@originals/sdk 1.4.2 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/src/adapters/FeeOracleMock.ts +0 -9
  4. package/src/adapters/index.ts +0 -5
  5. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  6. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  7. package/src/adapters/types.ts +0 -66
  8. package/src/bitcoin/BitcoinManager.ts +0 -330
  9. package/src/bitcoin/BroadcastClient.ts +0 -54
  10. package/src/bitcoin/OrdinalsClient.ts +0 -119
  11. package/src/bitcoin/PSBTBuilder.ts +0 -106
  12. package/src/bitcoin/fee-calculation.ts +0 -38
  13. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  14. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  15. package/src/bitcoin/providers/types.ts +0 -59
  16. package/src/bitcoin/transactions/commit.ts +0 -465
  17. package/src/bitcoin/transactions/index.ts +0 -13
  18. package/src/bitcoin/transfer.ts +0 -43
  19. package/src/bitcoin/utxo-selection.ts +0 -322
  20. package/src/bitcoin/utxo.ts +0 -113
  21. package/src/contexts/credentials-v1.json +0 -237
  22. package/src/contexts/credentials-v2-examples.json +0 -5
  23. package/src/contexts/credentials-v2.json +0 -340
  24. package/src/contexts/credentials.json +0 -237
  25. package/src/contexts/data-integrity-v2.json +0 -81
  26. package/src/contexts/dids.json +0 -58
  27. package/src/contexts/ed255192020.json +0 -93
  28. package/src/contexts/ordinals-plus.json +0 -23
  29. package/src/contexts/originals.json +0 -22
  30. package/src/core/OriginalsSDK.ts +0 -416
  31. package/src/crypto/Multikey.ts +0 -194
  32. package/src/crypto/Signer.ts +0 -254
  33. package/src/crypto/noble-init.ts +0 -121
  34. package/src/did/BtcoDidResolver.ts +0 -227
  35. package/src/did/DIDManager.ts +0 -694
  36. package/src/did/Ed25519Verifier.ts +0 -68
  37. package/src/did/KeyManager.ts +0 -236
  38. package/src/did/WebVHManager.ts +0 -498
  39. package/src/did/createBtcoDidDocument.ts +0 -59
  40. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  41. package/src/events/EventEmitter.ts +0 -222
  42. package/src/events/index.ts +0 -19
  43. package/src/events/types.ts +0 -331
  44. package/src/examples/basic-usage.ts +0 -78
  45. package/src/examples/create-module-original.ts +0 -435
  46. package/src/examples/full-lifecycle-flow.ts +0 -514
  47. package/src/examples/run.ts +0 -60
  48. package/src/index.ts +0 -150
  49. package/src/kinds/KindRegistry.ts +0 -290
  50. package/src/kinds/index.ts +0 -74
  51. package/src/kinds/types.ts +0 -470
  52. package/src/kinds/validators/AgentValidator.ts +0 -257
  53. package/src/kinds/validators/AppValidator.ts +0 -211
  54. package/src/kinds/validators/DatasetValidator.ts +0 -242
  55. package/src/kinds/validators/DocumentValidator.ts +0 -311
  56. package/src/kinds/validators/MediaValidator.ts +0 -269
  57. package/src/kinds/validators/ModuleValidator.ts +0 -225
  58. package/src/kinds/validators/base.ts +0 -276
  59. package/src/kinds/validators/index.ts +0 -12
  60. package/src/lifecycle/BatchOperations.ts +0 -373
  61. package/src/lifecycle/LifecycleManager.ts +0 -2126
  62. package/src/lifecycle/OriginalsAsset.ts +0 -524
  63. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  64. package/src/lifecycle/ResourceVersioning.ts +0 -163
  65. package/src/migration/MigrationManager.ts +0 -527
  66. package/src/migration/audit/AuditLogger.ts +0 -176
  67. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  68. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  69. package/src/migration/index.ts +0 -33
  70. package/src/migration/operations/BaseMigration.ts +0 -126
  71. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  72. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  73. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  74. package/src/migration/rollback/RollbackManager.ts +0 -170
  75. package/src/migration/state/StateMachine.ts +0 -92
  76. package/src/migration/state/StateTracker.ts +0 -156
  77. package/src/migration/types.ts +0 -344
  78. package/src/migration/validation/BitcoinValidator.ts +0 -107
  79. package/src/migration/validation/CredentialValidator.ts +0 -62
