@kya-os/mcp-i-core 1.3.7-canary.0 → 1.3.7-canary.clientinfo.20251126041014

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (236) hide show
  1. package/.turbo/turbo-build.log +4 -0
  2. package/.turbo/turbo-test$colon$coverage.log +4239 -0
  3. package/.turbo/turbo-test.log +2973 -0
  4. package/COMPLIANCE_IMPROVEMENT_REPORT.md +483 -0
  5. package/Composer 3.md +615 -0
  6. package/GPT-5.md +1169 -0
  7. package/OPUS-plan.md +352 -0
  8. package/PHASE_3_AND_4.1_SUMMARY.md +585 -0
  9. package/PHASE_3_SUMMARY.md +317 -0
  10. package/PHASE_4.1.3_SUMMARY.md +428 -0
  11. package/PHASE_4.1_COMPLETE.md +525 -0
  12. package/PHASE_4_USER_DID_IDENTITY_LINKING_PLAN.md +1240 -0
  13. package/SCHEMA_COMPLIANCE_REPORT.md +275 -0
  14. package/TEST_PLAN.md +571 -0
  15. package/coverage/coverage-final.json +57 -0
  16. package/dist/__tests__/utils/mock-providers.d.ts +1 -2
  17. package/dist/__tests__/utils/mock-providers.d.ts.map +1 -1
  18. package/dist/__tests__/utils/mock-providers.js.map +1 -1
  19. package/dist/cache/oauth-config-cache.d.ts +69 -0
  20. package/dist/cache/oauth-config-cache.d.ts.map +1 -0
  21. package/dist/cache/oauth-config-cache.js +76 -0
  22. package/dist/cache/oauth-config-cache.js.map +1 -0
  23. package/dist/identity/idp-token-resolver.d.ts +53 -0
  24. package/dist/identity/idp-token-resolver.d.ts.map +1 -0
  25. package/dist/identity/idp-token-resolver.js +108 -0
  26. package/dist/identity/idp-token-resolver.js.map +1 -0
  27. package/dist/identity/idp-token-storage.interface.d.ts +42 -0
  28. package/dist/identity/idp-token-storage.interface.d.ts.map +1 -0
  29. package/dist/identity/idp-token-storage.interface.js +12 -0
  30. package/dist/identity/idp-token-storage.interface.js.map +1 -0
  31. package/dist/identity/user-did-manager.d.ts +39 -1
  32. package/dist/identity/user-did-manager.d.ts.map +1 -1
  33. package/dist/identity/user-did-manager.js +69 -3
  34. package/dist/identity/user-did-manager.js.map +1 -1
  35. package/dist/index.d.ts +24 -0
  36. package/dist/index.d.ts.map +1 -1
  37. package/dist/index.js +43 -1
  38. package/dist/index.js.map +1 -1
  39. package/dist/runtime/audit-logger.d.ts +37 -0
  40. package/dist/runtime/audit-logger.d.ts.map +1 -0
  41. package/dist/runtime/audit-logger.js +9 -0
  42. package/dist/runtime/audit-logger.js.map +1 -0
  43. package/dist/runtime/base.d.ts +19 -2
  44. package/dist/runtime/base.d.ts.map +1 -1
  45. package/dist/runtime/base.js +227 -11
  46. package/dist/runtime/base.js.map +1 -1
  47. package/dist/services/access-control.service.d.ts.map +1 -1
  48. package/dist/services/access-control.service.js +199 -15
  49. package/dist/services/access-control.service.js.map +1 -1
  50. package/dist/services/authorization/authorization-registry.d.ts +29 -0
  51. package/dist/services/authorization/authorization-registry.d.ts.map +1 -0
  52. package/dist/services/authorization/authorization-registry.js +57 -0
  53. package/dist/services/authorization/authorization-registry.js.map +1 -0
  54. package/dist/services/authorization/types.d.ts +53 -0
  55. package/dist/services/authorization/types.d.ts.map +1 -0
  56. package/dist/services/authorization/types.js +10 -0
  57. package/dist/services/authorization/types.js.map +1 -0
  58. package/dist/services/batch-delegation.service.d.ts +53 -0
  59. package/dist/services/batch-delegation.service.d.ts.map +1 -0
  60. package/dist/services/batch-delegation.service.js +95 -0
  61. package/dist/services/batch-delegation.service.js.map +1 -0
  62. package/dist/services/index.d.ts +2 -0
  63. package/dist/services/index.d.ts.map +1 -1
  64. package/dist/services/index.js +4 -1
  65. package/dist/services/index.js.map +1 -1
  66. package/dist/services/oauth-config.service.d.ts +53 -0
  67. package/dist/services/oauth-config.service.d.ts.map +1 -0
  68. package/dist/services/oauth-config.service.js +141 -0
  69. package/dist/services/oauth-config.service.js.map +1 -0
  70. package/dist/services/oauth-provider-registry.d.ts +88 -0
  71. package/dist/services/oauth-provider-registry.d.ts.map +1 -0
  72. package/dist/services/oauth-provider-registry.js +128 -0
  73. package/dist/services/oauth-provider-registry.js.map +1 -0
  74. package/dist/services/oauth-service.d.ts +77 -0
  75. package/dist/services/oauth-service.d.ts.map +1 -0
  76. package/dist/services/oauth-service.js +373 -0
  77. package/dist/services/oauth-service.js.map +1 -0
  78. package/dist/services/oauth-token-retrieval.service.d.ts +49 -0
  79. package/dist/services/oauth-token-retrieval.service.d.ts.map +1 -0
  80. package/dist/services/oauth-token-retrieval.service.js +150 -0
  81. package/dist/services/oauth-token-retrieval.service.js.map +1 -0
  82. package/dist/services/provider-resolver.d.ts +48 -0
  83. package/dist/services/provider-resolver.d.ts.map +1 -0
  84. package/dist/services/provider-resolver.js +121 -0
  85. package/dist/services/provider-resolver.js.map +1 -0
  86. package/dist/services/provider-validator.d.ts +55 -0
  87. package/dist/services/provider-validator.d.ts.map +1 -0
  88. package/dist/services/provider-validator.js +135 -0
  89. package/dist/services/provider-validator.js.map +1 -0
  90. package/dist/services/session-registration.service.d.ts +80 -0
  91. package/dist/services/session-registration.service.d.ts.map +1 -0
  92. package/dist/services/session-registration.service.js +228 -0
  93. package/dist/services/session-registration.service.js.map +1 -0
  94. package/dist/services/tool-context-builder.d.ts +57 -0
  95. package/dist/services/tool-context-builder.d.ts.map +1 -0
  96. package/dist/services/tool-context-builder.js +125 -0
  97. package/dist/services/tool-context-builder.js.map +1 -0
  98. package/dist/services/tool-protection.service.d.ts +27 -0
