@originals/sdk 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintrc.json +33 -0
- package/.turbo/turbo-build.log +1 -0
- package/.turbo/turbo-test.log +68353 -0
- package/dist/adapters/FeeOracleMock.d.ts +6 -0
- package/dist/adapters/FeeOracleMock.js +8 -0
- package/dist/adapters/index.d.ts +4 -0
- package/dist/adapters/index.js +4 -0
- package/dist/adapters/providers/OrdHttpProvider.d.ts +56 -0
- package/dist/adapters/providers/OrdHttpProvider.js +110 -0
- package/dist/adapters/providers/OrdMockProvider.d.ts +70 -0
- package/dist/adapters/providers/OrdMockProvider.js +75 -0
- package/dist/adapters/types.d.ts +71 -0
- package/dist/adapters/types.js +1 -0
- package/dist/bitcoin/BitcoinManager.d.ts +15 -0
- package/dist/bitcoin/BitcoinManager.js +262 -0
- package/dist/bitcoin/BroadcastClient.d.ts +30 -0
- package/dist/bitcoin/BroadcastClient.js +35 -0
- package/dist/bitcoin/OrdinalsClient.d.ts +21 -0
- package/dist/bitcoin/OrdinalsClient.js +105 -0
- package/dist/bitcoin/PSBTBuilder.d.ts +24 -0
- package/dist/bitcoin/PSBTBuilder.js +80 -0
- package/dist/bitcoin/fee-calculation.d.ts +14 -0
- package/dist/bitcoin/fee-calculation.js +31 -0
- package/dist/bitcoin/providers/OrdNodeProvider.d.ts +38 -0
- package/dist/bitcoin/providers/OrdNodeProvider.js +67 -0
- package/dist/bitcoin/providers/OrdinalsProvider.d.ts +33 -0
- package/dist/bitcoin/providers/OrdinalsProvider.js +50 -0
- package/dist/bitcoin/providers/types.d.ts +63 -0
- package/dist/bitcoin/providers/types.js +1 -0
- package/dist/bitcoin/transactions/commit.d.ts +89 -0
- package/dist/bitcoin/transactions/commit.js +311 -0
- package/dist/bitcoin/transactions/index.d.ts +7 -0
- package/dist/bitcoin/transactions/index.js +8 -0
- package/dist/bitcoin/transfer.d.ts +9 -0
- package/dist/bitcoin/transfer.js +26 -0
- package/dist/bitcoin/utxo-selection.d.ts +78 -0
- package/dist/bitcoin/utxo-selection.js +237 -0
- package/dist/bitcoin/utxo.d.ts +26 -0
- package/dist/bitcoin/utxo.js +78 -0
- package/dist/contexts/credentials-v1.json +195 -0
- package/dist/contexts/credentials-v2-examples.json +5 -0
- package/dist/contexts/credentials-v2.json +301 -0
- package/dist/contexts/credentials.json +195 -0
- package/dist/contexts/data-integrity-v2.json +81 -0
- package/dist/contexts/dids.json +57 -0
- package/dist/contexts/ed255192020.json +93 -0
- package/dist/contexts/ordinals-plus.json +23 -0
- package/dist/contexts/originals.json +22 -0
- package/dist/core/OriginalsSDK.d.ts +158 -0
- package/dist/core/OriginalsSDK.js +274 -0
- package/dist/crypto/Multikey.d.ts +30 -0
- package/dist/crypto/Multikey.js +149 -0
- package/dist/crypto/Signer.d.ts +21 -0
- package/dist/crypto/Signer.js +196 -0
- package/dist/crypto/noble-init.d.ts +18 -0
- package/dist/crypto/noble-init.js +106 -0
- package/dist/did/BtcoDidResolver.d.ts +57 -0
- package/dist/did/BtcoDidResolver.js +166 -0
- package/dist/did/DIDManager.d.ts +101 -0
- package/dist/did/DIDManager.js +493 -0
- package/dist/did/Ed25519Verifier.d.ts +30 -0
- package/dist/did/Ed25519Verifier.js +59 -0
- package/dist/did/KeyManager.d.ts +17 -0
- package/dist/did/KeyManager.js +207 -0
- package/dist/did/WebVHManager.d.ts +100 -0
- package/dist/did/WebVHManager.js +304 -0
- package/dist/did/createBtcoDidDocument.d.ts +10 -0
- package/dist/did/createBtcoDidDocument.js +42 -0
- package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +23 -0
- package/dist/did/providers/OrdinalsClientProviderAdapter.js +51 -0
- package/dist/events/EventEmitter.d.ts +115 -0
- package/dist/events/EventEmitter.js +198 -0
- package/dist/events/index.d.ts +7 -0
- package/dist/events/index.js +6 -0
- package/dist/events/types.d.ts +286 -0
- package/dist/events/types.js +9 -0
- package/dist/examples/basic-usage.d.ts +3 -0
- package/dist/examples/basic-usage.js +62 -0
- package/dist/examples/run.d.ts +1 -0
- package/dist/examples/run.js +4 -0
- package/dist/index.d.ts +39 -0
- package/dist/index.js +47 -0
- package/dist/lifecycle/BatchOperations.d.ts +147 -0
- package/dist/lifecycle/BatchOperations.js +251 -0
- package/dist/lifecycle/LifecycleManager.d.ts +116 -0
- package/dist/lifecycle/LifecycleManager.js +971 -0
- package/dist/lifecycle/OriginalsAsset.d.ts +164 -0
- package/dist/lifecycle/OriginalsAsset.js +380 -0
- package/dist/lifecycle/ProvenanceQuery.d.ts +126 -0
- package/dist/lifecycle/ProvenanceQuery.js +220 -0
- package/dist/lifecycle/ResourceVersioning.d.ts +73 -0
- package/dist/lifecycle/ResourceVersioning.js +127 -0
- package/dist/migration/MigrationManager.d.ts +86 -0
- package/dist/migration/MigrationManager.js +412 -0
- package/dist/migration/audit/AuditLogger.d.ts +51 -0
- package/dist/migration/audit/AuditLogger.js +156 -0
- package/dist/migration/checkpoint/CheckpointManager.d.ts +31 -0
- package/dist/migration/checkpoint/CheckpointManager.js +96 -0
- package/dist/migration/checkpoint/CheckpointStorage.d.ts +26 -0
- package/dist/migration/checkpoint/CheckpointStorage.js +89 -0
- package/dist/migration/index.d.ts +22 -0
- package/dist/migration/index.js +27 -0
- package/dist/migration/operations/BaseMigration.d.ts +48 -0
- package/dist/migration/operations/BaseMigration.js +83 -0
- package/dist/migration/operations/PeerToBtcoMigration.d.ts +25 -0
- package/dist/migration/operations/PeerToBtcoMigration.js +67 -0
- package/dist/migration/operations/PeerToWebvhMigration.d.ts +19 -0
- package/dist/migration/operations/PeerToWebvhMigration.js +46 -0
- package/dist/migration/operations/WebvhToBtcoMigration.d.ts +25 -0
- package/dist/migration/operations/WebvhToBtcoMigration.js +67 -0
- package/dist/migration/rollback/RollbackManager.d.ts +29 -0
- package/dist/migration/rollback/RollbackManager.js +146 -0
- package/dist/migration/state/StateMachine.d.ts +25 -0
- package/dist/migration/state/StateMachine.js +76 -0
- package/dist/migration/state/StateTracker.d.ts +36 -0
- package/dist/migration/state/StateTracker.js +123 -0
- package/dist/migration/types.d.ts +306 -0
- package/dist/migration/types.js +33 -0
- package/dist/migration/validation/BitcoinValidator.d.ts +13 -0
- package/dist/migration/validation/BitcoinValidator.js +83 -0
- package/dist/migration/validation/CredentialValidator.d.ts +13 -0
- package/dist/migration/validation/CredentialValidator.js +46 -0
- package/dist/migration/validation/DIDCompatibilityValidator.d.ts +16 -0
- package/dist/migration/validation/DIDCompatibilityValidator.js +127 -0
- package/dist/migration/validation/LifecycleValidator.d.ts +10 -0
- package/dist/migration/validation/LifecycleValidator.js +52 -0
- package/dist/migration/validation/StorageValidator.d.ts +10 -0
- package/dist/migration/validation/StorageValidator.js +65 -0
- package/dist/migration/validation/ValidationPipeline.d.ts +29 -0
- package/dist/migration/validation/ValidationPipeline.js +180 -0
- package/dist/storage/LocalStorageAdapter.d.ts +11 -0
- package/dist/storage/LocalStorageAdapter.js +53 -0
- package/dist/storage/MemoryStorageAdapter.d.ts +6 -0
- package/dist/storage/MemoryStorageAdapter.js +21 -0
- package/dist/storage/StorageAdapter.d.ts +16 -0
