@originals/sdk 1.1.0 → 1.4.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (247) hide show
  1. package/package.json +3 -2
  2. package/src/did/DIDManager.ts +1 -1
  3. package/src/did/WebVHManager.ts +11 -2
  4. package/src/examples/create-module-original.ts +435 -0
  5. package/src/examples/full-lifecycle-flow.ts +514 -0
  6. package/src/examples/run.ts +59 -4
  7. package/src/index.ts +69 -3
  8. package/src/kinds/KindRegistry.ts +290 -0
  9. package/src/kinds/index.ts +74 -0
  10. package/src/kinds/types.ts +470 -0
  11. package/src/kinds/validators/AgentValidator.ts +257 -0
  12. package/src/kinds/validators/AppValidator.ts +211 -0
  13. package/src/kinds/validators/DatasetValidator.ts +242 -0
  14. package/src/kinds/validators/DocumentValidator.ts +311 -0
  15. package/src/kinds/validators/MediaValidator.ts +269 -0
  16. package/src/kinds/validators/ModuleValidator.ts +225 -0
  17. package/src/kinds/validators/base.ts +276 -0
  18. package/src/kinds/validators/index.ts +12 -0
  19. package/src/lifecycle/LifecycleManager.ts +909 -1
  20. package/src/resources/ResourceManager.ts +655 -0
  21. package/src/resources/index.ts +21 -0
  22. package/src/resources/types.ts +202 -0
  23. package/src/types/common.ts +1 -1
  24. package/src/vc/CredentialManager.ts +647 -2
  25. package/tests/integration/createTypedOriginal.test.ts +379 -0
  26. package/tests/performance/BatchOperations.perf.test.ts +2 -2
  27. package/tests/unit/kinds/KindRegistry.test.ts +329 -0
  28. package/tests/unit/kinds/types.test.ts +409 -0
  29. package/tests/unit/kinds/validators.test.ts +651 -0
  30. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +441 -0
  31. package/tests/unit/resources/ResourceManager.test.ts +740 -0
  32. package/tests/unit/vc/CredentialManager.helpers.test.ts +527 -0
  33. package/tsconfig.json +0 -1
  34. package/.turbo/turbo-build.log +0 -1
  35. package/.turbo/turbo-test.log +0 -68353
  36. package/dist/adapters/FeeOracleMock.d.ts +0 -6
  37. package/dist/adapters/FeeOracleMock.js +0 -8
  38. package/dist/adapters/index.d.ts +0 -4
  39. package/dist/adapters/index.js +0 -4
  40. package/dist/adapters/providers/OrdHttpProvider.d.ts +0 -56
  41. package/dist/adapters/providers/OrdHttpProvider.js +0 -110
  42. package/dist/adapters/providers/OrdMockProvider.d.ts +0 -70
  43. package/dist/adapters/providers/OrdMockProvider.js +0 -75
  44. package/dist/adapters/types.d.ts +0 -71
  45. package/dist/adapters/types.js +0 -1
  46. package/dist/bitcoin/BitcoinManager.d.ts +0 -15
  47. package/dist/bitcoin/BitcoinManager.js +0 -262
  48. package/dist/bitcoin/BroadcastClient.d.ts +0 -30
  49. package/dist/bitcoin/BroadcastClient.js +0 -35
  50. package/dist/bitcoin/OrdinalsClient.d.ts +0 -21
  51. package/dist/bitcoin/OrdinalsClient.js +0 -105
  52. package/dist/bitcoin/PSBTBuilder.d.ts +0 -24
  53. package/dist/bitcoin/PSBTBuilder.js +0 -80
  54. package/dist/bitcoin/fee-calculation.d.ts +0 -14
  55. package/dist/bitcoin/fee-calculation.js +0 -31
  56. package/dist/bitcoin/providers/OrdNodeProvider.d.ts +0 -38
  57. package/dist/bitcoin/providers/OrdNodeProvider.js +0 -67
  58. package/dist/bitcoin/providers/OrdinalsProvider.d.ts +0 -33
  59. package/dist/bitcoin/providers/OrdinalsProvider.js +0 -50
  60. package/dist/bitcoin/providers/types.d.ts +0 -63
  61. package/dist/bitcoin/providers/types.js +0 -1
  62. package/dist/bitcoin/transactions/commit.d.ts +0 -89
  63. package/dist/bitcoin/transactions/commit.js +0 -311
  64. package/dist/bitcoin/transactions/index.d.ts +0 -7
  65. package/dist/bitcoin/transactions/index.js +0 -8
  66. package/dist/bitcoin/transfer.d.ts +0 -9
  67. package/dist/bitcoin/transfer.js +0 -26
  68. package/dist/bitcoin/utxo-selection.d.ts +0 -78
  69. package/dist/bitcoin/utxo-selection.js +0 -237
  70. package/dist/bitcoin/utxo.d.ts +0 -26
  71. package/dist/bitcoin/utxo.js +0 -78
  72. package/dist/contexts/credentials-v1.json +0 -195
  73. package/dist/contexts/credentials-v2-examples.json +0 -5
  74. package/dist/contexts/credentials-v2.json +0 -301
  75. package/dist/contexts/credentials.json +0 -195
  76. package/dist/contexts/data-integrity-v2.json +0 -81
  77. package/dist/contexts/dids.json +0 -57
  78. package/dist/contexts/ed255192020.json +0 -93
  79. package/dist/contexts/ordinals-plus.json +0 -23
  80. package/dist/contexts/originals.json +0 -22
  81. package/dist/core/OriginalsSDK.d.ts +0 -158
  82. package/dist/core/OriginalsSDK.js +0 -274
  83. package/dist/crypto/Multikey.d.ts +0 -30
  84. package/dist/crypto/Multikey.js +0 -149
  85. package/dist/crypto/Signer.d.ts +0 -21
  86. package/dist/crypto/Signer.js +0 -196
  87. package/dist/crypto/noble-init.d.ts +0 -18
  88. package/dist/crypto/noble-init.js +0 -106
  89. package/dist/did/BtcoDidResolver.d.ts +0 -57
  90. package/dist/did/BtcoDidResolver.js +0 -166
  91. package/dist/did/DIDManager.d.ts +0 -101
  92. package/dist/did/DIDManager.js +0 -493
  93. package/dist/did/Ed25519Verifier.d.ts +0 -30
