@originals/sdk 1.1.0 → 1.4.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +3 -2
- package/src/did/DIDManager.ts +1 -1
- package/src/did/WebVHManager.ts +11 -2
- package/src/examples/create-module-original.ts +435 -0
- package/src/examples/full-lifecycle-flow.ts +514 -0
- package/src/examples/run.ts +59 -4
- package/src/index.ts +69 -3
- package/src/kinds/KindRegistry.ts +290 -0
- package/src/kinds/index.ts +74 -0
- package/src/kinds/types.ts +470 -0
- package/src/kinds/validators/AgentValidator.ts +257 -0
- package/src/kinds/validators/AppValidator.ts +211 -0
- package/src/kinds/validators/DatasetValidator.ts +242 -0
- package/src/kinds/validators/DocumentValidator.ts +311 -0
- package/src/kinds/validators/MediaValidator.ts +269 -0
- package/src/kinds/validators/ModuleValidator.ts +225 -0
- package/src/kinds/validators/base.ts +276 -0
- package/src/kinds/validators/index.ts +12 -0
- package/src/lifecycle/LifecycleManager.ts +909 -1
- package/src/resources/ResourceManager.ts +655 -0
- package/src/resources/index.ts +21 -0
- package/src/resources/types.ts +202 -0
- package/src/types/common.ts +1 -1
- package/src/vc/CredentialManager.ts +647 -2
- package/tests/integration/createTypedOriginal.test.ts +379 -0
- package/tests/performance/BatchOperations.perf.test.ts +2 -2
- package/tests/unit/kinds/KindRegistry.test.ts +329 -0
- package/tests/unit/kinds/types.test.ts +409 -0
- package/tests/unit/kinds/validators.test.ts +651 -0
- package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +441 -0
- package/tests/unit/resources/ResourceManager.test.ts +740 -0
- package/tests/unit/vc/CredentialManager.helpers.test.ts +527 -0
- package/tsconfig.json +0 -1
- package/.turbo/turbo-build.log +0 -1
- package/.turbo/turbo-test.log +0 -68353
- package/dist/adapters/FeeOracleMock.d.ts +0 -6
- package/dist/adapters/FeeOracleMock.js +0 -8
- package/dist/adapters/index.d.ts +0 -4
- package/dist/adapters/index.js +0 -4
- package/dist/adapters/providers/OrdHttpProvider.d.ts +0 -56
- package/dist/adapters/providers/OrdHttpProvider.js +0 -110
- package/dist/adapters/providers/OrdMockProvider.d.ts +0 -70
- package/dist/adapters/providers/OrdMockProvider.js +0 -75
- package/dist/adapters/types.d.ts +0 -71
- package/dist/adapters/types.js +0 -1
- package/dist/bitcoin/BitcoinManager.d.ts +0 -15
- package/dist/bitcoin/BitcoinManager.js +0 -262
- package/dist/bitcoin/BroadcastClient.d.ts +0 -30
- package/dist/bitcoin/BroadcastClient.js +0 -35
- package/dist/bitcoin/OrdinalsClient.d.ts +0 -21
- package/dist/bitcoin/OrdinalsClient.js +0 -105
- package/dist/bitcoin/PSBTBuilder.d.ts +0 -24
- package/dist/bitcoin/PSBTBuilder.js +0 -80
- package/dist/bitcoin/fee-calculation.d.ts +0 -14
- package/dist/bitcoin/fee-calculation.js +0 -31
- package/dist/bitcoin/providers/OrdNodeProvider.d.ts +0 -38
- package/dist/bitcoin/providers/OrdNodeProvider.js +0 -67
- package/dist/bitcoin/providers/OrdinalsProvider.d.ts +0 -33
- package/dist/bitcoin/providers/OrdinalsProvider.js +0 -50
- package/dist/bitcoin/providers/types.d.ts +0 -63
- package/dist/bitcoin/providers/types.js +0 -1
- package/dist/bitcoin/transactions/commit.d.ts +0 -89
- package/dist/bitcoin/transactions/commit.js +0 -311
- package/dist/bitcoin/transactions/index.d.ts +0 -7
- package/dist/bitcoin/transactions/index.js +0 -8
- package/dist/bitcoin/transfer.d.ts +0 -9
- package/dist/bitcoin/transfer.js +0 -26
- package/dist/bitcoin/utxo-selection.d.ts +0 -78
- package/dist/bitcoin/utxo-selection.js +0 -237
- package/dist/bitcoin/utxo.d.ts +0 -26
- package/dist/bitcoin/utxo.js +0 -78
- package/dist/contexts/credentials-v1.json +0 -195
- package/dist/contexts/credentials-v2-examples.json +0 -5
- package/dist/contexts/credentials-v2.json +0 -301
- package/dist/contexts/credentials.json +0 -195
- package/dist/contexts/data-integrity-v2.json +0 -81
- package/dist/contexts/dids.json +0 -57
- package/dist/contexts/ed255192020.json +0 -93
- package/dist/contexts/ordinals-plus.json +0 -23
- package/dist/contexts/originals.json +0 -22
- package/dist/core/OriginalsSDK.d.ts +0 -158
- package/dist/core/OriginalsSDK.js +0 -274
- package/dist/crypto/Multikey.d.ts +0 -30
- package/dist/crypto/Multikey.js +0 -149
- package/dist/crypto/Signer.d.ts +0 -21
- package/dist/crypto/Signer.js +0 -196
- package/dist/crypto/noble-init.d.ts +0 -18
- package/dist/crypto/noble-init.js +0 -106
- package/dist/did/BtcoDidResolver.d.ts +0 -57
- package/dist/did/BtcoDidResolver.js +0 -166
- package/dist/did/DIDManager.d.ts +0 -101
- package/dist/did/DIDManager.js +0 -493
- package/dist/did/Ed25519Verifier.d.ts +0 -30
- package/dist/did/Ed25519Verifier.js +0 -59
- package/dist/did/KeyManager.d.ts +0 -17
- package/dist/did/KeyManager.js +0 -207
- package/dist/did/WebVHManager.d.ts +0 -100
- package/dist/did/WebVHManager.js +0 -304
- package/dist/did/createBtcoDidDocument.d.ts +0 -10
- package/dist/did/createBtcoDidDocument.js +0 -42
- package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +0 -23
- package/dist/did/providers/OrdinalsClientProviderAdapter.js +0 -51
- package/dist/events/EventEmitter.d.ts +0 -115
- package/dist/events/EventEmitter.js +0 -198
- package/dist/events/index.d.ts +0 -7
- package/dist/events/index.js +0 -6
