@originals/sdk 1.4.2 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/src/adapters/FeeOracleMock.ts +0 -9
  4. package/src/adapters/index.ts +0 -5
  5. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  6. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  7. package/src/adapters/types.ts +0 -66
  8. package/src/bitcoin/BitcoinManager.ts +0 -330
  9. package/src/bitcoin/BroadcastClient.ts +0 -54
  10. package/src/bitcoin/OrdinalsClient.ts +0 -119
  11. package/src/bitcoin/PSBTBuilder.ts +0 -106
  12. package/src/bitcoin/fee-calculation.ts +0 -38
  13. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  14. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  15. package/src/bitcoin/providers/types.ts +0 -59
  16. package/src/bitcoin/transactions/commit.ts +0 -465
  17. package/src/bitcoin/transactions/index.ts +0 -13
  18. package/src/bitcoin/transfer.ts +0 -43
  19. package/src/bitcoin/utxo-selection.ts +0 -322
  20. package/src/bitcoin/utxo.ts +0 -113
  21. package/src/contexts/credentials-v1.json +0 -237
  22. package/src/contexts/credentials-v2-examples.json +0 -5
  23. package/src/contexts/credentials-v2.json +0 -340
  24. package/src/contexts/credentials.json +0 -237
  25. package/src/contexts/data-integrity-v2.json +0 -81
  26. package/src/contexts/dids.json +0 -58
  27. package/src/contexts/ed255192020.json +0 -93
  28. package/src/contexts/ordinals-plus.json +0 -23
  29. package/src/contexts/originals.json +0 -22
  30. package/src/core/OriginalsSDK.ts +0 -416
  31. package/src/crypto/Multikey.ts +0 -194
  32. package/src/crypto/Signer.ts +0 -254
  33. package/src/crypto/noble-init.ts +0 -121
  34. package/src/did/BtcoDidResolver.ts +0 -227
  35. package/src/did/DIDManager.ts +0 -694
  36. package/src/did/Ed25519Verifier.ts +0 -68
  37. package/src/did/KeyManager.ts +0 -236
  38. package/src/did/WebVHManager.ts +0 -498
  39. package/src/did/createBtcoDidDocument.ts +0 -59
  40. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  41. package/src/events/EventEmitter.ts +0 -222
  42. package/src/events/index.ts +0 -19
  43. package/src/events/types.ts +0 -331
  44. package/src/examples/basic-usage.ts +0 -78
  45. package/src/examples/create-module-original.ts +0 -435
  46. package/src/examples/full-lifecycle-flow.ts +0 -514
  47. package/src/examples/run.ts +0 -60
  48. package/src/index.ts +0 -150
  49. package/src/kinds/KindRegistry.ts +0 -290
  50. package/src/kinds/index.ts +0 -74
  51. package/src/kinds/types.ts +0 -470
  52. package/src/kinds/validators/AgentValidator.ts +0 -257
  53. package/src/kinds/validators/AppValidator.ts +0 -211
  54. package/src/kinds/validators/DatasetValidator.ts +0 -242
  55. package/src/kinds/validators/DocumentValidator.ts +0 -311
  56. package/src/kinds/validators/MediaValidator.ts +0 -269
  57. package/src/kinds/validators/ModuleValidator.ts +0 -225
  58. package/src/kinds/validators/base.ts +0 -276
  59. package/src/kinds/validators/index.ts +0 -12
  60. package/src/lifecycle/BatchOperations.ts +0 -373
  61. package/src/lifecycle/LifecycleManager.ts +0 -2126
  62. package/src/lifecycle/OriginalsAsset.ts +0 -524
  63. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  64. package/src/lifecycle/ResourceVersioning.ts +0 -163
  65. package/src/migration/MigrationManager.ts +0 -527
  66. package/src/migration/audit/AuditLogger.ts +0 -176
  67. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  68. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  69. package/src/migration/index.ts +0 -33
  70. package/src/migration/operations/BaseMigration.ts +0 -126
  71. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  72. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  73. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  74. package/src/migration/rollback/RollbackManager.ts +0 -170
  75. package/src/migration/state/StateMachine.ts +0 -92
  76. package/src/migration/state/StateTracker.ts +0 -156
  77. package/src/migration/types.ts +0 -344
  78. package/src/migration/validation/BitcoinValidator.ts +0 -107
