@kya-os/mcp-i-core 1.3.13 → 1.3.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (255) hide show
  1. package/dist/config/remote-config.js +9 -12
  2. package/dist/runtime/base.d.ts +2 -1
  3. package/dist/runtime/base.js +34 -6
  4. package/dist/services/access-control.service.js +5 -0
  5. package/dist/services/tool-protection.service.js +17 -8
  6. package/package.json +2 -2
  7. package/.turbo/turbo-build.log +0 -4
  8. package/.turbo/turbo-test$colon$coverage.log +0 -4586
  9. package/.turbo/turbo-test.log +0 -4631
  10. package/COMPLIANCE_IMPROVEMENT_REPORT.md +0 -483
  11. package/Composer 3.md +0 -615
  12. package/GPT-5.md +0 -1169
  13. package/OPUS-plan.md +0 -352
  14. package/PHASE_3_AND_4.1_SUMMARY.md +0 -585
  15. package/PHASE_3_SUMMARY.md +0 -317
  16. package/PHASE_4.1.3_SUMMARY.md +0 -428
  17. package/PHASE_4.1_COMPLETE.md +0 -525
  18. package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +0 -1240
  19. package/SCHEMA_COMPLIANCE_REPORT.md +0 -275
  20. package/TEST_PLAN.md +0 -571
  21. package/coverage/coverage-final.json +0 -60
  22. package/dist/cache/oauth-config-cache.d.ts.map +0 -1
  23. package/dist/cache/oauth-config-cache.js.map +0 -1
  24. package/dist/cache/tool-protection-cache.d.ts.map +0 -1
  25. package/dist/cache/tool-protection-cache.js.map +0 -1
  26. package/dist/compliance/index.d.ts.map +0 -1
  27. package/dist/compliance/index.js.map +0 -1
  28. package/dist/compliance/schema-registry.d.ts.map +0 -1
  29. package/dist/compliance/schema-registry.js.map +0 -1
  30. package/dist/compliance/schema-verifier.d.ts.map +0 -1
  31. package/dist/compliance/schema-verifier.js.map +0 -1
  32. package/dist/config/remote-config.d.ts.map +0 -1
  33. package/dist/config/remote-config.js.map +0 -1
  34. package/dist/config.d.ts.map +0 -1
  35. package/dist/config.js.map +0 -1
  36. package/dist/delegation/audience-validator.d.ts.map +0 -1
  37. package/dist/delegation/audience-validator.js.map +0 -1
  38. package/dist/delegation/bitstring.d.ts.map +0 -1
  39. package/dist/delegation/bitstring.js.map +0 -1
  40. package/dist/delegation/cascading-revocation.d.ts.map +0 -1
  41. package/dist/delegation/cascading-revocation.js.map +0 -1
  42. package/dist/delegation/delegation-graph.d.ts.map +0 -1
  43. package/dist/delegation/delegation-graph.js.map +0 -1
  44. package/dist/delegation/did-key-resolver.d.ts.map +0 -1
  45. package/dist/delegation/did-key-resolver.js.map +0 -1
  46. package/dist/delegation/index.d.ts.map +0 -1
  47. package/dist/delegation/index.js.map +0 -1
  48. package/dist/delegation/statuslist-manager.d.ts.map +0 -1
  49. package/dist/delegation/statuslist-manager.js.map +0 -1
  50. package/dist/delegation/storage/index.d.ts.map +0 -1
  51. package/dist/delegation/storage/index.js.map +0 -1
  52. package/dist/delegation/storage/memory-graph-storage.d.ts.map +0 -1
  53. package/dist/delegation/storage/memory-graph-storage.js.map +0 -1
  54. package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +0 -1
  55. package/dist/delegation/storage/memory-statuslist-storage.js.map +0 -1
  56. package/dist/delegation/utils.d.ts.map +0 -1
  57. package/dist/delegation/utils.js.map +0 -1
  58. package/dist/delegation/vc-issuer.d.ts.map +0 -1
  59. package/dist/delegation/vc-issuer.js.map +0 -1
  60. package/dist/delegation/vc-verifier.d.ts.map +0 -1
  61. package/dist/delegation/vc-verifier.js.map +0 -1
  62. package/dist/identity/idp-token-resolver.d.ts.map +0 -1
  63. package/dist/identity/idp-token-resolver.js.map +0 -1
  64. package/dist/identity/idp-token-storage.interface.d.ts.map +0 -1
  65. package/dist/identity/idp-token-storage.interface.js.map +0 -1
  66. package/dist/identity/user-did-manager.d.ts.map +0 -1
  67. package/dist/identity/user-did-manager.js.map +0 -1
  68. package/dist/index.d.ts.map +0 -1
