@kya-os/mcp-i-core 1.3.13 → 1.3.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/config/remote-config.js +9 -12
- package/dist/runtime/base.d.ts +2 -1
- package/dist/runtime/base.js +34 -6
- package/dist/services/access-control.service.js +5 -0
- package/dist/services/tool-protection.service.js +17 -8
- package/package.json +2 -2
- package/.turbo/turbo-build.log +0 -4
- package/.turbo/turbo-test$colon$coverage.log +0 -4586
- package/.turbo/turbo-test.log +0 -4631
- package/COMPLIANCE_IMPROVEMENT_REPORT.md +0 -483
- package/Composer 3.md +0 -615
- package/GPT-5.md +0 -1169
- package/OPUS-plan.md +0 -352
- package/PHASE_3_AND_4.1_SUMMARY.md +0 -585
- package/PHASE_3_SUMMARY.md +0 -317
- package/PHASE_4.1.3_SUMMARY.md +0 -428
- package/PHASE_4.1_COMPLETE.md +0 -525
- package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +0 -1240
- package/SCHEMA_COMPLIANCE_REPORT.md +0 -275
- package/TEST_PLAN.md +0 -571
- package/coverage/coverage-final.json +0 -60
- package/dist/cache/oauth-config-cache.d.ts.map +0 -1
- package/dist/cache/oauth-config-cache.js.map +0 -1
- package/dist/cache/tool-protection-cache.d.ts.map +0 -1
- package/dist/cache/tool-protection-cache.js.map +0 -1
- package/dist/compliance/index.d.ts.map +0 -1
- package/dist/compliance/index.js.map +0 -1
- package/dist/compliance/schema-registry.d.ts.map +0 -1
- package/dist/compliance/schema-registry.js.map +0 -1
- package/dist/compliance/schema-verifier.d.ts.map +0 -1
- package/dist/compliance/schema-verifier.js.map +0 -1
- package/dist/config/remote-config.d.ts.map +0 -1
- package/dist/config/remote-config.js.map +0 -1
- package/dist/config.d.ts.map +0 -1
- package/dist/config.js.map +0 -1
- package/dist/delegation/audience-validator.d.ts.map +0 -1
- package/dist/delegation/audience-validator.js.map +0 -1
- package/dist/delegation/bitstring.d.ts.map +0 -1
- package/dist/delegation/bitstring.js.map +0 -1
- package/dist/delegation/cascading-revocation.d.ts.map +0 -1
- package/dist/delegation/cascading-revocation.js.map +0 -1
- package/dist/delegation/delegation-graph.d.ts.map +0 -1
- package/dist/delegation/delegation-graph.js.map +0 -1
- package/dist/delegation/did-key-resolver.d.ts.map +0 -1
- package/dist/delegation/did-key-resolver.js.map +0 -1
- package/dist/delegation/index.d.ts.map +0 -1
- package/dist/delegation/index.js.map +0 -1
- package/dist/delegation/statuslist-manager.d.ts.map +0 -1
- package/dist/delegation/statuslist-manager.js.map +0 -1
- package/dist/delegation/storage/index.d.ts.map +0 -1
- package/dist/delegation/storage/index.js.map +0 -1
- package/dist/delegation/storage/memory-graph-storage.d.ts.map +0 -1
- package/dist/delegation/storage/memory-graph-storage.js.map +0 -1
- package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +0 -1
- package/dist/delegation/storage/memory-statuslist-storage.js.map +0 -1
- package/dist/delegation/utils.d.ts.map +0 -1
- package/dist/delegation/utils.js.map +0 -1
- package/dist/delegation/vc-issuer.d.ts.map +0 -1
- package/dist/delegation/vc-issuer.js.map +0 -1
- package/dist/delegation/vc-verifier.d.ts.map +0 -1
- package/dist/delegation/vc-verifier.js.map +0 -1
- package/dist/identity/idp-token-resolver.d.ts.map +0 -1
- package/dist/identity/idp-token-resolver.js.map +0 -1
- package/dist/identity/idp-token-storage.interface.d.ts.map +0 -1
- package/dist/identity/idp-token-storage.interface.js.map +0 -1
- package/dist/identity/user-did-manager.d.ts.map +0 -1
- package/dist/identity/user-did-manager.js.map +0 -1
- package/dist/index.d.ts.map +0 -1
- package/dist/index.js.map +0 -1
- package/dist/providers/base.d.ts.map +0 -1
- package/dist/providers/base.js.map +0 -1
- package/dist/providers/memory.d.ts.map +0 -1
- package/dist/providers/memory.js.map +0 -1
- package/dist/runtime/audit-logger.d.ts.map +0 -1
- package/dist/runtime/audit-logger.js.map +0 -1
- package/dist/runtime/base.d.ts.map +0 -1
- package/dist/runtime/base.js.map +0 -1
- package/dist/services/access-control.service.d.ts.map +0 -1
- package/dist/services/access-control.service.js.map +0 -1
- package/dist/services/authorization/authorization-registry.d.ts.map +0 -1
- package/dist/services/authorization/authorization-registry.js.map +0 -1
- package/dist/services/authorization/types.d.ts.map +0 -1
- package/dist/services/authorization/types.js.map +0 -1
- package/dist/services/batch-delegation.service.d.ts.map +0 -1
- package/dist/services/batch-delegation.service.js.map +0 -1
- package/dist/services/crypto.service.d.ts.map +0 -1
- package/dist/services/crypto.service.js.map +0 -1
- package/dist/services/errors.d.ts.map +0 -1
- package/dist/services/errors.js.map +0 -1
- package/dist/services/index.d.ts.map +0 -1
- package/dist/services/index.js.map +0 -1
- package/dist/services/oauth-config.service.d.ts.map +0 -1
