@kya-os/mcp-i-core 1.3.12 → 1.3.14
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/config/remote-config.js +9 -12
- package/dist/runtime/base.js +11 -0
- package/dist/services/access-control.service.js +5 -0
- package/dist/services/tool-protection.service.js +17 -8
- package/package.json +2 -2
- package/.turbo/turbo-build.log +0 -4
- package/.turbo/turbo-test$colon$coverage.log +0 -4586
- package/.turbo/turbo-test.log +0 -3169
- package/COMPLIANCE_IMPROVEMENT_REPORT.md +0 -483
- package/Composer 3.md +0 -615
- package/GPT-5.md +0 -1169
- package/OPUS-plan.md +0 -352
- package/PHASE_3_AND_4.1_SUMMARY.md +0 -585
- package/PHASE_3_SUMMARY.md +0 -317
- package/PHASE_4.1.3_SUMMARY.md +0 -428
- package/PHASE_4.1_COMPLETE.md +0 -525
- package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +0 -1240
- package/SCHEMA_COMPLIANCE_REPORT.md +0 -275
- package/TEST_PLAN.md +0 -571
- package/coverage/coverage-final.json +0 -60
- package/dist/cache/oauth-config-cache.d.ts.map +0 -1
- package/dist/cache/oauth-config-cache.js.map +0 -1
- package/dist/cache/tool-protection-cache.d.ts.map +0 -1
- package/dist/cache/tool-protection-cache.js.map +0 -1
- package/dist/compliance/index.d.ts.map +0 -1
- package/dist/compliance/index.js.map +0 -1
- package/dist/compliance/schema-registry.d.ts.map +0 -1
- package/dist/compliance/schema-registry.js.map +0 -1
- package/dist/compliance/schema-verifier.d.ts.map +0 -1
- package/dist/compliance/schema-verifier.js.map +0 -1
- package/dist/config/remote-config.d.ts.map +0 -1
- package/dist/config/remote-config.js.map +0 -1
- package/dist/config.d.ts.map +0 -1
- package/dist/config.js.map +0 -1
- package/dist/delegation/audience-validator.d.ts.map +0 -1
- package/dist/delegation/audience-validator.js.map +0 -1
- package/dist/delegation/bitstring.d.ts.map +0 -1
- package/dist/delegation/bitstring.js.map +0 -1
- package/dist/delegation/cascading-revocation.d.ts.map +0 -1
- package/dist/delegation/cascading-revocation.js.map +0 -1
- package/dist/delegation/delegation-graph.d.ts.map +0 -1
- package/dist/delegation/delegation-graph.js.map +0 -1
- package/dist/delegation/did-key-resolver.d.ts.map +0 -1
- package/dist/delegation/did-key-resolver.js.map +0 -1
- package/dist/delegation/index.d.ts.map +0 -1
- package/dist/delegation/index.js.map +0 -1
- package/dist/delegation/statuslist-manager.d.ts.map +0 -1
- package/dist/delegation/statuslist-manager.js.map +0 -1
- package/dist/delegation/storage/index.d.ts.map +0 -1
- package/dist/delegation/storage/index.js.map +0 -1
- package/dist/delegation/storage/memory-graph-storage.d.ts.map +0 -1
- package/dist/delegation/storage/memory-graph-storage.js.map +0 -1
- package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +0 -1
- package/dist/delegation/storage/memory-statuslist-storage.js.map +0 -1
- package/dist/delegation/utils.d.ts.map +0 -1
- package/dist/delegation/utils.js.map +0 -1
- package/dist/delegation/vc-issuer.d.ts.map +0 -1
- package/dist/delegation/vc-issuer.js.map +0 -1
- package/dist/delegation/vc-verifier.d.ts.map +0 -1
- package/dist/delegation/vc-verifier.js.map +0 -1
- package/dist/identity/idp-token-resolver.d.ts.map +0 -1
- package/dist/identity/idp-token-resolver.js.map +0 -1
- package/dist/identity/idp-token-storage.interface.d.ts.map +0 -1
- package/dist/identity/idp-token-storage.interface.js.map +0 -1
- package/dist/identity/user-did-manager.d.ts.map +0 -1
- package/dist/identity/user-did-manager.js.map +0 -1
- package/dist/index.d.ts.map +0 -1
- package/dist/index.js.map +0 -1
- package/dist/providers/base.d.ts.map +0 -1
- package/dist/providers/base.js.map +0 -1
- package/dist/providers/memory.d.ts.map +0 -1
- package/dist/providers/memory.js.map +0 -1
- package/dist/runtime/audit-logger.d.ts.map +0 -1
- package/dist/runtime/audit-logger.js.map +0 -1
- package/dist/runtime/base.d.ts.map +0 -1
- package/dist/runtime/base.js.map +0 -1
- package/dist/services/access-control.service.d.ts.map +0 -1
- package/dist/services/access-control.service.js.map +0 -1
- package/dist/services/authorization/authorization-registry.d.ts.map +0 -1
- package/dist/services/authorization/authorization-registry.js.map +0 -1
- package/dist/services/authorization/types.d.ts.map +0 -1
- package/dist/services/authorization/types.js.map +0 -1
- package/dist/services/batch-delegation.service.d.ts.map +0 -1
- package/dist/services/batch-delegation.service.js.map +0 -1
- package/dist/services/crypto.service.d.ts.map +0 -1
- package/dist/services/crypto.service.js.map +0 -1
- package/dist/services/errors.d.ts.map +0 -1
- package/dist/services/errors.js.map +0 -1
- package/dist/services/index.d.ts.map +0 -1