  94. package/dist/did/Ed25519Verifier.js +0 -59
  95. package/dist/did/KeyManager.d.ts +0 -17
  96. package/dist/did/KeyManager.js +0 -207
  97. package/dist/did/WebVHManager.d.ts +0 -100
  98. package/dist/did/WebVHManager.js +0 -304
  99. package/dist/did/createBtcoDidDocument.d.ts +0 -10
  100. package/dist/did/createBtcoDidDocument.js +0 -42
  101. package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +0 -23
  102. package/dist/did/providers/OrdinalsClientProviderAdapter.js +0 -51
  103. package/dist/events/EventEmitter.d.ts +0 -115
  104. package/dist/events/EventEmitter.js +0 -198
  105. package/dist/events/index.d.ts +0 -7
  106. package/dist/events/index.js +0 -6
  107. package/dist/events/types.d.ts +0 -286
  108. package/dist/events/types.js +0 -9
  109. package/dist/examples/basic-usage.d.ts +0 -3
  110. package/dist/examples/basic-usage.js +0 -62
  111. package/dist/examples/run.d.ts +0 -1
  112. package/dist/examples/run.js +0 -4
  113. package/dist/index.d.ts +0 -39
  114. package/dist/index.js +0 -47
  115. package/dist/lifecycle/BatchOperations.d.ts +0 -147
  116. package/dist/lifecycle/BatchOperations.js +0 -251
  117. package/dist/lifecycle/LifecycleManager.d.ts +0 -116
  118. package/dist/lifecycle/LifecycleManager.js +0 -971
  119. package/dist/lifecycle/OriginalsAsset.d.ts +0 -164
  120. package/dist/lifecycle/OriginalsAsset.js +0 -380
  121. package/dist/lifecycle/ProvenanceQuery.d.ts +0 -126
  122. package/dist/lifecycle/ProvenanceQuery.js +0 -220
  123. package/dist/lifecycle/ResourceVersioning.d.ts +0 -73
  124. package/dist/lifecycle/ResourceVersioning.js +0 -127
  125. package/dist/migration/MigrationManager.d.ts +0 -86
  126. package/dist/migration/MigrationManager.js +0 -412
  127. package/dist/migration/audit/AuditLogger.d.ts +0 -51
  128. package/dist/migration/audit/AuditLogger.js +0 -156
  129. package/dist/migration/checkpoint/CheckpointManager.d.ts +0 -31
  130. package/dist/migration/checkpoint/CheckpointManager.js +0 -96
  131. package/dist/migration/checkpoint/CheckpointStorage.d.ts +0 -26
  132. package/dist/migration/checkpoint/CheckpointStorage.js +0 -89
  133. package/dist/migration/index.d.ts +0 -22
  134. package/dist/migration/index.js +0 -27
  135. package/dist/migration/operations/BaseMigration.d.ts +0 -48
  136. package/dist/migration/operations/BaseMigration.js +0 -83
  137. package/dist/migration/operations/PeerToBtcoMigration.d.ts +0 -25
  138. package/dist/migration/operations/PeerToBtcoMigration.js +0 -67
  139. package/dist/migration/operations/PeerToWebvhMigration.d.ts +0 -19
  140. package/dist/migration/operations/PeerToWebvhMigration.js +0 -46
  141. package/dist/migration/operations/WebvhToBtcoMigration.d.ts +0 -25
  142. package/dist/migration/operations/WebvhToBtcoMigration.js +0 -67
  143. package/dist/migration/rollback/RollbackManager.d.ts +0 -29
  144. package/dist/migration/rollback/RollbackManager.js +0 -146
  145. package/dist/migration/state/StateMachine.d.ts +0 -25
  146. package/dist/migration/state/StateMachine.js +0 -76
  147. package/dist/migration/state/StateTracker.d.ts +0 -36
  148. package/dist/migration/state/StateTracker.js +0 -123
  149. package/dist/migration/types.d.ts +0 -306
  150. package/dist/migration/types.js +0 -33
  151. package/dist/migration/validation/BitcoinValidator.d.ts +0 -13
  152. package/dist/migration/validation/BitcoinValidator.js +0 -83
  153. package/dist/migration/validation/CredentialValidator.d.ts +0 -13
  154. package/dist/migration/validation/CredentialValidator.js +0 -46
  155. package/dist/migration/validation/DIDCompatibilityValidator.d.ts +0 -16
  156. package/dist/migration/validation/DIDCompatibilityValidator.js +0 -127
  157. package/dist/migration/validation/LifecycleValidator.d.ts +0 -10
  158. package/dist/migration/validation/LifecycleValidator.js +0 -52
  159. package/dist/migration/validation/StorageValidator.d.ts +0 -10
  160. package/dist/migration/validation/StorageValidator.js +0 -65
  161. package/dist/migration/validation/ValidationPipeline.d.ts +0 -29
  162. package/dist/migration/validation/ValidationPipeline.js +0 -180
  163. package/dist/storage/LocalStorageAdapter.d.ts +0 -11
  164. package/dist/storage/LocalStorageAdapter.js +0 -53
  165. package/dist/storage/MemoryStorageAdapter.d.ts +0 -6
  166. package/dist/storage/MemoryStorageAdapter.js +0 -21
  167. package/dist/storage/StorageAdapter.d.ts +0 -16
  168. package/dist/storage/StorageAdapter.js +0 -1
  169. package/dist/storage/index.d.ts +0 -2
  170. package/dist/storage/index.js +0 -2
  171. package/dist/types/bitcoin.d.ts +0 -84
  172. package/dist/types/bitcoin.js +0 -1
  173. package/dist/types/common.d.ts +0 -82
  174. package/dist/types/common.js +0 -1
  175. package/dist/types/credentials.d.ts +0 -75
  176. package/dist/types/credentials.js +0 -1
  177. package/dist/types/did.d.ts +0 -26
  178. package/dist/types/did.js +0 -1
  179. package/dist/types/index.d.ts +0 -5
  180. package/dist/types/index.js +0 -5
