@kya-os/mcp-i-core 1.3.12 → 1.3.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (254) hide show
  1. package/dist/config/remote-config.js +9 -12
  2. package/dist/runtime/base.js +11 -0
  3. package/dist/services/access-control.service.js +5 -0
  4. package/dist/services/tool-protection.service.js +17 -8
  5. package/package.json +2 -2
  6. package/.turbo/turbo-build.log +0 -4
  7. package/.turbo/turbo-test$colon$coverage.log +0 -4586
  8. package/.turbo/turbo-test.log +0 -3169
  9. package/COMPLIANCE_IMPROVEMENT_REPORT.md +0 -483
  10. package/Composer 3.md +0 -615
  11. package/GPT-5.md +0 -1169
  12. package/OPUS-plan.md +0 -352
  13. package/PHASE_3_AND_4.1_SUMMARY.md +0 -585
  14. package/PHASE_3_SUMMARY.md +0 -317
  15. package/PHASE_4.1.3_SUMMARY.md +0 -428
  16. package/PHASE_4.1_COMPLETE.md +0 -525
  17. package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +0 -1240
  18. package/SCHEMA_COMPLIANCE_REPORT.md +0 -275
  19. package/TEST_PLAN.md +0 -571
  20. package/coverage/coverage-final.json +0 -60
  21. package/dist/cache/oauth-config-cache.d.ts.map +0 -1
  22. package/dist/cache/oauth-config-cache.js.map +0 -1
  23. package/dist/cache/tool-protection-cache.d.ts.map +0 -1
  24. package/dist/cache/tool-protection-cache.js.map +0 -1
  25. package/dist/compliance/index.d.ts.map +0 -1
  26. package/dist/compliance/index.js.map +0 -1
  27. package/dist/compliance/schema-registry.d.ts.map +0 -1
  28. package/dist/compliance/schema-registry.js.map +0 -1
  29. package/dist/compliance/schema-verifier.d.ts.map +0 -1
  30. package/dist/compliance/schema-verifier.js.map +0 -1
  31. package/dist/config/remote-config.d.ts.map +0 -1
  32. package/dist/config/remote-config.js.map +0 -1
  33. package/dist/config.d.ts.map +0 -1
  34. package/dist/config.js.map +0 -1
  35. package/dist/delegation/audience-validator.d.ts.map +0 -1
  36. package/dist/delegation/audience-validator.js.map +0 -1
  37. package/dist/delegation/bitstring.d.ts.map +0 -1
  38. package/dist/delegation/bitstring.js.map +0 -1
  39. package/dist/delegation/cascading-revocation.d.ts.map +0 -1
  40. package/dist/delegation/cascading-revocation.js.map +0 -1
  41. package/dist/delegation/delegation-graph.d.ts.map +0 -1
  42. package/dist/delegation/delegation-graph.js.map +0 -1
  43. package/dist/delegation/did-key-resolver.d.ts.map +0 -1
  44. package/dist/delegation/did-key-resolver.js.map +0 -1
  45. package/dist/delegation/index.d.ts.map +0 -1
  46. package/dist/delegation/index.js.map +0 -1
  47. package/dist/delegation/statuslist-manager.d.ts.map +0 -1
  48. package/dist/delegation/statuslist-manager.js.map +0 -1
  49. package/dist/delegation/storage/index.d.ts.map +0 -1
  50. package/dist/delegation/storage/index.js.map +0 -1
  51. package/dist/delegation/storage/memory-graph-storage.d.ts.map +0 -1
  52. package/dist/delegation/storage/memory-graph-storage.js.map +0 -1
  53. package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +0 -1
  54. package/dist/delegation/storage/memory-statuslist-storage.js.map +0 -1
  55. package/dist/delegation/utils.d.ts.map +0 -1
  56. package/dist/delegation/utils.js.map +0 -1
  57. package/dist/delegation/vc-issuer.d.ts.map +0 -1
  58. package/dist/delegation/vc-issuer.js.map +0 -1
  59. package/dist/delegation/vc-verifier.d.ts.map +0 -1
  60. package/dist/delegation/vc-verifier.js.map +0 -1
  61. package/dist/identity/idp-token-resolver.d.ts.map +0 -1
  62. package/dist/identity/idp-token-resolver.js.map +0 -1
  63. package/dist/identity/idp-token-storage.interface.d.ts.map +0 -1
  64. package/dist/identity/idp-token-storage.interface.js.map +0 -1
  65. package/dist/identity/user-did-manager.d.ts.map +0 -1
  66. package/dist/identity/user-did-manager.js.map +0 -1
  67. package/dist/index.d.ts.map +0 -1
  68. package/dist/index.js.map +0 -1
  69. package/dist/providers/base.d.ts.map +0 -1
  70. package/dist/providers/base.js.map +0 -1
  71. package/dist/providers/memory.d.ts.map +0 -1
  72. package/dist/providers/memory.js.map +0 -1
  73. package/dist/runtime/audit-logger.d.ts.map +0 -1
  74. package/dist/runtime/audit-logger.js.map +0 -1
  75. package/dist/runtime/base.d.ts.map +0 -1
  76. package/dist/runtime/base.js.map +0 -1
  77. package/dist/services/access-control.service.d.ts.map +0 -1
  78. package/dist/services/access-control.service.js.map +0 -1
  79. package/dist/services/authorization/authorization-registry.d.ts.map +0 -1
  80. package/dist/services/authorization/authorization-registry.js.map +0 -1
  81. package/dist/services/authorization/types.d.ts.map +0 -1
  82. package/dist/services/authorization/types.js.map +0 -1
  83. package/dist/services/batch-delegation.service.d.ts.map +0 -1
  84. package/dist/services/batch-delegation.service.js.map +0 -1
  85. package/dist/services/crypto.service.d.ts.map +0 -1
  86. package/dist/services/crypto.service.js.map +0 -1