- package/dist/events/types.d.ts +0 -286
- package/dist/events/types.js +0 -9
- package/dist/examples/basic-usage.d.ts +0 -3
- package/dist/examples/basic-usage.js +0 -62
- package/dist/examples/run.d.ts +0 -1
- package/dist/examples/run.js +0 -4
- package/dist/index.d.ts +0 -39
- package/dist/index.js +0 -47
- package/dist/lifecycle/BatchOperations.d.ts +0 -147
- package/dist/lifecycle/BatchOperations.js +0 -251
- package/dist/lifecycle/LifecycleManager.d.ts +0 -116
- package/dist/lifecycle/LifecycleManager.js +0 -971
- package/dist/lifecycle/OriginalsAsset.d.ts +0 -164
- package/dist/lifecycle/OriginalsAsset.js +0 -380
- package/dist/lifecycle/ProvenanceQuery.d.ts +0 -126
- package/dist/lifecycle/ProvenanceQuery.js +0 -220
- package/dist/lifecycle/ResourceVersioning.d.ts +0 -73
- package/dist/lifecycle/ResourceVersioning.js +0 -127
- package/dist/migration/MigrationManager.d.ts +0 -86
- package/dist/migration/MigrationManager.js +0 -412
- package/dist/migration/audit/AuditLogger.d.ts +0 -51
- package/dist/migration/audit/AuditLogger.js +0 -156
- package/dist/migration/checkpoint/CheckpointManager.d.ts +0 -31
- package/dist/migration/checkpoint/CheckpointManager.js +0 -96
- package/dist/migration/checkpoint/CheckpointStorage.d.ts +0 -26
- package/dist/migration/checkpoint/CheckpointStorage.js +0 -89
- package/dist/migration/index.d.ts +0 -22
- package/dist/migration/index.js +0 -27
- package/dist/migration/operations/BaseMigration.d.ts +0 -48
- package/dist/migration/operations/BaseMigration.js +0 -83
- package/dist/migration/operations/PeerToBtcoMigration.d.ts +0 -25
- package/dist/migration/operations/PeerToBtcoMigration.js +0 -67
- package/dist/migration/operations/PeerToWebvhMigration.d.ts +0 -19
- package/dist/migration/operations/PeerToWebvhMigration.js +0 -46
- package/dist/migration/operations/WebvhToBtcoMigration.d.ts +0 -25
- package/dist/migration/operations/WebvhToBtcoMigration.js +0 -67
- package/dist/migration/rollback/RollbackManager.d.ts +0 -29
- package/dist/migration/rollback/RollbackManager.js +0 -146
- package/dist/migration/state/StateMachine.d.ts +0 -25
- package/dist/migration/state/StateMachine.js +0 -76
- package/dist/migration/state/StateTracker.d.ts +0 -36
- package/dist/migration/state/StateTracker.js +0 -123
- package/dist/migration/types.d.ts +0 -306
- package/dist/migration/types.js +0 -33
- package/dist/migration/validation/BitcoinValidator.d.ts +0 -13
- package/dist/migration/validation/BitcoinValidator.js +0 -83
- package/dist/migration/validation/CredentialValidator.d.ts +0 -13
- package/dist/migration/validation/CredentialValidator.js +0 -46
- package/dist/migration/validation/DIDCompatibilityValidator.d.ts +0 -16
- package/dist/migration/validation/DIDCompatibilityValidator.js +0 -127
- package/dist/migration/validation/LifecycleValidator.d.ts +0 -10
- package/dist/migration/validation/LifecycleValidator.js +0 -52
- package/dist/migration/validation/StorageValidator.d.ts +0 -10
- package/dist/migration/validation/StorageValidator.js +0 -65
- package/dist/migration/validation/ValidationPipeline.d.ts +0 -29
- package/dist/migration/validation/ValidationPipeline.js +0 -180
- package/dist/storage/LocalStorageAdapter.d.ts +0 -11
- package/dist/storage/LocalStorageAdapter.js +0 -53
- package/dist/storage/MemoryStorageAdapter.d.ts +0 -6
- package/dist/storage/MemoryStorageAdapter.js +0 -21
- package/dist/storage/StorageAdapter.d.ts +0 -16
- package/dist/storage/StorageAdapter.js +0 -1
- package/dist/storage/index.d.ts +0 -2
- package/dist/storage/index.js +0 -2
- package/dist/types/bitcoin.d.ts +0 -84
- package/dist/types/bitcoin.js +0 -1
- package/dist/types/common.d.ts +0 -82
- package/dist/types/common.js +0 -1
- package/dist/types/credentials.d.ts +0 -75
- package/dist/types/credentials.js +0 -1
- package/dist/types/did.d.ts +0 -26
- package/dist/types/did.js +0 -1
- package/dist/types/index.d.ts +0 -5
- package/dist/types/index.js +0 -5
- package/dist/types/network.d.ts +0 -78
- package/dist/types/network.js +0 -145
- package/dist/utils/EventLogger.d.ts +0 -71
- package/dist/utils/EventLogger.js +0 -232
- package/dist/utils/Logger.d.ts +0 -106
- package/dist/utils/Logger.js +0 -257
- package/dist/utils/MetricsCollector.d.ts +0 -110
- package/dist/utils/MetricsCollector.js +0 -264
- package/dist/utils/bitcoin-address.d.ts +0 -38
- package/dist/utils/bitcoin-address.js +0 -113
- package/dist/utils/cbor.d.ts +0 -2
- package/dist/utils/cbor.js +0 -9
- package/dist/utils/encoding.d.ts +0 -37
- package/dist/utils/encoding.js +0 -120
- package/dist/utils/hash.d.ts +0 -1
- package/dist/utils/hash.js +0 -5
- package/dist/utils/retry.d.ts +0 -10
- package/dist/utils/retry.js +0 -35
- package/dist/utils/satoshi-validation.d.ts +0 -60
- package/dist/utils/satoshi-validation.js +0 -156
- package/dist/utils/serialization.d.ts +0 -14
- package/dist/utils/serialization.js +0 -76
- package/dist/utils/telemetry.d.ts +0 -17
- package/dist/utils/telemetry.js +0 -24
- package/dist/utils/validation.d.ts +0 -5
- package/dist/utils/validation.js +0 -98
- package/dist/vc/CredentialManager.d.ts +0 -22
- package/dist/vc/CredentialManager.js +0 -227
- package/dist/vc/Issuer.d.ts +0 -27
- package/dist/vc/Issuer.js +0 -70
