@originals/sdk 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintrc.json +33 -0
- package/.turbo/turbo-build.log +1 -0
- package/.turbo/turbo-test.log +68353 -0
- package/dist/adapters/FeeOracleMock.d.ts +6 -0
- package/dist/adapters/FeeOracleMock.js +8 -0
- package/dist/adapters/index.d.ts +4 -0
- package/dist/adapters/index.js +4 -0
- package/dist/adapters/providers/OrdHttpProvider.d.ts +56 -0
- package/dist/adapters/providers/OrdHttpProvider.js +110 -0
- package/dist/adapters/providers/OrdMockProvider.d.ts +70 -0
- package/dist/adapters/providers/OrdMockProvider.js +75 -0
- package/dist/adapters/types.d.ts +71 -0
- package/dist/adapters/types.js +1 -0
- package/dist/bitcoin/BitcoinManager.d.ts +15 -0
- package/dist/bitcoin/BitcoinManager.js +262 -0
- package/dist/bitcoin/BroadcastClient.d.ts +30 -0
- package/dist/bitcoin/BroadcastClient.js +35 -0
- package/dist/bitcoin/OrdinalsClient.d.ts +21 -0
- package/dist/bitcoin/OrdinalsClient.js +105 -0
- package/dist/bitcoin/PSBTBuilder.d.ts +24 -0
- package/dist/bitcoin/PSBTBuilder.js +80 -0
- package/dist/bitcoin/fee-calculation.d.ts +14 -0
- package/dist/bitcoin/fee-calculation.js +31 -0
- package/dist/bitcoin/providers/OrdNodeProvider.d.ts +38 -0
- package/dist/bitcoin/providers/OrdNodeProvider.js +67 -0
- package/dist/bitcoin/providers/OrdinalsProvider.d.ts +33 -0
- package/dist/bitcoin/providers/OrdinalsProvider.js +50 -0
- package/dist/bitcoin/providers/types.d.ts +63 -0
- package/dist/bitcoin/providers/types.js +1 -0
- package/dist/bitcoin/transactions/commit.d.ts +89 -0
- package/dist/bitcoin/transactions/commit.js +311 -0
- package/dist/bitcoin/transactions/index.d.ts +7 -0
- package/dist/bitcoin/transactions/index.js +8 -0
- package/dist/bitcoin/transfer.d.ts +9 -0
- package/dist/bitcoin/transfer.js +26 -0
- package/dist/bitcoin/utxo-selection.d.ts +78 -0
- package/dist/bitcoin/utxo-selection.js +237 -0
- package/dist/bitcoin/utxo.d.ts +26 -0
- package/dist/bitcoin/utxo.js +78 -0
- package/dist/contexts/credentials-v1.json +195 -0
- package/dist/contexts/credentials-v2-examples.json +5 -0
- package/dist/contexts/credentials-v2.json +301 -0
- package/dist/contexts/credentials.json +195 -0
- package/dist/contexts/data-integrity-v2.json +81 -0
- package/dist/contexts/dids.json +57 -0
- package/dist/contexts/ed255192020.json +93 -0
- package/dist/contexts/ordinals-plus.json +23 -0
- package/dist/contexts/originals.json +22 -0
- package/dist/core/OriginalsSDK.d.ts +158 -0
- package/dist/core/OriginalsSDK.js +274 -0
- package/dist/crypto/Multikey.d.ts +30 -0
- package/dist/crypto/Multikey.js +149 -0
- package/dist/crypto/Signer.d.ts +21 -0
- package/dist/crypto/Signer.js +196 -0
- package/dist/crypto/noble-init.d.ts +18 -0
- package/dist/crypto/noble-init.js +106 -0
- package/dist/did/BtcoDidResolver.d.ts +57 -0
- package/dist/did/BtcoDidResolver.js +166 -0
- package/dist/did/DIDManager.d.ts +101 -0
- package/dist/did/DIDManager.js +493 -0
- package/dist/did/Ed25519Verifier.d.ts +30 -0
- package/dist/did/Ed25519Verifier.js +59 -0
- package/dist/did/KeyManager.d.ts +17 -0
- package/dist/did/KeyManager.js +207 -0
- package/dist/did/WebVHManager.d.ts +100 -0
- package/dist/did/WebVHManager.js +304 -0
- package/dist/did/createBtcoDidDocument.d.ts +10 -0
- package/dist/did/createBtcoDidDocument.js +42 -0
- package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +23 -0
- package/dist/did/providers/OrdinalsClientProviderAdapter.js +51 -0
- package/dist/events/EventEmitter.d.ts +115 -0
- package/dist/events/EventEmitter.js +198 -0
- package/dist/events/index.d.ts +7 -0
- package/dist/events/index.js +6 -0
- package/dist/events/types.d.ts +286 -0
- package/dist/events/types.js +9 -0
- package/dist/examples/basic-usage.d.ts +3 -0
- package/dist/examples/basic-usage.js +62 -0
- package/dist/examples/run.d.ts +1 -0
- package/dist/examples/run.js +4 -0
- package/dist/index.d.ts +39 -0
- package/dist/index.js +47 -0
- package/dist/lifecycle/BatchOperations.d.ts +147 -0
- package/dist/lifecycle/BatchOperations.js +251 -0
- package/dist/lifecycle/LifecycleManager.d.ts +116 -0
- package/dist/lifecycle/LifecycleManager.js +971 -0
- package/dist/lifecycle/OriginalsAsset.d.ts +164 -0
- package/dist/lifecycle/OriginalsAsset.js +380 -0
- package/dist/lifecycle/ProvenanceQuery.d.ts +126 -0
- package/dist/lifecycle/ProvenanceQuery.js +220 -0
- package/dist/lifecycle/ResourceVersioning.d.ts +73 -0
- package/dist/lifecycle/ResourceVersioning.js +127 -0
- package/dist/migration/MigrationManager.d.ts +86 -0
- package/dist/migration/MigrationManager.js +412 -0
- package/dist/migration/audit/AuditLogger.d.ts +51 -0
- package/dist/migration/audit/AuditLogger.js +156 -0
- package/dist/migration/checkpoint/CheckpointManager.d.ts +31 -0
- package/dist/migration/checkpoint/CheckpointManager.js +96 -0
- package/dist/migration/checkpoint/CheckpointStorage.d.ts +26 -0
- package/dist/migration/checkpoint/CheckpointStorage.js +89 -0
- package/dist/migration/index.d.ts +22 -0
- package/dist/migration/index.js +27 -0
- package/dist/migration/operations/BaseMigration.d.ts +48 -0
- package/dist/migration/operations/BaseMigration.js +83 -0
- package/dist/migration/operations/PeerToBtcoMigration.d.ts +25 -0
- package/dist/migration/operations/PeerToBtcoMigration.js +67 -0
- package/dist/migration/operations/PeerToWebvhMigration.d.ts +19 -0
- package/dist/migration/operations/PeerToWebvhMigration.js +46 -0
- package/dist/migration/operations/WebvhToBtcoMigration.d.ts +25 -0
- package/dist/migration/operations/WebvhToBtcoMigration.js +67 -0
- package/dist/migration/rollback/RollbackManager.d.ts +29 -0
- package/dist/migration/rollback/RollbackManager.js +146 -0
- package/dist/migration/state/StateMachine.d.ts +25 -0
- package/dist/migration/state/StateMachine.js +76 -0
- package/dist/migration/state/StateTracker.d.ts +36 -0
- package/dist/migration/state/StateTracker.js +123 -0
- package/dist/migration/types.d.ts +306 -0
- package/dist/migration/types.js +33 -0
- package/dist/migration/validation/BitcoinValidator.d.ts +13 -0
- package/dist/migration/validation/BitcoinValidator.js +83 -0
- package/dist/migration/validation/CredentialValidator.d.ts +13 -0
- package/dist/migration/validation/CredentialValidator.js +46 -0
- package/dist/migration/validation/DIDCompatibilityValidator.d.ts +16 -0
- package/dist/migration/validation/DIDCompatibilityValidator.js +127 -0
- package/dist/migration/validation/LifecycleValidator.d.ts +10 -0