- package/dist/storage/StorageAdapter.js +1 -0
- package/dist/storage/index.d.ts +2 -0
- package/dist/storage/index.js +2 -0
- package/dist/types/bitcoin.d.ts +84 -0
- package/dist/types/bitcoin.js +1 -0
- package/dist/types/common.d.ts +82 -0
- package/dist/types/common.js +1 -0
- package/dist/types/credentials.d.ts +75 -0
- package/dist/types/credentials.js +1 -0
- package/dist/types/did.d.ts +26 -0
- package/dist/types/did.js +1 -0
- package/dist/types/index.d.ts +5 -0
- package/dist/types/index.js +5 -0
- package/dist/types/network.d.ts +78 -0
- package/dist/types/network.js +145 -0
- package/dist/utils/EventLogger.d.ts +71 -0
- package/dist/utils/EventLogger.js +232 -0
- package/dist/utils/Logger.d.ts +106 -0
- package/dist/utils/Logger.js +257 -0
- package/dist/utils/MetricsCollector.d.ts +110 -0
- package/dist/utils/MetricsCollector.js +264 -0
- package/dist/utils/bitcoin-address.d.ts +38 -0
- package/dist/utils/bitcoin-address.js +113 -0
- package/dist/utils/cbor.d.ts +2 -0
- package/dist/utils/cbor.js +9 -0
- package/dist/utils/encoding.d.ts +37 -0
- package/dist/utils/encoding.js +120 -0
- package/dist/utils/hash.d.ts +1 -0
- package/dist/utils/hash.js +5 -0
- package/dist/utils/retry.d.ts +10 -0
- package/dist/utils/retry.js +35 -0
- package/dist/utils/satoshi-validation.d.ts +60 -0
- package/dist/utils/satoshi-validation.js +156 -0
- package/dist/utils/serialization.d.ts +14 -0
- package/dist/utils/serialization.js +76 -0
- package/dist/utils/telemetry.d.ts +17 -0
- package/dist/utils/telemetry.js +24 -0
- package/dist/utils/validation.d.ts +5 -0
- package/dist/utils/validation.js +98 -0
- package/dist/vc/CredentialManager.d.ts +22 -0
- package/dist/vc/CredentialManager.js +227 -0
- package/dist/vc/Issuer.d.ts +27 -0
- package/dist/vc/Issuer.js +70 -0
- package/dist/vc/Verifier.d.ts +16 -0
- package/dist/vc/Verifier.js +50 -0
- package/dist/vc/cryptosuites/bbs.d.ts +44 -0
- package/dist/vc/cryptosuites/bbs.js +213 -0
- package/dist/vc/cryptosuites/bbsSimple.d.ts +9 -0
- package/dist/vc/cryptosuites/bbsSimple.js +12 -0
- package/dist/vc/cryptosuites/eddsa.d.ts +30 -0
- package/dist/vc/cryptosuites/eddsa.js +81 -0
- package/dist/vc/documentLoader.d.ts +16 -0
- package/dist/vc/documentLoader.js +59 -0
- package/dist/vc/proofs/data-integrity.d.ts +21 -0
- package/dist/vc/proofs/data-integrity.js +15 -0
- package/dist/vc/utils/jsonld.d.ts +2 -0
- package/dist/vc/utils/jsonld.js +15 -0
- package/package.json +79 -0
- package/src/adapters/FeeOracleMock.ts +9 -0
- package/src/adapters/index.ts +5 -0
- package/src/adapters/providers/OrdHttpProvider.ts +126 -0
- package/src/adapters/providers/OrdMockProvider.ts +101 -0
- package/src/adapters/types.ts +66 -0
- package/src/bitcoin/BitcoinManager.ts +330 -0
- package/src/bitcoin/BroadcastClient.ts +54 -0
- package/src/bitcoin/OrdinalsClient.ts +119 -0
- package/src/bitcoin/PSBTBuilder.ts +106 -0
- package/src/bitcoin/fee-calculation.ts +38 -0
- package/src/bitcoin/providers/OrdNodeProvider.ts +92 -0
- package/src/bitcoin/providers/OrdinalsProvider.ts +56 -0
- package/src/bitcoin/providers/types.ts +59 -0
- package/src/bitcoin/transactions/commit.ts +465 -0
- package/src/bitcoin/transactions/index.ts +13 -0
- package/src/bitcoin/transfer.ts +43 -0
- package/src/bitcoin/utxo-selection.ts +322 -0
- package/src/bitcoin/utxo.ts +113 -0
- package/src/contexts/credentials-v1.json +237 -0
- package/src/contexts/credentials-v2-examples.json +5 -0
- package/src/contexts/credentials-v2.json +340 -0
- package/src/contexts/credentials.json +237 -0
- package/src/contexts/data-integrity-v2.json +81 -0
- package/src/contexts/dids.json +58 -0
- package/src/contexts/ed255192020.json +93 -0
- package/src/contexts/ordinals-plus.json +23 -0
- package/src/contexts/originals.json +22 -0
- package/src/core/OriginalsSDK.ts +416 -0
- package/src/crypto/Multikey.ts +194 -0
- package/src/crypto/Signer.ts +254 -0
- package/src/crypto/noble-init.ts +121 -0
- package/src/did/BtcoDidResolver.ts +227 -0
- package/src/did/DIDManager.ts +694 -0
- package/src/did/Ed25519Verifier.ts +68 -0
- package/src/did/KeyManager.ts +236 -0
- package/src/did/WebVHManager.ts +489 -0
- package/src/did/createBtcoDidDocument.ts +59 -0
- package/src/did/providers/OrdinalsClientProviderAdapter.ts +68 -0
- package/src/events/EventEmitter.ts +222 -0
- package/src/events/index.ts +19 -0
- package/src/events/types.ts +331 -0
- package/src/examples/basic-usage.ts +78 -0
- package/src/examples/run.ts +5 -0
- package/src/index.ts +84 -0
- package/src/lifecycle/BatchOperations.ts +373 -0
- package/src/lifecycle/LifecycleManager.ts +1218 -0
- package/src/lifecycle/OriginalsAsset.ts +524 -0
- package/src/lifecycle/ProvenanceQuery.ts +280 -0
- package/src/lifecycle/ResourceVersioning.ts +163 -0
- package/src/migration/MigrationManager.ts +527 -0
- package/src/migration/audit/AuditLogger.ts +176 -0
- package/src/migration/checkpoint/CheckpointManager.ts +112 -0
- package/src/migration/checkpoint/CheckpointStorage.ts +101 -0
- package/src/migration/index.ts +33 -0
- package/src/migration/operations/BaseMigration.ts +126 -0
- package/src/migration/operations/PeerToBtcoMigration.ts +105 -0
- package/src/migration/operations/PeerToWebvhMigration.ts +62 -0
- package/src/migration/operations/WebvhToBtcoMigration.ts +105 -0
- package/src/migration/rollback/RollbackManager.ts +170 -0
- package/src/migration/state/StateMachine.ts +92 -0
- package/src/migration/state/StateTracker.ts +156 -0
- package/src/migration/types.ts +344 -0
- package/src/migration/validation/BitcoinValidator.ts +107 -0
- package/src/migration/validation/CredentialValidator.ts +62 -0
- package/src/migration/validation/DIDCompatibilityValidator.ts +151 -0
- package/src/migration/validation/LifecycleValidator.ts +64 -0
- package/src/migration/validation/StorageValidator.ts +79 -0
- package/src/migration/validation/ValidationPipeline.ts +213 -0
- package/src/storage/LocalStorageAdapter.ts +61 -0
- package/src/storage/MemoryStorageAdapter.ts +29 -0
- package/src/storage/StorageAdapter.ts +25 -0
- package/src/storage/index.ts +3 -0
- package/src/types/bitcoin.ts +98 -0
- package/src/types/common.ts +92 -0
- package/src/types/credentials.ts +88 -0
- package/src/types/did.ts +31 -0
- package/src/types/external-shims.d.ts +53 -0
- package/src/types/index.ts +7 -0
- package/src/types/network.ts +175 -0
- package/src/utils/EventLogger.ts +298 -0
- package/src/utils/Logger.ts +322 -0
- package/src/utils/MetricsCollector.ts +358 -0
- package/src/utils/bitcoin-address.ts +130 -0
- package/src/utils/cbor.ts +12 -0
- package/src/utils/encoding.ts +127 -0
- package/src/utils/hash.ts +6 -0
- package/src/utils/retry.ts +46 -0
- package/src/utils/satoshi-validation.ts +196 -0
- package/src/utils/serialization.ts +96 -0
- package/src/utils/telemetry.ts +40 -0
- package/src/utils/validation.ts +119 -0
- package/src/vc/CredentialManager.ts +273 -0
- package/src/vc/Issuer.ts +100 -0
- package/src/vc/Verifier.ts +47 -0
- package/src/vc/cryptosuites/bbs.ts +253 -0
