@mcp-i/core 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +390 -0
  3. package/dist/auth/handshake.d.ts +104 -0
  4. package/dist/auth/handshake.d.ts.map +1 -0
  5. package/dist/auth/handshake.js +230 -0
  6. package/dist/auth/handshake.js.map +1 -0
  7. package/dist/auth/index.d.ts +3 -0
  8. package/dist/auth/index.d.ts.map +1 -0
  9. package/dist/auth/index.js +2 -0
  10. package/dist/auth/index.js.map +1 -0
  11. package/dist/auth/types.d.ts +31 -0
  12. package/dist/auth/types.d.ts.map +1 -0
  13. package/dist/auth/types.js +7 -0
  14. package/dist/auth/types.js.map +1 -0
  15. package/dist/delegation/audience-validator.d.ts +9 -0
  16. package/dist/delegation/audience-validator.d.ts.map +1 -0
  17. package/dist/delegation/audience-validator.js +17 -0
  18. package/dist/delegation/audience-validator.js.map +1 -0
  19. package/dist/delegation/bitstring.d.ts +37 -0
  20. package/dist/delegation/bitstring.d.ts.map +1 -0
  21. package/dist/delegation/bitstring.js +117 -0
  22. package/dist/delegation/bitstring.js.map +1 -0
  23. package/dist/delegation/cascading-revocation.d.ts +45 -0
  24. package/dist/delegation/cascading-revocation.d.ts.map +1 -0
  25. package/dist/delegation/cascading-revocation.js +148 -0
  26. package/dist/delegation/cascading-revocation.js.map +1 -0
  27. package/dist/delegation/delegation-graph.d.ts +49 -0
  28. package/dist/delegation/delegation-graph.d.ts.map +1 -0
  29. package/dist/delegation/delegation-graph.js +99 -0
  30. package/dist/delegation/delegation-graph.js.map +1 -0
  31. package/dist/delegation/did-key-resolver.d.ts +64 -0
  32. package/dist/delegation/did-key-resolver.d.ts.map +1 -0
  33. package/dist/delegation/did-key-resolver.js +154 -0
  34. package/dist/delegation/did-key-resolver.js.map +1 -0
  35. package/dist/delegation/did-web-resolver.d.ts +83 -0
  36. package/dist/delegation/did-web-resolver.d.ts.map +1 -0
  37. package/dist/delegation/did-web-resolver.js +218 -0
  38. package/dist/delegation/did-web-resolver.js.map +1 -0
  39. package/dist/delegation/index.d.ts +21 -0
  40. package/dist/delegation/index.d.ts.map +1 -0
  41. package/dist/delegation/index.js +21 -0
  42. package/dist/delegation/index.js.map +1 -0
  43. package/dist/delegation/outbound-headers.d.ts +81 -0
  44. package/dist/delegation/outbound-headers.d.ts.map +1 -0
  45. package/dist/delegation/outbound-headers.js +139 -0
  46. package/dist/delegation/outbound-headers.js.map +1 -0
  47. package/dist/delegation/outbound-proof.d.ts +43 -0
  48. package/dist/delegation/outbound-proof.d.ts.map +1 -0
  49. package/dist/delegation/outbound-proof.js +52 -0
  50. package/dist/delegation/outbound-proof.js.map +1 -0
  51. package/dist/delegation/statuslist-manager.d.ts +44 -0
  52. package/dist/delegation/statuslist-manager.d.ts.map +1 -0
  53. package/dist/delegation/statuslist-manager.js +126 -0
  54. package/dist/delegation/statuslist-manager.js.map +1 -0
  55. package/dist/delegation/storage/memory-graph-storage.d.ts +70 -0
  56. package/dist/delegation/storage/memory-graph-storage.d.ts.map +1 -0
  57. package/dist/delegation/storage/memory-graph-storage.js +145 -0
  58. package/dist/delegation/storage/memory-graph-storage.js.map +1 -0
  59. package/dist/delegation/storage/memory-statuslist-storage.d.ts +19 -0
  60. package/dist/delegation/storage/memory-statuslist-storage.d.ts.map +1 -0
  61. package/dist/delegation/storage/memory-statuslist-storage.js +33 -0
  62. package/dist/delegation/storage/memory-statuslist-storage.js.map +1 -0
  63. package/dist/delegation/utils.d.ts +49 -0
  64. package/dist/delegation/utils.d.ts.map +1 -0
  65. package/dist/delegation/utils.js +131 -0
  66. package/dist/delegation/utils.js.map +1 -0
  67. package/dist/delegation/vc-issuer.d.ts +56 -0
  68. package/dist/delegation/vc-issuer.d.ts.map +1 -0
  69. package/dist/delegation/vc-issuer.js +80 -0
  70. package/dist/delegation/vc-issuer.js.map +1 -0
  71. package/dist/delegation/vc-verifier.d.ts +112 -0
  72. package/dist/delegation/vc-verifier.d.ts.map +1 -0
  73. package/dist/delegation/vc-verifier.js +280 -0
