACf,gHAAA,aAAa,OAAA;AACb,uHAAA,oBAAoB,OAAA;AACpB,gHAAA,aAAa,OAAA;AACb,qHAAA,kBAAkB,OAAA;AAClB,iHAAA,cAAc,OAAA;AAGhB,
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";AAAA;;;;;GAKG;;;;;;;;;;;;;;;;;;AAEH,iBAAiB;AACjB,yCAQ0B;AAPxB,sGAAA,cAAc,OAAA;AACd,qGAAA,aAAa,OAAA;AACb,qGAAA,aAAa,OAAA;AACb,uGAAA,eAAe,OAAA;AACf,0GAAA,kBAAkB,OAAA;AAClB,wGAAA,gBAAgB,OAAA;AAIlB,mBAAmB;AACnB,6CAI4B;AAH1B,+GAAA,qBAAqB,OAAA;AACrB,kHAAA,wBAAwB,OAAA;AACxB,gHAAA,sBAAsB,OAAA;AAGxB,UAAU;AACV,uCAAiD;AAAxC,uGAAA,eAAe,OAAA;AAMxB,YAAY;AACZ,0CAAwB;AACxB,kBAAkB;AAClB,8EAA2E;AAAlE,gIAAA,qBAAqB,OAAA;AAE9B,iBAAiB;AACjB,4DAA0D;AAAjD,+GAAA,aAAa,OAAA;AAItB,yBAAyB;AACzB,4DAA0D;AAAjD,+GAAA,aAAa,OAAA;AAOtB,gDAAgD;AAChD,4EAA4E;AAAnE,iIAAA,uBAAuB,OAAA;AAOhC,+BAA+B;AAC/B,wFAGiD;AAF/C,0IAAA,0BAA0B,OAAA;AAC1B,gJAAA,gCAAgC,OAAA;AAQlC,iCAAiC;AACjC,wEAAqE;AAA5D,0HAAA,kBAAkB,OAAA;AAI3B,0BAA0B;AAC1B,0DAAwD;AAA/C,6GAAA,YAAY,OAAA;AAIrB,iCAAiC;AACjC,wEAAqE;AAA5D,0HAAA,kBAAkB,OAAA;AAI3B,oCAAoC;AACpC,8EAA2E;AAAlE,gIAAA,qBAAqB,OAAA;AAE9B,8BAA8B;AAC9B,kEAAgE;AAAvD,qHAAA,gBAAgB,OAAA;AAEzB,+BAA+B;AAC/B,oEAA2F;AAAlF,uHAAA,iBAAiB,OAAA;AAAE,6HAAA,uBAAuB,OAAA;AAEnD,0CAA0C;AAC1C,0FAAsF;AAA7E,2IAAA,0BAA0B,OAAA;AAGnC,qCAAqC;AACrC,gFAA6E;AAApE,kIAAA,sBAAsB,OAAA;AAG/B,qBAAqB;AACrB,iEAGoC;AAFlC,8HAAA,wBAAwB,OAAA;AACxB,0HAAA,oBAAoB,OAAA;AAKtB,0BAA0B;AAC1B,8DAIoC;AAHlC,yHAAA,sBAAsB,OAAA;AACtB,oHAAA,iBAAiB,OAAA;AACjB,oHAAA,iBAAiB,OAAA;AAQnB,4BAA4B;AAC5B,4CAI2B;AAHzB,gHAAA,sBAAsB,OAAA;AACtB,wHAAA,8BAA8B,OAAA;AAC9B,sHAAA,4BAA4B,OAAA;AAK9B,uEAIuC;AAFrC,oIAAA,2BAA2B,OAAA;AAC3B,gIAAA,uBAAuB,OAAA;AASzB,2DAAkE;AAAzD,0HAAA,uBAAuB,OAAA;AAChC,qEAAkE;AAAzD,0HAAA,kBAAkB,OAAA;AAG3B,4BAA4B;AAC5B,oDAMgC;AAL9B,uHAAA,0BAA0B,OAAA;AAC1B,mHAAA,sBAAsB,OAAA;AAMxB,wDAUkC;AAThC,2HAAA,4BAA4B,OAAA;AAC5B,uHAAA,wBAAwB,OAAA;AAU1B,iBAAiB;AACjB,sEAKyC;AAJvC,2HAAA,qBAAqB,OAAA;AACrB,6HAAA,uBAAuB,OAAA;AAKzB,oDAKgC;AAJ9B,6GAAA,gBAAgB,OAAA;AAChB,uGAAA,UAAU,OAAA;AAKZ,0CAA0C;AAC1C,kEAKuC;AAJrC,0HAAA,sBAAsB,OAAA;AACtB,yHAAA,qBAAqB,OAAA;AAKvB,0EAM2C;AALzC,kIAAA,0BAA0B,OAAA;AAC1B,wIAAA,gCAAgC,OAAA;AAMlC,qDAAqD;AACrD,4FAAyF;AAAhF,oIAAA,uBAAuB,OAAA;AAEhC,kFAAyF;AAAhF,oIAAA,4BAA4B,OAAA;AAErC,6CAA6C;AAC7C,kEAMuC;AALrC,wHAAA,oBAAoB,OAAA;AACpB,mHAAA,eAAe,OAAA;AACf,8HAAA,0BAA0B,OAAA;AAC1B,kHAAA,cAAc,OAAA;AACd,qHAAA,iBAAiB,OAAA;AAGnB,mDAAmD;AACnD,yCAIwB;AAHtB,sGAAA,YAAY,OAAA;AACZ,sGAAA,YAAY,OAAA;AACZ,uGAAA,aAAa,OAAA;AAGf,8DAA8D;AAC9D,gEAOsC;AANpC,iHAAA,cAAc,OAAA;AACd,uHAAA,oBAAoB,OAAA;AAOtB,gEAOsC;AANpC,kHAAA,eAAe,OAAA;AACf,gHAAA,aAAa,OAAA;AACb,uHAAA,oBAAoB,OAAA;AACpB,gHAAA,aAAa,OAAA;AACb,qHAAA,kBAAkB,OAAA;AAClB,iHAAA,cAAc,OAAA;AAGhB,4CAQ4B;AAP1B,yGAAA,gBAAgB,OAAA;AAChB,4GAAA,mBAAmB,OAAA;AACnB,sGAAA,aAAa,OAAA;AACb,mGAAA,UAAU,OAAA;AAMZ,uCAAuC;AACvC,yCAMwB;AALtB,kHAAA,wBAAwB,OAAA;AACxB,mHAAA,yBAAyB,OAAA;AACzB,gHAAA,sBAAsB,OAAA;AACtB,iHAAA,uBAAuB,OAAA;AACvB,uGAAA,aAAa,OAAA;AA6Bf,oCAAoC;AACpC,2CAAyB;AAEzB,gCAAgC;AAChC,wDAIgC;AAH9B,kHAAA,iBAAiB,OAAA;AAKnB,6BAA6B;AAC7B,gEAA6D;AAApD,kHAAA,cAAc,OAAA;AAQvB,4DAA4D;AAC5D,oEAAiE;AAAxD,sHAAA,gBAAgB,OAAA"}
|
package/dist/runtime/base.d.ts
CHANGED
|
@@ -45,23 +45,40 @@ export declare class MCPIRuntimeBase {
|
|
|
45
45
|
* Get the current agent identity
|
|
46
46
|
*/
|
|
47
47
|
getIdentity(): Promise<AgentIdentity>;
|
|
48
|
-
/**
|
|
49
|
-
* Handle handshake request
|
|
50
|
-
*/
|
|
51
48
|
/**
|
|
52
49
|
* Handle MCP handshake request
|
|
53
50
|
*
|
|
51
|
+
* Phase 5: Anonymous Sessions Until OAuth
|
|
52
|
+
* - Sessions start anonymous (no userDid) unless OAuth identity provided
|
|
53
|
+
* - User DID is resolved via AgentShield after OAuth completes
|
|
54
|
+
* - Eliminates DID fragmentation (same user = same DID across sessions)
|
|
55
|
+
*
|
|
54
56
|
* @param request - Handshake request object (may include oauthIdentity for persistent user DID lookup)
|
|
55
57
|
* @returns Handshake response with session ID and agent DID
|
|
56
|
-
*
|
|
57
|
-
* @remarks
|
|
58
|
-
* - Accepts optional oauthIdentity via request.oauthIdentity (backward compatible)
|
|
59
|
-
* - If OAuth identity provided, uses it to retrieve/create persistent user DID
|
|
60
|
-
* - Falls back to ephemeral user DID generation if OAuth unavailable
|
|
61
58
|
*/
|
|
62
59
|
handleHandshake(request: any & {
|
|
63
60
|
oauthIdentity?: import("../identity/user-did-manager").OAuthIdentity | null;
|
|
64
61
|
}): Promise<any>;
|
|
62
|
+
/**
|
|
63
|
+
* Update session identity after OAuth resolution (Phase 5)
|
|
64
|
+
*
|
|
65
|
+
* Called after AgentShield identity/resolve returns a persistent user DID.
|
|
66
|
+
* Updates the session to authenticated state with the resolved DID.
|
|
67
|
+
*
|
|
68
|
+
* @param sessionId - MCP session ID
|
|
69
|
+