- package/dist/vc/Verifier.d.ts +0 -16
- package/dist/vc/Verifier.js +0 -50
- package/dist/vc/cryptosuites/bbs.d.ts +0 -44
- package/dist/vc/cryptosuites/bbs.js +0 -213
- package/dist/vc/cryptosuites/bbsSimple.d.ts +0 -9
- package/dist/vc/cryptosuites/bbsSimple.js +0 -12
- package/dist/vc/cryptosuites/eddsa.d.ts +0 -30
- package/dist/vc/cryptosuites/eddsa.js +0 -81
- package/dist/vc/documentLoader.d.ts +0 -16
- package/dist/vc/documentLoader.js +0 -59
- package/dist/vc/proofs/data-integrity.d.ts +0 -21
- package/dist/vc/proofs/data-integrity.js +0 -15
- package/dist/vc/utils/jsonld.d.ts +0 -2
- package/dist/vc/utils/jsonld.js +0 -15
- package/test/logs/did_webvh_QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8_example_com_users_alice123_profile.jsonl +0 -1
- package/test/logs/did_webvh_QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE_example_com_users_etc_passwd.jsonl +0 -1
- package/test/logs/did_webvh_QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP_example_com_etc_passwd.jsonl +0 -1
- package/test/logs/did_webvh_QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw_example_com_users_alice.jsonl +0 -1
- package/test/logs/did_webvh_QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb_example_com_level1_level2.jsonl +0 -1
- package/test/logs/did_webvh_QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj_example_com_secret.jsonl +0 -1
- package/test/logs/did_webvh_QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG_example_com.jsonl +0 -1
- package/test/logs/did_webvh_QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf_example_com_C_Windows_System32.jsonl +0 -1
- package/test/logs/did_webvh_QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE_example_com_etc_passwd.jsonl +0 -1
- package/test/logs/did_webvh_QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL_example_com_users_etc_passwd.jsonl +0 -1
- package/test/logs/did_webvh_QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb_example_com_my_org_user_name_test_123.jsonl +0 -1
- package/test/logs/did_webvh_Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp_example_com_users_etc_passwd.jsonl +0 -1
- package/test/logs/did_webvh_QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG_example_com.jsonl +0 -1
- package/test/logs/did_webvh_Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi_example_com_users_alice.jsonl +0 -1
- package/tests/e2e/README.md +0 -97
- package/tests/e2e/example.spec.ts +0 -78
- package/tsconfig.tsbuildinfo +0 -1
|
@@ -1,30 +0,0 @@
|
|
|
1
|
-
export interface DataIntegrityProof {
|
|
2
|
-
type: 'DataIntegrityProof';
|
|
3
|
-
cryptosuite: string;
|
|
4
|
-
created?: string;
|
|
5
|
-
verificationMethod: string;
|
|
6
|
-
proofPurpose: string;
|
|
7
|
-
proofValue: string;
|
|
8
|
-
id?: string;
|
|
9
|
-
previousProof?: string | string[];
|
|
10
|
-
}
|
|
11
|
-
export interface VerificationResult {
|
|
12
|
-
verified: boolean;
|
|
13
|
-
errors?: string[];
|
|
14
|
-
}
|
|
15
|
-
export declare class EdDSACryptosuiteManager {
|
|
16
|
-
static createProof(document: any, options: any): Promise<DataIntegrityProof>;
|
|
17
|
-
static verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult>;
|
|
18
|
-
private static createProofConfiguration;
|
|
19
|
-
private static transform;
|
|
20
|
-
private static hash;
|
|
21
|
-
static sign({ data, privateKey }: {
|
|
22
|
-
data: Uint8Array;
|
|
23
|
-
privateKey: Uint8Array;
|
|
24
|
-
}): Promise<Uint8Array>;
|
|
25
|
-
static verify({ data, signature, publicKey }: {
|
|
26
|
-
data: Uint8Array;
|
|
27
|
-
signature: Uint8Array;
|
|
28
|
-
publicKey: Uint8Array;
|
|
29
|
-
}): Promise<boolean>;
|
|
30
|
-
}
|
|
@@ -1,81 +0,0 @@
|
|
|
1
|
-
import { base58 } from '@scure/base';
|
|
2
|
-
import * as ed25519 from '@noble/ed25519';
|
|
3
|
-
import { canonize, canonizeProof } from '../utils/jsonld';
|
|
4
|
-
import { multikey } from '../../crypto/Multikey';
|
|
5
|
-
import { sha256Bytes } from '../../utils/hash';
|
|
6
|
-
export class EdDSACryptosuiteManager {
|
|
7
|
-
static async createProof(document, options) {
|
|
8
|
-
const proofConfig = await this.createProofConfiguration(options);
|
|
9
|
-
const transformedData = await this.transform(document, options);
|
|
10
|
-
const hashData = await this.hash(transformedData, proofConfig, options);
|
|
11
|
-
let privateKey;
|
|
12
|
-
if (typeof options.privateKey === 'string') {
|
|
13
|
-
const dec = multikey.decodePrivateKey(options.privateKey);
|
|
14
|
-
if (dec.type !== 'Ed25519')
|
|
15
|
-
throw new Error('Invalid key type for EdDSA');
|
|
16
|
-
privateKey = dec.key;
|
|
17
|
-
}
|
|
18
|
-
else if (options.privateKey instanceof Uint8Array) {
|
|
19
|
-
privateKey = options.privateKey;
|
|
20
|
-
}
|
|
21
|
-
else {
|
|
22
|
-
throw new Error('Invalid private key format');
|
|
23
|
-
}
|
|
24
|
-
const proofValueBytes = await this.sign({ data: hashData, privateKey });
|
|
25
|
-
delete proofConfig['@context'];
|
|
26
|
-
return { ...proofConfig, proofValue: base58.encode(proofValueBytes) };
|
|
27
|
-
}
|
|
28
|
-
static async verifyProof(document, proof, options) {
|
|
29
|
-
try {
|
|
30
|
-
const documentToVerify = { ...document };
|
|
31
|
-
delete documentToVerify.proof;
|
|
32
|
-
