@kya-os/mcp-i-core 1.3.12 → 1.3.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (254) hide show
  1. package/dist/config/remote-config.js +9 -12
  2. package/dist/runtime/base.js +11 -0
  3. package/dist/services/access-control.service.js +5 -0
  4. package/dist/services/tool-protection.service.js +17 -8
  5. package/package.json +2 -2
  6. package/.turbo/turbo-build.log +0 -4
  7. package/.turbo/turbo-test$colon$coverage.log +0 -4586
  8. package/.turbo/turbo-test.log +0 -3169
  9. package/COMPLIANCE_IMPROVEMENT_REPORT.md +0 -483
  10. package/Composer 3.md +0 -615
  11. package/GPT-5.md +0 -1169
  12. package/OPUS-plan.md +0 -352
  13. package/PHASE_3_AND_4.1_SUMMARY.md +0 -585
  14. package/PHASE_3_SUMMARY.md +0 -317
  15. package/PHASE_4.1.3_SUMMARY.md +0 -428
  16. package/PHASE_4.1_COMPLETE.md +0 -525
  17. package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +0 -1240
  18. package/SCHEMA_COMPLIANCE_REPORT.md +0 -275
  19. package/TEST_PLAN.md +0 -571
  20. package/coverage/coverage-final.json +0 -60
  21. package/dist/cache/oauth-config-cache.d.ts.map +0 -1
  22. package/dist/cache/oauth-config-cache.js.map +0 -1
  23. package/dist/cache/tool-protection-cache.d.ts.map +0 -1
  24. package/dist/cache/tool-protection-cache.js.map +0 -1
  25. package/dist/compliance/index.d.ts.map +0 -1
  26. package/dist/compliance/index.js.map +0 -1
  27. package/dist/compliance/schema-registry.d.ts.map +0 -1
  28. package/dist/compliance/schema-registry.js.map +0 -1
  29. package/dist/compliance/schema-verifier.d.ts.map +0 -1
  30. package/dist/compliance/schema-verifier.js.map +0 -1
  31. package/dist/config/remote-config.d.ts.map +0 -1
  32. package/dist/config/remote-config.js.map +0 -1
  33. package/dist/config.d.ts.map +0 -1
  34. package/dist/config.js.map +0 -1
  35. package/dist/delegation/audience-validator.d.ts.map +0 -1
  36. package/dist/delegation/audience-validator.js.map +0 -1
  37. package/dist/delegation/bitstring.d.ts.map +0 -1
  38. package/dist/delegation/bitstring.js.map +0 -1
  39. package/dist/delegation/cascading-revocation.d.ts.map +0 -1
  40. package/dist/delegation/cascading-revocation.js.map +0 -1
  41. package/dist/delegation/delegation-graph.d.ts.map +0 -1
  42. package/dist/delegation/delegation-graph.js.map +0 -1
  43. package/dist/delegation/did-key-resolver.d.ts.map +0 -1
  44. package/dist/delegation/did-key-resolver.js.map +0 -1
  45. package/dist/delegation/index.d.ts.map +0 -1
  46. package/dist/delegation/index.js.map +0 -1
  47. package/dist/delegation/statuslist-manager.d.ts.map +0 -1
  48. package/dist/delegation/statuslist-manager.js.map +0 -1
  49. package/dist/delegation/storage/index.d.ts.map +0 -1
  50. package/dist/delegation/storage/index.js.map +0 -1
  51. package/dist/delegation/storage/memory-graph-storage.d.ts.map +0 -1
  52. package/dist/delegation/storage/memory-graph-storage.js.map +0 -1
  53. package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +0 -1
  54. package/dist/delegation/storage/memory-statuslist-storage.js.map +0 -1
  55. package/dist/delegation/utils.d.ts.map +0 -1
  56. package/dist/delegation/utils.js.map +0 -1
  57. package/dist/delegation/vc-issuer.d.ts.map +0 -1
  58. package/dist/delegation/vc-issuer.js.map +0 -1
  59. package/dist/delegation/vc-verifier.d.ts.map +0 -1
  60. package/dist/delegation/vc-verifier.js.map +0 -1
  61. package/dist/identity/idp-token-resolver.d.ts.map +0 -1
  62. package/dist/identity/idp-token-resolver.js.map +0 -1
  63. package/dist/identity/idp-token-storage.interface.d.ts.map +0 -1
  64. package/dist/identity/idp-token-storage.interface.js.map +0 -1
  65. package/dist/identity/user-did-manager.d.ts.map +0 -1
  66. package/dist/identity/user-did-manager.js.map +0 -1
  67. package/dist/index.d.ts.map +0 -1
  68. package/dist/index.js.map +0 -1