* @param userDid - Persistent user DID from AgentShield
|
|
70
|
+
* @param oauthIdentity - OAuth identity information
|
|
71
|
+
* @throws Error if session not found
|
|
72
|
+
*/
|
|
73
|
+
updateSessionIdentity(sessionId: string, userDid: string, oauthIdentity?: {
|
|
74
|
+
provider: string;
|
|
75
|
+
subject: string;
|
|
76
|
+
email?: string;
|
|
77
|
+
}): Promise<void>;
|
|
78
|
+
/**
|
|
79
|
+
* Get session by ID
|
|
80
|
+
*/
|
|
81
|
+
getSession(sessionId: string): any | undefined;
|
|
65
82
|
/**
|
|
66
83
|
* Process tool call with automatic proof generation
|
|
67
84
|
* Returns clean result only - proof is stored for out-of-band retrieval
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base.d.ts","sourceRoot":"","sources":["../../src/runtime/base.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,OAAO,EACL,cAAc,EACd,aAAa,EACb,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,gBAAgB,EAChB,aAAa,EACd,MAAM,mBAAmB,CAAC;AAE3B,OAAO,EAAiB,KAAK,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAC/E,OAAO,EAAE,aAAa,EAAE,MAAM,+BAA+B,CAAC;AAE9D,OAAO,KAAK,EAGV,WAAW,EACX,eAAe,EACf,iBAAiB,EAClB,MAAM,8BAA8B,CAAC;AACtC,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAKrF,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,WAAW,CAAC;AAIvD;;;;;GAKG;AACH,MAAM,WAAW,wBAAwB;IACvC,oBAAoB,CAAC,EAAE,uBAAuB,CAAC;CAChD;AAED,qBAAa,eAAe;IAC1B,SAAS,CAAC,MAAM,EAAE,cAAc,CAAC;IACjC,SAAS,CAAC,KAAK,EAAE,aAAa,CAAC;IAC/B,SAAS,CAAC,KAAK,EAAE,aAAa,CAAC;IAC/B,SAAS,CAAC,OAAO,EAAE,eAAe,CAAC;IACnC,SAAS,CAAC,UAAU,EAAE,kBAAkB,CAAC;IACzC,SAAS,CAAC,QAAQ,EAAE,gBAAgB,CAAC;IACrC,SAAS,CAAC,MAAM,EAAE,qBAAqB,CAAC;IACxC,OAAO,CAAC,cAAc,CAAC,CAAgB;IACvC,OAAO,CAAC,QAAQ,CAA+B;IAC/C,OAAO,CAAC,SAAS,CAAC,CAAM;IACxB,OAAO,CAAC,cAAc,CAAC,CAAiB;IACxC,OAAO,CAAC,gBAAgB,CAA+B;IACvD,OAAO,CAAC,aAAa,CAAC,CAAgB;IACtC,SAAS,CAAC,aAAa,CAAC,EAAE,aAAa,CAAC;IACxC,SAAS,CAAC,oBAAoB,CAAC,EAAE,uBAAuB,CAAC;gBAE7C,MAAM,EAAE,qBAAqB;IAYzC;;OAEG;IACG,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IA2CjC;;OAEG;IACG,WAAW,IAAI,OAAO,CAAC,aAAa,CAAC;IAO3C
|
|
1
|
+