const transformedData = await this.transform(documentToVerify, options);
|
|
33
|
-
const hashData = await this.hash(transformedData, { '@context': document['@context'], ...proof }, options);
|
|
34
|
-
const vmDoc = await options.documentLoader(proof.verificationMethod);
|
|
35
|
-
const pk = vmDoc.document.publicKeyMultibase;
|
|
36
|
-
const dec = multikey.decodePublicKey(pk);
|
|
37
|
-
if (dec.type !== 'Ed25519')
|
|
38
|
-
throw new Error('Invalid key type for EdDSA');
|
|
39
|
-
const signature = base58.decode(proof.proofValue);
|
|
40
|
-
const verified = await this.verify({ data: hashData, signature, publicKey: dec.key });
|
|
41
|
-
return verified ? { verified: true } : { verified: false, errors: ['Proof verification failed'] };
|
|
42
|
-
}
|
|
43
|
-
catch (e) {
|
|
44
|
-
return { verified: false, errors: [e?.message ?? 'Unknown verification error'] };
|
|
45
|
-
}
|
|
46
|
-
}
|
|
47
|
-
static async createProofConfiguration(options) {
|
|
48
|
-
return {
|
|
49
|
-
'@context': 'https://w3id.org/security/data-integrity/v2',
|
|
50
|
-
type: 'DataIntegrityProof',
|
|
51
|
-
cryptosuite: 'eddsa-rdfc-2022',
|
|
52
|
-
created: new Date().toISOString(),
|
|
53
|
-
verificationMethod: options.verificationMethod,
|
|
54
|
-
proofPurpose: options.proofPurpose || 'assertionMethod',
|
|
55
|
-
...(options.challenge && { challenge: options.challenge }),
|
|
56
|
-
...(options.domain && { domain: options.domain })
|
|
57
|
-
};
|
|
58
|
-
}
|
|
59
|
-
static async transform(document, options) {
|
|
60
|
-
return await canonize(document, { documentLoader: options.documentLoader });
|
|
61
|
-
}
|
|
62
|
-
static async hash(transformedData, proofConfig, options) {
|
|
63
|
-
const canonicalProofConfig = await canonizeProof(proofConfig, { documentLoader: options.documentLoader });
|
|
64
|
-
const proofConfigHash = await sha256Bytes(canonicalProofConfig);
|
|
65
|
-
const documentHash = await sha256Bytes(transformedData);
|
|
66
|
-
return new Uint8Array([...proofConfigHash, ...documentHash]);
|
|
67
|
-
}
|
|
68
|
-
static async sign({ data, privateKey }) {
|
|
69
|
-
if (privateKey.length !== 32) {
|
|
70
|
-
if (privateKey.length === 64)
|
|
71
|
-
privateKey = privateKey.slice(32);
|
|
72
|
-
else
|
|
73
|
-
throw new Error('Invalid private key length');
|
|
74
|
-
}
|
|
75
|
-
const signature = await ed25519.signAsync(Buffer.from(data).toString('hex'), Buffer.from(privateKey).toString('hex'));
|
|
76
|
-
return signature;
|
|
77
|
-
}
|
|
78
|
-
static async verify({ data, signature, publicKey }) {
|
|
79
|
-
return await ed25519.verifyAsync(Buffer.from(signature).toString('hex'), Buffer.from(data).toString('hex'), Buffer.from(publicKey).toString('hex'));
|
|
80
|
-
}
|
|
81
|
-
}
|
|
@@ -1,16 +0,0 @@
|
|
|
1
|
-
import { DIDManager } from '../did/DIDManager';
|
|
2
|
-
type LoadedDocument = {
|
|
3
|
-
document: any;
|
|
4
|
-
documentUrl: string;
|
|
5
|
-
contextUrl: string | null;
|
|
6
|
-
};
|
|
7
|
-
export declare class DocumentLoader {
|
|
8
|
-
private didManager;
|
|
9
|
-
constructor(didManager: DIDManager);
|
|
10
|
-
load(iri: string): Promise<LoadedDocument>;
|
|
11
|
-
private resolveDID;
|
|
12
|
-
}
|
|
13
|
-
export declare const createDocumentLoader: (didManager: DIDManager) => (iri: string) => Promise<LoadedDocument>;
|
|
14
|
-
export declare const verificationMethodRegistry: Map<string, any>;
|
|
15
|
-
export declare function registerVerificationMethod(vm: any): void;
|
|
16
|
-
export {};
|
|
@@ -1,59 +0,0 @@
|
|
|
1
|
-
const CONTEXTS = {
|
|
2
|
-
// Provide 1.1-compatible stubs for jsonld canonize
|
|
3
|
-
'https://www.w3.org/ns/credentials/v2': { '@context': { '@version': 1.1 } },
|
|
4
|
-
'https://w3id.org/security/data-integrity/v2': { '@context': { '@version': 1.1 } }
|
|
5
|
-
};
|
|
6
|
-
export class DocumentLoader {
|
|
7
|
-
constructor(didManager) {
|
|
8
|
-
this.didManager = didManager;
|
|
9
|
-
}
|
|
10
|
-
async load(iri) {
|
|
11
|
-
if (iri.startsWith('did:')) {
|
|
12
|
-
return this.resolveDID(iri);
|
|
13
|
-
}
|
|
14
|
-
const doc = CONTEXTS[iri];
|
|
15
|
-
if (doc) {
|
|
16
|
-
return { document: doc, documentUrl: iri, contextUrl: null };
|
|
17
|
-
}
|
|
18
|
-
throw new Error(`Document not found: ${iri}`);
|
|
19
|
-
}
|
|
20
|
-
async resolveDID(didUrl) {
|
|
21
|
-
const [did, fragment] = didUrl.split('#');
|
|
22
|
-
const didDoc = await this.didManager.resolveDID(did);
|
|
23
|
-
if (!didDoc) {
|
|
24
|
-
throw new Error(`DID not resolved: ${did}`);
|
|
25
|
-
}
|
|
26
|
-
if (fragment) {
|
|
27
|
-
// If a VM was registered explicitly, prefer it
|
|
28
|
-
const cached = verificationMethodRegistry.get(didUrl);
|
|
29
|
-
if (cached) {
|
|
30
|
-
return {
|
|
31
|
-
document: { '@context': didDoc['@context'], ...cached },
|
|
32
|
-
documentUrl: didUrl,
|
|
33
|
-
contextUrl: null
|
|
34
|
-
};
|
|
35
|
-
}
|
|
36
|
-
const vms = didDoc.verificationMethod;
|
|
37
|
-
const vm = vms?.find((m) => m.id === didUrl);
|
|
38
|
-
if (vm) {
|
|
39
|
-
return {
|
|
40
|
-
document: { '@context': didDoc['@context'], ...vm },
|
|
41
|
-
documentUrl: didUrl,
|
|
42
|
-
contextUrl: null
|
|
43
|
-
};
|
|
44
|
-
}
|
|
45
|
-
return {
|
|
46
|
-
document: { '@context': didDoc['@context'], id: didUrl },