  69. package/dist/providers/base.d.ts.map +0 -1
  70. package/dist/providers/base.js.map +0 -1
  71. package/dist/providers/memory.d.ts.map +0 -1
  72. package/dist/providers/memory.js.map +0 -1
  73. package/dist/runtime/audit-logger.d.ts.map +0 -1
  74. package/dist/runtime/audit-logger.js.map +0 -1
  75. package/dist/runtime/base.d.ts.map +0 -1
  76. package/dist/runtime/base.js.map +0 -1
  77. package/dist/services/access-control.service.d.ts.map +0 -1
  78. package/dist/services/access-control.service.js.map +0 -1
  79. package/dist/services/authorization/authorization-registry.d.ts.map +0 -1
  80. package/dist/services/authorization/authorization-registry.js.map +0 -1
  81. package/dist/services/authorization/types.d.ts.map +0 -1
  82. package/dist/services/authorization/types.js.map +0 -1
  83. package/dist/services/batch-delegation.service.d.ts.map +0 -1
  84. package/dist/services/batch-delegation.service.js.map +0 -1
  85. package/dist/services/crypto.service.d.ts.map +0 -1
  86. package/dist/services/crypto.service.js.map +0 -1
  87. package/dist/services/errors.d.ts.map +0 -1
  88. package/dist/services/errors.js.map +0 -1
  89. package/dist/services/index.d.ts.map +0 -1
  90. package/dist/services/index.js.map +0 -1
  91. package/dist/services/oauth-config.service.d.ts.map +0 -1
  92. package/dist/services/oauth-config.service.js.map +0 -1
  93. package/dist/services/oauth-provider-registry.d.ts.map +0 -1
  94. package/dist/services/oauth-provider-registry.js.map +0 -1
  95. package/dist/services/oauth-service.d.ts.map +0 -1
  96. package/dist/services/oauth-service.js.map +0 -1
  97. package/dist/services/oauth-token-retrieval.service.d.ts.map +0 -1
  98. package/dist/services/oauth-token-retrieval.service.js.map +0 -1
  99. package/dist/services/proof-verifier.d.ts.map +0 -1
  100. package/dist/services/proof-verifier.js.map +0 -1
  101. package/dist/services/provider-resolver.d.ts.map +0 -1
  102. package/dist/services/provider-resolver.js.map +0 -1
  103. package/dist/services/provider-validator.d.ts.map +0 -1
  104. package/dist/services/provider-validator.js.map +0 -1
  105. package/dist/services/session-registration.service.d.ts.map +0 -1
  106. package/dist/services/session-registration.service.js.map +0 -1
  107. package/dist/services/storage.service.d.ts.map +0 -1
  108. package/dist/services/storage.service.js.map +0 -1
  109. package/dist/services/tool-context-builder.d.ts.map +0 -1
  110. package/dist/services/tool-context-builder.js.map +0 -1
  111. package/dist/services/tool-protection.service.d.ts.map +0 -1
  112. package/dist/services/tool-protection.service.js.map +0 -1
  113. package/dist/types/oauth-required-error.d.ts.map +0 -1
  114. package/dist/types/oauth-required-error.js.map +0 -1
  115. package/dist/types/tool-protection.d.ts.map +0 -1
  116. package/dist/types/tool-protection.js.map +0 -1
  117. package/dist/utils/base58.d.ts.map +0 -1
  118. package/dist/utils/base58.js.map +0 -1
  119. package/dist/utils/base64.d.ts.map +0 -1
  120. package/dist/utils/base64.js.map +0 -1
  121. package/dist/utils/cors.d.ts.map +0 -1
  122. package/dist/utils/cors.js.map +0 -1
  123. package/dist/utils/did-helpers.d.ts.map +0 -1
  124. package/dist/utils/did-helpers.js.map +0 -1
  125. package/dist/utils/index.d.ts.map +0 -1
  126. package/dist/utils/index.js.map +0 -1
  127. package/dist/utils/storage-keys.d.ts.map +0 -1
  128. package/dist/utils/storage-keys.js.map +0 -1
  129. package/docs/API_REFERENCE.md +0 -1362
  130. package/docs/COMPLIANCE_MATRIX.md +0 -691
  131. package/docs/STATUSLIST2021_GUIDE.md +0 -696
  132. package/docs/W3C_VC_DELEGATION_GUIDE.md +0 -710
  133. package/src/__tests__/cache/tool-protection-cache.test.ts +0 -640
  134. package/src/__tests__/config/provider-runtime-config.test.ts +0 -309