- package/dist/migration/validation/LifecycleValidator.js +52 -0
- package/dist/migration/validation/StorageValidator.d.ts +10 -0
- package/dist/migration/validation/StorageValidator.js +65 -0
- package/dist/migration/validation/ValidationPipeline.d.ts +29 -0
- package/dist/migration/validation/ValidationPipeline.js +180 -0
- package/dist/storage/LocalStorageAdapter.d.ts +11 -0
- package/dist/storage/LocalStorageAdapter.js +53 -0
- package/dist/storage/MemoryStorageAdapter.d.ts +6 -0
- package/dist/storage/MemoryStorageAdapter.js +21 -0
- package/dist/storage/StorageAdapter.d.ts +16 -0
- package/dist/storage/StorageAdapter.js +1 -0
- package/dist/storage/index.d.ts +2 -0
- package/dist/storage/index.js +2 -0
- package/dist/types/bitcoin.d.ts +84 -0
- package/dist/types/bitcoin.js +1 -0
- package/dist/types/common.d.ts +82 -0
- package/dist/types/common.js +1 -0
- package/dist/types/credentials.d.ts +75 -0
- package/dist/types/credentials.js +1 -0
- package/dist/types/did.d.ts +26 -0
- package/dist/types/did.js +1 -0
- package/dist/types/index.d.ts +5 -0
- package/dist/types/index.js +5 -0
- package/dist/types/network.d.ts +78 -0
- package/dist/types/network.js +145 -0
- package/dist/utils/EventLogger.d.ts +71 -0
- package/dist/utils/EventLogger.js +232 -0
- package/dist/utils/Logger.d.ts +106 -0
- package/dist/utils/Logger.js +257 -0
- package/dist/utils/MetricsCollector.d.ts +110 -0
- package/dist/utils/MetricsCollector.js +264 -0
- package/dist/utils/bitcoin-address.d.ts +38 -0
- package/dist/utils/bitcoin-address.js +113 -0
- package/dist/utils/cbor.d.ts +2 -0
- package/dist/utils/cbor.js +9 -0
- package/dist/utils/encoding.d.ts +37 -0
- package/dist/utils/encoding.js +120 -0
- package/dist/utils/hash.d.ts +1 -0
- package/dist/utils/hash.js +5 -0
- package/dist/utils/retry.d.ts +10 -0
- package/dist/utils/retry.js +35 -0
- package/dist/utils/satoshi-validation.d.ts +60 -0
- package/dist/utils/satoshi-validation.js +156 -0
- package/dist/utils/serialization.d.ts +14 -0
- package/dist/utils/serialization.js +76 -0
- package/dist/utils/telemetry.d.ts +17 -0
- package/dist/utils/telemetry.js +24 -0
- package/dist/utils/validation.d.ts +5 -0
- package/dist/utils/validation.js +98 -0
- package/dist/vc/CredentialManager.d.ts +22 -0
- package/dist/vc/CredentialManager.js +227 -0
- package/dist/vc/Issuer.d.ts +27 -0
- package/dist/vc/Issuer.js +70 -0
- package/dist/vc/Verifier.d.ts +16 -0
- package/dist/vc/Verifier.js +50 -0
- package/dist/vc/cryptosuites/bbs.d.ts +44 -0
- package/dist/vc/cryptosuites/bbs.js +213 -0
- package/dist/vc/cryptosuites/bbsSimple.d.ts +9 -0
- package/dist/vc/cryptosuites/bbsSimple.js +12 -0
- package/dist/vc/cryptosuites/eddsa.d.ts +30 -0
- package/dist/vc/cryptosuites/eddsa.js +81 -0
- package/dist/vc/documentLoader.d.ts +16 -0
- package/dist/vc/documentLoader.js +59 -0
- package/dist/vc/proofs/data-integrity.d.ts +21 -0
- package/dist/vc/proofs/data-integrity.js +15 -0
- package/dist/vc/utils/jsonld.d.ts +2 -0
- package/dist/vc/utils/jsonld.js +15 -0
- package/package.json +79 -0
- package/src/adapters/FeeOracleMock.ts +9 -0
- package/src/adapters/index.ts +5 -0
- package/src/adapters/providers/OrdHttpProvider.ts +126 -0
- package/src/adapters/providers/OrdMockProvider.ts +101 -0
- package/src/adapters/types.ts +66 -0
- package/src/bitcoin/BitcoinManager.ts +330 -0
- package/src/bitcoin/BroadcastClient.ts +54 -0
- package/src/bitcoin/OrdinalsClient.ts +119 -0
- package/src/bitcoin/PSBTBuilder.ts +106 -0
- package/src/bitcoin/fee-calculation.ts +38 -0
- package/src/bitcoin/providers/OrdNodeProvider.ts +92 -0
- package/src/bitcoin/providers/OrdinalsProvider.ts +56 -0
- package/src/bitcoin/providers/types.ts +59 -0
- package/src/bitcoin/transactions/commit.ts +465 -0
- package/src/bitcoin/transactions/index.ts +13 -0
- package/src/bitcoin/transfer.ts +43 -0
- package/src/bitcoin/utxo-selection.ts +322 -0
- package/src/bitcoin/utxo.ts +113 -0
- package/src/contexts/credentials-v1.json +237 -0
- package/src/contexts/credentials-v2-examples.json +5 -0
- package/src/contexts/credentials-v2.json +340 -0
- package/src/contexts/credentials.json +237 -0
- package/src/contexts/data-integrity-v2.json +81 -0
- package/src/contexts/dids.json +58 -0
- package/src/contexts/ed255192020.json +93 -0
- package/src/contexts/ordinals-plus.json +23 -0
- package/src/contexts/originals.json +22 -0
- package/src/core/OriginalsSDK.ts +416 -0
- package/src/crypto/Multikey.ts +194 -0
- package/src/crypto/Signer.ts +254 -0
- package/src/crypto/noble-init.ts +121 -0
- package/src/did/BtcoDidResolver.ts +227 -0
- package/src/did/DIDManager.ts +694 -0
- package/src/did/Ed25519Verifier.ts +68 -0
- package/src/did/KeyManager.ts +236 -0
- package/src/did/WebVHManager.ts +489 -0
- package/src/did/createBtcoDidDocument.ts +59 -0
- package/src/did/providers/OrdinalsClientProviderAdapter.ts +68 -0
- package/src/events/EventEmitter.ts +222 -0
- package/src/events/index.ts +19 -0
- package/src/events/types.ts +331 -0
- package/src/examples/basic-usage.ts +78 -0
- package/src/examples/run.ts +5 -0
- package/src/index.ts +84 -0
- package/src/lifecycle/BatchOperations.ts +373 -0
- package/src/lifecycle/LifecycleManager.ts +1218 -0
- package/src/lifecycle/OriginalsAsset.ts +524 -0
- package/src/lifecycle/ProvenanceQuery.ts +280 -0
- package/src/lifecycle/ResourceVersioning.ts +163 -0
- package/src/migration/MigrationManager.ts +527 -0
- package/src/migration/audit/AuditLogger.ts +176 -0
- package/src/migration/checkpoint/CheckpointManager.ts +112 -0
- package/src/migration/checkpoint/CheckpointStorage.ts +101 -0
- package/src/migration/index.ts +33 -0
- package/src/migration/operations/BaseMigration.ts +126 -0
- package/src/migration/operations/PeerToBtcoMigration.ts +105 -0
- package/src/migration/operations/PeerToWebvhMigration.ts +62 -0
- package/src/migration/operations/WebvhToBtcoMigration.ts +105 -0
- package/src/migration/rollback/RollbackManager.ts +170 -0
- package/src/migration/state/StateMachine.ts +92 -0
- package/src/migration/state/StateTracker.ts +156 -0
- package/src/migration/types.ts +344 -0
- package/src/migration/validation/BitcoinValidator.ts +107 -0
- package/src/migration/validation/CredentialValidator.ts +62 -0
- package/src/migration/validation/DIDCompatibilityValidator.ts +151 -0
- package/src/migration/validation/LifecycleValidator.ts +64 -0
- package/src/migration/validation/StorageValidator.ts +79 -0
- package/src/migration/validation/ValidationPipeline.ts +213 -0