- package/dist/services/oauth-config.service.js.map +0 -1
- package/dist/services/oauth-provider-registry.d.ts.map +0 -1
- package/dist/services/oauth-provider-registry.js.map +0 -1
- package/dist/services/oauth-service.d.ts.map +0 -1
- package/dist/services/oauth-service.js.map +0 -1
- package/dist/services/oauth-token-retrieval.service.d.ts.map +0 -1
- package/dist/services/oauth-token-retrieval.service.js.map +0 -1
- package/dist/services/proof-verifier.d.ts.map +0 -1
- package/dist/services/proof-verifier.js.map +0 -1
- package/dist/services/provider-resolver.d.ts.map +0 -1
- package/dist/services/provider-resolver.js.map +0 -1
- package/dist/services/provider-validator.d.ts.map +0 -1
- package/dist/services/provider-validator.js.map +0 -1
- package/dist/services/session-registration.service.d.ts.map +0 -1
- package/dist/services/session-registration.service.js.map +0 -1
- package/dist/services/storage.service.d.ts.map +0 -1
- package/dist/services/storage.service.js.map +0 -1
- package/dist/services/tool-context-builder.d.ts.map +0 -1
- package/dist/services/tool-context-builder.js.map +0 -1
- package/dist/services/tool-protection.service.d.ts.map +0 -1
- package/dist/services/tool-protection.service.js.map +0 -1
- package/dist/types/oauth-required-error.d.ts.map +0 -1
- package/dist/types/oauth-required-error.js.map +0 -1
- package/dist/types/tool-protection.d.ts.map +0 -1
- package/dist/types/tool-protection.js.map +0 -1
- package/dist/utils/base58.d.ts.map +0 -1
- package/dist/utils/base58.js.map +0 -1
- package/dist/utils/base64.d.ts.map +0 -1
- package/dist/utils/base64.js.map +0 -1
- package/dist/utils/cors.d.ts.map +0 -1
- package/dist/utils/cors.js.map +0 -1
- package/dist/utils/did-helpers.d.ts.map +0 -1
- package/dist/utils/did-helpers.js.map +0 -1
- package/dist/utils/index.d.ts.map +0 -1
- package/dist/utils/index.js.map +0 -1
- package/dist/utils/storage-keys.d.ts.map +0 -1
- package/dist/utils/storage-keys.js.map +0 -1
- package/docs/API_REFERENCE.md +0 -1362
- package/docs/COMPLIANCE_MATRIX.md +0 -691
- package/docs/STATUSLIST2021_GUIDE.md +0 -696
- package/docs/W3C_VC_DELEGATION_GUIDE.md +0 -710
- package/src/__tests__/cache/tool-protection-cache.test.ts +0 -640
- package/src/__tests__/config/provider-runtime-config.test.ts +0 -309
- package/src/__tests__/delegation-e2e.test.ts +0 -690
- package/src/__tests__/identity/user-did-manager.test.ts +0 -232
- package/src/__tests__/index.test.ts +0 -56
- package/src/__tests__/integration/full-flow.test.ts +0 -789
- package/src/__tests__/integration.test.ts +0 -281
- package/src/__tests__/providers/base.test.ts +0 -173
- package/src/__tests__/providers/memory.test.ts +0 -319
- package/src/__tests__/regression/phase2-regression.test.ts +0 -429
- package/src/__tests__/runtime/audit-logger.test.ts +0 -154
- package/src/__tests__/runtime/base-extensions.test.ts +0 -595
- package/src/__tests__/runtime/base.test.ts +0 -869
- package/src/__tests__/runtime/delegation-flow.test.ts +0 -164
- package/src/__tests__/runtime/proof-client-did.test.ts +0 -376
- package/src/__tests__/runtime/route-interception.test.ts +0 -686
- package/src/__tests__/runtime/tool-protection-enforcement.test.ts +0 -908
- package/src/__tests__/services/agentshield-integration.test.ts +0 -791
- package/src/__tests__/services/cache-busting.test.ts +0 -125
- package/src/__tests__/services/oauth-service-pkce.test.ts +0 -556
- package/src/__tests__/services/provider-resolver-edge-cases.test.ts +0 -591
- package/src/__tests__/services/tool-protection-merged-config.test.ts +0 -485
- package/src/__tests__/services/tool-protection-oauth-provider.test.ts +0 -480
- package/src/__tests__/services/tool-protection.service.test.ts +0 -1373
- package/src/__tests__/utils/mock-providers.ts +0 -340
- package/src/cache/oauth-config-cache.d.ts +0 -69
- package/src/cache/oauth-config-cache.d.ts.map +0 -1
- package/src/cache/oauth-config-cache.js.map +0 -1
- package/src/cache/oauth-config-cache.ts +0 -123
- package/src/cache/tool-protection-cache.ts +0 -171
- package/src/compliance/EXAMPLE.md +0 -412
- package/src/compliance/__tests__/schema-verifier.test.ts +0 -797
- package/src/compliance/index.ts +0 -8
- package/src/compliance/schema-registry.ts +0 -460
- package/src/compliance/schema-verifier.ts +0 -708
- package/src/config/__tests__/merged-config.spec.ts +0 -445
- package/src/config/__tests__/remote-config.spec.ts +0 -268
- package/src/config/remote-config.ts +0 -264
- package/src/config.ts +0 -312
- package/src/delegation/__tests__/audience-validator.test.ts +0 -112
- package/src/delegation/__tests__/bitstring.test.ts +0 -346
- package/src/delegation/__tests__/cascading-revocation.test.ts +0 -628
- package/src/delegation/__tests__/delegation-graph.test.ts +0 -584