- package/dist/services/index.js.map +0 -1
- package/dist/services/oauth-config.service.d.ts.map +0 -1
- package/dist/services/oauth-config.service.js.map +0 -1
- package/dist/services/oauth-provider-registry.d.ts.map +0 -1
- package/dist/services/oauth-provider-registry.js.map +0 -1
- package/dist/services/oauth-service.d.ts.map +0 -1
- package/dist/services/oauth-service.js.map +0 -1
- package/dist/services/oauth-token-retrieval.service.d.ts.map +0 -1
- package/dist/services/oauth-token-retrieval.service.js.map +0 -1
- package/dist/services/proof-verifier.d.ts.map +0 -1
- package/dist/services/proof-verifier.js.map +0 -1
- package/dist/services/provider-resolver.d.ts.map +0 -1
- package/dist/services/provider-resolver.js.map +0 -1
- package/dist/services/provider-validator.d.ts.map +0 -1
- package/dist/services/provider-validator.js.map +0 -1
- package/dist/services/session-registration.service.d.ts.map +0 -1
- package/dist/services/session-registration.service.js.map +0 -1
- package/dist/services/storage.service.d.ts.map +0 -1
- package/dist/services/storage.service.js.map +0 -1
- package/dist/services/tool-context-builder.d.ts.map +0 -1
- package/dist/services/tool-context-builder.js.map +0 -1
- package/dist/services/tool-protection.service.d.ts.map +0 -1
- package/dist/services/tool-protection.service.js.map +0 -1
- package/dist/types/oauth-required-error.d.ts.map +0 -1
- package/dist/types/oauth-required-error.js.map +0 -1
- package/dist/types/tool-protection.d.ts.map +0 -1
- package/dist/types/tool-protection.js.map +0 -1
- package/dist/utils/base58.d.ts.map +0 -1
- package/dist/utils/base58.js.map +0 -1
- package/dist/utils/base64.d.ts.map +0 -1
- package/dist/utils/base64.js.map +0 -1
- package/dist/utils/cors.d.ts.map +0 -1
- package/dist/utils/cors.js.map +0 -1
- package/dist/utils/did-helpers.d.ts.map +0 -1
- package/dist/utils/did-helpers.js.map +0 -1
- package/dist/utils/index.d.ts.map +0 -1
- package/dist/utils/index.js.map +0 -1
- package/dist/utils/storage-keys.d.ts.map +0 -1
- package/dist/utils/storage-keys.js.map +0 -1
- package/docs/API_REFERENCE.md +0 -1362
- package/docs/COMPLIANCE_MATRIX.md +0 -691
- package/docs/STATUSLIST2021_GUIDE.md +0 -696
- package/docs/W3C_VC_DELEGATION_GUIDE.md +0 -710
- package/src/__tests__/cache/tool-protection-cache.test.ts +0 -640
- package/src/__tests__/config/provider-runtime-config.test.ts +0 -309
- package/src/__tests__/delegation-e2e.test.ts +0 -690
- package/src/__tests__/identity/user-did-manager.test.ts +0 -232
- package/src/__tests__/index.test.ts +0 -56
- package/src/__tests__/integration/full-flow.test.ts +0 -789
- package/src/__tests__/integration.test.ts +0 -281
- package/src/__tests__/providers/base.test.ts +0 -173
- package/src/__tests__/providers/memory.test.ts +0 -319
- package/src/__tests__/regression/phase2-regression.test.ts +0 -429
- package/src/__tests__/runtime/audit-logger.test.ts +0 -154
- package/src/__tests__/runtime/base-extensions.test.ts +0 -595
- package/src/__tests__/runtime/base.test.ts +0 -869
- package/src/__tests__/runtime/delegation-flow.test.ts +0 -164
- package/src/__tests__/runtime/proof-client-did.test.ts +0 -376
- package/src/__tests__/runtime/route-interception.test.ts +0 -686
- package/src/__tests__/runtime/tool-protection-enforcement.test.ts +0 -908
- package/src/__tests__/services/agentshield-integration.test.ts +0 -791
- package/src/__tests__/services/cache-busting.test.ts +0 -125
- package/src/__tests__/services/oauth-service-pkce.test.ts +0 -556
- package/src/__tests__/services/provider-resolver-edge-cases.test.ts +0 -591
- package/src/__tests__/services/tool-protection-merged-config.test.ts +0 -485
- package/src/__tests__/services/tool-protection-oauth-provider.test.ts +0 -480
- package/src/__tests__/services/tool-protection.service.test.ts +0 -1373
- package/src/__tests__/utils/mock-providers.ts +0 -340
- package/src/cache/oauth-config-cache.d.ts +0 -69
- package/src/cache/oauth-config-cache.d.ts.map +0 -1
- package/src/cache/oauth-config-cache.js.map +0 -1
- package/src/cache/oauth-config-cache.ts +0 -123
- package/src/cache/tool-protection-cache.ts +0 -171
- package/src/compliance/EXAMPLE.md +0 -412
- package/src/compliance/__tests__/schema-verifier.test.ts +0 -797
- package/src/compliance/index.ts +0 -8
- package/src/compliance/schema-registry.ts +0 -460
- package/src/compliance/schema-verifier.ts +0 -708
- package/src/config/__tests__/merged-config.spec.ts +0 -445
- package/src/config/__tests__/remote-config.spec.ts +0 -268
- package/src/config/remote-config.ts +0 -264
- package/src/config.ts +0 -312
- package/src/delegation/__tests__/audience-validator.test.ts +0 -112
