@originals/sdk 1.2.0 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (401) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/.turbo/turbo-build.log +0 -1
  4. package/dist/adapters/FeeOracleMock.d.ts +0 -6
  5. package/dist/adapters/FeeOracleMock.js +0 -8
  6. package/dist/adapters/index.d.ts +0 -4
  7. package/dist/adapters/index.js +0 -4
  8. package/dist/adapters/providers/OrdHttpProvider.d.ts +0 -56
  9. package/dist/adapters/providers/OrdHttpProvider.js +0 -110
  10. package/dist/adapters/providers/OrdMockProvider.d.ts +0 -70
  11. package/dist/adapters/providers/OrdMockProvider.js +0 -75
  12. package/dist/adapters/types.d.ts +0 -71
  13. package/dist/adapters/types.js +0 -1
  14. package/dist/bitcoin/BitcoinManager.d.ts +0 -15
  15. package/dist/bitcoin/BitcoinManager.js +0 -262
  16. package/dist/bitcoin/BroadcastClient.d.ts +0 -30
  17. package/dist/bitcoin/BroadcastClient.js +0 -35
  18. package/dist/bitcoin/OrdinalsClient.d.ts +0 -21
  19. package/dist/bitcoin/OrdinalsClient.js +0 -105
  20. package/dist/bitcoin/PSBTBuilder.d.ts +0 -24
  21. package/dist/bitcoin/PSBTBuilder.js +0 -80
  22. package/dist/bitcoin/fee-calculation.d.ts +0 -14
  23. package/dist/bitcoin/fee-calculation.js +0 -31
  24. package/dist/bitcoin/providers/OrdNodeProvider.d.ts +0 -38
  25. package/dist/bitcoin/providers/OrdNodeProvider.js +0 -67
  26. package/dist/bitcoin/providers/OrdinalsProvider.d.ts +0 -33
  27. package/dist/bitcoin/providers/OrdinalsProvider.js +0 -50
  28. package/dist/bitcoin/providers/types.d.ts +0 -63
  29. package/dist/bitcoin/providers/types.js +0 -1
  30. package/dist/bitcoin/transactions/commit.d.ts +0 -89
  31. package/dist/bitcoin/transactions/commit.js +0 -311
  32. package/dist/bitcoin/transactions/index.d.ts +0 -7
  33. package/dist/bitcoin/transactions/index.js +0 -8
  34. package/dist/bitcoin/transfer.d.ts +0 -9
  35. package/dist/bitcoin/transfer.js +0 -26
  36. package/dist/bitcoin/utxo-selection.d.ts +0 -78
  37. package/dist/bitcoin/utxo-selection.js +0 -237
  38. package/dist/bitcoin/utxo.d.ts +0 -26
  39. package/dist/bitcoin/utxo.js +0 -78
  40. package/dist/contexts/credentials-v1.json +0 -195
  41. package/dist/contexts/credentials-v2-examples.json +0 -5
  42. package/dist/contexts/credentials-v2.json +0 -301
  43. package/dist/contexts/credentials.json +0 -195
  44. package/dist/contexts/data-integrity-v2.json +0 -81
  45. package/dist/contexts/dids.json +0 -57
  46. package/dist/contexts/ed255192020.json +0 -93
  47. package/dist/contexts/ordinals-plus.json +0 -23
  48. package/dist/contexts/originals.json +0 -22
  49. package/dist/core/OriginalsSDK.d.ts +0 -158
  50. package/dist/core/OriginalsSDK.js +0 -274
  51. package/dist/crypto/Multikey.d.ts +0 -30
  52. package/dist/crypto/Multikey.js +0 -149
  53. package/dist/crypto/Signer.d.ts +0 -21
  54. package/dist/crypto/Signer.js +0 -196
  55. package/dist/crypto/noble-init.d.ts +0 -18
  56. package/dist/crypto/noble-init.js +0 -106
  57. package/dist/did/BtcoDidResolver.d.ts +0 -57
  58. package/dist/did/BtcoDidResolver.js +0 -166
  59. package/dist/did/DIDManager.d.ts +0 -101
  60. package/dist/did/DIDManager.js +0 -493
  61. package/dist/did/Ed25519Verifier.d.ts +0 -30
  62. package/dist/did/Ed25519Verifier.js +0 -59
  63. package/dist/did/KeyManager.d.ts +0 -17
  64. package/dist/did/KeyManager.js +0 -207
  65. package/dist/did/WebVHManager.d.ts +0 -100
  66. package/dist/did/WebVHManager.js +0 -304
  67. package/dist/did/createBtcoDidDocument.d.ts +0 -10
  68. package/dist/did/createBtcoDidDocument.js +0 -42
  69. package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +0 -23
  70. package/dist/did/providers/OrdinalsClientProviderAdapter.js +0 -51
  71. package/dist/events/EventEmitter.d.ts +0 -115
  72. package/dist/events/EventEmitter.js +0 -198
  73. package/dist/events/index.d.ts +0 -7
  74. package/dist/events/index.js +0 -6
  75. package/dist/events/types.d.ts +0 -286
  76. package/dist/events/types.js +0 -9
  77. package/dist/examples/basic-usage.d.ts +0 -3
  78. package/dist/examples/basic-usage.js +0 -62
  79. package/dist/examples/run.d.ts +0 -1
  80. package/dist/examples/run.js +0 -4
  81. package/dist/index.d.ts +0 -39
  82. package/dist/index.js +0 -47
  83. package/dist/lifecycle/BatchOperations.d.ts +0 -147
  84. package/dist/lifecycle/BatchOperations.js +0 -251
  85. package/dist/lifecycle/LifecycleManager.d.ts +0 -116
  86. package/dist/lifecycle/LifecycleManager.js +0 -971
  87. package/dist/lifecycle/OriginalsAsset.d.ts +0 -164
  88. package/dist/lifecycle/OriginalsAsset.js +0 -380
  89. package/dist/lifecycle/ProvenanceQuery.d.ts +0 -126
  90. package/dist/lifecycle/ProvenanceQuery.js +0 -220
  91. package/dist/lifecycle/ResourceVersioning.d.ts +0 -73
  92. package/dist/lifecycle/ResourceVersioning.js +0 -127
  93. package/dist/migration/MigrationManager.d.ts +0 -86
  94. package/dist/migration/MigrationManager.js +0 -412
  95. package/dist/migration/audit/AuditLogger.d.ts +0 -51
  96. package/dist/migration/audit/AuditLogger.js +0 -156
  97. package/dist/migration/checkpoint/CheckpointManager.d.ts +0 -31
  98. package/dist/migration/checkpoint/CheckpointManager.js +0 -96
  99. package/dist/migration/checkpoint/CheckpointStorage.d.ts +0 -26
  100. package/dist/migration/checkpoint/CheckpointStorage.js +0 -89
  101. package/dist/migration/index.d.ts +0 -22
  102. package/dist/migration/index.js +0 -27
  103. package/dist/migration/operations/BaseMigration.d.ts +0 -48
  104. package/dist/migration/operations/BaseMigration.js +0 -83
  105. package/dist/migration/operations/PeerToBtcoMigration.d.ts +0 -25
  106. package/dist/migration/operations/PeerToBtcoMigration.js +0 -67
  107. package/dist/migration/operations/PeerToWebvhMigration.d.ts +0 -19
  108. package/dist/migration/operations/PeerToWebvhMigration.js +0 -46
  109. package/dist/migration/operations/WebvhToBtcoMigration.d.ts +0 -25
  110. package/dist/migration/operations/WebvhToBtcoMigration.js +0 -67
  111. package/dist/migration/rollback/RollbackManager.d.ts +0 -29
  112. package/dist/migration/rollback/RollbackManager.js +0 -146
  113. package/dist/migration/state/StateMachine.d.ts +0 -25
  114. package/dist/migration/state/StateMachine.js +0 -76
  115. package/dist/migration/state/StateTracker.d.ts +0 -36
  116. package/dist/migration/state/StateTracker.js +0 -123
  117. package/dist/migration/types.d.ts +0 -306
  118. package/dist/migration/types.js +0 -33
  119. package/dist/migration/validation/BitcoinValidator.d.ts +0 -13
  120. package/dist/migration/validation/BitcoinValidator.js +0 -83
  121. package/dist/migration/validation/CredentialValidator.d.ts +0 -13
  122. package/dist/migration/validation/CredentialValidator.js +0 -46
  123. package/dist/migration/validation/DIDCompatibilityValidator.d.ts +0 -16
  124. package/dist/migration/validation/DIDCompatibilityValidator.js +0 -127
  125. package/dist/migration/validation/LifecycleValidator.d.ts +0 -10
  126. package/dist/migration/validation/LifecycleValidator.js +0 -52
  127. package/dist/migration/validation/StorageValidator.d.ts +0 -10
  128. package/dist/migration/validation/StorageValidator.js +0 -65
  129. package/dist/migration/validation/ValidationPipeline.d.ts +0 -29
  130. package/dist/migration/validation/ValidationPipeline.js +0 -180
  131. package/dist/storage/LocalStorageAdapter.d.ts +0 -11
  132. package/dist/storage/LocalStorageAdapter.js +0 -53
  133. package/dist/storage/MemoryStorageAdapter.d.ts +0 -6
  134. package/dist/storage/MemoryStorageAdapter.js +0 -21
  135. package/dist/storage/StorageAdapter.d.ts +0 -16
  136. package/dist/storage/StorageAdapter.js +0 -1
  137. package/dist/storage/index.d.ts +0 -2
  138. package/dist/storage/index.js +0 -2
  139. package/dist/types/bitcoin.d.ts +0 -84
