@originals/sdk 1.2.0 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (401) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/.turbo/turbo-build.log +0 -1
  4. package/dist/adapters/FeeOracleMock.d.ts +0 -6
  5. package/dist/adapters/FeeOracleMock.js +0 -8
  6. package/dist/adapters/index.d.ts +0 -4
  7. package/dist/adapters/index.js +0 -4
  8. package/dist/adapters/providers/OrdHttpProvider.d.ts +0 -56
  9. package/dist/adapters/providers/OrdHttpProvider.js +0 -110
  10. package/dist/adapters/providers/OrdMockProvider.d.ts +0 -70
  11. package/dist/adapters/providers/OrdMockProvider.js +0 -75
  12. package/dist/adapters/types.d.ts +0 -71
  13. package/dist/adapters/types.js +0 -1
  14. package/dist/bitcoin/BitcoinManager.d.ts +0 -15
  15. package/dist/bitcoin/BitcoinManager.js +0 -262
  16. package/dist/bitcoin/BroadcastClient.d.ts +0 -30
  17. package/dist/bitcoin/BroadcastClient.js +0 -35
  18. package/dist/bitcoin/OrdinalsClient.d.ts +0 -21
  19. package/dist/bitcoin/OrdinalsClient.js +0 -105
  20. package/dist/bitcoin/PSBTBuilder.d.ts +0 -24
  21. package/dist/bitcoin/PSBTBuilder.js +0 -80
  22. package/dist/bitcoin/fee-calculation.d.ts +0 -14
  23. package/dist/bitcoin/fee-calculation.js +0 -31
  24. package/dist/bitcoin/providers/OrdNodeProvider.d.ts +0 -38
  25. package/dist/bitcoin/providers/OrdNodeProvider.js +0 -67
  26. package/dist/bitcoin/providers/OrdinalsProvider.d.ts +0 -33
  27. package/dist/bitcoin/providers/OrdinalsProvider.js +0 -50
  28. package/dist/bitcoin/providers/types.d.ts +0 -63
  29. package/dist/bitcoin/providers/types.js +0 -1
  30. package/dist/bitcoin/transactions/commit.d.ts +0 -89
  31. package/dist/bitcoin/transactions/commit.js +0 -311
  32. package/dist/bitcoin/transactions/index.d.ts +0 -7
  33. package/dist/bitcoin/transactions/index.js +0 -8
  34. package/dist/bitcoin/transfer.d.ts +0 -9
  35. package/dist/bitcoin/transfer.js +0 -26
  36. package/dist/bitcoin/utxo-selection.d.ts +0 -78
  37. package/dist/bitcoin/utxo-selection.js +0 -237
  38. package/dist/bitcoin/utxo.d.ts +0 -26
  39. package/dist/bitcoin/utxo.js +0 -78
  40. package/dist/contexts/credentials-v1.json +0 -195
  41. package/dist/contexts/credentials-v2-examples.json +0 -5
  42. package/dist/contexts/credentials-v2.json +0 -301
  43. package/dist/contexts/credentials.json +0 -195
  44. package/dist/contexts/data-integrity-v2.json +0 -81
  45. package/dist/contexts/dids.json +0 -57
  46. package/dist/contexts/ed255192020.json +0 -93
  47. package/dist/contexts/ordinals-plus.json +0 -23
  48. package/dist/contexts/originals.json +0 -22
  49. package/dist/core/OriginalsSDK.d.ts +0 -158
  50. package/dist/core/OriginalsSDK.js +0 -274
  51. package/dist/crypto/Multikey.d.ts +0 -30
  52. package/dist/crypto/Multikey.js +0 -149
  53. package/dist/crypto/Signer.d.ts +0 -21
  54. package/dist/crypto/Signer.js +0 -196
  55. package/dist/crypto/noble-init.d.ts +0 -18
  56. package/dist/crypto/noble-init.js +0 -106
  57. package/dist/did/BtcoDidResolver.d.ts +0 -57
  58. package/dist/did/BtcoDidResolver.js +0 -166
  59. package/dist/did/DIDManager.d.ts +0 -101
  60. package/dist/did/DIDManager.js +0 -493
  61. package/dist/did/Ed25519Verifier.d.ts +0 -30
  62. package/dist/did/Ed25519Verifier.js +0 -59
  63. package/dist/did/KeyManager.d.ts +0 -17
  64. package/dist/did/KeyManager.js +0 -207
  65. package/dist/did/WebVHManager.d.ts +0 -100
  66. package/dist/did/WebVHManager.js +0 -304
  67. package/dist/did/createBtcoDidDocument.d.ts +0 -10
  68. package/dist/did/createBtcoDidDocument.js +0 -42
  69. package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +0 -23
  70. package/dist/did/providers/OrdinalsClientProviderAdapter.js +0 -51
  71. package/dist/events/EventEmitter.d.ts +0 -115
  72. package/dist/events/EventEmitter.js +0 -198
  73. package/dist/events/index.d.ts +0 -7
  74. package/dist/events/index.js +0 -6
  75. package/dist/events/types.d.ts +0 -286
  76. package/dist/events/types.js +0 -9
  77. package/dist/examples/basic-usage.d.ts +0 -3
  78. package/dist/examples/basic-usage.js +0 -62
  79. package/dist/examples/run.d.ts +0 -1
  80. package/dist/examples/run.js +0 -4
  81. package/dist/index.d.ts +0 -39
  82. package/dist/index.js +0 -47
  83. package/dist/lifecycle/BatchOperations.d.ts +0 -147
  84. package/dist/lifecycle/BatchOperations.js +0 -251
  85. package/dist/lifecycle/LifecycleManager.d.ts +0 -116
  86. package/dist/lifecycle/LifecycleManager.js +0 -971
  87. package/dist/lifecycle/OriginalsAsset.d.ts +0 -164
  88. package/dist/lifecycle/OriginalsAsset.js +0 -380
  89. package/dist/lifecycle/ProvenanceQuery.d.ts +0 -126
  90. package/dist/lifecycle/ProvenanceQuery.js +0 -220
  91. package/dist/lifecycle/ResourceVersioning.d.ts +0 -73
  92. package/dist/lifecycle/ResourceVersioning.js +0 -127
  93. package/dist/migration/MigrationManager.d.ts +0 -86
  94. package/dist/migration/MigrationManager.js +0 -412
  95. package/dist/migration/audit/AuditLogger.d.ts +0 -51
  96. package/dist/migration/audit/AuditLogger.js +0 -156
  97. package/dist/migration/checkpoint/CheckpointManager.d.ts +0 -31
  98. package/dist/migration/checkpoint/CheckpointManager.js +0 -96
  99. package/dist/migration/checkpoint/CheckpointStorage.d.ts +0 -26
  100. package/dist/migration/checkpoint/CheckpointStorage.js +0 -89
  101. package/dist/migration/index.d.ts +0 -22
  102. package/dist/migration/index.js +0 -27
  103. package/dist/migration/operations/BaseMigration.d.ts +0 -48
  104. package/dist/migration/operations/BaseMigration.js +0 -83
  105. package/dist/migration/operations/PeerToBtcoMigration.d.ts +0 -25
  106. package/dist/migration/operations/PeerToBtcoMigration.js +0 -67
  107. package/dist/migration/operations/PeerToWebvhMigration.d.ts +0 -19
  108. package/dist/migration/operations/PeerToWebvhMigration.js +0 -46
  109. package/dist/migration/operations/WebvhToBtcoMigration.d.ts +0 -25
  110. package/dist/migration/operations/WebvhToBtcoMigration.js +0 -67
  111. package/dist/migration/rollback/RollbackManager.d.ts +0 -29
  112. package/dist/migration/rollback/RollbackManager.js +0 -146
  113. package/dist/migration/state/StateMachine.d.ts +0 -25
  114. package/dist/migration/state/StateMachine.js +0 -76
  115. package/dist/migration/state/StateTracker.d.ts +0 -36
  116. package/dist/migration/state/StateTracker.js +0 -123