{"version":3,"file":"base.d.ts","sourceRoot":"","sources":["../../src/runtime/base.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,OAAO,EACL,cAAc,EACd,aAAa,EACb,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,gBAAgB,EAChB,aAAa,EACd,MAAM,mBAAmB,CAAC;AAE3B,OAAO,EAAiB,KAAK,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAC/E,OAAO,EAAE,aAAa,EAAE,MAAM,+BAA+B,CAAC;AAE9D,OAAO,KAAK,EAGV,WAAW,EACX,eAAe,EACf,iBAAiB,EAClB,MAAM,8BAA8B,CAAC;AACtC,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAKrF,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,WAAW,CAAC;AAIvD;;;;;GAKG;AACH,MAAM,WAAW,wBAAwB;IACvC,oBAAoB,CAAC,EAAE,uBAAuB,CAAC;CAChD;AAED,qBAAa,eAAe;IAC1B,SAAS,CAAC,MAAM,EAAE,cAAc,CAAC;IACjC,SAAS,CAAC,KAAK,EAAE,aAAa,CAAC;IAC/B,SAAS,CAAC,KAAK,EAAE,aAAa,CAAC;IAC/B,SAAS,CAAC,OAAO,EAAE,eAAe,CAAC;IACnC,SAAS,CAAC,UAAU,EAAE,kBAAkB,CAAC;IACzC,SAAS,CAAC,QAAQ,EAAE,gBAAgB,CAAC;IACrC,SAAS,CAAC,MAAM,EAAE,qBAAqB,CAAC;IACxC,OAAO,CAAC,cAAc,CAAC,CAAgB;IACvC,OAAO,CAAC,QAAQ,CAA+B;IAC/C,OAAO,CAAC,SAAS,CAAC,CAAM;IACxB,OAAO,CAAC,cAAc,CAAC,CAAiB;IACxC,OAAO,CAAC,gBAAgB,CAA+B;IACvD,OAAO,CAAC,aAAa,CAAC,CAAgB;IACtC,SAAS,CAAC,aAAa,CAAC,EAAE,aAAa,CAAC;IACxC,SAAS,CAAC,oBAAoB,CAAC,EAAE,uBAAuB,CAAC;gBAE7C,MAAM,EAAE,qBAAqB;IAYzC;;OAEG;IACG,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IA2CjC;;OAEG;IACG,WAAW,IAAI,OAAO,CAAC,aAAa,CAAC;IAO3C;;;;;;;;;;OAUG;IACG,eAAe,CACnB,OAAO,EAAE,GAAG,GAAG;QACb,aAAa,CAAC,EACV,OAAO,8BAA8B,EAAE,aAAa,GACpD,IAAI,CAAC;KACV,GACA,OAAO,CAAC,GAAG,CAAC;IA6Gf;;;;;;;;;;OAUG;IACG,qBAAqB,CACzB,SAAS,EAAE,MAAM,EACjB,OAAO,EAAE,MAAM,EACf,aAAa,CAAC,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,OAAO,EAAE,MAAM,CAAC;QAAC,KAAK,CAAC,EAAE,MAAM,CAAA;KAAE,GACpE,OAAO,CAAC,IAAI,CAAC;IA+BhB;;OAEG;IACH,UAAU,CAAC,SAAS,EAAE,MAAM,GAAG,GAAG,GAAG,SAAS;IAI9C;;;;;;;;OAQG;IACG,eAAe,CACnB,QAAQ,EAAE,MAAM,EAChB,IAAI,EAAE,GAAG,EACT,OAAO,EAAE,CAAC,IAAI,EAAE,GAAG,KAAK,OAAO,CAAC,GAAG,CAAC,EACpC,OAAO,CAAC,EAAE,GAAG,GACZ,OAAO,CAAC,GAAG,CAAC;IA8Zf;;;;;;;OAOG;IACG,cAAc,CAClB,WAAW,EAAE,MAAM,EACnB,OAAO,EAAE,CAAC,IAAI,EAAE,GAAG,KAAK,OAAO,CAAC,GAAG,CAAC,EACpC,eAAe,CAAC,EAAE,MAAM,GACvB,OAAO,CAAC,GAAG,CAAC;IAyCf;;OAEG;IACH,OAAO,CAAC,mBAAmB;IAoB3B;;OAEG;IACH,OAAO,CAAC,8BAA8B;IAStC;;;;;;;;;;;;;;;;;OAiBG;IACH,SAAS,CAAC,eAAe,CACvB,QAAQ,EAAE,MAAM,EAChB,MAAM,EAAE,MAAM,EAAE,EAChB,OAAO,CAAC,EAAE,GAAG,EACb,WAAW,CAAC,EAAE,MAAM,EACpB,SAAS,CAAC,EAAE,MAAM,GACjB,MAAM;IAyBT;;;OAGG;IACG,UAAU,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAapD;;OAEG;IACG,WAAW,CAAC,IAAI,EAAE,GAAG,EAAE,OAAO,CAAC,EAAE,GAAG,GAAG,OAAO,CAAC,GAAG,CAAC;IAyCzD;;;;;;;;;OASG;IACG,WAAW,CAAC,WAAW,EAAE,GAAG,EAAE,cAAc,CAAC,EAAE