  181. package/dist/types/network.d.ts +0 -78
  182. package/dist/types/network.js +0 -145
  183. package/dist/utils/EventLogger.d.ts +0 -71
  184. package/dist/utils/EventLogger.js +0 -232
  185. package/dist/utils/Logger.d.ts +0 -106
  186. package/dist/utils/Logger.js +0 -257
  187. package/dist/utils/MetricsCollector.d.ts +0 -110
  188. package/dist/utils/MetricsCollector.js +0 -264
  189. package/dist/utils/bitcoin-address.d.ts +0 -38
  190. package/dist/utils/bitcoin-address.js +0 -113
  191. package/dist/utils/cbor.d.ts +0 -2
  192. package/dist/utils/cbor.js +0 -9
  193. package/dist/utils/encoding.d.ts +0 -37
  194. package/dist/utils/encoding.js +0 -120
  195. package/dist/utils/hash.d.ts +0 -1
  196. package/dist/utils/hash.js +0 -5
  197. package/dist/utils/retry.d.ts +0 -10
  198. package/dist/utils/retry.js +0 -35
  199. package/dist/utils/satoshi-validation.d.ts +0 -60
  200. package/dist/utils/satoshi-validation.js +0 -156
  201. package/dist/utils/serialization.d.ts +0 -14
  202. package/dist/utils/serialization.js +0 -76
  203. package/dist/utils/telemetry.d.ts +0 -17
  204. package/dist/utils/telemetry.js +0 -24
  205. package/dist/utils/validation.d.ts +0 -5
  206. package/dist/utils/validation.js +0 -98
  207. package/dist/vc/CredentialManager.d.ts +0 -22
  208. package/dist/vc/CredentialManager.js +0 -227
  209. package/dist/vc/Issuer.d.ts +0 -27
  210. package/dist/vc/Issuer.js +0 -70
  211. package/dist/vc/Verifier.d.ts +0 -16
  212. package/dist/vc/Verifier.js +0 -50
  213. package/dist/vc/cryptosuites/bbs.d.ts +0 -44
  214. package/dist/vc/cryptosuites/bbs.js +0 -213
  215. package/dist/vc/cryptosuites/bbsSimple.d.ts +0 -9
  216. package/dist/vc/cryptosuites/bbsSimple.js +0 -12
  217. package/dist/vc/cryptosuites/eddsa.d.ts +0 -30
  218. package/dist/vc/cryptosuites/eddsa.js +0 -81
  219. package/dist/vc/documentLoader.d.ts +0 -16
  220. package/dist/vc/documentLoader.js +0 -59
  221. package/dist/vc/proofs/data-integrity.d.ts +0 -21
  222. package/dist/vc/proofs/data-integrity.js +0 -15
  223. package/dist/vc/utils/jsonld.d.ts +0 -2
  224. package/dist/vc/utils/jsonld.js +0 -15
  225. package/test/logs/did_webvh_QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt_example_com.jsonl +0 -1
  226. package/test/logs/did_webvh_QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8_example_com_users_alice123_profile.jsonl +0 -1
  227. package/test/logs/did_webvh_QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG_example_com.jsonl +0 -1
  228. package/test/logs/did_webvh_QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE_example_com_users_etc_passwd.jsonl +0 -1
  229. package/test/logs/did_webvh_QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg_example_com.jsonl +0 -1
  230. package/test/logs/did_webvh_QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP_example_com_etc_passwd.jsonl +0 -1
  231. package/test/logs/did_webvh_QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W_example_com.jsonl +0 -1
  232. package/test/logs/did_webvh_QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc_example_com.jsonl +0 -1
  233. package/test/logs/did_webvh_QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M_example_com.jsonl +0 -1
  234. package/test/logs/did_webvh_QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw_example_com_users_alice.jsonl +0 -1
  235. package/test/logs/did_webvh_QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb_example_com_level1_level2.jsonl +0 -1
  236. package/test/logs/did_webvh_QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj_example_com_secret.jsonl +0 -1
  237. package/test/logs/did_webvh_QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG_example_com.jsonl +0 -1
  238. package/test/logs/did_webvh_QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf_example_com_C_Windows_System32.jsonl +0 -1
  239. package/test/logs/did_webvh_QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE_example_com_etc_passwd.jsonl +0 -1
  240. package/test/logs/did_webvh_QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL_example_com_users_etc_passwd.jsonl +0 -1
  241. package/test/logs/did_webvh_QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb_example_com_my_org_user_name_test_123.jsonl +0 -1
  242. package/test/logs/did_webvh_Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp_example_com_users_etc_passwd.jsonl +0 -1
  243. package/test/logs/did_webvh_QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG_example_com.jsonl +0 -1
  244. package/test/logs/did_webvh_Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi_example_com_users_alice.jsonl +0 -1
  245. package/tests/e2e/README.md +0 -97
  246. package/tests/e2e/example.spec.ts +0 -78
  247. package/tsconfig.tsbuildinfo +0 -1
@@ -1,30 +0,0 @@
1
- export interface DataIntegrityProof {
2
- type: 'DataIntegrityProof';
3
- cryptosuite: string;
4
- created?: string;
5
- verificationMethod: string;
6
- proofPurpose: string;
7
- proofValue: string;