  99. package/dist/services/tool-protection.service.d.ts.map +1 -1
  100. package/dist/services/tool-protection.service.js +194 -4
  101. package/dist/services/tool-protection.service.js.map +1 -1
  102. package/dist/types/oauth-required-error.d.ts +40 -0
  103. package/dist/types/oauth-required-error.d.ts.map +1 -0
  104. package/dist/types/oauth-required-error.js +40 -0
  105. package/dist/types/oauth-required-error.js.map +1 -0
  106. package/dist/utils/did-helpers.d.ts +33 -0
  107. package/dist/utils/did-helpers.d.ts.map +1 -1
  108. package/dist/utils/did-helpers.js +40 -0
  109. package/dist/utils/did-helpers.js.map +1 -1
  110. package/dist/utils/index.d.ts +1 -0
  111. package/dist/utils/index.d.ts.map +1 -1
  112. package/dist/utils/index.js +1 -0
  113. package/dist/utils/index.js.map +1 -1
  114. package/docs/API_REFERENCE.md +1362 -0
  115. package/docs/COMPLIANCE_MATRIX.md +691 -0
  116. package/docs/STATUSLIST2021_GUIDE.md +696 -0
  117. package/docs/W3C_VC_DELEGATION_GUIDE.md +710 -0
  118. package/package.json +23 -54
  119. package/scripts/audit-compliance.ts +724 -0
  120. package/src/__tests__/cache/tool-protection-cache.test.ts +640 -0
  121. package/src/__tests__/config/provider-runtime-config.test.ts +309 -0
  122. package/src/__tests__/delegation-e2e.test.ts +690 -0
  123. package/src/__tests__/identity/user-did-manager.test.ts +213 -0
  124. package/src/__tests__/index.test.ts +56 -0
  125. package/src/__tests__/integration/full-flow.test.ts +776 -0
  126. package/src/__tests__/integration.test.ts +281 -0
  127. package/src/__tests__/providers/base.test.ts +173 -0
  128. package/src/__tests__/providers/memory.test.ts +319 -0
  129. package/src/__tests__/regression/phase2-regression.test.ts +429 -0
  130. package/src/__tests__/runtime/audit-logger.test.ts +154 -0
  131. package/src/__tests__/runtime/base-extensions.test.ts +593 -0
  132. package/src/__tests__/runtime/base.test.ts +869 -0
  133. package/src/__tests__/runtime/delegation-flow.test.ts +164 -0
  134. package/src/__tests__/runtime/proof-client-did.test.ts +375 -0
  135. package/src/__tests__/runtime/route-interception.test.ts +686 -0
  136. package/src/__tests__/runtime/tool-protection-enforcement.test.ts +908 -0
  137. package/src/__tests__/services/agentshield-integration.test.ts +784 -0
  138. package/src/__tests__/services/cache-busting.test.ts +125 -0
  139. package/src/__tests__/services/oauth-service-pkce.test.ts +556 -0
  140. package/src/__tests__/services/provider-resolver-edge-cases.test.ts +591 -0
  141. package/src/__tests__/services/tool-protection-oauth-provider.test.ts +480 -0
  142. package/src/__tests__/services/tool-protection.service.test.ts +1366 -0
  143. package/src/__tests__/utils/mock-providers.ts +340 -0
  144. package/src/cache/oauth-config-cache.d.ts +69 -0
  145. package/src/cache/oauth-config-cache.d.ts.map +1 -0
  146. package/src/cache/oauth-config-cache.js.map +1 -0
  147. package/src/cache/oauth-config-cache.ts +123 -0
  148. package/src/cache/tool-protection-cache.ts +171 -0
  149. package/src/compliance/EXAMPLE.md +412 -0
  150. package/src/compliance/__tests__/schema-verifier.test.ts +797 -0
  151. package/src/compliance/index.ts +8 -0
  152. package/src/compliance/schema-registry.ts +460 -0
  153. package/src/compliance/schema-verifier.ts +708 -0
  154. package/src/config/__tests__/remote-config.spec.ts +268 -0
  155. package/src/config/remote-config.ts +174 -0
  156. package/src/config.ts +309 -0
  157. package/src/delegation/__tests__/audience-validator.test.ts +112 -0
  158. package/src/delegation/__tests__/bitstring.test.ts +346 -0
  159. package/src/delegation/__tests__/cascading-revocation.test.ts +628 -0
  160. package/src/delegation/__tests__/delegation-graph.test.ts +584 -0
  161. package/src/delegation/__tests__/utils.test.ts +152 -0
  162. package/src/delegation/__tests__/vc-issuer.test.ts +442 -0
  163. package/src/delegation/__tests__/vc-verifier.test.ts +922 -0
  164. package/src/delegation/audience-validator.ts +52 -0
  165. package/src/delegation/bitstring.ts +278 -0
  166. package/src/delegation/cascading-revocation.ts +370 -0
  167. package/src/delegation/delegation-graph.ts +299 -0
  168. package/src/delegation/index.ts +14 -0
  169. package/src/delegation/statuslist-manager.ts +353 -0
  170. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +366 -0
  171. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +228 -0
  172. package/src/delegation/storage/index.ts +9 -0
  173. package/src/delegation/storage/memory-graph-storage.ts +178 -0
  174. package/src/delegation/storage/memory-statuslist-storage.ts +77 -0
  175. package/src/delegation/utils.ts +42 -0
  176. package/src/delegation/vc-issuer.ts +232 -0
  177. package/src/delegation/vc-verifier.ts +568 -0
  178. package/src/identity/idp-token-resolver.ts +147 -0
  179. package/src/identity/idp-token-storage.interface.ts +59 -0
  180. package/src/identity/user-did-manager.ts +370 -0
  181. package/src/index.ts +271 -0
  182. package/src/providers/base.d.ts +91 -0
  183. package/src/providers/base.d.ts.map +1 -0
  184. package/src/providers/base.js.map +1 -0
  185. package/src/providers/base.ts +96 -0
  186. package/src/providers/memory.ts +142 -0
  187. package/src/runtime/audit-logger.ts +39 -0
  188. package/src/runtime/base.ts +1329 -0
  189. package/src/services/__tests__/access-control.integration.test.ts +443 -0
  190. package/src/services/__tests__/access-control.proof-response-validation.test.ts +578 -0
  191. package/src/services/__tests__/access-control.service.test.ts +970 -0
  192. package/src/services/__tests__/batch-delegation.service.test.ts +351 -0
  193. package/src/services/__tests__/crypto.service.test.ts +531 -0