- package/src/storage/LocalStorageAdapter.ts +61 -0
- package/src/storage/MemoryStorageAdapter.ts +29 -0
- package/src/storage/StorageAdapter.ts +25 -0
- package/src/storage/index.ts +3 -0
- package/src/types/bitcoin.ts +98 -0
- package/src/types/common.ts +92 -0
- package/src/types/credentials.ts +88 -0
- package/src/types/did.ts +31 -0
- package/src/types/external-shims.d.ts +53 -0
- package/src/types/index.ts +7 -0
- package/src/types/network.ts +175 -0
- package/src/utils/EventLogger.ts +298 -0
- package/src/utils/Logger.ts +322 -0
- package/src/utils/MetricsCollector.ts +358 -0
- package/src/utils/bitcoin-address.ts +130 -0
- package/src/utils/cbor.ts +12 -0
- package/src/utils/encoding.ts +127 -0
- package/src/utils/hash.ts +6 -0
- package/src/utils/retry.ts +46 -0
- package/src/utils/satoshi-validation.ts +196 -0
- package/src/utils/serialization.ts +96 -0
- package/src/utils/telemetry.ts +40 -0
- package/src/utils/validation.ts +119 -0
- package/src/vc/CredentialManager.ts +273 -0
- package/src/vc/Issuer.ts +100 -0
- package/src/vc/Verifier.ts +47 -0
- package/src/vc/cryptosuites/bbs.ts +253 -0
- package/src/vc/cryptosuites/bbsSimple.ts +21 -0
- package/src/vc/cryptosuites/eddsa.ts +99 -0
- package/src/vc/documentLoader.ts +67 -0
- package/src/vc/proofs/data-integrity.ts +33 -0
- package/src/vc/utils/jsonld.ts +18 -0
- package/test/logs/did_webvh_QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8_example_com_users_alice123_profile.jsonl +1 -0
- package/test/logs/did_webvh_QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE_example_com_users_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP_example_com_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw_example_com_users_alice.jsonl +1 -0
- package/test/logs/did_webvh_QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb_example_com_level1_level2.jsonl +1 -0
- package/test/logs/did_webvh_QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj_example_com_secret.jsonl +1 -0
- package/test/logs/did_webvh_QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf_example_com_C_Windows_System32.jsonl +1 -0
- package/test/logs/did_webvh_QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE_example_com_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL_example_com_users_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb_example_com_my_org_user_name_test_123.jsonl +1 -0
- package/test/logs/did_webvh_Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp_example_com_users_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG_example_com.jsonl +1 -0
- package/test/logs/did_webvh_Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi_example_com_users_alice.jsonl +1 -0
- package/tests/__mocks__/bbs-signatures.js +17 -0
- package/tests/__mocks__/mf-base58.js +24 -0
- package/tests/e2e/README.md +97 -0
- package/tests/e2e/example.spec.ts +78 -0
- package/tests/fixtures/did-documents.ts +247 -0
- package/tests/index.test.ts +21 -0
- package/tests/integration/BatchOperations.test.ts +531 -0
- package/tests/integration/CompleteLifecycle.e2e.test.ts +735 -0
- package/tests/integration/CredentialManager.test.ts +42 -0
- package/tests/integration/DIDManager.test.ts +41 -0
- package/tests/integration/DidPeerToWebVhFlow.test.ts +351 -0
- package/tests/integration/Events.test.ts +435 -0
- package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +25 -0
- package/tests/integration/LifecycleManager.test.ts +21 -0
- package/tests/integration/MultikeyFlow.test.ts +52 -0
- package/tests/integration/TelemetryIntegration.test.ts +395 -0
- package/tests/integration/WebVhPublish.test.ts +48 -0
- package/tests/integration/migration/peer-to-webvh.test.ts +172 -0
- package/tests/manual/test-commit-creation.ts +323 -0
- package/tests/mocks/MockKeyStore.ts +38 -0
- package/tests/mocks/adapters/MemoryStorageAdapter.ts +24 -0
- package/tests/mocks/adapters/MockFeeOracle.ts +11 -0
- package/tests/mocks/adapters/MockOrdinalsProvider.ts +76 -0
- package/tests/mocks/adapters/OrdMockProvider.test.ts +176 -0
- package/tests/mocks/adapters/index.ts +6 -0
- package/tests/performance/BatchOperations.perf.test.ts +403 -0
- package/tests/performance/logging.perf.test.ts +336 -0
- package/tests/sdk.test.ts +43 -0
- package/tests/security/bitcoin-penetration-tests.test.ts +622 -0
- package/tests/setup.bun.ts +69 -0
- package/tests/setup.jest.ts +23 -0
- package/tests/stress/batch-operations-stress.test.ts +571 -0
- package/tests/unit/adapters/FeeOracleMock.test.ts +40 -0
- package/tests/unit/bitcoin/BitcoinManager.test.ts +293 -0
- package/tests/unit/bitcoin/BroadcastClient.test.ts +52 -0
- package/tests/unit/bitcoin/OrdNodeProvider.test.ts +53 -0
- package/tests/unit/bitcoin/OrdinalsClient.test.ts +381 -0
- package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +102 -0
- package/tests/unit/bitcoin/PSBTBuilder.test.ts +84 -0
- package/tests/unit/bitcoin/fee-calculation.test.ts +261 -0
- package/tests/unit/bitcoin/transactions/commit.test.ts +649 -0
- package/tests/unit/bitcoin/transfer.test.ts +31 -0
- package/tests/unit/bitcoin/utxo-selection-new.test.ts +502 -0
- package/tests/unit/bitcoin/utxo.more.test.ts +39 -0
- package/tests/unit/bitcoin/utxo.selection.test.ts +38 -0
- package/tests/unit/core/OriginalsSDK.test.ts +152 -0
- package/tests/unit/crypto/Multikey.test.ts +206 -0
- package/tests/unit/crypto/Signer.test.ts +408 -0
- package/tests/unit/did/BtcoDidResolver.test.ts +611 -0
- package/tests/unit/did/DIDManager.more.test.ts +43 -0
- package/tests/unit/did/DIDManager.test.ts +185 -0
- package/tests/unit/did/Ed25519Verifier.test.ts +160 -0
- package/tests/unit/did/KeyManager.test.ts +452 -0
- package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +45 -0
- package/tests/unit/did/WebVHManager.test.ts +435 -0
- package/tests/unit/did/createBtcoDidDocument.test.ts +67 -0
- package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +159 -0
- package/tests/unit/events/EventEmitter.test.ts +407 -0
- package/tests/unit/lifecycle/BatchOperations.test.ts +527 -0
- package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +312 -0
- package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +18 -0
- package/tests/unit/lifecycle/LifecycleManager.test.ts +213 -0
- package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +30 -0
- package/tests/unit/lifecycle/OriginalsAsset.test.ts +176 -0
- package/tests/unit/lifecycle/ProvenanceQuery.test.ts +577 -0
- package/tests/unit/lifecycle/ResourceVersioning.test.ts +651 -0