8
- id?: string;
9
- previousProof?: string | string[];
10
- }
11
- export interface VerificationResult {
12
- verified: boolean;
13
- errors?: string[];
14
- }
15
- export declare class EdDSACryptosuiteManager {
16
- static createProof(document: any, options: any): Promise<DataIntegrityProof>;
17
- static verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult>;
18
- private static createProofConfiguration;
19
- private static transform;
20
- private static hash;
21
- static sign({ data, privateKey }: {
22
- data: Uint8Array;
23
- privateKey: Uint8Array;
24
- }): Promise<Uint8Array>;
25
- static verify({ data, signature, publicKey }: {
26
- data: Uint8Array;
27
- signature: Uint8Array;
28
- publicKey: Uint8Array;
29
- }): Promise<boolean>;
30
- }
@@ -1,81 +0,0 @@
1
- import { base58 } from '@scure/base';
2
- import * as ed25519 from '@noble/ed25519';
3
- import { canonize, canonizeProof } from '../utils/jsonld';
4
- import { multikey } from '../../crypto/Multikey';
5
- import { sha256Bytes } from '../../utils/hash';
6
- export class EdDSACryptosuiteManager {
7
- static async createProof(document, options) {
8
- const proofConfig = await this.createProofConfiguration(options);
9
- const transformedData = await this.transform(document, options);
10
- const hashData = await this.hash(transformedData, proofConfig, options);
11
- let privateKey;
12
- if (typeof options.privateKey === 'string') {
13
- const dec = multikey.decodePrivateKey(options.privateKey);
14
- if (dec.type !== 'Ed25519')
15
- throw new Error('Invalid key type for EdDSA');
16
- privateKey = dec.key;
17
- }
18
- else if (options.privateKey instanceof Uint8Array) {
19
- privateKey = options.privateKey;
20
- }
21
- else {
22
- throw new Error('Invalid private key format');
23
- }
24
- const proofValueBytes = await this.sign({ data: hashData, privateKey });
25
- delete proofConfig['@context'];
26
- return { ...proofConfig, proofValue: base58.encode(proofValueBytes) };
27
- }
28
- static async verifyProof(document, proof, options) {
29
- try {
30
- const documentToVerify = { ...document };
31
- delete documentToVerify.proof;
32
- const transformedData = await this.transform(documentToVerify, options);
33
- const hashData = await this.hash(transformedData, { '@context': document['@context'], ...proof }, options);
34
- const vmDoc = await options.documentLoader(proof.verificationMethod);
35
- const pk = vmDoc.document.publicKeyMultibase;
36
- const dec = multikey.decodePublicKey(pk);
37
- if (dec.type !== 'Ed25519')
38
- throw new Error('Invalid key type for EdDSA');
39
- const signature = base58.decode(proof.proofValue);
40
- const verified = await this.verify({ data: hashData, signature, publicKey: dec.key });
41
- return verified ? { verified: true } : { verified: false, errors: ['Proof verification failed'] };
42
- }
43
- catch (e) {
44
- return { verified: false, errors: [e?.message ?? 'Unknown verification error'] };
45
- }
46
- }
47
- static async createProofConfiguration(options) {
48
- return {
49
- '@context': 'https://w3id.org/security/data-integrity/v2',
50
- type: 'DataIntegrityProof',
51
- cryptosuite: 'eddsa-rdfc-2022',
52
- created: new Date().toISOString(),
53
- verificationMethod: options.verificationMethod,
54
- proofPurpose: options.proofPurpose || 'assertionMethod',
55
- ...(options.challenge && { challenge: options.challenge }),
56
- ...(options.domain && { domain: options.domain })
57
- };
58
- }
59
- static async transform(document, options) {
60
- return await canonize(document, { documentLoader: options.documentLoader });
61
- }
62
- static async hash(transformedData, proofConfig, options) {
63
- const canonicalProofConfig = await canonizeProof(proofConfig, { documentLoader: options.documentLoader });
64
- const proofConfigHash = await sha256Bytes(canonicalProofConfig);
65
- const documentHash = await sha256Bytes(transformedData);
66
- return new Uint8Array([...proofConfigHash, ...documentHash]);
67
- }
68
- static async sign({ data, privateKey }) {
69
- if (privateKey.length !== 32) {
70
- if (privateKey.length === 64)
71
- privateKey = privateKey.slice(32);
72
- else
73
- throw new Error('Invalid private key length');
74
- }
75
- const signature = await ed25519.signAsync(Buffer.from(data).toString('hex'), Buffer.from(privateKey).toString('hex'));
76
- return signature;
77
- }
78
- static async verify({ data, signature, publicKey }) {
79
- return await ed25519.verifyAsync(Buffer.from(signature).toString('hex'), Buffer.from(data).toString('hex'), Buffer.from(publicKey).toString('hex'));
80
- }
81
- }
@@ -1,16 +0,0 @@
1
- import { DIDManager } from '../did/DIDManager';
2
- type LoadedDocument = {
3
- document: any;
4
- documentUrl: string;
5
- contextUrl: string | null;
6
- };
7
- export declare class DocumentLoader {
8
- private didManager;
9
- constructor(didManager: DIDManager);
10
- load(iri: string): Promise<LoadedDocument>;
11
- private resolveDID;
12
- }
13