  194. package/src/services/__tests__/oauth-provider-registry.test.ts +142 -0
  195. package/src/services/__tests__/proof-verifier.integration.test.ts +485 -0
  196. package/src/services/__tests__/proof-verifier.test.ts +489 -0
  197. package/src/services/__tests__/provider-resolution.integration.test.ts +202 -0
  198. package/src/services/__tests__/provider-resolver.test.ts +213 -0
  199. package/src/services/__tests__/storage.service.test.ts +358 -0
  200. package/src/services/access-control.service.ts +990 -0
  201. package/src/services/authorization/authorization-registry.ts +66 -0
  202. package/src/services/authorization/types.ts +71 -0
  203. package/src/services/batch-delegation.service.ts +137 -0
  204. package/src/services/crypto.service.ts +302 -0
  205. package/src/services/errors.ts +76 -0
  206. package/src/services/index.ts +18 -0
  207. package/src/services/oauth-config.service.d.ts +53 -0
  208. package/src/services/oauth-config.service.d.ts.map +1 -0
  209. package/src/services/oauth-config.service.js.map +1 -0
  210. package/src/services/oauth-config.service.ts +192 -0
  211. package/src/services/oauth-provider-registry.d.ts +57 -0
  212. package/src/services/oauth-provider-registry.d.ts.map +1 -0
  213. package/src/services/oauth-provider-registry.js.map +1 -0
  214. package/src/services/oauth-provider-registry.ts +141 -0
  215. package/src/services/oauth-service.ts +544 -0
  216. package/src/services/oauth-token-retrieval.service.ts +245 -0
  217. package/src/services/proof-verifier.ts +478 -0
  218. package/src/services/provider-resolver.d.ts +48 -0
  219. package/src/services/provider-resolver.d.ts.map +1 -0
  220. package/src/services/provider-resolver.js.map +1 -0
  221. package/src/services/provider-resolver.ts +146 -0
  222. package/src/services/provider-validator.ts +170 -0
  223. package/src/services/session-registration.service.ts +317 -0
  224. package/src/services/storage.service.ts +566 -0
  225. package/src/services/tool-context-builder.ts +172 -0
  226. package/src/services/tool-protection.service.ts +982 -0
  227. package/src/types/oauth-required-error.ts +63 -0
  228. package/src/types/tool-protection.ts +155 -0
  229. package/src/utils/__tests__/did-helpers.test.ts +101 -0
  230. package/src/utils/base64.ts +148 -0
  231. package/src/utils/cors.ts +83 -0
  232. package/src/utils/did-helpers.ts +150 -0
  233. package/src/utils/index.ts +8 -0
  234. package/src/utils/storage-keys.ts +278 -0
  235. package/tsconfig.json +21 -0
  236. package/vitest.config.ts +56 -0
@@ -0,0 +1,922 @@
1
+ import { describe, it, expect, beforeEach, vi, Mock } from "vitest";
2
+ import {
3
+ DelegationCredentialVerifier,
4
+ createDelegationVerifier,
5
+ type DIDResolver,
6
+ type StatusListResolver,
7
+ type SignatureVerificationFunction,
8
+ type DelegationVCVerificationResult,
9
+ } from "../vc-verifier.js";
10
+ import type { DelegationCredential } from "@kya-os/contracts";
11
+
12
+ // Mock the contracts functions
13
+ vi.mock("@kya-os/contracts", () => ({
14
+ isDelegationCredentialExpired: vi.fn(),
15
+ isDelegationCredentialNotYetValid: vi.fn(),
16
+ validateDelegationCredential: vi.fn(),
17
+ }));
18
+
19
+ describe("DelegationCredentialVerifier", () => {
20
+ let mockDidResolver: {
21
+ resolve: ReturnType<typeof vi.fn>;
22
+ };
23
+ let mockStatusListResolver: {
24
+ checkStatus: ReturnType<typeof vi.fn>;
25
+ };
26
+ let mockSignatureVerifier: Mock<SignatureVerificationFunction>;
27
+
28
+ let verifier: DelegationCredentialVerifier;
29
+
30
+ // Helper function to setup default contracts mocks
31
+ const setupDefaultContractsMocks = async () => {
32
+ // Import the mocked functions
33
+ const contracts = await import("@kya-os/contracts");
34
+
35
+ // Access the mocked functions and set return values
36
+ const validateDelegationCredential = vi.mocked(
37
+ contracts.validateDelegationCredential
38
+ );
39
+ const isDelegationCredentialExpired = vi.mocked(
40
+ contracts.isDelegationCredentialExpired
41
+ );
42
+ const isDelegationCredentialNotYetValid = vi.mocked(
43
+ contracts.isDelegationCredentialNotYetValid
44
+ );
45
+
46
+ // Setup default return values
47
+ validateDelegationCredential.mockReturnValue({
48
+ success: true,
49
+ data: mockValidVC,
50
+ });
51
+ isDelegationCredentialExpired.mockReturnValue(false);
52
+ isDelegationCredentialNotYetValid.mockReturnValue(false);
53
+
54
+ return {
55
+ validateDelegationCredential,
56
+ isDelegationCredentialExpired,
57
+ isDelegationCredentialNotYetValid,
58
+ };
59
+ };
60
+
61
+ const mockValidVC: DelegationCredential = {
62
+ "@context": ["https://www.w3.org/2018/credentials/v1"],
63
+ id: "urn:delegation:123",
64
+ type: ["VerifiableCredential", "DelegationCredential"],
65
+ issuer: "did:web:example.com:issuer",
66
+ issuanceDate: "2024-01-01T00:00:00Z",
67
+ credentialSubject: {
68
+ id: "did:web:example.com:subject",
69
+ delegation: {
70
+ id: "urn:delegation:123",
71
+ issuerDid: "did:web:example.com:issuer",
72
+ subjectDid: "did:web:example.com:subject",
73
+ constraints: {
74
+ scopes: ["read:profile"],
75
+ },
76
+ status: "active",
77
+ },
78
+ },
79
+ proof: {
80
+ type: "Ed25519Signature2020",
81
+ created: "2024-01-01T00:00:00Z",
82
+ verificationMethod: "did:web:example.com:issuer#key-1",
83
+ proofPurpose: "assertionMethod",
84
+ proofValue: "mock-proof-value",
85
+ },
86
+ };
87
+
88
+ beforeEach(() => {
89
+ vi.clearAllMocks();
90
+
91
+ // Setup mocks as proper interface implementations with vitest mock types
92
+ mockDidResolver = {
93
+ resolve: vi.fn() as any,
94
+ };
95
+
96
+ mockStatusListResolver = {
97
+ checkStatus: vi.fn() as any,
98
+ };
99
+
100
+ mockSignatureVerifier = vi.fn();
101
+
102
+ verifier = new DelegationCredentialVerifier({