  140. package/dist/types/bitcoin.js +0 -1
  141. package/dist/types/common.d.ts +0 -82
  142. package/dist/types/common.js +0 -1
  143. package/dist/types/credentials.d.ts +0 -75
  144. package/dist/types/credentials.js +0 -1
  145. package/dist/types/did.d.ts +0 -26
  146. package/dist/types/did.js +0 -1
  147. package/dist/types/index.d.ts +0 -5
  148. package/dist/types/index.js +0 -5
  149. package/dist/types/network.d.ts +0 -78
  150. package/dist/types/network.js +0 -145
  151. package/dist/utils/EventLogger.d.ts +0 -71
  152. package/dist/utils/EventLogger.js +0 -232
  153. package/dist/utils/Logger.d.ts +0 -106
  154. package/dist/utils/Logger.js +0 -257
  155. package/dist/utils/MetricsCollector.d.ts +0 -110
  156. package/dist/utils/MetricsCollector.js +0 -264
  157. package/dist/utils/bitcoin-address.d.ts +0 -38
  158. package/dist/utils/bitcoin-address.js +0 -113
  159. package/dist/utils/cbor.d.ts +0 -2
  160. package/dist/utils/cbor.js +0 -9
  161. package/dist/utils/encoding.d.ts +0 -37
  162. package/dist/utils/encoding.js +0 -120
  163. package/dist/utils/hash.d.ts +0 -1
  164. package/dist/utils/hash.js +0 -5
  165. package/dist/utils/retry.d.ts +0 -10
  166. package/dist/utils/retry.js +0 -35
  167. package/dist/utils/satoshi-validation.d.ts +0 -60
  168. package/dist/utils/satoshi-validation.js +0 -156
  169. package/dist/utils/serialization.d.ts +0 -14
  170. package/dist/utils/serialization.js +0 -76
  171. package/dist/utils/telemetry.d.ts +0 -17
  172. package/dist/utils/telemetry.js +0 -24
  173. package/dist/utils/validation.d.ts +0 -5
  174. package/dist/utils/validation.js +0 -98
  175. package/dist/vc/CredentialManager.d.ts +0 -22
  176. package/dist/vc/CredentialManager.js +0 -227
  177. package/dist/vc/Issuer.d.ts +0 -27
  178. package/dist/vc/Issuer.js +0 -70
  179. package/dist/vc/Verifier.d.ts +0 -16
  180. package/dist/vc/Verifier.js +0 -50
  181. package/dist/vc/cryptosuites/bbs.d.ts +0 -44
  182. package/dist/vc/cryptosuites/bbs.js +0 -213
  183. package/dist/vc/cryptosuites/bbsSimple.d.ts +0 -9
  184. package/dist/vc/cryptosuites/bbsSimple.js +0 -12
  185. package/dist/vc/cryptosuites/eddsa.d.ts +0 -30
  186. package/dist/vc/cryptosuites/eddsa.js +0 -81
  187. package/dist/vc/documentLoader.d.ts +0 -16
  188. package/dist/vc/documentLoader.js +0 -59
  189. package/dist/vc/proofs/data-integrity.d.ts +0 -21
  190. package/dist/vc/proofs/data-integrity.js +0 -15
  191. package/dist/vc/utils/jsonld.d.ts +0 -2
  192. package/dist/vc/utils/jsonld.js +0 -15
  193. package/src/adapters/FeeOracleMock.ts +0 -9
  194. package/src/adapters/index.ts +0 -5
  195. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  196. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  197. package/src/adapters/types.ts +0 -66
  198. package/src/bitcoin/BitcoinManager.ts +0 -330
  199. package/src/bitcoin/BroadcastClient.ts +0 -54
  200. package/src/bitcoin/OrdinalsClient.ts +0 -119
  201. package/src/bitcoin/PSBTBuilder.ts +0 -106
  202. package/src/bitcoin/fee-calculation.ts +0 -38
  203. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  204. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  205. package/src/bitcoin/providers/types.ts +0 -59
  206. package/src/bitcoin/transactions/commit.ts +0 -465
  207. package/src/bitcoin/transactions/index.ts +0 -13
  208. package/src/bitcoin/transfer.ts +0 -43
  209. package/src/bitcoin/utxo-selection.ts +0 -322
  210. package/src/bitcoin/utxo.ts +0 -113
  211. package/src/contexts/credentials-v1.json +0 -237
  212. package/src/contexts/credentials-v2-examples.json +0 -5
  213. package/src/contexts/credentials-v2.json +0 -340
  214. package/src/contexts/credentials.json +0 -237
  215. package/src/contexts/data-integrity-v2.json +0 -81
  216. package/src/contexts/dids.json +0 -58
  217. package/src/contexts/ed255192020.json +0 -93
  218. package/src/contexts/ordinals-plus.json +0 -23
  219. package/src/contexts/originals.json +0 -22
  220. package/src/core/OriginalsSDK.ts +0 -416
  221. package/src/crypto/Multikey.ts +0 -194
  222. package/src/crypto/Signer.ts +0 -254
  223. package/src/crypto/noble-init.ts +0 -121
  224. package/src/did/BtcoDidResolver.ts +0 -227
  225. package/src/did/DIDManager.ts +0 -694
  226. package/src/did/Ed25519Verifier.ts +0 -68
  227. package/src/did/KeyManager.ts +0 -236
  228. package/src/did/WebVHManager.ts +0 -489
  229. package/src/did/createBtcoDidDocument.ts +0 -59
  230. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  231. package/src/events/EventEmitter.ts +0 -222
  232. package/src/events/index.ts +0 -19
  233. package/src/events/types.ts +0 -331
  234. package/src/examples/basic-usage.ts +0 -78
  235. package/src/examples/run.ts +0 -5
  236. package/src/index.ts +0 -84
  237. package/src/lifecycle/BatchOperations.ts +0 -373
  238. package/src/lifecycle/LifecycleManager.ts +0 -1218
  239. package/src/lifecycle/OriginalsAsset.ts +0 -524
  240. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  241. package/src/lifecycle/ResourceVersioning.ts +0 -163
  242. package/src/migration/MigrationManager.ts +0 -527
  243. package/src/migration/audit/AuditLogger.ts +0 -176
  244. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  245. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  246. package/src/migration/index.ts +0 -33
  247. package/src/migration/operations/BaseMigration.ts +0 -126
  248. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  249. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  250. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  251. package/src/migration/rollback/RollbackManager.ts +0 -170
  252. package/src/migration/state/StateMachine.ts +0 -92
  253. package/src/migration/state/StateTracker.ts +0 -156
  254. package/src/migration/types.ts +0 -344
  255. package/src/migration/validation/BitcoinValidator.ts +0 -107
  256. package/src/migration/validation/CredentialValidator.ts +0 -62
  257. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  258. package/src/migration/validation/LifecycleValidator.ts +0 -64
  259. package/src/migration/validation/StorageValidator.ts +0 -79
  260. package/src/migration/validation/ValidationPipeline.ts +0 -213
  261. package/src/storage/LocalStorageAdapter.ts +0 -61
  262. package/src/storage/MemoryStorageAdapter.ts +0 -29
  263. package/src/storage/StorageAdapter.ts +0 -25
  264. package/src/storage/index.ts +0 -3
  265. package/src/types/bitcoin.ts +0 -98
  266. package/src/types/common.ts +0 -92
  267. package/src/types/credentials.ts +0 -88
  268. package/src/types/did.ts +0 -31
  269. package/src/types/external-shims.d.ts +0 -53
  270. package/src/types/index.ts +0 -7
  271. package/src/types/network.ts +0 -175
  272. package/src/utils/EventLogger.ts +0 -298
  273. package/src/utils/Logger.ts +0 -322
  274. package/src/utils/MetricsCollector.ts +0 -358
  275. package/src/utils/bitcoin-address.ts +0 -130
  276. package/src/utils/cbor.ts +0 -12
  277. package/src/utils/encoding.ts +0 -127
  278. package/src/utils/hash.ts +0 -6
  279. package/src/utils/retry.ts +0 -46
  280. package/src/utils/satoshi-validation.ts +0 -196
  281. package/src/utils/serialization.ts +0 -96
  282. package/src/utils/telemetry.ts +0 -40
  283. package/src/utils/validation.ts +0 -119
  284. package/src/vc/CredentialManager.ts +0 -273
  285. package/src/vc/Issuer.ts +0 -100
  286. package/src/vc/Verifier.ts +0 -47
  287. package/src/vc/cryptosuites/bbs.ts +0 -253
  288. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  289. package/src/vc/cryptosuites/eddsa.ts +0 -99
  290. package/src/vc/documentLoader.ts +0 -67
  291. package/src/vc/proofs/data-integrity.ts +0 -33
  292. package/src/vc/utils/jsonld.ts +0 -18
  293. package/test/logs/did_webvh_QmNTn9Kkp8dQ75WrF9xqJ2kuDp9QhKc3aPiERRMj8XoTBN_example_com.jsonl +0 -1
