@originals/sdk 1.4.2 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/src/adapters/FeeOracleMock.ts +0 -9
  4. package/src/adapters/index.ts +0 -5
  5. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  6. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  7. package/src/adapters/types.ts +0 -66
  8. package/src/bitcoin/BitcoinManager.ts +0 -330
  9. package/src/bitcoin/BroadcastClient.ts +0 -54
  10. package/src/bitcoin/OrdinalsClient.ts +0 -119
  11. package/src/bitcoin/PSBTBuilder.ts +0 -106
  12. package/src/bitcoin/fee-calculation.ts +0 -38
  13. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  14. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  15. package/src/bitcoin/providers/types.ts +0 -59
  16. package/src/bitcoin/transactions/commit.ts +0 -465
  17. package/src/bitcoin/transactions/index.ts +0 -13
  18. package/src/bitcoin/transfer.ts +0 -43
  19. package/src/bitcoin/utxo-selection.ts +0 -322
  20. package/src/bitcoin/utxo.ts +0 -113
  21. package/src/contexts/credentials-v1.json +0 -237
  22. package/src/contexts/credentials-v2-examples.json +0 -5
  23. package/src/contexts/credentials-v2.json +0 -340
  24. package/src/contexts/credentials.json +0 -237
  25. package/src/contexts/data-integrity-v2.json +0 -81
  26. package/src/contexts/dids.json +0 -58
  27. package/src/contexts/ed255192020.json +0 -93
  28. package/src/contexts/ordinals-plus.json +0 -23
  29. package/src/contexts/originals.json +0 -22
  30. package/src/core/OriginalsSDK.ts +0 -416
  31. package/src/crypto/Multikey.ts +0 -194
  32. package/src/crypto/Signer.ts +0 -254
  33. package/src/crypto/noble-init.ts +0 -121
  34. package/src/did/BtcoDidResolver.ts +0 -227
  35. package/src/did/DIDManager.ts +0 -694
  36. package/src/did/Ed25519Verifier.ts +0 -68
  37. package/src/did/KeyManager.ts +0 -236
  38. package/src/did/WebVHManager.ts +0 -498
  39. package/src/did/createBtcoDidDocument.ts +0 -59
  40. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  41. package/src/events/EventEmitter.ts +0 -222
  42. package/src/events/index.ts +0 -19
  43. package/src/events/types.ts +0 -331
  44. package/src/examples/basic-usage.ts +0 -78
  45. package/src/examples/create-module-original.ts +0 -435
  46. package/src/examples/full-lifecycle-flow.ts +0 -514
  47. package/src/examples/run.ts +0 -60
  48. package/src/index.ts +0 -150
  49. package/src/kinds/KindRegistry.ts +0 -290
  50. package/src/kinds/index.ts +0 -74
  51. package/src/kinds/types.ts +0 -470
  52. package/src/kinds/validators/AgentValidator.ts +0 -257
  53. package/src/kinds/validators/AppValidator.ts +0 -211
  54. package/src/kinds/validators/DatasetValidator.ts +0 -242
  55. package/src/kinds/validators/DocumentValidator.ts +0 -311
  56. package/src/kinds/validators/MediaValidator.ts +0 -269
  57. package/src/kinds/validators/ModuleValidator.ts +0 -225
  58. package/src/kinds/validators/base.ts +0 -276
  59. package/src/kinds/validators/index.ts +0 -12
  60. package/src/lifecycle/BatchOperations.ts +0 -373
  61. package/src/lifecycle/LifecycleManager.ts +0 -2126
  62. package/src/lifecycle/OriginalsAsset.ts +0 -524
  63. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  64. package/src/lifecycle/ResourceVersioning.ts +0 -163
  65. package/src/migration/MigrationManager.ts +0 -527
  66. package/src/migration/audit/AuditLogger.ts +0 -176
  67. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  68. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  69. package/src/migration/index.ts +0 -33
  70. package/src/migration/operations/BaseMigration.ts +0 -126
  71. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  72. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  73. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  74. package/src/migration/rollback/RollbackManager.ts +0 -170
  75. package/src/migration/state/StateMachine.ts +0 -92
  76. package/src/migration/state/StateTracker.ts +0 -156
  77. package/src/migration/types.ts +0 -344
  78. package/src/migration/validation/BitcoinValidator.ts +0 -107
  79. package/src/migration/validation/CredentialValidator.ts +0 -62
  80. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  81. package/src/migration/validation/LifecycleValidator.ts +0 -64