  79. package/src/migration/validation/CredentialValidator.ts +0 -62
  80. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  81. package/src/migration/validation/LifecycleValidator.ts +0 -64
  82. package/src/migration/validation/StorageValidator.ts +0 -79
  83. package/src/migration/validation/ValidationPipeline.ts +0 -213
  84. package/src/resources/ResourceManager.ts +0 -655
  85. package/src/resources/index.ts +0 -21
  86. package/src/resources/types.ts +0 -202
  87. package/src/storage/LocalStorageAdapter.ts +0 -61
  88. package/src/storage/MemoryStorageAdapter.ts +0 -29
  89. package/src/storage/StorageAdapter.ts +0 -25
  90. package/src/storage/index.ts +0 -3
  91. package/src/types/bitcoin.ts +0 -98
  92. package/src/types/common.ts +0 -92
  93. package/src/types/credentials.ts +0 -88
  94. package/src/types/did.ts +0 -31
  95. package/src/types/external-shims.d.ts +0 -53
  96. package/src/types/index.ts +0 -7
  97. package/src/types/network.ts +0 -175
  98. package/src/utils/EventLogger.ts +0 -298
  99. package/src/utils/Logger.ts +0 -322
  100. package/src/utils/MetricsCollector.ts +0 -358
  101. package/src/utils/bitcoin-address.ts +0 -130
  102. package/src/utils/cbor.ts +0 -12
  103. package/src/utils/encoding.ts +0 -127
  104. package/src/utils/hash.ts +0 -6
  105. package/src/utils/retry.ts +0 -46
  106. package/src/utils/satoshi-validation.ts +0 -196
  107. package/src/utils/serialization.ts +0 -96
  108. package/src/utils/telemetry.ts +0 -40
  109. package/src/utils/validation.ts +0 -119
  110. package/src/vc/CredentialManager.ts +0 -918
  111. package/src/vc/Issuer.ts +0 -100
  112. package/src/vc/Verifier.ts +0 -47
  113. package/src/vc/cryptosuites/bbs.ts +0 -253
  114. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  115. package/src/vc/cryptosuites/eddsa.ts +0 -99
  116. package/src/vc/documentLoader.ts +0 -67
  117. package/src/vc/proofs/data-integrity.ts +0 -33
  118. package/src/vc/utils/jsonld.ts +0 -18
  119. package/tests/__mocks__/bbs-signatures.js +0 -17
  120. package/tests/__mocks__/mf-base58.js +0 -24
  121. package/tests/fixtures/did-documents.ts +0 -247
  122. package/tests/index.test.ts +0 -21
  123. package/tests/integration/BatchOperations.test.ts +0 -531
  124. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  125. package/tests/integration/CredentialManager.test.ts +0 -42
  126. package/tests/integration/DIDManager.test.ts +0 -41
  127. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  128. package/tests/integration/Events.test.ts +0 -435
  129. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  130. package/tests/integration/LifecycleManager.test.ts +0 -21
  131. package/tests/integration/MultikeyFlow.test.ts +0 -52
  132. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  133. package/tests/integration/WebVhPublish.test.ts +0 -48
  134. package/tests/integration/createTypedOriginal.test.ts +0 -379
  135. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  136. package/tests/manual/test-commit-creation.ts +0 -323
  137. package/tests/mocks/MockKeyStore.ts +0 -38
  138. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  139. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  140. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  141. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  142. package/tests/mocks/adapters/index.ts +0 -6
  143. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  144. package/tests/performance/logging.perf.test.ts +0 -336
  145. package/tests/sdk.test.ts +0 -43
  146. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  147. package/tests/setup.bun.ts +0 -69
  148. package/tests/setup.jest.ts +0 -23
  149. package/tests/stress/batch-operations-stress.test.ts +0 -571