103
+ didResolver: mockDidResolver as DIDResolver,
104
+ statusListResolver: mockStatusListResolver as StatusListResolver,
105
+ signatureVerifier: mockSignatureVerifier,
106
+ cacheTtl: 1000, // Short TTL for testing
107
+ });
108
+ });
109
+
110
+ describe("constructor", () => {
111
+ it("should create verifier with default options", () => {
112
+ const defaultVerifier = new DelegationCredentialVerifier();
113
+ expect(defaultVerifier).toBeInstanceOf(DelegationCredentialVerifier);
114
+ });
115
+
116
+ it("should create verifier with custom options", () => {
117
+ const customVerifier = new DelegationCredentialVerifier({
118
+ cacheTtl: 5000,
119
+ });
120
+ expect(customVerifier).toBeInstanceOf(DelegationCredentialVerifier);
121
+ });
122
+ });
123
+
124
+ describe("createDelegationVerifier", () => {
125
+ it("should create a verifier instance", () => {
126
+ const verifier = createDelegationVerifier();
127
+ expect(verifier).toBeInstanceOf(DelegationCredentialVerifier);
128
+ });
129
+
130
+ it("should pass options to verifier", () => {
131
+ const options = { cacheTtl: 3000 };
132
+ const verifier = createDelegationVerifier(options);
133
+ expect(verifier).toBeInstanceOf(DelegationCredentialVerifier);
134
+ });
135
+ });
136
+
137
+ describe("verifyDelegationCredential - Basic Validation Stage", () => {
138
+ it("should reject expired credentials at basic validation stage", async () => {
139
+ const contractsMock = await setupDefaultContractsMocks();
140
+ contractsMock.isDelegationCredentialExpired.mockReturnValue(true);
141
+
142
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
143
+
144
+ expect(result.valid).toBe(false);
145
+ expect(result.reason).toBe("Delegation credential expired");
146
+ expect(result.stage).toBe("basic");
147
+ expect(result.metrics?.totalMs).toBeGreaterThanOrEqual(0);
148
+ expect(result.checks?.basicValid).toBe(false);
149
+ });
150
+
151
+ it("should reject not-yet-valid credentials at basic validation stage", async () => {
152
+ const contractsMock = await setupDefaultContractsMocks();
153
+ contractsMock.isDelegationCredentialNotYetValid.mockReturnValue(true);
154
+
155
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
156
+
157
+ expect(result.valid).toBe(false);
158
+ expect(result.reason).toBe("Delegation credential not yet valid");
159
+ expect(result.stage).toBe("basic");
160
+ });
161
+
162
+ it("should reject revoked credentials at basic validation stage", async () => {
163
+ await setupDefaultContractsMocks();
164
+
165
+ const revokedVC = {
166
+ ...mockValidVC,
167
+ credentialSubject: {
168
+ ...mockValidVC.credentialSubject,
169
+ delegation: {
170
+ ...mockValidVC.credentialSubject.delegation,
171
+ status: "revoked" as const,
172
+ },
173
+ },
174
+ };
175
+
176
+ const result = await verifier.verifyDelegationCredential(revokedVC);
177
+
178
+ expect(result.valid).toBe(false);
179
+ expect(result.reason).toBe("Delegation status is revoked");
180
+ expect(result.stage).toBe("basic");
181
+ });
182
+
183
+ it("should reject expired status credentials at basic validation stage", async () => {
184
+ await setupDefaultContractsMocks();
185
+ const expiredVC = {
186
+ ...mockValidVC,
187
+ credentialSubject: {
188
+ ...mockValidVC.credentialSubject,
189
+ delegation: {
190
+ ...mockValidVC.credentialSubject.delegation,
191
+ status: "expired" as const,
192
+ },
193
+ },
194
+ };
195
+
196
+ const result = await verifier.verifyDelegationCredential(expiredVC);
197
+
198
+ expect(result.valid).toBe(false);
199
+ expect(result.reason).toBe("Delegation status is expired");
200
+ expect(result.stage).toBe("basic");
201
+ });
202
+
203
+ it("should reject credentials without issuer DID", async () => {
204
+ await setupDefaultContractsMocks();
205
+ const invalidVC = {
206
+ ...mockValidVC,
207
+ credentialSubject: {
208
+ ...mockValidVC.credentialSubject,
209
+ delegation: {
210
+ ...mockValidVC.credentialSubject.delegation,
211
+ issuerDid: undefined,
212
+ },
213
+ },
214
+ } as any;
215
+
216
+ const result = await verifier.verifyDelegationCredential(invalidVC);
217
+
218
+ expect(result.valid).toBe(false);
219
+ expect(result.reason).toBe("Missing issuer or subject DID");
220
+ expect(result.stage).toBe("basic");
221
+ });
222
+
223
+ it("should reject credentials without subject DID", async () => {
224
+ await setupDefaultContractsMocks();
225
+ const invalidVC = {
226
+ ...mockValidVC,
227
+ credentialSubject: {
228
+ ...mockValidVC.credentialSubject,
229
+ delegation: {
230
+ ...mockValidVC.credentialSubject.delegation,
231
+ subjectDid: undefined,
232
+ },
233
+ },
234
+ } as any;
235
+
236
+ const result = await verifier.verifyDelegationCredential(invalidVC);
237
+
238
+ expect(result.valid).toBe(false);
239
+ expect(result.reason).toBe("Missing issuer or subject DID");
240
+ expect(result.stage).toBe("basic");
241
+ });
242
+
243
+ it("should reject credentials without proof", async () => {
244
+ await setupDefaultContractsMocks();
245
+ const invalidVC = { ...mockValidVC };
246
+ delete invalidVC.proof;
247
+
248
+ const result = await verifier.verifyDelegationCredential(invalidVC);
249
+
250
+ expect(result.valid).toBe(false);
251
+ expect(result.reason).toBe("Missing proof");
252
+ expect(result.stage).toBe("basic");
253
+ });
254
+
255
+ it("should reject invalid schema at basic validation stage", async () => {
256
+ const contractsMock = await setupDefaultContractsMocks();
257
+ // Create a mock ZodError-like object without importing zod
258
+ const mockZodError = {
259
+ issues: [{ code: "custom", path: [], message: "Invalid schema" }],
260
+ message: "Invalid schema",
261
+ };
262
+ contractsMock.validateDelegationCredential.mockReturnValue({
263
+ success: false,
264
