@kya-os/mcp-i-core 1.3.13 → 1.3.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (255) hide show
  1. package/dist/config/remote-config.js +9 -12
  2. package/dist/runtime/base.d.ts +2 -1
  3. package/dist/runtime/base.js +34 -6
  4. package/dist/services/access-control.service.js +5 -0
  5. package/dist/services/tool-protection.service.js +17 -8
  6. package/package.json +2 -2
  7. package/.turbo/turbo-build.log +0 -4
  8. package/.turbo/turbo-test$colon$coverage.log +0 -4586
  9. package/.turbo/turbo-test.log +0 -4631
  10. package/COMPLIANCE_IMPROVEMENT_REPORT.md +0 -483
  11. package/Composer 3.md +0 -615
  12. package/GPT-5.md +0 -1169
  13. package/OPUS-plan.md +0 -352
  14. package/PHASE_3_AND_4.1_SUMMARY.md +0 -585
  15. package/PHASE_3_SUMMARY.md +0 -317
  16. package/PHASE_4.1.3_SUMMARY.md +0 -428
  17. package/PHASE_4.1_COMPLETE.md +0 -525
  18. package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +0 -1240
  19. package/SCHEMA_COMPLIANCE_REPORT.md +0 -275
  20. package/TEST_PLAN.md +0 -571
  21. package/coverage/coverage-final.json +0 -60
  22. package/dist/cache/oauth-config-cache.d.ts.map +0 -1
  23. package/dist/cache/oauth-config-cache.js.map +0 -1
  24. package/dist/cache/tool-protection-cache.d.ts.map +0 -1
  25. package/dist/cache/tool-protection-cache.js.map +0 -1
  26. package/dist/compliance/index.d.ts.map +0 -1
  27. package/dist/compliance/index.js.map +0 -1
  28. package/dist/compliance/schema-registry.d.ts.map +0 -1
  29. package/dist/compliance/schema-registry.js.map +0 -1
  30. package/dist/compliance/schema-verifier.d.ts.map +0 -1
  31. package/dist/compliance/schema-verifier.js.map +0 -1
  32. package/dist/config/remote-config.d.ts.map +0 -1
  33. package/dist/config/remote-config.js.map +0 -1
  34. package/dist/config.d.ts.map +0 -1
  35. package/dist/config.js.map +0 -1
  36. package/dist/delegation/audience-validator.d.ts.map +0 -1
  37. package/dist/delegation/audience-validator.js.map +0 -1
  38. package/dist/delegation/bitstring.d.ts.map +0 -1
  39. package/dist/delegation/bitstring.js.map +0 -1
  40. package/dist/delegation/cascading-revocation.d.ts.map +0 -1
  41. package/dist/delegation/cascading-revocation.js.map +0 -1
  42. package/dist/delegation/delegation-graph.d.ts.map +0 -1
  43. package/dist/delegation/delegation-graph.js.map +0 -1
  44. package/dist/delegation/did-key-resolver.d.ts.map +0 -1
  45. package/dist/delegation/did-key-resolver.js.map +0 -1
  46. package/dist/delegation/index.d.ts.map +0 -1
  47. package/dist/delegation/index.js.map +0 -1
  48. package/dist/delegation/statuslist-manager.d.ts.map +0 -1
  49. package/dist/delegation/statuslist-manager.js.map +0 -1
  50. package/dist/delegation/storage/index.d.ts.map +0 -1
  51. package/dist/delegation/storage/index.js.map +0 -1
  52. package/dist/delegation/storage/memory-graph-storage.d.ts.map +0 -1
  53. package/dist/delegation/storage/memory-graph-storage.js.map +0 -1
  54. package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +0 -1
  55. package/dist/delegation/storage/memory-statuslist-storage.js.map +0 -1
  56. package/dist/delegation/utils.d.ts.map +0 -1
  57. package/dist/delegation/utils.js.map +0 -1
  58. package/dist/delegation/vc-issuer.d.ts.map +0 -1
  59. package/dist/delegation/vc-issuer.js.map +0 -1
  60. package/dist/delegation/vc-verifier.d.ts.map +0 -1
  61. package/dist/delegation/vc-verifier.js.map +0 -1
  62. package/dist/identity/idp-token-resolver.d.ts.map +0 -1
  63. package/dist/identity/idp-token-resolver.js.map +0 -1
  64. package/dist/identity/idp-token-storage.interface.d.ts.map +0 -1
  65. package/dist/identity/idp-token-storage.interface.js.map +0 -1
  66. package/dist/identity/user-did-manager.d.ts.map +0 -1
  67. package/dist/identity/user-did-manager.js.map +0 -1
  68. package/dist/index.d.ts.map +0 -1
  69. package/dist/index.js.map +0 -1
  70. package/dist/providers/base.d.ts.map +0 -1
  71. package/dist/providers/base.js.map +0 -1
  72. package/dist/providers/memory.d.ts.map +0 -1
  73. package/dist/providers/memory.js.map +0 -1
  74. package/dist/runtime/audit-logger.d.ts.map +0 -1
  75. package/dist/runtime/audit-logger.js.map +0 -1
  76. package/dist/runtime/base.d.ts.map +0 -1
  77. package/dist/runtime/base.js.map +0 -1
  78. package/dist/services/access-control.service.d.ts.map +0 -1
  79. package/dist/services/access-control.service.js.map +0 -1
  80. package/dist/services/authorization/authorization-registry.d.ts.map +0 -1
  81. package/dist/services/authorization/authorization-registry.js.map +0 -1
  82. package/dist/services/authorization/types.d.ts.map +0 -1
  83. package/dist/services/authorization/types.js.map +0 -1
  84. package/dist/services/batch-delegation.service.d.ts.map +0 -1
  85. package/dist/services/batch-delegation.service.js.map +0 -1
  86. package/dist/services/crypto.service.d.ts.map +0 -1