  117. package/dist/migration/types.d.ts +0 -306
  118. package/dist/migration/types.js +0 -33
  119. package/dist/migration/validation/BitcoinValidator.d.ts +0 -13
  120. package/dist/migration/validation/BitcoinValidator.js +0 -83
  121. package/dist/migration/validation/CredentialValidator.d.ts +0 -13
  122. package/dist/migration/validation/CredentialValidator.js +0 -46
  123. package/dist/migration/validation/DIDCompatibilityValidator.d.ts +0 -16
  124. package/dist/migration/validation/DIDCompatibilityValidator.js +0 -127
  125. package/dist/migration/validation/LifecycleValidator.d.ts +0 -10
  126. package/dist/migration/validation/LifecycleValidator.js +0 -52
  127. package/dist/migration/validation/StorageValidator.d.ts +0 -10
  128. package/dist/migration/validation/StorageValidator.js +0 -65
  129. package/dist/migration/validation/ValidationPipeline.d.ts +0 -29
  130. package/dist/migration/validation/ValidationPipeline.js +0 -180
  131. package/dist/storage/LocalStorageAdapter.d.ts +0 -11
  132. package/dist/storage/LocalStorageAdapter.js +0 -53
  133. package/dist/storage/MemoryStorageAdapter.d.ts +0 -6
  134. package/dist/storage/MemoryStorageAdapter.js +0 -21
  135. package/dist/storage/StorageAdapter.d.ts +0 -16
  136. package/dist/storage/StorageAdapter.js +0 -1
  137. package/dist/storage/index.d.ts +0 -2
  138. package/dist/storage/index.js +0 -2
  139. package/dist/types/bitcoin.d.ts +0 -84
  140. package/dist/types/bitcoin.js +0 -1
  141. package/dist/types/common.d.ts +0 -82
  142. package/dist/types/common.js +0 -1
  143. package/dist/types/credentials.d.ts +0 -75
  144. package/dist/types/credentials.js +0 -1
  145. package/dist/types/did.d.ts +0 -26
  146. package/dist/types/did.js +0 -1
  147. package/dist/types/index.d.ts +0 -5
  148. package/dist/types/index.js +0 -5
  149. package/dist/types/network.d.ts +0 -78
  150. package/dist/types/network.js +0 -145
  151. package/dist/utils/EventLogger.d.ts +0 -71
  152. package/dist/utils/EventLogger.js +0 -232
  153. package/dist/utils/Logger.d.ts +0 -106
  154. package/dist/utils/Logger.js +0 -257
  155. package/dist/utils/MetricsCollector.d.ts +0 -110
  156. package/dist/utils/MetricsCollector.js +0 -264
  157. package/dist/utils/bitcoin-address.d.ts +0 -38
  158. package/dist/utils/bitcoin-address.js +0 -113
  159. package/dist/utils/cbor.d.ts +0 -2
  160. package/dist/utils/cbor.js +0 -9
  161. package/dist/utils/encoding.d.ts +0 -37
  162. package/dist/utils/encoding.js +0 -120
  163. package/dist/utils/hash.d.ts +0 -1
  164. package/dist/utils/hash.js +0 -5
  165. package/dist/utils/retry.d.ts +0 -10
  166. package/dist/utils/retry.js +0 -35
  167. package/dist/utils/satoshi-validation.d.ts +0 -60
  168. package/dist/utils/satoshi-validation.js +0 -156
  169. package/dist/utils/serialization.d.ts +0 -14
  170. package/dist/utils/serialization.js +0 -76
  171. package/dist/utils/telemetry.d.ts +0 -17
  172. package/dist/utils/telemetry.js +0 -24
  173. package/dist/utils/validation.d.ts +0 -5
  174. package/dist/utils/validation.js +0 -98
  175. package/dist/vc/CredentialManager.d.ts +0 -22
  176. package/dist/vc/CredentialManager.js +0 -227
  177. package/dist/vc/Issuer.d.ts +0 -27
  178. package/dist/vc/Issuer.js +0 -70
  179. package/dist/vc/Verifier.d.ts +0 -16
  180. package/dist/vc/Verifier.js +0 -50
  181. package/dist/vc/cryptosuites/bbs.d.ts +0 -44
  182. package/dist/vc/cryptosuites/bbs.js +0 -213
  183. package/dist/vc/cryptosuites/bbsSimple.d.ts +0 -9
  184. package/dist/vc/cryptosuites/bbsSimple.js +0 -12
  185. package/dist/vc/cryptosuites/eddsa.d.ts +0 -30
  186. package/dist/vc/cryptosuites/eddsa.js +0 -81
  187. package/dist/vc/documentLoader.d.ts +0 -16
  188. package/dist/vc/documentLoader.js +0 -59
  189. package/dist/vc/proofs/data-integrity.d.ts +0 -21
  190. package/dist/vc/proofs/data-integrity.js +0 -15
  191. package/dist/vc/utils/jsonld.d.ts +0 -2
  192. package/dist/vc/utils/jsonld.js +0 -15
  193. package/src/adapters/FeeOracleMock.ts +0 -9
  194. package/src/adapters/index.ts +0 -5
  195. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  196. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  197. package/src/adapters/types.ts +0 -66
  198. package/src/bitcoin/BitcoinManager.ts +0 -330
  199. package/src/bitcoin/BroadcastClient.ts +0 -54
  200. package/src/bitcoin/OrdinalsClient.ts +0 -119
  201. package/src/bitcoin/PSBTBuilder.ts +0 -106
  202. package/src/bitcoin/fee-calculation.ts +0 -38
  203. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  204. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  205. package/src/bitcoin/providers/types.ts +0 -59
  206. package/src/bitcoin/transactions/commit.ts +0 -465
  207. package/src/bitcoin/transactions/index.ts +0 -13
  208. package/src/bitcoin/transfer.ts +0 -43
  209. package/src/bitcoin/utxo-selection.ts +0 -322
  210. package/src/bitcoin/utxo.ts +0 -113
  211. package/src/contexts/credentials-v1.json +0 -237
  212. package/src/contexts/credentials-v2-examples.json +0 -5
  213. package/src/contexts/credentials-v2.json +0 -340
  214. package/src/contexts/credentials.json +0 -237
  215. package/src/contexts/data-integrity-v2.json +0 -81
  216. package/src/contexts/dids.json +0 -58
  217. package/src/contexts/ed255192020.json +0 -93
  218. package/src/contexts/ordinals-plus.json +0 -23
  219. package/src/contexts/originals.json +0 -22
  220. package/src/core/OriginalsSDK.ts +0 -416
  221. package/src/crypto/Multikey.ts +0 -194
  222. package/src/crypto/Signer.ts +0 -254
  223. package/src/crypto/noble-init.ts +0 -121
  224. package/src/did/BtcoDidResolver.ts +0 -227
  225. package/src/did/DIDManager.ts +0 -694
  226. package/src/did/Ed25519Verifier.ts +0 -68
  227. package/src/did/KeyManager.ts +0 -236
  228. package/src/did/WebVHManager.ts +0 -489
  229. package/src/did/createBtcoDidDocument.ts +0 -59
  230. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  231. package/src/events/EventEmitter.ts +0 -222
  232. package/src/events/index.ts +0 -19
  233. package/src/events/types.ts +0 -331
  234. package/src/examples/basic-usage.ts +0 -78
  235. package/src/examples/run.ts +0 -5
  236. package/src/index.ts +0 -84
  237. package/src/lifecycle/BatchOperations.ts +0 -373
  238. package/src/lifecycle/LifecycleManager.ts +0 -1218
  239. package/src/lifecycle/OriginalsAsset.ts +0 -524