- package/src/vc/cryptosuites/bbsSimple.ts +21 -0
- package/src/vc/cryptosuites/eddsa.ts +99 -0
- package/src/vc/documentLoader.ts +67 -0
- package/src/vc/proofs/data-integrity.ts +33 -0
- package/src/vc/utils/jsonld.ts +18 -0
- package/test/logs/did_webvh_QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8_example_com_users_alice123_profile.jsonl +1 -0
- package/test/logs/did_webvh_QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE_example_com_users_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP_example_com_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw_example_com_users_alice.jsonl +1 -0
- package/test/logs/did_webvh_QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb_example_com_level1_level2.jsonl +1 -0
- package/test/logs/did_webvh_QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj_example_com_secret.jsonl +1 -0
- package/test/logs/did_webvh_QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG_example_com.jsonl +1 -0
- package/test/logs/did_webvh_QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf_example_com_C_Windows_System32.jsonl +1 -0
- package/test/logs/did_webvh_QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE_example_com_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL_example_com_users_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb_example_com_my_org_user_name_test_123.jsonl +1 -0
- package/test/logs/did_webvh_Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp_example_com_users_etc_passwd.jsonl +1 -0
- package/test/logs/did_webvh_QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG_example_com.jsonl +1 -0
- package/test/logs/did_webvh_Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi_example_com_users_alice.jsonl +1 -0
- package/tests/__mocks__/bbs-signatures.js +17 -0
- package/tests/__mocks__/mf-base58.js +24 -0
- package/tests/e2e/README.md +97 -0
- package/tests/e2e/example.spec.ts +78 -0
- package/tests/fixtures/did-documents.ts +247 -0
- package/tests/index.test.ts +21 -0
- package/tests/integration/BatchOperations.test.ts +531 -0
- package/tests/integration/CompleteLifecycle.e2e.test.ts +735 -0
- package/tests/integration/CredentialManager.test.ts +42 -0
- package/tests/integration/DIDManager.test.ts +41 -0
- package/tests/integration/DidPeerToWebVhFlow.test.ts +351 -0
- package/tests/integration/Events.test.ts +435 -0
- package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +25 -0
- package/tests/integration/LifecycleManager.test.ts +21 -0
- package/tests/integration/MultikeyFlow.test.ts +52 -0
- package/tests/integration/TelemetryIntegration.test.ts +395 -0
- package/tests/integration/WebVhPublish.test.ts +48 -0
- package/tests/integration/migration/peer-to-webvh.test.ts +172 -0
- package/tests/manual/test-commit-creation.ts +323 -0
- package/tests/mocks/MockKeyStore.ts +38 -0
- package/tests/mocks/adapters/MemoryStorageAdapter.ts +24 -0
- package/tests/mocks/adapters/MockFeeOracle.ts +11 -0
- package/tests/mocks/adapters/MockOrdinalsProvider.ts +76 -0
- package/tests/mocks/adapters/OrdMockProvider.test.ts +176 -0
- package/tests/mocks/adapters/index.ts +6 -0
- package/tests/performance/BatchOperations.perf.test.ts +403 -0
- package/tests/performance/logging.perf.test.ts +336 -0
- package/tests/sdk.test.ts +43 -0
- package/tests/security/bitcoin-penetration-tests.test.ts +622 -0
- package/tests/setup.bun.ts +69 -0
- package/tests/setup.jest.ts +23 -0
- package/tests/stress/batch-operations-stress.test.ts +571 -0
- package/tests/unit/adapters/FeeOracleMock.test.ts +40 -0
- package/tests/unit/bitcoin/BitcoinManager.test.ts +293 -0
- package/tests/unit/bitcoin/BroadcastClient.test.ts +52 -0
- package/tests/unit/bitcoin/OrdNodeProvider.test.ts +53 -0
- package/tests/unit/bitcoin/OrdinalsClient.test.ts +381 -0
- package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +102 -0
- package/tests/unit/bitcoin/PSBTBuilder.test.ts +84 -0
- package/tests/unit/bitcoin/fee-calculation.test.ts +261 -0
- package/tests/unit/bitcoin/transactions/commit.test.ts +649 -0
- package/tests/unit/bitcoin/transfer.test.ts +31 -0
- package/tests/unit/bitcoin/utxo-selection-new.test.ts +502 -0
- package/tests/unit/bitcoin/utxo.more.test.ts +39 -0
- package/tests/unit/bitcoin/utxo.selection.test.ts +38 -0
- package/tests/unit/core/OriginalsSDK.test.ts +152 -0
- package/tests/unit/crypto/Multikey.test.ts +206 -0
- package/tests/unit/crypto/Signer.test.ts +408 -0
- package/tests/unit/did/BtcoDidResolver.test.ts +611 -0
- package/tests/unit/did/DIDManager.more.test.ts +43 -0
- package/tests/unit/did/DIDManager.test.ts +185 -0
- package/tests/unit/did/Ed25519Verifier.test.ts +160 -0
- package/tests/unit/did/KeyManager.test.ts +452 -0
- package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +45 -0
- package/tests/unit/did/WebVHManager.test.ts +435 -0
- package/tests/unit/did/createBtcoDidDocument.test.ts +67 -0
- package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +159 -0
- package/tests/unit/events/EventEmitter.test.ts +407 -0
- package/tests/unit/lifecycle/BatchOperations.test.ts +527 -0
- package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +312 -0
- package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +18 -0
- package/tests/unit/lifecycle/LifecycleManager.test.ts +213 -0
- package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +30 -0
- package/tests/unit/lifecycle/OriginalsAsset.test.ts +176 -0
- package/tests/unit/lifecycle/ProvenanceQuery.test.ts +577 -0
- package/tests/unit/lifecycle/ResourceVersioning.test.ts +651 -0
- package/tests/unit/storage/MemoryStorageAdapter.test.ts +93 -0
- package/tests/unit/types/network.test.ts +255 -0
- package/tests/unit/utils/EventIntegration.test.ts +384 -0
- package/tests/unit/utils/Logger.test.ts +473 -0
- package/tests/unit/utils/MetricsCollector.test.ts +358 -0
- package/tests/unit/utils/bitcoin-address.test.ts +250 -0
- package/tests/unit/utils/cbor.test.ts +35 -0
- package/tests/unit/utils/encoding.test.ts +318 -0
- package/tests/unit/utils/hash.test.ts +12 -0
- package/tests/unit/utils/retry.test.ts +100 -0
- package/tests/unit/utils/satoshi-validation.test.ts +354 -0
- package/tests/unit/utils/serialization.test.ts +124 -0
- package/tests/unit/utils/telemetry.test.ts +52 -0
- package/tests/unit/utils/validation.test.ts +141 -0
- package/tests/unit/vc/CredentialManager.test.ts +487 -0
- package/tests/unit/vc/Issuer.test.ts +107 -0
- package/tests/unit/vc/Verifier.test.ts +525 -0
- package/tests/unit/vc/bbs.test.ts +282 -0
- package/tests/unit/vc/cryptosuites/eddsa.test.ts +398 -0
- package/tests/unit/vc/documentLoader.test.ts +121 -0
- package/tests/unit/vc/proofs/data-integrity.test.ts +24 -0
- package/tsconfig.json +32 -0
- package/tsconfig.test.json +15 -0
- package/tsconfig.tsbuildinfo +1 -0
|
@@ -0,0 +1,253 @@
|
|
|
1
|
+
import * as cbor from 'cbor-js';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* Minimal BBS utility methods ported from legacy for working with
|
|
5
|
+
* Data Integrity BBS (bbs-2023) base and derived proof value encoding.