|
|
47
|
-
documentUrl: didUrl,
|
|
48
|
-
contextUrl: null
|
|
49
|
-
};
|
|
50
|
-
}
|
|
51
|
-
return { document: didDoc, documentUrl: didUrl, contextUrl: null };
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
export const createDocumentLoader = (didManager) => (iri) => new DocumentLoader(didManager).load(iri);
|
|
55
|
-
export const verificationMethodRegistry = new Map();
|
|
56
|
-
export function registerVerificationMethod(vm) {
|
|
57
|
-
if (vm?.id)
|
|
58
|
-
verificationMethodRegistry.set(vm.id, vm);
|
|
59
|
-
}
|
|
@@ -1,21 +0,0 @@
|
|
|
1
|
-
import { type DataIntegrityProof } from '../cryptosuites/eddsa';
|
|
2
|
-
export interface VerificationResult {
|
|
3
|
-
verified: boolean;
|
|
4
|
-
errors?: string[];
|
|
5
|
-
}
|
|
6
|
-
export interface ProofOptions {
|
|
7
|
-
verificationMethod: string;
|
|
8
|
-
proofPurpose: string;
|
|
9
|
-
privateKey?: Uint8Array | string;
|
|
10
|
-
type: 'DataIntegrityProof';
|
|
11
|
-
created?: string;
|
|
12
|
-
cryptosuite: string;
|
|
13
|
-
documentLoader?: (url: string) => Promise<any>;
|
|
14
|
-
previousProof?: string | string[];
|
|
15
|
-
challenge?: string;
|
|
16
|
-
domain?: string;
|
|
17
|
-
}
|
|
18
|
-
export declare class DataIntegrityProofManager {
|
|
19
|
-
static createProof(document: any, options: ProofOptions): Promise<DataIntegrityProof>;
|
|
20
|
-
static verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult>;
|
|
21
|
-
}
|
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
import { EdDSACryptosuiteManager } from '../cryptosuites/eddsa';
|
|
2
|
-
export class DataIntegrityProofManager {
|
|
3
|
-
static async createProof(document, options) {
|
|
4
|
-
if (options.cryptosuite !== 'eddsa-rdfc-2022') {
|
|
5
|
-
throw new Error(`Unsupported cryptosuite: ${options.cryptosuite}`);
|
|
6
|
-
}
|
|
7
|
-
return await EdDSACryptosuiteManager.createProof(document, options);
|
|
8
|
-
}
|
|
9
|
-
static async verifyProof(document, proof, options) {
|
|
10
|
-
if (proof.cryptosuite !== 'eddsa-rdfc-2022') {
|
|
11
|
-
return { verified: false, errors: [`Unsupported cryptosuite: ${proof.cryptosuite}`] };
|
|
12
|
-
}
|
|
13
|
-
return await EdDSACryptosuiteManager.verifyProof(document, proof, options);
|
|
14
|
-
}
|
|
15
|
-
}
|
package/dist/vc/utils/jsonld.js
DELETED
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
import jsonld from 'jsonld';
|
|
2
|
-
export async function canonize(input, { documentLoader }) {
|
|
3
|
-
return await jsonld.canonize(input, {
|
|
4
|
-
algorithm: 'URDNA2015',
|
|
5
|
-
format: 'application/n-quads',
|
|
6
|
-
documentLoader,
|
|
7
|
-
safe: false,
|
|
8
|
-
useNative: false,
|
|
9
|
-
rdfDirection: 'i18n-datatype'
|
|
10
|
-
});
|
|
11
|
-
}
|
|
12
|
-
export async function canonizeProof(proof, { documentLoader }) {
|
|
13
|
-
const { jws, signatureValue, proofValue, ...rest } = proof;
|
|
14
|
-
return await canonize(rest, { documentLoader });
|
|
15
|
-
}
|
package/test/logs/did_webvh_QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmVFoL8KkZjSm6jbNjaSoty2VmRgsn5XcvYc2xypMKcVja","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt","updateKeys":["did:key:z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com","controller":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK","id":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com#B6rgkDkK"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2SNdJGiwveT9G28kqRze62jtek8MAEkMZiFLf73W47RV1gtY8FhMfof6JfrQodNyroKqRZLzwEo3nh5YdE9FQQzq"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmXXUezZTj4hs7XXBVmJFtqkPzq6zmfT7mnYtSy93dcqcA","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8","updateKeys":["did:key:z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile","controller":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv","id":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile#bCwUXAwv"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5SFg3UEgnznehjGcSHTv7DSfqCLbKjku8quZgJNjBcBeFCfWWUDxg3nz3s77BeiqSGg48b2LdC1V4w24qY5V7kY8"}]}
|
package/test/logs/did_webvh_QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmZbzt7KWQPDHSFZtXNac8x5T67DdXciJ7tZuH44LgNMMt","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG","updateKeys":["did:key:z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD"],"portable":true,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com","controller":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD","id":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com#QdhFFCFD"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5aM8QNrVcXbHL2b7ZVLSApwMQTtWR8Mqx6du4GjqGwuvsJjV5YcTGduyhTWx1W47Y3wxNvSxFUaC3Hjn6joFcy1N"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmaCt3oXVhW6z4zHaRUHXDDBAqK6nXbCJJcA7FeqrZaCa9","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE","updateKeys":["did:key:z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd","controller":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6","id":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd#p3VsoQH6"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3VjxJbNc7zKfi4Wghu2M1CZcCAcnViMWEZvBNp9PmL7EMXW6ujujvdmVAyVtg4nQWVCrgsT9bXkNjArP2aN9ErfX"}]}
|