  240. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  241. package/src/lifecycle/ResourceVersioning.ts +0 -163
  242. package/src/migration/MigrationManager.ts +0 -527
  243. package/src/migration/audit/AuditLogger.ts +0 -176
  244. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  245. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  246. package/src/migration/index.ts +0 -33
  247. package/src/migration/operations/BaseMigration.ts +0 -126
  248. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  249. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  250. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  251. package/src/migration/rollback/RollbackManager.ts +0 -170
  252. package/src/migration/state/StateMachine.ts +0 -92
  253. package/src/migration/state/StateTracker.ts +0 -156
  254. package/src/migration/types.ts +0 -344
  255. package/src/migration/validation/BitcoinValidator.ts +0 -107
  256. package/src/migration/validation/CredentialValidator.ts +0 -62
  257. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  258. package/src/migration/validation/LifecycleValidator.ts +0 -64
  259. package/src/migration/validation/StorageValidator.ts +0 -79
  260. package/src/migration/validation/ValidationPipeline.ts +0 -213
  261. package/src/storage/LocalStorageAdapter.ts +0 -61
  262. package/src/storage/MemoryStorageAdapter.ts +0 -29
  263. package/src/storage/StorageAdapter.ts +0 -25
  264. package/src/storage/index.ts +0 -3
  265. package/src/types/bitcoin.ts +0 -98
  266. package/src/types/common.ts +0 -92
  267. package/src/types/credentials.ts +0 -88
  268. package/src/types/did.ts +0 -31
  269. package/src/types/external-shims.d.ts +0 -53
  270. package/src/types/index.ts +0 -7
  271. package/src/types/network.ts +0 -175
  272. package/src/utils/EventLogger.ts +0 -298
  273. package/src/utils/Logger.ts +0 -322
  274. package/src/utils/MetricsCollector.ts +0 -358
  275. package/src/utils/bitcoin-address.ts +0 -130
  276. package/src/utils/cbor.ts +0 -12
  277. package/src/utils/encoding.ts +0 -127
  278. package/src/utils/hash.ts +0 -6
  279. package/src/utils/retry.ts +0 -46
  280. package/src/utils/satoshi-validation.ts +0 -196
  281. package/src/utils/serialization.ts +0 -96
  282. package/src/utils/telemetry.ts +0 -40
  283. package/src/utils/validation.ts +0 -119
  284. package/src/vc/CredentialManager.ts +0 -273
  285. package/src/vc/Issuer.ts +0 -100
  286. package/src/vc/Verifier.ts +0 -47
  287. package/src/vc/cryptosuites/bbs.ts +0 -253
  288. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  289. package/src/vc/cryptosuites/eddsa.ts +0 -99
  290. package/src/vc/documentLoader.ts +0 -67
  291. package/src/vc/proofs/data-integrity.ts +0 -33
  292. package/src/vc/utils/jsonld.ts +0 -18
  293. package/test/logs/did_webvh_QmNTn9Kkp8dQ75WrF9xqJ2kuDp9QhKc3aPiERRMj8XoTBN_example_com.jsonl +0 -1
  294. package/test/logs/did_webvh_QmNu4MNr8Lr5txx5gYNhuhZDchXsZEu3hJXKYuphpWTPDp_example_com_users_etc_passwd.jsonl +0 -1
  295. package/test/logs/did_webvh_QmR9MrGZACzjKETA8SBRNCKG11HxU85c4bVR2qN5eDCfsD_example_com.jsonl +0 -1
  296. package/test/logs/did_webvh_QmUc5suaqRM2P4nrXxZwqYMfqzhdMqjuL7oJaJbEpCQVCd_example_com_users_etc_passwd.jsonl +0 -1
  297. package/test/logs/did_webvh_QmUkiB2RCV2VZ1RTXsCebWN25Eiy9TLvpzDWAJNjhgvB4X_example_com_etc_passwd.jsonl +0 -1
  298. package/test/logs/did_webvh_QmUoRTe8UMwpAQXZSAW7pjAgZK1tq2X3C6Kfxq3UXGcaGy_example_com_secret.jsonl +0 -1
  299. package/test/logs/did_webvh_QmWWot3chx1t6KwTmcE5i2FeDZ5JMkQw3qXycsKDVmJ9Be_example_com_users_alice.jsonl +0 -1
  300. package/test/logs/did_webvh_QmWvVgALL5kjZdpgR7KZay7J8UiiUr834kkRmWeFAxjAuC_example_com_users_etc_passwd.jsonl +0 -1
  301. package/test/logs/did_webvh_QmWwaRQHUZAFcKihFC6xR6tRTTrQhHPTku6azf1egWbpy1_example_com_users_alice.jsonl +0 -1
  302. package/test/logs/did_webvh_QmXJLtkz23r7AozbtXsZMKWnVU6rd38CkVtjdWuATU3Yp6_example_com_users_alice123_profile.jsonl +0 -1
  303. package/test/logs/did_webvh_QmYsce448po14oDE1wXbyaP6wY9HQgHSKLwdezn1k577SF_example_com_my_org_user_name_test_123.jsonl +0 -1
  304. package/test/logs/did_webvh_QmZBeNzzqajxdfwcDUPZ4P8C5YSXyRztrAwmPiKuKUxmAK_example_com.jsonl +0 -1
  305. package/test/logs/did_webvh_QmZhJsqxizwVbRtqCUkmE6XQunSxtxMt3gbTYadVBNAaEq_example_com.jsonl +0 -1
  306. package/test/logs/did_webvh_QmZk7NHU2D57RzzbMq4tWW9gBa9AqtVTWfiRM6RFdwGVj2_example_com.jsonl +0 -1
  307. package/test/logs/did_webvh_QmZshSXp9w8ovH62zGGBS1b5pGGPsuYiu1VQ935sga2hWF_example_com_level1_level2.jsonl +0 -1
  308. package/test/logs/did_webvh_QmbWAmw7HQL7vKJyCsctZihXf1rmT4sGvggKCPKWcUWjw1_example_com.jsonl +0 -1
  309. package/test/logs/did_webvh_QmbdLUMbYs3juR39TLB6hhrFWLcNg45ybUzeBJCS1MhCh1_example_com_C_Windows_System32.jsonl +0 -1
  310. package/test/logs/did_webvh_QmcaQ1Ma4gkSbae85aCm8Mv4rvdT2Sb2RR3JzYwrm5XBq8_example_com_etc_passwd.jsonl +0 -1
  311. package/test/logs/did_webvh_QmcbA7WQhsBqZSoDpKJHjV8Q5o53h8vmgJhQfo6rqTY5ho_example_com.jsonl +0 -1
  312. package/test/logs/did_webvh_Qmdy8uWr2gkUJrXsThynAug3DASTWwb3onEj89LKmMGZYB_example_com.jsonl +0 -1
  313. package/tests/__mocks__/bbs-signatures.js +0 -17
  314. package/tests/__mocks__/mf-base58.js +0 -24
  315. package/tests/e2e/README.md +0 -97
  316. package/tests/e2e/example.spec.ts +0 -78
  317. package/tests/fixtures/did-documents.ts +0 -247
  318. package/tests/index.test.ts +0 -21
  319. package/tests/integration/BatchOperations.test.ts +0 -531
  320. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  321. package/tests/integration/CredentialManager.test.ts +0 -42
  322. package/tests/integration/DIDManager.test.ts +0 -41
  323. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  324. package/tests/integration/Events.test.ts +0 -435
  325. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  326. package/tests/integration/LifecycleManager.test.ts +0 -21
  327. package/tests/integration/MultikeyFlow.test.ts +0 -52
  328. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  329. package/tests/integration/WebVhPublish.test.ts +0 -48
  330. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  331. package/tests/manual/test-commit-creation.ts +0 -323
  332. package/tests/mocks/MockKeyStore.ts +0 -38
  333. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  334. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  335. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  336. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  337. package/tests/mocks/adapters/index.ts +0 -6