- package/src/delegation/__tests__/bitstring.test.ts +0 -346
- package/src/delegation/__tests__/cascading-revocation.test.ts +0 -628
- package/src/delegation/__tests__/delegation-graph.test.ts +0 -584
- package/src/delegation/__tests__/did-key-resolver.test.ts +0 -265
- package/src/delegation/__tests__/utils.test.ts +0 -152
- package/src/delegation/__tests__/vc-issuer.test.ts +0 -442
- package/src/delegation/__tests__/vc-verifier.test.ts +0 -922
- package/src/delegation/audience-validator.ts +0 -52
- package/src/delegation/bitstring.ts +0 -278
- package/src/delegation/cascading-revocation.ts +0 -370
- package/src/delegation/delegation-graph.ts +0 -299
- package/src/delegation/did-key-resolver.ts +0 -179
- package/src/delegation/index.ts +0 -14
- package/src/delegation/statuslist-manager.ts +0 -353
- package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +0 -366
- package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +0 -228
- package/src/delegation/storage/index.ts +0 -9
- package/src/delegation/storage/memory-graph-storage.ts +0 -178
- package/src/delegation/storage/memory-statuslist-storage.ts +0 -77
- package/src/delegation/utils.ts +0 -221
- package/src/delegation/vc-issuer.ts +0 -232
- package/src/delegation/vc-verifier.ts +0 -568
- package/src/identity/idp-token-resolver.ts +0 -181
- package/src/identity/idp-token-storage.interface.ts +0 -94
- package/src/identity/user-did-manager.ts +0 -526
- package/src/index.ts +0 -310
- package/src/providers/base.d.ts +0 -91
- package/src/providers/base.d.ts.map +0 -1
- package/src/providers/base.js.map +0 -1
- package/src/providers/base.ts +0 -96
- package/src/providers/memory.ts +0 -142
- package/src/runtime/audit-logger.ts +0 -39
- package/src/runtime/base.ts +0 -1392
- package/src/services/__tests__/access-control.integration.test.ts +0 -443
- package/src/services/__tests__/access-control.proof-response-validation.test.ts +0 -578
- package/src/services/__tests__/access-control.service.test.ts +0 -970
- package/src/services/__tests__/batch-delegation.service.test.ts +0 -351
- package/src/services/__tests__/crypto.service.test.ts +0 -531
- package/src/services/__tests__/oauth-provider-registry.test.ts +0 -142
- package/src/services/__tests__/proof-verifier.integration.test.ts +0 -485
- package/src/services/__tests__/proof-verifier.test.ts +0 -489
- package/src/services/__tests__/provider-resolution.integration.test.ts +0 -202
- package/src/services/__tests__/provider-resolver.test.ts +0 -213
- package/src/services/__tests__/storage.service.test.ts +0 -358
- package/src/services/access-control.service.ts +0 -990
- package/src/services/authorization/authorization-registry.ts +0 -66
- package/src/services/authorization/types.ts +0 -71
- package/src/services/batch-delegation.service.ts +0 -137
- package/src/services/crypto.service.ts +0 -302
- package/src/services/errors.ts +0 -76
- package/src/services/index.ts +0 -18
- package/src/services/oauth-config.service.d.ts +0 -53
- package/src/services/oauth-config.service.d.ts.map +0 -1
- package/src/services/oauth-config.service.js.map +0 -1
- package/src/services/oauth-config.service.ts +0 -192
- package/src/services/oauth-provider-registry.d.ts +0 -57
- package/src/services/oauth-provider-registry.d.ts.map +0 -1
- package/src/services/oauth-provider-registry.js.map +0 -1
- package/src/services/oauth-provider-registry.ts +0 -141
- package/src/services/oauth-service.ts +0 -544
- package/src/services/oauth-token-retrieval.service.ts +0 -245
- package/src/services/proof-verifier.ts +0 -478
- package/src/services/provider-resolver.d.ts +0 -48
- package/src/services/provider-resolver.d.ts.map +0 -1
- package/src/services/provider-resolver.js.map +0 -1
- package/src/services/provider-resolver.ts +0 -146
- package/src/services/provider-validator.ts +0 -170
- package/src/services/session-registration.service.ts +0 -251
- package/src/services/storage.service.ts +0 -566
- package/src/services/tool-context-builder.ts +0 -237
- package/src/services/tool-protection.service.ts +0 -1070
- package/src/types/oauth-required-error.ts +0 -63
- package/src/types/tool-protection.ts +0 -155
- package/src/utils/__tests__/did-helpers.test.ts +0 -156
- package/src/utils/base58.ts +0 -109
- package/src/utils/base64.ts +0 -148
- package/src/utils/cors.ts +0 -83
- package/src/utils/did-helpers.ts +0 -210
- package/src/utils/index.ts +0 -8
- package/src/utils/storage-keys.ts +0 -278
- package/tsconfig.json +0 -21
- package/vitest.config.ts +0 -56
|
@@ -1,526 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* User DID Manager
|
|
3
|
-
*
|
|
4
|
-
* Manages user DIDs for MCP-I sessions.