  80. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  81. package/src/migration/validation/LifecycleValidator.ts +0 -64
  82. package/src/migration/validation/StorageValidator.ts +0 -79
  83. package/src/migration/validation/ValidationPipeline.ts +0 -213
  84. package/src/resources/ResourceManager.ts +0 -655
  85. package/src/resources/index.ts +0 -21
  86. package/src/resources/types.ts +0 -202
  87. package/src/storage/LocalStorageAdapter.ts +0 -61
  88. package/src/storage/MemoryStorageAdapter.ts +0 -29
  89. package/src/storage/StorageAdapter.ts +0 -25
  90. package/src/storage/index.ts +0 -3
  91. package/src/types/bitcoin.ts +0 -98
  92. package/src/types/common.ts +0 -92
  93. package/src/types/credentials.ts +0 -88
  94. package/src/types/did.ts +0 -31
  95. package/src/types/external-shims.d.ts +0 -53
  96. package/src/types/index.ts +0 -7
  97. package/src/types/network.ts +0 -175
  98. package/src/utils/EventLogger.ts +0 -298
  99. package/src/utils/Logger.ts +0 -322
  100. package/src/utils/MetricsCollector.ts +0 -358
  101. package/src/utils/bitcoin-address.ts +0 -130
  102. package/src/utils/cbor.ts +0 -12
  103. package/src/utils/encoding.ts +0 -127
  104. package/src/utils/hash.ts +0 -6
  105. package/src/utils/retry.ts +0 -46
  106. package/src/utils/satoshi-validation.ts +0 -196
  107. package/src/utils/serialization.ts +0 -96
  108. package/src/utils/telemetry.ts +0 -40
  109. package/src/utils/validation.ts +0 -119
  110. package/src/vc/CredentialManager.ts +0 -918
  111. package/src/vc/Issuer.ts +0 -100
  112. package/src/vc/Verifier.ts +0 -47
  113. package/src/vc/cryptosuites/bbs.ts +0 -253
  114. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  115. package/src/vc/cryptosuites/eddsa.ts +0 -99
  116. package/src/vc/documentLoader.ts +0 -67
  117. package/src/vc/proofs/data-integrity.ts +0 -33
  118. package/src/vc/utils/jsonld.ts +0 -18
  119. package/tests/__mocks__/bbs-signatures.js +0 -17
  120. package/tests/__mocks__/mf-base58.js +0 -24
  121. package/tests/fixtures/did-documents.ts +0 -247
  122. package/tests/index.test.ts +0 -21
  123. package/tests/integration/BatchOperations.test.ts +0 -531
  124. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  125. package/tests/integration/CredentialManager.test.ts +0 -42
  126. package/tests/integration/DIDManager.test.ts +0 -41
  127. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  128. package/tests/integration/Events.test.ts +0 -435
  129. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  130. package/tests/integration/LifecycleManager.test.ts +0 -21
  131. package/tests/integration/MultikeyFlow.test.ts +0 -52
  132. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  133. package/tests/integration/WebVhPublish.test.ts +0 -48
  134. package/tests/integration/createTypedOriginal.test.ts +0 -379
  135. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  136. package/tests/manual/test-commit-creation.ts +0 -323
  137. package/tests/mocks/MockKeyStore.ts +0 -38
  138. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  139. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  140. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  141. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  142. package/tests/mocks/adapters/index.ts +0 -6
  143. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  144. package/tests/performance/logging.perf.test.ts +0 -336
  145. package/tests/sdk.test.ts +0 -43
  146. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  147. package/tests/setup.bun.ts +0 -69
  148. package/tests/setup.jest.ts +0 -23
  149. package/tests/stress/batch-operations-stress.test.ts +0 -571
  150. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  151. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  152. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  153. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  154. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  155. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  156. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  157. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  158. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  159. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  160. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  161. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  162. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  163. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  164. package/tests/unit/crypto/Multikey.test.ts +0 -206