  87. package/dist/services/errors.d.ts.map +0 -1
  88. package/dist/services/errors.js.map +0 -1
  89. package/dist/services/index.d.ts.map +0 -1
  90. package/dist/services/index.js.map +0 -1
  91. package/dist/services/oauth-config.service.d.ts.map +0 -1
  92. package/dist/services/oauth-config.service.js.map +0 -1
  93. package/dist/services/oauth-provider-registry.d.ts.map +0 -1
  94. package/dist/services/oauth-provider-registry.js.map +0 -1
  95. package/dist/services/oauth-service.d.ts.map +0 -1
  96. package/dist/services/oauth-service.js.map +0 -1
  97. package/dist/services/oauth-token-retrieval.service.d.ts.map +0 -1
  98. package/dist/services/oauth-token-retrieval.service.js.map +0 -1
  99. package/dist/services/proof-verifier.d.ts.map +0 -1
  100. package/dist/services/proof-verifier.js.map +0 -1
  101. package/dist/services/provider-resolver.d.ts.map +0 -1
  102. package/dist/services/provider-resolver.js.map +0 -1
  103. package/dist/services/provider-validator.d.ts.map +0 -1
  104. package/dist/services/provider-validator.js.map +0 -1
  105. package/dist/services/session-registration.service.d.ts.map +0 -1
  106. package/dist/services/session-registration.service.js.map +0 -1
  107. package/dist/services/storage.service.d.ts.map +0 -1
  108. package/dist/services/storage.service.js.map +0 -1
  109. package/dist/services/tool-context-builder.d.ts.map +0 -1
  110. package/dist/services/tool-context-builder.js.map +0 -1
  111. package/dist/services/tool-protection.service.d.ts.map +0 -1
  112. package/dist/services/tool-protection.service.js.map +0 -1
  113. package/dist/types/oauth-required-error.d.ts.map +0 -1
  114. package/dist/types/oauth-required-error.js.map +0 -1
  115. package/dist/types/tool-protection.d.ts.map +0 -1
  116. package/dist/types/tool-protection.js.map +0 -1
  117. package/dist/utils/base58.d.ts.map +0 -1
  118. package/dist/utils/base58.js.map +0 -1
  119. package/dist/utils/base64.d.ts.map +0 -1
  120. package/dist/utils/base64.js.map +0 -1
  121. package/dist/utils/cors.d.ts.map +0 -1
  122. package/dist/utils/cors.js.map +0 -1
  123. package/dist/utils/did-helpers.d.ts.map +0 -1
  124. package/dist/utils/did-helpers.js.map +0 -1
  125. package/dist/utils/index.d.ts.map +0 -1
  126. package/dist/utils/index.js.map +0 -1
  127. package/dist/utils/storage-keys.d.ts.map +0 -1
  128. package/dist/utils/storage-keys.js.map +0 -1
  129. package/docs/API_REFERENCE.md +0 -1362
  130. package/docs/COMPLIANCE_MATRIX.md +0 -691
  131. package/docs/STATUSLIST2021_GUIDE.md +0 -696
  132. package/docs/W3C_VC_DELEGATION_GUIDE.md +0 -710
  133. package/src/__tests__/cache/tool-protection-cache.test.ts +0 -640
  134. package/src/__tests__/config/provider-runtime-config.test.ts +0 -309
  135. package/src/__tests__/delegation-e2e.test.ts +0 -690
  136. package/src/__tests__/identity/user-did-manager.test.ts +0 -232
  137. package/src/__tests__/index.test.ts +0 -56
  138. package/src/__tests__/integration/full-flow.test.ts +0 -789
  139. package/src/__tests__/integration.test.ts +0 -281
  140. package/src/__tests__/providers/base.test.ts +0 -173
  141. package/src/__tests__/providers/memory.test.ts +0 -319
  142. package/src/__tests__/regression/phase2-regression.test.ts +0 -429
  143. package/src/__tests__/runtime/audit-logger.test.ts +0 -154
  144. package/src/__tests__/runtime/base-extensions.test.ts +0 -595
  145. package/src/__tests__/runtime/base.test.ts +0 -869
  146. package/src/__tests__/runtime/delegation-flow.test.ts +0 -164
  147. package/src/__tests__/runtime/proof-client-did.test.ts +0 -376
  148. package/src/__tests__/runtime/route-interception.test.ts +0 -686
  149. package/src/__tests__/runtime/tool-protection-enforcement.test.ts +0 -908
  150. package/src/__tests__/services/agentshield-integration.test.ts +0 -791
  151. package/src/__tests__/services/cache-busting.test.ts +0 -125
  152. package/src/__tests__/services/oauth-service-pkce.test.ts +0 -556
  153. package/src/__tests__/services/provider-resolver-edge-cases.test.ts +0 -591
  154. package/src/__tests__/services/tool-protection-merged-config.test.ts +0 -485
  155. package/src/__tests__/services/tool-protection-oauth-provider.test.ts +0 -480
  156. package/src/__tests__/services/tool-protection.service.test.ts +0 -1373
  157. package/src/__tests__/utils/mock-providers.ts +0 -340
  158. package/src/cache/oauth-config-cache.d.ts +0 -69
  159. package/src/cache/oauth-config-cache.d.ts.map +0 -1
  160. package/src/cache/oauth-config-cache.js.map +0 -1
  161. package/src/cache/oauth-config-cache.ts +0 -123
  162. package/src/cache/tool-protection-cache.ts +0 -171
  163. package/src/compliance/EXAMPLE.md +0 -412
  164. package/src/compliance/__tests__/schema-verifier.test.ts +0 -797
  165. package/src/compliance/index.ts +0 -8
  166. package/src/compliance/schema-registry.ts +0 -460