  150. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  151. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  152. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  153. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  154. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  155. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  156. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  157. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  158. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  159. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  160. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  161. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  162. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  163. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  164. package/tests/unit/crypto/Multikey.test.ts +0 -206
  165. package/tests/unit/crypto/Signer.test.ts +0 -408
  166. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  167. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  168. package/tests/unit/did/DIDManager.test.ts +0 -185
  169. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  170. package/tests/unit/did/KeyManager.test.ts +0 -452
  171. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  172. package/tests/unit/did/WebVHManager.test.ts +0 -435
  173. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  174. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  175. package/tests/unit/events/EventEmitter.test.ts +0 -407
  176. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  177. package/tests/unit/kinds/types.test.ts +0 -409
  178. package/tests/unit/kinds/validators.test.ts +0 -651
  179. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  180. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  181. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  182. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  183. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  184. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  185. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  186. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  187. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  188. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  189. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  190. package/tests/unit/types/network.test.ts +0 -255
  191. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  192. package/tests/unit/utils/Logger.test.ts +0 -473
  193. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  194. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  195. package/tests/unit/utils/cbor.test.ts +0 -35
  196. package/tests/unit/utils/encoding.test.ts +0 -318
  197. package/tests/unit/utils/hash.test.ts +0 -12
  198. package/tests/unit/utils/retry.test.ts +0 -100
  199. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  200. package/tests/unit/utils/serialization.test.ts +0 -124
  201. package/tests/unit/utils/telemetry.test.ts +0 -52
  202. package/tests/unit/utils/validation.test.ts +0 -141
  203. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  204. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  205. package/tests/unit/vc/Issuer.test.ts +0 -107
  206. package/tests/unit/vc/Verifier.test.ts +0 -525
  207. package/tests/unit/vc/bbs.test.ts +0 -282
  208. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  209. package/tests/unit/vc/documentLoader.test.ts +0 -121
  210. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  211. package/tsconfig.json +0 -31
  212. package/tsconfig.test.json +0 -15
@@ -1,152 +0,0 @@
1
- import { describe, test, expect, mock, beforeEach } from 'bun:test';
2
- import { OriginalsSDK } from '../../../src';
3
- import { signAsync, getPublicKeyAsync } from '@noble/ed25519';
4
-
5
- describe('OriginalsSDK', () => {
6
- test('create() returns instance with managers and defaults', () => {
7
- const sdk = OriginalsSDK.create();
8
- expect(sdk).toBeInstanceOf(OriginalsSDK);
9
- expect(sdk.did).toBeDefined();
10
- expect(sdk.credentials).toBeDefined();
11
- expect(sdk.lifecycle).toBeDefined();
12
- expect(sdk.bitcoin).toBeDefined();
13
- });
14
-
15
- test('create() accepts config overrides', () => {
16