- package/src/delegation/__tests__/did-key-resolver.test.ts +0 -265
- package/src/delegation/__tests__/utils.test.ts +0 -152
- package/src/delegation/__tests__/vc-issuer.test.ts +0 -442
- package/src/delegation/__tests__/vc-verifier.test.ts +0 -922
- package/src/delegation/audience-validator.ts +0 -52
- package/src/delegation/bitstring.ts +0 -278
- package/src/delegation/cascading-revocation.ts +0 -370
- package/src/delegation/delegation-graph.ts +0 -299
- package/src/delegation/did-key-resolver.ts +0 -179
- package/src/delegation/index.ts +0 -14
- package/src/delegation/statuslist-manager.ts +0 -353
- package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +0 -366
- package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +0 -228
- package/src/delegation/storage/index.ts +0 -9
- package/src/delegation/storage/memory-graph-storage.ts +0 -178
- package/src/delegation/storage/memory-statuslist-storage.ts +0 -77
- package/src/delegation/utils.ts +0 -221
- package/src/delegation/vc-issuer.ts +0 -232
- package/src/delegation/vc-verifier.ts +0 -568
- package/src/identity/idp-token-resolver.ts +0 -181
- package/src/identity/idp-token-storage.interface.ts +0 -94
- package/src/identity/user-did-manager.ts +0 -526
- package/src/index.ts +0 -310
- package/src/providers/base.d.ts +0 -91
- package/src/providers/base.d.ts.map +0 -1
- package/src/providers/base.js.map +0 -1
- package/src/providers/base.ts +0 -96
- package/src/providers/memory.ts +0 -142
- package/src/runtime/audit-logger.ts +0 -39
- package/src/runtime/base.ts +0 -1392
- package/src/services/__tests__/access-control.integration.test.ts +0 -443
- package/src/services/__tests__/access-control.proof-response-validation.test.ts +0 -578
- package/src/services/__tests__/access-control.service.test.ts +0 -970
- package/src/services/__tests__/batch-delegation.service.test.ts +0 -351
- package/src/services/__tests__/crypto.service.test.ts +0 -531
- package/src/services/__tests__/oauth-provider-registry.test.ts +0 -142
- package/src/services/__tests__/proof-verifier.integration.test.ts +0 -485
- package/src/services/__tests__/proof-verifier.test.ts +0 -489
- package/src/services/__tests__/provider-resolution.integration.test.ts +0 -202
- package/src/services/__tests__/provider-resolver.test.ts +0 -213
- package/src/services/__tests__/storage.service.test.ts +0 -358
- package/src/services/access-control.service.ts +0 -990
- package/src/services/authorization/authorization-registry.ts +0 -66
- package/src/services/authorization/types.ts +0 -71
- package/src/services/batch-delegation.service.ts +0 -137
- package/src/services/crypto.service.ts +0 -302
- package/src/services/errors.ts +0 -76
- package/src/services/index.ts +0 -18
- package/src/services/oauth-config.service.d.ts +0 -53
- package/src/services/oauth-config.service.d.ts.map +0 -1
- package/src/services/oauth-config.service.js.map +0 -1
- package/src/services/oauth-config.service.ts +0 -192
- package/src/services/oauth-provider-registry.d.ts +0 -57
- package/src/services/oauth-provider-registry.d.ts.map +0 -1
- package/src/services/oauth-provider-registry.js.map +0 -1
- package/src/services/oauth-provider-registry.ts +0 -141
- package/src/services/oauth-service.ts +0 -544
- package/src/services/oauth-token-retrieval.service.ts +0 -245
- package/src/services/proof-verifier.ts +0 -478
- package/src/services/provider-resolver.d.ts +0 -48
- package/src/services/provider-resolver.d.ts.map +0 -1
- package/src/services/provider-resolver.js.map +0 -1
- package/src/services/provider-resolver.ts +0 -146
- package/src/services/provider-validator.ts +0 -170
- package/src/services/session-registration.service.ts +0 -251
- package/src/services/storage.service.ts +0 -566
- package/src/services/tool-context-builder.ts +0 -237
- package/src/services/tool-protection.service.ts +0 -1070
- package/src/types/oauth-required-error.ts +0 -63
- package/src/types/tool-protection.ts +0 -155
- package/src/utils/__tests__/did-helpers.test.ts +0 -156
- package/src/utils/base58.ts +0 -109
- package/src/utils/base64.ts +0 -148
- package/src/utils/cors.ts +0 -83
- package/src/utils/did-helpers.ts +0 -210
- package/src/utils/index.ts +0 -8
- package/src/utils/storage-keys.ts +0 -278
- package/tsconfig.json +0 -21
- package/vitest.config.ts +0 -56
|
@@ -1,595 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Base Extensions Tests
|
|
3
|
-
*
|
|
4
|
-
* Tests for extension methods, edge cases, and additional functionality
|
|
5
|
-
* not covered in base.test.ts.
|
|
6
|
-
*/
|
|
7
|
-
|
|
8
|
-
import { describe, it, expect, beforeEach, vi } from 'vitest';
|
|
9
|
-
import { MCPIRuntimeBase } from '../../runtime/base';
|
|
10
|
-
import { ProviderRuntimeConfig } from '../../config';