  69. package/dist/index.js.map +0 -1
  70. package/dist/providers/base.d.ts.map +0 -1
  71. package/dist/providers/base.js.map +0 -1
  72. package/dist/providers/memory.d.ts.map +0 -1
  73. package/dist/providers/memory.js.map +0 -1
  74. package/dist/runtime/audit-logger.d.ts.map +0 -1
  75. package/dist/runtime/audit-logger.js.map +0 -1
  76. package/dist/runtime/base.d.ts.map +0 -1
  77. package/dist/runtime/base.js.map +0 -1
  78. package/dist/services/access-control.service.d.ts.map +0 -1
  79. package/dist/services/access-control.service.js.map +0 -1
  80. package/dist/services/authorization/authorization-registry.d.ts.map +0 -1
  81. package/dist/services/authorization/authorization-registry.js.map +0 -1
  82. package/dist/services/authorization/types.d.ts.map +0 -1
  83. package/dist/services/authorization/types.js.map +0 -1
  84. package/dist/services/batch-delegation.service.d.ts.map +0 -1
  85. package/dist/services/batch-delegation.service.js.map +0 -1
  86. package/dist/services/crypto.service.d.ts.map +0 -1
  87. package/dist/services/crypto.service.js.map +0 -1
  88. package/dist/services/errors.d.ts.map +0 -1
  89. package/dist/services/errors.js.map +0 -1
  90. package/dist/services/index.d.ts.map +0 -1
  91. package/dist/services/index.js.map +0 -1
  92. package/dist/services/oauth-config.service.d.ts.map +0 -1
  93. package/dist/services/oauth-config.service.js.map +0 -1
  94. package/dist/services/oauth-provider-registry.d.ts.map +0 -1
  95. package/dist/services/oauth-provider-registry.js.map +0 -1
  96. package/dist/services/oauth-service.d.ts.map +0 -1
  97. package/dist/services/oauth-service.js.map +0 -1
  98. package/dist/services/oauth-token-retrieval.service.d.ts.map +0 -1
  99. package/dist/services/oauth-token-retrieval.service.js.map +0 -1
  100. package/dist/services/proof-verifier.d.ts.map +0 -1
  101. package/dist/services/proof-verifier.js.map +0 -1
  102. package/dist/services/provider-resolver.d.ts.map +0 -1
  103. package/dist/services/provider-resolver.js.map +0 -1
  104. package/dist/services/provider-validator.d.ts.map +0 -1
  105. package/dist/services/provider-validator.js.map +0 -1
  106. package/dist/services/session-registration.service.d.ts.map +0 -1
  107. package/dist/services/session-registration.service.js.map +0 -1
  108. package/dist/services/storage.service.d.ts.map +0 -1
  109. package/dist/services/storage.service.js.map +0 -1
  110. package/dist/services/tool-context-builder.d.ts.map +0 -1
  111. package/dist/services/tool-context-builder.js.map +0 -1
  112. package/dist/services/tool-protection.service.d.ts.map +0 -1
  113. package/dist/services/tool-protection.service.js.map +0 -1
  114. package/dist/types/oauth-required-error.d.ts.map +0 -1
  115. package/dist/types/oauth-required-error.js.map +0 -1
  116. package/dist/types/tool-protection.d.ts.map +0 -1
  117. package/dist/types/tool-protection.js.map +0 -1
  118. package/dist/utils/base58.d.ts.map +0 -1
  119. package/dist/utils/base58.js.map +0 -1
  120. package/dist/utils/base64.d.ts.map +0 -1
  121. package/dist/utils/base64.js.map +0 -1
  122. package/dist/utils/cors.d.ts.map +0 -1
  123. package/dist/utils/cors.js.map +0 -1
  124. package/dist/utils/did-helpers.d.ts.map +0 -1
  125. package/dist/utils/did-helpers.js.map +0 -1
  126. package/dist/utils/index.d.ts.map +0 -1
  127. package/dist/utils/index.js.map +0 -1
  128. package/dist/utils/storage-keys.d.ts.map +0 -1
  129. package/dist/utils/storage-keys.js.map +0 -1
  130. package/docs/API_REFERENCE.md +0 -1362
  131. package/docs/COMPLIANCE_MATRIX.md +0 -691
  132. package/docs/STATUSLIST2021_GUIDE.md +0 -696
  133. package/docs/W3C_VC_DELEGATION_GUIDE.md +0 -710
  134. package/src/__tests__/cache/tool-protection-cache.test.ts +0 -640
  135. package/src/__tests__/config/provider-runtime-config.test.ts +0 -309