- const sdk = OriginalsSDK.create({ network: 'regtest', enableLogging: true });
17
- expect(sdk).toBeInstanceOf(OriginalsSDK);
18
- });
19
-
20
- test('constructor throws error when config is null', () => {
21
- expect(() => new OriginalsSDK(null as any)).toThrow('Configuration object is required');
22
- });
23
-
24
- test('constructor throws error when config is not an object', () => {
25
- expect(() => new OriginalsSDK('invalid' as any)).toThrow('Configuration object is required');
26
- });
27
-
28
- test('constructor throws error when network is invalid', () => {
29
- expect(() => new OriginalsSDK({ network: 'invalid' as any, defaultKeyType: 'ES256K' }))
30
- .toThrow('Invalid network: must be mainnet, regtest, or signet');
31
- });
32
-
33
- test('constructor throws error when network is missing', () => {
34
- expect(() => new OriginalsSDK({ defaultKeyType: 'ES256K' } as any))
35
- .toThrow('Invalid network: must be mainnet, regtest, or signet');
36
- });
37
-
38
- test('constructor throws error when defaultKeyType is invalid', () => {
39
- expect(() => new OriginalsSDK({ network: 'mainnet', defaultKeyType: 'invalid' as any }))
40
- .toThrow('Invalid defaultKeyType: must be ES256K, Ed25519, or ES256');
41
- });
42
-
43
- test('constructor throws error when defaultKeyType is missing', () => {
44
- expect(() => new OriginalsSDK({ network: 'mainnet' } as any))
45
- .toThrow('Invalid defaultKeyType: must be ES256K, Ed25519, or ES256');
46
- });
47
-
48
- describe('validateBitcoinConfig', () => {
49
- test('does not throw when ordinalsProvider is configured', () => {
50
- const mockProvider = {
51
- getInscription: mock(() => Promise.resolve({ id: 'test', content: new Uint8Array() })),
52
- getBalance: mock(() => Promise.resolve(1000)),
53
- getUtxos: mock(() => Promise.resolve([])),
54
- inscribe: mock(() => Promise.resolve({ txid: 'test', vout: 0 })),
55
- broadcastTx: mock(() => Promise.resolve('txid')),
56
- estimateFee: mock(() => Promise.resolve(10)),
57
- };
58
-
59
- const sdk = OriginalsSDK.create({ ordinalsProvider: mockProvider });
60
- expect(() => sdk.validateBitcoinConfig()).not.toThrow();
61
- });
62
-
63
- test('throws StructuredError when ordinalsProvider is not configured', () => {
64
- const sdk = OriginalsSDK.create();
65
- expect(() => sdk.validateBitcoinConfig()).toThrow('Bitcoin operations require an ordinalsProvider');
66
- });
67
- });
68
-
69
- describe('verifyDIDSignature', () => {
70
- let privateKey: Uint8Array;
71
- let publicKey32: Uint8Array;
72
- let publicKey33: Uint8Array;
73
- const message = new TextEncoder().encode('test message');
74
-
75
- beforeEach(async () => {
76
- privateKey = new Uint8Array(32).fill(1);
77
- publicKey32 = await getPublicKeyAsync(privateKey);
78
- publicKey33 = new Uint8Array(33);
79
- publicKey33[0] = 0x00;
80
- publicKey33.set(publicKey32, 1);
81
- });
82
-
83
- test('verifies valid signature with 32-byte public key', async () => {
84
- const signature = await signAsync(message, privateKey);
85
- const result = await OriginalsSDK.verifyDIDSignature(signature, message, publicKey32);
86
- expect(result).toBe(true);
87
- });
88
-
89
- test('verifies valid signature with 33-byte public key (slices off version byte)', async () => {
90
- const signature = await signAsync(message, privateKey);
91
- const result = await OriginalsSDK.verifyDIDSignature(signature, message, publicKey33);
92
- expect(result).toBe(true);
93
- });
94
-
95
- test('returns false for invalid signature', async () => {
96
- const signature = await signAsync(message, privateKey);
97
- const wrongMessage = new TextEncoder().encode('wrong message');
98
- const result = await OriginalsSDK.verifyDIDSignature(signature, wrongMessage, publicKey32);
99
- expect(result).toBe(false);
100
- });
101
-
102
- test('throws error for invalid public key length', async () => {
103
- const signature = await signAsync(message, privateKey);
104
- const invalidKey = new Uint8Array(16);
105
- await expect(OriginalsSDK.verifyDIDSignature(signature, message, invalidKey))