  74. package/dist/delegation/vc-verifier.js.map +1 -0
  75. package/dist/index.d.ts +45 -0
  76. package/dist/index.d.ts.map +1 -0
  77. package/dist/index.js +53 -0
  78. package/dist/index.js.map +1 -0
  79. package/dist/logging/index.d.ts +2 -0
  80. package/dist/logging/index.d.ts.map +1 -0
  81. package/dist/logging/index.js +2 -0
  82. package/dist/logging/index.js.map +1 -0
  83. package/dist/logging/logger.d.ts +23 -0
  84. package/dist/logging/logger.d.ts.map +1 -0
  85. package/dist/logging/logger.js +82 -0
  86. package/dist/logging/logger.js.map +1 -0
  87. package/dist/middleware/index.d.ts +7 -0
  88. package/dist/middleware/index.d.ts.map +1 -0
  89. package/dist/middleware/index.js +7 -0
  90. package/dist/middleware/index.js.map +1 -0
  91. package/dist/middleware/with-mcpi.d.ts +152 -0
  92. package/dist/middleware/with-mcpi.d.ts.map +1 -0
  93. package/dist/middleware/with-mcpi.js +472 -0
  94. package/dist/middleware/with-mcpi.js.map +1 -0
  95. package/dist/proof/errors.d.ts +49 -0
  96. package/dist/proof/errors.d.ts.map +1 -0
  97. package/dist/proof/errors.js +61 -0
  98. package/dist/proof/errors.js.map +1 -0
  99. package/dist/proof/generator.d.ts +65 -0
  100. package/dist/proof/generator.d.ts.map +1 -0
  101. package/dist/proof/generator.js +163 -0
  102. package/dist/proof/generator.js.map +1 -0
  103. package/dist/proof/index.d.ts +4 -0
  104. package/dist/proof/index.d.ts.map +1 -0
  105. package/dist/proof/index.js +4 -0
  106. package/dist/proof/index.js.map +1 -0
  107. package/dist/proof/verifier.d.ts +108 -0
  108. package/dist/proof/verifier.d.ts.map +1 -0
  109. package/dist/proof/verifier.js +299 -0
  110. package/dist/proof/verifier.js.map +1 -0
  111. package/dist/providers/base.d.ts +64 -0
  112. package/dist/providers/base.d.ts.map +1 -0
  113. package/dist/providers/base.js +19 -0
  114. package/dist/providers/base.js.map +1 -0
  115. package/dist/providers/index.d.ts +3 -0
  116. package/dist/providers/index.d.ts.map +1 -0
  117. package/dist/providers/index.js +3 -0
  118. package/dist/providers/index.js.map +1 -0
  119. package/dist/providers/memory.d.ts +33 -0
  120. package/dist/providers/memory.d.ts.map +1 -0
  121. package/dist/providers/memory.js +102 -0
  122. package/dist/providers/memory.js.map +1 -0
  123. package/dist/session/index.d.ts +2 -0
  124. package/dist/session/index.d.ts.map +1 -0
  125. package/dist/session/index.js +2 -0
  126. package/dist/session/index.js.map +1 -0
  127. package/dist/session/manager.d.ts +77 -0
  128. package/dist/session/manager.d.ts.map +1 -0
  129. package/dist/session/manager.js +251 -0
  130. package/dist/session/manager.js.map +1 -0
  131. package/dist/types/protocol.d.ts +320 -0
  132. package/dist/types/protocol.d.ts.map +1 -0
  133. package/dist/types/protocol.js +229 -0
  134. package/dist/types/protocol.js.map +1 -0
  135. package/dist/utils/base58.d.ts +31 -0
  136. package/dist/utils/base58.d.ts.map +1 -0
  137. package/dist/utils/base58.js +104 -0
  138. package/dist/utils/base58.js.map +1 -0
  139. package/dist/utils/base64.d.ts +13 -0
  140. package/dist/utils/base64.d.ts.map +1 -0
  141. package/dist/utils/base64.js +99 -0
  142. package/dist/utils/base64.js.map +1 -0
  143. package/dist/utils/crypto-service.d.ts +37 -0
  144. package/dist/utils/crypto-service.d.ts.map +1 -0
  145. package/dist/utils/crypto-service.js +153 -0
  146. package/dist/utils/crypto-service.js.map +1 -0
  147. package/dist/utils/did-helpers.d.ts +156 -0
  148. package/dist/utils/did-helpers.d.ts.map +1 -0
  149. package/dist/utils/did-helpers.js +193 -0
  150. package/dist/utils/did-helpers.js.map +1 -0
  151. package/dist/utils/ed25519-constants.d.ts +18 -0
  152. package/dist/utils/ed25519-constants.d.ts.map +1 -0
  153. package/dist/utils/ed25519-constants.js +21 -0
  154. package/dist/utils/ed25519-constants.js.map +1 -0
  155. package/dist/utils/index.d.ts +5 -0
  156. package/dist/utils/index.d.ts.map +1 -0
  157. package/dist/utils/index.js +5 -0
  158. package/dist/utils/index.js.map +1 -0