  338. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  339. package/tests/performance/logging.perf.test.ts +0 -336
  340. package/tests/sdk.test.ts +0 -43
  341. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  342. package/tests/setup.bun.ts +0 -69
  343. package/tests/setup.jest.ts +0 -23
  344. package/tests/stress/batch-operations-stress.test.ts +0 -571
  345. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  346. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  347. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  348. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  349. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  350. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  351. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  352. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  353. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  354. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  355. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  356. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  357. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  358. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  359. package/tests/unit/crypto/Multikey.test.ts +0 -206
  360. package/tests/unit/crypto/Signer.test.ts +0 -408
  361. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  362. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  363. package/tests/unit/did/DIDManager.test.ts +0 -185
  364. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  365. package/tests/unit/did/KeyManager.test.ts +0 -452
  366. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  367. package/tests/unit/did/WebVHManager.test.ts +0 -435
  368. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  369. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  370. package/tests/unit/events/EventEmitter.test.ts +0 -407
  371. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  372. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  373. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  374. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  375. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  376. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  377. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  378. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  379. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  380. package/tests/unit/types/network.test.ts +0 -255
  381. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  382. package/tests/unit/utils/Logger.test.ts +0 -473
  383. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  384. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  385. package/tests/unit/utils/cbor.test.ts +0 -35
  386. package/tests/unit/utils/encoding.test.ts +0 -318
  387. package/tests/unit/utils/hash.test.ts +0 -12
  388. package/tests/unit/utils/retry.test.ts +0 -100
  389. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  390. package/tests/unit/utils/serialization.test.ts +0 -124
  391. package/tests/unit/utils/telemetry.test.ts +0 -52
  392. package/tests/unit/utils/validation.test.ts +0 -141
  393. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  394. package/tests/unit/vc/Issuer.test.ts +0 -107
  395. package/tests/unit/vc/Verifier.test.ts +0 -525
  396. package/tests/unit/vc/bbs.test.ts +0 -282
  397. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  398. package/tests/unit/vc/documentLoader.test.ts +0 -121
  399. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  400. package/tsconfig.json +0 -31
  401. package/tsconfig.test.json +0 -15
@@ -1,282 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from bbs.simple.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { BbsSimple } from '../../../src';
6
- import { bls12_381 as bls } from '@noble/curves/bls12-381';
7
-
8
- describe('BbsSimple e2e', () => {
9
- test('sign/verify not implemented with header', async () => {
10
- const sk = bls.utils.randomPrivateKey();
11
- const pk = bls.getPublicKey(sk);
12
- const keypair = { privateKey: sk, publicKey: pk };
13
- const header = new Uint8Array([1, 2, 3]);
14
- const messages = [
15
- new TextEncoder().encode('msg1'),
16
- new TextEncoder().encode('msg2'),
17
- new TextEncoder().encode('msg3')
18
- ];
19
-
20
- await expect(BbsSimple.sign(messages, keypair, header)).rejects.toThrow(/not implemented/i);
21
- await expect(BbsSimple.verify(messages, new Uint8Array([0]), pk, header)).rejects.toThrow(/not implemented/i);
22
- });
23
-
24
- test('sign/verify not implemented with default header', async () => {
25
- const sk = bls.utils.randomPrivateKey();
26
- const pk = bls.getPublicKey(sk);
27
- const keypair = { privateKey: sk, publicKey: pk };
28
- const messages = [
29
- new TextEncoder().encode('a'),
30
- new TextEncoder().encode('b')
31
- ];
32
- await expect(BbsSimple.sign(messages, keypair)).rejects.toThrow(/not implemented/i);
33
- await expect(BbsSimple.verify(messages, new Uint8Array([1, 2]), pk)).rejects.toThrow(/not implemented/i);
34
- });
35
- });
36
-
37
-
38
-
39
-
40
- /** Inlined from bbs.utils.part.ts */
41
- import { BBSCryptosuiteUtils } from '../../../src';
42
- import * as cbor from 'cbor-js';
43
-
44
- function u8(len: number, start: number = 0): Uint8Array {
45
- const a = new Uint8Array(len);
46
- for (let i = 0; i < len; i++) a[i] = (start + i) & 0xff;
47
- return a;
48
- }
49
-
50
- describe('BBSCryptosuiteUtils', () => {
51
- const bbsSignature = u8(96, 1);
52
- const bbsHeader = u8(64, 2);
53
- const publicKey = u8(96, 3);
54
- const hmacKey = u8(32, 4);
55
- const mandatoryPointers = ['/id', '/credentialSubject/id'];
56
-
57
- test('rejects non-u prefix for base/derived parsing', () => {
58
- expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue('xabc')).toThrow('multibase');
59
- expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue('xabc')).toThrow('multibase');
60
- });
61
-
62
- test('serialize/parse base proof (baseline)', () => {
63
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
64
- bbsSignature,
65
- bbsHeader,
66
- publicKey,
67
- hmacKey,
68
- mandatoryPointers,
69
- 'baseline'
70
- );
71
- expect(s.startsWith('u')).toBe(true);
72
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