  167. package/src/compliance/schema-verifier.ts +0 -708
  168. package/src/config/__tests__/merged-config.spec.ts +0 -445
  169. package/src/config/__tests__/remote-config.spec.ts +0 -268
  170. package/src/config/remote-config.ts +0 -264
  171. package/src/config.ts +0 -312
  172. package/src/delegation/__tests__/audience-validator.test.ts +0 -112
  173. package/src/delegation/__tests__/bitstring.test.ts +0 -346
  174. package/src/delegation/__tests__/cascading-revocation.test.ts +0 -628
  175. package/src/delegation/__tests__/delegation-graph.test.ts +0 -584
  176. package/src/delegation/__tests__/did-key-resolver.test.ts +0 -265
  177. package/src/delegation/__tests__/utils.test.ts +0 -152
  178. package/src/delegation/__tests__/vc-issuer.test.ts +0 -442
  179. package/src/delegation/__tests__/vc-verifier.test.ts +0 -922
  180. package/src/delegation/audience-validator.ts +0 -52
  181. package/src/delegation/bitstring.ts +0 -278
  182. package/src/delegation/cascading-revocation.ts +0 -370
  183. package/src/delegation/delegation-graph.ts +0 -299
  184. package/src/delegation/did-key-resolver.ts +0 -179
  185. package/src/delegation/index.ts +0 -14
  186. package/src/delegation/statuslist-manager.ts +0 -353
  187. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +0 -366
  188. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +0 -228
  189. package/src/delegation/storage/index.ts +0 -9
  190. package/src/delegation/storage/memory-graph-storage.ts +0 -178
  191. package/src/delegation/storage/memory-statuslist-storage.ts +0 -77
  192. package/src/delegation/utils.ts +0 -221
  193. package/src/delegation/vc-issuer.ts +0 -232
  194. package/src/delegation/vc-verifier.ts +0 -568
  195. package/src/identity/idp-token-resolver.ts +0 -181
  196. package/src/identity/idp-token-storage.interface.ts +0 -94
  197. package/src/identity/user-did-manager.ts +0 -526
  198. package/src/index.ts +0 -310
  199. package/src/providers/base.d.ts +0 -91
  200. package/src/providers/base.d.ts.map +0 -1
  201. package/src/providers/base.js.map +0 -1
  202. package/src/providers/base.ts +0 -96
  203. package/src/providers/memory.ts +0 -142
  204. package/src/runtime/audit-logger.ts +0 -39
  205. package/src/runtime/base.ts +0 -1392
  206. package/src/services/__tests__/access-control.integration.test.ts +0 -443
  207. package/src/services/__tests__/access-control.proof-response-validation.test.ts +0 -578
  208. package/src/services/__tests__/access-control.service.test.ts +0 -970
  209. package/src/services/__tests__/batch-delegation.service.test.ts +0 -351
  210. package/src/services/__tests__/crypto.service.test.ts +0 -531
  211. package/src/services/__tests__/oauth-provider-registry.test.ts +0 -142
  212. package/src/services/__tests__/proof-verifier.integration.test.ts +0 -485
  213. package/src/services/__tests__/proof-verifier.test.ts +0 -489
  214. package/src/services/__tests__/provider-resolution.integration.test.ts +0 -202
  215. package/src/services/__tests__/provider-resolver.test.ts +0 -213
  216. package/src/services/__tests__/storage.service.test.ts +0 -358
  217. package/src/services/access-control.service.ts +0 -990
  218. package/src/services/authorization/authorization-registry.ts +0 -66
  219. package/src/services/authorization/types.ts +0 -71
  220. package/src/services/batch-delegation.service.ts +0 -137
  221. package/src/services/crypto.service.ts +0 -302
  222. package/src/services/errors.ts +0 -76
  223. package/src/services/index.ts +0 -18
  224. package/src/services/oauth-config.service.d.ts +0 -53
  225. package/src/services/oauth-config.service.d.ts.map +0 -1
  226. package/src/services/oauth-config.service.js.map +0 -1
  227. package/src/services/oauth-config.service.ts +0 -192
  228. package/src/services/oauth-provider-registry.d.ts +0 -57
  229. package/src/services/oauth-provider-registry.d.ts.map +0 -1
  230. package/src/services/oauth-provider-registry.js.map +0 -1
  231. package/src/services/oauth-provider-registry.ts +0 -141
  232. package/src/services/oauth-service.ts +0 -544
  233. package/src/services/oauth-token-retrieval.service.ts +0 -245
  234. package/src/services/proof-verifier.ts +0 -478
  235. package/src/services/provider-resolver.d.ts +0 -48
  236. package/src/services/provider-resolver.d.ts.map +0 -1
  237. package/src/services/provider-resolver.js.map +0 -1
  238. package/src/services/provider-resolver.ts +0 -146
  239. package/src/services/provider-validator.ts +0 -170
  240. package/src/services/session-registration.service.ts +0 -251
  241. package/src/services/storage.service.ts +0 -566
  242. package/src/services/tool-context-builder.ts +0 -237
  243. package/src/services/tool-protection.service.ts +0 -1070
  244. package/src/types/oauth-required-error.ts +0 -63
  245. package/src/types/tool-protection.ts +0 -155