106
- .rejects.toThrow('Invalid Ed25519 public key length: 16');
107
- });
108
-
109
- test('returns false on verification error', async () => {
110
- const invalidSignature = new Uint8Array(32); // Invalid signature
111
- const result = await OriginalsSDK.verifyDIDSignature(invalidSignature, message, publicKey32);
112
- expect(result).toBe(false);
113
- });
114
- });
115
-
116
- describe('prepareDIDDataForSigning', () => {
117
- test('calls didwebvh-ts prepareDataForSigning', async () => {
118
- const document = { id: 'did:webvh:example.com' };
119
- const proof = { type: 'DataIntegrityProof' };
120
-
121
- // This test verifies the method exists and delegates to didwebvh-ts
122
- const result = await OriginalsSDK.prepareDIDDataForSigning(document, proof);
123
- expect(result).toBeInstanceOf(Uint8Array);
124
- });
125
- });
126
-
127
- describe('createOriginal', () => {
128
- test('throws error for unsupported type', async () => {
129
- const options = {
130
- type: 'invalid' as any,
131
- domain: 'example.com',
132
- };
133
-
134
- await expect(OriginalsSDK.createOriginal(options))
135
- .rejects.toThrow('Unsupported Original type: invalid');
136
- });
137
- });
138
-
139
- describe('updateOriginal', () => {
140
- test('throws error for unsupported type', async () => {
141
- const options = {
142
- type: 'invalid' as any,
143
- log: [],
144
- };
145
-
146
- await expect(OriginalsSDK.updateOriginal(options))
147
- .rejects.toThrow('Unsupported Original type');
148
- });
149
- });
150
- });
151
-
152
-
@@ -1,206 +0,0 @@
1
- import { describe, test, expect } from 'bun:test';
2
- import {
3
- multikey,
4
- validateMultikeyFormat,
5
- MULTICODEC_ED25519_PUB_HEADER,
6
- MULTICODEC_ED25519_PRIV_HEADER,
7
- MULTICODEC_SECP256K1_PUB_HEADER,
8
- MULTICODEC_SECP256K1_PRIV_HEADER,
9
- MULTICODEC_P256_PUB_HEADER,
10
- MULTICODEC_P256_PRIV_HEADER,
11
- MULTICODEC_BLS12381_G2_PUB_HEADER,
12
- MULTICODEC_BLS12381_G2_PRIV_HEADER
13
- } from '../../../src/crypto/Multikey';
14
- import { base58 } from '@scure/base';
15
-
16
- function concatBytes(a: Uint8Array, b: Uint8Array): Uint8Array {
17
- const out = new Uint8Array(a.length + b.length);
18
- out.set(a, 0);
19
- out.set(b, a.length);
20
- return out;
21
- }
22
-
23
- describe('Multikey encode/decode', () => {
24
- const edPub = new Uint8Array(32).map((_, i) => (i + 1) & 0xff);
25
- const edPriv = new Uint8Array(32).map((_, i) => (i + 2) & 0xff);
26
- const secpPub = new Uint8Array(33).map((_, i) => (i + 3) & 0xff);
27
- const secpPriv = new Uint8Array(32).map((_, i) => (i + 4) & 0xff);
28
- const p256Pub = new Uint8Array(33).map((_, i) => (i + 7) & 0xff);
29
- const p256Priv = new Uint8Array(32).map((_, i) => (i + 8) & 0xff);
30
-
31
- test('encode/decode Ed25519', () => {
32
- const pub = multikey.encodePublicKey(edPub, 'Ed25519');
33
- const priv = multikey.encodePrivateKey(edPriv, 'Ed25519');
34
- const decPub = multikey.decodePublicKey(pub);
35
- const decPriv = multikey.decodePrivateKey(priv);
36
- expect(Array.from(decPub.key)).toEqual(Array.from(edPub));
37
- expect(decPub.type).toBe('Ed25519');
38
- expect(Array.from(decPriv.key)).toEqual(Array.from(edPriv));
39
- expect(decPriv.type).toBe('Ed25519');
40
- });
41
-
42
- test('encode/decode Secp256k1', () => {
43
- const pub = multikey.encodePublicKey(secpPub, 'Secp256k1');
44
- const priv = multikey.encodePrivateKey(secpPriv, 'Secp256k1');
45
- const decPub = multikey.decodePublicKey(pub);
46
- const decPriv = multikey.decodePrivateKey(priv);
47
- expect(Array.from(decPub.key)).toEqual(Array.from(secpPub));
48
- expect(decPub.type).toBe('Secp256k1');
49
- expect(Array.from(decPriv.key)).toEqual(Array.from(secpPriv));
50
- expect(decPriv.type).toBe('Secp256k1');
51
- });
52
-
53
- test('encode/decode P256', () => {
54
- const pub = multikey.encodePublicKey(p256Pub, 'P256');
55
- const priv = multikey.encodePrivateKey(p256Priv, 'P256');
56
- const decPub = multikey.decodePublicKey(pub);
57
- const decPriv = multikey.decodePrivateKey(priv);
58