package/test/logs/did_webvh_QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmbK3vTYePzoHCztpoGGLJ6g2dAbP9FaG4YNm8kq85jx1v","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg","updateKeys":["did:key:z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com","controller":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc","id":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com#7FXPMcqc"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4AYeUb5Q3fcCtxipcKAXhVYDVbEpJq9K19TQT8sRbaEbfLNB5im6zscGDGPBrUUXdmZWkDEjJy6BVHkd4zKENrEY"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmUg4dGxdziDuYMZD1iAmABeSabHtKJNof39z6T4FPurXP","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP","updateKeys":["did:key:z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd","controller":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM","id":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd#fHurjDLM"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4XunKaGmWgSNqeJgXnSgN1MjGxbyJZvQqxfbVrZHDg6zXBkjqyXTfo7FvigqqPjkGkq4PdfWU9zcsgXN7fBU8uPx"}]}
|
package/test/logs/did_webvh_QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmWZ45L2o7DsUCfSxsBanGb4chUz5Xw7H82pgUE3cWScFC","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W","updateKeys":["did:key:z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com","controller":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG","id":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com#p3K9yTRG"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2kpQ5QQJ4U9GuiFxt5q8JwQy8dyb7Sg5Q3HVqg2KzTtzfoanUEvVBhgeWv29ifkXGGesWTBqomc1XL4K3DrksR3R"}]}
|
package/test/logs/did_webvh_QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmeyQ12S1GgSyY4KXEpwRgGNZBgwenez5UUtiDJio4crXn","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc","updateKeys":["did:key:z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com","controller":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv","id":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com#XUaP15gv"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3mpWMnA398SQwaapPPEaNDjYRGSoykDjuF5x5p21XvYAi3wsURwNebRms5zTUiBJKiNNgKUShA41SxQT8NsSsgd8"}]}
|
package/test/logs/did_webvh_QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmdotkBk5VciaCbx2sWm2vRYDUYN3nJDucULS9NVk4vZqe","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M","updateKeys":["did:key:z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com","controller":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT","id":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com#DZ7U5BUT"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z626vNPHmGGa5ct13P5BhLhXYEJHZK97WM2Kuv4WvdMnjEwtmQGLeba9eEHC1G8iyk3NY1P463Ta2wt86eMQFB9aV"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmZGeHiLVXA74xRdC1NY9QS62fsreQTi3vWvKDcefiF1C3","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw","updateKeys":["did:key:z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice","controller":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i","id":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice#MbHAyj9i"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z35aNWoLZVuFUB6d2446kKN6J4sMmoqpeMSC6qLoqbYGnXgujM59LUy7wGeHS45qTPVqpKVEn1NYknDZcNGn3Kxkw"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmbTMTKdtN9ZRgjkpV18yDWKruPVX7p5w7tCu9brmzM9ac","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb","updateKeys":["did:key:z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2","controller":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R","id":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2#WW8zsm2R"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2b5GhRDenv9Sj6ziPq4bFQckvLkyXbQUedGiDJRDfBNRouS5uy9EF2Z8Xkiqse6m4DNLX4jZcxvDoNxLTDogimvx"}]}
|
package/test/logs/did_webvh_QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj_example_com_secret.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmWjKzJLDRbRvuFAcxMjdS1WiguU58nUBSbG9usbohwG6J","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj","updateKeys":["did:key:z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret","controller":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic","id":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret#MS9P2Vic"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3YWE8je7ycWYJYGzgLFipepHg92AVPJmW2quSt248FK9XwupWuXS44bjhKZsejTFFApB5mw5aau7aE1C6U7jByzH"}]}
|
package/test/logs/did_webvh_QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmUuqC3ofB2M3EUFmCWp1rc8xyi6mQ4thWbowipHJG31Cu","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG","updateKeys":["did:key:z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com","controller":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC","id":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com#77cZtKQC"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3Tm2P41cvep9vCohxFr2JNmyehHbaZdUDkJJkxBfLCTWMU9H7W6pFFVqQyL41hseL7YHwRs8S4XwzboZLGri6r4y"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmTJoptg7LHRG3nwr3Wh7QvE2rD38RhPQ6e8vHebGjpJMU","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf","updateKeys":["did:key:z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32","controller":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV","id":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32#wYpqoyiV"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5U8KhNq9NFbKgoD1dmCTtp5UgSGJCQz1ztCy78swVPaWVSNKYghiZmKAvZU68Yt7vqumYd9ERGgLoSL1mwYumkuq"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmTnMvZne37gpM7Mm7QfJ8VqAmrKSRPBYsEfYCvRqSjQaF","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE","updateKeys":["did:key:z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd","controller":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA","id":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd#XZcghunA"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3YDQo3XcnmDyoYFu1DbqcfgEmjCcSo7a37BnPpzxKTQAe4vqkoLPboPEg1zucVME6QAkM76YNQcC32FpsrNkGmic"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmQc86R7CRBV9N4rBzDeXeXmboetxZ6hUZcsm1pjzd6mdT","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL","updateKeys":["did:key:z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd","controller":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25","id":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd#E9PGPP25"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z54nZQ42iuD4TKhLHwLZv6GYrpuNCC96pnEHaDqhmBF2RtFGMND3P8bP1YX6V3wzhhbMkrjdAsMeYxGXEW8R4ew6K"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmSPMH7aH19vBqnmrCNnBbqoWyJ1V3Z2CPR2RP3WUr9VU9","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb","updateKeys":["did:key:z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123","controller":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P","id":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123#HcHdgh8P"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4TJGokkoEgzeB673Vfn2s7zBHDHDch1THKXU81NG4TATBveymiqeyeXh2m1YCufyx5civaqAQECsibYRL7JydyZi"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmduwSmHiwsJ6A9WvvJnoE8fLDvbh217VaUKEriQwk3wSQ","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp","updateKeys":["did:key:z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd","controller":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e","id":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd#FdtkuN4e"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5kTiyWGUiwnJ7snnkGkkUby3sKXF8u6CSS69UDXtTDxtXVHMwPYH95m1BWLwdLZMU6rya2ZsCbWuQgnALrNW5ZPu"}]}
|
package/test/logs/did_webvh_QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG_example_com.jsonl
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmRWV7epcDcx8MwjPKBrPDK24SPPf2CpdA4Shp7poKxCLY","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG","updateKeys":["did:key:z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com","controller":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z","id":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com#MVR3J55Z"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4trznFGa2iNb7jkMfQygeNyXhQ18aYQEW9ydvKnLwN2z2ti2VLbUi8ZwvWv17rbgNLNzGcQG5oSv9DxnJGufp6uT"}]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"versionId":"1-QmVy9mi51r2SvhNyX2ctU8XhXp8rTS4oiJpaZRX4nqscox","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi","updateKeys":["did:key:z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice","controller":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn","id":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice#r7vL5Dpn"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5h238CMZSeHD38kpCcHh12hJaQ9VJQ5c4zf3doZxzaHUkSrSTYxqbTR42ruNpBEboPcMGQPAZ7R3CddvpkEBu6mw"}]}
|
package/tests/e2e/README.md
DELETED
|
@@ -1,97 +0,0 @@
|
|
|
1
|
-
# E2E Tests with Playwright
|
|
2
|
-
|
|
3
|
-
This directory contains end-to-end (E2E) tests using [Playwright](https://playwright.dev/).
|
|
4
|
-
|
|
5
|
-
## Prerequisites
|
|
6
|
-
|
|
7
|
-
1. Install dependencies:
|
|
8
|
-
```bash
|
|
9
|
-
npm install
|
|
10
|
-
```
|
|
11
|
-
|
|
12
|
-
2. Install Playwright browsers (only needed once):
|
|
13
|
-
```bash
|
|
14
|
-
npx playwright install
|
|
15
|
-
```
|
|
16
|
-
|
|
17
|
-
## Running Tests
|
|
18
|
-
|
|
19
|
-
Run all E2E tests:
|
|
20
|
-
```bash
|
|
21
|
-
npm run test:e2e
|
|
22
|
-
```
|
|
23
|
-
|
|
24
|
-
Run tests in UI mode (interactive):
|
|
25
|
-
```bash
|
|
26
|
-
npm run test:e2e:ui
|
|
27
|
-
```
|
|
28
|
-
|
|
29
|
-
Run tests in headed mode (see the browser):
|
|
30
|
-
```bash
|
|
31
|
-
npm run test:e2e:headed
|
|
32
|
-
```
|
|
33
|
-
|
|
34
|
-
Run tests in debug mode:
|
|
35
|
-
```bash
|
|
36
|
-
npm run test:e2e:debug
|
|
37
|
-
```
|
|
38
|
-
|
|
39
|
-
## Writing Tests
|
|
40
|
-
|
|
41
|
-
Tests are written using Playwright's test runner. Here's a basic example:
|
|
42
|
-
|
|
43
|
-
```typescript
|
|
44
|
-
import { test, expect } from '@playwright/test';
|
|
45
|
-
|
|
46
|
-
test('example test', async ({ page }) => {
|
|
47
|
-
await page.goto('https://example.com');
|
|
48
|
-
await expect(page).toHaveTitle(/Example/);
|
|
49
|
-
});
|
|
50
|
-
```
|
|
51
|
-
|
|
52
|
-
## Test Structure
|
|
53
|
-
|
|
54
|
-
- `*.spec.ts` - Test files
|
|
55
|
-
- Playwright automatically discovers all `*.spec.ts` files in this directory
|
|
56
|
-
|
|
57
|
-
## Configuration
|
|
58
|
-
|
|
59
|
-
The Playwright configuration is in `playwright.config.ts` at the root of the project.