- package/tests/unit/storage/MemoryStorageAdapter.test.ts +93 -0
- package/tests/unit/types/network.test.ts +255 -0
- package/tests/unit/utils/EventIntegration.test.ts +384 -0
- package/tests/unit/utils/Logger.test.ts +473 -0
- package/tests/unit/utils/MetricsCollector.test.ts +358 -0
- package/tests/unit/utils/bitcoin-address.test.ts +250 -0
- package/tests/unit/utils/cbor.test.ts +35 -0
- package/tests/unit/utils/encoding.test.ts +318 -0
- package/tests/unit/utils/hash.test.ts +12 -0
- package/tests/unit/utils/retry.test.ts +100 -0
- package/tests/unit/utils/satoshi-validation.test.ts +354 -0
- package/tests/unit/utils/serialization.test.ts +124 -0
- package/tests/unit/utils/telemetry.test.ts +52 -0
- package/tests/unit/utils/validation.test.ts +141 -0
- package/tests/unit/vc/CredentialManager.test.ts +487 -0
- package/tests/unit/vc/Issuer.test.ts +107 -0
- package/tests/unit/vc/Verifier.test.ts +525 -0
- package/tests/unit/vc/bbs.test.ts +282 -0
- package/tests/unit/vc/cryptosuites/eddsa.test.ts +398 -0
- package/tests/unit/vc/documentLoader.test.ts +121 -0
- package/tests/unit/vc/proofs/data-integrity.test.ts +24 -0
- package/tsconfig.json +32 -0
- package/tsconfig.test.json +15 -0
- package/tsconfig.tsbuildinfo +1 -0
|
@@ -0,0 +1,227 @@
|
|
|
1
|
+
import { canonicalizeDocument } from '../utils/serialization';
|
|
2
|
+
import { encodeBase64UrlMultibase, decodeBase64UrlMultibase } from '../utils/encoding';
|
|
3
|
+
import { sha256 } from '@noble/hashes/sha2.js';
|
|
4
|
+
import { ES256KSigner, Ed25519Signer, ES256Signer } from '../crypto/Signer';
|
|
5
|
+
import { Issuer } from './Issuer';
|
|
6
|
+
import { createDocumentLoader } from './documentLoader';
|
|
7
|
+
import { Verifier } from './Verifier';
|
|
8
|
+
export class CredentialManager {
|
|
9
|
+
constructor(config, didManager) {
|
|
10
|
+
this.config = config;
|
|
11
|
+
this.didManager = didManager;
|
|
12
|
+
}
|
|
13
|
+
async createResourceCredential(type, subject, issuer) {
|
|
14
|
+
return {
|
|
15
|
+
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
16
|
+
type: ['VerifiableCredential', type],
|
|
17
|
+
issuer,
|
|
18
|
+
issuanceDate: new Date().toISOString(),
|
|
19
|
+
credentialSubject: subject
|
|
20
|
+
};
|
|
21
|
+
}
|
|
22
|
+
async signCredential(credential, privateKeyMultibase, verificationMethod) {
|
|
23
|
+
if (this.didManager && typeof verificationMethod === 'string' && verificationMethod.startsWith('did:')) {
|
|
24
|
+
try {
|
|
25
|
+
const loader = createDocumentLoader(this.didManager);
|
|
26
|
+
const { document } = await loader(verificationMethod);
|
|
27
|
+
if (document && document.publicKeyMultibase) {
|
|
28
|
+
const vm = {
|
|
29
|
+
id: verificationMethod,
|
|
30
|
+
controller: typeof credential.issuer === 'string' ? credential.issuer : credential.issuer?.id,
|
|
31
|
+
publicKeyMultibase: document.publicKeyMultibase,
|
|
32
|
+
secretKeyMultibase: privateKeyMultibase,
|
|
33
|
+
type: document.type || 'Multikey'
|
|
34
|
+
};
|
|
35
|
+
const issuer = new Issuer(this.didManager, vm);
|
|
36
|
+
const unsigned = { ...credential };
|
|
37
|
+
delete unsigned['@context'];
|
|
38
|
+
delete unsigned.proof;
|
|
39
|
+
return issuer.issueCredential(unsigned, { proofPurpose: 'assertionMethod' });
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
catch {
|
|
43
|
+
// fall through to legacy signing
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
// fallback to legacy local signer
|
|
47
|
+
const proofBase = {
|
|
48
|
+
type: 'DataIntegrityProof',
|
|
49
|
+
created: new Date().toISOString(),
|
|
50
|
+
verificationMethod,
|
|
51
|
+
proofPurpose: 'assertionMethod',
|
|
52
|
+
proofValue: ''
|
|
53
|
+
};
|
|
54
|
+
const proofValue = await this.generateProofValue(credential, privateKeyMultibase, proofBase);
|
|
55
|
+
const proof = { ...proofBase, proofValue };
|
|
56
|
+
return { ...credential, proof };
|
|
57
|
+
}
|
|
58
|
+
/**
|
|
59
|
+
* Sign a credential using an external signer (e.g., hardware wallet, Privy)
|
|
60
|
+
* @param credential - The unsigned credential
|
|
61
|
+
* @param signer - External signer implementation
|
|
62
|
+
* @returns Signed verifiable credential
|
|
63
|
+
*/
|
|
64
|
+
async signCredentialWithExternalSigner(credential, signer) {
|
|
65
|
+
const verificationMethodId = await signer.getVerificationMethodId();
|
|
66
|
+
// Create proof structure
|
|
67
|
+
const proofBase = {
|
|
68
|
+
type: 'DataIntegrityProof',
|
|
69
|
+
cryptosuite: 'eddsa-rdfc-2022', // Or derive from signer type
|
|
70
|
+
created: new Date().toISOString(),
|
|
71
|
+
verificationMethod: verificationMethodId,
|
|
72
|
+
proofPurpose: 'assertionMethod'
|
|
73
|
+
};
|
|
74
|
+
// Prepare unsigned credential
|
|
75
|
+
const unsignedCredential = { ...credential };
|
|
76
|
+
delete unsignedCredential.proof;
|
|
77
|
+
// Use external signer to sign
|
|
78
|
+
const { proofValue } = await signer.sign({
|
|
79
|
+
document: unsignedCredential,
|
|
80
|
+
proof: proofBase
|
|
81
|
+
});
|
|
82
|
+
// Return signed credential
|
|
83
|
+
return {
|
|
84
|
+
...credential,
|
|
85
|
+
proof: {
|
|
86
|
+
...proofBase,
|
|
87
|
+
proofValue
|
|
88
|
+
}
|
|
89
|
+
};
|
|
90
|
+
}
|
|
91
|
+
async verifyCredential(credential) {
|
|
92
|
+
if (this.didManager) {
|
|
93
|
+
const proofAny = credential.proof;
|
|
94
|
+
if (proofAny && (proofAny.cryptosuite || (Array.isArray(proofAny) && proofAny[0]?.cryptosuite))) {
|
|
95
|
+
const verifier = new Verifier(this.didManager);
|
|
96
|
+
const res = await verifier.verifyCredential(credential);
|
|
97
|
+
return res.verified;
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
const proof = credential.proof;
|
|
101
|
+
if (!proof) {
|
|
102
|
+
return false;
|
|
103
|
+
}
|
|
104
|
+
const { proofValue, verificationMethod } = proof;
|
|
105
|
+
if (!proofValue || !verificationMethod)
|
|
106
|
+
return false;
|
|
107
|
+
const signature = this.decodeMultibase(proofValue);
|
|
108
|
+
if (!signature)
|
|
109
|
+
return false;
|
|
110
|
+
const proofSansValue = { ...proof };
|
|
111
|
+
delete proofSansValue.proofValue;
|
|
112
|
+
const proofInput = { ...proofSansValue };
|
|
113
|
+
const credentialContext = credential['@context'];
|
|
114
|
+
if (credentialContext && !proofInput['@context']) {
|
|
115
|
+
proofInput['@context'] = credentialContext;
|
|
116
|
+
}
|
|
117
|
+
const unsignedCredential = { ...credential };
|
|
118
|
+
delete unsignedCredential.proof;
|
|
119
|
+
const c14nProof = await canonicalizeDocument(proofInput);