- expect(Array.from(decPub.key)).toEqual(Array.from(p256Pub));
59
- expect(decPub.type).toBe('P256');
60
- expect(Array.from(decPriv.key)).toEqual(Array.from(p256Priv));
61
- expect(decPriv.type).toBe('P256');
62
- });
63
-
64
- test('decode errors: invalid multibase prefix', () => {
65
- expect(() => multikey.decodePublicKey('xabc')).toThrow();
66
- expect(() => multikey.decodePrivateKey('xabc')).toThrow();
67
- });
68
-
69
- test('decode errors: unsupported type header', () => {
70
- const unknownHeader = new Uint8Array([0x00, 0x00]);
71
- const fakeKey = new Uint8Array([1, 2, 3, 4]);
72
- const mb = 'z' + base58.encode(concatBytes(unknownHeader, fakeKey));
73
- expect(() => multikey.decodePublicKey(mb)).toThrow('Unsupported key type');
74
- expect(() => multikey.decodePrivateKey(mb)).toThrow('Unsupported key type');
75
- });
76
-
77
- test('encode/decode Bls12381G2', () => {
78
- const blsPub = new Uint8Array(96).map((_, i) => (i + 5) & 0xff);
79
- const blsPriv = new Uint8Array(32).map((_, i) => (i + 6) & 0xff);
80
- const pub = multikey.encodePublicKey(blsPub, 'Bls12381G2');
81
- const priv = multikey.encodePrivateKey(blsPriv, 'Bls12381G2');
82
- const decPub = multikey.decodePublicKey(pub);
83
- const decPriv = multikey.decodePrivateKey(priv);
84
- expect(Array.from(decPub.key)).toEqual(Array.from(blsPub));
85
- expect(decPub.type).toBe('Bls12381G2');
86
- expect(Array.from(decPriv.key)).toEqual(Array.from(blsPriv));
87
- expect(decPriv.type).toBe('Bls12381G2');
88
- });
89
- });
90
-
91
- describe('validateMultikeyFormat', () => {
92
- test('throws on null/undefined key', () => {
93
- expect(() => validateMultikeyFormat(null as any, 'Ed25519', false)).toThrow('Invalid multibase key format. Key must be a non-empty string.');
94
- expect(() => validateMultikeyFormat(undefined as any, 'Ed25519', false)).toThrow('Invalid multibase key format. Key must be a non-empty string.');
95
- });
96
-
97
- test('throws on empty string', () => {
98
- expect(() => validateMultikeyFormat('', 'Ed25519', false)).toThrow('Invalid multibase key format. Key must be a non-empty string.');
99
- });
100
-
101
- test('throws on non-z prefix', () => {
102
- expect(() => validateMultikeyFormat('xABC123', 'Ed25519', false)).toThrow('Invalid multibase key format. Keys must use z-base58btc encoding (prefix "z").');
103
- });
104
-
105
- test('throws on invalid base58 decode', () => {
106
- expect(() => validateMultikeyFormat('z!!!', 'Ed25519', false)).toThrow('Invalid multibase key format. Keys must use multicodec headers. Decode error:');
107
- });
108
-
109
- test('throws when decoded length is less than 2 bytes', () => {
110
- const shortEncoded = 'z' + base58.encode(new Uint8Array([0x01]));
111
- expect(() => validateMultikeyFormat(shortEncoded, 'Ed25519', false)).toThrow('Invalid multibase key format. Keys must use multicodec headers.');
112
- });
113
-
114
- test('throws on mismatched Ed25519 public key header', () => {
115
- // Wrong header for Ed25519
116
- const wrongHeader = new Uint8Array([0x00, 0x00]);
117
- const fakeKey = new Uint8Array(32).fill(1);
118
- const encoded = 'z' + base58.encode(concatBytes(wrongHeader, fakeKey));
119
- expect(() => validateMultikeyFormat(encoded, 'Ed25519', false)).toThrow('Invalid multibase key format. Expected Ed25519 public key');
120
- });
121
-
122
- test('throws on mismatched Ed25519 private key header', () => {
123
- const wrongHeader = new Uint8Array([0x00, 0x00]);
124
- const fakeKey = new Uint8Array(32).fill(1);
125
- const encoded = 'z' + base58.encode(concatBytes(wrongHeader, fakeKey));
126
- expect(() => validateMultikeyFormat(encoded, 'Ed25519', true)).toThrow('Invalid multibase key format. Expected Ed25519 private key');
127
- });
128
-
129
- test('throws on wrong Ed25519 public key length', () => {
130
- const pub = new Uint8Array(31).fill(1); // Should be 32
131
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_ED25519_PUB_HEADER, pub));
132