- export declare const createDocumentLoader: (didManager: DIDManager) => (iri: string) => Promise<LoadedDocument>;
14
- export declare const verificationMethodRegistry: Map<string, any>;
15
- export declare function registerVerificationMethod(vm: any): void;
16
- export {};
@@ -1,59 +0,0 @@
1
- const CONTEXTS = {
2
- // Provide 1.1-compatible stubs for jsonld canonize
3
- 'https://www.w3.org/ns/credentials/v2': { '@context': { '@version': 1.1 } },
4
- 'https://w3id.org/security/data-integrity/v2': { '@context': { '@version': 1.1 } }
5
- };
6
- export class DocumentLoader {
7
- constructor(didManager) {
8
- this.didManager = didManager;
9
- }
10
- async load(iri) {
11
- if (iri.startsWith('did:')) {
12
- return this.resolveDID(iri);
13
- }
14
- const doc = CONTEXTS[iri];
15
- if (doc) {
16
- return { document: doc, documentUrl: iri, contextUrl: null };
17
- }
18
- throw new Error(`Document not found: ${iri}`);
19
- }
20
- async resolveDID(didUrl) {
21
- const [did, fragment] = didUrl.split('#');
22
- const didDoc = await this.didManager.resolveDID(did);
23
- if (!didDoc) {
24
- throw new Error(`DID not resolved: ${did}`);
25
- }
26
- if (fragment) {
27
- // If a VM was registered explicitly, prefer it
28
- const cached = verificationMethodRegistry.get(didUrl);
29
- if (cached) {
30
- return {
31
- document: { '@context': didDoc['@context'], ...cached },
32
- documentUrl: didUrl,
33
- contextUrl: null
34
- };
35
- }
36
- const vms = didDoc.verificationMethod;
37
- const vm = vms?.find((m) => m.id === didUrl);
38
- if (vm) {
39
- return {
40
- document: { '@context': didDoc['@context'], ...vm },
41
- documentUrl: didUrl,
42
- contextUrl: null
43
- };
44
- }
45
- return {
46
- document: { '@context': didDoc['@context'], id: didUrl },
47
- documentUrl: didUrl,
48
- contextUrl: null
49
- };
50
- }
51
- return { document: didDoc, documentUrl: didUrl, contextUrl: null };
52
- }
53
- }
54
- export const createDocumentLoader = (didManager) => (iri) => new DocumentLoader(didManager).load(iri);
55
- export const verificationMethodRegistry = new Map();
56
- export function registerVerificationMethod(vm) {
57
- if (vm?.id)
58
- verificationMethodRegistry.set(vm.id, vm);
59
- }
@@ -1,21 +0,0 @@
1
- import { type DataIntegrityProof } from '../cryptosuites/eddsa';
2
- export interface VerificationResult {
3
- verified: boolean;
4
- errors?: string[];
5
- }
6
- export interface ProofOptions {
7
- verificationMethod: string;
8
- proofPurpose: string;
9
- privateKey?: Uint8Array | string;
10
- type: 'DataIntegrityProof';
11
- created?: string;
12
- cryptosuite: string;
13
- documentLoader?: (url: string) => Promise<any>;
14
- previousProof?: string | string[];
15
- challenge?: string;
16
- domain?: string;
17
- }
18
- export declare class DataIntegrityProofManager {
19
- static createProof(document: any, options: ProofOptions): Promise<DataIntegrityProof>;
20
- static verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult>;
21
- }
@@ -1,15 +0,0 @@
1
- import { EdDSACryptosuiteManager } from '../cryptosuites/eddsa';
2
- export class DataIntegrityProofManager {
3
- static async createProof(document, options) {
4
- if (options.cryptosuite !== 'eddsa-rdfc-2022') {
5
- throw new Error(`Unsupported cryptosuite: ${options.cryptosuite}`);
6
- }
7
- return await EdDSACryptosuiteManager.createProof(document, options);
8
- }
9
- static async verifyProof(document, proof, options) {
10
- if (proof.cryptosuite !== 'eddsa-rdfc-2022') {
11
- return { verified: false, errors: [`Unsupported cryptosuite: ${proof.cryptosuite}`] };
12
- }
13
- return await EdDSACryptosuiteManager.verifyProof(document, proof, options);
14
- }
15
- }
@@ -1,2 +0,0 @@
1
- export declare function canonize(input: any, { documentLoader }: any): Promise<string>;
2
- export declare function canonizeProof(proof: any, { documentLoader }: any): Promise<string>;
@@ -1,15 +0,0 @@
1
- import jsonld from 'jsonld';
2
- export async function canonize(input, { documentLoader }) {
3
- return await jsonld.canonize(input, {
4
- algorithm: 'URDNA2015',
5
- format: 'application/n-quads',
6
- documentLoader,
7
- safe: false,
8
- useNative: false,
9
- rdfDirection: 'i18n-datatype'
10
- });
11
- }
12
- export async function canonizeProof(proof, { documentLoader }) {
13
- const { jws, signatureValue, proofValue, ...rest } = proof;
14
- return await canonize(rest, { documentLoader });
15
- }
@@ -1 +0,0 @@
1