  135. package/src/__tests__/delegation-e2e.test.ts +0 -690
  136. package/src/__tests__/identity/user-did-manager.test.ts +0 -232
  137. package/src/__tests__/index.test.ts +0 -56
  138. package/src/__tests__/integration/full-flow.test.ts +0 -789
  139. package/src/__tests__/integration.test.ts +0 -281
  140. package/src/__tests__/providers/base.test.ts +0 -173
  141. package/src/__tests__/providers/memory.test.ts +0 -319
  142. package/src/__tests__/regression/phase2-regression.test.ts +0 -429
  143. package/src/__tests__/runtime/audit-logger.test.ts +0 -154
  144. package/src/__tests__/runtime/base-extensions.test.ts +0 -595
  145. package/src/__tests__/runtime/base.test.ts +0 -869
  146. package/src/__tests__/runtime/delegation-flow.test.ts +0 -164
  147. package/src/__tests__/runtime/proof-client-did.test.ts +0 -376
  148. package/src/__tests__/runtime/route-interception.test.ts +0 -686
  149. package/src/__tests__/runtime/tool-protection-enforcement.test.ts +0 -908
  150. package/src/__tests__/services/agentshield-integration.test.ts +0 -791
  151. package/src/__tests__/services/cache-busting.test.ts +0 -125
  152. package/src/__tests__/services/oauth-service-pkce.test.ts +0 -556
  153. package/src/__tests__/services/provider-resolver-edge-cases.test.ts +0 -591
  154. package/src/__tests__/services/tool-protection-merged-config.test.ts +0 -485
  155. package/src/__tests__/services/tool-protection-oauth-provider.test.ts +0 -480
  156. package/src/__tests__/services/tool-protection.service.test.ts +0 -1373
  157. package/src/__tests__/utils/mock-providers.ts +0 -340
  158. package/src/cache/oauth-config-cache.d.ts +0 -69
  159. package/src/cache/oauth-config-cache.d.ts.map +0 -1
  160. package/src/cache/oauth-config-cache.js.map +0 -1
  161. package/src/cache/oauth-config-cache.ts +0 -123
  162. package/src/cache/tool-protection-cache.ts +0 -171
  163. package/src/compliance/EXAMPLE.md +0 -412
  164. package/src/compliance/__tests__/schema-verifier.test.ts +0 -797
  165. package/src/compliance/index.ts +0 -8
  166. package/src/compliance/schema-registry.ts +0 -460
  167. package/src/compliance/schema-verifier.ts +0 -708
  168. package/src/config/__tests__/merged-config.spec.ts +0 -445
  169. package/src/config/__tests__/remote-config.spec.ts +0 -268
  170. package/src/config/remote-config.ts +0 -264
  171. package/src/config.ts +0 -312
  172. package/src/delegation/__tests__/audience-validator.test.ts +0 -112
  173. package/src/delegation/__tests__/bitstring.test.ts +0 -346
  174. package/src/delegation/__tests__/cascading-revocation.test.ts +0 -628
  175. package/src/delegation/__tests__/delegation-graph.test.ts +0 -584
  176. package/src/delegation/__tests__/did-key-resolver.test.ts +0 -265
  177. package/src/delegation/__tests__/utils.test.ts +0 -152
  178. package/src/delegation/__tests__/vc-issuer.test.ts +0 -442
  179. package/src/delegation/__tests__/vc-verifier.test.ts +0 -922
  180. package/src/delegation/audience-validator.ts +0 -52
  181. package/src/delegation/bitstring.ts +0 -278
  182. package/src/delegation/cascading-revocation.ts +0 -370
  183. package/src/delegation/delegation-graph.ts +0 -299
  184. package/src/delegation/did-key-resolver.ts +0 -179
  185. package/src/delegation/index.ts +0 -14
  186. package/src/delegation/statuslist-manager.ts +0 -353
  187. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +0 -366
  188. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +0 -228
  189. package/src/delegation/storage/index.ts +0 -9
  190. package/src/delegation/storage/memory-graph-storage.ts +0 -178
  191. package/src/delegation/storage/memory-statuslist-storage.ts +0 -77
  192. package/src/delegation/utils.ts +0 -221
  193. package/src/delegation/vc-issuer.ts +0 -232
  194. package/src/delegation/vc-verifier.ts +0 -568