+ error: mockZodError,
265
+ } as any);
266
+
267
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
268
+
269
+ expect(result.valid).toBe(false);
270
+ expect(result.reason).toBe("Schema validation failed: Invalid schema");
271
+ expect(result.stage).toBe("basic");
272
+ });
273
+ });
274
+
275
+ describe("verifyDelegationCredential - Signature Verification", () => {
276
+ it("should skip signature verification when skipSignature is true", async () => {
277
+ await setupDefaultContractsMocks();
278
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
279
+ mockSignatureVerifier.mockResolvedValue({ valid: false }); // This should not be called
280
+
281
+ const result = await verifier.verifyDelegationCredential(mockValidVC, {
282
+ skipSignature: true,
283
+ });
284
+
285
+ expect(result.valid).toBe(true); // Only basic checks pass
286
+ expect(result.stage).toBe("complete");
287
+ expect(result.checks?.signatureValid).toBe(true); // Skipped = treated as valid
288
+ expect(mockSignatureVerifier).not.toHaveBeenCalled();
289
+ });
290
+
291
+ it("should skip signature verification when no resolver available", async () => {
292
+ await setupDefaultContractsMocks();
293
+ const verifierWithoutResolver = new DelegationCredentialVerifier({
294
+ statusListResolver: mockStatusListResolver,
295
+ // No signatureVerifier
296
+ });
297
+
298
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
299
+
300
+ const result =
301
+ await verifierWithoutResolver.verifyDelegationCredential(mockValidVC);
302
+
303
+ expect(result.valid).toBe(true);
304
+ expect(result.checks?.signatureValid).toBe(true); // Trust but don't verify
305
+ });
306
+
307
+ it("should fail when DID resolution fails", async () => {
308
+ await setupDefaultContractsMocks();
309
+ mockDidResolver.resolve.mockResolvedValue(null);
310
+
311
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
312
+
313
+ expect(result.valid).toBe(false);
314
+ expect(result.reason).toBe(
315
+ "Could not resolve issuer DID: did:web:example.com:issuer"
316
+ );
317
+ expect(result.stage).toBe("complete");
318
+ expect(result.checks?.signatureValid).toBe(false);
319
+ });
320
+
321
+ it("should fail when verification method not found", async () => {
322
+ await setupDefaultContractsMocks();
323
+ mockDidResolver.resolve.mockResolvedValue({
324
+ id: "did:web:example.com:issuer",
325
+ verificationMethod: [], // Empty array
326
+ });
327
+
328
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
329
+
330
+ expect(result.valid).toBe(false);
331
+ expect(result.reason).toBe(
332
+ "Verification method did:web:example.com:issuer#key-1 not found"
333
+ );
334
+ expect(result.checks?.signatureValid).toBe(false);
335
+ });
336
+
337
+ it("should fail when verification method missing public key", async () => {
338
+ await setupDefaultContractsMocks();
339
+ mockDidResolver.resolve.mockResolvedValue({
340
+ id: "did:web:example.com:issuer",
341
+ verificationMethod: [
342
+ {
343
+ id: "did:web:example.com:issuer#key-1",
344
+ type: "Ed25519VerificationKey2020",
345
+ controller: "did:web:example.com:issuer",
346
+ // Missing publicKeyJwk
347
+ },
348
+ ],
349
+ });
350
+
351
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
352
+
353
+ expect(result.valid).toBe(false);
354
+ expect(result.reason).toBe("Verification method missing publicKeyJwk");
355
+ expect(result.checks?.signatureValid).toBe(false);
356
+ });
357
+
358
+ it("should succeed when signature verification passes", async () => {
359
+ await setupDefaultContractsMocks();
360
+ mockDidResolver.resolve.mockResolvedValue({
361
+ id: "did:web:example.com:issuer",
362
+ verificationMethod: [
363
+ {
364
+ id: "did:web:example.com:issuer#key-1",
365
+ type: "Ed25519VerificationKey2020",
366
+ controller: "did:web:example.com:issuer",
367
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
368
+ },
369
+ ],
370
+ });
371
+
372
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
373
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
374
+
375
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
376
+
377
+ expect(result.valid).toBe(true);
378
+ expect(result.stage).toBe("complete");
379
+ expect(result.checks?.signatureValid).toBe(true);
380
+ expect(result.checks?.statusValid).toBe(true);
381
+ expect(result.checks?.basicValid).toBe(true);
382
+ });
383
+
384
+ it("should fail when signature verification fails", async () => {
385
+ await setupDefaultContractsMocks();
386
+ mockDidResolver.resolve.mockResolvedValue({
387
+ id: "did:web:example.com:issuer",
388
+ verificationMethod: [
389
+ {
390
+ id: "did:web:example.com:issuer#key-1",
391
+ type: "Ed25519VerificationKey2020",
392
+ controller: "did:web:example.com:issuer",
393
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
394
+ },
395
+ ],
396
+ });
397
+
398
+ mockSignatureVerifier.mockResolvedValue({
399
+ valid: false,
400
+ reason: "Invalid signature",
401
+ });
402
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
403
+
404
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
405
+
406
+ expect(result.valid).toBe(false);
407
+ expect(result.reason).toBe("Invalid signature");
408
+ expect(result.checks?.signatureValid).toBe(false);
409
+ });
410
+ });
411
+
412
+ describe("verifyDelegationCredential - Status Checking", () => {
413
+ it("should skip status checking when skipStatus is true", async () => {
414
+ await setupDefaultContractsMocks();
415
+ const vcWithoutStatus = { ...mockValidVC };
416
+ delete vcWithoutStatus.credentialStatus;
417
+
418
+ mockDidResolver.resolve.mockResolvedValue({
419
+ id: "did:web:example.com:issuer",
420
+ verificationMethod: [
421
+ {
422
+ id: "did:web:example.com:issuer#key-1",
423
+ type: "Ed25519VerificationKey2020",
424
+ controller: "did:web:example.com:issuer",