- {"versionId":"1-QmVFoL8KkZjSm6jbNjaSoty2VmRgsn5XcvYc2xypMKcVja","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt","updateKeys":["did:key:z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com","controller":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK","id":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com#B6rgkDkK"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2SNdJGiwveT9G28kqRze62jtek8MAEkMZiFLf73W47RV1gtY8FhMfof6JfrQodNyroKqRZLzwEo3nh5YdE9FQQzq"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmXXUezZTj4hs7XXBVmJFtqkPzq6zmfT7mnYtSy93dcqcA","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8","updateKeys":["did:key:z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile","controller":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv","id":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile#bCwUXAwv"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5SFg3UEgnznehjGcSHTv7DSfqCLbKjku8quZgJNjBcBeFCfWWUDxg3nz3s77BeiqSGg48b2LdC1V4w24qY5V7kY8"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmZbzt7KWQPDHSFZtXNac8x5T67DdXciJ7tZuH44LgNMMt","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG","updateKeys":["did:key:z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD"],"portable":true,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com","controller":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD","id":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com#QdhFFCFD"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5aM8QNrVcXbHL2b7ZVLSApwMQTtWR8Mqx6du4GjqGwuvsJjV5YcTGduyhTWx1W47Y3wxNvSxFUaC3Hjn6joFcy1N"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmaCt3oXVhW6z4zHaRUHXDDBAqK6nXbCJJcA7FeqrZaCa9","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE","updateKeys":["did:key:z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd","controller":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6","id":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd#p3VsoQH6"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3VjxJbNc7zKfi4Wghu2M1CZcCAcnViMWEZvBNp9PmL7EMXW6ujujvdmVAyVtg4nQWVCrgsT9bXkNjArP2aN9ErfX"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmbK3vTYePzoHCztpoGGLJ6g2dAbP9FaG4YNm8kq85jx1v","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg","updateKeys":["did:key:z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com","controller":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc","id":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com#7FXPMcqc"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4AYeUb5Q3fcCtxipcKAXhVYDVbEpJq9K19TQT8sRbaEbfLNB5im6zscGDGPBrUUXdmZWkDEjJy6BVHkd4zKENrEY"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmUg4dGxdziDuYMZD1iAmABeSabHtKJNof39z6T4FPurXP","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP","updateKeys":["did:key:z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd","controller":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM","id":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd#fHurjDLM"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4XunKaGmWgSNqeJgXnSgN1MjGxbyJZvQqxfbVrZHDg6zXBkjqyXTfo7FvigqqPjkGkq4PdfWU9zcsgXN7fBU8uPx"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmWZ45L2o7DsUCfSxsBanGb4chUz5Xw7H82pgUE3cWScFC","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W","updateKeys":["did:key:z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com","controller":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG","id":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com#p3K9yTRG"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2kpQ5QQJ4U9GuiFxt5q8JwQy8dyb7Sg5Q3HVqg2KzTtzfoanUEvVBhgeWv29ifkXGGesWTBqomc1XL4K3DrksR3R"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmeyQ12S1GgSyY4KXEpwRgGNZBgwenez5UUtiDJio4crXn","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc","updateKeys":["did:key:z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com","controller":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv","id":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com#XUaP15gv"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3mpWMnA398SQwaapPPEaNDjYRGSoykDjuF5x5p21XvYAi3wsURwNebRms5zTUiBJKiNNgKUShA41SxQT8NsSsgd8"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmdotkBk5VciaCbx2sWm2vRYDUYN3nJDucULS9NVk4vZqe","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M","updateKeys":["did:key:z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com","controller":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT","id":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com#DZ7U5BUT"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z626vNPHmGGa5ct13P5BhLhXYEJHZK97WM2Kuv4WvdMnjEwtmQGLeba9eEHC1G8iyk3NY1P463Ta2wt86eMQFB9aV"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmZGeHiLVXA74xRdC1NY9QS62fsreQTi3vWvKDcefiF1C3","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw","updateKeys":["did:key:z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice","controller":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i","id":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice#MbHAyj9i"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z35aNWoLZVuFUB6d2446kKN6J4sMmoqpeMSC6qLoqbYGnXgujM59LUy7wGeHS45qTPVqpKVEn1NYknDZcNGn3Kxkw"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmbTMTKdtN9ZRgjkpV18yDWKruPVX7p5w7tCu9brmzM9ac","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb","updateKeys":["did:key:z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2","controller":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R","id":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