  87. package/dist/services/crypto.service.js.map +0 -1
  88. package/dist/services/errors.d.ts.map +0 -1
  89. package/dist/services/errors.js.map +0 -1
  90. package/dist/services/index.d.ts.map +0 -1
  91. package/dist/services/index.js.map +0 -1
  92. package/dist/services/oauth-config.service.d.ts.map +0 -1
  93. package/dist/services/oauth-config.service.js.map +0 -1
  94. package/dist/services/oauth-provider-registry.d.ts.map +0 -1
  95. package/dist/services/oauth-provider-registry.js.map +0 -1
  96. package/dist/services/oauth-service.d.ts.map +0 -1
  97. package/dist/services/oauth-service.js.map +0 -1
  98. package/dist/services/oauth-token-retrieval.service.d.ts.map +0 -1
  99. package/dist/services/oauth-token-retrieval.service.js.map +0 -1
  100. package/dist/services/proof-verifier.d.ts.map +0 -1
  101. package/dist/services/proof-verifier.js.map +0 -1
  102. package/dist/services/provider-resolver.d.ts.map +0 -1
  103. package/dist/services/provider-resolver.js.map +0 -1
  104. package/dist/services/provider-validator.d.ts.map +0 -1
  105. package/dist/services/provider-validator.js.map +0 -1
  106. package/dist/services/session-registration.service.d.ts.map +0 -1
  107. package/dist/services/session-registration.service.js.map +0 -1
  108. package/dist/services/storage.service.d.ts.map +0 -1
  109. package/dist/services/storage.service.js.map +0 -1
  110. package/dist/services/tool-context-builder.d.ts.map +0 -1
  111. package/dist/services/tool-context-builder.js.map +0 -1
  112. package/dist/services/tool-protection.service.d.ts.map +0 -1
  113. package/dist/services/tool-protection.service.js.map +0 -1
  114. package/dist/types/oauth-required-error.d.ts.map +0 -1
  115. package/dist/types/oauth-required-error.js.map +0 -1
  116. package/dist/types/tool-protection.d.ts.map +0 -1
  117. package/dist/types/tool-protection.js.map +0 -1
  118. package/dist/utils/base58.d.ts.map +0 -1
  119. package/dist/utils/base58.js.map +0 -1
  120. package/dist/utils/base64.d.ts.map +0 -1
  121. package/dist/utils/base64.js.map +0 -1
  122. package/dist/utils/cors.d.ts.map +0 -1
  123. package/dist/utils/cors.js.map +0 -1
  124. package/dist/utils/did-helpers.d.ts.map +0 -1
  125. package/dist/utils/did-helpers.js.map +0 -1
  126. package/dist/utils/index.d.ts.map +0 -1
  127. package/dist/utils/index.js.map +0 -1
  128. package/dist/utils/storage-keys.d.ts.map +0 -1
  129. package/dist/utils/storage-keys.js.map +0 -1
  130. package/docs/API_REFERENCE.md +0 -1362
  131. package/docs/COMPLIANCE_MATRIX.md +0 -691
  132. package/docs/STATUSLIST2021_GUIDE.md +0 -696
  133. package/docs/W3C_VC_DELEGATION_GUIDE.md +0 -710
  134. package/src/__tests__/cache/tool-protection-cache.test.ts +0 -640
  135. package/src/__tests__/config/provider-runtime-config.test.ts +0 -309
  136. package/src/__tests__/delegation-e2e.test.ts +0 -690
  137. package/src/__tests__/identity/user-did-manager.test.ts +0 -232
  138. package/src/__tests__/index.test.ts +0 -56
  139. package/src/__tests__/integration/full-flow.test.ts +0 -789
  140. package/src/__tests__/integration.test.ts +0 -281
  141. package/src/__tests__/providers/base.test.ts +0 -173
  142. package/src/__tests__/providers/memory.test.ts +0 -319
  143. package/src/__tests__/regression/phase2-regression.test.ts +0 -429
  144. package/src/__tests__/runtime/audit-logger.test.ts +0 -154
  145. package/src/__tests__/runtime/base-extensions.test.ts +0 -595
  146. package/src/__tests__/runtime/base.test.ts +0 -869
  147. package/src/__tests__/runtime/delegation-flow.test.ts +0 -164
  148. package/src/__tests__/runtime/proof-client-did.test.ts +0 -376
  149. package/src/__tests__/runtime/route-interception.test.ts +0 -686
  150. package/src/__tests__/runtime/tool-protection-enforcement.test.ts +0 -908
  151. package/src/__tests__/services/agentshield-integration.test.ts +0 -791
  152. package/src/__tests__/services/cache-busting.test.ts +0 -125
  153. package/src/__tests__/services/oauth-service-pkce.test.ts +0 -556
  154. package/src/__tests__/services/provider-resolver-edge-cases.test.ts +0 -591
  155. package/src/__tests__/services/tool-protection-merged-config.test.ts +0 -485
  156. package/src/__tests__/services/tool-protection-oauth-provider.test.ts +0 -480
  157. package/src/__tests__/services/tool-protection.service.test.ts +0 -1373
  158. package/src/__tests__/utils/mock-providers.ts +0 -340
  159. package/src/cache/oauth-config-cache.d.ts +0 -69
  160. package/src/cache/oauth-config-cache.d.ts.map +0 -1
  161. package/src/cache/oauth-config-cache.js.map +0 -1
  162. package/src/cache/oauth-config-cache.ts +0 -123
  163. package/src/cache/tool-protection-cache.ts +0 -171
  164. package/src/compliance/EXAMPLE.md +0 -412
  165. package/src/compliance/__tests__/schema-verifier.test.ts +0 -797
  166. package/src/compliance/index.ts +0 -8
  167. package/src/compliance/schema-registry.ts +0 -460