  246. package/src/utils/__tests__/did-helpers.test.ts +0 -156
  247. package/src/utils/base58.ts +0 -109
  248. package/src/utils/base64.ts +0 -148
  249. package/src/utils/cors.ts +0 -83
  250. package/src/utils/did-helpers.ts +0 -210
  251. package/src/utils/index.ts +0 -8
  252. package/src/utils/storage-keys.ts +0 -278
  253. package/tsconfig.json +0 -21
  254. package/vitest.config.ts +0 -56
@@ -1,531 +0,0 @@
1
- /**
2
- * Tests for CryptoService
3
- *
4
- * Comprehensive test coverage for cryptographic operations service.
5
- * Tests verifyEd25519() and verifyJWS() with various scenarios.
6
- *
7
- * Test Coverage Requirements: 100% - All security-critical code paths
8
- */
9
-
10
- import { describe, it, expect, beforeEach, vi } from 'vitest';
11
- import { CryptoService } from '../crypto.service.js';
12
- import type { CryptoProvider } from '../../providers/base.js';
13
- import type { Ed25519JWK } from '../crypto.service.js';
14
-
15
- describe('CryptoService', () => {
16
- let cryptoService: CryptoService;
17
- let mockCryptoProvider: CryptoProvider;
18
-
19
- beforeEach(() => {
20
- mockCryptoProvider = {
21
- sign: vi.fn(),
22
- verify: vi.fn(),
23
- generateKeyPair: vi.fn(),
24
- hash: vi.fn(),
25
- randomBytes: vi.fn(),
26
- };
27
- cryptoService = new CryptoService(mockCryptoProvider);
28
- });
29
-
30
- describe('verifyEd25519', () => {
31
- it('should return true for valid signature', async () => {
32
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
33
-
34
- const result = await cryptoService.verifyEd25519(
35
- new Uint8Array([1, 2, 3]),
36
- new Uint8Array([4, 5, 6]),
37
- 'base64PublicKey'
38
- );
39
-
40
- expect(result).toBe(true);
41
- expect(mockCryptoProvider.verify).toHaveBeenCalledWith(
42
- new Uint8Array([1, 2, 3]),
43
- new Uint8Array([4, 5, 6]),
44
- 'base64PublicKey'
45
- );
46
- });
47
-
48
- it('should return false for invalid signature', async () => {
49
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
50
-
51
- const result = await cryptoService.verifyEd25519(
52
- new Uint8Array([1, 2, 3]),
53
- new Uint8Array([4, 5, 6]),
54
- 'base64PublicKey'
55
- );
56
-
57
- expect(result).toBe(false);
58
- });
59
-
60
- it('should return false on verification error', async () => {
61
- mockCryptoProvider.verify = vi.fn().mockRejectedValue(
62
- new Error('Verification failed')
63
- );
64
-
65
- const result = await cryptoService.verifyEd25519(
66
- new Uint8Array([1, 2, 3]),
67
- new Uint8Array([4, 5, 6]),
68
- 'base64PublicKey'
69
- );
70
-
71
- expect(result).toBe(false);
72
- });
73
-
74
- it('should handle empty data', async () => {
75
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
76
-
77
- const result = await cryptoService.verifyEd25519(
78
- new Uint8Array(0),
79
- new Uint8Array([4, 5, 6]),
80
- 'base64PublicKey'
81
- );
82
-
83
- expect(result).toBe(true);
84
- });
85
- });
86
-
87
- describe('parseJWS', () => {
88
- it('should parse valid full compact JWS', () => {
89
- const header = { alg: 'EdDSA', typ: 'JWT' };
90
- const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
91
- // Properly encode as base64url
92
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
93
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
94
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
95
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
96
- const signatureB64 = Buffer.from('signature').toString('base64')
97
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
98
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
99
-
100
- const parsed = cryptoService.parseJWS(jws);
101
-
102
- expect(parsed.header).toEqual(header);
103
- expect(parsed.payload).toEqual(payload);
104
- expect(parsed.signingInput).toBe(`${headerB64}.${payloadB64}`);
105
- expect(parsed.signatureBytes).toBeInstanceOf(Uint8Array);
106
- });
107
-
108
- it('should throw error for invalid JWS format', () => {
109
- const invalidJws = 'not.a.jws';
110
-
111
- // This will fail during JSON parsing, not format check
112
- expect(() => cryptoService.parseJWS(invalidJws)).toThrow();
113
- });
114
-
115
- it('should throw error for JWS with wrong number of parts', () => {
116
- const invalidJws = 'header.payload';
117
-
118
- expect(() => cryptoService.parseJWS(invalidJws)).toThrow('Invalid JWS format');
119
- });
120
-
121
- it('should handle empty payload', () => {
122
- const header = { alg: 'EdDSA' };
123
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
124
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
125
- const signatureB64 = Buffer.from('signature').toString('base64')
126
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
127
- const jws = `${headerB64}..${signatureB64}`;
128
-
129
- const parsed = cryptoService.parseJWS(jws);
130
-
131
- expect(parsed.header).toEqual(header);
132
- expect(parsed.payload).toBeUndefined();
133
- });
134
- });
135
-
136