,GAAG,GAAG,OAAO,CAAC,OAAO,CAAC;IA2D3E;;;OAGG;YACW,iBAAiB;IAqD/B;;;;;;;;;;OAUG;IACG,cAAc,CAClB,GAAG,EAAE,MAAM,EACX,YAAY,EAAE,UAAU,EACxB,eAAe,CAAC,EAAE,MAAM,GAAG,UAAU,GACpC,OAAO,CAAC,OAAO,CAAC;IAgBnB;;OAEG;IACG,iBAAiB,IAAI,OAAO,CAAC,GAAG,CAAC;IAUvC;;OAEG;IACH,YAAY,IAAI,GAAG;IAInB;;OAEG;IACH,sBAAsB,CACpB,MAAM,CAAC,EAAE,eAAe,GACvB,CAAC,IAAI,EAAE,MAAM,KAAK,OAAO,CAAC,iBAAiB,GAAG,WAAW,GAAG,IAAI,CAAC;IA+DpE;;OAEG;IACH,mBAAmB,IAAI,GAAG;IAyB1B;;OAEG;IACH,cAAc,IAAI,GAAG;IAMrB;;OAEG;IACG,UAAU,IAAI,OAAO,CAAC,aAAa,CAAC;YAkB5B,QAAQ;YAOR,aAAa;YAKb,iBAAiB;IAK/B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAsCG;IACH,OAAO,CAAC,QAAQ;IAmBhB,OAAO,CAAC,iBAAiB;IAmBzB,OAAO,CAAC,gBAAgB;IAYxB;;OAEG;IACH,OAAO,CAAC,mBAAmB;IA+B3B,OAAO,CAAC,aAAa;IAIrB,OAAO,CAAC,aAAa;IAIrB,OAAO,CAAC,UAAU;CAGnB"}
|
package/dist/runtime/base.js
CHANGED
|
@@ -86,42 +86,49 @@ class MCPIRuntimeBase {
|
|
|
86
86
|
}
|
|
87
87
|
return this.cachedIdentity;
|
|
88
88
|
}
|
|
89
|
-
/**
|
|
90
|
-
* Handle handshake request
|
|
91
|
-
*/
|
|
92
89
|
/**
|
|
93
90
|
* Handle MCP handshake request
|
|
94
91
|
*
|
|
92
|
+
* Phase 5: Anonymous Sessions Until OAuth
|
|
93
|
+
* - Sessions start anonymous (no userDid) unless OAuth identity provided
|
|
94
|
+
* - User DID is resolved via AgentShield after OAuth completes
|
|
95
|
+
* - Eliminates DID fragmentation (same user = same DID across sessions)
|
|
96
|
+
*
|
|
95
97
|
* @param request - Handshake request object (may include oauthIdentity for persistent user DID lookup)
|
|
96
98
|
* @returns Handshake response with session ID and agent DID
|
|
97
|
-
*
|
|
98
|
-
* @remarks
|
|
99
|
-
* - Accepts optional oauthIdentity via request.oauthIdentity (backward compatible)
|
|
100
|
-
* - If OAuth identity provided, uses it to retrieve/create persistent user DID
|
|
101
|
-
* - Falls back to ephemeral user DID generation if OAuth unavailable
|
|
102
99
|
*/
|
|
103
100
|
async handleHandshake(request) {
|
|
104
101
|
const identity = await this.getIdentity();
|
|
105
102
|
const timestamp = this.clock.now();
|
|
106
103
|
const sessionId = await this.generateSessionId();
|
|
107
|
-
//
|
|
108
|
-
//
|
|
104
|
+
// Phase 5: Try to resolve user DID from existing OAuth mapping
|
|
105
|
+
// Sessions start anonymous - no ephemeral generation
|
|
109
106
|
let userDid;
|
|
110
107
|