  159. package/package.json +105 -0
  160. package/src/__tests__/integration/full-flow.test.ts +362 -0
  161. package/src/__tests__/providers/base.test.ts +173 -0
  162. package/src/__tests__/providers/memory.test.ts +332 -0
  163. package/src/__tests__/utils/mock-providers.ts +319 -0
  164. package/src/__tests__/utils/node-crypto-provider.ts +93 -0
  165. package/src/auth/handshake.ts +411 -0
  166. package/src/auth/index.ts +11 -0
  167. package/src/auth/types.ts +40 -0
  168. package/src/delegation/__tests__/audience-validator.test.ts +110 -0
  169. package/src/delegation/__tests__/bitstring.test.ts +346 -0
  170. package/src/delegation/__tests__/cascading-revocation.test.ts +624 -0
  171. package/src/delegation/__tests__/delegation-graph.test.ts +623 -0
  172. package/src/delegation/__tests__/did-key-resolver.test.ts +265 -0
  173. package/src/delegation/__tests__/did-web-resolver.test.ts +467 -0
  174. package/src/delegation/__tests__/outbound-headers.test.ts +230 -0
  175. package/src/delegation/__tests__/outbound-proof.test.ts +179 -0
  176. package/src/delegation/__tests__/statuslist-manager.test.ts +515 -0
  177. package/src/delegation/__tests__/utils.test.ts +185 -0
  178. package/src/delegation/__tests__/vc-issuer.test.ts +487 -0
  179. package/src/delegation/__tests__/vc-verifier.test.ts +1029 -0
  180. package/src/delegation/audience-validator.ts +24 -0
  181. package/src/delegation/bitstring.ts +160 -0
  182. package/src/delegation/cascading-revocation.ts +224 -0
  183. package/src/delegation/delegation-graph.ts +143 -0
  184. package/src/delegation/did-key-resolver.ts +181 -0
  185. package/src/delegation/did-web-resolver.ts +270 -0
  186. package/src/delegation/index.ts +33 -0
  187. package/src/delegation/outbound-headers.ts +193 -0
  188. package/src/delegation/outbound-proof.ts +90 -0
  189. package/src/delegation/statuslist-manager.ts +219 -0
  190. package/src/delegation/storage/__tests__/memory-graph-storage.test.ts +366 -0
  191. package/src/delegation/storage/__tests__/memory-statuslist-storage.test.ts +228 -0
  192. package/src/delegation/storage/memory-graph-storage.ts +178 -0
  193. package/src/delegation/storage/memory-statuslist-storage.ts +42 -0
  194. package/src/delegation/utils.ts +189 -0
  195. package/src/delegation/vc-issuer.ts +137 -0
  196. package/src/delegation/vc-verifier.ts +440 -0
  197. package/src/index.ts +264 -0
  198. package/src/logging/__tests__/logger.test.ts +366 -0
  199. package/src/logging/index.ts +6 -0
  200. package/src/logging/logger.ts +91 -0
  201. package/src/middleware/__tests__/with-mcpi.test.ts +504 -0
  202. package/src/middleware/index.ts +16 -0
  203. package/src/middleware/with-mcpi.ts +766 -0
  204. package/src/proof/__tests__/proof-generator.test.ts +483 -0
  205. package/src/proof/__tests__/verifier.test.ts +488 -0
  206. package/src/proof/errors.ts +75 -0
  207. package/src/proof/generator.ts +255 -0
  208. package/src/proof/index.ts +22 -0
  209. package/src/proof/verifier.ts +449 -0
  210. package/src/providers/base.ts +68 -0
  211. package/src/providers/index.ts +15 -0
  212. package/src/providers/memory.ts +130 -0
  213. package/src/session/__tests__/session-manager.test.ts +342 -0
  214. package/src/session/index.ts +7 -0
  215. package/src/session/manager.ts +332 -0
  216. package/src/types/protocol.ts +596 -0
  217. package/src/utils/__tests__/base58.test.ts +281 -0
  218. package/src/utils/__tests__/base64.test.ts +239 -0
  219. package/src/utils/__tests__/crypto-service.test.ts +530 -0
  220. package/src/utils/__tests__/did-helpers.test.ts +156 -0
  221. package/src/utils/base58.ts +115 -0
  222. package/src/utils/base64.ts +116 -0
  223. package/src/utils/crypto-service.ts +209 -0
  224. package/src/utils/did-helpers.ts +210 -0
  225. package/src/utils/ed25519-constants.ts +23 -0
  226. package/src/utils/index.ts +9 -0
@@ -0,0 +1,530 @@
1
+ /**
2
+ * Tests for CryptoService
3
+ *
4
+ * Comprehensive test coverage for cryptographic operations service.
5
+ * Tests verifyEd25519() and verifyJWS() with various scenarios.