2#WW8zsm2R"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2b5GhRDenv9Sj6ziPq4bFQckvLkyXbQUedGiDJRDfBNRouS5uy9EF2Z8Xkiqse6m4DNLX4jZcxvDoNxLTDogimvx"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmWjKzJLDRbRvuFAcxMjdS1WiguU58nUBSbG9usbohwG6J","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj","updateKeys":["did:key:z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret","controller":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic","id":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret#MS9P2Vic"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3YWE8je7ycWYJYGzgLFipepHg92AVPJmW2quSt248FK9XwupWuXS44bjhKZsejTFFApB5mw5aau7aE1C6U7jByzH"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmUuqC3ofB2M3EUFmCWp1rc8xyi6mQ4thWbowipHJG31Cu","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG","updateKeys":["did:key:z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com","controller":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC","id":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com#77cZtKQC"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3Tm2P41cvep9vCohxFr2JNmyehHbaZdUDkJJkxBfLCTWMU9H7W6pFFVqQyL41hseL7YHwRs8S4XwzboZLGri6r4y"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmTJoptg7LHRG3nwr3Wh7QvE2rD38RhPQ6e8vHebGjpJMU","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf","updateKeys":["did:key:z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32","controller":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV","id":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32#wYpqoyiV"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5U8KhNq9NFbKgoD1dmCTtp5UgSGJCQz1ztCy78swVPaWVSNKYghiZmKAvZU68Yt7vqumYd9ERGgLoSL1mwYumkuq"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmTnMvZne37gpM7Mm7QfJ8VqAmrKSRPBYsEfYCvRqSjQaF","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE","updateKeys":["did:key:z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd","controller":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA","id":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd#XZcghunA"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3YDQo3XcnmDyoYFu1DbqcfgEmjCcSo7a37BnPpzxKTQAe4vqkoLPboPEg1zucVME6QAkM76YNQcC32FpsrNkGmic"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmQc86R7CRBV9N4rBzDeXeXmboetxZ6hUZcsm1pjzd6mdT","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL","updateKeys":["did:key:z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd","controller":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25","id":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd#E9PGPP25"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z54nZQ42iuD4TKhLHwLZv6GYrpuNCC96pnEHaDqhmBF2RtFGMND3P8bP1YX6V3wzhhbMkrjdAsMeYxGXEW8R4ew6K"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmSPMH7aH19vBqnmrCNnBbqoWyJ1V3Z2CPR2RP3WUr9VU9","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb","updateKeys":["did:key:z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123","controller":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P","id":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123#HcHdgh8P"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4TJGokkoEgzeB673Vfn2s7zBHDHDch1THKXU81NG4TATBveymiqeyeXh2m1YCufyx5civaqAQECsibYRL7JydyZi"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmduwSmHiwsJ6A9WvvJnoE8fLDvbh217VaUKEriQwk3wSQ","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp","updateKeys":["did:key:z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd","controller":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e","id":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd#FdtkuN4e"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5kTiyWGUiwnJ7snnkGkkUby3sKXF8u6CSS69UDXtTDxtXVHMwPYH95m1BWLwdLZMU6rya2ZsCbWuQgnALrNW5ZPu"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmRWV7epcDcx8MwjPKBrPDK24SPPf2CpdA4Shp7poKxCLY","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG","updateKeys":["did:key:z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com","controller":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z","id":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com#MVR3J55Z"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4trznFGa2iNb7jkMfQygeNyXhQ18aYQEW9ydvKnLwN2z2ti2VLbUi8ZwvWv17rbgNLNzGcQG5oSv9DxnJGufp6uT"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmVy9mi51r2SvhNyX2ctU8XhXp8rTS4oiJpaZRX4nqscox","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi","updateKeys":["did:key:z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice","controller":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn","id":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice#r7vL5Dpn"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5h238CMZSeHD38kpCcHh12hJaQ9VJQ5c4zf3doZxzaHUkSrSTYxqbTR42ruNpBEboPcMGQPAZ7R3CddvpkEBu6mw"}]}
@@ -1,97 +0,0 @@
1
- # E2E Tests with Playwright
2
-
3
- This directory contains end-to-end (E2E) tests using [Playwright](https://playwright.dev/).