  136. package/src/__tests__/delegation-e2e.test.ts +0 -690
  137. package/src/__tests__/identity/user-did-manager.test.ts +0 -232
  138. package/src/__tests__/index.test.ts +0 -56
  139. package/src/__tests__/integration/full-flow.test.ts +0 -789
  140. package/src/__tests__/integration.test.ts +0 -281
  141. package/src/__tests__/providers/base.test.ts +0 -173
  142. package/src/__tests__/providers/memory.test.ts +0 -319
  143. package/src/__tests__/regression/phase2-regression.test.ts +0 -429
  144. package/src/__tests__/runtime/audit-logger.test.ts +0 -154
  145. package/src/__tests__/runtime/base-extensions.test.ts +0 -595
  146. package/src/__tests__/runtime/base.test.ts +0 -869
  147. package/src/__tests__/runtime/delegation-flow.test.ts +0 -164
  148. package/src/__tests__/runtime/proof-client-did.test.ts +0 -376
  149. package/src/__tests__/runtime/route-interception.test.ts +0 -686
  150. package/src/__tests__/runtime/tool-protection-enforcement.test.ts +0 -908
  151. package/src/__tests__/services/agentshield-integration.test.ts +0 -791
  152. package/src/__tests__/services/cache-busting.test.ts +0 -125
  153. package/src/__tests__/services/oauth-service-pkce.test.ts +0 -556
  154. package/src/__tests__/services/provider-resolver-edge-cases.test.ts +0 -591
  155. package/src/__tests__/services/tool-protection-merged-config.test.ts +0 -485
  156. package/src/__tests__/services/tool-protection-oauth-provider.test.ts +0 -480
  157. package/src/__tests__/services/tool-protection.service.test.ts +0 -1373
  158. package/src/__tests__/utils/mock-providers.ts +0 -340
  159. package/src/cache/oauth-config-cache.d.ts +0 -69
  160. package/src/cache/oauth-config-cache.d.ts.map +0 -1
  161. package/src/cache/oauth-config-cache.js.map +0 -1
  162. package/src/cache/oauth-config-cache.ts +0 -123
  163. package/src/cache/tool-protection-cache.ts +0 -171
  164. package/src/compliance/EXAMPLE.md +0 -412
  165. package/src/compliance/__tests__/schema-verifier.test.ts +0 -797
  166. package/src/compliance/index.ts +0 -8
  167. package/src/compliance/schema-registry.ts +0 -460
  168. package/src/compliance/schema-verifier.ts +0 -708
  169. package/src/config/__tests__/merged-config.spec.ts +0 -445
  170. package/src/config/__tests__/remote-config.spec.ts +0 -268
  171. package/src/config/remote-config.ts +0 -264
  172. package/src/config.ts +0 -312
  173. package/src/delegation/__tests__/audience-validator.test.ts +0 -112
  174. package/src/delegation/__tests__/bitstring.test.ts +0 -346
  175. package/src/delegation/__tests__/cascading-revocation.test.ts +0 -628
  176. package/src/delegation/__tests__/delegation-graph.test.ts +0 -584
  177. package/src/delegation/__tests__/did-key-resolver.test.ts +0 -265
  178. package/src/delegation/__tests__/utils.test.ts +0 -152
  179. package/src/delegation/__tests__/vc-issuer.test.ts +0 -442
  180. package/src/delegation/__tests__/vc-verifier.test.ts +0 -922
  181. package/src/delegation/audience-validator.ts +0 -52
  182. package/src/delegation/bitstring.ts +0 -278
  183. package/src/delegation/cascading-revocation.ts +0 -370
  184. package/src/delegation/delegation-graph.ts +0 -299
  185. package/src/delegation/did-key-resolver.ts +0 -179
  186. package/src/delegation/index.ts +0 -14
  187. package/src/delegation/statuslist-manager.ts +0 -353
  188. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +0 -366
  189. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +0 -228
  190. package/src/delegation/storage/index.ts +0 -9
  191. package/src/delegation/storage/memory-graph-storage.ts +0 -178
  192. package/src/delegation/storage/memory-statuslist-storage.ts +0 -77
  193. package/src/delegation/utils.ts +0 -221
  194. package/src/delegation/vc-issuer.ts +0 -232