if (this.userDidManager) {
|
|
111
108
|
try {
|
|
112
109
|
const oauthIdentity = request.oauthIdentity;
|
|
113
|
-
|
|
110
|
+
const resolvedDid = await this.userDidManager.getOrCreateUserDid(sessionId, oauthIdentity);
|
|
111
|
+
// Convert null to undefined for session storage
|
|
112
|
+
userDid = resolvedDid ?? undefined;
|
|
114
113
|
if (this.config.audit?.enabled) {
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
114
|
+
if (userDid) {
|
|
115
|
+
console.log("[MCP-I] Resolved existing user DID for session:", {
|
|
116
|
+
userDid: userDid.substring(0, 20) + "...",
|
|
117
|
+
hasOAuth: !!oauthIdentity,
|
|
118
|
+
provider: oauthIdentity?.provider,
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
else {
|
|
122
|
+
console.log("[MCP-I] Session started anonymous (no userDid):", {
|
|
123
|
+
sessionId: sessionId.substring(0, 8) + "...",
|
|
124
|
+
hasOAuth: !!oauthIdentity,
|
|
125
|
+
});
|
|
126
|
+
}
|
|
120
127
|
}
|
|
121
128
|
}
|
|
122
129
|
catch (error) {
|
|
123
|
-
console.warn("[MCP-I] Failed to
|
|
124
|
-
// Continue without user DID -
|
|
130
|
+
console.warn("[MCP-I] Failed to resolve user DID:", error);
|
|
131
|
+
// Continue without user DID - session is anonymous
|
|
125
132
|
}
|
|
126
133
|
}
|
|
127
134
|
// Extract client info if available
|
|
@@ -151,17 +158,20 @@ class MCPIRuntimeBase {
|
|
|
151
158
|
capabilities: clientCapabilities,
|
|
152
159
|
}
|
|
153
160
|
: undefined;
|
|
154
|
-
// Create session
|
|
161
|
+
// Create session with Phase 5 identity state
|
|
155
162
|
const session = {
|
|
156
163
|
id: sessionId,
|
|
157
164
|
clientDid: request.clientDid || userDid, // Use provided clientDid or generated userDid
|
|
158
|
-
userDid: userDid, // Store
|
|
165
|
+
userDid: userDid, // Store user DID (may be undefined for anonymous sessions)
|
|
159
166
|
agentDid: request.agentDid, // ✅ FIXED: Only agent DID, no fallback
|
|
160
167
|
serverDid: identity.did, // ✅ NEW: Server's DID (for clarity)
|
|
161
168
|
audience: request.audience,
|
|
162
169
|
createdAt: timestamp,
|
|
163
170
|
expiresAt: this.clock.calculateExpiry((this.config.session?.ttlMinutes || 30) * 60),
|
|
164
|
-
clientInfo, //
|
|
171
|
+
clientInfo, // Store client information
|
|
172
|
+
// Phase 5: Identity state tracking
|
|
173
|
+