|
|
6
|
+
*
|
|
7
|
+
* Notes:
|
|
8
|
+
* - This module focuses on serialization/parsing helpers used by callers
|
|
9
|
+
* to pack/unpack proof values. It does not perform signing or verification.
|
|
10
|
+
* - All methods operate on Uint8Array inputs and return multibase strings
|
|
11
|
+
* (base64url with 'u' prefix) where applicable to match the spec.
|
|
12
|
+
*/
|
|
13
|
+
export class BBSCryptosuiteUtils {
|
|
14
|
+
private static encodeBase64urlNoPad(bytes: Uint8Array): string {
|
|
15
|
+
const b64 = Buffer.from(bytes).toString('base64');
|
|
16
|
+
const b64url = b64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
|
|
17
|
+
return 'u' + b64url;
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
private static decodeBase64urlNoPad(s: string): Uint8Array {
|
|
21
|
+
if (!s.startsWith('u')) throw new Error('Not a multibase base64url (u- prefixed) string');
|
|
22
|
+
const raw = s.slice(1);
|
|
23
|
+
const b64 = raw.replace(/-/g, '+').replace(/_/g, '/');
|
|
24
|
+
const pad = b64.length % 4 === 2 ? '==' : b64.length % 4 === 3 ? '=' : '';
|
|
25
|
+
return new Uint8Array(Buffer.from(b64 + pad, 'base64'));
|
|
26
|
+
}
|
|
27
|
+
private static compareBytes(a: Uint8Array, b: number[]): boolean {
|
|
28
|
+
if (a.length !== b.length) return false;
|
|
29
|
+
for (let i = 0; i < b.length; i++) {
|
|
30
|
+
if (a[i] !== b[i]) return false;
|
|
31
|
+
}
|
|
32
|
+
return true;
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
private static concatBytes(a: Uint8Array, b: Uint8Array): Uint8Array {
|
|
36
|
+
const out = new Uint8Array(a.length + b.length);
|
|
37
|
+
out.set(a, 0);
|
|
38
|
+
out.set(b, a.length);
|
|
39
|
+
return out;
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
// ===== Base proof (serialize/parse) =====
|
|
43
|
+
|
|
44
|
+
static serializeBaseProofValue(
|
|
45
|
+
bbsSignature: Uint8Array,
|
|
46
|
+
bbsHeader: Uint8Array,
|
|
47
|
+
publicKey: Uint8Array,
|
|
48
|
+
hmacKey: Uint8Array,
|
|
49
|
+
mandatoryPointers: string[],
|
|
50
|
+
featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym_issuer_pid' | 'pseudonym_hidden_pid',
|
|
51
|
+
pid?: Uint8Array,
|
|
52
|
+
signerBlind?: Uint8Array
|
|
53
|
+
): string {
|
|
54
|
+
let headerBytes: Uint8Array;
|
|
55
|
+
let components: (Uint8Array | string[] | Uint8Array)[];
|
|
56
|
+
|
|
57
|
+
switch (featureOption) {
|
|
58
|
+
case 'baseline':
|
|
59
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x02]);
|
|
60
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
|
|
61
|
+
break;
|
|
62
|
+
case 'anonymous_holder_binding':
|
|
63
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x04]);
|
|
64
|
+
if (!signerBlind) throw new Error('signerBlind is required for anonymous_holder_binding');
|
|
65
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, signerBlind];
|
|
66
|
+
break;
|
|
67
|
+
case 'pseudonym_issuer_pid':
|
|
68
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x06]);
|
|
69
|
+
if (!pid) throw new Error('pid is required for pseudonym_issuer_pid');
|
|
70
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, pid];
|
|
71
|
+
break;
|
|
72
|
+
case 'pseudonym_hidden_pid':
|
|
73
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x08]);
|
|
74
|
+
if (!signerBlind) throw new Error('signerBlind is required for pseudonym_hidden_pid');
|
|
75
|
+
components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, signerBlind];
|
|
76
|
+
break;
|
|
77
|
+
default:
|
|
78
|
+
throw new Error(`Unsupported feature option: ${featureOption}`);
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
const encodedComponents = cbor.encode(components);
|
|
82
|
+
const proofBytes = BBSCryptosuiteUtils.concatBytes(headerBytes, new Uint8Array(encodedComponents));
|
|
83
|
+
return BBSCryptosuiteUtils.encodeBase64urlNoPad(proofBytes);
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
static parseBaseProofValue(proofValue: string): {
|
|
87
|
+
bbsSignature: Uint8Array;
|
|
88
|
+
bbsHeader: Uint8Array;
|
|
89
|
+
publicKey: Uint8Array;
|
|
90
|
+
hmacKey: Uint8Array;
|
|
91
|
+
mandatoryPointers: string[];
|
|
92
|
+
featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym_issuer_pid' | 'pseudonym_hidden_pid' | 'base_proof';
|
|
93
|
+
pid?: Uint8Array;
|
|
94
|
+
signerBlind?: Uint8Array;
|
|
95
|
+
} {
|
|
96
|
+
const decoded = BBSCryptosuiteUtils.decodeBase64urlNoPad(proofValue);
|
|
97
|
+
const header = decoded.slice(0, 3);
|
|
98
|
+
let featureOption: any;
|
|
99
|
+
if (this.compareBytes(header, [0xd9, 0x5d, 0x02])) featureOption = 'baseline';
|
|
100
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x04])) featureOption = 'anonymous_holder_binding';
|
|
101
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x06])) featureOption = 'pseudonym_issuer_pid';
|
|
102
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x08])) featureOption = 'pseudonym_hidden_pid';
|
|
103
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x03])) featureOption = 'base_proof';
|
|
104
|
+
else throw new Error('Invalid BBS base proof header');
|
|
105
|
+
|
|
106
|
+
const components: any[] = cbor.decode(decoded.slice(3).buffer) as any[];
|
|
107
|
+
const base = {
|
|
108
|
+
bbsSignature: components[0] as Uint8Array,
|
|
109
|
+
bbsHeader: components[1] as Uint8Array,
|
|
110
|
+
publicKey: components[2] as Uint8Array,
|
|
111
|
+
hmacKey: components[3] as Uint8Array,
|
|
112
|
+
mandatoryPointers: components[4] as string[],
|
|
113
|
+
featureOption
|
|
114
|
+
} as any;
|
|
115
|
+
|
|
116
|
+
if (featureOption === 'anonymous_holder_binding' || featureOption === 'pseudonym_hidden_pid') {
|
|
117
|
+
base.signerBlind = components[5] as Uint8Array;
|
|
118
|
+
}
|
|
119
|
+
if (featureOption === 'pseudonym_issuer_pid') {
|
|
120
|
+
base.pid = components[5] as Uint8Array;
|
|
121
|
+
}
|
|
122
|
+
return base;
|
|
123
|
+
}
|
|
124
|
+
|
|
125
|
+
// ===== Label map compression helpers =====
|
|
126
|
+
|
|
127
|
+
private static compressLabelMap(labelMap: { [key: string]: string }): { [key: string]: string } {
|
|
128
|
+
const map: { [key: string]: string } = {};
|
|
129
|
+
for (const [k, v] of Object.entries(labelMap)) {
|
|
130
|
+
const c14nMatch = k.match(/^c14n(\d+)$/);
|
|
131
|
+
const bMatch = v.match(/^b(\d+)$/);
|
|
132
|
+
if (!c14nMatch || !bMatch) {
|
|
133
|
+
throw new Error(`Invalid label map entry: ${k} -> ${v}`);
|
|
134
|
+
}
|
|
135
|
+
const key = parseInt(c14nMatch[1], 10);
|
|
136
|
+
const value = parseInt(bMatch[1], 10);
|
|
137
|
+
map[key] = value.toString();
|
|
138
|
+
}
|
|
139
|
+
return map;
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
private static decompressLabelMap(compressed: { [key: string]: string }): { [key: string]: string } {
|
|
143
|
+
const map: { [key: string]: string } = {};
|
|
144
|
+
for (const [k, v] of Object.entries(compressed)) {
|
|
145
|
+
map[`c14n${k}`] = `b${v}`;
|
|
146
|
+
}
|
|
147
|
+
return map;
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
// ===== Derived proof (serialize/parse) =====
|
|
151
|
+
|
|
152
|
+
static serializeDerivedProofValue(
|
|
153
|
+
bbsProof: Uint8Array,
|
|
154
|
+
labelMap: { [key: string]: string },