  168. package/src/compliance/schema-verifier.ts +0 -708
  169. package/src/config/__tests__/merged-config.spec.ts +0 -445
  170. package/src/config/__tests__/remote-config.spec.ts +0 -268
  171. package/src/config/remote-config.ts +0 -264
  172. package/src/config.ts +0 -312
  173. package/src/delegation/__tests__/audience-validator.test.ts +0 -112
  174. package/src/delegation/__tests__/bitstring.test.ts +0 -346
  175. package/src/delegation/__tests__/cascading-revocation.test.ts +0 -628
  176. package/src/delegation/__tests__/delegation-graph.test.ts +0 -584
  177. package/src/delegation/__tests__/did-key-resolver.test.ts +0 -265
  178. package/src/delegation/__tests__/utils.test.ts +0 -152
  179. package/src/delegation/__tests__/vc-issuer.test.ts +0 -442
  180. package/src/delegation/__tests__/vc-verifier.test.ts +0 -922
  181. package/src/delegation/audience-validator.ts +0 -52
  182. package/src/delegation/bitstring.ts +0 -278
  183. package/src/delegation/cascading-revocation.ts +0 -370
  184. package/src/delegation/delegation-graph.ts +0 -299
  185. package/src/delegation/did-key-resolver.ts +0 -179
  186. package/src/delegation/index.ts +0 -14
  187. package/src/delegation/statuslist-manager.ts +0 -353
  188. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +0 -366
  189. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +0 -228
  190. package/src/delegation/storage/index.ts +0 -9
  191. package/src/delegation/storage/memory-graph-storage.ts +0 -178
  192. package/src/delegation/storage/memory-statuslist-storage.ts +0 -77
  193. package/src/delegation/utils.ts +0 -221
  194. package/src/delegation/vc-issuer.ts +0 -232
  195. package/src/delegation/vc-verifier.ts +0 -568
  196. package/src/identity/idp-token-resolver.ts +0 -181
  197. package/src/identity/idp-token-storage.interface.ts +0 -94
  198. package/src/identity/user-did-manager.ts +0 -526
  199. package/src/index.ts +0 -310
  200. package/src/providers/base.d.ts +0 -91
  201. package/src/providers/base.d.ts.map +0 -1
  202. package/src/providers/base.js.map +0 -1
  203. package/src/providers/base.ts +0 -96
  204. package/src/providers/memory.ts +0 -142
  205. package/src/runtime/audit-logger.ts +0 -39
  206. package/src/runtime/base.ts +0 -1392
  207. package/src/services/__tests__/access-control.integration.test.ts +0 -443
  208. package/src/services/__tests__/access-control.proof-response-validation.test.ts +0 -578
  209. package/src/services/__tests__/access-control.service.test.ts +0 -970
  210. package/src/services/__tests__/batch-delegation.service.test.ts +0 -351
  211. package/src/services/__tests__/crypto.service.test.ts +0 -531
  212. package/src/services/__tests__/oauth-provider-registry.test.ts +0 -142
  213. package/src/services/__tests__/proof-verifier.integration.test.ts +0 -485
  214. package/src/services/__tests__/proof-verifier.test.ts +0 -489
  215. package/src/services/__tests__/provider-resolution.integration.test.ts +0 -202
  216. package/src/services/__tests__/provider-resolver.test.ts +0 -213
  217. package/src/services/__tests__/storage.service.test.ts +0 -358
  218. package/src/services/access-control.service.ts +0 -990
  219. package/src/services/authorization/authorization-registry.ts +0 -66
  220. package/src/services/authorization/types.ts +0 -71
  221. package/src/services/batch-delegation.service.ts +0 -137
  222. package/src/services/crypto.service.ts +0 -302
  223. package/src/services/errors.ts +0 -76
  224. package/src/services/index.ts +0 -18
  225. package/src/services/oauth-config.service.d.ts +0 -53
  226. package/src/services/oauth-config.service.d.ts.map +0 -1
  227. package/src/services/oauth-config.service.js.map +0 -1
  228. package/src/services/oauth-config.service.ts +0 -192
  229. package/src/services/oauth-provider-registry.d.ts +0 -57
  230. package/src/services/oauth-provider-registry.d.ts.map +0 -1
  231. package/src/services/oauth-provider-registry.js.map +0 -1
  232. package/src/services/oauth-provider-registry.ts +0 -141
  233. package/src/services/oauth-service.ts +0 -544
  234. package/src/services/oauth-token-retrieval.service.ts +0 -245
  235. package/src/services/proof-verifier.ts +0 -478
  236. package/src/services/provider-resolver.d.ts +0 -48
  237. package/src/services/provider-resolver.d.ts.map +0 -1
  238. package/src/services/provider-resolver.js.map +0 -1
  239. package/src/services/provider-resolver.ts +0 -146
  240. package/src/services/provider-validator.ts +0 -170
  241. package/src/services/session-registration.service.ts +0 -251
  242. package/src/services/storage.service.ts +0 -566
  243. package/src/services/tool-context-builder.ts +0 -237
  244. package/src/services/tool-protection.service.ts +0 -1070
  245. package/src/types/oauth-required-error.ts +0 -63
  246. package/src/types/tool-protection.ts +0 -155