  195. package/src/delegation/vc-verifier.ts +0 -568
  196. package/src/identity/idp-token-resolver.ts +0 -181
  197. package/src/identity/idp-token-storage.interface.ts +0 -94
  198. package/src/identity/user-did-manager.ts +0 -526
  199. package/src/index.ts +0 -310
  200. package/src/providers/base.d.ts +0 -91
  201. package/src/providers/base.d.ts.map +0 -1
  202. package/src/providers/base.js.map +0 -1
  203. package/src/providers/base.ts +0 -96
  204. package/src/providers/memory.ts +0 -142
  205. package/src/runtime/audit-logger.ts +0 -39
  206. package/src/runtime/base.ts +0 -1392
  207. package/src/services/__tests__/access-control.integration.test.ts +0 -443
  208. package/src/services/__tests__/access-control.proof-response-validation.test.ts +0 -578
  209. package/src/services/__tests__/access-control.service.test.ts +0 -970
  210. package/src/services/__tests__/batch-delegation.service.test.ts +0 -351
  211. package/src/services/__tests__/crypto.service.test.ts +0 -531
  212. package/src/services/__tests__/oauth-provider-registry.test.ts +0 -142
  213. package/src/services/__tests__/proof-verifier.integration.test.ts +0 -485
  214. package/src/services/__tests__/proof-verifier.test.ts +0 -489
  215. package/src/services/__tests__/provider-resolution.integration.test.ts +0 -202
  216. package/src/services/__tests__/provider-resolver.test.ts +0 -213
  217. package/src/services/__tests__/storage.service.test.ts +0 -358
  218. package/src/services/access-control.service.ts +0 -990
  219. package/src/services/authorization/authorization-registry.ts +0 -66
  220. package/src/services/authorization/types.ts +0 -71
  221. package/src/services/batch-delegation.service.ts +0 -137
  222. package/src/services/crypto.service.ts +0 -302
  223. package/src/services/errors.ts +0 -76
  224. package/src/services/index.ts +0 -18
  225. package/src/services/oauth-config.service.d.ts +0 -53
  226. package/src/services/oauth-config.service.d.ts.map +0 -1
  227. package/src/services/oauth-config.service.js.map +0 -1
  228. package/src/services/oauth-config.service.ts +0 -192
  229. package/src/services/oauth-provider-registry.d.ts +0 -57
  230. package/src/services/oauth-provider-registry.d.ts.map +0 -1
  231. package/src/services/oauth-provider-registry.js.map +0 -1
  232. package/src/services/oauth-provider-registry.ts +0 -141
  233. package/src/services/oauth-service.ts +0 -544
  234. package/src/services/oauth-token-retrieval.service.ts +0 -245
  235. package/src/services/proof-verifier.ts +0 -478
  236. package/src/services/provider-resolver.d.ts +0 -48
  237. package/src/services/provider-resolver.d.ts.map +0 -1
  238. package/src/services/provider-resolver.js.map +0 -1
  239. package/src/services/provider-resolver.ts +0 -146
  240. package/src/services/provider-validator.ts +0 -170
  241. package/src/services/session-registration.service.ts +0 -251
  242. package/src/services/storage.service.ts +0 -566
  243. package/src/services/tool-context-builder.ts +0 -237
  244. package/src/services/tool-protection.service.ts +0 -1070
  245. package/src/types/oauth-required-error.ts +0 -63
  246. package/src/types/tool-protection.ts +0 -155
  247. package/src/utils/__tests__/did-helpers.test.ts +0 -156
  248. package/src/utils/base58.ts +0 -109
  249. package/src/utils/base64.ts +0 -148
  250. package/src/utils/cors.ts +0 -83
  251. package/src/utils/did-helpers.ts +0 -210
  252. package/src/utils/index.ts +0 -8
  253. package/src/utils/storage-keys.ts +0 -278
  254. package/tsconfig.json +0 -21
  255. package/vitest.config.ts +0 -56
@@ -1,485 +0,0 @@
1
- /**
2
- * Integration Tests for ProofVerifier with Real DID Resolution
3
- *
4
- * These tests verify end-to-end proof verification with actual DID resolution,
5
- * testing both did:key (offline) and did:web (HTTP) resolution methods.