|
|
5
|
-
*
|
|
6
|
-
* Phase 5: Anonymous Sessions Until OAuth
|
|
7
|
-
* - Sessions start anonymous (no userDid) until OAuth completes
|
|
8
|
-
* - User DIDs are resolved via AgentShield identity/resolve after OAuth
|
|
9
|
-
* - Eliminates DID fragmentation (same user = same DID across sessions)
|
|
10
|
-
*
|
|
11
|
-
* DID Resolution Priority:
|
|
12
|
-
* 1. OAuth mapping lookup (persistent)
|
|
13
|
-
* 2. Session storage lookup
|
|
14
|
-
* 3. Return null (session stays anonymous)
|
|
15
|
-
*/
|
|
16
|
-
|
|
17
|
-
import { CryptoProvider } from '../providers/base';
|
|
18
|
-
|
|
19
|
-
/**
|
|
20
|
-
* OAuth identity for persistent user DID lookup
|
|
21
|
-
*/
|
|
22
|
-
export interface OAuthIdentity {
|
|
23
|
-
/**
|
|
24
|
-
* OAuth provider name (e.g., "google", "github", "microsoft")
|
|
25
|
-
*/
|
|
26
|
-
provider: string;
|
|
27
|
-
|
|
28
|
-
/**
|
|
29
|
-
* OAuth subject identifier (unique user ID from provider)
|
|
30
|
-
*/
|
|
31
|
-
subject: string;
|
|
32
|
-
|
|
33
|
-
/**
|
|
34
|
-
* User's email address from OAuth provider (optional)
|
|
35
|
-
*/
|
|
36
|
-
email?: string;
|
|
37
|
-
|
|
38
|
-
/**
|
|
39
|
-
* User's display name from OAuth provider (optional)
|
|
40
|
-
*/
|
|
41
|
-
name?: string;
|
|
42
|
-
}
|
|
43
|
-
|
|
44
|
-
/**
|
|
45
|
-
* User key pair for signing VCs
|
|
46
|
-
*
|
|
47
|
-
* Contains both public and private keys in base64 format.
|
|
48
|
-
* SECURITY: Private keys should be encrypted at rest.
|
|
49
|
-
*/
|
|
50
|
-
export interface UserKeyPair {
|
|
51
|
-
/**
|
|
52
|
-
* User DID (did:key format)
|
|
53
|
-
*/
|
|
54
|
-
did: string;
|
|
55
|
-
|
|
56
|
-
/**
|
|
57
|
-
* Public key in base64 format
|
|
58
|
-
*/
|
|
59
|
-
publicKey: string;
|
|
60
|
-
|
|
61
|
-
/**
|
|
62
|
-
* Private key in base64 format
|
|
63
|
-
* SECURITY: Should be encrypted at rest in production
|
|
64
|
-
*/
|
|
65
|
-
privateKey: string;
|
|
66
|
-
|
|
67
|
-
/**
|
|
68
|
-
* Key ID (for JWS header)
|
|
69
|
-
*/
|
|
70
|
-
keyId: string;
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
/**
|
|
74
|
-
* User DID storage interface
|
|
75
|
-
*/
|
|
76
|
-
export interface UserDidStorage {
|
|
77
|
-
/**
|
|
78
|
-
* Get user DID for a session
|
|
79
|
-
*/
|
|
80
|
-
get(sessionId: string): Promise<string | null>;
|
|
81
|
-
|
|
82
|
-
/**
|
|
83
|
-
* Store user DID for a session
|
|
84
|
-
*/
|
|
85
|
-
set(sessionId: string, did: string, ttl?: number): Promise<void>;
|
|
86
|
-
|
|
87
|
-
/**
|
|
88
|
-
* Delete user DID for a session
|
|
89
|
-
*/
|
|
90
|
-
delete(sessionId: string): Promise<void>;
|
|
91
|
-
|
|
92
|
-
/**
|
|
93
|
-
* Get user DID by OAuth identity (optional - for persistent user DID lookup)
|
|
94
|
-
* If not implemented, OAuth-based lookup will be skipped
|
|
95
|
-
*/
|
|
96
|
-
getByOAuth?(provider: string, subject: string): Promise<string | null>;
|
|
97
|
-
|
|
98
|
-
/**
|
|
99
|
-
* Store user DID mapping for OAuth identity (optional - for persistent user DID storage)
|
|
100
|
-
* If not implemented, OAuth-based storage will be skipped
|
|
101
|
-
*/
|
|
102
|
-
setByOAuth?(provider: string, subject: string, did: string, ttl?: number): Promise<void>;
|
|
103
|
-
|
|
104
|
-
/**
|
|
105
|
-
* Get user key pair for a session (optional - for VC signing)
|
|
106
|
-
* If not implemented, VC issuance will not be available for this session
|
|
107
|
-
*/
|
|
108
|
-
getKeyPair?(sessionId: string): Promise<UserKeyPair | null>;
|
|
109
|
-
|
|
110
|
-
/**
|
|
111
|
-
* Store user key pair for a session (optional - for VC signing)
|
|
112
|
-
* SECURITY: Implementation should encrypt private keys at rest
|
|
113
|
-
*/
|
|
114
|
-
setKeyPair?(sessionId: string, keyPair: UserKeyPair, ttl?: number): Promise<void>;
|
|
115
|
-
|
|
116
|
-
/**
|
|
117
|
-
* Get user key pair by OAuth identity (optional - for persistent key storage)
|
|
118
|
-
* If not implemented, OAuth-based key lookup will be skipped
|
|
119
|
-
*/
|
|
120
|
-
getKeyPairByOAuth?(provider: string, subject: string): Promise<UserKeyPair | null>;