- describe('verifyJWS', () => {
137
- const validJwk: Ed25519JWK = {
138
- kty: 'OKP',
139
- crv: 'Ed25519',
140
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ', // Example base64url public key (32 bytes when decoded)
141
- };
142
-
143
- // Create a valid JWS for testing
144
- const createValidJWS = (): string => {
145
- const header = { alg: 'EdDSA', typ: 'JWT' };
146
- const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
147
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
148
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
149
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
150
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
151
- const signatureB64 = Buffer.from('signature').toString('base64')
152
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
153
- return `${headerB64}.${payloadB64}.${signatureB64}`;
154
- };
155
-
156
- it('should verify valid full compact JWS', async () => {
157
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
158
- const validJws = createValidJWS();
159
-
160
- const result = await cryptoService.verifyJWS(validJws, validJwk);
161
-
162
- expect(result).toBe(true);
163
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
164
- });
165
-
166
- it('should reject invalid JWK format', async () => {
167
- const invalidJwk = { kty: 'RSA' } as any;
168
- const validJws = createValidJWS();
169
-
170
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
171
-
172
- expect(result).toBe(false);
173
- expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
174
- });
175
-
176
- it('should reject JWK with wrong kty', async () => {
177
- const invalidJwk = {
178
- kty: 'RSA',
179
- crv: 'Ed25519',
180
- x: 'test',
181
- } as any;
182
- const validJws = createValidJWS();
183
-
184
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
185
-
186
- expect(result).toBe(false);
187
- });
188
-
189
- it('should reject JWK with wrong crv', async () => {
190
- const invalidJwk = {
191
- kty: 'OKP',
192
- crv: 'P-256',
193
- x: 'test',
194
- } as any;
195
- const validJws = createValidJWS();
196
-
197
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
198
-
199
- expect(result).toBe(false);
200
- });
201
-
202
- it('should reject JWK with missing x field', async () => {
203
- const invalidJwk = {
204
- kty: 'OKP',
205
- crv: 'Ed25519',
206
- } as any;
207
- const validJws = createValidJWS();
208
-
209
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
210
-
211
- expect(result).toBe(false);
212
- });
213
-
214
- it('should reject JWK with empty x field', async () => {
215
- const invalidJwk = {
216
- kty: 'OKP',
217
- crv: 'Ed25519',
218
- x: '',
219
- };
220
- const validJws = createValidJWS();
221
-
222
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
223
-
224
- expect(result).toBe(false);
225
- });
226
-
227
- it('should reject malformed JWS', async () => {
228
- const malformedJws = 'not.a.jws';
229
-
230
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
231
-
232
- expect(result).toBe(false);
233
- });
234
-
235
- it('should reject non-EdDSA algorithms', async () => {
236
- const header = { alg: 'RS256', typ: 'JWT' };
237
- const payload = { sub: 'did:key:z123' };
238
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
239
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
240
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
241
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
242
- const signatureB64 = Buffer.from('signature').toString('base64')
243
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
244
- const rsaJws = `${headerB64}.${payloadB64}.${signatureB64}`;
245
-
246
- const result = await cryptoService.verifyJWS(rsaJws, validJwk);
247
-
248
- expect(result).toBe(false);
249
- expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
250
- });
251
-
252
- it('should reject HS256 algorithm', async () => {
253
- const header = { alg: 'HS256', typ: 'JWT' };
254
- const payload = { sub: 'did:key:z123' };
255
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
256
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
257
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
258
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
259
- const signatureB64 = Buffer.from('signature').toString('base64')
260
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
261
- const hs256Jws = `${headerB64}.${payloadB64}.${signatureB64}`;
262
-
263
- const result = await cryptoService.verifyJWS(hs256Jws, validJwk);
264
-
265
- expect(result).toBe(false);
266
- });
267
-
268
- it('should handle empty JWS components', async () => {
269
- const emptyJws = '..';
270
-
271
- const result = await cryptoService.verifyJWS(emptyJws, validJwk);
272
-
273
- expect(result).toBe(false);
274
- });
275
-
276
- it('should handle malformed JWS - single part', async () => {
277
- const malformedJws = 'singlepart';
278
-
279