|
|
155
|
+
mandatoryIndexes: number[],
|
|
156
|
+
selectiveIndexes: number[],
|
|
157
|
+
presentationHeader: Uint8Array,
|
|
158
|
+
featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym',
|
|
159
|
+
pseudonym?: string,
|
|
160
|
+
lengthBBSMessages?: number
|
|
161
|
+
): string {
|
|
162
|
+
const compressedLabelMap = this.compressLabelMap(labelMap);
|
|
163
|
+
|
|
164
|
+
let headerBytes: Uint8Array;
|
|
165
|
+
let components: (Uint8Array | { [key: string]: string } | number[] | number | string)[];
|
|
166
|
+
|
|
167
|
+
switch (featureOption) {
|
|
168
|
+
case 'baseline':
|
|
169
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x03]);
|
|
170
|
+
components = [
|
|
171
|
+
bbsProof,
|
|
172
|
+
compressedLabelMap,
|
|
173
|
+
mandatoryIndexes,
|
|
174
|
+
selectiveIndexes,
|
|
175
|
+
presentationHeader
|
|
176
|
+
];
|
|
177
|
+
break;
|
|
178
|
+
case 'anonymous_holder_binding':
|
|
179
|
+
if (typeof lengthBBSMessages !== 'number') {
|
|
180
|
+
throw new Error('lengthBBSMessages is required for anonymous_holder_binding');
|
|
181
|
+
}
|
|
182
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x05]);
|
|
183
|
+
components = [
|
|
184
|
+
bbsProof,
|
|
185
|
+
compressedLabelMap,
|
|
186
|
+
mandatoryIndexes,
|
|
187
|
+
selectiveIndexes,
|
|
188
|
+
presentationHeader,
|
|
189
|
+
lengthBBSMessages
|
|
190
|
+
];
|
|
191
|
+
break;
|
|
192
|
+
case 'pseudonym':
|
|
193
|
+
if (!pseudonym || typeof lengthBBSMessages !== 'number') {
|
|
194
|
+
throw new Error('pseudonym and lengthBBSMessages are required for pseudonym features');
|
|
195
|
+
}
|
|
196
|
+
headerBytes = new Uint8Array([0xd9, 0x5d, 0x07]);
|
|
197
|
+
components = [
|
|
198
|
+
bbsProof,
|
|
199
|
+
compressedLabelMap,
|
|
200
|
+
mandatoryIndexes,
|
|
201
|
+
selectiveIndexes,
|
|
202
|
+
presentationHeader,
|
|
203
|
+
pseudonym,
|
|
204
|
+
lengthBBSMessages
|
|
205
|
+
];
|
|
206
|
+
break;
|
|
207
|
+
default:
|
|
208
|
+
throw new Error(`Unsupported feature option: ${featureOption}`);
|
|
209
|
+
}
|
|
210
|
+
|
|
211
|
+
const encodedComponents = cbor.encode(components);
|
|
212
|
+
const proofBytes = this.concatBytes(headerBytes, new Uint8Array(encodedComponents));
|
|
213
|
+
return this.encodeBase64urlNoPad(proofBytes);
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
static parseDerivedProofValue(proofValue: string): {
|
|
217
|
+
bbsProof: Uint8Array;
|
|
218
|
+
labelMap: { [key: string]: string };
|
|
219
|
+
mandatoryIndexes: number[];
|
|
220
|
+
selectiveIndexes: number[];
|
|
221
|
+
presentationHeader: Uint8Array;
|
|
222
|
+
featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym';
|
|
223
|
+
pseudonym?: string;
|
|
224
|
+
lengthBBSMessages?: number;
|
|
225
|
+
} {
|
|
226
|
+
const decoded = this.decodeBase64urlNoPad(proofValue);
|
|
227
|
+
const header = decoded.slice(0, 3);
|
|
228
|
+
let featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym';
|
|
229
|
+
if (this.compareBytes(header, [0xd9, 0x5d, 0x03])) featureOption = 'baseline';
|
|
230
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x05])) featureOption = 'anonymous_holder_binding';
|
|
231
|
+
else if (this.compareBytes(header, [0xd9, 0x5d, 0x07])) featureOption = 'pseudonym';
|
|
232
|
+
else throw new Error('Invalid BBS derived proof header');
|
|
233
|
+
|
|
234
|
+
const components: any[] = cbor.decode(decoded.slice(3).buffer) as any[];
|
|
235
|
+
const decompressedLabelMap = this.decompressLabelMap(components[1]);
|
|
236
|
+
const result: any = {
|
|
237
|
+
bbsProof: components[0],
|
|
238
|
+
labelMap: decompressedLabelMap,
|
|
239
|
+
mandatoryIndexes: components[2],
|
|
240
|
+
selectiveIndexes: components[3],
|
|
241
|
+
presentationHeader: components[4],
|
|
242
|
+
featureOption
|
|
243
|
+
};
|
|
244
|
+
if (featureOption === 'anonymous_holder_binding') {
|
|
245
|
+
result.lengthBBSMessages = components[5];
|
|
246
|
+
} else if (featureOption === 'pseudonym') {
|
|
247
|
+
result.pseudonym = components[5];
|
|
248
|
+
result.lengthBBSMessages = components[6];
|
|
249
|
+
}
|
|
250
|
+
return result;
|
|
251
|
+
}
|
|
252
|
+
}
|
|
253
|
+
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
import { sha256 } from '@noble/hashes/sha2.js';
|
|
2
|
+
|
|
3
|
+
export type BbsKeyPair = {
|
|
4
|
+
publicKey: Uint8Array;
|
|
5
|
+
privateKey: Uint8Array;
|
|
6
|
+
};
|
|
7
|
+
|
|
8
|
+
export class BbsSimple {
|
|
9
|
+
static readonly CIPHERSUITE = 'BLS12-381-SHA-256';
|
|
10
|
+
|
|
11
|
+
static async sign(messages: Uint8Array[], keypair: BbsKeyPair, header?: Uint8Array): Promise<Uint8Array> {
|
|
12
|
+
const headerBytes = header ?? new Uint8Array(sha256(new Uint8Array(0)));
|
|
13
|
+
throw new Error('BbsSimple.sign is not implemented');
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
static async verify(messages: Uint8Array[], signature: Uint8Array, publicKey: Uint8Array, header?: Uint8Array): Promise<boolean> {
|
|
17
|
+
const headerBytes = header ?? new Uint8Array(sha256(new Uint8Array(0)));
|
|
18
|
+
throw new Error('BbsSimple.verify is not implemented');
|
|
19
|
+
}
|
|
20
|
+
}
|
|
21
|
+
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
import { base58 } from '@scure/base';
|
|
2
|
+
import * as ed25519 from '@noble/ed25519';
|
|
3
|
+
import { canonize, canonizeProof } from '../utils/jsonld';
|
|
4
|
+
import { multikey } from '../../crypto/Multikey';
|
|
5
|
+
import { sha256Bytes } from '../../utils/hash';
|
|
6
|
+
|
|
7
|
+
export interface DataIntegrityProof {
|
|
8
|
+
type: 'DataIntegrityProof';
|
|
9
|
+
cryptosuite: string;
|
|
10
|
+
created?: string;
|
|
11
|
+
verificationMethod: string;
|
|
12
|
+
proofPurpose: string;
|
|
13
|
+
proofValue: string;
|
|
14
|
+
id?: string;
|
|
15
|
+
previousProof?: string | string[];
|
|
16
|
+
}
|
|
17
|
+
|
|
18
|
+
export interface VerificationResult {
|
|
19
|
+
verified: boolean;
|
|
20
|
+
errors?: string[];
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
export class EdDSACryptosuiteManager {
|
|
24
|
+
|
|
25
|
+
static async createProof(document: any, options: any): Promise<DataIntegrityProof> {
|
|
26
|
+
const proofConfig = await this.createProofConfiguration(options);
|
|
27
|
+
const transformedData = await this.transform(document, options);
|
|
28
|
+
const hashData = await this.hash(transformedData, proofConfig, options);
|
|
29
|
+
let privateKey: Uint8Array;
|
|
30
|
+
if (typeof options.privateKey === 'string') {
|
|
31
|
+
const dec = multikey.decodePrivateKey(options.privateKey);
|
|
32
|
+
if (dec.type !== 'Ed25519') throw new Error('Invalid key type for EdDSA');
|
|
33
|
+
privateKey = dec.key;
|
|
34
|
+
} else if (options.privateKey instanceof Uint8Array) {
|
|
35
|
+
privateKey = options.privateKey;
|
|
36
|
+
} else {
|
|
37
|
+
throw new Error('Invalid private key format');
|
|
38
|
+
}
|
|
39
|
+
const proofValueBytes = await this.sign({ data: hashData, privateKey });
|
|
40
|
+
delete (proofConfig as any)['@context'];
|
|
41
|
+
return { ...proofConfig, proofValue: base58.encode(proofValueBytes) } as DataIntegrityProof;
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