  247. package/src/utils/__tests__/did-helpers.test.ts +0 -156
  248. package/src/utils/base58.ts +0 -109
  249. package/src/utils/base64.ts +0 -148
  250. package/src/utils/cors.ts +0 -83
  251. package/src/utils/did-helpers.ts +0 -210
  252. package/src/utils/index.ts +0 -8
  253. package/src/utils/storage-keys.ts +0 -278
  254. package/tsconfig.json +0 -21
  255. package/vitest.config.ts +0 -56
@@ -1,531 +0,0 @@
1
- /**
2
- * Tests for CryptoService
3
- *
4
- * Comprehensive test coverage for cryptographic operations service.
5
- * Tests verifyEd25519() and verifyJWS() with various scenarios.
6
- *
7
- * Test Coverage Requirements: 100% - All security-critical code paths
8
- */
9
-
10
- import { describe, it, expect, beforeEach, vi } from 'vitest';
11
- import { CryptoService } from '../crypto.service.js';
12
- import type { CryptoProvider } from '../../providers/base.js';
13
- import type { Ed25519JWK } from '../crypto.service.js';
14
-
15
- describe('CryptoService', () => {
16
- let cryptoService: CryptoService;
17
- let mockCryptoProvider: CryptoProvider;
18
-
19
- beforeEach(() => {
20
- mockCryptoProvider = {
21
- sign: vi.fn(),
22
- verify: vi.fn(),
23
- generateKeyPair: vi.fn(),
24
- hash: vi.fn(),
25
- randomBytes: vi.fn(),
26
- };
27
- cryptoService = new CryptoService(mockCryptoProvider);
28
- });
29
-
30
- describe('verifyEd25519', () => {
31
- it('should return true for valid signature', async () => {
32
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
33
-
34
- const result = await cryptoService.verifyEd25519(
35
- new Uint8Array([1, 2, 3]),
36
- new Uint8Array([4, 5, 6]),
37
- 'base64PublicKey'
38
- );
39
-
40
- expect(result).toBe(true);
41
- expect(mockCryptoProvider.verify).toHaveBeenCalledWith(
42
- new Uint8Array([1, 2, 3]),
43
- new Uint8Array([4, 5, 6]),
44
- 'base64PublicKey'
45
- );
46
- });
47
-
48
- it('should return false for invalid signature', async () => {
49
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
50
-
51
- const result = await cryptoService.verifyEd25519(
52
- new Uint8Array([1, 2, 3]),
53
- new Uint8Array([4, 5, 6]),
54
- 'base64PublicKey'
55
- );
56
-
57
- expect(result).toBe(false);
58
- });
59
-
60
- it('should return false on verification error', async () => {
61
- mockCryptoProvider.verify = vi.fn().mockRejectedValue(
62
- new Error('Verification failed')
63
- );
64
-
65
- const result = await cryptoService.verifyEd25519(
66
- new Uint8Array([1, 2, 3]),
67
- new Uint8Array([4, 5, 6]),
68
- 'base64PublicKey'
69
- );
70
-
71
- expect(result).toBe(false);
72
- });
73
-
74
- it('should handle empty data', async () => {
75
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
76
-
77
- const result = await cryptoService.verifyEd25519(
78
- new Uint8Array(0),
79
- new Uint8Array([4, 5, 6]),
80
- 'base64PublicKey'
81
- );
82
-
83
- expect(result).toBe(true);
84
- });
85
- });
86
-
87
- describe('parseJWS', () => {
88
- it('should parse valid full compact JWS', () => {
89
- const header = { alg: 'EdDSA', typ: 'JWT' };
90
- const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
91
- // Properly encode as base64url
92
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
93
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
94
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
95
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
96
- const signatureB64 = Buffer.from('signature').toString('base64')
97
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
98
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
99
-
100
- const parsed = cryptoService.parseJWS(jws);
101
-
102
- expect(parsed.header).toEqual(header);
103
- expect(parsed.payload).toEqual(payload);
104
- expect(parsed.signingInput).toBe(`${headerB64}.${payloadB64}`);
105
- expect(parsed.signatureBytes).toBeInstanceOf(Uint8Array);
106
- });
107
-
108
- it('should throw error for invalid JWS format', () => {
109
- const invalidJws = 'not.a.jws';
110
-
111
- // This will fail during JSON parsing, not format check
112
- expect(() => cryptoService.parseJWS(invalidJws)).toThrow();
113
- });
114
-
115
- it('should throw error for JWS with wrong number of parts', () => {
116
- const invalidJws = 'header.payload';
117
-
118
- expect(() => cryptoService.parseJWS(invalidJws)).toThrow('Invalid JWS format');
119
- });
120
-
121
- it('should handle empty payload', () => {
122
- const header = { alg: 'EdDSA' };
123
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
124
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
125
- const signatureB64 = Buffer.from('signature').toString('base64')
126
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
127
- const jws = `${headerB64}..${signatureB64}`;
128
-
129
- const parsed = cryptoService.parseJWS(jws);
130
-
131
- expect(parsed.header).toEqual(header);
132
- expect(parsed.payload).toBeUndefined();
133
- });
134
- });
135
-
136
- describe('verifyJWS', () => {