  165. package/tests/unit/crypto/Signer.test.ts +0 -408
  166. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  167. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  168. package/tests/unit/did/DIDManager.test.ts +0 -185
  169. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  170. package/tests/unit/did/KeyManager.test.ts +0 -452
  171. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  172. package/tests/unit/did/WebVHManager.test.ts +0 -435
  173. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  174. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  175. package/tests/unit/events/EventEmitter.test.ts +0 -407
  176. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  177. package/tests/unit/kinds/types.test.ts +0 -409
  178. package/tests/unit/kinds/validators.test.ts +0 -651
  179. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  180. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  181. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  182. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  183. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  184. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  185. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  186. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  187. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  188. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  189. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  190. package/tests/unit/types/network.test.ts +0 -255
  191. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  192. package/tests/unit/utils/Logger.test.ts +0 -473
  193. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  194. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  195. package/tests/unit/utils/cbor.test.ts +0 -35
  196. package/tests/unit/utils/encoding.test.ts +0 -318
  197. package/tests/unit/utils/hash.test.ts +0 -12
  198. package/tests/unit/utils/retry.test.ts +0 -100
  199. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  200. package/tests/unit/utils/serialization.test.ts +0 -124
  201. package/tests/unit/utils/telemetry.test.ts +0 -52
  202. package/tests/unit/utils/validation.test.ts +0 -141
  203. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  204. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  205. package/tests/unit/vc/Issuer.test.ts +0 -107
  206. package/tests/unit/vc/Verifier.test.ts +0 -525
  207. package/tests/unit/vc/bbs.test.ts +0 -282
  208. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  209. package/tests/unit/vc/documentLoader.test.ts +0 -121
  210. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  211. package/tsconfig.json +0 -31
  212. package/tsconfig.test.json +0 -15
@@ -1,452 +0,0 @@
1
- import { describe, test, expect } from 'bun:test';
2
- import { KeyManager } from '../../../src/did/KeyManager';
3
- import { DIDDocument, KeyPair, KeyType } from '../../../src/types';
4
-
5
- describe('KeyManager', () => {
6
- const km = new KeyManager();
7
-
8
- test('generateKeyPair ES256K works', async () => {
9
- const kp = await km.generateKeyPair('ES256K');
10
- expect(kp.privateKey.startsWith('z')).toBe(true);
11
- expect(kp.publicKey.startsWith('z')).toBe(true);
12
- });
13
-
14
- test('generateKeyPair Ed25519 works', async () => {
15
- const kp = await km.generateKeyPair('Ed25519');
16
- expect(kp.privateKey.startsWith('z')).toBe(true);
17
- expect(kp.publicKey.startsWith('z')).toBe(true);
18
- });
19
-
20
- test('decodePublicKeyMultibase invalid input throws', () => {
21
- expect(() => km.decodePublicKeyMultibase('abc')).toThrow('Invalid multibase string');
22
- });
23
-
24
- test('encode/decode multibase roundtrip', () => {
25
- const pub = Buffer.from('hello');
26