6
+ *
7
+ * Test Coverage Requirements: 100% - All security-critical code paths
8
+ */
9
+
10
+ import { describe, it, expect, beforeEach, vi } from 'vitest';
11
+ import { CryptoService } from '../crypto-service.js';
12
+ import type { CryptoProvider } from '../../providers/base.js';
13
+ import type { Ed25519JWK } from '../crypto-service.js';
14
+
15
+ describe('CryptoService', () => {
16
+ let cryptoService: CryptoService;
17
+ let mockCryptoProvider: CryptoProvider;
18
+
19
+ beforeEach(() => {
20
+ mockCryptoProvider = {
21
+ sign: vi.fn(),
22
+ verify: vi.fn(),
23
+ generateKeyPair: vi.fn(),
24
+ hash: vi.fn(),
25
+ randomBytes: vi.fn(),
26
+ };
27
+ cryptoService = new CryptoService(mockCryptoProvider);
28
+ });
29
+
30
+ describe('verifyEd25519', () => {
31
+ it('should return true for valid signature', async () => {
32
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
33
+
34
+ const result = await cryptoService.verifyEd25519(
35
+ new Uint8Array([1, 2, 3]),
36
+ new Uint8Array([4, 5, 6]),
37
+ 'base64PublicKey'
38
+ );
39
+
40
+ expect(result).toBe(true);
41
+ expect(mockCryptoProvider.verify).toHaveBeenCalledWith(
42
+ new Uint8Array([1, 2, 3]),
43
+ new Uint8Array([4, 5, 6]),
44
+ 'base64PublicKey'
45
+ );
46
+ });
47
+
48
+ it('should return false for invalid signature', async () => {
49
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
50
+
51
+ const result = await cryptoService.verifyEd25519(
52
+ new Uint8Array([1, 2, 3]),
53
+ new Uint8Array([4, 5, 6]),
54
+ 'base64PublicKey'
55
+ );
56
+
57
+ expect(result).toBe(false);
58
+ });
59
+
60
+ it('should return false on verification error', async () => {
61
+ mockCryptoProvider.verify = vi.fn().mockRejectedValue(
62
+ new Error('Verification failed')
63
+ );
64
+
65
+ const result = await cryptoService.verifyEd25519(
66
+ new Uint8Array([1, 2, 3]),
67
+ new Uint8Array([4, 5, 6]),
68
+ 'base64PublicKey'
69
+ );
70
+
71
+ expect(result).toBe(false);
72
+ });
73
+
74
+ it('should handle empty data', async () => {
75
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
76
+
77
+ const result = await cryptoService.verifyEd25519(
78
+ new Uint8Array(0),
79
+ new Uint8Array([4, 5, 6]),
80
+ 'base64PublicKey'
81
+ );
82
+
83
+ expect(result).toBe(true);
84
+ });
85
+ });
86
+
87
+ describe('parseJWS', () => {
88
+ it('should parse valid full compact JWS', () => {
89
+ const header = { alg: 'EdDSA', typ: 'JWT' };
90
+ const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
91
+ // Properly encode as base64url
92
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
93
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
94
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
95
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
96
+ const signatureB64 = Buffer.from('signature').toString('base64')
97
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
98
+ const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
99
+
100
+ const parsed = cryptoService.parseJWS(jws);
101
+
102
+ expect(parsed.header).toEqual(header);
103
+ expect(parsed.payload).toEqual(payload);
104
+ expect(parsed.signingInput).toBe(`${headerB64}.${payloadB64}`);
105
+ expect(parsed.signatureBytes).toBeInstanceOf(Uint8Array);
106
+ });
107
+
108
+ it('should throw error for invalid JWS format', () => {
109
+ const invalidJws = 'not.a.jws';
110
+
111
+ // This will fail during JSON parsing, not format check
112
+ expect(() => cryptoService.parseJWS(invalidJws)).toThrow();
113
+ });
114
+
115
+ it('should throw error for JWS with wrong number of parts', () => {
116
+ const invalidJws = 'header.payload';
117
+
118
+ expect(() => cryptoService.parseJWS(invalidJws)).toThrow('Invalid JWS format');
119
+ });
120
+
121
+ it('should handle empty payload', () => {
122
+ const header = { alg: 'EdDSA' };
123
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
124
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
125
+ const signatureB64 = Buffer.from('signature').toString('base64')
126
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
127
+ const jws = `${headerB64}..${signatureB64}`;
128
+
129
+ const parsed = cryptoService.parseJWS(jws);
130
+
131
+ expect(parsed.header).toEqual(header);
132
+ expect(parsed.payload).toBeUndefined();
133
+ });
134
+ });
135
+
136
+ describe('verifyJWS', () => {
137
+ const validJwk: Ed25519JWK = {
138
+ kty: 'OKP',
139
+ crv: 'Ed25519',
140
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ', // Example base64url public key (32 bytes when decoded)
141
+ };
142
+
143
+ // Create a valid JWS for testing
144
+ const createValidJWS = (): string => {
145
+ const header = { alg: 'EdDSA', typ: 'JWT' };
146
+ const payload = { sub: 'did:key:z123', iss: 'did:key:z123' };
147
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
148
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
149