137
- const validJwk: Ed25519JWK = {
138
- kty: 'OKP',
139
- crv: 'Ed25519',
140
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ', // Example base64url public key (32 bytes when decoded)
141
- };
142
-
143
- // Create a valid JWS for testing
144
- const createValidJWS = (): string => {
145
- const header = { alg: 'EdDSA', typ: 'JWT' };
146
- const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
147
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
148
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
149
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
150
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
151
- const signatureB64 = Buffer.from('signature').toString('base64')
152
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
153
- return `${headerB64}.${payloadB64}.${signatureB64}`;
154
- };
155
-
156
- it('should verify valid full compact JWS', async () => {
157
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
158
- const validJws = createValidJWS();
159
-
160
- const result = await cryptoService.verifyJWS(validJws, validJwk);
161
-
162
- expect(result).toBe(true);
163
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
164
- });
165
-
166
- it('should reject invalid JWK format', async () => {
167
- const invalidJwk = { kty: 'RSA' } as any;
168
- const validJws = createValidJWS();
169
-
170
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
171
-
172
- expect(result).toBe(false);
173
- expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
174
- });
175
-
176
- it('should reject JWK with wrong kty', async () => {
177
- const invalidJwk = {
178
- kty: 'RSA',
179
- crv: 'Ed25519',
180
- x: 'test',
181
- } as any;
182
- const validJws = createValidJWS();
183
-
184
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
185
-
186
- expect(result).toBe(false);
187
- });
188
-
189
- it('should reject JWK with wrong crv', async () => {
190
- const invalidJwk = {
191
- kty: 'OKP',
192
- crv: 'P-256',
193
- x: 'test',
194
- } as any;
195
- const validJws = createValidJWS();
196
-
197
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
198
-
199
- expect(result).toBe(false);
200
- });
201
-
202
- it('should reject JWK with missing x field', async () => {
203
- const invalidJwk = {
204
- kty: 'OKP',
205
- crv: 'Ed25519',
206
- } as any;
207
- const validJws = createValidJWS();
208
-
209
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
210
-
211
- expect(result).toBe(false);
212
- });
213
-
214
- it('should reject JWK with empty x field', async () => {
215
- const invalidJwk = {
216
- kty: 'OKP',
217
- crv: 'Ed25519',
218
- x: '',
219
- };
220
- const validJws = createValidJWS();
221
-
222
- const result = await cryptoService.verifyJWS(validJws, invalidJwk);
223
-
224
- expect(result).toBe(false);
225
- });
226
-
227
- it('should reject malformed JWS', async () => {
228
- const malformedJws = 'not.a.jws';
229
-
230
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
231
-
232
- expect(result).toBe(false);
233
- });
234
-
235
- it('should reject non-EdDSA algorithms', async () => {
236
- const header = { alg: 'RS256', typ: 'JWT' };
237
- const payload = { sub: 'did:key:z123' };
238
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
239
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
240
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
241
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
242
- const signatureB64 = Buffer.from('signature').toString('base64')
243
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
244
- const rsaJws = `${headerB64}.${payloadB64}.${signatureB64}`;
245
-
246
- const result = await cryptoService.verifyJWS(rsaJws, validJwk);
247
-
248
- expect(result).toBe(false);
249
- expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
250
- });
251
-
252
- it('should reject HS256 algorithm', async () => {
253
- const header = { alg: 'HS256', typ: 'JWT' };
254
- const payload = { sub: 'did:key:z123' };
255
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
256
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
257
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
258
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
259
- const signatureB64 = Buffer.from('signature').toString('base64')
260
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
261
- const hs256Jws = `${headerB64}.${payloadB64}.${signatureB64}`;
262
-
263
- const result = await cryptoService.verifyJWS(hs256Jws, validJwk);
264
-
265
- expect(result).toBe(false);
266
- });
267
-
268
- it('should handle empty JWS components', async () => {
269
- const emptyJws = '..';
270
-
271
- const result = await cryptoService.verifyJWS(emptyJws, validJwk);
272
-
273
- expect(result).toBe(false);
274
- });
275
-
276
- it('should handle malformed JWS - single part', async () => {
277
- const malformedJws = 'singlepart';
278
-
279