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
280
-
281
- expect(result).toBe(false);
282
- });
283
-
284
- it('should handle malformed JWS - two parts', async () => {
285
- const malformedJws = 'header.payload';
286
-
287
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
288
-
289
- expect(result).toBe(false);
290
- });
291
-
292
- it('should handle malformed JWS - four parts', async () => {
293
- const header = { alg: 'EdDSA' };
294
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
295
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
296
- const payloadB64 = Buffer.from('payload').toString('base64')
297
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
298
- const signatureB64 = Buffer.from('signature').toString('base64')
299
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
300
- const malformedJws = `${headerB64}.${payloadB64}.${signatureB64}.extra`;
301
-
302
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
303
-
304
- expect(result).toBe(false);
305
- });
306
-
307
- it('should handle malformed JWS - invalid JSON header', async () => {
308
- const invalidHeaderB64 = Buffer.from('notjson').toString('base64')
309
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
310
- const payloadB64 = Buffer.from('payload').toString('base64')
311
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
312
- const signatureB64 = Buffer.from('signature').toString('base64')
313
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
314
- const malformedJws = `${invalidHeaderB64}.${payloadB64}.${signatureB64}`;
315
-
316
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
317
-
318
- expect(result).toBe(false);
319
- });
320
-
321
- it('should handle malformed JWS - invalid base64', async () => {
322
- // Don't mock verify - the function should catch the error and return false
323
- // before it gets to verification
324
- const header = { alg: 'EdDSA' };
325
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
326
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
327
- const invalidBase64 = 'notbase64!!!';
328
- const signatureB64 = Buffer.from('signature').toString('base64')
329
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
330
- const malformedJws = `${headerB64}.${invalidBase64}.${signatureB64}`;
331
-
332
- // parseJWS will throw when trying to decode invalid base64 payload
333
- // This should be caught and return false
334
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
335
-
336
- expect(result).toBe(false);
337
- // verify should not be called because parseJWS should throw
338
- expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
339
- });
340
-
341
- it('should validate expectedKid option', async () => {
342
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
343
- const validJws = createValidJWS();
344
- const jwkWithKid: Ed25519JWK = {
345
- kty: 'OKP',
346
- crv: 'Ed25519',
347
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
348
- kid: 'key-1',
349
- };
350
-
351
- // Should succeed with matching kid
352
- const result1 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
353
- expectedKid: 'key-1',
354
- });
355
- expect(result1).toBe(true);
356
-
357
- // Should fail with mismatched kid
358
- const result2 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
359
- expectedKid: 'key-2',
360
- });
361
- expect(result2).toBe(false);
362
- });
363
-
364
- it('should validate alg option', async () => {
365
- const header = { alg: 'EdDSA', typ: 'JWT' };
366
- const payload = { sub: 'did:key:z123' };
367
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
368
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
369
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
370
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
371
- const signatureB64 = Buffer.from('signature').toString('base64')
372
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
373
- const validJws = `${headerB64}.${payloadB64}.${signatureB64}`;
374
-
375
- // Should succeed with matching alg
376
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
377
- const result1 = await cryptoService.verifyJWS(validJws, validJwk, {
378
- alg: 'EdDSA',
379
- });
380
- expect(result1).toBe(true);
381
-
382
- // Should fail with mismatched alg (even if header says EdDSA)
383
- const result2 = await cryptoService.verifyJWS(validJws, validJwk, {
384
- alg: 'RS256' as any,
385
- });
386
- expect(result2).toBe(false);
387
- });
388
-
389
- it('should validate Ed25519 key length', async () => {
390
- const invalidLengthJwk = {
391
- kty: 'OKP' as const,
392
- crv: 'Ed25519' as const,
393
- x: 'c2hvcnQ', // "short" in base64 - too short for Ed25519 (only 5 bytes)
394
- };
395
-
396
- const validJws = createValidJWS();
397
-
398
- const result = await cryptoService.verifyJWS(validJws, invalidLengthJwk);
399
-
400
- expect(result).toBe(false);
401
- });
402
-
403