  82. package/src/migration/validation/StorageValidator.ts +0 -79
  83. package/src/migration/validation/ValidationPipeline.ts +0 -213
  84. package/src/resources/ResourceManager.ts +0 -655
  85. package/src/resources/index.ts +0 -21
  86. package/src/resources/types.ts +0 -202
  87. package/src/storage/LocalStorageAdapter.ts +0 -61
  88. package/src/storage/MemoryStorageAdapter.ts +0 -29
  89. package/src/storage/StorageAdapter.ts +0 -25
  90. package/src/storage/index.ts +0 -3
  91. package/src/types/bitcoin.ts +0 -98
  92. package/src/types/common.ts +0 -92
  93. package/src/types/credentials.ts +0 -88
  94. package/src/types/did.ts +0 -31
  95. package/src/types/external-shims.d.ts +0 -53
  96. package/src/types/index.ts +0 -7
  97. package/src/types/network.ts +0 -175
  98. package/src/utils/EventLogger.ts +0 -298
  99. package/src/utils/Logger.ts +0 -322
  100. package/src/utils/MetricsCollector.ts +0 -358
  101. package/src/utils/bitcoin-address.ts +0 -130
  102. package/src/utils/cbor.ts +0 -12
  103. package/src/utils/encoding.ts +0 -127
  104. package/src/utils/hash.ts +0 -6
  105. package/src/utils/retry.ts +0 -46
  106. package/src/utils/satoshi-validation.ts +0 -196
  107. package/src/utils/serialization.ts +0 -96
  108. package/src/utils/telemetry.ts +0 -40
  109. package/src/utils/validation.ts +0 -119
  110. package/src/vc/CredentialManager.ts +0 -918
  111. package/src/vc/Issuer.ts +0 -100
  112. package/src/vc/Verifier.ts +0 -47
  113. package/src/vc/cryptosuites/bbs.ts +0 -253
  114. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  115. package/src/vc/cryptosuites/eddsa.ts +0 -99
  116. package/src/vc/documentLoader.ts +0 -67
  117. package/src/vc/proofs/data-integrity.ts +0 -33
  118. package/src/vc/utils/jsonld.ts +0 -18
  119. package/tests/__mocks__/bbs-signatures.js +0 -17
  120. package/tests/__mocks__/mf-base58.js +0 -24
  121. package/tests/fixtures/did-documents.ts +0 -247
  122. package/tests/index.test.ts +0 -21
  123. package/tests/integration/BatchOperations.test.ts +0 -531
  124. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  125. package/tests/integration/CredentialManager.test.ts +0 -42
  126. package/tests/integration/DIDManager.test.ts +0 -41
  127. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  128. package/tests/integration/Events.test.ts +0 -435
  129. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  130. package/tests/integration/LifecycleManager.test.ts +0 -21
  131. package/tests/integration/MultikeyFlow.test.ts +0 -52
  132. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  133. package/tests/integration/WebVhPublish.test.ts +0 -48
  134. package/tests/integration/createTypedOriginal.test.ts +0 -379
  135. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  136. package/tests/manual/test-commit-creation.ts +0 -323
  137. package/tests/mocks/MockKeyStore.ts +0 -38
  138. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  139. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  140. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  141. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  142. package/tests/mocks/adapters/index.ts +0 -6
  143. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  144. package/tests/performance/logging.perf.test.ts +0 -336
  145. package/tests/sdk.test.ts +0 -43
  146. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  147. package/tests/setup.bun.ts +0 -69
  148. package/tests/setup.jest.ts +0 -23
  149. package/tests/stress/batch-operations-stress.test.ts +0 -571
  150. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  151. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  152. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  153. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  154. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  155. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  156. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  157. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  158. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  159. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  160. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  161. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  162. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  163. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  164. package/tests/unit/crypto/Multikey.test.ts +0 -206