  195. package/src/identity/idp-token-resolver.ts +0 -181
  196. package/src/identity/idp-token-storage.interface.ts +0 -94
  197. package/src/identity/user-did-manager.ts +0 -526
  198. package/src/index.ts +0 -310
  199. package/src/providers/base.d.ts +0 -91
  200. package/src/providers/base.d.ts.map +0 -1
  201. package/src/providers/base.js.map +0 -1
  202. package/src/providers/base.ts +0 -96
  203. package/src/providers/memory.ts +0 -142
  204. package/src/runtime/audit-logger.ts +0 -39
  205. package/src/runtime/base.ts +0 -1392
  206. package/src/services/__tests__/access-control.integration.test.ts +0 -443
  207. package/src/services/__tests__/access-control.proof-response-validation.test.ts +0 -578
  208. package/src/services/__tests__/access-control.service.test.ts +0 -970
  209. package/src/services/__tests__/batch-delegation.service.test.ts +0 -351
  210. package/src/services/__tests__/crypto.service.test.ts +0 -531
  211. package/src/services/__tests__/oauth-provider-registry.test.ts +0 -142
  212. package/src/services/__tests__/proof-verifier.integration.test.ts +0 -485
  213. package/src/services/__tests__/proof-verifier.test.ts +0 -489
  214. package/src/services/__tests__/provider-resolution.integration.test.ts +0 -202
  215. package/src/services/__tests__/provider-resolver.test.ts +0 -213
  216. package/src/services/__tests__/storage.service.test.ts +0 -358
  217. package/src/services/access-control.service.ts +0 -990
  218. package/src/services/authorization/authorization-registry.ts +0 -66
  219. package/src/services/authorization/types.ts +0 -71
  220. package/src/services/batch-delegation.service.ts +0 -137
  221. package/src/services/crypto.service.ts +0 -302
  222. package/src/services/errors.ts +0 -76
  223. package/src/services/index.ts +0 -18
  224. package/src/services/oauth-config.service.d.ts +0 -53
  225. package/src/services/oauth-config.service.d.ts.map +0 -1
  226. package/src/services/oauth-config.service.js.map +0 -1
  227. package/src/services/oauth-config.service.ts +0 -192
  228. package/src/services/oauth-provider-registry.d.ts +0 -57
  229. package/src/services/oauth-provider-registry.d.ts.map +0 -1
  230. package/src/services/oauth-provider-registry.js.map +0 -1
  231. package/src/services/oauth-provider-registry.ts +0 -141
  232. package/src/services/oauth-service.ts +0 -544
  233. package/src/services/oauth-token-retrieval.service.ts +0 -245
  234. package/src/services/proof-verifier.ts +0 -478
  235. package/src/services/provider-resolver.d.ts +0 -48
  236. package/src/services/provider-resolver.d.ts.map +0 -1
  237. package/src/services/provider-resolver.js.map +0 -1
  238. package/src/services/provider-resolver.ts +0 -146
  239. package/src/services/provider-validator.ts +0 -170
  240. package/src/services/session-registration.service.ts +0 -251
  241. package/src/services/storage.service.ts +0 -566
  242. package/src/services/tool-context-builder.ts +0 -237
  243. package/src/services/tool-protection.service.ts +0 -1070
  244. package/src/types/oauth-required-error.ts +0 -63
  245. package/src/types/tool-protection.ts +0 -155
  246. package/src/utils/__tests__/did-helpers.test.ts +0 -156
  247. package/src/utils/base58.ts +0 -109
  248. package/src/utils/base64.ts +0 -148
  249. package/src/utils/cors.ts +0 -83
  250. package/src/utils/did-helpers.ts +0 -210
  251. package/src/utils/index.ts +0 -8
  252. package/src/utils/storage-keys.ts +0 -278
  253. package/tsconfig.json +0 -21
  254. package/vitest.config.ts +0 -56
@@ -1,485 +0,0 @@
1
- /**
2
- * Integration Tests for ProofVerifier with Real DID Resolution
3
- *
4
- * These tests verify end-to-end proof verification with actual DID resolution,
5
- * testing both did:key (offline) and did:web (HTTP) resolution methods.