- it('should handle detached payload', async () => {
404
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
405
- const header = { alg: 'EdDSA' };
406
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
407
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
408
- const signatureB64 = Buffer.from('signature').toString('base64')
409
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
410
- const detachedJws = `${headerB64}..${signatureB64}`;
411
- const detachedPayload = JSON.stringify({ sub: 'did:key:z123' });
412
-
413
- const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
414
- detachedPayload,
415
- });
416
-
417
- expect(result).toBe(true);
418
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
419
- });
420
-
421
- it('should handle detached payload as Uint8Array', async () => {
422
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
423
- const header = { alg: 'EdDSA' };
424
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
425
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
426
- const signatureB64 = Buffer.from('signature').toString('base64')
427
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
428
- const detachedJws = `${headerB64}..${signatureB64}`;
429
- const detachedPayloadBytes = new TextEncoder().encode(JSON.stringify({ sub: 'did:key:z123' }));
430
-
431
- const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
432
- detachedPayload: detachedPayloadBytes,
433
- });
434
-
435
- expect(result).toBe(true);
436
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
437
- });
438
-
439
- it('should handle signature verification failure', async () => {
440
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
441
- const validJws = createValidJWS();
442
-
443
- const result = await cryptoService.verifyJWS(validJws, validJwk);
444
-
445
- expect(result).toBe(false);
446
- });
447
-
448
- it('should handle signature verification error', async () => {
449
- mockCryptoProvider.verify = vi.fn().mockRejectedValue(new Error('Crypto error'));
450
- const validJws = createValidJWS();
451
-
452
- const result = await cryptoService.verifyJWS(validJws, validJwk);
453
-
454
- expect(result).toBe(false);
455
- });
456
-
457
- it('should accept JWK with optional kid field', async () => {
458
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
459
- const jwkWithKid: Ed25519JWK = {
460
- kty: 'OKP',
461
- crv: 'Ed25519',
462
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
463
- kid: 'key-1',
464
- };
465
- const validJws = createValidJWS();
466
-
467
- const result = await cryptoService.verifyJWS(validJws, jwkWithKid);
468
-
469
- expect(result).toBe(true);
470
- });
471
-
472
- it('should accept JWK with optional use field', async () => {
473
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
474
- const jwkWithUse: Ed25519JWK = {
475
- kty: 'OKP',
476
- crv: 'Ed25519',
477
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
478
- use: 'sig',
479
- };
480
- const validJws = createValidJWS();
481
-
482
- const result = await cryptoService.verifyJWS(validJws, jwkWithUse);
483
-
484
- expect(result).toBe(true);
485
- });
486
- });
487
-
488
- describe('base64url edge cases', () => {
489
- const validJwk: Ed25519JWK = {
490
- kty: 'OKP',
491
- crv: 'Ed25519',
492
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
493
- };
494
-
495
- it('should handle base64url with no padding', async () => {
496
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
497
- const header = { alg: 'EdDSA' };
498
- const payload = { test: 'Hello' };
499
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
500
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
501
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
502
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
503
- const signatureB64 = Buffer.from('signature').toString('base64')
504
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
505
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
506
-
507
- const result = await cryptoService.verifyJWS(jws, validJwk);
508
-
509
- // Should not throw, even if padding is missing
510
- expect(typeof result).toBe('boolean');
511
- });
512
-
513
- it('should handle base64url with padding', async () => {
514
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
515
- const header = { alg: 'EdDSA' };
516
- const payload = { test: 'Hello World!' };
517
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
518
- .replace(/\+/g, '-').replace(/\//g, '_');
519
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
520
- .replace(/\+/g, '-').replace(/\//g, '_');
521
- const signatureB64 = Buffer.from('signature').toString('base64')
522
- .replace(/\+/g, '-').replace(/\//g, '_');
523
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
524
-
525
- const result = await cryptoService.verifyJWS(jws, validJwk);
526
-
527
- expect(typeof result).toBe('boolean');
528
- });