  165. package/tests/unit/crypto/Signer.test.ts +0 -408
  166. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  167. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  168. package/tests/unit/did/DIDManager.test.ts +0 -185
  169. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  170. package/tests/unit/did/KeyManager.test.ts +0 -452
  171. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  172. package/tests/unit/did/WebVHManager.test.ts +0 -435
  173. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  174. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  175. package/tests/unit/events/EventEmitter.test.ts +0 -407
  176. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  177. package/tests/unit/kinds/types.test.ts +0 -409
  178. package/tests/unit/kinds/validators.test.ts +0 -651
  179. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  180. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  181. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  182. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  183. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  184. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  185. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  186. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  187. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  188. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  189. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  190. package/tests/unit/types/network.test.ts +0 -255
  191. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  192. package/tests/unit/utils/Logger.test.ts +0 -473
  193. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  194. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  195. package/tests/unit/utils/cbor.test.ts +0 -35
  196. package/tests/unit/utils/encoding.test.ts +0 -318
  197. package/tests/unit/utils/hash.test.ts +0 -12
  198. package/tests/unit/utils/retry.test.ts +0 -100
  199. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  200. package/tests/unit/utils/serialization.test.ts +0 -124
  201. package/tests/unit/utils/telemetry.test.ts +0 -52
  202. package/tests/unit/utils/validation.test.ts +0 -141
  203. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  204. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  205. package/tests/unit/vc/Issuer.test.ts +0 -107
  206. package/tests/unit/vc/Verifier.test.ts +0 -525
  207. package/tests/unit/vc/bbs.test.ts +0 -282
  208. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  209. package/tests/unit/vc/documentLoader.test.ts +0 -121
  210. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  211. package/tsconfig.json +0 -31
  212. package/tsconfig.test.json +0 -15
@@ -1,408 +0,0 @@
1
- import { describe, test, expect, afterEach, spyOn } from 'bun:test';
2
- import { ES256KSigner, ES256Signer, Ed25519Signer, Bls12381G2Signer } from '../../../src/crypto/Signer';
3
- import * as secp256k1 from '@noble/secp256k1';
4
- import { p256 } from '@noble/curves/p256';
5
- import { bls12_381 as bls } from '@noble/curves/bls12-381';
6
- import * as ed25519 from '@noble/ed25519';
7
- import { multikey } from '../../../src/crypto/Multikey';
8
-
9
- const secpPrivMb = (bytes: Uint8Array) => multikey.encodePrivateKey(bytes, 'Secp256k1');
10
- const secpPubMb = (bytes: Uint8Array) => multikey.encodePublicKey(bytes, 'Secp256k1');
11
- const edPrivMb = (bytes: Uint8Array) => multikey.encodePrivateKey(bytes, 'Ed25519');
12
- const edPubMb = (bytes: Uint8Array) => multikey.encodePublicKey(bytes, 'Ed25519');
13
- const p256PrivMb = (bytes: Uint8Array) => multikey.encodePrivateKey(bytes, 'P256');
14
- const p256PubMb = (bytes: Uint8Array) => multikey.encodePublicKey(bytes, 'P256');
15
- const blsPrivMb = (bytes: Uint8Array) => multikey.encodePrivateKey(bytes, 'Bls12381G2');
16
- const blsPubMb = (bytes: Uint8Array) => multikey.encodePublicKey(bytes, 'Bls12381G2');
17
-
18
- describe('Signer abstract class', () => {
19
- test('abstract class methods are defined', () => {