6
- */
7
-
8
- import { describe, it, expect, beforeEach, vi } from "vitest";
9
- import { ProofVerifier } from "../proof-verifier.js";
10
- import { CryptoService, type Ed25519JWK } from "../crypto.service.js";
11
- import type {
12
- CryptoProvider,
13
- ClockProvider,
14
- NonceCacheProvider,
15
- FetchProvider,
16
- } from "../../providers/base.js";
17
- import type { DetachedProof } from "@kya-os/contracts/proof";
18
- import {
19
- PROOF_VERIFICATION_ERROR_CODES,
20
- ProofVerificationError,
21
- } from "../errors.js";
22
-
23
- describe("ProofVerifier Integration - Real DID Resolution", () => {
24
- let proofVerifier: ProofVerifier;
25
- let mockCryptoProvider: CryptoProvider;
26
- let mockClockProvider: ClockProvider;
27
- let mockNonceCache: NonceCacheProvider;
28
- let realFetchProvider: FetchProvider;
29
-
30
- const validJwk: Ed25519JWK = {
31
- kty: "OKP",
32
- crv: "Ed25519",
33
- x: "VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ",
34
- kid: "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ#key-1",
35
- };
36
-
37
- const createValidProof = (did: string, kid: string): DetachedProof => {
38
- const header = { alg: "EdDSA", typ: "JWT" };
39
- const payload = {
40
- aud: "test-audience",
41
- sub: did,
42
- iss: did,
43
- nonce: `nonce-${Date.now()}`,
44
- ts: Math.floor(Date.now() / 1000),
45
- sessionId: "session123",
46
- requestHash: "sha256:" + "a".repeat(64),
47
- responseHash: "sha256:" + "b".repeat(64),
48
- };
49
- // Use TextEncoder/Decoder for base64 encoding (works in both Node and browser)
50
- const encoder = new TextEncoder();
51
- const headerB64 = btoa(JSON.stringify(header))
52
- .replace(/\+/g, "-")
53
- .replace(/\//g, "_")
54
- .replace(/=/g, "");
55
- const payloadB64 = btoa(JSON.stringify(payload))
56
- .replace(/\+/g, "-")
57
- .replace(/\//g, "_")
58
- .replace(/=/g, "");
59
- const signatureB64 = btoa("signature")
60
- .replace(/\+/g, "-")
61
- .replace(/\//g, "_")
62
- .replace(/=/g, "");
63
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
64
-
65
- return {
66
- jws,
67
- meta: {
68
- did,
69
- kid,
70
- ts: Math.floor(Date.now() / 1000),
71
- nonce: `nonce-${Date.now()}`,
72
- audience: "test-audience",
73
- sessionId: "session123",
74
- requestHash: "sha256:" + "a".repeat(64),
75
- responseHash: "sha256:" + "b".repeat(64),
76
- },
77
- };
78
- };
79
-
80
- beforeEach(() => {
81
- mockCryptoProvider = {
82
- sign: vi.fn(),
83
- verify: vi.fn().mockResolvedValue(true),
84
- generateKeyPair: vi.fn(),
85
- hash: vi.fn(),
86
- randomBytes: vi.fn(),
87
- };
88
-
89
- mockClockProvider = {
90
- now: vi.fn().mockReturnValue(Date.now()),
91
- isWithinSkew: vi.fn().mockReturnValue(true),
92
- hasExpired: vi.fn(),
93
- calculateExpiry: vi.fn(
94
- (ttlSeconds: number) => Date.now() + ttlSeconds * 1000
95
- ),
96
- format: vi.fn(),
97
- };
98
-
99
- mockNonceCache = {
100
- has: vi.fn().mockResolvedValue(false),
101
- add: vi.fn().mockResolvedValue(undefined),
102
- cleanup: vi.fn().mockResolvedValue(undefined),
103
- destroy: vi.fn().mockResolvedValue(undefined),
104
- };
105
-
106
- // Real fetch provider that actually resolves DIDs
107
- realFetchProvider = {
108
- resolveDID: async (did: string) => {
109
- // did:key resolution (offline)
110
- if (did.startsWith("did:key:")) {
111
- const publicKeyMultibase = did.slice("did:key:".length);
112
- return {
113
- "@context": ["https://www.w3.org/ns/did/v1"],
114
- id: did,
115
- verificationMethod: [
116
- {
117
- id: `${did}#key-1`,
118
- type: "Ed25519VerificationKey2020",