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
280
-
281
- expect(result).toBe(false);
282
- });
283
-
284
- it('should handle malformed JWS - two parts', async () => {
285
- const malformedJws = 'header.payload';
286
-
287
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
288
-
289
- expect(result).toBe(false);
290
- });
291
-
292
- it('should handle malformed JWS - four parts', async () => {
293
- const header = { alg: 'EdDSA' };
294
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
295
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
296
- const payloadB64 = Buffer.from('payload').toString('base64')
297
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
298
- const signatureB64 = Buffer.from('signature').toString('base64')
299
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
300
- const malformedJws = `${headerB64}.${payloadB64}.${signatureB64}.extra`;
301
-
302
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
303
-
304
- expect(result).toBe(false);
305
- });
306
-
307
- it('should handle malformed JWS - invalid JSON header', async () => {
308
- const invalidHeaderB64 = Buffer.from('notjson').toString('base64')
309
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
310
- const payloadB64 = Buffer.from('payload').toString('base64')
311
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
312
- const signatureB64 = Buffer.from('signature').toString('base64')
313
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
314
- const malformedJws = `${invalidHeaderB64}.${payloadB64}.${signatureB64}`;
315
-
316
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
317
-
318
- expect(result).toBe(false);
319
- });
320
-
321
- it('should handle malformed JWS - invalid base64', async () => {
322
- // Don't mock verify - the function should catch the error and return false
323
- // before it gets to verification
324
- const header = { alg: 'EdDSA' };
325
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
326
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
327
- const invalidBase64 = 'notbase64!!!';
328
- const signatureB64 = Buffer.from('signature').toString('base64')
329
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
330
- const malformedJws = `${headerB64}.${invalidBase64}.${signatureB64}`;
331
-
332
- // parseJWS will throw when trying to decode invalid base64 payload
333
- // This should be caught and return false
334
- const result = await cryptoService.verifyJWS(malformedJws, validJwk);
335
-
336
- expect(result).toBe(false);
337
- // verify should not be called because parseJWS should throw
338
- expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
339
- });
340
-
341
- it('should validate expectedKid option', async () => {
342
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
343
- const validJws = createValidJWS();
344
- const jwkWithKid: Ed25519JWK = {
345
- kty: 'OKP',
346
- crv: 'Ed25519',
347
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
348
- kid: 'key-1',
349
- };
350
-
351
- // Should succeed with matching kid
352
- const result1 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
353
- expectedKid: 'key-1',
354
- });
355
- expect(result1).toBe(true);
356
-
357
- // Should fail with mismatched kid
358
- const result2 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
359
- expectedKid: 'key-2',
360
- });
361
- expect(result2).toBe(false);
362
- });
363
-
364
- it('should validate alg option', async () => {
365
- const header = { alg: 'EdDSA', typ: 'JWT' };
366
- const payload = { sub: 'did:key:z123' };
367
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
368
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
369
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
370
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
371
- const signatureB64 = Buffer.from('signature').toString('base64')
372
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
373
- const validJws = `${headerB64}.${payloadB64}.${signatureB64}`;
374
-
375
- // Should succeed with matching alg
376
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
377
- const result1 = await cryptoService.verifyJWS(validJws, validJwk, {
378
- alg: 'EdDSA',
379
- });
380
- expect(result1).toBe(true);
381
-
382
- // Should fail with mismatched alg (even if header says EdDSA)
383
- const result2 = await cryptoService.verifyJWS(validJws, validJwk, {
384
- alg: 'RS256' as any,
385
- });
386
- expect(result2).toBe(false);
387
- });
388
-
389
- it('should validate Ed25519 key length', async () => {
390
- const invalidLengthJwk = {
391
- kty: 'OKP' as const,
392
- crv: 'Ed25519' as const,
393
- x: 'c2hvcnQ', // "short" in base64 - too short for Ed25519 (only 5 bytes)
394
- };
395
-
396
- const validJws = createValidJWS();
397
-
398
- const result = await cryptoService.verifyJWS(validJws, invalidLengthJwk);
399
-
400
- expect(result).toBe(false);
401
- });
402
-
403