20
- // This tests the abstract class definition at lines 1-4
21
- // Since we can't instantiate an abstract class in TypeScript,
22
- // we'll verify that the concrete implementations exist
23
- const signer = new ES256KSigner();
24
- expect(typeof signer.sign).toBe('function');
25
- expect(typeof signer.verify).toBe('function');
26
- });
27
-
28
- test('ES256KSigner sign catches decode error and wraps it', async () => {
29
- const signer = new ES256KSigner();
30
- // Pass a key that starts with 'z' but is invalid base58
31
- await expect(signer.sign(Buffer.from('test'), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
32
- });
33
-
34
- test('ES256KSigner verify catches decode error and wraps it', async () => {
35
- const signer = new ES256KSigner();
36
- await expect(signer.verify(Buffer.from('test'), Buffer.alloc(64), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
37
- });
38
-
39
- test('Ed25519Signer sign catches decode error and wraps it', async () => {
40
- const signer = new Ed25519Signer();
41
- await expect(signer.sign(Buffer.from('test'), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
42
- });
43
-
44
- test('Ed25519Signer verify catches decode error and wraps it', async () => {
45
- const signer = new Ed25519Signer();
46
- await expect(signer.verify(Buffer.from('test'), Buffer.alloc(64), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
47
- });
48
-
49
- test('ES256Signer sign catches decode error and wraps it', async () => {
50
- const signer = new ES256Signer();
51
- await expect(signer.sign(Buffer.from('test'), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
52
- });
53
-
54
- test('ES256Signer verify catches decode error and wraps it', async () => {
55
- const signer = new ES256Signer();
56
- await expect(signer.verify(Buffer.from('test'), Buffer.alloc(64), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
57
- });
58
-
59
- test('Bls12381G2Signer sign catches decode error and wraps it', async () => {
60
- const signer = new Bls12381G2Signer();
61
- await expect(signer.sign(Buffer.from('test'), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
62
- });
63
-
64
- test('Bls12381G2Signer verify catches decode error and wraps it', async () => {
65
- const signer = new Bls12381G2Signer();
66
- await expect(signer.verify(Buffer.from('test'), Buffer.alloc(96), 'z!!invalid!!')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
67
- });
68
- });
69
-
70
- describe('Signer classes', () => {
71
- const data = Buffer.from('hello world');
72
-
73
- afterEach(() => {
74
- // Bun automatically restores mocks
75
- });
76
-
77
- describe('ES256KSigner', () => {
78
- test('invalid multibase prefix throws on sign and verify', async () => {
79
- const signer = new ES256KSigner();
80
- await expect(signer.sign(data, 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
81
- await expect(signer.verify(data, Buffer.alloc(64), 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
82
- });
83
-
84
- test('wrong key type throws on sign and verify', async () => {
85
- const signer = new ES256KSigner();
86
- const edPriv = ed25519.utils.randomPrivateKey();
87
- const edPub = await ed25519.getPublicKey(edPriv);
88
- await expect(signer.sign(data, edPrivMb(edPriv))).rejects.toThrow('Invalid key type for ES256K');
89
- await expect(signer.verify(data, Buffer.alloc(64), edPubMb(edPub))).rejects.toThrow('Invalid key type for ES256K');
90
- });
91
-
92
- test('sign returns bytes path (Uint8Array direct)', async () => {
93
- const sk = secp256k1.utils.randomPrivateKey();
94
- const pk = secp256k1.getPublicKey(sk);
95
- const signer = new ES256KSigner();
96
- const sig = await signer.sign(data, secpPrivMb(sk));
97
- expect(Buffer.isBuffer(sig)).toBe(true);
98
- const ok = await signer.verify(data, sig, secpPubMb(pk));
99
- expect(ok).toBe(true);
100
- });
101
-
102
- test('verify returns false for bad signature', async () => {
103
- const sk = secp256k1.utils.randomPrivateKey();
104
- const pk = secp256k1.getPublicKey(sk);
105
- const signer = new ES256KSigner();
106
- const sig = await signer.sign(data, secpPrivMb(sk));
107
- const bad = Buffer.from(sig);
108
- bad[0] ^= 0xff;
109
- const ok = await signer.verify(data, bad, secpPubMb(pk));