- const encoded = km.encodePublicKeyMultibase(pub, 'ES256K' as KeyType);
27
- const decoded = km.decodePublicKeyMultibase(encoded);
28
- expect(Buffer.from(decoded.key)).toEqual(Buffer.from(pub));
29
- expect(decoded.type).toBe('ES256K');
30
- });
31
-
32
- test('decodePublicKeyMultibase handles Ed25519 multikey values', () => {
33
- const pub = Buffer.from([0, 255, 1, 2, 3, 4, 5]);
34
- const encoded = km.encodePublicKeyMultibase(pub, 'Ed25519' as KeyType);
35
- const decoded = km.decodePublicKeyMultibase(encoded);
36
- expect(Buffer.from(decoded.key)).toEqual(Buffer.from(pub));
37
- expect(decoded.type).toBe('Ed25519');
38
- });
39
-
40
- test('rotateKeys updates DID document keys', async () => {
41
- const didDoc: DIDDocument = { '@context': ['https://www.w3.org/ns/did/v1'], id: 'did:peer:xyz' };
42
- const pair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
43
- const rotated = await km.rotateKeys(didDoc, pair);
44
- expect(rotated.verificationMethod?.[0].publicKeyMultibase).toBe(pair.publicKey);
45
- // Verify that multikey context is added when using Multikey verification method
46
- expect(rotated['@context']).toContain('https://w3id.org/security/multikey/v1');
47
- expect(rotated.verificationMethod?.[0].type).toBe('Multikey');
48
- });
49
-
50
- test('rotateKeys marks old keys as revoked', async () => {
51
- // Start with a DID document that has an existing verification method
52
- const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
53
- const didDoc: DIDDocument = {
54
- '@context': ['https://www.w3.org/ns/did/v1'],
55
- id: 'did:peer:test123',
56
- verificationMethod: [{
57
- id: 'did:peer:test123#keys-0',
58
- type: 'Multikey',
59
- controller: 'did:peer:test123',
60
- publicKeyMultibase: initialPair.publicKey
61
- }],
62
- authentication: ['did:peer:test123#keys-0']
63
- };
64
-
65
- // Rotate to new key
66
- const newPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
67
- const rotated = await km.rotateKeys(didDoc, newPair);
68
-
69
- // Verify old key is revoked
70
- expect(rotated.verificationMethod).toHaveLength(2);
71
- expect(rotated.verificationMethod?.[0].revoked).toBeDefined();
72
- expect(rotated.verificationMethod?.[0].revoked).toMatch(/^\d{4}-\d{2}-\d{2}T/); // ISO 8601 format
73
-
74
- // Verify new key is not revoked
75
- expect(rotated.verificationMethod?.[1].revoked).toBeUndefined();
76
- expect(rotated.verificationMethod?.[1].publicKeyMultibase).toBe(newPair.publicKey);
77
- });
78
-
79
- test('rotateKeys updates authentication and assertionMethod arrays', async () => {
80
- const initialPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
81
- const didDoc: DIDDocument = {
82
- '@context': ['https://www.w3.org/ns/did/v1'],
83
- id: 'did:peer:abc',
84
- verificationMethod: [{
85
- id: 'did:peer:abc#keys-0',
86
- type: 'Multikey',
87
- controller: 'did:peer:abc',
88
- publicKeyMultibase: initialPair.publicKey
89
- }],
90
- authentication: ['did:peer:abc#keys-0'],
91
- assertionMethod: ['did:peer:abc#keys-0']
92
- };
93
-
94
- const newPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
95
- const rotated = await km.rotateKeys(didDoc, newPair);
96
-
97
- // Verify authentication and assertionMethod reference only new key
98
- expect(rotated.authentication).toEqual(['did:peer:abc#keys-1']);
99
- expect(rotated.assertionMethod).toEqual(['did:peer:abc#keys-1']);
100
- });
101
-
102
- test('rotateKeys preserves service endpoints and other properties', async () => {
103
- const initialPair: KeyPair = await km.generateKeyPair('ES256' as KeyType);
104
- const didDoc: DIDDocument = {
105
- '@context': ['https://www.w3.org/ns/did/v1'],
106
- id: 'did:peer:xyz',
107
- verificationMethod: [{
108
- id: 'did:peer:xyz#keys-0',
109
- type: 'Multikey',
110
- controller: 'did:peer:xyz',
111
- publicKeyMultibase: initialPair.publicKey
112
- }],
113
- authentication: ['did:peer:xyz#keys-0'],
114
- service: [{
115
- id: 'did:peer:xyz#service-1',
116
- type: 'MessagingService',
117
- serviceEndpoint: 'https://example.com/endpoint'
118
- }],
119
- keyAgreement: ['did:peer:xyz#key-agreement-1']
120
- };
121
-
122
- const newPair: KeyPair = await km.generateKeyPair('ES256' as KeyType);