|
|
11
|
-
import { createMockProviders, MockClockProvider, MockFetchProvider, MockIdentityProvider } from '../utils/mock-providers';
|
|
12
|
-
import { UserDidManager } from '../../identity/user-did-manager';
|
|
13
|
-
|
|
14
|
-
describe('MCPIRuntimeBase - Base Extensions', () => {
|
|
15
|
-
let runtime: MCPIRuntimeBase;
|
|
16
|
-
let config: ProviderRuntimeConfig;
|
|
17
|
-
let mockProviders: ReturnType<typeof createMockProviders>;
|
|
18
|
-
|
|
19
|
-
beforeEach(async () => {
|
|
20
|
-
vi.clearAllMocks();
|
|
21
|
-
mockProviders = createMockProviders();
|
|
22
|
-
config = {
|
|
23
|
-
...mockProviders,
|
|
24
|
-
environment: 'development',
|
|
25
|
-
session: {
|
|
26
|
-
timestampSkewSeconds: 120,
|
|
27
|
-
ttlMinutes: 30
|
|
28
|
-
},
|
|
29
|
-
audit: {
|
|
30
|
-
enabled: false
|
|
31
|
-
}
|
|
32
|
-
};
|
|
33
|
-
runtime = new MCPIRuntimeBase(config);
|
|
34
|
-
});
|
|
35
|
-
|
|
36
|
-
describe('initialize with user DID generation', () => {
|
|
37
|
-
it('should initialize UserDidManager when generateUserDids enabled', async () => {
|
|
38
|
-
const configWithUserDid = {
|
|
39
|
-
...config,
|
|
40
|
-
identity: {
|
|
41
|
-
enabled: true,
|
|
42
|
-
generateUserDids: true,
|
|
43
|
-
environment: 'development',
|
|
44
|
-
userDidStorage: 'ephemeral'
|
|
45
|
-
}
|
|
46
|
-
};
|
|
47
|
-
const runtimeWithUserDid = new MCPIRuntimeBase(configWithUserDid);
|
|
48
|
-
await runtimeWithUserDid.initialize();
|
|
49
|
-
|
|
50
|
-
const userDidManager = (runtimeWithUserDid as any).userDidManager;
|
|
51
|
-
expect(userDidManager).toBeInstanceOf(UserDidManager);
|
|
52
|
-
});
|
|
53
|
-
|
|
54
|
-
it('should not initialize UserDidManager when generateUserDids disabled', async () => {
|
|
55
|
-
const configWithoutUserDid = {
|
|
56
|
-
...config,
|
|
57
|
-
identity: {
|
|
58
|
-
enabled: true,
|
|
59
|
-
generateUserDids: false,
|
|
60
|
-
environment: 'development'
|
|
61
|
-
}
|
|
62
|
-
};
|
|
63
|
-
const runtimeWithoutUserDid = new MCPIRuntimeBase(configWithoutUserDid);
|
|
64
|
-
await runtimeWithoutUserDid.initialize();
|
|
65
|
-
|
|
66
|
-
const userDidManager = (runtimeWithoutUserDid as any).userDidManager;
|
|
67
|
-
expect(userDidManager).toBeUndefined();
|
|
68
|
-
});
|
|
69
|
-
|
|
70
|
-
it('should initialize UserDidManager with persistent storage when configured', async () => {
|
|
71
|
-
const configWithPersistent = {
|
|
72
|
-
...config,
|
|
73
|
-
identity: {
|
|
74
|
-
enabled: true,
|
|
75
|
-
generateUserDids: true,
|
|
76
|
-
environment: 'development',
|
|
77
|
-
userDidStorage: 'persistent'
|
|
78
|
-
}
|
|
79
|
-
};
|
|
80
|
-
const runtimeWithPersistent = new MCPIRuntimeBase(configWithPersistent);
|
|
81
|
-
await runtimeWithPersistent.initialize();
|
|
82
|
-
|
|
83
|
-
const userDidManager = (runtimeWithPersistent as any).userDidManager;
|
|
84
|
-
expect(userDidManager).toBeInstanceOf(UserDidManager);
|
|
85
|
-
});
|
|
86
|
-
|
|
87
|
-
it('should handle UserDidManager initialization errors gracefully', async () => {
|
|
88
|
-
const configWithUserDid = {
|
|
89
|
-
...config,
|
|
90
|
-
identity: {
|
|
91
|
-
enabled: true,
|
|
92
|
-
generateUserDids: true,
|
|
93
|
-
environment: 'development'
|
|
94
|
-
}
|
|
95
|
-
};
|
|
96
|
-
const runtimeWithUserDid = new MCPIRuntimeBase(configWithUserDid);
|
|
97
|
-
|
|
98
|
-
// Mock storage.set to throw error
|
|
99
|
-
const originalSet = mockProviders.storageProvider.set;
|
|
100
|
-
mockProviders.storageProvider.set = vi.fn().mockRejectedValue(new Error('Storage error'));
|
|
101
|
-
|
|
102
|
-
// Should not throw
|
|
103
|
-
await expect(runtimeWithUserDid.initialize()).resolves.not.toThrow();
|
|
104
|
-
|
|
105
|
-
// Restore original
|
|
106
|
-
mockProviders.storageProvider.set = originalSet;
|
|
107
|
-
});
|
|
108
|
-
});
|
|
109
|
-
|
|
110
|
-
describe('handleHandshake with user DID generation', () => {
|
|
111
|
-
it('should start session as anonymous (Phase 5)', async () => {
|
|
112
|
-
// Phase 5: Sessions start anonymous - userDid is only set after OAuth
|
|
113
|
-
const configWithUserDid = {
|
|
114
|
-
...config,
|
|
115
|
-
identity: {
|
|
116
|
-
enabled: true,
|
|
117
|
-
generateUserDids: true,
|
|
118
|
-
environment: 'development'
|
|
119
|
-
}
|
|
120
|
-
};
|
|
121
|
-
const runtimeWithUserDid = new MCPIRuntimeBase(configWithUserDid);
|
|
122
|
-
await runtimeWithUserDid.initialize();
|
|
123
|
-
|
|
124
|
-
const response = await runtimeWithUserDid.handleHandshake({
|
|
125
|
-
audience: 'https://client.example.com'
|
|
126
|
-
});
|
|
127
|
-
|
|
128
|
-
// Phase 5: userDid is undefined in response - session is anonymous
|
|
129
|
-
expect(response.userDid).toBeUndefined();
|
|
130
|
-
|
|
131
|
-
// Check session's identityState
|
|
132
|
-