|
|
121
|
-
|
|
122
|
-
/**
|
|
123
|
-
* Store user key pair for OAuth identity (optional - for persistent key storage)
|
|
124
|
-
* SECURITY: Implementation should encrypt private keys at rest
|
|
125
|
-
*/
|
|
126
|
-
setKeyPairByOAuth?(
|
|
127
|
-
provider: string,
|
|
128
|
-
subject: string,
|
|
129
|
-
keyPair: UserKeyPair,
|
|
130
|
-
ttl?: number
|
|
131
|
-
): Promise<void>;
|
|
132
|
-
}
|
|
133
|
-
|
|
134
|
-
/**
|
|
135
|
-
* User DID Manager configuration
|
|
136
|
-
*/
|
|
137
|
-
export interface UserDidManagerConfig {
|
|
138
|
-
/**
|
|
139
|
-
* Storage provider for user DIDs (optional)
|
|
140
|
-
* If not provided, user DIDs are ephemeral (not persisted)
|
|
141
|
-
*/
|
|
142
|
-
storage?: UserDidStorage;
|
|
143
|
-
|
|
144
|
-
/**
|
|
145
|
-
* Crypto provider for DID generation
|
|
146
|
-
*/
|
|
147
|
-
crypto: CryptoProvider;
|
|
148
|
-
|
|
149
|
-
/**
|
|
150
|
-
* Generate did:web format instead of did:key (requires additional setup)
|
|
151
|
-
*/
|
|
152
|
-
useDidWeb?: boolean;
|
|
153
|
-
|
|
154
|
-
/**
|
|
155
|
-
* Base URL for did:web (required if useDidWeb is true)
|
|
156
|
-
*/
|
|
157
|
-
didWebBaseUrl?: string;
|
|
158
|
-
}
|
|
159
|
-
|
|
160
|
-
/**
|
|
161
|
-
* User DID Manager
|
|
162
|
-
*
|
|
163
|
-
* Generates and manages user DIDs for MCP-I sessions.
|
|
164
|
-
* Supports both ephemeral (did:key) and persistent (did:web) formats.
|
|
165
|
-
*/
|
|
166
|
-
export class UserDidManager {
|
|
167
|
-
private config: UserDidManagerConfig;
|
|
168
|
-
private sessionDidCache = new Map<string, string>();
|
|
169
|
-
private sessionKeyPairCache = new Map<string, UserKeyPair>();
|
|
170
|
-
|
|
171
|
-
constructor(config: UserDidManagerConfig) {
|
|
172
|
-
this.config = config;
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
/**
|
|
176
|
-
* Get key pair for a session (for VC signing)
|
|
177
|
-
*
|
|
178
|
-
* Returns the key pair if available, null otherwise.
|
|
179
|
-
* Key pairs are stored when DIDs are generated.
|
|
180
|
-
*
|
|
181
|
-
* @param sessionId - MCP session ID
|
|
182
|
-
* @param oauthIdentity - Optional OAuth identity for persistent lookup
|
|
183
|
-
* @returns UserKeyPair or null if not available
|
|
184
|
-
*/
|
|
185
|
-
async getKeyPairForSession(
|
|
186
|
-
sessionId: string,
|
|
187
|
-
oauthIdentity?: OAuthIdentity | null
|
|
188
|
-
): Promise<UserKeyPair | null> {
|
|
189
|
-
// Check in-memory cache first
|
|
190
|
-
if (this.sessionKeyPairCache.has(sessionId)) {
|
|
191
|
-
return this.sessionKeyPairCache.get(sessionId)!;
|
|
192
|
-
}
|
|
193
|
-
|
|
194
|
-
// Check OAuth-based persistent storage if available
|
|
195
|
-
if (
|
|
196
|
-
oauthIdentity?.provider &&
|
|
197
|
-
oauthIdentity?.subject &&
|
|
198
|
-
this.config.storage?.getKeyPairByOAuth
|
|
199
|
-
) {
|
|
200
|
-
try {
|
|
201
|
-
const keyPair = await this.config.storage.getKeyPairByOAuth(
|
|
202
|
-
oauthIdentity.provider,
|
|
203
|
-
oauthIdentity.subject
|
|
204
|
-
);
|
|
205
|
-
if (keyPair) {
|
|
206
|
-
this.sessionKeyPairCache.set(sessionId, keyPair);
|
|
207
|
-
return keyPair;
|
|
208
|
-
}
|
|
209
|
-
} catch (error) {
|
|
210
|
-
console.warn('[UserDidManager] OAuth key pair lookup failed:', error);
|
|
211
|
-
}
|
|
212
|
-
}
|
|
213
|
-
|
|
214
|
-
// Check session storage if available
|
|
215
|
-
if (this.config.storage?.getKeyPair) {
|
|
216
|
-
try {
|
|
217
|
-
const keyPair = await this.config.storage.getKeyPair(sessionId);
|
|
218
|
-
if (keyPair) {
|
|
219
|
-
this.sessionKeyPairCache.set(sessionId, keyPair);
|
|
220
|
-
return keyPair;
|
|
221
|
-
}
|
|
222
|
-
} catch (error) {
|
|
223
|
-
console.warn('[UserDidManager] Session key pair lookup failed:', error);
|
|
224
|
-
}
|
|
225
|
-
}
|
|
226
|
-
|
|
227
|
-
return null;
|
|
228
|
-
}
|
|
229
|
-
|
|
230
|
-
/**
|
|
231
|
-
* Get user DID for a session (Phase 5: No ephemeral generation)
|
|
232
|
-
*
|
|
233
|
-
* If a user DID already exists for the session, it is returned.