  294. package/test/logs/did_webvh_QmNu4MNr8Lr5txx5gYNhuhZDchXsZEu3hJXKYuphpWTPDp_example_com_users_etc_passwd.jsonl +0 -1
  295. package/test/logs/did_webvh_QmR9MrGZACzjKETA8SBRNCKG11HxU85c4bVR2qN5eDCfsD_example_com.jsonl +0 -1
  296. package/test/logs/did_webvh_QmUc5suaqRM2P4nrXxZwqYMfqzhdMqjuL7oJaJbEpCQVCd_example_com_users_etc_passwd.jsonl +0 -1
  297. package/test/logs/did_webvh_QmUkiB2RCV2VZ1RTXsCebWN25Eiy9TLvpzDWAJNjhgvB4X_example_com_etc_passwd.jsonl +0 -1
  298. package/test/logs/did_webvh_QmUoRTe8UMwpAQXZSAW7pjAgZK1tq2X3C6Kfxq3UXGcaGy_example_com_secret.jsonl +0 -1
  299. package/test/logs/did_webvh_QmWWot3chx1t6KwTmcE5i2FeDZ5JMkQw3qXycsKDVmJ9Be_example_com_users_alice.jsonl +0 -1
  300. package/test/logs/did_webvh_QmWvVgALL5kjZdpgR7KZay7J8UiiUr834kkRmWeFAxjAuC_example_com_users_etc_passwd.jsonl +0 -1
  301. package/test/logs/did_webvh_QmWwaRQHUZAFcKihFC6xR6tRTTrQhHPTku6azf1egWbpy1_example_com_users_alice.jsonl +0 -1
  302. package/test/logs/did_webvh_QmXJLtkz23r7AozbtXsZMKWnVU6rd38CkVtjdWuATU3Yp6_example_com_users_alice123_profile.jsonl +0 -1
  303. package/test/logs/did_webvh_QmYsce448po14oDE1wXbyaP6wY9HQgHSKLwdezn1k577SF_example_com_my_org_user_name_test_123.jsonl +0 -1
  304. package/test/logs/did_webvh_QmZBeNzzqajxdfwcDUPZ4P8C5YSXyRztrAwmPiKuKUxmAK_example_com.jsonl +0 -1
  305. package/test/logs/did_webvh_QmZhJsqxizwVbRtqCUkmE6XQunSxtxMt3gbTYadVBNAaEq_example_com.jsonl +0 -1
  306. package/test/logs/did_webvh_QmZk7NHU2D57RzzbMq4tWW9gBa9AqtVTWfiRM6RFdwGVj2_example_com.jsonl +0 -1
  307. package/test/logs/did_webvh_QmZshSXp9w8ovH62zGGBS1b5pGGPsuYiu1VQ935sga2hWF_example_com_level1_level2.jsonl +0 -1
  308. package/test/logs/did_webvh_QmbWAmw7HQL7vKJyCsctZihXf1rmT4sGvggKCPKWcUWjw1_example_com.jsonl +0 -1
  309. package/test/logs/did_webvh_QmbdLUMbYs3juR39TLB6hhrFWLcNg45ybUzeBJCS1MhCh1_example_com_C_Windows_System32.jsonl +0 -1
  310. package/test/logs/did_webvh_QmcaQ1Ma4gkSbae85aCm8Mv4rvdT2Sb2RR3JzYwrm5XBq8_example_com_etc_passwd.jsonl +0 -1
  311. package/test/logs/did_webvh_QmcbA7WQhsBqZSoDpKJHjV8Q5o53h8vmgJhQfo6rqTY5ho_example_com.jsonl +0 -1
  312. package/test/logs/did_webvh_Qmdy8uWr2gkUJrXsThynAug3DASTWwb3onEj89LKmMGZYB_example_com.jsonl +0 -1
  313. package/tests/__mocks__/bbs-signatures.js +0 -17
  314. package/tests/__mocks__/mf-base58.js +0 -24
  315. package/tests/e2e/README.md +0 -97
  316. package/tests/e2e/example.spec.ts +0 -78
  317. package/tests/fixtures/did-documents.ts +0 -247
  318. package/tests/index.test.ts +0 -21
  319. package/tests/integration/BatchOperations.test.ts +0 -531
  320. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  321. package/tests/integration/CredentialManager.test.ts +0 -42
  322. package/tests/integration/DIDManager.test.ts +0 -41
  323. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  324. package/tests/integration/Events.test.ts +0 -435
  325. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  326. package/tests/integration/LifecycleManager.test.ts +0 -21
  327. package/tests/integration/MultikeyFlow.test.ts +0 -52
  328. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  329. package/tests/integration/WebVhPublish.test.ts +0 -48
  330. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  331. package/tests/manual/test-commit-creation.ts +0 -323
  332. package/tests/mocks/MockKeyStore.ts +0 -38
  333. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  334. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  335. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  336. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  337. package/tests/mocks/adapters/index.ts +0 -6
  338. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  339. package/tests/performance/logging.perf.test.ts +0 -336
  340. package/tests/sdk.test.ts +0 -43
  341. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  342. package/tests/setup.bun.ts +0 -69
  343. package/tests/setup.jest.ts +0 -23
  344. package/tests/stress/batch-operations-stress.test.ts +0 -571
  345. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  346. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  347. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  348. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  349. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  350. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  351. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  352. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  353. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  354. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  355. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  356. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  357. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  358. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  359. package/tests/unit/crypto/Multikey.test.ts +0 -206
  360. package/tests/unit/crypto/Signer.test.ts +0 -408
  361. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  362. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  363. package/tests/unit/did/DIDManager.test.ts +0 -185
  364. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  365. package/tests/unit/did/KeyManager.test.ts +0 -452
  366. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  367. package/tests/unit/did/WebVHManager.test.ts +0 -435
  368. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  369. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  370. package/tests/unit/events/EventEmitter.test.ts +0 -407
  371. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  372. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  373. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  374. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  375. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  376. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  377. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  378. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  379. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  380. package/tests/unit/types/network.test.ts +0 -255
  381. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  382. package/tests/unit/utils/Logger.test.ts +0 -473
  383. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  384. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  385. package/tests/unit/utils/cbor.test.ts +0 -35
  386. package/tests/unit/utils/encoding.test.ts +0 -318
  387. package/tests/unit/utils/hash.test.ts +0 -12
  388. package/tests/unit/utils/retry.test.ts +0 -100
  389. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  390. package/tests/unit/utils/serialization.test.ts +0 -124
  391. package/tests/unit/utils/telemetry.test.ts +0 -52
  392. package/tests/unit/utils/validation.test.ts +0 -141
  393. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  394. package/tests/unit/vc/Issuer.test.ts +0 -107
  395. package/tests/unit/vc/Verifier.test.ts +0 -525
  396. package/tests/unit/vc/bbs.test.ts +0 -282
  397. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  398. package/tests/unit/vc/documentLoader.test.ts +0 -121
  399. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  400. package/tsconfig.json +0 -31
  401. package/tsconfig.test.json +0 -15
@@ -1,253 +0,0 @@
1
- import * as cbor from 'cbor-js';
2
-
3
- /**
4
- * Minimal BBS utility methods ported from legacy for working with
5
- * Data Integrity BBS (bbs-2023) base and derived proof value encoding.
6
- *
7
- * Notes:
8
- * - This module focuses on serialization/parsing helpers used by callers
9
- * to pack/unpack proof values. It does not perform signing or verification.
10
- * - All methods operate on Uint8Array inputs and return multibase strings
11
- * (base64url with 'u' prefix) where applicable to match the spec.