123
- const rotated = await km.rotateKeys(didDoc, newPair);
124
-
125
- // Verify service endpoints are preserved
126
- expect(rotated.service).toEqual(didDoc.service);
127
- expect(rotated.keyAgreement).toEqual(didDoc.keyAgreement);
128
- });
129
-
130
- test('rotateKeys maintains DID document validity with proper context', async () => {
131
- const didDoc: DIDDocument = {
132
- '@context': ['https://www.w3.org/ns/did/v1'],
133
- id: 'did:peer:validity-test'
134
- };
135
-
136
- const newPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
137
- const rotated = await km.rotateKeys(didDoc, newPair);
138
-
139
- // Verify proper context is included
140
- expect(rotated['@context']).toContain('https://www.w3.org/ns/did/v1');
141
- expect(rotated['@context']).toContain('https://w3id.org/security/multikey/v1');
142
- expect(rotated['@context']).toContain('https://w3id.org/security/v1');
143
-
144
- // Verify structure is valid
145
- expect(rotated.id).toBe('did:peer:validity-test');
146
- expect(rotated.verificationMethod).toBeDefined();
147
- expect(rotated.authentication).toBeDefined();
148
- });
149
-
150
- test('rotateKeys does not duplicate multikey context if already present', async () => {
151
- const didDoc: DIDDocument = {
152
- '@context': ['https://www.w3.org/ns/did/v1', 'https://w3id.org/security/multikey/v1'],
153
- id: 'did:peer:abc'
154
- };
155
- const pair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
156
- const rotated = await km.rotateKeys(didDoc, pair);
157
-
158
- // Count occurrences of multikey context
159
- const contextCount = rotated['@context'].filter(c => c === 'https://w3id.org/security/multikey/v1').length;
160
- expect(contextCount).toBe(1);
161
- expect(rotated['@context']).toContain('https://w3id.org/security/multikey/v1');
162
- });
163
-
164
- test('recoverFromCompromise generates new keys correctly', async () => {
165
- const initialPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
166
- const didDoc: DIDDocument = {
167
- '@context': ['https://www.w3.org/ns/did/v1'],
168
- id: 'did:peer:compromised123',
169
- verificationMethod: [{
170
- id: 'did:peer:compromised123#keys-0',
171
- type: 'Multikey',
172
- controller: 'did:peer:compromised123',
173
- publicKeyMultibase: initialPair.publicKey
174
- }],
175
- authentication: ['did:peer:compromised123#keys-0']
176
- };
177
-
178
- const result = await km.recoverFromCompromise(didDoc);
179
-
180
- // Verify result structure
181
- expect(result).toHaveProperty('didDocument');
182
- expect(result).toHaveProperty('recoveryCredential');
183
- expect(result).toHaveProperty('newKeyPair');
184
-
185
- // Verify new key was generated
186
- expect(result.didDocument.verificationMethod).toHaveLength(2);
187
- const newKey = result.didDocument.verificationMethod?.[1];
188
- expect(newKey?.publicKeyMultibase).toBeDefined();
189
- expect(newKey?.publicKeyMultibase).not.toBe(initialPair.publicKey);
190
-
191
- // Verify new key pair is returned and matches the verification method
192
- expect(result.newKeyPair).toBeDefined();
193
- expect(result.newKeyPair.publicKey).toBe(newKey?.publicKeyMultibase);
194
- expect(result.newKeyPair.privateKey).toBeDefined();
195
- });
196
-
197
- test('recoverFromCompromise marks all existing keys as compromised', async () => {
198
- const pair1: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
199
- const pair2: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
200
- const didDoc: DIDDocument = {
201
- '@context': ['https://www.w3.org/ns/did/v1'],
202
- id: 'did:peer:multi-key',
203
- verificationMethod: [
204
- {
205
- id: 'did:peer:multi-key#keys-0',
206
- type: 'Multikey',
207
- controller: 'did:peer:multi-key',
208
- publicKeyMultibase: pair1.publicKey
209
- },
210
- {
211
- id: 'did:peer:multi-key#keys-1',
212
- type: 'Multikey',
213
- controller: 'did:peer:multi-key',
214
- publicKeyMultibase: pair2.publicKey
215
- }
216
- ],
217
- authentication: ['did:peer:multi-key#keys-0']
218
- };
219
-
220
- const result = await km.recoverFromCompromise(didDoc);
221
-
222
- // Verify all old keys are marked as compromised
223