425
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
426
+ },
427
+ ],
428
+ });
429
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
430
+ mockStatusListResolver.checkStatus.mockResolvedValue(true); // Revoked - should not be called
431
+
432
+ const result = await verifier.verifyDelegationCredential(
433
+ vcWithoutStatus,
434
+ {
435
+ skipStatus: true,
436
+ }
437
+ );
438
+
439
+ expect(result.valid).toBe(true);
440
+ expect(result.checks?.statusValid).toBe(true); // Skipped = treated as valid
441
+ expect(mockStatusListResolver.checkStatus).not.toHaveBeenCalled();
442
+ });
443
+
444
+ it("should skip status checking when no status entry exists", async () => {
445
+ await setupDefaultContractsMocks();
446
+ const vcWithoutStatus = { ...mockValidVC };
447
+ delete vcWithoutStatus.credentialStatus;
448
+
449
+ mockDidResolver.resolve.mockResolvedValue({
450
+ id: "did:web:example.com:issuer",
451
+ verificationMethod: [
452
+ {
453
+ id: "did:web:example.com:issuer#key-1",
454
+ type: "Ed25519VerificationKey2020",
455
+ controller: "did:web:example.com:issuer",
456
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
457
+ },
458
+ ],
459
+ });
460
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
461
+
462
+ const result = await verifier.verifyDelegationCredential(vcWithoutStatus);
463
+
464
+ expect(result.valid).toBe(true);
465
+ expect(result.checks?.statusValid).toBe(true);
466
+ expect(mockStatusListResolver.checkStatus).not.toHaveBeenCalled();
467
+ });
468
+
469
+ it("should skip status checking when no resolver available", async () => {
470
+ await setupDefaultContractsMocks();
471
+ const verifierWithoutResolver = new DelegationCredentialVerifier({
472
+ didResolver: mockDidResolver,
473
+ signatureVerifier: mockSignatureVerifier,
474
+ // No statusListResolver
475
+ });
476
+
477
+ const vcWithStatus = {
478
+ ...mockValidVC,
479
+ credentialStatus: {
480
+ id: "https://example.com/status#123",
481
+ type: "StatusList2021Entry" as const,
482
+ statusPurpose: "revocation" as const,
483
+ statusListIndex: "123",
484
+ statusListCredential: "https://example.com/status",
485
+ },
486
+ };
487
+
488
+ mockDidResolver.resolve.mockResolvedValue({
489
+ id: "did:web:example.com:issuer",
490
+ verificationMethod: [
491
+ {
492
+ id: "did:web:example.com:issuer#key-1",
493
+ type: "Ed25519VerificationKey2020",
494
+ controller: "did:web:example.com:issuer",
495
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
496
+ },
497
+ ],
498
+ });
499
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
500
+
501
+ const result =
502
+ await verifierWithoutResolver.verifyDelegationCredential(vcWithStatus);
503
+
504
+ expect(result.valid).toBe(true);
505
+ expect(result.checks?.statusValid).toBe(true); // Trust but don't verify
506
+ });
507
+
508
+ it("should fail when credential is revoked", async () => {
509
+ await setupDefaultContractsMocks();
510
+ const vcWithStatus = {
511
+ ...mockValidVC,
512
+ credentialStatus: {
513
+ id: "https://example.com/status#123",
514
+ type: "StatusList2021Entry" as const,
515
+ statusPurpose: "revocation" as const,
516
+ statusListIndex: "123",
517
+ statusListCredential: "https://example.com/status",
518
+ },
519
+ };
520
+
521
+ mockDidResolver.resolve.mockResolvedValue({
522
+ id: "did:web:example.com:issuer",
523
+ verificationMethod: [
524
+ {
525
+ id: "did:web:example.com:issuer#key-1",
526
+ type: "Ed25519VerificationKey2020",
527
+ controller: "did:web:example.com:issuer",
528
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
529
+ },
530
+ ],
531
+ });
532
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
533
+ mockStatusListResolver.checkStatus.mockResolvedValue(true); // Revoked
534
+
535
+ const result = await verifier.verifyDelegationCredential(vcWithStatus);
536
+
537
+ expect(result.valid).toBe(false);
538
+ expect(result.reason).toBe(
539
+ "Credential revoked via StatusList2021 (revocation)"
540
+ );
541
+ expect(result.checks?.statusValid).toBe(false);
542
+ });
543
+
544
+ it("should succeed when credential is not revoked", async () => {
545
+ await setupDefaultContractsMocks();
546
+ const vcWithStatus = {
547
+ ...mockValidVC,
548
+ credentialStatus: {
549
+ id: "https://example.com/status#123",
550
+ type: "StatusList2021Entry" as const,
551
+ statusPurpose: "revocation" as const,
552
+ statusListIndex: "123",
553
+ statusListCredential: "https://example.com/status",
554
+ },
555
+ };
556
+
557
+ mockDidResolver.resolve.mockResolvedValue({
558
+ id: "did:web:example.com:issuer",
559
+ verificationMethod: [
560
+ {
561
+ id: "did:web:example.com:issuer#key-1",
562
+ type: "Ed25519VerificationKey2020",
563
+ controller: "did:web:example.com:issuer",
564
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
565
+ },
566
+ ],
567
+ });
568
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
569
+ mockStatusListResolver.checkStatus.mockResolvedValue(false); // Not revoked
570
+
571
+ const result = await verifier.verifyDelegationCredential(vcWithStatus);
572
+
573
+ expect(result.valid).toBe(true);
574
+ expect(result.checks?.statusValid).toBe(true);
575
+ });
576
+ });
577
+
578
+ describe("verifyDelegationCredential - Caching", () => {
579
+ it("should return cached result when available", async () => {
580
+ await setupDefaultContractsMocks();
581
+ // First call - should verify and cache
582
+ mockDidResolver.resolve.mockResolvedValue({
583
+ id: "did:web:example.com:issuer",
584
+ verificationMethod: [
585
+ {
586
+ id: "did:web:example.com:issuer#key-1",
587
+ type: "Ed25519VerificationKey2020",
588
+ controller: "did:web:example.com:issuer",
589
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
590
+ },
591
+ ],
592
+ });
593