12
- */
13
- export class BBSCryptosuiteUtils {
14
- private static encodeBase64urlNoPad(bytes: Uint8Array): string {
15
- const b64 = Buffer.from(bytes).toString('base64');
16
- const b64url = b64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
17
- return 'u' + b64url;
18
- }
19
-
20
- private static decodeBase64urlNoPad(s: string): Uint8Array {
21
- if (!s.startsWith('u')) throw new Error('Not a multibase base64url (u- prefixed) string');
22
- const raw = s.slice(1);
23
- const b64 = raw.replace(/-/g, '+').replace(/_/g, '/');
24
- const pad = b64.length % 4 === 2 ? '==' : b64.length % 4 === 3 ? '=' : '';
25
- return new Uint8Array(Buffer.from(b64 + pad, 'base64'));
26
- }
27
- private static compareBytes(a: Uint8Array, b: number[]): boolean {
28
- if (a.length !== b.length) return false;
29
- for (let i = 0; i < b.length; i++) {
30
- if (a[i] !== b[i]) return false;
31
- }
32
- return true;
33
- }
34
-
35
- private static concatBytes(a: Uint8Array, b: Uint8Array): Uint8Array {
36
- const out = new Uint8Array(a.length + b.length);
37
- out.set(a, 0);
38
- out.set(b, a.length);
39
- return out;
40
- }
41
-
42
- // ===== Base proof (serialize/parse) =====
43
-
44
- static serializeBaseProofValue(
45
- bbsSignature: Uint8Array,
46
- bbsHeader: Uint8Array,
47
- publicKey: Uint8Array,
48
- hmacKey: Uint8Array,
49
- mandatoryPointers: string[],
50
- featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym_issuer_pid' | 'pseudonym_hidden_pid',
51
- pid?: Uint8Array,
52
- signerBlind?: Uint8Array
53
- ): string {
54
- let headerBytes: Uint8Array;
55
- let components: (Uint8Array | string[] | Uint8Array)[];
56
-
57
- switch (featureOption) {
58
- case 'baseline':
59
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x02]);
60
- components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
61
- break;
62
- case 'anonymous_holder_binding':
63
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x04]);
64
- if (!signerBlind) throw new Error('signerBlind is required for anonymous_holder_binding');
65
- components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, signerBlind];
66
- break;
67
- case 'pseudonym_issuer_pid':
68
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x06]);
69
- if (!pid) throw new Error('pid is required for pseudonym_issuer_pid');
70
- components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, pid];
71
- break;
72
- case 'pseudonym_hidden_pid':
73
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x08]);
74
- if (!signerBlind) throw new Error('signerBlind is required for pseudonym_hidden_pid');
75
- components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers, signerBlind];
76
- break;
77
- default:
78
- throw new Error(`Unsupported feature option: ${featureOption}`);
79
- }
80
-
81
- const encodedComponents = cbor.encode(components);
82
- const proofBytes = BBSCryptosuiteUtils.concatBytes(headerBytes, new Uint8Array(encodedComponents));
83
- return BBSCryptosuiteUtils.encodeBase64urlNoPad(proofBytes);
84
- }
85
-
86
- static parseBaseProofValue(proofValue: string): {
87
- bbsSignature: Uint8Array;
88
- bbsHeader: Uint8Array;
89
- publicKey: Uint8Array;
90
- hmacKey: Uint8Array;
91
- mandatoryPointers: string[];
92
- featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym_issuer_pid' | 'pseudonym_hidden_pid' | 'base_proof';
93
- pid?: Uint8Array;
94
- signerBlind?: Uint8Array;
95
- } {
96
- const decoded = BBSCryptosuiteUtils.decodeBase64urlNoPad(proofValue);
97
- const header = decoded.slice(0, 3);
98
- let featureOption: any;
99
- if (this.compareBytes(header, [0xd9, 0x5d, 0x02])) featureOption = 'baseline';
100
- else if (this.compareBytes(header, [0xd9, 0x5d, 0x04])) featureOption = 'anonymous_holder_binding';
101
- else if (this.compareBytes(header, [0xd9, 0x5d, 0x06])) featureOption = 'pseudonym_issuer_pid';
102
- else if (this.compareBytes(header, [0xd9, 0x5d, 0x08])) featureOption = 'pseudonym_hidden_pid';
103
- else if (this.compareBytes(header, [0xd9, 0x5d, 0x03])) featureOption = 'base_proof';
104
- else throw new Error('Invalid BBS base proof header');
105
-
106
- const components: any[] = cbor.decode(decoded.slice(3).buffer) as any[];
107
- const base = {
108
- bbsSignature: components[0] as Uint8Array,
109
- bbsHeader: components[1] as Uint8Array,
110
- publicKey: components[2] as Uint8Array,
111
- hmacKey: components[3] as Uint8Array,
112
- mandatoryPointers: components[4] as string[],
113
- featureOption
114
- } as any;
115
-
116
- if (featureOption === 'anonymous_holder_binding' || featureOption === 'pseudonym_hidden_pid') {
117
- base.signerBlind = components[5] as Uint8Array;
118
- }
119
- if (featureOption === 'pseudonym_issuer_pid') {
120
- base.pid = components[5] as Uint8Array;
121
- }
122
- return base;
123
- }
124
-
125
- // ===== Label map compression helpers =====
126
-
127
- private static compressLabelMap(labelMap: { [key: string]: string }): { [key: string]: string } {
128
- const map: { [key: string]: string } = {};
129
- for (const [k, v] of Object.entries(labelMap)) {
130
- const c14nMatch = k.match(/^c14n(\d+)$/);
131
- const bMatch = v.match(/^b(\d+)$/);
132
- if (!c14nMatch || !bMatch) {
133
- throw new Error(`Invalid label map entry: ${k} -> ${v}`);
134
- }
135
- const key = parseInt(c14nMatch[1], 10);
136
- const value = parseInt(bMatch[1], 10);
137
- map[key] = value.toString();
138
- }
139
- return map;
140
- }
141
-
142
- private static decompressLabelMap(compressed: { [key: string]: string }): { [key: string]: string } {
143
- const map: { [key: string]: string } = {};
144
- for (const [k, v] of Object.entries(compressed)) {
145
- map[`c14n${k}`] = `b${v}`;
146
- }
147
- return map;
148
- }
149
-
150
- // ===== Derived proof (serialize/parse) =====
151
-
152
- static serializeDerivedProofValue(
153
- bbsProof: Uint8Array,
154
- labelMap: { [key: string]: string },
155
- mandatoryIndexes: number[],
156
- selectiveIndexes: number[],
157
- presentationHeader: Uint8Array,
158
- featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym',
159
- pseudonym?: string,
160
- lengthBBSMessages?: number
161
- ): string {
162
- const compressedLabelMap = this.compressLabelMap(labelMap);
163
-
164
- let headerBytes: Uint8Array;
165
- let components: (Uint8Array | { [key: string]: string } | number[] | number | string)[];
166
-
167
- switch (featureOption) {
168
- case 'baseline':
169
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x03]);
170
- components = [
171
- bbsProof,
172
- compressedLabelMap,
173
- mandatoryIndexes,
174
- selectiveIndexes,
175
- presentationHeader
176
- ];
177
- break;
178
- case 'anonymous_holder_binding':
179
- if (typeof lengthBBSMessages !== 'number') {
180
- throw new Error('lengthBBSMessages is required for anonymous_holder_binding');
181
- }
182
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x05]);
183
- components = [
184
- bbsProof,
185
- compressedLabelMap,
186
- mandatoryIndexes,
187
- selectiveIndexes,
188
- presentationHeader,
189
- lengthBBSMessages
190
- ];
191
- break;
192
- case 'pseudonym':
193
- if (!pseudonym || typeof lengthBBSMessages !== 'number') {
194
- throw new Error('pseudonym and lengthBBSMessages are required for pseudonym features');
195
- }
196
- headerBytes = new Uint8Array([0xd9, 0x5d, 0x07]);
197
- components = [
198
- bbsProof,
199
- compressedLabelMap,
200
- mandatoryIndexes,
201
- selectiveIndexes,
202
- presentationHeader,
203
- pseudonym,
204
- lengthBBSMessages
205
- ];
206
- break;
207
- default:
208
- throw new Error(`Unsupported feature option: ${featureOption}`);