|
|
234
|
-
* If OAuth identity is provided, checks for persistent user DID mapping.
|
|
235
|
-
* Returns null if no DID found - session stays anonymous until OAuth completes.
|
|
236
|
-
*
|
|
237
|
-
* @param sessionId - MCP session ID
|
|
238
|
-
* @param oauthIdentity - Optional OAuth identity for persistent user DID lookup
|
|
239
|
-
* @returns User DID (did:key format) or null if session is anonymous
|
|
240
|
-
*
|
|
241
|
-
* @remarks
|
|
242
|
-
* - Phase 5: Sessions start anonymous, no ephemeral DID generation
|
|
243
|
-
* - User DIDs are resolved via AgentShield after OAuth completes
|
|
244
|
-
* - Returns null if no existing DID found (instead of generating ephemeral)
|
|
245
|
-
*/
|
|
246
|
-
async getOrCreateUserDid(sessionId: string, oauthIdentity?: OAuthIdentity | null): Promise<string | null> {
|
|
247
|
-
// Check cache first
|
|
248
|
-
if (this.sessionDidCache.has(sessionId)) {
|
|
249
|
-
return this.sessionDidCache.get(sessionId)!;
|
|
250
|
-
}
|
|
251
|
-
|
|
252
|
-
// PRIORITY 1: If OAuth identity provided, check for persistent user DID mapping
|
|
253
|
-
if (oauthIdentity && oauthIdentity.provider && oauthIdentity.subject && this.config.storage?.getByOAuth) {
|
|
254
|
-
try {
|
|
255
|
-
const persistentUserDid = await this.config.storage.getByOAuth(
|
|
256
|
-
oauthIdentity.provider,
|
|
257
|
-
oauthIdentity.subject
|
|
258
|
-
);
|
|
259
|
-
if (persistentUserDid) {
|
|
260
|
-
console.log('[UserDidManager] Found persistent user DID from OAuth mapping:', {
|
|
261
|
-
provider: oauthIdentity.provider,
|
|
262
|
-
userDid: persistentUserDid.substring(0, 20) + '...',
|
|
263
|
-
});
|
|
264
|
-
// Cache it for this session
|
|
265
|
-
this.sessionDidCache.set(sessionId, persistentUserDid);
|
|
266
|
-
// Also store in session storage for faster future lookups
|
|
267
|
-
if (this.config.storage) {
|
|
268
|
-
try {
|
|
269
|
-
await this.config.storage.set(sessionId, persistentUserDid, 1800); // 30 minutes TTL
|
|
270
|
-
} catch (error) {
|
|
271
|
-
// Log but continue - DID is cached and will be returned
|
|
272
|
-
console.warn('[UserDidManager] Failed to cache persistent DID in session storage:', error);
|
|
273
|
-
}
|
|
274
|
-
}
|
|
275
|
-
return persistentUserDid;
|
|
276
|
-
}
|
|
277
|
-
} catch (error) {
|
|
278
|
-
// Log but continue - will check session storage or generate new DID
|
|
279
|
-
console.warn('[UserDidManager] OAuth lookup failed, falling back to session storage:', error);
|
|
280
|
-
}
|
|
281
|
-
}
|
|
282
|
-
|
|
283
|
-
// PRIORITY 2: Check session storage if available
|
|
284
|
-
if (this.config.storage) {
|
|
285
|
-
try {
|
|
286
|
-
const storedDid = await this.config.storage.get(sessionId);
|
|
287
|
-
if (storedDid) {
|
|
288
|
-
this.sessionDidCache.set(sessionId, storedDid);
|
|
289
|
-
// If OAuth identity provided but no persistent mapping found, create one now
|
|
290
|
-
if (oauthIdentity && oauthIdentity.provider && oauthIdentity.subject && this.config.storage.setByOAuth) {
|
|
291
|
-
try {
|
|
292
|
-
await this.config.storage.setByOAuth(
|
|
293
|
-
oauthIdentity.provider,
|
|
294
|
-
oauthIdentity.subject,
|
|
295
|
-
storedDid,
|
|
296
|
-
90 * 24 * 60 * 60 // 90 days TTL for persistent mapping
|
|
297
|
-
);
|
|
298
|
-
console.log('[UserDidManager] Created persistent OAuth mapping for existing user DID:', {
|
|
299
|
-
provider: oauthIdentity.provider,
|
|
300
|
-
userDid: storedDid.substring(0, 20) + '...',
|
|
301
|
-
});
|
|
302
|
-
} catch (error) {
|
|
303
|
-
// Log but continue - mapping creation failed, but DID is still valid
|
|
304
|
-
console.warn('[UserDidManager] Failed to create OAuth mapping:', error);
|
|
305
|
-
}
|
|
306
|
-
}
|
|
307
|
-
return storedDid;
|
|
308
|
-
}
|
|
309
|
-
} catch (error) {
|
|
310
|
-
// Log but continue - session will be anonymous
|
|
311
|
-
console.warn('[UserDidManager] Storage.get failed:', error);
|
|
312
|
-
}
|
|
313
|
-
}
|
|
314
|
-
|
|
315
|
-
// PHASE 5: No ephemeral DID generation - session stays anonymous
|
|
316
|
-
// User DID will be resolved via AgentShield after OAuth completes
|
|
317
|
-
return null;
|
|
318
|
-
}
|
|
319
|
-
|
|
320
|
-
/**
|
|
321
|
-
* Set user DID for a session (Phase 5: After OAuth resolution)
|
|
322
|
-
*
|
|
323
|
-
* Called after AgentShield identity/resolve returns a persistent user DID.