identityState: userDid ? "authenticated" : "anonymous",
|
|
174
|
+
oauthIdentity: request.oauthIdentity ?? undefined,
|
|
165
175
|
};
|
|
166
176
|
this.sessions.set(sessionId, session);
|
|
167
177
|
// Create handshake response
|
|
@@ -179,6 +189,49 @@ class MCPIRuntimeBase {
|
|
|
179
189
|
signature,
|
|
180
190
|
};
|
|
181
191
|
}
|
|
192
|
+
/**
|
|
193
|
+
* Update session identity after OAuth resolution (Phase 5)
|
|
194
|
+
*
|
|
195
|
+
* Called after AgentShield identity/resolve returns a persistent user DID.
|
|
196
|
+
* Updates the session to authenticated state with the resolved DID.
|
|
197
|
+
*
|
|
198
|
+
* @param sessionId - MCP session ID
|
|
199
|
+
* @param userDid - Persistent user DID from AgentShield
|
|
200
|
+
* @param oauthIdentity - OAuth identity information
|
|
201
|
+
* @throws Error if session not found
|
|
202
|
+
*/
|
|
203
|
+
async updateSessionIdentity(sessionId, userDid, oauthIdentity) {
|
|
204
|
+
const session = this.sessions.get(sessionId);
|
|
205
|
+
if (!session) {
|
|
206
|
+
throw new Error(`Session not found: ${sessionId}`);
|
|
207
|
+
}
|
|
208
|
+
// Update session with resolved identity
|
|
209
|
+
session.userDid = userDid;
|
|
210
|
+
session.identityState = "authenticated";
|
|
211
|
+
if (oauthIdentity) {
|
|
212
|
+
session.oauthIdentity = oauthIdentity;
|
|
213
|
+
}
|
|
214
|
+
// Update the sessions map
|
|
215
|
+
this.sessions.set(sessionId, session);
|
|
216
|
+
// Also update UserDidManager cache if available
|
|
217
|
+
if (this.userDidManager) {
|
|
218
|
+
await this.userDidManager.setUserDidForSession(sessionId, userDid, oauthIdentity);
|
|
219
|
+
}
|
|
220
|
+
if (this.config.audit?.enabled) {
|
|
221
|
+
console.log("[MCP-I] Session identity updated (Phase 5):", {
|
|
222
|
+
sessionId: sessionId.substring(0, 8) + "...",
|
|
223
|
+
userDid: userDid.substring(0, 20) + "...",
|
|
224
|
+
provider: oauthIdentity?.provider,
|
|
225
|
+
identityState: "authenticated",
|
|
226
|
+
});
|
|
227
|
+
}
|
|
228
|
+
}
|
|
229
|
+
/**
|
|
230
|
+
* Get session by ID
|
|
231
|
+
*/
|
|
232
|
+
getSession(sessionId) {
|
|
233
|
+
return this.sessions.get(sessionId);
|
|
234
|
+
}
|
|
182
235
|
/**
|
|
183
236
|
* Process tool call with automatic proof generation
|
|
184
237
|
* Returns clean result only - proof is stored for out-of-band retrieval
|