209
- }
210
-
211
- const encodedComponents = cbor.encode(components);
212
- const proofBytes = this.concatBytes(headerBytes, new Uint8Array(encodedComponents));
213
- return this.encodeBase64urlNoPad(proofBytes);
214
- }
215
-
216
- static parseDerivedProofValue(proofValue: string): {
217
- bbsProof: Uint8Array;
218
- labelMap: { [key: string]: string };
219
- mandatoryIndexes: number[];
220
- selectiveIndexes: number[];
221
- presentationHeader: Uint8Array;
222
- featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym';
223
- pseudonym?: string;
224
- lengthBBSMessages?: number;
225
- } {
226
- const decoded = this.decodeBase64urlNoPad(proofValue);
227
- const header = decoded.slice(0, 3);
228
- let featureOption: 'baseline' | 'anonymous_holder_binding' | 'pseudonym';
229
- if (this.compareBytes(header, [0xd9, 0x5d, 0x03])) featureOption = 'baseline';
230
- else if (this.compareBytes(header, [0xd9, 0x5d, 0x05])) featureOption = 'anonymous_holder_binding';
231
- else if (this.compareBytes(header, [0xd9, 0x5d, 0x07])) featureOption = 'pseudonym';
232
- else throw new Error('Invalid BBS derived proof header');
233
-
234
- const components: any[] = cbor.decode(decoded.slice(3).buffer) as any[];
235
- const decompressedLabelMap = this.decompressLabelMap(components[1]);
236
- const result: any = {
237
- bbsProof: components[0],
238
- labelMap: decompressedLabelMap,
239
- mandatoryIndexes: components[2],
240
- selectiveIndexes: components[3],
241
- presentationHeader: components[4],
242
- featureOption
243
- };
244
- if (featureOption === 'anonymous_holder_binding') {
245
- result.lengthBBSMessages = components[5];
246
- } else if (featureOption === 'pseudonym') {
247
- result.pseudonym = components[5];
248
- result.lengthBBSMessages = components[6];
249
- }
250
- return result;
251
- }
252
- }
253
-
@@ -1,21 +0,0 @@
1
- import { sha256 } from '@noble/hashes/sha2.js';
2
-
3
- export type BbsKeyPair = {
4
- publicKey: Uint8Array;
5
- privateKey: Uint8Array;
6
- };
7
-
8
- export class BbsSimple {
9
- static readonly CIPHERSUITE = 'BLS12-381-SHA-256';
10
-
11
- static async sign(messages: Uint8Array[], keypair: BbsKeyPair, header?: Uint8Array): Promise<Uint8Array> {
12
- const headerBytes = header ?? new Uint8Array(sha256(new Uint8Array(0)));
13
- throw new Error('BbsSimple.sign is not implemented');
14
- }
15
-
16
- static async verify(messages: Uint8Array[], signature: Uint8Array, publicKey: Uint8Array, header?: Uint8Array): Promise<boolean> {
17
- const headerBytes = header ?? new Uint8Array(sha256(new Uint8Array(0)));
18
- throw new Error('BbsSimple.verify is not implemented');
19
- }
20
- }
21
-
@@ -1,99 +0,0 @@
1
- import { base58 } from '@scure/base';
2
- import * as ed25519 from '@noble/ed25519';
3
- import { canonize, canonizeProof } from '../utils/jsonld';
4
- import { multikey } from '../../crypto/Multikey';
5
- import { sha256Bytes } from '../../utils/hash';
6
-
7
- export interface DataIntegrityProof {
8
- type: 'DataIntegrityProof';
9
- cryptosuite: string;
10
- created?: string;
11
- verificationMethod: string;
12
- proofPurpose: string;
13
- proofValue: string;
14
- id?: string;
15
- previousProof?: string | string[];
16
- }
17
-
18
- export interface VerificationResult {
19
- verified: boolean;
20
- errors?: string[];
21
- }
22
-
23
- export class EdDSACryptosuiteManager {
24
-
25
- static async createProof(document: any, options: any): Promise<DataIntegrityProof> {
26
- const proofConfig = await this.createProofConfiguration(options);
27
- const transformedData = await this.transform(document, options);
28
- const hashData = await this.hash(transformedData, proofConfig, options);
29
- let privateKey: Uint8Array;
30
- if (typeof options.privateKey === 'string') {
31
- const dec = multikey.decodePrivateKey(options.privateKey);
32
- if (dec.type !== 'Ed25519') throw new Error('Invalid key type for EdDSA');
33
- privateKey = dec.key;
34
- } else if (options.privateKey instanceof Uint8Array) {
35
- privateKey = options.privateKey;
36
- } else {
37
- throw new Error('Invalid private key format');
38
- }
39
- const proofValueBytes = await this.sign({ data: hashData, privateKey });
40
- delete (proofConfig as any)['@context'];
41
- return { ...proofConfig, proofValue: base58.encode(proofValueBytes) } as DataIntegrityProof;
42
- }
43
-
44
- static async verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult> {
45
- try {
46
- const documentToVerify = { ...document };
47
- delete (documentToVerify as any).proof;
48
- const transformedData = await this.transform(documentToVerify, options);
49
- const hashData = await this.hash(transformedData, { '@context': document['@context'], ...proof }, options);
50
- const vmDoc = await options.documentLoader(proof.verificationMethod);
51
- const pk = vmDoc.document.publicKeyMultibase as string;
52
- const dec = multikey.decodePublicKey(pk);
53
- if (dec.type !== 'Ed25519') throw new Error('Invalid key type for EdDSA');
54
- const signature = base58.decode(proof.proofValue);
55
- const verified = await this.verify({ data: hashData, signature, publicKey: dec.key });
56
- return verified ? { verified: true } : { verified: false, errors: ['Proof verification failed'] };
57
- } catch (e: any) {
58
- return { verified: false, errors: [e?.message ?? 'Unknown verification error'] };
59
- }
60
- }
61
-
62
- private static async createProofConfiguration(options: any): Promise<any> {
63
- return {
64
- '@context': 'https://w3id.org/security/data-integrity/v2',
65
- type: 'DataIntegrityProof',
66
- cryptosuite: 'eddsa-rdfc-2022',
67
- created: new Date().toISOString(),
68
- verificationMethod: options.verificationMethod,
69
- proofPurpose: options.proofPurpose || 'assertionMethod',
70
- ...(options.challenge && { challenge: options.challenge }),
71
- ...(options.domain && { domain: options.domain })
72
- };
73
- }
74
-
75
- private static async transform(document: any, options: any): Promise<string> {
76
- return await canonize(document, { documentLoader: options.documentLoader });
77
- }
78
-
79
- private static async hash(transformedData: string, proofConfig: any, options: any): Promise<Uint8Array> {
80
- const canonicalProofConfig = await canonizeProof(proofConfig, { documentLoader: options.documentLoader });
81
- const proofConfigHash = await sha256Bytes(canonicalProofConfig);
82
- const documentHash = await sha256Bytes(transformedData);
83
- return new Uint8Array([...proofConfigHash, ...documentHash]);
84
- }
85
-
86
- static async sign({ data, privateKey }: { data: Uint8Array; privateKey: Uint8Array }): Promise<Uint8Array> {
87
- if (privateKey.length !== 32) {
88
- if (privateKey.length === 64) privateKey = privateKey.slice(32);
89
- else throw new Error('Invalid private key length');
90
- }
91
- const signature = await ed25519.signAsync(Buffer.from(data).toString('hex'), Buffer.from(privateKey).toString('hex'));
92
- return signature;
93
- }
94
-
95
- static async verify({ data, signature, publicKey }: { data: Uint8Array; signature: Uint8Array; publicKey: Uint8Array }): Promise<boolean> {
96
- return await ed25519.verifyAsync(Buffer.from(signature).toString('hex'), Buffer.from(data).toString('hex'), Buffer.from(publicKey).toString('hex'));
97
- }
98
- }
99
-
@@ -1,67 +0,0 @@
1
- import { DIDManager } from '../did/DIDManager';
2
-
3
- type LoadedDocument = { document: any; documentUrl: string; contextUrl: string | null };
4
-
5
- const CONTEXTS: Record<string, any> = {
6
- // Provide 1.1-compatible stubs for jsonld canonize
7
- 'https://www.w3.org/ns/credentials/v2': { '@context': { '@version': 1.1 } },