73
- expect(Array.from(p.bbsSignature)).toEqual(Array.from(bbsSignature));
74
- expect(Array.from(p.bbsHeader)).toEqual(Array.from(bbsHeader));
75
- expect(Array.from(p.publicKey)).toEqual(Array.from(publicKey));
76
- expect(Array.from(p.hmacKey)).toEqual(Array.from(hmacKey));
77
- expect(p.mandatoryPointers).toEqual(mandatoryPointers);
78
- expect(p.featureOption).toBe('baseline');
79
- });
80
-
81
- test('serialize/parse base proof (anonymous_holder_binding)', () => {
82
- const signerBlind = u8(32, 7);
83
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
84
- bbsSignature,
85
- bbsHeader,
86
- publicKey,
87
- hmacKey,
88
- mandatoryPointers,
89
- 'anonymous_holder_binding',
90
- undefined,
91
- signerBlind
92
- );
93
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
94
- expect(p.featureOption).toBe('anonymous_holder_binding');
95
- expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
96
- });
97
-
98
- test('serialize/parse base proof (pseudonym_issuer_pid)', () => {
99
- const pid = u8(32, 9);
100
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
101
- bbsSignature,
102
- bbsHeader,
103
- publicKey,
104
- hmacKey,
105
- mandatoryPointers,
106
- 'pseudonym_issuer_pid',
107
- pid
108
- );
109
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
110
- expect(p.featureOption).toBe('pseudonym_issuer_pid');
111
- expect(Array.from(p.pid)).toEqual(Array.from(pid));
112
- });
113
-
114
- test('serialize/parse base proof (pseudonym_hidden_pid)', () => {
115
- const signerBlind = u8(32, 11);
116
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
117
- bbsSignature,
118
- bbsHeader,
119
- publicKey,
120
- hmacKey,
121
- mandatoryPointers,
122
- 'pseudonym_hidden_pid',
123
- undefined,
124
- signerBlind
125
- );
126
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
127
- expect(p.featureOption).toBe('pseudonym_hidden_pid');
128
- expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
129
- });
130
-
131
- test('serialize/parse derived proof (baseline)', () => {
132
- const labelMap = { c14n1: 'b3', c14n10: 'b7' };
133
- const mandatoryIndexes = [0, 2, 5];
134
- const selectiveIndexes = [1, 4];
135
- const presentationHeader = u8(16, 33);
136
- const bbsProof = u8(80, 55);
137
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
138
- bbsProof,
139
- labelMap,
140
- mandatoryIndexes,
141
- selectiveIndexes,
142
- presentationHeader,
143
- 'baseline'
144
- );
145
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
146
- expect(Array.from(p.bbsProof)).toEqual(Array.from(bbsProof));
147
- expect(p.labelMap).toEqual(labelMap);
148
- expect(p.mandatoryIndexes).toEqual(mandatoryIndexes);
149
- expect(p.selectiveIndexes).toEqual(selectiveIndexes);
150
- expect(Array.from(p.presentationHeader)).toEqual(Array.from(presentationHeader));
151
- expect(p.featureOption).toBe('baseline');
152
- });
153
-
154
- test('serialize/parse derived proof (anonymous_holder_binding)', () => {
155
- const labelMap = { c14n2: 'b5' };
156
- const presentationHeader = u8(8, 7);
157
- const bbsProof = u8(64, 8);
158
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
159
- bbsProof,
160
- labelMap,
161
- [0],
162
- [1],
163
- presentationHeader,
164
- 'anonymous_holder_binding',
165
- undefined,
166
- 4
167
- );
168
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
169
- expect(p.featureOption).toBe('anonymous_holder_binding');
170
- expect(p.lengthBBSMessages).toBe(4);
171
- });
172
-
173
- test('serialize/parse derived proof (pseudonym)', () => {
174
- const labelMap = { c14n3: 'b7' };
175
- const presentationHeader = u8(4, 90);
176
- const bbsProof = u8(64, 90);
177
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
178
- bbsProof,
179
- labelMap,
180
- [0, 1],
181
- [1],
182
- presentationHeader,
183
- 'pseudonym',
184
- 'alice',
185
- 5
186
- );
187
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
188
- expect(p.featureOption).toBe('pseudonym');
189
- expect(p.pseudonym).toBe('alice');
190
- expect(p.lengthBBSMessages).toBe(5);
191
- });
192
-
193
- test('parse base proof with base_proof header', () => {
194
- const components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
195
- const encoded = (cbor as any).encode(components) as Uint8Array | ArrayBuffer;
196
- const encBytes = encoded instanceof Uint8Array ? encoded : new Uint8Array(encoded as ArrayBuffer);
197
- const header = new Uint8Array([0xd9, 0x5d, 0x03]);
198
- const bytes = new Uint8Array(header.length + encBytes.length);
199
- bytes.set(header, 0);
200
- bytes.set(encBytes, header.length);
201
- const s = 'u' + Buffer.from(bytes).toString('base64').replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
202
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
203
- expect(p.featureOption).toBe('base_proof');
204
- });
205
-
206
- test('serializeDerivedProofValue throws on missing length for anonymous_holder_binding', () => {
207
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
208
- u8(8),
209
- { c14n1: 'b1' },
210
- [0],
211
- [0],
212
- u8(4),
213
- 'anonymous_holder_binding'
214
- )).toThrow('lengthBBSMessages is required');
215
- });
216
-
217
- test('serializeDerivedProofValue throws on missing pseudonym/length for pseudonym', () => {
218
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
219
- u8(8),
220
- { c14n1: 'b1' },
221
- [0],
222
- [0],
223
- u8(4),
224
- 'pseudonym'
225
- )).toThrow('pseudonym and lengthBBSMessages');
226
- });
227
-
228
- test('serializeDerivedProofValue throws on unsupported feature', () => {
229
- expect(() => (BBSCryptosuiteUtils as any).serializeDerivedProofValue(
230
- u8(8),
231
- { c14n1: 'b1' },
232
- [0],
233
- [0],
234
- u8(4),
235
- 'unsupported'
236
- )).toThrow('Unsupported feature option');
237
- });
238
-
239
- test('serializeBaseProofValue throws for missing signerBlind/pid and unsupported feature', () => {
240
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
241
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'anonymous_holder_binding'
242
- )).toThrow('signerBlind is required');
243
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
244
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_issuer_pid'
245
- )).toThrow('pid is required');
246
- expect(() => (BBSCryptosuiteUtils as any).serializeBaseProofValue(
247
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'unsupported'
248