6
- */
7
-
8
- import { describe, it, expect, beforeEach, vi } from "vitest";
9
- import { ProofVerifier } from "../proof-verifier.js";
10
- import { CryptoService, type Ed25519JWK } from "../crypto.service.js";
11
- import type {
12
- CryptoProvider,
13
- ClockProvider,
14
- NonceCacheProvider,
15
- FetchProvider,
16
- } from "../../providers/base.js";
17
- import type { DetachedProof } from "@kya-os/contracts/proof";
18
- import {
19
- PROOF_VERIFICATION_ERROR_CODES,
20
- ProofVerificationError,
21
- } from "../errors.js";
22
-
23
- describe("ProofVerifier Integration - Real DID Resolution", () => {
24
- let proofVerifier: ProofVerifier;
25
- let mockCryptoProvider: CryptoProvider;
26
- let mockClockProvider: ClockProvider;
27
- let mockNonceCache: NonceCacheProvider;
28
- let realFetchProvider: FetchProvider;
29
-
30
- const validJwk: Ed25519JWK = {
31
- kty: "OKP",
32
- crv: "Ed25519",
33
- x: "VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ",
34
- kid: "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ#key-1",
35
- };
36
-
37
- const createValidProof = (did: string, kid: string): DetachedProof => {
38
- const header = { alg: "EdDSA", typ: "JWT" };
39
- const payload = {
40
- aud: "test-audience",
41
- sub: did,
42
- iss: did,
43
- nonce: `nonce-${Date.now()}`,
44
- ts: Math.floor(Date.now() / 1000),
45
- sessionId: "session123",
46
- requestHash: "sha256:" + "a".repeat(64),
47
- responseHash: "sha256:" + "b".repeat(64),
48
- };
49
- // Use TextEncoder/Decoder for base64 encoding (works in both Node and browser)
50
- const encoder = new TextEncoder();
51
- const headerB64 = btoa(JSON.stringify(header))
52
- .replace(/\+/g, "-")
53
- .replace(/\//g, "_")
54
- .replace(/=/g, "");
55
- const payloadB64 = btoa(JSON.stringify(payload))
56
- .replace(/\+/g, "-")
57
- .replace(/\//g, "_")
58
- .replace(/=/g, "");
59
- const signatureB64 = btoa("signature")
60
- .replace(/\+/g, "-")
61
- .replace(/\//g, "_")
62
- .replace(/=/g, "");
63
- const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
64
-
65
- return {
66
- jws,
67
- meta: {
68
- did,
69
- kid,
70
- ts: Math.floor(Date.now() / 1000),
71
- nonce: `nonce-${Date.now()}`,
72
- audience: "test-audience",
73
- sessionId: "session123",
74
- requestHash: "sha256:" + "a".repeat(64),
75
- responseHash: "sha256:" + "b".repeat(64),
76
- },
77
- };
78
- };
79
-
80
- beforeEach(() => {
81
- mockCryptoProvider = {
82
- sign: vi.fn(),
83
- verify: vi.fn().mockResolvedValue(true),
84
- generateKeyPair: vi.fn(),
85
- hash: vi.fn(),
86
- randomBytes: vi.fn(),
87
- };
88
-
89
- mockClockProvider = {
90
- now: vi.fn().mockReturnValue(Date.now()),
91
- isWithinSkew: vi.fn().mockReturnValue(true),
92
- hasExpired: vi.fn(),
93
- calculateExpiry: vi.fn(
94
- (ttlSeconds: number) => Date.now() + ttlSeconds * 1000
95
- ),
96
- format: vi.fn(),
97
- };
98
-
99
- mockNonceCache = {
100
- has: vi.fn().mockResolvedValue(false),
101
- add: vi.fn().mockResolvedValue(undefined),
102
- cleanup: vi.fn().mockResolvedValue(undefined),
103
- destroy: vi.fn().mockResolvedValue(undefined),
104
- };
105
-
106
- // Real fetch provider that actually resolves DIDs
107
- realFetchProvider = {
108
- resolveDID: async (did: string) => {
109
- // did:key resolution (offline)
110
- if (did.startsWith("did:key:")) {
111
- const publicKeyMultibase = did.slice("did:key:".length);
112
- return {
113
- "@context": ["https://www.w3.org/ns/did/v1"],
114
- id: did,
115
- verificationMethod: [
116
- {
117
- id: `${did}#key-1`,
118
- type: "Ed25519VerificationKey2020",