- it('should handle detached payload', async () => {
404
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
405
- const header = { alg: 'EdDSA' };
406
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
407
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
408
- const signatureB64 = Buffer.from('signature').toString('base64')
409
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
410
- const detachedJws = `${headerB64}..${signatureB64}`;
411
- const detachedPayload = JSON.stringify({ sub: 'did:key:z123' });
412
-
413
- const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
414
- detachedPayload,
415
- });
416
-
417
- expect(result).toBe(true);
418
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
419
- });
420
-
421
- it('should handle detached payload as Uint8Array', async () => {
422
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
423
- const header = { alg: 'EdDSA' };
424
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
425
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
426
- const signatureB64 = Buffer.from('signature').toString('base64')
427
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
428
- const detachedJws = `${headerB64}..${signatureB64}`;
429
- const detachedPayloadBytes = new TextEncoder().encode(JSON.stringify({ sub: 'did:key:z123' }));
430
-
431
- const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
432
- detachedPayload: detachedPayloadBytes,
433
- });
434
-
435
- expect(result).toBe(true);
436
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
437
- });
438
-
439
- it('should handle signature verification failure', async () => {
440
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
441
- const validJws = createValidJWS();
442
-
443
- const result = await cryptoService.verifyJWS(validJws, validJwk);
444
-
445
- expect(result).toBe(false);
446
- });
447
-
448
- it('should handle signature verification error', async () => {
449
- mockCryptoProvider.verify = vi.fn().mockRejectedValue(new Error('Crypto error'));
450
- const validJws = createValidJWS();
451
-
452
- const result = await cryptoService.verifyJWS(validJws, validJwk);
453
-
454
- expect(result).toBe(false);
455
- });
456
-
457
- it('should accept JWK with optional kid field', async () => {
458
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
459
- const jwkWithKid: Ed25519JWK = {
460
- kty: 'OKP',
461
- crv: 'Ed25519',
462
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
463
- kid: 'key-1',
464
- };
465
- const validJws = createValidJWS();
466
-
467
- const result = await cryptoService.verifyJWS(validJws, jwkWithKid);
468
-
469
- expect(result).toBe(true);
470
- });
471
-
472
- it('should accept JWK with optional use field', async () => {
473
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
474
- const jwkWithUse: Ed25519JWK = {
475
- kty: 'OKP',
476
- crv: 'Ed25519',
477
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
478
- use: 'sig',
479
- };
480
- const validJws = createValidJWS();
481
-
482
- const result = await cryptoService.verifyJWS(validJws, jwkWithUse);
483
-
484
- expect(result).toBe(true);
485
- });
486
- });
487
-
488
- describe('base64url edge cases', () => {
489
- const validJwk: Ed25519JWK = {
490
- kty: 'OKP',
491
- crv: 'Ed25519',
492
- x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
493
- };
494
-
495
- it('should handle base64url with no padding', async () => {
496
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
497
- const header = { alg: 'EdDSA' };
498
- const payload = { test: 'Hello' };
499
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
500
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
501
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
502
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
503
- const signatureB64 = Buffer.from('signature').toString('base64')
504
- .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
505
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
506
-
507
- const result = await cryptoService.verifyJWS(jws, validJwk);
508
-
509
- // Should not throw, even if padding is missing
510
- expect(typeof result).toBe('boolean');
511
- });
512
-
513
- it('should handle base64url with padding', async () => {
514
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
515
- const header = { alg: 'EdDSA' };
516
- const payload = { test: 'Hello World!' };
517
- const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
518
- .replace(/\+/g, '-').replace(/\//g, '_');
519
- const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
520
- .replace(/\+/g, '-').replace(/\//g, '_');
521
- const signatureB64 = Buffer.from('signature').toString('base64')
522
- .replace(/\+/g, '-').replace(/\//g, '_');
523
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
524
-
525
- const result = await cryptoService.verifyJWS(jws, validJwk);
526
-
527
- expect(typeof result).toBe('boolean');