const session = await runtimeWithUserDid.getCurrentSession();
|
|
133
|
-
expect(session.identityState).toBe('anonymous');
|
|
134
|
-
});
|
|
135
|
-
|
|
136
|
-
it('should use provided clientDid with anonymous session (Phase 5)', async () => {
|
|
137
|
-
// Phase 5: clientDid can be set while session stays anonymous (no userDid)
|
|
138
|
-
const configWithUserDid = {
|
|
139
|
-
...config,
|
|
140
|
-
identity: {
|
|
141
|
-
enabled: true,
|
|
142
|
-
generateUserDids: true,
|
|
143
|
-
environment: 'development'
|
|
144
|
-
}
|
|
145
|
-
};
|
|
146
|
-
const runtimeWithUserDid = new MCPIRuntimeBase(configWithUserDid);
|
|
147
|
-
await runtimeWithUserDid.initialize();
|
|
148
|
-
|
|
149
|
-
const response = await runtimeWithUserDid.handleHandshake({
|
|
150
|
-
clientDid: 'did:key:zprovided123',
|
|
151
|
-
audience: 'https://client.example.com'
|
|
152
|
-
});
|
|
153
|
-
|
|
154
|
-
const session = await runtimeWithUserDid.getCurrentSession();
|
|
155
|
-
expect(session.clientDid).toBe('did:key:zprovided123');
|
|
156
|
-
|
|
157
|
-
// Phase 5: userDid is undefined - session is anonymous until OAuth
|
|
158
|
-
expect(session.userDid).toBeUndefined();
|
|
159
|
-
expect(session.identityState).toBe('anonymous');
|
|
160
|
-
});
|
|
161
|
-
|
|
162
|
-
it('should handle user DID generation errors gracefully', async () => {
|
|
163
|
-
const configWithUserDid = {
|
|
164
|
-
...config,
|
|
165
|
-
identity: {
|
|
166
|
-
enabled: true,
|
|
167
|
-
generateUserDids: true,
|
|
168
|
-
environment: 'development'
|
|
169
|
-
}
|
|
170
|
-
};
|
|
171
|
-
const runtimeWithUserDid = new MCPIRuntimeBase(configWithUserDid);
|
|
172
|
-
await runtimeWithUserDid.initialize();
|
|
173
|
-
|
|
174
|
-
// Phase 5: getOrCreateUserDid now returns null instead of generating ephemeral DIDs
|
|
175
|
-
// Sessions start anonymous - no userDid at handshake
|
|
176
|
-
const userDidManager = (runtimeWithUserDid as any).userDidManager;
|
|
177
|
-
const originalGetOrCreate = userDidManager.getOrCreateUserDid;
|
|
178
|
-
userDidManager.getOrCreateUserDid = vi.fn().mockResolvedValue(null);
|
|
179
|
-
|
|
180
|
-
const response = await runtimeWithUserDid.handleHandshake({
|
|
181
|
-
audience: 'https://client.example.com'
|
|
182
|
-
});
|
|
183
|
-
|
|
184
|
-
// Should succeed with anonymous session (no userDid)
|
|
185
|
-
expect(response.sessionId).toBeDefined();
|
|
186
|
-
|
|
187
|
-
// Phase 5: Session should be anonymous without userDid
|
|
188
|
-
const session = await runtimeWithUserDid.getCurrentSession();
|
|
189
|
-
expect(session.userDid).toBeUndefined();
|
|
190
|
-
expect(session.identityState).toBe('anonymous');
|
|
191
|
-
|
|
192
|
-
userDidManager.getOrCreateUserDid = originalGetOrCreate;
|
|
193
|
-
});
|
|
194
|
-
});
|
|
195
|
-
|
|
196
|
-
describe('createWellKnownHandler edge cases', () => {
|
|
197
|
-
let handler: any;
|
|
198
|
-
|
|
199
|
-
beforeEach(async () => {
|
|
200
|
-
await runtime.initialize();
|
|
201
|
-
handler = runtime.createWellKnownHandler({
|
|
202
|
-
serviceName: 'Test Service',
|
|
203
|
-
serviceEndpoint: 'https://test.example.com'
|
|
204
|
-
});
|
|
205
|
-
});
|
|
206
|
-
|
|
207
|
-
it('should handle /.well-known/agent.json with all fields', async () => {
|
|
208
|
-
const response = await handler('/.well-known/agent.json');
|
|
209
|
-
|
|
210
|
-
expect(response.status).toBe(200);
|
|
211
|
-
expect(response.headers['Content-Type']).toBe('application/json');
|
|
212
|
-
|
|
213
|
-
const result = JSON.parse(response.body);
|
|
214
|
-
expect(result.id).toBe('did:key:zmock123');
|
|
215
|
-
expect(result.capabilities).toEqual({
|
|
216
|
-
'mcp-i': ['handshake', 'signing', 'verification']
|
|
217
|
-
});
|
|
218
|
-
expect(result.metadata.name).toBe('Test Service');
|
|
219
|
-
expect(result.metadata.serviceEndpoint).toBe('https://test.example.com');
|
|
220
|
-
});
|
|
221
|
-
|
|
222
|
-
it('should handle /.well-known/agent.json with partial config', async () => {
|
|
223
|
-
const partialHandler = runtime.createWellKnownHandler({
|
|
224
|
-
serviceName: 'Partial Service'
|
|
225
|
-
});
|
|
226
|
-
|
|
227
|
-
const response = await partialHandler('/.well-known/agent.json');
|
|
228
|
-
const result = JSON.parse(response.body);
|
|
229
|
-
|
|
230
|
-
expect(result.metadata.name).toBe('Partial Service');
|
|
231
|
-
// serviceEndpoint may not be included if not provided in config
|
|
232
|
-
if (result.metadata.serviceEndpoint) {
|
|
233
|
-
expect(result.metadata.serviceEndpoint).toBe('https://example.com');
|
|
234
|
-
}
|
|
235
|
-
});
|
|
236
|
-
|
|
237
|
-
it('should set cache headers based on environment', async () => {
|
|
238
|
-
const prodConfig = {
|
|
239
|
-
...config,
|
|
240
|
-
environment: 'production'
|
|
241
|
-
};
|
|
242