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
150
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
151
+ const signatureB64 = Buffer.from('signature').toString('base64')
152
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
153
+ return `${headerB64}.${payloadB64}.${signatureB64}`;
154
+ };
155
+
156
+ it('should verify valid full compact JWS', async () => {
157
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
158
+ const validJws = createValidJWS();
159
+
160
+ const result = await cryptoService.verifyJWS(validJws, validJwk);
161
+
162
+ expect(result).toBe(true);
163
+ expect(mockCryptoProvider.verify).toHaveBeenCalled();
164
+ });
165
+
166
+ it('should reject invalid JWK format', async () => {
167
+ const invalidJwk = { kty: 'RSA' } as any;
168
+ const validJws = createValidJWS();
169
+
170
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
171
+
172
+ expect(result).toBe(false);
173
+ expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
174
+ });
175
+
176
+ it('should reject JWK with wrong kty', async () => {
177
+ const invalidJwk = {
178
+ kty: 'RSA',
179
+ crv: 'Ed25519',
180
+ x: 'test',
181
+ } as any;
182
+ const validJws = createValidJWS();
183
+
184
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
185
+
186
+ expect(result).toBe(false);
187
+ });
188
+
189
+ it('should reject JWK with wrong crv', async () => {
190
+ const invalidJwk = {
191
+ kty: 'OKP',
192
+ crv: 'P-256',
193
+ x: 'test',
194
+ } as any;
195
+ const validJws = createValidJWS();
196
+
197
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
198
+
199
+ expect(result).toBe(false);
200
+ });
201
+
202
+ it('should reject JWK with missing x field', async () => {
203
+ const invalidJwk = {
204
+ kty: 'OKP',
205
+ crv: 'Ed25519',
206
+ } as any;
207
+ const validJws = createValidJWS();
208
+
209
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
210
+
211
+ expect(result).toBe(false);
212
+ });
213
+
214
+ it('should reject JWK with empty x field', async () => {
215
+ const invalidJwk = {
216
+ kty: 'OKP',
217
+ crv: 'Ed25519',
218
+ x: '',
219
+ };
220
+ const validJws = createValidJWS();
221
+
222
+ const result = await cryptoService.verifyJWS(validJws, invalidJwk);
223
+
224
+ expect(result).toBe(false);
225
+ });
226
+
227
+ it('should reject malformed JWS', async () => {
228
+ const malformedJws = 'not.a.jws';
229
+
230
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
231
+
232
+ expect(result).toBe(false);
233
+ });
234
+
235
+ it('should reject non-EdDSA algorithms', async () => {
236
+ const header = { alg: 'RS256', typ: 'JWT' };
237
+ const payload = { sub: 'did:key:z123' };
238
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
239
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
240
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
241
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
242
+ const signatureB64 = Buffer.from('signature').toString('base64')
243
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
244
+ const rsaJws = `${headerB64}.${payloadB64}.${signatureB64}`;
245
+
246
+ const result = await cryptoService.verifyJWS(rsaJws, validJwk);
247
+
248
+ expect(result).toBe(false);
249
+ expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
250
+ });
251
+
252
+ it('should reject HS256 algorithm', async () => {
253
+ const header = { alg: 'HS256', typ: 'JWT' };
254
+ const payload = { sub: 'did:key:z123' };
255
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
256
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
257
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
258
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
259
+ const signatureB64 = Buffer.from('signature').toString('base64')
260
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
261
+ const hs256Jws = `${headerB64}.${payloadB64}.${signatureB64}`;
262
+
263
+ const result = await cryptoService.verifyJWS(hs256Jws, validJwk);
264
+
265
+ expect(result).toBe(false);
266
+ });
267
+
268
+ it('should handle empty JWS components', async () => {
269
+ const emptyJws = '..';
270
+
271
+ const result = await cryptoService.verifyJWS(emptyJws, validJwk);
272
+
273
+ expect(result).toBe(false);
274
+ });
275
+
276
+ it('should handle malformed JWS - single part', async () => {
277
+ const malformedJws = 'singlepart';
278
+
279
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
280
+
281
+ expect(result).toBe(false);
282
+ });
283
+
284
+ it('should handle malformed JWS - two parts', async () => {
285
+ const malformedJws = 'header.payload';
286
+
287
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
288
+
289
+ expect(result).toBe(false);
290
+ });
291
+
292
+ it('should handle malformed JWS - four parts', async () => {
293
+ const header = { alg: 'EdDSA' };
294
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
295