110
- expect(ok).toBe(false);
111
- });
112
-
113
- test('sign handles object with toCompactRawBytes()', async () => {
114
- const sk = secp256k1.utils.randomPrivateKey();
115
- const signer = new ES256KSigner();
116
- const bytes = new Uint8Array(64).fill(7);
117
- spyOn(secp256k1, 'signAsync').mockResolvedValue({
118
- toCompactRawBytes: () => bytes
119
- } as any);
120
- const sig = await signer.sign(data, secpPrivMb(sk));
121
- expect(Buffer.from(sig)).toEqual(Buffer.from(bytes));
122
- });
123
-
124
- test('sign handles object with toRawBytes()', async () => {
125
- const sk = secp256k1.utils.randomPrivateKey();
126
- const signer = new ES256KSigner();
127
- const bytes = new Uint8Array(64).fill(9);
128
- spyOn(secp256k1, 'signAsync').mockResolvedValue({
129
- toRawBytes: () => bytes
130
- } as any);
131
- const sig = await signer.sign(data, secpPrivMb(sk));
132
- expect(Buffer.from(sig)).toEqual(Buffer.from(bytes));
133
- });
134
-
135
- test('sign handles fallback via new Uint8Array(sigAny)', async () => {
136
- const sk = secp256k1.utils.randomPrivateKey();
137
- const signer = new ES256KSigner();
138
- const arr = Array.from({ length: 64 }, (_, i) => (i + 1) & 0xff);
139
- spyOn(secp256k1, 'signAsync').mockResolvedValue(arr as any);
140
- const sig = await signer.sign(data, secpPrivMb(sk));
141
- expect(sig).toHaveLength(64);
142
- expect(sig[0]).toBe(1);
143
- expect(sig[63]).toBe(64);
144
- });
145
-
146
- test('verify exception path returns false', async () => {
147
- const sk = secp256k1.utils.randomPrivateKey();
148
- const pk = secp256k1.getPublicKey(sk);
149
- const signer = new ES256KSigner();
150
- const sig = await signer.sign(data, secpPrivMb(sk));
151
- const spy = spyOn(secp256k1, 'verify').mockImplementation(() => { throw new Error('boom'); });
152
- const ok = await signer.verify(data, sig, secpPubMb(pk));
153
- expect(ok).toBe(false);
154
- spy.mockRestore();
155
- });
156
- });
157
-
158
- describe('ES256Signer', () => {
159
- test('invalid multibase prefix throws on sign and verify', async () => {
160
- const signer = new ES256Signer();
161
- await expect(signer.sign(data, 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
162
- await expect(signer.verify(data, Buffer.alloc(64), 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
163
- });
164
-
165
- test('wrong key type throws on sign and verify', async () => {
166
- const signer = new ES256Signer();
167
- const edPriv = ed25519.utils.randomPrivateKey();
168
- const edPub = await ed25519.getPublicKey(edPriv);
169
- await expect(signer.sign(data, edPrivMb(edPriv))).rejects.toThrow('Invalid key type for ES256');
170
- await expect(signer.verify(data, Buffer.alloc(64), edPubMb(edPub))).rejects.toThrow('Invalid key type for ES256');
171
- });
172
-
173
- test('sign returns bytes path (Uint8Array direct)', async () => {
174
- const sk = p256.utils.randomPrivateKey();
175
- const pk = p256.getPublicKey(sk);
176
- const signer = new ES256Signer();
177
- const sig = await signer.sign(data, p256PrivMb(sk));
178
- expect(Buffer.isBuffer(sig)).toBe(true);
179
- const ok = await signer.verify(data, sig, p256PubMb(pk));
180
- expect(ok).toBe(true);
181
- });
182
-
183
- test('verify returns false for bad signature', async () => {
184
- const sk = p256.utils.randomPrivateKey();
185
- const pk = p256.getPublicKey(sk);
186
- const signer = new ES256Signer();
187
- const sig = await signer.sign(data, p256PrivMb(sk));
188
- const bad = Buffer.from(sig);
189
- bad[0] ^= 0xff;
190
- const ok = await signer.verify(data, bad, p256PubMb(pk));
191
- expect(ok).toBe(false);
192
- });
193
-
194
- test('sign handles object with toCompactRawBytes()', async () => {
195
- const sk = p256.utils.randomPrivateKey();
196
- const signer = new ES256Signer();
197
- const bytes = new Uint8Array(64).fill(11);
198
- const spy = spyOn(p256, 'sign').mockReturnValue({
199
- toCompactRawBytes: () => bytes
200
- } as any);
201
- const sig = await signer.sign(data, p256PrivMb(sk));
202
- expect(Buffer.from(sig)).toEqual(Buffer.from(bytes));
203
- spy.mockRestore();
204
- });
205
-
206
- test('sign handles object with toRawBytes()', async () => {
207
- const sk = p256.utils.randomPrivateKey();
208