528
- });
529
- });
530
- });
531
-
@@ -1,142 +0,0 @@
1
- /**
2
- * OAuth Provider Registry Tests
3
- *
4
- * @package @kya-os/mcp-i-core
5
- */
6
-
7
- import { describe, it, expect, beforeEach, vi } from "vitest";
8
- import { OAuthProviderRegistry } from "../oauth-provider-registry.js";
9
- import { OAuthConfigService } from "../oauth-config.service.js";
10
- import type { OAuthConfig, OAuthProvider } from "@kya-os/contracts/config";
11
-
12
- describe("OAuthProviderRegistry", () => {
13
- let mockConfigService: OAuthConfigService;
14
- let registry: OAuthProviderRegistry;
15
-
16
- const mockOAuthConfig: OAuthConfig = {
17
- providers: {
18
- github: {
19
- clientId: "github_client_id",
20
- authorizationUrl: "https://github.com/login/oauth/authorize",
21
- tokenUrl: "https://github.com/login/oauth/access_token",
22
- supportsPKCE: true,
23
- requiresClientSecret: false,
24
- scopes: ["repo", "read:user"],
25
- defaultScopes: ["repo"],
26
- },
27
- google: {
28
- clientId: "google_client_id",
29
- authorizationUrl: "https://accounts.google.com/o/oauth2/v2/auth",
30
- tokenUrl: "https://oauth2.googleapis.com/token",
31
- supportsPKCE: true,
32
- requiresClientSecret: false,
33
- scopes: ["email", "profile"],
34
- defaultScopes: ["email"],
35
- },
36
- },
37
- };
38
-
39
- beforeEach(() => {
40
- mockConfigService = {
41
- getOAuthConfig: vi.fn().mockResolvedValue(mockOAuthConfig),
42
- } as any;
43
-
44
- registry = new OAuthProviderRegistry(mockConfigService);
45
- });
46
-
47
- describe("loadFromAgentShield", () => {
48
- it("should load providers from AgentShield config", async () => {
49
- await registry.loadFromAgentShield("test-project");
50
-
51
- expect(mockConfigService.getOAuthConfig).toHaveBeenCalledWith(
52
- "test-project"
53
- );
54
- expect(registry.hasProvider("github")).toBe(true);
55
- expect(registry.hasProvider("google")).toBe(true);
56
- });
57
-
58
- it("should clear existing providers before loading new ones", async () => {
59
- await registry.loadFromAgentShield("test-project");
60
- expect(registry.getAllProviders().length).toBe(2);
61
-
62
- const newConfig: OAuthConfig = {
63
- providers: {
64
- microsoft: {
65
- clientId: "microsoft_client_id",
66
- authorizationUrl: "https://login.microsoftonline.com/oauth2/v2.0/authorize",
67
- tokenUrl: "https://login.microsoftonline.com/oauth2/v2.0/token",
68
- supportsPKCE: true,
69
- requiresClientSecret: false,
70
- },
71
- },
72
- };
73
-
74
- (mockConfigService.getOAuthConfig as any).mockResolvedValueOnce(newConfig);
75
- await registry.loadFromAgentShield("test-project-2");
76
-
77
- expect(registry.getAllProviders().length).toBe(1);
78
- expect(registry.hasProvider("github")).toBe(false);
79
- expect(registry.hasProvider("microsoft")).toBe(true);
80
- });
81
- });
82
-
83
- describe("getProvider", () => {
84
- it("should return provider by name", async () => {
85
- await registry.loadFromAgentShield("test-project");
86
-
87
- const githubProvider = registry.getProvider("github");
88
- expect(githubProvider).toBeDefined();
89
- expect(githubProvider?.clientId).toBe("github_client_id");
90
- });
91
-
92
- it("should return null for non-existent provider", async () => {
93
- await registry.loadFromAgentShield("test-project");
94
-
95
- const provider = registry.getProvider("nonexistent");
96
- expect(provider).toBeNull();
97
- });
98
- });
99
-
100
- describe("getAllProviders", () => {
101
- it("should return all providers", async () => {
102
- await registry.loadFromAgentShield("test-project");
103
-
104
- const providers = registry.getAllProviders();
105
- expect(providers.length).toBe(2);
106
- expect(providers.map((p) => p.clientId)).toContain("github_client_id");
107
- expect(providers.map((p) => p.clientId)).toContain("google_client_id");
108
- });
109
-
110
- it("should return empty array when no providers loaded", () => {
111
- const providers = registry.getAllProviders();
112
- expect(providers).toEqual([]);
113
- });
114
- });
115
-
116
- describe("hasProvider", () => {
117
- it("should return true for existing provider", async () => {
118
- await registry.loadFromAgentShield("test-project");
119
-
120
- expect(registry.hasProvider("github")).toBe(true);
121
- expect(registry.hasProvider("google")).toBe(true);
122
- });
123
-
124
- it("should return false for non-existent provider", async () => {
125
- await registry.loadFromAgentShield("test-project");
126
-
127
- expect(registry.hasProvider("nonexistent")).toBe(false);
128
- });
129
- });
130
-
131
- describe("getProviderNames", () => {
132
- it("should return all provider names", async () => {
133
- await registry.loadFromAgentShield("test-project");
134
-
135
- const names = registry.getProviderNames();
136
- expect(names).toContain("github");
137
- expect(names).toContain("google");
138
- expect(names.length).toBe(2);
139
- });
140
- });
141
- });
142
-