- expect(result.didDocument.verificationMethod).toHaveLength(3);
224
- expect(result.didDocument.verificationMethod?.[0].compromised).toBeDefined();
225
- expect(result.didDocument.verificationMethod?.[0].compromised).toMatch(/^\d{4}-\d{2}-\d{2}T/);
226
- expect(result.didDocument.verificationMethod?.[1].compromised).toBeDefined();
227
- expect(result.didDocument.verificationMethod?.[1].compromised).toMatch(/^\d{4}-\d{2}-\d{2}T/);
228
-
229
- // Verify new key is not compromised
230
- expect(result.didDocument.verificationMethod?.[2].compromised).toBeUndefined();
231
- });
232
-
233
- test('recoverFromCompromise creates properly formatted recovery credential', async () => {
234
- const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
235
- const didDoc: DIDDocument = {
236
- '@context': ['https://www.w3.org/ns/did/v1'],
237
- id: 'did:peer:recovery-test',
238
- verificationMethod: [{
239
- id: 'did:peer:recovery-test#keys-0',
240
- type: 'Multikey',
241
- controller: 'did:peer:recovery-test',
242
- publicKeyMultibase: initialPair.publicKey
243
- }],
244
- authentication: ['did:peer:recovery-test#keys-0']
245
- };
246
-
247
- const result = await km.recoverFromCompromise(didDoc);
248
- const credential = result.recoveryCredential;
249
-
250
- // Verify credential structure
251
- expect(credential['@context']).toContain('https://www.w3.org/2018/credentials/v1');
252
- expect(credential['@context']).toContain('https://w3id.org/security/v1');
253
- expect(credential.type).toContain('VerifiableCredential');
254
- expect(credential.type).toContain('KeyRecoveryCredential');
255
- expect(credential.issuer).toBe('did:peer:recovery-test');
256
- expect(credential.issuanceDate).toMatch(/^\d{4}-\d{2}-\d{2}T/);
257
-
258
- // Verify credential subject
259
- expect(credential.credentialSubject.id).toBe('did:peer:recovery-test');
260
- expect(credential.credentialSubject.recoveryReason).toBe('key_compromise');
261
- expect(credential.credentialSubject.previousVerificationMethods).toEqual(['did:peer:recovery-test#keys-0']);
262
- expect(credential.credentialSubject.newVerificationMethod).toBe('did:peer:recovery-test#keys-1');
263
- });
264
-
265
- test('recoverFromCompromise updates authentication to use new key', async () => {
266
- const initialPair: KeyPair = await km.generateKeyPair('ES256' as KeyType);
267
- const didDoc: DIDDocument = {
268
- '@context': ['https://www.w3.org/ns/did/v1'],
269
- id: 'did:peer:auth-update',
270
- verificationMethod: [{
271
- id: 'did:peer:auth-update#keys-0',
272
- type: 'Multikey',
273
- controller: 'did:peer:auth-update',
274
- publicKeyMultibase: initialPair.publicKey
275
- }],
276
- authentication: ['did:peer:auth-update#keys-0'],
277
- assertionMethod: ['did:peer:auth-update#keys-0']
278
- };
279
-
280
- const result = await km.recoverFromCompromise(didDoc);
281
-
282
- // Verify authentication and assertionMethod reference new key
283
- expect(result.didDocument.authentication).toEqual(['did:peer:auth-update#keys-1']);
284
- expect(result.didDocument.assertionMethod).toEqual(['did:peer:auth-update#keys-1']);
285
- });
286
-
287
- test('recoverFromCompromise preserves service endpoints', async () => {
288
- const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
289
- const didDoc: DIDDocument = {
290
- '@context': ['https://www.w3.org/ns/did/v1'],
291
- id: 'did:peer:service-test',
292
- verificationMethod: [{
293
- id: 'did:peer:service-test#keys-0',
294
- type: 'Multikey',
295
- controller: 'did:peer:service-test',
296
- publicKeyMultibase: initialPair.publicKey
297
- }],
298
- authentication: ['did:peer:service-test#keys-0'],
299
- service: [{
300
- id: 'did:peer:service-test#endpoint-1',
301
- type: 'LinkedDomains',
302
- serviceEndpoint: 'https://example.com'
303
- }]
304
- };
305
-
306
- const result = await km.recoverFromCompromise(didDoc);
307
-
308
- // Verify service endpoints are preserved
309
- expect(result.didDocument.service).toEqual(didDoc.service);
310
- });
311
-
312
- test('recoverFromCompromise uses same key type as original', async () => {
313
- // Test with ES256K
314
- const es256kPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