static async verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult> {
|
|
45
|
+
try {
|
|
46
|
+
const documentToVerify = { ...document };
|
|
47
|
+
delete (documentToVerify as any).proof;
|
|
48
|
+
const transformedData = await this.transform(documentToVerify, options);
|
|
49
|
+
const hashData = await this.hash(transformedData, { '@context': document['@context'], ...proof }, options);
|
|
50
|
+
const vmDoc = await options.documentLoader(proof.verificationMethod);
|
|
51
|
+
const pk = vmDoc.document.publicKeyMultibase as string;
|
|
52
|
+
const dec = multikey.decodePublicKey(pk);
|
|
53
|
+
if (dec.type !== 'Ed25519') throw new Error('Invalid key type for EdDSA');
|
|
54
|
+
const signature = base58.decode(proof.proofValue);
|
|
55
|
+
const verified = await this.verify({ data: hashData, signature, publicKey: dec.key });
|
|
56
|
+
return verified ? { verified: true } : { verified: false, errors: ['Proof verification failed'] };
|
|
57
|
+
} catch (e: any) {
|
|
58
|
+
return { verified: false, errors: [e?.message ?? 'Unknown verification error'] };
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
private static async createProofConfiguration(options: any): Promise<any> {
|
|
63
|
+
return {
|
|
64
|
+
'@context': 'https://w3id.org/security/data-integrity/v2',
|
|
65
|
+
type: 'DataIntegrityProof',
|
|
66
|
+
cryptosuite: 'eddsa-rdfc-2022',
|
|
67
|
+
created: new Date().toISOString(),
|
|
68
|
+
verificationMethod: options.verificationMethod,
|
|
69
|
+
proofPurpose: options.proofPurpose || 'assertionMethod',
|
|
70
|
+
...(options.challenge && { challenge: options.challenge }),
|
|
71
|
+
...(options.domain && { domain: options.domain })
|
|
72
|
+
};
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
private static async transform(document: any, options: any): Promise<string> {
|
|
76
|
+
return await canonize(document, { documentLoader: options.documentLoader });
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
private static async hash(transformedData: string, proofConfig: any, options: any): Promise<Uint8Array> {
|
|
80
|
+
const canonicalProofConfig = await canonizeProof(proofConfig, { documentLoader: options.documentLoader });
|
|
81
|
+
const proofConfigHash = await sha256Bytes(canonicalProofConfig);
|
|
82
|
+
const documentHash = await sha256Bytes(transformedData);
|
|
83
|
+
return new Uint8Array([...proofConfigHash, ...documentHash]);
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
static async sign({ data, privateKey }: { data: Uint8Array; privateKey: Uint8Array }): Promise<Uint8Array> {
|
|
87
|
+
if (privateKey.length !== 32) {
|
|
88
|
+
if (privateKey.length === 64) privateKey = privateKey.slice(32);
|
|
89
|
+
else throw new Error('Invalid private key length');
|
|
90
|
+
}
|
|
91
|
+
const signature = await ed25519.signAsync(Buffer.from(data).toString('hex'), Buffer.from(privateKey).toString('hex'));
|
|
92
|
+
return signature;
|
|
93
|
+
}
|
|
94
|
+
|
|
95
|
+
static async verify({ data, signature, publicKey }: { data: Uint8Array; signature: Uint8Array; publicKey: Uint8Array }): Promise<boolean> {
|
|
96
|
+
return await ed25519.verifyAsync(Buffer.from(signature).toString('hex'), Buffer.from(data).toString('hex'), Buffer.from(publicKey).toString('hex'));
|
|
97
|
+
}
|
|
98
|
+
}
|
|
99
|
+
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
import { DIDManager } from '../did/DIDManager';
|
|
2
|
+
|
|
3
|
+
type LoadedDocument = { document: any; documentUrl: string; contextUrl: string | null };
|
|
4
|
+
|
|
5
|
+
const CONTEXTS: Record<string, any> = {
|
|
6
|
+
// Provide 1.1-compatible stubs for jsonld canonize
|
|
7
|
+
'https://www.w3.org/ns/credentials/v2': { '@context': { '@version': 1.1 } },
|
|
8
|
+
'https://w3id.org/security/data-integrity/v2': { '@context': { '@version': 1.1 } }
|
|
9
|
+
};
|
|
10
|
+
|
|
11
|
+
export class DocumentLoader {
|
|
12
|
+
constructor(private didManager: DIDManager) {}
|
|
13
|
+
|
|
14
|
+
async load(iri: string): Promise<LoadedDocument> {
|
|
15
|
+
if (iri.startsWith('did:')) {
|
|
16
|
+
return this.resolveDID(iri);
|
|
17
|
+
}
|
|
18
|
+
const doc = CONTEXTS[iri];
|
|
19
|
+
if (doc) {
|
|
20
|
+
return { document: doc, documentUrl: iri, contextUrl: null };
|
|
21
|
+
}
|
|
22
|
+
throw new Error(`Document not found: ${iri}`);
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
private async resolveDID(didUrl: string): Promise<LoadedDocument> {
|
|
26
|
+
const [did, fragment] = didUrl.split('#');
|
|
27
|
+
const didDoc = await this.didManager.resolveDID(did);
|
|
28
|
+
if (!didDoc) {
|
|
29
|
+
throw new Error(`DID not resolved: ${did}`);
|
|
30
|
+
}
|
|
31
|
+
if (fragment) {
|
|
32
|
+
// If a VM was registered explicitly, prefer it
|
|
33
|
+
const cached = verificationMethodRegistry.get(didUrl);
|
|
34
|
+
if (cached) {
|
|
35
|
+
return {
|
|
36
|
+
document: { '@context': (didDoc as any)['@context'], ...cached },
|
|
37
|
+
documentUrl: didUrl,
|
|
38
|
+
contextUrl: null
|
|
39
|
+
};
|
|
40
|
+
}
|
|
41
|
+
const vms = (didDoc as any).verificationMethod as any[] | undefined;
|
|
42
|
+
const vm = vms?.find((m) => m.id === didUrl);
|
|
43
|
+
if (vm) {
|
|
44
|
+
return {
|
|
45
|
+
document: { '@context': (didDoc as any)['@context'], ...vm },
|
|
46
|
+
documentUrl: didUrl,
|
|
47
|
+
contextUrl: null
|
|
48
|
+
};
|
|
49
|
+
}
|
|
50
|
+
return {
|
|
51
|
+
document: { '@context': (didDoc as any)['@context'], id: didUrl },
|
|
52
|
+
documentUrl: didUrl,
|
|
53
|
+
contextUrl: null
|
|
54
|
+
};
|
|
55
|
+
}
|
|
56
|
+
return { document: didDoc, documentUrl: didUrl, contextUrl: null };
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
export const createDocumentLoader = (didManager: DIDManager) =>
|
|
61
|
+
(iri: string) => new DocumentLoader(didManager).load(iri);
|
|
62
|
+
|
|
63
|
+
export const verificationMethodRegistry: Map<string, any> = new Map();
|
|
64
|
+
export function registerVerificationMethod(vm: any) {
|
|
65
|
+
if (vm?.id) verificationMethodRegistry.set(vm.id, vm);
|
|
66
|
+
}
|
|
67
|
+
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
import { EdDSACryptosuiteManager, type DataIntegrityProof } from '../cryptosuites/eddsa';
|
|
2
|
+
|
|
3
|
+
export interface VerificationResult { verified: boolean; errors?: string[] }
|
|
4
|
+
|
|
5
|
+
export interface ProofOptions {
|
|
6
|
+
verificationMethod: string;
|
|
7
|
+
proofPurpose: string;
|
|
8
|
+
privateKey?: Uint8Array | string;
|
|
9
|
+
type: 'DataIntegrityProof';
|
|
10
|
+
created?: string;
|
|
11
|
+
cryptosuite: string;
|
|
12
|
+
documentLoader?: (url: string) => Promise<any>;
|
|
13
|
+
previousProof?: string | string[];
|
|
14
|
+
challenge?: string;
|
|
15
|
+
domain?: string;
|
|
16
|
+
}
|
|
17
|
+
|
|
18
|
+
export class DataIntegrityProofManager {
|
|
19
|
+
static async createProof(document: any, options: ProofOptions): Promise<DataIntegrityProof> {
|
|
20
|
+
if (options.cryptosuite !== 'eddsa-rdfc-2022') {
|
|
21
|
+
throw new Error(`Unsupported cryptosuite: ${options.cryptosuite}`);
|
|
22
|
+
}
|
|
23
|
+
return await EdDSACryptosuiteManager.createProof(document, options);
|
|
24
|
+
}
|
|
25
|
+
|
|
26