|
|
324
|
-
* Caches the DID and optionally stores in session storage.
|
|
325
|
-
*
|
|
326
|
-
* @param sessionId - MCP session ID
|
|
327
|
-
* @param userDid - Persistent user DID from AgentShield
|
|
328
|
-
* @param oauthIdentity - OAuth identity for creating persistent mappings
|
|
329
|
-
*/
|
|
330
|
-
async setUserDidForSession(
|
|
331
|
-
sessionId: string,
|
|
332
|
-
userDid: string,
|
|
333
|
-
oauthIdentity?: OAuthIdentity | null
|
|
334
|
-
): Promise<void> {
|
|
335
|
-
// Cache in memory
|
|
336
|
-
this.sessionDidCache.set(sessionId, userDid);
|
|
337
|
-
|
|
338
|
-
// Store in session storage if available
|
|
339
|
-
if (this.config.storage) {
|
|
340
|
-
try {
|
|
341
|
-
await this.config.storage.set(sessionId, userDid, 1800); // 30 minutes TTL
|
|
342
|
-
} catch (error) {
|
|
343
|
-
console.warn('[UserDidManager] Failed to store user DID in session storage:', error);
|
|
344
|
-
}
|
|
345
|
-
}
|
|
346
|
-
|
|
347
|
-
// Create OAuth mapping if provided
|
|
348
|
-
if (oauthIdentity?.provider && oauthIdentity?.subject && this.config.storage?.setByOAuth) {
|
|
349
|
-
try {
|
|
350
|
-
await this.config.storage.setByOAuth(
|
|
351
|
-
oauthIdentity.provider,
|
|
352
|
-
oauthIdentity.subject,
|
|
353
|
-
userDid,
|
|
354
|
-
90 * 24 * 60 * 60 // 90 days TTL for persistent mapping
|
|
355
|
-
);
|
|
356
|
-
console.log('[UserDidManager] Created OAuth → DID mapping:', {
|
|
357
|
-
provider: oauthIdentity.provider,
|
|
358
|
-
userDid: userDid.substring(0, 20) + '...',
|
|
359
|
-
});
|
|
360
|
-
} catch (error) {
|
|
361
|
-
console.warn('[UserDidManager] Failed to create OAuth mapping:', error);
|
|
362
|
-
}
|
|
363
|
-
}
|
|
364
|
-
}
|
|
365
|
-
|
|
366
|
-
/**
|
|
367
|
-
* Generate a new ephemeral user DID
|
|
368
|
-
*
|
|
369
|
-
* Uses did:key format by default for simplicity.
|
|
370
|
-
* did:web can be used if configured, but requires additional setup.
|
|
371
|
-
*/
|
|
372
|
-
private async generateUserDid(): Promise<string> {
|
|
373
|
-
const keyPairData = await this.generateUserDidWithKeyPair();
|
|
374
|
-
return keyPairData.did;
|
|
375
|
-
}
|
|
376
|
-
|
|
377
|
-
/**
|
|
378
|
-
* Generate a new ephemeral user DID with full key pair
|
|
379
|
-
*
|
|
380
|
-
* Returns the DID along with the key pair for VC signing.
|
|
381
|
-
* Uses did:key format by default.
|
|
382
|
-
*
|
|
383
|
-
* @returns UserKeyPair containing DID, public key, private key, and key ID
|
|
384
|
-
*/
|
|
385
|
-
private async generateUserDidWithKeyPair(): Promise<UserKeyPair> {
|
|
386
|
-
if (this.config.useDidWeb && this.config.didWebBaseUrl) {
|
|
387
|
-
// Generate did:web (requires web server setup)
|
|
388
|
-
// For now, fall back to did:key
|
|
389
|
-
// TODO: Implement did:web generation if needed
|
|
390
|
-
console.warn('[UserDidManager] did:web not yet implemented, using did:key');
|
|
391
|
-
}
|
|
392
|
-
|
|
393
|
-
// Generate Ed25519 keypair for user DID
|
|
394
|
-
const keyPair = await this.config.crypto.generateKeyPair();
|
|
395
|
-
|
|
396
|
-
// Extract public key bytes (32 bytes for Ed25519)
|
|
397
|
-
const publicKeyBytes = this.base64ToBytes(keyPair.publicKey);
|
|
398
|
-
|
|
399
|
-
// Generate did:key from public key
|
|
400
|
-
const did = this.generateDidKeyFromPublicKey(publicKeyBytes);
|
|
401
|
-
|
|
402
|
-
// Key ID is the DID with #keys-1 fragment (standard for did:key)
|
|
403
|
-
const keyId = `${did}#keys-1`;
|
|
404
|
-
|
|
405
|
-
return {
|
|
406
|
-
did,
|
|
407
|
-
publicKey: keyPair.publicKey,
|
|
408
|
-
privateKey: keyPair.privateKey,
|
|
409
|
-
keyId,
|
|
410
|
-
};
|
|
411
|
-
}
|
|
412
|
-
|
|
413
|
-
/**
|
|
414
|
-
* Generate did:key from Ed25519 public key bytes
|
|
415
|
-
* Following spec: https://w3c-ccg.github.io/did-method-key/
|
|
416
|
-
*
|
|
417
|
-
* Format: did:key:z<multibase-base58btc(<multicodec-ed25519-pub><publicKey>)>
|
|