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
594
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
595
+
596
+ const result1 = await verifier.verifyDelegationCredential(mockValidVC);
597
+ expect(result1.valid).toBe(true);
598
+ expect(result1.cached).toBeUndefined();
599
+
600
+ // Second call - should return cached result
601
+ mockSignatureVerifier.mockClear();
602
+ mockStatusListResolver.checkStatus.mockClear();
603
+
604
+ const result2 = await verifier.verifyDelegationCredential(mockValidVC);
605
+ expect(result2.valid).toBe(true);
606
+ expect(result2.cached).toBe(true);
607
+
608
+ // Verifiers should not be called again
609
+ expect(mockSignatureVerifier).not.toHaveBeenCalled();
610
+ expect(mockStatusListResolver.checkStatus).not.toHaveBeenCalled();
611
+ });
612
+
613
+ it("should skip cache when skipCache is true", async () => {
614
+ await setupDefaultContractsMocks();
615
+ // First call
616
+ mockDidResolver.resolve.mockResolvedValue({
617
+ id: "did:web:example.com:issuer",
618
+ verificationMethod: [
619
+ {
620
+ id: "did:web:example.com:issuer#key-1",
621
+ type: "Ed25519VerificationKey2020",
622
+ controller: "did:web:example.com:issuer",
623
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
624
+ },
625
+ ],
626
+ });
627
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
628
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
629
+
630
+ await verifier.verifyDelegationCredential(mockValidVC);
631
+
632
+ // Second call with skipCache
633
+ mockDidResolver.resolve.mockResolvedValue({
634
+ id: "did:web:example.com:issuer",
635
+ verificationMethod: [
636
+ {
637
+ id: "did:web:example.com:issuer#key-1",
638
+ type: "Ed25519VerificationKey2020",
639
+ controller: "did:web:example.com:issuer",
640
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
641
+ },
642
+ ],
643
+ });
644
+ mockSignatureVerifier.mockResolvedValue({ valid: false }); // Different result
645
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
646
+
647
+ const result = await verifier.verifyDelegationCredential(mockValidVC, {
648
+ skipCache: true,
649
+ });
650
+
651
+ expect(result.valid).toBe(false); // Should get new result, not cached
652
+ expect(result.cached).toBeUndefined();
653
+ });
654
+
655
+ it("should not cache failed verifications", async () => {
656
+ // First call - fails
657
+ const contractsMock = await setupDefaultContractsMocks();
658
+ contractsMock.isDelegationCredentialExpired.mockReturnValue(true);
659
+
660
+ const result1 = await verifier.verifyDelegationCredential(mockValidVC);
661
+ expect(result1.valid).toBe(false);
662
+
663
+ // Reset for second call
664
+ contractsMock.isDelegationCredentialExpired.mockReturnValue(false);
665
+ mockDidResolver.resolve.mockResolvedValue({
666
+ id: "did:web:example.com:issuer",
667
+ verificationMethod: [
668
+ {
669
+ id: "did:web:example.com:issuer#key-1",
670
+ type: "Ed25519VerificationKey2020",
671
+ controller: "did:web:example.com:issuer",
672
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
673
+ },
674
+ ],
675
+ });
676
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
677
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
678
+
679
+ // Second call - should verify again (not cached)
680
+ const result2 = await verifier.verifyDelegationCredential(mockValidVC);
681
+ expect(result2.valid).toBe(true);
682
+ expect(result2.cached).toBeUndefined(); // Should not be cached
683
+ });
684
+ });
685
+
686
+ describe("cache management", () => {
687
+ it("should clear all cache entries", async () => {
688
+ await setupDefaultContractsMocks();
689
+ // Add to cache
690
+ mockDidResolver.resolve.mockResolvedValue({
691
+ id: "did:web:example.com:issuer",
692
+ verificationMethod: [
693
+ {
694
+ id: "did:web:example.com:issuer#key-1",
695
+ type: "Ed25519VerificationKey2020",
696
+ controller: "did:web:example.com:issuer",
697
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
698
+ },
699
+ ],
700
+ });
701
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
702
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
703
+
704
+ await verifier.verifyDelegationCredential(mockValidVC);
705
+
706
+ // Clear cache
707
+ verifier.clearCache();
708
+
709
+ // Next call should verify again
710
+ mockDidResolver.resolve.mockResolvedValue({
711
+ id: "did:web:example.com:issuer",
712
+ verificationMethod: [
713
+ {
714
+ id: "did:web:example.com:issuer#key-1",
715
+ type: "Ed25519VerificationKey2020",
716
+ controller: "did:web:example.com:issuer",
717
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
718
+ },
719
+ ],
720
+ });
721
+ mockSignatureVerifier.mockResolvedValue({ valid: false }); // Different result
722
+
723
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
724
+ expect(result.valid).toBe(false);
725
+ expect(result.cached).toBeUndefined();
726
+ });
727
+
728
+ it("should clear specific cache entry", async () => {
729
+ await setupDefaultContractsMocks();
730
+ // Add to cache
731
+ mockDidResolver.resolve.mockResolvedValue({
732
+ id: "did:web:example.com:issuer",
733
+ verificationMethod: [
734
+ {
735
+ id: "did:web:example.com:issuer#key-1",
736
+ type: "Ed25519VerificationKey2020",
737
+ controller: "did:web:example.com:issuer",
738
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
739
+ },
740
+ ],
741
+ });
742
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
743
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
744
+
745
+ await verifier.verifyDelegationCredential(mockValidVC);
746
+
747
+ // Clear specific entry
748
+ verifier.clearCacheEntry("urn:delegation:123");
749
+
750
+ // Next call should verify again
751
+ mockDidResolver.resolve.mockResolvedValue({
752
+ id: "did:web:example.com:issuer",
753
+ verificationMethod: [