- )).toThrow('Unsupported feature option');
249
- });
250
-
251
- test('serializeBaseProofValue throws when signerBlind missing for pseudonym_hidden_pid', () => {
252
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
253
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_hidden_pid'
254
- )).toThrow('signerBlind is required');
255
- });
256
-
257
- test('compareBytes length mismatch branch', () => {
258
- expect((BBSCryptosuiteUtils as any).compareBytes(new Uint8Array([1, 2]), [1, 2, 3])).toBe(false);
259
- });
260
-
261
- test('serializeDerivedProofValue throws on invalid labelMap entries', () => {
262
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
263
- u8(4),
264
- { notC14n: 'b1' } as any,
265
- [0],
266
- [0],
267
- u8(2),
268
- 'baseline'
269
- )).toThrow('Invalid label map entry');
270
- });
271
-
272
- test('parse errors on invalid base header', () => {
273
- // Construct invalid header 'u' + cbor of empty
274
- const bad = 'u' + 'AAAA';
275
- expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue(bad)).toThrow();
276
- });
277
-
278
- test('parse errors on invalid derived header', () => {
279
- const bad = 'u' + 'AAAA';
280
- expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue(bad)).toThrow();
281
- });
282
- });
@@ -1,398 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from eddsa.branch-more.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { EdDSACryptosuiteManager } from '../../../../src/vc/cryptosuites/eddsa';
6
- import { multikey } from '../../../../src/crypto/Multikey';
7
-
8
- describe('EdDSA additional branches', () => {
9
- test('createProof throws on invalid private key format', async () => {
10
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
11
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: 123 as any,
12
- documentLoader: async () => ({ document: { '@context': { '@version': 1.1 } }, documentUrl: '', contextUrl: null })
13
- } as any)).rejects.toThrow('Invalid private key format');
14
- });
15
-
16
- test('verifyProof returns error for non-Ed25519 VM', async () => {
17
- const pkMb = multikey.encodePublicKey(new Uint8Array(33).fill(1), 'Secp256k1');
18
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
19
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
20
- } as any, { documentLoader: async () => ({ document: { '@context': ['https://www.w3.org/ns/did/v1'], id: 'did:ex#k', publicKeyMultibase: pkMb }, documentUrl: '', contextUrl: null }) });
21
- expect(res.verified).toBe(false);
22
- expect(typeof res.errors?.[0]).toBe('string');
23
- });
24
- });
25
-
26
-
27
-
28
-
29
- /** Inlined from eddsa.coverage-extra.part.ts */
30
-
31
- describe('EdDSA coverage extras', () => {
32
- const goodContext = ['https://www.w3.org/ns/credentials/v2'];
33
-
34
- test('createProofConfiguration defaults proofPurpose to assertionMethod', async () => {
35
- const sk = new Uint8Array(32).fill(1);
36
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
37
- const vm = 'did:ex#vm';
38
- const loader = async (iri: string) => {
39
- if (iri.includes('#')) {
40
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
41
- }
42
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
43
- };
44
- const doc: any = { '@context': goodContext, id: 'urn:doc-default-purpose' };
45
- const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
46
- // The method deletes @context before returning, so we assert the purpose value
47
- expect(proof.proofPurpose).toBe('assertionMethod');
48
- });
49
-
50
- test('createProof includes only challenge when provided', async () => {
51
- const sk = new Uint8Array(32).fill(7);
52
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(6), 'Ed25519');
53
- const vm = 'did:ex#vm-chal';
54
- const loader = async (iri: string) => {
55
- if (iri.includes('#')) {
56
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
57
- }
58
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
59
- };
60
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:chal' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', challenge: '123', documentLoader: loader });
61
- expect((proof as any).challenge).toBe('123');
62
- expect((proof as any).domain).toBeUndefined();
63
- });
64
-
65
- test('createProof includes only domain when provided', async () => {
66
- const sk = new Uint8Array(32).fill(9);
67
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
68
- const vm = 'did:ex#vm-domain';
69
- const loader = async (iri: string) => {
70
- if (iri.includes('#')) {
71
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
72
- }
73
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
74
- };
75
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:domain' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', domain: 'ex.org', documentLoader: loader });
76
- expect((proof as any).domain).toBe('ex.org');
77
- expect((proof as any).challenge).toBeUndefined();
78
- });
79
-
80
- test('verifyProof returns error message on thrown exception path', async () => {
81
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(3), 'Ed25519');
82
- const loader = async (iri: string) => {
83
- if (iri.includes('#')) {
84
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
85
- }
86
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
87
- };
88
- const doc: any = { '@context': goodContext, id: 'urn:doc' };
89
- const badProof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'not-multibase' };
90
- const res = await EdDSACryptosuiteManager.verifyProof(doc, badProof, { documentLoader: loader });
91
- expect(res.verified).toBe(false);
92
- expect(Array.isArray(res.errors)).toBe(true);
93
- expect(typeof res.errors![0]).toBe('string');
94
- });
95
-
96
- test('verifyProof uses Unknown verification error when thrown value lacks message', async () => {
97
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(4), 'Ed25519');
98
- const doc: any = { '@context': goodContext, id: 'urn:doc-unknown' };
99
- const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#vm-unknown', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
100
- const loader = async (iri: string) => {
101
- if (iri.includes('#')) {
102
- // Throw a primitive string (no message property) only on VM fetch, after transform/hash succeeded
103
- throw '';
104
- }
105
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
106
- };
107
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: loader });