8
- 'https://w3id.org/security/data-integrity/v2': { '@context': { '@version': 1.1 } }
9
- };
10
-
11
- export class DocumentLoader {
12
- constructor(private didManager: DIDManager) {}
13
-
14
- async load(iri: string): Promise<LoadedDocument> {
15
- if (iri.startsWith('did:')) {
16
- return this.resolveDID(iri);
17
- }
18
- const doc = CONTEXTS[iri];
19
- if (doc) {
20
- return { document: doc, documentUrl: iri, contextUrl: null };
21
- }
22
- throw new Error(`Document not found: ${iri}`);
23
- }
24
-
25
- private async resolveDID(didUrl: string): Promise<LoadedDocument> {
26
- const [did, fragment] = didUrl.split('#');
27
- const didDoc = await this.didManager.resolveDID(did);
28
- if (!didDoc) {
29
- throw new Error(`DID not resolved: ${did}`);
30
- }
31
- if (fragment) {
32
- // If a VM was registered explicitly, prefer it
33
- const cached = verificationMethodRegistry.get(didUrl);
34
- if (cached) {
35
- return {
36
- document: { '@context': (didDoc as any)['@context'], ...cached },
37
- documentUrl: didUrl,
38
- contextUrl: null
39
- };
40
- }
41
- const vms = (didDoc as any).verificationMethod as any[] | undefined;
42
- const vm = vms?.find((m) => m.id === didUrl);
43
- if (vm) {
44
- return {
45
- document: { '@context': (didDoc as any)['@context'], ...vm },
46
- documentUrl: didUrl,
47
- contextUrl: null
48
- };
49
- }
50
- return {
51
- document: { '@context': (didDoc as any)['@context'], id: didUrl },
52
- documentUrl: didUrl,
53
- contextUrl: null
54
- };
55
- }
56
- return { document: didDoc, documentUrl: didUrl, contextUrl: null };
57
- }
58
- }
59
-
60
- export const createDocumentLoader = (didManager: DIDManager) =>
61
- (iri: string) => new DocumentLoader(didManager).load(iri);
62
-
63
- export const verificationMethodRegistry: Map<string, any> = new Map();
64
- export function registerVerificationMethod(vm: any) {
65
- if (vm?.id) verificationMethodRegistry.set(vm.id, vm);
66
- }
67
-
@@ -1,33 +0,0 @@
1
- import { EdDSACryptosuiteManager, type DataIntegrityProof } from '../cryptosuites/eddsa';
2
-
3
- export interface VerificationResult { verified: boolean; errors?: string[] }
4
-
5
- export interface ProofOptions {
6
- verificationMethod: string;
7
- proofPurpose: string;
8
- privateKey?: Uint8Array | string;
9
- type: 'DataIntegrityProof';
10
- created?: string;
11
- cryptosuite: string;
12
- documentLoader?: (url: string) => Promise<any>;
13
- previousProof?: string | string[];
14
- challenge?: string;
15
- domain?: string;
16
- }
17
-
18
- export class DataIntegrityProofManager {
19
- static async createProof(document: any, options: ProofOptions): Promise<DataIntegrityProof> {
20
- if (options.cryptosuite !== 'eddsa-rdfc-2022') {
21
- throw new Error(`Unsupported cryptosuite: ${options.cryptosuite}`);
22
- }
23
- return await EdDSACryptosuiteManager.createProof(document, options);
24
- }
25
-
26
- static async verifyProof(document: any, proof: DataIntegrityProof, options: any): Promise<VerificationResult> {
27
- if (proof.cryptosuite !== 'eddsa-rdfc-2022') {
28
- return { verified: false, errors: [`Unsupported cryptosuite: ${proof.cryptosuite}`] };
29
- }
30
- return await EdDSACryptosuiteManager.verifyProof(document, proof, options);
31
- }
32
- }
33
-
@@ -1,18 +0,0 @@
1
- import jsonld from 'jsonld';
2
-
3
- export async function canonize(input: any, { documentLoader }: any): Promise<string> {
4
- return await jsonld.canonize(input, {
5
- algorithm: 'URDNA2015',
6
- format: 'application/n-quads',
7
- documentLoader,
8
- safe: false,
9
- useNative: false,
10
- rdfDirection: 'i18n-datatype'
11
- } as any);
12
- }
13
-
14
- export async function canonizeProof(proof: any, { documentLoader }: any): Promise<string> {
15
- const { jws, signatureValue, proofValue, ...rest } = proof;
16
- return await canonize(rest, { documentLoader });
17
- }
18
-
@@ -1 +0,0 @@
1
- {"versionId":"1-QmNs27TFrnmKdYQRaoSeM92WRYSCRtyXcYsp7o7c3FhwN1","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmNTn9Kkp8dQ75WrF9xqJ2kuDp9QhKc3aPiERRMj8XoTBN","updateKeys":["did:key:z6MkhRrpTEB6K3i4dny2YFf2qU2VpbbnTNPkat1mJnqEwJpe"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmNTn9Kkp8dQ75WrF9xqJ2kuDp9QhKc3aPiERRMj8XoTBN:example.com","controller":"did:webvh:QmNTn9Kkp8dQ75WrF9xqJ2kuDp9QhKc3aPiERRMj8XoTBN:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkhRrpTEB6K3i4dny2YFf2qU2VpbbnTNPkat1mJnqEwJpe","id":"did:webvh:QmNTn9Kkp8dQ75WrF9xqJ2kuDp9QhKc3aPiERRMj8XoTBN:example.com#JnqEwJpe"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkhRrpTEB6K3i4dny2YFf2qU2VpbbnTNPkat1mJnqEwJpe","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z5nMYdbqZ37iLk9M78Bz6uKFaZvCKZu5F9Uq8pNr76yWHdDRpGbFH14GZnmKD1AQZhmHx4qKb8igst14dp6xixbE1"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmWwYA3ETKVaJvpvr4tozbdghjbZUVKjTX3VmUCrvztSWp","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmNu4MNr8Lr5txx5gYNhuhZDchXsZEu3hJXKYuphpWTPDp","updateKeys":["did:key:z6MkmRS5S4QNX6LpJeZN7vRBeQPNXHDnd37B4cwf8cwkskKz"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmNu4MNr8Lr5txx5gYNhuhZDchXsZEu3hJXKYuphpWTPDp:example.com:users\u0000etc:passwd","controller":"did:webvh:QmNu4MNr8Lr5txx5gYNhuhZDchXsZEu3hJXKYuphpWTPDp:example.com:users\u0000etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkmRS5S4QNX6LpJeZN7vRBeQPNXHDnd37B4cwf8cwkskKz","id":"did:webvh:QmNu4MNr8Lr5txx5gYNhuhZDchXsZEu3hJXKYuphpWTPDp:example.com:users\u0000etc:passwd#8cwkskKz"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkmRS5S4QNX6LpJeZN7vRBeQPNXHDnd37B4cwf8cwkskKz","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z32PT45aEfCnBsKSRUVGKELFbyUpUvzM7dQ25bP2KqmpifwYP8TdW8gie3Sr94VKwX5XFcrifiFTLsbhYF1zNaz9R"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmXsvN94WthcLjPYcrgomN9nzPryvkKsgxsV8jukedwKif","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmR9MrGZACzjKETA8SBRNCKG11HxU85c4bVR2qN5eDCfsD","updateKeys":["did:key:z6MkvLnCfPibrt1dg3hktEHNXYBU34T2PKHauZNp75dHWXng"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmR9MrGZACzjKETA8SBRNCKG11HxU85c4bVR2qN5eDCfsD:example.com","controller":"did:webvh:QmR9MrGZACzjKETA8SBRNCKG11HxU85c4bVR2qN5eDCfsD:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkvLnCfPibrt1dg3hktEHNXYBU34T2PKHauZNp75dHWXng","id":"did:webvh:QmR9MrGZACzjKETA8SBRNCKG11HxU85c4bVR2qN5eDCfsD:example.com#75dHWXng"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkvLnCfPibrt1dg3hktEHNXYBU34T2PKHauZNp75dHWXng","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z3vtJgu14ReYkqb3fg28swwkm9pptCWSb8FptcDPtc5G3d7XtCveLCxfMFbWzRTeEQEt7FuKrybxfASpjtdd23zjg"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmRCHx69dc2cYu4pdoPREdYpQtah8qkKzpohuhbo7ucnuh","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmUc5suaqRM2P4nrXxZwqYMfqzhdMqjuL7oJaJbEpCQVCd","updateKeys":["did:key:z6MkjGAZwiSmVuLeQhr7ef2QxajraDNEUyh4ajvL1PrJQaC3"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUc5suaqRM2P4nrXxZwqYMfqzhdMqjuL7oJaJbEpCQVCd:example.com:users\\..\\..\\etc:passwd","controller":"did:webvh:QmUc5suaqRM2P4nrXxZwqYMfqzhdMqjuL7oJaJbEpCQVCd:example.com:users\\..\\..\\etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkjGAZwiSmVuLeQhr7ef2QxajraDNEUyh4ajvL1PrJQaC3","id":"did:webvh:QmUc5suaqRM2P4nrXxZwqYMfqzhdMqjuL7oJaJbEpCQVCd:example.com:users\\..\\..