315
- const didDocES256K: DIDDocument = {
316
- '@context': ['https://www.w3.org/ns/did/v1'],
317
- id: 'did:peer:keytype-test',
318
- verificationMethod: [{
319
- id: 'did:peer:keytype-test#keys-0',
320
- type: 'Multikey',
321
- controller: 'did:peer:keytype-test',
322
- publicKeyMultibase: es256kPair.publicKey
323
- }]
324
- };
325
-
326
- const resultES256K = await km.recoverFromCompromise(didDocES256K);
327
- const newKeyMultibase = resultES256K.didDocument.verificationMethod?.[1].publicKeyMultibase;
328
-
329
- // Decode to verify key type
330
- expect(newKeyMultibase).toBeDefined();
331
- const decoded = km.decodePublicKeyMultibase(newKeyMultibase!);
332
- expect(decoded.type).toBe('ES256K');
333
- });
334
-
335
- test('recoverFromCompromise handles DID document with no existing keys', async () => {
336
- const didDoc: DIDDocument = {
337
- '@context': ['https://www.w3.org/ns/did/v1'],
338
- id: 'did:peer:no-keys'
339
- };
340
-
341
- const result = await km.recoverFromCompromise(didDoc);
342
-
343
- // Verify new key was generated with default type (Ed25519)
344
- expect(result.didDocument.verificationMethod).toHaveLength(1);
345
- expect(result.didDocument.verificationMethod?.[0].id).toBe('did:peer:no-keys#keys-0');
346
-
347
- // Verify recovery credential lists no previous keys
348
- expect(result.recoveryCredential.credentialSubject.previousVerificationMethods).toEqual([]);
349
- });
350
-
351
- test('rotateKeys preserves all optional DID document properties', async () => {
352
- const initialPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
353
- const didDoc: DIDDocument = {
354
- '@context': ['https://www.w3.org/ns/did/v1'],
355
- id: 'did:peer:full-props',
356
- verificationMethod: [{
357
- id: 'did:peer:full-props#keys-0',
358
- type: 'Multikey',
359
- controller: 'did:peer:full-props',
360
- publicKeyMultibase: initialPair.publicKey
361
- }],
362
- authentication: ['did:peer:full-props#keys-0'],
363
- keyAgreement: ['did:peer:full-props#key-agreement-1'],
364
- capabilityInvocation: ['did:peer:full-props#capability-1'],
365
- capabilityDelegation: ['did:peer:full-props#delegation-1'],
366
- service: [{
367
- id: 'did:peer:full-props#service-1',
368
- type: 'MessagingService',
369
- serviceEndpoint: 'https://example.com'
370
- }]
371
- };
372
-
373
- const newPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
374
- const rotated = await km.rotateKeys(didDoc, newPair);
375
-
376
- // Verify all properties are preserved
377
- expect(rotated.keyAgreement).toEqual(didDoc.keyAgreement);
378
- expect(rotated.capabilityInvocation).toEqual(didDoc.capabilityInvocation);
379
- expect(rotated.capabilityDelegation).toEqual(didDoc.capabilityDelegation);
380
- expect(rotated.service).toEqual(didDoc.service);
381
- });
382
-
383
- test('recoverFromCompromise preserves all optional DID document properties', async () => {
384
- const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
385
- const didDoc: DIDDocument = {
386
- '@context': ['https://www.w3.org/ns/did/v1'],
387
- id: 'did:peer:full-recovery',
388
- verificationMethod: [{
389
- id: 'did:peer:full-recovery#keys-0',
390
- type: 'Multikey',
391
- controller: 'did:peer:full-recovery',
392
- publicKeyMultibase: initialPair.publicKey
393
- }],
394
- authentication: ['did:peer:full-recovery#keys-0'],
395
- keyAgreement: ['did:peer:full-recovery#key-agreement-1'],
396
- capabilityInvocation: ['did:peer:full-recovery#capability-1'],
397
- capabilityDelegation: ['did:peer:full-recovery#delegation-1'],
398
- service: [{
399
- id: 'did:peer:full-recovery#service-1',
400
- type: 'LinkedDomains',
401
- serviceEndpoint: 'https://example.com'
402
- }]
403
- };
404
-
405
- const result = await km.recoverFromCompromise(didDoc);
406
-
407
- // Verify all properties are preserved
408
- expect(result.didDocument.keyAgreement).toEqual(didDoc.keyAgreement);
409
- expect(result.didDocument.capabilityInvocation).toEqual(didDoc.capabilityInvocation);
410
- expect(result.didDocument.capabilityDelegation).toEqual(didDoc.capabilityDelegation);
411
- expect(result.didDocument.service).toEqual(didDoc.service);
412