- expect(() => validateMultikeyFormat(encoded, 'Ed25519', false)).toThrow('Invalid multibase key format. Expected Ed25519 public key to be 32 bytes');
133
- });
134
-
135
- test('throws on wrong Ed25519 private key length', () => {
136
- const priv = new Uint8Array(31).fill(1); // Should be 32
137
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_ED25519_PRIV_HEADER, priv));
138
- expect(() => validateMultikeyFormat(encoded, 'Ed25519', true)).toThrow('Invalid multibase key format. Expected Ed25519 private key to be 32 bytes');
139
- });
140
-
141
- test('validates correct Ed25519 public key', () => {
142
- const pub = new Uint8Array(32).fill(1);
143
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_ED25519_PUB_HEADER, pub));
144
- expect(() => validateMultikeyFormat(encoded, 'Ed25519', false)).not.toThrow();
145
- });
146
-
147
- test('validates correct Ed25519 private key', () => {
148
- const priv = new Uint8Array(32).fill(1);
149
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_ED25519_PRIV_HEADER, priv));
150
- expect(() => validateMultikeyFormat(encoded, 'Ed25519', true)).not.toThrow();
151
- });
152
-
153
- test('validates correct Secp256k1 public key (33 bytes)', () => {
154
- const pub = new Uint8Array(33).fill(2);
155
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_SECP256K1_PUB_HEADER, pub));
156
- expect(() => validateMultikeyFormat(encoded, 'Secp256k1', false)).not.toThrow();
157
- });
158
-
159
- test('validates correct Secp256k1 private key (32 bytes)', () => {
160
- const priv = new Uint8Array(32).fill(2);
161
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_SECP256K1_PRIV_HEADER, priv));
162
- expect(() => validateMultikeyFormat(encoded, 'Secp256k1', true)).not.toThrow();
163
- });
164
-
165
- test('throws on wrong Secp256k1 public key length', () => {
166
- const pub = new Uint8Array(32).fill(2); // Should be 33
167
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_SECP256K1_PUB_HEADER, pub));
168
- expect(() => validateMultikeyFormat(encoded, 'Secp256k1', false)).toThrow('Invalid multibase key format. Expected Secp256k1 public key to be 33 bytes');
169
- });
170
-
171
- test('validates correct P256 public key (33 bytes)', () => {
172
- const pub = new Uint8Array(33).fill(3);
173
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_P256_PUB_HEADER, pub));
174
- expect(() => validateMultikeyFormat(encoded, 'P256', false)).not.toThrow();
175
- });
176
-
177
- test('validates correct P256 private key (32 bytes)', () => {
178
- const priv = new Uint8Array(32).fill(3);
179
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_P256_PRIV_HEADER, priv));
180
- expect(() => validateMultikeyFormat(encoded, 'P256', true)).not.toThrow();
181
- });
182
-
183
- test('validates correct Bls12381G2 public key (96 bytes)', () => {
184
- const pub = new Uint8Array(96).fill(4);
185
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_BLS12381_G2_PUB_HEADER, pub));
186
- expect(() => validateMultikeyFormat(encoded, 'Bls12381G2', false)).not.toThrow();
187
- });
188
-
189
- test('validates correct Bls12381G2 private key (32 bytes)', () => {
190
- const priv = new Uint8Array(32).fill(4);
191
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_BLS12381_G2_PRIV_HEADER, priv));
192
- expect(() => validateMultikeyFormat(encoded, 'Bls12381G2', true)).not.toThrow();
193
- });
194
-
195
- test('throws on wrong Bls12381G2 public key length', () => {
196
- const pub = new Uint8Array(95).fill(4); // Should be 96
197
- const encoded = 'z' + base58.encode(concatBytes(MULTICODEC_BLS12381_G2_PUB_HEADER, pub));
198
- expect(() => validateMultikeyFormat(encoded, 'Bls12381G2', false)).toThrow('Invalid multibase key format. Expected Bls12381G2 public key to be 96 bytes');
199
- });
200
-
201
- test('re-throws validation errors as-is', () => {
202
- // This tests the error re-throwing logic for errors that start with "Invalid multibase key format"
203
- expect(() => validateMultikeyFormat('', 'Ed25519', false)).toThrow('Invalid multibase key format. Key must be a non-empty string.');
204
- });
205
- });
206
-