\\etc:passwd#1PrJQaC3"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkjGAZwiSmVuLeQhr7ef2QxajraDNEUyh4ajvL1PrJQaC3","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z5m3x4bRaE3sZsUw3SxdB7xMovf2bYMAuNBmQjBacpS3S5yfX8WFoLyPDXrEw7fudVxjM1Lx4dyzk3cpQHzEdLpbd"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmasfqzXbXHLyBTLA1xT2LpYVvdUPhhvZozBGJrc2K31Xm","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmUkiB2RCV2VZ1RTXsCebWN25Eiy9TLvpzDWAJNjhgvB4X","updateKeys":["did:key:z6MkfTQiP2u7tZ7zp6JddNQqyAQRHz4veHrBJPAnwB2DmU78"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUkiB2RCV2VZ1RTXsCebWN25Eiy9TLvpzDWAJNjhgvB4X:example.com:..:etc:passwd","controller":"did:webvh:QmUkiB2RCV2VZ1RTXsCebWN25Eiy9TLvpzDWAJNjhgvB4X:example.com:..:etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkfTQiP2u7tZ7zp6JddNQqyAQRHz4veHrBJPAnwB2DmU78","id":"did:webvh:QmUkiB2RCV2VZ1RTXsCebWN25Eiy9TLvpzDWAJNjhgvB4X:example.com:..:etc:passwd#wB2DmU78"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkfTQiP2u7tZ7zp6JddNQqyAQRHz4veHrBJPAnwB2DmU78","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z5uZpeUX9fLFJLvA4wVtMAX6nvMptq5JFyq2UGMseDMvmDWKyrz6X3JUPJB754YhQQ9TMbmzFr1rXBUKi8c6ZtbNc"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmUGz2nfFZkYedSGzT4NJHcdL8EV3moAqDGG32AxnDGfmz","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmUoRTe8UMwpAQXZSAW7pjAgZK1tq2X3C6Kfxq3UXGcaGy","updateKeys":["did:key:z6MkeVjj9JKfczbDEVK7fAAkP2RUY3q2paNRErtGSfSZpa8C"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmUoRTe8UMwpAQXZSAW7pjAgZK1tq2X3C6Kfxq3UXGcaGy:example.com:.:secret","controller":"did:webvh:QmUoRTe8UMwpAQXZSAW7pjAgZK1tq2X3C6Kfxq3UXGcaGy:example.com:.:secret","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkeVjj9JKfczbDEVK7fAAkP2RUY3q2paNRErtGSfSZpa8C","id":"did:webvh:QmUoRTe8UMwpAQXZSAW7pjAgZK1tq2X3C6Kfxq3UXGcaGy:example.com:.:secret#SfSZpa8C"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkeVjj9JKfczbDEVK7fAAkP2RUY3q2paNRErtGSfSZpa8C","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"zPLbYCgku6g3ddQBe1nkgiLN8rwpQFqNVDqk3xxhNtU5G4Y8T4LGVoWhu3eizbxp1wsxg1rd6hHxJgoDgS37k4aA"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmSPnm5K2fK6oQXrffKu5DtMybiSyBkC7ojA2cQAoJokgE","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmWWot3chx1t6KwTmcE5i2FeDZ5JMkQw3qXycsKDVmJ9Be","updateKeys":["did:key:z6MkkJ1Q7hcGet56RocU9VZ1ppHtXQ7wBrGGfrVeqUFwujvP"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmWWot3chx1t6KwTmcE5i2FeDZ5JMkQw3qXycsKDVmJ9Be:example.com:users:alice","controller":"did:webvh:QmWWot3chx1t6KwTmcE5i2FeDZ5JMkQw3qXycsKDVmJ9Be:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkkJ1Q7hcGet56RocU9VZ1ppHtXQ7wBrGGfrVeqUFwujvP","id":"did:webvh:QmWWot3chx1t6KwTmcE5i2FeDZ5JMkQw3qXycsKDVmJ9Be:example.com:users:alice#qUFwujvP"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkkJ1Q7hcGet56RocU9VZ1ppHtXQ7wBrGGfrVeqUFwujvP","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"zrXQ32XFZSf5h22zvc17Zc1cESwiBsKdrKga9XW4sEjyyTdXV8yNSBVzPQN8iKLH1avEhZoiJ5NurA3yvUYSjT3i"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmaaPJ31rAtTXXhP1yHLCJXtVncieogSRCLBuid7D3PZag","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmWvVgALL5kjZdpgR7KZay7J8UiiUr834kkRmWeFAxjAuC","updateKeys":["did:key:z6MktrL8dRYC7vkyMH4Hd793foABJXFWsNRuv7XfyG8TtZY6"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmWvVgALL5kjZdpgR7KZay7J8UiiUr834kkRmWeFAxjAuC:example.com:users/../../etc:passwd","controller":"did:webvh:QmWvVgALL5kjZdpgR7KZay7J8UiiUr834kkRmWeFAxjAuC:example.com:users/../../etc:passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MktrL8dRYC7vkyMH4Hd793foABJXFWsNRuv7XfyG8TtZY6","id":"did:webvh:QmWvVgALL5kjZdpgR7KZay7J8UiiUr834kkRmWeFAxjAuC:example.com:users/../../etc:passwd#yG8TtZY6"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MktrL8dRYC7vkyMH4Hd793foABJXFWsNRuv7XfyG8TtZY6","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z2hhq8j7Z9hTgShvTz51ccExLVJWmKDNMK8yjPZ6QaaQx89A3Ty7pW2iw6a9tN5fqJHLmAno5RnmMr9dRCextrZ7u"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmWzU4L4MgxrFP4tUmtvFRHDdGBUrcJ2gUwSKqERE3Zehg","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmWwaRQHUZAFcKihFC6xR6tRTTrQhHPTku6azf1egWbpy1","updateKeys":["did:key:z6Mko1RoXsEsu3wuJ1pPyFiLtWT1K2Y2WZ8tGXRw2k9HpJgT"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmWwaRQHUZAFcKihFC6xR6tRTTrQhHPTku6azf1egWbpy1:example.com:users:alice","controller":"did:webvh:QmWwaRQHUZAFcKihFC6xR6tRTTrQhHPTku6azf1egWbpy1:example.com:users:alice","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mko1RoXsEsu3wuJ1pPyFiLtWT1K2Y2WZ8tGXRw2k9HpJgT","id":"did:webvh:QmWwaRQHUZAFcKihFC6xR6tRTTrQhHPTku6azf1egWbpy1:example.com:users:alice#2k9HpJgT"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mko1RoXsEsu3wuJ1pPyFiLtWT1K2Y2WZ8tGXRw2k9HpJgT","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"zYcpqbybb2GPEXN8t9T7AmKmCbMTtfAct4cL8K4vJM2LKJNHqqJr8pT69StNQ2tT4LWgutxmSLJquxJZQiheD8cu"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmUyvu1RzGez81YBRpAmQYtWkNBT7HBCbJbfYUfbGeVsj3","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmXJLtkz23r7AozbtXsZMKWnVU6rd38CkVtjdWuATU3Yp6","updateKeys":["did:key:z6MknfeMZaeKUc8mfd1X2rSvHtRMrRzfeu4HrcK2FBDdD71Y"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmXJLtkz23r7AozbtXsZMKWnVU6rd38CkVtjdWuATU3Yp6:example.com:users:alice123:profile","controller":"did:webvh:QmXJLtkz23r7AozbtXsZMKWnVU6rd38CkVtjdWuATU3Yp6:example.com:users:alice123:profile","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MknfeMZaeKUc8mfd1X2rSvHtRMrRzfeu4HrcK2FBDdD71Y","id":"did:webvh:QmXJLtkz23r7AozbtXsZMKWnVU6rd38CkVtjdWuATU3Yp6:example.com:users:alice123:profile#FBDdD71Y"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MknfeMZaeKUc8mfd1X2rSvHtRMrRzfeu4HrcK2FBDdD71Y","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"zyN9kPKHJXErh4gTZCHJEQapQe2jA1B45CsgGa32g95Hh7zuWaYjL6XDrYSFiF4BZ4uTqsTY65Sv8hx9Xj4F7PSP"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmetxMuheepXUtazeTxYbeZnbpVAAbLFFintHjzKbHtSfs","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmYsce448po14oDE1wXbyaP6wY9HQgHSKLwdezn1k577SF","updateKeys":["did:key:z6MkphLmvQk7oFBzk3X8FsxmxHRAAgtu313bMwkqVN2HYGCN"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmYsce448po14oDE1wXbyaP6wY9HQgHSKLwdezn1k577SF:example.com:my-org:user_name:test-123","controller":"did:webvh:QmYsce448po14oDE1wXbyaP6wY9HQgHSKLwdezn1k577SF:example.com:my-org:user_name:test-123","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkphLmvQk7oFBzk3X8FsxmxHRAAgtu313bMwkqVN2HYGCN","id":"did:webvh:QmYsce448po14oDE1wXbyaP6wY9HQgHSKLwdezn1k577SF:example.com:my-org:user_name:test-123#VN2HYGCN"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkphLmvQk7oFBzk3X8FsxmxHRAAgtu313bMwkqVN2HYGCN","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z4T8yxjGwUVNNZaDms1RUYjbWMFbea8Xhc4FrwPgGyY3pMTrKoc2S3AQNxT8T4TC11xAEzF95xRDf3k8AqATTJbx7"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmPfx9FoZzHAJthXqm8282orMcFWL1pGnevwFzzoY6rAC2","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmZBeNzzqajxdfwcDUPZ4P8C5YSXyRztrAwmPiKuKUxmAK","updateKeys":["did:key:z6MkuCWxqWuyBH4rDnAthEm3QyhwP59bwHZjK7893pAryD7B"],"portable":true,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZBeNzzqajxdfwcDUPZ4P8C5YSXyRztrAwmPiKuKUxmAK:example.com","controller":"did:webvh:QmZBeNzzqajxdfwcDUPZ4P8C5YSXyRztrAwmPiKuKUxmAK:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkuCWxqWuyBH4rDnAthEm3QyhwP59bwHZjK7893pAryD7B","id":"did:webvh:QmZBeNzzqajxdfwcDUPZ4P8C5YSXyRztrAwmPiKuKUxmAK:example.com#3pAryD7B"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkuCWxqWuyBH4rDnAthEm3QyhwP59bwHZjK7893pAryD7B","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z355n1KyLbN3xkLAZp3cndDeWUDUPZB5tFwSLpGXcm6uQ2REVCC3wagafzUYrWLiXjHF46kenU21bFCGEL4QZNgtK"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmYzV4PJw8qYVxevVRyALMSJdQVDhmDgFfw8iS9Th6yThB","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmZhJsqxizwVbRtqCUkmE6XQunSxtxMt3gbTYadVBNAaEq","updateKeys":["did:key:z6MkvovBP4nCh8Rijd88yTBY95hQR2umTXWS6kVmbcxP4d1s"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZhJsqxizwVbRtqCUkmE6XQunSxtxMt3gbTYadVBNAaEq:example.com","controller":"did:webvh:QmZhJsqxizwVbRtqCUkmE6XQunSxtxMt3gbTYadVBNAaEq:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkvovBP4nCh8Rijd88yTBY95hQR2umTXWS6kVmbcxP4d1s","id":"did:webvh:QmZhJsqxizwVbRtqCUkmE6XQunSxtxMt3gbTYadVBNAaEq:example.com#bcxP4d1s"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkvovBP4nCh8Rijd88yTBY95hQR2umTXWS6kVmbcxP4d1s","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z4TvoVRAUtVsuELcU2S3i6nqbk9WBBdgVZL7R1Qc9pmRhvfKUiPAG2MkzwzeiUvWn7aZEjBEFtuHmDHSt9oRnnWCW"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmakSs5eptHABwu2wP6pSgyVbkXYHNMMYS6bQhxmbY7HYD","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmZk7NHU2D57RzzbMq4tWW9gBa9AqtVTWfiRM6RFdwGVj2","updateKeys":["did:key:z6MkgjK8iJ6A6U72gWtQhuGukqNQEwqiZbg3aBBesNMGpvTV"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZk7NHU2D57RzzbMq4tWW9gBa9AqtVTWfiRM6RFdwGVj2:example.com","controller":"did:webvh:QmZk7NHU2D57RzzbMq4tWW9gBa9AqtVTWfiRM6RFdwGVj2:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkgjK8iJ6A6U72gWtQhuGukqNQEwqiZbg3aBBesNMGpvTV","id":"did:webvh:QmZk7NHU2D57RzzbMq4tWW9gBa9AqtVTWfiRM6RFdwGVj2:example.com#sNMGpvTV"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkgjK8iJ6A6U72gWtQhuGukqNQEwqiZbg3aBBesNMGpvTV","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z4dkLe5FMG1kQd17BbcuwFqs5NxGL2Be6nW1knw6McZM3MCQ1hCU3ZUBW3w6o93jdXZq6wRwYyVqPvAivtw1jpzJt"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmZGWQLnNe92aUMfhoNrjBf4NJ2Wu8HkXrJRvvfXrN9bWw","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmZshSXp9w8ovH62zGGBS1b5pGGPsuYiu1VQ935sga2hWF","updateKeys":["did:key:z6Mkr8wAfEJLsbHiPq9h5BLhLYy6mWKynKyfR3UFiH6m9WQU"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmZshSXp9w8ovH62zGGBS1b5pGGPsuYiu1VQ935sga2hWF:example.com:level1:level2","controller":"did:webvh:QmZshSXp9w8ovH62zGGBS1b5pGGPsuYiu1VQ935sga2hWF:example.com:level1:level2","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkr8wAfEJLsbHiPq9h5BLhLYy6mWKynKyfR3UFiH6m9WQU","id":"did:webvh:QmZshSXp9w8ovH62zGGBS1b5pGGPsuYiu1VQ935sga2hWF:example.com:level1:level2#iH6m9WQU"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkr8wAfEJLsbHiPq9h5BLhLYy6mWKynKyfR3UFiH6m9WQU","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"zEpVAf7dU64yvxFLhKiwpmxmb4Ba8Cqtb8CchqHYDcgVFoLuJidfTR8g1LAKoKpw51ck2DkES5yZ6Kx2sLH3Wp19"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmYSn87qR9JcSpYNh1azAMhFMtyMyiFGVpHMf4K5M2mZa3","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmbWAmw7HQL7vKJyCsctZihXf1rmT4sGvggKCPKWcUWjw1","updateKeys":["did:key:z6Mkfdkxr8os3ozUATxe7XRKmpJk2seNCTC1UMebi5GVw8KV"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbWAmw7HQL7vKJyCsctZihXf1rmT4sGvggKCPKWcUWjw1:example.com","controller":"did:webvh:QmbWAmw7HQL7vKJyCsctZihXf1rmT4sGvggKCPKWcUWjw1:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mkfdkxr8os3ozUATxe7XRKmpJk2seNCTC1UMebi5GVw8KV","id":"did:webvh:QmbWAmw7HQL7vKJyCsctZihXf1rmT4sGvggKCPKWcUWjw1:example.com#i5GVw8KV"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mkfdkxr8os3ozUATxe7XRKmpJk2seNCTC1UMebi5GVw8KV","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z3x6uPYrg6CczgJ7uWdcTY9TEedas2mVw9cQWVAcsg6P2giPUBrHZpZBFCGQji6CmDmmhoEoiJDCPc9PydmYZA9qz"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmTEW2ATxqLtCkokPFZ4SdXuMw7oPGxdqV6oHVgjQN7kwy","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmbdLUMbYs3juR39TLB6hhrFWLcNg45ybUzeBJCS1MhCh1","updateKeys":["did:key:z6Mksg4iLeDc5QKeQia5Lu6qXhmXo8pNJ5DkbfHWmeihuNoq"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmbdLUMbYs3juR39TLB6hhrFWLcNg45ybUzeBJCS1MhCh1:example.com:C:\\Windows\\System32","controller":"did:webvh:QmbdLUMbYs3juR39TLB6hhrFWLcNg45ybUzeBJCS1MhCh1:example.com:C:\\Windows\\System32","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6Mksg4iLeDc5QKeQia5Lu6qXhmXo8pNJ5DkbfHWmeihuNoq","id":"did:webvh:QmbdLUMbYs3juR39TLB6hhrFWLcNg45ybUzeBJCS1MhCh1:example.com:C:\\Windows\\System32#meihuNoq"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6Mksg4iLeDc5QKeQia5Lu6qXhmXo8pNJ5DkbfHWmeihuNoq","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z52RKGphjuHKeNLYgpNa3AJkceSis1FhnFhdNAQyEvf4muovPVFwYTKiFxkWcm8kN4Qaw1SZNJa1qkiatdwxNpCkz"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmQi76bTowcgwu2E82gMFtLMyAhi6bgfDVtKpXMBuBTe2i","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmcaQ1Ma4gkSbae85aCm8Mv4rvdT2Sb2RR3JzYwrm5XBq8","updateKeys":["did:key:z6MkwMBCDeBNPF5ADZLz4ohYdJNCUccfM5eNKfeMv6rrzEpk"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmcaQ1Ma4gkSbae85aCm8Mv4rvdT2Sb2RR3JzYwrm5XBq8:example.com:/etc/passwd","controller":"did:webvh:QmcaQ1Ma4gkSbae85aCm8Mv4rvdT2Sb2RR3JzYwrm5XBq8:example.com:/etc/passwd","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkwMBCDeBNPF5ADZLz4ohYdJNCUccfM5eNKfeMv6rrzEpk","id":"did:webvh:QmcaQ1Ma4gkSbae85aCm8Mv4rvdT2Sb2RR3JzYwrm5XBq8:example.com:/etc/passwd#v6rrzEpk"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkwMBCDeBNPF5ADZLz4ohYdJNCUccfM5eNKfeMv6rrzEpk","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z2KcUQ9VkintY2e4oqrsGKA69ie9agQM43PQ6P86RGscdzz2ed9y2pzSiRN6zhevqM4joQPNDhy1nHjMMrBQK6xXt"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-Qmb1jUkJoynKwypbEUpdVV1Vfu4wCgQkzYeMEf3onPGH9i","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"QmcbA7WQhsBqZSoDpKJHjV8Q5o53h8vmgJhQfo6rqTY5ho","updateKeys":["did:key:z6MkrcvhQX2Yp6yCdfZxrrAnNfPfa9Q1T2Rqx1kNbKwjZu8v"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:QmcbA7WQhsBqZSoDpKJHjV8Q5o53h8vmgJhQfo6rqTY5ho:example.com","controller":"did:webvh:QmcbA7WQhsBqZSoDpKJHjV8Q5o53h8vmgJhQfo6rqTY5ho:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkrcvhQX2Yp6yCdfZxrrAnNfPfa9Q1T2Rqx1kNbKwjZu8v","id":"did:webvh:QmcbA7WQhsBqZSoDpKJHjV8Q5o53h8vmgJhQfo6rqTY5ho:example.com#bKwjZu8v"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkrcvhQX2Yp6yCdfZxrrAnNfPfa9Q1T2Rqx1kNbKwjZu8v","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"zPuqPpQ7DTsCsG4uYaBWnQmBAFqYhkQxG8s1gFCEwaKvw9Ev4d67jf9buuweGFpttjY3Bcp9irq5wLPUzva66fKf"}]}
@@ -1 +0,0 @@
1
- {"versionId":"1-QmeXs7EZ3Dx2Ct4RdD6XbpKgXkZkv6dZqe6BtsTSsPW9Hv","versionTime":"2025-11-20T08:50:59Z","parameters":{"method":"did:webvh:1.0","scid":"Qmdy8uWr2gkUJrXsThynAug3DASTWwb3onEj89LKmMGZYB","updateKeys":["did:key:z6MkuebrntUdZ7op2WeTcna174hjUNmv6PtszzdFbJJH42Mr"],"portable":false,"nextKeyHashes":[],"watchers":[],"witness":{},"deactivated":false},"state":{"@context":["https://www.w3.org/ns/did/v1","https://w3id.org/security/multikey/v1"],"id":"did:webvh:Qmdy8uWr2gkUJrXsThynAug3DASTWwb3onEj89LKmMGZYB:example.com","controller":"did:webvh:Qmdy8uWr2gkUJrXsThynAug3DASTWwb3onEj89LKmMGZYB:example.com","verificationMethod":[{"type":"Multikey","publicKeyMultibase":"z6MkuebrntUdZ7op2WeTcna174hjUNmv6PtszzdFbJJH42Mr","id":"did:webvh:Qmdy8uWr2gkUJrXsThynAug3DASTWwb3onEj89LKmMGZYB:example.com#bJJH42Mr"}],"authentication":["#key-0"],"assertionMethod":["#key-0"],"keyAgreement":[],"capabilityDelegation":[],"capabilityInvocation":[]},"proof":[{"type":"DataIntegrityProof","cryptosuite":"eddsa-jcs-2022","verificationMethod":"did:key:z6MkuebrntUdZ7op2WeTcna174hjUNmv6PtszzdFbJJH42Mr","created":"2025-11-20T08:50:59Z","proofPurpose":"assertionMethod","proofValue":"z2T9j2X71HpULK3n2pDXot4RLSGTKq3TXQxwbj8mcaSa479ui5Rwk3JQWuSkYmraYXqB4ioS4euLEAKvRszuezcvi"}]}