119
- controller: did,
120
- publicKeyMultibase,
121
- publicKeyJwk: validJwk,
122
- },
123
- ],
124
- authentication: [`${did}#key-1`],
125
- assertionMethod: [`${did}#key-1`],
126
- };
127
- }
128
-
129
- // did:web resolution (HTTP)
130
- if (did.startsWith("did:web:")) {
131
- const domain = did.slice("did:web:".length).replace(/:/g, "/");
132
- const url = `https://${domain}/.well-known/did.json`;
133
-
134
- try {
135
- const response = await fetch(url);
136
- if (!response.ok) {
137
- throw new Error(
138
- `HTTP ${response.status}: ${response.statusText}`
139
- );
140
- }
141
- return await response.json();
142
- } catch (error) {
143
- throw new Error(
144
- `Failed to resolve ${did}: ${error instanceof Error ? error.message : String(error)}`
145
- );
146
- }
147
- }
148
-
149
- throw new Error(`Unsupported DID method: ${did}`);
150
- },
151
- fetchStatusList: vi.fn(),
152
- fetchDelegationChain: vi.fn(),
153
- fetch: vi.fn(),
154
- };
155
-
156
- proofVerifier = new ProofVerifier({
157
- cryptoProvider: mockCryptoProvider,
158
- clockProvider: mockClockProvider,
159
- nonceCacheProvider: mockNonceCache,
160
- fetchProvider: realFetchProvider,
161
- timestampSkewSeconds: 120,
162
- nonceTtlSeconds: 300,
163
- });
164
- });
165
-
166
- describe("did:key Resolution (Offline)", () => {
167
- it("should resolve did:key and extract public key", async () => {
168
- const did =
169
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
170
- const kid = "key-1"; // Just the fragment, not the full DID#key-1
171
-
172
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
173
-
174
- expect(publicKey).toBeDefined();
175
- expect(publicKey?.kty).toBe("OKP");
176
- expect(publicKey?.crv).toBe("Ed25519");
177
- expect(publicKey?.kid).toBe(`${did}#${kid}`);
178
- });
179
-
180
- it("should verify proof with did:key resolution", async () => {
181
- const did =
182
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
183
- const kid = "key-1";
184
- const proof = createValidProof(did, `${did}#${kid}`); // Full kid in proof meta
185
-
186
- // Fetch public key from DID
187
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
188
- expect(publicKey).toBeDefined();
189
-
190
- // Verify proof
191
- const result = await proofVerifier.verifyProof(proof, publicKey!);
192
-
193
- expect(result.valid).toBe(true);
194
- expect(mockNonceCache.has).toHaveBeenCalledWith(proof.meta.nonce, proof.meta.did);
195
- expect(mockNonceCache.add).toHaveBeenCalledWith(
196
- proof.meta.nonce,
197
- expect.any(Number),
198
- proof.meta.did
199
- );
200
- });
201
-
202
- it("should handle missing verification method in did:key", async () => {
203
- const did =
204
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
205
- const kid = "nonexistent"; // Just the fragment
206
-
207
- await expect(
208
- proofVerifier.fetchPublicKeyFromDID(did, kid)
209
- ).rejects.toThrow(ProofVerificationError);
210
-
211
- try {
212
- await proofVerifier.fetchPublicKeyFromDID(did, kid);
213
- expect.fail("Should have thrown ProofVerificationError");
214
- } catch (error) {
215
- expect(error).toBeInstanceOf(ProofVerificationError);
216
- expect((error as ProofVerificationError).code).toBe(
217
- PROOF_VERIFICATION_ERROR_CODES.VERIFICATION_METHOD_NOT_FOUND
218
- );
219
- }
220
- });
221
- });
222
-
223
- describe("did:web Resolution (HTTP)", () => {
224
- // Skip this test in CI environments - it depends on external network calls
225
- // and can be flaky. Run locally for manual verification only.