|
-
const prodRuntime = new MCPIRuntimeBase(prodConfig);
|
|
243
|
-
await prodRuntime.initialize();
|
|
244
|
-
|
|
245
|
-
const prodHandler = prodRuntime.createWellKnownHandler();
|
|
246
|
-
const response = await prodHandler('/.well-known/did.json');
|
|
247
|
-
|
|
248
|
-
expect(response.headers['Cache-Control']).toBe('public, max-age=300');
|
|
249
|
-
});
|
|
250
|
-
|
|
251
|
-
it('should set no-store cache headers in development', async () => {
|
|
252
|
-
const response = await handler('/.well-known/did.json');
|
|
253
|
-
expect(response.headers['Cache-Control']).toBe('no-store');
|
|
254
|
-
});
|
|
255
|
-
|
|
256
|
-
it('should handle unknown paths gracefully', async () => {
|
|
257
|
-
const result = await handler('/.well-known/unknown');
|
|
258
|
-
expect(result).toBeNull();
|
|
259
|
-
});
|
|
260
|
-
|
|
261
|
-
it('should handle empty path', async () => {
|
|
262
|
-
const result = await handler('');
|
|
263
|
-
expect(result).toBeNull();
|
|
264
|
-
});
|
|
265
|
-
});
|
|
266
|
-
|
|
267
|
-
describe('createDebugEndpoint edge cases', () => {
|
|
268
|
-
it('should return null in production environment', () => {
|
|
269
|
-
const prodConfig = {
|
|
270
|
-
...config,
|
|
271
|
-
environment: 'production'
|
|
272
|
-
};
|
|
273
|
-
const prodRuntime = new MCPIRuntimeBase(prodConfig);
|
|
274
|
-
const endpoint = prodRuntime.createDebugEndpoint();
|
|
275
|
-
expect(endpoint).toBeNull();
|
|
276
|
-
});
|
|
277
|
-
|
|
278
|
-
it('should include all config values in debug output', async () => {
|
|
279
|
-
const customConfig = {
|
|
280
|
-
...config,
|
|
281
|
-
environment: 'development',
|
|
282
|
-
session: {
|
|
283
|
-
timestampSkewSeconds: 60,
|
|
284
|
-
ttlMinutes: 60
|
|
285
|
-
}
|
|
286
|
-
};
|
|
287
|
-
const customRuntime = new MCPIRuntimeBase(customConfig);
|
|
288
|
-
await customRuntime.initialize();
|
|
289
|
-
|
|
290
|
-
const endpoint = customRuntime.createDebugEndpoint();
|
|
291
|
-
const result = await endpoint!();
|
|
292
|
-
|
|
293
|
-
expect(result.config.timestampSkewSeconds).toBe(60);
|
|
294
|
-
expect(result.config.sessionTtlMinutes).toBe(60);
|
|
295
|
-
expect(result.config.environment).toBe('development');
|
|
296
|
-
});
|
|
297
|
-
|
|
298
|
-
it('should handle missing session gracefully', async () => {
|
|
299
|
-
await runtime.initialize();
|
|
300
|
-
const endpoint = runtime.createDebugEndpoint();
|
|
301
|
-
const result = await endpoint!();
|
|
302
|
-
|
|
303
|
-
expect(result.session).toBeNull();
|
|
304
|
-
});
|
|
305
|
-
});
|
|
306
|
-
|
|
307
|
-
describe('getAuditLogger', () => {
|
|
308
|
-
it('should return logger with log method', () => {
|
|
309
|
-
const logger = runtime.getAuditLogger();
|
|
310
|
-
expect(logger).toBeDefined();
|
|
311
|
-
expect(typeof logger.log).toBe('function');
|
|
312
|
-
});
|
|
313
|
-
|
|
314
|
-
it('should log through runtime audit system', async () => {
|
|
315
|
-
const auditConfig = {
|
|
316
|
-
...config,
|
|
317
|
-
audit: {
|
|
318
|
-
enabled: true,
|
|
319
|
-
logFunction: vi.fn(),
|
|
320
|
-
includePayloads: true
|
|
321
|
-
}
|
|
322
|
-
};
|
|
323
|
-
const auditRuntime = new MCPIRuntimeBase(auditConfig);
|
|
324
|
-
await auditRuntime.initialize();
|
|
325
|
-
|
|
326
|
-
const logger = auditRuntime.getAuditLogger();
|
|
327
|
-
logger.log('test_event', { test: 'data' });
|
|
328
|
-
|
|
329
|
-
expect(auditConfig.audit!.logFunction).toHaveBeenCalledWith(
|
|
330
|
-
expect.stringContaining('test_event')
|
|
331
|
-
);
|
|
332
|
-
});
|
|
333
|
-
|
|
334
|
-
it('should handle audit disabled', () => {
|
|
335
|
-
const noAuditConfig = {
|
|
336
|
-
...config,
|
|
337
|
-
audit: {
|
|
338
|
-
enabled: false
|
|
339
|
-
}
|
|
340
|
-
};
|
|
341
|
-
const noAuditRuntime = new MCPIRuntimeBase(noAuditConfig);
|
|
342
|
-
const logger = noAuditRuntime.getAuditLogger();
|
|
343
|
-
|
|
344
|
-
// Should not throw
|
|
345
|
-
logger.log('test_event', { test: 'data' });
|
|
346
|
-
});
|
|
347
|
-
});
|
|
348
|
-
|
|
349
|
-
describe('rotateKeys', () => {
|
|
350
|
-
beforeEach(async () => {
|
|
351
|
-
await runtime.initialize();
|
|
352
|
-
});
|
|
353
|
-
|
|
354
|
-
it('should update cached identity after rotation', async () => {
|
|
355
|
-
const oldIdentity = await runtime.getIdentity();
|
|
356
|
-
const newIdentity = await runtime.rotateKeys();
|
|
357
|
-
|
|
358
|
-
const currentIdentity = await runtime.getIdentity();
|
|
359
|
-
expect(currentIdentity.did).toBe(newIdentity.did);
|
|
360
|
-
expect(currentIdentity.did).not.toBe(oldIdentity.did);
|
|
361
|
-
});
|
|
362
|
-
|
|
363
|
-
it('should handle rotation errors gracefully', async () => {
|
|
364
|
-
const identityProvider = mockProviders.identityProvider as MockIdentityProvider;
|
|
365
|
-