418
|
-
*/
|
|
419
|
-
private generateDidKeyFromPublicKey(publicKeyBytes: Uint8Array): string {
|
|
420
|
-
// Ed25519 multicodec prefix (0xed 0x01)
|
|
421
|
-
const multicodecPrefix = new Uint8Array([0xed, 0x01]);
|
|
422
|
-
|
|
423
|
-
// Combine prefix + public key
|
|
424
|
-
const multicodecKey = new Uint8Array(multicodecPrefix.length + publicKeyBytes.length);
|
|
425
|
-
multicodecKey.set(multicodecPrefix);
|
|
426
|
-
multicodecKey.set(publicKeyBytes, multicodecPrefix.length);
|
|
427
|
-
|
|
428
|
-
// Base58 encode (using a simple implementation)
|
|
429
|
-
// Note: For production, consider using base-x library
|
|
430
|
-
const base58Encoded = this.base58Encode(multicodecKey);
|
|
431
|
-
|
|
432
|
-
// Add multibase prefix 'z' for base58-btc
|
|
433
|
-
return `did:key:z${base58Encoded}`;
|
|
434
|
-
}
|
|
435
|
-
|
|
436
|
-
/**
|
|
437
|
-
* Base58 encode (Bitcoin alphabet)
|
|
438
|
-
* Simple implementation for did:key generation
|
|
439
|
-
*/
|
|
440
|
-
private base58Encode(bytes: Uint8Array): string {
|
|
441
|
-
const alphabet = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz';
|
|
442
|
-
let num = BigInt(0);
|
|
443
|
-
|
|
444
|
-
// Convert bytes to big integer
|
|
445
|
-
for (let i = 0; i < bytes.length; i++) {
|
|
446
|
-
num = num * BigInt(256) + BigInt(bytes[i]);
|
|
447
|
-
}
|
|
448
|
-
|
|
449
|
-
// Convert to base58
|
|
450
|
-
let result = '';
|
|
451
|
-
while (num > 0) {
|
|
452
|
-
result = alphabet[Number(num % BigInt(58))] + result;
|
|
453
|
-
num = num / BigInt(58);
|
|
454
|
-
}
|
|
455
|
-
|
|
456
|
-
// Add leading zeros
|
|
457
|
-
for (let i = 0; i < bytes.length && bytes[i] === 0; i++) {
|
|
458
|
-
result = '1' + result;
|
|
459
|
-
}
|
|
460
|
-
|
|
461
|
-
return result;
|
|
462
|
-
}
|
|
463
|
-
|
|
464
|
-
/**
|
|
465
|
-
* Convert base64 string to Uint8Array
|
|
466
|
-
*/
|
|
467
|
-
private base64ToBytes(base64: string): Uint8Array {
|
|
468
|
-
if (typeof Buffer !== 'undefined') {
|
|
469
|
-
// Node.js environment
|
|
470
|
-
return new Uint8Array(Buffer.from(base64, 'base64'));
|
|
471
|
-
} else {
|
|
472
|
-
// Browser/Workers environment
|
|
473
|
-
const binaryString = atob(base64);
|
|
474
|
-
const bytes = new Uint8Array(binaryString.length);
|
|
475
|
-
for (let i = 0; i < binaryString.length; i++) {
|
|
476
|
-
bytes[i] = binaryString.charCodeAt(i);
|
|
477
|
-
}
|
|
478
|
-
return bytes;
|
|
479
|
-
}
|
|
480
|
-
}
|
|
481
|
-
|
|
482
|
-
/**
|
|
483
|
-
* Get user DID for a session without creating one
|
|
484
|
-
*/
|
|
485
|
-
async getUserDid(sessionId: string): Promise<string | null> {
|
|
486
|
-
// Check cache
|
|
487
|
-
if (this.sessionDidCache.has(sessionId)) {
|
|
488
|
-
return this.sessionDidCache.get(sessionId)!;
|
|
489
|
-
}
|
|
490
|
-
|
|
491
|
-
// Check storage
|
|
492
|
-
if (this.config.storage) {
|
|
493
|
-
const storedDid = await this.config.storage.get(sessionId);
|
|
494
|
-
if (storedDid) {
|
|
495
|
-
this.sessionDidCache.set(sessionId, storedDid);
|
|
496
|
-
return storedDid;
|
|
497
|
-
}
|
|
498
|
-
}
|
|
499
|
-
|
|
500
|
-
return null;
|
|
501
|
-
}
|
|
502
|
-
|
|
503
|
-
/**
|
|
504
|
-
* Clear user DID for a session
|
|
505
|
-
*/
|
|
506
|
-
async clearUserDid(sessionId: string): Promise<void> {
|
|
507
|
-
this.sessionDidCache.delete(sessionId);
|
|
508
|
-
|
|
509
|
-
if (this.config.storage) {
|
|
510
|
-
try {
|
|
511
|
-
await this.config.storage.delete(sessionId);
|
|
512
|
-
} catch (error) {
|
|
513
|
-
// Log but continue - cache is already cleared
|
|
514
|
-
console.warn('[UserDidManager] Storage.delete failed, continuing:', error);
|
|
515
|
-
}
|
|
516
|
-
}
|
|
517
|
-
}
|
|
518
|
-
|
|
519
|
-
/**
|
|
520
|
-
* Clear all cached user DIDs (useful for testing)
|
|
521
|
-
*/
|
|
522
|
-
clearCache(): void {
|
|
523
|
-
this.sessionDidCache.clear();
|
|
524
|
-
}
|
|
525
|
-
}
|
|
526
|
-
|