226
- it.skip("should resolve did:web from real endpoint", async () => {
227
- // Use a known did:web endpoint (example.com has a well-known DID document)
228
- // Note: This test may fail if the endpoint is unavailable
229
- const did = "did:web:example.com";
230
-
231
- try {
232
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did);
233
-
234
- // If resolution succeeds, verify structure
235
- if (publicKey) {
236
- expect(publicKey.kty).toBe("OKP");
237
- expect(publicKey.crv).toBe("Ed25519");
238
- }
239
- } catch (error) {
240
- // If resolution fails (network issue, endpoint doesn't exist), that's okay
241
- // We're testing that the resolution mechanism works, not that every endpoint exists
242
- expect(error).toBeInstanceOf(ProofVerificationError);
243
- expect((error as ProofVerificationError).code).toBe(
244
- PROOF_VERIFICATION_ERROR_CODES.DID_RESOLUTION_FAILED
245
- );
246
- }
247
- }, 10000); // 10 second timeout for HTTP requests
248
-
249
- it("should handle HTTP errors gracefully", async () => {
250
- const did = "did:web:nonexistent-domain-that-does-not-exist-12345.com";
251
-
252
- await expect(proofVerifier.fetchPublicKeyFromDID(did)).rejects.toThrow(
253
- ProofVerificationError
254
- );
255
-
256
- try {
257
- await proofVerifier.fetchPublicKeyFromDID(did);
258
- } catch (error) {
259
- expect(error).toBeInstanceOf(ProofVerificationError);
260
- expect((error as ProofVerificationError).code).toBe(
261
- PROOF_VERIFICATION_ERROR_CODES.DID_RESOLUTION_FAILED
262
- );
263
- }
264
- }, 10000);
265
-
266
- it("should handle DID document without verification methods", async () => {
267
- // Mock a DID document without verification methods
268
- const mockFetchProvider: FetchProvider = {
269
- resolveDID: vi.fn().mockResolvedValue({
270
- "@context": ["https://www.w3.org/ns/did/v1"],
271
- id: "did:web:test.com",
272
- // No verificationMethod
273
- }),
274
- fetchStatusList: vi.fn(),
275
- fetchDelegationChain: vi.fn(),
276
- fetch: vi.fn(),
277
- };
278
-
279
- const testVerifier = new ProofVerifier({
280
- cryptoProvider: mockCryptoProvider,
281
- clockProvider: mockClockProvider,
282
- nonceCacheProvider: mockNonceCache,
283
- fetchProvider: mockFetchProvider,
284
- });
285
-
286
- await expect(
287
- testVerifier.fetchPublicKeyFromDID("did:web:test.com")
288
- ).rejects.toThrow(ProofVerificationError);
289
-
290
- try {
291
- await testVerifier.fetchPublicKeyFromDID("did:web:test.com");
292
- } catch (error) {
293
- expect(error).toBeInstanceOf(ProofVerificationError);
294
- expect((error as ProofVerificationError).code).toBe(
295
- PROOF_VERIFICATION_ERROR_CODES.VERIFICATION_METHOD_NOT_FOUND
296
- );
297
- }
298
- });
299
-
300
- it("should handle verification method without publicKeyJwk", async () => {
301
- const mockFetchProvider: FetchProvider = {
302
- resolveDID: vi.fn().mockResolvedValue({
303
- "@context": ["https://www.w3.org/ns/did/v1"],
304
- id: "did:web:test.com",
305
- verificationMethod: [
306
- {
307
- id: "did:web:test.com#key-1",
308
- type: "Ed25519VerificationKey2020",
309
- controller: "did:web:test.com",
310
- // No publicKeyJwk
311
- },
312
- ],
313
- }),
314
- fetchStatusList: vi.fn(),
315
- fetchDelegationChain: vi.fn(),
316
- fetch: vi.fn(),
317
- };
318
-
319
- const testVerifier = new ProofVerifier({
320
- cryptoProvider: mockCryptoProvider,
321
- clockProvider: mockClockProvider,
322
- nonceCacheProvider: mockNonceCache,
323
- fetchProvider: mockFetchProvider,
324
- });
325
-
326
- await expect(
327
- testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1")
328
- ).rejects.toThrow(ProofVerificationError);
329
-
330
- try {
331
- await testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1");
332
- } catch (error) {
333
- expect(error).toBeInstanceOf(ProofVerificationError);
334
- expect((error as ProofVerificationError).code).toBe(
335
- PROOF_VERIFICATION_ERROR_CODES.PUBLIC_KEY_NOT_FOUND
336
- );
337
- }
338
- });
339
-
340
- it("should handle non-Ed25519 keys", async () => {
341
- const mockFetchProvider: FetchProvider = {
342
- resolveDID: vi.fn().mockResolvedValue({
343
- "@context": ["https://www.w3.org/ns/did/v1"],
344
- id: "did:web:test.com",
345
- verificationMethod: [
346
- {
347
- id: "did:web:test.com#key-1",
348
- type: "RsaVerificationKey2018",
349
- controller: "did:web:test.com",
350
- publicKeyJwk: {
351
- kty: "RSA",
352
- n: "test",
353
- e: "AQAB",
354
- },
355
- },
356
- ],
357
- }),
358
- fetchStatusList: vi.fn(),
359
- fetchDelegationChain: vi.fn(),