108
- expect(res.verified).toBe(false);
109
- expect(res.errors?.[0]).toBe('Unknown verification error');
110
- });
111
- });
112
-
113
-
114
-
115
-
116
- /** Inlined from eddsa.edgecases.part.ts */
117
-
118
- describe('EdDSA cryptosuite edge cases', () => {
119
- const goodContext = ['https://www.w3.org/ns/credentials/v2'];
120
-
121
- const pk32 = new Uint8Array(32).fill(7);
122
- const pk32b = new Uint8Array(32).fill(8);
123
- const pkMb = multikey.encodePublicKey(pk32b, 'Ed25519');
124
-
125
- const okLoader = async (iri: string) => {
126
- if (iri.includes('#')) {
127
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
128
- }
129
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
130
- };
131
-
132
- test('createProof signs with raw Uint8Array 32-byte private key', async () => {
133
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:raw32' }, {
134
- verificationMethod: 'did:ex#key-raw', proofPurpose: 'assertionMethod', privateKey: pk32,
135
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
136
- });
137
- expect(proof.type).toBe('DataIntegrityProof');
138
- expect(typeof proof.proofValue).toBe('string');
139
- });
140
-
141
- test('createProof includes challenge and domain options', async () => {
142
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:opts' }, {
143
- verificationMethod: 'did:ex#key-opts', proofPurpose: 'assertionMethod', privateKey: pk32,
144
- cryptosuite: 'eddsa-rdfc-2022', challenge: 'abc', domain: 'example.org', documentLoader: okLoader
145
- });
146
- expect((proof as any).challenge).toBe('abc');
147
- expect((proof as any).domain).toBe('example.org');
148
- });
149
-
150
- test('createProof invalid private key length 33 throws', async () => {
151
- const bad33 = new Uint8Array(33);
152
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad33' }, {
153
- verificationMethod: 'did:ex#key-bad33', proofPurpose: 'assertionMethod', privateKey: bad33,
154
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
155
- })).rejects.toThrow('Invalid private key length');
156
- });
157
-
158
- test('createProof invalid private key length 63 throws', async () => {
159
- const bad63 = new Uint8Array(63);
160
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad63' }, {
161
- verificationMethod: 'did:ex#key-bad63', proofPurpose: 'assertionMethod', privateKey: bad63,
162
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
163
- })).rejects.toThrow('Invalid private key length');
164
- });
165
-
166
- test('createProof with non-Ed25519 multikey string errors', async () => {
167
- const secpSk = new Uint8Array(32).fill(5);
168
- const secpSkMb = multikey.encodePrivateKey(secpSk, 'Secp256k1');
169
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:secpSk' }, {
170
- verificationMethod: 'did:ex#key-non-ed', proofPurpose: 'assertionMethod', privateKey: secpSkMb,
171
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
172
- })).rejects.toThrow('Invalid key type for EdDSA');
173
- });
174
-
175
- test('verifyProof returns false with wrong public key', async () => {
176
- // Sign with one keypair
177
- const signingSk = new Uint8Array(32).fill(9);
178
- const signingPk = new Uint8Array(32).fill(1);
179
- const signingPkMb = multikey.encodePublicKey(signingPk, 'Ed25519');
180
- const vmId = 'did:ex#vm-1';
181
- const signingLoader = async (iri: string) => {
182
- if (iri.includes('#')) {
183
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: signingPkMb }, documentUrl: iri, contextUrl: null };
184
- }
185
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
186
- };
187
- const doc = { '@context': goodContext, id: 'urn:test:verify-wrong-pk' };
188
- const proof = await EdDSACryptosuiteManager.createProof(doc, {
189
- verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: signingSk,
190
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: signingLoader
191
- });
192
-
193
- // Verify with different public key
194
- const wrongPkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
195
- const wrongLoader = async (iri: string) => {
196
- if (iri.includes('#')) {
197
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: wrongPkMb }, documentUrl: iri, contextUrl: null };
198
- }
199
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
200
- };
201
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: wrongLoader });
202
- expect(res.verified).toBe(false);
203
- });
204
-
205
- test('verifyProof succeeds with matching verificationMethod', async () => {
206
- const ed = await import('@noble/ed25519');
207
- const sk = new Uint8Array(32).fill(11);
208
- const pk = await ed.getPublicKeyAsync(sk);
209
- const pkMbLocal = multikey.encodePublicKey(new Uint8Array(pk), 'Ed25519');
210
- const vm = 'did:ex#vm-ok';
211
- const loader = async (iri: string) => {
212
- if (iri.includes('#')) {
213
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMbLocal }, documentUrl: iri, contextUrl: null };
214
- }
215
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
216
- };
217
- const doc = { '@context': goodContext, id: 'urn:test:verify-ok' };
218
- const proof = await EdDSACryptosuiteManager.createProof(doc, {
219
- verificationMethod: vm, proofPurpose: 'assertionMethod', privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
220
- });
221
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: loader });
222
- expect(res.verified).toBe(true);
223
- });
224
-
225
- test('createProof propagates canonizeProof/hash-stage exception via loader', async () => {
226
- // Fail only during proof canonization stage (hash path), not during transform
227
- const loader = async (iri: string) => {
228
- if (iri.includes('w3id.org/security/data-integrity')) {
229
- throw new Error('hash-stage canonize fail');
230
- }
231
- if (iri.includes('#')) {
232
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
233
- }
234
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
235
- };
236
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:hash-fail' }, {
237
- verificationMethod: 'did:ex#key-hash', proofPurpose: 'assertionMethod', privateKey: pk32,
238
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
239
- } as any)).rejects.toThrow();
240
- });
241
- });
242
-
243
-
244
-
245
-
246
- /** Inlined from eddsa.errors.part.ts */
247
-
248
- describe('EdDSA error branches', () => {
249
- test('createProof throws on non-Ed25519 multikey private key', async () => {