- });
413
-
414
- test('decodePublicKeyMultibase validates input', () => {
415
- expect(() => km.decodePublicKeyMultibase('bad')).toThrow('Invalid multibase string');
416
- });
417
-
418
- test('generateKeyPair supports ES256 (P-256)', async () => {
419
- const kp = await km.generateKeyPair('ES256' as KeyType);
420
- expect(kp).toHaveProperty('privateKey');
421
- expect(kp).toHaveProperty('publicKey');
422
- expect(kp.privateKey).toMatch(/^z/);
423
- expect(kp.publicKey).toMatch(/^z/);
424
- });
425
-
426
- test('generateKeyPair throws on unsupported type', async () => {
427
- await expect(km.generateKeyPair('UNSUPPORTED' as KeyType)).rejects.toThrow('Unsupported key type');
428
- });
429
-
430
- test('constructor initializes utils helpers without throwing', () => {
431
- const instance = new KeyManager();
432
- expect(instance).toBeInstanceOf(KeyManager);
433
- // call utils to cover helper branches
434
- const secp = require('@noble/secp256k1');
435
- const ed = require('@noble/ed25519');
436
- if (secp.utils && typeof secp.utils.hmacSha256Sync === 'function') {
437
- secp.utils.hmacSha256Sync(new Uint8Array([1]), new Uint8Array([2]));
438
- }
439
- if (ed.utils && typeof ed.utils.sha512Sync === 'function') {
440
- ed.utils.sha512Sync(new Uint8Array([3]));
441
- }
442
- });
443
-
444
- test('constructor covers utils undefined branch (creates helpers when missing)', () => {
445
- // In Bun, the utils property is readonly, so we skip this test
446
- // The KeyManager constructor now handles readonly utils gracefully
447
- const km2 = new KeyManager();
448
- expect(km2).toBeInstanceOf(KeyManager);
449
- });
450
- });
451
-
452
-
@@ -1,45 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from OrdinalsClientProviderAdapter.branches.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { OrdinalsClient } from '../../../src/bitcoin/OrdinalsClient';
6
- import { OrdinalsClientProviderAdapter } from '../../../src/did/providers/OrdinalsClientProviderAdapter';
7
-
8
- describe('OrdinalsClientProviderAdapter branches', () => {
9
- test('throws when baseUrl is empty in resolveInscription', async () => {
10
- const client = new OrdinalsClient('http://example.com', 'mainnet');
11
- const adapter = new OrdinalsClientProviderAdapter(client as any, '');
12
- await expect(adapter.resolveInscription('abc')).rejects.toThrow('requires a baseUrl');
13
- });
14
-
15
- test('handles non-ok response from fetch', async () => {
16
- const client = new OrdinalsClient('http://example.com', 'mainnet');
17
- const adapter = new OrdinalsClientProviderAdapter(client as any, 'http://api');
18
- const originalFetch = global.fetch as any;
19
- (global as any).fetch = async () => ({ ok: false, status: 404, statusText: 'Not Found' });
20
- await expect(adapter.resolveInscription('abc')).rejects.toThrow('Failed to resolve inscription');
21
- (global as any).fetch = originalFetch;
22
- });
23
-
24
- test('maps missing fields from JSON with fallbacks', async () => {
25
- const client = new OrdinalsClient('http://example.com', 'mainnet');
26
- const adapter = new OrdinalsClientProviderAdapter(client as any, 'http://api/');
27
- const originalFetch = global.fetch as any;
28
- (global as any).fetch = async () => ({ ok: true, json: async () => ({}) });
29
- const info = await adapter.resolveInscription('abc');
30
- expect(info.content_type).toBe('text/plain');
31
- expect(info.content_url).toBe('http://api/content/abc');
32
- expect(typeof info.sat).toBe('number');
33
- (global as any).fetch = originalFetch;
34
- });
35
-
36
- test('maps sat number without coercion path', async () => {
37
- const client = new OrdinalsClient('http://example.com', 'mainnet');
38
- const adapter = new OrdinalsClientProviderAdapter(client as any, 'http://api');
39
- const originalFetch = global.fetch as any;
40
- (global as any).fetch = async () => ({ ok: true, json: async () => ({ inscription_id: 'abc', sat: 42, content_type: 'text/plain', content_url: 'http://api/content/abc' }) });
41
- const info = await adapter.resolveInscription('abc');
42
- expect(info.sat).toBe(42);
43
- (global as any).fetch = originalFetch;
44
- });
45
- });