|
|
120
|
+
const c14nCred = await canonicalizeDocument(unsignedCredential);
|
|
121
|
+
const hProof = Buffer.from(sha256(Buffer.from(c14nProof, 'utf8')));
|
|
122
|
+
const hCred = Buffer.from(sha256(Buffer.from(c14nCred, 'utf8')));
|
|
123
|
+
const digest = Buffer.concat([hProof, hCred]);
|
|
124
|
+
const signer = this.getSigner();
|
|
125
|
+
try {
|
|
126
|
+
const resolvedKey = proof.publicKeyMultibase
|
|
127
|
+
|| await this.resolveVerificationMethodMultibase(verificationMethod);
|
|
128
|
+
if (!resolvedKey) {
|
|
129
|
+
return false;
|
|
130
|
+
}
|
|
131
|
+
return await signer.verify(Buffer.from(digest), Buffer.from(signature), resolvedKey);
|
|
132
|
+
}
|
|
133
|
+
catch {
|
|
134
|
+
return false;
|
|
135
|
+
}
|
|
136
|
+
}
|
|
137
|
+
async createPresentation(credentials, holder) {
|
|
138
|
+
return {
|
|
139
|
+
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
140
|
+
type: ['VerifiablePresentation'],
|
|
141
|
+
holder,
|
|
142
|
+
verifiableCredential: credentials
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
async generateProofValue(credential, privateKeyMultibase, proofBase) {
|
|
146
|
+
// Construct canonical digest including provided proof sans proofValue
|
|
147
|
+
const proofSansValue = { ...proofBase };
|
|
148
|
+
delete proofSansValue.proofValue;
|
|
149
|
+
const proofInput = { ...proofSansValue };
|
|
150
|
+
const credentialContext = credential['@context'];
|
|
151
|
+
if (credentialContext && !proofInput['@context']) {
|
|
152
|
+
proofInput['@context'] = credentialContext;
|
|
153
|
+
}
|
|
154
|
+
const unsignedCredential = { ...credential };
|
|
155
|
+
delete unsignedCredential.proof;
|
|
156
|
+
const c14nProof = await canonicalizeDocument(proofInput);
|
|
157
|
+
const c14nCred = await canonicalizeDocument(unsignedCredential);
|
|
158
|
+
const hProof = Buffer.from(sha256(Buffer.from(c14nProof, 'utf8')));
|
|
159
|
+
const hCred = Buffer.from(sha256(Buffer.from(c14nCred, 'utf8')));
|
|
160
|
+
const digest = Buffer.concat([hProof, hCred]);
|
|
161
|
+
const signer = this.getSigner();
|
|
162
|
+
const sig = await signer.sign(Buffer.from(digest), privateKeyMultibase);
|
|
163
|
+
return encodeBase64UrlMultibase(sig);
|
|
164
|
+
}
|
|
165
|
+
getSigner() {
|
|
166
|
+
switch (this.config.defaultKeyType) {
|
|
167
|
+
case 'ES256K':
|
|
168
|
+
return new ES256KSigner();
|
|
169
|
+
case 'Ed25519':
|
|
170
|
+
return new Ed25519Signer();
|
|
171
|
+
case 'ES256':
|
|
172
|
+
return new ES256Signer();
|
|
173
|
+
default:
|
|
174
|
+
return new ES256KSigner();
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
async resolveVerificationMethodMultibase(verificationMethod) {
|
|
178
|
+
if (typeof verificationMethod === 'string' && verificationMethod.startsWith('z')) {
|
|
179
|
+
return verificationMethod;
|
|
180
|
+
}
|
|
181
|
+
if (!this.didManager || typeof verificationMethod !== 'string' || !verificationMethod.startsWith('did:')) {
|
|
182
|
+
return null;
|
|
183
|
+
}
|
|
184
|
+
const loader = createDocumentLoader(this.didManager);
|
|
185
|
+
try {
|
|
186
|
+
const { document } = await loader(verificationMethod);
|
|
187
|
+
if (document && typeof document.publicKeyMultibase === 'string') {
|
|
188
|
+
return document.publicKeyMultibase;
|
|
189
|
+
}
|
|
190
|
+
}
|
|
191
|
+
catch (err) {
|
|
192
|
+
// Document loader failed; will try alternative resolution method
|
|
193
|
+
if (this.config.enableLogging) {
|
|
194
|
+
console.warn('Failed to load verification method via document loader:', err);
|
|
195
|
+
}
|
|
196
|
+
}
|
|
197
|
+
try {
|
|
198
|
+
const did = verificationMethod.split('#')[0];
|
|
199
|
+
if (!did) {
|
|
200
|
+
return null;
|
|
201
|
+
}
|
|
202
|
+
const didDoc = await this.didManager.resolveDID(did);
|
|
203
|
+
const vms = didDoc?.verificationMethod;
|
|
204
|
+
if (Array.isArray(vms)) {
|
|
205
|
+
const vm = vms.find((m) => m?.id === verificationMethod);
|
|
206
|
+
if (vm && typeof vm.publicKeyMultibase === 'string') {
|
|
207
|
+
return vm.publicKeyMultibase;
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
catch (err) {
|
|
212
|
+
// Failed to resolve DID document
|
|
213
|
+
if (this.config.enableLogging) {
|
|
214
|
+
console.warn('Failed to resolve DID for verification method:', err);
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
return null;
|
|
218
|
+
}
|
|
219
|
+
decodeMultibase(s) {
|
|
220
|
+
try {
|
|
221
|
+
return decodeBase64UrlMultibase(s);
|
|
222
|
+
}
|
|
223
|
+
catch {
|
|
224
|
+
return null;
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { VerifiableCredential, VerifiablePresentation } from '../types';
|
|
2
|
+
import { DIDManager } from '../did/DIDManager';
|
|
3
|
+
export interface IssueOptions {
|
|
4
|
+
proofPurpose: 'assertionMethod' | 'authentication';
|
|
5
|
+
documentLoader?: (iri: string) => Promise<{
|
|
6
|
+
document: any;
|
|
7
|
+
documentUrl: string;
|
|
8
|
+
contextUrl: string | null;
|
|
9
|
+
}>;
|
|
10
|
+
challenge?: string;
|
|
11
|
+
domain?: string;
|
|
12
|
+
}
|
|
13
|
+
export type VerificationMethodLike = {
|
|
14
|
+
id: string;
|
|
15
|
+
controller: string;
|
|
16
|
+
publicKeyMultibase: string;
|
|
17
|
+
secretKeyMultibase?: string;
|
|
18
|
+
type?: 'Multikey' | string;
|
|
19
|
+
};
|
|
20
|
+
export declare class Issuer {
|
|
21
|
+
private didManager;
|
|
22
|
+
private verificationMethod;
|
|
23
|
+
constructor(didManager: DIDManager, verificationMethod: VerificationMethodLike);
|
|
24
|
+
private inferKeyType;
|
|
25
|
+
issueCredential(unsigned: Omit<VerifiableCredential, '@context' | 'proof'>, options: IssueOptions): Promise<VerifiableCredential>;
|
|
26
|
+
issuePresentation(presentation: Omit<VerifiablePresentation, '@context' | 'proof'>, options: IssueOptions): Promise<VerifiablePresentation>;
|
|
27
|
+
}
|
|
@@ -0,0 +1,70 @@
|
|
|
1
|
+
import { multikey } from '../crypto/Multikey';
|
|
2
|
+
import { createDocumentLoader } from './documentLoader';
|
|
3
|
+
import { DataIntegrityProofManager } from './proofs/data-integrity';
|
|
4
|
+
export class Issuer {
|
|
5
|
+
constructor(didManager, verificationMethod) {
|
|
6
|
+
this.didManager = didManager;
|
|
7
|
+
this.verificationMethod = verificationMethod;
|
|
8
|
+
}
|
|
9
|
+
inferKeyType(publicKeyMultibase) {
|
|
10
|
+
try {
|
|
11
|
+
return multikey.decodePublicKey(publicKeyMultibase).type;
|
|
12
|
+
}
|
|
13
|
+
catch {
|
|
14
|
+
return 'Ed25519';
|
|
15
|
+
}
|
|
16
|
+
}
|
|
17
|
+