- const signer = new ES256Signer();
209
- const bytes = new Uint8Array(64).fill(13);
210
- const spy = spyOn(p256, 'sign').mockReturnValue({
211
- toRawBytes: () => bytes
212
- } as any);
213
- const sig = await signer.sign(data, p256PrivMb(sk));
214
- expect(Buffer.from(sig)).toEqual(Buffer.from(bytes));
215
- spy.mockRestore();
216
- });
217
-
218
- test('sign handles direct Uint8Array return', async () => {
219
- const sk = p256.utils.randomPrivateKey();
220
- const signer = new ES256Signer();
221
- const bytes = new Uint8Array(64).fill(21);
222
- const spy = spyOn(p256, 'sign').mockReturnValue(bytes as any);
223
- const sig = await signer.sign(data, p256PrivMb(sk));
224
- expect(Buffer.from(sig)).toEqual(Buffer.from(bytes));
225
- spy.mockRestore();
226
- });
227
-
228
- test('sign handles fallback via new Uint8Array(sigAny)', async () => {
229
- const sk = p256.utils.randomPrivateKey();
230
- const signer = new ES256Signer();
231
- const arr = Array.from({ length: 64 }, (_, i) => (i + 1) & 0xff);
232
- const spy = spyOn(p256, 'sign').mockReturnValue(arr as any);
233
- const sig = await signer.sign(data, p256PrivMb(sk));
234
- expect(sig).toHaveLength(64);
235
- expect(sig[0]).toBe(1);
236
- expect(sig[63]).toBe(64);
237
- spy.mockRestore();
238
- });
239
-
240
- test('verify exception path returns false', async () => {
241
- const sk = p256.utils.randomPrivateKey();
242
- const pk = p256.getPublicKey(sk);
243
- const signer = new ES256Signer();
244
- const sig = await signer.sign(data, p256PrivMb(sk));
245
- const spy = spyOn(p256, 'verify').mockImplementation(() => { throw new Error('boom'); });
246
- const ok = await signer.verify(data, sig, p256PubMb(pk));
247
- expect(ok).toBe(false);
248
- spy.mockRestore();
249
- });
250
- });
251
-
252
- describe('Ed25519Signer', () => {
253
- test('invalid multibase prefix throws on sign and verify', async () => {
254
- const signer = new Ed25519Signer();
255
- await expect(signer.sign(data, 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
256
- await expect(signer.verify(data, Buffer.alloc(64), 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
257
- });
258
-
259
- test('wrong key type throws on sign and verify', async () => {
260
- const signer = new Ed25519Signer();
261
- const sk = secp256k1.utils.randomPrivateKey();
262
- const pk = secp256k1.getPublicKey(sk);
263
- await expect(signer.sign(data, secpPrivMb(sk))).rejects.toThrow('Invalid key type for Ed25519');
264
- await expect(signer.verify(data, Buffer.alloc(64), secpPubMb(pk))).rejects.toThrow('Invalid key type for Ed25519');
265
- });
266
-
267
- test('sign and verify success; verify returns false with bad signature', async () => {
268
- const sk = ed25519.utils.randomPrivateKey();
269
- const pk = await ed25519.getPublicKey(sk);
270
- const signer = new Ed25519Signer();
271
- const sig = await signer.sign(data, edPrivMb(sk));
272
- const ok = await signer.verify(data, sig, edPubMb(pk));
273
- expect(ok).toBe(true);
274
-
275
- const bad = Buffer.from(sig);
276
- bad[0] ^= 0xff;
277
- const okBad = await signer.verify(data, bad, edPubMb(pk));
278
- expect(okBad).toBe(false);
279
- });
280
-
281
- test('verify exception path returns false', async () => {
282
- const sk = ed25519.utils.randomPrivateKey();
283
- const pk = await ed25519.getPublicKey(sk);
284
- const signer = new Ed25519Signer();
285
- const sig = await signer.sign(data, edPrivMb(sk));
286
- const spy = spyOn(ed25519, 'verifyAsync').mockImplementation(async () => { throw new Error('boom'); });
287
- const ok = await signer.verify(data, sig, edPubMb(pk));
288
- expect(ok).toBe(false);
289
- spy.mockRestore();
290
- });
291
- });
292
-
293
- describe('Bls12381G2Signer', () => {
294
- test('invalid multibase prefix throws on sign and verify', async () => {
295
- const signer = new Bls12381G2Signer();
296
- await expect(signer.sign(data, 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
297
- await expect(signer.verify(data, Buffer.alloc(96), 'xabc')).rejects.toThrow('Invalid multibase key format. Keys must use multicodec headers.');
298
- });
299
-
300
- test('wrong key type throws on sign and verify', async () => {
301
- const signer = new Bls12381G2Signer();
302
- const edPriv = ed25519.utils.randomPrivateKey();