360
- fetch: vi.fn(),
361
- };
362
-
363
- const testVerifier = new ProofVerifier({
364
- cryptoProvider: mockCryptoProvider,
365
- clockProvider: mockClockProvider,
366
- nonceCacheProvider: mockNonceCache,
367
- fetchProvider: mockFetchProvider,
368
- });
369
-
370
- await expect(
371
- testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1")
372
- ).rejects.toThrow(ProofVerificationError);
373
-
374
- try {
375
- await testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1");
376
- } catch (error) {
377
- expect(error).toBeInstanceOf(ProofVerificationError);
378
- expect((error as ProofVerificationError).code).toBe(
379
- PROOF_VERIFICATION_ERROR_CODES.INVALID_JWK_FORMAT
380
- );
381
- }
382
- });
383
- });
384
-
385
- describe("End-to-End Proof Verification with DID Resolution", () => {
386
- it("should verify proof with did:key resolution end-to-end", async () => {
387
- const did =
388
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
389
- const kid = "key-1";
390
- const proof = createValidProof(did, `${did}#${kid}`); // Full kid in proof meta
391
-
392
- // Fetch public key from DID
393
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
394
- expect(publicKey).toBeDefined();
395
-
396
- // Verify proof
397
- const result = await proofVerifier.verifyProof(proof, publicKey!);
398
-
399
- expect(result.valid).toBe(true);
400
- expect(result.errorCode).toBeUndefined();
401
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
402
- });
403
-
404
- it("should return specific error code for nonce replay", async () => {
405
- const did =
406
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
407
- const kid = "key-1";
408
- const proof = createValidProof(did, `${did}#${kid}`);
409
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
410
-
411
- // First verification should succeed
412
- const result1 = await proofVerifier.verifyProof(proof, publicKey!);
413
- expect(result1.valid).toBe(true);
414
-
415
- // Second verification should fail with nonce replay error
416
- mockNonceCache.has = vi.fn().mockResolvedValue(true);
417
- const result2 = await proofVerifier.verifyProof(proof, publicKey!);
418
-
419
- expect(result2.valid).toBe(false);
420
- expect(result2.errorCode).toBe(
421
- PROOF_VERIFICATION_ERROR_CODES.NONCE_REPLAY_DETECTED
422
- );
423
- expect(result2.details?.nonce).toBe(proof.meta.nonce);
424
- });
425
-
426
- it("should return specific error code for timestamp skew", async () => {
427
- const did =
428
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
429
- const kid = "key-1";
430
- const proof = createValidProof(did, `${did}#${kid}`);
431
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
432
-
433
- // Mock clock to reject timestamp
434
- mockClockProvider.isWithinSkew = vi.fn().mockReturnValue(false);
435
-
436
- const result = await proofVerifier.verifyProof(proof, publicKey!);
437
-
438
- expect(result.valid).toBe(false);
439
- expect(result.errorCode).toBe(
440
- PROOF_VERIFICATION_ERROR_CODES.TIMESTAMP_SKEW_EXCEEDED
441
- );
442
- expect(result.details?.timestamp).toBe(proof.meta.ts);
443
- expect(result.details?.skewSeconds).toBe(120);
444
- });
445
-
446
- it("should return specific error code for invalid signature", async () => {
447
- const did =
448
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
449
- const kid = "key-1";
450
- const proof = createValidProof(did, `${did}#${kid}`);
451
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
452
-
453
- // Mock signature verification to fail
454
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
455
-
456
- const result = await proofVerifier.verifyProof(proof, publicKey!);
457
-
458
- expect(result.valid).toBe(false);
459
- expect(result.errorCode).toBe(
460
- PROOF_VERIFICATION_ERROR_CODES.INVALID_JWS_SIGNATURE
461
- );
462
- expect(result.details?.expectedKid).toBe(`${did}#${kid}`);
463
- });
464
- });
465
-
466
- describe("Error Code Coverage", () => {
467
- it("should return INVALID_PROOF_STRUCTURE for malformed proof", async () => {
468
- const invalidProof = {
469
- jws: "invalid",
470
- meta: {
471
- // Missing required fields
472
- did: "did:test",
473
- },
474
- } as any;
475
-
476
- const result = await proofVerifier.verifyProof(invalidProof, validJwk);
477
-
478
- expect(result.valid).toBe(false);
479
- expect(result.errorCode).toBe(
480
- PROOF_VERIFICATION_ERROR_CODES.INVALID_PROOF_STRUCTURE
481
- );
482
- expect(result.details?.zodErrors).toBeDefined();
483
- });
484
- });
485
- });