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
296
+ const payloadB64 = Buffer.from('payload').toString('base64')
297
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
298
+ const signatureB64 = Buffer.from('signature').toString('base64')
299
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
300
+ const malformedJws = `${headerB64}.${payloadB64}.${signatureB64}.extra`;
301
+
302
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
303
+
304
+ expect(result).toBe(false);
305
+ });
306
+
307
+ it('should handle malformed JWS - invalid JSON header', async () => {
308
+ const invalidHeaderB64 = Buffer.from('notjson').toString('base64')
309
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
310
+ const payloadB64 = Buffer.from('payload').toString('base64')
311
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
312
+ const signatureB64 = Buffer.from('signature').toString('base64')
313
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
314
+ const malformedJws = `${invalidHeaderB64}.${payloadB64}.${signatureB64}`;
315
+
316
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
317
+
318
+ expect(result).toBe(false);
319
+ });
320
+
321
+ it('should handle malformed JWS - invalid base64', async () => {
322
+ // Don't mock verify - the function should catch the error and return false
323
+ // before it gets to verification
324
+ const header = { alg: 'EdDSA' };
325
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
326
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
327
+ const invalidBase64 = 'notbase64!!!';
328
+ const signatureB64 = Buffer.from('signature').toString('base64')
329
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
330
+ const malformedJws = `${headerB64}.${invalidBase64}.${signatureB64}`;
331
+
332
+ // parseJWS will throw when trying to decode invalid base64 payload
333
+ // This should be caught and return false
334
+ const result = await cryptoService.verifyJWS(malformedJws, validJwk);
335
+
336
+ expect(result).toBe(false);
337
+ // verify should not be called because parseJWS should throw
338
+ expect(mockCryptoProvider.verify).not.toHaveBeenCalled();
339
+ });
340
+
341
+ it('should validate expectedKid option', async () => {
342
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
343
+ const validJws = createValidJWS();
344
+ const jwkWithKid: Ed25519JWK = {
345
+ kty: 'OKP',
346
+ crv: 'Ed25519',
347
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
348
+ kid: 'key-1',
349
+ };
350
+
351
+ // Should succeed with matching kid
352
+ const result1 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
353
+ expectedKid: 'key-1',
354
+ });
355
+ expect(result1).toBe(true);
356
+
357
+ // Should fail with mismatched kid
358
+ const result2 = await cryptoService.verifyJWS(validJws, jwkWithKid, {
359
+ expectedKid: 'key-2',
360
+ });
361
+ expect(result2).toBe(false);
362
+ });
363
+
364
+ it('should validate alg option', async () => {
365
+ const header = { alg: 'EdDSA', typ: 'JWT' };
366
+ const payload = { sub: 'did:key:z123' };
367
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
368
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
369
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
370
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
371
+ const signatureB64 = Buffer.from('signature').toString('base64')
372
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
373
+ const validJws = `${headerB64}.${payloadB64}.${signatureB64}`;
374
+
375
+ // Should succeed with matching alg
376
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
377
+ const result1 = await cryptoService.verifyJWS(validJws, validJwk, {
378
+ alg: 'EdDSA',
379
+ });
380
+ expect(result1).toBe(true);
381
+
382
+ // Should fail with mismatched alg (even if header says EdDSA)
383
+ const result2 = await cryptoService.verifyJWS(validJws, validJwk, {
384
+ alg: 'RS256' as any,
385
+ });
386
+ expect(result2).toBe(false);
387
+ });
388
+
389
+ it('should validate Ed25519 key length', async () => {
390
+ const invalidLengthJwk = {
391
+ kty: 'OKP' as const,
392
+ crv: 'Ed25519' as const,
393
+ x: 'c2hvcnQ', // "short" in base64 - too short for Ed25519 (only 5 bytes)
394
+ };
395
+
396
+ const validJws = createValidJWS();
397
+
398
+ const result = await cryptoService.verifyJWS(validJws, invalidLengthJwk);
399
+
400
+ expect(result).toBe(false);
401
+ });
402
+
403
+ it('should handle detached payload', async () => {
404
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
405
+ const header = { alg: 'EdDSA' };
406
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
407
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
408
+ const signatureB64 = Buffer.from('signature').toString('base64')
409
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
410
+ const detachedJws = `${headerB64}..${signatureB64}`;
411