async issueCredential(unsigned, options) {
|
|
18
|
+
const documentLoader = options.documentLoader || createDocumentLoader(this.didManager);
|
|
19
|
+
await documentLoader(this.verificationMethod.id);
|
|
20
|
+
const issuerId = typeof unsigned.issuer === 'string' ? unsigned.issuer : unsigned.issuer?.id;
|
|
21
|
+
const credential = {
|
|
22
|
+
...unsigned,
|
|
23
|
+
'@context': ['https://www.w3.org/ns/credentials/v2'],
|
|
24
|
+
issuer: issuerId || this.verificationMethod.controller,
|
|
25
|
+
proof: undefined
|
|
26
|
+
};
|
|
27
|
+
if (!this.verificationMethod.secretKeyMultibase) {
|
|
28
|
+
throw new Error('Missing secretKeyMultibase for issuance');
|
|
29
|
+
}
|
|
30
|
+
const keyType = this.inferKeyType(this.verificationMethod.publicKeyMultibase);
|
|
31
|
+
if (keyType !== 'Ed25519') {
|
|
32
|
+
throw new Error('Only Ed25519 supported for eddsa-rdfc-2022');
|
|
33
|
+
}
|
|
34
|
+
const proof = await DataIntegrityProofManager.createProof(credential, {
|
|
35
|
+
verificationMethod: this.verificationMethod.id,
|
|
36
|
+
proofPurpose: options.proofPurpose,
|
|
37
|
+
cryptosuite: 'eddsa-rdfc-2022',
|
|
38
|
+
type: 'DataIntegrityProof',
|
|
39
|
+
privateKey: this.verificationMethod.secretKeyMultibase,
|
|
40
|
+
documentLoader
|
|
41
|
+
});
|
|
42
|
+
return { ...credential, proof };
|
|
43
|
+
}
|
|
44
|
+
async issuePresentation(presentation, options) {
|
|
45
|
+
const documentLoader = options.documentLoader || createDocumentLoader(this.didManager);
|
|
46
|
+
await documentLoader(this.verificationMethod.id);
|
|
47
|
+
if (!this.verificationMethod.secretKeyMultibase) {
|
|
48
|
+
throw new Error('Missing secretKeyMultibase for issuance');
|
|
49
|
+
}
|
|
50
|
+
const keyType = this.inferKeyType(this.verificationMethod.publicKeyMultibase);
|
|
51
|
+
if (keyType !== 'Ed25519') {
|
|
52
|
+
throw new Error('Only Ed25519 supported for eddsa-rdfc-2022');
|
|
53
|
+
}
|
|
54
|
+
const proof = await DataIntegrityProofManager.createProof({ ...presentation, '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
|
|
55
|
+
verificationMethod: this.verificationMethod.id,
|
|
56
|
+
proofPurpose: options.proofPurpose,
|
|
57
|
+
cryptosuite: 'eddsa-rdfc-2022',
|
|
58
|
+
type: 'DataIntegrityProof',
|
|
59
|
+
privateKey: this.verificationMethod.secretKeyMultibase,
|
|
60
|
+
challenge: options.challenge,
|
|
61
|
+
domain: options.domain,
|
|
62
|
+
documentLoader
|
|
63
|
+
});
|
|
64
|
+
return {
|
|
65
|
+
...presentation,
|
|
66
|
+
'@context': ['https://www.w3.org/ns/credentials/v2'],
|
|
67
|
+
proof
|
|
68
|
+
};
|
|
69
|
+
}
|
|
70
|
+
}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
import { VerifiableCredential, VerifiablePresentation } from '../types';
|
|
2
|
+
import { DIDManager } from '../did/DIDManager';
|
|
3
|
+
export type VerificationResult = {
|
|
4
|
+
verified: boolean;
|
|
5
|
+
errors: string[];
|
|
6
|
+
};
|
|
7
|
+
export declare class Verifier {
|
|
8
|
+
private didManager;
|
|
9
|
+
constructor(didManager: DIDManager);
|
|
10
|
+
verifyCredential(vc: VerifiableCredential, options?: {
|
|
11
|
+
documentLoader?: (iri: string) => Promise<any>;
|
|
12
|
+
}): Promise<VerificationResult>;
|
|
13
|
+
verifyPresentation(vp: VerifiablePresentation, options?: {
|
|
14
|
+
documentLoader?: (iri: string) => Promise<any>;
|
|
15
|
+
}): Promise<VerificationResult>;
|
|
16
|
+
}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
import { createDocumentLoader } from './documentLoader';
|
|
2
|
+
import { DataIntegrityProofManager } from './proofs/data-integrity';
|
|
3
|
+
export class Verifier {
|
|
4
|
+
constructor(didManager) {
|
|
5
|
+
this.didManager = didManager;
|
|
6
|
+
}
|
|
7
|
+
async verifyCredential(vc, options = {}) {
|
|
8
|
+
try {
|
|
9
|
+
if (!vc || !vc['@context'] || !vc.type)
|
|
10
|
+
throw new Error('Invalid credential');
|
|
11
|
+
if (!vc.proof)
|
|
12
|
+
throw new Error('Credential has no proof');
|
|
13
|
+
const loader = options.documentLoader || createDocumentLoader(this.didManager);
|
|
14
|
+
const ctxs = Array.isArray(vc['@context']) ? vc['@context'] : [vc['@context']];
|
|
15
|
+
for (const c of ctxs)
|
|
16
|
+
await loader(c);
|
|
17
|
+
const proof = Array.isArray(vc.proof) ? vc.proof[0] : vc.proof;
|
|
18
|
+
const result = await DataIntegrityProofManager.verifyProof(vc, proof, { documentLoader: loader });
|
|
19
|
+
return result.verified ? { verified: true, errors: [] } : { verified: false, errors: result.errors ?? ['Verification failed'] };
|
|
20
|
+
}
|
|
21
|
+
catch (e) {
|
|
22
|
+
return { verified: false, errors: [e?.message ?? 'Unknown error in verifyCredential'] };
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
async verifyPresentation(vp, options = {}) {
|
|
26
|
+
try {
|
|
27
|
+
if (!vp || !vp['@context'] || !vp.type)
|
|
28
|
+
throw new Error('Invalid presentation');
|
|
29
|
+
if (!vp.proof)
|
|
30
|
+
throw new Error('Presentation has no proof');
|
|
31
|
+
const loader = options.documentLoader || createDocumentLoader(this.didManager);
|
|
32
|
+
const ctxs = Array.isArray(vp['@context']) ? vp['@context'] : [vp['@context']];
|
|
33
|
+
for (const c of ctxs)
|
|
34
|
+
await loader(c);
|
|
35
|
+
if (vp.verifiableCredential) {
|
|
36
|
+
for (const c of vp.verifiableCredential) {
|
|
37
|
+
const res = await this.verifyCredential(c, { documentLoader: loader });
|
|
38
|
+
if (!res.verified)
|
|
39
|
+
return res;
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
const proof = Array.isArray(vp.proof) ? vp.proof[0] : vp.proof;
|
|
43
|
+
const result = await DataIntegrityProofManager.verifyProof(vp, proof, { documentLoader: loader });
|
|
44
|
+
return result.verified ? { verified: true, errors: [] } : { verified: false, errors: result.errors ?? ['Verification failed'] };
|
|
45
|
+
}
|
|
46
|
+
catch (e) {
|
|
47
|
+
return { verified: false, errors: [e?.message ?? 'Unknown error in verifyPresentation'] };
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Minimal BBS utility methods ported from legacy for working with
|
|
3
|
+
* Data Integrity BBS (bbs-2023) base and derived proof value encoding.
|
|
4
|
+
*
|
|
5
|
+
* Notes:
|
|
6
|
+
* - This module focuses on serialization/parsing helpers used by callers
|
|
7
|
+
* to pack/unpack proof values. It does not perform signing or verification.
|
|
8
|
+
* - All methods operate on Uint8Array inputs and return multibase strings
|
|
9
|
+
* (base64url with 'u' prefix) where applicable to match the spec.