119
- controller: did,
120
- publicKeyMultibase,
121
- publicKeyJwk: validJwk,
122
- },
123
- ],
124
- authentication: [`${did}#key-1`],
125
- assertionMethod: [`${did}#key-1`],
126
- };
127
- }
128
-
129
- // did:web resolution (HTTP)
130
- if (did.startsWith("did:web:")) {
131
- const domain = did.slice("did:web:".length).replace(/:/g, "/");
132
- const url = `https://${domain}/.well-known/did.json`;
133
-
134
- try {
135
- const response = await fetch(url);
136
- if (!response.ok) {
137
- throw new Error(
138
- `HTTP ${response.status}: ${response.statusText}`
139
- );
140
- }
141
- return await response.json();
142
- } catch (error) {
143
- throw new Error(
144
- `Failed to resolve ${did}: ${error instanceof Error ? error.message : String(error)}`
145
- );
146
- }
147
- }
148
-
149
- throw new Error(`Unsupported DID method: ${did}`);
150
- },
151
- fetchStatusList: vi.fn(),
152
- fetchDelegationChain: vi.fn(),
153
- fetch: vi.fn(),
154
- };
155
-
156
- proofVerifier = new ProofVerifier({
157
- cryptoProvider: mockCryptoProvider,
158
- clockProvider: mockClockProvider,
159
- nonceCacheProvider: mockNonceCache,
160
- fetchProvider: realFetchProvider,
161
- timestampSkewSeconds: 120,
162
- nonceTtlSeconds: 300,
163
- });
164
- });
165
-
166
- describe("did:key Resolution (Offline)", () => {
167
- it("should resolve did:key and extract public key", async () => {
168
- const did =
169
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
170
- const kid = "key-1"; // Just the fragment, not the full DID#key-1
171
-
172
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
173
-
174
- expect(publicKey).toBeDefined();
175
- expect(publicKey?.kty).toBe("OKP");
176
- expect(publicKey?.crv).toBe("Ed25519");
177
- expect(publicKey?.kid).toBe(`${did}#${kid}`);
178
- });
179
-
180
- it("should verify proof with did:key resolution", async () => {
181
- const did =
182
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
183
- const kid = "key-1";
184
- const proof = createValidProof(did, `${did}#${kid}`); // Full kid in proof meta
185
-
186
- // Fetch public key from DID
187
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
188
- expect(publicKey).toBeDefined();
189
-
190
- // Verify proof
191
- const result = await proofVerifier.verifyProof(proof, publicKey!);
192
-
193
- expect(result.valid).toBe(true);
194
- expect(mockNonceCache.has).toHaveBeenCalledWith(proof.meta.nonce, proof.meta.did);
195
- expect(mockNonceCache.add).toHaveBeenCalledWith(
196
- proof.meta.nonce,
197
- expect.any(Number),
198
- proof.meta.did
199
- );
200
- });
201
-
202
- it("should handle missing verification method in did:key", async () => {
203
- const did =
204
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
205
- const kid = "nonexistent"; // Just the fragment
206
-
207
- await expect(
208
- proofVerifier.fetchPublicKeyFromDID(did, kid)
209
- ).rejects.toThrow(ProofVerificationError);
210
-
211
- try {
212
- await proofVerifier.fetchPublicKeyFromDID(did, kid);
213
- expect.fail("Should have thrown ProofVerificationError");
214
- } catch (error) {
215
- expect(error).toBeInstanceOf(ProofVerificationError);
216
- expect((error as ProofVerificationError).code).toBe(
217
- PROOF_VERIFICATION_ERROR_CODES.VERIFICATION_METHOD_NOT_FOUND
218
- );
219
- }
220
- });
221
- });
222
-
223
- describe("did:web Resolution (HTTP)", () => {
224
- // Skip this test in CI environments - it depends on external network calls
225
- // and can be flaky. Run locally for manual verification only.