|
|
60
|
-
|
|
61
|
-
Key settings:
|
|
62
|
-
- **testDir**: `./tests/e2e`
|
|
63
|
-
- **Browsers**: Chromium, Firefox, WebKit
|
|
64
|
-
- **Reporter**: HTML report (view with `npx playwright show-report`)
|
|
65
|
-
|
|
66
|
-
## Best Practices
|
|
67
|
-
|
|
68
|
-
1. Use data-testid attributes for reliable selectors
|
|
69
|
-
2. Use page object models for complex pages
|
|
70
|
-
3. Keep tests independent and isolated
|
|
71
|
-
4. Use fixtures for setup/teardown
|
|
72
|
-
5. Run tests in parallel when possible
|
|
73
|
-
|
|
74
|
-
## Debugging
|
|
75
|
-
|
|
76
|
-
To debug a specific test:
|
|
77
|
-
```bash
|
|
78
|
-
npx playwright test --debug example.spec.ts
|
|
79
|
-
```
|
|
80
|
-
|
|
81
|
-
To view the last test report:
|
|
82
|
-
```bash
|
|
83
|
-
npx playwright show-report
|
|
84
|
-
```
|
|
85
|
-
|
|
86
|
-
## CI/CD
|
|
87
|
-
|
|
88
|
-
The tests are configured to run in CI with:
|
|
89
|
-
- Retries: 2
|
|
90
|
-
- Workers: 1 (sequential)
|
|
91
|
-
- Fail on `.only` tests
|
|
92
|
-
|
|
93
|
-
## Resources
|
|
94
|
-
|
|
95
|
-
- [Playwright Documentation](https://playwright.dev/docs/intro)
|
|
96
|
-
- [Playwright Best Practices](https://playwright.dev/docs/best-practices)
|
|
97
|
-
- [Playwright API Reference](https://playwright.dev/docs/api/class-playwright)
|
|
@@ -1,78 +0,0 @@
|
|
|
1
|
-
import { test, expect } from '@playwright/test';
|
|
2
|
-
|
|
3
|
-
/**
|
|
4
|
-
* Example Playwright test
|
|
5
|
-
*
|
|
6
|
-
* This is a basic example showing how to use Playwright for UI testing.
|
|
7
|
-
* You can modify this to test your actual application that uses the SDK.
|
|
8
|
-
*/
|
|
9
|
-
|
|
10
|
-
test.describe('Example Test Suite', () => {
|
|
11
|
-
test('basic page navigation', async ({ page }) => {
|
|
12
|
-
// Navigate to a URL
|
|
13
|
-
await page.goto('https://example.com');
|
|
14
|
-
|
|
15
|
-
// Wait for the page to load
|
|
16
|
-
await page.waitForLoadState('networkidle');
|
|
17
|
-
|
|
18
|
-
// Check the title
|
|
19
|
-
await expect(page).toHaveTitle(/Example Domain/);
|
|
20
|
-
});
|
|
21
|
-
|
|
22
|
-
test('element interaction', async ({ page }) => {
|
|
23
|
-
await page.goto('https://example.com');
|
|
24
|
-
|
|
25
|
-
// Find an element
|
|
26
|
-
const heading = page.locator('h1');
|
|
27
|
-
|
|
28
|
-
// Verify the element exists and has text
|
|
29
|
-
await expect(heading).toBeVisible();
|
|
30
|
-
await expect(heading).toHaveText(/Example Domain/);
|
|
31
|
-
});
|
|
32
|
-
|
|
33
|
-
test('click and navigation', async ({ page }) => {
|
|
34
|
-
await page.goto('https://example.com');
|
|
35
|
-
|
|
36
|
-
// Find and click a link
|
|
37
|
-
const moreInfoLink = page.locator('a:has-text("More information")');
|
|
38
|
-
await expect(moreInfoLink).toBeVisible();
|
|
39
|
-
|
|
40
|
-
// You can click and verify navigation
|
|
41
|
-
// await moreInfoLink.click();
|
|
42
|
-
// await expect(page).toHaveURL(/iana/);
|
|
43
|
-
});
|
|
44
|
-
});
|
|
45
|
-
|
|
46
|
-
/**
|
|
47
|
-
* Example test for testing SDK integration in a web application
|
|
48
|
-
*
|
|
49
|
-
* Uncomment and modify this when you have a web application that uses the SDK
|
|
50
|
-
*/
|
|
51
|
-
// test.describe('SDK Integration Tests', () => {
|
|
52
|
-
// test.beforeEach(async ({ page }) => {
|
|
53
|
-
// // Navigate to your app
|
|
54
|
-
// await page.goto('http://localhost:3000');
|
|
55
|
-
// });
|
|
56
|
-
//
|
|
57
|
-
// test('should initialize SDK', async ({ page }) => {
|
|
58
|
-
// // Test that SDK initializes correctly in the browser
|
|
59
|
-
// const sdkInitialized = await page.evaluate(() => {
|
|
60
|
-
// // Check if SDK is available on window or initialized
|
|
61
|
-
// return typeof window.OriginalsSdk !== 'undefined';
|
|
62
|
-
// });
|
|
63
|
-
//
|
|
64
|
-
// expect(sdkInitialized).toBe(true);
|
|
65
|
-
// });
|
|
66
|
-
//
|
|
67
|
-
// test('should create a digital asset', async ({ page }) => {
|
|
68
|
-
// // Fill in form for creating asset
|
|
69
|
-
// await page.fill('input[name="assetName"]', 'Test Asset');
|
|
70
|
-
// await page.fill('textarea[name="assetDescription"]', 'Test Description');
|
|
71
|
-
//
|
|
72
|
-
// // Click create button
|
|
73
|
-
// await page.click('button:has-text("Create Asset")');
|
|
74
|
-
//
|
|
75
|
-
// // Wait for success message
|
|
76
|
-
// await expect(page.locator('.success-message')).toBeVisible();
|
|
77
|
-
// });
|
|
78
|
-
// });
|