|
|
10
|
+
*/
|
|
11
|
+
export declare class BBSCryptosuiteUtils {
|
|
12
|
+
private static encodeBase64urlNoPad;
|
|
13
|
+
private static decodeBase64urlNoPad;
|
|
14
|
+
private static compareBytes;
|
|
15
|
+
private static concatBytes;
|
|
16
|
+
static serializeBaseProofValue(bbsSignature: Uint8Array, bbsHeader: Uint8Array, publicKey: Uint8Array, hmacKey: Uint8Array, mandatoryPointers: string[], featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym_issuer_pid' | 'pseudonym_hidden_pid', pid?: Uint8Array, signerBlind?: Uint8Array): string;
|
|
17
|
+
static parseBaseProofValue(proofValue: string): {
|
|
18
|
+
bbsSignature: Uint8Array;
|
|
19
|
+
bbsHeader: Uint8Array;
|
|
20
|
+
publicKey: Uint8Array;
|
|
21
|
+
hmacKey: Uint8Array;
|
|
22
|
+
mandatoryPointers: string[];
|
|
23
|
+
featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym_issuer_pid' | 'pseudonym_hidden_pid' | 'base_proof';
|
|
24
|
+
pid?: Uint8Array;
|
|
25
|
+
signerBlind?: Uint8Array;
|
|
26
|
+
};
|
|
27
|
+
private static compressLabelMap;
|
|
28
|
+
private static decompressLabelMap;
|
|
29
|
+
static serializeDerivedProofValue(bbsProof: Uint8Array, labelMap: {
|
|
30
|
+
[key: string]: string;
|
|
31
|
+
}, mandatoryIndexes: number[], selectiveIndexes: number[], presentationHeader: Uint8Array, featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym', pseudonym?: string, lengthBBSMessages?: number): string;
|
|
32
|
+
static parseDerivedProofValue(proofValue: string): {
|
|
33
|
+
bbsProof: Uint8Array;
|
|
34
|
+
labelMap: {
|
|
35
|
+
[key: string]: string;
|
|
36
|
+
};
|
|
37
|
+
mandatoryIndexes: number[];
|
|
38
|
+
selectiveIndexes: number[];
|
|
39
|
+
presentationHeader: Uint8Array;
|
|
40
|
+
featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym';
|
|
41
|
+
pseudonym?: string;
|
|
42
|
+
lengthBBSMessages?: number;
|
|
43
|
+
};
|
|
44
|
+
}
|
|
@@ -0,0 +1,213 @@
|
|
|
1
|
+
import * as cbor from 'cbor-js';
|
|
2
|
+
/**
|
|
3
|
+
* Minimal BBS utility methods ported from legacy for working with
|
|
4
|
+
* Data Integrity BBS (bbs-2023) base and derived proof value encoding.
|
|
5
|
+
*
|
|
6
|
+
* Notes:
|
|
7
|
+
* - This module focuses on serialization/parsing helpers used by callers
|
|
8
|
+
* to pack/unpack proof values. It does not perform signing or verification.
|
|
9
|
+
* - All methods operate on Uint8Array inputs and return multibase strings
|
|
10
|
+
* (base64url with 'u' prefix) where applicable to match the spec.
|
|
11
|
+
*/
|
|
12
|
+
export class BBSCryptosuiteUtils {
|
|
13
|
+
static encodeBase64urlNoPad(bytes) {
|
|
14
|
+
const b64 = Buffer.from(bytes).toString('base64');
|
|
15
|
+
const b64url = b64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
|
|
16
|
+
return 'u' + b64url;
|
|
17
|
+
}
|
|
18
|
+
static decodeBase64urlNoPad(s) {
|
|
19
|
+
if (!s.startsWith('u'))
|
|
20
|
+
throw new Error('Not a multibase base64url (u- prefixed) string');
|
|
21
|
+
const raw = s.slice(1);
|
|
22
|
+
const b64 = raw.replace(/-/g, '+').replace(/_/g, '/');
|
|
23
|
+
const pad = b64.length % 4 === 2 ? '==' : b64.length % 4 === 3 ? '=' : '';
|
|
24
|
+
return new Uint8Array(Buffer.from(b64 + pad, 'base64'));
|
|
25
|
+
}
|
|
26
|
+
static compareBytes(a, b) {
|
|
27
|
+
if (a.length !== b.length)
|
|
28
|
+
return false;
|
|
29
|
+
for (let i = 0; i < b.length; i++) {
|
|
30
|
+
if (a[i] !== b[i])
|
|
31
|
+
return false;
|
|
32
|
+
}
|
|
33
|
+
return true;
|
|
34
|
+
}
|
|
35
|
+
static concatBytes(a, b) {
|
|
36
|
+
const out = new Uint8Array(a.length + b.length);
|
|
37
|
+
out.set(a, 0);
|
|
38
|
+
out.set(b, a.length);
|
|
39
|
+
return out;
|
|
40
|
+
}
|
|
41
|
+
// ===== Base proof (serialize/parse) =====
|
|
42
|
+
static serializeBaseProofValue(bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, featureOption, pid, signerBlind) {
|
|
43
|
+
let headerBytes;
|
|
44
|
+
let components;
|
|
45
|
+
switch (featureOption) {
|
|
46
|
+
case 'baseline':
|
|
47
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x02]);
|
|
48
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
|
|
49
|
+
break;
|
|
50
|
+
case 'anonymous_holder_binding':
|
|
51
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x04]);
|
|
52
|
+
if (!signerBlind)
|
|
53
|
+
throw new Error('signerBlind is required for anonymous_holder_binding');
|
|
54
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, signerBlind];
|
|
55
|
+
break;
|
|
56
|
+
case 'pseudonym_issuer_pid':
|
|
57
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x06]);
|
|
58
|
+
if (!pid)
|
|
59
|
+
throw new Error('pid is required for pseudonym_issuer_pid');
|
|
60
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, pid];
|
|
61
|
+
break;
|
|
62
|
+
case 'pseudonym_hidden_pid':
|
|
63
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x08]);
|
|
64
|
+
if (!signerBlind)
|
|
65
|
+
throw new Error('signerBlind is required for pseudonym_hidden_pid');
|
|
66
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, signerBlind];
|
|
67
|
+
break;
|
|
68
|
+
default:
|
|
69
|
+
throw new Error(`Unsupported feature option: ${featureOption}`);
|
|
70
|
+
}
|
|
71
|
+
const encodedComponents = cbor.encode(components);
|
|
72
|
+
const proofBytes = BBSCryptosuiteUtils.concatBytes(headerBytes, new Uint8Array(encodedComponents));
|
|
73
|
+
return BBSCryptosuiteUtils.encodeBase64urlNoPad(proofBytes);
|
|
74
|
+
}
|
|
75
|
+
static parseBaseProofValue(proofValue) {
|
|
76
|
+
const decoded = BBSCryptosuiteUtils.decodeBase64urlNoPad(proofValue);
|
|
77
|
+
const header = decoded.slice(0, 3);
|
|
78
|
+
let featureOption;
|
|
79
|
+
if (this.compareBytes(header, [0xd9, 0x5d, 0x02]))
|
|
80
|
+
featureOption = 'baseline';
|
|
81
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x04]))
|
|
82
|
+
featureOption = 'anonymous_holder_binding';
|
|
83
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x06]))
|
|
84
|
+
featureOption = 'pseudonym_issuer_pid';
|
|
85
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x08]))
|
|
86
|
+
featureOption = 'pseudonym_hidden_pid';
|
|
87
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x03]))
|
|
88
|
+
featureOption = 'base_proof';
|
|
89
|
+
else
|
|
90
|
+