529
- });
530
- });
531
-
@@ -1,142 +0,0 @@
1
- /**
2
- * OAuth Provider Registry Tests
3
- *
4
- * @package @kya-os/mcp-i-core
5
- */
6
-
7
- import { describe, it, expect, beforeEach, vi } from "vitest";
8
- import { OAuthProviderRegistry } from "../oauth-provider-registry.js";
9
- import { OAuthConfigService } from "../oauth-config.service.js";
10
- import type { OAuthConfig, OAuthProvider } from "@kya-os/contracts/config";
11
-
12
- describe("OAuthProviderRegistry", () => {
13
- let mockConfigService: OAuthConfigService;
14
- let registry: OAuthProviderRegistry;
15
-
16
- const mockOAuthConfig: OAuthConfig = {
17
- providers: {
18
- github: {
19
- clientId: "github_client_id",
20
- authorizationUrl: "https://github.com/login/oauth/authorize",
21
- tokenUrl: "https://github.com/login/oauth/access_token",
22
- supportsPKCE: true,
23
- requiresClientSecret: false,
24
- scopes: ["repo", "read:user"],
25
- defaultScopes: ["repo"],
26
- },
27
- google: {
28
- clientId: "google_client_id",
29
- authorizationUrl: "https://accounts.google.com/o/oauth2/v2/auth",
30
- tokenUrl: "https://oauth2.googleapis.com/token",
31
- supportsPKCE: true,
32
- requiresClientSecret: false,
33
- scopes: ["email", "profile"],
34
- defaultScopes: ["email"],
35
- },
36
- },
37
- };
38
-
39
- beforeEach(() => {
40
- mockConfigService = {
41
- getOAuthConfig: vi.fn().mockResolvedValue(mockOAuthConfig),
42
- } as any;
43
-
44
- registry = new OAuthProviderRegistry(mockConfigService);
45
- });
46
-
47
- describe("loadFromAgentShield", () => {
48
- it("should load providers from AgentShield config", async () => {
49
- await registry.loadFromAgentShield("test-project");
50
-
51
- expect(mockConfigService.getOAuthConfig).toHaveBeenCalledWith(
52
- "test-project"
53
- );
54
- expect(registry.hasProvider("github")).toBe(true);
55
- expect(registry.hasProvider("google")).toBe(true);
56
- });
57
-
58
- it("should clear existing providers before loading new ones", async () => {
59
- await registry.loadFromAgentShield("test-project");
60
- expect(registry.getAllProviders().length).toBe(2);
61
-
62
- const newConfig: OAuthConfig = {
63
- providers: {
64
- microsoft: {
65
- clientId: "microsoft_client_id",
66
- authorizationUrl: "https://login.microsoftonline.com/oauth2/v2.0/authorize",
67
- tokenUrl: "https://login.microsoftonline.com/oauth2/v2.0/token",
68
- supportsPKCE: true,
69
- requiresClientSecret: false,
70
- },
71
- },
72
- };
73
-
74
- (mockConfigService.getOAuthConfig as any).mockResolvedValueOnce(newConfig);
75
- await registry.loadFromAgentShield("test-project-2");
76
-
77
- expect(registry.getAllProviders().length).toBe(1);
78
- expect(registry.hasProvider("github")).toBe(false);
79
- expect(registry.hasProvider("microsoft")).toBe(true);
80
- });
81
- });
82
-
83
- describe("getProvider", () => {
84
- it("should return provider by name", async () => {
85
- await registry.loadFromAgentShield("test-project");
86
-
87
- const githubProvider = registry.getProvider("github");
88
- expect(githubProvider).toBeDefined();
89
- expect(githubProvider?.clientId).toBe("github_client_id");
90
- });
91
-
92
- it("should return null for non-existent provider", async () => {
93
- await registry.loadFromAgentShield("test-project");
94
-
95
- const provider = registry.getProvider("nonexistent");
96
- expect(provider).toBeNull();
97
- });
98
- });
99
-
100
- describe("getAllProviders", () => {
101
- it("should return all providers", async () => {
102
- await registry.loadFromAgentShield("test-project");
103
-
104
- const providers = registry.getAllProviders();
105
- expect(providers.length).toBe(2);
106
- expect(providers.map((p) => p.clientId)).toContain("github_client_id");
107
- expect(providers.map((p) => p.clientId)).toContain("google_client_id");
108
- });
109
-
110
- it("should return empty array when no providers loaded", () => {
111
- const providers = registry.getAllProviders();
112
- expect(providers).toEqual([]);
113
- });
114
- });
115
-
116
- describe("hasProvider", () => {
117
- it("should return true for existing provider", async () => {
118
- await registry.loadFromAgentShield("test-project");
119
-
120
- expect(registry.hasProvider("github")).toBe(true);
121
- expect(registry.hasProvider("google")).toBe(true);
122
- });
123
-
124
- it("should return false for non-existent provider", async () => {
125
- await registry.loadFromAgentShield("test-project");
126
-
127
- expect(registry.hasProvider("nonexistent")).toBe(false);
128
- });
129
- });
130
-
131
- describe("getProviderNames", () => {
132
- it("should return all provider names", async () => {
133
- await registry.loadFromAgentShield("test-project");
134
-
135
- const names = registry.getProviderNames();
136
- expect(names).toContain("github");
137
- expect(names).toContain("google");
138
- expect(names.length).toBe(2);
139
- });
140
- });
141
- });
142
-