250
- const sk = new Uint8Array(32).fill(7);
251
- const skMbSecp = multikey.encodePrivateKey(sk, 'Secp256k1');
252
- const loader = async (iri: string) => {
253
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri }, documentUrl: iri, contextUrl: null } as any;
254
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
255
- };
256
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
257
- verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMbSecp, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
258
- })).rejects.toThrow('Invalid key type for EdDSA');
259
- });
260
-
261
- test('verifyProof returns error for non-Ed25519 publicKeyMultibase', async () => {
262
- const pkSecp = new Uint8Array(33).fill(8);
263
- const pkMbSecp = multikey.encodePublicKey(pkSecp, 'Secp256k1');
264
- const loader = async (iri: string) => {
265
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMbSecp }, documentUrl: iri, contextUrl: null } as any;
266
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
267
- };
268
- const proof = {
269
- type: 'DataIntegrityProof',
270
- cryptosuite: 'eddsa-rdfc-2022',
271
- verificationMethod: 'did:ex#key-1',
272
- proofPurpose: 'assertionMethod',
273
- proofValue: 'z1L'
274
- } as any;
275
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, proof, { documentLoader: loader });
276
- expect(res.verified).toBe(false);
277
- expect(res.errors?.[0]).toBe('Invalid key type for EdDSA');
278
- });
279
- test('createProof propagates transform error (canonize)', async () => {
280
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
281
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: new Uint8Array(32),
282
- documentLoader: async () => { throw new Error('canonize fail'); }
283
- } as any)).rejects.toThrow();
284
- });
285
-
286
- test('verifyProof returns error on loader failure', async () => {
287
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
288
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
289
- } as any, { documentLoader: async () => { throw new Error('load fail'); } });
290
- expect(res.verified).toBe(false);
291
- expect(typeof res.errors?.[0]).toBe('string');
292
- });
293
- });
294
-
295
-
296
-
297
-
298
- /** Inlined from eddsa.more.part.ts */
299
-
300
- describe('EdDSACryptosuiteManager extra branches', () => {
301
- const pkRaw = new Uint8Array(32).fill(7);
302
- const skMb = multikey.encodePrivateKey(pkRaw, 'Ed25519');
303
- const pubMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
304
-
305
- const loader = async (iri: string) => {
306
- if (iri.includes('#')) {
307
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
308
- }
309
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
310
- };
311
-
312
- test('sign with 64-byte private key slices to 32', async () => {
313
- const sixtyFour = new Uint8Array(64);
314
- sixtyFour.set(pkRaw);
315
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
316
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: sixtyFour, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
317
- });
318
- expect(proof.proofValue).toBeTruthy();
319
- });
320
-
321
- test('invalid private key length throws', async () => {
322
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
323
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: new Uint8Array(31), cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
324
- })).rejects.toThrow('Invalid private key length');
325
- });
326
-
327
- test('verify returns false on signature mismatch', async () => {
328
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
329
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' // invalid base58btc
330
- } as any, { documentLoader: loader });
331
- expect(res.verified).toBe(false);
332
- });
333
-
334
- test('verifyProof returns error on canonizeProof failure path', async () => {
335
- const badLoader = async (iri: string) => {
336
- if (iri.includes('#')) {
337
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
338
- }
339
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
340
- };
341
- const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
342
- const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'] };
343
- doc.self = doc;
344
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: badLoader });
345
- expect(res.verified).toBe(false);
346
- });
347
- });
348
-
349
-
350
-
351
-
352
- /** Inlined from eddsa.privatekey-string.part.ts */
353
-
354
- describe('EdDSA createProof with multikey string', () => {
355
- test('signs using multibase multicodec private key', async () => {
356
- const sk = new Uint8Array(32).fill(9);
357
- const pk = new Uint8Array(32).fill(8);
358
- const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
359
- const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
360
- const loader = async (iri: string) => {
361
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
362
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
363
- };
364
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
365
- verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
366
- });
367
- expect(proof.type).toBe('DataIntegrityProof');
368
- });
369
- });
370
-
371
-
372
-
373
-
374
- /** Inlined from eddsa.success.part.ts */
375
- // Initialize noble crypto libraries (uses shared initialization module)
376
- import '../../../../src/crypto/noble-init.js';
377
-
378
- import * as ed25519 from '@noble/ed25519';
379
-
380
- describe('EdDSA verifyProof success path', () => {
381
- test('createProof then verifyProof returns verified=true', async () => {
382
- const sk = ed25519.utils.randomPrivateKey();
383
- const pk = ed25519.getPublicKey(sk);
384
- const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
385
- const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
386
- const vmId = 'did:ex:succ#k';
387
- const loader = async (iri: string) => {
388
- if (iri.includes('#')) {
389
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
390
- }
391
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
392
- };
393
- const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:doc' };
394
- const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
395
- const res = await EdDSACryptosuiteManager.verifyProof({ ...doc, proof }, proof as any, { documentLoader: loader });
396
- expect(res.verified).toBe(true);
397
- });
398
- });