303
- const edPub = await ed25519.getPublicKey(edPriv);
304
- await expect(signer.sign(data, edPrivMb(edPriv))).rejects.toThrow('Invalid key type for Bls12381G2');
305
- await expect(signer.verify(data, Buffer.alloc(96), edPubMb(edPub))).rejects.toThrow('Invalid key type for Bls12381G2');
306
- });
307
-
308
- test('sign and verify success; verify returns false with bad signature', async () => {
309
- const sk = bls.utils.randomPrivateKey();
310
- const pk = await bls.getPublicKey(sk);
311
- const signer = new Bls12381G2Signer();
312
- const sig = await signer.sign(data, blsPrivMb(sk));
313
- const ok = await signer.verify(data, sig, blsPubMb(pk));
314
- expect(ok).toBe(true);
315
-
316
- const bad = Buffer.from(sig);
317
- bad[0] ^= 0xff;
318
- const okBad = await signer.verify(data, bad, blsPubMb(pk));
319
- expect(okBad).toBe(false);
320
- });
321
-
322
- test('verify exception path returns false', async () => {
323
- const sk = bls.utils.randomPrivateKey();
324
- const pk = await bls.getPublicKey(sk);
325
- const signer = new Bls12381G2Signer();
326
- const sig = await signer.sign(data, blsPrivMb(sk));
327
- spyOn(bls, 'verify').mockImplementation((_sig: any, _msg: any, _pk: any) => { throw new Error('boom'); });
328
- const ok = await signer.verify(data, sig, blsPubMb(pk));
329
- expect(ok).toBe(false);
330
- });
331
- });
332
- });
333
-
334
- /** Inlined from Signer.branch-extra.part.ts */
335
-
336
- describe('ES256Signer extra branch coverage', () => {
337
- test('verify catch path when p256.verify throws', async () => {
338
- const signer = new ES256Signer();
339
- const sk = p256.utils.randomPrivateKey();
340
- const pk = p256.getPublicKey(sk);
341
- const sig = await signer.sign(Buffer.from('x'), p256PrivMb(sk));
342
- const spy = spyOn(p256, 'verify').mockImplementation(() => { throw new Error('boom'); });
343
- const ok = await signer.verify(Buffer.from('x'), sig, p256PubMb(pk));
344
- expect(ok).toBe(false);
345
- spy.mockRestore();
346
- });
347
- });
348
-
349
-
350
-
351
-
352
- /** Inlined from Signer.env.false-branch.part.ts */
353
- describe('Signer module env false branches (no injection when already present)', () => {
354
- test('module initialization ensures utility functions exist', async () => {
355
- // After module load, verify the utility functions are available
356
- // This validates lines 20-27 run successfully
357
- const sAny: any = secp256k1 as any;
358
- const eAny: any = ed25519 as any;
359
-
360
- expect(sAny.utils).toBeDefined();
361
- expect(typeof sAny.utils.hmacSha256Sync).toBe('function');
362
- expect(eAny.utils).toBeDefined();
363
- expect(typeof eAny.utils.sha512Sync).toBe('function');
364
- });
365
- });
366
-
367
-
368
-
369
-
370
- /** Inlined from Signer.env.part.ts */
371
- describe('Signer module utils injection', () => {
372
- test('verifies hmacSha256Sync is callable', async () => {
373
- // Verify the injected/existing function works
374
- const sAny: any = secp256k1 as any;
375
- const result = sAny.utils.hmacSha256Sync(
376
- new Uint8Array(32).fill(1),
377
- new Uint8Array(10).fill(2)
378
- );
379
- expect(result).toBeInstanceOf(Uint8Array);
380
- expect(result.length).toBe(32);
381
- });
382
-
383
- test('verifies ed25519 sha512Sync is callable', async () => {
384
- // Verify the injected/existing function works
385
- const eAny: any = ed25519 as any;
386
- const result = eAny.utils.sha512Sync(new Uint8Array(10).fill(3));
387
- expect(result).toBeInstanceOf(Uint8Array);
388
- expect(result.length).toBe(64);
389
- });
390
- });
391
-
392
-
393
-
394
-
395
- /** Inlined from Signer.extra-branch-secp.part.ts */
396
-
397
- describe('ES256KSigner branch: sign returns direct Uint8Array', () => {
398
- test('covers instanceof Uint8Array path', async () => {
399
- const signer = new ES256KSigner();
400
- const sk = secp256k1.utils.randomPrivateKey();
401
- const bytes = new Uint8Array(64).fill(5);
402
- const spy = spyOn(secp256k1, 'signAsync').mockResolvedValue(bytes as any);
403
- const sig = await signer.sign(Buffer.from('x'), secpPrivMb(sk));
404
- expect(Buffer.isBuffer(sig)).toBe(true);
405
- expect(sig).toEqual(Buffer.from(bytes));
406
- spy.mockRestore();
407
- });
408
- });