|
+
static async verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult> {
|
|
27
|
+
if (proof.cryptosuite !== 'eddsa-rdfc-2022') {
|
|
28
|
+
return { verified: false, errors: [`Unsupported cryptosuite: ${proof.cryptosuite}`] };
|
|
29
|
+
}
|
|
30
|
+
return await EdDSACryptosuiteManager.verifyProof(document, proof, options);
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import jsonld from 'jsonld';
|
|
2
|
+
|
|
3
|
+
export async function canonize(input: any, { documentLoader }: any): Promise<string> {
|
|
4
|
+
return await jsonld.canonize(input, {
|
|
5
|
+
algorithm: 'URDNA2015',
|
|
6
|
+
format: 'application/n-quads',
|
|
7
|
+
documentLoader,
|
|
8
|
+
safe: false,
|
|
9
|
+
useNative: false,
|
|
10
|
+
rdfDirection: 'i18n-datatype'
|
|
11
|
+
} as any);
|
|
12
|
+
}
|
|
13
|
+
|
|
14
|
+
export async function canonizeProof(proof: any, { documentLoader }: any): Promise<string> {
|
|
15
|
+
const { jws, signatureValue, proofValue, ...rest } = proof;
|
|
16
|
+
return await canonize(rest, { documentLoader });
|
|
17
|
+
}
|
|
18
|
+
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmVFoL8KkZjSm6jbNjaSoty2VmRgsn5XcvYc2xypMKcVja","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt","updateKeys":["did:key:z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com","controller":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK","id":"did:webvh:QmQsRNhXxPSCSeLjpbKYcNMZj8b1kBQAoC6cZmkFAgmpHt:example.com#B6rgkDkK"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkfeK7MfHsfBVsithxymtEEGzcm65Sy5ABu26BB6rgkDkK","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2SNdJGiwveT9G28kqRze62jtek8MAEkMZiFLf73W47RV1gtY8FhMfof6JfrQodNyroKqRZLzwEo3nh5YdE9FQQzq"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmXXUezZTj4hs7XXBVmJFtqkPzq6zmfT7mnYtSy93dcqcA","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8","updateKeys":["did:key:z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile","controller":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv","id":"did:webvh:QmSQkpD58qxcqMWHYcEmDUn3wk7hHvJwzYTrZmhh6zjPQ8:example.com:users:alice123:profile#bCwUXAwv"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkvcdW3MMEkdsJ5k9QxaYhJ3Vy3kxFi3MoJVJmbCwUXAwv","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5SFg3UEgnznehjGcSHTv7DSfqCLbKjku8quZgJNjBcBeFCfWWUDxg3nz3s77BeiqSGg48b2LdC1V4w24qY5V7kY8"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmZbzt7KWQPDHSFZtXNac8x5T67DdXciJ7tZuH44LgNMMt","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG","updateKeys":["did:key:z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD"],"portable":true,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com","controller":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD","id":"did:webvh:QmTMda6VW3cUPdKk5Yc3onnv1vdgEumvWWdP2noAYFSjeG:example.com#QdhFFCFD"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkiiFsyjXnNyMW8UkePq7AQip98oPwNGdunUAQQdhFFCFD","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5aM8QNrVcXbHL2b7ZVLSApwMQTtWR8Mqx6du4GjqGwuvsJjV5YcTGduyhTWx1W47Y3wxNvSxFUaC3Hjn6joFcy1N"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmaCt3oXVhW6z4zHaRUHXDDBAqK6nXbCJJcA7FeqrZaCa9","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE","updateKeys":["did:key:z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd","controller":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6","id":"did:webvh:QmTkb8KnCYcsnKKDCY4eUQuKQdKJLrCinvhw13v3zETxpE:example.com:users/../../etc:passwd#p3VsoQH6"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhGek6BDYUJaCi2owYie7tHh6PthjbFBZXpqvp3VsoQH6","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3VjxJbNc7zKfi4Wghu2M1CZcCAcnViMWEZvBNp9PmL7EMXW6ujujvdmVAyVtg4nQWVCrgsT9bXkNjArP2aN9ErfX"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmbK3vTYePzoHCztpoGGLJ6g2dAbP9FaG4YNm8kq85jx1v","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg","updateKeys":["did:key:z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com","controller":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc","id":"did:webvh:QmTn9FdCfpXFDrxHH52pwB4iNrDFVvNDjJ5FQTcDbmM3Fg:example.com#7FXPMcqc"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkveHK8o9yHz53iokLuqdQVPi7HCa2x3nuhpbV7FXPMcqc","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4AYeUb5Q3fcCtxipcKAXhVYDVbEpJq9K19TQT8sRbaEbfLNB5im6zscGDGPBrUUXdmZWkDEjJy6BVHkd4zKENrEY"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmUg4dGxdziDuYMZD1iAmABeSabHtKJNof39z6T4FPurXP","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP","updateKeys":["did:key:z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd","controller":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM","id":"did:webvh:QmUCQUi1xjtJjnSQ1XJZgKqcWgErx1v7E2dz4DAPraAyJP:example.com:/etc/passwd#fHurjDLM"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkhc5vwBDTdcgkU3z5CJvz8rJ57MDxdhTXLMTMfHurjDLM","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4XunKaGmWgSNqeJgXnSgN1MjGxbyJZvQqxfbVrZHDg6zXBkjqyXTfo7FvigqqPjkGkq4PdfWU9zcsgXN7fBU8uPx"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmWZ45L2o7DsUCfSxsBanGb4chUz5Xw7H82pgUE3cWScFC","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W","updateKeys":["did:key:z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com","controller":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG","id":"did:webvh:QmUENQJCDKBJVRS5BkL6zjaUvcRjkb9xHmy7foCgRjmv3W:example.com#p3K9yTRG"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknpzjexyKJeBE1VEcPZkQJY6weXVzpurfSKYLp3K9yTRG","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2kpQ5QQJ4U9GuiFxt5q8JwQy8dyb7Sg5Q3HVqg2KzTtzfoanUEvVBhgeWv29ifkXGGesWTBqomc1XL4K3DrksR3R"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmeyQ12S1GgSyY4KXEpwRgGNZBgwenez5UUtiDJio4crXn","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc","updateKeys":["did:key:z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com","controller":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv","id":"did:webvh:QmUPdGyjYBEnQ3aQUkmqyyBKTyjvCP5RZQGiaEDeTtf6dc:example.com#XUaP15gv"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwKJw7nYFeonAyubMcykqdLiAhJvAMHP6RDsmXUaP15gv","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3mpWMnA398SQwaapPPEaNDjYRGSoykDjuF5x5p21XvYAi3wsURwNebRms5zTUiBJKiNNgKUShA41SxQT8NsSsgd8"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmdotkBk5VciaCbx2sWm2vRYDUYN3nJDucULS9NVk4vZqe","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M","updateKeys":["did:key:z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com","controller":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT","id":"did:webvh:QmUoHTuHMWzQM29ZFrE9VLtMxkZ5u869yqee8LwcCLN39M:example.com#DZ7U5BUT"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkuqDvzA4YnxySWNQketEr3proqb6g76uEDbwmDZ7U5BUT","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z626vNPHmGGa5ct13P5BhLhXYEJHZK97WM2Kuv4WvdMnjEwtmQGLeba9eEHC1G8iyk3NY1P463Ta2wt86eMQFB9aV"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmZGeHiLVXA74xRdC1NY9QS62fsreQTi3vWvKDcefiF1C3","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw","updateKeys":["did:key:z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice","controller":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i","id":"did:webvh:QmUrnms8G65ggVKsr9oQeWrLUBuGChwQPPb2LCFvaoNxaw:example.com:users:alice#MbHAyj9i"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkop8C2BtwuuVzKUeda9sbj7FgKHTWDMtQNKhfMbHAyj9i","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z35aNWoLZVuFUB6d2446kKN6J4sMmoqpeMSC6qLoqbYGnXgujM59LUy7wGeHS45qTPVqpKVEn1NYknDZcNGn3Kxkw"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmbTMTKdtN9ZRgjkpV18yDWKruPVX7p5w7tCu9brmzM9ac","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb","updateKeys":["did:key:z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2","controller":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R","id":"did:webvh:QmUwiw3eSXdHG1hPvoAGu3cuK5jF4aXRYDLBAjPXfv1qzb:example.com:level1:level2#WW8zsm2R"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhACu5NAZPi7baoKzyXRbPuNtf2To47rTi2kXWW8zsm2R","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z2b5GhRDenv9Sj6ziPq4bFQckvLkyXbQUedGiDJRDfBNRouS5uy9EF2Z8Xkiqse6m4DNLX4jZcxvDoNxLTDogimvx"}]}