const originalRotate = identityProvider.rotateKeys;
|
|
366
|
-
identityProvider.rotateKeys = vi.fn().mockRejectedValue(new Error('Rotation failed'));
|
|
367
|
-
|
|
368
|
-
await expect(runtime.rotateKeys()).rejects.toThrow('Rotation failed');
|
|
369
|
-
|
|
370
|
-
identityProvider.rotateKeys = originalRotate;
|
|
371
|
-
});
|
|
372
|
-
});
|
|
373
|
-
|
|
374
|
-
describe('helper methods', () => {
|
|
375
|
-
beforeEach(async () => {
|
|
376
|
-
await runtime.initialize();
|
|
377
|
-
});
|
|
378
|
-
|
|
379
|
-
describe('extractPublicKey', () => {
|
|
380
|
-
it('should extract publicKeyBase64 from DID document', () => {
|
|
381
|
-
const didDoc = {
|
|
382
|
-
verificationMethod: [{
|
|
383
|
-
publicKeyBase64: 'test-key-base64'
|
|
384
|
-
}]
|
|
385
|
-
};
|
|
386
|
-
|
|
387
|
-
const extractPublicKey = (runtime as any).extractPublicKey.bind(runtime);
|
|
388
|
-
const publicKey = extractPublicKey(didDoc);
|
|
389
|
-
expect(publicKey).toBe('test-key-base64');
|
|
390
|
-
});
|
|
391
|
-
|
|
392
|
-
it('should extract publicKeyMultibase from DID document', () => {
|
|
393
|
-
const didDoc = {
|
|
394
|
-
verificationMethod: [{
|
|
395
|
-
publicKeyMultibase: 'zmultibase-key'
|
|
396
|
-
}]
|
|
397
|
-
};
|
|
398
|
-
|
|
399
|
-
const extractPublicKey = (runtime as any).extractPublicKey.bind(runtime);
|
|
400
|
-
const publicKey = extractPublicKey(didDoc);
|
|
401
|
-
expect(publicKey).toBe('zmultibase-key');
|
|
402
|
-
});
|
|
403
|
-
|
|
404
|
-
it('should prioritize publicKeyBase64 over publicKeyMultibase', () => {
|
|
405
|
-
const didDoc = {
|
|
406
|
-
verificationMethod: [{
|
|
407
|
-
publicKeyBase64: 'base64-key',
|
|
408
|
-
publicKeyMultibase: 'multibase-key'
|
|
409
|
-
}]
|
|
410
|
-
};
|
|
411
|
-
|
|
412
|
-
const extractPublicKey = (runtime as any).extractPublicKey.bind(runtime);
|
|
413
|
-
const publicKey = extractPublicKey(didDoc);
|
|
414
|
-
expect(publicKey).toBe('base64-key');
|
|
415
|
-
});
|
|
416
|
-
|
|
417
|
-
it('should throw if no public key found', () => {
|
|
418
|
-
const didDoc = {
|
|
419
|
-
verificationMethod: [{}]
|
|
420
|
-
};
|
|
421
|
-
|
|
422
|
-
const extractPublicKey = (runtime as any).extractPublicKey.bind(runtime);
|
|
423
|
-
expect(() => extractPublicKey(didDoc)).toThrow('Public key not found');
|
|
424
|
-
});
|
|
425
|
-
|
|
426
|
-
it('should throw if verificationMethod is empty', () => {
|
|
427
|
-
const didDoc = {
|
|
428
|
-
verificationMethod: []
|
|
429
|
-
};
|
|
430
|
-
|
|
431
|
-
const extractPublicKey = (runtime as any).extractPublicKey.bind(runtime);
|
|
432
|
-
expect(() => extractPublicKey(didDoc)).toThrow('Public key not found');
|
|
433
|
-
});
|
|
434
|
-
|
|
435
|
-
it('should throw if verificationMethod is missing', () => {
|
|
436
|
-
const didDoc = {};
|
|
437
|
-
|
|
438
|
-
const extractPublicKey = (runtime as any).extractPublicKey.bind(runtime);
|
|
439
|
-
expect(() => extractPublicKey(didDoc)).toThrow('Public key not found');
|
|
440
|
-
});
|
|
441
|
-
});
|
|
442
|
-
|
|
443
|
-
describe('bytesToBase64', () => {
|
|
444
|
-
it('should convert Uint8Array to base64', () => {
|
|
445
|
-
const bytes = new Uint8Array([1, 2, 3, 4, 5]);
|
|
446
|
-
const bytesToBase64 = (runtime as any).bytesToBase64.bind(runtime);
|
|
447
|
-
const base64 = bytesToBase64(bytes);
|
|
448
|
-
expect(base64).toBeDefined();
|
|
449
|
-
expect(typeof base64).toBe('string');
|
|
450
|
-
});
|
|
451
|
-
});
|
|
452
|
-
|
|
453
|
-
describe('base64ToBytes', () => {
|
|
454
|
-
it('should convert base64 to Uint8Array', () => {
|
|
455
|
-
const base64 = Buffer.from([1, 2, 3, 4, 5]).toString('base64');
|
|
456
|
-
const base64ToBytes = (runtime as any).base64ToBytes.bind(runtime);
|
|
457
|
-
const bytes = base64ToBytes(base64);
|
|
458
|
-
expect(bytes).toBeInstanceOf(Uint8Array);
|
|
459
|
-
expect(bytes.length).toBe(5);
|
|
460
|
-
});
|
|
461
|
-
});
|
|
462
|
-
|
|
463
|
-
describe('bytesToHex', () => {
|
|
464
|
-
it('should convert Uint8Array to hex string', () => {
|
|
465
|
-
const bytes = new Uint8Array([1, 2, 3, 4, 5]);
|
|
466
|
-
const bytesToHex = (runtime as any).bytesToHex.bind(runtime);
|
|
467
|
-
const hex = bytesToHex(bytes);
|
|
468
|
-
expect(hex).toBeDefined();
|
|
469
|
-
expect(typeof hex).toBe('string');
|
|
470
|
-
expect(hex.length).toBe(10); // 5 bytes * 2 hex chars
|
|
471
|
-
});
|
|
472
|
-
});
|
|
473
|
-
});
|
|
474
|
-
|
|
475
|
-
describe('session management edge cases', () => {
|
|
476
|
-
beforeEach(async () => {
|
|
477
|
-
await runtime.initialize();
|
|
478
|
-
});
|
|
479
|
-
|
|
480
|
-
it('should handle multiple sessions', async () => {
|
|
481
|
-
const handshake1 = await runtime.handleHandshake({
|
|
482
|
-
clientDid: 'did:key:zclient1',
|
|
483
|
-
audience: 'https://client1.example.com'