226
- it.skip("should resolve did:web from real endpoint", async () => {
227
- // Use a known did:web endpoint (example.com has a well-known DID document)
228
- // Note: This test may fail if the endpoint is unavailable
229
- const did = "did:web:example.com";
230
-
231
- try {
232
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did);
233
-
234
- // If resolution succeeds, verify structure
235
- if (publicKey) {
236
- expect(publicKey.kty).toBe("OKP");
237
- expect(publicKey.crv).toBe("Ed25519");
238
- }
239
- } catch (error) {
240
- // If resolution fails (network issue, endpoint doesn't exist), that's okay
241
- // We're testing that the resolution mechanism works, not that every endpoint exists
242
- expect(error).toBeInstanceOf(ProofVerificationError);
243
- expect((error as ProofVerificationError).code).toBe(
244
- PROOF_VERIFICATION_ERROR_CODES.DID_RESOLUTION_FAILED
245
- );
246
- }
247
- }, 10000); // 10 second timeout for HTTP requests
248
-
249
- it("should handle HTTP errors gracefully", async () => {
250
- const did = "did:web:nonexistent-domain-that-does-not-exist-12345.com";
251
-
252
- await expect(proofVerifier.fetchPublicKeyFromDID(did)).rejects.toThrow(
253
- ProofVerificationError
254
- );
255
-
256
- try {
257
- await proofVerifier.fetchPublicKeyFromDID(did);
258
- } catch (error) {
259
- expect(error).toBeInstanceOf(ProofVerificationError);
260
- expect((error as ProofVerificationError).code).toBe(
261
- PROOF_VERIFICATION_ERROR_CODES.DID_RESOLUTION_FAILED
262
- );
263
- }
264
- }, 10000);
265
-
266
- it("should handle DID document without verification methods", async () => {
267
- // Mock a DID document without verification methods
268
- const mockFetchProvider: FetchProvider = {
269
- resolveDID: vi.fn().mockResolvedValue({
270
- "@context": ["https://www.w3.org/ns/did/v1"],
271
- id: "did:web:test.com",
272
- // No verificationMethod
273
- }),
274
- fetchStatusList: vi.fn(),
275
- fetchDelegationChain: vi.fn(),
276
- fetch: vi.fn(),
277
- };
278
-
279
- const testVerifier = new ProofVerifier({
280
- cryptoProvider: mockCryptoProvider,
281
- clockProvider: mockClockProvider,
282
- nonceCacheProvider: mockNonceCache,
283
- fetchProvider: mockFetchProvider,
284
- });
285
-
286
- await expect(
287
- testVerifier.fetchPublicKeyFromDID("did:web:test.com")
288
- ).rejects.toThrow(ProofVerificationError);
289
-
290
- try {
291
- await testVerifier.fetchPublicKeyFromDID("did:web:test.com");
292
- } catch (error) {
293
- expect(error).toBeInstanceOf(ProofVerificationError);
294
- expect((error as ProofVerificationError).code).toBe(
295
- PROOF_VERIFICATION_ERROR_CODES.VERIFICATION_METHOD_NOT_FOUND
296
- );
297
- }
298
- });
299
-
300
- it("should handle verification method without publicKeyJwk", async () => {
301
- const mockFetchProvider: FetchProvider = {
302
- resolveDID: vi.fn().mockResolvedValue({
303
- "@context": ["https://www.w3.org/ns/did/v1"],
304
- id: "did:web:test.com",
305
- verificationMethod: [
306
- {
307
- id: "did:web:test.com#key-1",
308
- type: "Ed25519VerificationKey2020",
309
- controller: "did:web:test.com",
310
- // No publicKeyJwk
311
- },
312
- ],
313
- }),
314
- fetchStatusList: vi.fn(),
315
- fetchDelegationChain: vi.fn(),
316
- fetch: vi.fn(),
317
- };
318
-
319
- const testVerifier = new ProofVerifier({
320
- cryptoProvider: mockCryptoProvider,
321
- clockProvider: mockClockProvider,
322
- nonceCacheProvider: mockNonceCache,
323
- fetchProvider: mockFetchProvider,
324
- });
325
-
326
- await expect(
327
- testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1")
328
- ).rejects.toThrow(ProofVerificationError);
329
-
330
- try {
331
- await testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1");
332
- } catch (error) {
333
- expect(error).toBeInstanceOf(ProofVerificationError);
334
- expect((error as ProofVerificationError).code).toBe(
335
- PROOF_VERIFICATION_ERROR_CODES.PUBLIC_KEY_NOT_FOUND
336
- );
337
- }
338
- });
339
-
340
- it("should handle non-Ed25519 keys", async () => {
341
- const mockFetchProvider: FetchProvider = {
342
- resolveDID: vi.fn().mockResolvedValue({
343
- "@context": ["https://www.w3.org/ns/did/v1"],
344
- id: "did:web:test.com",
345
- verificationMethod: [
346
- {
347
- id: "did:web:test.com#key-1",
348
- type: "RsaVerificationKey2018",
349
- controller: "did:web:test.com",
350
- publicKeyJwk: {
351
- kty: "RSA",
352
- n: "test",
353
- e: "AQAB",
354
- },
355
- },
356
- ],
357
- }),
358
- fetchStatusList: vi.fn(),
359
- fetchDelegationChain: vi.fn(),
360
- fetch: vi.fn(),