throw new Error('Invalid BBS base proof header');
|
|
91
|
+
const components = cbor.decode(decoded.slice(3).buffer);
|
|
92
|
+
const base = {
|
|
93
|
+
bbsSignature: components[0],
|
|
94
|
+
bbsHeader: components[1],
|
|
95
|
+
publicKey: components[2],
|
|
96
|
+
hmacKey: components[3],
|
|
97
|
+
mandatoryPointers: components[4],
|
|
98
|
+
featureOption
|
|
99
|
+
};
|
|
100
|
+
if (featureOption === 'anonymous_holder_binding' || featureOption === 'pseudonym_hidden_pid') {
|
|
101
|
+
base.signerBlind = components[5];
|
|
102
|
+
}
|
|
103
|
+
if (featureOption === 'pseudonym_issuer_pid') {
|
|
104
|
+
base.pid = components[5];
|
|
105
|
+
}
|
|
106
|
+
return base;
|
|
107
|
+
}
|
|
108
|
+
// ===== Label map compression helpers =====
|
|
109
|
+
static compressLabelMap(labelMap) {
|
|
110
|
+
const map = {};
|
|
111
|
+
for (const [k, v] of Object.entries(labelMap)) {
|
|
112
|
+
const c14nMatch = k.match(/^c14n(\d+)$/);
|
|
113
|
+
const bMatch = v.match(/^b(\d+)$/);
|
|
114
|
+
if (!c14nMatch || !bMatch) {
|
|
115
|
+
throw new Error(`Invalid label map entry: ${k} -> ${v}`);
|
|
116
|
+
}
|
|
117
|
+
const key = parseInt(c14nMatch[1], 10);
|
|
118
|
+
const value = parseInt(bMatch[1], 10);
|
|
119
|
+
map[key] = value.toString();
|
|
120
|
+
}
|
|
121
|
+
return map;
|
|
122
|
+
}
|
|
123
|
+
static decompressLabelMap(compressed) {
|
|
124
|
+
const map = {};
|
|
125
|
+
for (const [k, v] of Object.entries(compressed)) {
|
|
126
|
+
map[`c14n${k}`] = `b${v}`;
|
|
127
|
+
}
|
|
128
|
+
return map;
|
|
129
|
+
}
|
|
130
|
+
// ===== Derived proof (serialize/parse) =====
|
|
131
|
+
static serializeDerivedProofValue(bbsProof, labelMap, mandatoryIndexes, selectiveIndexes, presentationHeader, featureOption, pseudonym, lengthBBSMessages) {
|
|
132
|
+
const compressedLabelMap = this.compressLabelMap(labelMap);
|
|
133
|
+
let headerBytes;
|
|
134
|
+
let components;
|
|
135
|
+
switch (featureOption) {
|
|
136
|
+
case 'baseline':
|
|
137
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x03]);
|
|
138
|
+
components = [
|
|
139
|
+
bbsProof,
|
|
140
|
+
compressedLabelMap,
|
|
141
|
+
mandatoryIndexes,
|
|
142
|
+
selectiveIndexes,
|
|
143
|
+
presentationHeader
|
|
144
|
+
];
|
|
145
|
+
break;
|
|
146
|
+
case 'anonymous_holder_binding':
|
|
147
|
+
if (typeof lengthBBSMessages !== 'number') {
|
|
148
|
+
throw new Error('lengthBBSMessages is required for anonymous_holder_binding');
|
|
149
|
+
}
|
|
150
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x05]);
|
|
151
|
+
components = [
|
|
152
|
+
bbsProof,
|
|
153
|
+
compressedLabelMap,
|
|
154
|
+
mandatoryIndexes,
|
|
155
|
+
selectiveIndexes,
|
|
156
|
+
presentationHeader,
|
|
157
|
+
lengthBBSMessages
|
|
158
|
+
];
|
|
159
|
+
break;
|
|
160
|
+
case 'pseudonym':
|
|
161
|
+
if (!pseudonym || typeof lengthBBSMessages !== 'number') {
|
|
162
|
+
throw new Error('pseudonym and lengthBBSMessages are required for pseudonym features');
|
|
163
|
+
}
|
|
164
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x07]);
|
|
165
|
+
components = [
|
|
166
|
+
bbsProof,
|
|
167
|
+
compressedLabelMap,
|
|
168
|
+
mandatoryIndexes,
|
|
169
|
+
selectiveIndexes,
|
|
170
|
+
presentationHeader,
|
|
171
|
+
pseudonym,
|
|
172
|
+
lengthBBSMessages
|
|
173
|
+
];
|
|
174
|
+
break;
|
|
175
|
+
default:
|
|
176
|
+
throw new Error(`Unsupported feature option: ${featureOption}`);
|
|
177
|
+
}
|
|
178
|
+
const encodedComponents = cbor.encode(components);
|
|
179
|
+
const proofBytes = this.concatBytes(headerBytes, new Uint8Array(encodedComponents));
|
|
180
|
+
return this.encodeBase64urlNoPad(proofBytes);
|
|
181
|
+
}
|
|
182
|
+
static parseDerivedProofValue(proofValue) {
|
|
183
|
+
const decoded = this.decodeBase64urlNoPad(proofValue);
|
|
184
|
+
const header = decoded.slice(0, 3);
|
|
185
|
+
let featureOption;
|
|
186
|
+
if (this.compareBytes(header, [0xd9, 0x5d, 0x03]))
|
|
187
|
+
featureOption = 'baseline';
|
|
188
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x05]))
|
|
189
|
+
featureOption = 'anonymous_holder_binding';
|
|
190
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x07]))
|
|
191
|
+
featureOption = 'pseudonym';
|
|
192
|
+
else
|
|
193
|
+
throw new Error('Invalid BBS derived proof header');
|
|
194
|
+
const components = cbor.decode(decoded.slice(3).buffer);
|
|
195
|
+
const decompressedLabelMap = this.decompressLabelMap(components[1]);
|
|
196
|
+
const result = {
|
|
197
|
+
bbsProof: components[0],
|
|
198
|
+
labelMap: decompressedLabelMap,
|
|
199
|
+
mandatoryIndexes: components[2],
|
|
200
|
+
selectiveIndexes: components[3],
|
|
201
|
+
presentationHeader: components[4],
|
|
202
|
+
featureOption
|
|
203
|
+
};
|
|
204
|
+
if (featureOption === 'anonymous_holder_binding') {
|
|
205
|
+
result.lengthBBSMessages = components[5];
|
|
206
|
+
}
|
|
207
|
+
else if (featureOption === 'pseudonym') {
|
|
208
|
+
result.pseudonym = components[5];
|
|
209
|
+
result.lengthBBSMessages = components[6];
|
|
210
|
+
}
|
|
211
|
+
return result;
|
|
212
|
+
}
|
|
213
|
+
}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
export type BbsKeyPair = {
|
|
2
|
+
publicKey: Uint8Array;
|
|
3
|
+
privateKey: Uint8Array;
|
|
4
|
+
};
|
|
5
|
+
export declare class BbsSimple {
|
|
6
|
+
static readonly CIPHERSUITE = "BLS12-381-SHA-256";
|
|
7
|
+
static sign(messages: Uint8Array[], keypair: BbsKeyPair, header?: Uint8Array): Promise<Uint8Array>;
|
|
8
|
+
static verify(messages: Uint8Array[], signature: Uint8Array, publicKey: Uint8Array, header?: Uint8Array): Promise<boolean>;
|
|
9
|
+
}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { sha256 } from '@noble/hashes/sha2.js';
|
|
2
|
+
export class BbsSimple {
|
|
3
|
+
static async sign(messages, keypair, header) {
|
|
4
|
+
const headerBytes = header ?? new Uint8Array(sha256(new Uint8Array(0)));
|
|
5
|
+
throw new Error('BbsSimple.sign is not implemented');
|
|
6
|
+
}
|
|
7
|
+
static async verify(messages, signature, publicKey, header) {
|
|
8
|
+
const headerBytes = header ?? new Uint8Array(sha256(new Uint8Array(0)));
|
|
9
|
+
throw new Error('BbsSimple.verify is not implemented');
|
|
10
|
+
}
|
|
11
|
+
}
|
|
12
|
+
BbsSimple.CIPHERSUITE = 'BLS12-381-SHA-256';
|