+ const detachedPayload = JSON.stringify({ sub: 'did:key:z123' });
412
+
413
+ const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
414
+ detachedPayload,
415
+ });
416
+
417
+ expect(result).toBe(true);
418
+ expect(mockCryptoProvider.verify).toHaveBeenCalled();
419
+ });
420
+
421
+ it('should handle detached payload as Uint8Array', async () => {
422
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
423
+ const header = { alg: 'EdDSA' };
424
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
425
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
426
+ const signatureB64 = Buffer.from('signature').toString('base64')
427
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
428
+ const detachedJws = `${headerB64}..${signatureB64}`;
429
+ const detachedPayloadBytes = new TextEncoder().encode(JSON.stringify({ sub: 'did:key:z123' }));
430
+
431
+ const result = await cryptoService.verifyJWS(detachedJws, validJwk, {
432
+ detachedPayload: detachedPayloadBytes,
433
+ });
434
+
435
+ expect(result).toBe(true);
436
+ expect(mockCryptoProvider.verify).toHaveBeenCalled();
437
+ });
438
+
439
+ it('should handle signature verification failure', async () => {
440
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(false);
441
+ const validJws = createValidJWS();
442
+
443
+ const result = await cryptoService.verifyJWS(validJws, validJwk);
444
+
445
+ expect(result).toBe(false);
446
+ });
447
+
448
+ it('should handle signature verification error', async () => {
449
+ mockCryptoProvider.verify = vi.fn().mockRejectedValue(new Error('Crypto error'));
450
+ const validJws = createValidJWS();
451
+
452
+ const result = await cryptoService.verifyJWS(validJws, validJwk);
453
+
454
+ expect(result).toBe(false);
455
+ });
456
+
457
+ it('should accept JWK with optional kid field', async () => {
458
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
459
+ const jwkWithKid: Ed25519JWK = {
460
+ kty: 'OKP',
461
+ crv: 'Ed25519',
462
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
463
+ kid: 'key-1',
464
+ };
465
+ const validJws = createValidJWS();
466
+
467
+ const result = await cryptoService.verifyJWS(validJws, jwkWithKid);
468
+
469
+ expect(result).toBe(true);
470
+ });
471
+
472
+ it('should accept JWK with optional use field', async () => {
473
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
474
+ const jwkWithUse: Ed25519JWK = {
475
+ kty: 'OKP',
476
+ crv: 'Ed25519',
477
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
478
+ use: 'sig',
479
+ };
480
+ const validJws = createValidJWS();
481
+
482
+ const result = await cryptoService.verifyJWS(validJws, jwkWithUse);
483
+
484
+ expect(result).toBe(true);
485
+ });
486
+ });
487
+
488
+ describe('base64url edge cases', () => {
489
+ const validJwk: Ed25519JWK = {
490
+ kty: 'OKP',
491
+ crv: 'Ed25519',
492
+ x: 'VCpo2LMLhn6iWku8MKvSLg2ZAoC-nlOyPVQaO3FxVeQ',
493
+ };
494
+
495
+ it('should handle base64url with no padding', async () => {
496
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
497
+ const header = { alg: 'EdDSA' };
498
+ const payload = { test: 'Hello' };
499
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
500
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
501
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
502
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
503
+ const signatureB64 = Buffer.from('signature').toString('base64')
504
+ .replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
505
+ const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
506
+
507
+ const result = await cryptoService.verifyJWS(jws, validJwk);
508
+
509
+ // Should not throw, even if padding is missing
510
+ expect(typeof result).toBe('boolean');
511
+ });
512
+
513
+ it('should handle base64url with padding', async () => {
514
+ mockCryptoProvider.verify = vi.fn().mockResolvedValue(true);
515
+ const header = { alg: 'EdDSA' };
516
+ const payload = { test: 'Hello World!' };
517
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64')
518
+ .replace(/\+/g, '-').replace(/\//g, '_');
519
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64')
520
+ .replace(/\+/g, '-').replace(/\//g, '_');
521
+ const signatureB64 = Buffer.from('signature').toString('base64')
522
+ .replace(/\+/g, '-').replace(/\//g, '_');
523
+ const jws = `${headerB64}.${payloadB64}.${signatureB64}`;
524
+
525
+ const result = await cryptoService.verifyJWS(jws, validJwk);
526
+
527
+ expect(typeof result).toBe('boolean');
528
+ });
529
+ });
530
+ });
@@ -0,0 +1,156 @@
1
+ /**
2
+ * Tests for DID Helper Utilities
3
+ *
4
+ * @package @mcp-i/core/utils/__tests__
5
+ */
6
+
7
+ import { describe, it, expect } from "vitest";
8
+ import {
9
+ isValidDid,
10
+ getDidMethod,
11
+ normalizeDid,
12
+ compareDids,
13
+ getServerDid,
14
+ generateDidKeyFromBytes,
15
+ generateDidKeyFromBase64,
16
+ } from "../did-helpers";