|
|
484
|
-
});
|
|
485
|
-
|
|
486
|
-
const handshake2 = await runtime.handleHandshake({
|
|
487
|
-
clientDid: 'did:key:zclient2',
|
|
488
|
-
audience: 'https://client2.example.com'
|
|
489
|
-
});
|
|
490
|
-
|
|
491
|
-
const session = await runtime.getCurrentSession();
|
|
492
|
-
// Should return a non-expired session (could be either)
|
|
493
|
-
expect(session).toBeDefined();
|
|
494
|
-
expect([handshake1.sessionId, handshake2.sessionId]).toContain(session.id);
|
|
495
|
-
});
|
|
496
|
-
|
|
497
|
-
it('should filter out expired sessions', async () => {
|
|
498
|
-
const clock = mockProviders.clockProvider as MockClockProvider;
|
|
499
|
-
const currentTime = Date.now();
|
|
500
|
-
clock.setTime(currentTime);
|
|
501
|
-
|
|
502
|
-
const handshake1 = await runtime.handleHandshake({
|
|
503
|
-
clientDid: 'did:key:zclient1',
|
|
504
|
-
audience: 'https://client1.example.com'
|
|
505
|
-
});
|
|
506
|
-
|
|
507
|
-
// Advance time past expiry
|
|
508
|
-
clock.setTime(currentTime + (31 * 60 * 1000));
|
|
509
|
-
|
|
510
|
-
const handshake2 = await runtime.handleHandshake({
|
|
511
|
-
clientDid: 'did:key:zclient2',
|
|
512
|
-
audience: 'https://client2.example.com'
|
|
513
|
-
});
|
|
514
|
-
|
|
515
|
-
const session = await runtime.getCurrentSession();
|
|
516
|
-
expect(session.id).toBe(handshake2.sessionId);
|
|
517
|
-
});
|
|
518
|
-
|
|
519
|
-
it('should handle empty sessions map', async () => {
|
|
520
|
-
const session = await runtime.getCurrentSession();
|
|
521
|
-
expect(session).toBeNull();
|
|
522
|
-
});
|
|
523
|
-
});
|
|
524
|
-
|
|
525
|
-
describe('nonce cache integration', () => {
|
|
526
|
-
beforeEach(async () => {
|
|
527
|
-
await runtime.initialize();
|
|
528
|
-
});
|
|
529
|
-
|
|
530
|
-
it('should cache nonce with proper expiry', async () => {
|
|
531
|
-
const clock = mockProviders.clockProvider as MockClockProvider;
|
|
532
|
-
const currentTime = Date.now();
|
|
533
|
-
clock.setTime(currentTime);
|
|
534
|
-
|
|
535
|
-
const nonce = await runtime.issueNonce('session123');
|
|
536
|
-
const nonceCache = mockProviders.nonceCacheProvider as any;
|
|
537
|
-
const identity = await runtime.getIdentity();
|
|
538
|
-
expect(await nonceCache.has(nonce, identity.did)).toBe(true);
|
|
539
|
-
|
|
540
|
-
// Advance time past expiry
|
|
541
|
-
clock.setTime(currentTime + (5 * 60 * 1000) + 1);
|
|
542
|
-
expect(await nonceCache.has(nonce, identity.did)).toBe(false);
|
|
543
|
-
});
|
|
544
|
-
|
|
545
|
-
it('should use session nonce if provided', async () => {
|
|
546
|
-
const session = {
|
|
547
|
-
id: 'session123',
|
|
548
|
-
audience: 'https://client.example.com',
|
|
549
|
-
nonce: 'pre-generated-nonce'
|
|
550
|
-
};
|
|
551
|
-
|
|
552
|
-
const proof = await runtime.createProof({ test: 'data' }, session);
|
|
553
|
-
expect(proof.nonce).toBe('pre-generated-nonce');
|
|
554
|
-
});
|
|
555
|
-
});
|
|
556
|
-
|
|
557
|
-
describe('error handling', () => {
|
|
558
|
-
it('should handle identity provider errors gracefully', async () => {
|
|
559
|
-
const identityProvider = mockProviders.identityProvider as MockIdentityProvider;
|
|
560
|
-
const originalGetIdentity = identityProvider.getIdentity;
|
|
561
|
-
identityProvider.getIdentity = vi.fn().mockRejectedValue(new Error('Identity error'));
|
|
562
|
-
|
|
563
|
-
await expect(runtime.getIdentity()).rejects.toThrow('Identity error');
|
|
564
|
-
|
|
565
|
-
identityProvider.getIdentity = originalGetIdentity;
|
|
566
|
-
});
|
|
567
|
-
|
|
568
|
-
it('should handle crypto provider errors gracefully', async () => {
|
|
569
|
-
const originalSign = mockProviders.cryptoProvider.sign;
|
|
570
|
-
mockProviders.cryptoProvider.sign = vi.fn().mockRejectedValue(new Error('Crypto error'));
|
|
571
|
-
|
|
572
|
-
await expect(
|
|
573
|
-
runtime.createProof({ test: 'data' })
|
|
574
|
-
).rejects.toThrow('Crypto error');
|
|
575
|
-
|
|
576
|
-
mockProviders.cryptoProvider.sign = originalSign;
|
|
577
|
-
});
|
|
578
|
-
|
|
579
|
-
it('should handle fetch provider errors in verifyProof', async () => {
|
|
580
|
-
await runtime.initialize();
|
|
581
|
-
|
|
582
|
-
const fetchProvider = mockProviders.fetchProvider as MockFetchProvider;
|
|
583
|
-
const originalResolveDID = fetchProvider.resolveDID;
|
|
584
|
-
fetchProvider.resolveDID = vi.fn().mockRejectedValue(new Error('DID resolution failed'));
|
|
585
|
-
|
|
586
|
-
const proof = await runtime.createProof({ test: 'data' });
|
|
587
|
-
const isValid = await runtime.verifyProof({ test: 'data' }, proof);
|
|
588
|
-
|
|
589
|
-
expect(isValid).toBe(false); // Should return false on error
|
|
590
|
-
|
|
591
|
-
fetchProvider.resolveDID = originalResolveDID;
|
|
592
|
-
});
|
|
593
|
-
});
|
|
594
|
-
});
|
|
595
|
-
|