|
package/test/logs/did_webvh_QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj_example_com_secret.jsonl
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmWjKzJLDRbRvuFAcxMjdS1WiguU58nUBSbG9usbohwG6J","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj","updateKeys":["did:key:z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret","controller":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic","id":"did:webvh:QmW7bzKh6yFEKNAtmVsrPGvvsMHTUQdzJSNsTZkbuGFpbj:example.com:.:secret#MS9P2Vic"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkiTDhxMVpmDfSJGLzs5Zc4yYqdidajGx6PVZFMS9P2Vic","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3YWE8je7ycWYJYGzgLFipepHg92AVPJmW2quSt248FK9XwupWuXS44bjhKZsejTFFApB5mw5aau7aE1C6U7jByzH"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmUuqC3ofB2M3EUFmCWp1rc8xyi6mQ4thWbowipHJG31Cu","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG","updateKeys":["did:key:z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com","controller":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC","id":"did:webvh:QmXbFTFBBJ8zpjdz9WE1DNN44A2wprFmdvAubjSffeyoAG:example.com#77cZtKQC"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknpaDbHCF8C7Mw7TNzfkWv2skzUGZXcWjeu1977cZtKQC","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3Tm2P41cvep9vCohxFr2JNmyehHbaZdUDkJJkxBfLCTWMU9H7W6pFFVqQyL41hseL7YHwRs8S4XwzboZLGri6r4y"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmTJoptg7LHRG3nwr3Wh7QvE2rD38RhPQ6e8vHebGjpJMU","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf","updateKeys":["did:key:z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32","controller":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV","id":"did:webvh:QmXyVXFPCTffGb2mTUFDeMCsScjnpLWkyUkVkB6q6QoeBf:example.com:C:\\Windows\\System32#wYpqoyiV"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkoeSWeAxHsu7zaTjiQJV4MSMgkhDCvgWk2aw5wYpqoyiV","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5U8KhNq9NFbKgoD1dmCTtp5UgSGJCQz1ztCy78swVPaWVSNKYghiZmKAvZU68Yt7vqumYd9ERGgLoSL1mwYumkuq"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmTnMvZne37gpM7Mm7QfJ8VqAmrKSRPBYsEfYCvRqSjQaF","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE","updateKeys":["did:key:z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd","controller":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA","id":"did:webvh:QmZK9B81gxZtvo5fYHYKDtKt8zZfZZPhmCMhbujBJuRRzE:example.com:..:etc:passwd#XZcghunA"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkizhCWHtBJReYAf1EH9dFy2aXtkdsRkrwVj1jXZcghunA","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z3YDQo3XcnmDyoYFu1DbqcfgEmjCcSo7a37BnPpzxKTQAe4vqkoLPboPEg1zucVME6QAkM76YNQcC32FpsrNkGmic"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmQc86R7CRBV9N4rBzDeXeXmboetxZ6hUZcsm1pjzd6mdT","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL","updateKeys":["did:key:z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd","controller":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25","id":"did:webvh:QmbNLCVSdXSVLrwFBvCBQPAabjtRb1SGHjkGVyw3QUbfBL:example.com:users\u0000etc:passwd#E9PGPP25"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknTbvH2YqGNbdWf6qjMVUEwchBAwoD9URGBQ3E9PGPP25","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z54nZQ42iuD4TKhLHwLZv6GYrpuNCC96pnEHaDqhmBF2RtFGMND3P8bP1YX6V3wzhhbMkrjdAsMeYxGXEW8R4ew6K"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmSPMH7aH19vBqnmrCNnBbqoWyJ1V3Z2CPR2RP3WUr9VU9","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb","updateKeys":["did:key:z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123","controller":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P","id":"did:webvh:QmbeaicmGW3Q7Yzbqmftc8a9jLBngokveb5A2KVKfVGZRb:example.com:my-org:user_name:test-123#HcHdgh8P"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgYGzvSqxmcVKy7DbtVvJwDkmnaksAp5tymufHcHdgh8P","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4TJGokkoEgzeB673Vfn2s7zBHDHDch1THKXU81NG4TATBveymiqeyeXh2m1YCufyx5civaqAQECsibYRL7JydyZi"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmduwSmHiwsJ6A9WvvJnoE8fLDvbh217VaUKEriQwk3wSQ","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp","updateKeys":["did:key:z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd","controller":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e","id":"did:webvh:Qmdv7c7AjUreUfoKyvkN2UpAWTozxKsv99srQetPJMJEnp:example.com:users\\..\\..\\etc:passwd#FdtkuN4e"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwZSCjx348UTvHA71miweh5FmEP6c1CA2mZFRFdtkuN4e","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5kTiyWGUiwnJ7snnkGkkUby3sKXF8u6CSS69UDXtTDxtXVHMwPYH95m1BWLwdLZMU6rya2ZsCbWuQgnALrNW5ZPu"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmRWV7epcDcx8MwjPKBrPDK24SPPf2CpdA4Shp7poKxCLY","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG","updateKeys":["did:key:z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com","controller":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z","id":"did:webvh:QmeioWY3uypYLkYpCXe9eCYnn4xBVruP9C1d79azMrTEHG:example.com#MVR3J55Z"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgrKGyjTNHKHEAWzVF31997VW9d85HJNkXz6rMVR3J55Z","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z4trznFGa2iNb7jkMfQygeNyXhQ18aYQEW9ydvKnLwN2z2ti2VLbUi8ZwvWv17rbgNLNzGcQG5oSv9DxnJGufp6uT"}]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"versionId":"1-QmVy9mi51r2SvhNyX2ctU8XhXp8rTS4oiJpaZRX4nqscox","versionTime":"2025-11-19T05:28:58Z","parameters":{"method":"did:webvh:1.0","scid":"Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi","updateKeys":["did:key:z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice","controller":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn","id":"did:webvh:Qmf4QH5dsA6Ecr5HJ6KaJL9uJRyY8RxrQdqoRCM25DzvPi:example.com:users:alice#r7vL5Dpn"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mku3rMtyvafAivjUFWuimDUimPmmPVK74SRs47r7vL5Dpn","created":"2025-11-19T05:28:58Z","proofPurpose":"assertionMethod","proofValue":"z5h238CMZSeHD38kpCcHh12hJaQ9VJQ5c4zf3doZxzaHUkSrSTYxqbTR42ruNpBEboPcMGQPAZ7R3CddvpkEBu6mw"}]}
|