17
+
18
+ describe("DID Helpers", () => {
19
+ describe("isValidDid", () => {
20
+ it("should return true for valid DIDs", () => {
21
+ expect(isValidDid("did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK")).toBe(true);
22
+ expect(isValidDid("did:web:example.com")).toBe(true);
23
+ expect(isValidDid("did:web:example.com:path")).toBe(true);
24
+ });
25
+
26
+ it("should return false for invalid DIDs", () => {
27
+ expect(isValidDid("not-a-did")).toBe(false);
28
+ expect(isValidDid("")).toBe(false);
29
+ expect(isValidDid("did")).toBe(false);
30
+ expect(isValidDid("key:z6Mk...")).toBe(false);
31
+ });
32
+ });
33
+
34
+ describe("getDidMethod", () => {
35
+ it("should extract DID method correctly", () => {
36
+ expect(getDidMethod("did:key:z6Mk...")).toBe("key");
37
+ expect(getDidMethod("did:web:example.com")).toBe("web");
38
+ expect(getDidMethod("did:ion:...")).toBe("ion");
39
+ });
40
+
41
+ it("should return null for invalid DIDs", () => {
42
+ expect(getDidMethod("not-a-did")).toBeNull();
43
+ expect(getDidMethod("")).toBeNull();
44
+ expect(getDidMethod("did")).toBeNull();
45
+ });
46
+ });
47
+
48
+ describe("normalizeDid", () => {
49
+ it("should trim whitespace", () => {
50
+ expect(normalizeDid(" did:key:z6Mk... ")).toBe("did:key:z6Mk...");
51
+ expect(normalizeDid("did:key:z6Mk...")).toBe("did:key:z6Mk...");
52
+ });
53
+ });
54
+
55
+ describe("compareDids", () => {
56
+ it("should compare DIDs correctly", () => {
57
+ expect(compareDids("did:key:z6Mk...", "did:key:z6Mk...")).toBe(true);
58
+ expect(compareDids("did:key:z6Mk...", "did:web:example.com")).toBe(false);
59
+ });
60
+
61
+ it("should normalize before comparing", () => {
62
+ expect(compareDids(" did:key:z6Mk... ", "did:key:z6Mk...")).toBe(true);
63
+ });
64
+ });
65
+
66
+ describe("getServerDid", () => {
67
+ it("should return serverDid when present", () => {
68
+ const config = {
69
+ identity: {
70
+ serverDid: "did:web:server.com",
71
+ },
72
+ };
73
+ expect(getServerDid(config)).toBe("did:web:server.com");
74
+ });
75
+
76
+ it("should return agentDid when serverDid not present (backward compatibility)", () => {
77
+ const config = {
78
+ identity: {
79
+ agentDid: "did:web:old-server.com",
80
+ },
81
+ };
82
+ expect(getServerDid(config)).toBe("did:web:old-server.com");
83
+ });
84
+
85
+ it("should prefer serverDid over agentDid", () => {
86
+ const config = {
87
+ identity: {
88
+ serverDid: "did:web:new-server.com",
89
+ agentDid: "did:web:old-server.com",
90
+ },
91
+ };
92
+ expect(getServerDid(config)).toBe("did:web:new-server.com");
93
+ });
94
+
95
+ it("should throw error when neither serverDid nor agentDid present", () => {
96
+ const config = {
97
+ identity: {},
98
+ };
99
+ expect(() => getServerDid(config)).toThrow("Server DID not configured");
100
+ });
101
+ });
102
+
103
+ describe("generateDidKeyFromBytes", () => {
104
+ it("should generate valid did:key from 32-byte Ed25519 public key", () => {
105
+ // Use a known test key (32 bytes)
106
+ const publicKeyBytes = new Uint8Array(32).fill(0xab);
107
+ const did = generateDidKeyFromBytes(publicKeyBytes);
108
+
109
+ expect(did).toMatch(/^did:key:z6Mk/);
110
+ expect(isValidDid(did)).toBe(true);
111
+ expect(getDidMethod(did)).toBe("key");
112
+ });
113
+
114
+ it("should generate consistent did:key for same input", () => {
115
+ const publicKeyBytes = new Uint8Array(32).fill(0x42);
116
+ const did1 = generateDidKeyFromBytes(publicKeyBytes);
117
+ const did2 = generateDidKeyFromBytes(publicKeyBytes);
118
+
119
+ expect(did1).toBe(did2);
120
+ });
121
+
122
+ it("should generate different did:key for different inputs", () => {
123
+ const key1 = new Uint8Array(32).fill(0x11);
124
+ const key2 = new Uint8Array(32).fill(0x22);
125
+
126
+ const did1 = generateDidKeyFromBytes(key1);
127
+ const did2 = generateDidKeyFromBytes(key2);
128
+
129
+ expect(did1).not.toBe(did2);
130
+ });
131
+ });
132
+
133
+ describe("generateDidKeyFromBase64", () => {
134
+ it("should generate valid did:key from base64-encoded public key", () => {
135
+ // Base64 encode a 32-byte key
136
+ const publicKeyBytes = new Uint8Array(32).fill(0xcd);
137
+ const publicKeyBase64 = btoa(String.fromCharCode(...publicKeyBytes));
138
+
139
+ const did = generateDidKeyFromBase64(publicKeyBase64);
140
+
141
+ expect(did).toMatch(/^did:key:z6Mk/);
142
+ expect(isValidDid(did)).toBe(true);
143
+ });
144
+
145
+ it("should produce same result as generateDidKeyFromBytes", () => {
146
+ const publicKeyBytes = new Uint8Array(32).fill(0xef);
147
+ const publicKeyBase64 = btoa(String.fromCharCode(...publicKeyBytes));
148
+
149
+ const didFromBytes = generateDidKeyFromBytes(publicKeyBytes);
150
+ const didFromBase64 = generateDidKeyFromBase64(publicKeyBase64);
151
+
152
+ expect(didFromBytes).toBe(didFromBase64);
153
+ });
154
+ });
155
+ });
156
+