361
- };
362
-
363
- const testVerifier = new ProofVerifier({
364
- cryptoProvider: mockCryptoProvider,
365
- clockProvider: mockClockProvider,
366
- nonceCacheProvider: mockNonceCache,
367
- fetchProvider: mockFetchProvider,
368
- });
369
-
370
- await expect(
371
- testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1")
372
- ).rejects.toThrow(ProofVerificationError);
373
-
374
- try {
375
- await testVerifier.fetchPublicKeyFromDID("did:web:test.com", "key-1");
376
- } catch (error) {
377
- expect(error).toBeInstanceOf(ProofVerificationError);
378
- expect((error as ProofVerificationError).code).toBe(
379
- PROOF_VERIFICATION_ERROR_CODES.INVALID_JWK_FORMAT
380
- );
381
- }
382
- });
383
- });
384
-
385
- describe("End-to-End Proof Verification with DID Resolution", () => {
386
- it("should verify proof with did:key resolution end-to-end", async () => {
387
- const did =
388
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
389
- const kid = "key-1";
390
- const proof = createValidProof(did, `${did}#${kid}`); // Full kid in proof meta
391
-
392
- // Fetch public key from DID
393
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
394
- expect(publicKey).toBeDefined();
395
-
396
- // Verify proof
397
- const result = await proofVerifier.verifyProof(proof, publicKey!);
398
-
399
- expect(result.valid).toBe(true);
400
- expect(result.errorCode).toBeUndefined();
401
- expect(mockCryptoProvider.verify).toHaveBeenCalled();
402
- });
403
-
404
- it("should return specific error code for nonce replay", async () => {
405
- const did =
406
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
407
- const kid = "key-1";
408
- const proof = createValidProof(did, `${did}#${kid}`);
409
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
410
-
411
- // First verification should succeed
412
- const result1 = await proofVerifier.verifyProof(proof, publicKey!);
413
- expect(result1.valid).toBe(true);
414
-
415
- // Second verification should fail with nonce replay error
416
- mockNonceCache.has = vi.fn().mockResolvedValue(true);
417
- const result2 = await proofVerifier.verifyProof(proof, publicKey!);
418
-
419
- expect(result2.valid).toBe(false);
420
- expect(result2.errorCode).toBe(
421
- PROOF_VERIFICATION_ERROR_CODES.NONCE_REPLAY_DETECTED
422
- );
423
- expect(result2.details?.nonce).toBe(proof.meta.nonce);
424
- });
425
-
426
- it("should return specific error code for timestamp skew", async () => {
427
- const did =
428
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
429
- const kid = "key-1";
430
- const proof = createValidProof(did, `${did}#${kid}`);
431
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
432
-
433
- // Mock clock to reject timestamp
434
- mockClockProvider.isWithinSkew = vi.fn().mockReturnValue(false);
435
-
436
- const result = await proofVerifier.verifyProof(proof, publicKey!);
437
-
438
- expect(result.valid).toBe(false);
439
- expect(result.errorCode).toBe(
440
- PROOF_VERIFICATION_ERROR_CODES.TIMESTAMP_SKEW_EXCEEDED
441
- );
442
- expect(result.details?.timestamp).toBe(proof.meta.ts);
443
- expect(result.details?.skewSeconds).toBe(120);
444
- });
445
-
446
- it("should return specific error code for invalid signature", async () => {
447
- const did =
448
- "did:key:z6MkhaXgBZDvVCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ";
449
- const kid = "key-1";
450
- const proof = createValidProof(did, `${did}#${kid}`);
451
- const publicKey = await proofVerifier.fetchPublicKeyFromDID(did, kid);
452
-
453
- // Mock signature verification to fail
454
- mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
455
-
456
- const result = await proofVerifier.verifyProof(proof, publicKey!);
457
-
458
- expect(result.valid).toBe(false);
459
- expect(result.errorCode).toBe(
460
- PROOF_VERIFICATION_ERROR_CODES.INVALID_JWS_SIGNATURE
461
- );
462
- expect(result.details?.expectedKid).toBe(`${did}#${kid}`);
463
- });
464
- });
465
-
466
- describe("Error Code Coverage", () => {
467
- it("should return INVALID_PROOF_STRUCTURE for malformed proof", async () => {
468
- const invalidProof = {
469
- jws: "invalid",
470
- meta: {
471
- // Missing required fields
472
- did: "did:test",
473
- },
474
- } as any;
475
-
476
- const result = await proofVerifier.verifyProof(invalidProof, validJwk);
477
-
478
- expect(result.valid).toBe(false);
479
- expect(result.errorCode).toBe(
480
- PROOF_VERIFICATION_ERROR_CODES.INVALID_PROOF_STRUCTURE
481
- );
482
- expect(result.details?.zodErrors).toBeDefined();
483
- });
484
- });
485
- });