4
-
5
- ## Prerequisites
6
-
7
- 1. Install dependencies:
8
- ```bash
9
- npm install
10
- ```
11
-
12
- 2. Install Playwright browsers (only needed once):
13
- ```bash
14
- npx playwright install
15
- ```
16
-
17
- ## Running Tests
18
-
19
- Run all E2E tests:
20
- ```bash
21
- npm run test:e2e
22
- ```
23
-
24
- Run tests in UI mode (interactive):
25
- ```bash
26
- npm run test:e2e:ui
27
- ```
28
-
29
- Run tests in headed mode (see the browser):
30
- ```bash
31
- npm run test:e2e:headed
32
- ```
33
-
34
- Run tests in debug mode:
35
- ```bash
36
- npm run test:e2e:debug
37
- ```
38
-
39
- ## Writing Tests
40
-
41
- Tests are written using Playwright's test runner. Here's a basic example:
42
-
43
- ```typescript
44
- import { test, expect } from '@playwright/test';
45
-
46
- test('example test', async ({ page }) => {
47
- await page.goto('https://example.com');
48
- await expect(page).toHaveTitle(/Example/);
49
- });
50
- ```
51
-
52
- ## Test Structure
53
-
54
- - `*.spec.ts` - Test files
55
- - Playwright automatically discovers all `*.spec.ts` files in this directory
56
-
57
- ## Configuration
58
-
59
- The Playwright configuration is in `playwright.config.ts` at the root of the project.
60
-
61
- Key settings:
62
- - **testDir**: `./tests/e2e`
63
- - **Browsers**: Chromium, Firefox, WebKit
64
- - **Reporter**: HTML report (view with `npx playwright show-report`)
65
-
66
- ## Best Practices
67
-
68
- 1. Use data-testid attributes for reliable selectors
69
- 2. Use page object models for complex pages
70
- 3. Keep tests independent and isolated
71
- 4. Use fixtures for setup/teardown
72
- 5. Run tests in parallel when possible
73
-
74
- ## Debugging
75
-
76
- To debug a specific test:
77
- ```bash
78
- npx playwright test --debug example.spec.ts
79
- ```
80
-
81
- To view the last test report:
82
- ```bash
83
- npx playwright show-report
84
- ```
85
-
86
- ## CI/CD
87
-
88
- The tests are configured to run in CI with:
89
- - Retries: 2
90
- - Workers: 1 (sequential)
91
- - Fail on `.only` tests
92
-
93
- ## Resources
94
-
95
- - [Playwright Documentation](https://playwright.dev/docs/intro)
96
- - [Playwright Best Practices](https://playwright.dev/docs/best-practices)
97
- - [Playwright API Reference](https://playwright.dev/docs/api/class-playwright)
@@ -1,78 +0,0 @@
1
- import { test, expect } from '@playwright/test';
2
-
3
- /**
4
- * Example Playwright test
5
- *
6
- * This is a basic example showing how to use Playwright for UI testing.
7
- * You can modify this to test your actual application that uses the SDK.
8
- */
9
-
10
- test.describe('Example Test Suite', () => {
11
- test('basic page navigation', async ({ page }) => {
12
- // Navigate to a URL
13
- await page.goto('https://example.com');
14
-
15
- // Wait for the page to load
16
- await page.waitForLoadState('networkidle');
17
-
18
- // Check the title
19
- await expect(page).toHaveTitle(/Example Domain/);
20
- });
21
-
22
- test('element interaction', async ({ page }) => {
23
- await page.goto('https://example.com');
24
-
25
- // Find an element
26
- const heading = page.locator('h1');
27
-
28
- // Verify the element exists and has text
29
- await expect(heading).toBeVisible();
30
- await expect(heading).toHaveText(/Example Domain/);
31
- });
32
-
33
- test('click and navigation', async ({ page }) => {
34
- await page.goto('https://example.com');
35
-
36
- // Find and click a link
37
- const moreInfoLink = page.locator('a:has-text("More information")');
38
- await expect(moreInfoLink).toBeVisible();
39
-
40
- // You can click and verify navigation
41
- // await moreInfoLink.click();
42
- // await expect(page).toHaveURL(/iana/);
43
- });
44
- });
45
-
46
- /**
47
- * Example test for testing SDK integration in a web application
48
- *
49
- * Uncomment and modify this when you have a web application that uses the SDK
50
- */
51
- // test.describe('SDK Integration Tests', () => {
52
- // test.beforeEach(async ({ page }) => {
53
- // // Navigate to your app
54
- // await page.goto('http://localhost:3000');
55
- // });
56
- //
57
- // test('should initialize SDK', async ({ page }) => {
58
- // // Test that SDK initializes correctly in the browser
59
- // const sdkInitialized = await page.evaluate(() => {
60
- // // Check if SDK is available on window or initialized
61
- // return typeof window.OriginalsSdk !== 'undefined';
62
- // });
63
- //
64
- // expect(sdkInitialized).toBe(true);
65
- // });
66
- //
67
- // test('should create a digital asset', async ({ page }) => {
68
- // // Fill in form for creating asset
69
- // await page.fill('input[name="assetName"]', 'Test Asset');
70
- // await page.fill('textarea[name="assetDescription"]', 'Test Description');
71
- //
72
- // // Click create button
73
- // await page.click('button:has-text("Create Asset")');
74
- //
75
- // // Wait for success message
76
- // await expect(page.locator('.success-message')).toBeVisible();
77
- // });
78
- // });