754
+ {
755
+ id: "did:web:example.com:issuer#key-1",
756
+ type: "Ed25519VerificationKey2020",
757
+ controller: "did:web:example.com:issuer",
758
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
759
+ },
760
+ ],
761
+ });
762
+ mockSignatureVerifier.mockResolvedValue({ valid: false });
763
+
764
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
765
+ expect(result.valid).toBe(false);
766
+ expect(result.cached).toBeUndefined();
767
+ });
768
+ });
769
+
770
+ describe("performance metrics", () => {
771
+ it("should include timing metrics in results", async () => {
772
+ await setupDefaultContractsMocks();
773
+ mockDidResolver.resolve.mockResolvedValue({
774
+ id: "did:web:example.com:issuer",
775
+ verificationMethod: [
776
+ {
777
+ id: "did:web:example.com:issuer#key-1",
778
+ type: "Ed25519VerificationKey2020",
779
+ controller: "did:web:example.com:issuer",
780
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
781
+ },
782
+ ],
783
+ });
784
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
785
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
786
+
787
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
788
+
789
+ expect(result.metrics).toBeDefined();
790
+ expect(result.metrics?.totalMs).toBeGreaterThanOrEqual(0);
791
+ expect(result.metrics?.basicCheckMs).toBeGreaterThanOrEqual(0);
792
+ expect(result.metrics?.signatureCheckMs).toBeGreaterThanOrEqual(0);
793
+ expect(result.metrics?.statusCheckMs).toBeGreaterThanOrEqual(0);
794
+ });
795
+
796
+ it("should report zero timing for skipped checks", async () => {
797
+ await setupDefaultContractsMocks();
798
+ const result = await verifier.verifyDelegationCredential(mockValidVC, {
799
+ skipSignature: true,
800
+ skipStatus: true,
801
+ });
802
+
803
+ expect(result.metrics?.signatureCheckMs).toBe(0);
804
+ expect(result.metrics?.statusCheckMs).toBe(0);
805
+ });
806
+ });
807
+
808
+ describe("error handling", () => {
809
+ it("should handle DID resolver errors gracefully", async () => {
810
+ await setupDefaultContractsMocks();
811
+ mockDidResolver.resolve.mockRejectedValue(new Error("Network timeout"));
812
+
813
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
814
+
815
+ expect(result.valid).toBe(false);
816
+ expect(result.reason).toContain(
817
+ "Signature verification error: Network timeout"
818
+ );
819
+ });
820
+
821
+ it("should handle status list resolver errors gracefully", async () => {
822
+ await setupDefaultContractsMocks();
823
+ const vcWithStatus = {
824
+ ...mockValidVC,
825
+ credentialStatus: {
826
+ id: "https://example.com/status#123",
827
+ type: "StatusList2021Entry" as const,
828
+ statusPurpose: "revocation" as const,
829
+ statusListIndex: "123",
830
+ statusListCredential: "https://example.com/status",
831
+ },
832
+ };
833
+
834
+ mockDidResolver.resolve.mockResolvedValue({
835
+ id: "did:web:example.com:issuer",
836
+ verificationMethod: [
837
+ {
838
+ id: "did:web:example.com:issuer#key-1",
839
+ type: "Ed25519VerificationKey2020",
840
+ controller: "did:web:example.com:issuer",
841
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
842
+ },
843
+ ],
844
+ });
845
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
846
+ mockStatusListResolver.checkStatus.mockRejectedValue(
847
+ new Error("Status list unavailable")
848
+ );
849
+
850
+ const result = await verifier.verifyDelegationCredential(vcWithStatus);
851
+
852
+ expect(result.valid).toBe(false);
853
+ expect(result.reason).toContain(
854
+ "Status check error: Status list unavailable"
855
+ );
856
+ });
857
+
858
+ it("should handle signature verifier errors gracefully", async () => {
859
+ await setupDefaultContractsMocks();
860
+ mockDidResolver.resolve.mockResolvedValue({
861
+ id: "did:web:example.com:issuer",
862
+ verificationMethod: [
863
+ {
864
+ id: "did:web:example.com:issuer#key-1",
865
+ type: "Ed25519VerificationKey2020",
866
+ controller: "did:web:example.com:issuer",
867
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
868
+ },
869
+ ],
870
+ });
871
+
872
+ mockSignatureVerifier.mockRejectedValue(
873
+ new Error("Signature algorithm unsupported")
874
+ );
875
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
876
+
877
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
878
+
879
+ expect(result.valid).toBe(false);
880
+ expect(result.reason).toContain(
881
+ "Signature verification error: Signature algorithm unsupported"
882
+ );
883
+ });
884
+ });
885
+
886
+ describe("findVerificationMethod", () => {
887
+ // This is a private method, but we can test it indirectly through the main verification flow
888
+ it("should find verification method by ID", async () => {
889
+ await setupDefaultContractsMocks();
890
+ const didDoc = {
891
+ id: "did:web:example.com:issuer",
892
+ verificationMethod: [
893
+ {
894
+ id: "did:web:example.com:issuer#key-1",
895
+ type: "Ed25519VerificationKey2020",
896
+ controller: "did:web:example.com:issuer",
897
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "mock-key" },
898
+ },
899
+ {
900
+ id: "did:web:example.com:issuer#key-2",
901
+ type: "Ed25519VerificationKey2020",
902
+ controller: "did:web:example.com:issuer",
903
+ publicKeyJwk: { kty: "OKP", crv: "Ed25519", x: "other-key" },
904
+ },
905
+ ],
906
+ };
907
+
908
+ mockDidResolver.resolve.mockResolvedValue(didDoc);
909
+ mockSignatureVerifier.mockResolvedValue({ valid: true });
910
+ mockStatusListResolver.checkStatus.mockResolvedValue(false);
911
+
912
+ const result = await verifier.verifyDelegationCredential(mockValidVC);
913
+
914
+ expect(result.valid).toBe(true);
915
+ expect(mockSignatureVerifier).toHaveBeenCalledWith(mockValidVC, {
916
+ kty: "OKP",
917
+ crv: "Ed25519",
918
+ x: "mock-key",
919
+ });
920
+ });
921
+ });
922
+ });